text stringlengths 8 5.77M |
|---|
Logo's new reality show "Finding Prince Charming" could have been a little more charming because the prince isn't able to find any Asians. It's disappointing since the show included more African American and Latino bachelors. But it failed to include any Asian Americans. Gay Asian men are also looking for love.
We are constantly searching for our faces and voices in the media. Asian Americans are the nation's fastest growing minority group. And we are a growing segment of the LGBT community. Yet, LGBT Asian Americans are often overlooked or marginalized. Logo's "Finding Prince Charming" is the most recent example.
The National Queer Asian Pacific Islander Alliance (NQAPIA) has been fighting for more positive portrayals of LGBT Asian and Pacific Islanders in the media. There are many LGBT Asian actors, bachelors, and contestants waiting in the wings. But, sadly, only 6% of LGBTQ characters on television are Asian or Pacific Islander, according to GLAAD. That percentage is the lowest of any group and, what's worse, is the highest in over ten years. We've got a long way to go.
An Asian American contestant on Logo's "Finding Prince Charming" could have brought so much to the show. Diversity and inclusion is more than simply having an Asian face to check the "Asian" box. An Asian American contest could have brought certain values and perspectives to add to the richness of the contestant's experiences. Typical Asian American values of family, honoring parents and elders, and hard work ethic could have been have been brought in through an Asian American contestant. These narratives are what's often missing. And aren't these some of the values that we all want our future Prince Charming to have?
Moreover, gay Asian men are sexy. Sure, there was a time when all Asians in media were emasculated computer geeks or heavily accented foreign students. But I think today it's well settled that Asian men are beautiful, bodied, and often sought-after. Let's not fetishize the community, but rather, let's portray the full spectrum of the LGBT community.
It would have been nice if Logo took a few more affirmative actions to promote diversity that is inclusive of Asian Americans in its new reality show. Maybe next time, I hope.
WRITER'S CORRECTION:
After this post, one of the contestants, Brandon Kneefel, emailed the writer. He acknowledged the absence of casting Asians but noted that he is part Asian. His father is Indonesian (born in Java) and Polynesian. He is not Latino as many people assume. His dark features are because of his Asian heritage.
The writer acknowledges this error. The writer executed due diligence to determine if any of the contestants identified as Asian and was not able to identify that heritage for any of them. But this was a mistake.
Let's all be proud of Brandon and cheer him on.
----
Glenn D. Magpantay is the Executive Director of the National Queer Asian Pacific Islander Alliance (NQAPIA), a federation of LGBTQ Asian American, South Asian, Southeast Asian, and Pacific Islander organizations. Contact him at glenn_magpantay@nqapia.org |
Time-dependent aspects of CO2 induced amnesia and hippocampal monoamine metabolism in rats.
The time course of amnesia for a one-trial passive avoidance response after treatment with carbon dioxide (CO2) was studied. Amnesia developed gradually over the first 4 hr following the amnesic treatment. Once established, amnesia remained during a 4 week test period. Previously, we reported that acquisition of the passive avoidance response was attended with a rise in the hippocampal concentration of serotonin 24 hr later and that this rise was not observed when acquisition was followed by amnesic treatment. In the present study, it was found that a rise in hippocampal serotonin parallelled the transient retention of the avoidance response 2 hr after amnesic treatment. However, 2 weeks after acquisition and amnesic treatment no changes in hippocampal monomine metabolism could be detected. Hippocampal noradrenaline did not correlate with avoidance and amnesia. |
Arkedo Series JUMP! Lands on European PSN Tomorrow
At the beginning of August we reported that indie developer Sanuk Games would be bringing its retro-inspired Arkedo series to the PlayStation Network. Previously an Xbox Live Indie Games exclusive, this three-game series is now on its way to Sony's online shop. We had no word on when the games would launch, but today Sanuk announced that one of the games would land tomorrow in Europe.
Arkedo Series - 01 JUMP! is set to release for Sony's download service tomorrow. Still no word on when it will hit North America, but we can probably assume that it'll follow suit shortly after. Additionally, Sanuk has yet to announce the release dates for its other two titles, SWAP! and PIXEL!
JUMP! is the game I'm most excited to play, and you can bet I'll be downloading it on day one when it arrives here in North America. If you're interested in some good old school-style gameplay, watch out for these titles. Check out the announcement trailer here.
At $2.49 each, the three Arkedo games are definitely a steal. We'll be sure to have more info on the North American release dates for each of these indie gems. Stay tuned for upcoming news.
About The Author
David Sanchez
David Sanchez is the most honest man on the internet. You can trust him because he speaks in the third person. |
Q:
Is it possible to use a newer version of the aws-sdk than provided in AWS Lambda?
The latest version of the aws-sdk has functions for ComprehendMedical, which I'd like to create a lambda function for.
However, the version of the AWS-SDK is a few months outdated, and not able to use these functions yet. Wondering if there is a way to use the latest library?
Thank you!
A:
I recommend you create a Library bundle and create a Lambda Layer with it with the desired version of AWS-SDK in the Library bundle (including any other libraries that you want). Once you have the Lambda layer set you can assign it to your Lambda function(s). This helps with a reduced code size of your Lambda function without having the need to bundle up all the libraries you need with every single Lambda Function. Considering AWS-SDK to be a pretty large library, Lambda Layer will help you manage the size of your individual Lambda functions with purely your code in it.
The steps are simple.
Create a directory named nodejs, this is going to be your project directory. The name must be nodejs.
Perform
npm init inside of this directory.
Install all the libraries from
npm using npm install --save. Note: local install is important.
Once done, zip up the nodejs directory and upload it to a Lambda
Layer.
Use the Lambda Layer in all your Lambda functions.
Check out my article for the full details on how to set up a Lambda Layer for Node JS dependencies. I reckon that going forward, Lambda Layer should be everyone's choice of dependency management in Lambda.
NOTE: Lambda Layer was introduced recently in AWS re:Invent 2018. It is not only compatible with NodeJS, but also with pretty much any other Language (as per Amazon) like Python, Java, C#, C++ (yes!), Go, Rust etc.
|
[Effects of Ad-FLT-1/PC on the expression of inflammatory factors in rats with diabetic nephropathy atherosclerosis].
To explore the effect of recombinant adenovirus Ad-FLT-1/PC on the expression of vascular inflammatory factors in rats with diabetic nephropathy atherosclerosis. A total of 68 rats of diabetic nephropathy atherosclerosis were randomly divided into three groups of Ad-FLT-1/PC [recombinant adenovirus with protein C (PC) gene, n = 23], Ad-green fluorescence protein (recombinant blank adenovirus with GFP, n = 23), normal saline (n = 22) and compared with normal control (n = 23). And 300 µl of each was transfected via caudal vein. At day 1, 3, 7 and 14 post-transfection, 5 or 6 rats of each group were randomly sacrificed to observe the distribution of vascular fluorescence by frozen section. And the expression of PC was examined by immunohistochemistry (IHC). The expressions of tumor necrosis factor-alpha (TNF-α) and intercellular adhesion molecule 1 (ICAM-1) protein in vascular wall were measured by IHC. At day 3 after an injection of Ad-FLT-1/PC, green fluorescence was observed in vascular endothelium and continued until 14 days. IHC showed protein C in endothelial cells of Ad-FLT-1/PC group was higher than those of Ad-GFP and NS groups at Days 3-14 (P < 0.05). IHC showed the amounts of TNF-α and ICAM-1 in Ad-FLT-1/PC group were lower than those in GFP and NS groups at Day 7 post-transfection (P < 0.05). GFP and NS groups had no difference at all timepoints (P > 0.05). The recombinant adenovirus Ad-FLT-1/PC may be transfected into vascular walls of rats with diabetic nephropathy atherosclerosis. And exogenous PC can effectively express and protect vascular walls by inhibiting the expression of inflammatory cytokines. |
Acknowledging flaws in the entire supervising process would prompt firings and possible government budget cuts, which is why Riken has circled the wagons and heaped blame on Ms. Obokata, said Thomas Knöpfel, a founder of Riken’s Brain Science Institute and now a leading neuroscientist at Imperial College London. “It appears to me that Riken is more concerned about damage control and blame shifting” than about clarification, he said.
Mr. Knöpfel in part blamed the Obokata affair on a push by Riken to publish in high-impact journals rather than to focus on generating good science. “My observation was that Riken is driven by individual egos and interests beyond the healthy competition required for attaining a high scientific and ethical standard,” he commented.
For its part, Riken has said that it plans a thorough review of its procedures and personnel.
“Those who were not found to have been involved in research misconduct still bear a heavy responsibility for their administrative negligence, which allowed the research misconduct to occur,” it said in a statement. “These individuals will also be subjected to disciplinary measures.”
The news media have not escaped blame either. Desperate for a scientific success story, journalists hyped Ms. Obokata as a sort of academic idol similar to Japan’s army of twee, ephemeral female celebrities. Reporters who visited her laboratory noted that the walls had been painted pink and decorated with cartoon characters. Television images focused on her false eyelashes and a striking if impractical wide-sleeved apron. “They built her up, then knocked her down,” said Shohei Yonemoto, a professor at the Research Center for Advanced Science and Technology in the University of Tokyo.
Ms. Obokata declined to comment for this article. Naoki Namba, a spokesman for Riken, said she was still under contract but a committee set up to decide disciplinary measures would probably recommend dismissal. Mr. Sasai, her supervisor, also declined to comment. But in an April news conference, he appeared to shift some of the responsibility to Charles A. Vacanti, a Harvard University professor who supervised Ms. Obokata’s research and was a co-author of the Nature papers.
Dr. Vacanti has stood by the scientific content of the papers, which aimed to show that pluripotent stem cells could be created by the application of external stresses, such as a bacterial toxin or a weak acid bath. He has argued against withdrawing the papers and has said that, once the dust from the scandal has settled, the science underlying the phenomenon described as “stimulus-triggered acquisition of pluripotency” will “speak for itself.” (Such cells can theoretically be cultivated into any kind of living tissue, meaning they might eventually be used to create new human organs.) |
Frameless Mirrors ♦ Framed Mirrors
Browse our large selection of fine frameless mirrors, wood framed mirors, metal framed mirrors and beveled mirrors for your bathroom, home, office, business or as a fine gift for family or friends.
Since all we sell are quality, Kentwood Mirrors, rest-assured you are purchasing from experts.
All of our mirrors are made in the USA. Every mirror is American manufactured, including the solid wood frames, and assembled in Grand Rapids, Michigan. This ensures you receive the highest quality mirror available. Do not accept immitations or foreign alternatives.
All our wood framed mirrors are made of solid wood; no veneers, vinyl, fillers, or plastics are used.
All of the frameless mirrors in our collection come with hardboard backing and hooks for secure mounting right out of the box.
Free Shipping in the continental US on all orders.
A mirror for every room and any decor - to match your style: |
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Exactly, even with the so-called "thrashing" of Real Madrid I didn't feel we played that great (we were lucky not to concede in the first half) and we have been a second-half team for a long time. I felt people gave Valverde too much credit so far this season and it had more to do with how bad Real Madrid has been and less to do with how brilliant his tactics and coaching have been.
Agree.
Its also part of the 4-4-2 people seem to like so much but i dont.
That "2" is Suarez and Messi, and Messi almost never play in attack, so our attack is pretty much Suarez and nothing else.
If it was hard with 3 attackers before, its almost impossible for Suarez alone to go up against solid defences.
Coutinho rather work outside the box and should really play in the left AM role.
Dembele looks lost most of the time.
Most of the time our victories comes dodwn to Messi/Suarez individual brilliance.
The team is far from beeing done with reconstruction, most of the midfielders should still be sold, a proper CM brought in, and a wing attacker that breaks into the goalarea wouldnt be bad either.
Its also part of the 4-4-2 people seem to like so much but i dont.
That "2" is Suarez and Messi, and Messi almost never play in attack, so our attack is pretty much Suarez and nothing else.
If it was hard with 3 attackers before, its almost impossible for Suarez alone to go up against solid defences.
Coutinho rather work outside the box and should really play in the left AM role.
Dembele looks lost most of the time.
Most of the time our victories comes dodwn to Messi/Suarez individual brilliance.
The team is far from beeing done with reconstruction, most of the midfielders should still be sold, a proper CM brought in, and a wing attacker that breaks into the goalarea wouldnt be bad either.
True. I think if Suarez and Coutinho were the ones who poke at defenders and hassle them, I think the bus would be broken more easily. But he likes to stay at the edge of the box, dribble, cut in and take long shots. And Messi is doing the same. And all the attempts were easily saved. Coutinho is more like an AM so he shud be getting into the box more and making runs, so Messi or Busquets can easily ping the ball to him.
Off the ball movement is terrible and only Suarez has been great in this area. Even when Dembele came on, not much movement from him, playing as a RM he is just running at a parked bus.
True. I think if Suarez and Coutinho were the ones who poke at defenders and hassle them, I think the bus would be broken more easily. But he likes to stay at the edge of the box, dribble, cut in and take long shots. And Messi is doing the same. And all the attempts were easily saved. Coutinho is more like an AM so he shud be getting into the box more and making runs, so Messi or Busquets can easily ping the ball to him.
Off the ball movement is terrible and only Suarez has been great in this area. Even when Dembele came on, not much movement from him, playing as a RM he is just running at a parked bus.
This is my answer to a parked bus. If you want a combative striker or someone to run in behind you start Suarez... If you want more space for your wings or for them to run in behind start Messi... Coutinho will always cut in but with Dembélé you have someone that can both cut in and go to the byline.
Workhorses don't possess the creativity to unlock buses and playing with 2 pivots in a 4-2-3-1 is just going to lead to counters when the wide men lose the ball (which is always going to happen).
Only thing I'll say about this line-up is that in an ideal world Semedo would start at RB and Paulinho in place of Rakitic with liberties to run into the box. |
Q:
using POST JSON data with PHP cURL. Cannot get response
Hi I'm trying to POST some data in an array using JSON to receive a response and output the response. So far I have followed all the parameters closely but it fails to fetch the data.
I am using the Coinbase API to 'generate' a button
https://coinbase.com/api/doc/1.0/buttons.html
I have also put the correct API in the $ch variable below as per this page
https://coinbase.com/docs/api/authentication
It fails to fetch anything back. I have posted the correct details to get a response with some data but it fails, any ideas?
Here is my code
<?php
$data = array(
"button" => array(
"name" => "Product Name",
"price_string" => "1.23",
"price_currency_iso" => "USD",
"custom" => "Order 123",
"description" => "Sample description",
"type" => "buy_now",
"style" => "custom_large"
)
);
$json_data = json_encode($data);
$ch = curl_init('https://coinbase.com/api/v1/buttons?api_key=MYAPIKEY');
curl_setopt($ch, CURLOPT_CUSTOMREQUEST, "POST");
curl_setopt($ch, CURLOPT_HEADER, false);
curl_setopt($ch, CURLOPT_POSTFIELDS, $json_data);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_HTTPHEADER, array(
'Content-Type: application/json',
'Content-Length: ' . strlen($json_data))
);
$output = curl_exec($ch);
$result = json_decode($output);
echo $result->button->type;
?>
A:
Quick fix for it will be to disable certificate checking:
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
More secure and proper will be to export CA certificate file (certificate of a company that signed site certificate) in X.509 PEM format and use path to it:
curl_setopt($ch, CURLOPT_CAINFO, "/path/to/CA.crt");
You can also use Mozilla certificate database: http://curl.haxx.se/ca/cacert.pem It includes DigiCert High Assurance EV Root CA used on coinbase.com
|
Q:
C++ strtok function
char ParseCmd(char *buf,int len)
{
char *p;
p = strtok(buf," ");
return *p;
}
Why does this function only return first symbol in a whole buffer? If I set buffer to a "fsa rew qwe" it returns only "f" instead of the expected "fsa".
"mˣ*" - that is now im getting. why ?
char dum = *InstList->Lines->GetText();
LoadLibrary("SyntaxP.dll");
char *dum1 = ParseCmd(&dum,32);
InstList->Lines->Add(dum1);
A:
Because your return type is char which represents a character and you dereference the pointer returned by strtok().
|
TL;DR... Senator David Leyonhjelm tried to bring forward debate on a Greens marriage equality bill to stymie passage of senate voting reforms he doesn't want. If passed, the motion would have meant marriage *had* to be voted on before the Senate stops sitting on Thursday.
But the Greens support the senate voting reforms, so they voted with the Coalition against the marriage bill being debated. And then the Greens said let's just discuss it on Thursday instead, during private senator's time.
In a letter obtained by BuzzFeed News, Greens senators Richard Di Natale and Robert Simms asked Labor senator Penny Wong to move the debate to a vote on Thursday. |
Q:
How to optimize the executable generated by a C compilation in Linux terminal
Is there any way to reduce the memory used by an executable generated with a command like gcc source_file.c -o result? I browsed the Internet and also looked in the man page for "gcc" and I think that I should use something related to -c or -S. So is gcc -c -S source_file.c -o result working? (This seems to reduce the space used...is there any other way to reduce even more?)
Thanks,
Polb
A:
The standard compiler option on POSIX-like systems to instruct the compiler to optimize is -O (capital letter O for optimize). Many compilers allow you to optionally specify an optimization level after -O. Common optimization levels include:
-O0 no optimization at all
-O1 basic optimization for speed
-O2 all of -O1 plus some advanced optimizations
-O3 all of -O2 plus expensive optimizations that aren't usually needed
-Os optimize for size instead of speed (gcc, clang)
-Oz optimize even more for size (clang)
-Og all of -O2 except for optimizations that hinder debugging (gcc)
-Ofast all of -O3 and some numeric optimizations not in conformance with standard C. Use with caution. (gcc)
|
Title IX
A student found responsible for Title IX violations will face a range of sanctions.
Sanctions depend upon the severity of the incident and take into account any previous
incidents.
Sanctions for Title IX Violations
Any person found responsible for violating the procedure on Non-Consensual or Forced Sexual Contact (where no intercourse has occurred) will likely receive a sanction ranging from
Employee: censure to dismissal
Student: reprimand to expulsion
Any person found responsible for violating the procedure on Sexual Exploitation or Sexual Harassment will likely receive a sanction ranging from
Employee: warning to termination of employment
Student: warning to expulsion
Any person found responsible for violating the procedure on Sexual Assault (Non-Consensual or Forced Sexual Intercourse) will likely face a sanction of
Employee: termination of employment
Student: expulsion from the University
The conduct body reserves the right to broaden or lessen any range of recommended
sanctions in the case of serious mitigating circumstances or egregiously offensive
behavior. Neither the initial hearing officers nor any appeals body or officer will
deviate from the range of recommended sanctions unless compelling justification exists
to do so. |
<?php
declare(strict_types=1);
namespace Symplify\EasyCodingStandard\Exception\Configuration;
use Exception;
final class SourceNotFoundException extends Exception
{
}
|
Fanpage
Advertisement
Website count
Online :1
Today: 3975
Total: 121192
CJ108 EXPLORE MAI CHAU FULLDAY
Duration: Fullday
Departure date: Daily
Tour type: Open group tour
Mai Chau and the nearby villages are in a valley around 139km from Hanoi and 150 metres above sea level. located between two towering cliffs and surrounded by green paddies, it is an amazing sight as you walk down the windy cliff side path and the villages and surrounding countryside with rural scene charming that could make you want to staying here longer than your intending. |
Fly On The Wall Chords (ver.1)
***Verse 1***
Gm Bb
When you're naked in the shower
F Eb
When you're sleeping for an hour
Gm Bb
When you're big, when you're small
F Eb
Oh, I wish I was a fly on the wall
Gm Bb
When you're with her after midnight
F Eb
When you kiss her in the dim light
Gm Bb
When you break Barbie Doll
F Eb
Oh, I wish I was a fly on the wall
Cm Gm
Wanna see who you are
Eb F
Every inch, every scar
***Pre-Chorus***
Cm Ab
From your head to your toes
I would be there
Bb Fm
From your bed to your clothes
I'm in the air
***Chorus 1***
Cm
When you think you're alone
Ab
I'll be down in the hall
Bb Fm
I could see it, if I was a fly on the wall
Cm
What you do in your room
Ab
I could see it all
Bb Fm
You undress, I wish I was a fly on the wall, yeah
***Verse 2***
Gm Bb
For the drama that you're drinking
F Eb
And the dark thoughts you are thinking
Gm Bb
And the love notes that you scrawl
F Eb
Oh, I wish I was a fly on the wall
Cm Gm
Silently I arrive
Eb F
You don't know I'm alive
***Pre-Chorus***
Cm Ab
From your head to your toes
I would be there
Bb Fm
From your bed to your clothes
I'm in the air
***Chorus 2***
Cm
When you think you're alone
Ab
I'll be down in the hall
Bb Fm
I could see it, if I was a fly on the wall
Cm
What you do in your room
Ab
I could see it all
Bb Fm
You undress, I wish I was a fly on the wall, yeah
Cm Ab Bb Fm
Wish I was a fly on the wall. Yeah, yeah
***(Kind of A) Bridge***
Gm Bb
Ever closer, ever nearer
F Eb
When you're looking in the mirror
Gm Bb
I would know who you call
Gm Bb
If I was a fly on the wall
***Pre-Chorus***
Cm Ab
From your head to your toes
I would be there
Bb Fm
From your bed to your clothes
I'm in the air
***Chorus 2***
Cm
When you think you're alone
Ab
I'll be down in the hall
Bb Fm
I could see it, if I was a fly on the wall
Cm
What you do in your room
Ab
I could see it all
Bb Fm
You undress, I wish I was a fly on the wall, yeah
Cm Ab Bb Fm
Wish I was a fly on the wall. Yeah, yeah
***Pre-Chorus 2***:
Cm Ab
From your head to your toes
I would be there
Bb Fm
From your bed to your clothes
I'm in the air
Cm Ab
What you do on your own
I could see all
Bb Fm
When you think you're alone
I would go
***Chorus 2***
Cm
When you think you're alone
Ab
I'll be down in the hall
Bb Fm
I could see it, if I was a fly on the wall
Cm
What you do in your room
Ab
I could see it all
Bb Fm
You undress, I wish I was a fly on the wall, yeah
Cm Ab Bb Fm
Wish I was a fly on the wall. Yeah, yeah
↑ Back to top | T.A.T.U Chords for Fly On The Wall. Lyrics for acoustic guitar and electric guitar.
Tablatures and chords are parodies/interpretations of the original songs. You may use it for private study, scholarship, research or language learning purposes only |
815 F.Supp.2d 384 (2011)
UNITED STATES of America
v.
Michael R. THOMAS, Defendant.
No. 2:11-CR-47-DBH.
United States District Court, D. Maine.
September 30, 2011.
Craig M. Wolff, Stacey D. Neumann, Assistant United States Attorneys, Office of the United States Attorney, District of Maine, Portland, ME, for United States of America.
J. Hilary Billings, Federal Defender's Office, Portland, ME, for Defendant.
*385 DECISION AND ORDER ON MOTION TO SUPPRESS
D. BROCK HORNBY, District Judge.
In this 2011 criminal prosecution, the defendant moves to suppress a DNA profile obtained by a grand jury subpoena in 2005. After an evidentiary hearing[1] and oral argument on September 7, 2011, I conclude that if there were inadequacies in the 2005 legal process that obtained the DNA profile, the exclusionary rule does not call for its exclusion in this new and unrelated 2011 charge for criminal conduct that occurred in 2010.
FACTS
In June 2004, a private school in Massachusetts received a hand-printed envelope containing white powder[2] and a sheet of paper with the words "`BOOM' Guess Who" typed on it. Gov't Ex. 1. Attention centered on this defendant as the sender of the powder for a number of reasons: he was an alumnus of the school; he was the only alumnus, or one of only a few alumni, in the region of Maine that the envelope's postmark revealed to be the origin of the letter[3]; he sent another hand printed envelope to the school about four months later postmarked Madawaska, Maine, giving his name and return address in Madawaska, processed by the same postal processing plant as the previous letter (this letter was a statement of religious disaffiliation and a request to stop sending materials); and the handwriting on the two envelopes appeared similar to a school employee. Stipulation of Facts ¶¶ 1-4 (Docket Item 44).
As a result, in December 2004, a postal inspector asked the U.S. Attorney's Office in Maine to issue a grand jury subpoena to this defendant for handwriting exemplars, fingerprints, and DNA. Stipulation of Facts ¶ 5 (Docket Item 44); Gov't Ex 6. Although no grand jury investigation of the defendant was yet underway, an assistant United States Attorney obtained a subpoena from the Clerk of this Court dated January 18, 2005, directing the defendant to appear before the federal grand jury in Bangor, Maine, on February 7, 2005, at 9 am, and to bring handwriting exemplars, fingerprints, and a saliva sample. Stipulation of Facts ¶ 6; Gov't Ex 3. A postal inspector served the subpoena on the defendant at his home in Madawaska on January 19, 2005. Gov't Ex 3. The subpoena stated: "You can comply with this subpoena by providing the above items directly to the United States Postal Service." Id. In the course of serving the subpoena, the postal inspector told the defendant words to the effect of "later you can travel the 225 miles to Bangor in the winter, or you can accompany me to the police station here in Madawaska today and provide them." The inspector does not remember whether a Madawaska police officer accompanied him.
The defendant agreed to go to the police station and provide the items. The inspector obtained the saliva sample by use of a cotton swab on the inside of the defendant's cheek ("a buccal swab"). The inspector used latex gloves.
*386 The Postal Service obtained a DNA profile from the buccal swab through a private contractor, Orchid Cellmark Laboratory (Cellmark). Stipulation of Facts ¶ 12. It was determined that no match could be made, and the defendant was not prosecuted for the powder mailing. Id.
In 2010 and 2011 threatening letters were mailed to public officials.[4] The defendant's name arose as a subject of interest with respect to these mailings on account of a more recent investigation. In the course of a joint Postal Service/FBI investigative session, attention focused on how to obtain DNA from this defendant without arousing his suspicion. A postal service inspector attending the meeting recalled the 2005 DNA profile, and retrieved the file from that investigation. The saliva sample itself had been destroyed, but the profile remained, albeit missing one page. Upon inquiry the inspector learned that Cellmark had neglected to furnish that page in its original submission, and he was able to obtain it from Cellmark. The DNA profile from 2005 matched a DNA profile obtained from one of the threatening letters to Governor Paul LePage. An FBI agent used this match to obtain two new search warrants on March 24, 2011 as a result. Id. ¶ 16; United States v. Thomas, 2:11-MJ-49-JHR and 2:11-MJ-50-JHR (Docket Items 1) (D.Me). The ensuing search of the defendant's apartment and his arrest resulted in seizure of a number of pieces of incriminating evidence, a weapon, and a confession by the defendant concerning the 2010 mailings. Stipulation of Facts ¶¶ 17-18.
On April 12, 2011, a federal grand jury indicted the defendant on criminal charges concerning the 2010 threats, and for being a felon in possession of a weapon. He has moved to suppress the original DNA profile, all evidence obtained pursuant to the 2011 warrant, and the statements he made at the time of the search.
ANALYSIS[5]
The cases are clear that a grand jury subpoena can be used to obtain handwriting exemplars and fingerprints. United States v. Dionisio, 410 U.S. 1, 93 S.Ct. 764, 35 L.Ed.2d 67 (1973); United States v. Mara, 410 U.S. 19, 93 S.Ct. 774, 35 L.Ed.2d 99 (1973). But the defendant's challenge here is to use of the grand jury subpoena to obtain DNA. For DNA, the cases are divided, with different conclusions about the grand jury's role (vis-à-vis the AUSA who here issued the subpoena *387 without any knowledge by the grand jury[6]), the court's role (as in pre-or post-review of the basis for the subpoena), and the standard (probable cause or less[7]) for obtaining DNA under compulsion.[8] Because, like blood, DNA arguably[9] is not generally exposed to public view in the manner of handwriting, fingerprints, hair, and voice, some cases find its use to be more of a bodily intrusion and subject to greater Fourth Amendment protection.[10]
*388 What is also clear is that use of the grand jury subpoena itself is not a Fourth Amendment seizure: grand jury subpoenas may be onerous, but citizens nevertheless have an obligation to comply unless the material requested is somehow protected. Dionisio, 410 U.S. at 15-16, 93 S.Ct. 764; see also United States v. Mandujano, 425 U.S. 564, 573-74, 96 S.Ct. 1768, 48 L.Ed.2d 212 (1976) (witness subpoenaed by the grand jury to give testimony must appear and then "must invoke the privilege [against self-incrimination]", as "the `Constitution does not forbid the asking of criminative questions'") (citing United States v. Monia, 317 U.S. 424, 433, 63 S.Ct. 409, 87 L.Ed. 376 (1943) (Frankfurter, J., dissenting)). Thus, I reject the defendant's argument that the demands of a winter drive to Bangor created illegal compulsion or that the subpoena's offer, and the postal inspector's reiteration, of a less onerous alternative of providing the materials in the Madawaska police station change the analysis. The defendant could have challenged the subpoena by failing to appear and testing it on a resulting motion for contempt, or he could have filed a motion to quash the subpoena and tested it in that way. In short, the postal inspector was unable to obtain the swab without the defendant's consent (he was not an arrestee), and the grand jury could obtain it by compulsion only after some form of judicial review.[11]
It is unclear, however, whether I should analyze the defendant's compliance with the subpoena under the standards of voluntary consent,[12] or waiver of a known constitutional right.[13] In that connection, the government wants me to take into account the defendant's previous involvement with law enforcement to suggest that he was not naïve in 2005; the defendant wants me to take into account his mental health issues to suggest that his will was easily overborne.[14] The defendant did not testify at the evidentiary hearing, and if I were to assess voluntariness or waiver now for what happened in 2005, the task would be challenging. Here, for example, the postal inspector could not remember whether he was alone or with another officer; whether there was one car or two law enforcement cars; etc.
Amid all this legal uncertainty, I conclude that it is best to focus on the ultimate question on the motionwhether the exclusionary rule even applies to circumstances *389 like these. The Supreme Court adopted the exclusionary rule "to discourage the police from violating the Fourth Amendment by prohibiting them from leveraging illegal encounters into criminal convictions." United States v. Clariot, 655 F.3d 550, 553 (6th Cir.2011) (citing Elkins v. United States, 364 U.S. 206, 217, 80 S.Ct. 1437, 4 L.Ed.2d 1669 (1960)). If there was a Fourth Amendment violation in 2005, I assume that the exclusionary rule would have applied to a prosecution for the 2004 mailings.[15] But the Supreme Court has also said that suppression is not automatic for every Fourth Amendment violation. Herring v. United States, 555 U.S. 135, 129 S.Ct. 695, 172 L.Ed.2d 496 (2009). "[T]he question turns on the culpability of the police and the potential of exclusion to deter wrongful police conduct." Id. at 137, 129 S.Ct. 695. I must examine the flagrancy of police misconduct, "appreciable deterrence" is the standard, id. at 141, 129 S.Ct. 695, and the benefits of deterrence must outweigh costs. "[P]olice conduct must be sufficiently deliberate that exclusion can meaningfully deter it, and sufficiently culpable that such deterrence is worth the price paid by the justice system." Id. at 144, 129 S.Ct. 695.
What would be gained by invoking the exclusionary rule here? This is hardly the classic case of using the rule to deter law enforcement misconduct, for the activity in question at the time the subpoena issued involved investigation of the 2004 mailings, not the 2010 threats; any "misconduct" was not flagrant or deliberate; and the postal inspectors in 2004 obviously were not focused on criminal activities that the defendant might undertake six years later. Moreover, it will be very cumber-some if the use of items in law enforcement files can be challenged years later, in a different investigation. How is a current investigator to know the circumstances of the original acquisition and therefore whether particular items of evidence can be used? The only reason for applying the exclusionary rule in this case is the philosophical notion that the evidence cannot be used because there were problems with how it was obtained. That alone is not sufficient under Herring.
In sum, I conclude that it would be an undue extension of the exclusionary rule to use it to exclude the defendant's DNA profile and his resulting incriminating statements in a prosecution six years later for unrelated criminal conduct.
The motion is therefore DENIED.
SO ORDERED.
NOTES
[1] Many facts were stipulated. Stipulation of Facts (Docket Item 44); Stipulation of Facts Gov't Ex. 7.
[2] The powder turned out to be baking soda. December 14, 2004 Ltr. from Michael Desrosiers U.S. Postal Inspector to AUSA Jon Chapman (Docket Item 44-3).
[3] The stipulation states that an individual who was employed at the school "recalled [in 2011] that [when she reviewed the alumni database back in 2004] she found a few names but considered that she may have found just one name." Stipulation of Facts ¶ 3.
[4] The indictment says Maine Governor Paul LePage, U.S. Senator Joe Lieberman, U.S. Representative Steve King, and Wisconsin Governor Scott Walker. Indictment (Docket Item 17).
[5] I reject the defendant's argument that a new and illegal search occurred in obtaining the missing page from Cellmark. The Postal Service was entitled to that page from the outset, and no separate legal event or grand jury secrecy violation occurred by virtue of its completing its file. Thus, this case is unlike United States v. Davis, 657 F.Supp.2d 630 (D.Md.2009), where a shooting victim's clothing was seized at the hospital, and only later did law enforcement obtain a DNA profile from blood on the clothes in an attempt to solve another crime. (Even so, suppression was denied in Davis.) I also reject the argument that there is some separate violation in the retention of the profile. Because the defendant's DNA was not obtained pursuant to the provisions of the DNA Analysis Backlog Elimination Act ("DNA Act"), 42 U.S.C. § 14135a, his DNA profile was never entered into Combined DNA Index System ("CODIS") database, 42 U.S.C. § 14132. Thus, the method by which the DNA was retained did not violate the DNA Act. See 42 U.S.C. §§ 14132, 14135a. Moreover, the defendant has provided no support for his argument that the evidence had to be destroyed upon the expiration of the grand jury that issued the subpoena.
[6] United States v. Santucci, 674 F.2d 624 (7th Cir. 1982), recognizes the latitude accorded an Assistant United States Attorney in using a grand jury subpoena to prepare for grand jury sessions.
[7] Grand jury subpoenas are not subject to the same type of Fourth Amendment scrutiny as a search warrant. In re Vickers, 38 F.Supp.2d 159, 162-63 (D.N.H.1998). Some cases say that the standard is not probable cause, but only "whether the subject matter and scope of the subpoena are reasonable under the circumstances, including consideration of the subpoenaed person's constitutional rights." Id. at 164. Others say that reasonable individualized suspicion is required. See In re Shabazz, 200 F.Supp.2d 578, 584-85 (D.S.C. 2002); Henry v. Ryan, 775 F.Supp. 247, 254 (N.D.Ill.1991). "[S]trip and visual bodily cavity searches must be justified by at least a reasonable suspicion that the arrestee is concealing contraband or weapons." Spencer v. Roche, 755 F.Supp.2d 250, 260 (D.Mass. 2010); accord Swain v. Spinney, 117 F.3d 1, 6-7 (1st Cir. 1997). At the end of the day, the answer to this question seems to be in United States v. R. Enterprises Inc., 498 U.S. 292, 297, 111 S.Ct. 722, 112 L.Ed.2d 795 (1991), where the Supreme Court held that probable cause is not the standard, in part because the purpose of the grand jury itself is to determine if probable cause exists. But In re Grand Jury Proceedings, 816 F.Supp. 1196, 1205-06 (D.Ky.1993), held that a grand jury subpoena for a forced blood draw required probable cause, and required a warrant. The court distinguished R. Enterprises because that case dealt with documents. Id. at 1202.
[8] The First Circuit's decisions in United States v. Weikert, 504 F.3d 1 (1st Cir.2007) and Boroian v. Mueller, 616 F.3d 60 (1st Cir.2010) are not determinative of this controversy, but they are instructive. Weikert held that it is constitutionally permissible to require defendants on supervised release to provide blood samples to create DNA profiles for use in crime detection. Weikert, 504 F.3d at 18. Boroian held that the DNA could be kept even after probation ended and used for future law enforcement purposes. Boroian, 616 F.3d at 68. Boroian also held that it was not a new search to match the profiles later. Id. Although those cases were dealing with the CODIS database, there are similarities. Like CODIS the profile here could be used only for identification and did not raise other privacy interests (the actual DNA was destroyed). Indeed it is hard to distinguish use of the DNA profile, once obtained, from the use of fingerprints in matching and suggesting a suspect. To be sure, because Thomas was not an arrestee, or a convicted felon, he did not have the diminished privacy interest that Weikert discussed. But Weikert also recognized that after Skinner v. Ry. Labor Executives' Ass'n, 489 U.S. 602, 625, 109 S.Ct. 1402, 103 L.Ed.2d 639 (1989) drawing of blood cannot be considered significant or unusual. Weikert, 504 F.3d at 12. Surely a cheek swab is even much less of an intrusion.
[9] I say arguably because people do leave their DNA in many public places, such as by saliva on a drink container at a restaurant or a cigarette, and on hair or skin cells that fall off the body. "DNA usually can be found in biological materials such as blood, bone, saliva, hair, semen, and urine." David H. Kaye & George F. Sensabaugh, Jr., "Reference Guide on DNA Evidence," Reference Manual on Scientific Evidence, at 143 (Federal Judicial Center 3d ed. 2011). "DNA typing has been performed on old blood stains, semen stains, vaginal swabs, hair, bone, bite marks, cigarette butts, urine, and fecal material." Id. at 151. See, e.g., In re Grand Jury Proceedings, 686 F.2d 135, 139 (3d Cir. 1982) (scalp hair and facial hair are like voice and there is no Fourth Amendment interest). But here, to obtain the saliva, the postal inspector did invade the defendant's mouth.
[10] See In re Vickers, 38 F.Supp.2d 159, 166-67 (D.N.H.1998) (although hair samples do not require a warrant or probable cause, saliva does implicate the Fourth Amendment unlike hair); Shabazz, 200 F.Supp.2d at 584-85 (obtaining saliva from a buccal swab is a search); Henry, 775 F.Supp. at 254 (saliva more like blood than handwriting and hair).
[11] See Santucci, 674 F.2d at 632 ("decision to take advantage of that convenient option [complying rather than attending the grand jury session] should not justify exclusion on the basis that the grand jury, therefore, was not sufficiently involved").
[12] Schneckloth v. Bustamonte, 412 U.S. 218, 93 S.Ct. 2041, 36 L.Ed.2d 854 (1973), made clear that the question is consent, not waiver, for a Fourth Amendment search, id. at 235, 93 S.Ct. 2041, that the burden is on the prosecution to show consent, and that it is a question of fact (consent) to be determined from the totality of the circumstances. Id. at 222, 227, 93 S.Ct. 2041. Knowledge of the right to refuse the search (not demonstrated on this record) is a factor, but it is not the sine qua non. Id. at 227, 93 S.Ct. 2041. If I were to use the consent standards here, I would find consent.
[13] In United States v. Coppola, 788 F.2d 303, 308-9 (5th Cir.1986), the court found that there had been a waiver for the production of documents where the defendant failed to file a motion to quash, and instead voluntarily complied.
[14] Colorado v. Connelly, 479 U.S. 157, 107 S.Ct. 515, 93 L.Ed.2d 473 (1986), makes clear that impaired mental condition alone is not sufficient. There must be police coercive misconduct in order to find a Fourteenth Amendment due process violation. I find no such coercive misconduct here.
[15] Of course, the defendant was not prosecuted for them and therefore he had no occasion to invoke the exclusionary rule.
|
Finally, some good news to report on the Ebola front: Nigeria and Senegal are now completely free of the disease. Here's how they contained the outbreak — and why the world needs to take notice.
Top image: A Nigerian health official uses a thermometer on a worker to check for fever at the arrivals hall of Murtala Muhammed International Airport in Lagos (Associated Press).
Earlier today, the World Health Organization announced that no new case of Ebola has emerged in Nigeria in 42 days. That's the standard length of time required for declaring the end to an outbreak, since it's twice the maximum 21-day incubation period for the virus. It's an incredible achievement — one that should assuage fears and show that Ebola can be contained. Moreover, it's proof that developing nations, with sufficient support from the international community, are fully capable of dealing with the epidemic.
Advertisement
Thwarting an "Apocalyptic Urban Outbreak"
Things looked bleak back in July when the virus was detected in Lagos, Africa's largest city. Nigeria, with its 166 million inhabitants, is Africa's most populous country and its newest economic powerhouse. Lagos boasts a population of 21 million, making it nearly as large as the populations of Guinea, Liberia, and Sierra Leone combined. With its airport and large population living in often crowded and unsanitary conditions, news of Ebola was met with a palpable sense of dread.
"The last thing anyone in the world wants to hear is the two words, 'Ebola' and 'Lagos' in the same sentence," noted Jeffrey Hawkins, the U.S. Consul General in Nigeria, at the time. The juxtaposition of the two conjured images of an "apocalyptic urban outbreak."
Advertisement
In the end, Nigeria confirmed a total of 19 Ebola cases, of whom seven died and 12 survived. It's a far cry from the situation in other parts of West Africa — but that's not an accident. Here's how Nigeria did it and the "best practices" that should now be employed elsewhere:
Effective Leadership and Public-Health Institutions
The WHO credits Nigeria for its strong leadership and effective coordination of the response:
The most critical factor is leadership and engagement from the head of state and the Minister of Health. Generous allocation of government funds and their quick disbursement helped as well. Partnership with the private sector was yet another asset that brought in substantial resources to help scale up control measures that would eventually stop the Ebola virus dead in its tracks.
Advertisement
The response was greatly aided by the rapid utilization of a national public institution (NCDC) and the prompt establishment of an Emergency Operations Centre, which was supported by the Disease Prevention and Control Cluster within the WHO country office. Nigeria also features a first-rate virology lab affiliated with the Lagos University Teaching Hospital. It was staffed and equipped to quickly and reliably diagnose Ebola, ensuring that containment measures could be employed with the shortest possible delay.
Rapid Response to the Initial Case
Nigeria's first Ebola patient, Patrick Sawyer, was initially thought to have malaria. But once that was ruled out, doctors immediately began treating him as a possible Ebola patient. He was kept in isolation, officials were notified, and a blood sample was rushed to a testing lab. Just three days later, Nigeria's health ministry set up an Ebola Incident Management Center, which eventually turned into an Emergency Operations Center that co-ordinated the response and decision-making.
Advertisement
Sufficient Access to Resources
As noted, federal and state governments in Nigeria were able to provide ample financial and material resources, including well-trained and experienced national staff. Isolation wards were immediately constructed, as were designated Ebola treatment facilities (though more slowly). Other resources included vehicles and mobile phones equipped with specially adapted apps allowing healthcare workers to engage in real-time reporting as the investigations moved forward. Many of these efforts were supported by social mobilization experts from UNICEF, CDC and Médecins sans Frontières.
High Quality Contact-Tracing
Nigerian health officials, working with assistance from WHO, the US CDC and others, managed to reach 100% of known contacts in Lagos and 99.8% at the second outbreak site in Port Harcourt, Nigeria's oil hub. High-quality contact tracing was performed by experienced epidemiologists who expedited the early detection of cases and their rapid movement to isolation wards. And unlike the tragic situation in Guinea, Liberia, and Sierra Leone, all identified contacts were physically monitored on a daily basis for 21 days. Some contacts tried to escape during the monitoring process, but they were all tracked by special investigation teams and returned to observation to complete the requisite monitoring period of 21 days.
Advertisement
Applying Lessons From Previous Outbreaks
Nigeria has been combating another blight, polio, for quite some time now and with great success. Among their many tactics, health officials use the very latest satellite-based GPS technologies to ensure that no child missed out on polio vaccinations. When Ebola first appeared in July, they immediately repurposed these technologies and infrastructure to conduct Ebola case-finding, contact-tracing, and daily mapping of links between identified chains of transmission. Nigerian health officials also adapted the learnings from their efforts to eradicate guinea-worm disease.
A Rigorous Public Education Campaign
Communication with the public was also key. Nigerian health and government officials rallied communities to support containment measures. This involved house-to-house information campaigns — spoken in local dialects — that explained the level of risk, effective personal measures, and the actions being taken for control. All the while, Nigeria's president, Goodluck Jonathan, reassured his population on nationally televised newscasts. Traditional and religious community leaders were engaged early on and asked to play a role in sensitizing the public. Finally, the full range of media opportunities were exploited, including social media and televised facts about the disease delivered by Nigerian celebrities.
Advertisement
Screening At Borders — And A Refusal To Stop Air Travel
Instead of panicking and banning air travel, Nigerian health officials screened all arriving and departing travellers by air and by sea in Lagos and Rivers State. The average number of travellers screened each day reached a peak of more than 16,000.
Moving Forward With Vigilance
Clearly, this story isn't over yet. Vigilance remains high and Nigeria's surveillance systems remains on a high level of alert. It's quite possible that, given the country's success, people from neighbouring countries may try to (illicitly) enter in.
Advertisement
As a final note, and as noted by WHO Director-General Margaret Chan: "If a country like Nigeria, hampered by serious security problems, can do this – that is, make significant progress towards interrupting polio transmission, eradicate guinea-worm disease and contain Ebola, all at the same time – any country in the world experiencing an imported case can hold onward transmission to just a handful of cases." |
Study design for randomized prospective trial of carotid endarterectomy for asymptomatic atherosclerosis. The Asymptomatic Carotid Atherosclerosis Study Group.
This report summarizes the study design and organization of a multicenter, randomized trial of carotid endarterectomy for the treatment of asymptomatic carotid stenosis. The Asymptomatic Carotid Atherosclerosis Study will determine whether the addition of carotid endarterectomy to aspirin plus risk factor modifications affects the incidence of ipsilateral transient ischemic attack, amaurosis fugax, and retinal and cerebral infarction in patients with asymptomatic hemodynamically significant carotid stenosis in at least one artery. Power calculations are based on assumptions of alpha = 0.05 (two-sided test) with annual event rate 3% transient ischemic attack and 1% cerebral infarction per year. The study has 90% power for detection of a 25% difference in events in a 5-year study. Two continuous validation programs are in use: a Doppler/angiogram correlation study for each Doppler instrument used in screening potential candidates and a transient ischemic attack/stroke questionnaire/validation study for verification of end points. Quality assurance is a major component in study design. |
Arkansas Football: 7 Things That Need To Be Ironed Out in Spring Ball
The college football season is still a few months away, but championship programs are built in the spring.
Spring football is the time for a team to iron out the last few remaining kinks as they prepare for kickoff. The Arkansas Razorbacks are one of those teams that are focused on improving on last season, and it all starts with spring ball.
If the Razorbacks want to have a successful campaign in 2011, here are seven things that they need to iron out.
Filling Holes
Matthew Stockman/Getty Images
Like many college teams, the Arkansas Razorbacks lost players to graduation or the NFL. Those players will be difficult to replace since many of them played pivotal positions and provided on-field leadership.
Luckily for the Razorbacks, they have plenty of returning experience as well. The Razorbacks return 15 starters from their 2010 squad that recorded a 10-3 season record and made the school’s first BCS appearance.
This includes returning experience on the sidelines as the Razorbacks’ entire full-time coaching staff remained intact throughout the offseason.
Quarterback
Mike Zarrilli/Getty Images
Ryan Mallett was the leader and offensive nucleus of the Razorbacks last year, but will be in the NFL this year, prompting the Hogs to look for a new signal-caller.
Junior Tyler Wilson is listed as the team’s No. 1 quarterback and will most likely get the nod to start the season. With his excellent showing against Auburn last year and an extensive knowledge of the offense, Wilson is the obvious selection.
Arkansas will give backups Brandon Mitchell and Jacoby Walker a chance to shine during spring ball. Mitchell is likely to get the nod in the second spot, with redshirt freshman Walker rounding out the group.
Offensive Line
Kevin C. Cox/Getty Images
The Razorbacks have a bevy of offensive talent in the skill positions, but they will need a productive front line to make it all come together. That is why the offensive line may be the most critical thing to watch in spring ball.
DeMarcus Love, Ray Dominguez and Wade Grayson were three starters a year ago that will need to be replaced. Head coach Bobby Petrino hit the recruiting trail hard this offseason to gather some size on the offensive line.
True freshman Brey Cook enrolled early at Arkansas and it's paying off, as he is being considered for a spot at tackle. Cook will challenge Jason Peacock for a spot at tackle, while Grant Freeman and Anthony Oden fight for the other tackle position.
Petrino has mentioned that the Razorbacks may consider moving players around on the line to play either guard or tackle, depending on the situation. Petrino wants all five players on the same page so that when the season starts, the execution is flawless.
Secondary
Chris Graythen/Getty Images
The secondary is always an area for concern in the pass-happy SEC. What once used to be an area of concern for the Hogs is now one of their strengths. The Razorbacks seem to be getting better every year in the secondary.
Returning veterans Isaac Madison and Darius Winston will engage in a fierce battle for a spot at one of the corners.
Sophomore Jerry Mitchell will go up against De'Anthony Curtis for the other corner. As of now, Mitchell has the edge—but until spring ball is complete, anything can happen.
There have been other changes in the defensive backfield, as Eric Bennett has moved from cornerback to safety, which will take some time to adjust to.
How this group adjusts during the spring may be the difference in the Razorbacks featuring a top-notch defense in the fall.
Injuries
Mike Zarrilli/Getty Images
Arkansas will have to learn how to play without key players early in the season, starting with spring practice.
Receiver Greg Childs (knee), defensive tackle Byran Jones (ankle) and D.D. Jones (shoulder) are recovering from offseason surgeries. This will give the backups time to learn during the spring, so if injuries linger or occur during the season, the Hogs will be ready.
Leadership
Although talent is paramount, leadership on the field is very important.
On offense, Ryan Mallett and DeMarcus Love provided the leadership. On defense, it was Anthony Leon and Ramon Broadway that led the way for the Hogs.
Arkansas offensive coordinator Garrick McGee already acknowledged the lack of leadership and challenged the team to step it up. Running back Knile Davis is expected to step up on offense and the jury is still out on defense.
The emergence of a true leader on both sides of the ball will be important to the growth of this team.
There is good reason to be excited about the 2011 edition of the Arkansas Razorbacks, but only time will tell if they can compete for the top spot in the country.
Matt Regaw is a B/R Featured Columnist and the founder of BookieBlitz.com,your one-stop shop for sports articles, previews and predictions. Feel free to contact Matt at mregaw@gmail.com. |
Breaking Myths Monday: PTSD
PTSD is a psychiatric disorder that affects those who have experienced or witnessed extreme trauma either in their childhood or adult life. These types of traumatic events include situations like natural disasters, serious accidents, terrorist attacks, war, or any type of violent personal assault. Originally referred to as “shell shock” for those who experienced PTSD post-war, PTSD has gotten a reputation to be a veteran’s illness, among other myths.
Here are the most common myths about PTSD, and why they’re not true:
Myth: PTSD affects someone immediately after trauma, and if it doesn’t happen immediately, they’re no longer at risk.
In most cases, symptoms of PTSD will occur within or around the first three months post-trauma. However, this is not the case for everyone, and in cases involving childhood trauma or domestic abuse, the symptoms have a tendency to show up later in life. Symptoms of PTSD are also known to come and go at what seems like random, so it can make it hard for individuals to get diagnosed correctly.
Myth: The only people who have PTSD are military veterans.
While there is a large percentage of military veterans who experience PTSD, they are not the only people at risk. Trauma can affect anyone. In fact, data shows that around 70% of Americans experience a major event in their lifetime, with 20% of those people developing PTSD. Additionally, women are at a larger risk for developing PTSD because they are more likely to experience physical trauma in their lifetime.
Myth: Those who have PTSD are weak individuals.
Mental illness is not a character flaw. Those who develop PTSD often have a genetic predisposition to this disorder, or have experienced an extremely traumatic event. This means the development of PTSD was not in their control, and was not their decision. There is no weakness in dealing with trauma.
Myth: If you have PTSD you’re dangerous to be around and could lash out at any second.
This myth is most likely due to poor representation of PTSD in the media, but is nevertheless extremely inaccurate. The main symptoms associated with PTSD are intrusive thoughts, nightmares, flashbacks, insomnia, guilt, isolation, and hypervigilance. Issues such as aggression and irritability are less common symptoms of PTSD.
Myth: PTSD cannot be treated.
While there is no cure for PTSD, this does not mean it can’t be treated. PTSD can be managed if an individual is willing to seek help and has a desire to improve. Currently, suggested treatment modalities include cognitive behavioral therapy, prolonged exposure therapy, desensitization therapy, and mood stabilizers or medication.
Mental health myths are dangerous because they encourage people to make assumptions about others without doing research, or getting to know the individual. If you have questions about a specific issue or disorder, visit https://sondermind.com/topics where we cover a variety of mental health issues with reputable sources and references. |
On this episode of People's Party, Talib Kweli and Jasmin Leigh sit down with rapper, entrepreneur, and very-honest-motherf*cker, The Game. Right away the trio dives into the deep end, with a wide-ranging conversation on gang culture, rap beefs, Nipsey Hussle's legacy, and a possible G-Unit reunion.
Later in the episode, Kweli and The Game talk about their mixtape collaborations, rap reality vs. street life reality, and #BlackLivesMatter. Throughout the interview, The Game is the same man you hear on the track: unflinchingly honest and fearlessly raw. No topic is off-limits and stories are told in vivid detail. As one observer at the live taping said, "Damn, listening to him is like a John Woo movie!" |
Q:
Tax implications in India for sending money to India from US
I am planning to transfer around $8K-10K in my parent's bank account(Joint bank a/c) in India . I have read a lot of posts(like Will I have to pay taxes in India when I transfer money from a US bank to an Indian savings account?) but I am still not sure if my parents will need to pay taxes on the money that I send them since it is not a NRI/NRE/NRO account?
A:
Any inward remittance received by your Parents cannot be treated as "Income" as per the definition. This can at best be treated as "Gift". However, in India there is No Gift tax for certain relations and there is no ceiling on the amount. In your case, gifting of money by son to father or vice versa is allowed without any limits and tax implication. However if your father were to invest this money in his name and make gains, the gains would be taxable.
However if the Money is being transferred with a specific purpose such as to buy a property, etc make sure you have the Bank give your dad a Certificate of Inward remittance. This is also advisable even otherwise, the Inward Remittance certificate from Bank certifies that the credit entry in the account is because of funds coming into India and if the tax authorities were to question the large amount of credits, it would be proof that it is due to Inward remittance and not due to, say, a sale of property by your dad.
Helpful Links:
http://www.moneycontrol.com/news/tax/gift-tax-whatsa-gift_664238.html
http://www.thehindubusinessline.in/bline/blnri/exp-tax.htm
Edit 1:
What your father does with the money is treated as EXPENSE, i.e. spends on day to day expense or pays off your Loans or pay off his loans have no relevance from a Tax Perspective in India.
The only issue comes in say you have transferred the funds to buy a property and there was no purpose of remittance specified by Bank's letter and one wants to repatriate this funds back to US, then it's an issue.
If you transfer the funds directly to your Loan account, again there is no tax implication to you in India as you are an NRI.
|
Wednesday, October 19, 2011
I'm not going to lie internet...this was a really long and difficult weekend. It was the kind of weekend when the emotional and psychological burdens were so heavy I couldn't even set them down to race for 45 minutes.
For reasons that are beyond the scope of this particular post I ended up renting a car on Friday night and driving to the race on Saturday morning alone. I left early because I wanted to be there before the start of the Master's 40+ to make sure someone was there to help with staging (there was) and to take pictures of the 40+ riders, some of whom have been expressing discontent on the Inter-tubes that the photographers do not show up until later in the day.
The sun was shining bright when I arrived (not the best for photography), and the wind was blowing fiercely. I stepped out of the rental car and felt the "cold" and lamented the fact that it was "cold" while still knowing that it wasn't even close to cold. Come back in two months and you will feel cold.
I took my first pre-ride lap after the Master's 40+. The course had many elements that were similar to last year, but some noticeable improvements. Gone was the long rectangle around the cornfield. They added a chicane with berms where last year was loose rocks. The course still wrapped around the willow over a bumpy bumpy section of unused roads, and the Verdigris flyover made it's triumphant return.
I warmed up and felt fine. I made my way around the course and felt pretty good, fresh from a light week of training. I made it back to the tent, changed into some warm clothes and had a sandwich. I did not get out and photograph the 30+ instead focusing on getting myself ready to race. I took a second pre-ride before the women's 1-2-3s and 50+ 60+ and then spent some time during that race taking pictures.
When it was time for staging and racing I felt really good. The new staging is working out phenomenally and leading to much better order in the starting grid which has made the starts feel safer. Due to low enrollment I was staged in the top 20 (e.g., second line), and when the whistle blew we powered off. I was able to stay with the leaders, and maintain a top 20 position for the first few minutes of the race. But after that, I started slipping backwards. At first I couldn't figure out what was going on. My heart rate (e.g., effort) was near max, my legs were spinning, but I was just not going anywhere. Somewhere during my second lap I turned my focus inside and started to try and figure out what was wrong. That's when I heard it. There was a raspy wheezing sound coming from from within my chest. I have a family history of asthma, and have always had problems in October / November transitioning from warm to cold weather. In college during football practice I was teased for being "out of shape" because I was "out of breath". In reality I suffer from mild exercise-induced asthma, and was having a mild attack in the middle of my race.
When I was telling this story to my girlfriend she asked me with a note of concern in her voice,
"So what did you do?"
I replied, "Ummmm? Who are you talking to?"
She with a tone of confusion, "I am talking to you, but why do you ask?"
"Because I want you to think about that question again in the context of who you you are talking to."
"Oh. You finished the race."
That's right. I finished the race. It was not particularly fast or glorious to finish. I worked as hard as I have in any race this year, and had one of the worst results. It was frustrating watching the guys that I never want to get beat by pass me like I was standing still, and knowing I couldn't do anything about it. There was a limit to how much oxygen my body could take in, which put a limit on how much energy I could created. I used as much as possible which was frustratingly below 100% of what I had available.
The race itself was fairly clean and uneventful. During the first or second lap I was riding in a pack of people, and narrowly avoided a collision as the rider to my right (Nico) Slid out on a turn. I teased him afterwards about "punching my bike" as his arm grazed my seat stay as he went down.
One one of my barrier remounts I ended up somehow laying face down flat like Superman with my seat pressing into my stomach and pelvis, arms on the handlebars and legs straight out behind. I don't know exactly how I got there, I just know it was painful, very painful transitioning back to a seated position without stopping. I was just very happy at that point in time that the barriers were hidden behind the flyover, and there were no photographers there to immortalize one of the worst remounts in history.
After the finish when I went to check results I was kind of surprised to see that I was still in the top 40. I thought that there were only about five guys behind me at the end, but there were more like twenty five. I thought it was going to be my worst result of the year, but a mild asthma attack turned out to be less detrimental than being stung by a bee and doped up on anti-histamine. That's one of the hard things about being a Cat 3. There is no hiding. You can't have a slightly off day and expect to coast through a race. They are too many good guys, and the races are too long to fake it. I was in pretty poor spirits after my race, but I leaned on my other hobby and found some good spots from which to take pictures. Getting some good pictures helped stabilize my mood, and I felt like I did the best that I could do, and the breathing problems were kind of out of my control. All I could do was reset for Sunday, and hope that my body would acclimate to the colder weather.
Tuesday, October 11, 2011
Last week, I did everything in my power to prepare for a good race, and life threw me a curveball. It made for an interesting story, but kind of a miserable race. This week's race went so smoothly that it there hardly seems anything to write about.
I woke up a bit early knowing that I had to be out of the house by 7 AM. Well, it wasn't that I had to be out of the house by 7AM, but I knew that I needed to cross the street before 7:30 AM least I not be able to cross it again for a few hours. Last year I made the mistake of not leaving the house until just before 8AM and it was too late. The marathon ran literally around my house and there was no way to escape it. I ended up standing on the west side of Broadway for about 10 minutes watching thousands of runners stream by waiting for a gap wide enough to cross the street. I found a diagonal brake about 20 feet wide and like jumping into a river I sprinted across and down stream looking for the far shore.
This year I was out when the sun was just starting to kiss the tops of the buildings along the lake, and there were no cars or people on broadway. There were a few police officers preparing for the flow of traffic with yellow tape across the side streets. Yellow tape?
I rode home from the Humboldt Park practice on Wednesday night with my friend Chernoh. We made plans to meet Sunday morning at the Ann Sather's on Broadway for breakfast. I was there a bit early, and spent some time writing and collecting my thoughts. Chernoh arrived. Then food arrived. We ate, conversed, departed, and drove to the southside without issue.
When we arrived the sun was bright, the weather was warm, and the trees radiated a warm yellow glow from every leaf. It's was fall, it was summer, it was a beautiful day for a bike ride.
I have still not mentally adjusted to earlier start time of the Cat 3 race. We arrived after the start of the 40+, and I was glad that I had dressed to ride so that there was no time lost trying to change. We had 10 minutes to drop our gear and get on the course for the first pre-ride. That first lap was a little bumpy as I had forgotten to let any air out of my road-pressure tires. I knew it was going to be a fairly good day, as I did not have any problems even with the reduced traction of a higher pressure tire.
After the pre-ride I pulled my camera out and took some pictures of the Master's 30 riders. I tried to be mindful of the quality of shots as I continue to learn the best ways to leverage my new camera. It was my best performance with my camera to-date. I did not take a lot of pictures, I tried to be more strategic, and I was not afraid to remove sub-quality pictures on the spot. It saved me a bunch of time when I got home sorting through two to three hundred photos. I came home with a total of 146.
After that pre-ride I went to the starting line and helped out a little bit staging the Master's 60+ riders right after the start of the women's 1-2-3 race. I have not done a good job the last two weeks of photographing the women's 1-2-3 race nor the women's 4s race. The new staging procedures should create some windows of opportunities for photographing the women before the Cat 3 race, but my first priority is getting warmed up and ready for my own race.
The new staging procedures were rolled out in the CCC for the first time this week to eliminate the "race-before-the-race" which I was not afraid to try and win. I was in the lead pack at Jackson Park, not so good at Hopkin's Park, but now I don't have to worry about it. It went very well and also helped the fairly redundant process of checking riders in for the officials.
There were fewer entries in this week's race in part because of the marathon and in part because of natural attrition over the course of the season. I ended up in the third row, behind Austin Warner and someone else I do not remember. Chernoh lined up right behind me, and waited for the officials to make their final announcements. The whistle blew, there was a surge forward and chaos just to my left. There was a collision and someone went down (I learned later it was Austin and Newt who got tangled, and Austin who went down). I was able to swerve around the pile to the right, and make a reasonable sprint with the lead pack. Maybe in the top 20 going around the first corner. I was where I wanted to be, and just needed to race my own race.
I do have a couple of memories from the race. First, I was able to ride the technical section of course at the top of the first big descent on my first lap. I didn't have to start dismounting until after lap 2. I remember this technical section because I was at the top of the hill heckling 30+ riders who were running that section.
"A nice elderly woman who passed through here a few minutes ago rode that section gentlemen."
I did not bunny hop the log at any time nor did I attempt it. I did not want to be the next Joey.
On my second or third lap, right after the log barrier, I remember being passed by one of www.crossresults.com nemesi, Paul-Brian from Half-Acre. I remember feeling the urge to burn a match right and try to put some distance between he and I, and I remember thinking to myself that no matter what I did right there in that moment, no matter how hard I burned, PBM would be there with me at the finish. He was too good, too smart, with too much endurance to try and sprint away from. I had to race my race.
So I raced my race. I took advantage of the long flat straight aways to use a different pedal stroke than for the technical sections. I put it in a big gear (Sur la plaque, fucktards) and pedaled at a relatively slower cadence to get some recover on the straights. I was able to save up to then get out of the saddle and spin up most of the hills pretty fast. I think I passed Paul-Brian again on the next hill climb because I played it smart and did not chase him down.
I made one really bad (and painful) technical mistake. On lap 2 or three as I was coming down the home stretch toward the starting line I was getting ready to dismount and cross the double barriers. I was happy with the barrier placement because I felt I was making up places on guys by being able to get back on the bike quickly. This time, not so much. I was coming in hot, so I was trying to swing my leg over my seat, get my self in position to step through, and slow down enough that I could actually hit the ground running. I trying to do those three things simultaneously I somehow did the exact opposite of what happened two times last week. Instead of being unable to clip out and wiping out because of it, my left leg, standing straight over the left pedal with 100% of my weight on the left pedal clipped out and fell to the ground. I was moving between 12-15 mph still at the time so the result was catastrophic to my "not falling on the groundness". I crashed and my bike fell on top of me. I did no damage to the bike, and just a little damage to myself. Scraped up my knee, had a hip pointer bruise, and a little blood dripping from below the knee. It slowed me down, shook me up a bit, but I remounted hoping there was no video or camera out at that part of the course (thus far I have found no evidence).
I remounted, overcame the pain in my hip, looked at my knee (small blood) and passed the general systems test of being able to continue going. The crash cost me contact with a pair of riders who I was riding with, and closed a gap behind me so other riders were able to catch up and make moves past me. Getting around someone was not a big deal given the abundance of long straight-aways. Somewhere around the fourth lap I hit the "I can't do this anymore / Why am I doing this again?" wall. I kept going.
On the penultimate lap I remember getting passed by two riders on the straight away after the log, whom I passed again going up the hill. I never bothered to downshift so instead of spinning I mashed it in a big gear and made it to the inside corner before them.
Later on in the same lap the same rider came up beside me and didn't quite get around me as we were going into a turn. He gave me a "Sorry, man" and I said, "I did kind of a dick move on you back at the hill, so no worries". When we hit the straight away, he was gone. I could not give chase.
On the bell lap I was pretty much spent. It is always a nice idea to think that "Okay I'm going to hammer it for the entire last lap" but the last lap was two additional miles of racing with two steep hill climbs. The real question was "How do I not blow up?" So I kept on at basically the same pace. I noticed my turns past the team tent and through the "technical section" were fuzzy and not crisp, so I tried to redouble my concentration and keep moving. The last time up the hill was hard and my remount at the top was sloppy. I think I lost contact with the guy in front of me somewhere at this point in time. When I made it down to the bottom of the hill, down the straight away, and made the turn to head back toward the log I was able to see who was behind me. It was Paul-Brian and Kyle from the Shop. They were not to far behind me, and I coming up fast.
Instead of trying to catch the riders in front of me, and possibly burning out, my strategy became trying to recover enough energy so that I would have enough left at the end of the race to hold off the challengers coming up from behind. There was still little over a mile of the course left to go, so I bleed off the lead I had built up over Paul-Brian and Kyle until the final straight away, and then stood up and sprinted home. PB later commented that my strategy worked with about 10ft to spare. I was happy I did not get caught by 3 inches again at the line.
I did a little bit of a cool down, sprayed myself down with water to get the mud off, and mentally reset with some calories and water. Thankfully bees were absent from that day. I went to check results and found that I placed 27th out of 64, and was quite satisfied with the day's effort and performance. I finished off the day taking photos of the 1-2-3s and the 4As. Chernoh and I were going to take off after the start of the 4Bs but I ended up going on a wild goose chase around the course looking for a brand new insulated camelpak water bottle that went missing. (If you found an extra one in charcoal I would appreciate seeing that come back to the Sprockets tent at the next race). It was a good race, a great day, and I took a couple great photos. All in all it was a good day to be racing bikes in Chicago.
There are a lot of quips I could put as a title to this weeks post, but for the sake of keeping it "realz" I will use part of my FB status from yesterday to kick off this post.
As always my race preparations started on Saturday with bread baking and sandwich making. Unfortunately I saved my bike preparation for last, and due to a particularly long session of Fallout: New Vegas ended up being at about 11PM when I should have been getting ready to go to bed. But the race prep was supposed to be quick and easy. I just needed to strip off some commuting gear and swap wheel sets.
(Sidebar: I went for a road/path ride on Friday and popped two spokes on the way home. I ordered a brand new set of Fulcrum Racing 5 CX to replace them, and donated the old wheels to the junior program at West Town Bikes. What gear do you have in your closet that an underprivileged kid could use to get hooked on bikes instead of something worse?)
So I flipped my bike upside down to put on my racing wheels. But when I grabbed the front wheel to align it parallel to the frame I felt and heard something very bad as it spun: crunching and grinding. Instead of being quick and easy, my bike prep quickly degraded into trying to clean a pair of dirty, sandy, gritty, black-greasy, rusty headset bearings hoping that I could get enough of the particulates out of the cartridge to make them turn without grinding. I got them turning freely again, but I got to bed much later than I had hoped.
Despite the late night repairs, the morning went smoothly. I got dressed, finished packing, ate breakfast, and rode north to meet Chernoh at Sarah's house. As I was stopped at the intersection of Clark and Belmont I saw a familiar face, and yelled "Hey Gabe". Gabe is the manager of my friendly-neighborhood car rental place. Every weekend I have had a race this summer I have rented a car from Gabe. I guess that makes me a "regular". He was hopping back into his illegally parked SUV with a fresh cup of over-priced coffee in his hand. He hollered back, "Hey! Am I going to see you later?" and I said "Sorry, catching a ride with a friend today". That is to say: "Sorry Gabe, I'm cheating on you."
Sarah was kind enough to share her spacious SUV with me and Chernoh, and got us to the race. We had a good time in the car, and we arrived precisely when we intended at 9:30am. Unfortunately we did not make it from the car to the starting area in time for a pre ride before the Master's 30 race. Instead we unloaded the car, answered our respective calls from Nature, found our team tent, and I got my camera out to take some photos of my teammates and friends in the Master's race.
After taking some photos I set my camera down and started to get ready for the next window to pre-ride the course. Part of that preparation involved eating one of my home roast beef and cheddar sandwiches on homemade bread. There were some bees flying around so I was being careful with my sandwich, wrapping it back in the bag between bites, and swatting them away when they tried to land on the sandwich. Unfortunately I was not careful enough. About half-way through the sandwich I was bringing it to my mouth and the yellowjacket landed on the sandwich when it was below my field of vision, and ZAP!!!!!!!!!!
My eyes melted with searing pain as his stinger buried into my tongue.
Spit, sputter, yell, drop to my knees and paw at my tongue to make sure there is no stinger in hole.
I remember being under the center of our tent on my hands and knees drooling.
I remember telling EVERYONE as my tongue swelled that I had been stung by a bee.
I remember than no one knew how to treat a bee sting to the mouth.
I remember Katie teasing me by asking "So are you going to finish that?" with a covetous tone in her voice.
I remember going to the first-aid kit and finding the insect sting / bite antiseptic wipes.
"External use only."
I sent text messages to my girlfriend and a nurse friend asking for advise, I talked to Sarah who is a nurse about what to do, and Chernoh googled "bee sting on tongue".
There was no recommended treatment, so we ended up deciding on an anti-histamine. I rode across the street to the Jewel, walked inside with my bike, and wandered around in the pharmacy for 10-15 minutes looking for benedryl. I finally asked for help from the pharmacist. He said they don't make it anymore, and pointed me to the generic.
I returned to the meet, took two 25mg pills, and did my best to warm up. It was 11AM by that time already and the field for the 3s was going to start queuing up in about 10 minutes. I had no time to pre-ride the course, I didn't really even have time to do a good warm-up. Instead I went and stood in the staging area for 40 minutes. Bryan Lee was near by and gracious enough to give me verbal tour of the course as the words "Do not use while operating a motor vehicle or heavy equipment" flashed in my mind. Maybe this wasn't a good idea.
Call-ups were made, and after the rush I ended up in the 4th row back from the start. I had a pretty good start and moved up in the field as I normally would. But instead of being able to sustain that pace and hold my place in line the lack of warm up hit me. My legs got very heavy and I got slow. The rest of my race is a blur. I don't have an idea of how many laps we did, and I can't give a lap-by-lap account. Just some fragmented memories of what happened.
I got passed...a lot by all the usual suspects. Austin, Forest, Demey, etc.
I wiped out at the north end of the course on an off-camber turn.
On two separate laps my left foot did not unclip as I was trying to dismount and turn to go over the uphill barriers at the south end of the course and wiped out.
On the way to Dekalb we were talking in the car about CrossResults.com and the concept of a "nemesis". Sarah asked me if our friend Austin was one of my nemeses, and I laughed because Austin is way faster than me, and I only every see him when he is passing me or he is on foot with a mechanical. Sarah yelled on the first or second lap "Let's go Nathan, at least you're ahead of Austin" not seeing that Austin was immediately behind me waiting for the next straight away to blow past me. Austin quipped "Hey!" and he was gone.
Somewhere about 3/4th of the way through the race I started to feel okay again, and maybe like I could start climbing back up the field. A guy in a red/white kit passed me on a straight away, and I started to try and hold his wheel. When we got to some technical sections I was able to close the gap, and when we went up the flyover I was able to bound past him again. On the remount on the top of the flyover though I overshot my saddle a bit and had to swerve to catch myself. I then had to swerve back to keep from falling the other way, and fell into the side railing at about 15mph. I was able to get control of my bike, pull off the railing and not crash into the ground at the bottom of the ramp, but I could feel a burn on my forearm and on the back of my hand. It could have been a splinter, it could have been a cut, I wasn't sure if I was bleeding or not. I could see that I had epidermal burns on the back of my left hand, but I couldn't see my forearm. After navigating two turns I tried to look at my forearm for blood, and ended up running off the course and getting hung up on the tape and a plastic post. I had to take a step backwards, lost two spots, one of which was to the guy in the red/white kit who I passed recklessly on the flyover to get the burns in the first place. I think my second wipe out at the barriers was on that last lap too.
I remember that Julia was helping out the Half-Acres and running around the course doing mid-race repairs and cheering me on. I needed and appreciated the encouragement.
I remember gagging and choking on my own salva and mucus. It turns out you can't swallow when your tongue is paralyzed. There was a lot of sputtering, hacking, and spitting trying to keep my airways clear enough to breath.
It was kind of a miserable race. It was my worst finish ever in any ChiCrossCup race in any category. I wanted to quit. I wanted to throw in the towel. But I did not quit. I finished, and I finished in the top half (42nd of 90 some odd finishers). After the race I got on the phone with my girlfriend, walked around the picnic shelter with registration, and laid down in the grass and had an emotional breakdown. It had been a really rough week, and a terrible race day was the straw that broke my back.
It took another three hours of being a complete zombie before I was "with it" enough to even take some pictures. I got a few good shots of the 4s and SS race before bailing back to the city. My race bag remained unpacked as I zoned out telling friends and family and Facebook the story of how (complete Facebook status) = |
// Copyright 2016 the V8 project authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
export * from "modules-skip-1.js"
export * from "modules-skip-5.js"
|
Diagnosis and treatment of seborrheic dermatitis.
Seborrheic dermatitis is a common skin condition in infants, adolescents, and adults. The characteristic symptoms-scaling, erythema, and itching-occur most often on the scalp, face, chest, back, axilla, and groin. Seborrheic dermatitis is a clinical diagnosis based on the location and appearance of the lesions. The skin changes are thought to result from an inflammatory response to a common skin organism, Malassezia yeast. Treatment with antifungal agents such as topical ketoconazole is the mainstay of therapy for seborrheic dermatitis of the face and body. Because of possible adverse effects, anti-inflammatory agents such as topical corticosteroids and calcineurin inhibitors should be used only for short durations. Several over-the-counter shampoos are available for treatment of seborrheic dermatitis of the scalp, and patients should be directed to initiate therapy with one of these agents. Antifungal shampoos (long-term) and topical corticosteroids (short-term) can be used as second-line agents for treatment of scalp seborrheic dermatitis. |
<?php
/**
* @version
* @file
* @author
* EN-Revision: Revision of lang_en.inc.php
*/
@define('PLUGIN_EVENT_EMOTICATE_NAME', '标记语言: 表情图案');
@define('PLUGIN_EVENT_EMOTICATE_DESC', '将标准的表示表情色彩的字符串转换成图片形式');
@define('PLUGIN_EVENT_EMOTICATE_TRANSFORM', '像 :-) 和 ;-) 等标准的表示表情色彩的字符串会被转换成图片形式');
@define('PLUGIN_EVENT_EMOTICATE_EXTENSION', '文件扩展名');
@define('PLUGIN_EVENT_EMOTICATE_EXTENSION_BLAHBLAH', '图片表情文件的扩展名(区分大小写)');
|
A kernel autoassociator approach to pattern classification.
Autoassociators are a special type of neural networks which, by learning to reproduce a given set of patterns, grasp the underlying concept that is useful for pattern classification. In this paper, we present a novel nonlinear model referred to as kernel autoassociators based on kernel methods. While conventional non-linear autoassociation models emphasize searching for the non-linear representations of input patterns, a kernel autoassociator takes a kernel feature space as the nonlinear manifold, and places emphasis on the reconstruction of input patterns from the kernel feature space. Two methods are proposed to address the reconstruction problem, using linear and multivariate polynomial functions, respectively. We apply the proposed model to novelty detection with or without novelty examples and study it on the promoter detection and sonar target recognition problems. We also apply the model to mclass classification problems including wine recognition, glass recognition, handwritten digit recognition, and face recognition. The experimental results show that, compared with conventional autoassociators and other recognition systems, kernel autoassociators can provide better or comparable performance for concept learning and recognition in various domains. |
Q:
Starting a list mid-sentence
I am trying to reconstruct the following look:
show that (a) Item 1
(b) Item 2
I am unsure as how to do this. Any help you could provide would be greatly appreciated.
A:
Something like this?
\documentclass{article}
\begin{document}
Show that \begin{tabular}[t]{@{}l@{}} (a) Item 1 \\ (b) Item 2 \end{tabular}
\end{document}
|
Image of the Day: Pretty Jellies
The genomes of jellyfish are compared with those of other Cnidarian species that don’t have a free-swimming stage.
Apr 19, 2019
Chia-Yi Hou
Moon jelly (Aurelia aurita), whose genome was found to be more similar to a coral or sea anemone than the box jellyfish Morbakka virulenta
OIST
Researchers sequenced and compared the genomes of the moon jellyfish (Aurelia aurita) and the giant box jellyfish (Morbakka virulenta) and reported their results Monday (April 15) in Nature Ecology & Evolution. “We show that the magnitude of genetic differences between the two jellyfish types is equivalent, on average, to the level of genetic differences between humans and sea urchins in the bilaterian lineage,” the authors write in their report.
They also compared the genomes to other Cnidarian species to understand the genetic differences underlying body plan and the jellies’ particular development from polyps to free-swimming animals. |
More than 50,000 people gathered around the tiny Garryduff Presbyterian Church in Ballymoney, County Antrim, to bid farewell to a true sporting legend.
Road racing is the toughest of sports and requires hard men. But many of these hard men were unashamedly in tears, heads bowed, saying their final goodbyes to the unlikeliest of sporting superstars.
As the funeral of Joey Dunlop got under way on 7 July 2000, people were still trying to come to terms with the fact that the seemingly indestructible road racer had been killed in a minor race in Estonia five days earlier at the age of 48.
Fifteen years on from that emotionally-charged day, some of those close to Joey having been reflecting on the legacy of this shy man who hated the limelight, but whose popularity was such that in a recent poll conducted by the Belfast Telegraph, he was voted Northern Ireland's greatest ever sports star, ahead of the legendary George Best.
"Northern Ireland's greatest"
Liam Beckett, a BBC pundit and Dunlop family friend, believes this accolade was fitting.
Joey Dunlop at the North West 200 in 1986
"Joey was quite simply the greatest at what he did and he always did it with the absolute minimum of fuss."
For Liam Beckett, it is this combination of Joey's iconic stature alongside his shy, unassuming persona, which ensures his popularity endures.
"Joey was always uncomfortable when being showered with adulation. He was much more content when in the company of his family and close friends. In many ways it was these 'down to earth' qualities which endeared him to his legions of fans."
Throughout the Troubles in Northern Ireland Joey remained apolitical, attracting loyal support from Catholics and Protestants alike. Famously superstitious, he always wore a red t-shirt and a yellow crash helmet.
Joey Dunlop and his brother Robert competing at the North West 200 in 1990
Humanitarian
Joey's racing triumphs, including five consecutive Formula 1 World Championships, 26 Isle of Man TTs, 13 North West 200s and 24 Ulster GPs, were well documented, but throughout his life Joey's charity work was less publicised.
He would regularly load up his van with food and clothing and drive across Europe to deliver parcels to the orphans of Romania, Bosnia and Albania. Typically, this was done without any fanfare.
Joey in 1992 as he prepared to travel to Romania with his van full of food and clothes for the orphanage
Siobhan Carter, who volunteered at one of the orphanages Joey visited in Romania, has been reflecting on the major impact he made there.
"Joey's visit raised morale greatly with the staff and children. For me, seeing someone from near my home town in Northern Ireland, arriving with supplies which he had personally struggled to deliver to his destination, without translators, and sleeping alone in minus conditions in his van, touched me greatly", she said.
"I do believe Joey received a calling to help others following his visit and that led him to make many future trips to help in orphanages."
Joey was awarded the OBE for his humanitarian work in 1996 and he described it as the proudest moment of his life.
Posthumously his charity work continues through the Joey Dunlop Foundation which receives donations from around the world.
Tragedy in Tallinn
The risk of serious injury or death is a constant companion of the road racer, such is the perilous nature of the sport. But given that Joey had survived for so long, it was still a huge shock when he was killed while leading a 125cc race in wet conditions in Tallinn, Estonia on 2 July 2000.
He had spent his last night on earth sleeping across the front seats of his van, eschewing the hotel suite that had been laid on for him.
Liam Beckett remembers the events of that day well.
"Joey's youngest son Richard had stayed overnight at our house, as he and my son William are best friends. We had just finished Sunday dinner when I saw Joey's daughter Donna come speeding in my driveway. She was in floods of tears and in seconds I could hear a commotion with my wife Gillian shouting 'no Donna, no'. That is how I received the dreadful news."
Outpouring of grief
Motorcyclists came from as far afield as Australia, Japan and South Africa to attend Joey's funeral, riding in noisy formation. So many stood in the tiny country lanes around Dunlop's modest bungalow that it took the undertakers an hour to carry him through the crowds to complete the mile-long trip.
Mourners packed the roads as Joey Dunlop made his final journey
"A stunned silence and a sense of real disbelief had descended over the entire country, and beyond," said Liam Beckett.
"The people's hero was gone and the outpouring of grief was a spectacle which I feel won't be repeated in Northern Ireland."
Dunlop dynasty
Although Joey's brother Robert, another motorbike legend, was killed during practice at the 2008 North West 200, Robert's sons Michael and William are ensuring the Dunlop dynasty remains at the forefront of road racing.
Brothers Michael and William Dunlop
William Dunlop, speaking last year shortly after breaking his leg at the Isle of Man TT, was typically matter-of-fact about the risks involved.
"I got away with it last time and as soon as I was well again I jumped straight back on a bike," he said.
It's a great life being on the edge all the time. I don't care - I guess that's what it is. Maybe if I had a kid that might change me. But I can't see it."
The Dunlop dynasty - Victories in Isle of Man TT, North West 200 & Ulster Grand Prix Joey Dunlop Robert Dunlop William Dunlop Michael Dunlop IOM TT: 26 IOM TT: 5 IOM TT: 0 IOM TT: 11 NW 200: 13 NW 200: 15 NW 200: 3 NW 200: 4 Ulster GP: 24 Ulster GP: 9 Ulster GP: 7 Ulster GP: 6
The story of the Dunlops has been told in a recent documentary, the highly acclaimed Road, in which Joey is the star.
Legacy
Joey Dunlop is the man with the common touch who became a sporting icon and who in death has become a mythical figure.
Liam Beckett believes his legacy will live on: "Joey is still revered throughout the world as the quiet country lad who went on to become the greatest motorcycle pure road racer of all time. Quite simply there will never be another Joey."
For Siobhan McCarter, his charity work should not be forgotten.
"For me Joey's legacy is the definition of a humanitarian - a person who sought to promote human welfare."
"He appeared to live a life where all people he met, regardless of class or creed, were special to him as a human being."
As for the man himself, what would he want his legacy to be? Joey once said how he would like be remembered:
"I never really wanted to be a superstar. I just wanted to be myself. I hope people remember me that way." |
A host integrated circuit such as a system-on-a-chip (SoC) is typically integrated with a plurality of peripheral devices that can each trigger an interrupt to the SoC's processor. To accommodate the interrupt processing, a general purpose input/output (GPIO) architecture may be used in which the SoC includes a unique GPIO pin for each peripheral device's interrupt signal. The SoC then determines immediately the identity of the interrupting peripheral through the identity of the corresponding GPIO pin. Although interrupt processing latency is thus reduced, direct GPIO embodiments suffer from the resulting increased pin count as the SoC must then have a dedicated GPIO pin for each peripheral device.
The SoC pin count may be reduced at the cost of increasing latency in a conventional open-drain embodiment for a host integrated circuit in which the interrupts from a plurality of peripheral devices are all aggregated onto a common pin to the SoC. The default state of the common pin is typically logic high such as through a weak pull-up device. Should a peripheral device want to trigger an interrupt through the common pin, the peripheral device overcomes the weak pull-up device to discharge the common pin voltage to ground. Although just a single common pin can thus service multiple peripherals in an open-drain implementation, the SoC must then poll the peripheral devices to determine which device originated the interrupt, which increases interrupt processing latency.
To reduce interrupt latency, a row-column matrix approach may be used in which the peripheral devices are arranged with regard to a matrix of row and column wires or signal leads. Each peripheral device couples to between a corresponding row and column lead. For example, a matrix of leads formed into three rows and three columns may couple to nine peripheral devices. A first peripheral device couples to the intersection of a first row and a first column, a second peripheral device couples to the intersection of the first row and a second column, and so on such that a ninth peripheral device couples to the intersection of a third row and a third column. Each row couples to a corresponding GPIO pin on the host device. Similarly, each column couples to a corresponding GPIO pin on the host device. In a matrix having m columns and n rows, the host device would thus need to devote the sum of (m+n) GPIO pins for coupling to the matrix. Although the number of necessary GPIO pins is reduced as compared to a direct GPIO architecture, row-column matrix architectures still consume a substantial number of GPIO pins. Moreover, only two peripheral devices may trigger an interrupt at any given time as additional interrupts from other peripheral devices cannot be uniquely identified in a row-column matrix approach. Finally, the processing of the row and column GPIO signals at the host device is complex and consumes substantial power.
Accordingly, there is a need in the art for digital input aggregation architectures that accommodate the processing of interrupts from multiple peripheral devices with reduced latency and also reduced pin count. |
Inhibition of preadipocyte proliferation by mitochondrial reactive oxygen species.
Preadipocytes are present and can proliferate to increase fat mass throughout adult life. The importance of mitochondria in these cells has never been investigated, although we recently reported that mitochondrial oxidative metabolism is non-negligible in white preadipocytes. Mitochondrial reactive oxygen species generation is intimately associated with respiratory chain function. An increasing number of reports support their role as signalling molecules. The aim of this work was to study the effects of mitochondrial reactive oxygen species on proliferation of white preadipocytes. Rotenone and oligomycin, inhibitors of complex I and of ATP synthase respectively, increased H(2)O(2) and inhibited cell growth of preadipocytes (without inducing necrosis or apoptosis). These effects were partly prevented by addition of radical scavengers. A chemical uncoupler had opposite effects on reactive oxygen species generation and cell growth. Propofol, which inhibits complex I but also scavenges free radicals, had effects similar to those of the uncoupler on both parameters. Thus, mitochondrial reactive oxygen species can influence development of adipose tissue by affecting the size of the white preadipocyte pool. |
Editorial: The Marja test
Monday
Feb 22, 2010 at 12:01 AMFeb 22, 2010 at 9:16 PM
For months, President Obama and his advisers labored to come up with a successful strategy for Afghanistan. That strategy is now being put to the test in Marja, a Taliban stronghold in Helmand Province, and Americans should pay attention.
For months, President Obama and his advisers labored to come up with a successful strategy for Afghanistan. That strategy is now being put to the test in Marja, a Taliban stronghold in Helmand Province, and Americans should pay attention.
The Marja offensive is the biggest operation since the battle of Fallujah, a comparison Gen. Stanley McChrystal, commander of NATO forces in Afghanistan, resists. Marines fought their way into Fallujah in April 2004, a low point for U.S. troops in the Iraq war, then left it to the Iraqis. Seven months later, U.S. troops again had to storm Fallujah, with great destruction and loss of life, because it had become a center of the Iraqi resistance in Anbar Province.
"We don't want Fallujah," McChrystal told The New York Times as Marines entered Marja. "Fallujah is not the model."
McChrystal's new model is one where troops make every effort to minimize destruction and loss of life, particularly civilian deaths. The test is what happens after the territory has been secured, he says. With that in mind, McChrystal has what he calls a "government in a box" Afghan civil servants, foreign advisers and Afghan police ready to set up shop in Marja as soon as the Marines have cleared out the Taliban.
Success in war is all about tactical adaptation, and the Taliban are already adapting, using more human shields for protection. Even without those tactics, civilian deaths are unavoidable. While there is no moral equivalence between civilians accidentally killed by NATO troops targeting Taliban soldiers and Afghan civilians targeted by Taliban suicide bombers, a force of outsiders must meet a higher standard if it is to win the trust of the Afghan people.
If NATO troops can secure, hold and build in Marja, the model will be applied elsewhere and the Taliban's grip on Afghanistan's rural areas will slip. But the degree of difficulty is huge, and requires U.S. troops to change the way they approach their jobs.
"The population is not the enemy," Marine Brig. Gen. Larry Nicholson told the Times, "The population is the prize."
Polls indicate most Americans just want the troops to come home. All should be pulling for McChrystal's strategy to succeed.
The MetroWest Daily News
Never miss a story
Choose the plan that's right for you.
Digital access or digital and print delivery. |
<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="GENERATOR" content="Mozilla/4.6 [en] (Win98; U) [Netscape]">
<meta name="Author" content="Bob Smith">
<title>386SWAT Display Options</title>
</head>
<body text="#000000" bgcolor="#FFFFC0" link="#0000FF" vlink="#800080" alink="#FF00FF">
<center><b><font size=+2>386SWAT Display Options</font></b></center>
<p>The debugger presents its output on various display devices in various
contexts. Typically, it uses the primary display, but other options
are possible. If you have a secondary display, such as a monochrome
adapter/monitor or if you are running on a PCI system with a second PCI
VGA adapter, 386SWAT can use those also.
<p>If you have a monochrome adapter in your system, place the keyword <a href="swatpro.htm#MONO">MONO</a>
in your 386SWAT profile. The debugger determines whether or not your
monochrome adapter is always visible or is hidden by a PCI VGA card, even
an AGP controller. In either case, 386SWAT ferrets out the adapter
and displays its output there. Pressing <a href="swatscr.htm#a-F7">Alt-F7</a>
switches between the monochrome and color adapters.
<p>If you have a secondary PCI VGA adapter in your system, place the keyword
<a href="swatpro.htm#DVGA">DVGA</a>
in your 386SWAT profile. The debugger displays its output on this
screen, even if it's hidden by an AGP controller. Pressing <a href="swatscr.htm#a-F7">Alt-F7</a>
switches between the two PCI VGA adapters.
<p>I learned a bit about PCI programming getting the above to work, so
I've gathered together <a href="ftp://ftp.sudleyplace.com/sudleyplace/dpci.zip">assembler
code</a> to demonstrate the techniques used for you to browse. Thanks
go to Dominik Behr, Federico Bianchi, Ralf Brown, and others for their
helpful suggestions and/or source code.<!--#include virtual="/footer.htm" -->
</body>
</html>
|
Angiogenesis and mast cells in non-Hodgkin's lymphoma: a strong correlation in angioimmunoblastic T-cell lymphoma.
Mast cells are likely to play a role in angiogenesis under pathological conditions. Solid tumor growth is dependent on angiogenesis, but the influence of mast cells on angiogenesis in non-Hodgkin's lymphoma, (NHL) is not clear. We investigated mast cell number and vessel count in 61 cases of NHL. We also evaluated expression of vascular endothelial growth factor (VEGF) and basic fibroblast growth factor (bFGF), both important cytokines for angiogenesis. The number of mast cells was greater in T-cell lymphomas than in B-cell lymphomas. Of the T-cell lymphomas, the greatest number of mast cells was observed in the angioimmunoblastic T-cell lymphoma (AIL). In all NHLs, significant correlation was found between vessel count and the number of mast cells (p < 0.0001) and between vessel count and the number of VEGF-expressing cells (p < 0.05) but not between vessel count and bFGF-expressing cells. Strong correlation was detected between the number of mast cells and the number of VEGF-expressing cells (p < 0.0001) in all NHLs. Double fluorescence staining of VEGF mRNA and mast cell tryptase revealed that mast cells expressed VEGF mRNA. Our data suggest that mast cells play a very important role in angiogenesis by expressing VEGF in NHL, especially in AIL. |
#!/usr/bin/env python
# encoding: utf-8
# author:alisen
# time: 2020/4/29 10:56
import tornado.web
import tornado.gen
import tornado.template
import os
BASE_PATH = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
class Index(tornado.web.RequestHandler):
@tornado.gen.coroutine
def get(self, *args, **kwargs):
self.render(os.path.join(BASE_PATH, 'dist/TrWebOcr_fontend/index.html'))
|
Q:
How to call a class function from inside a React Navigation Header Ba
I am trying to call a parameterized function in a header but could not as I am unable to find to way to pass parameter.
class MyScreen extends React.Component {
static navigationOptions = ({ navigation }) =>
{
headerLeft: (
<SearchBar
placeholder="Search"
round
onChangeText={text => this.searchFunction(text)}
/>
)
};
*searchFunction(text)
{
alert( text + ' searched succesfully');
}*
componentDidMount()
{
**//I would need implementation here**
}
render()
{
return (<View />);
}
}
A:
The reserved word this means nothing in the static context of the navigationOptions function, So you can't use it there to call the searchFunction.
There's a way to add params to the navigation object so you can get them in the navigationOptions static function.
You can add the searchFunction as a navigation object param and pass it to the onChangeText attribute.
The implementation looks like this:
class MyScreen extends React.Component {
// Pass the searchFunction from the navigation params to the `onChangeText` attribute.
// It should be triggered with the `text` argument.
static navigationOptions = ({ navigation }) =>
{
headerLeft: (
<SearchBar
placeholder="Search"
round
onChangeText={navigation.getParam('searchFunc')}
/>
)
};
// Use arrow function to bind it to the MyScreen class.
// (I'm not sure you have to do it like this, try to use it as a normal function first)
searchFunction = (text) => {
alert( text + ' searched succesfully');
}
// Add the `searchFunction` as a navigation param:
componentDidMount() {
this.props.navigation.setParams({searchFunc: this.searchFunction})
}
// Since we pass a class function as a param
// I believe it would be a good practice to remove it
// from the navigation params when the Component unmounts.
componentWillUnmount() {
this.props.navigation.setParams({searchFunc: null})
}
render() {
return (<View />);
}
}
Source
|
‘=11
=msam10 =msam7 =msam5 ===@\#1[\#1<10 \#1\#1=10 A\#1=11 B\#1=12 C\#1=13 D\#1=14 E\#1=15 F]{} @[@]{}
=“3@49 =”3@4A
‘= \#1 \#1
23.6cm -.2in
\[section\] \[lemma\][Proposition]{} \[lemma\][Theorem]{}
[ ]{}4.7in Damtp/97-140
[SOME REMARKS ON BRAIDED GROUP RECONSTRUCTION]{}\
[AND BRAIDED DOUBLES]{}\
\
Shahn Majid[^1]\
\
Department of Applied Mathematics and Theoretical Physics\
University of Cambridge, Cambridge CB3 9EW, UK\
www.damtp.cam.ac.uk/user/majid
Revised August, 1998
> The cross coproduct braided group $\Aut(\CC)\rcocross B$ is obtained by Tannaka-Krein reconstruction from $\CC^B\to \CC$ for a braided group $B$ in braided category $\CC$. We apply this construction to obtain partial solutions to two problems in braided group theory, namely the tensor problem and the braided double. We obtain $\Aut(\CC)\rcocross\Aut(\CC)$ $\isom \Aut(\CC)\lcross\Aut(\CC)$ and higher braided group ‘spin chains’. The example of the braided group $B(R)\lcross
> B(R)\lcross\cdots\lcross B(R)$ is described explicitly by R-matrix relations. We also obtain $\Aut(\CC)\rcocross \Aut(\CC)^*$ as a dual quasitriangular ‘codouble’ braided group by reconstruction from the dual category $\CC^\circ\to\CC$. General braided double crossproducts $B\dcross C$ are also considered.
Introduction
============
Recently there has been a lot of interest in the braided version of the Tannaka-Krein reconstruction theorem proven by the author in [@Ma:bg]. Here one considers a monoidal functor $F:\CC\to \CV$ and reconstructs (under certain representability assumptions) a braided group or Hopf algebra in the braided category $\CV$, denoted $\Aut(\CC,F,\CV)$. This is how braided groups were first introduced (in [@Ma:bg]). By now there is a rich and extensive theory of braided groups, see for example [@Ma:bra][@Ma:tra][@Ma:bos][@Ma:rep] [@Ma:cat][@Ma:exa][@Ma:lin][@Ma:skl][@Ma:lie] [@Ma:diag][@Ma:dbos], and [@Ma:introm][@Ma:book] for reviews.
In this paper we consider some examples of braided reconstruction. Let $B$ be a braided group in a category $\CC$ and $\CC^B$ the category of braided comodules of $B$. In Section 1 we study the solution of the reconstruction problem for the forgetful functor $$\CC^B\to \CC,$$ namely the prebosonisation braided group cross coproduct $\Aut(\CC)\rcocross B$ introduced in [@Ma:bos] (there in the module version rather than comodule version but the reversal of arrows is routine). It is the prebosonisation of $B$ because in the case $\CC=\CM^H$ ($H$ dual quasitriangular) it is related by transmutation to the bosonisation $H\rbiprod B$. All this was known since 1991 from the bosonisation theory [^2]; to this we add now the observation that when $B=\Aut(\CC)$ itself, $$\Aut(\CC)\rcocross \Aut(\CC)\isom \Aut(\CC)\lcross\Aut(\CC),$$ i.e. in some sense should be viewed as the closest one may come to something in between like $\Aut(\CC)\tens\Aut(\CC)$, having an equal description either as a tensor product algebra with cross coalgebra or a tensor product coalgebra with a cross algebra. (We recall that there is no general tensor product of braided groups in a given braided category; the tensor product algebra and coalgebra themselves do not fit together due to ‘tangling up’ when the category is truly braided.) The construction can be iterated and leads to concrete R-matrix formulae for a $n$-fold ‘spin chain’ braided group $B(R)\lcross B(R)\lcross\cdots\lcross B(R)$ where $B(R)$ are the braided matrices [@Ma:exa].
In Section 3 we solve the reconstruction problem for the forgetful functor $$\CC^\circ\to \CC$$ where $\CC^\circ$ is the dual[@Ma:rep][@Ma:cat] or ‘centre’ of a monoidal category. The solution is the braided group $\Aut(\CC)\rcocross
\Aut(\CC)^*$, which we show is dual-quasitriangular. This makes it an example of some kind of braided codouble.
In Section 4 we make some remarks about double bosonisations and general braided double crossproducts, also a topic of recent interest. In fact, it was mentioned in the introduction of q-alg/9511001[@Ma:dbos] that a theory of double cross products $B\dcross C$ works fine in a braided category but does [*not*]{} include the general construction of the ‘braided double’ $B\dcross
B^*$ due to becoming ‘tangled up’.
Reconstruction from $\CC^B\to \CC$
==================================
Let $\CC$ be a braided category[@JoyStr:bra], with braiding $\Psi=\epsfbox{braid.eps}$ and inverse braiding $\Psi^{-1}=\epsfbox{braidinv.eps}$. We use the diagrammatic methods for braided groups due to the author in [@Ma:bra][@Ma:tra][@Ma:bos][@Ma:introm], where the product is represented as $\epsfbox{prodfrag.eps}$ etc. Contrary to recent misconceptions, such a notation for braided algebra is [*not*]{} in Yetter’s fine paper[@Yet:rep] on crossed modules; $\epsfbox{prodfrag.eps}$ there refers to ordinary Hopf algebras in the category of vector spaces and $\epsfbox{braid.eps}$ to a completely different braided category (so if one looks at the paper in detail, there is nothing like braided groups or braided algebra in [@Yet:rep]). We suppress the associativity $X\tens(Y\tens
Z)\isom (X\tens Y)\tens Z$ for objects $X,Y,Z\in
\CC$ by Mac Lane’s coherence theorem. We assume throughout that $\CC$ is rigid, i.e. every object comes with a dual $X^*$, evaluation $\ev=\cup$ and coevaluation $\coev=\cap$. Here $\cap:\und 1\to X\tens X^*$ but the unit object for the tensor product is omitted in the diagrammatic notation. All categories are assumed equivalent to small ones.
We let $\CC$ be such that the identity functor $i:\CC\to\CC$ obeys the representability condition for comodules, i.e. there exists an object $A\in \CC$ such that $$\theta:\Mor(A,V)\isom \Nat(i,i\tens V)$$ for any object $V$ in $\CC$ and such that the induced maps $$\theta_n:\Mor(A^n,V)\isom\Nat(i^n,i^n\tens V)$$ are also isomorphisms. Here the induced maps $\theta_n$ defined by composing with the morphisms $\{\beta_X:X\to X\tens A\}$ making up the natural transformation corresponding to $\id:A\to A$. In this situation one has [@Ma:bg] a braided group $A=\Aut(\CC)$ living in $\CC$ and $\beta_X$ is a [*tautological coaction*]{} of it on each object $X$. For example, we may suppose for convenience that $\CC$ is rigid and cocomplete over itself. These same constructions go through more generally when, for example, $i:\CC\to\bar{\CC}$ where $\bar{\CC}$ is a larger category (eg some cocompletion of $\CC$), yielding $\Aut(\CC)\in\bar{\CC}$). We use for that the more general reconstruction from a functor $F:\CC\to\CV$, which is defined similarly to the identity case above[^3]; see [@Ma:bg][@Ma:introm][@Ma:book].
Now let $B$ be another braided group in $\CC$. The category $\CC^B$ of all braided comodules $(X,\cora)$ is monoidal[@Ma:bg], where $X\in\CC$ and $\cora:X\to X\tens B$ is the coaction.
In the above situation, the forgetful functor $F:\CC^B\to \CC$ satisfies the representability assumption with respect to the object $\Aut(\CC)\tens B$.
We write $A=\Aut(\CC)$. Given any $\phi:A\tens B\to V$ we define $\Theta(\phi)\in \Nat(F,F\tens V)$ by $\Theta(\phi)_{(X,\cora)}=(\id\tens\phi)(\beta_X\tens\id)\cora$. It is clearly a natural transformation since it can also be written as $\Theta(\theta^B)_X=\theta^B_X\circ\cora$, where $\theta^B\in
\Nat(i\tens B,i\tens V)$ corresponds to $\phi$ via $\theta^B(\phi)_X=(\id\tens\phi)\beta_X$. In the converse direction, given such a natural transformation $\Theta$, we define $\theta^B(\Theta)_X=(\id\tens\eps\tens\id)\circ\Theta_{(X\tens
B,\Delta)}$ as clearly a natural transformation in $\Nat(i\tens
B,i\tens V)$, where we view $X\tens B$ as in $\CC^B$ by the trivial coaction on $X$ and the coproduct on $B$. This then corresponds to a morphism $\phi:A\tens B\to V$. These constructions are mutually inverse. Thus, given $\Theta$ we define $\theta^B$ as stated. Then $$\Theta(\theta^B)_X=\theta^B_X\circ\cora=(\id\tens\eps\tens\id)
\Theta_{(X\tens B,\Delta)}\circ\cora=(\id\tens\eps\tens\id)
(\cora\tens\id)\Theta_X=\Theta_X$$ since $\cora:X\to X\tens B$ is a morphism $(X,\cora)\to (X\tens B,\Delta)$ in $\CC^B$ (due to $\cora$ a coaction) and $\Theta$ is natural. Conversely, given $\theta^B$ we define $\Theta$ as stated. Then $$\theta^B(\Theta)_X=(\id\tens\eps\tens\id)
\Theta_{(X\tens B,\Delta)}=
(\id\tens\eps\tens\id)\theta^B_{X\tens
B}(\id\tens\Delta)=\theta^B_X$$ since $\eps:X\tens B\to X$ is a morphism in $\CC$ and $\theta^B$ is natural. Similarly for the higher order representability conditions.
cf. [@Ma:bos] Let $B$ be a braided group in $\CC$. Braided reconstruction[@Ma:bg] from the forgetful functor $F:\CC^B\to
\CC$ yields the [*prebosonisation*]{} braided group $\Aut(\CC)\rcocross B$, with the braided tensor product algebra and the cross coproduct coalgebra by the tautological coaction $\beta_B:B\to B\tens \Aut(\CC)$ as an object of $\CC$.
$$\epsfbox{recon.eps}$$
We routinely apply the reconstruction theorem as presented diagrammatically in [@Ma:introm][@Ma:book]. The representing object is $A\tens
B$ from Lemma 2.1 and $\beta_{(X,\cora)}=(\beta_X\tens\id)\circ\cora$ corresponds to the identity on $A\tens B$. The product is defined in terms of this and $\beta_{(X\tens Y,\cora\tens\cora)}$, which is the middle box in Figure 1(a). From this we see that the product on $A\tens B$ is the braided tensor product algebra (the dotted box). The coproduct is defined as such that $\beta_{(X,\cora)}$ is a coaction, see the first equality in Figure 1(b). The second equality is naturality under $\cora:X\to X\tens B$ as a morphism in $\CC$. We then use that $\cora$ is a coaction. This identifies the reconstructed coproduct as a cross coproduct by $\beta_B$ (the dotted box). Cross product braided groups are in [@Ma:bos] and we turn that up-side-down. The result is a braided group due to the braided-commutativity of $\Aut(\CC)$[@Ma:bg].
An example $BGL_q(2)\rcocross A_q^2$, where $B=A_q^2$ is the quantum plane, is computed explicitly in [@Ma:com]. Note that to obtain $BGL_q(2)$ (the braided group version of $GL_q(2)$) one uses the braided reconstruction in the slightly more general form where $\CC$ consists of finite-dimensional objects and $\Aut(\CC)$ lives more precisely in its cocompletion[@Ma:bg].
Also, we can clearly iterate Theorem 2.2 to obtain braided groups $$(\Aut(\CC)\rcocross(\Aut(\CC)\rcocross\cdots\rcocross B)\cdots )$$ or ‘braided chain lattices’. Although there is in general no tensor product of braided groups, Theorem 2.2 says that we can always ‘tensor’ by $\Aut(\CC)$ in this way.
Now we consider $B=\Aut(\CC)$ itself. By Theorem 2.2 we obtain a braided group $\Aut(\CC)\rcocross\Aut(\CC)$, which we call the [*square*]{} of $\Aut(\CC)$.
Let $B$ be any braided group. Then $B\rcocross B$ by the braided adjoint coaction (and braided tensor algebra) is isomorphic to $B\lcross B$ by the braided adjoint action (and braided tensor coalgebra).
$$\epsfbox{crossisom.eps}$$
In general, neither of these will be braided groups – so this is an isomorphism of algebras and coalgebras. The former is shown in Figure 2(a). We apply the isomorphism (the upper dotted box), then the braided tensor product algebra, then the inverse of the isomorphism (lower dotted box). We use the coproduct homomorphism property, antipode antimultiplicativity, the antipode axiom to cancel a loop, and finally recognise the cross product by the adjoint action (dotted box on the right). Figure 2(b) does the computation for the coproduct; we apply the isomorphism (dotted box), the cross coproduct by the braided adjoint action, and then the inverse of the isomorphism (dotted box). We use the coproduct homomorphism property and cancel two resulting antipode loops. Cancelling the resulting antipode loop gives the braided tensor coproduct on the right.
Reconstruction from the forgetful functor $\CC^{\Aut(\CC)}\to\CC$ yields $$\Aut(\CC)\rcocross\Aut(\CC)\isom \Aut(\CC)\lcross\Aut(\CC)$$ where the left hand side is a cross coproduct by the adjoint coaction (and braided tensor product algebra) and the left hand side is the cross product[@Ma:bos] by the adjoint action[@Ma:lie] (and braided tensor product coalgebra).
From the explicit realisation as a coend[@Ma:bg] [@Lyu:tan] $\Aut(\CC)=\int_X X^*\tens X$ it is clear that the canonical coaction $\beta_{\Aut(\CC)}$ is the braided adjoint coaction [@Ma:introm] of any braided group $B$ on itself. Indeed, the coaction $\id\tens\beta_X$ on each $X$ coincides with the coproduct $\Aut(\CC)\to\Aut(\CC)\tens\Aut(\CC)$ as part of the reconstruction, the coaction on $X^*$ is conjugate to this via the antipode $S$. We then use Lemma 2.3.
One knows from [@Ma:diag] that any trivial principal bundle has a cross product form, and Proposition 2.4 tell us that in the present case it is $\Aut(\CC)\lcross\Aut(\CC)$. This is then explicitly a trivial braided principal bundle with right coaction $\id\tens\Delta$ and the canonical inclusion of the left hand $\Aut(\CC)$ as ‘base’ of the bundle. It also means that the Hopf algebra is as close as one can come to $\Aut(\CC)\und\tens\Aut(\CC)$ as a braided group.
A concrete example is $BG_q\rcocross BG_q$ where the braided coordinate rings $BG_q$ are quotients of the braided matrices[@Ma:exa] $B(R)$. Writing the matrix generators of the first copy as $\vecu$ and the second as $\vecv$, their relations and that of the braided tensor product (braid statistics) between them are $$R_{21}\vecu_1R\vecu_2= \vecu_2 R_{21} \vecu_1 R,\quad
R_{21}\vecv_1R\vecv_2= \vecv_2 R_{21} \vecv_1 R,\quad
R^{-1}\vecv_1R\vecu_2= \vecu_2 R^{-1}\vecv_1 R.$$ The third relations here correspond to the braiding[@Ma:exa] $$\Psi(R^{-1}\vecu_1\tens R\vecu_2)=\vecu_2 R^{-1}\tens \vecu_1 R$$ (written in [@Ma:exa] with all $R$ to one side) between any two independent copies of $B(R)$. By Theorem 2.2, this $BG_q\rcocross
BG_q$ is a braided group with $$\Delta \vecu=\vecu\tens\vecu,\quad
\Delta \vecv=\vecu^{-1}\bullet \vecv\tens\vecu\vecv$$ where $\vecu^{-1}$ is to be exchanged with $\vecv$ using the relations $R^{-1}\vecu_1\bullet R\vecv_2=
\vecv_2 R^{-1}\bullet\vecu_1 R$ and multiplied with $\vecu$ (these are the relations of the braided tensor product of the copy generated by $\vecv$ with that generated by $\vecu$, as a way of describing the braided adjoint coaction as conjugation[@Ma:lin]).
By Proposition 2.4, this is isomorphic as a braided group to $BG_q\lcross BG_q$, with relations $$R_{21}\vecu_1R\vecu_2= \vecu_2 R_{21} \vecu_1 R,\quad
R_{21}\vecv_1R\vecv_2= \vecv_2 R_{21} \vecv_1 R,\quad
R_{21}\vecv_1R\vecu_2= \vecu_2 R_{21}\vecv_1 R$$ and the coproduct $\Delta\vecu=\vecu\tens\vecu$, $\Delta\vecv=\vecv\tens\vecv$. Also, since $B(R)$ is also the braided enveloping bialgebra $U(\CL)$, where $\CL$ is the braided Lie algebra associated to the $R$-matrix[@Ma:lie], we have a braided group $BG_q\lcross
U(\CL)$, which can be viewed as the algebra of observables of a braided particle with ‘generalised momentum’ $\CL$ moving under the adjoint action on the braided space $BG_q$. The braided-Lie bracket is the adjoint action and we use the known R-matrix formulae for that to obtain $$\vecv_1R\vecu_2=\cdot\circ\vecv_1\la\Psi(\vecv_1\tens R\vecu_2)
=[\vecv_1,R\vecu_2]
R^{-1}\vecv_1R=R_{21}^{-1}\vecu_2R_{21}\vecv_1R$$ to derive the cross product as stated above. This braided group $BG_q\lcross
U(\CL)$ is related by transmutation to the quantum double as explained in [@Ma:skl]. See also the next section.
These formulae also work fine at the braided bialgebra level $B(R)\lcross B(R)$ for any biinvertible $R$-matrix, as one may verfiy directly. And in spite of its origin as a braided cross product, the formulae are remarkably symmetric between the two copies of $B(R)$, reflecting the role as ‘tensor product’. Moreover, the construction can be iterated to $n$ copies of $BG_q$ or $B(R)$, i.e. a ‘braided spin chain’ $B(R)\lcross
B(R)\lcross\cdots\lcross B(R)$. This is generated by $\vecu^{(i)}$ (one for each copy of $B(R)$) with relations $$R_{21}\vecu_1^{(i)}R\vecu_2^{(j)}= \vecu_2^{(j)} R_{21}
\vecu_1^{(i)} R,\quad\forall i\ge j$$ and coproduct $\Delta \vecu^{(i)}=\vecu^{(i)}\tens
\vecu^{(i)}$, forming a braided group with braiding $\Psi$ as above between any two copies of $B(R)$. This braided group is related by transmutation to the iterated double crossproducts $A(R)\dcross\cdots\dcross A(R)$ in [@Ma:mor]. It would be very interesting to relate this approach also to the multiloop braided algebras in [@Nil:str].
Reconstruction from $\CC^\circ$
===============================
Given a monoidal category $\CC$ one has a dual monoidal category $\CC^\circ$[@Ma:rep][@Ma:cat]. It also arose at about the same time as a ‘centre’ or ‘double’ construction, see [@Ma:book]. Objects of $\CC^\circ$ are pairs $(V,\lambda)$ where $V$ is an object of $\CC$ and $\lambda_X:V\tens X\to X\tens
V$ is a natural transformation $\lambda\in\Nat(V\tens i,i\tens V)$ which ‘represents’ the tensor product of $\CC$ in the sense $$\lambda_{\und 1}=\id,\quad \lambda_{X\tens Y}
=\lambda_Y\circ\lambda_X.$$ Morphisms are morphisms of $\CC$ intertwining the corresponding $\lambda$. Actually (an observation due to Drinfeld) $\CC^\circ$ in the present case is braided, with $\Psi_{(V,\lambda),(W,\mu)}=\lambda_W$. In our present applications the category $\CC$ is itself braided as well.
Reconstruction from the forgetful functor $\CC^\circ\to\CC$ yields the dual-quasitriangular braided group $\Aut(\CC)\rcocross\Aut(\CC)^*$, a cross coproduct by the braided coadjoint coaction.
$$\epsfbox{dualrecon.eps}$$
From [@Ma:cat] we know that $\CC^\circ\isom \CC_{\Aut(\CC)}$, the category of right $\Aut(\CC)$-modules, which is essentially the same thing as $\Aut(\CC)^*$-comodules (we assume that a suitable dual braided group exists). Then we can apply Theorem 2.2 with $B=\Aut(\CC)^*$ to obtain $\Aut(\CC)
\rcocross\Aut(\CC)^*$ as the reconstructed braided group. There is also a second ‘opposite’ product defined in Figure 3(a) via $\beta_{(Y\tens X,\cora
\tens\cora)}$. We then use that $A=\Aut(\CC)$ itself is braided-commutative. If $A^*$ has an opposite product itself characterised by Figure 3(b) for all $X$, then we see that $(A\rcocross A^*)^{\rm op}=A\und\tens A^{*\rm op}$ (the braided tensor product). Finally in the braided reconstruction theory there is a dual-quasitriangular structure defined in Figure 3(c) by the braiding of $\CC^\circ$, which we write with $\lambda$ in terms of the corresponding coaction $\cora$ according to [@Ma:cat]. We see that if there is morphism $\CR_0:A\tens A^*\to\und 1$ obeying Figure 3(d) then $\CR=\CR_0\circ(\id\tens\eps\tens\eps
\tens\id)$.
This braided group $\Aut(\CC)\rcocross\Aut(\CC)^*$ is therefore some kind of ‘braided codouble’ of $\Aut(\CC)$ in spite of the the fact that in general in a braided category this does not exist (see the next section). Explicit examples are similar to those in the preceding section since $BG_q$ is essentially self-dual.
Braided double cross products
=============================
This section is a kind of appendix to [@Ma:dbos]. It was mentioned in its introduction:
“the double cross product $B\dcross C$ construction does go through in a braided category, but the key example of a general braided double $B\dcross B^{*\rm op}$ does not”
(a paraphrase) – but details of the braided double cross product were left unpublished due to this basic lack of examples. Since that work, there has nevertheless been a lot of interest in braided versions and generalisations of double cross products and bicrossproducts[@BesDra:cro][@ZhaChe:dou], and for this reason we would like to publish now our calculations[@Ma:dcro] mentioned in [@Ma:dbos]. They can by now be viewed as a special case of the general constructions in [@BesDra:cro][@ZhaChe:dou], but a case important enough to study directly as we do now.
[@Ma:dcro] A [*matched pair*]{} of braided groups is $(B,C,\la,\ra)$ where $B,C$ are braided groups in a category $\CC$, $\la$ makes $B$ a braided left $C$-module coalgebra[@Ma:introm], $\ra$ makes $C$ a braided right $B$-module coalgebra and $\la,\ra$ obey the conditions in Figure 4(a1)-(a3) (and are trivial acting on 1). In this case there is a [*double cross product*]{} braided group $B\dcross C$ with product the dotted box in Figure 4(b) and the tensor product coproduct.
$$\epsfbox{dcross.eps}$$
Assuming a matched pair, Figure 4(b) checks that the braided double cross product (the dotted box) is associative. We use the coproduct homomorphism property for the first equality. The second equality is that $\ra$ respects the coproduct of $C$ and that $\la$ is a left action. The third equality is axiom (a2). The fourth is a reorganisation and associativity of $B,C$ to obtain an expression which is symmetric under mirror-reflection (followed by reversal of braid crossings). Therefore by the mirror image of the above steps, taken in the reverse order, we obtain the final expression. Part (c) checks that the braided tensor coproduct (the dotted box) obeys the homomorphism property. The second equality is axiom (a3). The third equality is another reorganisation. The fourth then uses that $\la,\ra$ respect coproducts. Finally we use the coproduct homomorphism properties of $B,C$.
Conversely, given a braided group $X$ factorising into braided groups $B,C$, one may recover $\la,\ra$ and $X\isom B\dcross C$ by a similar proof to the unbraided case in [@Ma:book].
As a possible example, we might try to build $D(B)=B\dcross B^{*\rm op}$ by braided coadjoint actions. The required coadjoint actions indeed exist but axiom (a3) in Figure 4 fails due to ‘tangling up’. There is no such problem in a [*symmetric*]{} monoidal category, however. In this case, when $\CC={}_H\CM$ is the modules over a triangular Hopf algebra, one obtains the bosonisation of this symmetric-category double as $$(B\dcross B^{*\rm op})\lbiprod H\isom B\lbiprod
H\rbiprod B^{*\rm op},$$ the double-bosonisation. This is explained in [@Ma:pra96] (in the super case) and was indeed one of the main motivations behind the double-bosonisation construction in [@Ma:dbos]; in general $B\dcross B^{*\rm op}$ does not exist but the double-bosonisation does!
[10]{}
S. Majid. Braided groups. , 86:187–221, 1993.
S. Majid. Braided groups and algebraic quantum field theories. , 22:167–176, 1991.
S. Majid. Transmutation theory and rank for quantum braided groups. , 113:45–70, 1993.
S. Majid. Cross products by braided groups and bosonization. , 163:165–190, 1994.
S. Majid. Representations, duals and quantum doubles of monoidal categories. , 26:197–206, 1991.
S. Majid. Braided groups and duals of monoidal categories. , 13:329–343, 1992.
S. Majid. Examples of braided groups and braided matrices. , 32:3246–3253, 1991.
S. Majid. Quantum and braided linear algebra. , 34:1176–1196, 1993.
S. Majid. Braided matrix structure of the Sklyanin algebra and of the quantum Lorentz group. 156:607–638, 1993.
S. Majid. Quantum and braided [L]{}ie algebras. , 13:307–356, 1994.
S. Majid. Diagrammatics of braided group gauge theory. , 1996.
S. Majid. Double bosonisation and the construction of [$U_q(g)$]{}, 1995. To appear in [*Math. Proc. Camb. Phil. Soc.*]{}
S. Majid. Algebras and [H]{}opf algebras in braided categories. volume 158 of [*Lec. Notes in Pure and Appl. Math*]{}, pages 55–105. Marcel Dekker, 1994.
S. Majid. . Cambridge Univeristy Press, 1995.
B. Pareigis. Reconstruction of hidden symmetries. , 183:90–154, 1996.
A. Joyal and R. Street. Braided monoidal categories. Macquarie Report, 1986.
D.N. Yetter. Quantum groups and representations of monoidal categories. , 108:261–290, 1990.
S. Majid. Some comments on bosonisation and biproducts. , 47:151–171, 1997.
V.V. Lyubashenko. Tangles and [H]{}opf algebras in braided categories. , 98:245–278, 1995.
S. Majid. More examples of bicrossproduct and double cross product Hopf algebras. , 72:133–148, 1990.
F. Nill. Structure of monodromy algebras and Drinfeld doubles. , 9:371-395, 1997.
Yu. N. Bespalov and B. Drabant. Cross product bialgebras, I. , Damtp/98-9, February, 1998.
S. Zhang and H.-X. Chen. The double biproduct in braided tensor categories. , Fudan/Nanjing Univ., 1998.
S. Majid. Notes to ref. \[12\], [*Unpublished*]{}, 1995.
S. Majid. New quantum groups by double-bosonisation. , 47:79–90, 1997.
[^1]: Royal Society University Research Fellow and Fellow of Pembroke College, Cambridge, England.
[^2]: The coalgebra part of this reconstruction problem with $\CC=\CM^H$ was recently considered in the preprint of [@Par:rec]. The full solution (the entire braided group structure) and the fact that it was already known from [@Ma:bos] was pointed out by the author in a letter to Pareigis during his preparation of the final version of [@Par:rec].
[^3]: And does [*not*]{} require either $\CC$ or $\CV$ to be both cocomplete and rigid, see p205-206 of [@Ma:bg]. One may take for example $\CV$ cocomplete and the image of $\CC$ rigid, as explained in [@Ma:introm], again long before [@Par:rec].
|
This application is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2002-003122, filed Jan. 10, 2002, the entire contents of which are incorporated herein by reference.
1. Field of the Invention
The present invention relates to a liquid crystal display apparatus having display panels on both upper and lower surfaces.
2. Description of the Related Art
For example, as shown in FIG. 12, there is some cell phone designed such that a display portion housing 2 is pivotally attached to an operation key portion housing 1 through a shaft 3. In this case, a key operation portion 4 is formed in the area enclosed with chain lines on the opposite surface of the operation key portion housing 1 to the display portion housing 2. A liquid crystal display apparatus 5 is housed in almost the central portion inside the display portion housing 2.
The display surface of a main liquid crystal display panel 6 is exposed on the opposite surface side of the liquid crystal display apparatus to the operation key portion housing 1. As shown in FIG. 13, when the display portion housing 2 is closed with respect to the operation key portion housing 1, the display surface of a sub liquid crystal display panel 7 smaller in area than the main liquid crystal display panel 6 is exposed on the opposite side to the opposite side of the display portion housing 2 to the operation key portion housing 1.
As described above, there is some cell phone having the liquid crystal display panels 6 and 7 mounted on the two surfaces of the display portion housing 2 pivotally attached to the operation key portion housing 1 through the shaft 3. The sub liquid crystal display panel 7 is used to display the date/time, received contents, the telephone number of the sender, or the like while the display portion housing 2 is closed with respect to the operation key portion housing 1.
FIG. 14 is a sectional view of part of a conventional liquid crystal display apparatus incorporated in such a cell phone. In this liquid crystal display apparatus, the main liquid crystal display panel 6 and sub liquid crystal display panel 7 are placed to oppose each other at a predetermined distance, a main backlight 8 is placed on the opposite side of the main liquid crystal display panel 6 to the display surface side, and a sub backlight 9 is placed on the opposite side of the sub liquid crystal display panel 7 to the display surface side.
The backlights 8 and 9 are of an edge light type. Although not shown in detail, reflectors 12 and 13 are bonded on the opposite sides of these backlights to the opposite sides to the liquid crystal display panels 6 and 7 to which optical waveguides 10 and 11 correspond, and a light source (not shown) such as a fluorescent tube or light-emitting diode is placed near one end face of each of the optical waveguides 10 and 11.
The light emitted from each light source is incident on one end face of each of the optical waveguides 10 and 11. The respective incident light beams are reflected by the reflectors 12 and 13 and two-dimensionally emerge from the opposite surfaces of the optical waveguides 10 and 11 to the liquid crystal display panels 6 and 7. These emerging light beams are incident on the liquid crystal display panels 6 and 7, and image light beams corresponding to the driving operations of the liquid crystal display panels 6 and 7 emerge from the display surface sides of the liquid crystal display panels 6 and 7.
In the conventional liquid crystal display apparatus, since the dedicated backlights 8 and 9 are respectively arranged for the liquid crystal display panels 6 and 7, a large number of components are required, and the thickness of the overall apparatus is large. This leads to an increase in the thickness of the display portion housing 2 of the cell phone.
It is an object of the present invention to provide a liquid crystal display apparatus which can decrease the number of components and the thickness of the overall apparatus.
According to an aspect of the present invention, there is provided a liquid crystal display apparatus comprising a first liquid crystal display panel, a second liquid crystal display panel smaller in area than the first liquid crystal display panel, a flat backlight which has an optical waveguide and a point light source placed near one side surface portion of the optical waveguide, and is placed between the first liquid crystal display panel and the second liquid crystal display panel, and one reflecting layer which is placed at least between the flat backlight and the second liquid crystal display panel.
According to this apparatus, since liquid crystal display panels are placed on the two surfaces of one optical waveguide, the number of components can be decreased, and the thickness of the overall apparatus can be reduced.
Additional objects and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objects and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out hereinafter. |
Lucic received a five-minute major and game misconduct for the hit, which was all kinds of contentious. Rinaldo didn’t appear hurt on the play (in fact, he jumped up and tooled on Nathan Horton) and later said he didn’t think the hit was dirty.
Lucic didn’t agree with the call, saying “I felt like I made every effort to take him out laterally” and “you can see even him, his body rotating because I took him from the right side.” B’s head coach Claude Julien said much of the same, claiming that Lucic let up and Rinaldo turned at the last second.
No matter, though.
Shanahan opted to suspend Lucic anyway, and one wonders what would’ve happened if he didn’t. Looch ran afoul of the league earlier this season after charging Ryan Miller (though he ultimately avoided punishment) and holds repeat offender status thanks to a one-game suspension for crosschecking Maxim Lapierre in the face during the 2009 playoffs.
“It’s hockey, you hit and go into the boards, I don’t think it was dirty at all,” Rinaldo said. “Shoulder-to-shoulder and just momentum. He’s big guy, maybe double my weight. His momentum carried him into the boards awkwardly. I don’t think it was dirty at all.”
That’s all well and good for Rinaldo to be cool with it, but now it’s up to Brendan Shanahan to decide if he’s OK with the hit. Lucic had his meeting with Shanahan earlier this morning over the hit and we should know soon what his fate is. Boston has a game tonight against Montreal and if there’s anything that’s true in life, the Canadiens are rooting for the league to come down hard on Lucic just for the evening.
Boston forward Milan Lucic will have a phone chit-chat tomorrow with league disciplinarian Brendan Shanahan. The topic of conversation: Is there anything more the NHL can do for the Bruins?
We kid, we kid – it’s actually to discuss Lucic’s hit from behind on Philadelphia’s Zac Rinaldo during yesterday’s 6-0 Boston victory. (The other call is scheduled for Wednesday.)
At 16:21 of the second period, Lucic received a five-minute major and game misconduct after checking Ronaldo between the numbers and into the boards. At the time, the B’s were up big, 5-0, on the Flyers.
Clearly Rinaldo wasn’t injured on the play, as he was able to get up and beat the stuffing out of Nathan Horton.
“I felt like I made every effort to take him out laterally and looked at the video and slow-mo’d it and looked at the point of contact, and there were no numbers. It was all shoulders,” Lucic said. “You can see even him, his body rotating because I took him from the right side.”
B’s coach Claude Julien agreed, saying, “[Lucic] let up and a player turned at the last second. It didn’t appear to be a hit from behind.”
Lucic has been suspended before – he received a one-game ban for crosschecking Maxim Lapierre, then with Montreal, during the 2009 playoffs.
The Big Question will be a weekly feature on PHT where we ask a question, provide some background and ask you, the reader, to weigh in with your opinions.
Today’s question: How would you grade Brendan Shanahan’s job performance?
NHL disciplinarian is a tough job, something Brendan Shanahan is discovering after enjoying a brief honeymoon in the position. No longer is everyone patting him on the back for his “tough on crime” approach or for making videos that clearly explain the decision-making process. There aren’t many, if any, teams that have yet to disagree with a Shanahan ruling that either suspended a player or didn’t.
Mostly the complaints have focused on Shanahan’s consistency, or lack thereof. If this guy got this many games, why did this guy get that many games?Watch this video, now watch this one. How’s that play any different from that one?
Shanahan knows he can’t please everyone all the time, but is he pleasing enough people most of the time to deem his performance a success?
For what it’s worth, I’ve only taken issue with a handful of his verdicts.
Feel free to disagree. Those are just my takes. Yours might be different. Which is why Shanahan’s job is so tough. There are so many variables to each incident, and with each variable there’s an opportunity for people to have conflicting opinions.
Given the difficulty of the job, I’d give Shanahan a B-plus for his performance to date. How ‘bout you?
Even though the plays were similar in nature, Shanahan believed that there were significant differences that warranted a suspension for Tootoo and prevented Booth from any supplementary discipline.
“On the Booth play, he’s got the puck longer and the Calgary defenceman is right on his back and leaning on him right into the collision,” Shanahan told the Calgary Sun’s Eric Francis. “Just before impact, Booth turns his skates and is blowing snow and is trying to stop. At no point is Tootoo trying to stop. He argued that he was trying to jump. Whether it was intentional to hurt Miller or get out of the way — either way, it was the wrong decision. It made the collision worse.”
“I think with Booth he has less options because the player is leaning on his back right into the goalie.”
It wasn’t surprising that Tootoo was suspended with the cast of characters involved and the public outcry afterwards (as well as the comments of Lindy Ruff). There was no way that Miller was going to get run over in his first game back without any response from the league. But the Booth situation proved that players can still crash the net without being suspended. In the long-run, just about every skater and coach would agree that it’s the way hockey needs to be played. Goaltenders may not be so quick to agree.
What do you think fair hockey fans? Do you buy Shanahan’s explanation for suspending Jordin Tootoo while letting David Booth walk away without punishment? Let us know in the comments… |
Recollection of negative information in posttraumatic stress disorder.
The purpose of the present study was to investigate the effects of posttraumatic stress disorder (PTSD) associated with the effects of emotional valence on recall processes in recognition memory. Patients suffering from PTSD (n = 15) were compared with 15 nontraumatized patients with anxious and depressive symptoms and with 15 nontraumatized controls on the remember/know paradigm using negative, positive, and neutral words. The PTSD group remembered more negative words than the nontraumatized controls, F(1, 42) = 7.20, p = .01, but there was no difference between those with PTSD and those with anxiety or depression, F(1, 42) = 2.93, p = .09, or between the latter and controls, F(1, 42) < 1. This study did not allow us to determine whether this recollection bias for negative information was specific to the PTSD status or was triggered by the greater level of anxiety displayed in this group. |
The role of flexible endosonography in diagnostic imaging of carcinomas of the oral cavity and oropharynx.
Currently-used imaging methods often fail to depict carcinomas of the oral cavity and oropharynx properly. Scanning these tumours with recently developed digitally-guided transducers of 5 and 7.5 MHz, we found that diagnosis and assessment are significantly facilitated by flexible endosonography. The demonstration of T1- and T2-tumours was shown to be facilitated by this technique as compared to other imaging methods. The assessment of large tumours is improved in special areas. Nonetheless, we recommend that in such cases flexible endosonography be supported by CT or MRI for a complete demonstration of the extent of the tumour. |
Nonadiabatic dynamics of injected holes in conjugated polymers.
The dynamics of injected holes in short transient times that precede polaron formation is numerically studied in the framework of a tight-binding electron-phonon interacting approach aimed at describing organic one-dimensional lattices. In particular, the direct impact of internal and external factors on the conversion of injected holes into polarons is carefully investigated. The results show that a hole injected at levels lower than the highest occupied molecular orbital forms self-trapped bound structures that can merge spontaneously to form a polaron after, at least, one picosecond. On the other hand, the life-time of such structures substantially decreases (up to a few hundreds of femtoseconds) when the influence of external electric fields, temperature effects and impurities is considered. Importantly, the critical values of the aforementioned factors in promoting the quenching of the self-trapped structures are obtained. These findings may enlighten the understanding of the mechanism of charge carrier generation in Polymer Light Emitting Diodes when several kinds of excitations are present. |
“Job one for the investor, then, is to learn as best she can, to ignore the day-to-day and year-to-year speculative return in order to earn the fundamental return.” – William Bernstein
William Bernstein continues to put out thought-provoking, no-nonsense books on investing. Rational Expectations: Asset Allocation for Investing Adults is his latest and it didn’t disappoint.
I just love how straightforward Bernstein is with his approach to investing and portfolio management. No punches are pulled, no silly theories are spared.
His message always comes across as the old adage that investing can be extremely simple yet maddeningly difficult at the same time.
While he uses plenty of data to back up his claims, Bernstein also focuses on the important behavioral issues that are the real problem for most investors. In Rational Expectations, he broadly defines three groups of investors by their behavior:
Group 1: The average small investor, who does not have a coherent asset-allocation strategy and who owns a chaotic mix of mutual funds and/or individual securities, often recommended to him or her by a broker or advisor. He or she tends to buy near bull market peaks and sell near bear market troughs.
Group 2: The more sophisticated investor, who does have a reasonable-seeming asset-allocation strategy and who will buy when prices fall a bit (“buying the dips”), but who falls victim to the aircraft simulator/actual crash paradigm, loses his or her nerve, and bails when real trouble roils the markets. You may not think you belong in this group, but unless you’ve tested yourself and passed during the 2008–2009 bear market, you really can’t tell.
Group 3: Those who do have a coherent strategy and can stick to it. Three things separate this group from Group 2: first, a realistic appraisal of their true, under-fire risk tolerance; second, an allocation to risky assets low enough, or a savings rate high enough, to allow them to financially and emotionally weather a severe downturn; and third, an appreciation of market history, particularly the carnage inflicted by the 1929–1932 bear market. In other words, this elite group possesses not only patience, cash, and courage, but also the historical knowledge informing them that at several points in their investing career, all three will prove necessary. Finally, they have the foresight to plan for those eventualities.
Group 1 usually finds out the hard way that financial markets can be unforgiving. These are most likely the people that have completely given up on investing at his point after blow-ups from the tech bust or the great financial crisis. They assume the markets are rigged or function like a casino. Most people in this group try to make money through lottery ticket-style speculation. It never ends well and the psychological scars can endure for a very long time.
For the more sophisticated investors, Group 2 probably dwarfs Group 3 by a wide margin even though many would have a hard time admitting this fact. It’s easy to estimate your tolerance for risk and assume you will be able to rebalance and buy when everyone else is selling.
Unfortunately, a crash is much different than a correction and investors in this category tend to find out the hard way. This group capitulates by selling out of stocks after they have dropped by a substantial amount or ramping up their equity exposure after a large run-up in prices.
It’s easy to be a long-term investor during a bull market. Everyone’s making money and it feels like you can do no wrong. It’s when things don’t go as planned that this group loses control.
Bernstein says as much in the book when he observes, “If you began your investing journey after 2009 or haven’t yet started, then you’re an investment virgin.”
Your willingness to take risk will change much more often with the movements of the markets than your actual ability or need to take risk. Therefore a sensible long-term asset allocation is paramount to your success as an investor. Typically your broader asset allocation shouldn’t change all that much until your circumstances change (or when you need to rebalance).
It will feel like you should change your allocation weights between stocks, bonds and cash based on the most recent market performance, but most of the time it’s just performance chasing.
You can tilt your portfolio to certain sub-strategies within asset classes, but figuring out the mix between risky and safer investments is one of the keys to sticking with your investment plan.
That means you need an asset allocation that either includes investments such as high quality bonds to be able to rebalance when stocks fall or enough human capital in the form of savings that can be used to deploy at lower prices.
This is an important, often overlooked point, which Bernstein brings up in his Group 3 description that can play a huge role in determining your risk tolerance – having a high enough savings rate.
It’s not enough to say you will buy when fear is high and stock prices are low. You also have to have the necessary funds available to make purchases during times of maximum pessimism.
How you feel right now about the markets and your own portfolio probably has a lot to do with your investment stance over the past five years. If you have a healthy allocation to stocks, you feel like a genius. If you’ve been sitting in cash after selling out a few years ago you don’t feel so great.
It’s important to remember both your feelings during the crash and those in the subsequent recovery to new all-time highs. To be included in Group 3 you have to find a way to balance the emotional highs and lows to find your happy place in the middle.
Source:
Rational Expectations: Asset Allocation for Investing Adults
Further Reading:
The four abilities every investor needs to be successful |
@import "../../../../components/styles/_colors.scss";
@mixin inputDefault {
font-weight: 400;
font-size: 1rem;
color: $text-black;
letter-spacing: normal;
}
@mixin inputPlaceholder {
@include inputDefault;
color: $disabled-grey-text;
}
@mixin inputView {
@include inputDefault;
color: $text-grey;
}
.InputText {
@include inputDefault;
line-height: 1.6183rem;
&--placeholder {
@include inputPlaceholder;
}
&--view {
@include inputView;
}
}
|
Affordable Natural Face Scrub
As the weather gets cooler, skin exfoliation is specially important to prevent dullness and bring back that natural skin glow. When I ran out of my face scrub, I decided to look in my pantry and found a very simple ingredient I could use as a scrub.... Sugar in the Raw. A sugar scrub helps to brighten your skin by buffing away dried skin, sweat and dirt. Sugar cane is a great natural source of glycolic acid, an alpha hydroxy acid that's widely used in skin care products for its resurfacing properties. It helps reduce fine lines and acne by promoting cellular turnover.
I simply mix a packet of sugar in the raw with a small dab of my favorite cleanser Juice Beauty Organic Facial Wash, gently scrub my face for about a minute or so and rinse. After I rinse my skin feels incredibly smooth and fresh. It's a really amazing scrub and super-affordable! You can also use Raw Sugar mixed with Jojoba Oil (I like Dessert Essence Jojoba Oil) to scrub and beautify your body and feet. Although raw sugar in not harsh or toxic, make sure you don't over scrub. Use no more than twice a week. Try it with your favorite cleanser or mix of oil, you will love the results!
You can purchase Sugar in the Raw at www.sugarintheraw.com and in-store at Whole Foods. |
Its Manchester Derby time on Sunday as Manchester United host Manchester City at Old Trafford for their Premier League match on Sunday. Ole Gunnar Solskjaer
Its Manchester Derby time on Sunday as Manchester United host Manchester City at Old Trafford for their Premier League match on Sunday. Ole Gunnar Solskjaer seems to be very excited about the encounter given his teams recent performance.
With the sides winning alternating head-to-head encounters since 24 April 2019 when Manchester city won 2-0, it should be Pep Guardiola going home with a smile if they follow the same pattern.
Not having lost any of their previous nine encounters in all competitions, of which three of those were draws, Manchester United are in great form to break the pattern and come out with a win in Sunday’s Derby.
HAVE YOU READ!!?? Premier League Matched Could Be Played Behind Closed Doors
Red Devils manager Ole Gunnar Solskjaer for one seems to be very excited at the prospect of winning the derby for the second time in a row, especially given his teams current form and the addition of Odion Ighalo.
Manchester City are also in superb form having only lost one of their ten games since the Derby, as well as walking away with the Carabao Cup.
“They will feel confident. They have hit form, they are playing well. They have just been to the Bernabeu, winning there as well, and won the cup final.” Solskjaer went on to say, adding:
“So I am sure they will play their game, we will play our game, and hopefully it will be a good one. Let’s hope it will be a 4-3, like we have seen before. There have been many classics. We will do what we can to make it a classic.”
Ole is also counting on his secret weapon, Odion Ighalo who he unleashed against Derby in the FA Cup game on Thursday, and who helped the club move on through to the quarter-finals with an impressive 2 goals, giving United a 0-3 win.
HAVE YOU READ!!?? Odion Ighalo To Debut When Manchester United Take On Chelsea
Ighalo who came in as a last-minute signing during the winter transfer window has scored 3 goals in his two appearances for the club.
Ole has been more than impressed by the Nigerian Internationals performance so far going on to say:
“He is doing what it says on the tin and what we asked for when we signed him,”
Harry Maguire is still not certain to recover in time for the Derby but updates on his condition will be given as the matchday approaches at Old Trafford this Sunday.
The Red Devils are currently tied on 42 points with Wolves, only leading them on goal difference as they sit in 5th position on the Premier League table. |
Nicotine withdrawal and reward responsivity in a card-sorting task.
Animal studies have demonstrated decreased reward responsivity during nicotine withdrawal (e.g., Epping-Jordan et al., Nature 393:76-79, 1998) and the Card Arranging Reward Responsivity Objective Test (CARROT) has recently been used to study the effect of nicotine withdrawal on reward responsivity in humans (e.g., Al-Adawi and Powell, Addiction 92:1773-1782, 1997; Powell et al., Biol Psychiatry 51:151-163, 2002). We investigated a suggestion that nicotine withdrawal may have additional reward-related effects apart from the reward responsivity effects already observed. The objective of this study was to determine whether or not nicotine withdrawal results in slower improvements in performance on a card-sorting task over a series of trials. We carried out two experiments using a modified version of the CARROT, the mCARROT, to compare the performance of human participants in nicotine withdrawal with those who were satiated. Although withdrawal produced no direct effect on the mCARROT measure of reward responsivity, the overall sorting rate was lower, and the increase in sorting rate across successive trials was slower during nicotine withdrawal than during satiation. These data indicate that nicotine withdrawal impacted on task performance independently of the introduction of a performance contingent reward, suggesting a novel reward-related effect of nicotine withdrawal. |
/**
* Main NUI object.
* @class nui
* @static
*/
/*jshint unused: true*/
var nui = (function(){
var components = [],
uid = 0;
return {
guid: function() {
return "nui" + (uid++);
},
add: function(type, creator) {
components[type] = creator(this);
},
init: function() {
var nodes = this.dom.selectAll("[data-nui-type], [data-nui-action]");
nui.util.forEach(nodes, function(node) {
var type = node.getAttribute("data-nui-type"),
action = node.getAttribute("data-nui-action"),
actionParts,
component;
if (type) {
component = components[type];
if (!component || !component.initType) {
throw new Error("Unknown type: " + type);
}
component.initType(node);
// listen for each event the component needs
nui.util.forEach(component.events, function(eventName) {
nui.event.on(node, eventName, function(event) {
component["on" + eventName](event, node);
});
});
} else if (action) {
// TODO
actionParts = action.split("-");
components[actionParts[0]].initAction(node, actionParts[1]);
}
});
}
};
}());
|
Acura For Sale in Twentymile Bend, Fl
Are you interested in getting the best deal possible on a new Twentymile Bend in Volvo? If this is of interest to you we would like you to show you the steps on how to do so. Everyone who has ever purchase a new car knows how difficult it can be to get the right price.. However, this is not the case with CarsDealerNet.Com. On our website we make it easy to get the best price on a new vehicle.
At CarsDealerNet.Com you the client is in command. Our automated search engine technology will search through several dealerships for the hybrid you choose. If we find a match, we will show you a list of dealerships in Twentymile Bend with available inventory on the car of your choosing. After that get all the dealerships in Twentymile Bend to compete for your business without disclosing your name, address, phone number, and or e-mail address. This technique is not only the revolutionary but also a proven way of getting the best price and the largest rebate available every time.
Who Has The Best Car Deals & Incentives in Twentymile Bend?
It is without a doubt that the best car deals and incentives are found on the Internet. That is why that we build CarsDealerNet.Com. We knew that by implementing technology and a custom search engine we would revolutionize the car buying experience. Not only that but also get our members the best deal possible on the vehicle of their choice. Did we also mentioned that our service is free! So what are you waiting for? Get the best new car deal in the largest rebate of any hybrid you choose.
Buying A New Car Without Getting Ripped Off!
In today's economy many people are laid off from their jobs and are allowed to collect unemployment while they will look for new work. Unemployment benefits are temporary and cannot be considered for long-term income when a lender is considering loaning you money.
However, you may have the potential to qualify for a loan when you're collecting unemployment, if you have good credit to start with. Each individual and their circumstances are different. If you have another source of income and losing your job and collecting benefits is not a hardship or burden. Then you may be considered for a new car loan.
A person can only collect unemployment benefits for a maximum of 99 weeks, as of January 2011. Therefore unemployment cannot be considered as a reliable source of income, and may hamper your efforts in getting a car loan. Car loans today, generally have payments that last anywhere from 3 to 5 years; the majority of lenders will not grant a loan based on someone's temporary unemployment benefits.
To get approved for a car loan, an individual must prove to a lender that he or she is financially capable of paying back the loan. If your unemployment is the only income you have to live on then chances are you can't afford a car payment.
Even subprime lenders or high risk lenders, that generally loan to people with poor or bad credit, are very unlikely to grant a car loan based on someone's unemployment benefits.
You may find a car dealer who was willing to put this type of loan together for an outrageous interest rate and down payment. The dealer may sell you a car that is way overpriced, with a large down payment, and an interest rate that could exceed 25 percent. This type of deal only benefits the dealer and not you the buyer.
Even if the dealer has to repossess your vehicle in a few months, they don't care because they will just turn around and sell the car again to someone else in a similar situation.
If you are in dire need of a car and can't qualify because of your unemployment benefits, you may want to consider a home equity loan, or an existing line of credit. It is not always wise to use a home equity line of credit. These type of loans can lead to excessive debt if used unwisely and cause you future problems financially.
If you absolutely must have a car then buy one for cash ($2,000 or less) to get you by until you start your new job. That way you won't be adding debt to your financial situation while looking for another job.
Finance For Buying A New Car
In today's economy many people are laid off from their jobs and are allowed to collect unemployment while they will look for new work. Unemployment benefits are temporary and cannot be considered for long-term income when a lender is considering loaning you money.
However, you may have the potential to qualify for a loan when you're collecting unemployment, if you have good credit to start with. Each individual and their circumstances are different. If you have another source of income and losing your job and collecting benefits is not a hardship or burden. Then you may be considered for a new car loan.
A person can only collect unemployment benefits for a maximum of 99 weeks, as of January 2011. Therefore unemployment cannot be considered as a reliable source of income, and may hamper your efforts in getting a car loan. Car loans today, generally have payments that last anywhere from 3 to 5 years; the majority of lenders will not grant a loan based on someone's temporary unemployment benefits.
To get approved for a car loan, an individual must prove to a lender that he or she is financially capable of paying back the loan. If your unemployment is the only income you have to live on then chances are you can't afford a car payment.
Even subprime lenders or high risk lenders, that generally loan to people with poor or bad credit, are very unlikely to grant a car loan based on someone's unemployment benefits.
You may find a car dealer who was willing to put this type of loan together for an outrageous interest rate and down payment. The dealer may sell you a car that is way overpriced, with a large down payment, and an interest rate that could exceed 25 percent. This type of deal only benefits the dealer and not you the buyer.
Even if the dealer has to repossess your vehicle in a few months, they don't care because they will just turn around and sell the car again to someone else in a similar situation.
If you are in dire need of a car and can't qualify because of your unemployment benefits, you may want to consider a home equity loan, or an existing line of credit. It is not always wise to use a home equity line of credit. These type of loans can lead to excessive debt if used unwisely and cause you future problems financially.
If you absolutely must have a car then buy one for cash ($2,000 or less) to get you by until you start your new job. That way you won't be adding debt to your financial situation while looking for another job. |
// Application-level settings for the Runner target.
//
// This may be replaced with something auto-generated from metadata (e.g., pubspec.yaml) in the
// future. If not, the values below would default to using the project name when this becomes a
// 'flutter create' template.
// The application's name. By default this is also the title of the Flutter window.
PRODUCT_NAME = example
// The application's bundle identifier
PRODUCT_BUNDLE_IDENTIFIER = com.example.example
// The copyright displayed in application information
PRODUCT_COPYRIGHT = Copyright © 2020 com.example. All rights reserved.
|
Blind Boy Sees the Light
Ujesh was surrounded by reasons that he should not be blind. He had grown up in a village in Jammu & Kashmir, India, where thousands of pilgrims came to worship a goddess revered in his religion—a goddess believed to provide blessings and contentment. Beyond this, his father, Sojin, was a government doctor with many friends in the profession. When Ujesh lost his sight at the age of 15, many of these doctors did their best to help him, but it was fruitless.
Ujesh had little hope until, one day, a young man told his father about Gospel for Asia missionary Khamal. When Sojin brought Khamal to his home, however, a conflict sprung up.
Sojin and Ujesh learned about the Lord at a GFA-related church like this one.
“We do not want Christian prayer in our home!” Ujesh’s mother and siblings shouted. But Sojin had listened to Khamal’s message and believed in Jesus. He started faithfully attending Khamal’s church services.
Soon, Ujesh joined his father in going to church. But at the beginning, he scoffed at the Christians’ service. Still blind, he only went to please his father.
But Sojin’s faith in Christ was strong and real. He kept praying and believing, and the Lord miraculously restored Ujesh’s eyesight even before the young man believed in Him. The miracle literally opened Ujesh’s eyes, and he finally saw that Jesus was the one true God.
Pastor Khamal asks for prayer for Ujesh, who is now enrolled in a GFA Bible college. Pray also that the rest of his family will decide to follow Jesus.
This article was originally published by Gospel for Asia. To learn more about Gospel for Asia, click here. |
Collaborative Remembering in Conversational Narration.
This chapter introduces an epistemic perspective on narration and illustrates, based on data from storytelling in free natural conversation, how collaborative remembering can instantiate distributed cognition: first, when tellers deploy expressions of forgetfulness or explicitly enlist the aid of other participants; second, during various forms of collaborative turn sequencing with rapid speaker shift and a high degree of overlap; third, when conversational participants cooperate to produce a mosaic-like narrative consisting of their partially separate perspectives and contributions; and fourth, when they weave their voices into a single narrative thread in a Goffmanian team performance. |
Physical activity and mortality in frail, community-living elderly patients.
The authors describe the prevalence of moderate-intensity physical activity in a population of older persons living in the community. In addition, they explore the relationship between physical activity and mortality. In this longitudinal observational study, the authors analyzed data from patients admitted to home care programs collected as part of the Italian Silver Network Home Care project. Twelve home health agencies participated in the project, which evaluated the implementation of the Minimum Data Set for Home Care (MDS-HC) instrument. A total of 2757 patients were enrolled in the current study. The primary outcome measures were the prevalence of 2 or more hours per week of physical activity and survival. Fewer than 20% of patients had regular physical activity. During a median follow-up period of 10 months from the initial MDS-HC assessment, 442 (16%) patients died. After adjusting for sex, physical and cognitive disability, and all potential risk factors for death, active patients were less likely to die compared with those with no or very low-intensity physical activity (relative risk ratio [RR], 0.51; 95% confidence interval [CI], 0.35-0.73). This inverse relationship was also significant in patients aged 80 years and older (RR 0.55; 95% CI, 0.32-0.95). Physical activity is associated with a significantly lower risk of all-cause mortality. The current findings support the possibility that moderate-intensity physical activity has an independent effect on survival even among frail and old persons. |
Immortalization in culture: occurrence at a late stage in the progression of breast cancer.
The properties in culture of 3 breast cancer effusion metastases, obtained over approximately 2 years from the same patient, were examined. Despite repeated attempts with cryopreserved cells, only the last specimen reproducibly exhibited immortality in culture; the first 2 specimens grew initially but failed to develop into cell lines. Each specimen was unique in morphology and growth properties, although karyotypic markers indicated a common origin. Aberrations of chromosomes 1 and 11 marked these near-diploid cells, and further structural alterations of chromosome 11 accompanied the transition of biological properties observed in the third specimen. |
Burnett Tyson
Mesothelioma lawsuits seem to be becoming more and much more common as the illness and its causes turn into far more properly-recognized. In case people choose to dig up further about eligibility for xarelto lawsuit, there are millions of resources you should pursue. You might have noticed commercials for attorneys advertising their services in this specialized region. Due to the truth that decades can pass just before the illness rears its ugly head, it has turn into apparent that the businesses responsible for exposing their workers to asbestos so a lot of years ago might no longer be in company. If you have an opinion about English, you will likely require to compare about asset seizure. But there is something you can do.
Mesothelioma, frequently known as Asbestos Cancer, is a rare type of cancer that is most often known to happen when the impacted particular person has come in speak to with asbestos and inhaled its particles. Arriva Medicare Fraud On Line contains new information about the reason for this concept. It does, nonetheless, emerge in some people without having ever getting created get in touch with with asbestos and happens a lot more in guys than girls, but can impact each genders. The name Mesothelioma is derived from mesothelium, which is the membrane that covers and protects most of the internal organs of the body. When cancer cells are active in the mesothelium, that membrane begins to deteriorate and the cancer can continue spreading to other parts of the physique.
Throughout the 1940s, millions of Americans had been exposed to asbestos, but at that time, the dangers had been not recognized. The signs and symptoms of Mesothelioma numerous times do not appear for up to 30 to 50 years after exposure. Based on your age, you might have relatives who have unfortunately, contracted this disease although working with asbestos or simply from being exposed to it in other methods.
If you or an individual you know or are associated to have been diagnosed with Mesothelioma, there are actions you can take to acquire compensation. If you think you know anything, you will likely require to research about getting seized money ba |
Commander Suds
Wednesday, May 25, 2011
Today I spent the entire day drinking. I had to! With dozens of new beers and new breweries hitting the Atlanta market every week, I'm getting shamefully behind. I've let you all down, I'm so sorry. Some Commander of Suds I turned out to be. As Terrapin's Side Project #15 is already well established on the beer store shelves in Georgia, I better get crackin' on the one prior, which has been silently languishing in the mini fridge. Let's see, ah yes, it's Tomfoolery, dubbed a "Black Saison". So, the saisons are getting the black treatment now? Well, OK, anything to break up the endless torrent of "Black IPA's", I suppose.
Cue the bottle info blurb, Meemo:
"Tomfoolery “Black Saison” is the latest addition to our Side Project series of beers. Number 14 on the list, this ale boasts an uncharacteristic black color for a traditional Saison, but is just untraditional enough for our experimental mentality.
Made with a silly amount of rye, wheat and black malts, this dark spicy beverage will quench the thirst of any court jester in the land. We hope you enjoy our light hearted attempt at making this traditional style with foolish brewing behavior.
Spike’s Brewing Words of Wisdom: Beer is serious business…what you do after consumption often times is not."
Ah, Terrapin, is it possible to find their brewing antics anything but 100-percent amusing?
One of the revered Ghosts of Side Projects Past is the Maggie's Farmhouse Ale. Now, seven side projects and nearly two years later, Terrapin is revisiting the style and yeast strain, though by no means in a traditional manner. Half a bottle in, the main impression is that of a cool mulled wine with faint roasty, chocolate-hinting elements, a touch of banana, and a remote lactic twang to it.
For me, the very best of the saisons are ones that are supremely quenching and refreshing. This one is not, though I'm sure that this experiment was never Terrapin's aim. Thankfully though, the malts and sweetness are not overburdening, the booze isn't overly noticeable, and the body is light enough to at least keep it from being unrefreshing.
Wednesday, May 11, 2011
This past week I had the singular pleasure of interviewing the man dubbed the Beer Sommelier. Even casual craft beer drinkers are likely familiar with the man, better known to his friends simply as Matt. Check out a recent clip from NBC's TODAY show, he's there. Turn the dial to NPR, he's there, too. Casually flip open the latest issue of Hooters Magazine, and, in between the busty beauties, you'll find him offering up the latest beer talk. He's what Justin Bieber is to young teenage girls, we beer folks just can't seem to get enough of the Beer Sommelier.
Matt and me, we go way back. Why, back then we were just a couple of plucky young beer aficionados working our way through the exhaustive beer courses in preparation for taking the BJCP exam. I fondly recall those days. Now, he's an internationally recognized beer expert, and I'm a guy quietly drinking beers with his girlfriend's cat.
The Beer Sommelier, who has been cellaring beer for many years, will pull a carefully chilled IPA from an adjacent, heat-shielded cellar designed solely to house his collection of hop-based brews. Whether the occasion calls for a hearty barrel-aged barleywine or a fiercely robust imperial stout, there are limitless options to be found within in his truly inspiring stockpile.
Positioned nearly three stories underground in the Cobb County countryside, the beer cellar of Matt Simpson is something to see to believe. Upon arriving, I was given a standard waiver to sign and issued a pass, which was to remain affixed to my shirt at all times. "We don't want a repeat of the Christopher Gadgebrook incident," he said in a solemnly, almost penitent tone.
With a quick 3/4 twist of the nearby wall sconce, a secret passage was revealed, and with the grinding of unseen mechanical wheels and a painfully loud hiss of steam, the door opened. "Enter, if you dare." I don't recall Matt ever having such a penchant for melodrama. I was informed the mood-setting fog machine was temporarily out of order. That's fine, as they make me cough endlessly. We walked down a flight of stairs, then another, and another, where we finally arrived at a door kept safe by a variety of security measures. After checking to ensure I wasn't watching too closely, he entered the multi-digit code and the door to the cellar slowly slid open.
Meemo navigating one of the many bottle-lined passageways of the Beer Sommelier's cellar.
=======
What goes into planning a beer cellar?
"First, you need sufficient space. Second, it needs to be climate controlled, relatively speaking, or at least in a stable, cool, dry, dark area of your home. After you have the actual space, you need to think about shelving. I got mine relatively inexpensively from IKEA. You know, they're pretty as well, but they don't need to be pretty. Then, you'll need a lock and key to protect it from all the people who are going to want to steal your amazing stash."
What is the oldest beer in your vast collection?
"The oldest beer, officially, by vintage, would be the 1986 J.W. Lees Harvest Ale. I currently have two bottles. I also have a 1988 Hurlimann Samichlaus Brown."
What would you consider your greatest acquisition?
"I really couldn't say, Commander Suds, since the word "great" is so subjective. What does "great" mean, by one's preference, monetary value, or rarity? [heavy sigh] I have a few very cool bottles I'm waiting to sample, such as a Southampton Double Ice Bock, a big jeroboam of Roots Epic Ale, various barrel-aged AleSmith beers, or the Stone Vertical Epic 02.02.02."
When did you decide to take on the mantle of The Beer Sommelier?
"I did a lot of other things, I had an actual career in television broadcasting and high-end video production. I once interviewed Henry Kissinger. I've produced and directed, and was, for a time, an associate producer for Food Network.
It was all wonderful work, when I could get it. After 9/11, the advertising dollars simply went right out the window, so they let two of us go. So, I just sort of gave up after that, I'd had it, I'd was so tired of constantly looking for work. I took those cultivated skills into some other things, and I hated those other things so desperately that I decided to start my own business doing something I really love, and that's when I created the Beer Sommelier. That was around 2006 or 2007, so around four years ago."
Is it hard being The Beer Sommelier?
"Every business is hard. Owning a business is really hard. It needs constant attention, every aspect about the business needs constant attention. As things get slow, you need to figure out new ways to steam revenue. You need to think of new ways to constantly to keep what you're doing fresh and in the public eye, creating public awareness, and coming up with new concepts if the old ones aren't working.
So, yeah, it's really hard. As monetary times get tighter in the country, services like mine, which most would consider a novelty, are the first to go out the window. When I find that my event hosting services aren't doing as well, because people aren't paying good money to have fun educational events, I need to concentrate on other gainful avenues like writing, business consultation, or peripheral services such as Beer 101 classes, homebrewing classes, and creating the Beer Expert app, which helps to bring the business along. The rest is just getting your name out there. You can be the best at what you do, but if no one knows you exist then there's really no point."
How do you keep up to date with your beer knowledge?
"I was going to say "pretty much everything is online these day" but that's not necessarily true. I do get a lot of my knowledge from surfing RateBeer each day. I'll see what the new trends are, what the prevailing attitudes towards the beer industry are, and what the new craft beers hitting the market are. I subscribe to just about every beer list throughout the country. I also receive many of today's better beer magazines and read those, such as Beer Connoisseur and All About Beer. I attend whenever there's a BJCP refresher course or special event, for instance, Owen Ogletree recently hosted an extremely informative cask ale seminar. Not only did we learn an incredible amount all about cask ales from Atlanta's own cask master, the guy really knows his stuff, but we had a great time, too."
What is your guilty beer pleasure? What're you greedily sippin' on when nobody else is around?
"I like a really good malt liquor. Seriously. I know people think that's an oxymoron, good malt liquor, but they're out there, and I think the one's that are well-rounded and a little on the rich and sweet side while still having a good kick and taste of good ole American corn. It's all about going into it with the right attitude. I believe every beer serves a purpose and there are no bad beers, except the one's that are truly flawed by infections, diacetyl, acetaldyhyde, etc. You know, the one's with some real sanitation issues. Otherwise, there's a time and a place for every beer."
What is your favorite brewery today?
"I'm going to preface this by saying that everyone should, "think global, drink local". Go with your local breweries for many reasons: They promote small business and keep money within your own town. The beer doesn't take nearly as long to get to its final destination, so it stays nice and fresh, and it's greener, with less of a loss of fuel for shipping. That said, I really love Lagunitas, and I've loved Lagunitas for over a decade now. They've managed to create consistently incredible craft beers while maintaining a really reasonable price point. They don't make a bad beer. So, if I had to choose one American brewery, I would say Lagunitas. Locally, here in Atlanta, I enjoy Jailhouse, as well as Terrapin and Sweetwater, especially Sweetwater for their Dank Tank one-off beers that are usually really tasty, high-gravity, and also relatively inexpensive. There are a lot of good up-and-coming breweries as well, such as Cigar City and Pretty Things."
Will you give us your Li'l Smokies recipe?
...
The very idea that I asked this question was met with scorn, and then, I was promptly shown the door.
You may very well be amazed by the size of Matt Simpson's beer cellar and all the things to see and do and drink. It's widely suggested to allow a full two days to see the entirety of the beer storage facilities. Remember to wear comfortable shoes ideal for walking and bring layers appropriate to ward off the cool cellar temperatures. Thankfully, parking is free to guests, with regular shuttles to and from the residence.
All requests to tour the beer cellar must be approved solely by Matt Simpson. A copy of your request will be returned with an approval or reason for denial. It typically takes 5 business days to process a tour request.
Thursday, March 31, 2011
Another day, another beer left outside my front door. SweetWater's Exodus Porter, sitting silently on my door mat. The return of my mysterious benefactor or the beer equivalent of "spring cleaning", we may never know, but, hey, it's free booze, so I don't really care.
So, I'll sit here at the apartment drinking beer all day, without actually getting anything else done. Look's like my Thursday is booked solid. Just another day being a miscreant souse.
Like a wasted, homeless veteran, Exodus Porter graciously received several medals for proudly doing its duty, and then was discharged and left homeless, to live on the streets of downtown Atlanta, begging for money, unable to reintegrated into the community. A sad story, and one that's happened more than once in the craft beer world, but there's a happy ending. While the poor Israelites wandered the desert for forty years, SweetWater's Exodus managed to find its way back to store shelves in less than four, returning to the brewery's Tackle Box variety pack as well as showing up on draught at the brewery.
It's not always easy, being flavorful and relatively light. The beer does a fair job of pulling it off. Unsweetened cocoa powder with sweet caramel punctuated by a modest roastiness, while earthy, citrusy hops deliver a decent portion of bitterness. It's American, it's a porter, and for that, it's good.
What will the future bring for Exodus Porter, perhaps it will finally return to being a proud year-round release, what with SweetWater's new expansion plans. Calls and emails made to the brewery were not returned by press time.
On more than one occasion readers have expressed interest in introducing a grading scale for the beers covered by this particular asshole. Thank you, readers. Your ideas are sound and I've made the suggested modifications. So, for today's beer, let's unveil the new grading system: Salacious Pussycats.
Thursday, March 17, 2011
CommanderSuds, another asshole with a beer blog here, and today's entry is about SweetWater's latest installment to the Dank Tank series, Mean Joe Bean Imperial Porter.
Several studies in recent years have shown that there's more to a cup of coffee than just a morningtime burst of caffeine, like, real, palpable medical benefits. Now, recent findings suggest beer is a veritable 'boon' to your health as well. I know I need a pot of coffee in the morning to get me going and a six-pack at night to wind me down, so I'm definitely getting plenty of both. I'm sure many of you are the same way. Hey, let's get a quick rundown on those health perks, shall we?
That's wonderful news! Without adequately reading the hastily Googled articles, cherry picking "facts" to suit my blog entry, and altogether ignoring those pesky potential health risks, you would've naturally come to the same conclusions, too. Why, I feel healthier already! I don't need no damn Jiminy Cricket to tell me I'm gonna live to be a hundred and three.
Mean Joe Bean is part of SweetWater's Dank Tank series of limited, experimental beers, in much the same way Tröegs has their Scratch beers and Terrapin's got their Side Project series, and, like any limited release beer series, its had its share of ups and downs. Usually more ups than downs, but whaddya gonna do, you know?
Imperial Porter has recently been embraced by American brewers and their never-ending love of cranking up every single beer style to 11. So, one can expect higher degrees of dark-roasted malted barley, occasionally heavier charges of hops, and always, always more of your precious alcohol. Just more of everything, really. Oh, and let's not forget this particular Imperial Porter features a generous dose of Nicaraguan coffee provided by JavaVino Coffee & Wine House in Atlanta. So, we'll be getting all those added health benefits mentioned above. This beer is turning out to be a regular health tonic.
Coffee-infused beers aren't quite as ubiquitous as the cash-for-gold sign twirlers on every street corner, but they are certainly more commonplace than they were just a few years ago. During a trip to the local beer store, one can expect to find such java brews as Surly's Coffee Bender, Brooklyn Brewery's Intensified Coffee Stout, Founders Breakfast Stout, Terrapin Wake 'N' Bake, or Peak Organic Espresso Amber Ale, depending on whereabouts in the U.S. you live, of course.
In trying to select proper glassware in which to serve this brew, I opted for a decade's old McDonald's Garfield mug, to better facilitate its coffee component. Sissy Cat approved.
Running parallel to the aroma is an initial taste of sweet roastiness, imparted by the dark-kilned malts as well as the added java. There's a noticed chocolate note to it, ranging at times from sugary bulk Easter chocolate to a slightly-more-refined bittersweet chocolate flavor. Fuggle and Columbus hops add a light undertone of citrus and herbaceous, as well as a solid, though agreeable amount of bitterness. The 8.5% alcohol remains fairly masked during the undertaking. Fairly balanced throughout, this supposed Mean Joe is actually a pretty genial guy.
Monday, March 7, 2011
One moment you're walking up to your front door, arms filled with groceries and beer; the next you're trampling on a very belated Christmas present left on your front stoop. What a way to start the afternoon -- I love mystery gifts!
Upon opening the festive-looking package, I was greeted with a carefully packed bomber of beer. On the top of a layer of styrofoam peanuts was a single, lone bottle of beer. Frosted Frog Christmas Ale from Hoppin' Frog Brewery. No tag, no note, no nothing. A mysterious benefactor or a simple case of a re-gifted beer, we may never know. Either way, it was a surprise, to be sure.
Hoppin' Frog Brewery is located in Akron, Ohio and is headed by Brewmaster Fred Karm (formerly of Thirsty Dog). The brewery, which specializes in pricey 22-ounce bottles, has a keen focus on hops, with a whole range of IPAs, though their oatmeal imperial stout, B.O.R.I.S. the Crusher, is also a notable stand-out. This will be my first encounter with their winter warmer.
When it comes to purchasing seasonal wintertime beers there are more than a few possibilities one must consider. It is, after all, less a loosely defined style and more a cheeky conglomeration of beers released in the winter months. There really are no hard-and-fast rules with these brews. Sometimes, it simply calls for an ale with boosted flavor, be it heaps more malt or, occasionally, hops, sometimes added spices or fruits are called for, and consistently featuring boosted levels of alcohol. Generally, one can simply look for the labels featuring winter snowscapes, traditional Christmas themes, and company mascots wearing little Santa caps. Winter Warmers, however they may ultimately taste, can provide hours of endless enjoyment during the long, cold winter nights, and, for the last minute Christmas shopper, a bottle of beer makes for a wonderful stocking stuffer!
Some breweries ask themselves, "How much spice do we need?" Here's the problem with that line of thinking: many beer drinkers are left considering the list of purported spices to be marvelous works of fiction. Hoppin' Frog simply asked, "How much spice can these assholes handle?" The spice character here is bolder and more in-your-face then the vast majority of wintertime brews, and subtlety is all but forgotten. Were the FDA to regulate ginger, nutmeg, and cinnamon, I'm sure I'd easily meet the recommended daily intake of Christmastime.
Half a bottle in, I began crying softly. Hot, stinging, even stinking tears quietly rolled down my rosacea-riddled cheeks, causing me to blink erratically and soiling my good t-shirt. My girlfriend quickly noted wafting scents of cinnamon and nutmeg on the air, creating a magical experience, like a second Christmas based in early March. Soon, even the cat was licking my face, eager to get a little tongue's taste of kitty-time Christmas.
Frosted Frog is simply an 8.6% ABV delivery of powderized spices, delivering a serious punt to the gingersnaps from the very first sip. If for a single second you begin to question your liking of cinnamon, nutmeg, and ginger, then this beer is simply not for you. I'm sorry, but it isn't.
Tuesday, March 1, 2011
I'm being constantly reminded I could make far, far better use of my time. Also, I've received increasingly alarmed comments centered around my voracious drinking habits. Thinking on these two, I began to ask myself: Why not start a beer blog? After all, everyone else is doing it. I say, what better way to spend one's time and effort than in the hedonistic pursuit of self-gratifying beer-based pleasure? Even if the internet is simply choked with beer blogs, most quite boring, and has been for years. So, here I am, yet another uninformed asshole writing about beer, coming out of nowhere, like an angrily thrown bag of urine!
While others of my generation are busy getting married, having kids, and buying homes, I'm content sitting in the colorful glow of early-February Christmas lights drinking quality beers while my girlfriend's cat rudely bats things off the kitchen counter. They're sweating it out over mortgage payments and their kids' college funds. Me, I'm staring down a receipt for a 500ml bottle of North Coast's Old Stock Ale Cellar Reserve ($21.99).
Sadly, I don't have any innate writing skills, never have. I doubt I'll be able to force any rich, satisfying, interactive content out on the order of once per day. How does once per week sound? I suppose I could fill the gaps with stray pictures or maybe upload an occasional video or two. People like videos these days. Probably, it'll boil down to me making shit up off the top of my head. I'll give it some thought.
But for now, let me get back to my beers and we'll get this journey started shortly. |
WeFi Symbian App
If you’re tired of clicking around trying different Wi-Fi connections to find one that works – You want WeFi.
WeFi is software loaded onto your laptop or mobile device. It automatically detects and qualifies all Wi-Fi access points within range and connects you to the spot with the best Internet connection. If the WeFi software detects a new access point, it allows you to be the first to map it. WeFi also provides you with Instant-Messaging tools, allowing you to create a buddy list, and to see where your friends are currently connected.
WeFi is community driven – each person using WeFi plays a part in growing the network. It will not take much to create a global network of FREE Wi-Fi connectivity. And when we do, we all get to enjoy using the internet whenever and wherever we want! So tell a friend – tell them all – and help map the world. |
frompyDatalogimportpyDatalogimporttimepyDatalog.create_atoms('N,X0,X1,X2,X3,X4,X5,X6,X7')pyDatalog.create_atoms('ok,queens0,queens1,queens2,queens3,queens4,queens5,queens6,queens7')# when is it ok to have a queen in row X1 and another in row X2, separated by N columns# this is memoized !#ok(X1, N, X2) <= (X1!=X2) & (X1!= X2+N) & (X1!=X2-N)@pyDatalog.predicate()defok3(X1,N,X2):if(X1.id!=X2.id)and(X1.id!=X2.id+N.id)and(X1.id!=X2.id-N.id):yield(X1.id,N.id,X2.id)queens0(X0)<=(X0._in(range(8)))queens1(X0,X1)<=queens0(X0)&queens0(X1)&ok(X1,1,X0)queens2(X0,X1,X2)<=queens1(X0,X1)&queens1(X1,X2)&ok(X0,2,X2)queens3(X0,X1,X2,X3)<=queens2(X0,X1,X2)&queens2(X1,X2,X3)&ok(X0,3,X3)queens4(X0,X1,X2,X3,X4)<=queens3(X0,X1,X2,X3)&queens3(X1,X2,X3,X4)&ok(X0,4,X4)queens5(X0,X1,X2,X3,X4,X5)<=queens4(X0,X1,X2,X3,X4)&queens4(X1,X2,X3,X4,X5)&ok(X0,5,X5)queens6(X0,X1,X2,X3,X4,X5,X6)<=queens5(X0,X1,X2,X3,X4,X5)&queens5(X1,X2,X3,X4,X5,X6)&ok(X0,6,X6)queens7(X0,X1,X2,X3,X4,X5,X6,X7)<=queens6(X0,X1,X2,X3,X4,X5,X6)&queens6(X1,X2,X3,X4,X5,X6,X7)&ok(X0,7,X7)# counting is 0-based, so this is actually the 8-queens solutionstart_time=time.time()print(queens7(X0,X1,X2,X3,X4,X5,X6,X7))print("First datalog run in %f seconds"%(time.time()-start_time))start=time.time()foriinrange(100):# there is a warm-up period for the JIT --> let's compute it againstart_time=time.time()datalog_count=len(queens7(X0,X1,X2,X3,X4,X5,X6,X7))datalog_time=(time.time()-start_time)print(datalog_time)print("Average : %s"%((time.time()-start)/100))# pure python solution found on http://rosettacode.org/wiki/N-Queens#Python, for comparison purposesfromitertoolsimportpermutationsn=8cols=range(n)defqueens():forvecinpermutations(cols):ifn==len(set(vec[i]+iforiincols)) \
==len(set(vec[i]-iforiincols)):#print ( vec )passstart_time=time.time()queens()python_time=time.time()-start_timeprint("%i solutions by datalog in %f seconds"%(datalog_count,datalog_time))print("python : %f seconds"%python_time)# results with pypy 1.9 on Intel Core i7-2820 QM CPU @ 2.3 GHz (run from Command prompt):# 0.17..0.24 sec for Datalog# 0.11 sec for python |
Given the importance of Islam and Muslims in Malaysia, it is only right for a think tank funded with state fund to organise intellectual discourse on this topic alongside others. We categorically reject any suggestions to side-line or “leave out” Islam and Muslims in our programmes because Islam and Muslim are an integral part of Penang. Historically, Penang played an important role in the transformation of Islamic thoughts as a key base of the Kaum Muda. Just like the Penang State Government’s generous fiscal support for Islamic and Muslim institutions, Penang Institute’s programmes on Islam and Muslims are part of the state’s commitment of an inclusive Penang.
Unsurprisingly, we have been attacked by some quarters for supporting and promoting intellectual discourses on Islam and Muslims. For all who are concerned, let us offer an analysis of charges and allegations against us. We are attacked for three reasons.
First, we feature Islam and Muslims from a universal rather than sectarian angle. We categorically reject the antagonistic or segregationist world views that Muslims and non-Muslims live in separate worlds that at best Muslims should be protected by segregation and at worst Muslims and non-Muslims have to engage each other in bitter and zero-sum competitions.
Second, we believe in reason instead of dogmatism. We seek essences rather than forms. Hence, we organise forums on Maqasid Syariah, the higher purposes of Syariah. We believe Muslims’ quest for a more religious way of life and the universal ideals of democracy, human rights and rule of law can converge if we focus on essences instead of forms.
Third, we believe in diversity and personal choices. Hence, we seek dialogues instead of monologues. We never pretend that we have any monopoly or unquestionable authority of knowledge on any matter. Rather, we seek to understand more, ask relevant questions and are prepared to be corrected on any matter we study. If we are seen to have asked too many questions and sought various answers, that is because we have to be humble and inquisitive. That attitude is in fact what every research institute should and must have.
Do all these make Penang Institute “liberal”? Let us unpack the word “liberalism” and some quarters’ ideological holy war against it.
First and foremost, we must allow all ideologies and discourses to be articulated, scrutinised and challenged as long as these are done peacefully, rationally and rigorously. Only then, we can make informed choices at personal and collective levels and forge a progressive, developed and scientific nation. There is absolutely no reason for us to fear any ideas and thoughts that employs no coercion. As aptly put by the Malay proverb, “berani kerana benar, takut kerana salah.” If we know that we are right, why should we fear intellectual engagement?
Second, the attack on liberalism is in fact a thinly-disguised attack on the modern world order much shaped by the Enlightenment Movement in 18th Century which promotes reason as the primary source of authority and legitimacy. Stemming from rejection of tyranny, liberalism has enriched the world with the ideas, institutions and practices of freedom of speech, freedom of religion, property right, rule of law, and other liberties. These are now part of the contemporary world order of democracy, market economy and science. While none of them is sacred and beyond critique, where would a blanket demonization of “liberalism” lead us to? Are we going to be a hermit kingdom like North Korea, only decorated with religious fervour?
Thirdly, if our approach to Islam and Muslims that promotes peaceful co-existence, reason and diversity is seen as inspired by Western liberal thoughts, allow us to share our other inspiration:
“And had your Lord willed, those on earth would have believed - all of them entirely. Then, [O Muhammad], would you compel the people in order that they become believers? And it is not for a soul to believe except by permission of Allah, and He will place defilement upon those who will not use reason.” (Surah Yunus: 99-100)
Reason and respect for diversity are an integral part of Islam. That was why the Ancient Greek philosophical thoughts were preserved by Muslims when the Christian Europe was still caught in its Dark Ages. Many ideas widely misunderstood as exclusively Western have much influence from the Muslims.
We at Penang Institute believe that Islam is cosmopolitan and can be the civilisational basis of Malaysia’s diverse society with its promise of “rahmatan lil alamin” (blessing to the universe). We will continue to promote intellectual engagement on Islam and Muslims in our pursuit of an inclusive, rational and plural Malaysia.
We welcome our detractors to engage us in forums or through scholarly endeavours. We are only humans and stand to be corrected by advancement in knowledge. We however would not respond to conspiracy theorists’ fantasies that seek to associate us with any imaginary villains, whether it is Martians, Hydra, or, the Illuminati whose myth is debunked even in Dan Brown’s novels. |
INTRODUCTION
============
Status asthmaticus is among the leading causes of pediatric admissions to the hospital. Viral respiratory infections have been commonly associated with exacerbations of asthma in children \[[@R1]\]. Only a few studies have associated mycoplasma infections with acute exacerbations of wheezing in the asthmatic patient \[[@R2]-[@R5]\]. In addition to being the most common cause of community acquired atypical pneumonia in children, Mycoplasma pneumoniae (M.P.) causes other respiratory syndromes such as bronchitis, bronchiolitis, pharyngitis and croup \[[@R6],[@R7]\]. Many of these syndromes mimic viral respiratory infections in children. Due to the nature of the organism and its very slow growth rate, cultures have been of no practical clinical value and the diagnosis is usually made by serological methods \[[@R8]\].
It has been our belief, as well as others, that recent mycoplasma infections play a much greater role in the pathophysiology of asthma and the precipitation of status asthmaticus than is readily recognized. We also suspected that infections with mycoplasma were often overlooked and not treated, and often times the infection was termed a "viral infection." This study was an attempt to assess the incidence of recent mycoplasma infections in patients with status asthmaticus that were admitted to our Pediatric Intensive Care Unit and to review their laboratory, clinical, and radiological findings.
METHODS
=======
The medical records of all patients less than twenty years old with the diagnosis of status asthmaticus between September 1997 and October 1998 were obtained. Status asthmaticus was defined as failure to respond to the usual appropriate initial emergency room treatment that included at least three albuterol aerosols, and necessitating PICU admission. Demographic, clinical and laboratory data were reviewed including age, sex, duration of asthma, hospital length of stay, ICU days, duration of oxygen treatment, duration of continuous albuterol aerosol treatments, mycoplasma IgM, initial radiological findings on chest x-ray and WBC count. Two groups of patients were identified: MP positive and MP negative patients. Comparison among variables between the two groups were then analyzed statistically by Chi square and Students't-test. All patients suspected of having a respiratory tract infection in association with their asthma exacerbation were tested for Mycoplasma pneumoniae utilizing the Mycoplasma IgM rapid test on admission and the results were available within 2-4 hours. Patients that tested positive were started on a macrolide antibiotic in addition to the standard asthma treatment. All patients received systemic steroids as part of their therapy. Patients in whom the Mycoplasma IgM test was not obtained were excluded from the study. Chest x-rays were reviewed by a radiologist blinded to the results of the Mycoplasma IgM test, and were considered positive if they demonstrated the presence of one or more infiltrates.
Mycoplasma IgM rapid tests: The Immunocard Mycoplasma Enzyme Immunoassay (EIA) (Meredian Diagnostics, Inc., Cincinnati, Ohio) is a qualitative procedure for the detection of IgM to mycoplasma pneumoniae. This methodology provides a simple to use, self-contained assay. No calculations are required and the visual color change makes interpretation of the results objective and simple. The test cards are individual foil pouches containing immobilized detergent extracted Mycoplasma pneumoniae antigens and human IgM. Included also are positive/negative controls, enzyme conjugate, wash buffer, and substrate reagents. The manufacturer's directions were followed to perform the test in our laboratory. Performance characteristics of the Immunocard mycoplasma tests as published by the manufacturer showed a relative sensitivity of 88% (± 6%), relative specificity of 90% (± 3%), and agreement of 90% (± 3%) when compared with a microwell EIA. Discrepant results were resolved by Immunofluorescent Assays (IFA), latex and complement fixation testing (CFT).
RESULTS
=======
There were 44 patients with a diagnosis of status asthmaticus admitted to the PICU during the study period. 9 patients were excluded because the mycoplasma IgM test was never obtained during the hospital period. Among the remaining 35 patients, 15 (42%) were mycoplasma IgM positive. Age range of the mycoplasma positive patients was 2-19 years (mean 9.4 years) and there were 8 males and 7 females. 20 patients (58%) were mycoplasma IgM negative, 14 males and 6 females with an age range of 1.5 to 19 years (mean of 7.5). There were no statistically significant differences (P greater than 0.05) between the two groups in terms of length of hospitalization (LOH), ICU days, duration of continuous albuterol aerosols (Cont. Nebs Hrs.), days on oxygen (O~2~ days), or white blood cell count (Table **[1](#T1){ref-type="table"}**). Patients who were mycoplasma positive were treated with a macrolide antibiotic in addition to their standard asthma therapy which included continuous albuterol nebulization at 0.3 mg/kg per hour, atrovent aerosols and systemic steroids.
13 (86%) of the 15 patients with positive mycoplasma IgM tests had a positive chest x-ray (infiltrates) on presentation *vs* 7 (35%) of the 20 patients with negative mycoplasma IgM titers (P value =0.002). One of our patients had multiple admissions during the study period, was initially mycoplasma IgM negative on December 27, 1997 and January 25, 1998 and then became positive on one admission on February 18, 1998 and then negative subsequently on admission in April 1998. Her chest X-ray showed a left lower lobe infiltrate in February 1998 and hyperinflation with no infiltrates on the April 1998 admission.
DISCUSSION
==========
Acute exacerbation of wheezing in the asthmatic patient in association with respiratory tract infections has been well documented. Several studies have linked viral upper and lower respiratory infections as common precipitants of acute asthma exacerbations. Our study revealed an incidence of 42% of recent Mycoplasma pneumoniae infections among pediatric asthmatic patients admitted with acute exacerbation of their asthma and status asthmaticus. Recent infection was suggested by the presence of positive qualitative mycoplasma IgM against Mycoplasma pneumoniae.
Only a few studies have addressed the incidence of Mycoplasma pneumoniae infections in asthmatic patients. In a series of 84 children with asthma, Berkovich *et al.*\[[@R3]\] in 1970 demonstrated a 32.1% incidence of viral or Mycoplasma pneumoniae infections during exacerbations of their disease. In their study significant changes in antibodies to Mycoplasma pneumoniae were found in 7 of the patients. (3 had evidence of Mycoplasma pneumoniae infection alone while 4 had Mycoplasma pneumoniae combined with a virus.) Gil *et al.*\[[@R9]\] in a study of 77 patients with asthma and 88 persons without asthma (controls) demonstrated that Mycoplasma pneumoniae was isolated from 24.7% of asthmatic patients compared to 5.7% of the control group, demonstrating a significantly higher colonization rate in the asthmatic patient. Yano *et al.*\[[@R10]\] demonstrated in a case report the onset of bronchial asthma symptoms following a recent mycoplasma infection. They also found the presence of IgE antibodies specific to Mycoplasma pneumoniae in that patient. Tipirneni *et al.*\[[@R5]\] detected IgE antibodies to Mycoplasma pneumoniae in 5 of 152 patients with asthma and other atopic diseases. Seggev *et al.*\[[@R2]\], in a study of 95 adult patients (mean age of 45.7 years) hospitalized due to acute asthma, demonstrated that 21% of these patients had evidence of a recent Mycoplasma pneumoniae infection. Other studies \[[@R11]\] have also suggested a role for Chlamydia pneumoniae infections in association with both acute and chronic wheezing.
In contrast to these studies, others have not found evidence of Mycoplasma pneumoniae infections among adults and children with acute asthma. Minor *et al.*\[[@R12]\] in their study found an increased incidence of viral URIs during exacerbations of asthma but no evidence of Mycoplasma pneumoniae. Berman *et al.*\[[@R13]\] in a study based exclusively on cultures of trans-tracheal aspirates, found no evidence of any infection associated with exacerbations of asthma.
Our study does demonstrate a high incidence of recent mycoplasma infections as demonstrated by a positive mycoplasma IgM test. This along with other studies suggests a much greater role for mycoplasma infections in the acute exacerbation of asthma. We were unaware of any epidemic of Mycoplasma pneumoniae in our area during the time of the study period.
Direct detection of Mycoplasma pneumoniae infections by culture is currently difficult because of the slow growth rate of the organism and fastidious growth requirements. For this reason, serology is often the best laboratory method available. Various formats are available to test patients' sera to Mycoplasma pneumoniae. Complement fixation detects IgM and IgG, and although it has been used extensively in the past, recent evidence suggests that it lacks specificity. Similarly, cold agglutinin serology is both insensitive and non-specific in children younger than 12 years of age, and many experts have recommended against requesting cold agglutinins for pediatric age groups \[[@R7]\]. On the other hand, enzyme-linked immunosorbent assays (ELISA) are sensitive and adaptable and most of the serologic tests used now are based on the ELISA format. Although obtaining paired sera for the detection of IgM and IgG in the acute and convalescence phases of an infection would usually establish the diagnosis during convalescence and would be useful to assess prevalence of past infections, most clinicians would like to confirm the diagnosis early during the acute infection. Therefore serological determination of current mycoplasma infection by a single, acute-phase serum sample often is the only diagnostic test used in routine clinical care. Some disadvantages to this method, however, are that even though specific IgM antibodies to Mycoplasma pneumoniae are usually detected in patients with a recent primary infection, they may be found in patients with reactivated or secondary infections and are sometimes found in patients with no other detectable evidence of recent infection (unapparent infections.) Utilizing IgM serology, however, will help detect most recent and some past Mycoplasma pneumoniae infections and therefore clinical correlation in interpreting the results is important. Similarly, Mycoplasma pneumoniae can be recovered by culture or PCR from the respiratory tract up to several weeks after an acute infection often times despite antibiotic use, making the interpretation of those results difficult as well (colonization versus acute or chronic infection). Even after accounting for the limitation of the Immunocard Mycoplasma EIA test that we used in our study (sensitivity 88% - specificity 90%, and 90% agreement when compared with a microwell EIA), it is still apparent that mycoplasma infections are frequently seen in association with acute asthma exacerbations. Our study also found no significant differences in length of hospitalization, ICU stay, days on oxygen, continuous albuterol aerosol requirements, or WBC, between mycoplasma positive and mycoplasma negative patients. However, it should be noted that all of our patients who were found to be mycoplasma IgM positive were treated with a macrolide antibiotic in addition to their standard asthmatic treatment within six hours of admission to the hospital. Whether such antibiotic treatment had a beneficial and positive effect on the clinical progress of these patients is yet to be determined.
One significant and important finding of this study is the frequency of finding a positive Chest X-ray (infiltrates) in those asthmatics who were Mycoplasma IgM positive. All chest x-rays were reviewed by a radiologist blinded to the results of the Mycoplasma IgM test, and were considered positive if they showed one or more definite infiltrates. Although infiltrates or variable opacifications are not uncommon in asthmatic patients and may represent atelectasis from mucous plugging rather than infection, the difference between the two groups was very significant. (13 of the 15 patients who were mycoplasma positive versus 7 of 20 patients who were Mycoplasma negative, P=0.002). This finding would suggest that the presence of one or more infiltrates in patients with status asthmaticus warrants testing for the presence of recent mycoplasma infection. The Mycoplasma EIA Immunocard test costs \$227.00 for a kit of 28 tests including mandatory controls.
Our study has a number of limitations. It was a retrospective study, the diagnostic test does not differentiate with absolute certainty recent from remote or reactivated Mycoplasma infections, but neither does the PCR or the cultures. Other important infectious agents associated with status asthmaticus such as viruses, were not examined in our study. Nevertheless we found a high incidence of mycoplasma infections in our patients presenting with status asthmaticus.
In a recently published study, Kraft *et al.*\[[@R14]\] detected the presence of Mycoplasma pneumoniae by PCR in bronchoalveolar lavage and biopsy specimens in 10 of 18 chronic stable asthmatics (55%) and in 1 of the 11 control subjects, suggesting the presence of Mycoplasma pneumoniae in the lower airways of chronic stable asthmatics with significantly greater frequency than in the control non-asthmatic subjects. All of the patients, however, who had the organism detected by polymerase chain reaction (PCR) had negative cultures, EIAs and serology for Mycoplasma pneumoniae in this study. The authors in their discussion state that PCR positivity can be present for longer periods than culture or seropositivity. They hypothesize that these asthmatic patients are chronically infected or colonized with Mycoplasma pneumoniae.
In a related study Martin *et al.*\[[@R15]\] extended their initial report to include a total of 55 chronic stable asthmatics and 11 normal control subjects. In this study 25 of the 55 asthmatics had positive PCR results for Mycoplasma and 6 for Chlamydia, strongly suggesting that both Mycoplasma pneumoniae and Chlamydia are found in asthmatic airways. Furthermore they noted the presence of increased numbers of mast cells in the group with positive PCR results suggesting a potential interaction between chronic infection and allergen sensitization. Again as with the original study, all cultures and serology for Mycoplasma were negative in both asthmatics and control groups.
Despite our understanding of the histopathology of mycoplasma infections and its attachment to the ciliated respiratory epithelial cells, it remains unclear what mechanism this bacteria employs to cause injury and harm to the respiratory cells. It is also unclear whether it triggers an immune- mediated response that causes bronchospasm. Whether Mycoplasma pneumoniae plays a significant role in the pathogenesis of both acute and chronic asthma is yet to be determined. If in fact it does, then treatment of selected groups of asthmatics with anti-mycoplasma antibiotics might prove to be beneficial.
CONCLUSION
==========
Although the association of the respiratory infections with the exacerbation of asthma has been described in the literature, as we alluded in our discussion, only a few studies have shown an association of Mycoplasma pneumoniae infections with asthma and especially with status asthmaticus. Also an equal number of studies have failed to show any association of Mycoplasma pneumoniae infections with exacerbation of asthma.
We think our study adds new information especially relevant to pediatric practice because we addressed status asthmaticus in children. Mycoplasma pneumoniae is an important organism associated with status asthmaticus and acute exacerbation of asthma in children and the presence of infiltrates on chest x-ray in status asthmaticus warrants testing for Mycoplasma pneumoniae.
Whether treating Mycoplasma pneumoniae positive patients with macrolide antibiotic is beneficial or not is something we are addressing in a subsequent study.
{#F1}
######
Characteristic of Patients with Status Asthmaticus
Pts Sex [\*](#T1FN1){ref-type="table-fn"}Mean Age (Yrs) LOH (Days) ICU (Days) O~2~Days Cont Nebs (Hrs) WBC [\*\*](#T1FN3){ref-type="table-fn"} + CXR
-------------- ----- ------ ------------------------------------------------- ------------ ------------ ---------- ----------------- ------ -------------------------------------------
**MP +** 15 8 M 9.4 5.2 2.75 3.5 27.7 15.2 13
**MP -** 20 14 M 7.5 4.65 2.65 3.35 29 13.6 7
**P- value** NS NS NS NS NS NS NS NS 0.002
Age Range 2-19 years.
M = Male.
Presence of one or more infiltrates.
LOH = Length of hospitalization.
ICU = Length of ICU stay.
O2 days = Duration of requirement for supplemental oxygen
Cont Nebs = Duration of requirement for continuous nebulized albuterol.
\+ CXR = Chest X-ray abnormal.
|
4.17 offer
-----Original Message-----
From: Garcia, Santiago
Sent: Monday, June 04, 2001 1:23 PM
To: Quigley, Dutch
Subject: KCS II NYMEX quote
Dutch,
Attached you will find the file with the volumes.
Santiago (ext. 53561)
<< File: KSC II Quote Sheet Unwind 06042001.xls >> |
Living on the wrong side of a time zone can be hazardous to your health - zeveb
https://www.washingtonpost.com/business/2019/04/19/how-living-wrong-side-time-zone-can-be-hazardous-your-health/
======
ddlatham
For those pushing to get rid of adjusting clocks twice a year, this suggests
it may be better to stick with standard time year round, rather than daylight
saving time.
~~~
BoiledCabbage
The article contradicts your statement. The reason longer light hours are
worse is because they get fewer hours of sleep due to staying up later, but
still have to wake up in the morning at the same time.
If we abandoned clock swapping, it wouldn't be an issue because yes people
would stay up an hour later, but work/school would also start an hour later so
no lost sleep time.
|
Practice parameter for the assessment and treatment of children and adolescents with suicidal behavior. American Academy of Child and Adolescent Psychiatry.
These guidelines review what is known about the epidemiology, causes, management, and prevention of suicide and attempted suicide in young people. Detailed guidelines are provided concerning the assessment and emergency management of the children and adolescents who present with suicidal behavior. The guidelines also present suggestions on how the clinician may interface with the community. Crisis hotlines, method restriction, educational programs, and screening/ case-finding suicide prevention strategies are examined, and the clinician is advised on media counseling. Intervention in the community after a suicide, minimization of suicide contagion or imitation, and the training of primary care physicians and other gatekeepers to recognize and refer the potentially suicidal child and adolescent are discussed. |
Bioelectronics could lead to a new class of medicine
Imagine having tiny electronics implanted somewhere in your body that can regulate nerve signals and make symptoms of various disorders go away. That's the vision of the field of bioelectronic medicine — the emerging discipline that has made enough promising advances to draw a big investment by a pharmaceutical giant, according to an article in Chemical & Engineering News (C&EN), the weekly news magazine of the American Chemical Society.
Ann M. Thayer, a senior correspondent at C&EN, explains that much of the progress made in bioelectronic medicine has been driven by university research so far. But more than a year ago, the British drug company GlaxoSmithKline dove into the field and is now funding about 25 investigations exploring disease biology and neural signaling. They are betting that the budding discipline will lead to a whole new class of medicines for metabolic, immune-inflammatory, respiratory, cardiovascular and other disorders.
Others are also heavily invested in the future of bioelectronic science. A few start-ups are working toward clinical applications. The National Institutes of Health is also advancing neuroscience with its Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative. But scientists still have to work out some major puzzles before they can benefit patients. For one, they have to completely map out which nerves affect which organs and functions. Once that base is built, the field could be well poised to take off. |
package play.api.cache.redis.impl
import play.api.cache.redis._
import org.specs2.concurrent.ExecutionEnv
import org.specs2.mutable.Specification
class RedisJavaSetSpec(implicit ee: ExecutionEnv) extends Specification with ReducedMockito {
import Implicits._
import JavaCompatibility._
import RedisCacheImplicits._
"Redis Set" should {
"add" in new MockedJavaSet {
internal.add(anyVarArgs[String]) returns internal
set.add(key, value).asScala must beEqualTo(set).await
there were one(internal).add(key, value)
}
"contains" in new MockedJavaSet {
internal.contains(beEq(key)) returns true
set.contains(key).asScala.map(Boolean.unbox) must beTrue.await
there were one(internal).contains(key)
}
"remove" in new MockedJavaSet {
internal.remove(anyVarArgs[String]) returns internal
set.remove(key, value).asScala must beEqualTo(set).await
there were one(internal).remove(key, value)
}
"toSet" in new MockedJavaSet {
internal.toSet returns Set(key, value)
set.toSet.asScala must beEqualTo(Set(key, value).asJava).await
there were one(internal).toSet
}
}
}
|
This invention relates to a composition for fixing and setting curls in hair. More particularly, the invention relates to the combination of polydiorganosiloxane and cationic organic polymer components in a hair fixative formulation which is applied to hair without subsequent rinsing to provide combable and long-lasting hair styles.
Many popular hair styles require a means to hold the hair in a desired configuration. Several procedures are commonly used for setting hair styles at home and in beauty salons including, for example, the winding of wetted hair around curlers or rods followed by drying; the winding of moist hair around a hot curling iron; and the blow drying of wet hair while rolling the hair around a hand held brush. It is generally recognized that the physical and chemical action of water plays a significant role in the process of setting hair. When hair is wetted, hydrogen bonds in the keratin of hair are broken. Then when hair is shaped using curlers, iron, or brush and dried, hydrogen bonds are reformed at locations different from the previous ones and the hair style is thus set.
When hair is set by the use of water alone, the hair style gradually loses its shape through the absorption of atmospheric moisture and consequent rearrangement of the hydrogen bonds. A considerable number of hair setting compositions have been suggested to improve the durability of hair styles and especially to extend the time period that a set is retained in hair. Such compositions range from the permanent wave types which operate chemically by breaking and reforming disulfide linkages in the hair protein to preparations which provide a thin layer of film forming resin on the hair which tends to bond hair fibers together thereby maintaining a prearranged shape.
Generally, the film forming resin preparations have been composed of water or alcohol solutions of anionic polymers such as polyvinylpyrrolidone, polyvinylpyrrolidonevinylacetate copolymers, polymethacrylate resins, ethyl and butyl monoesters of polymethylvinyl ether and maleic acid, or carboxylated polyvinylacetate copolymers.
Such film forming resins have been used in several different ways. Finishing sprays, for example, are applied as a fine spray (aerosol or pump system) after the hair is styled and dry. Finishing sprays extend the life of a set by providing welds between hair fibers which maintain hold even after moisture has reduced or eliminated hold derived from hydrogen bonds.
In contrast to finishing sprays, presetting preparations are applied to hair prior to shaping and drying. After drying, the hair is manipulated further with the dry resin film already on the hair in order to form the final style. Hold provided by hair fiber welds is ineffective with presetting preparations because the postdrying manipulation generally breaks up the welds. Consequently, a presetting preparation should envelope or impregnate each individual hair fiber with a thin film of resin which, while not binding to other hair fibers, will nevertheless provide the fiber with a longer lasting memory of the imposed set.
When presetting preparations containing conventional resins are used to prolong set memory, they often make the hair objectionably stiff or sticky. In addition the resin tends to produce flaky or linty particles on the hair as the film breaks up during combing or brushing. The sticky and stiff character of the resin films also makes the coated hair difficult to comb or brush and may result in damaging or breaking hairs during such operations.
Organic cationic compounds and polymers such as stearyldimethylbenzylammonium chloride, quaternary nitrogen derivatives of cellulose ethers, and homopolymers and copolymers of dimethyldiallylammonium chloride are well known for use in hair conditioning formulations. Hair conditioners facilitate combing out hair and impart softness and suppleness to the hair. Cationic polymers are further known in the art for their substantivity which enables them to become fixed to hair and to remain on hair. Taking advantage of this substantivity, hair conditioning formulations are generally applied to wet hair which is subsequently rinsed before drying so that more uniform and thinner films of components are left on the hair. In comparison to the anionic polymers, conventional cationics generally show little effect in facilitating the setting of hair styles or providing retention of hair sets over extended periods.
It is a purpose of the present invention to provide improved presetting preparations that facilitate the setting of hair styles; prolong the set memory of hair without making the hair unnaturally stiff or sticky; and provide flexible hold for hair so that it can be combed after setting without substantial loss of set memory.
Todd et al. in "Silicones Provide Real Benefits for Aerosol Cosmetics", American Perfumer and Cosmetics, October, 1971, describe the effect of several types of silicones including dimethyl silicones ("dimethicones" by CTFA Cosmetic Ingredient Dictionary nomenclature) used as a modifier for conventional hair fixative resins for hair spray preparations. Maeder in U.S. Pat. No. 3,257,281, June 21, 1966, describes a novel hair fixative resin for use in aerosol hair treatments. The resin contains N,N-dialkylamino substituents which provided water solubility when neutralized with an acid. Maeder further teaches that an antifoam silicone oil is combined with the resin in aerosol hair preparations.
Starch in "Silicones in Hair Care Products", Drug and Cosmetic Industry, June 1984, discloses that dimethicone is used in a few commercial conditioners and hair sprays, but because of its tendency to form very hydrophobic films, its use in hair care products is limited. Starch further teaches that silicones which are modified or adapted by substituting some of the methyl groups on silicon by other more hydrophilic groups such as polyoxyalkylene or aminoalkyl groups have a greater variety of applications in hair care products.
Matsunaga et al. in U.S. Pat. No. 4,369,037, Jan. 18, 1983, describe a variety of hair treatment cosmetics containing cationic keratin derivatives. Specifically, a hair conditioner formulation is illustrated which consists of 1 percent cationic keratin and 3 percent dimethyl polysiloxane in water. Matsunaga et al. show that after the conditioner is applied, the hair is rinsed in running water before drying. In contrast, for using cationic keratin in presetting hair fixative formulations, Matsunaga et al. teach a composition which consists of 1 percent cationic keratin, 10 percent ethanol, 0.5 percent of a polyoxyalkylene substituted silicone, 0.1 percent perfume, and the rest water.
Cornwall et al. in U.S. Pat. No. 4,586,518, May 6, 1986, teach a hair setting method in which aminoalkyl substituted polydiorganosiloxane is applied to the hair with or without subsequent rinsing prior to setting. It is further taught that a quaternary nitrogen containing organic conditioner such as a quaternary nitrogen derivative of a cellulose ether may be combined in equal proportions with the aminoalkyl substituted polydiorganosiloxane for use in the hair setting method.
Homan et al. in U.S. patent application Ser. No. 791,047 filed Oct. 24, 1985, which is assigned to the same assignee as the present application, teach hair fixative preparations for leave-on application to hair prior to setting. The preparations contain a blend of cationic organic polymer and carboxyalkyl substituted polydimethylsiloxane. Homan et al. report that these preparations form a flexible film on the hair which holds desired shapes during combing without forming flaky or linty particles. It is further reported that the hold lasts even under humid conditions.
However, none of the above references seem to suggest combining cationic organic resins with unsubstituted polydimethylsiloxanes in a hair fixative formulation for application to hair prior to setting and without subsequent rinsing. |
CBS News
March 2, 2002
WASHINGTON- Key congressional leaders say they didnt know President Bush had established a shadow government, moving dozens of senior civilian managers to secret underground locations outside Washington to ensure that the federal government could survive a devastating terrorist attack on the nation's capital, The Washington Post says in its Saturday editions.
Senate Majority Leader Thomas A. Daschle (D-S.D.) told the Post he had not been informed by the White House about the role, location or even the existence of the shadow government that the administration began to deploy the morning of the Sept. 11 hijackings.
An aide to House Minority Leader Richard A. Gephardt (D-Mo.) said he was also unaware of the administration's move.
Among Congress's GOP leadership, aides to House Speaker J. Dennis Hastert (Ill.), second in line to succeed the president if he became incapacitated, and to Senate Minority Leader Trent Lott (Miss.) said they were not sure whether they knew.
Aides to Sen. Robert C. Byrd (D-W. Va.) said he had not been told. As Senate president pro tempore, he is in line to become president after the House speaker.
Mr. Bush acknowledged yesterday that the administration had taken extensive measures to guarantee "the continuity of government," adding, This is serious business.
Such an operation was conceived as a Cold War precaution against nuclear attack during the Eisenhower administration but never used until now. It went into effect in the first hours after the terror attacks and has evolved over time, said senior government officials who provided details of the plan.
Without confirming details of the government-in-waiting, Mr. Bush told reporters in Iowa: "We take the continuity of government issue seriously because our nation was under attack. And I still take the threats we receive from al Qaeda killers and terrorists very seriously."
"I have an obligation as the president and my administration has an obligation to the American people to put measures in place that should somebody be successful in attacking Washington there is an ongoing government," Mr. Bush said. "That is one reason why the vice president was going to undisclosed locations. This is serious business. And we take it seriously."
Under the classified "Continuity of Operations Plan," which was first reported by The Post in its Friday editions, high-ranking officials representing their departments have begun rotating in and out of the assignment at one of two fortified locations along the East Coast.
The Post said the first rotations were made in late October or early November, a fact confirmed by a senior government official late Thursday.
Officials who are activated for the duty live and work underground 24 hours a day, away from their families, according to the Post. The shadow government has sent home most of the first wave of deployed personnel, replacing them most commonly at 90-day intervals.
A government official who spoke to The Associated Press said President Bush does not foresee ever needing to turn over government functions to the secret operation, but believed it was prudent to implement the long-standing plan in light of the war on terrorism and persistent threats of future attacks.
The team, drawn from every Cabinet department and some independent agencies, would seek to prevent the collapse of essential government functions in the event of a disabling blow to Washington, the official said.
The underground government would try to contain disruptions of the nation's food and water supplies, transportation links, energy and telecommunications networks, public health and civil order, the Post reported. Later, it would begin to reconstitute the government.
The government-in-waiting is an extension of a policy that has kept Vice President Dick Cheney in secure, undisclosed locations away from Washington. Cheney has moved in and out of public view as threat levels have fluctuated.
As next in line to power behind Mr. Bush, he would need help running the government in a worst-case scenario.
"We take this issue extraordinarily seriously, and are committed to doing as thorough a job as possible to ensure the ongoing operations of the federal government," Joseph W. Hagin, White House deputy chief of staff, told the Post, though he declined to discuss details. "In the case of the use of a weapon of mass destruction, the federal government would be able to do its job and continue to provide key services and respond."
According to the Post, the backup government consists generally of officials from top career ranks, from GS-14 and GS-15 to members of the Senior Executive Service. The White House is represented by a "senior-level presence," one official said, but well below such Cabinet-ranked advisers as Chief of Staff Andrew H. Card Jr. and national security adviser Condoleezza Rice.
Many departments, including Justice and Treasury, have completed plans to delegate statutory powers to officials who would not normally exercise them, the Post said. Others do not need to make such legal transfers, or are holding them in reserve.
The report said civilians deployed for the operation are not allowed to take their families and may not tell anyone where they are going or why.
The two sites of the shadow government make use of local geological features to render them highly secure, the Post said. They are well stocked with food, water, medicine and other consumable supplies, and are capable of generating their own power.
© MMII, CBS Worldwide Inc. All Rights Reserved.
FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of criminal justice, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. |
Show HN: %%30%30: A Game - szhu
https://github.com/szhu/3030/tree/master
======
userbinator
You know you've been working with ASCII for a _long_ time when you can
automatically unescape the title... and then pause, considering whether to
unescape again.
I think reading the comments on that bug is also rather enlightening; points
of note include a _62-level-deep_ stack trace, comments to the effect of "we
don't know what the bug is/how this is supposed to work", and discussions
about whether escaping multiple times is the solution (absolutely not!)
[https://tools.ietf.org/html/rfc3986#section-2.4](https://tools.ietf.org/html/rfc3986#section-2.4)
_Implementations must not percent-encode or decode the same string more than
once, as decoding an already decoded string might lead to misinterpreting a
percent data octet as the beginning of a percent-encoding, or vice versa in
the case of percent-encoding an already percent-encoded string._
Seriously, I'm quite surprised that basic URL handling is still a problem.
Making a game to bring this to the attention of a wider audience is certainly
a good idea.
~~~
X-Istence
Reading the bug report:
[https://code.google.com/p/chromium/issues/detail?id=533361](https://code.google.com/p/chromium/issues/detail?id=533361)
makes me sad. Recursing is definitely not the answer, yet it gets brought up a
lot.
Also, %00 shouldn't cause the browser to crash, and the fixes suggested so far
are just work-arounds :/
~~~
username223
> Recursing is definitely not the answer, yet it gets brought up a lot.
Speaking as someone with an apostrophe in his name, I'm not sure whether this
makes me want to chuckle and reach for the popcorn, or bang my head against
the desk. The answer to multiple (un-)escaping bugs is never recursion.
------
ps4fanboy
[http://github.com/%%30%30](http://github.com/%%30%30) pasting this in slack
also crashes Slack.
~~~
dshankar
Explanation for why this is occurring:
Slack's desktop apps are HTML5 webapps wrapped inside native desktop wrappers.
Specifically, Slack uses Github's Electron (formerly, Atom Shell) which is
basically Chromium. The desktop app is a webpage inside Chromium.
~~~
JoeAltmaier
Yeah, I strenuously object to the fad of calling wrapped web pages 'native
apps'. They get zero benefits that would normally accrue to real native apps.
They just launch 'as if' they were native.
~~~
gue5t
Thank you. People calling web-render wrappers "native applications" must not
realize how great it is when applications are mere coördinators on top of an
integrated _platform_ full of services designed to improve user productivity.
I guess if that demographic did, there would be less "unix philosophy"
cultism, as the efficacy of the unix shell is merely on par with that provided
by other relatively coherent software toolsets. The shell is really pretty
barebones compared to the rich semantics provided by many toolkits and object
systems on which user interfaces have been built: GObject and NeXT are two
modern examples.
[That said, where shell shines is by providing so few abstractions that
virtually any garbage has the same semantic depth as things which were
designed to be used in the shell. Bytes _are_ universal on the common
computing substrate.]
The web, on the other hand, is a platform "designed" by the erosive flow of
eyeballs during the 1st-nth browser wars, without much of a direction beyond
tacking on additional pretty features without breaking backwards compatibility
too much.
Attributes like a11y, embeddability, composability, and effective resource
sharing tend to simply fall out of well-designed platforms. The web has an
effective answer for none of these desirable concerns. Look at how screen
readers break on js-heavy and dynamic web pages, the ongoing security
disasters of XSS and iframes (and the complexity of login services like
Facebook's/oauth/openid), the disappearance of Google reader, and the half-
assed way CDNs offer partial, ad-hoc offloading of some resources via
surrender to centralization.
~~~
TazeTSchnitzel
> Attributes like a11y, embeddability, composability, and effective resource
> sharing tend to simply fall out of well-designed platforms. The web has an
> effective answer for none of these desirable concerns.
...what? The web is better than most native platforms in these.
The web is accessible. It has many features for screen readers and such, but
more importantly, it is inherently flexible and allows content's form to be
adapted to the reader's needs, thanks to the separation of content from style.
A single web page, unmodified, can work on a desktop PC with a mouse and
keyboard, a capacitive touch device the size of your palm, a stylus-input
device the size of a laptop, a printed page, a screen reader, a ten key mobile
phone from yesteryear, and more. The web lets users define custom styling that
meets their needs, lets users selectively remove content (ads, for example),
etc. No native platform is that flexible. Yes, some sites break screen
readers, but this is true of native apps as well.
The web is incredibly embeddable. Any web page can, with one line of code,
incorporate any other web page, and it "just works". You simply can't do that
with native apps.
The web is composable as well. Sites can load JavaScript from each other very
easily.
The web also supports resource sharing in various forms, but people don't
necessarily use them.
~~~
rimantas
Alas, all the benefits you list are just possibilities, not the reality.
"separation of content from style" was a big thing back when csszengarden.com
was making rounds, but that all is long forgotten in the name of
angularreactnodecrap. Accessibility? Give me a break, how many web sites do
even work without JS enabled? I am not sure about Android, but iOS has a great
accessibility support.
~~~
robin_reala
It’s a common misconception that Javascript precludes accessibility. JS can in
many ways help accessibility if done considerately.
------
scott_hardy
Amazing. I always love seeing these sorts of harmless, fun ways that bring
attention to these strange edge/corner case bugs.
~~~
szhu
[https://github.com/szhu/3030/issues/12](https://github.com/szhu/3030/issues/12)
"harmless"
oops.
------
anon4
Reminds me a bit of the doom variant that would kill a random process for each
enemy you killed.
~~~
tetrep
you're probably thinking of
[http://psdoom.sourceforge.net/](http://psdoom.sourceforge.net/)
------
tdicola
You probably want to make it more clear that you're supposed to mouse over the
dark lollipops and avoid the blue trees. I assumed the dark chars were the
walls I shouldn't touch and just about gave up on it after it was constantly
crashing. Then I read the description after the fold and figured it out.
Also why not just implement the game in javascript using mouse position events
and a canvas for drawing?
~~~
szhu
Dark lollipops? Blue trees? What operating system are you using? I'm on a Mac
and the lollipops are pink and the trees dark green. I'm considering making a
text-only version for people who have weird or no emoji support.
Of course I could implement the game in javascript, with nice graphics and
all, and perhaps gameplay that works in all browsers and doesn't crash Chrome,
but wouldn't that defeat the point of the game? :)
Happy to take PRs though!
~~~
staz
I'm on Chromium on Ubuntu. Also have Dark lollipops and Blue trees, guest it
depends on the font or something.
[https://imgur.com/Ffc3zcx](https://imgur.com/Ffc3zcx)
~~~
szhu
When was the last time you've had a black lollipop? Or seen a blue tree?
Thanks, Ubuntu.
Anyway fixed! The the instructions reads "Mouse your way through the map
without touching the /trees/!"
~~~
vacri
It's not ubuntu's fault. Ubuntu/FF here, and I'm getting green trees in FF,
blue in Chromium.
Blue trees can be seen in mountainscapes in certain light conditions. Or in
the Blue Mountain... well, the trees themselves aren't blue, but they're
covered in a blue haze... but still, the emoji is ever _green_ _tree...
------
cremno
Poor CloudApp Support:
[https://github.com/szhu/3030/issues/3#issuecomment-141854443](https://github.com/szhu/3030/issues/3#issuecomment-141854443)
------
ps4fanboy
I must admit my tab crashed before I figured out what was going on lol.
~~~
szhu
hm, looks like that bug has been reported already:
[https://github.com/szhu/3030/issues/1](https://github.com/szhu/3030/issues/1)
~~~
r3bl
That's the whole point of the "game". To show this bug.
------
deckar01
My inspector even crashes when trying to hover over the link node!
------
infinita740
The game doesn't "work" on microsoft edge but the brower doesnt recognize the
Stanford links[0] , it is not possible to copy them by right clicking. Going
directly to the page by copy/pasting the url doesn't even load the website. IE
doesn't seem to understand the url as well.
The only brower I've tried that manages to get a page is firefox[1]
[0][http://www.stanford.edu/%%30%30](http://www.stanford.edu/%%30%30)
[1][http://i.imgur.com/nEDgBrq.png](http://i.imgur.com/nEDgBrq.png)
~~~
vor0nwe
Old Opera 12.17 (last version that still allows specifying a different proxy
than the system one, afaics) shows the same page as Firefox. Elinks does as
well.
------
fidz
This is a beautiful experiment.
To OP: i wonder, how did you find this bug?
~~~
szhu
It's actually all over the news right now:
[https://www.google.com/search?q=chrome+url+bug](https://www.google.com/search?q=chrome+url+bug)
I found it because someone posted about it in a school Facebook group I am in.
------
bobajeff
This works in Chrome on Android as well. Of course it's way easier than on
desktop.
~~~
ikeboy
Not for me: [https://i.imgur.com/bzScUUn.png](https://i.imgur.com/bzScUUn.png)
~~~
bobajeff
Try it in landscape mode.
------
k_bx
I like how this crashes Twitter app's "preview" browser with app itself.
------
mrcncpt
This weirdly makes my external monitor flash black when I open this tab.
What's going on here?
[https://vid.me/dWW7](https://vid.me/dWW7)
------
kodingana
You can jump over the wall by scrolling your mouse! :D
------
spacesword
Works with Opera 32 as well.
~~~
Mithaldu
Of course. It is just a chrome fork with minimal changes.
------
kyberias
Crashes my Chrome (Windows) when I move mouse pointer over the game area.
~~~
cosarara97
That's the point.
------
scotty79
Nice. It crashes my Chrome on hover over trees.
------
rjuyal
Aw snap! Always.
------
lbebber
Hahah, clever.
------
andersonmvd
Creative. Nice project.
------
zobzu
hah, another chrome-only thing
------
rigaspapas
This game has free graphics upgrade if you use "Emoji Input by EmojiStuff.com"
extension
|
Taiwan’s Democratic Progressive Party has at last put forward a long-awaited draft law to allow same-sex marriage on the island in a historic proposal which appears to try to placate both sides in the contentious debate over marriage equality.
Back in May 2017, the Council of Grand Justices in Taipei ruled that not granting marriage rights to same-sex couples was unconstitutional, ordering that legislation be adopted within the next two years to enshrine marriage equality into law, but without actually specifying how this action should take place.
While the DPP dragged their collective feet, conservative groups refused to give up the fight, leading to voters approving a (non-binding) referendum in November opposing changing the wording in Taiwan’s Civil Code that marriage is between “a man and a woman.”
The draft law proposed on Thursday attempts to adhere to both the court decision and the referendum by not altering the Civil Code and instead introducing new legislation which would allow two same-sex “parties” to be married and enjoy similar rights to heterosexual couples.
These rights would include inheritance and medical rights, however, most significantly, adoption rights would appear to be restricted only to the biological children of one of the partners. In addition, there is no mention of a pathway to citizenship for international same-sex spouses.
While some have complained about the proposal’s lack of full equality, most gay marriage activists seem on the whole ecstatic about the draft law.
“This is a huge step forward for marriage equality in Taiwan,” said Annie Huang, Amnesty International’s Taiwan director. “The draft law is the first of its kind in Asia to allow same-sex marriage. It sends a strong message to the Taiwanese people and the world that Taiwan chooses love over hate, and equality over discrimination.”
Meanwhile, conservative groups have quickly come out against the proposal arguing that it defies the wishes of the people according to last year’s referendum. “If same-sex marriage is legalized, so should group marriage, bigamy, fetishism, pedophilia, and incest,” declaredthe Family Alliance.
In order for the draft law to take effect it must be passed by Taiwan’s parliament where the DPP still holds a majority. Considering the pace of events, it’s likely that this vote won’t happen until right before the May 24th deadline set by the court. |
Introduction {#Sec1}
============
Blood irrigates all organs, supplying oxygen and nutrients to the cells of the body while collecting byproducts of cell metabolism, including lipids, proteins and nucleic acids. These circulating biomolecules in blood contain information linked to specific organ health. While most research effort has focused on circulating proteins and lipids, circulating cell-free nucleic acids (cf-NA) have recently emerged as a non-invasive tool for diagnosis and monitoring of health and disease^[@CR1]^. For example, cell-free DNA (cfDNA), the most well-characterized cf-NA, has been utilized for prenatal diagnostics, transplant rejection prediction, and monitoring of cancer^[@CR2]--[@CR6]^. Despite these advances, the value of cfDNA tests remains mainly restricted to physiologic and disease situations characterized by genetic differences (i.e., pregnancy, transplants, or tumors). In contrast, the cell-free messenger RNA (cf-mRNA) transcriptome can be considered as a compendium of transcripts collected from all organs^[@CR7]^. Some of these circulating transcripts correspond to well-characterized tissue-specific genes, supporting interrogation of these biomolecules to dynamically monitor health or disease state of tissues and organs. Indeed, cf-mRNA has been shown to reflect fetal development, predict preterm delivery in pregnant women^[@CR7]--[@CR9]^, and as a cancer biomarker^[@CR10],[@CR11]^.
Strikingly, the biological processes underlying the presence of cf-NA in circulation remain inferred, but largely unknown. In the case of cfDNA, studies have proposed the primary mechanism is passive release into circulation upon cell death^[@CR12],[@CR13]^. In contrast, RNA molecules can be actively secreted from cells^[@CR11],[@CR14]--[@CR16]^. Much work has focused on the secretion of non-coding and smaller RNA molecules into exosomes and other lipid vesicles. However, on a per-molecule basis, mRNA comprises a minor fraction of this phenomenon^[@CR17]^, and the origin of cf-mRNA remains unclear.
In this study, we conduct next-generation sequencing-based whole-transcriptomic profiling of cf-mRNA and compare expression levels to those from circulating cells of the blood (CC) to decipher the origin of circulating transcripts and better understand their potential clinical utility. We show that cf-mRNA captures transcripts of non-hematopoietic and hematopoietic origin, and is enriched in transcripts derived from the bone marrow (BM). Longitudinal studies of cancer patients undergoing BM ablation and transplantation show that cf-mRNA profiling non-invasively captures temporal transcriptional activity of the BM. Further, stimulation of specific BM lineages with growth factor therapeutics suggests that cf-mRNA fluctuations reflect active lineage-specific transcriptional activity. Collectively, our data provide insights into the biological origins of cf-mRNA, strongly suggesting that living cells contribute cf-mRNA to circulation, and anticipate the potential of circulating transcripts as non-invasive biomarkers that could eventually alleviate the use of BM biopsies.
Results {#Sec2}
=======
cf-mRNA is enriched in hematopoietic progenitor transcripts {#Sec3}
-----------------------------------------------------------
To characterize the landscape of the human cell-free RNA transcriptome (cf-mRNA), we isolated and sequenced cf-mRNA from 1 ml of serum of 24 healthy donors. Among this cohort, we identified 10,357 transcripts with \>1 TPM (transcripts per million) and 7386 transcripts with \>5 TPM in at least 80% of the samples, reflecting the diversity and consistency of cf-mRNA transcriptome among healthy subjects (Supplementary Tables [1](#MOESM1){ref-type="media"} and [2](#MOESM1){ref-type="media"} provide additional information of cf-mRNA sequencing metrics). We used non-negative matrix factorization (NMF) to decompose the cf-mRNA transcriptome in an unsupervised manner^[@CR18],[@CR19]^ and gene expression reference databases (GTEx and Blueprint) to estimate the relative contributions of the different tissues and cell types (see Methods). The majority of the transcripts detected in cf-mRNA, \~85% on average, are of hematopoietic origin (i.e., derived from circulating cells and BM-resident cells), with the remaining \~15% being of non-hematopoietic origin (i.e., derived from solid tissues, Fig. [1a, b](#Fig1){ref-type="fig"}). Specifically, deconvolution analyses estimated that, on average, \~29% of transcripts are of megakaryocyte/platelet origin (first to third quartile range 23--36%), \~28% are of lymphocyte origin (range 18--30%), 12.8% of granulocyte origin (range 6--16%), 3% of neutrophil progenitor origin (range 0.2--3.7%), 11% of erythrocyte origin (range 8--14%), and \~15% derived from solid tissues (range 11--20%) (Fig. [1a, b](#Fig1){ref-type="fig"}). To gain insight into the origin of these transcripts, similar deconvolution analysis was performed in whole-blood (WB) samples from 19 healthy individuals from previously reported RNA-sequencing (RNA-Seq) data^[@CR20]^. As expected, the WB transcriptome is largely composed of lymphocyte (\~69% on average) and granulocyte (\~22% on average) transcripts, with an additional \~7% of transcripts of erythrocyte origin and minor contributions from other cell types and tissues (Fig. [1a, b](#Fig1){ref-type="fig"}). These analyses represent an estimation of the composition of the transcriptome of these biofluids that could be influenced by different factors. Nevertheless, our data show the higher diversity of cf-mRNA transcriptome, which, compared to WB, contains a larger fraction of non-hematopoietic transcripts and of hematopoietic progenitor genes derived from the BM.Fig. 1cf-mRNA transcriptome captures hematopoietic transcripts derived from the bone marrow.**a** cf-mRNA transcriptome and whole-blood transcriptome from healthy subjects was decomposed using non-negative matrix factorization and tissue contribution estimated using public databases. cf-mRNA was sequenced from 24 normal donors and whole-blood RNA-Seq data from 19 healthy individuals reported in Nguyen et al. ^[@CR20]^. Estimated contribution of the indicated cell types/tissues for each sample is shown. **b** Average values for each biofluid (24 cf-mRNA and 19 whole-blood samples) are shown using the same color code. **c**. RNA-Seq was performed in three paired plasma and whole-blood samples from healthy individuals. Levels of detectable cell-type-specific transcripts (Supplementary Table [5](#MOESM1){ref-type="media"}) were compared between cf-mRNA and whole blood for all three donors. Average fold change (cf-mRNA/whole blood) among the three individuals is represented (log scale) (two-sided Wilcoxon's rank-sum test, *U* = 3.22). Red dots, neutrophil progenitor transcripts. Blue dots, mature neutrophil transcripts. Cell-type-specific genes were identified as explained in Methods. **d** RNA-Seq was performed in five paired plasma and buffy coat samples from healthy control individuals. Levels of mature and progenitor neutrophil transcripts detectable in plasma and matching buffy coat specimens were compared. Average fold change of these transcripts (plasma/buffy coat) in the five paired samples is shown (log scale). Two-sided Wilcoxon's rank-sum test was performed (*U* = −3.40, *p* value = 0.00068). **e**, **f** Box-plot comparing the normalized levels (TPM) of the indicated transcripts in paired buffy coat and cf-mRNA samples measured by RNA-Seq (*n* = 5 samples, two-sided Wilcoxon's rank-sum test), **f** PRTN3, *U* = −2.61, *p* value = 0.0090; **e** CXCR2, *U* = 2.61, *p* value = 0.0090. Center line, median; box limits, upper and lower quartiles; whiskers, 1.5× interquartile range; points, outliers. Source data for **b**--**f** are provided as a Source Data file **g**. Scatter plot comparing the levels in matching cf-mRNA (*Y* axis) and whole blood (*X* axis) of BM-specific genes (red dots) and peripheral blood-specific genes (blue dots), which form two distinct populations (*p* \< 0.001, *U* = 18.58, two-sided Wilcoxon's rank-sum test).
To confirm the presence of BM-specific transcripts in circulation, we performed RNA-Seq in three paired WB (which includes all cellular components of blood) and plasma samples from healthy donors (Supplementary Fig. [1A](#MOESM1){ref-type="media"}) and compared the levels of the main hematopoietic cell-type-specific transcripts (i.e., neutrophils, erythrocytes, platelets/megakaryocyte, T cells) in these specimens (Fig. [1c](#Fig1){ref-type="fig"} and Supplementary Fig. [1B, C](#MOESM1){ref-type="media"}). Striking differences were observed among neutrophil-specific transcripts (Fig. [1c](#Fig1){ref-type="fig"}). Using the hematopoiesis transcriptomic reference database (Blueprint), we observed that transcripts expressed in mature circulating neutrophils are detected at much lower levels in plasma compared to WB (Fig. [1c](#Fig1){ref-type="fig"}). In contrast, transcripts expressed in BM-resident neutrophil progenitors are enriched in cf-mRNA (Fig. [1c](#Fig1){ref-type="fig"}). To confirm these findings, we performed RNA-Seq of five paired plasma and buffy coat samples (buffy coat is enriched in white blood cells). Consistently, neutrophil mature and progenitor transcripts were found to form distinct populations (Fig. [1d](#Fig1){ref-type="fig"}), in which cf-mRNA shows low levels of mature transcripts such as the chemokine receptors CXCR1 and CXCR2 (Fig. [1e](#Fig1){ref-type="fig"}, *p* \< 0.01) compared to buffy coat, but is enriched in progenitor transcripts, such as PRTN3 (myeloblastin precursor), CTSG (cathepsin G), and AZU1 (azurocidin precursor) (*p* \< 0.05, Fig. [1f](#Fig1){ref-type="fig"}, Supplementary Fig. [1D,](#MOESM1){ref-type="media"} [E](#MOESM1){ref-type="media"}). These data support the presence of BM transcripts in cf-mRNA; indeed, quadratic programing deconvolution analysis of hematopoietic transcripts from healthy donors indicated that BM transcripts contribute \~9% of cf-mRNA transcriptome, in contrast to \~1% in WB.
To further confirm this result, we performed RNA-Seq on a human BM sample and compared it with the WB transcriptome. We identified 377 genes enriched in BM transcriptome (\>5-fold, BM genes) (Supplementary Table [3](#MOESM1){ref-type="media"}), representing hematopoietic progenitors (i.e., neutrophil progenitors and mesenchymal stem cells from the BM). Interestingly, progenitor transcripts such as PRTN3, CTSG, and AZU1 are among the top transcripts enriched in BM transcriptome. In addition, 374 genes were identified enriched in WB (\>5-fold, WB genes) (Supplementary Table [4](#MOESM1){ref-type="media"}), mainly representing mature circulating blood cell genes (i.e., associated with mature granulocytes and lymphocytes). Subsequently, the levels of BM genes and WB genes were compared in three matching WB and plasma samples, which confirmed that these transcripts segregate into two populations (*p* \< 0.001), with cf-mRNA being enriched in hematopoietic progenitor genes (BM genes) and depleted of mature genes (WB genes) compared to WB (Fig. [1g](#Fig1){ref-type="fig"} and Supplementary Fig. [1F](#MOESM1){ref-type="media"}). In summary, our data indicate that cf-mRNA transcriptome captures transcripts derived from the BM, potentially providing a window to non-invasively evaluate BM function
Measurement of BM-specific transcripts by cf-mRNA {#Sec4}
-------------------------------------------------
As further evidence that BM-specific transcripts can be detected in cf-mRNA and to evaluate their potential utility, we recruited three multiple myeloma (MM) patients. MM is characterized by the clonal expansion and accumulation of malignant plasma cells almost exclusively in the BM. These cells express specific immunoglobulin (Ig) rearrangements, in contrast to plasma cells of healthy individuals, which express multiple Ig combinations. In this study, MM patients underwent melphalan-mediated BM ablation (starting at day −2), followed by autologous hematopoietic stem cell (HSC) infusion (day 0) (Fig. [2b](#Fig2){ref-type="fig"}). We isolated and sequenced cf-mRNA from 1 ml of plasma of these patients before BM ablation (day −2). Clonal expansion of Ig heavy (IgH) and Ig light (IgL) chains transcripts was identified for two out of three patients. For instance, in patient 2 we detected IGHG1 and IGKC transcripts as the most prevalent Ig constant regions (Supplementary Fig. [2A--C](#MOESM1){ref-type="media"}). For the variable regions, IGHV3--15 and IGKV2--24 transcripts dominated the sample's transcriptome, while clonal lambda regions were not detected (Fig. [2a, c](#Fig2){ref-type="fig"} and Supplementary Fig. [2C](#MOESM1){ref-type="media"}). In contrast, clonal transcripts were not observed in plasma of a healthy control individual, as expected (Fig. [2a](#Fig2){ref-type="fig"}). Similar analyses in patient 1 revealed a clone composed of the IgH constant chain IGHA1 and variable region IGHV1--69, and IgL lambda constant chain IGLC1 and variable region IGLV1--40 (Supplementary Fig. [2D](#MOESM1){ref-type="media"}). In both cases, the malignant clones we identified are consistent with the molecular testing performed from BM aspirates (Supplementary Table [6](#MOESM1){ref-type="media"}). However, for patient 3, we did not detect dominant Ig rearrangements (Supplementary Fig. [2E](#MOESM1){ref-type="media"}), likely due to the low number of plasma cells in the BM of this patient at the start of this study (Supplementary Table [6](#MOESM1){ref-type="media"}). Malignant plasma cells are rarely found in circulation in MM patients; indeed, RNA-Seq analysis of the matching buffy coat of patient 2 samples before chemotherapy treatment showed only low levels of a repertoire of IgH and IgL transcripts, with no dominant rearrangements (Fig. [2a, c](#Fig2){ref-type="fig"} and Supplementary Fig. [2A--C](#MOESM1){ref-type="media"}), highlighting the unique ability of cf-mRNA to capture the clonal Ig transcripts generated by plasma cells in the BM.Fig. 2cf-mRNA transcriptome reflects dynamical changes of Ig transcripts derived from the BM.**a** Matching cf-mRNA and buffy coat samples from a multiple myeloma patient (day −2) were analyzed by RNA-Seq. Fraction of transcripts from the variable regions of the immunoglobulin heavy and light chains identified in plasma and buffy coat samples are shown (center and right panels). Clonally amplified transcripts are indicated in red and dominated the representation of Ig transcripts in cf-mRNA of the MM patient. Levels of Ig transcripts in plasma of a healthy individual (left panel) are shown as reference. **b** Schematic of the therapeutic treatment performed in MM patients. Melphalan-mediated BM ablation started at day −2, autologous stem cell transplant was performed at day 0. Steroids and G-CSF were then administered as supportive care. Blood was collected every day during the study. **c**. Bar graphs showing the normalized values (TPM, *Y* axis) of Ig transcripts detected by RNA-Seq in paired plasma and buffy coat samples throughout the treatment. The repertoire of variable regions of Ig heavy chain and Ig kappa light chain are shown in a color gradient. Dominant transcripts identified in plasma are indicated. Day of blood collection with respect to transplant is indicated in the *X* axis. **d** Fraction of transcripts from variable Ig regions in cf-mRNA during BM ablation and transplant. Day of blood collection with respect to transplant is indicated in the *X* axis. Dominant Ig transcripts, shown in solid blue and red lines, decrease after melphalan-mediated BM ablation.
To test whether cf-mRNA profiling can be used to monitor the levels of the malignant Ig clone, we sequenced the cf-mRNA from plasma of these patients every day for 2 weeks after chemotherapy and transplant. While patient 1 showed no apparent reduction of the malignant clone after therapy (Supplementary Fig. [2D](#MOESM1){ref-type="media"}), patient 2 showed decreased levels of the predominant Ig variants in cf-mRNA after melphalan-induced apoptosis of plasma cells (Fig. [2b--d](#Fig2){ref-type="fig"} and Supplementary Fig. [2A--C](#MOESM1){ref-type="media"}). By day 10, the immune profile was no longer dominated by clonal Ig combinations, indicating successful therapy and BM reconstitution (Fig. [2b--d](#Fig2){ref-type="fig"}). In contrast, RNA-Seq performed on the matching buffy coat fraction throughout the study showed very limited information regarding the malignant Ig transcripts (Fig. [2c](#Fig2){ref-type="fig"} and Supplementary Fig [2A--C](#MOESM1){ref-type="media"}), supporting the potential of cf-mRNA to non-invasively capture BM activity.
cf-mRNA reflects hematopoietic reconstitution after BM transplant {#Sec5}
-----------------------------------------------------------------
To gain further insight into the ability of circulating mRNA to reveal BM transcriptional activity, we followed the BM ablation and reconstitution dynamics after autologous HSC transplants in cf-mRNA, using the prototypical MM patient 2. Additionally, we investigated acute myeloid leukemia (AML) patients who underwent submyeloablative treatment followed by allogeneic HSC transplants (see Methods). Unsupervised clustering of transcripts detected in plasma cf-mRNA of MM and AML patients identified temporal patterns of expression for several groups of genes (Fig. [3a, b](#Fig3){ref-type="fig"}). Both Gene Ontology enrichment analysis and RNA-Seq data from Blueprint Consortium indicated that many of the identified components correspond to specific hematopoietic lineages (Fig. [3a, b](#Fig3){ref-type="fig"}). Therefore, we examined in detail the dynamics of hematopoietic lineage-specific transcripts (i.e., erythrocytes, megakaryocytes, neutrophils) in circulation during BM ablation and reconstitution.Fig. 3cf-mRNA reflects transcriptional activity of hematopoietic lineages during BM reconstitution.**a**, **b** Heat map of time-varying transcripts identified by cf-mRNA-Seq on multiple myeloma (MM) (**a**) and acute myeloid leukemia (AML) (**b**) patients undergoing BM ablation, followed by autologous or allogenic stem cell transplant, respectively (at day 0). Each column represents a time point with respect to the time of transplant, indicated in the bottom. Each row represents a gene. Enriched gene ontology terms for each cluster of transcripts are indicated (adjusted *p* value). **c**--**h** Time course of the levels of erythrocyte (red, **c**, **d**), megakaryocyte (green, **e**, **f**) and neutrophil (gray, **g**, **h**) specific transcripts in indicated MM (**c**, **e**, **g**) and AML (**d**, **e**, **h**) patients throughout the study. (Transcript identity is provided in Supplementary Table [5](#MOESM1){ref-type="media"}, detectable genes \<5000 TPM used for visualization). Corresponding peripheral blood counts (every 3 days) are plotted in the secondary axis and represented with a black dotted line (RBC count, millions per mcL (**c**, **d**), platelet count, thousands per mcL (**e**, **f**) and neutrophil count, thousands per mcL (**g**, **h**). Day of blood collection with respect to transplant is indicated in the *X* axis. **i**, **j** Relative variation of progenitor neutrophil transcripts in AML patients 1 (**i**) and 2 (**j**) throughout the study. Average percent change for these transcripts is represented with a dashed blue lane. Dashed black line shows neutrophil counts in blood.
First, to clarify the relationship between erythrocyte circulating transcripts and red blood cells (RBCs), we examined the levels of erythrocyte lineage-specific transcripts in plasma and RBC counts throughout the study. RBCs are the predominant cell type in circulation and are stable for \~120 days in the bloodstream^[@CR21]^. Little variation in RBC numbers was noticed in MM and AML patients during the duration of these studies (Fig. [3c--d](#Fig3){ref-type="fig"} and Supplementary Fig. [4A](#MOESM1){ref-type="media"}). In contrast, most erythrocyte-specific transcripts in cf-mRNA were rapidly reduced after chemotherapy-mediated BM ablation in all patients, and recovered at later time points during BM reconstitution (Fig. [3c--d](#Fig3){ref-type="fig"}, Supplementary Fig. [3a--b](#MOESM1){ref-type="media"}, and Supplementary Fig. [4A](#MOESM1){ref-type="media"}). The discrepancy between RBC number and most erythrocyte transcripts in cf-mRNA indicates that these transcripts derive primarily from immature erythrocyte forms either in the BM or in circulation (reticulocytes), rather than from mature RBCs. We performed RNA-Seq analysis of paired buffy coat samples of MM patient 2 to gain further insight into the origin of these transcripts. The levels of erythrocyte-specific genes in CC are reduced after chemotherapy, resembling the dynamics observed in cf-mRNA (Supplementary Fig. [3C](#MOESM1){ref-type="media"}), and indicate that reticulocytes may be the source of most erythrocyte transcripts in WB. However, transcripts such as GATA1, a key transcriptional regulator of erythrocyte development, are detectable in cf-mRNA earlier than in buffy coat during BM reconstitution (Supplementary Fig. [3C](#MOESM1){ref-type="media"}), suggesting their BM origin. While future experiments will be necessary to discriminate the precise contribution of each compartment, our data show that erythrocyte transcripts derive primarily from immature erythrocyte cells residing in the BM and circulating reticulocytes, rather than from the highly abundant mature RBC.
To test whether discrepancies between cell blood counts (CBCs) and lineage-specific transcripts in circulation extend to other hematopoietic cell types, we next compared the dynamics of platelet counts and megakaryocyte-specific transcripts. In MM patient 2, a consistent increase in the levels megakaryocyte-specific transcripts is detected in cf-mRNA by days 9 and 10 after transplant, prior to platelet count recovery, which occurs by days 12 and 13 (Fig. [3e](#Fig3){ref-type="fig"}). Interestingly, RNA-Seq from matched buffy coat samples showed that megakaryocyte transcript levels in CC mimic the dynamic of platelet counts throughout the study (Supplementary Fig. [3c](#MOESM1){ref-type="media"}), and, unlike in cf-mRNA, early recovery of megakaryocyte transcripts is not detectable in CC during BM reconstitution. This disparity suggests that megakaryocyte transcripts detected in cf-mRNA during BM reconstitution, and before the platelet count recovers, are derived from the BM. Supporting this observation, in AML patient 1 megakaryocyte transcripts in circulation decreased after BM ablation and recovered by day \~9, clearly foreshadowing the increase in platelet counts occurring by days 12 and 13 (Fig. [3f](#Fig3){ref-type="fig"}). Strikingly, no recovery of this lineage occurred in cf-mRNA of AML patient 2 (Supplementary Fig. [4B](#MOESM1){ref-type="media"}). Follow-up BM biopsy confirmed lack of megakaryocyte development in this patient (Supplementary Table [9](#MOESM1){ref-type="media"}), demonstrating the specificity of the measured megakaryocyte signal. Thus, our data indicate that a fraction of megakaryocyte/platelet transcripts in circulation derive from the BM and that cf-mRNA reflects megakaryocyte transcriptional activity during BM reconstitution.
Last, we examined the kinetics of neutrophil counts and specific transcripts in circulation of MM and AML patients during the therapy. In MM patient 2, neutrophil counts showed two spikes, one shortly after transplant, likely due to the granulocyte-colony stimulating factor (G-CSF) treatment, which is followed by a rapid decrease due to BM ablation, and a second spike by days 12 and 13 likely indicative of BM reconstitution (Fig. [3g](#Fig3){ref-type="fig"}). This resembles the overall dynamics of neutrophil-specific genes in cf-mRNA and in buffy coat during the procedure (Fig. [3g](#Fig3){ref-type="fig"} and Supplementary Fig. [3E](#MOESM1){ref-type="media"}). However, while neutrophil transcripts in buffy coat and cf-mRNA peaked at a similar time to neutrophil counts during BM reconstitution, neutrophil precursor genes like CTSG increased earlier in cf-mRNA, by days \~8 and 9 after the autologous stem cell transplant. Supporting this observation, the levels of progenitor neutrophil transcripts in plasma of all AML patients decreased after BM ablation, and increased in cf-mRNA during BM reconstitution days earlier than the neutrophil counts (Fig. [3h--j](#Fig3){ref-type="fig"} and Supplementary Fig. [4D--F](#MOESM1){ref-type="media"}). These data further support that, during BM reconstitution, progenitor neutrophil transcripts in circulation are not derived from CC, but rather reflect BM transcriptional activity of the granulocyte lineage, providing valuable information about transplant engraftment and BM reconstitution.
We also investigated an orthogonal approach to measure transplant engraftment using cf-mRNA from AML patients receiving allogeneic HSC transplants, in which genetic differences exist between host and donor cells. Using a reference database of single-nucleotide polymorphisms (SNPs), we identified host-specific polymorphisms in progenitor neutrophil transcripts before the transplant (e.g., ELANE, AZU1, and PRTN3). After transplantation, these transcripts are substituted by new genetic variants from donor cells (Fig. [4a](#Fig4){ref-type="fig"}). Indeed, cf-mRNA profiling enabled monitoring of changes in these transcripts during therapeutic treatment of patients 1 and 2 (Fig. [4b--c](#Fig4){ref-type="fig"}). Combined analysis of all detected SNP from the host switching to a different genetic variant after transplant (e.g., from homozygous to heterozygous) indicates that multiple genetic differences can be identified in cf-mRNA to temporally monitor transplant engraftment (Fig. [4d--e](#Fig4){ref-type="fig"}). Altogether, our data show that cf-mRNA captures both genetic information and transcriptional activity from the BM, and enables monitoring of transplant engraftment and BM reconstitution from donor cells.Fig. 4Monitoring of BM allotransplant engraftment in AML patients by cf-mRNA genotyping.**a**. Average frequency of reference allele of the SNPs detected in ELANE, AZU1 and PRTN3 neutrophil progenitor transcripts in cf-mRNA before (gray) and after (orange) allogeneic HSC transplantation in three AML patients, showing implantation of a new genetic profile after transplant. Source data are provided as a Source Data file. **b**, **c**. Frequency of reference allele of the SNPs detected in the same transcripts as in **a** for AML patients 1 and 2 over 36 days after transplant. Day of blood collection when SNPs were detected with respect to the time of transplant is indicated in the *X* axis. **d**, **e** Average reference allele frequency of all SNPs detected in the host cf-mRNA changing from reference homozygous to heterozygous (**d**) and from alternative homozygous to reference homozygous (**e**) after transplant. Day of blood collection is indicated in the *X* axis, transplant occurred at day 0.
cf-mRNA reveals response to stimulation with growth factors {#Sec6}
-----------------------------------------------------------
To evaluate the potential of cf-mRNA to monitor the activity of specific BM lineages after stimulation with growth factors, we obtained plasma from nine patients with varying degrees of chronic kidney failure on chronic maintenance erythropoietin (EPO) therapy. EPO is a peptide hormone that specifically increases the rate of maturation and proliferation of erythrocytes in the BM^[@CR22],[@CR23]^. Samples were obtained prior to administration of EPO (day 0), and at several time points up to 30 days after treatment (see Methods). Average levels of erythrocyte transcripts across nine patients in cf-mRNA increased shortly after EPO treatment (Fig. [5a](#Fig5){ref-type="fig"}). The levels of erythrocyte transcripts continued to increase during the initial days after treatment compared to untreated control individuals (Fig. [5a, b](#Fig5){ref-type="fig"}). Indeed, key erythropoietic developmental transcripts involved in heme biosynthesis (e.g., ALAS2, HBB, HBA2) were induced in most patients (Supplementary Fig. [5A](#MOESM1){ref-type="media"}). Further, analysis of dysregulated genes (*p* \< 0.05) in plasma at days 3 or 4 after treatment with EPO using IPA (Ingenuity Pathway Analysis) showed "Heme biosynthesis II" as the top enriched pathway (*p* \< 0.001), supporting the transcriptional induction of this cell lineage. Thirty days after EPO treatment, erythrocyte transcripts returned to basal expression levels in these patients (Fig. [5b](#Fig5){ref-type="fig"} and Supplementary Fig. [5](#MOESM1){ref-type="media"}). Thus, our longitudinal studies indicate that cf-mRNA levels reflect specific transient stimulation of the erythroid cell line.Fig. 5cf-mRNA captures the transcriptional activity of hematopoietic lineages upon stimulation.**a** Blood was obtained from nine patients before (day 0) and after being treated with a single EPO dose (see Methods). Gene expression patterns in plasma cf-mRNA were analyzed using RNA-Seq. Day 0 (before EPO treatment) was used as reference for each patient, and changes in the levels of erythrocyte-specific transcripts after EPO treatment calculated. Average fold change of erythrocyte transcripts in all *n* = 9 patients subjected to EPO treatment (red) and *n* = 3 untreated controls (blue) are shown. Error bars represent standard error (SE). Source data are provided as a Source Data file. **b** Time-course analysis of erythrocyte transcripts over a 30 day period in EPO-treated patients (red). Each line represents a patient, and shows average fold change of erythrocyte transcripts over time after a single EPO dosing administered at day 0, which is used as reference. Blue lines show fluctuations of the same transcripts in untreated healthy controls. **c** Blood was obtained from three healthy patients treated with G-CSF (before treatment (day 0), and 1, 4 and 10 days after treatment). Changes in circulating transcriptome were analyzed by cf-mRNA sequencing. Relative changes of immature (red) and mature (blue) neutrophil-specific transcripts throughout the study are shown for a representative patient treated with G-CSF. Dashed red and blue lines indicate the average for each group of transcripts. Relative changes in neutrophil counts are shown in black. Source data are provided as a Source Data file. **d** Time course of indicated G-CSF-responsive genes measured by cf-mRNA-Seq. Plots show fold change over time relative to day 0. Time points are connected by lines, each line represent a patient.
As another approach to study in vivo changes in cf-mRNA upon perturbation of a cell lineage, we collected samples from three healthy patients who received G-CSF treatment, a well-known pro-survival factor for neutrophilic granulocytes. Blood was drawn before the treatment and at 1, 4, and 10 days after G-CSF stimulation (the 10-day time point and CBC could only be obtained for two patients, see Methods). As expected, neutrophil count increased after G-CSF treatment, peaking at day 4, and returned to basal levels by day 10 (Fig. [5c](#Fig5){ref-type="fig"}). Neutrophil-specific transcripts in plasma cf-mRNA showed a bimodal increase after G-CSF treatment for all patients (Fig. [5c](#Fig5){ref-type="fig"} and Supplementary Fig. [5B, C](#MOESM1){ref-type="media"}). Neutrophil progenitor-specific transcripts increased in cf-mRNA coinciding with the peak in neutrophil counts likely as a consequence of G-CSF-mediated mobilization of granulocytes from the BM into circulation (Fig. [5c](#Fig5){ref-type="fig"} and Supplementary Fig. [5B](#MOESM1){ref-type="media"}). However, mature neutrophil transcripts rapidly increase in cf-mRNA one day after the treatment, foreshadowing the peak of neutrophil counts (Fig. [5c](#Fig5){ref-type="fig"} and Supplementary Fig. [5C](#MOESM1){ref-type="media"}). This suggests a direct and transient transcriptional response of neutrophils to G-CSF. Indeed, transcripts previously reported both in vivo and in vitro to increase (e.g., IRAK3) or decrease (e.g., IFIT1) in neutrophils in response to G-CSF, followed the expected trend^[@CR24]^ (Fig. [5d](#Fig5){ref-type="fig"}). Altogether, our results indicate that cf-mRNA reflects dynamic cell-type-specific transcriptional responses to stimulation.
Discussion {#Sec7}
==========
The growing interest to identify non-invasive alternatives to standard tissue biopsies has generated enormous attention for liquid biopsies over the last decade. Initial advances in cfDNA technology have paved the way for the development of clinically applicable cf-NA-based biomarkers^[@CR25]--[@CR27]^. cfDNA offers potential advantages compared to invasive tissue biopsies; however, cfDNA analyses largely rely on mutations, polymorphisms, or structural variations, compromising its use in disease and physiological scenarios not associated with genetic differences. To partially circumvent these limitations, cfDNA methylation analyses have recently been used as a proxy of tissue-specific gene expression, but further work is needed to validate this approach^[@CR28]^. For RNA-based non-invasive biomarkers, non-coding RNAs including miRNA and lncRNA have been studied extensively in multiple diseases^[@CR29]^. While these developments in cell-free RNA are intriguing, functional annotation of non-coding RNAs remains poorly characterized. In contrast, the cf-mRNA transcriptome provides direct access to both genetic information and information pertaining to the tissue of origin and its physiology. For instance, we have shown that genetic alterations in cf-mRNA provide valuable information for monitoring allografts, and similar approaches have shown their value in diagnosing fetal chromosomal abnormalities^[@CR30]^. Given that several studies have identified tumor-derived transcripts in the circulation^[@CR14]^, the genetic information captured by cf-mRNA is of particular interest in cancer diagnosis and monitoring. In addition, cf-mRNA provides tissue-specific transcripts that reveal functional information pertaining to the tissue of origin. While further experiments in larger cohorts will be necessary to determine the clinical utility of cf-mRNA, we showed that cf-mRNA captures transcripts that reveal BM physiology. Similarly, previous studies have reported transcripts in circulation encoding functional information of the liver, brain, immune system, or fetal development^[@CR7],[@CR31],[@CR32]^. Therefore, cf-mRNA has the capability of integrating functional and genetic information of tissues, highlighting this analyte's unique potential as a non-invasive biomarker.
Another key aspect of non-invasive approaches is that by eliminating the need for surgical tissue acquisition they enable repeated, longitudinal assessment of a patient's disease state over time. This could be particularly relevant in clinical settings, such as monitoring of treatment in cancer patients, where biopsy of affected tissue remains the accepted reference method. In this regard, our longitudinal cf-mRNA profiling data provides evidence for circulating transcript snapshots of gene expression profiles in tissues such as BM. Longitudinal cf-mRNA monitoring may allow non-invasive temporal delineation of BM ablation efficiency, early detection of transplant engraftment, and monitoring of BM reconstitution. For example, in MM patients, cf-mRNA profiling integrates temporal measurement of clonal Ig transcripts generated by malignant plasma cells in the BM, with detailed BM-lineage transcriptional activity and establishment of a new immune profile. The comprehensive picture revealed by cf-mRNA profiling provides additional relevant information compared to other non-invasive tests commonly used in this malignancy, such as clonal antibody detection in serum of MM patients. Indeed, given the challenging and subjective quantification and characterization of these antibodies, BM biopsies remain a common practice in the therapy management of MM patients^[@CR33]^. In addition, unlike antibody detection, cf-mRNA profiling has the potential for early identification of suboptimal BM reconstitution, as shown by the lack of development of megakaryocyte lineage in AML patient 2. While our study is based on a limited number of patients, our data provide promising initial proof of concept of using cf-mRNA profiling to monitor BM activity, which could lead to improved therapeutic management of patients with BM disease, and eventually alleviate the need for invasive BM biopsies.
Finally, understanding the mechanisms underlying the presence of mRNA transcripts in circulation is essential to interpret their clinical value. For example, cfDNA is expected to originate primarily from dying cells^[@CR13]^; therefore, the use of this liquid biopsy likely relies on scenarios associated with cell death. While further experiments will be necessary to formally rule out the hypothesis of cell turn over as the exclusive source of cf-mRNA in vivo, our data suggest that changes in cf-mRNA levels are influenced by transcriptional changes in living cells during maturation, proliferation, and response to stimuli, without requiring cell death. For example, we showed that melphalan-induced apoptosis did not significantly increase the levels of cf-mRNA. In contrast, a large increase of transcripts in circulation was observed during BM reconstitution and upon stimulation with well-known pro-survival and antiapoptotic growth factors. Supporting our interpretation, in vitro studies indicate that extracellular mRNA levels and composition change upon cellular stimulation^[@CR34],[@CR35]^ and that living cells can secrete RNA molecules encapsulated in vesicles. Additionally, our longitudinal clinical studies demonstrate that the circulating transcriptome is a dynamic metric that allows constant measurement of tissue function over time. Alternatively, cfDNA methylation and mutation events are less dynamic and likely provide limited information on tissue homeostasis and disruption. In summary, cf-mRNA profiling may provide richer molecular content compared to other non-invasive biomarkers and constitutes a unique non-invasive interrogation of tissue function in scenarios such as monitoring of disease and drug engagement and response in patients.
Methods {#Sec8}
=======
Samples and patients {#Sec9}
--------------------
MM patients eligible for autologous marrow transplantation were recruited from the Scripps Bone Marrrow Transplant Center. Patients with non-secretory disease or plasma cell leukemia were excluded. Three total patients were enrolled with daily blood draws collected throughout the cytoreductive conditioning regiment and subsequent hospital stay. High-dose melphalan was used to ablate the marrow over a 2-day conditioning regiment, followed by transplantation of HSCs. Sequential daily collections discontinued the day of hospital discharge. Follow-up BM biopsy occurred between 60 and 90 days. Complete blood counts (CBCs) were collected as a part of the study. Plasma was processed within 2 h of blood collection and stored at −80 °C. Patient characteristics are described in Supplementary Table [6](#MOESM1){ref-type="media"}.
EPO-treated patients were recruited for study enrollment provided they were administered erythropoietin as part of routine medical care. Potential patients were excluded if they were (1) currently on any anti-cancer therapy; (2) had active hemolysis from any cause, or (3) were pregnant. Patients were consented and enrolled from the Renal and Hematology/Oncology Clinics at Scripps Clinic Cancer Center. Per standard clinical care, a single dose of EPO was administered per month. Blood was collected at day 0 (before administration of EPO), and at days 1, 4, and 10 after administration of EPO. Days 4 and 10 collections were allowed for ±1 day adjustment to accommodate patients' schedules. A subset of patients consented to an expanded protocol allowing for blood collections up to day 30. CBCs were performed as well. Plasma was processed within 2 h of blood collection and stored at −80 °C for batch processing. Patient characteristics are shown in Supplementary Table [7](#MOESM1){ref-type="media"}.
Specimens from healthy controls were obtained from the San Diego Blood Bank, processed, frozen, and stored at −80 °C for batch processing.
G-CSF patients, normal healthy individuals preparing to donate peripherally harvested stem cells for allo-transplants, were recruited from Scripps and enrolled as part of our G-CSF cohort. In total, three patients were consented and donated blood during their stem cell mobilization. Patient characteristics are shown in Supplementary Table [8](#MOESM1){ref-type="media"}. Blood was collected at day 0 (before administration of G-CSF), and at days 1, 4, and 10 after administration of G-CSF. Day 4 and 10 collections were allowed for ±1 day adjustment to accommodate patients' schedules and additionally, the day 10 collection was optional. CBCs were performed for each sample. Samples were processed within 2 h of blood collection and stored at −80 °C for batch processing.
Patients with known AML, in preparation for submyeloablative treatment and allogeneic stem cell transplantation as part of standard care, were recruited for daily blood draws throughout their treatment and stem cell transplant. Three patients were enrolled in our study (characteristics in Supplementary Table [9](#MOESM1){ref-type="media"}), and submyeloablative treatment were generally 6 days, using a combination of fludarabine and melphalan to obtain a partial ablation of the marrow, prior to transplantation. HSCs obtained from a single donor, were administered on day 0, and blood draws were continued through the hospital stay. Patient 3 was discharged by day \~15 and in-hospital collections were limited to day 45 post transplant. Follow-up routine BM biopsies were performed. CBCs were collected. cf-mRNA was sequenced every 3 days. Plasma was processed within 2 h of blood collection and stored for batch processing.
Patient consent {#Sec10}
---------------
All studies were approved by their respective institutional IRBs and patients consented according to submitted study protocols. We have complied with all relevant ethical regulations. Molecular Stethoscope maintained approval for blood collection and research through Western IRB Protocol \#20162748, under which healthy control samples were collected. In collaboration with the Scripps Cancer Center and the Blood & Marrow Transplant Program at Scripps Green Hospital, G-CSF and EPO studies were conducted under Scripps Institutional Review Board-approved protocol IRB-16-6808. Our studies involving hematopoietic BM transplants, for both MM and AML, were approved by and conducted in accordance with Scripps IRB Protocol IRB-17-6953, in collaboration with the same groups.
Sample processing {#Sec11}
-----------------
Blood samples were collected in EDTA tubes (BD \#366643) for plasma processing or in BD Vacutainer red-top clotting tubes (BD \#367820) for serum processing. The biofluid used in each experiment is indicated in the main text as well in the corresponding cohort details in this section. Blood samples were kept at room temperature and samples were processed within 2 h after blood draw. Plasma and serum volume ranging from 500 μl to 1 ml was used for the extractions. Samples were first centrifuged at 1900 × *g* for 10 min. Plasma and serum were separated into new tubes. To remove cell debris, we subsequently centrifuged serum/plasma at 16,000 × *g*. For cancer patient plasma samples (MM and AML), the second centrifugation step was performed at 6000 × *g*. Plasma/serum samples were immediately frozen and stored at −80 °C. Freeze/thaw cycles were avoided. Buffy coat samples were obtained by isolating the buffy coat layer enriched in white blood cells after initial centrifugation of blood samples. Nucleic acids were isolated from plasma/serum using the Circulating Nucleic Acid Kit (Qiagen). ERCC RNA Spike-In Mix (Thermo Fisher Scientific, Cat. \#4456740) was added during the extraction process as an exogenous spike-in control according to manufacturer's instruction (Ambion). Nucleic acids from WB and buffy coat samples were extracted with TRIzol LS (Thermo Fisher) following the manufacturer's instructions. Subsequently, RNA and cf-RNA samples were incubated for 25 min with 3 μl of the inhibitor resistant rDNase (Turbo DNase, Invitrogen) to eliminate any remnant DNA and concentrated afterwards. RNA was eluted in 15 μl of RNase free water. The amount, size, and integrity of cf-RNA was estimated by running 1 μl of the sample in an Agilent RNA 6000 Pico chip using a 2100 Bioanalyzer (Agilent Technologies) and confirmed by quantitative PCR (qPCR). Twenty-five to thirty percent of the cf-RNA eluate was converted to cDNA using random hexamers, NGS libraries were generated and whole-exome was captured prior to Illumina sequencing. Libraries were quantified by qPCR with Kapa Quantification Kit (Kapa) and in a Quantifluor (Agilent Quantus Fluorometer, Promega) using QuantiFluor ONE dsDNA Kit (Promega), and library size was checked on the Bioanalyzer (Agilent Technologies) using high-sensitivity DNA chips (Agilent Technologies). Samples were pooled and sequenced on a NextSeq 500 (Illumina) platform according to the manufacturer's instructions.
Sequence data processing, alignment, and quantification {#Sec12}
-------------------------------------------------------
Base calling was performed on an Illumina BaseSpace platform, using the FASTQ Generation Application. Adaptor sequences are removed and low-quality bases trimmed, using cutadapt (v1.11). Reads shorter than 15 base pairs were excluded from subsequent analysis. Read sequences are then aligned to the human reference genome GRCh38 using STAR (v2.5.2b) with GENCODE version 24 gene models. Duplicated reads are removed by invoking the samtools (v1.3.1) rmdup command. Gene expression levels were inferred from de-duplicated BAM files using RSEM (v1.3.0).
Differential expression analysis {#Sec13}
--------------------------------
Differential expression analysis between different conditions was performed using DESeq2 (v1.12.4). RSEM-estimated read counts are used as input for DESeq2. Genes with fewer than 20 reads across the samples are excluded from this analysis. Potential Gene Ontology enrichment and involvement on biological pathways of genes were examined using the R package limma (v3.28.21) and IPA software (Qiagen)
Cell-type-specific genes {#Sec14}
------------------------
Tissue (cell-type)-specific genes are defined as genes that show much higher expression in a particular tissue (cell type) compared to other tissues (cell types). Information about tissue (cell-type) transcriptome expression levels was obtained from the following two public databases: GTEx^[@CR36]^ for gene expression across 51 human tissues and Blueprint Epigenome^[@CR37]^ for gene expression across 56 human hematopoietic cell types. For each gene, the tissues (cell types) were ranked by their expression of that particular gene, and if the expression in the top tissue (cell type) is \>20-fold higher than all the other tissues (cell types), the gene was considered specific to the top tissue (cell type). For the establishment of BM-enriched transcripts, we performed RNA-Seq on a commercial human BM total RNA sample. Subsequently, BM transcriptome was compared to WB transcriptome to identify genes enriched in BM and WB transcriptomes (fold change \>5).
Immunoglobulin gene repertoire in MM patients {#Sec15}
---------------------------------------------
For clone-type assembly, we performed de novo transcriptome assembly using Trinity. Next, the assembled contigs were compared to Ig gene annotation database IMGT^[@CR38]^ using igBLAST (v2.5.1) to identify the V(D)J combinations. To quantify the relative abundance of variable region genes, we collected reads that were either unaligned to the human reference genome or aligned to an annotated Ig gene by STAR and add them to the sequences in the IMGT database using igBLAST. Relative abundance was calculated as the ratio of the number of reads mapped to a particular Ig gene over the total number of reads mapped to any Ig gene.
Unsupervised clustering {#Sec16}
-----------------------
Genes that met the following two criteria were selected for clustering: (1) the maximum expression across time points higher than 50 TPM; (2) the ratio of the highest expression over the lowest was \>5. For each of the selected genes, the expression values were normalized by dividing each value by the maximum value across all time points. The purpose of this normalization was to bring all the genes to a comparable scale and focus on their relative changes across time points instead of their absolute expression levels. *K*-means and hierarchical clustering were then performed to find genes that share similar temporal expression patterns.
Non-negative matrix factorization {#Sec17}
---------------------------------
Genes whose expression was lower than 20 TPM in all samples were excluded from the decomposition analysis. For each of the remaining genes, the expression values were normalized by dividing each value by the maximum value across all samples. The purpose of this normalization step is to bring all the genes to a comparable scale. NMF was then performed on the normalized values to decompose the genes into 8--12 components. NMF decomposition was implemented by invoking the "decomposition.NMF" class in the sciki-learn Python library. NMF decomposition creates groups of genes (components) sharing similar expression patterns (correlated across samples) in an unsupervised manner, thereby revealing underlying structures within the data. In order to better annotate the discovered components, we selected genes enriched in a particular component (i.e., those genes that have the highest loadings within the component) and examined (1) their expression levels across 51 human tissues in GTEx; (2) their expression levels across 55 human hematopoietic cell types from the Blueprint Epigenome consortium; (3) their Gene Ontology functional enrichment. If most of these genes show high expression in a certain cell type (e.g., platelet) or are enriched in certain biological processes (e.g., platelet activation and coagulation), we will designate the component accordingly (e.g., megakaryocyte component). By integrating those three sources of information, we are able ascertain the tissue/cell-type origin for most components.
Reporting summary {#Sec18}
-----------------
Further information on research design is available in the [Nature Research Reporting Summary](#MOESM2){ref-type="media"} linked to this article.
Supplementary information
=========================
{#Sec19}
Supplementary Information Reporting Summary
Source data {#Sec20}
===========
Source Data
**Peer review information** *Nature Communications* thanks Irene Ghobrial and the other, anonymous, reviewer(s) for their contribution to the peer review of this work.
**Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
These authors contributed equally: Arkaitz Ibarra, Jiali Zhuang, Yue Zhao.
Supplementary information
=========================
**Supplementary information** is available for this paper at 10.1038/s41467-019-14253-4.
We thank Guillermo Elias, Richard Rava, Teresa Wright, and John Sninsky for conceptual discussions and critical reading of the manuscript. We also thank Ruben Rodrigues and Brian Read at the Development Research Services of the San Diego Blood Bank for assistance with sample sourcing.
Conceptualization: M.N., A.I.; methodology: A.I., N.S.S., J.Z., Y.Z.; investigation: A.I., V.H., A.D.A., A.P.K., L.G., J.R.P., and I.P.; writing: A.I., J.Z., S.T.; samples and resources: J.A., T.S.N., M.N., J.M., D.S.; funding acquisition: T.S.N., M.N., J.A., S.R.Q; visualization: J.Z., S.T., Y.Z., A.D.A., A.I.; formal analysis: J.Z., Y.Z; project administration: A.I., J.A.; supervision: A.I., M.N.
RNA-Seq datasets have been deposited online in Sequence Read Archive (SRA) under accession numbers PRJNA517339. Source data underlying Figs. [1](#MOESM3){ref-type="media"}B--F, [4](#MOESM3){ref-type="media"}A, [5](#MOESM3){ref-type="media"}A, C and Supplementary Figs. [1](#MOESM3){ref-type="media"}D, E are provided as a Source Data file.
Custom code used during the current study are also available at Bitbucket https://MS_JialiZhuang\@bitbucket.org/MS_JialiZhuang/naturecomm2019-related-codes.git.
A.I., Y.Z., N.S.S., J.Z., J.R.P., V.H., S.T., L.G., I.P., A.D.A., A.P.K., J.A., D.S., T.S.N., S.R.Q., and M.N. declare a competing interest as stakeholders, past or current employees at Molecular Stethoscope, Inc., or members of its scientific advisory board. J.M. declares no competing interests.
|
In this article, you will learn about why internal QuickBooks error comes out while accessing your QuickBooks Company Files, how you can resolve it by yourself and what are the possible reasons behind this error.
An internal QuickBooks error occurred while making an attempt to access the QuickBooks company record:
Error Message:
If you’re seeing the error “An internal QuickBooks error occurred whereas making an attempt to access the QuickBooks company information file” in their QBPOS adjust app, please follow these steps.
Resolution:
Close all files and restart the PC. once the PC is back on, reopen the QBDT Company file associate degreed QBPOS synchronize app and stay up for synchronizes to begin once more (please note – this might take up to an hour).
How To Verify QuickBooks?
Go to the QuickBooks Desktop File menu, select Utilities, and Verify Data. Whenever provoked, play out a remake of the document. Observe in the event that you experience any mistakes subsequent to rebuilding the document. Doing some financial Exchange again. if the issue still occurs, proceed to the next solution.
How To Remove Point Of Sale From The Integrated Application List
In QuickBooks Desktop: From the Edit menu, click Preferences.
On the left sheet, pick Integrated Applications at that point go to the Company Preferences tab.
Select Point of Sale from the list and snap Remove > OK. In QuickBooks Point of Sale: From the File menu, select Preferences at that point click Company.
In the Company Preferences window, click Financial.
You should see a container that shows setting up QB association.
At the point when the container vanishes, the association has been effectively
settled. On the off chance that there are issues, adhere to the on-screen directions on the association wizard. Perform a financial exchange and check for blunders. On the off chance that the issue persists, try the next solution.
How To Exchange Preference
in QuickBooks Point of sale Desktop: From the File menu, select Preferences at that point click Company.
at that point click Company. In the Company Preferences window, click Financial .
. In the event that sends receipts and vouchers with is set to Detailed thing portrayals, change it to Summarized thing sums. In the event that it is set to Summarized, change it to Detailed. Snap Save.
Return to the preference and change it back to the first set at that point click Save. Perform a financial exchange and check the errors. If you encounter any error, visit our website to contact technical support.
Related article: How to fix Errors: 12002, 12007, 12009, 12029, or 12031 when updating QuickBooks
What happens to your company data?
If you cancel your QuickBooks subscription or your trial period expires and if your credit card expires or is declined and not updated:
All recurring transactions stop.
All automated invoices stop.
You can’t edit or add data, but you can read data and run reports.
Your company’s QuickBooks data is read-only for a period of time and deleted after it. The period of time depends on your situation:
If your trial expires, the period is 90 days.
If you cancel your trial, the period is 0 days. But if you’re subscribing to another QuickBooks service, the period is 30 days.
If you cancel your subscription, the period is one year.
If there’s a problem with your credit card, you have a 14-day grace period without any restrictions. After that, you’ll have a 90-day read-only period.
Related article: Fix QuickBooks Error 404
Points to keep in Mind while troubleshooting error
Before you cancel, we recommend that you print all QuickBooks forms that you might need.
Direct Deposit will be canceled if you cancel QuickBooks.
If you terminate your business, you must provide Forms W-2 to your employees for the calendar year of termination by the due date of your final Form 941. You must also file Forms W-2 with the Social Security Administration (SSA) by the last day of the month that follows the due date of your final Form 941.
Dial QuickBooks Error Support Number for information about filing Forms W-2 for the current year.
Fix QuickBooks Forms 941 Error
The user of QuickBooks faces the form 941 error when the total amount of sum of the taxes in a quarter exceeds $2500. According to the employer tax guide, when the tax exceeds the amount of $2500 then form 941 is required in QuickBooks. If the tax amount is less than $1000 then QuickBooks is required to fill the 944 forms after confirming with IRS (Internal Revenue Service).
Method 1: Modify the Faulty filing method
You can review if there is any incorrect filing method that is causing the QuickBooks form 941 error.
First, open QuickBooks software and then Under the employee tab, click on the Payroll Tax forms and W-2 forms.
After that, click on the Process Payroll Forms , and then go to File Forms>Other Activities>Change Filing Method.
, and then go to Then carefully follow the on-screen instructions and then click Continue .
. Next, select the form 941 that is causing the error in QuickBooks and then click on Edit .
. Under the Filing Methods , select the Print and Mail option.
, select the option. At last, click on the Finish and then try to send forms again.
If you are still facing the QuickBooks form 941 Error then try next method to fix it.
Method 2: Update QuickBooks Payroll to the latest release.
Once you updates the QuickBooks Payroll to the latest release available then you can easily get most recent and accurate rates of calculation for federal tax table, payment option, and E-file.
To know more, you can checkout our article on how to update QuickBook Payroll.
Method 3: Try to Print Tax Forms Again
After you finished updating the QuickBooks Payroll to the latest release, you can again try to print forms to check whether QB 941 Form error is fixed or not. Follow the below mentioned steps carefully to do this.
First, open QuickBooks software and then from the Employee tab, select the Payroll Tax forms and W-2s option.
tab, select the option. After that go to Payroll Forms>Payroll Centre>File Forms.
Here, you need to choose the form that you want to file.
Then, select the File Form option and enter the time period for filing the form.
option and enter the time period for filing the form. Next, click on the OK button and check if there are any errors or not.
button and check if there are any errors or not. Then, review the entire form and find if there are any errors. If there is any error then fix it and continue.
After that, click on the Submit button and then E-file the form.
button and then the form. Now, follow the on-screen instructions carefully in order to submit the form without any error.
At last, check whether QuickBooks form 941 error still persists or not.
Error: “Please start QB and open your company file before continuing”
If you’re exploitation Microsoft prospect or seven, please make sure that you have User Account Management (UAC) set to On or Always advise, and ensure group action professional Importer/Exporter is logged into the QuickBooks file at the Admin permission level.
Make sure that each QuickBooks and group action professional are not being started with the crosscut security tab possibility “Run as Administrator. The QBSDK needs non-elevated Windows permissions for each product and this box must not be checked.
An internal QuickBooks error occurred while trying to access the QuickBooks company data file.
Problem Description:
When using QuickBooks Premier 2007 Canadian Edition and QODBC 7.0.0.214. We try to connect to the QB database with the help of the ADODB Connection object using below connecting.
Connection String: “DSN=QB;DFQ=C:Sample.qbw”
But with above connection string, connection unable to establish and QODBC gives an error message “An internal QB error occurred while trying to access the QuickBooks company data file.”
However, the connection successfully created for the same database in VB DEMO.
Solution:
When you use a DFQ= value in a connection string, QuickBooks must be closed and the company file must load in unattended mode.
Above we’ve mentioned major internal QuickBooks errors along with the QuickBooks form 941 error. But if you are still facing any error or issue then dial QuickBooks Tech Support phone number +1-855-441-4417 to get the information you need. Our experienced technicians can resolve any QuickBooks error instantly. |
Contents
Vadim once worked in the Louvre Palace before he decided to leave after stealing a diamond pendant from the Royal Vault. From then onwards he plotted to return to the Vault to steal the rest of the wealth by hiding under the guise of someone who wanted a better France.
Believed to be plotting to produce gunpowder for an unknown plot, the Musketeers had D'Artagnan arrested in order to infiltrate Vadim and discover his plans. While locked up, Vadim often played with a golden coin and showed D'Artagnan the trick of making it disappear. Getting closer to D'Artagnan, Vadim revealed that he was going to be to walk out of the prison in daylight without any resistance. Pretending to have a fit, he succeeded in fooling the Jailer, knocking him out and stealing his keys.
Vadim and D'Artagnan escape the Chatelet.
By releasing more prisoners with the help of D'Artagnan, Vadim was able to cause a distraction while they escaped around the front of the prison. In an attempt to open the gates, Vadim wrapped his chains around the neck of Queen Anne and threatened to hurt her if they did not open them. Treville ordered a man to the gate, and Vadim's allies, lead by Felix, arrived. On horseback, Vadim escaped with his new accomplice, D'Artagnan.
Hidden in a secret location, Felix cut the chains from Vadim's hands and feet. In order to check how trustworthy D'Artagnan was, he threatened to sever the fingers from his hand, one by one. When D'Artagnan didn't flinch, Vadim realised that he was clean. Releasing him from the chains, the criminal explained that he wanted to rebuild France where the poor and dispossessed would be able to rise up against the hierarchy.
The following night, Vadim left the hideout to visit his mistress, Suzette Pinault, unaware that he had been followed by D'Artagnan. He later told D'Artagnan not to leave the hideout without asking permission first. By showing him a map of his plans, Vadim was able to explain the plot for the assassination. He gave D'Artagnan the map to help him later. Secretly, he knew about D'Artagnan's treachery. In a secret meeting with his followers, Vadim knocked out the Musketeer in an attempt to stop any foil in their plan.
On the day of reckoning, Vadim set alight a candle that would burn for exactly fifteen minutes and light the explosives, killing the King and Queen during the Easter mass ceremony. Whilst his followers were distracting the King, Queen and Musketeers at the Notre Dame, Vadim infiltrated the palace to steal the riches in the vault. Stealing jewels from the vault, Vadim was able to escape as his final explosion initiated, knocking out the Musketeers who had dared to follow him.
In an underground passage, Vadim made his escape, but met his follower, Felix en route. Threatened by him for betraying his followers, Vadim stabbed the man in his heart first. Proceeding through the tunnel, Vadim was confronted by D'Artagnan, who wounded him badly in a fight. On the shores of the river, Vadim fell and died of his wounds.[1]
Vadim was a very complex individual. Selfish and cunning, he masterminded a great plan in his early life, which he would later bring to life many years later. Ultimately, he was very good at manipulating people, including his accomplice Felix, and his enemy D'Artagnan. Despite this, he enjoyed manipulating so much, that he provided a weakness for himself. Every decision that he made, showed how knowledgable and intelligent he was, even managing to thwart and confuse the Musketeers. [1]
He has an almost heartless character, as he gathers a number of followers, whom he later betrays and leaves behind. Not to mention his consort, Suzette, who was left for dead. He even killed his own accomplice, Felix, when they learnt of his betrayal. But, his mind was corrupted by greed and power, which in the end proved that he was a short-minded criminal.[1] |
Esophageal cancer is the eighth most common cancer worldwide and the sixth leading cause of death from cancer. The 2 main histologic types are squamous cell carcinoma and adenocarcinoma. Approximately 90% of cases are esophageal squamous cell carcinoma (ESCC). The survival of patients with ESCC is very poor, largely due to the late development of symptoms and consequent late diagnosis.[@R1],[@R2]
Endoscopy is a useful technique for the diagnosis of precancerous esophageal lesions and early cancer. Such lesions may be obscure during screening with white-light endoscopy (WLI), whereas chromoendoscopy techniques have been proven to improve performance of the test.[@R3],[@R4] Computed virtual chromoendoscopy from Fujifilm, called "Flexible spectral imaging color enhancement (FICE) or Fuji intelligent chromoendoscopy," reconstructs the image and displays what the mucosa would look like if it were illuminated using a particular wavelength.[@R5] Moreover, the simplest and most effective method for detecting precancerous lesions and early esophageal cancer is Lugol's chromoendoscopy (LCE).[@R6] Although LCE increases the sensitivity of WLI to \>95%,[@R7] it is uncomfortable for most patients and can cause inflammation of the esophageal mucosa. Above all, the indication of LCE has not yet been well established. It is therefore, important to make the indications for LCE clear and to apply them to high-risk groups.
Oral leukoplakia is an established precursor lesion associated with a high risk of oral squamous cell carcinoma,[@R8] and oral leukoplakia is associated with an increased risk of ESCC, particularly in younger people.[@R9],[@R10] Esophageal leukoplakia presents as a "white patch" in the esophageal mucosa that cannot be washed out with water, and its significance has been underestimated. Esophageal leukoplakia is not an unusual phenomenon in Chinese elders during endoscopy screening. Routine LCE has not been performed in most endoscopic centers for each patient with esophageal leukoplakia. FICE has some advantages in determining the shape of a lesion and delineating the lesion's margins. Pale areas via FICE nearly corresponded to esophageal leukoplakia via WLI in our earlier observations, and pale areas were more frequently detected than esophageal leukoplakia because the definition of FICE was higher than that of WLI. We tried to elucidate the necessity of LCE in patients with esophageal leukoplakia or pale areas.
MATERIALS AND METHODS
=====================
From May to August 2017, all general patients at our endoscopic center who fulfilled our inclusion criteria were enrolled for screening. All gave their informed consent. Endoscopic screening was performed with a single channel gastroscope (EG450; Fujifilm Co, Tokyo, Japan). The esophageal mucosa of each patient was initially studied with WLI and FICE sequentially during endoscopic insertion. The wavelengths of FICE were set as follows: Red, 550 nm (2); Green, 500 nm (2); Blue, 470 nm (3). During withdrawal, 20 to 40 mL of 1.5% iodine solution was sprayed onto the esophageal mucosa until it was evenly stained. The esophagus was divided into 3 segments---upper, middle, and lower---according to 2 landmarks 24 and 32 cm from the incisors. Endoscopic images of each lesion were captured 2 to 3 minutes after iodine staining. The number and location of esophageal leukoplakia and pale areas, abnormal staining regions in each segment, were immediately recorded by an assistant. Biopsies with clear margins were obtained from unstained regions. All biopsies were sent for pathologic diagnosis. The pathologist was blinded to the endoscopic results.
Inclusion Criteria
------------------
Age range from 40 to 80 years.No melena, hematemesis, or shock.No cardiac, pulmonary, hepatic, or renal dysfunction.No coagulopathy.No female patients who were pregnant or preparing for pregnancy.No allergy to iodine.
We compared the following items in the esophageal leukoplakia-positive and leukoplakia-negative groups and in the pale area--positive and pale area--negative groups:Common conditions.Cases with abnormal staining regions.Total number of abnormal staining regions in each patient.Total biopsies in each patient.Cases of dysplasia or early-stage cancer.
Statistical Analyses
--------------------
The statistical analyses were performed using the SPSS 22.0 software package (SPSS, Chicago, IL). Comparisons between groups were performed using Student's *t* test or the *χ*^2^ test. Total areas of abnormal staining and total biopsies in each patient were analyzed using the Mann-Whitney test. The sensitivity, specificity, and area under the receiver operating characteristic curve were used to assess the accuracy of classification.
RESULTS
=======
A total of 201 patients were enrolled in the study.
Table [1](#T1){ref-type="table"} showed demographic and histology data of the 201 patients and their WLI and FICE results.
######
Demographic and Histology Data of the 201 Patients and their WLI and FICE Results

Table [2](#T2){ref-type="table"} showed distribution of esophageal leukoplakia, pale areas, dysplasia, and ESCC in the esophagus.
######
Distribution of Esophageal Leukoplakia, Pale Areas, Dysplasia, and ESCC in the Esophagus

Both esophageal leukoplakia and pale areas were more frequently detected in middle segment of esophagus. Esophageal leukoplakia in 68 patients and pale areas in 73 patients were distributed in ≥2 segments. Dysplasia of different grades and early-stage ESCC were most frequently found in the middle segment of the esophagus. The average age of patients with dysplasia or ESCC was greater than that of patients without dysplasia or ESCC (61.06±7.779 y vs. 59.58±10.194 y, *P*=0.004). There were no gender difference between patients with or without dysplasia or ESCC (37:35 vs. 54:75, *P*=0.237).
Figures [1](#F1){ref-type="fig"}--[3](#F3){ref-type="fig"} showed esophageal leukoplakia via WLI in the lower segment of the esophagus, pale area via FICE, and dark brown area via LCE in the same position, respectively.
{#F1}
{#F2}
{#F3}
Table [3](#T3){ref-type="table"} showed the differences in groups with or without esophageal leukoplakia, or in groups with or without pale areas.
######
Differences in Groups With or Without Esophageal Leukoplakia, or in Groups With or Without Pale Areas

Areas of abnormal staining in the esophageal leukoplakia-positive group were significantly more numerous than those in the esophageal leukoplakia-negative group (*Z*=7.289, *P*=0.000); biopsied areas in the esophageal leukoplakia-positive group were significantly more numerous than those in the esophageal leukoplakia-negative group (*Z*=7.463, *P*=0.000). Areas of abnormal staining in the pale area--positive group were significantly more numerous than those in the pale area--negative group (*Z*=12.127, *P*=0.000); biopsied areas in the pale area--positive group were significantly more numerous than those in the pale area--negative group (*Z*=9.558, *P*=0.000).
Figure [4](#F4){ref-type="fig"} showed receiver operating characteristic curves of esophageal leukoplakia and pale area for the detection of dysplasia and early-stage ESCC.
{#F4}
The sensitivity of esophageal leukoplakia for the detection of dysplasia and early-stage ESCC was 70.0% (35 and 50) with a specificity of 78.8%; the sensitivity of pale area for the detection of dysplasia and early-stage ESCC was 76.0% (38 and 50) with a specificity of 75.5%.
DISCUSSION
==========
Esophageal cancer is the fourth most frequently diagnosed cancer and the fourth leading cause of death from cancer in China.[@R11],[@R12] Endoscopy is the gold standard for the diagnosis of precancerous squamous lesions. Early detection of ESCC and precancerous lesions is directly related to an improved prognosis. Therefore, a major target of endoscopic screening is to identify these lesions, resect them endoscopically, and/or review them regularly. Unfortunately the early lesions are asymptomatic, and changes in the mucosa are subtle, so that these conditions can easily go unnoticed during a standard endoscopic examination. As a result, it has been suggested that chromoendoscopy techniques could improve diagnostic outcomes. The simplest and most effective way of detecting squamous dysplasia is via LCE.[@R13]--[@R15] It can delineate the margin and significantly improve the endoscopic detection of precancerous or cancerous squamous lesions. The sensitivity and specificity of WLI for the detection of high-grade dysplasia and cancer are 62% and 79%, respectively, compared with the use of LCE, which has a much higher sensitivity of 96% at the expense of a slight loss of specificity of 63%, when using LCE.[@R7] Sometimes endoscopists are reluctant to perform LCE because of patient discomfort. A low concentration of iodine can reduce the severity of esophagitis and increase patient compliance. Application of sodium thiosulfate solution can also reduce the adverse effects of LCE and accelerate color fading by reduction of the iodine.
Immediately after spraying of the iodine solution, normal mucosa turned brown, whereas the abnormal mucosa suggestive of dysplasia or cancer turned yellow. Within 2 to 3 minutes, some of the yellow areas changed to pink, which was defined as the "pink-color sign," or positive.[@R16] "Pink-color sign" is an important indication of high-grade dysplasia or cancer, however, this change in color may not appear with mild or moderate dysplasia. One study showed that esophageal squamous dysplasia seems to progress over months to many years depending on the grade. Among those in a high-risk Chinese population, untreated patients with biopsy-proven mild, moderate, and severe squamous dysplasia who were followed endoscopically, 5%, 27%, and 65%, respectively, developed clinically diagnosed ESCC after 3.5 years, and 24%, 50%, and 74% did so after 13.5 years, respectively. Another reported follow-up of patients with moderate or severe dysplasia showed that 22% with moderate dysplasia and 60% with severe dysplasia showed endoscopic (size) or histologic progression during the follow-up period.[@R17]--[@R19] Therefore, based on the high cumulative incidence, it is probable that severe dysplasia requires prompt treatment, moderate dysplasia requires treatment or periodic endoscopic follow-up, and mild dysplasia can be followed over longer intervals.
It is known that a significant proportion (up to 62%) of oral squamous cell carcinomas arise from precursor oral potential malignant lesions, such as leukoplakia.[@R8],[@R20] Esophageal leukoplakia are also associated with esophageal cancer. In our experience, esophageal leukoplakia can be classified histologically as nondysplastic or dysplastic, including squamous hyperplasia, chronic inflammation, papillary epithelioma, eosinophilic esophagitis, and squamous dysplasia and early cancer squamous. Squamous hyperplasia is one of the most common benign types and present as "dark brown area" during LCE. The same as ESCC, esophageal leukoplakia, or pale areas, are more often detected in the middle segment of the esophagus. Frequently, esophageal cancer or precancerous lesions occurred close to or in the "dark brown area" in our endoscopic examination. Esophageal leukoplakia and pale areas can serve as markers for a field defect where unstained lesions are more common.
FICE digitally limits the wavelength range of the light and offers images with bright color and high light quality. Meanwhile, FICE can be activated during endoscopic screening without the need to interrupt the process.[@R21] Pale areas, which have clear margins and bright colors, can be easily detected in the spot of esophageal leukoplakia with adequate wavelengths of FICE. In our research, we found pale areas are more sensitive than esophageal leukoplakia in predicting precancerous squamous lesions. Thus, FICE may have some advantages in screening ESCC.
Our study has some limitations. First, it is a research from a single endoscopic center in China. Second, it is not based on a crossover design. Nevertheless we can draw 2 definite conclusions: esophageal leukoplakia or pale areas are associated with precancerous squamous lesions and ESCC. At least in a high-risk population, LCE should be performed when pale areas are detected via FICE, or esophageal leukoplakia are detected via WLI.
The authors would like to thank LetPub (<http://www.letpub.com>) for providing linguistic assistance during the preparation of this manuscript.
Y.L., C.Y., and Y.S. contributed equally.
The research were supported by Key clinical project of Peking University Third Hospital, No Y73480-03, and special fund project for the development of human resources in Tibet Autonomous region, No 20. Key Laboratory for Helicobacter pylori Infection and Upper Gastrointestinal Diseases in Beijing, No. BZ0371.
The study follows the Helsinki Declaration.
The authors declare that they have nothing to disclose.
|
Cutest Puppies
Stunning Yorkshire Terrier Dog Images & 4K Wallpaper Today We Are Having For All Our Viewers. We Shared This Post On The Special Demands Of Our Viewers If You Like This Post Then Please Comment On It And Share This Post With Your Friends And relatives. We Hope All Of Read more…
Stunning Golden Retriever Dog Images & 4K Wallpaper Today We Are Having For All Our Viewers. We Shared This Post On The Special Demands Of Our Viewers If You Like This Post Then Please Comment On It And Share This Post With Your Friends And relatives. We Hope All Of Read more…
Dangerous Rottweiler Dog Images & 4K Wallpaper Today We Are Having For All Our Viewers. We Shared This Post On The Special Demands Of Our Viewers If You Like This Post Then Please Comment On It And Share This Post With Your Friends And relatives. We Hope All Of You Read more…
Tremendous Labrador Retriever Dog Images & 4K Wallpaper Today We Are Having For All Our Viewers. We Shared This Post On The Special Demands Of Our Viewers If You Like This Post Then Please Comment On It And Share This Post With Your Friends And relatives. We Hope All Of Read more… |
#!/bin/sh
if [ -x ./packaging/update-tags ]
then
exec git diff HEAD^ | ./packaging/update-tags -
fi
|
//! Some functions to use in tests.
use engine_wasm_prep::wasm_costs::WasmCosts;
use types::{account::AccountHash, contracts::NamedKeys, AccessRights, Key, URef};
use crate::{account::Account, stored_value::StoredValue};
/// Returns an account value paired with its key
pub fn mocked_account(account_hash: AccountHash) -> Vec<(Key, StoredValue)> {
let purse = URef::new([0u8; 32], AccessRights::READ_ADD_WRITE);
let account = Account::create(account_hash, NamedKeys::new(), purse);
vec![(Key::Account(account_hash), StoredValue::Account(account))]
}
pub fn wasm_costs_mock() -> WasmCosts {
WasmCosts {
regular: 1,
div: 16,
mul: 4,
mem: 2,
initial_mem: 4096,
grow_mem: 8192,
memcpy: 1,
max_stack_height: 64 * 1024,
opcodes_mul: 3,
opcodes_div: 8,
}
}
pub fn wasm_costs_free() -> WasmCosts {
WasmCosts {
regular: 0,
div: 0,
mul: 0,
mem: 0,
initial_mem: 4096,
grow_mem: 8192,
memcpy: 0,
max_stack_height: 64 * 1024,
opcodes_mul: 1,
opcodes_div: 1,
}
}
|
Rapid characterisation and identification of mycobacteria using fluorogenic enzyme tests.
Sixty representatives of selected Mycobacterium and Nocardia species were examined for their ability to cleave 79 fluorogenic synthetic enzyme substrates based on the fluorophores 7-amino-4-methylcoumarin and 4-methylumbelliferone. The resultant data were analysed using the simple matching coefficient and clustering achieved using the unweighted pair group method with arithmetic averages algorithm. Clusters corresponding to the validly described species Mycobacterium bovis, M. chelonae, M. chitae, M. farcinogenes, M. fortuitum, M. peregrinum, M. senegalense, M. smegmatis, Nocardia asteroides, and N. farcinica were circumscribed at or above the 83% similarity level. Fluorogenic probes prepared from 7-amino-4-methylcoumarin and 4-methylumbelliferone provide a rapid means of detecting taxonomically useful enzymes in small amounts of whole mycobacteria and nocardiae. |
Is intravenous cholangiography still useful?
A retrospective study was performed to determine the usefulness of the intravenous cholangiogram for evaluation of common bile duct disease. Using interpretations obtained by chart review, 128 intravenous cholangiograms were categorized according to common bile duct visualization. Fifty-five percent of the studies were considered technically adequate for interpretation, while 23% and 22% were suboptimal and nondiagnostic, respectively. The intravenous cholangiogram diagnoses were verified when possible by comparison with the findings of: (a) endoscopic retrograde cholangiography, (b) operative cholangiography, (c) choledochotomy, or (d) autopsy. In verified studies of adequate intravenous cholangiograms, the diagnostic error rate was 40%, largely owing to missed stones. We conclude that the intravenous cholangiogram is usually unreliable for biliary tract evaluation, and should be replaced by alternative studies such as endoscopic or transhepatic cholangiography. |
Localization of the glycosaminoglycans in the synovial tissues from osteoarthritic knees.
Localization of the glycosaminoglycans (GAG) was examined in the synovial membranes of patients with osteoarthritis under light microscopy using a fine cationic colloidal iron staining method combined with enzymatic digestion. Our staining method was very useful for demonstrating the difference in the localization of GAG in regions of the inflammatory site in the osteoarthritic synovial membrane. Hyaluronic acid was mainly located in connective tissues in the surface intercellular and perivascular spaces, chondroitin sulfate A/C in the highly fibrous part of and connective tissue around blood vessels, dermatan sulfate (chondroitin sulfate B) in the subsurface interstitium and vascular endothelial cells and heparan sulfate in part of vascular endothelial cells. No keratan sulfate was detected. GAG is reported to have an important role in cell movement, adherence and aggregation in the inflammatory sites. These findings should be useful for understanding the role of GAG in physiological and pathologic processes of secondary synovitis. |
This is the LOVEJIHADI blog and I am currently reporting from the cyber-frontlines in the many contested Muslim worlds. Follow me on twitter @parvezsharma or join me on Facebook at Parvez Hussein Sharma and try to watch A JIHAD FOR LOVE
Ground-breaking new FILM and BOOK coming soon, and when that happens I will blog more often.
30.4.08
Most places in the so called 'East/ Third World/ Global South' (categories I disagree with) call this land where I live 'Amreeka'.
Many have asked why I continue living here. I do still believe in the hope of the American Dream. And I know so does Obama. If he gets the nomination, I cannot wait to see Republican Ad campaigns where the graphic will dissolve slowly from Osama to Obama. This is a very interesting year to be in Amreeka and for me, with a green card application pending-an interesting year to release this film.
So I came back on Friday from a seven nation tour that ended with winning the best documentary award at a gay film festival in Turin, Italy.I went straight to Washington, DC where I was able to show the film to more than a hundred young and enthusiastic Amnesty International volunteers crowded into a screening room, where we projected on double screens. A 45 minute question and answer session followed and also in the audience was Ajaz Ahmed from Kashmir (he corrected me when I said he was from India). Ajaz was vocal with what we in the West would easily label his 'homophobia'. He looked at me in this packed room and said-'Parvez, now Islam is under attack-so people can say that Muslims are theives, liars, prostitutes, terrorists and gay and lesbian'. The audience giggled nervously. I chose to engage Ajaz in conversation and congratulated him on his courage of speaking out in a room where not one person would agree with him. His logic was exceptional because he was fundamentally aware of the Islamophobia of the times we live in. He was also exceptional in including the word 'terrorists' in the same old Adam and Steve like argument that the Christian Church spouts. I will always remember Ajaz, with his Wahabi style beard and his red t-shirt. I hope he takes back to India, a better understanding of our complicated Islamic universe.
I went on to a small liberal arts college of 1600 students near Austin, Texas. An amazing discussion followed and I was surprised with the intellectual curiosity of these young undergraduates after they saw the film. Many have written in and I will reproduce their comments. We spoke about Obama, about Islam, about the Media and Islam and indeed about the theology that I have fronted with humanity, in this film. Dr. Hina Azam, an Islamic Scholar at UT, Austin joined me. She loved the film but wondered how convincing Muhsin's theological revisionism would be in a roomful of Wahabi or Tabliqi scholars. I do not know the answer to that. I know I am hopeful and pessimistic at the same time.
Today I find myself 45 minutes from Lynchburg, Virginia-the infamous town that was home to that most famous homophobe of all-Jerry Falwell, RIP. I hope I will get invited to engage his students at Liberty in some kind of dialogue, in the near future.
Meanwhile I am preparing to speak at a small girls only college of 700. Hollins University nestles in the Roanoke valley in scenic surroundings. Maybe, nothing ever happens here. I may well be the only gay Muslim on this campus.
My friends-these are exciting times.
Now for some comments:I just saw a Jihad for Love at the Southwestern University screening and I wanted to send you an e-mail to say that I was absolutely blown away by the stories of sadness, tragedy, guilt, anger, survival, acceptance, and love that were told on an incredibly personal level. I hope that American audiences can view this film and see the universality of the struggle that gay and lesbian individuals face in cultures that are pervaded by religion, regardless of what that religion happens to be and regardless of how overt or subtle the religious influence is in that culture. I also hope that Americans can see this film and understand that the vast majority of Muslim people are as ?normal? as any Westerner?they are simply people trying to carve out a life for themselves both inside and outside of the society that they happened to be born in to. The time has come for the West to stop blindly accepting the 'terrorist' image of Islam and this film will certainly be a huge step in that direction.
I wish you well on your endeavor to promote this film throughout the U.S. and the world. Im very excited for it to come out in theaters, and I would be absolutely thrilled if it were shown in Austin (or anywhere in Texas, really). Thank you for breaking some of the silence surrounding gay and lesbian experiences and for challenging preconceived notions of Islam. Ill be looking out for this film in theaters. I think Texans need to hear what you have to say and Austin is the perfect place to begin.
Best, Megan
Jihad writes:
It was a pleasure meeting you both at Amnesty's previewing of Jihad for Love. It was a well done documentary, very respectful of the Islamic faith and the strivings of LGBT Muslims to find balance in their faith and sexual identities. I wish you much success with the movie's US tour.
There are hundreds of other emails and I promise to post them all on here. Many can be seen if you just click on comments at the end of every post. A significant amount of press has also been happening and here are a few links.
Finally, we are opening on May 21st at the IFC Center in NYC. I will be giving all of you constant updates on the theatrical run of the film across the United States and Canada. Now IS the time to galvanize around this film and its Jihad. Everyone you know, needs to come and see and support the film and its remarkable subjects. We will need to fill up the theaters everywhere we go and in these difficult times for theatrical distribution of documentaries, all of you are going to make sure that this film is as successful here in North America, as it has been in 15 nations worldwide.
22.4.08
Five hundred people in two screenings. A man comes up to me and says, 'Here in Italy-we dont like Muslims. That is why we need to see this film'.Another man has a Moroccan boyfriend for seven years. His boyfriend is married to a woman and thinks that being gay is 'haram'. He wishes that his boyfriend would have seen Jihad-but coming to see the film at a gay film festival would be too much for him.Interesting conversations with a filmmaker from Tehran who tells me that during Naurooz this year, Ahmadinejad saw it fit to screen 'There will be Blood' on Iranian TV, repeatedly. We have been talking about 'the life surreal' in Tehran.The journey of Jihad continues.AND YES, 'JIHAD' HAS WON THE BEST DOCUMENTARY AWARD AT THE TURIN GAY AND LESBIAN FILM FESTIVAL. THIS MEANS THE FILM HAS ALREADY WON FIVE PRESTIGIOUS INTERNATIONAL AWARDS
21.4.08
He wept the first night when we saw the Chinese film, 'Blind Mountain' which is about a woman sold into marriage in Northern China.He sobbed when he saw 'Jihad', looking deep into my eyes and saying it was about his life.Muhammad has just arrived in the little paradise of San Sebastian-for six months he has walked the streets of Spanish cities, a refugee and penniless. He fled Mauritania, one of six countries with Sharia in a shipping container and lost more than half of his body weight. When his family in Mauritania found out he was gay, his father beat him with iron rods-he showed me the marks. They would not let him eat at the family table and he would sit by the door, like a 'dog', he says.In Spain, he hopes to find home.I hope he will.He said to me, 'Parvez, 'rich' people like you never talk to us, in Spain'.I carry Muhammad in my heart as I arrive in Torino, on the last leg of this journey of Jihad, in Europe (a journey that is just beginning).
My friend, Asif has just arrived in Palestine. He is sending remarkable posts from the frontlines of an apartheid policy and a nation I have clearly decided not to show the film in, till the occupation continues. I will be reproducing them here and I do wish him luck.
Ahlan wa sahlan to Settler Saturday...
Ahlan wa sahlan (welcome) is a phrase every person uses around here, especially if you speak little Arabic an they speak little English. It's a good thing to say whenever there is a lull in the conversation and you are at someone's home and having the obligatory tea/coffee (you can't say no around here).
So I say it many times between sips of very hot and very sweet brew. People are always amazed here that I don't speak Arabic. Also, Asif means "im sorry" around here, so when I say my name, I always get a puzzled look and then usually some sort of laughter. I remember this in Toronto at Uni, but every single person I meet here says the same thing when I introduce myself.
Of course nobody really believes me that I'm from Canada, so when I say "hindi", there is usually excited look on their faces cuz now they can practice all of the "bollywood" phrases on me and talk about Amitabh Bachhan, and Shah Ruhk Khan etc.
That being said…Good morning from Nablus. Hope you are all well and enjoying the wonderful spring weather back at home or wherever you are.
So far it has been wonderful here, the people at the Project and local volunteers are really amazing. I have an hour before my Arabic lesson (part of the service Project hope provides) so I had a few minutes to write to you all.
I went to Yanoun this weekend on a short trip. Yanoun is a small village of about 100 farmers in the Northern West bank that is surrounded by illegal settlements and outposts. A few years ago, setters started to come into the village to harass the local residents into leaving the land they had worked on for generations. Now when I mean harass, I mean walking around with machine guns, beating up men in front of their children, killing their sheep, swimming in their well with their dogs, destroying their electricity generator. The setters usually come on Saturdays, during the Shabat.
"Nearly all residents in the upper Yanoun evacuated the village in October 2002. They soon began to return accompanied by Israeli and international activists of all faiths, outraged at the situation. Since then, a house in the village has been home to a permanent, voluntary international presence. Since 2003, the Ecumenical Accompaniment Programme in Palestne and Israel has provided the presence. (EAPPI)".
Yanoun is considered part of Area "C" which means it is "under the full security and administrative responsibility of Israel. The villagers feel they have never been offered any protection by anyone." The Palestinian Authority is not allowed to have any forces in this area.
The EAPPI works in teams of 4 and stays in Yanoun for 3 months. On weekends other internationals go to relieve them for a few hours or a day or two so they can go to Nablus or other areas of the region for meetings etc. This time they were headed to Nablus for the Samartin Passover ritual at Mt. Gerazim. For more on the Samaritin community (the only place one can get liquor in Nablus) please see the following link:
Yanoun is a very pretty village, and the people are very hospitable although unsure when you first arrive if you are a settler or not. Jacob from the EAPPI started to show us around and introduce us to some of the villagers and then had to leave for Nablus. As we were drinking tea at Kemal's house, he got a phone call. His wife (whom we had assumed spoke no English) turned to us and said: "Settler's are coming". It had not been more then 15 minutes since the EAPPI had left! We quickly said our goodbyes and went outside to see what our visitors were up to. We, turned a corner and low and behold saw 3 settlers dressed in white turning the corner. Behind them was the EAPPI who had just left, but decided to accompany the "visitors" back. They looked pretty harmless, except they had machine guns around them and looked pretty annoyed to see us. I went to watch the well (where they had tried to swim the week before but could nott fit so they decided to strip down to their underwear and shower in plain sight of a traditional Muslim village.)
The settlers walked through the olive grove and up towards their outpost at the top of the hill (outposts are usually at the top of the hills so they can monitor the land they are occupying). They asked that their picture not be taken and then gestured something that looked like a finger towards us…and off they went. So they were not really violent (perhaps because we were there) but they did achieve their goal to prove to the sheepherders that they could walk through their land without any repercussions. Note: if any one of the village folk steps onto the settler's "land" to run after a stray sheep, they can be shot or arrested for trespassing.
As the sun goes down, a quiet night approaches the village. It is almost perfect, except the huge spotlights which shine down on Yanoun from the settler outposts, so even while the villagers sleep, their every move is monitored from the hills.
So far, the international presence has deterred any major attacks by the settlers but they cannot be there forever, so it is a sad reality that Yanoun will face the same fate as so many defenseless places in Palestine.
It's important to note that not one setter has been harmed my resident of Yanoun. In fact there is a story of when the settlers first started coming to Yanoun, a local offered them tea and said : "ahlan wa sahlan "
16.4.08
An anonymous man who does not name himself (I assume it is a man, since we were in Turkey) has decided to leave this choice comment on every post of this blog. I reproduce it for you. Allahın Laneti sizin ve lut kavmi gibilerinin üzerine olsun. May God's curse be upon you and people like the Lut tribe! Interzone from Ankara says:Long ago a friend from Holland said to me: "Holland is not heaven". He was right. It seems like, heaven is a relative aspect on this. On the other hand, even the comment above, proves Mehmet's words.
Also SABOOR KHAN has this to say:This film is contradicting itself and I am really confused! Please can you clarify to me how you can suggest when this is one of the fundamentals of Islam since it has been clearly portrayed in the story of Prophet Lot (peace be upon him) in the Quran, and mentioned also in several Hadith, and furthermore is agreed upon all the major scholars. How can some people decided to change things and start a new interpretation of a faith and then label the rest of the religion as extreme or intolerant. I am a Muslim, but Islam does not tell me to be intolerant to homosexuals, it just says that one is not a Muslim if one is homosexual. Please also consider the following Hadith which has been widely accepted by all the scholors:
Abdullah bin Amar (RA) relates that the Holy Prophet (peace be upon him) said "Surely things will happen to my people as happened earlier to Israelites, they will resemble each other like one shoe in a pair resembles the other to the extent that if anyone among the Israelites has openly committed adultery to his mother there will be some who will do this in my Ummah as well, verily the Israelites were divided into 72 sections but my people will be divided into 73 sections, all of them will be in the fire except one." The companions asked, 'Who are they O Messenger of Allah,' Holy Prophet (peace be upon him) said, "They are those who will be like me and my companions."
Truly the Prophet or his companions were not homosexual.
Please kindly respond.Sabah has done another little feature which is here and translates as: 'I was scared, I took a deep breath with the applause' One of the most contraversial films of the 27th International Istanbul Film Festival that will go on until April 20th was "A Cihad for Love" by Parvez Sharma of Indian origin, which discusses the lives of gay and lesbian Muslims. Director Sharma, who himself is also gay said: "I was very scared before coming to Istanbul. But I came across an incredible audience that applauded me. I took a deep breath". Turkey is the first Muslim country that the film was shown.
15.4.08
These are the words of Mehmet Tarhan, a dear man, in reaction to the film. Mehmet is what they call a conscientious objector in Turkey. He took on the might of the Turkish army and its policy of disallowing gay men from compulsory army service if they can prove they are gay.Mehmet does not like Jihad, because he feels it could take a more activist and anti-Islam/anti-Turkey stand.Mehmet and I have spent some time together in Turkey. I had also interviewed Mehmet for the film in 2005 when he was still in a Siwas prison.The second screening of Jihad yesterday in Beyoglu was an even greater achievement. Scheduled for a non-prime time screening of 11 am by the IKSV festival, it drew an overflowing audience (close to 500 people) who stayed back for a powerful and intellectually stimulating Q and A.The reactions to my kaffiyeh (the Palestinian scarf) continue and are varied. More updates to follow.
14.4.08
More than 400 people packed the Beyoglu theater yesterday in a SOLD OUT screening of 'A Jihad for Love'. It was an intense and diverse audience with a spectrum of views. An intense Q and A followed with Muhs, Mazen, Ferda, Kiymet and myself. My wonderful co-director of Cinematography Berke Bas and producer Sandi DuBowski joined us as well.The second screening is in two hours. Turkey's two largest newspapers 'HURIYET' and 'SABAH' have done full page stories on the film and here they are:Bu cihat aşk için - Hürriyet (This Jihad is For Love)
11.4.08
Turkey and its many walls of silence are immense. Last night, in a repeat of anti-Kurdish sentiment the burly bouncer at Tekyön (one way) the sweaty and raunchy 'gay bar' in Beyoglu asked me to take off my Kaffiyeh. Its green and it has had many travels around the world (I will share them soon) but here in Turkey, clearly the land of the not so free-it evokes a different sentiment. The gay bar can have an entire wall with a mural of four hirsute Turks holding up a pride flag, but the Kaffiyeh is a problem.The festival says, they need to take extra precautions with security while we are here.Have just spent the whole afternoon with a wise and wonderful Turkish journalist friend, who wants to leave- he says the situation has never been this bad and 'anything can happen'. The Kemalists fear an Iran style revolution. The Islamists andd the ruling AKP (Ah Kay Pay for the un-initated) have been asked to shut down. The Army watches. So for the Turks-is there only ONE WAY (Tek Yön) out of this mess?Let us see what Jihad brings on Sunday. Yakshamlar!
9.4.08
ISTANBUL- City of my dreams. So much has happened here and now I return with all of that work from three years ago.It is so wonderful to be back in the comforting sounds of the ricocheting Azaans from all over the Bosphorous and the Camii's.I am, in so many ways, back 'home'...
8.4.08
Hundreds of emails are pouring in. The Jakarta Post has headlined the ban.Please click on comments on each post to see comments, but this priceless one, one of many is what I want to reproduce. How do we reply to him (I assume he belongs to the male gender). He does not have the courage to identify himself I assume?
"All Praise be to Allah that your film is banned.
There is no homosexuality in Islam.
We pray that people like you will return to the Straight Path and undo the grievous damage that you have caused to Islam."
We have just received word that the Censor Board in Singapore has refused to approve the film for the Singapore Film Festival. They have in their words 'disallowed' it. The Festival was trying very hard to get the film approved by the censors. This small nation, where I have many friends, has a small but significant Muslim minority. In many of the descriptions of this antiseptic shopping paradise, what is often missed is that an almost fascist regime controls every aspect of life. I promise to keep you updated.
In Copenhagen, the film has been received with warmth and excitement. Muhsin commented that the nation was in many ways 'God-less'. This is true, because in Denmark, religion is often seen as a destructive and alien force. Another friend commented on this nation where 'there are no curtains'. I looked, and indeed many curtainless windows make me wonder if religion does not have even a private space? The press was overwhelming. Here are a few links.
Congratulations with your film - what an incredible effort. Although I haven't been able to see it jet, I've followed it's presentation here in Denmark. I wish to express my deepest respect and admiration and sincerely wish you all the best for the film and the future in general - take good care of your self...
From Gert (danish, gay and christian man ;o)
Ravi writes from LondonHello Parvez,
Ravi here, we met on Sunday after the screening of the film. Anyway, I hope all's well, and again, I thought that the film was excellent. Stay in touch :-)
Ravi xx
More to come as I wade through all the emails.
Safiah writes from London:Hi, thank you for coming to London. I thought it was a great documentary for everyone and enjoyed the discussion. I brought a friend and he cried.Is it still showing in Malaysia as u mention in London? And whats ur blog?Safiah
Followers
A JIHAD FOR LOVE TRAILER
This JIHAD IS ON FIRE
September 2007 is when I started (with a finished film, my first) and now some 49 countries and 8 million people later, the whole world is talking. The movement around this work has begun worldwide. We will be screening next year around the world and yes in Muslim countries as well.
For more updates email me at parvezsharmaATgmailDOTcom and post your comments here as well.
Imam Muhsin Hendricks and his website for the Inner Circle
For Questions on Islam and Homosexuality Email the Imam directly at muhsin@theinnercircle.org.za |
Untimely Hairfall may be Symptoms of weak heart failure
Early hair may indicate white disease of heart disease. According to the study, a person who starts skin hair before age is more likely to be more likely to lead to normal disease.
This study has been presented at the annual meeting of the European Association of Preventive Cardiology, from Managua in Spain on April 6 to 8. Researchers from Egypt’s Cairo University have shown this result after studying hundreds of adults.
According to the study, the organic process of organizing the fat in the internal wall of the artery and the hair of hair is very similar. Age increases and grows in both.
This kind of thing is present in this process, such as age symptoms in the working class, with the change of broken DNA, stress, hearing, hormones.
A step in the arteriency of arteriosclerosis is that in which the internal wall of the artery feels fat. This step called atherosclerosis states that blood circulation leads to artery due to this phase.
In the study, if there is a heart disease in participants, there is no damage to the heart blood of the heart, the city’s internal state of the artery was checked through the coronary angiography technology.
Participants participated in two groups on the basis of heart disease and heart disease in research. Researchers on the basis of white hair set a mark for different stages of hair white. According to this, the whole black hair has been fixed for 1 mark, white for black, two points for black, black and white, equal to 3 points, 4 points for dark black, and 5 points for whole white hair.
Each participant’s number was confirmed by two independent supervisors. Statistics of traditional factors such as diabetes, stress, blood pressure, genetic history of heart diseases, were also collected.
Analysis of all statistics showed that the hair of the participant was white, and the r!sk of heart disease was more. Factors associated with age and heart diseases did not have any effect on it.
According to the research, although the actual age is low, the septic follicle describes the person’s increased biological age. It may be a sign of heart disease warning. |
We offer a new patient check to patients over 40 years of age and to anyone who has a chronic medical condition for which they require regular medication. In this case we also advise that patients also see their GP at some stage. Any patient who wishes to have a health check with a nurse or health care assistant on registering should contact us to make an appointment.
Medical treatment is available from the date of registration. Please contact reception for further information.
Guide to GP Services
The Royal College of General Practitioners has produced a useful guide for patients about the services on offer at GP Surgeries and how to access them. You can download the guide below. |
[Acetabular fractures in the elderly. Results of a sophisticated treatment concept].
Acetabular fractures in elderly patients are rare injuries, but their incidence is increasing. Poor bone quality due to osteoporosis and an increased operative risk due to concomitant disease are factors complicating surgical therapy. Literature does not provide generally accepted treatment protocols. In a 4-year period, 27 patients who were 65 years or older and who had an acute displaced fracture of the acetabulum were admitted to our department. Four minimally displaced and stable fractures were managed conservatively. Internal fixation was performed in 16 cases. According to the Merle d'Aubigné score, in 15 out of 18 surviving patients excellent or good results were found. Treatment strategy should be planned individually for each fracture, taking into account the patients biological age and general condition, fracture type, bone quality and associated injuries. Primary endoprosthetic replacement should only be considered when the acetabular bone stock allows stable cup fixation. Osteosynthesis in combination with early endoprosthetic replacement should be considered in acetabular fractures with associated femoral head or neck fractures or when significant articular steps and/or bone defects remain after open reduction and internal fixation. |
Details
*Fill out information requested and Add to Cart. Check out and chose QUOTE ONLY as shipping option. No payment information required and you will receive an email quote.
Custom forged wheels made from 8 ton pressings for superior strength and lightness. One and three piece, super concave, standard concave or flat forging profiles for weight savings and aggressive styling with sizes ranging from 19” to 24” diameters and 8.5“ to 13” widths. Always hubcentric fitment for your specific application for a perfect fitment. Standard powder coated finishes and custom finishes of any combination or style available. |
Origami building blocks : Generic and special four-vertices
Publication
Publication
Four rigid panels connected by hinges that meet at a point form a four-vertex, the fundamental building block of origami metamaterials. Most materials designed so far are based on the same four-vertex geometry, and little is known regarding how different geometries affect folding behavior. Here we systematically categorize and analyze the geometries and resulting folding motions of Euclidean four-vertices. Comparing the relative sizes of sector angles, we identify three types of generic vertices and two accompanying subtypes. We determine which folds can fully close and the possible mountain-valley assignments. Next, we consider what occurs when sector angles or sums thereof are set equal, which results in 16 special vertex types. One of these, flat-foldable vertices, has been studied extensively, but we show that a wide variety of qualitatively different folding motions exist for the other 15 special and 3 generic types. Our work establishes a straightforward set of rules for understanding the folding motion of both generic and special four-vertices and serves as a roadmap for designing origami metamaterials. |
#light "off"
module FStar.TypeChecker.Cfg
open FStar.ST
open FStar.All
open FStar
open FStar.Util
open FStar.String
open FStar.Const
open FStar.Char
open FStar.Errors
open FStar.Syntax
open FStar.Syntax.Syntax
open FStar.Syntax.Subst
open FStar.Syntax.Util
open FStar.TypeChecker
open FStar.TypeChecker.Env
module S = FStar.Syntax.Syntax
module SS = FStar.Syntax.Subst
module BU = FStar.Util
module FC = FStar.Const
module PC = FStar.Parser.Const
module U = FStar.Syntax.Util
module I = FStar.Ident
module EMB = FStar.Syntax.Embeddings
module Z = FStar.BigInt
module NBE = FStar.TypeChecker.NBETerm
type fsteps = {
beta : bool;
iota : bool;
zeta : bool;
zeta_full : bool;
weak : bool;
hnf : bool;
primops : bool;
do_not_unfold_pure_lets : bool;
unfold_until : option<S.delta_depth>;
unfold_only : option<list<I.lid>>;
unfold_fully : option<list<I.lid>>;
unfold_attr : option<list<I.lid>>;
unfold_tac : bool;
pure_subterms_within_computations : bool;
simplify : bool;
erase_universes : bool;
allow_unbound_universes : bool;
reify_ : bool; // fun fact: calling it 'reify' won't bootstrap :)
compress_uvars : bool;
no_full_norm : bool;
check_no_uvars : bool;
unmeta : bool;
unascribe : bool;
in_full_norm_request: bool;
weakly_reduce_scrutinee:bool;
nbe_step:bool;
for_extraction:bool;
}
val default_steps : fsteps
val fstep_add_one : step -> fsteps -> fsteps
val to_fsteps : list<step> -> fsteps
type psc = {
psc_range:FStar.Range.range;
psc_subst: unit -> subst_t // potentially expensive, so thunked
}
val null_psc : psc
val psc_range : psc -> FStar.Range.range
val psc_subst : psc -> subst_t
type primitive_step = {
name:FStar.Ident.lid;
arity:int;
univ_arity:int; // universe arity
auto_reflect:option<int>;
strong_reduction_ok:bool;
requires_binder_substitution:bool;
interpretation:(psc -> FStar.Syntax.Embeddings.norm_cb -> args -> option<term>);
interpretation_nbe:(NBE.nbe_cbs -> NBE.args -> option<NBE.t>)
}
type debug_switches = {
gen : bool;
top : bool;
cfg : bool;
primop : bool;
unfolding : bool;
b380 : bool;
wpe : bool;
norm_delayed : bool;
print_normalized : bool;
debug_nbe : bool;
}
type cfg = {
steps: fsteps;
tcenv: Env.env;
debug: debug_switches;
delta_level: list<Env.delta_level>; // Controls how much unfolding of definitions should be performed
primitive_steps:BU.psmap<primitive_step>;
strong : bool; // under a binder
memoize_lazy : bool;
normalize_pure_lets: bool;
reifying : bool;
}
(* Profiling primitive operators *)
val primop_time_reset : unit -> unit
val primop_time_count : string -> int -> unit
val primop_time_report : unit -> string
val cfg_env: cfg -> Env.env
val cfg_to_string : cfg -> string
val log : cfg -> (unit -> unit) -> unit
val log_top : cfg -> (unit -> unit) -> unit
val log_cfg : cfg -> (unit -> unit) -> unit
val log_primops : cfg -> (unit -> unit) -> unit
val log_unfolding : cfg -> (unit -> unit) -> unit
val log_nbe : cfg -> (unit -> unit) -> unit
val is_prim_step: cfg -> fv -> bool
val find_prim_step: cfg -> fv -> option<primitive_step>
val embed_simple: EMB.embedding<'a> -> Range.range -> 'a -> term
val try_unembed_simple: EMB.embedding<'a> -> term -> option<'a>
val built_in_primitive_steps : BU.psmap<primitive_step>
val equality_ops : BU.psmap<primitive_step>
val register_plugin: primitive_step -> unit
val register_extra_step: primitive_step -> unit
val config': list<primitive_step> -> list<step> -> Env.env -> cfg
val config: list<step> -> Env.env -> cfg
val should_reduce_local_let : cfg -> letbinding -> bool
|
Q:
Ruby Until Conditional (Until Sorted, Sorted = True??)
Can someone explain this code? I got it from the solutions part of an exercise so it does run. Why isn't sorted compared using ==, and why does sorted = false need to add sorted after until?
def bubble_sort(arr)
sorted = false
until sorted
sorted = true
(arr.count - 1).times do |i|
if arr[i] > arr[i + 1]
arr[i], arr[i + 1] = arr[i + 1], arr[i]
sorted = false
end
end
end
arr
end
I would have expected the code to be like this:
sorted = false
until sorted == true do
However, when I tried to replace it with this, I get the following error:
eval):12: (eval):12: compile error (SyntaxError)
(eval):3: syntax error, unexpected kDO_COND, expecting kEND
(arr.count - 1).times do |i|
^
(eval):12: syntax error, unexpected kEND, expecting $end
This is the full code that's getting the error:
def bubble_sort(arr)
sorted = false
until sorted == true
(arr.count - 1).times do |i|
if arr[i] > arr[i + 1]
arr[i], arr[i + 1] = arr[i + 1], arr[i]
sorted = false
end
end
end
arr
end
A:
I believe you are mostly confusing the algorithm with Ruby syntax.
As for as the algorithm, you are not allowed to remove sorted = true, the line after until, because your loop would never end because sorted never becomes true.
About Ruby syntax, what you wrote is correct, you can write the longer form of until sorted, which is until sorted == true. Your problem is removing sorted = true which assigns true to sorted, unless it gets false again in the if condition.
|
Making technology an attractive career choice for young people
Making technology an attractive career choice for young people
By Donald McLaughlin, Chair of SDS’ Digital Technology Skills Group
I recently gave an interview to The Herald about Scotland’s digital skills gap and the negative impact it could have on our country’s economy. With nearly 13,000 digital job vacancies every year, it’s vital that we find as many ways as possible to fill the talent pipeline. One of the longer-term ways to do that is to make sure our school children see digital and tech as a really attractive career choice.
Making sure Computer Science is an attractive option for schools, both for teachers and pupils, is therefore essential. There have been some definite challenges around this important area, but I am confident we are now turning a corner on this thanks to true partnership working involving a range of stakeholders.
A key starting point was refreshing the Computing Science curriculum which was updated by Education Scotland in partnership with teachers, academia and industry. This ultimately improves the experience for pupils, as the curriculum now reflects technological change, while the teachers are benefiting from expanded professional development opportunities, including the launch of new learning tools through the SQA Academy.
In terms of teacher CPD, Education Scotland and SDS have also been trialling some innovative approaches such as partnering with CodeClan to deliver an immersive experience specifically for teachers. This pilot involved nearly 50 teachers, and was so well received the skills agency is looking at how to roll this out, and scale it up.
We also now have the Digital Schools Award in Scotland. This is a public/private partnership programme developed to recognise good practice and to support nursery, primary and secondary schools to make improvements to their computing and digital education.
And there is no doubt there is some fantastic work being done in our schools. Wick High School is a frequent high achiever in the Apps for Good competition, and SWIT award winner Toni Scullion epitomises the amazing things teachers are doing, often under their own steam, to help our digital humans of the future.
SDS’s very own Cyber Live lessons were not only way oversubscribed in year one (more than 6,500 lessons downloaded), they also inspired schools and teachers, like Grantown Grammar, to set up their own voluntary cyber clubs. And of course, we now have the Foundation Apprenticeships which provide a valuable work-based learning alternative for young people interested in digital tech. And let’s not forget about the great extracurricular activity being driven by the Digital Xtra Fund, and also the work being done with partners outside school like the Girl Guides.
We know there is still much more to be done. But let’s appreciate and applaud what has been done to date through true partnership working with the likes of Scottish Government, Education Scotland, SDS, ScotlandIS, SQA, the local authorities and of course industry itself.
If you think there are other things we should be doing to build on this great collective work, let me know. |
With 2018’s arrival, the campaign season will soon ramp up. But the final weeks of 2017 had plenty to offer, including a progressive PAC calling for U.S. Rep. Ruben Kihuen to give back its donation.
Representative Ruben Kihuen, D-Nev., talks to the crowd during an immigrant rights resource fair at the Pearson Community Center in North Las Vegas on Saturday, Jan. 14, 2017. (Las Vegas Review-Journal)
With 2018’s arrival, the campaign season will soon ramp up. But the final weeks of 2017 had plenty to offer, including a progressive PAC calling for U.S. Rep. Ruben Kihuen to give back its donation and Harry Reid coming out of the woodwork (at least in email form).
PAC wants gift back from Kihuen
End Citizens United, a traditional PAC aimed at eliminating dark money from politics, is asking for its money back from Kihuen, D-Nev., after numerous allegations of sexual misconduct by the freshman congressman have surfaced.
The PAC sent Kihuen’s campaign a Dec. 19 letter that said it was revoking its endorsement of Kihuen (although Kihuen has said he won’t seek re-election for Nevada’s 4th Congressional District in 2018) and is asking him to return its $6,000 campaign donation by the end of January.
“ECU is dedicated to electing new leaders who are committed to changing our broken system and ending the culture of corruption in Washington,” wrote Tiffany Muller, president of End Citizens United. “We need leaders who are committed to that fight and who will hold themselves to a high standard of conduct as elected officials.”
Harry’s back
Harry Reid might not be in office any longer, but his name still pops up plenty in the fundraising world.
The campaign for Nevada senatorial candidate Jacky Rosen sent out four emails with Reid’s name attached since mid-December asking for campaign donations, saying her campaign needs help to fight against GOP Super PACs in the Democrats’ push to retake the Senate in 2018.
“Throughout my career in the Senate, nothing we accomplished was ever easy. We had to fight hard to carry out our vision for a future where every American could get health insurance, regardless of pre-existing conditions. Jacky’s got the passion and persistence to roll up her sleeves and get to work from day one,” all four emails read.
Rosen, a freshman Democratic representative from Nevada’s 3rd Congressional District who was recruited to run by Reid, seeks to unseat Republican incumbent U.S. Sen. Dean Heller.
Heller is also expected to face a strong primary challenge from businessman and perennial Republican candidate Danny Tarkanian.
New candidates
— Paul Nimsuwan, a Democrat, is running for Nevada Assembly in District 35. Incumbent Democrat Justin Watkins announced this past year he does not intend to run for the seat again. Nimsuwan is a Durango High School graduate who immigrated to the U.S. from Thailand at age 14. He served in the U.S. Marine Corps until 2007 when he was injured while serving in Iraq. He earned a law degree from the University of Massachusetts in 2012.
— Another political newcomer is planning to jump into the race to replace Rosen in Nevada’s 3rd Congressional District. Hermon Farahi, a Democrat, is a graduate of Green Valley High School and UNLV. His parents are immigrants; his father from Iran and his mother from South Korea.
Counting Farahi, at least five Democrats are running in the CD-3 primary, with former CD-4 candidate Susie Lee considered the favorite in the race.
Contact Colton Lochhead at clochhead@reviewjournal.com or 702-383-4638. Follow @ColtonLochhead on Twitter. |
Re: HOW CAN A PERSON KNOW IF THEY WERE EVER A VICTIM OF MKULTRA OR MONARCH PROGRAMMING?
I'll try to help with some ideas but please keep in mind that we are all different. That being said, I truly believe that we all have the ability to heal from this with our own unique minds. All the info that you need to help you through is sitting in your head. Somewhere inside you, you already know how they did it to you so you also know how to reverse it. Some will say to themselves (to some of my suggestions), I can't do that.. don't write it off until you give it a shot.
Start . . .
Quoting: Anonymous Coward 4459582
That was outstanding. Thankyou for sharing this. I hope that someone is able to find peace and healing with this or at least start down the road.
Anything else you wish to share about your healing would be a bonus.
There are many that have been injured by MKUltra, some may not even know it yet, or may never. My sincere hope is that this evil stops, and we can all advance ourselves and our civilization together. I know that may sound campy, but it is the truth.
Infinitywon, can you please speak to who your programmers were, and what part your parents played. From the little that you have told us, your parents seemed to be part of it.
Quoting: JamesBe1
I'm sure a lot of you are aware that there are "groups" all over the US and Canada and that they are all connected to each other. Within each group there is a leader. My parents, more so my father, was the leader of this particular group in Ontario. My programmer's name is unknown to me but I would know her voice anywhere. She's probably dead by now though since she was already around 60 years old when I was a child. My father was also a programmer (he is also dead). I was very difficult to program though so I'm happy to say that I gave them a very hard time. In my case, which is often but not always the case, it was all about bloodlines. I have Irish descent and evidently some native indian in me. I'm related to the Bush's..yes those Bush's. I'm also related to several other US presidents.
The "religion" of this group was the worship of Horus with Druid elements and end time (christian) beliefs. They were very much into other dimensions ..I'll go into that some other time.
I'm heading off to bed for now but if anyone has any specific questions please let me know and I'll do my best to help.
Re: HOW CAN A PERSON KNOW IF THEY WERE EVER A VICTIM OF MKULTRA OR MONARCH PROGRAMMING?
I'll try to help with some ideas but please keep in mind that we are all different. That being said, I truly believe that we all have the ability to heal from this with our own unique minds. All the info that you need to help you through is sitting in your head. Somewhere inside you, you already know how they did it to you so you also know how to reverse it. Some will say to themselves (to some of my suggestions), I can't do that.. don't write it off until you give it a shot.
Start . . .
Quoting: Anonymous Coward 4459582
That was outstanding. Thankyou for sharing this. I hope that someone is able to find peace and healing with this or at least start down the road.
Anything else you wish to share about your healing would be a bonus.
There are many that have been injured by MKUltra, some may not even know it yet, or may never. My sincere hope is that this evil stops, and we can all advance ourselves and our civilization together. I know that may sound campy, but it is the truth.
Infinitywon, can you please speak to who your programmers were, and what part your parents played. From the little that you have told us, your parents seemed to be part of it.
Quoting: JamesBe1
I'm sure a lot of you are aware that there are "groups" all over the US and Canada and that they are all connected to each other. Within each group there is a leader. My parents, more so my father, was the leader of this particular group in Ontario. My programmer's name is unknown to me but I would know her voice anywhere. She's probably dead by now though since she was already around 60 years old when I was a child. My father was also a programmer (he is also dead). I was very difficult to program though so I'm happy to say that I gave them a very hard time. In my case, which is often but not always the case, it was all about bloodlines. I have Irish descent and evidently some native indian in me. I'm related to the Bush's..yes those Bush's. I'm also related to several other US presidents.
The "religion" of this group was the worship of Horus with Druid elements and end time (christian) beliefs. They were very much into other dimensions ..I'll go into that some other time.
I'm heading off to bed for now but if anyone has any specific questions please let me know and I'll do my best to help.
Quoting: Infinitywon
Other dimensions? Interesting, elaborate, please
Lotus
Be not forgetful to entertain strangers: for thereby some have entertained angels unawares - Hebrews 13:2
One Crowded hour of glorious life, is worth an age without a name - Thomas Osbert Mordaunt
Re: HOW CAN A PERSON KNOW IF THEY WERE EVER A VICTIM OF MKULTRA OR MONARCH PROGRAMMING?
Re-post from the Gifted thread:
Slowly putting the pieces of a shattered mirror back together...
"The army at Fort Dietrick has done mind control experiments, and Dr. Andrija Puharich was a major figure in this project since the fifties. In addition to the usual foci, it included electromagnetic experiments. In the Nixon years, there was much interest in electronic stimulation of the brain as well as the use of ultrasonics and radiation.
In 1981, David Brinkley wrote in NBC Magazine about Russian experiments with the brain through electronic stimulation. By then it was known that the Russians were also working with strong broadband transmissions. It is been known since the 1960s that brain implants can be inserted easily and at least produce feelings of pain and pleasure.
Project Moonstruck began in 1952 and aimed at placing implants in the brain and teeth. It was also known since the 1930s that remote electronic waves can be used to hypnotize. In 1963, three scientists from Boston placed implants in the brains of three VC prisoners at Bien Hoa Hospital. The implanting was successful but the doctors were unable to make the prisoners attack each other, so the three were shot. How far this knowledge has been carried is unclear. There was also speculation in the late seventies, that electronic processes could not only wipe out memories, they could also wipe out large periods of time subjects. The Defense Advanced Research Projects Agency is also involved in these activities.
The experimenters are also interested in ESP, a defense mechanism found in some people which is probably a holdover from primitive times. There was also a strong interest in remote viewing (RV) and in training people to deliver messages exactly and then completely forget them. AS for remote viewing, a Freedom of Information request in 1972 turned up CIA Technical Services Contract 8473 with the Scientologists for remote viewing services.
Attorney David Rosebaum found that about 100 employees at a Monaca, Pa. Chemical plant had died strange deaths. Members of their families who asked questions also had a high mortality rate. He found that men on the plant’s medical staff had subjected at least two women to hypnosis under traumatic conditions. Both men were in a cult called the Order of the Fourth Reich. Later he learned that other employees were subjected to this treatment and also that they were being taught how to “remember to forget.“ Drugs were used to help victims regress to childhood. Some of the victims though they had dealings with Joseph Mengele, and whoever this Mengele really was, he told one person that he had programmed Lee Harvey Oswald—almost certainly these comments were meant to be disinformation. They believed “Mr. Halloran,” a second torturer/programmer, was a CIA man."
Re: HOW CAN A PERSON KNOW IF THEY WERE EVER A VICTIM OF MKULTRA OR MONARCH PROGRAMMING?
put down the crack pipe...........................................watching old television "honey west" and commercial came on... 10 year old boy alone gets on a bus with a wizard of oz book......highlighted phrase "you will remember" next "pathway" and next the image of emerald city....freaky....sponsored by literacy.GOV................................get a life
Re: HOW CAN A PERSON KNOW IF THEY WERE EVER A VICTIM OF MKULTRA OR MONARCH PROGRAMMING?
What if you have no evidence of such, but there have been strange things happen your entire life?
What about memories that you are not sure if they actually happened or you just dreamed them?
And how would a 30 something yr old adult, know if they were ever abused as a child, but most likely not by parents?
I have many many questions, and absolutely no answers!
Quoting: Anonymous Coward 1416403
Well, have you ever watched televison? How about listened to the radio? If not those then have you ever read a news paper or magazine?
It's all corporate owned and directed. Speaks for itself as the mind control media: Only 16% of the population didn't either fall for the real estate bubble, or else were so poor that even they failed to qualify for loans.
Over all, let's just say only 8% of the total population was hip to the tricks. Mind Control is like porn. There's soft porn and there's hard porn. |
StartChar: uni049F
Encoding: 1183 1183 870
Width: 1060
VWidth: 0
Flags: W
HStem: -3 3G<140 397 732 805.051> 1024 20G<747 826.914> 1040 210<36 140 397 584> 1356 20G<140 397>
VStem: 140 257<0 303 612 1040 1250 1376>
LayerCount: 2
Fore
SplineSet
655 545 m 1xd8
775 427 943 219 1016 94 c 1
762 -24 l 1
702 90 607 256 491 392 c 1
397 303 l 1
397 0 l 1
140 0 l 1
140 1040 l 1
36 1040 l 1
36 1250 l 1
140 1250 l 1
140 1376 l 1
397 1376 l 1
397 1250 l 1
584 1250 l 1
584 1040 l 1
397 1040 l 1xb8
397 612 l 1
539 778 694 944 800 1044 c 1
1018 882 l 1
900 788 783 673 655 545 c 1xd8
EndSplineSet
Validated: 1
EndChar
|
Infant sleep problems are some of the most common concerns reported by parents of young children. Ask any new parent and most will complain about lack of sleep. Many will also be worried that what they are experiencing isn’t “normal” and that they believe that their child has a problem that needs fixing. So they search books, ask friends and family or even their doctor about what to do about their child’s problematic sleep patterns. And to top it off, they feel immense anxiety and worry about it. Part of this epidemic of parental angst about children’s sleep is that we live in a culture in which parents are repeated told that they need to worry about their child’s sleep, that there will be dire consequences if their child doesn’t get enough sleep. Another problem is that most new parents, having had little experience with children prior to having their own, have little awareness about what truly is “normal” when it comes to infant sleep.
Simply being made aware of normal sleep patterns can help alleviate the stress and anxiety parents feel, leading to happier times for the entire family.
So what is normal?
In this series of posts, we’ll tackle some of the more common sleep concerns parents have with the hope that they can see them as normal, developmental stages for their child.
PART 1: THE CRITICAL ROLES OF FEEDING METHOD AND CHANGES IN DEVELOPMENT
“My child wakes every hour, all day and night, to feed”
Whether it’s every hour, or every two hours, or even three, parents are often concerned when their young infant is waking regularly for feedings. This concern is not surprising given the focus on “sleeping through the night” that our culture pushes. But sleeping through the night is not biologically normal, especially for a breastfeeding baby.
At the time of birth, a baby’s stomach can only hold a teaspoon’s worth of milk, meaning that he or she will need to feed frequently to meet the many demands for energy that accompany this period of growth. Although the stomach grows relatively quickly, the fat and protein content in human breastmilk is much lower than in the milk of other mammals and thus infants are required to feed often, resulting in greater night wakings (Ball, 2003; Ball, 2009).
Human breastmilk, being designed for infants who need to feed on cue day and night, is easily and quickly digested. Formula, however, is typically made from the breastmilk of another species – cows – and is higher in fat while also containing myriad additives which make it more difficult, and thus slower, to digest. This can affect infant sleep, resulting in unnaturally deeper infant sleep (more time spent in stage 3-4) (Butte, Jensen, Moon, Glaze, & Frost Jr., 1992), a stage of sleep for which it is most difficult to arouse to terminate breathing pauses (especially for arousal deficient infants), therein potentially diminishing the infants capacity to maintain sufficient oxygen. Even so, formula use does not necessarily providing parents with more sleep overall (Doan, Gardiner, Gay, & Lee, 2007).
Infants whose primary source of energy is breastmilk will often wake frequently to nurse, something that is essential for the breastfeeding relationship to continue (Ball, 2009). However, regardless of feeding status, many infants wake regularly during the night (Weinraub, Bender, Friedman, Susman, Knoke, Bradley, et al., 2012). Waking through the night is normal and biologically adaptive. In fact, though it is often reported that sleep patterns consolidate in the second year, the pattern differs in breastfed children.
Breastfeeding moms may wake more often, but report greater total sleep. For example in a study following breastfed children for 2 years, it was found that these children continue to wake frequently throughout the second year of life, a pattern more in line with cultures in which co-sleeping and full-term (aka “extended”) breastfeeding are more common (Elias, Nicolson, Bora, & Johnston, 1986).
Night wakings serve to protect the infant. Night wakings have been reported as being more common in infants who bedshare with a parent, yet the wakings and bedsharing (when done safely) may actually protect the infant from SIDS (Mosko, Richard, & McKenna, 1997; Mosko, Richard, McKenna, & Drummond, 1996). The critical period for SIDS is up to 8 months of age (with the peak at 2-3 months) and night wakings may serve as a protective mechanism. In fact, if we look at parenting historically and cross-culturally, frequent night-wakings coupled with co-sleeping and breastfeeding is the norm for which we should be comparing other infant sleep behaviours.
“My child was sleeping through the night and suddenly it’s stopped.”
Imagine you’ve been waking regularly with night feeds and arousals, but as time passes they are decreasing. Then you realize you’re now sleeping in nice, long chunks. Hours of sleep all at once! And it’s wonderful. Then suddenly, as quickly as it came, it’s gone. Your wonderful, sleeping-through-the-night child is suddenly waking again. This experience, which is a reality for many, can cause frustration and despair accompanied by the feeling that you’ve done something wrong, or that you must do something get their uninterrupted sleep back again.
But here’s the thing: You didn’t do anything. A return to night waking after periods of sleeping through the night is entirely normal. Many children’s sleep will cycle like this for a while. In fact, researchers looking at sleep patterns have found that often between 6 and 12 months, infants who had previously been sleeping long stretches suddenly start to wake more frequently at night (Scher, 1991; Scher, 2001). In fact, in one long-term study looking at child sleep between 3 and 42 months found that there was no stability in night wakings or even sleep duration during this time (Scher, Epstein, & Tirosh, 2004).
What causes the change in sleeping pattern? There are likely a variety of reasons, unique to each child. For some, it may be a growth spurt or teething. For others, it may be a cognitive leap that has them buzzing more so than usual or the appearance of separation anxiety. Just recently a study reported that babies tend to wake more often when they are learning to crawl. And for some, we may never know the actual reason. But as children age and each develops a circadian rhythm, they will go through cycles of sleep – some more convenient for parents than others. Parents need to be aware that these changes are entirely normal, even though they can be frustrating. Hopefully once you know that changes are to be expected, you can be better prepared or at least not add anxiety to the sleep disruptions you are forced to deal with once again.
Click here to read part two which focuses on the role of individual sleep patterns in infant sleep and why we need not worry when our child doesn’t fit what most other children are doing with respect to sleep.
I always tell people- my husband wakes up several times a night to get a snack and I wake up at least once or twice to go to the bathroom, why in the world would we expect our tiny infant to sleep “better” than we do?
[…] your baby cry or subject them to sleep training, I strongly ask you to do your homework on what normal infant sleep looks like, how it develops and what you can do besides sleep training to get through this time in […]
[…] real. Let’s be honest and let’s give new parents the very best chance to set themselves up with realistic expectations for the early time in their child’s life where they will be needed just as much at night as they […] |
Escherichia coli biotin protein ligase: characterization and development of a high-throughput assay.
The rapid rise in pathogenic bacteria resistant to current treatments, coupled with the paucity of new therapeutic agents in the pipeline, has resulted in a significant need for new antibiotics. One strategy to overcome resistance requires new chemical entities that inhibit key enzymes in essential metabolic processes that have not been previously targeted and for which there is no preexisting drug resistance. Biotin protein ligase (BPL), required to complete acetyl CoA carboxylase's capability for fatty acid biosynthesis, is one target that has not yet been fully explored. However, its application in large-scale compound screens has been limited due to the lack of a truly high-throughput assay for enzyme activity. Here we report a novel assay system for BPL from Escherichia coli (BirA). This assay employs fluorescence polarization technology together with a unique peptide substrate for BirA. Additionally, the multiple handling steps and requirement for radiolabeled ligands associated with previous assays have been eliminated. Kinetic analysis of MgATP (K(m) 0.25+/-0.01 mM) and biotin (K(m) 1.45+/-0.15 microM) binding produced results consistent with published data. Inhibition studies with end products of the BPL reaction, AMP and pyrophosphate, further validated the assay. Statistical analysis, performed upon both intraassay and interassay results (n = 30), showed the coefficient of variance to be <10% across all data sets. Furthermore, Z' factors between 0.5 and 0.8 demonstrated the utility of this technology in high-throughput applications. |
Clinical and survival outcomes of percutaneous microwave ablation for intrahepatic cholangiocarcinoma.
To evaluate the outcomes of percutaneous microwave ablation (MWA) and explore the prognostic factors for the survival of patients with intrahepatic cholangiocarcinoma (ICC). A total of 107 patients (age: mean 58.0 years, range 15-85 years) with 171 ICCs (maximum size ≤5 cm, tumour number per patient ≤3) who underwent MWA for ICC during January 2009 to February 2016 were selected, and their clinical and pathological data were collected and reviewed. The MWA-associated mortality, major complication rate and survival were evaluated. The prognostic factors for survival in patients with ICC were analysed with univariate and multivariate analyses. The median follow-up after MWA was 20.1 months (2.8-63.5 months). There was no procedure-associated death. The overall procedure-associated major complication rate was 2.8%. The median PFS after MWA was 8.9 months; PFS rates after 6, 12, 18 and 24 months were 67.4%, 41.5%, 18.2% and 8.7%. The median OS was 28.0 months; OS rates after 1, 3 and 5 years were 93.5%, 39.6% and 7.9%. Child-Pugh class A and less tumour number were identified as factors predictive of prolonged PFS (HR for Child-Pugh class: 2.62, p = 0.001; HR for tumour number: 2.07, p = 0.002) and OS (HR for Child-Pugh class: 4.14, p < 0.001; HR for tumour number: 1.95, p = 0.024). Percutaneous ultrasound-guided MWA is safe and effective for ICC. Child-Pugh class A and less tumour number predict prolonged PFS and OS in patients with ICC treated by MWA. |
"I wanted to learn Islam from the inside, not the outside." That is how Mohammed, born Nathan, tells me how he's gone from a New York electronic repair shop to Mecca, studying with the Imam of the Kaaba, Islam’s holiest place.
We share U.S.-based friends, are around the same age and both have Jewish mothers from Queens. (He’s not the only one of our circle to have turned religiously ultra-conservative and moved to the Middle East - another who ended up a hippie-style Hasid in northern Israel.) But that's where our biographical convergence ends.
With three wives, three children and countless hours of study of Sharia and Islam under his belt, it's safe to say Nathan knows more about Islam than any other Jew alive - and perhaps ever. He's still engaged to some degree with his Jewish background, but don't expect him to speak out about anti-Semitism in the Arab world. Even to share his story, I've had to alter some names for their continued well-being.
Nathan/Mohammed's journey effectively began in the 1970s, when a pair of Russian Jewish immigrants took an enterprising Palestinian under their wing: Ashraf (known as Mike) was to become their son-in-law. Their daughter, Barbara, was just as taken by Ashraf's warm and boisterous Syrian-Palestinian family as Nathan himself later was, as an adolescent.
The intertwining between Muslims and Jews had long been the cultural default in Ashraf’s family.
In the pre-state area around Haifa, his Palestinian paternal grandfather’s first wife was a tall red-headed Jew named Sara. Learning she was infertile, she helped him find an additional wife with whom to have children: he ultimately had eight. Ashraf's father was born in Haifa in 1942 and fled the violence of 1947/8 for Syria, much like his maternal Jewish grandparents fled Russia from anti-Semitism and the build-up to WWI in 1913/4.
His Uncle Reza found a way out of the Palestinian refugee camps working at the post office and as a translator in central Damascus. He then opened a dance studio near the Jewish Quarter, where Eddy, as he was known by his many Jewish female patrons, cut quite the figure.
A generation later, Nathan’s own first great love, which blossomed right at the time he became fascinated with Islam, was with the daughter of a Moroccan Jewish Hebrew High School principal embarking on a similar spiritual quest toward Islam. Rather than proactively rejecting Judaism, Nathan is in many ways continuing his family's tradition.
How does Nathan relate to his father's Palestinian identity? Nathan points out that the term "Palestinian" for his family is rather fungible. His paternal grandparents, despite being post-1948 refugees, didn’t identify as Palestinian: "That wasn’t their issue," he suggests. His great-grandfather had been a deputy to the Ottoman Vizier within the region of Sham (Greater Syria) and hardly even spoke Arabic.
Growing up in an insular, if largely secular, Jewish neighborhood, Nathan’s cultural Judaism didn’t go much beyond his grandmother bringing out the shopworn "old country" recipes around holiday time. And his Syrian-Palestinian family were hardly strict practitioners of Islam; if anything, they were shaped by a Damascus of the sixties and seventies that was even more secular than New York.
He credits his Jewish grandmother, along with his parents, for pushing him to become the best student in his school and getting him into an elite magnet prep school. And though his relationship with his mother is strained (in which his conversion to Islam is no doubt one key factor), he still travels back to New York to visit family on a regular basis. His Muslim family greeted the move to Mecca with amazement and respect: "No Muslim would say anything but congratulations," he adds.
To hear him tell it, his embrace of Islam might be the most Jewish thing he’s ever done, and his understanding of Islam is one, it seems, that only a Jew could have. The Koran, he relates, addresses the "children of Israel" more than any other named group, 41 times in fact. He is highly conscious of the children of Israel's special role in the "final revelation" of Islam. "Primitive tribes are not addressed, neither are the Chinese: the Jews are in the center of the world and bear the ancestry of the prophets," he relates.
The "Go forth" command and promise to Abraham, so well-known to all Jews, in its Koranic telling crucially includes Mecca. People will come from every distant place there, it is prophesized, and the poor will be fed and provided for. The plunge of faith into the desert, desolate and forbidding, is every bit as central to Islam as Judaism.
For Nathan/Mohammed, the resemblance doesn’t stop at how the faiths began. His complex heritage gives him extras prisms with which to examine the roots of Islam.
Open gallery view Muslim pilgrims take a selfie at Mount Al-Noor, in the holy city of Mecca, Saudi Arabia August 28, 2017 Credit: SUHAIB SALEM/REUTERS
The key narratives in both the Torah and Quran are the experience of oppression and deliverance. The warnings they receive from God, to not abuse their newfound status and their divine covenant, are similarly heeded only fitfully and partially. Nathan/Mohammed observes that the same questions need to be posed in terms of the ethical choices made in contemporary times by Israel and Saudi Arabia.
Nathan/Mohammed today doesn’t "read" any different than countless youngish New York Jews of the outer boroughs: the obligatory fluency in hip-hop, the quick-witted, slang-inflected dialect and the genial mix of menace and humor. But he chose to leave the capital of 21st century American materialism for the desert.
But even Mecca has changed underneath his feet, unrecognizably so, in his two decades there. "I don’t feel I belong anywhere in the world now," he says. The new construction of hotels, car parks and a massive clock tower that overshadows the Kaaba, suggests to him what life was like before Islam, when materialism held sway.
He believes that this is a universal challenge for people of faith: "To be spiritual is to go against the stream, the Kaaba is in the valley, inside the pressure cooker." He finds respite on the nearby Mountain of Noor (Light) where the prophet Mohammed, according to Muslim tradition, received his first revelation.
All his spiritual work has brought him to a space beyond labels, he says: "I just don’t identify, I feel like an alien wherever I go." He passes over all other "isms" for the same reason, Christianity chief amongst them, in which he charges people identify with creations rather than the Creator. To be Jewish, in his eyes, is an ideology about a specific group, one based on ethnicity.
His outsider status and conversion story have prepped him for a role on the front line of current online debates about Islam – and have made him something of a proselytizing master. About a year and half ago one of Saudi Arabia's most influential imams invited him to join an NGO called "Edialogue," an internet chat platform on Islam.
He sees what looks like straightforward missionizing as "interfaith work," though the site highlights the number of "new Muslims" it's produced (42,000 and counting).
All kinds come to the chat room - from aggressive trolls and Islamophobes (whom he claims are part of a concerted, Western government-funded effort to undermine it) to those ready to take the leap of faith. During his own shifts, he says, those converts who have proclaimed the Shahada have climbed into the triple digits. Nathan apparently knows how to talk to all of them: he's open about being a convert and his Jewish background: "Sometimes they ask me or I bring it up occasionally."
Although Saudi Arabia had an established Jewish community before the coming of Islam it's not quite accurate to call him Mecca's "last Jew," hanging on in inhospitable climes. Nathan/Mohammed might instead be the first "new Jew" in Saudi Arabia, a throwback to the cultural and familial coexistence and intimacy between Muslims and Jews in parts of the Arab world that once was and perhaps could be again.
But we're not there yet. It's only because of Mohammed's wholehearted conversion to Islam that he's even allowed to step foot in Mecca; his older, Jewish alter-ego, Nathan, wouldn't even be allowed to enter.
Adam J Sacks holds an MA and PhD in history from Brown University and an MS in education from the City College of the City University of New York. He currently lives in Philadelphia |
var arguer = require('arguer');
/* ========================================================================================================
*
* Private Members Declaration (no methods)
*
* ===================================================================================================== */
var _idRegex = /\d+$/;
/* ========================================================================================================
*
* Utilities Namespace
*
* ===================================================================================================== */
module.exports = function (neo4j)
{
var _autoBatchFormat = [ { name: 'batch' },
{ name: 'endpoint', optional:true, type: 'object' },
{ name: 'namedEndpoint', type: 'string', mutex: 'endpoint' },
{ name: 'factory', type: 'function', mutex: 'endpoint' },
{ name: 'factoryArgs', instance: Array, requires: 'factory' },
{ name: 'factoryArg', mutex: 'factoryArgs', requires: 'factory' },
{ name: 'count', optional: true, type: 'number' },
{ name: 'method', type: 'string' },
{ name: 'data', nInstance: Array, nType: 'function', optional: true },
{ name: 'datas', instance: Array, mutex: 'data' },
{ name: 'callback', type: 'function' } ];
/* ========================================================================================================
*
* Public Methods - Keep in alphabetical order
*
* ===================================================================================================== */
this.autoBatch = function (batch, endpointOrFactory, factoryArgs, method, dataOrCount, callback)
{
var args = arguer(arguments, _autoBatchFormat);
var noArray = false;
if (!args.count)
{
if (args.datas)
{
args.count = args.datas.length;
}
else if (args.factoryArgs)
{
args.count = args.factoryArgs.length;
}
else
{
noArray = true;
args.count = 1;
}
}
batch = args.batch ? args.batch : new neo4j.Api.Batch();
var returned = [];
var combine = function (error, obj)
{
if (!returned)
return;
if (error)
{
args.callback(error);
returned = null;
return;
}
returned.push(obj);
if (returned.length === args.count)
args.callback(null, (noArray ? returned[0] : returned));
};
var endpoint = args.namedEndpoint ? neo4j.Api.getEndpoint(args.namedEndpoint) : args.endpoint;
var d = args.data;
for (var i = 0; i < args.count; i++)
{
if (args.factory)
{
if (args.factoryArgs && args.factoryArgs[i] !== undefined)
endpoint = args.factoryArgs[i] instanceof Array ? args.factory.apply(null, args.factoryArgs[i]) : args.factory(args.factoryArgs[i]);
else if (args.factoryArg !== undefined)
endpoint = args.factoryArg instanceof Array ? args.factory.apply(null, args.factoryArg) : args.factory(args.factoryArg);
else
endpoint = args.factory();
}
if (args.datas && args.datas[i] !== undefined)
d = args.datas[i];
new neo4j.Api.Request(batch, endpoint, args.method, d, combine);
}
if (!args.batch)
batch.run(combine);
};
this.errorOnly = function (callback)
{
return function (error)
{
callback(error);
};
};
this.inherit = function (base, child)
{
var props = Object.keys(base.prototype);
var p;
for (var i in props)
{
p = props[i];
if (p === 'valueOf')
Object.defineProperty(child.prototype, 'valueOf', { value: base.prototype[p], enumerable: false });
else
child.prototype[p] = base.prototype[p];
}
};
this.parseId = function (url)
{
return _idRegex.exec(url)[0];
};
this.pathJoin = function (a, b)
{
if (b[0] === '?')
return a + b;
if (b[0] === '/')
{
if (a[a.length - 1] === '/')
return a + b.substr(1);
return a + b;
}
if (a[a.length - 1] === '/')
return a + b;
return a + '/' + b;
};
};
/* ========================================================================================================
*
* Private Methods - Keep in alphabetical order
*
* ===================================================================================================== */
// code
/* ========================================================================================================
*
* Initialization
*
* ===================================================================================================== */
// If function calls need to be made to initialize the module, put those calls here.
|
Q:
Can you use mov with an indirect operand as both source and destination?
Can I use mov with an indirect operand as both the source and destination?
E.g.
mov eax, OFFSET foo
mov esi, OFFSET bar
mov [eax],[esi + LENGTHOF bar]
From what I've tried I'm guessing you can't due to an invalid instruction operand error. But I haven't read anywhere that explicitly states you can't so I want to make sure it's not due to some other error.
A:
The x86 mov instruction does not support memory-to-memory moves.
Have a look at Volume 2: Instruction Set Reference, namely the MOV instruction. There are reg <- reg, mem <- reg, and reg <- mem forms, but no mem <- mem.
To move data from memory to memory, one must either use an intermediate register, or the movs instruction, which moves a value from address DS:ESI to ES:EDI. This is the reason those registers are named as such (source index, and destination index).
|
j - 12. Let o be s(6). What is the highest common factor of 2 and o?
2
Let l = -2 - -4. Suppose l*y + 2*y - 8 = 0. Let q be y/5 + (-588)/(-30). What is the greatest common divisor of q and 30?
10
Let o be -68*(40/8 + -7). Calculate the greatest common divisor of o and 8.
8
Suppose -x - 2*x = -30. Let k be (8/5)/(4/x). Suppose -3*i = -k*a - 39, 10*i - 5*i + 2*a = 91. What is the highest common divisor of 68 and i?
17
Let v be (-2)/(-6) + 2/(-6). Suppose 2*h - 4 = 3*h, -y + 5*h + 42 = v. What is the highest common divisor of 11 and y?
11
Let h be (-2)/(-3) + ((-134)/(-6) - -2). Suppose 3*k - k + 227 = s, -5*s + k + 1126 = 0. What is the highest common divisor of s and h?
25
Let g = -27 + 29. Let p(d) = 6*d**2 + 4*d - 3. Let h be p(g). What is the greatest common factor of 145 and h?
29
Suppose 0 = -3*s - 4*w + 69, 4*w - 46 = -3*s + s. Suppose 9 = 4*y - s. Calculate the greatest common factor of y and 8.
8
Let o = -151 - -140. Let z(g) = g**3 + 9*g**2 - 25*g - 20. Let d be z(o). Calculate the greatest common divisor of d and 13.
13
Suppose j - 4*b = -11, -3*j - b + 15 = 35. Let i be j/(7/(-4)) + 86. What is the highest common factor of i and 10?
10
Let q(n) = 2*n**3 - 6*n**2 - 2*n + 15. Let b be q(5). Calculate the highest common divisor of 35 and b.
35
Let j be (65/39)/(-1*(-1)/(-18)). Let c = -6 - j. What is the highest common factor of 6 and c?
6
Let n be (-6)/(-33) - (-1603)/77. What is the greatest common divisor of 3 and n?
3
Suppose 0 = -66*r + 63*r + 18. Calculate the highest common factor of r and 14.
2
Let w = 199 - 191. Calculate the greatest common divisor of w and 108.
4
Let v be (-23)/(460/48)*(-320)/3. Let n be 31 + (1 + 1)/2. What is the highest common factor of v and n?
32
Suppose 185 = 2*s - 13. Suppose -22 = 3*z - 5*z. What is the greatest common factor of z and s?
11
Suppose 82 = 3*p + 4*a, -2*p - 38 = -3*p + 4*a. What is the highest common divisor of 20 and p?
10
Let v(m) = -m**3 - 6*m**2 + 2*m - 33. Let r be v(-7). Let f be ((-1)/r + 0)*-38. What is the highest common divisor of f and 361?
19
Suppose 42*m - 4216 = 9602. What is the highest common divisor of m and 94?
47
Let d = -1348 + 1402. Calculate the highest common divisor of d and 1917.
27
Let n(c) = 13 - 29*c - 1 - c**2 + 2*c + 37. Let r be n(-20). Calculate the highest common divisor of r and 27.
27
Let s = -155 + 206. What is the highest common factor of s and 6?
3
Let q = -467 - -483. Calculate the greatest common factor of q and 14.
2
Suppose 234 = 2*u + 3*b, 2*b + 3*b = -u + 110. What is the greatest common factor of u and 45?
15
Let b(s) = s - 10. Let v be b(11). Let x be (-1 - 1)*(-1)/(-2). Let a be (-40)/(-6) - x/3. Calculate the greatest common divisor of v and a.
1
Suppose -43 = -25*i + 22*i - 2*l, 4*l = 2*i - 34. What is the greatest common factor of i and 645?
15
Let r = 482 + -478. What is the greatest common factor of 334 and r?
2
Suppose -2*c + 15 + 11 = 0. Suppose c = 4*s - 27. What is the greatest common divisor of 10 and s?
10
Suppose -2*c = 3*y - 10, -3*y - 8 + 3 = -c. Suppose -2*p - v = v - 22, y = p + 3*v - 19. What is the highest common divisor of 3 and p?
1
Let u(c) = -5*c**2 + c**3 + c**2 - 8*c + 0 + 1 + 6. Let w be u(5). Let o = -7 - w. Calculate the greatest common factor of o and 8.
1
Let l be 2/1 + (-4 - -7). Suppose 4*z = -l*r + 466, 3*r + 0*z = -5*z + 290. What is the highest common factor of 10 and r?
10
Let a be (-1300)/6*15/(-10). What is the greatest common factor of a and 5?
5
Suppose 8*l = 18*l + 760. Let b = -24 - l. Calculate the highest common divisor of b and 26.
26
Let y(p) = -p**3 + 9*p**2 - 9*p + 10. Let c be y(8). Suppose -2 = z - c*z. Suppose 6 = z*v - v. Calculate the highest common factor of 3 and v.
3
Let n(d) = 59*d + 14. Let z(c) = 29*c + 7. Let m(s) = 3*n(s) - 5*z(s). Let h be m(7). Calculate the highest common factor of h and 21.
21
Let u be 2 + (-1 - -4 - 2). Let k be (-32)/3*-2 + (-1)/u. Calculate the highest common divisor of k and 14.
7
Let r be 21/(-6)*(-1 + -1). Suppose -8*t - 4 = -4*t. Let g be (-2)/(-2) + t/1*-34. What is the highest common factor of r and g?
7
Let p be ((-1)/((-6)/140))/(152/228). Calculate the greatest common factor of 245 and p.
35
Suppose -9*g + 960 - 906 = 0. Calculate the greatest common divisor of 42 and g.
6
Suppose -g + 5*v + 1136 = 0, 6*v = 4*g + 2*v - 4496. Calculate the highest common factor of 19 and g.
19
Let s = -57 - -167. Suppose 218 - 878 = -4*h. Calculate the greatest common factor of h and s.
55
Suppose 18 + 15 = 11*i. Let a be (i/2 - 1)*(-100)/(-2). What is the greatest common divisor of a and 5?
5
Let x(t) = t. Let j = 20 - 23. Let m(p) = -9*p - 4. Let f(g) = j*x(g) - m(g). Let y be f(2). Calculate the greatest common divisor of y and 8.
8
Let b = 211 + -191. What is the highest common factor of 5 and b?
5
Let p(w) = 13*w + 1. Let k be p(11). Let x be ((-2 - -3 - -3) + 5)/1. What is the highest common factor of k and x?
9
Suppose -2*t = 4*x - 2890, 4*t - 4516 = -4*x + 1272. Suppose 21*z + t = 28*z. What is the greatest common factor of z and 23?
23
Let t = -1326 - -1630. Calculate the greatest common factor of t and 190.
38
Let j be (-88)/(56/(-7)) - (0 + -4). Suppose -f + 123 = -3*p, -2*f - 4*p - 119 = -3*f. What is the highest common divisor of f and j?
15
Let g be (((-1)/2)/(2/20))/(-1). Let f be ((-75)/(-2))/g - 18/(-12). Let r = -38 - -74. What is the highest common factor of f and r?
9
Let n = 72 - 48. Let v(d) = -2*d**2 - 13*d + 3. Let i be v(-7). Let x be 0 + i - 1*-64. Calculate the highest common divisor of n and x.
12
Let l be 52 + 2 - (0 + 3). Suppose -5*p + l = -2*p. Let i = 121 - -66. Calculate the highest common divisor of i and p.
17
Let d be 16 - 6 - (-420)/14. Calculate the greatest common divisor of d and 140.
20
Let a = 16 - 10. Suppose -5*j + a = -2*j. Suppose 2*q - 10 = -2*x, -3*x = 4*q - j*x - 23. What is the greatest common divisor of q and 42?
6
Suppose -o + 0*t - 2*t = -12, 0 = -3*o - 3*t + 24. Let g = 6 - -3. Let u be (o - (-174)/g)*12. What is the highest common factor of u and 35?
35
Let c(s) = 30*s - 864. Let a be c(30). What is the highest common factor of 873 and a?
9
Let o(d) = 2*d**3 - 5*d**2 + 6*d - 3. Let q be o(2). Suppose 5*b - 4*b + 3*r = 51, -98 = -2*b - q*r. What is the greatest common divisor of b and 390?
39
Let z = 20 + 68. Suppose 0 = 4*n - z - 456. Calculate the highest common factor of 34 and n.
34
Let c = -20 - -25. Suppose 0 = -i - c*y + 139 - 28, i + y - 99 = 0. What is the greatest common factor of i and 12?
12
Suppose -3*w + 854 = -5*s - 311, -5*s - 770 = -2*w. Calculate the highest common divisor of 158 and w.
79
Suppose 0 = 21*u - 60*u + 8697. What is the greatest common divisor of u and 1?
1
Let n be (-14)/105 + -2 + 25984/30. What is the greatest common divisor of 32 and n?
32
Let u(l) = l**2 + 18*l + 23. Let c be u(-16). Let t be 6/c*3 + (-24)/(-1). Calculate the highest common divisor of t and 33.
11
Suppose 16 = n - 5*x - 7, 5*n + 4*x - 173 = 0. Calculate the greatest common factor of n and 6.
3
Let d(z) = z**2 + 3*z + 2. Let g = -73 + 70. Let n be d(g). Calculate the greatest common factor of n and 2.
2
Let v(i) = 3*i**3 + i**2 + i - 1. Let u be v(1). Suppose 2*d - u*d = -136. Calculate the highest common divisor of d and 17.
17
Let a be ((-4 - 1) + 6)*(-1 - -13). Calculate the greatest common factor of a and 40.
4
Let c(f) = f**3 - 3*f**2 - 9*f - 45. Let l be c(8). Calculate the greatest common divisor of l and 87.
29
Let y be ((-26)/39)/(10/(-240)). Let c = 6 + -10. Let m be 3/6 - 382/c. What is the highest common factor of m and y?
16
Let c = 2364 - -259. What is the highest common factor of c and 61?
61
Let b = -12 - -17. Suppose -4 = -c + 3*d + d, 5*c + 3*d + 26 = 0. Let p be (-66)/c + 12/(-8). Calculate the greatest common factor of p and b.
5
Let m(y) = -y**2 - 7*y + 21. Let o be (21/(-14))/(3/18). Let i be m(o). What is the greatest common factor of i and 3?
3
Suppose -8*z + 50 = 3*b - 6*z, 0 = 5*b - 3*z - 115. What is the greatest common divisor of 4 and b?
4
Let b be -1 - 3*102/18. Let u be (b/(-9))/(3*2/30). Let o be (-2)/(-4) - 318/(-4). What is the greatest common divisor of u and o?
10
Let z = 332 + -328. What is the greatest common divisor of 36 and z?
4
Suppose 0 = 11*f - 1841 - 7146. What i |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.