text
stringlengths
8
5.77M
Introduction {#s1} ============ Candidaemia is the fourth most common cause of nosocomial bloodstream infections^[@DKU414C1]^ and invasive candidiasis has a significant impact on patient outcomes.^[@DKU414C2]--[@DKU414C4]^ In a review of randomized trials for the treatment of invasive candidiasis, overall mortality was 31.4% and the rate of treatment success was 67.4%.^[@DKU414C5]^ Despite advances in the recognition of high-risk patients with invasive candidiasis and drug development, the mortality associated with invasive candidiasis has not changed substantially. In the light of the medical need to analyse the scientific evidence and make recommendations, the IDSA^[@DKU414C6]^ updated the clinical practice guidelines for the management of candidiasis in 2009. The ESCMID Task Force^[@DKU414C7]^ developed diagnostic and management/therapeutic guidelines for *Candida* diseases in 2012. In Japan, the Mycoses Forum Task Force published guidelines for the management of deep-seated mycoses in 2007.^[@DKU414C8]^ Although many guidelines have been published in a wide variety of areas of infectious diseases, the development of guidelines has not necessarily led to changes in clinical behaviour in a timely fashion. For integration into bedside practice, the development of bundles based on key recommendations is considered to be effective. The surviving sepsis campaign bundle is one of the most successful cases.^[@DKU414C9]--[@DKU414C11]^ Levy *et al*.^[@DKU414C10]^ described that the campaign was associated with sustained, continuous quality improvement and a reduction of mortality rates in participating hospitals. To introduce the appropriate management of candidaemia into bedside practice, the Mycoses Forum in Japan developed bundles based on key guideline recommendations. Bundled care processes standardize interventions to reduce unintended variations among clinicians by establishing a shared clinical baseline on which further appropriate management can be built. The aim of this study was to investigate nationwide compliance with the bundles and the impact of compliance on clinical outcomes in patients with candidaemia. Methods {#s2} ======= The ACTIONs ([A]{.ul}ppropriate [C]{.ul}andidal [T]{.ul}reatment [I]{.ul}mplementation [o]{.ul}f [N]{.ul}on-neutropenic [s]{.ul}trategies) Project Committee developed bundles based on key guideline recommendations^[@DKU414C6]--[@DKU414C8]^ for the diagnosis and treatment of non-neutropenic patients with invasive candidiasis in 2011. The ACTIONs Project is one of the activities of the Mycoses Forum supported by Pfizer Japan Inc. ACTIONs bundles consist of nine items to complete for candidaemia (Table [1](#DKU414TB1){ref-type="table"}). For the awareness of activities, briefing sessions targeting infection control doctors certified by the Japanese College of Infection Control Doctors were held in 11 geographical regions throughout Japan. Bundle checklists were available on the web site of the Mycoses Forum (<http://www.mycoses.jp/actions_project/index.html#BUNDLE>) and were printed and widely distributed. Data were entered into the bundle database locally or check sheets were sent to the central office of the Mycoses Forum between July 2011 and April 2012. Table 1.Bundle elements in patients with candidaemia**Bundles to be accomplished at the start of therapy**1. Removal of existing CVCs within 24 h of diagnosis2. Initial appropriate selection of antifungals3. Initial appropriate dosing of antifungals**Bundles to be accomplished after initiation of therapy**4. Ophthalmological examinations5. Follow-up blood cultures until clearance of candidaemia6. Assessment of clinical efficacy on the third to fifth day to consider necessity of alternative therapy7. Appropriate choice of alternative antifungals8. At least 2 weeks of therapy after documented clearance of *Candida* from bloodstream and resolution of attributable symptoms (prolonged therapy for candidaemia with organ involvement)9. Step-down oral therapy for patients with favourable clinical course Entry criteria were non-neutropenic patients \>17 years old treated with antifungals for candidaemia with a positive culture for *Candida* spp. in blood samples. The appropriate selection and dosing regimen of antifungals were decided according to previously published guidelines^[@DKU414C6]--[@DKU414C8]^ (Table [2](#DKU414TB2){ref-type="table"}). If no clinical efficacy was obtained on the third to the fifth day, consideration of alternative therapy was recommended, such as a change to echinocandins or liposomal amphotericin B in patients to whom azoles were administered as initial therapy. Transition to fluconazole is recommended in clinically stable patients with infection due to *Candida albicans.* Table 2.Appropriate selection and dosing of antifungals in the bundlesAntifungalsAppropriate indicationStandard dosingEchinocandinspatients with moderately severe to severe illnesscaspofungin: loading dose of 70 mg, then 50 mg daily\ micafungin: 100--150 mg dailyinfection due to *C. glabrata* and *C. krusei*patients with candidaemia in whom CVCs cannot be removedconsider poor ocular penetration in ocular candidiasisFluconazolepatients who are less critically ill and who have no recent azole exposureloading dose of 800 mg, then 400 mg dailyinfection due to *C. parapsilosis* and *C. albicans*transition to fluconazole in clinically stable patients with infection due to *C. albicans*Voriconazolealternative therapy6 mg/kg bid for two doses, then 3--4 mg/kg bidstep-down oral therapylimitation of intravenous formulation in renal impairmentconsider therapeutic drug monitoringItraconazolealternative therapy200 mg bid for 2 days, then 200 mg dailylimitation of intravenous formulation in renal impairmentLiposomal amphotericin Bpatients with severe sepsis/septic shock2.5--5.0 mg/kg dailyinfection due to *C. glabrata*, *C. krusei* and *C. guilliermondii*patients with candidaemia in whom CVCs cannot be removedAmphotericin B deoxycholaterecommendation against use due to substantial renal and infusion-related toxicity---Flucytosinecombination use with other antifungals25 mg/kg qid[^2] Clinical response was judged after the end of all treatment courses, and mortality was evaluated 28 days after the start of antifungal therapy. Treatment was considered to be successful if all attributable signs and symptoms associated with candidaemia had resolved. Treatment was considered to have failed if there was unresponsive infection after at least 5 days of therapy, or if relapse occurred. In patients with treatment failure of initial antifungals or unacceptable adverse events necessitating a change of initial antifungal therapy, overall treatment was judged to be successful if a favourable clinical response was obtained with alternative therapy. We defined compliance as evidence that all bundle elements except 'appropriate choice of alternative antifungals' were completely fulfilled. As this item is indicated only for patients in whom antifungals were changed, we excluded this from the analysis of compliance. The element 'removal of central venous catheters (CVCs)' was included for the evaluation of compliance in patients with CVC placement. Missing data regarding the accomplishment of bundle elements were set as 'fail'. Clinical efficacy and mortality were evaluated according to the compliance. To identify the contribution of each element to improvement of clinical outcomes, the ORs of clinical success and mortality were adjusted for the following factors affecting clinical outcomes: surgery, chemotherapy for cancer, malnutrition, total parenteral nutrition, age \>70 years, chronic renal failure/haemodialysis, severe illness, steroid/immunosuppressant use, mechanical ventilation, use of a CVC, malignancy, ICU stay, diabetes mellitus and isolation of non-*albicans Candida*. Bundle elements such as 'third to fifth day follow-up' and '2 weeks of antifungal therapy' can only be achieved in patients who survive. To exclude deaths and dropouts before completion of bundle elements to be achieved after the start of therapy, we performed sub-population analysis in patients who survived \>28 days after the start of antifungal therapy. This study was approved by the institutional review board of Hyogo College of Medicine. The institutional review board waived the need for patients\' informed consent. Ethics approval was the responsibility of each participating centre. If necessary, investigators obtained formal approval of the protocol by the regional ethics committee. The crude OR in univariate analysis was estimated for each variable by the χ^2^ test and potential confounders were examined by cross tabulation. The variables selected by univariate analysis (*P* \< 0.1) were subsequently entered into a stepwise logistic regression model to estimate the magnitude of association (adjusted OR and 95% CI). The level of significance was set at *P* \< 0.05. SPSS ver. 16 (SPSS Inc., Chicago, IL, USA) was used to perform these analyses. Results {#s3} ======= Six hundred and forty-one subjects were registered. The analysis included 608 patients for whom information on clinical efficacy was obtained. Mortality was evaluated in 479 patients. *C. albicans* was commonly identified (46.4%). The other species identified included *Candida parapsilosis* (18.4%), *Candida glabrata* (16.0%), *Candida tropicalis* (7.6%), *Candida krusei* (4.6%), *Candida guilliermondii* (3.5%) and others (3.3%). The achievement of individual elements is shown in Table [3](#DKU414TB3){ref-type="table"}. In 81.2% of patients, CVCs were removed within 24 h of the diagnosis of candidaemia. Components for which the achievement rate was relatively low were ophthalmological examination (53.6%), follow-up blood cultures (60.5%), at least 2 weeks of therapy after the end of candidaemia (53.8%) and step-down oral therapy (24.3%). Because of the low achievement rate of oral switch, the compliance rate for achieving all elements was as low as 6.9% (42 of 608 patients), and increased to 21.4% (130 of 608 patients) when compliance was assessed by the completion of the bundles, except for step-down oral therapy. Table 3.Achievement of individual bundle elements in patients with candidaemiaPhaseElements of the bundlesPopulationNo. of patients with achievement of the elements (%)Bundles at the start of therapy1. removal of existing CVCs within 24 h of diagnosis2. initial appropriate selection of antifungals3. initial appropriate dosing of antifungalspatients with CVC placement414/510 (81.2)all534/608 (87.8)all464/608 (76.3)Bundles after initiation of therapy4. ophthalmological examinations5. follow-up blood cultures until clearance of candidaemia6. assessment of clinical efficacy on the third to fifth day7. appropriate choice of alternative antifungals8. at least 2 weeks of therapy after documented clearance of *Candida* from bloodstream9. step-down oral therapyall326/608 (53.6)all368/608 (60.5)all514/608 (84.5)patients with alternative therapy269/345 (78.0)all327/608 (53.8)all148/608 (24.3) The clinical success rate was 77.0% (468 of 608 patients) and the mortality rate was 26.5% (127 of 479 patients). There was a significant difference in clinical outcomes between patients with and without compliance \[success rate 92.9% versus 75.8% (*P* = 0.011)\]. The mortality rate in patients with compliance tended to be lower than that in patients without compliance \[8.3% versus 27.5% (*P* = 0.054)\]. There was a clear correlation between the number of elements accomplished and the clinical outcomes in patients with CVC placement \[clinical success: 0--2 elements, 21.6% (*n* = 37); 3 elements, 43.2% (*n* = 44); 4 elements, 74.3% (*n* = 74); 5 elements, 76.8% (*n* = 95); 6 elements, 89.2% (*n* = 102); 7 elements, 95.8% (*n* = 120); and 8 elements, 92.1% (*n* = 38)/respective mortality rates: 58.0% (*n* = 31); 52.9% (*n* = 34); 21.4% (*n* = 56); 32.9% (*n* = 76); 27.5% (*n* = 91); 6.9% (*n* = 101); and 9.1% (*n* = 22)\]. After adjusting for host and fungal factors, compliance with the bundles was not an independent factor associated with clinical success (adjusted OR 3.93, 95% CI 0.90--17.17) or improved survival (adjusted OR 0.15, 95% CI 0.07--1.50). The small number of compliant patients might have caused the negative result. If the element of oral switch was excluded from the assessment of bundle compliance, improved clinical success (adjusted OR 4.42, 95% CI 2.05--9.52) and mortality (adjusted OR 0.27, 95% CI 0.13--0.57) were confirmed in compliant patients (Table [4](#DKU414TB4){ref-type="table"}). Independent bundle elements that contributed to clinical success were the removal of CVCs within 24 h after confirmation of candidaemia, assessment of clinical efficacy on the third to the fifth day to consider the necessity of alternative antifungals, and at least 2 weeks of therapy after clearance of *Candida* from the bloodstream (Table [5](#DKU414TB5){ref-type="table"}). As regards mortality, the removal of CVCs within 24 h, at least 2 weeks of therapy and step-down oral therapy were independent elements that were statistically associated with improved survival (Table [5](#DKU414TB5){ref-type="table"}). To correct for selection bias by patients who died before the latter two bundle elements were reached, we separately analysed the effect of bundle compliance in patients who survived \>28 days. Table 4.Impact of compliance with the bundles on clinical outcomes in patients with candidaemiaDefinition of complianceClinical successMortalitypatients with compliancepatients without compliancecrude OR (95% CI)adjusted OR (95% CI)patients with compliancepatients without compliancecrude OR (95% CI)adjusted OR (95% CI)no. of patients (%)no. of patients (%)Achievement of all evaluable bundle elements39/42 (92.9)429/566 (75.8)4.15 (1.26--13.7)3.93 (0.90--17.17)2/24 (8.3)125/455 (27.5)0.24 (0.06--1.04)0.15 (0.07--1.50)Achievement of all evaluable bundle elements except oral switch121/130 (93.1)347/478 (72.6)5.08 (2.50--10.29)4.42 (2.05--9.52)10/97 (10.3)117/383 (30.5)0.26 (0.13--0.52)0.27 (0.13--0.57) Table 5.Impact of individual bundle elements on clinical outcomes in patients with candidaemia: univariate and multivariate analysesKey bundle elementsClinical successMortalitypatients who achieved the elementpatients who did not achieve the elementcrude OR (95% CI)adjusted OR (95% CI)patients who achieved the elementpatients who did not achieve the elementcrude OR (95% CI)adjusted OR (95% CI)no. of patients (%)no. of patients (%)Removal of CVCs within 24 h336/414 (81.2)60/96 (62.5)2.59 (1.60--4.18)2.97 (1.51--5.85)72/329 (21.9)35/82 (42.7)0.38 (0.23--0.63)0.41 (0.23--0.74)Appropriate initial selection of antifungals425/534 (79.6)43/74 (58.1)2.81 (1.69--4.67)---112/424 (26.4)15/55 (27.3)0.96 (0.51--1.80)---Appropriate dosing375/464 (80.8)93/144 (64.6)2.31 (1.53--3.49)---98/372 (26.3)29/107 (27.1)0.96 (0.59--1.56)---Assessment of clinical efficacy on the third to fifth day431/514 (83.9)37/94 (39.4)8.00 (4.97--12.87)5.53 (2.54--12.04)92/406 (22.7)35/73 (47.9)0.32 (0.19--0.53)---At least 2 weeks of therapy after clearance of *Candida* from bloodstream302/327 (92.4)166/281 (59.1)8.37 (5.22--13.42)4.65 (2.35--9.19)32/256 (12.5)95/223 (42.6)0.19 (0.12--0.30)0.23 (0.13--0.40)Ophthalmological examinations281/326 (86.2)187/282 (66.3)3.17 (2.13--4.73)---47/259 (18.1)80/220 (36.4)0.39 (0.26--0.59)---Follow-up blood cultures318/368 (86.4)150/240 (62.5)3.87 (2.57--5.67)---60/292 (20.5)67/187 (35.8)0.46 (0.31--0.70)---Step-down oral therapy133/148 (89.9)335/460 (72.8)3.31 (1.87--5.86)---13/108 (12.0)114/371 (30.7)0.31 (0.17--0.57)0.34 (0.15--0.76) Even in patients surviving \>28 days, compliance of the bundles except oral switch improved clinical efficacy \[compliance 97.7% versus non-compliance 86.6% (*P* = 0.004)\] and was an independent predictor of clinical success (adjusted OR 5.245, 95% CI 1.194--23.043). In addition, the beneficial effect was confirmed in individual elements to be achieved after initiation of therapy. Assessment on the third to the fifth day \[94.3% versus 50.0% (*P* \< 0.001)\], at least 2 weeks of therapy \[96.0% versus 78.1% (*P* \< 0.001)\], ophthalmological examination \[93.9% versus 82.9% (*P* = 0.001)\] and follow-up blood culture \[94.0% versus 80.8% (*P* \< 0.001)\] significantly increased the clinical success rate in patients surviving \>28 days. Independent bundle elements associated with clinical success were assessment on the third to the fifth day (adjusted OR 9.347, 95% CI 3.158--27.668) and at least 2 weeks of therapy after clearance of *Candida* from the bloodstream (adjusted OR 2.754, 95% CI 1.027--7.387). Discussion {#s4} ========== To the best of our knowledge, this is the first study to confirm the beneficial impact of 'bundles' on clinical outcomes in patients with candidaemia. In a similar study, Antworth *et al*.^[@DKU414C12]^ developed a candidaemia care bundle incorporating key elements from the guidelines for the management of candidemia.^[@DKU414C6]^ However, no significant differences in clinical outcomes were identified in their study. In ACTIONs bundles, independent individual elements that contributed to clinical success in patients with candidaemia were the removal of CVCs within 24 h of diagnosis, assessment of clinical efficacy on the third to the fifth day and at least 2 weeks of therapy after the clearance of candidaemia. In candidaemia without documented organ involvement, treatment aims were to clear the infection and at the same time to avoid deep-organ involvement caused by metastatic infectious foci. This can be achieved by treatment for 2 weeks after the end of candidemia.^[@DKU414C7]^ Although Oude Lashof *et al*.^[@DKU414C13]^ failed to demonstrate a correlation between the duration of antifungal treatment and the development of late complications in patients with candidaemia, this recommendation is based on the results of several prospective, randomized trials in which this rule has been successfully applied, and it is generally associated with few complications and relapses.^[@DKU414C14]--[@DKU414C16]^ The higher success rate and improved survival rate achieved by the removal of CVCs are consistent with other published studies^[@DKU414C17],[@DKU414C18]^ and a recent meta-analysis.^[@DKU414C5]^ The ACTIONs Project Committee recommended that alternative antifungal therapy should be considered in patients with no clinical improvement or based on identified *Candida* species on the third to the fifth day after starting initial therapy. Hsu *et al*.^[@DKU414C19]^ reported that a higher overall response rate was obtained in patients with early initiation (within 72 h of positive culture) of an echinocandin; they recommended that the clinical response be assessed on the third day in patients with initial fluconazole therapy, and an echinocandin is preferred as an alternative therapy in patients with a poor response. In patients with a poor clinical response to initial antifungals, overall treatment was judged to be successful if a favourable clinical response was obtained with alternative therapy. With early alternative therapy, initial inappropriate selection of antifungals might not have affected clinical outcomes in our study. Poor prognosis as a result of initial inappropriate therapy was demonstrated in patients with septic shock^[@DKU414C20]^ and was closely related to the severity of infection. However, patient severity ranged from mild to fatal in our study. Kollef *et al*.^[@DKU414C18]^ demonstrated that concurrent performance of early appropriate therapy and adequate source control were required to improve survival among patients with septic shock caused by candidaemia. The presence of both delayed antifungal administration and inadequate source control had a risk of mortality similar to the presence of either one of these variables alone. ESCMID guidelines^[@DKU414C7]^ suggest simplification of treatment by stepping down to an oral azole if the patient is stable and tolerates the oral route, and if the species is susceptible. Step-down oral therapy could have benefits, such as reduced use of intravenous catheters, earlier patient discharge and cost savings.^[@DKU414C21],[@DKU414C22]^ We demonstrated a significantly higher clinical success rate and lower mortality rate in patients with adherence to step-down oral therapy. As step-down therapy was indicated in patients with a favourable course, the results should be interpreted with caution. Owing to the small number of compliant patients, compliance with the bundles failed to be an independent factor associated with favourable clinical outcomes. Upon exclusion of the element of oral switch, compliance was revealed to have a beneficial effect on clinical outcomes. The bundle approach is also a useful way to assess the present status of guideline adherence.^[@DKU414C10]^ However, even when compliance was defined as achievement of all bundle elements except step-down oral therapy, the rate remained 21.4%. We regarded this value as the baseline, and intend to compare it with the compliance rate in a future follow-up study to ensure the effect of the project. In the case of severe sepsis bundles, Levy *et al*.^[@DKU414C10]^ reported that the compliance rate of the resuscitation bundle was 10.9% in the first quarter and increased over time. The other components for which the achievement rate was relatively low were ophthalmological examination, follow-up blood cultures and at least 2 weeks of therapy after clearance of *Candida* from the bloodstream. Considering the high ocular involvement in patients with candidaemia,^[@DKU414C23]^ a more vigorous promotion of ophthalmological examination should be considered. The recommendation of follow-up cultures is difficult to accept by general physicians in patients whose symptoms have already resolved when candidaemia is diagnosed. In such patients, 2 weeks of therapy is performed without confirmation of the end of candidaemia. Certain limitations must be considered in interpreting these findings. Firstly, as the main participants were certified infection control doctors and participation was entirely voluntary, the compliance rates for bundles are not necessarily representative of those by general clinicians, and the universality of our findings is therefore speculative. Secondly, as participants judged the appropriateness of antifungal selection according to the recommendations described in the checklist, the committee did not have detailed information on how they judged this item. Thirdly, the small number of patients who achieved step-down oral therapy might have caused a negative result in compliant patients. To confirm the usefulness of compliance with the bundles, an increase in the achievement of this item is required. Finally, a cluster randomized trial including hospitals with and without the bundles would provide better scientific evidence. In conclusion, the introduction of a multifaceted performance improvement initiative with bundles was useful in the treatment of candidaemia. Although the efficacy of bundles should be evaluated in more rigorous studies, promotion of the bundle approach may have the potential to narrow the gap between clinical evidence and bedside practice. Funding {#s5} ======= This study was supported by internal funding. Transparency declarations {#s6} ========================= Y. T. has received grant support from Pfizer Japan Inc., MSD K.K., Astellas Pharma Inc., Dainippon Sumitomo Pharma, Shionogi & Co., Ltd and Takeda Pharmaceutical Co., Ltd, and payment for lectures from Pfizer Japan Inc., Astellas Pharma Inc., Daiichi Sankyo Co., Ltd, Meiji Seika Pharma Co., Ltd, MSD K.K., Taisho Toyama Pharmaceutical Co., Ltd and Dainippon Sumitomo Pharma. S. T. has received grant support from Pfizer Japan Inc. and Shionogi & Co., Ltd, and payment for lectures from Pfizer Japan Inc., Shionogi & Co., Ltd, Astellas Pharma Inc., Daiichi Sankyo Co., Ltd, MSD K.K. and Dainippon Sumitomo Pharma. Y. K. has received grants and payment for lectures from Pfizer Japan Inc. S. K. has received grants from Pfizer Japan Inc., MSD K.K., Astellas Pharma, Inc., Dainippon Sumitomo Pharma Co., Ltd, Taisho Toyama Pharmaceutical Co., Ltd, Daiichi Sankyo Co., Ltd, Meijiseika Pharma Co., Ltd, Takeda Pharmaceutical Company Limited, Shionigi & Co., Ltd, Chugai Pharmaceutical Co., Ltd, AstraZeneca, Eisai Co., Ltd, Otsuka Pharmaceutical Co., Ltd, Ono Pharmaceutical Co., Ltd and Taiho Pharmaceutical Co., and payment for lectures from Taisho Toyama Pharmaceutical Co., Ltd, Daiichi Sankyo Co., Ltd, Boehringer Ingelheim, Chugai Pharmaceutical Co., Ltd, Toyama Chemical Co., Ltd and Shionogi & Co., Ltd. All other authors: none to declare. We are very grateful to the following participants who registered data in the ACTIONs bundles project: A. Masuda (Kumamoto Central Hospital), C. Yoshida (National Hospital Organization Minami-Okayama Medical Center), C. Yasunaga (Kidney Center, Saiseikai Yahata Hospital), C. Yamashita (Fujita Health University School of Medicine), E. Nakataki (Tokusima University Hospital), H. Ohyagi (Hiraka General Hospital), H. Yagi (Department of Hematology, Nara Hospital, Kinki University School of Medicine), H. Johnai (Nishibeppu National Hospital), H. Murai (Hiroshima University Hospital), H. Hanamoto (Department of Hematology, Nara Hospital, Kinki University School of Medicine), I. Nakamura (Nagahama Red Cross Hospital), I. Sanada (Department of Hematology, Arao Municipal Hospital), I. Tandai (Department of Plastic and Reconstructive Surgery, Asahikawa Red Cross Hospital), J. Kuroki (Yuri-Kumiai General Hospital), J. Ogawa (Respiratory Organs Department, Kitakami Saiseikai Hospital), K. Kawahara (Japanese Red Cross Society Fukuoka Hospital), K. Amino (Nishinomiya Municipal Center Hospital), K. Nakajima (Department of Infection Control and Prevention, Hyogo College of Medicine), K. Yoshimoto (Fuji City General Hospital), K. Takeda (Department of Pharmacy, Maizuru Kyosai Hospital), K. Nakamura (Department of Gastroenterology, Kyoto Renaiss Hospital), K. Suzuki (Isesaki Municipal Hospital), K. Yamada (Mutsu General Hospital), M. Aizawa (Nankai Medical Center), M. Hashimoto (Yuri-Kumiai General Hospital), M. Ogata (Oshu City Mizusawa Hospital), M. Shirano (Osaka City General Hospital), M. Kawada (Saitama City Hospital), M. Kaneda (Kitasato Tustitue Hospital), M. Yoshioka (Department of Pharmacy, Takarazuka City Hospital), N. Okuda (Tokusima University Hospital), N. Sugita (Ayabe City Hospital), N. Kikuchi (National Hospital Organization Kasumgamura Medical Center), S. Fuke (KKR Sapporo Medical Center), S. Tsuchihashi (Sapporo Hokuyu Hospital), S. Sugitani (Japanese Red Cross Society Wakayama Medical Center), S. Ikuta (Meiwa Hospital), S. Honda (Nishinihon Hospital), T. Nei (Department of Respiratory Medicine, Nippon Medical school), T. Iwamura (Junwakai Memorial Hospital), T. Yagi (Department of Infection Diseases, Nagoya University Graduate School of Medicine), T. Kaji (Mitoyo General Hospital), Y. Ichimiya (Eniwa Daiichi Hospital), Y. Kobayashi (Hakodate Shintoshi Hospital), Y. Minamishima (Koga Geueyar Hospital), Y. Goto (Nagato Memorial Hospital), Y. Hatano (Yamamoto Kumiai General Hospital), Y. Nagao (Medical Corporation Seikouen Shirakawa Hospital) and Y. Yamagishi (Aichi Medical University Hospital), J. Sashihara (Kansai Rosai Hospital), A. Tsukamoto (National Sanatorium Kikuchi Keifuen), T. Kawaoka (Ube Industries Central Hospital), M. Kobayashi (Department of Innovative Surgery and Surgical Techniques Development, Mie University Graduate School of Medicine). In addition, we thank Pfizer Japan Inc. for their support on briefing sessions for the awareness of an activity of the bundles for candidaemia. [^1]: Other members are listed in the Acknowledgements section. [^2]: bid, twice a day; qid, four times a day.
State of the art and perspectives for the delivery of antisense oligonucleotides and siRNA by polymeric nanocarriers. Knocking down gene expression using either antisense oligonucleotides (AS-ODNs) or small interfering RNA (siRNAs) has raised a lot of interest in designing new pathways for therapeutics. Despite their potentialities, these negatively charged and hydrophilic molecules request chemical modifications or a carrier that allows cell recognition, cell internalization and moreover subcellular penetration. Although chemical modifications were brought to the basic AS-ODNs and siRNAs, their sensitivity to degradation and poor intracellular penetration is still hampering their clinical applications. We present here the potentialities of polymeric carriers or the use of alternative administration route such as oral, ocular and skin delivery to improve their delivery and to circumvent the hurdles for their clinical applications.
This invention relates to Reed-Solomon error-correction codes (RS ECC) and, more particularly, to systems and methods for implementing the RS ECC receive-side operations. Electronic information is increasingly being relied upon as a preferred medium for conducting business and/or personal transactions. As a result, demands for even better information storage and/or communication technologies are also increasing. The advances in this area of technology are apparent in telecommunication and information storage devices, where developments in throughput and storage density are allowing users to process information at much greater rates and quantities than before. To guarantee some degree of information integrity, many communications and storage devices include error-correction technologies. Such technologies generally involve configuring information in a way that allows the information to be recoverable even when parts of the information are altered or missing. In error-correction, this process of configuring information is referred to as “encoding,” and the counterpart process of recovering information is referred to as “decoding.” Therefore, unless otherwise specified, the term “coding” will be used herein to refer to a particular way of encoding and decoding information. In the field of error-correction codes (ECC), of particular note is the Reed-Solomon (RS) error-correction code. Since its discovery, the Reed-Solomon ECC has had a profound impact on the information industry in terms of shaping consumer expectations. In modern day applications, the Reed-Solomon ECC can be found in everyday devices such as the compact disk players, where RS ECC technology has helped to provide high quality audio playback even from scratched CD surfaces. Despite its effectiveness, the suitability of the Reed-Solomon ECC in certain applications may be limited by practical considerations. RS ECC encoding and decoding techniques are relatively complex, and practical issues generally concern whether RS ECC operations can be completed in the time and using the resources allotted by an application. Interestingly, when the RS ECC was first developed, processing technology had not yet developed to the point where applying the RS ECC in consumer devices was practical. Although technology for implementing RS ECC has improved greatly since then, technological improvements in applications that benefit from RS ECC have also kept pace. Accordingly, allowances of time, power, and/or hardware resources for RS ECC in modern applications continue to become more stringent. Developments in coding theory continue to improve the capabilities of the RS ECC. In conjunction with these efforts, device and architectural improvements in implementation continue to aid its application to conventional and emerging electronic devices. Accordingly, there is continued interest in improving the Reed-Solomon error-correction code on both a theoretical and a practical level.
ed without replacement from {d: 1, e: 2, v: 1, n: 2}. 1/20 Four letters picked without replacement from {n: 1, d: 4, r: 3}. What is prob of picking 4 d? 1/70 Two letters picked without replacement from {p: 4, s: 4, q: 2, f: 3, t: 3, k: 1}. What is prob of picking 1 p and 1 t? 3/34 Two letters picked without replacement from pkkvucvckptt. Give prob of picking 2 t. 1/66 What is prob of picking 1 j, 1 d, and 2 y when four letters picked without replacement from ooyddoddodjyddddd? 1/238 What is prob of picking 3 e when three letters picked without replacement from afmemaaeed? 1/120 Calculate prob of picking 3 l when three letters picked without replacement from {m: 3, l: 5}. 5/28 Calculate prob of picking 1 f and 1 u when two letters picked without replacement from {f: 1, h: 12, u: 3}. 1/40 Three letters picked without replacement from wdydwgfv. Give prob of picking 2 d and 1 y. 1/56 Calculate prob of picking 1 s, 1 h, and 1 i when three letters picked without replacement from {t: 1, i: 2, q: 6, s: 2, h: 1}. 1/55 Two letters picked without replacement from udumadaajumumduddma. Give prob of picking 1 m and 1 j. 4/171 Four letters picked without replacement from {j: 11, a: 1, p: 2}. What is prob of picking 3 j and 1 a? 15/91 Calculate prob of picking 1 n and 2 j when three letters picked without replacement from jnnnnjjnjjjnjn. 21/52 Calculate prob of picking 1 i, 1 v, and 1 p when three letters picked without replacement from {i: 1, v: 2, p: 1, y: 1}. 1/5 What is prob of picking 4 l when four letters picked without replacement from {l: 1, u: 1, q: 2, i: 1, e: 4}? 0 Two letters picked without replacement from epppalepeeaap. Give prob of picking 1 p and 1 a. 5/26 What is prob of picking 2 c when two letters picked without replacement from {h: 2, c: 16}? 40/51 Two letters picked without replacement from zqyiy. Give prob of picking 2 y. 1/10 What is prob of picking 3 m when three letters picked without replacement from mmmmmmm? 1 Calculate prob of picking 2 j and 1 d when three letters picked without replacement from {d: 5, j: 2}. 1/7 Calculate prob of picking 1 w, 2 d, and 1 u when four letters picked without replacement from dwbbududuwubbbd. 16/455 Four letters picked without replacement from {n: 2, m: 6, q: 1, e: 4, t: 4, p: 3}. What is prob of picking 2 t, 1 p, and 1 e? 24/1615 Two letters picked without replacement from vvvv. What is prob of picking 2 v? 1 Three letters picked without replacement from {h: 2, a: 2, m: 2, k: 8, y: 2}. What is prob of picking 2 y and 1 h? 1/280 What is prob of picking 2 b and 2 e when four letters picked without replacement from egebegtxbxxgbv? 9/1001 Four letters picked without replacement from hhizdhhdhhihhzih. What is prob of picking 4 h? 9/130 Calculate prob of picking 2 f when two letters picked without replacement from {q: 3, f: 3}. 1/5 What is prob of picking 1 v and 1 g when two letters picked without replacement from {y: 2, g: 2, v: 7, s: 1}? 7/33 What is prob of picking 1 m and 2 z when three letters picked without replacement from kkkmtkklkmmkzkpzkk? 1/272 Calculate prob of picking 2 o when two letters picked without replacement from {e: 1, x: 2, o: 2, w: 1}. 1/15 Three letters picked without replacement from ggiegssgtennngeeggie. Give prob of picking 1 i and 2 t. 0 Three letters picked without replacement from mtmmaaw. Give prob of picking 2 m and 1 t. 3/35 What is prob of picking 1 j and 1 t when two letters picked without replacement from jjbt? 1/3 Calculate prob of picking 1 q, 2 m, and 1 w when four letters picked without replacement from {q: 1, w: 1, m: 5, e: 1, j: 6, o: 3}. 1/238 What is prob of picking 1 r and 1 f when two letters picked without replacement from {r: 3, p: 2, f: 4, h: 2}? 12/55 What is prob of picking 2 u, 1 y, and 1 v when four letters picked without replacement from {u: 7, v: 4, y: 5}? 3/13 Calculate prob of picking 2 z and 1 e when three letters picked without replacement from {n: 9, e: 6, z: 2}. 3/340 Four letters picked without replacement from {d: 2, v: 5, r: 2, b: 1, h: 4, m: 1}. What is prob of picking 3 h and 1 m? 4/1365 Three letters picked without replacement from jqdiqi. What is prob of picking 1 d and 2 q? 1/20 Calculate prob of picking 1 p and 2 a when three letters picked without replacement from vvkanap. 1/35 Two letters picked without replacement from {l: 3, o: 5}. Give prob of picking 1 o and 1 l. 15/28 Two letters picked without replacement from tttiell. What is prob of picking 1 t and 1 i? 1/7 What is prob of picking 1 h and 2 j when three letters picked without replacement from jjjhjjhhhh? 5/12 Four letters picked without replacement from {m: 7}. What is prob of picking 4 m? 1 Four letters picked without replacement from {m: 1, y: 3, a: 1, j: 5, v: 2}. Give prob of picking 2 j and 2 v. 2/99 Calculate prob of picking 1 x and 1 p when two letters picked without replacement from {a: 3, x: 2, p: 4, f: 2, q: 1}. 4/33 Calculate prob of picking 1 o and 2 x when three letters picked without replacement from vdxxxdddvdxdvxod. 1/56 Calculate prob of picking 1 x and 1 q when two letters picked without replacement from {x: 1, s: 1, w: 1, t: 1, q: 1}. 1/10 Three letters picked without replacement from jjajtjjaaja. Give prob of picking 3 j. 4/33 Two letters picked without replacement from {z: 12, m: 3}. Give prob of picking 2 z. 22/35 Calculate prob of picking 1 n, 1 l, and 1 d when three letters picked without replacement from nddl. 1/2 Four letters picked without replacement from {j: 2, b: 7, l: 5}. What is prob of picking 2 l and 2 b? 30/143 Calculate prob of picking 1 c and 1 f when two letters picked without replacement from ccffuuuckfucfuffuc. 10/51 Calculate prob of picking 1 o, 1 a, and 1 e when three letters picked without replacement from {f: 1, e: 2, y: 3, o: 3, a: 1}. 1/20 Two letters picked without replacement from {z: 2, j: 10}. Give prob of picking 1 z and 1 j. 10/33 What is prob of picking 1 d and 1 f when two letters picked without replacement from {l: 1, w: 2, a: 1, f: 4, d: 1}? 1/9 Calculate prob of picking 3 l when three letters picked without replacement from llla. 1/4 Four letters picked without replacement from mmumummmmum. Give prob of picking 3 u and 1 m. 4/165 What is prob of picking 1 k and 1 q when two letters picked without replacement from {y: 2, p: 1, v: 2, q: 2, k: 4, a: 1}? 4/33 Calculate prob of picking 2 b and 1 l when three letters picked without replacement from {l: 5, b: 7}. 21/44 Four letters picked without replacement from {e: 1, d: 6, u: 1, v: 1, y: 4, k: 2}. Give prob of picking 1 e, 1 y, 1 u, and 1 d. 8/455 What is prob of picking 1 f and 1 u when two letters picked without replacement from {f: 3, i: 1, s: 5, u: 1}? 1/15 Two letters picked without replacement from {j: 2, e: 3, c: 3}. Give prob of picking 1 e and 1 j. 3/14 What is prob of picking 2 h, 1 z, and 1 a when four letters picked without replacement from dhzhaah? 6/35 Two letters picked without replacement from {l: 7, d: 5, g: 1}. Give prob of picking 1 d and 1 g. 5/78 Calculate prob of picking 1 w and 2 t when three letters picked without replacement from {w: 2, t: 9}. 24/55 Calculate prob of picking 3 g and 1 w when four letters picked without replacement from wggwbwwgbggbgggbg. 12/85 Two letters picked without replacement from yqqpmdyuqmpq. Give prob of picking 2 q. 1/11 Calculate prob of picking 1 b and 1 c when two letters picked without replacement from {c: 1, e: 1, g: 1, b: 1, k: 2, q: 2}. 1/28 What is prob of picking 1 e, 1 z, and 1 g when three letters picked without replacement from emmzgbgeoegg? 3/55 Calculate prob of picking 2 w and 1 f when three letters picked without replacement from wwwwfwwwwwwfwwwf. 117/280 Four letters picked without replacement from {r: 3, x: 3}. What is prob of picking 3 x and 1 r? 1/5 What is prob of picking 4 b when four letters picked without replacement from {b: 5}? 1 Calculate prob of picking 1 y and 1 k when two letters picked without replacement from {k: 1, j: 1, s: 1, y: 2, z: 1, v: 2}. 1/14 Two letters picked without replacement from {f: 3, e: 6, o: 1, c: 1, d: 8}. Give prob of picking 2 d. 28/171 What is prob of picking 1 m and 1 x when two letters picked without replacement from xxlgxdxllsml? 2/33 Four letters picked withou
Q: Modifying data and log file properties using SMO I have been trying to automate some of SQL Server's post-install configuration settings for a bunch of servers. One of the task is to change database files' default growth and growthtype from percent to KB/MB. For the test, I'll just use a single instance and a test database. This is what I have come up with so far. $sqlServer = "SQLSVRNM\INSTNM" #Load SqlServer SMO assembly [void][Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SMO") #Connect to the instance using SMO $smosvr = New-Object Microsoft.SqlServer.Management.Smo.Server $sqlServer #Filter database, assign db properties to variable $database = $smosvr.databases | where name -eq "testdb" #Check database size $dbsize = $database.size #Check database name $name = $database.name #Get logfile properties $logfile = $database.logfiles #Get logfile name $logfileName = $logfile.filename #Get file growth val $logfileGrowth = $logfile.growth #Get growthtype $logfileGrowthtype = $logfile.growthtype #Get logfile size $logfileSize = $logfile.size When I set the new growth size using $logfile.growth = [double](2.0 * 32.0) I get the following error. The property 'growth' cannot be found on this object. Verify that the property exists and can be set. At line:1 char:1 + $logfile.growth = [double](2.0 * 32.0) + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : InvalidOperation: (:) [], RuntimeException + FullyQualifiedErrorId : PropertyAssignmentException But, if I do a get-member on $logfile, the properties exist. $logfile | Get-Member -Name Growth* TypeName: Microsoft.SqlServer.Management.Smo.LogFile Name MemberType Definition ---- ---------- ---------- Growth Property double Growth {get;set;} GrowthType Property Microsoft.SqlServer.Management.Smo.FileGrowthType GrowthType {get;set;} So, can someone help me understand what I might be missing here? Thanks! A: $logfile in your code is a collection. Even if there's only one you have to break it out to set the properties
from typing import Optional, Any from interpret_text.experimental.common.model_config.base_model_config import BaseModelConfig class IntrospectiveRationaleModelConfig(BaseModelConfig): """ Model configuration used by Introspective Rationale Model """ embedding_dim: Optional[int] hidden_dim: Optional[int] gen_embedding_dim: Optional[int] dropout_rate: Optional[float] layer_num: Optional[int] bert_explainers: Optional[bool] # used only by RNN embedding_path: Optional[str] label_embedding_dim: Optional[int] fixed_classifier: Optional[bool] # lambas for loss function lambda_sparsity: Optional[float] lambda_continuity: Optional[float] lambda_anti: Optional[float] # target_sparsity is the desired sparsity ratio target_sparsity: Optional[float] # this is the target number of target continuous pieces # it has no effect now, because lambda_continuity is 0. count_pieces: Optional[int] # rate at which the generator explores different rationales exploration_rate: Optional[float] # multiplier to reward/penalize an accuracy gap between the classifier # and anti-classifier lambda_acc_gap: Optional[float] # learning rate lr: Optional[float] # whether to tune the weights of the embedding layer in the RNN classifier module # many of these weights are from passed in glove embeddings, but # it could be useful to fine tune those weights that did not inherit glove vector values fine_tuning: Optional[bool] # training parameters train_batch_size: Optional[int] test_batch_size: Optional[int] # stop training if validation acc does not improve for more than # training_stop thresh training_stop_thresh: Optional[int] # the numerical labels for classification # ex: MNLI needs [0, 1, 2, 3, 4] labels: Optional[Any] # for saving models and logging save_best_model: Optional[bool] model_prefix: Optional[str] save_path: Optional[str] model_folder_path: Optional[str]
[Adaptive significance of the ciradian rhythm of oviposition in Drosophilidae: comparison of eight species of the genus Zaprionus]. The circadian rhythm of oviposition under light conditions LD 12:12 was studied in eight species of Zaprionus. Interspecific differences proved to be of little importance. In all cases, the maximum of egg production took place at the beginning of the photophase and egg laying was often restricted to a few hours. Such a rhythm is highly different from that observed, in a previous work, among the Drosophila species of the melanogaster subgroup.
Q: C++ Regex infinite loop I'm writing a c++ program that regex's to find the cells mentioned in a give excel range string e.g. $C$5 $CC$4 $C$5:$F$89 because of the need to either match only once (i.e only one cell is being mentioned in the string) or twice (i.e. for when two cells are mentioned in the string; its a range) I have designed my program as thus: //get the cell being mentioned std::regex regx("\\$(\\w+)\\$(\\d+)"); std::smatch match; //match[0] = whole match (only useful for debug) //match[1] = first cell col letter ; match[2] = first cell row numb //match[3] = second cell col letter; match[4] = second cell row numb /*vectors for putting columns and rows values extracted in the while loop into*/ std::vector<std::string> vecCol; std::vector<std::string> vecRow; //put all substring matches into a vector - This loop runs infinitely while (std::regex_search(inString.begin(),inString.end(), match, regx)) { std::cout << match[0] << "\n"; //add them to the vecs vecCol.push_back(match[1].str()); vecRow.push_back(match[2].str()); } the while loop causes an issue I don't quite understand; it gets trapped in an infinite loop and continues to add in the same substring match (e.g. C4) each time round infinitely. this happens even if there is only one cell mentioned in the string that is passed in Please can anyone explain what I'm getting wrong with this C++ regex? A: Inside your while loop, you do not change the inString, nor are you using an iterator that would move the regex index, so you constantly get one and the same match, and there is no break condition inside the loop. Use while (std::regex_search(inString, match, regx)) { std::cout << match[0] << "\n"; vecCol.push_back(match[1].str()); vecRow.push_back(match[2].str()); inString = match.suffix().str(); See the C++ demo. Output: $C$5 and $F$89. Note it will change inString. If you do not want it, use the sregex_iterator: for(std::sregex_iterator i = std::sregex_iterator(inString.begin(), inString.end(), regx); i != std::sregex_iterator(); ++i) { std::smatch match = *i; std::cout << "Whole match: " << match.str() << ", Group 1: " << match.str(1) << ", and Group 2: " << match.str(2) << '\n'; //add them to the vecs vecCol.push_back(match.str(1)); vecRow.push_back(match.str(2)); } See the C++ demo, output: Whole match: $C$5, Group 1: C, and Group 2: 5 Whole match: $F$89, Group 1: F, and Group 2: 89
Q: Using a for loop to imitate a select statement outputs uneven columns when colors added I have an array of over 100 elements. I need a menu to list these elements and then I need to select one of these elements for use further into the script. Easy enough.. select opt in "${menu[@]}"; do case $REPLY in [0-9]*) # do stuff with $opt esac done But as far as I can tell, other than $COLULMN width, there seems to be no way of customizing the way select outputs a menu. So I thought I'd use a for loop to imitate select and add a little bit of color to the menu. #!/usr/local/bin/bash bold(){ printf '%b' "\033[38;1m$@\033[0m" } mapfile -t options < <(gshuf -n50 /usr/share/dict/words) n=${#options[@]} i=0 until [[ $i -eq $n ]]; do for opt in "${options[@]}"; do i=$((i+1)) bold "$i) " echo "$opt" done done | column This does allow me to colorize the menu but it also messes up the columns structure For example, this is how it would look with without color 1) sowt 40) priorate 79) Arakanese 2) pachysomia 41) poudrette 80) mesenchyma 3) somnivolency 42) magnifice 81) deconsideration 4) gargoyle 43) cautionry 82) meliorable and this is how looks with color 1) sowt 40) priorate 79) Arakanese 2) pachysomia 41) poudrette 80) mesenchyma 3) somnivolency 42) magnifice 81) deconsideration 4) gargoyle 43) cautionry 82) meliorable Can someone tell me why this is happening and is there a way to simply colorize the numbers of a numbered list without breaking the columns/formatting etc? Is it is possible to do this with select? That would be ideal. A: Seems like the column command doesn't know the escape sequences takes no space in the output, but you can use sed to add the sequences after the column command, for example: shuf -n 50 /usr/share/dict/words \ | nl -nln -s") " -w1 \ | column \ | sed "s/[0-9]\+/$(tput bold)&$(tput sgr0)/g" Or: shuf -n 50 /usr/share/dict/words \ | nl -nln -s") " -w1 \ | column -c $COLUMNS \ | sed "s/[0-9]\+/$(tput bold)&$(tput sgr0)/g"
Surface organometallic chemistry of main group elements: selective synthesis of silica supported [triple bond Si-OB(C(6)F(5))(3)](-)[HNEt(2)Ph](+). The reaction of the Lewis acid B(C(6)F(5))(3) with silanol groups of silica surfaces, dehydroxylated at different temperatures (300, 500, 700, and 800 degrees C), has been investigated in presence of the Brønsted base NEt(2)Ph. The structure of the resulting modified silica supports [triple bond Si-OB(C(6)F(5))(3)](-)[HNEt(2)Ph](+) (1) has been carefully identified by IR and multinuclear solid-state NMR spectroscopies, isotopic (2)H and (18)O labeling, elemental analysis, molecular modeling, and comparison with synthesized molecular models. Highly dehydroxylated silica surfaces were required to transform selectively each silanol group into unique [triple bond Si-OB(C(6)F(5))(3)](-)[HNEt(2)Ph](+) fragments. For lower dehydroxylation temperatures, two sorts of surface sites were coexisting on silica: the free silanol groups [triple bond SiOH] and the ionic species 1.
Six things I have learnt (so far) at NetFinance 2015 Related Topics Share For the last couple of days I have been at the NetFinance 2015 conference in Miami. I was privileged to be able to speak on the first morning (the pic above!) on the challenges and opportunities of delivering digital customer experiences in financial services, but wanted to focus this post more on the things I've been hearing from the speakers and in conversations with digital and experience leaders at major banks and financial institutions, including USAA, BBVA, Citi, US Bank, Schwab and many others. #1: The digital experience is front and center. I started my presentation with a premise that delivering great digital customer experiences is central for Financial Institutions to thrive, and highlighted that recently banks had been on a buying spree, snapping up digital design firms (Capital one acquired Adaptive Path and BBVA, SpringStudio). Across all the presentations and discussions these themes came out very strongly. In previous years a lot of the conversation was specifically on certain growth areas, such as mobile, technology integration or customer acquisition strategies. This year, it was really focused on, 'how do we change how we do things to deliver a great customer experience on all devices and channels?' And, repeatedly, speakers were seeing customer experience as a key differentiator for their brand. Building on this trend, in an interesting case study, Rick Paster from Citi shared how working in a co-creation model with customers had led to a better prioritizing of features and hence design for Citi's card customer experience. #2 Customer expectations exceed the industry. Another strong theme that emerged across multiple speakers was that customer expectations were already way-ahead of financial institutions' ability to deliver digital experiences. Customers expect to be able to do most things online. They expect their FI to already know about them. They expect their experiences to be consistent on mobile, desktop, or in-person. And for the call center to understand all the above. Alejandro Carriles from BBVA argued that we should be not comparing to competitors, but against where customers spend their time online. So, more Facebook and less CompetitorBank. His question "When was the last time you saw that google.com was 'down for maintenance'"? #3 Omni-channel barriers are self imposed. In moving to a seamless experience across devices and channels, speakers highlighted many issues that add friction for users. Why, for example, once you are a bank customer do you need to "enroll" for online banking, or to use the mobile app, when the bank already knows what it needs to know? Gareth Gaston from US bank shared a number of fascinating omni / cross channel experience customer flows and challenged the audience using an airline example - once you have bought your ticket (online) you don't need to enroll to use the kiosk at the airport. #4 Compliance is the boogeyman? The financial industry is highly regulated and internal compliance controls on marketing and product delivery are critical. In the panel discussions it did not take long for internal compliance issues to be raised as a challenge in delivering digital experience innovation. And, once that issue was raised, many more examples were then shared. But, a few speakers suggested approaches that had worked for them in addressing this issue. Most of these focused on involving compliance teams in the creation process very early, bringing out their creativity in how to gain compliance, rather than the compliance team being just a final hurdle to jump in the innovation process. And, most speakers seemed to agree that once competitors had done something first, compliance tended to ease! #5 Branches, maybe less important? Accenture shared some of the findings from their 2015 North America Consumer banking survey. The full report is available here. One take away for me was that if a consumer's local branch closed, 81% of those surveyed would not change banks. In 2013 that number was 48%. In survey after survey, despite the fact that most customers rarely step into a branch, having branches is a key decision factor for customers. Hopefully this is the beginning of change in the importance of branches. #6 Counterpoint, emotions are important in banking! Jaime Punishill from TIAA-CREF in his presentation offered an interesting counterpoint to many of the discussions during the day - that the emotional element of most financial experience is low or non-existent. His argument was that we, as people, make decisions emotionally as well as rationally, and we should, as much as focusing on tasks and flows, focus on how the experience makes a user feel? This is compelling. We are all human, and show great complexity in how we experience the world, and as designers we need to reflect this in our experience.
Q: How to use -webkit-fill-available on Edge and IE11? I'm trying to use -webkit-fill-available cross browsers. I have the following code: min-width: -webkit-fill-available; min-width: -moz-available; min-width: stretch; It works well on Chrome, Firefox, but not on Edge and IE11. On Chrome and Firefox the element width fills its parent element, on Edge and IE11 the attribute is not recognised. How can I make IE11 have the same effect as -webkit-fill-available? EDIT: here is an example, the select width does not fill its parent div on Edge and IE: .container { max-width: 200px; background-color: grey; } .control { min-width: -webkit-fill-available; min-width: -moz-available; min-width: stretch; } <div class='container'> <select class='control' name="cars" id="cars"> <option value="volvo">Volvo</option> <option value="saab">Saab</option> <option value="mercedes">Mercedes</option> <option value="audi">Audi</option> </select> </div> A: As a workaround, you can try to set the min-width: 100% for the control class. The min-width: 100% declared at the start will be used by browsers which ignore both the -moz and -webkit-prefixed declarations or do not support -moz-available or -webkit-fill-available. <!doctype html> <html> <head> <style> .container { max-width: 200px; background-color: grey; } .control { min-width: 100%; min-width: -moz-available; min-width: -webkit-fill-available; min-width: fill-available; } </style> </head> <body> <div class='container'> <select class='control' name="cars" id="cars"> <option value="volvo">Volvo</option> <option value="saab">Saab</option> <option value="mercedes">Mercedes</option> <option value="audi">Audi</option> </select> </div> </body> </html> Output in the MS Edge legacy browser: Output in the IE 11 browser:
Colonoscopy Atlas of Colon Polyps and Neoplasms. Optical colonoscopy is the gold standard for colon cancer screening and adenoma detection and is the only screening option that can potentially provide therapeutic interventions and adenoma removal during the same session. When other screening strategies generate positive results, currently colonoscopy is the next step for definitive diagnosis and potentially curative therapy. For gastrointestinal endoscopists, the ileocecum is the finishing line during colonoscopy, and it is identified by three endoscopic landmarks: terminal ileum, ileocecal valve, and the appendiceal orifice. Careful and systematic examination should be stressed during endoscopic training and practice. In this pictorial review, the authors demonstrate common colon polyps and neoplasms that can be found during colonoscopy. Our aim is to educate gastroenterologists, endoscopy staff other health care providers, and interested patients on certain colon pathologies and common endoscopic interventions.
THE HONORABLE RICHARD K. RAINEY, MEMBER OF THE STATE SENATE, has requested an opinion on the following question: Did the recent amendment of Labor Code section 96, which requires the Labor Commissioner to take assignments of claims for loss of wages as the result of demotion, suspension, or discharge from employment for lawful conduct occurring during non-working hours, abrogate existing law that permits the disciplining of peace officers for off-duty conduct occurring away from their place of employment that is otherwise lawful but conflicts with their duties as peace officers? CONCLUSION The recent amendment of Labor Code section 96, which requires the Labor Commissioner to take assignments of claims for loss of wages as the result of demotion, suspension, or discharge from employment for lawful conduct occurring during non-working hours, did not abrogate existing law that permits the disciplining of peace officers for off-duty conduct occurring away from their place of employment that is otherwise lawful but conflicts with their duties as peace officers. ANALYSIS The Division of Labor Standards Enforcement (“DLSE”) of the Department of Industrial Relations (Lab. Code, § 79)[fn1] is authorized to “enforce the provisions of [the Labor Code] and all labor laws of the state the enforcement of which is not specifically vested in any other officer, board or commission” (§ 95, subd. (a)). The Chief of DLSE is the Labor Commissioner (“Commissioner”). (§ 82, subd. (b).) Among the Commissioner’s responsibilities is that of taking assignments of certain categories of employee claims for lost wages and benefits. Section 96 provides: “The Labor Commissioner and his or her deputies and representatives authorized by him or her in writing shall, upon the filing of a claim therefor by an employee, or an employee representative authorized in writing by an employee, with the Labor Commissioner, take assignments of: “(a) Wage claims and incidental expense accounts and advances. “(b) Mechanics’ and other liens of employees. “(c) Claims based on `stop orders’ for wages and on bonds for labor. “(d) Claims for damages for misrepresentations of conditions of employment. “(e) Claims for unreturned bond money of employees. “(f) Claims for penalties for nonpayment of wages. “(g) Claims for the return of workers’ tools in the illegal possession of another person. “(h) Claims for vacation pay, severance pay, or other compensation supplemental to a wage agreement. “(i) Awards for workers’ compensation benefits in which the Workers’ Compensation Appeals Board has found that the employer has failed to secure payment of compensation and where the award remains unpaid more than 10 days after having become final. “(j) Claims for loss of wages as the result of discharge from employment for the garnishment of wages. “(k) Claims for loss of wages as the result of demotion, suspension, or discharge from employment for lawful conduct occurring during non-working hours away from the employer’s premises.” In 1999, subdivision (k) was added to section 96. (Stats. 1999, ch. 692, § 2.) We are asked whether this amendment changed prior law that permitted law enforcement agencies to discipline peace officers for off-duty conduct that was otherwise lawful but in conflict with their duties as peace officers. We conclude that the recent statutory amendment did not abrogate the prior law. Preliminarily, we note that before subdivision (k) was enacted, peace officers could be disciplined for engaging in lawful activities during non-working hours if such activities were inconsistent with their duties as peace officers. In Pasadena Police Officers Assoc. v. City of Pasadena (1990) 51 Cal.3d 564, 571-572, the Supreme Court observed: “Courts have long recognized that, while the off-duty conduct of employees is generally of no legal consequence to their employers, the public expects peace officers to be `above suspicion of violation of the very laws [they are] sworn . . . to enforce.’ [Citations.] Historically, peace officers have been held to a higher standard than other public employees, in part because they alone are the `guardians of peace and security of the community, and the efficiency of our whole system, designed for the purpose of maintaining law and order, depends upon the extent to which such officers perform their duties and are faithful to the trust reposed in them.’ [Citation.] To maintain the public’s confidence in its police force, a law enforcement agency must promptly, thoroughly, and fairly investigate allegations of officer misconduct; if warranted, it must institute disciplinary proceedings.” Do the recently enacted terms of subdivision (k) change this prior law? In analyzing the language of the 1999 amendment of section 96, we may rely upon well-established principles of statutory construction. “When construing a statute, we must `ascertain the intent of the Legislature so as to effectuate the purpose of the law.’ [Citation.]” (Wilcox v. Birtwhistle (1999) 21 Cal.4th 627, 646.) “Committee reports are often useful in determining the Legislature’s intent. [Citation.]” (California Teachers Assn. v. Governing Bd. of Rialto Unified School Dist. (1977)14 Cal.4th 627, 646.) Finally, “`statutes or statutory sections relative to the same subject must be harmonized, both internally and with each other, to the extent possible. [Citations.]'” (Walnut Creek Manor v. Fair Employment Housing Com. (1991) 54 Cal.3d 245, 248.) Applying these rules of construction, we find that subdivision (k) was added to section 96 so that the Commissioner could “assert the civil rights otherwise guaranteed by Article I of the California Constitution” for employees “ill-equipped and unduly disadvantaged” to assert such rights. (Stats. 1999, ch. 92, § 1.) Article I of the Constitution establishes numerous civil rights, including liberty of speech and of the press, right to assemble and to petition, and religious freedom. All the constitutional rights peace officers have now are the same ones they had prior to the 1999 amendment of section 96. As we have observed above, however, these constitutional rights do not prevent peace officers from being disciplined for off-duty incompatible activities. (Pasadena Police Officers Assoc. v. Pasadena, supra, 51 Cal.3d at p. 568, 571-572; People v. Owens, supra, 59 Cal.App.4th at p. 803.) Consequently, the Commissioner has nothing to assert under the terms of section 96 on behalf of peace officers who are disciplined for off-duty incompatible activities. Subdivision (k) was not intended to give the Commissioner such nonexistent responsibilities. We find support for our determination in the legislative history of the 1999 amendment. No statements may be found in any of the committee reports or other materials to suggest that the amendment was intended to apply with respect to peace officers for their off-duty incompatible activities, or indeed, to affect substantive rights of employees at all. The absence of any such suggestion in the legislative history is unsurprising. Throughout its history, section 96 has not served as an original source of employee rights against employers, but has instead provided a supplemental procedure for asserting employee claims for which the legal basis already existed elsewhere in the law. (See § 96, subds. (a) [claims for wages, incidental expense accounts, and advances — ordinarily founded in collective bargaining agreements or contracts of employment], (b) [mechanics’ and other employees’ liens — Civ. Code, §§ 3110-3154], (c) [stop notices — Civ. Code, §§ 3156-3176.5, 3179-3214], (d) [misrepresentation of conditions of employment — Kittle v. Lang (1951) 107 Cal.App.2d 604, 606-607, 611], (e) [unreturned employee bond money — § 404, subd.(b)], (f) [penalties for nonpayment of wages — §§ 203, 210, 225.5], (g) [return of tools — Connell v. Higgins (1915) 170 Cal. 541], (h) [vacation and severance pay, supplemental compensation — Suastez v. Plastic Dress-Up Co. (1982) 31 Cal.3d 774, 780-781], (i) [delayed payment of compensation benefit awards — § 5814], (j) [wage garnishment discharge — 15 U.S.C. § 328(b)(2); § 2929, subd. (b).]) The absence of any indication of legislative intent to affect existing rights of employees through enactment of subdivision (k) is consistent with the primary function of section 96 to supply an additional means of enforcement of rights already established elsewhere, and buttresses the conclusion that the Legislature did not intend to change the substantive law when it added subdivision (k). Our determination also prevents possible conflicts between the provisions of section 96 and other statutory provisions. Under Government Code section 19572, subdivision (t), a state employee may be disciplined for a “failure of good behavior either during or outside of duty hours which is of such a nature that it causes discredit to the appointing authority or the person’s employment.” A state employee may also be disciplined under the terms of Government Code section19990 for engaging “in any . . . activity . . . which is clearly inconsistent, incompatible, in conflict with, or inimical to his or her duties as a state . . . employee.” Pursuant to Government Code section1126, a local agency employee may be disciplined for engaging in activities that are “inconsistent, incompatible, in conflict with or inimical to his or her duties. . . .” Additionally, our determination avoids a possible conflict between section 96 and the Constitution. The State Personnel Board is charged with administering the state civil service system, including the duty to “review disciplinary actions.” (Cal. Const., art. VII, § 3, subd. (a).) The Legislature is, of course, aware that it may not enact laws that would undermine the State Personnel Board’s constitutional duties and responsibilities. (See Pacific Legal Foundation v. Brown (1981)29 Cal.3d 168, 181.) In summary, the 1999 amendment of section 96 did not create new substantive rights for employees. Rather, it established a procedural mechanism that allows the Commissioner to assert, on behalf of employees, their independently recognized constitutional rights. (See Resnik v. Anderson Miles (1980) 109 Cal.App.3d 569, 572; Marc Bellaire, Inc. v. Fleischman (1960) 185 Cal.App.2d 591, 595-596.) As we have seen, however, the constitutional rights of peace officers do not prevent them from being disciplined for engaging in activities during non-working hours that are otherwise lawful but “impair the public’s trust in its police department.” (Pasadena Police Officers Assoc. v. City of Pasadena, supra, 51 Cal.3d at p. 568.) In answer to the question presented, therefore, we conclude that the recent amendment of section 96, which requires the Commissioner to take assignments of claims for loss of wages as the result of demotion, suspension, or discharge from employment for lawful conduct occurring during non-working hours, did not abrogate existing law that permits the disciplining of peace officers for off-duty conduct occurring away from the place of employment that is otherwise lawful but conflicts with their duties as peace officers.
Submitted on Tue, 08/16/2011 - 2:47am Couriers Launch Campaign to Improve Conditions Industry-Wide SAN FRANCISCO – Friday, August 12, The IWW Couriers Union Organizing Committee publicly asserts the right of workers at Speedway Delivery and Messenger Service, and throughout the courier industry, to a living wage. For many years workers in the courier industry have been subjected to shamefully low or wildly fluctuating compensation from employers. Couriers work day in and day out – working in trucks, on bikes, or on foot – in extremely dangerous conditions, under intense pressure to deliver parcels on time. While most couriers fulfill their ominous task dutifully, few find that their compensation fulfills the task of making ends meet. Living hand to mouth is the norm for the people on whose backs our metropolises thrive. At San Francisco-based Speedway Delivery and Messenger Service, conditions are no better. In fact, they’re much worse. Bought by current owners Lori O’Rourke and Charlie Lutge in the 1980s from former owners who refused to deal with then-emerging unionizing efforts, Speedway has pushed working conditions below even non-union standards. Their couriers endure harassment and disrespectful treatment from management, are extorted for equipment replacements, and to top it off, make an insultingly low commission of about 35% per delivery (most companies pay 50%), or as little as $8.00 an hour. That’s almost 20% less than the prevailing San Francisco minimum wage of $9.92 an hour, which is still far too low for most Bay Area workers to live on. To inaugurate our campaign to improve working conditions for all workers in the courier industry in the San Francisco Bay area, we have submitted a letter to Speedway owners demanding that they stop breaking minimum wage laws and pay a Living Wage, and to remedy grievances regarding disrespectful treatment at work. It is our aim that these issues will be handled swiftly, respectfully, and to the satisfaction of Speedway’s hard-working couriers by Wednesday, August 17th 2011. Further action from the Organizing Committee will then be necessary to resolve the issues at hand. The IWW Couriers Union is a democratic organization of, by, and for all workers in the parcel delivery industry. By uniting across the industry – drivers, bike couriers, dispatchers and other non-managerial office staff – we are forming an independent organization to improve working conditions and secure our livelihoods. We are affiliated with the Industrial Workers of the World (IWW), and international member-run union founded in 1905 for all working people. www.MessengersUnion.org
907 F.2d 1343 134 L.R.R.M. (BNA) 2686, 59 USLW 2064,115 Lab.Cas. P 10,171 HOLO-KROME COMPANY, Petitioner-Cross-Respondent,v.NATIONAL LABOR RELATIONS BOARD, Respondent-Cross-Petitioner,andInternational Union, United Automobile, Aerospace andAgricultural Implement Workers of America (UAW),Local 376, Intervenors. Nos. 1071, 1216, Dockets 89-4148, 90-4008. United States Court of Appeals,Second Circuit. Argued March 21, 1990.Decided July 9, 1990. Burton Kainen, Hartford, Conn. (Diana Garfield, Siegel, O'Connor, Schiff, Zangari & Kainen, Hartford, Conn., on the brief), for petitioner-cross-respondent. Marilyn O'Rourke Athens, Washington, D.C. (Howard H. Perlstein, Supervisory Atty., Jerry M. Hunter, Robert E. Allen, Asoc. Gen. Counsel, Aileen A. Armstrong, Deputy Assoc. Gen. Counsel, N.L.R.B., Washington, D.C., on the brief), for respondent-cross-petitioner. Before: TIMBERS, NEWMAN, and PRATT, Circuit Judges. JON O. NEWMAN, Circuit Judge: 1 This case is before the Court upon the petition of Holo-Krome Company to review and set aside an amended order of the National Labor Relations Board issued on September 20, 1989. 293 NLRB No. 65. The Board has filed a cross-petition for enforcement of its order requiring Holo-Krome to reinstate with backpay two employees, Guiseppe Pace and John Rutkauski, and to cease and desist from violating subsections 8(a)(1), (3), and (4) of the National Labor Relations Act, 29 U.S.C. Sec. 158(a)(1), (3), and (4) (1988) (as amended). Because the Board improperly inferred anti-union animus from statements made by Company officials opposing unionization of the employees--statements that are protected under the Act--we deny enforcement and remand to the Board for reconsideration consistent with this opinion. Background 2 In the spring of 1985, Local 376 of the UAW conducted an organizing campaign at Holo-Krome's West Hartford, Connecticut, plant, which manufactures industrial fasteners. Pace and Rutkauski, who had worked for Holo-Krome for eleven and eight years, respectively, actively supported the Union in the election, which the Union ultimately lost. Soon thereafter, Holo-Krome laid off several of its 170 employees, including Pace and Rutkauski. This layoff became the subject of the Union's April 1986 allegation that Holo-Krome had singled out pro-union employees for layoff and had failed to recall them. The Board's regional office investigated the charge, found that the layoffs had been based on legitimate economic reasons and had been implemented consistent with a preexisting policy, and refused to issue a complaint. The regional office also found that Holo-Krome had no policy of recalling former employees and that neither Pace nor Rutkauski had reapplied for employment since the layoff date. 3 In July, Holo-Krome advertised new openings at the plant, and Pace and Rutkauski both applied. Neither was chosen. The Union then filed a new charge against the Company. This time the Board's regional office issued a complaint alleging discriminatory refusal to hire, in violation of 29 U.S.C. 158(a). An administrative law judge dismissed the complaint, finding that the General Counsel had failed to make a prima facie showing, see Wright Line, a Division of Wright Line, Inc., 251 NLRB No. 150, 105 LRRM 1169, 1175 (1980), enf'd, 662 F.2d 899 (1st Cir.1981), cert. denied, 455 U.S. 989, 102 S.Ct. 1612, 71 L.Ed.2d 848 (1982), that the Company's refusal to rehire was motivated by anti-union animus or by the employees' exercise of protected rights during the 1985 union organizing effort. On review, the Board disagreed, concluding that a prima facie case of unlawful motivation was established by Holo-Krome's consistent opposition to union organization, by instances of post-election hostility toward Pace and Rutkauski on the part of certain managers, and by irregularities in the Company's methods of filling new positions once Pace or Rutkauski had applied for those jobs. The Board rejected Holo-Krome's claim that it would have declined to rehire either employee even in the absence of their prior union activities. See NLRB v. Transportation Management Corp., 462 U.S. 393, 400-03, 103 S.Ct. 2469, 2473-75, 76 L.Ed.2d 667 (1983); Wright Line, supra. The Board's amended order directs Holo-Krome to offer employment and backpay to Pace and to award backpay to Rutkauski, who was ultimately rehired.1 Discussion 4 On appeal, the parties dispute whether the Board's finding of unlawful motivation is supported by "substantial evidence on the record considered as a whole," 29 U.S.C. Sec. 160(e). The Board directs our attention chiefly to a number of pointed conversations between Pace or Rutkauski and certain Holo-Krome managers and to several instances in which the Company either withdrew an advertised job opening or declined to select either former employee for an available position. 5 Before assessing the sufficiency of the record, however, we must consider Holo-Krome's contention that the Board impermissibly relied on the Company's opposition to unionization in 1985 as part of the basis for attributing anti-union motivation to Holo-Krome's 1986 actions. This reliance, the Company contends, violated section 8(c) of the Act, which provides that: 6 The expressing of any views, argument, or opinion, or the dissemination thereof, whether in written, printed, graphic, or visual form, shall not constitute or be evidence of an unfair labor practice under any of the provisions of this subchapter, if such expression contains no threat of reprisal or force or promise of benefit. 7 29 U.S.C. Sec. 158(c). The Board has interpreted this provision to mean that although an employer's statements opposing union organization but lacking threat or promise cannot, by themselves, constitute an unfair labor practice, they may nonetheless serve as evidence for a finding of unlawful anti-union animus. See Sun Hardware Co., 173 NLRB 973 n. 1 (1968), enf'd, 422 F.2d 1296 (9th Cir.1970) (per curiam); General Battery Corp., 241 NLRB 1166, 1169 (1979). In this case, a majority of the Board's three-member panel concluded that the Company's statements expressing opposition to the Union during the 1985 election were permissible evidence, along with other facts, for inferring anti-union animus as a motivation for Holo-Krome's refusal to hire Pace and Rutkauski in 1986. The third member of the panel explicitly disclaimed reliance on the Company's 1985 election position as a basis for finding anti-union motivation in its 1986 hiring decisions. See 293 NLRB No. 65, slip op. at 6 n. 6. 8 It is clear that "an employer's free speech right to communicate his views to his employees is firmly established and cannot be infringed by a union or the Board," NLRB v. Gissel Packing Co., 395 U.S. 575, 617, 89 S.Ct. 1918, 1941, 23 L.Ed.2d 547 (1969); see also NLRB v. Virginia Electric & Power Co., 314 U.S. 469, 62 S.Ct. 344, 86 L.Ed. 348 (1941); NLRB v. American Tube Bending Co., 134 F.2d 993 (2d Cir.), cert. denied, 320 U.S. 768, 64 S.Ct. 84, 88 L.Ed. 459 (1943). Although the Supreme Court has noted that section 8(c) "implements" the First Amendment, Gissel Packing Co., 395 U.S. at 617, 89 S.Ct. at 1941, the Court has not considered the precise meaning of section 8(c)'s prohibition against relying on non-coercive statements as "evidence of an unfair labor practice." In NLRB v. Pittsburgh Steamship Co., 340 U.S. 498, 71 S.Ct. 453, 95 L.Ed. 479 (1951), the Court held that an employer's letters to employees on the eve of a union election were not substantial evidence of an unfair labor practice, but the Court "express[ed] no opinion on the possible effect of Sec. 8(c)" on the inferences permissibly drawn from those letters. Id. at 501 n. *, 71 S.Ct. at 455 n. *. Similarly, while Chief Justice Warren's concurring opinion in NLRB v. United Steelworkers, 357 U.S. 357, 365, 78 S.Ct. 1268, 1273, 2 L.Ed.2d 1383 (1958), concluded that non-coercive expressions of opinion could not be used to show that an employer's enforcement of a no-distribution rule was unfair, id. at 370, 78 S.Ct. at 1275, the majority found the Board's order sustainable on other grounds. 9 Several circuits have construed section 8(c) as barring the "use [of] protected expression to build a case" against an employer or union, NLRB v. Eastern Smelting & Refining Corp., 598 F.2d 666, 670 (1st Cir.1979), and have found substantial evidence lacking where the Board makes reference to a company's lawful expression of opposition to the union as a basis for concluding that subsequent acts or statements were unlawful. See Florida Steel Corp. v. NLRB, 587 F.2d 735, 750-54 (5th Cir.1979); NLRB v. Rockwell Manufacturing Co., 271 F.2d 109, 118-19 (3d Cir.1959); Pittsburgh Steamship Co. v. NLRB, 180 F.2d 731, 735 (6th Cir.1950) ("Sec. 8(c) of the Taft-Hartley Act was specifically intended to prevent the Board from using unrelated non-coercive expressions of opinion on union matters as evidence of a general course of unfair labor conduct"), aff'd, 340 U.S. 498, 71 S.Ct. 453, 95 L.Ed. 479 (1951). 10 Other circuits, however, have permitted the Board to make limited references to statements protected by section 8(c) in marshaling a case against the employer. Where an employer had "made no bones about its opposition to the Union," the Court in Hendrix Manufacturing Co. v. NLRB, 321 F.2d 100 (5th Cir.1963), permitted the Board to consider such views as "background," both in order to decipher the motivations for management's conduct and in judging how employees reasonably would interpret the company's acts. See id. at 103-04. The Court in International Union, United Automobile, Aerospace & Agricultural Implement Workers v. NLRB, 363 F.2d 702 (D.C.Cir.), cert. denied, 385 U.S. 973, 87 S.Ct. 510, 17 L.Ed.2d 436 (1966), concluded that section 8(c) did not bar focusing upon pre-election speeches, lawful in themselves, in order "to draw the background of the controversy and place other nonverbal acts in proper perspective." Id. at 707. In the Fourth Circuit's view, see Darlington Manufacturing Co. v. NLRB, 397 F.2d 760 (4th Cir.1968), cert. denied, 393 U.S. 1023, 89 S.Ct. 632, 21 L.Ed.2d 567 (1969), section 8(c) does not bar consideration of statements that amount to "directions" or "instructions" or statements considered for the limited purpose of elucidating an employer's apprehensions or motivations. Id. at 768-69. 11 In this case, the question of section 8(c)'s application is presented somewhat abstractly because the record is sparse as to the manner in which Holo-Krome expressed its opposition to the Union. At the ALJ hearing, Holo-Krome conceded that it had "expressed to its employees the view that it preferred that its employees not select UAW Local 376 as their collective bargaining representative," and the general counsel for the Board stipulated that there were no "violations of Section 8(a)(1) occurring in the course of [Holo-Krome's] expressing those views." Pursuant to this stipulation, the ALJ found that Holo-Krome had not sought to restrain or coerce its employees with regard to their choice of representative. Nevertheless, in reversing, the Board found that the ALJ had failed to consider "significant evidence demonstrating [Holo-Krome's] animus," including the fact that the Company "made known its opposition to union representation during the organizing campaign." Slip Op. at 1345. We believe that this reliance on protected statements to support a finding of unlawful, anti-union animus violated the congressional command that noncoercive expressions of views, argument, or opinion shall not be "evidence of an unfair labor practice." 12 Both the House and Senate precursors to the Taft-Hartley Act included provisions guaranteeing employers and unions "the full exercise of the right of free speech," though expressing the protection in different terms. H.R.Rep. No. 245, 80th Cong., 1st Sess., at 6 (1947), reprinted in 1 NLRB, Legislative History of the Labor Management Relations Act, 1947, at 297 (1948) (hereinafter "Legislative History"). Had the Senate version been adopted, the Board's view of section 8(c) might be more persuasive. As passed by the Senate, section 8(c) provided: 13 The Board shall not base any finding of unfair labor practice upon any statement of views or arguments, either written or oral, if such statement contains under all the circumstances no threat, express or implied, of reprisal or force, or offer, express or implied, of benefit: Provided, That no language or provision of this section is intended to nor shall it be construed or administered so as to abridge or interfere with the right of either employers or employees to freedom of speech as guaranteed by the first amendment to the Constitution of the United States. 14 H.R. 3020 (as passed by Senate), 80th Cong., 1st Sess. Sec. 8(c) (1947) (emphasis added), reprinted in Legislative History at 242. As clarified by the committee report, the Senate text, while not permitting the Board to "base" a finding on protected statements, did not go so far as to preclude the Board "from considering such statements as evidence." S.Rep. No. 105 at 24, reprinted in Legislative History at 430. 15 In contrast, section 8(d) of the House bill contained more preclusive language:(d) Notwithstanding any other provision of this section, the following shall not constitute or be evidence of an unfair labor practice under any of the provisions of this Act: 16 (1) Expressing any views, argument, or opinion, or the dissemination thereof, whether in written, printed, graphic, or visual form, if it does not by its own terms threaten force or economic reprisal. 17 H.R. 3020 (as passed by House of Representatives), 80th Cong., 1st Sess. Sec. 8(d) (1947) (emphasis added), reprinted in Legislative History at 183. The broader reach of the phrase "evidence of" was not lost on the draftsman of the House minority report,2 or on President Truman, who expressly criticized the House language in his veto message.3 18 Nonetheless, the House formulation emerged from the House-Senate conference on H.R. 3020 and was enacted as section 8(c) of the Taft-Hartley Act, over President Truman's veto. See H.R.Rep. No. 510, 80th Cong. 1st Sess., at 45, reprinted in Legislative History at 549, 1947 U.S.Code Cong.Serv. 1135, 1151. The accompanying conference report specifically noted that: 19 The practice which the Board has had in the past of using speeches and publications of employers concerning labor organizations and collective bargaining arrangements as evidence, no matter how irrelevant or immaterial, that some later act of the employer had an illegal purpose gave rise to the necessity for this change in the law. 20 Id. (emphasis added). 21 In striking the balance between protecting employees from coercion and permitting all opinions regarding labor disputes to be presented, Congress chose to prevent chilling lawful employer speech by preventing the Board from using anti-union statements, not independently prohibited by the Act, as evidence of unlawful motivation. Several other provisions of the 1947 amendments to the NLRA reflect a similar shift in favor of employer rights. See generally Cox, Some Aspects of the Labor Management Relations Act, 1947, 61 Harv.L.Rev. 1 (1947). Unlike Darlington, 397 F.2d at 768-69, this case does not require us to determine whether section 8(c) bars admission of an employer's "instructions" to management personnel, or collateral uses of an employer's expression of opinion, such as to impeach witnesses. Here, the Board referred to Holo-Krome's lawful expressions of opinion as a "basis for finding animus," and this is contrary to section 8(c). 22 The Board also referred to several other incidents in drawing the inference that Holo-Krome's refusal to rehire Pace or Rutkauski was attributable to their support for the Union. We express no view as to whether the Board's order is otherwise supported by substantial evidence. Rather than performing a Wright Line analysis of the Board's decision-making process to determine if it would have reached the same result had it not considered impermissible evidence, we remand for the Board to reconsider, without reference to Holo-Krome's protected statements, whether the refusal to rehire Pace and Rutkauski was based on anti-union motivation. See Manchester Health Center, Inc. v. NLRB, 861 F.2d 50 (2d Cir.1988). 23 Two other matters require discussion. First, the Board's order requires Holo-Krome to award backpay to Rutkauski from the date he would have been employed "until the date of his reemployment on January 19, 1989." The Board now concedes that this portion of its order is in error, since Rutkauski was rehired on January 19, 1987. On remand, if the Board reaffirms its findings with respect to Rutkauski, it should modify its order accordingly. Second, the parties dispute whether or not Holo-Krome still has an obligation to offer reemployment to Pace. The ALJ found that in January 1987, Holo-Krome contacted Pace about a job opening, that Pace failed to respond to this offer, and that Pace's subsequent explanations for not contacting the company were not credible. Holo-Krome contends that whatever duty it had to offer employment to Pace and to award backpay ended on the date he constructively rejected the Company's offer. The Board, however, declined to rule on the ALJ's findings, asserting that its practice is to consider the specifics of backpay and reinstatement at the compliance stage of its proceedings, following appellate review of liability determinations. 24 The Board is correct that Congress has vested in the Board primary responsibility for devising remedies for undoing the effects of unfair labor practices and preventing future violations of the Act. See Sure-Tan, Inc. v. NLRB, 467 U.S. 883, 898-99, 104 S.Ct. 2803, 2812-13, 81 L.Ed.2d 732 (1984); NLRB v. Local 3, International Brotherhood of Electrical Workers, 730 F.2d 870, 879 (2d Cir.1984). However, the Board's decision to defer ruling on whether Holo-Krome has met an obligation (if it has one) to offer reemployment to Pace is less a choice of remedy than of procedure. Moreover, it is a choice that necessitates piecemeal review by this Court and continues to leave both Pace and Holo-Krome uncertain as to the former's right to be offered reemployment. Here the Board has not merely left for the compliance phase the "specific calculations as to the amounts of backpay," Sure-Tan, Inc. v. NLRB, 467 U.S. at 902, 104 S.Ct. at 2814, but also determination of whether the employer still has a duty to offer reemployment. The Board accepted the ALJ's findings as to the rehiring of Rutkauski and has before it his findings as to the circumstances surrounding the January 1986 offer to Pace. Since we remand for the Board to reconsider the record consistent with section 8(c), we direct the Board, in the event that it finds an obligation to rehire Pace, to determine whether the Company met that obligation. 25 Holo-Krome's petition to set aside the Board's September 20, 1989, order is granted. The Board's cross-petition for enforcement is denied. The case is remanded to the Board for reconsideration consistent with this opinion. 1 The Board's initial order directed the Company to reinstate Pace and Rutkauski to their former positions, with backpay. However, since the original layoff was found to be lawful, the amended order directs Holo-Krome to make a job offer and compute backpay with reference to positions for which Pace and Rutkauski were qualified and in which they would have been employed but for anti-union bias against them 2 See H.R.Rep. No. 245, 80th Cong., 1st Sess., at 84, reprinted in Legislative History at 375: By saying that statements are not to be considered as evidence, they [the majority] insist that the Board and the courts close their eyes to the plain implications of speech and disregard clear and probative evidence. In no field of the law are a man's statements excluded as evidence of illegal intention. 3 See 93 Cong.Rec. 7487 (1947) ("The bill would introduce a unique handicap, unknown in ordinary law, upon the use of statements as evidence of unfair labor practices. An antiunion statement by an employer, for example, could not be considered as evidence of motive, unless it contained an explicit threat of reprisal or force or promise of benefit.")
Q: Put PreferenceActivity in a fragment I'm currently working on an app with a navigation drawer, however the settings of this app are displayed in a separated activity. How can I display those preferences in a fragment? Thanks! A: You can't. If you want to make your code re-usable, make your own PreferenceFragment, and use it in a CustomPreferenceActivity.
Effects of different levels of food restriction on passive-avoidance memory and the expression of synapsin I in young mice. The present study investigated the effects of food restriction (FR) on memory and the expression of synapsin I in the brain of young mice. The results showed that 20% FR did not retard the body weight gain of mice, while the 60% and 80% FR reduced the mice's body weight. The memory after 24 hr of learning was not changed by FR, whereas long-term memory was improved significantly in 20% FR mice. In addition, 60% and 80% FR did not impair the mice's memory. The transcriptional expression of synapsin I in mice brain was up-regulated by 20% FR, and down-regulated by 60% and 80% FR.
//Helper functions //Tree Implimentation from https://gist.github.com/RainbowDangerDash/e006151f60003487e208 function Tree(data) { this.data = data; this.children = []; this.parent = null; this.length = 0; this.level=0//useful for debugging how deep a node is } Tree.fromJSON = function(jsonTree) { var tree = JSON.parse(jsonTree), finalTree = tree.map(function(a) { return new Tree(a.data) }); tree.forEach(function(a, i) { a.children.forEach(function(b) { finalTree[i].addChild(finalTree[b]) }) }); return finalTree[0]; } Tree.prototype.addChild = function(t) { if (!(t instanceof this.constructor)) { t = new Tree(t) } t.parent = this; this.length = this.children.push(t); t.level=this.level+1 return t; } Tree.prototype.removeChild = function(i) { var c = this.children.splice(i, 1)[0]; this.length = this.children.length; c && (c.parent = null); return c; } Tree.prototype.splice=function(start,end){ var c = this.children.splice(start,end); this.length = this.children.length; return c; } Tree.prototype.detachFromParent = function() { var parent = this.parent; if (parent) { parent.removeChild(parent.children.indexOf(this)); } return parent; } Tree.prototype.popChild = function() { var c = this.children.pop(); c.detachFromParent && c.detachFromParent(); return c; } Tree.prototype.previousSibling=function(){ return this.parent&&this.parent.children[this.parent.children.indexOf(this)-1] } //Walk the tree Tree.prototype.forEach = function(f, r, t, i) { //r is how deep you want to go, 0 for unlimited. //t is the level of the children you want, 0 for unlimited, //if you for example only want the children and beyond, but not the value itself, then t would be 1, //if you want the grandchildren and beyond but not the children, t would be 2 //go back i number of steps to see if there are parents for (var ii = i, node = this; ii && node.parent && (t > 0 && r > 0); ii--) { node = node.parent; if (node == this) { //if parent node is equal to this node, then skip return this } } i = i | 0; r = r | 0; t = t | 0; if (t-- <= 0) { f(this, i); } if (--r) { this.children.forEach(function(a) { a.forEach(f, r, t, i + 1) }); } return this; } Tree.prototype.forEachChild = function(f) { return this.forEach(f, 2, 1, 0); }; (function() { var _find = function(f) { var c = this.children; if (!c) { return false } for (var d, i = 0, l = c.length; i < l; i++) { if (d = f.call(arguments[1], c[i], c)) { return d; } }; } Tree.prototype._find = _find; Tree.prototype.find = function(f, r, t) { r = r | 0; t = t | 0 return ((t-- <= 0) ? (f(this) && this) : false) || ((--r) ? this._find(function(a) { return a.find(f, r, t) }) : false); } })(); Tree.prototype.findIndex = function(f) { return this.children.findIndex(f); } Tree.prototype.getChild = function(i) { return this.children[i]; } Tree.prototype.getFirstChild = function() { return this.children[0]; } Tree.prototype.getLastChild = function() { return this.children[this.children.length - 1]; } Tree.prototype.toJSON = function() { var child = []; this.forEach(function(a) { child.push(a) }); return JSON.stringify(child.map(function(a) { return { data: a.data, children: a.children.map(function(b) { return child.indexOf(b) }) } })) } module.exports = Tree;
Marshall Islands at the 2019 World Aquatics Championships Marshall Islands competed at the 2019 World Aquatics Championships in Gwangju, South Korea from 12 to 28 July. Swimming Marshall Islands entered three swimmers. Men Women References Category:Nations at the 2019 World Aquatics Championships Category:Marshall Islands at the World Aquatics Championships Aqua
TorrentsHQ is one of the most popular torrent search engines designed to make torrent search download for MP3 torrents, software torrents, manga downloads, tv episode downloads & avi movie downloads faster & easier. 02/20/2011 TorrentsHQ Releases President’s Day Movie Torrents January 21, 2011 – USA – one of the emerging search torrents sites with a rich repository of mp3 music downloads, manga downloads, DVD download, software torrents downloads, game torrents downloads and many other cool fast torrents – TorrentsHQ – has released the “President’s Day” movie torrents in conjunction with the US holiday celebration bearing the same name. A horror-themed indie movie torrents with a touch of comedy, “President’s Day” centers on a student council election which turns bloody after a killer dressed as Abraham Lincoln starts killing the candidates. Barry, the movie’s main protagonist, joins the student election to befriend Joanna, an aspirant for a post in the council only to find himself in a killing spree where everybody involved in the race is a suspect including snobbish popular girl Chelsea, the janitor and officer Kennedy. Barry must find out who the killer is before he becomes the next target. Directed by Chris LaMartina and written by Jimmy George, it is one of the DVD movies that will surely surprise viewers while provoking a bit of comic relief with all its twists and suspense-filled scenes. Lamartina was able to pull off a superb movie with interesting shots and excellent lightings and professional casts despite filming on a tight budget. At TorrentsHQ, viewers can download movie torrents of “President’s Day” and have the convenience of watching it at home – a perfect way of celebrating the President’s Day. At an excellent download speed of 1.5 Mbps, viewers will not have to worry on their “President’s Day” movie download being cut-off or corrupted halfway. Moreover, viewers’ AVI movie downloads will not be infected by viruses or malwares because TorrentsHQ implements 99% quality control on all its torrents files by filtering corrupted and dummy files. For additional benefits in downloading torrents, viewers can join the membership of TorrentsHQ for free.
--- abstract: 'Neutrino and anti-neutrino states coming from the neutral current or $Z_0$ decay are blind with respect to the flavor. The neutrino oscillation is observed and formulated when its flavor is known. However, it has been shown that we can see neutrino oscillation pattern for $Z_0$ decay neutrinos provided that both neutrino and anti-neutrino are detected. In this paper, we restudy this oscillation via quantum field theory approach. Through this approach, we find that the oscillation pattern ceases if the distance between the detectors is larger than the coherence length, while both neutrino and antineutrino states may be coherent. Also the uncertainty of source (region of $Z_0$ decay) does not have any role in the coherency of neutrino and antineutrino.' --- [**[Neutral current neutrino oscillation via quantum field theory approach]{}**]{} 4em [**M. M. Ettefaghi**]{} [^1] 1em Department of Physics, University of Qom, Qom 371614-6611, Iran. 4em [**Z. Askaripour Ravari**]{} 1em University of Kashan, Km 6 Ravand Road, Kashan 87317-51167, IRAN Introduction ============ While neutrino oscillation is a window to the new physics, it is one of the most interesting quantum mechanical phenomena. Historically, neutrino oscillation has been established more than 50 years and confirmed experimentally more than 10 years [@historical]. The observation of neutrino oscillation depends on the coherency of neutrinos during the production, propagation and detection [@paradoxes; @coherence]. The production and detection coherence conditions are satisfied provided that the intrinsic quantum mechanical energy uncertainties during these processes are large compared to the energy difference $\Delta E_{jk}$ of different neutrino mass eigenstates: E\_[jk]{}\~\_E, where $\sigma_E=\mbox{min}\{\sigma^{prod}_E,\sigma^{det}_E\}$. This condition implies that, during the production and detection processes, one cannot discriminate the neutrino mass eigenstates. Conservation of the coherency during the propagation means that the wave packets describing the mass eigenstates overlap from the production until the detection regions. The wave packets describing the different neutrino mass eigenstates propagate with different group velocities. After propagating $L$, the separation of different mass wave packets is $\frac{\Delta m_{ij}^2}{2E^2}L$. Consequently, the coherent propagation is guaranteed provided that L\_[x]{}, where $v_g$ is the average group velocity of the wave packets of different neutrino mass eigenstates and $\sigma_{x\nu}$ is their common effective spatial width. In other words, similar to the double-slit experiment, if one could determine which mass eigenstate is created or detected, the neutrino oscillation pattern would disappear. For instance, conservation of energy and momentum implies that exact determination of energy-momentum of charged leptons leads to the determination of mass eigenstate of the corresponding neutrino (in fact exact momentum conservation causes neutrino state is entangled kinematically to the corresponding charged lepton state) and neutrino oscillation is ceased [@Found]. The kinematics analysis shows that a neutrino state created through charged current interactions has a specific flavor. For instance, muon neutrino is created by the pion decay while muon decay gives only electron neutrino. In contrast, neutral current or $Z^0$ decay is blind with respect to the neutrino flavors. In other words, every flavor eigenstate as well as every mass eigenstate is created with the same probability. However, there is another property that is noticeable; neutrino and antineutrino states are entirely correlated in the sense that they have same flavor. It has been shown that if both neutrino and antineutrino are detected, one can observe neutrino oscillation pattern between the detectors [@smirnov]. Nevertheless, if only either neutrino or antineutrino is detected, the neutrino oscillation is ceased; therefore, it is a realization of the Einstein-Podolsky-Rosen paradox [@epr]. In the center of mass frame, in particular, the oscillation pattern occurs at distance $L+\bar{L}$, where $L$ and $\bar{L}$ are the distance of the neutrino and antineutrino detectors from the source, respectively. In this paper, we reanalyze it via quantum field theory approaches. In this approach, the oscillating states become intermediate states, not directly observed, which propagate between a source and a detector. The localization conditions are respected with attributing a localized wave function to interacting initial and final states in the source and detector [@CC; @16; @17; @Beuthe; @qmqft]. Indeed, these localizations are essential for the observation of the neutrino oscillation and guarantee the coherence issues [@Found]. In the case of $Z_0$ decay neutrinos, we will see the localization of source (region of $Z_0$ decay) is not important while the localization of detectors plays role in the coherency condition of neutrino and antineutrino. Moreover, as was said in general, the coherency is spoiled during propagation because the group velocities of various mass eigenstates are different. Therefore, maybe one expects that when both neutrino and antineutrino propagate coherently, it is possible to have oscillation pattern. However, we will show that it is necessary the distance between detectors to be smaller than the coherence length. In the following, we develop $Z_0$ decay neutrino oscillation through quantum field theory approach. Finally, we discuss on the coherency properties which appears through quantum field theory approach. Developing neutral current neutrino oscillation through quantum field theory approach {#ft} ===================================================================================== We can describe any particle physics processes by S-matrix formalism in quantum field theory provided that it is adjusted according to the physical situations. In particular, to describe neutrino oscillation one needs to notice that neutrinos are produced and detected in confined space-time regions. The source and detector regions are separated by a finite distance which is usually much larger than the size of these regions. Neutral current neutrino oscillation consists of the following three processes: - Creation neutrino and antineutrino in the source $$Z_0\rightarrow \nu +\bar \nu.$$ - Detection of neutrino in the corresponding detector $$\nu + D_I\rightarrow D_F+l^-.$$ - Detection of antineutrino in the other detector $$\bar \nu + \bar{D}_I \rightarrow \bar{D}_F + l^+.$$ In order to define the initial and final states, the localizations of interactions in the source and detectors require to integrate on momentum with a localized distribution function around the corresponding averaged momentum. Therefore, the initial states are defined as follows: =F\_z(p,P) ,\ =F\_[D\_I]{}(k,K) ,\ =F\_[|D\_I]{}(,) ,\[iket\] where $D_I$ ($\bar D_I$) is target in the detectors of neutrino (antineutrino). $[d\mathbf p]$ denotes $\frac{d^3\mathbf p}{(2\pi)^3\sqrt{2E_p} }$. The final states are written similarly as follows: \[fket\] =F\_[D\_F]{}(k’,K’) ,\ =F\_[|D\_F]{}(,) ,\ =F\_[l\^-]{}(k”,K”) ,\ =F\_[l\^+]{}(,) . Here, $D_F$ ($\bar D_F$) refers to created nucleon (antinucleon) in detector due to neutrino (antineutrino) collision. $l^-$ ($l^+$) denotes the created charged lepton corresponding to neutrino (antineutrinos) in the detector. In the above defined states, $F$’s are momentum distribution functions which are localized around the corresponding mean momentum. The amplitude of the neutrino and anti-neutrino production - propagation - detection processes is given by the following matrix element: iA\_& = &\ & = &\ & = & \_j U\_[j]{}\^\*U\_[j]{} . \[amp\] where $\hat T$ is the time ordering operator and $\mathcal H_I$ are the weak interaction Hamiltonian. The quantity $\mathcal A_j^{p.w.}$ is the plane wave amplitude of the process with the $j$’th neutrino and antineutrino mass eigenstate propagating between the source and the detectors and is written as follows: iA\_j\^[p.w.]{}(k,k’,k”,|k, |k’, |k”) & = & id\^4x\_1d\^4x d\^4x\_2 M\_[j|D]{}(|k,|k’, |k”) e\^[-i(|k-|k’- |k”)x\_2]{}\ & & e\^[-i|q(x\_2-x)]{} M\_[jjZ]{}( p) e\^[-ipx]{}\ & &\ & &M\_[jD]{}( k, k’,k”) e\^[-i(k-k’-k”)x\_1]{}  , where $\widetilde M$’s are the plane wave amplitudes of the processes. It is convenient to switch to shifted 4-coordinate variables $x$, $x_1$ and $x_2$ defined according to $$x_1\rightarrow x_1+x_D~~~~~~x_2\rightarrow x_2+x_{\bar{D}} ~~~~~~x\rightarrow x+x_P,$$ where the propagation times $T$ and $\bar T$ are defined by $$t_D-t_P=T,~~~~~~~~~~~t_{\bar{D}}-t_P=\bar T,$$ and the propagation distances by $$\mathbf{x}_D-\mathbf{x}_P=\mathbf{L},~~~~~~~~~~~\mathbf{x}_{\bar{D}}-\mathbf{x}_P=\mathbf{\bar L},$$ and we redefine $$F(k)=f(k)e^{ikx_D}\Longrightarrow f(k)=F(k)e^{-ikx_D}.$$ Taking into account that $$q\!\!\!/ +m_j=\sum u_j(q,s)\bar u_j(q,s), ~~~~~~~~~ \bar {q\!\!\!/} -\bar m_j=\sum v_j(\bar q,s)\bar v_j(\bar q,s),$$ we redefine the amplitudes (including spinors) correspond to the production and neutrino and antineutrino detection processes, respectively, as follows: $$M_{jjZ}(p)=\dfrac{\bar v_j(\bar q)}{\sqrt{2\bar {q}_0}}\widetilde M_Z( p)\dfrac{u_j(q)}{\sqrt{2q_0}},$$ $$M_{jD}(k,k',k'')=\dfrac{\bar u_j(q)}{\sqrt{2q_0}}\widetilde M_D(k,k',k''),$$ $$M_{j\bar D}(\bar k,\bar k', \bar k'')=\widetilde M_{\bar D}(\bar k,\bar k', \bar k'')\dfrac{v_j(\bar q)}{\sqrt{2\bar q_0}}.$$ Substituting the initial and final state from (\[iket\]) and (\[fket\]) into (\[amp\]) and using above issues, we have A\_ & = & \_j U\_[j]{}\^\*U\_[j]{}e\^[-iq\_0T+iq.L]{}\ & & e\^[-i|q\_0|T+i.]{}\ & & f\_z(p,P) d\^4x e\^[i(q+|q-p)x]{} d\^4x\_1 e\^[-iqx\_1]{} d\^4x\_2 e\^[-i|qx\_2]{}\ & & f\_[D\_I]{}(k,K)e\^[-ikx\_1]{} f\^\*\_[D\_F]{}(k’,K’)e\^[ik’x\_1]{} f\^\*\_[l\^-]{}(k”,K”)e\^[ik”x\_1]{}\ & & f\_[|D\_I]{}(,) e\^[-i|kx\_2]{} f\^\*\_[|D\_F]{}(,)e\^[i|k’x\_2]{}f\^\*\_[l\^+]{}(,)e\^[i|k”x\_2]{}\ & & M\_[j|D]{}(|k,|k’, |k”)M\_[jjZ]{}(p) M\_[jD]{}(k,k’,k”)  . Notice that the integration over $x$ in the recent equation leads to the $\delta$-Dirac function representing energy-momentum conservation in the source. Hereafter, we assume, for simplicity, the momentum wave functions of the initial and final states to be Gaussian which are sharply peaked around the corresponding averaged momentum similar to f(p,p\_i)=()\^[3/2]{} e\^, \[G\] where $\sigma _p$, width of momentum distribution, is assumed to be very smaller than the corresponding averaged momentum. Therefore, similar to the method presented in [@CC], the amplitude of the total process can be written as A\_ & & \_j U\_[j]{}\^\*U\_[j]{}e\^[-iq\_0T+iq.L]{}\ & &e\^[-i|q\_0|T+i.]{}f\_z(p,P)(2)\^4\^4(q+|q-p)\ & &d\^4x\_1\ & &d\^4x\_2\ & & M\_[j|D]{}(|k,|k’, |k”)M\_[jjZ]{}(p) M\_[jD]{}(k,k’,k”)  , \[AMP\] where $\sigma_x$’s are the position uncertainties which are related to the momentum ones through $\sigma _{x}\sigma _{p}\sim\dfrac{1}{2}$ and $\mathbf v$’s denote the group velocities of the corresponding particles. Since the elements of matrix $M$ are smooth functions of the on-shell 4-momenta, whereas the wave packets of the external states are assumed to be sharply peaked at or near the corresponding mean momentum, one can replace $M$ by their values at the mean momenta and pull out of the integral. Moreover, we define $$E_{D_I}-E_{D_F}-E_{l^-}=E_D,~~~~~~~~{\bar E}_{\bar D_I}-{\bar E}_{\bar D_F}-\bar E_{l^+}={\bar E_{\bar D}},$$ $$\mathbf K-\mathbf K'-\mathbf K''=\mathbf K_D,~~~~~~~~\mathbf {\bar K}-\mathbf {\bar K'}-\mathbf {\bar K''}=\mathbf {\bar K_{\bar D}},$$ $$\mathbf v_D\equiv \sigma _{xD}^2(\dfrac{\mathbf v_{D_I}}{\sigma _{xD_I}^2}+\dfrac{\mathbf v_{D_F}}{\sigma _{xD_F}^2}+\dfrac{\mathbf v_{l^-}}{\sigma _{xl^-}^2}),~~~~~~~~\mathbf v_{\bar D}\equiv \sigma _{x{\bar D}}^2(\dfrac{\mathbf v_{{\bar D}_I}}{\sigma _{x{\bar D}_I}^2}+\dfrac{\mathbf v_{{\bar D}_F}}{\sigma _{x{\bar D}_F}^2}+\dfrac{\mathbf v_{l^+}}{\sigma _{xl^+}^2}),$$ $$\mathbf \Sigma _P\equiv \sigma _{xP}^2(\dfrac{\mathbf v^2_{P_I}}{\sigma _{xP_I}^2}+\dfrac{\mathbf v^2_{P_F}}{\sigma _{xP_F}^2}+\dfrac{\mathbf v^2_{l^-}}{\sigma _{xl^-}^2}),~~~~~~~~\mathbf \Sigma _{\bar D}\equiv \sigma _{x{\bar D}}^2(\dfrac{\mathbf v^2_{{\bar D}_I}}{\sigma _{x{\bar D}_I}^2}+\dfrac{\mathbf v^2_{{\bar D}_F}}{\sigma _{x{\bar D}_F}^2}+\dfrac{\mathbf v^2_{l^+}}{\sigma _{xl^+}^2}).$$ Therefore, using above issues and carrying out the integration over $x_1$ and $x_2$ one can write the amplitude as follows: A\_ & & \_j U\_[j]{}\^\*U\_[j]{}M\_[j|D]{}(|K,|K’, |K”)M\_[jjZ]{}(P) M\_[jD]{}(K,K’,K”)(2)\^4\ & &e\^[-iq\_0T+iq.L]{} e\^[-i|q\_0|T+i.]{}\ & &f\_z(p,P)\^4(q+|q-p) e\^[-S(q)]{} e\^[-|S(|q)]{} . where S(q)=+, and |S(|q)= +, with $\lambda _{D(\bar D)}\equiv\mathbf \Sigma _{D(\bar D)}-\mathbf v_{D(\bar D)}^2$. Now, one should carry out the integration over the momentum of either propagating neutrino or propagating antineutrino. Here, we integrate over the momentum of antineutrino. After applying the following change in integration variable $$\mathbf p-\mathbf q=\mathbf p'\Longrightarrow \mathbf p=\mathbf p'+\mathbf q\Longrightarrow d^3\mathbf p=d^3\mathbf p',$$ we have A\_ & & \_j U\_[j]{}\^\*U\_[j]{}M\_[j|D]{}(|K,|K’, |K”)M\_[jjZ]{}(P) M\_[jD]{}(K,K’,K”)(2)\^4\ & &e\^[-iq\_0T+iq.L]{} e\^[-S(q)]{}f\_Z(p\^+q,P)e\^[-|S(p\^)]{}\ &&e\^[-i|E\_j|T+ip’.]{} , where $\bar E_j=E_p-q_0$, $p'^2=\Bar E_j^2-\mathbf {p'}^2$.We perform the integral over $p'$ using the Grimus-Stockinger theorem [@16] $$\int d^3\mathbf p^\prime\dfrac{\phi (\mathbf p')e^{i\mathbf p'.\mathbf L}}{{p'_a}^2-{{\mathbf p}^\prime}^2+i\epsilon}\longrightarrow ^{L\rightarrow \infty} -\dfrac{2\pi ^2}{ L}\phi (p'_a\hat{\mathbf L})e^{ip'_aL},$$ where $\hat{\mathbf L}=\frac{\mathbf L}{\mid\mathbf L\mid}$. This theorem is valid for a function $\phi$ which is differentiable at least three times such that $\phi$ itself and its first and second derivatives decrease at least as $\dfrac{1}{p'^2}$ as $\mid p'\mid \rightarrow \infty$. Performing the recent stage, one can write the amplitude as follows: A\_ & &- \_j U\_[j]{}\^\*U\_[j]{} M\_[j|D]{}(|K,|K’, |K”)M\_[jjZ]{}(P) M\_[jD]{}(K,K’,K”)(2)\^4\ & &e\^[-iq\_0T+iq.L]{} e\^[-S(q)]{}f\_Z(|[p]{}\_j+q)e\^[-|S(|p\_j)]{}e\^[-i|[p]{}\_j ]{}e\^[-iE\_p|T]{}\ &&e\^[iq\_0|T]{}, in which $\mid \bar{\mathbf p}_j\mid=\sqrt{\bar E_j^2-{m_j}^2}$. To carry out the integration over the neutrino 4-momentum, it will be more convenient for us to integrate first over $q^0$ and then over the components of $\mathbf q$. It is noticeable that since the pole at $q^0=-E_j+i\epsilon$ is not physical, the contribution to the integral is only given by the residue at the pole of the neutrino propagator at $q^0=E_j-i\epsilon$ . We obtain A\_ & & \_j U\_[j]{}\^\*U\_[j]{} M\_[j|D]{}(|K,|K’, |K”)M\_[jjZ]{}(P) M\_[jD]{}(K,K’,K”)(2)\^4\ & &e\^[-iE\_p|T]{}f\_Z(|[p]{}\_j+q)(E\_p-E\_j(q))e\^[-iE\_j(q)(T-|T)]{}e\^[iq.L]{} e\^[-i|[p]{}\_j|L]{}\ &&e\^[-S(q)]{}e\^[-|S(|p\_j)]{}. The remaining integration over $\mathbf q$ can be done by using saddle-point approximation at $\mathbf q=\mathbf p_j$. We expand $E_j(\mathbf q)$ about $\mathbf q=\mathbf p_j$ as follows: E\_j(q)=E\_j(p\_j)+(q-p\_j)v\_j+..., where $v_j=\frac{\partial E_j}{\partial \mid\mathbf q\mid}$ at ${\mid\mathbf q\mid=\mid\mathbf p_j\mid}$. Also $S(\mathbf q)+\bar S(\mathbf p-\mathbf q)$ is expanded as follows; S(q)+|S(p-q)=S(p\_j)+|S(|[p]{}\_j)+1 2 (q-p\_j)\^2+..., where the first derivative of $S+\bar S$ at $\mathbf q=\mathbf p_j$ vanishes and the second derivative is given by =+++=\_j. Using the above issues, one can perform the integration over $d^3\mathbf q$. Consequently, the amplitude is obtained as follows: A\_& & \_j U\_[j]{}\^\*U\_[j]{}M\_[j|D]{}(|K,|K’, |K”)M\_[jjZ]{}(P) M\_[jD]{}(K,K’,K”)(2)\^4\ &&e\^[-iE\_p|T]{}(E\_p-E\_j)f\_z(P)e\^[-iP|L]{}\ &&\ && . The probability of the process is proportional to $\mid \mathcal A_{\alpha\beta}\mid ^2$. In a practical experimental setting $L$ and $\bar L$ are usually fixed and known quantity while $T$ and $\bar T$ are not measured. Therefore, the probability of detecting a neutrino with flavor $\alpha$ and an antineutrino with flavor $\beta$ by the neutrino and antineutrino detectors located at the distances $L$ and $\bar L$ from the source, respectively, is obtained by the time average of $\mid \mathcal A_{\alpha\beta}\mid ^2$, which leads to P\_&&\_[j,k]{} U\_[j]{}\^\*U\_[j]{}U\_[k]{}U\_[k]{}\^\*N\_jN\^\*\_k{i(p\_j-p\_k)( L+ [|L]{})-(S(p\_j)+|S(|p\_j))\ &&-(S(p\_k)+|S(|p\_k)) -\ &&- -} , where $$N_j=\dfrac{4i\pi ^2}{\bar L} M_{j\bar D}(\bar K,\bar K')M_{jjZ}(P) M_{jD}(K,K')(2\pi)^4e^{-iE_p\bar T}(E_p-E_j)e^{-ip_a\bar L}f_z(\mathbf P),$$ and $N^*_j$ is its complex conjugate. Since we are concerned with relativistic neutrinos, we use the following approximations. The differences between the energies and momenta of various mass eigenstates are due to the thin splitting of masses. Hence, we approximate E\_jE+ , \[1q\] in which $E$ is the common neutrino energy when $m_i=0$ and $\rho$ is determined from the energy-momentum conservation [@qm]. Equation (\[1q\]) leads to the following approximations p\_jE+(-1), \[2q\] and v\_j1-. \[3q\] Also, due to these approximations, one can easily show that \_j2\_x\^2, where $\sigma _x^2\equiv \sigma _{xD}^2+\sigma _{x{\bar D}}^2$ and 1++. Moreover, one can see that the relativistic approximation leads $S+\bar S$ to be minimum. Therefore, in the relativistic approximation we obtain the following expression for the flavor-changing probability: \[qftresult\] P\_\_[j,k]{} U\_[j]{}\^\*U\_[j]{}U\_[k]{}U\_[k]{}\^\*N\_jN\^\*\_k, with the oscillation length $L_{jk}^{osc}$ and the coherence length $L_{jk}^{coh}$, for $j\neq k$, given by L\_[jk]{}\^[osc]{},          L\_[jk]{}\^[coh]{}2\_x. The exponent in the transition probability obtained for neutral current neutrino includes three terms; the first term leads to the usual oscillation pattern between the detectors, the second term indicates that the coherency condition is satisfied provided that the distance between the detectors is not larger than the coherence length and finally the third term shows that the position uncertainty due to the detection mechanisms must not be larger than the oscillation length. It is noticeable that - the coherent propagation of both neutrino and antineutrino is not sufficient because the oscillation pattern is ceased if the distance between the detectors is larger than the coherence length. In fact, in quantum field theory approach, the conservation of energy-momentum due to the integration over the coordinates of the $Z_0$ decay vertex makes neutrino and antineutrino propagators entirely entangled. - the integration over the coordinates of the vertex of $Z_0$ decay gives energy-momentum conversation and the uncertainty of source is, practically, excluded from calculations. In other words, the source uncertainty does not play any role in the coherency of neutral current neutrinos and the detector uncertainties are analogues to the production and detection uncertainty in the case of he standard neutrino oscillation in the baseline $L+\bar L$. Summary and Discussion ====================== It has been shown that we can see neutrino oscillation pattern for $Z_0$ decay neutrinos provided that both neutrino and anti-neutrino are detected [@smirnov]. In this paper, we restudy this oscillation and corresponding decoherence issues via quantum field theory approach. We should emphasis that although, detection of two neutrinos is far from the experiment, the theoretical study of the neutral current neutrino oscillation leads to some nontrivial viewpoints about the theory of neutrino oscillation. In quantum field theory approach, neutrino and antineutrino are described by free propagators and the initial and final particle states are described by corresponding wave functions. The conservation of energy-momentum due to the integration over the coordinates of vertex of the $Z_0$ decay makes neutrino and antineutrino propagators entirely entangled. Therefore, the coherency of individual neutrino and antineutrino is not enough for oscillation, but the distance between the corresponding detectors have to be smaller than the coherence length. The other important result is related to the uncertainties of source and detectors; the source uncertainty does not play any role in the coherency of neutral current neutrinos and the detector uncertainties are analogues to the production and detection uncertainty in the case of he standard neutrino oscillation in the baseline $L+\bar L$. [**Acknowledgement:**]{} The authors would like to thank Y. Farzan for her fruitful comment and S. M. Fazeli and R. Moazzemi for their useful discussions. [99]{} S. M. Bilenky, Phys. Scripta [**T121**]{}, 17 (2005). E. Kh. Akhmedov, and A. Yu. Smirnov, Phys. Atom. Nucl. [**72**]{}, 1363 (2009). E. Kh. Akhmedov, D. Hernandez, and A. Yu. Sminrnov, JHEP [**1204**]{}, 052 (2012). E. Kh. Akhmedov and A. Yu. Smirnov, Found Phys. [**41**]{}, 1279 (2011). A.Yu. Smirnov and G. T. Zatsepin, Mod. Phys. Lett. A [**7**]{}, 1272 (1991). A. Einstein, B. Podolsky, and N. Rosen, Phys. Rev. [**47**]{}, 777 (1935). C. Giunti, C. W. Kim, J. A. Lee and U. W. Lee, [*Phys. Rev. D*]{} [**48**]{} (1993) 4310. W. Grimus and P. Stockinger, [*Phys. Rev. D*]{} [**54**]{} (1996) 3414. C. Giunti, JHEP [**0211**]{}, (2002) 017. M. Beuthe, Phys. Rep. [**375**]{}, (2003) 105. E. Kh. Akhmedov, and J. Kopp, JHEP [**1004**]{}, 008 (2010). C. Giunti, and C. W. Kim, Found. Phys. Lett. [**14**]{}, (2001) 213. [^1]: mettefaghi@qom.ac.ir
Welcome to The Autonomous Womyn's Front! R!ot grrls, trash kids, punks, rebels and smashers of the state—this is the place for YOU! The Autonomous Womyn's Front is an anarcha-Feminist and self-preservationist organization composed of former FEMEN activists, third positionists and other womyn of color from Black power, brown power, yellow peril and indigenous resistance groups. Our Politics Our politics are an intersectional combination of anarchism, socialism, and feminism. The point of which these intersect is solidarity. Expressing strenth through unity against oppressive colonial institutions like male domination, religious puritanism and white supremacy. You can view our platform in depth here. [ ! NSFW/Not Safe For Work ! ] Our Plans We don't exist to struggle for what we believe is the ridiculous idea if assimilation, (or the more popular term) "equality" of which would be granted to us by our oppressors. "Equal treatment" as would be interpreted by them. The Autonomous Womyn's Front is a liberation initiative for womyn and femmes of color.
Cutscene Cutscenes are sequences in a game over which the player has little or no control and which consist of either cinematics or ingame footage. They are usually utilized to advance the plot and provide background information.
{ "created_at": "2015-02-27T22:27:37.351607", "description": "An implementation of \"Making Change\" kata. Focus is on testing using test.check.", "fork": false, "full_name": "jayp/making-change", "language": "Clojure", "updated_at": "2015-02-27T23:41:39.220984" }
For much of yesterday’s play England looked flat. After all the excitement of the Wanderers at the end of the previous Test and with the boon of Michael Vaughan calling the toss correctly again — he’s still calling heads — the scene was set for a different story from the one that emerged, at least for the first couple of sessions of the day. The most honourable exception was the indomitable Andrew Flintoff. Despite increasing signs of wear over the past weeks, including the side strain that niggled him before the Wanderers and the recurrence of his ankle problem, he
/********************************************************************************************** * LICENSE: zlib/libpng * * raylib is licensed under an unmodified zlib/libpng license, which is an OSI-certified, * BSD-like license that allows static linking with closed source software: * * Copyright (c) 2013-2020 Ramon Santamaria (@raysan5) * Copyright (c) 2020 Slawomir Maludzinski (binding to Never language) * * This software is provided "as-is", without any express or implied warranty. In no event * will the authors be held liable for any damages arising from the use of this software. * * Permission is granted to anyone to use this software for any purpose, including commercial * applications, and to alter it and redistribute it freely, subject to the following restrictions: * * 1. The origin of this software must not be misrepresented; you must not claim that you * wrote the original software. If you use this software in a product, an acknowledgment * in the product documentation would be appreciated but is not required. * * 2. Altered source versions must be plainly marked as such, and must not be misrepresented * as being the original software. * * 3. This notice may not be removed or altered from any source distribution. * **********************************************************************************************/ module raylib_camera { use raylib enum CameraType { CAMERA_PERSPECTIVE = 0, CAMERA_ORTHOGRAPHIC = 1 } enum CameraMode { CAMERA_CUSTOM = 0, CAMERA_FREE = 1, CAMERA_ORBITAL = 2, CAMERA_FIRST_PERSON = 3, CAMERA_THIRD_PERSON = 4 } /* Camera System Functions (Module: camera) */ extern "libraylib.so" func SetCameraMode(camera : raylib.Camera3D, mode : int) -> void /*extern "libraylib.so" func UpdateCamera(Camera *camera) -> void */ /* Update camera position for selected mode */ extern "libraylib.so" func UpdateCameraCopy (camera : raylib.Camera3D) -> raylib.Camera3D extern "libraylib.so" func SetCameraPanControl(panKey : int) -> void /* Set camera pan key to combine with mouse movement (free camera) */ extern "libraylib.so" func SetCameraAltControl(altKey : int) -> void /* Set camera alt key to combine with mouse movement (free camera) */ extern "libraylib.so" func SetCameraSmoothZoomControl(szKey : int) -> void /* Set camera smooth zoom key to combine with mouse (free camera) */ extern "libraylib.so" func SetCameraMoveControls(frontKey : int, backKey : int, rightKey : int, leftKey : int, upKey : int, downKey : int) -> void /* Set camera move controls (1st person and 3rd person cameras) */ }
This blog is a way for me to express my life stories, personal opinions and/or soap box rants about society in general but more specifically, my family, friends, and the people I meet everyday that remind me to be thankful for the things I do have and for the people that are lucky enough to know me :-) J/K (for the wonderful people in my life) Search This Blog Thursday, January 5, 2012 New Year Resolutions Most Americans have heard of New Year's Resolutions and have made one/some a time or two. Personally, I make at least one NY resolution every year. Do you know what the #1 NY resolution is, well at least in female population? If you said to lose weight/get healthy, you are absolutely RIGHT! For the most part of my life, I had chosen this resolution every year! Except this year...and since this was my first year not to have the same resolution, I need to come up with a new resolution. It's already the 5th of the month and I still have not come up with a NY resolution! I need some ideas! What did you choose for your NY resolution? What do you think is a good (realistic) resolution that I could (actually) stick to for more than 1 day, lol! No comments: Post a Comment Bonjour Background About Me Hi! My name is Melissa West-Smith. I am currently a graduate student at the University of Houston - Clear Lake. I am majoring in Education Curriculum & Instruction with a specialization/certification in Instructional Technology. I am happily married to my high school sweetheart (Curtis Smith) going on 8 years. We have 2 amazingly brilliant children (Logan and Brooklynn). Logan is about to be 5 years old at the end of this month and Brooklynn will be 2 at the end of March. My family is my rock, my strength, and my whole world.
France: US helping support Mali operation BAMAKO, Mali - France's foreign minister says the United States is providing communications and transport help for an international military intervention aimed at wresting Mali's north out of the hands of Islamist extremists. Laurent Fabius says Britain, Denmark, and other European countries also are helping. Fabius said on RTL radio Sunday, "We have the support of the Americans for communications and transport." He didn't provide details. U.S. officials on Saturday said they had offered to send drones to Mali. The three-day-old French-led effort to take back Mali's north from the al-Qaida-linked extremists has included airstrikes by jets and combat helicopters on at least four towns.
Q: Proxy http upload to another server My application consists of a UI web server and an application web server, both of them communicates through a message bus. now I want to let user upload a file through their web browser, the problem is, user's browser is connecting UI web server, but I want to the file is finally uploaded to application web server. How can I do this? Can I redirect all http upload requests to application server? Is there any example I can follow? thank you A: You can do this, by just changing the POST location of the <form's action= attribute to the script you want to accept the file on the appropriate url location. The location you post to must be accessible to the user to be able to POST to. The other option is to post it to your UI web server, and from your UI web server, send it to the application web server. e.g. <form action="http://other-server.example.com" method="POST"> See also: HTML Form POST Cross Domain Cross Domain Form POSTing Send cross domain HTTP Post with HTML forms
If you're not happy, we're not happy. That's where our "Love It or Send It Back" policy comes in. If you're dissatisfied with your Ballard purchase for any reason, you can return it within 90 days of the ship date for an exchange or full refund* (excluding Shipping & Processing fees). You are invited to try items within our Best of Ballard collection risk-free for 30 days. If you're not satisfied, we will refund the purchase price AND shipping costs. Best of Ballard items are exempt from additional discounts and free shipping offers. If you don't absolutely love your new slipcovered seating or upholstered seating for any reason, return it within 10 days of delivery absolutely free – we'll even pay the return shipping. It's that simple. We guarantee it. Now doesn't that make you happy? We want you to be happy. If for any reason you are dissatisfied with your purchase, simply return it within 90 days of the ship date for an exchange or refund (excluding Shipping & Processing fees). All products are guaranteed from defects for a full year. Please carefully inspect your order upon delivery. If you receive damaged or defective merchandise, you may contact our Customer Service department at 1-800-536-7551 and a representative will be glad to arrange a return or exchange for you. Please note: Any items that are monogrammed, customized, Customer's Own Material (COM), or made-to-order cannot be returned or exchanged unless damaged or defective. Defective items will be exchanged unless no longer available, in which case a Merchandise Certificate will be issued. Once a returned item is received in our warehouse, the return or exchange will be processed immediately. For credit card orders, you can expect to see your refund credit within 72 hours. For check and money orders, you can expect to receive your refund check within 7-10 business days. Special delivery methods are noted in the item description. Standard DeliveryOrders are shipped by standard ground and usually arrive within 3-7 business days. Items ordered at the same time may not be delivered together. Threshold DeliveryThreshold Deliveries are made by standard truck, unloaded by the driver and placed inside the first-floor doorway, garage or covered area of your choice. Delivery is typically 2-3 weeks from the date item is shipped but may vary depending on your residence and location of shipment pickup. In-Home DeliveryIn-Home Deliveries are made by standard truck, placed inside your home wherever you like, inspected, and the packaging removed. Please allow an additional 2-3 weeks from Ship Date for your order to arrive. An agent will call to schedule your delivery. (Not available in all states.) O/S (Oversized) Delivery Items that are heavy or bulky are subject to an Oversized Delivery surcharge. This charge is listed after the item price. Express Delivery Express orders received by 4 p.m. EST are shipped the same day. For items under 15 lb., the following Express Delivery rates apply: Swatch ShippingBallard Designs offers up to 10 free swatches for all of our fabrics for a small fee of $5.95 for shipping and processing. It will take 3-7 business days for your swatches to arrive. The swatches are approximately a 3" X 3" square. We do offer some rug, leather, and wallpaper swatches. To see if the swatch is available, please call us at 800-367-2775. false false false falsepdp{"scheme":"product1_cr"} falsepdp{"scheme":"product2_cr"} [ProductDetail_Espot01] [ProductDetail_Espot02] Rated 5 out of 5 by 7 reviewers. Rated 5 out of 5 by kavslik A great find! This wall hanging is a very attractive piece. It's size is exactly as described. It needs a larger area. I hung mine in an open staircase. I would like the smaller one to hang with it...maybe the next time Ballard designs has a sale! August 5, 2016 Rated 5 out of 5 by MCB30 This is a beautiful addition to our home! I ordered the smaller one but decided I needed the big one on my wall. It is perfect! Well made - very high quality! July 22, 2016 Rated 5 out of 5 by yogagal Very pleased I was very pleased with this piece when it arrived. It looked better than I expected. Good quality and attractive addition to my entryway. July 13, 2016 Rated 5 out of 5 by BecSnap Madera Sunburst I am a lover of the unusual. Quality appearance is very important, as are, style and character. The Madera Sunburst meets and exceeds all of my expectations. This wall piece adds dimension and interest to my room. I am totally pleased with this addition to my home decor. March 5, 2016 Vintage signs are hot collectibles. Re-create the look with our popular Typesetter Plaques. Spell out a name, common phrase or monogram in perfect style. Antique gold style is hand finished with real gold leaf for great depth and color. Typesetter ...
/* * Author: Kent Overstreet <kmo@daterainc.com> * * GPLv2 */ #define _FILE_OFFSET_BITS 64 #define _XOPEN_SOURCE 500 #define _GNU_SOURCE #include <fcntl.h> #include <limits.h> #include <linux/fs.h> #include <math.h> #include <stdbool.h> #include <stdio.h> #include <string.h> #include <unistd.h> #include <sys/ioctl.h> #include <sys/klog.h> #include <sys/param.h> #include <sys/types.h> #include <sys/stat.h> #include <stdlib.h> #include <stdint.h> #include <time.h> #include <openssl/rc4.h> #include <openssl/md4.h> static const unsigned char bcache_magic[] = { 0xc6, 0x85, 0x73, 0xf6, 0x4e, 0x1a, 0x45, 0xca, 0x82, 0x65, 0xf5, 0x7f, 0x48, 0xba, 0x6d, 0x81 }; unsigned char zero[4096]; bool klog = false; #define Pread(fd, buf, size, offset) do { \ int _read = 0, _r; \ while (_read < size) { \ _r = pread(fd, buf, (size) - _read, (offset) + _read); \ if (_r <= 0) \ goto err; \ _read += _r; \ } \ } while (0) #define Pwrite(fd, buf, size, offset) do { \ int _write = 0, _r; \ while (_write < size) { \ _r = pwrite(fd, buf, (size) - _write, offset + _write); \ if (_r < 0) \ goto err; \ _write += _r; \ } \ } while (0) /* Marsaglia polar method */ double normal() { double x, y, s; static double n = 0 / (double) 0; if (n == n) { x = n; n = 0 / (double) 0; return x; } do { x = random() / (double) (RAND_MAX / 2) - 1; y = random() / (double) (RAND_MAX / 2) - 1; s = x * x + y * y; } while (s >= 1); s = sqrt(-2 * log(s) / s); n = y * s; return x * s; } long getblocks(int fd) { long ret; struct stat statbuf; if (fstat(fd, &statbuf)) { perror("stat error"); exit(EXIT_FAILURE); } ret = statbuf.st_size / 512; if (S_ISBLK(statbuf.st_mode)) if (ioctl(fd, BLKGETSIZE, &ret)) { perror("ioctl error"); exit(EXIT_FAILURE); } return ret; } struct pagestuff { unsigned char csum[16]; unsigned char oldcsum[16]; int readcount; int writecount; }; void flushlog(void) { char logbuf[1 << 21]; int w = 0, len; static int fd; if (!klog) return; if (!fd) { klogctl(8, 0, 6); sprintf(logbuf, "log.%i", abs(random()) % 1000); fd = open(logbuf, O_WRONLY|O_CREAT|O_TRUNC, 0644); if (fd == -1) { perror("Error opening log file"); exit(EXIT_FAILURE); } } len = klogctl(4, logbuf, 1 << 21); if (len == -1) { perror("Error reading kernel log"); exit(EXIT_FAILURE); } while (w < len) { int r = write(fd, logbuf + w, len - w); if (r == -1) { perror("Error writing log"); exit(EXIT_FAILURE); } w += r; } } void aio_loop(int nr) { } void usage() { exit(EXIT_FAILURE); } int main(int argc, char **argv) { bool walk = false, randsize = false, verbose = false, csum = false, rtest = false, wtest = false; int fd1, fd2 = 0, direct = 0, nbytes = 4096, j, o; unsigned long size, i, offset = 0, done = 0, unique = 0, benchmark = 0; void *buf1 = NULL, *buf2 = NULL; struct pagestuff *pages, *p; unsigned char c[16]; time_t last_printed = 0; extern char *optarg; RC4_KEY writedata; RC4_set_key(&writedata, 16, bcache_magic); while ((o = getopt(argc, argv, "dnwvscwlb:")) != EOF) switch (o) { case 'd': direct = O_DIRECT; break; case 'n': walk = true; break; case 'v': verbose = true; break; case 's': randsize = true; break; case 'c': csum = true; break; case 'w': wtest = true; break; case 'r': rtest = true; break; case 'l': klog = true; break; case 'b': benchmark = atol(optarg); break; default: usage(); } argv += optind; argc -= optind; if (!rtest && !wtest) rtest = true; if (argc < 1) { printf("Please enter a device to test\n"); exit(EXIT_FAILURE); } if (!csum && !benchmark && argc < 2) { printf("Please enter a device to compare against\n"); exit(EXIT_FAILURE); } fd1 = open(argv[0], (wtest ? O_RDWR : O_RDONLY)|direct); if (!csum && !benchmark) fd2 = open(argv[1], (wtest ? O_RDWR : O_RDONLY)|direct); if (fd1 == -1 || fd2 == -1) { perror("Error opening device"); exit(EXIT_FAILURE); } size = getblocks(fd1); if (!csum && !benchmark) size = MIN(size, getblocks(fd2)); size = size / 8 - 16; pages = calloc(size + 16, sizeof(*pages)); printf("size %li\n", size); if (posix_memalign(&buf1, 4096, 4096 * 16) || posix_memalign(&buf2, 4096, 4096 * 16)) { printf("Could not allocate buffers\n"); exit(EXIT_FAILURE); } //setvbuf(stdout, NULL, _IONBF, 0); for (i = 0; !benchmark || i < benchmark; i++) { bool writing = (wtest && (i & 1)) || !rtest; nbytes = randsize ? drand48() * 16 + 1 : 1; nbytes <<= 12; offset >>= 12; offset += walk ? normal() * 20 : random(); offset %= size; offset <<= 12; if (!(i % 200)) flushlog(); if (!verbose) { time_t now = time(NULL); if (now - last_printed >= 2) { last_printed = now; goto print; } } else print: printf("Loop %6li offset %9li sectors %3i, %6lu mb done, %6lu mb unique\n", i, offset >> 9, nbytes >> 9, done >> 11, unique >> 11); done += nbytes >> 9; if (!writing) Pread(fd1, buf1, nbytes, offset); if (!writing && !csum && !benchmark) Pread(fd2, buf2, nbytes, offset); for (j = 0; j < nbytes; j += 4096) { p = &pages[(offset + j) / 4096]; if (writing) RC4(&writedata, 4096, zero, buf1 + j); if (csum) { MD4(buf1 + j, 4096, &c[0]); if (writing || (!p->readcount && !p->writecount)) { memcpy(&p->oldcsum[0], &p->csum[0], 16); memcpy(&p->csum[0], c, 16); } else if (memcmp(&p->csum[0], c, 16)) goto bad; } else if (!writing && !benchmark && memcmp(buf1 + j, buf2 + j, 4096)) goto bad; if (!p->writecount && !p->readcount) unique += 8; writing ? p->writecount++ : p->readcount++; } if (writing) Pwrite(fd1, buf1, nbytes, offset); if (writing && !csum && !benchmark) Pwrite(fd2, buf2, nbytes, offset); } printf("Loop %6li offset %9li sectors %3i, %6lu mb done, %6lu mb unique\n", i, offset >> 9, nbytes >> 9, done >> 11, unique >> 11); exit(EXIT_SUCCESS); err: perror("IO error"); flushlog(); exit(EXIT_FAILURE); bad: printf("Bad read! loop %li offset %li readcount %i writecount %i\n", i, (offset + j) >> 9, p->readcount, p->writecount); if (!memcmp(&p->oldcsum[0], c, 16)) printf("Matches previous csum\n"); flushlog(); exit(EXIT_FAILURE); }
Immunoaffinity purification of the calpains. A monoclonal antibody to the small subunit common to both mu- and m-calpains can be used in an immunoaffinity column to purify either mu- or m-calpain in a proteolytically active form. Extracts in 150 mM NaCl, pH 7.5, are loaded onto a column containing the anti-28-kDa antibody; the column is washed with 500 mM NaCl, pH 7.5, and the bound calpain is eluted with 150 mM NaCl, 50 mM Tris-HCl, pH 9.5, and 1 mM EDTA. These elution conditions do not affect the proteolytic activity of either mu- or m-calpain. It is most efficient to reduce the volume and to remove any proteolytic activity from crude extracts by using successive phenyl Sepharose and ion-exchange columns before loading onto the immunoaffinity column. The column purifies m-calpain more effectively than mu-calpain; m-calpain is greater than 90% pure after a single pass through this column, whereas mu-calpain can be purified to >70% purity. The epitope for the monoclonal antibody is between amino acids 92 and 104 (numbers for human calpain) in the 28-kDa subunit. Evidently, this area is shielded in the calpain molecule in a way that affects binding of the antibody to the native molecule.
#include "Vector3.h" namespace SyntopiaCore { namespace Math { } }
USA vs. Puerto Rico in World Baseball Classic Tonight! After 39 games in 16 days in 6 different cities, the 2017 World Baseball Classic concludes tonight. The United States will battle Puerto Rico in the WBC championship game at Dodger Stadium in Los Angeles. The championship game will be televised by MLB Network at 9 p.m. ET on ESPN2 and ESPN Deportes will televise the title game in Spanish This is the farthest Team USA has ever advanced in the WBC, in the title game by beating Japan 2-1 in Tuesday night’s semifinal. That was Japan’s only loss of this tournament. The win came three days after the United States beat the defending WBC champion Dominican Republic in San Diego. Puerto Rico came close to winning the 2013 World Baseball Classic, falling in the title game to the Dominican Republic, who finished that tournament at 8-0. Now, Puerto Rico (7-0) is trying to become the second team to complete a WBC undefeated and make history as well. “From defeat we learned, but we learned more from the great success we had in 2013,” Puerto Rico manager Edwin Rodriguez said Monday. “We have the talent, we have the staff, and we were able to execute the game and the plays as they should be executed. Then they were able to reach far, and that was what we learned the best.” It took 11 innings on Monday night for Puerto Rico to outlast the Netherlands in the first WBC semifinal, a 4-3 game that was full of many exciting moments These two teams met once already during this tournament, with Puerto Rico beating the United States 6-5 last Friday in a second-round matchup at Petco Park in San Diego.
Retired rocket man Dan Barry spends his days building robots but found himself struggling to put together a much simpler puzzle on last week's Survivor: PanamaExile Island. As a result, the 52-year-old father of two found himself packing his bags aft… Read more
The team will be boosted by the return of Braith Anasta from a sternum injury and Steve Reardon from a back complaint. Luke Patten is out with an injured shoulder and Hazem El Masri drops back to fullback. Brent Sherwin is also under an injury due to a leg injury.
For our websites to work correctly, it is necessary to have Javascript turned on. We use Cookies to improve our services. You can get more detailed info on their use and settings here. OK We have noticed that you have an ad blocking tool switched on. Revenues from Ads help our site to bring you more information about Slovakia. If you visit our website regularly, you can support us by adding us on the list of unblocked websites (whitelist). Thank you. ✖ Jürgen Knie (Source: Courtesy of the Slovak-German Chamber of Commerce) The murder of investigative journalist Ján Kuciak and his fiancée, Martina Kušnírová, shocked not only Slovakia but also made headlines abroad. The Slovak-German Chamber of Commerce was one of the organisations that responded to the murders with an official stance. In its statement headlined, The Time for Responsibility, the chamber condemned the murders and called for a more effective fight against corruption and better law enforcement. “Anti-corruption laws have been tightened and processes to increase transparency and facilitate criminal prosecution have been introduced in Slovakia,” read the stance. “Thus, the shortcomings in rule of law do not lie in legislation but primarily in practical law enforcement.” Corruption and the fight against it is a topic that repeatedly top lists of barriers for doing business in Slovakia. The Slovak Spectator spoke with the president of the Slovak-German Chamber of Commerce, Jürgen Knie, about this issue, along with Slovak-German business relations, and the operation of the chamber in Slovakia. The Slovak Spectator (TSS): Why did the Slovak-German Chamber of Commerce respond to the double murder of Ján Kuciak and Martina Kušnírová? Read more: What are other obstacles German investors and companies register in Slovakia? What challenges does Industry 4.0 bring for German companies in Slovakia and Slovakia’s industry in general? What are the plans of the chamber for the future?
Q: Java memory leak with Strings? Why is this consuming and crashing Lists of Integer, Long, execute ok. However when using String the code below consumes over 5GB of memory when an entry at most should be in the neighborhood of 8 bytes per String, equating to only ~700MB. It also runs infinitely never throwing heap out of bounds. What is going on? List<List<String>> arrayList = new ArrayList<List<String>>(); long offset = 1000; long size = 83886080; int max = Integer.MAX_VALUE - 100; long subloops = 1; if(size > max) { subloops = size / max; } int temp = 0; long count = 1; long start = System.nanoTime(); for(int j=0; j<subloops; j++) { temp = (int)(size % max); arrayList.add(new ArrayList<String>(temp)); List<String> holder = arrayList.get(j); for (long i = 0; i < temp; i++) { holder.add(Long.toString(offset + count)); count++; } size -= temp; } long finalTime = System.nanoTime() - start; System.out.println("Total time = " + finalTime); System.out.println(count); //for reference the max item length in bytes ends up being 8 System.out.println(Long.toString(offset+count).getBytes().length); A: Memory footprint of a String involves the memory overhead of an object plus the fields of the object. See this answer for detail: What is the memory consumption of an object in Java? The String object has two instance fields in Java 8: char value[] int hash Assuming 64-bit Java with compressed OOPS, that means memory is: String: Object header: 12 bytes Reference to char[]: + 4 bytes Integer value: + 4 bytes Data size: = 20 bytes Total aligned size: 24 bytes char[]: Object header: 12 bytes Array length: + 4 bytes Characters: + 2 bytes * length Data size (len=8): = 32 bytes Total aligned size: 32 bytes Add another 4 bytes for the reference to the string (stored in the ArrayList), and you get a total size for String of 8 characters: 60 bytes Creating 83,886,080 strings then uses 5,033,164,800 bytes = 4.7 Gb.
Q: django gives duplicate error everytime the project runs I am trying to add some data which is in response_body to my 'Offenses' table in my database 'dashboard' I want to add this data only once,so at the first time the data was added to my database successfully but after that it gave me this error because it obviously refuse to create duplicate entry for another oid which is set as unique How can I modify my code so that the data is added only once and no duplicate data is added and it does not give me this error django.db.utils.IntegrityError: (1062, "Duplicate entry '4767' for key 'PRIMARY'") Below is my code. I have created the table from models.py and adding the data from views.py because the data is present in views.py and it was easier to add the data from here. if there is any other suitable approach please suggest. models.py from django.db import models from django.contrib.auth.models import UserManager from django.core.validators import int_list_validator # Create your models here. class Offenses(models.Model): oid = models.IntegerField(primary_key=True) description = models.CharField(null=False, max_length=20) assigned_to = models.CharField(null=True, max_length=20) categories = models.TextField(null=True) category_count = models.IntegerField(null=True) policy_category_count = models.IntegerField(null=True) security_category_count = models.IntegerField(null=True) close_time = models.TimeField(null=True) closing_user = models.IntegerField(null=True) closing_reason_id = models.IntegerField(null=True) credibility = models.IntegerField(null=True) relevance = models.IntegerField(null=True) severity = models.IntegerField(null=True) magnitude = models.IntegerField(null=True) destination_networks = models.TextField(null=True) source_network = models.CharField(null=True, max_length=20) device_count = models.IntegerField(null=True) event_count = models.IntegerField(null=True) flow_count = models.IntegerField(null=True) inactive = models.BooleanField(null=True) last_updated_time = models.DateTimeField(null=True) local_destination_count = models.IntegerField(null=True) offense_source = models.IntegerField(null=True) offense_type = models.IntegerField(null=True) protected = models.BooleanField(null=True) follow_up = models.BooleanField(null=True) remote_destination_count = models.IntegerField(null=True) source_count = models.IntegerField(null=True) start_time = models.TimeField(null=True) status = models.CharField(null=True, max_length=20) username_count = models.IntegerField(null=True) source_address_ids = models.TextField(null=True) local_destination_address_ids = models.TextField(null=True) domain_id = models.IntegerField(null=True) objects = UserManager() class Meta: db_table = "offenses" views.py response_body = json.loads(response.read().decode('utf-8')) for j in response_body: obj = Offenses.objects.create(oid=j['id'], description=j['description']) A: Use Django's get_or_create: obj, created = Offenses.objects.get_or_create(oid=j['id'], defaults={'description': j['description']})
PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT UNITED STATES OF AMERICA,  Plaintiff-Appellee, v.  No. 01-4026 BING SUN; PATTE SUN; ALL PORTS, INCORPORATED, Defendants-Appellants.  Appeal from the United States District Court for the Eastern District of Virginia, at Norfolk. Raymond A. Jackson, District Judge. (CR-00-28) Argued: September 28, 2001 Decided: January 10, 2002 Before MICHAEL and MOTZ, Circuit Judges, and HAMILTON, Senior Circuit Judge. Affirmed by published opinion. Senior Judge Hamilton wrote the opinion, in which Judge Michael and Judge Motz joined. COUNSEL ARGUED: Anthony Francis Troy, TROUTMAN, SANDERS, MAYS & VALENTINE, L.L.P., Richmond, Virginia, for Appellants. Alan Mark Salsbury, Assistant United States Attorney, Norfolk, Vir- ginia, for Appellee. ON BRIEF: James C. Roberts, John S. West, TROUTMAN, SANDERS, MAYS & VALENTINE, L.L.P., Rich- 2 UNITED STATES v. SUN mond, Virginia, for Appellants Bing Sun and All Ports; Lawrence G. Cohen, David W. Lannetti, VANDEVENTER BLACK, L.L.P., Nor- folk, Virginia, for Appellant Patte Sun. Kenneth E. Melson, United States Attorney, Norfolk, Virginia, for Appellee. OPINION HAMILTON, Senior Circuit Judge: Following a jury trial, Bing Sun and All Ports, Incorporated (All Ports) were convicted of conspiracy to export defense articles on the United States Munitions List (Munitions List) without a license and conspiracy to commit money laundering in violation of 18 U.S.C. § 371, 18 U.S.C. § 1956(a)(2)(A), and 22 U.S.C. § 2778. The jury also found Bing Sun, All Ports, and Patte Sun, Bing Sun’s wife, guilty of two counts of attempting to export defense articles on the Muni- tions List without a license in violation of 22 U.S.C. § 2778. Bing Sun was sentenced to sixty months’ imprisonment; Patte Sun to forty-one months’ imprisonment; and All Ports to two years’ probation and a $100,000 fine. The district court entered each defendant’s judgment on December 28, 2000. Each defendant filed a timely appeal, and we now affirm. I A The Arms Export Control Act (AECA), id., authorizes the Presi- dent to control, inter alia, the export and import of defense articles. Id. § 2778(a)(1). The Department of State, exercising this authority for the President, has promulgated the International Traffic in Arms Regulations (ITAR), 22 C.F.R. §§ 120.1-130.17. These regulations include the Munitions List, which consists of categories of military items that cannot be exported without a license issued by the Depart- ment of State’s Office of Defense Trade Controls. 22 C.F.R. §§ 121.1, 123.1, 127.1. Because the United States maintains an arms embargo with the People’s Republic of China, no license to ship items on the Munitions List to the People’s Republic of China can be acquired. A UNITED STATES v. SUN 3 willful violation of the AECA or its implementing regulations sub- jects an offender to criminal sanctions. 22 U.S.C. § 2778(c). B When a United States military unit determines that a piece of mili- tary property, including an item on the Munitions List, is "obsolete," in a condition that is "no longer repairable," or in "excess," (J.A. 273), the military unit turns the property over to the Defense Reutilization and Marketing Service (DRMS), an agency operated by the Depart- ment of Defense. Once the military property is turned over to the DRMS, the DRMS offers it to other military units. If no other military unit is interested, the military property is offered to federal agencies, state agencies, and non-profit organizations. If there are no federal agencies, state agencies, or non-profit organizations interested in the military property, the military property is offered for sale, sometimes labeled as "scrap," to the general public through a national sales pro- gram. (J.A. 273). Often, multiple pieces of military property are offered for sale in "lots." (J.A. 276). Through its national sales program, the DRMS issues Invitations for Bid to prospective purchasers. An Invitation for Bid contains a description of the items for sale, the terms and conditions of sale, a bid sheet, and an End Use Certificate.1 The Invitation for Bid also indicates whether a particular lot contains items on the Munitions List. Importantly, even if a particular lot designates the military prop- erty as "scrap," the Invitation for Bid will indicate whether the lot contains items on the Munitions List. Prospective purchasers of military property are also furnished with a Sale By Reference pamphlet, which states that items on the Muni- tions List which do not require demilitarization may be sold for "mili- tary or other use," (J.A. 1846), to those foreign countries to which the United States Department of State will issue an export license under the ITAR.2 The Sale By Reference pamphlet also states that the use, 1 The End Use Certificate must accompany each bid submitted by a prospective purchaser. The End Use Certificate indicates the purchaser’s intended disposition of the property and the property’s intended end use. 2 All property in the government’s military supply system is assigned a demilitarization code (Demil Code). Demil Codes vary depending on 4 UNITED STATES v. SUN disposition, export, and reexport of military property is subject to all applicable United States laws and regulations, the AECA, and the ITAR. C Bing and Patte Sun were the primary owners of All Ports, a com- pany headquartered in Fontana, California. The primary business of All Ports was the sale of United States government military property to the People’s Republic of China. All Ports maintained warehouse facilities in Fontana, Norfolk, Virginia, and San Antonio, Texas. The duties of operating All Ports were split between Bing and Patte Sun. Bing Sun inspected military property at various military facilities around the country. He prepared bid packages for submission to the DRMS. In addition, Bing Sun set up and oversaw the operation of All Ports’ export facilities. Patte Sun, who was described as a knowledge- able businesswoman, administered the contracts that All Ports had with the DRMS, each one of which, according to the written Invita- tions for Bid, contained Munitions List items. All contract documents were delivered to All Ports’ office in Fontana, where she worked. Patte Sun prepared the checks in payment of the contracts awarded to All Ports; assisted in the management of All Ports’ warehouse in Fon- tana; and made shipping arrangements with overseas freight forward- ers for the export of the military property.3 the nature of the item. For example, a chair has an A Demil Code, while a fully operational rocket launcher has a D Demil Code. An item of mili- tary property with a Demil Code B or later is an item on the Munitions List. The Demil Code determines how items are to be demilitarized. For an item of military property with a Demil Code of A or B, demilitariza- tion is not required. However, all other Demil Codes require some form of demilitarization, which is performed, as a condition of the sale, by the DRMS or the purchaser. 3 At trial, the government introduced evidence that Bing and Patte Sun, as knowledgeable businesspeople, were familiar with the AECA and its implementing regulations. The government also introduced evidence that Patte Sun told the owner of one of the overseas freight forwarders used by the defendants that All Ports does not "send any military scrap to for- eign countries." (J.A. 495). UNITED STATES v. SUN 5 Between 1994 and 1999, All Ports shipped over 1,000 containers of military property to the People’s Republic of China. During this period, approximately sixty-four End Use Certificates were submitted to the DRMS on behalf of All Ports as part of bid documents for lots of military property. Patte Sun completed and signed two of those End Use Certificates and the rest were completed and signed by Bing Sun. With one exception, these End Use Certificates indicated that the military property would be distributed in the "USA and other coun- tries" and that the customers were "unknown at the present time."4 (J.A. 1864). However, beginning in 1997, these lots of military prop- erty were shipped by All Ports to but one customer which had become All Ports’ sole purchaser in the People’s Republic of China.5 On May 7, 1999, without a license, the Suns and All Ports attempted to export, from Norfolk to the People’s Republic of China, four shipping containers of military "scrap" property purchased from the DRMS.6 These containers were presented for export at the Nor- folk International Terminal, where they were detained and subse- quently seized by the United States Customs Service. The material in three of these containers included items designated by the State Department as defense articles on the Munitions List, including four- teen twenty-millimeter tail-gun pods for the MK-4, nine twenty- millimeter nose pods for the MK-4, six underwater mines for the MK- 60, two missile fins for air launched guided missiles, eight fin assem- blies for air launched guided missiles, and thirteen twenty-millimeter gun pod center cylinders for the MK-4. On May 13, 1999, without a license, the Suns and All Ports attempted to export, from Norfolk to the People’s Republic of China, two shipping containers of military "scrap" property purchased from the DRMS. These containers were presented for export at the Norfolk International Terminal, where they were detained and subsequently 4 Taiwan was identified on one End Use Certificate. 5 As of May 1999, All Ports had become the customer with the largest number of active contracts with the DRMS, with a total value of its national sales contracts exceeding six million dollars. 6 As noted earlier, even if an Invitation for Bid designates the military property as "scrap," the Invitation for Bid indicates whether the lot con- tains items on the Munitions List. 6 UNITED STATES v. SUN seized by the United States Customs Service. Items in these contain- ers included wing assemblies for guided bombs, fin assemblies for air launched missiles, wing assemblies for air launched missiles, duct assemblies for the B-1 bomber, and missile fins for air launched guided missiles. D On February 24, 2000, Bing Sun, Patte Sun, and All Ports were charged in a forty-seven count indictment. Count One charged Bing Sun, Patte Sun, and All Ports with conspiracy to export defense arti- cles on the Munitions List without a license and conspiracy to commit money laundering in violation of 18 U.S.C. § 371, 18 U.S.C. § 1956(a)(2)(A), and 22 U.S.C. § 2778. Counts Two through Twenty- Three charged the defendants with exportation of defense articles on the Munitions List without a license. 22 U.S.C. § 2778. Counts Twenty-Four and Twenty-Five charged the defendants with attempt- ing to export defense articles on the Munitions List without a license.7 Id. Counts Twenty-Six through Forty-Seven charged the defendants with money laundering. 18 U.S.C. § 1956(a)(2)(A). Prior to trial, the government withdrew four counts of the indict- ment. Following a jury trial, with respect to Bing Sun and All Ports, the jury returned guilty verdicts on Counts One, Twenty-Four, and Twenty-Five. With respect to Patte Sun, the jury returned guilty ver- dicts on Counts Twenty-Four and Twenty-Five. The jury returned verdicts of not guilty on the remaining counts. Bing Sun was sen- tenced to sixty months’ imprisonment; Patte Sun to forty-one months’ imprisonment; and All Ports to two years’ probation and a $100,000 fine. The district court entered each defendant’s judgment on Decem- ber 28, 2000. Each defendant filed a timely appeal. II The defendants contend that the AECA and its implementing regu- lations are constitutionally void for vagueness under the Due Process 7 The defendants’ attempts to export defense articles on the Munitions List without a license on May 7 and 13, 1999 formed the basis of Counts Twenty-Four and Twenty-Five. UNITED STATES v. SUN 7 Clause of the Fifth Amendment to the United States Constitution. We review a defendant’s challenge to the constitutionality of a statute de novo. United States v. Bostic, 168 F.3d 718, 721 (4th Cir. 1999) (reviewing constitutionality of 18 U.S.C. § 922(g)(8)). The constitu- tionality of a regulation is also reviewed de novo. United States v. Lee, 183 F.3d 1029, 1031 (9th Cir. 1999) (reviewing constitutionality of the AECA and its implementing regulations), cert. denied, 528 U.S. 990 (1999), and cert. denied, 528 U.S. 1128 (2000). "Due process requires that a criminal statute provide adequate notice to a person of ordinary intelligence that his contemplated con- duct is illegal, for ‘no man shall be held criminally responsible for conduct which he could not reasonably understand to be proscribed.’" Buckley v. Valeo, 424 U.S. 1, 77 (1976) (quoting United States v. Harriss, 347 U.S. 612, 617 (1954)). Thus, "the void-for-vagueness doctrine requires that a penal statute define the criminal offense with sufficient definiteness that ordinary people can understand what con- duct is prohibited and in a manner that does not encourage arbitrary and discriminatory enforcement." Kolender v. Lawson, 461 U.S. 352, 357 (1983). The defendants’ challenge to the AECA and its implementing regu- lations is reviewed only as the AECA and the implementing regula- tions were applied to them. Schleifer v. City of Charlottesville, 159 F.3d 843, 853 (4th Cir. 1998). "[V]agueness challenges to statutes which do not involve First Amendment freedoms must be examined in the light of the facts of the case at hand." United States v. Mazurie, 419 U.S. 544, 550 (1975). The Supreme Court has noted "that the approach to ‘vagueness’ governing a case like this is different from that followed in cases arising under the First Amendment. There we are concerned with the vagueness of the statute ‘on its face’ because such vagueness may in itself deter constitutionally protected and socially desirable conduct." United States v. Nat’l Dairy Prods. Corp., 372 U.S. 29, 36 (1963). Moreover, "where, as here, a criminal statute regulates economic activity, it generally ‘is subject to a less strict vagueness test, because its subject matter is more often narrow and because businesses can be expected to consult relevant legislation in advance of action.’" United States v. Iverson, 162 F.3d 1015, 1021 (9th Cir. 1998) (quoting United States v. Doremus, 888 F.2d 630, 634 (9th Cir. 1989)). "[A] scienter requirement may mitigate a law’s 8 UNITED STATES v. SUN vagueness, especially with respect to the adequacy of notice to the complainant that his conduct is proscribed." Village of Hoffman Estates v. Flipside Hoffman Estates, Inc., 455 U.S. 489, 499 (1982). We cannot say that the AECA or its implementing regulations are unconstitutionally vague as applied to the defendants. In fact, as applied to the defendants in this case, the statute is rather specific as to what conduct is prohibited: the export and/or the attempted export, without a license, of items on the Munitions List. As such, a person of ordinary intelligence, especially businesspeople as knowledgeable as Bing and Patte Sun, would understand what conduct is illegal. Sim- ilarly, law enforcement is not vested with the unrestrained power to arrest anyone exporting or attempting to export, without a license, items listed on the Munitions List. Rather, under the circumstances of this case, the police may only make an arrest under the AECA and its implementing regulations if an individual exports or attempts to export Munitions List items, without a license, with the requisite criminal intent. Not surprisingly, other courts have upheld the consti- tutionality of the AECA and its implementing regulations against vagueness challenges. See, e.g., Lee, 183 F.3d at 1032-33 (holding that the AECA and its implementing regulations were aimed at a nar- row group of persons which included the defendants and that in "the sensitive business of exporting military items, the statute and its implementing regulation more than suffice to put exporters on notice to consult the applicable regulations and, if necessary, contact the appropriate government agency to resolve any perceived ambiguity"); United States v. Gregg, 829 F.3d 1430, 1437 (8th Cir. 1987) (stating that the AECA "is as simple a matter as forbidding a passenger to ride on a train without a valid ticket" and rejecting the argument that the statute, which requires a knowing and willful export of Munitions List items, was unconstitutionally vague in violation of due process); United States v. Swarovski, 592 F.2d 131, 133 (2d Cir. 1979) (pre- decessor statute prohibiting export of Munitions List items was not unconstitutionally vague, as regulation was aimed at exporters and put them on notice of licensing requirements). III At trial, the main thrust of the Suns and All Ports’ defense was that the material the defendants exported and/or attempted to export fell UNITED STATES v. SUN 9 within the so-called "scrap exemption" contained in a Commerce Department regulation, 15 C.F.R. § 770.2(g)(3). This regulation pro- vides in relevant part as follows: (g) Interpretation 7: Scrap arms, ammunition, and imple- ments of war. Arms, ammunition, and implements of war, as defined in the U.S. Munitions List, and are under the jurisdiction of the U.S. Department of State, . . . except for the following, which are under the juris- diction of the Department of Commerce . . . . (3) Other commodities that may have been on the U.S. Munitions List are "scrap," and therefore under the jurisdiction of the Depart- ment of Commerce, if they have been ren- dered useless beyond the possibility of restoration to their original identity only by means of mangling, crushing, or cutting. When in doubt as to whether a commodity covered by the Munitions List has been ren- dered useless, exporters should consult the Office of Defense Trade Controls, . . . or the Exporter Counseling Division, . . . before reporting a shipment as metal scrap. Id. Under the language of this Department of Commerce regulation, if an item which may have been on the Munitions List has been ren- dered useless beyond the possibility of restoration to its original iden- tity by means of mangling, crushing, or cutting, the item is not subject to the export licensing requirements of the AECA and its implement- ing regulations. Even though § 770.2(g)(3) is found nowhere in the AECA or its implementing regulations, the district court allowed the defendants to pursue their defense theory and instructed the jury as follows: Now, ladies and gentlemen, there has been some reference to the Department of Commerce in this case and demilitari- zation in this case. Title 15, Part 770.2, Section (g)(3) of the Federal Code of Regulations states, in part, that "commodi- 10 UNITED STATES v. SUN ties that may have been on the United States munitions list are scrap and, therefore, under the jurisdiction of the Depart- ment of Commerce, if they have been rendered useless beyond the possibility of restoration to their original identity only by means of mangling, crushing or cutting." This section means that if any item that may have been on the munitions list has been rendered useless beyond the pos- sibility of restoration to its original identity by means of mangling, cutting, or crushing, it may be exported without a license or written authorization from the Department of State. If, on the other hand, that item that may have been on the munitions list has not been rendered useless beyond the possibility of restoration to its original identity by means of mangling, crushing, or cutting, it may not be exported with- out a license or a written authorization from the State Department. The defendants contend that items which they purchased that may have been on the munitions list were rendered use- less beyond the possibility of restoration to their original identity by means of mangling, crushing or cutting and, therefore, could be exported without a license or a written authorization from the State Department . . . . If you find and accept as true the evidence in support of this contention and theory and believe the defendants’ defense theory, and this defense leaves you with a reasonable doubt as to whether the government has proved beyond a reason- able doubt each and every element of the crimes charged . . . then you must find the defendants not guilty. (J.A. 1490-91). The defendants raise two arguments concerning § 770.2(g)(3), which regulation we will assume for the sake of argument applies in an AECA prosecution.8 We shall address these arguments in turn. 8 At oral argument, counsel for the government virtually conceded that § 770.2(g)(3) did not apply in a prosecution charging the exportation UNITED STATES v. SUN 11 First, the defendants contend that § 770.2(g)(3) is unconstitution- ally vague as applied to them. This argument has no merit. Like the AECA and its implementing regulations, § 770.2(g)(3) is rather specific as to when it applies. The plain language of the regula- tion states that items must "have been rendered useless beyond the possibility of restoration to their original identity only by means of mangling, crushing, or cutting." 15 C.F.R. § 770.2(g)(3). As such, a person of ordinary intelligence would understand what conduct is necessary to fall within the regulation: the item must be rendered use- less beyond the possibility of restoration by mangling, crushing, or cutting the item.9 Also, the regulation itself provides a means for exporters to verify their own compliance prior to shipping question- able items by consulting the State Department’s Office of Defense Trade Controls or the Commerce Department’s Office of Exporter Services. Lee, 183 F.3d at 1032 (noting that the AECA and its imple- menting regulations enable exporters to contact appropriate govern- ment agencies to resolve perceived ambiguities). Furthermore, as noted earlier, law enforcement is not vested with the unrestrained power to arrest anyone exporting or attempting to export without a license Munitions List items. Rather, under the circumstances of this case, the police may only make an arrest under the AECA and its implementing regulations if an individual exports or attempts to export Munitions List items with the requisite criminal intent and without a license. Second, the defendants contend that the jury should have been instructed that the "scrap exception" was an element of their AECA and/or the attempted exportation, without a license, of defense articles on the Munitions List. However, counsel for the government did acknowl- edge that the case was tried on the basis that § 770.2(g)(3) did apply in this case. Accordingly, we will assume without deciding that § 770.2(g)(3) applies in a prosecution charging the exportation and/or the attempted exportation, without a license, of defense articles on the Muni- tions List. 9 The government presented evidence at trial demonstrating that the Munitions List items the defendants attempted to export were not ren- dered useless beyond the possibility of restoration by means of mangling, crushing, or cutting. 12 UNITED STATES v. SUN offenses, rather than an affirmative defense. According to the defen- dants, the burden was on the government to prove the inapplicability of § 770.2(g)(3). We disagree. The district court’s instruction is similar to the one upheld in United States v. Durrani, 835 F.2d 410 (2d Cir. 1987). In that case, the defendant was found guilty of exporting and attempting to export Munitions List items without a license in violation of the AECA. Id. at 413. In his defense, he relied on the official use and foreign assis- tance exceptions set forth in the AECA. Id. 419-22 (discussing 22 U.S.C. § 2778(b)(2)). The defendant claimed that these exceptions constituted elements of his AECA offenses and were not affirmative defenses. Id. at 417. After dismissing the foreign assistance exception for lack of any supporting evidence at trial, the Durrani court held that the official use exception was an affirmative defense. Id. at 420- 21. In reaching this conclusion, the court "considered the text of the statute, its legislative history, the parties’ relative abilities to present evidence on the issue and the structure of the statute generally." Id. at 420. Furthermore, the court rejected the defendant’s argument that the jury instruction on the defense theory impermissibly shifted the burden of proof to the defendant. Id. at 423-24. The Durrani court noted that the district court had adequately instructed the jury on the burden of proof by charging that the government had the burden to prove the defendant’s guilt by proof beyond a reasonable doubt and that the burden of proof remained on the government and never shifted to the defendant. Id. Like Durrani, the "scrap exemption" theory advanced by the Suns and All Ports is an affirmative defense, not an element of a charge under the AECA. To be sure, if the official use exception, which is part of the AECA, is an affirmative defense to a charge under the AECA, then the "scrap exemption" must likewise be an affirmative defense. Furthermore, in this case, the district court correctly instructed the jury on the defendants’ affirmative defense and cau- tioned the jury that the government had the burden to prove the defen- dants’ guilt by proof beyond a reasonable doubt and that the government’s burden of proof never shifted to the defendants. IV Patte Sun challenges the sufficiency of the evidence supporting her convictions for attempting to export defense articles on the Munitions UNITED STATES v. SUN 13 List without a license, 22 U.S.C. § 2778. Convictions on these counts required the government to prove that Patte Sun attempted to export defense articles on the Munitions List without having first obtained a license. United States v. Reyes, 270 F.3d 1158, 1169 (7th Cir. 2001). A jury’s verdict must be upheld on appeal if there is substantial evidence in the record to support it. Glasser v. United States, 315 U.S. 60, 80 (1942). In determining whether the evidence in the record is substantial, we view the evidence in the light most favorable to the government and inquire whether there is evidence that a reasonable finder of fact could accept as adequate and sufficient to support a con- clusion of a defendant’s guilt beyond a reasonable doubt. United States v. Burgos, 94 F.3d 849, 862 (4th Cir. 1996) (en banc). In evalu- ating the sufficiency of the evidence, we do not review the credibility of the witnesses and assume the jury resolved all contradictions in the testimony in favor of the government. United States v. Romer, 148 F.3d 359, 364 (4th Cir. 1998). The evidence in the record is more than sufficient to support Patte Sun’s convictions for attempting to export defense articles on the Munitions List without a license. The evidence shows that Patte Sun was one of the primary operators of All Ports, which became a DRMS customer having the largest number of active contracts. She was familiar with DRMS sales procedures, and the evidence also shows that she was aware of export licensing requirements and falsely told the owner of one of the overseas freight forwarders used by the defen- dants that All Ports does not "send any military scrap to foreign coun- tries." (J.A. 495). Patte Sun also signed two of the End Use Certificates which put exporters on notice of export licensing restric- tions and listed the People’s Republic of China as a prohibited coun- try. All Ports also received a Sale by Reference pamphlet which spelled out the applicable federal laws governing the export of Muni- tions List items. Patte Sun also administered the contracts that All Ports had with the DRMS, each one of which, according to the written Invitations for Bid, contained Munitions List items. All contract docu- ments were delivered to All Ports’ office in Fontana, where she worked. In fact, she wrote the checks in payment for the DRMS con- tracts. Also, Patte Sun made most, if not all, of the shipping arrange- ments from the Norfolk International Terminal to the People’s Republic of China. Finally, material in some of the containers which 14 UNITED STATES v. SUN the defendants attempted to ship on May 7 and 13, 1999 contained items on the Munitions List and there is no evidence to suggest that the defendants had the necessary license to make such shipments. From the evidence described above, the jury was entitled to find beyond a reasonable doubt that Patte Sun knowingly and willfully attempted to export defense articles on the Munitions List without a license, 22 U.S.C. § 2778. Accordingly, Patte Sun’s challenge to the sufficiency of the evidence must be rejected.10 V Bing Sun argues that the district court erred when it enhanced his offense level by two levels for obstruction of justice. U.S. Sentencing Guidelines Manual (USSG) § 3C1.1. We disagree. We review an application of the Sentencing Guidelines by the dis- trict court for clear error in factual matters; legal conclusions are reviewed de novo. United States v. Wilson, 198 F.3d 467, 471 (4th Cir. 1999), cert. denied, 529 U.S. 1076 (2000). Section 3C1.1 of the Sentencing Guidelines directs a sentencing court to increase a defendant’s offense level by two levels if the defendant "willfully obstructed or impeded . . . the administration of justice during the course of the investigation, prosecution, or sentenc- ing of the instant offense of conviction." USSG § 3C1.1. If the defen- dant commits or suborns perjury, the obstruction of justice enhancement must be applied. Id. § 3C1.1, comment. (n.4(b)). For a sentencing court to apply the obstruction of justice enhancement based on perjury, the sentencing court, by a preponderance of the evi- dence, must find three elements: (1) the defendant gave false testi- mony, (2) concerning a material matter, (3) with the willful intent to deceive (rather than as a result of confusion, mistake, or faulty mem- ory). United States v. Smith, 62 F.3d 641, 646 (4th Cir. 1995). We 10 Patte Sun argues that the district court gave an erroneous aiding and abetting instruction to the jury. In addition, the defendants argue that the district court did not properly instruct the jury on the AECA’s scienter requirement. We have reviewed these arguments concerning the district court’s jury instructions and find them to be without merit. UNITED STATES v. SUN 15 noted in Smith that the obstruction of justice enhancement does not "automatically apply every time a defendant who testifies at trial is convicted." Id. at 647. "It may be that the defendant’s specific state- ments on the stand were true, or were not intentionally false, or were not material." Id. At trial, Bing Sun testified that he believed a license was not required because the military property being exported was merely military scrap. He further claimed that he relied on the advice of an attorney as well as an unidentified State Department official who pur- portedly told his daughter that an export license was not required for his shipments. Bing Sun also denied that the reason he had failed to list the People’s Republic of China in any of the numerous End Use Certificates he completed was because he knew that, if he did so, All Ports would not have been awarded the contracts it sought from the DRMS. The district court found that Bing Sun made numerous materially false statements with the willful intent to deceive the district court. The district court found that Bing Sun lied when, among other instances, he: (1) testified that he relied on the advice of counsel; (2) testified that he relied on the advice a State Department official had allegedly given his daughter; and (3) denied that the reason he had failed to list the People’s Republic of China in any of the numerous End Use Certificates he completed was because he knew that, if he did so, All Ports would not have been awarded the contracts it sought from the DRMS. In the district court’s view, "an attempt was made, looking at the entire record, to deceive the court about what he knew, when he knew it, and what his intent was with respect to these ship- ments." (J.A. 1563). We cannot conclude that the district court erred when it found that Bing Sun committed perjury at trial. First, we cannot take issue with the district court’s finding that Bing Sun testified falsely when he: (1) testified that he relied on the advice of counsel; (2) testified that he relied on the advice a State Department official had allegedly given his daughter; and (3) denied that the reason he had failed to list the People’s Republic of China in any of the numerous End Use Certifi- cates he completed was because he knew that, if he did so, All Ports would not have been awarded the contracts it sought from the DRMS. 16 UNITED STATES v. SUN Second, the materiality of Bing Sun’s testimony is obvious. His testi- mony concerned the heart of the case, i.e., whether he acted with the requisite criminal intent. Finally, we cannot take issue with the district court’s finding that Bing Sun’s testimony was given with the willful intent to deceive, as the district court was in the best position to judge Bing Sun’s credibility. Accordingly, we reject Bing Sun’s challenge to the district court’s decision to increase his offense level by two levels for obstruction of justice. VI For the reasons stated herein, the judgments of the district court are affirmed. AFFIRMED
respect to s. -12*s**2 - 2162522*s - 3 Find the first derivative of -13814627*n**4 + 17013150 wrt n. -55258508*n**3 What is the second derivative of -2*p**4 - 7732448*p**2 - 48394*p - 579 wrt p? -24*p**2 - 15464896 Find the third derivative of 195*v**3*w**2 - v**3*w + 30037*v**3 + 2*v**2 - 523*v - 158*w**2 + 3 wrt v. 1170*w**2 - 6*w + 180222 Find the third derivative of 18733073*d**3 - d**2 + 200673846. 112398438 What is the derivative of 474707353*a**4 + 511656253 wrt a? 1898829412*a**3 What is the second derivative of -16666*w**4 + 5153*w**3 - 201813996*w wrt w? -199992*w**2 + 30918*w What is the second derivative of -11689557*h**4 + 23*h**3 + 7*h - 15924347 wrt h? -140274684*h**2 + 138*h Find the third derivative of -3*u**2*z**3 + 256*u**2*z - 12*u**2 + 1782*u*z**3 + 137*u*z**2 - 2*u + 316*z**3 wrt z. -18*u**2 + 10692*u + 1896 What is the second derivative of -7940674*m**2 - 3670*m + 200? -15881348 What is the first derivative of -595255*s**4 - s - 6778754? -2381020*s**3 - 1 What is the first derivative of 2*k*r**3 - 2546664*k*r + 35*k - 213089*r**3 - 33*r**2 + 2*r wrt k? 2*r**3 - 2546664*r + 35 Find the third derivative of -14360627*m**4 - 2*m**3 + 60561178*m**2. -344655048*m - 12 Differentiate -56081320*j**4 - 55571437 wrt j. -224325280*j**3 What is the second derivative of 1124548888*l**3 + 1016929329*l wrt l? 6747293328*l What is the third derivative of -424071*u**3 + 555726*u**2 - u - 35? -2544426 What is the third derivative of -8662968*r**3 + 2*r**2 + 49620*r + 8? -51977808 What is the third derivative of 1035765*w**4 + 1230*w**2 - 3*w - 431 wrt w? 24858360*w Find the third derivative of -8000*n*s**4 + 12*n*s**3 - 6877*n*s**2 - n*s + 18*n - 177*s**4 + 15*s**2 wrt s. -192000*n*s + 72*n - 4248*s What is the first derivative of -100119674*g*i - 87287962*g wrt i? -100119674*g Find the second derivative of -11301*i**5 - 22*i**3*x - 2*i*x - i - x + 697031 wrt i. -226020*i**3 - 132*i*x Find the third derivative of -8345868*f**3*g**3 + 19648*f**3*g + 3*f**2*g - 8*g**2 wrt g. -50075208*f**3 What is the second derivative of -118184906*h**3 - 39456534*h - 2 wrt h? -709109436*h What is the third derivative of -55259612*c**4 - 215*c**2 + 19*c - 497? -1326230688*c What is the first derivative of 177326*b*n**2 + 21*b*n - 96432852*b + 2*n wrt n? 354652*b*n + 21*b + 2 What is the third derivative of -239412858*l**4 - 4*l**2 + 20216 wrt l? -5745908592*l Find the third derivative of -752414*f*i**3 - 314*f - 1223*i**2 wrt i. -4514484*f What is the third derivative of 554436201*k**3 - 338186533*k**2 wrt k? 3326617206 Find the first derivative of -371593*u**2*z**2 + 171*u**2*z + 1040*u**2 - 44339*u wrt z. -743186*u**2*z + 171*u**2 What is the first derivative of -17592145*g - 83455235 wrt g? -17592145 What is the third derivative of 39080*p**6 - 598*p**3*y + p**2*y - 2*p**2 - 28*p*y - 172943 wrt p? 4689600*p**3 - 3588*y Find the second derivative of 58*h**3*l + 5*h**3*m*z**2 - 182*h**3 - 3*h*l*m*z**2 + 4*h*l*z**2 - 4*h*m - 16*h - 518*l*m*z**2 wrt h. 348*h*l + 30*h*m*z**2 - 1092*h Differentiate -35400*k**3 + 10*k**2 + 20*k - 849619288 wrt k. -106200*k**2 + 20*k + 20 Find the third derivative of -125689220*c**5*t**3 + c**3*t**3 - 288*c**2*t**3 + 2*c**2*t - 3*c + 853 wrt c. -7541353200*c**2*t**3 + 6*t**3 What is the second derivative of -7*k**2*t + 180996*k**2 + 35149*k*t + 120*t wrt k? -14*t + 361992 Differentiate -574038*d**2 - 2246839 wrt d. -1148076*d Find the second derivative of 650203272*y**2 + 50015834*y. 1300406544 Differentiate 5187085*t**3 - 4134762 with respect to t. 15561255*t**2 What is the first derivative of -163283186*v**3 - 89342275 wrt v? -489849558*v**2 What is the third derivative of 172624504*i**3*z**2 + 7*i**2*z**2 + 125134*i**2 + 3*z**2 - 2*z - 6 wrt i? 1035747024*z**2 Find the first derivative of 39439*d**3 - 40*d + 31367636. 118317*d**2 - 40 Find the third derivative of 17575902*t**3 - t**2 - 105715144*t wrt t. 105455412 What is the third derivative of 52121442*l**4 + 21656*l**2 + 37*l + 5 wrt l? 1250914608*l What is the second derivative of -4343*u**3 - 1317*u**2 + 47500946*u wrt u? -26058*u - 2634 What is the third derivative of -15*f**5 - 208539*f**3 - 30624*f**2 + 8*f - 1 wrt f? -900*f**2 - 1251234 What is the second derivative of 24073006*l**3 - l + 9742351 wrt l? 144438036*l What is the third derivative of 18046093*f**3*p - 89*f**2*p - 278*f*p + 23 wrt f? 108276558*p What is the derivative of 276585213*b**2 - 119101079? 553170426*b Find the third derivative of -1188081798*u**4 - 1493933470*u**2. -28513963152*u What is the third derivative of -22111*u**4 + 166*u**3 - 2*u**2 - 5270703*u wrt u? -530664*u + 996 Find the second derivative of -265512*b**3*m**2 + 10*b**2*m**2 - b*m + 47*b + 109*m**2 - 4*m - 97 wrt b. -1593072*b*m**2 + 20*m**2 Differentiate 18495177*i**4 + i - 104505356. 73980708*i**3 + 1 What is the third derivative of -301*b**5 - 8*b**4 + 730*b**3 - 286482*b**2 + 2? -18060*b**2 - 192*b + 4380 Find the third derivative of j**5 + 4032*j**4 - 296*j**3 - 482*j**2 + 113*j - 10. 60*j**2 + 96768*j - 1776 Find the third derivative of 263152590*o**3 + 2592*o**2 - 23122. 1578915540 Differentiate -3*l*m**2 + 1790*l*m - 682568*l + 29414*m**2 + 84 wrt m. -6*l*m + 1790*l + 58828*m What is the first derivative of 74741*k**2 - 2307*k - 110589999? 149482*k - 2307 Find the second derivative of -122*n*u**2*w**2 + 5*n*u**2*w + n*u - 36*n*w**2 - n*w - 6*n + 1849*u**3 + 97*u*w + 4*w**2 wrt u. -244*n*w**2 + 10*n*w + 11094*u What is the derivative of 211590353*a**2 + 190338622? 423180706*a Differentiate 27501*a**2*k*n - 1317*a**2*n + 107*k*n + 22005*n wrt k. 27501*a**2*n + 107*n Differentiate 158549605*h**2 - 65107475. 317099210*h What is the second derivative of 235133872*h**5 + 21209*h - 399 wrt h? 4702677440*h**3 What is the derivative of -81*n**3*s + 2225193*n**3 + 64*n*s + 29*s wrt s? -81*n**3 + 64*n + 29 What is the second derivative of 3*j**2*k**2 - 10*j**2 + 66281*j*k**2 + 300*j*k + 8*j - 13*k wrt k? 6*j**2 + 132562*j What is the derivative of 37318485*g**3 + 242068529? 111955455*g**2 What is the third derivative of -109103975*i**4 + 3576*i**2 - 2825*i - 1? -2618495400*i Find the third derivative of 1872485*u*z**3 - 452*u*z**2 + u*z + 16*u + 5*z**2 + 7 wrt z. 11234910*u What is the derivative of 501142*o**2*y + 1558821*o**2 + 11*o*y**2 + 4 wrt y? 501142*o**2 + 22*o*y Find the second derivative of -445*g**3*h*z**2 - g**3*h*z - g**3*h - 40728*g**3*z**2 + 37515*g*h*z wrt z. -890*g**3*h - 81456*g**3 Find the second derivative of 68219798*g**3*i**2 - 3*g*i**2 + 3*g*i - 4150*i**2 + 23 wrt g. 409318788*g*i**2 Find the third derivative of -25057*k**3*v + 1732*k**3 - 4*k**2*v - k**2 + 5630*k*v - 31*k - 1 wrt k. -150342*v + 10392 Find the first derivative of 567688676*o + 624807674. 567688676 Find the second derivative of p**4 + 19975589*p**2 + 2*p + 4356914. 12*p**2 + 39951178 What is the derivative of -5*b**2*p + 519998845*b**2 + 126*b*p + 29065*p wrt p? -5*b**2 + 126*b + 29065 Differentiate -14*g**2*j**2 + g**2*j + 425*g**2 - 11*j**2 + 547*j + 8374 wrt j. -28*g**2*j + g**2 - 22*j + 547 What is the second derivative of 1390*d*f**2*s + 6*d*f*s**3 - 523*d*s**3 - d*s**2 + 13*d + 7535*f**2*s**3 + 2*s wrt f? 2780*d*s + 15070*s**3 What is the second derivative of 5*o**5 + 286536*o**2 - 202312330*o? 100*o**3 + 573072 Find the first derivative of 225098*b**2*n - 2*b**2 + 7*b*n + 2935326*n wrt b. 450196*b*n - 4*b + 7*n Find the third derivative of 63*f**3*i*w + 900*f**3*i - f**3*o**2*w - 4*f**2*i*o - 2*f**2*o**2*w + 787*f*i*o**2*w - 16*i*o**2*w - 2*i*o - 2*o**2 wrt f. 378*i*w + 5400*i - 6*o**2*w Find the second derivative of -62215931*u**2 + 211269339*u wrt u. -124431862 Differentiate -4474347*o**4 + 2*o**3 + 24724455 with respect to o. -17897388*o**3 + 6*o**2 What is the third derivative of -2*k**3*u*y - 5*k**3*u + 24776*k**3*y**2 - 22*k**2*u*y + k**2*u - 2*k*y**2 - 1993*y**2 wrt k? -12*u*y - 30*u + 148656*y**2 Differentiate 18059444*k - 34198075 wrt k. 18059444 What is the second derivative of 495*p**5 + 16710*p**3 - 2*p**2 - 185898817*p? 9900*p**3 + 100260*p - 4 Differentiate -438301534*z**2 - 182237716. -876603068*z What is the second derivative of -137161154*z**5 - 24993041*z wrt z? -2743223080*z**3 Differentiate 4915455*w**2 - 17390304 w
It is not just with performance levels that the young players have been impressing. Their general attitude and application in training, as well as how they act and interact off the field, has also been admired by Lampard. Bath takes as much pride in this as their footballing achievements because it reflects the culture he has spent the past 15 years crafting at Cobham. ‘We have to set our ambitions high because we want to be the best football academy in the world and the number one choice for players and parents,’ he continues. ‘That’s about maximising player potential but also developing them as good young people as well. ‘When first team coaching staff speak so highly about them as people, how they are humble and respectful, how they work so hard every day and set the standards in training, that’s also incredibly nice to hear and reinforces the culture we have built. ‘Respect, togetherness and hard work is what we expect from everyone. Being grounded and empathetic is a big part of our culture and sometimes it’s hard to get the right balance when you’re also promoting an elite, winning mentality where players need to be mentally tough to reach the top. ‘The culture has to be built organically over a long time, you can’t just click your fingers and create it. You have to stick to your values, live them every day and sometimes make tough decisions if you have the wrong people showing the wrong characteristics because that undermines everything and everyone. When you get the right culture in place, it becomes much easier because the players and staff police the building and the environment becomes self-serving.’ Mason Mount’s self-belief justifies the culture Academy players typically sign rolling two-year registration contracts and are well within their rights to move clubs for minimal training compensation if they wish. It is a nuance of youth development that means retaining players becomes just as important as attracting them. In an interview earlier this year, Mount’s father Tony revealed how he tried to convince his then-15-year-old son to consider other opportunities when he was offered a scholarship by the Blues in 2014. ‘I’m not leaving Chelsea, it’s my club,’ was Mason’s response. ‘I’ve been here since the age of six and I’m going all the way.’
Beta-Lysine β-Lysine (3,6-diaminohexanoic acid) is an amino acid produced by platelets during coagulation and is directly antibacterial by causing lysis of many Gram positive bacteria by acting as a cationic detergent. References Category:Amino acids Category:Diamines
16 million women and girls are victims of trafficking, according to a 2013 report (Representational) Andhra Pradesh will become the first state in the country to target people who purchase sex in brothels as part of a crackdown on the sexual slavery of women and children, authorities said.There are strict laws against human trafficking, sexual abuse and operating brothels. Pimps, brothel managers and traffickers are often prosecuted. Yet, those who buy sex from people forced to work in brothels, including children, rarely face charges.That needs to change, authorities say."People who purchase sex go scot free," said H Arun Kumar, the state government's commissioner for women's development and child welfare.Andhra Pradesh last week appointed a panel of legal experts and campaigners to study anti-trafficking laws that could be applied to buyers of sex, and to make recommendations within 60 days.Panel member Sunitha Krishnan pointed to a section of the Immoral Trafficking Prevention Act, which says charges may be applied to a "person who carries on prostitution and the person with whom such prostitution is carried on".Campaigners say that anti-trafficking efforts will not work as long as police fail to target people who visit brothels where sexual slavery occurs."The buyers are the ones creating the demand," Ms Krishnan said. "Girls will continue to be sold until buyers are criminalised." © Thomson Reuters 2018 Of an estimated 20 million sex workers in India, 16 million women and girls are victims of trafficking, according to a 2013 report called by four non-profit groups, including Dunya and the Omidyar Network.Public calls to criminalise those paying to have sex with children have increased recently, and a politician from BJP set up a change.org petition last month to seek tougher action.
Q: SQL Server 2008 CONTROL SERVER permission The sp_password sproc in sql server 2000 only required membership in the db_accessadmin db_securityadmin database roles and membership in the securityadmin server role to allow a user to change passwords w/o knowing the old password. However in sql server 2005/2008 the BOL says a user now needs the "CONTROL SERVER" permission to do this. What powers exactly does the CONTROL SERVER permission give a user? Update: I found this: CONTROL SERVER is a new permission as of SQL Server 2005 and it grants the same access as being a member of the sysadmin fixed server role. - http://www.sqlservercentral.com/blogs/brian_kelley/archive/2009/02/24/detecting-when-a-login-has-implicit-access-to-a-database.aspx Update: Turns out the documentation is wrong. Just like SQL Server 2000, SQL Server 2008 sp_password still only seems to require membership in the db_accessadmin & db_securityadmin database roles and membership in the securityadmin server role to allow a user to change passwords w/o knowing the old password. A: See the listing of the specific securables affected by CONTROL SERVER on this MSDN page.
The Chief Minister was referring to the arrest of six Rohingya from the Tulihal International Airport in Imphal on Saturday. Expressing concern over the presence of Rohingya in Manipur, Chief Minister N. Biren Singh has said efforts should be made to identify the people who are facilitating their entry and providing them shelter in the state. The Chief Minister was referring to the arrest of six Rohingya from the Tulihal International Airport in Imphal on Saturday. The six passengers had arrived from New Delhi with forged documents. Addressing people on the occasion of Patriots’ Day on Tuesday, he said, “It indicates that many of them are taking shelter in the state and we have to find out the persons who are behind the illegal entry of Rohingya from different places.” Urging the locals to trace Rohingya and the agents who are bringing them to Manipur, the Chief Minister said, the “already sinking” Manipuri population will disappear in the coming years, if they do not take the inititative. Police investigation revealed that the six Rohingya were trained in a Madrasa in Delhi and had come to the state with the help of some agents based in the national capital and Manipur, DIG T. Ngasangva had told reporters on Sunday. The Rohingya had admitted that they were residents of Yangon and Mandalay in Myanmar, the DIG said.
Hello Gundam Guys and Gundam Gals~ Its been raining cats and dogs lately. and winter brought some frost during the day. But, I managed to catch a few sunny moment to do some paint job on this baby.So here it is,As you can see, I've Gun-metal -ed the structural inner frames.I can't help it... Its a beauty to look at those Gold reveal parts of the inner frame. some how,works well withand! perhaps I need to make another Astray... inNow, the chest! finally.. another sunny day for this inner frame.The waist support part is hollow! I've had a problem on the previous, where it broke when I was playing around posing it. had to order this little part to replace it. andit.So, I don't want it to happen again,will have the same treatment.While I was waiting for some parts to dry, I went on to "test" fit it. well, I can't wait to see whatwill look like.ok back to construction, the parts that were waiting to be dried.......But, you won't see them that often.. sadly.But the waist part pistons will always be visible!Just look at theI think, the beam saber holder should be somewhat Gun-metal. Just to make some difference between body and attachment.Back pack up!All theare shinning and revealing themselves. I personally think this is whatshould look like. (not all maroon colour)Love this picture the most!One thing I dislike aboutis that.. the Beam saber holders seem to be under-developed. They are.... empty. Feels like a rain water collection tank..Another look of the revealing parts.So, next up! the head! one of the coolest Gundam Head! over-sized chin, V-fin, Etc. everything oversize.This is it, my latest update on, Catch ya'll later.
#using <System.Windows.Forms.dll> #using <System.dll> #using <System.Drawing.dll> using namespace System; using namespace System::Drawing; using namespace System::Collections; using namespace System::ComponentModel; using namespace System::Windows::Forms; public ref class Form1: public System::Windows::Forms::Form { private: System::Windows::Forms::Button^ button1; System::Windows::Forms::Button^ button2; System::Windows::Forms::Button^ button3; System::ComponentModel::Container^ components; public: Form1() { components = nullptr; InitializeComponent(); } protected: ~Form1() { if ( components != nullptr ) { delete components; } } private: void InitializeComponent() { this->button1 = gcnew System::Windows::Forms::Button; this->button2 = gcnew System::Windows::Forms::Button; this->button3 = gcnew System::Windows::Forms::Button; this->SuspendLayout(); // // button1 // this->button1->Location = System::Drawing::Point( 40, 48 ); this->button1->Name = "button1"; this->button1->TabIndex = 0; this->button1->Text = "button1"; this->button1->Click += gcnew System::EventHandler( this, &Form1::button1_Click ); // // button2 // this->button2->Location = System::Drawing::Point( 40, 112 ); this->button2->Name = "button2"; this->button2->TabIndex = 1; this->button2->Text = "button2"; this->button2->Click += gcnew System::EventHandler( this, &Form1::button2_Click ); // // button3 // this->button3->Location = System::Drawing::Point( 40, 184 ); this->button3->Name = "button3"; this->button3->TabIndex = 2; this->button3->Text = "button3"; this->button3->Click += gcnew System::EventHandler( this, &Form1::button3_Click ); // // Form1 // this->AutoScroll = true; this->ClientSize = System::Drawing::Size( 368, 325 ); array<System::Windows::Forms::Control^>^temp0 = {this->button3,this->button2,this->button1}; this->Controls->AddRange( temp0 ); this->Name = "Form1"; this->Text = "Form1"; this->ResumeLayout( false ); } void button3_Click( Object^ /*sender*/, System::EventArgs^ /*e*/ ) { this->SizeControls(); } // Control.Size/Control.ClientSize/Control.SetClientSizeCore // <snippet3> private: void SizeControls() { // Resize the buttons two different ways. button1->Size = System::Drawing::Size( 75, 25 ); button2->ClientSize = System::Drawing::Size( 100, 50 ); // Resize the form. this->SetClientSizeCore( 300, 300 ); } // </snippet3> void button1_Click( Object^ /*sender*/, System::EventArgs^ /*e*/ ) { this->ResizeForm(); } /* Control.ClientRectangle/Control.Bounds/Rectangle.Inflate/ * Control.ScrollControlIntoView/Control.AutoScroll */ // <snippet2> private: void ResizeForm() { // Enable auto-scrolling for the form. this->AutoScroll = true; // Resize the form. Rectangle r = this->ClientRectangle; // Subtract 100 pixels from each side of the Rectangle. r.Inflate( -100, -100 ); this->Bounds = this->RectangleToScreen( r ); // Make sure button2 is visible. this->ScrollControlIntoView( button2 ); } // </snippet2> void button2_Click( Object^ sender, System::EventArgs^ /*e*/ ) { this->AutoSizeControl( dynamic_cast<Control^>(sender), 5 ); } /* Control.CreateGraphics/Control.Text/Control.Font/ * Control.Height/Control.Width/Control.ClientSize */ // <snippet1> private: void AutoSizeControl( Control^ control, int textPadding ) { // Create a Graphics object for the Control. Graphics^ g = control->CreateGraphics(); // Get the Size needed to accommodate the formatted Text. System::Drawing::Size preferredSize = g->MeasureString( control->Text, control->Font ).ToSize(); // Pad the text and resize the control. control->ClientSize = System::Drawing::Size( preferredSize.Width + (textPadding * 2), preferredSize.Height + (textPadding * 2) ); // Clean up the Graphics object. delete g; } // </snippet1> }; [STAThread] int main() { Application::Run( gcnew Form1 ); }
@import "../common/actionsheet.less"; @import "base.less"; // ActionSheet .km-flat .km-actionsheet > li > a { font-size: 1.4em; font-weight: normal; text-align: center; } .km-flat li.km-actionsheet-cancel > a { color: @flat-second-color; } .km-flat .km-actionsheet > li > a { display: block; } .km-flat .km-actionsheet > li:last-child > a { border: 0; } .km-flat .km-shim li.km-actionsheet-title, .km-flat .km-popup li.km-actionsheet-title { display: none; } .km-flat .km-actionsheet-wrapper.km-popup { padding: 2px 0; }
The major focus of the Geriatric Psychiatry Branch (GPB) is the study of individuals with memory disorders as a result of age or neurodegeneration. In particular, memory is the most important earliest clinical symptom of Alzheimer?s disease (AD). There is evidence that the cholinergic system has an important role in normal memory, at least in part through its influence on hippocampal function, in age-related memory loss, and in AD. Medications designed to enhance the cholinergic system through increasing concentrations of the neurotransmitter acetylcholine in the synapse are the only approved drugs for the treatment of AD. The Neuroimaging Section of GPB has been using positron emission tomography (PET) to study the cholinergic system. Because, the precise effects of normal aging on the cholinergic system are unknown as both in vitro and PET studies have shown conflicting results, our first specific objectives were to determine whether we could accurately and reliably measure attributes of the cholinergic system in regions of the brain of awake humans with PET, and whether we could establish if there were any changes in these attributes as individuals age. Previous in vitro and in vivo work with the F-18 labeled muscarinic agonist, 3-(3-(3-[18F]Flouropropyl)thio)-1,2,5-thiadiazol-4-yl)-1,2,5,6-tetrahydro-1-methylpyridine (18F P-TZTP) suggested the use of 18FP-TZTP to selectively quantify M2 receptors in humans. In this study, we used 18FP-TZTP, to infer M2 receptor avidity in the brains of 15 healthy younger subjects (mean age = 28.3 ? 5.5 y) and 20 healthy older subjects (mean age = 62.1? 7.7 y). Corrections for subject motion during the 120 min acquisition and partial voluming (PVC) were performed. A one-tissue compartment model was used to estimate the volumes of distribution (VT) of 18FP-TZTP. Within both groups of subjects, volumes of distribution (K1/k2) in cortical, subcortical, and cerebellar areas were consistent with M2 receptor topography. Compared to younger subjects older subjects had significantly higher means and standard deviations for the volumes of distribution of 18FP-TZTP throughout much of the cerebellum, cortex and subcortex (Global Gray VT = 742 ? 163 in older subjects and 645 ? 74 in younger subjects, p < 0.03). Across all subjects 18FP-TZTP, regional and Global Gray distribution volumes were significantly correlated to age (Global Gray VT, r = 0.41, p < .01). A lower concentration of acetylcholine in the synapse of some older subjects is one possible explanation of the data. The increased variance in the 18FP-TZTP distribution volumes of older subjects suggested the possibility that there might be a subset of the older subjects that had the higher distribution volumes. The apolipoprotein E-e4 allele (APOE-e4) confers an increased susceptibility to age-related memory problems and Alzheimer?s disease. To determine the effect of the APOE-e4 allele on the muscarinic component of the cholinergic system of aging subjects, the distribution volumes (VT) of [18F]FP-TZTP of 10 healthy subjects with APOE-e4 alleles (APOE-e4+) and 10 without (APOE-e4-), ranging in age from 52 to 75 years, were compared. Regional cerebral blood flow (rCBF) measurements with H215O were also determined in the same subjects and compared. Global Gray VT (840 ? 155 ml plasma/ml tissue) was greater in APOE-e4+ subjects than APOE-e4- subjects (660 ? 113 ml plasma/ml tissue, p = 0.01), and previously studied younger subjects. There were no significant differences between the groups with respect to rCBF, but within the APOE-e4+ group there was a trend for subjects with the higher Global Gray VTs to have lower Global Gray CBFs (r = -.65, p < .06. Thus, our working hypothesis is that the higher [18F]FP-TZTP distribution volumes result from a direct adverse interaction between the APOE-e4 allele and the aging process on the muscarinic system, and may relate directly to the release of acetylcholine into the synapse.
Q: Apex trigger not creating task New to Apex development so I wouldn't be surprised if I'm missing something obvious here. Anyways I'm trying to write a trigger that adds a task to an opportunity once it is created (and sets the due date to be six months in the future). Here's what I have: trigger FollowUp on Opportunity (after insert) { List<Task> taskList = new List<Task>(); for (Opportunity Opp: trigger.new) { Task t = new Task(); t.whatID = opp.ID; t.Subject = 'Follow up with Report'; Date dueDate = opp.CloseDate; t.ActivityDate = dueDate.addmonths(6); taskList.add(t); } } However, after I save this, I have tried creating a new opportunity, and no task is created. My two questions are: 1) What is wrong with this specific code, why is it not creating a new task on the donation? 2) In the future, what tools are available to me in SF to diagnose why Apex code is not working? Are errors saved anywhere? Thank you very much! A: What is wrong with this specific code, why is it not creating a new task on the donation? You didn't actually call the code that commits data to the database, as in: insert taskList; Which you should do outside of the for loop, before the end of your code. In the future, what tools are available to me in SF to diagnose why Apex code is not working? Are errors saved anywhere? There is no system error in this case, it was a logic error. These can be hard to track down until you learn more about writing code. I suggest going through the developer modules on Trailhead. Once you know what you're looking for, you'll find we have an array of features we can use: Unit tests for testing our logic, the Debug Logs for reading what happened, the Check Point system for examining memory at a specific point in your code, and the Apex Debugger (available for an extra cost) for an interactive debugging session.
Judge rejects Ebola quarantine for Maine nurse This undated image provided by University of Texas at Arlington shows Kaci Hickox. (AP Photo/University of Texas at Arlington) A Maine judge has rejected a request by state officials to quarantine and restrict the movements of nurse Kaci Hickox, who after returning from treating Ebola patients in West Africa defied the state's quarantine. Judge Charles LaVerdiere initially put out a temporary order imposing some restrictions on Hickox. But on Friday, he issued a new order saying she should only continue daily monitoring and coordinate travel with state officials. But, because she's not showing symptoms, the judge said she's not infectious -- and would not approve the limits on her movements sought by Maine health officials. "The State has not met its burden at this time to prove by clear and convincing evidence that limiting [Hickox's] movements to the degree requested" is necessary, the judge wrote. He did order the nurse to immediately notify health officials if any symptoms appear. The order hands a win to the nurse in her high-profile battle with state officials. She said in a press conference outside her house: "I am very satisfied with the decision. ... I will continue to be compliant. And yes, it's just a good, a good day." Maine Gov. Paul LePage issued a statement saying they would abide by the law. "My duty to protect the health of the individual, as well as the health and safety of 1.3 million Mainers, is my highest priority. Despite our best effort to work collaboratively with this individual. she has refused to cooperate with us," he said. "As Governor, I have done everything I can to protect the health and safety of Mainers. The judge has eased restrictions with this ruling and I believe it is unfortunate. However, the State will abide by law." The state went to court Thursday to impose restrictions until the 21-day incubation period for Ebola ends on Nov. 10. Hickox, who treated Ebola patients in Sierra Leone, contended confinement at her home in northern Maine violated her rights. She also contended it's not necessary because she poses no risk. She defied the state's voluntary quarantine by holding a news conference and going for a bike ride. In his initial order, the judge barred her from using "long distance commercial conveyances or local public conveyances," and from showing up at shopping centers or movie theaters. The new order replaces the old one. Hickox told NBC's "Today" on Wednesday that she doesn't "plan on sticking to the guidelines" and is "appalled" by the home quarantine policies "forced" on her. Hickox, who volunteered in Africa with Doctors Without Borders, was the first person forced into New Jersey's mandatory quarantine for people arriving at Newark Liberty International Airport from three West African countries. She spent last weekend in a quarantine tent in Newark, but insisted she never had Ebola symptoms and tested negative in a preliminary evaluation. Although New Jersey Gov. Chris Christie and New York Gov. Andrew Cuomo were sharply criticized for ordering mandatory quarantines, other states, including Maine and California, have also implemented quarantine requirements for aid workers. On Monday, Hickox traveled from New Jersey to Maine, where her boyfriend is a senior nursing student at the University of Maine at Fort Kent. Her boyfriend opted to leave Fort Kent to spend time with her.
Doctors give no prognosis for Michael Schumacher Journalists from a German TV channel broadcast outside the entrance of the Grenoble hospital where former seven-time Formula One champion Michael Schumacher is being treated after sustaining a head injury during a ski accident, in Grenoble, France, Monday, Dec. 30, 2013. Doctors treating Michael Schumacher refused Monday to predict an outcome for the seven-time Formula One champion, saying they were taking his critical head injury "hour by hour" following a skiing accident. Chief anesthesiologist Jean-Francois Payen told reporters that Schumacher was still in a medically induced coma and doctors were focusing only on his current condition. (AP Photo/Laurent Cipriani) GRENOBLE, France — Doctors offered a grim assessment of Michael Schumacher’s head injuries Monday, providing no prognosis for the Formula One driving great after his skiing accident in the French Alps. Schumacher has been placed in a medically induced coma to relieve pressure on his brain, which suffered bruising and bleeding when the retired seven-time world champion fell and struck a rock Sunday while skiing during a family vacation. “We cannot predict the future for Michael Schumacher,” Dr. Jean-Francois Payen, the doctor in charge of Grenoble University Hospital’s intensive care unit, said at a news conference. “He is in a critical state in terms of cerebral resuscitation,” said Payen, the chief anesthesiologist treating the 44-year-old German driver. “We are working hour by hour.” Advertisement Schumacher’s wife, Corinna, daughter Gina Maria and son Mick were at his bedside. “The family is not doing very well, obviously. They are shocked,” his manager, Sabine Kehm, told reporters. Schumacher earned universal admiration for his uncommon driving talent, which led to a record 91 race wins. His single-minded dedication to victory sometimes meant he was denied the same affection during his career that he received Monday. Schumacher “gave the image of someone indestructible, powerful,” France’s four-time F1 champion Alain Prost said on iTele TV channel. “It’s a banal accident compared to what he’s done in the past . It’s just a dumb thing that ended badly.” Schumacher and his 14-year-old son were skiing Sunday morning in the French Alpine resort of Meribel, where the family has a chalet. He fell and hit the right side of his head on a rock. By wearing a helmet, Schumacher had given himself a chance of survival, Payen said, though the protection was not enough to prevent serious injury. Gerard Saillant, a trauma surgeon who operated on Schumacher when he broke his leg in a 1999 race crash, was at the hospital as a visitor. He told reporters that Schumacher’s age and fitness should work in his favor. Schumacher, who turns 45 on Friday, retired from the track for the second time only last year, after a three-season comeback. Still, the hospital’s neurology team, which is recognized as among the best in France, was cautious about Schumacher’s prospects. Doctors lowered his body temperature to between 34 and 35 degrees Celsius (93.2 to 95 degrees Fahrenheit) as part of the coma, which essentially rests the brain, slowing its metabolism to help reduce inflammation after an injury. The hospital, in a city that is the gateway to the French Alps, sees a large number of skiing accidents every year. Schumacher has been seriously hurt before. In addition to the broken leg in a crash at the 1999 British Grand Prix, he also suffered neck and spine injuries after a motorcycle accident in 2009 in Spain. An expert skier, Schumacher fell in a section of trails that slice down through a vast and, in parts, very steep snowfield. Although challenging, the snowfield is not extreme skiing. The runs are broad and neatly tended, and the ungroomed area in between — where the resort said Schumacher was found — is free of trees. “He was in the deep snow. But it was not an off-piste track,” Kehm said, suggesting Schumacher had not taken undue risks. “They were skiing on pistes, but in the moment that it (the accident) happened, it was not on the piste.” Meribel resort officials said Schumacher was conscious when first responders arrived, although agitated and in shock. After the fall, Payen said Monday, Schumacher was not in a “normal state of consciousness.” He did not respond to questions, and his limbs appeared to move involuntarily, the doctor said. He was airlifted to a local hospital and then later brought to Grenoble. Doctors said that stopover was typical and did not affect his condition. The French prosecutor in Albertville has opened an investigation into the accident, according to the Mountain Gendarmerie in Bourg-Saint-Maurice. The goal is to determine the circumstances and cause of the accident. Formula One drivers and fans rushed to wish Schumacher a quick recovery. “Like millions of Germans, the chancellor and members of the government were extremely dismayed when they heard about Michael Schumacher’s serious skiing accident,” German Chancellor Angela Merkel’s spokesman, Steffen Seibert, said in Berlin. Sebastian Vettel, the Formula One racer for whom Schumacher was a boyhood idol, told German news agency dpa: “I am shocked and hope that he will get better as soon as possible.” Ferrari, which Schumacher raced for, also expressed its concern. Company President Luca di Montezemolo and race team leader Stefano Domenicali were in contact with the family, the company said in a statement. Former Ferrari teammate Felipe Massa, who himself recovered from life-threatening head injuries at the Hungarian Grand Prix in 2009, wrote on Instagram: “I am praying for you my brother!! I hope you have a quick recovery!! God bless you, Michael.” British former F1 champion Jenson Button posted that “Michael more than anyone has the strength to pull through this.” Some fans gathered outside the hospital Monday. Nuravil Raimbekov, a student from Kyrgyzstan who is studying in Grenoble, said Schumacher has been an inspiration to him. “I’m worried, of course ... But I still hope, and I will pray for him,” he said. During his career, Schumacher set an array of Formula One records. After initial success with the Benetton team, winning his first two championships in 1994 and 1995, Schumacher moved to Ferrari. There, he helped turn the storied Italian team into the sport’s dominant force. After initially retiring in 2006, he made a comeback in 2010 and raced for three years with Mercedes.
Many faces of osteosarcoma on plain radiographs. Osteosarcoma is the most common primary malignancy of bone. It is a very rare form of cancer with an annual incidence of 3:1,000,000 and so will not be seen by many surgeons. Coupled with this are the many different subtypes of this cancer that can have different appearances on imaging ranging from densely sclerotic to lytic or even cystic. They can be medullary, cortically or periosteally based. This article demonstrates the various different appearances associated with the different types of osteosarcoma which will assist surgeons in diagnosing this rare cancer.
Q: why will my hopper not move items to the next hopper? I have one hopper connected to the other, and the other to a chest. I know I have them connected correctly, because the second hopper deposits into the chest perfectly. However, items do not transfer from the first to the second hopper. Why won't this work? A: Is the first hopper targeting the second hopper? You might have placed the hopper so that the little pipe on bottom isn't pointing at the second hopper. Is there redstone running near the hoppers? A hopper receiving a redstone signal doesn't do anything.
Uterine rupture in first or second trimester of pregnancy after in-vitro fertilization and embryo transfer. We report five cases of early rupture of cornual pregnancy with history of previous salpingectomy and cornual resection following in-vitro fertilization (IVF) and embryo transfer. We discuss the predisposing factors, diagnostic and therapeutic modalities in these patients. A high index of suspicion is required for an early diagnosis. It is imperative that the physicians who care for the patients be fully aware of the possibility of such a complication in a high risk population; therefore, appropriate counselling and close follow-up might help to avoid such obstetrical catastrophes, by termination of pregnancy, either surgically or medically.
Elliott Whitehead is eyeing a recall to the international fold after laying down an emphatic marker during Sunday’s opening pre-season friendly at Dewsbury. The homegrown second-rower underlined his class by claiming four of the Bulls’ eight tries and producing a delightful assist for Matty Blythe. Whitehead’s formidable display continued the form he showed last term, when he scored 15 tries, won top tackler and best forward of 2012 in the Bulls’ end-of-season awards. He would have almost certainly played for the second-tier England Knights already had he not copped a five-game ban for biting the arm of an opponent during the home defeat to Hull KR in August 2011. That lengthy suspension meant he could not play for the Knights at the end of 2011 and also forced him to miss the start of last season. But he is now looking ripe to re-establish his England credentials ahead of the World Cup later this year. “Obviously I want to play at the highest level possible and would have probably played for the Knights had I not got that ban,” said 23-year-old Whitehead. “Every player wants to play for his country and go as far as they can, so I’ll be looking to get back in the Knights squad and then take it from there. “There is a lot of competition in the back row at international level but all I can do is my best and hopefully Steve Mac (McNamara) and the England coaches will take notice again. “I was happy with how Sunday went at Dewsbury and it was a good first hit-out for us.” Whitehead’s close pal and Bulls team-mate Luke Gale is now established within the Knights set-up and could conceivably be joined in the squad this year by Whitehead, John Bateman and possibly other Bulls hopefuls. Bradford coach Francis Cummins believes Whitehead has the ability to make the grade at the highest level, although he said: “You can see Elliott’s talent but he has to become more consistent. “He’s got the ability to go where he wants but, like everybody in the squad, he’s going to have to make sacrifices to achieve it. “If Elliott sees the England Knights as his next step, then he needs to target it and go hard at it. “I don’t think he’s taken it that seriously in the past, which is probably why he didn’t get back in the squad last year, but he reads the game so well and is a real rugby league player. “We’ve got a number of back-rowers looking really good at the moment – Tom Olbison has been outstanding during pre-season – and it’s up to these young men to achieve their potential.” The Bulls will train indoors at the Sports Barn in Huddersfield for three days this week as the big freeze grips the country.
Sites We Like Buckle up! Last night was yet another crazy episode of Love & Hip Hop Atlanta. I am really going to miss these ladies when the season ends. We start–where else?–with Joseline wearing the most ridiculous “outfit” for a photo shoot. She looks like a mermaid Beyonce in drag. There is a lot going on to say the least. Stevie J. arrives and he’s not feeling her ensemble. Perhaps he wants her to dress more patriotic like himself. He immediately goes off on her for texting his baby mama. She has a name! I mean, how hard is it to say, “Did you text Mimi?” Joseline calls Mimi Faust a b*tch, and Stevie doesn’t like her disrespecting his family. He storms out of the photo shoot. Joseline goes back to her posing. Momma Dee and Shay meet for lunch. Shay knows she needs to tread lightly and get on Momma Dee’s good side so she can grow her relationship with Lil’ Scrappy. Momma Dee is very happy that her son is with Shay, and she warns Shay that she may have to check Erica Dixon at some point. She says they can either act like ladies or handle it with some gangsta sh**. I have a feeling Momma Dee hopes it’s the latter. CLICK THE CONTINUE READING BUTTON FOR MORE! Also dining (no surprise there) are Mimi and Karlie Redd. Karlie wonders why Mimi didn’t have her back in her fight with K. Michelle. She wishes that K. Michelle would either talk to her like an adult or “put her hands up” like an adult. I am pretty sure that slapping each other silly isn’t adult behavior. Karlie reveals that she met with Stevie and he wants her to do a song with Joseline. Cue Mimi’s passive aggressiveness. Karlie doesn’t want to be in the middle of their relationship (could’ve fooled me!), and Mimi tells her that she can see Karlie and Joseline becoming best buddies. Geez Louise! Because VH1 is the only place I know where people who hate each other spend lots of time together, Karlie invites K. Michelle to a photo shoot to discuss their altercation. Karlie doesn’t think that in the small R&B world the ladies should try to be cordial. K. Michelle counters with the accusation that when she googled Karlie a brand of vinegar was all she found. Can’t these women just be fake to each others’ faces and then talk smack behind their backs like on every other reality show? Joseline meets with her stylist who was lucky enough to see Stevie’s intimidation tactics at the photo shoot. She reveals that she plans to apologize to Mimi as she has finally (FINALLY!) figured out that he continues to play them both while they bow down to his feet…which wouldn’t be a big bow given how short the dude appears. Joseline is concerned that her career will be in jeopardy if she doesn’t keep sleeping with him. She’s been contacting other producers behind Stevie’s back, and she’s changed her number in the event that he finds out about what she’s been doing. Rasheeda arrives at a launch party for her new song. Her husband Kirk Frost was in charge of the soiree, and she is beyond angry to arrive and find out that it’s not packed. Yikes! It’s not that there aren’t a lot of people there, it’s just that the venue is so large it looks empty. Rasheeda introduces her new video. Technical difficulties ensue. Kirk is going to be hearing about this! Who is with me to start a petition that requires Scrappy to have subtitles all the time? He arrives at Erica’s house to move out his stuff, and the pair hasn’t seen each other since he stormed out of the restaurant after their last fight. He semi-apologizes, saying he said what he wanted to say, but he just didn’t say it in the way he should have. At least I think that’s what he’s trying to convey. Erica isn’t stupid…she knows he needs something from her and that’s why he’s trying to play nice. They both decide that while they aren’t together, they will always love one another and want happiness for the other person. Scrappy sees his in to bring up the whole reason he’s been trying to be sweet…he wants to make sure that Erica isn’t going to be clamoring for child support now that they’re no longer together. I gather she’d been giving him a pass on consistently paying while they were in a relationship. He seems shocked and angry when she isn’t on board. She wonders what happened to the money she asked for the previous week, and he says he “didn’t get around to it.” Father of the year! Perhaps he spent that money on the town car that drives him away. Karlie is at Benzino’s house for the couple’s first date. He’s prepared a romantic candlelight dinner, and she immediately asks how many women he’s seeing. Benzino is ready to be a one-woman man. She admits to researching him and not getting the best feedback. Karlie is confused because he seems so nice. Benzino doesn’t skip a beat. He was raised right, and he just can’t stop thinking about her. Karlie can’t tell if he’s running game or not, but she takes the opportunity to scoot into his lap so he can gift her with a book and some chocolates. Cue the porn music and the make-out session. Rasheeda seeks K. Michelle’s advice about her problems with Kirk. She admits that she is going to meet with another management team in hopes of saving her marriage and taking the professional aspect out of their relationship. K. Michelle hopes that she won’t be jeopardizing her marriage for her music career. Rasheeda meets with a potential new manager who is concerned with her business situation with her husband. She thinks that Rasheeda’s career has stalled due to her loyalty to Kirk’s company. The agent has her in tears, but she assures Rasheeda that Kirk will understand if he truly wants her to excel. Benzino and Stevie meet for drinks to dish on Benzino’s date with Karlie…because that totally seems like something these guys would do. I know that this show is scripted because Stevie asks Benzino about the meal he prepared. Stevie has never shown any interest in anyone but himself, and I don’t think in this entire season he’s asked someone a question just to make pleasant conversation. The fact that he’s excited to hear about Benzino’s lobster and asparagus is beyond laughable. Stevie is thrilled when his friend says he’s going to meet Karlie’s family soon. However, he really needs to get some advice on his love triangle with Mimi and Joseline. He doesn’t think it’s okay that Joseline has been sending mean texts to Mimi, but he can’t quite tear himself away from getting naked with her either. It’s quite the conundrum. Stevie thinks it ‘s totally over now that Joseline has disrespected his family. He’ll never leave Mimi…not even for Halle Berry. I am sure Halle is super disappointed to hear this news. Over lunch, Erica fills in her mom about the recent details with Scrappy. Erica thinks that Scrappy wants to get off child support so he can still have a hold on her when she needs something. She believes he wants a situation where she’ll have to meet with him and see him when she needs money as opposed to depositing money right into their child’s account. Erica’s mother advises her to call their social worker, but under no circumstances should she let Scrappy off the hook. Rasheeda finally approaches Kirk about her meeting with another manager. He’s very hurt. They are screaming at each other. Kirk doesn’t think that Rasheeda realizes how he sacrificed for her. He’s her biggest fan and her strongest supporter, and he thinks she’s being very underhanded. I think they both have valid concerns, but neither is willing to see the other’s side. It’s a prime example of why you don’t mix business with pleasure. I hate it for them because Rasheeda and Kirk are my faves…and not just because they are rarely on the show. I genuinely think they are good people who love each other and are savvy about the music business. Joseline invites Mimi to coffee to apologize for her threatening texts. Mimi reminds Joseline that she will be always be a part of Stevie’s life since they have a child together. I have to hand it to Joseline. She lets Mimi say her biting comments and then tries to explain how Stevie orchestrated the situation between them. Joseline also apologizes for hurting Mimi by sleeping with her man, but she didn’t know that Stevie was still really with Mimi. Mimi doesn’t believe her apology. I have to say, I’d totally believe Joseline if I didn’t think she was reading her lines off a cue card somewhere off camera. Of course, that goes for Mimi as well! Next week, Kirk and Rasheeda continue to bicker, and Joseline threatens Stevie with finding another producer. Shay isn’t happy with Scrappy’s child support situation, and Benzino gifts Karlie with a key to his house. Moving quickly, I see! Stevie and Mimi head to couple’s therapy. I definitely can’t wait to see that! TELL US-WHAT DID YOU THINK OF LAST NIGHT’S EPISODE? WILL RASHEEDA AND KIRK SURVIVE MANAGER-GATE? COULD MIMI BE ANY MORE CLUELESS?
Introduction {#Sec1} ============ With the development of modern science and technology, huge quantities of chemicals are used, and more than 15 million chemicals are sold worldwide \[[@CR1]\]. Humans routinely use chemicals and can be exposed to them in everyday accidents. Although they are widely used, the impact of many chemicals on human health is still unknown. With increasing concern about the safety of chemicals, human exposure has emerged as an important issue such as humidifier disinfectants. Given the widespread use of chemicals, there are many risks associated with chemical accidents and diseases. Chemical incidents reported worldwide between 1970 and 1998 resulted in leaks, fires, and explosions involving more than 100,000 casualties \[[@CR2], [@CR3]\]. Since chemicals are stored in huge quantities, the magnitude and extent of damage when a chemical accident occurs can be significant \[[@CR2]\]. In the 2007 "Toxicity test for the twenty-first century: Vision and strategy," the National Research Council (NRC) planned a new toxicity test system to describe a new paradigm shift in the assessment of the hazards and risks of chemicals, via a new computational biological test method used to study toxic pathways for the expansion of in vitro testing \[[@CR4]\]. In this context, the "adverse outcome pathway (AOP)" is a biological pathway that disturbs homeostasis, which causes toxicity. The description of toxicity begins with chemical characterization and explains the interaction between them. Target tests to identify impacts at critical stages of the pathway and dose--response extrapolation to estimate human exposure are required. Predicting ecosystem impacts requires additional population-based modeling. This is a conceptual framework for organizing existing biological information, and AOP consists of molecular initiative event (MIE), key events (KEs), and adverse outcome (AO). This independent element represents a biological response and is associated with major event relationships. The AOP concept provides instinctive risk identification to help assess the carcinogenicity of chemicals. This highlights the application of the AOP concept and the effective application of cancer prevention by predicting the carcinogenicity of chemicals \[[@CR5]\]. Results {#Sec3} ======= Concept and role in chemical hazard assessment {#Sec4} ---------------------------------------------- Molecular initiative event (MIE) is the initial point of the AOP and represents chemical interactions at the molecular level, such as ligand--receptor binding or DNA binding. Key event (KE) is a biological change caused by a molecular initiative event at various levels, such as cells and tissues. An adverse outcome (AO) is a particular type of KE, representing an endpoint of biological disturbances due to MIE. Molecular initiative event, key event, and AO are connected by a unidirectional arrow called key event relationship (KER), which means predictive interaction between upper and lower KE, making it easy to estimate the state of each KE \[[@CR6]\]. Each factor in the AOP must be based on the weight of evidence (WoE) that meets the Bradford Hill criteria. Establishing the mode of action (MoA) hypothesis is based on causality criteria, considerations of coherence, specificity of relationships, coherent time relationships, dose--response relationships, biological validity, coherence of evidence, and alternative explanations \[[@CR7]--[@CR9]\]. The WoE is the concept of providing evidence that meets information requirements using information from independent sources \[[@CR10]\]. One AOP should have one MIE and one AO, but there is no limit to the number of intermediate KEs, and each KE can be included in a different AOP. Adverse outcome pathways describe the sequence of causality in biological responses to chemicals at various levels \[[@CR11]--[@CR13]\]. Any type of information related to a biological response (e.g., in vivo and in vitro test results, electronic data, biomarkers, etc.) may be applied to the AOP \[[@CR8]\]. Thus, AOP is a dynamic technology that allows existing information to be more accurately changed as the technology used to monitor biological responses evolves \[[@CR14]\]. Because AOP is expressed in a simple flowchart, it is easy to instinctively understand the side effects of chemicals, and the concept of AOP is not a sudden occurrence, but an evolution of existing concepts related to toxic mechanisms \[[@CR11], [@CR15]\]. Mode of action (MoA) frameworks {#Sec5} ------------------------------- The carcinogen mode of action (MoA) framework of early International Program on Chemical Safety (IPCS) oversees the systematic process of describing the chemical early international programs on chemical MoA in animals and determines relevance in humans through comparisons. Early IPCS techniques set out some basic principles of pathway-based techniques, and MoA is defined as a series of key events along biological pathways from initial chemical interactions to toxicological consequences. One MoA was studied at a time, recognizing that MoA does not have to be complete to be useful; a chemical can have more than one MoA and may therefore be associated with multiple possibilities, each of which can be critical to toxicity studies. To establish a model for defining "key events" as possible pathway steps and to systematically establish causal relationships between key events, the MoA must ensure the importance of setting quantitative parameters. In this regard, the MoA is distinguished from the mechanism of action, the latter being a more detailed description of pathways involving molecular interactions \[[@CR16]\]. The MoA has generally been updated to accommodate insights into the pathway-based approach to risk assessment, where MoA and AOP are conceptually similar, but MoA does not necessarily imply toxic expression (e.g., effect as drugs) \[[@CR16]\]. Over the last decade, attempts to describe and predict the biological and toxicological effects of chemicals have gradually shifted to the consideration of mechanized automation. Of the many reports in the burgeoning field of predictive toxicology, the US NRC's "21st Century Toxicity Testing: Vision and Strategy" attracted considerable attention and discussed the need for a paradigm shift in the assessment of the hazards and risks of chemicals \[[@CR4], [@CR11], [@CR17]--[@CR21]\]. The NRC report plans to change the current way of conducting toxicological tests, which are based on animal phenotypes, with techniques that are increasingly dependent on understanding the molecular mechanisms of toxicity in human cells and tissues. The transition to more mechanistic hazard assessment is the "high-throughput screening (HTS) and high-content screening (HCS)" in mammalian (especially human) cell lines and/or tissue cultures. This implies the use of in vitro tests based on various calculations for data analysis and interactions between toxicity and molecular targets, side effects, and outcomes. The general premise of AOP technology means that there are sufficient events to explain biological pathways and to predict toxic pathways at different levels of biological tissue (cells, tissues/organs, organisms, populations). A basic understanding of molecular interactions and effects should be able to predict the side effects of organisms and populations. Adverse outcome pathway technique {#Sec6} --------------------------------- The AOP technique was initiated in the field of ecological toxicology as a way to address the uncertainty of hazard assessments for an increasingly diverse environment, and as reported by Ankley et al. \[[@CR11]\] adverse outcome pathway is a "causal, mechanical, inferential, or correlated relationship." It is a flexible technology that can include infrastructure-based connections, and the information on which they are based can include both mechanisms and MoA in vitro, in vivo, or computational systems. Adverse outcome pathway describes an MIE that occurs at the onset of chemical exposure, beginning with the interaction between the biomolecule (e.g., proteins, receptors, etc.) and the molecule and subsequently health in cells and in humans. All types of information can be integrated from the molecular level to the individual level to predict hazard consequences and provide biological arguments (or a set of hypotheses), including individual toxicity levels for hazards or environmental hazards. The Organization for Economic Co-operation and Development (OECD), the US Environmental Protection Agency (EPA), and the European Commission (EC) joint research centers have developed a chemical knowledge-based toxicity pathway (AOP-KB), and the AOP-KB has attracted the interest and participation of stakeholders, including government, academia, and industry, in that it provides a point of contact with academic research achievements that can be directly linked to government chemical regulation. The concept of AOP is useful for developing predictive toxicity tools, and even short-term imperfect AOPs can show the relationship between chemicals and risk. The certainty of interpretation between existing and new information can be increased, and it can be used as an integrated test strategy to maximize that certainty \[[@CR22]\]. Recent trends in adverse outcome pathways {#Sec7} ----------------------------------------- The concept of AOP was first announced in 2010 by Ankley et al. \[[@CR11]\] with 243 AOPs and 1800 KEs registered and developing as of August 2018. This AOP information is available free of charge in the AOP-KB, the leading AOP database maintained by the OECD; the site has been published by the US EPA to share and discuss relevant information among AOP developers. The project began in collaboration with EC's joint research center and the US army technician R&D center \[[@CR23]\]. Knowledge-based adverse outcome pathway (AOP-KB) consists of AOP-Wiki, Effectopedia, Intermediate Effects DB, and Xplorer \[[@CR24]\]. AOP-Wiki provides a system that organizes the available knowledge and published research information concerning AOP, KE, KER, and stressors, respectively. Effectopedia is a modeling platform that is designed for the development and application of AOP. Experimental data are used to provide quantitative information about the AOP component, and a beta version of Effectopedia is currently available. Medium impact DB processes chemical information and describes how chemicals cause MIE or KE. AOP Xplorer is a calculation tool for mapping AOP. Intermediate DB and AOP Xplorer are currently in development, and all four systems share information through the AOP-KB hub. Since each element of AOP-KB is individually arranged, AOP-KB is useful for the development of AOP and is applied from various studies \[[@CR13]\]. The OECD provides comprehensive management of AOP development and evaluation \[[@CR6]\] and is overseen by the OECD extended advisory group on molecular screening and toxicogenomics (EAGMST). The AOP-Wiki is administered by the Toxic Pathology Society, in accordance with the OECD extended advisory group on molecular screening and toxicogenomics guidelines \[[@CR23]\]. Since the OECD published its first AOP, "Skin sensitization pathways initiated by covalent bonds to proteins," several reports and guidance on AOP have been published, and the OECD provides eight AOP-related publications. As of August 2018, the AOP development program workbook lists 60 projects \[[@CR24]\]. AOPs for chemicals in workplace {#Sec8} ------------------------------- Respiratory sensitivity is an important occupational health issue for workers, and understanding the mechanistic basis for this effect is necessary to support the development of toxicological tools to detect the chemicals. Recently, AOP systems and techniques have been used to organize the information to better convey the understanding of chemical respiratory sensitization, which is similar to AOP for skin sensitization, but with specific differences. The composition of these AOPs can provide insights into the prediction of differences in respiratory sensitivity from non-cutaneous sensitivity, an unclear regulatory requirement \[[@CR25]\]. The AOP not only provides a mechanistic understanding of how the processes of skin and respiratory sensitization differ from each other, but also the need for further research to confirm the uncertainty of chemical respiratory sensitization \[[@CR26]\]. Allergic hypersensitivity to the respiratory tract by chemicals is associated with rhinitis and asthma and remains an important occupational health problem. Recently, the concept of AOP has briefly described the major steps leading to health hazards, while drawing considerable attention from the toxicologist community as a basis for developing a framework and focus on future research \[[@CR27]\]. Allergic contact dermatitis (ACD) is a hypersensitive immune response induced by small protein-reactive chemicals that can be identified and quantitatively assessed by local lymph node assays (LLNAs). Given the complexity of the ACD, a single alternative cannot replace LLNA, but integrated testing strategies (ITS) can be used to gather important information about molecular mechanisms related to skin sensitivity and to understand the molecular process of the ACD. A systematic review of in vivo studies has been carried out, and an ACD molecular map is prepared. Also, limited comparisons of toxic genomes in humans and mice have revealed similarities, although additional data are needed to identify subtle differences. For insight into the molecular mechanisms represented by various in vitro systems, comparative analysis with in vitro toxicogenomic data can be used to compare new molecular in vitro methods, in addition to mathematical predictability. In addition, new classifications by in silico, in chemico, and in vitro methods can be complemented by immobilizing AOP and ACD molecular maps, thus laying the foundation for developing test strategies that accurately reflect key events of skin sensitivity \[[@CR28]\]. Many of these case studies have shown ways to inform AOP development in chemical hazard assessment \[[@CR29]\]. AOP technology provides a means of organizing and sharing knowledge of the mechanisms of chemical toxicity, including quantitative structure--activity relationships (QSAR) based on chemical and computational, in vitro, and integrated testing strategies, including toxicologically relevant readings. It comprises an explanatory method or integrated approaches to testing and assessment (IATA) that can be used as the basis for predictive techniques. The recently published OECD guideline provides guidance on what information is needed to identify and document AOP in terms of relevance and suitability \[[@CR30]\]. Nanomaterials and AOPs {#Sec9} ---------------------- According to the OECD guidelines, many AOPs have been proposed for chemically induced side effects in humans and the environment, and in particular, the toxic effects of nanomaterials differ from the general mechanism, due to their inherent properties, making them difficult to compare directly. While there are many knowledge gaps in understanding nanomaterials toxicity, more and more studies are being published on toxicological properties. AOP can be used to reasonably combine mechanical knowledge related to toxicity by nanomaterials to fill data gaps and develop toxicological testing strategies, captured by AOPs selected for chemical-induced toxicity. Much of the mechanistic knowledge that has been gained can be used to provide nanomaterial toxicity prediction modeling and hazard assessments \[[@CR31]\]. Due to the small size of the manufactured nanomaterials, there may be unknown health hazards, particularly in the working environment; the dust of certain manufactured nanomaterials affects the risk of inhalation and lung function. This fact requires rapid, cost-effective, and safe assays, such as multi-parametric high-throughput screening with cultured human lung cells. The predicted value of these in vitro tests is partially associated with mechanisms that contribute to their toxicity. Numerous adverse effects on fabricated nanomaterials, such as multi-walled carbon nanotubes due to changes in the dielectric, have been identified, one of which has recently been evaluated as carcinogenic. It is currently being used as a state-of-the-art strategy for analyzing genome effects from exposure to manufactured nanomaterials, focusing on lung disease \[[@CR32]\]. Although a variety of engineered nanomaterials are used commercially with a variety of physicochemical properties with respect to in vivo toxicity effects, an integrated framework for human health risk assessment (HHRA) of ENMs is still not established. Two-year carcinogenicity studies, clinical chemistry, and histopathological endpoints in rodents have been considered the "gold standard" for detecting substance-induced toxicity in animal models, but genome-wide expression analysis and in vivo high-throughput testing (HTS) are increasing. In addition, these assays have shown that transcriptomics can be used as an effective mechanism-based method of determining acceptable levels of exposure to nanomaterials in product development, when epidemiological studies are not possible. Chemical carcinogenicity prediction and AOPs {#Sec10} -------------------------------------------- Because some chemicals have multiple pathways of toxicity \[[@CR33]\], a chemical risk assessment must include qualitative and quantitative information for each chemical involved \[[@CR34]\]. Many international organizations have disseminated extensive information on chemical characterization, structure, toxicity, and risk assessment databases (e.g., PubChem, TOXNET and INCHEM). The US EPA generally defines and conducts a risk assessment of chemicals in four processes: risk identification, dose--response, exposure assessment, and risk analysis \[[@CR35]\]. Key components of risk assessment include MoA analysis and WoE using in vivo and in vitro experiments, absorption, distribution, metabolism, and excretion (ADME) information, generated by quantitative structure--activity relationships (QSAR) and based on statistical models, such as physiology-based toxic kinetics modeling \[[@CR36], [@CR37]\]. With the exception of low-probability but acute industrial chemical accidents, the focus is on the chronic exposure to chemicals in everyday life, and humans may be exposed to chemicals through inhalation, ingestion, and skin contact \[[@CR38]\]. For example, chronic exposure to air pollutants, such as workplace exposures, contaminated water, pesticide-exposed crops, pharmaceuticals, cosmetics, and other sources of exposure, can lead to chronic toxicity, which could be delayed or extended \[[@CR39]\]. Long-term accumulation of side effects may lead to genotoxic or nongenetic damage by increasing genetic instability, which increases the likelihood of cancer becoming an end point \[[@CR40]--[@CR43]\]. Carcinogens can cause various cellular abnormalities, due to genetic or epigenetic changes \[[@CR42]\]. AOP has a practical and robust weighting based on molecular, pathological, regulatory, and clinical knowledge, which facilitates the interpretation and integration of epidemiological studies in the hazard assessment process by describing biologically possible causes. The proposed AOP will present potential integration techniques for testing and evaluation to address the risks posed by chemicals in the future and will enable the development of biological instruments (e.g., Omics technology, stem cell culture, as well as experimental techniques, artificial tissues, etc.), using new techniques for understanding disease and toxicity that have traditionally been performed \[[@CR44]\]. The goal of this new tool is to improve chemical risk assessment and reduce uncertainty. Recently, this concept has formalized the AOP for human health and ecological risk assessment and has been adopted as an OECD test guide. Development of knowledge-based AOP {#Sec11} ---------------------------------- The implementation of AOP generates data and knowledge describing MIEs, intermediate effects, and toxic expressions (i.e., adverse outcomes), and AOP-related data can be viewed to facilitate the collection and retrieval of this information. Many research institutes have led and participated in creating flexible and standardized methods. Chemical specificity for intermediate effects is used in hazard assessment in all kinds of situations, since the OECD has adopted and developed a standard data format of OECD harmonized templates (OHT). Collecting historical data, the interim effects reported using OHT 201 were linked to each other to create an AOP, in accordance with the AOP technology framework \[[@CR30], [@CR45], [@CR46]\]. Adverse outcome pathways describe generalizations and predictable biological motivations when certain biological pathways or processes are disturbed \[[@CR13]\]. AOP represents existing knowledge linking two junctions, MIE and adverse outcome. For humidifier disinfectants, MIE is known to include ROS production, T cell reduction, and pro-inflammatory cytokine release from macrophages along the AOP. Possible AO may be causally related to major events (KE), interstitial fibrosis and pneumonia, asthma, allergic rhinitis or dermatitis, cerebrovascular and cardiovascular disease, diabetes, fetal death, premature bleeding, such as autoimmune diseases, liver and kidney toxicity, and cancer. Epidemiological and toxicological studies using national health insurance data and AOP knowledge-based big data can verify the actual risk of AO. These new methods can be used to identify potential diseases when exposed to humidifier disinfectants. Therefore, next-generation tools, such as AOP and pathway-based toxicology, can be an appropriate way to clarify the toxicological effects of humidifier disinfectants. Previous reports have estimated that about two million people will be affected by a humidifier disinfectant, whether cured or not, and previous studies have shown specific findings focused on epilepsy fibrosis, compared to other diseases. AOP has been recommended as a new approach to understanding the overall impact of humidifier disinfectants, and epidemiological and toxicological studies using national health insurance data and AOP knowledge-based big data can identify the actual risk of toxic expression and apply this new method. This will provide a list of potential diseases when exposed to humidifier disinfectants \[[@CR47]\]. In MIEs from humidifier disinfectants, according to a study by Song et al. \[[@CR48]\], the administration of polyhexamethylene guanidine (PHMG) in the thymus causes elevation of pre-inflammatory cytokines and lung infiltration of immune cells. Reducing the total cell count and the ratio of CD4^+^/CD8^+^ cells, histopathological examination showed a significant decrease in the cortex and medulla, and mRNA levels with T cell development were also significantly reduced. It was suggested that lung tissue exposure to PHMG not only causes lung inflammation and fibrosis, but also decreases cellular immunity \[[@CR49], [@CR50]\]. Discussion {#Sec12} ========== Application of AOP in occupational health {#Sec13} ----------------------------------------- AOP's conceptual framework, based on exposure and hazard data interpreted using risk assessment tools for product and environmental safety, can be used to understand side effects as a series of events or processes within biological systems and to improve current hazard assessment. While the precise definition of the MIE of a compound has not yet reached general acceptance, MIE is the initial interaction between a molecule and a biomolecule or biological system that may be causally related to the outcome through a route, the case study, and the issue of definition being addressed. Thus, the field can explore ways to use multiple processes of chemical knowledge to help further definition, classification, characterization, and hazard assessment and suggests the role of MIE research in the development of in vitro and in silico toxicology; studies are underway to identify and characterize MIE by a combination of chemical approaches \[[@CR51]\]. The future application of AOP is in the possibility of predicting a decrease in lung function in humans exposed to potentially harmful inhalation toxicants; and in this context, the proposed AOP screens compounds that may pose a risk to humans during inhalation exposure. Cost-effective in vitro assays that can be further classified according to the degree of toxicity that may occur are being developed \[[@CR52]\]. At the same time, biomarkers for developing preclinical endpoints that indicate the risk of death associated with a future disease or impaired lung function can also be derived from AOP \[[@CR53]--[@CR56]\]. In many studies, it is important to determine whether subsequent events, such as increased ROS levels compared to fresh air, include AOP-based EGFR activation and downstream signaling. AOP is a key combination of appropriate in vitro models and tests. It can provide a framework for the systematic assessment of events (KE). In addition, such AOP-based in vitro testing may ultimately be useful in knowing the dangers of chemicals and reducing their use \[[@CR11], [@CR57]--[@CR61]\]. Adverse outcome pathways can play a role in integrating knowledge derived from a variety of sources, including experimental data, as well as evolution-based models. This will enable more efficient application of AOP knowledge of future extrapolation of species, as well as quantitative chemistry and site-specific hazard assessments \[[@CR62]\]. Newly proposed AOPs can serve a variety of purposes, including the establishment of structure--activity relationships (SARs), the development of new in vitro toxicity studies, and the refinement of priority strategies \[[@CR12]\]. While genetic and epigenetic data usage for the prediction and identification of chemical hazards is growing, further research is needed to confirm MoA and AOP at a limited level, before the risk of dose--response modeling, exposure and/or risk assessment, and genetic/epigenetic variation is quantified. Evaluating gene--environment interactions is the basis from which genetic and epigenetic (epigenomic) data can be used for hazard and risk assessment. In vivo and in vitro data should be supplemented with human data collected from occupational health and molecular epidemiological studies. Research needs to be designed to provide as much information as possible about the relationship between genetic and epigenetic mutations and toxic pathways. In addition, attention should be paid to ethical, legal, social, and political impacts when genetic and epigenetic (epigenomic) data are used for occupational health issues. Ultimately, studies published before genetic and epigenetic data are used to assess occupational health, and the development of occupational exposure levels (OELs) should demonstrate that these changes affect occupational exposure and toxic expression \[[@CR63]\]; the use of computational biology and toxicogenic pathways will increasingly focus on consistent physiological changes between similar groups of toxic substances \[[@CR64], [@CR65]\]. Developing non-animal testing techniques that utilize route-based machine information can provide more predictive tools for identifying potential risks, as well as more information on LC~50~ or other in vivo observations. Extrapolating animal data to predict health effects may include physiological, anatomical, and metabolic differences between species (e.g., other airway dichotomy, cell type and composition, other biomodified enzymes and respiratory patterns, metabolic rate, physiological changes) \[[@CR66]\]. It should also be sufficient to predict and manage potential adverse outcomes in humans \[[@CR67]--[@CR70]\]. Application for inhalation toxicity {#Sec14} ----------------------------------- The discovery of various AOPs after inhalation exposure opens the door to the development of in vitro and in silico technologies to assess AOP-related endpoints that can explain toxic expression at the organism and/or population level \[[@CR13], [@CR14]\]. These AOP tools provide more reliable information, assess target organ impacts, and help better understand how certain toxic chemicals affect humans (i.e., providing mechanical insight values beyond what can be collected in the LC~50~). This technology has become a promising field of research that has not yet been accepted by international regulatory bodies \[[@CR71]\], and this review discusses the development of integrated approaches to testing and assessment (IATA) that can replace the use of animals to assess the inhalation toxicity of chemicals. As more data and tools become available and understanding of the toxic mechanisms progresses, optimal technologies will continue to evolve. In addition to acute inhalation toxicity, many cellular systems and concepts can be applied to long-term repeated inhalation studies \[[@CR72]\]. New approaches are needed to assess the outcomes of inhalation toxicants on workers' health, and these techniques will be based on the toxic mechanisms, understanding of dose measurement, in silico modeling, and in vitro testing. To accelerate the widespread implementation of these techniques, the development of AOP can help resolve data gaps by understanding models and mechanisms and can be used to investigate and optimize key events. Advances in the twenty-first-century life sciences are important to provide an unprecedented opportunity to gain a dynamic understanding of the causes and pathophysiology of disease and a concrete understanding of human beings, and to consider the ongoing trial and error of research, drug development, and clinical use \[[@CR73]\]. Although new technologies can also be applied to environmental health and disease, these advances require new medical and drug development paradigms for maximum benefit. Human diseases should be used in systems toxicology for integrating and interpreting data on the cause of disease and pathophysiology, with studies focused on human-specific models for understanding AOPs at different biological levels, similar to those of toxicology \[[@CR74], [@CR75]\]. It is now time for an integrated discourse to identify and consider the many challenges and questions that need to be addressed. This review summarizes current scientific advances on the mechanisms and assays that can be used to assess the inhalation toxicity of chemicals from the perspective of protecting workers' health. Although there are few QSAR models currently available for predicting inhalation toxicity, the applicability areas of QSAR (e.g., TopKAT and MultiCASE) are examined to determine whether a model can be optimized for occupational toxicity prediction. It is necessary to identify the differences between the advantages of existing models and to clarify which models can be used for specific applications. Also, new models can be developed using data collected from other sources, and the US EPA Center for computational toxicology (<https://comptox.epa.gov/dashboard/>) is a convenient platform to accommodate available models and their predictions \[[@CR71]\]. It is important to carefully assess the variability associated with in vivo data that rely on developing new models to quantify the uncertainty associated with model prediction, and best practice protocols are being developed in in silico methods involving various endpoints \[[@CR76]\]. There are also a number of AOPs involved in exposure, but additional AOPs need to develop specific toxic expressions that may occur with inhalation exposure. This will be useful for the ongoing construction of AOP on mechanisms of inhalation toxicity. AOP development can be used for the likelihood of causing specific toxicity and to establish confidence in in vitro tests characterizing key events (KEs). For example, each researcher should also be encouraged to work with an AOP expert to bridge the gap between AOP development and knowledge, by providing an interactive virtual platform for AOP using an AOP-Wiki designed to create international consensus on the developed AOP. Many systems can be used for the evaluation of inhalable toxicants, but cell-based systems also need to be specific for their ability to metabolize compounds. In particular, three-dimensional (3D) tissue and lung-on-a-chip models are believed to represent human characteristics, but should be developed as a standardized test protocol to maintain consistency between laboratories. Designing comprehensive assays for inhalation toxicity requires the use of AOPs, alternative or non-test methods, and in vitro assays. Experts with a variety of expertise (in vitro, in vivo inhalation toxicity, computational modeling, exposure science, etc.) should work together to design this approach. A key step in this process is proof-of-concept testing that focuses on specific chemicals, such as industrial and environmental toxicants, pesticides, tobacco, or pharmaceuticals, and is useful in describing key events in the pathogenesis for a particular AOP. The development and implementation of non-animal assays for inhalation toxicity testing and the acceptance of global regulations require cooperation between various stakeholders, and the International Science Consortium and the NTP Interagency Center for the Evaluation of Alternative Toxicological Methods (NICEATM) have formed a working group. Researchers' participation is encouraged in these activities. The success in this area will develop platforms that can predict mortality and preventive effects from inhalation exposure, and these new techniques will lead to a better understanding of toxic mechanisms, without the use of animals, unleashing the potential of protecting workers' health for science of the twenty-first century. Methods {#Sec2} ======= This study examined the concept of AOP on workers' chemical exposure and prospects in occupational health. This review provides a summary of the current literature on AOP in occupational health, risk assessment of respiratory and nanomaterials, and prediction of carcinogenicity. Major Web sites were searched, specifically Google Scholar (<http://scholar.google.com>), ScienceDirect ([www.sciencedirect.com](http://www.sciencedirect.com)), Scopus ([www.scopus.com](http://www.scopus.com)), NDSL (<http://www.ndsl.kr/index.do>), and PubMed (<http://www.ncbi.nlm.nih.gov/pubmed>). The following key terms were used: "Adverse outcome pathway," "Toxicology," "Risk assessment," "Human exposure," "Worker," and "Occupational safety and health." Among the literature searched through this process, the literature on toxic expression pathways (AOPs) was intended to utilize the most recent reports (after 2015), and the data on the research process and basic concepts that are presented for ease of explanation are not only from 2015, but also include some data from before 2015. To accomplish the objective of this review, two categories of papers were selected: "AOP concept" and "Trends and applications of AOPs in occupational health." Approximately 100 papers appeared in search engine results, with 75 papers meeting inclusion criteria for detailed analysis. Information from these 75 papers regarding measures for worker safety in the prospects for AOP in industry and occupational health has been summarized in this paper. Conclusion {#Sec15} ========== In order to fully understand adverse outcome pathway (AOP), it is necessary to consider the nature of genetic and epigenetic information. The assessment of the hazard and risk of industrial chemicals requires the results of in vitro, in vivo, and epidemiological studies on genetic and epigenetic factors and quantitative risk assessment studies. However, despite the great potential, little genetic or epigenetic (epigenomic) information has been used in the quantitative risk assessment of occupational and/or environmental exposures, and the number of studies containing this information will increase in the future. Adverse outcome pathway is a conceptual tool that delineates the causal pathways of chemical toxicity. The goal of AOP is to accurately predict the toxicity of chemicals, by serving as an alternative to traditional chemical risk assessment. First introduced for ecological toxicity, AOP is now widely used in chemical assessments. The AOP, which is applied to inhalation toxicity especially carcinogenicity assessment, will be a tool to understand the effects of the use of chemicals in the workplace and the chronic exposure of the workers involved and make their predictions very useful. Based on this forecasting tool, it is expected to bring dramatic advances in occupational and environmental cancer prevention. This study was supported by the Korean Occupational Safety and Health Agency (Ulsan, Republic of Korea), the Ministry of Employment and Labor (Sejong, Republic of Korea), and a Grant-in-Aid for chemicals hazard evaluation (2019). Funding was provided by OSHRI, KOSHA. Kyung-Taek Rim declares that he has no conflict of interest. This article does not contain any studies with human participants or animals performed by any of the authors.
/* * Tencent is pleased to support the open source community by making Angel available. * * Copyright (C) 2017-2018 THL A29 Limited, a Tencent company. All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in * compliance with the License. You may obtain a copy of the License at * * https://opensource.org/licenses/Apache-2.0 * * Unless required by applicable law or agreed to in writing, software distributed under the License * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express * or implied. See the License for the specific language governing permissions and limitations under * the License. * */ package com.tencent.angel.ml.softmax; import com.tencent.angel.conf.AngelConf; import com.tencent.angel.ml.core.conf.MLConf; import com.tencent.angel.ml.core.graphsubmit.GraphRunner; import com.tencent.angel.ml.matrix.RowType; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.apache.hadoop.conf.Configuration; import org.apache.hadoop.fs.FileSystem; import org.apache.hadoop.mapreduce.lib.input.CombineTextInputFormat; import org.apache.log4j.PropertyConfigurator; import org.junit.Before; import org.junit.Test; /** * Gradient descent LR UT. */ public class SoftmaxTest { private Configuration conf = new Configuration(); private static final Log LOG = LogFactory.getLog(SoftmaxTest.class); private static String LOCAL_FS = FileSystem.DEFAULT_FS; private static String CLASSBASE = "com.tencent.angel.ml.classification."; private static String TMP_PATH = System.getProperty("java.io.tmpdir", "/tmp"); static { PropertyConfigurator.configure("../conf/log4j.properties"); } /** * set parameter values of conf */ @Before public void setConf() throws Exception { try { // Feature number of train data int featureNum = 357; // Total iteration number int epochNum = 5; // Validation sample Ratio double vRatio = 0.1; // Data format, libsvm or dummy String dataFmt = "libsvm"; // class number int classNum = 3; // Model type String modelType = String.valueOf(RowType.T_DOUBLE_DENSE); // Learning rate double learnRate = 0.5; // Decay of learning rate double decay = 1; // Regularization coefficient double reg = 0.002; // Set local deploy mode conf.set(AngelConf.ANGEL_DEPLOY_MODE, "LOCAL"); // Set basic configuration keys conf.setBoolean("mapred.mapper.new-api", true); conf.set(AngelConf.ANGEL_INPUTFORMAT_CLASS, CombineTextInputFormat.class.getName()); conf.setBoolean(AngelConf.ANGEL_JOB_OUTPUT_PATH_DELETEONEXIST, true); conf.setInt(AngelConf.ANGEL_PSAGENT_CACHE_SYNC_TIMEINTERVAL_MS, 10); conf.setInt(AngelConf.ANGEL_WORKER_HEARTBEAT_INTERVAL_MS, 1000); conf.setInt(AngelConf.ANGEL_PS_HEARTBEAT_INTERVAL_MS, 1000); // Set data format conf.set(MLConf.ML_DATA_INPUT_FORMAT(), dataFmt); //set angel resource parameters #worker, #task, #PS conf.setInt(AngelConf.ANGEL_WORKERGROUP_NUMBER, 1); conf.setInt(AngelConf.ANGEL_WORKER_TASK_NUMBER, 1); conf.setInt(AngelConf.ANGEL_PS_NUMBER, 1); //set sgd LR algorithm parameters #feature #epoch conf.set(MLConf.ML_MODEL_TYPE(), modelType); conf.set(MLConf.ML_FEATURE_INDEX_RANGE(), String.valueOf(featureNum)); conf.set(MLConf.ML_EPOCH_NUM(), String.valueOf(epochNum)); conf.set(MLConf.ML_VALIDATE_RATIO(), String.valueOf(vRatio)); conf.set(MLConf.ML_LEARN_RATE(), String.valueOf(learnRate)); conf.set(MLConf.ML_OPT_DECAY_ALPHA(), String.valueOf(decay)); conf.set(MLConf.ML_REG_L2(), String.valueOf(reg)); conf.setLong(MLConf.ML_MODEL_SIZE(), featureNum); conf.setInt(MLConf.ML_NUM_CLASS(), classNum); conf.setBoolean(MLConf.ML_DATA_USE_SHUFFLE(), true); conf.set(MLConf.ML_MODEL_CLASS_NAME(), CLASSBASE + "SoftmaxRegression"); } catch (Exception x) { LOG.error("setup failed ", x); throw x; } } @Test public void testSoftMax() throws Exception { setConf(); trainTest(); incTrain(); predictTest(); } private void trainTest() throws Exception { try { String inputPath = "../../data/protein/protein_357d_train.libsvm"; String savePath = LOCAL_FS + TMP_PATH + "/SoftMax"; String logPath = LOCAL_FS + TMP_PATH + "/SoftMaxlog"; // Set log path conf.set(AngelConf.ANGEL_LOG_PATH, logPath); // Set trainning data path conf.set(AngelConf.ANGEL_TRAIN_DATA_PATH, inputPath); // Set save model path conf.set(AngelConf.ANGEL_SAVE_MODEL_PATH, savePath); // Set actionType train conf.set(AngelConf.ANGEL_ACTION_TYPE, MLConf.ANGEL_ML_TRAIN()); GraphRunner runner = new GraphRunner(); runner.train(conf); } catch (Exception x) { LOG.error("run trainOnLocalClusterTest failed ", x); throw x; } } private void incTrain() { try { String inputPath = "../../data/protein/protein_357d_train.libsvm"; String savePath = LOCAL_FS + TMP_PATH + "/SoftMax"; String logPath = LOCAL_FS + TMP_PATH + "/SoftMaxlog"; String newPath = LOCAL_FS + TMP_PATH + "/NewSoftMax"; // Set trainning data path conf.set(AngelConf.ANGEL_TRAIN_DATA_PATH, inputPath); // Set load model path conf.set(AngelConf.ANGEL_LOAD_MODEL_PATH, savePath); // Set save model path conf.set(AngelConf.ANGEL_SAVE_MODEL_PATH, newPath); // Set actionType incremental train conf.set(AngelConf.ANGEL_ACTION_TYPE, MLConf.ANGEL_ML_INC_TRAIN()); // Set log path conf.set(AngelConf.ANGEL_LOG_PATH, logPath); GraphRunner runner = new GraphRunner(); runner.train(conf); } catch (Exception e) { LOG.error("run incTrainTest failed", e); throw e; } } private void predictTest() throws Exception { try { String inputPath = "../../data/protein/protein_357d_test.libsvm"; String loadPath = LOCAL_FS + TMP_PATH + "/SoftMax"; String predictPath = LOCAL_FS + TMP_PATH + "/predict"; // Set trainning data path conf.set(AngelConf.ANGEL_PREDICT_DATA_PATH, inputPath); // Set load model path conf.set(AngelConf.ANGEL_LOAD_MODEL_PATH, loadPath); // Set predict result path conf.set(AngelConf.ANGEL_PREDICT_PATH, predictPath); conf.set(AngelConf.ANGEL_ACTION_TYPE, MLConf.ANGEL_ML_PREDICT()); GraphRunner runner = new GraphRunner(); runner.predict(conf); } catch (Exception x) { LOG.error("run predictTest failed ", x); throw x; } } }
Search form Mises Daily The Unstoppable Rothbard When Murray N. Rothbard (born 1926) died on January 7, 1995, ten years ago this day, he merited a headlined obituary in the New York Times, and many other tributes in that first sad and shocking week. Later a book appeared, and also special issues of journals and tributes of every sort. His memorial service in New York brought together people who had their lives and minds touched by his brilliance and generosity over the last half-century. We sang the great old hymn, which was his favorite: Once to every man and nation,comes a moment to decide;In the strife of truth with falsehood,for the good or evil side. Rothbard chose the good, and never wavered. While he lived, many students and followers rightly saw in his thought the culmination of everything magnificent about the liberal intellectual tradition. He improved the tradition by attaching it firmly to private property and systematically showing that society can thrive without ever compromising that principle. He further eliminated the last vestiges of "social contract" theory from the liberal idea—among a hundred other enduring contributions. After his death, however, the question of his legacy was not only on the minds of his friends but also of his enemies. Rothbard's position in favor of universal rights, free trade, private property, peace, and decentralized legal institutions is consistent (once you have thought about it and understood it) but it still cuts across the state-supported grain of American political life, in which you are permitted to reject one form of statism only insofar and as you are willing to embrace another. And thus did his detractors on the left and right regard him as a dangerous corruptor of youth and a destabilizer of established political tradition. Even beyond his political influence, debates raged about his economic theories, his historiographic reconstructions, his philosophical innovations, and his political strategizing. Moderate classical liberals accused Rothbard of the same error of which Mises was accused: discrediting the principle of liberty by being so uncompromising and consistent in its application. Rothbard's enemies on all sides had hoped that his name and work would slip away into the darkness of the past, and the new generation would be spared what conservatives have long considered to be his anarchist poison, what left-liberals have considered his reactionary pro-capitalist fulminations, and what moderate liberals considered to be his baneful extremism. A recent academic paper, for example, grants that most "leaders of the modern libertarian movement" were once Rothbardians, but then claims, without a shred of evidence, that "Rothbard’s influence declined during his lifetime and after his death." As with painting, literature, and music, of course, it takes time to sort out the passing fads in intellectual life from the enduring classics. What would happen to Rothbard, also known in his lifetime as "The State's Greatest Living Enemy" and "Mr. Libertarian"? Would his intellectual legacy be mainly in the area of politics, and his demonstration of the moral and practical merits of the stateless society? Or would it be his economic contributions—his elucidation and extension of the Misesian paradigm—that would survive? Might he be mainly known as a historian of the Colonial period, an area in which specialists have long considered his four-volume history to be a masterful narrative treatment? Or was his reputation so closely connected to his famous personality—fiery and fierce as an intellectual yet warm and joyful as a man—that his name would fade after his death? After ten years, we have enough of a picture to say that Rothbard's influence lives and thrives not only as it did during his lifetime but ever more so. Those who hoped Rothbardianism would wane should be sorely disappointed, while those who have always appreciated his contributions should celebrate. What's more, that legacy covers every field in which he worked: economic theory and policy, American history, philosophy, and even political strategy or organizing. Everyone who has written about him ends up writing lists of research areas, book titles, subjects covered, contributions made. It is, as David Gordon once remarked, like writing about four or five of the greatest minds you have ever encountered except that they are all rolled into one person. And each of these scholars all wrapped up in one man has received vast discussion and notoriety since his death. Right now, the New York Timesbestseller list features a book on American history by Thomas Woods, whose studies on the Colonial Period, the Progressive Era, and the Great Depression, are based almost entirely on Rothbard's own. This book that has created such an intellectual storm is Rothbardian through and through. The same can be said of Thomas DiLorenzo's bestselling works. Among books from the academic world, the ten years since Rothbard's death has seen many new studies of his thought and works of history and economics based on his thought: Chris Sciabarra's Total Freedom, Hans Hoppe's Democracy: The God that Failed, Hunt Tooley's TheWestern Front, Robert Higgs's Against Leviathan, William Watkins' Reclaiming the American Revolution, among many others in print and in process. His books have taken on new life. Ethics of Liberty has come out in a new English edition and been translated into Spanish, Italian, German, French, Czech, and Chinese. Man, Economy, and State has appeared in Spanish and Chinese. His History of Economic Thought has appeared in Spanish. Just last week a beautiful Polish edition of For A New Liberty appeared in our offices. His articles appear in collections in French, Italian, and Russian. His Egalitarianism as a Revolt Against Nature has been reprinted and widely distributed, as has America's Great Depression (with a new introduction by Paul Johnson). By our rough count, a dozen new dissertations dealing with his thought have been written, and six additional ones based on his historical investigations. The Mises Institute put together A History of Money and Banking in the United States, which was built from articles obscure and unpublished. It now serves as an Austrian alternative to the Friedman monetary history. The Irrepressible Rothbard (ed. Rockwell) has appeared. Justin Raimondo has written a biography (Enemy of the State) that dispenses with many myths surrounding his life and work. The Scholars Edition of Man, Economy, and State is out, with its wonderful integration of Power and Market (which has been separately published in many languages) which had been excised from the original edition. The book has sold several times as many copies since his death as sold in the 30 years after its initial publication. It is now used in classrooms (graduate and undergraduate) around the world, including in China, where the translation (along with another of America's Great Depression) are good sellers. We have commissioned Study Guides on Man, Economy, and State, and organized and maintained a huge archive of material. We have worked to make available his work online in two archives, one at Mises.org and another at LewRockwell.com. Never-before published pieces, such as his critique of Karl Polanyi, have drawn the attention of Polanyi experts, who are amazed to discover such a penetrating analysis. His memo on Catholic social teaching, never before published, stunned experts within this field for its insight. Within some sectors of the left, he is known mainly as the expert on the political thought of Etienne de La Boetie, and among Burke scholars, Rothbard is known as the leading advocate of the literal interpretation of Burke's "Vindication of the Natural Society" (a piece still in play, though written in 1958!). Even short memos on particular topics are finding new publications outlets. Given how the blogosphere works, when Rothbard articles appear on this site, commentators treat them as if they were written yesterday, and react to them hotly and emotionally. Rothbard died just as his huge History of Economic Thought appeared. As a major reconstruction of the history of ideas, many aspects of his ideas have been debated and cited, including his revision of Adam Smith's contribution, his elucidation of Marxian theory, his revision of the British banking controversies, and his extended treatment of the preclassicals. The volumes were huge sellers even at the publisher's outrageously high price of $125 per volume (the Mises Institute is working toward a low-priced reprint). Agree or disagree with his interpretation, not one reviewer has suggested that his treatment of this subject is anything less than magisterial. Or consider scholarly citations. Given how such citations are used for academic logrolling and faculty placement, it is difficult to maintain a steady supply of such citations after a scholar has died. And there are certainly no academic points to be won by citing a radical thinker such as Rothbard in the mainstream journals. And yet, as measured by the Social Science Citation Index, Rothbard's number has not only not fallen; it has actually risen in the ten years following his death to be higher than in the last ten years of his life. (Most recent journals include Public Administration and Development, Zeitschrift Fur Soziologie, Papers in Regional Science, Georgetown Law Review, Journal of the Early Republic, Canadian Journal of Economics, Harvard Journal of Law and Public Policy, Economic Inquiry, History of Political Economy, etc. ) The same is true within JSTOR, Google Scholar, or any other index you can name. And who can even begin to sort through the 83,500 references to Murray Rothbard generated by a plain Google web search? Even a quick Google News generates a citation from Bloomberg and a denunciation at FrontPageMag, which is fitting because Rothbard wrote for the newspapers from his earliest student years until his death (his last article was an attack on Newt Gingrich as a statist sellout). This doesn't include the daily commentary on Mises.org (the #1 institutional economics site in the world) or LewRockwell.com (the #1 libertarian site in the world), both of which deal with Rothbardian thought nearly every day, or the many spinoff sites around the web. Then there are the teaching programs, such as the Mises University, for which there are far more qualified applications than can be accepted. It is essentially a Misesian-Rothbardian program of intensive education in all aspects of economic science. And there is the Austrian Scholars Conference, which features more than 60 new papers in a program format based entirely on a model pioneered by Rothbard. The Mises Institute has every incentive to work toward assuring Rothbard's place in the history of ideas. The journals he founded continue to break new ground, and his many students are hard at work defending and extending the Rothbardian paradigm. Even his strategic insights assist us daily in navigating complicated political terrain in which the main enemy shifts from leftist egalitarianism to rightist militarism and back again. He showed how to support liberty without compromise, whether it means opposing welfare or warfare, or defending the right not to be taxed or drafted. But the task of forging a legacy cannot be accomplished through publishing, commissioning, and promoting alone. A body of ideas must engage the minds of students and teachers, and intellectually curious people of all sorts. Promotional efforts cannot substitute for the compelling power of truth itself, as discerned by individual readers. For that reason, we knew that our job should consist not in promotion as such but merely using every means we had to make his thought available. The rest would take care of itself. That's how we looked at it, and we have not been disappointed. So much of our work, 'ours' in the broadest sense of the global Austro-libertarian movement, presupposes the corpus of Rothbard's work. And yet we have so much yet to do. Our Rothbard archive includes more letters than seem humanly possible to write in a lifetime. We have unpublished manuscripts. Many essays have fallen out of print and need to be brought back. As it is, we can barely keep up the publication schedule. We have put up many audio files, including short clips and long speeches, but there are many more that need to be uploaded. Students in the Rothbardian tradition need support. We need funds for training and for establishing an endowment and for providing research chairs. We won't accept government money, we won't work on contract for any special interest, and we cannot count on large corporate backing. Whatever success the Rothbardian perspective enjoys in the future will not be due to subsidies but to the power of truth. In the broadest and longest-run sense, libertarianism will win eventually because it and only it is compatible with the nature of man and of the world. Only liberty can achieve man's prosperity, fulfillment, and happiness. In short, libertarianism will win because it is true, because it is the correct policy for mankind, and truth will eventually out. . . . We now have that systematic theory; we come, fully armed with our knowledge, prepared to bring our message and to capture the imagination of all groups and strands in the population. All other theories and systems have clearly failed: socialism is in retreat everywhere . . . ; liberalism has bogged us down in a host of insoluble problems; conservatism has nothing to offer but sterile defense of the status quo. Liberty has never been fully tried in the modern world; libertarians now propose to fulfill the American dream and the world dream of liberty and prosperity for all mankind. And so, to dear Murray, our friend and mentor, the vice president of the Mises Institute, the scholar who gave us guidance and the gentleman who showed us how to find joy in confronting the enemy and advancing truth, the staff and scholars of the Institute offer this tribute, alongside the millions who have been drawn to his ideas. May his works always be available to all who care to learn about liberty and do their part to fight for the cornerstone of civilization itself. May his legacy endure forever and may we all become happy warriors for the cause of liberty. Follow Mises Institute Search Mises Daily Search this site What Is the Mises Daily The Mises Daily presents relevant short articles from the perspective of an unfettered free market and Austrian economics. Written for a broad audience of laymen and students, the Mises Daily features a wide variety of topics including everything from the history of the state, to international trade, to drug prohibition, and business cycles.
The Union Cabinet has approved the Companies (Second Amendment) Bill, 2019 to amend the Companies Act, 2013. This will enable the listing of Indian companies on stock exchanges in foreign jurisdictions. The listing of Indian companies in foreign stock exchanges is expected to increase the competitiveness of Indian companies in terms of access to capital, broader investor base and better valuations.The framework for enabling such listing under the foreign exchange and securities laws would be finalised by the Ministry of Finance in consultation with Ministry of Corporate Affairs, Reserve Bank of India and the Securities and Exchange Board of India. Briefing media yesterday, Finance Minister Nirmala Sitharaman said, the priority is to remove criminality under the Act and the Bill will further ease of living for law abiding corporates. She said, 72 changes brought in the Bill will lead to further declogging of the criminal justice system in the country. The Minister said, re-categorisation of 23 offences have been done in the new Bill. In another decision, the cabinet approved mega consolidation of ten Public Sector Banks into four with effect from 1st of next month. Ms Sitharaman said, the amalgamation will enable creation of digitally driven consolidated banks with global heft and business synergies.
Vila Oylmpa Turtle Neck Jumper, Black More Views In a thick black knitted fabric, Vila presents this stylish cropped sleeve jumper in black. A must have for this season with a chic turtle neck that will keep you warm. Team with the matching knit midi skirt or denims and boots for an awesome autumn style. Brand: Vila Style Name: Olympa ¾ Sleeve Top Style Code: 14036800 Colour: Black Sleeves: Cropped Sleeves Material: 76% Polyester 24% Nylon Wash Care: Machine Wash at 30°C Size & Fit Vila Size Guide Vila Clothes XXS XS S M L XL XXL Size 6 8 10 12 14 16 18 Delivery & Returns FREE delivery for purchases over €49 to Republic of Ireland, NI and UK. NEXT DAY DELIVERY to Republic of Ireland and Northern Ireland if ordered before 2pm Monday to Thursday. FREE RETURNS to Republic of Ireland and Northern Ireland. We do NOT offer FREE returns for sale reduced product. €4.95 postage charge for purchases less than €49 Rates for postage vary depending on country and item for customers living in Europe and Rest of World. Unfortunately we cannot ship liquid goods to customers living outside of Ireland and NI.
— I had been wondering if Trump was planning some sort of special closing argument. He did not disappoint. In my opinion, his final ad is the political ad of the year, if not the best ever. Watch it here first and I'll include my thoughts below. — http://www.youtube.com/...
Q: bloginfo url in javascript I'm trying to set <?php bloginfo('template_url'); ?> in a variable on Javascript, and then to set src of an img element, but in the html it's been printed as src="<?php bloginfo('template_url'); ?>" and not as the actually url. This is how I tried to do it: var wpTemplateUrl = "<?php bloginfo('template_url'); ?>"; primaryImg.src = wpTemplateUrl; A: Try using some API from WordPress itself - https://codex.wordpress.org/Function_Reference/wp_localize_script
Randy Blythe Interview: ‘I have to clear my name’ Randy Blythe Interview: ‘I have to clear my name’ RICHMOND, Va. (WTVR) – Randy Blythe spoke to reporters in the Czech Republic after his release, on bail, from prison Friday. In a video posted on Czech news website, Blythe said if he must return to Prague to face manslaughter charges in the 2010 death of a fan, he would do so. “I’m no flight risk. I’m an international touring artist. I have to clear my name. So yes, I will come back here if I’m called to court,” Blythe said. Blythe was detained when he and his band, Richmond-based Lamb of God, arrived in the Czech Republic for a concert in late June. Blythe said he was shocked to learn a fan had died after one of his concerts. “It is very tragic that a young man died, I feel very bad that a fan of my band is dead, that his family has to go through it, it’s terrible,” Blythe said. “That concert was one of literally thousands I’ve played. I certainly did not know anyone was hurt. When I showed up in Prague I was very surprised to be arrested. We had no knowledge whatsoever that someone had been injured, much less died.” Blythe is accused of fatally injuring that fan after he allegedly threw him off the stage. Blythe spent five weeks in custody despite paying almost half a million dollars in bail. The Czech judicial system–vastly different from the U.S. system–kept Blythe imprisoned as bail was denied several times by the prosecutor. “Prison is not exactly a fun place to be,” Blythe said. “I had three meals a day, a roof over my head and clothes on my back. I try to be grateful for what I have instead of what I don’t have. I read a lot, I wrote a lot, wrote some new songs and exercised in my cell.” Earlier Friday Lamb of God manager Larry Mazer told CBS 6 Blythe had been granted bail and was on his way home to Richmond.
Misc Studies (44) Pastors will benefit from the simplicity and exuberance conveyed throughout this book and expressed in the author`s opening statement: "There is nothing more awe-inspiring and more blessed than the service of pastorship." First published in Russia in the 1930s, this volume nevertheless retains the essence of pastoral work in ever-changing circumstances and cultures: the formation and eternal destiny of the human soul. The author passionately writes about this unchanging ministry, and his words remain refreshingly timely, especially in an era marked by temptations to follow material excess and success. In this present work, Father Jean Danielou provides us with a learned, yet readable treatment of the mission of the angels in the economy of salvation. He begins by following a historical order, dealing with the angels in the world before the Incarnation, during our Lord's earthly life, and presiding over the growth and development of the Church. We then have luminous chapters on the guardian angels, on the angels and the sacraments, the spiritual life, death and the second coming. Father Danielou's work is notable for its synthesis which it achieves between the teaching of the Church Fathers and later theological speculation on the angels. It fills a gap of long-standing in theological literature, and may be read with great profit by students and the general public alike. This volume, the third in a collection of sermons by Fr Alexander Schmemann, is on a topic that was particularly close to his heart: the Virgin Mary. The Theotokos, as Mary is usually referred to among the Orthodox, figures prominently in Byzantine liturgical worship. While no single service is without one or more references to her, Eastern Orthodox theological manuals have little to say about Mary beyond repeating the primarily Christological titles affirmed by the Third Ecumenical Council — Theotokos, Birthgiver of God.
BBC One is proud to announce the launch of The BBC 999 Awards. For the first time on television, the BBC will honour the heroes of Britain’s Emergency Services in an event that recognises the tireless work they do. Since the 999 emergency number came in to action 75 years ago, the Police, Fire and Rescue, Ambulance, Coastguard and Mountain Rescue services have saved millions of lives. The BBC 999 Awards aim to acknowledge the heroic acts that the officers and volunteers of the emergency services perform on a daily basis. Over the course of the evening, awards will be presented to members of each of the five emergency and rescue services and to specific teams and individuals whose actions exceed the call of duty to help save lives and ensure the public’s safety. Awards will be given to the most outstanding: The BBC 999 Awards will also honour select teams and individuals, with Special Recognition Awards aimed at people who have performed beyond the call of duty in exceptional circumstances. The BBC’s 999 Awards was commissioned by the corporation’s Executive Editor of Entertainment Commissioning, Mirella Breda, who said, “This just felt like a show that needed to be made. “It promises to be a night filled with dramatic, inspiring and heart-warming stories celebrating Britain’s real life heroes.”
ECMO criteria for influenza A (H1N1)-associated ARDS: role of transpulmonary pressure. To assess whether partitioning the elastance of the respiratory system (E (RS)) between lung (E (L)) and chest wall (E (CW)) elastance in order to target values of end-inspiratory transpulmonary pressure (PPLAT(L)) close to its upper physiological limit (25 cmH(2)O) may optimize oxygenation allowing conventional treatment in patients with influenza A (H1N1)-associated ARDS referred for extracorporeal membrane oxygenation (ECMO). Prospective data collection of patients with influenza A (H1N1)-associated ARDS referred for ECMO (October 2009-January 2010). Esophageal pressure was used to (a) partition respiratory mechanics between lung and chest wall, (b) titrate positive end-expiratory pressure (PEEP) to target the upper physiological limit of PPLAT(L) (25 cmH(2)O). Fourteen patients were referred for ECMO. In seven patients PPLAT(L) was 27.2 ± 1.2 cmH(2)O; all these patients underwent ECMO. In the other seven patients, PPLAT(L) was 16.6 ± 2.9 cmH(2)O. Raising PEEP (from 17.9 ± 1.2 to 22.3 ± 1.4 cmH(2)O, P = 0.0001) to approach the upper physiological limit of transpulmonary pressure (PPLAT(L) = 25.3 ± 1.7 cm H(2)O) improved oxygenation index (from 37.4 ± 3.7 to 16.5 ± 1.4, P = 0.0001) allowing patients to be treated with conventional ventilation. Abnormalities of chest wall mechanics may be present in some patients with influenza A (H1N1)-associated ARDS. These abnormalities may not be inferred from measurements of end-inspiratory plateau pressure of the respiratory system (PPLAT(RS)). In these patients, titrating PEEP to PPLAT(RS) may overestimate the incidence of hypoxemia refractory to conventional ventilation leading to inappropriate use of ECMO.
CUSTOM FINISHING For The Finishing Touches... Whether you're purchasing new furniture from us or simply looking to breath new life into an old piece, we have your solution! Restore your furniture to its most beautiful form by giving it the attention it deserves - and the care it needs. Services include:
Subcutaneous fat distribution of the abdomen and buttocks in Japanese women aged 20 to 58 years. Subcutaneous fat is an essential element in shaping the body of human beings. In this research, skinfold thickness was measured specifically in 33 regions of the human body, including the abdomen and buttocks. Based on our measurements, the subcutaneous fat distribution was assessed for several age groups. The subjects were healthy Japanese women aged 20 to 58 years. Skinfold thickness was measured using the B-mode ultrasound methods, together with anthropometric measurement. A comparison was made between the following five age groups: early 20's, late 20's, 30's, 40's and 50's. The measured values for the early 20's group were used as the standard and the relationship between increase ratio of subcutaneous fat and age was studied. Through our research, we obtained data on the subcutaneous fat distribution in each age group. The largest change was observed between the ages of the early 20's and late 20's. The skinfold thickness measurements of the abdomen and buttocks was consistently around 10 mm for the early 20's, and increased up to 23.8 mm on the rear side section for the late 20's. This result indicates that the increase ratio varied depending on the part of body. Furthermore, the changes in skinfold thickness were different in specific parts of the abdomen and buttocks among different age groups. The difference in skinfold thickness between upper and lower sections of the abdomen also becomes more pronounced with age. Skinfold thickness increased significantly between the early 20's and late 20's. Among the body regions, measurements at the rear side showed the largest change with age; averaging 11.3 mm for the early 20's compared to 33.6 mm for the 50's. The subcutaneous fat distribution on the buttock also showed the differences with age, indicating changes in body shape. Using careful measurements of the abdomen and buttocks, subcutaneous fat distribution among each age group was determined as well as the variation in changes with the aging process.
Drug policy in sport: hidden assumptions and inherent contradictions. This paper considers the assumptions underpinning the current drugs-in-sport policy arrangements. We examine the assumptions and contradictions inherent in the policy approach, paying particular attention to the evidence that supports different policy arrangements. We find that the current anti-doping policy of the World Anti-Doping Agency (WADA) contains inconsistencies and ambiguities. WADA's policy position is predicated upon four fundamental principles; first, the need for sport to set a good example; secondly, the necessity of ensuring a level playing field; thirdly, the responsibility to protect the health of athletes; and fourthly, the importance of preserving the integrity of sport. A review of the evidence, however, suggests that sport is a problematic institution when it comes to setting a good example for the rest of society. Neither is it clear that sport has an inherent or essential integrity that can only be sustained through regulation. Furthermore, it is doubtful that WADA's anti-doping policy is effective in maintaining a level playing field, or is the best means of protecting the health of athletes. The WADA anti-doping policy is based too heavily on principals of minimising drug use, and gives insufficient weight to the minimisation of drug-related harms. As a result drug-related harms are being poorly managed in sport. We argue that anti-doping policy in sport would benefit from placing greater emphasis on a harm minimisation model.
What is Transitional Year Programme? The Transitional Year Programme (TYP) is a full-time, eight-month access-to-University program. It is intended for adults who do not have the formal qualifications for university admission. Recent News We've moved to 123 St. George Street. (just south of St. George and Bloor). Making Excellence Accessible We actively encourage applications from members of the Native Canadian, African-Canadian, and LGBTQ communities, as well as from sole-support parents, persons with disabilities, and students from working-class backgrounds of all ethnicities. How to Apply There are 3 stages in the application process. Click here for a simplified overview and checklist breaking down each stage.
// progress_meter.cpp /* Copyright 2009 10gen Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "mongo/util/progress_meter.h" #include "mongo/pch.h" #include "mongo/db/jsobj.h" #include "mongo/util/log.h" using namespace std; namespace mongo { void ProgressMeter::reset( unsigned long long total , int secondsBetween , int checkInterval) { _total = total; _secondsBetween = secondsBetween; _checkInterval = checkInterval; _done = 0; _hits = 0; _lastTime = (int)time(0); _active = 1; } bool ProgressMeter::hit( int n ) { if ( ! _active ) { warning() << "hit an inactive ProgressMeter" << endl; return false; } _done += n; _hits++; if ( _hits % _checkInterval ) return false; int t = (int) time(0); if ( t - _lastTime < _secondsBetween ) return false; if ( _total > 0 ) { int per = (int)( ( (double)_done * 100.0 ) / (double)_total ); Nullstream& out = log(); if (_parent != NULL) { out << "\t\t" << treeString() << endl; } else { out << "\t\t" << _name << ": " << _done; if (_showTotal) { out << '/' << _total << '\t' << per << '%'; } if ( ! _units.empty() ) { out << "\t(" << _units << ")"; } out << endl; } } _lastTime = t; return true; } std::string ProgressMeter::toString() const { if ( ! _active ) return ""; std::stringstream buf; buf << _name << ": " << _done << '/' << _total << ' ' << (_done*100)/_total << '%'; if ( ! _units.empty() ) { buf << "\t(" << _units << ")" << endl; } return buf.str(); } void ProgressMeter::treeString(std::stringstream &ss) const { if (_parent == NULL) { ss << _name << ": "; } else { _parent->treeString(ss); ss << ", "; } ss << _done << "/" << _total << " " << std::fixed << std::setprecision(1) << (_done*100.0)/_total << "%"; if (!_units.empty()) { ss << " " << _units; } } std::string ProgressMeter::treeString() const { std::stringstream ss; treeString(ss); return ss.str(); } void ProgressMeter::appendInfo(BSONObjBuilder &b) const { b.append("name", _name); b.append("units", _units); b.append("done", _done); b.append("total", _total); } BufBuilder& ProgressMeter::treeObjForSubtree(BSONObjBuilder &b) const { if (_parent != NULL) { BSONObjBuilder sub(_parent->treeObjForSubtree(b)); appendInfo(sub); return sub.subobjStart("child"); } else { appendInfo(b); return b.subobjStart("child"); } } void ProgressMeter::treeObj(BSONObjBuilder &b) const { if (_parent != NULL) { BSONObjBuilder sub(_parent->treeObjForSubtree(b)); appendInfo(sub); } else { appendInfo(b); } } BSONObj ProgressMeter::treeObj() const { BSONObjBuilder b; treeObj(b); return b.obj(); } }
101 Cal.Rptr.2d 237 (2000) 84 Cal.App.4th 882 CITY OF VISTA, Plaintiff and Appellant, v. ROBERT THOMAS SECURITIES, INC., Defendant and Respondent. No. D034076. Court of Appeal, Fourth District, Division One. October 13, 2000. Rehearing Denied November 8, 2000. Review Denied January 24, 2001. *238 Duckor, Spradling & Metzger, Scott L. Metzger and Leslie Schwaebe Akins, San Diego, for Plaintiff and Appellant. Estes, Hoyt & Hansen, Joel C. Estes and Kevin J. Hoyt, San Diego, for Defendant and Respondent. O'ROURKE, J. The City of Vista (Vista) appeals the court's grant of summary judgment in favor of Robert Thomas Securities, Inc. (Robert Thomas). Vista contends (1) the court erred when it found the suit barred by the statute of limitations because there is a triable issue of fact as to when Vista sustained damage, and (2) the four-year statute of limitations applies. We agree there is a triable issue of fact as to when Vista sustained damage. FACTUAL AND PROCEDURAL HISTORY This suit stems from Vista's purchase of securities called interest-only strips. The holder of the interest-only strip is entitled to a certain percentage of the interest from a pool of bonds. When interest rates decline, debtors may prepay the bonds, which causes a reduction of the underlying pool of debt as well as the amount of interest paid to, the holder of the interest-only strip. In 1990, Vista purchased the two securities that are the subject of this action: Small Business Administration interest-only strip No. 366 (SBA 366) and Small Business Administration interest-only strip No. 533 (SBA 533) (collectively SBA strips). In February 1990, Vista purchased SBA 366 for $378,001.88 and in June, Vista purchased SBA 533 for $1,025,843.02. Vista is a municipal corporation, whose investments are restricted by Government Code Section 53601, as well as its own resolutions. Frank Edward Rowlen was Vista's treasurer at the time the SBA strips were purchased. By September 6, 1990, Rowlen decided the SBA strips were not a proper investment for Vista and asked Phillip M. Lewis, the Robert Thomas broker from whom Vista purchased the securities, to return the money Vista had paid for the securities. In a September 24, 1990 letter to Lewis, Rowlen stated he was uncomfortable with the "interest rate risk, speculative nature and risk features" of the SBA strips, which were not appropriate securities for Vista. Rowlen's October 1 letter to Lewis explained the SBA strips violated Vista's investment policies. On October 25, 1990, Rowlen wrote to Steven Putnam, the president of Robert Thomas, asking his help in rescinding the trades due to Lewis's misrepresentation of the nature of the securities. On October 18, 1991, Rowlen wrote a letter to another dealer demanding restitution for SBA 533 and stating: "Our analysis of this transaction indicates that due to the number of dealers involved with this trade, of which you were a part, that price collusion existed among securities dealers in a direct attempt to defraud the City of Vista." Rowlen testified that by price collusion, he meant each of the broker-dealers involved in SBA 533 charged a mark-up. Rowlen also testified that in October 1991 he still believed the interest from the SBA strips would be at least equal to the amount paid for the SBA strips. He also believed the brokerage firms would give him restitution. *239 Putnam testified he believed the markup Vista paid was excessive. He qualified this opinion by adding "I don't know any of the rationale for the price that was paid, so it is difficult for me to judge ...." Vista received monthly interest payments on SBA 366 into 1993 and on SBA 533 into 1998. Jack Heilbron, a broker-dealer and registered investment advisor, declared one cannot determine how much interest will be received from an interest-only strip until close to the time the last interest payment is received. Based upon his review of the interest payments Vista received, Heilbron declared it was not possible to determine whether Vista would lose money on SBA 533 until 1994. Vista filed its complaint on November 17, 1995 against a number of broker-dealers and individual defendants. Against the broker-dealers, Vista alleged causes of action for intentional misrepresentation and fraudulent concealment; constructive fraud; breach of fiduciary duty; negligent misrepresentation; violation of California Corporations Code sections 25401, 25501, and 25504; professional negligence; breach of the implied covenant of good faith and fair dealing; money had and received; and ultra vires. The court granted Robert Thomas's motion for summary judgment, finding the relevant statutes of limitations had run prior to the filing of the complaint. The court found there was no triable issue of fact that (1) Vista had discovered the investments were improper by September 6, 1990 and (2) Vista knew it had suffered pecuniary damage by October 18, 1991. DISCUSSION I. Standard of Review Summary judgment is granted when there is no triable issue as to any material fact and the moving party is entitled to judgment as a matter of law. (Code Civ.Proc., § 437c, subd. (e).) We review de novo the trial court's decision to grant summary judgment. (Hersant v. Department of Social Services (1997) 57 Cal.App.4th 997, 1001, 67 Cal.Rptr.2d 483.) In reviewing a motion for summary judgment, we accept as undisputed fact only those portions of the moving party's evidence that are uncontradicted by the opposing party. (Ibid.) That is, we strictly construe the moving party's evidence and liberally construe the opposing party's evidence. (Binder v. Aetna Life Ins. Co. (1999) 75 Cal.App.4th 832, 838, 89 Cal. Rptr.2d 540.) We do so by accepting as true the facts alleged in the evidence of the party opposing summary judgment and the reasonable inferences that can be drawn from them. (Soda v. Robert F. Kennedy Medical Center (1997) 56 Cal. App.4th 138, 148, 65 Cal.Rptr.2d 112.) II. Statute of Limitations Civil actions can be commenced within the period prescribed by the statute of limitations "after the cause of action shall have accrued." (Code Civ.Proc. § 312; United States Liab. Ins. Co. v. Haidinger-Hayes, Inc. (1970) 1 Cal.3d 586, 596, 83 Cal.Rptr. 418, 463 P.2d 770.) When damages are an element of a cause of action, the cause of action does not accrue until the damages have been sustained. (United States Liab. Ins. Co. v. Haidinger-Hayes, Inc., supra, 1 Cal.3d at p. 597, 83 Cal.Rptr. 418, 463 P.2d 770.) "Mere threat of future harm, not yet realized, is not enough." (Ibid.) "Basic public policy is best served by recognizing that damage is necessary to mature such a cause of action." (Ibid.) Therefore, when the wrongful act does not result in immediate damage, "the cause of action does not accrue prior to the maturation of perceptible harm." (Ibid; see also Walker v. Pacific Indemnity Co. (1960) 183 Cal.App.2d 513, 517, 6 Cal.Rptr. 924 ["It is clear that mere possibility, or even probability, that an event causing damage will result from a wrongful act does not render the act actionable"].) Damage is an element of many of the causes of action Vista pled: intentional *240 misrepresentation and fraud (Alliance Mortgage Co. v. Rothwell (1995) 10 Cal.4th 1226, 1239, 44 Cal.Rptr.2d 352, 900 P.2d 601); negligent misrepresentation (id. at p. 1239, fn. 4, 44 Cal.Rptr.2d 352, 900 P.2d 601); breach of fiduciary duty (City of Atascadero v. Merrill Lynch, Pierce, Fenner & Smith, Inc. (1998) 68 Cal.App.4th 445, 483, 80 Cal.Rptr.2d 329); negligence (United States Liab. Ins. Co. v. Haidinger-Hayes, Inc., supra, 1 Cal.3d at p. 597, 83 Cal.Rptr. 418, 463 P.2d 770); and breach of the implied covenants of good faith and fair dealing (Vu v. California Commerce Club, Inc. (1997) 58 Cal.App.4th 229, 233, 68 Cal.Rptr.2d 31). The resulting damage must be "actual monetary loss." (Alliance Mortgage Co. v. Rothwell, supra, 10 Cal.4th at p. 1240, 44 Cal. Rptr.2d 352, 900 P.2d 601 [fraud].) III. Triable Issue of Fact There is a triable issue of fact as to when Vista suffered monetary loss. Jack Heilbron, a registered investment advisor, declared "it is generally impossible to know the ultimate outcome of the SBA IO strip package investment until near the last interest payment received." Vista received interest payments into 1993 on SBA 366 and into 1998 on SBA 533. Based on his review of these interest payments, Heilbron declared Vista had not suffered any damage on the SBA 533 investment until 1994. The court found Vista knew it had suffered pecuniary damage by October 18, 1991, when Rowlen wrote the letter stating there had been price collusion among the broker-dealers involved in SBA 533. In the letter Rowlen did not explain what he meant by price collusion. Rowlen later testified he meant his research showed SBA 533 had passed through a number of broker-dealers, each of which had charged a markup, resulting in an excessive markup. There is a triable issue of fact as to whether the markup was excessive because Putnam qualified his opinion by stating he did not know "the rationale for the price that was paid, so it is difficult for me to judge ...." Further, even if Vista believed it had been charged an excessive markup for SBA 533, Vista would not have suffered damage had it received interest payments sufficient to cover its initial payment and provide a reasonable return. In fact, Rowlen testified that in October 1991, he expected the interest payments to offset the price Vista paid for SBA 366 and SBA 533. Therefore there is a triable issue of fact as to whether Vista had suffered pecuniary damage by October 18, 1991. Robert Thomas contends it "strains credulity" that the SBA strips had not dropped in value prior to 1994 because the other two SBA strips were sold at a loss[1] and because the SBA strips were not guaranteed by the federal government. However, Robert Thomas has presented no evidence as to the value of the SBA strips at any point in time. Robert Thomas also contends Vista suffered damage the instant it purchased the SBA strips because Vista could not legally own those securities under Government Code section 53601. Further, the gravamen of Vista's complaint is that the purchase of the SBA strips "changed the complexion of [Vista's] investment portfolio from being a conservatively managed portfolio of investments which met [Vista's] policy, to one filled with inappropriate investments that were traded on a speculative basis." Robert Thomas analogizes to Twomey v. Mitchum, Jones & Templeton, Inc. (1968) 262 Cal.App.2d 690, 727, 69 Cal.Rptr. 222 (Twomey), where the court stated "the gravamen of [the plaintiffs] complaint is that by virtue of the churning and the purchase of unsuitable stocks she was left with an improper portfolio ...." Twomey does not govern this case because *241 the issue in Twomey was when the plaintiff discovered her damage; the court did not discuss when the damage occurred. Further, the Twomey action was for churning. In an action for churning, the essence of the action is to recover the fees associated with excess trading, whether or not the portfolio gained or lost income. (Nesbit v. McNeil (9th Cir.1990) 896 F.2d 380, overruled on other grounds by Lampf, Plena, Lipkind, Prupis & Petigrow v. Gilbertson (1991) 501 U.S. 350, 111 S.Ct. 2773, 115 L.Ed.2d 321.) In contrast, Vista's action is for fraud and breach of fiduciary duty; there is no claim of churning. In a fraud cause of action, damage is defined as "actual monetary loss." (Alliance Mortgage Co. v. Rothwell, supra, 10 Cal.4th at p. 1240, 44 Cal.Rptr.2d 352, 900 P.2d 601.) Robert Thomas also contends that because Vista had the right to rescind the contract as soon as it learned of the fraud, Vista should not be allowed to wait to sue until it incurred damage. Robert Thomas relies upon Griffin v. Payne (1933) 133 Cal.App. 363, 24 P.2d 370 (Griffin), where we held that a customer who was notified of a stock trade and did nothing could not later sue when he lost money on the stock. We reasoned that "`where there remains with the principal, after his complete knowledge of the transaction, the power to rescind, and he fails to do so he is properly charged with the full acceptance of all the responsibilities of the contract, even to the exoneration of his agent, because with the ability to rescind, if he had rescinded, the transaction would be at an end and no one would be injured.' [Citation.]" (Id. at p. 373-374, 24 P.2d 370.) As the full quotation makes clear, Griffin relies upon a principal's ratification of an agent's action. Griffin does not govern this case, where the broker "fail[s] to make a full disclosure of the facts surrounding the [security] transactions." (Weiner v. Mullaney (1943) 59 Cal.App.2d 620, 637, 140 P.2d 704 [distinguishing Griffin in a breach of fiduciary duty case].) Vista has the right to elect its remedy: "When a party learns that he has been defrauded, he may, instead of rescinding, elect to stand on the contract and sue for damages, and in such case his continued performance of the agreement does not constitute a waiver of his action for damages." (Bagdasarian v. Gragnon (1948) 31 Cal.2d 744, 750, 192 P.2d 935.) In this case, Vista elected to sue for fraud instead of rescission. IV. The Four-Year Statute of Limitations Vista contends the four-year statute of limitations applies to its causes of action for breach of fiduciary duty and breach of the implied covenant of good faith and fair dealing. The statute of limitations that applies to an action is governed by the gravamen of the complaint, not the cause of action pled. (Wyatt v. Union Mortgage Co. (1979) 24 Cal.3d 773, 786, fn. 2, 157 Cal.Rptr. 392, 598 P.2d 45.) The gravamen of Vista's complaint is that Robert Thomas's acts constituted actual or constructive fraud. The applicable statute of limitations for fraud is three years. (Code Civ.Proc. § 338, subd. (d).) Therefore, the court did not err in holding the statute of limitations is three years. DISPOSITION The judgment is reversed. Respondent to bear costs on appeal. WORK, Acting P.J., and HALLER, J., concur. NOTES [1] Robert Thomas relies upon Vista's attorney's statement that Vista lost money on the two SBA strips that were sold. However, Rowlen's October 4, 1990 letter states one of the SBA strips was sold at the price at which Vista purchased it.
What Is Sclerotherapy? Sclerotherapy is a procedure used to treat blood vessels or blood vessel malformations (vascular malformations) and also those of the lymphatic system. A medicine is injected into the vessels, which makes them shrink. It is used for children and young adults with vascular or lymphatic malformations. In adults, sclerotherapy is often used to treat varicose veins and hemorrhoids. Sclerotherapy has been used in the treatment of varicose veins for over 150 years. Like varicose vein surgery, sclerotherapy techniques have evolved during that time. Modern techniques including ultrasonographic guidance and foam sclerotherapy are the latest developments in this evolution. The first reported attempt at sclerotherapy was by D Zollikofer in Switzerland, 1682 who injected an acid into a vein to induce thrombus formation. Both Debout and Cassaignaic reported success in treating varicose veins by injecting perchlorate of iron in 1853. Desgranges in 1854 cured 16 cases of varicose veins by injecting iodine and tannin into the veins. This was approximately 12 years after the probable advent of great saphenous vein stripping in 1844 by Madelung. However, due to high rates of side-effects with the drugs used at the time, sclerotherapy had been practically abandoned by 1894. With the improvements in surgical techniques and anesthetics over that time, stripping became the treatment of choice. George Fegan in the 1960s reported treating over 13,000 patients with sclerotherapy, significantly advancing the technique by focussing on fibrosis of the vein rather than thrombosis, concentrating on controlling significant points of reflux, and emphasizing the importance of compression of the treated leg. The procedure became medically accepted in mainland Europe during that time. However it was poorly understood or accepted in England or the United States, a situation that continues to this day amongst some sections of the medical community. The next major development in the evolution of sclerotherapy was the advent of duplex ultrasonography in the 1980s and its incorporation into the practice of sclerotherapy later that decade. Knight was an early advocate of this new procedure and presented it at several conferences in Europe and the United States. The work of Cabrera and Monfreaux in utilizing foam sclerotherapy along with Tessari's "3-way tap method" of foam production further revolutionized the treatment of larger varicose veins with sclerotherapy.
Absolute testing of the reference surface of a Fizeau interferometer through even/odd decompositions. Absolute testing of spherical surfaces is a technological necessity because of increased accuracy requirements. In a Fizeau setup, the main part of the interferometer deviations thereby comes from the reference surface. We demonstrate the validity of an absolute testing procedure for the reference surface that has been proposed earlier. The procedure relies on the decomposition of the surface deviations into odd and even parts and could be used in partially coherent illumination. The odd deviations are obtained from a basic and a 180 degree-rotated position of an auxiliary sphere, and the even deviations can be measured with the help of a cat's eye position in double pass using an opaque half screen in the interferometer aperture.
Download Audio Alaska Fish and Game is stepping up its research on bats in Southeast. The nocturnal, bug-eating animal is being threatened in the Lower 48 by a disease called White-Nose Syndrome. That’s prompting Alaska researchers to find out which bats live here and where they roost. But they can’t do all the work by themselves, so they’re enlisting the public’s help. “That’s bats! That’s it! Isn’t that cool?” Pam Randles said, as the sound of bats came through the speakers. The sun has just set, and she is driving her car 20 miles per hour along the Chilkoot River. “You drive along very slowly and you keep a steady pace and all of a sudden chitter, chitter chitter and it’s like, whoa! It worked! You really can hear them!” Randles said. Now, the human ear can’t hear bat sounds. So Randles’ car has been turned into a bat mobile. There’s an ultrasonic microphone attached to the top of the car, and a little box inside that records the bat calls. A GPS pinpoints the location of the sounds. Michael Kohan is a biologist with Fish and Game and one of the researchers on the bat study. “I mean, it’s a huge project,” Kohan said. “We couldn’t do it without citizen scientists.” The research started in 2011. But last year, they ramped up their efforts by getting citizen scientists involved in acoustic driving surveys. “Anybody can go out and record bat calls,” Kohan said. “So at night, 45 minutes after sunset, we have a certain route where we’re interested in seeing what bat species are on that route and where are they are. And people will go out and record bat calls as they drive.” Kohan says last summer the surveys were hugely successful in the first two communities – Haines and Gustavus. 30 volunteers participated. This summer, Kohan is expanding the program to Juneau, Craig, Petersburg, Wrangell and Sitka. In Haines, the library has a sign-up sheet for the bat detectors. But when the people collecting data are not scientists, can you trust them? “The way that our research project is orientated is we’re asking specific information from citizen scientists that provides no room for failure,” Kohan said. You just put the microphone on your car, turn on the microphone and GPS, and drive. Kohan says they’ve identified four bat species in Haines and Gustavus. They include the silver-haired bats, little brown bats and California bats. Getting a sense of bat activity here gives scientists a baseline in case the disease White-Nose Syndrome spreads to Alaska. Since 2006, scientists estimate 80 percent of the bat population in the Northeastern U.S. died from White-Nose Syndrome. “It is a threat to bats right now, a big threat to bats. And so scientists as a whole are trying to come up with a way to monitor the population of bats on a North America-wide effort,” Kohan said. “And so that’s why these driving surveys and the stationary detectors are useful. We can use the information and sent it to this huge database to be able to monitor bat populations.” So, scientists are clearly concerned about bats. But how do you make the average person care about them? “I try to incorporate the importance of bats in the way that bats can eat mosquitoes, Kohan said. “So they’re voracious mosquito eaters. A single little brown bat which is the size of your thumb can eat 1,000 mosquitos in an hour.” Apparently that pitch has worked. The success of this citizen science project is prompting Fish and Game to expand public involvement. Next summer, they’re hoping to use citizen scientists in amphibian research. Back in the bat mobile with Randles, it’s been a fairly quiet night. We’ve heard about five bat calls between Chilkoot Lake and end of Mud Bay Road. Randles says before this, she wasn’t a big fan of bats. But her perspective has changed. “Then when I come out here to study these guys, all of a sudden I’m not hating bats for no reason,” Randles said. “I have a better appreciation for what they do, how they fit into the system and what the benefits of having them around are.” And besides, she says, they’re just so cute-sounding.
defmodule SimpleBayes.Classifier.Model.Bernoulli do def probability_of(category, categories_map, data) do cat_trainings = data.categories[category][:trainings] denominator_base = cat_trainings + 2 numerator = cat_trainings * category_numerator(category, denominator_base, categories_map, data) denominator = data.trainings * Math.pow(denominator_base, Kernel.map_size(data.tokens)) {result, _} = Decimal.div(Decimal.new(numerator), Decimal.new(denominator)) |> Decimal.to_string() |> Float.parse() result end defp category_numerator(category, denominator_base, categories_map, data) do Enum.reduce(data.tokens, 1, fn ({token, _}, acc) -> token_in_trainings = data.tokens_per_training |> Enum.filter(fn ({{cat, cat_tokens_map}, _}) -> cat == category && Map.has_key?(cat_tokens_map, token) end) |> Enum.count() value = if Map.has_key?(categories_map, token) do token_in_trainings + 1 else denominator_base - (token_in_trainings + 1) end value * acc end) end end
1415*i**3 - 15*i**2 - 6*i. Determine -3*w(t) - 7075*x(t). -1415*t**3 Let b be (-2)/(8/(-28)) - -16. Suppose b*a - 22*a = 2*k + 7, 4*a = -2*k - 22. Let i(p) = -p**3 - p**2 - 3. Let r(v) = -2*v**2 - 2. What is a*r(x) + 2*i(x)? -2*x**3 + 4*x**2 Let s(x) = x**3 - x - 1. Let o be 3/(16 - 670/42). Let a(j) = -12*j**3 + 21*j + 21. Calculate o*s(t) + 3*a(t). 27*t**3 Let c(q) = 2*q**2 + 4*q + 2. Suppose -55*t + 504 = 71*t. Let m(j) = 4*j**2 + 7*j + 3. Determine t*m(b) - 7*c(b). 2*b**2 - 2 Let b(y) be the first derivative of 11*y**2/2 - 3*y + 4586. Let z(c) = 22*c - 7. Give 5*b(p) - 2*z(p). 11*p - 1 Let b = -24 + 24. Suppose b = -3*j - 3*j + 48. Let x(g) = -92 + 174 - g - 83. Let y(w) = -2*w - 2. Calculate j*x(l) - 3*y(l). -2*l - 2 Let u(t) = 11*t - 237. Let c(n) = 40*n - 710. Calculate 2*c(x) - 7*u(x). 3*x + 239 Suppose 3*j + 5*j - 88 = 0. Let x(o) = -39*o**2 + 46*o**2 - 4*o - 5*o - 4 + j. Let d(r) = 1 + 4*r**2 + 3 - 4*r - r + 0. Calculate 5*d(u) - 3*x(u). -u**2 + 2*u - 1 Let y(v) = 6174*v + 30. Let d(q) = -9261*q - 42. Determine 5*d(k) + 7*y(k). -3087*k Let r(o) = -6*o**3 - 20*o**2 - 7*o - 3. Let i(n) = 2*n**3 + 7*n**2 + 2*n + 1. Let x(z) = -16*z**2 - 561*z + 542. Let q be x(-36). Calculate q*r(t) + 7*i(t). 2*t**3 + 9*t**2 + 1 Let a(j) = -j**2 + 6. Let b(m) = 7*m - 13 + m**2 - m - 37*m + 31*m. Calculate -5*a(v) - 3*b(v). 2*v**2 + 9 Let p = -11506 + 11508. Let s(c) = 2*c**3 - 2*c**2 + 2*c. Let h(r) = -r**2 + r. Determine p*h(b) - s(b). -2*b**3 Let q(u) = -2*u**2 - 3*u + 7. Let g(f) = 3*f**2 + 3347 - 1677 - 1680 + 5*f. Let w = -24 + 17. Give w*q(z) - 5*g(z). -z**2 - 4*z + 1 Let k(b) = -7*b**2 - 97*b + 444. Let x be k(4). Let o(t) = -14*t - 5. Let g(d) = -154*d - 56. Give x*o(j) + 5*g(j). 14*j Let x(a) = -35*a + 5 + 15*a**3 + 35*a - 8 + 41*a**3. Let i(z) = 3640*z**3 - 196. Determine 3*i(w) - 196*x(w). -56*w**3 Let w(r) = 194*r**3 + 3*r**2 - 233*r - 6. Let g(v) = 193*v**3 + 4*v**2 - 279*v - 7. What is 5*g(y) - 6*w(y)? -199*y**3 + 2*y**2 + 3*y + 1 Let b(w) = 30*w**2 + 59*w + 8. Let r(v) = 35*v**2 + 58*v + 10. Calculate -10*b(z) + 8*r(z). -20*z**2 - 126*z Let n(d) = 13477*d + 2. Let o(f) = -126549061*f - 18781. Give 18781*n(t) + 2*o(t). 13415*t Let y(w) = 984293602*w**2 - 171915*w - 859575. Let x(d) = 11451*d**2 - 2*d - 10. Give 171915*x(o) - 2*y(o). 11461*o**2 Let o(p) = p**2 + p - 1. Let d = -165 + 168. Let g(r) = -11*r**2 + d*r**2 + 7*r**2 + 2 - 2*r. What is 3*g(c) + 6*o(c)? 3*c**2 Let h be ((-245)/(-2695))/(2/154). Let z(l) = -5*l**2 + 5*l. Let c(s) = 10*s**2 - 9*s + 1. Determine h*z(d) + 4*c(d). 5*d**2 - d + 4 Let p(v) = 2*v - 24. Let d(c) = -15*c + 580. Let f be d(39). Let z(q) = -2*q + 23. Calculate f*p(m) - 6*z(m). 2*m - 18 Let i(f) be the first derivative of f**3/3 + f - 71. Let m(c) = 5*c**3 - 20*c**2 - 20. Suppose -23 + 45 = 22*p. Calculate p*m(o) + 20*i(o). 5*o**3 Let m(z) = 4*z**2 - 3*z - 3. Let i = 14 + -8. Let q(v) be the second derivative of 7*v**4/3 - 10*v**3/3 - 10*v**2 - 16378*v. What is i*q(d) - 40*m(d)? 8*d**2 Let o(l) = 3*l**2 - 9*l + 4. Suppose -5*x = 174 - 184. Suppose -12 = -4*v + x*j, 0 = -2*v + 3*j + j - 6. Let s(i) = -i**2 + 4*i - 2. Calculate v*s(r) + 2*o(r). r**2 + 2*r - 2 Let q(l) = 8*l**2 + 6*l - 4. Let c(u) = -2*u**2 + u - 2*u + u**2 + 1. Suppose -t + 8*t + 142 - 289 + 140 = 0. Calculate t*q(k) + 5*c(k). 3*k**2 + k + 1 Let o(c) = -46*c**2 + 28*c + 16802. Let f(v) = -13*v**2 + 8*v + 5601. Calculate 7*f(d) - 2*o(d). d**2 + 5603 Let m(o) = 241 + 207 - 461 - 13*o**2. Let h(g) = g**3 + g**2 + 1. Give -26*h(a) - 2*m(a). -26*a**3 Let k(d) = 3151*d**3 - 8*d**2 - 20*d + 4. Let x(b) = 970508*b**3 - 2466*b**2 - 6165*b + 1233. Calculate 1233*k(o) - 4*x(o). 3151*o**3 Let q(l) = 5849 + 5851 - 11688 + 11*l. Let w(z) = -4*z - 4. Give -3*q(m) - 8*w(m). -m - 4 Let o(l) = l**3 - 2*l**2 - 293*l - 1. Let r(z) = -z**3 + z**2 + z. Determine -o(t) - 2*r(t). t**3 + 291*t + 1 Let d(m) be the third derivative of -m**4/12 + 2*m**3/3 + m**2. Let j(k) = 4*k - 7. Let c be (100/(-120))/(1/6). Determine c*d(i) - 3*j(i). -2*i + 1 Let a(n) = -6*n + 6. Let w(u) = 0 - 5*u + 4*u + 1. Suppose 298*v = 639*v - 91*v + 750. Calculate v*a(y) + 16*w(y). 2*y - 2 Let d(f) = f - 11. Let v be d(6). Let b(p) = -p**3 - 18*p**2 - 76*p + 7. Let x be b(-11). Let y(u) = 2*u + 1. Let w(z) = -2*z - 1. What is v*w(g) + x*y(g)? 2*g + 1 Let w(d) = -1365*d + 5. Let j(b) = -229*b + 1. What is 25*j(i) - 4*w(i)? -265*i + 5 Let l = -61 + 66. Let b(y) = 17*y + 8. Let a(j) = 9*j + 5. Let z(v) = l*a(v) - 3*b(v). Let m(d) = -d + 1. Calculate -3*m(p) + z(p). -3*p - 2 Suppose 5*s - 3*s = -8. Let d be 21/14*3/(-6)*s. Let k be 0 + 0 + (-1 - 0). Let g(j) = 4*j + 3. Let u(q) = 1. Give d*u(l) + k*g(l). -4*l Suppose -2*m - 5*o - 6 = 0, o = -2*o - 6. Let q(g) = g**3 + g**m - g**2 + 3*g**3. Let a = 1916 + -1910. Let l(j) = j**3. Determine a*q(t) - 22*l(t). 2*t**3 Let j(t) = 1343*t - 2. Let m(x) = 1349*x - 3. What is 4*j(w) - 3*m(w)? 1325*w + 1 Let l(p) = 2*p**3 - 6*p**2 - 6*p + 7. Let a(d) = -4*d**3 + d**2 + 6*d - 15. Let f(q) = -2*q**2 - q. Let z(r) = a(r) - 5*f(r). What is 11*l(s) + 6*z(s)? -2*s**3 - 13 Let m(i) = -76*i**3 + 57*i**2 + 57*i. Let w(o) = 3*o - 5*o + 0*o**3 + o**3 + 252400*o**2 - 252401*o**2 + o. Calculate -4*m(g) - 228*w(g). 76*g**3 Let r(y) = -2*y**3 - 27*y**2 + 18*y + 55. Let a be r(-14). Let p(c) = -1. Let h(x) = 0 - 8 - 4*x + 0*x. Determine a*h(g) + 8*p(g). 4*g Let d(b) be the third derivative of -b**5/12 - 5*b**4/12 - 5*b**3/3 - 4*b**2 - 120. Let a = 8 + -7. Let p(y) = -y**2 - y - 1. What is a*d(o) - 10*p(o)? 5*o**2 Let m(w) = 3*w + 7. Suppose 265*z - 340 - 14 = 176. Let u(o) = -6*o - 15. What is z*u(l) + 5*m(l)? 3*l + 5 Let y(d) = -3*d + 10. Let m(s) = -4*s + 11. Suppose a + 15 = 4*a. Let x = 10730 + -10736. What is a*m(c) + x*y(c)? -2*c - 5 Let a(w) = 645*w**3 - 53*w**2. Let p(s) = -323*s**3 + 29*s**2. What is 6*a(u) + 11*p(u)? 317*u**3 + u**2 Let a(f) be the second derivative of -1/2*f**3 + 121*f - 3/2*f**2 - 1/6*f**4 + 0. Let b(h) = -2*h**2 - 2*h - 2. Determine -4*a(o) + 5*b(o). -2*o**2 + 2*o + 2 Let q(i) = 2*i**3 + 5*i**2 - 6. Let b(j) = -j**3 + 15. What is 4*b(l) + q(l)? -2*l**3 + 5*l**2 + 54 Let i(s) be the second derivative of s**4/4 - 41*s**3/6 + 5*s**2/2 - 9333*s. Let y(f) = f**2 - 21*f + 2. What is -3*i(m) + 7*y(m)? -2*m**2 - 24*m - 1 Let q(r) = 224*r. Let u = -885 + 891. Let i(s) = 14*s. Determine u*q(o) - 98*i(o). -28*o Let s(d) be the first derivative of -3*d**4/4 - 3*d**3 - 2*d + 2605. Let i(a) = 2*a**3 + 5*a**2 + 1. Determine -5*i(j) - 3*s(j). -j**3 + 2*j**2 + 1 Let s(h) = -33*h - 6. Let i(n) = 2*n**2 - 46*n + 210. Let m be i(17). Let x(r) = -660*r - 121. Give m*x(g) - 121*s(g). 33*g Suppose -5*r - 12 = 28. Let z(h) = 1779 + 7*h - 3564 + 1788 - h. Let k(i) = 2*i + 1. What is r*k(f) + 3*z(f)? 2*f + 1 Let z(j) = 5*j**3 + 4*j - 8. Suppose -5*b + 2*n - 20 = 0, 8 = -2*b + 20*n - 18*n. Let d(v) = 4*v**3 + 3*v - 8. Give b*d(q) + 3*z(q). -q**3 + 8 Let y(h) = h**2 - 5. Let r(k) = 1. Suppose -15 = -0*j - 4*j + 3*w, j + 3*w + 15 = 0. Suppose -x - 4 = 0, -5*l + l + 4*x + 4 = j. Calculate l*y(g) - 15*r(g). -3*g**2 Let z(w) = 3*w - 4. Let x(b) = 1 - 2*b - 1 + 3. Suppose 5*k - 15 = 0, -17*q + 4*k = -22*q - 28. Determine q*x(s) - 5*z(s). s - 4 Let n(v) = -4*v + 1. Let q(l) = l. Suppose -p + 8 = 2*t, 0 = -3*t + 2*t + 5*p - 7. Suppose -7 = u - 5*u - 5*f, 9 = 2*u - t*f. Calculate u*q(s) + n(s). -s + 1 Let p(d) = 124*d**3 - 5*d**2 + 8*d + 8. Let t(q) = 249*q**3 - 11*q**2 + 19*q + 18. Calculate 9*p(m) - 4*t(m). 120*m**3 - m**2 - 4*m Let r(x) = 17*x**2 - 18*x + 6. Let z(v) = -2*v + 2. Calculate -r(n) + 3*z(n). -17*n**2 + 12*n Let v(n) = 485*n + 56. Let z(j) = 969*j + 140. What is -5*v(r) + 2*z(r)? -487*r Let y(r) be the first derivative of 7*r**3/3 + 7*r**2/2 - 5*r + 4287. Let m(v) = 6*v**2 + 7*v - 4. Determine 5*m(z) - 4*y(z). 2*z**2 + 7*z Let v = 83 + -81. Let m(d) = 0*d**v + 4*d**2 - 18*d + 31*d + 2 + 17*d**3 + 13. Let b(q) = 8*q**3 + 2*q**2 + 6*q + 7. Determine 13*b(r) - 6*m(r). 2*r**3 + 2*r**2 + 1 Let w(k) = -k**3 - 14*k**2 - 32*k - 89. Let h be w(-12). Let j(u) = 5*u - 5. Let y(v) = 6*v - 6. Determine h*j(z) - 6*y(z). -z + 1 Let d(q) = 4*q - 5. Let w(y) = -22*y - 171. Give -4*d(l) - w(l). 6*l + 191 Let d(w) = w**2 - 157*w + 10. Let c(m) = 2*m + 8. Determine -2*c(u) - d(u). -u*
Introduction {#sec1-1} ============ An electrocardiograph (ECG) is a machine used to measure electrical activity of the heart to evaluate heart rate (HR) and rhythm, conduction, and mean electrical axis (MEA) \[[@ref1]\]. It is a widely used non-invasive tool to determine cardiac arrhythmias, conduction disturbances, and heart morphology in many domestic animals \[[@ref2]-[@ref6]\]. Large-sized dogs are at high risk of cardiac arrhythmias \[[@ref7]-[@ref10]\], particularly in breeds that have inherited cardiac arrhythmias such as German Shepherds \[[@ref11],[@ref12]\]. Congenital cardiac defect is most common in Labrador Retrievers \[[@ref13]\]. A previous study reported that a routine yearly ECG recording in a Labrador Retriever detected a normal sinus rhythm with first degree atrioventricular (AV) blockade and atrial dissociation \[[@ref14]\]. In addition, large-sized dogs have enough atrial mass to induce atrial arrhythmias (AF) \[[@ref15]\]. Effects of hot climate and exercise training might alter cardiovascular adjustments on different ECG parameters in some exotic breeds of trained dogs such as Labrador, German Shepherd, and Golden Retriever \[[@ref16]\]. Moreover, breed differences in ECG parameters in healthy dogs have been reported, which may be due to variations in thoracic shape \[[@ref17]\]. Variations in age were significantly associated with R wave amplitude and QRS duration in German Shepherds \[[@ref18]\]. Body weight was also associated with variations in ECG parameters, whereas age and sex were associated with variations in HR \[[@ref19]\]. In Thailand, giant breed dogs such as Labrador Retrievers and German Shepherds are used to perform sniffing activities and military work training, but they do not have routine ECG evaluation and monitoring. Hence, ECG changes with respect to breed, age, sex, and body weight in these dogs were not clearly understood. Thus, this study aimed to examine the effects of breed, age, sex, and body weight on ECG parameters in military working dogs. Materials and Methods {#sec1-2} ===================== Ethical approval {#sec2-1} ---------------- All procedures on animals of this study were approved by the Institutional Animal Ethics Committee, Mahasarakham University, Thailand. Animals {#sec2-2} ------- This study included 30 clinically healthy dogs of both sexes in two different breeds, Labrador Retriever (n=16) and German Shepherd (n=14), from military working dog battalion, Pak Chong District, Nakhon Ratchasima Province, Thailand. Animals' age ranged from 1 to 8 years with body weight of 20-50 kg. Before the recording, all animals were examined carefully to screen for heart diseases. Electrocardiographic examinations {#sec2-3} --------------------------------- Electrocardiographic recordings were performed using a 3-channel ECG (Edan Instruments, Inc., VE-300, China) at paper speed of 25 mm/s and calibration of 10 mm/mV. Thermosensitive ECG paper with a total width of 50 cm and a recording width of 80 mm was used. One small square on the horizontal and vertical axis was equal to 0.04 s and 0.1 mV, respectively. The recordings were obtained for all the standard bipolar limb leads (leads I, II, and III) and unipolar augmented limb leads (leads aVR, aVL, and aVF). During recording, all dogs were restrained manually in the right lateral recumbency without any tranquilizer or anesthetic drug. Lead II was considered as the typical wave to analyze the depolarization vector. Amplitude and duration of P waves, QRS complexes, and T waves were measured together with PR and QT interval. HR was evaluated using R-R interval. The triangulation method was used to calculate the QRS complex of leads I and III to obtain MEA \[[@ref20]\]. Statistical analysis {#sec2-4} -------------------- Generalized linear models were used for analysis. The effects of age and body weight were adjusted for covariate variable, and grouping of animals was based on the effects of sex and breed (equation 1). p\<0.05 was considered as statistically significant. SAS software university edition (SAS, Inc., Cary, NC, USA) was used for data analysis. ![](Vetworld-13-1001-g001.jpg) Where: γ~ijk~ is observation of parameters, µ is the overall mean, S~i~ is the effect of sex, B~j~ is the effect of breed, β~1~(A) is the covariate of age, β~2~(W) is the covariate of body weight, and ε~ijk~ is the residual error. Results {#sec1-3} ======= ECG parameters were expressed as least square mean ± standard error. ECG recordings at lead II in Labrador Retrievers and German Shepherds are presented in Figures-[1](#F1){ref-type="fig"} and [2](#F2){ref-type="fig"}, respectively. In this study, ECG parameters were not significantly associated with breed and sex (Tables-[1](#T1){ref-type="table"} and [2](#T2){ref-type="table"}). However, QRS duration changed depending on the breed (p\<0.1). Labrador Retrievers (0.04±0.005 s) had lower QRS duration than German Shepherds (0.05±0.005 s) ([Table-1](#T1){ref-type="table"}). PR interval was influenced by sex (p\<0.1), with females (0.13±0.005 s) having higher PR interval than males (0.11±0.008 s) ([Table-2](#T2){ref-type="table"}). ECG parameters were not significantly associated with age and body weight of the dogs, except that R wave amplitude had a significantly decreased correlation with the increase of age (p\<0.05) ([Figure-3](#F3){ref-type="fig"}). ![Normal electrocardiograph (Lead-II, 25 mm/s and 10 mm/mV) of Labrador dog.](Vetworld-13-1001-g002){#F1} ![Normal electrocardiograph (Lead-II, 25 mm/s and 10 mm/mV) of German Shepherd dog.](Vetworld-13-1001-g003){#F2} ###### The effect of breed on electrocardiographic parameters of dogs. ECG parameters Breed p-value ----------------------- -------------- -------------- ------- HR (beats/min) 92.25±4.651 97.23±4.895 0.501 P wave amplitude (mV) 0.21±0.023 0.19±0.025 0.648 P wave duration (s) 0.04±0.003 0.05±0.004 0.262 PR interval (s) 0.12±0.006 0.12±0.006 0.544 R amplitude (mV) 1.78±0.142 1.64±0.149 0.547 QRS duration (s) 0.04±0.005 0.05±0.005 0.058 QT interval (s) 0.21±0.007 0.19±0.007 0.162 T wave amplitude (mV) 0.38±0.064 0.23±0.067 0.149 T wave duration (s) 0.067±0.0068 0.067±0.0071 0.970 MEA (degrees) 78.30±4.320 86.61±4.200 0.213 ECG=Electrocardiograph, HR=Heart rate, MEA=Mean electrical axis ###### The effect of sex on electrocardiographic parameters of Labrador Retriever and German Shepherd dogs. ECG parameters Sex p-value ----------------------- ------------- ------------- ------- HR (beats/min) 98.17±3.735 91.32±5.895 0.382 P wave amplitude (mV) 0.20±0.019 0.20±0.031 0.921 P wave duration (s) 0.05±0.003 0.05±0.004 0.728 PR interval (s) 0.13±0.005 0.11±0.008 0.059 R amplitude (mV) 1.66±0.114 1.76±0.180 0.659 QRS duration (s) 0.05±0.004 0.04±0.006 0.531 QT interval (s) 0.21±0.006 0.19±0.009 0.213 T wave amplitude (mV) 0.31±0.051 0.30±0.081 0.907 T wave duration (s) 0.07±0.005 0.07±0.009 0.809 MEA (degrees) 80.44±3.460 84.46±5.110 0.565 ECG=Electrocardiograph, HR=Heart rate, MEA=Mean electrical axis ![Scatter plot of the correlation between R amplitude and age showing a significant decrease in R amplitude with increase of age in dogs.](Vetworld-13-1001-g004){#F3} Discussion {#sec1-4} ========== ECG parameters for different breeds of trained dogs such as Labrador Retriever, German Shepherd, and Golden Retriever have been reported \[[@ref16]\]. However, the correlations of ECG values with sex, age, and body weight were not clearly understood. Thus, this study was established to examine them in detail. Reference values of ECG parameters for Labrador Retrievers and German Shepherds in this study were found to be in agreement with earlier reports \[[@ref16],[@ref18],[@ref21]\]. In this study, HR ranged from 60 to 130 beats/min, similar to a previous report \[[@ref22]\]. There were no significant differences in HR between Labrador Retrievers and German Shepherds, as reported earlier \[[@ref16]\]. P wave is the first deflection on ECG, corresponding to atrial depolarization, and spreads from sinoatrial to AV node. In this study, we found that positive P wave is the deflection in leads I, II, III, and aVF and negative P waves are the deflection in leads aVR and aVL. No significant difference was found in P wave amplitude between Labrador Retrievers and German Shepherds, but earlier reports revealed that it was slightly higher in Labrador Retrievers compared with German Shepherds \[[@ref16],[@ref21]\]. Higher P wave amplitude in Labrador Retrievers may be due to stress during ECG recording \[[@ref17]\]. There was no significant effect of sex on P wave amplitude, similar to earlier reports \[[@ref21]\]. Sex influenced PR interval (the time from the start of atrial depolarization wave traveling through the AV node to the bundle of His) (p\<0.1). The variation in PR interval may be due to sinus arrhythmia \[[@ref22]\]. In this study, the Q wave of the QRS complex, which is initially the first part of the ventricles to depolarize through the ventricular septum, was negative deflection in leads I, II, III, aVL, and aVF, whereas positive deflection in aVR. This is contradictory to Mukherjee *et al*. \[[@ref16]\], who found that aVR and aVL were positive deflection and Gugjoo *et al*. \[[@ref21]\] who found an absence of Q wave in aVR and aVL. However, Avizeh *et al*. \[[@ref17]\] reported the presence of Q wave in almost all leads. R wave reflects the depolarization of the main mass of the ventricles and produces a large deflection due to a large mass of ventricular muscle \[[@ref20]\]. This study found that R wave amplitude was not significantly different between the two breed groups (Labrador Retriever = 1.78±0.142 mV and German Shepherd = 1.64±0.149 mV). This finding was not supported by Mukherjee *et al*. \[[@ref16]\] but was in accordance with Gugjoo *et al*. \[[@ref21]\] and Spasojevic Kosic *et al*. \[[@ref18]\]. Variation in R wave amplitude may be due to different breed-dependent sizes of dogs \[[@ref1]\]. In this study, the effect of age leads to altered R amplitude; a significant decrease in R wave amplitude increases by age, according to Spasojevic Kosic *et al*. \[[@ref18]\]. Increase in age may result in the disturbance of impulse conduction and changes in ventricular depolarization in dogs. In our study, QRS duration (the period of ventricular depolarization) was not significantly different between Labrador Retrievers and German Shepherds, similar to earlier reports \[[@ref16]\]. Breed influencing QRS duration (p\<0.1) may be due to a varying mass of cardiac muscle in the ventricular chambers in different breeds. However, values of QRS duration of both dog breeds were within the reference range. QT interval represents the entire period of ventricular depolarization and repolarization, which was found to be in accordance with earlier reports \[[@ref16],[@ref18],[@ref21]\]. T wave amplitude and duration are the repolarization of the ventricular myocardium and were found to be within the normal range in our study, as reported by earlier studies \[[@ref16],[@ref18],[@ref21]\]. We also found that T wave can be positive or negative deflection in lead II of ECG, which has been found in normal dogs \[[@ref23]\]. MEA represents the total sum of electrical vector directions produced by the action potentials of individual ventricular myocardial cells. In this study, there was no significant difference in MEA with breed or sex, similar to the previous reports \[[@ref21]\] but contrary to Mukherjee *et al*. \[[@ref16]\], who reported that there was a significant variation in MEA found between Labrador Retrievers and German Shepherds. In our investigation, the values of MEA were between +60° and +120°. This variation of MEA might due to varying thoracic shapes in different breeds \[[@ref24]\]. Conclusion {#sec1-5} ========== This study established that different ECG parameters were within the normal range in both Labrador Retrievers and German Shepherds. There was a significant difference in R wave amplitude on the effect of age. However, no significant differences were found in ECG parameters on the effects of breed, sex, or body weight. Authors' Contributions {#sec1-6} ====================== WK designed the study and analyzed the data. ST, SY, SI, and WL recorded and analyzed the data. WL coordinated the study, wrote, and revised the manuscript. All authors read and approved the final manuscript. The authors appreciatively acknowledge the research grants from Faculty of Veterinary Science, Mahasarakham University, Thailand, 2019(grant number: 007/2562) for their financial supports, and Military working dogs battalion, Pak Chong District, Nakhon Ratchasima Province, Thailand, for providing the dogs and necessary facilities to conduct the research. Competing Interests {#sec1-7} =================== The authors declare that they have no competing interests. Publisher's Note {#sec1-8} ================ Veterinary World remains neutral with regard to jurisdictional claims in published institutional affiliation.
Association for Human Rights Defense International (A HRDI) initiated foundation of the independent psychiatric commission of experts. The decision was grounded, according to human rights activists, by the facts of the repressive psychiatry towards Belarusian nationals. When speaking to the journalists today, the vice-president of the AHRDI Mikalai Mekeka remarked: ‘For several years we have been collecting the facts of persecution of dissidents in our country, among those being such conventional tools used in the USSR and the Hitler’s Germany as the repressive psychiatry and political medicine. It was in early 2000s that our lawyer Andrei Dzemidovich investigated the persecution of the Smaliavichi inhabitant Volha Sitnikava, who was struggling against the militia and public prosecutor’s tyranny .The woman of a retirement age was twice sent for treatment to the psycho-neurological clinics ‘Navinki’. She was twice examined by the doctors and admitted healthy. Then she sued those who had tried to put her into the psycho-hospital and she won the case,’ Radio Artesia reports. But as the human rights activists state, not all similar stories have got such a happy end. Sometimes it takes years for the person to prove his psychic health. Many sad facts of the kind were announced at the conference which declared the initiative of ‘foundation of the independent psychiatric commission of experts’. You may get acquainted with them at www.4humanrights.org .
261 P.2d 811 (1953) KEYES et al. v. CLASS "B" SCHOOL DIST. NO. 421 OF VALLEY COUNTY et al. No. 8001. Supreme Court of Idaho. October 9, 1953. *812 Kibler & Beebe, Nampa, for appellants. Willis C. Moffatt, Boise, for respondent. PORTER, Chief Justice. On March 21, 1952, a school district bond election was held in Class "B" School District No. 421 of Valley County, Idaho. The proposal submitted to the voters was for authorization of the issuance and sale of school district bonds in an amount not exceeding $275,000. The proposal carried by more than the necessary two-thirds majority, 648 voters having cast ballots "for bonds" and 275 voters having cast ballots "against bonds". Appellants brought this action seeking to enjoin the issuance and sale of the bonds so authorized. Their complaint in substance alleges that the initial action by the board of trustees of the school district in calling the election was illegal and not in accordance with the governing statutes; and that all further proceedings thereafter in giving notice of the election and holding the same were a nullity and of no effect. Respondents by their answer and cross-complaint deny that the initial call for the election was illegal and seek to have the election approved and the bonds validated. Appellants, Robert M. Keyes and Laurel Hansen, and respondents, Warren H. Brown, Kenneth Wilde and Ira Rutledge, constituted the members of the board of *813 trustees and respondent, Bill Kirk, was the clerk, of respondent school district at the time of the call for such bond election. At the trial of the action the parties stipulated that the facts disclosed by the complaint of plaintiffs, with the exception of Paragraph IX thereof with which we are not now concerned, and the facts set out in the answer and cross-complaint and attached exhibits were true and correct; that there were no facts to be found by the trial court and that the cause was to be decided upon questions of law. The trial court decided the cause in favor of defendants; denied any relief to plaintiffs and entered judgment approving the election and validating the bonds. The first contention of appellants is that the meeting of the board of trustees at which the election was called was not held in compliance with Section 33-706, I.C., amended by Session Laws of 1949, Ch. 101, p. 176. This section provides that the regular meetings of the board of trustees of a Class "B" School District shall be held on the second Monday of each month; and special or adjourned meetings may be called by the chairman or by any two trustees from time to time, notice of the time and place thereof being given by personal notice to the members, or notice in writing left at the residence of said members at least twelve hours prior to said meetings. The meeting at which the election was called was held on February 19, 1952. The regular meeting date was February 18. At such meeting all members of the board of trustees were present except Robert M. Keyes. It is pleaded by the answer and admitted by the stipulation of the parties that the meeting was postponed from February 18 to February 19 by Warren H. Brown, the chairman of the board, at the request of appellant Keyes. All the trustees being present except Keyes and he having personal notice of the meeting, the same constituted a postponed regular meeting with authority to transact business. Gale v. City of Moscow, 15 Idaho 332, 97 P. 828; Sommercamp v. Kelly, 8 Idaho 712, 71 P. 147; Botts v. City of Valley Center, 124 Kan. 9, 257 P. 226. Appellants next contend that a majority of the board of trustees did not approve the submission of the question of the issuance of bonds to the electors as required by Section 33-909, I.C. The part of such section material herein reads as follows: "The board of trustees of any school district in the state of Idaho upon approval of a majority thereof, may submit to the qualified electors, who are resident taxpayers of the district the question as to whether or not the board shall be empowered to issue negotiable coupon bonds of the district in an amount and for a period of time to be named in the notice of election." The resolution and the action thereon as shown by the minutes of the meeting of February 19, 1952, were as follows: "Wilde moved to proceed with the advertising of a bond issue the same as was advertised in 1951. Brown called for the question on the motion of advertising the same bond issue as was advertised in 1951. Rutledge and Wilde in favor of the motion with Hansen dissenting. The motion carried. "Hansen requested that he be put on record as being in favor of a full Board before the above action be taken." It thus appears that only two members of the board of trustees voted for such resolution and that Brown, the chairman of the board, did not vote. The statute uses the words, "upon approval of a majority thereof". In the answer of defendants we find the following allegations of fact which under the stipulation of the parties we must deem to be true, to-wit: "* * *; that the chairman, defendant Warren Brown, who had presented the question to the Board for consideration, did not vote, but that at said meeting, as well as upon numerous occasions during the preceding years at Board meetings and elsewhere, defendant Brown, as chairman of said Board of Trustees and as a voter within the District, had approved and favored the said bond issue and had expressed himself as favoring the said election; and that at said meeting the chairman fully approved the submission of the *814 matter to the electors and expressed himself in agreement with the motion, but, as presiding officer, did not feel he should vote on said question since a majority of the trustees present, excluding the chairman, had voted favorably on the question; * * *". (Emphasis supplied.) In Boise City v. Better Homes, 72 Idaho 441, 243 P.2d 303, where the statutes governing the City of Boise provided for the call of an election by the mayor and city council and the record did not show that the mayor actually joined in the call but did show that he participated in the proceedings of the city council in calling the election, we held that the mayor in effect joined in the call and that the matter was a mere informality. See generally, Village of Oakley v. Wilson, 50 Idaho 334, 296 P. 185; Real Properties v. Board of Appeal of Boston, 311 Mass. 430, 42 N.E.2d 499; 78 C.J.S., Schools and School Districts, § 123, pages 911-912. The approval of the chairman of the board of trustees, while irregular, is sufficiently indicated by the admitted facts to constitute a sufficient compliance with Section 33-909, I.C. Appellants contend that the provision in the resolution calling the bond election which provided for "advertising the same bond issue as was advertised in 1951" is defective and insufficient to sustain the calling of the bond election. There is attached to the minutes of the meeting a copy of the 1951 resolution calling for a bond issue which is full and complete both as to the amount of bonds, the rate of interest and other statutory requirements for the calling and holding of an election. The board's procedure was merely an irregularity, not a failure to substantially comply with the statute. The notice of election provided as follows: "Shall the Board of Trustees of Class B School District No. 421 in Valley County, Idaho, be empowered to issue negotiable coupon bonds of the District in the amount of not exceeding Two Hundred Seventy Five Thousand and no/100 ($275,000.00) Dollars, bearing interest at a rate not exceeding 4 per cent per annum; * * *." Appellants urge in their brief that such notice is defective as not stating a definite amount of bonds or a definite rate of interest. The provisions in the notice substantially comply with Section 33-909, I.C., and the contention of appellants is without merit. Lee Electric Co. v. City of Corning, 199 Iowa 680, 202 N.W. 585; City of Oswego v. Davis, 97 Kan. 371, 154 P. 1124; First Nat. Bank of Laramie City v. City of Laramie, 25 Wyo. 267, 168 P. 728; Bernheim v. Town of Anchorage, 159 Ky. 315, 167 S.W. 139. It will be noted that all the irregularities urged by appellants go to the matter of the call for the election. Nowhere is it pleaded or urged by appellants that the election itself was not duly and regularly held or that any voter was hindered in or deprived of his right to vote by such irregularities or that such irregularities in any way affected the result of the election. It must be borne in mind that it is the electors of the school district and not the board of trustees that have the power to authorize the issuance of bonds. Likewise, the power to initiate the calling of an election is in the board of trustees. There is no question here of a lack of power on the part of the board to call the election but it is charged in effect that there were vitiating irregularities in the exercise of such power. We have consistently held that the provisions of the statutes regulating school elections are mandatory if invoked before the election, but after the election are to be construed as directory in the absence of a statute to the contrary, and if the failure to fully comply with same does not affect the results of the election. Sizemore v. Board of County Com'rs, 36 Idaho 184, 210 P. 137; King v. Independent School Dist., 46 Idaho 800, 272 P. 507; Boyd v. Bickel, 13 Idaho 191, 89 P. 631; Weisgerber v. Nez Perce County, 33 Idaho 670, 197 P. 562; Harrison v. Board of County Com'rs, 68 Idaho 463, 198 P.2d 1013; Lewis v. Woodall, 72 Idaho 16, 236 P.2d 91; Boise City v. Better Homes, supra. There is no statute declaring that *815 a strict compliance with Section 33-909, I.C., is mandatory. There is no contention by appellants that the actual election was in any way affected by any of the irregularities of which complaint is made. We are of the opinion that the election was legal and valid and that the issuance and sale of the bonds by the school board was duly authorized. In view of the foregoing holding we deem it unnecessary to discuss the affirmative defense of estoppel urged by respondents. The judgment of the trial court is affirmed. Costs are awarded to respondents. GIVENS, TAYLOR, THOMAS and KEETON, JJ., concur.
Chipotle Several San Diego locations. This chain that McDonald’s acquired cleaves to the original vision: naturally raised tender meats in authentic marinades, including fresh-grilled carne asada and carnitas. Rock-bottom prices.
Most people, even those generally opposed to incarceration, would agree that raping and killing the 15-year old girl who lives next door is the type of crime that ought to land a perpetrator behind bars for life. Add to that crime the complications of torture, and a demonstrable lack of remorse, and the best outcome would seem to be literal banishment from the public mind. But Marcus Wellons was all over the news this week. The killer is “elated” that the Supreme Court agreed with him that the behavior of jurors after the trial merits even more scrutiny — that is, scrutiny yet again, for Wellons has levied accusations against them many times in the past, and other courts already rejected those other claims. This time, Wellons, sinking what could easily be be his hundreth quarter into the one-armed bandit of capital appeals, has hit a little jackpot. The victim is still dead. She has been dead for 20 years. Nobody doubts that it was Wellons who raped and killed her. None of this is about the crime itself: none of those nine judges sitting on the highest court spent one moment considering the rape and murder of India Roberts. Her death is besides the point. It is the process that is obscene. ~~~ So the jurors, who were dragged from their ordinary lives to perform the task of judging Wellons’ heinous crimes seventeen years ago, will now be dragged from their lives and scrutinized once again. A majority in the Supreme Court agreed that (extremely tasteless) gag gifts given by the jurors to the judge after the trial and sentencing concluded somehow derailed the “dignity and respect” of the judicial process to such a degree that action must be taken. Since the Supreme Court has now placed itself in the business of micromanaging the free speech of former jurors, it’s worth asking: how dignified is the judicial process, anyway? Where is the dignity in a system that allows the defense to block and withhold evidence, treating jurors like children, ostensibly because they can’t be trusted to evaluate the quality of evidence on their own? What is so “respectful” about a system in which a dead victim and the entire matter of innocence or guilt may be reduced to a footnote throughout a mind-bogglingly expensive, twenty-year rehashing of minutiae from the trial? ~~~ The post-trial candy controversy is only the latest of Wellons’ appeals. I encourage you to read through this 1995 disposition of other appeals. It includes 37 separate claims. None have anything much to do with the rape and murder, except to dispute that Wellons tortured his victim in the act of raping and strangling her. Several of the arguments for overturning Wellons’ sentence are based merely on words used by the prosecutor to describe the victim. Wellons appealed on the grounds that the prosecutor referred to his dead victim as a “little girl.” He also objected to the act of mentioning of the victim’s lost life opportunities; to the prosecutor saying that the young woman did not deserve to die, and to stating the victim’s age in court. Again, what, precisely, is “dignified and respectful” about a system that permits a convicted murderer to spend taxpayer dollars to object to someone saying his victim didn’t deserve to die? Here are a few more of Wellons’ failed, taxpayer-subsidized appeals: Objection to the state cross-examining character witnesses Wellons placed on the stand. Objection to presenting evidence seized at the scene of the crime, though probable cause was established, and the actual tenant of the apartment gave police written and verbal permission to search it. Objection to permitting the trial court to let jurors see a videotape of the crime scene. And so on. See a lengthy description of the crime and the appeal court’s findings here. ~~~ For the past twenty years, Marcus Wellons has apparently not deviated from his belief that he is the victim of an unfair system that should have “understood” him, not punished him. He expresses these beliefs in his writing and in the singles ads he places with a ministry group that posts such ads on the internet. “Be a good listener,” In His Grip Ministry counsels potential prisoner pen-pals, “keep confidential what you are told . . . be prepared for romantic overtures.” Also, “don’t ask why an inmate is incarcerated” or “send photos except for group photos,” the latter, presumably, because some of the people you meet when you start sending mash notes to murderers might not be as taken with the spirit as IHGM might wish. And may be released again. Here is Wellons’ IHMG ad: Favorite Verse: Isaiah 40:28-29, 31 I am Marcus Wellons, 50 years old (at this writing) a Christian. I love to read the Bible, history, & autobiographies. I’m very open and honest, sincere, loyal and a good listener. I studied business administration and counseling in college and graduate school. I have a 26 year old daughter, Tynecia. We are very close. I have been blessed with a ministry inside called “Life Row Ministries.” I like helping and serving others. I’m from Miami, FL where I grew up. Then I spent 3 years in the military – two of those years were in Germany. I am bi-lingual in Spanish. I love literature. Tolstoy and Dostoyevsky are two favorites. I love sports, to exercise, and to meet new friends. If you are interested in sharing life’s experiences and supporting each other through good and bad times, please contact me. In another ad, by another ministry called Lamp of Hope, Wellons describes his crime only as his “first time in prison.” “I can assure you I’ll be just as much a blessing to your life as you can be to mine,” he writes. There is nothing illegal about trolling for extremely disturbed women on the internet, of course. Lamp of Hope claims to be in the business of “supporting victims’ families by promoting healing and reconciliation.” They also offer hot chats about sunsets and kittens with men who raped and murdered multiple victims, if that’s your thing. Interestingly, Wells claims to be concerned for the victims of other offenders, just not his own. His own victim, apparently, is far too valuable to his efforts to be removed from death row to dignify her with some of his cell block-renowned empathy: I forgo all table games, yard call, and frivolous conversations such as joking, playing, and laughing. My conversations are more of a serious nature. I send back all my food trays instead of giving them away to comrades. When the officers ask why, I politely remind them, “I don’t eat on execution days.” I explain respectfully that when their comrades pass on, they observe it by attending the funeral and wearing black tapes on their badges. Since I can’t attend the funeral of those who were executed, this is my way of showing respect. I spend the time praying not only for my comrade, but also for the victim’s family and friends and the powers that be. The reason I observe executions in this way is that I’m grieving. . . Extraordinary, isn’t it? The highest court in the land sat around last week trying to decide if a convicted rapist and murderer should get another chance at freedom because innocent jurors made a tasteless joke two decades ago. Meanwhile, the killer is permitted to impugn the innocence of his victim in order to try to get free, and we have to pay for the lawyers to argue such a heinous untruth and the judges to hear it in a court of law. Not once has anyone mentioned this man didn’t do it…safe to say he was and is GUILTY!This is rediculous a man raped and killed someone… He should pay! But due to ignorance this CHILD’S horrible death is being forgotten and a man is able to appeal on tax payers dollars…our judicial system needs to be reviewed and those dummies on the jury have just let the world know ignorance is bliss… I was the best friend of the victim and still think of her 20 years later. I often read articles about the case to see if he is still alive. I have forgiven him in recent years, it is the only way for me to let her go and rest in peace. However, it needs to pay for this crime and those defending him should be ashamed. I buried my friend at 15! We had plans to go to college together, raise our children as friends and walk in each others weddings. I didn’t survive her rape and sick of hearing his attempts to avoid execution!
// Copyright 2009 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Free(v) must be able to determine the MSpan containing v. // The MHeapMap is a 3-level radix tree mapping page numbers to MSpans. // // NOTE(rsc): On a 32-bit platform (= 20-bit page numbers), // we can swap in a 2-level radix tree. // // NOTE(rsc): We use a 3-level tree because tcmalloc does, but // having only three levels requires approximately 1 MB per node // in the tree, making the minimum map footprint 3 MB. // Using a 4-level tree would cut the minimum footprint to 256 kB. // On the other hand, it's just virtual address space: most of // the memory is never going to be touched, thus never paged in. typedef struct MHeapMapNode2 MHeapMapNode2; typedef struct MHeapMapNode3 MHeapMapNode3; enum { // 64 bit address - 12 bit page size = 52 bits to map MHeapMap_Level1Bits = 18, MHeapMap_Level2Bits = 18, MHeapMap_Level3Bits = 16, MHeapMap_TotalBits = MHeapMap_Level1Bits + MHeapMap_Level2Bits + MHeapMap_Level3Bits, MHeapMap_Level1Mask = (1<<MHeapMap_Level1Bits) - 1, MHeapMap_Level2Mask = (1<<MHeapMap_Level2Bits) - 1, MHeapMap_Level3Mask = (1<<MHeapMap_Level3Bits) - 1, }; struct MHeapMap { void *(*allocator)(uintptr); MHeapMapNode2 *p[1<<MHeapMap_Level1Bits]; }; struct MHeapMapNode2 { MHeapMapNode3 *p[1<<MHeapMap_Level2Bits]; }; struct MHeapMapNode3 { MSpan *s[1<<MHeapMap_Level3Bits]; }; void MHeapMap_Init(MHeapMap *m, void *(*allocator)(uintptr)); bool MHeapMap_Preallocate(MHeapMap *m, PageID k, uintptr npages); MSpan* MHeapMap_Get(MHeapMap *m, PageID k); MSpan* MHeapMap_GetMaybe(MHeapMap *m, PageID k); void MHeapMap_Set(MHeapMap *m, PageID k, MSpan *v);
A 12-year-old girl who uses a wheelchair was detained for nearly an hour at Dallas-Fort Worth International Airport by Transportation Security Administration agents who said they detected traces of bomb residue on her hands, according to her mother. MyFoxDFW.com reports that Shelbi Walser, who suffers from a genetic bone disorder, was traveling with her mother from Texas to Florida for medical treatment Dec. 8 when she was prevented from proceeding through a security checkpoint. When a screener swabbed Shelbi's hands and fingers, she tested positive for explosives, her mother, Tammy Daniels tells KHOU.com. The wheelchair, she said, was never tested. Daniels said a bomb specialist showed up and TSA agents prevented her from getting close to her crying daughter, according to MyFoxDFW.com. Other passengers reportedly spoke out in support of Shelbi, according to Daniels, who used her cell phone to record a video of the incident. After nearly an hour, Daniels said agents suddenly told them they were free to leave, offering no explanation for the detention. TSA responded in a statement to MyFoxDFW.com that reads in part, "TSA's mission is to safely, efficiently and respectfully screen nearly two million passengers each day at airports nationwide. We are sensitive to the concerns of passengers who were not satisfied with their screening experience and we invite those individuals to provide feedback to TSA through a variety of channels." Click for more from MyFoxDFW.com Click for more from KHOU.com
Gay Iranian refugee in U.S. worries about friends left behind Wade Meyer (left), an LGBT refugee services coordinator at the Jewish Family and Community Services East Bay, works with Amir, a gay refugee from Iran. Photo: Christie Hemm Klok, Special to the Chronicle Amir knows he should be happier. He is among the lucky ones, a gay Iranian man who gained refugee status and flew to San Francisco just a day before President Trump was inaugurated and a little over a week before he signed the first of two executive orders temporarily barring refugees from entering the country. Instead, Amir sits alone in his room in the city and wonders: Why him? He thinks about a fortuitous last-minute flight change that had him depart for San Francisco International Airport on Jan. 19 rather than Jan. 30 — a few days after Trump signed his initial executive order. More so, he worries about his friends left behind, like Ashkan, who was also set to come to the U.S. as a refugee but now may lose that opportunity altogether. Amir spends his days on the phone with Ashkan and his other friends in Turkey, where as gay refugees who fled Iran together they formed a community in a small town where residents looked down on them. Now, his friends can neither go back to Iran nor come to the U.S. — and they have told Amir they have contemplated suicide. “Is this the America they talked about, the one that valued freedom and human rights?” asked Amir, 31, who requested that his last name be withheld because he fears repercussions. Wade Meyer (left), LGBT refugee services coordinator at the Jewish Family and Community Services East Bay, and Amir, a gay refugee from Iran who made it to the U.S. in the recent weeks while his close friends remain stuck in Turkey. Photo: Christie Hemm Klok, Special to the Chronicle Amir and his friends are among those whose lives were thrown into disarray first by Trump’s Jan. 27 executive order, which froze all refugee admissions for four months. The move was struck down by federal courts, but on Monday Trump signed a follow-up order freezing admissions, while also temporarily halting the entry of all immigrants from Iran and five other majority-Muslim countries. The second order, which is being challenged in the courts, is to take effect Thursday. In the weeks since the first ban was struck down, more than 4,000 refugees have arrived. But many others in the pipeline were not able to make it. The limbo for these people will continue. Roughly 11,000 refugees who have been vetted by government agencies including the Department of Homeland Security are standing by, as flights into the U.S. are not being booked for after Thursday, said Karen Ferguson, head of the International Rescue Committee’s Northern California office. Ferguson and other advocates fear that the freeze will be disastrous for many. During the intense vetting process — which takes an average of 18 to 24 months — refugees run through numerous security and medical checks. But these clearances have expiration dates that Ferguson worries will lapse during the four-month suspension, effectively sending the applicants back to the start of the process. “It’s going to leave people in harm’s way,” Ferguson said. “There will be tragedies. Some people will not make it through even when they would have.” The Trump administration has said the freeze is a necessary step in boosting efforts to identify would-be terrorists and keep them out of the country. Attorney General Jeff Sessions said Monday that more than 300 people in the U.S. who had been admitted as refugees were being investigated for potential terrorism-related activities. But Sessions did not provide details on the cases, or what precisely the number represented. “We also know that people seeking to support or commit terrorist attacks here will try to enter through our refugee program,” Sessions said. “Like every nation, the United States has the right to control who enters our country, and to keep out those who would do us harm.” But the focus on the country’s refugee program has ignited opposition from advocates and politicians who call it a critical humanitarian effort that has not proved to be dangerous. Between 1980 and 2015, no U.S. resident who had arrived as a refugee was involved in a fatal terrorist attack, according to research by the libertarian Cato Institute. In 2016, a man who came to the country as a refugee and who officials believe may have been inspired by the Islamic State group injured 11 people by running them over at Ohio State University. The White House says the stakes are high. So do advocates for refugees. Around the Bay Area and the country, as arrivals of refugees have been put on hold, lives have been changed and families have been separated, as advocates try to figure out what’s next. While Amir got in, others were not as fortunate — including a Syrian refugee who lives in Jordan and was preparing, along with his wife, son and daughter, to join his sister in the East Bay. Ahmed, whose family fled the fighting in Syria in 2013, had spent years seeking admission to the U.S. and was waiting for his airline tickets the day Trump signed the first ban. He had made all of his preparations for travel — ending his contract at work, selling his furniture and taking his children out of school. Trump’s orders were more crushing than leaving his war-torn home country, because he dreamed of restarting his family members’ lives and giving his children opportunity, said Ahmed, who asked to be identified by a pseudonym. Since then, his family’s refugee case has been suspended as organizations try to help. He said he was ready to contribute to the U.S., sending a reporter pictures of the tools he once produced at the factory he owned in Syria. “Mr. President,” Ahmed said. “We are not terrorists. We want to live in peace.” The changing plight of refugees goes beyond the 120-day freeze. More than 37,000 refugees have been resettled in the U.S. this fiscal year, which ends Sept. 30. Because the Trump administration lowered the maximum number of refugees the country will take in during this period, from 110,000 to 50,000, the remaining slots are limited. “The administration has the right to cap and put limits on the number of refugees it’s going to accept — there’s no legal obligation to take a particular number,” said Beth Van Schaack, a professor at Stanford Law School who once investigated war crimes in Syria for the State Department. “The issue is one of morality at some level.” Polling shows the country is divided over the admission of refugees. According to a recent Associated Press-NORC Center for Public Affairs Research poll, 52 percent of respondents said it was appropriate to limit entry of refugees because of security risks. It’s not the first time the country has been split over refugees. The Pew Research Center found that Americans have, in the past, generally not wanted to welcome them, regardless of their country of origin. In 1980, a poll found that 71 percent of Americans did not approve of Cuban refugees. “We want the American administration to rethink this decision,” said Ahmed, “because we are a good people that loves peace, and what was imposed upon us was outside of our will.” Hamed Aleaziz is a reporter covering immigration, race, civil rights and breaking news. Hamed graduated from the University of Oregon and spent a year living in Amman, Jordan. He is always on the hunt for stories so feel free to contact him with ideas and pitches.
Soft Colorblock Sock Fashionable styling meets supreme softness with our World's Softest Frost Crew sock. Created as a one-of-a-kind work of art, the Frost Crew incorporates color and texture to create the look of a hand-knit sock, while maintaining the World's Softest® feel. These are the socks you've been looking for your entire life. Women's Shoe Size 6-10
Plans for a £120million scheme to regenerate Swansea city centre have been given the go ahead. The development near Swansea Marina will provide homes and a new indoor arena for the city. Full planning permission was granted for the Swansea Central Phase One scheme. Building will start soon for a 3,500-capacity digital indoor arena, coastal park, digital plaza, a 'gateway' landmark pedestrian bridge, new homes and premises for retail, food and drink. The project is likely to be a catalyst for city-wide regeneration. Council leader Rob Stewart said the project will help attract businesses to the city. Our 3,500-capacity state-of-the-art arena will be the first such venue in the UK to be wrapped in a dynamic digital skin. It will be a unique draw for Swansea, will generate hundreds of new jobs and a £65m annual boost to the local economy. Rob Stewart, Swansea Council leader Credit: Artist impression/Swansea Council It is estimated to bring a total of more than 20,000 sq m of public space to the city. What's planned for Swansea Central Phase One? A 3,500-capacity state-of-the-art arena that will be the first such venue in the UK to be wrapped in a dynamic digital skin New parkland with parking underneath - the first new park in the city since Victorian times - which will help connect the city to the coast and bay New pedestrian bridge which will connect the city centre with the arena and Marina. Proposals for a new high quality hotel on the arena site. The scheme will be built over the next two years either side of Oystermouth Road – on the LC car park and St Mary’s car park.
PERSONAL HEALTH; Disorder Magnifies Blood Clot Risk By JANE E. BRODY Published: June 10, 2008 When David Bloom, 39, went to Iraq in 2003 to cover the war for NBC News, his wife, Melanie, naturally feared for his safety. Would a bullet or a bomb claim him? A land mine? An ambush? Instead it was a blood clot lodged in his lungs that ended his life. Ms. Bloom subsequently learned that her husband carried a genetic abnormality, factor V Leiden, that greatly increased his risk for developing blood clots. Mr. Bloom had three other risk factors for clots: a long plane ride to Iraq, erratic eating habits that could have caused dehydration, and cramped sleeping space in Army vehicles. But had he not had this genetic quirk -- or had he known about it and the higher risks it carried -- he might have escaped his fate. A Hidden Problem Factor V Leiden (pronounced factor five) is the most common hereditary clotting disorder in the United States, present in 2 percent to 7 percent of Caucasians, less often in Hispanics and rarely in Asians and African-Americans. The disorder accounts for 20 percent and to 40 percent of cases of deep vein thrombosis, or D.V.T., the clot that Mr. Bloom developed in his leg before it broke loose and traveled to his lungs, resulting in a pulmonary embolism that caused his death. Factor V Leiden is more often than not a hidden disorder, until someone in a family -- often someone like Mr. Bloom, who was athletic and healthy -- develops a deep vein thrombosis or another unexpected clot. Because screening for this problem is not routine, factor V Leiden is usually not detected until several members of a family develop clots or one person develops a succession of clots. Even then, a possible carrier of the gene defect may not be tested. Dr. Rinah Shopnick, medical director of the Hemophilia and Thrombosis Center of Nevada, described the case of Ann, 20, who reported to the center about her doctors' reactions to her family history. Ann told doctors that her otherwise healthy cousin had suffered a major heart attack in his 40s and was found to have factor V Leiden. Her grandmother died while pregnant, and her aunt, uncle and grandfather died of heart problems. Ann reported that she had had blood pressure problems since age 8, and developed a serious blood pressure disorder during pregnancy and that her brother had just tested positive for the defect. Yet she was advised by two doctors not to be tested, she said. The reasoning was that the disorder was rare, that she would have to pay for the test (it is not expensive) and that if she was found to carry the gene it could affect her ability to buy affordable life and health insurance. (Federal legislation has just been passed to protect against such discrimination.) Inherited Risk In someone with factor V Leiden, clots can arise in veins anywhere. The abnormality can increase the risk of heart attack, stroke, miscarriage, gallbladder dysfunction and toxemia of pregnancy. Clots are also more likely to develop after surgery and childbirth and in women taking oral contraceptives or estrogen therapy. The disorder results from a mutation in the factor V gene that participates in forming clots in response to an injury, for example. Without two fully functional factor V genes, the body's ability to put a brake on clot formation is inhibited. Normally, a molecule called activated protein C, or APC, prevents clots from becoming too large by inactivating coagulation factor V. But factor V Leiden impairs this protein's ability to suppress the coagulation factor because it is longer lasting and stickier. A parent who carries the mutated gene has a 50 percent chance of passing it on to each child. Someone who inherits one mutated gene faces a five- to seven-fold increased risk of developing a serious and potentially life-threatening clot. Someone with two of the damaged genes has a 25- to 50-fold increased risk. Approximately one person in 5,000 among whites in the United States and Europe has two of the mutated genes. Because the risk of suffering a clot is about one in 1,000 people a year in the general population, the increased risk associated with factor V Leiden is not to be taken lightly: 5 to 7 in 1,000 people each year for those with one mutant gene and 25 to 50 per 1,000 in those with two mutant genes. The risk is greatest in individuals who have more than one clotting defect, as well as in people who smoke or are overweight. A Danish study of 9,253 adults found that in people who did not smoke, were not overweight and were younger than 40, the 10-year risk of clots and emboli was 1 percent in those with one mutated gene and 3 percent in those with two damaged genes. But the risk increased to 10 percent in people with one mutated gene and 51 percent in those with two abnormal genes if they smoked, were overweight and were older than 60. Screening Two blood tests can detect factor V Leiden. One, the APC resistance assay, is 95 percent accurate and could be used for screening. It measures the anticoagulant response to activated protein C. A definitive but more costly diagnosis, also performed on blood, can be made by genetic analysis of the factor V gene. One or both tests is recommended for people with D.V.T., pulmonary embolism, premature stroke, repeated miscarriage, a family history of clots or a known factor V mutation in a blood relative. Thus, Mr. Bloom's three daughters should be tested, because each has a 50 percent chance of carrying the defective gene. For people with a personal or family history of clots, testing can help avert clotting complications when they undergo major surgery, are treated for cancer, anticipate pregnancy or plan to take oral contraceptives, estrogen therapy or a drug like tamoxifen. In women with factor V Leiden, for example, treatment with an anticoagulant during pregnancy can reduce the risk of pregnancy loss. Women needing contraception might be wise to avoid birth control pills and instead choose a method that would not increase their risk of clots. And a person who is hospitalized or needs surgery can be treated with blood thinners and mechanical compression boots. Though factor V Leiden alone does not seem to raise the risk of arterial clots, something as simple as daily therapy with low-dose aspirin may help prevent a heart attack or stroke in people with factor V Leiden if they have additional risk factors. Preventive action is also important during long periods of immobilization, including long car and plane rides. Drinking plenty of water to prevent dehydration, avoiding alcohol, taking frequent walks and wearing elastic stockings can lower the risk of clots on such excursions. DRAWING (DRAWING BY ANDY MARTIN) Correction: June 13, 2008, Friday The Personal Health column on Tuesday, about a genetic abnormality that raises the risk of blood clots, referred incorrectly to federal legislation that protects against genetic discrimination. The law offers protection in employment and health insurance, but not life insurance. (Go to Article)
duminică, 9 martie 2008 Tumblers and Rollers For romanian breeders, all tumblers and rollers are just "players". In romanian language "player=jucator". No distinction between tumblers and rollers, and they put together both types of pigeons. We had no documentations about these categories of "play". And this explain actual situation with Galatzi Roller. We had in the past a great roller, Double Crested Calarasi Roller. And this was mixed with Double Crested Ardeal Tumbler. Big mistake! Today is hard to find a good rolling Double Crested Calarasi Roller. If you go on this romanian site where you can find descriptions for romanian pigeon breeds you will see "Jucator" but some of them are tumblers and a few are rollers. And today we have only few good rollers because of this lack of information. And this is very, very bad! [...] And this is not the entire problem. Tumblers and Rollers are put together in competitions! Because they are all "players". Double Crested Calarasi Roller, owner Adrian Nistor. You can see more here Double Crested Ardeal Tumbler, owner Nicolas Girard . You can see more here
Psoriasis :: What Is Psoriasis? Psoriasis is a skin disease that causes scaling and swelling. Skin cells grow deep in the skin and slowly rise to the surface. This process is called cell turnover, and it takes about a month. With psoriasis, it can happen in just a few days because the cells rise too fast and pile up on the surface. Most psoriasis causes patches of thick, red skin with silvery scales. These patches can itch or feel sore. They are often found on the elbows, knees, other parts of the legs, scalp, lower back, face, palms, and soles of the feet. But they can show up other places such as fingernails, toenails, genitals, and inside the mouth. Who Gets Psoriasis? Anyone can get psoriasis, but it occurs more often in adults. Sometimes there is a family history of psoriasis. Certain genes have been linked to the disease. Men and women get psoriasis at about the same rate. What Causes Psoriasis? Psoriasis begins in the immune system, mainly with a type of white blood cell called a T cell. T cells help protect the body against infection and disease. With psoriasis, T cells are put into action by mistake. They become so active that they set off other immune responses. This leads to swelling and fast turnover of skin cells. People with psoriasis may notice that sometimes the skin gets better and sometimes it gets worse. Things that can cause the skin to get worse include: Infections Stress Changes in weather that dry the skin Certain medicines. How Is Psoriasis Diagnosed? Psoriasis can be hard to diagnose because it can look like other skin diseases. The doctor might need to look at a small skin sample under a microscope. How Is Psoriasis Treated? Treatment depends on: How serious the disease is The size of the psoriasis patches The type of psoriasis How the patient reacts to certain treatments. All treatments don’t work the same for everyone. Doctors may switch treatments if one doesn’t work, if there is a bad reaction, or if the treatment stops working. Topical Treatment: Treatments applied right on the skin (creams, ointments) may help. Treatments can: Help reduce swelling and skin cell turnover Suppress the immune system Help the skin peel and unclog pores Reduce cell turnover and swelling. Bath solutions and lotions may feel good, but they rarely make the skin better. They are often used along with stronger treatments. Light Therapy: Natural ultraviolet light from the sun and artificial ultraviolet light are used to treat psoriasis. One treatment, called PUVA, uses a combination of a drug that makes skin more sensitive to light and ultraviolet A light. Systemic Treatment: If the psoriasis is severe, doctors might prescribe drugs or give medicine through a shot. This is called systemic treatment. Antibiotics are not used to treat psoriasis unless bacteria make the psoriasis worse. Combination Therapy: When you combine topical (put on the skin), light, and systemic treatments, you can often use lower doses of each. Combination therapy can also lead to better results. What Are Some Promising Areas of Psoriasis Research? Doctors are learning more about psoriasis by studying: Genes New treatments that help skin not react to the immune system Laser light treatment on thick patches.
Emil Hlobil Emil Hlobil (11 October 1901 – 25 January 1987) was a twentieth century Czechoslovakian composer and music professor based in Prague. Biography Hlobil was born in Veselí nad Lužnicí, but lived most of his life in Prague. Between 1924 and 1930 he studied at the Prague Conservatory under Josef Suk and Jaroslav Křička, and taught music and composition at the Prague Academy of Performing Arts. He also taught at the Prague Conservatory (1941–58) before moving to the Academy. He married Czech painter Marie-Hlobilová Mrkvičková, and after World War II they bought a cottage in the Krkonoše mountains as a summer home. Hlobil died in Prague in 1987. Music Hlobil composed in the Romantic tradition of the Nineteenth Century, almost untouched by modern trends, which was possibly a reflection of the politics of the time and place. A review by Gramaphone in 1961 described him as follows: Emil Hlobil, 60-year-old professor of composition at the Prague Conservatoire, has the most original creative imagination of our twelve composers, I would say. In his Quartet for harpsichord and string trio (1944) [sic], he uses a fairly simple diatonic idiom, but shows a Janacek-like boldness in his apparently inconsequential changing of the subject, his close working-out of a few motives, and his ability to create fascinating textures. Although his self-made technique is not nearly as successful as Janacek's—his material does not stand up to so much repetition, and he sometimes falls into empty naïveté (codetta of first movement and much of the finale), this refreshingly imaginative work makes one want to hear more recent examples from his long list of compositions. Hlobil's works include operas, symphonies, concertos and string quartets in the Czech Impressionist tradition of Suk and Vítězslav Novák. Selected works Stage Anna Karenina, Opera in 3 acts, Op. 60 (1962); libretto by the composer after a dramatization of Tolstoy's novel by Nicolai Volkov Měšťák šlechticem (Le Bourgeois Gentilhomme), Opera in 3 acts, Op. 67 (1967); libretto by the composer after the play by Molière Kráska a zvíře (Beauty and the Beast), Ballet in 3 acts, Op. 96 (1976); libretto by Milan Fridrich after František Hrubín Král Václav IV. (King Wenceslaus IV), Opera in 5 scenes, Op. 107 (1981); libretto by the composer after the play by Arnošt Dvořák Orchestral Suite, Op. 4 Weekend, Suite, Op. 6 Sinfonietta, Op. 19 Zpěv mládí (Song of Youth), Op. 22 Tryzna mučedníkům, Op. 25 Park oddechu, Suite for small orchestra, Op. 28 Lidová veselice (Folk Celebration), Suite for small orchestra, Op. 32 Symphony No. 1, Op. 31 (1949) Léto v Krkonoších (Summer in the Krkonoše Mountains), Op. 33 (1957) Symphony No. 2 "Den vítězství" (Victory Day), Op. 38 (1951) Valašskou dědinou (Moravian Wallachia Village), Suite, Op. 39 Serenade, Op. 49 Slavnostní znělka (1954); written for the 1954 World Ice Hockey Championships in Stockholm Symphony No. 3, Op. 53 (1956–1957) Symphony No. 4, Op. 58 (1959) Svátek práce (Labor Day), Symphonic Poem, Op. 59 (1960) Concerto for string orchestra, Op. 62 Sonata No. 1 for chamber string orchestra, Op. 68 Filharmonický koncert, Op. 66 (1965) Symphony No. 5, Op. 76 Symphony No. 6 for chamber string orchestra (1972) Symphony No. 7, Op. 87 (1973) Cesta živých (Chemin des Vivants), Op. 92 (1974) Jubilace (Jubilation; Giubilazione), Symphonic Movement, Op. 100 (1977) Exclamationes Invocazione Jaro v pražských zahradách (Spring in the Prague Gardens), Suite Slovanská družba, March Concertante Concerto for violin and orchestra, Op. 47 (published 1958) Rhapsodie for clarinet and orchestra, Op. 51 (1960) Concerto for accordion and orchestra, Op. 54 Concerto for organ and orchestra, Op. 61 (1963) Concerto for double bass and orchestra, Op. 70 (1967) Contemplazione for viola and string orchestra, Op. 75 (1969) Concerto for winds and percussion, Op. 82 (1972) Concerto for marimba and orchestra (1979) Concerto for cello and orchestra, Op. 106 (1983) Chamber music Quintet for 2 violins, 2 violas and cello, Op. 1 (1925) 5 Invence (5 Inventions) for 2 violins (1935) Dvě nokturna (2 Nocturnes) for cello and piano, Op. 9 (1935) Serenade for violin and piano, Op. 12a (1935–1936) Burleska for violin and piano, Op. 12b (1935–1936) Sonatina for violin and piano, Op. 13 (1936) String Quartet No. 2, Op. 15 (1935–1936) Piano Trio, Op. 18 (1939) Quintet for flute, oboe, clarinet, bassoon and horn, Op. 20 Sonata for horn and piano, Op. 21 (1942) Quartet for harpsichord, violin, viola and cello, Op. 23 (1943) Jarní impromptu (Spring Impromptu; Impromptu di primavera) for cello and piano, Op. 24 (1944) Andante amabile for oboe (or violin) and piano (1947) Andante pastorale for horn and piano (1947) Allegro leggiero for oboe (or violin) and piano, Op. 26b (1950) Nonet for flute, oboe, clarinet, bassoon, horn, violin, viola, cello and double bass, Op. 27 (1946) Divertimento for bassoon and piano, Op. 29 (1948) Arie a rondo (Aria and Rondo) for horn and piano, Op. 37 (published 1969) Canto emozionante for trombone and piano, Op. 43 (1967) String Quartet No. 3, Op. 50 (1955) String Quartet No. 4 Octet for 2 oboes, 2 clarinets, 2 bassoons and 2 horns, Op. 52 (1956) Tři skladby (3 Pieces) for violin and piano, Op. 56 (1958) Sonata for violin and piano, Op. 57 (1958–1959) Intermezzo for trumpet and piano (published 1965) Sonata for flute and piano (1966) Sonata for trumpet and piano, Op. 71 (1967) Aria e rondo for oboe and harp (1968) Intermezzo for 2 accordions (published 1969) Sonata for bass clarinet and piano, Op. 80 String Quartet No. 5, Op. 81 (1971) Sonata for 2 cellos, Op. 88 (1973) Sonata for trombone and piano, Op. 86 (1973) Tři monology (3 Monologues) for clarinet solo, Op. 90 (1973) Sonata for oboe and piano, Op. 91 (1974) Quartet for 4 saxophones, Op. 93 (1973) Sonáta vzpomínek (Souvenir Sonata; Sonata di evocazioni) for flute, guitar and cello, Op. 95 (1975) Canto pensieroso for tenor saxophone and piano, Op. 97 (1976) Trio for violin, guitar and accordion, Op. 98 (1976) Trio for clarinet, marimba and piano, Op. 98b (1976, 1983) Sonata for clarinet and piano, Op. 103 (1978) Marcato di Danza for 4 saxophones (1978) Dva monology (2 Monologues) for violin solo Komorní hudba (Chamber Music) for 2 clarinets, basset horn and bass clarinet Quartet for winds Trio for oboe, clarinet and bassoon Organ Preludium a toccata (Prelude and Toccata) (1948) Aria e Toccata, Op. 46 (1964) Invokace (Invocation; Invocazione) (1957) Apoteosa, Op. 89 (1973) Piano Dvě skladby (3 Pieces), Op. 2 (published 1932) Sonata for 2 pianos, Op. 55 (1958) Sonata No. 1 for piano, Op. 72 (1968) Sonata No. 2 for piano, Op. 73 (1968) Imaginace (Imagination) for piano 4-hands, Op. 101 (1977) Introdukce Pět skladeb (5 Pieces) Tanec (Dance) Vocal Tři písně (3 Songs) for voice and piano, Op. 8 (1933) Cesta živých (Chemin des Vivants), 4 Songs for medium voice and piano, Op. 83 Evocazioni for soprano, flute and alto flute (1968) Choral Panachida, Apotheosis for mixed voices a cappella (1971) Notable students Milan Kymlicka Luboš Fišer Ladislav Kubik Otomar Kvěch Ivana Loudová Zuzana Růžičková Viktor Kalabis Jindřich Feld Jan Hammer References Category:1901 births Category:1987 deaths Category:20th-century classical composers Category:Czech classical composers Category:Czech male classical composers Category:Czech opera composers Category:Male opera composers Category:Academics of the Prague Conservatory Category:Czech music educators Category:People from Veselí nad Lužnicí Category:Musicians from Prague Category:Prague Conservatory alumni Category:20th-century male musicians
197 N.W.2d 403 (1972) 188 Neb. 412 STATE of Nebraska, Appellee, v. George Ellis NEWTE, Appellant. No. 38140. Supreme Court of Nebraska. May 12, 1972. *405 Frank B. Morrison, Public Defender, Bennett G. Hornstein, Asst. Public Defender, Omaha, for appellant. Clarence A. H. Meyer, Atty. Gen., Betsy G. Berger, Asst. Atty. Gen., Lincoln, for appellee. Heard before WHITE, C. J., and SPENCER, BOSLAUGH, SMITH, McCOWN, NEWTON and CLINTON, JJ. WHITE, Chief Justice. The appellant was charged and convicted of robbery. At trial, several different versions of the fact situation were disclosed to the jury. The victim of the robbery was a cab driver who testified as follows: At an early morning hour on November 27, 1970, two men entered the driver's cab while it sat in front of a bus depot in Omaha. The cab driver had been noticing a white car with a dented fender as it circled the block before the two men entered the cab. The driver proceeded to a destination requested by his passengers. Upon arrival, one of the passengers, identified by the driver as the defendant, put a dull object to the back of his neck while the other passenger jumped over the front seat and took the driver's money, glasses, and wristwatch. Both men then fled on foot and the driver made an attempt to follow. While attempting to follow the men and then moments later when the police were on the scene, the white car with a dented fender was again noticed by the cab driver. Police officers testified that they stopped the white car pointed out to them by the cab driver and they searched the occupants. One of the occupants, Ronald Chatman, was carrying a number of small bills and a wristwatch that matched the cab driver's description. The defendant, George Newte, was not in the car. After the occupants were arrested, one of them informed police that the defendant Newte had also been involved in the robbery. Later police arrested Newte and took a statement from him. The statement, read to the jury, was essentially Newte's denial that he had ever entered the cab or participated in the robbery. Ronald Chatman testified for the defense and contradicted elements of Newte's written statement. Chatman said that Newte did enter the cab with him but did not want to rob the driver. According to Chatman, Newte got out of the cab before the driver was robbed. Newte took the stand at trial, said his written statement did not contain the true facts, and testified to facts which were nearly identifical to those given in Chatman's testimony. The State then called a rebuttal witness who had interviewed Chatman previously and another version of the robbery was presented. Chatman had told this witness that his recollection of the facts of the robbery was poor due to intoxication, but he did remember taking the watch from the cab driver's wrist and Newte giving him some of the cab driver's money. Although the briefs contain much able and refined discussion of the theory and problems involved in the examination of a character witness in a criminal case, the essential question in this case boils down to whether a character witness produced by the defendant in a criminal prosecution may be cross-examined as to an arrest of the defendant whether or not it culminated in a prior conviction. It is clear from the statement of facts heretofore given that there were several versions of the alleged robbery before the jury and, consequently, that the veracity of the witnesses was in question. The defense itself called a state parole officer under whose supervision the defendant had been while on parole from a previous offense. This witness testified that he knew the defendant's reputation for truth and veracity, and after further foundation testified that he would believe the defendant under oath. As a part of his foundation testimony, the parole officer stated that his opinion of the defendant's testimony was based in part upon contact with men who had known the defendant while at the reformatory. On cross-examination by the prosecutor, the court sustained several objections to questions, the *406 target of which were prior arrests or charges made against the defendant. It appears that the court not only sustained the objections but directed the jury and advised it to disregard the questions themselves, even though there was no answer in the record. The pertinent part of the testimony admitted by the court and under attack in this case is as follows: "Q. (Mr. Brown) Do you know — "Mr. Schirber: Your Honor, I also object, it should be if he has any convictions only. "Mr. Brown: I think arrests would have to do with his reputation also, your Honor. "The Court: He can answer. Do you understand the question? "The Witness: I'm — I don't. "The Court: Let me suggest, Mr. Brown, that you rephrase the question. I think it was changed perhaps in the middle and I doubt whether it would be helpful to have it read back. "Q. (Mr. Brown) Do you know whether or not Mr. Newte, the Defendant here, has had any arrests or convictions since his parole from the Nebraska Penal and Correctional Complex? "Mr. Schirber: Same objection. "The Court: Overruled. He may answer. "The Witness: Sir, I don't. Mr. Newte has been discharged. I don't have his file. "Q. (Mr. Brown) Well, I am asking you about whether you know or not. "A. No, sir, I do not." At the outset, we observe that a line of inquiry directed towards the defendant's previous character is firmly forbidden the State on direct examination. On the other hand, a defendant may adduce affirmative testimony that the general estimate of his character is so favorable the jury may infer he would not be likely to commit the offense charged. However, "When the defendant elects to initiate a character inquiry, another anomalous rule comes into play. Not only is he permitted to call witnesses to testify from hearsay, but indeed such a witness is not allowed to base his testimony on anything but hearsay." Michelson v. United States, 335 U.S. 469, 69 S.Ct. 213, 93 L.Ed. 168. As the decisions have noted, the courts, in ruling on the admissibility of hearsay testimony in this area are called upon to rule in an illogical and anomalous situation. The question arises as to the latitude of the prosecutor's inquiry into the hearsay basis and foundation. The rule properly to be deduced from the decisions all over the United States in this area is that the trial judge is vested with a broad discretion to properly circumscribe inquiry into a criminal defendant's past conduct when that subject is raised during the cross-examination of a defense character witness. Basye v. State, 45 Neb. 261, 63 N.W. 811; Michelson v. United States, supra; 3A Wigmore on Evidence (Chadbourn Rev., 1970), s. 988, p. 912. The rule is well settled in this state. As early as Basye v. State, supra, this court said as follows: "While particular facts are inadmissible in evidence upon direct examination for the purpose of sustaining or overthrowing character, yet this doctrine does not extend to cross-examination. It is firmly settled by the adjudications in this country that upon cross-examination of a witness who has testified to general reputation, questions may be propounded for the purpose of eliciting the source of the witness' information, and particular facts maye be called to his attention, and he be asked whether he ever heard them. This is permissible not for the purpose of establishing the truth of such facts, but to test the witness' credibility, and to enable the jury to ascertain the weight to be given to his testimony. The extent of the cross-examination of a witness must be left to the discretion of the trial court. The questions put to the several witnesses were *407 within the scope of a legitimate cross-examination, and there was no abuse of discretion in permitting them to be answered." (Emphasis supplied.) The precise question, of course, presented by the defendant's brief is whether a cross-examination as to a previous arrest or some other offense is permissible within the latitude of legitimate cross-examination. Following the overwhelming weight of authority (see Annotation, 47 A.L.R.2d 1258) the Supreme Court of the United States has consistently followed and adhered to the rule announced in Michelson v. United States, supra, by stating categorically that "a character witness may be cross-examined as to an arrest whether or not it culminated in a conviction, according to the overwhelming weight of authority." See, also, Mannix v. United States, 4 Cir., 140 F.2d 250; Josey v. United States, 77 U.S. App.D.C. 321, 135 F.2d 809; Spalitto v. United States, 8 Cir., 39 F.2d 782. It is true that the Michelson opinion, around which so much of the argument centers in the briefs in this case, contains a considerable discussion by way of dicta of the theory, difficulties, problems, and suggested procedures for judges to follow in solving the problem. However, it appears abundantly clear in the Michelson case, in a situation directly in point with the case at bar, that such evidence is permissible, rests within a wide and broad discretion of the trial court under all circumstances, and will not be reversed or set aside unless there is a clear abuse of the discretion. After a discussion and a suggested approval of some of the procedures that have been followed by some of the courts, that court concluded with this clear holding which is decisive of the case at bar: "The present suggestion is that we adopt for all federal courts a new rule as to cross-examination about prior arrest, adhered to by the courts of only one state and rejected elsewhere. The confusion and error it would engender would seem too heavy a price to pay for an almost imperceptible logical improvement, if any, in a system which is justified, if at all, by accumulated judicial experience rather than abstract logic. "The judgment is Affirmed." (Emphasis supplied.) We further feel that when we are dealing with the limitation of cross-examination in such a broad and vague field, it would be unwise for this court to formulate any rigid rule for the exclusion of evidence of previous arrests. As Mr. Justice Frankfurter stated in the concurring opinion in Michelson v. United States, supra, it would be unwise to deny trial courts a power to control, under all of the circumstances, the allowable scope of cross-examination in such an admittedly broad area, precipitated by the granting to a defendant in a criminal case of a right which is impermissible under all other evidentiary standards for which there is no logical rationale. In a more precise examination of the question of alleged abuse of discretion by the trial court, we observe that the trial court did sustain every objection directed at a question mentioning a prior arrest for auto theft. Although as we have pointed out, this was not necessary under the principles announced in Michelson and Basye, nevertheless the defendant had the benefit of these rulings and an admonition by the trial court to disregard such questions. Second, we observe that the question complained of by the defendant was answered in the negative and there was no affirmative evidence in the record of the arrest to which the question was directed. Third, and more important, the jury already knew from the voluntary, direct examination of the defendant himself that he had been previously arrested and convicted of a crime. Surely, alluding to another subsequent arrest on cross-examination would not bring into play any prejudice which should limit legitimate cross-examination of a character witness. In examining the record in this case we are unable to find that the prosecutor's questions fell within the inhibition of "asking a groundless question in order to waft an unwarranted innuendo *408 into the jury box." We further observe that the defendant at no time objected to the form of the question asked by the prosecutor on cross-examination, but rather based his objection upon the contention that the question would have to be targeted at prior convictions rather than prior arrests. The contention that a calculated innuendo of prior guilt against a previously innocent defendant was wafted into the jury box is without merit in this case. The above conclusions are reenforced in the record by the fact that the defendant himself admitted he violated the terms of his parole which forbad association with criminal confederates, and which he violated by being in their company at the time of the commission of the robbery involved. In this case, two men, the witness Chatman and the defendant, got into a taxicab in the middle of the night in Omaha. The cab driver positively identified the defendant as one of the men; the defendant admitted being in the cab at the time; and Chatman too admitted being in the cab at the time. Although these last two witnesses attempted to change their testimony the evidence is convincing that Chatman, prior to the time of the trial, stated he was in the cab and he remembered taking the watch from the cab driver's wrist and that the defendant gave him some of the cab driver's money. Considering the evidence and the testimony in the case and the elusive nature of the argued contention of prejudice from the admission of the testimony of the previous arrest, we think the following rule is applicable: "No judgment shall be set aside, or new trial granted, or judgment rendered in any criminal case on the grounds of misdirection of the jury, or the improper admission or rejection of evidence, or for error as to any matter of pleading or procedure, if this court, after an examination of the entire cause, shall consider that no substantial miscarriage of justice has actually occurred." State v. Sharp, 184 Neb. 411, 168 N.W.2d 267. The judgment and sentence of the district court are correct and are affirmed. Affirmed.
A Stability-Indicating UPLC Method for the Determination of Potential Impurities and Its Mass by a New QDa Mass Detector in Daclatasvir Drug Used to Treat Hepatitis C Infection. A stability-indicating ultraperformance liquid chromatographic method has been developed for the quantitative determination of degradation products and process-related impurities of daclatasvir in a pharmaceutical dosage form. Chromatographic separation was achieved on a polar Waters ACQUITY BEH phenyl 100 × 2.1 mm, 1.7-μm column using the gradient program consisting of mobile phase A: 0.03 M sodium perchlorate with 0.002 M of 1-octanesulfonic acid sodium salt (pH 2.5 buffer) and mobile phase B: 0.03 M sodium perchlorate with 0.02 M of 1-octanesulfonic acid sodium salt (pH 2.5 buffer) with acetonitrile in the ratio of 20:80% v/v. A flow rate of 0.4 mL/min is maintained under ultraviolet detection at 305 nm. The run time was 15 min, within which daclatasvir, its related impurities and unknown degradants were well resolved. The method was found to produce symmetric and sharp peaks with good separation between process-related impurities and degradation impurities. Samples were subjected to hydrolysis (acid and base), oxidative, photolytic and thermal stress conditions to prove the stability-indicating nature of the method. The unknown degradation products were identified by PDA/QDa mass detector. This mass spectrum reveals protonated molecular ion peaks [M + H]+ at m/z DP1-582.4 in acid and base hydrolyses and m/z DP2-778.5 in peroxide hydrolysis. The method was validated in terms of specificity, precision, linearity, accuracy, limit of detection, limit of quantification and robustness as per ICH guidelines.
Japan Seeks 'Escape From Postwar Regime' On Aug. 15, 1945, Emperor Hirohito announced Japan's surrender to Allied forces, putting an end to World War II. With the peace deal, Japan was forced to demilitarize. Now, Prime Minister Shinzo Abe is suggesting it may be time for Japan to shake off its postwar identity. This past week, Abe sent senior officials to a shrine glorifying Japan's soldiers, including some who were prosecuted for war crimes. The government of China protested. South Korea, which also suffered under Japan during the war, is concerned as well. NPR's Anthony Kuhn was recently on assignment in Japan. He joins us from Beijing, China. Anthony, thanks for being with us. ANTHONY KUHN, BYLINE: Thank you, Rachel. MARTIN: There were events this past week marking the anniversary of the end of the war. But I understand this year was different. People were angry. Why? KUHN: Well, they just felt that Japanese Prime Minister Shinzo Abe was not showing any sense of remorse, of reflection on this, as Japanese leaders have in past. He has made it clear that he wants to go to the Yasukuni shrine to honor Japan's war dead, but he can't while he's prime minister - it's too politically sensitive. But he did send an aide, and two cabinet ministers went. That got Koreans protesting in the streets, and Chinese diplomats summoning the Japanese ambassador to Beijing. But it follows a long period of comments by the Japanese government that feel that they're not properly addressing Japan's wartime history. MARTIN: Japanese Prime Minister Abe says he wants Japan to escape from the postwar regime. What does he mean by that? KUHN: Well, basically, he feels that the U.S. occupation of Japan imposed alien values, and he wants Japan to stand tall again, to be proud and confident. And he wants to change the constitution. Now, that constitution is very special; part of it was drafted by American military officers under Gen. Douglas MacArthur. And the postwar solution, to prevent World War II from happening again in Asia, was to write in the constitution that Japan may not have a standing army, it may not wage war; and to include a lot of language about democracy and human rights. And Abe now wants to change some of this. MARTIN: Can he do that? KUHN: Well, he does have a fairly good approval rating, at the moment. But most opinion polls show people do not want to see Japan's postwar constitution changed. They feel it's the reason Japan has been prosperous. He also does not have the numbers in parliament, but he's trying to change the threshold to make it easier to amend the constitution. MARTIN: How has the U.S. government reacted to all of this? KUHN: Japan is the U.S.'s principal ally in Asia, and they tend to be very careful in criticizing them. The U.S. is responsible, of course, for Japan's defense under this postwar arrangement. At the same time, Japan has interpreted its constitution so that it does have a military, now known euphemistically as the self-defense forces; and the U.S. would like to see Japan play a larger role in international peacekeeping. What it does not want to see is Japan provoking a conflict with China. So the U.S. has quietly made it clear that it wants to avoid exactly that situation.
socks ============= socks is a full client implementation of the SOCKS 4, 4a, and 5 protocols in an easy to use node.js module. ### Notice As of February 26th, 2015, socks is the new home of the socks-client package. ### Why socks? There is not any other SOCKS proxy client library on npm that supports all three variants of the SOCKS protocol. Nor are there any that support the BIND and associate features that some versions of the SOCKS protocol supports. Key Features: * Supports SOCKS 4, 4a, and 5 protocols * Supports the connect method (simple tcp connections of SOCKS) (Client -> SOCKS Server -> Target Server) * Supports the BIND method (4, 4a, 5) * Supports the associate (UDP forwarding) method (5) * Simple and easy to use (one function call to make any type of SOCKS connection) ## Installing: `npm install socks` ### Getting Started Example For this example, say you wanted to grab the html of google's home page. ```javascript var Socks = require('socks'); var options = { proxy: { ipaddress: "202.101.228.108", // Random public proxy port: 1080, type: 5 // type is REQUIRED. Valid types: [4, 5] (note 4 also works for 4a) }, target: { host: "google.com", // can be an ip address or domain (4a and 5 only) port: 80 }, command: 'connect' // This defaults to connect, so it's optional if you're not using BIND or Associate. }; Socks.createConnection(options, function(err, socket, info) { if (err) console.log(err); else { // Connection has been established, we can start sending data now: socket.write("GET / HTTP/1.1\nHost: google.com\n\n"); socket.on('data', function(data) { console.log(data.length); console.log(data); }); // PLEASE NOTE: sockets need to be resumed before any data will come in or out as they are paused right before this callback is fired. socket.resume(); // 569 // <Buffer 48 54 54 50 2f 31 2e 31 20 33 30 31 20 4d 6f 76 65 64 20 50 65... } }); ``` ### BIND Example: When sending the BIND command to a SOCKS proxy server, this will cause the proxy server to open up a new tcp port. Once this port is open, you, another client, application, etc, can then connect to the SOCKS proxy on that tcp port and communications will be forwarded to each connection through the proxy itself. ```javascript var options = { proxy: { ipaddress: "202.101.228.108", port: 1080, type: 4, command: "bind" // Since we are using bind, we must specify it here. }, target: { host: "1.2.3.4", // When using bind, it's best to give an estimation of the ip that will be connecting to the newly opened tcp port on the proxy server. port: 1080 } }; Socks.createConnection(options, function(err, socket, info) { if (err) console.log(err); else { // BIND request has completed. // info object contains the remote ip and newly opened tcp port to connect to. console.log(info); // { port: 1494, host: '202.101.228.108' } socket.on('data', function(data) { console.log(data.length); console.log(data); }); // Remember to resume the socket stream. socket.resume(); } }); ``` At this point, your original connection to the proxy server remains open, and no data will be received until a tcp connection is made to the given endpoint in the info object. For an example, I am going to connect to the endpoint with telnet: ``` Joshs-MacBook-Pro:~ Josh$ telnet 202.101.228.108 1494 Trying 202.101.228.108... Connected to 202.101.228.108. Escape character is '^]'. hello aaaaaaaaa ``` Note that this connection to the newly bound port does not need to go through the SOCKS handshake. Back at our original connection we see that we have received some new data: ``` 8 <Buffer 00 5a ca 61 43 a8 09 01> // This first piece of information can be ignored. 7 <Buffer 68 65 6c 6c 6f 0d 0a> // Hello <\r\n (enter key)> 11 <Buffer 61 61 61 61 61 61 61 61 61 0d 0a> // aaaaaaaaa <\r\n (enter key)> ``` As you can see the data entered in the telnet terminal is routed through the SOCKS proxy and back to the original connection that was made to the proxy. **Note** Please pay close attention to the first piece of data that was received. ``` <Buffer 00 5a ca 61 43 a8 09 01> [005a] [PORT:2} [IP:4] ``` This piece of data is technically part of the SOCKS BIND specifications, but because of my design decisions that were made in an effort to keep this library simple to use, you will need to make sure to ignore and/or deal with this initial packet that is received when a connection is made to the newly opened port. ### Associate Example: The associate command sets up a UDP relay for the remote SOCKS proxy server to relay UDP packets to the remote host of your choice. ```javascript var options = { proxy: { ipaddress: "202.101.228.108", port: 1080, type: 5, command: "associate" // Since we are using associate, we must specify it here. }, target: { // When using associate, either set the ip and port to 0.0.0.0:0 or the expected source of incoming udp packets. // Note: Some SOCKS servers MAY block associate requests with 0.0.0.0:0 endpoints. // Note: ipv4, ipv6, and hostnames are supported here. host: "0.0.0.0", port: 0 } }; Socks.createConnection(options, function(err, socket, info) { if (err) console.log(err); else { // Associate request has completed. // info object contains the remote ip and udp port to send UDP packets to. console.log(info); // { port: 42803, host: '202.101.228.108' } var udp = new dgram.Socket('udp4'); // In this example we are going to send "Hello" to 1.2.3.4:2323 through the SOCKS proxy. var pack = Socks.createUDPFrame({ host: "1.2.3.4", port: 2323}, new Buffer("hello")); // Send Packet to Proxy UDP endpoint given in the info object. udp.send(pack, 0, pack.length, info.port, info.host); } }); ``` Now assuming that the associate request went through correctly. Anything that is typed in the stdin will first be sent to the SOCKS proxy on the endpoint that was provided in the info object. Once the SOCKS proxy receives it, it will then forward on the actual UDP packet to the host you you wanted. 1.2.3.4:2323 should now receive our relayed UDP packet from 202.101.228.108 (SOCKS proxy) ``` // <Buffer 68 65 6c 6c 6f> ``` ## Using socks as an HTTP Agent You can use socks as a http agent which will relay all your http connections through the socks server. The object that `Socks.Agent` accepts is the same as `Socks.createConnection`, you don't need to set a target since you have to define it in `http.request` or `http.get` methods. The second argument is a boolean which indicates whether the remote endpoint requires TLS. ```javascript var socksAgent = new Socks.Agent({ proxy: { ipaddress: "202.101.228.108", port: 1080, type: 5, }}, true, // we are connecting to a HTTPS server, false for HTTP server false // rejectUnauthorized option passed to tls.connect(). Only when secure is set to true ); http.get({ hostname: 'google.com', port: '443', agent: socksAgent}, function (res) { // Connection header by default is keep-alive, we have to manually end the socket socksAgent.encryptedSocket.end(); }); ``` # Api Reference: There are only three exported functions that you will ever need to use. ### Socks.createConnection( options, callback(err, socket, info) ) > `Object` **Object containing options to use when creating this connection** > `function` **Callback that is called when connection completes or errors** Options: ```javascript var options = { // Information about proxy server proxy: { // IP Address of Proxy (Required) ipaddress: "1.2.3.4", // TCP Port of Proxy (Required) port: 1080, // Proxy Type [4, 5] (Required) // Note: 4 works for both 4 and 4a. type: 4, // SOCKS Connection Type (Optional) // - defaults to 'connect' // 'connect' - establishes a regular SOCKS connection to the target host. // 'bind' - establishes an open tcp port on the SOCKS for another client to connect to. // 'associate' - establishes a udp association relay on the SOCKS server. command: "connect", // SOCKS 4 Specific: // UserId used when making a SOCKS 4/4a request. (Optional) userid: "someuserid", // SOCKS 5 Specific: // Authentication used for SOCKS 5 (when it's required) (Optional) authentication: { username: "Josh", password: "somepassword" } }, // Information about target host and/or expected client of a bind association. (Required) target: { // When using 'connect': IP Address or hostname (4a and 5 only) of a target to connect to. // When using 'bind': IP Address of the expected client that will connect to the newly open tcp port. // When using 'associate': IP Address and Port of the expected client that will send UDP packets to this UDP association relay. // Note: // When using SOCKS 4, only an ipv4 address can be used. // When using SOCKS 4a, an ipv4 address OR a hostname can be used. // When using SOCKS 5, ipv4, ipv6, or a hostname can be used. host: "1.2.3.4", // TCP port of target to connect to. port: 1080 }, // Amount of time to wait for a connection to be established. (Optional) // - defaults to 10000ms (10 seconds) timeout: 10000 }; ``` Callback: ```javascript // err: If an error occurs, err will be an Error object, otherwise null. // socket: Socket with established connection to your target host. // info: If using BIND or associate, this will be the remote endpoint to use. function(err, socket, info) { // Hopefully no errors :-) } ``` ### Socks.createUDPFrame( target, data, [frame] ) > `Object` **Target host object containing destination for UDP packet** > `Buffer` **Data Buffer to send in the UDP packet** > `Number` **Frame number in UDP packet. (defaults to 0)** Creates a UDP packet frame for using with UDP association relays. returns `Buffer` The completed UDP packet container to be sent to the proxy for forwarding. target: ```javascript // Target host information for where the UDP packet should be sent. var target = { // ipv4, ipv6, or hostname for where to have the proxy send the UDP packet. host: "1.2.3.4", // udpport for where to send the UDP packet. port: 2323 } ``` ### Socks.Agent( options, tls) ) > `Object` **Object containing options to use when creating this connection (see above in createConnection)** > `boolean` **Boolean indicating if we upgrade the connection to TLS on the socks server** # Further Reading: Please read the SOCKS 5 specifications for more information on how to use BIND and Associate. http://www.ietf.org/rfc/rfc1928.txt # License This work is licensed under the [MIT license](http://en.wikipedia.org/wiki/MIT_License).
Trump signs bill to end government shutdown President Donald Trump walks through the colonnade of the White House on arrival to announce a deal to temporarily reopen the government, Friday, Jan. 25, 2019, from the Rose Garden of the White House in Washington.(Photo11: Jacquelyn Martin, AP) Washington – Submitting to mounting pressure amid growing disruption, President Donald Trump agreed to a deal Friday to reopen the government for three weeks, backing down from his demand that Congress give him money for his border wall before federal agencies get back to work. Standing alone in the Rose Garden, Trump said he would sign legislation funding shuttered agencies until Feb. 15 and try again to persuade lawmakers to finance his long-sought wall. The deal he reached with congressional leaders contains no new money for the wall but ends the longest shutdown in U.S. history. First the Senate, then the House swiftly and unanimously approved the deal. Late Friday, Trump signed it into law. Trump’s retreat came in the 35th day of the partial shutdown as intensifying delays at the nation’s airports and another missed payday for hundreds of thousands of federal workers brought new urgency to efforts to resolve the standoff. House Speaker Nancy Pelosi of Calif., and Senate Minority Leader Sen. Chuck Schumer of N.Y., arrive for a news conference on Capitol Hill in Washington, Friday, Jan. 25, 2019, after President Donald Trump announces a deal to reopen the government for three weeks.(Photo11: Andrew Harnik, AP) “This was in no way a concession,” Trump said in a tweet late Friday, fending off critics who wanted him to keep fighting. “It was taking care of millions of people who were getting badly hurt by the Shutdown with the understanding that in 21 days, if no deal is done, it’s off to the races!” The shutdown ended as Democratic leaders had insisted it must – reopen the government first, then talk border security. “The president thought he could crack Democrats, and he didn’t, and I hope it’s a lesson for him,” said the Senate Democratic leader, Chuck Schumer. House Speaker Nancy Pelosi said of her members: “Our unity is our power. And that is what maybe the president underestimated.” Trump still made the case for a border wall and maintained he might again shut down the government over it. Yet, as negotiations restart, Trump enters them from a weakened position. A strong majority of Americans blamed him for the standoff and rejected his arguments for a border wall, recent polls show. “If we don’t get a fair deal from Congress, the government will either shut down on Feb. 15, again, or I will use the powers afforded to me under the laws and Constitution of the United States to address this emergency,” Trump said. The president has said he could declare a national emergency to fund the border wall unilaterally if Congress doesn’t provide the money. Such a move would almost certainly face legal hurdles. As part of the deal with congressional leaders, a bipartisan committee of House and Senate lawmakers was being formed to consider border spending as part of the legislative process in the weeks ahead. “They are willing to put partisanship aside, I think, and put the security of the American people first,” Trump said. He asserted that a “barrier or walls will be an important part of the solution.” The deal includes back pay for some 800,000 federal workers who have gone without paychecks. The Trump administration promises to pay them as soon as possible. Also expected is a new date for the president to deliver his State of the Union address, postponed during the shutdown. But it will not be Jan. 29 as once planned, according to a person familiar with the planning but unauthorized to discuss it. As border talks resume, Senate Majority Leader Mitch McConnell said he hopes there will be “good-faith negotiations over the next three weeks to try to resolve our differences.” Schumer said that while Democrats oppose the wall money, they agree on other ways to secure the border “and that bodes well for coming to an eventual agreement.” In striking the accord, Trump risks backlash from conservatives who pushed him to keep fighting for the wall. Some lashed out Friday for his having yielded, for now, on his signature campaign promise. Conservative commentator Ann Coulter suggested on Twitter that she views Trump as “the biggest wimp” to serve as president. Money for the wall is not at all guaranteed, as Democrats have held united against building a structure as Trump once envisioned, preferring other types of border technology. Asked about Trump’s wall, Pelosi, who has said repeatedly she won’t approve money for it, said: “Have I not been clear? No, I have been very clear.” Within the White House, there was broad recognition among Trump’s aides that the shutdown pressure was growing, and they couldn’t keep the standoff going indefinitely. The president’s approval numbers had suffered during the impasse. Overnight and Friday, several Republicans were calling on him openly, and in private, to reopen the government. The breakthrough came as LaGuardia Airport in New York and Newark Liberty International Airport in New Jersey both experienced at least 90-minute delays in takeoffs Friday because of the shutdown. And the world’s busiest airport – Hartsfield-Jackson Atlanta International Airport – was experiencing long security wait times, a warning sign the week before it expects 150,000 out-of-town visitors for the Super Bowl. The standoff became so severe that, as the Senate opened with prayer, Chaplain Barry Black called on high powers in the “hour of national turmoil” to help senators do “what is right.” Senators were talking with increased urgency after Thursday’s defeat of competing proposals from Trump and the Democrats. Bipartisan talks provided a glimmer of hope Friday that some agreement could be reached. But several senators said they didn’t know what to expect as they arrived to watch the president’s televised address from their lunchroom off the Senate floor. The Senate first rejected a Republican plan Thursday reopening the government through September and giving Trump the $5.7 billion he’s demanded for building segments of that wall, a project that he’d long promised Mexico would finance. The 50-47 vote for the measure fell 10 shy of the 60 votes needed to succeed. Minutes later, senators voted 52-44 for a Democratic alternative that sought to open padlocked agencies through Feb. 8 with no wall money. That was eight votes short. But it earned more support than Trump’s plan, even though Republicans control the chamber 53-47. It was aimed at giving bargainers time to seek an accord while getting paychecks to government workers who are either working without pay or being forced to stay home. Contributing to the pressure on lawmakers to find a solution was the harsh reality confronting many of the federal workers, who on Friday faced a second two-week payday with no paychecks. Throughout, the two sides issued mutually exclusive demands that have blocked negotiations from even starting: Trump had refused to reopen government until Congress gave him the wall money, and congressional Democrats had rejected bargaining until he reopened government.