text
stringlengths
8
5.77M
Q: ASP.Net MVC how does back-end know if user signed in I created a ASP.Net C# MVC app with "Individual User Account" for Authentication + localDB. I started the app in visual studio with IIS express on localhost, signed up an user and logged in with that user. I am trying to understand how back-end know a user has logged in in the following scenario: start the iis express & app in visual studio log in stop the iis express & app in visual studio start again the iis express & app in visual studio user still logged in (WHY???) I checked the user tables in db, and could not find any fields indicate a logged in user. I am thinking stop & restart iis express should clear everything in the back-end as well. So how does the back-end know there was an user logged in in the step 5 above?? I found the following cookie in the http request Cookie: _ga=GA1.1.1546797954.1551225891; __RequestVerificationToken=PSFeb9iP4aZr3wxxb8nJNKtki_1XPTzGO1Hzaf0W3iDsSCnV_qCfMsC9TY980X51c2rANZA-zureu6UHKEssAHza58AdmQUdZVL98VGYlRc1; .AspNet.ApplicationCookie=VUPznoprBRK2z13u03ArrC9HLHeGGUyTSvu9rYpSnZju_Rz4X2V5n9faw0EhnmuFjVN1AIva7HZSAhUBeSZ5jQHSej6XaAExy0hkwF_9vC190LfWBPP-oH3Zp0jj0ZmZ7L3sLlLqux4HV5CZSA-jqhDF4IXAFKyisFFV136PlxrJTmb9OXRrmo9rigCiIy0z_oixDlg1eHVI3T6ptVgn1Qhohtr1mTqoBJsF7gi7CHymSBlyFJ5MgYxfPcWNhJnj3H-WWK1ijkfzxsm0R13m2_6IbIiK1y5uzQBkklb8oMuz0mD27GlwMzteQBP3VLOXn77BreOPefJ8_2AekYjFGjgBIGGpngxLVzDneT4rC-BDiVKdWO_FRuail4ivVAN2ZJtdjK0uEPqnln5rmOlT0MLAhYzHMkk-HTvtW-Xo-Kexinlh58uxz0E7bncY5I6troc19E0fBLMnfXThtaL7ur6CN4pqUyq4yALJCTHszG3RPLQoJja0u1g34i-mKunZ A: In web development there is very basic concept called cookie.The cookie is responsible too store user information in browser. When you sign-in in membership system ,it adds a special header called Set-Cookie to response which afterward get's stored in browser cache.The information send through header contains information about loged in user's identity. With subsequent requests browser send the same cookie to the server and the membership system parses that info to identify the user which makes request and if the information is valid you are logged in and system identifies you. EDIT : The detail of operations taking place is not unique and depends on which library you use for authentication but if you use asp.net default authentication system then you can go and see how things get done in the source code.For ASP.NET CORE check https://github.com/aspnet/AspNetIdentity and for ASP.NET MVC check : https://github.com/aspnet/Identity
/* Copyright (c) 2010-2019 Sander Mertens * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. */ #include <bake_util.h> /* Open file */ ut_code* ut_code_open( const char* fmt, ...) { va_list args; va_start(args, fmt); char *name = ut_vasprintf(fmt, args); va_end(args); char ext[255]; ut_code *result = malloc(sizeof(struct ut_code)); result->file = NULL; result->indent = 0; result->name = name; ut_file_extension(name, ext); result->file = fopen(name, "w"); if (!result->file) { ut_throw("%s: %s", name, strerror(errno)); free(result); goto error; } return result; error: ut_throw("failed to open file '%s'", name); return NULL; } /* Increase indentation */ void ut_code_indent( ut_code *file) { file->indent++; } /* Decrease indentation */ void ut_code_dedent( ut_code *file) { file->indent--; } /* Write to file */ int ut_code_write( ut_code *file, char* fmt, ...) { va_list args; va_start(args, fmt); char *buffer = ut_vasprintf(fmt, args); va_end(args); /* Write indentation & string */ if (file->indent && file->endLine) { if (fprintf(file->file, "%*s%s", file->indent * 4, " ", buffer) < 0) { ut_throw("ut_codeWrite: writing to outputfile failed."); goto error; } } else { if (fprintf(file->file, "%s", buffer) < 0) { ut_throw("ut_codeWrite: writing to outputfile failed."); goto error; } } file->endLine = buffer[strlen(buffer)-1] == '\n'; free(buffer); return 0; error: return -1; } void ut_code_close(ut_code *file) { fclose(file->file); free(file->name); free(file); }
Friday, October 26, 2007 I don't like the look of the common sumac trees that grow like weeds here in NJ. This is probably Rhus glabra but I'm not certain. But, during the fall, the sumac puts on a brilliantly colorful show and somewhat redeems itself in my eyes. It looks like the colorful pennants or streamers strung around used car lots. That association is unfortunate but I can't think of any other comparison. Thursday, October 18, 2007 Monday, October 15, 2007 Fringed Tubaria? The distinct border at the edge of the cap and the dark colored stems (the same color as the border) don't look like any mushroom in my field guide book. Several have almost the same color but no sharply demarcated edge border so I don't know what it is. Monday, October 8, 2007 Tuesday, October 2, 2007 I had a pleasant surprise when I came upon this wild morning glory while filling the bird feeders. I was completely unaware of the vine so was astonished to see such a beautiful flower in a weedy patch.
1. Field of the Invention The invention disclosed herein pertains generally to improvements in combustors or burners and more particularly relates to gas and liquid heaters and steam generators having an improved combustor. 2. Description of the Prior Art A vast number of burner arrangements are known for a virtually limitless number of specific uses. Typically, combustion takes place in an open combustion zone with the combustion gases then passed through a heat exchanger to heat a fluid such as air or water. Conventional combustion devices are unsatisfactory since oftentimes combustion is incomplete producing various pollutants and furthermore because the efficiency obtainable from such combustion devices is relatively poor. The known burners or combustors used for heating liquids such as water are generally quite massive and consume large amounts of fuel (usually oil or gas). Most presently used burners rely on a continuous flow of the fuel, thus perhaps wasting some of the fuel due to incomplete combustion. Combustion devices having an intermittent flow of fuel are known, for example, as in a conventional piston engine or in a pulsing combustor. Perhaps one of the first pulsing combustors was the pulse-jet engine utilized in the German V-1 rocket or buzz bomb which is described on pages 2 and 3 of the book Rocket Propulsion Elements by George P. Sutton (John Wiley & Sons, 1949.). Another known pulsing combustor is disclosed in U.S. Pat. No. 2,857,332 to Tenney et al and is utilized in a machine for producing dispersions of liquid in air or other gases. In the Tenney et al device, a fuel-air mixture is supplied through an inlet portion of a combustor with combustion air passing sequentially through a throat of an air inlet passage and over a sloping step in a fuel injection tube. Fuel is discharged as a spray and is metered in proportion to the incoming air. The fuel-air mixture is forced through a plurality of diverging passages into a combustion zone of the combustor. The passages each have a port at the combustion chamber end of each passage. Each port is covered by a finger-like portion of a metal valve preferably made of a flexible steel. The finger-like portions of the valve are sufficiently flexible to be deflected against a backing plate by the inrush of the air-fuel mixture when the burner is operating. Initially, the starting air-fuel mixture is introduced into the burner chamber and is ignited by a spark plug. The resulting explosion causes the finger-like portions of the valve to close against the intake ports leaving an exhaust tube as the only path of exit for the combustion zone gases. The mass of gases in the exhaust tube is then driven forceably at extremely high velocity outwardly of an open end of the exhaust tube by the expanding combustion gases produced by the explosion in the combustion zone. The rush of gases out of the exhaust tube causes a low pressure area in the combustion zone. The low pressure area induces a fresh charge of combustible air-fuel mixture through the ports and into the combustion zone. Fuel is fed to the combustion zone through a plurality of fuel ports and the air used is atmospheric air. The burner depends on the low pressure zone existing in the combustion chamber after exhaustion of the hot combustion products to induce a further flow of the air-fuel mixture into the combustion zone. A resonant intermittent combustion heater system using a pulsing combustion arrangement similar to the pulsing combustor disclosed in U.S. Pat. No. 2,857,332 is also known in the prior art and is disclosed in U.S. Pat. No. 2,715,390, issued to Tenney et al. A different pulsing combustion arrangement having a burner is disclosed in U.S. Pat. No. 2,959,214 issued to Durr et al. During ignition of the burner in the Durr et al device, a spark plug is activated along with a pump to supply air through a conduit under pressure to a tightly closed fuel tank. The air streaming through the tube vaporizes an amount of fuel at a diaphragm and this mixture flows into a mixing tube. The mixing tube mixes the fuel-air mixture with a further supply of air and the resulting mixture then is ignited by the spark. The burning does not provide a complete combustion of the fuel-air mixture and therefore unburned combustible components circulate within a cyclone-form combustion tube before reaching an exhaust tube. As the burner continues to operate, a part of the cyclone-form combustion tube becomes hot and the unburned combustible components which enter the cyclone combustion tube are ignited. An explosion takes place within the combustion tube and the explosion provides a sudden blast of exhaust gases through the exhaust tube. These explosions follow each other uniformly and a resonant intermittent combustion takes place providing an automatic suction of fuel and air. A spraying device having a different pulsing combustor with an oscillating burner resonator fed by a carburetor is disclosed in U.S. Pat. No. 3,758,036 issued to Bauder et al. A blower is set into operation so that a fuel whirling chamber is pressurized via a starting air pipe and fuel is supplied to the fuel whirling chamber by a tank through a nozzle. The fuel-air mixture is then supplied through a tube to the burner and an ignition device in the burner ignites the fuel-air mixture. During subsequent operation, air is drawn into a valve chamber through a suction valve provided on a front side of the carburetor and is mixed with fuel from the fuel nozzle. On a side wall of the carburetor is a lid which carries an adjusting device for the oscillating burner resonator. The adjusting device includes an air evacuating valve associated with the fuel whirling chamber and a pressure space enclosed by the lid. A diaphragm is sealed at its edges to an outside of the lid with a middle area of the diaphragm being connected to a valve closing part of the air evacuating valve. The Bauder et al patent also discloses a portable spraying apparatus having a hand held gun. The burner in the Bauder et al patent is cooled by air in a surrounding cooling cover which obtains the air from a blower through a pipe. An oscillating tube, also surrounded by the cooling cover, conducts the hot combustion products away from the burner toward a front section of the cooling cover. A liquid agent is introduced by the nozzle into the oscillating pipe so that the hot combustion products of the burner will turn the liquid into a steam or mist which will be expelled through a widened end section of the gun. A known recirculating burner is disclosed in U.S. Pat. No. 3,366,154 issued to Walsh et al which shows a compact portable burner useful in flame cultivation of crops. Some of the products of combustion are recirculated from a discharge end of the burner to a position between the discharge end and a venturi throat and just forward of an oil nozzle for the purpose of providing a clean flame and more efficient burning of the fuel. A recirculation jacket surrounds a central portion of the burner and has a top wall, a bottom wall and a pair of similar symmetrically disposed side walls in a predetermined outwardly spaced relation to top, bottom and side walls of the burner. The front ends of the jacket wall and the burner wall are joined together by a front shoulder. Similarly, the rear end of the jacket wall and the burner wall are joined together by a rear shoulder. A plurality of openings is provided in the burner walls adjacent and slightly rearwardly of the front shoulder and a similar plurality of openings is provided adjacent and slightly forwardly of the rear shoulder. Hot combustion gas enters the plurality of front shoulder openings and is recirculated to the rear and reenters the burner by venturi action at the rear shoulder openings to provide a more efficient burning of the fuel as well as improved vaporization of the fuel which is preferably fuel oil. U.S. Pat. No. 3,718,805 issued to Posey dicloses a heated fluid gun in which the fluid is heated by an electrical cartridge surrounded by a fluid channel. A fluid enters the fluid channel through a rear entrance and flows around and is heated by the heater cartridge. The heated fluid flows into a fluid expansion chamber located within a barrel of the gun. A fluid additive nozzle introduces an additional fluid such as a detergent into the stream of heated fluid downstream from the fluid expansion chamber and the heated fluid with the detergent is then discharged through an orifice located at a front surface of the gun. Another portable steam cleaner having an electrical element heating the water is disclosed in U.S. Pat. No. 2,639,365 issued to Krampe et al on May 19, 1953. Other patents and publications which disclose combustor arrangements of interest to the present invention include: U.S. Pat. No. 2,634,804 of Erickson; U.S. Pat. No. 2,589,566 of Neth et al; U.S. Pat. No. 2,077,323 of Hendrix; U.S. Pat. No. 2,411,675 of Alexander; U.S. Pat. No. 1,719,015 of Lewis; U.S. Pat. No. 1,885,040 of Arnold; U.S. Pat. No. 4,259,928 of Huber; British Pat. No. 166,455; French Pat. No. 1,366,565; and, "Pulsating Combustion: An Old Idea May Give Tomorrow's Boiler's a New Look", Power, pp. 88-91, August 1954. Accordingly, the need exists for an improved burner which provides an efficient and economical use of fuel. Such an improved burner would have particular utility in steam generation devices and in home heating equipment especially where a fluid is to be heated by the combustion.
Q: Use a static value in class extends I would like to use a method using a constant according to class she is called. Sorry for this bad explanation, here is an example : public class Mom{ public void execute(parameters){ // Some actions String nf = String.format(C_CARS) } } public class Son1 extends Mom{ private static final String C_CARS=" myFormat " } public class Son2 extends Mom{ private static final String C_CARS=" myFormat2 " } public static void main(String[] args){ Son1 son1=new Son1(); Son2 son2=new Son2(); son1().execute(myparameters); son2().execute(myparameters); } I would like to do something like that, is there a way ? The problem here is C_CARS is unknown in Mom Class. A: This is just not how inheritance works in Java. You need a guarantee that all instances of Mom have a value. Do this via an instance method, e.g. public abstract class Mom{ public void execute(parameters){ String nf = String.format(getCCars()); } protected abstract String getCCars(); } And then implement in the child classes: class Son1 extends Mom { @Override protected String getCCars() { return "something"; } } There is something up with your object oriented design. Remember: every instance of a Son1 class is also an instance of Mom. But in the real world, most sons aren't mothers. extends is not the right thing to use here.
'19 Prospect Ranks Friday, February 13, 2015 Prospect Nation 2015: #7 RHP Ben Lively Acquired this off-season from Cincinnati, righty hurler Ben Lively would quickly land among the ranks of top Phillies prospect. He'll enter this coming season looking to prove why. Originally selected in the fourth round of the 2013 draft, the Florida native would begin his pro career as a member of the rookie level Billings Mustangs. In 12 starts, Lively would tally a 0-3 record with a 0.73 ERA and an 11.92 K/9 mark. He was promoted to Class A Dayton to close out the season with a single start, allowing one earned run in four innings of work while striking out seven and walking one. This was fresh off his junior season at the University of Central Florida where, in 15 games, he went 7-5 with a 2.04 ERA and an 8.57 K/9 mark as the team's ace. Lively would follow up his exceptional year by becoming the Reds' minor league player of the year in 2014. Opening the season with Class A Advanced Bakersfield, Lively posted a 10-1 record with a 2.28 ERA, a .201 batting average against and a 10.82 K/9 mark in 13 starts. A stretch of 31 consecutive scoreless innings as a member of the Blaze got Lively some considerable attention and he was selected as a California League All-Star. In mid-June, he was promoted to his hometown Double-A Pensacola Blue Wahoos. There, he would sport a 3-6 record with a 3.88 ERA, a .232 batting average against and a 9.5 K/9 mark. The six-foot-four 190-pounder features a repertoire that includes a low-to-mid-90's fastball, a slider, a change up and a curve ball. All of his offerings come with a deceptive delivery that helps Lively gain an advantage on the opposition. Projections would have Lively, who will turn 23 years old in early March, as a big league starter. His progress will determine where he might land among a team's five starters. Out of high school, where he was also a varsity athlete in football and basketball, Lively was drafted in the 24th round by Cleveland, but chose not to sign. Lively, who was dealt by the Reds for veteran outfielder Marlon Byrd, is primed to open the 2015 as a member of a stacked Double-A Reading starting rotation.
The federal government says it's reviewing the recently launched constitutional challenge to Quebec's controversial face-covering ban. A coalition of Muslim and civil liberty groups filed the complaint in Quebec Superior Court on Tuesday. The challenge contests portions of Quebec's religious neutrality law under both Quebec's Charter of Human Rights and Freedoms and the Canadian Charter of Rights and Freedoms. The law requires those giving or receiving public services to do so with their faces uncovered. "We have been following the progress of Bill 62 and appreciate the importance of the issues it raises. As the prime minister has said, we do not believe that the government should be telling people what they can and cannot wear," said Justice Minister Jody Wilson-Raybould in statement. "We are aware that an application has been filed in Quebec and we are reviewing it carefully. As Attorney General of Canada, I am committed to upholding the rights of all Canadians under the Charter of Rights and Freedoms." Quebec Justice Minister Stéphanie Vallée said the law only applies when it's required for communication, identification or security reasons. She said the law is not meant to be repressive. On Tuesday, she told reporters she was confident the law would survive a court challenge. Marie-Michelle Lacoste, a Quebec woman who converted to Islam, is a plaintiff in the legal challenge. She now uses the name Warda Naili. (Graham Hughes/Canadian Press) Prime Minister Justin Trudeau has said "it's not up to the federal government to challenge" Bill 62. Trudeau told reporters last month that as a federal government "We're going to take our responsibilities seriously and look carefully at what the implications [of the bill] are." While the federal government can't directly challenge a provincial bill, it could seek to act as an intervenor and file arguments in the subsequent proceedings. In 2013, for instance, the federal government intervened in a case involving Quebec's Bill 99, which deals with secession. Alternatively, the federal government could refer the legislation directly to the Supreme Court, asking the high court to review its constitutionality instead of waiting for any legal challenge to reach that level. The federal government could make arguments in those proceedings.
The anti-Fc gamma RIII mAb 3G8 induces neutrophil activation via a cooperative actin of Fc gamma RIIIb and Fc gamma RIIa. Human neutrophils express two types of Fc gamma receptors, the transmembrane Fc gamma RIIa and the glycan-phosphatidylinositol-anchored Fc gamma RIIIb, that show synergism in provoking a cellular response. To analyse further the requirements for this synergism to occur we used the monoclonal antibody 3G8, directed against Fc gamma RIII. This antibody is able to induce neutrophil activation, as measured by an increase in the intracellular free Ca2+ concentration and homotypic neutrophil aggregation, but only when the Fc part of the antibody is able to interact with Fc gamma RIIa. We observed that binding of the Fab parts of 3G8 mAb to two Fc gamma RIIIb molecules and binding of the Fc part to one Fc gamma RIIa molecule is required, because a bispecific antibody, 2B1, in which only one 3G8 Fab is present, did not induce neutrophil activation. Moreover, engagement of one Fc gamma RIIa molecule and two Fc gamma RIIb molecules on the same cell is instrumental to achieve activation of the mAb 3G8. The activation of neutrophils by the 3G8 antibody represents a further example of synergistic activation of neutrophils via Fc gamma receptors.
Former San Jose Mayor Chuck Reed, best known for his quest to curb runaway public employee pension costs, is still at it after leaving City Hall and resuming work as a lawyer. In an op-ed for the San Diego Union Tribune, Reed highlighted the plight of Loyalton, a town of fewer than 800 souls in northeastern California. Loyalton drew national interest thanks to a write-up in the New York Times highlighting its battle with the giant California Public Employees’ Retirement System over the prospect of cutting payments to its handful of pensioners. Hit by hard times since its sawmill closed 15 years ago, Loyalton withdrew from CalPERS in 2013 after the last of its pensioners in the system retired. CalPERS then sent Loyalton a bill for $1.6 million to cover the retirees’ pensions, a figure that tops Loyalton’s entire annual budget. Loyalton officials were stunned, since they had dutifully paid CalPERS each year to fund the retirements. But CalPERS — in a widely criticized practice — lowballs the annual cost of its pensions, using rosy assumptions that investment earnings some day will make up the difference. Yet when public agencies in the system look to cut ties, CalPERS sends a bill revealing how badly underfunded the plans have been. That in fact happened to San Jose when Reed was mayor — the council backed off of quitting CalPERS pensions for its elected leaders after being told the exit would cost $5.7 million to ensure benefits for about 30 officials. With Loyalton unable to pay up, CalPERS last month declared the town in default, a move the state agency said would mean benefit reductions for Loyalton’s retirees. It’s being watched as a test of California’s tough protections of public employee pensions. “Let Loyalton be a wake-up call,” Reed wrote in his article. “Public employees, retirees and residents will suffer unless there is significant and meaningful pension reform.” Reed and other critics have drawn the wrath of unions by assailing generous public benefit formulas that let many career government workers retire in their 50s with six-figure lifetime payments. His San Jose Measure B in 2012 — replaced last month by a voter-approved settlement he supported — called for smaller pensions and higher retirement ages. But Reed avoided any criticism of Loyalton’s retirees, whose pensions hardly seem generous and whose plight is just sad. The Times featured a 71-year-old former bookkeeper who expects to see her $48,000 annual pension cut to $19,000. “All workers,” Reed wrote, “deserve safe and secure futures and shouldn’t be held responsible for poor decision-making by policy leaders.” CalPERS spokesman Brad Pacheco took issue with Reed’s article, accusing him of holding “anti-pension beliefs” and failing to point out a “key element behind the Loyalton story: Local agencies such as the city of Loyalton determine the benefits for public employees, not CalPERS.”
Canoeing at the 2004 Summer Olympics – Men's slalom K-1 These are the results of the men's K-1 slalom competition in canoeing at the 2004 Summer Olympics. The K-1 (kayak single) event is raced by one-man kayaks through a whitewater course. The venue for the 2004 Olympic competition was the Olympic Canoe/Kayak Slalom Centre at the Helliniko Olympic Complex. Medalists Results The 25 competitors each took two preliminary runs through the whitewater slalom course. The top 20 kayakers by combined time from the two runs advanced to the semifinal. The top 10 times from the single semifinal run determined the finalists. Ranking and medals are based on the combined time of the semifinal run and the final run. The preliminary runs were raced on August 19 and the semifinal and final runs were on August 20. References 2004 Summer Olympics Canoe slalom results Sports-reference.com 2004 men's K-1 slalom results. Yahoo! Sports Athens 2004 Summer Olympics Canoe/Kayak Results Men's Slalom K-1
Binaural interaction and the effects of stimulus intensity and repetition rate in human auditory brain-stem. Binaural interaction (BI) components in brain-stem auditory evoked potential (BAEP) and their changes with stimulus intensity and repetition rate were examined in human adult. Seven BI components were identified, which occurred between the latency range of 5 and 11 ms and coincided consistently with the latency range of BAEP waves IV-VII. Waves DV and DVII, occurring at the downslopes of BAEP waves V and VII, respectively, were the two most prominent and reproducible BI components. Wave DVII existed consistently at high, moderate and, in most cases, low stimulus intensities, suggesting that this component is neurogenic although acoustic cross-talk may account for a part of its waveform at high stimulus intensities. The latencies of all BI components increased as a function of decreasing stimulus intensity, while the interpeak intervals, especially DV-DVII, were essentially constant at different intensity levels. The amplitudes of BI components decreased slightly with decreasing intensity. As click repetition rate increased, BI wave latencies and interpeak intervals increased slightly and amplitudes decreased slightly. When repetition rate increased to above 20/s, BI components became poorly differentiated. Lower repetition rates, e.g. 10/s, are therefore preferred for routine derivation of the BI. The changes in the latency and amplitude of BI components with stimulus intensity and repetition rate were associated or concomitant with those of the corresponding BAEP components in monaural and binaural potentials. In view of the concomitant relationship between BI and BAEP latency, we designate BI components in association with the corresponding BAEP components.
Influence of tetrachlorodecaoxide (Ryoxon) on the development of leukemia after total-body gamma-irradiation. The effect of tetrachlorodecaoxide (TCDO) treatment after total-body irradiation (TBI) with gamma-rays (single dose, about LD 50) on the development of radiation-induced leukemia was tested in rats. TCDO was applied intravenously from day 4 through day 11. The control group was exposed to the same dosage of X-rays (TBI), but received physiological saline solution instead of TCDO. Compared to the control group, TCDO therapy initially markedly increased the survival rate: 72 versus 44% (6 months after TBI) and 36 versus 20% (1-year survival rate). The overall survival, however, was not significantly prolonged. TBI caused leukemia in 36% of the rats in the irradiation control group without TCDO treatment, however, none of 24 rats treated with TCDO after X-ray exposure developed leukemia. Since in this study TCDO was only administered for 8 days during the acute phase of radiation syndrome, we suppose that additional TCDO treatment at various times later on would lead to even better results.
# THE DARK BY LEMONY SNICKET ILLUSTRATED BY JON KLASSEN # Table of Contents Cover Title Page Start Reading Copyright About the Publisher # Start Reading Laszlo was afraid of the dark. The dark lived in the same house as Laszlo, a big place with a creaky roof, smooth, cold windows, and several sets of stairs. Sometimes the dark hid in the closet. Sometimes it sat behind the shower curtain. But mostly it spent its time in the basement. All day long the dark would wait in a distant corner, far from the squeaks and rattles of the washing machine, pressed up against some old, damp boxes and a chest of drawers nobody ever opened. At night, of course, the dark went out and spread itself against the windows and doors of Laszlo's house. But in the morning the dark would be back in the basement, where it belonged. Laszlo would peek at the dark every morning. "Hi," he would say. "Hi, dark." Laszlo thought that if he visited the dark in the dark's room, maybe the dark wouldn't come visit him in his room. But one night— it did. "Laszlo," the dark said, in the dark. The voice of the dark was as creaky as the roof of the house, and as smooth and cold as the windows, and even though the dark was right next to Laszlo, the voice seemed very far away. "What do you want?" asked Laszlo. "I want to show you something," said the dark. "In here?" "No," said the dark. "Here?" "No, no," said the dark. "Downstairs." "Downstairs?" "Yes," said the dark. In Laszlo's living room was the biggest window in the house. Laszlo looked out at all the dark outside. Above him the roof creaked, and he closed his eyes. Now the dark was all Laszlo could see. "No, no," said the dark again. "Not there." "Down here." "In the basement?" asked Laszlo. "Yes," said the dark. Laszlo had never dared come to the dark's room at night. "Come closer," said the dark. Laszlo came closer. "Even closer," said the dark. You might be afraid of the dark, but the dark is not afraid of you. That's why the dark is always close by. The dark peeks around the corner and waits behind the door, and you can see the dark up in the sky almost every night, gazing down at you as you gaze up at the stars. Without a creaky roof, the rain would fall on your bed, and without a smooth, cold window, you could never see outside, and without a set of stairs, you could never go into the basement, where the dark spends its time. Without a closet, you would have nowhere to put your shoes, and without a shower curtain, you would splash water all over the bathroom, and without the dark, everything would be light, and you would never know if you needed a lightbulb. "Bottom drawer," said the dark. "What?" "Bottom drawer," said the dark. "Open the bottom drawer." "Thank you," said Laszlo. "You're welcome," said the dark. By the time Laszlo got back into bed, the dark was no longer in his room, except when he closed his eyes to go to sleep. The next morning, Laszlo visited the dark in the basement. "Hi," he said. "Hi, dark." The dark didn't answer, but the bottom drawer was still open, so it looked like something in the corner was smiling. The dark kept on living with Laszlo, but it never bothered him again. # Copyright _The Dark_ Text copyright © 2013 by Lemony Snicket. Art copyright © 2013 by Jon Klassen. All rights reserved. Published by HarperCollins Publishers Ltd Illustrations published by arrangement with Little, Brown and Company, New York, New York, USA. All rights reserved. First Canadian Epub Edition All rights reserved under International and Pan-American Copyright Conventions. By payment of the required fees, you have been granted the nonexclusive, nontransferable right to access and read the text of this ebook on-screen. No part of this text may be reproduced, transmitted, downloaded, decompiled, reverse-engineered, or stored in or introduced into any information storage and retrieval system, in any form or by any means, whether electronic or mechanical, now known or hereinafter invented, without the express written permission of HarperCollins Publishers Ltd. HarperCollins books may be purchased for educational, business, or sales promotional use through our Special Markets Department. HarperCollins Publishers Ltd. 2 Bloor Street East, 20th Floor Toronto, Ontario, Canada M4W 1A8 _www.harpercollins.ca_ Library and Archives Canada Cataloguing in Publication information is available upon request EPub Edition APRIL 2013 ISBN: 9781443417969 # About the Publisher **Australia** HarperCollins Publishers (Australia) Pty. Ltd. 25 Ryde Road (PO Box 321) Pymble, NSW 2073, Australia <http://www.harpercollinsebooks.com.au> **Canada** HarperCollins Canada 2 Bloor Street East - 20th Floor Toronto, ON, M4W 1A8, Canada <http://www.harpercollinsebooks.ca> **New Zealand** HarperCollinsPublishers (New Zealand) Limited P.O. Box 1 Auckland, New Zealand <http://www.harpercollinsebooks.co.nz> **United Kingdom** HarperCollins Publishers Ltd. 77-85 Fulham Palace Road London, W6 8JB, UK <http://www.harpercollinsebooks.co.uk> **United States** HarperCollins Publishers Inc. 10 East 53rd Street New York, NY 10022 <http://www.harpercollinsebooks.com>
William H. Maddren William Harvey Maddren (August 3, 1875 – January 8, 1909) was an American lacrosse coach and physician. He served as the fourth head coach of the Johns Hopkins University lacrosse team from 1897 to 1901 during which time his teams compiled a 25–6 record and captured three national championships. Biography The son of a doctor, Maddren was a native of Brooklyn, New York. He attended Brooklyn Polytechnic Institute, from which he received a Bachelor of Science degree in 1896. Maddren then studied medicine at Johns Hopkins University and received a medical doctorate in 1901. Maddren played lacrosse at Hopkins from 1897 to 1901, and in his first year there, was elected team captain and appointed as its player-coach. The Intercollegiate Lacrosse Association awarded Hopkins the national championship each year from 1898 to 1900. In May 1904, Maddren returned to Baltimore to attend a medical clinic at Johns Hopkins Hospital, and while there, also served as an assistant coach to Charles MacInnes for the game against Swarthmore College. Alexander M. Weyand and Milton R. Roberts wrote in The Lacrosse Story that Maddren's efforts were largely responsible for "convert[ing] sedate Baltimore into a seething hotbed of lacrosse enthusiasm, the like of which had never been seen elsewhere in the United States." Maddren died on January 8, 1909 at an age of 33. The National Lacrosse Hall of Fame inducted him in 1961. References Category:1875 births Category:1909 deaths Category:Johns Hopkins Blue Jays men's lacrosse players Category:Johns Hopkins Blue Jays men's lacrosse coaches Category:People from Brooklyn Category:Physicians from Maryland Category:National Lacrosse Hall of Fame inductees Category:Polytechnic Institute of New York University alumni Category:Johns Hopkins School of Medicine alumni
Culture Collaboratory. Virtual Workspace for Interdisciplinary Collections Research and Management »Culture Collaboratory« is a virtual workspace that supports interdisciplinary teams researching and managing collections of cultural artifacts. The software design follows the premise that whole collections and individual artifacts can only be fully understood by approaching them from multiple disciplinary angles and with a diverse range of methods. Following this premise, the virtual workspace brings together researchers spanning disciplines from art and cultural history to conservation and material science. This setup allows to consider cultural artifacts in their multifaceted contexts including their historical function and meaning, the subject matter of visual art works, as well as their material properties, origin, and age. Integrating disciplinary research methods onto one shared interface, »Culture Collaboratory« helps researchers to analyze and interpret their findings and to create a holistic understanding of their research objects. The aim of this project is to facilitate and stimulate interdisciplinary research and exchange that ultimately will broaden the understanding of and accessibility to our cultural heritage. »Culture Collaboratory« grew out of the design research in the project »Transdisciplinary Indexing of Cultural-Historical Collections«
Magnitude of end-dialysis overweight is associated with all-cause and cardiovascular mortality: a 3-year prospective study. We hypothesized that the difference between the prescribed end-dialysis body weight, defined end-dialysis over-weight (edOW; kg), and the body weight which is actually attained could impact survival in hemodialysis (HD) patients. The aim of this prospective observational study was to evaluate if edOW could influence survival in a cohort of prevalent HD patients, controlled for multiple dialysis and clinical risk factors and followed for 3 years. One hundred and eighty-two patients (117 men, age 65 ± 13 years) on regular HD treatment for at least 6 months [median 48 months (range: 6-366)] were followed from January 1, 2008 to December 31, 2010. Eighty-four patients (46%) did not achieve their prescribed dry body weight (dBW); their median edOW was 0.4 kg (range: 0.1-1.4). Ninety-eight died during observation, mainly from cardiovascular reasons (69%). Multivariate Cox regression analysis was utilized to evaluate the effect edOW, ultrafiltration rate (UFR), interdialytic weight gain (IDWG), age, sex, dialytic vintage, cardiovascular disease, antihypertensive therapy, diabetes, duration of HD, dBW, BMI, mean arterial blood pressure, Kt/V, and protein catabolic rate (PCRn) had on mortality. Age (HR: 1.04; CI: 1.03-1.05; p <0.0001), IDWG (HR: 2.62; CI: 2.06-3.34; p < 0.01), UFR (HR: 1.13; CI: 1.09-1.16; p< 0.01), PCRn (HR: 0.02; CI: 0.01-0.04; p <0.001), and edOW (HR: 2.71; CI: 1.95-3.75; p < 0.02) were independently correlated to survival. The relative receiver operating characteristic curve identified a cutoff value of 0.3 kg for edOW in predicting death. High edOW is independently associated with an increased long-term risk of all-cause and cardiovascular mortality in HD patients. Better survival was observed in patients with edOW <0.3 kg. For patients with higher edOW, longer or more frequent dialysis sessions should be considered in order to prevent the deleterious consequences of excessive body fluid expansion.
Q: How can i convert a JSON array payload into one object with specific fields and an array with dates? I have a JSON payload fetched from the backend. The data contains an payload array with objects. By some how i want to convert these objects inside the array to one object, and the selectedDate dates to own array. The JSON payload seems like this: { "success": true, "payload": [ { "weekNumber": 40, "sortOrder": 1, "label": "autumn", "numberOfPossibleDays": 3, "editable": true, "selectedDate": "2020-09-29", "deliveryDays": [ { "date": "2020-09-28", "contactPerson": null, "phoneNumber": null, "contactPerson2": null, "phoneNumber2": null, "selected": false }, { "date": "2020-09-29", "contactPerson": "John", "phoneNumber": "99887744", "contactPerson2": "Tom", "phoneNumber2": "40040000, "selected": true }, { "date": "2020-09-30", "contactPerson": null, "phoneNumber": null, "contactPerson2": null, "phoneNumber2": null, "selected": false } ] }, { "weekNumber": 53, "sortOrder": 2, "label": "christmas", "numberOfPossibleDays": 2, "editable": true, "selectedDate": "2020-12-29", "deliveryDays": [ { "date": "2020-12-28", "contactPerson": null, "phoneNumber": null, "contactPerson2": null, "phoneNumber2": null, "selected": false }, { "date": "2020-12-29", "contactPerson": "Doe, "phoneNumber": "99999999", "contactPerson2": "Foo", "phoneNumber2": "44552200", "selected": true } ] } ] } What i want to do is to get output objects like this: { autumn=firstContactPersonName: "John", autumn=firstContactPersonPhone: "46442644", autumn=secondContactPersonName: "Tom", autumn=secondContactPersonPhone: "40040000" christmas=firstContactPersonName: "Doe", christmas=firstContactPersonPhone: "99999999", christmas=secondContactPersonName: "Foo", christmas=secondContactPersonPhone: "44552200" } And the dates output should be an array like this: const dateArray = ["autumn=2020-09-29", "christmas=2020-12-29"] I want it to be dynamically, because sometimes i might be have a object for easter and so on. Why i want to do this is because I am using the object to populate content in the input fields and the dateArray to enable which dates is choosen. I know this is not the best solution, but i have to try to make it out this way. I am all new to JavaScript and i have some problems making it out. I would appreciate if anyone can help me out, please? I hope the question and the example is good. Thank you for the help. A: let obj = { "success": true, "payload": [ { "weekNumber": 40, "sortOrder": 1, "label": "autumn", "numberOfPossibleDays": 3, "editable": true, "selectedDate": "2020-09-29", "deliveryDays": [ { "date": "2020-09-28", "contactPerson": null, "phoneNumber": null, "contactPerson2": null, "phoneNumber2": null, "selected": false }, { "date": "2020-09-29", "contactPerson": "John", "phoneNumber": "99887744", "contactPerson2": "Tom", "phoneNumber2": "40040000", "selected": true }, { "date": "2020-09-30", "contactPerson": null, "phoneNumber": null, "contactPerson2": null, "phoneNumber2": null, "selected": false } ] }, { "weekNumber": 53, "sortOrder": 2, "label": "christmas", "numberOfPossibleDays": 2, "editable": true, "selectedDate": "2020-12-29", "deliveryDays": [ { "date": "2020-12-28", "contactPerson": null, "phoneNumber": null, "contactPerson2": null, "phoneNumber2": null, "selected": false }, { "date": "2020-12-29", "contactPerson": "Doe", "phoneNumber": "99999999", "contactPerson2": "Foo", "phoneNumber2": "44552200", "selected": true } ] } ] } let results={}; let datesArray=[]; obj.payload.map((x)=>{ datesArray.push(x.label+"="+x.selectedDate); x["deliveryDays"].map((y)=>{ if(y.contactPerson){ let personKey = x.label + "=firstContactPersonName"; results[personKey] = y.contactPerson; let contactKey = x.label+"=firstContactPersonPhone"; results[contactKey] = y.phoneNumber; } if(y.contactPerson2){ let secondPersonKey = x.label + "=secondContactPersonName"; results[secondPersonKey] = y.contactPerson2; let secondContactKey = x.label+"=secondContactPersonPhone"; results[secondContactKey] = y.phoneNumber2; } }); }); console.log(datesArray) console.log(results) We iterate throught payload and make use of dates array to store the dates and results array to obtain the first and second contact person names during a season. Hope this helps!
Q: 2 fluid block elements side by side share space I have 2 elements which hold text, both are unknown width and I dont want to add fixed width to copy div. How do I make them float in one line and always occupy 100% width together? (without tables) .data{ max-width:400px; } .code { color: #fff; margin: 0; padding: 8px!important; line-height: 1.2; font-size: 11px; background: #bbb; border: 1px solid #333; word-wrap: break-word; float: left; } .copy { color: #ccc; display: inline-block; padding: 3px!important; font-size: 12px; cursor: pointer; border: 1px solid #999; float: right; margin-top: 1px; } <div class="data"> <p class="code">Praesent molestie. Nunc Venenatis Sapien Ultrices Dui. Vivamus dolor. Integer vel ante. Proin felis. Maecenas non nisl eu mi hendrerit fringilla.</p> <div class="copy">COPY</div> </div> A: You can do it with the Flexbox: .data { display: flex; /* displays flex-items (children) inline by default */ align-items: flex-start; /* vertical alignment / optional but recommended / if you don't want that flex-items match in height, which by default they do (default value of stretch, which makes them fill the flex-containers height and where the height of all items is dictated by the height of the "tallest" one) / you can also try the value of center */ max-width: 400px; } .code { color: #fff; margin: 0; padding: 8px !important; line-height: 1.2; font-size: 11px; background: #bbb; border: 1px solid #333; word-wrap: break-word; /*float: left; not necessary*/ } .copy { color: #ccc; /*display: inline-block; not necessary*/ padding: 3px !important; font-size: 12px; cursor: pointer; border: 1px solid #999; /*float: right; not necessary*/ margin-left: 10px; /* design purposes */ } <div class="data"> <p class="code">Praesent molestie. Nunc Venenatis Sapien Ultrices Dui. Vivamus dolor. Integer vel ante. Proin felis. Maecenas non nisl eu mi hendrerit fringilla.</p> <div class="copy">COPY</div> </div>
In Order To Live: A North Korean Girl's Journey to Freedom Sorry we don’t currently have this. Please click below and we will notify you when it is back in stock. Short Description: 'I am most grateful for two things: that I was born in North Korea, and that I escaped from North Korea.'Yeonmi Park was not dreaming of freedom when she escaped from North Korea.... Read more Product Description 'I am most grateful for two things: that I was born in North Korea, and that I escaped from North Korea.'Yeonmi Park was not dreaming of freedom when she escaped from North Korea. She didn't even know what it meant to be free. All she knew was that she was running for her life, that if she and her family stayed behind they would die - from starvation, or disease, or even execution. This book is the story of Park's struggle to survive in the darkest, most repressive country on earth; her harrowing escape through China's underworld of smugglers and human traffickers; and then her escape from China across the Gobi desert to Mongolia, with only the stars to guide her way, and from there to South Korea and at last to freedom; and finally her emergence as a leading human rights activist - all before her 21st birthday. Customer Reviews 5 stars Life in North Korea laid bare I would highly recommend this book to anyone who has already read Dear Leader by Jang Jin-Sung. That book details the inner workings of North Korean propaganda, and the authors daring escape from their regime. This book almost serves as a follow up by giving insight into everyday North Korean life is like, the crushing burden that the state puts on families, and how their deprived of information about the outside world, and how it is all bound up by propaganda. After her sister flees the country Yeonmi and her mother realise they have no choice but to escape too, leaving her father behind (his whole family will be arrested if he leaves). They find people willing to smuggle them into China, but knowing so little about the outside world they don't understand that they're sex traffickers. Their next few years are spent being sold as wives, all the while trying to find Yeonmi's missing older sister Eunmi, and searching for a way to South Korea. Upgrading your order to Express Delivery Most of our bestselling titles are available for express delivery within the UK, just look out for the Express Delivery on the product page. There are two speedy upgraded delivery options for mainland UK: Royal Mail First Class (1-2 working days, except Sundays) just £2.85 per order Tracked next day courier (next working day) just £4.95 per order Royal Mail First Class - £2.85 per order: Royal Mail aims to deliver within 1-2 working days* (Mon-Saturday). Order before 13:00 Mon-Friday (excluding public holidays) and your books should arrive the next day (excludes Sunday & public holidays). This delivery service is not tracked. Tracked next day courier - £4.95 per order: Guaranteed, tracked and signed for, next working day* courier delivery. Order before 17:00 Mon-Thursday and receive your book the next day (excludes Saturday, Sunday & public holidays). Our courier delivers between 08:00 and 19:00. *Northern Ireland, Scottish Highlands and Islands usually receive a 2-3 working day service for First Class. For Tracked Courier, it’s a 2 working day service and you need to order by 15:00. Unfortunately, we don't currently offer Express Delivery outside the UK, Gibraltar, Guernsey or Jersey. All deliveries are subject to cut-off times and public holidays. ‘Ready To Go’ - What is it? These are essentially books that are in our U.K warehouse, which are ready to be dispatched, pretty swiftly (usually within 1-2 working days!). The dispatch time frame is factored into the delivery estimate you see on this page. Don’t forget every single book on our website is available with free worldwide delivery, no minimum spend required. We use cookies to enhance our site's performance. By continuing to use our website; you're agreeing to our use of cookies and other terms and conditions around data usage.
Christine Petrovits, Why Bad Things Happen to Good Organizations: The Link between Governance and Asset Diversions in Public Charities (with Erica Harris and Michelle Yetman), Journal of Business Ethics, 2017 forthcoming. Phil Shane, "The Role of Financial Analysts in Stock Market Efficiency with Respect to Annual Earnings and its Cash and Accrual Components (with D. Hollie and Q. Zhao). Accounting and Finance, (2015) doi: 10.1111/acfi.12138.
The aftermath of lung cancer: balancing the good and bad. Little is known about the experience of surviving lung cancer because of its low survival rate. However, 14% of the people with a diagnosis of lung cancer become long-term survivors. This study describes the experience of surviving lung cancer as told by a subsample of survivors from a larger quantitative investigation of the quality of life among long-term survivors of lung cancer. The Center for Epidemiologic Survey Depression (CES-D) scale was used to evaluate distressed mood. The Short-Form 36 was used to evaluate quality of life. Handheld spirometry was used to evaluate pulmonary function abnormalities. Interviews were conducted with 29 participants. Qualitative analysis showed that survivors express positive and negative aspects differentially when divided into those with distressed mood (CES-D > or = 16; n = 9) and those not distressed (CES-D < 16; n = 20). Those in the not distressed group talked of their experience in more positive terms around the five central themes than those in the distressed mood group. The central themes that emerged were existential issues, health and self-care, physical ability, adjustment, and support. Subscale scores from the SF-36 were used to enhance the experience description. The results of this study highlight the importance of attending to both the physical and emotional needs of lung cancer survivors.
Potential Perils Born In Cloning Risks Great Even In Animals, Researchers Say March 04, 2001|By Jeremy Manier, Tribune Staff Writer. Four years after Dolly the sheep became the first cloned mammal, scientists studying clones of numerous species are finding the animals have fundamental defects that could prove disastrous if the procedure is applied to humans. Evidence on the risks of cloning is growing even as groups are laying the groundwork for cloning people. A team of American and Italian fertility researchers will meet in Rome this week to work on its plan to attempt the first human clone within the next year. Although the U.S. Food and Drug Administration has banned such experiments, legal experts say the government has little power to stop private laboratories or clinics. Moreover, some scientists believe the public's revulsion with the concept of cloning has waned in the years since Dolly's creation--in fact, British lawmakers in January approved some cloning of human embryos for medical research. But cloning is even harder than scientists thought. Many initial announcements of successful cloning experiments are being followed up by research showing severe problems down the line. Findings suggest that the embryonic development of most clones is deeply flawed in ways that researchers have barely begun to understand. A leading explanation is that cloning from an adult cell throws off the delicate program of gene activation in a developing organism. Despite years of efforts to perfect the process, most cloned animals still die in the womb. The ones that survive to birth often suffer from ultimately fatal defects of the heart, lungs, kidneys, brain or immune system. "I doubt there are any normal clones whatsoever," said Rudolf Jaenisch, a professor of biology at the Massachusetts Institute of Technology and a leading expert on the developmental problems of clones. Some studies suggest even the clone's surrogate mother faces potentially fatal risks from carrying clones, many of which are abnormally large at birth. Such dangers pose little dilemma for biotechnology researchers who clone sheep, goats, cattle or mice, since they can abort or destroy defective animals. But Ian Wilmut, the Scottish researcher whose team made Dolly, said it would be worse than careless to bring similarly defective human clones into the world. "It would be criminally irresponsible to attempt to copy a person now," Wilmut said in an interview. Public no longer shocked Researchers working on cloning in animals said the dramatic failure rates have led most people in their field to oppose extending such work to humans. Yet that message may not have sunk in among the public or the fertility research teams that plan on cloning people, said Alexander Capron, a professor of law and medicine at the University of Southern California. "Once the public has had time to digest something, there isn't the same level of amazement and disbelief," Capron said. "It's ironic that we've actually had more indications from more species that there are problems, and yet people are talking about going forward with human clones." Some corporate teams believe they have improved the cloning process in animals so that it carries fewer risks than early reports indicated. But even commercial researchers said the process is far from ripe for use in people. "We're still very early in this field," said Robert Lanza, vice president of medical and scientific development at Worcester, Mass.-based Advanced Cell Technology Inc. "Cloning is as much an art as a science, and there's a lot we don't understand." The mysteries run so deep that many scientists are studying animal clones as a window onto the basic mechanics of reproduction and embryonic growth. But the insights spring largely from scrutiny of the lethal defects that most clones develop during gestation, said Mark Westhusin, a professor of veterinary physiology at Texas A&M University. At least two groups hope to use that model to conjure cloned babies for infertile couples. One team led by researchers in Italy and Kentucky announced in January that it plans to try human cloning outside the U.S. within the next year. A Canadian group that hopes to offer cloning services for $200,000 per couple draws its inspiration from a French-born mystic named Rael, who formed a religion based on the tenet that humans were created by aliens in a laboratory. Unlikely as it seems, most experts said a determined team with enough volunteers could create cloned human embryos or even bring a child to term. "They will produce clones, and most of those will die in utero," predicted MIT's Jaenisch. "Those are the lucky ones. Many of those that survive will have these abnormalities." Fight for survival Westhusin of Texas A&M has seen vivid evidence that the technology for safely cloning humans does not exist.
General Features Rated 2 out of 5 by zakcruz could be better 2nd time in the water surfing, the camera was ripped off my wrist due to weak construction of the plastic that the strap goes through. However, I didn't mind paddling with it and I was initially impressed that it stayed on as long as it did, but I thought it would be the somewhat weak looking velcro. I'll may get another one and just take it out in smaller surf and be more cautious because I do like the versatility of the wrist mount. Oh, and I had the float on and was able to find it eventually washed up on the beach. February 9, 2014
Rapid malignant transformation of primary synovial chondromatosis into chondrosarcoma. Chondrosarcoma of the synovium is rare. It may arise de novo from the synovium or pre-existing synovial chondro- matosis may undergo malignant transformation into chondrosarcoma. Diagnosing a malignant transformation of the synovium remains a big challenge. It is based on the correlation of clinical findings, imaging and histology, as illustrated in this case report.
import os.path as op from numpy import pi, sin, linspace from scipy.io import loadmat import matplotlib.pyplot as plt plt.switch_backend('agg') from matplotlib.testing.decorators import image_comparison # noqa: F402 from pyhht.emd import EMD # noqa: F402 from pyhht.visualization import plot_imfs # noqa: F402 @image_comparison(baseline_images=['imfs'], extensions=['png']) def test_plot_imfs(): """Test if plotting IMFs works correctly.""" t = linspace(0, 1, 1000) modes = sin(2 * pi * 5 * t) + sin(2 * pi * 10 * t) x = modes + t decomposer = EMD(x) imfs = decomposer.decompose() plot_imfs(x, imfs, t, show=False) @image_comparison(baseline_images=['imf_no_timestamp'], extensions=['png']) def test_plot_imfs_no_ts(): """Test if plotting IMFs works when no timestamp is provided.""" t = linspace(0, 1, 1000) modes = sin(2 * pi * 5 * t) + sin(2 * pi * 10 * t) x = modes + t decomposer = EMD(x) imfs = decomposer.decompose() plot_imfs(x, imfs, show=False) @image_comparison(baseline_images=['bivariate_emd'], extensions=['png']) def test_plot_bivariate(): """Test if plotting bivariate IMFs works.""" dataset_path = op.join(op.dirname(__file__), '..', '..', 'docs', 'examples', 'datasets', 'eastern_basin.mat') data = loadmat(dataset_path) signal = data['X'].ravel() + 1j * data['Y'].ravel() decomposer = EMD(signal) imfs = decomposer.decompose() plot_imfs(signal, imfs, show=False)
Pinch of foursquare Added to Klout Recipe Add foursquare to the list of social networking sites that factor into the Klout scoring system, as the location-based mobile app joined Facebook, Twitter, and LinkedIn, the latter added in June. Users of the social media influence-measurement service can click on the new foursquare buttons on their dashboards to add foursquare check-ins to their mixes, as reported by Mashable and by The New York Observer’s Betabeat. And The Next Web added that foursquare statistics including friend counts, badges, and mayorships will likely factor into Klout’s calculations. Klout also added a +K button in June, allowing users to give the thumbs-up to other users, Mashable reported, and Betabeat added that the company’s application-programming interface served some 2 billion calls in June, more than four times the total from a few months earlier.
In this week’s episode of Slate’s sports podcast Hang Up and Listen, Stefan Fatsis, Josh Levin, and Mike Pesca are joined by ESPN’s Jay Bilas to discuss his new book Toughness and his prescription to fix college basketball. Next, they speak with Mother Jones’ Ian Gordon about his story on the death of Dominican minor leaguer Yewri Guillen and the exploitation of Latin American baseball players. Finally, they talk about the World Baseball Classic and whether the international competition is worth watching. Here are links to some of the articles and other items mentioned on the show:
Kazue Itoh is a Japanese actress from Seya-ku, Yokohama, Kanagawa Prefecture. She attended Kibogaoka Senior High School and made her acting debut in 1978 as a Horipro talent and has also voiced Shura in the anime Rurouni Kenshin. She also performs as a singer, including the opening and ending theme songs for the tokusatsu series Morimori Bokkun. Itoh is best known for her portrayal of in the 2007 Super Sentai Series Juken Sentai Gekiranger. She also portrayed Mako Shiraishi's mother in Samurai Sentai Shinkenger. Television Ponytail wa Furimukanai (1985) Juken Sentai Gekiranger as Miki (2007) Samurai Sentai Shinkenger as former Shinkenpink/mother of Mako Shiraishi (2009, guest) The Emperor's Cook as Takigawa (Lady-in-waiting of Empress Teimei) (2015) Film Juken Sentai Gekiranger: Nei-Nei! Hou-Hou! Hong Kong Decisive Battle as Miki (2007) Juken Sentai Gekiranger vs Boukenger as Miki (2007) Engine Sentai Go-onger vs. Gekiranger as Miki (2008) Perfect World (2018) Voice Acting Rurouni Kenshin as Shura References Kazue Itoh at Horipro Category:1966 births Category:Living people Category:Voice actresses from Yokohama Category:Japanese voice actresses Category:Japanese television actresses
6? -1043 55887 (base 9) to base 2 1001000100111001 3d6 (base 14) to base 3 1001202 What is 278 (base 15) in base 8? 1063 What is 120210 (base 4) in base 13? 93c Convert -201033 (base 4) to base 6. -13503 What is 30614 (base 10) in base 11? 21001 12214 (base 6) to base 9 2431 What is 457 (base 11) in base 13? 330 What is -104322 (base 5) in base 11? -2875 11530 (base 7) to base 4 233002 3729 (base 11) to base 14 1abd 33233 (base 4) to base 10 1007 -6a4 (base 11) to base 16 -348 What is -1dd (base 15) in base 12? -301 What is 3442 (base 6) in base 14? 426 What is -7842 (base 15) in base 4? -12032033 What is 111202110 (base 3) in base 13? 4746 Convert 11001111010 (base 2) to base 14. 866 Convert -1151 (base 16) to base 2. -1000101010001 What is 6409 (base 10) in base 2? 1100100001001 Convert 343443 (base 5) to base 6. 133141 Convert 3a6a (base 13) to base 12. 4a15 Convert 45310 (base 7) to base 14. 4277 Convert -128 (base 10) to base 6. -332 What is -50305 (base 6) in base 10? -6593 Convert -654 (base 16) to base 13. -978 Convert 483 (base 15) to base 2. 1111111111 Convert -1133011 (base 4) to base 6. -44101 -1380 (base 11) to base 12 -1046 Convert 1224 (base 5) to base 2. 10111101 What is -1011101222 (base 3) in base 10? -22895 Convert 169 (base 10) to base 7. 331 1805 (base 16) to base 13 2a50 Convert 4361 (base 8) to base 14. b97 111011 (base 3) to base 7 1015 Convert -7f1 (base 16) to base 15. -908 102313 (base 4) to base 6 5331 Convert -24385 (base 9) to base 12. -9572 -1dc (base 14) to base 6 -1450 What is 200021101 (base 3) in base 6? 141401 -5518 (base 14) to base 4 -3212002 1000100101 (base 2) to base 11 45a Convert -1266 (base 9) to base 12. -673 What is -9302 (base 11) in base 14? -46da Convert 252263 (base 7) to base 2. 1011010101110000 -16558 (base 10) to base 9 -24637 Convert 20111310 (base 4) to base 8. 102564 What is -23463 (base 7) in base 4? -1132320 2233 (base 5) to base 3 102210 Convert 10001011010100 (base 2) to base 11. 6776 -211202 (base 3) to base 7 -1535 1858 (base 10) to base 3 2112211 Convert -489 (base 11) to base 6. -2405 What is 162631 (base 7) in base 12? 16787 Convert -e21 (base 16) to base 14. -1465 What is -10200211 (base 3) in base 15? -bea Convert -441 (base 11) to base 3. -201121 What is -7cc (base 16) in base 11? -1555 What is 16e9 (base 15) in base 4? 1031100 Convert -1a1 (base 13) to base 7. -606 -2134 (base 9) to base 7 -4402 What is 25231 (base 6) in base 16? eb3 -699 (base 10) to base 7 -2016 What is 1010101 (base 2) in base 10? 85 133203 (base 7) to base 16 6234 -316 (base 9) to base 10 -258 -1100020 (base 3) to base 13 -5a3 What is 561 (base 13) in base 5? 12144 What is -1c8 (base 15) in base 8? -635 1031 (base 10) to base 16 407 What is 1535 (base 6) in base 7? 1136 -1001010100001 (base 2) to base 12 -2915 203002 (base 4) to base 9 3061 -1027a (base 12) to base 5 -1133433 What is 361 (base 10) in base 14? 1bb -3050 (base 12) to base 2 -1010001111100 Convert -14425 (base 7) to base 2. -111110010100 Convert 662 (base 15) to base 7. 4130 What is -14f5 (base 16) in base 12? -3131 Convert 920 (base 11) to base 14. 595 Convert -a295 (base 13) to base 11. -15941 What is 3b00 (base 12) in base 13? 3108 Convert 2161 (base 7) to base 14. 3d8 Convert -62 (base 15) to base 10. -92 -12104 (base 9) to base 11 -60a8 What is 1795 (base 16) in base 8? 13625 What is 5551 (base 9) in base 4? 1000000 Convert 38c (base 14) to base 12. 4b4 -10060 (base 7) to base 9 -3314 Convert 33311 (base 7) to base 4. 2003003 Convert -7422 (base 8) to base 9. -5256 -312324 (base 5) to base 3 -112011221 What is -38922 (base 11) in base 15? -11774 What is 23151 (base 10) in base 9? 34673 1226 (base 9) to base 7 2445 What is 418 (base 11) in base 7? 1316 -110031 (base 6) to base 4 -2032003 Convert 141115 (base 6) to base 14. 4b67 Convert 1303 (base 11) to base 9. 2285 What is 1119 (base 10) in base 8? 2137 -3b6b (base 16) to base 5 -441321 506 (base 12) to base 8 1326 Convert -21144 (base 5) to base 16. -590 What is -4706 (base 11) in base 4? -1200201 What is 385 (base 16) in base 10? 901 -14645 (base 9) to base 5 -310004 -73e (base 15) to base 4 -121202 132456 (base 7) to base 12 12519 Convert -445 (base 9) to base 15. -195 What is -291 (base 12) in base 15? -1b7 What is -830 (base 9) in base 3? -221000 23710 (base 8) to base 2 10011111001000 Convert 146 (base 7) to base 3. 10002 Convert 28d4 (base 14) to base 16. 1c4a Convert -15aa1 (base 11) to base 2. -101100001011001 Convert -20122210 (base 3) to base 8. -11366 -110140 (base 5) to base 11 -2940 -406 (base 11) to base 5 -3430 Convert -1050313 (base 6) to base 10. -53253 25a (base 14) to base 4 13120 What is -2630 (base 11) in base 13? -1732 Convert 2074 (base 12) to base 11. 2732 What is -1ba4b (base 14) in base 6? -1302551 What is 50525 (base 7) in base 14? 4685 10011001100100 (base 2) to base 8 23144 What is -425 (base 9) in base 7? -1004 4810 (base 11) to base 13 2b3b What is -152a9 (base 11) in base 4? -11102121 Convert 2663 (base 10) to base 11. 2001 Convert -1302 (base 10) to base 2. -10100010110 Convert 7362 (base 8) to base 3. 12020201 Convert -2238 (base 10) to base 5. -32423 45ad (base 15) to base 8 34704 Convert -100101100101100 (base 2) to base 13. -89b4 What is 2514 (base 8) in base 2? 10101001100 What is -8a25 (base 11) in base 5? -340020 -1100110010 (base 2) to base 15 -398 Convert 272 (base 13) to base 7. 1154 Convert -10100120 (base 3) to base 14. -c69 Convert -373 (base 16) to base 4. -31303 What is 5075 (base 14) in base 7? 55205 What is 53200 (base 6) in base 10? 7200 -617 (base 15) to base 2 -10101011100 562 (base 8) to base 3 111201 What is 120210 (base 3) in base 11? 358 Convert -100010111 (base 2) to base 8. -427 What is 9973 (base 15) in base 5? 2020013 32524 (base 6) to base 5 121031 Convert -c7 (base 16) to base 3. -21101 -3141 (base 6) to base 15 -324 What is 145d (base 16) in base 9? 7132 20003030 (base 4) to base 10 32972 -784 (base 9) to base 4 -22003 -3956 (base 14) to base 5 -310242 What is -15078 (base 11) in base 12? -10459 What is 9a (base 14) in base 5? 1021 Convert -aa (base 16) to base 2. -10101010 Convert -2287 (base 16) to base 7. -34525 Convert -342143 (base 6) to base 2. -111000101001111 -1691 (base 12) to base 8 -5215 -1104 (base 7) to base 3 -112200 What is 10210012 (base 3) in base 9? 3705 Convert 2321 (base 13) to base 7. 20240 Convert 2368 (base 9) to base 10. 1763 What is 11010010101 (base 2) in base 6? 11445 Convert -405 (base 7) to base 6. -533 What is 507 (base 10) in base 11? 421 Convert -536 (base 8) to base 3. -110222 -3014 (base 5) to base 12 -280 101111000 (base 2) to base 8 570 What is -f9d (base 16) in base 4? -332131 What is -2b4 (base 16) in base 6? -3112 -156 (base 15) to base 12 -216 What is -34412 (base 8) in base 14? -5470 Convert 1107 (base 8) to base 13. 35b What is 1211 (base 3) in base 15? 34 634 (base 15) to base 10 1399 101110100001 (base 2) to base 14 1129 Convert -1054 (base 6) to base 15. -11a 166 (base 9) to base 8 215 -302 (base 8) to base 2 -11000010 What is 967 (base 12) in base 3? 1212221 5354 (base 6) to base 4 103012 Convert -13055 (base 10) to base 12. -767b -7411 (base 8) to base 14 -158d 16550 (base 9) to base 3 120121200 6a3d (base 15) to base 11 15a48 Convert 1010002 (base 3) to base 14. 420 5267 (base 13) to base 8 26220 What is -33413 (base 7) in base 12? -4a72 What is -8b58 (base 12) in base 16? -3c74 Convert 3030310 (base 4) to base 3. 122222111 -732 (base 8) to base 11 -3a1 What is 15488 (base 11) in base 13? 9c5a What is 2221012 (base 3) in base 7? 6143 2392 (base 11) to base 5 100001 What is 124343 (base 6) in base 14? 41dd What is -71101 (base 9) in base 15? -dcad Convert -4518 (base 11) to base 4. -1130330 Convert -6223 (base 7) to base 9. -2874 What is -6650 (base 7) in base 4? -211103 1661 (base 7) to base 2 1010101000 Convert -128 (base 12) to base 15. -bb Convert 1101000110011001 (base 2) to base 12. 27075 Convert 25317 (base 9) to base 14. 62c2 -9533 (base 10) to base 6 -112045 11687 (base 10) to base 5 333222 Convert 1101110010 (base 2) to base 10. 882 44a (base 13) to base 16 2e2 Convert 6560 (base 16) to base 11. 18553 -465b (base 12) to base 15 -24d2 What is 134 (base 6) in base
Q: What is the difference between the create and perform_create methods in Django rest-auth I'm using the Django rest-auth package. I have a class that extends rest-auth's RegisterView, and which contains two methods, create and perform_create. What is the difference between these two methods? A: perform_create is called within the create method to call the serializer for creation once it's known the serialization is valid. Specifically, serializer.save() Code from the source - when in doubt check it: class CreateModelMixin(object): """ Create a model instance. """ def create(self, request, *args, **kwargs): serializer = self.get_serializer(data=request.data) serializer.is_valid(raise_exception=True) self.perform_create(serializer) headers = self.get_success_headers(serializer.data) return Response(serializer.data, status=status.HTTP_201_CREATED, headers=headers) def perform_create(self, serializer): serializer.save() def get_success_headers(self, data): try: return {'Location': str(data[api_settings.URL_FIELD_NAME])} except (TypeError, KeyError): return {}
<template> <div class="ds-day" :class="classesDay" @mouseenter="mouseEnterDay" @mouseleave="mouseLeaveDay" @mousemove.stop="mouseMoveDay" @mousedown="mouseDownDay" @mouseup="mouseUpDay" @click.stop="add" @dragstart.prevent> <div class="ds-week-weekday"> {{ weekday }} </div> <a class="ds-week-date" @click.stop.prevent="viewDay" @mousedown.stop> {{ dayOfMonth }} </a> <div class="ds-all-events"> <template v-for="(event, i) in visibleEvents"> <ds-calendar-event v-bind="{$scopedSlots}" v-on="$listeners" :calendar-event="event" :key="event.id" :index="i" :calendar="calendar" ></ds-calendar-event> </template> <div v-if="hasPlaceholder"> <ds-calendar-event-placeholder v-bind="{$scopedSlots}" v-on="$listeners" :day="day" :placeholder="placeholder" :placeholder-for-create="placeholderForCreate" :calendar="calendar" :index="visibleEvents.length" ></ds-calendar-event-placeholder> </div> </div> </div> </template> <script> import { CalendarDay, Calendar, CalendarEvent, Functions as fn } from 'dayspan'; export default { name: 'dsWeekDayHeader', props: { day: { required: true, type: CalendarDay }, calendar: { required: true, type: Calendar }, placeholder: { type: CalendarEvent }, placeholderForCreate: { type: Boolean, default: false }, formats: { validate(x) { return this.$dsValidate(x, 'formats'); }, default() { return this.$dsDefaults().formats; } } }, computed: { classesDay() { return { 'ds-day-today': this.day.currentDay, 'ds-day-past': this.day.currentOffset < 0, 'ds-day-future': this.day.currentOffset > 0 }; }, dayOfMonth() { return this.day.dayOfMonth; }, weekday() { return this.day.format( this.formats.weekday ); }, hasPlaceholder() { return this.placeholder && this.placeholder.time.matchesDay( this.day ) && this.placeholder.fullDay; }, visibleEvents() { return this.day.events.filter( this.isVisible ); } }, methods: { isVisible(calendarEvent) { if (!calendarEvent.fullDay) { return false; } if (this.$dayspan.features.hideOnMove && this.placeholder && this.placeholder.event === calendarEvent.event) { return false; } return true; }, add() { this.$emit('add', this.day); }, viewDay(event) { this.$emit('view-day', this.day); }, mouseEnterDay($event) { this.$emit('mouse-enter-day', this.day); }, mouseLeaveDay($event) { this.$emit('mouse-leave-day', this.day); }, mouseMoveDay($event) { this.$emit('mouse-move-day', this.getEvent('mouse-move-day', $event)); }, mouseDownDay($event) { this.$emit('mouse-down-day', this.getEvent('mouse-down-day', $event)); }, mouseUpDay($event) { this.$emit('mouse-up-day', this.getEvent('mouse-up-day', $event)); }, getEvent(type, $event, extra = {}) { return fn.extend({ type: type, day: this.day, calendar: this.calendar, left: $event.button === 0 && $event.buttons > 0, right: $event.button === 1 && $event.buttons > 0, handled: false, $event: $event, $vm: this, $element: this.$el }, extra); } } } </script> <style scoped lang="scss"> .ds-day { flex: 1 1 auto; width: 0; border-right: #e0e0e0 1px solid; border-bottom: #e0e0e0 1px solid; padding: 4px; .ds-week-date { font-size: 40px; line-height: 36px; color: black; padding-left: 8px; user-select: none; &:hover { text-decoration: underline; } } .ds-all-events { margin-top: 8px; } .ds-week-weekday { color: black; padding-left: 8px; user-select: none; } &.ds-day-today { background-color: rgba(0,0,0,0.04); .ds-week-weekday, .ds-week-date { color: #4285f4; } } &.ds-day-past { .ds-week-weekday, .ds-week-date { color: #9e9e9e; } } &.ds-day-future { } } </style>
[Chondroblastoma of the metatarsal bone and its 17-year follow-up]. Chondroblastoma is a rare bone tumor of cartilaginous origin. Metatarsal involvement is very rare, with a few cases. We presented a case of chondroblastoma localized in the fourth metatarsal bone. The patient presented with persistent pain of eight-month duration on the lateral side of his foot, which developed after an inversion ankle sprain. Radiological examination showed a large osteolytic lesion with sclerotic margins in the fourth metatarsal bone. The lesion was treated with extra-articular curettage and autogenous bone grafting. During a 17-year follow-up, the patient had no complaints, and there were no clinical or radiological findings of local recurrence or metastasis.
Maple seeds. Most people admire them for being pretty and delicate and for twirling like ballerinas when they float to the ground in fall. But this graceful dance obscures a simple fact: they are efficient flying machines. This week, Lockheed Martin is debuting an unmanned military drone that could be useful for information-gathering based on these silent, strong, one-winged, helicopter-like flyers. A foot long, the SAMARAI (after samara, the name for maple seeds) also has one wing and flies with a cyclic lift motion like a helicopter. It has two moving parts and a camera and can be controlled remotely or with an app on a tablet computer. It will be one of many new unmanned vehicles on display this week at the convention of the Association for Unmanned Vehicle Systems International in Washington, D.C. How samara fly In a manner similar to insects, hummingbirds and bats, maple seeds fly by creating a vortex over the leading edge of the wing. Reducing the pressure above the wing's surface like this creates a mini sideways tornado and the low pressure pulls the wing up, giving it twice the lift it would normally have. Because of this action, when maple seeds swirl to the ground, they go much more slowly and land farther from the tree than they otherwise would. Future applications Both the military and police could use SAMARAI. Officers could throw the drones like boomerangs to photograph what is around the next corner or inside a building and report back. Troops could also use them to get ground-level images from airplanes in addition to the aerial images typically used now. They improve upon drones currently used by the military in that they can hover in place like helicopters and take off vertically -- an advantage in tight spaces. They could one day come in different sizes and be produced cheaply with 3D printing. Watch the video below (from 2010) to see the SAMARAI be launched like a boomerang, take off vertically and land in a specific spot:
Nearly A Third Of Renters Didn't Pay By 1st Week Of April Enlarge this image toggle caption Ted S. Warren/AP Ted S. Warren/AP Updated at 2:58 p.m. ET About a third of renters did not pay on time this month as business closures put millions of people out of work. The National Multifamily Housing Council says 31% of renters didn't make their payment in the first week of April. Normally, about 20% of people don't pay their rent on time. The group tracks more than 13 million units through its survey. Next month could be even worse if renters don't get government assistance in time, says Doug Bibby, the group's president. He's worried that could spell disaster for many rental property owners. "If the rent payments drop off significantly, they won't be able to pay their staffs, they won't be able to pay their mortgages, they won't be able to pay their utilities," Bibby says. "They won't be able to pay the managers who manage their properties for them. "I just see this cascading out throughout the whole system and just exacerbating the unemployment problem and the dislocation problem," he adds. Bibby says the biggest, strongest players in the rental apartment industry should be OK. They have cash reserves and various ways to access money if they need it during the crisis. But he says rental housing is a very fragmented industry with large portion of the units owned by small businesses with 50 to 100 units. He says they could be in much bigger trouble. There are also many mom-and-pop landlords who only own a few units. "If an apartment owner has to shut down a 50-unit building, those people have to find shelter somewhere else," Bibby says. That's what "worries me the most," he says. Congress placed an emergency ban on evictions, but it doesn't cover all properties. Many states and cities have their own eviction bans, but it's unclear how that would work if the business running the property collapsed. Housing advocates have been calling for more assistance for renters during the crisis. "We need the federal government to step in," says Shamus Roller, executive director of the National Housing Law Project. He notes that the CARES Act allows homeowners to defer mortgage payments. So, he says, Congress realized that "homeowners are going to need some help to survive this. "I don't understand why we think that somehow tenants are going to be able to make their payments on time when we don't expect that of anybody else right now," Roller adds. Bibby's group is urging more help as well. One idea — federal rental vouchers that could be used to pay landlords. There are already existing voucher programs to help some lower-income households pay rent. The proposal would dramatically expand that to reach people who've lost their income in the crisis.
Q: How do I read a text file into an array of array (each sub-array being a row in the text file?) so I'm pretty much a n00b at Ruby, and I've put together a code to solve a MinCut problem (for an assignment, yes - that part of the code I've put together and tested), and I can't figure out how to read a file and put it into an array of arrays. I have a text file to read, with columns of varying length as below 1 37 79 164 2 123 134 3 48 123 134 109 and I'd like to read it into a 2D array, where each line and columnn is split, with each line going into one array. So the resulting array for the above example would be : [[1, 37, 79, 164], [2, 123, 134], [3, 48, 123, 134, 109]] My code to read the text file is below: def read_array(file, count) int_array = [] File.foreach(file) do |f| counter = 0 while (l = f.gets and counter < count ) do temp_array = [] temp_array << l.to_i.split(" ") int_array << temp_array counter = counter + 1 end end return int_array end Any help is greatly appreciated! Also, if it helps, the error I'm currently getting is "block in read_array': private method 'gets' called for # " I've tried a few things, and have gotten different error messages though... A: File.readlines('test.txt').map do |line| line.split.map(&:to_i) end Explanation readlines reads the whole file and splits it by newlines. It looks like this: ["1 37 79 164\n", "2 123 134\n", "3 48 123 134 109"] Now we iterate over the lines (using map) and split each line into its number parts (split) [["1", "37", "79", "164"], ["2", "123", "134"], ["3", "48", "123", "134", "109"]] The items are still strings, so the inner map converts them to integers (to_i). [[1, 37, 79, 164], [2, 123, 134], [3, 48, 123, 134, 109]] A: Ruby's got you covered with just a few lines: tmp.txt 1 2 3 10 20 30 45 4 2 Ruby code a = [] File.open('tmp.txt') do |f| f.lines.each do |line| a << line.split.map(&:to_i) end end puts a.inspect # => [[1, 2, 3], [10, 20, 30, 45], [4, 2]]
Booker unveils immigration plan that relies on executive orders WASHINGTON (AP) — Cory Booker has rolled out an immigration agenda composed of changes he could make without relying on Congress, including a shift away from criminal prosecution of border crossings and a new mandate for migrant detention facilities to meet minimum standards. Booker’s immigration plan, unveiled Tuesday, is one of the most detailed among Democratic White House hopefuls. His proposal sets a different tone from former Texas Rep. Beto O’Rourke’s immigration agenda by focusing entirely on executive orders that a future president could pursue without relying on a legislative deal that has proved elusive in recent years. For instance, if elected, Booker would use his presidential powers to orient the Department of Homeland Security away from raids that target migrants at locations such as schools or churches while adding courthouses to that list, according to a summary released by the New Jersey senator’s campaign. Booker also vows to end President Donald Trump’s ban on travel to the U.S. by residents of certain majority-Muslim nations, the Trump administration’s use of quotas in immigration courts and multiple other policy changes that Trump has used to reshape the nation’s immigration policy. Booker released his plan the day that liberal activists planned nationwide demonstrations calling for the closure of immigration detention facilities that some advocates and attorneys have decried as subjecting migrants to unsafe conditions . More than a half-dozen Democratic presidential candidates visited a South Florida detention center during their trips to Miami for last week’s first primary debates, a show of force that helped draw sustained attention to conditions at the facilities. Two of the candidates, Massachusetts Sen. Elizabeth Warren and former Housing Secretary Julián Castro, have called for the rollback of the statute that empowers the criminal prosecution of migrants who cross the border. Booker also favors an end to that provision of the law, which would require congressional action, and said on Tuesday that his administration would move federal prosecutors’ focus away from charging migrants with criminal offenses unless they pose a threat to public safety. Booker launched his 2020 campaign in February. He is polling in the single digits in the Democratic primary, trailing five or more rivals, but his campaign took heart in a strong performance at last week’s first debates. Left: Sen. Cory Booker speaks at the first U.S. 2020 presidential election Democratic candidates debate in Miami, Florida, on June 26, 2019. Photo by Mike Segar/Reuters
The Eating Attitudes Test: development of an adapted language form for children. The purpose of this study was to determine the comparability of scores generated by two forms of the Eating Attitudes Test, the original form for adults and an adapted language form for children. Analysis of data indicated that the adapted language form of the test can be used effectively.
# Copyright 2013 Nebula Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, WITHOUT # WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the # License for the specific language governing permissions and limitations # under the License. # import copy from unittest import mock from osc_lib.cli import format_columns from openstackclient.image.v1 import image from openstackclient.tests.unit import fakes from openstackclient.tests.unit.image.v1 import fakes as image_fakes class TestImage(image_fakes.TestImagev1): def setUp(self): super(TestImage, self).setUp() self.app.client_manager.image = mock.Mock() self.client = self.app.client_manager.image class TestImageCreate(TestImage): new_image = image_fakes.FakeImage.create_one_image() columns = ( 'container_format', 'disk_format', 'id', 'is_public', 'min_disk', 'min_ram', 'name', 'owner', 'properties', 'protected', 'size' ) data = ( new_image.container_format, new_image.disk_format, new_image.id, new_image.is_public, new_image.min_disk, new_image.min_ram, new_image.name, new_image.owner_id, format_columns.DictColumn(new_image.properties), new_image.is_protected, new_image.size ) def setUp(self): super(TestImageCreate, self).setUp() self.client.create_image = mock.Mock(return_value=self.new_image) self.client.find_image = mock.Mock(return_value=self.new_image) self.client.update_image = mock.Mock(return_image=self.new_image) # Get the command object to test self.cmd = image.CreateImage(self.app, None) @mock.patch('sys.stdin', side_effect=[None]) def test_image_reserve_no_options(self, raw_input): arglist = [ self.new_image.name, ] verifylist = [ ('container_format', image.DEFAULT_CONTAINER_FORMAT), ('disk_format', image.DEFAULT_DISK_FORMAT), ('name', self.new_image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class ShowOne in cliff, abstract method take_action() # returns a two-part tuple with a tuple of column names and a tuple of # data to be shown. columns, data = self.cmd.take_action(parsed_args) # ImageManager.create(name=, **) self.client.create_image.assert_called_with( name=self.new_image.name, container_format=image.DEFAULT_CONTAINER_FORMAT, disk_format=image.DEFAULT_DISK_FORMAT ) # Verify update() was not called, if it was show the args self.assertEqual(self.client.update_image.call_args_list, []) self.assertEqual(self.columns, columns) self.assertItemEqual(self.data, data) @mock.patch('sys.stdin', side_effect=[None]) def test_image_reserve_options(self, raw_input): arglist = [ '--container-format', 'ovf', '--disk-format', 'ami', '--min-disk', '10', '--min-ram', '4', '--protected', '--private', '--project', 'q', self.new_image.name, ] verifylist = [ ('container_format', 'ovf'), ('disk_format', 'ami'), ('min_disk', 10), ('min_ram', 4), ('protected', True), ('unprotected', False), ('public', False), ('private', True), ('project', 'q'), ('name', self.new_image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class ShowOne in cliff, abstract method take_action() # returns a two-part tuple with a tuple of column names and a tuple of # data to be shown. columns, data = self.cmd.take_action(parsed_args) # ImageManager.create(name=, **) self.client.create_image.assert_called_with( name=self.new_image.name, container_format='ovf', disk_format='ami', min_disk=10, min_ram=4, is_protected=True, is_public=False, owner_id='q', ) # Verify update() was not called, if it was show the args self.assertEqual(self.client.update_image.call_args_list, []) self.assertEqual(self.columns, columns) self.assertItemEqual(self.data, data) @mock.patch('openstackclient.image.v1.image.io.open', name='Open') def test_image_create_file(self, mock_open): mock_file = mock.Mock(name='File') mock_open.return_value = mock_file mock_open.read.return_value = self.data arglist = [ '--file', 'filer', '--unprotected', '--public', '--property', 'Alpha=1', '--property', 'Beta=2', self.new_image.name, ] verifylist = [ ('file', 'filer'), ('protected', False), ('unprotected', True), ('public', True), ('private', False), ('properties', {'Alpha': '1', 'Beta': '2'}), ('name', self.new_image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class ShowOne in cliff, abstract method take_action() # returns a two-part tuple with a tuple of column names and a tuple of # data to be shown. columns, data = self.cmd.take_action(parsed_args) # Ensure input file is opened mock_open.assert_called_with('filer', 'rb') # Ensure the input file is closed mock_file.close.assert_called_with() # ImageManager.create(name=, **) self.client.create_image.assert_called_with( name=self.new_image.name, container_format=image.DEFAULT_CONTAINER_FORMAT, disk_format=image.DEFAULT_DISK_FORMAT, is_protected=False, is_public=True, properties={ 'Alpha': '1', 'Beta': '2', }, data=mock_file, ) # Verify update() was not called, if it was show the args self.assertEqual(self.client.update_image.call_args_list, []) self.assertEqual(self.columns, columns) self.assertItemEqual(self.data, data) class TestImageDelete(TestImage): _image = image_fakes.FakeImage.create_one_image() def setUp(self): super(TestImageDelete, self).setUp() # This is the return value for utils.find_resource() self.client.find_image = mock.Mock(return_value=self._image) self.client.delete_image = mock.Mock(return_value=None) # Get the command object to test self.cmd = image.DeleteImage(self.app, None) def test_image_delete_no_options(self): arglist = [ self._image.id, ] verifylist = [ ('images', [self._image.id]), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) self.client.delete_image.assert_called_with(self._image.id) self.assertIsNone(result) class TestImageList(TestImage): _image = image_fakes.FakeImage.create_one_image() columns = ( 'ID', 'Name', 'Status', ) datalist = ( ( _image.id, _image.name, _image.status ), ) # create a image_info as the side_effect of the fake image_list() info = { 'id': _image.id, 'name': _image.name, 'owner': _image.owner_id, 'container_format': _image.container_format, 'disk_format': _image.disk_format, 'min_disk': _image.min_disk, 'min_ram': _image.min_ram, 'is_public': _image.is_public, 'protected': _image.is_protected, 'properties': _image.properties, } image_info = copy.deepcopy(info) def setUp(self): super(TestImageList, self).setUp() self.client.images = mock.Mock() self.client.images.side_effect = [ [self._image], [], ] # Get the command object to test self.cmd = image.ListImage(self.app, None) def test_image_list_no_options(self): arglist = [] verifylist = [ ('public', False), ('private', False), ('long', False), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() # returns a tuple containing the column names and an iterable # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.client.images.assert_called_with() self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_image_list_public_option(self): arglist = [ '--public', ] verifylist = [ ('public', True), ('private', False), ('long', False), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() # returns a tuple containing the column names and an iterable # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.client.images.assert_called_with( is_public=True, ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_image_list_private_option(self): arglist = [ '--private', ] verifylist = [ ('public', False), ('private', True), ('long', False), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() # returns a tuple containing the column names and an iterable # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.client.images.assert_called_with( is_private=True, ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) def test_image_list_long_option(self): arglist = [ '--long', ] verifylist = [ ('long', True), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() # returns a tuple containing the column names and an iterable # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.client.images.assert_called_with() collist = ( 'ID', 'Name', 'Disk Format', 'Container Format', 'Size', 'Checksum', 'Status', 'Visibility', 'Protected', 'Project', 'Properties', ) self.assertEqual(collist, columns) datalist = (( self._image.id, self._image.name, self._image.disk_format, self._image.container_format, self._image.size, self._image.checksum, self._image.status, image.VisibilityColumn(self._image.is_public), self._image.is_protected, self._image.owner_id, format_columns.DictColumn( {'Alpha': 'a', 'Beta': 'b', 'Gamma': 'g'}), ), ) self.assertListItemEqual(datalist, tuple(data)) @mock.patch('osc_lib.api.utils.simple_filter') def test_image_list_property_option(self, sf_mock): sf_mock.side_effect = [ [self.image_info], [], ] arglist = [ '--property', 'a=1', ] verifylist = [ ('property', {'a': '1'}), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() # returns a tuple containing the column names and an iterable # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.client.images.assert_called_with() sf_mock.assert_called_with( [self._image], attr='a', value='1', property_field='properties', ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) @mock.patch('osc_lib.utils.sort_items') def test_image_list_sort_option(self, si_mock): si_mock.side_effect = [ [self._image], [], ] arglist = ['--sort', 'name:asc'] verifylist = [('sort', 'name:asc')] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class Lister in cliff, abstract method take_action() # returns a tuple containing the column names and an iterable # containing the data to be listed. columns, data = self.cmd.take_action(parsed_args) self.client.images.assert_called_with() si_mock.assert_called_with( [self._image], 'name:asc' ) self.assertEqual(self.columns, columns) self.assertEqual(self.datalist, tuple(data)) class TestImageSet(TestImage): _image = image_fakes.FakeImage.create_one_image() def setUp(self): super(TestImageSet, self).setUp() # This is the return value for utils.find_resource() self.client.find_image = mock.Mock(return_value=self._image) self.client.update_image = mock.Mock(return_value=self._image) # Get the command object to test self.cmd = image.SetImage(self.app, None) def test_image_set_no_options(self): arglist = [ self._image.name, ] verifylist = [ ('image', self._image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) self.client.update_image.assert_called_with(self._image.id, **{}) self.assertIsNone(result) def test_image_set_options(self): arglist = [ '--name', 'new-name', '--min-disk', '2', '--min-ram', '4', '--container-format', 'ovf', '--disk-format', 'vmdk', '--size', '35165824', '--project', 'new-owner', self._image.name, ] verifylist = [ ('name', 'new-name'), ('min_disk', 2), ('min_ram', 4), ('container_format', 'ovf'), ('disk_format', 'vmdk'), ('size', 35165824), ('project', 'new-owner'), ('image', self._image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) kwargs = { 'name': 'new-name', 'owner': 'new-owner', 'min_disk': 2, 'min_ram': 4, 'container_format': 'ovf', 'disk_format': 'vmdk', 'size': 35165824 } # ImageManager.update(image, **kwargs) self.client.update_image.assert_called_with( self._image.id, **kwargs ) self.assertIsNone(result) def test_image_set_bools1(self): arglist = [ '--protected', '--private', self._image.name, ] verifylist = [ ('protected', True), ('unprotected', False), ('public', False), ('private', True), ('image', self._image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) kwargs = { 'is_protected': True, 'is_public': False, } # ImageManager.update(image, **kwargs) self.client.update_image.assert_called_with( self._image.id, **kwargs ) self.assertIsNone(result) def test_image_set_bools2(self): arglist = [ '--unprotected', '--public', self._image.name, ] verifylist = [ ('protected', False), ('unprotected', True), ('public', True), ('private', False), ('image', self._image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) kwargs = { 'is_protected': False, 'is_public': True, } # ImageManager.update(image, **kwargs) self.client.update_image.assert_called_with( self._image.id, **kwargs ) self.assertIsNone(result) def test_image_set_properties(self): arglist = [ '--property', 'Alpha=1', '--property', 'Beta=2', self._image.name, ] verifylist = [ ('properties', {'Alpha': '1', 'Beta': '2'}), ('image', self._image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) kwargs = { 'properties': { 'Alpha': '1', 'Beta': '2', 'Gamma': 'g', }, } # ImageManager.update(image, **kwargs) self.client.update_image.assert_called_with( self._image.id, **kwargs ) self.assertIsNone(result) def test_image_update_volume(self): # Set up VolumeManager Mock volumes_mock = self.app.client_manager.volume.volumes volumes_mock.reset_mock() volumes_mock.get.return_value = fakes.FakeResource( None, copy.deepcopy({'id': 'vol1', 'name': 'volly'}), loaded=True, ) response = { "id": 'volume_id', "updated_at": 'updated_at', "status": 'uploading', "display_description": 'desc', "size": 'size', "volume_type": 'volume_type', "container_format": image.DEFAULT_CONTAINER_FORMAT, "disk_format": image.DEFAULT_DISK_FORMAT, "image": self._image.name, } full_response = {"os-volume_upload_image": response} volumes_mock.upload_to_image.return_value = (201, full_response) arglist = [ '--volume', 'volly', '--name', 'updated_image', self._image.name, ] verifylist = [ ('private', False), ('protected', False), ('public', False), ('unprotected', False), ('volume', 'volly'), ('force', False), ('name', 'updated_image'), ('image', self._image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) # VolumeManager.upload_to_image(volume, force, image_name, # container_format, disk_format) volumes_mock.upload_to_image.assert_called_with( 'vol1', False, self._image.name, '', '', ) # ImageManager.update(image_id, remove_props=, **) self.client.update_image.assert_called_with( self._image.id, name='updated_image', volume='volly', ) self.assertIsNone(result) def test_image_set_numeric_options_to_zero(self): arglist = [ '--min-disk', '0', '--min-ram', '0', self._image.name, ] verifylist = [ ('min_disk', 0), ('min_ram', 0), ('image', self._image.name), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) result = self.cmd.take_action(parsed_args) kwargs = { 'min_disk': 0, 'min_ram': 0, } # ImageManager.update(image, **kwargs) self.client.update_image.assert_called_with( self._image.id, **kwargs ) self.assertIsNone(result) class TestImageShow(TestImage): _image = image_fakes.FakeImage.create_one_image( attrs={'size': 2000}) columns = ( 'container_format', 'disk_format', 'id', 'is_public', 'min_disk', 'min_ram', 'name', 'owner', 'properties', 'protected', 'size', ) data = ( _image.container_format, _image.disk_format, _image.id, _image.is_public, _image.min_disk, _image.min_ram, _image.name, _image.owner_id, format_columns.DictColumn(_image.properties), _image.is_protected, _image.size, ) def setUp(self): super(TestImageShow, self).setUp() self.client.find_image = mock.Mock(return_value=self._image) # Get the command object to test self.cmd = image.ShowImage(self.app, None) def test_image_show(self): arglist = [ self._image.id, ] verifylist = [ ('image', self._image.id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class ShowOne in cliff, abstract method take_action() # returns a two-part tuple with a tuple of column names and a tuple of # data to be shown. columns, data = self.cmd.take_action(parsed_args) self.client.find_image.assert_called_with( self._image.id, ) self.assertEqual(self.columns, columns) self.assertItemEqual(self.data, data) def test_image_show_human_readable(self): arglist = [ '--human-readable', self._image.id, ] verifylist = [ ('human_readable', True), ('image', self._image.id), ] parsed_args = self.check_parser(self.cmd, arglist, verifylist) # In base command class ShowOne in cliff, abstract method take_action() # returns a two-part tuple with a tuple of column names and a tuple of # data to be shown. columns, data = self.cmd.take_action(parsed_args) self.client.find_image.assert_called_with( self._image.id, ) size_index = columns.index('size') self.assertEqual(data[size_index].human_readable(), '2K')
/* * Copyright (c) SiteWhere, LLC. All rights reserved. http://www.sitewhere.com * * The software in this package is published under the terms of the CPAL v1.0 * license, a copy of which has been included with this distribution in the * LICENSE.txt file. */ package com.sitewhere.commands.microservice; import com.sitewhere.commands.DefaultCommandProcessingStrategy; import com.sitewhere.commands.configuration.CommandDeliveryTenantConfiguration; import com.sitewhere.commands.configuration.CommandDeliveryTenantEngineModule; import com.sitewhere.commands.kafka.EnrichedCommandInvocationsPipeline; import com.sitewhere.commands.kafka.UndeliveredCommandInvocationsProducer; import com.sitewhere.commands.spi.ICommandDestinationsManager; import com.sitewhere.commands.spi.ICommandProcessingStrategy; import com.sitewhere.commands.spi.IOutboundCommandRouter; import com.sitewhere.commands.spi.kafka.IEnrichedCommandInvocationsPipeline; import com.sitewhere.commands.spi.kafka.IUndeliveredCommandInvocationsProducer; import com.sitewhere.commands.spi.microservice.ICommandDeliveryTenantEngine; import com.sitewhere.microservice.lifecycle.CompositeLifecycleStep; import com.sitewhere.microservice.multitenant.MicroserviceTenantEngine; import com.sitewhere.microservice.util.MarshalUtils; import com.sitewhere.spi.SiteWhereException; import com.sitewhere.spi.microservice.lifecycle.ICompositeLifecycleStep; import com.sitewhere.spi.microservice.lifecycle.ILifecycleProgressMonitor; import com.sitewhere.spi.microservice.multitenant.IMicroserviceTenantEngine; import com.sitewhere.spi.microservice.multitenant.ITenantEngineModule; import io.sitewhere.k8s.crd.tenant.engine.SiteWhereTenantEngine; /** * Implementation of {@link IMicroserviceTenantEngine} that implements command * delivery functionality. */ public class CommandDeliveryTenantEngine extends MicroserviceTenantEngine<CommandDeliveryTenantConfiguration> implements ICommandDeliveryTenantEngine { /** Configured command processing strategy */ private ICommandProcessingStrategy commandProcessingStrategy = new DefaultCommandProcessingStrategy(); /** Configured outbound command router */ private IOutboundCommandRouter outboundCommandRouter; /** Command destinations manager */ private ICommandDestinationsManager commandDestinationsManager; /** Kafka Streams pipeline for enriched command invocations */ private IEnrichedCommandInvocationsPipeline enrichedCommandInvocationsPipeline; /** Kafka producer for undelivered command invocations */ private IUndeliveredCommandInvocationsProducer undeliveredCommandInvocationsProducer; public CommandDeliveryTenantEngine(SiteWhereTenantEngine engine) { super(engine); } /* * @see com.sitewhere.spi.microservice.multitenant.IMicroserviceTenantEngine# * getConfigurationClass() */ @Override public Class<CommandDeliveryTenantConfiguration> getConfigurationClass() { return CommandDeliveryTenantConfiguration.class; } /* * @see com.sitewhere.spi.microservice.multitenant.IMicroserviceTenantEngine# * createConfigurationModule() */ @Override public ITenantEngineModule<CommandDeliveryTenantConfiguration> createConfigurationModule() { return new CommandDeliveryTenantEngineModule(this, getActiveConfiguration()); } /* * @see com.sitewhere.microservice.multitenant.MicroserviceTenantEngine# * loadEngineComponents() */ @Override public void loadEngineComponents() throws SiteWhereException { getLogger().info(String.format("Loaded command destinations configuration as:\n%s\n\n", MarshalUtils.marshalJsonAsPrettyString(getActiveConfiguration()))); // Load configured command destinations manager. this.commandDestinationsManager = getInjector().getInstance(ICommandDestinationsManager.class); // Load configured command router. this.outboundCommandRouter = getInjector().getInstance(IOutboundCommandRouter.class); } /* * @see com.sitewhere.spi.microservice.multitenant.IMicroserviceTenantEngine# * tenantInitialize(com.sitewhere.spi.microservice.lifecycle. * ILifecycleProgressMonitor) */ @Override public void tenantInitialize(ILifecycleProgressMonitor monitor) throws SiteWhereException { // Listener for enriched command invocations. this.enrichedCommandInvocationsPipeline = new EnrichedCommandInvocationsPipeline(); // Producer for storing undelivered command invocations. this.undeliveredCommandInvocationsProducer = new UndeliveredCommandInvocationsProducer(); // Create step that will initialize components. ICompositeLifecycleStep init = new CompositeLifecycleStep("Initialize " + getComponentName()); // Initialize command destinations manager. init.addInitializeStep(this, getCommandDestinationsManager(), true); // Initialize outbound command router. init.addInitializeStep(this, getOutboundCommandRouter(), true); // Initialize command processing strategy. init.addInitializeStep(this, getCommandProcessingStrategy(), true); // Initialize undelivered command invocations producer. init.addInitializeStep(this, getUndeliveredCommandInvocationsProducer(), true); // Initialize enriched command invocations pipeline. init.addInitializeStep(this, getEnrichedCommandInvocationsPipeline(), true); // Execute initialization steps. init.execute(monitor); } /* * @see com.sitewhere.spi.microservice.multitenant.IMicroserviceTenantEngine# * tenantStart(com.sitewhere.spi.microservice.lifecycle. * ILifecycleProgressMonitor) */ @Override public void tenantStart(ILifecycleProgressMonitor monitor) throws SiteWhereException { // Create step that will start components. ICompositeLifecycleStep start = new CompositeLifecycleStep("Start " + getComponentName()); // Start command destinations manager. start.addStartStep(this, getCommandDestinationsManager(), true); // Start outbound command router. start.addStartStep(this, getOutboundCommandRouter(), true); // Start command processing strategy. start.addStartStep(this, getCommandProcessingStrategy(), true); // Start undelivered command invocations producer. start.addStartStep(this, getUndeliveredCommandInvocationsProducer(), true); // Start command invocations pipeline. start.addStartStep(this, getEnrichedCommandInvocationsPipeline(), true); // Execute startup steps. start.execute(monitor); } /* * @see com.sitewhere.spi.microservice.multitenant.IMicroserviceTenantEngine# * tenantStop(com.sitewhere.spi.microservice.lifecycle. * ILifecycleProgressMonitor) */ @Override public void tenantStop(ILifecycleProgressMonitor monitor) throws SiteWhereException { // Create step that will stop components. ICompositeLifecycleStep stop = new CompositeLifecycleStep("Stop " + getComponentName()); // Stop command invocations pipeline. stop.addStopStep(this, getEnrichedCommandInvocationsPipeline()); // Stop undelivered command invocations producer. stop.addStopStep(this, getUndeliveredCommandInvocationsProducer()); // Stop outbound command router. stop.addStopStep(this, getOutboundCommandRouter()); // Stop command processing strategy. stop.addStopStep(this, getCommandProcessingStrategy()); // Stop command destinations manager. stop.addStopStep(this, getCommandDestinationsManager()); // Execute shutdown steps. stop.execute(monitor); } /* * @see com.sitewhere.commands.spi.microservice.ICommandDeliveryTenantEngine# * getCommandProcessingStrategy() */ @Override public ICommandProcessingStrategy getCommandProcessingStrategy() { return commandProcessingStrategy; } /* * @see com.sitewhere.commands.spi.microservice.ICommandDeliveryTenantEngine# * getOutboundCommandRouter() */ @Override public IOutboundCommandRouter getOutboundCommandRouter() { return outboundCommandRouter; } /* * @see com.sitewhere.commands.spi.microservice.ICommandDeliveryTenantEngine# * getCommandDestinationsManager() */ @Override public ICommandDestinationsManager getCommandDestinationsManager() { return commandDestinationsManager; } /* * @see com.sitewhere.commands.spi.microservice.ICommandDeliveryTenantEngine# * getEnrichedCommandInvocationsPipeline() */ @Override public IEnrichedCommandInvocationsPipeline getEnrichedCommandInvocationsPipeline() { return enrichedCommandInvocationsPipeline; } /* * @see com.sitewhere.commands.spi.microservice.ICommandDeliveryTenantEngine# * getUndeliveredCommandInvocationsProducer() */ @Override public IUndeliveredCommandInvocationsProducer getUndeliveredCommandInvocationsProducer() { return undeliveredCommandInvocationsProducer; } }
Q: Why is plotGrid acting this way? A couple of days ago I discovered the plotGrid function from this answer here (written by @Jens). Since it seemed interesting I tried playing around with it a bit and I'm currently facing a problem which I don't really understand... Consider the following code: (* taken from: https://mathematica.stackexchange.com/a/6882/53872 *) Options[plotGrid] = {ImagePadding -> 40}; plotGrid[l_List, w_, h_, opts : OptionsPattern[]] := Module[{nx, ny, sidePadding = OptionValue[plotGrid, ImagePadding], topPadding = 0, widths, heights, dimensions, positions, frameOptions = FilterRules[{opts}, FilterRules[Options[Graphics], Except[{ImagePadding, Frame, FrameTicks}]]]}, {ny, nx} = Dimensions[l]; widths = (w - 2 sidePadding)/nx Table[1, {nx}]; widths[[1]] = widths[[1]] + sidePadding; widths[[-1]] = widths[[-1]] + sidePadding; heights = (h - 2 sidePadding)/ny Table[1, {ny}]; heights[[1]] = heights[[1]] + sidePadding; heights[[-1]] = heights[[-1]] + sidePadding; positions = Transpose@ Partition[ Tuples[Prepend[Accumulate[Most[#]], 0] & /@ {widths, heights}], ny]; Graphics[ Table[Inset[ Show[l[[ny - j + 1, i]], ImagePadding -> {{If[i == 1, sidePadding, 0], If[i == nx, sidePadding, 0]}, {If[j == 1, sidePadding, 0], If[j == ny, sidePadding, topPadding]}}, AspectRatio -> Full], positions[[j, i]], {Left, Bottom}, {widths[[i]], heights[[j]]}], {i, 1, nx}, {j, 1, ny}], PlotRange -> {{0, w}, {0, h}}, ImageSize -> {w, h}, Evaluate@Apply[Sequence, frameOptions]]] GenerateRandomMeshRegion[] := Module[{}, pts = RandomReal[{2, 1}, {25, 2}]; test = VoronoiMesh[pts]; Return[Show[test]]]; TableOfPlots = Table[GenerateRandomMeshRegion[], {n, 1, 2}, {m, 1, 2}]; plotGrid[TableOfPlots, 400, 400, ImagePadding -> 0] with output: Can someone explain to me why there is a horizontal gap between the different MeshRegions and how you would fix that? If I try the example @Jens gives in his answer there is no such vertical gap, so I'm wondering where I added it by accident... A: There is a gap between the columns of the mesh diagrams because VoronoiMesh, by default, adds a little plot range padding to its graphics. The gap can be eliminated by giving VoronoiMesh the option PlotRangePadding -> 0. Like so: generateRandomMeshRegion[] := VoronoiMesh[RandomReal[{1, 2}, {25, 2}], PlotRangePadding -> 0] SeedRandom[42]; plots = Partition[Table[generateRandomMeshRegion[], 4], 2]; plotGrid[plots, 400, 400, ImagePadding -> 0]
House Intelligence Committee Chairman Rep. Adam Schiff (D-Calif.) departs after a closed session before the House Intelligence, Foreign Affairs and Oversight committees on Capitol Hill on Oct. 23, 2019 in Washington, D.C. Forty-eight percent of voters disapprove of the way House Democrats are handling the impeachment inquiry into President Donald Trump. (Alex Wroblewski/Getty Images) Support for the investigation remained unchanged from previous week as GOP stepped up opposition. News about key moments in House investigation isn’t breaking through to most voters. More than half of voters described the media coverage of impeachment as “frustrating,” “disappointing,” “negative,” “skewed” or “confusing.” While nearly half of voters continue to support the House’s impeachment inquiry into President Donald Trump, new polling shows that an equal share is wary of the way House Democrats are running their investigation. A new Morning Consult/Politico poll found that 48 percent of voters disapprove of the way House Democrats are handling the impeachment probe — the same share of voters who back the impeachment investigation, which went unchanged from the previous week. The surveys sampled 1,997 and 1,989 registered voters, respectively, with margins of error of 2 percentage points for both polls. Supporters of impeachment — a group that includes 85 percent of Democrats and 14 percent of Republicans — have mostly positive views of the way Democrats are handling the probe, with 76 percent approving and 13 percent disapproving. The Oct. 25-28 survey comes on the heels of a week in which Republicans on Capitol Hill revved up their opposition to the impeachment investigation: All but three Senate Republicans signed onto a resolution by Sen. Lindsey Graham (R-S.C.) condemning the probe, and Rep. Matt Gaetz (R-Fla.) led House Republicans in storming a secure room in the Capitol complex with demands to be allowed to see the deposition of a Defense Department official. But while the events of the month-long impeachment probe have attracted major headlines, the news is not breaking through to most voters.
package com.tencent.mm.plugin.wear.model.a; import android.net.Uri; import com.google.android.gms.common.api.GoogleApiClient; import com.google.android.gms.wearable.Asset; import com.tencent.mm.opensdk.modelmsg.WXMediaMessage; import java.util.HashSet; public interface b { public static class a { public String aIm; public int code; a() { this.code = 0; } a(byte b) { this.code = 0; this.code = WXMediaMessage.MINI_PROGRAM__THUMB_LENGHT; } } a B(String str, byte[] bArr); a C(String str, byte[] bArr); byte[] a(Asset asset); void cUv(); GoogleApiClient cUw(); HashSet<String> cUx(); boolean cUy(); void cUz(); void finish(); boolean isAvailable(); boolean q(Uri uri); }
Posts Tagged ‘APM Marketplace Radio’ It is hard to believe it has been nearly 9 years since I wrote my first blog post. Back then I was very frustrated with real estate world around me. The housing market was booming and my appraisal competitors were increasing their staff size by a multiple of 20 (they’re now essentially out of business). We weren’t part of the (fool’s) gold rush. Apparently I had missed a key math and ethics class in school that would help me understand what was happening and why it was happening. Everyone seemingly was losing losing their minds – appraisers, consumers, banks, rating agencies, investment banks, investors – to a word – everyone. It didn’t help that national appraisal organizations, all of whose memberships had been dropping since appraisal licensing was introduced in 1991, did not understand or were not willing to speak out about the obvious problem. Appraisers were not allowed/not able to be a neutral valuation experts for lenders to make informed decisions on lending/risk of their collateral – lenders just didn’t care because they could off-load the risk to investors around the globe. The appraisal industry was converted nearly overnight to “deal enablers.” I saw my career ending in 3 years if I didn’t do something. I did the only thing I could think of – start talking openly about the lack of independence the appraisal industry had at that time (amazingly, how little has changed in this regard). No appraisers I were aware of were speaking openly about the problem in 2004-2005 – our industry was living in constant fear of alienating their lender clients. Since I was losing lender clients to my rapidly growing competitors who were morally flexible, I really had nothing to lose. My first blog post was a June 23, 2005 interview with Bob Moon at APM Marketplace in a segment called “Appraising the Appraisers” My industry was a symptom of a larger problem that eventually crushed the global economy – a credit crunch. Comments Off on My First Post: July 31, 2005 APM Marketplace Radio’s “Appraising the Appraiser” Follow Jonathan Newsletter Signup: If you haven't already, sign up for 'Housing Notes' to receive weekly insights and research. First Name Last Name Email Address About Jonathan Miller Jonathan Miller is President and CEO of Miller Samuel Inc., a real estate appraisal and consulting firm he co-founded in 1986. He is a state-certified real estate appraiser in New York and Connecticut, performing court testimony as an expert witness in various local, state and federal courts. He holds the Counselors of Real Estate (CRE) and Certified Relocation Professional (CRP) designations. He is an Appraiser “A” Member of the Real Estate Board of New York and a member of Relocation Appraisers and Consultants, Inc.Learn More... Subscription Service Coming Soon You'll be able to choose from an array of robust housing metrics compiled using research developed during the preparation of our market report series. Expanded significantly from prior offerings, use this resource to build charts and custom data tables or leverage your own information for more powerful research and presentations. In the meantime, here is a small sample of the aggregated data we will provide. “Jonathan Miller is well-known for taking the pulse of Manhattan real estate.”–PBS Nightly Business Report Matrix Blog Phil Crawford of Voice of Appraisal asked me to cover for him while he took a well-earned vacation. While I don’t have his sweet, syrupy smooth radio voice, I can grow on you a little bit if you listen long… Read More
Tuesday, September 21, 2010 "High School" Crisis- Pseudo Aunt Jillian don't read because you hate hearing about high school This mornng I was called into the principal's office immediately after the opening announcements were read. Also arriving at the same time was a boy with whom I am marginally acquainted at best. He's a defensive back on our school's football team and does not take honors classes as far as I know. He was a shot-putter on the track team on which I was a hurdler, but the runners often have little contact with those participating in filed events at practice and at meets. I'm fairly certain we've never actually been in the same section of a course. I was curious as to why I had been summoned to the office, but the idea that my business there had anything to do with his didn't even cross my mind. When the principal's secretary returned my greeting with, "Sit down and shut up," I began to suspect that trouble was headed my way. This is unusual for me. When I was a freshman, there was the unfortunate incident involving the Internet, the potential child predator, and the FBI. It really didn't have anything to do with the school, as no contact was made during school time or using school computer equipment. I was contacted by the FBI at the school because my parents both work, and the only way the feds could contact all of us during the day (God forbid that they should have to work one minute past 5:00 p.m.) was to have me called into the school office and to have my parents contacted during the day at work and summoned to the school. I had one other incident involving a teacher complaining to my parents that I refused to volunteer to answer questions in class, but this was handled by the teacher contacting my parents. The office was in no way involved, and no record of the incident exists in my file. (There are advantages, though few, and though far outweighed by the disadvantages, to having one's parent be a high-ranking official in the school district one attends.) If the truth were to be known, I played a prime role in two incidents of mischief that, were my school administration to be aware, they would possibly seek retribution even though no laws were broken and no real harm was done, and despite the fact that under any non-Draconian system, the statute of limitations would have long since expired. When I turn eighteen, am in college, and have been granted whatever scholarships, high school diplomas, or honors I'm ever going to receive from this antiquated institution in which I'm presently enrolled, I may choose to divulge the details of my two past indiscretions. Until then, however, it would require stupidity beyond which I am capable to give out any details even in a forum as anonymous as this one. Despite the uncivil greeting from the secretary being an indication that something unfavorable to me was in the works, I doubted that it was in any way connected to my indiscretions from previous years. I still had no real clue that the boy seated across from me was in any way connected to the issue, although his disinclination to make eye contact with me should have been an indication. The two of us sat in the uncomfortable plastic chairs for well over an hour with the secretary, who was busy typing and occasionally answering the phone, although she paused from her duties to glare at each of us from time to time. I was at the time unaware of the circumstances surrounding our total waste of time sitting in the hard plastic chairs accomplishing absolutely nothing. The reason, I later learned, was that parents were to be involved in the discussion of this situation. As my mother would be considered a direct supervisor of the site administrators handling the matter, it would be a conflict of interest for her to be there acting as my parent. My father was and still is in Los Angeles. My mother refused to ask him to fly back to our city to act as my parent in this situation. When I first learned of the nature of the situation and of my mother's refusal to involve my father, I thought it was the typical "He's not coming back here because Alexis isn't worthy of our time" sort of response that has been given on my behalf before, which greatly angered me. It was only later that I understood that the matter was so inane that my mother refused either to incur the expenditure of plane fare or to interrupt my father's work for a situation that should never have involved me in the first place, except perhaps as the recipient of an apology. The next choice was to have the matter handled by the district superintendent instead of the site principal. My mother was in favor of this option, as it would not involve interrupting the daily routines of any of our relatives to act on behalf of me. Furthermore, she said, even if the principal were dealing with a relative of mine instead of with her, a conflict of interest could be perceived because I am still her daughter, which could result in either ill will on her part if she disagreed with the way the situation was handled or could result in reverse discrimination by the principal bending over too far backward to be fair to the student whose parent was not his job superior. Both the principal and the father of the other student disagreed with this solution. The principal's primary motive for disagreeing was presumably that he didn't want the superintendent interfering in what he considered to be his domain. It was tentatively decided that the principal would adjudicate the matter with my Aunt Heather acting as my advocate. Then the district superintendent attempted to contact my mother in her office and was unable to reach her. He demanded to know where she was and what was happening, and then appointed himself as the official in charge of the matter. The whole incident, as I didn't learn until after hours of sitting in the principal's outer office under the watchful eye of the Rottweiler-turned-secretary, centered on a paper I had authored in my sophomore year of high school for my required U. S. History course, for which I took the Advanced Placement option in order to earn college credits. The title of the paper was, "The Cold War, McCarthyism, and Accusations of Communism Inflitration." As my compositions go, it was somewhat unremarkable. It was technically and factually sound, and met the requirements for an Advanced Placement-calibre paper, but wasn't one of my more creative efforts. Considering the topic, it probably shouldn't have been one of my more creative efforts, anyway. The intructor for my course had a policy of photocopying all "A" papers, filing them by topic, and keeping them for at least ten years so that in the event that a paper seemed familiar as he was grading it, he could consult his file to see if the paper had been recycled from a previous author and submission. The file cabinet in which the papers were kept was usually locked, but there were occasions in which it wasn't secured. The student seated across from me in the office had been my U. S. history's teacher's assistant for a Freshman Studies course the next year. At some point the file cabinet containing "A" papers was apparently unsecured and unsupervised for just long enough for him to go through the cabinet and purloin my paper. The moron was so lazy that he didn't even bother re-typing the paper in its entirety. He merely retyped the title page, then whited out and retyped the header on each page, ignoring the differences in formats required. Because I wrote the paper for a social science course, the APA format was used. English courses almost exclusively require MLA formatted papers. The essence of this was lost on my peer. The plagiarism would have gone undetected except that my plagiarist's English teacher was so incredibly inmpressed by her student's work, as it was far beyond anything he had ever done, that she submitted it for a writing award. She retyped the paper for the thug into the MLA format, which is standard for Englsih department papers. (The thug who stole and submitted my paper probably culdn't tell the difference between the APA and MLA formats and whatever format it is that grafitti artists use when sharing their gangs' messages with the world at large. The committee charged with deciding upon the winner of this award happened to consist of both the English teacher who submitted the student's paper and my U. S. History teacher, who had originally received the paper two years earlier. My teacher immediately recognized it as having been turned in by one of his students immediately. The English teacher disagreed vehemently and accused me of being the plagiarist even though, once my u.S. history techer realized thr original source of the paper, knew that it had been turned in to him two yers previously. The English teacher, who offers proof positive that not all English teachers are of even average intellect, offered ss evidence the plagiarist's originally submitted paper, with the title page and headings not even in the same font as the body of the paper, then showed how she had helped him to retype the composition into the correct format. The argument between the two faculty member of the panel charged with choosing a recipient for a particular writing-acroo-curriculum award, soon made its way into the principal's office, where it immediately became a disciplinary matter. The principal was unimpresed by either the lack of match in font of the title page and page headers of the body of the paper to the overall lack of pertinence of the topic of McCarthyism and communism to American literature. (A skilled arguer and writer could have bridged the disparity between the topic and the course's subject matter, but this plagiarist made no attempt to do so, presumably for reasons both that he saw no need to do so [both the course title and the compision's title contained the word American; that alone, in his mind would have been more than eufficient commonality between the content of the coomposition and the subject matter of the course and, by extention, the topic for the speficic compositiona as assigned by the teacher] and that he lacked the skill to create such a bridge or segue of sorts had he known one was needed.) Parents were soon involved in the dispute. The plagiarist's father, a prominent local banker, argued that even if his son had plagiarized the paper from me, I, too, must have plagiarized it from some other source, as the paper could not have been authored by any high school student. My former social science teahcer asked that my English teacher sned in samples from my English portfolio to refute the plagiarists' fagther's assertion. My mother pointed out that my SAT writing score had been a perfect 800. The banker didn't understand that. His son hadn't taken the SAT, and the writing portion did not yet exist in the olden days when he himself took the test. the principal seemed to be swallowing some of the plagiarists' father's arguments. the plagiarists's mother was oblivious to the significance of sall that was occurring. When asked a specific question concerning when she might have observed her son working on the composition,as he claimed to have written it entirely at home, his mother smiled snd uttered, even thoug her answer didn't come close to addrrssing the question she was asked, "I can hardly believe my son was nominated for a writing awatd. I'm just so proud of him.' 'Thank God the superintendent took over. The U. S. History teacher left to consult his file, but found my paper missing, even though it was indexed. He came to the outer office to ask if I still had a copy of the paper. I keep hard copies of all of my papers, in addtion to copies in backup files of computer and on an external Q-file device. I told my mother exactly where she could find it in my room. I told her thqt even though the paper had been typed originally on the desktop in our home library, it was on my laptop in my room as well. I told her where to find the hard copy in my file cabinet, where to find the external Q-file device, and whereIi had puy away my laptop. She was back twenty minutes later with the original paper, complete with title page and date, which matched the index maintained by my history teacher. The text and font matched the plagiarist's copy of the body of the original document before his teacher retyped it (which was, incidentally, against the rules for papers submitted for the particular honor). Furthermore, the topic was well-matched to my assigned topic of mid 1900's politics, as opposed to the plagiarist's course topic of American literature. (I believe his actual assignment for the paper had something to do with using both a poem and a work of prose, each written by an American auhor or poet -- eithet the same or a differrent authot from the same time period would have been acceptable - to cature and illustrate an aspect of the popular culture of the time. My paper in no way met this assignment, as works of American liture were not featured prominently and only appeared incidentally in the few literary allusions included in the paper. The plagiarist's father was still unconvinced of any guilt on the part of his son, or at least pretended such was the case . The mother continued to beam with pride and to make inane comments such as, "I always knew [thug] was bright, but I didn't realize writing ability was part of his giftedness," to no one in particular, as no one was either talking or listening to her.. The superintendent told [thug's] father that it didn't really require his assent to decide in my favor, but, just to prove the point, each of us would be called into the inner office to answer questions about the composition's content. Following that, we would each be assigned a five-paragraph essay on a given topic, which would need to be completed in the inner office in the presence of parents and administrators, after which the essays would be analyzed for writing style. The superintendent even conceded that the topic would be one about which the plagiarist should have presumably more background information than I. I answered each question asked, in each case, elaborating beyond what was presumably expected. (Senator Joseph McCarthy and his "anti-communism" platform had long held my fascination. My parents owned several non-fiction texts including biographies by actos who were black-listed and lost work as a result of appearing on McCarthy's lists of actual communists or sympathizers. The movie and subsequent motion picture, The Way We Were were based on the chilling effects of McCcarthyism on Hollywood and on specific actors .The plagiarist apparently had no answer for most of the questions. He had no idea who joseph mCarth had been and any of the signifcance of political work. eventually he made some connection with geeneral douglas MacArthur and went off on a brief tangent concerning General Patton, citing scenes he remembered from a movie about general Patton's life. I didn't see any of this, as we were questioned separately, but my social science/ U.s. history teacher said, as wrong as what the thug did was, he was almost beginning to feel sorry for him except that the thug was so utterly witless than he though his answers were on the mark and were helping to establish his case. The boy''s father said, "So [thug] is confusing a few generals with a senator. That hardly proves he stole the paper." The original plan for the essays was that they would be written by hand, but the plagiarist's father complained that his son had problems with spelling and would be at a disadvantage if computer use were not allowed. A cuple of nonnetworked laptops were brought in for use to use. We were given a seventy-five minute limit for our essays. The topic announced. The topic was "Advantages and Disavantages of the BCS System in Determining the NCAA Football Championship." I'm far from an expert on this topic, but I evidently have more knowledge of the system than does my plagiarist. I focused upon the lack of objectivity in determining who gets into the major bowl games in the first place, the disadvantage created by an early loss by an otherwise superior team, and the lack of a playoff system in determining who makes it into the actual bowl game that is determined to be the championship game. I conceded that the BCS system is clearly superior to the old poll system with sports writers and coaches determining the national champions (sometimes without consensus between the two voting bodies) but insisted that the current system was in need of major overhaul before it can be deemed acceptable. My plagiasrist didn't even complete a single paragraph. So I spent almost an entire day helping adults who should have known better to decide that I did not plagiarize a composition. Most of the day was wasted, although, since part of the day was spent writing, that portion could not be considered a total waste of time. The next half hour was devoted to an argument concerning whether my plagiarist and I would be required, or even allowed, to make up the work that ws missed. In an extremely rare show of support for me, my mother said that if the district wanted me to continue enrollment in the district, I would be given full credit for any daily assignments missed in the day's classes. Any portions of the classes that were devoted to projects, she said, should be my responsibility to make up. The plagiarist's father insited that his son be granted the same privilege. The superintendent told him that his son's privileges and consequences would be discussed in private shortly. At that point, the school day was over. The head varsity football coach had heard of the situation and had made his way to the office, demanding to know what was happening. The superintendent dismissed him and told him he would be notified as soon as any decision that affected his team had been made, still, he lurked in the outer office, witing to here of the resolutio to this issue, as it impacted likely would his starting lineup for Friday's game. Note: I'm adding this to the original text. It can be found in greater detail in a subsequent retelling of the assault in a later blog (thugh even then, some details were omitted because I felt too humiliated to shared them. I'm no longer humiliated byy any of the details. the humiliation should and now does belong to my attackers,. but at the point this blog was originally written, and even in a later post when I shared nore details, I was not yet up to full disclosure of the assault. I now have little problem talking about it. This should have been the end of the whole matter, but it wasn't. I had been stuck in an office all day with no food or bathroom privileges. Although I was hungry, I was even more in need of a bathroom visit. I hurried as fast as my crutches would allow me to a bathroom just down the hall from the principal's office before heading home. I heard the outer bathroom door open as I was in the stall, but thought nothing of it. When I emerged from the stall to wash my hands, I saw two girls standing idly. Girls sometimes stand idly in bathrooms, so I still though little of it. Then one of them said to me, "Just what the fu@&amp did you think you were doing?" I recognized her as the plagiarist's latest hook-up. "Using the bathroom," I answered. She slapped my face with sufficient force that I fell against the wall. Fortunately I was using the sink located against the far wall, so I fell against the wall instead of onto the floor. The other girl said, "That's not what she meant, and you know it, [female dog]." I still had my baby cell phone, which my parents had traded for my original cell phone because I had exceeded our the minutes or numbers or whatever of texts covered by our plan in an outrgeously expensive manner because I had been under the mistaken impression that our plan included unlimited texting. It ended up being one of the few times if not the onbly time that, after the fact, both my parents and I were unbelievably grateful for the action that led to seizure of my real cell phone and what had seemed at the time like a rather draconian punishment my parents had handed out and they were grateful that I had run up the hge bill, motivating them to take my real cell phone away and replace it with a kiddt cell phone. The hone had the capacity to dial my home, my parents' cell phones, my mom's work numbers, my Uncle Steve's and Aunt Heather's phones and home, and 911. A quick mental assessment told me that 911 would be my best bet, especially since it sas the top button on the phone. The phone was in the pocket of my jacket, which I had been wearing all day because the principal's thermostat was set at about 65 degrees. I talked loudly and made liberal, virtually non sequitor reference to my precise location, hoping that the 911 operator could get information about my whereabouts from my end of the conversation, and also hoping my voice would cover up that of the 911 operator. It's possible tha - almost non sequitut t knowing 911 hade been called might have cause the girls to abort their opertion, but then again, they might not have know abut the gPS on my phone, and furthermore, I didn't really know how quickly the could determine my location from the GPS-tracking device, I still don't know if I made things worse or better by hiding the fact that 9-1-1 had been dialed. It's possible the girls would have run out as soon as they learned of it, or it's possible they would have bashed me over the head with my own cell phone, then continued to beat up on me, confident that law enforecemnt would have no way of knowing where to find any of us. I didn't know it, but my kiddy phone also had a GPS-like device on it, so the 911 operator was able to locate me. I decided that the best thing was to keep the girls talking as much as possible. I lied to them about how I had tried to take the blame but that the superintendent wasn't buying it. It told them that I deliberately blew my essay, but that the plagiarist had blown it worse. When it became plain that they weren't buying any of my lines, I tried pleading to their senses of dignity, asking them if they really felt right about two relatively tall and normal-sized girls double-teaming someone who weighs 77. (I still haven't gained back all the weight since I was hurt and sick.) Eventually the talking ceased to stop them; one of them pushed me to the floor, The other one crawled on top of me and put her hands around my neck. Th one not on top of me kicked me in the mid-right portion of my rib care, then stepped onto my leg, more or less directly on the portion of my leg that sustained the worst of the fractures. I lost consciousness. Note: I'm adding this to the original text. It can be found in greater detail in a subsequent retelling of the assault in a later blog (thugh even then, some details were omitted because I felt too humiliated to shared them. I'm no longer humiliated byy any of the details. the humiliation should and now does belong to my attackers,. but at the point this blog was originally written, and even in a later post when I shared nore details, I was not yet up to full disclosure of the assault. I now have little problem talking about it. When I regained consciousness, the male who had plagiarized my paper had joined the girls and me in the bathroom. He directed the girls to undress me from the waist down, He unzipped his zipper and removed his male appendage. from the direction he seemed to be headed, It appeared that ny mouth was his first intended target. I vomited, which appeared to have the effect of causing him to lose the ability to perform the function he had intended to perform on me. He kicked the side of my head hard my head so that it would be forced into the vomitus. He then kicked my side, kicked my leg in the approximate areaof the original injury, and delivered an especially swift and bruising kick to my vaginal area. At that point, a security officer entered the restroom, followed closely by another security officer, the school football coach, the superintindent, add the principal. (My mother had been sent to a meeting in placer of the superintindentent, who had assured my mother that he would see to it that I arrived home safely. The girls tried to run out, but were stopped by a teacher and and approaching law enforecment personnel, wh had been dispatched ot th scene.. The perps were carted off. I don't know if they were tansported to the police station or to holding facilities. At least one of the two perps was already eighteen and a legal adult as such. Another of the three, as it turned out, was also above the legal age of majority, but I don't believe any of that had been sorted out by then. In any event, they were all released to their parents on their own recognizance with preliminqary charges pending. the attonry my parents later hired to represent my interests said that it was wrong to releaseany of them prior to sorting out charges. The football coach, who lived around the corner from my family's home, suggested that someone should put my pants back onto me. The officer in charged siad that photos of the crime scene needed to be take first. The coach told them to hurry it up with the pictures, a nd took off his shirt and covered me with it as the officers were organizing the photo shoot. The fall itself didn't hurt me, nor, in any significant way, did the initial slap, but the various kicks and sthe step upon the area of my leg that was healing from the earlier serious compact fracture, as well as kicks to my rib cage, head, and groin area were all considered signnificant injuries. An ambulance was summonned, and I was transported to the university hospital in an adjacent city, where I spent the night. The public school system in California is truly exemplary. That's the reason, I assume, that our governor's children attend private schools. About Me UPDATE:I'm now midway through my third year of medical school. I'm nearly through my final year of college. I'm a biochemistry major with add-on majors in piano performance and violin performance. I have a minor in English. Next year I'll move on to bigger though not necessarily better things.
297 S.C. 416 (1989) 377 S.E.2d 315 Charles F. ADAMS, d/b/a Charlie's Electrical Service, Respondent v. B & D, INC., Betty R. Rowell and McGee & Sons, Inc., Defendants, of whom B & D, Inc., and Betty R. Rowell are appellants, and McGee & Sons, Inc. is a Respondent. 22972 Supreme Court of South Carolina. Heard January 10, 1989. Decided February 21, 1989. *417 John R. Clarke, North Myrtle Beach, for appellants. Joseph F. Singleton and Ronald R. Norton of Cross, Singleton & Burroughs, P.A., Conway, for respondent Adams. H.T. Abbott, III, Conway, for respondent McGee & Sons, Inc. Heard Jan. 10, 1989. Decided Feb. 21, 1989. HARWELL, Justice: This is an appeal from the foreclosure of a mechanic's lien. The special referee ruled that the mechanic's lien had been established and entered judgment in favor of the subcontractor. We affirm in part and remand in part. *418 FACTS Appellant Betty R. Rowell (Rowell) owns a building in North Myrtle Beach. Rowell leased the building to B & D, Inc. (B & D), which used it to operate a supermarket. The lease specifically provided that Rowell "... is not and never shall be liable to any creditor of [B & D] or to any claimant against the estate or property of [B & D] for any debt, loss, contract or any other obligation of [B & D]." B & D contracted with Respondent McGee & Sons, Inc., the general contractor, for renovations and repairs to the supermarket. The general contractor, in turn, hired Respondent Charles F. Adams (Adams), doing business as Charlie's Electrical Service, to do electrical wiring on the project. Subcontractor Adams agreed to do the work on a "cost-plus" basis: he would be reimbursed for all labor and materials costs incurred plus ten percent (10%). B & D authorized numerous changes and construction expansions which doubled the original estimated cost of the project. The increased costs were of great concern to B & D. In March 1986, agents of B & D asked general contractor McGee & Sons to submit a final billing figure to reflect all costs anticipated to complete the job. Doug McGee, president of the general contractor, approached all subcontractors and explained that a final billing, to include all costs for completion, should be submitted to him. On March 25, Adams submitted an estimate of $2500.00 to Mr. McGee. Mr. McGee added this figure to the estimates submitted by the other subcontractors on the project to reach a completion amount of $9200.00. B & D issued McGee & Sons a $9200.00 check marked "paid in full." McGee & Sons then paid off all its subcontractors, including $2500.00 to Adams based on Adams' estimate. Adams continued working on the project through April 11, 1986. By that date, Adams had received additional materials invoices and incurred labor expenses totaling $4600.00 over and above the $2500.00 estimate. Adams reported the additional costs to Mr. McGee, but was never paid by McGee & Sons or B & D. Adams later filed the mechanic's lien against the supermarket property. The parties do not dispute that Adams worked through April 11, nor do they dispute the value of his labor and *419 materials. Neither Mr. McGee nor the general manager of B & D disputed at trial that if Adams had submitted the additional $4600.00 figure when final billing was requested in March, he would have been paid. Both McGee & Sons and B & D believed that all subcontractors' estimates were final and that no further payments from B & D would be necessary. The special referee found that both McGee & Sons and B & D were therefore operating under a mistake of fact at the time "final payment" was made. He ruled that Adams had established a valid mechanic's lien of $4600.00 against B & D's leasehold interest in the property, ordered B & D's interest sold to satisfy the lien and Adam's attorney's fees, and entered a $4600.00 judgment in favor of Adams against McGee & Sons. The referee did not rule on B & D's cross-claim against McGee & Sons for indemnification. B & D now appeals. DISCUSSION B & D argues that the special referee erred in finding that Adams had established a valid mechanic's lien. B & D asserts that the parties negotiated either a novation or an accord and satisfaction. Accord and satisfaction is an affirmative defense which must be pleaded and proved. Rule 8(c), S.C.R. Civ. P. B & D did not plead the accord and satisfaction defense in its answer, nor was the issue presented to the special referee. An issue not raised before the trial court will not be addressed on appeal. Howell v. Pacific Columbia Mills, 291 S.C. 469, 354 S.E. (2d) 384 (1987). A novation is a mutual agreement between all parties concerned for the discharge of a valid existing obligation by the substitution of a new valid obligation on the part of the debtor. There can be no novation unless both parties so intend. Superior Automobile Ins. Co. v. Maners, 261 S.C. 257, 199 S.E. (2d) 719 (1973); Pee Dee State Bank v. Prosser, 295 S.C. 229, 367 S.E. (2d) 708 (Ct. App. 1988). Nothing in the record suggest that Adams agreed to dissolve his cost-plus contract with the general contractor. The $2500.00 figure Adams submitted was merely an estimate and cannot reasonably be characterized as a substituted agreement to perform his services for a fixed fee. *420 B & D next claims the referee erred in finding that B & D and McGee & Sons operated under a mistake of fact at the time "final payment" was made. We disagree. An action to foreclose a mechanic's lien is a law case in this State. Metz v. Critcher, 83 S.C. 396, 65 S.E. 394 (1909); Karl Sitte Plumbing v. Darby Development Co., 295 S.C. 70, 367 S.E. (2d) 162 (Ct. App. 1988). In an action at law, on appeal of a case tried without a jury, the findings of fact of the judge will not be disturbed upon appeal unless found to be without evidence reasonably supporting them. The rule is the same whether the judge's findings are made with or without a reference. The judge's findings are equivalent to a jury's findings in a law action. Townes Associates, Ltd. v. City of Greenville, 266 S.C. 81, 221 S.E. (2d) 773 (1976). This case was referred by the circuit court to the special referee, with a specific provision for direct appeal from the referee to this Court. We are therefore bound by the referee's findings if there is evidence reasonably supporting them in the record. Adams testified that he told Mr. McGee that he would be unable to give an accurate estimate because he had not yet been billed for all materials used on the project. Adams also testified that he submitted the $2500.00 figure not as a completion estimate, but merely as an estimate of labor and materials costs he had incurred through March 25. This testimony amply supports the referee's factual finding that both B & D and McGee & Sons made "final payment" under the mistaken belief that Adam's $2500.00 estimate was a completion estimate. B & D next argues that the mechanic's lien was not established because S.C. Code Ann. § 29-7-10 (Supp. 1988) requires McGee & Sons, as general contractor, to pay Adams. Section 29-7-10 mandates that [a]ny contractor in the erection, alteration or repairing of buildings in this State shall pay all laborers, subcontractors and materialmen for their lawful services and material furnished out of the money received for the erection, alteration or repairs of buildings upon which such laborers, subcontractors and materialmen *421 are employed or interested and such ... subcontractors... shall have a first lien on the money received by such contractor ... Section 29-7-10 and the penalty provisions immediately following in § 29-7-20 clearly contemplate the case where a general contractor is paid by an owner for renovations or repairs, then withholds payment from a subcontractor. That is not the case here. There has been no allegation that McGee & Sons accepted funds from B & D and then withheld them from Adams. Adams submitted to McGee & Sons a $2500.00 estimate: McGee & Sons in turn paid Adams $2500.00 of the funds McGee & Sons received from B & D. McGee & Sons did not learn of Adams's additional charges until two weeks after the $2500.00 payment. The statute is therefore inapplicable. For the foregoing reasons, we affirm the referee's conclusion that Adams established a valid mechanic's lien against B & D's interest in the property. We agree, however, that B & D's contention that the referee erred in failing to rule on B & D's cross-claim against McGee & Sons for indemnification. The cross-claim was pleaded in B & D's answer and raised at trial, but the referee's order is silent on the issue. Based on the facts in this record, we conclude that B & D is entitled to a ruling on its cross-claim. Accordingly, that issue is remanded for consideration by the referee. B & D's remaining exceptions are dismissed pursuant to Supreme Court Rule 23. Affirmed in part; remanded in part. GREGORY, C.J., and CHANDLER, FINNEY and TOAL, JJ., concur.
Saratoga marchers protest tenor of Trump’s campaign Hundreds took part in a 'Love Trumps Hate' rally on Broadway in Saratoga Springs on Friday evening. Photographer: Peter R. Barber When 21-year-old Cameron Campbell, a senior at Skidmore College, approached a small group of young boys shouting “Lock her up” in downtown Saratoga Springs Friday evening, she walked with the intention of having a thoughtful conversation. After speaking with the group, she walked away with her head held high and tears brimming in her eyes. Cameron was one of a few hundred local demonstrators who took part in a candlelight vigil and “Love Trumps Hate” march in downtown Saratoga Springs Friday evening. With protests in Albany, Schenectady and Saratoga Springs since the election, local demonstrators have joined the ranks of thousands protesting the president-elect’s rhetoric and platform nationwide. “They are trying to get us upset with them,” said Cameron. “I tried to share love. They are asking us to attack them but we are stronger than that.” “Build a wall,” the boys shouted. “You are creating a wall between us,” she replied before rejoining the group of demonstrators. An older woman tried bridging the gap between the two groups when one boy asked her “Can you call me daddy?” During the march, little girls wrapped their small hands around their mothers’ fingers and little boys held up signs, mothers pushed strollers and cars honked in support along Broadway. A lone man with a megaphone shouted “Make America great again!” from his balcony above Broadway. The march began shortly after 5 p.m. near the Spirit of Life statue outside Congress Park on Broadway and continued toward City Hall before ending back at the park. A group of older men stood outside a cigar shop on Broadway with arms crossed as demonstrators pushed strollers along and held signs up high. “Their parents didn’t raise them right,” said one older gentleman — he declined to give his name. Signs reading “My generation will break down your wall,” and “They came for the Muslims and we said ‘Not this time’ ” waved in the air as demonstrators sang “We Shall Overcome.” “I’m obviously Muslim,” 26-year-old Seyma Inan said through a megaphone to the crowd. “I was raised here. In my household, my parents always taught me to love not hate. Hate was not a word we used in our home and I want you to know that.” She added: “After the election, I said I don’t know what’s going to happen after this point. But [after tonight] I don’t think I have any doubts anymore. Thanks.” Saratoga Springs resident Ellen Eggier-Aimone organized the event. “We need to stay calm and build bridges. We don’t respect each other enough in this country — that is how we got to be in the situation we are in today. It’s something that is dear to my heart,” she said. Marissa Bongo, a teacher from Ballston Spa, said this election is concerning both as a parent and as a teacher. “I try to create an environment of respect [in my classroom], but I can only influence so much. I’ve had conversations with administrators about how to teach children to be respectful. Hatred, racism and sexism are learned behaviors,” she said. Bongo was pushing her 2-year-old son, Cameron, in a stroller in the march. Carla Jentz, who was visiting Saratoga from Massachusetts with her husband, said she wasn’t expecting to take part in a demonstration but was pleased to stumble upon it. “We applaud this effort,” she said. “This is the spirit of America.” Albany events today More than 1,000 people have said they are either interested in or will attend a “Love Trumps Hate” protest on State Street in Albany today from noon until 4 p.m. A “Rally Against Trump’s 100 Days Agenda” is scheduled to take place in Albany’s Townsend Park today at the intersection of Central and Washington avenues, as well. The rally, which has been organized by the Capital District Coalition Against Islamophobia, is scheduled to begin at 1:30 p.m. According to a press release, the group will march up Central Avenue and end at the Masjid As-Salam Mosque.
package jettesting.data class ClassFromJet { } fun <T>somefun(ii : T) : String { return ii.toString() }
279 S.C. 348 (1983) 306 S.E.2d 624 Deborah C. MOSELEY, Appellant, v. John R. MOSIER, Respondent. 21983 Supreme Court of South Carolina. August 30, 1983. *349 *350 Jan L. Warner and C. Dixon Lee, III, Sumter, for appellant. J. Kennedy DuBose, Jr., of Holland & DuBose, Camden, and Henry Hammer, of Hammer & Bernstein, Columbia, for respondent. Aug. 30, 1983. HARWELL, Justice: Appellant alleges the family court erred in deferring respondent's sentence for contempt of court. Respondent replies that the family court did not have jurisdiction to hold him in contempt. We reverse the case and remand for a new trial. Appellant petitioned the family court to hold respondent in contempt for failing to pay the full amount of child support as provided in the parties' separation agreement. The agreement, which provided $150 a week child support, was incorporated but not merged into the divorce decree. The family court found respondent in contempt but deferred sentencing. Because of a change in circumstances, it ordered him to pay $500 of the $2,000 child support arrearages, attorney's fees of $200 and $75 a week future child support. It did not forgive any past *351 or future remaining support payments but ordered that all arrearages would accrue and accumulate. Appellant alleges the court erred by altering the previous support obligation of the separation agreement. She argues that the obligation arises out of contract and cannot be judicially altered. On the other hand, respondent contends that if the separation agreement governs his support obligation, the family court was without jurisdiction to hold him in contempt. He alleges appellant's remedies are found in contract law. Initially, we address the child support jurisdiction issue. Family courts may always modify child support upon a proper showing of a change in either the child's needs or the supporting parent's financial ability. Smith v. Smith, 275 S.C. 494, 272 S.E. (2d) 797 (1980). Today we clarify the issue by stating that family courts have continuing jurisdiction to do whatever is in the best interests of the child regardless of what the separation agreement specifies. Therefore, on remand the family court has jurisdiction to determine what is the best interests of the child. Next, we address the contempt issue. We agree with respondent that the family court erred in finding him in contempt for failure to comply fully with the separation agreement. Contempt results from the willful disobedience of a court's order. The family court order fails to state facts showing that respondent willfully failed to pay child support. Before a court finds a person in contempt, the record must clearly and specifically reflect the contemptuous conduct. Curlee v. Howle, 277 S.C. 377, 287 S.E. (2d) 915 (1982). Contempt occurs when a parent ordered to pay child support voluntarily fails to pay. When the parent is unable to make the required payments, he is not in contempt. The record in this case reveals that respondent faithfully paid each week as much child support as he could afford. Furthermore, the second element of contempt, a court order, is absent in this case. Respondent's child support obligation arises out of a separation agreement, not a court order. Even if respondent willfully failed to pay, the court could not hold him in contempt. On remand, appellant's cause of action will be for breach of contract. If the court determines respondent is able to comply, it may order him to specifically perform the terms of the agreement. If he does *352 not, the court then could hold him in contempt of its order. On the other hand, if the court determines that respondent cannot comply with the agreement, it may judicially set a smaller amount of temporary child support. In those circumstances, we believe the child's best interests are met by setting a smaller amount than by sentencing the child's supporter for contempt. Both parties have briefed and argued extensively the subject matter jurisdiction issue of the separation agreement. Their divorce decree theoretically disposed of the issue by stating the agreement was approved by the court and incorporated without merger into the final decree. Words of art such as "ratified," "adopted," "approved," "incorporated" and "merged," and "incorporated without merger" consistently have confused attorneys, judges and laymen in this state. We concluded in Kelly v. Edwards, 276 S.C. 368, 278 S.E. (2d) 773 (1981) that a separation agreement "incorporated but not merged" into a divorce decree was enforceable only as a contract and not as a decree. Therefore, we held the family court lacked subject matter jurisdiction to enforce the agreement. Subsequently, in Brooks v. Brooks, 277 S.C. 322, 286 S.E. (2d) 669 (1982), we confused the matter by holding that the family court properly held appellant in contempt for violating a separation agreement that was not merged in the final decree. There the agreement provided that the family court retained jurisdiction to enforce the agreement but not to modify any payments other than those for child support. However, heretofore parties could not confer subject matter jurisdiction by agreement. 20 Am. Jur. (2d) Courts § 139 (1965). More recently, in Bryant v. Varat, 278 S.C. 77, 292 S.E. (2d) 298 (1982), we ignored the Brooks case, once again followed Kelly, and held that the family court lacked subject matter jurisdiction to hold appellant in contempt for failing to comply with a separation agreement that was incorporated but not merged into a divorce decree. We attempted to determine the parties' intent by looking at the language of the agreement. The parties' intent is rarely revealed from the agreement's words of art. Generally, those terms are used without intending or implying any particular legal *353 consequences. Later, courts impose the consequences upon the unsuspecting parties. Today, we overrule those cases which hold that words of art make a major distinction in the operation of divorce law. Furthermore, jurisdiction for all domestic matters, whether by decree or by agreement, will vest in the family court. In all decrees entered after their decision, the parties may contract concerning their property settlement and alimony, but the submitted agreement must be approved by the family court. The parties may specifically agree that the amount of alimony may not ever be modified by the court; they may contract out of any continuing judicial supervision of their relationship by the court; they may agree that the periodic payments or alimony stated in the agreement shall be judicially awarded, enforceable by contempt, but not modifiable by the court; they may agree to any terms they wish as long as the court deems the contract to have been entered fairly, voluntarily and reasonably. With the court's approval, the terms become a part of the decree and are binding on the parties and the court. However, unless the agreement unambiguously denies the court jurisdiction, the terms will be modifiable by the court and enforceable by contempt. Under our ruling today, family courts will retain their traditional powers of contempt and ability to modify support orders. However, an approved agreement, unambiguously stipulating that the terms may not be enforced by contempt and/or that they may not be altered, binds the court, as well as the parties, to those terms. Today we attempt to eliminate the words of art from domestic law. We assume that any settlement in a divorce decree is intended to be judicially decreed unless there is some explicit, clear and plain provision in the court approved separation agreement or the decree. Family courts, of course, have continuing jurisdiction to modify child support. We base our reasoning in part on the West Virginia case of In Re Estate of Hereford, 250 S.E. (2d) 45 (1978). Accordingly, we reverse the case before us. On remand, the family court will hear the case under its continuing judicial supervision of child support. LITTLEJOHN, NESS and GREGORY, JJ., concur. LEWIS, C.J., dissents. *354 LEWIS, Chief Justice (dissenting): The trial judge held the respondent in contempt for failure to make child support payments in accordance with a prior divorce decree. The provisions for child support were contained in a prior separation agreement which had been made a part of the decree by reference. The questions of whether the lower court had jurisdiction to adjudge respondent guilty of contempt or the merits of such determination have not been raised by any exception on appeal and are not properly before the Court for determination. The sole issue in this appeal is whether the Family Court erred in failing to enforce the provisions for child support as set forth in the separation agreement and made a part of the order of the court by reference. The trial judge, in holding respondent in contempt for failure to make child support payments, deferred sentence upon respondent paying $500.00 on the arrearage and making future payments in the amount of $75.00 per week. The order provided that the arrearage under the prior divorce decree, above the amounts ordered to be paid in this matter, would accrue and accumulate. The original divorce decree, of which the separation agreement was a part, was therefore not modified, rather the payment of any arrearage was simply deferred. I agree that the Family Court always has jurisdiction to modify child support upon a proper showing. This is in accord with our prior holding that no agreement of the parties can prejudice the rights of the children. Johnson v. Johnson, 251 S.C. 420, 163 S.E. (2d) 229. The court may, therefore, enforce an agreement of the husband and wife relative to their child or may modify such an agreement, as the best interest of the child dictates. Regardless of what might have been the authority of the court with reference to other matters contained in the separation agreement, it is conceded that the court had jurisdiction at all times over questions concerning child support. In this case, the court reviewed the terms of the separation agreement as to child support, approved them, and made these provisions a part of the divorce decree. No one knew better than respondent that he had agreed to support his children, the amount of the payments to be made, and that he was *355 under an order of court to pay. To now say, as does the majority, that there was no order directing the payment of child support is to completely ignore the plain facts contained in this record. The only issue remaining is whether the trial judge properly deferred sentence on finding respondent guilty of contempt. The imposition of sentence for contempt is a matter resting largely within the discretion of the trial judge. Whether that discretion was properly exercised in this case should be determined in the light of the present facts. Since the order under appeal was issued about three (3) years ago, I would remand the question of sentence and the payment of arrearages to the lower court with instructions to forthwith reexamine these matters in the light of the present facts. The order of the lower court should be affirmed and the cause remanded for reexamination of the issues of sentence and payment of the arrearage due. I therefore dissent.
Office Clearance Esher Office Clearance Esher. Go Clearance are an expert Office Clearance and Commercial Clearance company which work in Esher. For a quick, flexible and reliable Office Clearance in Esher, Go Clearance, is your ideal commercial choice. Our team have years of experience providing a quality service at an affordable price to businesses in Esher and Surrey. Check out our five easy steps below to see what we promise during a Go Clearance. Office Clearance in 5 Easy Steps Free Quote: Contact our team and we can provide you with a detail quotation for your clearance. Schedule Clearance: When you are happy to go ahead with the Office Clearance just schedule a day and time with our team. The Clearance: Our clearance team will arrive and complete the work in a professional and friendly manner. Sorting and Recycling: Our clearance team will sort through all the items collected to maximise the volume being recycled. Review our Service: Please leave a review of our service online. This feedback is useful for the development of our business and other customers as it helps ensure quality and improve our service. How does our Office Clearance in Esher work? Our Office Clearance Esher service is ideal if you are relocating your office and you need items cleared; or you are redecorating and need get rid of those fixtures, fittings and waste; or if the premise has unwanted items and you are looking for an affordable and reputable company to recycle and dispose of the items according to best practice. Our Office Clearance Service Our Office Clearance experts work in Esher but also they work across London, Surrey and Kent. Our service is a convenient alternative to skip hire ensuring that all the heavy loading is taken care of; the items can be recycled as much as possible; and that the clearance is completed quickly and efficiently. Book a Office Clearance with Go Clearance It is really simple to get a free quote and book an Office Clearance in Esher. You can call us on 0208-251-2581, or email our team at info@goclearance.co.uk. Free Quote Enter your details below and describe in depth your clearance needs. A member of our team will get back to you with a quote.
The Senate Parliamentarian One interesting facet of the health care debate is the political authority being wielded by civil servants. For example, every time a new version of the legislation is proposed, there is a pause while the Congressional Budget Office (CBO) determines how much the plan will cost. This “score” ends up being quite important, as many Senators will not support a bill that costs more than a certain amount. Nevertheless, they are not in a position to challenge the CBO’s numbers, as their independent determination would be dismissed as nothing more than politics. Things are more ambiguous with respect to legal interpretation. The Attorney General would take some political heat if he rejected an opinion of the Office of Legal Counsel (OLC), and the President would take even more heat for rejecting the legal views of the Justice Department. Nevertheless, it would not be beyond the pale for that to happen because the political costs might be tolerable, in a way that would not be true if a President or Attorney General tried to defy a federal court order. The latter reflects a constitutional principle and the former does not –probably because it is an intra-executive-branch dispute. (Of course, the OLC is led by a political appointee, but until recent years it was seen as a nonpartisan institution.) How does the Senate fits into this equation? Rulings on Senate procedure are normally made by the parliamentarian, a civil servant, who advises the presiding officer about what should be done. The presiding officer is formally free to disregard that advice, but the Vice-President has not exercised his authority to do so since 1975. One could say that this abdication to the parliamentarian is now so settled that a contrary action should be deemed out of bounds. I am not clear, though, about the political costs of rejecting the parliamentarian’s advice. The reason I raise this point is that, if the Senate Democrats use the reconciliation process to pass health care, the parliamentarian could become a household name. (He’s Alan Frumin, and has been in office since the 1990s). If he makes some favorable rulings on the points of order that the Republicans are sure to raise, that will put Joe Biden in the hot seat. Will he feel bound by those rulings? Or will he overrule any decisions that mess up the President’s proposal by excluding them from reconciliation and subjecting them to the sixty-vote cloture rule? And if he does that, how will the country react? Will anyone care? Share Gerard Magliocca Gerard N. Magliocca is the Samuel R. Rosen Professor at the Indiana University Robert H. McKinney School of Law. Professor Magliocca is the author of three books and over twenty articles on constitutional law and intellectual property. He received his undergraduate degree from Stanford, his law degree from Yale, and joined the faculty after two years as an attorney at Covington and Burling and one year as a law clerk for Judge Guido Calabresi on the United States Court of Appeals for the Second Circuit. Professor Magliocca has received the Best New Professor Award and the Black Cane (Most Outstanding Professor) from the student body, and in 2008 held the Fulbright-Dow Distinguished Research Chair of the Roosevelt Study Center in Middelburg, The Netherlands. He was elected to the American Law Institute (ALI) in 2013. BDG is right that the previous parliamentarian, Bob Dove, was fired by the Senate leadership (quite wrongly, in my view). But in fairness, it should be noted that Frumin had been working in the Senate parliamentarian’s office for years before that and, at the time, was next in line for the job. And Dove was fired by Lott, not Frist. Gerard: I believe that there is another procedural rout that one could take. The chair could adopt the parliamentarian’s ruling and someone could then make a motion to appeal the decision of the chair, which would put the question to the Senate as a whole for a vote. If I recall correctly, this vote would be by simple majority, is not subject to filibuster, and cannot be appealed. (Note: when I work in the Senate after college, I had to learn a fair amount of it’s procedure but it’s been a while, I’ve forgotten most of what I knew, so I may have the precise procedure for appealing the decision of the chair wrong.) Just to clarify the process, the parlimentarian only advises the presiding officer of the correct procedure. The actual ruling is made by the presiding officer. Nats is also correct about the appeal procedure.
package de.beuth.knabe.spring_ddd_bank.infrastructure.imports; import java.util.List; import java.util.Optional; import org.springframework.data.jpa.repository.JpaRepository; import de.beuth.knabe.spring_ddd_bank.domain.Account; /**Required repository for accounts. The methods are named according to the Spring Data JPA convention. * They can be implemented by Spring during bean creation, but can be implemented independently of Spring, too. * @author Christoph Knabe * @since 2017-03-03 * @see <a href="https://docs.spring.io/spring-data/jpa/docs/current/reference/html/#jpa.query-methods.query-creation">Spring Data Query Methods</a> */ public interface ImportedAccountJpaRepository extends JpaRepository<Account, Long> { void deleteAll(); Optional<Account> findOneById(Long id); Account save(Account account); List<Account> findAllByOrderByIdAsc(); /* Iterable<Client> findAllBornFrom(LocalDate minDate); Optional<Client> findFirstByOrderByIdAsc(); */ }
Simple x264 Launcher is a very simple GUI for x264 encoder and x265 encoder that (not only) allows using 64-Bit x264 with 32-Bit Avisynth and VapourSynth. The GUI supports 32-Bit operating systems now, but Benchmarking will be disabled on such systems for obvious reasons. Furthermore the latest version now includes support for FFMS2 input, i.e. if desired you can now open media files directly without Avisynth in between. Video only encoder. Tool comments Tool version*: Example: 2.513 You usually find the version number under Help -> About in the software. Your OS*: Example: Windows 7 Rating*: Ease of use* (1 = Bad, 10 = Superb) Functionality* Value for money* Overall score* Comments*: Please don't post questions, this is NO support or discussion list. Use our forum for that.
The Supreme Court on 13 December asked the Union of India's nodal agency to convene a meeting with all the stakeholders, including Internet companies Google, Yahoo and Microsoft within six weeks to remove objectionable content pertaining to sex determination tests. Earlier in September, the apex court directed internet majors like Google, Yahoo and Facebook and instant messaging application WhatsApp to furnish details of complaints they have received in India about the uploading of objectionable content on child pornography, rape and gangrape. In February this year, the apex court ordered all companies to immediately constitute in-house expert bodies to identify and block keywords indicative of sex determination. In April, the apex court observed that it cannot curtail free choice of a researcher as right to know is a fundamental right. An apex court bench headed by Chief Justice of India Dipak Misra observed that tech giants Google India, Yahoo India and Microsoft India were not honouring the Indian law by allowing online advertisements on sex determination tests, to which the companies responded and stated that they are complying with all laws. The Supreme Court was hearing a Public Interest Litigation (PIL) filed in 2008 by one Sabu Mathew George, complaining that a number of foreign websites are soliciting couples to undergo sex determination tests banned under the Indian laws.
// Copyright 2020 Jon Skeet. All rights reserved. // Use of this source code is governed by the Apache License 2.0, // as found in the LICENSE.txt file. using System; using VDrumExplorer.Model.Schema.Logical; namespace VDrumExplorer.ViewModel.LogicalSchema { public abstract class NodeDetailViewModel : ViewModelBase<INodeDetail> { public NodeDetailViewModel(INodeDetail model) : base(model) { } public string Description => Model.Description; public static NodeDetailViewModel Create(INodeDetail detail) => detail switch { ListNodeDetail model => new ListNodeDetailViewModel(model), FieldContainerNodeDetail model => new FieldContainerNodeDetailViewModel(model), _ => throw new ArgumentException($"Unknown detail type: {detail?.GetType()}") }; } public abstract class NodeDetailViewModel<TModel> : NodeDetailViewModel where TModel : INodeDetail { public new TModel Model => (TModel) base.Model; public NodeDetailViewModel(TModel model) : base(model) { } } }
using System; using System.Data; using System.Configuration; using System.Collections; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Web.UI.HtmlControls; using System.Data.OleDb; using WeiSha.Common; using Song.ServiceInterfaces; using Song.Entities; using System.Reflection; using System.Text.RegularExpressions; using System.Collections.Generic; namespace Song.Site.Manage.Questions { public partial class Questions_Input3 : Extend.CustomPage { int type=WeiSha.Common.Request.QueryString["type"].Int32 ?? 0; Song.Entities.Organization org = null; protected void Page_Load(object sender, EventArgs e) { } protected void ExcelInput1_OnInput(object sender, EventArgs e) { org = Business.Do<IOrganization>().OrganCurrent(); //工作簿中的数据 DataTable dt = ExcelInput1.SheetDataTable; for (int i = 0; i < dt.Rows.Count; i++) { try { //throw new Exception(); //将数据逐行导入数据库 _inputData(dt.Rows[i]); } catch { //如果出错,将错误行返回给控件 ExcelInput1.AddError(dt.Rows[i]); } } Business.Do<IQuestions>().OnSave(null, EventArgs.Empty); Business.Do<IOutline>().OnSave(null, EventArgs.Empty); } /// <summary> /// 将某一行数据加入到数据库 /// </summary> /// <param name="dr"></param> /// <param name="dl"></param> private void _inputData(DataRow dr) { Song.Entities.Questions obj = new Song.Entities.Questions(); obj.Qus_IsUse = true; obj.Qus_Type = this.type; foreach (KeyValuePair<String, String> rel in ExcelInput1.DataRelation) { //Excel的列的值 string column = dr[rel.Key].ToString(); //数据库字段的名称 string field = rel.Value; if (field == "Qus_ID") { if (string.IsNullOrEmpty(column) || column.Trim() == "") continue; int ques = Convert.ToInt32(column); Song.Entities.Questions isHavObj = Business.Do<IQuestions>().QuesSingle(ques); if (isHavObj != null) obj = isHavObj; } //题干难度、专业、试题讲解 if (field == "Qus_Title") { if (column == string.Empty || column.Trim() == "") return; obj.Qus_Title = column; } if (field == "Qus_Diff") { obj.Qus_Diff = Convert.ToInt16(column); obj.Qus_Diff = obj.Qus_Diff > 5 || obj.Qus_Diff < 1 ? 3 : obj.Qus_Diff; } if (field == "Sbj_Name") { Song.Entities.Subject subject = Business.Do<ISubject>().SubjectBatchAdd(org.Org_ID, column); if (subject != null) { obj.Sbj_Name = subject.Sbj_Name; obj.Sbj_ID = subject.Sbj_ID; } } if (field == "Cou_Name") { Song.Entities.Course course = Business.Do<ICourse>().CourseBatchAdd(org.Org_ID, obj.Sbj_ID, column); if (course != null) obj.Cou_ID = course.Cou_ID; } if (field == "Ol_Name") { Song.Entities.Outline outline = Business.Do<IOutline>().OutlineBatchAdd(org.Org_ID, obj.Sbj_ID, obj.Cou_ID, column); if (outline != null) obj.Ol_ID = outline.Ol_ID; } if (field == "Qus_Explain") obj.Qus_Explain = column; //唯一值,正确答案,类型 obj.Qus_UID = WeiSha.Common.Request.UniqueID(); if (field == "Qus_IsCorrect") { if (column == string.Empty || column.Trim() == "") obj.Qus_IsError = true; obj.Qus_IsCorrect = column.Trim() == "正确"; } } obj.Qus_ErrorInfo = ""; if (obj.Sbj_ID == 0) throw new Exception("当前试题所属专业并不存在"); if (obj.Cou_ID == 0) throw new Exception("当前试题所在课程并不存在"); //if (obj.Ol_ID == 0) throw new Exception("当前试题所在章节并不存在"); if (org != null) obj.Org_ID = org.Org_ID; Business.Do<IQuestions>().QuesInput(obj, null); } } }
Epidemic control analysis: designing targeted intervention strategies against epidemics propagated on contact networks. In cases where there are limited resources for the eradication of an epidemic, or where we seek to minimise possible adverse impacts of interventions, it is essential to optimise the efficacy of control measures. We introduce a new approach, Epidemic Control Analysis (ECA), to design effective targeted intervention strategies to mitigate and control the propagation of infections across heterogeneous contact networks. We exemplify this methodology in the context of a newly developed individual-level deterministic Susceptible-Infectious-Susceptible (SIS) epidemiological model (we also briefly consider applications to Susceptible-Infectious-Removed (SIR) dynamics). This provides a flexible way to systematically determine the impact of interventions on endemic infections in the population. Individuals are ranked based on their influence on the level of infectivity. The highest-ranked individuals are prioritised for targeted intervention. Many previous intervention strategies have determined prioritisation based mainly on the position of individuals in the network, described by various local and global network centrality measures, and their chance of being infectious. Comparisons of the predictions of the proposed strategy with those of widely used targeted intervention programmes on various model and real-world networks reveal its efficiency and accuracy. It is demonstrated that targeting central individuals or individuals that have high infection probability is not always the best strategy. The importance of individuals is not determined by network structure alone, but can be highly dependent on the infection dynamics. This interplay between network structure and infection dynamics is effectively captured by ECA.
Share this article Most internet connections are not used to their full capacity, with many users wasting their extra bandwidth while others eke their way along poor connections. While some of us have the can afford to pay for bandwidth we don’t use, many other users are priced out of higher-tier connections. But what if you could rent out your unused bandwidth, as easily as trading a cryptocurrency token? That’s the idea behind NKN, the “New Kind of Network,” named after Stephen Wolfram’s seminal work on computational systems. Although Wolfram was not part of the founding team, he has since been recruited as a technical advisor, along with cryptography pioneer Whitfield Diffie. The project is broadly described as something a bit like IPFS, but for your router. NKN is designed to stitch together the web’s wasted bandwidth, allowing users to lend and share their connectivity in exchange for tokens. According to co-founder Bruce Li, NKN will be able to unlock another 50 or 60 percent of the web’s underutilized bandwidth. After nearly a year operating on testnet, NKN is preparing for a full launch sometime next month. But unlike most new dLT networks, this one will have comparatively few question marks: when the main net launches next month, NKN will already have a full network with thousands of mining nodes and two working products. The Amazon Strategy For Ground-Up Construction “Our approach is like Amazon,” says Li. Just as the software giant started by selling books and CD’s, Li says, NKN founders are building their platform out from the two two sturdiest planks. That may be an ambitious comparison, but NKN’s main net will launch along with two functioning products, which are expected to drive business until the platform is sustainable. The first is nCDN, or “New Content Distribution Network,” a distributed platform where streamers and other content creators can efficiently share their content. “When you have have those nodes, very close to globally distributed, it’s very easy for us to help other people distribute content,” Li explains. At present, NKN is exploring collaborations with a Chinese streaming service to decentralize video content, but NKN is not ready to reveal which service. “The most important thing for content delivery is latency,” Li explains. “The closer you are to the edge nodes, the better performance you have. “ The second product is Publish/Subscribe messaging, a decentralized widget which can power instant messengers or the customer support chat bubbles on most online websites. “We want to build this kind of chat bubble for applications and for websites, but decentralized,” Li says. “So you don’t have to have a centralized host, you don’t have to pay a lot of money, we use all the nodes in our network to distribute that message. ” Neither of these products is particularly exciting, Li admits, but they may provide foundations for the rest of the platform. “If you go to any sane VC, they will say startups cannot sell a platform right away,” Li says. “[These products] are not very sexy, but we can build a lasting and profitable business around [them].” Network Ready to Launch? They also also allows NKN to approach its main net launch with more confidence than most new networks. NKN already has nearly 6,000 nodes, only 114 of which are run by NKN itself. The rest are run by supporters and the community, who will be able to exchange their testnet rewards for real tokens after the main net’s launch. Unlike other blockchains, mining NKN is a comparatively simple; any kind of device can be used, from home computers and wifi routers to the simplest raspberry pi. Users are rewarded according to how much data they relay. Li estimates that the node count may increase 3-5 fold after the main net launch. As the network approaches the mainnet launch, the real work is just beginning. “For us the main challenge is really putting more traffic on it,” Li explains. Using the decentralized nCDN and Pub/Sub, the next target is to “get clients to run their real workload on it.”
50 Years Ago The cyclamate bandwagon has made farcical progress in the past week … The truth is that cyclamates have been banned because they are easy to ban, and the new evidence provides the slenderest possible scientific plank on which it is feasible for politicians to stand and claim easy credit for a blow against pollution … The evidence was about as solid as candy-floss … Not only had the rats been fed on doses of cyclamates which would sate the sweet tooth of a horse, but they had not even been fed on cyclamate alone; it was a mixed daily diet of cyclamates and saccharin that the animals had received. So was it the cyclamates or the saccharin, or synergism between the two, that had raised the malignant-looking cells in the animals’ bladders? … [T]he committees at last attained safe harbour in McPherson’s rule, an ancient tenet of Scottish law which holds that when two men have been drinking, one of them a known drunkard, and the other man starts a fight, it is always the drunkard that gets the blame. Applying this dictum to the bladder tumours, the committees found that since saccharin has been used for longer than cyclamates without apparently harmful effects, it must have been the cyclamate which caused the tumours. From Nature 1 November 1969 100 Years Ago The discoveries which in very recent times have been made as to the existence in certain foodstuffs of the remarkable substances known as vitamines and their non-existence in others must lead to a modification of our views concerning the whole question of dietary and health. The exact nature of the vitamines is at present unknown … All that can be said is that the amount present in any case is minute … Another line of work arises from the study of the question of the preservation of food by cold storage. It is now well known that the temperatures requisite in one case are not suitable in others; thus the cold required for meat and fish is not required for fruit, and even different kinds of fruit, such as plums and pears, cannot be shipped safely in the same chamber. From Nature 30 October 1919
We noticed that you're using an unsupported browser. The TripAdvisor website may not display properly.We support the following browsers:Windows: Internet Explorer, Mozilla Firefox, Google Chrome. Mac: Safari. Neat &amp; clean service apartment, is located in posh area of South Delhi, S-258, Greater Kailash part-2. The place is fully furnished with the option of private rooms or entire 2, 3 or 4 bed room apartment. Well trained cook is there to make delicious food, as per your taste. We have recently... Namaste..FOR BEST IDEA OF OUR APARTMENT , PLEASE READ OUR LATEST GUESTS REVIEWS ON TRIPADVISOR FOR REDLEAF SERVICED APARTMENTS !!!My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same... Namaste..FOR BEST IDEA OF OUR APARTMENT , PLEASE READ OUR LATEST GUESTS REVIEWS ON TRIPADVISOR FOR REDLEAF SERVICED APARTMENTS !!!My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same... Namaste..My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same Building Just one above each other...Please Read Our Guests Reviews on Tripadvisor for Redleaf Serviced Apartments :) The... Independent Service Apartment where in you have all the privacy as you are going to be staying here all by yourself and not shared with owners or other guests. At our apartment here, meticulous attention has been paid to every detail to ensure that you can experience the ultimate in hospitality,... Namaste..FOR BEST IDEA OF OUR APARTMENT , PLEASE READ OUR LATEST GUESTS REVIEWS ON TRIPADVISOR FOR REDLEAF SERVICED APARTMENTS !!!My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same... Neat &amp; clean service apartment is located in posh area of South Delhi, S-258, Greater Kailash part-2. The place is fully furnished with the option of private rooms or entire 2, 3 or 4 bed room apartment. Well trained cook is there to make delicious food, as per your taste. We have recently... &#39;Villa Green&#39; is situated in a green, posh locality of West Delhi. It is 9 km from the centre of Delhi, and 17 Km from the IGI International airport. The nearest metro station is 400 metres, Central market is 300 metres, and Herbal garden for jogging/ morning walk is only 500 metres from Villa... Namaste..FOR BEST IDEA OF OUR APARTMENT , PLEASE READ OUR LATEST GUESTS REVIEWS ON TRIPADVISOR FOR REDLEAF SERVICED APARTMENTS !!!My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same... A very comfortable &amp; homely place to stay in Delhi, in a gated community with gardens, open spaces, swimming pool, badminton court &amp; table tennis. One very spacious double bedroom with attached bath, with continental / Indian breakfast included (cooked to your liking). A sun kissed apartment with... The Penthouse Delhi opened in April 2016, in the north east of the crowded city of New Delhi. Conveniently located in the neighbourhood of Shahdara, we are at a reasonable distance from the airport as well as from the main attractive points of the city. This charming heaven of peace nicely... Ethenic &amp; Chic independent 2 BHK apartment located in the posh neighborhood of Panchsheel Park, close to prominent shopping areas and historical monuments of South Delhi. The apartment serves as an ideal space for the business as well as leisure traveler, families and larger groups, wanting to... Our property lies in the heart of the City Centre of Delhi (close to GK M-Block Market and Connaught Place) where you get to visit all Delhi touristic spots like historical monuments, museums, shopping centres/malls, restaurants, International embassies and a direct route/road to Agra, Taj Mahal.... Sai Villa offers perfect accommodation for tourists on holidays or for work in one of the best South Delhi locations in New Delhi at Greater Kailash-2. Property has online presence in name of &#39;Sai villa New Delhi&#39; and can be searched online for further details. The villa has total of 6 bedrooms... The apartment is perfect place for warm hospitality with a pleasant decor. It features elegant and eye soothing interiors and exteriors which allows the guests a comfortable stay. The most striking feature of Stay Royal is its just like a home where you will feel as if you are not away from your... Namaste..FOR BEST IDEA OF OUR APARTMENT , PLEASE READ OUR LATEST GUESTS REVIEWS ON TRIPADVISOR FOR REDLEAF SERVICED APARTMENTS !!!My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same... Featuring free WiFi throughout the property, Comfort Stay The Backpackers Hostel offers accommodations in New Delhi. All rooms come with a necessary facilities. There is a 24-hour front desk at the property. The hostel also provides car rental. Jantar Mantar is one kilometer from Comfort Stay... The Apartment is on the First Floor, with elevator facility available for your convenience. Its a three Room Apartment with attached wash rooms and there is a lobby in between and a fully functional kitchen, Located in the heart of Delhi this Cosy apartment is a independent place in a safe... Saket Bed and Breakfast is a beautiful new Bed and Breakfast with all the modern facilities one would come to expect in a hotel. - Complimentary WiFi - In-room Electronic Safes - Satellite Flat Screen TVs - Sleek, clean, modern bathrooms. - Air-conditioning / Heating available in all guest rooms... Namaste..My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same Building Just one above each other...Please Read Our Guests Reviews on Tripadvisor for Redleaf Serviced Apartments :) The... Impeccably designed with class and elegance this 2 BHK Fully Serviced Apartment in Vasant Kunj is an ideal choice for those who want to stay away from maddening traffic and noise. The apartment has nicely spread two bedrooms are fully air-conditioned with attached english bathrooms, living cum... Neat &amp; clean service apartment, is located in posh area of South Delhi, S-258, Greater Kailash part-2. The place is fully furnished with the option of private rooms or entire 2, 3 or 4 bed room apartment. Well trained cook is there to make delicious food, as per your taste. We have recently... My Name is Roli Lall, I am married and have 2 sons and a dog. I am having my own business where I am Fabricating Home Furnishing Products that are exported to US, Europe &amp; Australia. I am assisted in all my activities by my husband Sunil Lall who has had wide experience in various fields. I am... Namaste..My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same Building Just one above each other...Please Read Our Guests Reviews on Tripadvisor for Redleaf Serviced Apartments :) The... Namaste..My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same Building Just one above each other...Please Read Our Guests Reviews on Tripadvisor for Redleaf Serviced Apartments :) The... Newly renovated modern 3 bedroom / 3 bathroom apartment in a high-end and safe neighbourhood of South Delhi. Ideally located in a short distance to all the major city attractions. The apartment is modern, recently renovated, fully air-conditioned and has an elevator. Fast Wi-Fi is available... The apartment reflects the city’s spirit in a harmonious blend of tradition and contemporary sophistication. With exquisite interiors and impeccable services combine to make this the Capital’s most graceful and elegant apartment. Offering corporate clients, families and leisure travelers an... A very comfortable &amp; homely place to stay in Delhi, in a gated community with gardens, open spaces, swimming pool, badminton court &amp; table tennis. One very spacious double bedroom with attached bath, with continental / Indian breakfast included (cooked to your liking). A sun kissed apartment with... The Olive Service Apartments in Greater Kailash 1 at South Delhi are a top choice for Holiday Homes &amp; Vacation Rental Apartments in Delhi. The apartments are available in One Bedroom, Two &amp; Three Bedroom Serviced Apartments (all bedrooms with attached bathrooms, 32&#39; LCD with Tata SKy TV) that are... The Pearly Grey Boutique Residence is an elegant and spacious home with beautiful views of lush greenery and the famous Chattarpur Temples.The colour theme for this apartment include white, grey and red with splashes of silver and yellow around. This 700 sq feet, one bedroom apartment includes a... Sai villa offers perfect accommodation for tourists on holidays or for work in one of the best South Delhi locations in New Delhi at Greater Kailash-2. The villa has total of 6 bedrooms out of which 4 bedrooms are in an independent ground floor apartment and 1 additional bedroom is at a separate... Namaste..FOR BEST IDEA OF OUR APARTMENT , PLEASE READ OUR LATEST GUESTS REVIEWS ON TRIPADVISOR FOR REDLEAF SERVICED APARTMENTS !!!My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same... AmigosIndia is a place where you will arrive as a tourist but will leave as a friend. Its name is given by people who call us their friends from India. It&#39;s our passion to meet people from different parts of the world, sharing new ideas, amazing cultures, and perspectives. Our curiosity to know... This listing is in ground floor and also has independent entrance to the room.The couple host is in the same building and provide the best hosting in the city.We are 3 minutes from Metro Station and also 3 minutes from Central Market which is famous for South Delhi shopping.Important sightseeing... Our flat is located in one of the oldest and most historical neighborhoods in Delhi. If you enjoy traveling off the beaten path while still being 10 minutes away from famous sites like Humayan&#39;s Tomb and Khan Market, our place is perfect for you. The Space Staying with us will give you an... Stay with the host and get a feeling of staying at your home, away from home. Conveniently located in the heart of Delhi, the capital of India. Easily accessible to the best restaurants and night life of the city. Just minutes away from Metro Station and Marketplaces. Place is ideal for couples,... Independent 3 BHK apartment located in the posh neighborhood of Greater Kailash II, close to prominent shopping areas and historical monuments of South Delhi. The apartment serves as an ideal space for the business as well as leisure traveler, families and large groups, wanting to explore Delhi,... The Apartment is on the ground floor in a Gated Secure 40 acres Complex with an 10 acres Central Park with a walking trail and Cabanas inside Park in South Delhi. 50 Meters South of Saomi Nagar and 100 Meters East of Panchsheel Park (S Block). Modern furnished Air Conditioned 2 bedrooms having... Located in New Delhi, Casa Kuvera has well-equipped accommodation featuring free WiFi, 1.7 km from Qutub Minar. All units feature air conditioning and a TV. The homestay offers a continental or vegetarian breakfast. The on-site restaurant serves Indian cuisine. Tughlaqabad Fort is 7 km from Casa... Featuring free WiFi throughout the property, Comfort Stay The Backpackers Hostel offers accommodations in New Delhi. All rooms come with a necessary facilities. There is a 24-hour front desk at the property. The hostel also provides car rental. Jantar Mantar is one kilometer from Comfort Stay... Comprehending the need for a comfortable and secure stay for corporates, travelers and backpacking tourists we have proudly registered ourselves under the bed and breakfast scheme launched by Indian Tourism, a government of India initiative. Located in close proximity to most of the tourist spots,... Located in South Delhi, this posh six-bedroom villa is spacious and can accommodate up to seventeen people, which makes it an ideal wedding home or a holiday abode for a joint family looking to explore the national capital. Tourist attractions such as Qutub Minar and Chhatarpur Temple are located... Namaste..My name is Rajiv and I Am Your Host and At Your Service :)) I have 4 New Units of 3 Bedrooms Serviced Apartments in the Heart of South Delhi in South Ex 2 in the Same Building Just one above each other...Please Read Our Guests Reviews on Tripadvisor for Redleaf Serviced Apartments :) The... Keeping in mind the modern compact size system, this 3 BHK Fully Furnished Serviced Apartment features 3 bedrooms with attached bathrooms, living cum dining area and kitchenette attached to the second bedroom. The apartment is best for corporates, holiday travellers and single females travelling to... The Space Our family has been living in New Delhi for more than 100 years. We have developed one of our ancestral property as newly built ready to move apartment or guest house which is managed by my family. There is a Sanskrit verse &#39;Atithi Devo Bhava&#39; which means: the guest is equivalent to... Namaste! Welcome to Mayas Nest! We have been providing a Home Stay type Bed &amp; Breakfast very safe specially for women traveling on their own. If you desire to spend less for a comfortable stay, still live in privacy, style and elegance with very simple and immaculately clean rooms with all... The service apartment is located in posh area S-258 of South Delhi, Greater Kailash part-2. The place is fully furnished with the option of private rooms or entire 2, 3 or 4 bed room apartment. We provide the facility of cook, included in the price that you had paid for, so you have to do just buy... The Space Enjoy the Charm of Delhi from the comfort similar to your own home. The property is overlooking a Buddhist Pagoda and you can see the local residential colony from the balcony! Ample space and natural sunlight, this place would make you feel like home away from home. Guest Access The... The Olive Service Apartments in Green Park at South Delhi are a top choice for Holiday Homes &amp; Vacation Rental Apartments in Delhi. The apartments are available as Studio &amp; One Bedroom Serviced Apartments (all bedrooms with attached bathrooms, 32&#39; LCD with Tata Sky TV) that are fully furnished and... THE PENTHOUSE - YOUR HOME AWAY FROM HOME - BEST SERVICED APARTMENT IN DELHI A fully furnished Serviced Apartment with latest facility in the heart of East Delhi. It has a lobby, a large living room and dining area. All modern facilities are available and most major tourist and commercial or... “A gem in Delhi! ” What can I say.... If you go to Delhi stay here! The service was really exceptional and Abhi (hotel owner) couldn't help us enough. More... "What a wonderful Host!" My fiancée and I stayed at the Meditation Place for 5 nights. Delhi was our last stop before heading home after 6 weeks of travelling around Asia. Abhi was super welcoming and always there for a chat and support. More... "BEST HOME STAY IN DELHI!" By the end we were sad to leave Meditation Palace, as we loved the place, and Abi ha become such a good friend, he even introduced us to other people staying at the hotel and took us to watch a Bollywood movie, while translating the whole thing - a truly memorable experience. If you're staying in Delhi, this place is a must, a true authentic Indian home stay. More... New Delhi Holiday Rentals Ride in a cycle rickshaw through streets crowded with motorbikes, bicycles, honking taxi horns, buses, trucks, and tiny Tata automobiles as your furiously-pedaling rickshaw driver dodges stray cows and pedestrians. Tall, often tawdry storefronts with a mixture of familiar and foreign signage look down at you. Yet almost all that is forgotten amidst the clamor and hubbub of the human hordes jostling for space amidst the cinnamon, curry, and cardamom aromas as your rickshaw glides through the narrow marketplace streets. New Delhi Holiday Rental Best Choice Your money-saving New Delhi holiday rental home, condo, apartment, or B&B guest room and helpful hosts are possibly your only refuge from the sensory onslaught of this metropolis that the colonial British decreed the capitol of modern India. Even the most attentive luxury hotel is bound to feel antiseptic and isolating compared to a tastefully furnished New Delhi holiday rental with hosts who can provide a little guidance. Perhaps the best antidote is a bit of colonial indulgence at the Delhi Golf Club, where greens fees are ridiculously low and peacocks will watch you blast out of deep sand bunkers. New Delhi Temples After getting patted down and paying a fee for each camera, including those embedded in mobile phones, and handing your shoes and a few more rupees to the shoe caretaker, you can finally relax and enjoy Old Delhi’s spacious Jama Masjid (Friday Mosque). For a tranquil modern juxtaposition, visit the flower petal-shaped Lotus Temple. Spectacular Akshardham Temple, opened in 2005, includes a musical prayer fountain and a “boat-ride experience of 10,000 years of India's glorious heritage.” Qutub Minar dates back almost 1,000 years, and is near Chattarpur Temple and the Sanskriti Museum of Everyday Art on South Delhi’s Gurgaon-Mehrauli Road. Museums & Sights Humayun's Tomb in Nizamuddin is a 1565 Persian Mughal inspiration for the Taj Mahal. Nearby is the excellent Crafts Museum, old fort Puranja Qila, and the National Zoological Gardens. New Delhi’s National Museum is renowned for its Indus Valley and Silk Route antiquities, and much more. Old Delhi’s money-saving holiday rentals at Hauz Khas Village put you near forests with deer, Shankar's International Dolls Museum, and the magnificent Red Fort’s Peacock Throne room. Museums and memorials for Nehru and the Gandhi family are reminders of modern politics. New Delhi Shopping Bargain for rugs, silk scarves, papier mache ornaments, and much more at Central Cottage Industries Emporium, Khan Market, and Connaught Place. Dilli Haat has linens, wood and marble carvings, puppets, clothing, and silver and pearl jewellery from every region in India. Near Old Delhi's Red Fort, bustling Chandni Chowk is a colorful area to eat and shop with the money savings from your New Delhi holiday rental.
Cosmic Loners: Orphan Stars and Planets Wander the Galaxy An artist's conception of a runaway planet zooming through interstellar space. A new paper suggests planets can blaze through space entirely by themselves, ripped free of their parent star by the power of the black hole The Milky Way contains all kinds of stars — young ones, old ones, red ones, blue ones, yellowish ones, white ones, ranging in size from much smaller than our sun to tens or even hundreds of times bigger. All told there are at least a hundred billion stars in our home galaxy — and perhaps as many as 300 billion. But a few members of this vast stellar population have a special claim to cosmic fame. They're racing away from the core of the Milky Way at speeds of up to 1.5 million m.p.h. (2.4 million km/h), on a trajectory that will ultimately take them out into intergalactic space. None of this is entirely surprising to astronomers, or at least, not any more. These so-called hypervelocity stars were predicted back in 1988; the first one was actually discovered in 2005, and by now 21 such stellar speedsters have been observed and confirmed. But a new paper slated for publication in Monthly Notices of the Royal Astronomical Society suggests that hypervelocity stars may not be the lone wolves they seem. Some of them may be taking planets along with them on their perambulations. And sometimes the planets themselves may go rogue, ripping free and fishtailing off on their own. The reason for all this galactic gadding about: the giant black hole, weighing in at more than 4 million times the mass of our sun, which lurks at the core of the Milky Way. Anything that ventures close to the core orbits the dark monster at high speed. If the "anything" happens to be a double-star system (two stars orbiting each other, which is a common thing in the Milky Way) and if the pair gets a bit too close, theory suggests that one member can fall in while the second star is flung out into deep space — kind of like the "whip" in a roller derby. (Our solar system is located a comfortable 30,000 light-years from the galactic center, so we're at no risk of being either swallowed up or hurled to oblivion.) The gravitational breakup of a pair of stellar twins explains how hypervelocity stars came to be, but when Dartmouth astrophysicist Gary Wegner, Dartmouth grad student Idan Ginsburg and his advisor, Harvard astrophysicist Avi Loeb, began looking at the phenomenon more deeply, they began to realize that not only is it entirely plausible for the stars to be accompanied by one or more planets, but also it wouldn't be all that difficult to prove the existence of such free-range solar systems. The Kepler space telescope and some Earth-based observatories have now spotted more than 2,000 so-called exoplanets orbiting distant stars. So big a head count in the brief time scientists have been searching a relatively small patch of sky suggests that there should be billions upon billions of exoplanets out there, making it entirely reasonable to conclude that at least some of them orbit hypervelocity stars. The planets themselves would be far too small and dim to see, but that's not how exoplanets are typically detected anyway. Instead, they're spotted either through the gravitational wobble they cause in their parent star or, a bit more easily, by a slight dimming in light every time the orbiting planet passes in front of the star. It's this second technique that the Kepler space probe, the ground-based MEarth Project and other observing programs use, and it doesn't even take a superpowerful instrument for them to make their discoveries, says Ginsburg. A telescope on the ground with a mirror just 13 ft. (4 m) across could do it, a relative shrimp compared with the 26- to 33-ft. (8 to 10 m) telescopes astronomers now favor. Ginsburg and his colleagues don't expect to spot any planets orbiting hypervelocity stars just yet, in part because 21 such wandering bodies are an awfully small sample group. What's more, a planet would have to be aligned just right for the light dimming to be observable. "Still," says Ginsburg, "we think it's worth looking. And if observers don't find any in this first round, they can wait for more hypervelocity stars to turn up." If such planets do exist, the odds would be exceedingly slim they'd contain life: they'd have to be in very tight orbits to avoid having been stripped away by the black hole, making things too hot for biology to get started — though planets around dim hypervelocity stars might find things a bit more comfortable. Least comfortable — and certainly loneliest — of all would be planets that were blazing through space entirely by themselves, ripped free of their parent star by the same whipcrack power of the black hole and flung free on their own. There'd be nothing, in theory at least, to prevent this from happening, and the authors of the Monthly Notices paper even went so far as to estimate just how fast the planets might be traveling: a blazing 30 million m.p.h. (48 million km/h) — or close to 5% of the speed of light — thanks mostly to their smaller mass. This is one case, of course, in which theory bumps up against the limits of technology. With no star to jostle or dim, the planets would be entirely undetectable — at least given the limits of current telescopes. It's enough, perhaps, to know that those planets may be out there, and to contemplate not just how solitary their travels are, but also how much more they'll be when they reach the end of the Milky Way and sail off into the ocean of true intergalactic space.
Rich Peverley undergoing tests after collapse during game “Those are scary things,” Morrow said. “I don’t even know where to begin with what they’re thinking in that locker room.” The 31-year-old Peverley, who averaged 16 minutes of ice time in all six games of the Stanley Cup last season with Boston, was diagnosed with an irregular heartbeat in training camp and underwent a procedure that sidelined him through the first regular season game. He had played in 60 consecutive games before sitting out at Columbus last week due to effects of his heart condition, but Monday’s game was his third straight since then. “He’s always taken the precautions, he’s a very focused, organized guy, you can say,” said Seguin, who won a Stanley Cup with Peverley in Boston. “Sometimes bad things happen to good people.” A doctor who specializes in the study of athletes and heart conditions questioned whether Peverley should have been playing, while taking care not to criticize those handling his medical needs. “It’s a symptomatic athlete,” said Dr. Barry Maron of the Minneapolis Heart Institute Foundation. “That’s the key. A symptomatic athlete with known heart disease who’s out there. That would not seem to be optimal.” Ruff said there were no previous concerns about Peverley and praised team doctors for doing “a fabulous job monitoring the situation.” Before the morning skate, Ruff emphasized the positive medical report. “He’s doing good, he’s stable and he’s in good spirits,” he said. “A few guys who’ve interacted say he’s got his sense of humor back already.” General manager Jim Nill said Peverley was undergoing tests to find the “cause of the event and a long-term solution.” The condition places Peverely’s career in jeopardy and it’s likely he won’t be back this season. Ruff, asked whether there was a prognosis for Peverley’s return, replied: “No, no, nothing.” This adds poignancy to Peverley’s request, upon being revived, to get back out there. Every NHL season is filled with tales of players heading to the dressing room for repairs, getting stitched up, then rejoining the action seemingly no worse for wear. “Athletes in general, hockey players in general are kind of weird that way,” Stars wing Ray Whitney said. “You’ll play through injuries. I’m not sure about playing through a heart injury. That’s a little bit aggressive in my opinion, but that’s Rich.” The Stars recalled forward Colton Sceviour and Chris Mueller from their Texas AHL affiliate and Ruff said both would be in the lineup against the Blues. “We’re still in a big playoff race,” center Jamie Benn said. “I guess we’ll be playing for Rich tonight.”
The BP Amoco Polymers facility off Tobacco Road released the findings of the company's internal investigation Friday - the four-month anniversary of the fatal blast. The reaction inside the waste collection drum, or knockout pot, came during an aborted start-up of the Amodel unit, the company says. Polymers foamed and coated the inside of the drum. Pressure built up. The knockout pot's lid blew off when workers removed bolts to open it for cleaning. In the same manner as the report by the Georgia Department of Labor, the plant's findings steer away from a defective gauge on the dump tank. The families of two victims - Henrich Kohl, 25, and John Rowland, 35 - have filed a wrongful death lawsuit against Modern Welding Co. of Kentucky, Modern Welding Co. of Georgia and Dresser Industries, the makers of the vessel and its gauge. George Sanders, 42, also died in the blast. The tank had been filled with hot polymer waste. The chemical reaction made materials inside the tank like an "M&M candy" - an outer shell crystallized while waste continued brewing inside, BP Amoco Polymers spokeswoman Pam Barbara said. Because of the outer shell, the vessel's gauge did not give an accurate reading. The employees began removing the cover plate - the gauge registering that the tank had been depressurized - just before their deaths. Attorneys for the Kohl and Rowland families could not be reached for comment Friday. Atlanta attorney Charles R. Beans, who represents Modern Welding, the vessel's manufacturer, said he expects his client to be exonerated. The vessel worked properly in its function at the plant, he said. It was being used to collect waste in the production of Amodel, a heat-resistant plastic used in car parts. "Everything we've seen from the beginning, including this and the Department of Labor's report, definitely points away from us and agrees with our conclusions," Mr. Beans said. The Labor Department's report says sign-out sheets documenting the employees' shutdown procedures to isolate the tank had not been completely filled out. Ms. Barbara said plant officials believe the explosion would have occurred whether or not proper shutdown procedures had been followed. The company is unaware of any similar mishaps occurring at other plants, Ms. Barbara said. The federal Occupational Safety and Health Administration and the U.S. Chemical Safety and Hazard Investigation Board are still looking into the explosion. The plant's Amodel unit will be restarted the week of July 23, Ms. Barbara said. Knockout pots will no longer be used. Instead, polymer waste will be channeled through a system that mixes it with water for cooling, grinds the mixture, then funnels it into drums for disposal. Employees will no longer need to open waste tanks when the unit is shut down, Ms. Barbara said.
Review article: the continuing development of proton pump inhibitors with particular reference to pantoprazole. Inhibition of the gastric proton pump is gaining acceptance as the treatment of choice for severe gastrooesophageal reflux disease, and for treatment of duodenal and gastric ulceration. Three of these drugs are now available (omeprazole, lansoprazole and pantoprazole) and more are being developed. Proton pump inhibitors share the same core structure, but differ in terms of substituents on this core. The substitutions are able to modify some important chemical properties of the compounds. For example, pantoprazole is significantly more acid-stable than omeprazole or lansoprazole. E3810 is significantly less stable than the other compounds. We present an explantation for this finding that depends on the relative pK values for the pyridine and benzimidazole nitrogens, especially the former. Pantoprazole formulated in an enteric-coated tablet displays high bioavailability and linear pharmacokinetics whether on single or multiple dose regimens. Although all three proton pump inhibitors provide a similar chemical conversion to sulphenamides, which are highly reactive cysteine reagents, these reagents derivatize different cysteines in the extracytoplasmic or membrane domain of the pump and inhibit the pump at different rates. Whereas the differences in chemical reactivity can be explained by the solution chemistry of the compounds, selective derivatization of different cysteines on the protein argues for an involvement of pump structure in response to the presence of the proton pump inhibitor on its luminal surface. This suggests that the proton pump inhibitors, which were originally designed to take advantage of only the highly acidic space generated in the parietal cell by the production of the sulphenamide, are made even more selective by the protein they target. Pantoprazole is metabolized by a combination of phase I and phase II metabolism, and has also been shown to have a very low potential for drug interaction. Studies of acid secretion in man have shown this compound to be an effective and long lasting inhibitor of acid secretion. The pharmacodynamics explain the cumulative effect of repeated doses and maximal acid secretory capacity with a once daily dosage.
190 Mich. App. 398 (1991) 476 N.W.2d 417 FERENCY v. SECRETARY OF STATE Docket No. 129240. Michigan Court of Appeals. Decided July 22, 1991, at 9:55 A.M. Frank J. Kelley, Attorney General, Gay Secor Hardy, Solicitor General, and Gary P. Gordon, Todd B. Adams, and Leo H. Friedman, Assistant Attorneys General, for the defendant. Amici Curiae: Sachs, Nunn, Kates, Kadushin, O'Hare, Helveston & Waldman (by Theodore Sachs), for the Michigan Democratic Party. Foster, Swift, Collins & Smith (by David W. McKeague), for the Michigan Republican Party. Before: SAWYER, P.J., and HOOD and MURPHY, JJ. SAWYER, P.J. Defendant appeals from an order granting summary disposition in favor of plaintiff pursuant to MCR 2.116(C)(10) and declaring unconstitutional *401 certain portions of the Michigan Election Law, MCL 168.1 et seq.; MSA 6.1001 et seq., that deal with the conducting of presidential and general partisan primary elections. We reverse. Plaintiff filed his complaint in circuit court, seeking to have declared unconstitutional 1988 PA 275, which establishes a closed presidential primary. Under the provisions of the act, in order to be eligible to vote in the presidential primary, a voter must declare, at least thirty days before the primary election, his party preference and may only vote in the presidential primary of the party for which the voter has declared a preference. A voter may change his preference anytime up to thirty days before a presidential primary, and the person's declaration is recorded in a public record. The trial court agreed with plaintiff and granted the relief sought. Additionally, the trial court also declared MCL 168.576; MSA 6.1576 to be unconstitutional. That section governs the conducting of the ordinary, nonpresidential primary elections, normally held in August of even-numbered years.[1] In the August primary, a voter is restricted to voting in only one party's primary election, though there is no requirement that the voter publicly declare a party preference in advance of the election. Indeed, a voter does not select which primary to vote in until he enters the voting booth and that selection is secret. The voter's choice of a party preference with respect to the presidential primary has no effect on the August primary and voters who have not declared a party preference may nevertheless vote in the August primary. A voter may not, however, vote in the primary election of more *402 than one party in the same primary.[2] With respect to the August primary, the trial court declared unconstitutional the restriction on voting only within one party's primary in any given election. Under the trial court's order, voters would be permitted to vote in both primaries during the same August primary election.[3] As the system presently exists, Michigan's presidential primary can generally be referred to as a "closed" primary because a person may vote in the presidential primary only for a candidate for the nomination of the party of which the voter has publicly declared a preference at least thirty days in advance of the election. The August primary, on the other hand, can generally be described as an "open" primary because, although the voter is restricted to only voting in the primary of one party, there is no obligation that the voter publicly declare his party preference or that the voter vote in the primary of the party with which he does associate himself. Thus, the chairman of the Michigan State Republican Party could legally vote in the Democratic primary if he so desired, just as the chairman of the Michigan State Democratic Party could similarly vote in the Republican primary if that were his wish. *403 Michigan has employed various primary schemes over the years, oscillating between open and closed primary elections. Most common in recent years has been the open primary election, both with respect to the August primary and the presidential primaries. However, in recent years the National Democratic Party has adopted rules which prohibit the recognition of delegates selected for the national presidential nominating convention on the basis of open primaries. As a result, the Democratic Party in Michigan did not participate in the open presidential primary, instead selecting its nominating delegates on the basis of party caucuses. With the demise of the presidential primary in Michigan, the Michigan Republican Party chose its candidates to its national nominating convention by way of a state convention, delegates to which were selected by the precinct delegates elected to party office in the August primary. 1988 PA 275 was passed in order to reestablish a presidential primary in Michigan, yet doing so in a manner that complied with the national rules of the Democratic and Republican Parties, particularly with respect to the requirement of the National Democratic Party that presidential primaries be closed. Having put this case in some context, we proceed to consider the issues raised by defendant on appeal. First, we consider defendant's argument that the trial court exceeded its authority in declaring MCL 168.576; MSA 6.1576 unconstitutional. We agree. Plaintiff did not seek in his complaint, or any subsequent pleading, relief from the requirements of MCL 168.576; MSA 6.1576 with respect to the restrictions on voting in the August primary. Plaintiff sought relief only from the requirements relating to the presidential primary. Because the constitutionality of the provisions *404 of the election law with respect to the August primary was not before the court for decision, the trial court exceeded its authority in rendering such a ruling. Because no controversy existed concerning the propriety of the laws concerning the August primary, the court lacked the authority to enter a judgment concerning those provisions of the election law. See Fieger v Comm'r of Ins, 174 Mich App 467, 470; 437 NW2d 271 (1988). Accordingly, that portion of the trial court's opinion that addresses the August primary, particularly MCL 168.576; MSA 6.1576, is vacated, and we may proceed in the remainder of this opinion to consider only the constitutionality of the presidential primary system enacted in 1988 PA 275. We shall analyze this question by first considering the purpose of requiring a closed primary and then separately addressing the three constitutional challenges to the closed presidential primary raised by plaintiff. A closed primary seeks to have only individuals affiliated with a particular party vote in that party's primary for the purpose of selecting that party's nominee for a particular office. There are generally four classes of voters that closed primary statutes seek to prevent from voting in a particular party primary: (1) raiders — those associated with one party but who cross over to vote for a weak candidate in the rival party who is likely to lose to their own party's candidate in the general election (particularly if their own candidate is unopposed in the primary), (2) second-choice supporters — those associated with one party but who cross over to support a preferred candidate in the other party in case their own party's candidate loses in the general election, (3) crossovers — those affiliated with one party but who cross over to support a candidate in the other party whom they *405 prefer over any potential nominee of their own party, and (4) independents — those not affiliated with any party but who wish to support a particular party candidate. See Smith v Penta, 81 NJ 65, 70; 405 A2d 350 (1979). These voters are intentionally restricted from voting in the primary through the process of requiring them to announce a party allegiance in advance of the election. We first turn to plaintiff's argument, which was accepted by the trial court, that 1988 PA 275 is unconstitutional because it adds a new qualification for voting not provided by the constitution as prohibited under Const 1963, art 2, § 1, which provides: Every citizen of the United States who has attained the age of 21 years, who has resided in this state six months, and who meets the requirements of local residence provided by law, shall be an elector and qualified to vote in any election except as otherwise provided in this constitution. The legislature shall define residence for voting purposes. Thus, the Legislature must allow every individual who meets the citizenship, residency, and age requirements of art 2, § 1 to vote. Plaintiff argues that the requirement that a person declare a party preference constitutes an additional qualification to be an elector in contravention of this constitutional provision. Defendant argues that the Legislature was authorized to adopt a closed presidential primary under the provisions of Const 1963, art 2, § 4 authorizing the enactment of laws to preserve the purity of elections and to guard against abuses of the elective franchise. In particular, defendant argues that the closed presidential primary prevents the "evils" associated with the party caucus method, which *406 would be the alternative to a closed primary system. On their faces, neither of the constitutional provisions cited by the parties directly address the issue of closed primaries. Rather, it is the interpretation given to those provisions that controls the determination in the case at bar. The primary rule of constitutional interpretation is the employment of original or common understanding. That is, What did the people understand the constitutional provision to mean when they adopted it? This principle, along with additional principles of constitutional construction, were discussed by the Supreme Court in Traverse City School Dist v Attorney General, 384 Mich 390, 405-406; 185 NW2d 9 (1971): This case requires the construction of a constitution, where the technical rules of statutory construction do not apply. McCulloch v Maryland [17 US (4 Wheat) 316, 407; 4 L Ed 579 (1819)]. The primary rule is the rule of "common understanding" described by Justice COOLEY: "A constitution is made for the people and by the people. The interpretation that should be given it is that which reasonable minds, the great mass of the people themselves, would give it. `For as the Constitution does not derive its force from the convention which framed, but from the people who ratified it, the intent to be arrived at is that of the people, and it is not to be supposed that they have looked for any dark or abstruse meaning in the words employed, but rather that they have accepted them in the sense most obvious to the common understanding, and ratified the instrument in the belief that that was the sense designed to be conveyed.' [Cooley, Constitutional Limitations (6th ed), p 81]." (Emphasis added.) (See also quotations on "common understanding" in the per curiam opinion of the companion Carman *407 [v Secretary of State, 384 Mich 443; 185 NW2d 1 (1971)] case, supra.) A second rule is that to clarify meaning, the circumstances surrounding the adoption of a constitutional provision and the purpose sought to be accomplished may be considered. On this point this Court said the following: "In construing constitutional provisions where the meaning may be questioned, the court should have regard to the circumstances leading to their adoption and the purpose sought to be accomplished." Kearney v Bd of State Auditors [189 Mich 666, 673; 155 NW 510 (1915)]. A third rule is that wherever possible an interpretation that does not create constitutional invalidity is preferred to one that does. Chief Justice Marshall pursued this thought fully in Marbury v Madison [5 US (1 Cranch) 137; 2 L Ed 60 (1803)], which we quote in part: If any other construction would render the clause inoperative, that is an additional reason for rejecting such other construction...." See also Livingston Co v Dep't of Management & Budget, 430 Mich 635, 642; 425 NW2d 65 (1988). Thus, the question posed is whether the people in adopting Const 1963, art 2, § 1 understood that constitutional provision as including a prohibition on the adoption of the closed primary system. For the reasons to be discussed below, we conclude that it does not and, therefore, Const 1963, art 2, § 1 does not prohibit the adoption of a closed primary system. It is, of course, impossible to divine what was in the collective minds of the voters nearly three decades ago when they adopted the 1963 Constitution, or the extent to which they deliberated over each individual portion of the constitution. However, we can employ our best effort to resolve this question by considering the text of the constitution and the legal history in which the constitution was *408 written, as well as the debates of the delegates to the constitutional convention.[4] We turn first to the state of the law preceding the drafting and ratification of the 1963 Constitution. As discussed above, between 1908 and 1963, Michigan employed both open and closed primaries at different times, though an open primary had been in use for some period of time before the drafting of the 1963 Constitution.[5] The important principle is that the 1908 Constitution neither established nor prohibited the use of a closed primary. Rather, the matter whether to employ an open or closed primary was left to legislative determination. Furthermore, the 1908 Constitution included the same qualifications to be an elector as are contained in the 1963 Constitution, namely, citizenship, residency, and age. Const 1908, art 3, § 1. Although these provisions were redrafted in the 1963 Constitution, including a somewhat more economical use of words, the provisions of Const 1963, art 2, § 1 concerning the qualifications of electors are essentially the same as those of the *409 1908 Constitution. Thus, the text employed in the 1963 Constitution does not itself suggest an intent by the convention to draft a constitution that differed from the 1908 Constitution by inclusion of a prohibition against the use of a closed primary. Further, as will be discussed below, the question of closed versus open primaries was, in fact, discussed at the 1961 Constitutional Convention, and had the intent of the convention been to place before the voters a constitution which prohibited closed primaries, the drafters certainly could have explicitly stated so in the text of the constitution. That is, faced with revising the 1908 Constitution under which Michigan had conducted both open and closed primaries, a fact of which the delegates to the 1961 Constitutional Convention were explicitly aware, it is certainly reasonable to expect that a convention determined to prohibit the utilization of closed primaries would have explicitly done so by including a provision to that effect rather than leaving it to the courts to divine such an intent from the utilization of language similar to that employed in the 1908 Constitution under which closed primaries were allowed. Rather, on the basis of the utilization in the 1963 Constitution of language similar to that contained in the 1908 Constitution, the more rational view is that it was the intent of the drafters, and ultimately the people in ratifying the 1963 Constitution, to leave the matter as it had existed under the 1908 Constitution, namely, at the considered discretion of the Legislature in enacting election laws. The other readily available source for attempting to discern the common understanding of that constitutional provision is the debates during the constitutional convention itself. While the comments by individual delegates at the convention do not conclusively establish either the common understanding *410 of the people in adopting the constitutional provision or, for that matter, the collective understanding of the delegates in adopting the provision, it is instructive to look at the debate in order to learn the intent of the drafters in accepting or rejecting particular proposals in the drafting of the constitution. At the constitutional convention, a substantial number of delegates supported a proposal to mandate a closed primary in the constitution, representing a change from the 1908 Constitution, which left the matter up to the Legislature. The proponents of the closed primary system not only advocated the desirability of closed primaries, but also expressed an unwillingness to leave the matter to the Legislature, having the view that the Legislature was unwilling, because of political considerations, to adopt a closed primary.[6] The opponents of the closed primary proposal, in addition to voicing their views of the evils of a closed primary system, also frequently expressed the view that the issue is legislative in nature and that the issue is best left to the Legislature to resolve. Among the views expressed during the debate on the first closed primary proposal are the following: [Mr. Pollock:] Under the present constitution, the choice, of course, of the types of primary is a statutory matter. Unless we are convinced that one or the other type is better under all circumstances and at all times, it seems to me that we would be better advised to leave this in the hands of the legislature. *411 * * * ... I conclude, therefore, that it would be unwise to write into the constitution either the open or the closed primary, and I therefore urge the defeat of the amendment. * * * [Mr. Marshall:] And if we are to adopt a closed primary, it seems that this is a matter that could better be left to the legislature at their discretion rather than try to write it into the constitution. I oppose the amendment. * * * [Mr. Wanger:] ... I urge you to vote no on this, first of all because the case for it, even as a legislative matter, has not been clearly established here on this convention floor; and secondly, because in any event, it is not a matter which should be frozen into the constitution. * * * [Mr. Pollock:] [T]he committee thinks it simply unwise to write into the constitution either the open or the closed primary and therefore hope that you will defeat the amendment. Apropos of Mr. Brake's comment that he realizes that this is a statutory matter, we've had so many violations of this principle as we've been grinding out this constitution, that if we continue to put statutory matter, I think, of a very minor sort such as this is, into the constitution, I suggest this week when we come to consider problems of legislative powers, that we just abolish the legislature and stay in session ourselves. * * * [Mr. Norris:] And I think this matter ought to be left up to the legislature to see whether or not we can, in this state of ours, reach a state wherein there would be the hospitality, the acceptance, the encouragement of political difference, of political concepts, or political declaration of beliefs without public obloquy, and without economic coercion.... *412 * * * [Mr. Yeager:] [I]t was the subcommittee of the committee which took a look at it, namely, 3 members, and the chairman of that subcommittee stated to me that they turned it down as being legislative. [2 Official Record, Constitutional Convention 1961, pp 2233-2237.] The proposal was defeated by a vote of fifty-five to sixty. When the closed primary proposal was raised again later in the convention, the view that the closed primary issue is a legislative matter again was voiced, as a comment by Delegate Buback indicates: I rise to oppose the Yeager amendment for the following reasons: in the first place, it is strictly a legislative matter and should not be in the constitution. [2 Official Record, Constitutional Convention 1961, p 2895.] This time, the proposed amendment was defeated on a tie vote of fifty-eight to fifty-eight. There was a third effort to incorporate a closed primary proposal in the constitution, which was again defeated, this time on a vote of fifty-five to seventy-one. Again, the debate in opposition to the proposal included the view that the matter was legislative in nature and should not be included in the constitution, as reflected by the comment of Delegate Wanger that there was nothing which could be more "patently legislative." 2 Official Record, Constitutional Convention 1961, p 3080. What is also instructive from the record of the constitutional convention is that which was not debated and not proposed: that the constitution specifically prohibit a closed primary system. Although a number of delegates spoke eloquently in *413 opposition to the closed primary system, the convention did not adopt any proposal to prohibit closed primaries. Rather, the convention recognized that the 1908 Constitution left the matter to the Legislature, and the delegates at the 1961 convention were content to leave the matter as it was, namely, in the hands of the Legislature. For the above reasons, we conclude that the text of Const 1963, art 2, § 1 does not support an interpretation that closed primaries are prohibited in Michigan, nor does the history of the drafting and ratification of the 1963 Constitution support any intent to interpret the clause so as to prohibit closed primaries. Rather, the record of the constitutional convention reflects an intent to maintain the status quo: that the matter was legislative in nature, and the constitution should require neither an open nor a closed primary. Finally, plaintiff presents no evidence to support the view that the common understanding of the people in adopting the 1963 Constitution was that the constitution would prohibit closed primaries. Rather, the only inference which can be drawn from the historical record is that the people, in adopting a constitution with provisions substantially similar to those of the 1908 Constitution, also intended to maintain the status quo, leaving the matter in legislative hands. Next, we turn to plaintiff's argument that the closed presidential primary violates Const 1963, art 2, § 4, which, inter alia, directs the Legislature to enact laws to preserve the secrecy of the ballot. Plaintiff argues that ballot secrecy is violated by requiring voters to publicly declare their party affiliation in order to vote in the primary. We disagree. First, much of the above discussion concerning the proposal to require a closed primary as part of *414 the constitutional convention debates is equally applicable here. That is, just as the facts that the 1908 Constitution did not require a closed primary, that a proposal to require a closed primary was explicitly rejected, and that no explicit proposal requiring an open primary was placed in the constitution reflect an intent by the drafters of the 1963 Constitution not to address the closed versus open primary debate as a matter of constitutional law in the drafting of Const 1963, art 2, § 1, so also do those facts reflect a similar intent in the drafting of Const 1963, art 2, § 4. The trial court's conclusion that the closed primary system violates the constitutional guarantee of secret ballot could be rejected on this basis alone. However, we shall nevertheless analyze the issue in more detail, because it is conceivable that the common understanding of the people in adopting the secret ballot clause would be to prohibit the necessity of public registration of party affiliation. The requirement that a voter publicly register as being affiliated with one party or the other in order to be eligible to vote in the presidential primary does not itself directly affect the secrecy of the voter's ballot. That is, the voter is not required to disclose which individual candidate he is voting for, but is merely required to disclose from which group of candidates he is making his selection (i.e., which party primary he is voting in). The case relied upon by the trial court in concluding that the closed presidential primary violates the constitutional guarantee of secret ballots, People ex rel Williams v Cicott, 16 Mich 283, 311-313 (1868) (plurality opinion of Justice CHRISTIANCY), is not applicable in the case at bar. Although Justice CHRISTIANCY did refer to every voter being entitled to conceal his vote, including the person or party *415 for which he voted, that opinion did not deal with the issue of closed primary elections. Rather, it dealt with the propriety of conducting an inquiry into how the voters voted in order to resolve an election during which irregularities occurred, including situations where the total number of ballots cast exceeded the number of voters the poll lists reflect as having voted. The Court did not concern itself with the question whether a voter can be compelled to reveal which party primary he chooses to vote in. Rather, we believe the better view was expressed by the California Supreme Court in Katz v Fitzgerald, 152 Cal 433, 435; 93 P 112 (1907): While primary election laws are now conducted under the law, and, are to that extent, a part of the elective system of the state, it is the secrecy of the ballot which the law protects, and not secrecy as to the political party with which the voter desires to act. The primary law does not prevent him from voting secretly. We cannot perceive where this law exposes any person advocating doctrines distasteful to any section of the community to its enmity any more than such a person would be exposed if he cast his ballot at a primary election held under the direction of the party managers without control of the law. Although primary elections are run by the state and are regulated by the state election law, they nevertheless remain primarily party functions. That is, the purpose of a primary election for a partisan elective office is not to narrow the field of candidates down to two candidates who then run off in the general election (as is the case in primary elections for nonpartisan office). Rather, the purpose of the primary election for partisan offices is to select each major party's nominees for a *416 particular office.[7] See Line v Bd of Election Canvassers of Menominee Co, 154 Mich 329, 332; 117 NW 730 (1908) ("A primary election is not an election to public office. It is merely the selection of candidates for office by the members of a political party in a manner having the form of an election.") In the general election, each party's candidates, along with any independent candidates, face each other for election to the office at issue. Similarly, in the presidential primary, the purpose of the primary election is to select delegates to the party's national convention for the purpose of conducting the business of the national party, including the nomination of that party's nominee for the office of President of the United States. Although the state has determined that it has an interest in controlling the nominations of candidates for partisan office, at least with respect to the major parties and certain offices,[8] this does not, however, change the fact that the primary election remains principally a party function. If the focus of primary elections were not on the political parties and the selection of nominees for each party, then primaries would be held without respect to political parties and would serve merely as a method of narrowing the field of candidates down to two candidates for each office who would then face each other in the general November *417 election, much in the manner of how nonpartisan candidates are treated. Under such a system, the two candidates receiving the most votes in the primary would face each other in November without regard to their party affiliation. Thus, it might well be that two Democrats would face each other in the November election, or two Republicans would face each other, or a Democrat would face an independent, or a Republican would face a minor party nominee, or any such variation thereof.[9] Thus, the general November election does not consist of the two strongest candidates facing each other, but the strongest candidates from each party (plus independent candidates) facing each other. This indicates that party affiliation is not ancillary to the primary election process, but rather is the focus of the primary election. That is, the purpose of the primary is to select the strongest candidate from each party, not the two strongest candidates in the district without regard to party affiliation. Thus, primary elections are primarily party functions, unlike the general November election which merely serves to determine the candidate who appeals to the most voters and thus wins the office. As for the presidential primary, the focus on the *418 party aspect is even stronger. The voters in a presidential primary do not merely cast votes for each party's nominee for President, but also influence the selection of delegates to the party's national convention, who in addition to selecting that party's nominee for President conduct other party business, such as the drafting of a platform and the drafting of party rules. Thus, a party has legitimate concerns with raiding, not only in terms of the possibility of having a nominee that does not share that party's political philosophy, but also in terms of the possibility of the selection of delegates who could draft a party platform in contravention to the party's general philosophy as well as establish party rules which could effectively wrest control of the party away from the party regulars and put it in the hands of the raiders. Accordingly, we conclude that the California Supreme Court in Katz was correct in concluding that primaries remain primarily party functions and thus there is a legitimate state interest in restricting access by voters to the primary elections and, more to the point, in requiring voters to publicly identify their party affiliation in order to be eligible to vote in a primary election. That is, because primary elections are primarily party functions, it is not unreasonable to expect the voter to be willing to disclose his party affiliation in order to participate in that party's internal operations, such as the selection of its nominee for a particular office. This does not violate the secrecy of the ballot, because there is no legitimate interest by the voter to shield his affiliation from a party where that voter decides to participate in the party activities and where the ballot remains secret once the voter gets in the primary election booth. Moreover, we note that the alternative to the *419 closed presidential primary is not holding an open presidential primary. As history has demonstrated, at a minimum, the Democratic Party refuses to participate in an open primary, for entirely legitimate reasons, and would refuse to seat at its national convention any delegation from Michigan chosen through an open primary process. Rather, the rules of the national Democratic Party would require, in the absence of a closed presidential primary, that the Michigan Democratic Party select its national convention delegates through a caucus system. While we are not informed of the precise method by which the Democrats conduct their caucus system, clearly it would necessitate a person attending a Democratic caucus and thus publicly exposing himself to identification as a Democrat. Furthermore, because the caucuses would be beyond the control of the Secretary of State, and state election law, there would be no guarantee that the caucuses would be run using a secret ballot. That is, while the Democratic Party could choose to conduct its caucuses by secret ballot, it could as easily choose to require each caucus participant to publicly announce his vote during the caucus, because the running of the caucus would be subject to party rules rather than state election law. Similarly, the Republican Party, which historically has selected its national convention delegates in state convention in the absence of the presidential primary, would be under no compunction to require the use of a secret ballot in selecting the delegation members and might require each state convention delegate to publicly announce which presidential candidate he was supporting. Thus, from the standpoint of a secret ballot, we fail to see how striking down the closed presidential primary would support this aim. *420 Rather, striking down the presidential primary statute would seem to have the effect of weakening the sanctity of the secret ballot rather than strengthening it. For the above reasons, we conclude that the presidential primary statute, 1988 PA 275, does not violate the secret ballot requirements of the state constitution, Const 1963, art 2, § 4. Next, we turn to plaintiff's argument that the closed presidential primary violates the right of association. In finding that the closed presidential primary, as well as the restricted open August primary, violates this constitutional right, the trial court relied upon the United States Supreme Court decision in Tashjian v Republican Party of Connecticut, 479 US 208; 107 S Ct 544; 93 L Ed 2d 514 (1986). However, Tashjian does not support the trial court's conclusion. In Tashjian, the State of Connecticut had a closed primary system in which a voter must register as a member of a particular party in order to vote in that party's primary. However, the Republican Party of Connecticut changed its party rules to allow any voter who was either a registered Republican or was a registered voter not affiliated with any party to participate in the Republican primary. However, Connecticut election law did not allow for independents to participate in a party primary. The United States Supreme Court concluded, in essence, that the Connecticut Republican Party had the right to associate with those voters it wished, including independent voters. Thus, the holding of Tashjian is that the state cannot restrict participation in a party primary by those voters whom the party wishes to have participate. Thus, Tashjian would be applicable if either the Democratic or Republican Party wished to allow independents to participate in its presidential primary but those independents *421 were not allowed to do so under state election law. In fact, the closed presidential primary does not impede any voter's freedom of association with a political party. Any voter is lawfully entitled to associate with any political party and participate in any major political party's presidential preference primary by merely publicly declaring party affiliation as part of the voter registration process. Moreover, a challenge based on a freedom of association argument to New York's closed primary system, in which the requirement that party registration occur several months before a primary was held, was rejected by the United States Supreme Court in Rosario v Rockefeller, 410 US 752; 93 S Ct 1245; 36 L Ed 2d 1 (1973). The Supreme Court concluded that a voter's freedom of association was not impeded because the voter could register as a member of a political party, though the voter was required to do so several months in advance of the primary election. In fact, the freedom of association, rather than supporting plaintiff's position, defeats plaintiff's position inasmuch as the political parties, and their members, are entitled to closed primaries in order to protect their own associational rights. This principle was upheld in Nader v Schaffer, 417 F Supp 837 (D Conn, 1976), in the upholding of Connecticut's closed primary system. This principle was also explicitly recognized by the United States Supreme Court in Democratic Party of the United States of America v Wisconsin ex rel La Follette, 450 US 107, 122; 101 S Ct 1010; 67 L Ed 2d 82 (1981): And the freedom to associate for the "common advancement of political beliefs," Kusper v Pontikes [414 US 51, 56; 94 S Ct 303; 38 L Ed 2d 260 *422 (1973)], necessarily presupposes the freedom to identify the people who constitute the association and to limit the association to those people only.[22] "Any interference with the freedom of a party is simultaneously an interference with the freedom of its adherents." Sweezy v New Hampshire [354 US 234, 250; 77 S Ct 1203; 1 L Ed 2d 1311 (1957)]; see NAACP v Button [371 US 415, 431; 83 S Ct 328; 9 L Ed 2d 405 (1963)]. Here, the members of the National Party, speaking through their rules, chose to define their associational rights by limiting those who could participate in the processes leading to the selection of delegates to their National Convention. On several occasions this Court has recognized that the inclusion of persons unaffiliated with a political party may seriously distort its collective decisions — thus impairing the party's essential functions — and that political parties may accordingly protect themselves "from intrusion by those with adverse political principles." Ray v Blair [343 US 214, 221-222; 72 S Ct 654; 96 L Ed 894 (1952)]. [22] "Freedom of association would prove an empty guarantee if associations could not limit control over their decisions to those who share the interests and persuasions that underlie the association's being." L. Tribe, American Constitutional Law 791 (1978). See also Cousins v Wigoda, 419 US 477; 95 S Ct 541; 42 L Ed 2d 595 (1975); Ferency v Austin, 666 F2d 1023 (CA 6, 1981). Thus, the freedom of political association supports the use of a closed primary where a political party desires a closed primary in order to protect the associational rights of the party and its members. Rather than the principles of the freedom of association compelling an open primary, regardless of party wishes, it is the party's choice to determine with whom it wishes to associate and, therefore, *423 whether its interests require a closed or an open primary, or a semi-open primary as was the case in Tashjian. For the above reasons, we conclude that the trial court was incorrect in its determination that 1988 PA 275 is constitutionally infirm under each of the theories proffered by plaintiff and relied upon by the court. Rather, the Legislature is empowered to create a closed primary consistent with the state and federal constitutions. Reversed. Defendant may tax costs. HOOD, J., concurred. MURPHY, J. (concurring). I concur that the trial court erred in declaring MCL 168.576; MSA 6.1576 to be unconstitutional, because the issue of its constitutionality was not a controverted issue before the court, nor was the determination of its constitutionality germane to the determination of the constitutionality of 1988 PA 275. The closed primary election at issue is not a regular election that places a person in public office, but rather a mechanism used by the political parties to select their candidates for the office of President of the United States. Participants are not required to reveal for whom they vote, nor are they bound to a particular party in the regular election. Thus, their ballot remains secret. Accordingly, I find no violation of Const 1963, art 2, § 1 or § 4. Finally, I concur with the majority opinion's reasoning that 1988 PA 275 does not unreasonably infringe on an individual's constitutional right of association. I would reverse the decision of the trial court, but would not award costs to either party, because a public question is involved. NOTES [1] We will hereinafter refer to these nonpresidential primary elections as the "August primary" for ease of reference, recognizing that these "August primaries" can be held at anytime of the year, such as where a special election is involved. [2] E.g., a voter could not vote in the Republican primary for nomination of a candidate for Governor and in the Democratic primary for selection of a nominee for United States Senator in the same August primary. The voter, once having entered the booth, must choose to either vote entirely within the Republican primary or entirely within the Democratic primary. [3] E.g., a voter could vote for a Republican candidate in the gubernatorial primary and a Democratic candidate in the United States senatorial primary. It is not clear from the trial court's opinion whether defendant is compelled to allow a voter to vote in the primaries of more than one party for the same elective office. That is, to allow a voter to vote for both a Republican candidate and a Democratic candidate in the gubernatorial primaries. The trial court's order refers only to the requirement "that voters be allowed access across party lines in primary elections...." [4] As Justice COOLEY pointed out in the passage quoted by the Supreme Court in Traverse City School Dist, it is the intent of the people who ratified the constitution, rather than the meaning ascribed by the delegates who framed the constitution, which ultimately resolves the issues of constitutional construction. Id., p 405. This principle is discussed in greater detail in Bork, The Tempting of America: The Political Seduction of the Law (New York: The Free Press, 1990), p 144. Judge Bork explains that we can reach a determination of the original understanding of the ratifiers by looking to the words used and by looking to secondary materials, such as the debates at the conventions, public discussion, newspaper articles, dictionaries in use at the time of drafting, and the like. Id. With respect to interpreting our own Michigan Constitution, we would also add that consideration should be given to the preexisting constitution of 1908, as well as any court decisions before the framing of the 1963 Constitution and statutes enacted under the 1908 Constitution, to determine whether the delegates to the constitutional convention and, ultimately the people of Michigan, intended to change the law in the 1963 Constitution or merely intended that this particular aspect of government continue as it had been under the 1908 Constitution. [5] Apparently, Michigan last changed from a closed primary to an open primary in 1937 under 1937 PA 37. [6] See, e.g., the comments of Delegate Brake in support of the closed primary proposal, reporting that prior efforts to lobby the Legislature to adopt a closed primary were unfruitful because of the view of legislators that they needed crossover votes to win in the primary. 2 Official Record, Constitutional Convention 1961, p 2233. [7] Political parties whose principal candidate received less than five percent of the total vote cast for candidates for the office of Secretary of State in the last preceding general state election are not permitted to make nominations by the primary election method. They are required to nominate by caucus or convention. MCL 168.532; MSA 6.1532. [8] The primary election does not apply to all offices, but only those offices listed in MCL 168.534; MSA 6.1534. Certain offices, such as Lieutenant Governor, Attorney General, Secretary of State, justices of the Supreme Court, and the various elective educational boards are nominated in convention, even for the nominees of the major parties (i.e., those parties entitled to participate in the primary election). [9] For example, in the 1988 August primary, in which three major parties participated (the Democratic Party, the Republican Party, and the Tisch Independent Party) in the Thirteenth Congressional District, there were three candidates vying for the Democratic nomination (Barbara Collins, George Crockett, and Michael Hartt) who received more votes in the primary than the candidate seeking the Republican nomination (John Savage, II). Michigan Manual 1989-1990, p 767. However, the two who received the most votes, Democrats Collins and Crockett, did not face each other in the general election. Rather, Democrat Crockett faced Republican Savage (and two minor party candidates) in the general election. Id. at 806. Similarly, in the same primary for the Forty-fifth State Representative District, the two candidates who received the most votes were Republicans, yet the top Republican candidate in the primary faced off against the lone Democrat candidate in the primary in the general November election. Id., pp 777, 834.
entity relationship diagram erd solution Gallery Entity–relationship model An entity–relationship model (ER model for short) describes interrelated things of interest in a specific domain of knowledge. A basic ER model is composed of entity types (which classify the things of interest) and specifies relationships that can exist between entities (instances of those entity types).How to Create an Entity Relationship Diagram (ERD)An Entity Relationship Diagram (ERD) is a data model describing how entities (or concepts or things) relate to one another. When created by business analysts or business users, ERDs can be used to understand the business domain, clarify business terminology, and connect business concepts to database structures.Enhanced ER Diagram Tutorial | LucidchartEnhanced entity relationship diagrams, or EERDs, are specialized ER Diagrams that can be extremely useful for modeling your database. EERDs use several concepts that are closely related to object oriented design and programming. 3 min read Want to make an ERD of your own? Try Lucidchart. It's quickWhat is the Entity Relationship Model? Diagram & ExamplesIn this lesson, we look at a conceptual design tool commonly used in the planning and layout of a database: the entity relationship (ER) model.Database Model Diagram Symbols Edraw MaxPre drawn database model diagram symbols represent entity, view, relationship, parent to category, category, category to child, dynamic connector, line connector, strong entity, etc. These symbols help create accurate diagrams and documentation.ERD dotted line. Experts ExchangeIn an entity relationship diagram what does it mean when there is a dotted line between two entities.Draw an ER Diagram in 3 Steps edrawsoft An ER diagram is a data modeling technique showing how entities or concepts relate to one another. It's a crucial tool for software engineering during the design phase of the development process.Data Modeling an Database Design Chapter Three (unfinished)A business rule states that a given employee may be supervised—but there may be only one supervisor per employee; this means there is a mandatory recursive relationship in the ER diagram.Mechanical Drawing Symbols conceptdraw Electrical Symbols, Electrical Diagram Symbols Electrical Engineering Solution used together with ConceptDraw DIAGRAM v12 drawing facilities makes short a work of drawing various electrical and electronic circuit schemes.Data Structure Diagram | Drawing a Project Gantt Chart ...Data structure diagram (DSD) is intended for description of conceptual models of Users new to ConceptDraw PROJECT will find the Basic lessons an essential Use ConceptDraw PRO with Accounting Flowcharts solution to document and Project Accounting Diagram
HOUSTON (Reuters) - A pact that 15 U.S. states signed to jointly investigate Exxon Mobil Corp for allegedly misleading the public about climate change sought to keep prosecutors’ deliberations confidential and was broadly written so they could probe other fossil fuel companies. A view of the Exxon Mobil refinery in Baytown, Texas September 15, 2008. REUTERS/Jessica Rinaldi The “Climate Change Coalition Common Interest Agreement” was signed by state attorneys general in May, two months after they held a press conference to say they would go after Exxon, the world’s largest publicly-traded oil and gas company, and possibly other companies. The signed agreement has not been made public until now, and Reuters reviewed a copy of it on Thursday. It provides considerably more detail about the prosecutors’ legal strategy than the general outline provided at their announcement in March, which was headlined by former Vice President Al Gore. In a nod to the politically charged nature of the inquiry, which quickly spilled over into Congress and corporate shareholders meetings, the pact says signatories of the agreement should keep discussions private and “refuse to disclose any shared information unless required by law.” Besides Exxon, the agreement says other entities could be targeted if states felt they were delaying action to fight climate change. The pact says the states may take legal action to “defend Federal greenhouse gas emissions limits” and open investigations of “possible illegal conduct to limit or delay the implementation and deployment of renewable energy technology.” It also ponders “investigations of representations made by companies to investors, consumers and the public regarding fossil fuels, renewable energy and climate change.” After numerous filings under sunshine laws, a copy of the agreement was obtained by the Energy & Environment Legal Institute, a free-market think tank. The Competitive Enterprise Institute, whose website says it opposes U.S. Environmental Protection Agency regulation of greenhouse gas emissions, had also sought the documents. “This is far less a proper common interest agreement than a sweeping cloak of secrecy,” said Chris Horner, a lawyer who represents the Energy & Environment Legal Institute. The attorneys general, as previously reported, received guidance from well-known climate scientists and environmental lawyers before announcing the Exxon probe. Critics have called this a sign of meddling by special interests, though prosecutors’ offices have made clear climate change is a top concern of voters. New York state’s attorney’s general office said confidentiality agreements are used often. “Entering into a common interest agreement is routine practice during a multistate investigation. These agreements preserve the confidentiality of non-public information shared among state law enforcement officials,” the office told Reuters. Exxon, which has said that it has acknowledged the reality of climate change for years, has called subpoenas stemming from the inquiry unreasonable. It has also said it is being unfairly targeted by climate activists. The company, which supports a revenue-neutral carbon tax, declined to comment. A U.S. House of Representatives committee last month issued subpoenas to the attorneys general of New York and Massachusetts over their investigations of whether Exxon misled investors on climate change risks. The two state officials said they would refuse to comply with the subpoenas, with one calling it “unconstitutional and unwarranted” interference. In a bid to try to force action on climate change, the state attorneys general said in March they would jointly investigate whether Exxon executives misled the public by contradicting research from company scientists that spelled out the threats of global warming. A pact was signed in May and included California, Connecticut, the District of Columbia, Illinois, Maine, Maryland, Massachusetts, Minnesota, New Hampshire, New Mexico, New York, Oregon, Rhode Island, Vermont, Virginia, Washington state and the U.S. Virgin Islands. But only a couple formal inquiries have started. In June, the Virgin Islands withdrew its subpoena after Exxon called it overly burdensome and raised questions about jurisdiction.
Q: Does tensorflow support Python 3.6.4 on Windows? I'm running a Windows computer with just a CPU (no GPU). When I run pip install tensorflow -vvv in order to see what pip is doing, it lists a lot of links, but for all of them, it says "Skipping link ... it is not compatible with this Python." Does tensorflow support Python 3.6.4 on Windows? If so, what binary URL should I use to install it? (I previously installed with this version due to reading this, but ran into this error without the DLL load failed message, so I'm wondering if there's a better version I should use.) Also, I'm aware that Tensorflow says they support Python 3.x, but right now it hasn't been working for me. A: You have probably installed Python 32bits, you need the 64bits version
Concurrent development of the heart and placenta {#s1} ================================================ The heart and placenta develop concurrently, with heart tube specification occurring at days 16--21 and a rudimentary villous tree forming by day 21 of gestation (Schleich, [@B64]; Kaufmann et al., [@B39]; Khong, [@B40]; Linask, [@B46]; Tyser et al., [@B72]). Approximately 12 days post conception, the placenta comprises a layer of extra-embryonic mesoderm and two trophoblast populations, a core of cytotrophoblast cells covered by a layer of syncytiotrophoblast. Over the next 3--8 days the mesenchymal cell cores of the primary villi transform into first hemangiogenic precursor cells (Huppertz and Peeters, [@B35]). The villous trophoblast at this early stage of development is paramount in regulating the development of the placental vasculature with several components of key signaling pathways only expressed in the trophoblast, Figure [1A](#F1){ref-type="fig"} (Rossant and Cross, [@B61]). At the same time the heart forms, first as bilateral cardiogenic plates of mesoderm, then as a primitive heart tube as the two plates fuse during gastrulation (Gittenberger-de Groot et al., [@B28]; Lindsey et al., [@B47]). By day 20, the heart tube beats steadily, and includes a single ventricle and outflow tract (Schleich, [@B64]) Figure [1B](#F1){ref-type="fig"} (Gilbert and Barresi, [@B26]). ![**(A)** Timeline of human early placental development: Adapted from Lifemap Discovery (Edgar et al., [@B22]), "At the beginning of week 3 primary stem villi, consisting of a cytotrophoblast core covered by a syncytial layer, appear. Extraembryonic mesodermal cells or cytotrophoblast penetrate the core of the primary villi and grow in the direction of the decidua to form secondary stem villi and by the end of week 3 the mesodermal cells differentiate into blood cells and small blood vessels, forming the villous capillary system, and creating tertiary villi. By week 4, capillaries in the tertiary villi contact capillaries developing in the mesoderm of the chorionic plate and in the connecting stalk, eventually contact the intraembryonic circulatory system, and connect the placenta and the embryo. Thus, in week 4, when the heart begins to beat, the placental villous system is able to supply the embryo with oxygen and nutrients." **(B)** Timeline of human embryonic heart development: Adapted from Lifemap Discovery (Edgar et al., [@B22]). "The human heart develops on day 18 or 19 following fertilization. In response to induction signals from the underlying endoderm, the mesoderm in the cardiogenic area forms the cardiogenic cords. A hollow center forms within the cords, giving rise to the endocardial tubes. With lateral folding of the embryo, the paired endocardial tubes approach each other and fuse into a single tube called the primitive heart tube. The primitive heart tube develops into five distinct unpaired regions and begins to pump blood".](fphys-09-01045-g0001){#F1} Vascularization of the human placenta occurs by local *de-novo* vasculogenesis within the mesenchymal core of the secondary villi. This occurs prior to infiltration of fetal vessels or blood into the placenta with the progenitor cells derived directly from placental mesenchymal cells (Demir et al., [@B19]). Shortly after this, Hofbauer cells (macrophages of placental origin) develop inside the villous core in the vicinity of the vasculogenic precursor cells suggesting a putative paracrine role for these cells during the early stages of placental vasculogenesis (Demir and Erbengi, [@B18]; Cervar et al., [@B13]). During very early placental development, Vascular endothelial growth factor (VEGF) is highly expressed in cytotrophoblast cells and also in Hofbauer cells. On the other hand, the respective receptors, Flt-1 and Flk-1 are expressed on the vasculogenic and angiogenic precursor cells (Charnock-Jones et al., [@B14]). With this constellation an increase in the expression of VEGF and its receptors may orchestrate the temporal and spacial regulation of the differentiation and maturation of villous vascularization (Castellucci et al., [@B12]; Kingdom et al., [@B41]). Concurrently, heart looping occurs during week 4 and is controlled by gene regulatory networks for left-right patterning and local gradients (Lenhart et al., [@B44]; Sylva et al., [@B69]). Septa and valves form via tissue folding and cardiac cushions that undergo epithelial-mesenchyme transition during week 5 (Anderson et al., [@B3]). Cardiac vessel morphogenesis occurs concurrently via inductive signaling of epicardium from underlying myocardium (Lin et al., [@B45]). Fetal vascular development and circulation is established between 25 and 60 days and despite an extensive capillary network within early villi, there is little evidence of fetal-placental circulation until late first trimester (Thornburg and Louey, [@B71]). Once established, signaling between the placenta and fetal organs via the fetal-placental circulation may impact growth and remodeling of both the fetal heart and the placenta, which, in the placenta occurs throughout gestation until term (Figure [2](#F2){ref-type="fig"}). ![The placental and heart are connected via fetal vasculature. Signaling between trophoblast/endothelial and/or cardiomyocyte/endothelial cells may impact fetal vasculature, leading to changes in placental and heart structures (Jia et al., [@B36]). Oxygenation, flow, cell crosstalk can also affect organ development and remodeling via vascular changes throughout gestation. Placental villous image from Boyd Collection Centre for Trophoblast Research at the University of Cambridge. <https://www.trophoblast.cam.ac.uk/Resources/ndp-index>[^1^](#fn0001){ref-type="fn"}.](fphys-09-01045-g0002){#F2} Common molecular pathways may direct both heart and placental development {#s2} ========================================================================= Mechanisms of heart and placental development share common regulatory pathways, for example, cardiomyocyte specification and extra villous trophoblast invasion are both regulated by Notch and Wnt (De Falco et al, [@B16]; de la Pompa and Epstein, [@B17]). The endocardial cushion develops from neural crest cells to form heart valves and septa and requires similar genes as the placenta for proper formation and remodeling, including VegF and Connexin 43 (Maschhoff and Baldwin, [@B52]; Dor et al., [@B20]; Dunk et al., [@B21]). Studies in both human and mouse demonstrate the effects of alterations in these genes and their associations with failure to develop appropriately. Connexin 43 mediates cell-cell interactions in cardiomyocytes, and aids in trophoblast fusion and intercellular placental communication (Maschhoff and Baldwin, [@B52]; Dunk et al., [@B21]). Babies with fetal growth restriction have lower levels of VCAM1 than those with normal growth trajectories (Rajashekhar et al., [@B59]). Targeted disruption of VCAM1 in mice leads to impaired placentation and fetal death, and severe abnormalities in the developing heart (Gurtner et al., [@B30]; Kwee et al., [@B42]), and deletion of the upstream gene FOXO1 attenuates VCAM1 expression and leads to similar outcomes (Ferdous et al, [@B23]). The loss of PPAR gamma in mice results in abnormal placental and cardiac development (Barak et al., [@B8]) with embryonic lethality mid-gestation. Using tetraploid embryos, PPAR gamma restoration to the inner cell mass did not overcome the placental or cardiac defects, however, importantly, when PPAR gamma was restored to the trophectoderm alone fetuses survive and cardiac malformations were absent. Common molecular pathways also direct vasculogenesis and angiogenesis in both the heart and placenta. Loss of Cited2 in mice causes significant heart and fetal growth defects, disruption of left-right patterning, and fetal death (Bamforth et al., [@B6], [@B7]; Lopes Floro et al., [@B49]). Placenta-specific mouse knockouts of Cited2 reveal disorganized labyrinthine placental vasculature by day E14.5 due to an impaired HIF-signaling response (Withington et al., [@B74]). Interestingly, targeted deletion of Cited2 in trophoblasts but not endothelial cells disrupted capillary patterning in the placenta (Moreau et al., [@B54]). Heart-specific knockout of Cited2 revealed similar myocardial and coronary vascular abnormalities (MacDonald et al., [@B51]), revealing that signaling by both trophoblasts and cardiomyocytes impacts local capillary growth and development. In contrast, a recent study by Rhee et al. ([@B60]) identifies the necessity of endothelial cell signaling for regulation of cardiac development. The authors demonstrated left ventricular non-compaction when the chromatin remodeler Ino80 was knocked out in coronary vessel progenitor cells or in all endothelium, with a more severe heart phenotype in the endothelial-specific knockout. Unfortunately, this study did not include assessment of the placenta to identify if the endothelial-specific knockout also impacted placental development. Ino80 is a ubiquitous cell proliferation promoter, and disruption of endothelial cell proliferation pathways may underlie loss of conceptus or congenital defects with impacts on both heart and placenta. Importantly, many murine studies published on genes necessary for heart development demonstrate a common phenotype, usually reported as embryonic lethal, that upon further analysis is due to malformation of a placental vascular tree, for example in the Hand1 and NKx2.5 null mice, driving the need to understand the roles of these genes in both placental and vascular development (Olson and Srivastava, [@B55]; Firulli et al., [@B24]). Recently, the Deciphering the Mechanisms of Developmental Disorders (DMDD) consortium demonstrated that 68% of the 103 mouse lines they investigated had placental phenotypes (Perez-Garcia et al., [@B57]). There was a strong correlation between heart and vascular abnormalities and placental defects; additionally, common genes affected heart and vascular morphology in the study. We have previously published impaired placental vascular tree development in one subtype of CHD in humans (Jones et al., [@B37]) and more recently demonstrated it in another (TGA). Furthermore, to investigate mechanisms of this disruption we performed RNA-sequencing on human placentas from fetuses with CHDs and compared them to gestational-age matched controls. Term placentas from TGA, HLHS, and control births were collected under institutional IRB approval. RNA was isolated from FFPE samples using RecoverAll™ Total Nucleic Acid Isolation Kit for FFPE. RNA-Sequencing using Ullumina HiSeq was performed by CCHMC and UC Core facilities. RNA-sequencing analysis was done using AltAnalyze version 2.0 (Kallisto for alignment) to identify differentially expressed genes and clustering performed using GoElite. Methods described in [Supplementary Materials](#SM2){ref-type="supplementary-material"}. Clustering analysis identified pathways involved in heart looping, left/right patterning and symmetry, muscle development, and ATP synthesis were significantly downregulated in the placentas of the Hypoplastic Left Heart Syndrome (HLHS) fetuses compared to controls (Figure [3](#F3){ref-type="fig"} and Supplemental Table [1](#SM1){ref-type="supplementary-material"}), indicating disruption to pathways associated with both heart and placental development. ![Heat map of RNA-sequencing profiles of term placentas from TGA, HLHS, and gestational-age matched controls from Cluster 1 of GoElite cluster analysis. Pathways significantly changed (*p* \< 0.05) include determination of left/right symmetry, left/right patterning, heart looping, heart development, MHC protein complex, and ATP synthesis. A complete list of genes and pathways is included in [Supplementary Material](#SM2){ref-type="supplementary-material"}.](fphys-09-01045-g0003){#F3} Placental/umbilical hemodynamics and heart development {#s3} ====================================================== Based on studies of blood flow and cardiac remodeling during development, it is possible that placental dysfunction may significantly contribute to the incidence of CHD. Whether the placenta contributes to the development of CHD or whether disruption of common developmental pathways contribute to placental dysfunction and CHDs is not known. Developmental abnormalities which impair normal blood flow through the embryonic heart, including improper placentation and villous vascular tree development with resulting impairment of flow, may contribute to the occurrence of CHD in humans. Alteration in placental hemodynamics could impact both inflow via the umbilical vein and outflow via the umbilical artery. Midgett et al. ([@B53]) disrupted blood flow to inflow and outflow tracts of chick embryos at HH18 (looped tubular beating heart), causing malformations of developing heart structures. Defects were shown to be flow dependent, with more restriction to the outflow tract causing more significant heart defects. However, the study of feto-placental circulation by Doppler ultrasound in humans with CHD has resulted in conflicting results. Evidence of lower cerebral resistance, i.e., brain sparing, flow patterns have been demonstrated in multiple studies but likely varies by type of cardiac defect (Hahn et al., [@B32]; Ruiz et al., [@B62]). However, the majority of umbilical flow patterns fall within the normal range. As the antenatal diagnosis of CHD most commonly occurs in the second trimester of pregnancy, these clinically measurable tools are being applied long after the development of the cardiac defect and may not reflect early hemodynamic disturbances that could contribute to the etiology of CHD. Impaired blood flow may occur much earlier in pregnancy with extensive cardiac remodeling occurring to compensate for the disrupted flow. Cardiac remodeling also occurs in response to hypoxia, which increases VegFR-3 (Flt4) expression and subsequently VegFC. This signaling pathway improves vasculogenesis, angiogenic sprouting, and fetal cardiac development (Helske et al., [@B34]). Gadd45G has been shown to be sensitive to hypoxia in the heart during ischemia, leading to apoptosis of cardiomyocytes, fibrosis, and left ventricular dysfunction (Lucas et al., [@B50]). Isoform Gadd45A in placenta is also induced by hypoxia and leads to poor migration of trophoblasts (Liu et al., [@B48]). Lower levels of both isoforms lead to better outcomes. Impaired placentation, fibrin deposition, and reduced placental vasculature impact the gas exchange capabilities of the placenta and therefore oxygen levels available to the fetus via the umbilical vein may be reduced which could also contribute to hypoxia-induced cardiac remodeling. Diminished umbilical venous oxygen levels on fetal MRI further support these hypotheses (Sun et al., [@B68]). Maternal and environmental effects on placental and heart development {#s4} ===================================================================== During implantation, maternal signals direct embryonic cell invasion into the decidua, and maternal immunity determines depth of trophoblast invasion (Su and Fazleabas, [@B67]). Disruptions in uterine signaling or an overactive maternal immune response may limit invasion, leading to placental insufficiency and concurrent cardiac anomalies (Thornburg et al., [@B70]). Once the maternal-placental and fetal-placental circulations are established, the impact of the maternal or external environment, via the maternal circulation, may impact both placental and heart development directly (factors able to cross the placenta, e.g., flame retardant chemicals; Gorini et al., [@B29]) or may indirectly impact cardiac growth and development through abnormal signaling from the dysfunctional placenta. While existing understanding of CHD causation has largely focused on genetic etiologies (Zaidi and Brueckner, [@B77]), epidemiologic and experimental studies also support environmental contributions. Linask ([@B46]) proposed that the maternal environment can also influence heart development. Multiple observational studies have linked multivitamins and folic acid supplementation to CHD (Botto et al., [@B10]). Proposed mechanisms are related to both DNA synthesis and methylation with numerous basic and translational studies addressing the question. Studies have associated maternal hyperlipidemia to an increased risk of CHD (Smedts et al., [@B66]; Wong et al., [@B75]), and maternal diabetes correlates strongly to certain CHDs in mouse studies (Hachisuga et al., [@B31]). Mouse studies indicate that folate deficiencies coupled with other environmental exposures (alcohol, lithium, Wnt3A deficiency) led to cardiac anomalies, while administering high folate levels in mice and humans before pregnancy prevented cardiac birth defects (Han et al., [@B33]; Serrano et al., [@B65]; Czeizel et al., [@B15]). Other maternal influences, such as hyperlipidemia and/or hyperglycemia, maternal obesity and maternal smoking have been associated with an increased risk of CHD (Alverson et al., [@B2]; Smedts et al., [@B66]). Fetal growth, CHD subtype {#s5} ========================= Current treatment for many complex CHDs is palliative surgery shortly after birth. Babies born small for gestational age (SGA) who also have a CHD exhibit higher mortality after the first surgical correction than those babies with normal birth weights (Best et al., [@B9]). We have identified significant abnormalities in placentas from fetuses with either Hypoplastic Left Heart Syndrome (HLHS) or Transposition of the Great Arteries (TGA). Placental transport capabilities appear diminished in HLHS placentas, while microvascular changes are seen in the placentas of fetuses with both TGA and HLHS (Jones et al., [@B37]; Jones, unpublished data) and appear to be independent of fetal weight, as TGA babies are frequently significantly larger at birth than HLHS babies (Puri et al., [@B58]; Alsaied et al., [@B1]). Previously, we (Jones et al., [@B37]) noted disruptions in the vascular trees in placentas of babies born with HLHS. Recent histopathological analyses of placentas from babies born with TGA show similar abnormalities, yet the babies generally weighed more at birth than the HLHS cohort (Jones, unpublished data). In addition, Doppler ultrasound abnormalities were absent despite the growth restriction and placental dysregulation (Gembruch et al., [@B25]; Parra-Saavedra et al., [@B56]). This suggests that the formation of the vascular tree in the placenta of CHD fetuses is abnormal despite subtype and while the potential for flow disruption and feedback may exist, it may be more likely that this disruption reflects abnormal vascular formation during early pregnancy and leads to the question if this is seen in other vascular beds of the CHD fetus (Sun et al., [@B68]). Future directions {#s6} ================= To investigate the involvement of the placenta in congenital heart disease further, the combination of clinical data, human samples, murine models, and *in vitro* multi-cell models will be necessary. Furthermore, moving beyond examining the placenta only at the time of delivery, and utilizing newer technologies for studying the placenta during pregnancy in humans will be vital. Collection of human placental samples as well as the use of samples of maternal blood throughout pregnancy from the multiple subtypes of congenital heart disease will enable us to establish if the common placental perturbations we have already identified are indeed apparent across the spectrum of CHDs, and if those changes can be identified by assessing and characterizing extracellular vesicles within the maternal circulation during pregnancy. The use of "heart-specific" animal models will enable us to study the progression of placental disruption in association with cardiac malformations at time points in gestation that we cannot access in humans, such as during the early first trimester. Furthermore, using capabilities designed in our lab we will investigate if correcting the identified placental defects during early pregnancy can impact fetal, cardiac and vascular bed development and growth. We hypothesize that very early signaling events impact fetal vasculature, affecting both placenta and heart, and that correcting the signaling pathways via the placenta may offer avenues for potential therapies. Early signaling mechanisms between the fetus and the placenta remain largely under-investigated but may represent a mechanism that also links heart and placenta development and function. Investigations using co-cultured human cells *in vitro* will again enable us to identify if disturbances in cardiac cells or trophoblast cells can impact each other via the fetal vasculature and endothelium. At this current time it is impossible to say if, in humans, placental changes may contribute to the cardiac anomalies in congenital heart disease or if the placental changes recently identified are due to a shared disrupted etiology which impact fetal development and growth concurrently. Clearly studies from murine models and chick embryo studies would suggest that placental structural and vascular changes contribute to congenital heart defects as described above. We aim to determine if this is true in humans and if this may provide a path for the potential treatment of CHD *in utero*. Ethics statement {#s7} ================ This protocol was approved by the Institutional Review Boards of Cincinnati Children\'s Hospital Medical Center and Good Samaritan Hospital (Cincinnati, Ohio) under study number 2010--2610. Patient data were identified prior to analysis. Animal studies were approved by Cincinnati Children\'s Hospital Medical Center under IACUC protocol 2015-0078. Author contributions {#s8} ==================== JAC, JC, and HJ contributed to the writing of the manuscript, data generation. Conflict of interest statement ------------------------------ The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. The reviewer AM and handling editor declared their shared affiliation at time of review. ^1^Centre for Trophoblast Research. *Boyd Collection*. Available online at: <https://www.trophoblast.cam.ac.uk/Resources/ndp-index> (Accessed May 2, 2018). **Funding.** Funding is provided by Cincinnati Children\'s Hospital Medical Center Fetal Research Gift Fund. Supplementary material {#s9} ====================== The Supplementary Material for this article can be found online at: <https://www.frontiersin.org/articles/10.3389/fphys.2018.01045/full#supplementary-material> ###### Click here for additional data file. ###### Click here for additional data file. [^1]: Edited by: Sandra Rugonyi, Oregon Health & Science University, United States [^2]: Reviewed by: Alina Maloyan, Oregon Health & Science University, United States; Bjarke Jensen, University of Amsterdam, Netherlands; Consolato Sergi, University of Alberta Hospital, Canada [^3]: This article was submitted to Integrative Physiology, a section of the journal Frontiers in Physiology
Utility of Animal Models of Ischemic Stroke =========================================== Stroke is the third leading cause of death and a major cause of disability in the United States \[[@B1],[@B2]\]. Each year, there are approximately 731,000 new strokes and half of the survivors suffer from permanent handicap \[[@B3]\]. Stroke costs the United States approximately \$50 billion annually in direct and indirect costs \[[@B4]\]. Given these facts, stroke is a major public health issue requiring urgent development of effective therapies: experimental models of focal brain ischemia help in achieving this goal. 80% of human strokes are ischemic in origin \[[@B2]\]. Thus, experimental models of focal cerebral ischemia have been developed in an attempt to closely mimic the changes that occur during and after human ischemic stroke. These models are used to discover the mechanisms involved in the evolution of ischemic injury which, in turn, can lead to the development of novel therapeutic strategies for stroke. These same animal models can then be used to test the safety and efficacy of these treatments *in vivo*. Most human ischemic strokes are caused by occlusion of the middle cerebral artery (MCA) \[[@B5]\] and so animal models were developed to induce ischemia in this arterial territory. These models aim to satisfy the following criteria: (1) to mimic the pathophysiological changes found in human stroke, (2) to create reproducible lesions, (3) to employ procedures that are relatively simple and noninvasive, (4) to be of low financial cost, and (5) to enable monitoring of physiologic parameters and analysis of brain tissue for outcome measures \[[@B6]\]. Many higher animal species fulfill the aforementioned stroke modeling criteria; however, rats are the most commonly used animals for several reasons, including: (1) their resemblance to humans in their cerebral anatomy and physiology, (2) their small size which enables easy analysis of physiology and brain tissue, (3) their low cost, (4) the remarkable genetic homogeneity within strains, and (5) greater public and institutional ethical acceptability of use relative to larger animals. Thus, the remainder of this chapter will focus primarily on rat models of ischemic stroke \[[@B7]-[@B9]\]. Permanent versus Transient Ischemia =================================== Focal brain ischemia models can be categorized into two groups: permanent and transient ischemia. Permanent ischemia results in a region of severe ischemic damage (core) surrounded by a zone of less damaged tissue \[[@B10]\]. Reestablishment of perfusion after 3 hours does not reduce infarct size in all animal models \[[@B11]\]. Transient focal ischemia produces varying degrees of ischemic damage depending on the duration of ischemia. In rats, as little as 8 minutes of ischemia causes selective neural necrosis and ischemia for more than 30 minutes is always associated with infarction \[[@B12]\]. Importantly, after transient ischemia, brain damage results from both the ischemia and the effects of reperfusion (reperfusion injury). Compared to permanent occlusion, which mimic only a minority of human strokes where there is no recanalization, transient models better correlate with conditions such as therapy-induced thrombolysis, spontaneous thrombolysis, and transient ischemic attack. However, both permanent and transient ischemia models are needed prior to clinical drug development studies because of the heterogeneity of human stroke \[[@B13],[@B14]\]. Long-term studies are becoming increasingly important in translational stroke research; thus, the animal survival rate should be considered when designing an experimental protocol. Generally, regardless of the employed technique, models of transient ischemia offer higher survival rates relative to permanent occlusion and thus may be more suited for long-term studies. Additionally, survival is enhanced by proper surgical technique, maintaining physiological parameters within normal ranges during experimentation, and attention to animal nutrition, among other things. For studies of neuroprotection and/or thrombolysis, the effects of putative therapies on survivability must also be taken into consideration. Rat Models of Focal Cerebral Ischemia ===================================== Many animal models of focal cerebral ischemia exist. In this chapter, special focus is paid to the intraluminal MCA occlusion and embolus models because of their relatively widespread use in the development of treatments for stroke. Importantly, these methods can also be performed on mice, allowing for transgenic studies of the pathophysiology of stroke. Intraluminal MCA Occlusion Model -------------------------------- This model was originally described by Koizumi *et al*and has since been modified by others \[[@B11]\]. It is the most commonly used of rat models of stroke due to its relative simplicity and noninvasiveness. The MCA is occluded by inserting a monofilament suture into the internal carotid artery (ICA) to block blood flow to the MCA either permanently or transiently by keeping the filament in place or withdrawing it, respectively. Several manuscripts describe in detail the technical and procedural features of this model \[[@B11]-[@B16]\]. This model typically induces infarcts in the lateral caudatoputamen and frontoparietal cortex \[[@B17]\]. The infarct is reproducible and there is a significant ischemic penumbra early after MCA occlusion, making this model suitable for testing neuroprotective agents \[[@B18]\]. However, several technical factors may influence infarct size, such as: 1) physical differences in the employed monofilament suture, (2) insertion distance of the suture, and (3) accidental premature reperfusion \[[@B19]-[@B21]\]. It is therefore essential that standardized surgical and technical procedures be used by adequately trained personnel in order to generate reproducible lesions. There are also some complications with the intraluminal MCA occlusion model such as subarachnoid hemorrhage secondary to suture-induced arterial rupture, spontaneous hyperthermia when the duration of ischemia is longer than 2 h, and mechanical damage of endothelium which can complicate reperfusion \[[@B13],[@B22],[@B23]\]. The complication rates may be reduced by using silicone coated sutures \[[@B13]\]. The intraluminal MCAO model is suitable for neuroprotection drug experiments because it produces a substantial amount of penumbra (salvageable tissue) in the first 60-90 minutes after onset \[[@B16]\]. Also, the location, volume, and temporal evolution of infarction are similar to those produced by proximal electrocoagulation of the MCA \[[@B16]\]. The suture is easily withdrawn, enabling investigators to study the aspects of reperfusion The suture MCA occlusion model has recently been modified to induce ischemia in a magnetic resonance imaging (MRI) unit by remotely advancing the suture occluder \[[@B16]\]. This in-bore occlusion method has achieved a high reproducibility rate and enables investigators to monitor *in vivo*ischemic changes at pre-occlusion, acute, subacute and chronic post-occlusion time points \[[@B16]\]. Combined with multiparametric MRI techniques, the MCA occlusion model enables anatomic, diffusion, perfusion, and functional data to be obtained longitudinally and noninvasively in the same animal, making it a powerful tool for studying the pathophysiology of brain ischemia \[[@B23],[@B24]\]. Thromboembolic Model -------------------- Though thromboembolic ischemia can be induced by a photochemical approach, the most commonly used thromboembolic model is blood clot injection, first described in the dog by Hill et al. and later applied to the rat \[[@B25]-[@B27]\]. This model is of great interest to researchers because of its close resemblance to human ischemic stroke and its utility in evaluating thrombolytic therapies \[[@B28]\]. Thrombolytic therapy with recombinant tissue plasminogen activator (rt-PA) administered intravenously within 3 h of onset of ischemic stroke in select patients is the only FDA-approved treatment for human stroke and has been shown to improve neurological outcome \[[@B29]\]. Recently, there has been heightened interest in studying the efficacy of combining thrombolytic and neuroprotective agents in the treatment of stroke, giving thromboembolic animal models an increasingly important role in this respect \[[@B30]\]. Several disadvantages were common to the early thromboembolic models, such as diffuse and inhomogenous infarction in the MCA territory from microembolization to peripheral branches \[[@B27]\]. Additionally, spontaneous recanalization frequently occurred, making it difficult to study thrombolytic therapies \[[@B16]\]. Infarct sizes were variable, contralateral strokes were common, and ischemia caused by multiple small clots did not mimic typical clinical ischemic stroke \[[@B16]\]. Later, it was determined that size (length and diameter) and the biological characteristics of the blood clot (fibrin-rich) are crucial to the relevance and reproducibility of this model \[[@B16]\]. Busch *et al*developed a rat clot model that surmounted the above issues in which a single fibrin-rich autologous clot was injected to produce reliable occlusion of the proximal MCA, with consistent reduction of cerebral blood flow (CBF) and histological damage in the MCA territory seen \[[@B31]\]. No spontaneous thrombolysis was observed and, in separate experiments, thrombolytic therapy with rt-PA or prourokinase recanalized the occluded MCA \[[@B31],[@B32]\]. Recently, Henninger *et al*used the embolic model in conjunction with multimodal MRI to investigate the pathophysiological mechanisms underlying the relatively rare clinical phenomenon of \"spectacular shrinking deficit\" in stroke patients \[[@B33]\]. In conclusion, the single fibrin-rich clot model induces reproducible infarcts in the MCA territory similar to those produced by the intraluminal MCA occlusion model. The clot model has the added advantages of bearing closer similarity to the mechanism underlying human ischemic stroke and better utility for studying thrombolytic therapy. Combined with modern imaging techniques, thromboembolic models have the potential to take the experimental study of stroke to new frontiers. Non-clot Embolus Models ----------------------- Numerous compounds have been used to produce artificial emboli which are typically injected into the ICA, most commonly in rats \[[@B34]\]. Microsphere embolization is the most widely used model, with the severity of ischemic damage related to the number of emboli used \[[@B35]\]. The lesions require longer time to develop (24 hours on average) than in the intraluminal models, allowing for a larger therapeutic window for drug testing in microsphere models. However, the permanency of the ischemia does not simulate most clinical situations which limits the applicability of these models. Also, lesions are multifocal and have low reproducibility, though recent macrosphere models have resulted in more reproducible infarcts by increasing the diameter of the spheres and using less of them \[[@B36]\]. Direct Surgical MCAO -------------------- Numerous techniques have been developed to surgically approach and occlude the MCA, with the rat being the species most widely used \[[@B13]\]. The orbital route is the least traumatic and, compared to procedures requiring craniotomy, results in less blood loss and artifacts \[[@B37]\]. Electrocautarization of the MCA results in permanent occlusion, whereas clipping or ligature snares enable reperfusion \[[@B38]\]. Occlusion of the MCA following a transient hypotension produces a larger infarct area \[[@B39]\]. Tandem occlusion of the distal MCA and ipsilateral CCA results in more reproducible infarcts \[[@B40]\]. Recently, a three-vessel occlusion model has been shown to produce reproducible and selective neocortical infarction \[[@B41]\]. Common to all of these variants, the procedure is always invasive and requires extreme surgical skill which limits their utility. Photochemically Induced Thrombosis ---------------------------------- This model induces a cortical infarct by systemic injection of a photoactive dye in combination with irradiation by a light beam transmitted through the intact skull \[[@B42]\]. Oxidative damage to the endothelium caused by the altered dye leads to platelet aggregation in the irradiated area \[[@B43]\]. This model is used primarily in spontaneously hypertensive rats \[[@B44]\]. A disadvantage of this model is that vasogenic edema and blood-brain barrier breakdown occur within minutes which does not allow for the formation of penumbra\--therefore, this model has been considered by many to be unsuitable for preclinical drug studies \[[@B44]\]. However, a new model overcomes this limitation and induces ischemia over a greatly extended time period, consistently producing a penumbra-like region \[[@B45]\]. This, combined with the ability to noninvasively and reproducibly induce infarct in any cortical location, are obvious advantages of the photochemical infarct model. A major disadvantage is the atypical features of the lesion (prominent vascular injury and early vasogenic edema) which are unlike human stroke \[[@B13]\]. Endothelin-induced MCAO ----------------------- Endothelin-1 (ET-1) is a natural peptide that causes vasoconstriction and several models use this as an agent to induce MCA stroke \[[@B13]\]. Invasive approaches have been largely replaced by stereotactic intracerebral injection of ET-1 adjacent to the MCA, which avoid complications of surgery \[[@B46]\]. When ET-1 is applied to the MCA there is a significant decrease of cerebral blood flow (CBF) in its territory, resulting in an ischemic lesion pattern similar to that of direct surgical MCAO \[[@B47]\]. This model may be useful in restorative drug studies. Notably, after a period (\~20 minutes) of severe CBF reduction, there is a slow and progressive return of blood flow to normal with the rate being dose-dependent \[[@B47]\]. This can be disadvantageous source of variability unless the dose is carefully standardized in the experiment. Outcome Measures ================ There are several ways of measuring the severity of ischemic insult in animals: assessment of neurological status, pathological assessment, and in-vivo evaluation with magnetic resonance imaging (MRI). Most prior studies of MCAO focus on the acute phase of ischemia but since neuronal damage can occur days to weeks after insult, it is reasonable that new studies include evaluation of outcome measures both in the acute phase (1-3 days) and chronically (up to 4 weeks) \[[@B48]\]. Assessment of Neurological Status --------------------------------- Many neurological deficits are difficult to assess in animals. Motor deficits are perhaps the easiest to quantify and simple measures of motor function are available in rodent models \[[@B49]\]. Refined tests that assess sensorimotor function include limb placing, beam walking, sticky label test, grid walking, and rotarod \[[@B50]\]. A number of cognitive tests examining learning and short term memory are available for rats, including the Morris water maze \[[@B51]\]. Combining neurological assessment with histological measurements is becoming more critical with the heightened interest in neuroprotective drugs, the effectiveness of which may be reflected more by subtle structural and chemical changes rather than changes in gross infarct volume \[[@B52]\]. This statement is supported by the fact that animal data suggest a poor correlation between reductions in infarct size with neurological or behavioral deficits \[[@B13]\]. Also of importance is the need to extend the period of testing of neurological status for at least 1 month post-insult in animal studies, per the recommendations of the STAIR Committee \[[@B14]\]. However, this may be difficult to implement as survival times are 48 hours or less in many animal stroke models \[[@B53]\]. Pathological Assessment ----------------------- In models of focal ischemia, the chief outcome has been the infarct volume, traditionally measured by quantitative histology. Among a number of histopathological methods, 2,3,5-triphenyltetrazolium chloride (TTC) and hematoxylin-eosin (H&E) staining are the two most commonly employed. TTC can be used to stain tissue much more rapidly, easily, and cheaply than H&E \[[@B54]\]. TTC is a colorless chemical that is reduced by mitochondrial enzymes into a compound that stains intact brain regions dark red whereas infarcted regions remain white. Studies show TTC staining to be reliable between 6 and 72 hours post-ischemia \[[@B13]\]. Prior to 6 hours, there may not be sufficient number of damaged mitochondria to create contrast between normal and infarcted tissue, and after 72 hours pathophysiologic inflammatory response often obscures the line of demarcation in the periphery of the damaged area \[[@B13]\]. Notwithstanding staining techniques, infarcts have complex shapes with sometimes indistinct margins, making it difficult to measure their volumes. Many methods have been developed to deal with these complexities, each with their own advantages and disadvantages. Perhaps one of the most important considerations to account for is the effect of vasogenic edema on infarct volume. Edema in the rat MCAO stroke model typically accounts for 20-30% of the total apparent infarct volume \[[@B55]\]. Separate measurement of \"corrected\" infarct volume (which accounts for edema) and \"uncorrected\" volume (which does not account for edema) is important because of the possibility that some interventions may reduce edema but not salvage brain tissue and vice-versa \[[@B13]\]. Competing interests =================== The authors declare that they have no competing interests. Authors\' contributions ======================= Both KMS and MF performed background research and wrote the manuscript. All authors read and approved the final manuscript.
Tips This recipe uses two great products that can help you expedite your cooking: jarred garlic and ginger! Another great tip for busy nights: Bake, broil, grill or poach chicken breasts at the beginning of the week, and you'll have them on hand for meals throughout the week. Directions Combine the soy sauce, hoisin, water, and cornstarch in a small bowl. Stir to combine; set aside. In a flat bottomed pan or wok set to high heat, add the oil, garlic, ginger, and Thai hot sauce. Stir fry for 1 minute. Add the vegetables and chicken. Stir fry, moving all ingredients in the wok quickly for 3-4 minutes. Add prepared sauce and continue to cook until the liquid thickens. Serve with brown rice or rice noodles.Makes four two cup servings. Rate This Recipe Member Ratings For This Recipe When stir frying, I always cook the meat first (especially with chicken) to make sure it gets cooked through. Remove from wok and stir fry veggies, adding meat back at the end. For goodness sake, season to your liking - if you find it bland, add some more Thai hot sauce. - 7/17/11
Q: RxJS: How to emit original values, then reduce upon completion? I would like to emit all original values from an RxJS stream, and then emit a summary upon completion. Reduce stops the original values from emitting. Scan emits each total rather than the original values. Here is my hacky solution: let total = { total: 0 }; Rx.Observable.range(1, 3) .do(val => { total.total += val; }) .concat(Rx.Observable.of(total)) .subscribe( value => { console.log('Next:', value) } ); // Next: 1 // Next: 2 // Next: 3 // Next: { total: 6 } What is a simple way to do this with pure RxJS streams? A: Use multicast Rx.Observable.range(1, 3) .multicast(new Rx.Subject(), (shared)=> { return Rx.Observable.merge(shared, shared.reduce((acc, x)=>acc+x,0)) }) .subscribe(x=>console.log(x))
The study, led by Charles Holahan, a psychologist at the University of Texas, Austin, examined over 1,800 individuals aged 55 to 65 over a 20 year period. Accounting for diverse variable such as socioeconomic status and exercise habits, the study found that mortality rates were highest for those who never drank, lower for very heavy drinkers—but the lowest for “moderate” drinkers, defined as people who consumed one to three alcoholic beverages a day. So having a drink once in awhile may really be better for you than saying no altogether. We’ll drink to that. Just 41 percent of the moderate drinkers died prematurely, compared to nearly 70 percent of abstainers. Even the heavy drinkers fared better, with just 60 percent of the group dying earlier than national averages—despite increased risk of liver disease, several types of cancer and alcohol-induced accidents. But don’t start raiding the liquor cabinet just yet. According to Business Insider, one possible explanation for the study’s results may not have to do with the beverage itself. Alcohol can be a “great social lubricant” and “strong social networks are essential for maintaining mental and physical health.” In a word, drinkers tend to have more friends and be more social than non-drinkers and higher levels of depression have actually been noted in those who abstain altogether. That means non-drinkers may be able to extend their livelihood by staying active and going out with friends—even if they just knock back a water or two. Red wine is still touted for its heart health and overall blood circulation benefits, but the study did not look into the particulars of different types of alcohol consumed by individuals.
[Methotrexate and folates in rheumatoid arthritis]. The efficacy of weekly low-dose methotrexate treatment of rheumatoid arthritis is well documented. Efficacy and adverse events are both dose dependent, and side effects rather than lack of response are the main reason for discontinuing therapy. Several adverse effects appear to be related to folate deficiencies, and are largely due to the antifolate properties of methotrexate. In order to diminish side effects without compromising drug efficacy, clinical trials have been performed using folic acid or folinic acid concomitantly with methotrexate. Important to this achievement are both the timing of folate supplementation and the weekly folate-to-methotrexate ratio. Considering these and other factors, an individually adjusted supply of folic acid is proposed. For several patients a properly balanced diet is sufficient; they do not need additional folate supplements when using methotrexate.
Evaluation of peripheral arterial occlusive disease and postsurgical viability using reflectance spectroscopy of skin. Stress-induced changes in skin microcirculation allow staging of peripheral arterial vascular pathology using diffuse reflectance spectroscopy (DRS) of the skin. The changes in relative concentration of oxyhemoglobin and deoxyhemoglobin in the cutaneous microvasculature were assessed at rest, during limb elevation, dependency, and cuff-mediated reactive hyperemia for the forearm of 25 normal subjects and 105 feet of patients with peripheral arterial occlusive disease (PAOD) (normal=28, claudication=34, limb threatening ischemia=44). Thirty-four patients who had revascularization procedures were again evaluated within the first week postoperatively. Two measurements correlated with clinical staging: (1) the relative absorbance of oxyhemoglobin after 225 s of limb dependency and (2) the time to reach 50% of peak reactive hyperemia response (Spearman's rank: rs=0.625, P<0.001). Using these criteria alone, ischemic limbs were identified to a sensitivity of 69% and specificity of 95%. Significant post-revascularization improvement was identified in 14 of 34 patients' legs which had previously been classified as limb-threatening ischemia (n=14, W=105, P<0.001). These simple bedside evaluations of the superficial skin microvasculature allow staging of large vessel vascular insufficiency and may suggest and differentiate focal areas of tissue at risk for ulceration or necrosis.
Those are positive signs that indicate Ausberry is close to a comeback. Ausberry would be a welcome sight at practice. He was ahead of a position battle to be the starting end before he got hurt in training camp. “He’s doing better, he’s getting closer,” head coach Dennis Allen said. “He was able to get out on the field and do a little bit of field work, so that’s a step in the right direction. Hopefully he’ll get better and be able to be out there pretty soon.” Other Raiders injury notes: -- Allen said did not eliminate the possibility that cornerback DJ Hayden could return to practice this week. “There’s a chance,” Allen said. “Whether he is or not, I don’t know the answer to that. I talked to him today and he said he had a good day out on the field today. So, we’ll see.” -- Cornerback Tarell Brown was cleared to practice after suffering a concussion in Friday’s exhibition. Middle linebacker Nick Roach was also concussed against Green Bay, but he was not at practice. -- Defensive tackle Justin Ellis was working for the first time in two weeks. He suffered a concussion in the first preseason game against Minnesota. He was joined by offensive tackle Matt McCants, who missed a week with a concussion.
The road to future Gold Cups will lead through the brand-new Concacaf Nations League. Concacaf on Wednesday released the details for the qualifying process for the next Gold Cup, set for 2021, a path that begins this week as CNL action kicks off. All 41 of the confederation’s member nations will have the opportunity to qualify for the continent’s top international tournament, though smaller countries face a significantly longer journey to the Gold Cup than more established ones. The group stage of the three-tiered Nations League will take place in this year’s September, October and November FIFA international windows. After round-robin play, the four League A group winners will advance to the CNL finals – originally scheduled for next March but now moved to June – which will crown the first-ever competition champion. The top two teams from each of the four League A groups will qualify directly to the 2021 Gold Cup. The group winners from League B and League C will be promoted to League A and B, respectively, while the teams at the bottom of League A and League B will be relegated to League B and C, respectively, for the next edition of the CNL. Meanwhile, the winner of each of the four League B groups will qualify directly to the 2021 Gold Cup. That leaves four remaining slots in the Gold Cup field, which will be filled by a two-round qualifying playoff in March and June of 2020 featuring the third-place finishers in League A, the second-place finishers in League B and the first-place finishers in League C. In the first round, the second-place finishers of League B will face the first-place finishers of League C in a home-and-away series in March. The four winners will advance to the second round, where they will face the third-place finishers of League A in June. The winners of those four matchups winners of round two will qualify to the 2021 Gold Cup. “The Concacaf Nations League is about uniting the Confederation through meaningful competition, while providing an exciting pathway to the Gold Cup,” said Concacaf president Victor Montagliani in a statement. “Through this tournament, all 41 Concacaf member associations are able to follow the dream of competing on a more consistent basis, opening the door for continued development across our entire region.”
MODERN biology has a lot of “omes”. The genome—all the genes that go to make up an organism—is a familiar idea. The proteome—all the different proteins—is becoming so. But there are also the transcriptome (RNA), the glycome (sugars), the lipidome (fats) and the metabolome (all the miscellaneous odds and ends not covered by the others). And then there is the bibliome—all the mentions in research papers of known biomolecules. There are now so many of these papers, and the databases linking them are so good, that it is possible to use scientific methods to investigate the bibliome in its own right, just as any of the other, wetter “omes” may be investigated. Which is exactly what a group of researchers from Peking University, led by Wei Liping, have done to get at the biochemical heart of drug addiction. Dr Wei and her colleagues wanted to answer three questions. First, what are the genes and biochemical pathways in addiction? Second, does addiction to different substances involve the same core biochemical mechanisms? Third, does anything in those mechanisms explain why addiction is so hard to shake off? Many people, of course, have asked these questions before, and partial answers have emerged. What Dr Wei hoped to do was to take these fragmentary answers and patch them together to make something approaching the whole truth. And, in a paper just published in the Public Library of Science, she seems to have managed just that. It looks good on paper Dr Wei's group looked at more than 1,000 studies of the biochemistry and genetics of drug addiction. They were interested in the four sorts of drug reckoned most addictive: alcohol, cocaine, nicotine and opiates (heroin, methadone and so on). About 1,500 genes were implicated by one or more of the studies, but in only 396 cases was that implication backed by at least two independent lines of evidence. It was on these confirmed cases that Dr Wei concentrated her fire. Biochemistry is about pathways and networks of pathways. A pathway is a series of enzymes (each of which is encoded in a gene) that perform a task in sequence, like workers on an assembly line. Dr Wei therefore ran her 396 genes through a database of all known pathways to see which involved several enzymes encoded by those genes. She found 18 that were involved in addiction to at least one type of drug. Five, however, were common to all four types, and these five pathways therefore look as though they are at the core of the process of addiction. Three of the five were already under suspicion. Dr Wei's result provided strong statistical evidence to back up what had just been hunches. Two other pathways, however, had not previously been considered as being involved in addiction. The existence of these five central pathways helps explain a lot about addiction. First, it gives weight to the belief that some people are more susceptible to all sorts of addiction than others are. That contrasts with the thought that addictions are substance-by-substance phenomena, though the two ideas are not mutually exclusive since changes in the 13 substance-specific pathways clearly also result in addiction. Second, the particular pathways involved help to explain why addiction is so hard to reverse. Several of them take part in strengthening the connections between nerve cells, which is the underlying basis of learning. Unlearning something by breaking these connections is hard. Third, Dr Wei was able to link the five central pathways together into a network, and show that this network has four positive-feedback loops in it. Work on other species in other contexts suggests that the mixture of loops she found was one that often results in rapid and irreversible biological processes—which is exactly what is seen in addiction. None of this, of course, directly helps the addict, though it reinforces the message that it is better not to start taking these drugs in the first place. But working out how the addiction machine operates may point those looking for therapies in the right direction. And this study also shows that the old cry “more research is necessary” is not always true. Sometimes all you need to do is look at what you already have in a different way.
Q: In C, How to use scanf to scan in 1,000,000 ignoring the commas In C, what is the best way to ignore the commas when using scanf on a number like 1,000,000? A: I would say the best way is to not use scanf for this. At least not using any number formats. Instead read it as a string, then remove the commas, and finally convert to a number. A: There are a number of ways to remove the commas (or any other character you want to skip). One of the easiest (and most flexible) is to simply walk two pointers down the input string shifting all the digits together ignoring the commas. (you must be sure to nul-terminate after the final digit). An example would be: #include <stdio.h> #include <stdlib.h> #include <errno.h> #include <limits.h> #define MAXC 25 long xstrtol (char *p, char **ep, int base); int main (void) { char string[MAXC] = ""; char *rp, *wp; /* a read pointer and write pointer */ int c; long n = 0; rp = wp = string; printf ("enter number with ',': "); if (!fgets (string, MAXC, stdin)) { fprintf (stderr, "error: insufficient input.\n"); return 1; } /* work down each char in string, shifting number together */ while (*rp && (('0' <= *rp && *rp <= '9') || *rp == ',')) { if (*rp == ',') { rp++; continue; } /* skip commas */ *wp++ = *rp; /* shift digits together */ rp++; } *wp = 0; /* nul-terminate */ if (*rp != '\n') /* flush input buffer */ while ((c = getchar()) != '\n' && c != EOF) {} printf ("\n string : %s\n", string); n = xstrtol (string, &rp, 10); /* convert string to long */ printf(" n : %ld\n\n", n); return 0; } /** a simple strtol implementation with error checking. * any failed conversion will cause program exit. Adjust * response to failed conversion as required. */ long xstrtol (char *p, char **ep, int base) { errno = 0; long tmp = strtol (p, ep, base); /* Check for various possible errors */ if ((errno == ERANGE && (tmp == LONG_MIN || tmp == LONG_MAX)) || (errno != 0 && tmp == 0)) { perror ("strtol"); exit (EXIT_FAILURE); } if (*ep == p) { fprintf (stderr, "No digits were found\n"); exit (EXIT_FAILURE); } return tmp; } (note: xstrtol simply provides error checking on the conversion of string to long) Use/Output $ ./bin/nwithcomma enter number with ',': 1,234,567 string : 1234567 n : 1234567 Look it over and let me know if you have any questions. You can check against INT_MIN and INT_MAX if you want to cast the result to int, but it is just as easy to leave the answer as a long. As a Function As pointed out, it would be far more useful as a function. You can move the code to a simple conversion function, and adjust the main code as follows: ... #define MAXC 25 long fmtstrtol (char *s); long xstrtol (char *p, char **ep, int base); int main (void) { char string[MAXC] = ""; printf ("enter number with ',': "); if (!fgets (string, MAXC, stdin)) { fprintf (stderr, "error: insufficient input.\n"); return 1; } printf(" number : %ld\n\n", fmtstrtol (string)); return 0; } /* convert comma formatted string to long */ long fmtstrtol (char *s) { if (!s || !*s) { fprintf (stderr, "fmtstrtol() error: invalid string.\n"); exit (EXIT_FAILURE); } char *rp, *wp; /* read pointer, write pointer */ int c; rp = wp = s; while (*rp && (('0' <= *rp && *rp <= '9') || *rp == ',')) { if (*rp == ',') { rp++; continue; } *wp++ = *rp; rp++; } *wp = 0; if (*rp != '\n') /* flush input buffer */ while ((c = getchar()) != '\n' && c != EOF) {} return xstrtol (s, &rp, 10); } ...
Anti-doping testing at the 2008 European football championship. Big sports events like the 2008 European Football Championship are a challenge for anti-doping activities, particularly when the sports event is hosted by two different countries and there are two laboratories accredited by the World Anti-Doping Agency. This challenges the logistics of sample collection as well as the chemical analyses, which must be carried out timeously. The following paper discusses the handling of whereabouts information for each athlete and the therapeutic use exemption system, experiences in sample collection and transportation of blood and urine samples, and the results of the chemical analysis in two different accredited laboratories. An overview of the analytical results of blood profiling and growth hormone testing in comparison with the distribution of the normal population is also presented.
Transcription directed by the HIV long terminal repeat in vitro. The long terminal repeat (LTR) of the AIDS virus (HIV) has been found to contain promoter sequences that are active in uninfected HeLa whole cell and nuclear extracts. Here we report that elements upstream of position -104 (start site +1) do not affect transcriptional activity in vitro whereas sequences between -104 and -57 are required for such activity. Using a reconstituted RNA polymerase II system, we demonstrate that a partially purified fraction containing Spl not only stimulates, as was previously reported, but is required for accurate initiation of transcription directed by the HIV LTR. In addition, based on a computerized analysis, we report the presence of a region in the HIV LTR (positions -151 to -80) that is similar to the 72 base pair enhancer element of SV40 and that includes a highly conserved segment also present in the cytomegalovirus enhancer. Moreover, the HIV and HTLV-I LTRs are shown to share a region of similarity that includes the 21 base pair motif found in the enhancers of the human and bovine T-lymphotropic viruses. The R region of the HIV LTR is found to have two extensive regions of dyad symmetry rather than one as was previously reported. The significance of these observations for HIV pathogenesis is discussed.
Q: itext pdf generator is an open source library for android? In my project want to read and write the pdf file. I saw some tutorial using droidtext and itext library. In some links they mentioned itext is not an opensource library. In Confused to used itext library or not because it is not an opensource. Any one clarify this doubt? Any other library is there? A: iText is still an open source library. See http://sourceforge.net/p/itext/code/HEAD/tree/ if you want to take a look at the code. For Android, there is iTextG: http://sourceforge.net/projects/itextg/ You can find the source code for iTextG here: http://sourceforge.net/p/itextg/code/HEAD/tree/ You can also find our projects on Github: https://github.com/itext If you find a place where somebody claims that iText is not open source, please let us know, so that we can ask those people to stop spreading non sense! The fact that I can point you at the source code of iText should be sufficient proof that those people are wrong. This being said: the fact that iText is open source doesn't mean that the software can be used without having to buy a license. You can use iText for free if you obey the rules of the license: https://www.youtube.com/watch?v=NCwhEWEPV-E It is very strange: the name "Free Software" was replaced by "Open Source Software" because developers wanted to make it clear that the "Free" in "Free Software" was not a synonym of "Gratis". Now that every one talks about "Open Source Software", many people thing that "Open Source Software" is a synonym of "Gratis Software". This is explained in detail on the official iText web site: http://itextpdf.com/salesfaq Note that droidtext is not an official iText product. It is a fork that is not endorsed by the creators of iText based on a version of iText that is not supported (it was declared End-of-Life years ago).
hat is the z'th term of -75901, -75902, -75903, -75904? -z - 75900 What is the t'th term of -1362, -5600, -12664, -22554, -35270, -50812, -69180? -1413*t**2 + t + 50 What is the b'th term of -5171, -10337, -15503, -20669? -5166*b - 5 What is the t'th term of -385, -567, -749? -182*t - 203 What is the u'th term of -113, 115, 495, 1027? 76*u**2 - 189 What is the a'th term of -645, -564, -483, -402, -321, -240? 81*a - 726 What is the v'th term of -960, -3840, -8642, -15366? -961*v**2 + 3*v - 2 What is the h'th term of -1999, -7955, -17897, -31837, -49787, -71759, -97765? -2*h**3 - 1981*h**2 + h - 17 What is the p'th term of -74078, -148152, -222226? -74074*p - 4 What is the r'th term of 2347, 4694, 7041, 9388, 11735, 14082? 2347*r What is the r'th term of 400, 1152, 2408, 4168, 6432, 9200, 12472? 252*r**2 - 4*r + 152 What is the o'th term of -4221, -4377, -4533, -4689, -4845, -5001? -156*o - 4065 What is the a'th term of -228, -845, -1872, -3309, -5156, -7413? -205*a**2 - 2*a - 21 What is the n'th term of -146, -400, -758, -1166, -1570, -1916, -2150? 9*n**3 - 106*n**2 + n - 50 What is the n'th term of 693, 3329, 10479, 24399, 47345, 81573? 376*n**3 + n**2 + n + 315 What is the u'th term of -29586, -29556, -29526, -29496? 30*u - 29616 What is the m'th term of -557, -751, -951, -1157, -1369, -1587? -3*m**2 - 185*m - 369 What is the b'th term of -3076, -6162, -9254, -12352? -3*b**2 - 3077*b + 4 What is the k'th term of -18056, -18061, -18066, -18071, -18076, -18081? -5*k - 18051 What is the w'th term of -40551, -162222, -365015, -648936, -1013991, -1460186, -1987527, -2596020? -w**3 - 40555*w**2 + w + 4 What is the d'th term of 72, 223, 444, 729, 1072? -d**3 + 41*d**2 + 35*d - 3 What is the l'th term of -37621, -37622, -37623, -37624, -37625? -l - 37620 What is the l'th term of 865, 3385, 7589, 13477, 21049, 30305, 41245? 842*l**2 - 6*l + 29 What is the g'th term of -1920, -3839, -5758, -7677? -1919*g - 1 What is the d'th term of -203, -162, -135, -128, -147, -198, -287? -d**3 - d**2 + 51*d - 252 What is the q'th term of 628, 715, 876, 1123, 1468, 1923? 2*q**3 + 25*q**2 - 2*q + 603 What is the f'th term of 309, 1566, 3769, 6918, 11013, 16054, 22041? 473*f**2 - 162*f - 2 What is the i'th term of -229, -379, -791, -1597, -2929, -4919, -7699, -11401? -22*i**3 + i**2 + i - 209 What is the j'th term of -42843, -42842, -42841, -42840? j - 42844 What is the g'th term of 75, 233, 487, 837, 1283, 1825, 2463? 48*g**2 + 14*g + 13 What is the h'th term of 1, -45, -151, -317, -543, -829, -1175? -30*h**2 + 44*h - 13 What is the t'th term of 31, 705, 1823, 3385, 5391, 7841? 222*t**2 + 8*t - 199 What is the v'th term of -127511, -127508, -127507, -127508, -127511, -127516? -v**2 + 6*v - 127516 What is the z'th term of -2146196, -2146195, -2146194, -2146193? z - 2146197 What is the i'th term of 68175, 68175, 68177, 68181, 68187, 68195, 68205? i**2 - 3*i + 68177 What is the s'th term of 18826, 37622, 56388, 75130, 93854, 112566, 131272, 149978? s**3 - 21*s**2 + 18852*s - 6 What is the q'th term of 46091, 46089, 46073, 46037, 45975, 45881? -q**3 - q**2 + 8*q + 46085 What is the n'th term of 81, 295, 657, 1167, 1825, 2631? 74*n**2 - 8*n + 15 What is the l'th term of -949, -939, -907, -841, -729, -559, -319? 2*l**3 - l**2 - l - 949 What is the g'th term of -5439, -5487, -5535, -5583? -48*g - 5391 What is the m'th term of 254, 341, 486, 689, 950, 1269, 1646? 29*m**2 + 225 What is the n'th term of 2083, 4168, 6249, 8326, 10399, 12468, 14533? -2*n**2 + 2091*n - 6 What is the i'th term of 14140, 28281, 42422, 56563, 70704, 84845? 14141*i - 1 What is the d'th term of 6, -332, -1262, -3078, -6074, -10544, -16782, -25082? -49*d**3 - 2*d**2 + 11*d + 46 What is the p'th term of -156389, -156390, -156391, -156392, -156393? -p - 156388 What is the l'th term of 792, 614, 332, -48, -520? l**3 - 58*l**2 - 11*l + 860 What is the j'th term of -1003, -1957, -2869, -3739, -4567? 21*j**2 - 1017*j - 7 What is the z'th term of -471, -1015, -1547, -2061, -2551, -3011, -3435, -3817? z**3 - 551*z + 79 What is the q'th term of 879, 973, 1127, 1341, 1615? 30*q**2 + 4*q + 845 What is the h'th term of -6347, -6364, -6385, -6404, -6415, -6412, -6389? h**3 - 8*h**2 - 6340 What is the s'th term of 698521, 1397037, 2095551, 2794063, 3492573, 4191081? -s**2 + 698519*s + 3 What is the d'th term of -147, -203, -305, -453, -647, -887? -23*d**2 + 13*d - 137 What is the d'th term of -29, -108, -243, -446, -729? -2*d**3 - 16*d**2 - 17*d + 6 What is the y'th term of 57, 95, 129, 159, 185, 207, 225? -2*y**2 + 44*y + 15 What is the n'th term of -16350, -16347, -16344, -16341? 3*n - 16353 What is the u'th term of -339232, -339231, -339230? u - 339233 What is the n'th term of 13465, 13464, 13463, 13462, 13461? -n + 13466 What is the y'th term of -6366, -6395, -6444, -6513, -6602, -6711, -6840? -10*y**2 + y - 6357 What is the f'th term of 457438, 914878, 1372318, 1829758, 2287198, 2744638? 457440*f - 2 What is the m'th term of -14247, -14241, -14235? 6*m - 14253 What is the y'th term of -61, -178, -293, -406, -517, -626, -733? y**2 - 120*y + 58 What is the a'th term of 2583, 2580, 2579, 2580, 2583? a**2 - 6*a + 2588 What is the j'th term of 231, 344, 533, 798, 1139? 38*j**2 - j + 194 What is the d'th term of 1028, 1676, 2324, 2972, 3620? 648*d + 380 What is the a'th term of -12693, -50780, -114265, -203148, -317429, -457108? -12699*a**2 + 10*a - 4 What is the a'th term of -1688, -6584, -14720, -26096, -40712, -58568? -1620*a**2 - 36*a - 32 What is the w'th term of 4945, 4921, 4897, 4873, 4849, 4825? -24*w + 4969 What is the j'th term of -237, -306, -381, -462? -3*j**2 - 60*j - 174 What is the v'th term of 268, 841, 1798, 3139, 4864, 6973? 192*v**2 - 3*v + 79 What is the m'th term of -760, -812, -878, -964, -1076, -1220, -1402? -m**3 - m**2 - 42*m - 716 What is the m'th term of 1939, 3784, 5629, 7474, 9319? 1845*m + 94 What is the c'th term of -150, -45, 60? 105*c - 255 What is the b'th term of 613079, 613066, 613045, 613016, 612979? -4*b**2 - b + 613084 What is the i'th term of -28, -19, -22, -43, -88, -163? -i**3 + 16*i - 43 What is the r'th term of -25076, -25102, -25136, -25184, -25252, -25346, -25472, -25636? -r**3 + 2*r**2 - 25*r - 25052 What is the o'th term of 1230, 1169, 1044, 837, 530? -3*o**3 - 14*o**2 + 2*o + 1245 What is the l'th term of -495, -669, -843, -1017? -174*l - 321 What is the j'th term of 1838, 1686, 1536, 1388, 1242, 1098, 956? j**2 - 155*j + 1992 What is the u'th term of 75, -2059, -7843, -19101, -37657, -65335, -103959, -155353? -304*u**3 - u**2 - 3*u + 383 What is the t'th term of -13998, -27990, -41982? -13992*t - 6 What is the i'th term of 14, 112, 362, 842, 1630, 2804, 4442? 13*i**3 - 2*i**2 + 13*i - 10 What is the g'th term of 6564, 6559, 6564, 6591, 6652, 6759, 6924? 2*g**3 - 7*g**2 + 2*g + 6567 What is the m'th term of -270, -306, -252, -60, 318, 930, 1824, 3048? 8*m**3 - 3*m**2 - 83*m - 192 What is the j'th term of 655, 882, 1109, 1336, 1563? 227*j + 428 What is the c'th term of 241, 370, 585, 886? 43*c**2 + 198 What is the u'th term of 34132, 68262, 102390, 136516, 170640? -u**2 + 34133*u What is the b'th term of -2149, -2139, -2129, -2119, -2109, -2099? 10*b - 2159 What is the r'th term of 2206, 2183, 2148, 2107, 2066, 2031? r**3 - 12*r**2 + 6*r + 2211 What is the b'th term of 18139, 36251, 54363, 72475? 18112*b + 27 What is the n'th term of -1397869, -1397868, -1397867, -1397866? n - 1397870 What is the c'th term of 4710, 37504, 126508, 299826, 585562, 1011820, 1606704, 2398318? 4684*c**3 + c**2 + 3*c + 22 What is the r'th term of 5310, 10604, 15894, 21186, 26486? r**3 - 8*r**2 + 5311*r + 6 What is the f'th term of 29930, 29924, 29914, 29900? -2*f**2 + 29932 What is the s'th term of 482, 478, 478, 488, 514? s**3 - 4*s**2 + s + 484 What is the j'th term of 16683, 16699, 16703, 16689, 16651, 16583? -j**3 + 23*j + 16661 What is the c'th term of 179, 671, 1479, 2603, 4043, 5799? 158*c**2 + 18*c + 3 What is the o'th term of 3018, 24150, 81494, 193152, 377226? 3017*o**3 + 4*o**2 + o - 4 What is the j'th term of -21, 370, 747, 1104, 1435, 1734? -j**3 - j**2 + 401*j - 420 What is the p'th term of -4962219, -4962193, -4962153, -4962093, -4962007, -4961889, -4961733, -4961533? p**3
Q: Passing a class variable with three arguments into a constructor as a parameter public Date(int month, int day, int year) { setMonth(month); setDay(day); setYear(year); } **How do I go about passing Date dob variable in the Person constructor as a a parameter. Do I ** public class Person { private String firstName = null; private String lastName = null; public Date dateOfBirth; public Person(String firstName, String lastName, Date dob) { setFirstName(firstName); setLastName(lastName); dob = dateOfBirth; } public void setDateOfBirth(int month, int day, int year) { dateOfBirth = new Date(month,day,year); } I should have included the setDateOfBirth method from my Person class. Now it makes sense A: So do I just do dob = new Date(setMonth(),setDay(),setYear()); No you don't have to. The Data object dob already contains all the information you want. Just create a Data object as an attribute of your Person class and you're done.
The platelet-activating factor signaling system and its regulators in syndromes of inflammation and thrombosis. To review the platelet-activating factor (PAF) signaling system, its regulation, and its dysregulation in acute inflammation and thrombosis and in syndromes that involve these cascades, including sepsis. A summary of published literature from MEDLINE search files and published reviews. DATA EXTRACTION, SYNTHESIS, AND SUMMARY: PAF, a phospholipid signaling molecule, transmits outside-in signals to intracellular transduction systems and effector mechanisms in a variety of cell types, including key cells of the innate immune and hemostatic systems: neutrophils, monocytes, and platelets. Thus, the PAF signaling system is a point of convergence at which injurious stimuli can trigger and amplify both acute inflammatory and thrombotic cascades. The biological activities of PAF are regulated by several precise mechanisms that, together, constrain and control its action in physiologic inflammation. Unregulated synthesis of PAF or defects in the mechanisms that limit its biological activities have the potential to cause pathologic inflammation and thrombosis. In addition, nonenzymatic generation of oxidized phospholipids that are recognized by the PAF receptor can trigger inflammatory and thrombotic events. There is evidence that the PAF signaling system is dysregulated in sepsis, shock, and traumatic injury and that interruption or termination of its effector responses leads to beneficial outcomes. Plasma PAF acetylhydrolase, an enzyme that hydrolyzes PAF and structurally related oxidized phospholipids, yielding products that are no longer recognized by the PAF receptor, may be a particularly important signal terminator. The PAF signaling system can trigger inflammatory and thrombotic cascades, amplify these cascades when acting with other mediators, and mediate molecular and cellular interactions (cross talk) between inflammation and thrombosis. Evidence from in vitro experiments, studies of experimental animals, and clinical observations in humans indicates that the PAF signaling system is important in sepsis and other syndromes of inflammatory injury and that therapeutic strategies to interrupt or terminate signaling via the PAF signaling system may be useful in these conditions.
A felon with a lengthy criminal history was killed after a police tactical team forced its way into a motel room, where the man had been holed up for hours holding a woman hostage. That hostage was freed more than six hours after the ordeal started at the Travel Star Motel on South Nevada. The El Paso County Sheriff's Office, who is investigating the incident, says it all began with a tip that a 32-year-old wanted on a robbery warrant was staying at the motel. At 3:30 Monday afternoon, Springs police went to the motel to execute the warrant. When officers got to the scene, the suspect barricaded himself inside his motel room and refused to come out. He told police he was armed and holding a woman inside with him. The motel was evacuated, and for the next several hours, crisis negotiators tried to bring a peaceful end to the standoff. At 9:40 p.m., more than six hours after it all started, SWAT barged into the room. Shots were fired and the suspect was killed at the scene. The woman he had been holding hostage was hit by a bullet, though it's unclear if it was police or the suspect who fired that shot. She was rushed to the hospital and is expected to survive. A look into the background of the suspect, since identified as Corky Oliver, reveals a long list of past crimes, both as convictions and open cases. Among the charges he was facing currently, Oliver was wanted for attempted murder for a up the road from the motel he'd later die in. Details about the robbery warrant that triggered the standoff have not been released. As is standard, an outside agency is investigating the incident since it involved officers firing their weapons. The El Paso County Sheriff's Office is the lead investigating agency in this case.
Q: Searching for plug-in or API call for dynamic titles in recurring events I'd like to create a set of recurring events but with a dynamic titles, e.g. for counting gym lessons... Is there a way to do this in Google calendar or is there a free or cheap alternative available? A: This seems hard to do without scripting it via the Google Calendar API. You can set up the initial recurring event and then iterate over the sequence of other calendar events for that instance using the following endpoints: Retrieve instances Update event I can't think of any other free services that assist with this off the top of my head. If you'd like similar functionality across other calendaring systems including Outlook and Exchange without having to re-do the implementation with each of those APIs, you can also check out my company Kloudless's unified Calendar API (docs), which provides an abstraction layer for operations such as the ones above.
This story appears in ESPN College Football 2016, on newsstands June 7. Order online today! When we asked ESPN experts to rank the nation's position groups, it came as no surprise that Alabama grabbed three mentions. But Iowa took home the best Big Ugly unit, and that front line might be the unsung piece that pushes the Hawkeyes to the next level in 2016. Here are the top five units at five different spots, as ranked by ESPN talent. Brock Huard's top skill groups 1. Clemson Tigers (QB Deshaun Watson, RB Wayne Gallman, WR Artavis Scott) 2. Oklahoma Sooners (QB Baker Mayfield, RB Samaje Perine, WR Dede Westbrook) 3. Houston Cougars (QB Greg Ward Jr., RB Duke Catalon, WR Steven Dunbar) 4. Ole Miss Rebels (QB Chad Kelly, RB Jordan Wilkins, TE Evan Engram) Mississippi quarterback Chad Kelly dives in for a touchdown against Alabama linebacker Shaun Hamilton during first half of an NCAA college football game, Saturday, Sept. 19, 2015, in Tuscaloosa, Ala. AP Photo/Butch Dill The explosive arm of Kelly (87.0 QBR) will light up the Grove, and Damore'ea Stringfellow helps replace Laquon Treadwell at receiver. The Rebels put up north of 40 points per game, eighth in the FBS. 5. Washington State Cougars (QB Luke Falk, RB Gerard Wicks, WR Gabe Marks) Ed Cunningham's top offensive lines 1. Iowa Hawkeyes: LG Boone Myers, RT Ike Boettger, C/RG Sean Welsh Iowa coach Kirk Ferentz sees shades of Marshal Yanda, a Hawkeye turned NFL All-Pro, in current offensive lineman Sean Welsh. Reese Strickland/USA TODAY Sports Iowa will miss center Austin Blythe, but Myers, Boettger, Welsh and Cole Croston have combined for 51 career starts and weigh in at an average of 302 pounds, helping keep QB C.J. Beathard upright. 2. Alabama Crimson Tide: LT Cam Robinson (editor's note: these rankings were compiled before Robinson's arrest), C Ross Pierschbacher, RG Alphonse Taylor 3. Florida State Seminoles: LT Rod Johnson, C Alec Eberle, RG Wilson Bell 4. Clemson: LT Mitch Hyatt, C Jay Guillermo, RG Tyrone Crowder 5. Boise State Broncos: RG Steven Baggett, LG Travis Averill, RT Mario Yakoo Booger McFarland's top front sevens 1. Florida Gators: DT Caleb Brantley, DE Cece Jefferson, LB Jarrad Davis 2. LSU Tigers: DT Davon Godchaux, LB/DE Arden Key, LB Kendell Beckwith Derick E. Hingle/USA TODAY Sports The Tigers switch to a 3-4 defense, allowing Key to stand up and rush off the edge at outside linebacker, and Godchaux will create havoc inside. Expect the sack total (34) to jump in a heavier attack scheme. 3. Alabama: DE Jonathan Allen, LB Reuben Foster, LB Tim Williams 4. Ohio State Buckeyes: DE Sam Hubbard, LB Raekwon McMillan, DT Tracy Sprinkle 5. Michigan State Spartans: DT Malik McDowell, LB Ed Davis, LB Riley Bullough Rod Gilmore's top defensive backs 1. Michigan Wolverines: S/LB Jabrill Peppers, CB Jourdan Lewis, CB Jeremy Clark 2. Georgia Bulldogs: CB Aaron Davis, CB Malkom Parrish, S Dominick Sanders 3. Boston College Eagles: CB Isaac Yiadom, S John Johnson, S William Harris 4. Washington Huskies: S Budda Baker, CB Sidney Jones, CB Kevin King 5. Oklahoma: CB Jordan Thomas, S Steven Parker, S Ahmad Thomas Alonzo Adams/USA TODAY Sports Edging LSU for the final spot, OU faced a heavy workload (437 attempts), made 20 picks and kept opponents to just 6.0 yards per attempt (13th in the FBS). Three starters return in the secondary. Desmond Howard's special teams 1. Tennessee Volunteers: KR Evan Berry, PR Cameron Sutton, K Aaron Medley 2. Utah Utes: K Andy Phillips, KR Cory Butler-Byrd, PR Boobie Hobbs AP Photo/Alex Gallardo Utah's crew comes in ranked fourth in efficiency. "Automatic" Andy has hit 84 percent on field goals (4-for-4 from 50-plus) over three years, and Butler-Byrd has wheels (27.9 yards per return). 3. Texas A&M Aggies: RS Christian Kirk, K Daniel LaCamera, P Shane Tripucka 4. Alabama: KR Damien Harris, K Adam Griffith, P JK Scott 5. Stanford Cardinal: RS Christian McCaffrey, K Conrad Ukropina, P Alex Robinson
Fluorescein angiography. Part 1: Technique and normal study. 1. Fluorescein angiography is a relatively noninvasive diagnostic test which provides the ophthalmic practitioner with anatomic and physiologic information about the ocular structures. 2. Once the dye solution is injected, the photographer observes the fundus through the camera until it appears in the retinal vessels. Photographs are then taken in a rapid sequence. 3. The retinal arteries fill rapidly and evenly within two seconds following the initial choroidal flush. The dye circulates through the whole arterial tree in the body, and in the late stage angiogram recirculation can be seen in the retinal blood vessels.
Abraham Jones (North Carolina politician) Abraham Jones (c. 1739-after 1787) was a politician in North Carolina, in the North Carolina General Assembly of 1778 and a colonel over the Hyde County Regiment of the North Carolina militia from 1779 to 1783. Military Service Jones was appointed colonel of the Hyde County Regiment in 1779. He served alongside Colonel William Russel until the end of the Revolutionary War in 1783. Jones was elected to represent Hyde County in the North Carolina House of Commons in 1778 and 1779. He served in the North Carolina Senate in 1782 and 1784 to 1787. References Category:Year of death missing Category:18th-century American people Category:North Carolina militiamen in the American Revolution Category:North Carolina state senators Category:Members of the North Carolina House of Representatives Category:Year of birth uncertain Category:Members of the North Carolina Provincial Congresses
Taylor Lautner Growing (Literally) with the Twilight Franchise As the anticipation for the Twilight sequel New Moon and future follow-ups get bigger and bigger, so does Taylor Lautner, who'll be putting on even more bulk for the third film Eclipse. "Jacob's character is continually growing throughout the series," Lautner told PEOPLE at the MTV Movie Awards Sunday night, "so I got about eight weeks off before I go back again for Eclipse and I'm going to be hitting the gym." Lautner, 17, already beefed up considerably for his role as the shape shifting werewolf Jacob Black in New Moon after brief behind-the-scenes debate over whether the role should be recast. He said he'll be getting bigger and bigger "until the end of the series," but he looks forward to returning to his normal size. "When we're done with the Twilight films I'll definitely bulk down and just get lean again because I don't want to stay big and bulky." "It's insane!" costar Ashley Greene said of Lautner's new build. "I was going through my phone and looking at all the pictures, and there's one from the wrap party that we did here after the first one and it's incredible. I was like, 'Taylor, did you see this?' He was like, 'Oh my gosh.' He gained 30 lbs. He's not a little kid anymore." In recent photos from the New Moon set star Robert Pattinson also showed off some impressively chiseled abs, and costar Kellan Lutz said they were achieved without any airbrushed shadows – in fact, Lutz takes some tongue-in-cheek credit for Pattinson's six-pack. "I've been training him, I've been training Taylor," he insisted straight-faced, but promised that there's no fitness competition among the men of New Moon – at least on his part. "I'm the tallest one and so I'll stick with that trait. The Italian Job Meanwhile, a handful of the New Moon cast got to shoot scenes on location in Italy, and Greene was one of the lucky ones. "I didn't want to leave. Oh my gosh, I did miss home a bit, but it's so beautiful." She says her co-stars who stayed home resented her "a LOT. When I was like 'Oh, my God, I'm so tired. I'm working so hard.' They were like, 'Shut up. You're in ITALY.' " Peter Facinelli, who plays the Cullen family patriarch, confirms the dissatisfaction of the non-traveling castmembers. "We were so bummed," he said. "Lazy writing, Stephenie Meyer! LOL. Can you put LOL at the end of that so she doesn't think I'm serious?"
Jockey Club Mile The Jockey Club Mile is a Group 2 set weights Thoroughbred horse race in Hong Kong, run at Sha Tin over 1600 metres in November. In the 2003/2004 racing season, this race was upgraded to a domestic Group 2 event. The race was promoted to International Group 2 status in 2010. The prize money in season 2013/14 is HK$3,500,000, which was increased to HK$3,875,000 in season 2014/15. Winners See also List of Hong Kong horse races References Racing Post: , , , , , , The Hong Kong Jockey Club - Introduction of Cathay Pacific Jockey Club Mile (2011/12) Racing Information of The Cathay Pacific Jockey Club Mile (2011/12) The Hong Kong Jockey Club Category:Horse races in Hong Kong
Quick Links To help clarify the USDA regs regarding salt, wholegrains and milk In recent news, there has been a lot of talk regarding school lunches and the loosening of guidelines put in place by the Obama administration. WebMD web article The reality is, there have been exemptions in place for schools all along... and chocolate milk, along with other flavored milk, has never left the menu. The rule for flavored milk was that it had to be fat free. The new guidelines will allow for flavored milks to have 1% fat content. Press releases regarding the new guidelines set to be in effect in 2018, have been posted to the Food Service webpage. Please go to the Food Service page to read them.
‘Yellow’ forces blamed for FM burial brouhaha The “yellow” forces apparently have themselves to blame for the upcoming burial of the late President Ferdinand Marcos at the Libingan ng mga Bayani in Taguig City. President Duterte has twitted the “yellow” forces for failing to push for a law banning the burial of Marcos at the Libingan ng mga Bayani when they were in power. Without such legal ban against Marcos, Duterte explained that he is duty-bound to follow the law allowing the former leader to be buried at the heroes’ cemetery. He argued that Marcos was a former president and a soldier who deserves such burial even if he was not a hero. “Alam mo kasi kung ginusto nila, and they were already in power at the time, itong mga yellow, dapat nagpasa sila ng batas na hindi pwede ilibing si Marcos,” the President said in a press conference at the Presidential Guest House in Davao City. “When the guy was already in Guam in exile, they should have passed a law prohibiting Marcos if ever he comes home dead to be buried in the Libingan ng mga Bayani,” Duterte added. “But nothing has been done. Why was this elementary procedure forgotten?” he asked. Duterte was alluding to the Aquinos, the bitter rivals of the Marcoses, and their political allies who supposedly did not push for a ban on the burial of the late strongman. The late President Corazon C. Aquino assumed power after Marcos was ousted via a bloodless People Power Revolution in 1986. Her son, Benigno S. Aquino III, was president from 2010 to 2016. (Genalyn D. Kabiling)
Athletics at the 1990 Goodwill Games – Results These are the official results of the athletics competition at the 1990 Goodwill Games which took place between July 22 and 26, 1990, at the Husky Stadium in Seattle, Washington, United States. Men's results 100 meters July 23Wind: +1.1 m/s 200 meters July 24 400 meters July 24 800 meters July 22 1500 meters July 23 5000 meters July 22 10,000 meters July 25 Marathon July 22 110 meters hurdles July 23 400 meters hurdles July 22 3000 meters steeplechase July 24 4 x 100 meters relay July 26 4 x 400 meters relay July 26 20,000 meters walk July 22 High jump July 26 Pole vault July 22 Long jump July 25 Triple jump July 26 Shot put July 25 Discus throw July 23 Hammer throw July 26 Javelin throw July 24 Decathlon July 24–25 Women's results 100 meters July 23Wind: 0.0 m/s 200 meters July 25 400 meters July 22 800 meters July 23 1500 meters July 25 3000 meters July 23 5000 meters July 24 10,000 meters July 26 Marathon July 22 100 meters hurdles July 23 400 meters hurdles July 26 4 x 100 meters relay July 26 4 x 400 meters relay July 26 10,000 meters walk July 24 High jump July 23 Long jump July 24 Shot put July 24 Discus throw July 22 Javelin throw July 25 Heptathlon July 22–23 References July 22 results July 23 results July 24 results July 25 results July 26 results 1990 Goodwill Games
Q: create truth table in php (AND / OR) i have an array contain value like Array ( [0] = true [1] = OR [2] = true [3] = AND [4] = false [5] = AND [6] = true ) i want to create truth table in php like e.g true OR true = result1 result1 AND false = result2 result2 AND true = result3 i'm stupid and not b able to create yet. :( here is my code foreach( $arrValue as $val ) { if(!empty($val)) { if($val=='true') $p = true; elseif($val=='false') $p = false; if(isset($p)) { if(isset($result)) { if($val=='AND') $result = $result AND $p; elseif($val=='OR') $$result = $result or $p; } else $result = $p; } } } please help this stupid boy to get results. A: This is what i want. //( [0] => true [1] => OR [2] => true [3] => AND [4] => false [5] => AND [6] => true) function boolstr($val) { if($val=='true') return true; elseif($val=='false') return false; } function row_operator($arrValue){ $i=-2; $j=-1; foreach( $arrValue as $val ) { if($i+3 > count($arrValue)) break; $boolste = boolstr($arrValue[$i+2]); if(isset($res)) { if($arrValue[$j+2]=='AND') $res = $res && $boolste; elseif($arrValue[$j+2]=='OR') $res = $res || $boolste; if($res==true) $a='true'; else $a= 'false'; $j += 2; } else $res = $boolste; $i += 2; } return $res; }
U.S. military officials have confirmed that a U.S. aircraft struck a mosque outside of Aleppo, Syria during evening prayers on Thursday, killing dozens of civilians, in an attack that many are calling a war crime. Airwars’ Samuel Oakford reported that U.S. Central Command (CENTCOM) confirmed that a raid “took place in the vicinity of al-Jinah village, which is located in western Aleppo governorate, just a few kilometers from the border with Idlib. CENTCOM spokesperson Maj. Josh Jacques said the target was ‘assessed to be a meeting place for al Qaeda, and we took the strike.'” Jacques added that the target “happened to be across the street from where there is a mosque.” And Washington Post staff writer Thomas Gibbons-Neff reported: US official: AQ strike in N. Syria involved two Reapers that fired roughly entirety of their Hellfire payload and followed up w/ 500lb bomb. The U.K.-based Syrian Observatory for Human Rights said that at least 42 people were killed and dozens wounded. Local activists told Al Jazeera that “the mosque was full of worshippers,” with an estimated 300 people “inside at the time of the air raids.” Rami Abdel Rahman, head of the Observatory, told the DPA news agency that most of those killed were civilians and that he fears “the number of casualties will increase” once rescuers are able to dig through the rubble. Making no mention of civilian casualties, CENTCOM claimed the strike in Idlib “killed several al-Qaeda fighters,” according to Al Jazeera. The death toll “appears to be at least the second largest ever from U.S. strikes aimed at alleged al-Qeada targets in Syria,” according to Oakford, as the intractable war against terror “enters its 16th year and third presidency, with no end in sight to the carnage,” as journalist Glenn Greenwald observed. Reporting the reaction and how the strike might impact the fight against al-Qaeda in Syria, Charles Lister, a senior fellow with the Middle East Institute, wrote Thursday: #pt: US strikes that hit mosques & kill 10s of civilians give AlQaeda even more of an advantage. Makes this worse: #pt: #Qatar’s Foreign Minister calls the Al-Jinah Mosque airstrike “heinous” & says mosques “cannot be a place of murder or bloodshed.” pic.twitter.com/Xlzr0U3PVA Turkish Deputy Prime Minister Numan Kurtulmus also condemned the attack as a war crime, telling reporters Friday: “This is a crime against humanity, this is a war crime. Bombing civilians, people in the mosque, and a house of worship is unacceptable.” Article 53 of the Geneva Convention prohibits attacks on cultural objects and places of worship. Airwars confirmed that CENTCOM and the Pentagon are further investigating the attack. The strike comes as U.S. President Donald Trump has taken steps to loosen constraints on military engagement, including lowering the standard for what defines an “acceptable” civilian casualty, as Common Dreams reported.
Masias is just one of the many permanent residents eligible for citizenship who attended the fair. "There are access to public benefits that are only available to citizens," said Laura Garcia with the New Mexico Immigrant Law Center. "It's a protection from deportation, even as a legal permanent resident in some cases you're still at risk of being sent back home to the country where you were born." Garcia says the biggest benefit of becoming a naturalized citizen is the right to vote. It's something that can help immigrants integrate with the rest of the community. "In becoming a citizen, people feel a lot more confident in being able to voice their own opinions and go to city hall meetings, or council meetings, they feel like they can actually have more of an impact," she said. It's estimated there are currently 47,000 legal permanent residents living in New Mexico that are eligible for citizenship.
Disney Rogue One: A Star Wars Story has hit theatres and nearly his $300 million for its worldwide opening box office gross. Not bad for the first Star Wars spin-off of the Disney era. (Let’s pretend that the Clone Wars animated movie never happened and move on.) While there is a wide range of opinions about the film, it does show that there is a market for more Star Wars outside the Skywalker family saga. So where to next? Maybe this Star Wars travel guide can help us find some interesting places to focus future A Star Wars Stories on. Like this: If there’s one way to create jobs, it’s through massive construction projects. Sure, the Imperial government spent scads of money to create those jobs but that might be nothing compared to the long-term costs of operating a Death Star. Maybe the Rebels were in cahoots with the Imperials to help them create construction jobs because X-Wings can’t melt main reactors. Anyway, with Rogue One: A Star Wars Story coming out today, here’s a look at the cost of running the Death Star. I don’t know if you noticed but the first Star Wars anthology movie is coming out this week. Rogue One: A Star Wars Story is hitting theatres on Thursday (or Friday depending on your location) and it’s a new telling of how the Rebels obtained the Death Star’s plans. But there’s more to the Death Star than a superlaser capable of exploding a planet nearly instantly. To find out more about the Death Star, we have this handy infographic for you. We’ve brought you a lot of infographics pricing out the real world cost of some iconic pieces of movie worlds. Since this blog began, we’ve looked at the costs of the Millennium Falcon, Darth Vader’s suit, Yoda’s hut and Jabba’s Palace. Those are just a handful of countless great real world cost infographics that we’ve done. Today, we add to that with the real-world cost of building an AT-AT. Keep this in mind when prepping for Rogue One in three months. Like this: Instead of our normal Fails of the Week, since it’s Star Wars Week on the blog, it’s a special edition of the Star Wars Fails of the Week. While I’m sure we could have just put up Episodes I and II along with George’s changes to the original trilogy and called it a day, I thought I’d go for something more epic. Today is the weirdest, wackiest and failiest pieces of Star Wars merchandise. It’s not just Disney stuff either. LucasFilm had some odd merch too. One thing that often happens when comic book movies come out is that fans will compare the comics to the movies. Sometimes, the comparisons are favourable. Sometimes, less so. I’d like to think that the likes of The Avengers and Guardians of the Galaxy were better movies than the comics. Spider-Man and the later X-Men movies, on the other hand, should probably have stuck to print. Anyway, the Marvel Cinematic Universe has a very limited number of Avengers through the first two movies. That’s in direct contrast to the never ending members of the Avengers throughout the years in the Marvel Comicverse, including to this very day. To see who is and has been part of the Avengers through the years, we have a handy little infographic for you. Since we’re only six weeks away from the season premiere of Game of Thrones, I think that now is the time for the return of regular Game of Thrones posts in a series that I’ve come to dub Fridays of Ice and Fire. For the return of Game of Thrones posts, I found this mashup of Disney princesses with characters from Game of Thrones in the gallery of DjeDjehuti. So what would Disney characters look like if they were in the Seven Kingdoms of Westeros?
--- # ---------------------------------------------------------------------------- # # *** AUTO GENERATED CODE *** AUTO GENERATED CODE *** # # ---------------------------------------------------------------------------- # # This file is automatically generated by Magic Modules and manual # changes will be clobbered when the file is regenerated. # # Please read more about how to change this file in # .github/CONTRIBUTING.md. # # ---------------------------------------------------------------------------- subcategory: "Cloud Healthcare" layout: "google" page_title: "Google: google_healthcare_hl7_v2_store" sidebar_current: "docs-google-healthcare-hl7-v2-store" description: |- A Hl7V2Store is a datastore inside a Healthcare dataset that conforms to the FHIR (https://www. --- # google\_healthcare\_hl7\_v2\_store A Hl7V2Store is a datastore inside a Healthcare dataset that conforms to the FHIR (https://www.hl7.org/hl7V2/STU3/) standard for Healthcare information exchange To get more information about Hl7V2Store, see: * [API documentation](https://cloud.google.com/healthcare/docs/reference/rest/v1/projects.locations.datasets.hl7V2Stores) * How-to Guides * [Creating a HL7v2 Store](https://cloud.google.com/healthcare/docs/how-tos/hl7v2) <div class = "oics-button" style="float: right; margin: 0 0 -15px"> <a href="https://console.cloud.google.com/cloudshell/open?cloudshell_git_repo=https%3A%2F%2Fgithub.com%2Fterraform-google-modules%2Fdocs-examples.git&cloudshell_working_dir=healthcare_hl7_v2_store_basic&cloudshell_image=gcr.io%2Fgraphite-cloud-shell-images%2Fterraform%3Alatest&open_in_editor=main.tf&cloudshell_print=.%2Fmotd&cloudshell_tutorial=.%2Ftutorial.md" target="_blank"> <img alt="Open in Cloud Shell" src="//gstatic.com/cloudssh/images/open-btn.svg" style="max-height: 44px; margin: 32px auto; max-width: 100%;"> </a> </div> ## Example Usage - Healthcare Hl7 V2 Store Basic ```hcl resource "google_healthcare_hl7_v2_store" "store" { name = "example-hl7-v2-store" dataset = google_healthcare_dataset.dataset.id notification_configs { pubsub_topic = google_pubsub_topic.topic.id } labels = { label1 = "labelvalue1" } } resource "google_pubsub_topic" "topic" { name = "hl7-v2-notifications" } resource "google_healthcare_dataset" "dataset" { name = "example-dataset" location = "us-central1" } ``` <div class = "oics-button" style="float: right; margin: 0 0 -15px"> <a href="https://console.cloud.google.com/cloudshell/open?cloudshell_git_repo=https%3A%2F%2Fgithub.com%2Fterraform-google-modules%2Fdocs-examples.git&cloudshell_working_dir=healthcare_hl7_v2_store_parser_config&cloudshell_image=gcr.io%2Fgraphite-cloud-shell-images%2Fterraform%3Alatest&open_in_editor=main.tf&cloudshell_print=.%2Fmotd&cloudshell_tutorial=.%2Ftutorial.md" target="_blank"> <img alt="Open in Cloud Shell" src="//gstatic.com/cloudssh/images/open-btn.svg" style="max-height: 44px; margin: 32px auto; max-width: 100%;"> </a> </div> ## Example Usage - Healthcare Hl7 V2 Store Parser Config ```hcl resource "google_healthcare_hl7_v2_store" "store" { provider = google-beta name = "example-hl7-v2-store" dataset = google_healthcare_dataset.dataset.id parser_config { allow_null_header = false segment_terminator = "Jw==" schema = <<EOF { "schemas": [{ "messageSchemaConfigs": { "ADT_A01": { "name": "ADT_A01", "minOccurs": 1, "maxOccurs": 1, "members": [{ "segment": { "type": "MSH", "minOccurs": 1, "maxOccurs": 1 } }, { "segment": { "type": "EVN", "minOccurs": 1, "maxOccurs": 1 } }, { "segment": { "type": "PID", "minOccurs": 1, "maxOccurs": 1 } }, { "segment": { "type": "ZPD", "minOccurs": 1, "maxOccurs": 1 } }, { "segment": { "type": "OBX" } }, { "group": { "name": "PROCEDURE", "members": [{ "segment": { "type": "PR1", "minOccurs": 1, "maxOccurs": 1 } }, { "segment": { "type": "ROL" } } ] } }, { "segment": { "type": "PDA", "maxOccurs": 1 } } ] } } }], "types": [{ "type": [{ "name": "ZPD", "primitive": "VARIES" } ] }], "ignoreMinOccurs": true } EOF } } resource "google_healthcare_dataset" "dataset" { provider = google-beta name = "example-dataset" location = "us-central1" } ``` <div class = "oics-button" style="float: right; margin: 0 0 -15px"> <a href="https://console.cloud.google.com/cloudshell/open?cloudshell_git_repo=https%3A%2F%2Fgithub.com%2Fterraform-google-modules%2Fdocs-examples.git&cloudshell_working_dir=healthcare_hl7_v2_store_unschematized&cloudshell_image=gcr.io%2Fgraphite-cloud-shell-images%2Fterraform%3Alatest&open_in_editor=main.tf&cloudshell_print=.%2Fmotd&cloudshell_tutorial=.%2Ftutorial.md" target="_blank"> <img alt="Open in Cloud Shell" src="//gstatic.com/cloudssh/images/open-btn.svg" style="max-height: 44px; margin: 32px auto; max-width: 100%;"> </a> </div> ## Example Usage - Healthcare Hl7 V2 Store Unschematized ```hcl resource "google_healthcare_hl7_v2_store" "store" { provider = google-beta name = "example-hl7-v2-store" dataset = google_healthcare_dataset.dataset.id parser_config { allow_null_header = false segment_terminator = "Jw==" version = "V2" } } resource "google_healthcare_dataset" "dataset" { provider = google-beta name = "example-dataset" location = "us-central1" } ``` ## Argument Reference The following arguments are supported: * `name` - (Required) The resource name for the Hl7V2Store. ** Changing this property may recreate the Hl7v2 store (removing all data) ** * `dataset` - (Required) Identifies the dataset addressed by this request. Must be in the format 'projects/{project}/locations/{location}/datasets/{dataset}' - - - * `parser_config` - (Optional) A nested object resource Structure is documented below. * `labels` - (Optional) User-supplied key-value pairs used to organize HL7v2 stores. Label keys must be between 1 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes, and must conform to the following PCRE regular expression: [\p{Ll}\p{Lo}][\p{Ll}\p{Lo}\p{N}_-]{0,62} Label values are optional, must be between 1 and 63 characters long, have a UTF-8 encoding of maximum 128 bytes, and must conform to the following PCRE regular expression: [\p{Ll}\p{Lo}\p{N}_-]{0,63} No more than 64 labels can be associated with a given store. An object containing a list of "key": value pairs. Example: { "name": "wrench", "mass": "1.3kg", "count": "3" }. * `notification_configs` - (Optional) A list of notification configs. Each configuration uses a filter to determine whether to publish a message (both Ingest & Create) on the corresponding notification destination. Only the message name is sent as part of the notification. Supplied by the client. Structure is documented below. The `parser_config` block supports: * `allow_null_header` - (Optional) Determines whether messages with no header are allowed. * `segment_terminator` - (Optional) Byte(s) to be used as the segment terminator. If this is unset, '\r' will be used as segment terminator. A base64-encoded string. * `schema` - (Optional) JSON encoded string for schemas used to parse messages in this store if schematized parsing is desired. The `notification_configs` block supports: * `pubsub_topic` - (Required) The Cloud Pub/Sub topic that notifications of changes are published on. Supplied by the client. PubsubMessage.Data will contain the resource name. PubsubMessage.MessageId is the ID of this message. It is guaranteed to be unique within the topic. PubsubMessage.PublishTime is the time at which the message was published. Notifications are only sent if the topic is non-empty. Topic names must be scoped to a project. cloud-healthcare@system.gserviceaccount.com must have publisher permissions on the given Cloud Pub/Sub topic. Not having adequate permissions will cause the calls that send notifications to fail. If a notification cannot be published to Cloud Pub/Sub, errors will be logged to Stackdriver * `filter` - (Optional) Restricts notifications sent for messages matching a filter. If this is empty, all messages are matched. Syntax: https://cloud.google.com/appengine/docs/standard/python/search/query_strings Fields/functions available for filtering are: * messageType, from the MSH-9.1 field. For example, NOT messageType = "ADT". * send_date or sendDate, the YYYY-MM-DD date the message was sent in the dataset's timeZone, from the MSH-7 segment. For example, send_date < "2017-01-02". * sendTime, the timestamp when the message was sent, using the RFC3339 time format for comparisons, from the MSH-7 segment. For example, sendTime < "2017-01-02T00:00:00-05:00". * sendFacility, the care center that the message came from, from the MSH-4 segment. For example, sendFacility = "ABC". * PatientId(value, type), which matches if the message lists a patient having an ID of the given value and type in the PID-2, PID-3, or PID-4 segments. For example, PatientId("123456", "MRN"). * labels.x, a string value of the label with key x as set using the Message.labels map. For example, labels."priority"="high". The operator :* can be used to assert the existence of a label. For example, labels."priority":*. ## Attributes Reference In addition to the arguments listed above, the following computed attributes are exported: * `id` - an identifier for the resource with format `{{dataset}}/hl7V2Stores/{{name}}` * `self_link` - The fully qualified name of this dataset ## Timeouts This resource provides the following [Timeouts](/docs/configuration/resources.html#timeouts) configuration options: - `create` - Default is 4 minutes. - `update` - Default is 4 minutes. - `delete` - Default is 4 minutes. ## Import Hl7V2Store can be imported using any of these accepted formats: ``` $ terraform import google_healthcare_hl7_v2_store.default {{dataset}}/hl7V2Stores/{{name}} $ terraform import google_healthcare_hl7_v2_store.default {{dataset}}/{{name}} ```
Q: Replace matching word with a digit/number in a string in PHP I want to replace some words in a string with a digit/number only if that word is followed or preceded by a digit [whitespace(s) allowed in between]. For example, here is an example string in which I wish to replace too with 2 and for with 4. I have tried with str_replace, but doesn't serve the full purpose as it replaces all for and too in the string $str = 'Please wait for sometime too, the area code is for 18 and phone number is too 5897 for'; $str = str_ireplace(' for ', '4', $str); $str = str_ireplace(' too ', '2', $str); echo $str; but it isn't giving me the desired output which should be Please wait for sometime too, the area code is 418 and phone number is 258974 A: This may be a little too long, but you get the idea: http://3v4l.org/JfXBN <?php $str="Please wait for sometime too, the area code is for 18 and phone number is too 5897 for"; $str=preg_replace('#(\d)\s*for#','${1}4',$str); $str=preg_replace('#(\d)\s*too#','${1}2',$str); $str=preg_replace('#for\s*(\d)#','4${1}',$str); $str=preg_replace('#too\s*(\d)#','2${1}',$str); echo $str; Outputs: Please wait for sometime too, the area code is 418 and phone number is 258974 Warning: If your string looks like this: 8 too for, this code snippet may or may not fail depending on whether you expect 824 or 82 for, since it does not do recursive replace (the current sequence returns 82 for).