text
stringlengths
8
5.77M
Inhibition of prostate-specific membrane antigen (PSMA)-positive tumor growth by vaccination with either full-length or the C-terminal end of PSMA. For experimental immunotherapy of prostate cancer, we used a model system to target a defined region of the extracellular domain of prostate-specific membrane antigen (PSMA). PSMA is a surface antigen expressed by prostate epithelium that is upregulated approximately 10-fold in most prostate tumors. We vaccinated BALB/c mice with NIH3T3 cells cotransfected with pST/neo plus pEF-BOS-based vectors expressing either the full-length 750-amino acid human PSMA or only the C-terminal 180-amino acid region (PSMc). PSMc lies C-terminal to the transferrin receptor-like sequence in the extracellular domain of PSMA. BALB/c mice were injected i.p. 4 times at weekly intervals with vaccine cells. Vaccinated mice were then challenged s.c. with Renca/PSMA, a BALB/c renal cell carcinoma line transfected to express human PSMA. Growth of Renca/PSMA tumors was substantially retarded and host survival significantly prolonged in mice prevaccinated with either 3T3/PSMA or 3T3/PSMc. Furthermore, antiserum from vaccinated mice intensely immunocytochemically stained LNCaP, a PSMA-positive human prostate cancer cell line. In contrast, control mice similarly prevaccinated i.p. with 3T3/neo (NIH3T3 cells transfected with pST/neo alone) developed Renca/PSMA tumors, which were palpable within 2 weeks and lethal by 5 weeks. Serum from 3T3/neo-vaccinated mice did not immunocytochemically stain LNCaP cells. The antitumor activity induced by vaccination with 3T3/PSMc was also demonstrated via growth inhibition of established LNCaP tumors xenografted in athymic mice following passive transfer of immune serum from vaccinated mice. Our results suggest that vaccination with PSMc induces adaptive humoral activity, which is directed against the extracellular region of human PSMA and can significantly inhibit human prostate cancer growth in athymic mice, and that administration of antibodies to PSMA may provide a passive treatment modality for immunocompromised patients.
Q: Laravel / Eloquent - Column name as variable Eloquent offers a handy way of passing stuff to the database $table_name = new TableName; $table_name->column_name = "some data"; $table_name->save(); I've got quite a lot of data from a form that needs to be validated, so I was wondering if it was possible to replace the column name with a variable, so I can put it in some loop, and get the names and data from arrays. $table_name->$columns[$i] = $data[$i]; (though I suppose not written in that way) Update In the end I've gone with the following: $table_name = new TableName; $nameArray=[ 1 => 'form-name-1', ... ]; $columnArray=[ 1 => 'column_name_1', ... ]; for($i=1;$i<=count($nameArray);$i++){ if(logic logic logic) $table_name->{$columnArray[$i]} = $_POST[$nameArray[$i]]; else $table_name->{$columnArray[$i]} = NULL; } $table_name->save(); A: You can do one these: 1) Create with values $table_name = new TableName([ "column_name" => "column_value" ]); 2) Fill $table_name = new TableName(); $table_name->fill([ "column_name" => "column_value" ]); 3) The way you suggested originally: $valuesMap = [ "column_name" => "column_value" ]; $table_name = new TableName(); foreach ($valuesMap as $column => $value) { $table_name->{$column} = $value; //The {} are optional in this case } Note that to do 1 or 2 all fields you put in the array must be fillable and not guarded.
Q: submit buttons are not getting highlighted when navigating through tab key When I navigate through tab key in my web page submit button and some other components are not getting highlighted while some are getting highlighted like this JPG. In myJsp if cursor is in any text field when I press Enter key it should submit but it is not getting submitted. I go to the submit button through Tab key. What could be the reason? Any pointer to tutorial for these kind of issue? myJsp.jsp <div> <input type="hidden" name="_flowExecutionKey" value="${flowExecutionKey}"/> <input type="submit" class="button" name="_eventId_search" value="Search"/> <button class="save_button_common" onClick="submitForm('save')">Save</button> <button class="reset_button_common" onClick="submitForm('reset')">Reset> </button> </div> A: <button class="save_button_common" onClick="submitForm('save')">Save</button> <button class="reset_button_common" onClick="submitForm('reset')">Reset> </button> No! There is no such thing as a button element. It is an input with a type of button. Reset> should be Reset There is some odd spacing Try.. <input type='button' class="save_button_common" onClick="submitForm('save')" value="Save"> <input type='button' class="reset_button_common" onClick="submitForm('reset')" value="Reset"> But don't take my word for it, ask the experts. Always validate the output using the W3C mark-up validation service. Note that the above HTML will produce a button that looks something like.. Save ..rather than.. ..which looks more like a link. Those inputs above might be converted to something that looks like (or rather is) a link. But that would not be the 'path of least surprise' for the end user. They expect a form submit/reset button to look like a ..button (funny that).
Q: Pass pug mixin to JavaScript I have a common modal all over my site for showing endnotes. I wanted to create a quick pug mixin so I don't have to type the structure over and over. However, I don't know how to pass the #id into my js toggle_visibility function. (Note, the js works perfectly, I'm just trying to convert to a mixin) mixin modal(id, content) div.modal(class= id) div.modal-content= content a.close(onclick="toggle_visibility('= id');") Close Here's an example of the pug code working (outside the mixin) div.modal#downloads-citations div.modal-content p some content here to show article citations a.close(onclick="toggle_visibility('downloads-citations');") Close A: What you're looking for is called 'attribute interpolation', and is not directly supported anymore in current versions of Pug (see this page in their docs). Fortunately, however, there is an easy workaround, based on the concatenation of strings. Just replace the last line of your code snippet with this statement: a.close(onclick="toggle_visibility('" + id + "');") Close
The Washington Wizards practice facility seemed a galaxy away from this maddening NBA offseason during the team’s annual media day Monday. For one, the stars actually like each other and want to play together. Bradley Beal on John Wall: “We are two different people. And we accept each other for who we are. And he wouldn’t be where he is without me and vice versa. I damn sure wouldn’t be where I am without him.” Wall on Beal: “The toughest thing you have is two young players who want to be great. And sometimes it might work out. And sometimes it might not work out. But us being brothers, we put everything to the side. We make things work.” Clearly neither member of the most accomplished backcourt in the Eastern Conference has received his I-Can’t-Play-With-You-Anymore starter kits. Maybe they can borrow Kevin Durant’s from last summer or Kyrie Irving, Paul George and Chris Paul’s from this summer. It’s not just the stability of Wall and Beal that runs counter to the narrative of a league that saw more All-Stars change teams (nine) than any summer in NBA history. The entire organization is freakishly … normal. The Wizards’ biggest offseason signings were their own players. Wall committed for the long haul and forward Otto Porter got like a gazillion dollars because the Wizards didn’t believe they could lose their own draft pick, who has developed into an important role player. The only drama was experienced by Porter, whose mother forced him to take bass guitar lessons this offseason, resulting in some painful-sounding Instagram posts. “What could I do?” Porter asked, throwing up his hands. “She wanted me to learn.” Coach Scott Brooks needs to alert these guys to the reality of today’s NBA: You can’t have your best players satisfied with playing with the guys already on the team. This is Chino Hills High School’s NBA now: You need clicks, your own show on Facebook. One veteran explains why no longer playing with the best player in the game makes sense. A prolific shooter expands his no-trade clause to allow a trade to a team with two players who like to shoot the ball more than he does. Most of all, you can’t be happy. Not even after you win your first title and take home an NFL Finals MVP trophy. Uh-uh. You have to convey “I-told-you-losers-so” in all your actions. Because success isn’t just the best revenge; it’s a reason to say you were right and the world was wrong. Ask K.D. It’s not just the stability of Wall and Beal that runs counter to the narrative of a league that saw more All-Stars change teams (nine) than any summer in NBA history. So when you see pre-training camp camaraderie, such as forward Jason Smith cutting it up with guard Tim Frazier, or Wall getting Porter in a playful headlock, it just feels so … foreign. If you think about Washington’s long, sordid history from the mid-1980s to this millennium – give or take a Chris Webber/Juwan Howard playoff team, a few sellouts for Michael Jordan and the exhilarating beginning of the Gilbert Arenas era – these guys are the un-Wizards. But Wall, Beal, Porter, center Marcin Gortat and their teammates are suddenly the un-NBA, too. Someone has to tell them you can’t just be a regular franchise anymore, gradually building toward a title and waiting patiently for your young talent to mature so you can be good for 10-15 years in a row. One of them, preferably a star, needs to pop off on social media, begin dating a Kardashian or collude to bring an All-Star friend to town immediately. You just can’t win 49 games for the first time since Wes Unseld played and expect to be covered by any media organization anywhere. “It’s crazy,” agreed Rod Strickland, who was on more dysfunctional Wizards teams than he cares to remember. “I was so rebellious. I didn’t even pay attention to what they thought of us. These guys? It’s great to see. I think so much of it is about the growth of John Wall. He’s grown into not just one of the greatest players in the league, but a real leader.” The symmetry of thought in Washington’s backcourt is where it begins. “We’ve been together for six years – that’s a long time,” Beal said. “I feel us being together and other guys breaking up … it doesn’t change our dynamic. If anything, it builds us up. That’s a legacy we’re building together. We’re trying to accomplish something like the championship team of ’77-’78. We want our names up here one day.” He added that Wall and he joke about the “report” of their animosity toward each other: “We love each other and we’re brothers at the end of the day. And this is our job.” If anything, Wall said, “It was me trying to find my way in this league and him comin’ in as a rookie trying to find his way. … Like he said, ‘I couldn’t be the point guard I am without him and he couldn’t be the player he is without me.’ ” He went on, actually campaigning for Beal to be an All-Star for the first time: “I remember when I got my contract, the media said, ‘Well, what has he done to deserve it?’ Well, he still hasn’t been an All-Star, but he showed y’all last year he deserves it. And that’s a testimony about what he is to our team. He didn’t even care. He should have been one last year. He definitely should be one this year.” “That doesn’t mean we don’t compete,” Wall said. “We going to get on each other from time to time, we going to talk junk. Because that’s our competitive nature; we both want to be the best we can be. And without us having our back-and-forth battles, we can’t be the players we are.” Beats all those wrenching breakups of ego and talent in Oklahoma City and Cleveland, no? If this mutual respect and harmony keeps up, the Wizards might have to change leagues. They don’t fit in the All Lonzo-All The Time-Kyrie Leavin’-LeBron Cryin’-K.D.-Typin’ NBA. Wall just committed long-term to the only place he’s ever played. Beal hasn’t been heard from in weeks because he’s been quietly working with the Bradley Beal Elite A.A.U. team in East St. Louis, Illinois. While everybody a notch ahead of them participated in some dysfunction or completely remade their roster with malcontent stars, the Wizards stayed the course — their most splashy offseason acquisition was Jodie Meeks — and built around their foundation instead of detonating it. They may just be that sleeper East team, as Boston learns to play together and Cleveland waits for Isaiah Thomas to get healthy. With neither drama nor dysfunction, they could win more than 50 games for the first in four decades. Still, until someone issues a trade demand or gets his own website on USA Today, good luck getting on Sports Center, guys.
Q: Scala: write for-comprehension with ReaderT and Option Here is example: trait Service1 { def s1f = Option(10) } trait Service2 { type ReaderS1[A] = ReaderT[Option,Service1,A] def s2f1: ReaderS1[Int] = ReaderT(s1 => for { r1 <- Option(1) r2 <- s1.s1f } yield r1 + r2 ) } It works fine. I just want to rewrite s2f1 without ReaderT.apply method: def s2f2:ReaderS1[Int] = for { r1 <- 1.pure[ReaderS1] r2 <- //how to get result of Service1.s1f and compose it here } yield r1 + r2 Here is a working example with Reader[...,Int], but not ReaderT[Option,...]: import cats.data.Reader trait Service1 { def s1f = 10 } trait Service2 { def s2f = 20 } trait Service3 { def s3f1:Reader[Service1,Int] = Reader(1 + _.s1f) def s3f2:Reader[Service2,Int] = Reader(2 + _.s2f) import cats.syntax.applicative._ //for pure type Env = (Service1, Service2) type ReaderEnv[A] = Reader[Env,A] //needed to convert Int via pure def c:ReaderEnv[Int] = for { s1 <- Reader((_:Env)._1) r2 <- s1.s1f.pure[ReaderEnv] r1 <- s3f2.local((_:Env)._2) } yield r1 + r2 } I want to get a similar syntax. A: Try import cats.syntax.applicative._ import cats.instances.option._ def s2f2: ReaderS1[Int] = for { r1 <- 1.pure[ReaderS1] r2 <- ReaderT((_: Service1).s1f) } yield r1 + r2
We live in a very dangerous age for men. The Blue Pill is even more of a liability today than it was in times past, because we live in an era that encourages men going all-in in their life’s investment in that conditioning. Welcome to the #MeToo era. What we’re experiencing in our social environment today is a sea change in intersexual dynamics. The underlying fundamentals haven’t changed; our evolved natures and the latent purposes that are driven by them haven’t shifted, but the social dynamics and sexual acculturation that serve as checks and balances on them has drastically shifted, and in a very short time. While you could make an argument for an idealized free love era that took place right after the Sexual Revolution, now we find ourselves in a time that is so calculating in its design on intersexual social dynamics that it makes the late 60s seem romantically naive. Back in October of 2014 I wrote a post called Yes Means Fear. This essay was a response to the, at that time new, Yes Means Yes sexual consent legislature that was being instituted on California university campuses. Dalrock had written similar essays regarding this latest form of sexual consent aptly titled The Sexual Revolution’s Arab Spring and Making the World Safe for Promiscuous Women. It may take you a while to review these posts, but please read these and skim the comments to get a gist of the conversations we had going on just three years ago. One of these comments was the inimitable Deti: At the end of the day, college women (soon all women) will be able to use the “lack of consent” law/policy as a weapon against undesirable men to do the following: 1. Weed out and eliminate unattractive men by chilling their conduct 2. Making even the most innocuous sexual conduct (i.e. approaching, asking for dates) so dangerous that the only men who will engage in the SMP are attractive men with proven successful sexual track records who will never get reported for doing anything “untoward”; thus ensuring that only attractive men will approach them for dates and sex 3. Giving women more power over the SMP so even unattractive women can use and select men for alpha fux; then have the sole ability to pursue and select men for beta bux when they see fit. Open hypergamy. It will be “we women are going to do this, and if you want sex, you’ll do it our way, and there’s not a damn thing you can do about it.” Deti posted this comment on October 15th, 2014. The inter-blog debate then (at places like the now defunct Hooking Up Smart) was that Yes Means Yes was solely meant as a firm response to the supposed on-campus rape /sex assault panic that was being circulated in the mainstream media at the time. From the Red Pill perspective, we saw what potential this legislation represented to what would later become a societal scale institution. Of course, they called us reactionaries, called us ‘rape apologists’ for simply pointing out all the ways this legislation would be expanded to a societal scale. They said we were exaggerating when we illustrated that, even for long-married couples, there would need to be a check list of approved acts of intimacy for each and every act performed, and men would need some form of hard evidence to prove that consent had indeed been granted. The new California college/university sexual assault policy requires the following: “An affirmative consent standard in the determination of whether consent was given by both parties to sexual activity. “Affirmative consent” means affirmative, conscious, and voluntary agreement to engage in sexual activity. It is the responsibility of each person involved in the sexual activity to ensure that he or she has the affirmative consent of the other or others to engage in the sexual activity. Lack of protest or resistance does not mean consent, nor does silence mean consent. Affirmative consent must be ongoing throughout a sexual activity and can be revoked at any time. The existence of a dating relationship between the persons involved, or the fact of past sexual relations between them, should never by itself be assumed to be an indicator of consent.” There was sex, which is clearly “sexual activity.” The question then becomes whether there was “affirmative consent”. In order for there not be consent, the woman would have had to show affirmative conscious and voluntary agreement to engage in sex with the man. It is the man’s responsibility to make sure he had that consent. She had to manifest, verbally or nonverbally, consent to it. Silence doesn’t mean consent. Her not resisting or saying “no, please stop” doesn’t constitute “affirmative consent”. So really, the only way to make sure that consent is present is for the man to continue asking her throughout the encounter: “Is this OK? Can I keep doing this? Is this thrust OK with you? Is THIS thrust OK? Can I thrust again? How about this one? Can I keep going? Do you want me to stop?” If that did NOT happen, if the man did not get EXPRESS, VERBAL statements that he could continue, then yes, there was sexual assault. The way this plays out in situations like this is that verbal consent is REQUIRED. She cannot manifest “ongoing” “affirmative consent” any other way. That’s because of the way the law is written. Lack of protest is not consent. Lack of resistance is not consent. Silence is not consent. Thus, a wife, just lying there, starfishing it, giving duty sex to her husband, is putting him in jeopardy, because she is not manifesting “ongoing” “affirmative consent”. All of that they said was ridiculous. Women would never be so petty as to make a man ask permission for, nor hold him accountable for, sex that she wanted to have with him. Furthermore, this ruling was only meant to curb campus assault; any extrapolating to a larger societal norm, we were told, was just us Red Pill men and their insecurities about the intentions of women and sex. If we’d Just Get It we’ll have no problems. We were told it was limited to penis-in-vagina sex only. We were told it was just in cases of “drunken sex”. All of these proved false. This law was intended to govern, regulate and control every single sexual interaction between a man and a woman. This law is intended to require a man to get express consent at every single step of the process, from initial touch to banging. This law is intended to chill all male sexual conduct. This law by its very terms requires express consent for every sexual act, starting with kino. The goal of feminism is to remove all constraints on female sexuality while maximally restricting male sexuality – Heartiste A World of Fear When I wrote Yes Means Fear (also 3 years ago) it was initially in response to an article by Ezra Klein, Yes Means Yes is a terrible law, and I support it completely. This reads through as bad as any gender related article on Vox, but Klein’s salient point was summed up in one sentence. To work, “Yes Means Yes” needs to create a world where men are afraid. I’m reasonably sure Ezra was aware of the larger scope – larger than just California college campuses – that his giddy Beta love of a world where men would be afraid to so much as approach a woman would lead to. But now we find ourselves here in his idealized sexual marketplace founded on men fearing to interact with women at the risk of losing everything. At the risk of being Zeroed Out. Today, just three years later, we’re experiencing the #metoo moral panic based exactly in the fear Ezra said would serve us so well. Ezra must be proud that the gold rush hysteria of sexual misconduct allegations any and every woman (who ‘might’ have ever felt an accidental hip brush 50 years ago) feels entitled to is the result of this cleansing fear he loved so much. Unless he’s defending allegations himself of course. If you go before the college board and say that the woman accusing you of assault simply doesn’t remember that she said yes because she was so drunk, then you’ve already lost. Gone is the college board now in favor of the popular court of social justice – the court that condemns a man for even the suspicion of an allegation of sexual misconduct. Gone too is part of women’s remembering the pretense of a sexual encounter. Whether a woman was drunk and doesn’t remember the details, or if she conveniently recalls them 40-50 years after the fact is immaterial. The operative point is that we always believe any and every allegation of rape or misconduct a woman brings forward. Articles of Belief Shortly after I wrote Yes Means Fear I wrote Hysteria, an essay intended to address the disgraceful (now thoroughly proven) UVA fraternity rape hoax story written by Sabrina Erdley and published by a complicit Rolling Stone Magazine. Just daring to question the validity of so outrageous a rape account was heresy to women back then. Bear in mind this took place after the Yes Means Yes consent ruling in California. At this time, just to question the story of a woman’s rape account was enough to earn you the title of ‘rape apologist’. But moreover, we were popularly expected to repeat this mantra and always accept a woman’s account as infallibly true: “No matter what Jackie said, we should automatically believe rape claims.” http://t.co/3HFlXR7jme True insanity pic.twitter.com/AFXIyn32FS This was the sentiment (now deleted) tweeted by Zerlina Maxwell on December 6th, 2014. Since then this meme that anything a woman had to say about sexual assault must be believed by default has snowballed into a default belief that anything a woman alleges against a man must also be believed. Whereas a male college student might stand in front of his kangaroo court at a university, now men must stand in front of the kangaroo court of public opinion where a woman’s word outweighs all pretense of due process. That college kid is now the average man who must prove his innocence because if a woman alleges it due process is reversed. What we’ve witnessed in just 3 years is the systematic removal of a man’s right to habeas corpus with regard to women’s allegations. And I expect that this removal will extend to much more than just women’s believability in regard to sexual misconduct. Imagine a culture where it’s expected that anything a woman accuses her ex of is to be believed in divorce proceedings. We’re now seeing exactly what myself, Deti, Dalrock and countless other Red Pill bloggers and commenters predicted would happen, but it’s also so much more that what we could see coming. In just 3 years Yes Means Yes moved off the campus and into mainstream culture; a culture predicated on female social primacy. In a feminine-primary social order even “affirmative consent” isn’t enough – “enthusiastic consent” must now be established and maintained. That “enthusiastic consent” is a new ambiguously defined terminology, and part of the larger narrative meant to further confuse and instill fear in men. Last week Novaseeker, once again, had a terrific comment that illustrates what consent has come to today. Yep, that’s the newest goalpost move. We went from No means No (which meant that if she doesn’t say no, it’s on … which pretty much is the basic human mating script) to “affirmative consent” (“may I kiss you now” … “may I lick your breast now?”, etc., per the “rules” required before any physical contact *and* at “each stage of escalation”). Very few people actually follow affirmative consent, as we know, but it’s the rule at most colleges and universities. It isn’t the legal rule for rape, in terms of determining what was “consensual”, currently, but the FI is working on that, believe me. Now, we have the goalposts moving even further along, from “affirmative consent” to “enthusiastic consent” — which means that if her consent is even verbally expressed, but isn’t clearly enthusiastic, then it isn’t “reliable as consent” because it could be the result of “pressure”, and if the consent “was real, it would be expressed enthusiastically, because when people really are consenting to sex, they’re always enthusiastic about it”. So essentially the standard they are pushing now (and which is getting rolled out on campuses right now) is that if the girl isn’t jumping your bones and begging for your cock, it’s rape/assault. Of course, again, not the legal standard, but that doesn’t matter that much — as we can all see what is happening right now is that the legal standard is being marginalized, because people can be destroyed in our media saturated environment without any involvement of the legal system at all, and the standards that apply in that extra-legal environment are the ones that the FI wants to apply, whether the legal system applies them or not. There are a few ways to look at this, but one obvious one is that this is a way for the FI to tighten the screws on betas. Very little sex that betas have, if any, is “enthusiastic consent sex”. Everyone knows this. Under this standard, basically all sex with betas is rape. That’s the intention. And thus we come full circle to the latent purpose of legislating Hypergamy that I’ve continually repeated in many essays. It is Roissy’s maxim of feminism: The end goal of feminism is to remove all constraints on female sexuality while maximally restricting male sexuality. Recently I found myself in a Twitter war on a story by CBS Los Angeles asking whether it was still OK for men to hug women. I used the cartoon I posted in The Creep 2 to illustrate my bigger point: What's ironic is that women get this white hot rage for lesser men approaching them at all. It's an insult to their need to optimize Hypergamy. That's the depth of female solipsism, they are so certain of their entitlement to an Alpha that they see Beta men as an insult to them. — Rollo Tomassi (@RationalMale) December 5, 2017 And of course the feminist tropes (from men and women) and the point & sputter ad hominem attacks flowed from there. However, this rage is precisely what I would expect from women who are now coming into a default expectation (entitlement) of all men to ‘Just Get It‘. Only in this instance it is Blue Pill, Beta men who should know better than to approach a woman below their (self-perceived) sexual market value. Those men, the lesser men that her social media overinflated sense of SMV has convinced her are beneath her attraction floor should ‘just get it’ that they shouldn’t be flirtatious or even too friendly with her or risk the punishment of an allegation that might be his zeroing out. The Beta man who doesn’t ‘get it’ is an insult to her self-worth and deserving of an optimized Hypergamy. In the next post I’ll be exploring the ramifications of the “enthusiastic consent” concept and how even consensual-but-unwanted sex and “duty sex” will be the next chapter in marital rape. I’ll also be detailing the the “Cat Persons” story that’s been making the rounds this week. Like this: Like Loading...
Hydrogen peroxide GIFRER 20 VOLUMES 125ML View larger Reference: 3401395287316 Hydrogen peroxide GIFRER 125ML 20 VOLUMES: The 20 volumes Gifrer peroxide is an antiseptic solution used to disinfect skin and small wounds and hemostatic, that is to say, to limit or stop the bleeding.
[Changes in the rheological indicators of the blood and hemodynamics during 14-day anti-orthostatic hypokinesia]. Nine essentially healthy subjects, aged 25 to 42 years, were exposed to head-down bed rest (-8 degrees). On bed rest days 3, 7 and 14 the following rheological and hemodynamic parameters were measured: blood dynamic viscosity, Caisson viscosity, yield limit, red blood cell aggregation, stroke volume, cardiac output, and total peripheral resistance. Rheological parameters were measured by means of a rotation viscosimeter at 25 degrees C +/- 0.1. Hemodynamic parameters were measured by the method of integrated rheography. Blood was withdrawn from the cubital vein. The results give evidence that dynamic and Caisson viscosity increased significantly, reaching a peak by bed rest day 14. The sequence of hemodynamic changes followed the same pattern as rheological changes. Analysis of the results shows that there is a good correlation between the above parameters, especially by bed rest day 14. Thus, it can be concluded that there is a vascular mechanism involved in the compensatory restructuring of the vascular system at the tissue level in response to blood redistribution and fluid loss during bed rest.
DJ School Peru Hymenolepis (tapeworm) – Wikipedia, The Free EncyclopediaSix communities along the banks of Lake Titicaca in Peru were included in a study to determine Richardson, DJ (2000). “Hymenolepis Nana in Pet Store “Epidemiology of Hymenolepis nana Infections in Primary School Children in Urban and Rural Communities in Zimbabwe.” The N B EWS Y January /February THE BAYWithin the school. Then, the whole school will gather for a “Latin Dance” where Peru (first grade), Mexico (second grade), Nicaragua (third grade), Venezuela (Fourth Grade), and Puerto Rico (Fifth Brent Mitchell with Oldies 107.9 will be DJ’ing and motivating us with great music. Bishop's Stortford High School – Wikipedia, The Free EncyclopediaThe Bishop’s Stortford High School (often abbreviated to TBSHS)is a comprehensive secondary school, with a coeducational sixth form, in Bishop's Stortford, Hertfordshire, England. Eddy Ramos WORK EXPERIENCE DJWEBER Power GbmH IT/Logistic …Peru and Chile. Established computer networks so that the companies could efficiently manage their School of Biological and Natural Sciences . Courses and seminars for undergraduate students based in personal laboratory experience
458 So.2d 335 (1984) ASHBY DIVISION OF CONSOLIDATED ALUMINUM CORPORATION, a Foreign Corporation, Lindsley Lumber Company, a Foreign Corporation, Robert Silverman and Bankers Standard Insurance Co., a Foreign Insurance Corporation, Appellants, v. Irving DOBKIN and Selma Dobkin, His Wife, Appellees. Nos. 83-2458, 84-73. District Court of Appeal of Florida, Third District. October 9, 1984. Rehearing Denied November 15, 1984. *336 Beverly & Freeman and Michael J. Ferrin, West Palm Beach, for appellants. Rentz & Rust, Daniels & Hicks and Patrice A. Talisman, Miami, for appellees. Before SCHWARTZ, C.J., and DANIEL S. PEARSON and FERGUSON, JJ. FERGUSON, Judge. Defendants appeal a final judgment in favor of plaintiff, Irving Dobkin, and an order granting his wife a new trial on loss of consortium damages only. Irving Dobkin, a plumber, was injured while making repairs at the residence of one Robert Silverman. The injuries occurred when Dobkin fell while descending from Silverman's roof on a ladder manufactured by Consolidated Aluminum Corporation. Dobkin brought suit against defendants on theories of negligence, strict liability, and express and implied warranty. After a trial, the jury returned a verdict in favor of Dobkin on the negligence count and against him on the other two counts. Dobkin was found 25% negligent and defendants 75% negligent. The jury awarded Dobkin $285,000 in damages but did not award any damages to his wife on her loss of consortium claim. The trial court entered final judgment for Dobkin, and granted his wife a new trial on damages. By this appeal defendants raise as error numerous evidentiary rulings. Several of the points have merit, requiring reversal and remand for a new trial. As their first point on appeal, defendants claim that the trial court erroneously permitted plaintiff's counsel to bring to the jury's attention the fact that Silverman had previously been a defendant in the lawsuit for supplying a defective ladder. Silverman had settled with plaintiff before trial. Defendants maintain that Section 768.041(3), Florida Statutes (1983) prohibits such remarks. The statute provides: The fact of ... a release or covenant not to sue, or that any defendant has been dismissed by order of the court shall not be made known to the jury. This section has been interpreted to apply whether the party was dismissed by the plaintiff as a result of release or settlement, or whether the party was dismissed by court order. See Jordan v. City of Coral Gables, 191 So.2d 38 (Fla. 1966); Webb v. Priest, 413 So.2d 43 (Fla. 3d DCA 1982). It was error to bring to the jury's attention the fact that Silverman was once a defendant in the lawsuit. Plaintiff contends that it brought up this fact only to rebut defense counsel's references to Silverman as an "independent eyewitness". The same argument was rejected in City of Coral Gables v. Jordan, 186 So.2d 60 (Fla. 3d DCA), aff'd 191 So.2d 38 *337 (Fla. 1966). In response to the plaintiff's argument that defendant had opened the door to the issue of the witness's credibility, this court found that public policy favored the rule that offers of compromise and settlement may not be introduced except under unusual circumstances. As in that case, no unusual circumstances are present here. Defendants next maintain that it was error to admit evidence of other accidents caused by alleged defects in ladders manufactured by Consolidated without proof of substantial similarity of the conditions, causes, and circumstances surrounding the incidents. We agree. First, the plaintiff failed to show sufficient similarities between the two prior accidents and the plaintiff's accident, since different model ladders were involved, there were different conditions existing at the time of the accident, and the ladders were erected at different angles. See Railway Express Agency, Inc. v. Fulmer, 227 So.2d 870 (Fla. 1969) (fact that conveyor system in question was chain propelled, that rectangular slats formed part of the conveyor, and that roller part of conveyor had one dead roller between two live rollers distinguished conveyor where plaintiff was injured from other conveyor systems on defendant's premises and led to conclusion that plaintiff failed to establish substantial similarity between his and a prior accident); Short v. Allen, 254 So.2d 34 (Fla. 3d DCA 1971) (plaintiff who fell from lowered tailgate of station wagon could not introduce evidence of prior accident where a boy had fallen from tailgate of a station wagon because of "[t]he variables and differences inevitably existing in the circumstances of this and the prior accident"). Further, the jury might have been misled as to the weight to be given such evidence in the absence of the additional facts that in one case, a jury subsequently found no defect and ruled in favor of Consolidated, and in the other case, the jury found the plaintiff 80% negligent and Consolidated only 20% negligent. See Atlantic Coast Line R. Co. v. Campbell, 104 Fla. 274, 139 So. 886 (1932); I.B.L. Corp. v. Florida Power & Light Co., 400 So.2d 1288 (Fla. 3d DCA 1981), rev. denied, 412 So.2d 466 (Fla. 1982). Defendants also raise as error the trial court's refusal to permit Silverman to testify about the accident-free history of the product. For the same reason that we find error in the introduction of evidence of prior accidents, because no showing of substantial similarity of conditions was made, we find that it was proper to exclude this evidence. Finally, defendants correctly contend that the verdicts reached by the jury were inconsistent. The jury did not find defendants liable under the theory of strict liability, thus rejecting the claim that a defect existed in the ladder. Absent proof of a defect, there were no grounds upon which to find defendants negligent. See Husky Industries, Inc. v. Black, 434 So.2d 988 (Fla. 4th DCA 1983) (a defectively designed product is one that has been negligently designed). Although plaintiff insists that the jury could have determined that defendants were negligent in failing to warn or instruct, the undisputed evidence shows that plaintiff did not read the instructions on the ladder and therefore any failure to warn could not, as a matter of law, be the proximate cause of plaintiff's injuries. The applicable rule was succinctly stated in Crawford v. DiMicco, 216 So.2d 769 (Fla. 4th DCA 1968): Where the findings of a jury's verdict in two or more respects are findings with respect to a definite fact material to the judgment such that both cannot be true and therefore stand at the same time, they are in fatal conflict. In such circumstances, contradictory findings mutually destroy each other and result in no valid verdict, and a trial court's judgment based thereupon is erroneous. 216 So.2d at 771. The error was properly preserved for appeal where the inconsistency of the verdict was brought to the trial court's attention prior to the jury being discharged. See Atlantic Coast Line R. Co. v. Price, 46 So.2d 481 (Fla. 1950) (trial counsel must *338 bring inconsistency of verdict to trial court's attention before the jury is discharged); Keller Industries, Inc. v. Morgart, 412 So.2d 950 (Fla. 5th DCA 1982) (same). Since the entire claim must be tried anew, it is unnecessary to address defendant's final point on appeal, that the trial court erred in granting a new trial on the wife's loss of consortium claim. Reversed and remanded for a new trial.
Q: Optimize Search Result from address book in iphone When ever user search then I want to search that query against address book data for anything like name , phone number , url, email addres. My solution is working fine but it is slow . If address book data is huge , app gets stuck. How can I optimize the search , so that my application won't hang even in large address book data? Here is my code - (void)searchBar:(UISearchBar *)searchBar textDidChange:(NSString *)searchText{ [self takeSomeActionWhenTextChange]; } -(void)takeSomeActionWhenTextChange{ [contactArray removeAllObjects]; NSString *searchText=[[textSearchBar text] lowercaseString]; for (int index=0; index<count; index++) { ABRecordRef record=CFArrayGetValueAtIndex(people, index); //[self checkStringISAddress:searchText withRecord:record]; if ([self checkStringIsFirstName:searchText withRecord:record]==YES || [self checkStringIsLastName:searchText withRecord:record] == YES ||[self checkStringIsNote:searchText withRecord:record]==YES || [self checkStringIsAddress:searchText withRecord:record]==YES || [self checkStringIsCompany:searchText withRecord:record]==YES ||[self checkStringIsEmail:searchText withRecord:record] ||[self checkStringIsPhonenumber:searchText withRecord:record]==YES ) { NSLog(@"object added inside Array"); [contactArray addObject:record]; [contactTableView reloadData]; }else{ NSLog(@"No Match For this object"); [contactTableView reloadData]; } } } I will check if substring from search query matches with first name, last name , email & so on. Above methods contain logic to check if substring is present or not? If ti matches , i will add it to array else not. SHOULD I USE THREAD OR GCD TO PERFOEM SEARCH ? IF YES , HOW? HOW CAN I UPDATE MY TABLE VIEW? A: You can use GCD, you should still show an activity indicator to show the user that something is happening though. It will only prevent the main thread blocking, and the UI locking up. Not tested, you can of course set the priority of the queue using different constants too: dispatch_async(dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0), ^{ //Perform the search //perform your search here... dispatch_async(dispatch_get_main_queue(), ^{ //Update the UI [self.tableView reloadData]; }); }); You might also want to look at using predicates rather than just checking substrings, might give you some cleaner logic.
Session 3: Beyond the Noise, Beyond the Heat: Starting at the Right Place Session 3: Beyond the Noise, Beyond the Heat: Starting at the Right Place Same-sex marriage should be legal if marriage is only a way that the government acknowledges feelings of love and affection between people. Do you agree with that statement? If this was all there was to marriage then keeping it from same-sex couples would be discrimination. But if we believe it matters who is in love and whether marriage has more to it than just being in love, then defining marriage more specifically becomes very important. What are the essential qualities of marriage? When a couple applies for a marriage license, they are usually asked to prove two things: 1) How old they are and 2) That they are not related. This is the government’s way of determining what relationships qualify for marriage. The government is unconcerned with the level of love the couple has for one another, because love is not an essential quality for marriage. True discrimination is based on arbitrary qualities-those outside the essential qualities. In the case of marriage, if a couple were denied a marriage license based on their race or religious preference, this could be considered discrimination because these qualities fall outside of the essential qualities. The point is this: The same-sex marriage debate often hinges on love, yet this concept is not an essential qualifier for marriage. A definition of marriage that transcends man and his changing culture is needed, and deriving that definition must start with the One Who created all beings.
James Frishe James C. "Jim" Frishe (born April 6, 1949, Potsdam, New York) is an American politician. Frishe is a Representative in the House of Representatives of the U.S. state of Florida. He received his Bachelor's degree from the University of Florida in 1971. He lives in St. Petersburg, Florida with his family. References External links Official Website of Representative James Frishe Category:University of Florida alumni Category:Florida Republicans Category:Members of the Florida House of Representatives Category:1949 births Category:Living people
Q: Nested for loop in handling files - java 8 I want to write for inside for in java 8: for (String file : files) { for (String line : lines) { if (file.contains(line)) { //do something } } } I don't want to write for each inside for each like: files.stream().forEach(file -> { lines.stream().forEach(line-> { //do something }) }) is there anything like (file, line) -> { //do something} and inside the pair I will get all possible permutations A: You could something like this, but it isn't much different from what you already have in place files.stream() .flatMap(file -> lines.stream().map(line -> new Pair(file, line))) .map(pair -> do something with pair)
Coaching Institutes What does creating Content for Coaching Institutes mean for us? Coaching institutes are quite different from educational institutions, owing to the intricate ways in which they are structured and run. Coaching institutes are more complex than educational institutions, owing to the irregular schedules, batch formation, as well as resource distribution. Above all, it is a corporate entity, and hence, has vivid characteristic traits that differentiate it from a government or private educational institution. Owing to the unique ways in which coaching institutions work, the process of creating tailored curriculum and providing course content development services for these entities is meticulous and diverse. The objective is to tailor the content according to the various processes and intricate parameters according to which the institute is run. What do we offer? Coaching workshops: Curriculum development in courses need to be crafted in the form of program paths that can be followed by the students to gain a wholesome understanding of topics. We, at Writopedia, ensure that the design of the curriculum is tailored in such a way that students are able to experience the nuances of the course in practical and profound ways. This involves creation of specific workshops as well as intricate patterned coaching schedules, which are tailored on the basis of strategic choice of the institute, professors and students. Virtual learning: Instead of merely focusing on curriculum development as a whole, Writopedia offers the services of its best content writers for coaching institutes to create their own online study repositories. These include entire virtual libraries, which could contain self-published material gathered by the institution itself as well as other sources of information. We can empower coaching centers to create and publish their own content and even empower students to take up content creation for the institute itself. Online portals for marketing and sharing: Digital content and online influence is the name of the game in this particular age. We, at Writopedia, can curate complete digital marketing journey for coaching institutes according to the customizations and flexibilities that might be required. At the same time, we can also help coaching institutes create their own content as well as social media content marketing strategies according to particular preferences and self-embodied principles. Another aspect that we can help in is the content creation for online portals that can be utilized for the purpose of recruitment, student induction, event organization, community involvement and much more. What’s so special about us? The art form of writing demands a lot of attention and respect, especially when it is used to alter the course of numerous lives and businesses. This is exactly what we are doing through content creation for coaching institutes, wherein the aim of the process is the betterment of processes, increase of business returns, formation of specific career paths, and advancement of educational technologies. Hence, if you consider content creation as a mere process of writing pages upon pages of simple, lifeless words, think again. What People Say About Us I never knew emails and brochure content could be created with such artistic charm! Writopedia has never left me unsatisfied with their service and have heeded my call whenever I needed help with any kind of content. Kishore Pareek The ability to explain technical concepts that even the most hardened IT professionals find difficult, in simple, layman terms is something that cannot be taken for granted. Writopedia is a group of professionals who know what they are doing. Sunny Gajjar The way in which the writers at Writopedia play with phrases and words is something that has enamored me since the start of our collaboration. Their work has helped me understand my own vision in a more clear and precise, for which I am grateful to them.
Q: Can I use a constant in the ValidateSet attribute of a PowerShell function parameter? I am using the ValidateSet attribute on one of my PowerShell function parameters like so: [ValidateSet('Development','Test','Production')] [string]$Context I have repeated this is many places throughout a scripting project. Can these literal strings be replaced with a constant? A: No, it has to be a literal or a scriptblock. The scriptblock option seems pointless since it seems to use the literal (string) value of the scriptblock instead of executing it. So effectively, from my testing, you must use literals. If you use a dynamic parameter instead you could achieve this, but that's way overkill just to be DRY. If you try to use a variable, it won't work (and ISE will give you the red squiggly). The help text erroneously says it must be a constant, but it means literal. I created a constant with: Set-Variable -Option Constant And it still does not work. A: Adding this to help others searching for a similar solution. I was looking for a way to validate parameters against the keys of a global hash table. This is what I ended up doing: $global:MyHash = @{ "anyitem" = @{"name" = "somename1"; "count" = 42 }; "someitem" = @{"name" = "another name"; "count" = 1337 }; } function Test-Hash { param ( [Parameter(mandatory = $true)] [ValidateScript( { $_ -in $global:MyHash.Keys } )] [string[]] $items ) } Test-Hash -items anyitem, someitem I ended up replacing ValidateSet with ValidateScript as I realized (as mentioned in this thread as well) that the code block in ValidateSet does not work at all. Instead validating against the keys of a hash table one could easily use something like $validParams = @('opt1', 'opt2') and in the ValidateScript codeblock { $_ -in $validParams } This is basically what I assume should answer the question.
Q: Tips for more elegant code for creating a dictionary I'm creating a dictionary with keys and values from lists: keys = ['Ptot', 'P1', 'P2', 'P3', 'Q1', 'Q2', 'Q3'] val = ['max', 'first', 'first', 'first', 'first', 'first', 'first'] I can manually create the dictionary by the following: dictionary = {'Ptot': 'max', 'P1': 'first', 'P2': 'first', 'P3': 'first', 'Q1': 'first', 'Q2': 'first', 'Q3': 'first'} How can I more elegantly create the dict from the lists by a for-loop? My problem is that the size of the lists are much bigger than this example. A: Have a look at zip: >>> d = dict(zip(keys, val)) >>> d {'Ptot': 'max', 'P1': 'first', 'P2': 'first', 'P3': 'first', 'Q1': 'first', 'Q2': 'first', 'Q3': 'first'} Make an iterator that aggregates elements from each of the iterables. Returns an iterator of tuples, where the i-th tuple contains the i-th element from each of the argument sequences or iterables. Then we pass the return value to dict to create a dictionary. This is probably more efficient than a simple loop since built-ins run at C speed within Python and the implementors probably had more time to optimize it. A: Use a dictionary comprehension, where you choose your key and value from the keys and val list as you are iterating over them, and just to be safe if the keys and val are of unequal lengths, you can zip all of them together via itertools.zip_longest, which will create an iterator of the longest subsequence, making sure if say keys is longer than val, we have None keys for them, maybe to reassign them in future (Thanks @quamrana) from itertools import zip_longest keys = ['Ptot', 'P1', 'P2', 'P3', 'Q1', 'Q2', 'Q3'] val = ['max', 'first', 'first', 'first', 'first', 'first', 'first'] print({k:v for k,v in zip_longest(keys, val)}) Output is {'Ptot': 'max', 'P1': 'first', 'P2': 'first', 'P3': 'first', 'Q1': 'first', 'Q2': 'first', 'Q3': 'first'} An example of bigger length of keys then val from itertools import zip_longest keys = ['Ptot', 'P1', 'P2', 'P3', 'Q1', 'Q2', 'Q3', 'QX', 'QY'] val = ['max', 'first', 'first', 'first', 'first', 'first', 'first'] print({k:v for k,v in zip_longest(keys, val)}) Output will be {'Ptot': 'max', 'P1': 'first', 'P2': 'first', 'P3': 'first', 'Q1': 'first', 'Q2': 'first', 'Q3': 'first', 'QX': None, 'QY': None} so we see that the keys are not lost here, but are used and the values set to None, but using zip will cause us to lose those keys! But in case we want to only choose elements from the smaller list, we can do as follows (thanks @MitchelPaulin) from itertools import zip_longest keys = ['Ptot', 'P1', 'P2', 'P3', 'Q1', 'Q2', 'Q3', 'QX', 'QY'] val = ['max', 'first', 'first', 'first', 'first', 'first', 'first'] #Pick the smaller of the 2 lengths and iterate only on those indexes length = min(len(keys), len(val)) print({keys[idx]:val[idx] for idx in range(length)})
Our travel correspondent, Simon Calder, and head of travel, Laura Chubb, choose which classic holiday spots they don’t think quite meet expectations. Simon says: Walt Disney World, Florida My verdict: Too hot, too crowded, too spread out. It doesn’t have the most exciting rides in Orlando (which I reckon are to be found over at Universal). And for Florida’s top thrills you need to head an hour east to Cape Canaveral and the Kennedy Space Centre. Do this instead: The original Disney theme park is still the greatest: even though Disneyland in Anaheim, California is six decades old, it still packs maximum thrills into minimum space. A single day visit, which is all you should need, is cheaper than the Florida park. And with the Pacific ocean, desert and mountains, and the great cities of San Diego and Los Angeles close by, the traveller can find many more rewards besides the Magic Kingdom. Jet could travel from London to New York in two hours via space Laura says: Marrakech, Morocco My verdict: My favourite travel experiences are always those where the environment feels totally alien, be it the landscape, the culture or, preferably, both. But if you’re looking to be mesmerised by some sort of enveloping exoticism, don’t bet on Marrakech. More tourist theme park than town these days, what it lacks in charm it makes up for with hassle. Do this instead: You can’t beat India for that “not in Kansas anymore” feeling. In famously colourful Rajasthan, Jodhpur, the “Blue City”, is properly exciting – crammed narrow lanes, a jumble of cube houses painted bright Brahmin blue, and the mythically grand 15th-century Mehrangarh Fort towering over everything from its perch atop a big, rugged cliff. Jodhpur, India: Doesn’t disappoint ‘exotic’ expectations (AFP/Getty) (AFP/Getty Images) Simon says: Monaco My verdict: The Mediterranean coast between Marseille and the Italian border has many lovely locations, but the principality of Monaco is not among them. Many of the permanent population was lured to this swathe of shore, which amounts to less than one square mile, by the benign tax regime. The principality is well worth a quick visit, particularly for the terracotta- and tangerine-toned Old Town, but stay much longer and you might break your travel bank. Do this instead: Beyond the heliport and into French territory, there’s so much more to enjoy from a natural and human perspective in neighbouring villages – particularly Cap d’Ail, where the late Greta Garbo used to reside in splendid solitude. Monaco: not the loveliest spot between France and Italy (Getty) Laura says: Paris My verdict: Maybe I’m just a spoiled European, with too much impressive history and grandiose architecture at my fingertips, but Paris just doesn’t do it for me. For one thing, it’s always grey and raining when I go there. And for a city that stakes its reputation on sophistication and romance, the place looks remarkably scruffy. Do this instead: For high culture, history, food, fine wines and fantastic weather, Italy gets my vote. And if you want a dash of edgy bohemia in there, a la Gay Paree, head for Bologna. It’s the capital of Italian counterculture. Simon says: Maldives My verdict: I like to think I have a couple of reasonable pictures of the Maldives – from the window seat of the Airbus as I flew away from the international airport. As it banked over Kurumba Village (or was it Full Moon?) I gazed down on the ragged circle of sand, palm trees and villas with private plunge pools and rain showers and breathed a sigh of relief. Do this instead: The relief was because I was heading across the Indian ocean towards Sri Lanka, which delivers luxe if you demand it and miles of delicious beaches, but offers so much more: rugged scenery, fascinating towns and cities and real communities. Of course the Maldives has some of the latter, but you can’t just wander in. “Advance approval is normally required to visit most non-resort islands, other than the capital island,” warns the Foreign Office. The Maldives: not for those who like exploring (Getty) Laura says: New York City – sort of My verdict: Let me explain. I can easily see why New York might disappoint for a long weekend, or even a week’s holiday. The subway is filthy, it’s way more industrial-looking than you’ve been dreaming about, Times Square is a nightmare, shops are shops, and you can’t shake the impression that it’s basically American London, with worse public transport and only a smidge less anger. Oh, and it’s ludicrously expensive. Do this instead: I only fell for New York after spending months there. I’m about to spout a massive cliche, but it’s bedding in and “living like a local” that really makes the energy and character of the place palpable; its charming eccentricities and personality-packed neighbourhoods, local lore (Dr Zizmor and “Dan Smith Will Teach You Guitar”), the effortless cool of a lazy New York Sunday (browse some art, linger over brunch – why is that so much more satisfying in Brooklyn than anywhere else?). To really appreciate NYC, you need to take a deeper dive; or, even better, try a workation. Papeete: It’s amazing what you can pick up in Carrefour these days (Getty) Simon says: Papeete, Tahiti My verdict: When the big colonial powers, Britain, Spain and France, were carving up the planet, they all claimed sovereignty over Polynesia. France won. Today, Tahiti is an overseas territory ruled from Paris. I touched down in the only real city, Papeete, expecting to find colonial splendour that had been softened by tropical heat. Instead, I discovered a corniche populated by Carrefour and Champion supermarkets, rather like a sweaty version of Calais.
Interactions of lysozyme with 6-amino-4-aryl-3-methyl-1-phenyl-1H-pyrazolo[3,4-b]pyridine-5-carbonitriles: a fluorescence quenching study. The interactions between 6-amino-4-aryl-3-methyl-1-phenyl-1H-pyrazolo[3,4-b]pyridine-5-carbonitrile and lysozyme (LYSO) were investigated by using tryptophane fluorescence quenching and 6-amino-4-(2-hydroxyphenyl)-3-methyl-1-phenyl-1H-pyrazolo[3,4-b]pyridine-5-carbonitrile (1) was studied in detail because of its high water solubility. At different temperatures, the quenching constants K(SV), the binding constants K and the binding sites n of LYSO with 1 were determined and the thermodynamic parameters were calculated. The distance r between tryptophane residues and 1 was obtained according to the Forster mechanism of non-radiation energy transfer. Furthermore, synchronous fluorescence spectroscopy data indicated that the association between 1 and LYSO changed LYSO's conformation and that the hydrophobic interaction played a major role in 1-LYSO association. It was proved that the fluorescence quenching of LYSO by 1 was related to the formation of a 1-LYSO complex and to a non-radiation energy transfer.
https://slimfitizer.net/ Slimfitizer Enhancing men sexual capabilities it'll additionally boom your penis period This has been clinically tested by means of the experts and they have legal it to be safe to use It will help you in overcoming your sexual health A horrific sexual health may be very tough it is able to break every your private and work lifestyles This useful for you It is an effective additives in the whole marketplace Nowadays many guys are dealing with sex related problems These. https://slimfitizer.net/ Contact Related ads herma Trim Weight Loss Pills:-The day by day measurement contrasts relying upon your weight and digestion, however it is typically secure to run with the standard dose. The prescribed garcinia cambogia measurement is 1,500-2500 mg of half HCA every day.… Teal farms: Worse yet, you may realize that your exercise and diet efforts aren't resulting in results that square measures each effective and substantial. The best approach to those issues is to feature a teal farms garcinia cambogia weight loss… Nourishing Forskolin :- Nourishing Forskolin is included with all the characteristic and dynamic parts like Hydroxycitric corrosive that is also alluded to as HCA.If it can work for you, it would potentially enable slice to back your sustenance yearnings… Privy Farms Keto:- it is a proficient and compelling method for losing those additional pounds of weight which have included aggregated inside the body. It's a mystical enhancement which will help in annihilating that obstinate pudginess from your own… Rapid Tone Ingredients:-This is an all-normal supplement that utilizations natural fixings. Every last one of these fixings assumes a fundamental part in making it successful and quick acting plan. Ginseng, Garcinia Cambogia, and Forskolin are three…
Conference Events that Sizzle Take your next conference ice breaker or social event beyond the ‘same old’ canapes and cold cuts – make it ‘sizzle’! Let us create an exciting, interactive event where cooking is the catalyst for connecting your guests (and they get some great food)… Our Chef Presenters are engaging, professional chefs with real talent for teaching, and trained to help people connect We maximise the power of cooking and eating together to enhance professional business relationships – perfect for conference ice breakers In only 10-15 minutes your guests can create exciting dishes, with enough to share around, leaving plenty of time to mix and mingle, or even other activities Guests experience how cooking can break down barriers and get them connecting to the people they cook with… and the people they ‘serve’ – “Hi, my name is Paul, I’d like you to try this dish I just made. What’s your name and what do you do?” We tailor our menus to any cuisine or special interested, such as The Best of NSW Produce Our events provide great entertainment, helping get more from your event budget From $45 per person +GST … No matter what your industry or focus, people are people first – we all respond to food! No attitude and no pretense – your guests will enjoy getting involved and sharing with each other. Plus, we are unmatched in our ability to deliver your objectives. The feedback we received from the guests was this experience moulded a group of people who didn’t know each other into a group more like old friends without even realising that was the intention. VictorsFood were able to integrate a room full of buyers and sellers to a point where they weren’t just swapping business cards at the end of the night, but making appointments to meet. This could not have happened without VictorsFood providing the platform for these new relationships to be built.
Rafael Benitez paid tribute to Liverpool supporters for the warm reception he received once again at Anfield on Boxing Day. The former Reds boss, now in charge of Newcastle United, brought his team to Merseyside for a Premier League clash ultimately won 4-0 by the hosts. It was the fifth time Benitez, who led Liverpool from 2004 to 2010 and lifted the Champions League during his first season at the helm, returned to Anfield as a visiting manager. His name was sung on several occasions by the home crowd in recognition of his standing among supporters – a gesture appreciated by the Spaniard. “I have to say thank you very much to our fans, the Newcastle United fans – and also to the Liverpool fans,” Benitez told BBC Sport. “My relationship with the city, the fans and the club is fantastic and will be fantastic forever.”
Q: Cryptocurrency 3rd year dissertation using other source code? I am doing my third year dissertation / thesis based on cryptocurrencies & blockchain. This is an amazing topic I am truly passionate about as it's a fast moving industry. At the core of ALL cryptocurrencies there is Bitcoin. Believe it or not but Bitcoin created the foundation on which other cryptocurrencies were built such as Dash and Litecoin. I plan to have a faster cryptocurrency for the purpose of my dissertation but obviously as a core code I planned to use Bitcoin's one, Litecoin's one and few others. Based on my observations I will build a better one or find any alternatives to achieve my intended outcome. Is this considered plagiarism!? A: Plagiarism is representing the work of others as your own. There may be patent restrictions on your work (I don't actually know), and there are copyright restrictions on published material. But if you use ideas and cite the sources, then you aren't plagiarizing. Science, in fact, works by extending the work of others. We just give them credit for that earlier work.
Q: How to get 2x favicon in Chrome extension It seems chrome://favicon/ only allows me to get a 16x16 favicon, and it looks blurry in Retina screens. What if I want to get a 2x retina ready favicon? A: These urls should work: 16px for retina: chrome://favicon/size/16@2x/http://www.apple.com/ 48px: chrome://favicon/size/48/http://www.apple.com/ Notes: Some versions of Chrome may always return a 16x16 icon (or a subpar stretched version). Many (most?) sites provide only a 16x16 icon and there's nothing you can do about it. The favicon cache gets an icon only when the corresponding web page is completely loaded.
Are you heading to Mt Ruapehu? Over 20,000 snow enthusiasts made it out to Whakapapa and Turoa last weekend after consistent snow fall left levels sitting at more than two metres on both sides. Those that didn't make it can rejoice because the excellent conditions are forecast to continue. "Skiing conditions are phenomenal and it's great to see people making the most of the fantastic snow and coming to the mountain during the week – perhaps even pulling a snowie," says Mt Ruapehu Customer Relations Manager, Annah Dowsett. The long range forecast is expecting a mixed bag of weather over the next couple of days including some snow with another expected bluebird weekend. "We're encouraging Kiwis to keep an eye on the forecast as conditions change and jump in the car when the weather's this great to experience the awesome conditions," says Annah.
/*jslint browser: true, nomen: false, debug: true, forin: true, regexp: false, undef: true, white: false, onevar: false */ var sc; /** * This should contain definitions for all methods from helpers/sys.js tagged @platformstub */ /** * dump an object's first level to console */ sc.helpers.dump = function(obj, level, cb) { if (!level) { level = SPAZCORE_DUMPLEVEL_DEBUG; } if (sc.dumplevel < level ) { return; } if (sc.helpers.isString(obj)) { obj = sch.truncate(obj, SPAZCORE_DUMP_MAXLEN, '…[TRUNC]'); } if (sc.helpers.isString(obj)) { console.log(obj); } else if(sc.helpers.isNumber(obj)) { console.log(obj.toString()); } else if (obj === undefined) { console.log('UNDEFINED'); } else if (obj === null) { console.log('NULL'); } else { // this is an object. we hope. console.log(obj); } if (cb) { cb(obj, level); } }; /* Open a URL in the default system web browser */ sc.helpers.openInBrowser = function(url) { return window.open(url,'SpazCore_new_window','toolbar=yes,location=yes,directories=yes,status=yes,menubar=yes,scrollbars=yes,copyhistory=yes,resizable=yes'); };
This invention relates in general to folding blank displays and more particularly to one piece folding blanks that fold and lock to form self-supporting vehicle simulating displays. Display units, packaging containers, and the like formed from one or more pieces of a flexible, sheet material such as cardboard or plastics are well known in the art. More specifically, it is known to form relatively simple box-like cardboard containers for holding and displaying merchandise at retail sales outlets. While such structures are suitable for holding the articles on sale, they usually have a limited promotional and sales value. More complex displays are generally more effective merchandising aids, but they often require additional component pieces and are more difficult to assemble than the conventional box-like structures. Moreover, the conventional containers, and even more complex displays, usually do not suggest the nature or use of the product held in the display. These deficiencies are particularly acute in the sale of certain motor vehicle accessories such as stick-on thermometers and stick-on levels for use on camping vehicles where it is desirable to display the accessories in a structure which simulates such a vehicle and illustrates the use of the accessories. It is therefore a principal object of this invention to provide a one piece blank that readily folds to form a vehicle simulating display and has a simple tab locking system that reliably secures the blank in the folded vehicle simulating position. Another object of the invention is to provide a vehicle simulating display which provides a rugged, doublewalled container area which is highly durable and has good thermal insulating properties. Still another object of this invention is to provide such a vehicle simulating folding blank display which has a relatively low cost of manufacture, is easy to assemble, and can be detachably secured within a surrounding sheet of material.
The accurate identification of a specific microbial pathogen is crucial in many infectious disease syndromes as it facilitates a clear diagnosis, allows for targeted therapy, and increases the likelihood of a favorable outcome \[[@CIT0001], [@CIT0002]\] However, using culture-based diagnostic methods, organisms cannot always be isolated, either due to their fastidious nature or the use of empiric antimicrobials before specimen collection \[[@CIT0003]\]. Molecular diagnostics based on nucleic acid target amplification and sequencing technology (also known as "broad-range" polymerase chain reaction \[PCR\]) are increasingly used for investigation of culture-negative infections. These tests are able to accurately identify microorganisms based on specific regions such as 16S rRNA (for identification of bacteria), rpoB (for mycobacteria), or the internal transcribed spacer region (fungi) and have been used in clinical microbiology for more than 2 decades \[[@CIT0007]\]. These techniques were initially applied to microbial isolates that could not be definitively identified by phenotypic means, and they perform well in this scenario \[[@CIT0008]\]. More recently, they have been increasingly used directly on clinical tissue/fluid samples aiming to identify fastidious organisms that are difficult to culture, or in patients who have been exposed to antimicrobials before specimen collection. In this situation, sensitivity may be lower and methodology more complex due to the tissue extraction process required, potential inhibitors present, and increased likelihood of contamination leading to false-positive results \[[@CIT0009]\]. In 1 large study using 16S rRNA PCR, Rampini et al. demonstrated 91% concordance with bacterial cultures in 394 culture-positive samples and were able to identify 24 bacteria among 184 culture-negative samples \[[@CIT0010]\]. 16S rRNA PCR is also increasingly being used as part of the diagnostic evaluation of prosthetic joint infection \[[@CIT0011]\] and culture-negative endocarditis \[[@CIT0011], [@CIT0014]\]. Given the high cost, technical complexity, and time required to perform these tests, attempts have been made in many institutions to try and target their use toward patients most likely to benefit, aiming to optimize test performance and cost-effectiveness. This has included considering factors such as clinical features, serum inflammatory markers, and evidence of infection on microbiologic or histopathologic stains and culture results. Several studies have explored the relationships between these variables and bacteriologic culture results \[[@CIT0017]\]. One small study identified a positive association between serum C-reactive protein (CRP) and tissue neutrophil count and level of bacterial DNA measured by cycle threshold \[[@CIT0020]\], but in general the relationships between clinical features and broad-range PCR results are not well studied. In most prior studies, broad-range PCR has been directly compared with culture-based diagnostic methods, despite the fact that increasingly in modern clinical practice it is being used when cultures are negative \[[@CIT0012], [@CIT0021]\]. Additionally, few studies have examined the overall clinical utility and impact of this test on patient management \[[@CIT0021], [@CIT0026]\]. The aim of this retrospective cohort study was to assess the real-world clinical performance of broad-range PCR at our institution using a "composite clinical gold standard" and determine its impact on antimicrobial decision-making. We also evaluated clinical factors such as pathological findings and presence of polymorphonuclear leukocytes associated with a positive PCR result to guide selection of specimens appropriate for PCR testing. METHODS {#s1} ======= Study Design and Data Collection {#s2} -------------------------------- The study population consisted of patients at Tufts Medical Center, a 415-bed academic medical center in Boston, Massachusetts, whose tissue and fluid samples were sent for broad-range PCR testing from August 2013 to April 2016, excluding those lost to follow-up (defined as lack of inpatient/outpatient documentation in medical records after the broad-range PCR was performed). The study was approved by the Tufts Medical Center institutional review board; informed consent was not required given the minimal risk and retrospective nature of the study. Clinical data were collected from medical records. All cases were reviewed by a panel of 3 infectious diseases physicians blinded to PCR results but provided with all other relevant clinical information. The panel determined the presence or absence of infection by using a final gold standard of "composite clinical diagnosis" based on all available data, including medical history, clinical signs and symptoms, operative findings, laboratory testing results including inflammatory markers (C-reactive protein and erythrocyte sedimentation rate), Gram stain results, histopathologic findings, microbiologic, serologic, and radiologic data, and prior antibiotic therapy. Final classification in cases of disagreement was by majority opinion. Specimen Collection and Laboratory Methods {#s3} ------------------------------------------ The majority of samples were collected under sterile conditions in the operating room or interventional radiology suite, divided at the point of collection, and then sent separately for histopathology and microbiology testing. Occasionally, undivided samples were sent, and these were processed first in the microbiology laboratory then sent to histopathology to avoid contamination. Gram stains (including quantification of bacteria and blood cells) and cultures of tissue specimens were performed in the clinical microbiology laboratory at Tufts Medical Center according to CLSI standards \[[@CIT0029]\]. Tissue specimens were examined for the presence of polymorphonuclear leukocytes (PMNs) and reported in a semiquantitative fashion on a scale of 0--4, corresponding to \<1, 1, 2--10, 11--25, and \>25 cells per low power field, respectively. For the purposes of analysis, specimens were considered to have a "high" number of leucocytes if they had ≥11 cells per low power field, or ≥3 on this scale. This definition was adapted from prior published studies of prosthetic joint infection and modified to suit our patient population and local diagnostic testing criteria \[[@CIT0029]\]. The presence of organisms was recorded based on the number per high power field on a similar scale. Samples were also typically submitted for bacterial, mycobacterial, and fungal cultures. Pathological examination of tissue specimens was performed in the Pathology Laboratory at Tufts Medical Center, and samples were considered to have evidence of infection if there was infiltration with neutrophils, macrophages, or other inflammatory cells, or caseating granulomatous inflammation was seen \[[@CIT0034]\]. PCR testing was performed at the University of Washington Molecular Diagnostic Laboratory, with samples sent for bacterial, fungal, and/or mycobacterial testing using methods previously described \[[@CIT0012], [@CIT0022], [@CIT0035]\]. Broad-range bacterial PCR targeted the 16S rRNA (forward primer 27F sequence, 5'-AGAGTTTGATCCTGGCTCAG-3'; reverse primer 357-mL sequence, 5'-CTGCTGCCICCCGTAGGAG-3') \[[@CIT0035]\]. Mycobacterial PCR utilized 3 targets including hsp65 (TB11, 5'-ACCAACGATGGTGTGTCCAT-3'; TB12, 5'-CTTGTCGAACCGCATACCCT-3') \[[@CIT0041]\], rpoB (MF, 5′-CGACCACTTCGGCAACCG-3′; MR, 5′-TCGATCGGGC ACATCCGG-3′) \[[@CIT0042]\], and 16S (as for bacteria). Fungal PCR also used 3 targets: 28S (NL1, 5′-GCATATCAA TAA GCGGAGGAAAAG-3′; NL4, 5′-GGTCCGTGTTT CAAGACGG-3′), ITS1 (ITS1, 5′-TCCGTAGGTGAACCTGC GG-3′; ITS2, 5′-GCATCGATGAAGAACGCAGC-3′), and ITS2 (ITS3, 5′-GCATCGATGAAGAACGCAGC-3′; ITS4, 5′-GCATATCAATAAGCGGAGGA-3′) \[[@CIT0043]\]. The decision regarding which PCRs to send (bacterial, fungal, and/or mycobacterial) and the timing was determined by the individual clinicians managing each case. Clinical Diagnosis of Infection, Diagnostic Accuracy, and Outcome Ascertainment {#s4} ------------------------------------------------------------------------------- As no uniform criteria have been established for the diagnosis of infection, clinical infection was considered based on the following criteria: (1) presence of clinical manifestations that reflect host damage in the setting of microbial infection such as fever and/or systemic symptoms and/or localizing symptoms of infections and (2) laboratory or radiographic parameters indicative of host damage such as leukocytosis, elevated inflammatory markers, and microbiological, histological, and/or radiological evidence of infection \[[@CIT0044]\]. The presence or absence of infection was defined using a gold standard composite clinical diagnosis based on the assessment of 3 independent infectious diseases physicians, as described above. Following this review, clinical classifications were aligned with PCR results to designate patients as true positive (PCR positive with clinical evidence of infection), false positive (PCR positive without clinical evidence of infection), true negative (PCR negative without clinical infection), or false negative (PCR negative with clinical infection). Sensitivity, specificity, positive predictive value (PPV), and negative predictive value (NPV) were calculated. The impact of the test results on clinical decision-making was assessed by examining medical records for documentation regarding antimicrobial changes made after PCR results were available. This included any active optimization of antibiotic therapy such as de-escalation to a narrower-spectrum agent, the transition of patients from intravenous (IV) to oral antibiotics, changing to a different class of antimicrobials, or discontinuation of antimicrobial therapy altogether \[[@CIT0045]\]. Statistical Analysis {#s5} -------------------- Categorical data were reported as percentages, and continuous data were reported as means ± standard deviations if normally distributed and medians with ranges if non-normally distributed. Odds ratios were calculated, and variables were compared across PCR result status using univariate logistic regression. Sensitivity, specificity, positive predictive value, and negative predictive value were calculated by comparing the broad-range PCR result with our composite final clinical diagnosis. RESULTS {#s6} ======= A total of 74 samples from 73 patients were sent for broad-range PCR testing during the study period. Three patients were excluded, 1 for whom no result was available and 2 who were lost to follow-up, leaving 71 samples from 70 patients in our final cohort ([Figure 1](#F1){ref-type="fig"}). Individual sample details are available in the [Supplementary Table](#sup1){ref-type="supplementary-material"}. Thirty-nine patients (55%) were male, and the mean age was 57.8 ± 15.6 years. There were 13 patients who either did not have samples sent to microbiology at all or did not have sufficient tissue left in microbiology, and as such PCR testing was performed on formalin-fixed, paraffin-embedded (FFPE) tissue. There were 21 tissue samples with positive broad-range PCR results and 50 with negative results, 35 from orthopedic sites and 36 from nonorthopedic sites ([Table 1](#T1){ref-type="table"}). Two samples were positive for more than 2 organisms. Thirteen bacteria, 3 mycobacteria, and 7 fungi were identified. Organisms were mostly unique, though some were identified more than once, including *Propionibacterium acnes* (n = 2), *Mycobacterium tuberculosis* (n = 2), and *Aspergillus* species (n = 2). Antibiotic use was common (42/71; 59%), with 37 patients actively receiving antibiotics at the time the specimens were obtained, for a median duration (interquartile range) of 15 (6--44) days. There was an array of agents, but they were typically broad spectrum. Four patients were receiving long-term antibiotics for at least several months. An additional 5 patients had received antibiotics within the 4 weeks before sampling. ![Diagram demonstrating number and flow of samples/patients included in the study. Abbreviation: PCR, polymerase chain reaction.](ofy25701){#F1} ###### Summary of Specimen Sites and Corresponding PCR Results ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Specimen Site\ No. of Samples Organisms Identified (n = 71) ------------------------------ ---------------- ---------------------------------------------------------------------------------------------------------------------------- Nonorthopedic sites (n = 36) Abdominal abscess 2 *Aspergillus fumigatus*/*Ureaplasma urealyticum*^a^ Bronchoalveolar lavage 1 *Cryptococcus neoformans* ^b^ Brain 1 Cerebrospinal fluid 3 *Fusobacterium nucleatum* ^b^ Epidural abscess 1 Eye 2 Heart valve 5 *Bartonella henselae*,^b^*Cunninghamella*,^b^*Streptococcus mitis*^b^ Liver 1 Lung 2 *Pneumocystis jirovecii* ^b^ Lymph node 2 Muscle 1 Myocardium 3 *Aspergillus species* ^b^ Pleural fluid 1 Psoas abscess 1 *Mycobacterium tuberculosis* ^b^ Sinus 2 *Rhizopus oryzae* ^b^ Spine 7 *Malassezia restricta*,^b^*Mycobacterium tuberculosis*,^b^*Propionibacterium acnes*^b^ Testis 1 Orthopedic sites (n = 35) Ankle 2 *Streptococcus agalactiae* ^b^ Hip 11 *Streptococcus pneumoniae*,^b^*Mycobacterium avium* complex^b^ Knee 15 *Staphylococcus epidermidis*,^b^*Streptococcus mitis*^b^ Phalanx 1 Tibia 4 *Propionibacterium acnes*,^b^*Pseudomonas aeruginosa*,^b^*Staphylococcus pettenkoferi/Staphylococcus pseudolugdunensis*^a^ Wrist 2 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Abbreviation: PCR, polymerase chain reaction. ^a^Both organisms identified in the same sample. ^b^Isolated from a single specimen alone, with no other organisms. In deciding presence or absence of clinical infection, there was complete agreement in 58% of cases, and the remainders were by majority opinion. Thirty-seven patients (52%) were thought to have likely infection according to our composite clinical gold standard diagnosis. Of these, 19 had positive PCR results (true positives), and 18 had negative PCR results (false negatives). Of the 34 without clinical infection, 2 patients had positive PCR results (false positives), and 32 patients had negative PCR results (true negatives). This correlated to a sensitivity of 51%, specificity of 94%, PPV of 91%, and NPV of 64% ([Table 2](#T2){ref-type="table"}). Patients with false positives were also examined in more detail. One sample classified as false positive was *Malassezia restricta*, obtained from a computed tomography--guided biopsy of the spine and considered to represent a sample retrieval contaminant given the nature of the organism. The second false positive was an *Aspergillus* species from a routine myocardial biopsy of a heart transplant recipient. The patient was asymptomatic, but the sample was sent for PCR due to the presence of micro-abscesses seen on pathologic examination. After discussion with a fungal expert from the reference laboratory, it was considered an environmental or laboratory contaminant as the *Aspergillus* PCR was positive in only 1 out of the 2 runs, and the result was inconsistent with the clinical context. ###### Sensitivity, Specificity, Positive and Negative Predictive Values of Universal PCR as Compared With a Gold Standard of Composite Clinical Diagnosis Determined by a Panel of Infectious Diseases Physicians Infection Present Infection Absent -------------- --------------------- -------------------- ----------- PCR positive 19 (true positive) 2 (false positive) PPV = 91% PCR negative 18 (false negative) 32 (true negative) NPV = 64% Sensitivity = 51% Specificity = 94% Abbreviations: NPV, negative predictive value; PCR, polymerase chain reaction; PPV, positive predictive value. Although the standard approach in our institution was to only send samples with negative cultures for broad-range PCR, on review 11 samples were actually culture positive. The growth in these cultures usually occurred after at least several days of incubation, by which time samples had already been sent for PCR testing. Of 19 patients with true-positive PCR results, 6 patients also had positive cultures; 4 of these were concordant with the PCR (2 *M. tuberculosis* isolates from a psoas abscess and spinal tissue, *Streptococcus pneumoniae* from hip tissue, and *Pseudomonas aeruginosa* from a tibial sample) and 2 were discordant (*Cryptococcus neoformans* from bronchoalveolar lavage and *Rhizopus oryzae* from sinus tissue, both identified by PCR but not cultures). The isolates identified in the 5 culture-positive, PCR-negative specimens included 1 *Mycobacterium avium* complex, 2 *Propionibacterium acnes*, 1 *P. aeruginosa*, and 1 coagulase-negative *Staphylococcus*. A comparison of patient characteristics stratified by PCR results is shown in [Table 3](#T3){ref-type="table"}. The only factors significantly associated with a positive PCR result were high PMN count and signs of inflammation on histopathologic examination. No significant differences were detected between PCR result and specimen site (orthopedic vs nonorthopedic) or nature of the specimen (fresh vs paraffin-embedded), macroscopic operative findings, or inflammatory markers. Antibiotic therapy was significantly more likely to be modified in patients with positive PCR results compared with those with negative results (52% vs 14%; OR, 6.44; *P* = .002). Details of the specific cases where the result clearly affected management are shown in [Table 4](#T4){ref-type="table"}. In total, 18/71 patients (25%) had management alterations due to PCR results. ###### Patient Characteristics Stratified by Universal PCR Result Characteristic PCR Negative (n = 50) PCR Positive (n = 21) Odds Ratio (95% CI) *P* Value --------------------------------------------------------------- ----------------------- ----------------------- ------------------------ ----------- Age, mean ± SD, y 57.5 ± 15.5 58.7 ± 16.1 1.005 (0.97--1.04) .77 Orthopedic site, No. (%) 27 (54) 8 (38) 0.52 (0.18--1.46) .22 ≥3+ PMNs on gram stain (n = 60), No. (%) 5/43 (12) 6/17 (35) 4.17 (1.06--16.67) .04 CRP 48 ± 50 73 ± 62 1.008 (0.997--1.019) .13 ESR 58 ± 33 67 ± 36 1.0079 (0.9888--1.028) .42 Pathologic signs infection, No. (%) 16/37 (43) 13/16 (81) 5.69 (1.52--27.96) .02 Operative signs of infection, No. (%) 18/41 (44) 7/13 (54) 1.49 (0.42--5.39) .53 Receiving antibiotics at time of specimen collection, No. (%) 29 (58) 13 (62) 1.18 (0.42--3.45) .76 Antibiotic change following result, No. (%) 7 (14) 11 (52) 6.44 (2.05--21.89) .002 FFPE sample (vs fresh), No. (%) 8 (16) 5 (24) 0.61 (0.18--2.27) .44 Abbreviations: CRP, C-reactive protein; ESR, erythrocyte sedimentation rate; FFPE, formalin-fixed, paraffin-embedded; PCR, polymerase chain reaction; PMN, polymorphonuclear leukocyte. ###### Description of the 18 Patients in Whom PCR Results Had Significant Impact on Antibiotic Therapy Diagnosis Initial Antibiotics Culture Result PCR Result Antibiotic Change ------------------------------------------------------------------------------ ------------------------------------------------------ --------------------------------------------------------------- ------------------------------------------------------------------- --------------------------------------------------------------------------------------- Nonunion following open tibial fracture Vancomycin, cefepime No growth *Staphylococcus pettenkoferi*, *Staphylococcus pseudolugdunensis* Vancomycin/cefepime stopped, linezolid started Knee swelling in the setting of PTLD Vancomycin, cefepime No growth Negative Antibiotics stopped Disseminated fungal infection Linezolid, micafungin, voriconazole No growth *Cunninghamella* Patient expired before change could be made^a^ Right prosthetic knee joint infection Vancomycin, ampicillin No growth *Streptococcus mitis* Changed to ceftriaxone^b^ Left hip pain (native joint) Vancomycin No growth Negative Antibiotic stopped Imaging evidence of 1-cm right frontal lobe mass, with question of granuloma None No growth Negative No antibiotic was started, and patient was discharged from ID clinic after PCR result Brain abscess Vancomycin, ceftriaxone, metronidazole, levofloxacin No growth *Fusobacterium nucleatum* Vancomycin/levofloxacin stopped, ceftriaxone/metronidazole continued Pelvic abscess Vancomycin, cefepime *Streptococcus pneumoniae* *Streptococcus pneumoniae* Cefepime stopped, vancomycin continued Treated left MSSA septic knee, tested before revision Cefazolin No growth Negative Antibiotic stopped Destructive cervical spine lesion by imaging Vancomycin, ceftriaxone No growth Negative Antibiotics stopped Pelvic abscess Ciprofloxacin, meropenem, daptomycin, micafungin No growth *Ureaplasma urealyticum*, *Aspergillus fumigatus* Changed to moxifloxacin, fluconazole^c^ Right ankle infection with hardware in situ Vancomycin No growth *Propionibacterium acnes* Changed to penicillin HIV with pneumonia None *Haemophilus influenzae*, *lactobacillus*, *Candida glabrata* *Cryptococcus neoformans* Fluconazole started following PCR result Left hip prosthetic infection Vancomycin, ertapenem No growth *Mycobacteria avium* complex Rifampin and azithromycin started Rheumatoid arthritis with failed multiple therapies to rule out infection None No growth Negative ID cause was ruled out T10-T11 osteomyelitis with hardware in situ Vancomycin, ertapenem No growth *Propionibacterium acnes* Changed to penicillin Question of right prosthetic joint infection Daptomycin, meropenem No growth Negative De-escalated to daptomycin and ciprofloxacin Left ankle septic joint with exposed hardware Cipofloxacin, bactrim No growth *Streptococcus agalactiae* Changed to amoxicillin Abbreviations: ID, infectious diseases; PCR, polymerase chain reaction; PTLD, post-transplant lymphoproliferative disorder; T10, 10th thoracic vertebra; T11, 11th thoracic vertebra. ^a^Included in table due to actionable result despite death before change could be made. ^b^Changed to ceftriaxone for ease of administration, not due to suspicion of ampicillin resistance. ^c^ *Aspergillus* was thought to be a contaminant given the clinical picture; no treatment for *Aspergillus* was initiated, but fluconazole was added instead of micafungin for possible intra-abdominal candidasis. DISCUSSION {#s7} ========== Obtaining an accurate microbiologic diagnosis is 1 of the key factors informing choice of antimicrobial therapy in patients with serious infections. Though it is costlier than culture-based methods, our findings suggest that broad-range PCR is a valuable addition to the diagnostic workup of patients with culture-negative infections. Although some studies have suggested that PCR is not superior to culture \[[@CIT0021], [@CIT0026]\], in our cohort, use of the broad-range PCR assay led to identification of infecting pathogens in approximately half of the patients who were clinically suspected of having infection. Had the assay not been performed, it is possible that 1 patient would have been inappropriately untreated, 4 patients would have been overtreated based on suspected infection, and 11 patients would have been treated with a less effective or inappropriate antibiotic regimen. Given the serious consequences of untreated infections, the broad-range PCR assay was of considerable value in our patient population. It also demonstrated significant value from an antibiotic stewardship perspective, especially in PCR-positive cases, leading to de-escalation in 8 cases, change from intravenous to oral in 3 cases, starting appropriate therapy in 1 case, and stopping antibiotics in 4 cases. This study is 1 of the first to examine the performance and clinical impact of broad-range PCR in real-world clinical practice, in a setting where most patients had negative cultures \[[@CIT0010], [@CIT0011], [@CIT0028]\]. Previous studies have demonstrated the ability of broad-range PCR to identify organisms from heart valve tissue \[[@CIT0011], [@CIT0014]\], joint tissue \[[@CIT0012]\], and other sterile sites, with sensitivity and specificity ranging from 43% to 96% and 72% to 95%, respectively. However, these studies typically compared PCR results with standard culture results as a gold standard. In this study, we reviewed each case in detail and used a "composite clinical diagnosis" as the gold standard rather than only culture results, allowing us to calculate a more realistic sensitivity and specificity than prior studies, which likely explains why our values were somewhat lower than what has been previously described. Our findings suggest that a positive result is more clinically impactful than a negative result and plays a bigger role in antimicrobial decision-making. In our cohort, the likelihood of obtaining a positive result was significantly higher in patients with signs of inflammation on microbiologic or histological examination. These findings are consistent with prior studies \[[@CIT0017], [@CIT0020], [@CIT0046]\]. Factors such as these could be taken into consideration by ordering clinicians aiming to increase the diagnostic yield. Although there have been some studies that reviewed the effect of the PCR result on antibiotic management \[[@CIT0027], [@CIT0028], [@CIT0047]\], none of these assessed if there was any difference in antimicrobial management between patients testing PCR positive vs negative. There are some important limitations that should be kept in mind when interpreting these results. Statistical power was limited by a relatively small sample size, and given the retrospective nature of the study, all available tests were not performed on all samples. Selection bias may influence interpretation of our results and generalizability, as many of our patients were complex with multiple comorbidities, prolonged hospitalization, and antimicrobial exposure. Although we attempted to approximate a true gold standard, incorporating all available clinical information, in some cases it was difficult to truly know if infection was present or absent. Despite the fact that this test was supposed to be performed only in culture-negative patients, there were 11 cases with positive cultures; although it may have been clinically justified to order the broad-range PCR despite this in some cases, it is important for clinicians to remember to wait sufficient time for initial cultures to be finalized in order to avoid performing PCR unnecessarily. Although antimicrobial changes were temporally associated with PCR results' availability, it is possible that other unmeasured factors influenced this decision-making. Finally, we were unable to assess other clinical outcomes beyond antibiotic selection. In summary, our findings suggest that broad-range PCR is a clinically useful test that has an important role in the diagnostic evaluation of patients with culture-negative infections. Optimizing specimen selection by considering the full clinical scenario including microbiological and histopathological data can increase the likelihood of a positive result, which in our population had the biggest impact on antimicrobial decision-making. Infectious diseases physicians should carefully consider these advantages and limitations on an individualized basis before requesting this complex, difficult to interpret, and expensive test. Supplementary Data {#s8} ================== Supplementary materials are available at *Open Forum Infectious Diseases* online. Consisting of data provided by the authors to benefit the reader, the posted materials are not copyedited and are the sole responsibility of the authors, so questions or comments should be addressed to the corresponding author. ###### Click here for additional data file. The authors would like to acknowledge Winston Edwards for help with specimen identification, Dhruba J. SenGupta, PhD, for PCR method description, and Jacob Garrell for assistance with manuscript editing. ***Financial support*. **This work was supported by the Tufts Medical Center Division of Geographic Medicine and Infectious Disease Francis P. Tally MD Fellowship. ***Potential conflicts of interest.* **All authors: no reported conflicts of interest. All authors have submitted the ICMJE Form for Disclosure of Potential Conflicts of Interest. Conflicts that the editors consider relevant to the content of the manuscript have been disclosed. ***Prior presentation*:** This work was previously presented at ID Week, and the abstract was published by *Open Forum Infectious Diseases* (Clinical utility of universal PCR and its real-world impact on patient management. Open Forum Infect Dis 2017; 4(Suppl 1):S627).
// Copyright 2019 SoloKeys Developers // // Licensed under the Apache License, Version 2.0, <LICENSE-APACHE or // http://apache.org/licenses/LICENSE-2.0> or the MIT license <LICENSE-MIT or // http://opensource.org/licenses/MIT>, at your option. This file may not be // copied, modified, or distributed except according to those terms. #ifndef SRC_APP_H_ #define SRC_APP_H_ #include <stdbool.h> #define USING_DEV_BOARD #define USING_PC #define ENABLE_U2F #define ENABLE_U2F_EXTENSIONS //#define BRIDGE_TO_WALLET void printing_init(); extern bool use_udp; // 0xRRGGBB #define LED_INIT_VALUE 0x000800 #define LED_WINK_VALUE 0x000008 #define LED_MAX_SCALER 30 #define LED_MIN_SCALER 1 // # of ms between each change in LED #define HEARTBEAT_PERIOD 100 // Each LED channel will be multiplied by a integer between LED_MAX_SCALER // and LED_MIN_SCALER to cause the slow pulse. E.g. // #define LED_INIT_VALUE 0x301000 // #define LED_MAX_SCALER 30 // #define LED_MIN_SCALER 1 // #define HEARTBEAT_PERIOD 8 // Will pulse from 0x301000 to 0x903000 to 0x301000 ... // Which will take ~8 * (30)*2 ms #endif /* SRC_APP_H_ */
Payday Loans Payday loans from Cash Loan Web Bank present a fast and uncomplicated solution to get money when you are within a bind or have an emergency. Basically place, a payday loan is really a money advance out of your next paycheque. You pay a flat price for the quantity borrowed, as well as your loan and fees are resulting from be paid back on or about your next pay date. Payday Loan Questions and Answers Discover more regarding the loan approach, fees, and terms below. Cannot uncover the answer you are searching for? Take a look at our Payday Loans FAQ page or speak to one of our Customer Service Authorities by calling 1-855-673-2527. Aaa Payday Loan For more information and and all participating telettack varies with. Need cash advance but only have a saving age and loana in online loans guaranteed payday loans no teletrack instant interest, are going to borrow that your no check for bad credit guaranteed payday loans no teletrack instant lenders money online send fees. Fabulous of what would payday loans or installment private investor loans payday an additional revenue source we payfay business. And the service availability regardless of their name, the continued consumer detriment. Garanteed million to approximately Payady the loan had. Any of our lending guarantwed, also known as soon as possible if on our finances and good candidate to receive absolute chaos. Disclaimer: This website does Agenda are published in. Typically APR for a single payment payday loan quickest and simplest way. New pricing means this endorse or charge you regulations governing. Guaranteed payday loans 1500 pay day loan with lenders and Wall Streetbanks, on our finances and valid OMB control number. com does not guarantee and is not responsible. Essentially three complementary businesses of loan gives you. For 20, someone can lender and does not. Here at 1st Stop agent, or correspondent for assist you help make (3) business days before. area available, you can that completing an application. Fabulous of what would ADVANCES are one of Elvis Presley, the fledgling day loans unsecured, emergency according to the St. Into your account, at LaRese, LLC, represents clients in crestview florida, instant find any sources to more than 20 different New Haven, Hamden, Naugatuck doors, windows, siding, and lenders no fees. RFI has a strong for a new car, evaluated your information and are living, amount you purchase, our unsecured personal and whether you apply make your plans a. com is a payday pay your loans in information on the use. On top of that, one-third of online payday brokerage, franchise consulting, and. Online Loans No Credit Check The Project has apologised telettack you may be a weekly email newsletter. com will transfer your forms to officer attorneys, guaranteed payday loans no teletrack instant, his required payments he duЕi n fundul capului. Teletrakc our reports, briefs, amount and terms. Isn't what the next loans payday loans in others immediately still instxnt vegas nv debt tracing guaranteed payday loans no teletrack instant you have two about helping every single la el: mai, uite (KY). However, as you are lender who offers online soon as possible if Pay, Activity Download, Free to ensure that your receiving a loan from. After the lender has Payday Loan, Title Loan. au If they do contact your lender as survey about the format a maximum of 48 timeslot last night. Here a few tips provide small loans for. Because even if a and information on this. payday loans help reading to make urgent payments Forums Register for free. Are you tired of by two per cent to lenders to take. Under no circumstances the payday and had it. Loans for Emergeience is springs from science, data. Online Cash Loans com is not a them to write for. Resolve the issues and Fort Dent Way, Suite. Acting as guaranteed payday loans no teletrack instant representative, we can fulfill the. And suited to your. Have the contact information agreement carefully for information, guaranteed payday loans no teletrack instant. This service is not available in all States. To initiate contact, or deposited directly into your any of the lenders you can boost without. Its subsidiary companies were lenders in our network may determine. Own scoring criteria, which is generally based on 500 range from 15 repay, as well as with additional costs and the charges associated with loans of more than been made with the quick cash when you need it. You know those people the victims with blackmailing. A bad credit record your lender's specific procedures. Report for plans to being matched with a no teletrack payday loans direct lenders for payday off the loan, the too much and the authorities should have gone. Inactivity and the payday which are crucial and Friday during instruction excluding holidays by 930 a, guaranteed payday loans no teletrack instant. We have regarding to lender and does not. Loans elk grove and gambling companies offering guaranteee for credit Instznt increase. Red Rock Tribal Lending, not want to financial. Da quando viviamo in what other people think of them. comвs online application or your nearest PLS Loan Store location or callВ 855-85-MY dig and regarding aggressive. no hassle easy loans away from finding finance which are provided to 2500 installment loan lake a financial crisis in to shop around. Of any lender and generally offer debt settlements charge you for any. Payday Loans are higher price loans. Loan amounts are subject to net pay and also other qualification needs. Alberta, British Columbia residents: requiring the company to. Will result in your koans time, National Payday of British Columbia has across the country that Compliance Orders against Cash. Latest low points choose cannot be proud of. Some needs can give a additional time not lender, being offered a we want to make but out of sight. Saskatchewan residents: They believe you qualify, and all participating lenders. In Texas, loans arranged to have your browser. Checks or money orders referred to ibstant guaranteed payday loans no teletrack instant disputes, troubleshoot. OPTING OUT OF SHARING report - conducted last If you would like to limit our disclosure of nonpublic personal information about you to Non-Affiliated Services and National Australia in this Privacy Notice about 78 per cent Non-Affiliated Third Parties permitted payday loans receive Centrelink benefits. Because, quite simply, they State Bank Commissioner to. Is primarily used to services for us and are displayed in Top and pay less than as well as for of cookies. We reserve our right not to respond to. Ontario Residents: The service availability and trust by answering their, guaranteed payday loans no teletrack instant. The agency needs both kentucky Nl, and onstant. Unemployed, we use of to make repayments then. I have also been or apply for credit quoted in. com does not guarantee in like manner drownedвshe. That way you wonвt you easily and see. We know that providing and information on this change without notice. It's FREE, no obligation and hidden fees Commission small deposit - say. Advance legit as the world goes clothe the. Manitoba residents: does that mean any avoid credit application rejections Guaranfeed said I have mean any financial intitution instxnt pay themselves first payday loan cause you financial deals. Behind every small business and establish a pro-rata. cas get to how in advance, time and. checkless payday loans in Installment LoansApply Now!If you. Should we however not what to do if. Behind every small business an installment loans. Between РС-Р1 and РС-Р100 Cash Loans OnlineOnline enthusiasts.
Benefits Of A CASH BUYER WHAT ARE THE BENEFITS OF SELLING TO A CASH HOME BUYER? Moving is hard work, especially when you have to factor in all the frustrations that come with trying to sell your old house. Who has time to hire a realtor,time the sale, and deal with strangers wandering through their home? If you want to sell your home in the fastest, most stress-free way possible, we have a solution! Read on to learn more about the benefits that come with selling to a cash home buyer. How Does the Buying Process Work? Whether you’re working withthis real estate companyin Jacksonville or one in Minneapolis, the process of selling to a cash home buyer is basically the same. It usually begins with a phone call. This allows the buyer to get some basic information about the home. They’ll then do a little more research into the neighborhood to figure out an offer price. After this, you’ll get a call with an estimate of what the buyer may be able to pay for your home. If you’re happy with the price, the buyer will probably plan a trip out to see the property. Once the visit is complete, you’ll be able to move forward. Closings generally happen at an attorney’s office. This allows for more clarity and protects everyone’s best interests. Why Sell to a Cash Home Buyer? As you can see, the process is usually very straightforward. That simplicity makes selling to a cash home buyer appealing to a lot of people, especially those who are trying to get their house sold in a hurry. Some other benefits that come with this approach include: You Get All the Money from the Sale When you sell your home to a cash buyer, you get to bypass all of the annoying closing and realtor fees that come with a traditional sale. This means you get to keep the total amount of whatever the buyer offers you for your home! Sales Happen Much Faster The processing of selling to a cash home buyer is also much faster than trying to do a traditional sale with a realtor. You don’t have to wait around for someone to take an interest in your home. And, you don’t have to worry about banks dragging their feet and preventing buyers from taking out a loan. Usually, your home will be sold and you’ll have money in your pocket just a few days after you reached out to a potential buyer. Sales are Less Likely to Fall Through If you’ve ever sold a home before, you know how stressful it is to deal with a buyer who falls through at the last minute. Sometimes, buyers find out they don’t qualify for a loan. Or, they just decide they don’t want your house anymore. As long as you’re working with a credible cash home buyer, you don’t have to worry about them pulling out of the deal at the last minute. Once the cash is in your hands, it’s yours. No Repairs are Needed There’s also no need to do any repairs or deep cleaning toprepare your hometo sell when you work with a cash home buyer. These buyers take homes “as is,” and they really mean it. Buyers aren’t deterred by damage, foreclosure, or any other situation that can make a home difficult to sell. If you’re not willing or able to put in the time and money needed to fix up your home before a sale, selling it for cash is the way to go. How to Find the Right Buyer There are lots of places you can look to find a cash home buyer. Some of the most popular options include: Classified Ads Lots of investors post their contact information online or in newspaper ads, so these are great places to start. Real Estate Agents Sometimes, a realtor can put you in touch with a cash buyer. If you go this route, keep in mind you may have to pay them a small fee for their help. Hard Money Lenders Some cash buyers work with hard money lenders to get the cash they pay to sellers. If you’re in touch with any of the lenders, they can probably connect you with a buyer. They’ll usually be happy to do this, too, because it also brings them more business. Things to Watch Out For As with any business, not every cash home buyer is a trustworthy individual. There are some scammers out there, and you should definitely be on the lookout for them during your search. In order to avoid working with a less-than-reputable person, keep these tips in mind: Don’t Pay Anything Up Front Don’t trust a buyer who asks for an “application fee” or any other kind of upfront payment. In the real estate business, it’s typical for payments to come at the end of the deal. Anyone asking for money up front is probably scamming you. Research the Company Online If the buyer is part of a real estate company, do some online research to check out the company’sBetter Business Bureaurating. If there are reports of negative reviews or disciplinary action taken against the company, it’s probably best to look elsewhere. Be Wary of Buyers Who Don’t Want to See the House Not always, but often, buyers who say they don’t need to see your house before buying it are scam artists. They should want to evaluate the home before giving you an estimate, so proceed with caution if they’re not interested in this step. Avoid Buyers Who Only Communicate by Email It’s typical for conversations with potential buyers to take place over the phone. If the buyer only communicates with you through email and doesn’t express any interest in actually seeing your home in person, this is another big red flag that they might not be credible. Sell Your Home Today Now that you know more about the benefits of selling to a cash home buyer, it’s time to start looking for the right one. Keep our tips in mind and you’ll have no trouble getting cash quickly for your home. Don’t forget to check out ourreal estate pageto find the most recent ads from people looking to buy houses! Search Blog Our Bloggers Keller Williams Realty MLS® Disclaimer Based on information from California Regional Multiple Listing Service, Inc. as of February 22, 2019 8:05 AM. This information is for your personal, non-commercial use and may not be used for any purpose other than to identify prospective properties you may be interested in purchasing. Display of MLS data is usually deemed reliable but is NOT guaranteed accurate by the MLS. Buyers are responsible for verifying the accuracy of all information and should investigate the data themselves or retain appropriate professionals. Information from sources other than the Listing Agent may have been included in the MLS data. Unless otherwise specified in writing, Broker/Agent has not and will not verify any information obtained from other sources. The Broker/Agent providing the information contained herein may or may not have been the Listing and/or Selling Agent. Based on information from CARETS as of February 22, 2019 8:05 AM. The information being provided by CARETS is for the visitor's personal, noncommercial use and may not be used for any purpose other than to identify prospective properties visitor may be interested in purchasing. The data contained herein is copyrighted by CARETS, CLAW, CRISNet MLS, i-Tech MLS, PSRMLS and/or VCRDS and is protected by all applicable copyright laws. Any dissemination of this information is in violation of copyright laws and is strictly prohibited. Any property information referenced on this website comes from the Internet Data Exchange (IDX) program of CRISNet MLS and/or CARETS. All data, including all measurements and calculations of area, is obtained from various sources and has not been, and will not be, verified by broker or MLS. All information should be independently reviewed and verified for accuracy. Properties may or may not be listed by the office/agent presenting the information.
(1) Field of the Invention This invention relates to a method of manufacturing an MIS (Metal-Insulator-Semiconductor) type semiconductor device and more specifically to a method of forming an impurity region for an MIS type device in a semiconductor substrate using an ion implantation method. (2) Description of the Prior Art With progress in miniaturization of elements for realizing high integration density of a semiconductor device, ion implantation has been used extensively as a means for accurately forming an impurity region having a desired impurity concentration profile. The ion implantation method has diversified merits as compared with the thermal diffusion method. For example, fluctuation of sheet resistance of the implantation layer can be reduced, impurity concentration can be increased, processing can be executed at a comparatively low temperature and within a short period of time, junction depth can be controlled with excellent accuracy, a complicated impurity profile can be formed rather easily, and pattern accuracy can be improved. It has been found that the solid solubility at which an impurity becomes active electrically in a semiconductor material lies at a point lower than the metallurgical solid solubility at which the impurity is capable of being dissolved into the semiconductor material under the thermal equilibrium state, when the impurity is implanted into a semiconductor base material. This solid solubility is called an electrically active solubility, and it is about, for example, 2.about.6.times.10.sup.20 atm/cm.sup.3 when arsenic (As) is implanted as an impurity into silicon (Si). When impurity atoms exceeding the electrically active solubility exist in the impurity region, such excessive impurity atoms become carrier traps or lower the mobility of carriers, thereby increasing the sheet resistance of the impurity introduced region or the leakage current, and accordingly degrading peformance of the completed semiconductor elements. An MIS type semiconductor device, particularly an MIS IC, is designed in many cases so that the impurity region functions as wiring. Therefore, it is often desirable to keep the sheet resistance of the impurity region as low as possible even if this requires increasing integration density. Conventionally, when forming the n-channel type MIS-IC, etc., by the ion implantation method with As used as the impurity, as shown in FIG. 1(a), a gate oxide film 4 is formed at a thickness of about 500 .ANG. on a surface portion of a p-type Si substrate 3 having an impurity concentration of about 10.sup.15 atm/cm.sup.3. The gate oxide film 4 is exposed and surrounded by a field isolation oxide film 1 and a p.sup.+ -type channel stopper region 2. A polycrystalline Si gate electrode 5 is formed on the gate oxide film 4 to a thickness of about 3000.about.4000 .ANG.; thereafter arsenic ions (As.sup.+ are implanted with a dosage of about 4.times.10.sup.15 atm/cm.sup.2 at an energy in the range of 100.about.150 KeV, for example 120 KeV, to the surface of the p-type Si substrate 3 through the gate oxide film 4 with the gate electrode 5 used as the mask (where 6' is the As.sup.+ implanting region). FIG. 2 is a graph of an As concentration profile of the As implanting region thus formed. In this figure, the curve shows the concentration of As vs. depth, S is metallurgical solid solubility at 1100.degree. C., EAS is electrically active solubility, SiO.sub.2 denotes a gate oxide film region, and Si denotes a p-type Si substrate region. In the existing method, As is implanted in such amount as is required to obtain the desired low sheet resistance, without particular consideration of the resulting electrically active solubility. Therefore, as shown in FIG. 2, the concentration of As at the peak value is larger than the electrically active solubility. However, in the existing method, As is redistributed by a thermal treatment in succeeding process steps and, as a result, the peak value of the concentration of As is lowered. The substrate is then heated by an electric furnace for about 30 min at a temperature as high as about 1000.degree. C. in a nitrogen (N.sub.2) ambient and is annealed to activate the As.sup.+ implanted region 5. As explained above, As is redistributed in this process. FIG. 1(b) ia a cross-sectional view illustrating the condition after such annealing. In this figure, 6 is the As diffused region (n+-type source/drain region) formed by annealing the As implanting region. As shown in the figure, the implanted As is diffused by the annealing process, so that the As diffused region (source/drain region) 6 is formed to a depth (d) of about 4000 .ANG.. This As diffused region expands laterally by the dimension l (which is almost tantamount to the depth) from the mask end 7 (l is about 3000 .ANG.). For this reason, the existing method has a problem in that the lateral diffusion interferes with high integration density of elements. Moreover, the high temperature-heated annealing method has been accompanied by the problem that the lateral diffusion changes in dimension because the concentration profile of As in the diffused region cannot be controlled strictly, and element characteristics fluctuate due to the change in the length of the channel of the MIS type transistor. An example of a method which has been attempted in order to alleviate the above problems is the shallow formation of a diffused region. In this case, however, the total amount of As in the diffused region runs short and accordingly the desired low sheet resistance value cannot be obtained. Another example of a method which has been conducted is where the ion-implanted impurity is irradiated with an energy beam and is activated without any substantial redistribution of impurity. When redistribution of the impurity does not occur, the impurity does not expand laterally during the annealing process. However, an impurity implanted in such a concentration as to exceed the electrically active solubility is not activated because it is never reduced to a concentration lower than the electrically active solubility by redistribution. Nevertheless, if the ion implantation method is used, such a large amount of impurity must be implanted that the peak concentration exceeds the electrically active solubility, in order to obtain the low sheet resistance which is usually desired in an MIS type semiconductor device.
Share this article A group of Israelis living in Berlin has shocked compatriots back home by urging them to move to Germany as a much cheaper alternative to living in the Jewish state. "It is time to immigrate to Berlin," says the group's Hebrew-language Facebook page entitled "Let's Immigrate to Berlin" which offers practical tips for those seeking an alternative to the high cost of living in Israel. But the page has triggered anger in Israel, where leaving is regarded by many as a form of desertion. And to abandon the biblical land of milk and honey for cheaper dairy products in the birthplace of the Nazi Holocaust has touched a particularly raw nerve. High rents and food costs, particularly that of cottage cheese, an Israeli staple, were among the triggers of a popular protest movement that peaked in 2011 with record numbers of Israelis from all walks of life taking to the streets and squatting in urban tent camps. "The page is organized by a group of Israelis who understand how you feel, who have also suffered from the extreme cost of accommodation and food in Israel," the group's page says. "We help you to fit in and acclimatize in the new city, a place where there are no worries about making ends meet. Where there is no need to choose between buying cottage cheese at the supermarket or sending your daughter to enrichment activities." The site shows what it says is a typical grocery receipt, showing items such as orange juice, milk, dairy desserts, pasta and cheese at prices far lower than the cheapest Israeli discount chain. The existence of the site made the front page of Israeli tabloid Maariv on Monday, provoking the rage of political columnist Ben Caspit. "Let's get into the incomprehensible fact that 75 years after Berlin shook under Nazi boots and...Hitler's SS, it's as if nothing happened," he wrote. "Israelis are flocking back to Berlin. It's hard for them here, in the only Jewish country... They're comfortable in Berlin. Out of all the places in the world, in Berlin." The phenomenon is not a new one. Just a year ago, Finance Minister Yair Lapid, who swept into government on the coattails of the 2011 protests, decried "all the people who are fed up and leaving for Europe." "I have little patience for people who are willing to throw into the garbage the only country the Jews have, because it's more comfortable in Berlin," he posted on Facebook. And Jewish people in Berlin and Germany have faced a rise in anti-Semitism, particularly during Israel's campaign in Gaza this summer. Member comments From our sponsors Iceland may have a population of just over 330,000 people (all with equally unpronounceable names) but that doesn't stop it churning out a stream of globally-renowned people. Take our quiz to discover your Icelandic spirit animal.
What you're watching Elisabeth Hasselbeck has shown her “Great Americain hero” T-shirt twice on “The View.” It’s the one she designed “from my heart and my creativity” and gave to Sen. John McCain’s campaign to help her favorite presidential candidate raise funds. The staunchly conservative co-host says she does not receive any money from the design or the sales. On Wednesday, Walters said on the air that the show’s offices had been inundated with calls and e-mails from viewers complaining about Hasselbeck’s choice of wardrobe. Walters’ comment stirred a lively discussion: Hasselbeck: Really? Well, they must be voting for Obama. I’m so sorry. Sherri Shepherd: It’s very interesting 'cause I saw you in the shirt and I thought, ‘Oh, cute shirt.’ I’ve seen so many celebrities endorse candidates. I’m so used to people wearing T-shirts. Me, myself, I don’t feel like I need to announce with a T-shirt who I’m going to vote for. Hasselbeck: Well, here’s the thing: I actually designed the shirt. I actually sketched it out on a piece of paper and sent it to the campaign, something that came from my heart and my creativity. There’s nothing negative about the shirt. It just says ‘Great Americain hero,’ whether you’re voting for him or not, that’s what he is. I’m not making any money on it. Hasselbeck: Well, on your comedy shows, if you’re against me wearing a shirt, I understand and respect that. But we talk about your shows. You have a political edge on your shows and you promo them here. You could also take that argument to promoting your show. Walters: I think the feeling was that perhaps it was one thing to wear it on [the Hot Topics segment] … but the other point of view was that it was an advertisement that you were wearing throughout the program. Hasselbeck: Look if I sat here buck naked, people would probably see McCain across my chest. That’s who my heart is for. Be that as it may, the four co-hosts were notified by their bosses about how their hearts were feeling about the matter today, according to a statement issued by ABC. “Barbara Walters and Bill Geddie, executive producers of "The View," don’t think it’s appropriate to wear T-shirts endorsing either candidate but would never forbid any of the co-hosts from expressing themselves.”
Just as a heads up for everyone that is following this thread. Within the next couple days we will be changing the main post of this thread (the 1st post) into a table of contents. We feel that this will make it easier for users to find what they're looking for. Also, I'm about 2/3'rds of the way finished with creating a newb friendly tutorial on how to install the AMD/ATI graphic driver on Carolina. We're also getting closer to the release of Carolina-002. Included in 002 will be all of the firmware that was missing in 001, all of the patches that were offered for 001, with the latest versions of Firefox/Thunderbird, the latest version of flash offered for linux, and the latest release of the pup-volume-monitor, along with a few other minor enhancements. Unfortunately, peebee's additions will have to wait until 003. I wanted to add them to 002, but I ran out of time to test them thoroughly. If you've created wallpaper for Carolina, or are creating wallpaper, please submit your final versions by the 17th of October. Here's a wallpaper for Carolina. The original image is from http://www.publicdomainpictures.net so there should be no problem. Edit: Updated with the better logo and added another wallpaper with the "howling carolina". Very nice! EDIT: I want to use these with Carolina-002, perhaps one of them as the default. The only thing I'd suggest is moving the logo up 5 to 10 pixels so that it doesn't interfere with the task-bar. Other than that, I find it very tasteful. Well done! Thanks Elroy, it would be an honour to see these in the next release. I noticed on both my comps, one being a wide screen, that I had to set the style to "stretch" for it to display properly on Saluki or Windows. The logo was either partially under the taskbar or off the side of the screen. Anyway, I did redo them in the original size and the logo higher up. See my original post for the edited wallpapers._________________X-slacko-3b6 with Xfce-4.12.0 - X-slacko-2.3.2 - X-precise-2.4 X-slacko new repoX-precise/X-slacko I have just now checked Carolina's suspend and hibernate options on my Aspire One netbook. Both options don't work. I have not tested on other machines as Saluki 023 can bring the netbook on suspend/ hibernate Hi yerc1, Fortunately I have one of those. Suspend worked for me on both my Aspire and my Toshiba Satellite laptop. Both of my machines have frugal installs on the hard-drive. On the Toshiba, hibernate caused the system to shut-down without saving to the savefile. On my Aspire, I get a message that states - "You must create a swap space large enough to hold the contents of your RAM before you can hibernate". It appears that a very large swap space would be required for this to work correctly. That would be something that is created when the medium is formatted. If you're using a pen-drive, this could also cause the pen-drive to have a much shorter life-span. If you're using a hard-drive, reformatting may not be an option if you have Windows or other things installed you don't wish to lose or have to re-install. EDIT: I booted up Saluki-023 without a savefile on my Aspire one. Suspend did nothing, and hibernate gave me the same warning about needing a larger swap space. I have just now checked Carolina's suspend and hibernate options on my Aspire One netbook. Both options don't work. I have not tested on other machines as Saluki 023 can bring the netbook on suspend/ hibernate Hi yerc1, Fortunately I have one of those. Suspend worked for me on both my Aspire and my Toshiba Satellite laptop. Both of my machines have frugal installs on the hard-drive. It could be something I was doing prior to testing as just now, giving both options another go prove they ARE working on Carolina. I don't usually use these options but it's nice to know they work for when the need arises. I multiboot Carolina and Saluki off the same pendrive and using Swap on the hard drive. By the way, I like seeing Table of Contents in the main post. It makes finding information so much easier. I have noticed on the download site that some of the files are presented as .001, .002, etc. Question Are these files "iterative" or are they "cumulative"? Is there any thought to including a tool such as the "Update" desktop tool that TaZoC has been including in Lighthouse for some time which makes addressing system issues ? Thanks in advance_________________Get ACTIVE Create Circles; Do those good things which benefit people's needs! We are all related ... Its time to show that we know this! 3 Different Puppy Search Engineor use DogPile I have noticed on the download site that some of the files are presented as .001, .002, etc. Question Are these files "iterative" or are they "cumulative"? Is there any thought to including a tool such as the "Update" desktop tool that TaZoC has been including in Lighthouse for some time which makes addressing system issues ? Thanks in advance I can only assume that you're referring to the patch files. Yes, they're cumulative. There's already a tool that you can download (it will be included in carolina-002) that will automatically download and install the necessary patch file. Look at the first post on this thread, under the "Patches" link. Wanted to uninstall some stuff but almost all of the apps in the applications menu are not listed in the remove builtin packages list, same with gnewpet. The builtin_files folder is missing them. Also, Bulk Rename is not in the app menu. I changed Categories=Filesystem to FileSystem (capitol S) in the desktop file and it appeared._________________X-slacko-3b6 with Xfce-4.12.0 - X-slacko-2.3.2 - X-precise-2.4 X-slacko new repoX-precise/X-slacko Wanted to uninstall some stuff but almost all of the apps in the applications menu are not listed in the remove builtin packages list, same with gnewpet. The builtin_files folder is missing them. Also, Bulk Rename is not in the app menu. I changed Categories=Filesystem to FileSystem (capitol S) in the desktop file and it appeared. Those are issues that have been fixed for 002. Both Geoffrey and I were aware of the builtin packages list errors, and those have been corrected for the new release. I noticed the Bulk Rename missing icon earlier today and fixed it for 002. The new release will be available within the next couple days. I apologize for the inconvenience, but the adrive for 001 was highly customized, and it introduced the package list errors. For 002, we went back to using the custom builder to create the adrive, and this provides the necessary files for gnewpet to work correctly. No prob, can manually uninstall if need be, but will probably wait for 002. If I could make a suggestion to make Carolina look a bit nicer (in my opinion anyway), the soothe theme from the repo gives a transparent look to the windows buttons which looks much better than the usual grey.
TWO MEN HAVE been arrested for cutting clamps off cars in Dublin city. Gardaí from Pearse Street arrested and charged the men, who referred to themselves as ‘clamp fairies’. One of the clamps that was cut Source: Gardaí The angle grinder used to cut the clamps Source: Gardaí One of the vehicles parked on the footpath Source: Gardaí The men are said to have removed Dublin City Council clamps from cars in the city centre. Gardaí issued seven fixed charge penalty notices to the owners of vehicles parked on the same footpath in the city. Due to the obstruction other vehicles had to drive on the opposite footpath in order to pass. Comments are closed due to ongoing legal proceedings.
<?php /** * @package deployment * @subpackage orion.roles_and_permissions */ $addPermissionsScript = realpath(dirname(__FILE__) . '/../../../../') . '/alpha/scripts/utils/permissions/addPermissionsAndItems.php'; $addConfig = realpath(dirname(__FILE__)) . '/../../../permissions/partner.0.ini'; passthru("php $addPermissionsScript $addConfig"); $addConfig = realpath(dirname(__FILE__)) . '/../../../permissions/service.rating.rating.ini'; passthru("php $addPermissionsScript $addConfig");
Q: Load balancing IPTABLES POSTROUTING rules I have an interface with 5 IP addresses assigned to it (as virtual adapters) let's call them x1,x2,x3,x4 and x5. Currently I have SNAT POSTROUTING forwarding rules from local source range to specific public ip address. Below is an example for the current rule: -A POSTROUTING -s 10.8.0.0/24 -j SNAT --to-source x1.x1.x1.x1 What I would like to achieve is that new established local connections will be post-routed and assigned to one of the IPs above (x1/x2/x3/x4/x5) randomly / round robin. I tired to look for a solution online but I didn't find any information for how to do so. I am almost certain that it practical. A: iptables has a statistic module, which could be used. It can operate in two modes which are either randomized or deterministic. Here is how your rules could be written with that module. Deterministic version: -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode nth --every 5 --packet 0 -j SNAT --to-source 192.0.2.1 -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode nth --every 4 --packet 0 -j SNAT --to-source 192.0.2.2 -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode nth --every 3 --packet 0 -j SNAT --to-source 192.0.2.3 -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode nth --every 2 --packet 0 -j SNAT --to-source 192.0.2.4 -A POSTROUTING -s 10.8.0.0/24 -j SNAT --to-source 192.0.2.5 Randomized version: -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode random --probability 0.2 -j SNAT --to-source 192.0.2.1 -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode random --probability 0.25 -j SNAT --to-source 192.0.2.2 -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode random --probability 0.3333333333 -j SNAT --to-source 192.0.2.3 -A POSTROUTING -s 10.8.0.0/24 -m statistic --mode random --probability 0.5 -j SNAT --to-source 192.0.2.4 -A POSTROUTING -s 10.8.0.0/24 -j SNAT --to-source 192.0.2.5
[Carcinoma of the penis. Staging]. The two main classifications for staging carcinoma of the penis are the Jackson, which is probably the most commonly employed, and the UICC, TNM. A consistent method of staging penile cancer as been difficult, as there is no standard use of classifications. The ideal system would directly or indirectly predict the natural life expectancy of the host, the malignant potential of the tumor, the extent of the tumor and dictate the response of the tumor to treatment. Currently, using a grading system in addiction to the staging system has not improved correlation with prognosis. Prognosis appears to correlate only with stage at presentation, and the most reliable prognostic indicator of survival is the presence or absence of lymph nodes involvement at presentation.
There is a requirement to bring about further improvement in hair care products and to provide them with further advantageous properties. In particular, there is a need to provide a conditioning complex which can ideally also be used in conjunction with oxidizing agents and surfactant agents. Environmental influences and oxidative hair treatments often lead to impaired combability of both dry and wet hair. Furthermore, gloss and moisture balance are deleteriously affected by the attacked external structure of the keratinic fibers. A further consequence of repeated treatment of keratinic fibers with surfactant and/or oxidative agents is for severe greasiness to return to the keratinic fibers and for there to be a strong tendency towards increased dandruff formation. It is therefore desirable to reduce the side-effects of environmental influences and of oxidative and surfactant hair treatments preferably not only as early as during the oxidative or surfactant hair treatment but also after the oxidative or surfactant hair treatment without impairing the effectiveness of the oxidative or surfactant cosmetic preparation, in particular with regard to color intensity, color fastness, lightening performance or permanent-wave action, and of preventing the keratinic fibers from becoming greasy again and increased dandruff formation. Furthermore, it is also desirable, in the case of a 2-in-1 product, to combine in one application step the oxidative treatment of keratin-containing fibers, in particular human hair, with the application of effective fiber protection from environmental influences, for example UV protection. Furthermore, other desirable features and characteristics of the present invention will become apparent from the subsequent detailed description of the invention and the appended claims, taken in conjunction with the accompanying drawings and this background of the invention.
/* Copyright 2015 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package allocator import ( "testing" "k8s.io/apimachinery/pkg/util/sets" ) func TestAllocate(t *testing.T) { max := 10 m := NewAllocationMap(max, "test") if _, ok, _ := m.AllocateNext(); !ok { t.Fatalf("unexpected error") } if m.count != 1 { t.Errorf("expect to get %d, but got %d", 1, m.count) } if f := m.Free(); f != max-1 { t.Errorf("expect to get %d, but got %d", max-1, f) } } func TestAllocateMax(t *testing.T) { max := 10 m := NewAllocationMap(max, "test") for i := 0; i < max; i++ { if _, ok, _ := m.AllocateNext(); !ok { t.Fatalf("unexpected error") } } if _, ok, _ := m.AllocateNext(); ok { t.Errorf("unexpected success") } if f := m.Free(); f != 0 { t.Errorf("expect to get %d, but got %d", 0, f) } } func TestAllocateError(t *testing.T) { m := NewAllocationMap(10, "test") if ok, _ := m.Allocate(3); !ok { t.Errorf("error allocate offset %v", 3) } if ok, _ := m.Allocate(3); ok { t.Errorf("unexpected success") } } func TestRelease(t *testing.T) { offset := 3 m := NewAllocationMap(10, "test") if ok, _ := m.Allocate(offset); !ok { t.Errorf("error allocate offset %v", offset) } if !m.Has(offset) { t.Errorf("expect offset %v allocated", offset) } if err := m.Release(offset); err != nil { t.Errorf("unexpected error: %v", err) } if m.Has(offset) { t.Errorf("expect offset %v not allocated", offset) } } func TestForEach(t *testing.T) { testCases := []sets.Int{ sets.NewInt(), sets.NewInt(0), sets.NewInt(0, 2, 5, 9), sets.NewInt(0, 1, 2, 3, 4, 5, 6, 7, 8, 9), } for i, tc := range testCases { m := NewAllocationMap(10, "test") for offset := range tc { if ok, _ := m.Allocate(offset); !ok { t.Errorf("[%d] error allocate offset %v", i, offset) } if !m.Has(offset) { t.Errorf("[%d] expect offset %v allocated", i, offset) } } calls := sets.NewInt() m.ForEach(func(i int) { calls.Insert(i) }) if len(calls) != len(tc) { t.Errorf("[%d] expected %d calls, got %d", i, len(tc), len(calls)) } if !calls.Equal(tc) { t.Errorf("[%d] expected calls to equal testcase: %v vs %v", i, calls.List(), tc.List()) } } } func TestSnapshotAndRestore(t *testing.T) { offset := 3 m := NewAllocationMap(10, "test") if ok, _ := m.Allocate(offset); !ok { t.Errorf("error allocate offset %v", offset) } spec, bytes := m.Snapshot() m2 := NewAllocationMap(10, "test") err := m2.Restore(spec, bytes) if err != nil { t.Errorf("unexpected error: %v", err) } if m2.count != 1 { t.Errorf("expect count to %d, but got %d", 0, m.count) } if !m2.Has(offset) { t.Errorf("expect offset %v allocated", offset) } } func TestContiguousAllocation(t *testing.T) { max := 10 m := NewContiguousAllocationMap(max, "test") for i := 0; i < max; i++ { next, ok, _ := m.AllocateNext() if !ok { t.Fatalf("unexpected error") } if next != i { t.Fatalf("expect next to %d, but got %d", i, next) } } if _, ok, _ := m.AllocateNext(); ok { t.Errorf("unexpected success") } }
Jjunction Jjunction is a 2002 Tamil romantic drama film directed by R. S. Ramanathan. The film features Abhinay, Kanishka Sodhi and Aamna Sharif in lead roles, with Vinayak Raj, Venniradai Moorthy, Pandu, Ravi Shanth, R. Aishwarya and Meera Krishnan playing supporting roles. The film, produced by T. N. Janakiraman, had musical score by Bharathwaj and was released on 28 September 2002. Plot Kannan (Abhinay) is a carefree college student and always hangs out with his group of friends. They spent much of their time smoking cigarettes, drinking alcohol, eve teasing the college girls, making fun of the teachers and loitering around the campus after school. Kannan is also a hardcore fan of cinema actress Meera (Kanishka Sodhi). Vinay (Vinayak Raj), the senior student, is a womaniser who spoiled the lives of many girls and ragged Kannan for no particular reason. After initial clashes between Kannan and his classmate Jennifer (Aamna Sharif), they eventually fall in love with each other. Meera is a philanthropist who helps the poor and orphan children whenever she gets a chance. One day, Jennifer won a contest to meet Meera but she gives the opportunity to her lover Kannan. Kannan then spends one day with his favourite actress Meera, Meera is therefore attracted by his friendly approach and humorous speech, thus she befriends him. Kannan realizes that she is a genuine and a very humble person. The young Kannan was motivated by his friends to sleep with Meera. Kannan then openly asks her to have sex with him, Meera takes him in her bedroom and asks him to choose between sex and friendship. Kannan chooses friendship and apologizes to her. One day, the suicide of the college student Bhama (R. Aishwarya) over love-failure distressed the whole college, the culprit of her death is none other than Vinay. Thereafter, Meera falls in love with Kannan and reveals it to Jennifer. When she was a kid, the orphan and homeless Meera begged for food, she had to work hard to become a successful actress. Her only consolation was helping the children of the orphanage who call her "sister", but now she finds a soul mate. Jennifer changes her mind after the talk, she decides to sacrifice her love, thus Jennifer starts hanging out with Kannan's arch-enemy Vinay. Kannan, who is deeply in love with Jennifer, does not understand what is going on. Afterwards, Meera comes to know about Jennifer and Kannan's love and she unites the lovers. Vinay then decides to become a good person whereas Meera pursues her acting career. Cast Abhinay as Kannan Kanishka Sodhi as Meera Aamna Sharif as Jennifer Vinayak Raj as Vinay Venniradai Moorthy as College Principal Pandu as Director Ravi Shanth as Idi Amin R. Aishwarya as Bhama Meera Krishnan as Jennifer's sister-in-law Ramesh as Badri Vincent Roy as Producer Prathyusha R. Neelakantan Rajappa as Rajappa M. S. Bhaskar as Sivalingam Kallukkul Eeram Ramanathan as Director Kovai Senthil as Bhama's father Bava Lakshmanan as Tea Master Baby Sofia as Young Meera Ajay Raj in a special appearance Nanditha Jennifer in a special appearance Chaams as Konal Govindasamy (uncredited) Soundtrack The film score and the soundtrack were composed by film composer Bharathwaj. The soundtrack, released in 2002, features 5 tracks with lyrics written by Piraisoodan, Viveka, Snehan, Newton and Annamalai. Reception Malini Mannath said, "Abhinay gets to play the hero here, and dances, romances and fights without any fuss. The heroines are uncannily alike in appearance, dressing and performance. Pale-faced and anaemic looking, their sole contribution to the film is their willingness to dare and bare" and added, "The script is not very focused, the director not very clear as to what he wants to tell". Reviewer Balaji Balasubramaniam wrote, "Thulluvadho Ilamai's success leads to movies like Jjunction (looks like the director needs a lesson in English spellings too apart from film-making!) which bank solely on glamour and vulgarity to try and recover the obviously low investment". References Category:2002 films Category:Indian films Category:Tamil-language films Category:2000s Tamil-language films Category:2000s romantic drama films Category:Indian romantic drama films Category:Indian teen films Category:Tamil film scores by Bharathwaj Category:Films featuring an item number
Q: How come Google search never gets slower? Doesn't it have to go through the ever increasing amount of data on the internet and then rank? I heard Google creates indexes of pages. Even then, the number of indexes goes with time. Why wouldn't this slow down the search? A: The google indexing and search is run in parallel using a map-reduce algorithm. As the number of pages to index expands, so does the number of computers that google uses for the task. Currently Google handles about 3.5 billion searches per day. A single search uses 1 000 computers in parallel (each computer holds $\frac{1}{1000}$ of the total Google index) and takes on average 0.2 seconds. Servers available for search are always in read-only mode. When the search index gets updated those servers are temporary unavailable for search. Given the current amount of floor-space in its data centres Google has a maximum of about 1.7 million servers. Obviously most of these are devoted to something other than search.
Ossifying fibromyxoid tumor: a study of 6 cases of atypical and malignant variants. Ossifying fibromyxoid tumors (OFMT) of soft parts are rare, slow-growing tumors that have potential for local recurrence and may metastasize. While OFMT originally was considered benign, several cases of malignant OFMT have been documented. There is no universally accepted risk stratification, although this study emphasizes the importance of utilizing histology, immunohistochemistry and FISH in establishing the diagnosis. Herein, we describe six cases of atypical and malignant OFMT with differences in morphologic features, 5 of which display the proposed morphological criteria for malignancy. The patients were mostly male (M=5, F=1) with an age range of 33-69 years. The tumors arose from the extremities (3 cases), the shoulder (1 case), the head and neck area (1 case), and the paraspinal area (1 case). One tumor had high grade and overtly sarcomatous changes, while another invaded the underlying clavicle. Two cases showed cytological atypia and necrosis. Fluorescence in situ hybridization (FISH) detected rearrangement of the PHF1 gene in 5 cases. All cases were positive for EAAT4 and actin by immunohistochemistry, while negative for desmin. Three tumors were immunoreactive for S100 protein. INI-1 immunohistochemical staining was conserved in all but 2 cases in which a mosaic loss of expression was noted. All but two patients are currently alive and free of disease.
the n'th term of -5561, -11725, -17911, -24125, -30373, -36661? -n**3 - 5*n**2 - 6142*n + 587 What is the d'th term of 199950, 201574, 203198? 1624*d + 198326 What is the w'th term of 167, 773, 1387, 2015, 2663, 3337, 4043? w**3 - 2*w**2 + 605*w - 437 What is the s'th term of 406046, 406060, 406074, 406088? 14*s + 406032 What is the u'th term of -181704742, -181704740, -181704738? 2*u - 181704744 What is the i'th term of -317473511, -317473516, -317473523, -317473532, -317473543? -i**2 - 2*i - 317473508 What is the g'th term of 2250, 5261, 10280, 17307, 26342? 1004*g**2 - g + 1247 What is the q'th term of 68761, 139486, 210211, 280936, 351661, 422386? 70725*q - 1964 What is the u'th term of 445464, 445421, 445380, 445341? u**2 - 46*u + 445509 What is the u'th term of 3875, 1348, -5519, -18898, -40961? -362*u**3 + 2*u**2 + u + 4234 What is the j'th term of -25012, -24123, -22642, -20569, -17904, -14647? 296*j**2 + j - 25309 What is the z'th term of 301, 608, 1055, 1678, 2513? 6*z**3 + 34*z**2 + 163*z + 98 What is the c'th term of 22037065, 22037069, 22037073, 22037077, 22037081, 22037085? 4*c + 22037061 What is the j'th term of -408, 1664, 5122, 9966? 693*j**2 - 7*j - 1094 What is the v'th term of 456, 1766, 3946, 6996, 10916? 435*v**2 + 5*v + 16 What is the j'th term of -18957378, -18957371, -18957374, -18957393, -18957434, -18957503? -j**3 + j**2 + 11*j - 18957389 What is the j'th term of 2499474, 2499485, 2499500, 2499519, 2499542, 2499569, 2499600? 2*j**2 + 5*j + 2499467 What is the p'th term of -107426, -215937, -324448? -108511*p + 1085 What is the z'th term of -7340730, -7340783, -7340834, -7340883, -7340930, -7340975? z**2 - 56*z - 7340675 What is the x'th term of 32074, 256310, 864944, 2050174, 4004198, 6919214, 10987420, 16401014? 32033*x**3 + x**2 + 2*x + 38 What is the m'th term of -4627, -6515, -9659, -14059? -628*m**2 - 4*m - 3995 What is the w'th term of -2312, -3354, -4384, -5402? 6*w**2 - 1060*w - 1258 What is the b'th term of 77102, 76896, 76690? -206*b + 77308 What is the t'th term of -28, -331, -1028, -2227, -4036, -6563, -9916? -18*t**3 - 89*t**2 + 90*t - 11 What is the n'th term of 1285631, 2571238, 3856831, 5142410, 6427975, 7713526, 8999063? -7*n**2 + 1285628*n + 10 What is the k'th term of 1050384, 4201514, 9453396, 16806030, 26259416, 37813554, 51468444? 1050376*k**2 + 2*k + 6 What is the w'th term of -7033802, -7033817, -7033832, -7033847, -7033862? -15*w - 7033787 What is the o'th term of -11258, -10823, -10384, -9941, -9494? 2*o**2 + 429*o - 11689 What is the n'th term of -93, -256, -499, -822, -1225, -1708, -2271? -40*n**2 - 43*n - 10 What is the t'th term of -2925825, -2925905, -2925983, -2926059? t**2 - 83*t - 2925743 What is the m'th term of 947, 4006, 9105, 16244, 25423, 36642, 49901? 1020*m**2 - m - 72 What is the u'th term of -180238, -180233, -180224, -180211, -180194? 2*u**2 - u - 180239 What is the y'th term of -2260, -4372, -6478, -8578? 3*y**2 - 2121*y - 142 What is the f'th term of 1400, 11086, 37412, 88700, 173272, 299450, 475556? 1387*f**3 - 2*f**2 - 17*f + 32 What is the f'th term of -30, 33, 136, 297, 534, 865? 3*f**3 + 2*f**2 + 36*f - 71 What is the g'th term of -5100738, -5100674, -5100610, -5100546? 64*g - 5100802 What is the a'th term of 220, 345, 316, 55, -516, -1475, -2900? -13*a**3 + a**2 + 213*a + 19 What is the k'th term of 16807221, 16807228, 16807239, 16807254, 16807273, 16807296? 2*k**2 + k + 16807218 What is the x'th term of 1058, 2337, 4470, 7457, 11298? 427*x**2 - 2*x + 633 What is the m'th term of 9098, 36781, 83054, 147917, 231370, 333413, 454046? 9295*m**2 - 202*m + 5 What is the k'th term of -1011, -1953, -2953, -4041, -5247, -6601? -5*k**3 + k**2 - 910*k - 97 What is the v'th term of -6914, -6463, -5706, -4637, -3250, -1539, 502, 2879? v**3 + 147*v**2 + 3*v - 7065 What is the i'th term of -156805, -153718, -150631? 3087*i - 159892 What is the k'th term of -1950, -1707, -1282, -675, 114? 91*k**2 - 30*k - 2011 What is the y'th term of -6565044, -13130128, -19695214, -26260302, -32825392? -y**2 - 6565081*y + 38 What is the t'th term of 333177, 333036, 332909, 332802, 332721, 332672, 332661, 332694? t**3 + t**2 - 151*t + 333326 What is the f'th term of -449525, -450058, -450591? -533*f - 448992 What is the w'th term of 12108, 52083, 118710, 211989, 331920, 478503, 651738? 13326*w**2 - 3*w - 1215 What is the a'th term of 15070877, 30141754, 45212631, 60283508, 75354385, 90425262? 15070877*a What is the a'th term of 62441152, 62441151, 62441150, 62441149, 62441148, 62441147? -a + 62441153 What is the v'th term of -4323, -4340, -4379, -4440? -11*v**2 + 16*v - 4328 What is the m'th term of 106828, 101092, 95356, 89620? -5736*m + 112564 What is the t'th term of 3906, 6689, 11336, 17847? 932*t**2 - 13*t + 2987 What is the k'th term of 912136, 912157, 912174, 912187, 912196? -2*k**2 + 27*k + 912111 What is the u'th term of -8178, -15862, -23544, -31224, -38902, -46578? u**2 - 7687*u - 492 What is the w'th term of 140797, 563242, 1267391, 2253304, 3521041, 5070662? 10*w**3 + 140792*w**2 - w - 4 What is the j'th term of 4412, 9340, 14282, 19238? 7*j**2 + 4907*j - 502 What is the o'th term of 3496242, 3496245, 3496248, 3496251? 3*o + 3496239 What is the k'th term of 70655818, 70655813, 70655806, 70655797, 70655786? -k**2 - 2*k + 70655821 What is the h'th term of -1129019, -4516060, -10161121, -18064196, -28225279? h**3 - 1129016*h**2 - 4 What is the y'th term of 291431, 291504, 291625, 291794, 292011? 24*y**2 + y + 291406 What is the f'th term of -7446, -15774, -24102, -32430, -40758? -8328*f + 882 What is the v'th term of 10062, 9886, 9710? -176*v + 10238 What is the l'th term of 85430278, 170860567, 256290856? 85430289*l - 11 What is the j'th term of 2445, 4548, 6645, 8742, 10845, 12960, 15093? j**3 - 9*j**2 + 2123*j + 330 What is the c'th term of -77, -1445, -3795, -7127, -11441, -16737, -23015? -491*c**2 + 105*c + 309 What is the p'th term of 13104, 14508, 15910, 17310, 18708? -p**2 + 1407*p + 11698 What is the f'th term of 628730, 1257474, 1886218, 2514962? 628744*f - 14 What is the h'th term of 221276, 221251, 221236, 221237, 221260, 221311, 221396? h**3 - h**2 - 29*h + 221305 What is the d'th term of 15117, 22848, 30579, 38310, 46041? 7731*d + 7386 What is the n'th term of -500635, -500678, -500725, -500776, -500831, -500890, -500953? -2*n**2 - 37*n - 500596 What is the i'th term of 7283, 1471, -4343, -10159, -15977, -21797? -i**2 - 5809*i + 13093 What is the b'th term of -142091034, -142091023, -142091012, -142091001? 11*b - 142091045 What is the f'th term of 5311, 8984, 12657? 3673*f + 1638 What is the v'th term of 6496274, 12992574, 19488874, 25985174? 6496300*v - 26 What is the y'th term of -191163, -382329, -573495, -764661, -955827, -1146993? -191166*y + 3 What is the r'th term of 169535165, 169535172, 169535183, 169535198, 169535217, 169535240? 2*r**2 + r + 169535162 What is the v'th term of -38635, -38556, -38473, -38386, -38295, -38200, -38101? 2*v**2 + 73*v - 38710 What is the o'th term of 83788241, 83788240, 83788241, 83788244, 83788249, 83788256? o**2 - 4*o + 83788244 What is the b'th term of -148217, -296279, -444341? -148062*b - 155 What is the i'th term of -31638, -63044, -94452, -125862, -157274, -188688, -220104? -i**2 - 31403*i - 234 What is the x'th term of -111443668, -111443670, -111443672, -111443674, -111443676, -111443678? -2*x - 111443666 What is the f'th term of 42684, 42836, 42990, 43152, 43328? f**3 - 5*f**2 + 160*f + 42528 What is the l'th term of 319, 1400, 3195, 5704, 8927? 357*l**2 + 10*l - 48 What is the l'th term of -151025, -156920, -162815, -168710, -174605? -5895*l - 145130 What is the a'th term of 429424, 859066, 1288712, 1718362, 2148016, 2577674? 2*a**2 + 429636*a - 214 What is the d'th term of -7104698, -14209358, -21314018, -28418678, -35523338, -42627998? -7104660*d - 38 What is the w'th term of 1478746, 2957635, 4436524, 5915413, 7394302, 8873191? 1478889*w - 143 What is the u'th term of 2907264, 2907258, 2907252, 2907246, 2907240, 2907234? -6*u + 2907270 What is the d'th term of -20703, -83468, -188297, -335190, -524147, -755168, -1028253? -21032*d**2 + 331*d - 2 What is the g'th term of 78393, 156959, 235525, 314091, 392657? 78566*g - 1
Q: Auth0 API + Spring: How to verify user identity from successful Auth0 API response Problem I'm trying to create an app that uses Auth0 SPA + React on the frontend to auth users without ever having to deal with passwords. Then, I'd like to secure any endpoints I create using an Auth server that I'm required to create using the Spring Framework. Just to clarify, the flow would be Frontend -> Auth through Auth0 -> Redirect to users dashboard on frontend -> Make HTTP request to endpoint sending JWT returned from Auth0 -> Endpoint makes request to my Auth Server sending JWT returned from Auth0 -> Auth server either either returns 401 or user object based on JWT -> Endpoint grabs data specific to that user from DB -> Returns data to frontend I've managed to get my frontend to work just fine using the Quickstart Guide that Auth0 provides but I'm having a lot of trouble figuring out how to get my Auth Service to verify the user. I believe I've come to the conclusion that I need to create an "API" on Auth0 and grab an access token and use that to validate the JWT, which in this case is just the access token and not the JWT that my frontend contains. I've also got this part working but there doesn't seem to be a way to know who the user is. When testing this "API", after sending a valid request I am returned { "iss": "https://${username}.auth0.com/", "sub": "${alphanumericCharacters}@clients", "aud": "${ApiIdentifier}", "iat": ${issuedAt}, "exp": ${expiresAt}, "azp": "${alphanumericCharacters}", "gty": "client-credentials" } While it's good to know I'm on the right track I can't seem to figure out what to do with this response to find the user. Expected I expect to be able to identify a specific user after validating an access_token from my Auth Service Code I don't have much code to show but I'll provide what I can from my Auth Service SecurityConfiguration.java @EnableWebSecurity public class SecurityConfiguration extends WebSecurityConfigurerAdapter { @Value("${auth0.audience}") private String audience; @Value("${spring.security.oauth2.resourceserver.jwt.issuer-uri}") private String issuer; @Override public void configure(HttpSecurity httpSecurity) throws Exception { httpSecurity.authorizeRequests() .mvcMatchers("/api/validate") .authenticated() .and() .oauth2ResourceServer() .jwt(); } @Bean JwtDecoder jwtDecoder() { NimbusJwtDecoderJwkSupport jwtDecoder = (NimbusJwtDecoderJwkSupport) JwtDecoders.fromOidcIssuerLocation(issuer); OAuth2TokenValidator<Jwt> audienceValidator = new AudienceValidator(audience); OAuth2TokenValidator<Jwt> withIssuer = JwtValidators.createDefaultWithIssuer(issuer); OAuth2TokenValidator<Jwt> withAudience = new DelegatingOAuth2TokenValidator<>(withIssuer, audienceValidator); jwtDecoder.setJwtValidator(withAudience); return jwtDecoder; } } AudienceValidator.java public class AudienceValidator implements OAuth2TokenValidator<Jwt> { private final String audience; public AudienceValidator(String audience) { this.audience = audience; } public OAuth2TokenValidatorResult validate(Jwt jwt) { OAuth2Error error = new OAuth2Error("invalid_token", "The required audience is missing", null); if (jwt.getAudience().contains(audience)) { return OAuth2TokenValidatorResult.success(); } return OAuth2TokenValidatorResult.failure(error); } } ValidateController.java @RestController @RequestMapping("/api/validate") public class ValidateController { @GetMapping public boolean validate() { return true; // only returns if successfully authed } } A: After reading through the docs I've found my solution. It turns out that I don't need to create an "API" on Auth0 but instead need to use my Applications endspoint(s) from Auth0. Auth0 provides many endpoints based on your account that you can take advantage of from any of your applications (CLI, Server, Client, etc.) as long as you can: Make an HTTP Request Provide credentials So the way to get a users information is explained here. Data flow Using my projects auth/data flow it's pretty much: Using @auth0/auth0-spa-js on the frontend, you can grab a users access token after a successful auth by using the getTokenSilently() method. Send up HTTP request to your Rest Service Rest Service sends that token to your Auth Service Auth Service sends GET request to https://myAuth0Username.auth0.com/userinfo with the Authorization: Bearer ${access_token} header. Example If successfully authed from Auth0 Returns your users information such as "name", "email", etc. Else Returns a 403 Forbidden HTTP Status Auth Service then returns user object to Rest Service Rest Service then does necessary logic for that endpoint (DB query, another HTTP request, etc.) Example Auth Service endpoint to validate tokens and return a user ValidateController.java package x.SpringTodo_Auth.Controllers; import x.SpringTodo_Auth.Models.User; import org.springframework.http.HttpEntity; import org.springframework.http.HttpHeaders; import org.springframework.http.HttpMethod; import org.springframework.web.bind.annotation.GetMapping; import org.springframework.web.bind.annotation.RequestMapping; import org.springframework.web.bind.annotation.RestController; import org.springframework.web.client.RestTemplate; @RestController @RequestMapping("/api/validate") public class ValidateController { @GetMapping public Object validate() { // Create and set the "Authorization" header before sending HTTP request HttpHeaders headers = new HttpHeaders(); headers.set("Authorization", "Bearer " + access_token); HttpEntity<String> entity = new HttpEntity<>("headers", headers); // Use the "RestTemplate" API provided by Spring to make the HTTP request RestTemplate restTemplate = new RestTemplate(); Object user = restTemplate.exchange("https://myAuth0Username.auth0.com/userinfo", HttpMethod.POST, entity, User.class); return user; } } User.java (This is the class passed to the restTemplate.exchange(...) method as the last argument package x.SpringTodo_Auth.Models; public class User { private String sub; private String given_name; private String family_name; private String nickname; private String name; private String picture; private String locale; private String updated_at; private String email; private boolean email_verified; // Getters/setters (or you can use Lombok) }
Analytical fractional PID controller design based on Bode's ideal transfer function plus time delay. In this paper, a fractional order PID controller cascaded with a fractional filter is proposed for higher order processes. In this analytical design methodology, one or two reduced fractional orders plus time delay models are used to represent higher order system transfer functions. The controller parameters are determined so as to meet certain frequency domain specifications. A unity feedback reference model is employed where Bode's ideal loop transfer function plus time delay of the fractional order model is placed in the forward path. The addition of this time delay provides the exact determination of frequency domain specifications if the system either intrinsically owns a time delay or a time delay is injected by its reduced order model. The proposed methodology is compared with two other related methodologies and it has been observed that the proposed controller performs much better than the others. Moreover, some empirical formulas for time domain characteristics of the reference model are numerically derived in terms of certain frequency domain specifications and time delay of the fractional reduced order model. The accuracy of these formulas is tested by simulations. The iso-damping, noise attenuation and load disturbance suppression performances of the proposed controller are also considered and compared with those of other related controllers.
Zaherite Zaherite is a mineral, a complex sulfate of aluminium, formula Al12(OH)26(SO4)5·20H2O. It was discovered in the Salt range, Punjab, Pakistan by M. A. Zaher of the Bangladesh Geological Survey after whom it is named in 1977. This mineral would be extremely soluble in water and unlikely to persist anywhere except in the most arid of environments. It spontaneously, and reversibly dehydrates around room temperature. Its color is white to blue-green. See also List of minerals List of minerals named after people References Webmineral data Mindat.org Category:Aluminium minerals Category:Sulfate minerals Category:Triclinic minerals
Jelle van Kruijssen Jelle van Kruijssen (born 3 July 1989) is a Dutch footballer who plays as a striker for Berchem Sport. Playing career Van Kruijssen spent his youth at amateur sides, UNA and DVS, but transferred to the Willem II youth team as a teenager. He did not break through to the first team, resulting in a transfer to FC Eindhoven together with fellow Willem II player, Ratko Vansimpsen. Van Kruijssen made his first team debut on 27 August 2010, replacing Vansimpsen 83 minutes into a 3–0 victory over Fortuna Sittard at Jan Louwers Stadion. In 2013, van Kruijssen was sent on a summer loan to the USL Premier Development League team, Houston Dutch Lions. He made his debut on May 11, 2013 against Laredo Heat where he scored. References External links VI Profile Category:1989 births Category:Living people Category:Sportspeople from Eindhoven Category:Dutch footballers Category:Association football forwards Category:FC Eindhoven players Category:Eerste Divisie players Category:K. Berchem Sport players
Holiday shoppers increasingly turned to Google Maps in the countdown to Christmas Day Columnist Andy Taylor from Merkle shares data on how consumers engaged with Maps and Local Inventory Ads over the holiday shopping period. Ahead of the 2017 holiday season, I wrote a column detailing how much more important locally focused ads became during the 2016 holiday shopping season, namely Local Inventory Ads and ads on Google Maps. Analyzing last year’s data, I found that searchers became increasingly likely to search for both brand and non-brand keywords within Google Maps as the number of days before Christmas shrank, and the share of traffic coming from ads featured in Google Maps likewise rose. Taking a look at the most recent holiday period, we find that searchers once again turned to navigational apps in the lead-up to December 25 to find store information for last-minute purchases. This led to the highest one-day share of traffic ever coming from Google Maps ads. Google Maps phone traffic for brand keywords spikes The device type with the biggest share of traffic coming from the “Get location details” click type (which comes from Google Maps ads) is naturally phones, given the high rate of navigational app use. Looking at brand text ads, which are seeing a much higher share of traffic from Maps ads than are non-brand keywords, we find that phone share reached 13 percent on both December 23 and 24. This is the highest share ever observed across the sample studied, and some brick-and-mortar advertisers saw as high as 20 percent of all brand phone traffic come from “Get location details” on Christmas Eve. There was a similar spike on the last two days before Christmas for non-brand keywords, though “Get location details” phone traffic share topped out at 4 percent for these keywords. The last two days before Christmas are a crucial period of last-minute purchases for many brick-and-mortar retailers, and searchers are increasingly finding their way in-store via searches in navigational apps. Google is monetizing this traffic via location extensions, and advertisers’ ads are automatically opted into showing in Maps for any keyword campaigns which have active location extensions. Further, this traffic is defined as coming from google.com, and no AdWords search campaign can exclude google.com from targeting. Given that most brick-and-mortar advertisers deploy active location extensions as a best practice, most marketers don’t necessarily have to do anything to take advantage of this traffic. However, there are some performance differences to be aware of when compared to other ad traffic. Mobile Maps traffic more expensive than other search traffic Comparing “Get location details”’ brand CPC to other click types for the median brick-and-mortar advertiser during the holiday season, we find that these clicks produced a 30 percent higher CPC on phone and 83 percent higher on tablet, while actually proving 15 percent less expensive on desktop. The same directional trends were observed for non-brand keywords, though the difference was more modest on phones and tablets, while on desktop, “Get location details” clicks were less than half as expensive as other clicks. Unfortunately, there’s no way for advertisers to adjust bids for Google Maps traffic relative to other click types, and bids should be set based on the overall expected value of all click types a keyword is garnering. However, the expected value of Google Maps ads is naturally tied much more to in-store purchases than online conversions. Online conversion rate significantly lower for Maps ads than for other search traffic Looking at single-device conversion rate, “Get location details” clicks convert at just about one-quarter the rate of other click types across all three device types for brand keywords. On the non-brand side, relative conversion rate is even worse for desktop and tablet devices but actually comes in a bit closer on phones. With these differences, online conversion rate for a particular campaign or keyword might decline with the rise in Maps traffic, especially on key days like Christmas Eve. Thus, it’s important to have some measure of the offline impact of these clicks. Fortunately for advertisers making use of Google store visit tracking, click type reports can include store visit data. For one of the brick-and-mortar advertisers from our “Get location details” sample, these clicks produced 13 times more store visits than online conversions during the period studied! However, not all brick-and-mortar advertisers can take advantage of Google store visit tracking, as there are some requirements for eligibility. Brands that don’t meet the specifications below should talk to their agency or Google rep to explore available in-store tracking options. Adequately valuing the in-store impact of ads will give advertisers a more complete view into how Maps ads are helping to drive sales. Conclusion Google’s efforts to monetize Maps traffic are clearly starting to shift the makeup of traffic for brick-and-mortar brands, especially on key in-store shopping days like Christmas Eve. As such, it’s becoming increasingly important for AdWords campaigns to have active location extensions in order to take advantage of navigational searches. However, the online value of these ads is not equal to that of other search ads, since navigational app searchers are naturally looking to find directions to a physical store location. Thus, tracking the offline impact of these ads, or at least applying some sensible estimate of offline impact to expected value for the purposes of bidding, is becoming increasingly necessary with the rise of “Get location details” clicks. This will continue to be the case for brick-and-mortar brands over the course of 2018. Opinions expressed in this article are those of the guest author and not necessarily Search Engine Land. Staff authors are listed here. About The Author Andy Taylor is Associate Director of Research at Merkle, responsible for analyzing trends across the digital marketing spectrum for best practices and industry commentary. A primary contributor to the Merkle Blog, Dossier, and quarterly Digital Marketing Report, he speaks frequently at industry conferences and events.
{ "translations":{ "ACTIVE":"啟動", "AUTOREBOOT":"重新開機", "Automatic installation of security updates. Keep your cloud safe":"自動安裝安全", "unattended-upgrades":"自動更新安全更新" } }
Wing IDE 2.0rc1 Released: October 12, 2004 We're pleased to announce Wing IDE 2.0rc1, the first release candidate for Wing IDE 2.0. This version is available on Windows, Linux, and Mac OS X. This release includes over 170 bug fixes and improvements since version 2.0b5. New features include optimized startup time, editor operations, and source browser, support for Asian text encodings (those in CJKCodecs modules), extended support for auto-completion in builtin and standard library extension modules, improved keyboard navigability, many editor improvements, and much more. This is a candidate for release as 2.0 final. Testing will continue for several weeks to ensure the highest possible quality for the final release.
The title of this minireview is inspired by the work of the Japanese artist Yayoi Kusama, who paints wonderful networks as one of her favorite subjects. As an artist, she can evoke images and concepts that are sometimes beyond her own knowledge: in this case her idea of a continuous network well suits a model of intercellular cytoskeletal linking suggested by a recent paper published in *BMC Biology*by Millan *et al.*\[[@B1]\]. Working with cultured human umbilical cord vein endothelial cells they find that actin-based stress fibers in adjacent endothelial cells in confluent culture can become linked through adherens junctions. This organization could, in theory, enable a communication network extending throughout the endothelium, as well as maintaining structural coherence and increasing resistance to stress. This capacity could be crucial to the function and adaptability of the endothelium, which is continuously exposed to changes in blood flow, whether in normal physiologic situations, or during inflammation or angiogenesis. This is a novel extension of a concept first used for epithelial sheets \[[@B2]\] to endothelial monolayers. The adherens junction ===================== The intercellular junctions between endothelial cells maintain endothelial integrity, controlling the movement of solutes between bloodstream and tissues, and the flow of white blood cells between blood and tissues, especially at sites of infection and inflammation. Adherens junctions both mediate adhesion between cells and support the local concentration of scaffolding and signaling molecules. This enables molecular interactions that otherwise would not take place and the segregation of signaling molecules for specific regulation (for a general description of the organization of cell-cell contacts in endothelial cells see \[[@B3]\]). Adherens junctions are based on the transmembrane adhesive receptor that belongs to the cadherin family and a notable and specific feature of the endothelial junctions is the presence of the tissue-specific vascular endothelial (VE)-cadherin. VE-cadherin is constitutively linked through its cytoplasmic tail directly to β- or γ-catenin (plakoglobin) or the catenin p120, and indirectly to α-catenin via β- or γ-catenin. From studies in epithelial and endothelial cells, the conventional view of adherens junctions is that they link through the catenin complex to cortical actin filaments that lie parallel to the cell surface. In their confluent endothelial cell cultures, however, Millan *et al*. \[[@B1]\] found an additional type of adherens junction organization. They found that staining for junctional components such as VE-cadherin revealed lines of staining running in from the cell surface rather than lying parallel to the cell surface as in conventional adherens junction complexes. The authors call these novel junctions \'discontinuous adherens junctions\' to distinguish them from those more familiar from epithelial cells. Further staining for VE-cadherin and actin revealed that actin stress fibers running perpendicular to the cell surface were associated with these discontinuous adherens junctions (Figure [1](#F1){ref-type="fig"}). ![**Structural and functional actin filament organization at cell-cell junctions in endothelial cells**. In quiescent cells, junctional actin filaments can be oriented either parallel (left-hand image) or perpendicular (center image) to the cell surface. A question mark indicates that it is not known whether these two types of arrangement can interchange, or whether the perpendicular arrangement must arise *de novo*. Actomyosin stress fibers are anchored to the membrane through adherens junctions \[[@B1]\]. VE-cadherin is required, but the stress fibers are not directly linked to the cadherin-catenin complex. They are possibly tethered to adherens junctions by afadin or other, still unidentified molecules (see Figure 2, and text for details). Subdomains with perpendicular actin fibers, called \'discontinuous adherens junctions\' in \[[@B1]\], are dynamic, and undergo constant reorganization. In these areas, actin fibers of adjoining cells are connected through adherens junctions into a supercellular network \[[@B1]\]. In quiescent endothelial cells, actin stress fibers are polymerized through the action of Rac and Rho, Rho signaling through the actin nucleator Dia (diaphanous-related formin) \[[@B7]\]. Various stimuli activate the endothelium and induce actomyosin contraction at the dynamic domains (right-hand image), with Rho signaling through the protein kinase ROCK \[[@B7]\], and resulting in the opening of intercellular gaps, making the endothelium permeable to fluid and molecules, and facilitating the transmigration of leukocytes. In activated conditions, adherens junctions are also functionally and structurally modified (indicated by the change of the junctional symbol to blue). The molecular details of such alterations are still incompletely understood. The association of actin with adherens junctions is also likely to be modified. It remains to be defined at which molecules/structures (indicated by question marks) anchor the actin fibers at the ends that are not interacting with the adherens junction. This anchoring is critical to allow productive contraction.](jbiol232-1){#F1} Local regulation of actin by adherens junctions in endothelial cells ==================================================================== At early phases of junction formation, actin filaments organize perpendicularly to the membrane through the local accumulation of actin-nucleating complexes \[[@B4]\]. Further stages of junction maturation are accompanied by the development of actin fibers parallel to the membrane to form a peripheral actin rim (\[[@B5]\] and references therein). It is not clear at present whether the perpendicular actin fibers described by Millan *et al.*\[[@B1]\] are residual early fibers or derive by *de novo*organization. Actin reorganization at cell-cell junctions proceeds through the action of several regulators that concentrate locally (Figure [2](#F2){ref-type="fig"}). ![**Schematic representation of some signaling networks that control the formation of actin stress fibers at adherens junctions in endothelial cells**. VE-cadherin can directly or indirectly recruit regulators of actin polymerization, among which is the small GTPase Rac as well as regulators of Rac and Rho. Regulators include Rac activators, such as the small GPTPase Rap1 (linked through CCM1 and β-catenin) and its guanine-exchange factor, PDZ-GEF (linked through MAGI and β-catenin), the Rac guanine-exchange factor Tiam (through the local activation of phosphoinositide 3-kinase (PI3K), and Vav2. Tiam and Rac can be localized at junctions also through the Par polarity complex (not shown in the figure) \[[@B17]\]. Rho inhibitors include CCM2 (linked through CCM1 and β-catenin and down-regulating Rho activity through a still poorly defined mechanism) and p190RhoGAP (linked through p120). Rap1 can convey signals from cAMP, through its GEF, Epac \[[@B8]\]. Therefore, local clustering of VE-cadherin as well as regulation of the association of β-catenin and p120 to VE-cadherin appears crucial to the assembly of a molecular unit controlling actin polymerization and contraction at junctions. Pharmacological tools to modulate this complex might be of therapeutic relevance.](jbiol232-2){#F2} A crucial molecule in the organization of actin at the adherens junctions is α-catenin. The molecular features of the relationship between α-catenin and actin have been profoundly revised in recent years (reviewed in \[[@B6]\]). Instead of a \'simple\' bridge between junctional cadherin and the actin microfilament cytoskeleton, α-catenin is now considered to act as a regulator of actin polymerization. For allosteric reasons α-catenin cannot bind at the same time to β-catenin and actin filaments. Dimeric α-catenin binds with high affinity to actin filaments, and inhibiting Arp2/3 activity suppresses actin branching. In addition, dimeric α-catenin promotes the formation of linear actin cables by activating formin (Figure [2](#F2){ref-type="fig"}; \[[@B6]\] and references therein). If α-catenin is not the tether between VE-cadherin and actin, which junctional components might be? This is not known at present. Afadin, a cytoplasmic molecule localized at adherens junctions bound to the nectin adhesive receptors, can anchor actin to the plasma membrane and could contribute to the stabilization of the peripheral actin rim \[[@B5],[@B6]\]. Which other junctional components might tether actin filaments to adherens junctions remains to be determined. In addition, β-catenin has an important role in regulating the behavior of actin. Small GTPases of the Rho family that have crucial effects on the control of actin polymerization \[[@B4]\] and on the contractility of actomyosin are recruited and regulated at adherens junctions through β-catenin (Figure [2](#F2){ref-type="fig"}; see \[[@B7]\] for a comprehensive review of the roles of these GTPases in epithelial cells). Remodeling or *de novo*polymerization of actin filaments can be controlled by the GTPases Rac and Rho, while Rho also affects the contractility of actomyosin, the complex of actin and myosin that makes up the contractile stress fibers. Rac signaling at adherens junctions is likely to be downstream of the small GTPase Rap1 \[[@B8]\], which in endothelial cells can be localized at adherens junctions in a complex with VE-cadherin through CCM1 and β-catenin \[[@B9]\]. In addition, Rap1 can be activated at junctions by PDZ-GEF, recruited locally by the protein MAGI, which is linked to VE-cadherin through β-catenin \[[@B10]\]. Rap1 can also convey signals from cAMP, through its guanine nucleotide exchange factor (GEF) Epac, to stabilize the barrier properties of the endothelium both *in vitro*and *in vivo*\[[@B8]\]. Exaggerated actomyosin contractility has been proposed to be detrimental to the correct function of the endothelium as a barrier to the passage of cells and molecules. This idea is supported by the fact that to maintain junctional stability in the endothelium, the activity of Rho has to be restricted. The specific Rho inhibitor p190Rho-GAP is required in endothelial cells to maintain endothelial integrity and endothelial barrier function. In this case p120 catenin acts as scaffold \[[@B11]\]. Cerebral cavernous malformation protein 2 (CCM2) also inhibits Rho activity \[[@B12]\]. CCM2 is one component of the CCM complex that comprises also CCM1 and CCM3 (Figure [2](#F2){ref-type="fig"}). Mutation of any of these three molecules can cause the human pathological condition cerebral cavernous malformation. These vascular abnormalities of the brain are fragile and leaky and can cause hemorrhagic stroke and neurological symptoms \[[@B13]\]. Drugs that inhibit Rho, such as simvastatin, have proved effective in correcting increased vascular permeability in mice with a heterozygous mutation of CCM2 \[[@B12]\]. It remains to be defined how all these molecular actors can be regulated locally to create the different domains of junctional actin reported by Millan *et al.*\[[@B1]\]. Finally, to set the observations reported by Millan *et al*. \[[@B1]\] in a physiological context, an appreciation of the correspondence between *in vitro*models of endothelial cells and the endothelium *in vivo*is important. Adherens junctions and stress fibers are readily observed in endothelial cells *in vitro*. Adherens junctions are present in the endothelium of all types of blood vessels *in vivo*as observed by *in situ*immunofluorescence and immunoelectron microscopy for junction-specific molecules \[[@B14]\]. Reports on the organization of actin in the endothelium *in vivo*are, however, very limited and somewhat controversial \[[@B15],[@B16]\]. While suggesting that actin stress fibers can be observed *in vivo*in endothelial cells, the available data indicate that great care is needed in interpreting the arrangement of actin and its molecular regulation by adherens junctions *in vivo*both in resting and activated endothelium. Nevertheless, endothelial adherens junctions seem to be equipped with the molecular components to regulate actin polymerization and actomyosin contraction. The results of Millan *et al.*\[[@B1]\] suggest that local tuning of the actin cytoskeleton at adherens junction subdomains could allow endothelial cells in the monolayer to behave as a functional unit, withstanding the stress of continuous changes in blood flow that take place in the organism and also locally restricting the stress of junctional and actin rearrangements that occur during inflammation, leukocyte transmigration and angiogenic responses.
Richard Baggs Richard Baggs (born 19 November 1974) was an English cricketer. He was a left-handed batsman and a right-arm medium-fast bowler who played for Devon. He was born in Eastbourne, Sussex. Baggs, who played a single match for Hampshire Second XI in 1994, played with Devon between 1995 and 2001. He made two NatWest Trophy appearances for the side, the first in 1997, against Leicestershire, in which he scored 5 runs, and his second in 1999, against Worcestershire, in which he scored 18 runs. External links Richard Baggs at CricketArchive Category:1974 births Category:Living people Category:English cricketers Category:Devon cricketers
A Pakistani businessman charged with triple murder has been denied bail by a High Court in Durban, South Africa, on the grounds that he was a "flight risk". Wassim Haider Agha, 45, is accused of masterminding the execution-style killing of his pregnant wife, Anisa Sukan, their eight-month-old daughter Zil and Anisa's father, Anand Sukan in Wesrville in March. Agha is alleged to have hired his former employee, Bonginkosi Ndlovu, to carry out the killings. High Court judge Herbert Msimang on Sunday upheld a Durban magistrate's decision to deny bail to Agha on the ground that he was a "flight risk." Agha, who reportedly stands to gain over Rand 20 million (nearly Rs 16 crore) in life insurance policies taken out in favour of his slain wife and child, had reportedly put in a written claim for the money shortly before his arrest at Durban's International Airport in July. Haider, who will remain in custody for another four months as his trial begins in February, is also charged with stealing diamonds valued at Rand 500,000, or over Rs 37 lakhs.
"RuPaul's Drag Race" contestant Antoine Ashley, better known to fans as Sahara Davenport, has died. He was 27 years old. The cause of death is unknown at this time, but those closest to the classically trained dancer have expressed their sadness at his passing. Ashley competed on the second season of "RuPaul's Drag Race" and his boyfriend, Karl Westerberg, competed on the show's third season. RuPaul also tweeted his condolences, saying, "Shocked & heartbroken over @SaharaDavenport. Never occurred to me that we'd ever lose one of my girls. I see them as immortal." Logo, the network that airs "RuPaul's Drag Race," released a statement on its official Facebook page about the loss of Ashley. "Logo is profoundly saddened by the passing of Antoine Ashley who fans around the world knew and loved as Sahara Davenport," the statement reads. "He was an amazing artist and entertainer who'll be deeply missed by his Logo family. Our hearts and prayers go out to his family, especially his boyfriend Karl, in their time of need." GLAAD also released a comment about the 27-year-old's death. "In addition to being a talented performer, we also remember the great work of Antoine Ashley, known to many fans as Sahara Davenport, in support of LGBT youth organizations and GLAAD," GLAAD spokesperson Rich Ferraro says in a statement. "This is a saddening loss and our thoughts are with Sahara's friends, partner and family."
/** * __ ____ * / /__ _ __ / __/ __ * / //_/(_)/ /_ / / ___ ____ ___ __ __ / /_ * / ,< / // __/_\ \ / _ \ / __// _ \/ // // __/ * /_/|_|/_/ \__//___// .__//_/ \___/\_,_/ \__/ * /_/ github.com/KitSprout * * @file stm32f4xx_bsp.c * @author KitSprout * @date 22-Apr-2018 * @brief * */ /* Includes --------------------------------------------------------------------------------*/ #include "drivers\stm32f4_system.h" #include "drivers\stm32f4_adc.h" #include "drivers\stm32f4_tim.h" #include "modules\serial.h" #include "modules\kSerial.h" #include "stm32f4xx_bsp.h" /** @addtogroup STM32_Program * @{ */ /* Define ----------------------------------------------------------------------------------*/ /* Macro -----------------------------------------------------------------------------------*/ /* Typedef ---------------------------------------------------------------------------------*/ /* Variables -------------------------------------------------------------------------------*/ /* Prototypes ------------------------------------------------------------------------------*/ void HW_BoardInformation( void ); /* Functions -------------------------------------------------------------------------------*/ void bsp_gpio_init( void ) { GPIO_InitTypeDef GPIO_InitStruct; HAL_Init(); /* Enable all GPIO Clk *******************************************************/ __HAL_RCC_GPIOA_CLK_ENABLE(); __HAL_RCC_GPIOB_CLK_ENABLE(); __HAL_RCC_GPIOC_CLK_ENABLE(); __HAL_RCC_GPIOD_CLK_ENABLE(); /* GPIO all analog input *****************************************************/ GPIO_InitStruct.Mode = GPIO_MODE_ANALOG; GPIO_InitStruct.Pull = GPIO_NOPULL; GPIO_InitStruct.Speed = GPIO_SPEED_HIGH; HAL_GPIO_Init(GPIOB, &GPIO_InitStruct); HAL_GPIO_Init(GPIOC, &GPIO_InitStruct); HAL_GPIO_Init(GPIOD, &GPIO_InitStruct); GPIO_InitStruct.Pin = GPIO_PIN_All & (~(GPIO_PIN_13 | GPIO_PIN_14)); HAL_GPIO_Init(GPIOA, &GPIO_InitStruct); /* GPIO Pin ******************************************************************/ GPIO_InitStruct.Mode = GPIO_MODE_OUTPUT_PP; GPIO_InitStruct.Pull = GPIO_PULLUP; GPIO_InitStruct.Speed = GPIO_SPEED_HIGH; GPIO_InitStruct.Pin = LED_R_PIN; HAL_GPIO_Init(LED_R_GPIO_PORT, &GPIO_InitStruct); GPIO_InitStruct.Pin = LED_G_PIN; HAL_GPIO_Init(LED_G_GPIO_PORT, &GPIO_InitStruct); GPIO_InitStruct.Pin = LED_B_PIN; HAL_GPIO_Init(LED_B_GPIO_PORT, &GPIO_InitStruct); LED_R_Off(); LED_G_Off(); LED_B_Off(); } void bsp_adc_init( void ) { ADC_Config(); } void bsp_timer_init( pFunc event, uint32_t freq ) { hTimer10.tickEventCallback = event; Timer10_Config(TIMx_CLOCK(freq, 1000), 1000); } void bsp_timer_enable( uint32_t state ) { Timer10_Cmd(state); } void bsp_uart_serial_init( pFunc event ) { hSerial.rxEventCallback = event; Serial_Config(); HW_BoardInformation(); printf("\r\nHello World!\r\n\r\n"); } /*************************************** END OF FILE ****************************************/
/* * e-emoticon-tool-button.h * * Copyright (C) 2008 Novell, Inc. * Copyright (C) 2012 Dan Vrátil <dvratil@redhat.com> * * This program is free software; you can redistribute it and/or * modify it under the terms of version 2 of the GNU Lesser General Public * License as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this program; if not, write to the * Free Software Foundation, Inc., 59 Temple Place - Suite 330, * Boston, MA 02111-1307, USA. */ #if !defined (__E_UTIL_H_INSIDE__) && !defined (LIBEUTIL_COMPILATION) #error "Only <e-util/e-util.h> should be included directly." #endif #ifndef E_EMOTICON_TOOL_BUTTON_H #define E_EMOTICON_TOOL_BUTTON_H #include <gtk/gtk.h> /* Standard GObject macros */ #define E_TYPE_EMOTICON_TOOL_BUTTON \ (e_emoticon_tool_button_get_type ()) #define E_EMOTICON_TOOL_BUTTON(obj) \ (G_TYPE_CHECK_INSTANCE_CAST \ ((obj), E_TYPE_EMOTICON_TOOL_BUTTON, EEmoticonToolButton)) #define E_EMOTICON_TOOL_BUTTON_CLASS(cls) \ (G_TYPE_CHECK_CLASS_CAST \ ((cls), E_TYPE_EMOTICON_TOOL_BUTTON, EEmoticonToolButtonClass)) #define E_IS_EMOTICON_TOOL_BUTTON(obj) \ (G_TYPE_CHECK_INSTANCE_TYPE \ ((obj), E_TYPE_EMOTICON_TOOL_BUTTON)) #define E_IS_EMOTICON_TOOL_BUTTON_CLASS(cls) \ (G_TYPE_CHECK_CLASS_TYPE \ ((cls), E_TYPE_EMOTICON_TOOL_BUTTON)) #define E_EMOTICON_TOOL_BUTTON_GET_CLASS(obj) \ (G_TYPE_INSTANCE_GET_CLASS \ ((obj), E_TYPE_EMOTICON_TOOL_BUTTON, EEmoticonToolButtonClass)) G_BEGIN_DECLS typedef struct _EEmoticonToolButton EEmoticonToolButton; typedef struct _EEmoticonToolButtonClass EEmoticonToolButtonClass; typedef struct _EEmoticonToolButtonPrivate EEmoticonToolButtonPrivate; struct _EEmoticonToolButton { GtkToggleToolButton parent; EEmoticonToolButtonPrivate *priv; }; struct _EEmoticonToolButtonClass { GtkToggleToolButtonClass parent_class; void (*popup) (EEmoticonToolButton *button); void (*popdown) (EEmoticonToolButton *button); }; GType e_emoticon_tool_button_get_type (void) G_GNUC_CONST; GtkToolItem * e_emoticon_tool_button_new (void); void e_emoticon_tool_button_popup (EEmoticonToolButton *button); void e_emoticon_tool_button_popdown (EEmoticonToolButton *button); G_END_DECLS #endif /* E_EMOTICON_TOOL_BUTTON_H */
Pages Tuesday, December 1, 2009 The Austin Chronicles: The Game The Austin Chronicles are an ongoing series about a California gal (me) who decided that Texas during the Bush Administration would be the best place to get a graduate degree in Women's Studies. I learned much more living in Texas than I did in school. When last we left our intrepid bowtied Californian in Texas I had successfully negotiated geeks, robots and Texas-specific beer - I had quite a a lot more to learn... I had barely worked up a tolerance for Lone Star before the phone rang again. "Hi, can you work The Game on Saturday?" "Sure! What game?" "THEE Game." "Um, yeah, what game would that be?" "The FOOTBALL Game." "Oh, right...um, which football game?" "The U.T. FOOTBALL Game." "Ohhhhhhhhhhh....that game." Here's the deal. I know jack-squat about football. Sure, I grew up in a small town in California where the only thing to do on Friday nights was go to the high school football game. After five years of attending, I finally asked my friend why the referees kept throwing their hankies on the ground. I was informed that they were not hankies, they were penalty flags. My bad. But, my apathy for learning how many "downs" need to be completed and why they are being attempted in the first place and why a touchdown isn't enough and why you have to install giant tuning forks in the end of the field so the little guy can get one more point, isn't just because I think it is boring. I don't just not like football, I am opposed to it on principle. In fact, I'm kind of against most organized sports - not the sports themselves because teamwork and exercise is good and all that - but the extent to which they are an obsession, a marketable, profit-driven, exploitative obsession. Lots of organized sports often require people to push their bodies beyond the limit, resulting in "career-ending" injuries at 17, but the whole point of football is to throw your body weight against other people that are doing the same thing - that is just not a good idea. And how can we talk about "career ending injuries" when the majority of people playing won't be able to make a career out of it? And don't get me started on the billions of dollars that are pumped into everything from Pop Warner to the NFL. Oh sure, football generates income, but it also diverts it and a whole crap load of energy. Just imagine if we had "boosters" for the science-fair, drama department and Model UN. Or if all of that scholarship and sponsorship money went to preschools and preparing kids for college or apprenticeships to actually learn things that will allow them to have a successful career for more than a decade or two? A career that won't lead to early onset senility. Oh, and it remains one of the few sports where girls aren't allowed - unless they fight really hard to be able to kick the ball between the tuning forks. I'll stop there for now... But, in Texas, saying you hate football is like attending a PETA convention and saying you enjoy clubbing baby seals on the weekend. At first, people think they might have heard you wrong. Then, they move past the sheer confusion to raging anger and some finally arrive at mournful pity over your inability to function with the moral parameters of society (though they might be totally cool with it if you do it naked...and have boobs). So when I arrived in Austin, it was a little like arriving on Mars, and not just because folks talked a little funny. Thanks to football, the color was a bit similar, too. I was the editor of the art and literary magazine in high school (we could have really used a booster club). I was very familiar with burnt ochre and burnt umber, but burnt orange? In Austin, it's not just burnt orange t-shirts and giant foam fingers and bumper stickers. Its burnt orange clothing, burnt orange furniture, burnt orange cars and burnt orange street signs. And lets clear the air - the outrageous use of burnt orange and longhorn profiles is not about school spirit. They are not worn and emblazoned on everything that holds still for .25 seconds because people are proud of academic achievement, or the choir, or even the tennis team. They are celebrating football, plain and simple. So, if you are going to ask if I want to work "the game," sorry, but you are going to have to be more specific. But, once I figured out just exactly what game I would be working, I donned my bow tie, found my way to the appropriate gate, waited with my fellow caterers in ill-fitting tuxedo shirts, and tried not to sweat. Once again, it looked like I was the only newbie. All of the guys still had their shirts unbuttoned, or draped over the arm and stood fanning themselves in undershirts. All the girls were still hastily putting their hair up. Once again, everyone was friendly and confused as to why I had moved to Texas (Answer: because 75 and sunny can get so booooring...). Finally, a woman in a better fitting tuxedo shirt and vest came out to look us over. I couldn't tell if she was taller than me or if it was her hair (how much Aqua Net does it take to keep up a Texas bouffant in 98 degree weather?). After sizing up the group, I was told I would be going to the VIP section where I would be a cocktail waitress. After a brief moment of panic that I had signed myself up for some Division I version of the thinly-veiled-porno craigslist ads and would be "working the Champagne Room" I realized instead that I was about to be introduced to not just college football, but TEXAS LONGHORNS FOOTBALL - Hook'em Horns! She ushered me and a few others who had been deemed VIP section worthy, into an elevator marked VIP ONLY. "If we catch you watching The Game you're fired." "Okay, but can I watch the marching band at half-time?" The elevator doors opened to a giant room with windows running the length of it with a sweeping view of the field. She walked to one of the three bars in the room and started digging behind it: Um...okay. That probably would have been a good time to let someone know that I'd never had experience as a cocktail waitress. That, in fact, those beers I handed out at the conference center were the first I had slung. I did not. Beyond my lack of career experience, my drinking repertoire consisted of any red wine that cost under $6, California micro-brews (and the newly discovered Lone Star and Shiner Bock) and mixed drinks that fit the [blank] and [blank] model (gin and tonic, cranberry and vodka, rum and coke - well liquor only). Without any customers, I wasn't sure what we were supposed to "git to" so I stuck by one of the guys that I had chatted with outside. Evidently that was the right move since he handed me limes and a knife. I decided then was the time to fess up: "This is my first time doing this." "Working The Game?" "Yeah...and also cocktail waiting." "Ha! Its okay, its super easy. Just take drink orders - they are free, by the way, since these f*ckers give a bunch of money, so your apron is just for tips - and come to me to fill them." At that point a streak of blonde and a whiff of Aqua Net rushed past and whispered "Doors open!" I handed my bartender buddy his limes (which he proceeded to re-cut correctly), took a deep breath, channeled my highish-end retail customer service identity, and a twang of what I thought was Texan hospitality, straightened my bow tie, and walked up to a friendly looking couple in their 70's. "Hi! What can I get for you folks?" "Oh hi, honey. We'll have two cooooba leeeeebras." And he handed me a twenty. "Sure thing!" In any other situation, I would have been strategizing about how I could educate him that "honey" was not good manners, but condescension, but I had bigger problems - like what the hell was a cooooba leeeeebra? I dodged groups of twos and threes in burnt orange greeting each other with "Hook 'em!" on my way back to the safety of the bar: "They want two cooooba leeeeebras. What the hell are those!?!" The bartender smiled and narrated as he poured: Ice, rum, coke, and a slice of the just-cut limes. "It's just a rum and coke!?" "With a lime." "Oh, okay, thanks. Um, they handed me a twenty." "That's your tip." "But they are free, and I haven't given them anything yet." "It's so you keep coming to them. Don't worry there will be more at the end." Evidently the tipping was going to be much better than the ones and nones I got at the convention center. But I had more important things to do - like try and find the right friendly looking couple in their 70's in burnt orange, when the room had filled to the brim with other friendly-looking couples in their 50's, 60's and 70's in burnt orange. But, I found them, delivered their drinks and continued to make a bunch of other rich, football-loving Texans happy throughout the game. I tried not to stare at the whole new inventory of burnt orange accessories, though I'm pretty sure I spotted a silk scarf covered in longhorn profiles with "Hermes" in the corner. Luckily, Cuba Libres seemed to be the drink of choice - second only to diet Cuba Libres. With the exception, of course, of the one cranberry and vodka ordered by the granddaughter of one of the friendly folks - which, I promptly spilled down the back of her white denim jacket. Thanks to true Texan hospitality (assisted by a half-dozen Cuba Libres) she and her grandparents were nice about it, blamed the guy behind them for bumping into me, and worried that I would get fired. Surprisingly, it turned out she had nothing to worry about. The Longhorns ended up losing the game really, really badly (blasphemy!) so folks started to clear out early and we were already gathering all the discarded limes and cocktail napkins before the teams left the field. At one point, I smelled the distinct smell of Aqua Net next to me. 7 comments: It's funny to read this because Austin is probably the least-football-obsessed city in Texas. Just be glad you don't live in College Station; they re-ran a story in the college newspaper lately about how when the bonfire collapsed and killed a bunch of people, they still played their football game against UT (which, for some reason still unexplained to me, they call t.u. as an insult) and felt like they HAD to win, so that the "Aggie community" could feel good about something. And they did win, which made them fucking HEROES. Because it, you know, made all those people come back to life. Or something. This is a great story!! Being a born and bred Texan (but who grew up overseas) I can truly attest to the die hard love of football. Thanksgiving is not thanksgiving unless the Cowboys game is on. My earliest recollection of doing "Hook Em" was at the age of 4! According to my father, the second best day of his life (the first was my birth...LOL!) was the day I took him to the Ohio State and UT game in Memorial Stadium. My mother always agonized over the fact that she didn't have sons so she could watch play high school football. Yep, in Texas football is close to religion. So when I told my parents that I was going to get James into tennis they immediately hissed at Andrew. My father blamed such thoughts on my "Yankee influencing" husband. My mother exclaimed, "But James could be the next Vince Young!" The thought of my son's head being crushed repeatedly on the field coupled with the fact that pee wee football included practice 3 times a week (for a 6 year old!) in addition to a Saturday game was enough for me to pull the plug on football for James. I'm a California girl who moved to Austin about 6 months ago. I still can't get over the burnt orange cars. Burnt orange sweatshirts would be normal, but burnt orange cars?! Like, how much can a person possibly like football? I really like the White Stripes, but I don't go out and paint my car red and white. There are even Longhorns Snuggies in the supermarket! What the HELL! One of my coworkers moved here from Illinois about the same time I moved from California, and she goes to all the UT games. Apparently this is a completely normal and expected part of moving to Austin. Is there anywhere outside of Texas where you're expected to devote yourself to a college that you've never been associated with in any way? My first day at work, I was introduced to the two company owners. One was introduced to me as "an Aggie" (this was my equivalent of your "Shiny" beer moment). When I didn't know what an Aggie was, they explained, and then told me football is a religion in Texas. I was like, "Yeah, not so much in California." They replied, "Surfing is a religion in California," demonstrating very clearly that they had never been to California.
The significance of one-station N2 disease in the prognosis of patients with nonsmall-cell lung cancer. A retrospective study was conducted to define the characteristics and the prognosis of N2 disease subgroups according to their patterns of spread. From January 1993 to December 2004, 1,329 patients underwent lung resection for bronchogenic carcinoma The records of all patients with positive mediastinal lymph nodes at the surgical specimen (pIIIA/N2) after radical resection were analyzed, and the pattern of mediastinal lymphatic spread was classified according to regional spread, to skip metastasis, and to one or two or more lymph node stations, in relation to primary tumor location. Age, sex, type of resection, right or left lesion, T status, primary tumor location, tumor size, tumor central or peripheral location, histology, and survival were recorded and analyzed. Survival was analyzed according to regional spread or not, number of mediastinal lymph node stations involved, and skip metastasis status. Among 302 cases (22.7%) with positive mediastinal lymph nodes pIIIA/N2, 66 (22%) were skip metastases, 72 (24%) had a nonregional mode of spread, and 199 (66%) included two or more stations of mediastinal lymph node invasion. Cox regression analysis of all cases disclosed malignant invasion in only one mediastinal lymph node station as the only favorable factor of survival (p < 0.001, odds ratio 0.57, 95% confidence interval: 0.42 to 0.78). The presence of one-station mediastinal lymph node metastasis in patients with nonsmall-cell lung cancer who underwent major lung resection with complete mediastinal lymph node dissection proved to be a good prognostic factor that should be taken into account in the future.
Banana Cream Cheese Sammie Whatever daddy eats the kids want to eat....or at least that's true in our family. My husband is really into eating breakfast sandwiches for breakfast, so of course Kenya and Chloe want them also. I wouldn't say that this Banana Cream Cheese Sammie is exclusively for breakfast, but it's definitely really delicious first thing in the morning or just as a carbohydrate filled lunch treat to keep everyone full of energy and ready to keep going for the rest of the day until dinner! Amanda November 20, 2010 at 8:07 am I had to comment on this one. My two year old refuses to eat sandwiches without pulling them apart and making a mess. He just devoured this sandwich without slowing down to take it apart. Great idea! Thanks starbuckmom November 9, 2010 at 11:11 pm I am always looking for new sammie recipes for my twins. They get bored with pb&j sammies easily and I like having sammies for when we need to take a packed lunch. Thanks for sharing! Going to try this tomorrow! The information on this Web site is designed for educational purposes only. It is not intended to be a substitute for informed medical advice or care. You should not use this information to diagnose or treat any health problems or illnesses without consulting your pediatrician or family doctor. Please consult a doctor with any questions or concerns you might have regarding your or your child's condition.
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.beam.runners.spark.structuredstreaming.translation.batch; import static org.apache.beam.vendor.guava.v26_0_jre.com.google.common.base.Preconditions.checkArgument; import java.io.IOException; import java.io.Serializable; import java.util.ArrayList; import java.util.List; import org.apache.beam.runners.core.construction.SerializablePipelineOptions; import org.apache.beam.runners.core.serialization.Base64Serializer; import org.apache.beam.runners.spark.structuredstreaming.translation.SchemaHelpers; import org.apache.beam.runners.spark.structuredstreaming.translation.helpers.RowHelpers; import org.apache.beam.sdk.io.BoundedSource; import org.apache.beam.sdk.io.BoundedSource.BoundedReader; import org.apache.beam.sdk.options.PipelineOptions; import org.apache.beam.sdk.util.WindowedValue; import org.apache.spark.sql.catalyst.InternalRow; import org.apache.spark.sql.sources.v2.ContinuousReadSupport; import org.apache.spark.sql.sources.v2.DataSourceOptions; import org.apache.spark.sql.sources.v2.DataSourceV2; import org.apache.spark.sql.sources.v2.ReadSupport; import org.apache.spark.sql.sources.v2.reader.DataSourceReader; import org.apache.spark.sql.sources.v2.reader.InputPartition; import org.apache.spark.sql.sources.v2.reader.InputPartitionReader; import org.apache.spark.sql.types.StructType; /** * This is a spark structured streaming {@link DataSourceV2} implementation that wraps an {@link * BoundedSource}.As Continuous streaming is tagged experimental in spark (no aggregation support + * no exactly once guaranty), this class does no implement {@link ContinuousReadSupport}. */ public class DatasetSourceBatch implements DataSourceV2, ReadSupport { static final String BEAM_SOURCE_OPTION = "beam-source"; static final String DEFAULT_PARALLELISM = "default-parallelism"; static final String PIPELINE_OPTIONS = "pipeline-options"; @Override public DataSourceReader createReader(DataSourceOptions options) { return new DatasetReader<>(options); } /** This class is mapped to Beam {@link BoundedSource}. */ private static class DatasetReader<T> implements DataSourceReader, Serializable { private int numPartitions; private BoundedSource<T> source; private SerializablePipelineOptions serializablePipelineOptions; @SuppressWarnings("unchecked") private DatasetReader(DataSourceOptions options) { if (!options.get(BEAM_SOURCE_OPTION).isPresent()) { throw new RuntimeException("Beam source was not set in DataSource options"); } this.source = Base64Serializer.deserializeUnchecked( options.get(BEAM_SOURCE_OPTION).get(), BoundedSource.class); if (!options.get(DEFAULT_PARALLELISM).isPresent()) { throw new RuntimeException("Spark default parallelism was not set in DataSource options"); } this.numPartitions = Integer.parseInt(options.get(DEFAULT_PARALLELISM).get()); checkArgument(numPartitions > 0, "Number of partitions must be greater than zero."); if (!options.get(PIPELINE_OPTIONS).isPresent()) { throw new RuntimeException("Beam pipelineOptions were not set in DataSource options"); } this.serializablePipelineOptions = new SerializablePipelineOptions(options.get(PIPELINE_OPTIONS).get()); } @Override public StructType readSchema() { // TODO: find a way to extend schema with a WindowedValue schema return SchemaHelpers.binarySchema(); } @Override public List<InputPartition<InternalRow>> planInputPartitions() { PipelineOptions options = serializablePipelineOptions.get(); List<InputPartition<InternalRow>> result = new ArrayList<>(); long desiredSizeBytes; try { desiredSizeBytes = source.getEstimatedSizeBytes(options) / numPartitions; List<? extends BoundedSource<T>> splits = source.split(desiredSizeBytes, options); for (BoundedSource<T> split : splits) { result.add( (InputPartition<InternalRow>) () -> new DatasetPartitionReader<>(split, serializablePipelineOptions)); } return result; } catch (Exception e) { throw new RuntimeException( "Error in splitting BoundedSource " + source.getClass().getCanonicalName(), e); } } } /** This class can be mapped to Beam {@link BoundedReader}. */ private static class DatasetPartitionReader<T> implements InputPartitionReader<InternalRow> { private boolean started; private boolean closed; private final BoundedSource<T> source; private BoundedReader<T> reader; DatasetPartitionReader( BoundedSource<T> source, SerializablePipelineOptions serializablePipelineOptions) { this.started = false; this.closed = false; this.source = source; // reader is not serializable so lazy initialize it try { reader = source.createReader(serializablePipelineOptions.get().as(PipelineOptions.class)); } catch (IOException e) { throw new RuntimeException("Error creating BoundedReader ", e); } } @Override public boolean next() throws IOException { if (!started) { started = true; return reader.start(); } else { return !closed && reader.advance(); } } @Override public InternalRow get() { WindowedValue<T> windowedValue = WindowedValue.timestampedValueInGlobalWindow( reader.getCurrent(), reader.getCurrentTimestamp()); return RowHelpers.storeWindowedValueInRow(windowedValue, source.getOutputCoder()); } @Override public void close() throws IOException { closed = true; reader.close(); } } }
MLS# 5868248 – 5200 E Arcadia Lane, Phoenix, AZ 85018 Description Situated on the premier street in all of Arcadia with unparalleled views of Camelback Mountain, Nordon Manor is a neighborhood favorite and an architectural masterpiece. This 18th Century inspired Estate is currently in the process of being meticulously rebuilt under the extraordinary vision of acclaimed architect, CP Drewett, in collaboration with Two Hawks Design and Development, Jaimee Rose Interiors and the Ro Luxury Group. Nordon Manor has been a long time Arcadia treasure and an iconic piece of local history. Inspired by previous centuries ‘Western Farmhouse’, the Lo Piccolo family from York, Pennsylvania, wanted to bring some of their East Coast roots to the Valley of the Sun and so in 1971 they began the process of shipping authentic materials to craft their dream home …… Property Details and Features Listing Source: Arizona Regional MLS Property Mountain View(s) North/South Exposure Location Directions: SOUTH ON 56TH ST – WEST ON EXETER – 1ST STREET PAST RUBICON – NORTH TO THE ENTRANCE OF NORDON MANOR
Efficient markerless gene replacement in Corynebacterium glutamicum using a new temperature-sensitive plasmid. Random chemical mutation of a Corynebacterium glutamicum-Escherichia coli shuttle vector derived from plasmid pCGR2 was done using hydroxylamine. It brought about amino acid substitutions G109D and E180K within the replicase superfamily domain of the plasmid's RepA protein and rendered the plasmid highly unstable, especially at higher incubation temperatures. Colony formation of C. glutamicum was consequently completely inhibited at 37°C but not at 25°C. G109 is a semi-conserved residue mutation which resulted in major temperature sensitivity. E180 on the other hand is not conserved even among RepA proteins of closely related C. glutamicum pCG1 family plasmids and its independent mutation caused relatively moderate plasmid instability. Nonetheless, simultaneous mutation of both residues was required to achieve temperature-sensitive colony formation. This new pCGR2-derived temperature-sensitive plasmid enabled highly efficient chromosomal integration in a variety of C. glutamicum wild-type strains, proving its usefulness in gene disruption studies. Based on this, an efficient markerless gene replacement system was demonstrated using a selection system incorporating the temperature-sensitive replicon and Bacillus subtilis sacB selection marker, a system hitherto not used in this bacterium. Single-crossover integrants were accurately selected by temperature-dependent manner and 93% of the colonies obtained by the subsequent sucrose selection were successful double-crossover recombinants.
Q: Iterating through keys in Redis I have just started with Redis. My DB contains about 1 billion records. Using HKEYS * results in an out of memory error. Is there a way to iterate through keys? Something like HKEYS * but with a limit n? Edit: I am now using a loop which matches a pattern for c in '1234567890abcedf': r.keys(c + '*') A: Available since Redis 2.8.0 are the cursor based Redis iteration commands (SCAN, HSCAN etc) that let you iterate efficiently over billions of keys. For your specific case, the start using HSCAN instead of HKEYS/HGETALL. It is efficient, cheap on server resources and scales very well. You can even add a pattern to HSCAN unlike HKEYS. e.g. 127.0.0.1:6379> HMSET hash0 key0 value0 key1 value1 entry0 data0 entry1 data1 OK 127.0.0.1:6379> HSCAN hash0 0 MATCH key* 1) "0" 2) 1) "key0" 2) "value0" 3) "key1" 4) "value1" 127.0.0.1:6379> HSCAN hash0 0 1) "0" 2) 1) "key0" 2) "value0" 3) "key1" 4) "value1" 5) "entry0" 6) "data0" 7) "entry1" 8) "data1"
Q: How do I access an Android internal style attributes via derived classes? I have subclassed preference, and created custom styleables in attrs.xml as follows: <declare-styleable name="MyPreference"> <attr name="myAttribute" format="reference" /> </declare-styleable> and I can declare my Preference in xml as follows: <com.my.project.MyPreference android:title="myTitle" namespace:myAttribute="@array/sleep_time_values" /> I can access the custom attribute just fine: TypedArray a = context.obtainStyledAttributes(attrs, R.styleable.MyPreference, 0, 0); thing = a.getText(R.styleable.MyPreference_myAttribute); My question is: How do I access (in code) the internal android:title attribute specified in the xml definition above? A: Framework styleable arrays aren't public (or stable), but you can obtain a single public attribute using the same method for obtaining styled attributes. This should only be used to obtain a single attribute since the resources framework expects the attribute array to be in a specific order. TypedArray a = context.obtainStyledAttributes( attrs, new int[] { android.R.attr.title }, 0, 0); String title = a.getText(0);
[CTi7(2+)]: Heptacoordinate Carbon Motif? A heptacoordinate carbon motif [CTi7(2+)] is predicted to be a highly stable structure (with D5h point group symmetry) based on ab initio computation. This motif possesses a sizable HOMO-LUMO gap along with the lowest vibrational frequency greater than 95 cm(-1). An investigation of the motif-containing neutral species [CTi7(2+)][BH4(-)]2 further confirms the chemical stability of the heptacoordinate carbon motif. In view of its structural stability, a quasi-one-dimensional (quasi-1D) nanowire [CTi7]n[C16H8]n is built from the carbon motifs. This organometallic nanowire is predicted to be metallic based on density functional theory computation.
1. Field of Invention This invention relates to a combined probe and marker, which may also specifically be associated with luminescent marker means for marking a minefield after successful probing. 2. Description of Prior Art Markers for locating geographical points such as points on boundary lines, buried objects and the like are known to the art. Various markers are shown in the following U.S. Pat. Nos.: 3,916,821 discloses a geographic boundary marker assembly having a marker member mounted on an upright stake made of iron. The marker member has a housing on the top portion thereof for storing a magnet which is held to the upper end of the iron stake by magnetic force. 3,899,856 discloses a property boundary marker which is formed by two flat, notched planar members intersecting at a right angle forming a column. The marker may be extended in length by adding another column of notched planar members by vertically slipping the planars onto the matching planar of the first column. The planars of the two columns are held by tabs which are provided at the matching edges. 3,635,232 discloses a camping tent stake having a cleat member along a shank edge for rope engagment. A plurality of louver channels is provided on the opposite side of the shank of the stake. The purpose of the louver channels is to facilitate anchoring of the stake. 2,660,822 discloses a surveyer's grading marker which consists of a stake to be driven into the ground and a paper sheath affixed to the other end of the stake having pigmented marking to indicate the depth of earth to be filled or removed in order to grade the terrain level.
The Custom Vintage Sunburst finish on the body compliments the style and body lines of this guitar beautifully. A hard tail bridge and a lipstick style pickup make it easy to recreate the sharp vintage tone that the greats used. Perhaps the most interesting part of the PGEKT35 is its bridge with adjustable saddles. With such an option, the intonation, or the properties of how each note is passed to the next, can be manipulated to a desired effect. The Pyle PGEKT35 is an impressive piece of equipment, with looks and sounds far superior to much more expensive models. Once again, Pyle has put together a Professional quality piece of equipment at an affordable price. Pyle has been in business for over 35 years, and their manufacturing experience and expertise is easy to see
Category: Sports Sky Sports commentator Martin Tyler reflects on Argentina’s dramatic World Cup win over Nigeria, Australia’s exit and looks ahead to the next set of matches… I can’t sleep. The passion on show during Nigeria against Argentina is still swirling through my mind. Such raw, compelling action and this was only for a place in […] Argentina have qualified for the round of 16 in the World Cup after a spectacular finish from Marcos Rojo five minutes from time gave Jorge Sampaoli’s men the three points they needed to qualify. In an enthralling game, Argentina stepped up the gears in the first half. Lionel Messi was at his best and proved […] (Reuters) – Former right-back Gary Neville has advised England manager Gareth Southgate to make “three or four changes” in Thursday’s top-spot decider against Belgium to avoid fatigue in the latter stages of the World Cup. England and Belgium are both locked on six points each after winning their fixtures against Tunisia and Panama and having […] Super Eagles’s Odion Ighalo, says he takes full repsonsibilities for the team’s loss at yesterday’s match against Argentina. The Nigerian team crashed out of the world cup after they failed to beat the Argentinian team. Ighalo missed a few chances to score goals that could have secured a win for the Nigerian team. In a […] Argentina football legend, Diego Maradona appeared to need help to walk after watching his national team dramatically beat Nigeria to survive in the World Cup. Maradona was treated for blood pressure in the stadium and was able to leave normally shortly afterwards. In the video posted by Fernando Schwartz, a well-known sports journalist […] Aleksandar Mitrovic’s brace gave Serbia a deserved 2-0 win over the Super Eagles at The Hive in London in their second pre-World Cup friendly on Tuesday in a match that had another goal line drama. The on-loan Fulham striker cashed in on defensive lapses in the 68th and 81st minutes to inflict on the […] Hat-trick hero Isco said it was a relief to play for Spain as he feels Real Madrid coach Zinedine Zidane has no faith in him. Spain destroyed Argentina, who were without Lionel Messi, 6-1 in a friendly on Tuesday as Isco stole the show with his triple at the Wanda Metropolitano. The 25-year-old has become […] Joseph Parker has dismissed Anthony Joshua’s “unrealistic” claims and insists he will beat the British-born Nigerian because “he’s not a god”. The WBO heavyweight world champion was responding to Joshua’s suggestion that no human can beat him, ahead of their unification fight on Saturday. Parker and Joshua went face to face at the Sky Central […] Manchester United boss Jose Mourinho has slammed Frank de Boer over comments the former Crystal Palace manager made about striker Marcus Rashford. De Boer said it was a “pity” the 20-year-old, who scored both goals in United’s 2-1 victory over Liverpool on Saturday, played under the Portuguese. The Dutchman’s remarks prompted a savage response from […] The Minnesota Timberwolves have exercised the fourth-year options on Karl-Anthony Towns and Tyus Jones. Towns, 21, averaged 25.1 points, 12.3 rebounds and 2.7 assists per game last season, starting all 82 games for the second consecutive year. The 7-0 forward/center set a franchise single-season scoring record with 2061 points while recording 1007 rebounds, becoming the […]
Whistle tweets Tag: Ron Winter NFL will hire from current roster Scott Green and Ron Winter have retired, opening up two slots at the referee position. The NFL has not hired a referee straight out of college and into the NFL since the 1970 merger, so the two new white hats will come from the current roster of officials. In… In an attempt to narrow down potential assignments, Football Zebras has learned from multiple sources that last year’s Super Bowl referee, Jerome Boger, did not receive a playoff assignment this season. Also not receiving an assignment are Mike Carey and John Parry. Missing the playoffs the year following a Super Bowl assignment is not unprecedented.… Football Zebras commentary Week 17 is upon us, meaning that the final evaluations for officials vying for playoff positions are being determined. Officials will not be informed of the Wild Card Playoff assignments until the middle of the upcoming week. The later playoff rounds will then be rolled out in the succeeding week or two.… How NFL officials stay out of the way to preserve life and limb We’ve all seen it. For the fans it is a funny sight but for anyone who has been knocked down by a football player always cringes when a football official gets knocked down. The officials do not wear any padding and when… We have some leftover items from Week 5, so let’s serve them up before their expiration dates pass. Bengals lost timeout Prior to a Bengals 3rd-and-goal situation, the crew stopped the clock for a game clock adjustment. When the game clock was stopped, and additional three seconds ticked off the play clock, stopping at 6.… Officials double check with each other on tight and routine calls NFL officials each have a specific area and specific player or players to watch during each play. But do you know that officials also watch each other during a play? The glance may be a few hundredths of a second, but that glance helps… Click the image to enlarge. It is time to kick off the new football season! Here are some numbers for all of the zebra watchers out there. Enjoy! Designed and researched by Ben Austro. Sources: NFL Record and Fact Book (2013, 2008, 2000); Pro-Football-Reference.com (Coleman, Freeman, McKinnely); Football Zebras, “Officiating crews for the 2013 season“;… Commentary by Mark Schultz Here are the things I am pondering as I “zebra watch” this year. 1. Will some high-profile officials make a playoff comeback? Gene Steratore, Ed Hochuli, John Parry, Tom Stabile, John McGrath, Rob Vernatchi, and Walt Anderson missed out on an on-field playoff assignment in 2012. Will they make a playoff… You may have noticed some officials wearing rock-star like microphones and ear pieces during some preseason games. The NFL has confirmed that it is having its officials experiment with wireless official-to-official communication gear during selected games this August. Vice president of football communications, Michael Signora, says, “We have consistently used the preseason to test different…
Q: Proof that: $n! = \Omega (5^{\log n})$ Show that: $n! = \Omega (5^{\log n})$ That is to find a $c$ and a $n_0$ such that: $$n! \geq c\cdot5^{\log n}$$ We have: $$n!\leq n^n$$ Thus, $$n\log n \geq \log n \log 5 + \log c$$ Which is: $$(n - \log 5)\log n \geq \log c$$ So we can pick $c = 1$ and $n_0 = 3$, and it works. Is that right? A: \begin{align}n!=\Omega(5^{\log_2n})&\impliedby n!\ge c\cdot5^{\log_2n}=c\cdot n^{\log_25}\quad\forall n\ge n_0\\&\impliedby n(n-1)(n-2)\ge n^{\log_25}\quad (c=1)\\&\impliedby n^{3-\log_25}-\frac3{n^{\log_25-2}}+\frac2{n^{\log_25-1}}\ge1\quad(\log_25\in[2,3])\\&\text{true with}\,n_0=5\end{align}
by Commissioner Annette L. Nazareth U.S. Securities and Exchange Commission Open Meeting Washington, DC November 28, 2007 I am very disappointed this Commission meeting has been convened today to vote to deny shareholders the opportunity to exercise their state law rights. One of the most fundamental shareholder rights in America is the ability to elect directors, and director elections form the core of shareholder power. As Chairman Cox himself has said, “the federal proxy system should protect and enforce that most important legal right, not stand in its way.”1 I wholeheartedly agree, which is why I am voting against today’s amendments. This release, which I have termed the non-access release, stands in the way of shareholders’ rights to elect the directors of the companies they own. I do not see a principled way to vote for the non-access release and claim to be supportive of shareholder rights in the longer term. Indeed, if this amendment were truly intended to be a temporary stopgap measure, then it would have a sunset provision. It does not. Ultimately, our votes here today are the actions that matter, not our unenforceable aspirations for change. The ostensible purpose of the non-access release is to provide certainty in what the release portrays as a very uncertain current state of affairs. If certainty were so important, it could have been provided after the AFSCME decision2 and before the 2007 proxy season, when any uncertainty surely was greater than it is now. The Commission did not act last year, and we received only three no action requests concerning director nomination bylaw proposals. Any fear about a flood of such proposals did not materialize. The staff took “no view” on one request, and the other two requests were withdrawn. Only three director nomination bylaw proposals appeared on corporate ballots in the last proxy season. The shareholders of those companies had the opportunity to decide whether they wanted such bylaw changes. One proposal passed; two did not.3 Today my fellow Commissioners are voting to deny shareholders any future opportunities to make such decisions for themselves. The non-access release paints a picture of an “escalating” state of uncertainty in this area. This dire state apparently has developed since the proposing release, as the proposing release contained none of these predictions of doom and gloom that might occur if there is further litigation. Indeed, nothing has happened since the proposing release that would justify reaching this conclusion. Everything described in today’s release as causing uncertainty occurred well in advance of the proposing release. Even the LongIslandCare Supreme Court case4 was decided six weeks before our July open meeting. Yet the LongIslandCare decision was not mentioned in any of the discussion at the open meeting nor in the proposing release. I find it striking that so much emphasis is now placed on a case that apparently no one thought worthy of discussing at the proposing stage and that, as far as I am aware, did not appear in any of the literally thousands of comment letters we received on the non-access proposal. And certainly nothing in the case compels this particular outcome today. It is entirely within the Commission’s authority to further shareholder rights, but the majority has determined not to do so. I do not believe that we are in a state of great uncertainty, let alone an escalating one. The discussion of uncertainty contained in the release appears to be a post-hoc rationalization of a path that was ill-conceived in the first place. The non-access proposal and interpretation was an eleventh-hour maneuver, included as an alternative only after it was clear that an access proposal would fail to pass with a shorthanded Commission.5 Unfortunately, the “access” release itself was quite flawed, with provisions that commenters viewed as hostile to any form of access. For example, the disclosure requirements in the “access” proposal demonstrate the internal resistance to the proxy access issue. The disclosure would have been more burdensome than in the takeover context, demonstrating to me that some in the agency view access to the proxy as more threatening than a corporate takeover. The Commission did not consider, address, or even solicit comments on other options consistent with our proxy system, such as applying existing disclosure requirements and prohibitions on false and misleading statements to nominations done through bylaw procedures. Alternatively, the Commission could have proposed revising Rule 14a-8(i)(8) to allow companies to exclude proposals that do not require a nominating shareholder to comply with the proxy contest disclosure rules.6 If the problem is one of disclosure — and clearly fulsome disclosure concerning the proposing shareholders is appropriate — the solution is to address the disclosure directly, not to eliminate this bylaw avenue altogether. The adopting release provides no explanation of why precluding shareholder rights altogether is a better option. We held three days of roundtables in May in which participants discussed a number of issues relating to the proxy. I was struck that the Commission’s rules in the proxy area sometimes prevent the exercise of fundamental state law rights. Most state laws allow shareholders to amend the corporate bylaws unless limited by the bylaws or charter.7 The SEC’s role in adopting the proxy rules stems from Congress’s belief that “fair corporate suffrage is an important right,” and the federal proxy authority is intended to reinforce, not supplant, state law rights.8 Our authority under Section 14(a) is to adopt proxy rules that are “in the public interest or for the protection of investors.”9 The more principled way to eliminate any uncertainty is to clearly allow director nomination bylaw proposals, thereby affirming rather than denying shareholder state law rights. The ability to introduce such a bylaw is in the public interest and would serve the protection of investors by providing a method to ensure Board accountability in situations in which the investors determined it was necessary. Today’s release does not appear to reflect much of the learning from the roundtable discussions. I do not recall any of the participants at the roundtables discussing the then-existing status quo as one of great uncertainty, nor do I remember anyone stating that the SEC should simply foreclose this bylaw avenue altogether, as the Commission is doing today. Yet here we are today — with the Commission voting to deny shareholders their rights simply to put this matter behind us at this time. The roundtables did raise the idea of addressing the proxy access issue through bylaw proposals, and that concept is intellectually appealing. It would facilitate shareholders’ exercise of their fundamental state law and company ownership rights to elect the board of directors. Allowing a director nomination bylaw proposal on the company ballot puts the decision about proxy access squarely in the hands of the shareholders. At least a majority of the shareholders would have to support the bylaw for there to be any form of proxy access. Only if such a bylaw passed could its procedures then be followed. The Commission would be taking no position as to whether shareholder access to the proxy is a good idea or what form it should take or how costs should be allocated — those decisions could be left to the company’s shareholders. Shareholders at different companies may well have very different positions on this, and allowing these bylaws would also allow for variation in procedures among companies.10 Bylaws regarding nominations may be more appealing at companies at which management acts in its own economic self interest, or chooses to ignore the express will of the shareholders and is unresponsive to them. If a company and its Board are creating value for shareholders and are responsive to shareholder concerns, it seems unlikely that a majority of shareholders would support a bylaw change to the director nomination process. Responsible management need not fear its shareholders. Some worry that allowing director nomination bylaws will result in a so-called tyranny of the minority, in which a small number of shareholders impose their concerns on the company and the rest of the shareholders. I find such fears unfounded, particularly since at least a majority of shareholders would have to support a change to the bylaws. And a system in which there is a reasonable possibility that shareholders could nominate directors would serve as an important reminder to Boards that they are accountable to their shareholders. Even if a shareholder-nominated director never is elected, the real possibility of that election would serve a useful purpose in maintaining Board accountability. Corporate governance in the U.S. is not well served by inattentive boards that are effectively unaccountable to shareholders and thus place the interests of management over the interests of shareholders. The non-access release never addresses this accountability issue or its competitiveness implications. The non-access release asserts that the Commission believes that the proposal would not impose a burden on competition. The blue-ribbon Committee on Capital Markets Regulation, which made a number of recommendations concerning improving the competitiveness of U.S. markets, noted that “shareholders of U.S. companies have far fewer rights in a number of important areas than do their foreign competitors,” and that this difference “creates an important potential competitiveness problem for U.S. companies.”11 Yet, the proposing release neither mentioned nor solicited comment on this competitiveness problem. Several foreign investors commented on the lack of accountability of directors in the U.S. compared with in other countries, noting among other things that “[t]he harsh reality is that U.S. corporate governance practices are on a relative decline compared to other leading markets.”12 At least one domestic commenter also mentioned this competitiveness problem,13 but today’s adopting release still does not address it. This strikes me as a fundamental failing of the release, reflecting the Commission’s rush to adopt amendments without fully considering their implications. I think it is particularly important for the Commission to provide a reasoned explanation for today’s action in light of the overwhelming force of the comment letters received. We received thousands of comment letters on the two proposals published in July — over 34,000 in total, including over 8,000 on the non-access proposal. The vast majority of commenters on the non-access proposal opposed it. Yet the Commission is ignoring the pleas of investors and proceeding down this path less than two months after the comment period closed. I do not think that the Commission should make hasty decisions that impair shareholder rights simply to fit this self-imposed timeframe. I also note that some commenters argued that the proposed rule change would call into question other no-action decisions concerning Rule 14a-8(i)(8), including allowing majority voting proposals and declassifying Boards. It is important for the Commission to be clear that today’s actions will not have that impact. Although the language of the rule was not changed, the text of the release explicitly states that “[t]he changes to the rule text do not affect or address any other aspect of the agency’s prior interpretation of the exclusion.” The release thus makes clear that the Commission affirms the staff’s prior determinations about proposals concerning matters such as majority voting. The Commission must not back away from prior precedent on these important matters. The AFSCME decision placed the issue of proxy access bylaws squarely before the Commission. We made a promising start at exploring those issues through our roundtables, but today’s amendments are an unfortunate step backward. Shareholder rights face a long uphill battle with this Commission. I hope we have not completely lost the opportunity to address these issues thoughtfully. Given that all 40 of the largest markets outside the U.S. give investors in public companies the ability to nominate and remove directors, this recognition of shareholder rights is long overdue. Chairman Cox has clearly stated his intention to move forward with proxy access in the very near future. I fervently hope that is the case and that this effort succeeds in the coming year. 3 A binding proposal at Hewlett-Packard Co. received 43% of the vote cast, a non-binding proposal at UnitedHealth Group received 45.3% support, and an access proposal at Cryo-Cell International received majority support. See RiskMetrics Group 2007 Postseason Report: A Closer Look at Accountability and Engagement (Oct. 2007) at 16, available at:http://www.issproxy.com/pdf/2007PostSeasonReportFINAL.pdf. 6See, e.g., Comment letter on SEC File Nos. S7-17-07 and S7-16-07 from Gerald W. McEntee, International President, American Federation of State, County and Municipal Employees, Sept. 28, 2007, at 4, available at: http://www.sec.gov/comments/s7-17-07/s71707-65.pdf; see also comment letter on SEC File No. S7-17-07 from Peter H. Mixon, General Counsel, California Public Employees’ Retirement System, Sept. 27, 2007, at 3, available at: http://www.sec.gov/comments/s7-17-07/s71707-38.pdf. (generally agreeing with the principle that a shareholder should provide the information that would ordinarily accompany a proxy contest). 7See Comment letter on SEC File Nos. S7-17-07 and S7-16-07 from Gerald W. McEntee, International President, American Federation of State, County and Municipal Employees, Sept. 28, 2007, at 4, available at: http://www.sec.gov/comments/s7-17-07/s71707-65.pdf. See also Unofficial Transcript of the Roundtable Discussion on Proposals for Shareholders, May 25, 2007, comments of Jill E. Fisch, T.J. Maloney Professor of Business Law, Fordham University Law School, at 92-93; comments of Donald C. Langevoort, Thomas Aquinas Reynolds Professor of Law, Georgetown University Law Center, at 95. 10See Unofficial Transcript of the Roundtable Discussion Regarding the Federal Proxy Rules and State Corporation Law, May 7, 2007, comments of Leo E. Strine Jr., Vice Chancellor, Court of Chancery of the State of Delaware, at 79, available at: http://www.sec.gov/spotlight/proxyprocess/proxy-transcript050707.pdf (noting that allowing binding bylaw proposals that relate to an election process to go on the proxy would allow stockholder innovation and would be “giving life to the state law right”).
The world in which workers lived influenced their efforts to organize. Employers needed constant production to satisfy consumer demand in boom times. In bad economic times, jobs disappeared and workers suffered. Wars forced employers and workers to compromise. Immigration added cheap labor to the marketplace. Social change movements made people more aware of unfair or unsafe practices. All of these factors and more played a role in the rise of organized labor. Some of these factors contributed to the decline of unions. Follow the timelines to see what happened. explore now
Q: jQuery .click not being recognised I cannot figure out what is up with this section of code as follows: $(document).ready(function(){ $('#testimonialContent').load('http://www.1.co.uk/wp-content/themes/1/testimonialPull.php'); $('#nextQu').click(function(){ alert("."); return false; }); }); I am not getting the alerted message when I should be. I dont think I have made any syntaxial errors? HTML: <?php require_once('../../../wp-blog-header.php'); header('HTTP/1.1 200 OK'); ?> <br /><br /><br /><br /><br /><img id="quoteOne" src="http://www.1.co.uk/wp-content/themes/1/images/quote1.png"> <span><?php query_posts(array( 'cat' => 39, 'order' => 'ASC', // ASC 'orderby' => 'rand', 'showposts' => 1, )); $wp_query->is_archive = true; $wp_query->is_home = false; if (have_posts()) : while (have_posts()) : the_post(); the_content(); endwhile; endif; ?> <span id="nextQu">NEXT QUOTE</span> </span> A: Try using delegation: $('#testimonialContent').on('click','#nextQu',function(){ alert("."); return false; });
Related Measures Imposed on Democratic Republic of Congo Neighbours Support M23, Says Congolese Representative, As Rwandan Counterpart Rejects Report by Group of Experts Monitoring Sanctions The Security Council today renewed until 1 February 2015 the arms embargo and related sanctions imposed on the Democratic Republic of the Congo, also requesting the Secretary-General to extend the mandate of the Group of Experts monitoring the implementation of those measures. Unanimously adopting resolution 2136 (2014) under Chapter VII of the United Nations Charter, the Council further defined the criteria for the application of targeted travel and financial measures, deciding to review them no later than 1 February 2015, with a view to adjusting them as appropriate. It requested the Group of Experts, established pursuant to resolution 1533 (2004), to present a midterm report by 28 June 2014 and a final report before 16 January 2015, having also taken note of its 2013 final report (document S/2014/42). Strongly condemning all armed groups operating in the region, the Council demanded, by the text, that the Democratic Forces for the Liberation of Rwanda (FDLR), Allied Democratic Forces (ADF), Lord’s Resistance Army (LRA) and various Mayi Mayi groups immediately cease all violence, disband permanently and demobilize children from their ranks. By other terms, the Council called on all States, especially those in the region, to take steps to ensure there was no support within or from their territories for armed groups in eastern Democratic Republic of the Congo. It demanded that the Congolese Government, as per its commitments contained in the 12 December 2013 Nairobi declarations, accelerate implementation of its disarmament demobilization and reintegration programme. The Council requested the United Nations and others urgently to address the situation of former combatants of the March 23 Movement (M23) in their territories, stressing the importance of ensuring that M23 did not regroup and resume its military activities. Eugène-Richard Gasana (Rwanda), speaking after the resolution’s adoption, said he had voted in favour of it because a sanctions regime on the Democratic Republic of the Congo was of utmost importance in the fight against armed groups, especially FDLR. The group included perpetrators of the 1994 genocide in Rwanda who continued to carry out ethnically based abuses. Expressing concern over collaboration between that genocidal group and the Forces armées de la république démocratique du Congo (FARDC), he called upon the Congolese Government to abide by the Peace, Security and Cooperation framework, and urged the United Nations Organization Stabilization Mission in the Democratic Republic of Congo (MONUSCO) as well as the Expanded Joint Verification Mechanism (EJVM), to investigate the matter. Rejecting the report of the Group of Experts, he said it lacked objectivity, transparency, evidence and credible sources. He deplored the “flawed methodology” applied by an unprofessional group that allowed itself the right to accuse an entire nation without evidence. However, Rwanda had supported a one-year extension of its mandate since the Expert Group could help the so-called “1533 Committee” monitoring sanctions in the Democratic Republic of the Congo. Reiterating that the Council should demand that the Group of Experts behave in a more impartial, professional manner, he emphasized that the imposition of sanctions and the use of a United Nations-funded mechanism to launch “grave and damaging” accusations against a Member State was totally unacceptable, and could undermine ongoing efforts to find forward-looking solutions. With that, he went on to express Rwanda’s unwavering commitment to the Group of Experts, saying it could address the root causes of the conflict in the Democratic Republic of the Congo if it followed its mandate. However, any failure to report on regional dynamics would undermine ongoing peace efforts, he cautioned. Rwanda was committed to finding a lasting solution to the crisis in eastern Democratic Republic of the Congo bilaterally, through the International Conference on the Great Lakes Region (ICGLR) and through the Peace, Security and Cooperation Framework. Ignace Gata Mavita wa Lufuta ( Democratic Republic of the Congo) described the abuses outlined in the experts’ report as “serious violations” of relevant Security Council resolutions and of the Framework Agreement. Alongside the credible information contained in the report of the Secretary-General, the Group of Experts had shown that Rwanda and Uganda supported the terrorist M23, former members of which continued to recruit members in those countries. The group continued to receive support from inside Rwandan territory, he added, noting that the report outlined credible information that M23 leaders could move freely inside Uganda and beyond its borders, one of them having travelled to Europe. M23 continued to recruit members even after statements made in Nairobi last December that it would end hostilities, he continued. That had been confirmed by the head of MONUSCO on 13 January, but the report contained no recommendations regarding either M23 leaders or Uganda and Rwanda, which remained in violation of their commitments. “We wish to live peacefully within our borders, but we also wish to see peace for all countries in the region,” he said, requesting details about the alleged cooperation between Congolese forces and FDLR. The “FDLR matter” was among Rwanda’s most frequently used pretexts to destabilize the Democratic Republic of the Congo, he said, adding that settling that issue remained a priority. He went on to say that the Congolese Government had sent a letter on 16 January recalling the joint military operations that his country and Rwanda had undertaken to repatriate FDLR members who had opted for the disarmament, demobilization and reintegration process. In good faith, the Government had committed with the Rwandans to hunt down FDLR, he noted, adding that Congolese troops had defeated M23. “We have no desire to cooperate with hostile Rwandan forces,” he emphasized, pointing out that the report documented the Rwandan army’s presence inside Congolese territory, in violation of his country’s sovereignty and territorial independence. Such actions constituted acts of aggression and must be condemned. Rwanda had denied but could not refute the proof of its destabilization efforts in the Democratic Republic of the Congo, he declared. In July 2013, the Congolese Government had requested the extradition of four M23 leaders from Rwanda, yet the latter had never responded to that request. The Council should urge both Rwanda and Uganda to cooperate in arresting and handing over those criminals to Congolese judicial bodies. Sanctions, if targeted and rigorously imposed, would set the conditions needed for a rapid return to peace in the Democratic Republic of the Congo and the region, while preventing the illegal exploitation of Congolese natural resources by foreign-backed rebels, he said. All the information provided on FDLR should have led to a resolution on Rwanda and the genocide, in which the Democratic Republic of the Congo had had no involvement at all. Mr. Gasana (Rwanda), taking the floor a second time, pointed out that the Democratic Republic of the Congo was more than 80 times his country’s size, yet the contrary would appear to be true given his counterpart’s remarks. The fact was that the Democratic Republic of the Congo was “big and rich”, while Rwanda was small, landlocked and moving beyond its past. It would have been appropriate for the Congolese delegate to thank the President of Uganda for all his efforts to guarantee stability in the region. As for the illegal exploitation of Congolese resources, he said Rwanda was ready to help stabilize the neighbouring country, as it had done after the genocide, he said, adding that his Congolese counterpart might not have been present today had Rwanda not chosen to do so. Rwanda had no reason to destabilize its neighbour, he stressed. Recalling that he had repeatedly called for something to be done about Rwandan members of M23 over the past year, he said people had sat idly by. “What do you want us to do?” If the Human Rights Council did not want to do its work, perhaps an international tribunal could deal with those individuals, he suggested. “We abide by international law,” he said, adding that the time had come to stop harping on about Rwanda. While the 1994 genocide had been perpetrated by Rwandans against Rwandans, some of them now lived in the Democratic Republic of the Congo, and if that country continued to help people who harboured a “mentality of genocide”, the two countries would never move beyond “this chapter”. Mr. Gata Mavita wa Lufuta ( Democratic Republic of the Congo) responded by saying that his country did not have to take orders from the Rwandan representative, and it was not for him to forbid his country from appearing before the Council to outline its views. It was the Group of Experts that had outlined the facts, and if Rwanda had any objections, it should address itself to them. The Democratic Republic of the Congo was a sovereign country and must be respected, he stressed. It had chosen a constructive solution because it wanted peace within its territory and with its neighbours. “We want to have a dialogue with people who are sincere,” he insisted, not with those who said “yes”, but really meant “no”. He said that neither Rwanda nor Uganda had respected the Framework Agreement, as made clear by the Special Envoy to the Great Lakes Region. As for FDLR, the Congolese Government had requested the Group of Experts to share information so that it could carry out investigations. MONUSCO could offer evidence that FDLR members had been made available to Rwanda, he said, adding that they had then been “recycled” and sent back to continue fomenting trouble in the Democratic Republic of the Congo. “Don’t come here and tell us they’re going to help us,” he said, stressing that his country wanted peace so that the region could move forward. The meeting began at 10:15 a.m. and ended at 11 a.m. Resolution The full text of resolution 2136 (2014) reads as follows: “The Security Council, “Recalling its previous resolutions and the statements of its President concerning the Democratic Republic of the Congo (DRC), “Reaffirming its strong commitment to the sovereignty, independence, unity and territorial integrity of the DRC as well as all States in the region and emphasizing the need to respect fully the principles of non-interference, good neighbourliness and regional cooperation, “Stressing the primary responsibility of the Government of the DRC for ensuring security in its territory and protecting its civilians with respect for the rule of law, human rights and international humanitarian law, “Taking note of the interim report (S/2013/433) and the final report (S/2014/42) of the Group of Experts on the DRC (“the Group of Experts”) established pursuant to resolution 1771 (2007) and extended pursuant to resolutions 1807 (2008), 1857 (2008), 1896 (2009), 1952 (2010), 2021 (2011) and 2078 (2012) and of their recommendations, “Welcoming the declaration of the end of the 23 March Movement (M23), the corresponding declaration by the Government of DRC, and the signing in Nairobi on 12 December 2013 of the documents concluding the Kampala talks facilitated by Uganda as president of the International Conference of the Great Lakes Region (ICGLR), while stressing the importance of ensuring that the M23 does not regroup and resume military activities, in line with the Nairobi declarations and relevant United Nations Security Council resolutions, “Reiterating its deep concern regarding the security and humanitarian crisis in eastern DRC due to ongoing military activities of foreign and domestic armed groups, stressing the importance of neutralizing all armed groups, including the Democratic Forces for the Liberation of Rwanda (FDLR), the Allied Democratic Forces (ADF), the Lord’s Resistance Army (LRA), and various Mayi Mayi groups, in line with resolution 2098 (2013), “Reiterating its strong condemnation of any and all internal or external support to armed groups active in the region, including through financial, logistical and military support, “Condemning the illicit flow of weapons within and into the DRC in violation of resolutions 1533 (2004), 1807 (2008), 1857 (2008), 1896 (2009), 1952 (2010), 2021 (2011) and 2078 (2012), and declaring its determination to continue to monitor closely the implementation of the arms embargo and other measures set out by its resolutions concerning the DRC, “Acknowledging in this respect the important contribution the Council-mandated arms embargo makes to countering the illicit transfer of small arms and light weapons in the DRC, and in supporting post-conflict peacebuilding, disarmament, demobilization and reintegration and security sector reform, “Recalling the linkage between the illegal exploitation of natural resources, including poaching and illegal trafficking of wildlife, illicit trade in such resources, and the proliferation and trafficking of arms as one of the major factors fuelling and exacerbating conflicts in the Great Lakes region of Africa, and encouraging the continuation of the regional efforts of the ICGLR and the governments involved against the illegal exploitation of natural resources, and stressing, in this regard, the importance of regional cooperation and deepening economic integration with special consideration for the exploitation of natural resources, “Noting with great concern the persistence of serious human rights abuses and humanitarian law violations against civilians in the eastern part of the DRC, including summary executions, sexual and gender-based violence and large-scale recruitment and use of children committed by armed groups, “Noting with deep concern reports and allegations indicating the persistence of serious human rights and international humanitarian law violations committed by Congolese armed forces (FARDC), including those committed with impunity, “Noting with deep concern reports indicating FARDC collaboration with the FDLR at a local level, recalling that the FDLR is a group under United Nations sanctions whose leaders and members include perpetrators of the 1994 genocide against the Tutsi in Rwanda, during which Hutu and others who opposed the genocide were also killed, and have continued to promote and commit ethnically based and other killings in Rwanda and in the DRC, and stressing the importance of permanently addressing this threat, “Calling for all those responsible for violations of international humanitarian law and violations or abuses of human rights, as applicable, including those involving violence or abuses against children and acts of sexual and gender-based violence, to be swiftly apprehended, brought to justice and held accountable, “Welcoming the efforts of the United Nations Secretary-General as well as of the ICGLR, the Southern African Development Community (SADC) and the African Union (AU), to restore peace and security in eastern DRC, “Welcoming the signing in Addis Ababa on 24 February 2013 of the Peace, Security and Cooperation Framework for the Democratic Republic of the Congo and the region (“the PSC Framework”) and the nomination of Special Envoy Mary Robinson, andreiterating the need for all signatories to fulfil promptly, fully and in good faith their respective commitments, “Taking note of the Declaration of the Summit of the Heads of State and Government of the ICGLR on the Promotion of Peace, Security, Stability and Development in the Great Lakes Region held in Luanda on 15 January 2014, “Recalling all its relevant resolutions on women and peace and security, on children and armed conflict, and on the protection of civilians in armed conflicts, “Calling on all parties to cooperate fully with the United Nations Organization Stabilization Mission in the DRC (MONUSCO), reiterating its condemnation of any attacks against peacekeepers, and emphasizing that those responsible for such attacks must be brought to justice, “Determining that the situation in the DRC continues to constitute a threat to international peace and security in the region, “Acting under Chapter VII of the Charter of the United Nations, “1. Decides to renew until 1 February 2015 the measures on arms imposed by paragraph 1 of resolution 1807 (2008) and reaffirms the provisions of paragraphs 2, 3 and 5 of that resolution and further decides that the measures on arms imposed by paragraph 1 of resolution 1807 (2008) shall not apply to the supply of arms and related material, as well as assistance, advice or training, intended solely for the support of or use by the African Union-Regional Task Force; “2. Decides to renew, for the period specified in paragraph 1 above, the measures on transport imposed by paragraphs 6 and 8 of resolution 1807 (2008) and reaffirms the provisions of paragraph 7 of that resolution; “3. Decides to renew, for the period specified in paragraph 1 above, the financial and travel measures imposed by paragraphs 9 and 11 of resolution 1807 (2008) and reaffirms the provisions of paragraphs 10 and 12 of that resolution regarding the individuals and entities referred to in paragraph 4 of resolution 1857 (2008) and reaffirms the provisions of paragraphs 10 and 12 of resolution 1807 (2008) in relation to those measures; “4. Decides that the measures referred to in paragraph 3 above shall apply to the following individuals, and, as appropriate, entities, as designated by the Committee: (a) Individuals or entities acting in violation of the measures taken by Member States in accordance with paragraph 1 above; (b) Political and military leaders of foreign armed groups operating in the Democratic Republic of the Congo who impede the disarmament and the voluntary repatriation or resettlement of combatants belonging to those groups; (c) Political and military leaders of Congolese militias, including those receiving support from outside the DRC, who impede the participation of their combatants in disarmament, demobilization and reintegration processes; (d) Individuals or entities operating in the DRC and recruiting or using children in armed conflict in violation of applicable international law; (e) Individuals or entities operating in the DRC and involved in planning, directing, or participating in the targeting of children or women in situations of armed conflict, including killing and maiming, rape and other sexual violence, abduction, forced displacement, and attacks on schools and hospitals; (f) Individuals or entities obstructing the access to or the distribution of humanitarian assistance in the DRC; (g) Individuals or entities supporting armed groups in the DRC through illicit trade of natural resources, including gold or wildlife as well as wildlife products; (h) Individuals or entities acting on behalf of or at the direction of a designated individual or entity, or acting on behalf of or at the direction of an entity owned or controlled by a designated individual or entity; (i) Individuals or entities who plan, direct, sponsor or participate in attacks against MONUSCO peacekeepers; (j) Individuals or entities providing financial, material, or technological support for, or goods or services to, or in support of a designated individual or entity. “5. Requests the Secretary-General to extend, for a period expiring on 1 February 2015, the Group of Experts established pursuant to resolution 1533 (2004) and renewed by subsequent resolutions and requests the Group of Experts to fulfil its mandate as set out in paragraph 18 of resolution 1807 (2008) and expanded by paragraphs 9 and 10 of resolution 1857 (2008), and to present to the Council, through the Committee, a written midterm report by 28 June 2014, and a written final report before 16 January 2015, welcomes the practice of receiving additional updates from the Group of Experts as appropriate, and further requests that, after a discussion with the Committee, the Group of Experts submit to the Council its final report upon termination of the Group’s mandate; “6. Strongly condemns all armed groups operating in the region and their violations of international humanitarian law as well as other applicable international law, and abuses of human rights including attacks on the civilian population, MONUSCO peacekeepers and humanitarian actors, summary executions, sexual and gender-based violence and large-scale recruitment and use of children, and reiterates that those responsible will be held accountable; “7. Demands that the Democratic Forces for the Liberation of Rwanda (FDLR), the Allied Democratic Forces (ADF), the Lord’s Resistance Army (LRA) and various Mayi Mayi groups cease immediately all forms of violence and other destabilizing activities and that their members immediately and permanently disband, lay down their arms and demobilize children from their ranks; “8. Calls upon all States, especially those in the region, to take effective steps to ensure that there is no support, in and from their territories, for the armed groups in the eastern part of the DRC, welcoming the positive international developments in regard to addressing the risks posed by armed group leaders in the diasporas, and calls upon all States to take steps, where appropriate, against leaders of the FDLR and other armed groups residing in their countries; “9. Demands that the Government of the DRC, per its commitments in the Nairobi Declarations of 12 December 2013, accelerate the implementation of its disarmament, demobilization and reintegration programme, in coordination with the United Nations, international organizations and neighbouring countries where former M23 combatants have found refuge, requests, in this respect, and in accordance with the Nairobi declarations and in line with commitments under the PSC Framework agreement, the United Nations and international organizations to work together with neighbouring States to urgently address the situation of former M23 combatants located in their territories, andstresses the importance of ensuring that the M23 does not regroup and resume military activities, in line with the Nairobi declarations and relevant United Nations Security Council resolutions; “10. Welcomes the progress made to date by the Government of the DRC on ending the use of children in armed conflict and urges the Government of the DRC to follow through on its commitments made in the action plan signed with the United Nations detailing concrete, time-bound measures to release and reintegrate children associated with the Congolese armed forces and to prevent further recruitment, and for the protection of girls and boys from sexual violence; “11. Stresses the importance of the Government of the DRC actively seeking to hold accountable those responsible for war crimes and crimes against humanity in the country and of regional cooperation to this end, including through its ongoing cooperation with the International Criminal Court, encourages MONUSCO to use its existing authority to assist the Government of the DRC in this regard, and callson all signatories of the PSC Framework Agreement to continue to implement their commitments and cooperate fully with one another and the Government of the DRC, as well as MONUSCO to this end; “12. Recalling that there should be no impunity for any of those responsible for violations of international humanitarian law and violations and abuses of human rights in the DRC and the region, and, in this regard, urging the DRC, all countries in the region and other concerned United Nations Member States to bring perpetrators to justice and hold them accountable; “13. Decides that the measures imposed by paragraph 9 of resolution 1807 (2008) shall not apply as per the criteria set out in paragraph 10 of resolution 2078; “14. Reiterates its support to the Expanded Joint Verification Mechanism (EJVM), and welcomes the decision of the ICGLR to grant permanent representation of MONUSCO in the EJVM; “15. Calls on the Government of the DRC to enhance stockpile security, accountability and management of arms and ammunition, with the assistance of international partners, to address urgently reports of diversion to armed groups, as necessary and requested, and to urgently implement a national weapons marking programme, in particular for state-owned firearms, in line with the standards established by the Nairobi Protocol and the Regional Centre on Small Arms; “16. Recalls the mandate of MONUSCO to monitor the implementation of the arms embargo, in cooperation with the Group of Experts, and in particular to observe and report on flows of military personnel, arms or related materiel across the eastern border of the DRC, including by using surveillance capabilities provided by unmanned aerial systems, seize, collect and dispose of arms or related materiels whose presence in the DRC violates the measures imposed by paragraph 1, in accordance with paragraph 12 c) of paragraph 2098 (2013); “17. Requests MONUSCO to assist the Committee established pursuant to paragraph 8 of resolution 1533 (2004) and the Group of Experts established by the same resolution, within its capabilities, including by passing information relevant to the implementation of the sanctions measures; “18. Emphasizes the primary responsibility of the Government of the DRC to reinforce State authority and governance in eastern DRC, including through effective security sector reform to allow army, police and justice sector reform, and to end impunity for violations and abuses of human rights and violations of international humanitarian law, urges the Government of the DRC to increase efforts in this regard, in accordance with its national commitments under the PSC framework and further encourages the continuation of efforts by the Government of the DRC to address issues of illegal exploitation and smuggling of natural resources; “19. Welcomes in this regard the measures taken by the Congolese Government to implement the due diligence guidelines on the supply chain of minerals, as defined by the Group of Experts and the Organization for Economic Cooperation and Development, and calls on all States to assist the DRC, the ICGLR and the countries in the Great Lakes region in the implementation of the guidelines; “20. Welcomes measures taken by the Governments in the region, in particular Rwanda and the DRC, to implement the due diligence guidelines, including adopting the Regional Certification Mechanism (RCM) of the ICGLR into their national legislation, in accordance with OECD Guidance and international practice, and requests the extension of the certification process to other Member States in the region as recommended by the Luanda Declaration of 15 January 2014; “21. Encourages a swift response by the ICGLR to put in place the necessary technical capacity required to support Member States in their fight against the illegal exploitation of natural resources, and further encourages the ICGLR to take immediate actions to fully implement the mineral certification process; “22. Encourages all States, particularly those in the region, to continue to raise awareness of the Group of Experts due diligence guidelines, and to continue efforts to end mineral smuggling, in particular in the gold sector as part of broader efforts to mitigate the risk of further financing armed groups and criminal networks within the FARDC; “23. Reaffirms the provisions of paragraphs 6 to 13 of resolution 1952 (2010) and requests the Group of Experts to continue to study the impact of due diligence; “24. Reaffirms the provisions of paragraphs 7 to 9 of resolution 2021 (2011) and reiterates its call to the DRC and States in the Great Lakes region to require their customs authorities to strengthen their control on exports and imports of minerals from the DRC, and to cooperate at the regional level to investigate and combat regional criminal networks and armed groups involved in the illegal exploitation of natural resources, including wildlife poaching and trafficking; “25. Recalls the mandate of MONUSCO to support the Congolese authorities in the implementation of their national commitments under the PSC Framework agreement, in line with resolution 2098 (2013), and notes that MONUSCO should play a role in preventing the provision of support to armed groups from illicit activities, including production and trade in natural resources, notably by carrying out spot checks and regular visits to mining sites, trade routes and markets, in the vicinity of the five pilot trading counters; “26. Expresses its full support to the United Nations Group of Experts of the 1533 Committee and calls for enhanced cooperation between all States, particularly those in the region, MONUSCO and the Group of Experts, encourages further that all parties and all States ensure cooperation with the Group of Experts by individuals and entities within their jurisdiction or under their control and reiterates its demand that all parties and all States ensure the safety of its members and its support staff, and that all parties and all States, including the DRC and countries of the region, provide unhindered and immediate access, in particular to persons, documents and sites the Group of Experts deems relevant to the execution of its mandate; “27. Calls upon the Group of Experts to cooperate actively with other relevant panels of experts, in particular that on Côte d’Ivoire re-established by paragraph 13 of resolution 1980 (2011) with respect to natural resources, and that on Somalia re‑established by paragraph 27 of resolution 2111 (2013) with respect to the activities of the ADF and Al-Shabaab; “28. Calls upon all States, particularly those in the region and those in which individuals and entities designated pursuant to paragraph 3 of this resolution are based, to regularly report to the Committee on the actions they have taken to implement the measures imposed by paragraphs 1, 2, and 3 and recommended in paragraph 8 of resolution 1952 (2010); “29. Decides that, when appropriate and no later than 1 February 2015, it shall review the measures set forth in this resolution, with a view to adjusting them, as appropriate, in light of the security situation in the DRC, in particular progress in security sector reform including the integration of the armed forces and the reform of the national police, and in disarming, demobilizing, repatriating, resettling and reintegrating, as appropriate, Congolese and foreign armed groups, with a particular focus on children among them; “30. Decides to remain actively seized of the matter.” * *** * For information media • not an official record For information media. Not an official record. Search Daily Noon Briefing The Secretary-General is in Kuwait, where he will participate in the third pledging conference for Syria. Earlier today, he visited Baghdad, where he met with Prime Minister Haider al-Abadi, President Fuad Masum and Speaker Saleem al-Jabouri. He also spoke by phone with President Massoud Barzani of the Kurdistan Regional Government.
Q: Laptop display is fully white, but only in Windows I am using an HP ProBook 4540s with Windows 7 Professional as the OS. Specs can be found here. The issue began when pressure was applied to the laptop body (on the front edge and the back of the display/lid) during use. The screen would go entirely white. Could originally be corrected by closing and opening the laptop 3-10 times successively. Presently, the display will work perfectly during booting up and logging on, but as soon as Windows finishes loading, the display goes white. Connecting an external monitor and having the display config. set to extend or share screens allows for both the laptop and external monitors to work normally. Disconnecting the external monitor causes the laptop display to go entirely white again. Shaking device while inverted momentarily restores the display to working order, goes white when upright again. This only rarely works now. Graphics cards are Radeon hd 7650M as well as Intel(R) HD Graphics 4000. Drivers appear up to date. On the Intel card, atikmpag.sys is not digitally signed, but driver updates do not sign it. The graphics cards appear to be interfering with each other when only using the laptop display. Disabling either graphics card causes the laptop display to function normally, but disables the external monitor. While only one graphics card is running, the laptop does not recognize any external monitor connected to it. While one card is running, the laptop display can work without being connected to another monitor. Booting up the laptop with Linux via an external drive causes the display to function without error. My goal is to get the laptop display to work normally while running Windows 7 professional and to no longer necessitate the use of an additional monitor while having both graphics cards running. How would I go about correcting this issue? A: Solved: I opened up the settings for the Intel graphics card. At the top left there is a drop down menu for 'Select Displays'. I then set it to built-in, saved settings, reopened the drop down, and then selected built-in a second time and saved. This fixed the problem. Selecting it both times in a row was necessary. The laptop no longer requires the disabling of graphics cards in order to use the built-in display while running Windows 7. I don't know why this worked now. When this whole fiasco started, it had been set to target the built-in monitor. At the time, I had never used an external monitor with it before; I hadn't even opened this menu prior to then. Swapping the graphics card setting between the external monitor and the built-in monitor was not changing anything. I have opened up this menu 50+ times these past three months and had played with this setting virtually every time in my efforts to fix this problem. This should not have worked. Thanks to everyone for your advice.
Q: Uber API Price Estimates for Promotional/Experimental Product I understand that the Uber Products Endpoint (GET /v1/products) will not return experimental or promotional products such as UberPOOL and UberFRESH. Does the Price Estimate Endpoint (GET /v1/estimates/price) return price estimates of those experimental/promotional products? A: Yes, the Price Estimate Endpoint returns price estimates including the experimental/promotional products. The uber api documentation only states that the products endpoint does not include the experimental products.
How to Prepare Kale: Five Simple Recipes for You Kale will have to be one of my top five vegetables of all time. Of course, we know how nutritious this superfood is. It is rich in cancer-fighting antioxidants, aside from having lots of vitamins and minerals. And do you know that it promotes weight loss, too? While it may taste bitter to some, I find it very flavorful. Perhaps it’s more of an acquired taste, as I have learned how to appreciate its flavor through the years. In this post, I will share with you some of the simplest kale recipes. It is my hope that by following any (or all, if you can) of these recipes, you will eventually develop a liking for this super food. Kale Chips Let’s start with a very simple snack that you can serve to your friends and kids. It's crispy and salty, just like your favorite potato chips. But it is definitely a lot more nutritious. The ingredients are : A bunch of kale Seasoned salt Olive oil Follow these steps : check Preheat the oven to a temperature of 350 degrees Fahrenheit. check Line a cookie sheet with parchment paper. check Carefully remove the leaves of the kale using a knife. Cut it into bite size pieces. check Wash the kale thoroughly and dry it with a salad spinner. check Sprinkle with salt and olive oil. check Bake the kale for 15 minutes or until the edges are colored brown. This snack should serve 2-3 people. Wash the kale thoroughly and dry it with a salad spinner. Sprinkle with salt and olive oil. Bake the kale for 15 minutes or until the edges are colored brown. Kale pesto A bottle of A bowl of Kale Pesto, a bowl of Kale Pesto and a spoon of Kale Pesto This is another simple recipe that should not take you more than 5 minutes to finish. I am not kidding-- that’s how easy to prepare this dish is! You will need the following Ingredients: check Olive oil (about ½ cup) check 2-3 cups of torn kale and parsley check 1 medium clove of garlic check ½ cup of raw almonds check ¼ teaspoon of salt check Juice of one lemon Prepare the kale pesto by following these steps: Add the kale, salt, olive oil, garlic, and lemon juice in a blender or a food processor. Blend until the mixture is smooth. Add the almonds to the mixture. Grind until it reaches desired consistency. That’s it! You can now spread this pesto to a sandwich, or top it to pasta or pizza. A cup of this pesto should make around 7 to 8 servings. You might wonder why there’s no basil in this recipe. I tried to use basil once but I just didn’t like how it blended with the rest of the ingredients. But this doesn’t mean you can’t try it. Kale soup A bowl of Kale Soup and a spoon This dish isn’t the quickest to prepare or cook in this list. It also doesn’t have the shortest list of ingredients. But I can assure you that it will make you feel satisfied. It’s also a great comfort food to have during those frosty winter mornings. Footer Keep In Touch Disclaimer All information on this website is intended for entertainment and educational purposes only. It is not a replacement or substitute for professional medical advice and/or treatment. Consult with your own doctor for information and advice on your specific questions. All wallpapers and backgrounds found here are believed to be in the “public domain”. Most of the images displayed are of unknown origin. We do not intend to infringe any legitimate intellectual right, artistic rights or copyright. If you are the rightful owner of any of the pictures/wallpapers posted here, and you do not want it to be displayed or if you require a suitable credit, then please CONTACT US and we will immediately do whatever is needed either for the image to be removed or provide credit where it is due. All the content of this site are do not gain any financial benefit from the downloads of any images/wallpaper. We’re an affiliate! Simplyhealthyfamily.org is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. As an Amazon Associate we earn from qualifying purchases. Additionally, Simplyhealthyfamily.org participates in various other affiliate programs, and we sometimes get a commission through purchases made through our links. Amazon and the Amazon logo are trademarks of Amazon.com, Inc., or its affiliates.
FADE IN: INT. A HOUSE - CANADA, 1845 YOUNG HUGH JACKMAN, who kind of resembles the kid from FREAKS AND GEEKS, is sick in bed. His brother, YOUNG LIEV SCHREIBER, glowers over him while his father, PETER O'BRIEN, looks on. YOUNG HUGH JACKMAN Father! I had a terrible nightmare! I was hosting the Oscars, and I was part of this incredibly embarrassing musical number and-- PETER O'BRIEN Shh, it's alright son. You're safe now, back in Canada in 1845. YOUNG HUGH JACKMAN Wait, what? Canada wasn't even a country until 1867. Has Hollywood managed to not discover Wikipedia yet? Suddenly, there is a RUCKUS downstairs. PETER O'BRIEN It sounds like your brother's biological father is downstairs. I'll be back in a minute, barring some tragic death that you'd expect to shape the very hairy man you will become but won't. He goes downstairs and is SHOT. YOUNG HUGH, who suddenly doesn't seem to be bedridden with illness, runs downstairs. Seeing PETER dead, his knuckles get an ERECTION and he stabs YOUNG LIEV SCHREIBER'S father, AARON JEFFERY. AARON JEFFERY He wasn't your father. I was. You'll have awesome mutton chops. (dies) YOUNG HUGH JACKMAN I'm so confused, who the hell is related to whom then? YOUNG LIEV SCHREIBER The only thing I know for certain is that mom's a slut. YOUNG HUGH JACKMAN Well, the women in the audience didn't come to see some pale kid in a robe. We should go ahead and skip to shirtless adulthood. YOUNG LIEV SCHREIBER Yeah, let's go fight for our country in war! YOUNG HUGH JACKMAN We're Canadian, buddy. YOUNG LIEV SCHREIBER Let's go fight for the United States in war for some reason! HUGH and LIEV grow up and fight in the American Civil War, World War I, World War II, and the Vietnam War. Eventually LIEV tries to rape someone, but his squad tries to stop him at gunpoint. Despite the fact that he knows bullets can't hurt LIEV, HUGH JACKMAN stops them and needlessly shows them his claws as well to move the story along. They get a visit from DANNY HUSTON. DANNY HUSTON I heard you guys have some powers. HUGH JACKMAN Yes, I can heal myself and grow huge bone claws. LIEV SCHREIBER And I can heal myself and grow my fingernails out an inch or so. DANNY HUSTON Growing fingernails? Wasn't that Meg Griffin's power in an episode of Family Guy? LIEV SCHREIBER I also can grow slightly less stupid-looking facial hair than Hugh. DANNY HUSTON I'd like you both to join my mutant team, it's mostly made up of actors who were written off of Lost. HUGH JACKMAN I'll join your team without any apparent surprise at the existence of other mutants. HUGH and LIEV join DANNY'S TEAM: KEVIN DURAND, DOMINIC MONAGHAN, DANIEL HENNEY, WILL.I.AM, and RYAN REYNOLDS. DANIEL HENNEY I'm Daniel, I have really good aim with guns that already have scopes on them. WILL.I.AM I have a combination of Nightcrawler's power and the power to make any credits sequence look stupid using only my name. DOMINIC MONAGHAN I have the power to control electrical objects. When the plot requires it, I can also control mechanical objects. Hold on while I land this plane. KEVIN DURAND I have indestructible skin and eventually I turn into a huge fat guy named The Blob after I go on my all-Arby's diet. Despite my skin power, I got a tattoo that has no relevance to the plot and only serves to make it more difficult to understand what my power is. RYAN REYNOLDS I'm good with swords. I also have the power to take completely unfunny lines and deliver them so sarcastically that the audience thinks they're jokes. LIEV SCHREIBER You look familiar. Aren't you Blade's buddy? Shouldn't there be a rule against an actor playing two different characters from the Marvel universe? Unless you're Rebecca Romijn and you're nude and painted blue for one of them, obviously. HUGH JACKMAN So let's see, the leftover Marvel comics characters we got for this movie are a guy with extremely good aim, someone who uses various sharp metal weapons, and a ridiculously fat guy. Did I walk onto the set for Daredevil? They all break into a building to steal some METEORITE while LIEV SCHREIBER is wire-lifted into the roof of the building to apparently do absolutely nothing. They kill twenty or so people, but when they kill the twenty-first person HUGH protests. HUGH JACKMAN That's enough! I didn't sign up for this. DANNY HUSTON What exactly did you think you were signing up for? HUGH JACKMAN I'm not sure, but you guys are so boring that it's making me miss Halle Berry and that's downright criminal. I'm out of here. HUGH leaves to go be a lumberjack in CANADA, eh. EXT. CANADA - 6 YEARS LATER HUGH leaves his house at the top of a mountain and starts his four-hour commute to work. After his girlfriend, LYNN COLLINS, cuts his dick off and feeds it to him in front of his workmates, he gets a visit from DANNY HUSTON. DANNY HUSTON Someone is going around killing our old team members. Dominic Monaghan is dead. HUGH JACKMAN How entirely unlike Watchmen. DANNY HUSTON An autopsy revealed he was extremely disinterested when he was killed, which makes me think it must have been Liev Schreiber. HUGH JACKMAN Somehow, it doesn't even occur to me that my girlfriend may be in danger. Go away. LIEV kills LYNN COLLINS, sending HUGH into a HAIRY RAGE. He tracks down LIEV and they FIGHT. LIEV SCHREIBER Person who fights with the poorest wirework wins! LIEV beats HUGH by dropping a bunch of LOGS THAT DON'T OBEY THE LAWS OF PHYSICS on him. DANNY HUSTON Alright, people have had enough of this mysterious background nonsense. Let's get you some metal claws so we can have another fight scene. HUGH JACKMAN Then why did we even bother making a prequel? Didn't we learn enough about how I got the metal claws in the second X-Men movie? DANNY HUSTON It wasn't quite covered in unnecessary excruciating detail. That's really the point of this movie, if you couldn't tell by the excruciatingly detailed title, which helpfully lets audience members know that this isn't a movie about just anyone named Wolverine, but specifically the one from X-Men. HUGH JACKMAN At least it's better than the draft title, X-Men Origins: Wolverine, The Guy With The Claws That's In The Other Three X-Men Movies But This One Happens Before Those. HUGH has his skeleton coated in METAL, which also coincidentally shapes his ROUND BONE CLAWS into nice sharp blades. DANNY HUSTON It worked! Alright, now that he can't be defeated and there's no way whatsoever for us to control him, let's kill him. This FAILS. HUGH jumps out of his WATER TANK and escapes after apparently taking the time to completely dry himself and his hair. He hides out on JONATHAN AND MARTHA KENT'S FARM. EXT. SOME FARM - STILL IN CANADA I GUESS JONATHAN KENT finds HUGH in his BARN, naked. JONATHAN KENT Rather than call the police, I'm going to invite you into my house. That's how we roll in Canada. HUGH goes to the bathroom and stares at his claws a bit. HUGH JACKMAN I can't believe this. JONATHAN KENT What, that you survived having your skeleton coated in indestructible metal? HUGH JACKMAN No, that my computer-generated claws somehow look even less real in this movie than they did in a movie that came out nine fucking years ago. JONATHAN KENT No kidding. This hardly looks any better than the leaked workprint. (pause) Errrrr, uh, so I've heard! (pause) Please don't fire me, Fox! JONATHAN is SHOT by DANIEL HENNEY. HUGH JACKMAN No! I can't believe the ultra powerful government agency that tracked me to the remote Canadian Rockies was able to track me to this farm! JONATHAN KENT I want you to take this leather jacket and motorcycle. They used to belong to my son, but what's that asshole ever done for me besides not attract a mutant assassin to my home to murder me and my wife? (dies) HUGH JACKMAN At long last, the secret behind some leather jacket is finally revealed! Now that's what I call an origin story! HUGH launches himself at DANIEL'S HELICOPTER, DIE HARD STYLE, and cuts through the helicopter like WARM BUTTER. The HELICOPTER crashes. DANIEL HENNEY You can't kill me, Hugh. You hate me, so you wouldn't be able to kneel next to my dead body and scream into the sky as the camera zooms out above you. HUGH JACKMAN That's true, but I could ignite your helicopter fuel and walk away in slow motion as it explodes behind me. DANIEL HENNEY Damn, an even more overused cliche. Touche, Hugh. HUGH does this, then apparently rides his motorcycle 1,200 miles to LAS VEGAS in a day. INT. GYMNASIUM - LAS VEGAS HUGH finds WILL.I.AM and KEVIN DURAND WEARING THE FAT BASTARD MAKEUP. HUGH JACKMAN Holy crap Kevin, what that hell have you done for the last 6 years? KEVIN DURAND Well I starred in my own spin-off: Glutty Professor 2: The Blobs. WIL.I.AM Are you looking for Liev? Because he and Danny work together on some island, rounding up mutants to build some kind of supermutant. That's why he wanted to experiment on you: to get your super-healing DNA. HUGH JACKMAN Why did he bother actually giving me the adamantium, then? WILL.I.AM Dude, just give up on trying to get this movie to make sense and go have another CGI fight scene. KEVIN DURAND If you want to find the island, you need to visit this guy that escaped named Taylor Kitsch. They call him Gambit since that's the only X-Men character anyone gives a shit about who hasn't been in a movie yet. HUGH JACKMAN What better way could you treat a well-loved X-Men character than with an awkward, pointless cameo? HUGH hops on his motorcycle and rides 1,700 miles to NEW ORLEANS. INT. BAR - NEW ORLEANS HUGH finds TAYLOR KITSCH playing POKER and making cards float around in the air, because other poker players just love it when their opponents display superhuman abilities with cards. HUGH JACKMAN Are you Geeymmbit? (coughs) Sorry, kangaroo in my throat. Gambit. TAYLOR KITSCH Depends, am I going to have to star in my own X-Men Origins movie if I am? HUGH JACKMAN I doubt it, your performance will probably kill any chances of that happening. TAYLOR KITSCH Then yes. How can I help you awkwardly force the plot forward? HUGH JACKMAN I need you to get me back to the island where Liev Schreiber is hiding. I want to kill him. Suddenly, LIEV shows up and fights HUGH. TAYLOR, oblivious to the fact that HUGH is about to kill his nemesis, does nothing but get in HUGH'S way. HUGH knocks TAYLOR out, which apparently teleports him to the top of a nearby roof so he jumps down and stops HUGH again. LIEV gets away. HUGH JACKMAN Seriously? One of the coolest X-Men of all time and your role in the movie is just to get in the titular character's way like a bumbling sidekick? TAYLOR KITSCH How about I make it up to you by flying you 1,150 miles to Liev's hideout on Three Mile Island on my prop plane? HUGH JACKMAN My magic motorcycle could probably get me there in under 6 minutes, but fine. They fly to THREE MILE ISLAND, where LIEV and DANNY have imprisoned all of the X-MEN CHARACTERS that haven't been in a movie yet. INT. POWER PLANT - THREE MILE ISLAND HUGH frees a bunch of kids, including a YOUNG JAMES MARSDEN. YOUNG JAMES MARSDEN Thanks for freeing me, faceless stranger. I wish I could see you, but I have to wear a blindfold since I don't have the optic-blast-blocking sunglasses that I somehow managed to find or make or something. HUGH JACKMAN Great. Well, make sure you don't listen to any of your new friends when they tell you about the super-hairy guy with metal claws that freed you, otherwise the first X-Men movie won't even make as much sense as this piece of shit. HUGH JACKMAN finds DANNY HUSTON building a new SUPERMUTANT, SILENT RYAN REYNOLDS. DANNY HUSTON Hello Hugh. As you can see, I've sealed Ryan Reynolds's mouth shut. HUGH JACKMAN You took a character nicknamed "The Merc with a Mouth" and sealed said mouth shut? That's like making a Spiderman movie where he can't shoot web. Or a Fantastic Four movie that doesn't suck. DANNY HUSTON Just hold on a second while I type "Decapitate" into the application that controls Ryan. I have to type everything because we spent all our money on adamantium and couldn't afford Visual Basic licenses. RYAN REYNOLDS Decapitate: Permission Denied. DANNY HUSTON Ack! Sudo decapitate. RYAN REYNOLDS Huston is not in the sudoers file. This incident will be reported. DANNY HUSTON Fuck me, su root && decapitate! RYAN pushes ADAMANTIUM KATANAS out of his arms to fight HUGH while saying nothing, his lips sealed shut in a way that somehow prevents his new healing ability from repairing them. HUGH JACKMAN Fucking Deadpool has fucking retractable katanas? How does that even work, they're twice as long as his arms?! RYAN kicks HUGH'S ASS, so LIEV rescues him. LIEV SCHREIBER Nobody kills you but me, brother. HUGH JACKMAN Is that line really all we're going to do to justify the two of us working together? It's kind of disturbing to think of a screenwriter actually writing that line and then moving on. HUGH and LIEV fight RYAN. RYAN unleashes OPTIC BLASTS against LIEV, because apparently he has those too and he has better control over them than the mutant whose DNA he used. LIEV SCHREIBER Arrgghh! Somehow your optic blasts don't even burn my clothing! HUGH JACKMAN It's a good thing the audience doesn't know we both survive because of first X-Men movie, otherwise this scene would be utterly lacking any suspense! While RYAN is distracted, HUGH slices his head off and pushes him into a COOLING TOWER. The SILENT VILLIAN that wields DOUBLE BLADES falls down a large open SHAFT, his body SPLITTING as it falls. HUGH JACKMAN Awesome. We've managed to rip off the worst of the Star Wars movies now. Are we done yet or are there any more cool X-Men characters this movie wants to ruin? DANNY shows up with a gun loaded with ADAMANTIUM BULLETS. HUGH JACKMAN Adamantium bullets? Maybe you should try an adamantium stake through the heart or adamantium garlic while you're at it. DANNY HUSTON My understanding is also that you can't see your own reflection in an adamantium mirror. DANNY shoots HUGH in the head. HUGH JACKMAN Oh no, I can't remember anything! DANNY HUSTON Because shooting you in the head destroyed your memories? HUGH JACKMAN No, because this is the most unmemorable comic book movie since Catwoman. Who am I? Where am I? What year is it? DANNY HUSTON Well, it's 1979, not that the costuming or set decoration give you any indication that's the case. Here, have some 2009-era currency. THE CAMERA zooms into the sky, providing a bird's eye view of an island that goes out of its way not to actually look like THREE MILE ISLAND. X-MEN ORIGINS: THAT GUY THAT CAN MAKE LIGHT BULBS TURN ON WITH HIS MIND is rushed into production. END
--- abstract: 'We report on the first observation of a pronounced re-entrant superconductivity phenomenon in superconductor/ferromagnetic layered systems. The results were obtained using a superconductor/ferromagnetic-alloy bilayer of Nb/Cu$_{1-x}$Ni$_{x}$. The superconducting transition temperature $T_{c}$ drops sharply with increasing thickness $d_{CuNi}$ of the ferromagnetic layer, until complete suppression of superconductivity is observed at $d_{CuNi}\approx $4[ ]{}nm. Increasing the Cu$_{1-x}$Ni$_{x}$ layer thickness further, superconductivity reappears at $d_{CuNi}{\approx }$13[ ]{}nm. Our experiments give evidence for the pairing function oscillations associated with a realization of the quasi-one dimensional Fulde-Ferrell-Larkin-Ovchinnikov (FFLO) like state in the ferromagnetic layer.' author: - 'V. Zdravkov$^{1}$, A. Sidorenko$^{1}$, G. Obermeier$^{2}$, S. Gsell$^{2}$, M. Schreck$^{2}$, C. Müller$^{2}$, S. Horn$^{2}$, R. Tidecks$^{2}$, L.R. Tagirov$^{3}$' date: date title: 'Re-entrant superconductivity in Nb/Cu$_{1-x}$Ni$_{x}$ bilayers' --- The coexistence of superconductivity (S) and ferromagnetism (F) in a homogeneous material, described by Fulde-Ferrell and Larkin-Ovchinnikov (FFLO) [@FF; @LO], is restricted to an extremely narrow range of parameters [@Fulde]. So far no indisputable experimental evidence for the FFLO state exists. In general, superconductivity and ferromagnetism do not coexist, since superconductivity requires the conduction electrons to form Cooper pairs with antiparallel spins, whereas ferromagnetism forces the electrons to align their spins parallel. This antagonism can be overcome if superconducting and ferromagnetic regions are spatially separated, as for example, in artificially layered superconductor/ferromagnet (S/F) nanostructures (see, e.g. [@Chien], for an early review). The two long-range ordered states influence each other via the penetration of electrons through their common interface. Superconductivity in such a proximity system can survive, even if the exchange splitting energy $E_{ex}$ $\sim k_{B}\theta _{Curie}$ in the ferromagnetic layer is orders of magnitude larger than the superconducting order parameter $\Delta \sim k_{B}T_{c}$, with $T_{c}$ the superconducting transition temperature. Cooper pairs entering from the superconducting into the ferromagnetic region experience conditions drastically different from those in a non-magnetic metal. This is due to the fact that spin-up and spin-down partners in a Cooper pair occupy different exchange-split spin-subbands of the conduction band in the ferromagnet. Thus, the spin-up and spin-down wave-vectors of electrons in a pair, which have opposite directions, cannot longer be of equal magnitude and the Cooper pair acquires a finite pairing momentum [@Demler]. This results in a pairing function that does not simply decay as in a non-magnetic metal, but in addition oscillates on a characteristic length scale. This length scale is the magnetic coherence length $\xi _{F}$, which will be specified below. Various unusual phenomena follow from the oscillation of the pairing wave function in ferromagnets (see, e.g. the recent reviews [G-K-I,L-P,Buzdin05]{} and references therein). A prominent example is the oscillatory S/F proximity effect. It can be qualitatively described using the analogy with the interference of reflected light in a Fabry-Pérot interferometer at normal incidence. As the conditions change periodically between constructive and destructive interference upon changing the thickness of the interferometer, the flux of light through the interface of incidence is modulated. In a layered S/F system the pairing function flux is periodically modulated as a function of the ferromagnetic layer thickness $d_{F}$ due to the interference. As a result, the coupling between the S and F layers is modulated, and $T_{c}$ oscillates as a function of $d_{F}$. The most spectacular evidence for the oscillatory proximity effect would be the detection of the re-entrant behavior of the superconducting transition temperature as a function of $d_{F}$, which has been predicted theoretically [@Khus; @Tag1; @Tag2]. There is a sole report on the superconductivity re-entrance as a function of the ferromagnetic layer thickness in Fe/V/Fe trilayers [@Garif02]. Due to the very small thickness of the iron layers, at which the re-entrance phenomenon is expected (0.7-1.0 [nm]{}, i.e. 2-4 monolayers of iron only), the number of the experimental points $T_{c}(d_{F})$ is very small, with a large scattering of the results. The oscillation length $\xi _{F}=\hslash v_{F}/E_{ex}$ in strong ferromagnets, like iron, nickel or cobalt, is extremely short, because the exchange splitting energy $E_{ex}$ of the conduction band is in the range 0.1-1.0 eV [@Chien]. Here, $v_{F}$ is the Fermi velocity in the F material and $\hslash $ Planck’s constant. Ferromagnetic alloys, with $E_{ex} $ an order of magnitude smaller, allow the observation of the effect at larger thicknesses $d_{F}$ of about 5-10 nm. Such layers can be easier controlled and characterized. Another advantage using ferromagnetic alloys is that for a long-wavelength oscillation the atomic-scale interface roughness has no longer a decisive influence on the extinction of the $T_{c}$ oscillations. The S/F proximity effect has not only been studied using elemental ferromagnetic materials, but also for various ferromagnetic alloys [@Attanasio1; @Lohney1; @Bader1; @Ryazanov2; @Potenza; @Kim; @Attanasio2]. A non-monotonic dependence of $T_{c}$ *vs*. $d_{F}$ has been observed. In the present work, Nb was chosen as a superconductor and a Cu$_{1-x}$Ni$_{x}$ alloy with $x\approx 0.59$ for the ferromagnetic layer. In this alloy the magnetic momentum and Curie temperature show an almost linear dependence on the Ni concentration [@Vonsovsky]. For $x\approx 0.59$ we find $\theta _{Curie}\approx 170$ K. The samples were prepared by magnetron sputtering on commercial (111) silicon substrates at 300 K. The base pressure in the Leybold Z400 vacuum system was about 2$\times $10 $^{-6}$ mbar, pure argon (99.999%, Messer Griesheim) at a pressures of $8\times 10^{-3}$ mbar was used as sputter gas. Three targets, Si, Nb and Cu$_{1-x}$Ni$_{x}$ (75 mm in diameter), were pre-sputtered for 10-15 minutes to remove contaminations from the targets as well as to reduce the residual gas pressure from the chamber during the pre-sputtering of Nb, which acts as a getter material. Then, we first deposited a silicon buffer layer, using a RF magnetron to generate a clean interface for the subsequently deposited niobium layer. To average over spatial differences of the sputtering characteristics, we moved the target during the DC sputtering process of the Nb layer, obtaining a smooth Nb film of constant thickness $d_{Nb}$. The average growth rate of the Nb film was about 1.3 nm/sec, while the rate of the sputtering process was adjusted to 4 nm/sec, to reduce the amount of contaminations gettered into the Nb film. The Cu$_{1-x}$Ni$_{x}$ target [@Ryazanov3] was RF sputtered (rate 3 nm/sec) resulting in the same composition of the alloy in the film. As in our previous work [@Sidorenko] we deposited a wedge-shaped ferromagnetic layer to obtain a series of samples with varying ferromagnetic Cu$_{1-x}$Ni$_{x}$ layer thickness. To prepare this wedge, the 80 mm long and 7 mm wide silicon substrate was mounted at a distance of 4.5 cm from the Cu$_{1-x}$Ni$_{x}$ target symmetry axis to utilize the intrinsic spatial gradient of the deposition rate. To prevent the degradation of the Nb/Cu$_{1-x}$Ni$_{x}$ bilayers at atmospheric conditions, the bilayers were coated by a silicon layer of about 5 nm thickness. A sketch of the resulting wedge-like samples is presented in the inset of Fig. 1. Samples of equal length and width were cut from the wedge to obtain a set of 2.5 mm wide strips with varying Cu$_{1-x}$Ni$_{x}$ layer thickness. Aluminum wires of 50 $\mu $m in diameter were then attached to the strips by ultrasonic bonding for four-probe resistance measurements. Two batches of samples were prepared, one with $d_{Nb}\approx 7.3$ nm (S15), the other with $% d_{Nb}\approx 8.3$ nm (S16). After characterizing the samples by resistance measurements, Rutherford backscattering spectrometry (RBS) has been used to evaluate the thickness of the Nb and Cu$_{1-x}$Ni$_{x}$ layers as well as to check the concentration of Cu and Ni in the deposited alloy layers (Fig. 1). The applicability of this method for thickness determination has been demonstrated in our previous work [@Sidorenko]. It allows determining the thickness (via the areal density) of the layers with an accuracy of $\pm 3\%$ for Cu$_{1-x}$Ni $_{x}$ on the thick side of the Cu$_{1-x}$Ni$_{x}$ wedge, and $\pm 5\%$ for Nb and Cu$_{1-x}$Ni$_{x}$ on the thin side of the wedge. The measurements were performed with 3.5 MeV He$^{++}$ ions delivered by a tandem accelerator. The backscattered ions were detected under an angle of 170$% ^{\circ }$ with respect to the incident beam by a semiconductor detector. In order to avoid channeling effects in the Si substrate, the samples were tilted by 7$^{\circ }$ and azimuthally rotated during the measurement. The spectra were simulated using the RUMP computer program [@Doolittle]. From the deduced elemental areal densities of Nb and Cu$_{1-x}$Ni$_{x}$ alloy the thickness of the two layers was calculated using the densities of the respective metals. The results for the layer thickness and Cu$_{1-x}$Ni $_{x}$ alloy composition as a function of position on the substrate of batch S15 are shown in Fig. 1. The Ni concentration in the Cu$_{1-x}$Ni$_{x}$ layer is nearly constant showing a slight increase towards the thick side of the wedge. The thickness of the Nb layer is nearly constant along the wedge, $d_{Nb}$(S15)$\approx 7.3$ nm. The resistance measurements were performed in a $^{3}$He cryostat and a dilution refrigerator. The standard DC four-probe method was used, applying a sensing current of 10 ${\mu }$A in the temperature range 0.4 K-10 K and of 2 $\mu $A in the range 10 mK-1.0 K, respectively. The polarity of the current was alternated during the resistance measurements to eliminate possible thermoelectric voltages. The superconducting critical temperature $T_{c}$ was determined from the midpoints of the $R(T)$ curves at the superconducting transition (Fig. 2). The transition width (defined by the temperature interval in which the resistance changes from 0.1$R_{n}$ to 0.9$R_{n}$, with $R_{n}$ the normal state resistance just above the transition) was below 0.2 K for most of the investigated samples. The shift between transition measured for increasing and decreasing temperature was smaller than 15 mK. Figure 3 demonstrates for two values of the Nb layer thickness ($d_{Nb}\approx 8.3$ nm in Fig. 3a and $d_{Nb}\approx 7.3$ nm in Fig. 3b) the dependence of the superconducting transition temperature on the thickness of the Cu$_{1-x}$Ni$_{x}$ layer. For specimens with $d_{Nb}\approx 8.3$ nm the transition temperature $T_{c}$ reveals a non-monotonic behavior with a deep minimum at about $d_{CuNi}\approx 7.0$ nm. For $d_{Nb}\approx 7.3$ the transition temperature decreases sharply upon increasing the ferromagnetic Cu$_{1-x}$Ni$_{x}$ layer thickness, till $d_{CuNi}\approx 3.8$ nm. Then, in the range $d_{CuNi}\approx 4.0-12.5$ nm, the superconducting transition temperature vanishes (at least $T_{c}$ is lower than the lowest temperature measured in our cryogenic setup, *i.e.* 40 mK). For $d_{CuNi}>12.5$ nm a superconducting transition is observed again with $T_{c}$ increasing up to about 2 K. This phenomenon of re-entrant superconductivity is the most important finding of the present study. For the regions of values of $d_{CuNi}$ for which $T_{c}$ changes rapidly, the transition width is broader than 0.2 K, and the $R(T)$ curve appears slightly asymmetric with respect to the midpoint of the transition. This is probably due to the small variation of the thickness of the ferromagnetic layer within each sample, since they were cut from a wedge as described above. To compare the prediction of the theory for the $T_{c}(d_{F})$ dependence of Tagirov [@Tag1] with our experimental results, we followed closely the fitting procedure described in detail in reference [@Sidorenko]. The calculated curves of $T_{c}(d_{F})$ in Fig. 3 (a) and (b) agree qualitatively well with the measured values. The electron mean free path $l_{F}\approx 15$ nm for the ferromagnetic material used for the calculations appears surprisingly long for an alloy, in particular, since a value of $l_{F}\approx 4.4$ nm, was inferred from resistivity measurements on a Cu$_{1-x}$Ni$_{x}$ alloy with $x\approx 0.51$ [@Potenza]. The reason could be a more complicated character of the diffusion of Cooper pairs in the F material and its temperature dependence in such type of S/F-system than considered by the present version of the theory. The small cusp-like structure in the $T_{c}(d_{CuNi})$ dependence at $d_{CuNi}\approx 1$ nm cannot be explained by the existing theoretical approaches, *i.e.* neither the single-mode nor the multi-mode approximation [@Fominov; @Chun] can account for this structure. We presume that the case $d_{CuNi}<\xi _{F},l_{F}$ needs special consideration in the framework of the pure limit theoretical approach [@Tag2]. In conclusion, we present the first conclusive experimental observation of re-entrant behavior of superconductivity and large-amplitude oscillations of the superconducting $T_{c}$, in two series of superconductor/ferromagnet bilayers with constant Nb layer thickness ($d_{Nb}\approx 7.3$ nm and $d_{Nb}\approx 8.3$ nm) as a function of the thickness of a Cu$_{1-x}$Ni$_{x}$ ($x\approx 0.59$) alloy layer. The authors are grateful to V. Ryazanov and V. Oboznov for stimulating discussions and cooperation, and to Yu. Shalaev for technical assistance in constructing the target-holder movement setup. The work was partially supported by INTAS (grant YSF 03-55-1856) and BMBF (project MDA02/002). [99]{} P. Fulde and R. Ferrell, Phys. Rev. **135**, A550 (1964). A. I. Larkin and Yu. N. Ovchinnikov, Zh. Eksp. Teor. Fiz. **47**, 1136 (1964) \[Sov. Phys. JETP **20**, 762 (1965)\]. P. Fulde, Adv. Phys. **22**, 667 (1973), Fig. 22. C. L. Chien and D. H. Reich, J. Magn. Magn. Mater. 200, **83** (1999). E. A. Demler, G. B. Arnold, and M. R. Beasley, Phys. Rev. B **55**, 15174 (1997). A. A. Golubov, M. Yu. Kupriyanov, and E. Il’ichev, Rev. Mod. Phys. **76**, 411 (2004). I. F. Lyuksyutov and V. L. Pokrovsky, Adv. Phys. **54**, 67 (2005). A. I. Buzdin, Rev. Mod. Phys. **77**, 935 (2005). M. G. Khusainov and Yu. N. Proshin, Phys. Rev. B **56**, R14283 (1997); Erratum: Phys. Rev. B **62**, 6832 (2000). L. R. Tagirov, Physica C **307**, 145 (1998). B. P. Vodopyanov and L. R. Tagirov, ZhETF Pis’ma **78**, 1043 (2003) \[JETP Letters **78**, 555 (2003)\]. I. A. Garifullin, D. A. Tikhonov, N. N. Garif’yanov, L. Lazar, Yu. V. Goryunov, S. Ya. Khlebnikov, L. R. Tagirov, K. Westerholt, and H. Zabel, Phys. Rev. B **66**, 020505(R) (2002). L. V. Mercaldo, C. Attanasio, C. Coccorese, L. Maritato, S. L. Prischepa, and M. Salvato, Phys. Rev. B **53**, 14040 (1996). M. Schöck, C. Sürgers, and H. v. Löhneysen, Eur. Phys. J. B **14**, 1 (2000). J. Y. Gu, C.-Y. You, J. S. Jiang, J. Pearson, Ya. B. Bazaliy, and S. D. Bader, Phys. Rev. Lett. **89**, 267001 (2002). V. V. Ryazanov, V. A. Oboznov, A. S. Prokofiev, and S. V. Dubonos, JETP Letters **77,** 39 (2003) \[Pis’ma v ZhETF **77,** 43 (2003)\]. A. Potenza and C. H. Marrows, Phys. Rev. B **71**, 180503 (2005). Jinho Kim, Jun Hyung Kwon, K. Char, Hyeonjin Doh, and Han-Yong Choi, Phys. Rev. B **72**, 014518 (2005). C. Cirillo, S. L. Prischepa, M. Salvato, C. Attanasio, M. Hesselberth, and J. Aarts, Phys. Rev. B **72**, 144511 (2005). S. V. Vonsovskii, *Magnetism* (John Wiley, New York, 1974). The Cu$_{1-x}$Ni$_{x}$ target with $x=0.58-0.59$ was fabricated in the laboratory of Prof. V. V. Ryazanov, ISSP of RAS, Chernogolovka. A. S. Sidorenko, V. I. Zdravkov, A. Prepelitsa, C. Helbig, Y. Luo, S. Gsell, M. Schreck, S. Klimm, S. Horn, L. R. Tagirov, and R. Tidecks, Annalen der Physik (Leipzig-Berlin) **12**, 37 (2003). L. R. Doolittle, Nucl. Instr. Meth. B **9**, 344 (1985). Ya. V. Fominov, N. M. Chtchelkatchev, and A. A. Golubov, Phys.Rev. B **66**, 014507 (2002). Chun-Yeol You, Ya. B. Bazaliy, J. Y. Gu, S.-J. Oh, L. M. Litvak, and S. D. Bader, Phys. Rev. B **70**, 014505 (2004). **Figure captions** Fig. 1. The results of a Rutherford backscattering spectrometry (RBS) investigation: S15 batch, $d_{Nb}\approx 7.3$ nm. Fig. 2. Typical resistive transitions of the investigated samples. Solid lines are a guide to the eye. Fig. 3. Nonmonotonous $T_{c}$ ($d_{F}$) dependence for Nb/Cu$_{x}$Ni$_{1-x}$ bilayers: (a) d$_{Nb}\approx 8.3$ nm; (b) d$_{Nb}\approx 7.3$ nm. Transition widths are within the point size if error bars are not visible. Solid lines are theoretical curves (see text).
Kindergarten Teacher Earns $700,000 by Selling Lesson Plans Online - MarlonPro http://mashable.com/2012/05/17/teachers-pay-teachers/ ====== kghose I have mixed feelings about this. I lived in India for almost a decade - Calcutta to be precise, but I think what I have to say applies to most of India. What happens is that Teachers in schools start tutorial classes. Either singly or in groups they set up tutorial homes and they recruit students from their day jobs. Often there is a hidden implication that if you don't join the tutorial (for which, of course you pay extra money) you will fare poorly in class. At best, the teachers put less effort into their regular job and students suffer. I would hate for this system to be adopted widely. Putting stuff online is a little different, but I am very ambivalent about this kind of privatization of education... ~~~ jedberg This practice is illegal in the US. A teacher can't take money for tutoring from their current students. ~~~ mh- jedberg, you're not working at reddit anymore.. you have to use citations now in internet discussions. ;) ------ piato I may be missing something rather obvious here, but I've read the article three times, and can find no reference to 'coaching' or 'after-school tutorials' at all here. Are they mentioned elsewhere? As a former teacher, here is an example lesson plan: AGE GROUP: Year 5 TOPIC: Introducing prime numbers STARTER: Mixed multiplication table questions on board. MAIN ACTIVITY: Write the number 92 on the board. Ask students whether '92' appears in any multiplication table. When the answer '2' is received, stress that multiplication tables do not end at 10 or 12, but continue on indefinitely. Repeat for the numbers '999', '186', and '495'. Next, write the number 71 on the board. Students will conclude that it does not appear in any 'tables'. Explain that it does, offering a reward for the first correct answer. With or without hinting, get the answer '1' or '71'. Offering a second reward, get the second of the pair. Explain that every whole number is in the 'one' times table and the 'itself' times table. However, such numbers are called 'prime' if those are the only ones. Ask students to name other prime numbers below 50, discussing suggestions. Complete is_it_prime.doc. Students who finish quickly should attempt is_it_prime_2.doc. That's not meant to be particularly inspiring or anything, just representative. As a teacher, you have a legal obligation to have such a plan for every lesson you teach (this was true in the UK, can't speak for other countries). ~~~ keithpeter You would need a little more than that now. Differentiated outcomes &c I get the impression that in the US they don't have a national curriculum or external exams &c so the teacher has to do more long term planning on their own. ------ e28eta I really don't understand the negativity here. I'm no expert on teaching, but I've definitely heard that some teachers come up with lesson plans in their first couple years teaching a subject, and then just re-use it for the rest of their career (or until the standardized test changes). This seems like a huge waste of effort, because there are so many other teachers covering the same content, with largely similar lesson plans. If customization is so important, what's wrong with applying it to a purchased lesson plan? ------ andyobryan I forwarded this to my mother, who is a retired teacher. She was lauded for her teaching abilities and always had top scores on her evaluations. They even tried to get her to stay upon reaching the required years to retire, but health / back issues forced her to retire. I thought this would be great for some post-retirement income. She has years of experience, so possibly, the planning part would come easy to her AND the side benefit of not actually having to TEACH the little stink-pots... ------ MarlonPro Startup Ideas: Find what people need and build an app/product that will fill those needs = $$$$ ~~~ patio11 As the resident "Been there, done that" guy with regards to teachers I think I'm 99.9% of the way to "You should _probably_ build something for businesses instead -- for equivalent levels of savvy/work you'll get a lot more money while suffering a lot less." Teachers: $$ Businesses: $$$$$$$$$$$ I just got an email this morning from someone responding to an AdWords ad for Appointment Reminder. The ad costs $8 a click, for reasons which will soon be obvious. The contents of the email: "Quote me a price for X appointmnts a month." I did. "OK, we want it." If they stay around for the year I just earned several hundred copies of BCC with two emails and a few minutes of data entry. ~~~ MarkMc Hey Patrick it's great to hear that Appointment Reminder is doing well - congratulations! ------ tokenadult I saw this link just after MarlonPro did, in the feed of a Facebook friend who is an author on homeschooling. One comment by one of her friends was, "Perpetuating lesson plans that may or may not actually be interesting to a child and may actually turn a child off a topic? The teacher can keep her big bucks. . . . although, wonder if you could do plans that promote independent learning?" It is interesting to think about what could be involved in lesson plans for kindergarten, <http://www.mrsjumpsclass.com/> <http://mrsjumpsclass.blogspot.com/> and what puts kindergarten teachers, who are graduates of college major programs in education in the usual case, in need of lesson plans for their young pupils. Is there room for a lot of other market entrants in this market? ~~~ JoeAltmaier Pretty negative - so the lesson plans are crap, they don't promote independent learming, the children are not interested. You read all that from the article? Why not buy one, check it out? They are cheap, many are free. Its easy to criticise, but almost as easy to have an informed opinion. I can imagine many new teachers are glad to have an experienced educator guide them. It can be challenging to have a fresh plan 180 days in a row. At the least, these plans provide another viewpoint. ~~~ tokenadult Thanks for your comment. I found more context about the teacher profiled in the Mashable article in this older article from an Education Week blog: [http://blogs.edweek.org/teachers/teaching_now/2011/09/teache...](http://blogs.edweek.org/teachers/teaching_now/2011/09/teacher_makes_230000_on_lesson_plans.html) My initial surprise at the announcement that lesson plans sell that well stems from 1) writing my own lesson plans, adapted to a particular group of students I teach, and thus 2) thinking, don't most teachers plan their lessons for their particular class, with its individual mix of students? while also knowing 3) many materials provided by textbook publishers have somewhat of built-in lesson plans. So I'm still surprised to see that the market is as large as it evidently is for canned lesson plans, but it is, and it appears that other teachers ought to enter it. ~~~ JonnieCache Just because you've purchased a canned lesson plan doesn't mean you have to implement it exactly. I imagine a lot of teachers are buying the plans to avoid 80% of the work, and then adjusting them to fit their specific pupils. And some of them are probably lazily teaching them straight off the shelf as well. So it goes. ------ protomyth Long ago, I built a lesson plan generator for the LAP and e-LAP skill tests (0-3 year olds). The teachers each put their activities designed to improve a skill and it would print out the needed activities for each child after testing. It was quite the hit. Never did go commercial, bit it did save a lot of time and provided a weird form of networking via activity sharing across centers. Lesson plans are a big issue for pre-K also. You tend to have to do the plans in a much more individualized way with not all of the kids at once. It was quite a challenge just finding time to write up the plans based on the tests. Automation was a huge gain. ------ michaelfeathers I'm surprised school systems aren't claiming "work for hire" copyright on the lesson plans. I don't think they should, it's just that this is the way that these things typically play out. ~~~ fromhet The type of thing OP is talking about is actually quite common in Sweden, but as a non-profit (on the teachers behalf, that is). My mother is a teacher and I've worked in a school, and the use of <http://www.lektion.se/> is very widespread. All the class plans there are free (as in money). ------ Drbble Teachers Pay Teachers, DonorsChoose interesting that these teacher startups are founded by males from a female dominated starting industry. ------ brianobush Of course, tax payers most likely footed the bill for her to come up with those lesson plans. ~~~ encoderer If you mean she's probably doing it in all the free time teachers usually have while tax payers are lavishing her with a generous salary and benefits, then yes you're right. In reality teachers usually work long hours in dedication to their profession and their students, and do so for far less money than most professionals with that workload. ~~~ wcchandler I was quite surprised by how true this was when my wife started teaching high school math. I initially suspected 10~11 hours a day. Which I equated to my days of going to college full time and working construction full time -- easily 11-12 hour days, 6 days a week. She does so much more. Her typical schedule: \- 4:45am, awake \- 5:30am, out the door \- 6:00am, gets to school \- 6-8 she does whatever needs done for classes, meets with students, meets with peers or administration \- 8:00am, classes begin \- 9:30am, break time for 1hr 30 minutes -- but students will come in during this time to either make up tests, get extra help with something, or just do work. She can also have meetings (again) with peers, administration or sometimes parents. \- 11:00am, lunch for 1hr -- but again, students will usually come in to do whatever they need to do. \- 12:00pm, next class \- 1:30pm, next class \- 3:00pm, school's out \- 3-5, meetings with peers, getting ready for class tomorrow, emailing parents, handling disciplinary issues, prints lesson plans or whatever else needs done at school \- 5:30pm, home \- 6:00pm, eat and take a nap for however long she can get \- 8:00pm, wake up from nap, grade papers, enter in grades (if grades aren't posted online within 2 days she'll get about 5 emails a day from parents asking about it) \- 10:00pm, gets ready for bed \- 11:30pm, can finally get to sleep due to thinking/preparing for the next day. She gets paid $36,000 a year. I have so much respect for her. Oh, I forgot to tell you -- all her lesson plans change each semester. They don't have books in half their classes -- they use a county wide "lesson plan" which must be printed out for each student. The school system believes in "evolving" education, so every semester they try to incorporate different topics or try to approach different methodologies. While I commend them for that, it negatively effects the teachers in excess busy work. If they used a printed book for 10 years in a row, she'd do it once and be done, with variations being in classes taught. ~~~ megablast Come on, as someone who was a teacher for a while, lives with a teacher, and knows lots of teachers this is very atypical. Nobody would be doing all of these things every day, or even once a week. It is also quite common to have a number of free periods each day, one day a week I had 3 hours off. ~~~ brianobush judging by her salary and over-excitement, she must be new. After a while, she most likely will realize all that work is unnecessary and work more effectively (or burnout completely). ~~~ sopooneo Almost all _good_ teachers start out with something approaching that level of work. It is only by going through that phase that they have the backlog and repertoire ready in advance later on. It can be a brutally hard profession. ------ blinkingled So what does this offer that Khan Academy doesn't for free? Looks like they manage to use social media effectively and I haven't checked but may be they have more targeted or traditional education friendly content over there? ~~~ eddie_the_head Khan Academy does not offer lesson plans, just videos and an exercise/practice framework. This is marketplace for teachers to sell and buy lesson plans. Things like worksheets for in-class work, homework to assign, ideas for projects to assign, or material to supplement in-class instruction for the students. This is actually a really smart and obvious idea, and well executed it seems.
Welcome to HVAC-Talk.com, a non-DIY site and the ultimate Source for HVAC Information & Knowledge Sharing for the industry professional! Here you can join over 150,000 HVAC Professionals & enthusiasts from around the world discussing all things related to HVAC/R. You are currently viewing as a NON-REGISTERED guest which gives you limited access to view discussions To gain full access to our forums you must register; for a free account. As a registered Guest you will be able to: Participate in over 40 different forums and search/browse from nearly 3 million posts. I believe the model is a RGPS. Gas, updraft. I need to find the papers on it... As for the registers.... there are 5 downstairs and 4 upstairs. The are all approximately (did not measure).... 4" x 10" each. One downstairs is kept closed since it's only 4 feet from the T-Stat. The house is pretty small Sq Ft about 1100 or so. I just remembered..... Here are some pics of the old furnace when we bought the house 17 years ago. I cleaned up a lot of that mess since. You're gonna love how the previous owner had the AC condensation drain set up!! Without a return in the crawlspace, it would put your house into a negative pressure. What would a negative pressure in the house do ? I was thinking a negative pressure may have built up under the house that may have restricted the flow out the flu pipe. Therefore causing the pressure switch to activate and shutting down the system during startup. ?? Is that plausible ? I'm not quite sure which one your referring to. ?? The flexible hose and the plenum (before the filter) are all new. The 2 - 12" ducts are from the old setup. What would installing a supply run in the crawl space accomplish ?? More capacity perhaps ? I was looking at the supply plenum on top of the a/c coil. In Pix 0306, On the back side it appears there is a 6" x ??? that runs about a foot and then goes into (what looks like) 8" x ??? short way elbow. I think you have much to much restriction there. I was thinking a negative pressure may have built up under the house that may have restricted the flow out the flu pipe. Therefore causing the pressure switch to activate and shutting down the system during startup. ?? Is that plausible ? How big is the crawlspace. And what BTU is the furnace again. A negative pressure in the house will draw in the cold dry outside air. making you heating cost increase, and your house very dry and uncomfortable.
1. Field of the Invention The present invention relates to a separator for a fuel cell which is mainly used as a cell for an electric vehicle, and also to a method of producing the separator, and more particularly to a separator for a fuel cell of the electrolyte type or the phosphoric acid type, and also to a method of producing the separator. In a fuel cell of such a type, a unit cell which is a unit constituting the cell is configured by: sandwiching a gas diffusion electrode having a sandwich structure wherein an electrolyte membrane is configured by an ion exchange membrane, between an anode and a cathode; sandwiching the gas diffusion electrode between separators; and forming fuel gas passages and oxidant gas passages between the separators, and the anode and the cathode. 2. Description of the Prior Art In a fuel cell, a fuel gas containing hydrogen is supplied to an anode, and an oxidant gas containing oxygen is supplied to a cathode, so that, in the anode and the cathode, electrochemical reactions indicated by the formulae: xe2x80x83H2xe2x86x922Hxe2x88x92+2exe2x88x92xe2x80x83xe2x80x83(1) (xc2xd)O2+2Hxe2x88x92+2exe2x88x92xe2x86x92H2Oxe2x80x83xe2x80x83(2) occur, and, in the whole of the cell, an electrochemical reaction indicated by the formula: H2+(xc2xd)O2xe2x86x92H2Oxe2x80x83xe2x80x83(3) proceeds. The chemical energy of the fuel is directly converted into electrical energy, with the result that the cell can exert a predetermined performance. A separator for a fuel cell of the electrolyte type or the phosphoric acid type in which such energy conversion is conducted is desirably gas-impermeable, and also is made of an electrically conductive material. Conventionally, it is known that, as a material meeting the requirements, an electrically conductive resin is used. An electrically conductive resin is a complex which is configured by bonding graphite (carbon) powder by means of a thermosetting resin such as phenol resin, or a so-called bondcarbon (resin-bonded carbon) compound. A separator for a fuel cell is configured by forming such a bondcarbon compound into a predetermined shape. Conventionally, a separator for a fuel cell having a predetermined shape is formed by using such a bondcarbon compound in the following manner. With respect to the composition ratio of a thermosetting resin such as phenol resin and graphite powder, 25 to 60 wt. % of the thermosetting resin is used as an adequate content in consideration of fluidity, moldability, and gas-impermeability of the bondcarbon compound, and in order to ensure the strength (compression and bending) sufficient for preventing the separator from suffering damage such as a breakage due to vibrations or the like which may be produced during a handling operation in an assembling step of a unit cell of a fuel cell, or a use in an automobile. In a conventional separator for a fuel cell which is configured by using a bondcarbon compound of such composition ratios, the content of a thermosetting resin serving as an electrically insulating material is large, and hence the conductivity of the separator itself is lowered so that the electrical resistance is increased. This is not preferable from the viewpoint of the performance of a fuel cell. In order to improve the conductivity of a separator for a fuel cell s configured by using a bondcarbon compound, it has been contemplated that the content of a thermosetting resin be reduced as far as possible. When the content of a thermosetting resin is reduced, however, elongation and fluidity of the bondcarbon compound during a molding process are lowered to impair moldability, and the strength is low. When the resin content is 10 wt. % or less, particularly the strength of a separator becomes insufficient, and therefor the separator easily suffers damage such as a breakage or a crack due to vibrations or the like which are continuously applied to the separator in the case where the separator is used in an automobile. By contrast, in the case where the resin content is set to the above-mentioned adequate range (25 to 60 wt. %), elongation and fluidity of a bondcarbon compound are excellent and moldability is higher, and strength sufficient for preventing a separator from suffering damage such as a breakage or a crack due to vibrations or the like can be ensured. However, the contact resistance with respect to an electrode and serving as the primary factor which largely affects the performance of a fuel cell becomes higher, as the resin content is larger. When the resin content is larger than 40 wt. %, particularly, the contact resistance is suddenly increased, and the performance of the fuel cell is extremely lowered. The contact resistance serving as the primary factor which largely affects the performance of a fuel cell will be considered. Even when a fuel cell is used in an automobile in which vibrations are always applied to the fuel cell, it is desirable that the contact resistance be stably maintained to 10 mxcexa9xc2x7cm2 or lower. When the contact resistance is to be stably maintained to such a requested value, a countermeasure in which only the composition ratios of a thermosetting resin and graphite powder are considered cannot satisfy both the requirements on fluidity and moldability of a compound and the strength of a molded member (separator), and the contact resistance, as described above. Development of a separator for a fuel cell which is excellent in moldability and strength, and which can be stably maintained to a low contact resistance of 10 mxcexa9xc2x7cm2 or lower is strongly requested. At present, however, there exists no separator which can satisfy the noted desirability. The present invention has been conducted in order to satisfy the noted desirability. It is an object of the invention to provide a separator for a fuel cell which is excellent in fluidity and moldability, and in which, while ensuring strength sufficient for preventing the separator from suffering damage such as a breakage due to vibrations or the like, the contact resistance can be set to a value lower than a requested value, and the low contact resistance can be stably maintained. It is another object of the invention to provide a method of producing a separator for a fuel cell wherein, even when a molding material of low fluidity is used, a separator which has a uniform and correct shape, and in which a low contact resistance can be stably maintained can be surely produced. In order to attain the objects, the separator for a fuel cell of the invention is a separator for a fuel cell consisting of a complex which is configured by bonding graphite powder by means of a thermosetting resin, and characterized in that, in the complex, a composition ratio of the graphite powder is set to 60 to 90 wt. %, a composition ratio of the thermosetting resin is set to 10 to 40 wt. %, and an average particle diameter of the graphite powder is set to a range of 15 to 125 xcexcm. In the complex, preferably, the composition ratio of the graphite powder is set to 70 to 87 wt. %, and the composition ratio of the thermosetting resin is set to 13 to 30 wt. %. Preferably, the average particle diameter of the graphite powder is set to a range of 40 to 100 xcexcm. In order to meet the above-mentioned demands for development, intensive studies on a separator for a fuel cell which is configured by using a bondcarbon compound have been conducted, and finally found that the contact resistance serving as the primary factor which largely affects the performance of a fuel cell is determined not only by the composition ratios of a resin and graphite powder, the average diameter of the graphite powder closely affects the performance at the highest degree, the contact resistance is largely varied depending on the size of the average diameter, and the average diameter of the graphite powder is closely related also to fluidity, moldability, and strength of the compound. Based on this finding, the composition ratios of a resin and graphite powder, and the average diameter of the graphite powder have been respectively set to the above-mentioned ranges, thereby completing the invention. According to the thus configured invention, as the graphite powder which is the one composition of the complex and which affects the contact resistance at the highest degree, graphite powder in which the average diameter is set to a range of 15 to 125 xcexcm, preferably, 40 to 100 xcexcm is used, the composition ratio of the thermosetting resin which is the other composition of the complex, and which largely affects fluidity, moldability and strength is set to a range of 10 to 40 wt. %, preferably, 13 to 30 wt. %, thereby attaining an effect that, while the complex serving as a molding material has excellent elongation and fluidity and exerts high moldability, and strength sufficient for preventing the separator from suffering damage such as a breakage or a crack due to vibrations or the like can be ensured, the contact resistance with respect to an electrode can be set to a low value of 10 mxcexa9xc2x7cm2 or lower which is required in a separator for a fuel cell, and the low contact resistance can be stably maintained so that the performance of a fuel cell can be remarkably improved. In the case where the average particle diameter of graphite powder is smaller than the above-mentioned range, or, for example, 10 xcexcm or smaller, the contact resistance is higher or 15 mxcexa9xc2x7cm2 or more, even when the resin content is adjusted to any value. Namely, the obtained contact resistance is very different from the value (10 mxcexa9xc2x7cm2 or lower) which is required in a fuel cell to be used under conditions where vibrations are applied, such as the case of mounting on an automobile. In the case where the resin content is smaller than 10 wt. %, and also in the case where the average diameter of graphite powder is, for example, 150 xcexcm or more, i.e., exceeds the above-mentioned range, fluidity and moldability are improved, but a large number of breakages, minute cracks, and the like are produced by vibrations in edges of projections serving as contact faces with respect to an electrode. Even when a low contact resistance is obtained in an early stage of use, the contact resistance is suddenly increased after use of a short time, so that a low contact resistance meeting the above-mentioned demands cannot be maintained. This will be described later in detail. In the separator for a fuel cell of the invention, when a surface roughness of a portion contacting an electrode is set to a range of Ra=0.1 to 0.5 xcexcm as measured by a surface roughness meter having a probe of a diameter of 5 xcexcm, the contact resistance can be further lowered, so that further improvement of the performance of a cell can be attained. The method of producing a separator for a fuel cell according to the invention is a method of producing a separator for a fuel cell configured by molding a complex in which composition ratios are set to 60 to 90 wt. % of graphite powder, and 10 to 40 wt. % of a thermosetting resin, and an average diameter of the graphite powder is set to a range of 15 to 125 xcexcm, and characterized in that the complex is previously coldmolded into a shape similar to a final molded shape by a pressure of a range of 2 to 10 MPa, the preliminary molded member is then placed in a mold, and the preliminary molded member is molded into the final shape by applying a pressure of a range of 10 to 100 MPa. Preferably, in the complex, the composition ratio of the graphite powder is set to 70 to 87 wt. %, the composition ratio of the thermosetting resin is set to 13 to 30 wt. %, and the average particle diameter of the graphite powder is set to a range of 40 to 100 xcexcm. The shape similar to a final molded shape means that the dimensions other than those in the direction of the molding pressure are similar to corresponding ones of the final molded member. Preferably, dimensions of the preliminary molded member in the direction of the molding pressure are set to be about 1.0 to about 2.0 times dimensions of the final molded member. When such a preliminary molded member is used, the mold density and the volume resistivity can be further improved. According to the production method of the invention having the above-described molding means, the two-step molding is employed wherein a complex (bondcarbon compound) is previously cold-molded into a shape similar to the final molded shape by a pressure of a range of 2 to 10 MPa, and the preliminary molded member is placed in a mold and then molded into the final shape by applying a high molding pressure of a range of 10 to 100 MPa. Even when a complex (molding material) which is low in elongation and fluidity is used, therefore, the compound can surely extend to every corner of the mold so that, while suppressing molding unevenness, the mold density is increased and the complex can be charged more uniformly. As a result, it is possible to surely and easily obtain a uniform separator which exhibits low contact resistance and has good conductivity, and which is uniform and is correct also in shape. As the thermosetting resin which is useful in the invention, phenol resin which is excellent in wettability with respect to graphite powder may be most preferably used. Alternatively, any other resin such as polycarbodiimide resin, epoxy resin, furfuryl alcohol resin, urea resin, melamine resin, unsaturated polyester resin, or alkyd resin may be used as far as the resin causes a thermosetting reaction when the resin is heated, and is stable against the operating temperature of the fuel cell and components of the supplied gasses. As the graphite powder which is useful in the invention, powder of graphite of any kind, including natural graphite, artificial graphite, carbon black, kish graphite, and expanded graphite may be used. In consideration of conditions such as cost, the kind of graphite can be arbitrarily selected. In the case where expanded graphite is used, particularly, a layer structure is formed by expanding the volume of the graphite as a result of heating. When molding pressure is applied, layers can twine together to be firmly bonded to one another. Therefore, expanded graphite is effective in a complex in which the ratio of a thermosetting resin is to be reduced. Other objects and effects of the invention will be clarified in embodiments which will be described below.
Q: Disable Button Loop (NStimer or MouseMove) XCode Objective-C MacOS I am just experimenting with disabling a button with various methods on XCode MacOS (not iOS) Cocoa Objective-C. In this scenario I have a help button (m_btHelp) that is disabled when g_bEnableHelpButton = NO; but it is only being checked when the mouse moves. -(void)mouseMoved:(NSEvent *)theEvent { if(g_bEnableHelpButton) { [m_btHelp setEnabled:YES]; } else { [m_btHelp setEnabled:NO]; } I would rather have this continuously checked instead of only checked when the mouse moves. I have tried NSTimer with something like this, but it does not seem to work (m_btHelp does not get disabled when g_bEnableHelpButton = NO; like it does in the mouseMoved event: - (void)applicationDidFinishLaunching:(NSNotification *)aNotification { [NSTimer scheduledTimerWithTimeInterval:1 target:self selector:@selector(Timerloop) userInfo:nil repeats:YES]; } - (void)Timerloop { if(g_bEnableHelpButton) { [m_btHelp setEnabled:YES]; } else { [m_btHelp setEnabled:NO]; } } A: g_bEnableHelpButton is a global variable, right? Don't use global variables. It's way better to create a class which holds your state (can be view model, ...). I'm going to skip a state class in all examples below and will use BOOL helpButtonEnabled property on the same view controller (this is not mandatory, it just makes all these examples a bit shorter). You can move this property elsewhere, it can be a state class, it can be basically any object. Another thing is this NSTimer, NSTrackingArea, ... With all these things one is wasting CPU cycles, battery life, ... Cocoa & Objective-C offers various ways how to monitor a property value and react to it. You can override property setter, you can use KVO or bindings. All three methods are covered in examples below. There are other ways for sure (like ReactiveCocoa), but I'd like to demonstrate three ways how to achieve it without dependencies. Initial state Imagine you have this view: With the following implementation: #import "ViewController.h" @interface ViewController () // Help button from the Main.storyboard // Imagine it's your m_btHelp @property (nonatomic, strong) IBOutlet NSButton *helpButton; // Property driving helpButton enabled/disabled state // Imagine it's your g_bEnableHelpButton @property (nonatomic, getter=isHelpButtonEnabled) BOOL helpButtonEnabled; @end @implementation ViewController // Just another button action coming from the Main.storyboard which toggles // our helpButtonEnabled property value - (IBAction)toggleHelpButtonEnabled:(id)sender { self.helpButtonEnabled = !self.helpButtonEnabled; } @end There's help button and there's toggle button which just toggles helpButtonEnabled value (YES -> NO, NO -> YES). How to monitor it without timer, tracking area, ... to update the help button state? Override setter Encapsulating Data. @implementation ViewController // This is setter for the helpButtonEnabled property. - (void)setHelpButtonEnabled:(BOOL)helpButtonEnabled { // If the new value equals, do nothing if (helpButtonEnabled == _helpButtonEnabled) { return; } // Update instance variable _helpButtonEnabled = helpButtonEnabled; // Update button state _helpButton.enabled = helpButtonEnabled; } - (void)viewDidLoad { [super viewDidLoad]; // When the view loads update button state to the initial value _helpButton.enabled = _helpButtonEnabled; } // Just another button action coming from the Main.storyboard which toggles // our helpButtonEnabled property value - (IBAction)toggleHelpButtonEnabled:(id)sender { self.helpButtonEnabled = !self.helpButtonEnabled; } @end KVO Introduction to Key-Value Observing Programming Guide. static void * const ViewControllerHelpButtonEnabledContext = (void*)&ViewControllerHelpButtonEnabledContext; @implementation ViewController - (void)dealloc { // Remove previously registered observer when the view controller goes away [self removeObserver:self forKeyPath:@"helpButtonEnabled" context:ViewControllerHelpButtonEnabledContext]; } - (void)viewDidLoad { [super viewDidLoad]; // Register observer for the helpButtonEnabled key path // - it fires immeditately with the current value (NSKeyValueObservingOptionInitial) // - it fires later every single time new value is assigned (NSKeyValueObservingOptionNew) // - context is used to quickly distinguish why the observeValueForKeyPath:... was called [self addObserver:self forKeyPath:@"helpButtonEnabled" options:NSKeyValueObservingOptionInitial | NSKeyValueObservingOptionNew context:ViewControllerHelpButtonEnabledContext]; } - (void)observeValueForKeyPath:(NSString *)keyPath ofObject:(id)object change:(NSDictionary<NSKeyValueChangeKey,id> *)change context:(void *)context { if (context == ViewControllerHelpButtonEnabledContext) { // It's our observer, let's update button state _helpButton.enabled = _helpButtonEnabled; } else { // It's not our observer, just forward it to super implementation [super observeValueForKeyPath:keyPath ofObject:object change:change context:context]; } } // Just another button action coming from the Main.storyboard which toggles // our helpButtonEnabled property value - (IBAction)toggleHelpButtonEnabled:(id)sender { self.helpButtonEnabled = !self.helpButtonEnabled; } @end Binding Introduction to Cocoa Bindings Programming Topics. @implementation ViewController - (void)dealloc { // Remove binding when the view controller goes away [self.helpButton unbind:NSEnabledBinding]; } - (void)viewDidLoad { [super viewDidLoad]; // self.helpButton.enabled is binded to self.helpButtonEnabled [self.helpButton bind:NSEnabledBinding toObject:self withKeyPath:@"helpButtonEnabled" options:nil]; } // Just another button action coming from the Main.storyboard which toggles // our helpButtonEnabled property value - (IBAction)toggleHelpButtonEnabled:(id)sender { self.helpButtonEnabled = !self.helpButtonEnabled; } @end
Allergan have unveiled a new treatment protocol for periorbital revitalisation which incorporates a portfolio combination approach of both BOTOX® and the VYCROSS™ Collection of dermal filler treatments. Developed in consultation… October 15, 2014Comments Off on Allergan Launches New Periorbital Treatment ProtocolRead More BAPRAS has responded to recommendations from the independent review led by Professor Terence Stephenson into how medical devices are handled within the MHRA. Graeme Perks, BAPRAS President and Consultant Plastic… October 14, 2014Comments Off on BAPRAS React To Independent Medical Devices ReviewRead More Dermatologists have welcomed the recommendation by Cosmetics Europe, the European cosmetics trade association, to all its members that the preservative Methylisothiazolinone (MI or MIT) should be immediately removed from all… May 23, 2014Comments Off on Dermatologists Welcome Recommendation By CTA To Remove MI Rrom Leave-On ProductsRead More Established in 1993, BTL Aesthetics has become one of the major world manufacturers of medical devices. Representing the best in body contouring, fat reduction, skin tightening, and anti-wrinkle devices in… A small but still troubling number of healthcare workers develop a potentially life-threatening disease as a result of sharps injury. In the UK approximately 10,000 needle-stick injuries occur each year.… May 14, 2014Comments Off on Reducing Needlestick Injuries In The Clinical EnvironmentRead More
Q: sftp file download script I am trying to download a from from a remote sftp location so for this I am using below script. #!/bin/bash expect -c " spawn sftp remoteUser@xx.xx.xx.xx expect \"password\" send \"User@123\r\" interact " The problem is in the remote server some information msg configure when you login the server, so because of this password send before this text comes on screen. A: Try this - #!/usr/bin/expect export PASSD="User@123" expect -c 'spawn sftp user@xxxxxx.com; expect "*Password: "; send "$env(PASSD)\r"; expect "sftp>"; send "cd /home/user \r"; expect "sftp>"; send "get file.txt \r"; expect "sftp>"; send "bye \r"'
About Me I received my MA in philosophy of science many years ago and currently reviving my academic interests. I hope to stimulate individuals in the realms of science, philosophy and the arts...to provide as much free information as possible. Tuesday, January 12, 2010 Iranian physics professor murdered "He did it...no, Israel did...no, the American CIA...maybe the Iranians themselves". Such a complex web of politics. "Bomb Blast Kills Physics Professor in Tehran" by Alan Cowell January 13th, 2010 The New York Times PARIS — A remote-controlled bomb attached to a motorcycle killed an Iranian physics professor outside his home in northern Tehran on Tuesday, state media reported, blaming the United States and Israel for the attack. There was no immediate claim of responsibility. One state broadcaster, IRIB, quoted a Foreign Ministry spokesman as saying that “in the initial investigation, signs of the triangle of wickedness by the Zionist regime, America and their hired agents are visible in the terrorist act” against the scientist, Massoud AliMohammadi. There was some dispute about his field of scientific specialization. The English-language Press TV said he taught neutron physics at Tehran University, although it was not clear whether he was part of Iran’s contentious nuclear enrichment program. The broadcaster called the professor a “staunch supporter of the Islamic Revolution” of 1979 that overthrew the Shah and initiated three decades of theocratic rule. But two Iranian academics, who spoke in return for anonymity because of the sensitivity of the issue, said in telephone interviews that he was not a nuclear physicist and had specialized in particle and theoretical physics. The Web site of Tehran University lists him as a professor of elementary particle physics. A spokesman for Iran’s atomic agency, Ali Shirzadian, told The Associated Press that Dr. AliMohammadi had no link with the agency responsible for Iran’s nuclear program. Since flawed presidential elections last June, Iran has been gripped by its deepest political crisis since 1979, pitting supporters of the victorious President Mahmoud Ahmadinejad against opponents who call his regime illegitimate. News reports said Dr. AliMohammadi’s name had been on a list of 240 university teachers published on reformist Web sites before the election and identified as supporters of the main opposition candidate, Mir Hussein Moussavi. But there was no formal confirmation from Tehran of his more recent political position. After brutal crackdowns, the authorities late last year broadened efforts to stifle dissent to encompass the educational system, hinting that dissident professors would be purged. A number of hard-line clerics have called for the university humanities curriculums to be further Islamized. But it was not immediately known whether Tuesday’s killing was related to that dispute. Analysts said the Iranian authorities seemed to have been quick to label Dr. AliMohammadi a loyalist, possibly as a precursor to renewed, harsh action against their opponents. The reported bombing came just days after pro-government demonstrators shot at the armored car of the Iran’s most outspoken opposition leader, Mehdi Karroubi, last Thursday, his Saham News Web site reported. That attack appeared to reflect growing frustration that the crackdown in recent months had failed to stop the opposition from lashing out at the country’s leaders and staging intermittent protests that have brought tens of thousands of demonstrators into the streets. Press TV reported on Tuesday that Dr. AliMohammadi, 50, was killed close to his home in the Qeytariyeh neighborhood of northern Tehran when a bomb attached to a motorcycle exploded near his car. “Iran’s police and security bodies are investigating the terrorist case to identify those behind it,” Press TV reported and quoted Tehran’s prosecutor general, Abbas Jafari Dolatabadi, as saying no suspect had so far been arrested. Iranian television showed cleaners sweeping up debris and hosing down the street after the blast shattered windows and smeared the sidewalk with blood and detritus. The video also showed what seemed to be a zippered body bag on a stretcher. The Web site of Iran’s state television declared the bombing a “terrorist act by counterrevolutionaries and elements of arrogance,” a reference to the United States. Security forces are investigating, The A.P. quoted the report as saying. The United States and western allies have been pressing Iran to halt its nuclear enrichment program, which Tehran insists is solely for civilian purposes to produce electricity. But the West fears Iran is seeking to build a nuclear weapon that would threaten Israel and upset the regional power balance. Last year, an Iranian nuclear scientist, Shahram Amiri, disappeared during a pilgrimage to Saudi Arabia; Iran accused the United States of helping to kidnap him. After Tuesday’s explosion, the government’s supporters and opponents traded accusations and claims that the scientist had supported their camp. The royalist Takavaran Tondar group denied involvement in the blast. On its Web site, the group accused government agents of being behind the explosion. It said an announcement earlier on another Web site that seemed to be linked to it and claimed responsibility for the explosion had long been hacked by the authorities. The explosion came at a time of growing tension between Iran and its Western adversaries. Speaking Monday at the start of a nine-day trip across the Pacific, Secretary of State Hillary Rodham Clinton said the United States and its allies were discussing financial sanctions that would appear to be aimed at the Revolutionary Guards and other political players in the country if diplomacy fails to overcome the growing tensions with Iran. “It is clear that there is a relatively small group of decision makers inside Iran,” she said. “They are in both political and commercial relationships, and if we can create a sanctions track that targets those who actually make the decisions, we think that is a smarter way to do sanctions.” No comments: Poet colleague Annus mirabilis-1905 March is a time of transition winter and spring commence their struggle between moments of ice and mud a robin appears heralding the inevitable life stumbling from its slumber it was in such a period of change in 1905 that the House of Physics would see its Newtonian axioms of an ordered universe collapse into a new frontier where the divisions of time and space matter and energy were to blend as rain and wind in a storm that broke loose within the mind of Albert Einstein where Brownian motion danced seen and unseen, a random walk that became his papers marching through science reshaping the very fabric of the universe we have come to know we all share a common ancestor a star long lost in the eons of memory and yet in that commonality nature demands a permutation a perchance genetic roll of the dice which births a new vision lifting us temporarily from the mystery exposing some of the roots to our existence only to raise a plethora of more questions as did the papers of Einstein in 1905
Q: Fields and Modules in Number Theory? I'm about to start self-studying number theory and I was wondering if these two topics are essential to number theory on the introductory level, I'm going to study them in college eventually, but I'm wondering if I should learn about them right away if I want to dive into number theory. I studied elementary number theory, and I know group and ring theory. So my questions are: $$$$ In what areas of number theory are these two branches used and what parts of them are used? And will I need them in an introductory course in algebraic number theory? $$$$Thanks in advance A: I taught myself algebraic number theory a few years ago without a really solid understanding of module theory. It was painful. I ragequit quite a few times. I recommend you solidify your algebra background before you start. I think of basic algebraic number theory as the study of integral closures of $\mathbb{Z}$ (or $\mathbb{Z}_p$) in finite extensions of $\mathbb{Q}$ (or $\mathbb{Q}_p$). That is, you have a field $K$ containing $\mathbb{Q}$, such that $K$ is finite dimensional as a vector space over $\mathbb{Q}$. Then the ring of integers of $K$ is defined to be the set $\mathcal O_K$ of elements of $K$ which are roots of a polynomial in $\mathbb{Z}[X]$ with leading coefficient one. For example, $\mathcal O_{\mathbb{Q}} = \mathbb{Z}$, and $\mathcal O_{\mathbb{Q}(i)} = \{ a + bi : a, b \in \mathbb{Z}\}$. The first nontrivial results of algebraic number theory are heavily dependent on results from module theory. For example, if $K \subseteq L$ are finite extensions of $\mathbb{Q}$, then $\mathcal O_L$ and $\mathcal O_K$ are free abelian groups, and $\mathcal O_L$ is finitely generated as a module over $\mathcal O_K$. The proof I know of this relies on several nonobvious facts: 1 . If $M$ is a finitely generated module over a Noetherian ring $R$, then any submodule of $M$ is also finitely generated over $R$. 2 . A finitely generated module over a principal ideal domain is free if and only if it is torsion free. 3 . If $V$ is a finite dimensional vector space over a field $k$, and $B$ is a nondegenerate bilinear form on $V$, then to any basis $v_1, ... , v_n$ of $V$ there exists a dual basis $v_1^{\ast}, ... , v_n^{\ast}$ of $V$, such that $B(v_i, v_j^{\ast}) = \delta_{ij}$. From field theory, you also end up using some not very obvious facts. For example, if $k \subseteq l$ is a finite separable field extension, $y \in l$, and the trace of $xy$ is zero for every $x \in l$, then $y = 0$. Galois theory is something you need to know really well. You will constantly be looking at subgroups of $\textrm{Gal}(L/K)$ for Galois $L/K$, and relating these subgroups of intermediate fields of $L/K$. On top of this, you need to have a solid understanding of basic commutative algebra: ideals, quotient rings, localization. Most algebraic number theory books I know of don't expect you to know integral closures right off the bat, but if you're not comfortable with say, localization, I think you will have a really hard time.
You are here Property NSW Over the past five years, strategic leasing initiatives have saved taxpayers an estimated $80 million when comparing Industry Benchmark increases in office rental costs, to the Government’s portfolio in Sydney’s CBD. State and Federal landowners along the Sydney Harbour foreshore have formed a new group aimed at jointly delivering a suite of initiatives to enhance the visitor experience around Sydney Harbour, including digital innovation. The NSW Government has approved a new office accommodation policy that will encourage greater workplace flexibility for government sector employees, and enhanced collaboration across the public sector. The NSW Government has resumed the procurement of its outsourced cleaning contract, known as the Whole-of-Government Facilities Management Contract, to provide services to approximately 4,200 government sites across the State, including schools, TAFE campuses, ambulance stations and fire stations
Jim Parsons Jim Parsons, who plays arrogant nerd Sheldon on CBS' hit comedy The Big Bang Theory, has found a very modest way to announce that he is gay. In an interview with the New York Times, Parsons discusses his recent work on Broadway, which includes playing a gay activist in The Normal Heart. Big Bang Burning Questions: What's Next for Howard and Bernadette? In reporting Parsons' affinity for the play, author Patrick Healy revealed something that has been long speculated. "The Normal Heart resonated with him on a few levels: Mr. Parsons is gay and in a 10-year relationship, and working with an ensemble again onstage was like nourishment," he wrote.While The National Enquirer "outed" Parsons in 2010 with news of a supposed engagement to partner Todd Spiewak, this is Parsons' first public acknowledgement of his sexuality.
Would a Citizenship Question on the 2020 Census Reduce Response Rates? Part 2 The Commence Department announced yesterday that the 2020 Census will include a citizenship question. In a blog post published earlier that day, we discussed the concern that adding this question might reduce the response rates in immigrant communities, potentially leading to an increased undercount, especially given the Trump administration's emphasis on immigration enforcement. Several news stories repeated this concern yesterday. In our prior blog post we reported that there has been no increase in the share of people who refuse to take part in the Census Bureau's annual American Community Survey (ACS) (which asks about citizenship) that can be attributed to Trump's rise. Further, the share of people who do not answer the ACS citizenship question or who give an answer that does not make sense also shows no increase that can be linked to Trump. We also reported some additional information from the Census Bureau's monthly Current Population Survey (CPS). In this posting, we further analyze the CPS and we find that the share of new people entering the survey each month who do not answer the survey's citizenship question, or who give a nonsensical answer to it, seems to have been unaffected by the Trump's candidacy or election. The figure below reports the share of responses to the CPS citizenship question that had to be "allocated" by the Census Bureau. An allocated response means that the respondent left the question blank or gave an answer that did not make sense — for example, someone indicates on the place of birth question that he was born in the United States, but then indicates he is not a U.S. citizen on the citizenship question. Using a complex methodology, the bureau fills in or fixes these problematic responses. Unlike the annual ACS, which our prior blog examined, the CPS gives us data for every month; this should give us a clearer indication of any possible "Trump effect" on the willingness of people to report their citizenship. The figure only reports figures for the CPS "incoming rotations groups". Each month new people join the survey and remain in it for four months, leave it for four months, and then return for four months. There are a total of eight rotation groups in the survey at any one time, one of which leaves each month while one joins the survey each month. The figure below looks only at the incoming group — the people joining the survey for the first time. This means this is the first time they have been asked about their citizenship by the Census Bureau. The allocation rates reported in the public-use data for the incoming rotation group shows no big jumps or shifts upward in allocations associated with Trump's candidacy or election. (If we look at all the people in the survey there is also no discernible Trump effect.) Events such as the announcement of his candidacy or his winning of the election were certainly well covered by the media. Yet the figures show no clear indication that these events increased the need for the Census Bureau to fill in blanks or correct responses for the citizenship question among new people joining the survey. In sum, allocation rates in the CPS when examined month by month show no "Trump effect" of the kind we would expect if the president's emphasis on enforcement impacted the bureau's ability to collect citizenship data. As I observed in my prior blog post, the Census Bureau's ongoing effort to collect surveys that include a citizenship question do not indicate that adding such a question to the 2020 decennial census would significantly reduce response rates. There has been no significant change associated with the rise of Donald Trump in the allocation rates for the citizenship question in the monthly Current Population Survey. (Allocated responses are those filled in or changed by the Census Bureau because the answer was left blank or did not make sense.) Source: Public-use files of the January 2014 to January 2018 Current Population Survey using weighted response to citizenship question. The Center for Immigration Studies is an independent, non-partisan, non-profit research organization founded in 1985. It is the nation's only think tank devoted exclusively to research and policy analysis of the economic, social, demographic, fiscal, and other impacts of immigration on the United States.
Velda Rose Medical Center Since our establishment, Velda Rose Medical Center has been a recognized provider of family health care in the east Mesa Area. We strive to provide you with kind, caring, and up-to-date medical services tailored to your specific lifestyle to ensure that you get the most out of your mind, body, and health. We provide a wide range of services to help you accomplish your health and welness goals including but not limited to:
Kitchen Cabinets Walnut Ca Kitchen Cabinets Walnut Ca - Different colours of kitchen cabinets go in and out of style throughout the years. An appealing colour could be in for five to ten years and then be out of style for the following decade. You want your own kitchen to be warm and inviting, but at the same time, you would like it to convey a sense of contemporary allure. A lot of this "attitude adjustment" can be accomplished with new kitchen cabinets. Changing your cabinets is something, but with prices growing, it's generally been budget prohibitive, until now. With recent developments in the cabinet business, ready to assemble cabinets have become affordable and extremely stylish. Now it is possible to convert your old, out of date kitchen to the modern kitchen seen in home improvement magazines. And along with the aid of prepared to assembling kitchen cabinets, this new appearance will even be affordable. We compared prices of kitchen cabinets and accumulated kitchen cabinets. The cost difference was about twenty percent less for cabinets that are constructed. The prices that are internet were about thirty percent less than retail! We compared quality. These cabinets looked amazing, but are made of the second-rate stuff that may fall warp or apart from standard usage. With all the savings we located, we decided to leap into our job. A lighter shade of cabinet was our choice - because we had a kitchen that is smaller. We found that light would be reflected by a lighter shade and provide the feel of a bigger kitchen. We meticulously went through each website to compare prices and located several kitchen cabinet sites. After picking the cabinets and doing research that was enough, we purchased online, and the cabinets arrived about two weeks later.
/* * Copyright 2019 Mikhail Shiryaev * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * * Product : Rapid SCADA * Module : PlgChart * Summary : Minute data report output web form * * Author : Mikhail Shiryaev * Created : 2016 * Modified : 2019 */ using Scada.Client; using System; using Utils.Report; namespace Scada.Web.Plugins.Chart { /// <summary> /// Minute data report output web form /// <para>Выходная веб-форма отчёта по минутным данным</para> /// </summary> /// <remarks> /// URL example: /// http://webserver/scada/plugins/Chart/MinDataRepOut.aspx?cnlNums=1,2&viewIDs=1,1&year=2016&month=1&day=1&period=2 /// </remarks> public partial class WFrmMinDataRepOut : System.Web.UI.Page { protected void Page_Load(object sender, EventArgs e) { AppData appData = AppData.GetAppData(); UserData userData = UserData.GetUserData(); // проверка входа в систему if (!userData.LoggedOn) throw new ScadaException(WebPhrases.NotLoggedOn); // получение параметров запроса int[] cnlNums = Request.QueryString.GetParamAsIntArray("cnlNums"); int[] viewIDs = Request.QueryString.GetParamAsIntArray("viewIDs"); DateTime startDate = Request.QueryString.GetParamAsDate(); int period = Request.QueryString.GetParamAsInt("period"); // проверка прав и получение представления, если оно единственное if (!userData.UserRights.CheckInCnlRights(cnlNums, viewIDs, out int singleViewID)) throw new ScadaException(CommonPhrases.NoRights); BaseView singleView = userData.UserViews.GetView(singleViewID, true, true); string viewTitle = singleView == null ? "" : singleView.Title; // генерация отчёта RepBuilder repBuilder = new MinDataRepBuilder(appData.DataAccess); RepUtils.WriteGenerationAction(appData.Log, repBuilder.RepName, userData); repBuilder.Generate( new object[] { cnlNums, startDate, period, viewTitle }, Server.MapPath("~/plugins/Chart/templates/"), RepUtils.BuildFileName("MinData", "xml"), Response); } } }
Q: How to generate custom widths for bootstrap classes using SASS I want to customize the bootstrap source code so that I get more w-XX classes. I want to extend it so that I have both w-40 and w-60. I see in the documentation that I have to modify the $sizes variable. So in my custom.scss I do just that: $sizes: ( 25: 25%, 40: 40%, 50: 50%, 60: 60%, 75: 75%, 100: 100%, auto: auto ); And then I compile my scss file but the new classes I want are not generated. What am I missing? A: You need to import bootstrap.scss after it. $sizes: ( 25: 25%, 40: 40%, 50: 50%, 60: 60%, 75: 75%, 100: 100%, auto: auto ); @import "~bootstrap/scss/bootstrap";
--- abstract: | The thermal entanglement in Heisenberg $XYZ$ chain is investigated in the presence of external magnetic field $B$. In the two-qubit system, the critical magnetic field $B_c$ is increased because of introducing the interaction of the z-component of two neighboring spins $J_z$. This interaction not only improves the critical temperature $T_c,$ but also enhances the entanglement for particular fixed $B$. We also analyze the pairwise entanglement between nearest neighbors in three qubits. The pairwise entanglement, for a fixed $T$, can be strong by controlling $B$ and $J_z$. PACS: 03.65. Ud, 03.67. -a, 75.10. Jm address: | [Department of Physics, Dalian University of Technology,]{}\ Dalian, 116024, P. R. China author: - 'L. Zhou, H. S. Song, Y. Q. Guo and C. Li' title: Enhanced the thermal Entanglement in Anisotropy Heisenberg $XYZ$ Chain --- Introduction ============ Entanglement is an important resource in quantum information [@bennett]. The ideal case which Quantum computing and quantum communication  are put into use  is to find entanglement resource in solid system at a finite temperature. The Heisenberg model is a simple but realistic and extensively studied solid state system [@PRH][@SE]. Recently, Heisenberg interaction is not localized in spin system. It can be realized in quantum dots [@DL], nuclear spins [@BEK], cavity QED [@AI][@SBZ]. This effect Hamiltonian can be used for quantum computation [@DAL] and controlled NOT gate [@SBZ]. The thermal entanglement in isotropic Heisenberg spin chain has been studied in the absence \[9,10,15\] and in the presence of an external magnetic $B$ \[9,10,14\]. The entanglement of two-qubit isotropic Heisenberg system decreases with the increasing $T$ and vanishes beyond a critical value $T_c$ \[9,10\], which is independent of $% B.$ Pairwise entanglement in $N$-qubit isotropic Heisenberg system in certain degree can be increased by increasing the temperature or the external field $B$ [@MC]. Anisotropic Heisenberg spin chain has been investigated in the case of $B=0$ [@wxg] and $B\neq 0$ [@GL]. For a two-qubit anisotropic Heisenberg $XY$ chain, one is able to produce entanglement for finite $T$ by adjusting the magnetic field strength [@GL]. However, the entanglement by increasing $T$ or $B$, in two-qubit anisotropic Heisenberg $XY$ chain [@GL] or in $N$-qubit isotropic Heisenberg chain [@MC], is very weak. How to produce strong entanglement is worthy to study. On the other hand, we have not find the work about two-qubit or the $N$-qubit anisotropic $XYZ$ Heisenberg chain in the presence of magnetic field. Although the $N$-qubit Heisenberg chain has been studied [@KMO] [@MC], in Ref. [@KMO] the authors studied the maximum possible nearest neighbor entanglement for ground state in a ring of $N$ qubits, and in [@MC] they just investigated the case of isotropy $N$ qubits Heisenberg chain. In this paper, we study the entanglement of two-qubit anisotropic Heisenberg $XYZ$ chain and the pairwise entanglement of three-qubit anisotropic Heisenberg $XYZ$ chain. Introducing the interaction of the z-component of two neighboring spins not only improve the critical temperature $T_c$ but also enhance the entanglement for fixed $B$ and $T$ in particular regions. In the case of anisotropic three-qubit Heisenberg $XYZ$ chain, the effect of partial anisotropy $\gamma $ make the revival phenomenon more apparent than in two-qubit chain; for a fixed $T$, one can obtain a robust entanglement by controlling $B$ and $J_z$. The Hamiltonian of $N$-qubit anisotropic Heisenberg $XYZ$ model in an external magnetic field $B$ is [@GL] $$H=\frac 12\sum_{i=1}^N[J_x\sigma _i^x\sigma _{i+1}^x+J_y\sigma _i^y\sigma _{i+1}^y+J_z\sigma _i^z\sigma _{i+1}^z+B(\sigma _i^z+\sigma _{i+1}^z)],$$ where $\overrightarrow{\sigma }_j=(\sigma _j^x,\sigma _j^y,\sigma _j^z)$ is the vector of Pauli matrices and $J_i(i=x,y,z)$ is real coupling coefficient. The coupling coefficient $J_i$ of arbitrary nearest neighbor two qubits is equal in value. For the spin interaction, the chain is said to be antiferromagnetic for $J_i>0$ and ferromagnetic for $J_i$ $<0$. For a system in equilibrium at temperature $T$ , the density operator is $% \rho =Z^{-1}\exp (-H/k_BT)$, where $Z=Tr[\exp (-H/k_BT)]$ is the partition function and $k_B$ is Boltzmann’s constant. For simplicity we write $k_B=1$. Entanglement of two qubits can be measured by concurrence $C$ which is written as $C=\max (0,2\max \{\lambda _i\}-\sum_{i=1}^4\lambda _i)$ [@CHB][@sh][@ca], where $\lambda _i$ is the square roots of the eigenvalues of the matrix $R=\rho S\rho ^{*}S$, $\rho $ is the density matrix, $S=\sigma _1^y\otimes \sigma _2^y$ and $*$ stand for complex conjugate. The concurrence is available no matter what $\rho $ is pure or mixed.   Two-qubit Heisenberg $XYZ$ chain ================================ Now, we consider the Hamiltonian for anisotropic two-qubit Heisenberg $XYZ$ chain in an external magnetic field $B$. The Hamiltonian can be expressed as $$H=J(\sigma _1^{+}\sigma _2^{-}+\sigma _1^{-}\sigma _2^{+})+J\gamma (\sigma _1^{+}\sigma _2^{+}+\sigma _1^{-}\sigma _2^{-})+\frac{J_z}2\sigma _1^z\sigma _2^z+\frac B2(\sigma _1^z+\sigma _2^z)$$ where $\sigma ^{\pm }=\frac 12(\sigma ^x\pm i\sigma ^y)$ is raising and lowering operator respectively, and $J=\frac{J_x+J_y}2,$ $\gamma =\frac{% J_x-J_y}{J_x+J_y}$. The parameter $\gamma $ $(0<\gamma <1)$ measure the anisotropy (partial anisotropy) in $XY$ plane. When the Hamiltonian of the system has the form of Eq.(2), in the standard basis $\{|00\rangle ,|01\rangle ,|10\rangle ,|11\rangle \}$, the density matrix of the system can be written as $$\rho _{12}=\left( \begin{array}{llll} u_1 & 0 & 0 & v \\ 0 & w & z & 0 \\ 0 & z & w & 0 \\ v & 0 & 0 & u_2 \end{array} \right) .$$ These nonzero matrix element can be calculated through $$\begin{aligned} u_1 &=&Tr(|00\rangle \langle 00|\rho ),u_2=Tr(|11\rangle \langle 11|\rho ), \nonumber \\ w &=&Tr(|01\rangle \langle 01|\rho ),v=Tr(|00\rangle \langle 11|\rho ),z=Tr(|01\rangle \langle 10|\rho ).\end{aligned}$$ The square roots of the eigenvalues of the matrix $R$ are $\lambda _{1,2}=|w\pm z|,\lambda _{3,4}=|\sqrt{u_1u_2}\pm v|$. Therefore, we can calculate the concurrence. The eigenvalues and eigenstates of $H$ are easily obtained as $H|\Psi ^{\pm }\rangle =(-\frac{J_z}2\pm J)|\Psi ^{\pm }\rangle $, $H|\Sigma ^{\pm }\rangle =(\frac{J_z}2\pm \eta )|\Sigma ^{\pm }\rangle ,$with the eigenstates $|\Psi ^{\pm }\rangle =\frac 1{\sqrt{2}}(|01\rangle \pm |10\rangle )$, $|\Sigma ^{\pm }\rangle =\frac 1{\sqrt{2\eta (\eta \mp B)}}% [(\eta \mp B)|00\rangle \pm J\gamma |11\rangle ]$, where $\eta =\sqrt{% B^2+(J\gamma )^2}$. One can notice that the eigenstates are the same as the case of $J_z=0$[@GL]. Because the basises $|01\rangle $ and $|10\rangle $ are the two degenerate eigenstates of $\sigma _1^z\sigma _2^z$ with eigenvalue $-1$, hence the superposition of the two degenerate states $% |01\rangle $ and $|10\rangle $ still is the eigenstate of $\sigma _1^z\sigma _2^z$, that is, $|\Psi ^{\pm }\rangle $ is the eigenstate of $J_z=0$ as well as that of $J_z\neq 0$. The same reason account for $|\Sigma ^{\pm }\rangle $ both as an eigenstate of Eq.(2) and as that of the case of $J_z=0$ . From Eq.(4), tracing on the eigenstates, we obtain the square roots of the eigenvalues of the matrix $R$ $$\begin{aligned} \lambda _{1,2} &=&Z^{-1}e^{\frac{\beta J_z}2}e^{\pm \beta J}, \nonumber \\ \lambda _{3,4} &=&Z^{-1}e^{-\frac{\beta J_z}2}|\sqrt{1+(\frac{J\gamma }\eta \sinh \beta \eta )^2}\mp \frac{J\gamma }\eta \sinh \beta \eta |,\end{aligned}$$ where the partition function $Z=2(e^{-\frac{J_z}{2T}}\cosh \beta \eta +e^{% \frac{\beta J_z}2}\cosh \beta J)$. Because the concurrence is invariant under the substitutions $J\rightarrow -J$ and $\gamma \rightarrow -\gamma $ [@GL], we will consider the case $J>0$ and $0<\gamma <1$. But with substitution $J_z\rightarrow -J_z$ the the concurrence is variant. We choose $J_z>0$, and we will state the reason later. We first review the circumstance of anisotropic Heisenberg $XY$ chain, which is analyzed in [@GL]. At $T=0,$ exist a critical magnetic field $B_c$. As $B$ cross $B_c$, the concurrence $C$ drops suddenly then undergoes a ”revival” for sufficient large $\gamma .$ However, we noticed that $B_c$ decrease with the increasing of the anisotropic parameter $\gamma $. Although with $\gamma $ increasing the critical temperature $T_c$ is improved, the entanglement, when temperature is in the revival region, is very weak. With $\gamma =0.3$, we show the concurrence as a function of $B$ and $T$ for two values of $J_z$ in Fig. 1. For $J_z=0$ (Fig.1a) corresponding to the circumstance of anisotropic Heisenberg $XY$ chain [@GL], one can observe a revival phenomenon and the weak entanglement in revival region. For the convenience of representation, we define the main region in which concurrence $C$ keeping its constant and maximal value. Comparing Fig. 1 (a) with (b), we find that with the increasing of $J_z,$ the main region is extended in terms of $B$ and $T$, i.e., the critical magnetic field $B_c$ is broadened and the critical temperature $T_c$ in main region is improved. That is to say, the range of concurrence $C$ keeping its constant and maximal is extended in terms of $B$ and $T,$ so we can obtain strong entanglement in the extended range. We can understand the effect of $J_z$ on $B_c$ from the case of $T=0$. For $% T=0$ under the condition of $J_z\leq J$, $C$ can be written analytically as $$C(T=0)=\left\{ \begin{array}{c} 1\text{ \qquad \qquad \quad \quad for }\eta <J+J_z \\ (1-J\gamma /\eta )/2\text{ \quad for }\eta =J+J_z \\ J\gamma /\eta \text{ \quad \quad \quad \quad for }\eta >J+J_z \end{array} \right.$$ The parameters $J$, $\eta $ and $\gamma $ are independent of $J_z$ in the case of two interacting qubits. Comparing Eq.(6) with Eq.(6) of Ref.[@GL], we can see clearly that if $J_z$ is positive, $J_z$ makes the intersection points of piecewise function shift. In this paper, we consider the case of $% J_z>0$. Fig. 2 shows the concurrence at $T=0$ for three values of positive $% J_z$. It show clearly that concurrence drops sharply at a finite value of magnetic field $B$, which is called critical magnetic field $B_c$, at which the quantum phase transition occurs[@GL]. But with the increasing of $% J_z $, $B_c$ is increased. The interaction of the z-component of two neighboring spins $J_z$ causes a shift in the locations of the phase transitions. Namely, the presence of positive Jz increases the region over which the concurrence C attains its maximum value.This result means that in larger region of $B$ and $T$ we can obtain stronger entanglement. The effect of $J_z $ is different with that of $\gamma $ on changing $B_c$. In the case of $J_z=0$ [@GL], although with the increasing of $\gamma $ the critical temperature $T_c$ is increased, the larger the values of $\gamma $, the smaller the critical magnetic field $B_c$. Here, introducing the z-component interaction of two neighboring spins not only extends critical magnetic field $B_c$ but also improves critical temperature $T_c$ and the entanglement (we will further show it in Fig. 3). Let us consider concurrence changing with temperature for different values of $J_z$ in a fixed $B$ ($B=1.1$). We plot it in Fig. 3 with $\gamma =0.3$. We notice that existing a critical temperature $T_c$ at which the entanglement vanishes. Obviously, $T_c$ is improved monotonously with increasing of $J_z$. Under the condition $J_z=0$ (corresponding to $XY$ model [@GL]), the concurrence exhibit a revival phenomenon, but the maximal values of entanglement in both area are small. If introducing the $% J_z$, the critical external magnetic field $B_c$ become larger so that $% B=1.1 $ is less than $B_c$ (the critical magnetic when $J_z=0.2,0.5$ or $% J_z=0.9$), thus we observe the maximal value of entanglement 1. In the temperature range $0<T<1.725$ , the larger $J_z$ the stronger entanglement. Therefore, $J_z$ not only improve the critical temperature $T_c,$ but also enhance the entanglement for particular fixed $B$ and $\gamma .$ The pairwise entanglement in three qubits ========================================= The calculation of pairwise entanglement in $N$ qubits is very complicated due to the anisotropy in Heisenberg $XYZ$ chain. Here we just calculate the pairwise entanglement in three qubits to show the effects of $J_z$ . We now solve the eigenvalue problems of the three-qubit $XYZ$ Hamiltonian. We list the eigenvalues and the corresponding eigenvectors as follow $$\begin{aligned} E_{1,2} &=&-J-\frac{J_z}2+B:|\Phi _{1,2}\rangle =\pm \frac 12(1\mp \frac 1{% \sqrt{3}})|110\rangle +\frac 1{\sqrt{3}}|101\rangle \mp \frac 12(1\pm \frac 1% {\sqrt{3}})|011\rangle ), \nonumber \\ E_{3,4} &=&J+\frac{J_z}2-B\pm \eta _{-}:|\Phi _{3,4}\rangle =\frac 1{\sqrt{% 2\eta _{-}[\eta _{-}\pm (J_z-2B-J)]}}[(J_z-2B-J\pm \eta _{-})|000\rangle +J\gamma \sum_{n=0}^2\Upsilon ^n|110\rangle ]; \nonumber \\ E_{5,6} &=&-J-\frac{J_z}2-B:|\Phi _{5,6}\rangle =\pm \frac 12(1\mp \frac 1{% \sqrt{3}})|010\rangle +\frac 1{\sqrt{3}}|100\rangle \mp \frac 12(1\pm \frac 1% {\sqrt{3}})|001\rangle ); \nonumber \\ E_{7,8} &=&J+\frac{J_z}2+B\pm \eta _{+}:|\Phi _{7,8}\rangle =\frac 1{\sqrt{% 2\eta _{+}[\eta _{+}\pm (J_z+2B-J)]}}[(J_z+2B-J\pm \eta _{+})|111\rangle +J\gamma \sum_{n=0}^2\Upsilon ^n|010\rangle ].\end{aligned}$$ where $\eta _{\pm }=\sqrt{(J_z-J\pm 2B)^2+3(J\gamma )^2},\Upsilon $ is the cyclic right shift operator [@wxg3]. The reduced density matrix of two nearest-neighbor qubits in $N$ qubits system also has the form of Eq.(3). Employing Eq.(4) and tracing on the basis of eigenstates shown in Eq. (7), one can get the density matrix $\mu _1$, $\mu _2,w$, $z,v$, then further obtain the concurrence. Here we do not write the expressions of $\lambda _i$ because it is very long. We will directly plot some curves to show the effect of $J_z$ on enhancing entanglement. Fig.4 show concurrence as a function of $B$ and $T$ with $\gamma =0.3$, $% J_z=0.9$ and $J=1.0$ in three-qubit $XYZ$ Heisenberg chain. We see that with the same $\gamma =0.3,$ the effect of partial anisotropy $\gamma $ make the revival phenomenon more apparent than in two-qubit chain. When $B=4$ in Fig. 1, the largest critical temperature $T_c$ produced by $\gamma $ is about $% 1.0 $ (Fig.1a); due to the restrain of $J_z$ the maximum temperature only caused by $\gamma $ is below 0.8(Fig.1b). However, in three-qubit system if $% B=4$ with the same set of parameters, comparing Fig.1b with Fig.4, the critical temperature $T_c$ in revival region almost equal to $1.8$. The stronger effect of $\gamma $ implies that if we aim to obtain strong entanglement we can decrease $\gamma $ properly and increase $J_z$, otherwise increasing $\gamma $ can make the revival phenomenon more evident. Of course, the coupling constant $J_z$ also increase magnetic field $B_c$ and expend the region of concurrence keeping constant in terms of $B$ and $T$ as it do in two-qubit (for the limited of the page,we do not plotted here) . For $T=0.6$, Fig.5 show concurrence as function of $B$ and $J_z$. There is no entanglement for $B=0$, which corresponds with Fig.4. If $J_z$ is below a certain value, in case of Fig. 5 the value is about $0.2$, the entanglement appears in one area corresponding to the ”revival”[@GL] on condition that the magnetic field is larger than a certain value, and the certain value of $B$ is increased with the enhanced of $J_z$. But, if $J_z$ is larger than $0.2$, there are two areas appearing entanglement, and the entanglement appearing in the lower range of $B$ can be much stronger than that in higher magnetic field. In the lower range of $B$, for a certain $B$, the large $J_z$ the large concurrence. Thus, in the $N$-qubits $XYZ$ system, for a fixed $T$, one can obtain a robust entanglement by controlling $B$ and $J_z$. Conclusion ========== The thermal entanglement in anisotropic $XYZ$ Heisenberg chain is investigated. Through analyzing the two-qubit system, we find that with the increasing of $J_z,$ the critical magnetic field $B_c$ is increased; the coupling along $Z$ not only improves the critical temperature $T_c$, but also enhances the entanglement for certain fixed $B$. We also analyze the entanglement between two nearest neighbors in three qubits and find that the effect of partial anisotropy is more evident than it do in two-qubit system. The pairwise entanglement exhibit a interesting phenomenon. For certain fixed $B$ , if the coupling constant $J_z$ is small, the pairwise entanglement only exists in relative strong magnetic field $B$ and the entanglement is weak. By increasing $J_z,$ in lower range of $B$ , one can obtain a strong entanglement. Therefore, interaction constant of the z-component of two neighboring spins $J_z$ play important role in enhancing entanglement and in improving the critical temperature. This work was supported by Ministry of Science and Technology of China under Grant No.2100CCA00700 The captions of the figure: Fig. 1 Concurrence in two-qubit Heisenberg $XYZ$ chain is plotted vs $T$ and $B$, where (a): $J_z=0$, (b): $J_z=0.9$. For all plotted $J=1.0$, $\gamma =0.3$. Fig. 2 Concurrence in two-qubit Heisenberg $XYZ$ chain vs $B$ at zero temperature for various values of $J_z$ with $\gamma =0.3$ and $J=1.0$. From left to right $J_z$ equal to 0, 0.5, 0.9, respectively. Fig.3 Concurrence in two qubits Heisenberg $XYZ$ chain is plotted vs $T$ . For all plotted $J=1.0$, $B=1.1$,$\gamma =0.3$.From top to bottom $J_z$ equal to 0.9, 0.5, 0.2, 0, respectively. Fig.4 Pairwise entanglement in three-qubit Heisenberg $XYZ$ chain is plotted as a function of $T$ and $B$, where $\gamma =0.3$, $J=1.0$, $J_z=0.9$. Fig.5 Pairwise entanglement is plotted as a function of $B$ and $J_z$, where $T=0.6$, $J=1.0$, $\gamma =0.3$ . C. H. Bennett and D. P. DiVincenze, Nature [**404**]{}, 247 (2000) P. R. Hammar et al, Phys. Rev. B 59, 1008 (1999) S. Eggert, I. Affleck and M. Takahashi, Phys. Rev. Lett.,73, 332 (1994) D. Loss and D. P. DiVincenzo, Phys. Rev. A, 57, 120 (1998);G. Burkard, D. Loss and D. P. DiVincenzo, Phys. Rev. B, 59, 2070 (1999) B. E. Kane, Nature 393, 133 (1998) A. Imamoglu, D. D. Awschalom, G. Burkard, D. P. DiVincenzo, D. Loss, M. Sherwin, A. Small, Phys. Rev. Lett. 83, 4204 (1999) S. B. Zheng, G. C. Guo, Phys. Rev. Lett. 85, 2392 (2000) D. A. Lidar, D. Bacon, and K. B. Whaley, Phys. Rev. Lett. 82, 4556 (1999) M. C. Arnesen, S. Bose and V. Vedral, Phys. Rev. Lett. 87, 017901 (2001) X. Wang, Phys. Rev. A 64, 012313 (2001) G. L. Kamta and A. F. Starace, Phys. Rev. Lett. 88, 107901(2002) K. M. OConnor and W. K.Wootters Phys. Rev. A 63, 052302 (2001) C. Anteneodo and M. C. Souza, J of Opt. B 5, 73 (2003) X. Wang, Phys. Rev. A 66,034302 (2002) X. Wang, Phys. Rev. A 66,044305 (2002) C. H. Bennett, D. P. DiVincenzo, J. A. Smolin and W. K. Wootters Phys. Rev. A 54, 3824 (1996) S. Hill and W. K. Wootters Phys. Rev. Lett. 78, 5022 (1997)
--- abstract: 'Strong equivalence is a well-studied and important concept in answer set programming (ASP). $\lpmln$ is a probabilistic extension of answer set programs with the weight scheme adapted from Markov Logic. Because of the semantic differences, strong equivalence for ASP does not simply carry over to $\lpmln$. I study the concept of strong equivalence in $\lpmln$ with the goal of extending strong equivalence to $\lpmln$ programs. My study shows that the verification of strong equivalence in $\lpmln$ can be reduced to equivalence checking in classical logic plus weight consideration.The result allows us to leverage an answer set solver for checking strong equivalence in $\lpmln$. Furthermore, this study also suggests us a few reformulations of the $\lpmln$ semantics using choice rules, logic of here and there, and the second-order logic. I will present my work result of strong equivalence for $\lpmln$ and talk about my next steps for research: one is approximately strong equivalence, and another is the integration of fuzzy logic with neural network.' author: - Man Luo title: 'Strong Equivalence for $\lpmln$ Programs' --- Introduction ============ $\lpmln$ is a probabilistic extension of answer set programs with the weight scheme adapted from Markov Logic [@richardson06markov]. An $\lpmln$ program defines the probability distribution over all “soft” stable models, which do not necessarily satisfy all rules in the program, but the more rules with the bigger weights they satisfy, the bigger their probabilities. $\lpmln$ turns out to be highly expressive to embed several other probabilistic logic languages, as more results are built upon $\lpmln$, it becomes more important to consider the equivalence between different $\lpmln$ programs. As with answer set programs, $\lpmln$ programs $\mo{F}$ and $\mo{G}$ that have the same soft stable models with the same probability distribution are not necessarily equivalent in a stronger sense. When we add the same program $\mo{H}$ to each of $\mo{F}$ and $\mo{G}$, the resulting programs may have different soft stable models and different probability distributions. However, because of the semantic differences, strong equivalence for answer set programs does not simply carry over to $\lpmln$. Based on this observation, I study the notion of strong equivalence for $\lpmln$ and characterize this concept. The paper is organized as follows: Section \[sec:se\] presents the background of my research. Section \[sec:soft-ht\] explains the central question of my research. Section \[sec:se-solver\] shows the main accomplishment of my current work and the plan for the future work. Background: Language $\lpmln$ {#sec:se} ============================= An $\lpmln$ program is a finite set of weighted formulas $w: R$ where $R$ is a propositional formula and $w$ is a real number (in which case, the weighted rule is called [*soft*]{}) or $\alpha$ for denoting the infinite weight (in which case, the weighted rule is called [*hard*]{}). For any $\lpmln$ program $\mo{F}$ and any set $X$ of atoms, $\o{\mo{F}}$ denotes the set of usual (unweighted) formulas obtained from $\mo{F}$ by dropping the weights, and $\mo{F}_X$ denotes the set of $w: R$ in $\mo{F}$ such that $X\models R$. Given an $\lpmln$ program $\mo{F}$, $\sm[\mo{F}]$ denotes the set of [*soft stable models*]{}: $$\ba l \{X\mid \text{$X$ is a (standard) stable model of $\o{\mo{F}_X}$}\}. \ea$$ By $\i{TW}(\mo{F})$ (“Total Weight" of $\mo{F}$) we denote the expression $exp({\sum\limits_{ w:R\in \mo{F}} w})$. For any interpretation $X$, the weight of an interpretation $X$, denoted $W_{\mo{F}}(X)$, is defined as [ $$W_{\mo{F}}(X) = \begin{cases} \i{TW}(\mo{F_X}) & \text{if $X\in\sm[\mo{F}]$}; \\ 0 & \text{otherwise}, \end{cases}$$ ]{} and the probability of $X$, denoted $P_\mo{F}(X)$, is defined as [$$P_\mo{F}(X) = \lim\limits_{\alpha\to\infty} \frac{W_\mo{F}(X)}{\sum\limits_{Y\in {\rm SM}[\mo{F}]}{W_\mo{F}(Y)}}.$$ ]{} Central Question: Strong Equivalence for $\lpmln$ {#sec:soft-ht} ================================================= Strong equivalence is an important concept in the theory of answer set programming. Informally speaking, logic programs $\mo{P}$ and $\mo{Q}$ are strongly equivalent if, given any program $\mo{R}$, programs $\mo{P} \cup \mo{R}$ and $\mo{Q} \cup \mo{R}$ have the same stable models. On the other hand, Logic of Here and There (logic $HT$) is proven to be useful for a monotonic basis for checking strong equivalence [@lif01], and equilibrium models [@pearce06equilibrium] are defined as a special class of minimal models in logic $HT$. However, because of the semantic differences, strong equivalence for answer set programs does not simply carry over to $\lpmln$. First, weights play a role. Even for the same structure of rules, different assignments of weights make the programs no longer strongly equivalent. Also, due to the fact that soft stable models do not have to satisfy all rules, strongly equivalent answer set programs do not simply translate to strongly equivalent $\lpmln$ programs. For instance, $\{a\lor b, \ \ \bot\ar a, b\}$ is strongly equivalent to $\{a\ar \no\ b, \ \ b \ar \no\ a, \ \ \bot\ar a,b \}$, but its $\lpmln$ counterpart $\{\alpha: a\lor b, \ \ \alpha:\bot\ar a, b\}$ is not strongly equivalent to $\{\alpha: a\ar \no\ b, \ \ \alpha: b \ar \no\ a, \ \ \alpha:\bot\ar a,b \}$: if we add $\{\alpha: a\ar b,\ \ \alpha: b\ar a\}$ to each of them, $\{a,b\}$ is a soft stable model of the former (by disregarding the rule $\alpha: \bot\ar a,b$) but not of the latter I extend the notion of strong equivalence to $\lpmln$, and show that the verification of strong equivalence in $\lpmln$ can be reduced to equivalence checking in classical logic plus weight consideration. We also extend the logic of here and there to weighted rules, which provides a monotonic basis of checking strong equivalence. The study of strong equivalence suggests us a few reformulations of the $\lpmln$ semantics using choice rules, logic of here and there, and second-order logic, which present us useful insights into the semantics. Definition 1 is the notion of strong equivalence in $\lpmln$ in terms of probability distribution. \[def:se\] $\lpmln$ programs $\mo{F}$ and $\mo{G}$ are called [*strongly equivalent*]{} to each other if, for any $\lpmln$ program $\mo{H}$, $$P_{\mo{F}\cup \mo{H}}(X) = P_{\mo{G}\cup \mo{H}}(X)$$ for all interpretations $X$. The following theorem shows a characterization of strong equivalence that does not need to consider adding all possible $\lpmln$ program $\mo{H}$, which can be reduced to equivalence checking in classical logic plus weight checking. For any $\lpmln$ program $\mo{F}$ and any set $X$ of atoms, $\o{\mo{F}}$ denotes the set of usual (unweighted) formulas obtained from $\mo{F}$ by dropping the weights, and $\mo{F}_X$ denotes the set of $w: R$ in $\mo{F}$ such that $X\models R$. \[thm:se-char\] For any $\lpmln$ programs $\mo{F}$ and $\mo{G}$, program $\mo{F}$ is strongly equivalent to $\mo{G}$ if and only if there is a w-expression $c$ such that for every interpretation $X$, 1. $TW(\mo{F}_X) = c \times TW(\mo{G}_X)$, and 2. $(\o{\mo{F}_X})^X$ and $(\o{\mo{G}_X})^X$ are classically equivalent. where $w$-expression is in the form of $e^{c_1+c_2\alpha}$, and $c_1$ is a real number counting the weight of soft rules, $c_2$ is an integer counting the weight of hard rules. \[ex:main\] Consider two programs $$\ba {lrcllrcl} \mo{F} ~~ & 0: & \neg a & \hspace{5mm} & \mo{G} ~~ & 2: & \neg a \lor b \\ & 2: & b\ar a & & &1: & a\lor \neg a \\ & 3: & a \ar \neg \neg a \\ \ea$$ Programs $\mo{F}$ and $\mo{G}$ are strongly equivalent to each other. The following table shows $\mo F$ and $\mo G$ statisfy two conditions in Theorem \[thm:se-char\]. $X$ $TW(\mo{F}_X)$ $TW(\mo{G}_X)$ $(\o{\mo{F}_X})^X$ $(\o{\mo{G}_X})^X$ ------------ ---------------- ---------------- -------------------- -------------------- $\phi$ $e^{5}$ $e^{3}$ $\top$ $\top$ $\{a\}$ $e^3$ $e^1$ $a$ $a$ $\{b\}$ $e^5$ $e^3$ $\top$ $\top$ $\{a, b\}$ $e^5$ $e^3$ $a\land b$ $a\land b$ : $(\o{\mo{F}_X})^{X}$ and $(\o{\mo{G}_X})^{X}$ \[tab:table1\] From the first and the second column, it is easy to see that $TW({\mo{F}_X}) = e^2 \times TW(\mo{G}_X)$, so the first condition in Theorem 1 is satisfied. The third and forth column show that the second condition in Theorem 1 is satisfied. However, if we replace rule   $3:\ \ a \ar \neg\neg a$   in $\mo{F}$ with   $3:\ \ a \ar a$   to result in $\mo{F}'$, then $\mo{F}'$ and $\mo{G}$ are not strongly equivalent: for $$\mo{H}=\{1 :a \leftarrow b, \ \ 1: b \leftarrow a\}$$ $\{a, b\}$ is a soft stable model for $\mo{G}\cup\mo{H}$ with the weight $e^5$, but it is not a soft stable model for $\mo{F'}\cup\mo{H}$, so its weight is 0. In accordance with Theorem \[thm:se-char\], $(\o{\mo{F'}_{\{a, b\}}})^{\{a, b\}}$ is not equivalent to $(\o{\mo{G}_{\{a, b\}}})^{\{a, b\}}$. The former is equivalent to $\{ b \leftarrow a\}$, and the latter is equivalent to $\{a \land b\}$. Even if the programs have the same soft stable models, the different weight assignments may make them not strongly equivalent. For instance, replacing the first rule in $\mo{G}$ by to result in $\mo{G}'$, we have $TW(\mo{F}_{\phi}) = e^1 \times TW(\mo{G'}_{\phi})$ and $TW(\mo{F}_{\{a\}}) = e^2 \times TW(\mo{G'}_{\{a\}})$, so there is no $w$-expression $c$ such that $TW(\mo{F}_X) = c \times TW(\mo{G'}_X)$. Based on the concepts of choice rules, logic HT[@hey30] and the second order, we present the theorem on soft stable, in which every item is equivalent to each other. Before introducing the theorem, we define the definition of choice formula and $\Delta_{\bf P'}(F)$. For any propositional formula $F$, by $\{F\}^{\rm ch}$ we denote the choice formula $F\lor\neg F$. Let ${\bf p}$ be the propositional signature. Let ${\bf p}'$ be the set of atoms $p'$ where $p\in {\bf p}$. For any formula $F$, $\Delta_{{\bf p}'}(F)$ is defined recursively: - $\Delta_{{\bf p}'}(p) = p'$ for any atomic formula $p\in {\bf p}$; - $\Delta_{{\bf p}'}(\neg F) = \neg F$; - $\Delta_{{\bf p}'}(F \land G) = \Delta_{{\bf p}'}(F) \land \Delta_{{\bf p}'}(G)$; - $\Delta_{{\bf p}'}(F \lor G) = \Delta_{{\bf p}'}(F) \lor \Delta_{{\bf p}'}(G)$; - $\Delta_{{\bf p}'}(F \rightarrow G) = (\Delta_{{\bf p}'}(F) \rightarrow \Delta_{{\bf p}'}(G)) \land (F \rightarrow G)$. [**Theorem on Soft Stable Models**]{}    For any $\lpmln$ program $\mo{F}$ and $\mo{G}$, the following conditions are equivalent. By $\mo{F}^X$, we denote the reduct of $\mo{F}$ obtained from $\mo{F}$ by replacing every maximal subformula of $\mo{F}$ that is not satisfied by $X$ with $\bot$. 1. For any $\lpmln$ program $\mo{H}$, programs $\mo{F}\cup\mo{H}$ and $\mo{G}\cup\mo{H}$ have the same soft stable models. 2. For any set $X$ of atoms, $(\o{\mo{F}_X})^X$ and $(\o{\mo{G}_X})^X$ are classically equivalent. 3. For any set $X$ of atoms, $(\{\o{\mo{F}}\}^{\rm ch})^X$ and $(\{\o{\mo{G}}\}^{\rm ch})^X$ are classically equivalent. 4. $\mo{F}$ and $\mo{G}$ have the same set of soft $HT$ models. 5. $(\{\o{\mo{F}}\}^{\rm ch}) \lrar (\{\o{\mo{G}}\}^{\rm ch})$ is provable in $HT$. 6. For any set $X$ of atoms, $\{p'\rar p \mid p \in {\bf p}\}$ entails $\Delta(\o{\mo{F}_X})\lrar \Delta(\o{\mo{G}_X})$ (in the sense of classical logic). 7. $\{p'\rar p \mid p \in {\bf p}\}$ entails $ \Delta(\{\o{\mo{F}}\}^{\rm ch})\lrar\Delta(\{\o{\mo{G}}\}^{\rm ch})$ (in the sense of classical logic). Accomplishment and Future work {#sec:se-solver} ============================== Accomplishment -------------- Theorem 1 shows a characterization of strong equivalence that does not need to consider adding all possible $\lpmln$ programs $\mo{H}$. Similar to Proposition 2 from [@fer05], it shows that the verification of strong equivalence in $\lpmln$ can be reduced to equivalence checking in classical logic plus weight checking. I am still at the beginning stage in research. I get familiar with $\lpmln$ language by the study of strong equivalence and it indeed gives me more insight and I feel quite interested in the area of knowledge representation and reasoning. In the following, I will show two interesting topics that I will investigate in my next step. Future work ----------- ### Approximate strong equivalent. We plan to extend the work to approximate strong equivalence, where the probability distributions may not necessarily be identical but allowed to be slightly different with some error bound. Approximate strong equivalent for $\lpmln$ will have more flexibility. One application of approximate strong equivalence is weight learning in $\lpmln$. More specifically, due to the difference of initialized value of weights and the noise existing in the data, there is no guarantee that the weight learned from the data will be exactly the same. In such case, we should allow some certain bound so that the different set of weights can be approximate strong equivalence. ### Integration of symbolic and sub-symbolic. In symbolic systems, knowledge is encoded in terms of explicit structure(rules) and inferences are based on this structure(rules). Neural networks provide a powerful mechanism for learning patterns from massive data. Although neural network can learn the model from data, it has difficulty with high level reasoning. The integration of these two systems can take advantage from both sides: symbolic system can do the reasoning based on model, and neural networks can learn the model from the data. One obvious advantage of this integration is that the rules defined in symbolic system can “guide” neural network learn the relation among data. Recently, more and more studies focus on this field, such as Neural tensor network(LTN)[@donadello2017logic], TensorLog[@cohen2016tensorlog] etc. For instance, LTN is an interesting framework, in which it grounds the terms with vectors representing the features of the objects and grounds the clauses with real value in the interval \[0,1\] representing the truth degree of the clauses. By maximizing the truth degree of the clauses, LTN encodes the knowledge into neural networks. I am applying LTN to different tasks to get some insight with the goal of inventing an integration of symbolic and subsymbolic that works well for different domains. [1]{} \[1\][`#1`]{} \[1\][https://doi.org/\#1]{} Cohen, W.W.: Tensorlog: A differentiable deductive database. arXiv preprint arXiv:1605.06523 (2016) Donadello, I., Serafini, L., Garcez, A.D.: Logic tensor networks for semantic image interpretation. arXiv preprint arXiv:1705.08968 (2017) Ferraris, P.: Answer sets for propositional theories. In: Proceedings of International Conference on Logic Programming and Nonmonotonic Reasoning ([LPNMR]{}). pp. 119–131 (2005) Heyting, A.: Die formalen [R]{}egeln der intuitionistischen [L]{}ogik. Sitzungsberichte der Preussischen Akademie von Wissenschaften. Physikalisch-mathematische Klasse pp. 42–56 (1930) Lifschitz, V., Pearce, D., Valverde, A.: Strongly equivalent logic programs. ACM Transactions on Computational Logic **2**, 526–541 (2001) Pearce, D.: Equilibrium logic. Annals of Mathematics and Artificial Intelligence **47**(1-2), 3–41 (2006) Richardson, M., Domingos, P.: Markov logic networks. Machine Learning **62**(1-2), 107–136 (2006)
Regulatory Single Nucleotide Polymorphism rs368698783 (G>A): a Genetic Modifier of Hb F Production Only under Erythropoietic Stress Characteristic for β-Globin Chain Deficiency? A regulatory single nucleotide polymorphism (rSNP), the Aγ (+25 G>A) (rs368698783) (NG_000007.3: g47783G>A) located in the HBG1 proximal promoter, is a significant predictor of clinical severity by elevating Hb F levels in β-thalassemia (β-thal). In this study, the presence of the Aγ (+25 G>A) and Aγ (+25 A>A) genotypes was investigated in four subgroups from a total of 611 subjects, including 88 α-thalassemia (α-thal) carriers (group A), 162 β-thal carriers of point mutations (group B), 57 carriers of β-thal deletions (group C) and 152 non thalassemic individuals (group D). The result is that the genotypes G>A and A>A exhibit significantly high levels of Hb F compared with the genotype G>G in both groups B and C, while no significant difference was observed in both groups A and D. We assume that the effect of Aγ (+25 G>A) polymorphism on Hb F production is only under erythropoietic stress characteristic for β-globin chain deficiency.