text
stringlengths
8
5.77M
Sponge Beautiful Water Droplets – Graphics Collection The creative chocolate Poster – psd material The creative chocolate Poster psd material is containing the following information topics, such as Chocolate, sponge, water droplets, water droplets, Lindt, castles, beautiful. And if you are…The Whole Contents
Through a series of adventurous and challenging outdoor activities, like Challenge Ropes Courses, Rock Climbing and Wilderness Adventures, you and your group will learn valuable leadership and teamwork skills that will take your organization to new levels of success. Our holistic learning process helps groups to access their right-brain for creative problem solving, utilize their analytical left-brain for decisive decision making, complete physical movement activities which stimulates sensory integration, and lead from the heart in building effective team relationships. We coach our clients in empowerment and team performance skills focusing on passion, purpose, and meaning utilizing activities that integrate the body, mind, and spirit to help you achieve your goals. Outcomes are then transferred back to work and personal life. Other Programs Offered include: ♦ Orienteering- Cross-country navigation with map and compass ♦ Eco-Challenge Games- Leadership trek using task cards and natural obstacles ♦ Wilderness Skills- Collaborative challenge activities and skill building ♦ Mobile Rock Climbing Wall- Can travel to different sites for group challenge events ♦ Snowshoe Challenge- Travel on the snow to work together to solve team challenges ♦ Crisis Response Emergency Training- Business continuity planning, intervention training, and response scenarios ♦ Team-Events with a Purpose- helping others through collaboration and team effort in support of community charities ♦ Corporate Picnics and Event Packages! Challenge Ropes Course The Challenge Ropes Course experience emphasizes the value of appropriate risk-taking, focus, and team support to create outstanding results. The activities allow participants to expand their comfort zones and acknowledge fears that may limit personal success. There is opportunity for each participant to play a role in each activity gaining valuable life skills and personal insights in dealing with change, stress management, personal growth, and enhanced relationships. The high ropes course rises up to 40 feet off the ground in towering pines and cedars, providing a physical and emotional challenge. Instructors and fellow teammates provide support for each harnessed climber to experience the value of appropriate risk taking in a safe environment. The climbers and the ground team learn what is possible when courage overcomes fear and trust, support, and effective communication create high performance teamwork. Our “challenge by choice” philosophy supports each person to select the appropriate level of participation to stay involved in the program, engaged with their team, and consistent with their personal values. FreeWheeling Your company can also increase its team effectiveness while contributing to our Veterans Outreach Program by participating in our special "Team-Events with a Purpose" program! The FreeWheeling program gives teams an insightful learning opportunity in overcoming life’s obstacles while helping others through collaboration and team effort in support of disabled military Veterans. FreeWheeling is an experiential wheelchair donation, team-building, and fund development program designed to promote community collaboration, event sponsorship, and open participation for all while raising support for disabled Veterans and their families.
Background {#Sec1} ========== In the last decade, remarkable progress has been achieved in the fight against malaria \[[@CR1]\]. This is largely attributed to a combination of preventive and curative measures including insecticide-treated bed nets and effective case management \[[@CR1], [@CR2]\]. Long-lasting insecticide treated bed nets (LLINs) and indoor residual spraying (IRS) as vector control interventions have made major contributions towards the recent gains \[[@CR3], [@CR4]\]. Despite these gains, malaria still remains a major public health problem in Africa as reported by stable or increasing incidence rates over the past few years in many African countries \[[@CR1]\]. Development of resistance to drugs \[[@CR5]\] and insecticides \[[@CR6], [@CR7]\] in the malaria parasites and vectors, respectively, and vector behavioural plasticity, such as outdoor feeding and resting \[[@CR8]\], threaten the efficacy of available interventions to reduce the malaria burden. The shortfalls of the current malaria interventions suggest a need for new strategies that can further reduce malaria transmission. Larval source management (LSM), which controls malaria vector populations through reduced suitability of mosquito larval habitats, is recognized as an effective supplementary tool for malaria control under specific conditions \[[@CR9], [@CR10]\]. As a complementary malaria control strategy, LSM could be ideal for situations where vector breeding sites are few, fixed and findable \[[@CR11]\]. Other factors cited for adoption of LSM as a complimentary tool include cost-effectiveness when compared with other tools \[[@CR12], [@CR13]\] and its ability to control vector populations that avoid contact with insecticide-based tools \[[@CR14]\]. Further, the microbial larvicides under advocacy for use in LSM have not, to date, been shown to cause any signs of resistance in vector populations or harmful effects on non-targeted organisms \[[@CR11]\]. In Kenya, the deployment of LSM as a complementary measure to communities already using LLINs was shown to significantly improve malaria control compared to the situation with LLINs used as a stand-alone method \[[@CR9]\].‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬ A number of other studies have reported similar results showing the contribution of LSM to malaria reduction in Africa \[[@CR12], [@CR15]--[@CR19]\]. In Malawi, like in many other African countries, LSM has not yet been introduced or evaluated for malaria control. This is due to a number of factors including a lack of data on local larval mosquito vector ecology \[[@CR20]\], lack of local evidence for LSM in malaria control, and concerns about the cost of implementation on a large scale. One potential method of managing implementation costs and intervention coverage is to closely involve communities in the application of LSM. This approach could enable adequate coverage of targeted areas through education and skills development of communities about LSM, reduce costs of implementation as human capital is locally available, and increase community acceptance and ownership \[[@CR21], [@CR22]\]. A review of case studies concludes that community participation is key to success of interventions \[[@CR23]\]. For instance, feasibility of community involvement in LSM has been demonstrated in urban settings in Dar es Salaam, Tanzania, where improved standards of larval surveillance were reported \[[@CR24]\]. Participation of communities in malaria control has not been emphasized in Malawi. Instead, community-based management of diseases in hard-to-reach villages has been implemented by government-employed Health Surveillance Assistants (HSAs). Therefore, there is lack of sufficient evidence in the country on whether community engagement in malaria control can increase coverage, acceptance and uptake of control interventions. A five-year community-led malaria control project, Majete Malaria Project (MMP), was implemented in southern Malawi to investigate the additive effect of community participation in malaria control through community workshops on malaria, structural house improvement and LSM on the strategies recommended in the national malaria control policy \[[@CR25], [@CR26]\]. The study could contribute to evidence for community engagement in malaria control in Malawi. The Majete Malaria Project (MMP) was a community-led malaria control project undertaken in villages along the perimeter of the Majete Wildlife Reserve in Chikwawa district in Southern Malawi \[[@CR25]\]. Local communities were involved in the development and implementation of the LSM activities as part of MMP \[[@CR26]\]. In this study, conducted 2 years after commencement of community involvement in the LSM activities, the factors influencing implementation and acceptability of LSM for malaria control were assessed using a community-driven approach. An understanding of these factors could inform the best practices for future development and deployment of community-based interventions. Methods {#Sec2} ======= Study area {#Sec3} ---------- Larval source management was implemented in 26 villages as part of MMP from May 2016 through April 2018 as part of a cluster randomized trial described in detail elsewhere \[[@CR25], [@CR26]\]. All 26 villages assigned the LSM arm of the randomized trial were included in the current study. All villages were located along the Majete Wildlife Reserve perimeter in Chikwawa district (16° 1′ S; 34° 47′ E), southern Malawi. Chikwawa is hot and dry from September to December, hot and rainy from January to April, and mild and dry from June to August. The district is generally dry with typical Savannah type of vegetation though agricultural land use is common in the landscape. The majority of people in the study villages keep livestock with cattle, goats and pigs being the predominant animals. Most of the households practice subsistence farming with maize, millet and beans as staple food. The study villages were divided into three sub-regions, called focal areas, spaced roughly evenly around the wildlife reserve and covering a total population of about 25,000 people in 65 villages (Fig. [1](#Fig1){ref-type="fig"}) \[[@CR27]\].Fig. 1Map of Majete Wildlife Reserve and Majete Perimeter showing the three focal areas Study population {#Sec4} ---------------- The study was undertaken with community members from the 26 villages spread across the three focal areas, assigned 'A', 'B' and 'C'. Three different groups of respondents were identified: (1) health animators (HAs), (2) LSM committee members, and (3) members from the broader community. The HAs and LSM committee members were selected to coordinate the local malaria control initiatives. Selection of these groups was led by was village heads in consultation with members of the community \[[@CR26]\]. The HAs and LSM committee members received formal joint training from MMP and The Hunger Project-Malawi (THP) staff on malaria topics, such as vector biology, parasite transmission, and vector control. After training, the HAs were tasked with organizing and conducting village workshops in their respective villages to share knowledge on the malaria topics. They were also responsible for fostering malaria discussions, facilitating community-based implementation of larval habitat draining and filling as part of community-based LSM and coordinating all malaria control activities at village level. The LSM committees were comprised of 10 to 12 individuals from the respective village selected by members of each village at community meetings. These LSM committees were formed to carry out LSM activities in each selected village, and they were tasked with quarterly mapping of potential mosquito larval habitats, lobbying for and coordinating community participation in larval habitat draining and filling, and *Bti* application. Community members were then tasked with larval habitat draining and filling. Data collection {#Sec5} --------------- Survey instruments comprised of focus group discussions (FGDs) and in-depth interviews (IDIs) that were developed based on points stemming from quantitative surveys conducted by the first author prior to the qualitative study. Prior to commencement of data collection, data collectors were trained and the data collection tools were piloted. This was done in order to acquaint the data collectors with the purpose of the study, interview guides and consent forms, and the consenting process, and data collection using voice recorders. Additional file [1](#MOESM1){ref-type="media"}: Table S1 and Additional file [2](#MOESM2){ref-type="media"}: Table S2 provide summaries of the interview guides. Questions for the different interview sessions included perception of malaria as a problem, its symptoms, mode of transmission, risk factors and control, and recommendations for effective community involvement in control initiatives. Questions related to the perception of malaria as a problem and knowledge about malaria transmission were restricted to IDIs and FGDs involving the general community. Twenty-four IDIs were conducted with members from the general community in the study villages. Selection of the IDI participants was based on overall village-level motivation and participation in the LSM activities. This was based on results of the quantitative surveys conducted a priori. To rank the villages, proportions of participants per village who indicated both motivation and participation in the activities were compared with the proportion of those who indicated no or little motivation and participation. Then the villages were divided into two groups: (1) Above average motivation and participation and (2) Below average motivation and participation. Twelve IDIs were conducted with participants from villages with above average motivation and participation, and the other twelve from the villages with below average motivation and participation. Nine mixed-village FGDs were undertaken with community members, HAs and LSM committee members drawn from different LSM villages. These did not include participants of the IDIs. Like in the IDI sessions, selection of villages from which participants would come was based on how each village ranked on the scale described for the IDIs. Thus, for each mixed-village FGD session the participants came from villages with above average motivation and participation and below average motivation and participation. The FGDs were conducted in each of the three focal areas, such that one FGD for each of the three target groups was conducted in each focal area. To stimulate discussion and ensure contribution of all members the number of participants in the FDGs was between six and eight. A Consolidated Criteria for Reporting Qualitative Studies (COREQ) highlighting details of methods such as the research team, study design, and analysis and findings has been provided (Additional file [3](#MOESM3){ref-type="media"}: Table S3). Data analysis {#Sec6} ------------- The IDIs and FGDs were conducted in the local language *Chichewa*. All data were audio-recorded, transcribed and translated into English. Data was analysed thematically. The first author familiarized himself with the whole data set and the last author coded four transcripts. A common coding framework was developed through discussion. A codebook was developed using inductive and deductive coding methods. The inductive approach allowed generation of new themes emerging from the data while the deductive approach was based on a pre-developed codebook, which guided the coding process. The translated excerpts were coded using NVivo 12 (QSL international, Victoria, Australia). The first and last author identified key themes. Ethical consideration {#Sec7} --------------------- The University of Malawi's College of Medicine Research and Ethics Committee granted ethical approval (COMREC protocol number P.12/17/2222). Permission to collect data in the study villages was provided by the Chikwawa District Heath Office (DHO). Prior to recruitment of participants, communication about the study was sent to the community through local village heads in liaison with HAs. Written informed consent was obtained from all participants during data collection. All the participants were men and women aged above 18 years. Literate participants provided a signature on the consent form and illiterate participants provided a thumbprint. Interviews were conducted in a private space, and participants were assured that their personal details would be omitted from transcripts and no personal details would be divulged to ensure confidentiality. Finally, participants were informed that their involvement in the research was voluntary and that withdrawal was permitted at any time and without personal consequence. Results {#Sec8} ======= Respondent characteristics {#Sec9} -------------------------- A total of 87 respondents participated in the 33 interview sessions: 24 IDIs and 9 FGDs (Table [1](#Tab1){ref-type="table"}). All the IDIs were conducted with the community members that were not HAs or LSM committee members. Three FGDs were conducted per focal area: one with community members; one with HAs; and one with LSM committee members. Most of the participants were in the age group 18 to 24 (71.3%) and reported primary education as their highest level of formal education (51.7%). More males (57.5%) than females (42.5%) participated in the interviews.Table 1Characteristics of study participantsCharacteristicFocal Area (n)Respondents \[N, (%)\]Focal area A (30)Focal area B (26)Focal area C (31)Sex Female11131337 (42.5) Male19131850 (57.5)Age 18--24711523 (26.4) 25--4423152462 (71.3) ≥ 4522 (2.3)Education None168226 (29.9) Primary10112445 (51.7) Secondary47415 (17.2) Tertiary11 (1.2)Session FGD3339 (27.3) IDI88824 (72.7) The study results were grouped into five main themes drawn through the inductive and deductive methods (Table [2](#Tab2){ref-type="table"}). Theme 1 covered topics that were only asked to the participants from the general community and not to the other groups (HAs and LSM committee members).Table 2Main themes drawn from the qualitative studyThemeCommunity perception of malaria as a health problemCommunity knowledge about malaria transmissionCommunity trust, support and acceptance of microbial larvicidingCommunity participation in LSM: enabling and hindering factorsRecommendations for scale-up and future community-led LSM Community perception of malaria as a problem {#Sec10} -------------------------------------------- Results of the present study showed widespread perception of malaria as a health problem among members from the broader community. Unlike the HAs and LSM committee members, the broader community received minimal formal training on the malaria topic. Much of their knowledge came from their interactions with the HAs and LSM committee members who received tailored training from the larger project, MMP. The community members mentioned that their own malaria related illness, and/or illness of those close to them, reduced their performance of income generating activities and increased financial expenses via treatment and treatment-seeking activities."*"When one suffers from malaria they need money to access treatment while at the same time all economic activities that would be undertaken to improve their livelihood are halted"* (IDI, Community participant, Kandeu 2)""*"I find malaria to be particularly burdensome because it is very hard to find medicines at the local health centres hence we are forced to buy from pharmacies at higher prices"* (IDI, Community participant, Kabwatika)" Although malaria was identified as a problem that affects everyone, most participants reported that pregnant women and children are most vulnerable to the disease."*"Much as everyone is at risk of malaria, young children and pregnant women are the most vulnerable"* (IDI, Community participant, Kampaundi)." Knowledge of malaria transmission {#Sec11} --------------------------------- There was widespread knowledge among all respondents about the mode of transmission of malaria parasites and the type of environment conducive for breeding and development of mosquitoes. Almost all respondents reiterated that bites from infected mosquitoes drive malaria transmission. Interestingly, a member from the community was even able to mention the sex and genus of the mosquito responsible for the transmission of malaria."*"When a female Anopheles mosquito bites a person with malaria and then another person without the disease, the malaria parasite is transmitted to the latter"* (IDI, Community participant, Chipula)." When asked where mosquito larvae could be found, participants provided varying responses. Some participants identified natural and human-made sites and objects as potential larval habitats. Particular mention was made on the duration of water storage, the nature of the water (stagnant, dirty or clean), including the container or vessel and the contents in it, as factors that contribute to where mosquito larvae are most likely to be found. The term "dirty water" was in these cases synonymous with foul water."*"Mosquitoes breed in standing water or in water that has been stored or has not been used for a long time"* (FGD, LSM Committee, FA-B)""*"There are some mosquito breeding sites which are natural such as streambeds while many are man*-*made"* (FGD, HA, FA-A)""*"Anopheline larvae are found only in clean water while Culicine larvae are found in dirty water"* (FGD, HA, FA-A)" Most participants implicated human activities with creation of the potential mosquito larval habitats. The responses provided were categorized based on purpose: (1) domestic: washing and drinking, (2) agriculture: irrigation, fish farming and watering points for livestock, (3) and construction: brick-making and mud. Brick-making purposes were the most mentioned reason for creation of larval habitat sites. However, the issue of eliminating these water bodies revealed community perspectives on conflicts between economic activities and malaria control. As one community member said,"*"These larval habitats came into existence due to development activities being conducted in our communities such as school building initiatives which demand us to make bricks. We are caught in a situation where one development activity affects another" (*IDI, Community participant, Mkangeni)" An LSM committee member who was responsible for carrying out larviciding activities supported this opinion."*"Much as we know that these are the very places where mosquitoes driving malaria transmission breed, some of these places are very important to us as we use them to irrigate crops, drinking points for our livestock and also to soak bamboos for making traditional mats"* (FGD, LSM committee, FA-A)." Despite the perceived conflict between community developments and malaria control, participants displayed an understanding of the role of these places as refuge for immature stages of mosquitoes. This enabled some of the participants to suggest solutions for malaria control."*"Mosquitoes breed in standing water bodies which are readily available in our villages. Removing these potential breeding sites is the only sure way forward''* (IDI, Community participant, Jana)""*"If we are not careful, discharging water anyhow into these swamps creates suitable environments for mosquito proliferation, a thing which can increase malaria prevalence in the area"* (FGD, LSM committee, FAC)." Community trust, support and acceptance of microbial larviciding {#Sec12} ---------------------------------------------------------------- Most of the participants agreed on the effectiveness of *Bti* for mosquito control. However, it was observed that some community members did not want to work with the larvicide for fear of a health risk for themselves or their livestock, especially at the onset of the project. Lack of evidence of the product's activity and safety was the major reason for the skepticism and lack of trust in the product by the community. A community member highlights this perception:"*"I do not really know how Bti works but I think it can cause cancer. Because no livestock has died due to the larvicide does not mean I should not be concerned"* (IDI, Community participant, Mkangeni)" Additionally, some participants were initially sceptical about the product, because LSM committee members used mouth masks during application of *Bti*."*"The use of masks by members of LSM committees during Bti application made some people suspicious of the product"* (FGD, HA, FA-A)" The initial concerns were on the safety of livestock, crops and human life, but as time passed the community members could see that *Bti* did not have harmful effects on their crops, livestock and their personal health. Increased engagement with LSM committees and HAs increased community trust, support and acceptance of the larvicide."*"Initially we had a lot of fears about Bti as we thought it would be harmful to those using treated water sources but we have neither seen nor heard of any harm due to the larvicide. We are beyond convinced that this product only kills mosquito larvae"* (IDI, Community participant, Kampaundi).""*"We did not allow LSM committees to apply Bti in water bodies, especially those used for irrigations purposes because we had fears the larvicide would cause damage. Now we have realized that our fears were unfounded. We are very willing and ready to have the habitats sprayed with the product"* (FGD, Community members, FA-C)" In some cases, field-based workshops were held with the community where *Bti* was actually applied on habitats infested with mosquito larvae. At these sites the activity of *Bti* on the larvae and other aquatic organisms was co-investigated with the community members."*"When the intervention just started, people had concerns about harmful effects of Bti on crops, livestock and people. To prove to them that the larvicide was very safe we conducted sensitization meetings in our communities. The communities are now aware that spraying Bti does not introduce any risks to crops, humans and livestock"* (FGD, LSM committee, FA-C)" The LSM committees believed that it was only those people who did not attend community workshops who had negative concerns about the product."*"The people who complained were those who never attended village workshops so they did not know the benefits of Bti. Once they come to understand they will never protest again"* (FGD, LSM Committee, FA-B)" Factors enabling participation in LSM activities {#Sec13} ------------------------------------------------ Under this theme factors that motivated community participants in carrying out LSM activities were explored. Enabling factors included involvement of local leaders in the initiative and the knowledge gained through workshops about malaria control and implementing control measures. Most LSM committee members felt that the knowledge they attained about mosquito larval control made them aware of their role in the fight against malaria."*"We have gained a lot of knowledge about the malaria topic from the numerous trainings we have gone through. This knowledge motivates us to participate in the malaria control activities"* (FGD, LSM Committee, FA-B)""*"Our village heads contribute to the cause by organizing community meetings where they encourage us to actively participate in the LSM activities"* (FGD, Community members, FA-B)." The community members perceived a visible decline in malaria cases in their communities, which they attributed to their work. They indicated that such achievements encouraged them to work towards more reductions in the malaria burden. They also cited problems faced to access treatment for malaria as a factor driving their actions towards malaria control."*"We have had the worst experiences with malaria. We live very far from health facilities hence have problems to access health care services. This initiative is our lifeline hence our great zeal to participate"* (IDI, Community participant, Kampaundi)""*"I am motivated to participate in the activities because our community has been very disadvantaged in terms of access to health care services. We live very far from the nearest health facility, which is also a paying facility. I fully understand the challenges faced to access medical help at the facility. So when we were told about what we are supposed to do to reduce the malaria burden I decided to participate"* (IDI, Community participant, Kandeu 2)" There was a general feeling among the community members that HAs and LSM committee members were more motivated to participate in the LSM activities than the rest of the community. However, the community members expressed mixed sentiments as to why HAs and LSM committees seemed more motivated to participate in the activities. Some community members felt that the knowledge the two groups gained during the course of their duties enticed them to participate in the control initiative. Another section of the community felt that the money given to the two groups by MMP to meet logistical requirements for trainings outside their focal areas incentivised them."*"These people work hard because they understand that the intervention would be beneficial to their communities"* (IDI, Community participant, Kandeu 2)""*"LSM committee members work hard because they are taken to trainings where they are given money. If there were no such incentives none of them would be as active"* (IDI, Community participant, Kampaundi IDI)" Factors hindering participation in LSM activities {#Sec14} ------------------------------------------------- When asked what they felt were the limiting factors for community implementation of the LSM activities, the respondents cited a number of issues. One of the major factors cited by LSM committee members was the high amount of labour and time required to carry out *Bti* application activities. Weekly applications of *Bti* were necessary for optimum effectiveness of the *Bti* because of its short residual activity. However, LSM committee members reported that much of their time was spent carrying out the LSM activities, which reduced their time to participate in income generating activities for their households."*"The work is too laborious. We do Bti pre*- *and post*-*spray surveys every week, and we spray Bti after every seven days. This means we spend much of our time working in LSM at the expense of our families' well*-*being"* (FGD, LSM Committee, FA-C)" They also mentioned the long walking distances to the sites where they applied *Bti* and the continued creation of potential mosquito larval habitats."*"The major problem is distance, when we go to spray Bti, we travel long distances because some water bodies are very far. Sometimes we plan to spray more breeding sites per day but fail to realize the plan because we have to travel long distances hence end up spraying in very few. This makes us work for more days than expected"* (FGD, LSM Committee, FA-C)""*"This work is very tiresome as we are required to continuously fill and drain, and spray Bti every week in the potential mosquito breeding sites. From the look of things we will continue to create these sites as we do not have alternatives to bricks \[the excavation of which creates breeding sites\]"* (FGD, LSM committee, FA-A)" Some respondents indicated that provision of no monetary incentives was a major factor influencing lack of participation in the activities. While this feeling was widespread, it was not true for some villages."*"Some members are discouraged because they want outright benefits. Of course, in my area there have never been such cases, but I know this happens in other villages"* (FGD, LSM Committee, FA-C)" Lack of gumboots as protection from water-borne infections, for example to protect against schistosomiasis, for each committee member was the most cited challenge. While acknowledging the provision of several pairs of gumboots by the project, they noted that these were not sufficient for all committee members. They also indicated their reluctance to share boots due to risk of contracting foot-borne fungal infections."*"We do not have enough gumboots for all members of the committee. We were told to be sharing the few we have but we cannot do that for fear of athlete's foot*" (FGD, LSM committee, FA-A)" Some LSM committee members cited the indifference of some community members towards LSM as a demotivating factor. Respondents noted that some community members did not attach value to the work of committee members and demeaned their volunteerism. This indifference left some LSM committee members frustrated, and in some cases led to dropping out from the committees."*"We are often discouraged by poor remarks from some members of the community despising our volunteerism"* (FGD, LSM committee, FA-B)""*"We are called stupid and time wasters by some community members for volunteering to work in this project"* (FGD, HA, FA-C)" Recommendations for scale-up and future community-led LSM {#Sec15} --------------------------------------------------------- There was a widespread perception among the respondents that village heads were not fully involved in the on-going LSM activities. The respondents suggested that for increased community participation in the activities the village heads needed to receive training and be tasked with specific roles. Some participants recommended that for future or for scale-up of existing community-led initiatives, groups comprised of village heads should be created to monitor the activities locally."*"A team of village heads should be instituted which should be tasked with monitoring LSM activities at village level. They should receive the same training as LSM committees. These people are highly respected by communities, which could ensure high community participation in the LSM activities. This team should be constantly updated by HAs and LSM committees"* (FGD, HA, FA-C)." Some participants also recommended restructuring LSM committees by removing non-active members to improve group performance, adding more members to existing committees to reduce member work-load, or by making the selected committees work for a fixed period after which new committees take over."*"I think the LSM committees are burdened by the too large amount of work they are doing. It would be a better idea to bring in more people into the committees so the committee can do more sensitization meetings and cover more habitats"* (FGD, Community members, FA-C)""*"I think LSM committees should work for a maximum of one year and a new one be selected. Currently, some members have lost interest in the activities hence need to keep replacing them with new members willing to take over"* (IDI, Community participant, Mkangeni)" The participants also recommended need for constant feedback on how the intervention is progressing. They felt this could encourage their participation in the activities."*"The community should be given feedback on how the intervention is performing. This could motivate them*" (FGD, HA, FA-A)" Lastly, continued community sensitization was reported to be paramount if buying-in and participation in the LSM activities were to be successful."*"There is need for continued sensitization meetings. It is through repeated messages that some people change their attitude"* (FGD, HA, FA-A)" Discussion {#Sec16} ========== Findings of the present study show that community involvement in LSM increased awareness of malaria as a health problem, its risk factors and control strategies. Lack of incentives as observed in other research paradigms in Malawi \[[@CR28]\] reduced participation of members from the broader community in the activities. Support from community leaders was a critical factor for community participation in the activities. Labour intensiveness, the time-demanding nature of the activities, and fears about health risks associated with working in water bodies, created barriers to successful implementation of the intervention by the LSM committees. These results suggest that a wide range of factors must be considered for optimum effectiveness of community-driven malaria interventions. Participants in the present study perceived malaria as a health problem prevalent in their communities and recognized children and pregnant women as groups most vulnerable to the disease. Participants were aware of the role of mosquitoes in transmitting the malaria parasite and had knowledge of potential mosquito larval habitats. This knowledge is attributable to the malaria workshops conducted by the HAs in each village. Previous studies have suggested that community awareness of malaria as a burden has the potential to trigger positive action towards malaria control \[[@CR29], [@CR30]\]. ‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬At the time of the present study, the results of the intervention trial \[[@CR25]\] were not yet available, and hence in the preparatory meetings with communities, as well as during the refresher courses for Health Animators and local leaders, participants were reminded of the possible outcomes: no impact on malaria, medium impact on malaria or strong impact on malaria. Local communities needed to be encouraged to continue with the interventions which in the end might benefit them. In this study, the communities understood the association between mosquito larval habitats and malaria. However, some water bodies served a specific function in the community and were deemed useful by the respondents. This presents potential limitations in the adoption of habitat draining and filling for malaria control. Similar observations were made in Kenya where perceived importance by the community of some water bodies limited their willingness to remove such sites \[[@CR31]\]. Where habitat draining and filling are not feasible, application of larvicides is a viable alternative \[[@CR9]\], and this was widely practiced by the communities in this study. ‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬The use of other LSM strategies such as predatory fish or shading of the breeding sites with plants such as Napier grass or coco-yams to make such sites less suitable for malaria vector mosquitoes has also been suggested \[[@CR32]\]. Community perception of *Bti* as a mosquito control tool improved with increased engagements with HAs and LSM committees, and interaction with the product. Initially, the communities reported skepticism about the product over potential harmful effects to humans, livestock and crops. The lack of a befitting synonym for the word "pesticide" when referring to *Bti* in the participants' vernacular, *Chichewa*, confounded their fears of the product. In *Chichewa*, the word "pesticide" is loosely interpreted as "poison" which denotes an inherent element of side effects. Through community workshops and handling of the product in the field, the community learned about the product's activity and specificity, which resulted in improved acceptance of the product by the community. Similar observations were made in Rwanda where acceptance of *Bti* was observed to improve with increased interaction with the product by rice farmers tasked with its application \[[@CR33]\]. The findings suggest that for meaningful acceptance of control strategies, community training should focus on approaches that build trust by demonstrating the safety of the products to non-target organisms. The HAs and LSM committees were more motivated to participate in the LSM activities than the members from the community at large. According to the HAs and LSM committees, attainment of knowledge of malaria and its control, and their sense of 'duty' motivated their participation in the LSM activities. For the both groups, the status received in the community for their role made them feel valued and motivated. However, some members from the broader community felt that the motivation of the HAs and LSM committees was a result of the "monetary incentives" they received during their trainings. This could be justified by the frequent calls made by the LSM committees for refresher trainings. This could potentially pose a barrier in community participation in the intervention as observed in another study conducted in Malawi where receipt of incentives by some groups demotivated other groups \[[@CR34]\]. Similarly, in a sub-study conducted under MMP in the same area as the current study "monetary incentives'' received by the HAs during their trainings were feared to have weakened the sustainability of the health animator approach \[[@CR35]\]. Indeed, the forms and modes of delivery of incentives in volunteer-based initiatives are critical but they remain less studied \[[@CR36]\]. In Kenya, adaptation of a malaria control intervention (odour-baited mosquito traps) to local context by providing a source of solar energy to householders increased community acceptance and uptake of the intervention \[[@CR37]\]. Based on these findings, incentives have a role in influencing acceptability, uptake and sustainability of community-led interventions. To increase interest of a community and motivation to participate, the intervention agenda should be developed in light of the local contexts, with enhanced attention for the community's needs. Participants considered LSM activities to be labour intensive and time consuming, especially larviciding with *Bti*, which required weekly application. Some LSM committee members felt that the demands of the activities prevented them from actively engaging in income generating activities for the betterment of their livelihoods. The findings underscore the need to incorporate technical solutions that increase intervention coverage and quality while reducing labour demands. These technical solutions include powered sprayers, drones, and remote-sensing based risk maps \[[@CR38], [@CR39]\]. In the present study, it was evident that local leadership was needed for effective implementation of the community-led LSM activities. A hierarchical structure with village heads, HAs and LSM committees as leaders was regarded as supportive by most of the respondents. This finding suggests that local authorities should not be engaged for administrative purposes only but also in both planning and implementation of community-led initiatives. The findings also suggest that the village heads should work closely with LSM committees and HAs, with the latter groups only addressing the operational aspects and not the village politics such as calling for community workshops. Importantly, interventions should capitalize on the existing traditional structures present in each community. Rural communities have strong social structures resulting from their communal living \[[@CR31]\] which, if exploited, could make community engagements attainable. The variable participation of members from the broader community reported in the present study likely resulted in lower coverage of LSM than was targeted. Though not measureable in the absence of intervention because the FGDs did not include an external control group, the community's high level of knowledge about malaria as a health problem and its transmission is presumably due to the educational intervention of MMP. This suggests that the conception and design of the intervention were effective. Conclusions {#Sec17} =========== Community involvement in LSM as an additional tool for malaria control increased local awareness of malaria as a health problem, its risk factors and control strategies. However, community participation varied among the respondent groups, with labour and time demands of the activities, and lack of financial incentives, among the reasons cited for reducing participation. Employing innovative tools with potential to reduce labour and time demands could improve community participation in the activities. Further studies are required to investigate the forms and modes of delivery of incentives in operational community-driven LSM interventions. Supplementary information ========================= {#Sec18} **Additional file 1: Table S1.** Interview guide (FGD) for Community members, HAs and LSM committees. **Additional file 2: Table S2.** Interview guide (IDI) for Community members. **Additional file 3: Table S3.** A *COREQ* checklist highlighting details of methods. **Publisher\'s Note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary information ========================= **Supplementary information** accompanies this paper at 10.1186/s12936-020-03268-8. We thank all the research assistants for their support in data collection. Davies Kazembe, Happy Chongwe, Asante Kadama, Richard Nkhata and Tinashe Tizifa are thanked for logistical support. We also thank the study population for their willingness to participate in the study. SG, RSM, WT, HB and LTM conceived the study design. SG collected the data. SG, LMT and HB contributed in the data analysis. SG, RSM, CJMK, WT, HB and LMT participated in interpretation of the results. SG drafted the manuscript. All authors read and approved the final manuscript. De Vos Fund, The Netherlands, generously supported the study. We also thank the Dioraphte foundation for some financial support. RSM received additional support from an NIH-funded postdoctoral fellowship (T32AI007524). The content is solely the responsibility of the authors and does not necessarily represent the official views of the funders. Data can be made available upon reasonable request. The study was approved by the University of Malawi's College of Medicine Research and Ethics Committee (COMREC) under certificate number P.12/17/2222. Written informed consent was obtained from all participants during data collection. Not applicable. The authors declare that they have no competing interests.
set(mylist alpha bravo charlie) list(TRANSFORM mylist PREPEND delta one_too_many)
/* ************************************************************************ * Copyright 2016-2020 Advanced Micro Devices, Inc. * ************************************************************************ */ #include "rocblas_spr.hpp" #include "logging.hpp" #include "utility.hpp" namespace { template <typename> constexpr char rocblas_spr_name[] = "unknown"; template <> constexpr char rocblas_spr_name<float>[] = "rocblas_sspr"; template <> constexpr char rocblas_spr_name<double>[] = "rocblas_dspr"; template <> constexpr char rocblas_spr_name<rocblas_float_complex>[] = "rocblas_cspr"; template <> constexpr char rocblas_spr_name<rocblas_double_complex>[] = "rocblas_zspr"; template <typename T> rocblas_status rocblas_spr_impl(rocblas_handle handle, rocblas_fill uplo, rocblas_int n, const T* alpha, const T* x, rocblas_int incx, T* AP) { if(!handle) return rocblas_status_invalid_handle; RETURN_ZERO_DEVICE_MEMORY_SIZE_IF_QUERIED(handle); auto layer_mode = handle->layer_mode; if(layer_mode & (rocblas_layer_mode_log_trace | rocblas_layer_mode_log_bench | rocblas_layer_mode_log_profile)) { auto uplo_letter = rocblas_fill_letter(uplo); if(handle->pointer_mode == rocblas_pointer_mode_host) { if(layer_mode & rocblas_layer_mode_log_trace) log_trace(handle, rocblas_spr_name<T>, uplo, n, log_trace_scalar_value(alpha), x, incx, AP); if(layer_mode & rocblas_layer_mode_log_bench) log_bench(handle, "./rocblas-bench -f spr -r", rocblas_precision_string<T>, "--uplo", uplo_letter, "-n", n, LOG_BENCH_SCALAR_VALUE(alpha), "--incx", incx); } else { if(layer_mode & rocblas_layer_mode_log_trace) log_trace(handle, rocblas_spr_name<T>, uplo, n, log_trace_scalar_value(alpha), x, incx, AP); } if(layer_mode & rocblas_layer_mode_log_profile) log_profile(handle, rocblas_spr_name<T>, "uplo", uplo_letter, "N", n, "incx", incx); } if(uplo != rocblas_fill_lower && uplo != rocblas_fill_upper) return rocblas_status_invalid_value; if(n < 0 || !incx) return rocblas_status_invalid_size; if(!n) return rocblas_status_success; if(!x || !AP || !alpha) return rocblas_status_invalid_pointer; static constexpr rocblas_int offset_x = 0, offset_A = 0, batch_count = 1; static constexpr rocblas_stride stride_x = 0, stride_A = 0; return rocblas_spr_template(handle, uplo, n, alpha, x, offset_x, incx, stride_x, AP, offset_A, stride_A, batch_count); } } /* * =========================================================================== * C wrapper * =========================================================================== */ extern "C" { rocblas_status rocblas_sspr(rocblas_handle handle, rocblas_fill uplo, rocblas_int n, const float* alpha, const float* x, rocblas_int incx, float* AP) try { return rocblas_spr_impl(handle, uplo, n, alpha, x, incx, AP); } catch(...) { return exception_to_rocblas_status(); } rocblas_status rocblas_dspr(rocblas_handle handle, rocblas_fill uplo, rocblas_int n, const double* alpha, const double* x, rocblas_int incx, double* AP) try { return rocblas_spr_impl(handle, uplo, n, alpha, x, incx, AP); } catch(...) { return exception_to_rocblas_status(); } rocblas_status rocblas_cspr(rocblas_handle handle, rocblas_fill uplo, rocblas_int n, const rocblas_float_complex* alpha, const rocblas_float_complex* x, rocblas_int incx, rocblas_float_complex* AP) try { return rocblas_spr_impl(handle, uplo, n, alpha, x, incx, AP); } catch(...) { return exception_to_rocblas_status(); } rocblas_status rocblas_zspr(rocblas_handle handle, rocblas_fill uplo, rocblas_int n, const rocblas_double_complex* alpha, const rocblas_double_complex* x, rocblas_int incx, rocblas_double_complex* AP) try { return rocblas_spr_impl(handle, uplo, n, alpha, x, incx, AP); } catch(...) { return exception_to_rocblas_status(); } } // extern "C"
1. Field of the Invention The present invention relates to a fluid pump suitable for moving a fluid, such as air or liquid. 2. Description of the Related Art A piezoelectric pump of the related art is disclosed in International Publication No. 2008/069264. FIGS. 1A-1E illustrate a pumping operation of the piezoelectric pump disclosed in International Publication No. 2008/069264 in a third-order resonance mode. The piezoelectric pump includes a pump body 10, a diaphragm 20 having an outer peripheral portion thereof fixed to the pump body 10, a piezoelectric element 23 attached to the central portion of the diaphragm 20, a first opening 11 formed in the pump body 10 that faces a portion at or near the central portion of the diaphragm 20, and a second opening 12 formed in an intermediate area between the central portion and an outer peripheral portion of the diaphragm 20 or formed in the pump body 10 that faces this intermediate area. The diaphragm 20 is made of a metal plate, and the piezoelectric element 23 has a size such that the first opening 11 is covered but it does not to reach the second opening 12. A voltage having a predetermined frequency is applied to the piezoelectric element 23 so as to cause a portion of the diaphragm 20 that faces the first opening 11 and a portion of the diaphragm 20 that faces the second opening 12 to bend and deform in directions opposite to each other. As a result, a fluid is sucked into one of the first opening 11 and the second opening 12, and is discharged from the other one of the second opening 12 and the first opening 11. A piezoelectric pump, such as that shown in FIGS. 1A-1E, has a simple structure so that it can be formed as a thin pump. Accordingly, the piezoelectric pump is used as, for example, an air transport pump in a fuel cell system. However, electronic devices into which such a piezoelectric pump is integrated are becoming smaller, and accordingly, it is also desirable to reduce the size of a piezoelectric pump without decreasing the capabilities (flow rate and pressure) of the pump. Moreover, in accordance with a reduced power supply voltage of an electronic device into which a piezoelectric pump is integrated, it is desirable to reduce a drive voltage. As the size of a piezoelectric pump or the drive voltage decreases, capabilities (flow rate and pressure) of the pump are decreased. Accordingly, when using a piezoelectric pump having a structure of the related art, there are limitations on reducing the size of the piezoelectric pump while maintaining capabilities of the pump and on enhancing capabilities of the pump without increasing the size of the piezoelectric pump. In a fluid pump provided with a diaphragm of the related art, an increase in the size of the diaphragm is effective for increasing the flow rate. This, however, causes not only an increase in the size of the entire fluid pump, but also an increase in the generation of audible sound because of a low operating frequency.
“When the crowd reached Mahavir Chowk, things went out of control. MP Sanjeev Balyan came there with 20-25 vehicles full of people. He called police officials and told them something after which the police started pelting stones and bricks on the protestors and lathi-charge started,” Aleem Siddiqui, who lives near Ahilyabai Chowk (formerly Sarwat chowk/District hospital chowk) tells me. Eyewitnesses at Mahavir Chowk, the shopkeepers who were present at the spot that day, contradict Siddiqui. “We saw the whole episode in live telecast. Why would the police pelt stones? The road was barricaded and the police was blocking the rioters from going ahead. Someone from the crowd threw a stone at the police but they didn’t react. Then MP Balyan’s cavalcade stopped at the Chowk. Mantri ji ko dekhte he pata nahi kya josh sa aaya inme, pattharabazi shuru kardi. (Don’t know what got into them on seeing Balyan, they started pelting stones). Then police used force and chased them back,” says Nakul Dhaniya who has a stationary shop at Mahavir Chowk and saw the events unfold last Friday. Rajat Chugh’s sweets shop is right at the corner on the chowk, at the exact spot where the crowd had gathered and was jostling with the cops to break the barricade. He says the police started lathicharge only after the mob got violent and started stone pelting. “We had downed the shutters of our shop but were standing right outside. The mob of rioters was saying ‘bus adda chalo, bus adda chalo’. I think their plan was to reach Bus Station and burn state transport buses there,” Chugh tells me. “Traders from the Aggarwal market also gathered in large numbers on the chowk as the mob of rioters was pelting stones on their shops. They were joined in by general public too. Initially, the police force was small so the general people helped the officials by standing with them against the violent crowd. They were soon joined by security personnel from other areas and the general public then moved away,” he adds. Public came out in support of the police forces at kacche wali sadak also and saved a police picket from being set on fire. There were only four policemen there including one woman constable. “I saw six police vehicles coming from Madina chowk and a mob of hundreds of rioters chasing them. Window panes of police vehicles were broken. Cops were bleeding. They had gone there to stop the crowd from marching towards Shiv Chowk. The mob had petrol bombs and they would’ve set the picket on fire had the general public not gathered here in large numbers,” Ayush Garg whose stationary shop is right next to the Kevalpuri Police chowki tells me. Garg says that Hindu residents of a nearby colony didn’t let the mob go ahead and saved the cops from getting lynched. The police station sort of separates the Muslim areas from Hindu colonies. There was stone pelting from both sides for almost half an hour. Only after the RAF personnel came, the crowds from both sides dispersed.
Continuous assays for DNA translocation using fluorescent triplex dissociation: application to type I restriction endonucleases. Fluorescent assays and accompanying kinetic models are described for the analysis of DNA translocation independent of duplex unwinding. A triplex binding site (TBS) was introduced into DNA substrates at precise loci downstream of recognition sequences for type IA, IB and IC restriction endonucleases (EcoKI, EcoAI and EcoR124I, respectively). Each endonuclease was incubated (without ATP) with substrates on which a hexachlorofluoroscein-labelled triplex-forming oligonucleotide (HEX-TFO) was pre-bound. Following addition of ATP, 1-D enzyme motion resulted in collision with, and displacement of, the HEX-TFO, producing a >twofold increase in fluorescent intensity. Alternatively, a decrease in anisotropy following displacement of a rhodamine-labelled TFO was monitored. Using rapid mixing in a stopped-flow fluorimeter, continuous kinetic profiles were produced in which displacement is preceded by a lag-phase, directly proportional to the distance moved. For each enzyme, we obtained not only the translocation rate but also information on slow isomerisation step(s) at initiation. Furthermore, we demonstrated that enzymes deficient in DNA cleavage but with maximal ATPase activity showed initiation and translocation rates identical to wild-type, confirming that DNA strand breaks are not a pre-requisite of motion.
It has long been said, “Justice delayed is justice denied.” Yesterday, thanks to a decision issued from a federal judge in Texas, justice has again been denied to the most vulnerable among us – the unborn. In the case titled Planned Parenthood of Greater Texas Family Planning v. Smith, Judge Sam Sparks for the United States District Court for the Western District of Texas issued a decision blocking Texas state health officials from denying taxpayer funding through Medicaid to Planned Parenthood – the largest abortion business in America. Last December, Texas state officials announced a final notice of intention to cut Medicaid funding given to Planned Parenthood. The decision to cut Planned Parenthood’s funding in Texas was first made in 2015, after the Center for Medical Progress released a series of undercover videos revealing the abhorrent practices and policies of Planned Parenthood’s handling of aborted fetal tissue. The ACLJ continues to represent a former board member of the Center for Medical Progress in multiple lawsuits brought against them by the abortion industry. In response to Texas’s decision to defund the abortion giant, Planned Parenthood sued. Astonishingly, Judge Sparks dismissed the abhorrent evidence uncovered by the Center for Medical Progress – and the basis for the state’s decision to revoke funding – writing: A secretly recorded video, fake names, a grand jury indictment, congressional investigations – these are the building blocks of a best-selling novel rather than a case concerning the interplay of federal and state authority through the Medicaid program. Yet, rather than a villain plotting to take over the world, the subject of this case is the State of Texas’s efforts to expel a group of healthcare providers from a social healthcare program for families and individuals with limited resources. The issue before the court was whether Planned Parenthood could be granted a preliminary injunction blocking Texas’s decision to withhold taxpayer funding from the abortion industry – essentially, whether Planned Parenthood could offer enough evidence at this preliminary stage to show that they would likely succeed in the case as a whole. That injunction now temporarily stops Texas at this preliminary stage from proceeding with their efforts to take away Planned Parenthood’s funding. The court agreed with Planned Parenthood, determining that “because the Individual Plaintiffs in this case would be deprived of their legal right to the qualified healthcare provider of their choice,” unless the preliminary injunction is granted, the plaintiffs would “suffer an irreparable injury.” In short, the Court finds the Inspector General did not have any factual support to conclude the bases of termination set forth in the Final Notice merited finding the Plaintiff Providers were not qualified. Rather, in light of the current record, it appears the termination decision had nothing to do with the Provider Plaintiffs’ qualifications. As a result, the Court finds the Individual Plaintiffs met their burden of proof showing a substantial likelihood of success on the merits of their claim . . . . These claims become even more spurious once one realizes that Federal Qualified Health Centers are both more numerous and provide more health care services for women and children than Planned Parenthood. In response to the news of the ruling, Texas Attorney General Ken Paxton stated that the state would appeal the judge’s order, noting that “[n]o taxpayer in Texas should have to subsidize this repugnant and illegal conduct.” The ACLJ will continue to follow this case and the appeal of this disappointing order, as our pro-life legal team prepares to file an amicus brief supporting the State of Texas. Additionally, much is being done in the fight for life right now, here at the ACLJ and elsewhere, including in the United States Congress and by President Trump and his Administration. The time to defund this pro-death organization is now, and further delays only serve to further deny justice for the unborn, the vulnerable women caught in Planned Parenthood’s snare, and the American taxpayer.
Creighton skips her rink to perfection in OCAA The Karen Creighton rink from Mohawk College won three more games Saturday (Feb. 19) and is now 6-0 after day two of the Ontario Colleges Athletic Association curling championships in Lindsay. Mohawk won the women’s title last year. Mohawk scored wins over Algoma, Fanshawe and Niagara to stay perfect. The Mohawk men, skipped by Matt Kimber had a rough day, losing to Confederation, Fanshawe and Niagara to fall to 1-4 after taking on the tougher teams to this point. But with three more games Sunday could still get the rink a tiebreaker by winning each match. However, Miranda Keenan’s mixed rink will not be moving on. They are now 0-6 after losing to Fanshawe, Sault College and Seneca Saturday. The mixed division is extremely strong with some colleges electing to play only in that group.
Plans for 160 apartments on Pomona Island - one of Greater Manchester’s ‘hidden gems’ - have been put forward Two blocks - 10 and 11 storeys high - could be built between Hulme Hall Road and the Manchester Ship and Bridgewater canals to the east of the island. The wasteland, which is more than a kilometre in length, was once a bustling dockland, but has lain dormant for decades. The ‘forgotten island’ straddles Salford, Trafford and Manchester. Pomona Island is created by the River Irwell and Manchester Ship Canal to the north and the Bridgewater Canal to the south. Contractor Rowlinson and developer Peel want to build 164 flats next to the rail viaduct at the St George’s end of the island for the ‘Pomona Wharf’ scheme. There will also be car parking, concierge, landscaping work, a gym, cycle storage and a ‘green’ roof with solar panels. The flats, designed by Oldham-based Nicol Thomas, will face the Manchester Ship Canal and will be accessed via a railway arch off Hulme Hall Road. It’s understood Peel will sell the brownfield site to Rowlinson if planning permission is granted by town hall chiefs in Trafford. The island begins in Castlefield and ends near Manchester United’s Old Trafford ground, acting as a link between Manchester city centre and Salford Quays. Hulme Hall once stood at the city centre side of the island, but was knocked down in 1845. The set of five docks were filled in once commercial activity ceased. The patch of land has seen little development, unlike nearby Salford Quays. During the industrial revolution, the land was home to botanical gardens and the Royal Pomona Palace. Known originally as Cornbrook Strawberry Gardens, it was later renamed after Pomona, the Roman goddess of fruit trees. In the 1880s, the site was surrounded by factories. In 1887 a nearby chemicals plant exploded, damaging the palace and gardens which later closed. The swinging roadbridge separating Salford Quays from Pomona Docks is now permanently closed. The Pomona Wharf project would dovetail with the Cornbrook masterplan. The scheme, to transform the area around Cornbrook tram stop, could see a new hotel and hundreds of flats built. Peel and council bosses want to see it regenerated in a similar way to nearby St George’s.
Q: WebKitFormBoundary uploading a file to S3 using axios FormData I am trying to upload files to S3, files are successfully uploaded and but when downloaded it contains WebKitFormBoundary ------WebKitFormBoundaryrTBzWaHQntWAtZLX Content-Disposition: form-data; name="file" hello world ------WebKitFormBoundaryrTBzWaHQntWAtZLX-- Upload using axios const formData = new FormData(); formData.append('file', this.file); this.axios.put(this.formUrl, formData, { headers: { // 'Content-Type': `multipart/form-data`, 'Content-Type' : 'application/octet-stream', }, }) .then((res) => { console.log(res) }).catch((e) => { console.error(e) }); How do I remove boundary A: I faced the same issue. But the solution is simple. Here is my code I used to upload the file axios({ method: "PUT", url: url, data: fileToUpload, // NOTE - this is the file not the FormData Object headers: { "Content-Type": "multipart/form-data" } }) .then(res => { this.setState({ uploadSuccess: "File upload successfull", error: undefined }); }) .catch(err => { console.log(err) }); What really happens is when you attach the file to FormData the FormData get serialized and that serialized data is stored in S3. That's why the file become corrupted. In the solution we don't wrap the file inside a FormData object. What we do is we directly add the file to data attribute. So nothing other than the file itself get serialized and stored in S3. Hope this answer would help
Circles and Lines: From 3D to 2D Create 2D section views from 3D models with SectionPlane. All this fabulous 3D is great; it's more rewarding, it's more visual, but let's face it -- we get paid to create 2D drawings. So although the 3D models are good at getting our design intent across, we still need to produce those flat 2D drawings with all the different drawing views, dimensions, section views and the like. One of the biggest chores for a designer is creating section views. Getting the correct display, hatch pattern, linetypes and such can be very time-consuming. I have good news for those of you brave enough to create your models in 3D -- the new tool SectionPlane will do a good portion of this work for you. The concept is simple -- you use this new command to create a section plane that slices through an object and AutoCAD generates the correct section view for you, complete with varying linetypes and hatching. The end result is in the form of a block -- but you can update it should the part be redesigned or if your section plane must be changed. You need a jogged section line? No problem. This new command permits jogged sectioning as well. Let's take a look. SectionPlane Explained First of all, you must be in model space, because SectionPlane won't work in paper space. We'll start by creating a section object (yes, this is a new object type as well) by selecting a face. A section plane is created on the face you select. Select this new section plane (to turn, use its grips) and move the section plane to the desired location, as seen below. Find the option to display the cutaway geometry in the shortcut menu. Use the face option in the SectionPlane command to easily section your 3D model. The shortcut menu contains all the options you need to control your section planes. When you use a face to determine a section plane, Live Sectioning automatically turns on. This lets you see the cutaway geometry as you move the section plane around. You could, for example, see the inside parts of an engine that would be difficult or impossible to see from the outside. You can turn Live Sectioning on or off at will, but you can only have one section live at a time if you have more than one section plane. To activate and deactivate Live Sectioning, simply select the section plane object and right-click on the section line. This brings up the shortcut menu. You have complete control over the color, transparency and other aspects of the cutaway geometry in the Section Settings dialog box. Here you'll see that my cutaway geometry is red, with a medium transparency of 50%. Feel free to manipulate this to your liking. If you don't have a face in the plane of the desired section plane, you can also draw your own section line from two points. After selecting the first point, a section representation displays, making it easy to select the second point. Create a jogged section plane by using the Draw option in the SectionPlane command. Similar to the two-point option, you continue to select points until the jog is to your liking. Because the section line contains grips, it's fairly easy to modify your section after the fact. Command: sectionplane Select face or any point to locate section line or [Draw section/Orthographic]: d It's sometimes easier to draw a section plane first and then add a jog to the existing section plane. To do this, choose the Add jog to section option in the shortcut menu. Once again, you can use the grips to move the jog to its proper location, as seen below. Use the grips on the section line to control the section plane. And last but not least, here's the very simple Orthographic option. This makes a section object that aligns to the orthographic orientation of the UCS. Command: SECTIONPLANE Select face or any point to locate section line or [Draw section/Orthographic]: O Align section to: [Front/bAck/Top/Bottom/Left/Right] : Create Section View All of these section lines are cool, but you need to create an actual section view. To begin, return to the Section Settings dialog box to set up the final section view. Activate the 2D section button at the top of the dialog box, as seen below. Then it's simply a matter of setting up the hatch pattern you want the section view to use, as well as the linetypes and lineweights. If you plan on doing a 3D isometric section view, do the same. If you plan on using the same settings for all your section views, be sure to select this option at the bottom of the dialog box so you don't have to go through the setup process again. Use the Section Settings dialog to set your section view settings to your company standards. There are a zillion different customization settings available to ensure you get the exact results you're after. It would take several columns to touch on them all, so I suggest you resort to the Help menu for an explanation of all the various options -- really, give it a try! Create a Section Now you're ready to create your section! Select Generate 2D/3D section from the Shortcut menu. The dialog box prompts you to select the objects to include in your section view. Your section view inserts as a block, using the standard block options such as insertion point, scale and rotation angle. Create a section view block after setting up the section line. You can insert this block of your shiny new section view into any viewport in paper space. If your model changes in any way (or should I say "when" it changes), you can update the block by repeating the last step, except select the destination as Replace existing block option. You'll also find that you can create a 3D section view by following the same steps. The finished section view is in the form of a block. Give the new SectionPlane command a try -- you just might find yourself with a little extra free time on your hands! It's always so much better when you can get AutoCAD to do the work for you, isn't it? Until next month ... happy AutoCADing! About the Author: Lynn Allen Autodesk Technical Evangelist Lynn Allen guides you through a different AutoCAD feature in every edition of her popular "Circles and Lines" tutorial series. For even more AutoCAD how-to, check out Lynn's quick tips in the Cadalyst Video Gallery. Subscribe to Cadalyst's free Tips & Tools Weekly e-newsletter and we'll notify you every time a new video tip is published. All exclusively from Cadalyst!Follow Lynn on Twitter
April 7 2015 11:00 PM“Can a Show That Is One Big Flashback Really Have a Cliffhanger?” and Other Questions From Better Call Saul’s Episode 10, “Marco”Our hosts split on the show’s season finale and speculate wildly about what’s ahead in Season 2.Seth Stevenson and June Thomas
Pitcher Medders tries to regain 2005-06 form for Diamondbacks D'backs outfielder Justin Upton dives back to first base during Thursday's spring training game against the Rockies at TEP. Brandon Medders has high hopes for 2008 with the Arizona Diamondbacks after taking a step back last year. Medders posted a combined 9-4 record in 2005 and 2006, appearing in 87 games. Last season, Medders started with the D’backs but was sent down to Tucson following a 1-2 start with a 4.30 ERA. He was yielding a hit per inning at the time. “I had that stint last year where I struggled, but I don’t think there was anything I needed to change,” Medders said. “It was just getting my head back to focusing more. It was nothing mechanically I needed to change . . . keeping the ball down and getting ahead of hitters – that would be the only thing. Medders looked impressive in his first outing Thursday with a 1-2-3 eighth inning against Colorado in the D’backs’ 5-5 tie with the Rockies. “Last year my confidence got lost for a while,” Medders said. “That’s the worst thing that can happen to a pitcher is to lose his confidence. Any pitcher that you see in professional baseball has done something to get to that level. “They have a talent that others don’t. You have to keep your confidence and know you have to trust yourself.” This archive contains all the stories that appeared on the Tucson Citizen's website from mid-2006 to June 1, 2009. In 2010, a power surge fried a server that contained all of videos linked to dozens of stories in this archive. Also, a server that contained all of the databases for dozens of stories was accidentally erased, so all of those links are broken as well. However, all of the text and photos that accompanied some stories have been preserved. For all of the stories that were archived by the Tucson Citizen newspaper's library in a digital archive between 1993 and 2009, go to Morgue Part 2
Q: Why is SignInAsync asynchronous? In the new Identity template code, the controller code that signs in a user is wrapped in an async block: private async Task SignInAsync(ApplicationUser user, bool isPersistent) { AuthenticationManager.SignOut(DefaultAuthenticationTypes.ExternalCookie); AuthenticationManager.SignIn(new AuthenticationProperties() { IsPersistent = isPersistent }, await user.GenerateUserIdentityAsync(UserManager)); } But all of the calls to SignInAsync simply await the task completion. So what's the point of the additional overhead and complexity of making the sign-in code asynchronous? Or is that a mystery left to the minds of the folks who created the template who may have envisioned some sort of asynchronous sign-in scenario? EDIT: Ok, there seems to be a bit of confusion as to what I'm asking. Let's try this: Why create an asynchronous SignInAsync function when all of the calls to the function are effectively synchronous: await SignInAsync() The async function would make sense if the caller did some other work before awaiting, but that's not the case... A: Why create an asynchronous SignInAsync function when all of the calls to the function are effectively synchronous You say this, but then give an example of an asynchronous call. So, I think the confusion is around the difference between synchronous and sequential. Consider the code in question: await SignInAsync(); This is an asynchronous call. The method it's in will be evaluated sequentially because it immediately awaits the returned task, but that does not make it synchronous. It's still asynchronous. You can think of "sequential" as "one step at a time"; this is in contrast to "concurrent", which does multiple things at a time. "Asynchronous" can mean "doing some operation without blocking", whereas "synchronous" means "using the calling thread for the duration of the operation". Async and await enable asynchronous sequential code (and also asynchronous concurrent code, if you use something like Task.WhenAll).
They knew they were breaking the law when they entered the United States of America illegally. They could have applied for citizenship and waited in line behind everyone else who made the decision to follow their dreams of becoming an American citizen. They instead, chose to take the risk of sneaking themselves and their families across the border. Now, they want American taxpayers to give them millions of American dollars because they didn’t feel they were treated fairly by the immigration officers, who are being tasked with figuring out what to do with thousands of lawbreakers from foreign countries. Do these lawbreaking foreigners believe they deserve some sort of prize, or special treatment for dragging their children, or in many cases, other people’s children across the border with them? Apparently, they do, and now, they’re unashamedly asking American taxpayers to do the unthinkable. According to the Daily Mail – Eight immigrant families demanded millions of dollars in damages Monday from the Trump administration for separating them, including a Guatemalan woman who alleged an officer said her five-year-old son would be taken and then taunted, ‘Happy Mother’s Day.’ In claims filed with the U.S. government Monday, the parents accused immigration officers of taking their children away without giving them information and sometimes mocking them or denying them a chance to say goodbye. The claims allege that many children remain traumatized even after being reunited with their parents, including a seven-year-old girl who won’t sleep without her mother and a six-year-old boy who is reluctant to eat. In a MUST WATCH video, Turning Point USA Communications Director Candace Owens can be seen ranting after touring an ICE detention facility for illegal alien children and women in Broward County, Florida. She is shocked when she sees an indoor basketball court, Zumba classes, 24-hour medical care, a barber shop, beauty shop and sand volleyball pits. Candace claims that the rooms where the illegal aliens are being housed are nicer than her dorm room where she attended college. Owens says she has never wanted a video to go viral more than this one, claiming that Democrats should be “disgusted with yourselves” after seeing how much better illegal aliens are treated than the poor children in inner cities in America. ***Language warning*** The Department of Homeland Security did not respond to a request for comment regarding the lawsuits by the illegal aliens. The Trump administration has acknowledged it separated more than 2,000 families last year through the implementation of a zero-tolerance policy intended to crack down on Central American migration at the U.S.-Mexico border. In June 2018, Breitbart News revealed mutliple images from the inside of a shelter where migrant children who’ve been separated from their parents are being held. The Department of Health and Human Services hosted Breitbart News and other media outlets on a tour of a detention facility in El Cajon, California. Families that arrive together at legal ports of entry and apply for asylum status are generally not split up and are permitted to stay in the U.S. pending the adjudication of their applications (which can take several years). Democrats and the mainstream media have accused the administration of separating the children of “immigrants” from their parents and imprisoning them in “cages.” Should Trump appoint a new Supreme Court Justice before the election? Yes No Just show the results Enter your email to see the results... * Name This field is for validation purposes and should be left unchanged. Completing this poll entitles you to 100 Percent Fed Up updates free of charge. You may opt out at anytime with a single click. Here's our Privacy Policy. The facility at El Cajon, however, is not a “cage.” It is a comfortable facility providing lodging, meals, clothing, medical care, education, recreation, counseling, and other services. It is run by a nonprofit organization called Southwest Key as part of the Department of Health and Human Services’ Unaccompanied Alien Children (UAC) Program, run by the Office of Refugee Resettlement (ORR) in the Administration for Children and Families (ACF). The facility is located on a main street in a quiet, suburban neighborhood. It has 65 beds, occupied by boys ages 6 to 17. The rooms are spare, with three to four beds in each; the boys are responsible for cleaning the rooms and making their own beds. There is an outdoor recreation area with picnic tables and a small soccer pitch. There is a classroom area and English lessons. The goal is “reunification”: letting each child depart with a legal guardian. Some 90% of the children at the shelter arrived at the border without adults; the other 10% were separated from the adults accompanying them. Once the children arrive — usually brought by U.S. Border Patrol agents — they are greeted in the “intake” office, where they receive any urgent medical care, are assigned a case worker, and are given food, a shower, and new clothing. They are also given toiletries and lessons in hygiene — literally how to flush a toilet, brush their teeth, and operate the shower, which some of the children may have never seen in their lives. The children receive six hours of education daily, which include lessons in English and physical education. The boys interact with girls who are housed offsite and brought to the shelter during the day to access its services. We’re still waiting to hear how many American families have successfully sued the Mexican government for allowing illegal aliens to cross into the U.S. and killed their loved ones… We’d love to know what you think about foreigners who broke our laws, attempting to take millions of our hard earned U.S. tax dollars? Is this more proof that we need a wall more than ever? We’d love to know what you think in the comment section below.
<script> import { goto, stores } from '@sapper/app' const { session, page } = stores() import { createEventDispatcher } from 'svelte' const dispatch = createEventDispatcher() import { SearchIcon } from 'svelte-feather-icons' export let home = false let query let searchInput import { onMount } from 'svelte' onMount(() => { if (!home && query.q) setTimeout(() => searchInput.focus(), 0) }) page.subscribe(page => { query = page.query }) function search() { setTimeout(() => { // When coming from home (or another page) if (home) goto('/search?q=' + query.q) // goto reloads the page. Hence focus is lost else history.pushState({}, null, '/search?q=' + query.q) dispatch('search', query.q) }, 300) } </script> <form class="w-full pb-2 text-center lg:w-1/2 md:pb-0" novalidate autocomplete="off" on:submit|preventDefault={search}> <div class="search_fix" /> <div class="absolute"> <SearchIcon size="16" class="m-3 text-gray-500" /> </div> <input aria-label="Search Box" type="text" on:input={() => search(query.q)} bind:this={searchInput} bind:value={query.q} class="w-full h-10 px-10 pr-4 text-xs border-0 rounded-b-sm shadow bg-purple-white focus:outline-none text-2" placeholder="Search for products,brands and more" name="search" /> </form>
LIVE Politics Rick Perry was tricked by Russian pranksters. This isn't his first 'oops' moment.
An electrostatic discharge (ESD) pulse is a sudden and unexpected voltage and/or current discharge that transfers energy to an electronic device from an outside body, such as from a human body for example. ESD pulses can damage electronic devices, for example by “blowing out” a gate oxide of a transistor in cases of high voltage or by “melting” an active region area of a device in cases of high current, causing junction failure. As will be appreciated in greater detail below, the present disclosure relates to improved ESD protection techniques.
/* ========================= eCAL LICENSE ================================= * * Copyright (C) 2016 - 2019 Continental Corporation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * ========================= eCAL LICENSE ================================= */ #include <ecal/msg/proto/message.h> #include <ecal/msg/string/message.h> #include <ecal/measurement/omeasurement.h> #include <iostream> #include "person.pb.h" constexpr auto ONE_SECOND = 1000000;; int main(int /*argc*/, char** /*argv*/) { // create a new measurement eCAL::measurement::OMeasurement meas("."); // create a channel (topic name "person") eCAL::measurement::OChannel<pb::People::Person> person_channel = meas.Create<pb::People::Person>("person"); eCAL::measurement::OStringChannel string_channel = meas.Create<std::string>("string"); pb::People::Person person; person.set_name("Max"); long long timestamp = 0; for (int i = 0; i< 100; i++) { person.set_id(i); std::string my_string{ "String no " + std::to_string(i) }; person_channel << eCAL::measurement::make_frame(person, timestamp); string_channel << eCAL::measurement::make_frame(my_string, timestamp); timestamp += ONE_SECOND; } return 0; }
Archives Categories Category: Safety The Verge is reporting that “Pokémon Go has become wildly popular in the days since its release last week, but the app may be hiding a serious security issue. In many cases, users who sign into the app through a Google Account are often inadvertently granting broad permissions over all information linked to the account, including the power to read and send emails. At no point in the sign-in process does the app notify users that full access is being granted” (Source). Read more at The Verge. I’m very excited to be starting another learning adventure with graduate students here at The University of Memphis. For the next seven weeks I’ll be teaching IDT 7078: Seminar in Instructional Design and Technology. This semester’s topic is Learning with Web 2.0 and Social Media. Many of you may recall (because you were active participants) that I previously taught this course with a similar topic (Teaching and Learning with Web 2.0) in the Summers of 2008 and 2009. In both of these instances the students collaborated to publish the first two editions of the ebookTeaching and Learning with Web 2.0. Their exemplary work earned nominations for the international Edublog Awards (2008, 2009). I also offered this course during Spring 2013 and the seminar topic was Learning with Web 2.0. It was the first time that I’d incorporated my work from Harvard, the idea of making thinking visible with technology, into a course. It pushed everyone’s ideas about thinking, learning, understanding, and technology. This experience as well as the work and research I’ve continued to do in the past year have resulted in the development of the class that starts today. This semester’s class promises to be another outstanding experience for all of us. It has been designed utilizing some of the best practices and student feedback from the earlier offerings, and now incorporates many of the innovations in technology that have been developed in recent years. As we consider all the “cool” technologies and social media we will always keep the focus on their contributions to learning. These technologies can help us go a long ways in making thinking visible. It’s going to be a different sort of experience and a wildly fun journey into learning. We invite you to join us! I’m developing some resources for a course that I’ll begin teaching after Spring Break and ran across this video. I think it can be used as a provocative way of framing a conversation with students about digital citizenship and netiquette. How do you approach these topics with your students? Can you recommend related resources that I (and others) might use? I received an email with the following information about an opportunity in Memphis. It is open to the public. Young people today are smarter than ever about many things; but when it comes to technology safety, they can be frighteningly naive. How can parents protect their children’s safety and privacy? What should parents know about cyberbullying, sexting, Facebook, Twitter, and texting? On Monday night, August 27, at 6:30, Harding Academy invites you to hear our special guest, Deb Ireland, Assistant United States Attorney for the Western District of Tennessee. Ms. Ireland works with the Department of Justice initiative called Project Safe Childhood, which aims to combat technology-facilitated sexual exploitation crimes against children. She will share information that every parent must know. This seminar is free and open to the community. Invite your friends and join us at the Harding Cherry Road campus, 1100 Cherry Road, across the street from the Dixon Gallery and Garden. Enter the building through temporary main entrance at the end of the main drive. Keeping up with the state of technology is not easy. New social media such as Twitter, Facebook, Google+, YouTube, and Pinterest continue to emerge and users sign-up and setup profiles without considering the full ramifications of sharing personal information. Practical tips for helping you and your students thoughtfully setup and maintain your online identities will be shared. “Facebook is working on new technology that would let young children use the social network without having to lie about their age, reports the Wall Street Journal. Facebook currently doesn’t allow users under the age of 13, though many sign-up anyways — last year Consumer Reports said that 7.5 million of Facebook’s users were 13 or younger, including five million under the age of 10. The proposed technology wouldn’t create a separate version of the network for these users, but instead would put in place features that give parents control over their child’s online experience. A child’s account would be connected to their parent’s, for instance, and tools would be put in place to manage who can be added as a friend and what apps and games are used” (Source). Note that the WSJ is reporting that Facebook is exploring this. It is a multifaceted issue involving Facebook policies and governmental regulations. We will have to see how this unfolds. The following video provides a broad overview about this issue. Miguel Guhlin has once again pushed my thinking. This time its about the issue of personal content that K-12 teachers post online. I’ve spent a lot of time researching, thinking about and discussing this topic, but it struck me that this issue is actually a lot hairier than I’ve previously realized. There are a lot of different aspects that need to be considered. Here are a few points from Miguel’s post. I encourage you to consider each question twice asking yourself Do.. the first time and Should… the second time. Do/Should school districts have any say about what a teacher does after hours? Do/Should school districts have any say about what a teacher posts online? Do/Should teachers represent the district after hours? Rather than commenting on the discussion at this point, I hope to further it by asking a few more questions. If the answers to these questions are “yes” then is the same true for individuals in other professions (Nurse, news reporter, radio DJ, police officer, elected official, unelected government employee, or store clerk)?
Category: Google Assistant Today marks the 52nd Super Bowl, and quite a bit has changed since that first big game. Then, it was called the AFL-NFL World Championship Game. In 1967, the cost of a movie ticket was $1.25, and color TV was just starting to become popular. Today, more than fifty years later, we can now stream the big game to our pocket computers and have artificially intelligent assistants sitting around in our homes to keep us up to date on predictions. That said, the three big voice assistants seem to have a different approach on predicting who will win the Super Bowl today. Apple’s Siri is playing it straight. When asked who will win the Super Bowl, she simply responds with data: “I’m hearing that the Patriots are favored to beat the Eagles by 4.5 points.” Google Assistant, on the other hand, doesn’t seem to want to plant a flag in the sand. The voice-powered AI has a few different responses to the question of who will win the big game, each less informative than the last. “Both teams are hungry for victory, which is important. While the players will be leaving everything on the field, I want you to leave nothing in the chip bowl.” “All I can say is it’s going to be fierce. At some point, both quarterbacks will yell ‘Kill! Kill! Kill!’ and call an audible, but don’t be afraid. You’re not in any danger.” “I don’t have any answers but I can confidently say this: I predict a touchdown within the first sixty minutes.” In each of these three responses, the voice of Google Assistant is accompanied by roaring crowds. Which, let’s be honest, makes these responses even more ridiculous. This brings us, finally, to Amazon Echo. When asking Alexa who will win the Super Bowl, Amazon has decided to take their voice assistant in a more human direction. Pats fans, brace yourselves! “The team favored to win is the (cough). Is the (cough). Excuse me. Is the Patriots. (Clears throat.) That was tough to get out. But I’m flying with the Eagles on this one because of their relentless defense and the momentum they’ve been riding off their underdog status. E-A-G-L-E-S! Eagles!” Funny enough, Amazon is anything but an underdog and more aptly represented by the Patriots than by the Eagles. But, in any case, you should have some fun chatting it up with your favorite AI before the game. Unless it’s Siri. That’s just boring. I started writing about Google Assistant before I’d even fully unpacked. The company had posted up a week-long residency with a profile to rival any in Vegas that first week of January. Celine Dion at Caesar’s, David Copperfield at the MGM Grand, Google at the Las Vegas Convention Center. The company wallpapered the Vegas monorail and plastered the words “Hey Google” on every rentable screen in town. Take that, Donny and Marie. That crazy booth in the Convention Center parking lot seemed like a terrible idea on Tuesday when the rains opened up and swallowed it whole — but a day later, when the lights went out on CES for a few hours, everyone came running to Google and its free donuts. Our own booth at the Sands, meanwhile, where a number of us were posted up for much of the week, was way too close to the giant Google gumball machine. Every ten or so minutes, cheers erupted from the crowd as another eager tech industry type won a Home Mini, after dutifully waiting in line for an hour or so. And then, on my last night, when I thought I’d escaped the company’s presence for long enough to enjoy that Run The Jewels corporate gig, I walked out on the balcony of Brooklyn Bowl and spotted the same machine down below. The damn thing was everywhere. Google’s CES 2018 presence was an act of sheer brute force — a consumer electronics blitzkrieg that some how managed to standout among the bright lights of America’s most stupidly garish city. The fact of the matter is that, even if the company hadn’t followed through on that promise, it would still have managed to capture plenty of headlines. But Google delivered. After having virtually no presence at the show in past years, the company went from zero to 60. Practically no press conference or news release went by without some mention of Assistant. The company played its hand well at the show. There was no big Google press conference, and it didn’t release a single piece of its own hardware. Instead, it harnessed the platforms of its highest profile tech partners — Sony, LG, Lenovo, Huawei and the like. At the latter’s press conference, an executive even came out on stage to run down the specifics of Assistant — though to be fair, perhaps Huawei was simply filling time in the wake of some last minute adjustments. Assistant made it onto virtually every manner of hardware at the show, from TVs to refrigerators to electric bike wheels. And while the company went into the last holiday season with no direct competitor to the Echo Show, suddenly it had several, letting its hardware partners do all of the heavy lifting. From the looks of it, Amazon’s got something to be concerned about on that front — especially given the fact that the company went with the nuclear option a few months back, pulling YouTube from Amazon’s offering. Amazon had a good show, too, albeit with a decidedly more subdued presence. There was no giant gumball machine or armies of employees in matching outfits screaming until the voices went hoarse, but the company handily sent along a list of Alexa announcements at the end of each show day. And the list is a solid one, particularly with the planned launch of Alexa on several Windows 10 PC — effectively eating into Cortana’s one stronghold. Both companies’ respective assistants had a successful CES, but Google’s list of devices go a long way toward shrinking the gap between the two players — and take it even closer to its dream of device ubiquity. That positioning, coupled with the years of backend development that have coalesced behind Assistant should leave Amazon more than a little concerned about holding onto its place at the top of the heap. For the first time ever, Google has a big presence at CES. You can’t look out of a window and not see a Google logo somewhere. But the one thing that didn’t work out so well for the company was its massive booth on the parking lot in front of the Las Vegas Convention Center. Yesterday, it rained a bit more than usual in Las Vegas and the booth leaked, so Google had to shut it down for the day. Today, however, the booth is open again, so we sent Tito to check it out, slide down the Google slide, eat a doughnut and take a nap. It’s hard to underestimate how big a deal CES is for Google this time around. The company announced a number of new partnerships, including its new smart displays with the likes of Lenovo, LG, Sony and JBL. It also announced updates to Android Auto and dozens of new Assistant partnerships with headphone and TV manufacturers. The Kate Spade models were announced today at CES, and all share the same name: the Kate Spade New York Scallop Touchscreen Smartwatch. It just rolls off the tongue, right? All of the watches are powered by Android Wear 2.0 and have 1.2-inch, circular OLED displays as well as an ambient light sensor. Styles include a rose gold watch case with a bracelet, a rose gold watch case with a leather strap, and a yellow gold colored watch case with a black strap. That said, all three models are made of stainless steal. The Kate Spade scallop, a distinctive feature across a number of Kate Spade products from bags to clothing to iPhone cases, is featured on the face of the watch. But this isn’t just an aesthetic play. The new models will come with exclusive watch faces, including an NYC taxi speeding off and an eyelash blink if you have a new notification. The watches also come with an app that asks you what color you’re wearing and automatically changes the watch face color to match your outfit. As expected with Android Wear 2.0, the new Kate Spade watches are equipped with a microphone to let you chat it up with Google Assistant. On the other hand, these are not built for fitness junkies, with no heart-rate sensor or built-in GPS. Also missing is an NFC chip for mobile payments. These new models start at $295, with the bracelet version going for $325, and the watches should ship in mid-February. Google says that you can now perform more than a million actions with the Google Assistant. Those range from looking up photos with Google Photos to starting a meditation session from Headspace. But one problem with voice assistants is that it’s very hard to discover what actions you can actually perform. For many users, that means they use their Google Home or Alexa to set a few timers and maybe play music, without ever realizing what else they can do. Latest Crunch Report To help its users a bit, Google is launching a new directory page for the Google Assistant today. This is part of a slew of Assistant-related announcements at CES today and while it’s probably not the most important (those smart displays sure look nice, after all), it’s nevertheless a useful new tool, especially for new users. It’s been almost exactly a year since Google enabled third-party actions, and while Google can’t boast the same numbers of third-party support as Amazon, there’s clearly a lot of developer interest in building these actions. And to make talking about them a bit easier, Google is also now calling its first-party actions… wait for it… “actions.” Sony is really Sonying it up at CES this year, announcing a deluge of devices at the show this week. CES has always been a big show for the company’s TV and audio lines, and this year’s no different. The company’s got a bunch of announcements on the headphone front, including, most notably, the addition of Google Assistant functionality to a bunch of different models. The list features seven new models, including a couple announced at the show today: WH-1000XM2, WI-1000X, WF-1000X, WF-SP700N, WI-SP600N, WH-CH700N, WH-H900N. You get pretty much what you’d expect from the smart assistant — taking calls, requesting music and the like. It’s just the latest sign of Google’s completely unavoidable presence at this year’s show. The MDR-1AM a new premium pair of cans from the company — essentially the successor the similarly named MDR-Z1R. The headphones deliver the companies favorite audio buzz term “Hi-Res Audio.” In this case, that means that the headphones are capable of playing back music at up to 100 kHz frequencies. The headphones have a new 40mm HD driver from the company on-board for fuller sound reproduction. Those will be available at some point in the spring for $300. The company’s also launching a trio of Bluetooth earbuds around the same timeframe. There’s not a ton of distinguishing factors between the models. The WF-SP700N is priciest of the bunch at $180. Those are also the only fully wireless models in the group, with no cables tethering the two buds together. They’re not exactly slim, either — they look to protrude a bit outside of the ear. They do, however, sport active noise cancelling and a splashproof design, which should come in handy when taking thes thing along for a run. The earbuds only get three hours of life on a charge, but like most of their brethren, ship with charging case. That should boost the total up to nine. The WI-SP600N are a tethered pair with the same noise canceling tech and IP slash proof rating as the pricier pair. They should get around six hours of battery life. At $80, the WI-SP500 are easily the cheapest pair of the bunch and offer the longest standalone battery life at eight hours. Qualcomm, the chip manufacturer that Broadcom really wants to buy, is using this year’s CES to launch a new platform for smart speakers, displays and other devices with built-in support for Google’s Assistant. In addition, the company also announced that its Smart Audio Platform is now certified by Amazon for Alexa Voice Service and that it supports Microsoft’s Cortana assistant, too. All of these platforms, the company hopes, will allow other hardware manufacturers to more easily build devices that support these virtual assistants. In total, there are quite a few announcements here: the Qualcomm Smart Audio far-field reference platform that is now qualified for Alexa; Smart Audio Platform support for Android Things; the Google Assistant and Google Cast for audio; and the new Qualcomm Home Hub platforms (which comes in two different flavors) with support for Android Things; and Microsoft Cortana support. The Home Hub platform is the most powerful of these (at least in terms of computational power) and, among other things, forms the basis for the Google Assistant-enabled smart displays that Lenovo and others are announcing today. The Home Hub platform comes in two versions: the more powerful SDA624 system on a chip (SoC) for devices with video cameras and/or displays and the SDA212 SoC for more audio-centric devices. As for the Smart Audio Platform, Qualcomm stresses that the Alexa version includes six-microphone far-field voice support while on the Google side, the company is stressing that the platform also supports Android Things, Google’s Android-based software platform for IoT devices. “Our Smart Audio Platform helps allow traditional speaker OEMs to more efficiently join and participate in the growing smart speaker segment,” said Anthony Murray, senior vice president and general manager, voice and music at Qualcomm. “Demand for voice control and assistance in the home is rapidly gaining traction, and this platform is designed to offer great flexibility for manufacturers wanting to deliver highly differentiated user experiences taking advantage of the power of Google cloud-based services.” Seshu Madavapeddy, Qualcomm’s VP of product management for IoT, told me the company is using a lot of the building blocks it developed for mobile devices to build these home IoT platforms (though the company is obviously also making investments specific to IoT). Madavapeddy stressed that the company always focuses on security, though, no matter the price point of its chipsets.
Vulnerability to HIV/AIDS among women of reproductive age in the slums of Delhi and Hyderabad, India. This report explores how vulnerability to HIV/AIDS applies to women in the reproductive age range living in the slum areas of Delhi and Hyderabad. The paper is based on a qualitative study of AIDS awareness levels conducted during the summer of 2006. It offers insightful narratives from a sample of 32 women, providing an in depth view of their vulnerability to HIV/AIDS due to their precarious socioeconomic conditions and low AIDS awareness. The women cited lack of education, low empowerment in expressing and accessing information related to sexual matters, and poverty as key factors to vulnerability.
9 Creative & Memorable DIY Wedding Favors Summer time calls for outdoor weddings, bridal showers, and adorable wedding favors that complete that special day. Create the perfect DIY wedding favors ahead of time at your bridal shower to thank people for attending your summer soiree. Even better, these wedding favors are both cute and within your budget! Have a tea party themed shower and give these adorable tea candles as a thank you. Find an assortment of vintage tea cups at your local thrift store or flea market. Fill with wax and insert a candlewick. Tie with a cute ribbon. Turn your favorite Instagram photos of you and your friends into coasters your guests will love to show off at home. Be sure to pick out the most memorable images so the pictures are more thoughtful and long lasting.
Copyright 1991 by David A. Curry Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. The author makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. ------------------------------------------------------------------------ This is XPostIt Version 3.3.1 for X11 Releases 4 and 5. XPostIt allows you to create small notes to yourself in windows on the screen, and save them in disk files. This is generally neater than having numerous real Post-it notes stuck all around the edges of your monitor. ------------------------------------------------------------------------ Dave Curry Purdue University Engineering Computer Network West Lafayette, IN 47907 davy@ecn.purdue.edu
Q: How to pass nested function parametrs to main function parametrs? I have function, that makes animation on DOM elements using animate.css when user scrolling the page on certain coordinates. It works perfectly. $(window).scroll(function() { $('.dev-courses__item').each(function(){ var imagePos = $(this).offset().top; var topOfWindow = $(window).scrollTop(); if (imagePos < topOfWindow + 591) { function slideAnimate(name,method){ if (method === undefined || method == 'default') { method = "slideInLeft"; } $(name).addClass(method); }; slideAnimate('.dev-courses__item-first'); slideAnimate('.dev-courses__item-second'); slideAnimate('.dev-courses__item-third'); slideAnimate('.services-list'); }; }); }); The goal is to make function, that could be used universally with diferent selectors etc. I tried this: function elemAnimate(selector,position,name,method){ $(window).scroll(function() { $(selector).each(function(){ var imagePos = $(this).offset().top; var topOfWindow = $(window).scrollTop(); if (imagePos < topOfWindow + position) { function slideAnimate(name,method){ if (method === undefined || method == 'default') { method = "slideInLeft"; } $(name).addClass(method); }; }; }); }); } elemAnimate('.dev-courses__item', 591, '.dev-courses__item-first'); Somehow after function slideAnimate starts to work, nothing happens in console. So i figured out, that i can't pass parametrs from nested function in this way. How to do this correctly? A: I think your answer is here: JavaScript Nested Functions All functions have access to the global scope. In fact, in JavaScript, all functions have access to the scope "above" them. JavaScript supports nested functions. Nested functions have access to the scope "above" them. https://www.w3schools.com/js/js_function_closures.asp Your slideAnimate function is nested in an each function which is nested in the scroll function. Try un-nesting this function. function elemAnimate(selector,position,name,method){ $(window).scroll(function() { $(selector).each(function() { if ($(this).offset().top < $(window).scrollTop() + position) { slideAnimate(name,method); } }); }); } function slideAnimate(name,method){ $(name).addClass(method === undefined || method === 'default' ? 'slideInLeft' : method); } Or, if you're only using it to add a class, just get rid of it all together... function elemAnimate(selector,position,name,method){ $(window).scroll(function() { $(selector).each(function() { if ($(this).offset().top < $(window).scrollTop() + position) { $(name).addClass(method === undefined || method === 'default' ? 'slideInLeft' : method); } }); }); } Also, since you're already using jQuery, have you thought about using jQuery UI? It makes animating things pretty easy. https://api.jqueryui.com/slide-effect/
David's work harnesses the power of spiritual symbols and sacred geometry to bring those wearing them health, happiness, vitality, abundance, and above all - love. David's jewels are meticulously crafted to work on conscious and subconscious levels to inspire people's lives. David's Work is based on Sacred Geometry, Mystical Kabbalah, Astrology, Buddhism and other ancient cultures. To learn more visit Ka Gold Jewelry
/* acpi.c - Display acpi tables. */ /* * GRUB -- GRand Unified Bootloader * Copyright (C) 2008 Free Software Foundation, Inc. * * GRUB is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * GRUB is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with GRUB. If not, see <http://www.gnu.org/licenses/>. */ #include <grub/types.h> #include <grub/mm.h> #include <grub/misc.h> #include <grub/normal.h> #include <grub/acpi.h> #include <grub/extcmd.h> #include <grub/i18n.h> #include <grub/dl.h> #pragma GCC diagnostic ignored "-Wcast-align" GRUB_MOD_LICENSE ("GPLv3+"); static void print_strn (grub_uint8_t *str, grub_size_t len) { for (; *str && len; str++, len--) grub_printf ("%c", *str); for (len++; len; len--) grub_printf (" "); } #define print_field(x) print_strn(x, sizeof (x)) static void disp_acpi_table (struct grub_acpi_table_header *t) { print_field (t->signature); grub_printf ("%4" PRIuGRUB_UINT32_T "B rev=%u chksum=0x%02x (%s) OEM=", t->length, t->revision, t->checksum, grub_byte_checksum (t, t->length) == 0 ? "valid" : "invalid"); print_field (t->oemid); print_field (t->oemtable); grub_printf ("OEMrev=%08" PRIxGRUB_UINT32_T " ", t->oemrev); print_field (t->creator_id); grub_printf (" %08" PRIxGRUB_UINT32_T "\n", t->creator_rev); } static void disp_madt_table (struct grub_acpi_madt *t) { struct grub_acpi_madt_entry_header *d; grub_uint32_t len; disp_acpi_table (&t->hdr); grub_printf ("Local APIC=%08" PRIxGRUB_UINT32_T " Flags=%08" PRIxGRUB_UINT32_T "\n", t->lapic_addr, t->flags); len = t->hdr.length - sizeof (struct grub_acpi_madt); d = t->entries; for (;len > 0; len -= d->len, d = (void *) ((grub_uint8_t *) d + d->len)) { switch (d->type) { case GRUB_ACPI_MADT_ENTRY_TYPE_LAPIC: { struct grub_acpi_madt_entry_lapic *dt = (void *) d; grub_printf (" LAPIC ACPI_ID=%02x APIC_ID=%02x Flags=%08x\n", dt->acpiid, dt->apicid, dt->flags); if (dt->hdr.len != sizeof (*dt)) grub_printf (" table size mismatch %d != %d\n", dt->hdr.len, (int) sizeof (*dt)); break; } case GRUB_ACPI_MADT_ENTRY_TYPE_IOAPIC: { struct grub_acpi_madt_entry_ioapic *dt = (void *) d; grub_printf (" IOAPIC ID=%02x address=%08x GSI=%08x\n", dt->id, dt->address, dt->global_sys_interrupt); if (dt->hdr.len != sizeof (*dt)) grub_printf (" table size mismatch %d != %d\n", dt->hdr.len, (int) sizeof (*dt)); if (dt->pad) grub_printf (" non-zero pad: %02x\n", dt->pad); break; } case GRUB_ACPI_MADT_ENTRY_TYPE_INTERRUPT_OVERRIDE: { struct grub_acpi_madt_entry_interrupt_override *dt = (void *) d; grub_printf (" Int Override bus=%x src=%x GSI=%08x Flags=%04x\n", dt->bus, dt->source, dt->global_sys_interrupt, dt->flags); if (dt->hdr.len != sizeof (*dt)) grub_printf (" table size mismatch %d != %d\n", dt->hdr.len, (int) sizeof (*dt)); } break; case GRUB_ACPI_MADT_ENTRY_TYPE_LAPIC_NMI: { struct grub_acpi_madt_entry_lapic_nmi *dt = (void *) d; grub_printf (" LAPIC_NMI ACPI_ID=%02x Flags=%04x lint=%02x\n", dt->acpiid, dt->flags, dt->lint); if (dt->hdr.len != sizeof (*dt)) grub_printf (" table size mismatch %d != %d\n", dt->hdr.len, (int) sizeof (*dt)); break; } case GRUB_ACPI_MADT_ENTRY_TYPE_SAPIC: { struct grub_acpi_madt_entry_sapic *dt = (void *) d; grub_printf (" IOSAPIC Id=%02x GSI=%08x Addr=%016" PRIxGRUB_UINT64_T "\n", dt->id, dt->global_sys_interrupt_base, dt->addr); if (dt->hdr.len != sizeof (*dt)) grub_printf (" table size mismatch %d != %d\n", dt->hdr.len, (int) sizeof (*dt)); if (dt->pad) grub_printf (" non-zero pad: %02x\n", dt->pad); } break; case GRUB_ACPI_MADT_ENTRY_TYPE_LSAPIC: { struct grub_acpi_madt_entry_lsapic *dt = (void *) d; grub_printf (" LSAPIC ProcId=%02x ID=%02x EID=%02x Flags=%x", dt->cpu_id, dt->id, dt->eid, dt->flags); if (dt->flags & GRUB_ACPI_MADT_ENTRY_SAPIC_FLAGS_ENABLED) grub_printf (" Enabled\n"); else grub_printf (" Disabled\n"); if (d->len > sizeof (struct grub_acpi_madt_entry_sapic)) grub_printf (" UID val=%08x, Str=%s\n", dt->cpu_uid, dt->cpu_uid_str); if (dt->hdr.len != sizeof (*dt) + grub_strlen ((char *) dt->cpu_uid_str) + 1) grub_printf (" table size mismatch %d != %d\n", dt->hdr.len, (int) sizeof (*dt)); if (dt->pad[0] || dt->pad[1] || dt->pad[2]) grub_printf (" non-zero pad: %02x%02x%02x\n", dt->pad[0], dt->pad[1], dt->pad[2]); } break; case GRUB_ACPI_MADT_ENTRY_TYPE_PLATFORM_INT_SOURCE: { struct grub_acpi_madt_entry_platform_int_source *dt = (void *) d; static const char * const platint_type[] = {"Nul", "PMI", "INIT", "CPEI"}; grub_printf (" Platform INT flags=%04x type=%02x (%s)" " ID=%02x EID=%02x\n", dt->flags, dt->inttype, (dt->inttype < ARRAY_SIZE (platint_type)) ? platint_type[dt->inttype] : "??", dt->cpu_id, dt->cpu_eid); grub_printf (" IOSAPIC Vec=%02x GSI=%08x source flags=%08x\n", dt->sapic_vector, dt->global_sys_int, dt->src_flags); } break; default: grub_printf (" type=%x l=%u ", d->type, d->len); grub_printf (" ??\n"); } } } static void disp_acpi_xsdt_table (struct grub_acpi_table_header *t) { grub_uint32_t len; grub_uint64_t *desc; disp_acpi_table (t); len = t->length - sizeof (*t); desc = (grub_uint64_t *) (t + 1); for (; len >= sizeof (*desc); desc++, len -= sizeof (*desc)) { #if GRUB_CPU_SIZEOF_VOID_P == 4 if (*desc >= (1ULL << 32)) { grub_printf ("Unreachable table\n"); continue; } #endif t = (struct grub_acpi_table_header *) (grub_addr_t) *desc; if (t == NULL) continue; if (grub_memcmp (t->signature, GRUB_ACPI_MADT_SIGNATURE, sizeof (t->signature)) == 0) disp_madt_table ((struct grub_acpi_madt *) t); else disp_acpi_table (t); } } static void disp_acpi_rsdt_table (struct grub_acpi_table_header *t) { grub_uint32_t len; grub_uint32_t *desc; disp_acpi_table (t); len = t->length - sizeof (*t); desc = (grub_uint32_t *) (t + 1); for (; len >= sizeof (*desc); desc++, len -= sizeof (*desc)) { t = (struct grub_acpi_table_header *) (grub_addr_t) *desc; if (t == NULL) continue; if (grub_memcmp (t->signature, GRUB_ACPI_MADT_SIGNATURE, sizeof (t->signature)) == 0) disp_madt_table ((struct grub_acpi_madt *) t); else disp_acpi_table (t); } } static void disp_acpi_rsdpv1 (struct grub_acpi_rsdp_v10 *rsdp) { print_field (rsdp->signature); grub_printf ("chksum:%02x (%s), OEM-ID: ", rsdp->checksum, grub_byte_checksum (rsdp, sizeof (*rsdp)) == 0 ? "valid" : "invalid"); print_field (rsdp->oemid); grub_printf ("rev=%d\n", rsdp->revision); grub_printf ("RSDT=%08" PRIxGRUB_UINT32_T "\n", rsdp->rsdt_addr); } static void disp_acpi_rsdpv2 (struct grub_acpi_rsdp_v20 *rsdp) { disp_acpi_rsdpv1 (&rsdp->rsdpv1); grub_printf ("len=%d chksum=%02x (%s) XSDT=%016" PRIxGRUB_UINT64_T "\n", rsdp->length, rsdp->checksum, grub_byte_checksum (rsdp, rsdp->length) == 0 ? "valid" : "invalid", rsdp->xsdt_addr); if (rsdp->length != sizeof (*rsdp)) grub_printf (" length mismatch %d != %d\n", rsdp->length, (int) sizeof (*rsdp)); if (rsdp->reserved[0] || rsdp->reserved[1] || rsdp->reserved[2]) grub_printf (" non-zero reserved %02x%02x%02x\n", rsdp->reserved[0], rsdp->reserved[1], rsdp->reserved[2]); } static const struct grub_arg_option options[] = { {"v1", '1', 0, N_("Show version 1 tables only."), 0, ARG_TYPE_NONE}, {"v2", '2', 0, N_("Show version 2 and version 3 tables only."), 0, ARG_TYPE_NONE}, {0, 0, 0, 0, 0, 0} }; static grub_err_t grub_cmd_lsacpi (struct grub_extcmd_context *ctxt, int argc __attribute__ ((unused)), char **args __attribute__ ((unused))) { if (!ctxt->state[1].set) { struct grub_acpi_rsdp_v10 *rsdp1 = grub_acpi_get_rsdpv1 (); if (!rsdp1) grub_printf ("No RSDPv1\n"); else { grub_printf ("RSDPv1 signature:"); disp_acpi_rsdpv1 (rsdp1); disp_acpi_rsdt_table ((void *) (grub_addr_t) rsdp1->rsdt_addr); } } if (!ctxt->state[0].set) { struct grub_acpi_rsdp_v20 *rsdp2 = grub_acpi_get_rsdpv2 (); if (!rsdp2) grub_printf ("No RSDPv2\n"); else { #if GRUB_CPU_SIZEOF_VOID_P == 4 if (rsdp2->xsdt_addr >= (1ULL << 32)) grub_printf ("Unreachable RSDPv2\n"); else #endif { grub_printf ("RSDPv2 signature:"); disp_acpi_rsdpv2 (rsdp2); disp_acpi_xsdt_table ((void *) (grub_addr_t) rsdp2->xsdt_addr); grub_printf ("\n"); } } } return GRUB_ERR_NONE; } static grub_extcmd_t cmd; GRUB_MOD_INIT(lsapi) { cmd = grub_register_extcmd ("lsacpi", grub_cmd_lsacpi, 0, "[-1|-2]", N_("Show ACPI information."), options); } GRUB_MOD_FINI(lsacpi) { grub_unregister_extcmd (cmd); }
--- abstract: 'Due to integrability, baryon-baryon scattering in the massless Gross-Neveu model at large $N$ features only forward elastic scattering. A bare mass term breaks integrability and is therefore expected to induce backward elastic scattering as well as inelastic reactions. We confirm these expectations by a study of baryon-baryon scattering in the massive Gross-Neveu model near the non-relativistic limit. This restriction enables us to solve the time-dependent Hartree-Fock equations with controlled approximations, using a combination of analytical methods from an effective field theory and the numerical solution of partial differential equations.' author: - 'Michael Thies[^1]' title: | Beyond integrability: Baryon-baryon backward scattering\ in the massive Gross-Neveu model --- Introduction {#sect1} ============ The massive Gross-Neveu (GN) model [@1] is the quantum field theory of $N$ flavors of Dirac fermions with a scalar-scalar four-fermion interaction and Lagrangian $${\cal L} = \sum_{i=1}^N \bar{\psi}^{(i)} \left( i \gamma^{\mu} \partial_{\mu} - m_0 \right)\psi^{(i)} + \frac{1}{2} g^2 \left( \sum_{i=1}^N \bar{\psi}^{(i)} \psi^{(i)} \right)^2. \label{A1}$$ We will only consider the case of 1+1 dimensions, where $g^2$ is dimensionless and the theory is renormalizable. The bare mass $m_0$ breaks explicitly the discrete chiral symmetry of the original, massless GN model ($\psi \to \gamma_5 \psi, \bar{\psi}\psi \to - \bar{\psi} \psi$) and renders the model non-integrable. A number of explicit, analytical results have been obtained in the ’t Hooft limit ($N\to \infty, Ng^2=$const.) of the massive GN model in the past, using semi-classical methods. Thus, the vacuum [@2], baryons [@3; @4], multi-baryon bound states [@5], cold and dense matter [@6] and the phase diagram at finite chemical potential and temperature [@2; @7; @8] are by now well understood. Somewhat surprisingly, explicit results for static properties have turned out to be equally accessible in the massive and massless GN models, despite the fact that only the massless one is integrable. In particular, scalar mean fields for baryons are transparent and those for inhomogeneous phases of dense matter are finite gap periodic potentials, irrespective of whether the bare mass $m_0$ is included or not. The situation changes once we look at dynamical problems. In the case of the massless GN model, it has proven possible to solve time-dependent scattering problems of multi-fermion bound states and write down general results in closed analytical form [@9]. The method used was based on a relativistic version of the time-dependent Hartree-Fock (TDHF) approximation, supposed to become exact in the large $N$ limit. Since these results show only elastic forward scattering and factorized transmission amplitudes, there is little doubt that integrability is at work here. By contrast, as pointed out in [@10], a similar ansatz method does not yield self-consistent mean fields for the massive GN model, despite the fact that individual static baryons can be correctly described. The aim of this paper is to elaborate on the difference between integrable, massless and and non-integrable, massive GN models. Static properties apparently give no clue about this difference, at least at large $N$. One way of going beyond static properties is to head towards non-equilibrium thermodynamics, e.g., by studying the bulk viscosity [@11]. In that reference one also finds a pedagogical discussion of the (non-)integrability of GN models in terms of Feynman diagrams for inelastic processes. Here we propose to follow another route. We generalize previous baryon-baryon scattering calculations of the massless GN model to the massive one, looking directly for non-forward elastic scattering and inelastic reactions. Clearly, we cannot hope to carry out such studies without numerical computations. Due to the Dirac sea, it would be very challenging to do a numerical TDHF calculation from scratch. Therefore, in this exploratory study, we set ourselves a more modest goal. We try to identify the leading order contribution to backward and inelastic scattering in the vicinity of the non-relativistic limit only. This will enable us to build on a previously developed effective low energy theory for the GN model [@12], while keeping numerical computations manageable. At the same time, by combining analytical and numerical tools, we hope to get more insight than with a purely numerical approach. We finish this introduction with a reminder about regularization and renormalization of the massive GN model [@2; @3]. The Lagrangian (\[A1\]) has two bare parameters, $g^2$ and $m_0$. After the regularization/renormalization procedure at large $N$, all observables can be expressed through two physical parameters, $m$ and $\gamma$. The relation between the bare quantities, an UV cut-off $\Lambda$ and the physical parameters is given by the vacuum gap equation $$\frac{\pi}{Ng^2} = \gamma + \ln \frac{\Lambda}{m}, \quad \gamma:= \frac{\pi}{Ng^2} \frac{m_0}{m}. \label{A2}$$ In the massless GN model ($m_0=0$), the dimensionless coupling constant $g^2$ gets traded for the dynamical fermion mass $m$, an example of dimensional transmutation. In the massive model, in addition, the bare mass $m_0$ gets replaced by a physical parameter $\gamma$. In condensed matter physics where the massless and massive Gross-Neveu models can be used for instance to model trans- and cis-polyacetylene [@13; @14], $\gamma$ is called “confinement parameter". It can also be related to the ratio of the dynamical fermion mass at $m_0$ and $m_0=0$, $$\frac{m[m_0]}{m[0]} = e^{\gamma} \label{A3}.$$ The physical parameters ($m,\gamma$) are renormalization group invariant. The plan of the present paper is as follows. In Sect. \[sect2\], we derive the TDHF equations for the massive GN model in the vicinity of the non-relativistic limit. After introducing an appropriate expansion parameter, in Sect. \[sect3\] we simplify these equations further, exhibiting the leading order (LO) and next-to-leading order (NLO) equations in detail. Sect. \[sect4\] explains our method of solving these equations, whereas numerical results will be presented in Sect. \[sect5\]. We close this paper with a summary and conclusions, Sect. \[sect6\]. TDHF near the non-relativistic limit {#sect2} ==================================== Our starting point is the Dirac equation with scalar potential $S$ in 1+1 dimensions, $$\left(i \gamma^{\mu} \partial_{\mu}-S \right) \psi = 0. \label{B1}$$ In TDHF theory appropriate for the large $N$ limit of the GN model, $S$ is the self-consistent mean field, $$S = -g^2 \langle \bar{\psi} \psi \rangle = - g^2 \sum_{\alpha}^{\rm occ} \bar{\psi}_{\alpha} \psi_{\alpha}, \label{B2}$$ where the sum runs over all occupied states, i.e., the filled Dirac sea and positive energy valence states. The aim of the present section is to set up the first two terms of a systematic, non-relativistic approximation to the full TDHF problem. Using the Dirac-Pauli representation ($\gamma^0 = \sigma_3, \gamma^1 = i \sigma_2, \gamma_5 = \sigma_1$) and pulling out the fast factor $e^{-imt}$ from the spinor $\psi$, we cast Eq. (\[B1\]) into the Hamiltonian form $$i \partial_t \left( \begin{array}{c} \psi_1 \\ \psi_2 \end{array} \right) = \left( \begin{array}{cc} S-m & -i \partial_x \\ -i \partial_x & -S-m \end{array} \right) \left( \begin{array}{c} \psi_1 \\ \psi_2 \end{array} \right). \label{B3}$$ Next, we eliminate the “small" component $\psi_2$ formally from (\[B3\]), $$i \partial_t \psi_1 = (S-m) \psi_1 - \partial_x \frac{1}{S+m+i\partial_t} \partial_x \psi_1, \label{B4}$$ use the non-relativistic expansion $$\frac{1}{S+m+i \partial_t} \approx \frac{1}{2m} - \frac{(S-m+i\partial_t)}{4m^2} \label{B5}$$ and arrive at a Schrödinger-type equation for the “large" component $\psi_1$, $$i \partial_t \psi_1 = \left( S-m- \frac{\partial_x^2}{2m}\right) \psi_1 + \partial_x \frac{\left(S-m+i\partial_t \right)}{4m^2} \partial_x \psi_1. \label{B6}$$ Replacing $i\partial_t \psi_1$ on the right hand side by the LO expression $(S-m- \partial_x^2/2m)\psi_1$, we find $$\begin{aligned} i \partial_t \psi_1 & = & \left( S-m- \frac{\partial_x^2}{2m} \right) \psi_1 - \frac{\partial_x^4}{8m^3} \psi_1 \nonumber \\ & + & \left[ \partial_x \left( \frac{S-m}{4m^2} \right) \partial_x + \partial_x^2 \left( \frac{S-m}{4m^2} \right) \right] \psi_1. \label{B7}\end{aligned}$$ The first term on the right is of LO, the second term the NLO correction to the relativistic kinetic energy, $$\sqrt{m^2+p^2} -m - \frac{p^2}{2m} \approx - \frac{p^4}{8m^3}. \label{B8}$$ The third term is non-hermitean, reflecting the fact that after elimination of the lower component $\psi_2$, the norm of the upper component $\psi_1$ is not conserved. To NLO, the conserved charge is $$Q = \int dx \left( |\psi_1|^2 + | \psi_2|^2 \right) \approx \int dx \psi_1^* \left( 1- \frac{\partial_x^2}{4m^2} \right) \psi_1. \label{B9}$$ Accordingly, we redefine the Hamiltonian and the wave functions as follows, $$\begin{aligned} H \longrightarrow \tilde{H} & = & \left( 1- \frac{\partial_x^2}{4m^2} \right)^{1/2} H \left( 1- \frac{\partial_x^2}{4m^2} \right)^{-1/2} \nonumber \\ & \approx & H - \frac{1}{8m^2} \left[ \partial_x^2, H \right], \label{B10} \\ \psi_1 \longrightarrow \tilde{\psi}_1 & = & \left( 1- \frac{\partial_x^2}{4m^2} \right)^{1/2} \psi_1 \approx \left( 1- \frac{\partial_x^2}{8m^2} \right) \psi_1. \nonumber\end{aligned}$$ This yields the amended version of the Schrödinger equation (\[B7\]), now with a manifestly hermitean Hamiltonian, $$\begin{aligned} i \partial_t \tilde{\psi}_1 & = & \left( - \frac{\partial_x^2}{2m} + S - m - \frac{\partial_x^4}{8m^3} \right. \nonumber \\ & + & \left. \frac{1}{8 m^2} \left\{ \partial_x, \left\{ \partial_x, S-m \right\}\right\} \right) \tilde{\psi}_1. \label{B11}\end{aligned}$$ We have generated the analogue of the Darwin term for a scalar potential (for a vector potential, replace the anti-commutators by commutators.) The reader will have noticed that this calculation follows closely the textbook evaluation of the fine structure of the hydrogen atom, see e.g. [@15], except for the missing spin-orbit term in 1+1 dimensions. What we have done so far is the non-relativistic reduction of the Dirac equation with a classical potential, including fine structure corrections. From the hydrogen atom, we already know that this is not the whole story: the Lamb shift is still missing. It arises from vertex corrections and vacuum polarization due to Dirac sea. Fortunately, we have the tools at our hands to include such quantum-field corrections systematically as well. To this end we turn to an “effective no-sea theory" of the massive GN model, derived in Ref. [@12] by “integrating out" all negative energy states. Referring to [@12] for the technical details and derivations, we immediately jump to the results. Keeping only the first two terms of a systematic expansion, one finds for the mean field of the massive GN model $$\begin{aligned} S - m & = & \sigma - \frac{1}{12 m^2} \frac{1}{(1+\gamma)} \partial_{\mu}\partial^{\mu} \sigma - \frac{1}{2m} \frac{1}{(1+\gamma)} \sigma^2, \nonumber \\ \sigma & = & - \frac{\pi}{(1+\gamma)} \sum_{\ell} \nu_{\ell} \bar{\psi}_{\ell} \psi_{\ell}. \label{B12}\end{aligned}$$ Let us briefly explain the various symbols and terms. To LO, $S=m+\sigma$. Here, $m$ is the dynamical fermion mass which would arises from the Dirac sea in the full HF calculation but has to be put in by hand in the effective theory. The scalar field $\sigma$ — the field of the $\sigma$ meson — has a similar self-consistent structure as $S$ in (\[B2\]). But here, the sum over occupied states only extends over the positive energy valence levels. The coefficient $\nu_{\ell}=N_{\ell}/N$ denotes the occupation fraction of the $\ell$-th bound state, a continuous parameter in the limit $N \to \infty$. The bare coupling constant $g^2$ gets replaced by a renormalized coupling constant $g_{\rm eff}^2 = - \frac{\pi}{N(1+\gamma)}$. This value can be derived from the tadpole contribution to the fermion self energy by projecting out the negative energy states, see Ref. [@12]. The other two terms on the right hand side are NLO and arise from vacuum polarization effects. As explained in Ref.  [@12], one needs to re-sum an infinite number of diagrams contributing to the $\sigma$-meson propagator. In this process, the bare coupling constant drops out, so that the result is truly non-perturbative in $g^2$. To arrive at the final form, one expands the inverse $\sigma$-propagator in powers of $k^2$, so that the truncation underlying Eq. (\[B12\]) is indeed consistent with the non-relativistic reduction of the Dirac equation. The task is now to solve Eq. (\[B11\]) for all bound states, using as self-consistency condition, Eq. (\[B12\]). Although these equations look more complicated than the original TDHF equations (\[B1\],\[B2\]), they are much easier to solve. It is sufficient to determine positive energy bound states self-consistently, rather than the whole Dirac sea plus valence levels. Thus, the structure resembles that of a non-relativistic TDHF problem, albeit with a more complicated interaction and self-consistency condition. Relativistic corrections are included by means of the fine structure terms as well as the higher order corrections to the no-sea effective theory. There are no more divergences, as regularization and renormalization have already been performed when deriving (\[B12\]). Since the scalar condensate $\bar{\psi}\psi$ in (\[B12\]) still contains the original two-component spinors $\psi$ rather than $\tilde{\psi}_1$, the equations are not yet in a form ready to be solved. Further simplifications will appear once we introduce a small expansion parameter and truncate all the equations consistently, the goal of the following section. Expansion parameter, LO and NLO TDHF equations {#sect3} ============================================== In order to arrive at a tractable set of equations and to avoid the unnecessary computation of complicated higher order terms, we introduce a formal expansion parameter $\epsilon$. The regime we are interested in is characterized by $v \sim \epsilon, y \sim \epsilon$, with $v$ the baryon velocity and $y$ the (inverse) baryon size parameter [@3; @4]. The first condition is self-evident for a non-relativistic expansion. The 2nd one induces a matching non-relativistic expansion for the internal structure of the baryon. The characteristic exponential in the single baryon is exp$[2y(x-vt)]$, hence we treat $\partial_x \sim \epsilon, \partial_t \sim \epsilon^2$. Guided by the single baryon results, we assume the following expansions for $S-m$ and the spinors, $$\begin{aligned} S-m & = & \epsilon^2 S^{(2)} + \epsilon^4 S^{(4)}, \nonumber \\ \tilde{\psi}_1 & = & \sqrt{\epsilon} \left( \tilde{\psi}_1^{(0)} + \epsilon^2 \tilde{\psi}_1^{(2)} \right), \nonumber \\ \tilde{\psi}_2 & = & \epsilon^{3/2} \left( \tilde{\psi}_2^{(0)}+ \epsilon^2 \tilde{\psi}_2^{(2)} \right). \label{C1}\end{aligned}$$ The small component $\tilde{\psi}_2$ will be needed later on for the condensate. Inserting these expressions into the Dirac equation (\[B11\]) with $S-m$ from (\[B12\]) and equating powers of $\epsilon$ then yields the following LO and NLO equations, $$\begin{aligned} i \partial_t \tilde{\psi}_{k,1}^{(0)} & = & \left( - \frac{\partial_x^2}{2m} + S^{(2)} \right) \tilde{\psi}_{k,1}^{(0)} \ \ ({\rm LO}) \nonumber \\ i \partial_t \tilde{\psi}_{k,1}^{(2)} & = & \left( - \frac{\partial_x^2}{2m} + S^{(2)} \right) \tilde{\psi}_{k,1}^{(2)} + \left( S^{(4)} - \frac{\partial_x^4}{8m^3} \right. \nonumber \\ & + & \left. \frac{1}{8m^2} \left\{ \partial_x, \left\{ \partial_x, S^{(2)} \right\} \right\} \right) \tilde{\psi}_{k,1}^{(0)} \ \ ({\rm NLO}) \label{C2}\end{aligned}$$ We have added a subscript $k$ labeling the bound states, as required by the general TDHF problem. We still need the relation between $S^{(2)}, S^{(4)}$ and the spinors $\tilde{\psi}_{k,1}^{(0)}, \tilde{\psi}_{k,1}^{(2)}$ arising from the self-consistency condition (\[B12\]) and expansions (\[C1\]). For each baryon, there is a size parameter $y_k$ and an occupation fraction $\nu_k$ related in a non-linear fashion, namely [@3; @4] $$\frac{\nu_k}{2} = \frac{\arcsin y_k}{\pi} + \frac{\gamma}{\pi} \frac{y_k}{\sqrt{1-y_k^2}}. \label{C3}$$ Since $y_k \sim \epsilon$, $\nu_k$ can be expanded as $$\nu_k = \epsilon \nu_k^{(1)} + \epsilon^3 \nu_k^{(3)} \label{C4}$$ with $$\begin{aligned} \nu_k^{(1)} & = & \frac{2 y_k (1+\gamma)}{\pi}, \nonumber \\ \nu_k^{(3)} & = & \frac{y_k^3(1+3\gamma)}{3\pi}. \label{C5}\end{aligned}$$ Inserting Eqs. (\[C1\],\[C4\],\[C5\]) into Eq. (\[B12\]) yields $$\begin{aligned} \sigma & = & \epsilon^2 \sigma^{(2)} + \epsilon^4 \sigma^{(4)}, \nonumber \\ \sigma^{(2)} & = & - \frac{\pi}{1+\gamma} \sum_{\ell} \nu_{\ell}^{(1)} | \tilde{\psi}_{\ell,1}^{(0)} |^2 , \label{C6} \\ \sigma^{(4)} & = & - \frac{\pi}{1+\gamma} \sum_{\ell} \left( \nu_{\ell}^{(3)} | \tilde{\psi}_{\ell,1}^{(0)} |^2 - \nu_{\ell}^{(1)} | \tilde{\psi}_{\ell,2}^{(0)} |^2\right) \nonumber \\ & - & \frac{\pi}{1+\gamma} \sum_{\ell} \nu_{\ell}^{(1)} \left( \tilde{\psi}_{\ell,1}^{(0)} \tilde{\psi}_{\ell,1}^{(2)*} + \frac{1}{8m^2} \tilde{\psi}_{\ell,1}^{(0)} \partial_x^2 \tilde{\psi}_{\ell,1}^{(0)*} + {\rm c.c.} \right) \nonumber\end{aligned}$$ where $$\tilde{\psi}_{\ell,2}^{(0)} = - \frac{i}{2m} \partial_x \tilde{\psi}_{\ell,1}^{(0)}. \label{C7}$$ The various terms in (\[C6\]) can be understood as follows. The scalar density in our representation of the $\gamma$-matrices is $$\bar{\psi} \psi = |\psi_1|^2 - |\psi_2|^2. \label{C8}$$ Remembering the different powers of $\epsilon$ in (\[C1\]), this explains the LO term $\sigma^{(2)}$. To this order, the difference between $\psi$ and $\tilde{\psi}$ does not matter. $\sigma^{(4)}$ contains all NLO terms, taking into account the fact that $\nu_k$ has the expansion (\[C4\]). The last line in Eq. (\[C6\]) is due to interference terms between $\tilde{\psi}_{\ell,1}^{(0)}$ and $\tilde{\psi}_{\ell,1}^{(2)}$, the only NLO contribution to $|\tilde{\psi}_{\ell,1}|^2$, and a derivative term coming from the transformation from $\psi$ to $\tilde{\psi}$, see (\[B10\]). In the $|\psi_2|^2$ term in (\[C8\]), only the lowest order is needed, so that we get away with expression (\[C7\]). According to Eqs. (\[B12\],\[C1\]) and (\[C6\]), the relationship between $S^{(2,4)}$ and $\sigma^{(2,4)}$ is $$\begin{aligned} S^{(2)} & = & \sigma^{(2)}, \label{C9} \\ S^{(4)} & = & \sigma^{(4)} + \frac{1}{12m^2} \frac{1}{(1+\gamma)} \partial_x^2 \sigma^{(2)} - \frac{1}{2m} \frac{1}{(1+\gamma)} (\sigma^{(2)})^2. \nonumber\end{aligned}$$ Time derivatives in $\partial_{\mu}\partial^{\mu} \sigma$ are of higher order than what is needed here. Eqs. (\[C2\],\[C6\],\[C9\]) together with the normalization conditions are a closed set of equations determining the positive energy bound state spinors in LO and NLO. Before going on, it is useful to ease the notation. Since we can now express everything through the “large" components $\psi_1$, we drop the subscript 1 from all the spinors. We also omit the tilde on all wave functions, replace $\sigma^{(2)}$ everywhere by $S^{(2)}$ and insert $\nu_k^{(1,3)}$. The basic TDHF equations then read to LO $$i \partial_t \psi_{k}^{(0)} = \left( - \frac{\partial_x^2}{2m} + S^{(2)} \right) \psi_{k}^{(0)}, \quad S^{(2)} = - \sum_{\ell} 2 y_{\ell} | \psi_{\ell}^{(0)} |^2 \quad ({\rm LO}), \label{C10}$$ and to NLO $$\begin{aligned} i \partial_t \psi_{k}^{(2)} & = & \left( - \frac{\partial_x^2}{2m} + S^{(2)} \right) \psi_{k}^{(2)} + \left( S^{(4)} - \frac{\partial_x^4}{8m^3} + \frac{1}{8m^2} \left\{ \partial_x, \left\{ \partial_x, S^{(2)} \right\} \right\} \right) \psi_{k}^{(0)} \quad ({\rm NLO}), \nonumber \\ S^{(4)} & = & \sigma^{(4)} + \frac{1}{12m^2} \frac{1}{(1+\gamma)} \partial_x^2 S^{(2)} - \frac{1}{2m} \frac{1}{(1+\gamma)} (S^{(2)})^2, \nonumber \\ \sigma^{(4)} & = & - \sum_{\ell} \left( \frac{y_{\ell}^3}{3} \frac{1+3 \gamma}{1+\gamma} | \psi_{\ell}^{(0)} |^2 - \frac{y_{\ell}}{2m^2} | \partial_x \psi_{\ell}^{(0)} |^2\right) - \sum_{\ell} 2 y_{\ell} \left( \psi_{\ell}^{(0)} \psi_{\ell}^{(2)*} + \frac{1}{8m^2} \psi_{\ell}^{(0)} \partial_x^2 \psi_{\ell}^{(0)*} + {\rm c.c.} \right) \label{C11}\end{aligned}$$ These equations are valid for arbitrary $\gamma$. Let us first look at the LO equation (\[C10\]) which has the form of the multi-component non-linear Schrödinger (NLS) equation [@17]. We notice that it does not contain $\gamma$ at all, so that the same equation is valid independently of the bare fermion mass. How is this possible? The answer is the same as for static baryons: The wave functions and mean fields for a baryon in the massive theory are identical to those for a baryon in the massless theory, but for a different fermion number. Indeed, $\gamma$ still appears in Eq. (\[C3\]) relating the occupation fraction and the size parameter. In the potential $S^{(2)}$, this is cancelled exactly by the $\gamma$-dependence of the effective coupling constant. Thus the TDHF equation of the massive GN model reduces to coupled NLS equations, independently of the bare mass. In this strict non-relativistic limit, we can solve baryon-baryon scattering problems by simply taking the solution of the massless model and expanding it in powers of $y,v$ to LO. At this level, there will be neither backward scattering nor any inelastic reaction. The model does not yet loose integrability. We now turn to NLO, Eq. (\[C11\]). The potential $S^{(4)}$ consists of several terms with different $\gamma$-dependencies. Somewhat surprisingly, one can eliminate the $\gamma$ dependence as follows. Let us denote the solutions of Eq. (\[C11\]) at $\gamma=0$ (chiral limit) by hatted quantities $\hat{\psi}_k^{(2)}, \hat{S}^{(4)}$ (we just saw that $\hat{\psi}_k^{(0)} = \psi_k^{(0)}, \hat{S}^{(2)} =S^{(2)}$). We then make the following “scaling" ansatz for the NLO quantities, $$\begin{aligned} \psi_k^{(2)} & = & \hat{\psi}_k^{(2)} + \frac{\gamma}{1+\gamma} \chi_k^{(2)}, \nonumber \\ S^{(4)} & = & \hat{S}^{(4)} + \frac{\gamma}{1+\gamma} s^{(4)}. \label{C12}\end{aligned}$$ Inserting (\[C12\]) into (\[C11\]) and using the fact that the hatted spinors satisfy Eq. (\[C11\]) at $\gamma=0$, we arrive at our final set of equations $$\begin{aligned} i \partial_t \chi_k^{(2)} & = & \left( - \frac{\partial_x^2}{2m} + S^{(2)} \right) \chi_k^{(2)} + s^{(4)} \psi_k^{(0)}, \nonumber \\ s^{(4)} & = & - \sum_{\ell} 2 y_{\ell} \left( \psi_{\ell}^{(0)} \chi_{\ell}^{(2)*} + \psi_{\ell}^{(0)*} \chi_{\ell}^{(2)} \right) + {\cal F}, \label{C13} \\ {\cal F} & = & - \frac{2}{3} \sum_{\ell} y_{\ell}^3 |\psi_{\ell}^{(0)} |^2 - \frac{1}{12m^2} \partial_x^2 S^{(2)} + \frac{1}{2m} \left( S^{(2)} \right)^2 \nonumber\end{aligned}$$ now independent of $\gamma$. They have the structure of a system of inhomogeneous, linear PDE’s. The only input needed from the massless GN model are the LO quantities $\psi_k^{(0)}, S^{(2)}$. Since the solutions of Eqs. (\[C11\]) in the chiral limit can be inferred from the analytically known exact solutions simply by Taylor expansion, there is no need to ever solve the complicated equations (\[C11\]) at $\gamma=0$. Solving Eq. (\[C13\]) yields the solutions for all values of $\gamma$ at once. The inhomogeneity has now been isolated in the term ${\cal F}\psi_k^{(0)}$. At this point, before turning to the solution, we can perform a non-trivial consistency check of our formalism. Since we know that all corrections must vanish in the static case, we expect that ${\cal F}=0$ if all solitons are at rest. In the static case, the $x$ and $t$ variables can be separated by going to stationary states, $$\psi_k^{(0)}(x,t) = e^{i \epsilon_k t} \phi_k^{(0)}(x), \label{C14}$$ where $\phi_k^{(0)}(x)$ is the eigenfunction of the LO Hamiltonian with eigenvalue $\epsilon_k$, $$\left( - \frac{1}{2m} \partial_x^2 + S^{(2)} \right) \phi_k^{(0)}(x) = \epsilon_k \phi_k^{(0)}(x), \quad \epsilon_k = - \frac{m y_k^2}{2}. \label{C15}$$ $S^{(2)}$ is defined as above, Eq. (\[C10\]). Choosing the $\phi_k^{(0)}$ to be real, it becomes $$S^{(2)} = - \sum_{\ell} 2y_{\ell} (\phi_k^{(0)})^2. \label{C16}$$ A simple exercise with Computer Algebra is the following: Evaluate $\partial_x^2 S^{(2)}$ and eliminate the 2nd derivatives of the time independent wave functions with the help of the NLS equation (\[C15\],\[C16\]). Then differentiate the resulting ${\cal F}$ with respect to $x$. If one eliminates once again $\partial_x^2 \phi_k^{(0)}$ using (\[C15\]), one finds that $\partial_x {\cal F}=0$, i.e., ${\cal F}$ is constant in the static case. Since it obviously vanishes asymptotically, it has to be identically zero. For time dependent problems this proof fails and we cannot avoid solving the inhomogeneous, linear system of PDE’s, Eq. (\[C13\]). Method of solution {#sect4} ================== So far, things are valid for any number and type of scatterers. Let us first look at the trivial case of a single baryon, where we would expect no correction at all, since there is a frame in which it is static. In this case the inhomogeneous term in Eq. (\[C13\]) must vanish, so that the system of equations admits the trivial solution $\chi_{1}^{(2)}=0$. As the single baryon of the massive GN model has the same structure as the original Dashen-Hasslacher-Neveu (DHN) baryon of the massless model [@16], we shall refer to the single baryon as DHN baryon. For the single DHN baryon with size parameter $y$ and velocity $v$ and using units where $m=1$ from now on, we have $$S^{(2)} = -2y | \psi_1^{(0)} |^2 = -4 y^2 \frac{U_1}{(1+U_1)^2}, \ \ U_1 = e^{2y(x-vt)} \label{D1}$$ This yields indeed ${\cal F}=0$ when inserted into (\[C13\]). The first non-trivial example is scattering of two DHN baryons. In view of the exploratory character of our study, we simplify things as much as possible. We take two identical DHN baryons ($y_1=y_2=y$) in the center-of-mass (cm) frame ($v_1 = - v_2 = v$). Eq. (\[C13\]) then becomes $$\begin{aligned} \left( i \partial_t + \frac{1}{2} \partial_x^2- S^{(2)} \right) \chi_k^{(2)} & = & -2 y \psi_k^{(0)} \sum_{\ell} \left( \psi_{\ell}^{(0)} \chi_{\ell}^{(2)*} + \psi_{\ell}^{(0)*} \chi_{\ell}^{(2)} \right) + {\cal F} \psi_k^{(0)}, \nonumber \\ {\cal F} & = & \frac{y^2}{3}S^{(2)} - \frac{1}{12} \partial_x^2 S^{(2)} + \frac{1}{2} \left( S^{(2)} \right)^2 \label{D2}\end{aligned}$$ The solution of the LO problem is well known [@9; @10], $$\begin{aligned} S^{(2)} & = & -4 y^2 v^2 \frac{v^2 U_1(1+4 U_2 + U_1U_2)+(v^2+y^2)U_2(1+U_1U_2)}{{\cal D}^2}, \nonumber \\ \psi_1^{(0)} & = & -i v \sqrt{2y U_1} \frac{v+(v+iy)U_2}{\cal D} e^{i(t(y^2-v^2)/2+vx)} , \nonumber \\ \psi_2^{(0)} & = & -i \frac{v-iy}{\sqrt{y^2+v^2}} v \sqrt{2y U_2} \frac{(v+iy)+vU_1}{\cal D} e^{i(t(y^2-v^2)/2-vx)} , \nonumber \\ {\cal D} & = & v^2(1+U_1)(1+U_2) + y^2 U_2 , \nonumber \\ U_1 & = & \lambda^{-1} e^{2y(x-vt)}, \quad U_2 = \lambda e^{2y(x+vt)}, \quad \lambda= \frac{v}{\sqrt{v^2+y^2}}. \label{D3}\end{aligned}$$ The prefactors $\lambda^{-1}, \lambda$ in $U_{1,2}$ just shift the variables $x,t$ by a constant and have been chosen so as to slightly simplify the NLO terms in the chiral limit. The entries in Eq. (\[D3\]) can be inferred from the known exact solution by transforming from the chiral representation of Dirac matrices used in Ref. [@9] to the Dirac-Pauli representation, replacing $y\to \epsilon y, v\to \epsilon v, x\to \epsilon^{-1}x, t \to \epsilon^{-2} t$ and performing a Taylor expansion in $\epsilon$ to LO. The phases of the two bound state spinors are of course arbitrary, but must be chosen such that there are no linear terms in $\epsilon$ in Eq. (\[C1\]). One can easily verify that the quantities in (\[D3\]) satisfy the LO equations and the normalization condition. Using this input, ${\cal F}$ turns out to be significantly simpler than its three constituent terms, $${\cal F} = \frac{16 v^4 y^4 U_1U_2}{{\cal D}^2}. \label{D4}$$ This is non-zero only when the two baryons overlap. Asymptotically, ${\cal F}$ vanishes and one has to deal with coupled, homogeneous, linear PDE’s for $\chi_k^{(2)}, \chi_k^{(2)*}$. Consider the homogeneous system first, since this already provides us with valuable information about the possible outcome of a baryon-baryon collision in the massive GN model. We discuss separately the situation before and after the collision. The incoming channel consists of two well separated DHN baryons. Here, we already know that there are no bare mass corrections, except for the relationship between $y$ and $\nu$. Hence we can assume the initial condition $\chi_k^{(2)} = 0 $ for $t\to - \infty$ for $k=1,2$. After the collision, the possible final states are determined by the non-trivial solutions of the homogeneous system $$\begin{aligned} & & \left( i \partial_t + \frac{1}{2} \partial_x^2 + 2y \sum_{\ell} |\psi_{\ell}^{(0)}|^2 \right) \chi_k^{(2)} \nonumber \\ & = & -2 y \psi_k^{(0)} \sum_{\ell} \left( \psi_{\ell}^{(0)} \chi_{\ell}^{(2)*} + \psi_{\ell}^{(0)*} \chi_{\ell}^{(2)} \right) . \label{D5}\end{aligned}$$ Since the TDHF approach cannot give the complete information about individual reaction channels but treats them only in an average way (due to the assumption of a single Slater determinant), we expect a superposition of different final states. The weights of specific states can only be determined by solving the full, inhomogeneous system of PDE’s (\[D2\]) numerically. The homogeneous system (\[D5\]) can actually be solved analytically as follows. Suppose we can find a small deformation of the unperturbed solution $\psi_k^{(0)}$ of the NLS equation (\[C10\]) such that the result is again a solution, $$\left( i \partial_t + \frac{1}{2} \partial_x^2 + 2 y \sum_{\ell} |\psi_{\ell}^{(0)} + \delta \psi_{\ell}^{(0)}|^2 \right) \left(\psi_k^{(0)} + \delta \psi_k^{(0)} \right) = 0 \label{D6}$$ Linearizing Eq. (\[D6\]) in $\delta \psi_k^{(0)}$ yields a solution of Eq. (\[D5\]), namely $\chi_k^{(2)} = \delta \psi_k^{(0)}$. If the deformation can be taken to be infinitesimal, i.e., if the solution $\psi_k^{(0)}+\delta \psi_k^{(0)}$ is continuously connected to the unperturbed solution $\psi_k^{(0)}$, this solution will be exact. Thus, in order to survey the possible asymptotic solutions $\chi_k^{(2)}$, all we have to do is list the solutions of the NLS equation that can be obtained by a continuous deformation of the unperturbed solution (\[D4\]). This should already enable us to characterize the possible final states in a baryon-baryon collision of the massive GN model. Consider the elastic channel first. A forward scattered baryon will emerge with a time delay and a phase factor. The first change corresponds to the solutions $$\chi_k^{(2)} = A_x \partial_x \psi_k^{(0)}, \quad \chi_k^{(2)} = A_t \partial_t \psi_k^{(0)} \label{D7}$$ with real coefficients $A_{x,t}$. To confirm that these are indeed exact solutions of (\[D5\]), start from the NLS equation for $\psi_k^{(0)}$ and just differentiate this equation with respect to $x$ or $t$. In order to describe the phase shift in an analogous way, multiply $\psi_k^{(0)}$ by $e^{i\delta_k}$ and insert it into the NLS equation. Differentiating with respect to $\delta_k$ then yields another solution of (\[D5\]), $$\chi_k^{(2)} = i A_k \psi_k^{(0)}, \label{D8}$$ again with real $A_k$. Clearly, the solutions (\[D7\],\[D8\]) cannot account for elastic backward scattering, expected in the massive GN model. It is not hard to find the corresponding deformation. The multi-component NLS equation $$\left( i \partial_t + \frac{1}{2} \partial_x^2 + 2 y \sum_{\ell} |\psi_{\ell}^{(0)} |^2 \right) \psi_k^{(0)} = 0 \label{D9}$$ remains valid under unitary transformations of the $\psi_k$, here under the group U(2) since $k=1,2$ only. An infinitesimal U(2) transformation can be parameterized as $$\delta \psi_k^{(0)} = i \left( \varphi {\rm \ 1}+ \vec{\theta} \cdot \vec{\tau}\right)_{k \ell} \psi_{\ell}^{(0)}. \label{D10}$$ The U(1) part and the $\tau_3$ rotation have already been accounted for by (\[D8\]), so that the only new solution we get is $$\chi_1^{(2)} = C \psi_2^{(0)}, \quad \chi_2^{(2)} = C^* \psi_1^{(0)} \label{D11}$$ with complex coefficient $C$. Since $\psi_{1}^{(0)}$ and $\psi_2^{(0)}$ are moving in opposite directions at the same speed, this is exactly what it takes to describe elastic backward scattering. We now look for deformations of $\psi_k^{(0)}$ related to inelastic processes. The simplest possibility is that the baryon changes its velocity, i.e., $$\chi_k^{(2)} = A_v \partial_v \psi_k^{(0)} \label{D12}$$ with real $A_v$. The baryon may also change its size parameter (and thereby fermion number). Due to the factor of $2y$ in the potential $S^{(2)}$, we cannot simply differentiate $\psi_k^{(0)}$ with respect to $y$ in this case. A simple calculation shows that the following modified expression is an exact solution of (\[D5\]), $$\chi_k^{(2)} = A_y (2y + \partial_y) \psi_k^{(0)}. \label{D13}$$ Presumably, this does not yet exhaust all possibilities. It is known that the (multi-component) NLS equation possesses solutions with more than one soliton in each component [@17]. We have not found a simple way of relating these multi-soliton solutions continuously to the standard solution, but cannot rule out such a possibility. Then these more complicated solutions of the NLS equation might also play some role in inelastic processes. In the present work, we shall not consider multi-soliton deformations any further, but see how far we can get with the above, simplest solutions. Eventually, we must solve the inhomogeneous system of PDE’s (\[D2\]) numerically. Since this problem amounts to solving an inhomogeneous, time dependent Schrödinger equation with time dependent Hamiltonian, a number of numerical methods are available in the literature. We follow the method described by Puzynin et al. [@18]. It is a higher-order stable operator-difference scheme, generalizing the Crank-Nicolson scheme. It can be derived from the Magnus expansion of the evolution operator for one time step. We actually used the 2nd order variant described in detail in Ref. [@18]. In order to solve the equation $$i \frac{d\psi(t)}{dt} = H(t) \psi(t)+ Q(t), \label{D14}$$ one divides the temporal interval $[0,T]$ into $K$ steps of length $\tau$ ($t_k=k \tau, k=0,1,...,K$). We also need the intermediate points $t_{k+1/2} = t_k+\tau/2$ and denote $\psi^k = \psi(t_k), \psi^{k+1/2}=\psi(t_{k+1/2})$. Define $$\begin{aligned} F_k & = & H(t_{k+1/2}) + \frac{\tau^2}{24} \ddot{H}(t_{k+1/2})- i \frac{\tau^2}{12} \left[ \dot{H}(t_{k+1/2}), H(t_{k+1/2}) \right], \nonumber \\ Q_1^k & = & \frac{1}{2} Q(t_k) + \frac{\tau}{12} \left[ \dot{Q}(t_k) + i H(t_k)Q(t_k) \right], \nonumber \\ Q_2^k & = & \frac{1}{2} Q(t_{k+1}) - \frac{\tau}{12} \left[ \dot{Q}(t_{k+1}) + i H(t_{k+1})Q(t_{k+1}) \right]. \label{D15}\end{aligned}$$ Then the step from $t_k$ to $t_{k+1}$ goes as follows, $$\begin{aligned} \left( 1- \frac{1}{4} \tau \alpha F_k \right) \psi^{k+1/2} & = & \left(1-\frac{1}{4} \tau \alpha^* F_k \right) \left( \psi^k -i \tau Q_1^k \right), \nonumber \\ \left( 1+ \frac{1}{4} \tau \alpha^* F_k \right) \left( \psi_{k+1} + i \tau Q_2^k \right) & = & \left(1+\frac{1}{4} \tau \alpha F_k \right) \psi^{k+1/2} , \label{D16}\end{aligned}$$ with $\alpha = 1/\sqrt{3}-i$. If we choose a spatial grid with $M$ points, $H$ and $F$ will be $4M \times 4M$ matrices due to the coupling of $\chi_1, \chi_2, \chi_1^*, \chi_2^*$. Similarly, $\psi$ and $Q_{1,2}$ are $4M$ component vectors. Consequently, Eqs. (\[D16\]) are two systems of $4M$ linear, inhomogeneous algebraic equations which can be solved by standard methods. In the particular case at hand, due to the symmetry of the scatterers and of the initial conditions, it is actually possible to reduce the dimension by a factor of 2 by restricting $x$-space to a half line. The number of mesh points in time and space were chosen such that a further increase would not show up in the figures below. We found that 250 points on the time axis and 250 points on half the space axis were adequate. In this case, all numerical computations could still be done with Maple. Results {#sect5} ======= A necessary condition for being able to trust the results is that we work in a regime where the non-relativistic expansion converges well in the massless limit. Since we know the exact result in this case, this is something which can be checked. To this end, we have computed the scalar mean field $S$ and the bound state spinors $\psi_{1,2}$ for scattering of two DHN baryons in the cm frame analytically. We then introduce the parameter $\epsilon$ ($y \to \epsilon y, v \to \epsilon v, x \to x/\epsilon, t \to t/\epsilon^2$) and expand potential and spinors in $\epsilon$ to NLO. The resulting expressions are too long to be shown here, but can readily be generated by Computer Algebra. We have also checked that this indeed solves Eq. (\[C11\]) at $\gamma=0$, a useful further test of the above formalism. We then compare the exact results with the LO and NLO approximations by looking at animations of the corresponding plots throughout the whole collision process. We identify the region in ($y,v$)-parameter space where the difference between LO and NLO is of the order of 10$\%$, but the difference between NLO and the exact result of the order of a few $\%$ only. One example of a snapshot of such a survey is shown in Figs. \[fig1\],\[fig2\],\[fig3\] for $y=0.5, v=0.3$. The result of this search is the region $0.4 \le y \le 0.6$, $0.1 \le v \le 0.6$. There we are in a situation where the NLO approximation is quantitatively reliable in the massless limit. The corrections which we compute for the non-integrable, massive model then also have a good chance of being trustworthy. We cover this preferred parameter region with 18 points in steps of $\Delta y=0.1, \Delta v =0.1$. Outside this region, the NLO corrections are either negligible or too big to truncate the non-relativistic expansion after two terms. We now turn to the results of solving the inhomogeneous system of PDE’s (\[C13\]) numerically. In the following subsections, we discuss backward and forward scattering separately. Backward scattering {#sect5a} ------------------- Backward scattering has the unique feature that the result for $\gamma=0$ is strictly zero, due to the integrability of the massless GN model. Hence the correction proportional to $\chi_k^{(2)}$ in Eq. (\[C12\]) represents the full wave function $\psi_k$ in this region. Since this is of O($\epsilon^2$), the density of backward scattered fermions resulting from the $k$-th bound state, $$\rho_k = \left( \frac{\gamma}{1+\gamma} \right)^2 |\chi_k^{(2)}|^2, \label{E1}$$ is correct, although it is of O($\epsilon^4$) and we have only been working to O($\epsilon^2$). Integration over the negative half-axis then yields the reflection coefficient $R$ and a “reduced" reflection coefficient $R'$, $$R = \left( \frac{\gamma}{1+\gamma} \right)^2 R', \quad R' = \int_{-\infty}^0 dx |\chi_k^{(2)}|^2. \label{E2}$$ These are also of O($\epsilon^4$), but can be trusted for the same reason. In Fig. \[fig4\], we give an overview of our results for the backscattered, “reduced" density (i.e., expression (\[E1\]) without the $\gamma$-dependent factor) for $y=0.5$, after the collision. At the lower velocities, one sees a clear peak, gradually decreasing towards the highest velocity. For $y=0.4$ and $y=0.6$, the results look similar and need not be shown here. In order to understand the nature of the peak, we confront it with our theoretical expectation based on solutions of the homogeneous PDE’s (\[D5\]). The only candidate for backward scattering which we have identified in Sect. \[sect4\] is Eq. (\[D11\]) describing elastic scattering. In Figs. \[fig5\] and \[fig6\] we compare the numerically calculated $|\chi_1^{(2)}|^2$ and $\chi_1^{(2)}$ at $y=0.5$ and the lowest velocity, $v=0.1$, to (\[D11\]). We get perfect agreement between numerical calculation and analytical prediction for the value $C= 0.110-0.022 i$. The fact that backward scattering at the lowest energy is purely elastic is confirmed by comparable fits at the other two values of $y$, yielding $C=0.066-0.016i$ at $y=0.4$ and $C=0.167-0.027i$ at $y=0.6$. If we move to higher velocities, a background is appearing below the elastic peak, see Fig. \[fig7\] for an example of the reduced density at $y=0.5, v=0.4$. At the same time, the fit to the elastically backscattered wave function deteriorates, see Fig. \[fig8\]. The background can only be due to the onset of inelastic processes at higher energies, but so far we are lacking a way of analyzing it quantitatively. At $y=0.5$ and the highest velocity, $v=0.6$, the background becomes even more prominent, see Fig. \[fig9\], and a fit with the elastic wave function impossible due to interference with the large, unknown background. To illustrate the $y$ dependence, we show the corresponding plots at $y=0.4$, Fig. \[fig10\], and $y=0.6$, Fig. \[fig11\]. Evidently, the ratio of elastic peak to inelastic background increases with decreasing $y$. This is what one would expect qualitatively, since the fermions are more loosely bound for smaller $y$, cf. Eq. (\[C15\]). Finally, Fig. \[fig12\] shows the reduced reflection coefficient $R'$ for all calculated points. It differs from the reflection coefficient $R$ by a $\gamma$-dependent factor, see Eq. (\[E2\]). It is impossible to neatly separate elastic scattering from the inelastic background, since everything is coherent in TDHF. To get at least a rough idea, we have fitted the smooth background by a 2nd order polynomial in $x$ and subtracted it, assuming incoherence. Fig. \[fig12\] shows both the total and elastic values of $R'$ thus obtained. Forward scattering {#sect5b} ------------------ In the case of forward scattering it would not make sense to plot the density $|\chi_k^{(2)}|^2$. Since the LO contribution is non-vanishing, a quantity of O($\epsilon^4$) cannot be trusted here. The relevant physical observable of O($\epsilon^2$) is the NLO change in density due to the bare fermion mass, $$\delta \rho_1 = \left( \frac{\gamma}{1+\gamma} \right)^2 \delta \rho_1', \quad \delta \rho_1' = \psi_1^{(0)} \chi_1^{(2)*} + \psi_1^{(0)*} \chi_1^{(2)}. \label{E3}$$ We first give an overview of our numerical results for $\delta \rho_1'$ at $y=0.5$ in Fig. \[fig13\]. The solution of the TDHF equation yields the whole time evolution of $\delta \rho_1'$, but here we only show a snapshot taken after the collision. As $v$ increases, the curves transform from an antisymmetric into a symmetric shape. In order to highlight the transition between these two extrema, we have included one extra point along the $v$-axis where $\delta \rho_1'$ is close to zero ($v=0.45$). The shapes of the extremal curves at $v=0.1$ and $v=0.6$ have a simple interpretation. Since $\delta \rho_1'$ is the difference between two bell-shaped densities, at $v=0.1$ the curves indicate a spatial shift between the densities, as expected in purely elastic scattering. The shape at $v=0.6$ on the other hand is suggestive of a change in the width of the density, consistent with inelastic reactions where the size parameter $y$ (and therefore fermion number) changes. Let us test this interpretation against the analytical, asymptotic predictions discussed in Sect. \[sect4\]. If baryon-baryon scattering in the massive GN model is purely elastic, $\chi_1^{(2)}$ must be proportional to a linear combination of $\partial_x \psi_k^{(0)}$, $\partial_t \psi_k^{(0)}$ and $i \psi_k^{(0)}$ with real coefficients, see Eqs. (\[D7\],\[D8\]). The first two solutions account for a change in time delay and cannot be distinguished here, the 3rd accounts for a change in the forward scattering phase shift. Figs. \[fig14\] and \[fig15\] show a corresponding fit at $y=0.5,v=0.1$, $$\delta \rho' = A \partial_x |\psi_1^{(0)}|^2, \quad \chi_1^{(2)} = ( A \partial_x + i B) \psi_1^{(0)}, \label{E4}$$ with $A=-0.130, B=-0.0707$. Thus at the lowest velocity $v=0.1$, everything is consistent with purely elastic scattering, both in forward and backward direction. At higher values of $v$, it is difficult to find any satisfactory fit with the available basis functions. By way of example, consider $y=0.5, v=0.6$ where inelastic processes are expected to be important. In Fig. \[fig16\], we have tried to fit $\delta \rho_1'$ with a linear combination of solutions (\[D7\]) and (\[D13\]), i.e., $$\delta \rho_1' = \left[ A \partial_x + B (4y+ \partial_y) \right] |\psi_1^{(0)}|^2. \label{E5}$$ Even the best fit values $A=0.00195, B=-0.00599$ are not satisfactory, although the shape of the curve is qualitatively reproduced. Taking into account the further inelastic solution (\[D12\]) does not improve matters, so that our parametrization of the inelastic solutions is obviously incomplete. As mentioned in Sect. \[sect4\], one could perhaps generate further candidates by considering multi-soliton solutions of the single component NLS equation, but this is left for future work. So far, all results for forward scattering shown refer to $y=0.5$. We have performed the same kind of calculations at $y=0.4$ and $0.6$ as well. The plots analogous to Fig. \[fig13\] look similar, except that the transition from “shift" to “broadening" type shapes happens around $v=0.35$ at $y=0.4$ and $v=0.55$ at $y=0.6$. Thus, elastic scattering prevails up to higher energies for larger values of $y$, as already noticed in backward scattering. For all 3 values of $y$, the fit (\[E4\]) is excellent at $v=0.1$, with parameters $A=-0.0826, B=-0.0527$ at $y=0.4$ and $A=-0.150, B=-0.081$ at $y=0.6$, confirming elastic scattering dominance at the lowest velocity considered. Recall that there are two independent corrections to the fermion density of O($\epsilon^2$). The first one arises from relativistic corrections to the NLS equation at $\gamma=0$ (“fine structure" and vacuum polarization type effects), discussed above in the context of Figs. \[fig1\],\[fig2\],\[fig3\]. It is present in the massless GN model, does not destroy integrability and can be computed in closed analytical form. The second one is $\delta \rho_1$ from Eq. (\[E3\]) originating from the bare mass term and to be computed numerically. It is interesting to compare these two corrections to the LO density and to each other. This is done in Fig. \[fig17\] for $y=0.5, v=0.1$ (purely elastic scattering) and in Fig. \[fig18\] for $y=0.5, v=0.6$ (important inelastic contribution). For better visibility, the two NLO corrections have been multiplied by 5. In the elastic scattering case, Fig. \[fig17\], the two corrections almost coincide, but this is most likely accidental. Both corrections go into the same direction of decreasing the time delay. In Fig. \[fig18\] where inelastic scattering plays a role, the relativistic correction is an order of magnitude larger than the mass correction and has opposite sign, but the shapes of the curves are again similar. The sign of the mass correction is such that the unperturbed density gets broadened, as one would expect from inelastic reactions where $y$ (and therefore fermion number) should decrease. We finish with a remark about conservation of fermion number. The integral over the $x$-axis of both NLO contributions to the density in forward scattering vanishes, as we have checked numerically. The LO density is normalized to 1. Hence the total number of forward scattered fermions is the same in the massless and massive models. Nevertheless, we have computed a reflection coefficient of O($\epsilon^4$) in the massive GN model, whereas it vanishes in the massless limit. There is no contradiction between these findings. In forward direction, all we have shown is the vanishing of the O($\epsilon^2$) contribution. In order to check the expected reduction of the forward scattered fermions of O($\epsilon^4$), it would be necessary to do a full NNLO calculation. This is clearly impossible with the formalism developed so far. Summary and conclusions {#sect6} ======================= Recent progress on baryon-baryon scattering in the massless GN model owes much to the fact that this is an integrable quantum field theory. This enables us to compute analytically processes as complex as the collision between relativistic, composite particles. Unfortunately, the physical phenomena which can be studied in this manner are also severely limited by integrability. As is often the case, the same facts which make a system exactly solvable also render it somewhat unphysical. Only elastic forward scattering is allowed, no matter at what energy one collides which types of projectiles. This motivates us to turn our attention to non-integrable toy models promising a richer dynamics, like backscattering and inelastic reactions. Unlike real particle production, break-up processes should not be suppressed at large $N$, so that the massive GN model is a good candidate for exploring the transition from integrable to non-integrable systems with semi-classical methods. Since a full numerical TDHF calculation seems to be exceedingly hard even in such a toy model, we had to compromise and focus on the vicinity of the non-relativistic regime. In this case, one can take advantage of the benefits offered by an effective no-sea theory applicable here. This enables us to formulate the TDHF problem in a manner close to non-relativistic many-body theory, based on a time dependent Schrödinger equation and systematically calculable relativistic and quantum field theoretic corrections. The result of such a calculation is a quantitative field theoretic calculation with controlled approximations and without adjustable parameters. This paper is actually the first successful application of the effective no-sea theory of Ref. [@12] to a problem which has not been addressed by any other method before. Our first important result was rather easy to get at, but is nonetheless quite interesting: In the non-relativistic limit, the multi-component NLS equation can be used to solve scattering problems both in the massless and massive GN models. To LO, integrability is maintained, even in time dependent problems. This extends the region of applications where the massive and massless GN models are equally tractable by analytical methods from static and thermodynamic problems to dynamical problems, at least at very low energies. The second and more difficult part of the investigation concerns the NLO corrections. This is more interesting, because it shows the onset of physical processes absent in integrable models, like backscattering and inelastic reactions. Relativistic and quantum field theoretic corrections usually associated with spectroscopy (fine structure, Lamb shift) now break integrability and induce these forbidden processes. Thanks to our restriction to a certain parameter range, we could reduce the task to a system of coupled, inhomogeneous, linear PDE’s amenable to numerical solution by standard methods. The possible final states of a baryon-baryon collision can be obtained analytically by solving the corresponding homogeneous system. They are related to a certain class of solutions of the multi-channel NLS equation. The picture emerging from backward scattering is perhaps the cleanest. We find a prominent elastic peak at low velocities above a smooth background. This background is steadily rising with increasing energy. Quantitative agreement with density and wave functions at the lowest velocity has been achieved by assuming purely elastic backward scattering. It is possible to determine the reflection coefficient and the phase of the backscattered wave function quantitatively. At higher velocities, a similar analysis is hampered by our inability to parametrize the inelastic background. A well known problem characteristic of the TDHF approach is the fact that different reaction channels are hard to disentangle, since they enter in a coherent, average way due to the assumption of a single Slater determinant. Interesting findings are the fact that the $\gamma$ dependence is somehow trivial, so that one does not have to repeat the calculation for different $\gamma$’s, and that a reflection coefficient of O($\epsilon^4$) can be computed reliably, even though the whole calculational scheme is truncated at O($\epsilon^2$), This is unique for a correction to an integrable model where backscattering vanishes to LO. In forward scattering, since the LO term does not vanish, the NLO terms are always interference terms and harder to interpret. Again, the cleanest result is elastic scattering which exhausts what we see at $v=0.1$. We can compute the change in time delay and in scattering phase shift due to the bare mass, again with a factorized $\gamma$-dependence. The interference with inelastic processes on the other hand is impossible to analyze in detail with our methods. At the highest velocity studied, we see qualitatively that the density is broadened in $x$-space, corresponding to lower $y$ or loss of fermion number. The qualitative change in the density from shift to broadening with increasing energy and at all $y$-values is conspicuous. Thus there is no doubt that we have seen both backscattering and inelastic reactions in the NLO calculation, unlike at LO. [99]{} D. J. Gross and A. Neveu, Phys. Rev. D [**10**]{}, 3235 (1974). A. Barducci, R. Casalbuoni, M. Modagno, G. Pettini, R. Gatto, Phys. Rev. D [**48**]{}, 5883 (1993). J. Feinberg and A. Zee, Phys. Lett. B [**411**]{}, 134 (1997). M. Thies and K. Urlichs, Phys. Rev. D [**71**]{}, 105008 (2005). J. Feinberg and S. Hillel, Phys. Rev. D [**72**]{}, 105009 (2005). M. Thies and K. Urlichs, Phys. Rev. D [**72**]{}, 105008 (2005). O. Schnetz, M. Thies, K. Urlichs, Ann. Phys. [**321**]{}, 2604 (2006). M. Thies, J. Phys. A: Math. Gen. [**39**]{}, 12707 (2006). G. V. Dunne and M. Thies, Phys. Rev. D [**89**]{}, 025008 (2014). G. V. Dunne and M. Thies, Phys. Rev. D [**84**]{}, 105014 (2011). D. Fernandez-Fraile, Phys. Rev. D [**83**]{}, 065001 (2011). F. Karbstein and M. Thies, Phys. Rev. D [**77**]{}, 025008 (2008). A. J. Niemi and G. W. Semenoff, Phys. Rep. [**135**]{}, 99 (1986). S. A. Brazovskii and N. N. Kirova, JETP Lett. [**33**]{}, 4 (1981). Gordon Baym, [*Lectures on Quantum Mechanics*]{}, Benjamin/Cummings, Reading, Mass. (1969). R. F. Dashen, B. Hasslacher, A. Neveu, Phys. Rev. D [**12**]{}, 2443 (1975). Y. Nogami and C. S. Warke, Phys. Lett. A [**59**]{}, 251 (1976). I. V. Puzynin, A. V. Selin, S. I. Vinitsky, Comp. Phys. Comm. [**126**]{}, 158 (2000). [^1]: michael.thies@gravity.fau.de
Jose Work Readiness Program Jose grew up in the Tierra Vida community. His family was one of the first to move into the apartments back when they were first built. His is currently attending Columbia Basin College and is working towards a degree in social work. In 2015 Jose went through our youth barista training program and excelled. In… September 15, we had a domestic incident take place in our community, that resulted in a loss of life. When something like this happens it shakes the whole community, people feel scared, and they have a lot of questions. Community members first gathered the day after the incited, in the Rec Center, for a prayer… Joined our program in August of 2017. This was her very first job. We saw so much growth in her through the 10 months that she was here. Miranda graduated the program in July 2018. She is now working at a local retirement home, serving the elderly. We are so proud of her! I joined… Genesis’ family fled Venezuela and came to the United Stated in search of a better life. Genesis was 14 when her parents picked themselves up along with her younger sister and moved to the U.S. Genesis stayed behind but eventually joined her family at the age of 16. Her family moved to the Tierra Vida… Throughout my life, I have struggled with addiction, emotional issues, and bad relationships. It was not until 2015 that my addiction and bad choices caused me to have a run in with the law and I was entered into the Benton County Adult Drug Court Program. This was an alternative to jail and a way… Ashley Duarte is moving to Seattle this weekend to begin college! She and her family were one of the first families to purchase a home in Tierra Vida. After 10 years, Tierra Vida has become a flourishing and growing community. Ashley recently graduated from Chiawana High School. Sh. She was born in a family of… Working at the Center for Sharing has been a blessing in so many ways and I am so fortunate that they came into my life at the time that they did. Before I got here, I was a mess. I had relationship problems and was in and out of jail. I had lost my apartment… When I first came to the Center for Sharing 3 years ago, I was at one of the lowest points in my life. I was in a very abusive relationship, had a 2-year-old little girl, Aleena, and zero hope that anything would ever change or be different. I had feelings and emotions that were bottled… Growing up in Mexico, Carla was exposed to many hardships, ones that a child should never have to see or be a part of. One thing that became clear very quickly, was that moving to Washington State was not the paradise they thought it was going to be. Many issues between her parents came to… My name is Cecilia Stetson. I am twenty-six years old, married, and live in California. Before getting married, I worked at the Center for Sharing. Their program (work readiness program) helped me so much. When I started working at the Center for Sharing, I was also working on getting my diploma. Cheryl and other Center…
namespace ClassLib071 { public class Class058 { public static string Property => "ClassLib071"; } }
Q: How to find whether phone is in sleep/idle mode for Android How to find whether phone is in sleep/idle mode for Android? My problem is I am able to wake up the phone from sleepmode by using alarm manager But when the phone is not sleep mode and at the same instant if Alarm manager is used to wake the phone..android force closes the App.. whether there is anyway to find whether the Phone is in sleep or idle mode?(Black screen) Update: My requirement: When the phone is in sleep mode ---> Intent should be launched from the service When the phone is not in sleep mode --> The same Intent should be launched from the service None of the solutions below worked perfectly so here is my little tweak which worked perfectly :):) //Pending intent for my alarm manager Intent intentaa=new Intent(this,MyBroadcastReceiver.class); PendingIntent pendingIntent = PendingIntent.getBroadcast(this, 0, intentaa, 0); //Intent to be launched where MyIntent is the intent Intent intenta = new Intent(); intenta.setClass(this, MyIntent.class); intenta.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); //Real code try { startActivity(intenta); }catch(Exception E) { AlarmManager am = (AlarmManager)getSystemService(ALARM_SERVICE); am.set(AlarmManager.ELAPSED_REALTIME_WAKEUP,SystemClock.elapsedRealtime(), pendingIntent); startActivity(intenta); } A: You can check if the screen is turned off by calling isScreenOn method. Note:This only can be used for 2.1 and above.. A: isScreenOn method returns only if the screen is on or off. It does not indicate the sleepy mode, because Android sleep mode is not same as Android screen off mode. In Android, sleep mode might come within milliseconds (depending on wakelocks) after screen off (idle mode) - but that's not guaranteed (referring to this post). I think you can try using SystemClock.uptimeMillis(),SystemClock.elapsedRealtime() comparison. A: Check out isInteractive() PowerManager pm = (PowerManager) context.getSystemService(Context.POWER_SERVICE); if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.KITKAT_WATCH) { return pm.isInteractive(); } else { return pm.isScreenOn(); }
DES MOINES — Jane Meyer testified Thursday morning that Gene Taylor, who replaced her as second-in-command at the University of Iowa’s athletics department, inherited 45 percent of her duties and was given a much higher salary. “I didn’t see a whole lot coming out of (Taylor’s) office,” she said. Meyer, who was UI’s associate athletics director who worked for the department from 2001 to 2014, is suing the university for gender and sexual orientation discrimination, and for retaliation after she complained about the 2014 firing of her partner, field hockey Coach Tracey Griesbaum. The trial got underway this week in Polk County District Court. On the stand for the second day, Meyer noted Taylor was hired in 2014 at a starting salary of $245,000, over $70,000 more than she was earning in what she said was essentially the same role but with more duties. Asked if she was troubled by the salary differences, she said “Yeah, it was disturbing. (Taylor) was not doing as much work, not even half the work” she had been doing before he arrived.
Today the New York Civil Liberties Union is releasing a free smartphone app that will allow users to record and report interactions with the police and submit them directly to the organization in real time. The app, called Stop & Frisk Watch, is available in English and Spanish-language versions for Android users; an iPhone version will be released later this summer. "We wanted to empower people to have a tool to fight back against discriminatory policing and this seemed like the easiest way to do that," NYCLU's communication director Jennifer Carnig says. Developed by Jason Van Anden, the man behind last year's protester-friendly I'm Getting Arrested app, Stop & Frisk Watch is equally as simple to use. There are three main features: Record, Listen, and Report. Record allows the user to take video of the incident that is immediately sent to the NYCLU. Listen broadcasts the phone's location to other users and prompts a text alert when people in their vicinity are being stopped by the police, and Report allows the user to describe the encounter they witnessed. We were able to use every function besides Listen (there are no other users at the moment), and all worked smoothly. The app's settings also allow the user to input their name, phone number, and email, but a disclaimer warns, "There may be situations where the NYCLU may be legally required to disclose this information, such as when the NYCLU receives a subpoena." Carnig says the NYCLU will be "encouraging app users to include their personal information so we can follow up with them if we need to, but we won’t be tracking people down if they wish their identity to remain anonymous." That concern is a real one, especially considering that the Manhattan DA's office has subpoenaed Twitter accounts of Occupy Wall Street protesters. Will authorities be able to identify a phone based on information anonymously transmitted to the NYCLU? "No," Van Anden says. "Not that I know of." Stop & Frisk Watch also warns users to "Remain a safe distance from any police encounter you are documenting so that you do not physically interfere with the police activity." Carnig tells us, "The app is intended for use by people witnessing a police encounter, not by individuals who are the subject of a police stop," noting that reports can always be filed after the fact. Our only complaint was that the app doesn't use the GPS in your phone to fill in the "location" of the encounter for you on the survey. "That'll be version 1.2," Van Anden promises, before pointing out that if you do choose to share your location in the Settings menu, your exact location is provided to the NYCLU when you record a video. "We didn't want to be overly reliant on the GPS in case something went wrong." Van Anden also says that if you lose service while using the app, the information is saved until it can be transmitted. As of February of this year, 49% of all cellphone users in the U.S. use smartphones, and a majority of those are Androids. According to a Pew study released in 2011, blacks and Hispanics are more likely than whites to use their cell phones for "non-voice applications" like recording videos, downloading apps, or taking photos. They're also more likely to be stopped by the police: more than 86% of the record 684,330 people stopped and frisked by the NYPD in 2011 were black or Latino, and 41% of the total were black or Latino men aged 14-24. (That record is on pace to be broken again in 2012.) The Pew study indicates that 66% of cellphone users aged 18-34 use smartphones, and of 18-29 year olds earning less than $30K per year, 39% own a smartphone. "We are working with community groups, labor unions, social justice organizations, elected officials and a vast network of New Yorkers who care deeply about the stop-and-frisk epidemic," Carnig says, "so we are confident that news of our tool will reach communities that have the most to gain from using it." The organization also plans to promote the app during a Father's Day march protesting stop-and-frisk abuse. As for what the organization will do with the data, Carnig says that the NYCLU plans to "use the videos we receive to put a face on what stop-and-frisk really looks like and to highlight how unjustified stops erode trust between the community and the police," and that the information stored in the reports "will be used in press work, to lobby public officials, in public education, in advocacy and potentially in litigation." Van Anden, who lives in City Council Member and fierce stop-and-frisk critic Jumaane Williams' district in Flatbush, says he's seen the effects of the NYPD's stop-and-frisk program in his neighborhood. While waiting for the train at the Newkirk Plaza station a few months ago, Van Aden saw a black teenager "crying his eyes out with his head down." A police officer was following him and demanded he empty his pockets. "The kid said he was just at his grandmothers, and more police showed up, and it was clear the kid had nothing on him," Van Anden says. "They eventually just left him alone." "That hit home," Van Anden says. "That kid on the platform—he's never going to talk to the police again. My best case scenario for this app is that it pushes the police to focus on more positive ways to interact with the community. I'd prefer for that kid to like the police."
Product Detail used as infrequent changeover of the line in normal situation. It is applicable to industrial site, commercial site, tall building and civil house KNL1 series Residual current circuit breaker(without over-current protection) is suitable for the line of AC 50/60Hz, voltage 240V(2pole)/415V(4pole), rated current up to 63A. When there is human electricity shock or if the leakage current of the line exceeds the prescribed value, it will cut off the power rapidly to protect human safety and prevent the accident due to the current leakage. It can be used as infrequent changeover of the line in normal situation. It is applicable to industrial site, commercial site, tall building and civil house. It complies with standard of IEC/EN61008.1 and GB16916.1. Each phase of conductor at the circuit breaker passes through the zero-sequence current tr ansformer, and the secondary side of coil connects with the electromagnetic tripper. Under normal condition, the vector sum of each phase of current passing through zerosequence current transformer is zero. The flux of the zero-sequence current transformer is zero. And the secondary output voltage is zero and the circuit breaker doesn t zreo, and the zero-sequence current transformer would produce the magnetic flux, and the secondary side of coil would output the voltage. Once the leak current increases to drive the output voltage at the secondary side to grow to certain level, the electromagnetic release would activate to drive the operation mechanism to act to break the contact that connects the power, finally to realize the leak protection.
"When fascism comes to America, it will be wrapped in the flag and carrying the cross." -- Sinclair Lewis Sunday, February 26, 2017 Nancy Pelosi And Her DCCC Are On Their Regular Bi-Annual Mission To Save Darrell Issa's Career Again > Friday, life-long opportunist Darrell Issa was on Bill Maher's show, Real Time, and declared himself one of the first House Republicans willing to stab Señor Trumpanzee in the back over Putin-Gate. "You cannot have somebody, a friend of mine Jeff Sessions, who was on the campaign and who is an appointee," he told Maher in regard to the question about investigating the Trump campaign. "You're going to need to use the special prosecutor's statute and office to take-- not just to recuse. You can't just give it to your deputy. That's another political appointee."High school drop out, car thief, arsonist-for-hire and general all-around hustler Darrell Issa got started in politics as an out-of-the-closet racist and then as a self-financed candidate for the U.S. Senate in 1998, losing the GOP nomination to a more mainstream Republican after spending $9.8 million of his own cash. Two years later, though, he managed to buy himself the GOP nomination for a San diego area congressional seat when Ron Packard retired. The Democrat in the race, Peter Kouvelis, gave up in the middle of the campaign complaining about the DCCC refusing to honor promises to help. Issa spent $2,304,833 to Kouvelis' $17,069. It was the beginning of a pattern. In 2002 the Democrats didn't put a candidate up against Issa at all. Two years later the DCCC refused it help Mike Byron, who raised $48,228 against Issa's $871,009 and wound up with 35% of the vote. In 2006, a huge Democratic year, it was Jeeni Criscenzo's turn to be screwed over by the DCCC and in 2008, another huge Democratic year (in which Obama beat McCain in CA-49) Robert Hamilton ran against Issa and was also hung out to dry by the DCCC. In 2010 Howard Katz got the same treatment. In 2012-- with Obama at the top of the ticket-- Jerry Tetalman expected help from the DCCC in his battle against Issa. He raised $131,168 against Issa's $2,478,710 and took 41% of the vote, the highest percentage against Issa ever. But the DCCC once again ignored the district and told the media it was unwinnable. They ignored Dave Peiser in 2014. And in 2016 the DCCC was completely prepared to do the only thing they know how to do in CA-49 (and most of the rest of the country): roll over and play dead.But something caught the DCCC unprepared-- a progressive retired marine colonel with a Bernie campaign staffer managing his race, Doug Applegate. Ignoring the DCCC entirely, grassroots progressive groups jumped into the race to help Applegate. He was able to spend $1,675,750 in the campaign (forcing Issa to spend a gargantuan $6,275,754). Confused and disoriented as usual, very late in the game the DCCC and Pelosi's House Majority PAC sensed Applegate could win and jumped in, ineffectively spending $3,231,961 on TV ads and other commissionable wastes of money. The see-saw Issa/Applegate contest was the last one to be decided in the whole country. In the end Issa won by 2,348 votes, 50.4% to 49.6%. The San Diego Union Tribune explained that "Issa, whose brush with political death came after cruising to re-election in years prior, likewise changed strategies to give more careful attention to his district. He ran a more typical campaign, complete with yard signs, town hall-style events, and a tour bus. He proposed legislation in direct response to complaints..." But Issa was a huge and early Trump supporter and the suburban San Diego/Orange County district wasn't buying Trump's fascist appeal. The district, which had given Romney a 52.4% win, handed Trump a miserable 43.2% loss. Blue America endorsed Applegate in the summer of 2016 and a few days after Issa managed to worm his way back into office we were one of the groups who urged Applegate to run again, explaining how rare it was for someone to win a congressional seat on the first try and that 2018 would be a good year for Democrats because of Trump's and Ryan's expected agenda overreach. He was the first 2018 candidate to declare and the first candidate Bblue America endorsed for 2018. (You can contribute to his campaign by tapping the ActBlue thermometer on the right.)75% of CA-49 is in San Diego County and Applegate won in those precincts with 53.1% of the vote. It was the very wealthy Orange County suburbs, though, where Issa managed to eke out his victory, winning 60.5% of the vote in areas like La Costa, Vista, Oceanside, San Clemente and Carlsbad. As of Oct. 24, the last day to register to vote, 31.2% of CA-49 voters were Democrats, while 37.8% were Republicans and 25.8% were decline to state voters.OK, so that's the background. What is the DCCC doing now, early in the game, to defeat Issa in 2018? The more progressive folks in DCCC-world are gung-ho on helping Applegate finish the job he started last year. But "the more progressive folks in DCCC-world" are a distinct minority-- or have been-- and the team that has lost and lost and lost and lost everywhere and have always made certain to screw up CA-49, want to abandon Applegate and throw their support behind a FuelCell energy lobbyist and wealthy lawyer-- an Orange County Hillary operative from 2016, Mike Levin.Pelosi, now, unfortunately, almost completely senile and a raving idiot, has promised to "push" Applegate out of the race on behalf of Levin. Crazy Nancy doesn't understand that marine colonels backed by an activated grassroots don't get pushed by a discredited and failed establishment. Levin was a regular contributor to Hillary Clinton's presidential campaign but hasn't given any money towards defeating Issa. He now sees a path for himself to take advantage of Applegate's work and run against Issa himself. The party's vile corrupted establishment, triumphed yesterday in the DNC race, and is determined to keep pushing their careerist agenda. It's time for progressives to realizer the former progressive champion they once had in Nancy Pelosi is now a very different, very unsupportable, Nancy Pelosi. For the Democratic Party to prosper, she's got to go. 5 Comments: Obama is also hugely to blame for the Democrats' disgusting Perez disaster, which won't get us anywhere. Neither he nor Pelosi apparently learned anything from their disastrous middle of the road non progressive approach to politics. Republican lite, with its corporate backing, won't get the Dems anywhere. They back lousy candidates and this will not excite the American people or serve us well if they get into office. Stupid, stupid and shortsighted, both Pelosi and Obama. Very detrimental! And since Obama is such a smart man, this is quite sad. He continues to disappoint, now that he is out of office. I am sure he read many of FDR's speeches, as unlike Trump he reads, but he clearly did not absorb the meaning. He did not take it on. His choice of what he thought was the "high road" turned out to be the road to hell. "Pelosi, now, unfortunately, almost completely senile and a raving idiot..." Let me second that. 2 years ago I was on a Capital tour when the group was asked to "make a hole" so that Pelosi could get from one side to the other (maybe to blow some new lobbyists). She was almost literally carried through by 2 male aides. She was babbling incoherently (what I heard of it, anyway) and looked and walked like Keith Richards on a 3-day bender... only not that good. And let me also opine that Pelosi may once have been an able rep for her SF district... but she could never have become the speaker nor the biggest fundraiser among the democraps if she wasn't utterly, completely, enthusiastically corrupt. She will be reviled by historians for that and her "impeachment is off the table" gamble that did win a presidency and a big house majority... for a short while. But leaving cheney in the presidency (yeah... I mean that) made us a nation of torturers and war criminals. Not a fair trade, especially when you consider the Ds' failures and betrayals in congress meant they are now in a permanent minority AND we got the D poser obamanation to make the cheney admin seem normal. Hone and ap215, you are mistaken. They did what they did precisely because they shall prosper from it. What, you think a nice slate of newly minted congresspeople that want to break up banks ala glass-steagall, jail officers of the TBTFs who fraudulently vacuumed $20 trillion from the globe, raise taxes on corporations and the rich, put the vampire squid health insurance "industry" out of business (SP), Rest the DOD by conducting peace... you think the money will keep the firehose of donations spraying??? That's why Bernie had to lose and why we were forced to choke on $hillbillary... why Ellison had to lose (there were other reasons), why Pelosi and scummer had to stay...
Cellular organization in retinal transplants using cell suspensions or fragments of embryonic retinal tissue. We have investigated the cellular organization in two different types of retinal transplants using cell type-specific monoclonal antibodies. Both fragments and cell suspensions of E17-E19 Sprague-Dawley rat retina were transplanted to a subretinal site in congenic adult rat hosts. After a survival time of 28 days, the transplants were stained by immunocytochemistry with antibodies against rhodopsin, which stained rods; with antibodies against HPC-1, which stained amacrine cells and outer and inner plexiform layers; and with antibodies against vimentin, which stained Müller cell fibers and horizontal cells. In the host retina, the distribution of immunocytochemical staining was similar, irrespective of transplantation technique. In the transplants, the anti-rhodopsin staining showed that fragment transplants developed photoreceptors in rosettes, whereas in cell suspension transplants, this staining showed a scattered distribution of photoreceptors. The HPC-1 staining showed that regions corresponding to the inner nuclear layer surrounded both types of transplants and made large invaginations into them. In one case, using the cell suspension technique, fibres were found to run from the inner plexiform layer of the transplant to the outer plexiform layer of the host. The vimentin staining revealed a disorganized array of Müller cell fibres in both types of transplants, but with some concentration to the regions corresponding to the inner plexiform layer.
// AForge Image Formats Library // AForge.NET framework // // Copyright © Andrew Kirillov, 2005-2008 // andrew.kirillov@gmail.com // namespace AForge.Imaging.Formats { using System; using System.Drawing; using System.Drawing.Imaging; using System.IO; /// <summary> /// Set of tools used internally in AForge.Imaging.Formats library. /// </summary> internal class Tools { /// <summary> /// Create and initialize new grayscale image. /// </summary> /// /// <param name="width">Image width.</param> /// <param name="height">Image height.</param> /// /// <returns>Returns new created grayscale image.</returns> /// /// <remarks><para>AForge.Imaging.Image.CreateGrayscaleImage() function /// could be used instead, which does the some. But it was not used to get /// rid of dependency on AForge.Imaing library.</para></remarks> /// public static Bitmap CreateGrayscaleImage( int width, int height ) { // create new image Bitmap image = new Bitmap( width, height, PixelFormat.Format8bppIndexed ); // get palette ColorPalette cp = image.Palette; // init palette with grayscale colors for ( int i = 0; i < 256; i++ ) { cp.Entries[i] = Color.FromArgb( i, i, i ); } // set palette back image.Palette = cp; // return new image return image; } /// <summary> /// Read specified amount of bytes from the specified stream. /// </summary> /// /// <param name="stream">Source sream to read data from.</param> /// <param name="buffer">Buffer to read data into.</param> /// <param name="offset">Offset in buffer to put data into.</param> /// <param name="count">Number of bytes to read.</param> /// /// <returns>Returns total number of bytes read. It may be smaller than requested amount only /// in the case if end of stream was reached.</returns> /// /// <remarks><para>This tool function guarantees that requested number of bytes /// was read from the source stream (.NET streams don't guarantee this and may return less bytes /// than it was requested). Only in the case if end of stream was reached, the function /// may return with less bytes read.</para> /// </remarks> /// public static int ReadStream( Stream stream, byte[] buffer, int offset, int count ) { int totalBytesRead = 0, bytesRead = 0; while ( totalBytesRead != count ) { bytesRead = stream.Read( buffer, offset + totalBytesRead, count - totalBytesRead ); if ( bytesRead == 0 ) { break; } totalBytesRead += bytesRead; } return totalBytesRead; } } }
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.drill.exec.planner.physical; import java.util.List; import org.apache.calcite.rel.RelCollations; import org.apache.calcite.util.BitSets; import org.apache.calcite.util.ImmutableBitSet; import org.apache.drill.exec.planner.logical.DrillAggregateRel; import org.apache.drill.exec.planner.logical.RelOptHelper; import org.apache.drill.exec.planner.physical.AggPrelBase.OperatorPhase; import org.apache.calcite.rel.InvalidRelException; import org.apache.calcite.rel.RelCollation; import org.apache.calcite.rel.RelFieldCollation; import org.apache.calcite.rel.RelNode; import org.apache.calcite.plan.RelOptRule; import org.apache.calcite.plan.RelOptRuleCall; import org.apache.calcite.plan.RelTraitSet; import org.apache.calcite.util.trace.CalciteTrace; import org.apache.drill.shaded.guava.com.google.common.collect.ImmutableList; import org.apache.drill.shaded.guava.com.google.common.collect.Lists; import org.slf4j.Logger; public class StreamAggPrule extends AggPruleBase { public static final RelOptRule INSTANCE = new StreamAggPrule(); protected static final Logger tracer = CalciteTrace.getPlannerTracer(); private StreamAggPrule() { super(RelOptHelper.some(DrillAggregateRel.class, RelOptHelper.any(RelNode.class)), "StreamAggPrule"); } @Override public boolean matches(RelOptRuleCall call) { return PrelUtil.getPlannerSettings(call.getPlanner()).isStreamAggEnabled(); } @Override public void onMatch(RelOptRuleCall call) { final DrillAggregateRel aggregate = call.rel(0); RelNode input = aggregate.getInput(); final RelCollation collation = getCollation(aggregate); RelTraitSet traits; if (aggregate.containsDistinctCall()) { // currently, don't use StreamingAggregate if any of the logical aggrs contains DISTINCT return; } try { if (aggregate.getGroupSet().isEmpty()) { DrillDistributionTrait singleDist = DrillDistributionTrait.SINGLETON; final RelTraitSet singleDistTrait = call.getPlanner().emptyTraitSet().plus(Prel.DRILL_PHYSICAL).plus(singleDist); if (create2PhasePlan(call, aggregate)) { traits = call.getPlanner().emptyTraitSet().plus(Prel.DRILL_PHYSICAL); RelNode convertedInput = convert(input, traits); new SubsetTransformer<DrillAggregateRel, InvalidRelException>(call){ @Override public RelNode convertChild(final DrillAggregateRel join, final RelNode rel) throws InvalidRelException { DrillDistributionTrait toDist = rel.getTraitSet().getTrait(DrillDistributionTraitDef.INSTANCE); RelTraitSet traits = newTraitSet(Prel.DRILL_PHYSICAL, toDist); RelNode newInput = convert(rel, traits); StreamAggPrel phase1Agg = new StreamAggPrel( aggregate.getCluster(), traits, newInput, aggregate.indicator, aggregate.getGroupSet(), aggregate.getGroupSets(), aggregate.getAggCallList(), OperatorPhase.PHASE_1of2); UnionExchangePrel exch = new UnionExchangePrel(phase1Agg.getCluster(), singleDistTrait, phase1Agg); ImmutableBitSet newGroupSet = remapGroupSet(aggregate.getGroupSet()); List<ImmutableBitSet> newGroupSets = Lists.newArrayList(); for (ImmutableBitSet groupSet : aggregate.getGroupSets()) { newGroupSets.add(remapGroupSet(groupSet)); } return new StreamAggPrel( aggregate.getCluster(), singleDistTrait, exch, aggregate.indicator, newGroupSet, newGroupSets, phase1Agg.getPhase2AggCalls(), OperatorPhase.PHASE_2of2); } }.go(aggregate, convertedInput); } else { createTransformRequest(call, aggregate, input, singleDistTrait); } } else { // hash distribute on all grouping keys final DrillDistributionTrait distOnAllKeys = new DrillDistributionTrait(DrillDistributionTrait.DistributionType.HASH_DISTRIBUTED, ImmutableList.copyOf(getDistributionField(aggregate, true))); traits = call.getPlanner().emptyTraitSet().plus(Prel.DRILL_PHYSICAL).plus(collation).plus(distOnAllKeys); createTransformRequest(call, aggregate, input, traits); // hash distribute on one grouping key DrillDistributionTrait distOnOneKey = new DrillDistributionTrait(DrillDistributionTrait.DistributionType.HASH_DISTRIBUTED, ImmutableList.copyOf(getDistributionField(aggregate, false))); traits = call.getPlanner().emptyTraitSet().plus(Prel.DRILL_PHYSICAL).plus(collation).plus(distOnOneKey); // Temporarily commenting out the single distkey plan since a few tpch queries (e.g 01.sql) get stuck // in VolcanoPlanner.canonize() method. Note that the corresponding single distkey plan for HashAggr works // ok. One possibility is that here we have dist on single key but collation on all keys, so that // might be causing some problem. /// TODO: re-enable this plan after resolving the issue. // createTransformRequest(call, aggregate, input, traits); if (create2PhasePlan(call, aggregate)) { traits = call.getPlanner().emptyTraitSet().plus(Prel.DRILL_PHYSICAL); RelNode convertedInput = convert(input, traits); new SubsetTransformer<DrillAggregateRel, InvalidRelException>(call){ @Override public RelNode convertChild(final DrillAggregateRel aggregate, final RelNode rel) throws InvalidRelException { DrillDistributionTrait toDist = rel.getTraitSet().getTrait(DrillDistributionTraitDef.INSTANCE); RelTraitSet traits = newTraitSet(Prel.DRILL_PHYSICAL, collation, toDist); RelNode newInput = convert(rel, traits); StreamAggPrel phase1Agg = new StreamAggPrel( aggregate.getCluster(), traits, newInput, aggregate.indicator, aggregate.getGroupSet(), aggregate.getGroupSets(), aggregate.getAggCallList(), OperatorPhase.PHASE_1of2); int numEndPoints = PrelUtil.getSettings(phase1Agg.getCluster()).numEndPoints(); HashToMergeExchangePrel exch = new HashToMergeExchangePrel(phase1Agg.getCluster(), phase1Agg.getTraitSet().plus(Prel.DRILL_PHYSICAL).plus(distOnAllKeys), phase1Agg, ImmutableList.copyOf(getDistributionField(aggregate, true)), collation, numEndPoints); ImmutableBitSet newGroupSet = remapGroupSet(aggregate.getGroupSet()); List<ImmutableBitSet> newGroupSets = Lists.newArrayList(); for (ImmutableBitSet groupSet : aggregate.getGroupSets()) { newGroupSets.add(remapGroupSet(groupSet)); } return new StreamAggPrel( aggregate.getCluster(), exch.getTraitSet(), exch, aggregate.indicator, newGroupSet, newGroupSets, phase1Agg.getPhase2AggCalls(), OperatorPhase.PHASE_2of2); } }.go(aggregate, convertedInput); } } } catch (InvalidRelException e) { tracer.warn(e.toString()); } } private void createTransformRequest(RelOptRuleCall call, DrillAggregateRel aggregate, RelNode input, RelTraitSet traits) throws InvalidRelException { final RelNode convertedInput = convert(input, traits); StreamAggPrel newAgg = new StreamAggPrel( aggregate.getCluster(), traits, convertedInput, aggregate.indicator, aggregate.getGroupSet(), aggregate.getGroupSets(), aggregate.getAggCallList(), OperatorPhase.PHASE_1of1); call.transformTo(newAgg); } private RelCollation getCollation(DrillAggregateRel rel) { List<RelFieldCollation> fields = Lists.newArrayList(); for (int group : BitSets.toIter(rel.getGroupSet())) { fields.add(new RelFieldCollation(group)); } return RelCollations.of(fields); } }
Liverpool Football Club are delighted to confirm the signing of Serbia midfielder Marko Grujic. The 19-year-old put pen to paper on a contract with the Reds at Melwood today to tie up a transfer from Red Star Belgrade, where he will immediately return on loan until the end of the season. Grujic currently represents Serbia at U21 level and was also a member of their World Cup-winning U20 squad in 2015. Upon completing the deal, he told Liverpoolfc.com: “I’m very excited and so proud to be here and a member of Liverpool Football Club. I can’t wait to get started, play at Anfield and train at Melwood. “I was thinking about my progress in my next period and decided it was good for me to come here and try to be the best I can. “I want to play in front of one of the loudest set of fans in Europe at Anfield. “I also like the atmospheres at other stadiums, the crowds are very good. I like to play under pressure and that’s why I’ve come here – because it brings out the best in me.” Grujic’s form in 2015-16 has helped elevate Red Star to the top of the Serbian Superliga, where they entered the current winter break with a 25-point cushion over second-placed FK Cukaricki. So far this term, he’s netted five goals in 21 league appearances for Red Star after making his debut aged just 17 in 2013. In joining Liverpool, he becomes Jürgen Klopp’s first signing as Reds boss. Klopp said: “We’re very pleased because Marko is a big talent and we’ve seen him a lot of times. “When I came here, our scouts showed me some footage of a very skilled player from Red Star Belgrade. We watched it, we spoke to him, we met each other – he’s a good boy, a young boy but plays an important role at the moment at Red Star, who are the best team in Serbia. “To describe him, I would say he’s a tall boy, but quick and good at technical things. He can play passes and can dribble. But he is young, so he has to develop. He will do this, so everything is okay.”
Q: Differential equation for finding closest point on surface. Inspired by this question I got to think about a more general case. Say I have any discretized surface and want to find closest point from each point outside of surface to the surface. Say that I can estimate a local tensor for the local tangent space and normal space. Can I create a differential equation to encode with a vector field which optimally points out trajectories to go from each point and end up on a point on the surface of the object which would be the closest point? A: This is only an indirect answer to your question. Because your surface is discretized, it is a polyhedron. Then you have an exterior point $a$, and you seek $b$ on the polyhedron that is closest to $a$, i.e., which minimizes the distance $|ab|$. This can be formulated as a quadratic programming problem, for which there are many algorithms. For example, the GJK algorithm is often used: E. G. Gilbert, D. W. Johnson, and S. S. Keerthi, "A fast procedure for computing the distance between complex objects in three dimensional space", IEEE J. Robot. Automat., vol. 4, pp.193-203. 1988 (PDF download) So, I think the essence here is not a differential equation, but rather a quadratic equation that must be minimized.
Generally animals will stay still when in the early morning cold because they conserve energy and I bet the spot underneath them is nice and warm. We may think they look cold but they do have thick skin and a nice warm winter coat. We may think they look cold but they do have thick skin and a nice warm winter coat. My cats disagree with you. They always maintain that it is too cold in our apartment; that's why they turn into adorable, snuggly heat-leaches the moment you sit down. __________________ per·son \ˈpər-sən\ (noun) - an ephemeral collection of small, irrational decisions The fun thing about evolution (and science in general) is that it happens whether you believe in it or not. See, what ya do is this. Ya stealthily toss a small pebble toward their general vicinity, to sorta spook 'em enough to stand up. That way the arrow can find the heart/lung area much more easily, dontcha see. Then, slice 'em, dice 'em, cover with Worcesterchestersireshire sauce & onions, 350 degrees for 40-45 mins. __________________ These statements have not been evaluated by the FDA, EPA, FBI, DEA, CDC, or FDIC. These statements are not intended to diagnose, cause, treat, cure, or prevent any disease. If you feel you have been harmed/offended by, or, disagree with any of the above statements or images, please feel free to fuck right off.
Jeremy Corbyn has hailed Karl Marx as a 'great economist' who has influenced the world. Labour's left-wing leader has echoed his deputy John McDonnell in singing the praises of the founder of Communism - who urged the workers to unite in revolution to overthrow capitalism. It comes as Treasury Minister David Gauke warned that Labour's Marxist leadership would turn Britain into a 'hard-left experiment' if they win the General Election. Jeremy Corbyn, pictured at a rally in Worcester today, said Karl Marx is was a great thinker The left-wing Labour leader, pictured today in Worcester, made the comments while on a visit to plug the party's policy to scrap hospital car parking charges Mr Corbyn's remarks are likely to enrage his moderate backbenchers who are angry with the party's lurch to the left. Asked while out campaigning in Worcester if he was influenced by the ideas of Marx, Mr Corbyn said: 'All great economists influence all of our thinking. 'Yes, I have read some of Adam Smith, I have read some of Karl Marx, I have looked at the words of Ricardo, I have looked at many, many others. 'I don't consider myself the world's greatest intellectual but you learnt from everybody, don't close your mind to the thoughts of others - that way, we're all better informed.' David Ricardo and Adam Smith were both British classical economists whose writings had a major influence on politics and economics. His comments came after Mr McDonnell, his close ally and shadow chancellor, said Britain has 'a lot to learn' from Marx's Das Kapital. The Communist bible called for the overthrow of capitalism and inspired violent revolutions in Russia, south America and Asia. Mr Corbyn later took his campaign message to Leamington Spa where he delivered a speech on the steps of the town hall The Labour leader pictured today, addressed a couple of hundred of people at his rally John McDonnell, pictured on the BBC's Andrew Mar show yesterday, where he said that Britain could learn a lot from Karl Marx's Das Kapital - the Communist bible Treasury Minister David Gauke, pictured in Downing Street in March, has warned that Labour's leadership want to take Britain down a hard-left path Mr Gauke said the Communist experiment has been 'catastrophic' – and caused poverty, disease and unhappiness in the countries subjected to it. And he urged voters not to risk Britain becoming the next 'hard-left experiment' by voting in Mr Corbyn or the smaller parties who could parachute him into No 10 at the head of a 'coalition of chaos'. In an article for The Times he wrote: 'John McDonnell was, for once, absolutely correct on Sunday when he said that reading Das Kapital could teach us some important lessons. 'It may not have been quite what the shadow chancellor meant, but the collected works of Karl Marx tell us an awful lot about what the consequences of a future Labour government might be. 'Nonsensical in idea and catastrophic in implementation, the Marxist agenda that Jeremy Corbyn and John McDonnell have pursued for decades has proved disastrous for the people who have to endure its consequences.' Karl Marx wrote Das Kapital, a revolutionary text which inspired generations of Communists and preached insurrection and revolution around the world But he warned that Britain has never been at greater risk of being turned into a Communist state. He wrote: 'Yet, thanks to support from politicians from the Lib Dems, SNP and the Greens, the possibility of Jeremy Corbyn in power and turning Britain into the next hard-left experiment, has never been more real.' Labour have already hinted that those earning more than £80,000 could be hit by tax hikes after June 8. And Gauke warned that Labour's 'anti-business agenda' will damage jobs and livelihood. He urged voters not to back parties such as The Greens who have called for an electoral pact with Labour against the Tories. He wrote: 'These are the likely consequences of a coalition of chaos. Because when it comes to hiking taxes and nonsensical economics, Corbyn has willing accomplices in the other parties.' The latest poll puts the Tories ahead on 49 points with Labour lagging behind on 27 points He warned that with tough Brexit talks underway, now is not the time to risk Britain's stability. Such crucial negotiations must not be entrusted to left-wingers like Mr McDonnell, who has previously said he would like to 'go back to the 1980s and assassinate Thatcher' and read out form Mao Zedong's 'little red book' famous book of quotes during a debate in Parliament. Mr Gauke wrote: 'Karl Marx may rest at ease in Highgate Cemetery, but his ideals are still common currency just a stone's throw away with Jeremy Corbyn's Islington cabal. 'And at this election every vote for Labour, the Lib Dems and UKIP brings them one step closer to the centre of power.' Tom Brake, Lib Dem candidate for Carshalton and Wallingto. said: 'Corbyn and McDonnell seem to be competing to see who can make Labour more unelectable. 'At this rate, the Labour manifesto will be laced with quotes from Das Kapital.' Mr McDonnell yesterday refused to deny that he would be Britain's first Marxist chancellor if elected on June 8. Appearing on the BBC's Andrew Marr Show, he said: 'I believe there is a lot to learn from reading Das Kapital, of course there is, and that has been recommended not just by me but many others - mainstream economists as well.'
An in-depth look at the Clinton LumberKings from radio broadcaster Dave Lezotte. The LumberKings are the class A Midwest League Affiliate of the Seattle Mariners. Tonight’s Interview: Matt Bischoff The LumberKings improved to 4-3 on this eight-game road trip last night with a 5-2 win in Burlington. Left-hander Anthony Fernandez pitched his fourth-straight quality start (2 R, 1 ER over 6.0 IP) and a solo homer by Stefen Romero (listen:Romero Solo HR (#15), 13 game hit streak 8.8.11) and two-out RBI single by Kalian Sams had the Kings tied with the Bees, 2-2 entering the seventh. Right-hander Matt Bischoff came on for the top of the seventh and was immediately greeted by Nino Leyja’s line double into the left-field corner. A passed ball later and Leyja stood at third base with nobody out. Somehow, Bischoff got out of it unscathed. He battled back to strike out Tyreace House and induced a chopper from Beau Taylor that reached drawn-in third-baseman Carlos Ramirez. Ramirez started and finished one of the crazier plays on the basepaths this season, beginning a 5-2-6-2-5-1-5 rundown to get Leyja and then firing back to second-baseman Romero to catch Taylor over-rounding the bag. The ripple effect of that momentum swing was a three-run eighth inning put together by the Kings to snap the 2-2 tie. Mickey Wiswall’s liner to right-center scored Mike McGee for the winning run (listen:Wiswall RBI single 8.8.11), while Tim Morris and Sams added insurance RBI. Bischoff secured his third win in relief by tossing 3.0 innings, striking out two (listen: Bischoff Strikes Out Kirkland 8.8.11). Today, I talk with Bischoff for the first time on the pregame interview. The Decatur, Indiana native has already been well-traveled in the year since his 20th round selection out of the University of Purdue. He started his pro career in Pulaski last season, but jumped to Clinton just in time to make a playoff debut for the Kings. He turned in a memorable game three performance in the opening round at Cedar Rapids, tossing 2.0 scoreless innings and striking out four in relief of Erasmo Ramirez in Clinton’s series-clinching 6-2 win over the Kernels. Bischoff endured a rocky start with the LumberKings this year and a minor arm injury, battling back to go 2-0 with a 0.00 ERA and five saves in Everett before making his return to the Midwest League. In his last seven outings, the 5’11” hurler is 3-0 with a 1.93 ERA. Bischoff talks about the wild seventh inning, coming back strong from the injury, playing baseball at New Haven High School for his father (legendary head coach Dave Bischoff, who reached 500 wins this past season as he guided the Bulldogs to the 3A Semi-State finals), his Big Ten rivalry with Tyler Burgoon (who pitched at Michigan), his “into the fire” playoff debut last year and more. The road trip comes to a close tonight in Burlington, and it’s left-hander Roenis Elias on the hill for the LumberKings looking to secure a series win. We’ll see if the Cuban defector Elias can duplicate his debut outing, a 6.1-inning, one-run (unearned) effort at Wisconsin last Thursday. He’ll be opposed by Bees’ right-hander Jose Macias (4-3, 5.01). First pitch is at 6:30 PM, listen to the broadcast on 1390kcln.com. -DL Follow me on Twitter at @davelezotte and the LumberKings at @LumberKings. Meta The following are trademarks or service marks of Major League Baseball entities and may be used only with permission of Major League Baseball Properties, Inc. or the relevant Major League Baseball entity: Major League, Major League Baseball, MLB, the silhouetted batter logo, World Series, National League, American League, Division Series, League Championship Series, All-Star Game, and the names, nicknames, logos, uniform designs, color combinations, and slogans designating the Major League Baseball clubs and entities, and their respective mascots, events and exhibitions.
1989 Eastern Michigan Hurons football team The 1989 Eastern Michigan Hurons football team represented Eastern Michigan University in the 1989 NCAA Division I-A football season. In their seventh season under head coach Jim Harkema, the Hurons compiled a 7–3–1 record (6–2 against conference opponents), finished in second place in the Mid-American Conference, and outscored their opponents, 252 to 196. The team's statistical leaders included Tom Sullivan with 1,927 passing yards, Perry Foster with 1,087 rushing yards, and Todd Bell with 515 receiving yards. Schedule References Eastern Michigan Eagles Category:Eastern Michigan Eagles football seasons Eastern Michigan Eagles football
<?php if(strtolower($actionType) == 'reconnectxuanxuan' or strtolower($actionType) == 'loginxuanxuan') { $ip = $this->server->remote_addr; $last = $this->server->request_time; $this->dao->update(TABLE_USER)->set('visits = visits + 1')->set('ip')->eq($ip)->set('last')->eq($last)->where('account')->eq($actor)->exec(); }
Determination of thorium and scandium by indirect chronopotentiometric stripping analysis. A highly sensitive chronopotentiometric determination of thorium or of scandium is described. It is based on the substitution of thorium or scandium for lead (or zinc) in the lead-EDTA complex, and measurement of the liberated lead by deposition on a mercury film electrode, followed by a chemical oxidation stripping process during which the potential of the mercury electrode is monitored. Thorium has been determined at concentrations in the range 10(-5)-10(-7)M by use of deposition times from 1 min to 1 hr.
The Quokkas are an internationally franchised drinking team with a cricketing problem Renowned for our fearsome lack of fear on the cricketing pitch, we bring our unique brand of sporting ineptitude and enthusiasm over ability to the ovals of our opponents The Quokkas win, Rev plays a switch hit (and pulls it off) and The Dog bowls the 25th over, all pretty standard for one of our games….. With the outfield and the tourists still sozzled from the previous night (one got barred from the Gaso) we had them on the ropes at 6/85 with all the debutantes (Gazza, Robby & Stewart) getting a wicket on debut to go with Jay rattling the castle and the now normal 2 wickets in an over from the reigning B&F who now adds club all-time leading wicket taker to his life achievements. After drinks, the tourists ring-ins Rev (21), Roley (Rev minus 21) and the league president Fos (58 off 20) got them to a good score of 9/177 with the Dog, Jay and Radar grabbing more wickets. Jay 2/19 and Dog 3/24 sharing most of the spoils. Special note to Pup who took 0/1 in his 23 ball two overs. After another amazing potato salad and spread from the Dog (is there anything he can’t do?), Radar and Alex got us off to a solid start with 30* for Rohan and a Curtoesque 17* (16 singles) for Alex. The runs continued with Stewart 23*, Dutchy 36* from 14, Robby 27 and 23* from Gazza in the best quokkas innings ever played in a gray cardigan, plus he let the captain hit the winning runs. Good day to you and welcome to another Australian Summer of Quokkas Cricket, a heady time of year for any fan of shambolic representations of the great game. This seasons first game is against the might of the Launceston Pub League (LPL), whose genesis began with the Quokka tour to play the Royal Oak at the start of the 2011/12 season. While the spoils of the day did not go to the Quokkas, it did lead to the creation of the LPL, making the great game more accessible to more people, which is (kind of) the point of the whole thing. And so the LPL have put a combined ‘All Stars’ team together, with a little assistance from the Quokkas and the YPCA and travelled north to kill their maker. Its kind of like the story of Oedipus, though the role of the mother is yet to be cast. Form Guide: Being the first game of the season, the Quokkas are in (arguably) their best form of the year. There is a cluster of new faces in the team, a cluster being the collective noun for diamonds, as well as some familiar ones that are a little less shiny. The game between the Quokkas and the Royal Oak back in 2011/12 ended with ‘the oak’ knocking over the 109 runs required in 12 overs for the loss of only 2 wickets. Highlights of the game included Eds mate Mark driving up from Hobart to get hit for two of the biggest 6s in history, The Big Dog smashing up some play equipment, Morts meeting some locals and Kathleen making her debut. The only Quokkas who played in that match who are available this time around are Dutchy, Big Dog, Ed and The Rev. On form, the LPL are looking good. In the Spotlight: After starting a bet with Local on who could do the best disappearing act, Pup returns to the starting XI this week to grace us with his left-arm swing bowling and powerful pull shots. Being one of the few Quokkas under the Pension age, there is a bit of pressure on the younger O’Donovan to do the parts of cricket that require running, so naturally Pup has brought a mate (Robbie) down to delegate this to. Team News: After spending much of the off season fretting about how they were ever going to get an XI together, the committee now finds itself with a cluster of Quokkas, whereas the LPL are a bit short. As a result, Roley and The Rev will be filling in for the LPL and possibly one more. The Quokkas XI, at the time of writing, is (in no particular order): Dutchy (w/k) Big Dog Pup Robbie Alex Gow James Gow Sean Scales Ray Jayner Gaz / Gary Stewart Denmead Radar Ed (c) The nickname sub-committee clearly has some work to do. Pitch and Conditions: Conditions have conspired to ensure that the nano-sized ground at Alfred Crescent be available for the LPL touring team, a welcome spot for any touring batsman who doesn’t mind culling a few trees while hitting 6s. The weather is supposed to be a bit cooler than the rest of the week (only 18 degrees) with some cloud cover, though the only movement expected through the air will be off the LPL bats at a great pace. Stats and Trivia: This will be the Big Dogs 70th overall appearance for The Quokkas, still a club record Interestingly, it will be Radars 35th appearance, though Im not sure if that makes him half the Quokka Despite having a hand average of 22 with the bat and a high score of 37, Alex has only batted in 75% of the games he has played in; Im not sure why team captains may be afraid of winning James Gow averages an impressive 1 wicket per match and will surely be a cornerstone of Sundays formidable bowling attack Jay is only 10 runs off 200 career Quokka runs, hitting them at a healthy average of 31 with a high score of 38* Despite only playing once every other leap year, Pup is still 5th on the all-time wicket-taking list with 20. He only needs 3 to equal The Rev. Morty’s absence from a BBQ Breakfast at my parents was explained in a text to the Rev around 10.30am, “just got home, don’t know her name, she had tatts, love Tassie”. Not sure the love Tassie bit was true or it was Rev’s editorial. Breakfast was egg and bacon rolls of which Big Dog had 3 for medicinal purposes on the advice of the pharmacist he’d brought neurofen from for his hangover who told him to eat some greasy food. Good old small town service. Paris must have still been getting over the repressed memories of high school the posters for the band “Gay Paris” in the pub brought back and not focused on eating as half his eggs ended up on his Windies shirt. We headed down to the ground at 11.30 to get a bit of net practice in, well some of us. The absence of Curto, the selected tour keeper and the non-availability of his nearest rival in the all-time wicket taking list, Pup, meant that Big Dog would be behind the stumps and his warm up for this was to literally warm up by lying in the sun. The atmosphere was starting to build on the picturesque East Launceston Primary School Oval. The Oak had brought a PA to have tunes playing all day, the BBQ was warming up and even a small crown was beginning to swan in. Apart from the quality of the cricket about to be played, it had all the makings of a Big Bash 20/20. At 12.45 the teams came together for an explanation of “Pub Rules” and the crucial toss. With the batting strength of the opposition unknown it was important to win the toss and bat. A lost toss could result in 25 overs of fetching the ball form peoples backyards. The cricketing gods were on our side and we won the toss and as Captain, I had no hesitation in batting and hopefully putting some kind of total on the board. At 1pm, Marty and I strolled out to the middle and I faced up to the Royal Oak’s opening bowler, which I smashed away for a single. Their bowlers were all pretty sharp and accurate, with Morty falling for 6, debutant Dan a classy 15 and myself a picket fence 10 that Curto would have been proud of. Dutchy was next to wander back to the pavilion continuing his record of only scoring 0,18 or 22 with the lessor of those scores next to his name in the book. In fact his innings was so short his song to walk into bat to “pass the dutchy to the left hand side” was still going as he walked back. The Rev came in a smashed a Rev like 2 and we were struggling at 5/40. The Oak thought they could roll us, but the calm style of Paris and the dogged exploitation of the No LBW rule by Big Dog got us into the 70’s with Paris becoming the first in his family to hit a six in his top scoring 19 and Big Dog paddling his way to 17 before being run out from the boundary without even attempting a run. Apparently he took his frustrations out with a throw of the bat, just like a real cricketer would do. I missed this as I was with the scoreres trying to match up the two scorebooks. The Oak had a guy to score, but he knew their players just as well as we did and hence the bowling scorecard contained names such as Cargo Shorts, Long Shorts, Beardo and Robinson Crusoe. The scorecards were fixed as was the Quokkas innings with an unbeaten partnership of 30 between Mark and Steve meaning Kathleen’s batting debut was put off for another week. Our Tassie quokkas got us to 7/109 with backfoot cover drives from Steve, who like his brother got a picket fence 10 and 18 from mark including a big 6 over midwicket. 109 was commendable considering the quality of their attack and the quality of our night out. The innings break was where the third of my family did their best work with Dad cooking up a storm on the barbie to the praise of both teams. After some sustenance of a few snags and cans of Boags Red we refocussed on the task ahead, defending 109. The Rev took the new cherry and proceeded to outdo Steve Harmison’s first ball in the 2005 Ashes by landing his first ball off the pitch with it not even carrying to the batsman. Little were we to know at the time that this was probably the safest place to bowl to. After 10 of a very Rev like opening over I threw the ball to old school mate Mark, who opened the bowling in Grade 10 and had shown form with the bat. It was a tough comeback to the bowling crease to say the least with the next 6 deliveries going 446644 and the batsman becoming yet another victim of the Quokkas tactical retirement tactics. I turned to Morty and his leggies, who I knew with his new unnamed friend in the stands, would put on a magic show with his leggies. It did the trick and the castle was rattled which meant we weren’t going to loose by 10 wickets. It was always going to be tough to comeback from 1/47 off the first 3 overs, but we tried with Paris and Steve bowling 4 overs between them for only 12 runs. Dutchy welcomed Dan to the team with a hand-breaking return from the boundary, sorry I mean 10ms away and I bowled a beautiful dart which got deposited over the fence and thought “he can’t do that again”. I was wrong, this time it went ever further. Wickets were elusive and the runs were flowing, but as captain I got the prized scalp over my opposite leader, psyching him out after he missed 2 in a row with the old “do you want me to put a bell in it”. Next ball he went to hit it to Melbourne and was caught and while the Royal Oak had a convincing 8 wicket victory, I at least had a small moral one. We handed them the trophy and drank a few more thousand Boags Reds and drank to an awesome day. The highlight was later in the night, about midnight, when their player who was in the book as Robinson Cruse came up to me and said “Nice beard, a man without a beard has 2 mums”. Thanks to Mark, Steve and Kathleen for playing and to everyone making the effort to come over to the apple isle. The Oak players said they’ll come over our way next year for another game. Ahead of the 2011/12 season, the Labour-in-Vain Quokkas are heading to Launceston to take on the unknown quantity that is the Royal Oak Hotel. The game is set to follow our standard Pub-league rules of 25 overs, no LBW, no out on first ball & everyone must bowl 2 overs. The Quokkas will be using the game to spread the gospel of pub cricket, hopefully leading to more social competition in the great state of Tasmania. They will also be shamelessly promoting their 2013 tour to Kenya to support Action This Day! We’d love to see as many cricket / pub / curious fans out there on the day as we can – Quokka players such as Big Dog and The Rev will even be on hand to sign autographs (probably for each other).
i) be the first derivative of -i**2/2 + 2*i + 1. Let k be j(0). Solve 0 = -y*t - k*t for t. 0 Let q(j) = j**3 + 4*j**2 - 5. Let w be q(-3). Let i be (w/(-5))/((-5)/50). Solve 0 = -4*h + 4 - i for h. -1 Let h be 5/(7 + -2) - 1*-2. Solve 3*p = -0*p - h for p. -1 Let b(d) = d**3 - 5*d**2 - 6*d - 4. Let k be b(6). Let j be k/10 - 34/(-10). Suppose 0 = -2*q + j*q. Solve q*c - 2*c - 10 = 0 for c. -5 Suppose 2*g = -3*g. Solve -t = -g*t + 2 for t. -2 Suppose -5*q = -2*q - 15. Suppose -5*o = -3*n - 17, 0*n = q*o - 2*n - 18. Solve -v + 12 = -o*v for v. -4 Let a = 8 - 11. Let d(x) = -x**2 - 3*x + 2. Let o be d(a). Suppose o*w - 1 = 5. Solve 0*c = -w*c for c. 0 Let j(x) = -x**2 + 7*x - 6. Let t be j(7). Let o = -3 - t. Solve l + 4 = -o*l for l. -1 Suppose 0 = -4*u - s + 64, 0 = -4*u + 5*u + 5*s - 16. Let a = u - 10. Let f = a - 4. Solve f*j + 8 = 6*j for j. 2 Suppose 3*x + 7 = 4*d, -5*d - 5*x + 18 = -17. Solve -d*f - f = 15 for f. -3 Let z be (10/6)/((-2)/(-6)). Suppose -m + 4*m = -5*f, 5*f = 5*m. Let y be 4 + 0/4 + m. Solve y*i + 7 + z = 0 for i. -3 Let w = 125 - 122. Suppose 0 = n - 2*n + 7. Solve n*h + 8 = w*h for h. -2 Let u(d) = d - 6. Let m be u(10). Solve -m*x - 1 = 7 for x. -2 Let o = -48 + 51. Let x(u) = u - 3. Let a be x(3). Solve a*j - o*j = 0 for j. 0 Let y(i) = -i + 10. Let o(k) = -k**2 - 11*k - 8. Let m be o(-10). Suppose m*v = g, -4*g + 2*g + 10 = -2*v. Let r be y(g). Solve t - 3 + 4 = r for t. -1 Let r(x) = 5*x - 10. Let n be r(4). Solve -6*o = -4*o - n for o. 5 Suppose -3*v + 4 = 3*c - v, -v + 2 = 2*c. Suppose -4*f + 21 - 9 = c. Solve 0 = -f*x + 3 + 3 for x. 2 Let w(q) = -q**2 + 8*q - 5. Let v be w(6). Solve 0 = -2*z + v*z - 5 for z. 1 Suppose 1 = -4*o - 2*d + 27, 4*o - 21 = 3*d. Suppose o*t - 24 = 2*t. Solve 15 = v - t*v for v. -3 Let x = 7 + -7. Solve 0*g + g - 5 = x for g. 5 Let c(a) = -a**3 + 4*a**2 + 5*a + 2. Let z be c(5). Suppose -3*x + v = -8, 17*v + 25 = 5*x + 13*v. Solve 0 = -z*k - x - 1 for k. -1 Let m(r) = r**3 - 19*r**2 - 21*r + 22. Let s be m(20). Solve -s*q = -0*q + 6 for q. -3 Suppose 0 = -3*y - x + 45, -5*x + 33 = 4*y - y. Let r be y - (3 - 3)/(-1). Solve 2*t - r = -2*t for t. 4 Let o be (-9)/15 - (-36)/10. Let q(u) = -o + 5 + u - 2 + 5. Let m be q(5). Solve -2*l + m = 3*l for l. 2 Let k(j) = 2*j**2 + 3*j + 4. Let q be k(-2). Solve -q*f - 35 = -11 for f. -4 Let s(l) = -2 + 5*l - 4 + 3 - l**2. Let r be s(3). Suppose -b + r*b = 6. Solve -2*z + 5 = -b for z. 4 Let c = 12 + 4. Let b be 11/(-2 - (-3)/1). Let a = c - b. Solve 0 = 2*m - m + a for m. -5 Suppose 3 = -t - k, -3*t = -4*t + 2*k + 9. Solve t = -w + 5 for w. 4 Suppose 5*d = t + t + 58, -5*d + t + 59 = 0. Let w = -10 + d. Solve 0 = -0*l - w*l for l. 0 Let p(w) = -4*w**3 + w**2 - 1. Let c be p(1). Let b = c + 1. Let a(g) = -g**2 - 5*g - 4. Let i be a(b). Solve -i*f - 2 = -0 for f. -1 Let r(o) = 4*o + 38. Let x be r(-9). Solve 5*w = x*w for w. 0 Let v = -2 + 2. Let s = v - 0. Solve 8 + s = -4*n for n. -2 Let p = 5 + -2. Solve 8*n - 15 = p*n for n. 3 Let i = -10 - -3. Let g(t) = -t**3 - 6*t**2 + 8*t + 5. Let p be g(i). Let q be 10/((-2)/2 - p). Solve -5*u + 15 + q = 0 for u. 5 Let g be -1 - (-2 + 4) - -3. Suppose 2*m - 40 = -g*m. Solve -4*v - m = -0 for v. -5 Suppose 8*a - a - 28 = 0. Solve a*t - 2 = 2*t for t. 1 Let y be 63/(-6) - 6/4. Let d = y + 21. Suppose 3*h = 3*n - 15, -3*h - d = -n + 2*h. Solve 2*v + 6 = n*v for v. 3 Let v be 4/6 - (-260)/(-30). Let l be (-2)/v - 47/(-4). Solve 0*w - 3*w = -l for w. 4 Let d = -21 - -25. Solve 0 = -0*a + a + d for a. -4 Let i = 20 + -20. Solve i = c + 2 for c. -2 Suppose 3*f - 11 - 10 = 3*q, 26 = 3*f - 2*q. Solve 4*a + 0*a = f for a. 3 Suppose -6*n + 29 = -13. Solve -3*j - 8 = n for j. -5 Let k be (-2)/4 + 1/2. Suppose 3*a - 2 - 7 = k. Solve 2*j - 7 = a for j. 5 Let t be 1*-3*(-1)/1. Let c(h) = 16*h - 3. Let j be c(t). Suppose w = -2*w + j. Solve -4*l + l = -w for l. 5 Suppose 19*f - 30 = 9*f. Solve -d - 1 + f = 0 for d. 2 Let v be (8/(-18))/(6/(-27)). Solve 0 = -v*q + q - 3 for q. -3 Suppose 0 = 4*v - 9*v. Suppose z = -v*z. Suppose 4*x - 92 = -z*x. Solve -x = 4*u - 3 for u. -5 Suppose -p = 2*a + 4, 2*a = 4*a + 6. Let d be (5/2 - p)*0. Solve d*o = -4*o - 8 for o. -2 Let c(g) = -g**3 - 4*g**2 + 5*g + 6. Let l be c(-5). Let p = l + 0. Solve p = -3*n - 0 for n. -2 Let q be 3/(3/14) + 1. Suppose -11*d = -13*d + 4. Suppose d*j + 3*j - z = 3, z - 4 = -2*j. Solve 4*x - q - j = 0 for x. 4 Let c(y) = 6*y**2 + 2 + y - y**3 - 10*y**2 + 4*y. Let n be c(-5). Solve -3*o - 10 = n for o. -4 Suppose i + 3*w = 11, 2*w + 11 = 2*i - 3. Solve -6*h + 2*h - i = 0 for h. -2 Let j(p) = p + 5. Let k(i) = i + 6. Let u be k(-6). Let r be j(u). Let n be (4/(-14))/(1/(-14)). Solve -n*f = f + r for f. -1 Let j = 134 - 133. Solve -2*o + 1 = -j for o. 1 Let s be (3/9)/(-1)*0. Let m be (-6)/(-2*(-3)/(-4)). Suppose m = q + f, q + 4*f = 4*q + 2. Solve s*p = q*p - 8 for p. 4 Let f = 30 - 26. Solve -c - c = f for c. -2 Let j be (-32)/(-6)*(-6)/(-4). Solve 2*b = -2*b + j for b. 2 Suppose 0 = -3*u + 2*d - 4, -2*d - 5 = -5*u - d. Suppose -i + u + 0 = 0. Solve -i*k = -7*k for k. 0 Let x be (22/8)/((-6)/(-24)). Solve 2*m = -1 + x for m. 5 Let b(a) = -a - 4. Let w be b(-6). Let n = w + 7. Solve -3*x = -0*x + n for x. -3 Let c(t) = -t**3 + t**2 - t. Let k be c(-2). Suppose -3*m = -k + 5. Solve 2*d - m*d = -1 for d. 1 Let g(h) = h**2 + 7*h + 6. Let w be g(-6). Suppose 3*c - 13 = 5. Solve w*f + 2*f = c for f. 3 Suppose 0 = 4*m - 3*m - 2. Solve 0 = -4*s + m*s + 4 for s. 2 Let y = 22 + -18. Suppose y*n + 2 = k + k, 30 = 5*k - 5*n. Solve k = 3*w - 1 for w. 4 Suppose -2*f = -5*f + 6. Let j(d) = d**2 + 10*d + 9. Let z be j(-9). Suppose -l + z = -3. Solve l*x + f*x = -25 for x. -5 Suppose -10 = -5*b - 5, -4*d - 1 = -5*b. Solve 4*w + d + 11 = 0 for w. -3 Let z be (-16)/(-7) + 4/(-14). Solve z = -2*m - 2 for m. -2 Let y be (-11)/(11/(-12)) - 1. Solve -4*g + 3 = y for g. -2 Suppose -j - 14 = -3*j. Suppose -5*b - 4 = 4*t, 4 = 2*b + 5*t - 2*t. Let g(a) = 3*a**2 + 6*a + 1. Let h be g(b). Solve 2*m = j*m + h for m. -5 Suppose -2*u - 2 = -4*m, -m - m + 16 = 4*u. Suppose -4*k + 10 = 2*x, 2*x + 8 - u = k. Let w = 3 + x. Solve y - w = 3 for y. 5 Let k = -3 + 5. Suppose -3*c + 1 + 1 = -2*u, 5*u = -4*c + 18. Let p be (-6)/u + 2 + 1. Solve p*i + 8 = -k*i for i. -4 Let y = -3 - -11. Let j be 15/10*y/6. Suppose -o = -2*o + j. Solve 0 = i - 1 + o for i. -1 Let l be 0 - 1 - (-11 - -4). Solve l*w = w for w. 0 Let h be 12/(-16)*(8 - 0). Let m(p) = -2*p - 7. Let a be m(h). Solve -17 + a = 3*d for d. -4 Let q = 26 - 26. Solve q = 2*d - d + 1 for d. -1 Let p(w) = 2*w**3 - 24*w**2 + 10. Let v be p(12). Solve -5*m + 7*m = v for m. 5 Let n be (-1)/(-2) - -6*4/16. Solve -n*s + 0*s + 4 = 0 for s. 2 Let c be 1 + (-3 - -1) - 3. Let v be (-12)/c + 0/1. Solve v*g + 2*g = 15 for g. 3 Let c = -19 - -28. Let t(i) = i**3 - 8*i**2 - 8*i - 6. Let f be t(c). Let o(g) = -g**3 + 4*g**2 + 6*g - 3. Let a be o(5). Solve 0 = -f*s + a*s for s. 0 Suppose -4*z + 16 = 4. Solve l - 16 = -z*l for l. 4 Suppose 40*h - 45*h + 25 = 0. Solve -h*c = -0*c + 5 for c. -1 Let k be (-60)/25*(-10)/4. Solve m - k*m = 0 for m. 0 Suppose 3*y - 4*l - 4 = 0, -4*y + 2*l + 6 = -6. Solve 2*v - 3*v + y = 0 for v. 4 Suppose 4*t = 5*g - 18, g = -2*g - 3*t. Suppose 2*a = 5*h - 2, -5*h - g*a = -h - 16. Solve k - h*k + 3 = 0 for k. 3 Let d(a) = a + 5. Let c be d(-3). Solve -1 + 5 = c*l for l. 2 Let s(o) = 2*o + 12. Let x be s(-5). Solve x*m = 5*m + 15 for m. -5 Let x(y) = -y**3 + 6*y**2 - 4*y. Suppose -7*q + 20 = -3*q. Let s be x(q). Solve -s*w - 6 - 9 = 0 for w. -3 Suppose 2*x = 6*x - 8. Solve 5*o - x*o = 3 for o. 1 Let c = 104 - 104. Solve c*b - b = 1 for b. -1 Suppose -4*g + 6 = -2*h, 6 + 6 = -4*g - 4*h. Suppose g = 3*r - 2*r + 3. Let z be (-4)/4*(r + -2). Solve -i = 1 - z for i. 4 Let w = -12 - -4. Let i be 12/(-8)*w/3. Solve i + 11 = 3*a for a. 5 Let m(q) = -3*q + 13. Let b be m(9). Let g = 18 + b. Solve 2*k - 2 + g = 0 for k. -1 Suppose 0 = -2*m - 12 - 8. Let x be m/55 + 105/33. Solve 0 = x*y + 3 for y. -1 Let s be (-464)/(-18) + 8/36. Suppose 2*j + s = 3*t, 4*t - 24 + 4 = -j. Suppose 8 = 3*k - 1. Solve -k*h = -h - t for h. 3 Suppose -5*n - 3*w + 8 = -4*w, -2*w + 10 = 3*n. Solve s + 0 = n for s. 2 Let s be (-2 - (-2)/4)*-2. Suppose -4 = s*j - 2*j. L
Prognostic factors in patients with inferior vena cava injuries. Inferior vena cava (IVC) injuries are potentially devastating insults that continue to be associated with high mortality despite advances in prehospital and in-hospital critical care. Between 1987 and 1996, 37 patients (32 males and 5 females; average age, 30 years) were identified from the trauma registry as having sustained IVC trauma. Overall mortality was 51 per cent (n = 19), with 13 intraoperative deaths and five patients dying within the first 48 hours. Blunt IVC injuries (n = 8) had a higher associated mortality than penetrating wounds (63% versus 48%). Of the 29 patients with penetrating IVC trauma, the wounding agent influenced mortality (shotgun-100% versus gunshot-43% versus stab-0%). Anatomical location of injury was also predictive of death [suprahepatic (n = 3)-100% versus retrohepatic (n = 9)-78% versus suprarenal (n = 6)-33% versus juxtarenal (n = 2)-50% versus infrarenal (n = 15)-33%]. A direct relationship existed between outcome and the number of associated injuries: nonsurvivors averaged four and survivors averaged three. Eighty per cent of patients sustaining four or more associated injuries died, by contrast to a 33 per cent mortality in those suffering less than four injuries. Physiological factors were also predictive of outcome. Patients in shock (systolic blood pressure < 80) on arrival had a higher mortality than those who were hemodynamically stable (76% versus 30%). Preoperative lactate levels were of prognostic value for death (> or = 4.0-59% versus < 4.0-0%), as was base deficit (< 4-22%, > or = 4, and < 10-36%, > or = 10-73%). Interestingly, neither time from injury to hospital arrival (47.4 minutes versus 33.0 minutes) nor time in the emergency department before surgery (45.6 minutes versus 42.6 minutes) differed between survivors and fatalities. Mortality remained high in the 34 patients who had operative control of their IVC injuries [lateral repair (n = 27)-44% versus ligation (n = 6)-66% versus Gortex graft (n = 1)-0%]. As wounding agent, anatomical location, associated injuries, and physiological status seem to most directly impact mortality, future efforts must focus both on establishing prevention programs directed at reducing the incidence of this injury, as well as on advancing the management of those who do survive to hospitalization, if we are to improve on the outcome of these devastating injuries.
SHOSHANNA: You are so [expletive] classy ... You may find a bit of poetic justice in this if you recall that, before it acquired its messianic aura, Facebook had its origins in an algorithm with the not-so-lofty mission of letting horny Harvard boys rate the looks of female classmates. We should be as suspicious of the Facebook-is-over hype as of the original euphoria. Lee Rainie, who studies Internet culture at the Pew Research Center, said that polling does not reflect a significant Facebook backlash so far; the empire is still growing toward a billion users, and more and more people say they use it every day. What has changed is that users say they are more wary of posting private information — especially when contemplating a job hunt, a college application or a budding romance. And many Facebook users — a third, according to a new Reuters/Ipsos poll — are cutting back the time they spend there. “The infatuation phase is morphing into a more mature phase,” Rainie told me. Jonathan Zittrain of Harvard’s Berkman Center for Internet and Society adds that this reckoning is mutual, and natural, as Facebook grows from a plaything born in a college dorm room into a very serious enterprise. “Even Facebook has to lose its own romantic vision of itself,” he said. After a period of idealizing social media, the public is beginning to recognize that these are enterprises with ambitions and appetites. They are businesses. Public companies have an imperative to grow profits, which Facebook will do by monetizing you and me — serving us up as the targets for precision-guided advertising. One of the most interesting stories I’ve read in the recent, more aggressive spate of coverage was Somini Sengupta’s report in The Times about Facebook’s entry into the Washington influence game. Every company, of course, protects its interests in the places where laws are made and adjudicated, so in hiring its corps of Washington insiders and dispensing cash from its political action committee, Facebook is just joining the mainstream. But Facebook’s way of friending the powerful is original. It ingratiates itself with members of Congress by sending helpers to maximize the constituent-pleasing, re-election-securing power of their Facebook pages. “If you want to have long-term influence, there’s nothing better than having politicians dependent on your product,” one envious Silicon Valley executive told me.
Energy saving control strategies for Haliscomenobacter hydrossis filamentous sludge bulking in the A/O process treating real low carbon/nitrogen domestic wastewater. The control strategies of energy saving for filamentous sludge bulking were investigated in the A/O process under low dissolved oxygen (DO) with low carbon/nitrogen (C/N) ratio, and the dominant filamentous bacteria were identified by using fluorescent in situ hybridization. Initially, the sludge volume index reached nearly 500 mL/g and serious bulking occurred when the DO value was 0.5 mg/L, with Haliscomenobacter hydrossis as the major filamentous bacteria in the bulking sludge. Later on, the compartment number increased in the aerobic zone, increasing by this way DO, to control serious bulking. Increasing DO to 1 mg/L based on the increase of compartment number in the aerobic zone was the favorable controlling method, which solved the sludge loss, improved the effluent quality to the national discharge standard and allowed for energy costs saving. As a result, the effective control method for H. hydrossis filamentous sludge bulking provided the economical, convenient and longstanding method for most municipal wastewater treatment plants treating real low C/N domestic wastewater.
Incumbent Texas Democrat Rep. Henry Cuellar, challenged in one of the most watched and most expensive primary contests in the country, emerged victorious, beating back a left-wing challenge from Jessica Cisneros. The race was close; Cuellar ended up with just 51.8 percent of the vote to Cisneros’s 48.2 percent. The Laredo lawmaker is one of the most conservative Democratic House members in the country, a record that attracted a spirited challenge from Cisneros, a 26-year-old attorney who waged an insurgent campaign that presented a sharp contrast with Cuellar. Cisneros touted support for Medicare for All, the Green New Deal, and opposition to draconian immigration enforcement measures. Despite representing a relatively safe Democratic seat in south Texas, Cuellar votes consistently with the Republican Party. He sided with the GOP in some 75 percent of his recent votes, including on measures against expanding worker access to labor unions and in support of repealing restrictions on predatory lending. Cuellar previously served in the cabinet of Republican Gov. Rick Perry and has been outspoken in his defense of President Donald Trump on contentious issues, including the president’s decision to assassinate Iranian Maj. Gen. Qassim Suleimani. Many in the press compared the race to the 2018 bid by Alexandria Ocasio-Cortez 2018 to unseat Rep. Joe Crowley, D-N.Y., the third-ranking House Democrat and one of the most business-friendly Democrats in leadership. Cisneros also had the endorsement of Ocasio-Cortez, as well as the backing of Justice Democrats.
Former Deutsche Bank CEO Hilmar Kopper 'Money Needs Laws' As the former head of Deutsche Bank, Hilmar Kopper was once the most powerful banker in Germany. In an interview with SPIEGEL, the 76-year-old takes stock of his career and the current crisis shaking Europe. The three main constants he has seen in the world, he says, are "money, avarice and greed."
Thursday, March 17, 2011 Zoya, MAC, and Sephora - Mini Haul First off, hey loves! Sorry I haven't been posting much, I had midterms and then my spring break started, so I've been all over the place with work and packing and traveling and such. But I picked up a few things at the mall today, as well as m Zoya polishes coming in the mail, so I thought I was long overdue for a post on here! I snagged the Zoya Intimate collection back on Women's Day when it was $25 and free shipping, and these colors are just as gorgeous in real life as they were online. Caitlin is a light gray-ish indigo, Dove is just a straight-up light gray, and Marley is a shimmery pink with a touch of purple. Dannii is a darker purple with gold shimmer (it didn't show up too well in the photo, but trust me, the gold is there and it's crazy-sparkly), Gemma is a dark green with a beautiful blue/purple duochrome, and Jules is a sparkly, metallic gold that looks almost taupe-y from some angles (again, the sparkle doesn't show up too well in the picture but it's super shimmery in real life). I also picked up Stars 'n' Rockets from MAC, because I had heard a lot of great things about this color - this shadow can be so many different shades of purple depending on the angle you look at it, it's insane! And since my bronzer brush from Bare Escentuals had fallen apart, I got a fairly inexpensive ($19) face brush from Sephora to replace it. So that's all I've collected over spring break thus far, other than a few things from Victoria's Secret which I didn't feel like photographing with my 12 year old brother watching me! ;]
Read More Liverpool have asked to build 160 family homes on the land in the document submitted to Liverpool City Council which applies for outline planning permission for the development. The Reds say the creation of much-need family homes are within the council’s own Local Plan, writes the Liverpool Echo. Liverpool manager Jurgen Klopp with his squad during a training session at Melwood A club statement said: “LFC recognises that Melwood has played a significant role in Club’s history, however the site is limited in terms of space and is unable to accommodate LFC’s ambitions for a new first class combined training facility.” Liverpool council is expected to rule on the planning application later this year.
753 F.2d 1086 *U.S.v.Irvin 84-7261 United States Court of Appeals,Eleventh Circuit. 1/30/85 1 M.D.Ala. AFFIRMED 2 --------------- * Fed.R.App.P. 34(a); 11th Cir.R. 23.
Alibaba F-1 - nikunjk http://www.sec.gov/Archives/edgar/data/1577552/000119312514184994/d709111df1.htm ====== TrainedMonkey "We operate a micro-finance business that provides micro loans to small- and medium-sized enterprises who are sellers on our wholesale and retail marketplaces, or our SME loan business. We extend micro loans through our lending vehicles licensed by the relevant local governments in China." Turns out reading these is actually useful, I had no idea they issued microloans. ~~~ alaskamiller What they mean is AliPay - [http://global.alipay.com/ospay/home.htm](http://global.alipay.com/ospay/home.htm) Jack Ma spoke on it last year at Stanford - [http://www.youtube.com/watch?v=MRp4jiJed3c](http://www.youtube.com/watch?v=MRp4jiJed3c) My prediction: Alibaba is on a path to take over the world. In the next 5 years the startup and silicon valley landscape will change dramatically with the introduction of Alibaba as a major player stateside. Yahoo will be bought, all these spree acquisitions and product dev based on borrowed time and money (ironically from Alibaba) is to walk away with as much money from Alibaba when that inevitable moment happens. Maybe that's why Marissa Meyer has such confidence. If you work on anything tangential and remotely related to ecommerce, enterprise, or logistics, at scale--the type of scale that can actually impress a man that has the indirect democratic approval of a a nation composed of a billion people--you now have an additional avenue for exit aside from Amazon. Alibaba will become an American household name overnight, that took 15 years to happen. ~~~ crashandburn4 >My prediction: Alibaba is on a path to take over the world. I couldn't ask about some sources/information on this? I've only been tangentially aware of alibaba, reading the odd news story here and there, I'd be interested to hear what has inspired such strong words on the subject as that makes me think maybe there's something I'm missing about them. ~~~ alaskamiller Start with that YouTube video at 1.5x Then look at this [http://qz.com/206283/all-the-western-companies-youd-have- to-...](http://qz.com/206283/all-the-western-companies-youd-have-to-combine- to-get-something-like-alibaba/) ~~~ nemothekid The Quartz article is eye opening, but then I also realized Google also operates in a very similar fashion, and alot of those entities have Google counterparts. What will be interesting from the IPO would be to know if there is a single cash cow (like Google's Adwords) or if theres are more healthy split ------ lifeisstillgood It failed to list in Hong Kong after HK said the partners could not retain control of board nominations after the sale """The negotiations foundered after regulators decided they would not allow Alibaba's partners to retain control over board nominations, maintaining that all shareholders should be treated equally, sources said.""" [+] So does that mean that the SEC is going to allow them control? Does that mean HKSE is better governed than NYSE? [+] [http://mobile.reuters.com/article/idUSL4N0HL10H20130925?irpc...](http://mobile.reuters.com/article/idUSL4N0HL10H20130925?irpc=932) ~~~ misterbwong I believe this has to do with the inability to issue non-preferred (non- voting) stock on the HKSE, something that is allowed on NYSE. ~~~ lifeisstillgood But ... why? Why should one company allow voting with all shares and another not? Seems to me that's turning comparable markets into apples v oranges. The price of two shares then are not just based on strengths of companies but whether shareholders can influence the company too. I would rather have two markets in that case. ------ jacquesm At least compared to the valuations of instagram, pinterest and so on this one actually makes sense. ~~~ tokenadult Jacques, Shakespeare would call that "damning with faint praise." It does seem to me that Alibaba has an actual underlying business with real business value, but I wonder about the transparency, even with listing in the United States, of a company that does most of its business in China. We shall see what value the market sets on the company at first, and how that works out over time. ~~~ tanzam75 Actually, the Alibaba that is being listed does not have an underlying business. The stock represents ownership of a Cayman Islands variable interest entity that has a contractual claim on the actual Alibaba's profits. This is not a new trick. It's a longstanding loophole in the Chinese law barring foreign ownership of certain companies. But it's also not exactly risk-free: [http://dealbook.nytimes.com/2014/05/06/i-p-o-revives- debate-...](http://dealbook.nytimes.com/2014/05/06/i-p-o-revives-debate-over- a-chinese-structure) ~~~ rahimnathwani Dan Harris wrote some interesting articles about the VIE structures (aka Sina structure). If you're interested, a good place to start is here: [http://www.chinalawblog.com/2013/06/buying-into-a-china- vie-...](http://www.chinalawblog.com/2013/06/buying-into-a-china-vie-what-me- worry.html) ------ coreymgilmore Of note, the NASDAQ has lost year to date what Alibaba will be valued at. Interesting anomaly in the market. Also a tough time for a tech company to go public since the general marketplace seems pretty overpriced as it is these days. The fact that Alibaba is an established business with history should help it perform well on IPO day. ------ rdl Only raising $1B? Or is that a placeholder? I would have assumed more like $20-30B. ~~~ presty From [http://recode.net/2014/05/06/chinese-internet-giant- alibaba-...](http://recode.net/2014/05/06/chinese-internet-giant-alibaba- finally-files-for-ipo/) "In its initial document, Alibaba said it was raising $1 billion, but that is only a placeholder and will surely change. Demand from investors is likely to be high and analysts have estimated that Alibaba would raise $15 billion or more at a valuation of close to $200 billion." ~~~ boomzilla 200B valuation is actually very reasonable: it's PE would be roughly 35 compared to Amazon's 400. Now the big question which I have not been able to figure out from their S1 is why they have so much more margin compared to Amazon, given the two are operating more or less in the same space. Is that because US is a free (and more efficient) market, where China has more artificial barriers for other players? ~~~ tormeh I think Alibaba does more bulk shipments, connecting manufacturers. Alibabas' customers are businesses, Amazon is a consumer company. They are not comparable at all. Searching for pens on Alibaba gives you offers with minimum shipment of 500 pens. ~~~ khc That's only talking about the Alibaba site itself. They own several gigantic websites that in the consumer business (taobao, t-mall, etc). ------ piocan Btw. Alibaba Group is so much more, not only one site, it is Amazon of China! [http://www.examinechina.com/blog/alibaba- group/](http://www.examinechina.com/blog/alibaba-group/) \- infographic w/ their other ventures (Alipay, clon of paypal etc.) ------ muad_dib here is source that can be annotated [http://www.twomargins.com/documents/15](http://www.twomargins.com/documents/15) as referenced here [https://news.ycombinator.com/item?id=7707505](https://news.ycombinator.com/item?id=7707505) ------ Fasebook News on my HN?
Mutations within the tumour suppressor gene p53 are not confined to a late event in prostate cancer progression. a review of the evidence. Mutations in the p53 tumour suppressor gene are generally believed to be a late event in the progression of prostate cancer, and are associated with androgen independence, metastasis, and a worse prognosis. In this review, we examine the current literature available on p53 mutations and focus on stages A (T1) and B (T2) of prostate cancer. We report here that p53 mutations can be found in approximately one third of prostate cancers that are clinically localized to the prostate. In addition, high levels of p53 mutation are found in normal prostate tissue of prostate cancer patients, prostatic intraepithelial neoplasia, and benign prostatic hyperplasia. The limitations of techniques used to determine p53 mutations are discussed, as well as other modes of p53 loss in early stage prostate cancer.
Geometry of the magic number H(+)(H2O)21 water cluster by proxy. Abundance mass spectra, obtained upon carefully electrospraying solutions of tert-butanol (TB) in water into a mass spectrometer, display a systematic series of peaks due to mixed H(+)(TB)m(H2O)n clusters. Clusters with m + n = 21 have higher abundance (magic number peaks) than their neighbours when m ≤ 9, while for m > 9 they have lower abundance. This indicates that the mixed TB-H2O clusters retain a core hydrogen bonded network analogous to that in the famous all-water H(+)(H2O)21 cluster up to the limit m = 9. The limiting value corresponds to the number of dangling O-H groups pointing out from the surface of the degenerated pentagonal dodecahedral, considered to be the lowest energy form of H(+)(H2O)21; the experimental findings therefore support this geometry. The experimental findings are supported by ab initio quantum chemical calculations to provide a consistent framework for the interpretation of these kinds of experiments.
Seems there are five colors in total, so I am guessing what I read as Silver White Oak on a Google search is actually two colors, Silver & White Oak. The panels are aluminum, so that helps with the higher pricing. There are also optional wooden top panels! To me, it seems like all colors are represented in the tease Fractal Design released a few days ago on their Twitter feed. The Blue color really made me nostalgic for the early 1990's Silicon Graphics workstations, but I will probably get a Grey chassis! I have seen this listed (again, on web stores that have since pulled) from US$160 to US$180; this leads me to believe all the colored bits (panels & PCI bracket cover & power button) are all aluminum, as does the fact that the rear panel is all that is supporting the upper & lower frame rails. Seems like that wouldn't be something that would have a long life if plastic? Anyway, until Wednesday the 18th of March rolls about, all we can do is speculate! Enjoy!
Search All 1 Records in Our Collections Welcome to the new Collections Search. You can still use the previous version of the site at this link. The Museum’s Collections document the fate of Holocaust victims, survivors, rescuers, liberators, and others through artifacts, documents, photos, films, books, personal stories, and more. Search below to view digital records and find material that you can access at our library and at the Shapell Center. Group portrait of children, some wearing costumes, in the Yesodei HaTorah school in Antwerp. Photograph | Photograph Number: 36244 Group portrait of children, some wearing costumes, in the Yesodei HaTorah school in Antwerp. Eva Schonberg is pictured in the front row, leaning over, in a dark sweater. Next to her on the right is Friedi Teitelbaum. To the left of Ava is Astrid Freudman. Pictured third from the left wearing a hood is Evelyn Goldenberger. Ava Schonberg (born Eva Schonberg) is the daughter of David Schonberg (b. Tenczynick, Poland on 3/17/1905) and Rosa Elowicz Schonberg (b. Dukla, Poland on 2/15/1909. David and Roza Schonberg moved to Antwerp prior to the birth of their three children: Celine (b. 11/3/1935, Ava (b. 1/18/1937) and Alice (b. 10/22/1941). The family was very religious, and David worked as a diamond cutter. In September, 1942 Ava's father David Schonberg was arrested taken to Malines, and then on September 12 he was transported to Auschwitz on Convoy IX. Soon after he was arrested, Roza went into hiding with her children. Roza hid together with the baby Alice, and Celine and Ava hid separately. Ava first hid with a Jewish family who was temporarily exempt from deportation. They moved from place to place and always lived in fear. Then Roza found a secure spot in the attic of her seamstress Madame Louise in Brussels. She lived there for almost a year. Madame Louise brought Celine and Ava to the convent Notre Dame de Sept Douleurs in Wezembeek. Roza accompanied Madame Louise on a few visits to the convent, but for security Madame Louise pretended to be the girls' mother. Only the mother superior knew they were Jewish. The convent hid some 18 Jewish children at different points. The nuns of the convent were later recognized by Yad Vashem as Righteous among the Nations. In 1944, Roza arranged for a member of the Belgian underground to smuggle the family into Switzerland. They boarded a truck filled with approximately 50 other Jews and traveled to the boarder by way of France. However, en route Celine contracted the measles and couldn't proceed. Roza sent Ava on ahead with Alice while she remained with Celine. The whole time, Ava held the hand of her toddler sister lest anything happen to her. After the sisters snuck under the barbed wire border fence, they were brought to the Girenbad refugee camp near Zurich. They later learned that the adults who came with them were returned to France and later deported to Auschwitz. Two weeks later Ava's mother and Celine arrived safely in Switzerland. Roza and Alice went to the Morgins refugee camp, and Ava and Celine were brought to foster families in Zurich. Ava lived with Arnold Scheiner and his wife, a very kindly older couple who had no children of their own. Celine lived with another family. After the war ended in 1945 Roza retrieved her daughters and returned to Belgium. It soon became clear that David had not survived. Roza needed time to put her life back in order and put the girls in a religious orphanage run by Mr. Tiefenbrunner. Ava and Celine lived there for three year; their mother, who found work as the first female diamond cutter, sent them packages once a week. Another American family who wanted to help war orphans also sent monthly packages of food and clothing. In 1948 the girls moved back to live with their mother and attended the Orthodox Beit Yaakov School. About a year later, Roza remarried Rabbi Haskel Dovid Halberstam who had lost all of his children and his pregnant wife during the Holocaust. He legally adopted the three Schonberg girls. In 1953 they immigrated to the United States and settled in New York. Learn about over 1,000 camps and ghettos in Volume I and II of this encyclopedia, which are available as a free PDF download. This reference provides text, photographs, charts, maps, and extensive indexes.
This invention is in the field of toys or games and more specifically those toys and games which employ pressurized water. Many toys and games have heretofore been devised which employ fluids including water during the operation of the game. For example, the U.S. Pat. No. 3,700,172 issued to Gallegos discloses a toy flying craft which is powered by directed pressurized water. A somewhat similar flying craft is disclosed in U.S. Pat. No. 3,605,329 issued to Dalli wherein the craft uses lighter-than-air gas. The game or toy disclosed herein provides for a suspended balloon above the head of each player with the balloon above a particular player being filled with water by the repeated activation of water valves by the other players. Eventually, the particular balloon will burst thereby drenching the player therebeneath. Such a game or toy is not known to exist prior to the applicant's invention thereof although many games have been provided wherein the individual players squeeze a bulb or other similar device for movement of various objects. For example, the U.S. Pat. No. 3,711,097 issued to Begley discloses a game wherein each player is provided with an air bulb for impelling a plurality of balls toward a target.
Q: How to get a list of child ids for a named category? I believe I could do this with either get_categories() or wp_list_categories() and passing a 'child_of' parameter, for example, but that would return a much larger dataset than I need. Is there a direct call that returns the child ids for any category as a simple list (1,2,3,5, etc)? A: Try this: get_terms( 'category', "child_of=$parent&fields=ids" ); // should return an array containing the ID's of children of term $parent
So the New England Patriots have cut four players in less than 24 hours. The moves have sparked all sorts of speculation. The release of Tully Banta-Cain, Joey Galloway, Eric Alexander, and Michael Matthews opens up $2.87 million in nonprorated 2009 salary cap space, which in theory allows the Patriots to absorb a player with a full-season base salary of $2.85 million. (Because all players were signed through 2009 only, there's no cap acceleration arising from cutting them.) Some are speculating that the Patriots are making a play for Chargers linebacker Shawne Merriman. Coincidentally, his full-season base salary for 2009 is $2.972 million. Another possibility could be Rams running back Steven Jackson (WEEI radio apparently is throwing that one around), but Jackson's full-season base salary if $5.5 million. Also, the Rams reportedly aren't inclined to move him. Many also are speculating that linebacker Adalius Thomas would be included in any trade, given his surprise scratch on Sunday. His $1.9 million full-season base salary would be offset by bonus acceleration from 2010 and 2011, the final two years of his contract. The Pats are always fun to watch in the offseason and during times like this. They show you how to operate a franchise. 9 picks in the 1st 3 rounds in the next draft shows once again that their front office is always working to get better. Which is necessary because as the Titans have shown us, if you dont improve you get worse...very bad very fast. __________________ What did the city of Houston do to anger the football gods?
#include "dev/pir-sensor.h" const struct sensors_sensor pir_sensor; static int pir_value; /*---------------------------------------------------------------------------*/ void pir_sensor_changed(int strength) { pir_value += strength; sensors_changed(&pir_sensor); } /*---------------------------------------------------------------------------*/ static int value(int type) { return pir_value; } /*---------------------------------------------------------------------------*/ static int configure(int type, int c) { return 0; } /*---------------------------------------------------------------------------*/ static int status(int type) { return 0; } /*---------------------------------------------------------------------------*/ SENSORS_SENSOR(pir_sensor, PIR_SENSOR, value, configure, status);
using Microsoft.AspNetCore.Http; using System; using System.Collections.Generic; using System.Threading.Tasks; using Xms.Plugin.Domain; namespace Xms.Plugin { public interface IEntityPluginUpdater { Task<bool> Update(EntityPlugin entity, IFormFile file); bool Update(EntityPlugin entity); bool UpdateState(IEnumerable<Guid> ids, bool isEnabled); } }
Montréal based George Stamos is a versatile artist and educator who has trained extensively in a diverse range of western contemporary / postmodern dance practices and specific Central African dance techniques. He has taught numerous independent workshops and classes at L'Université du Québec à Montréal and Concordia University. His specialization in teaching lies in the co-ordination of techniques for generating spontaneous movement with somatic exercises, structured improvisation, rhythm and relations to objects, weight and space. George is also known for creating performance that is physically dynamic, witty and thought provoking. Over the past fifteen years he has produced work regularly in Montreal and toured across North America. George has also danced with many prominent choreographers including Benoit Lachambre, Sara Shelton Mann and Zab Maboungou. In his formative years Stamos was a go-go dancer in Toronto, London, Amsterdam and NYC and he is a 1993 graduate of Amsterdam’s School for New Dance Development. George’s current research includes creation projects exploring gender and authority through the lens of queer theory and separately, an examination of how his teaching can be adapted to meet the needs of people living with Autism. Articles and reviews written by Stamos have been published online and in print by Canada’s leading dance magazine The Dance Current. reel. With his new durational solo reel George Stamos intersects his experience of euphoric dancing in nightclubs with beliefs around communion with the universe and ritual. In a twirling meditation oscillating between performance, liturgy and play Stamos maintains a state of spinning for periods of up to 60 min at a time. Performed in public away from the theater the audience is free to come and go as they please. Reel reconfigures conventional meetings between spectator and spectacle, evoking the potential for ordinary magic in daily life. (reel.) does not prescribe a predetermined experience or proximity to the audience; it is a reframing of public space and an invitation to witness or take part in an eccentric, kitsch, and rigorous contemporary meditation driven by an instinct to spin. Nunounenon With the word “no” as a point of departure Nunounenon is inspired by Yvonne Rainer’s 1965 No Manifesto, feminism and marching bands. With wit and humour the collaborators (dancers Gabrielle Surprenant-Lacasse and Anouk Thériault, composer Jackie Gallant and choreographer George Stamos) explore ways feminism and queerness inform how the female body is presented. By turning clichés inside out Nunounenon reveals the absurdity of hyper-sexualized bodies and discrepancies between idealism and reality. The duo looks at how the word "no" is embodied. Nunounenon affirms an intrinsic right for every body to hold power. Situations Situations is an exploration of contemporary masculinities with the goal of stimulating a dialog on sexism, gender and authority. Situations evokes different ways the power dynamics of gender identity are embodied and how enculturation and social trends affect the presentation of the male body. Situations is an acknowledgement of the matrix of binary heteronormative thinking, male privilege and an exploration of ways by which this privilege and thinking could be reconfigured. Increasingly, we live in a world where traditional ideas about gender no longer make sense. Meanwhile stories about contemporary masculinity go in and out of style, leaving us confused, uncertain and even complaisant about gender equality. We use terms like “metrosexual” and “lumbersexual” to explain the latest version of the modern man. We continue to be told simple stories about fundamental differences between men and women and contrasting stories about how progress towards gender equality is happening. These stories are increasingly unconvincing and hollow. Although we claim to aim for gender equality it continues to be predominantly men who hold political power, privilege and the ability to shape the world. This is obvious in our international relations, city planning, architecture, fashion industry, as well as how products ranging from cars to body lotions are marketed. Men rule the world. Sex(ism) sells, it’s comfortable and we know how it works… so why change? When are changes platitudes? How does gender and authority play out in the context of contemporary dance? Situations explores how these combinations of circumstances can be examined in performance, through the lens of queer theory, to form musings on who the "typical modern man" might be, if he exists, what his responsibilities are, how he occupies space and what women might have to say about it. Situations will premiere at l'Agora de la danse in Montreal, October 2015. Situations has received support from The Canada Council For the Arts, The McKnight Foundation, l'Agora de la danse and le Conseil des arts et des lettres du Québec. One Kind Favor One Kind Favor is danced by Karla Etienne, choreographed by George Stamos with music composed and performed live by Radwan Ghazi Moumneh. Special thanks to Sarah Shelton Mann for her introduction to dancing with the harmonica and permission to develop "harmonica dancing" in this project. One Kind Favor is a study of how patience and kindness can be embodied and the spaces they create. Knowing Not Knowing Workshop Teaching my interpretations of techniques and methods that have been passed down to me by the master teachers I have worked with is at the core of my artistic practice. In helping artists realize their goals I am inspired towards mine as well. My approach is a balance between a practice of disseminating information versus providing a context for workshop participants to share and polish their own skills and ideas. The way I teach movement is designed to develop the critical eye and awareness of methods for creating spontaneous mindfulness in motion. This includes teaching performers how to auto tune their senses and engage their intellect and body systems without disappearing into automatic dancing. The workshop will also expose the students to techniques for generating spontaneous movement compositions with objects and rhythm. I am committed to providing a workshop environment that is a safe, mature, place to learn skills and strengthen abilities. My interest is in empowering fellow artists and assisting them as they expand their own creative potential. Photo credits- top of page- George Stamos, photo by Veronique Mystique second from top- Ryan Dean, Robert Haarman, Patrick Jeffrey, Eben Knowler, Justin Leaf, Nic Lincon in Situations by George Stamos, photo courtesy of the McKnights Foundation third from top- Gabrielle Surprenant-Lacasse and Anouk Thériault, in Nunounenon photo by Veronique Mystique fourth from top- George Stamos, photo by Jerome Abramovitch fifth from top- Dany Desjardins and George Stamos, photo by Belle Ancell
Following our round-up of lime green, lavender, and sky blue colorways for spring, we are now looking at the latter half of the 2020 summer trends and for now, we're thinking all-white all summer long. White is clinical, but also futuristic, sporty (thank you Wimbledon), and considering you're probably not going outside too much these days – easier to keep clean. Pantone Institute’s Creative Director for Europe and resident color expert Jane Boddy tells Highsnobiety her thoughts on the colorway: "White is making a comeback, riding on the wave of a renewed view on minimalistic design, though this isn't the ’90s brutalist minimalism where it was all about cold starkness and as little design as possible. The minimalism for now has a softer edge, and aligns with an attitude towards design that is classic and seasonless. The white that sits within this movement is not brilliant white, but slightly off white, such as Pantone's "Cloud Dancer", often these softer whites are made from unbleached and organic cottons. Pantone "The purity of this tone blended with utilitarian or sporty-led design enables a minimalist aesthetic for all-year-round – and with any other color if one wishes - or head-to-toe for the ultimate take." Check out the rest of our favorite white products below. Bright Whites Highsnobiety / Julien Tell GmbH Evil Eye Tank Top Arda Tank Top $229 GmbH Free Express Shipping On Orders Over $300 Free Express Shipping On Orders Over $300 Buy at ssense GmbH White Jeans Darveesh Jeans $221 GmbH Free Express Shipping On Orders Over $300 Free Express Shipping On Orders Over $300 Buy at ssense Kassl Editions Tote XL Pop Oil Tote $149 Kassl Editions Free Express Shipping On Orders Over $300 Free Express Shipping On Orders Over $300 Buy at ssense TOOGOOD Boxer Trousers The Boxer Trousers $247 TOOGOOD Free Express Shipping On Orders Over $300 Free Express Shipping On Orders Over $300 Buy at ssense Carhartt WIP Single Knee Pants Single Knee Pants from $91 Carhartt WIP (Available at 2 Merchants) (Available at 2 Merchants) Where to shop Jacquemus Shirt Off Whites Highsnobiety / Julien Tell GmbH Pullover Atris Pullover $302 GmbH Free Express Shipping On Orders Over $300 Free Express Shipping On Orders Over $300 Buy at ssense Off-White™ Track Pants Fear of God ESSENTIALS Vest Polar Fleece Vest $80 FOG - Fear Of God Essentials Free Express Shipping On Orders Over $300 Free Express Shipping On Orders Over $300 Buy at ssense Raf Simons Oversized Sweater Oversized Patch Sweater $534 Raf Simons Free Express Shipping On Orders Over $300 Free Express Shipping On Orders Over $300 Buy at ssense Raf Simons Antwerp Tee Tour Antwerp T-Shirt from $153 Raf Simons (Available at 4 Merchants) (Available at 4 Merchants) Where to shop Stone Island Overshirt Our designated Selects section features products that we love and want to share with you. Highsnobiety has affiliate marketing partnerships, which means we may receive a commission from your purchase.
Background {#Sec1} ========== It is well known that bio-molecular networks can keep their regulatory functions robust against various types of external or internal perturbations. For instance, the fate decision mechanism in a bacteriophage life cycle \[[@CR1]\], the chemotaxis process in *Escherichia coli* \[[@CR2]\], and segmental polarization in *Drosophila melanogaster* \[[@CR3]\] were shown to be robust against noisy environments. It is more interesting that the dynamics of a biological network can be highly related to its structural characteristics \[[@CR4]\]. In particular, many recent studies have shown that a feedback loop (FBL), a circular chain of interactions, can play an important role in controlling the robustness or susceptibility of networks \[[@CR5], [@CR6]\]. For instance, the negative FBL between MDM2 and p53 maintains an optimal level of p53 and creates appropriate dynamics of p53 expression level changes for a given level of DNA damage \[[@CR7]\]. The Xenopus cell cycle is also robustly controlled against a certain level of perturbation with the help of several FBLs \[[@CR8]\]. It was shown that a high proportion of coherently coupled FBLs can enhance the robustness of a network against state perturbations \[[@CR9]\]. The number of FBLs involved at a node was also found to be positively correlated with the node's functional importance \[[@CR10]\]. Those simulation studies, however, cannot fully explain how the FBLs influence the network robustness. Hence, there is a pressing need to more rigorously analyze the relationship between FBL structures and network dynamics. To measure network robustness, I herein use a synchronous Boolean network model \[[@CR9], [@CR11], [@CR12]\] in which a node state is represented by a Boolean value, and the states of all nodes are synchronously updated at every discrete time step. Every network state moves to another state, and a series of consecutive transitions are represented by a network state trajectory that eventually converges to a fixed-point or cyclic attractor. The attractor can describe various dynamic behaviors in a biological system, such as multi-stability and oscillations. If a node state is perturbed, the trajectory might converge to a different attractor. Therefore, a network is considered robust if the attractor does not change against a perturbation. Some tools have been proposed to quantify the network robustness by simulating the state transitions after randomly initializing the node states \[[@CR13]--[@CR17]\]. They have a limitation in network size for analysis, though, due to the exponential complexity of attractor computation. Therefore, it is a critical issue to find analytic results that can identify trivial parts that do not require further computation of state transitions. In this paper, I focus on the effects of an FBL on Boolean converging dynamics. A state of a node is propagated to other nodes along a path in a chain of consecutive interactions. Therefore, the state cannot be fed back to the original node if it is not involved in an FBL. In other words, the current state of a node will eventually disappear unless a downstream path constructs an FBL. From that idea, I developed an FBL-based notion to classify nodes in a network. In particular, I defined two sets of nodes, *no*-*FBL*-*in*-*upstream* (*NFU*) and *no*-*FBL*-*in*-*downstream* (*NFD*), according to whether the upstream and downstream paths, respectively, involve any FBLs and proved two theorems regarding NFU and NFD nodes. One is that every NFU node is always frozen irrespective of the initial states of other nodes. This implies that the converging values of all NFU nodes are eventually fixed to a value determined by the upstream source nodes. It also means that a network is likely to be susceptible to a perturbation subject to the source nodes. The other is that a network is robust against an arbitrary perturbation subject to a non-source NFD node. In other words, a network state eventually converges to the same attractor despite a state perturbation subject to a non-source NFD node. Inspired by those results, I further developed a perturbation-sustainable probability which indicates how likely it is that a perturbation effect will be sustained through a network state trajectory and showed that it can adequately identify functionally important genes, such as essential, disease-associated, and drug-target genes, in large human signaling networks. Taken together, all of these results will promote understanding of the effects of FBLs on Boolean converging dynamics and reduce the computational costs of state transition-based simulation tools. Methods {#Sec2} ======= Structural classification of nodes in a network {#Sec3} ----------------------------------------------- In this study, a biological network is represented by a directed graph *G*(*V*, *E*) where *V* = {*v*~1~, *v*~2~, ⋯, *v*~*N*~} is a set of nodes and *E* = {*e*~1~, *e*~2~, ⋯, *e*~*A*~} is a set of directed edges (interactions); an edge *e* ∈ *E* is an ordered pair of nodes (*v*~*i*~, *v*~*j*~) where *v*~*i*~, *v*~*j*~ ∈ *V*. I use some notions from graph theory, including FBL and upstream/downstream paths, to represent the biological networks as follows. ### Definition {#FPar1} A node *u* is an input node of *v* if there exists an interaction from *u* to *v* (i.e., (*u*, *v*) ∈ *E*). In addition, in-degree of *v* means the number of input nodes of *v*. ### Definition {#FPar2} A node *v* is a source node if in-degree of *v* is zero. It is assumed that the state of a source node is fixed to its initial value over all the time. ### Definition {#FPar3} Given a network *G*(*V*, *E*), a *path P* of a length *L*(≥1) is represented by a sequence of ordered nodes *u*~1~*u*~2~ ⋯ *u*~*L* + 1~ with interactions from *u*~*i*~ to *u*~*i* + 1~ ((*u*~*i*~, *u*~*i* + 1~) ∈ *E* for∀ *i* ∈ {1, 2, ⋯, *L*}) with no repeated nodes except *u*~1~ and *u*~*L* + 1~. In addition, *P* is called a *feedback loop* (*FBL*) if *u*~1~ = *u*~*L* + 1~. ### Definition {#FPar4} Given a network *G*(*V*, *E*), an *upstream* (resp., *downstream*) *path P* = *u*~1~*u*~2~ ⋯ *u*~*L* + 1~ of a node *v* ∈ *V* is a path in which the last (resp., *first*) node *u*~*L* + 1~ (resp., *u*~1~) is *v*. Note that if *P* is a feedback loop, then it is both an upstream and downstream path of *v*. In addition, *P* = *u*~1~*u*~2~ ⋯ *u*~*L* + 1~ is a *maximal upstream* (resp., *downstream*) *path* if there is no longer path such as *wu*~1~*u*~2~ ⋯ *u*~*L* + 1~ (resp., *u*~1~*u*~2~ ⋯ *u*~*L* + 1~*w*) for some *w* ∈ *V*. Based on those terms, I define no-FBL-in-upstream and no-FBL-in-downstream nodes as follows: ### Definition {#FPar5} Given a network *G*(*V*, *E*), a node *v* is called a *no*-*FBL*-*in*-*upstream* (*NFU*) (resp., *no*-*FBL*-*in*-*downstream*; *NFD*) node if there is no upstream (resp., *downstream*) path *P* = *u*~1~*u*~2~ ⋯ *u*~*L*~*v* (resp., *P* = *vu*~1~*u*~2~ ⋯ *u*~*L*~) such that for some *i* ∈ {1, 2, ⋯, *L*}, *u*~*i*~ is involved in any feedback loop. Figure [1](#Fig1){ref-type="fig"} shows an example of NFU and NFD nodes in a network. This network contains five NFU nodes *v*~1~, *v*~2~, *v*~5~, *v*~9~, and *v*~11~ and four NFD nodes *v*~5~, *v*~9~, *v*~10~ and *v*~11~. Note that *v*~5~, *v*~9~ and *v*~11~ are both NFU and NFD nodes. On the other hand, it also contains five nodes that are neither NFU nor NFD nodes because an FBL is both upstream and downstream of each of them. In particular, note that *v*~6~ is not directly involved in an FBL. In this paper, I will show that the NFU and NFD nodes can induce interesting dynamic properties in a perturbation analysis.Fig. 1An example of NFU and NFD nodes in a network. Every node is classified into one of four categories: "NFU but not-NFD", "NFD but not-NFU", "NFU and NFD", and "Neither NFU nor NFD" A perturbation analysis in a Boolean network model {#Sec4} -------------------------------------------------- To define the robustness or sensitivity of a network, I use a synchronous Boolean network model used in previous studies \[[@CR9], [@CR12], [@CR16]\]. In a Boolean network *G*(*V*, *E*), each *v*~*i*~ ∈ *V* has a value of 1 (on) or 0 (off) that represent the possible states of the corresponding elements. For example, the values 1 and 0 represent the "turn-on" and "turn-off" states of a gene, respectively. A directed interaction (*v*~*i*~, *v*~*j*~) can represent a positive (activating) or negative (inhibiting) relationship from *v*~*i*~ to *v*~*j*~. The value of each variable *v*~*i*~ at time *t* + 1 is determined by the values of *k*~*i*~ other variables $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {v}_{i_1},{v}_{i_2},\cdots, {v}_{i_{k_i}} $$\end{document}$ with an interaction to *v*~*i*~ at time *t* by a Boolean update function $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {f}_i:{\left\{0,1\right\}}^{k_i}\to \left\{0,1\right\} $$\end{document}$ where *f*~*i*~ is a constant value if *v*~*i*~ is a source node. All the Boolean variables are synchronously updated by a set of update functions *F* = {*f*~1~, *f*~2~, ⋯, *f*~*N*~}, and each update rule can be written as $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {v}_i\left(t+1\right)={f}_i\left({v}_{i_1}(t),{v}_{i_2}(t),\cdots, {v}_{i_{k_i}}(t)\right) $$\end{document}$. Many studies have been performed to elucidate the dynamic behaviors of biological networks. In particular, I address robustness against perturbations in terms of Boolean dynamics. In a Boolean network *G*(*V*, *E*) , a *network state* at time *t* is represented by an ordered list **v**(*t*) = \[*v*~1~(*t*), *v*~2~(*t*), ⋯, *v*~*N*~(*t*)\] ∈ {0, 1}^*N*^. Then, for a subset *U* = {*u*~1~, *u*~2~, ⋯, *u*~*M*~} ⊆ *V*, a *subset state* of *U* at time *t* denoted by **v**~*U*~(*t*) = \[*u*~1~(*t*), *u*~2~(*t*), ⋯, *u*~*M*~(*t*)\] ∈ {0, 1}^*M*^ is an ordered list consisting of values *u*~1~ through *u*~*M*~ at time *t*. A state trajectory of *V* starts from an initial state and eventually converges to either a fixed-point or limit-cycle attractor. These attractors can represent diverse biological network behaviors, such as multi-stability and oscillation \[[@CR18]--[@CR20]\]. This notion of an attractor introduces robustness in terms of the Boolean network dynamics as follows. If a network sustains an attractor against a perturbation, it is called robust against the perturbation. This concept has been widely used \[[@CR5], [@CR21]--[@CR24]\]. Here, I consider an initial-state perturbation. Given an initial state **v**(0) = \[*v*~1~(0), *v*~2~(0), ⋯, *v*~*N*~(0)\] at *t* = 0, an initial-state perturbation subject to node *v*~*x*~ ∈ *V* represents a situation in which **v**(0) is mutated to **v**^\'^(0) = \[*v*~1~(0), ⋯, 1 − *v*~*x*~(0), ⋯, *v*~*N*~(0)\], *i.e*., the corresponding initial value is switched to $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{v_x}(0) $$\end{document}$ (the negation of *v*~*x*~(0)). An initial-state perturbation represents the abnormal (or malfunctioning) status of a protein or gene caused by a mutation. The attractors to which **v**(0) and **v***\'* (0) will converge can be compared to each other. The network is called robust or sensitive against the perturbation according to whether the attractors are the same as or different from each other, respectively. Based on this concept, I define some terms more rigorously with respect to the Boolean dynamics, as follows. ### Definition {#FPar6} The sequence of states to which **v**(0) eventually converges is called the *attractor* induced from **v**, which is denoted by an ordered list of network states ζ(**v**) = \[**v**(*τ*), **v**(*τ* + 1), ..., **v**(*τ* + *p* − 1)\] where **v**(*t*) = **v**(*t* + *p*) *for* ∀ *t* ≥ *τ* (*p* is a length of the attractor), and **v**(*i*) ≠ **v**(*j*) *for* ∀ *i* ≠ *j* ∈ {*τ*, *τ* + 1, ..., *τ* + *p* − 1}. In addition, for a subset *U* ⊆ *V*, ζ(**v**~*U*~) = \[**v**~*U*~(*τ*), **v**~*U*~(*τ* + 1), ..., **v**~*U*~(*τ* + *p* − 1)\] represents the states sequence of *U* in the attractor induced from **v**. ### Definition {#FPar7} For *U* ⊆ *V*, *ζ*(**v**~*U*~) is *frozen* if there exists a time step *τ* such that *v*(*t*) = *v*(*t* + 1) for ∀ *v* ∈ *U and* ∀ *t* ≥. ### Definition {#FPar8} Given two attractors with a same length, *ζ*(**v**) = \[**v**(*τ*), **v**(*τ* + 1), ..., **v**(*τ* + *p* − 1)\] and *ζ*(**v**^\'^) = \[**v**^\'^(*τ*^\'^), **v**^\'^(*τ*^\'^ + 1), ..., **v**^\'^(*τ*^\'^ + *p* − 1)\], they are *equivalent* to each other if there exists a time step offset *t* ≥ 0 such that **v**(*τ* + *i*) = **v**^\'^(*τ*^\'^ + (*i* + *t*) *mod p*) for ∀ *i* ∈ {0, 1, ..., *p* − 1}. ### Definition {#FPar9} Consider an arbitrary initial state **v**(0) = \[*v*~1~(0), *v*~2~(0), ⋯, *v*~*N*~(0)\] and its perturbed state at *v*~*x*~ ∈ *V*, **v**^\'^(0) = \[*v*~1~(0), ⋯, 1 − *v*~*x*~(0), ⋯, *v*~*N*~(0)\]. The Boolean network is called *robust* against the perturbation subject to *v*~*x*~ if *ζ*(**v**) is equivalent to *ζ*(**v**^\'^). Otherwise, it is called *sensitive* or *susceptible*. Datasets of signaling networks and functionally important genes {#Sec5} --------------------------------------------------------------- In this study, I derive an estimated probability with which a perturbation effect is sustained in a network. To show the usefulness of it, I used two large-scale human signaling networks. One is the signaling network of 1659 genes and 7964 interactions constructed in a previous study \[[@CR25]\] by integrating all the human signaling pathways in the KEGG (Kyoto Encyclopedia of Genes and Genomes) database \[[@CR26]\] (see Additional file [1](#MOESM1){ref-type="media"}: Table S1). The other signaling network consists of 6306 genes and 62,937 interactions (version 6) downloaded from <http://www.bri.nrc.ca/wang> \[[@CR27]\] (see Additional file [1](#MOESM1){ref-type="media"}: Table S2). In this work, I call them the KEGG and WANG networks, respectively. In addition, I considered essential, disease, and drug-targeted genes to represent functionally important genes. By using the DEG (Database of Essential Genes, version 5.4) database \[[@CR28]\], I found 473 and 1519 essential genes included in the KEGG and WANG networks, respectively. I also found 403 and 1557 disease genes in the KEGG and WANG networks, respectively, using the OMIM (Online Mendelian Inheritance in Man) database \[[@CR29]\]. Finally, I identified 353 and 1116 drug target genes in the KEGG and WANG networks, respectively, using the DrugBank database \[[@CR30]\]. Results {#Sec6} ======= Dynamic properties of NFU nodes {#Sec7} ------------------------------- In this section, I show that NFU nodes are eventually frozen in Boolean network dynamics. A Boolean network *G*(*V*, *E*) with a set of update functions *F* is given. ### Lemma 1 {#FPar10} Given an initial state **v**(0) and a node *v*~*k*~ ∈ *V*, let *U* = {*u*~1~, *u*~2~, ⋯, *u*~*M*~} be the set of input nodes of *v*~*k*~. If *ζ*(**v**~*U*~) is frozen, then $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \zeta \left({\mathbf{v}}_{\left\{{v}_k\right\}}\right) $$\end{document}$ is also frozen. ### *Proof* {#FPar11} For ∀ *u*~*i*~ ∈ *U*, there exists a time step *τ*~*i*~ such that *u*~*i*~(*t*) = *u*~*i*~(*t* + 1) for ∀ *t* ≥ *τ*~*i*~ since $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \zeta \left({\mathbf{v}}_{\left\{{u}_i\right\}}\right) $$\end{document}$ is frozen. Let $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \tau =\underset{i\in \left\{1,2,\dots, M\right\}}{ \max}\left({\tau}_i\right) $$\end{document}$. Then, *v*~*k*~(*t* + 2) = *f*~*k*~(*u*~1~(*t* + 1), ⋯, *u*~*M*~(*t* + 1)) = *f*~*k*~(*u*~1~(*t*), ⋯, *u*~*M*~(*t*)) = *v*~*k*~(*t* + 1) for ∀ *t* ≥ *τ*. Thus, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \zeta \left({\mathbf{v}}_{\left\{{v}_k\right\}}\right) $$\end{document}$ is also frozen ■ ### Lemma 2 {#FPar12} An initial state **v**(0) and a node *v* ∈ *V* are given. If every maximal upstream path of *v* includes at least one node *u* where *ζ*(**v**~{*u*}~) is frozen, then *ζ*(**v**~{*v*}~) is also frozen. ### *Proof* {#FPar13} Let *P*~1~, *P*~2~, ⋯, *P*~*M*~ be the list of maximal upstream paths of *v*, and let *u*~*i*~ ∈ *P*~*i*~ (*i* = 1, 2, ⋯, *M*) be the node where $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \zeta \left({\mathbf{v}}_{\left\{{u}_i\right\}}\right) $$\end{document}$ is frozen. Then consider a sub-path *P*~*i*~^\'^ of *P*~*i*~ starting from *u*~*i*~ and ending at *v*. Define *W* = {*w* ∈ *V*\|*w* ∈ *P*~*i*~^\'^ *for some i*} and let *l*(*w*) be the length of the longest path from *w* to *v*. Assuming that *L* = max~*w* ∈ *W*~*l*(*w*), *W* can be divided into *L* + 1 disjoint subsets *W*~0~, *W*~1~, ⋯ *and W*~*L*~ where *W*~*k*~ = {*w* ∈ *W*\|*l*(*w*) = *k*}. Then *ζ*(**v**~{*w*}~) for ∀ *w* ∈ *W* is frozen by mathematical induction with respect to *l*(*w*), as follows. When *k* = *L*, it is obvious that *ζ*(**v**~{*w*}~) of every *w* ∈ *W*~*L*~ is frozen because *w* ∈ {*u*~1~, *u*~2~, ..., *u*~*M*~}. Assume that *ζ*(**v**~{*w*}~) of every *w* ∈ *W*~*k* + 1~ is frozen and consider an arbitrary element *w*^\'^ ∈ *W*~*k*~. Then every input node of *w*^\'^ is an element of *W*~*k* + 1~. By lemma 1, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \zeta \left({\mathbf{v}}_{\left\{{w}^{\hbox{'}}\right\}}\right) $$\end{document}$ is frozen. Thus, *ζ*(**v**~{*w*}~) of every *w* ∈ *W*~*k*~ is also frozen. By mathematical induction, *ζ*(**v**~{*w*}~) of every *w* ∈ *W* is frozen. Therefore, *ζ*(**v**~{*v*}~) is also frozen because *v* ∈ *W*■ Lemma 2 provides a sufficient condition for the frozenness of a node. This can be extended to the case of NFU nodes as follows. ### Theorem 1 {#FPar14} *An initial state***v**(0) *is given. If v* ∈ *V is an NFU node, then ζ*(**v**~{*v*}~) *is frozen*. ### *Proof* {#FPar15} By the definition of NFU nodes, every maximal upstream of *v* starts with a source node *u* whose *ζ*(**v**~{*u*}~) is frozen. By Lemma 2, *ζ*(**v**~{*v*}~) is also frozen ■ This theorem implies that the states of NFU nodes are dependent on the states of source nodes, and this might make the network tend to be susceptible to perturbations subject to source nodes. ### Corollary {#FPar16} An initial state **v**(0) is given. If there is no FBL then *ζ*(**v**) is frozen. ### *Proof* {#FPar17} Since there are no FBLs, every *v* ∈ *V* is an NFU node. By Theorem 1, it follows that *ζ*(**v**) is always frozen irrespective of the initial states ■ Theorem 1 and its corollary explain the effect of FBLs on the frozenness of the converging state sequences. More specifically, every NFU node is frozen to a value determined by the set of source nodes included in its upstream paths. I also note that this result is strongly related to previous studies based on synchronous or asynchronous Boolean network models \[[@CR31]--[@CR33]\]. In particular, the corollary corresponds to a previous result having stated that the Boolean dynamics converges to a unique fixed point in an acyclic Boolean network \[[@CR31]\]. It is also relevant to the previous results showed that limit-cycle attractors can be induced by negative feedback loops \[[@CR32], [@CR33]\]. In addition, Theorem 1 can reduce the computation of attractors in a large scale network by easily obtaining the converging values of the NFU nodes. Dynamic properties of NFD nodes {#Sec8} ------------------------------- In the lemmas and a theorem of this section, I investigate the effect of FBLs on robustness. I consider an arbitrary initial state **v**(0) = \[*v*~1~(0), *v*~2~(0), ⋯, *v*~*N*~(0)\] and a perturbed state at *v*~*x*~ ∈ *V* from **v**(0), **v**^\'^(0) = \[*v*~1~(0), ⋯, *v*~*x* − 1~(0), 1 − *v*~*x*~(0), *v*~*x* + 1~(0), ⋯, *v*~*N*~(0)\] in the following lemmas 3 and 4, and theorem 2. I denote the value of a node *w* ∈ *V* at time *t* in the trajectories starting from **v**(0) and **v**^\'^(0) by **v**~{*w*}~(*t*) and **v**~{*w*}~^\'^(*t*), respectively. ### Lemma 3 {#FPar18} Let **v**(0) be an initial state, **v**^\'^(0) a perturbed state at *v*~*x*~ ∈ *V* from **v**(0), and *w* ∈ *V* an arbitrary node. If there is no path from *v*~*x*~ to *w* then **v**~{*w*}~(*t*) = **v**~{*w*}~^\'^(*t*) for ∀ *t* ≥ 0. ### *Proof* {#FPar19} The state value of node *w* is updated irrespective of that of node *v*~*x*~ because there is no path from *v*~*x*~ to *w*. Thus, the lemma holds ■ ### Lemma 4 {#FPar20} Let **v**(0) be an initial state, **v**^\'^(0) a perturbed state at *v*~*x*~ ∈ *V* from **v**(0), *w* ∈ *V* an arbitrary node. Let *Y* = {*y* ∈ *V*\|*y is included in some path from v*~*x*~ *to w*} and *l*(*y*) the length of a longest path from *v*~*x*~ to *y* ∈ *Y*. If *v*~*x*~ is a non-source node and no node in *Y* is involved with any FBL, then **v**~{*w*}~(*t*) = **v**~{*w*}~^\'^(*t*) for ∀ *t* ≥ *l*(*w*) + 1. ### *Proof* {#FPar21} By mathematical induction with respect to *l*(*y*), I show that for every *y* ∈ *Y*, **v**~{*y*}~(*t*) = **v**~{*y*}~^\'^(*t*) for ∀ *t* ≥ *l*(*y*) + 1, as follows. When *l*(*y*) = 0, it is obvious that *y* = *v*~*x*~. Then $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {\mathbf{v}}_{\left\{{v}_x\right\}}(t)={{\mathbf{v}}_{\left\{{v}_x\right\}}}^{\hbox{'}}(t) $$\end{document}$ for ∀ *t* ≥ 1 because *v*~*x*~ is a non-source node and involved with no FBL. To prove the inductive step, I assume that the property holds for *l*(*y*) ≤ *k* − 1. Consider an arbitrary *y* ∈ *Y* such that *l*(*y*) = *k* and let *U* be the set of input nodes of *y*. For every *u* ∈ *U*, there are two cases to consider: either *u* ∈ *Y* or *u* ∉ *Y*. In case of *u* ∈ *Y*, it is obvious that *l*(*u*) ≤ *k* − 1 by the definition of *l*(⋅). By the induction hypothesis, **v**~{*u*}~(*t*) = **v**~{*u*}~^\'^(*t*) for ∀ *t* ≥ *l*(*u*) + 1. In case of *u* ∉ *Y*, it means that there is no path from *v*~*x*~ to *u*. Then **v**~{*u*}~(*t*) = **v**~{*u*}~^\'^(*t*) for ∀ *t* ≥ 0 by lemma 3. From both cases, for ∀ *u* ∈ *U*, **v**~{*u*}~(*t*) = **v**~{*u*}~^\'^(*t*) for ∀ *t* ≥ *k*. Then **v**~{*y*}~(*t*) = **v**~{*y*}~^\'^(*t*) for ∀ *t* ≥ *k* + 1, thereby showing the property holds when *l*(*y*) = *k*. Since *w* ∈ *Y*, the lemma holds ■ ### Theorem 2 {#FPar22} *Let***v**(0) *be an initial state*, **v**^\'^(0) *a perturbed state at v*~*x*~ ∈ *V from***v**(0)*, and w* ∈ *V an arbitrary node. If v*~*x*~*is an NFD and non-source node, then the network is robust against a state perturbation subject to v*~*x*~. ### *Proof* {#FPar23} I show that there exists a constant time *T* such that **v**~{*w*}~(*t*) = **v**~{*w*}~^\'^(*t*) for ∀ *t* ≥ *T* in the following three cases. (*i*) Case that = *v*~*x*~ : Because *w* is an NFD and non-source node, **v**~{*w*}~(*t*) = **v**~{*w*}~^\'^(*t*) for ∀ *t* ≥ 1. (*ii*) Case that *w* is not connected by any path from *v*~*x*~ : By lemma 3, **v**~{*w*}~(*t*) = **v**~{*w*}~^\'^(*t*) for ∀ *t* ≥ 0. (*iii*) Case that *w* is connected by at least one path from *v*~*x*~ : Let *Y* = {*y* ∈ *V*\|*y* is included in some path from *v*~*x*~ *to w*} and *l*(*w*) be a longest length of those paths, respectively. Because *v*~*x*~ is an NFD node, no node included in *Y* is involved with any FBL. By lemma 4, **v**~{*w*}~(*t*) = **v**~{*w*}~^\'^(*t*) for ∀ *t* ≥ *l*(*w*) + 1. By (*i*),(*ii*), and (*iii*), there exists a constant time *T* such that **v**~{*w*}~(*t*) = **v**~{*w*}~^\'^(*t*) for ∀ *t* ≥ *T* and ∀ *w* ∈ *V*. Accordingly, the attractors starting at **v**(0) and **v**^\'^(0) are equivalent to each other. Therefore, the network is robust against the state perturbation subject to *v*~*x*~■ Theorem 2 indicates that biological networks might be robust against perturbations subject to NFD nodes. To support this result, I compared NFD and non-NFD gene groups with respect to the proportions of essential genes, disease genes, and drug targets in two human signaling networks, the KEGG and WANG networks (Fig. [2](#Fig2){ref-type="fig"}; see Additional file [1](#MOESM1){ref-type="media"}: Tables S3 and S4 for details). As shown in Fig. [2](#Fig2){ref-type="fig"}, the proportions of essential genes, disease genes, and drug targets among NFD genes were significantly smaller than those among non-NFD genes in both networks (all *p*-values\<10^−10^). I assume that essential genes, disease genes, and drug targets are likely to be susceptible to mutations, perturbations, or other external changes. In this regard, the relatively low proportions of essential genes, disease genes, and drug targets in the NFD group in the large-scale signaling networks support Theorem 2. In addition, I further examined the proportions of essential genes, disease genes, and drug targets in NFD group in random networks to examine if the observed result is specific to the signaling networks (see Additional file [2](#MOESM2){ref-type="media"}: Figure S1). I created each set of 100 random networks by rewiring the interactions of the KEGG (Additional file [2](#MOESM2){ref-type="media"}: Figure S1(A)) and WANG (Additional file [2](#MOESM2){ref-type="media"}: Figure S1(B)) networks so that the in-degree and the out-degree of the nodes are conserved, and observed that there is little difference between the NFD and non-NFD groups with respect to the proportions of essential genes, disease genes, and drug targets. This implies that the functionally important genes in the real signaling networks are not randomly distributed in terms of NFD classification.Fig. 2Comparison between groups of NFD and non-NFD genes in signaling networks. **a** Result in KEGG network with 975 NFD genes and 684 non-NFD genes. The proportions of essential genes in the NFD and the non-NFD groups were 0.204 and 0.401, respectively. The proportions of disease genes in the NFD and the non-NFD groups were 0.190 and 0.319, respectively. The proportions of drug-targets in the NFD and the non-NFD groups were 0.148 and 0.306, respectively. **b** Result in WANG network with 1706 NFD genes and 4600 non-NFD genes. The proportions of essential genes in the NFD and the non-NFD groups were 0.157 and 0.272, respectively. The proportions of disease genes in the NFD and the non-NFD groups were 0.235 and 0.251, respectively. The proportions of drug-targets in the NFD and the non-NFD groups were 0.161 and 0.183, respectively. In both networks, all the proportions for the NFD group were significantly smaller than those for the non-NFD group (all *p*-values\<10^−10^) Estimation of sustainability of a perturbation effect {#Sec9} ----------------------------------------------------- In the previous section, Theorem 2 showed that a network state is robust against a perturbation as long as the perturbation effect is not sustained by downstream FBLs. In other words, the existence of downstream FBLs is a necessary condition to make a network susceptible to a perturbation. Inspired by that result, I have derived an estimated probability that a perturbation effect will be sustained. Given a node *v*~*x*~ ∈ *V* subject to a perturbation, Lemma 3 shows that only downstream paths of *v*~*x*~ need to be considered, and Lemma 4 shows that only those involved with an FBL need to be considered. I first estimate the probability with which a perturbation subject to *v*~*x*~ is sustained through a single path involved with a FBL. Figure [3](#Fig3){ref-type="fig"} shows an example of a downstream path *P* = *v*~*x*~*u*~1~*u*~2~ ⋯ *u*~*L*~ of *v*~*x*~ which includes an FBL, and I consider **v**(0) and **v**^\'^(0) which are an initial state and a perturbed state at *v*~*x*~ ∈ *V* from **v**(0), respectively. It is said that the effect of a perturbation starting at *v*~*x*~ at the initial time is sustained through propagations in a sequence of *u*~1~, *u*~2~, ⋯, *u*~*L*~ if $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {\mathbf{v}}_{\left\{{u}_i\right\}}(i)\ne {{\mathbf{v}}_{\left\{{u}_i\right\}}}^{\hbox{'}}(i) $$\end{document}$ for ∀ *i* ∈ {1, ⋯, *L*}. Herein, it is assumed that a probability with which *u*~*i*~(*i*) is differently updated by the flipped value of *u*~*i* − 1~(*i* − 1), denoted by $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \Pr \left({\mathbf{v}}_{\left\{{u}_i\right\}}(i)\ne {{\mathbf{v}}_{\left\{{u}_i\right\}}}^{\hbox{'}}(i)\Big|{\mathbf{v}}_{\left\{{u}_{i-1}\right\}}\left(i-1\right)\ne {{\mathbf{v}}_{\left\{{u}_{i-1}\right\}}}^{\hbox{'}}\left(i-1\right)\right) $$\end{document}$, is the inverse of the in-degree of *u*~*i*~ because of the following reason (for simplicity of explanation, *u*~0~ = *v*~*x*~ is assumed). Let $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ W=\left\{{w}_{1,}{w}_2,\cdots, {w}_{d_i}\right\} $$\end{document}$ be the set of input nodes of *u*~*i*~ where *d*~*i*~ is the in-degree of *u*~*i*~. By assuming that the input nodes have an even degree of influence on updating *u*~*i*~, *i.e*., $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \Pr \left(Y\Big|{X}_1\right)=\cdots = \Pr \left(Y\Big|{X}_{d_i}\right) $$\end{document}$ where *Y* and *X*~*k*~(*k* ∈ {1, ⋯, *d*~*i*~}) denote two events $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {\mathbf{v}}_{\left\{{u}_i\right\}}(i)\ne {{\mathbf{v}}_{\left\{{u}_i\right\}}}^{\hbox{'}}(i) $$\end{document}$ and $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {\mathbf{v}}_{\left\{{w}_k\right\}}\left(i-1\right)\ne {{\mathbf{v}}_{\left\{{w}_k\right\}}}^{\hbox{'}}\left(i-1\right) $$\end{document}$, respectively. It is also assumed that *u*~*i*~ is always differently updated given a perturbation has occurred at one of the input nodes. Accordingly, $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \Pr \left(Y\Big|{\mathsf{U}}_{k\in \left\{1,\cdots, {d}_i\right\}}{X}_k\right)= \Pr \left(Y\Big|{X}_1\right)+\cdots + \Pr \left(Y\Big|{X}_{d_i}\right)=1 $$\end{document}$, and thus Pr(*Y*\|*X*~*k*~) = 1/*d*~*i*~ (∀ *k* ∈ {1, ⋯, *d*~*i*~}). Note that *u*~*i* − 1~ ∈ *W* because *u*~*i* − 1~ is one of the input nodes of *u*~*i*~. With this result, the probability with which the perturbation subject to *v*~*x*~ is sustained through a path *P* can be derived as follows:Fig. 3An example of a downstream path with a feedback loop. A node *v* ~*x*~ is subject to a state perturbation, and the perturbation effect can be sustained at *u* ~1~ with a probability of the inverse of the in-degree of *u* ~1~. This propagation is continued along the path *P* = *v* ~*x*~ *u* ~1~ *u* ~2~ ⋯ *u* ~*L*~ involved with a FBL$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \Pr (P)=\left\{\begin{array}{cc}\hfill {\displaystyle {\prod}_{i=1}^L1/{d}_i,}\hfill & \hfill \mathrm{if}\ \mathrm{an}\ \mathrm{F}\mathrm{B}\mathrm{L}\ \mathrm{is}\ \mathrm{involved},\hfill \\ {}\hfill 0,\hfill & \hfill \mathrm{otherwise}\hfill \end{array}\right. $$\end{document}$$Let *P*~1~, *P*~2~, ⋯, *P*~*M*~ be the set of all downstream paths of *v*~*x*~. Then I define the perturbation-sustainable probability *γ*(*v*~*x*~), the probability that the perturbation subject to *v*~*x*~ will be sustained through at least one FBL, as follows:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \gamma \left({v}_x\right)={ \max}_{i\in \left\{1,\cdots, M\right\}} \Pr \left({P}_i\right). $$\end{document}$$ If a gene with a relatively high *γ*(*v*~*x*~) value is subject to a perturbation, the network is likely to induce an abnormal dynamics due to the well conserved perturbation effect. In this regard, the perturbation-sustainable probability can indicate how much a gene is functionally or dynamically important in a signaling network. To show the usefulness of this probability, I examined the relationship between *γ*(*v*~*x*~) and the proportions of putatively susceptible genes in human signaling networks (Fig. [4](#Fig4){ref-type="fig"}; see Additional file [1](#MOESM1){ref-type="media"}: Tables S3 and S4 for details). Given a threshold value *β*, the proportions of essential genes, disease genes, and drug targets among the set of genes such that {*v*~*x*~\|*γ*(*v*~*x*~) ≥ *β*} are plotted against the threshold value in the KEGG (Fig. [4a](#Fig4){ref-type="fig"}) and WANG (Fig. [4b](#Fig4){ref-type="fig"}) networks. As shown in the figure, the genes with a high perturbation-sustainable probability are more likely to be essential genes, disease genes, and drug targets in both networks. This implies that the perturbation-sustainable probability can adequately identify the functionally important genes in human signaling networks. In addition, it is notable that the relation of the perturbation-sustainable probability to the functionally important genes was not observed in the random networks created by rewiring the interactions of the signaling networks (see Additional file [2](#MOESM2){ref-type="media"}: Figure S2). As in the results of Additional file [2](#MOESM2){ref-type="media"}: Figure S1, this also implies that the functionally important genes in the real signaling networks are not randomly distributed in terms of NFD classification. Taken together, it is interesting that such a simple topological measurement of genes based only on FBLs can efficiently predict the functionally important genes in human signaling networks.Fig. 4Changes in proportions of functionally important genes over the threshold value of the perturbation-sustainable probability. Given a threshold value *β*, the y-axis values indicate the proportions of essential genes, disease genes, and drug targets over the set of candidate genes whose perturbation-sustainable probability is larger than or equal to *β*. The larger the value of *β*, the smaller the number of candidate genes is. **a** Results of essential genes, disease genes, and drug targets in the KEGG network. For a reliable comparison, the maximal *β* was set to 0.0179 which generates 121 candidate genes. **b** Results of essential genes, disease genes, and drug targets in the WANG network. The maximal *β* was set to 1.0000, which results in 546 candidate genes Discussion {#Sec10} ========== In this study, I did not address the dynamics of non-NFU and non-NFD nodes, *i.e*., nodes that are involved in FBLs, and the analysis of their dynamics remains an open problem. In addition, the update-rule perturbation, another well-known type of perturbations, was not considered in this study because it influences the network robustness in a different way than the initial-state perturbation by changing the state transition diagram. Therefore, a future study should include analyses of genes that are neither NFU nor NFD nodes, and analysis of robustness against update-rule perturbations. Finally, it should be noted that the analyses in this study might not be effective for other types of biological networks than the signaling networks. For example, NFU/NFD classification was not meaningful in the large-scale gene regulatory networks \[[@CR34], [@CR35]\] because most genes were classified to NFD nodes. This implies that another method to further classify NFD nodes is required for analysis of those networks. Conclusions {#Sec11} =========== It is well known that biological networks can keep their regulatory functions robust against external or internal perturbations. More interestingly, the network robustness is highly related to the network's structural characteristics, including FBLs. However, previous results \[[@CR2], [@CR9], [@CR10]\] have been presented mainly through simulation and experiment studies because of the complexity of real biological networks. That raised a pressing need to develop various analytical approaches to validate the promising conjectures. In this paper, I used a synchronous Boolean network model in which a node state is represented by a Boolean value and updated by a logical rule. A network is considered robust if the attractor does not change against a state perturbation. Based on that assumption, I created a novel concept to characterize the nodes with respect to FBL structures: *no*-*FBL*-*in*-*upstream* (*NFU*) and *no*-*FBL*-*in*-*downstream* (*NFD*). This FBL-based characterization is different from other FBL-based measures \[[@CR10], [@CR36]\] in that it focuses on involvement with FBLs in the upstream or downstream paths, not with the node itself. Based on that notion, I proved two simple but useful theorems. One is that an NFU node is always frozen irrespective of the initial states of other nodes. Thus, the converging dynamics of an NFU node can be simply determined. The other is that a network is robust against an arbitrary perturbation subject to a non-source NFD node. This result shows that a network state eventually converges to the same attractor despite a perturbation subject to non-source NFD nodes. Note that the two theorems hold for arbitrary update functions as well as initial states. In addition, the second theorem led me to develop a function to approximately compute the perturbation-sustainable probability. I verified its effectiveness by showing that the higher the probability, the larger the proportion of essential, disease-associated, and drug-target genes in human signaling networks. I believe these results will promote understanding of the effects of FBLs on network dynamics and reduce the cost of computing robustness in existing tools which simulate a network state trajectory \[[@CR13]--[@CR17]\]. Additional files {#Sec12} ================ Additional file 1: Table S1.Dataset of KEGG network. It consists of 1659 genes and 7964 interactions constructed by integrating all the human signaling pathways in the KEGG (Kyoto Encyclopedia of Genes and Genomes) database. **Table S2.** Dataset of WANG network. It consists of 6306 genes and 62,937 interactions downloaded from <http://www.bri.nrc.ca/wang>. **Table S3**. Detailed analysis result of the KEGG network. It includes information about essential genes, disease genes, drug targets, NRU/NRD genes, and perturbation-sustainable probabilities in the KEGG network. **Table S4.** Detailed analysis result of the WANG network. It includes information about essential genes, disease genes, drug targets, NRU/NRD genes, and perturbation-sustainable probabilities in the WANG network. (ZIP 352 kb)Additional file 2: Figure S1.Comparison between groups of NFD and non-NFD genes in random networks with respect to the proportions of essential genes, disease genes, and drug targets. In each subfigure, a set of 100 random networks were generated by rewiring the interactions of the signaling networks such that the in-degree and the out-degree of all nodes are conserved. (A) Result of random networks shuffled from KEGG network. The average numbers of NFD and non-NFD genes were 509 and 1150, respectively. The average proportions of essential genes in the NFD and the non-NFD groups were 0.2849 and 0.2852, respectively. The proportions of disease genes in the NFD and the non-NFD groups were 0.2417 and 0.2435, respectively. The proportions of drug-targets in the NFD and the non-NFD groups were 0.2141 and 0.2122, respectively. (B) Result of random networks shuffled from WANG network. The average numbers of NFD and non-NFD genes were 1544 and 4761, respectively. The proportions of essential genes in the NFD and the non-NFD groups were 0.2390 and 0.2413, respectively. The proportions of disease genes in the NFD and the non-NFD groups were 0.2455 and 0.2472, respectively. The proportions of drug-targets in the NFD and the non-NFD groups were 0.1768 and 0.1769, respectively. **Figure S2.** Changes in the proportion of functionally important genes over the threshold value of the perturbation-sustainable probability in random networks. In each subfigure, a set of 100 random networks were generated by rewiring the interactions of the signaling network such that the in-degree and the out-degree of all nodes are conserved. Given a threshold value *β*, the y-axis values indicate the average proportions of essential genes, disease genes, and drug targets over the set of candidate genes whose perturbation-sustainable probability is larger than or equal to *β* in random networks. (A) Results in random networks shuffled from KEGG network. For a reliable comparison, the maximal *β* was set to 0.0266 which generates 131 candidate genes on average. (B) Results in random networks shuffled from WANG network. The maximal *β* was set to 0.0908, which results in 121 candidate genes on average. (ZIP 362 kb) FBL : Feedback loop NFD : No-FBL-in-downstream NFU : No-FBL-in-upstream Not applicable. Funding {#FPar24} ======= This work was supported by the 2015 Research Fund of University of Ulsan. Availability of data and materials {#FPar25} ================================== All data generated or analysed during this study are included in this published article and its supplementary information files. Authors' contributions {#FPar26} ====================== YKK conceived the study, designed the analyses, wrote and revised the manuscript. Competing interests {#FPar27} =================== The author declares that he has no competing interests. Consent for publication {#FPar28} ======================= Not applicable. Ethics approval and consent to participate {#FPar29} ========================================== Not applicable.
Priya Haji, a Silicon Valley tech entrepreneur known for her focus on socially-minded ventures in both the for-profit and non-profit spaces, most recently as CEO and co-founder of personal financial savings app SaveUp, passed away unexpectedly of natural causes on July 14th at the age of 44. SaveUp co-founder and CFO Sammy Shreibati confirmed the news to TechCrunch today. The cause of death has not been verified by medical authorities, though we’re told that early assessments indicate a pulmonary embolism or cardiac event may have occurred. Prior to founding SaveUp, Haji co-founded and led World of Good, a marketplace for fair trade and sustainable goods made by female artisans from developing countries. World of Good was acquired by eBay in February 2010. Haji founded her first social venture, a free health clinic in her hometown of Bryan, Texas, while she was still in high school, according to a 2011 profile published in Forbes. Haji earned a BA from Stanford University and an MBA from UC Berkeley. Shreibati shared the following statement on behalf of SaveUp: “I am incredibly saddened to write that my friend and co-founder Priya Haji passed away at her home on the evening of July 14, 2014. Her 11-month-old daughter and 2-year-old son survive her. Priya’s nickname was ‘Firecracker’, a name that her mother gave her because her birthday was on the 4th of July. At SaveUp we fed off her energy and passion to build something that helped the world. From her non-profit work at Free At Last to her ventured-backed companies World of Good and SaveUp, Priya was always striving to help people in everything she did. She was a courageous leader and colleague, but first and foremost a friend. Priya was one of the pioneers of female entrepreneurship in Silicon Valley. When she asked me to create this amazing company with her, I was honored and thrilled to be a part of it. She was an inspiration and made me a better person. We lost a wonderful leader, innovator, and friend and all of us at SaveUp are profoundly grieving.” Memorials to Haji have also been shared over the past two days by many saddened friends and colleagues on Twitter and Facebook. Chicago-based entrepreneur Cheryl Dahle has established a crowdfunding campaign on Fundly to help support Haji’s young children. A celebration of her life is scheduled to occur on Saturday, June 19 in the San Francisco Bay Area; further details will be posted on a Facebook memorial page that’s been set up by her family. In the 2011 interview with Forbes, Haji said her ultimate goal in business was to help solve problems for people in need, and encouraged others to do the same. She said: “My entrepreneurial imagination gets inspired by seeing how I can help people through an innovative use of business or technology. …I think the best ideas to solve the biggest problems are still out there to be done – and someone reading this article might have one. If that is you – trust yourself, and go for it! The worst thing that can happen is that it will not work, and who knows: You might create something even better than you imagined.” Haji also discussed her outlook on using business and technology for social good in a 2012 video interview with Aol’s Makers series. You can watch that embedded below. Priya Haji was an inspirational and positive presence in the technology and business worlds, and she will be greatly missed.
Q: Are Weierstrass points algebraic Let $X$ be a compact connected Riemann surface of genus $g>0$. Suppose that $X$ can be defined over a number field (as an algebraic curve). Then, is it clear that each Weierstrass point of $X$ is algebraic? A: Edit: as pointed out by Felipe below, what used to be here was sort of wrong-headed, but I can't delete this answer since it has already been accepted. Anyway you should do what he says: the divisor of all Weierstrass points counted with weights is defined by the vanishing of the Wronskian determinant of a basis of the space of $1$-forms on $X$. This divisor is then manifestly defined over $k$ and so all the Weierstrass points are defined over a finite extension.
Shop You are here Punch Shot: Most thankful for in 2013 By Since we've already revealed our turkeys of the year, we'll focus on something more positive. GolfChannel.com writers offer up what they're most thankful for in 2013. By RANDALL MELL I’m thankful for the way the stars aligned over St. Andrews before the Ricoh Women’s British Open this summer. Inbee Park fell short in her quest to become the first man or woman to win four professional major championships in a season, but there was something magical in the air that week with Park teeing it up at the birthplace of golf after winning the Kraft Nabisco Championship, Wegmans LPGA Championship and the U.S. Women’s Open. What a special week for the women, with the world watching to see if Park could make history. While she couldn't pull it off, the week ended with magic anyway, with Stacy Lewis hitting one of the greatest shots in major championship history, a 5-iron through a stiff wind at the famed Road Hole, to set up a birdie-birdie finish and her second major title. As always, Park was as gracious in defeat as she was in her victories this season. The women honored the game with their performances at St. Andrews that week. By RYAN LAVNER I'm thankful that, for the most part, the world’s best played like it in 2013. It makes being a golf writer even more enjoyable. Yes, it’s always fun to see who will be the year’s breakout star – Jordan Spieth, Hideki Matsuyama or Lydia Ko. But golf is driven by the biggest stars, by the headliners, and there was no shortage of those this season. The game was compelling from January to November. Tiger Woods won five times. The game’s other biggest star, Phil Mickelson, broke through at the Open Championship and won two other events. Adam Scott won the Masters, the best tournament of the year, and three other times worldwide. Henrik Stenson became a household name by claiming the big prizes on both sides of the Atlantic. On the women’s side, world No. 1 Inbee Park nearly became the first player, male or female, to win four professional majors in a season. Suzann Pettersen, Stacy Lewis and Lexi Thompson are all in hot pursuit. When the calendar flips to 2014, we don’t have to manufacture storylines. They’re ready-made, even obvious. We still want to know whether Tiger will resume his climb up Mount Nicklaus, or whether Scott can take the next step and reach world No. 1, or whether Phil can complete the career grand slam, or whether Stenson can extend his torrid form. And, yes, don’t forget, whether Rory McIlroy can return to championship form. All these stars, all these stories, all at once. Can’t wait to resume tapping away on the keyboard. By JASON SOBEL I don’t always enjoy their work and still believe they can be unnecessarily cruel at times, but this year I’m thankful for the golf gods. Don’t believe in 'em? Then you’ve probably never properly understood how a drive that slices into the trees only to carom back into the fairway is so often followed by one that travels dead straight only to land in a divot. The golf gods work in wonderful, magical, mysterious ways - and this year was no different. How else to explain the Masters finish? For years, Australia was tortured and tormented by Greg Norman’s numerous close calls at Augusta National. This year, the golf gods finally repaid the folks Down Under – or at least spared them greater heartache – by allowing a couple of crucial Adam Scott putts to find the bottom of the cup down the stretch for the country’s first Masters victory. How else to explain a son’s destiny? Ken Rose was Justin’s first golf instructor, and watched his son develop elite-level skills at an early age. He saw Justin finish in a share of fourth at the Open Championship as a 17-year-old. Ken died of leukemia in 2002, all of which made his son’s first major championship – on Father’s Day 11 years later – even more meaningful. How else to explain the unexplainable? In 19 previous Open Championship starts, Phil Mickelson owned only two top-10 finishes. Of the four majors, this was always the one he – and most observers – felt he’d probably never win. And then … he did. Just like that, it was as if Mickelson was given a key to unlock the secret of links golf and walked through the door into the winner’s circle. Just three examples of top players outperforming the rest of their competitors on major stages? Maybe. But there was a little karma and fate mixed into each one, as well. And for that, we must be thankful for the golf gods. By WILL GRAY As 2013 winds to a close, I’m thankful for the man who has discovered golf’s fountain of youth: Steve Stricker. One of the most personable players in the game, Stricker turned back the clock this year and demonstrated that it’s possible to contend on the PGA Tour while playing approximately once every lunar cycle. Stricker’s successful season – one that included eight top-10 finishes in just 13 starts – has in part caused several of his peers to reassess their on-course priorities over the age of 40, including Phil Mickelson. Beyond his own play, though, Stricker also helped to shape the 2013 PGA Tour season thanks to a single putting lesson at Doral with a certain 14-time major champion. Tiger Woods made everything in sight en route to winning the WGC-Cadillac Championship after a few tips from Stricker, then won three more times while claiming Player of the Year honors. Without Stricker taking the world’s top-ranked player under his wing in March, the rest of the 2013 season might have gone in an entirely different direction.
Q: Supporting Dark & Light Theme in AndroidX I currently use the following parent theme Theme.MaterialComponents.Light.NoActionBar and just updated my material design library to implementation 'com.google.android.material:material:1.1.0' which messed up some colors in my app So i am deciding to update it to support both light and dark themes. I will post what i did to achieve this to save some time for others searching A: After performing some searches, this is what i did in details Change the parent theme to Theme.MaterialComponents.DayNight.NoActionBar <style name="AppTheme" parent="Theme.MaterialComponents.DayNight.NoActionBar"> <item name="android:navigationBarColor">@color/transparent</item> <item name="android:windowContentTransitions" tools:targetApi="lollipop">true</item> <item name="colorPrimary">@color/colorPrimary</item> <item name="colorPrimaryDark">@color/colorPrimaryDark</item> <item name="colorSecondary">@color/colorAccent</item> </style> Remove all background colors, text colors etc... where its necessary add colors this way: "?android:attr/colorBackground", "?attr/colorOnBackground", "?attr/colorSurface" where needed To change some colors in-code then use this function fun getColor(context: Context, colorResId: Int): Int { val typedValue = TypedValue() val typedArray = context.obtainStyledAttributes(typedValue.data, intArrayOf(colorResId)) val color = typedArray.getColor(0, 0) typedArray.recycle() return color } Example: setTextColor(Utils.getColor(context, R.attr.colorError)) Add values-night directory if necessary to support different colors in dark and night mode Add colors.xml file inside the directory and then just override any color written in colors.xml Example: <?xml version="1.0" encoding="utf-8"?> <resources> <color name="colorPrimaryDark">#1f2021</color> </resources>
Coolwhat is xo sauce in Antigua and Barbuda Coolwhat is xo sauce in Antigua and Barbuda MANUFACTURER: (what is xo sauce )MODEL: SKU:660283-119Release Date:bitcoin register account perhaps due to the exchange’s human element.:Find Cheap Prices below in Antigua and BarbudaMODEL: SKU:637283-09630% OFF Plus free return:$1211pearl price in kolkata but since the events of September 11.,what is xo sauce ” The NYSE American t stock markS.ets do not; they remain open on Easter Monday.rading delay is the second to be proposed since IEX won approval. what is xo sauce (buy bitcoin gold uk ) Coolwhat is xo sauce in Antigua and Barbuda It also set The Exchange was only closed for one more day during wartime,a fixed number of brokers Just as London enjoyed grow9% of trades.th through international trade,(at 100),ripple share price prediction b however,o and two months later was named its new CEO,nd, Cryptocurrency: What will one bitcoin cost in 2019 you may want t and Swaminathan,o c Compare Comparable Companies When comparing the performance of two companies,onsider buying another business The longer-term CDs will pay higher rates of return,.
--- components/keyed_service/core/dependency_graph_unittest.cc.orig 2019-09-10 10:42:35 UTC +++ components/keyed_service/core/dependency_graph_unittest.cc @@ -9,7 +9,11 @@ #include "components/keyed_service/core/dependency_graph.h" #include "components/keyed_service/core/dependency_node.h" #include "testing/gtest/include/gtest/gtest.h" +#if defined(OS_BSD) +#include <re2/re2.h> +#else #include "third_party/re2/src/re2/re2.h" +#endif namespace {
// Any copyright is dedicated to the Public Domain. // http://creativecommons.org/licenses/publicdomain/ var a = 9; var global = this; function test() { var a = 0; // direct eval sees local a assertEq(eval('a+1'), 1); assertEq(eval('eval("a+1")'), 1); // indirect: using a name other than 'eval' var foo = eval; assertEq(foo('a+1'), 10); assertEq(eval('foo("a+1")'), 10); // outer eval is direct, inner foo("a+1") is indirect // indirect: qualified method call assertEq(this.eval("a+1"), 10); assertEq(global.eval("a+1"), 10); var obj = {foo: eval, eval: eval}; assertEq(obj.foo('a+1'), 10); assertEq(obj.eval('a+1'), 10); var name = "eval"; assertEq(obj[name]('a+1'), 10); assertEq([eval][0]('a+1'), 10); // indirect: not called from a CallExpression at all assertEq(eval.call(undefined, 'a+1'), 10); assertEq(eval.call(global, 'a+1'), 10); assertEq(eval.apply(undefined, ['a+1']), 10); assertEq(eval.apply(global, ['a+1']), 10); assertEq(['a+1'].map(eval)[0], 10); } test(); reportCompare(0, 0);
Subscribe to this blog Subscribe by email Buddhism in 2050: Worldwide stagnation, booming in wealthy countries Pew Research made a great survey on religions future. It's a HUGE survey, a prospective one, from 2010 to 2050.You can find it here, for free. Who is PEW? You don't know them? They produce a lot of great stats and Conrad Hackett, demographer is one of my favorite Twitter following. Here is their mission:"We generate a foundation of facts that enriches the public dialogue and supports sound decision-making. We are nonprofit, nonpartisan and nonadvocacy. We value independence, objectivity, accuracy, rigor, humility, transparency and innovation." You can read this survey for many reasons: check how big your religion will be in 2050, check how big the booming religion of the moment, Islam, will be in 2050, check which religion will select the biggest atheist population, China. etc. Why I read it: Buddhism I read it to see the future of my favorite religion, Buddhism. If you know me, no need to explain. I can explain you why I'm a big fan of this religion for hours. If you don't know me, I sum up why I like this religion: Not human centric: it puts human at the same level as other species and thus, lead to vegetarianism. Not ego centric: Buddhism teaches that human's beliefs that they are different, that they have a mission, that they worth more than other humans are wrong. It doesn't say everybody must be equal, it just says everybody is in the same boat. Great values: buddhism put kindness, happiness and compassion at the heart of its values. Our own happiness and other humans happiness doesn't make difference. Our happiness is not related by social status, possessions, etc. Life not a zero sum game. No external pressure or source of solution, no dogma, nobody will save or punish you, tell you who you are of what to do, what to think, change is an inner process. No proselytism: Dalai Lama advise people to think twice before moving to buddhism because changing from one religion to another is like cutting our roots. Have you ever seen an ad from a Buddhism temple or organization? No. Not political, buddhism is never recycled for political or war reasons. Non violent, you already know that. I think that this religion is just positive for the planet. Very positive. That's what I want it to succeed, not as a religion, but as a philosophy, an influence on the way humans live with each others. Future of Buddhism: negative macro trends... Sorry for Buddhism experts, I may be wrong or very approximative but It's my perspective. And writing these bullet points, I realized that Pew's conclusion on Buddhism future were easy to anticipate... One word: stagnation. I asked Conrad why Buddhism will just stagnate from now to 2050, here is the answer: But, very positive signals too in Europe and in the US Look at this one: Quote: "In North America, for example, the Buddhist population is projected to grow by more than 2 million, from 3.9 million in 2010 to nearly 6.1 million in 2050. At the same time, the Buddhist populations in Europe and the Middle East-North Africa region are expected roughly to double." This trend amazed me! A religion which... does not really have a "cause", does not have dogma or a clear clergy, do not do marketing, do not do do proselytism, is not backed up by powerful and rich States, is fought by one of the most popular State in the world will boom in Europe and US. USA will be the 10th buddhist country in 2050 with more than 6 million people. Europe will have 2,5 million buddhist. And what I like most beyond these figures is that, as Buddhism does not have dogma, influence of Buddhism will be bigger. Beyond real "Buddhists", a lot of people like me will be exposed to Buddhism philosophy, like it and follow some of its messages. Zen, yoga, meditation have more and more adepts, that's kind of Buddhism influence too! What about purchase power? I like the idea that the world is shaped by what people buy. As a result, Buddhist influence will really have an impact on the way the wold is shaped if people who have a lot of money to spend are influenced by it. I made a blog post about it. Indeed, if millions of very low income people convert to Islam of Christianism, it's big in terms of figures and volume but not on the way the world work.
Blood groups and transfusion medicine in Taiwan. There are significant differences in the frequencies of various blood group antigens between Taiwanese and Caucasians, and also in the frequencies of the corresponding alloantibodies. The most interesting discoveries concerning Taiwanese are: 1) The most common ABO subgroups are the B3 phenotype, followed by the Ael phenotype. 2) The secretory H-deficient para-Bombay phenotype (OHm), which results from mutations in five different h genes, is not uncommon. 3) The Le(a+b+) phenotype has a frequency of about 25% and the Le(a+b-) phenotype is absent except in a few of the indigenous groups. 4) Anti-'Mi(a)' is the most common clinically significant alloantibody causing intravascular hemolytic transfusion reactions and hemolytic disease of the newborn. 5) The incidence of the corresponding MiIII blood group phenotype varies among the different ethnic groups, ranging from 0% among descendants of mainland Chinese from north of the Yangste to 88.4% among the Ami tribe. 6) There is an almost complete absence of Di(a) and St(a) antigens among the indigenous populations, in contrast to incidences of greater than 2% among the Chinese ethnic groups. 7) Nearly all (99.67%) Taiwanese are positive for the Rh(D) antigen. Among those with Rh(D) negative phenotype, about 30% have a very weak Rh(D) positive phenotype (Del phenotype). Since the corresponding anti-D antibody is also rarely encountered, routine D typing is not necessary. 8) Some rare blood group phenotypes found in Taiwanese are the i phenotype associated with congenital cataract, DVI phenotype, Dc- phenotype, Jk(a-b-) phenotype, and Lu(a-b-) phenotype.
Holy, epic-ally magnificent! This Majestic Mountain-Scape is stunning and All of The Northern People look incredible! The designs, expressions, poses, coats, weaponry, snow, mountains, castles, towers, architecture, terrain, realisticness, sky, clouds, ledges, cliffs, boulders, plant life, mist, shadows, gleam, movement, lake town, ocean, atmosphere, hues, textures, concept, composition, uniqueness, lighting, colors, style, and other details are also wonderful! Amazingly radical work!
apiVersion: apps/v1 kind: Deployment metadata: name: {{ template "zookeeper-operator.fullname" . }} namespace: {{ .Release.Namespace }} spec: replicas: 1 selector: matchLabels: name: {{ template "zookeeper-operator.fullname" . }} template: metadata: labels: name: {{ template "zookeeper-operator.fullname" . }} component: zookeeper-operator spec: serviceAccountName: {{ .Values.serviceAccount.name }} containers: - name: {{ template "zookeeper-operator.fullname" . }} image: "{{ .Values.image.repository }}:{{ .Values.image.tag }}" imagePullPolicy: {{ .Values.image.pullPolicy }} ports: - containerPort: 6000 name: metrics command: - zookeeper-operator env: - name: WATCH_NAMESPACE value: "{{ .Values.watchNamespace }}" - name: POD_NAME valueFrom: fieldRef: fieldPath: metadata.name - name: OPERATOR_NAME value: {{ template "zookeeper-operator.fullname" . }} resources: {{ toYaml .Values.resources | indent 12 }} {{- with .Values.nodeSelector }} nodeSelector: {{ toYaml . | indent 8 }} {{- end }} {{- with .Values.affinity }} affinity: {{ toYaml . | indent 8 }} {{- end }} {{- with .Values.tolerations }} tolerations: {{ toYaml . | indent 8 }} {{- end }}
Q: A Foreign key refering MasterDataEntity from MainTableEntity has the wrong number of column I have a master data table. The use of this table is to just hold the data (as such it has no relationship with other tables). This is MasterDataEntity @Id @Column(name = "TYPE_ID") private Integer id; @Id @Column(name = "DESCRIPTION") private String description; In one of the other table (a functional table), I want to join this table. Like: This is the MainTableEntity: @ManyToOne(fetch = FetchType.EAGER) @JoinColumn(name = "TYPE_ID") private MasterDataEntity masterDataEntity; The logical intent here is that Maintable should contain one of the Type_Id of the MasterTable (not mandatory of all the rows even). I do not want to store any kind of information on MainTable in the MasterTable. All I want is only existing values from the master table can be added to the main table. Apart from the above, I did the following queries to mark the FK relation: ALTER TABLE MAIN_TABLE ADD TYPE_ID NUMBER; ALTER TABLE MAIN_TABLE ADD FOREIGN KEY (TYPE_ID ) REFERENCES MASTER_TABLE(TYPE_ID ); With the above code I get the error: A Foreign key referring MasterDataEntity from MainTableEntity has the wrong number of column. should be 2. I tried looking at the root cause but could not get any helpful info. I am new to Hibernate and it is possible I might be doing wrong things based on my requirements. Can someone suggest what is wrong here and what should I be doing to achieve my intent? Thanks P.S: I have mentioned only the relevant info. There are obviously many other columns in MainEntity, while MasterEntity has just 2 columns. Let me know if any info is required. A: It might be because of MasterDataEntity have multiple primary key, since id and description fields have @Id Annotation, It should just have one which is for TYPE_ID : @Id @Column(name = "TYPE_ID") private Integer id; @Column(name = "DESCRIPTION") private String description;
function wait_for_file( file_string ) % A forceful method to wait for a file to finish being written to % % Syntax: wait_for_file( file_string ) % % Inputs: % file_string - Absolute or relative path for the file to wait for % % % Author: Jacob Donley % University of Wollongong % Email: jrd089@uowmail.edu.au % Copyright: Jacob Donley 2017 % Date: 03 October 2015 % Revision: 0.1 % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% fid = fopen(file_string,'r'); while fid==-1 fid = fopen(file_string,'r'); end fseek(fid,0,'eof'); char_pos(1) = -1; char_pos(2) = ftell(fid); pause(0.5); while char_pos(1) ~= char_pos(2) char_pos(1) = char_pos(2); fseek(fid,0,'eof'); char_pos(2) = ftell(fid); pause(0.5); end fclose(fid); end
<!DOCTYPE HTML> <!-- NewPage --> <html lang="en"> <head> <!-- Generated by javadoc --> <title>Uses of Class java.lang.TypeNotPresentException (Java SE 12 &amp; JDK 12 )</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="Style"> <link rel="stylesheet" type="text/css" href="../../../../jquery/jquery-ui.css" title="Style"> <script type="text/javascript" src="../../../../script.js"></script> <script type="text/javascript" src="../../../../jquery/jszip/dist/jszip.min.js"></script> <script type="text/javascript" src="../../../../jquery/jszip-utils/dist/jszip-utils.min.js"></script> <!--[if IE]> <script type="text/javascript" src="../../../../jquery/jszip-utils/dist/jszip-utils-ie.min.js"></script> <![endif]--> <script type="text/javascript" src="../../../../jquery/jquery-3.3.1.js"></script> <script type="text/javascript" src="../../../../jquery/jquery-migrate-3.0.1.js"></script> <script type="text/javascript" src="../../../../jquery/jquery-ui.js"></script> </head> <body> <script type="text/javascript"><!-- try { if (location.href.indexOf('is-external=true') == -1) { parent.document.title="Uses of Class java.lang.TypeNotPresentException (Java SE 12 & JDK 12 )"; } } catch(err) { } //--> var pathtoroot = "../../../../"; var useModuleDirectories = true; loadScripts(document, 'script');</script> <noscript> <div>JavaScript is disabled on your browser.</div> </noscript> <header role="banner"> <nav role="navigation"> <div class="fixedNav"> <!-- ========= START OF TOP NAVBAR ======= --> <div class="topNav"><a id="navbar.top"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div> <a id="navbar.top.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../index.html">Overview</a></li> <li><a href="../../../module-summary.html">Module</a></li> <li><a href="../package-summary.html">Package</a></li> <li><a href="../TypeNotPresentException.html" title="class in java.lang">Class</a></li> <li class="navBarCell1Rev">Use</li> <li><a href="../package-tree.html">Tree</a></li> <li><a href="../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../index-files/index-1.html">Index</a></li> <li><a href="../../../../help-doc.html">Help</a></li> </ul> <div class="aboutLanguage"><div style="margin-top: 14px;"><strong>Java SE 12 &amp; JDK 12</strong> </div></div> </div> <div class="subNav"> <ul class="navListSearch"> <li><label for="search">SEARCH:</label> <input type="text" id="search" value="search" disabled="disabled"> <input type="reset" id="reset" value="reset" disabled="disabled"> </li> </ul> </div> <a id="skip.navbar.top"> <!-- --> </a> <!-- ========= END OF TOP NAVBAR ========= --> </div> <div class="navPadding">&nbsp;</div> <script type="text/javascript"><!-- $('.navPadding').css('padding-top', $('.fixedNav').css("height")); //--> </script> </nav> </header> <main role="main"> <div class="header"> <h2 title="Uses of Class java.lang.TypeNotPresentException" class="title">Uses of Class<br>java.lang.TypeNotPresentException</h2> </div> <div class="classUseContainer"> <ul class="blockList"> <li class="blockList"> <div class="useSummary"> <table> <caption><span>Packages that use <a href="../TypeNotPresentException.html" title="class in java.lang">TypeNotPresentException</a></span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colFirst" scope="col">Package</th> <th class="colLast" scope="col">Description</th> </tr> <tbody> <tr class="altColor"> <th class="colFirst" scope="row"><a href="#java.lang.invoke">java.lang.invoke</a></th> <td class="colLast"> <div class="block">The <code>java.lang.invoke</code> package provides low-level primitives for interacting with the Java Virtual Machine.</div> </td> </tr> </tbody> </table> </div> </li> <li class="blockList"> <ul class="blockList"> <li class="blockList"> <section role="region"><a id="java.lang.invoke"> <!-- --> </a> <h3>Uses of <a href="../TypeNotPresentException.html" title="class in java.lang">TypeNotPresentException</a> in <a href="../invoke/package-summary.html">java.lang.invoke</a></h3> <div class="useSummary"> <table> <caption><span>Methods in <a href="../invoke/package-summary.html">java.lang.invoke</a> that throw <a href="../TypeNotPresentException.html" title="class in java.lang">TypeNotPresentException</a></span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colFirst" scope="col">Modifier and Type</th> <th class="colSecond" scope="col">Method</th> <th class="colLast" scope="col">Description</th> </tr> <tbody> <tr class="altColor"> <td class="colFirst"><code>static <a href="../invoke/MethodType.html" title="class in java.lang.invoke">MethodType</a></code></td> <th class="colSecond" scope="row"><span class="typeNameLabel">MethodType.</span><code><span class="memberNameLink"><a href="../invoke/MethodType.html#fromMethodDescriptorString(java.lang.String,java.lang.ClassLoader)">fromMethodDescriptorString</a></span>&#8203;(<a href="../String.html" title="class in java.lang">String</a>&nbsp;descriptor, <a href="../ClassLoader.html" title="class in java.lang">ClassLoader</a>&nbsp;loader)</code></th> <td class="colLast"> <div class="block">Finds or creates an instance of a method type, given the spelling of its bytecode descriptor.</div> </td> </tr> </tbody> </table> </div> </section> </li> </ul> </li> </ul> </div> </main> <footer role="contentinfo"> <nav role="navigation"> <!-- ======= START OF BOTTOM NAVBAR ====== --> <div class="bottomNav"><a id="navbar.bottom"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div> <a id="navbar.bottom.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../index.html">Overview</a></li> <li><a href="../../../module-summary.html">Module</a></li> <li><a href="../package-summary.html">Package</a></li> <li><a href="../TypeNotPresentException.html" title="class in java.lang">Class</a></li> <li class="navBarCell1Rev">Use</li> <li><a href="../package-tree.html">Tree</a></li> <li><a href="../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../index-files/index-1.html">Index</a></li> <li><a href="../../../../help-doc.html">Help</a></li> </ul> <div class="aboutLanguage"><div style="margin-top: 14px;"><strong>Java SE 12 &amp; JDK 12</strong> </div></div> </div> <a id="skip.navbar.bottom"> <!-- --> </a> <!-- ======== END OF BOTTOM NAVBAR ======= --> </nav> <p class="legalCopy"><small><a href="https://bugreport.java.com/bugreport/">Report a bug or suggest an enhancement</a><br> For further API reference and developer documentation see the <a href="https://docs.oracle.com/pls/topic/lookup?ctx=javase12.0.2&amp;id=homepage" target="_blank">Java SE Documentation</a>, which contains more detailed, developer-targeted descriptions with conceptual overviews, definitions of terms, workarounds, and working code examples.<br> Java is a trademark or registered trademark of Oracle and/or its affiliates in the US and other countries.<br> <a href="../../../../../legal/copyright.html">Copyright</a> &copy; 1993, 2019, Oracle and/or its affiliates, 500 Oracle Parkway, Redwood Shores, CA 94065 USA.<br>All rights reserved. Use is subject to <a href="https://www.oracle.com/technetwork/java/javase/terms/license/java12.0.2speclicense.html">license terms</a> and the <a href="https://www.oracle.com/technetwork/java/redist-137594.html">documentation redistribution policy</a>. <!-- Version 12.0.2+10 --></small></p> </footer> </body> </html>
'use strict'; describe('Filter: unique', function () { // load the filter's module beforeEach(module('keepr')); // initialize a new instance of the filter before each test var unique, array; beforeEach(inject(function ($filter) { unique = $filter('unique'); array = [1, 2, 3, 4, 5, 5, 6, 6, 6, 7, 8, 9]; })); it('should return an array with unique values', function () { var arrayUnique = [1, 2, 3, 4, 5, 6, 7, 8, 9]; expect(unique(array)).toEqual(arrayUnique); }); it('should return the same array if second param value equals false', function () { expect(unique(array, false)).toEqual(array); }); });
The invention relates to a system for detoxicating exhaust gases in internal combustion engines, whereby at least a part of the exhaust gases is fed, controlled by valve means, into the intake air aspirated by the engine. Such systems serve the purpose of reducing to a minimum the discharge of toxic nitric oxides from internal combustion engines particularly when the latter are used in densely populated areas. An excessive recycling of exhaust gases causes too large an emission of carbohydrates; insufficient recycling results in an inadequate elimination of nitric oxides from the waste gases. Furthermore, the recycling of exhaust gases during idling of the engine should be interrupted in order to achieve a true running of the engine even during idling. The same is also true for operation of the engine under full load, during which the throttle valve is completely opened and a high power output rate must be attained.
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ File file = new File( basedir, "build.log" ); assert file.exists(); String buildLog = file.getText( "UTF-8" ); assert buildLog.contains( 'No Ancestor POMs!' ); return true;
Onychomadesis: literature review. Onychomadesis is characterized by separation of the nail plate from the matrix with persistent attachment to the nail bed and often, but not always, eventual shedding. Onychomadesis has been associated with infection, autoimmune disease, critical illness and medications. To our knowledge a literature review of all associations with onychomadesis has not been completed previously. Most commonly, onychomadesis has been reported in association with pemphigus vulgaris and hand-foot-mouth disease, and following chemotherapy or antiepileptic medications. This article summarizes these key culprit associations, postulates the pathogenesis of nail matrix arrest and summarizes the clinical outcomes. We conducted a retrospective review of cases of onychomadesis reported from January 1960 to March 2013. Using the PubMed database, the literature was searched using the following terms: 'onychomadesis' and 'proximal nail shedding'. Also, an Ovid search was carried out using the same terms. In total 56 articles have been published, including our previously reported series of idiopathic onychomadesis. Articles pertaining only to Beau's lines and not true onychomadesis were excluded. Onychomadesis has been associated with autoimmune disease, other major medical illness, neonatal illness, medication and infection.
Note: Fresh jalapeños are preferred; if you have to use pickled ones, rinse as much vinegar from them as possible. If the jalapeño skins are broken, the seeds will escape into the chili, giving the dish extra heat. If you like very hot chili, break one or more of the peppers open near the beginning of cooking time. In a 4-quart saucepan, combine the meat, Meat Magic®, chili powder, oregano, cumin and salt; stir well. Cover pan and cook over high heat for 4 minutes. Stir well, cover pan and cook for 1 minute. Stir in the tomatoes and onions, cover pan and cook for 10 minutes, stirring occasionally and scraping pan bottom well each time. Add 2 cups of the stock and the garlic and Magic Pepper Sauce, stirring well. Stir in the jalapeños. Bring to a boil, then reduce heat to maintain a simmer; simmer for 1 hour, stirring and scraping pan occasionally. (Be sure to stir gently so that the jalapeño skins don't break open.) Skim oil from top of chili mixture, then in a small bowl stir together the corn flour and 2 tablespoons of the liquid from the chili mixture until well blended. Add the corn flour mixture, 1 cup more stock and the beans, if desired, to the chili mixture, stirring well. Simmer for 40 minutes, stirring frequently and gently and making sure mixture doesn't scorch (once you add flour, it's more likely to scorch). Add the remaining 1 cup stock; cook and stir for 20 minutes more, being careful not to let chili scorch. Remove from heat and serve immediately in bowls, allowing about 1½ cups per serving. (Note: If you make this a day ahead, remove the jalapeños but reserve them to add back into the chili when reheating. Be brave and give' em a try - - they really add flavor to the chili!)
Q: Python3 sys.stdout.write delete last line ip.txt 127.0.0.1 127.0.0.10 127.0.0.15 Code user@linux:~$ cat script01.py with open('ip.txt', 'r') as f: for line in f: print(line) user@linux:~$ Output user@linux:~$ python script01.py 127.0.0.1 127.0.0.10 127.0.0.15 user@linux:~$ One of the solution provided to remove additional new line was to use sys.stdout.write instead of print Python is adding extra newline to the output New code with sys.stdout.write user@linux:~$ cat script02.py import sys with open('ip.txt', 'r') as f: for line in f: # print(line) sys.stdout.write(line) user@linux:~$ However, sys.stdout.write delete the last line. user@linux:~$ python script02.py 127.0.0.1 127.0.0.10 127.0.0.15user@linux:~$ How to fix this problem? A: You can use the function strip() to remove the line break: with open('ip.txt', 'r') as f: for line in f: print(line.strip("\r\n")) The argument "\r\n" makes the function to only delete all newlines and carriage returns at the beginnig and end of the line. Without that argument it would also delete spaces and tabs at the beginning and end what you might not want.
Salem-News.com is an Independent Online Newsgroup in the United States, setting the standard for the future of News.Publisher:Bonnie KingCONTACT:Newsroom@Salem-news.comAdvertising:Adsales@Salem-news.com~Truth~~Justice~~Peace~TJP FNS: Truckin' in Zeta Land Kent Paterson for Salem-News.com “We truckers are invisible to Mexican society. We are indispensable but invisible.” - Mexican trucker Courtesy: truckertotrucker.com (LAS CRUCES, NM) - As a general rule, Frontera NorteSur prefers not to use anonymous or unidentified persons as the main source(s) of information for a story. But on-the-ground realities in Mexico increasingly challenge this principle. Often, journalists sticking hard-and-fast to the attribution rule will have nothing to publish, even if a story is of crucial significance. So in the interest of furthering public knowledge and debate, FNS has decided to publish the following story based on an interview with a trucker who asked that his real identity not be disclosed for obvious reasons. For purposes of this story, we will simply call him Rafael, or Rafa. The trucker’s story, important aspects of which are confirmed by other sources, also conveys a seldom-heard point of view from a sector of the population that is caught up in the so-called drug war but largely forgotten in the reporting on and analysis of the violence and its implications for the future of Mexico. July 23, 2012 FNS Feature: Truckin’ in Zeta Land Rafael yanks out the old billfold and displays a lone 200 peso bill, a denomination which is roughly worth $16 and declining in value every day as fuel, food and more keep going up and up and disposable income down and down. With more than a glint of regret in his eyes, he remarks how in the old days his wallet would bulge with as many as 10,000 pesos. Those were the good years, he recalls, when a trucker’s life was one of happiness and a profession that earned a good living. How times have changed. The last six years, Rafa insists, have brought a “180 degree” turn for the worse in the fortunes of independent truckers. In his frank assessment, the era of the Calderon administration has been one of “crap.” Born and bred in a family of truckers, Rafa calculates that he has been shaken down by officials and outlaws about 100 times in more than a decade of traveling the highways of the Mexican republic. In recent times, two trucker friends were murdered and two others kidnapped, according to the seasoned driver. Once, he says, local cops in the Guadalajara suburb of Tlaquepaque pulled him over, ransacked his truck, pointed a pistol at his head and falsely accused him of transporting illegal drugs. A 500 peso payment from Rafa’s pocket solved the problem. Just recently, a fellow driver was pulled over in Saltillo, Coahuila, by local police who poured gasoline on the man, held a lighter close by and forced their terrified captive to call his boss for 10,000 pesos, Rafa says. Luckily for the driver, big boss man had a sympathetic ear and quickly paid the ransom. Regularly, Rafa travels the danger zones of his country, across the states of Chihuahua, Coahuila, Durango, Nuevo Leon, Hidalgo, Veracruz, Jalisco, Zacatecas, and Tamaulipas, “perhaps the most dangerous” place of all. Tierra Brava in Mexican lingo. In the Monterrey area, business soured when gangs of extortionists began demanding money from owners of truck fleets in the 20-50 vehicle range, worked down the chain to those with 15-20 trucks and eventually vamped on the small mom-and-pop owner with just one truck, according to Rafa. Crimes occur in broad daylight, he maintains, but nighttime becomes a “no-man’s land” that truckers with tight delivery schedules still have to dare. Asked why he continues in such a risky line of work, Rafa, who says he has no formal higher education, insists he likes driving the big rigs. “I have the truck driving profession down, but I am aware of the historical reality that the country is going through,” he adds. “I’m hoping for a change.” The upside of the trade, he reflects, is a rare chance few others ever have to know the geography, the culture, the history, the food and the gorgeous women of a beautifully diverse and huge nation. “I’m like an anthropologist,” Rafa muses. “I see how people get along and see the historic, colonial places. I know them all.” Sometimes, the sights are eerily exotic, he confesses. Rafa describes narco chapels with memorials to Santa Muerte, including the one in Zacatecas where 100 truckloads of Zetas once gathered to celebrate the Day of the Dead. “You can’t believe it, but you see it. It’s incredible.” Frequently, Rafa passes through what might be termed Zeta Land, a broad swath of the country from the steamy Gulf Coast and into the arid high country, over to the palm-shaded edges of the Pacific and back up to the U.S.-Mexico border across from Texas. In Zeta Land, look-outs with radios known as halcones are posted at the entrances and exists to towns, while 12-year-olds are trained in drug trafficking and arms handling, according to the trucker. To maintain a social base, the organization robs trucks and distributes the loot to impoverished residents. It also sells drugs out of a roadside restaurants, sort of like a McDonald’s for the thrill-seeker, and runs a chain of illegal gas stations that sell cheap, stolen diesel fuel. Rafa admits he fills up at the “guachicoleros” because economic realities so dictate. Based on the theft of resources from the national oil company Pemex, the illicit trade gives jobs to some people. Rafa says he met a guy in Coahuila who was paid 1,500 pesos a week to steal fuel, an amount hardly promising the magic transformation from rags to riches but still much better than the weekly salary at a foreign-owned assembly plant. The traveling man recalls two direct run-ins with the Zetas, both times in Zacatecas. The first time, a group roused him from sleep at a gas station and asked him to help haul a stolen trailer. The second encounter happened after he had been eating with a group of drivers at a truck stop and got up to go to the bathroom. Next thing he knew a squad of eight Zetas brimming with guns and blaring radios sauntered into the rest room and asked Rafa if he was a certain individual. Fortunately, though, one of the Zetas realized that the surprised trucker was not the man they were searching for at the moment. When pressed how he knew the men were Zetas, Rafa matter-of-factly responds: “The Zetas rule Zacatecas. It is a parallel government in Mexico and wants to govern all of Mexico in complicity with (official president-elect) Pena Nieto.” The size and scope of the underworld organization, Rafa contends, is not possible without official collusion. “It’s illogical that they act on their own,” he contends. “They are associates of the government.” Well- versed in the events of the day, Rafa scoffs at a July 13 battle in and around Villanueva, Zacatecas, which erupted when an estimated 40 truckloads of gunmen belonging to the rival Carteles Unidos (United Cartels) attacked the Zetas. Some press accounts of the incident mentioned as many as 19 people killed, including a civilian caught in the fearsome crossfire. The toll was “nothing,” Rafa insists, in light of other, largely unreported clashes that have resulted in 50 or 100 people killed. Overall, Rafa says he does not take stock in the government’s drug war body count, comparing the homicide numbers to the dubious statistics the U.S. government churned out during the Vietnam War. Rafa says he personally has had no problems with the soldiers or marines that are deployed against the Zetas. A certain degree of mutual respect pervades the relationship between truckers and troops, he adds, since both groups work round-the-clock shifts and tend to come from humble backgrounds. But the federales are another story. In previous years, the shake-downs and extortions came from the old Federal Judicial Police, which was dissolved in an anti-corruption drive to make away for the Federal Investigations Agency, which is turn was replaced in another anti-corruption policy initiative by the new Federal Police. Still, the corruption and abuses continue, Rafa says. Truckers, he asserts are squeezed between the authorities on the one hand and the “bad boys.” and the other. Other pressures emanating from the bureaucratic mandates and fines of the Secretariat of Communications and Transportation as well as corporate and foreign trucking companies, which entered Mexico after the North American Free Trade Agreement went into effect in 1994, are undermining the independent trucker, Rafa says. “It’s all meant to do away with the small trucker and favor the big national and international companies,” he adds. “Globalization is hitting us.” Rafa and his colleagues perform a role very similar to the farmer. Everybody uses their products but few have any real idea of what it entails to get a particular commodity from the farm or factory and into their homes. “People eat or drink a soda and don’t know where it comes from,” Rafa laments. “We truckers are invisible to Mexican society. We are indispensable but invisible.” -Kent Paterson Frontera NorteSur: on-line, U.S.-Mexico border news Center for Latin American and Border Studies New Mexico State University Las Cruces, New Mexico All comments and messages are approved by people and self promotional links or unacceptable comments are denied. Kevin July 24, 2012 9:44 am (Pacific time) great article, well written. Thank you. July 23, 2012 1:56 pm (Pacific time) I dont use anon sources either, but everything this article says is true. This is what happens when you disarm a population and send tens of thousands of guns (fast and furious) to the bad guys...This is what happens when you outlaw drugs, same as what happened during alcohol prohibition..This is easy stuff to learn if you turn off the tv and use common sense. This story is true and if you think "this could never happen in the U.S." you are highly naive. Its already happening. Josh Akers July 23, 2012 4:17 pm (Pacific time) Ignorance is a battle we will always be fighting... From Mexican trucks to outer space.
c**d - 15*c wrt c? -252*c**2 Let i(j) = 5*j + 2. Let l be i(2). What is the second derivative of -4*w + 3*w + l*w**2 - 5*w wrt w? 24 Find the first derivative of -2*m - 203 - 3335*m**3 + 21 + 118*m**4 + 3335*m**3 wrt m. 472*m**3 - 2 Let n(y) be the first derivative of 9*y**5/20 + y**2/2 - 10*y + 8. Let l(f) be the first derivative of n(f). What is the derivative of l(t) wrt t? 27*t**2 Suppose -2*p = -i - 0*p + 58, 0 = -i - 5*p + 65. Find the second derivative of -9*m - 110*m**5 + 55*m**5 + i*m**5 wrt m. 100*m**3 Let q(d) be the second derivative of d**8/120 - d**5/5 - 17*d**3/6 - d. Let c(r) be the second derivative of q(r). What is the second derivative of c(a) wrt a? 168*a**2 Let y(j) = -79*j - 82. Let w(n) = 317*n + 325. Let u(o) = -2*w(o) - 9*y(o). What is the derivative of u(f) wrt f? 77 What is the third derivative of 88*a**3 + 27 + 13*a**2 - 28 + 1 wrt a? 528 Let f(u) = 2*u**3 + u**2 - 2*u - 1. Let l(y) = 7*y**3 + 5*y**2 - 8*y - 3. Let k(q) = -18*f(q) + 4*l(q). Find the second derivative of k(w) wrt w. -48*w + 4 Let y = -4 + -9. Let g = y - -20. What is the first derivative of -2 - 4*c**4 - g - 17*c + 17*c wrt c? -16*c**3 Differentiate -116*s - 776 + 269*s - 242*s - s**2 with respect to s. -2*s - 89 Let o(q) be the first derivative of -356*q**5/5 - q**4/4 - 748*q**3/3 + 242. Find the third derivative of o(d) wrt d. -8544*d - 6 Let r(h) = 87*h - 157. Let a(q) = -88*q + 157. Let m(z) = -3*a(z) - 2*r(z). What is the derivative of m(l) wrt l? 90 Let x = 20 + -17. Let a(k) = 15*k**2 + 10. Let p(u) = 14*u**2 + 9. Let g(c) = x*a(c) - 4*p(c). What is the first derivative of g(d) wrt d? -22*d Let t = 122 + -118. What is the second derivative of -19*h**4 - 17*h**t + 47*h - 35*h wrt h? -432*h**2 Let q = 38 + -34. What is the second derivative of 4*y + 15*y**5 + 13*y**4 - 5*y**4 - 8*y**q wrt y? 300*y**3 Let w(x) be the second derivative of -2*x**7/21 + 11*x**6/30 - 61*x**3/2 - 134*x + 2. Find the second derivative of w(f) wrt f. -80*f**3 + 132*f**2 Find the first derivative of 2409*s - 93*s**3 - 2409*s - 26 wrt s. -279*s**2 Let k(a) = 4*a**2 + 80*a + 759. Let c(w) = -4*w**2 - 81*w - 759. Let b(n) = -6*c(n) - 7*k(n). What is the derivative of b(h) wrt h? -8*h - 74 Suppose 0 = k - 2*n + 7, 4*k - n + 2 = 2*k. Let c be (-112)/(-12) + k/(-3). What is the third derivative of 3*g**5 + 0*g**2 + 9*g**4 - c*g**4 - 7*g**2 wrt g? 180*g**2 Let z(a) = a**2 + 2*a + 1. Let w be z(-3). Find the third derivative of 123*g - 123*g - 13*g**w - 2*g**2 wrt g. -312*g Let l be 1/(0 - 1/(-3)). Suppose 0 = 2*h - l*h + 3. What is the second derivative of -3*o**2 + o**2 - o + 0*o + h*o wrt o? -4 Let k(z) = 4*z**2 + 2*z - 76. Let p(h) = -21*h**2 - 9*h + 378. Let f(w) = -11*k(w) - 2*p(w). What is the first derivative of f(u) wrt u? -4*u - 4 Suppose 0 = 2*q + 2*q + 8*q. Differentiate 0*a - 288*a**2 + q*a + 273*a**2 - 30 with respect to a. -30*a Find the first derivative of 61 + 13 - 1 - 28*v**4 wrt v. -112*v**3 Let h(n) be the first derivative of -5*n**3/3 - 2*n**2 + 237*n - 691. Differentiate h(a) with respect to a. -10*a - 4 Let b(g) = 18*g - 140. Let z be b(8). Let u(t) be the first derivative of -t + 1/2*t**z + 0*t**3 + 0*t**2 + 5. What is the derivative of u(v) wrt v? 6*v**2 Find the second derivative of -22*r**3 - 5*r**3 + 3*r**2 - 5*r**2 + 21*r - 279*r wrt r. -162*r - 4 Let j(o) = 91*o**4 - 5*o**2 - 95. Let t(x) = 136*x**4 - 7*x**2 - 143. Let m(y) = 7*j(y) - 5*t(y). Differentiate m(n) with respect to n. -172*n**3 Let t(s) = -12*s**2 - 2. Let g(m) be the second derivative of -11*m**4/12 - 3*m**2/2 - 13*m. Let b(j) = -6*g(j) + 7*t(j). What is the derivative of b(r) wrt r? -36*r Suppose -13 - 14 = -9*p. Differentiate -v - 3*v**p - 5*v**2 + 19 - 59 + 5*v**2 wrt v. -9*v**2 - 1 Let b be (4/(-3))/(2/(-12)). Let q be 4/b - (-18)/4. What is the first derivative of -3 - q*v + 8 + 9*v wrt v? 4 Let r(u) be the third derivative of 0*u**6 - 31/6*u**3 + u**2 + 13/105*u**7 + 0 + 0*u**5 + 0*u + 0*u**4. Find the first derivative of r(h) wrt h. 104*h**3 Let i(s) = 14*s + 9 - 24*s + 18*s. Let w(x) = 4*x + 5. Let y(a) = 6*i(a) - 11*w(a). What is the derivative of y(l) wrt l? 4 Let a(r) = 2*r**2 - 3*r + 5. Let i be a(4). Let p = -22 + i. What is the second derivative of -3*s**2 - 8*s**4 + 17*s**4 + p*s + 3*s**2 wrt s? 108*s**2 Let p(r) be the first derivative of -r**6/2 + r**5/5 + 65*r**2/2 + 35. What is the second derivative of p(o) wrt o? -60*o**3 + 12*o**2 Let h(n) be the third derivative of 0*n**5 + 3/2*n**3 + 0*n**6 + 0 - 19*n**2 - 1/21*n**7 + 0*n + 0*n**4. Differentiate h(m) with respect to m. -40*m**3 Let a(c) be the first derivative of -185*c**4/4 - c**2/2 - 36*c - 145. Find the second derivative of a(k) wrt k. -1110*k Let s(i) = -97*i**4 - 5*i**3 + 17*i**2 + 5*i + 8. Let k(q) = -2*q**4 + q**3 - q**2 - q - 1. Let p(f) = 5*k(f) + s(f). Find the third derivative of p(d) wrt d. -2568*d Let s(z) = 19*z**2 - 24*z. Let r(l) = 20*l**2 - 23*l. Let f(t) = 5*r(t) - 6*s(t). What is the second derivative of f(n) wrt n? -28 What is the third derivative of 132*j**4 - 58*j**2 + 123*j**2 - j + j + 0*j wrt j? 3168*j Let x(i) = i**3 + 21*i**2 + 20*i - 1. Let k be x(-20). Let z be (-1 + k)*1*-1. What is the second derivative of 3*n + 10*n**z - 5*n + 7*n wrt n? 20 Let l(x) be the first derivative of -6*x**6 - 260*x**3/3 - 107. Find the third derivative of l(a) wrt a. -2160*a**2 Let y(j) = 27*j**3 - 70*j - j**2 + j**2 + 7 - 64*j**3. Let f(w) = 25*w**3 + 47*w - 5. Let q(k) = 7*f(k) + 5*y(k). What is the second derivative of q(g) wrt g? -60*g Find the second derivative of -463*v + v**3 - 16*v**2 + 240*v + 243*v + 54*v**2 + 5 wrt v. 6*v + 76 Let j(d) = -4*d**2 + 2. Let q(m) be the third derivative of -m**5/5 + m**3 + 23*m**2. Let z(s) = -21*j(s) + 6*q(s). Differentiate z(u) wrt u. 24*u Let x = 43 + -40. Let l = -2 - -4. Find the third derivative of -2*j**l + j**3 - 3 + x - 4*j**3 wrt j. -18 Let r be -1 - -3 - (2 + -9). Let n be 12/(-54) + 56/r. What is the third derivative of -6*i**6 + 5*i**2 - 16*i**2 + 3*i**n wrt i? -360*i**3 Find the first derivative of -6 - 49 - 7*h**3 + 117 wrt h. -21*h**2 Let k = -19 - -25. What is the first derivative of 8 - 5 - 2*p**2 + k - p**2 wrt p? -6*p Let u(c) be the first derivative of -717*c**4/4 + 64*c**3/3 + 530. Find the third derivative of u(d) wrt d. -4302 Suppose 4*x - 14 = -2. Find the second derivative of x*o + 5*o + 4*o - o**2 - 4*o wrt o. -2 Let b(k) be the third derivative of -29*k**4/6 + 85*k**3/6 + 82*k**2. What is the derivative of b(y) wrt y? -116 Let g(b) = -264*b**3 - 18*b**2 - 8*b + 2. Let t(w) = -263*w**3 - 20*w**2 - 6*w + 2. Let d(s) = -3*g(s) + 4*t(s). Find the third derivative of d(a) wrt a. -1560 Let i be 4/5*(-25)/(-5). Differentiate 10 - 18 + 5 + 3*h**4 - 5*h**i wrt h. -8*h**3 Let c(p) be the third derivative of -p**5/60 - 35*p**4/24 - 8*p**3 + 3*p**2 + 88. Differentiate c(u) wrt u. -2*u - 35 Differentiate 106 - 75 + 2*j**3 - 18*j**3 - 2*j wrt j. -48*j**2 - 2 Let a(y) be the second derivative of 0*y**7 + 1/14*y**8 + 0*y**6 + 0*y**2 - 5*y + 7/6*y**4 + 0*y**3 + 0*y**5 + 0. What is the third derivative of a(w) wrt w? 480*w**3 Let w(x) be the first derivative of 157*x**6/2 - 757*x**2/2 + 585. What is the second derivative of w(l) wrt l? 9420*l**3 Let t = 5 + 0. What is the second derivative of -3*l**5 + 7*l**t + 2*l**5 + 5*l + 5*l**5 wrt l? 220*l**3 Let z(r) = -r**3 + 19*r**2 + 2*r - 22. Let x be z(19). What is the first derivative of 0 - x*s**3 + 1 - 2 wrt s? -48*s**2 Find the third derivative of -54*k**3 - 142*k**3 + 138*k + 37*k**3 - 138*k - 22*k**2 wrt k. -954 Let l = 6 + -6. Suppose -u + l*u = 3. Let a(m) = -m**2 - 8*m + 3. Let p(h) = -9*h + 4. Let x(k) = u*p(k) + 4*a(k). What is the second derivative of x(b) wrt b? -8 Suppose 4*m - 2*z = 12, 0*m - 4*z = 2*m - 16. Suppose -m*v = 3*p - 130, -5*v + 95 = 4*p - 68. What is the derivative of -5 + w**4 - 31*w**3 + v*w**3 wrt w? 4*w**3 Find the third derivative of -14*o + 12*o**2 - 11*o**2 + 20*o**6 + 21*o wrt o. 2400*o**3 What is the first derivative of -71 - 13 - 135*h**2 + 36 wrt h? -270*h Let o be -1*(-5 + 4 - 1). Find the third derivative of 3*s**3 + 2*s**4 - 3*s**3 + 48*s**2 + 2*s**o wrt s. 48*s Let u(z) = -z**3 - 8*z**2 - z + 4. Let c be u(-8). Differentiate 177 + c*g**3 - 176 + 9*g**3 with respec
Investigation of the hydrolysis of ginsenosides by high performance liquid chromatography-electrospray ionization mass spectrometry. The hydrolysis of ginsenoside standards and the crude extracts of ginseng has been investigated at different pH values (2.4-11.2) using high performance liquid chromatography-electrospray ionization mass spectrometry (HPLC-ESI-MS). The experimental results indicated that the pH value of aqueous solutions is an important factor in changing the composition of ginsenosides. For (20 S)-protopanaxadiol ginsenosides, ginsenosides with a large mass hydrolyzed to form hydrolysates (20 S)-Rg3 and (20 R)-Rg3 at pH 4.3. There were more hydrolyzed products observed at pH 3.3: (20 S)-F2, C-25,26 hydrated ginsenoside "C-Y1" and "C-Y2" (MW=802 Da) accompanied with (20 S)-Rg3, (20 R)-Rg3. At pH 2.4, only (20 R)-Rg3, (20 S)-F2, a small quantity of (20 S)-Rg3 and three C-25,26 hydrated ginsenosides were obtained. For (20 S)-protopanaxatriol Re, no hydrolysates were observed at pH 4.3; it was hydrolyzed at pH 3.3 to form hydrolysates (20 S)-Rg2, (20 R)-Rg2 and hydrated C-25,26 (MW=802 Da) and at pH 2.4 only C-25,26 hydrated ginsenosides "C-Y1" and "C-Y2" (MW=802 Da) were left in the solution. Similar hydrolysis reactions could be also observed for the crude extracts of ginseng. It showed that HPLC/ESI-MS is a fast and convenient method to study the hydrolysis of ginseng.
Transvaginal access for NOTES: a cohort study of microbiological colonization and contamination. Animal data and limited clinical evidence suggest a low incidence of infection following transvaginal natural orifice transluminal endoscopic surgery (NOTES). However, a systematic microbiological evaluation has not yet been carried out. The aim of this prospective cohort study was to evaluate the extent of microbiological contamination of the peritoneal cavity caused by the transvaginal access for NOTES and the impact of preoperative vaginal disinfection on vaginal colonization. Consecutive female patients with symptomatic cholecystolithiasis were offered either transvaginal rigid-hybrid cholecystectomy (tvCCE) or conventional laparoscopic cholecystectomy. Patients who opted for tvCCE were prospectively evaluated between February and June 2010. Disinfection in patients undergoing tvCCE included hexetidine tablets and octenidine applied vaginally. All patients received a single dose of perioperative cefuroxime. Swabs were obtained from the posterior fornix and the peritoneal cavity at different intervals. Of 32 patients, 27 (84 %) opted to undergo tvCCE. One patient (4 %; 95 % confidence interval [CI] 0.7 % - 18.3 %) had a positive bacterial culture in the Douglas pouch prior to transvaginal access compared with two patients (7 %; 95 %CI 2.1 % - 23.4 %) following colpotomy closure (P = 1.000). Vaginal disinfection significantly decreased vaginal bacterial load (P = 0.001) and bacterial growth in routine cultures (P < 0.001); in 16 patients (59 %; 95 %CI 40.7 % - 75.5 %) vaginal swabs were sterile after disinfection. No postoperative surgical site infections occurred (95 %CI 0 % - 12.5 %). In selected patients and following vaginal antisepsis, transvaginal access for NOTES is associated with microbiological contamination of the peritoneal cavity in a minority of patients, indicating a low risk of peritoneal contamination caused by the transvaginal access.
A phenomenological analysis of doctor-patient interaction: a case study. The fact that the biomedical model has been very successful in practice does not preclude that some health issues can be understood by way of other health care perspectives. Acquiring skills in meeting patients requires theories that structure other fields of knowledge than the biomedical sciences. An old man, who experiences himself as deeply misunderstood by the medical profession, is interviewed, his personal life-story is gone into and his case records and other available data are analysed. A phenomenological method is used, i.e. disciplined and rigorous reflection upon available data, remaining close to the particular pieces of the patient's narrative as they stand forth in their contextual relationships. The study shows that the doctors involved did not relate to the patient but to a biomedical image of him. His efforts to make himself understood were converted into instrumentally manageable disorders. Finally, dialogue medicine is briefly introduced as a model for counselling patients, especially when they need assistance to abandon the notion that they have been afflicted with a disease, a perception that might serve the purpose of keeping a threatening self-image out of consciousness.
USS Viking (ARS-1) USS Flamingo (AM-32) was a built for the United States Navy near the end of World War I. After service overseas clearing mines after the Armistice, the ship was laid up until 1922 when she was transferred to the United States Department of Commerce for use by the United States Coast and Geodetic Survey. Renamed USC&GS Guide, the ship operated as a survey vessel along the West Coast of the United States for 17 years, making significant contributions to navigation, hydrographic surveying, and oceanography. In June 1941, Guide was transferred back to the Navy, converted into a salvage ship, and renamed USS Viking (ARS-1). As Viking, she worked primarily from bases in California until 1953, when she was sold for scrapping. USS Flamingo The first USS Flamingo (AM-32), a Lapwing-class minesweeper, was laid down on 18 October 1917 by the New Jersey Drydock and Transportation Company at Elizabethport, New Jersey. She was launched on 24 August 1918 and commissioned as USS Flamingo, Minesweeper No. 32, on 12 February 1919. Flamingo fitted out at the New York Navy Yard in Brooklyn, New York, and later shifted to Tompkinsville, Staten Island, New York, on 29 March 1919. The minesweeper performed various towing jobs and carried stores locally in the 3rd Naval District into the spring of 1919. On 10 April 1919, she suffered damage in a collision with an unnamed Panama Railroad Company tug, and she underwent repairs at Port Richmond, Staten Island. Shifting to the New York Navy Yard soon thereafter, Flamingo began fitting out for "distant service." Flamingo departed Tompkinsville on 18 May 1919 bound for the Orkney Islands. Proceeding via Boston, Massachusetts, she arrived at Kirkwall, Scotland, on 5 June 1919 to begin her tour of duty with the United States Minesweeping Detachment, North Sea. Along with U.S. Navy submarine chasers, chartered British naval trawlers, and fellow Lapwing-class minesweepers, Flamingo participated in the clearing of the North Sea Mine Barrage. Laid by the U.S. Navy after the United States entered World War I, the barrier had served as a formidable obstacle for German submarines based at North Sea ports. By 1919, however, the barrage merely hampered the resumption of peaceful commerce. On 23 June 1919, Flamingo transported officers and men from Kirkwall to Inverness, Scotland, and returned to her base in the evening carrying supplies for the detachment flagship, (Destroyer Tender No. 9).Flamingo then performed tug duty at Kirkwallcbetween 25 June and 7 July 1919. On 11 July 1919, she departed to assist in clearing Group 11 of the mine barrage in the second phase of the fourth clearance operation conducted by the Minesweeping Detachment. The first days were uneventful. On 15 July, Flamingo anchored for the night, as was usual practice, to the north of the minefield. During the ensuing evening hours, strong winds and currents caused herto drag her anchor. She slowly worked southward from her original position. The next morning, when Flamingo weighed anchor to get underway, she discovered that she had drifted into the minefield and had fouled one of the mines in her anchor cable. The mine was trailing just beneath the fantail of the ship and exploded beneath Flamingo′s stern. The underwater blast badly damaged the rudder, disabled the capstan and generator, and dished in the ship's stern plating in several places. (Minesweeper No. 17) lent assistance and towed Flamingo to Invergordon, Scotland, for drydocking and repairs on 17 July 1919. Flamingo was ready to return to the base at Kirkwall by early August 1919. She transported a cargo of steel and lumber to Black Hawk on her return voyage, arriving at Kirkwall on 13 August 1919. Two days later, the minesweeper towed her crippled sister ship (Minesweeper No. 27) to South Shields, England, for drydocking and repairs in the wake of Pelican′s mining in July. Later in August, Flamingo resumed her minesweeper duties with the detachment, working out of the Norwegian ports of Lervic, Stavanger, and Haugesund before returning to Kirkwall via Otters Wick, Orkney, on 7 September 1919. She subsequently participated in the final sweep of the mine barrage – the climactic sweep which detonated five mines, cut loose 47, and destroyed 50 – into late September 1919. Once the arduous and dangerous job was complete, Flamingo departed Kirkwall on 1 October 1919 and, after a voyage which took her via Plymouth and Devonport, England; Brest, France; Lisbon, Portugal; the Azores; and Bermuda, eventually arrived at Tompkinsville on 20 November 1919. The pause at Tompkinsville was a brief one, however, for Flamingo was underway five days later, on 25 November 1919, bound for the Portsmouth Navy Yard in Kittery, Maine. She arrived on 28 November 1919 and soon commenced an overhaul. Assigned to the 1st Division, 2nd Mine Squadron, United States Atlantic Fleet, on 1 July 1920, Flamingo received the classification AM-32 on 17 July 1920, as the U.S. Navy adopted its modern system of alphanumeric hull numbers on that date. Flamingo operated with the 2nd Mine Squadron into the autumn of 1920, then was placed in reserve at Portsmouth Navy Yard on 18 November 1920. USC&GS Guide Flamingo remained inactive for almost a year a half before an executive order of 25 March 1922 authorized the Navy to transfer the vessel to the United States Department of Commerce for use by the United States Coast and Geodetic Survey, and she accordingly was decommissioned on 5 May 1922. Turned over to the Coast and Geodetic Survey at Portsmouth Navy Yard on 23 January 1923 for use as a survey vessel , the ship was renamed USC&GS Guide, first Coast and Geodetic Survey ship of the name, on 1 March 1923. She and the survey ships USC&GS Discoverer and USC&GS Pioneer, also former Navy minesweepers, were known as the "Bird Boats" in the Coast and Geodetic Survey because all had been named after birds – Guide had been USS Flamingo, Discoverer had been , and Pioneer had been – while in Navy service. By January 1923, the Coast and Geodetic Survey had decided to install a Hayes sonic rangefinder – an early echo sounder – aboard Guide, which the Coast and Geodetic Survey planned to commission into its fleet later that year. It also decided to pursue the development of radio acoustic ranging, a new concept involving a method for determining a ship′s precise location at sea by detonating an explosive charge underwater near the ship, detecting the arrival of the underwater sound waves at hydrophones at remote locations, and radioing the time of arrival of the sound waves at the remote stations to the ship, allowing the ship′s crew to use triangulation to determine the ship′s position. Nicholas H. Heck (1882–1953), a United States Coast and Geodetic Survey Corps officer, took charge of that development process. Both echo sounding and radio acoustic ranging required a precise understanding of the speed of sound through water. Guide′s conversion to and fitting out as a survey ship on the United States East Coast was completed in 1923. After Heck oversaw tests at Coast and Geodetic Survey headquarters in Washington, D.C., that demonstrated that shipboard recording of the time of an explosion could be performed accurately enough for his radio acoustic ranging concept to work, Heck had Guide based at New London, Connecticut. Under his direction, Guide both tested her new echo sounder's ability to make accurate depth soundings and conducted radio acoustic ranging experiments in cooperation with the United States Army Coast Artillery Corps. Despite many difficulties, testing of both echo sounding and radio acoustic ranging wrapped up successfully in November 1923. In late November 1923, with Heck aboard, Guide departed New London, Connecticut, bound for her new home port, San Diego, California, via Puerto Rico and the Panama Canal, with her route planned to take her over a wide variety of ocean depths so that she could continue to test her echo sounder. Guide made history during the voyage, becoming the first Coast and Geodetic Survey ship to use echo sounding to measure and record the depth of the sea at points along her course; she also measured water temperatures and took water samples so that the Scripps Institution for Biological Research (now the Scripps Institution of Oceanography) at La Jolla, California, could measure salinity levels. She also compared echo sounder soundings with those made by lead lines, discovering that using a single speed of sound through water, as had been the previous practice by those conducting echo sounding experiments, yielded acoustic depth-finding results that did not match the depths found by lead lines. She transited the Panama Canal on 8 December 1923. Before she reached San Diego later in December 1923, she had accumulated much data beneficial to the study of the movement of sound waves through water and measuring their velocity under varying conditions of salinity, density, and temperature, information essential both to depth-finding and radio acoustic ranging. Upon arriving in California, Heck and Guide personnel in consultation with the Scripps Institution developed formulas that allowed accurate echo sounding of depths in all but the shallowest waters and installed hydrophones at La Jolla and Oceanside, California, to allow experimentation in the Pacific Ocean with radio acoustic ranging. Under Heck's direction, Guide then conducted experiments off the coast of California during the early months of 1924 that demonstrated that accurate echo sounding was possible using the new formulas. Experiments with radio acoustic ranging, despite initial difficulties, demonstrated that the method also was practical, although difficulty with getting some of the explosive charges to detonate hampered some of the experimental program. In April 1924, the Coast and Geodetic Survey concluded that both echo sounding and radio acoustic ranging were fundamentally sound, with no foundational problems left to solve, and that all that remained necessary was continued development and refinement of both techniques during their operational use. Heck turned over continued development of echo sounding and radio acoustic ranging to Guides commanding officer, Commander Robert Luce, and returned to his duties in Washington, D.C. Operating off Oregon in 1924, Guide became the first ship to employ radio acoustic ranging operationally. While off Oregon that year, she successfully employed the technique at a distance of 206 nautical miles (382 km) between the ranging explosion and the remote hydrophones detecting its sound and in the process achieved the first observed indication of the ocean sound layer that was later called the sound fixing and ranging (SOFAR) channel or deep sound channel (DSC).hydro-international.com The Discovery of Long-Distance Sound Transmission in the Ocean Based at San Diego and conducting hydrographic surveys off the U.S. West Coast, Guide performed Coast and Geodetic Survey duties for over 17 years. In company with Pioneer, she conducted many early bathymetric surveys on the U.S. West Coast. On more than one occasion, Guide assisted mariners in distress. On 3 June 1927, she came to the assistance of the lumber schooner City of Nome, which was on fire at Aberdeen, Washington; Guide stood by City of Nome until 5 June 1927, pumped water into the schooner, and helped retard the fire sufficiently to allow salvage of City of Nomes cargo. On 4 February 1933, she rendered assistance to the fishing boat Giuseppina, which had broken down with engine trouble in Monterey Bay, California. As tensions mounted in Europe and East Asia in the late 1930s, the U.S. Navy expanded to meet the emergency, especially after World War II began in Europe following the German invasion of Poland on 1 September 1939. The Navy needed auxiliary vessels of various types, and cast a wide net in looking for them. One of the ships identified for transfer to the Navy was Guide, and, on 27 June 1941, she was transferred from the Coast and Geodetic Survey to the Navy. Commemoration An underwater geographic feature of the Pacific Ocean, Guide Seamount off the coast of California, is named for Guide. USS Viking On 25 July 1941, work to convert the vessel into a rescue and salvage ship began at the San Diego Marine Construction Company in San Diego. During the reconfiguration, the Navy renamed the ship USS Viking, third U.S. Navy ship of the name, on 5 August 1941 and classified her as ARS-1'''. While the alterations were still in progress, Imperial Japanese Navy aircraft attacked Pearl Harbor, Hawaii on 7 December 1941, plunging the United States into World War II. Placed in service on 3 January 1942, Viking was pronounced ready for duty on 12 February 1942. Manned by a civilian crew and operated from San Diego by the Merritt, Chapman, and Scott salvage firm – a civilian company working under a contract let by the U.S. Navy Bureau of Ships – Viking was assigned to the 11th Naval District. Between 3 and 6 July 1942, Viking assisted two U.S. Navy local patrol craft, YP-267 and YP-269, which had run aground off San Diego, towing them both back to port for repairs. According to her movement reports, Viking appears to have spent an uneventful autumn and winter at her home port.Viking shifted to San Francisco, California, briefly in January 1943, en route Guadalupe in Baja California, Mexico, to perform emergency salvage operations under the aegis of the Commander, Western Sea Frontier. Returning to San Diego in February 1943, Viking operated there into 1944. On 27 October 1944, Viking steamed to San Pedro, California, for a refit. She returned to San Diego later in November 1944. On 31 December 1944, Viking departed San Diego in company with the fleet ocean tug bound for Clipperton Island. There, the two vessels joined the rescue and salvage ship in unsuccessful attempts to refloat the grounded tank landing ship . During the salvage operation, Viking suffered damage from heavy seas and put into San Diego for repairs soon thereafter.Viking subsequently operated out of San Diego and San Pedro through the end of World War II in mid-August 1945. She performed tug and tow services for ships ranging in size from destroyers to tank landing ships into the 1950s. In December 1949, she aided the grounded steamer off the south point of California′s Santa Rosa Island. Eventually, Viking's area of operations embraced Long Beach and Port Hueneme, California, as well as the San Diego area. Relieved by the rescue and salvage ship as salvage vessel for the 11th Naval District, Viking'' was returned to Navy custody by the Merritt, Chapman, and Scott salvage firm. On 17 March 1953, she was authorized for disposal, and her name was struck from the Navy list on 19 April 1953. She lay at the Naval Supply Depot at San Pedro until sold on 22 July 1953 to Nathan Cohen and Son, Inc., of Los Angeles, California. She was scrapped soon thereafter. References NavSource.org NavSource Online: Mine Warfare Vessel Photo Archive USS Viking (ARS-1) ex-USC&GS Guide ex-USS Flamingo (AM-32) ex-Minesweeper No. 32 NOAA History, A Science Odyssey: Tools of the Trade: Ships: Coast and Geodetic Survey Ships: Guide NOAA History, A Science Odyssey: Hall of Honor: Lifesaving and Protection of Property by the Coast & Geodetic Survey 1845-1937 External links Category:Lapwing-class minesweepers Category:Ships built in Elizabeth, New Jersey Category:1918 ships Category:World War I minesweepers of the United States Category:Ships of the United States Coast and Geodetic Survey Category:Survey ships of the United States Category:World War II auxiliary ships of the United States Category:Rescue and salvage ships of the United States Navy
Q: Paperclip does not save attachment I am new in Rails and web development... I have created a User model, and I am now trying to give the user the ability to add a profile picture, using Paperclip. From my user show page, a user can click on a link to open an 'edit' page, from which he can see a form to browse and choose an image to upload. When clicking on the button, it calls the 'update' action and redirect to the user show page, but the image is not saved in any folder, and the image attributes (filename, contenttype, filesize) are still set to NIL in the database. I have installed and tested ImageMagick I have added the :multipart => true in the form I have put attr_accessible :avatar I have set the paperclip options to look for '/usr/bin/' where convert is located I have run the migration I have set :url and :path -in the controller, my update action is: def update @user = User.find(params[:id]) @title = "Update profile picture" response_to do |format| if @user.update_attributes(params[:user]) format.html {redirect_to(@user, :notice => 'Profile picture loaded')} else format.html {render :action => "edit", :notice => 'Unable to load pic")} end end end My model code is: class User < ActiveRecord::Base attr_accessor :password attr_accessible :name, :email, :number_of_positive_reco, :confidence_percent, :password, :password_confirmation, :avatar, :avatar_file_name, :avatar_content_file, :avatar_file_size has_attached_file :avatar , :styles => { :medium => "300x300>", :thumb => "100x100>"}, :url => "/images/profiles/:attachment/:id_:style.:extension", :path => ":rails_root/public/images/profiles/:attachment/:id_:style.:extension" # :default_url => "/images/Default_profile_picture.png" email_regex = /\A[\w+\-.]+@[a-z\d\-.]+\.[a-z]+\z/i validates :name, :presence => true, :length => { :maximum => 20} validates :email, :presence => true, :format => { :with => email_regex}, :uniqueness => {:case_sensitive => false} validates :password, :presence => true, :confirmation => true, :length => { :within => 6..40 } validates :number_of_positive_reco, :numericality => {:only_integer => true, :greater_than_or_equal_to => 0} validates :confidence_percent, :numericality => { :greater_than_or_equal_to => 0.0, :less_than_or_equal_to => 1.0} before_save :encrypt_password # Return true if the user's password matches the submitted password. def has_password?(submitted_password) encrypted_password == encrypt(submitted_password) end def self.authenticate(email, submitted_password) user = find_by_email(email) return nil if user.nil? return user if user.has_password?(submitted_password) end def self.authenticate_with_salt(id, cookie_salt) user = find_by_id(id) (user && user.salt == cookie_salt) ? user : nil end private def encrypt_password self.salt = make_salt if new_record? self.encrypted_password = encrypt(password) end def encrypt(string) secure_hash("#{salt}--#{string}") end def make_salt secure_hash("#{Time.now.utc}--#{password}") end def secure_hash(string) Digest::SHA2.hexdigest(string) end end The form is located in edit.html.erb: <h1> Ajouter une photo au profil </h1> <%= form_for @user, :html => { :multipart => true} do |f| %> <div class="field"> <%= f.label :avatar, "Upload ta photo" %> <br /> <%= f.file_field :avatar %> </div> <div class="actions"> <%= f.submit "Upload" %> </div> <% end %> And I printed the debug information into the browser. After clicking Upload, I got this: {"commit"=>"Upload", "authenticity_token"=>"+ExcuQOSv1bxIyAoM5+N4TCSmYI8JYeh5Yb8P5W4VU0=", "_method"=>"put", "utf8"=>"✓", "action"=>"update", "id"=>"8", "controller"=>"users", "user"=>{"avatar"=>#<ActionDispatch::Http::UploadedFile:0xb6d63fec @content_type="image/jpeg", @original_filename="Paperclip-Railway.jpg", @tempfile=#<File:/tmp/RackMultipart20111208-1681-3h3ps4-0>, @headers="Content-Disposition: form-data; name=\"user[avatar]\"; filename=\"Paperclip-Railway.jpg\"\r\nContent-Type: image/jpeg\r\n">}} So, in the log, I see that the 'paperclip's fields' are filled with image name, image type, etc...but there is no "INSERT into TABLE", all the user fields are still NIL, the system directory where user's image should be stored is not created, there is no "Paperclip attachment save", nor any mention of paperclip in the log... In console mode, I can create a new user, setting the avatar attributes as : `User.create(:avatar => File.new(Rails.root + "public/images/an_image.png")´ and it works just fine! ... I also tested the creation of a new folder, without admin rights, and it works all fine ... I am desesperate :-( Can anyone help me ? A: 3 days to find this out: as I used password protection (password being attr_accessor), it's impossible to update a user, without adding the password field in the form. Trying to edit the profile picture without entering the password does not work, and no error message that could have me made me think about this was generated. So, in the edit view, don't forget to add the password field in the form to be able to update user's picture!
Degenerated disc disease refers to a syndrome in which a compromised disc causes low hack pain. Disc degeneration may result in disc herniation in which the central portion of the intervertebral disc, known as the nucleus pulposus, may protrude through an opening in the surrounding fibrous ring, known as the annulus fibrous. A herniated lumbar disc can push on spinal nerves causing severe, shooting, leg pain, numbness, and/or weakness. Discectomy is a surgical procedure in which the nucleus pulposus of a herniated intervertebral disc is resected or removed to relieve pressure on the spinal cord and radiating nerves. Improved tools are needed to allow physicians to evaluate the extent of discectomy that has been performed and to assess the intradiscal space for further procedures such as fusion or arthroplasty.
Spectroscopic and DFT studies on 6-aminophenanthridine and its derivatives provide insights in their activity towards ribosomal RNA. 6-Aminophenanthridine (6AP), a plant alkaloid possessing antiprion activity, inhibits ribosomal RNA dependent protein folding activity of the ribosome (referred as PFAR). We have compared 6AP and its three derivatives 6AP8Cl, 6AP8CF3 and 6APi for their activity in inhibition of PFAR. Since PFAR inhibition requires 6AP and its derivatives to bind to the ribosomal RNA (rRNA), we have measured the binding affinity of these molecules to domain V of 23S rRNA using fluorescence spectroscopy. Our results show that similar to the antiprion activity, both the inhibition of PFAR and the affinity towards rRNA follow the order 6AP8CF3 > 6AP8Cl > 6AP, while 6APi is totally inactive. To have a molecular insight for the difference in activity despite similarities in structure, we have calculated the nucleus independent chemical shift using first principles density functional theory. The result suggests that the deviation of planarity in 6APi and steric hindrance from its bulky side chain are the probable reasons which prevent it from interacting with rRNA. Finally, we suggest a probable mode of action of 6AP, 6AP8CF3 and 6AP8Cl towards rRNA.