text stringlengths 8 5.77M |
|---|
Q:
How do I avoid port forwarding when exposing IoT devices to the external Internet?
I received some good answers in the question What do I need to create my own personal cloud for IoT devices? and one of the things that I understood from there is that I need to "expose" my HUB or GATEWAY to the external internet. The proposed solution for that is port forwarding.
I created this as a separate question because it would be difficult to properly to follow-up just with comments on all the answers, someone could get kind of lost. Also, this information may be useful for somebody with a similar question.
I don't like the idea of having to go to my router configuration and configure the port forwarding because that means that I have to configure a device that in spite of being part of the IoT infrastructure, is not one of "my" devices. It has to be as less disruptive of the already existing home network as possible. Also, I've had instances where I don't know the admin password of a particular router and it has been really difficult to get it.
I'm sure that there is a way around that even if that means having a more powerful IoT HUB maybe running Linux, I just don't know what that could be. It is OK to have a bit more complex HUB if that "alternate" way allows avoiding that port forwarding configuration.
I say that I'm sure there is a way thinking about how applications like team viewer don't need to configure port forwarding.
So the question is, does anyone know a way of "exposing" an IoT embedded device to the external internet in order to access it from anywhere in the world that does not involve port forwarding?
A:
If you can't port forward your router, you might have to resort to hole punching:
Hole punching is a technique in computer networking for establishing a direct connection between two parties in which one or both are behind firewalls or behind routers that use network address translation (NAT). To punch a hole, each client connects to an unrestricted third-party server that temporarily stores external and internal address and port information for each client. The server then relays each client's information to the other, and using that information each client tries to establish direct connection; as a result of the connections using valid port numbers, restrictive firewalls or routers accept and forward the incoming packets on each side.
The NAT on your router means that clients outside of your network can't connect to open ports of devices inside your network, but it doesn't restrict devices in your network from connecting to a 'broker'. Using a little bit of indirection, you can establish a direct connection between two devices without actually opening any ports - this is essentially what services like Skype and Hamachi do.
Of course, this does require an external server to co-ordinate the connection, and you would probably want to trust the server that was performing the hole punching.
Peer-to-Peer Communication Across Network Address Translators by Bryan Ford, Pyda Srisuresh and Dan Kegel is an interesting read for more information on the mechanisms of hole punching and how reliable it is.
A:
In the IoT world where devices has low resources to handle unwanted traffic from external connections and of course the need to handle any port forwarding and firewall issues with routers has led to the following approach that you can see in a lot of IoT back end solutions:
Devices will not accept any unsolicited network information. All connections and routes will be established by the device in an outbound-only fashion.
So the device will open an outbound connections, so no firewall/router tweaks will be needed and it will keep the channel open as long as it needs to be.
A nice article about the communication problems and solutions in the IoT world.
A:
Try Port Knocking. You still have to port forward, but the port is only open after you send a secret combination(you pick) of pings. Then you can close the port with another secret combo of pings. It can run on embedded linux, such as wifi router with OpenWrt.
|
Q:
Waiting for template render in Meteor, inconsistent
Been scratching my head on this, so here's the simplest way to view it - I'm using this:
Template.today.rendered = function() {
console.log(this.firstNode.children.length);
};
Simply to try and get the count of items that are supposedly rendered. The template looks like:
<template name="today">
<div class="todaySlider">
{{#each dayOfWeek}}
{{> singleDay}}
{{/each}}
</div>
</template>
and if it's of any importance, singleDay looks like:
<template name="singleDay">
<div class="day {{isCurrent}}">
<h2 class="date">{{date}}</h2>
{{#each items}}
{{> item }}
{{/each}}
</div>
</template>
I'm trying to wait for all the "singleDays" to render, however that count I'm logging is usually different on refresh. I'll get anything from 0 to the correct value, and I don't understand why. This seems to be the right place to call it, I fear that maybe the double "each" is too slow?
I've tried timers (which I honestly shouldn't) and even DOM Mutation Observers (which seem like overkill) but surely there is a pure Meteor approach to this, any ideas?
A:
Template.rendered happens when the template is rendered, but that doesn't mean there'll be any data in it.
I'm pretty sure you'll need to do this inside a helper.
each helpers don't have to return cursors, they can also return an array. If the number of "singleDays" is short, you could send an array to the template instead of a cursor. It's kind of ugly, and there might be a better way to do this, but I think this will work.
Template.today.helpers({
dayOfWeek: function() {
var days = DaysCollection.find({}).fetch();
if (days[days.length - 1]) days[days.length - 1].isLast = true;
return days;
}
});
I assume {{isCurrent}} is where you add the extra class that you're talking about. If so, just have the isCurrent helper look for this.isLast to be true.
|
Introduction
============
The goal of cancer surgery is to remove the entire tumor while sparing as much of the surrounding healthy tissue as possible. In surgical oncology, tumor regrowth due to incomplete resection is a common occurrence in a variety of clinical sites (*e.g.*, breast, liver, skin). To further improve cancer survival and to ensure that the entire tumor is removed in the first (and thus the only) surgery, there is a clinical need for a high-resolution sensitive imaging platform that can discern malignant tumors from normal tissues. Tumors often exist where "wide margin resections" are not possible without creating profound disability in the patient. This further reinforces the need for a high-resolution tumor margin detection platform capable of rapidly detecting even the smallest infiltrating tumors.
A variety of tumor margin estimation approaches are currently under active development, including touch frozen section analysis,[@cit1] specimen radiography,[@cit2],[@cit3] magnetic resonance imaging,[@cit4] Raman spectroscopy,[@cit5] radioguided occult lesion localization,[@cit6] near-IR fluorescence spectroscopy,[@cit7] Optical Coherence Tomography (OCT)[@cit8]--[@cit12] and high-frequency ultrasound.[@cit13] For various reasons, including convenience, availability, sensitivity, information content, operating room workflow compatibility, status-quo and so forth, none of these new methodologies have achieved wide clinical penetration. Thus, intraoperative histology based on microscopy still remains the most accepted approach in routine clinical workflows to determine tumor margins. But this 'gold standard' histopathology method is not without its own problems -- for example, the process can take up to 30 min while patients await histopathology results under general anaesthesia, and false negatives requiring revision surgery are common (*e.g.* 20% in breast resection[@cit14]). New techniques that offer accelerated delivery of pathology results are thus highly desirable if they can reduce the time and cost associated with tumor resections, without sacrificing (and perhaps even improving) the accuracy of current histopathology assessments.
Mass spectrometry (MS) is a highly sensitive analytic technique that can provide a chemical fingerprint of biological tissues. MS reveals the molecular constituents of tissue on the basis of mass-to-charge (*m*/*z*) ratios in a highly multiplexed manner.[@cit15] This sensitive technique, with a detection limit on the order of femtomoles, is able to detect hundreds of different molecules in a single measurement.[@cit16] MS can provide characteristic chemical profiles of a tissue based on its lipid, metabolite or protein composition. Further, MS can be utilized in imaging mode to spatially map the chemical composition of tissues. Mass Spectrometry Imaging (MSI) combines the multiplexed *m*/*z* measurement capability of MS with a surface sampling process to deliver a chemical content map of the target material in a spatially resolved manner. The sensitivity of MS to changes in tissue chemistry makes this technique complementary to other imaging modalities.
Desorption Electrospray Ionization (DESI)[@cit17] is a recently developed technique in which a spray of charged microdroplets induces desorption and ionization of analytes directly from the surface of an *ex vivo* tissue slice with no other sample preparation. Under ambient conditions, DESI-MS allows identification of tumor sites within healthy tissues on the basis of MS lipid profiles known to be characteristic of cancer.[@cit18]--[@cit24] More interestingly, DESI-MS also allows further tumor type classification and tumor subclass grading on the basis of unique MS lipid profiles characteristic of each tumor type or subclass.[@cit18],[@cit20],[@cit22],[@cit25]--[@cit27] For example, it is possible to distinguish between different classes of brain tumors or various subclasses of meningiomas using MS lipid profiles.[@cit22],[@cit23],[@cit28] This has opened up the prospect of intraoperative molecular imaging to identify tumor sites and reveal tumor margins.[@cit18],[@cit27] Currently, cross-validation with conventional pathology methods such as histologic staining or immunostaining followed by microscopy is needed to interpret DESI-MS images.[@cit18],[@cit23],[@cit29],[@cit30] The strong predictive power of MS lipid profiling, in conjunction with robust cancer lipid libraries, make it a leading candidate to become an alternative to histologic staining methods for pathology assessments in the near future. However, current strategies for intraoperative MS data collection from *ex vivo* tissues lead to long analysis times.[@cit18],[@cit23],[@cit24]
Note that modern mass spectrometers are capable of delivering robust spectra containing cancer profiles within milliseconds of acquisition time. This has the potential for faster characterization of cancer from *ex vivo* tissue slices than that offered by intraoperative histopathology. To understand the bottleneck that has prevented molecular pathology with MS from competing with intraoperative histology, the workflow for tissue preparation and data collection must be reviewed. For histology, once a slice of tissue is prepared and mounted on a glass slide, conventional pathologic evaluations using Hematoxylin and Eosin (H&E) staining and microscopy may take as little as 15--30 min. Likewise, DESI-MSI is also performed on tissue slices mounted on a glass slide (typically ∼15--20 μm thickness compared to 3--5 μm in H&E). DESI-MSI does not require further processing of the tissue. However, without staining or information from other imaging modalities to guide the DESI solvent spray to areas that are suspected to be cancerous, DESI-MSI often requires imaging the entire excised sample containing healthy and diseased tissues.[@cit18],[@cit27] Data acquisition can take anywhere between 30 to 90 min for tissue slices with surface areas of 1 to 2 cm^2^, at ∼150 μm resolution. Therefore, despite the fact that a MS scan in the range of milliseconds is capable of resolving cancer molecular signatures, the need to serially repeat this across the entire tissue specimen area currently makes DESI-MSI considerably slower than intraoperative histology in delineating cancer margins and providing pathology assessment. The increased time compared to intraoperative histology is a major drawback to the clinical adoption of DESI-MSI.
Different approaches have been investigated to reduce MS imaging times. A multimodality imaging approach using optical microscopy and matrix assisted laser desorption ionization mass spectrometry (MALDI-MS) has been introduced by Caprioli and coworkers.[@cit31] This approach is aimed at obtaining computerized high-resolution molecular images from combining predicted and measured *m*/*z* values from MS, scaled by the higher resolution optical images (H&E); this avoids impractically long MALDI-MSI measurement times of the entire tissue specimen. Previously, through co-registering the MS and microscopy images, molecular MS profiles of tumour microenvironment have been reported.[@cit32] This pairing, completed after the acquisition of MSI data, facilitates the interpretation of results. However, it provides no means to accelerate a targeted acquisition of MS data from tissue specific segments to save time. Previous studies have reported the pairing of MSI with other imaging modalities such as optical microscopy and Atomic Force Microscopy (AFM) to target molecular mapping to defined points on the surface of a sample.[@cit33],[@cit34] Furthermore, MS data were recently reported as stereotactic points onto a 3D MRI image to visualize different grades, and tumor concentrations on a 3D plot of tumor inside the brain.[@cit23],[@cit35]
In this work we use polarized light imaging to grossly distinguish areas of cancer from surrounding healthy tissue, and utilize this information to guide detailed interrogation of the suspected cancer margins by the more sensitive and specific DESI-MSI, capable of revealing not only tumor margins but also cancer types. This can improve efficiency by an order of magnitude or better. Specifically, we use measured alterations in light polarization to infer tissue biophysical properties, including its local depolarization rates that are sensitive to tissue pathological transformations. These transformations include changes in refractive index heterogeneities stemming from differences in scattering properties of normal *versus* disease cells and associated changes in connective tissue. The so-called Mueller matrix polarimetry imaging provides depolarization maps of tissues with the following advantages: (1) fast measurement times (on the order of tens of seconds); (2) ability to assess large regions of tissues (several square mm to cm); (3) relatively simple and affordable instrumentation; (4) robust low-noise measurements (owing to our recently developed no-moving-parts Mueller matrix imager);[@cit36] (5) rich and unique information content (above and beyond depolarization metrics that relate to tissue scattering and its spatial heterogeneity, one can derive anisotropy magnitude and orientation that relate to tissue asymmetry/anisotropy); (6) endogenous sources of contrast (no dyes, labels, or other exogenous contrast media are needed).
We have previously investigated Mueller matrix polarimetry for a number of biomedical applications: visualization of myocardial disorganization (loss of anisotropy) following infarction, as well as its regeneration in response to stem cell therapy;[@cit37],[@cit38] optical rotation measurements for determining glucose levels in scattering media,[@cit38],[@cit39] with potential for non-invasive blood glucose monitoring; detection of morphological changes in the bladder wall due to outlet obstruction disorder.[@cit40] We have also been active in the technological and theoretical advancement of polarimetry. For example, we recently proposed a no-moving-parts, full-field Mueller matrix polarimeter based on photoelastic modulators,[@cit36] have investigated the biological validity of different Mueller matrix decomposition methods,[@cit41] and have developed Monte Carlo simulations for the forward modelling of polarized light transport through turbid media.[@cit42]
Mueller matrix polarimetry imaging is used here to grossly distinguish cancer regions from the background of healthy tissues, in order to guide targeted acquisition of DESI-MS profiling and DESI-MS imaging. In this way, we are able to target the DESI spray on areas of interest such as the tumor region and the border between cancer and healthy tissue for rapid discrimination of cancer margins and cancer type identification. With this targeted DESI-MS approach we are able to detect the presence (or absence) of breast cancer by measuring specific lipid profiles in 1.7 s of data acquisition (two scans of ∼870 millisecond). This targeted profiling approach also allowed mapping positive margins on both sides of a tumor ∼5 mm wide in slightly over 30 seconds of MS acquisition which is an order of magnitude faster than histopathology methods delivering the same information. Polarimetry offers guidance in the absence of any staining and is applicable to the 'same' tissue slice being analyzed with MSI. This is significantly different from the image fusion approach described above[@cit31] that uses an H&E stained slice, consecutive to the one being analyzed by MALDI-MSI to provide guidance.
Materials and methods
=====================
Animal study
------------
All animal studies were conducted in accordance with institutional guidelines and approved by the animal ethics and use committee (Animal Use Protocol at the University Health Network, Toronto, Canada). Two female Severe Combined ImmunoDeficient (SCID) mice (Harlan) were inoculated with 40 μL of 4 × 10^6^ human MDA-MB-231-LUC breast cancer cells in their quadriceps muscles and housed for 3--4 weeks to allow tumor growth up to 5--7 mm in diameter (determined by calliper measurements). In addition to its immense clinical importance and challenges, breast cancer was an appropriate disease to study because DESI-MS profiles for endogenous, cancer specific lipids have been identified in a number of independent breast cancer studies.[@cit26],[@cit27],[@cit43] In order to create clear boundaries and mimic a breast tumor infiltrating the pectoralis muscles, we inoculated mice with cancer cells in the quadriceps muscle (as opposed to mammary tissue). This allowed wide margin resections with clear definition of the cancer boundaries and easy access to muscle sites for the inoculation.
*In vivo* imaging
-----------------
Magnetic Resonance Imaging (MRI) was performed on the day of tumor resection on a 1T -- M3 MR system (Aspect Imaging) with a mouse body coil 50 × 30 mm in size. Fast Spin Echo imaging was performed with the following parameters: TE/TR = 54.9 ms/4500 ms, ETL = 16, flip angle = 90°, FOV = 40 × 60 mm, matrix size = 96 × 150, 8 averages and a final pixel size of 0.4 mm.
Bioluminescence Imaging (BLI) was performed one day before tumor resection, on a Xenogen IVIS -- 100 Imaging System (Perkin-Elmer). 100 μL of 25 mg mL^--1^[d]{.smallcaps}-luciferin potassium salt solution (Perkin-Elmer) was intraperitoneally administered to each mouse and images were acquired 10 minutes post-injection.
Tissue sample preparation
-------------------------
Mice were sacrificed with an overdose of isoflurane and subjected to surgical removal of the tumors with a wide 2--3 mm margin containing muscle tissue. Extracted tissues were subsequently frozen on liquid N~2~ vapour and stored at --80 °C. Flash frozen tissue was very carefully mounted onto a metal specimen holder with a small amount of Tissue-Tek OCT compound (Sakura Finetek USA Inc), to prevent OCT material from reaching the area being sectioned. Using a CM1950 cryostat (Leica) serial sections with thicknesses of 20 μm, 5 μm and 20--50 μm, for DESI-MS imaging, histological analysis and polarimetry, respectively, were sectioned and mounted onto Superfrost Plus slides. Slides were stored at --80 °C until analysed.
Laboratory histology analysis
-----------------------------
For histological analysis, Hematoxylin & Eosin (H&E) staining was performed as followed: sections were thawed at room temperature for 5 minutes, fixed in 2% paraformaldehyde for 15 minutes and subsequently washed in running tap water for 5 minutes. Tissue sections were then immersed in Harris Hematoxylin (Leica Biosystems) for 3 minutes, washed in warm running tap water for a further 3 minutes before differentiating in 1% acid alcohol. Sections were washed in warm running tap water for 3 minutes prior to immersing in Eosin (Leica Biosystems) for 40 seconds. Sections were washed briefly in water (10 dips) before dehydrating through a series of alcohol solutions from 70% to 100%, cleared through 4 changes of xylene and finally cover slipped using Permount mounting media. Digital images were captured using a TissueScope 4000 slide scanner (Huron Technologies).
Polarimetry
-----------
Polarimetry measurements were made on a homemade polarimetry system operating in transmission geometry. Incident polarization states were produced by passing laser light (635 nm, Thorlabs) through a polarization state generator (PSG), consisting of a linear polarizer and removable quarter wave plate. After interacting with breast cancer samples (20--50 μm slices mounted on glass slides), the polarization state of the emerging light was analyzed under different configurations of the polarization state analyzer (PSA, removable quarter wave plate followed by linear polarizer). The image intensities were then recorded using a CCD camera (CoolSnap K4, Photometrics). Lenses were placed before the sample to generate an appropriate spot size and after the sample to collect and focus the emerging light onto the CCD. Four input polarization states were used: horizontal, vertical, +45° and right circular. Emerging light for each input polarization was analyzed under six different output polarization states: horizontal, vertical, +45°, --45°, right circular and left circular. Hence, for each sample, 24 images were recorded using different PSA/PSG combinations, which were then used to calculate the sample Mueller matrix as previously described.[@cit44] To extract the polarization parameter of depolarization, Lu--Chipman Mueller matrix decomposition[@cit45] was used.
DESI-MS and DESI-MS imaging experiments
---------------------------------------
All MS experiments were performed using a Thermo Fisher Scientific LTQ mass spectrometer (San Jose, CA, USA). The glass slides containing 20 μm consecutive slices were mounted on a lab-built 2D moving stage (described elsewhere[@cit17]), and subjected to DESI-MS imaging. DESI-MS imaging was carried out in the negative ion mode over the mass range *m*/*z* 260 to 1000. A 1 : 1 mixture of acetonitrile and dimethylformamide (both HPLC-MS grade, Sigma-Aldrich, Oakville, ON, Canada) was used as the charged spray solvent and delivered at a flow rate of 1.5 μL min^--1^. The sprayer-to-surface distance was 1.0 mm, the sprayer to inlet distance was 6--8 mm, an incident spray was set at 52°, and a collection angle of 10° was used. Source parameters were 5 kV capillary voltage, 275 °C capillary temperature, and nitrogen spray at 120 psi. In order to acquire DESI-MS images, tissues were raster-scanned using the laboratory built moving stage described above in horizontal rows separated by 150 μm vertical steps until the entire sample was imaged. The lines were scanned at a constant velocity in the range of 172 to 203 μm s^--1^ and the scan time varied from 0.76 to 0.87 s. The software platform ImageCreator version 3.0 was used to convert the Xcalibur 2.0 mass spectra files (.raw) into a format compatible with BioMap (freeware, ; <http://www.maldi-msi.org/>), which was used to process the mass spectral data and to generate 2D spatially resolved ion images. The assignment of lipid biomarkers seen in the negative ion mode of the tumor samples was made by DESI-MS/MS, corroborated with published breast cancer MS profiles.[@cit26],[@cit27],[@cit43]
Results and discussion
======================
To evaluate the utility of wide-field tissue polarimetry in guiding DESI-MS we used human breast cancer cells grown into tumors inside quadriceps muscles of mice. *In vivo* Magnetic Resonance (MR) images and bioluminescence images were acquired prior to tumor resection to evaluate size and location (Fig. S1[†](#fn1){ref-type="fn"}). Our model mimics posterior breast cancer tumors that are often attached to, and infiltrate the pectoralis major muscle. These tumors are difficult to visualize using mammography.[@cit46]
In a typical white light optical image of the tissue slice ([Fig. 1A](#fig1){ref-type="fig"}), as presented to the mass spectrometer operator, the breast cancer region infiltrating healthy muscle is not readily visible to the naked eye. With no visual cues to guide the placement of DESI solvent spray on the tumor region and the boundary between healthy and cancerous tissue, the MS operator would have to image the entire tissue slice.
![DESI-MSI and Mueller matrix polarimetry imaging of an infiltrating breast cancer tumor. (A) Optical image of a 20 micron thick tissue slice comprising a breast cancer tumor that infiltrates the adjacent muscle tissue. (B) Mueller matrix polarimetry image of the same tissue as in A. (C) DESI-MSI of a breast cancer marker of *m*/*z* 331.2 corresponding to andrenic acid \[FA(22:4)-H\]^--^. Here, a focused DESI-MSI area revealed by polarimetry to be cancerous (box, dashed yellow line) can be imaged. (D) The H&E image of a consecutive tissue slice highlighting the cancer region. (E) The extracted ion chromatogram for one breast cancer marker, andrenic acid \[FA(22:4)-H\]^--^ of *m*/*z* 331.2, collected from a line scan corresponding to the dashed white line in the polarimetry image (panel B). The insets to panel C show MS spectra averaged over two instrument scans from select points at the margins, in the middle of the tumor tissue, as well as in the muscle, as highlighted with crosses on the polarimetry image. (F) DESI-MS point scans to reveal presence of cancer at given points on the tissue sample. This process could be automated with tissue classification information being displayed to the clinician/pathologist in a straight-forward, easy-to-interpret manner (*e.g.*, color coded red for cancer and green for healthy tissues as reported previously[@cit52]).](c5sc03782d-f1){#fig1}
In contrast with white light imaging, [Fig. 1B](#fig1){ref-type="fig"} illustrates that wide-field polarimetry of the same tissue (in this case a consecutive slice, see Fig. S2[†](#fn1){ref-type="fn"}) quickly reveals areas of heterogeneity based on different depolarizations induced by the healthy and cancer regions. We observed that breast cancer was less depolarizing compared to the surrounding muscle tissue. Similar findings have been previously reported for colon[@cit47] and cervical cancer.[@cit48] For example, Antonelli *et al.* showed that early stage colon cancer was less depolarizing than surrounding healthy tissues.[@cit47] Depolarization due to multiple light scattering is a consequence of the turbid heterogeneous nature of tissue. The amount of depolarization is influenced by tissue parameters such as scatterer (cells, nuclei, connective tissue fibers, *etc.*) sizes, shapes, and densities, all causing complex spatial variations in optical refractive index patterns. In cancer, tissue architecture is significantly altered[@cit49] (*i.e.* increased nuclear density and size, stromal alterations) resulting in different depolarization patterns than healthy tissue. Here, the observed depolarization contrast is likely also influenced by anisotropy (alignment) of the muscle background. It has been suggested that anisotropic tissues (such as fibrous muscle) exhibit increased depolarization due to spatially inhomogeneous microdomains of varying linear retardance/birefringence.[@cit50] As polarized light passes through these spatially varying regions, it undergoes additional randomization and hence depolarization increases.
To validate that polarimetry can indeed reveal breast cancer regions, a DESI-MS image of the entire tissue slice was performed ([Fig. 1C](#fig1){ref-type="fig"}). Here we present a map of the ion of *m*/*z* 331.2, a prominent lipid marker of breast cancer[@cit26],[@cit27],[@cit43] identified as andrenic acid \[FA(22:4)-H\]^--^. The cancerous region of increased andrenic acid indeed corresponds to the area suggested by polarimetric images to contain tissue material with an altered morphology. Comparison with the H&E image ([Fig. 1D](#fig1){ref-type="fig"}) confirms the results; areas shown through polarimetry to be less depolarizing are indeed cancerous. [Fig. 1C](#fig1){ref-type="fig"} demonstrates how polarimetry can be used to select a smaller region (shown by the dashed-line box) containing only the tumor for selective analysis with DESI-MSI, eliminating the need to image the entire tissue slice.
The insets in [Fig. 1E](#fig1){ref-type="fig"} show MS spectra obtained from four select points (marked with crosses on the polarimetry image, [Fig. 1B](#fig1){ref-type="fig"}) of the tissue: two points at the tumor margins, a typical point inside the tumor, and a point in the healthy muscle tissue. Each spectrum was averaged over two scans, with a total acquisition time of 1.7 s for each spectrum. Highlighted in the spectra are major lipid markers characteristic of breast cancer: *m*/*z* 281.2 corresponding to oleic acid \[FA(18:1)-H\]^--^, *m*/*z* 303.2 for arachidonic acid \[FA(20:4)-H\]^--^, *m*/*z* 331.2 for andrenic acid \[FA(22:4)-H\]^--^ as well as the phospholipid species of *m*/*z* 885.5 identified as \[PI(38:4)-H\]^--^.[@cit26],[@cit27],[@cit43] These observations are in agreement with findings presented in Calligaris *et al.*,[@cit27] suggesting that about 85% of breast cancer samples have a significant increase in ion abundance in the low-mass region (*i.e.*, below *m*/*z* 700) such as ions of *m*/*z* 303.2 and 331.2. The ions of high mass range, for example *m*/*z* 885.5, exist in both tumor and normal specimens. All of these markers were confirmed by DESI-MS/MS (Fig. S3--S6[†](#fn1){ref-type="fn"}). These markers have been observed with DESI-MSI in studies of intraoperative tissue biopsies[@cit43] and in a patient cohort undergoing double mastectomies.[@cit27] The fact that the human MDA-MB-231 breast cancer cell line used in this study presents these same lipid markers supports the choice of our cancer mouse model, *via* its potential clinical relevance. As expected, the mass spectrum from the muscle region did not reveal characteristic breast cancer markers.
In the absence of feedback from other imaging modalities, mapping cancer borders with DESI-MS is achieved by analyzing the distribution of cancer markers across the entire tissue sample (as seen in [Fig. 1C](#fig1){ref-type="fig"}). In the interest of reduced analysis time, it has been recently suggested that a line scan (*i.e.* MS profile along a line through the tumor) may be sufficient for understanding 1-dimensional cancer margins in an excised sample intraoperatively.[@cit27] This is achieved through monitoring the rise and fall of cancer marker ion intensity in the extracted ion chromatogram. However, for rapid assessment of tumor margins and characterization of cancer type, the line scan should target the cancer region and the border between cancer and healthy tissue. Therefore, to effectively target the DESI solvent spray, an understanding of the approximate location of the cancer region/healthy tissue transition is desirable. [Fig. 1E](#fig1){ref-type="fig"} illustrates a targeted DESI-MS ion chromatogram for one of these cancer markers, andrenic acid \[FA(22:4)-H\]^--^ of *m*/*z* 331.2. Here, the placement of DESI spray was guided by polarimetry to a line across the area suspected to be cancerous. This ion chromatogram corresponds to a line scan across the sample as indicated in [Fig. 1B](#fig1){ref-type="fig"} (dashed white line). The total scan time for this line was 72 seconds. By strategically placing the DESI solvent spray to the area revealed by polarimetry to be likely cancerous, we were able to determine tumor margins from the rise in the intensity of the andrenic acid ion in approximately one minute of data acquisition. There is a strong correspondence between the rise along the MS scan line of the andrenic acid ion intensity and the boundary of the tumor as revealed through H&E staining ([Fig. 1D](#fig1){ref-type="fig"}).
Typical procedure times for various experiments are also listed in [Fig. 1](#fig1){ref-type="fig"}. A combined polarimetry guided DESI-MS line scan is capable of elucidating 1-dimensional cancer border in less than 3 minutes (2 minutes for polarimetry and slightly over 30 seconds for a continuous DESI-MS line scan crossing the tumor boundaries). This constitutes a 10-fold acceleration in margin assessment compared to H&E delivering boundary information. It must be emphasized that to image the *entire* tumor boundary (2D margin information), a tandem of polarimetry and DESI-MSI can be used to reduce the effective area to be imaged to one that immediately surrounds the suspected cancer region (boxed area in [Fig. 1C](#fig1){ref-type="fig"}). The total analysis time for the highlighted section revealing the entire cancer area (0.70 cm × 0.55 cm) is close to 12 minutes, which is still 2.5 times faster than H&E methods. With our guided imaging approach, tumors 1.5 cm × 1.5 cm in extent can be entirely mapped to reveal 2D cancer boundaries in 30 minutes of MSI acquisition. With more rapid MS imaging technologies such as high speed MALDI-MS imaging being developed,[@cit51] polarimetry guided MS imaging of biological tissues may become even faster than we have demonstrated here. In addition, a MALDI-MS imaging approach may further improve spatial resolution.
Finally, [Fig. 1F](#fig1){ref-type="fig"} illustrates how a point-by-point profiling could be achieved using guided DESI-MS to rapidly typify the cancerous tissues in select points within the regions suspected to be pathologic by polarimetry. Here we show three representative spectra from various points (marked with crosses) within both the cancer region as well as from within the healthy muscle tissue, with prominent cancer markers *m*/*z* 303.2 and 331.2 highlighted. Additionally, the presence or absence of cancer could be translated into easy-to-interpret color map indicators for rapid feedback to clinicians and pathologists, as recently suggested.[@cit52]
To evaluate the reproducibility of this approach, [Fig. 2](#fig2){ref-type="fig"} shows the correspondence between DESI-MSI and Mueller matrix polarimetry images of three different slices of breast cancer tumor infiltrating muscle tissue. A consecutive slice was subjected to conventional H&E analysis for corroboration, as per the tissue preparation work-flow described in Fig. S1.[†](#fn1){ref-type="fn"} In all three cases DESI-MSI revealed elevated relative abundances of the breast cancer markers \[FA(20:4)-H\]^--^ of *m*/*z* 303.2, \[FA(22:4)-H\]^--^ of *m*/*z* 331.2 and \[FA(18:1)-H\]^--^ of *m*/*z* 281.2 in areas identified through polarimetry and H&E to be cancerous. [Fig. 2](#fig2){ref-type="fig"} also shows MS spectra collected at positive tumor margins (indicated with a cross) containing all of the breast cancer markers described above.
![Polarimetry guided DESI-MS analysis of breast cancer. (A) Polarimetry/DESI-MS work flow. The tissue is sliced and mounted on a glass slide. The section is then imaged *via* wide-field polarimetry revealing suspected cancer regions from differential depolarization. The same slide is then subjected to DESI-MS or DESI-MSI analysis. (B--D) Analysis of three tissue slices by tandem of Mueller matrix polarimetry and DESI-MS. From left to right: polarimetry depolarization images, DESI-MS lipid profiles collected at a typical point in the tumor margin (highlighted with a cross over the polarimetry image), DESI-MSI of breast cancer marker ions \[FA(18:1)-H\]^--^ of *m*/*z* 281.2, \[FA(20:4)-H\]^--^ of *m*/*z* 303.2, \[FA(22:4)-H\]^--^ of *m*/*z* 331.2 and \[PI(38:4)-H\]^--^ of *m*/*z* 885.5, as well as H&E images are shown. The position of the DESI spray for the strategic collection of MS spectra was guided by polarimetry. The results shown are consistent with those from an independent mouse presented in Fig. S7.[†](#fn1){ref-type="fn"}](c5sc03782d-f2){#fig2}
We further evaluated the robustness of polarimetry guided DESI-MSI using another breast cancer tumor grown in a second SCID mouse. Fig. S7[†](#fn1){ref-type="fn"} illustrates the results, once again highlighting correspondence between DESI-MSI, polarimetry and H&E in cancer identification. That is, regions revealed by histology to be cancerous correspond to regions of lower depolarization (measured with polarimetry) and elevated relative abundances of breast cancer markers (measured with DESI-MSI).
In summary, multiple ways in which the tandem of polarimetry and DESI-MS profiling could potentially be implemented in a clinical setting (workflow) are illustrated in [Fig. 1](#fig1){ref-type="fig"}. In all cases a tissue section 20 μm in thickness is prepared from an excised sample, and is mounted on a glass slide. Polarimetry is then performed (1--2 min) to grossly reveal cancer regions. The same slice is then subjected to guided DESI-MS profiling. This profiling could be done in a number of ways: (1) accelerated targeted 2D DESI-MSI ([Fig. 1C](#fig1){ref-type="fig"}); (2) accelerated 1D margin assessment ([Fig. 1E](#fig1){ref-type="fig"}); (3) point-by-point DESI-MS profiling ([Fig. 1F](#fig1){ref-type="fig"}) to reveal cancer type. Table S1[†](#fn1){ref-type="fn"} summarizes tissue preparation requirements as well as analysis times for all imaging modalities used in this study.
Polarimetric information (*e.g.*, depolarization images) is indicative of the heterogeneous nature of the underlying tissue microstructure, and may thus lack chemical specificity for cancer detection (as afforded by DESI-MSI). This could lead to incorrect "targeting" for the tandem MS analysis, a potentially important limitation of the proposed methodology that needs to be rigorously evaluated. One approach to improve the polarimetric specificity (and thus reduce potential false positives and false negatives) will be to include other Mueller matrix metrics available for differential tissue analysis (*e.g.*, birefringence images). Further, the tandem combination proposed here will enable the DESI-MSI to conclusively confirm the absence/presence of tumor in the targeted image region, thus "correcting" the polarimetric false positives. These issues are complex, and will be examined and refined in future studies. Owing to its superior sensitivity, DESI-MSI may distinguish tumor infiltration on the basis of MS profiles.[@cit18] However, low concentration of cancer cells present in such areas (few isolated cancers cells surrounded by normal cells) could still present a challenge in cancer detection by DESI-MSI; the technique\'s ultimate detection limit is yet to be determined.
Conclusions
===========
In this work we demonstrate the utility of combined polarimetry and DESI-MSI for accelerated identification of tumor boundaries. Polarimetry images are made available considerably faster than H&E images proposed for guiding MSI. Therefore, a multi-modality combination of polarimetry and MSI appears capable of accelerating the acquisition of MSI data. Through polarimetry and DESI-MS fusion, the different strengths of these two techniques are accessed. Using polarimetry-targeted MS analysis, it may become feasible to perform intraoperative molecular pathology evaluations more rapidly than currently possible with conventional non-targeted MSI methods, while retaining the relevant information content afforded by histology. This may have significant implications for the current pathology assessment and work-flow in the operating room. Coupling between polarimetry and other MSI technologies such as MALDI-MS is possible and could be pursued. The sensitivity of MS may also make this technology amenable to early diagnosis of cancer where minute quantities of cancer markers detected could indicate pathology. The utility of a polarimetry/MSI tandem for early detection of cancer will be investigated in future work.
Supplementary Material
======================
Supplementary information
######
Click here for additional data file.
[^1]: †Electronic supplementary information (ESI) available. See DOI: [10.1039/c5sc03782d](10.1039/c5sc03782d)
|
Development of carcinoma in chronic calcific pancreatitis.
Development of carcinomas of the pancreas over an underlying chronic pancreatitis is a rare event. Diminution of pancreatic calcification, following the development of carcinoma, has been previously reported only once. We report another such case. |
[Relationship between virulence to mice and macrophage chemiluminescence-triggering activity of the Mycobacterium avium complex belonging to various serovars].
Macrophage chemiluminescence (M phi CL)-triggering activities of Mycobacterium avium complex (MAC) strains belonging to various serovars were examined. When SmT colonial variant (smooth, transparent, irregularly shaped) of M. intracellulare N-260 strain was compared with its SmD variant (smooth, opaque, dome-shaped) for M phi CL-triggering function and resistance to antimicrobial activity of murine resident peritoneal M phi s, the SmT variant showed much lower M phi CL-triggering activity accompanied by its high resistance to M phi microbicidal functions. Thus, difference in the virulence of the two MAC colonial variants seems to be originated from their different activities in M phi-triggering to be stimulated state in terms of O2-dependent antimicrobial functions. When disease-associated MAC strains belonging to serovars 1, 14, 16 (major serovars seen in Japan), 8 (intermediate serovar) and 9 (minor serovar) were challenged to mice, their virulence, in terms of mortality of host animals and growth of the organisms in the lungs, was nearly in the order of serovar 16, 14, 8, 1 and 9. However, there was found no obvious serovar-dependent difference in M phi CL-triggering activity of these MAC strains. Thus, no significant correlation was found between virulence of the MAC strains of various serovars and their triggering activities for M phi active oxygen production, which is important for the O2-dependent microbicidal mechanisms of host M phi s.(ABSTRACT TRUNCATED AT 250 WORDS) |
Q:
Storing colour space as a variable for EmguCV
I'm trying to offer my users the option to toggle whether the detection uses Bgr or Gray colour spaces for optimisation purposes.
I saw that the type of these options is refered to as a "struct" which has the namespace of:
Emgu.CV.Structure.Gray
or
Emgu.CV.Structure.Gray
This is my current detection code, as you can see it's currently just using the Gray option.
while (!found)
{
timeTaken = Stopwatch.StartNew();
window = new Image<Gray, byte>(WindowOperations.TakeScreenshot(focusWindow));
using (var result = window.MatchTemplate(detect, TemplateMatchingType.CcoeffNormed))
{
result.MinMax(out var minValues, out var maxValues, out var minLocations, out var maxLocations);
if (!(maxValues[0] > watchmanData.Profile.SettingsProfile.AccuracyDecimal)) continue;
found = true;
timeTaken.Stop();
}
}
Ideally I would like something such as this (if possible):
while (!found)
{
timeTaken = Stopwatch.StartNew();
colourSpace = userChoice;
window = new Image<colourSpace, byte>(WindowOperations.TakeScreenshot(focusWindow));
using (var result = window.MatchTemplate(detect, TemplateMatchingType.CcoeffNormed))
{
result.MinMax(out var minValues, out var maxValues, out var minLocations, out var maxLocations);
if (!(maxValues[0] > watchmanData.Profile.SettingsProfile.AccuracyDecimal)) continue;
found = true;
timeTaken.Stop();
}
}
Any help would be appreciated.
A:
The problem is that c# does not allow you to use variable type parameters the way you want to. But you can separate your code into a typed method like this:
public void Process(bool useGray)
{
if (useGray)
{
DoStuff<Gray>(new Image<Gray, byte>(100, 100), new Image<Gray, byte>(10, 10));
}
else
{
DoStuff<Bgr>(new Image<Bgr, byte>(100, 100), new Image<Bgr, byte>(10, 10));
}
}
public void DoStuff<TColor>(Image<TColor, byte> window, Image<TColor, byte> pattern)
where TColor : struct, IColor
{
using (var result = window.MatchTemplate(pattern, TemplateMatchingType.CcoeffNormed))
{
result.MinMax(out var minValues, out var maxValues, out var minLocations, out var maxLocations);
//... evaluate matching
}
}
|
- if textbook_lessons.present?
.Syllabus__table.table-responsive
table.table
tr
th
th
| タイトル
th
| 著者名
th
| 出版社
th
| ISBN
- textbook_lessons.each do |tbl|
tr
- unless amp_ready?
td
= image_tag tbl.text_book.medium_image if tbl.text_book.medium_image.present?
td
= tbl.text_book.title
- if tbl.text_book.book_stores.present? && current_user.present?
.alert.alert-info.mT20
- if tbl.text_book.book_requests.pluck(:request_user_id).include?(current_user.id)
/ この教科書にすでにリクエストしている場合
| すでに教科書をリクエスト済みです。
br
| 通常48時間以内にメールが送られます。
- elsif tbl.text_book.book_stores.pluck(:is_sold).all?
/ Repの在庫が完売している場合
| Repの在庫は完売しました。
- else
/ Repの在庫がある場合
strong
= link_to "Repから購入", ship_textbooks_path(id: tbl.text_book, request_user: current_user), method: :post, onClick: "gtag('event', 'click', {'event_category': 'lesson/textbook', 'event_label': 'buy_from_rep'});"
br
| 定価の50%引きで販売中!
- elsif tbl.text_book.book_stores.present?
.alert.alert-info.mT20
strong
| Repに在庫あり!
br
| ログインするとRepの中古教科書を購入可能です。
br
| 50%引きで販売中!
- if tbl.text_book.amazon_page.present?
.alert.alert-warning.mT20
strong
= link_to "Amazonで購入", tbl.text_book.amazon_page, target: '_blank', onClick: "gtag('event', 'click', {'event_category': 'lesson/textbook', 'event_label': 'to_amazon_detail_page'});"
br
| *買い間違えにご注意ください。
td
= tbl.text_book.author
td
= tbl.text_book.publisher
td
- if tbl.text_book.isbn.present?
= tbl.text_book.isbn
- else
= tbl.text_book.amazon_isbn
|
Q:
Differential equation of a mass on a spring
I have the following differential equation which is motivated by the dynamics of a mass on a spring:
\begin{equation}
my'' - ky = 0
\end{equation}
I split this into a system of equations by letting $x_1=y$ and $x_2=y'$
\begin{equation}
x' = \begin{pmatrix} 0&1\\\dfrac{k}{m}& 0\end{pmatrix}x
\end{equation}
Find an Eigenvalue:
\begin{align}
\det(A-\lambda I) =& 0 \\
\det\begin{pmatrix} -\lambda&1\\\dfrac{k}{m}&-\lambda\end{pmatrix} =& 0 \\
\lambda^2 - \dfrac{k}{m} =& 0 \\
\lambda = \pm\sqrt{\dfrac{k}{m}}
\end{align}
Find the matching eigenvector:
\begin{align}
(A-\lambda I)x =& 0 \\
\begin{pmatrix} -\sqrt{\frac{k}{m}}&1\\\dfrac{k}{m}&-\sqrt{\frac{k}{m}}\end{pmatrix}x =& 0
\end{align}
This matrix is similar to:
\begin{equation}
\begin{pmatrix}-\sqrt{\frac{k}{m}}&1\\0&0\end{pmatrix}x = 0
\end{equation}
$x_2$ is free so let $x_2$ = 1. We have:
\begin{align}
-\sqrt{\frac{k}{m}}x_1 + 1 =& 0 \\
x_1 =& \dfrac{1}{\sqrt{\dfrac{k}{m}}}
\end{align}
So the corresponding eigenvector is
$\begin{pmatrix}\dfrac{1}{\sqrt{\dfrac{k}{m}}}\\1\end{pmatrix}$.
Any solution to the vector differential equation $x'=Ax$ is $x = e^{\lambda t}x_0$ where $\lambda$ is an eigenvalue and $x_0$ is the corresponding eigenvector.
Our solution is then
\begin{equation}
e^{\sqrt{\frac{k}{m}} t}\begin{pmatrix}\dfrac{1}{\sqrt{\dfrac{k}{m}}}\\1\end{pmatrix}
\end{equation}
I am just using technique I learned in a differential equations book. This doesn't make sense from a physics stand point where solutions should be periodic and thus would have solutions in terms of sines and cosine. Perhaps I did not setup the system correctly, because if I got imaginary eigenvalues then I could have had sines and cosine in my solution.
I want to know what I did wrong, let me know what you think.
A:
If we have $$mt^2+k=0, ~~m>0,k>0$$ instead so $t=\pm\sqrt{\frac{k}{m}}i$ which lead us to have $$y_c(x)=C_1\exp\left(\sqrt{\frac{k}{m}}ix\right)+C_2\exp\left(-\sqrt{\frac{k}{m}}ix\right)$$ Now Euler's formula $e^{it}=\cos(t)+i\sin(t)$ can help us to convert the resulted solution to the following tolerable form: $$y_c(x)=C_1\cos\left(\sqrt{\frac{k}{m}}~x\right)+C_2\sin\left(\sqrt{\frac{k}{m}}~x\right)$$
|
# @@@ START COPYRIGHT @@@
#
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
#
# @@@ END COPYRIGHT @@@
all: LICENSE-src LICENSE-server LICENSE-pyinstall LICENSE-install LICENSE-clients NOTICE-server
# All source code included in Trafodion source
LICENSE-src:
cat Apache lic-components-src lic-server-src lic-test-src lic-pyinstall-src > $@
# Binary licenses for each separately packaged component
# Must include source licenses as well as software bundled in at build time
LICENSE-server:
cat Apache lic-server-src lic-server-bin > $@
NOTICE-server:
cat ../NOTICE note-server-bin > $@
LICENSE-install:
cat Apache > $@
LICENSE-pyinstall:
cat Apache lic-pyinstall-src > $@
LICENSE-clients:
cat Apache lic-clients-bin > $@
clean:
rm -f LICENSE* NOTICE*
|
Does he cede power to the anti-establishment wing of his party? Or does he seek other pathways to successful governing by throwing away the partisan playbook and courting a coalition with the Democrats, whom he has improbably blamed for his party’s shortcomings?
“It’s really a problem in our own party, and that’s something he’ll need to deal with moving forward,” said Representative Tom Cole of Oklahoma, an ally of the center-right Tuesday Group, which stuck with Mr. Trump in the health care fight and earned the president’s praise in the hours after the bill’s defeat.
“I think he did a lot — he met with dozens and dozens of members and made a lot of accommodations — but in the end, there’s a group of people in this party who just won’t say yes,” Mr. Cole said. “At some point, I think that means looking beyond our conference. The president is a deal maker, and Ronald Reagan cut some of his most important deals with Democrats.”
Mr. Trump is not there yet. Before becoming a presidential candidate, he seemed to have little fixed ideology. But as president, he has operated from the standard-issue Republican playbook, embracing many of the positions of Speaker Paul D. Ryan and the party establishment. While he is angry and thirsty for revenge, he seems determined to swallow the loss in hopes of marshaling enough Republican support to pass spending bills, an as-yet unformed tax overhaul and a $1 trillion infrastructure package — legislation that could attract considerable Democratic support but has the potential to split the party.
On Friday evening, a somewhat shellshocked president retreated to the White House residence to grieve and assign blame. In a search for scapegoats, he asked his advisers repeatedly: Whose fault was this? |
Q:
Downloading Work shared model from BIM 360 Design
Using Forge API, is it possible to download a Work-shared Revit Model from BIM 360 Design to local machine and i need to open it and again sync it.The below code is used for downloading a file, but not possible to Sync to central. The connection to BIM 360 Design is not maintained in the Model.
ObjectsApi itemApi = new ObjectsApi();
string BucketKey = "wip.dm.prod";
string objectName = "1a79a3a0-888f-4dec-8c82-96de7f07d19b.rvt";
itemApi.Configuration.AccessToken=await Get2LeggedTokenAsync(new Scope[] { Scope.DataCreate, Scope.DataWrite, Scope.AccountRead, Scope.ViewablesRead, Scope.DataRead });
dynamic content= itemApi.GetObject(BucketKey, objectName);
can you please help me to solve this scenario.
Thanks
Bimal George
A:
You can use 2 legged Account Admin token or 3 legged token to download the cloud worksharing model after it's published to BIM360 Docs, but I don't suggest you access it directly from Bucket, instead, please follow the link https://forge.autodesk.com/en/docs/bim360/v1/tutorials/documen-management/download-document/ to get it from Hub->Project->Folder->Item-Version, that's the suggested way, and you can also upload a new version with the similar way.
I answered another related question in Revit forum at https://forums.autodesk.com/t5/revit-api-forum/is-it-possible-to-open-a-bim-360-model-without-using-forge/m-p/8297315, it's talking about how to get the model and open it in Revit, you can check.
|
Welcome to our website! As we have the ability to list over one million items on our website (our selection changes all of the time), it is not feasible for a company our size to record and playback the descriptions on every item on our website.
However, if you are an American with a disability we are here to help you. Please call our disability services phone line at 609-882-1444 during regular business hours and one of our kind and friendly personal shoppers will help you navigate through our website, help conduct advanced searches, help you choose the item you are looking for with the specifications you are seeking, read you the specifications of any item and consult with you about the products themselves. There is no charge for the help of this personal shopper for any American with a disability. Finally, your personal shopper will explain our Privacy Policy and Terms of Service, and help you place an order if you so desire.
Make the microwave easy to use and provide a display that shows the functions that are being programmed.
Timed Defrost
Allows intuitive operation by automatically setting the microwave oven's power level at 30% for the amount of time you select.
9 Quick-Touch Cycles Including Six Sensor Cycles
Takes the guesswork out of getting exceptional results from your microwave. The microwave will automatically adjust cooking time based on a menu of preprogrammed, menu-driven cycles.
Electronic Controls with LED Display
Make the microwave easy to use and provide a display that shows the functions that are being programmed.
Timed Defrost
Allows intuitive operation by automatically setting the microwave oven's power level at 30% for the amount of time you select.
9 Quick-Touch Cycles Including Six Sensor Cycles
Takes the guesswork out of getting exceptional results from your microwave. The microwave will automatically adjust cooking time based on a menu of preprogrammed, menu-driven cycles.
Features
13 1/2" Recessed Turntable - Helps evenly cook food by continually rotating throughout the cooking cycle. The turntable is sunken into the bottom of the microwave to maximize the capacity.
Accepts 30- or 27-Inch Trim Kit - Allows you to install your countertop microwave into an existing cutout for a more integrated appearance.
1.6 Cu. Ft. Capacity - Provides large capacity to make this microwave a true complement to a wall oven or range.
1200-Watt Cooking Power - Cooks with the power to quickly defrost or heat even large dishes.
Color-Coordinated Stainless Steel Cabinet - Is finished in a color-coordinated brushed stainless steel to complement the other appliances in your kitchen.
Professional delivery and installation is available for every product we sell. We would be happy to coordinate delivery and installation for you.
Extended warranties are usually very inexpensive and can save you thousands in the future.
Some can even cover extra costs that result, such as cost of food that spoils when your fridge dies.
It's simple and inexpensive to purchase extended warranties and one of the smartest ways to protect your investment.
Appliances
can be large, heavy and expensive. You probably don't have the special tools or expertise needed to fix them in a crisis. If you can spare a few thousand dollars without batting an eyelash for new
appliances
should they break tomorrow, don't buy a warranty. But if you're like most of us, protect yourself by purchasing inexpensive extended warranties when you buy a new product and save yourself big money in the long run.
Why choose Mrs. G TV & Appliances?
Mrs. G TV & Appliances based in Lawrence Twp, NJ is a 3rd generation family owned Retail Appliance, TV super store with an outstanding reputation for over 80 years. Our customers not only come from New Jersey, but also from Pennsylvania because we are just minutes away from the states' border. Our products are delivered all over New Jersey, Eastern Pennsylvania, NYC and surrounding areas.
Mrs. G TV & Appliances has outperformed its competition for over 80 years, outlasting retail chains like Crazy Eddie, Dee's, Tops, American Appliance and Circuit City. Our new 25,000 sq ft location beautifully displays more than 50 brands of home appliances, TV and plumbing fixtures including Sub-Zero, Wolf, Miele, Monogram, Viking, Frigidaire, Electrolux, Kitchen Aid, Jenn Air, Samsung, Sony, LG, and more. As a member of a national buying group with billion dollars in buying power we are able to compete successfully with all other national and regional appliance dealers. We can help you select your new home appliances at any budget. We are a one stop Appliance & TV super store. With our large inventory you can easily make the best selection.
What sets us apart from other home appliances stores? Our professionally trained staff and customer service support team regularly train with manufactures to keep up to date on new products, promotions and service. We make every effort to deliver the merchandise when you need it. Our delivery trucks and personnel provide fast, professional, courteous delivery. Our sales associates will coordinate installation with one of our several certified subcontractors for hassle free same day delivery and installation. Most important, we take very good care of our customers after the sale. We work very hard with our authorized service agents to make sure our customers get their service needs in a timely manner. We look forward to seeing you at Mrs. G TV & Appliances in Lawrence Twp, NJ.
Welcome to our website! As we have the ability to list over one million items on our website (our selection changes all of the time), it is not feasible for a company our size to record and playback the descriptions on every item on our website.
However, if you are an American with a disability we are here to help you. Please call our disability services phone line at 609-882-1444 during regular business hours and one of our kind and friendly personal shoppers will help you navigate through our website, help conduct advanced searches, help you choose the item you are looking for with the specifications you are seeking, read you the specifications of any item and consult with you about the products themselves. There is no charge for the help of this personal shopper for any American with a disability. Finally, your personal shopper will explain our Privacy Policy and Terms of Service, and help you place an order if you so desire. |
Q:
Add multiple suffix in s3 event notification from console
I need event notification when files with multiple extensions like .log, .txt, etc has been added to AWS s3 bucket. Can we add multiple suffix in s3 event notification from console ?
A:
You can create an Event in the Amazon S3 console, which can then trigger a Lambda function or send a message via SNS or SQS.
This configuration accepts a prefix (effectively a directory) and a suffix (eg .jpg).
Simply open the bucket, go to the Properties tab and click Events (down the bottom).
See: Configuring Amazon S3 Event Notifications - Amazon Simple Storage Service
You can create multiple Events, each of which has a different suffix. But you can't create one Event with multiple suffixes. An alternative is to create an Event for any suffix (any file type), and have the Lambda function examine the filename and exit if it has an uninteresting suffix.
|
Characteristics of degraded cellulose obtained from steam-exploded wheat straw.
The isolation of cellulose from wheat straw was studied using a two-stage process based on steam explosion pre-treatment followed by alkaline peroxide post-treatment. Straw was steamed at 200 degrees C, 15 bar for 10 and 33 min, and 220 degrees C, 22 bar for 3, 5 and 8 min with a solid to liquid ratio of 2:1 (w/w) and 220 degrees C, 22 bar for 5 min with a solid to liquid ratio of 10:1, respectively. The steamed straw was washed with hot water to yield a solution rich in hemicelluloses-derived mono- and oligosaccharides and gave 61.3%, 60.2%, 66.2%, 63.1%, 60.3% and 61.3% of the straw residue, respectively. The washed fibre was delignified and bleached by 2% H2O2 at 50 degrees C for 5 h under pH 11.5, which yielded 34.9%, 32.6%, 40.0%, 36.9%, 30.9% and 36.1% (% dry wheat straw) of the cellulose preparation, respectively. The optimum cellulose yield (40.0%) was obtained when the steam explosion pre-treatment was performed at 220 degrees C, 22 bar for 3 min with a solid to liquid ratio of 2:1, in which the cellulose fraction obtained had a viscosity average degree of polymerisation of 587 and contained 14.6% hemicelluloses and 1.2% klason lignin. The steam explosion pre-treatment led to a significant loss in hemicelluloses and alkaline peroxide post-treatment resulted in substantial dissolution of lignin and an increase in cellulose crystallinity. The six isolated cellulose samples were further characterised by FT-IR and 13C-CP/MAS NMR spectroscopy and thermal analysis. |
Q:
Least quadratic residue and nonresidue
For a prime $p$ denote by $r(p)$ (resp. $n(p)$) the smallest prime $q$ which is a quadratic residue (resp. nonresidue) modulo $p$.
It was shown by Linnik that for any fixed $\epsilon>0$ the number of $p<x$ s.t.
$n(p)>p^\epsilon$ is bounded by $c(\epsilon)\log\log x$.
My question is what is the best known bound today and what is the best known corresponding bound for $r(p)$.
Edit: I mean a bound on the number of exceptions to Vinogradov's conjectures, i.e. $n(p),r(p)>p^\epsilon$.
A:
There is the following result of Wolke from $1967$ (which is perhaps not the best, but quite good).
Theorem: Let $p$ be an odd prime, and $L(s,\chi)$ the $L$-series for the Dirichlet
character $(n/p)$. If $t(p)$ is a positive function with $L(1,\chi)>t(p)/\log(p)$, then there are absolute constants $c_1,c_2>0$ with
$$
r(p)\le c_1 p^{c_2/\sqrt{t(p)}}.
$$
Here one should mention the result of Elliott: if we have for an integer $k\ge 0$ and real $c>0$
$$
L(1,\chi)\ge \frac{c(\log \log p)^k}{\log p},
$$
then for every $\epsilon >0$ we have $r(p)\le c(\epsilon)p^{1/4(1+\epsilon)(k+2)^{-1}}$.
For $n(p)$ see the the report of Terence Tao, and http://www.math.ubc.ca/~gerg/teaching/613-Winter2011/LeastQuadraticNonResidue.pdf.
|
.theme-dark .show-loading .circle {
border-color: #444 #777;
box-shadow: 0 0 5px #444 inset, 0 0 5px #777;
}
.theme-dark .header .submenu {
background: #282828;
}
.theme-dark body {
background: #222;
color: #999;
}
.theme-dark .header h1 {
color: rgba(255,255,255,0.3);
}
.theme-dark .header .icon {
background: rgba(255,255,255,0.04);
color: rgba(255,255,255,0.2);
}
.theme-dark .pages-container .page {
background: #222;
}
.theme-dark .pages-container .pagebd-container {
background: #111;
}
.theme-dark a,
.theme-dark .article-comments .author,
.theme-dark .page-home .bd .comments {
color: #69c;
}
.theme-dark .page-home .bd li {
border-bottom: 1px solid rgba(255,255,255,.07);
}
.theme-dark .page-home .bd .comments {
background: rgba(255,255,255,0.031);
}
.theme-dark .header a {
color: #888;
}
.theme-dark .article-meta h3,
.theme-dark .page-home .bd h3 {
color: #aaa;
}
.theme-dark .page-home .bd .points {
background: rgba(255,255,255,0.031);
}
.theme-dark .page-home .bd a {
color: #777;
}
.theme-dark .page-article-content .article-content {
background: rgba(255,255,255,0.05);
}
.theme-dark .article-comments {
background: rgba(255,255,255,0.05);
}
.theme-dark .article-comments li {
border-top: 1px solid rgba(255,255,255,0.05);
}
.theme-dark .article-comments ul ul {
border-left: 15px solid rgba(255,255,255,0.03);
}
.theme-dark .article-comments ul ul ul{
border-color: rgba(255,255,255,0.05);
}
.theme-dark .article-comments ul ul ul ul {
border-color: rgba(255,255,255,0.07);
}
.theme-dark .article-comments ul ul ul ul ul {
border-color: rgba(255,255,255,0.09);
}
.theme-dark .article-comments .op .text {
background: #69c;
color: #fff;
} |
//
// Generated by class-dump 3.5 (64 bit).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2013 by Steve Nygard.
//
#import <OfficeImport/OADFill.h>
__attribute__((visibility("hidden")))
@interface OADGroupFill : OADFill
{
}
+ (id)defaultProperties;
- (void)setParent:(id)arg1;
- (void)setStyleColor:(id)arg1;
- (id)initWithDefaults;
- (id)copyWithZone:(struct _NSZone *)arg1;
@end
|
The post-synodal apostolic exhortation Amoris Laetitia (The Joy of Love) was published one year ago on the Solemnity of St. Joseph. Since then, two competing interpretations, or, rather, pastoral applications of Chapter 8 (on divorce, remarriage and the sacraments) have emerged. They are epitomized in two sets of diocesan guidelines, each of which is meant to apply the teaching of the document to respective dioceses.
The first, entitled, “Pastoral Guidelines for Implementing Amoris Laetitia,” was published by the Archdiocese of Philadelphia (hereafter Philadelphia) in July 2016. The second, entitled, “Criteria for the Application of Chapter VIII of Amoris Laetitia,” was published by the archbishop of Malta (hereafter Malta) and his assistant bishop in the neighboring Diocese of Gozo.
Both address the disputed question of whether married persons living in sexually active second unions while their first spouses still live, who have not received a public judgment from the Church declaring the invalidity of the first marriage, may return to the holy Eucharist without resolving to live sexually continent with the second partner (hereafter disputed question). The two guidelines offer opposing answers.
This essay compares and contrasts the two replies. (Philadelphia also offers guidelines on the questions of cohabitation before marriage and pastoral care for persons with same-sex attraction. But this essay only considers the disputed question.) It ends with advice for Catholics who feel confused over the disharmony between the bishops’ pastoral directions.
To orient readers, Malta is a small Mediterranean island 50 miles south of Sicily, with around 380,000 Catholics (out of a total population of 420,000) and 600 priests. Christianity there dates back to St. Paul, who, finding himself shipwrecked on the island on his way to Rome, spent three months ministering to the Maltese (see Acts 28). Catholicism today is the official religion, and Malta’s most famous inhabitants historically are the knights who took the island’s name.
Thirteen miles to the west lies the Diocese of Gozo, with 28,000 Catholics and 169 priests. Archbishop Charles Scicluna of Malta was appointed auxiliary by Pope Benedict in 2012 and made archbishop of Malta by Pope Francis in 2015. Gozo’s bishop, Mario Grech, was appointed by St. John Paul II in 2006. Archbishop Scicluna and Bishop Grech are Malta’s only signatories.
Philadelphia and Malta
Both applications of Amoris Laetitia acknowledge the pastoral challenges of persons living in second unions. And both state that their respective guidelines are meant to assist pastors to accompany such persons. Accompany them where?
To answer, we might look at the direction each points to as it prepares to answer the disputed question.
Philadelphia points to truth and fidelity to the Church’s moral teaching. It says accompaniment must take the route of the Gospel, which is always a way of “truth and charity.”
Accompaniment should assist persons to know the truth that will make them free (John 8:32) and must solicitously avoid the dual errors of relativism, which “ignores the truth,” and rigorism, which “lacks mercy.” And the guidelines promise to “faithfully reflect Catholic belief.”
Malta points to what it refers to as the “new routes” that accompaniment should open up for estranged members. It likens remarried divorcees to the three Magi, “who took a different route home after meeting Jesus” (see Matthew 2:12). It says divorcees might have to take a “different route” back to the Church and says God is “able to open up new routes for these persons.” Malta insists its guidelines are “in line with the directions given by Pope Francis.”
Points of Agreement
The two agree on a number of preliminary points. Both acknowledge that the first unions of these persons may in fact not have been valid sacramental marriages; and both admonish those with reasonable doubts to seek the counsel of a marriage tribunal to help to resolve the question.
Both recognize that those who are unable to receive annulments may feel estranged from the Church and alone in their faith journeys. Both say the Catholic community should welcome them and help them feel part of the Church, encourage them to pray with the community, and incorporate them into some parish activities. Both enjoin a process of discernment — Philadelphia, in order to help them “come to an awareness of their situation before God”; Malta, in order to help them become aware “of their life situation in the light of Jesus.”
Examination of Conscience
Because Amoris Laetitia spends considerable time on the notion of conscience, both Philadelphia and Malta quote the following paragraph on elements of an examination:
“Useful in this process is an examination of conscience through moments of reflection and penance. The divorced and remarried should ask themselves: how they have acted toward their children when the conjugal union entered into crisis; if they made attempts at reconciliation; what has become of the abandoned party; what consequences does the new relationship have on the rest of the family and the community of the faithful; and what example is being set for young people who are preparing for marriage” (300).
Philadelphia immediately adds that the pastoral work of discernment aims at finding the truth so as to guide all decision-making in accordance with it. Malta, on the other hand, enters a discussion of the problem of diminished responsibility in evil doing, reflecting on factors that can mitigate free choice. Malta then quotes the curious passage from Amoris Laetitia, 301:
“It can no longer simply be said that all those in any ‘irregular’ situation are living in a state of mortal sin and are deprived of sanctifying grace.”
I say curious because, to my knowledge, the Catholic Church has never said, neither in her theology nor official pastoral practice, “simply” that all those in second unions are living in a state of mortal sin and deprived of sanctifying grace.
Moral theology has always insisted that mortal sin occurs when and only when grave matter is chosen with sufficient reflection and full consent of the will.
Malta’s discussion of mitigating factors obscures the fact that even if a person chooses some object of grave matter — in the case at hand, adultery — with mitigated culpability, the actions are still harmful to them and bad for the unity of the Church.
Disputed Question
Both then turn to the disputed question of the relationship of the divorced and civilly remarried to the sacraments.
Philadelphia says that in order to bear perspicuous witness to the true nature of the Eucharist and of the Church, the following norms must be upheld.
To receive holy Communion, one must not be aware of any unconfessed serious sin.
If one is aware of such sin, one must confess it with a firm purpose of amendment.
It follows that to receive holy Communion, remarried divorcees must confess extramarital sexual intimacy, if such intimacy has taken place, and firmly resolve to live in perfect continence (refraining from any and all sexual acts).
Some who do this might continue to cohabit for the sake of their children.
To avoid scandal, pastors who administer the sacraments to these couples must be solicitous to avoid giving the impression they support divorce and remarriage, or that Church teaching on this issue may be set aside.
For the same reason, continent remarried divorcees should not be given certain important public duties in the parish (e.g., membership on parish council), including liturgical duties (e.g., lector, extraordinary minister of holy Communion).
Malta says something quite different. It asserts that some remarried divorcees may be capable of practicing the virtue of conjugal continence without “putting at risk” elements of their life together. For others, however, living “this ideal” may be “humanly impossible and gives rise to greater harm” (reference to AL, Note 329). Such persons should undertake a process of discernment that includes humility, a love for the Church and a sincere desire for God’s will.
Malta then says that if such discernment leads these people to the belief that they are “at peace with God,” then pastors may not exclude them from the sacrament of the Eucharist. Such persons should be considered for various public duties within the parish, including within “the liturgical, pastoral, educational and institutional frameworks.” They also should be considered “suitable to be godparents.”
Navigating Opposing Interpretations
After the final report of the Synod on the Family was published 16 months ago, I wrote in these pages the following:
If the “way of accompaniment and discernment” is approved, both the progressive and the traditional interpretations would be officially sanctioned. But since the progressive interpretation is in clear opposition to the unambiguous teaching of the Church, repeated continually by the hierarchy in the past four decades, its authorization would badly undermine the Church’s evangelical credibility.
This is exactly what we see in the conflicting interpretations of Philadelphia and Malta. Chapter 8 of Amoris Laetitia lends itself to two opposing interpretations, one of which is fully consistent with the settled and perennial position of the Catholic Church and the teachings of John Paul II and Benedict XVI; the other of which is not. The Church now faces a crisis of doctrinal and evangelical credibility.
And it also faces a crisis of trust among its own faithful members who endeavor to know what’s right and good to do. How can Malta’s interpretation be excluded if it is apparently consistent with papal teaching? This is a good and urgent question that every faithful pastor should be ready to answer.
The norm for Catholic belief and practice is the deposit of faith, the revealed word of God made manifest in the life and teachings of Jesus Christ. That deposit was and is committed to the Church as a kind of sacred trust to be guarded and handed on until Jesus comes again.
The deposit is made known not only in the writings of sacred Scripture but in the definitive teachings of ecumenical councils, the infallible proclamations of popes (which Amoris Laetitia does not constitute, as Pope Francis makes clear in Paragraph No. 3) and in the prayer and worship of the Church’s sacred liturgy.
The singular purpose of ordinary papal teaching (which Amoris Laetitia does constitute) is to assist both those within and outside the Church to understand, receive and live more fully and fruitfully the truths of the deposit of faith. If some text in ordinary magisterial teaching lends itself to a conclusion that seems inconsistent with some truth or truths of that sacred deposit, then the conclusion cannot be legitimately taken to be a licit interpretation of that text.
I have argued elsewhere that the divinely revealed doctrines of the intrinsic wrongfulness of adultery and the absolute indissolubility of Christian marriage cannot both be true and at the same time it be true that anyone — including a civilly-remarried divorcee — who is sexually active with someone other than his or her valid spouse while that spouse still lives is not objectively committing adultery.
Malta prescribes that if these people believe they are “at peace with God” (i.e., not committing adultery), that belief, held sincerely and humbly, is a sufficient basis for the Church’s pastors to sanction their return to the sacraments.
This is an egregious pastoral error.
Their belief may suggest they are invincibly ignorant of the objective wrongness of their actions and so not guilty of mortal sin, and if not guilty of mortal sin then not guilty of sacrilege when they receive the holy Eucharist. But this does not imply that pastors may free such persons to receive the holy Eucharist.
Why? Because pastors cannot know that these persons are free from mortal guilt.
As Pope Francis insists, pastors should not be judging sinners’ souls at all. No one can know with certitude the state of another’s soul. Thus, they should focus their energy on helping these people to come to know the truth that will set them free.
To be sure, a blunt assertion of the Church’s exclusionary teaching is unlikely to help many people. But the assertion that they are in full communion with Jesus and his Church and so free to return to the sacraments without reforming their lives is far worse.
So what should pastors do?
Mater et Magister
They should always at once be mater et magister (mother and teacher). As magister they should form consciences. To form consciences they must teach the truth on the indissolubility of marriage and the wrongfulness of adultery. A spurious compassion that hides the truth from those who need it the most is contrary to the true care that a spiritual shepherd should give his flock (cf Jeremiah 23:1-4).
Pastors should simultaneously be mater. Mothers respect their children and neither overestimate nor underestimate them. A pastor should not act as if the ordering of their lives in the light of the Gospel is an easy thing, as if it poses no great obstacles. He should help them identify the obstacles. He should especially address frankly and sensitively the challenge of living sexually continent with their second partners.
But he shouldn’t underestimate them either. God’s grace can assist them to do what may be impossible by natural strength unaided by grace.
Our pastoral approach, even in the most difficult circumstances, must never fail to insist that because of the death, resurrection and ascension of Jesus, we live in a grace-filled universe, where it is possible for men and women to respond to the high call of Jesus to “follow me” (Matthew 4:19).
Mothers also morally support their children. Pastors shouldn’t inform consciences only. They also should help people to follow their consciences. People in second unions, especially if they have children from the second union, may see no way out. Pastors should help them to see a way out. Offer them hope: Good mothers always offer hope. Help them see that a morally ordered life — not an easy life, but an ordered and upright life — is good and possible: “You can do this.”
And help them see how faithfully responding to the difficult teachings of Jesus on marriage and sexuality is essential for the spiritual well-being not only of themselves, but of their children. Parents who forgo sexual intimacy out of faithfulness to Jesus’ teaching are luminous witnesses to the purity of the Gospel and the integrity of the Church’s teaching.
But the credibility of the Gospel and the Church is jeopardized by those who treat the teachings of Jesus as if they are “humanly impossible.” Jesus’ message on marriage and chastity is a merciful message. It is not bad news; it is Good News.
Moreover, sanctioning the reception of the holy Eucharist while they are still in a situation of objective serious and public wrongdoing is an occasion for scandal. By authorizing their return to the sacraments, the pastors themselves would be occasioning scandal among the faithful and so placing the souls of their parishioners in peril. They also risk giving the impression that the Church’s irreformable teachings on the indissolubility of marriage and the requisites for chastity may be set aside.
This the Church must never do, but especially at the present time, when the truths about marriage and sexuality urgently need to be perspicuously articulated and persuasively defended. Every possible counter-witness to this articulation and defense must be avoided.
Malta’s notion of discernment is flawed. It suggests that true spiritual discernment might lead these persons to conclude that their lifestyle is licit and so they are free to return to the sacraments. But because Jesus never wills us to adopt morally illicit alternatives, discernment, properly speaking, only ever concerns the question of which among a number of morally licit alternatives Jesus wants us to adopt.
So the question of whether or not remarried divorcees should return to the sacraments without ceasing their nonmarital sexual activity is not a matter to be discerned. It is a matter of a straightforward moral judgment that the alternative under consideration is incompatible with the good of marriage and the dignity of the sacrament.
Catholic teaching holds that no one who is sexually active with someone other than his or her living valid spouse may without confessing the activity and resolving to live chastely receive the holy Eucharist. This is not a teaching for the few, for the perfect. It is for every Christian. The fact that some who approach the sacrament under such circumstances are — because of invincible ignorance — in good faith does not justify Catholic pastors in telling those same persons that they are free to approach the holy Sacrament. As Philadelphia states (quoting Amoris Laetitia): “Discernment can never prescind from the Gospel demands of truth and clarity as proposed by the Church.”
In my opinion, Philadelphia’s guidelines beautifully fulfill the aims of applying Chapter 8 to the concrete circumstances of Catholics who are divorced and civilly remarried in a way that respects truth, expresses charity and remains faithful to the Gospel and the Church’s moral teaching. Its guidelines will help pastors accompany married couples to salutary Christian solutions in the face of marital crises, and do so in a way that guards the spiritual well-being of those being accompanied, their children and the rest of the Christian community.
Philadelphia offers no assembly-line solution. Its guidelines won’t undo overnight the seemingly intractable problems that have arisen over nearly seven decades of largely failed ministry to families.
Each couple, indeed each person in marital crisis, needs to be cared for according to what is spiritually best for him and for her. Among the possible alternatives for responding to the present crisis, Philadelphia offers a good and faithful Christian guide. Malta does not: Its guidelines will leave Catholics stuck in disorderly lifestyles, encourage them to receive holy Communion when they are not spiritually prepared, compromise the Church’s witness to the integrity of Christian marriage and Catholic sexual teaching, and incentivize divorce and “remarriage” for other vulnerable couples who are struggling in troubled marriages.
Pray for the unity of the episcopate.
E. Christian Brugger is professor and dean
in the school of philosophy and theology
at The University of Notre Dame in Sydney, Australia. |
News, views and top stories in your inbox. Don't miss our must-read newsletter Sign up Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
A sickening attack on a taxi driver was filmed by laughing passers-by as he was beaten in the cab of his car, in a video later shared on social media.
Derby taxi driver Shahid Iqbal was bitten and punched in the "horrific" and "brutal" ordeal which allegedly stemmed from a woman refusing to pay her taxi fare.
He said the woman was drunk and had tried to take control of the wheel before he dropped her at an address in Normanton, which is where he was attacked by her and another man, reported the Derby Telegraph .
Mr Iqbal, 50, who works as a freelance driver for National Cars said part of the sickening incident was filmed by bystanders and put on social media.
(Image: Facebook / STR8 OUTTA Normanton)
He said: "There was a man and a woman who I picked up and I was taking them to an address in Normanton but I wish I had not. It was a horrific journey.
"On the way, the woman put her feet on the dashboard, I politely asked her why and if she could put them down.
"She didn't like that and then told me they did not have any money for the fare. Despite this, I took her to a cash point and asked her to get some money out.
"But, without going to it, she said it didn't work.
"The man told her to pay me but she said she did not have money.
"I carried on driving but then she suddenly lunged across me and tried to take the steering wheel. She said she wanted to drive and she was pushing me."
Mr Iqbal, who has been a taxi driver for 10 years, said that was when the early-hours journey turned nasty.
He added: "The woman then started to demand money from me. She said, 'give me £80 for my children'.
(Image: Facebook / STR8 OUTTA Normanton)
"It was crazy," he continued. "I said just pay me and go. She then just lunged at me and started to hit me.
"She grabbed my phone and started to bite it. I then phoned 999 and told them what was happening.
"She then went for me again and bit my arm. She was then pushing me and forced me out of the taxi and into the street.
"I tried to stop her but then the man with her started to get angry. He kept shouting, 'why are you pushing her'.
"She then hit me twice quite hard. He followed that with two really hard punches which were brutal. I fell to the floor and I was in agony."
Throughout this, a bystander recorded the incident on video, but Mr Iqbal said he did not try and help.
Mr Iqbal said the woman then tried to throw a wheelie bin at his head. He added: "I made another 999 call and then, shortly after, the police attended. The man and woman ran away.
"What I went through was horrific and totally unjustified. I work very hard and I do not deserve these things to happen. It was terrible.
"I cannot understand why anybody would do that. Thankfully I was OK but it could have been much worse.
"I was gutted when I saw it on social media. Nobody came to help me that night. I was attacked on my own and I remember there being a group of people there and somebody recording it.
"I have since seen the video online and I think it's a total disgrace that somebody has done this."
A spokesman for Derbyshire police said a 23-year-old woman had been arrested in connection with the incident. |
Ectopic hamartomatous thymoma: a case report with immunohistochemical study and review of the literature.
Ectopic hamartomatous thymoma (EHT) is a rare benign tumor. We present a case of EHT, which was seen as subcutaneous mass on the left supraclavicular area in a 19-year-old man. The tumor consisted of spindle cells, epithelial cells, adipose cells, and a small amount of lymphocytes, as described previously. Immunohistochemically, spindle cells were positive for keratin, a-smooth muscle actin, CD34 and vimentin, but negative for desmin and S-100 protein. Lymphocytes were positive for CD45RO but negative for CD20, CD1a, and CD99. Approximately, 5% of cells were positive for MIB-1 and no cells stained for p53 and bcl-2. Recognition of EHT is important and needs to be differentiated from high-grade sarcomas such as synovial sarcoma or glandular malignant peripheral nerve sheath tumor. |
Q:
Is Hosea 6:1-3 a quotation?
Many translations wrap Hosea 6:1-3 in quotation marks. For instance, in the NJPS:
“Come, let us turn back to the Lord:
He attacked, and He can heal us;
He wounded, and He can bind us up.
In two days He will make us whole again;
On the third day He will raise us up,
And we shall be whole by His favor.
Let us pursue obedience to the Lord,
And we shall become obedient.
His appearance is as sure as daybreak,
And He will come to us like rain,
Like latter rain that refreshes the earth.”
But it isn't immediately clear who is doing the talking. Why is this portion rendered a quotation in many English translations?
It's not possible as a Christian to read this passage without seeing in it a prophesy about Jesus. For the purposes of this question, let's pretend that we are part of the original audience of the prophet and only look at what he understood himself to be saying. I've asked a separate question to cover the topic of prophesy.
A:
While other people have suggested that it is the prophet himself speaking - in which case the passage shouldn't be in quotes - it seems best to me to understand the speaker to be God quoting Ephraim and Judah after he has carried through with the things prophesied at the end of chapter 5. God speaking in verse 5:14 says:
For I will be like a lion to Ephraim,
like a great lion to Judah.
I will tear them to pieces and go away;
After that, he says, "in their misery they will earnestly seek me."
Then compare how verse 6:1 starts:
Come, let us return to the LORD.
He has torn us to pieces but he will heal us;
I understand, then, this section to be God explaining the words of contrition of Judah and Ephraim in that day of their misery in 5:15 when they again earnestly seek him. God then picks up again in verse 6:4 his ruminations over his dealings with the two nations in their current and corrupt state.
Note: I used the 2011 NIV because I think it shows better the link between 5:14 and 6:1. The NJPS uses the word "attacked" in the English for both verses which is less memorable.
|
New Feature Announcement! Introducing Max Quantities!
by Wufoo | October 9, 2015
Today we’re excited (can you tell – check out all the !!) to announce the official release of our latest feature, Max Quantities! This feature involved a lot of in depth work from the entire Wufoo team and touched nearly every nook and cranny of Wufoo itself. We’re super proud of the work and we’d love to share what Max Quantities can do for you.
Max Quantities is a new powerful feature that allows form owners the ability to limit the number of times a specific field choice can be selected. Where previously you could limit the number of times someone could fill out your form as a whole, now with Max Quantities form owners can limit and restrict the number of times your form users can select individual field choices. This is perfect if you have a max number of a certain item and want to make sure you don’t run out and have to inform disappointed customers you’re out of stock.
Max Quantities can be used for any number of circumstances and use cases where you have a certain limited number of items and want to make sure you don’t commit to more than you have on hand. Let’s say for example you’ve got your mitts on a limited run of t-shirts and want to offer them to your fans in a first-come, first-serve fashion. But you only have 10 smalls, 15 mediums, and 10 larges. And you want to make sure that if you’re out of a particular size, subsequent fans are unable to select the size that’s out of stock. Lucky for you, Wufoo and Max Quantities is here to save the day.
Within the Wufoo Form Builder for certain field types (Checkboxes, Multiple Choice, and Dropdown), you’ll find a new option named, coincidentally, Max Quantities. Choose this option and you’ll see a new option appear for all of your individual field choices. This field is where you’re specify how many times your form users can select that option before it is no longer selectable on your form. Put in a number for the max number of entries you’d like to receive for a specific field choice and then click Save.
And magically, when say your surprisingly tiny fan base has taken all of your small t-shirts, your Wufoo form will display the small t-shirt size as disabled and your future form users will no longer be able to select the option as part of their form submission.
Voila, Max Quantities! The possibilities for Max Quantities are endless; limited ticket sales, limited reservation time slots, any situation where you’ve got a limited inventory of items, time, seats, or passes, etc, and want to make sure you don’t overbook or oversell, Max Quantities is right there for you.
We’d love to hear how you’d use or are using Max Quantities. And of course, leave us your comments or feedback below.
This makes how we use Wufoo so much better! We’ve been using the forms to register people for volunteer teams at the church. The events that we need volunteers at usually require 4-10 teams, which meant creating 4-10 different forms to limit signups for each team. Thank you for adding this feature!
This is wonderful! Thank you so much!
My assumption is that the programming knows what the remaining quantity is based on the submissions/entries. Does that mean that when we have someone who registered twice for whatever reason, and we delete their duplicate entry, that the ‘remaining’ max quantity value will be updated as well?
Excellent! I’ve been needing this for a complicated form I use to sign up volunteers for different jobs. Now I can limit the number of slots open for each job and steer them toward the jobs still open. Can’t wait to use this feature!
I like the idea but it wont work on the majority of my forms where I use the choices to offer group bookings, is there a better way to offer group bookings options.
To data to capture information on booking for one two three or four people I use Multi choice and then hide show the form options for the extra names depending on the answer and price based on the How many people are you booking for answer.
This is great for setting max seats on parallel workshops in a conference.
It would be best if we could set the message text ( The word ‘remaining’) in the form itself, so I can insert a word my language, or make it dependent on de content (0 seats available, 5 T-shirts left). Alternatively, the word Remaining should be translated and used in the language that you have set in the Form Settings tab.
It would also be nice if you could work with availability but could hide it completely for your users. So when the maximum for an option is reached, that option would not be displayed anymore. I guess that now users may flock to 1 particular workshop if they see that everybody else is going there too, because of low availability.
It’s a great feature. It would be nice that can be limited by date as well. For example, I am using it for event registration. Different pricing will be expired on different dates. When the date is expired, that related price will be hidden from public. Thanks.
I second Jason’s request from above! I also have a pricing change for an early-bird registration rate, but my current work around is to shut the form down for an hour while I switch the price.
Otherwise, this is a great feature we’ll be using. I tried plugging it into a form that is already active and in use, but the # remaining doesn’t update based on entries already submitted. It looks like I will have to go in and manually subtract the # already registered from the max # for each category. A bit of a pain, but can do it! Also: I like the idea of keeping the maximum hidden so a popular option doesn’t get flooded just because it’s popular.
This feature is awesome! We have been needing this for recruitment of our training camps. We are getting more applications that we have spots.
One suggestion is to have the option in Form Rules that if a field goes over quantity, to display a field value to order/reserve/etc. a ‘back order’. This will help us track demand too and future opportunities.
Thanks for the new feature!
This would be great if we could get pricing to work with a number field. As it is now, we use multiple choice and the entries are: 1 – $12, 2 – $24… etc. If we could have a number field and set up the payment page at $12 x , that would solve many problems and enable us to use this new feature more often.
This is awesome. What would make this even better is an option for Quantities, lets say, using your example above, I want to order 2 small and 1 medium shirts, I’d have to make multiple entries. This might mean more work, but it’s totally worth it!
We sell tickets. We have a fixed number of seats available, people pay either an adult fare or a child fare, but ultimately the same number of seats are available regardless of which type of ticket they purchase. And people almost always buy more than a single seat in any individual purchase. I would love to be able to have a way to set max quantities on THAT. The current max quantities can’t help with that at all.
The one conundrum I have already encountered is that this functionality assumes the quantity to decrement is 1. hmcb mentioned above the best example of why this doesn’t really reflect a lot of real quantity situations with tickets. The decrementing is could be greater than 1 if someone wanted more than 1 of something.
The other issue I have seen already is that if someone’s payment is declined, the decrement still happens therefore creating a false count of the inventory.
Can you make this function apply to a single line text field as well? Say you only want so many more entries in that field to be completed (regardless of the content being a number or just text), then it decreases by one or two if their could be multi options set by the admin for each field? This would help me out enormously.
We’re excited that you all love this new feature add on and already have suggestions on how to make them better (hiding quantity messaging, allowing for deduction of multiple quantities, resupplying the quantity if payment is declined/failed). We’re looking to see what we should/can do next to make Max Quantities even better, so your feedback is super useful and helpful!
We have already used it and loved it, but we would really really really love
– a (total) number of max quantities eg. if people are claiming offers and we only want to give out100 offers in total but different types of offers within that 100 (30 of offer A, 40 of offer B, 20 of offer C and 10 of offer D) so we can track the running total
the option for quantities for people being able to select multiples of one option
Our Cookie Policy and Privacy Policy outline how we use cookies to help optimize service, personalize content, tailor and measure our marketing, and improve your user experience. I agree to use of cookies for these purposes. |
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<HEAD>
<TITLE>Controlling Frame Borders in Internet Explorer and Netscape</TITLE>
<link rel="stylesheet" type="text/css" href="../../ss/2.css" id="thecss">
<script type="text/javascript" src="../../scripts/csschange.js"></script>
</HEAD>
<BODY onload="readSS()">
<h1 align="center"><span class="pagetitle">Controlling Frame Borders</span><br>
<font size=2>= <span class="sitetitle">Index DOT Html</span> by <a href="../../misc/email.htm">Brian Wilson</a> =</font></h1>
<center>
<table border=3 cellpadding=5 cellspacing=0>
<tr>
<td><font size=2>
<a href="../index.html">Main Index</a> | <a href="../tagindex/a.htm">Element
Index</a> | <a href="../tree/htmltree.htm">Element Tree</a> |
<a href="../supportkey/a.htm">HTML Support History</a></font></td>
</tr>
<tr><td align=center><a href="#problem">The Problem</a> | <a href="#syntax">The New Syntax</a><br>
<a href="#compatibility">Cross-Compatibility Tips</a> | <a href="#examples">Examples</a></td></tr>
</table>
</center>
<br><br>
<center>
<table cellpadding=3 width="90%">
<tr><td colspan=2><hr size=1></td></tr>
<tr><td align=left colspan=2>
<big><b class="mainheading"><a name="problem">The Problem</a></b></big>
<hr width="30%" align=left size=1>
The rendering of the original frame syntax introduced in Netscape 2.0 produces
a border between adjoining frames of static thickness and appearance. The 3.0
versions of both Internet Explorer and Netscape sought to extend the original
syntax to allow control over these frame border appearance properties. One
problem existed with this - the syntax each browser chose is slightly different
from the other. Despite this incompatibility, it is possible to control these
properties so that the desired result can be achieved in BOTH browsers.
<br><br>
<big><b class="mainheading"><a name="syntax">The New Syntax</a></b></big>
<hr width="30%" align=left size=1>
<dl>
<dt>The following attributes are used for the FRAMESET element to control the border
characteristics of all frames in the set. The FRAMEBORDER attribute is also
usable with the FRAME element as well, where it controls the border around each
particular frame.
<dt><b class="subheading">FRAMEBORDER</b> - Common Attribute
<dd>This is a boolean (off/on) value controlling the display of the
border between frames. Netscape understands values of 'no'/'yes'
and '0'/'1'. Internet Explorer only understands '0'/'1'. Default value
in both browsers is to display a border ('yes' or '1'.)
<br>
<b class="alert2">NOTE:</b> If FRAMEBORDER is set to '0' in
Internet Explorer or Netscape and a positive FRAMESPACING or BORDER
is also set, a gap will be rendered in place of the typical
beveled-edge frame border.
<dt><b class="subheading">BORDER</b> - Common Attribute
<dd>This specifies an integer pixel value representing the thickness of the
space between frames.<br>
<b class="alert2">NOTE:</b> If BORDER=0 is used in Netscape,
it implicitly sets (overrides) FRAMEBORDER to 'no'/'0'.
<dt><b class="subheading">FRAMESPACING</b> - Internet Explorer Attribute
<dd>This also specifies an integer pixel value for the thickness of the
space between frames.
</dl>
<br>
<big><b class="mainheading"><a name="compatibility">Cross-compatibility Tips</a></b></big>
<hr width="30%" align=left size=1>
<ul>
<li>Use '0' and '1' as the value for FRAMEBORDER (not 'no' and 'yes')
<li>Use <em>BOTH</em> the BORDER and FRAMESPACING attributes
(with the same value) to control the frame border thickness.
<li>Explicitly set the FRAMEBORDER attribute (as well as the BORDER and
FRAMESPACING attributes) to '0' if no border is desired.
<li><b class="alert">NOTE:</b> Several people have <b class="magicword">reported
problems trying to achieve seamless content between frames in
Netscape</b> using only the attributes and methods described above -
It looks like the best solution is to add the Netscape-only attributes
MARGINHEIGHT and MARGINWIDTH to the BODY elements of your FRAME
sub-pages. Adding these attributes and setting them to zero should bring
your cross-frame content together and prevent discontinuity.
</ul>
<big><b class="mainheading"><a name="examples">Examples</a></b></big>
<hr width="30%" align=left size=1>
<dl>
<dt><b class="alert2">Example -</b> 5 pixel border between frames
<dd><div class="example"><<b class="tagname">frameset</b> <span class="tagattrib">cols</span>="50%,50%"
<span class="tagattrib">frameborder</span>="1" <span class="tagattrib">border</span>="5"
<span class="tagattrib">framespacing</span>="5"><br>
   <<b class="tagname">frame</b> <span class="tagattrib">name</span>="frame1"
<span class="tagattrib">src</span>="test.htm" /><br>
   <<b class="tagname">frame</b> <span class="tagattrib">name</span>="frame2"
<span class="tagattrib">src</span>="test.htm" /><br>
</<b class="tagname">frameset</b>></div>
</dl>
<dl>
<dt><b class="alert2">Example -</b> No borders between frames (borderless - 0 pixels)
<dd><div class="example"><<b class="tagname">frameset</b> <span class="tagattrib">cols</span>="50%,50%"
<span class="tagattrib">frameborder</span>="0" <span class="tagattrib">border</span>="0"
<span class="tagattrib">framespacing</span>="0"><br>
   <<b class="tagname">frame</b> <span class="tagattrib">name</span>="frame1"
<span class="tagattrib">src</span>="test.htm" /><br>
   <<b class="tagname">frame</b> <span class="tagattrib">name</span>="frame2"
<span class="tagattrib">src</span>="test.htm" /><br>
</<b class="tagname">frameset</b>></div>
</dl>
</td>
</tr>
<tr><td colspan=2><hr size=1></td></tr>
</table>
</center>
<br>
<a href="../../misc/copyright.htm">Boring Copyright Stuff...</a>
<br>
</BODY>
</HTML> |
About 2 in 3 Americans who regularly attend a Protestant church (67%) disagree with the statement: “Throughout many of my activities I don’t think about God,” with 40% strongly disagreeing.
Fewer (19%) agree or say they neither agree nor disagree (14%).
“A Christian has the opportunity to walk with God,” said Scott McConnell, executive director of LifeWay Research. “Most churchgoers affirm their thoughts are on God as they go about life’s activities.”
Women are more likely than men (45% to 33%) to strongly assert they’re thinking about God throughout their day.
Middle-aged churchgoers are more likely to say they think about God during many of their activities. Those age 35 to 49 (42%) and 50 to 64 (46%) are more likely to strongly affirm their constant thoughts of God than those 18 to 34 (33%) and those 65 and older (36%).
African American (55%) and Hispanic churchgoers (51%) are more likely to strongly assert they regularly think about God during the day than white churchgoers (33%) or churchgoers of other ethnicities (32%).
Black Protestants (58%) are more likely than evangelical Protestants (40%) or mainline Protestants (27%) to strongly disagree they don’t think about God throughout many of their activities.
Those who attend worship services at least weekly (41%) are more likely than those who attend less frequently (36%) to strongly disagree.
Intentional moments
Around 2 in 5 churchgoers (38%) say they set aside time for private worship, praise or thanksgiving to God every day.
Another 29% say they do so a few times a week, while 13% set aside the time once a week, 7% a few times a month, 4% once a month, and 9% rarely or never.
“Having an attitude of praise requires noticing who God is and what He is doing. This takes intentionality,” said McConnell. “Once we choose to observe His work, however, the thanks and worship come naturally.”
Female churchgoers (40%) are more likely than their male counterparts (36%) to say they set aside those moments every day.
African Americans (45%) and Hispanics (43%) are also more likely than whites (36%) or other ethnicities (31%) to have specific times for private worship, praise or thanksgiving every day.
Black Protestants (46%) and evangelical Protestants (40%) are more likely than mainline Protestants (29%) to say they have such times daily.
Those who attend church at least weekly (40%) are more likely than those who attend less frequently (33%) to have set aside times for private worship every day.
Impromptu moments
Around three-quarters of Protestant churchgoers (78%) agree they find themselves praying at the spur-of-the-moment throughout the day, with 44% strongly agreeing.
Few disagree (8%), while 14% neither agree nor disagree.
“Who we turn to when we have good or bad news says a lot about our relationships,” said McConnell. “If we immediately want to share life’s ups and downs with God and ask Him for help and guidance, that demonstrates we value our relationship with Him.”
Around half of women who regularly attend a Protestant church (49%) strongly agree they find themselves praying throughout the day, compared to 36% of male churchgoers.
Those who attend a worship service four times a month or more (46%) are more likely to strongly agree than those who attend less frequently (38%).
“Jesus opened the way for people to enter God’s presence through His death on the cross,” said McConnell. “As individuals respond to Christ’s call, they see Deuteronomy 4:29 fulfilled in their lives—when they seek God with all their soul, they will find Him.”
Methodology: The online survey of 2,500 Protestant churchgoers was conducted Jan. 14–29, 2019. Respondents were screened to include those who identified as Protestant or non-denominational and attend religious services at least once a month. Quotas and slight weights were used to balance gender, age, region, ethnicity, income and denominational affiliation. The completed sample is 2,500 surveys. The sample provides 95% confidence that the sampling error from the panel does not exceed plus or minus 2.0%. Margins of error are higher in sub-groups. |
Pages
Saturday, 16 May 2015
"Too many in Labour kidded themselves that the ghastly experiment of a core-vote strategy would pay off. Voters couldn’t be fooled. Ed bet the house that they had moved to the left when they had gone the other way. Labour managed to lose both the core Scottish and the Middle England vote." |
Anomalous behavior of gratings at skew incidence.
A new formula has been developed and verified to account for the location of possible anomalous behavior of a plane diffraction grating when illuminated at skew incidence as in the Grieg and Ferguson mounting. It is shown that for their mounting, in contrast to both Littrow and Ebert mountings, blaze angles can be chosen which eliminate possible anomalous behavior in the observed spectra. |
5150+
Mechanical and chemical purging compound. Works best with color and material changes when heavy carbon deposits are present. Cleans out barrels, nozzles, hot runners and heads of extruders from carbon remnants, deposits and incrustations. |
Send this page to someone via email
Alberta is making changes to help do-it-yourself brewers and wine makers, along with laying out more rules underpinning the pending legalization of cannabis.
The changes are in a bill introduced in the house by Justice Minister Kathleen Ganley.
The bill will allow businesses to be set up for customers to make their own beer and wine on site.
READ MORE: Calgary city council passes bylaw prohibiting marijuana consumption in public
On the cannabis front, the changes will make clear that private operators who set up cannabis outlets can’t use store names that suggest their product is tied to medical or therapeutic benefits, and can’t entice children.
Fines for breaking rules under the Gaming and Liquor Act will rise from $200,000 to $1 million.
Story continues below advertisement
Finance Minister Joe Ceci says they’re creating do-it-yourself wine and beer making outlets at the request of many Albertans, and says craft brewers aren’t worried this will cut their market share.
“When I brought it up to small brewers and small liquor manufacturers they haven’t expressed any concern. They see this as a complementary thing to their businesses,” Ceci told a news conference Monday. |
import React, { Component } from 'react';
import PropTypes from 'prop-types';
class Product extends Component {
handleClick = () => {
const { id, addToCart, removeFromCart, isInCart } = this.props;
if (isInCart) {
removeFromCart(id);
} else {
addToCart(id);
}
}
render() {
const { name, price, currency, image, isInCart } = this.props;
return (
<div className="product thumbnail">
<img src={image} alt="product" />
<div className="caption">
<h3>{name}</h3>
<div className="product__price">{price} {currency}</div>
<div className="product__button-wrap">
<button
className={isInCart ? 'btn btn-danger' : 'btn btn-primary'}
onClick={this.handleClick}
>
{isInCart ? 'Remove' : 'Add to cart'}
</button>
</div>
</div>
</div>
);
}
}
Product.propTypes = {
id: PropTypes.number.isRequired,
name: PropTypes.string.isRequired,
price: PropTypes.number,
currency: PropTypes.string,
image: PropTypes.string,
isInCart: PropTypes.bool.isRequired,
addToCart: PropTypes.func.isRequired,
removeFromCart: PropTypes.func.isRequired,
}
export default Product;
|
(Raleigh) – The North Carolina Division of Motor Vehicles is seeking applicants to operate a license plate agency (LPA) in northern Moore County.
The agency, located at 101 North Middleton Street in Robbins, is currently operated under a contract that will end following the selection of a new operator. The policy of the division is to open applications to operate a new or existing license plate agency at a point following the end of a contract or when a current contract is nearing expiration.
Completed applications must be returned to NCDMV no later than November 15, 2018. The applications (Form MVR-93 or Form MVR-93AA) are located on the Connect NCDOT website. Interested applicants may call 919-615-6053 with questions. |
Athos Schwantes
Athos Schwantes (born 13 February 1985) is a Brazilian fencer. At the 2012 Summer Olympics he competed in the Men's épée, but was defeated in the first round.
References
Category:Living people
Category:1985 births
Category:Brazilian male fencers
Category:Sportspeople from Curitiba
Category:Olympic fencers of Brazil
Category:Fencers at the 2012 Summer Olympics
Category:Fencers at the 2016 Summer Olympics
Category:South American Games bronze medalists for Brazil
Category:South American Games medalists in fencing
Category:Competitors at the 2010 South American Games |
It is just a few days away until the sixth annual Lucas Oil Late Model Nationals at the Knoxville Raceway. The first day of compeition is THursday with night one qualifying. Many of the familar names in late model racing will be in Knoxville this weekend including Billy Moyer, Brian Birkhoffer, and Jimmy Mars. Also, three very familar names from the NASCAR Sprint Cup Series are scheduled to compete as Tony Stewart, Ryan Newman, and Kenny Schrader will be in Knoxville this weekend. |
Q:
Expectation Value of the Absolute Value of an OU process after time t
I am running a simulation of an OU process. The process is defined such that the change in each time step is
$dx(t+dt)=-\theta.dt.x(t)+\sqrt{\kappa.dt}.(randn())$
where $\theta$ and $\kappa$ are parameters of the distribution and randn() signifies a random variable drawn from a normal distribution. I then generate a large number, n2, of points in this distribution and only sample the last n1 points. I do this so that $n1<<n2$ so that I can assume I am in the limit where an infinite amount of time has passed from the distribution started. In this limit the variance of all n2 points is $\frac{\kappa}{2\theta}$.
If I take the average of the mean of the n1 points over enough repeated loops I obviously get an average mean of zero. But if I take the average of the absolute value of the mean of the n1 points over many loops I get some non-zero value. I can see numerically that this quantity, lets call it x, is proportional to $\sqrt{k}$, inversely proportional to $\theta$ and inversely proportional to $\sqrt{dt}$. However I do not know how to show this analytically. Does anyone on here know how to show this?
So effectively I want to generate an OU process and then calculate the expectation value of the absolute value of this distribution after a certain length of time has passed.
Any help will be greatly appreciated
A:
You are using an Euler-Maruyama scheme to simulate the process
$$dX_t = -\theta X(t)dt + \sqrt{\kappa} dB_t,$$
where $B_t$ is a standard Brownian motion. The OU process has an explicit solution as an SDE, and its transition kernel can also be written down. At time $t$, it should be
$$p_t(x_0,y) = \frac{1}{\sqrt{\pi \kappa(1-e^{-2\theta t})/\theta}} \exp\left( -\frac{(y-x_0 e^{-\theta t})^2}{\kappa (1-e^{-2\theta t})/\theta} \right).$$
Your desired expectation at time $t$ is then
$$E[|X_t|] = \int_{-\infty}^\infty |y| p_t(x_0, y)dy,$$
which, assuming $x_0 = 0$, is the expectation of the absolute value of a normal random variable, also known as a half-normal distribution. The variance of this half-normal distribution would be $\sigma^2 = \kappa(1-e^{-2\theta t})/\theta$, and the integral works out to be
$$ E[|X_t|] = \sigma\sqrt{\frac{2}{\pi}} \propto \sqrt{\frac{\kappa}{\theta}}.$$
This would confirm your observation that the expectation varies proportionally to $\sqrt{\kappa}$, but not that it varies inversely with $\theta$. It is of course entirely possible I've gotten some calculation wrong and I urge you to check the calculations.
Finally, you should question your statement about scaling $dt$. Indeed the expectation should be insensitive to $dt$, so long as it is sufficiently small. Are you sure that you account for the fact that you need to take more steps to reach the same final time when $dt$ is scaled?
Also, note that when you are taking $n_2 > n_1$ steps, you are essentially sampling from a Gaussian, which is the stationary distribution of the Ornstein-Uhlenbeck process.
|
As for conventional metal bellows, for example, formed metal bellows, U shaped bellows with U shaped peaks and valleys are known (hereinafter, referred to as “Conventional Art 1”. See Patent Documents 1 and 2, for example).
As for formed metal bellows, a bellows in which an average wave-top direction and an average wave-bottom direction are each inclined in opposite directions relative to the axis in order to increase the amplitude of the axial elasticity of the bellows is proposed (hereinafter, referred to as “Conventional Art 2”. See Patent Document 3, for example).
Further, as for metal bellows, an accumulator that includes a metal bellows formed in a cylindrical shape and capable of axial extension and contraction, a movable plate fixed to one end of the bellows, and an annular sealing member fixed to the undersurface of the movable plate, in which the annular sealing member can be seated on and separated from an upper base wall of a stay, and when seated, seals a working fluid (also referred to as a backup fluid) in a space formed between the bellows and the stay to prevent excessive contraction deformation of the bellows, is known (hereinafter, referred to as “Conventional Art 3”. See Patent Document 4, for example). |
The Leon County Sheriff's Office released the security video Thursday from a Tallahassee, Fla.-area Publix that shows Florida State quarterback Jameis Winston leaving the store without paying for his crab legs and crawfish on April 29.
The Heisman winner was issued a civil citation of taking the food, valued at $32.72, without paying. Winston told sheriff's deputies at his residence that he forgot to pay for the food.
In the video, Winston is shown wearing a long-sleeve t-shirt, shorts and sandals, carrying the items out of the store. The video then flashes to a sheriff's deputy behind the customer service counter at the store who leaves the area behind the counter.
After he received the citation, Winston was subsequently suspended from Florida State's baseball team. Upon completing 20 hours of community service and paying back the amount owed for the three pounds of crab legs and a pound of crawfish, he was reinstated back to the team.
Since he completed the citation program, the incident will not show up on his criminal record.
- - - - - - -
Nick Bromberg is the assistant editor of Dr. Saturday on Yahoo Sports. Have a tip? Email him at nickbromberg@yahoo.com or follow him on Twitter! Follow @NickBromberg |
"We use the same forensic process of discovery and verification for Syria as we do for hoax videos," says Executive Editor David Clinch.
Since 2010, Storyful has worked with companies like The Wall Street Journal,The New York Times, ABC and others to make YouTube videos, tweets and cellphone snapshots a major part of the news cycle.
"When a story breaks, there is no shortage of content that exists," Clinch says, "but the problems are finding it in the first place [and,] most importantly, verifying that it's real."
When bombs went off at the Boston Marathon last April and early news reports surfaced on social media, it was Storyful's job to sift through the noise and help its clients deliver the news.
"For instance," Clinch says, "there was a video that everyone ended up using of a woman running down the street with a GoPro camera attached to her head."
To verify that that video was actually an eyewitness account, Storyful first had to find the source. It had been uploaded to a YouTube account, NekoAngel3Wolf, with no personal details, so Storyful workers searched Twitter to see who had been sharing the video. They found a user named NightNeko3, which they connected to a Pinterest account, which was linked to a Facebook account. Then they checked the name on the Facebook account against the list of marathon runners.
"We saw a person with the same [last] name who stopped her marathon run at exactly the point where that explosion was seen in the video," Clinch says.
Finally, they flipped through the phone book and called her up.
"[We] worked out that that was actually her in the video and that her daughter had uploaded that video," he says.
This type of digging is just one way Storyful vets amateur videos. Everything from the length of a shadow to a digital blemish can be used as a clue to determine whether something is actually what it claims to be. But Storyful also works with users to broker deals between people and news providers.
Jennifer Preston, a reporter for The New York Times' Lede Blog, says when the Times wants to post a video in its own player, "our practice would be to reach out to that person and to get permission and to pay them." But YouTube videos are a different story.
Viral videos can make big bucks on the Web — YouTube has a revenue-sharing system by which money from advertising is split between the uploader and the website. But as Andrew Springer, senior editor for social media at ABC News, points out, news outlets like his and the Times generally don't pay directly to embed YouTube videos.
"During the Boston bombings, when we were clearing videos and we were clearing photos that were tweeted or YouTubed or whatever, nobody came back to us and said, 'Yeah, you can use my video of the Boston bombing if you pay me X amount of dollars,' " Springer says.
There's an obvious upside to news groups being able to gather content free, but Clinch says he hopes to help change this "Wild West" attitude to what he calls a more ethical model, where people are paid for what they upload. He calls it a "win-win-win":
"The people who own the content get courtesy and part of the revenue; the platforms and the news organizations that want to use it know that they have permission to do that and also know that they can generate significant views and revenue themselves by adopting this model."
Storyful is acting as a third-party resource for mainstream news outlets around the world, but places like the BBC, Al-Jazeera and NPR have in-house teams that are doing many of the same things.
"Any news company that thinks that they can survive and thrive using only traditional news content is missing the point and is missing a huge element of what the future of news is," Clinch says.
And as the line between social and traditional media gets blurrier by the second, news organizations hope to keep the facts in focus.
Copyright 2013 NPR. To see more, visit http://www.npr.org/.
Transcript
AUDIE CORNISH, HOST:
More and more news organizations are finding and sourcing content through social media. Whether it's evidence of chemical attacks in Syria, the Boston bombing, or the fake-out video of an eagle snatching a baby, the problem for old-school news organizations is sorting out what's real and what's fake. And that's where a company called Storyful comes in.
NPR's Sami Yenigun reports.
SAMI YENIGUN, BYLINE: Whether it's an uprising in Egypt...
(SOUNDBITE OF CHANTING PROTESTERS)
YENIGUN: ...or a video of a fake twerking session gone awry...
(SOUNDBITE OF VIDEO)
UNIDENTIFIED WOMAN: Oh, my God.
YENIGUN: ...news outlets need to know everything they can about a video before they run with it, says Storyful's executive editor, David Clinch.
DAVID CLINCH: We use the same forensic process of discovery and verification for Syria as we do for hoax videos.
YENIGUN: Since 2010, Storyful has worked with companies like The Wall Street Journal, The New York Times, ABC and others to make YouTube videos, tweets, and cellphone snapshots a major part of the news cycle.
CLINCH: When a story breaks, there is no shortage of content that exists. But the problems are finding it in the first place but, most importantly, verifying that it's real.
YENIGUN: When bombs went off at the Boston Marathon last April, the earliest news reports surfaced on social media. Storyful's job was to sift through the noise to help their clients deliver the news.
CLINCH: For instance, there was a video that everyone ended up using of a woman running down a street with a GoPro camera attached to her head.
(SOUNDBITE OF EXPLOSION)
YENIGUN: Storyful started working to verify that this video was actually an eyewitness account. To do that, David Clinch says, they first needed to find the source.
CLINCH: It was uploaded with a username that really wasn't a real name.
YENIGUN: NekoAngel3Wolf, an account with no personal details, so Storyful searched Twitter to see who'd been sharing the video. They found a user named NightNeko3.
CLINCH: We were able to connect that user name to a Pinterest account that had a real name.
YENIGUN: From that social media profile, the name was linked to a Facebook account, and Storyful checked the list of marathon runners.
CLINCH: We saw a person with the same name who stopped her marathon run at exactly the point where that explosion was seen in the video.
YENIGUN: Then they flipped through the public phone book.
CLINCH: Rang her up and worked out that that was actually her in that video, and that her daughter had uploaded that video.
YENIGUN: This type of digging is just one way that Storyful vets amateur videos. Everything from the length of a shadow to a digital blemish can be used as a clue to determine if something is actually what it claims to be. But there's another reason Storyful reaches out to users, and that's to broker deals between people and news providers.
Jennifer Preston is a reporter for the Lede Blog at The New York Times. She says, when The Times wants to post a video to its player...
JENNIFER PRESTON: Our practice would be to reach out to that person and to get permission, and to pay them.
YENIGUN: But YouTube videos are a different story and viral videos can make big bucks on the Web. YouTube has a revenue sharing setup where money from advertising is split between the uploader and the website. But as Andrew Springer, senior editor for social media at ABC News, points out, news organizations like his and The Times generally don't pay to embed YouTube videos.
ANDREW SPRINGER: During the Boston bombing when we were clearing videos and we were clearing photos that were tweeted or YouTubed, or whatever, nobody came back to us and said: Yeah, you can use my video of the Boston bombing if you pay me X amount of dollars.
YENIGUN: There's an obvious upside to news groups being able to gather content for free. But David Clinch says he hopes to change this Wild West attitude to what he calls a more ethical model, where people are paid for what they upload. He calls it a win-win-win.
CLINCH: The people who own the content get courtesy and part of the revenue. The platforms and the news organizations that want to use it know that they have permission to do that, and also know that they can generate significant views and revenue themselves by adopting this model.
YENIGUN: Storyful is acting as a third party resource for mainstream news outlets around the world. But places like the BBC, Al-Jazeera, and NPR have in-house teams that are doing many of the same things.
CLINCH: Any news company that thinks they can survive and thrive using only traditional news content is missing the point and is missing a huge element of what the future of news is.
YENIGUN: And as the line between social and traditional media gets blurrier by the second, news organizations hope to keep the facts in focus. |
For Windows XP and Below
•click on the start button
•you will find a run button
•click on it
•enter "CMD" (obviously without quotes)
•a command prompt windows will appear
•enter "ipconfig /flushdns" in it (obviously without quotes)
windows vista and windows seven
•click on the start button
•you will find a text box called start search
•type "CMD" in it (obviously without quotes)
•right click the only result and select run as administrator
•a command prompt windows will appear
•enter "ipconfig /flushdns"in it (obviously without quotes)
Linux
•open a root terminal
•enter the following command "/etc/rc.d/init.d/nscd restart" (obviously without quotes)
Note: For Linux distros such as Ubuntu and fedora and similar distros, use sudo instead
Mac OSX 10.5.1 and below
•open a terminal window
•enter the following command
"lookupd -flushcache" (obviously without quotes)
Mac OSX Leopard and above
•open a terminal window
•enter the following command
"dscacheutil -flushcache" (obviously without quotes)
cybersa
I don't what is this?
Please Explain more for me.
Why to flush a DNS?
Need to Flush my DNS?
mahirh
cybersa wrote:
I don't what is this?
Please Explain more for me.
Why to flush a DNS?
Need to Flush my DNS?
your computer remembers (caches) dns queries in order to speed up connection to the same host-name at a later time but even though it is a good idea, sometimes negative or bad results (eg - host-names change ip addresses while in maintenance to a temporary server showing nothing) also get cached which is apparently bad. so we need to flush or clear this cache in order to maintain communication with the server
menino
For Linux, namely Centos 5.x distro, my ex colleague who used to be the linux administrator, where I work at, used to use a command #named stop and then #named start, and mostly he used to use the command #named restart, to restart the DNS service, which he said would flush the dns as well.
I dont know if the nscd command is the same or not, in linux.
cybersa
mahirh wrote:
cybersa wrote:
I don't what is this?
Please Explain more for me.
Why to flush a DNS?
Need to Flush my DNS?
your computer remembers (caches) dns queries in order to speed up connection to the same host-name at a later time but even though it is a good idea, sometimes negative or bad results (eg - host-names change ip addresses while in maintenance to a temporary server showing nothing) also get cached which is apparently bad. so we need to flush or clear this cache in order to maintain communication with the server
Thanks for your helpful information.
deanhills
Thanks for the great tip mahirh. I'd like to know what other tips you have to get rid of Internet files and History, without deleting those through Internet tools. Quite often when I use the standard Internet Tools to get rid of internet tools, it freezes up. Is there an easier way where you can get rid of the whole lot including cookies like your DNS flush tip?
k_s_baskar
thanks for useful tip. i really like it.
pioneer987
So, this will help me out of my situation?
I am trying to upload my new index.html file which is different from the one I had before on my host.
But after I upload it I refresh the page, but it stays the same.. :/
Peterssidan
pioneer987 wrote:
So, this will help me out of my situation?
I am trying to upload my new index.html file which is different from the one I had before on my host.
But after I upload it I refresh the page, but it stays the same.. :/
No that will not help. The DNS cache is used to lookup the IP of the server, so if you have changed server recently flushing the DNS cache could help. In your case it is probably the browser that cache pages which is something different a different kind of cache.
Marcuzzo
pioneer987 wrote:
So, this will help me out of my situation?
I am trying to upload my new index.html file which is different from the one I had before on my host.
But after I upload it I refresh the page, but it stays the same.. :/
the issue is that your browser keeps loading the cached version of the page instead of pulling in a new one. CTRL+F5 will do the trick
you can set up your browser to clear the cache every time the window is closed.
that way your browser doesn't load the cached page. |
Dennis Rogers: My own experience with the VA was all good
Former N&O columnist Dennis Rogers writes: Folks actually took the time to talk to me and to answer my many questions. From the moment I walked into the Wilmington VA facility, I was treated with dignity, compassion, efficiency and respect.
(Editor’s note: Former N&O columnist Dennis Rogers offers this column about a visit to the VA.)
I was ready to rumble.
No petty bureaucrat was going to push me around. I’d been reading the horror stories about Veterans Affairs, how the books were being cooked to make it appear the wait time for appointments was a matter of days rather than months and how all the while the brass was receiving bonuses for such perfidy.
Day after day, newspapers were reporting that people were dying before they could get in to see medical professionals. Whistleblowers inside the VA were being harassed.
Now it was my turn. I had waited patiently – sort of – for 17 weeks for an appointment at the Wilmington VA facility to have my hearing tested. This would be my first time in the VA health care system and I was, to put it mildly, suspicious and on guard.
It would be a piece of poetic outrage. My angry rhetoric might even get me the now-vacant state poet laureate job.
How it begins ...
I walked in the door at the VA at 7:15 a.m. for my 7:30 appointment. I strode purposely, as only a grumpy 71-year-old geezer with only one cup of coffee can, right up to the front desk and announced my rather obvious arrival to the young security guard.
He smiled.
Darn, didn’t expect that.
He asked for my VA identification card. OK, here we go with the bureaucratic runaround. I announced I didn’t have one, in the “what ’cha gonna make of that, pal?” tone of voice I had been rehearsing.
“Not a problem, sir,” he said and patiently walked me through the brief automated sign-in procedure.
“Have a nice day, sir, and thank you for your service. Someone will come for you in a few minutes,” he said.
This was not going as planned.
I sat down to wait at 7:25 a.m. I pulled out my trusty paperback and settled back to read for the hour or so I knew I would be waiting.
I got through one paragraph before yet another smiling person came to the nicely appointed waiting room to lead me down the hall. Wait time: one minute.
There, I was introduced to my primary health care team, headed by nurse practitioner Melinda Miller, registered nurse Priscilla Tears, licensed practical nurse Kelly Cline and medical support assistant Mesha Batts. They would be the folks taking care of me, unlike some private practices where you are shuffled around to whoever is available.
Dignity and respect
These folks actually took the time to talk to me and to answer my many questions. From the moment I walked in, I was treated with dignity, compassion, efficiency and respect. For the first time in 44 years, I was in the company of people who made me feel that my military service was important to them and to the country and I deserved the best they had to offer.
The follow-up experience has been just as delightful. I have emailed the team at least three times to ask rookie questions. Every email has been answered within hours with the information I needed. Every person I’ve talked to on the phone, in Wilmington or at the head office in Fayetteville, has been friendly, informed and efficient. Miller even took the time to call and patiently discuss a decision she’d made regarding my care.
When’s the last time your doctor called you?
Within a week of my visit, a large package of prescriptions was delivered. Medications, some of which cost upward of $140 for a one-month supply of one drug, would now cost $9 each. I have been approved for a hearing evaluation and, if needed, a hearing aid that will save me thousands more. And since the backlog at VA for hearing tests is more than 30 days, I will be able to go to the civilian doctor of my choice and the VA will pay for it.
Always the journalist, I like to think in-depth and hard-nosed reporting has made life better for the millions of veterans who depend on the VA for their health care. And truth be told, I don’t know if the superb care I have received so far is a direct result of the VA trying to burnish its image or is commonplace at the Wilmington facility.
But I do know this: I have never been treated better at a private, for-profit, medical practice than I was at the VA. There are reasons, I think: adding staff at a private practice to better take care of patients cuts into profits, so it is smart business to have the minimum staff needed to handle the patient load. Finding the optimum time that patients are willing to wait to be seen is a smart business decision.
The VA, at least from my limited experience, has been on the other end of the spectrum. At one point, I apologized for creating an even heavier workload for my medical team.
“Don’t apologize,” a team member said. “You’ve earned this, and we’re honored to help you.” |
Greater Philadelphia Expo Center
The Greater Philadelphia Expo Center at Oaks is an exhibition center located in Oaks, Pennsylvania, which is approximately northwest of King of Prussia via the Pottstown Expressway (U.S. Route 422). It has four adjoining exhibit halls, 15 meeting rooms, two small food courts, and a total area of over 240,000 square feet on one floor. It is among the largest suburban exposition centers on the East Coast of the United States.
References
External links
Category:Buildings and structures in Montgomery County, Pennsylvania
Category:Convention centers in Pennsylvania |
Fonsecaea pedrosoi: A rare cause of dental infection and maxillary osteomyelitis in a child with acute lymphoblastic leukemia.
Dental lesions are commonly seen in children with malignancy. We report a child with acute lymphoblastic leukemia who had black-brown dental lesion during the febrile neutropenic episode. Histopathological examination of dental lesion showed fungal hyphae and conidia. F. pedrosoi that was isolated from the tissue culture. The patient was treated with intravenous liposomal amphotericin B therapy for 5 weeks and he was discharged on oral voriconazole. On follow-up, clinical symptoms recovered. Although F. pedrosoi may be an unusual causative agent of dental infection and maxillary osteomyelitis, it should be considered in patient with black-brown lesions which do not respond to antibacterial treatment. |
import { NgModule } from '@angular/core';
import { CommonModule } from '@angular/common';
// import component
import { ChallengeCreateComponent } from './challenge-create.component';
// import module
import { ChallengeCreateRoutingModule } from './challenge-create-routing.module';
import { SharedModule } from '../../shared/shared.module';
@NgModule({
declarations: [ChallengeCreateComponent],
imports: [CommonModule, ChallengeCreateRoutingModule, SharedModule],
exports: [ChallengeCreateComponent],
})
export class ChallengeCreateModule {}
|
Q:
Agilent Power Supply Programming using GPIB
On looking at the examples provided in the documentation of the Power supply. The Programming has been done by adding two libraries AgilentRMLib and VisComLib in the C#. When
i try to add the AgilentRMLib by Selecting the Add Reference->Agilent VISA COM Resourse Manager 1.0, an error is shown at the reference.
I tried adding the agtRM.dll directly from the Program Files. Still the error persists. Has anyone faced this problem before? Any Solutions for this? Do you have any other method to program the Power Supply from PC using Agilent IO.
A:
I was able to use the VisaComLib(GlobMgr.dll) instead to program the GPIB using C# programming language.
The pdf file link!
was used as reference.
|
Transmission electron microscopy (TEM) provides ultrahigh resolution imaging of samples, surpassing the diffraction limit offered by optical microscopy. Due to the ultrahigh vacuum environment associated with TEM, the imaging of liquid samples or samples (e.g., nanoparticles or biological samples) suspended in a liquid (i.e., in situ liquid TEM) is not straightforward. In recent years, the development of in situ flow cells generally comprising a thin spacer sandwiched between two chips with thin (less than about 100 nanometer (nm)) silicon nitride membranes has led the field of in situ liquid TEM. The liquid sample is isolated from the ultrahigh vacuum environment by the spacer and is imaged through the silicon nitride membrane. Metallic contacts can be used to produce electrical biases across the liquid sample.
In situ liquid TEM imaging has found applications in a wide number of fields and has been used to study chemical and electrochemical processes, biological structures, and nanoparticle growth and dynamics, all at the nanoscale. However, due to the thickness and material properties of silicon nitride, some of the in situ flow cells suffer from decreased resolution and contrast, charging effects, and increased damage to the sample from electrons scattered by the silicon nitride. The low thermal conductivity of silicon nitride can also result in heating of the sample. |
Traditional orthotic devices are worn to support, stabilize or position a particular part of the body. Orthotic devices for stabilizing the hand, wrist, upper and lower arms, foot, ankle, upper and lower legs, torso and neck are known in the art. Unlike casts, orthotic devices are donned and removed by the user and may be worn throughout the day, only during specific activities, or when the user feels it necessary.
Orthotic devices typically include a rigid or semi-rigid support or splint member and a padded or cushioning inner liner. Orthotic liners may be secured to the support member by adhering the liner to the inside of the support member, sometimes during a thermoforming process. However, a liner permanently affixed to the support member is difficult to clean.
Finally, orthotic devices typically include a strap or other means of securing the orthotic to the body. Orthotic strapping has been accomplished with the use of a hook and loop strap riveted to the support member. The strap is then fed through a plastic chafe with a D-ring riveted through the opposing side of the support member. The strap is secured with sufficient tension to retain the orthotic device in position. Unfortunately, such strapping has many drawbacks. The strap tends to become dirty easily and the hook portion particularly tends to collect debris. But, because the strap is permanently fixed to the support member, it is very difficult to clean. Furthermore, after repeated use, the napping loop of the hook and loop material often loses shear strength. Finally, the hardware associated with the strapping adds weight to the orthotic and can chafe the wearer.
There is a need, therefore, for an orthotic device having an improved liner and means of securing to the wearer's body. |
module Chewy
class Query
module Nodes
class Regexp < Expr
FLAGS = %w[all anystring automaton complement empty intersection interval none].freeze
def initialize(name, regexp, *args)
@name = name.to_s
@regexp = regexp.respond_to?(:source) ? regexp.source : regexp.to_s
@options = args.extract_options!
return if args.blank? && @options[:flags].blank?
@options[:flags] = FLAGS & (args.present? ? args.flatten : @options[:flags]).map(&:to_s).map(&:downcase)
end
def __render__
body = if @options[:flags]
{value: @regexp, flags: @options[:flags].map(&:to_s).map(&:upcase).uniq.join('|')}
else
@regexp
end
filter = {@name => body}
if @options.key?(:cache)
filter[:_cache] = !!@options[:cache]
filter[:_cache_key] = if @options[:cache].is_a?(TrueClass) || @options[:cache].is_a?(FalseClass)
@regexp.underscore
else
@options[:cache]
end
end
{regexp: filter}
end
end
end
end
end
|
<?php
/**
* DO NOT EDIT THIS FILE!
*
* This file was automatically generated from external sources.
*
* Any manual change here will be lost the next time the SDK
* is updated. You've been warned!
*/
namespace DTS\eBaySDK\ReturnManagement\Enums;
class ReturnSortType
{
const C_BUYER_LOGIN_NAME = 'BuyerLoginName';
const C_ESTIMATED_AMOUNT = 'EstimatedAmount';
const C_FILING_DATE = 'FilingDate';
const C_REFUND_DUE_DATE = 'RefundDueDate';
}
|
Plans for another massive high-rise development in downtown Kitchener have been made public.
The former Huck glove factory at 120 Victoria Street South has been sold to a group of investors including Momentum Developments, The Zehr Group and Toronto-based private equity firm KingSett Capital for an undisclosed price.
The property’s new owners say they will redevelop the factory itself, while also adding on more commercial space and building a 23-storey condo tower.
All told, it will feature approximately 300 residential units, as well as 130,000 square feet of office space and 11,000 square feet of retail space over six floors.
In a press release, Momentum principal Brian Prudham said he expects the development to “transfor the west end of the Innovation District.”
Momentum is also working on One Hundred, a two-tower condo development on the same block, and the Charlie West tower elsewhere in downtown Kitchener. |
Introduction {#section1-2333794X19878062}
============
Prolonged sitting behavior and using screen devices are becoming exclusively observed and perceived as the inconspicuous norm in modern lifestyle. The digital world has also come to stay and is ever evolving with the availability of smartphones and tablets with at least 96% of families owning at least one TV set and 36% of children aged 8 years having one of these devices in their bedroom,^[@bibr1-2333794X19878062]^ and an access to a range of other digital devices that allow screen-related sedentary activities.^[@bibr2-2333794X19878062]^
Numerous studies have explored the predictors of children's screen time (ST) and the time spent in sedentary behavior with the concern that these behaviors may have a negative impact on their health.^[@bibr3-2333794X19878062],[@bibr4-2333794X19878062]^ Additionally, existing literature have established that overweight and obesity have been recognized as the fifth leading risk for global death causing 3.4 million deaths annually.^[@bibr5-2333794X19878062][@bibr6-2333794X19878062]-[@bibr7-2333794X19878062]^ Thus, the environment in which people live in and the amount of time they spend being physically inactive using these technologies has been blamed for the substantial increase of sedentary behavior.^[@bibr8-2333794X19878062]^ Nevertheless, other studies suggest that parents serve as both role models and gatekeepers for their children's screen behaviors and could be encouraged to teach healthy behavior^[@bibr9-2333794X19878062],[@bibr10-2333794X19878062]^; simultaneously, a quantitative study that investigates children's attitude to screen media suggests that parents with high ST are likely to influence the increase of their children's ST.^[@bibr11-2333794X19878062]^
School-based interventions have proposed ways to reduce prolonged sitting in children,^[@bibr12-2333794X19878062]^ while the home domain has received little or no attention^[@bibr13-2333794X19878062]^; thus, this article suggests that parents could play a role in facilitating and shaping appropriate screen use. Hence, interventions to reduce children's excess ST in a home environment is a clear research priority for addressing sedentary behavior. The overarching aim of this article is to examine children's ST behaviors in relation to physical inactivity in the home environment through parents' regulatory strategies. With a focus on examining parents' perceptions of their children's sedentary behavior, the study explores possible measures of interventions to help modify children's behavior within the domestic environment with a focus on ST.
The wide availability of technological devices such as televisions, smartphones, and tablets has made it easy for many households to increase the dosage of ST.^[@bibr14-2333794X19878062]^ Most researchers argue that sedentary behavior is distinct from a lack of physical activities (PAs).^[@bibr15-2333794X19878062],[@bibr16-2333794X19878062]^ A growing body of evidence demonstrates that even those who meet the national PA guidelines are at risk of premature mortality if they spend too much time sitting.^[@bibr17-2333794X19878062],[@bibr18-2333794X19878062]^ However, sedentary behavior is a complex phenomenon established to occur in a different context such as a home where the family setting could encourage screen behaviors, including TV viewing, using smartphones and tablets, and playing video games.^[@bibr19-2333794X19878062]^
Bandura's^[@bibr20-2333794X19878062]^ social cognitive theory advocates that learning and behavior occur by observation. Thus, the influencers in the home such as parents, siblings, and other members of the family play a central role in shaping children's attitude toward sedentary behavior. Yet, there is a dearth in research that examines attitude to the perception of parents on sedentary behavior within the home environment. There are concerns that the PA behavior of young people are remarkably decreasing and this has heightened the global childhood obesity crisis.^[@bibr21-2333794X19878062]^ With this decline in PA, it is imperative and a crucial timely issue given the current increased levels of children's ST.^[@bibr22-2333794X19878062]^ Thus, numerous studies have investigated the need for using the technology-related intervention to reduce the said behavior. For instance, Shin and Bhamra^[@bibr23-2333794X19878062]^ evaluated the concept of utilizing human-powered products to induce PAs at home, using an exercise bike to power the television. His study concluded that the financial gain of using human power as an alternative power source was inadequate and further emphasized that the potentiality of such intervention would be more lucrative when used as means to increase PA and reduce sedentary behavior in the home environment.^[@bibr24-2333794X19878062]^ Some studies have shown that even little time spent in light to moderate PA may increase health benefits.^[@bibr22-2333794X19878062],[@bibr25-2333794X19878062][@bibr26-2333794X19878062]-[@bibr27-2333794X19878062]^ However, there are limitations in the existing literature whereby very few studies have examined the role of parents in modeling habitual PAs or discouraging these screen-related behaviors. Thus, this study aims to answer the key research questions: Do children spend too much time engaging in screen-related activities? How concerned are parents with regard to children's ST? Last, what are the parents' level of awareness regarding the effects of uncontrolled/unlimited ST for children? This study provides nascent insight in tackling the sedentary behavior affected by the ST from parental views.
Methodology {#section2-2333794X19878062}
===========
To explore the parental perception of children's ST, a mixed method approach was utilized using 140 responses received from the questionnaire and 10 semistructured interviews with parents to examine children's routine behaviors across major screen platforms: TV, computer, tablets, and mobile phones (smartphones); and parents' ability to control this behavior. The target group in the study were parents with young children (between 5 and 10 years) and children in primary and secondary school age (between 11 and 16 years). A survey link was sent through emails and social media groups (Facebook, WhatsApp, and Twitter) to a collective of 500 parents. This contained brief information on the aim of the project prior to their completion of the questionnaire. For the interview, 10 parents were additionally recruited through the university's communication channels. The interview guide employed open-ended questions with probes on parents' concerns over the amount of children's ST, physical inactivity, and their general perception toward changing the trend in relation to screen use.
For the quantitative measures, the questionnaire result had a confidence level of 95% following a sample size of 140 respondents, and with UK population size of 66 million, the study provides a margin of error of 8%. The confidence level of 95% is the probability that our sample accurately reflects the attitudes of parents in the United Kingdom. The margin of error is the range that our population responses may deviate from the sample's range, and in this case, it is 8%.
Participant Recruitment Criteria and Ethical Approval {#section3-2333794X19878062}
-----------------------------------------------------
Questionnaire inclusion criteria were the following: parents of children between 5 and 16 years and this was informed due to current research on the aforementioned age group accumulating high ST and lack of inactivity as discussed in the introduction. Also, parents with children in the aforementioned age group are likely to experience child resistance against their control. The final criterion was the parents who had general concerns with regard to their children's ST due to the growing trends of digital culture.
This study received approval from the Joint Inter College Ethics Committee within Nottingham Trent University with a reference number JICEC-201617-52. The online questionnaire provided the consent information prior to the beginning of the questions. Therefore, participant consent was implied through questionnaire completion. Consent was obtained from participating interviewees.
Data Analysis Techniques {#section4-2333794X19878062}
------------------------
For the qualitative part of the study, semistructured interviews were conducted by one of the authors who had received prior training on conducting interviews. The interviews used a preset guide that highlighted insights to the challenges parents faced in controlling their children's ST. Some of the questions asked included the following: What general concerns do you have regarding your children's ST? Do you consider ST the reason your child/children are inactive? How easy do you find it in controlling your child's screen viewing? We know friends and siblings can influence; how would you describe this in your home?
Statistical testing was used to analyze the correlation coefficient (Spearman's ρ), which is a non-parametric testing used to measure the strength of association between the level of parent's concern and the children ST.
The following hypotheses were implemented:
1. **Hypothesis 1a:** There is a statistically significant positive relationship between children's ST during school days and parents' concern level.
2. **Hypothesis 1b:** There is a statistically significant positive relationship between children's ST during holidays and parents' concern level.
3. **Hypothesis 1c:** There is a statistically significant positive relationship between children's ST during weekends and parents' concern level.
Also, statistical analysis is used to test if the child/children consume food such as snack and beverages while watching TV or during on-screen activities.
Three hypotheses were tested:
1. **Hypothesis 2a:** There is a statistically significant positive relationship between children's ST during school days and their food and beverages consumption.
2. **Hypothesis 2b:** There is a statistically significant positive relationship between children's ST during holidays and their food and beverages consumption.
3. **Hypothesis 2c:** There is a statistically significant positive relationship between children's ST during weekends and their food and beverages consumption.
For the semistructured interviews, transcripts were thematically coded; this process entailed reading and rereading text to assign the codes to broad themes and most of this was predefined based on a general read through of the interview script and broad topics covered in the literature. Thus, this involved a more deductive approach.
Results {#section5-2333794X19878062}
=======
Distribution of the questionnaire to parents was carried out between February and August 2018. A total of 140 responses were received out of over 500 people who received the link to the questionnaire. Parents were assessed on some key aspects in relation to their children's ST, constructs like "access to screen devices," "social influence," "general screen behaviors," "estimated duration of screen use," and "most used screen device" among respondent's children; and parent's attitudes and how this is associated with their general concerns. Forty-nine percent of respondents were aged between 36 and 45 years, with 58% of them identifying as mothers. [Table 1](#table1-2333794X19878062){ref-type="table"} shows the demographic profile of the parents recruited for the questionnaire. Information on socioeconomic status was not requested due to the United Kingdom being a posterity society whereby income does not play a vital role in the affordability of basic household facilities such as TV and video game/mobile tablets for children.
######
Demographic Profile of Participants.

Demographics Percentage
--------------------- ------------
Gender
Female 58
Male 42
Total 100
**Age category**
25 to 35 years 29
36 to 45 years 49
45 years and older 22
Total 100
Parents reported behavior and household characteristics of their children and its association with excess ST. The questionnaire was ultimately designed to measure the awareness of parents with regard to the amount of time their child (or children) spend on screen irrespective of device, with sections covering the frequency of screen use, parental perception on recreational ST, mediation of parents, barriers in limiting screen usage, and understanding parental view over the level of children's PA.
Screen Viewing Time and the Role of Parents {#section6-2333794X19878062}
-------------------------------------------
Most parents expressed their concern over excessive ST. From [Figure 1](#fig1-2333794X19878062){ref-type="fig"}, the result from the questionnaire showed that more than half of the respondents (84%) are concerned that their children are spending a lot of time using screen devices and 76% of them reported that their children are inactive due to the said behavior.
{#fig1-2333794X19878062}
Twenty-three percent of parents reported that the major drivers of ST were an addiction. While the concern was similar across respondents, 57 of them estimated the ST of their children averaged more than 6 hours daily. Concerns about the availability of more than one screen device (12%) and lack of outdoor play facilities (10%) were also popular responses. For parents with older children, addiction (16%), screen obsession (10%), friends (13%), society, and social media influence (9%) were the most common concerns.
From our study, the sampled parents were unaware that these behaviors could have a multitude of long-term health implications for their children, mainly because they (parents) spend a substantial amount of time on these devices themselves.
Similarly, most interviewees expressed general concerns about how much time their children spent on ST; the following response was shared by P1:"Very concerned!! For all my children in fact, although my son is more inclined to read books, he still spends lots of time on his tablet and it concerns me. I try to stop them from using these devices because I notice that they lose focus by using these devices. Their general school performance has reduced at school, I need to be strict and vigilant although I still feel out of control most times. (P1)"
Most participants seemed to agree with P1's comment; P4 shares how a parent can also be an influence toward screen use:"I watch too much TV myself and most times do not bother to be a good role model to them on this habit. The reason is because I am usually exhausted when I arrive home from work and TV time is my down time. (P4)"
The interviewed parents all reported that their children exceeded the recommended ST limits and they raised concern over its psychological impact on their children. Even with 80% of respondent expressing their lack of control on children's ST, some others like P6 believe that when her children are on these devices, she enjoys the quietness around the house.
"I know this may sound like I am a bad parent, but I don't think I want to have control over their ST because this is the only time I get to have absolute peace around the house. When my 2 sons play with each other around the house, it feels like the walls are going to come down that's why I prefer when they watch TV or play video games. (P6)"
Some parents appeared very unhappy about the exposure of online content for their children and would welcome an intervention that will not only control the content but also the usage.
"I am so frustrated at the behaviors my son is acquiring from excess screen time, I notice he is becoming aggressive and not liking to interact with people in real life, since we bought him a new PlayStation game, he has changed so much and I wish we can control how much time he gets on it daily this might help me find better things to do around the house. (P9)"
As indicated in the questionnaire result, addiction was the major concern of parents, which was supported by one parent's observation during the interview:"Every time I come home from work, I see children playing video games and watching videos on YouTube. They are usually very engaged and glued to these devices and it's difficult to control them or convince them to do other activities. (P10)"
Children's Screen Behavior {#section7-2333794X19878062}
--------------------------
[Figure 2](#fig2-2333794X19878062){ref-type="fig"} displays the most frequently used screen device in the home such as TV, with estimated usage ranking more than 6 hours daily. For the study sample, the most common age group to engage in TV and tablet use was 5 to 9 and 10 to 15 years old at 35%. Most interviewed participants with children in this age category validate the above; for example, P1 states:"My 2 girls love to use their tablet so much so that I regret buying it for them. . . . They can spend all day using their tablet without thinking of what to eat. (P1)"
Similar to our questionnaire, results show that 41% of children spent over 3 hours on their tablets (see [Figure 2](#fig2-2333794X19878062){ref-type="fig"}). Subsequently, parents were asked regarding the amount of time their children spent on screen devices during term times, weekends, weekdays, and holiday period. Parents responded with the estimated number of hours their children engaged in each day with activities listed in this format: (1) TV watching or DVDs, (2) using computer/video games, (3) using tablets such as iPads, and (4) using smartphones for surfing the Internet (not including time spent texting and talking on the phone). A total number of 140 parents responded (see [Figure 3](#fig3-2333794X19878062){ref-type="fig"}) that a daily use average (across weekday and weekend) of 4.3 hours was calculated, which serves as our average ST across all age groups.
{#fig2-2333794X19878062}
{#fig3-2333794X19878062}
Concern Over Child's PAs and Recreational Screen Viewing Time {#section8-2333794X19878062}
-------------------------------------------------------------
Seventy-nine percent of the respondents agreed that ST hinders and restricts their children from having a more active lifestyle. This was also supported by the interview where P1 shared his view based on his own observation:"For my girls yes, if you take away the phone and tablets, they will find ways to do more active things around the house, like helping out their mum in the kitchen or playing with each other. But my son makes an effort, he very often throws and kicks the football around the house. My older daughter is lazy when she gets home. She has always been the one who is not interested in physical activities. (P1)"
Jackson^[@bibr28-2333794X19878062]^ argued that young Britons spend 14 hours, a third of their waking hours, using smartphones, laptops, and tablets, and other studies suggest that this is not pertinent to the United Kingdom alone as other nations are also concerned especially among teenagers.^[@bibr29-2333794X19878062]^ Parents have been asked to share their perception toward changing behavior around screen use comparing against their own childhood. All participants emphasized the fact of smartphones and tablets being invoked has made it difficult to have digital-free zones at home.
"My childhood the norm was to spend 2-3 hours playing footie with friends and TV time was just a small part of it, as we only had one family TV. We played games such as ATARI with other members of the family as there was no Internet. (P10)"
Social and Physical Home Environment {#section9-2333794X19878062}
------------------------------------
In relation to the influence of parents, one of the interviewees stated:"I am a bad influence, ha-ha, I watch TV a lot, but for news and I also watch Senegalese movies and what I do on the PC at home is working on Solidworks and yes, I am setting a good example by doing too much screen-related activities. But the difference between me and the children **is** that I know when to stop and they don't. My wife does **g**ood job by shouting on me to stop watching movies so we can spend time together as a family or talk and have some quality time. (P1)"
This is in line with parental support that was stressed further by Timperio et al^[@bibr30-2333794X19878062]^ in their study as a causal factor in this association (children and friends/family). Although the result often depends on the age of the children, there is also the influential impact of parental support and encouragement. From our results, this was prevalent in children aged 6 to 11 years old and their disinterest toward PA and this was also similar from literature.^[@bibr31-2333794X19878062]^ Our results show that the older the children, the less likely they are to engage in PA and the more they are susceptible to health issues resulting from being physically inactive.^[@bibr32-2333794X19878062]^ Parents reported that modeling good healthy screen use could be a good way to offer their children full attention and this may take them away from spending so much time on these devices. Thus, in the home environment, making changes to the physical and social factors as an intervention measure could be a vital research proposition.
The Demand for Physical Activity {#section10-2333794X19878062}
--------------------------------
More than half of the respondents (67.4%) have reported that their children do not meet the PA recommendation of at least 60 minutes of light to moderate PA. Forty-seven percent would like to observe an improvement in the PA habits of their children, which is to at least 1 hour per day, while understanding the barriers discussed in section "Screen Viewing Time and the Role of Parents," such as addiction (23%), lack of motivation (17%), and friends (14%). The parents who have reported lack of motivation seem less confident about their children achieving 1 hour/day PA. The interviewed parents reported that children must be given the skills and opportunity to entertain themselves without screen devices, and one parent emphasized that this will offer an even greater chance of interacting with others.
In comparison to strategies related to limiting the ST, nearly all parents (80%) are somewhat less confident about their children meeting the screen recommendations of 2 hours/day due to constant child resistance. In the current study, parents (30%) reported child resistance in the process of negotiating the reduction of ST as a big challenge in parental monitoring. This resistance was reported mostly by parents whose children use a lot of social media.
"I think they resist to limiting smartphone use because they are trying to protect their social media identity, so they often have to keep up appearances. (P7)"
On the contrary, another interviewed parent shared that they did not necessarily lack control, but was mostly unmotivated as they were guilty of not being very active themselves.
"I have enough trouble motivating myself to exercise as it stands, let alone my children. (P6)"
Promoting PA requires consistency and from the variation of views and responses, and most parents understand the significance of exercising. While parents with children aged 10 to 14 years highlighted that PA is highly important in the development of their children, some emphasized that structures within their social environment limit them from engaging in PA. Also, determinants such as increasing demand for family time were barriers in PA participation.
"I want them to exercise and not play video games, or even do other active things around the house, but I would also like us to spend a lot of time together as a family, which is really difficult. (P9)"
Analysis of Hypotheses {#section11-2333794X19878062}
----------------------
The results show that Hypothesis 1a is rejected as the correlation coefficient is low at 0.129 and it is not significant (*P* \> .05). Hence, there is no correlation between parents' level of concern and the hours spent during school days. On the other hand, Hypothesis 1b is accepted. Although the correlation coefficient is low at 0.224, it is significant at .01 level (*P* \< .01). It can be established that the higher children's ST during holidays the more parents get concerned. Hypothesis 1c is also accepted. The correlation coefficient is 0.328, and it is significant at the .01 level (*P* \< .01). We can say that the higher children's ST during weekends the more parents get concerned.
In relation to food during TV and other screen activities, the 3 hypotheses have been accepted. Hypothesis 2a is accepted with the correlation coefficient of 0.304, and it is significant at the .01 level (*P* \< .01). It has been established that the higher children's ST during school days the more they consume food and beverages. Hypothesis 2b is also accepted. The correlation coefficient is 0.446, and it is significant at the .01 level (*P* \< .01). We can say that the higher children's ST during holiday time the more they consume food and beverages. Hypothesis 2c is also accepted with a correlation coefficient of 0.323, and it is significant at the .01 level (*P* \< .01). We can say that the higher children's ST during weekends the more they consume food and beverages.
Discussion {#section12-2333794X19878062}
==========
ST norms refer to the ubiquitous use and engagement with any screen-based device in young people's lives.^[@bibr33-2333794X19878062]^ However, the general barriers to this habit are related to the surroundings itself, as well as a lack of parental control. The study evaluated the lack of PA and the patterns of recreational ST among children from the parents' point of view. Although there has been a considerable variation in the viewing patterns as reported by parents, ST appears to be an increasing behavior with many children regularly engaging in at least 2 forms of ST at a time. It is important to highlight that TV viewing (ie, TV or video game) appeared to be the dominant activity despite multiple viewing, which involves other forms of screen devices. The current study showed that most children had access to mobile devices from a very young age; hence, parents with younger children often use ST as a babysitting tool, justifying the phenomenon and trend of living a smarter lifestyle. The findings from this article suggest that 86% of parents agree that if the PA of their children improved, this could aid in their development and health including adequate weight maintenance. However, another study has also shown that ST increases by approximately 1 hour per day as children develop with age.^[@bibr34-2333794X19878062]^ Even though for young children TV viewing continues to dominate whereas older children spend more time playing video games on TV. However, their ST exceeds the American Academy of Pediatrics recommended ST of 2 hours of the day.^[@bibr35-2333794X19878062]^ This study has used the American Academy of Pediatrics guideline as it has been globally cited by several researchers. There is currently no ST guidance provided by any UK institution, although the Royal College of Public Health has recently published its first guidance.^[@bibr36-2333794X19878062]^ This guidance contest that evidence is weak to conclude that ST is harmful.
The findings from this study align with Bandura's social cognitive model, which is based on the idea that children learn and are influenced by the practices within their surroundings, especially from parents.^[@bibr20-2333794X19878062]^ Therefore, by the observation of other people's behaviors, children tend to develop similar behaviors.^[@bibr37-2333794X19878062]^ Our findings indicate that parents' frequent ST also influences children's concurrent use.
The home environment has become a space that facilitates the prominent use of screen devices. The result of this study reports that the abundant provision of screen devices in the aforementioned environment makes it easy for children to dominate most of their waking hours using them. From the statistical analysis, it could be concluded that parents get more concerned when noticing their children spending ST during holidays and weekends. During term time, the majority of the time would have been spent in schools and doing homework and hence parents have less concern. However, it seems that during weekends and holidays children get attached to their screen device and hence the parents get more concerned about their children's screen activity. We, therefore, highlight that the dominance of these devices calls for action on why this issue should be taken as a clear research priority to create positive influences for children and their health. We also suggest that simply limiting the ST through intervention could be less effective. Our findings suggest that future interventions should focus on the determinants of these behavior and effectively offer ways to construct habitual PA and appropriate screen use for households. Thus, setting positive cues for children to adopt healthy behaviors such as inducing frequent PA could potentially help them begin to observe a change in reducing excess ST. Activities that could displace ST will further encourage and foster good behavior. Taking into consideration that most of the children are addicted to these devices, any activity/intervention that aims to bring about a significant change in behavior would need to ensure there is an equivalent motivation such as enjoyment. There is a construct that instigating the enjoyment of PA is an important determinant for children.^[@bibr38-2333794X19878062]^ Therefore, the balance between enjoyment and building intrinsic motivation toward habitual PA becomes an essential element in creating any intervention.
In any given environment, which has the potential to impact children's leisure time or PA, it is salient that the social and physical environmental factors be considered.^[@bibr39-2333794X19878062]^ Consequently, the home environment can either encourage these behaviors or create a socially and physically busy environment to foster PA engagement. This could include factors such as the atmosphere parents create in relation to PA and the ST. From the results, it was clear that most parents struggled with being good role models for their children; and this significantly affects the amount of time their children spent engaging in the said behavior.
Although existing literature to date does not discuss other determinants such as social contextual influences and friends, children's behaviors are highly influenced by surroundings, especially with whom they see as part of their lives, that is, parents.^[@bibr11-2333794X19878062]^ The result from the current study shows that 41% of the sample spent over 3 hours on their tablets although it was unreported about ownership of these tablets. This could be justifiable with the Ofcom report that shows that 39% of children aged 8 to 11 years own either a smartphone or tablet.^[@bibr40-2333794X19878062]^ The results of the statistical hypotheses also show that the more children stay at home and use the screen device, the more snacks and beverages they consume. Hence, there could be a negative effect from ST not only in relation to the lack of PA but also the quality of food and drinks that children consume. From the observations, it could be argued that children might miss meal time due to being engaged in watching a movie or in the middle of a video game; hence, the food patterns and obesity might be of concern and it is an area that should be explored further in the future.
Due to the abundance in screen devices available to children, inequitable standards should be employed to evaluate ST-related behaviors; hence, interventions in bringing behavior change will also need to take account ways to build sympathy between parents and children through intervention strategy such as goal setting. Following the results of the current study, there is an indication that in order to develop an effective intervention, supporting parents to increase their control toward the resistance of their children when engaging in ST is vital.
This article highlights several strengths in that it uses a mixed method approach to identify concerns of parents and at the same time it provides a wider depth of their perception and understanding of children's screen behaviors. One of the limitations is that we discussed ST without differentiating the purposes of ST such as family TV time and using computers and tablets for homework. We acknowledge that this would have been beneficial to separate between these activities and the social environment in which these devices are used. In this study, sedentary behavior and ST were perceived in a broader perspective and this includes any screen devices. However, many variations that would have been included in this study could be an opportunity for future study.
Conclusion {#section13-2333794X19878062}
==========
This article provides great insights and novel contribution around parental concern on their children's screen use. It highlights the notion that the home environment is highly associated with factors contributing to physical inactivity and increasing ST. ST has an association with overweight, obesity, and parents are concerned even as they generally show a lack of confidence in controlling their children. Future research is now warranted to investigate whether framing interventions tailored at displacing overall screen engagement of children with some form of PAs will increase motivation and self-efficacy. Parents are seeking guidance and provision of interventions that help mediate household's screen use to reduce sedentary behavior, but also through building a mutual gratification between family members, for example, goal setting. Ultimately, if interventions succeed in improving health, it will be important to evaluate the increase in PA and measure its impact toward their health and well-being.
**Author Contributions:** FN: Contributed to conception and design; contributed to analysis; drafted the manuscript; critically revised the manuscript; gave final approval; agrees to be accountable for all aspects of work ensuring integrity and accuracy.
DHS: Contributed to conception and design; contributed to analysis; drafted the manuscript; critically revised the manuscript; gave final approval; agrees to be accountable for all aspects of work ensuring integrity and accuracy.
AA: Contributed to conception and design; contributed to analysis; gave final approval; agrees to be accountable for all aspects of work ensuring integrity and accuracy.
HM: Contributed to analysis; drafted the manuscript; critically revised the manuscript; gave final approval; agrees to be accountable for all aspects of work ensuring integrity and accuracy.
**Declaration of Conflicting Interests:** The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
**Funding:** The author(s) received no financial support for the research, authorship, and/or publication of this article.
**ORCID iDs:** Hyunjae Daniel Shin  <https://orcid.org/0000-0002-3475-5829>
Hiba Massoud  <https://orcid.org/0000-0003-0120-7524>
|
1938 Austrian Anschluss referendum
A referendum on the Anschluss with Germany was held in German-occupied Austria on 10 April 1938, alongside one in Germany. German troops had already occupied Austria one month earlier, on 12 March 1938. The official result was reported as 99.73% in favour, with a 99.71% turnout.
Background
After the end of World War I, the newly founded Austria, which claimed sovereignty over the majority-German territory of the former Habsburg empire. According to its provisional constitution it declared to be part of the also newly founded German Republic. Later plebiscites in Tyrol and Salzburg in 1921, where majorities of 98,77% and 99,11% voted for a unification with Germany, showed that it was also backed by the population.
In September 1919 Austria had to sign the Treaty of Saint Germain, which did not only mean significant losses of territory but it was also forced to change its name from "German Austria" to "Austria". Furthermore, Article 88 of the treaty stated that "the independence of Austria is inalienable otherwise than with the consent of the Council of the League of Nations", to prevent any attempt to unite with Germany.
Campaign
During the lead-up to the referendum, Hitler's campaign included anti-Catholic and anti-Semitic posters. Campaign managers reported "no opposition to the referendum". The referendum was supported by the Social Democratic Party of Austria, whose leader Karl Renner endorsed Hitler on 3 April, and Cardinal Theodor Innitzer, the highest representative of the Roman Catholic church in Austria.
Results
The referendum question was:
Although there were irregularities, LIFE in 1938 acknowledged that the results of the referendum and its German counterpart were "largely honest". Some postwar accounts claim that the poll was rigged, but there is no evidence that this was necessary. The result was "... the outcome of opportunism, ideological conviction, massive pressure, occasional vote rigging and a propaganda machine that Austria's political culture had never before experienced." The massive pressure to which people were exposed came from the fact that many were marking the ballot paper in front of the campaign workers in order not to be suspected of voting against the Anschluss. The secrecy of the ballot was in practice non-existent.
References
Category:1938 elections in Austria
Category:Referendums in Austria
Category:1938 referendums
Category:April 1938 events |
Soccer Ball Brings Off-Grid Electricity Onto the Field
By Ike Sriskandarajah
CAMBRIDGE, Massachusetts -- A group of Harvard students is harnessing the power of the world's most popular sport. They've designed a soccer ball that generates electricity with every kick. After a game, it can power a small light.
Though it's still a prototype, Popular Mechanics recently named sOccket one of its breakthrough innovations of the year. Hemali Thakkar, one of the co-creators of sOccket, showed me the product at Harvard's campus. It looks like an average white ball, but on the inside, she said, "there's a magnet that goes back and forth through the inductive coil, which allows a current to be captured in a capacitor and electricity to be stored." The extra hardware adds 6 ounces to the standard 15-ounce soccer ball.
"About 15 minutes of kicking the ball allows us to use a single LED for three hours," Thakkar said. A standard 90-minute game could generate close to 12 hours of light. The sOccket's socket is a small DC jack in the middle of one of the ball's panels. Thakkar plugged in an LED. It glowed modestly in the daylight, but Thakkar assured me, "when it's pitch dark, it's amazing how a single LED can make such a big difference."
Poor places that lack access to electricity is where sOccket hopes to make the biggest difference. The UN Development Program estimates that nearly 80 percent of the citizens of the 50 poorest nations have no access to electricity. People rely on unsustainable, unhealthy energy sources. To generate light, many burn kerosene. Its fumes are a major cause of health problems in developing countries and the environmental impact of kerosene is severe as well -- the yearly carbon dioxide emissions from all those lamps around the world equals the emissions from about 38 million cars.
This past summer, the sOccket team took their prototype to Nigeria, Liberia and South Africa to test it where the need for clean electricity and love of soccer was the highest. The home of the 2010 World Cup gave the sOccket inventors a great opportunity to see how their ball fared on some no-frills fields.
The young women worked with Marcus McGilvray, founder of the South African based WhizzKids United. He runs an HIV care and prevention organization that uses soccer to reach at-risk kids. McGilvray had first met one of the Harvard inventors a year earlier and introduced her to his crack team of product testers. "These children, they make footballs out of carrier bags so they are always excited when you bring a football out to them," McGilvray said. "Of course this football generated a lot of interest." The ball was well received but he said the mechanics needed improvement. "What the sOccket team realized from the trials was that they were going to have to work on the connection inside," he concluded.
Durability is the name of the game. Heather Fleming heads the non-profit Catapult Design, which has done extensive research for clients trying to supply soccer balls to African nations. She says that the average African soccer ball has a brief field life of 7-90 days. The current sOccket has an exposed outlet, which makes it especially vulnerable to environmental conditions. Thakkar's team is working on that problem, as well as other improvements. "This is still our prototype 2.0," she said. "We hope that we will reduce weight, increase durability, increase the capture of electricity and make it a better product."
The sOccketeers are also going to have to get the ball's price down. The prototype costs $70 for a design shop to manufacture but the team hopes that as they scale up production the ball will cost no more than $10 to make. They want to have a for-sale version of the ball on American shelves next summer and a subsidized or free version distributed to groups like Whizzkids in South Africa soon after.
For the developing world, Fleming doesn't support the buy-one, give-one-away model. "We don't try to do any work for free and we discourage subsidies." Giving away products ruins local markets for balls, Fleming explained. "[Giveaways] handicap African entrepreneurs and people don't value it as much." It's only when designers tap local businesspeople and workers that they create products that can succeed long-term.
"95 percent of all products and technology directed at the world's poorest market fail," Fleming said. "Market based solutions are what makes it last."
Thakkar and her co-creators are exploring local production options where rural residents would assemble and sell the balls themselves. "That's definitely the biggest idea that we are thinking about right now," she said.
Images: 1. An early prototype in KwaZulu Natal, South Africa for field testing. WhizzKids United. 2. Hemali Thakkar holding the sOccket 2.0 in Cambridge. Ike Sriskandarajah. |
In his remarks on gun violence in Colorado, the President began by pointing out that, despite the horror of mass shootings like those in Aurora, Columbine, and Newtown, more Americans die from handgun homicides than from massacres with automatic weapons.
"It's now been just over 100 days since the murder of 20 innocent children and six brave educators in Newtown, Connecticut shocked this country into doing something to protect our kids," Obama said in his prepared remarks in Colorado.
"But," he added, "consider this: over those 100 days or so, more than 100 times as many Americans have fallen victim to gun violence. More than 2,000 of our fellow citizens, struck down, often just because they were in the wrong place at the wrong time. And every day we wait to do something about it, even more are stolen from our lives by a bullet from a gun."
Since Senator Diane Feinstein's effort to renew the Clinton-era assault weapons ban now appears to be dead, the President is refocusing on background checks.
Obama is right that handguns take more lives than assault weapons. But, with the failure to renew the ban, there is still a sad sense that momentum has been lost. The NRA has ramped up the rhetoric about the government coming to take your guns, and the moment after Newtown -- when a broad cross-section of the country seemed ready to do something meaningful to stop these hideous massacres -- has faded.
Still, Obama is pressing forward with a rejiggered response. And he takes solace from state efforts in Colorado. "Colorado has already chosen to do something," the President said.
Despite being "a state that treasures its Second Amendment rights -- a state of proud hunters and sportsmen, with a strong tradition of gun ownership," the people of Colorado decided to pass strict background check laws.
Background checks -- which the NRA once supported -- are a bugaboo for gun advocates today.
But surely here, at least, there is a fight to be made in Washington.
There is overwhelming support for background checks in the public at large.
An avid deer hunter here in Wisconsin points out: "Any felon can buy a gun at a gun show, but not at Gander Mountain. And Gander Mountain's sales are through the roof." So even card-carrying NRA members are accustomed to undergoing background checks if they frequent garden-variety gun stores.
Ever since the Clinton-era ban lapsed, assault-style weapons have become a kind of fad among many hunters, my friend, who spends a lot of time with NRA folks, also points out.
"They don't need assault-style weapons to hunt," he tells me. "It's a matter of liking it."
The real problem is not that hunters and sportsmen need to have automatic weapons (despite their recent popularity), or even that they are all that useful or accurate. The real problem is the NRA-fueled culture of paranoia -- any proposed ban on weapons is a government plot to destroy your Second Amendment rights.
The assault-weapons ban appears to be lost.
Perhaps there is a chance for a ban on high-capacity magazines. The practical effect of forcing a shooter to stop and reload is obvious.
In Newtown, 154 bullets were fired in less than five minutes, killing 20 children and six teachers
At a news conference in Connecticut parents and other family members of Newtown victims urged Connecticut legislators to pass a ban on high-capacity magazines, adding that in the time it took the Newtown gunman to reload, 11 children escaped.
Governor Daniel Malloy of Connecticut has endorsed the ban on magazines that hold more than ten clips -- despite NRA propaganda warning that such a ban would amount to government seizure of property and a gross violation of gun owners Constitutional rights.
As Joe Biden points out, the actual burden to gun owners is "de minimus" -- they can pay the same amount of money for the same number of bullets -- they just have to pause to reload.
Is America ready for that?
Despite the overheated rhetoric, after a tragedy like Newtown, we have to hope that at least some minimal common sense can prevail.
If you liked this article by Ruth Conniff, the political editor of The Progressive, check out her story "Who Has Standing on Gay Marriage?".
× Follow Ruth Conniff
Follow Ruth Conniff @rconniff on Twitter. |
[Cutaneous leishmaniasis in Turkey].
Cutaneous leishmaniasis (CL) caused by Leishmania protozoon parasites is a disease which is characterized by long-term nodulo-ulcerative lesions healing spontaneously with scarring. The disease has been well-known in Anatolia for centuries and has different names such as; Urfa boil, Antep boil, year boil, Halep boil, oriental sore and beauty scar. The causative agents are Leishmania tropica and Leishmania tropica/Leishmania infantum in Southeastern Anatolia and East Mediterranean, respectively. CL is a notifiable disease in Turkey and, according to the Ministry of Health official records, 46.003 new cases were reported between 1990 and 2010. Among those cases, 96% of them were reported from the Şanlıurfa, Adana, Osmaniye, Hatay, Diyarbakır, İçel and Kahramanmaraş provinces. Although 45% of cases were notified from Şanlıurfa in the past 20 years, its ratio is currently decreasing while other regions' ratios have been showing an increasing trend. Easier transportation between cities, increased travel migration of the population from rural areas to the peripheral suburbs with inadequate infrastructure and unhealthy housing are thought to be the main factors for spreading the disease from Southeastern Anatolia to other regions of Turkey. Lack of treatment of patients as reservoir hosts because of different reasons and ineffective and inadequate use of insecticides against vector sand flies have also played an important role in spreading the disease. Neglect of this disease by patients and health institutions can also be considered as other factors for the spreading. We believe that, after the strategic plan for leishmaniasis prepared by the Turkish Ministry of Health with the contribution of scientists in 2011 is put into practice, the control of the disease will be more effective. |
[cdkPortalHost] {
color: red;
}
|
## External links
- [Aho-Corasick with additions](http://codeforces.com/blog/entry/10725) [^1]
[^1]: <http://codeforces.com/blog/entry/10725#comment-160742> |
Jeffery John Mumford Speed
Jeffery John Mumford Speed CBE FRSA FInstLM FRGS (born 3 October 1936) was Director of Fundraising and the Treasurer’s Department at Conservative Central Office (1995–96). Speed was described as the "ultimate party worker", a party stalwart, and he was credited with turning around the party's finances, wiping-out over twelve million pounds in the party's deficit and building-up the party coffers before the 1996 elections.
Early life
Jeffery John Mumford Speed was born on 3 October 1936, the son of Herbert Victor Speed and Dorothy Barbara Speed (née Mumford). He was educated at Bedford Modern School.
Career
Speed started his career in commerce with General Motors before being made a Conservative Party Agent (1965–78). He was election agent for the Rt Hon. Iain MacLeod (1970); Cecil Parkinson (1970); and the Rt Hon. Edward Heath (1974).
Speed held a number of positions at Conservative Central Office including Director of Constituency Services (1993–95) before becoming the Director of Fundraising (1995–96). Speed was described as the "ultimate party worker", a party stalwart, and he was credited with turning around the party's finances, wiping-out over twelve million pounds in the party's deficit and building-up the party coffers before the 1996 elections. He mysteriously resigned just before those elections, due, it was said, to a disagreement with Dr Brian Mawhinney, the Conservative Party Chairman.
Awards and honours
Speed is a Fellow of the Institute of Leadership and Management. He was made a Fellow of the Royal Society of Arts in 1993 and a Fellow of the Royal Geographical Society in 2003.
Speed was invested as a Commander of the Order of the British Empire in 1991.
Personal life
In 1985, Speed married Hilary Anne Busfield, daughter of the late Haley Busfield of Mayfield, Sussex. His interests include antique maps (especially those by John Speed), oenology, travel (particularly in Spain), musical theatre and film. He is a member of the Royal Over-Seas League.
Jeffery Speed is the brother of Sir Herbert Keith Speed and a direct descendant of John Speed.
Publications
Tudor townscapes: the town plans from John Speed's: "Theatre of the Empire of Great Britaine 1610". Published Waddesdon, Buckinghamshire, 2000
References
Category:Commanders of the Order of the British Empire
Category:People educated at Bedford Modern School
Category:1936 births
Category:Living people
Category:Fellows of the Royal Geographical Society |
Prostate biopsy techniques and indications: when, where, and how?
Transrectal ultrasound (TRUS) and prostate biopsy have become one of the most common office-based procedures for the practicing urologist. During the past 50 years, the techniques, indications, and pathologic interpretation of prostate biopsies have evolved. The abandonment of blind finger-guided needle biopsies in favor of systematic TRUS-guided biopsies epitomizes much of this change. Similarly, the indications for prostate biopsy have become more refined. In the past, the presence of a prostatic nodule on digital rectal examination (DRE) was the primary indication for biopsy until the introduction of prostatic-specific antigen (PSA) in the 1980s and its widespread use for prostate cancer screening. Abnormalities of PSA or its derivatives now represent the most common indication for prostate biopsy. Although TRUS initially began as a tool to direct needles into various locations within the prostate, today a great deal of information can be obtained from prostate ultrasound for the discerning clinician. As such, TRUS-guided biopsy of the prostate has become an important staging and diagnostic tool for the practicing urologist. Here we review the current techniques and indications as well as pertinent pathologic and staging data obtained through TRUS and prostate biopsy. |
__________________Find Appliance Parts at AppliancePartsPros.com - Largest inventory in the U.S. with 91% of all in-stock orders delivered within 2 business days. Thousands of photos and diagrams make it very easy to find the right part. Enter your appliance model here.
Trace the wire leading to the indicator light and with the power off remove it from the infinite switch. Turn the power on and if the light is off - replace the switch.
Look for the diagram inside the control panel, at the back of the range, in the bottom drawer compartment.
__________________Find Appliance Parts at AppliancePartsPros.com - Largest inventory in the U.S. with 91% of all in-stock orders delivered within 2 business days. Thousands of photos and diagrams make it very easy to find the right part. Enter your appliance model here.
I will try that. I have one question though. This is the dual burner element. Isn't the switch shown above the single element switch. It has the smaller burner are and also the larger area for bigger pots.
__________________Find Appliance Parts at AppliancePartsPros.com - Largest inventory in the U.S. with 91% of all in-stock orders delivered within 2 business days. Thousands of photos and diagrams make it very easy to find the right part. Enter your appliance model here.
According the schematic for a similar range there is the jumper wire connecting P of the small element switch and #4 of the dual element switch.
But if the light belong to that dual infinite switch - replace the switch.
Simon.
__________________Find Appliance Parts at AppliancePartsPros.com - Largest inventory in the U.S. with 91% of all in-stock orders delivered within 2 business days. Thousands of photos and diagrams make it very easy to find the right part. Enter your appliance model here.
The content on this web site is for informational purposes only and is not intended to replace an on-site diagnosis from a qualified appliance service technician. By reading any content on this site you agree to AppliancePartsPros.com , Inc. disclaimer and Terms of Use. |
Q:
android app unable run in Motorola droid
Hi i am new to android. i developed an android app using 2.1 version in eclipse Ganymede.
i used SQLite data base to store data and it will show the stored values when loading page My app is running perfectly in Sony Ericsson Xperia but it was not working in motorola droid which is having os Android 2.1 i dont know what is the cause. is there need to give any special permissions in manifest file to run app in droid or other mobile comapanies or any other issue occured by using the SQLite database?
Please respond for my request
A:
The short answer is no, there's nothing about SQLite databases that requires any permission. I have a published app in the market that uses a database and requests no permissions. I also happen to know it runs fine on the original Droid because that's the phone I carry.
|
Q:
How to check if a particular element exists in SuperObject?
I widely use the SuperObject JSON library. I need to be able to check if a particular element exists in an object or not. I can check the value of an element, for example an integer that doesn't exist returns 0. However, 0 is one of the possible values if it does exist - so I can't depend on observing 0 for the element's existence. I checked the ISuperObject for methods that can do this (for example I'd expect something like ISuperObject.Exists(const S: String): Boolean;), but see nothing like this.
How can I check if a particular element exists in the JSON object or not?
A:
The latest update of SuperObject contains an Exists() function.
var
obj : ISuperObject;
begin
obj := TSuperObject.ParseFile('..\..\SAMPLE.JSON',FALSE);
if not obj.AsObject.Exists('FindMe') then begin
WriteLn('Not found');
end;
end;
If you should use the dwsJSON parser instead, there is a similar function to use:
if json['DoesNotExists'].ElementCount = 0 then begin
WriteLn('Not found');
end;
A:
You can check if certain field exists like this:
function FieldExists(const ASuperObject: ISuperObject; const AField: String): Boolean;
var
o: ISuperObject;
begin
o := ASuperObject.O[AField];
result := Assigned(o);
end;
Basically, json_superobject.O[field_name] should return pointer to ISuperObject if field_name exists. Otherwise, it returns nil.
|
PAHOA, Hawaii — Sputtering lava, strong earthquakes and toxic gas jolted the southern part of the Big Island of Hawaii as magma shifted underneath a restless Kilauea volcano.
The trifecta of natural threats forced stressed out residents to evacuate and prompted the closure of parks and college campuses on Friday.
Multiple new vents, from which lava is spurting out of the ground, formed in the same residential neighborhood where molten rock first emerged Thursday. At midday, a magnitude 6.9 earthquake struck — the biggest of hundreds of quakes this week and the largest to strike the state in 43 years. Residents were also warned to watch out for dangerous levels of sulfuric gas.
Hawaiian Volcano Observatory spokeswoman Janet Babb said the earthquakes reflected the volcano adjusting to the shifting magma.
“The magma moving down the rift zones, it causes stress on the south flank of the volcano,” Babb said. “We’re just getting a series of earthquakes.”
She said scientists were studying whether the quakes would affect the eruption.
The lava lake at Kilauea’s summit crater dropped significantly, suggesting the magma was moving eastward toward Puna, a mostly rural district of forests, papaya farms and lava fields left by past eruptions.
Officials ordered more than 1,700 people out of Big Island communities near the lava, warning of the dangers of spattering hot rock and high levels of sulfuric gas that could threaten the elderly and people with breathing problems. Two homes have burned.
Julie Woolsey evacuated her home late Thursday as a volcanic vent, or an opening in the Earth’s surface where lava emerges, sprouted up on her street in the Leilani Estates neighborhood.
Lava was about 1,000 yards from her home, which Woolsey built on a lot purchased for $35,000 11 years ago after living on Maui became too expensive.
“We knew we were building on an active volcano,” she said, but added that she thought the danger from lava was a remote possibility.
She said she thought it was remote even days ago when she began packing and preparing to evacuate.
“You can’t really predict what Pele is going to do,” Woolsey said, referring to the Hawaiian volcano goddess. “It’s hard to keep up. We’re hoping our house doesn’t burn down.”
She let her chickens loose, loaded her dogs into her truck and evacuated with her daughter and grandson. She’s staying at a cabin with her daughter’s in-laws.
Local authorities held a community meeting with residents from lava affected areas Friday night at Pahoa High School.
Two new volcanic vents, from which lava is spurting, developed Friday, bringing the number formed to five.
State Sen. Russell Ruderman said he’s experienced many earthquakes, but the magnitude-5.4 temblor that hit first “scared the heck out of me.” Merchandise fell off the shelves in a natural food store he owns.
When the larger quake followed, he said he felt strong shaking in Hilo, the island’s largest city that is roughly 45 minutes from the rural Puna area.
“We’re all rattled right now,” he said. “It’s one thing after another. It’s feeling kind of stressful out here.”
State officials didn’t report damage to roadways. Hawaii County Acting Mayor Wil Okabe said the larger quake cracked a beam in a county gymnasium in Hilo, forcing workers to be sent home.
Hawaii Electric Light said the jolt knocked out power to about 14,400 customers, but electricity was restored about two hours later.
Hawaii Volcanoes National Park evacuated all visitors and non-emergency staff. The quakes triggered rock slides on park trails and crater walls. Narrow fissures appeared on the ground at a building overlooking the crater at Kilauea’s summit.
The University of Hawaii at Hilo and Hawaii Community College both closed campuses to allow students and employees to “attend to personal business and priorities.”
Authorities already had closed a long stretch of Highway 130, one of the main arteries through Puna, because of the threat of sulfuric gas.
At Leilani Estates, where lava was pushing through cracks in the earth, some residents still wanted to get home.
Brad Stanfill said the lava was more than 3 miles (5 kilometers) from his house but he was not allowed in because of a mandatory evacuation order. He was frustrated because he wanted to feed his rabbits and dogs and check on his property.
One woman angrily told police guarding Leilani Estates that she was going in and they couldn’t arrest her. She stormed past police unopposed.
Leilani Estates has about 1,700 residents and 770 homes. A nearby neighborhood, Lanipuna Gardens, which has a few dozen people, also has been evacuated.
Kilauea has been continuously erupting since 1983 and is one of five volcanoes that make up the Big Island. Activity picked up earlier this week, indicating a possible new lava outbreak.
The crater floor began to collapse Monday, triggering earthquakes and pushing the lava into new underground chambers. The collapse caused magma to push more than 10 miles (16 kilometers) downslope toward the populated southeast coastline.
Residents have faced lava threats before.
In 2014, lava burned a house and destroyed a cemetery near the town of Pahoa. Residents were worried it would cover the town’s main road and cut off the community from the rest of the island, but the molten rock stalled.
From 1990 through 1991, lava slowly overtook the town of Kalapana, burning homes and covering roads and gardens.
Kilauea hasn’t been the kind of volcano that shoots lava from its summit into the sky, causing widespread destruction. It tends to ooze lava from fissures in its sides, which often gives residents at least a few hours’ warning before it reaches their property. |
Nonradioactive detection of the common Connexin 26 167delT and 35delG mutations and frequencies among Ashkenazi Jews.
Mutations in the gap junction beta2 (GJB2) gene, Connexin 26 (Cx26), cause nonsyndromic sensorineural recessive deafness (NSRD). Two frameshift mutations, 167delT and 35delG, are the most frequent Cx26 lesions causing NSRD. The 35delG mutation is panethnic, while the 167delT lesion occurs almost exclusively in the Ashkenazi Jewish population at a carrier frequency of 2 to 4%. To facilitate carrier detection, a simple nonradioactive allele-specific oligonucleotide (ASO) hybridization assay was developed for the 167delT and 35delG mutations. Screening of 1012 anonymous Ashkenazi Jewish individuals from the New York Metropolitan area revealed carrier frequencies for 167delT and 35delG of 3.96% (95% CI: 2.75-5.15%) and 0.69% (95% CI: 0.18-1.20%), respectively. This sensitive, specific, and relatively inexpensive method can reliably identify affected newborns and patients with NSRD as well as facilitate carrier screening for Connexin 26 deafness in the Ashkenazi Jewish community. |
package useMap;
import java.util.HashMap;
import java.util.Map;
public class ForEachMap {
public static void main(String[] args) {
// ,要遍历key可以使用for each循环遍历Map实例的keySet()方法返回的Set集合,它包含不重复的key的集合
// Map和List不同的是,Map存储的是key-value的映射关系,并且,它不保证顺序。
Map<String, Integer> map = new HashMap<>();
map.put("apple", 123);
map.put("pear", 456);
map.put("banana", 789);
for (String key : map.keySet()) {
Integer value = map.get(key);
System.out.println(key + " = " + value);
}
// 同时遍历key和value可以使用for each循环遍历Map对象的entrySet()集合,它包含每一个key-value映射:
for (Map.Entry<String, Integer> entry : map.entrySet()) {
String key = entry.getKey();
Integer value = entry.getValue();
System.out.println(key + " = " + value);
}
}
}
|
For the last couple of years we ran an informal poll with your 10 most wanted characters from the current Star Wars Films. Since there is a lot of interest on these board for the Indiana Jones movies we are expanding the tradition and trying to finish up before Comic Con 2008. Here's how it works: You send your Wish List for 10 3 3/4" Figures to me or post them here, be it new figures, resculpts or even re-releases and I'll tally the votes. After four weeks of list taking I'll publish the results and we will move on to the next movie. The first Indiana Jones movie Raiders of the Lost Ark is currently on deck. If you need help coming up with names check out the Indiana Jones Wiki: Raiders Page. Have fun and thanks for sending in your lists (remember to limit it to ten)!
Dietrich was just confirmed by The Big H for early 2009 so there's no reason to vote for him. I also had White Dress Marion and German Mechanic with Propeller-Eating Action on there, but I've got a strong hunch they're already in next year's lineup, too, so off they go.
1. Dietrich2. Jock the Pilot3. German Mechanic4. German Soldier with Gaiters (or even movie accurate jackboots)5. Indy in a suit6. Sallah in a Suit7. Indy in German Uni8. Hovitos Indian9. Capt. Katanga10. Belloq in Jungle Suit |
Q:
Welcome message for per site metas is not able to localize
If you open any of localized meta site in browser's private mode, e.g. ruSO.meta you will see untranslated text on the top right corner:
This message is not found in Transifex, hence unable to localize.
Related bug report on ruSO.meta: Отсутствует перевод блока приветствия
A:
The text and styling for that block are basically just HTML in the site's settings.
If y'all come up with a translation on SOru's meta, we can set that up.
|
Q:
@IBDesignable crashing agent
When I write my own UIButton-extended class and make it @IBDesignable, I receive two errors in Interface Builder, namely:
Main.storyboard: error: IB Designables: Failed to update auto layout status: The agent crashed because the fd closed
Main.storyboard: error: IB Designables: Failed to render instance of RandjeUIButton: The agent crashed
Here is my code:
import UIKit
@IBDesignable
class RandjeUIButton: UIButton {
required init(coder aDecoder: NSCoder) {
super.init(coder: aDecoder)
self.backgroundColor = UIColor.blackColor()
}
}
I am working in Xcode 7 beta 2 on OS X 10.11 beta 2. (Running in VM)
A:
Xcode's Interface Builder requires that you implement both or neither initializers for @IBDesignable classes to render properly in IB.
If you implement required init(coder aDecoder: NSCoder) you'll need to override init(frame: CGRect) as well, otherwise "the agent will crash" as seen in the errors thrown by Xcode.
To do so add the following code to your class:
override init(frame: CGRect) {
super.init(frame: frame)
}
A:
I've met the same problem and solved it this way:
The Problem:
error: IB Designables: Failed to update auto layout status: The agent crashed
Find the debug button in the inspection file and click it.
Then the Xcode will tell you where the prolem is.
In my case I drop the IBDesignable before the class.
Then I clean and rebuild it, the error disappeared
A:
There are a myriad of problems that can cause this. Fire up Console, and look for the crash report IBDesignablesCocoaTouch...
I just sorted out a problem with a 3rd party designable which had issues with the valueForKey semantics.
|
Introduction {#Sec1}
============
Extended Macular Atrophy with Pseudodrusen (EMAP) is a distinct macular disease characterized by a bilateral and symmetric extensive geographic atrophy involving the posterior pole without foveal sparing (Fig. [1](#Fig1){ref-type="fig"})^[@CR1]^. The macular atrophy is systematically associated with diffuse pseudodrusen lining the entire posterior pole and the midperiphery. Pseudodrusen (PSD) and macular atrophy are also encountered in age-related macular degeneration (AMD, Fig. [2](#Fig2){ref-type="fig"}), the most frequent macular disease occurring after the age of 60 years in high-incomes countries. In AMD, these lesions occur at late stages in the seventh to eighth decades of life^[@CR2]--[@CR5]^. By contrast, in EMAP these common elementary lesions are noted at the beginning of the disease in the fifth decade. Night blindness is a systematic inaugural clinical sign of EMAP, rarely reported in AMD. In addition, AMD is a perifoveopathy with a slow rate of progression and long term foveal preservation. By contrast, EMAP atrophy is strikingly rapidly progressing throughout the entire posterior pole with a larger vertical axis and a lack of foveal preservation. Furthermore, the majority of EMAP patients also present with paving stone lesions in the far peripheral retina (Fig. [1](#Fig1){ref-type="fig"}). EMAP also shares the pseudodrusen lesions and a fast progression of the atrophy with diffuse trickling geographic atrophy (DTGA), an early and severe form of AMD. But in contrast to EMAP, patients with DTGA frequently have severe vascular or cardiac disorders.Figure 1Fundus photographs of a 56-year-old woman with an EMAP disease. Visual acuity is 20/400 in both eyes. (**A**,**B**) There is a bilateral and symmetrical extensive geographic macular atrophy with a diameter larger in vertical than horizontal (beneath blue arrows) in both eyes (A right and B left-eye). Atrophic lesions are also noted in the far peripheral and temporal retina in both eyes (white arrows). The extension of the macular atrophy and the association with peripheral small patches of atrophy is not common in AMD. (**C**) Color-magnified photograph of the midperipheral retina that reveals the striking density of pseudodrusen.Figure 2Extensive macular atrophy with pseudodrusen (EMAP) compared to atrophic age-related macular disease (AMD) with pseudodrusen. In EMAP, macular atrophy is extensive with a larger vertical axis passing over the optic nerve head (white arrow) to reach the nasal part of the peripapillary retina (**A**). The atrophy is dark, well-delineated on autofluorescence photograph (**B**). In AMD, there are several patches of macular atrophy restricted to the macular zone (**C**) surrounded by pseudodrusen and classic AMD drusen. On FAF, the atrophic patches are dark and surrounded by mild hyperautofluorescent AMD drusen (**D**, white arrows).
Pseudodrusen (PSD) are distinguished from other classic AMD drusen by their fundus appearance and their specific intraretinal localization (Fig. [2](#Fig2){ref-type="fig"})^[@CR6]--[@CR8]^. PSD reproduce interlacing yellowish lesions enhanced by blue light. In EMAP, PSD are noted throughout the macular area and the whole peripheral retina, whereas in AMD, they are mainly restricted to the macular zone. On spectral domain optical coherence tomography (SD-OCT), PSD are not located beneath the retinal pigment epithelium (RPE) like classic AMD drusen, but in the subretinal space at the level of the RPE or between the RPE and the photoreceptors. Furthermore, in EMAP, PSD show a diffuse pattern whereas in AMD a dot pattern is more common (Fig. [3](#Fig3){ref-type="fig"}). PSD are noted in AMD but at a later stage, at a mean age of approximately 80 years in all multimodal imaging studies.Figure 3SD-OCT pattern in EMAP-pseudodrusen (**A**) and in age-related pseudodrusen (**B**). The deposits are above the RPE in both cases. In EMAP (**A**), the deposits have a diffuse pattern (between white arrows) adjacent to the macular atrophic lesion (dotted line arrows). In AMD (**B**), pseudodrusen have a nodular pattern (white arrows).
We undertook a large national clinical case-control study to identify EMAP risk factors and to compare them with those of late atrophic AMD with or without pseudodrusen. We previously highlighted an inflammatory mechanism underlying EMAP reflected by abnormal total hemolytic complement (CH50) and complement component 3 (C3) serum levels, and eosinophilia^[@CR9]^. By contrast, systemic AMD risk factors such as blood pressure, body mass index, high-density lipoprotein (HDL) and cholesterol, were not detected^[@CR9]^. This first study also excluded a role for medications with toxic retinal effects. Herein, we focus on dietary, environmental, and genetic risk factors associated with EMAP, as well as geographic distribution of cases.
Results {#Sec2}
=======
Full dietary and environmental data were collected for all 115 (70 women and 45 men) EMAP patients and 345 matched (by sex, age ± 5 years and place of residency) controls. AMD genetic factors were analyzed in a subset of EMAP patients and compared with a national dataset. The mean age of EMAP patients was 63.1 ± 3.6 years with 95 patients born between 1946 and 1950 (a notable peak was detected in 1948; Fig. [4](#Fig4){ref-type="fig"}).Figure 4(**A**) Birth date distribution of cases by year. Cases were included from 40 to 80 years old. Note the strikingly high frequency of patients born between 1947--1950. (**B**) Geographical French repartition of EMAP patients according to their birthplace. The disease incidence is high in regions with industrialized or farming activities (in red). Disease incidences (per 10^6^ inhabitants): White no case, Green 1 to 2, Yellow 2 to 5, Orange 5 to 10, Red \> 10. The French map with permission from <http://jfbradu.free.fr/cartesvect/fdcfrance.htm>. This map was modified with Microsoft Paint, version 6.3 (2013, Microsoft Corporation, Redmond, Washington, USA).
Dietary pattern {#Sec3}
---------------
There was no significant difference between cases and geographically-matched controls concerning energy intake (OR = 1.04, 95%, confidence interval - CI = 0.84--1.28), protein intake (OR = 0.51 95% CI = 0.21--1.25), lipid intake (OR = 0.84 CI = 0.28--2.53), carbohydrate intake (OR = 1.00 CI = 0.61--1.63), or alcohol consumption (OR = 1.03 CI = 0.43--2.45). Regarding nutrients that have putative associations with AMD (such as lipids, macular xanthophylls (lutein/zeaxanthin), pro-vitamin A carotenoids, vitamins and minerals with antioxidant properties) no differences were detected (Table [1](#Tab1){ref-type="table"}).Table 1Nutrition patterns in EMAP patients and controls. FA: fatty acids. The data (OR, IC, p-value) represents univariate analysis results. None of the nutrients was significant under multivariate conditional logistic model.Cases (n = 115)Controls (n = 345)ORIC−IC+pEnergy (kCal/day)2611 (±1460)2549 (±914)1.0390.8411.2830.72Water (g/day)2948 (±937)2895 (±989)1.0000.9991.0000.50Fibers (g/day)32.7 (±19)34.3 (±25.7)1.0090.7781.3080.94Proteins (g/day)100.2 (±35.8)106.4 (±38)0.5140.2101.2580.96Carbohydrates (g/day)297 (±230)277.1 (±119)1.0060.6171.6390.98Alcohol (g/day)14.6 (±17)13.8 (±15.5)1.0320.4342.4560.94Starch (g/day)121.0 (±65.7)116.9 (±57.1)1.0170.9751.0610.43Sugar (g/day)140.8 (±165.3)122.7 (±70.3)1.0120.9691.0570.59Lipids (g/day)92.9 (±52.6)92.4 (±41.1)0.8480.2842.5360.76FA monounsaturated (g/day)27.6 (±15.1)28.3 (±11.9)0.9700.5891.5970.19FA oleic (g/day)21.1 (±11.4)21.7 (±9.5)0.8240.5831.1650.27FA polyunsaturated (g/day)12.9 (±6.2)13.4 (±5.5)1.3700.4474.2000.32FA saturated (g/day)42.2 (±27.7)40.2 (±22)0.9290.6701.2890.66Omega 3 (g/day)1.5 (±0.9)1.6 (±0.9)0.9570.2673.4270.94Omega 6 (g/day)8.4 (±4.5)8.7 (±4)0.8050.4511.4360.55Cholesterol (mg/day)301 (±138)323 (±152)1.4260.8222.4740.04VitaminsA (µg/day)620 (±458)786 (±673)0.7270.4651.1370.05β-carotene (µg/day)6.2 (±66.8)109.8 (±839.8)0.9870.9521.0230.46B1 (mg/day)1.4 (±0.8)1.4 (±0.6)1.8200.8723.8010.17B2 (mg/day)2.1 (±0.8)2.2 (±0.9)1.0630.5332.1220.40B3 (mg/day)21.1 (±9.2)23.2 (±11.5)0.8310.4841.4290.72B5 (mg/day)5.3 (±2.1)5.7 (±2.3)0.7680.4601.2810.31B6 (mg/day)2.3 (±1.04)2.4 (±0.9)1.0750.4852.3840.66B9 (µg/day)410 (±164)442 (±184)0.7680.4611.2790.88B12 (µg/day)8.8 (±4.8)10.3 (±6.9)1.0800.6201.8820.53C (mg/day)156 (±80.3)162 (±96)0.9960.9901.0030.25D (µg/day)3.1 (±1.6)3.4 (±1.7)0.9560.7131.2820.45E (mg/day)12.1 (±7.1)12.2 (±5.2)1.2150.7551.9570.17K (µg/day)3.4 (±3.8)3.6 (±3.6)1.080.472.410.69MicronutrientsCalcium (mg/day)1512 (±522)1582 (±587)1.0000.9981.0010.71Copper (mg/day)3.1 (±1.4)3.3 (±1.7)1.3490.7952.2880.26Iron (mg/day)20.9 (±14.4)21.7 (±11.2)0.8180.4871.3740.08Iodine (µg/day)168.9 (±60.4)179 (±69.6)0.9870.6311.5420.35Magnesium (mg/day)484 (±211)497 (±195)1.3050.6472.6320.11Manganese (mg/day)4.6 (±1.9)4.8 (±2.1)0.6470.3911.0700.08Phosphorus (mg/day)1619 (±660)1709 (±639)1.0000.9991.0020.49Potassium (mg/day)3988 (±1477)4124 (±1466)1.0000.9991.0010.46Selenium (µg/day)204.8 (±84.9)202 (±88.6)1.0061.0001.0110.03Sodium (mg/day)3427 (±1357)3512 (±1267)1.0001.0001.0010.89Zinc (mg/day)0.16 (±1.7)0.35 (±2.2)2.4720.20729.4390.47
As dietary patterns could be variable due to regional influences in France, we calculated the Mediterranean Diet Score (MDS)^[@CR10],[@CR11]^. There was no significant difference in MDS between patients (4.38, SD 1.47) and controls (4.28, SD 1.55, OR = 1.043 CI (0.908--1.199) p = 0.549). Nevertheless, there was a lower incidence of EMAP (1.96/1.10^6^) in the South-Eastern part, in comparison to the rest, of France (2.95/1.10^6^). Moreover, there were no cases reported in three departments belonging to this region (Alpes de Haute Provence, Alpes Maritimes, Var) where a Mediterranean diet and high fish consumption prevail, despite the existence of two inclusion centers (Marseille and Nice) in the vicinity.
After the onset of retinal disease, EMAP patients were more frequently supplemented with DHA/Omega and resveratrol than controls (50% for cases versus 0.3% for controls). Over the last five years, controls used more frequently vitamin D and calcium.
Sunlight exposure {#Sec4}
-----------------
There was no significant difference between cases and controls concerning lifetime ambient solar radiation exposure. The mean exposure was 448.2 (±56.1) kJ/cm^2^/year compared to 458.9 (±72.5) kJ/cm^2^/year for cases and controls respectively (OR = 1.05 CI = 0.92--1.21). Concerning sun exposure and protection specifically during summer time, the risk of EMAP was increased for subjects not using regular protection during youth and adulthood (OR = 0.64 (0.44--0.92) and OR = 0.49 (0.33--0.73) respectively).
Chemical exposure {#Sec5}
-----------------
As shown in Table [2](#Tab2){ref-type="table"}, a significant association was found between professional exposures and EMAP (OR = 2.29; CI = 1.41--3.75). Indeed, 38.9% of cases used chemicals in the work place compared to 22.5% of controls. In more detail, 15% of cases used bleach compared to 4% of controls. Over 30 other chemicals were too weakly represented for a conclusion to be drawn.Table 2Sex- and age-adjusted Odds Ratios (ORs) and 95% confidence intervals (CI) between each chemical exposure variables and EMAP status (115 cases vs 345 controls).Cases (N = 115)Controls (N = 345)OR (95% CI)P**Personal exposure to chemicals**[Pesticides]{.ul} No72 (62.6%)196 (56.8%)1.00Ref Yes43 (37.4%)149 (43.2%)0.43 (0.15--1.23)0.11[Aerosols deodorants]{.ul} No23 (20%)56 (16.3%)1.00Ref Yes92 (80%)288 (83.7%)1.51 (0.83--2.74)0.17[Anti-flea]{.ul} No68 (59.1%)212 (62.2%)1.00Ref Yes47 (40.9%)124 (36.3%)0.93 (0.58--1.49)0.76**Professional exposure to chemicals**[Pesticides]{.ul} No109 (95.6%)323 (95%)1.00Ref Yes5 (4.4%)17 (5%)1.19 (0.32--4.47)0.79[Other chemicals]{.ul} No69 (61.1%)262 (77.5%)1.00Ref Yes44 (38.9%)76 (22.5%)2.29 (1.41--3.75)0.0008
Birthplace and subsequent residencies {#Sec6}
-------------------------------------
In this national clinical study, inclusion centers were chosen according to their retinal referent status and to their geographic location to allow a correct national coverage (three in the center i.e. Paris, two in the East, two in West, one in the North, and two in the South of France). The mean national EMAP incidence was 2.9/10^6^ habitants. We then calculated the incidence of EMAP disease with regards to place of birth and childhood residency (Fig. [4](#Fig4){ref-type="fig"}). This analysis disclosed an unequal distribution of disease incidence. Higher rates were found in regions with intensive farming activities, such as Auvergne (12/10^6^ habitants), Picardie (10.98/10^6^ habitants) and Brittany (8.3/10^6^ habitants). In highly industrialized areas, the incidence was also high, 26.53/10^6^ habitants in the Nord-Pas de Calais (carbon and textile industries) and 10.43/10^6^ habitants in Puy de Dôme (automobile industries).
AMD genetic variants analysis {#Sec7}
-----------------------------
Genetic analysis of risk allele including those of the alternative complement pathway associated with AMD was performed in 65 EMAP patients^[@CR12]--[@CR17]^. Fifty-one patients were homozygous (23) or heterozygous (28) for the rs1061170 (His402Tyr) in *CFH* gene. Five and 25 patients were homozygous and heterozygous for the rs10490924 (Ala69Ser) in *ARMS2* gene, respectively. For the rs2230199 (Arg102Gly) in C3, two patients were homozygous and 20 were heterozygous. No patient had the allele rs4151667 (Leu9His) in the C2/CFB factor. Twenty-five patients were homozygous (4) or heterozygous (21) for the rs800292 (Val62Ile) in *CFH* gene. The remaining twenty-one genetic risk-factors associated with AMD (not involving the complement pathway) described by Buitendijk *et al*. were not found in EMAP patients. The score varied from −1.159 to 2.833. Forty five out of 65 EMAP patients had a score inferior to 1. Fifteen patients had a score between 1 and 2, and only 5 patients had a score between 2 and 3.
We also analyzed three other rare AMD variants that confer a risk of early onset or severe AMD. None of the 65 patients carried the CFH Arg1210Cys (rs121913059) or the C9 Pro167Ser (rs34882957) variants. Only one patient carried the Lys155Gln C3 variant (rs147859257, heterozygous state). Based on WES analysis performed in 65 EMAP patients, we excluded other retinal monogenic disorders (RetNet (<https://sph.uth.edu/retnet/>)), including L-ORD and late onset Stargardt disease.
Discussion {#Sec8}
==========
The present study highlighted a possible toxic mechanism in EMAP with a higher incidence observed in regions with industrialized or farming activities, and a toxic exposure during professional life. In AMD, fungicides may increase the risk of retinal degeneration based on the Agricultural Health Study of farm families from Iowa and North Carolina (1993--1997)^[@CR18],[@CR19]^. The role of long-term/low-dose exposure to pesticides (organophosphates, paraquat) is well documented in Parkinson disease, which is the consequence of a degeneration preferentially affecting the dopamine-synthesizing neurons of the nigrostriatal neuronal pathway^[@CR20]--[@CR23]^. Even if the molecular mechanisms of the neuronal degeneration are not completely identified, most pesticides produce oxidative or endoplasmic reticulum stress, mitochondrial alterations, and finally neuronal cell loss. EMAP may share a toxic predominant neuronal degeneration with Parkinson disease. The EMAP-associated neuronal degeneration could involve rods, cones or both. Despite a systematic inaugural night blindness, electroretinogram (ERG) studies did not suggest a major rod cell death but a rod dysfunction. Rod responses are notably reduced after a 20 minute-dark adaptation time (ISCEV protocol), but dramatically recover after a 120 minute prolonged dark adaptation (Fig. [5](#Fig5){ref-type="fig"}). This rod-impairment could be induced by the pseudodrusen i.e. diffuse subretinal deposits located between the retinal pigment epithelium and the inner and outer segments of the photoreceptors. Systematic and severe decrease of photopic single flash and flicker ERG responses as noted in EMAP patients (Fig. [5](#Fig5){ref-type="fig"}), and not in AMD, suggests that cone degeneration is part of the EMAP process. In human and monkey retinas, cone density increased from a 7 mm (35°) of eccentricity line (20 000 cones/mm2) to the fovea peak cone (150 000 cones/mm2). This cone distribution correlates with the pattern and extent of EMAP macular atrophy and 25--35° central scotoma. In addition, EMAP atrophic paving stone lesions developed in the far periphery of the retina, which is a cone-enriched rim deprived of rods that begins 13 mm from the fovea and peaks at 1 mm from the ora serrata^[@CR24],[@CR25]^. Thus, EMAP could be distinct from AMD and revisited as a toxic neurodegenerative cone disease with early, severe and rapid cone apoptosis. An additional deleterious effect of sunlight exposure could also be considered as patients reported a less frequent use of sun glasses. EMAP patients did not show clinical signs of any other neurodegenerative disorders and did not report any family history of such disorders in the questionnaire.Figure 5Full-field electroretinogram in EMAP patient. Dark-adapted 0.01 ERG responses are reduced after a 20 minute-dark adaptation time (ISCEV protocol), but dramatically recover after a 120 minute prolonged dark adaptation. The rod-impairment could be induced by the pseudodrusen i.e. diffuse subretinal deposits located between the retinal pigment epithelium and the inner and outer segments of the photoreceptors. Severe decrease of Light-adapted 3.0 ERG and flicker ERG responses as noted in EMAP patients, and not in AMD, suggests that cone degeneration is part of the EMAP process.
Mediterranean diet and consumption of virgin olive oil reduce the incidence of chronic or neuro-degenerative diseases. Virgin olive oil phenolics have positive effects on antioxidant status, antimicrobial activity and on inflammation as they are natural nonsteroid anti-inflammatory drugs. It is noteworthy that EMAP incidence is particularly low in the southern Mediterranean region (Provence, Côte d'Azur) suggesting a protective role of this diet. Such a protective impact is also reported in AMD on its progression towards the neovascular and atrophic forms^[@CR11],[@CR26],[@CR27]^. However, no such difference for Mediterranean diet was detected at the individual level in our study probably because EMAP patients were geographically (i. e. with a similar diet) matched with controls.
As a combined abnormal inflammatory response with abnormal CH50 and C3 serum levels, without ocular inflammation or neoplastic diseases were documented in the first study, here we focused on risk alleles for AMD that involve different complement factors of the alternative complement pathway. There was no significant difference for AMD variants including rs1061170 (His402Tyr) and rs800292 (Val62Ile) in *CFH*, rs10490924 (Ala69Ser) in *ARMS2*. The variant rs2230199 (Arg102Gly) in C3 was significantly most frequent in EMAP patients (Table [3](#Tab3){ref-type="table"}). Abnormal alternative complement pathway response could be also involved in EMAP disease that shares with AMD pseudodrusen and not classic AMD drusen. These common AMD single nucleotide variants are also associated with increased prevalence of PSD^[@CR28]--[@CR31]^. In our cohort of 65 patients, we did not find any association with rare AMD variants, in particular Arg1210Cys in CFH that confers a risk of a 6-year earlier onset of AMD and of a subtype of extensive large drusen throughout retinal vascular arcades. With an allelic frequency of 0.005922% in ExAc (European non-Finnish population), one patient carried the rare variant C3 Lys155Gln (rs147859257) that results in resistance to C3 protein regulation and therefore alternative complement pathway amplification^[@CR14]^. Saksens and colleagues reported that patients with advanced atrophic AMD carried these rare variants more frequently than patients with neovascular AMD (11.8% vs 4.8%)^[@CR13]^. These rare AMD variants may not be linked to EMAP or may have been underestimated in this study due to the number of EMAP patients.Table 3Analysis of the five alleles of the alternative complement pathway associated with AMD noted in EMAP patients (n = 65) versus ExAc data non-Finnish European population). WT: Wild type.EMAPExAcOR (95% CI) and p-valueWT vs mutationheterozygous vs homozygousCFH rs1061170N = 65N = 33026 Wild type1447641.63 (0.9; 2.95) p = 0.103 Heterozygous28157770.95 (0.55; 1.67) p = 0.894 Homozygous2312485CFH rs800292N = 65N = 33208 Wild type40192141.17 (0.71; 1.93) p = 0.548 Heterozygous21121100.82 (0.28; 2.39) p = 0.710 Homozygous41884ARMS2 rs10490924N = 65N = 33304 Wild type35201130.77 (0.47; 1.25) p = 0.281 Heterozygous25116010.69 (0.26; 1.81) p = 0.438 Homozygous51590C3 rs2230199N = 65N = 33353 Wild type43264990.51 (0.3; 0.85) p = 0.008 Heterozygous2054352.61 (0.61; 11.18) p = 0.179 Homozygous21419
To conclude, EMAP could be revisited as a neurodegenerative disorder with predominant cone apoptosis. This study provides insights that EMAP could be caused by lifelong toxic exposure combined with a chronic inflammation and abnormal complement pathway regulation. This leads to diffuse subretinal deposits and cone apoptosis around the age of 50 with characteristic extensive macular atrophy and paving stones in the far peripheral retina. Additional WES analysis is now warranted in order to identify other genetic risks factors of this early onset macular atrophy with diffuse pseudodrusen.
Subjects and Methods {#Sec9}
====================
Study design {#Sec10}
------------
This national research program was validated and financed by the French Health Ministry and was conducted between May 2011 and July 2014. Ten referent national centers specialized in retinal diseases were mandated to recruit 115 patients with the help of all other public and private ophthalmologists. Four clinical research centers (Montpellier for the South of France, Lille for the North, Tours for the West and Dijon for the East) included three controls for each EMAP case, matched by actual residency area, age (±5 years) and sex. Controls were solicited from volunteer lists.
This research followed the tenets of the Declaration of Helsinki. The design of this study was approved by the local Ethical Committee (CPP Sud Méditerranée IV, decision March 8^th^, 2011). All methods were performed in accordance with the relevant guidelines and regulations. Informed consent has been obtained for each participant of this study.
Population {#Sec11}
----------
Common inclusion criteria for cases and controls were (1) women and men aged 40 to 80, (2) Caucasian origin.
Cases {#Sec12}
-----
Inclusion criteria for the EMAP patients were (1) onset of functional signs before the age of 55 years (2) macular patch of atrophy with a large vertical axis (3) diffuse peripheral pseudodrusen. Color fundus images were performed with Topcon Imagenet (Ophthalmic Imaging Systems, Japan) or Nidek non-mydriatic automated fundus camera AFC 330 (Nidek Inc, Japan). Autofluorescence imaging and SD-OCT imaging were performed with Combined Heidelberg Retina Angiograph + OCT Spectralis device (Heidelberg Engineering, Dossenheim, Germany). When the two national coordinators (IM and CH) disagreed on clinical features, the patient was not included. Full-field electroretinography (ERG) was performed according to the guidelines of the International Society for Electrophysiology of Vision (ISCEV) using a Ganzfeld apparatus (Ophthalmologic Monitor Metrovision, Pérenchies, France)^[@CR32]^.
Controls {#Sec13}
--------
Color fundus images were systematically performed with a non-mydriatic device (Nidek non-mydriatic automated fundus camera AFC 330, Nidek Inc, Japan) in order to exclude subjects with any retinal disease or atrophic macular lesions. Controls older than 70 years with uncomplicated drusen could be included.
Dietary patterns {#Sec14}
----------------
Nutritional data were collected using a validated food frequency questionnaire (FFQ) that recorded the usual food intakes^[@CR33]--[@CR35]^. The FFQ included 250 items and portions were estimated using a validated set of photographs (ref.^[@CR19]^) arranged by food type and meal pattern. In the analysis, the intakes were expressed in daily consumption and seasonality of some products was taken into account. The food composition was determined with Ciqual 2013 table (National Safety Agency for food, environment and activities - ANSES, <https://www.anses.fr>).
Sunlight exposure {#Sec15}
-----------------
All participants completed a self-administered questionnaire relative to sun exposure and protection during summer time for 3 periods of their life: youth (\<20 year-old), adulthood and currently (last five years). For each period of life, a first item recorded the daily duration of exposure to sunlight ("less than 2 hours", "2 to 5 hours", "more than 5 hours"). A second item recorded the frequency ("never" "rarely" "often") of protection against the sun (hat or sunglasses). In addition, we carefully noted all the residency locations and their respective durations over the life time of the individual. For each participant, the average of ambient solar radiation (ASR) was calculated using data from Météo France ([www.meteofrance.com/climat](http://www.meteofrance.com/climat)), taking into account the latitude and the duration of each residency locations, together with the duration of daily sunshine exposure^[@CR36]^.
Chemical exposures {#Sec16}
------------------
Profession of each patient and its associated toxic risk were identified. In addition, all subjects completed a 25-item chemical exposure questionnaire relative to chemicals used in professional and in non-professional activities. Chemical exposures were recorded across "Yes/No" questions and frequency levels from "once a day" to "few times a year". In addition, participants had to indicate the names of the products used (brand, type).
Environmental factors and Geographic incidence {#Sec17}
----------------------------------------------
All EMAP patients gave information on their birthplace and their subsequent residencies until inclusion to assess the lifelong environmental exposure (farming and industrialized areas). To avoid any bias associated with recruitment centers, we evaluated the incidence of EMAP by place of birth and childhood residency, and normalized to the number of inhabitants reported in 1950 (corresponding to the birth peak).
Statistical analysis {#Sec18}
--------------------
The control versus EMAP cohorts were the same as reported in Douillard *et al*.^[@CR9]^. For each potential risk factor, age-, and gender-adjusted odds-ratios (OR) for EMAP were calculated using conditional logistic regression, with EMAP as the dependent variable. In a second step, a multivariate conditional logistic model was performed with age, gender and all independent variables that were close to significance in the first model (p \< 0.20). Non-significant variables (p \< 0.10) were then deleted from the model following a backward stepwise procedure to obtain the final multivariate model. For genetic analysis, χ² test or exact Fisher test were used appropriately depending on the distribution.
Genetic analysis {#Sec19}
----------------
Whole exome sequencing (WES) was performed in 65 EMAP patients. These data were compared with non Finnish European population of ExAC database. We studied common (rs1061170, His402Tyr in *CFH* gene, rs800292, Val62Ile in *CFH* gene, rs10490924, Ala69Ser in *ARMS2* gene, rs2230199, Arg102Gly in C3, rs4151667, Leu9His in the C2/CFB factor) and rare (rs121913059, Arg1210Cys in CFH - rs34882957, Pro167Ser in C9 - rs147859257, Lys155Gln in C3) variants. We also estimated the genetic risk score based on a maximal gene-environmental model including age, sex, environmental and ocular factors, and 26 genetic AMD risk variants^[@CR37]^. Raw sequence alignment and variant calling were carried out using Illumina CASAVA 1.8 software. CASAVA performs the alignment of reads to the human reference genome (hg19) using the alignment algorithm ELANDv2, and then calls single nucleotide variants (SNVs) and short insertions and deletions (indels) based on allele calls and read depth. We used VEP version 83 (<http://www.ensembl.org/info/docs/tools/vep/index.html>) and an Integragen in-house pipeline to annotate each variant according to its presence in the 1000 Genome, ExAC or Integragen database, and according to its functional category (synonymous, missense, nonsense, splice variant, frameshift or in-frame indels. Some AMD risk alleles discovered in GWAS studies are located outside of the coding regions captured by WES and would therefore not be assessed by this method.
**Publisher\'s note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
We thank all the patients and controls who participated in this study. We acknowledge the financial support from the French Ministry of Health. We are indebted to two native English speakers, Patrick Carroll and Vasiliki Kalatzis for English corrections and critical reading of the manuscript. Funding from the French Ministry of Health. The funding organization had no role in the design or conduct of this research.
Study concept and design: A.D., M.C.P., C.D., T.M., C.H., I.M. Data acquisition: A.D., M.C.P., C.D., S.D.D., N.A.M., A.L., X.Z., I.D., E.J., B.B., C.B., S.P.R., S.A., V.G., F.D., C.A., B.W., M.M.F., M.Q., T.M., D.D., H.O., S.Y.C., P.G., O.Z., C.C.G., S.M.S., J.A.S., E.S., S.M., R.B.G., V.K., P.B., C.H., I.A., I.M. Data analysis and interpretations: A.D., M.C.P., C.D., S.D.D., N.A.M., A.L., X.Z., I.D., E.J., B.B., C.B., S.P.R., S.A., V.G., F.D., C.A., B.W., M.M.F., M.Q., T.M., D.D., H.O., S.Y.C., P.G., O.Z., C.C.G., S.M.S., J.A.S., E.S., S.M., R.B.G., V.K., P.B., C.H., I.A., I.M. Manuscript preparation: A.D., M.C.P., C.D., V.K., C.H., I.A, I.M.
Competing Interests {#FPar1}
===================
The authors declare no competing interests.
|
524 F.2d 1231
*dU. S.v.Davis
75-2560
UNITED STATES COURT OF APPEALS Fifth Circuit
11/26/75
1
S.D.Tex.
AFFIRMED
*
Summary Calendar case; Rule 18, 5 Cir.; see Isbell Enterprises, Inc. v. Citizens Casualty Co. of N
***
Opinion contains citation(s) or special notations
|
Ask HN: Slow paying client and how do you deal with them? - zenincognito
We run a small web service business.<p>Our products mostly SEO are a monthly subscription and range about 5K/month.
We are experiencing a bit of a cash flow issue as most invoices are pending from 3 months or more.<p>The clients are all happy with the services they receive but are not making the payments on time. How do you deal with your invoices ?<p>Whats the structure at your business ?
======
brudgers
To a first approximation, when a client doesn't pay on time, I stop working
for them. Clients who don't pay are worse than one less client because there's
no income and there is an allocation of resources...both directly and to
collections.
There are cases where I have had a long standing relationship with a good
client who was experiencing short term problems and let me know about it and
we worked something out. Those cases are very rare and required an existing
good relationship.
On the other hand, people who started out slow to pay never get better.
Good luck.
------
MrTonyD
I had this problem, and solved it by giving discounts. Hopefully, your pricing
will allow this. It is fairly standard to see a notation on an invoice like
1/10 net 30
That means you will give a 1% discount if they pay in 10 days, or the entire
undiscounted invoice is due in 30 days. This made a huge difference in my
business, since all my customers wanted the discount.
I should add that I was doing projects and billing for projects for the
Fortune 50 - with a good margin. So I'm not sure if this will apply to your
customers.
~~~
emmasz
It's interesting that you got a positive outcome. I also thought about this
solution, but I just assumed, that it would work like a fine on them. And if
clients would simply be fined, then they could decide for themselves whether
to be late or not. And would obviously frequently choose to be late. And
that's not something I want.
Of course, it may depend a lot on how you put it. I guess your clients rather
felt a loss aversion and didn't just get comfortable with late payments.
~~~
MrTonyD
I quoted a price - say 6 thousand dollars, for the job. Then, when I billed
it, I would bill for the full six thousand dollars, with the notation of 1/10
net 30 or sometimes 1/15 net 30 (since a few organizations had trouble getting
checks out quickly, and wouldn't even try for the ten). So there was only a
discount seen by the accounts payable people - and it was never discussed at
any time. I don't know if anybody that I actually worked with even knew I was
giving the discounts. They were just there to motivate quick payment.
At any rate, they worked very well in real life. Never any problems. Just a
matter of adding the notation at the top of the invoice.
------
gavinbaker
We have a small agency, and have these issues too. Most of the time it is just
the occasional slow payed invoice. If they get past two weeks we shoot them an
email.
Things we do to lower the risk as much as we can. #1 we get paid upfront for
the month. #2 We always ask for a credit card or ACH as part of the contract,
we still do get checks because for some that is the preferred method for them,
but we try to get the CC / ACH.
For us, if it's becoming an issue over 1-2 months, I'll personally make the
ask and find out if something is wrong. I try to give them the benefit of the
doubt that the invoice isn't getting to them or was missed.
Something people have suggested is when the payment is late, a nice
notification email that just says that you haven't received payment for this
month and according to policy, work is suspended until payment is received.
The reason we don't do this is because for us 100% of the time it has been a
missed invoice, not an intentional stoppage of payment.
~~~
zenincognito
Thanks for you advise. I appreciate it.
One of the problems with setting up Stripe/credit card payments for us is the
amount is close to 5K. Most client would prefer a invoice as opposed to a
direct debit.
Clients on a 1-2K retainers generally ask for an automated payment. Clients
above the 2K mark generally pay but are usually much slower.
We email them after 10 days and then a personal call is made every 15 days.
We have never had a non payment issue as such but the invoices are always
waiting for the directors or someone's signature to go through.
We have tried the following so far
1) Automated payments. 2) Personal email after 10 days 3) Call every 15 days.
5) SEO invoices are month in advance yet payments come 30 days after service
is delivered.
For ongoing clients that have been us with over 6 months it may be difficult
to stop services. We know they will pay as we have a good relationship.
------
davismwfl
I have lived this many times over. You will always have clients like this,
these are the best ways I have found so far.
1: do not give net 30 day terms unless a client has earned them or applied via
credit. Some exceptions can be made for large firms, but many small to medium
businesses are terrible about paying. Large businesses might be a little slow,
but almost always pay consistently the same, unless there is a known issue.
2: If you do give net 30 terms (or anything more then 10 days), provide a
discount for payment within 10 days. This makes almost all larger businesses
prioritize your invoice and get you paid. You may think it is minor, but many
businesses do this over hundreds or sometimes thousands of invoices and they
save significant amounts of money doing so.
3: Make payment details clear within your TOS/contract. For my smaller
consulting clients, if their invoice was unpaid after 3 days from the due date
I stopped all work and they lost their spot in line for services. So
essentially most of those clients had 7-10 days to pay me or I halted all
work. I also had it up front that if that happened 2 times within a short
period (defined in the contract) that all future work (if accepted) would be
prepaid. This was part of my non-negotiable contract terms. For my SaaS
product, I used similar terms, we billed their credit card for small/mid sized
clients (generally under $2k/month) and if their card was denied or we were
unable to collect that months service after 5 days we suspend their account
until it was brought current. They typically had until the next billing cycle
to do so and then their account was disabled and couldn't be reactivated
without talking to me. For enterprise clients on the SaaS product we used
invoice terms with a built in discount and a time bomb suspension, it was just
typically a little longer as I never had an enterprise not pay.
Employing those three strategies fixed most of our cash flow issues and helped
stress levels go down drastically. But sadly, it never fixes all the issues so
like others said, no client is better then one sucking up resources, dump
them.
Also, I had clients get super upset when their accounts got suspended or we
stopped working their project and they went back into the queue. But in the
end, it isn't my problem, it is theirs. I would always try to empathize with
them and would work with some to help out where it seemed right, but in the
end, fuck you pay me.
[https://www.youtube.com/watch?v=jVkLVRt6c1U](https://www.youtube.com/watch?v=jVkLVRt6c1U)
~~~
zenincognito
Thank you for your detailed post and time you took to explain your process.
1) We only give 10 days for payment. We have also tried inserting a admin fee
of $150every time invoices remain unpaid after 30 days. Clients are usually
happy paying that extra 150 then paying the invoice on time.
The important thing is that they have never questioned or even shown
disappointment/issues with a late payment fee.
2) Yes this is something a lot of people have suggested. I will be happy to
give this a try.
3) Being a service business, we emphasize this when signing them up and also
talk about invoices by building up a personal relationship. I am unsure that
stopping work will work in our favour. However this sentiment is being echoed
by many people here.
~~~
davismwfl
Your welcome.
$150 on an average invoice of $5k isn't nearly enough. My penalty is 10%. Yea
that is insane if you do an APR but I don't treat it as that, it is a one time
penalty. Also, I usually set a minimum of say $100.
On #3. You have only one option if someone doesn't pay you. Stop the service.
It is kind of like if you don't pay your cable bill, they only have one option
really, stop giving you service. Sure they can send you to collections but the
only real punishment is removing your access. Same for you.
I totally understand that being a hard concept as you probably are a good
person and want to see the good in people. But people will take advantage of
that until you draw a line and prevent it. It sucks but it is just how some
people work and have to be handled.
Here is the plus. If you setup your marketing correctly and target the correct
clients etc then this becomes a small percentage of the people you deal with.
And honestly the people who routinely do this to you are the people to cut
loose. The guy/gal who had a rough month and calls you is almost never the
worry.
------
saluki
Monthly subscriptions for your monthly services . . .
Setup your payments with Stripe so they are recurring subscriptions . . . this
will keep them paid on time.
I expect most clients will just signup so they don't have to handle your
invoices.
I would start getting your slow to pay clients signed up first but roll this
out to all clients. If a client is shying away from signing up offer them a
discount to get on subscription payment.
For slow/non-paying clients . . . not on subscription . . . a friendly email
reminder that invoice are due upon receipt or 30 days net (spell out terms on
invoice). After 30 days we will stop providing services till invoices are
caught up.
Good luck.
~~~
zenincognito
Thank you for your input.
Unfortunately, for us some of these clients make up a good chunk of our
business. They also have been with us for a good time.
Stopping work might not work in our favour. However I think your other
suggestion echoed by some others about offering some discount to either sign
up on a automated payment or paying by a certain date also makes sense.
------
thisisdallas
I prefer the horse head in bed route. Seems to work about 92% of the time.
------
chrisked
Speak open and friendly to your client that it is important for you being paid
on time. I would always call over email a client. You get a better feel on
what's going on. If multiple follow up attempts fail, I'd speak more serious
and eventually involve a lawyer. You could also explore selling your invoices.
Factoring can be a good way to mitigate the cash flow issues.
|
Influence of hypo and hyperthermia on disposition of morphine.
Using morphine as a prototype opiate anesthetic, the dispositional changes and cardiovascular effects during hypothermia (30 degrees C) and hyperthermia (40 degrees C) in dogs under isoflurane anesthesia was assessed. Single intravenous bolus injection of 1 mg/kg morphine resulted in a significant and sustained decrease in mean arterial pressure in hypothermic, but not in hyperthermic or normothermic (37 degrees C) conditions. Hypothermic dogs showed significantly higher levels of morphine both in plasma and in cerebrospinal fluid. In contrast, hyperthermia did not affect these levels. Body temperature did not affect the t1/2 alpha, however t1/2 beta and mean residence time were significantly increased while volume of distribution at steady state and total body clearance were decreased during hypothermia. The results provide evidence that hypothermia is likely to be associated with a sustained increase in opiate levels and might be associated with a enhanced side effects. The results suggests the need for a controlled clinical trial to assess the dose of opiate anesthetics during hypothermia. |
"In the south, we will run out of food for 2 million people in a matter of weeks," Annan told delegates from 60 countries at a donors meeting in Oslo.
"If there was ever a time for donor countries to get off the fence, it is now," Annan said.
January's peace agreement ended the 21-year civil war in southern Sudan , opening the way for the country to receive badly needed funding for reconstruction.
The Oslo meeting brings together donor countries, international organizations and former enemies in the conflict who have joined a transitional team to create a joint government.
"The road to peace has been long and uphill," Norwegian Prime Minister Kjell Magne Bondevik said.
"We count of you to lead the reconstruction of areas devastated by war. Your people deserve it. They have waited too long to return to Sudan and live in peace."
Sudan hopes for pledges of EUR6 billion, said the Sudanese minister for international cooperation, Yusuf Suleiman Takana.
The conflict in southern Sudan was separate from the two years of bloodshed in the country's western Darfur region, where 180,000 people have died, according to U.N. estimates.
"The situation in Darfur remains extremely grave," said Annan. He said U.N. sanctions and potential war crimes charges against those responsible for the violence were made in the interest of peace.
"The measures are not aimed at the people or government of Sudan ," said Annan. "They target individuals responsible for heinous crimes."
In eastern Sudan , tribes and opposition activists have also clashed with government forces seeking greater rights and state assistance.
World Bank-administered funds would be launched at the conference for the new Government of National Unity in the Sudanese capital, Khartoum, and for the government of South Sudan , the Norwegian government said.
The peace treaty sets out power- and wealth-sharing rules, and calls for a referendum in six years on whether the south will remain part of Africa's largest country.
In the north-south war, Islamic-dominated Khartoum fought rebels seeking greater autonomy and a greater share of the country's wealth for the Christian and animist south. The conflict is blamed for more than 2 million deaths, primarily from war-induced famine and disease.
Norway had an active role in the Sudan peace process, and was asked in April 2003 to host the international donors conference.
The conference has drawn representatives of the United States and Canada; many European countries, including Germany, the U.K., Russia and France; such Asian powers as Japan and China; and African and Arab nations. Major organizations were also represented, including the European Union and the World Bank.
Sudan 's delegation was led by two Sudanese vice presidents, Ali Osman Mohammed Taha and former rebel leader John Garang of the Sudan People's Liberation Movement |
The Two-Income Trap
From #1 New York Times bestselling author Senator Elizabeth Warren and consultant Amelia Warren Tyagi, the classic book about America’s middle class — and why economic security remains out of reach for many
In this exposé, Elizabeth Warren and Amelia Warren Tyagi show that modern middle-class families are increasingly trapped by the grinding reality of flat wages and rising costs. Warren and Tyagi reveal how a ferocious bidding war for housing and education has silently engulfed America’s suburbs, driving up the cost of keeping families in the middle class, and placing unprecedented pressure on hard-working families.
Revolutionary when it was first published in 2003, The Two-Income Trap remains disturbingly relevant today. Now with a new introduction by the authors, The Two Income Trap shows why the usual remedies won’t solve the problem and points toward the policy changes that would create better opportunities for both parents and children. |
/*
* @copyright (c) 2016, Philipp Thürwächter & Pattrick Hüper
* @license BSD-3-Clause (see LICENSE in the root directory of this source tree)
*/
import '../_init';
import {assertEquals, dataProviderTest} from '../testUtils';
import {CurrentStandardZoneAmericaNew_York} from './CurrentStandardZone';
import {Instant} from '../../src/Instant';
import {LocalDateTime} from '../../src/LocalDateTime';
import {ZoneOffset} from '../../src/ZoneOffset';
import {ZoneOffsetTransition} from '../../src/zone/ZoneOffsetTransition';
describe('CurrentZoneAmericaNewYorkTest', () => {
const ZONE_NEW_YORK = new CurrentStandardZoneAmericaNew_York();
it('test_rules_offset_of_instant', function () {
const testData = [
[Instant.parse('2016-12-21T00:00:00Z'), ZoneOffset.ofHours(-5)],
[Instant.parse('2016-06-21T00:00:00Z'), ZoneOffset.ofHours(-4)],
[Instant.parse('2016-03-13T06:59:59Z'), ZoneOffset.ofHours(-5)],
[Instant.parse('2016-03-13T07:00:00Z'), ZoneOffset.ofHours(-4)],
[Instant.parse('2016-11-06T05:59:59Z'), ZoneOffset.ofHours(-4)],
[Instant.parse('2016-11-06T06:00:00Z'), ZoneOffset.ofHours(-5)]
];
dataProviderTest(testData, (instant, offset) => {
assertEquals(ZONE_NEW_YORK.rules().offset(instant), offset);
});
});
it('test_rules_offset_of_localDateTime', function () {
const testData = () => {
return [
[LocalDateTime.parse('2016-12-21T00:00:00'), ZoneOffset.ofHours(-5)],
[LocalDateTime.parse('2016-06-21T00:00:00'), ZoneOffset.ofHours(-4)],
// gap
[LocalDateTime.parse('2016-03-13T02:30:00'), ZoneOffset.ofHours(-5)],
// overlap
[LocalDateTime.parse('2016-11-06T01:30:00'), ZoneOffset.ofHours(-4)],
];
};
dataProviderTest(testData, (localDateTime, offset) => {
assertEquals(ZONE_NEW_YORK.rules().offset(localDateTime), offset);
});
});
it('test_rules_offset_isValidOffset', function () {
const testData = () => {
return [
[LocalDateTime.parse('2016-12-21T00:00:00'), ZoneOffset.ofHours(-5), true],
[LocalDateTime.parse('2016-06-21T00:00:00'), ZoneOffset.ofHours(-4), true],
// gap
[LocalDateTime.parse('2016-03-13T02:30:00'), ZoneOffset.ofHours(-5), false],
// overlap
[LocalDateTime.parse('2016-11-06T01:30:00'), ZoneOffset.ofHours(-4), true],
];
};
dataProviderTest(testData, (localDateTime, offset, isValid) => {
assertEquals(ZONE_NEW_YORK.rules().isValidOffset(localDateTime, offset), isValid);
});
});
it('test_rules_transition', () => {
const testData = [
[LocalDateTime.parse('2016-12-21T00:00:00'), null, false, false],
[LocalDateTime.parse('2016-03-13T02:30:00'),
ZoneOffsetTransition.of(LocalDateTime.parse('2016-03-13T02:00:00'), ZoneOffset.ofHours(-5), ZoneOffset.ofHours(-4)), true, false],
[LocalDateTime.parse('2016-11-06T01:30:00'),
ZoneOffsetTransition.of(LocalDateTime.parse('2016-11-06T01:00:00'), ZoneOffset.ofHours(-4), ZoneOffset.ofHours(-5)), false, true],
[LocalDateTime.parse('2016-06-21T00:00:00'), null, false, false]
];
dataProviderTest(testData, (localDateTime, zoneOffsetTransition, isGap, isOverlap) => {
assertEquals(ZONE_NEW_YORK.rules().transition(localDateTime), zoneOffsetTransition);
if (zoneOffsetTransition != null) {
assertEquals(ZONE_NEW_YORK.rules().transition(localDateTime).isGap(), isGap);
assertEquals(ZONE_NEW_YORK.rules().transition(localDateTime).isOverlap(), isOverlap);
}
});
});
});
|
Story highlights
Two car bombs detonated outside restaurants kill 16 in the southern city of Hilla
Attacks on Tuesday and Wednesday left dozens dead and more than 130 wounded
At least 43 people were killed and more than 120 injured Thursday in Iraq as a series of bomb attacks ripped through the country for a third day running.
Eight people were killed and 21 others wounded when a car bomb exploded in the southern town of Twareej as a bus carrying Shiite pilgrims passed by, police officials said.
Sixteen more people were killed and another 75 wounded when two car bombs exploded outside popular restaurants in a commercial area of Hilla, about 62 miles (100 kilometers) south of Baghdad.
Both Hilla and Twareej, which is near the southern holy city of Karbala, are predominantly Shiite communities.
A car bomb attack on an Iraqi police patrol in al-Karama neighborhood in northern Mosul killed at least two people and injured four others, police said. Mosul is a predominantly Sunni city in the north of the country.
JUST WATCHED
July: Violence in Iraq escalates
MUST WATCH
July: Violence in Iraq escalates01:51
PLAY VIDEO
In central Falluja, another mostly Sunni town about 37 miles (60 kilometers) west of Baghdad, a suicide car bomber struck a joint police and army checkpoint outside a local bank, local police officials said.
In Taji, a few miles south of Baghdad, two roadside bombs exploded, near an Iraqi army base and on a busy road, killing one person and wounding six more.
Another car bomb exploded outside a popular restaurant on the Basmaia Highway, about 12 miles (20 kilometers) north of the capital, killing two people and wounding 11 others.
Despite the recent spate of attacks, sectarian violence has dropped dramatically since peaking between 2005 and 2007. And yet the political difficulties continue -- particularly in the wake of a recent corruption scandal surrounding a failed Iraqi-Russian arms deal.
On Thursday, longtime Iraqi government spokesman Ali al-Dabbagh stepped down amid the controversy, having accused an adviser of Prime Minister Nuri al-Maliki of launching a smear campaign against him.
"It's difficult to continue in my position in such a hostile work environment," he wrote.
Under the $4.2 billion deal forged last month, Russia would have delivered attack helicopters and mobile air-defense systems to Iraq, a sign that the war-torn nation may be starting to look beyond Washington for weapons and support.
But Ali al-Moussawi, an adviser to the prime minister, said al-Maliki ordered an investigation into the deal after he came home from a trip to Russia with concerns over "corruption." |
A Blog by Margaret Pless
Month: December 2015
Post navigation
It’s been about a year since I last wrote about Michael C. Cernovich, the part-time lawyer, full-time Internet bum who’s publicly threatened to sue me (that is, when he hasn’t got me confused with Zoe Quinn.) Back then, I smelled a rat – Cernovich claimed to be a successful lawyer, yet he was seemingly no longer was actively practicing law just a year after finally getting his law license; and the address he gave as his law offices turned out to be a rental condominium in a residential neighborhood. Looking at it on Google Street View, there was nothing about the property which suggested it was really a law office, yet it was Cernovich’s address of record to the CA State Bar, and theoretically the place clients sent this big-shot lawyer their checks.
That said, the recipes in Juice Power! are at least edible, whereas Cernovich’s advice on other topics is either useless or dangerous. Cernovich’s philosophical work ‘Gorilla Mindset’ claims to teach how to control one’s thoughts and emotions to lead a positive life, yet Cernovich routinely loses his temper on Twitter and later deletes the Tweets once he’s calmed down. Assuming the guy who wrote Gorilla Mindset should be the top practitioner of it, you’d expect Cernovich to be a lot less reactive than he is.
Although Michael claims to be a self-made man, he trolls more well-known men, drafting off their fame to get attention. He’s likely not a practicing lawyer, nor is he really a nutritionist, pick-up master or fitness instructor. In reality, Cernovich is a Twitter bug with a resume of Potemkin accomplishments – his financial success is more than likely the result of a divorce settlement, just as his fitness is based in steroid use. His tales of sexual conquest are just that, and Michael’s legal career is a similarly trumped-up story with little to no basis in fact. And considering the numerous misrepresentations Cernovich has already made to burnish his image, it’s hard to trust that anything he says isn’t a bluff.
This is why there is no reason anyone should be afraid of Cernovich or his boasts – nor should they really feel sorry for him any longer, as I have at times. Pathetic as Cernovich is, he also makes it his mission to stalk and bully others, either out of a lifetime grudge or because he thinks it will get him attention and clicks.
Cernovich is a Potemkin alpha male whose success in life is as artificially inflated as his testosterone levels. He bullies people more famous than himself in order to obtain what are by his own description modest pageviews and z-grade notoriety, and says extreme things he doesn’t believe so reactionary dregs will consider buying his e-books. And as he presumably whittles away his savings from the proceeds of his ex-wife’s hard-earned IPO windfall, I expect he will only become more desperate for attention and money.
From there, the money goes into a black box, from which the only result is more Honey Badger podcasts. Unlike most successful crowdfunding efforts, HBB doesn’t make an effort to break down what exactly their costs are. The account is unclear to whom the funds are actually disbursed, or whether anyone is drawing their salary from HBB Radio’s kitty.
Now, I have said the HBB earns “up to” 14k in a month. This is because although the HBB produces a whopping 23-26 podcasts per month, donors have the choice of how many broadcasts they want to pay for. Theoretically, donors could choose to support just a few broadcasts, regardless of how many podcasts the Badgers crank out. Since I’m not privy to their details, I can’t say for certain how many HBB donors are good for the full month, and how many are cheapskates, inflating Patreon’s numbers more than the HBB’s take-home pay. But judging by the HBB’s donor reward scheme, and how many people qualify for these backer rewards, most Patrons support the HBB to at least 25% of the sticker price.
Many of the HBB’s Patron rewards promise contact with the Badgers in some way; but to qualify for these rewards you need to commit to at least 6 shows per month. For example, 7.50$ per show (with a 6-show minimum commitment) earns access to a post-broadcast hangout with lesser Badgers; 15$ per show (x6) earns access to a more exclusive post-broadcast hangout, with the promise that “Karen sightings are very common during these aftershows!” At 25$ per show (x6) fans get a Christmas care package from the Badgers. Pay $50 per show (x6) and you’ll get a present from the Badgers on Halloween, Christmas, and Valentine’s day. The Honey Badger Milestone Goals are similarly weird and intimate, with promises that “Outtakes of Alison [Tieman] trying to get Karen [Straughan] reading erotica in the voice of Gilbert Gottfrey” or “Karen gets to give Alison a back rub”, along with promises to release increasingly more hours of Honey Badger Radio.
Since each reward stipulates a minimum commitment of six shows per month, these prices are a little deceptive. For instance, if you wanted the chance to talk to Karen Straughan in a post-broadcast hangout (the $15-per-show reward), it would end up costing you a minimum of $90/month for the privilege. And according to the HBB Patreon, six fans have qualified for this reward – which works out to at least $540 a month from those six fans alone. There is at least one guy paying at least $300 per month to the HBB for the Halloween/Christmas/Valentine’s Day present deal, even though it seems like for a minimum of $300 per month, that fan could probably buy themselves a slap-up gift.
In fact, if you tabulate all the fans who have qualified for special rewards (as I have) you’ll notice that the HBB must be pulling in at least $3,000 per month before Patreon takes their cut; assuming every donor who qualified for a reward only covered the minimum 6 podcasts. Judging by how many people qualified for rewards, it seems that most of the 171 fans who donate to the HBB are willing to commit themselves to funding at least six shows (if not more than that) per month.
At the low end, the HBB earns 3,000 per month. But potentially, up to 14k. The fundamental hypocrisy of anti-feminists raising a ton of money on Patreon so they can shit on other women with successful crowdfunding projects isn’t lost on me, especially when your paying fanbase is mostly lonely guys willing to pay $90 per month just to get a chance to talk to Karen Straughan on Skype. More than hypocritical, it’s a little exploitative – and this is from an organization that says they’re “dedicated to bringing awareness to an alternative, science based model of gender dynamics that’s inclusive of both men’s vulnerabilities and women’s agency.”
So which is it, Badgers? Are you trying to help men, or simply empty their pockets while telling them what they want to hear? |
West Richland graduation
West Richland High School said goodbye to 23 seniors Friday night during its 2013 graduation ceremony.
Salutatorian Shannon Gray thanked her teachers, family and friends, who were "always there" and influencing the class.
"There are several things that nobody tells you about high school," said co-valedictorian Deanna Michels. "Freshman year, no one tells you not to sign up for every club that is offered, because you will in fact have to fund-raise for every one of those clubs."
"And senior year, no one tells you how quickly graduation will come," she said, "OK, so maybe people have been telling you that since you were in junior high, but you don't believe them."
"The band Semisonic reminds us in their song 'Closing Time' that every new beginning comes from some other beginning's end," said co-valedictorian Erin Taylor. "Although we all worked very hard to be here today, we couldn't have done it without our parents, our teachers, our friends, our coaches, and our church families. Thank you for helping shape us into who we are today."
Several scholarships and awards were also presented. Among them were the recognition of Michels as Illinois State Scholar, and Honors Scholars Gray, Michels and Taylor. |
Horror! Comics! Anger!
Main Menu
Stake Land (2010) [REVIEW]
I wish I had some really clever reason as to why I went to see this movie, but I don’t. I saw it because JD asked me to go see it, and I am pretty sure I asked/demanded to know if it would be good. His response was that the director’s previous film, Mulberry Street, was good, and that’s really all I had to go on. I might have pretended to know what Mulberry Street was, but considering Rampaige was out of town anyway, it’s not like I had anything better to do! I also noticed that Danielle Harris was in it, and it made me wonder how busy she is. I feel like she has a movie coming out every single month, while also maintaining a rigid schedule of how many horror conventions she goes to. Good for her! I was also a little nervous that this movie would be some sort of Zombieland-esque movie, but with vampires. Luckily, it wasn’t!
Wasn’t this guy in Lord of the Rings?
We learn that in the not too distant future there has been some sort of event that causes there to be a shit ton of vampires. A young boy named Martin, played by Connor Paolo, is found and taken care of by a character referred to only as “Mister”, played by Nick Damici, who was also one of the writers. From there it is a pretty typical post apocalyptic tale, where we see this pair going from town to town trying to find a place they can feel at home. Along the way we learn that some sort of cult has been formed in the aftermath of all of this that claims to know why all of this happened, and this cult tries to kill Martin and Mister. They fail, and Mister ends up leaving the leader for dead, in hopes that a vampire will kill him. The pair continue on, and in the next town they pick up a pregnant woman named Belle, played by Danielle Harris. I should mention now, before I forget, that the vampires in this one are a lot more similar to zombies, in the sense that they don’t appear to be very smart, or necessarily fast, and operate on base instinct, and are easily tricked. This little family unit continues about their business, when they make a pit stop in a small township. While there, everything seems fine, until a helicopter passes over and tosses vampires into the city, where they start wreaking havoc. They take to the woods once more, and realize that they are being stalked by a vampire that’s smarter than any they’ve dealt with, which ends up being the cult leader who was left for dead. He can trap them and trick them, but don’t worry, he gets killed, but not after Belle has also been killed. Mister and Martin continue on their way and find a young girl who has been surviving on her own for quite some time, and is Martin’s age. Seeing that the two have a future together, Mister decides to leave, without saying goodbye, and the film ends with the new couple arriving somewhere that they believe to be safe.
Don’t worry, Danielle Harris, I’d never impregnate you and leave you in a vampire ridden world. Ya know, because I’m sterile.
Take this comment as you will, but the whole time I felt like this movie was based on a comic book. Confusing, right? It’s not intended to have a positive or negative connotation, but rather the whole film felt like it consisted of segments of a story that were strung together in succession. Rather than a two hour film, it felt like there were multiple installments or segments that were interconnected, and there wasn’t too much back story as far as the mythos of what was going on. You were kind of expected to just take the idea of “There are vampires, and we don’t know why they exist, they just do, and they are all over the place.” Other than that, this film struggled with what other films have struggled with, in the sense that for every one element I enjoyed, there was one thing I didn’t enjoy. For example, the whole concept of turning vampires into weapons by tossing them from a helicopter was something I thought was pretty cool, yet only a few minutes after that scene, when the group was trying to escape from vampires in a junkyard, the ran INTO a corn field. How is fleeing into a corn field going to make it harder for vampires to catch you, despite the fact that corn fields are confusing as fuck for people running for their lives? Didn’t you see the second Jurassic Park movie?! The story was entertaining and all, but the way the vampires were portrayed didn’t really appeal to me, in both the aesthetics of them as well as their powers and motivation. JD liked this a lot more than I did, and I’m sure others might enjoy it less than me, I think it really all depends on what you look for in a vampire movie.
Post navigation
6 responses to “Stake Land (2010) [REVIEW]”
Maybe I am giving it to much credit for being a well done indie horror pic. But goddammit it was pretty well done. And if you’ve spent any amount of time sifting through indie horror movies, you know how rare that is.
The acting ( with one notable exception) was good, the cinematography was good, the writing wasn’t bad, and there was a Santa Claus vampire. What more could you want?
Well I’d say there is a difference between well done horror and well done INDIE horror. I mean, just because it was independently made doesn’t mean it gets a pass for me not being THAT impressed. Don’t get me wrong, I enjoyed it, but only about as much as I enjoyed Daybreakers, which was another non-conventional vampire movie, despite not being “indie”. HelpfulHipster: describe anything as being “indie” as an excuse for it being bad!
I loved this flick, I wasn’t expecting too much, since I didn’t know the director or any of the stars, sans Danielle, but I was surprised to see that it was extremely well done. Personally, I liked the fact that there was no real “plot” to the movie, much like in The Road, it’s just a slice of life from a world that, thankfully, can never exist. Best vamp movie I’ve seen since 30 Days of Night (and lets be honest, 30 Days wasn’t even necessarily that good).
I will totally agree that 30 Days of Night was one of the more interesting takes on the vampire story that’s come out lately, even if the movie, and even the comic, weren’t necessarily all that great. I also tried watching George Romero’s “Martin” recently, and that was another vampire story that I couldn’t really get that into. I guess vampires just aren’t really my thing. |
Q:
excluding folder and block other folders
How to block all folders in specific folder 'inc' and exclude two folders in expression
for example i have structure
/inc/privateA/...
/inc/privateB/...
/inc/privateC/...
/inc/privateD/...
/inc/publicA/...
/inc/publicB/...
my attempts
RewriteRule ^inc/!(publicA|publicB)/ / [R=301,L]
A:
You can use negative lookahead for this:
RewriteRule ^inc/(?!(?:publicA|publicB)/) / [R=301,L,NC]
|
Deep Dark Chocolate Cake Recipe Using Organic Dark Chocolate
There’s nothing like a deep, dark chocolate cake, and the best way to get it is to start with the right chocolate. Many cakes call for cocoa powder, but using bittersweet chocolate as well as cocoa powder makes for an extra-decadent dessert.
Here in the Santa Barbara Kitchen we like using our Organic Dark Chocolate Chips: their small size makes them easy to work with, and they taste fantastic. Sometimes it’s hard not to sneak some for tasting instead of the mixing bowl!
A Winning Cake Recipe approved by a King
Here in the kitchen we have made this dark chocolate cake a few times, and brought it into the admin office, to great fanfare each time. It’s delicious with homemade buttercream frosting (which is exceedingly easy to make). This unusual cake recipe was given to us from a famous chef who was trained in France. His career as a chef catapulted to a position of fame when he was appointed as head chef for the King of Iran (The Shah: Mohammad Reza Shah) in 1970s Tehran. The chef told us The Shah Mohammad Reza Shah loved this cake when served with black tea. Traditionally the cake was presented to dignitaries visiting the Iranian Palace in an afternoon tea ceremony. One side note, the chef lived in quarters on the palace grounds and had all necessities covered as one of the Shah's (King's) acclaimed servants. The chef told us he was paid a small weekly income that was supplemented with a 2 kilo (4.4lb) bag of saffron (grown in the Iranian highlands). Saffron is one of the most expensive spices in the world and according to our calculations 4.4lbs of it today is worth around $7,000.00! That's a nice extra weekly income addition. Anyhow, the chef also advised that saffron tastes wonderful with dark chocolate and he recommended using it as a secret ingredient when crafting specialty confections our organic cakes.
Chocolate Cake Recipe Ingredients:
3/4 cup butter
1 cup powdered sugar
1/3 cup brown sugar
1 1/2 tsp. baking soda
1 tsp. baking powder
3 egg yolks
2 egg whites
2 tsp. vanilla extract
2 1/4 cups flour
1 1/2 cups sour cream or plain yogurt
3/4 cup milk
1/2 pound Organic Dark Chocolate
2 tbsp. Red Cocoa Powder
Directions:
Preheat oven to 350 degrees. Grease two 8-inch round cake pans. Mix the butter, brown sugar, and powdered sugar with a mixer until fluffy. Beat in eggs, including extra yolk, one at a time, followed by vanilla. Mix flour with baking soda and baking powder in a separate bowl, then take turns mixing small amounts of the flour mixture, sour cream, and milk until all ingredients are mixed into the main bowl. Place Organic Dark Chocolate and Rainforest Red Cocoa Powder into food processor and run for 10 seconds or until finely chopped. Mix into batter. Pour evenly into cake pans. Bake for about 40 minutes or until a toothpick inserted in center comes out clean. Wait until cakes are cooled, then frost with our favorite recipe (see below):
Chocolate Frosting Recipe Ingredients: 1/2 cup melted butter
2/3 cup Red Cocoa Powder
3 cups Confectioner's Sugar
1/3 cup milk
1 tsp. vanilla extract |
#import "TestHelper.h"
@interface EXPMatchers_beKindOfTest : SenTestCase {
Foo *foo;
Bar *bar;
Baz *baz;
id qux;
}
@end
@implementation EXPMatchers_beKindOfTest
- (void)setUp {
foo = [[Foo new] autorelease];
bar = [[Bar new] autorelease];
baz = [[Baz new] autorelease];
qux = foo;
}
- (void)test_beKindOf {
assertPass(test_expect(foo).beKindOf([Foo class]));
assertPass(test_expect(bar).beKindOf([Bar class]));
assertPass(test_expect(bar).beKindOf([Foo class]));
assertFail(test_expect(nil).beKindOf([Foo class]), @"the actual value is nil/null");
assertFail(test_expect(foo).beKindOf(nil), @"the expected value is nil/null");
assertFail(test_expect(foo).beKindOf([Bar class]), @"expected: a kind of Bar, got: an instance of Foo, which is not a kind of Bar");
assertFail(test_expect(bar).beKindOf([Baz class]), @"expected: a kind of Baz, got: an instance of Bar, which is not a kind of Baz");
assertPass(test_expect(qux).beKindOf([Foo class]));
}
- (void)test_toNot_beKindOf {
assertPass(test_expect(foo).toNot.beKindOf([Bar class]));
assertPass(test_expect(bar).toNot.beKindOf([Baz class]));
assertPass(test_expect(baz).toNot.beKindOf([Foo class]));
assertFail(test_expect(nil).toNot.beKindOf([Foo class]), @"the actual value is nil/null");
assertFail(test_expect(foo).toNot.beKindOf(nil), @"the expected value is nil/null");
assertFail(test_expect(foo).toNot.beKindOf([Foo class]), @"expected: not a kind of Foo, got: an instance of Foo, which is a kind of Foo");
assertFail(test_expect(bar).toNot.beKindOf([Foo class]), @"expected: not a kind of Foo, got: an instance of Bar, which is a kind of Foo");
assertPass(test_expect(qux).toNot.beKindOf([Bar class]));
}
- (void)test_beAKindOf {
assertPass(test_expect(foo).beAKindOf([Foo class]));
}
@end
|
Q:
Is there a script to batch erase the equivalent of a shp to multiple other shps? (in ArcGIS)
I'm looking for a way to be able to frequently update a bunch of shapefiles (different land use and other areas). I would like to erase from them the lakes and rivers which are in another shape (hydro.shp).
I could just do them on by one but it doesn't sound really time effective considering that the hydro.shp is often modified. To add to the problem, I have a basic license, so I can't use the erase tool...
So, how to batch erase without the erase tool?
A:
Here is an updated answer based on a better understanding of your request. This code performs a union between the eraser and the erasee shapefiles and then selects the overlapping features and deletes them .It then deletes the unnecessary fields to maintain just the original fields from the original shapefiles. I clip the hydro layer first just to remove any extraneous features to avoid errors. In the future you could convert this to an arcgis tool so you can feed in the shapefiles as parameters as opposed to hardcoding the paths to the shapefiles. This worked on the sample dataset I had. Let meknow if it works for you.
import arcpy
import os
#delete any data tha might be stored in memory
arcpy.Delete_management("in_memory")
#set workspace to where all your shapefiles are
arcpy.env.workspace="c:/data"
#define where the hydro shapefile is located, ideally in a different folder than the others
hydroshp="c:/mydata/hydro.shp"
fcs=arcpy.ListFeatureClasses()
for fc in fcs:
#create an empty list to be populated with the original shapefile's field names
fieldnames=[]
#List all fields in the shapefile and populate the fieldnames list with their names
fields=arcpy.ListFields(fc)
for field in fields:
fieldnames.append(field.name)
#define layer name for each shapefile
fclayer=fc.rstrip(".shp")
#create output files for the clip and the union layers
fcClip=os.path.join("in_memory",fclayer+"clip")
fcUnion=fclayer+"union.shp"#os.path.join("in_memory",fclayer+"union")
#clip the shapefile using the hydro layer
arcpy.Clip_analysis(fc,hydroshp,fcClip)
#create a union of the clipped hydro and the shapefile
arcpy.Union_analysis([fc,fcClip],fcUnion,"ALL")
#delete any unnecessary fields from your union shapefile
unionfields=arcpy.ListFields(fcUnion)
for ufield in unionfields:
if ufield.name not in fieldnames:
arcpy.DeleteField_management(fcUnion,ufield.name)
#Create layer file so you can perform a selection on it
arcpy.MakeFeatureLayer_management(fcUnion,fclayer)
arcpy.SelectLayerByLocation_management(fclayer,"WITHIN",fcClip)
#Check if there are any selected features so you don't accidentally delete all the features.
desc=arcpy.Describe(fclayer)
if desc.FIDSet != "":
arcpy.DeleteFeatures_management(fclayer)
print "done!!"
|
Polyethylenimine combined with liposomes and with decreased numbers of primary amine residues strongly enhanced therapeutic antiviral efficiency against herpes simplex virus type 2 in a mouse model.
The development of antiviral agents that have novel mechanisms of action is urgently required in the topical therapy of herpes simplex virus type 2 (HSV-2) infections. We reported previously that topical application of branched 3610-Da polyethylenimine (PEI) exhibited preventative antiviral activity. In this study, to develop therapeutic anti-HSV-2 agents, the most potent PEI combined with ~200 nm-sized liposomes with or without oleic acid (liposomes/PEI) was selected in vitro and further evaluated using in vivo studies. The mechanism of action in vivo was elucidated using PEIs with decreased numbers of primary amine residues, resulting from ethylene carbonate treatment, and polyallylamine, a linear polyamine consisting of primary amines. Cytotoxicity and antiviral activity in vitro, and the appearance of acute herpetic disease and virus yields in mice intravaginally administered with liposomes/PEI were evaluated in cell culture assays and a mouse genital herpes model, respectively. In addition, the cellular association of liposome/PEI was examined by flow cytometry and confocal microscopy. PEI showed higher antiviral activity postinfection than preinfection in vivo. Liposome/PEI and PEI with decreased numbers of primary amine residues at a dose of 0.2 mg PEI/mouse exhibited more potent therapeutic antiviral activity than acyclovir and PEI alone without acute lesion appearance or toxicity pre- or postinfection, but polyallylamine was moderately effective only preinfection. Liposome concentrations were important for the effectiveness of liposome/PEI. This finding suggests that PEI combined with liposomes and with slightly decreased numbers of primary amines may be an effective vaginally administrated antiviral drug, and secondary and tertiary amine residues of PEI may contribute to the inhibitory efficiency against viral infection. |
The United States has experienced its share of military successes over the years. But its armed forces have also suffered some terrible setbacks. Here are eight of the very worst.
Compared to many other countries, the United States has never really suffered a cataclysmic military disaster. The continental U.S. has never faced a significant invasion force, its government has never been supplanted by that of a rival nation’s, nor has its armies ever experienced a colossal collapse on a scale similar to what happened to the German Sixth Army at Stalingrad. Since its inception as a nation, however, the U.S. has involved itself in a number of foreign campaigns, both near and far. And, as such, it has not been immune to military defeats, misfortune, and humiliation.
For the purposes of this list, therefore, a “military disaster” will be defined as a historically significant episode in which the U.S. military endured any of the following problems: protracted mission failure, an inability to thwart enemy action, or a breakdown in command and control structure. It can also include an embarrassing, lopsided, or unexpected defeat. Here’s the list in chronological order.
(1) Invasion of Canada, 1812
In what seemed like a good idea at the time, President James Madison led his country into war against British Canada. Madison was heavily influenced by the Republican “war hawks” from the frontier political districts of the South and West who sought to challenge the British blockade, many of whom also advocated for the annexation of some British Canadian territory. Some argued that an invasion was the only way to preserve American honor.
Battle of Queenstown Heights, October 13, 1812 (Painting by John David Kelly, circ. 1896/Library and Archives Canada)
Once hostilities broke out, dreams of a decisive victory quickly collapsed. As noted by historian Jesse Greenspan:
Yet despite its population advantage, the United States had only about 12,000 men in uniform, including “too many incompetent officers and too many raw, untrained recruits,”...A number of other factors also favored Canada at the war’s outset. For one thing, the British controlled the Great Lakes and were therefore better able to move troops and supplies. Moreover, they received support from Canadians, who many Americans falsely believed would welcome them as liberators, and from Native American tribes worried about U.S. expansionism. “The USA was woefully unprepared,”...“Plus, the logistical challenges of waging war on a distant frontier were daunting if not insuperable.”
By the following year, the British had taken complete control of the waters along the U.S. East Coast, harassing ships and threatening cities along the shoreline. Infamously, a fleet sailed up Chesapeake Bay, unleashing British forces who set government buildings afire in the District of Columbia, the new U.S. capital. By 1814, the U.S. government faced internal secession and external invasion. After Napoleon was defeated in 1814, the U.S. came to terms with Britain by signing the Treaty of Ghent which required both sides to give up territorial gains.
(2) Battle of Harpers Ferry, 1862
Just two days before the cataclysmic Battle of Antietam (another disaster we’ll get into in just a bit), Confederate troops handed Union forces its most significant military setback of the American Civil War by that point.
Harpers Ferry as it appeared in 1865 (public domain)
As part of the Confederacy’s drive north, Robert E. Lee’s Army of Northern Virginia sought to occupy the Shenandoah Valley to secure its line of supply and communications. As part of the plan, a portion of the army under the command of Major General Thomas J. “Stonewall” Jackson would capture the garrison at Harpers Ferry in West Virginia.
During the fighting on the Maryland Heights from September 12 to 15, 1862, incoming Confederate columns were surprised to see that critical positions of the town had been left undefended. Jackson exploited the situation by positioning artillery at strategic points around the town and ordering Major General A. P. Hill to move his troops down the bank of the Shenandoah River in preparation for a surprise flank attack. The next morning, on September 15, Jackson’s 50 guns unleashed an artillery barrage from all sides, followed by an infantry assault. Union commander Colonel Dixon S. Miles soon realized the situation was hopeless and surrendered—but not before suffering a mortal wound that he died from the next day.
It was a resounding Confederate victory, one that resulted in the largest surrender of U.S. forces during the Civil War. Harpers Ferry was the largest Civil War engagement in present-day West Virginia, and is considered Jackson’s most complex and complete tactical victory. And as noted, it also set up the Battle of Antietam.
(3) Battle of Antietam, 1862
Though historians consider it a draw, the Battle of Antietam represented an important moral victory for Union forces. But, owing to severe blunders by both sides, it sparked the Civil War’s worst single day of casualties. Adding insult to injury, the battle wasn’t even necessary.
Confederate dead on the Hagerstown road at the Battle of Antietam (Credit: Alexander Gardner (photographer)/Library of Congress)
After Harpers Ferry, General Lee had time to occupy a strong defensive position behind Antietam Creek, near Sharpsburg, Maryland. Though outnumbered 87,000 to 50,000, Lee managed to repel Major General McClellan’s attacks until Jackson’s troops arrived.
The Battle of Antietam turned out to be the bloodiest day in American military history. Some 7,800 soldiers were killed, and another 15,500 wounded. U.S. forces wouldn’t experience single-day losses like that until D-Day, when 6,000 American troops were killed.
After the battle, President Lincoln declared Antietam a victory, but argued that McClellan should have fought Lee to the finish. And indeed, McClellan was in a position to do so, but he was reluctant to proceed owing to the appalling number of casualties. He let Lee fall back, ordering his men to bury the dead and set up field hospitals for the wounded. As noted by Colonel Ezra Carman, who survived the battle to write about it, “more errors were committed by the Union commander than in any other battle of the war.”
Lee also deserves some of the blame. British historian J. F. C. Fuller argues that Antietam was a “totally unnecessary battle” — one that forced Lee’s troops from Maryland, while also providing the “victory” that Lincoln needed before delivering the Emancipation Proclamation.
(4) Pancho Villa Expedition, 1916—1917
This episode in U.S. military history served more as an embarrassment than a disaster, but the failed effort to capture Mexican revolutionary Francisco “Pancho” Villa was not without its consequences. What’s more, the reckless “Punitive Expedition,” as it was called, could have spiraled out of control, dragging the U.S. into a war with Mexico at a time when its forces were desperately needed elsewhere.
An artillery drill near the Mexican border, 1916 (public domain)
In early 1916, Villa’s forces attacked U.S. mining executives in Mexico, followed by raids in the town of Columbus, New Mexico, resulting in the deaths of 16 Americans. In response, the Wilson administration organized an expedition to pursue Villa with U.S. Army General John J. Pershing in command. His 10,000-strong force failed to capture the “bandit,” though the main body of Villa’s command was quashed. U.S. forces encountered significant local hostility in the attempt and were, in the words of Pershing, “outwitted and out-bluffed at every turn.”
An obviously American cartoon, March 10, 1916.
Afterwards, the inexperienced U.S. military framed the incident as “a learning experience.” Pershing would later write:
[W]hen the true history is written, it will not be a very inspiring chapter for school children, or even grownups to contemplate. Having dashed into Mexico with the intention of eating the Mexicans raw, we turned back at the first repulse and are now sneaking home under cover, like a whipped curr with its tail between its legs.
As noted in the U.S. historical archives: “The Punitive Expedition was one of several incidents during which the United States Government or its officials intervened directly in Mexican affairs during the Mexican Revolution. Concern over U.S. power and corporate control of Mexican natural resources would lead to further U.S.-Mexican disagreement over the nationalization of the oil industry in the 1920s.”
Poor relations between the two countries did not go unnoticed by Imperial Germany—not to mention U.S. military unpreparedness—who sought to exploit the situation by turning Mexican President Venustiano Carranza against the United States. In the infamous Zimmerman Telegram, the German Foreign Ministry offered the Mexican government U.S. territory in exchange for joining the German cause and tying U.S. forces to the continent. Instead, the scheme backfired, shifting American public opinion in favor of joining the Allies in the Great War.
(5) Battle of Bataan, 1941-42
Soon after Pearl Harbor, the Japanese Imperial Army made its move on the Philippines’ main island of Luzon where U.S. General Douglas MacArthur’s troops were standing firm. The ensuing struggle for the island, known as the Battle of Bataan, would end in disaster for U.S. troops, severely compromising the nation’s hold on its Pacific territories.
On December 22, 1941, 43,000 Japanese soldiers landed on beaches 200 kilometers (124 miles) north of Manila. MacArthur had 130,000 men at his disposal, but the vast majority were Philippine reserve units, making the actual number closer to 31,000. The battle-hardened Japanese troops pushed hard, forcing MacArthur to withdraw his troops to the Bataan Peninsula on the west side of Manila Bay. The withdrawal of 15,000 U.S. and 65,000 Philippine soldiers was wrought with difficulties. Once established on the Peninsula, MacArthur struggled to feed 80,000 soldiers and 26,000 civilian refugees owing to the Japanese blockade. On January 9, 1942, Japanese troops began their assault on Bataan. MacArthur’s troops fought valiantly, but were ravaged by exhaustion, hunger, malaria, dengue fever, and dysentery.
(Chicago Tribune)
Eventually, after weeks of bitter fighting, President Roosevelt ordered MacArthur to leave for Australia. Along with his family and staff, he departed on March 12. Left in charge was Major General Jonathan Wainwright, who recognized the hopelessness of the situation. Remarkably, his troops fought on until May 5. The remaining 13,000 troops were forced to surrender—setting up one of the darkest episodes in U.S. military history—the Baatan Death March.
U.S. troops early in the Baatan Death March (Kings Academy)
Out of the 130,000 U.S. and Filipino troops, around 10,000 were killed, 20,000 wounded, and 75,000 taken prisoner. In comparison, the Japanese suffered 19,000 casualties.
(6) Battle of Kasserine Pass, 1943
The U.S. Army’s first encounter with the German Wehrmacht in World War II was a complete fiasco. Ultimately, the battle didn’t alter the course of the war, but it served as a rude wake-up call for the United States.
A Medium Tank M3 “Lee” from the U.S. 1st Armored Division during the Battle of Kasserine Pass, Tunisia. (U.S. Army Corps)
Beginning on January 30, 1943, General Lloyd Fredenhall’s freshly arrived American troops were mercilessly attacked in Tunisia by General Erwin Rommel’s rearmed 21st Panzer Division. The situation went from bad to worse in the following weeks. Writing in the Second World War, historian Antony Beevor explains:
Rommel decided to remove the American threat altogether with a three-pronged offensive. On 14 February, the 10th Panzer Division attacked westwards out of the Faid Pass, while the 21st Panzer Division came up from the south in a pincer. Seventy American tanks were destroyed in the first day’s fighting round Sidi Bou Zid. One of them was knocked out at a range of 2,700 meters by a Tiger’s 88mm gun. The shell of a Sherman’s 75mm could not penetrate a Tiger’s frontal armour even at point-blank range. On 16 February, a panzer crewman wrote home to apologize disingenuously for not having written, but his division had been fighting the Americans of the last couple of days. ‘You will have heard from yesterday’s Wehrmacht announcement that we shot up more than ninety tanks.’
Burning American tanks littered the landscape, while charred and panic-stricken American soldiers raced their jeeps, trucks, and any other wheeled vehicles away from the scene. Fredenhall had no idea what was going on at the front as he preferred his headquarters to be located far in the rear. When it was over, his II Corps lost over 6,000 men, 183 tanks, 104 half-tracks, more than 200 field guns, and 500 transport vehicles.
A scene from the movie Patton (1970), showing the disastrous aftermath of Kasserine Pass.
But as Beevor points out, it was even worse than that:
It had been a savage baptism of fire, made worse by confused orders from above. Troops fired at their own aircraft, destroying or damaging thirty-nine of them, and Allied squadrons attacked the wrong targets. On 22 February, some B-17 Flying Fortresses bombed a British Airfield instead of the Kasserine Pass.
It’s no wonder that the British would often quip, “How green is my ally?” As a consolation, the grossly ineffective Fredenhall was relieved of his command, replaced by Major General George S. Patton.
(7) Bay of Pigs Invasion, 1961
Two years after Fidel Castro came to power in an armed revolt, the U.S. government, in consultation with the CIA, dispatched a paramilitary group, called Brigade 2506, to Cuba in an effort to overthrow the new regime and establish a non-communist government friendly to the United States. But the armada, which consisted almost exclusively of Cuban exiles, was grossly outnumbered and poorly supported, resulting in a resounding failure after just three days.
The 1,400-strong invasion force landed at soggy beaches along the Bay of Pigs on April 17, 1961. The Cuban military was fully expecting them. Through Cuban exiles in Miami, Castro had learned of the invasion as early as October 1960. Almost immediately, the armada came under heavy fire. Cuban planes strafed the invading force, sank a pair of escort ships, and quashed its air support. By the next day, some 20,000 Cuban troops were advancing towards the beach. In response, the U.S. dispatched a half-dozen support aircraft, but they were quickly shot down.
Cuban troops inspecting a down airplane (Credit: unknown)
The invasion was crushed. Some 1,200 members of Brigade 2506 surrendered and more than 100 were killed. After 20 months of captivity, the U.S. government negotiated for their release by offering Castro $53 million worth of baby food and medicine in exchange for the prisoners.
While relatively small in scope, the half-hearted attempt to overthrow the Cuban government was not without its consequences. It was a tremendous embarrassment to the Kennedy Administration and the CIA. The botched coup also galvanized the public’s resolve in Cuba; in a note sent to JFK, Che Guevara wrote, “Thanks for [the Bay of Pigs]. Before the invasion, the revolution was weak. Now it’s stronger than ever.” The failure to remove the Castro regime also set the stage for Soviet opportunism and the ensuing Cuban Missile Crisis in the following year—a crisis that nearly led to all-out nuclear war.
(8) Disbanding the Iraqi Army, 2003
The Iraqi army was ordered to disband during the spring of 2003—a decision that, in one fell swoop, eliminated the best means of securing Iraq from insurgent activity, while at the same time providing the enemy with some of its best commanders and fighters.
Rebuilding the army: Iraqi T-72s pass in review, Baghdad, June 30, 2009. (U.S. Air Force)
As noted by Robert Farley, an assistant professor at the Patterson School of Diplomacy and International Commerce, the decision to do so eradicated 80 years of institutional history. He writes:
The Royal Iraqi Army had come into existence in the early 1920s, when Iraq remained a protectorate of the British Empire. It had revolted in 1941, but the British made the wise decision to keep the force together so as to maintain order. In 1948, its units fought against Israeli forces during the wars of Israeli independence, and it participated in the 1967 war, if briefly. In the 1980s, it waged an eight-year struggle against Iran. While its legacy was complex, for many Iraqis, service in the Army (and in particular its performance against Iran) remained a source of personal and national pride.
Today, the army, or what’s left of it, is now the laughing stock of the region, retreating on a regular basis from ISIS forces. And indeed, the rise of ISIS is closely intertwined with the disbanding of the Iraqi military. One expert estimates that more than 25 of ISIS’s top 40 leaders served in the Iraqi military at some point.
“We could have done a lot better job of sorting through that and keeping the Iraqi army together,” General Ray Odierno told TIME magazine back in May. “We struggled for years to try to put it back together again.”
(Dis)Honorable mention: The Battle of Chosin Reservoir (1950), a decisive battle in the Korean War involving a UN coalition of U.S., British, and Korean forces set against the People’s Republic of China. This battle essentially established the 38th parallel separating north from south Korea.
Final notes: American forces did not experience a major disaster during the First World War, but its overall performance left much to be desired (also see Andrew Wiest’s essay, “The Reluctant Pupil: The American Army on the Western Front, 1917-1918,” a chapter in Matthias Strohn’s World War I Companion). And as for the myth that U.S. forces never lost a battle during the Vietnam War, this excellent article by G2mil’s Carlton Meyer shows this is far from true.
Sources: James A. Henrieta et al., America’s History | History.com | Harpers Ferry National Park Service | Civil War Trust 2 | U.S. Dep’t of State Archive | Antony Beevor: The Second World War | JFK Presidential Library and Museum | TIME: “How Disbanding the Iraqi Army Fueled ISIS”
Contact the author at george@io9.com and @dvorsky . Top image: Battle of Antietam by Kurz & Allison/Library of Congress. |
Cloning and molecular characterization of a voltage-dependent anion-selective channel (VDAC) from Drosophila melanogaster.
A full length voltage-dependent anion-selective channel (VDAC) cDNA was cloned from Drosophila melanogaster by expression library screening using an antibody against an insect VDAC protein. The cDNA clone (denoted DmVDAC) is 1082 base pairs (bp) in length and contains an open reading frame (bp 62-907) encoding a 282 amino acid protein which has a predicted molecular mass of 30550 Da, a predicted pI of 6.98 and no cysteines. Hydrophobicity analysis suggests 15 or 16 membrane-spanning domains. The DmVDAC amino acid sequence has variable homology with VDACs from other species ranging from 62% identity with a human VDAC to 23% identity with a Dictyostelium discoideum VDAC. DmVDAC has 92% identity with the 38 conserved residues in a VDAC consensus sequence. DmVDAC was expressed in VDAC-null yeast but failed to rescue viability. DmVDAC has 88% identity at the amino acid level and 99% identity at the nucleic acid level with a recently reported D. melanogaster VDAC sequence (A. Messina et al., FEBS Lett. 384 (1996) 9-13). Homology analyses with the Messina and other VDAC sequences indicate that the amino acid differences are due to minor errors in the Messina sequence. Southern blots and chromosomal in situ hybridizations suggest a single VDAC gene occurs in the fly with a locus at 32B on the left arm of the second chromosome. |
Labour Member of Parliament Jess Phillips has been called a “traitor” after tweeting that she is not worried about British loss of sovereignty to the European Union (EU). She has refused to apologise for the remark, instead insisting that Britain still retains power despite ceding sovereignty to a foreign bloc.
The tweet came during an exchange on Britain’s membership of the European Union prompted by a tweet by Ms Phillips, in which she claimed to be planning to vote to remain in the EU because her brother lives in France.
My twin nephews coming from France today.The life my brother has made there is a big reason why I want to remain pic.twitter.com/Fu78Kb1qxp
Last September Ms Phillips was named by Breitbart London as the 94th most influential left winger. Iain Dale, who compiled the list remarked: “Phillips is going to be one of the characters of the new Parliament.” His prediction has certainly proved accurate as the Birmingham Yardley MP has scarcely been out of the headlines ever since.
In November she was criticised for rudely mocking a suggestion by a male colleague that Parliament set aside some time to debate issues which affect men, such as the high rate of suicide among young men in particular.
Ms Phillips “interrupted proceedings by loudly busting into laughter, covering her face with her hands,” Breitbart London reported at the time. Her colleague responded: “I’m not entirely sure why it’s so humorous.”
She then claimed to be the “victim” of a “violent hate campaign” when the public took to Twitter to criticise her stance.
She hit headlines again in January thanks to an appearance on Question Time in which she dismissed the Cologne New Year sex attacks as being “very similar” to an average night in central Birmingham “where women are baited and heckled.”
In fact, more complaints of sexual abuse, including gang rape, were lodged during the one single night in Cologne than had been recorded in Birmingham for the whole of the year.
Her comments prompted outraged constituents to call for her resignation.
And on Saturday she again inspired anger when she accused the Prime Minister David Cameron of “colluding with child abusers” by blocking plans by cabinet ministers to introduce compulsory sex education even when it goes against the wishes of parents.
She later told the Independent on Sunday that she did not regret the the comment, saying: “This is benign neglect rather than malign neglect. I don’t think David Cameron wants children to be abused, but it is the same result. It’s neglect and collusion whether or not he means to do it.” |
The Commander of the U.S. Pacific Command, Admiral Harry Harris, testifies before a House Armed Services Committee hearing on "Military Assessment of the Security Challenges in the Indo-Asia-Pacific Region" on Capitol Hill in Washington, U.S, April 26, 2017. REUTERS/Yuri Gripas
WASHINGTON (Reuters) - The United States will likely carry out new freedom of navigation operations in the South China Sea soon, top U.S. commander in the Asia Pacific region, Admiral Harry Harris, said on Wednesday, without offering details.
Asked about any upcoming operations, Harris said: “I take direction and guidance from the secretary of defense and the national command authority on the conduct of those operations. I think we’ll be doing some -- soon.” |
756 S.W.2d 394 (1988)
Shannon DROOKER, et al., Appellants,
v.
SAEILO MOTORS, et al., Appellees.
No. 01-87-00793-CV.
Court of Appeals of Texas, Houston (1st Dist.).
August 4, 1988.
Rehearing Denied August 4, 1988.
*395 Harry J. Van Deilen, W. Scott Red, Jr., Houston, for appellants.
James D. Ebanks, Giessel, Stone, Barker & Lyman, Houston, for appellees.
Before EVANS, C.J., and DUNN and SAM BASS, JJ.
OPINION
SAM BASS, Justice.
We withdraw our opinion of July 7, 1988 and substitute this opinion in its stead.
*396 S. Drooker, A. Drooker, and E. Christian sued Saeilo Motors and Saeilo Motors, Inc. ("Saeilo Motors"), Time Arts and Gifts ("Time Arts"), Original World Products ("World Products"), News World Communications ("World Communications"), and Alex Murphy for damages resulting from a car accident. The trial court granted summary judgment for all defendants except Murphy, and severed the suit against Murphy. This is an appeal from the decision concerning Saeilo Motors, Time Arts, World Products, and World Communications.
We affirm in part, and reverse and remand in part.
The appellees initially contend that the record available for our consideration is limited to those items enumerated in the trial court's order of severance, citing Debell v. Texas Gen. Realty, 609 S.W.2d 892 (Tex.Civ.App.Houston [14th Dist.] 1980, no writ). Debell, however, merely reiterates the rule that when a summary judgment record is incomplete, the omitted documents are presumed to establish the correctness of the judgment. Id. at 893. Because the appellants have provided this Court with a complete record on appeal, Debell does not control our determination of this case. We reject the appellees' reasoning on this issue.
In their first four points of error, the appellants assert that they raised material issues of fact that should have precluded the granting of a summary judgment. To establish entitlement to a summary judgment, a movant must establish that there is no genuine issue of material fact and that he is entitled to judgment as a matter of law. Swilley v. Hughes, 488 S.W.2d 64, 67 (Tex.1972); Tex.R.Civ.P. 166-A(c).
The burden of proof is on the movant, and all doubts regarding the existence of a genuine issue of fact are resolved against him. Roskey v. Texas Health Facilities Comm'n, 639 S.W.2d 302, 303 (Tex.1982) (per curiam). The burden that exists at a trial on the merits is immaterial to the burden that a movant for summary judgment must bear. Missouri-Kansas-Texas Ry. Co. v. City of Dallas, 623 S.W.2d 296, 298 (Tex.1981); Glenn v. Prestegord, 456 S.W.2d 901, 902-03 (Tex.1970).
Once the movant has established a right to a summary judgment, the burden shifts to the non-movant. The non-movant must then respond to the motion for summary judgment and present to the trial court any issues that would preclude summary judgment. City of Houston v. Clear Creek Basin Auth., 589 S.W.2d 671, 678 (Tex. 1979). Every reasonable inference must be indulged in favor of the non-movant and any doubts resolved in his favor. Nixon v. Mr. Property Management Co., 690 S.W. 2d 546, 548-49 (Tex.1985). In other words, we consider the summary judgment evidence in the light most favorable to the non-movants. Wilcox v. St. Mary's Univ., 531 S.W.2d 589, 593 (Tex.1975). The non-movant may defeat the opposing party's motion by a showing that at least one element of each of the movant's causes has not been established with sufficient summary judgment evidence. See Westland Oil Dev. Corp. v. Gulf Oil Corp., 637 S.W.2d 903, 907 (Tex.1982); City of Houston v. Clear Creek Basin Auth., 589 S.W.2d at 678-79.
One of the appellants' theories of recovery was based upon the doctrine of respondeat superior. To defeat this theory, the appellees were required to establish, as a matter of law, that:
(1) the [allegedly negligent] actor was not an employee; and/or,
(2) no negligent act occurred; and/or,
(3) the act that occurred was not within the scope of the actor's employment.
See Leadon v. Kimbrough Bros. Lumber Co., 484 S.W.2d 567, 569 (Tex.1972); Robertson Tank Lines, Inc. v. Van Cleave, 468 S.W.2d 354, 357 (Tex.1971).
In their first point of error, the appellants contend that the trial court erred in granting summary judgment because there was an issue of material fact about whether Murphy was an employee of Time Arts, World Products, and World Communications. (The appellants do not contend that Murphy was an employee of Saeilo Motors. Therefore, the points of error discussing *397 the appellants' respondeat superior theory do not apply to Saeilo Motors.)
The contention raised in the appellees' motion for summary judgment related to whether Murphy's allegedly negligent act occurred within the scope of his employment. In so contending, the appellees premised their argument on the assumption that Murphy was an employee. Therefore, for purposes of this appeal, the appellants' first point of error is irrelevant.
We overrule the first point of error.
In their second point of error, the appellants assert that the trial court erred in granting summary judgment because they raised a material question of fact about whether Murphy was acting within the scope of his employment. In establishing that a party was acting within the scope of his employment, a plaintiff is not required to show that the negligent act was expressly authorized by the employer; rather, a plaintiff need show only that the act was:
(1) within the general authority given him;
(2) in furtherance of the employer's business; and,
(3) for the accomplishment of the object for which the employee was employed.
Leadon v. Kimbrough Bros. Lumber Co., 484 S.W.2d at 569; Robertson Tank Lines, Inc. v. Van Cleave, 468 S.W.2d at 357; Dieter v. Baker Serv. Tools, 739 S.W.2d 405, 407 (Tex.App.Corpus Christi 1987, writ denied).
Therefore, an employer is not liable for actions that an employee takes in his own interests and not to further the purpose of carrying out the master's business. Smith v. M Sys. Food Stores, 156 Tex. 484, 486-87, 297 S.W.2d 112, 114 (1957); SouthWest Dairy Prod. Co. v. DeFrates, 132 Tex. 556, 558-59, 125 S.W.2d 282, 283 (Tex. Comm'n App.1939, opinion adopted); Viking v. Circle K Convenience Stores, Inc., 742 S.W.2d 732, 734 (Tex.App.Houston [1st Dist.] 1987, writ denied).
When an employee deviates from the performance of his duties as an employee for his own, personal purposes, his employer is neither responsible nor liable on a respondeat superior theory for what occurs during that deviation. SouthWest Dairy Prod. Co. v. De Frates, 132 Tex. at 558-59, 125 S.W. at 283; Viking v. Circle K Convenience Stores, Inc., 742 S.W.2d at 734 (and cases cited therein). In the instant case, at the time of the accident, Murphy and two employees were en route to a restaurant for dinner.
The appellants argue that the following summary judgment evidence should have precluded the trial court from ruling in favor of the appellees: (1) Murphy's driving of the appellees' vehicle was a "common occurrence"; (2) Murphy's driving was done in connection with employment activities; (3) the appellees' employees had conducted "driving lessons" with Murphy; (4) the appellees and their employees had knowledge of the conduct described in (1) through (3); (5) Murphy and his companions, who were on their way to dinner at the time of the accident, intended to return to work after dinner; and (6) working hours were from 9:00 AM to 9:00 PM.
The appellants' contention is that the trip to dinner was not a "deviation" or "personal errand," but, rather, a mingling of personal interests with employment concerns. The appellants assert that the facts, listed (1) through (6) above, support this conclusion.
The appellees counter with the contention that Murphy was "not acting in the course and scope of his employment at the time of the accident, but was engaged in a purely personal errand, totally unrelated to the tasks for which he may have been allegedly employed." They supported this argument in their motion for summary judgment with an affidavit of Colaneri, a manager for appellees, stating that employees ate dinner on their own time and not in furtherance of the appellees' interests. The appellees also referred to deposition testimony of Murphy and one of the employees who accompanied him, stating that they were on their way to dinner.
We recognize that there is authority to the effect that an employee is acting within the scope of his employment duties if his *398 acts are a mingling of personal and employment interests. See Josey-Miller Co. v. Sheppard, 357 S.W.2d 488, 489 (Tex.Civ. App.Beaumont 1962, no writ). The appellants did not produce any summary judgment evidence to the contrary. Although factors (1) through (4) are relevant to the appellants' "negligent entrustment" theory, they do not refute the appellees' contention that Murphy was engaged in a deviation from his employment responsibilities at the time of the accident. Furthermore, factors (5) and (6) do not, on their own, raise a question of fact about whether a "mingling" of personal and employment interests occurred. In failing to refute the appellees' summary judgment argument and evidence, the appellants cannot now rely solely on the caselaw concerning the mingling of personal and employment interests; the appellees provided summary judgment evidence that Murphy was on a purely personal errand at the time of the accident, and so, the appellants were required to come forward with summary judgment evidence to the contrary if they were to raise a question of fact on the issue.
SouthWest Dairy Prod. Co. v. De Frates, 132 Tex. at 556, 125 S.W.2d at 282, involved a similar factual setting. In SouthWest Dairy, the defendant's employee was the driver of one of the defendant's trucks. His job required that he drive a truck, on a daily basis, from the defendant's plant to a washing facility, also maintained by the defendant. One evening, the employee detoured from his work route and went home for supper. On the return trip (i.e., while returning to work), the accident occurred. A jury found in favor of the plaintiff, finding that the employee was acting within the scope of his employment at the time of the accident. The defendant appealed this decision, and the Texas Supreme Court adopted the Commission's holding that these facts did not support a finding that the employee was acting in the scope and course of his employment. Similarly, in the instant case, Murphy was leaving the workplace, with the intent to return after dinner, when the accident occurred.
Other Texas cases have held in this vein: Robertson Tank Lines, Inc. v. Van Cleave, 468 S.W.2d at 354 (holding that, although the employee was told to return his employer's truck from Odessa to Corpus Christi, and was allowed to eat and sleep at places of his choice, because the employee chose to drive eight miles in a direction opposite from Corpus Christi to visit his father, etc., the employee acted outside of the scope and course of his employment); Mitchell v. Ellis, 374 S.W.2d 333, 336 (Tex.Civ.App.Fort Worth 1963, writ ref'd n.r.e.) (stop to purchase cigarettes while driving employer's truck during working hours is purely personal errand); and Hudiburgh v. Palvic, 274 S.W.2d 94, 98-99 (Tex.Civ.App.Beaumont 1955, writ ref'd n.r.e.) (employee's stop to purchase flashlight batteries while returning from errand for employer held a personal deviation and not within scope and course of employment).
The appellants have not provided any summary judgment evidence that Murphy was acting in the course of his employment. The appellees have provided summary judgment evidence that Murphy was not acting in the course of his employment. We hold that the appellees' evidence precluded as, a matter of law, the establishment of the essential element of respondeat superior, viz., that Murphy's negligent act was within the scope of his employment. Leadon v. Kimbrough Bros. Lumber Co., 484 S.W.2d at 569; Robertson Tank Lines, Inc. v. Van Cleave, 468 S.W. 2d at 357.
We overrule the second point of error.
In their third point of error, the appellants contend that the trial court erred in granting summary judgment for the appellees because they raised a question of material fact concerning whether the appellees negligently entrusted the loaner car to Murphy's control. The elements of negligent entrustment are as follows:
(1) entrustment of the vehicle by the owner;
(2) to an unlicensed, incompetent, or reckless driver;
(3) that the owner knew or should have known was unlicensed, incompetent, or reckless;
*399 (4) that the driver was negligent on the occasion in question; and,
(5) that the driver's negligence was the proximate cause of the accident.
Schneider v. Esperanza Transmission Co., 744 S.W.2d 595, 596 (Tex.1987); Williams v. Steves Indus., Inc., 699 S.W.2d 570, 571 (Tex.1985).
First, we will address Saeilo Motors' liability. Toyoda, a manager of Saeilo Motors, stated in deposition that Saeilo Motors loaned the car to Colaneri, one of the appellees' managers, while Saeilo Motors repaired Colaneri's car, that Saeilo Motors specifically entrusted the car to Colaneri, and that Saeilo Motors did not entrust the vehicle to Murphy. Toyado stated further that he entrusted the vehicle to Colaneri with the understanding that only Colaneri would use it. The appellants did not offer any summary judgment evidence to rebut this statement. Therefore, the appellees provided unrefuted summary judgment evidence that the first and second elements of negligent entrustment were unsatisfied (i.e., that no entrustment to Murphy took place). See Schneider v. Esperanza Transmission Co., 744 S.W.2d at 596. We overrule the third point of error as to Saeilo Motors.
Next, we address whether the remaining appellees (Time Arts, World Products, and World Communications) negligently entrusted the vehicle to Murphy. Summary judgment evidence in the form of Colaneri's affidavit reflected that Colaneri was unaware of Murphy's driving the loaner vehicle on the date of the accident. Although this standing alone, under certain circumstances, might be sufficient to establish as a matter of law that a plaintiff failed to satisfy the first element of negligent entrustment (entrustment of a vehicle by the owner), the facts in the instant case prevent this conclusion.
The appellants provided deposition testimony by Murphy that he had driven the appellees' vehicles on many occasions with the knowledge and consent of other employees. There was further testimony that indicated Colaneri himself was aware that Murphy was driving the appellees' vehicles. The deposition testimony is some evidence that Murphy was authorized to drive the appellees' vehicles in general. See Firestone Tire & Rubber Co. v. Blacksher, 477 S.W.2d 338, 340 (Tex.Civ.App.El Paso 1972, no writ) (permission to drive a motorized vehicle may be express or implied).
If Murphy was authorized to drive the appellees' vehicles, the fact that Colaneri did not know that Murphy would drive the loaner car on the date of the accident would not preclude as a matter of law a finding that the appellees entrusted Murphy with their vehicles. If the appellees were negligent, in general, in allowing Murphy to drive their vehicles, then that negligence extended to all vehicles Murphy drovewhether owned by or loaned to the appellees. In short, an issue of material fact existed about whether the appellees entrusted the vehicle to Murphy.
Furthermore, despite summary judgment evidence that Murphy was licensed with an instruction permit at the time of the accident, that Murphy had driven with a co-worker many times, that he never had been in an accident, nor ticketed, nor issued a moving violation, the appellees did not establish as a matter of law that Murphy was not an "unlicensed, incompetent, or reckless" driver, nor that they did not know, nor should have known, that Murphy was unlicensed, etc.
The circumstances in the instant case raise a jury question on the issue of whether Murphy was competent because the evidence established that Murphy had little driving experience and possessed only an instruction permit. The appellees' summary judgment evidence did not eliminate the possibility that the appellees negligently entrusted the car to Murphy.
In closing our analysis of this point of error, we observe that, regardless of any evidence about Murphy having engaged in a "personal errand," as discussed under point of error two, the appellants still may establish a cause of action for negligent entrustment. See Green v. Texas Elec. Wholesalers, Inc., 651 S.W.2d 4, 6-7 (Tex. App.Houston [1st Dist.] 1982, no writ) *400 (matters of deviation by one entrusted with a vehicle have no significance in a case based upon negligent entrustment).
We sustain the third point of error as to Time Arts, World Products, and World Communications.
In his fourth point of error, the appellants contend that the trial court erred in granting summary judgment because material issues of fact existed about whether the appellees were negligent in failing to restrict access to company vehicles or vehicles loaned to the company (including access to the keys) and in failing to create and/or enforce safety rules concerning the use of company vehicles or vehicles loaned to the company. Clearly, this point of error does not refer to Saeilo Motors' liability because Saeilo Motors was not in any way connected to Time Arts, World Products, and World Communications and, therefore, could not control their decisions regarding safety regulations.
This cause of action is not based on theories of respondeat superior or negligent entrustment. Rather, it is a straightforward allegation of negligence. Questions of negligence (and proximate cause) are usually fact issues that cannot be determined by summary judgment. Smith v. Muckleroy, 537 S.W.2d 104, 106 (Tex.Civ. App.Tyler 1976, no writ) (and cases cited therein). In the instant case, the appellants raised several questions of fact about whether Time Arts, World Products, and World Communications were negligent in allowing Murphy access to company automobiles. The trial court's granting of summary judgment was not proper on these facts.
We sustain the fourth point of error.
In their fifth and final point of error, the appellants contend that the trial court erred in granting summary judgment because the evidence that the appellees produced in support of their motion was "factually and/or legally insufficient to support same." The specific examples of factual/legal insufficiency that the appellants enumerate within this point of error are, in reality, the same issues that they raise in their first through fourth points of error. Because we already have addressed these issues, we decline to analyze this final point of error.
We overrule the fifth point of error.
We affirm the judgment as to Saeilo Motors, Inc. and Saeilo Motors. We reverse and remand the judgment as to Time Arts and Gifts, Original World Products, and News World Communications for proceedings consistent with this opinion.
EVANS, C.J., concurs.
EVANS, Chief Justice, concurring.
I concur in the holding of the majority opinion, which affirms the summary judgment as to appellees, Saeilo Motors, but reverses the judgment and remands the cause as to Time Arts, World Products, and World Communications.
I agree with the majority's decision that the appellees failed to establish, as a matter of law, the absence of appellants' asserted cause of action based upon the theory of negligent entrustment. But I disagree with the majority's conclusion that the appellees established, as a matter of law, that the driver, Alex Murphy, was not acting in the course and scope of his employment at the time of the accident.
The majority opinion accurately sets forth the appellees' burden of proof in the summary judgment proceeding. As the majority opinion states, the appellees had the burden of producing summary judgment evidence that conclusively proved Murphy was not acting in the course and scope of his employment at the time of the accident. In reviewing the summary judgment evidence, the appellate court is required to consider the record in the light most favorable to the appellants and indulge every reasonable inference in favor of their version of the facts.
The summary judgment proof reflects that Alex Murphy had operated a business-owned vehicle on a number of occasions, and that he used the vehicle in connection with his employment activities. He was learning how to drive, and other employees of the business had given him driving lessons *401 during business hours. On the date of the accident, Murphy and two employees were driving the automobile to have dinner, intending to return to work thereafter. It is undisputed that the accident happened during regular business hours.
In my opinion, the appellees did not meet their burden of showing the absence of a genuine issue of material fact as to Murphy's use of the vehicle in furtherance of the business. The fact that Murphy was driving a business vehicle during working hours is prima facia evidence that he was engaged in a business purpose. See Railway Express Agency, Inc. v. Robinson, 162 S.W.2d 984, 986 (Tex.Civ.App.Waco 1942, writ ref'd w.o.m.). Although there is summary judgment evidence that tends to rebut the presumption of a business purpose, the appellant's circumstantial proof, considered in its entirety, raise a fact question as to whether he was driving within the course and scope of his employment. Compare, Houston News Co. v. Shavers, 64 S.W.2d 384, 386 (Tex.Civ.App.Waco 1933, writ ref'd), and Longoria v. Texaco, Inc., 649 S.W.2d 332 (Tex.Civ.App.Corpus Christi 1983, no writ) (where the evidence rebutting the presumption was so clear and conclusive that it established the non-business purpose as a matter of law).
The majority recognizes that an employee may act within the scope of his employment duties if his acts constitute a mingling of personal and business interests. See Josey-Miller Co. v. Sheppard, 357 S.W.2d 488, 489 (Tex.Civ.App.Beaumont 1962, no writ). In my opinion, the summary judgment record shows that such a factual question is presented here.
The majority points to the affidavit of appellees' manager, Colaneri, to support the legal conclusion that Murphy and his co-employees were on their "own time" and were not acting in furtherance of company business when they went to dinner. In my opinion, the affidavit simply states the manager's conclusion on an ultimate fact, which is placed in issue by other testimony in the record. The manager's affidavit does not conclusively negate the factual assertion that Murphy was mingling his personal interests with business interests when the accident occurred.
I would hold that the appellees failed to establish, as a matter of law, that Murphy was not acting in the course and scope of his employment at the time of the accident.
|
Q:
flash creates more than one http request
We are facing one issue directly connected with our Flash API we've given to a 3rd party flash vendor.
To make a long story short, our API basically wraps domain logic on client and creates a single POST request towards the server in JSON format.
All will be ok except in combination MacOS + Safari we receive double requests on server (?).
Even more interesting, we are receiving different agent names - one is expected name/decriptor of the browser and system, other is "CFNetwork".
POST /RuntimeDelegate.ashx - 80 Mozilla/5.0+(Macintosh;+U;+Intel+Mac+OS+X+10_4_11;+fr)+AppleWebKit/531.22.7+(KHTML,+like+Gecko)+Version/4.0.5+Safari/531.22.7 200 0 0
POST /RuntimeDelegate.ashx - 80 CFNetwork/129.24 200 0 0
POST /RuntimeDelegate.ashx - 80 Mozilla/5.0+(Macintosh;+U;+Intel+Mac+OS+X+10_4_11;+fr)+AppleWebKit/531.22.7+(KHTML,+like+Gecko)+Version/4.0.5+Safari/531.22.7 200 0 0
POST /RuntimeDelegate.ashx - 80 Mozilla/5.0+(Macintosh;+U;+Intel+Mac+OS+X+10_4_11;+fr)+AppleWebKit/531.22.7+(KHTML,+like+Gecko)+Version/4.0.5+Safari/531.22.7 200 0 0
POST /RuntimeDelegate.ashx - 80 CFNetwork/129.24 200 0 0
POST /RuntimeDelegate.ashx - 80 Mozilla/5.0+(Macintosh;+U;+Intel+Mac+OS+X+10_4_11;+fr)+AppleWebKit/531.22.7+(KHTML,+like+Gecko)+Version/4.0.5+Safari/531.22.7 200 0 0
POST /RuntimeDelegate.ashx - 80 CFNetwork/129.24 200 0 0
POST /RuntimeDelegate.ashx - 80 CFNetwork/129.24 200 0 0
Has anyone encounter anything like this before?
A:
From various reading it appears that CFNetwork is responsible for things like grabbing the favicon, bookmarks, and other resources.
I wonder if that mac has your handler bookmarked.
Interesting:
http://www.webmasterworld.com/search_engine_spiders/3783085.htm
and another interesting bug post for something very similar:
https://bugs.webkit.org/show_bug.cgi?id=19530
Lately, the #1 browser that's given me problems is safari. I thought after version 4 it would be better, but it's still a pos.
|
[Economic impact of overactive bladder symptoms in Japan].
Overactive bladder (OAB) is characterized by involuntary contractions of the detrusor muscles of the bladder. The primary symptoms of OAB include urinary urgency and frequency, with or without urge incontinence. Despite the growing awareness of OAB as a chronic medical condition, little is known about the disease's economic burden. Therefore, in the present study, the costs associated with the management of OAB symptoms in Japan were estimated, and the potential cost saving by increasing the rate of physician visits in OAB population was analyzed. To estimate the costs of OAB symptoms in Japan, we collected a variety of epidemiologic and economic literatures about OAB or urinary incontinence published by June, 2007. Three types of costs were considered in this estimation: 1. OAB treatment cost (pharmacological treatment cost, diagnostic cost and cost for physician visits), 2. direct cost (OAB-related cost [urinary tract infections, skin infections and fractures] and incontinence care cost [costs of pads, diapers and cleaning]), and 3. indirect cost (work loss due to absence from work and decrease in productivity). The analysis was conducted on community dwelling Japanese persons aged > or = 40 years, and assumed that OAB patients visited a hospital or a clinic once every four weeks. For the estimation of pharmacological treatment cost, four anticholinergic drugs (immediate-release oxybutynin (Pollakisu), propiverine (BUP-4), extended-release tolterodine (Detrusitol) and solifenacin (Vesicare)) were referred. Potential cost saving was estimated on the assumption that the hospital visit rate would increase from the current 22.7% to 35% and 50%, respectively. The number of persons with OAB symptoms and OAB patients was estimated at 8.6 million (4.6 million men, 4.0 million women) and 2.0 million (1.7 million men, 0.3 million women), respectively. The annual cost for OAB was estimated to be 956.2 billion yen (112,000 yen per one person with OAB symptoms). This cost included 180.9 billion yen (19%) for OAB treatment cost (including medication of 159.1 billion yen), 62 billion yen (6%) for OAB-related cost, 28.7 billion yen (3%) for incontinence care cost and 684.6 billion yen (72%) for work loss. Therefore, the cost for work loss accounted for the majority of OAB cost. The potential annual cost saving was estimated at 92.7 billion yen and 205.8 billion yen for the assumed hospital visit rate of 35% and 50%, respectively, and 88,000 yen per newly visiting OAB patient. It was revealed that the economic impact imposed by OAB was enormous. It might be possible to reduce the cost for OAB by appropriate treatment for OAB population. |
Monarch Butterfly Migration | Rocamar ToursEvery year millions of monarch butterflies migrate from Canada and the U.S. to the Oyamel forests near Angangeo, in the Northern part of the state of Michoacan , .http://www.rocamar.com.mx/monarch-butterfly-migration/
WWF - Monarch Butterflies - The Monarch of MigrationMonarch butterfly migration. Of all migrations by small creatures, few are as astonishing as the one performed by the Monarch butterfly. These insects travel .http://www.worldwildlife.org/species/finder/monarchbutterflies/monarchbutterflies.html
Jacksonville, FL 32210
904-757-5543
ammotorcyclesafety.com
TAKE A VIRTUAL TOUR OF MONARCH BUTTERFLY MIGRATION ...Feb. 23, 2012. Kansas University professor to take participants on 1000-mile journey. GREAT BEND — Every November, monarch butterflies arrive in central .http://www.kdwpt.state.ks.us/news/Services/TAKE-A-VIRTUAL-TOUR-OF-MONARCH-BUTTERFLY-MIGRATION
Comments
You May Also Like
Monarch Butterfly MigrationThe annual Monarch Butterfly migration is amazing. . they are usually in search of food, not a yearly recurring migratory round trip like the Monarch migration.http://monarch-butterfly.info/Migration.html
Monarch Grove SanctuaryArriving in October, the Monarch Butterflies cluster together on the pines and . birds and whales, the same individuals travel the migration route year after year.http://www.ci.pg.ca.us/monarchs/default.htm
Journey Mexico The Migration of the Monarch Butterflies TripThis unforgettable trip takes you to Michoacan to witness millions of beautiful Monarch Butterflies as they finish their migration from thousands of miles away.http://www.journeymexico.com/index.php/Trip/the_migration_of_the_monarch_butterflies_Trip
EIRC.org | Monarch Teacher NetworkIn January of 2012 we returned to California and had an amazing trip. . Spanish) while showcasing all stages of the Monarch's life cycle and migration. . Journeys and Transformations – The Monarch Butterfly Story This 28-minute DVD .http://www.eirc.org/website/programs-services/global-connection/monarch-teacher-network/
Monarch Butterfly Migration in Mexico | Reefs to RockiesTrip Highlights: Visit two Monarch Butterfly Sanctuaries, colonial cities, artisans' . The annual migration of these monarchs from the Great Lakes region is one of .http://reefstorockies.com/destinations/mexico/monarchs-of-michoacan/
Natural Bridges SBCelebrate the butterflies' arrival with the Welcome Back Monarchs Day in October - and their departure with the Migration Festival in February. Seasons - Climate . Docent-led butterfly, tidepool and nature trail tours are available. Large groups .http://www.parks.ca.gov/?page_id=541
Monarch Butterfly Migration, Morelia, Michoacan State MexicoThe Monarch Butterfly Migration area is near enough to Morelia for the city to offer a base for trips to see the Monarchs winter home. Hiking tours go into the .http://www.softseattravel.com/Article-Monarch-Butterfy-Migration-Morelia-Mexico.html
Monarch Butterfly USA - Monarch MigrationMonarchs east of the Rockies migrate 2500 miles to the Oyamel fir trees of . for the fall generation monarchs to travel thousands of miles (on those amazing little .http://www.monarchbutterflyusa.com/Migration.htm
Monarch Butterfly Migration - The Butterfly WebSiteThe goal of this initial population is to survive the trip to the overwintering sites in Mexico. . The migration of the monarch butterfly begins in Canada and the .http://butterflywebsite.com/Articles/uminn/monarchs.html
Monarch Butterflies in Big Sur CaliforniaIn all the world, no butterflies migrate like the Monarchs of North America. They travel much farther than all other tropical butterflies, up to three thousand miles.http://www.bigsurcalifornia.org/monarchs.html |
Q:
connecting speaker and mic to GSM SIM 900
I have a gsm module but unfortunately it doesnt have an output for mic and speakers. I need to integrate mic and speaker too. In my GSM module, there are male pins available for mic_P mic_N for microphone and spk_P spk_N but I dont know how to connect these to speakers and microphone. Does anyone have any idea about this?
Please share.
I am attaching a pic of my gsm module:
A:
You can use electret microphone. Connect its positive to MICP & negative to MIC_N.
For speakers, I have used this type of speakers. Connections are same.
Alternatively, for testing purpose you can also use your headphone. Cut the headphone wire and you will find wires to connect with SPK_P SPK_N MIC_p MIC_N .
|
Chubby Hubby
Chubby Hubby or Aun Koh (born 1972) is a blogger from Singapore. His blog consists of dining reviews, travelling, wine and recipes for baking and cooking. It also consists of many photographs of the food, most being digitally altered. The blog earned reviews in the Guardian and was nominated for the world's best urban food blog in the 2005 Urban Blogging Awards.
Aun was mentioned in Prime Minister Lee Hsien Loong's National Day Rally speech in 2006, as an example of Singaporean blogs on the internet. Singapore newspaper The Straits Times has mentioned him several times in articles about the hottest blogs, blogs to watch and the most popular food blogs. He was interviewed by Newsweek and mentioned in The New York Times, the South China Morning Post and The Guardian. Singaporean bank OCBC has a tie-up with Aun; he creates special promotions for OCBC credit card holders with his favourite restaurants and food suppliers, which he promotes via the blog.
Aun was invited to dine during the finale recording of Bravo Channels 8th Season's Top Chef competition 2010; which was held in Singapore; the shows first international finale location. Aun was not a judge but was a dinner guest.
Aun comes from a politically well connected family. His father is Professor Tommy Koh, Ambassador-At-Large for the Singapore Government.
References
External links
Official website
Category:1972 births
Category:Living people
Category:Singaporean bloggers |
Women in philosophy
Women are involved in philosophy throughout the field’s history. While there were women philosophers since ancient times, they were accepted as philosophers during the ancient , medieval , modern and contemporary eras, particularly during the 20th and 21st century, almost no woman philosophers have entered the philosophical Western canon . [1] [2]
In ancient philosophy in the West, while academic philosophy Was Typically the domain of male philosophers Such As Plato and Aristotle , philosophers female Such As Hipparchia of Maroneia(active ca. 325 BC), Arete of Cyrene (active 5th-4th century BC) and Aspasia of Miletus (470-400 BC) were active during this period. A notable medieval philosophers include Hypatia (5th century), St. Hildegard of Bingen (1098-1179) and St. Catherine of Sienna (1347-1380). Notable modern philosophers included Mary Wollstonecraft (1759-1797) andSarah Margaret Fuller (1810-1850). Influential contemporary philosophers include Susanne Langer (1895-1985), Hannah Arendt (1906-1975), Simone de Beauvoir (1908-1986), Mary Midgley (born 1919), Mary Warnock(born 1924), Julia Kristeva (born 1941), Patricia Churchland (born 1943) and Susan Haack (born 1945).
In the early 1800s, some colleges and universities in the UK and US began admitting women , giving rise to new generations of female academics. Nevertheless, US Department of Education overs from the 1990s indicate indication That philosophy is one of the least proportionate fields in the humanities with respect to gender. [3] Women make up as little as 17% of philosophy faculty in some studies. [4] In 2014, Inside Higher Education describes the philosophy “… discipline of own long history of misogyny and sexual harassment ” of women students and professors. [5] Jennifer Saul, a professor of philosophy at the University of Sheffield , stated in 2015 that “… leaving philosophy after being harassed, assaulted, or retaliated against.” [6]
In the early 1990s, the Canadian Philosophical Association has argued that gender imbalance and gender bias in the academic field of philosophy. [7] In June 2013, a US sociology professor reported that “out of all recent citations in four years, including female authors, just 3.6 percent of the total.” The editors of the Stanford Encyclopedia of Philosophy have raised concerns about the underrepresentation of women philosophers, and they require editors and writers to ensure they represent the contributions of women philosophers. [7]According to Eugene Sun Park, “[p] hilosophy is predominantly white and predominantly male.This homogeneity exists in almost all aspects and at all levels of the discipline.” [2] Susan Price argues that the philosophical “… canon remains dominated by white males-the discipline that … still hews to the myth that genius is tied to gender.” [8] According to Saul, “[p] hilosophy, the oldest of the humanities , is also the malest (and the whitest). mathematics. ” [9]
Representation and working climate
In the early 1990s, the Canadian Philosophical Association claimed that “… there is compelling evidence” of “… philosophy’s gender imbalance” and “bias and partiality in many of its theoretical products.” In 1992, the association recommended that “fifty percent of [philosophy] … positions should be filled by women.” [7] In a 2008 article “Changing the Ideology and Culture of Philosophy: Not by Reason (Alone),” MIT philosophy professor Sally Haslanger Stated que le top twenty graduate programs in philosophy in the US-have from 4 percent to 36 percent women faculty. [7]In June 2013, Duke University professor of sociology Kieran Healy stated that “out of all recent citations in the field of female history journals, female authors included just 3.6 percent of the total.” The editors of the Stanford Encyclopedia of Philosophy have raised concerns about the underrepresentation of women philosophers; as such, the encyclopedia “encourages [their] authors, subject editors, and referees to help ensure that they do not overlook the work of women or indeed members of the public”. [7]
In 2014, professors Neven Sesardic and Rafael De Clercq published an article entitled “Women in Philosophy: Problems with the Discrimination Hypothesis.” The article states that “… a number of philosophers attribute the underrepresentation of women in philosophy to bias against women or some kind of wrongful discrimination “. Evidence cited includes “gender disparities that increase along the path to full-time faculty member”; “anecdotal accounts of discrimination in philosophy”; “research on gender bias in the evaluation of manuscripts, grants, and curricula vitae in other academic disciplines”; “psychological research on implicit bias”; “” [7] Sesardic and De Clercq argue that” proponents of discriminating hypothesis, who include distinguished philosophers … have tended to present evidence selectively. ” [7]
American philosopher Sally Haslanger stated in 2008 that “… it is very hard to find a place in philosophy that is not actively hostile towards women and minorities, or at least assumes that a successful philosopher should look and act like a (traditional, white) man. ” [11] Haslanger states that she experienced” when a woman’s status in school was questioned because she was married, or had a child ‘mature’ student), or was in a long-distance relationship. American philosopher Martha Nussbaum , who completed a PhD in philosophy at Harvard Universityin 1975, alleges that she encountered a huge amount of discrimination during her studies at Harvard, including sexual harassment and problems of getting childcare for her daughter. [10]
In July 2015, British philosopher Mary Warnock addressed the issue of the representation of women in British university philosophy departments, where 25% of faculty are women. Warnock stated she is “… against intervention, by quotas or otherwise, to increase women’s chances of employment” in philosophy. [11] She also argues that “… there is nothing intrinsically harmful about this imbalance” and she states that she does not “… believe it shows a conscious bias against women.” [11] Philosopher Julian Bagginistates that he believes that there is “… little or no conscious discrimination against women in philosophy”. At the same time, Baggini states that there may be a “… great deal of unconscious bias” against women in philosophy, because it does not address issues of gender or ethnicity. [11]
Allegations of sexual harassment
In 2014, Inside Higher Education describes the philosophy “… discipline’s own long history of misogyny and sexual harassment.” [5] On March 28, 2011, The New APPS published a review of the allegations of persistent sexual harassment by women professors in philosophy, due largely to “serial harassers” continuing to work in the field of widespread knowledge of their actions. The post proposed that, had been ineffective at removing or punishing harassers. [12] The story was subsequently featured at Inside Higher Ed [13] and several blogs, includingGawker [14] and Jezebel . [15] In 2013, a series of posts on the blog “What is it like to be a woman in philosophy?” instigated a spate of mainstream media articles on the continued dominance of men in philosophy. [16] [17] [18] [19] Eric Schliesser, a professor of philosophy at Ghent University , Said he Believes que la “… systematic pattern of exclusion of women in philosophy is, in part, due to the fact That my profession has allowed a culture of harassment , sexual predating, and bullying to be reproduced from one generation to the next. ” [5]According to Heidi Lockwood, Associate Professor of Philosophy at Southern Connecticut State University , there is a “… power” asymmetry “between professors and students – even graduate students”; As well, she noted that “… even when colleges and universities have blanket prohibitions against professor-student sexual relationships, as does Yale, … institution-specific policies [5]
According to an August 2013 article in Salon , a tenured male University of Miami philosopher resigned after allegedly “… sending emails to a [female] student in which he suggests that they have sex three times.” [9] Jennifer Saul , a professor of philosophy at the University of Sheffield , set up a blog for women’s philosophers in 2010. She received numerous allegations of sexual harassmentby alexandra bodyman, a job candidate who said she was sexually assaulted at the APA annual meeting where job interviews take place “, an” undergraduate whose professor joked public about dripping hot wax on her nipples “and a” … lesbian who found herself suddenly invited, after she came out, to join in the sexualizing of her female colleagues. ” Saul states that the departments failed to deal with the allegations. [9] In 2013, the American Philosophical Association formed a committee to study the allegations of sexual harassment of women and faculty by faculty. [5]Saul states that one of the allegations was regarding a “… distinguished visiting speaker whose first words are:” Show me a grad student I can fuck “.” [6] Saul states that women are “… leaving philosophy after being harassed, assaulted, or retaliated against.” [6] In 2014, Inside Higher Education reported allegations that Yale University had sexually harassed a woman; “Yale, victim with the real result”. [5] In an interview with Inside Higher Ed , the alleged victim stated that she “… suffers from post-traumatic stress disorderthat impedes everyday life, not only from the alleged attack, but also from the “browbeating” it has been attempted to report the professor, again and again, to Yale officials. ” [5]
In 1993, the American Philosophical Association’s sexual harassment committee set out guidelines for this issue in the government. The APA guidelines, which were revised in 2013, stated that: [20]
“Sexual advancements, requests for sexual favors, or sexually directed statements, where sexual behavior is a condition of employment or employment decisions, or when such conduct persists against its rejection.”
“Sexual harassment is a serious violation of professional ethics, and should be regarded as such by members of the profession. or allow that environment to exist, colleges and universities should supply clear, fair institutional procedures under which charges of sexual harassment on campus can be brought, assessed, and acted on. “
“Complaints of sexual harassment at APA-sponsored activities should be brought to the chair of the committee for the protection of sexual health. against APA staff members should be brought to the chair of the board. “
Black women
There are few black women philosophers, who include women of African and Caribbean ancestry, African-Americans and other individuals from the African diaspora . According to philosopher Sally Haslanger , the “numbers of philosophers of color, especially women of color, is even more appalling”; in a 2003 study, there “… were insufficient data for any racial group of women. [21] In the United States, the “… representation of scholars of color is plausibly worse than in any other field in the academy, not only physics, but also engineering.” [21] According to Professor LK McPherson, there is a “gross underrepresentation of blacks in philosophy.”McPherson states that it is a “… willful, not necessarily a conscious, preference among many members of the profession professionalism to maintain the status quo; the areas and questions properly or deeply philosophical. None of this is good for black folk. ” [22]
The first black woman in the US to do a PhD in philosophy was Joyce Mitchell Cook, who obtained her degree in 1965 from Yale University . LaVerne Shelton was also one of the earliest black women to receive a PhD in philosophy. Other notable women include Angela Davis , a political activist who specializes in writing about feminism , critical theory , Marxism , popular music , social consciousness , and the philosophy of punishment and prisons; Kathryn Gines , the founding director of the Collegium of Black Woman Philosophers, who specializes in continental philosophy , Africana philosophy, philosophy of race and Black feminist philosophy ; Anita L. Allen , the first African-American woman to complete both a JD and a PhD in philosophy, who focuses on political and legal philosophy, and who is in the US President Obama to sit on the Presidential Commission for the Bioethical Study issues; and Adrian Piper , an analytical philosopher who received a PhD in philosophy from Harvard; Jaqueline Scott, who received a PhD in Philosophy from Stanford University , and who specializes in Nietzsche , nineteenth-century philosophy, race theory and African-American philosophy .
Reports from the US
US Department of Education deferrals indicate indication That philosophy is one of the least proportionate fields in the humanities with respect to gender. [3] Although it is a question of a professional field, it is disproportionately male, no clear, unequivocal data exists on the number of women currently in philosophy, or indeed, on the number of men in philosophy, and it is debatable how to define what it means to be ‘in philosophy.’ Ph.D. Holders of a Ph.D. Holder of Ph.D. Holders of Ph.D. Holders of Philosophy, Ph.D. and Ph.D. one data setexists which measures these), or the current number of living women with publications in philosophy. The lack of clear data makes it difficult to establish gender proportions, but the consensus of the 17 percent of academically employed philosophers. [4]
The National Center for Education Statistics 2000, “Salary, Promotion, and Tenure Status of Minority and Women Faculty in US Colleges and Universities,” estimates in Table 23 that the total number of “History and Philosophy” US citizens and full-time faculty who were taught in 1992 were 19,000, of which 79% were men (ie 15,010 men in history and philosophy), 21% were women (3,990). They add, “In fact, men were at least twice as likely as women to teach history and philosophy.” [23]
In their 1997 report, ” Characteristics and Attitudes of Instructional Faculty and Staff in the Humanities ,” NCES notes, that about “one-half of full-time instructional faculty and staff in 4-year institutions in English and literature (47 percent) (50 percent) were female in the fall of 1992, compared with 24 percent and philosophy and religion (13 percent) (table 4). ” In this report they measure Philosophy and Religion in the same data set, and estimate the total number of full-time instructional Philosophy and Religion faculty and staff in 4-yr institutions to be 7,646. Of these, 87.3% are male (6675 men), 12.7 are female (971 women). [24]The 1997 report measures History Full-time instructional faculty and staff in 4-yr institutions to be 11,383; male: 76.3 (8,686 men); female: 23.7 (2,697 women). The numbers of women in the world are not easily comparable, but one can not be compared to the number of women in the history of the world. postponement. These women are employed as instructors of philosophy.
The 1997 report indicates that a large portion of all humanities are part-time instructors. [25] Part-time employees are disproportionately female but not female. [26] Therefore, considerations of full-time employees only partially require part-time to remain active in their field. In 2004, the percentage of Ph.Ds in philosophy, within the US, reached a record high percentage: 33.3%, or 121 of 363 doctorates awarded. [27]
Organizations and campaigns
APA committee on the status of women in philosophy
The Committee on the Status of Women is a committee of the American Philosophical Association dedicated to the assessment and reporting of the status of women in philosophy. [28] It is currently chaired by Hilde Lindemann . [29] In April 2007, the Committee on the Status of Women co-sponsored a session on the central question “Why Are Women Only 21% of Philosophy”. [30] At this session, Sharon Crasnow suggests that the low numbers of women may be due to:
Differential treatment: male and female university students may be treated differently in the classroom.
Vicious circle: female students do not feel inclined to study philosophy because of lack of contact with female professors.
Misleading statistics: university administrators focus on gender representation in the humanities overall, which obscures the disparity in philosophy. [30]
Society for Women in Philosophy
The Society for Women in Philosophy is a group created in 1972 that seeks to support and promote women in philosophy. It has a number of branches around the world, including New York, the American Pacific, the United Kingdom and Canada. [31] Each year, the society names one philosopher of the distinguished woman philosopher of the year. [32]
Honorees include:
2016: Maria Lugones ( Binghamton University )
2014: Peggy DesAutels
2013: Alison Wylie ( University of Washington , Seattle)
2012: Diana Tietjens Meyers
2011: Jennifer Saul
2010: Sally Haslanger ( MIT )
2009: Lorraine Code
2008: Nancy Tuana
2007: Joan Callahan
2006: Ruth Millikan
2005: Linda Martín Alcoff
2004: Susan Sherwin
2003: Eva Feder Kittay
2002: Sara Ruddick
2001: Amelie Rorty
Gendered conference campaign
The blog Feminist Philosophers hosts the Gendered Conference Campaign, which works towards increasing the representation of women at conferences and volumes. The blog states that “all-male events and volumes help to perpetuate the stereotyping of philosophy.” [33]
History
While there were women philosophers since the earliest times, and some of them were accepted as philosophers during their lives, the philosophers have entered the philosophical western canon . [1] Historians of philosophy are faced with two main problems. The first being the exclusion of women philosophers from history and philosophy, which leads to a lack of knowledge about women philosophers among philosophy students. The second problem deals with what the canonical philosophers had to say about philosophy and women’s place in it. In the past twenty-five years ago, an exponential increase in feminism, the philosophical canon. [34]According to Eugene Sun Park, “[p] hilosophy is predominantly white and predominantly male.This homogeneity exists in almost all aspects and at all levels of the discipline.” [2] According to Jennifer Saul , a professor of philosophy at the University of Sheffield, “[p] hilosophy, the oldest of the humanities, is also the malest (and the whitest). gender parity, philosophy is actually more overwhelmingly male than even mathematics. ” [9]
In the May 13, 2015 issue of The Atlantic , Susan Price notes that even though Kant’s first work in 1747 quotes Émilie Du Châtelet , a philosopher who was a “… scholar of Newton, religion, science, and mathematics”, “her will be found in the 1,000-plus pages of the new edition of The Norton Introduction to Philosophy. ” [8] The Norton Introduction does not name a female philosopher until the book begins to cover the mid-20th century. Scholars argue that women philosophers are also absent from the “… other leading anthologies used in university classrooms.” [8] Price states That university philosophy anthologies do not usually mention 17th century women philosophers Such As Margaret Cavendish ,Anne Conway , and Lady Damaris Masham . [8]Price argues that the philosophical “… canon remains dominated by white males-the discipline that some say still hews to the myth that genius is tied to gender.” [8] Amy Ferrer, executive director of the American Philosophical Association, states that “… women have been systematically left out of the cannon, and that women have come into the field. ” [8]The Encyclopedia of Philosophy , which as published in 1967, had” … articles on over 900 philosophers, [but it] did not include an entry for Wollstonecraft , Arendt or de Beauvoir. “[T] hese women philosophers were scarcely even marginal” to the canon set out at the time. [35]
Explaining the very small number of women philosophers, American academic and social critic Camille Paglia (born 1947) Argues That “… women in general are less comfortable than men in inhabiting a highly austere, cold, analytical space, Such As the one qui They are more likely to have a talent for or a better understanding of mathematics, but they are more likely to a frigid space from which the natural and the human have been eliminated. ” [36]Paglia claims that “[t] oday’s lack of major female philosophers is not in the world of talent because of the collapse of philosophy”, because, in her view, philosophy “… as traditionally practiced may be a dead genre” that ” belongs to the age of much slower and rhetorically formal inquiry. ” [36]
Ancient philosophy
Some of the Earliest Were women philosophers, Such As Hipparchia of Maroneia (active ca. 325 BC), Arete of Cyrene (active 5th-4th century BC) and Aspasia of Miletus (470-400 BC). Aspasia appears in the philosophical writings of Plato , Xenophon , Aeschines Socraticus and Antisthenes . Some scholars argue that Plato was impressed by her intelligence and wit. Diotima in the Symposium on her. [37] [38] Socrates attributes to the (possibly fictional) Diotima of Mantinea his lessons in the art of Eros (or philosophical searching).Plato’s final views on women are highly contested, but the Republic suggests that they are equally capable of education, intellectual vision, and rule of the city. [39] [40]
Other notable philosophers include:
Theano of Croton (6th century BC)
Aristoclea of Delphi (6th century BC)
Sosipatra of Ephesus (4th century BC)
Nicarete of Megara (flourished around 300 BC)
Catherine of Alexandria (282-305)
Ptolemais of Cyrene (3rd century BC)
Aesara of Lucania (3rd century BC)
Diotima of Mantinea (appears in Plato’s Symposium )
Ban Zhao (c.35-100) D2
Xie Daoyun (before 340 – after 399)
Gargi Vachaknavi (7th century BC)
Medieval philosophy
Medieval philosophy dates from the fall of the Western Roman Empire in the 5th century AD to the Renaissance in the 16th century. Hypatia (AD 350 – 370 to 415) was a Greek mathematician, astronomer, and philosopher in Egypt , then part of the Eastern Roman Empire . [41] She was head of the Neoplatonic school at Alexandria , where she taught philosophy and astronomy . [42] [43] [44] [45]
Other notable woman philosophers include:
Aedesia of Alexandria (5th century AD)
Catherine of Siena (1347-1380)
Tullia of Aragona (c.1510-1556)
Moderata Font (1555-1592), critic of religion, feminist
Modern philosophy
The 17th century marks the beginning of modern philosophy , which ended in the early 20th century. During the 17th century, various women philosophers argued for the importance of education for women and two women Influenced philosophers René Descartes and DURING THE early portion of the 18th century, two women philosophers commented on John Locke ‘s philosophy. Laura Bassi (1711-1778) was the first woman to earn a university chair in a scientific field. Olympe de Gouges (1748-1793) Asked that French women be given the same rights as men, a position also taken by Judith Sargent Murray (1751-1820) in her essay ” On the Equality of the Sexes ” andMary Wollstonecraft in her essay A Vindication of the Rights of Woman (1792). During the 19th century, Harriet Martineau (1802-1876) criticized the state of women’s education and Harriet Taylor Mill (1807-1858), Sarah Margaret Fuller (1810-1850) and Antoinette Brown Blackwell (1825-1921) called for women’s rights . Charlotte Perkins Gilman (1860-1935) argued that women were oppressed by an androcentric culture. Near the start of the 20th century, Mary Whiton Calkins (1863-1930) Was the first woman to Become President of the American Philosophical Association. Women thinkers such as Emma Goldman (1869-1940), an anarchist , and Rosa Luxemburg(1871-1919), a Marxist theorist , are known for their political views.
17th century
Marie de Gournay (1565-1645) was a critic of religion, proto-feminist, translator, and novelist who insisted that women should be educated.
Anna Maria van Schurman (1607-1678) was a multilinguist known for her defense of female education .
Elisabeth of Bohemia (1618-1680) influenced many key figures and philosophers, most notably René Descartes , who she corresponded with. She questioned Descartes’ idea of dualism , or the mind being separate from the body, and his theories regarding communication between mind and body.
Anne Conway (1631-1679) was an English philosopher whose work, in the tradition of the Cambridge Platonists , was an influence on Leibniz . Conway’s thought is original, it is rationalist , with hallmarks of gynocentric concerns and patterns, and in that sense it was unique among seventeenth-century systems. [46]
Damaris Cudworth Masham (1659-1708) was an English philosopher, proto-feminist , and advocate for women’s education.
Mary Astell (1666-1731) was an English feminist writer and rhetorician known for advocacy of equal educational opportunities for women , which earned her the title of “first English feminist.” [47] Her very well-known books outline her plan to establish a new type of educational institution for women.
18th century
Catharine Trotter Cockburn (1679-1749) published a first major philosophical work, A Defense of Mr. Lock [e] ‘s An Essay Concerning Human Understanding in 1702, at the age of 23. Much of the scholarly interest in her writing centers on gender studies .
Émilie du Châtelet (1706-1749) was a French mathematician, physicist , and author during the Age of Enlightenment . She translated and commented on Isaac Newton’s work Philosophiae Naturalis Principia Mathematica . She criticized John Locke’s philosophy and emphasis on the need for verification of knowledge through experience. She also theorized about free will and metaphysics . [48]
Laura Bassi (1711-1778) was an Italian philosopher and physicist who was the first woman in the world to earn a university degree in a scientific field of studies. She received a doctoral degree from the University of Bologna in May 1732, [49] the third academic qualification ever bestowed on a woman by a university, [50] and the first woman to earn a professorship in physics at a university in Europe. [51] She was the first woman to be offered an official teaching position at a university in Europe. [50]
Catharine Macaulay (1731-1791) was an English historian and writer. She attacked This is Edmund Burke ‘s Thoughts on the Cause of the Present Discontents , calling it “a poison …”. [52] In her 1790 Letters on Education , Mary Wollstonecraft would say in 1792, that the apparent weakness of women was due to their mis-education. [53]
Olympe de Gouges (1748-1793) was a French playwright and political activist whose feminist and abolitionist writings reached a large audience. She was an early feminist who asked that French men be given the same rights as French men. In her Declaration of the Rights of Woman and the Female Citizen (1791), she challenged the practice of male authority and the notion of male-female inequality.
Judith Sargent Murray (1751-1820) was an early American advocate for women’s rights, an essayist, playwright , poet , and letter writer. She was one of the first proponents of the idea of equality of the sexes-that women, like men, had the capability of intellectual achievement and should be able to achieve economic independence. Among Many other influential parts, her landmark essay ” On the Equality of the Sexes ” paved the way for new thoughts and ideas Proposed by other feminist writers of the century. The essay predated Mary Wollstonecraft ‘s A Vindication of the Rights of Woman qui Was published in 1792. [54]
Mary Wollstonecraft (1759-1797) was an English writer, philosopher, and advocate of women’s rights . She is regarded as one of the founding feminist philosophers . In A Vindication of the Rights of Woman (1792), her most famous and influential work, [55] she argues that women are not naturally inferior to men, but appear to be only because they lack education. She suggests that both men and women should be treated as rational and social .
19th century
Harriet Martineau (1802-1876) was an English social theorist and political writer, often cited as the first female sociologist . [56] She wrote books and essays from a sociological, holistic, religious, domestic, and feminine perspective. In Society in America , she criticized the state of women’s education, stating that the “intellect of women is confined by an unjustifiable restriction” of access to education; she urged women to become well-educated and free.
Harriet Taylor Mill (1807-1858) was a philosopher and women’s rights advocate. In John Stuart Mill ‘s autobiography, he claimed to be the author of most of the books and articles published under his name. He stated that “when two persons have their thoughts and speculations completely in common, it is of little consequence, in respect of the question of originality, which of them holds the pen.” Together, they wrote “Early Essays on Marriage and Divorce,” published in 1832. [57] The debate about the nature and extent of collaboration is ongoing. [58]
Sarah Margaret Fuller (1810-1850) was an American journalist, critic, philosopher and women’s rights advocate. Her book Woman in the Nineteenth Century is considered the first major feminist work in the United States. She was an advocate of women’s rights and, in particular, women’s education and the right to employment. Many other advocates for women’s rights and feminism, including Susan B. Anthony, cite Fuller as a source of inspiration.
Antoinette Brown Blackwell (1825-1921) was the first woman to be a Protestant minister in the United States . She was a well-versed public speaker on controversial issues such as abolition of slavery and she sought to expand women’s rights . In 1873 Blackwell founded the Association for the Advancement of Women.
Victoria, Lady Welby (1837-1912) was a self-educated English philosopher of language . She was published in the leading English language academic journals of the day, Mind and The Monist . She published her first philosophical book, What Is Meaning? Studies in the Development of Significance in 1903, following the lines of the Language and the Language of the United States. word significs for her approach. Welby’s theories is meaning Anticipated contemporary semantics ,semiotics , and semiology .
Helene von Druskowitz (1856-1918) was an Austrian philosopher, writer and music critic. She was the second woman to obtain a Doctorate in Philosophy, which she obtained in Zurich . She usually published under a male alias because of the predominant sexism of the era.
Charlotte Perkins Gilman (1860-1935) was an American feminist , sociologist , novelist, writer and social reformer . Her short story ” The Yellow Wallpaper ” has become a bestseller. The story is about a woman who suffers from mental illness after being married. She argued that the domestic environment is oppressed by the patriarchal beliefs upheld by society. [61] Gilman argued that women’s contributions to civilization, throughout history, have been halted because of an androcentric culture. She argued that women were the underdeveloped half of humanity. [62] She believed economic independence would bring freedom and equality for women.
Early 20th century
Mary Whiton Calkins (1863-1930) was an American philosopher and psychologist . She was also the first woman president of the American Psychological Association and the American Philosophical Association . Calkins studied psychology under William James and studied at Harvard University , which allowed her to attend school. She published her doctoral dissertation in 1896, and Harvard’s Department of Philosophy and Psychology recommended that she be granted her PhD, but Harvard’s President and Board refused, as she was a woman. The President believed women should not study with men. [63][64] James was astonished at the university’s decision, as he described his performance as “the most brilliant examination for the Ph.D. that we had at Harvard.” [65] She published four books and over one hundred papers in her career in psychology and philosophy. [66]She Was aussi year avid supporter of women’s rights [67] and an advocate of women’s right to vote .
Emma Goldman (1869-1940) was an anarchist known for her political activism, writing and speeches. She played a pivotal role in the development of anarchist political philosophy in the first half of the 20th century. She was viewed as a free-thinking “rebel woman” by admirers, and denounced by critics as an advocate of violent revolution. [68] Her writing and readings are varied, including atheism , freedom of speech , militarism , capitalism , marriage, free love , and homosexuality. Although she distanced herself from first-wave feminismand its efforts towards women’s suffrage , she developed ways of incorporating gender politics into anarchism.
Contemporary philosophy
Contemporary philosophy is the present period in the history of Western philosophy beginning at the end of the 19th century with the professionalization of the discipline and the rise of analytic and continental philosophy . Some influential women philosophers from this period include:
Susanne Langer (1895-1985) was an American philosopher of mind and art , who was influenced by Ernst Cassirer and Alfred North Whitehead . She was one of the first women to achieve an academic career in philosophy and the first woman to be popularly and professionally recognized as an American philosopher. Langer is best known for her 1942 book entitled Philosophy in a New Key . It argues that there is a basic and pervasive human need to symbolize, to invent meanings, and to invest meanings in one’s world. [69]
Hannah Arendt (1906-1975) was a German- born American assimilated Jewish political theorist . Though often described as a philosopher, it is a question of a political commentator on the subject of “man in the singular” and earth and inhabit the world. ” [70] Her works deal with the nature of power , and the subjects of politics, direct democracy , authority , and totalitarianism . The Hannah Arendt Prize is named in her honor.
Simone de Beauvoir (1908-1986) was a French writer, intellectual, existentialist philosopher , political activist, feminist and social theorist . Though she did not consider herself a philosopher, she had a significant influence on both feminist existentialism and feminist theory . [71] De Beauvoir wrote novels, essays, biographies, autobiography and monographs on philosophy, politics and social issues. She is known for her 1949 treatise The Second Sex , a detailed analysis of women’s oppression and foundational tract of contemporary feminism .
Elizabeth Anscombe (1919-2001), usually cited as GEM Anscombe, was a British analytic philosopher . Anscombe’s 1958 article ” Modern Moral Philosophy ” introduced the term ” consequentialism ” into the language of analytic philosophy, and had a seminal influence on contemporary virtue ethics . Her monograph Intention is generally recognizable as her most influential work, and the continuing philosophical interest in the concepts of intention , action, and practical reasoning can be taken from her main impetus from this work. Mary Warnockdescribed as “the undoubted giant among women philosophers” while John Haldane said she “certainly has a good claim to be the greatest woman philosopher of whom we know”. [72]
Mary Midgley (born 1919) is an English moral philosopher . A senior lecturer in philosophy at Newcastle University , she is known for her work on science, ethics and animal rights . Midgley strongly opposes reductionism and scientism , and any attempts to make science a substitute for the humanities-a role for which it is, she argues, wholly inadequate. She has written extensively about what philosophers can learn from nature, especially from animals. The Guardian has described its fiercely combative philosopher and the UK’s “foremost scourge of” scientific pretension. ” [73]
Mary Warnock (born 1924) is a British philosopher of morality , education and mind , and writer on existentialism . From 1984 to 1991, she was Mistress of Girton College, Cambridge . Warnock studied at Lady Margaret Hall , Oxford , and was made an Honorary Fellow in 1984. She delivered the Gifford Lectures , entitled “Imagination and Understanding,” at the University of Glasgow in 1992. She has written extensively on ethics , existentialism and philosophy of mind. [74]
Philippa Foot (1920-2010) was a British philosopher , most notable for her works in ethics . She was one of the founders of contemporary virtue ethics , inspired by the ethics of Aristotle . Her later career marked a significant change in her work in the 1950s and ’60s, and may be seen as an attempt to modernize Aristotelian ethical theory, to show that it is adaptable to a contemporary world, and thus, that it could with such popular theories as modern deontological and utilitarian ethics. Some of her work was crucial in the re-emergence of normative ethics withinanalytic philosophy , especially her criticism of consequentialism and of non-cognitivism . A familiar example is the continuing discussion of an example of the subject referred to the trolley problem . Foot’s approach is influenced by the work of Wittgenstein .
Patricia Churchland (born 1943) is a Canadian-American philosopher noted for her contributions to neurophilosophy and the philosophy of mind . She is UC President’s professor of philosophy emerita at the University of California, San Diego (UCSD), Where She has taught since 1984. Educated at the University of British Columbia , the University of Pittsburgh , and the University of Oxford , she taught philosophy at the University of Manitoba from 1969 to 1984.
Susan Haack (born 1945) is distinguished professor of the humanities, professor of philosophy, and professor of law at the University of Miami. She earned her PhD at Cambridge University . She has written on logic , the philosophy of language , epistemology , and metaphysics . Her pragmatism follows that of Charles Sanders Peirce . Haag’s major contribution to philosophy is her epistemological theory called foundherentism , [75] [76] [77] which is her attempt to avoid the logical problems of both pure foundationalism(which is susceptible to infinite regress) and pure coherentism (which is susceptible to circularity). Haack has been a fierce critic of Richard Rorty . [78] [79]She is critical of the view that is a specific female perspective on logic and scientific truth and is critical of feminist epistemology . She holds that many feminist critics of science and philosophy are overly concerned with ‘ political correctness ‘. [80] [81] |
---
abstract: 'According to the International Technology Roadmap for Semiconductors in the next 10-15 years the limits imposed by the physics of switch operation will be the major roadblock for future scaling of the CMOS technology. Among these limits the most fundamental is represented by the so-called Shannon-von Neumann-Landauer limit that sets a lower bound to the minimum heat dissipated per bit erasing operation. Here we show that in a nanoscale switch, operated at finite temperature T, this limit can be beaten by trading the dissipated energy with the uncertainty in the distinguishability of switch logic states. We establish a general relation between the minimum required energy and the maximum error rate in the switch operation and briefly discuss the potential applications in the design of future switches.'
address: 'NiPS Laboratory, Dipartimento di Fisica, Universitá di Perugia, and Instituto Nazionale di Fisica Nucleare, Sezione di Perugia, I-06100 Perugia, Italy'
author:
- 'L. Gammaitoni[@lgemail]'
title: 'Beating the Landauer’s limit by trading energy with uncertainty'
---
In the last forty years the semiconductor industry has been driven by its ability to scale down the size of the CMOS-FET[@1] switches, the building block of present computing devices, and to increase computing capability density up to a point where the power dissipated in heat during computation has become a serious limitation[@2; @3]. According to the ITRS[@4] the limits imposed by the physics of switch operation will be the roadblock for future scaling in the next 10-15 years. The limit on the minimum energy per switching is set at $k_B T \ln(2)$ (approx $10^{-21} J$ at room temperature)[@5; @6] identified with the so-called Shannon-von Neumann-Landauer[@7] (briefly Landauer) limit. Power dissipated versus switching speed of devices have been characterized since the seventies[@8; @9] by a linear scaling rule where micro-fabrication capabilities, through the replacement of bipolar transistors with CMOS, allowed the continuation of the exponential increase trend in information processing capability which has been known as Moore’s law[@10]. However, since 2004 the Nanoelectronics Research Initiative[@11], a US based consortium of Semiconductor Industry Association companies, has launched a grand challenge to address the fundamental limits of the physics of switches. Such limits are mainly represented by the minimum energy and minimum time, required to operate a switch and are estimated by assuming that a two-well, one-barrier model is a valid abstraction for electron transport switching devices. In this approach the FET transistor can be thought of as consisting of two wells (source and drain) located at a distance $a$ and separated by a potential energy barrier (channel) of height $E_b$ (see Fig.1).
![Schematic representation of a bistable switch. The switch dynamics can be described in terms of the motion of a particle in a double well potential energy. Each well represents a single logic state (left well, $x<0$, logic state Ò0Ó; right well, $x>0$, logic state Ò1Ó). The two wells are located at a distance $a$ and separated by a potential energy barrier height $E_b$. []{data-label="F1"}](fig1.eps){width="8cm"}
The two logic states Ò0Ó and Ò1Ó are here represented by an electron (or the equivalent information carrier) sitting in the left and right well, respectively. The switching event is obtained by making the electron energetic enough to overcome the potential barrier separating the two states or, what is equivalent, by lowering the potential barrier on the electron side. Notwithstanding the simplicity of this model it has been often applied[@5] in order to estimate the relevant aspects of the physics of switches. Specifically, the minimum operational energy of the switch is computed by assuming that the barrier height $E_b$ is chosen in order to enable the distinguishability of the two logic states. Such a condition is threaten in fact by unwanted crossings of the potential barrier due to thermally induced (classical) jumps or tunneling (quantum) effects. The larger $E_b$ and the distance $a$ between the two wells, the lower the threat to the distinguishability of the two states. Additionally the Heisemberg energy-time indetermination relation is invoked in this context to set a further limit to the barrier height $E_b$. Based on these arguments the authors in [@6] have been able to estimate a minimum energy per switching event of the order of few $k_B T \ln(2)$. Clearly such an estimate has a necessarily qualitative character. In order to better highlight the extent of the validity of the arguments used in this estimate we note that in a nanoscale switch in contact with a thermal bath at temperature $T$, the role of fluctuations (thermal or quantum) on the system dynamics can be relevant and it is better accounted by introducing a statistical description of the electron position in terms of a probability density function $p(x)$. In this condition the switch assumes the logic state Ò0Ó with probability $p_0$ measured by the area under $p(x)$ when $x<0$ and assumes the logic state Ò1Ó with probability $p_1$ measured by the area under $p(x)$ when $x>0$. When the potential is symmetric the equilibrium probability distribution dictates: $p_0 = p_1 =1/2$ (Fig 2a).
![Potential energy and probability density function. : the probability density function $p(x)$ is plotted together with the potential energy for the symmetric case. The probability of realization of a given logic state is represented by the shaded area below $p(x)$, for Ò0Ó (left well) and for Ò1Ó (right well). : Same quantities as in , after the reset operation obtained by changing the potential energy with the addition of an external DC signal. The area under the right side can be interpreted as the error probability $P_e$.[]{data-label="F2"}](fig2.eps){width="9cm"}
There are two relevant assumptions in the minimum energy estimate above that require a deeper discussion:
i\) the calculation in [@5; @6] implicitly assumes that the system is far from equilibrium. In fact, in a symmetric system like the one represented in Fig. 1, subjected to thermal and/or quantum fluctuations, regardless the value of $E_b$ and the initial state, if one wait long enough the distiguishability will be lost due to the establishment of equilibrium probability distribution. Thus in order to preserve the distinguishability, the switch has to be operated far from equilibrium. Moreover, during the relaxation at equilibrium process, the switch stochastic dynamics becomes relevant and some attention has to be paid to the statistical features of the fluctuations[@12; @13].
ii\) The switching operation assumed in [@5; @6] is a physically irreversible one. In fact an amount of energy equal or larger than $E_b$, required by the electron in the switching process, is unavoidably lost. In other words the tilting of the potential in Fig. 2b is a dissipative operation. Although this is generally the case in standard CMOS technology, recent results[@14; @15; @16] in the studies of energy dissipation at nanoscale could set the road for low-dissipation switching dynamics where an amount of energy smaller than $E_b$ might be dissipated. However, even in this most favorable case, the minimum switching energy cannot be set to zero due to the logical reversibility issue of the switching operation[@17]. In fact, it is known that the erasure of one bit of information (a logically irreversible operation) produces a decrease of the system entropy equal to $k_B \ln(2)$ and thus, if the erasure is operated at temperature $T$, should dissipate at least $Q_L = k_B T \ln(2)$ of energy[@7], a value commonly addressed as the Landauer’s limit. It is now a common understanding that such limit holds down to nanoscale[@16; @19].
In order to show how to beat the Landauer’s limit, letÕs consider a typical logically irreversible switch operation. This is the so-called [*reset operation*]{} where a switch changes from an unknown state to a well-defined state. LetÕs suppose that we want to set the switch to logic state Ò0Ó, corresponding to the system dynamics located in the left well $(x<0)$. Such a reset operation can be achieved by tilting the potential toward left with the result of lowering the potential barrier that separates the two states. According to Landauer[@7] this operation is associated with an unavoidable minimum energy dissipation due to the decrease in entropy as a consequence of the decrease in the number of configuration states available to our system. In fact, following the second principle of thermodynamics a decrease of entropy $\Delta S$ is associated with a minimum energy dissipation $Q = T \Delta S$. The change in entropy is readily computed as follows: initially the switch is in an unknown state thus the number of states available is $2$ (both Ò0Ó and Ò1Ó are plausible). After the reset, the number of available states decreases from $2$ to $1$, thus the associate change in entropy according to Boltzmann is:
$$\label{dsBotlz}
\Delta S=S_f - S_i = k_B (\ln(1)-\ln(2)) = -k_B \ln(2)$$
This results leads immediately to the Landauer’s estimate $Q_L= -k_B T \ln(2)$ (minus sign imply that energy gets dissipated into heat).
In a real nanoscale switch in contact with a thermal bath at temperature $T$ however, the role of fluctuations requires a probabilistic approach where the switch behavior is best addressed in terms of stochastic nonlinear dynamics[@18]. In order to fix our ideas we consider the switch operation in terms of the dynamics of a material particle subjected to a nonlinear (bistable) potential (as in Fig. 1) and a fluctuating force. The time evolution of such a particle is described by a proper Langevin equation[@Gardiner]:
$$\label{motion}
m \ddot{x} = -{{dU(x)}\over{dx}} - \gamma \dot{x} + \sigma \xi(t)$$
Where $U(x)$ is the bistable potential and $\xi(t)$ represents the fluctuation whose statistical features are connected with the dissipative properties $\gamma$ by a proper fluctuation-dissipation relation. The time evolution of the probability density $p(x,t)$ is usually described in terms of the associated Fokker-Planck equation[@Gardiner]. In stationary condition the two states: Ò0Ó and Ò1Ó are realized with probability respectively $p_0$ and $p_1$ given by:
$$\label{prob}
p_0 = \int_{-\infty}^{0} {p(x) dx}, \qquad p_1 = \int_{0}^{+\infty}{p(x) dx}$$
where $p(x)$ is the stationary probability density and $p_0+p_1=1$.
Before the reset operation the potential is symmetric and thus $p_0 = p_1 = 0.5$. After the reset, the two probabilities change (Fig.2b) and depending on the degree of tilting (i.e. the intensity of the resetting signal) $p_0$ takes a value in the interval $(0.5,1)$ while $p_1=1-p_0$ takes accordingly a value in the interval $(0,0.5)$. Based on our resetting purpose a non-zero $p_1$ can thus be interpreted as the error probability of the reset operation: the larger $P_e=p_1$ the larger the probability of failure.
![Energy ratio $\eta_L$ as a function of the error probability $P_e$. The energy ratio $\eta_L$ represents the fraction of Landauer’s energy required to perform the reset operation in the presence of a finite error probability $P_e$. For a bistable switch $(N=2)$ if we accept an error probability of $20\%$ $(Pe=0.2)$ we need to dissipate approx $1/4$ of the minimum required by the Landauer’s limit. Multistable switches $(N=3, N=4)$ show an energy ratio $\eta_L$ larger than the bistable one. In the large $N$ limit $\eta_L$ becomes a linear function of $P_e$.[]{data-label="figure3"}](fig3.eps){width="8.5cm"}
Within this description, the change in entropy associated with the reset operation can be computed according to Gibbs as:
$$\label{Gibbs-e}
S = -k_B \sum_i{p_i \ln{p_i}}$$
where the sum is extended here to the two possible states $i=0,1$. The Gibbs entropy before the reset operation $(p_0 = p_1 = 0.5)$ is promptly computed as $S_i=k_B \ln(2)$. After the reset operation, following (\[Gibbs-e\]) we have:
$$\label{Sf}
S_f(P_e) = -k_B((1- P_e) \ln(1-P_e) + P_e \ln(P_e))$$
where we have used $p_0=1-P_e$. Accordingly the energy dissipated during the erasure operation is now a function of the error probability: $Q(P_e) = T \Delta S(P_e)$, i.e.
$$\begin{aligned}
\label{QPe}
Q(P_e) & = & -k_B T ((1- P_e) \ln(1-P_e) + P_e \ln(P_e)) +\\
& & - k_B T \ln(2)\end{aligned}$$
In Fig. 3 we plot the energy ratio $\eta_L = Q(P_e)/Q_L$ as a function of the error probability $P_e$. As it is well apparent, for $P_e > 0$ we have $\eta_L <1$, implying that if we are willing to accept a larger-than-zero error probability, we can beat the LandauerÕs limit and perform the resetting operation with an energy toll smaller than $k_B T \ln(2)$. Consistently the zero limit for energy dissipation is reached when $P_e=0.5$, corresponding to the maximum uncertainty (complete undistinguishability according to [@5]), i.e. no reset. In the $P_e=0$ limit we regain the Landauer’s prediction $Q(0) = Q_L$.
We point out that the analysis presented here is completely general and does not depend on the switching error mechanism nor on the specific potential landscape typical of different switches.
A simple generalization of this calculus considers multistable switches where the reset operation takes the switch from an unknown state among $N$ equally probable states to a single, well-defined state. In this case the system entropy before the reset operation is $S_i(N) = k_B \ln(N)$ and after the reset operation is
$$\begin{aligned}
\label{NSf}
S_f(P_e,N) & = & -k_B (1- P_e) \ln(1-P_e) + \\
& & -k_B P_e (\ln (P_e) - \ln(N-1) )\end{aligned}$$
thus the minimum dissipated energy is $$\begin{aligned}
\label{QN}
Q(P_e, N) & = & - k_B T (1- P_e) ln(1-P_e) + \\
& & - k_B T P_e (\ln(P_e)-\ln(N-1)) + \\
& & - k_B T \ln(N)\end{aligned}$$
The generalized energy ratio $\eta_L = Q(P_e , N)/Q_L(N)$, where now $Q_L(N) = - k_B T \ln(N)$, is also plotted in Fig. 3. As it is well apparent for a given error probability the bistable switch (case with $N=2$) has a lower $\eta_L$ compared to any other multistable switch. In the limit of large $N$ we obtain the asymptotic value
$$\label{largeN}
\lim_{N\rightarrow \infty} \eta_L = 1- P_e$$
We believe that these results have potential applications in the design of future switches. In fact, computation with switches characterized by $P_e > 0$ is far from being a mere hypothesis. Recently addressed within the paradigm of noise driven switches[@13; @20; @21], it and has been the topic of a focussed interest in the framework of the so-called stochastic computing[@22], introduced by John Von Newmann[@23] since the sixties.
We acknowledge financial support from European Commission (FPVII, G.A. no: 256959, Nanopower and no: 270005, Zeropower) and ONRG Grant N 00014-11-1-0695).
e-mail: luca.gammaitoni@pg.infn.it
CMOS (Complementary MetalÐOxideÐSemiconductor), FET (Field-Effect Transistor).
K. Bernstein, R.K. Cavin, W. Porod, A. Seabaugh, J. Welser, Proceedings of the IEEE , vol.98, no.12, pp.2169-2184, Dec. 2010.
Jeffrey J. Welser, George I. Bourianoff, Victor V. Zhirnov and Ralph Keary Cavin, J. Nanopar. Res., 10:1-10 (2008).
ITRS (International Technology Roadmap for Semiconductors), Semiconductor Industry Association, 2001, http://public.itrs.net.
V.V. Zhirnov, R. K. Cavin, J. A. Hutchby, G. I. Bourianoff, Proceedings of the IEEE, vol.91, no.11, pp.1934-1939, Nov. 2003.
R. K. Cavin, V.V. Zhirnov, D. J. C. Herr, A. Avila, and J. Hutchby, J. Nanoparticle Res., vol. 8, pp. 841Ð858, 2006. R. Landauer, IBM J. Res. Dev. 5, 183-191 (1961). R. H. Dennard, F. H. Gaensslen, H. N.Yu, V. L. Rideout, Bassous E and A. R LeBlanc, IEEE J Solid-State Circ, 9(5) ,256Ð68, 1974. G. Baccarani, M. R. Wordeman and R. H. Dennard, IEEE Trans Electron Devices, 31(4), 452Ð62, 1984. D. Jorgenson, MooreÕs law and the emergence of the new economy, Semiconductor Industry Association, Washington, DC, 2005 Annual Rep., 2005. The Nanoelectronics Research Initiative (nri.src.org) was formed in 2004 as a consortium of Semiconductor Industry Association (SIA) (www.siaonline.org) companies to manage a university-based research program as part of the Semiconductor Research Corporation (SRC) (www.src.org). L. B. Kish, Phys. Lett. A, vol. 305, pp. 144Ð149, (2002). L. Gammaitoni, Appl. Phys. Lett., 91, 224104, (2007). Quirin P. Unterreithmeier, Thomas Faust, and Jšrg P. Kotthaus, Phys. Rev. Lett. 105, 027205 (2010). A. Eichler, J.Moser, J. Chaste, M. Zdrojek, I. Wilson-Rae and A. Bachtold, Nat. Nanotech. May 2011. B. Lambson, D. Carlton, and J. Bokor, Phys. Rev. Lett. 107, 010604 (2011). C. H. Bennett, Int. J. Theoretical Physics, vol. 21, no. 12, pp. 905-940, December, 1982. Kousuke Shizume, Phys. Rev. E. 52, 3495 (1995). C.W. Gardiner, ÒHandbook of Stochastic Methods: For Physics, Chemistry and Natural SciencesÓ (Springer, Berlin). 1985.
S. Toyabe, T. Sagawa, M. Ueda, E. Muneyuki, M. Sano, Nature Physics 6, 12, 988-992 (2010).
L. Worschech, F. Hartmann, T. Y. Kim, S. Hofling, M. Kamp, A. Forchel, J. Ahopelto, I. Neri, A. Dari, L. Gammaitoni, Appl. Phys. Lett., 96, 042112, (2010). F. Hartmann, D. Hartmann, P. Kowalzik, L. Gammaitoni, A. Forchel; L. Worschech, Appl. Phys. Lett., 96, 082108, (2010) N. R. Shanbhag , R. A. Abdallah , R. Kumar , D. L. Jones, Proceedings of the 47th Design Automation Conference, June 13-18, 2010, Anaheim, California (2010). J. Von Neumann, Probabilistic logics and the synthesis of reliable organisms from unreliable components, The Collected Works of John von Neumann. Macmillan, (1963).
|
/*
* Kernel/userspace transport abstraction for Hyper-V util driver.
*
* Copyright (C) 2015, Vitaly Kuznetsov <vkuznets@redhat.com>
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 as published
* by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE or
* NON INFRINGEMENT. See the GNU General Public License for more
* details.
*
*/
#include <linux/slab.h>
#include <linux/fs.h>
#include <linux/poll.h>
#include "hyperv_vmbus.h"
#include "hv_utils_transport.h"
static DEFINE_SPINLOCK(hvt_list_lock);
static struct list_head hvt_list = LIST_HEAD_INIT(hvt_list);
static void hvt_reset(struct hvutil_transport *hvt)
{
kfree(hvt->outmsg);
hvt->outmsg = NULL;
hvt->outmsg_len = 0;
if (hvt->on_reset)
hvt->on_reset();
}
static ssize_t hvt_op_read(struct file *file, char __user *buf,
size_t count, loff_t *ppos)
{
struct hvutil_transport *hvt;
int ret;
hvt = container_of(file->f_op, struct hvutil_transport, fops);
if (wait_event_interruptible(hvt->outmsg_q, hvt->outmsg_len > 0 ||
hvt->mode != HVUTIL_TRANSPORT_CHARDEV))
return -EINTR;
mutex_lock(&hvt->lock);
if (hvt->mode == HVUTIL_TRANSPORT_DESTROY) {
ret = -EBADF;
goto out_unlock;
}
if (!hvt->outmsg) {
ret = -EAGAIN;
goto out_unlock;
}
if (count < hvt->outmsg_len) {
ret = -EINVAL;
goto out_unlock;
}
if (!copy_to_user(buf, hvt->outmsg, hvt->outmsg_len))
ret = hvt->outmsg_len;
else
ret = -EFAULT;
kfree(hvt->outmsg);
hvt->outmsg = NULL;
hvt->outmsg_len = 0;
out_unlock:
mutex_unlock(&hvt->lock);
return ret;
}
static ssize_t hvt_op_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
struct hvutil_transport *hvt;
u8 *inmsg;
int ret;
hvt = container_of(file->f_op, struct hvutil_transport, fops);
inmsg = memdup_user(buf, count);
if (IS_ERR(inmsg))
return PTR_ERR(inmsg);
if (hvt->mode == HVUTIL_TRANSPORT_DESTROY)
ret = -EBADF;
else
ret = hvt->on_msg(inmsg, count);
kfree(inmsg);
return ret ? ret : count;
}
static unsigned int hvt_op_poll(struct file *file, poll_table *wait)
{
struct hvutil_transport *hvt;
hvt = container_of(file->f_op, struct hvutil_transport, fops);
poll_wait(file, &hvt->outmsg_q, wait);
if (hvt->mode == HVUTIL_TRANSPORT_DESTROY)
return POLLERR | POLLHUP;
if (hvt->outmsg_len > 0)
return POLLIN | POLLRDNORM;
return 0;
}
static int hvt_op_open(struct inode *inode, struct file *file)
{
struct hvutil_transport *hvt;
int ret = 0;
bool issue_reset = false;
hvt = container_of(file->f_op, struct hvutil_transport, fops);
mutex_lock(&hvt->lock);
if (hvt->mode == HVUTIL_TRANSPORT_DESTROY) {
ret = -EBADF;
} else if (hvt->mode == HVUTIL_TRANSPORT_INIT) {
/*
* Switching to CHARDEV mode. We switch bach to INIT when
* device gets released.
*/
hvt->mode = HVUTIL_TRANSPORT_CHARDEV;
}
else if (hvt->mode == HVUTIL_TRANSPORT_NETLINK) {
/*
* We're switching from netlink communication to using char
* device. Issue the reset first.
*/
issue_reset = true;
hvt->mode = HVUTIL_TRANSPORT_CHARDEV;
} else {
ret = -EBUSY;
}
if (issue_reset)
hvt_reset(hvt);
mutex_unlock(&hvt->lock);
return ret;
}
static void hvt_transport_free(struct hvutil_transport *hvt)
{
misc_deregister(&hvt->mdev);
kfree(hvt->outmsg);
kfree(hvt);
}
static int hvt_op_release(struct inode *inode, struct file *file)
{
struct hvutil_transport *hvt;
int mode_old;
hvt = container_of(file->f_op, struct hvutil_transport, fops);
mutex_lock(&hvt->lock);
mode_old = hvt->mode;
if (hvt->mode != HVUTIL_TRANSPORT_DESTROY)
hvt->mode = HVUTIL_TRANSPORT_INIT;
/*
* Cleanup message buffers to avoid spurious messages when the daemon
* connects back.
*/
hvt_reset(hvt);
mutex_unlock(&hvt->lock);
if (mode_old == HVUTIL_TRANSPORT_DESTROY)
hvt_transport_free(hvt);
return 0;
}
static void hvt_cn_callback(struct cn_msg *msg, struct netlink_skb_parms *nsp)
{
struct hvutil_transport *hvt, *hvt_found = NULL;
spin_lock(&hvt_list_lock);
list_for_each_entry(hvt, &hvt_list, list) {
if (hvt->cn_id.idx == msg->id.idx &&
hvt->cn_id.val == msg->id.val) {
hvt_found = hvt;
break;
}
}
spin_unlock(&hvt_list_lock);
if (!hvt_found) {
pr_warn("hvt_cn_callback: spurious message received!\n");
return;
}
/*
* Switching to NETLINK mode. Switching to CHARDEV happens when someone
* opens the device.
*/
mutex_lock(&hvt->lock);
if (hvt->mode == HVUTIL_TRANSPORT_INIT)
hvt->mode = HVUTIL_TRANSPORT_NETLINK;
if (hvt->mode == HVUTIL_TRANSPORT_NETLINK)
hvt_found->on_msg(msg->data, msg->len);
else
pr_warn("hvt_cn_callback: unexpected netlink message!\n");
mutex_unlock(&hvt->lock);
}
int hvutil_transport_send(struct hvutil_transport *hvt, void *msg, int len)
{
struct cn_msg *cn_msg;
int ret = 0;
if (hvt->mode == HVUTIL_TRANSPORT_INIT ||
hvt->mode == HVUTIL_TRANSPORT_DESTROY) {
return -EINVAL;
} else if (hvt->mode == HVUTIL_TRANSPORT_NETLINK) {
cn_msg = kzalloc(sizeof(*cn_msg) + len, GFP_ATOMIC);
if (!cn_msg)
return -ENOMEM;
cn_msg->id.idx = hvt->cn_id.idx;
cn_msg->id.val = hvt->cn_id.val;
cn_msg->len = len;
memcpy(cn_msg->data, msg, len);
ret = cn_netlink_send(cn_msg, 0, 0, GFP_ATOMIC);
kfree(cn_msg);
return ret;
}
/* HVUTIL_TRANSPORT_CHARDEV */
mutex_lock(&hvt->lock);
if (hvt->mode != HVUTIL_TRANSPORT_CHARDEV) {
ret = -EINVAL;
goto out_unlock;
}
if (hvt->outmsg) {
/* Previous message wasn't received */
ret = -EFAULT;
goto out_unlock;
}
hvt->outmsg = kzalloc(len, GFP_KERNEL);
if (hvt->outmsg) {
memcpy(hvt->outmsg, msg, len);
hvt->outmsg_len = len;
wake_up_interruptible(&hvt->outmsg_q);
} else
ret = -ENOMEM;
out_unlock:
mutex_unlock(&hvt->lock);
return ret;
}
struct hvutil_transport *hvutil_transport_init(const char *name,
u32 cn_idx, u32 cn_val,
int (*on_msg)(void *, int),
void (*on_reset)(void))
{
struct hvutil_transport *hvt;
hvt = kzalloc(sizeof(*hvt), GFP_KERNEL);
if (!hvt)
return NULL;
hvt->cn_id.idx = cn_idx;
hvt->cn_id.val = cn_val;
hvt->mdev.minor = MISC_DYNAMIC_MINOR;
hvt->mdev.name = name;
hvt->fops.owner = THIS_MODULE;
hvt->fops.read = hvt_op_read;
hvt->fops.write = hvt_op_write;
hvt->fops.poll = hvt_op_poll;
hvt->fops.open = hvt_op_open;
hvt->fops.release = hvt_op_release;
hvt->mdev.fops = &hvt->fops;
init_waitqueue_head(&hvt->outmsg_q);
mutex_init(&hvt->lock);
spin_lock(&hvt_list_lock);
list_add(&hvt->list, &hvt_list);
spin_unlock(&hvt_list_lock);
hvt->on_msg = on_msg;
hvt->on_reset = on_reset;
if (misc_register(&hvt->mdev))
goto err_free_hvt;
/* Use cn_id.idx/cn_id.val to determine if we need to setup netlink */
if (hvt->cn_id.idx > 0 && hvt->cn_id.val > 0 &&
cn_add_callback(&hvt->cn_id, name, hvt_cn_callback))
goto err_free_hvt;
return hvt;
err_free_hvt:
spin_lock(&hvt_list_lock);
list_del(&hvt->list);
spin_unlock(&hvt_list_lock);
kfree(hvt);
return NULL;
}
void hvutil_transport_destroy(struct hvutil_transport *hvt)
{
int mode_old;
mutex_lock(&hvt->lock);
mode_old = hvt->mode;
hvt->mode = HVUTIL_TRANSPORT_DESTROY;
wake_up_interruptible(&hvt->outmsg_q);
mutex_unlock(&hvt->lock);
/*
* In case we were in 'chardev' mode we still have an open fd so we
* have to defer freeing the device. Netlink interface can be freed
* now.
*/
spin_lock(&hvt_list_lock);
list_del(&hvt->list);
spin_unlock(&hvt_list_lock);
if (hvt->cn_id.idx > 0 && hvt->cn_id.val > 0)
cn_del_callback(&hvt->cn_id);
if (mode_old != HVUTIL_TRANSPORT_CHARDEV)
hvt_transport_free(hvt);
}
|
Votive candles bearing the photos of two men who were fatally stabbed on a Portland, Ore., light-train while trying to stop another man from harassing two young women with an anti-Muslim tirade, sit on a rain-soaked memorial on Tuesday, May 30, 2107 in Portland. Taliesin Myrddin Namkai-Meche, 23, and Ricky Best, 53, died in the attack. The suspect, Jeremy Joseph Christian, 35, made a first court appearance on charges of aggravated murder and attempted murder Tuesday in a Portland, Oregon courthouse. (AP Photo/Gillian Flaccus)
The Latest: Trains, buses to halt in honor of men killed
May 30, 2017 - 9:53 pm
The Associated Press
PORTLAND, Ore. (AP) — The Latest on a deadly stabbing attack on a Portland, Oregon, light-rail train (all times local):
6:40 p.m.
Transit officials plan to halt all buses and trains Friday in a moment of silence honoring the men killed and others affected by the attack on a northeast Portland train.
The Oregonian/OregonLive reports (https://goo.gl/y5ktAS ) that MAX operators will stop trains at their nearest station and bus drivers will pull over at stops or along their routes at noon Friday.
TriMet also invites the public to participate in the minute of silence.
"TriMet stands together with our community," the agency said in a statement.
The statement refers to Rick Best, 53; Taliesin Myrddin Namkai-Meche, 23; and Micah Fletcher, 21. Best and Namkai-Meche died of multiple stab wounds. Fletcher was released from an area hospital late on Monday.
___
4:40 p.m.
Prosecutors say the man charged with stabbing three men aboard a Portland light-rail train confessed while in the back seat of a patrol car after his arrest.
Court documents released Tuesday say Jeremy Joseph Christian was captured on video and audio surveillance saying he had stabbed three people in the neck. Two died.
The probable cause affidavit written by Multnomah County Deputy District Attorney Ryan Lufkin says Christian also calls himself a "patriot" and says, "That's what liberalism gets you" as he discusses the killings.
Christian appeared in court on aggravated murder and other charges Tuesday, but he didn't enter a plea.
Authorities say he stabbed three men who tried to stop him from shouting anti-Muslim slurs at two young women. One of the women was wearing a Muslim head covering and both were black.
____
4:05 p.m.
Commotion erupted outside the courtroom as the man charged with stabbing three men aboard a Portland light-rail train was arraigned.
Just as Jeremy Christian concluded his brief appearance, yelling and screaming could be heard from the hallway as supporters of the victims confronted a supporter of the defendant.
Deputies escorted the man from the scene, prompting the group to lash out at law enforcement for protecting him.
Those involved in the confrontation could not get into the courtroom because all the seats were taken.
Courtroom security barred spectators from leaving the arraignment until the disruption simmered down.
___
3:20 p.m.
The lone man to survive a stabbing attack on a Portland, Oregon, light rail train says he's having a difficult time processing what happened.
KGW-TV reports (https://goo.gl/HJjwpI) that Micah Fletcher says he's focusing on trying to get better. "I got stabbed in the neck on my way to work, randomly, by a stranger I don't know, for trying to just be a nice person," he said. "Like, I don't know what to do after that, you know."
He told the TV station, "I'm healing. That's what I'm doing. As much as I can, in whatever way I can."
A hospital spokeswoman says Fletcher was released Monday night.
Authorities say Jeremy Christian on Friday started verbally abusing two young women, including one wearing a hijab. Police say when three other men on the train, including Fletcher, intervened, Christian attacked them. Two men were killed.
___
2:54 p.m.
The man police say fatally stabbed two men who tried to shield young women from an anti-Muslim tirade shouted "you call it terrorism I call it patriotism!" during his first court appearance.
Jeremy Joseph Christian, 35, was in Multnomah County courtroom Tuesday afternoon facing two counts of felony aggravated murder and other charges for the Friday incident on a Portland, Oregon, light-rail train.
He made repeated outbursts in court.
He has been appointed public defenders. Lane Borg, the head of the local public defender agency, said the office was "saddened by this tragedy" but urged people to let the justice system take its course.
Authorities say Christian started verbally abusing two young women, including one wearing a hijab. Three men on the train intervened before police say Christian attacked them, killing two and wounding one.
___
1:43 p.m.
The man charged with stabbing three men on a Portland light-rail train told jailers that he has no income, no mental health issues and does not remember the last time he had a permanent address.
Court documents based on Jeremy Christian's interview at the Multnomah County Jail show he was concerned about free speech. The interviewer wrote that Christian became loud and animated when talking about what he believed to be the suppression of free speech.
Christian says he went to school through 9th grade, but passed the high school equivalency exam commonly known as the G.E.D. and took some community college classes.
Christian has three prior felonies.
Christian faces aggravated murder and other charges. Police say he went into a racist tirade on the train and stabbed the men who intervened, killing two and wounding a third.
___
12:20 p.m.
The homicide detective investigating a triple stabbing on a Portland light-rail train says in court documents that surveillance and cellphone video shows 35-year-old Jeremy Christian cutting the three victims with a knife last Friday.
Detective Michele Michaels says in a probable cause affidavit made public Tuesday that the videos have audio of Christian spewing racial and religious epithets during the attack that killed two men and wounded a third.
Police and witnesses say the victims were defending two teen girls who were the focus of Christian's tirade. One is black and the other was wearing a hijab. Michaels says the girls told her they had felt threatened.
Christian faces charges of aggravated murder and other crimes.
He told jailers he has no permanent address.
___
10:10 a.m.
The mother of a 23-year-old man stabbed to death on a Portland light-rail train while trying to defend two young women from an anti-Muslim tirade has asked President Trump to encourage Americans to protect and watch out for each other.
In a letter to Trump, Asha Deliverance said her son Taliesin Myrddin Namkai-Meche and two other men acted did not hesitate to confront the bully because the two female passengers were being harassed. Her son and another man died. A third man was injured and released from a hospital Tuesday.
Deliverance says she is grieving but proud of her son's selfless action.
She urged Trump to condemn acts of violence that result from hate speech and hate groups. She says such a step would deeply honor her son's sacrifice.
The president said in a tweet Monday that the three stabbing victims stood up to hate and intolerance, and the attack was unacceptable.
___
8:55 a.m.
The lone surviving victim of a triple stabbing aboard a Portland light-rail train has been released from the hospital.
Micah Fletcher suffered a neck wound Friday after coming to the defense of two young women who were verbally abused by a man before he allegedly stabbed Fletcher and two other men who died. One of the women was wearing a hijab.
Back in high school, he won a citywide Portland Public Schools poetry slam. In one of his poems, he spoke out against the prejudice faced by Muslims since the terrorist attacks of Sept. 11, 2001.
___
12:23 a.m.
The man police say fatally stabbed two other men who tried to shield young women from an anti-Muslim tirade on a Portland, Oregon, light-rail train makes his initial court appearance Tuesday and the city's mayor says he hopes the slayings will inspire "changes in the political dialogue in this country."
The attack happened Friday, the first day of Ramadan, the holiest time of the year for Muslims. Authorities say Christian started verbally abusing two young women, including one wearing a hijab. Three other men on the train intervened before police say Christian attacked them, killing two and wounding one.
President Donald Trump condemned the stabbings, writing Monday on Twitter: "The violent attacks in Portland on Friday are unacceptable. The victims were standing up to hate and intolerance. Our prayers are w/ them."
Mayor Ted Wheeler said he appreciated Trump's words but stressed the need for action. Wheeler urged organizers to cancel a "Trump Free Speech Rally" in Portland and other similar events next weekend, saying they are inappropriate and could be dangerous. |
Sociology nature versus nurture and play
Best answer: they don't sociologist focus on nurture--that is, socialization and the effects of the social world, rather than nature--the phenotypical behavior of organisms as a result of their biological makeup however, this focus is a matter of disciplinary preference both nature. What is nature versus nurture sociological definition of nature versus nurture example, sample sentence, & pronunciation of nature versus nurture free online sociology dictionary & oer. Nature vs nurture debate nature vs nurture a) nurture is how a baby learns to develop human like characteristics we're a different species and i know that doesn't play a big role in this particular experiment but it's just wrong 7 a. The nature vs nurture debate is the scientific several studies done on twins separated shortly after birth reveal that genetics do play a significant role in the development of certain personality characteristics the topic of nature versus nurture has always fascinated me. Transcript of the nature vs nurture debate - research project sociology the nature vs nurture background research according to the norc general social survey in 1993 in america. The society pages (tsp) is an open-access social science project headquartered in the department of sociology at the university of minnesota toggle navigation blog pinterest for instructors about socimages transcending the nature/nurture debate.
Sociology 120: nature vs nurture lecture video 1 of 5 (october 27, 2015) - duration: 14:01 sociology 120: gregg robinson lectures 401 views. Socialization (nature vs nurture) the nature vs nurture debate explores the relative importance of cultural mattie is a new sociology professor at the local college during her first lecture, she noticed that some students were yawning. New genetic findings continue to re-open the nature vs nurture but we do know that both play a part what is nature vs nurture it has been reported that the use of the terms nature and nurture as a convenient catch-phrase for the roles of heredity and environment in human development. The nature versus nurture debate sociology essay print reference this apa mla mla-7 harvard vancouver it is a fact that a combination of nature and nurture play important roles in how humans behave socially sociology essay writing service essays more sociology essays sociology. Sociology (1,803) all as and a level subjects (48,725) helpful guides nature vs nurture and its affect on intelligence, personality in conclusion, it was found that both nature and nurture affect and play a role on a human's intelligence, personality.
Officially, the nature-nurture debate can trace its the environment can play a role in human development, nature has the upper hand and larger influence (behaviour genetics, 2009) in a sense, advocates of nature believed. Socialization: process by which nature vs nurture an ongoing debate: twin studies (identical vs fraternal) if environment didn't play a part in determining an individual's traits and behaviors, then identical twins should, theoretically. Early childhood development: nature verses nurture since it has been figured out that both nature and nurture play an important role in the development of an individual it is important for the parents to ensure that their children are raised sociology (201 articles) psychology.
Nature vs nurture is really a kind of flux that sees nature trying to achieve a balance with itself (nurture is an entity that is changing based. Twin studies are a vastly important tool in dissecting the nature versus nurture argument identical twin, adoption, and family studies, haimowitz exhibited many compelling research findings that help us understand the roles i wrote that nonshared environment does play a role in. Nature vs nurture: a gender debate on gender differences genes play a major role in how one physically looks as well as if a person is born male or female discussion a gender debate on gender differences. The roles of gender, race, and class in the debate of nature vs nurture download the roles of gender, race although i believe biology or nature may play a role in determining a persons potential in sociology the two words sex and gender are not synonyms. Transcript of sociology: nature vs nurture nurture nature vs burrhus frederic skinner operant conditioning burrhus frederic skinner's biography burrhus frederic skinner was born on march 20th, 1904, in a pennsylvanian town called susquehanna. Twin studies: what can they tell us about nature and nurture share tend to play a much smaller role environmental factors guang guo, professor of sociology at the university of north carolina at chapel hill.
Sociology nature versus nurture and play
1 gender roles and socialization the nature-nurture debate question: what does nature vs nurture mean the nature-nurture debate nature differences in male and female beliefs toys, play, and peer interaction. Arguments for nature or nurture as the primary explanations for human behaviour have swung back and two key areas in which the nature versus nurture debate continue to play out are around gender and such as those coming from the fields of cultural anthropology or sociology. Creative talents and the nature-nurture controversy - throughout the early 1900s papers psychology essays sociology]:: 3 works cited : 529 words (15 pages) good nature versus nurture: both play a role in development - nature versus nurture is a commonly debated topic in the.
Historical trends in the nature-nurture debate late 19th century it generated massive debate and controversy in psychology, sociology, education, and politics, not to mention the media and household the 800+ page book in the overfocus on nature vs nurture issues.
View nature and nurture - sociology from soc 1 at pasadena city college 1 even when separation comes into play for example, in a famous case involving twins socialization nature vs nurture.
Sociology - nature versus nurture the roles of nature (what we genetically inherit) and or nurture (what we learn) in making us what we are have long been argued. |
A 34-year-old man who was killed last weekend trying to stop an alleged thief in Alberta has been identified as a father-of-three from B.C.’s Fraser Valley.
Mounties said Abbotsford resident Nikkolas Steenhuisen walked out of a hardware store in Grande Prairie and found a stranger inside his truck on Saturday.
“Steenhuisen confronted the unknown man who fled to another truck and attempted to drive away,” the RMCP said in a statement.
Steenhuisen tried to stop him, Mounties said, but the suspect crashed into a parked car while trying to escape, leaving the father-of-three pinned between the two vehicles.
The victim, who was in Alberta visiting family, was airlifted to hospital for treatment but succumbed to his injuries before reaching the hospital.
Later the same day, Mounties found a burned-out pickup truck in a rural area outside Grande Prairie. Investigators have since determined it was the stolen truck involved in the incident with Steenhuisen.
After gathering evidence and interviewing witnesses, police identified and arrested a suspect Tuesday.
Michael Ginter, a 30-year-old Grande Prairie resident, has since been charged with one count of second-degree murder and one count of possession of property obtained by crime exceeding $5,000.
Ginter remains in custody and is scheduled to appear in court Friday morning.
Known to his friends as Nikko, Steenhuisen is being remembered as a dedicated father and beloved volunteer.
He was well-known in the hockey community in Abbotsford and Mission, and helped out as a trainer with the Mission City Outlaws, a Junior B team.
“"He was definitely an unsung hero... A definition of what that is. He didn't get a whole of of recognition but everyone on the team knew he was there,” said the team’s goalie, Jeffrey Veitch.
The team’s public relations coordinator, Chris Thompson, said the team has been struggling emotionally since news of the death.
“A devastating loss, you know?” she said. Who does such a thing? They didn’t know he was a dad.”
Just a few months ago, Steenhuisen watched as his boys won it all at the 2016 PJHL championships.
Thompson said while the win was huge for the boys, Nikko “was more emotional than anyone else.”
The team’s GM and President, Scott Kieler, agrees.
“He wanted a championship and he helped me get there and the boys did it for him,” he said.
Friends of the victim plan to set up a CIBC trust account for Steenhuisen's wife and daughters, but in the meantime they ask that any donations be made by e-transfer to 4nikkosgirls.outlawshockey@gmail.com. A Facebook page has also been set up in his memory, with details about the fundraiser. |
Abstract In eukaryotes, DNA polymerases (Pols) ? and ? play important roles in replication, but how these Pols contribute to the replication of the leading DNA strand has remained unclear. While the widely accepted model posits that Pol? replicates the leading strand and Pol? replicates the lagging strand, we recently published evidence that Pol? replicates both the leading and lagging DNA strands. Nevertheless, important issues pertaining to their roles in replication remain to be resolved. Here we propose a number of highly innovative ideas and experimental approaches to unambiguously establish the roles of Pol? and Pol? in replication. To determine whether Pol? or Pol? replicates the leading strand, in Aim 1 we will analyze Pol?-generated errors on the two DNA strands in genes located at different chromosomal sites and genome-wide in a number of different yeast strains, and we will also examine whether Pol?-generated errors occur on the leading stand; in Aim 2 we will use mutations in the PCNA binding domain of Pol? and Pol? to determine whether Pol? plays a major role in replicating both DNA strands or whether Pol? replicates the leading strand, and we will carry out studies to analyze the genetic basis of the mutator phenotype of the pol2M-644G and the exonuclease defective pol2-4 Pol? mutant alleles; and in Aim 3, we will determine whether as indicated from our genetic studies, Pol? incorporates rNMPs on the leading strand during its roles in recombination and mismatch repair, and not during replication. Altogether, we expect that the proposed studies will resolve the outstanding issues relating to the role of Pols ? and ? in replication, and they will have important bearing on DNA replication and associated DNA repair processes and on the understanding of the roles of these Pols in genomic fidelity. |
A little while back, we spent a fun weekend morning with our friends Veit and Julie from the German brand Macarons who visited us in Amsterdam together with their cute girls Cécile and Cleo. They also brought their friend the photographer Oliver Kröning along, who took some really cool snapshots during the day.
We had a long lunch and then all went to the park for a stroll. Those are the best kind of weekends, I feel — long and lazy days with lovely food and lovely company!
It was such a fun, relaxed day — with all of us wearing pieces of the newest Macarons collection. (Yes, there are adult jumpers available now, and how awesome is that green colour?)
Macarons is here in London today for the ShopUp event (I’m writing this post from the café, while there’s a lovely buzz going on around me. It’s been such a great event so far, and there is so much more fun to come!)
xxx Esther
PS Congrats to the Macarons family with their newest baby, a little boy called Charles, born just two weeks ago! : )
Dear Constanze,
macarons femme&homme is a very new and exciting macarons project that is about to launch in 2016!!
The adult pieces you see on these pictures are first prototypes. They will be out for the Autumn/winter 2016 collection available from june 2016 in our online shop and at exclusive retailers worlwide. From february 2016 you will find first adult jumpers in our cotton stripy crash fabric in very nice fresh colors in our online shop.
Subscribe to our newsletter to be informed about the exact date!
Leave a Comment
RELATED POSTS
Isn't this Mabel Playsuit from Mabo Kids about the cutest thing you've ever laid eyes on?! There's also a floral version which is equally sweet. Mabo Kids is one of my very favourite children's brands, both for babies and bigger kids, and I am always happy with the pieces I get from them. Anyway, I'm ...
These images from the new collection at Elfie are just so springy and happy! Not to mention so English - don't you love the pairing of floral dresses with lace cardigans and the wellies worn with shorts! I also love all the colourful felt party hats. Bring on springtime. Not long to go! Courtney x
No Added Sugar is a London-based brand with a witty sense of humour! I am absolutely in love with the Brace Yourself jumper for little boys. How cool is that? And the cardigans which offer the perfect balance between classic and contemporary style. If you take a look through the current collection, you'll find loads of ...
Maybe it's the architect in me, but I LOVE these Fabelab play-fold-birds, the idea of Copenhagen based architect (and mother of two), Michaela Weisskirchner-Barfod. Unfolded, you have a beautiful and softly padded play mat or blanket, perfectly detailed with gorgeous geometrical patchwork patterns in wonderful colour combinations. But then, thanks to an ingenious, origami style ...
Nights are getting longer and colder, and my kids have each grown tremendously over the summer, so a new pyjama order was in place... The matching PJs that my kids are wearing in the photos are from OM home, and I'm just so happy with them! I love the sweet print, so cute for both ...
I'm one of those (unorganised) mums who doesn't carry around a baby bag. I usually just tote around a canvas bag with my wallet, phone, snacks, toys (and various junk!) and a few spare nappies and wipes. Nothing is ordered or separated and when I need to change Marlow, I usually end up stressfully digging ...
Brrr... It's so cold all of a sudden! No snow yet here in London, but we're waking up to a frosty lawn every morning and I'm sending the kids off to school layered in knits! How gorgeous is the knitwear from Miou? The colours are so rich and the baby alpaca wool soooo soft! I ...
Mormor is a Danish company with a collection of hand knit products that I adore. The concept behind Mormor is wonderful: to pass on the knowledge and skills that many elderly women possess. Mormor currently has a team of over 130 women who are passionately knitting sweet and fashionable designs for a younger generation. I ...
Designer and seamstress, Allison Tovey, from Asolon recently got in touch to introduce her collection of merino wool baby basics, and I'm so glad she did. In fact I wish I would have known about her collection when Marlow was a little baby because I love putting babies in sleepsuits - I think it's the ...
I recently got the kids cashmere snoods and I honestly don't know what took me so long to catch on to this convenient fashion trend. Snoods are so much easier than scarves. Hands down. (I can totally understand now why scarves were banned from Emilie's girls' school! They're a pain to keep wrapped around the neck, and often ...
Luluzulu is a new brand of 'gender free' tights and socks for babies. Started by husband and wife team, Katie and Richard Kendrick, they've set out to create fun designs with a 'sense of style and a sprinkle of humour' for both boys and girls. I love the 'Fox in Socks' style with the little ...
Macarons is a German-based fashion brand which we have always admired for their innovative way of thinking about fabrics and their never-ending enthusiasm to transform the fashion industry -- for the better. Their perseverance to ensure that their collections are 100% produced according the GOTS guidelines, vouching for a strictly ecological, sustainable and fair manufacturing ... |
Q:
Nhibernate select all enabled categories with all enabled subcategories and all their enabled subcategories etc
I wish to create a query in nhibernate to get all enabled categories with their corresponding enabled subcategories and for those subcategories their enabled subcategories etc.
For this example:
Category A [enabled]
- Subcategory 1 [Enabled]
-- Subsubcategory 1 [Enabled]
--- Subsubsubcategory 1 [Enabled]
-- Subsubcategory 2 [Enabled]
--- Subsubsubcategory 1 [Disabled]
- Subcategory 2 [Disabled]
-- Subsubcategory 1 [Enabled]
Category B [enabled]
the query should return this result:
Category A [enabled]
- Subcategory 1 [Enabled]
-- Subsubcategory 1 [Enabled]
--- Subsubsubcategory 1 [Enabled]
-- Subsubcategory 2 [Enabled]
Category B [enabled]
How do we do this in nhibernate with a Session.QueryOver knowing the correct parent/child mappings are made (parent has a collection of subcategories, a subcategory has also a property with its parentcategory)?
Edit
The ugly heavy way to achieve what I want. This however produces a huge load of select queries. How to optimize this?
public void GetAllEnabledCategories(){
var allEnabledCategories = new List<Category>();
var enabledParentCatgories = Session.QueryOver<Category>().Where(x => x.ParentCategory == null && x.Status==Status.Enabled).List().ToList();
allEnabledCategories.AddRange(enabledParentCatgories);
foreach (var category in enabledParentCatgories)
{
allEnabledCategories.AddRange(Recursive(category.SubCategories));
}
}
private IEnumerable<Category> Recursive(IEnumerable<Category> subCategories)
{
var allEnabledCategories = new List<Category>();
var enabledSubCategories = subCategories.Where(x => x.Status == Status.Enabled).ToList();
allEnabledCategories.AddRange(enabledSubCategories);
foreach (var category in enabledSubCategories)
{
allEnabledCategories.AddRange(Recursive(category.SubCategories));
}
return allEnabledCategories;
}
Edit 2: Implemented solution
The suggested answer of Low Flying Pelican works well for me. It results in no more then 2 queries and is for me a good and performant solution. Below a suggested implementation, code can be cleaned and optimized but works.
public void GetEnabledCategories()
CategoryStatusQueryItem result = null;
Category categoryAlias = null;
var categoryStatusQueryItemsWithStatusEnabled = Session.QueryOver<Category>(() => categoryAlias).Where(x => x.Status == Status.Enabled)
.SelectList(list => list
.Select(() => categoryAlias.Id).WithAlias(() => result.CategoryId)
.Select(() => categoryAlias.ParentCategory.Id).WithAlias(() => result.ParentCategoryId)
.Select(() => categoryAlias.Status).WithAlias(() => result.CategoryStatus))
.TransformUsing(Transformers.AliasToBean<CategoryStatusQueryItem>())
.List<CategoryStatusQueryItem>().ToList();
var categoryStatusQueryItemsWithAllParentsEnabled = new List<CategoryStatusQueryItem>();
categoryStatusQueryItemsWithAllParentsEnabled.AddRange(categoryStatusQueryItemsWithStatusEnabled.Where(x => !x.ParentCategoryId.HasValue).ToList());
foreach (var source in categoryStatusQueryItemsWithStatusEnabled.Where(x => x.ParentCategoryId.HasValue))
{
if (AreAllParentsEnabled(categoryStatusQueryItemsWithAllParentsEnabled, source))
{
categoryStatusQueryItemsWithAllParentsEnabled.Add(source);
}
}
var categoriesWithParentsEnabled = new List<Category>();
var categoryIdsWithAllParentsEnabled =
categoryStatusQueryItemsWithAllParentsEnabled.Select(x => x.CategoryId).ToList();
for (var i = 0; i < categoryIdsWithAllParentsEnabled.Count; i += 1000)
{
var c = categoryIdsWithAllParentsEnabled.Skip(i).Take(1000).ToList();
var queryResult =
Session.QueryOver(()=>categoryAlias)
.Where(Restrictions.In("Id",c))
.List()
.ToList();
categoriesWithParentsEnabled.AddRange(queryResult);
}
}
public bool AreAllParentsEnabled(List<CategoryStatusQueryItem> categoriesWithStatusEnable,
CategoryStatusQueryItem category)
{
var parentsEnabled = true;
var parent = categoriesWithStatusEnable.FirstOrDefault(
x => x.CategoryId == category.ParentCategoryId);
if (parent==null || parent.CategoryStatus == Status.Disabled)
{
parentsEnabled = false;
}
else if (parent.ParentCategoryId.HasValue)
{
parentsEnabled = AreAllParentsEnabled(categoriesWithStatusEnable, parent);
}
return parentsEnabled;
}
A:
One possibility is to populate a custom DTO from a single query
CategoryStatusDTO
{
int categoryId;
int parentCategoryId;
bool parentEnabled;
bool hasParent;
}
Once you load the DTO to the memory, you could do a similar operation you have done on these DTO's and determine list of categories to load, and then use IN operation to load all those categories by Id.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.