Document
stringlengths
87
1.67M
Source
stringclasses
5 values
Talk:anilingus I'd like to see some verification for the synonym "asian". Otherwise I'd like to see that synonym removed, as it is probably just a general derogatory term that can be applied to anyone ?--Richardb 13:41, 8 March 2006 (UTC) "asian" is slang usage for analingus In response to the post by "Richardb": Lots of sexual positions and acts have slang names that refer to cultures or roles: russian = male genitals on breasts greek = anal sex ... and I can name others. Is the term "missionary sex" derogatory towards missionaries? Is the "cowgirl" sexual position derogatory towards female ranch hands? I submit: no. And, if you are someone who likes anal sex, you wouldn't find the term derogatory toward Greeks. Who knows how "asian" has come to be equated with analingus, but it is in common usage in the sex trade industry. I don't believe it is any more derogatory towards Asians that stating "doggie style" sex is degrading towards dogs. Although these citations are far from ironclad academic references, these disparate sources all do recount the same slang usage: * "Definitions, Acronyms, Abbreviations, and Terms (A-M)" at www.theeroticreview.com * http://www.theeroticreview.com/discussion_boards/viewmsg.asp?BoardID=33&MessageID=17545 * "Sexual Terms often found in works of fiction" at www.bestgfe.com * http://www.bestgfe.com/forum/faq.php?faq=new_faq_terms * "Word entry: Asian" (definition 25 at the time of this writing) at www.urbandictionary.com * http://www.urbandictionary.com/define.php?page=4&term=asian (Some of those sites may require a free "account" and subsequent login to see those pages.) RFC discussion: June 2007–November 2009 Tagged but not listed. --Connel MacKenzie 21:13, 3 June 2007 (UTC) * Has been cleaned up --Volants 13:44, 16 November 2009 (UTC)
WIKI
Château des Ducs de La Trémoille The Château des Ducs de La Trémoille (English : Castle of the Dukes of La Tremoille) is located in Thouars in the Deux-Sèvres département of France and was built in the 17th century. It is located on a strategic defense point -a promontory above the Thouet river- and consists of the main building, an inner court, an orangery, a chapel and a stable. History The first known reference to the city of Thouars is dated 762, in a document describing how a fortress was taken and then razed to the ground by Pepin the Short. Later reconstructed -it is regularly mentioned from the 10th century- the castle was again partially destroyed in 1158 by Henry II of England coveting the lands of Thouars's viscounty which would be an important stronghold during the Hundred Years' War. A surrounding wall itself included in the city wall was added to the dungeon at the end of the 12th century. Unfortunately no pictures of the different castles from this period are available. After belonging to the House of Amboise, then being annexed to the royal domain by Louis XI of France, the viscounty was given to the house of La Trémoille in 1489, that were made dukes later by Charles IX of France. Gabrielle de Bourbon, wife of Louis II de La Trémoille ordered the construction of the chapel built between 1503 and 1509 which is still visible today. The chapel is of flamboyant gothic style for the lower part and influenced by Italian Renaissance for the upper gallery and was designed by several architects including André Amy and Jean Chahureau. It was designated as a collegiate church in 1515 by Pope Leo X and hosted a relic of the crucifixion of Jesus Christ. In 1619, Henri de La Trémoille married Marie de La Tour d'Auvergne. In the year 1628 the duchess and her intendent the sieur d'Iray oversaw the construction of a small pavilion. She then proceeded to order the building of the South pavilion for her apartments in the year 1635 and decided later to build a newer, more luxurious castle in place of the old one. The project was entrusted to Jacques Lemercier, an architect of King Louis XIII of France and famous for his work on the Château de Richelieu, Versailles, the Louvre and the Chapel of la Sorbonne in Paris. The construction began in 1638. At the time it was one of the most important castles in France with its 110-meter long façade and its main courtyard (Cour d'honneur) surrounded by 70-metre long galleries. The south side contained the gardens and the orangery, outbuildings and an unfinished stable later complemented the site. Attracted by being at the court of Louis XIV of France, the members of the House of La Tremoille later neglected the castle in favour of their Parisian residency. During the French Revolution, the castle and the chapel were plundered and more than 40 paintings and the marble tombs in the chapel were destroyed. The trees from the orangery and the content of the library were burnt to provide warmth for the soldiers. It became national property and then the siege of the sous-préfecture in 1797. It was offered to Vaubois by Napoleon in 1803, then to Masséna in 1809 both refused because of the restoration and maintenance costs. The city of Thouars bought the site from the state in 1833 to use it as a barracks until 1849. It then was used as a private college -College Saint-Louis- by priest until 1869. The chapel was bought back by the family of La Tremoille in 1873. The castle was transformed into a prison and used for this purpose from 1872 to 1925, accommodating up to 1 200 prisoners during World War I. The city of Thouars then decided to make it a public school in the year 1933 and from 1979 to today it is a middle school named Marie de La Tour d'Auvergne. It remained under restoration from 1987. The orangery Construction work on the orangery started in the year 1657 under the direction of Jacques Cornesse. Account books attest this from the year 1658 including delivery of material for the construction. The orangery consisted of a rectangular building with a slate roof and was completed in 1659. In 1692 the Duke Charles Belgique Hollande de La Tremoille started an extension of the gardens that was terminated in 1705. It is reported in the 1790 inventory that the orangery was host to 182 tree saplings. The facade of the orangery is 66m long and is surrounded by two staircases. Some hypotheses have been made about links with the royal orangery of Versailles or the orangery of Meudon designed by Louis Le Vau due to style similarities, although none have been confirmed by a written source. When the castle was used as barracks after 1810, the orangery became a gymnasium for soldiers to train. It was then transformed into a production workshop for the prisoners in 1873, after the city made the castle available to the Ministry of the Interior to use it as a penitentiary. Different trades were developed: a carpenter's workshop in 1873, a cobbler's and a tailor's workshop in 1874, a clog-making one in 1875, a shoemaking and a "nut cracking" one in 1876. Later, in 1886 there was cooperage workshop, then in 1890 a button workshop and a corset one. In 1909 there was a net workshop and in 1912 the cycle workshop of the brand Bim's was created by Mr. Thomas and the last workshop created by Mr. Jourdan produced clogs and galoshes. However, when the prison closed in 1925, almost all workshops closed due to the loss of cheap labour from the inmates. The last ones standing were the ones from Mr. Thomas and Mr. Jourdan which finally closed respectively in 1930 and 1931, and the city did not manage to find someone to take over. In 1935, the orangery was used to accommodate Spanish refugees. After the beginning of World War 2 the factory of Charles Rusz, which produced for the French Army, moved from Asnières to Thouars in the orangery because it was too exposed to bombing. The factory was requisitioned by Germany in the summer of 1940 and produced landing gears. At this time, some workers took part in a clandestine organization, the OS-680, which aimed to mobilize public opinion, collect weapons, construct explosive devices, and sabotage factory production. After the liberation, the factory returned to normal activity until August 1945. Then it was sold to Georges Renollaud and the DOP (dispositif oléo pneumatique) to produce aviation equipment for the French Air Force, the French Navy, and aeronautic companies like Sud-Aviation until it filed for bankruptcy in March 1968. The workshop was deconstructed between 1970 and 1980 and since then it hosts events for different associations of Thouars. It is part of the restoration plan of the castle, which began in 1990.
WIKI
Talk:Tok, Alaska Wondering how to edit this U.S. City Entry? The WikiProject U.S. Cities standards might help. Just curious: why does anyone live in Tok? Section on industry or livelihoods, etc. might be helpful. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 08:05, 11 January 2009 (UTC)
WIKI
Donald Glover fans take over pro-Trump forum on Reddit, declare him 'The One True Donald' | TheHill Fans of the actor and musician Donald Glover have taken over a Reddit fan page for President TrumpDonald John TrumpFacebook releases audit on conservative bias claims Harry Reid: 'Decriminalizing border crossings is not something that should be at the top of the list' Recessions happen when presidents overlook key problems MORE in an attempt to reclaim the “Donald” name. Last week, Glover fans began posting content about Donald Glover to the fan page, or subreddit, called r/thedonald — not to be confused with the much more popular and oftentimes racist subreddit r/The_Donald. The r/thedonald subreddit, which has more than 17,000 subscribers, was previously billed as “The place where we discuss in an unbiased manner Donald Trumps great contributions to modern society,” according to Noisey. However, the description for the page now reads: “Rules: 1. Follow all reddit site wide rules.” The fans upvoted — Reddit’s version of liking — Glover content so that almost every post on the subreddit’s page is about the "Solo: A Star Wars Story" star, erasing just about any trace that the page was once about Trump. The page still features a banner with the president’s picture. The top post for the past week reads “The Donald, upvote this so that people see it when they Google ‘The Donald,’ ” and features a link to a headshot of Glover. Glover, who also performs under the stage name Childish Gambino, recently released a song titled “This is America” and an accompanying music video that has gone viral over its commentary on race and gun violence in America. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Identify TabChildGlobals in about:memory/compartment RESOLVED FIXED in mozilla22 Status () Core DOM RESOLVED FIXED 4 years ago 4 years ago People (Reporter: smaug, Assigned: smaug) Tracking unspecified mozilla22 x86_64 Linux Points: --- Firefox Tracking Flags (Not tracked) Details (Whiteboard: [MemShrink:P2]) Attachments (1 attachment) 5.35 KB, patch Justin Lebar (not reading bugmail) : review+ Details | Diff | Splinter Review (Assignee) Description 4 years ago Created attachment 715642 [details] [diff] [review] patch https://tbpl.mozilla.org/?tree=Try&rev=7b92c1f20459 Attachment #715642 - Flags: review?(justin.lebar+bug) Whiteboard: [MemShrink] It looks like this names the compartments as compartment(inProcessTabChildGlobal?ownedby=http://foobar) ? We do system principal compartments as compartment([System Principal], http://foobar) so perhaps we should stay in line with that and do something like compartment([In-process TabChild], http://foobar) ? I bet njn has an opinion too. :) (Assignee) Comment 2 4 years ago TabChildGlobal use system principal, so they should have [System Principal] (Assignee) Comment 3 4 years ago and http://... doesn't make sense. TabChildGlobals aren't really in any URL. Some page may own the element which then owns the TabChildGlobal (in case of in-process). But I can change the ID to whatever feels the best :) I rarely use about:memory/compartment so I'm not really familiar with conventions there. So the current patch gives us compartment([System Principal], inProcessTabChildGlobal?ownedby=...) ? (Assignee) Comment 5 4 years ago Yes [System Principal], inProcessTabChildGlobal?ownedBy=chrome://browser/content/browser.xul [3] More specific naming of compartments is always good... What name would these compartments have had before? How likely is the case where there isn't an "ownedBy" part? (Assignee) Comment 7 4 years ago Before the patch out-of-process tabchildglobals are just [System Principal] and in-process tabchildglobals are [System Principal|, chrome://browser/content/browser.xul which less-nicely mixes them with other system compartments. I mean, the top level chrome doc has chrome://browser/content/browser.xul as document uri, and the same is used for tabchildglobals, so they all are reported to be similar things. Whiteboard: [MemShrink] → [MemShrink:P2] > [System Principal], inProcessTabChildGlobal?ownedBy=chrome://browser/content/browser.xul [3] It's a bit ugly but I can't think of anything obviously better. Go for it. Attachment #715642 - Flags: review?(justin.lebar+bug) → review+ (Assignee) Comment 9 4 years ago https://hg.mozilla.org/integration/mozilla-inbound/rev/7c4498f0fd07 https://hg.mozilla.org/mozilla-central/rev/7c4498f0fd07 Status: NEW → RESOLVED Last Resolved: 4 years ago Resolution: --- → FIXED Target Milestone: --- → mozilla22 This change just led to bug 842710 being filed -- another case of "if we measure it, we find problems with it". Nice work. (Assignee) Comment 12 4 years ago You mean bug 844661 You need to log in before you can comment on or make changes to this bug.
ESSENTIALAI-STEM
Greg Stevens Greg Stevens may refer to: * Greg Stevens (Alberta politician) (born 1935), Canadian politician * Greg Stevens (Iowa politician) (born 1960), American politician * Greg Stevens (writer), Australian television writer
WIKI
Losing weight is difficult no matter where your deposits lay. For those who have stubborn belly fat, or hold most of their weight on their stomachs, the need to drop pounds is more than a nuisance or vanity. Belly fat, referred to as visceral fat, is a risk factor for heart disease, type 2 diabetes, as well as some types of cancers. If you are trying to lose belly fat but have found it difficult, here are some tips to help kick-start your weight loss and help you get healthy. Reduce Your Stress While not true for all people with belly fat, there is an association between people who suffer from high-stress and weight gain in the stomach and face area. This is caused by stress-induced cortisol reaction. Cortisol is the fight-or-flight hormone that is released from the adrenal gland, though it also does help with your bodys management of macro-nutrients, keeping inflammation low, helps energy levels, and affects your blood pressure, blood sugar, and sleep cycle. When you are under stress, your adrenal gland dumps cortisol into your bloodstream. Cortisol essentially ups your sugar, constricts your blood vessels, and shuts down non-essential functions so that in an emergency you can flee. The problem is, thanks to the stressors of the modern world, some people are under too much stress all the time, and have an excess of cortisol, which can lead to weight gain as cortisol increases appetite and helps you store weight. Try to remove stressors from your life to help balance your cortisol levels. Change Your Diet To help get rid of belly fat, there are certain things you should and should not eat. Do increase your soluble fibre intake, switch to a high-protein and low-carb diet, cut out sugar, and stay away from coconut oil and trans fats and instead stick to healthy fats like those from olive oil, vegetable oil, and avocados. You should also avoid alcohol; there is a reason that excess fat in the midsection is referred to as a beer belly. It is a great investment to see a nutritionist help sort out a meal plan and to consider incorporating intermittent fasting into your diet to help jumpstart weight loss. Change Up Your Exercise Routine Always consult a doctor before starting or changing your exercise routine, and if you are new to the gym or have any kind of difficulties with exercise due to bad knees, respiratory issues, or anything else then getting a personal trainer can be very beneficial. Cardio is great for burning calories and increasing endurance, and interval training is the best way to maximize your cardio and keep your body stagnate. Weight training is also important though, and resistance training in combination with aerobic training leads the greatest level of decreased belly fat. Bodycontouring with FAB Laser and Skin Care Sometimes belly fat will just not quit, especially as you get closer to meeting your weight goals. One thing that you can do is come into FAB Laser and Skin Care for a body contouring treatment. Our body slimming treatments help freeze fat away. This is a discomfort-free treatment, and you will see dramatic results in as little as two months. We also offer cellulite treatment for cellulite reduction. Contact us today!
ESSENTIALAI-STEM
, 1925–65, African American (revolutionary black nationalist ) leader in the United States, also known as El-Hajj Malik El-Shabazz , b. Malcolm Little in Omaha, Neb. He was introduced to the Nation of Islam (Black Muslims) while serving a prison term and became a Muslim minister upon his release in 1952. He rose to become the national spokesman of the Nation and quickly became very prominent in the movement, with a following perhaps equaling or greater than that of its leader, Elijah Muhammad . In 1963, Malcolm X was suspended by Elijah after a speech in which Malcolm suggested that President Kennedy’s assassination was a matter of the “chickens coming home to roost.” He then formed a rival organization of his own, the Muslim Mosque, Inc. In 1964, after a pilgrimage to Mecca, he announced his conversion to orthodox Islam and his new belief that there could be brotherhood between black and white . In his Organization of Afro-American Unity , formed after his return, the tone was still that of militant (revolutionary) black nationalism but no longer of separation. Between 1963 and 1965, Malcolm developed a close relationship Maxwell Stanford, the national field chairman of the Revolutionary Action Movement (RAM), a clandestine organization. According to papers published by Stanford and others, Malcolm agreed to serve as international spokesman of RAM. He kept it a secret because RAM international Chairman was Robert F. Williams who at the time was a fugitive in exile from the US and living in China and Cuba. In Feb., 1965, Malcolm X was shot and killed in a public auditorium in New York City. His assassins were vaguely identified as Black Muslims, but this is a matter of controversy. Malcolm believed the threat to his life was much larger than the Nation of Islam. He noted that he had been under US Government surveillance while traveling in Africa and that some of the things happening to him were beyond the capabilities of the Nation of Islam. Evidence would later surface during the investigation of the FBI’s counter intelligence program COINTELPRO showing that police/government agents had infiltrated Malcolm’s organizations to the highest levels and were present at the Audubon Ballroom in Harlem, NY, when he was assassinated.
FINEWEB-EDU
Talk:Pashtun name Article needs ciations "Pashtun names are found among the Pashtun population, and some South Asian muslims and Tajiks will carry Pashtun names, a sign of Pashtun ancestry among them, at-least patrilineal ancestry. The dardic Pashayis and Indo-Aryan Hindkowans do not speak Pashto but have 30-60% of its people being tribally Pashtuns. The assimilated communities may have traces of people with given names derived exclusively from Pashto." Is there any proof for this claim at all? I found this claim highly dubious since i've never met a tajik with a pashtun last name or that Pashis are "tribally pashtuns." Simply speaking they are their own people who just live near Pashtuns, however this does not make them Pashtun. I request the mods if i can remove this part? Akmal94 (talk) 02:41, 11 March 2015 (UTC) Someone read an article about Pashayis, and saying Pashayi's claimed to be Pashtuns speaking a special language. That's the assumption he or she deduced.Also, yes, there are communities in Afghanistan that speak persian as their mother tongue, and have Pashtun names, last names and first names as well. Like if the family name ends with a "khel" or a "zai", there's your proof. As far as South Asian Muslims concerned, their surnames might survive, like Imran Khan "Niazi" or "Tareen", "Dilazak" and "Swati". Personal names however die out very fast, within a few generations, so all these South Asian muslims have Arabic or Muslim names. I mean, Pakistani Pashtuns that still speak Pashto ,are getting rid of Pashtun names, it's annoying, but it happens. Stupid Pashtun nationalists have just pulled a stock character named "Gul Khan" which basically means a Pashtun that's a proud Pakistani, especially when Pashtun nationalists keep saying that Pakistan is at war against them. --2001:1970:5E5B:AE00:9954:BBCC:7338:14C3 (talk) 20:37, 15 October 2016 (UTC) I know i am very late to this reply but Farsi speaking Afghans with Pashtun last names are of Pashtun ancestry. Many Pashtuns have adopted Farsi (like in Kabul or Mazar) as a first language but are Pashtun like Ismail Khan or Noor Atta. My question was where is the proof that someone with a Pashto first name is of Pashtun ancestry? For example Aimal is shared among both Pashtuns and Tajiks but does not make Tajiks Pashtun or a Punjabi with the name "Shaista" as Pashtun. I want to remove that part because its makes no sense and it is not sourced. Akmal94 (talk) 04:39, 11 April 2020 (UTC) Proposed merge with Pashtuns No referencing, article seems to include original research, notability suspect Shobhit102 | talk 18:03, 25 May 2018 (UTC)
WIKI
std::experimental::pmr::polymorphic_allocator<T>::polymorphic_allocator From cppreference.com           polymorphic_allocator() noexcept; (1) polymorphic_allocator( const polymorphic_allocator& other ) noexcept = default; (2) template< class U > polymorphic_allocator( const polymorphic_allocator<U>& other ) noexcept; (3) polymorphic_allocator( memory_resource* r); (4) Constructs a new polymorphic_allocator. 1) Constructs a polymorphic_allocator using the return value of std::experimental::pmr::get_default_resource() as the underlying memory resource. 2-3) Constructs a polymorphic_allocator using other.resource() as the underlying memory resource. 4) Constructs a polymorphic_allocator using r as the underlying memory resource. This constructor provides an implicit conversion from memory_resource*. Parameters other - another polymorphic_allocator to copy from r - pointer to the memory resource to use. May not be null. Exceptions 4) Throws nothing.
ESSENTIALAI-STEM
Talk:Wesley Chapel High School April 2007 I added an infobox and removed what I thought was some non-encyclopedic content and some possibly encyclopedic content that was not cited. If I was incorrect in removing, please let me know. Thanks! --Literacola 05:50, 9 April 2007 (UTC)
WIKI
Will a CAT scan identify if I have had a Concussion? Concussions, the invisible injuries of the brain, often leave individuals puzzled, concerned, and seeking clarity about their condition. In the quest for answers, one critical question arises: Can a CAT scan identify if you have had a concussion? Computed Axial Tomography (CAT) scans, also known as CT scans work by taking a series of X-ray views at various angles to produce cross-sectional images of the bones and soft tissues inside your body. However, we’ll explore whether these scans can help detect concussions. Key Takeaways • CAT scans are not directly effective in detecting concussions because they cannot visualize the functional changes in the brain that occur with a concussion. • They are used to rule out more severe injuries like hemorrhages or contusions in the brain, especially in cases of suspected concussion with severe symptoms. • Their main limitation is the inability to detect the functional changes associated with concussions, as these scans focus on structural changes that are often not present in mild TBIs like concussions. • Alternatives for diagnosing concussions include clinical evaluation, cognitive testing, balance testing, and in some cases, MRI scans, which may offer more detail on brain structure but, like CAT scans, may not always show changes associated with concussions. Can CAT Scans Detect Concussions? Can CAT Scans Detect Concussions The short answer is: Not directly. CAT scans are excellent at detecting fractures, bleeding, or swelling in the brain—conditions that are more common in moderate to severe TBIs.  However, concussions often do not result in visible structural damage to the brain, which means they typically do not show up on these scans. Despite this, CAT scans are invaluable in emergency settings where quick visualization of potential internal injuries is crucial.  If a concussion is suspected, especially in the presence of severe symptoms, doctors may order a CAT scan to rule out more severe injuries such as hemorrhages or contusions. This is crucial because, although rare, there can be complications that require immediate attention. Furthermore, identifying other types of brain injuries can significantly influence the treatment plan and prognosis. Why Are They Used Then? CAT scans thus act as a safety net, ensuring that no stone is left unturned in the assessment of potential brain injuries. They are particularly useful in the acute phase of injury, helping to quickly triage cases that may require surgical intervention. They serve as a preliminary assessment tool, providing immediate insights that can guide further diagnostic decisions. Their high resolution allows for a clear view of bone and acute bleeding, which can be life-saving in cases of severe head trauma. Limitations of CAT Scans Limitations of CAT Scans The main limitation of CAT scans is their inability to visualize the functional changes in the brain that occur with a concussion. Concussions primarily affect brain function, which doesn’t necessarily translate to structural changes detectable by a CAT scan. Additionally, the subtle nature of concussions means that the changes are often at a microscopic level, beyond the resolution of current CAT scan technology. This highlights the need for alternative diagnostic tools that can capture the nuances of brain function and the subtle changes that occur with concussions. Understanding the intricacies of brain conditions, such as the differences between a stroke and a brain aneurysm, further emphasizes the complexity of diagnosing and treating neurological issues. As technology advances, there is hope for more sophisticated imaging techniques that can bridge this gap. Alternatives for Concussion Diagnosis Given the limitations of these scans, healthcare providers often use a combination of methods to diagnose concussions, including clinical evaluation and cognitive testing, which are also crucial in understanding conditions like high blood pressure, and coronary ailments, offering a comprehensive overview of the patient’s condition. • Clinical Evaluation: A thorough medical history and physical examination, including a neurological exam, are the first steps in diagnosing a concussion. This process often includes detailed questioning about the incident, symptoms experienced, and any previous concussions, providing a comprehensive overview of the patient’s condition. • Cognitive Testing: Tests to evaluate memory, concentration, and other cognitive functions can help identify impairments. These assessments can be repeated over time to monitor recovery, offering a dynamic view of the patient’s progress. • Balance Testing: Since concussions can affect balance, tests of one’s stability may be conducted. These tests can be quantitative, using tools like force plates, or qualitative, observing the patient’s ability to maintain or regain balance under various conditions. • MRI Scans: Magnetic Resonance Imaging (MRI) can sometimes provide more detailed images of the brain and may be used in certain cases, though like CAT scans, they may not always show changes associated with concussions. MRI scans offer the advantage of better soft tissue contrast, which can be crucial in identifying subtle changes in the brain’s structure or in chronic conditions resulting from repeated injuries. How to Move Forward After a Concussion? Moving forward after a concussion involves a careful and considered approach to ensure a full and safe recovery. Here are key steps and strategies to help individuals progress through their recovery: 1. Follow Medical Advice Follow Medical Advice • Seek Immediate Care: Initially, it’s crucial to see a healthcare provider for a proper diagnosis and personalized recovery plan. • Rest: In the first few days following a concussion, physical and mental rest is very important to reduce symptoms and help the brain heal. • Follow-Up Visits: Attend all follow-up appointments to monitor your recovery and address any ongoing or new symptoms. 2. Gradual Return to Activities Slowly and gradually return to daily activities as recommended by your healthcare provider. Avoid activities that risk another concussion. Initially, you may need to modify your workload or school assignments. Discuss adjustments with your employer or school to accommodate your recovery needs. Incorporate light physical activity as advised by your healthcare provider, avoiding contact sports or activities that could lead to another head injury. 3. Monitor Symptoms Keep track of your symptoms. Tracking your symptoms can help your healthcare provider adjust your treatment plan as needed. Seek immediate medical attention if you experience worsening symptoms, such as increased confusion, repeated vomiting, seizures, or any symptoms that concern you. 4. Cognitive Rest Cognitive Rest Reduce exposure to screens, including smartphones, computers, and television, as they can strain your brain. Alcohol and recreational drugs can slow recovery and should be avoided. Consult your doctor before taking new medications or supplements. 5. Support System Share information about concussions with your close contacts so they understand your needs and limitations. It’s common to experience emotional changes after a concussion. Talk to friends, family, or a professional if you’re feeling depressed, anxious, or overwhelmed. 6. Rehabilitation Therapies • Physical Therapy: This may be recommended if you have balance issues or dizziness. • Cognitive Therapy: Helps if you’re experiencing memory, concentration, or other cognitive issues. • Occupational Therapy: Assists in regaining the skills needed for daily living and returning to work or school. 7. Healthy Lifestyle Choices Healthy Lifestyle Eat a balanced diet rich in fruits, vegetables, lean proteins, and whole grains to support brain health. Stay well-hydrated with water throughout the day. Ensure you get enough sleep, as it plays a critical role in healing the brain. 8. Be Patient and Positive Recovery from a concussion can vary greatly among individuals. It’s important to be patient with your progress and maintain a positive outlook. Healing takes time, and rushing the process can lead to setbacks. FAQs What is the difference between a concussion and a traumatic brain injury (TBI)? A concussion is a form of traumatic brain injury (TBI), specifically classified as a mild TBI. While all concussions are TBIs, not all TBIs are concussions. TBIs can range from mild to severe, with concussions on the milder end, typically without visible brain damage on imaging tests. How long after a head injury should I wait before getting a CAT scan? The timing for a CAT scan after a head injury depends on the symptoms. For severe symptoms such as loss of consciousness, severe headache, vomiting, or confusion, immediate medical attention is necessary, and a CAT scan may be performed promptly. In cases with mild symptoms, a healthcare provider may recommend observation and only suggest a CAT scan if symptoms worsen. Can a CAT scan show past concussions? No, they can’t, especially if the person has fully recovered. They are designed to identify acute (current) conditions such as bleeding, fractures, or swelling and cannot detect the functional changes associated with a past concussion. Are there any risks associated with getting a CAT scan for a concussion? While these scans are generally safe, they do expose patients to a small amount of radiation. The risk from this radiation exposure is considered minimal compared to the benefits of diagnosing serious conditions. However, healthcare providers weigh the benefits and risks before recommending a CAT scan. Can children have CAT scans if a concussion is suspected? Yes, they can, but healthcare providers are particularly cautious about exposing children to radiation. They will recommend it for a child only if the symptoms are severe or if there is a need to rule out more serious injuries. If my CAT scan is clear, does that mean I didn’t have a concussion? A clear scan means there are no visible structural damages like fractures or bleeding in the brain, but it does not rule out a concussion. Concussions affect the brain’s function, which CAT scans cannot visualize. Diagnosis relies on a combination of symptoms, medical history, and possibly other tests. Summary While CAT scans are a valuable tool in the medical arsenal, their role in diagnosing concussions is primarily to rule out more severe injuries. The journey to understanding and recovering from a concussion involves a comprehensive approach that encompasses clinical evaluation, cognitive and balance testing, and sometimes MRI scans. If you suspect you’ve had a concussion, seeking prompt medical attention is the first step to recovery. With the right care, most people make a full recovery, stepping back into their lives with confidence and resilience.
ESSENTIALAI-STEM
Phanes (butterfly) Phanes is a genus of skippers in the family Hesperiidae. Species Recognised species in the genus Phanes include: * Phanes aletes (Geyer, 1832) Former species * Phanes tavola (Schaus, 1902) - transferred to Tava tavola (Schaus, 1902)
WIKI
Draft:History of bus service in Los Angeles The history of bus service in Los Angeles, California dates back to 1923, when a bus service began operation on Western Avenue. Since the first line began operation, bus service has served an increasingly important role in Los Angeles public transit. As of SOME DATE, bus service constitutes SOME LARGE PERCENT of ridership in WHICH GEOGRAPHY, with HOWEVER MANY NUMBER of trips taken annually. Today, the largest bus operator in Los Angeles County is Los Angeles Metro Bus. The Metro Bus brand dates to the 1993 founding of the Los Angeles County Metropolitan Transportation Authority, but many of the routes in the system are little changed from the bus routes of the prior Southern California Rapid Transit District (RTD), or the streetcar routes operated by the Pacific Electric (PE) and the Los Angeles Railway (LARy). First motor bus services The first motor bus service in Los Angeles began in 1923, operated by the Los Angeles Motor Bus Company. The initial service was on Western Avenue, from Los Feliz Boulevard south to Slauson Avenue. The service expanded quickly, with 52 mi of bus lines by 1925. Buses became the preferred method of expansion for the PE and the LARy, both of which stopped constructing new tracks shortly after the introduction of motor bus services. Consolidation and the LAMTA The Los Angeles Motor Bus Co., later renamed the Los Angeles Motor Coach Co., was one of many motor bus services founded in the early 20th century. Many were subsumed into Metropolitan Coach Lines and Los Angeles Transit Lines, the eventual successors of the PE and LARy. Some bus operators of the era, such as Santa Monica Municipal Bus Lines and Culver City Municipal Bus Lines (both founded in 1928) and Montebello Bus Lines (1931) remained independent throughout the consolidation of the mid-20th century, and still operate today. After World War II, bus services increased, as replacements for streetcar service. Trolleybus service was introduced in the late 1940s by Los Angeles Transit Lines, using a fleet of vehicles originally intended for the Key System in Oakland. In 1958, Los Angeles Transit Lines and Metropolitan Coach Lines were bought out by the Los Angeles Metropolitan Transit Authority, bringing the bulk of Los Angeles transit service from private to public ownership. The LAMTA converted all lines to motor buses, halting service on the final ex-PE line in 1961. The era of bus-only transit service in Los Angeles began in March 1963, with the conversion of the final LARy line to bus operation. SCRTD era The Southern California Rapid Transit District was created by an act of the California Legislature in 1964, and further consolidated transit services across the Los Angeles area. Its purchase of ten private bus companies created a large agency, responsible for services across Southern California, including Los Angeles, San Bernardino, Orange, and Riverside Counties. The agency, abbreviated as the RTD, changed its focus throughout its existence, spinning off its services outside Los Angeles County, and proposing multiple plans for rail transit systems in failed ballot measures in 1968, 1974, and 1976. The RTD Rapid growth of the Southern California region increased demand for bus services in the 1970s, compounded by high gasoline prices during the 1973 oil crisis. Bus ridership rose 82% from 1976 to 1980, but funding challenges, overcrowding, and fare increases challenged the RTD and its increasingly-popular bus system. The passage of Proposition A in 1980 provided funding for a rail transit system and bus operations, including a reduction of the base bus fare to $0.50,. The low fares increased ridership on RTD buses by 40% from 1982 to 1985, exacerbating overcrowding. The RTD, both a bus operator and a rail construction agency, came into conflict with the City of Los Angeles and the Los Angeles County Transportation Commission over funding and rail route selection. The RTD and the LACTC conflicted over the first steps for a rail system, and ultimately the RTD and LACTC sought to construct two separate rail lines: the RTD built the Red Line subway, and the LACTC built the Blue Line light rail line. Per the terms of Proposition A, the funding for the $0.50 bus fare program was reallocated to rail construction 1985, and the bus fare increases that followed caused ridership to drop precipitously. Founding of LACMTA The Los Angeles County Metropolitan Transportation Authority, abbreviated as Metro, was founded in 1993 from the merger of the RTD and the LACTC. It was charged with financing and constructing the rail system, operating the bus system, and allocating funding to other transportation programs in the region. The genesis of Metro, as the merger of two continually conflicting agencies, was itself the subject of conflict, with distinctions between former LACTC and former RTD employees persisting for years.
WIKI
Astrochemistry Exploring The Sun’s Birth Radius And The Distribution Of Planet Building Blocks In The Milky Way Galaxy: A Multi-zone Galactic Chemical Evolution Approach By Keith Cowing Status Report astro-ph.GA October 21, 2023 Filed under , , Exploring The Sun’s Birth Radius And The Distribution Of Planet Building Blocks In The Milky Way Galaxy: A Multi-zone Galactic Chemical Evolution Approach Time evolution of the elemental abundances [X/Fe] for O, Mg, Si, and C against [Fe/H] for 푅 = 8 kpc in the models with different SNeII yields. Solid (green) lines represent our fiducial model with the ad hoc prescription; dashes (red) lines Nomoto et al. (2013) yields (N13); dash-dotted (blue) lines Nomoto et al. (2013) with hypernovae (fraction is 0.5) yields (N13+HN); dotted (magenta) line Chieffi & Limongi (2004) yields (CL04); dosh-dot-dotted (orange) lines Limongi & Chieffi (2018) yields (LC18). The observational data sources are the same as those used in Fig. 3. The large circles (red) represent the Sun’s values. — astro-ph.GA We explore the influence of the Milky Way galaxy’s chemical evolution on the formation, structure, and habitability of the Solar system. Using a multi-zone Galactic Chemical Evolution (GCE) model, we successfully reproduce key observational constraints, including the age-metallicity ([Fe/H]) relation, metallicity distribution functions, abundance gradients, and [X/Fe] ratio trends for critical elements involved in planetary mineralogy, including C, O, Mg, and Si. Our GCE model suggests that the Sun formed in the inner Galactic disc, Rbirth,⊙≈5 kpc. We also combined a stoichiometric model with the GCE model to examine the temporal evolution and spatial distribution of planet building blocks (PBBs) within the Milky Way galaxy, revealing trends in the condensed mass fraction (fcond), iron-to-silicon mass fraction (firon), and water mass fraction (fwater) over time and towards the inner Galactic disc regions. Specifically, our model predicts a higher fcond in the protoplanetary disc within the inner regions of the Milky Way galaxy, as well as an increased firon and a decreased fwater in the inner regions. Based on these findings, we discuss the potential impact of the Sun’s birth location on the overall structure and habitability of the Solar System. Junichi Baba (Kagoshima/NAOJ), Takayuki R. Saitoh (Kobe), Takuji Tsujimoto (NAOJ) Comments: 15 pages, 10 figures. Accepted for publication in MNRAS Subjects: Astrophysics of Galaxies (astro-ph.GA); Earth and Planetary Astrophysics (astro-ph.EP); Solar and Stellar Astrophysics (astro-ph.SR) Cite as: arXiv:2310.10335 [astro-ph.GA] (or arXiv:2310.10335v1 [astro-ph.GA] for this version) Submission history From: Junichi Baba [v1] Mon, 16 Oct 2023 12:19:44 UTC (1,817 KB) https://arxiv.org/abs/2310.10335 Astrobiology, Astrochemistry Explorers Club Fellow, ex-NASA Space Station Payload manager/space biologist, Away Teams, Journalist, Lapsed climber, Synaesthete, Na’Vi-Jedi-Freman-Buddhist-mix, ASL, Devon Island and Everest Base Camp veteran, (he/him) 🖖🏻
ESSENTIALAI-STEM
Foods To Avoid When Building Muscles: The Link You Should Know Methodology If you want to build muscle, please stay away from these foods, when building muscles, you should not only go full throttle in your training but also pay full attention to your diet. There is a lot of truth in the saying that abs are made in the kitchen, because you can quickly ruin your great workout by putting the wrong things on your plate. To achieve success in your workout, you must be intentional to part away with these foods. Light Drinks It sounds tempting, no sugar, no calories, maximum taste, but it is precisely in this advertising content that the problem lies. To make the light drinks taste delicious, it is prepared fully pumped with sweetener, flavor, colors and other synthetic additives. These particular Ingredients look strange and confusing to the body, the body mechanisms suggesting the presence of energy, of which that is not the case in the real sense of it. As a result, the insulin level skyrockets and only then falls back again without performing any function. Implication of this is food craving, which in the long term leads to more consumption of calories. No substantial growth can occur as long as your hard earned muscles are hidden under a stubborn layer of fats, there will never be any positive result even after a toughest workout. Finished Products The same is also applicable to finished products, when strength training you should pay particular attention to eating functionally through careful selection of your calories intake, your food nutritional values and your personal needs. This can never be easily achieved with finished products, as they are also full of unhealthy fats, sugar, flavor, enhancers and empty calories.  Best Practices Compose your meal from unprocessed meals and season sparingly, use high quality protein rich foods such as quark, eggs or poultry before you indulge in completely over sweetened sugar  shakes which usually not only have more calories but also contain less protein than most other natural protein products. Training medication and a balanced diet without guidance and knowledge will do more harm than good when we try to build muscle. Alcohol This remains the enemy when trying to build muscles and losing weight. Beer, wine etc, not only have a lot of calories but also paralyze fat metabolism. Regular alcohol consumption affects the hormone levels which can inhibit the growth of muscles. Worst still, high quantity of energy is needed by the body to breakdown alcohol Alcohol Isotonic Drinks Iso drinks are often marketed as sport drinks, but the high calories energy sources are not suitable for any athlete. If your primary need is to build muscle, you definitely don’t need iso drinks, as strength training doesn’t put as much strain on your electrolytes store as endurance sports. During strength training you should only drink water, by the way, milk and protein drinks are not even at all suitable for replenishing your water reservoir Sweets Unfortunately sweets that are full of sugar and fats are only food for your belly and not for your six packs, because the body can’t do much with this type of energy. In addition, the simple carbohydrates are digested quickly. Your body sugar level skyrockets only to then plummet rapidly, just like the case of light drinks that subjects your insulin to empty function and thereby increasing your food craving. Satisfy your sweet appetite with fruits in combination with protein rich in dairy products such as quark or cottage cheese. It is best to treat yourself to this treat before training, this will help you to gain full energy from the carbohydrates in the fruits while on the dumbbells. Wheat Flour For the love of your muscles you should avoid wheat flour and instead use whole grain products. The high glycemic index in wheat products also causes your blood sugar levels to rise briefly, only to drop shortly afterwards. This is due to the short chain, easily digestible carbohydrates which provide  quick energy but do not provide your body sustained energy. Wheat Flour Conclusively, be disciplined and carefully select what you consume, how you consume and when to consume them. Since your muscles need constant food, you should use high-fiber options such as brown rice, whole grain pasta or brown bread. With these options, your intention to build muscle will be favorably achieved. Conclusion When trying to build muscle, it’s important to focus on eating plenty of protein and nutrient-dense foods. However, there are some foods that can hinder muscle growth, like processed snacks, sugary drinks, alcohol, and fried foods. Avoiding these and sticking to lean proteins, fruits, vegetables, and whole grains will help maximize your muscle gains through proper nutrition. Dr. Jun Ren is a dedicated and experienced registered dietitian and nutritionist who is committed to helping people achieve their health goals through personalized nutrition plans. With a passion for promoting healthy eating habits and preventing chronic diseases, Dr. Ren has been able to assist numerous clients in improving their overall quality of life. Leave a Comment
ESSENTIALAI-STEM
Page:Impressions of Theophrastus Such - Eliot - 1879.djvu/314 organism, so to speak, limbs immeasurably more powerful, ever more subtle finger-tips, ever more mastery over the invisibly great and the invisibly small. Each new machine needs a new appliance of human skill to construct it, new devices to feed it with material, and often keener-edged faculties to note its registrations or performances. How then can machines supersede us?&mdash;they depend upon us. When we cease, they cease." "I am not so sure of that," said I, getting back into my mind, and becoming rather wilful in consequence. "If, as I have heard you contend, machines as they are more and more perfected will require less and less of tendance, how do I know that they may not be ultimately made to carry, or may not in themselves evolve, conditions of self-supply, self-repair, and reproduction, and not only do all the mighty and subtle work possible on this planet better than we could do it, but with the immense advantage of banishing from the earth's atmosphere screaming consciousnesses which, in our comparatively clumsy race, make an intolerable noise and fuss to each other about every petty ant-like performance, looking on at all
WIKI
All these personal electronic devices are powered by lithium ion batteries All these personal electronic devices are powered by lithium ion batteries An AvSax lithium battery fire containment bag An AvSax lithium battery fire containment bag The last place you’d want a lithium battery fire is in the confined space of an aircraft The last place you’d want a lithium battery fire is in the confined space of an aircraft Why do lithium batteries overheat, catch fire and even explode? Here’s a simple guide as to why lithium batteries catch fire. They now power all our personal electronic devices including mobiles phones, vapes, laptops, iPads – the list is endless – but they can and do go wrong. When that happens they overheat and can catch fire or even explode. But how and why do lithium batteries catch fire? Well, inside every lithium battery are two electrodes – one negative and one positive – separated by a thin sheet of plastic. When the battery is powering a device the lithium ions are pushed from the negative to the positive electrodes through the permeable plastic separator. When the battery is being charged up the lithium ions go the other way from the positive to the negative. The problem happens when the plastic separator fails which allows the two electrodes to come into contact with one another and overheat. At this point all the electricity is suddenly released with the super-charged heat quickly passing from cell to cell in a process called thermal runaway. This happens incredibly quickly and produces exceptionally high temperatures  – up to 900°C (1652°F) – which can even be enough to cause the battery to explode. A more technical term some use for this is ‘venting with flame.’ The tell-tale signs that a battery is about to go into thermal runaway include the device feeling hot to touch, swelling, cracking or giving off  a toxic, burning smell. A lot of these fires are caused by the device being powered by cheap batteries or chargers bought on the internet that don’t meet safety standards. It can also happen if the device becomes damaged – perhaps dropped or crushed. One of the riskiest places this can happen is in the confined space of a passenger aircraft. The airlines are now so concerned, warnings about lithium batteries have become part of the safety briefing. Cabin crew urge passengers to let them know immediately if the device starts to overheat or emit smoke or if passengers have lost their phones in their seats. The fear is if they move their seat to try to find the missing phone they may accidentally crush it, sending the phone into thermal runaway. This is why safety-conscious airline operators now have special lithium battery fire containment bags on board and the best-selling one by far is the award-winning AvSax (www.avsax.com) which are now on more than 16,770 aircraft operated by over 100 airline companies worldwide. They have been used 33 times to deal with emergencies since the start of 2017 and every time they have been deployed the aircraft has been able to complete its journey safely with no need to divert or make an emergency landing. AvSax, invented by UK-based Environmental Defence Systems, won the prestigious Queen’s Award for Enterprise in the UK in 2018, the highest award any business can get. Many air ambulance helicopters in the UK now carry AvSax. More than 20 helicopters operated by specialist aerial emergency medical services company Babcock were equipped with AvSax following a detailed look into the possible risks posed by lithium-ion batteries on aircraft. The danger posed by lithium batteries means they must always be carried in the cabin so the crew can deal with any fire should the worst happen. They must never be in the luggage hold as automatic fire suppression systems could struggle to cope with a fire of such intensity. The batteries and devices would be surrounded by clothes and other combustible materials so any fire could quickly take hold.
ESSENTIALAI-STEM
Page:Dictionary of Greek and Roman Biography and Mythology (1870) - Volume 2.djvu/663 Rh JULIAN us. ism to Christianity, as well as his enthusiastic love of the new Platonic philosophy. 3. 'Evae§ias TTJs fiaaiiSos 'EyKd/miou, an encomium on the em- press Eusebia, the patroness of Julian : ed. Peta- vius, Paris, 1614, 8vo. 4. Els tqv fiaaiia"HXioy, an oration on the worship of the sun, addressed to Sallustius, his old military councillor and friend, first in Gaul and afterwards in Germany : ed. by Theodoras Marcilius, Paris, 1583. 8vo. ; by Vin- centius JNIarinerius, Madrid, 16"25, 8vo. 5. Els TTju fj.7)r€pa Tcov ©ecoi', an oration on the mother of gods (Cybele) : Julian visited the temple of Cybele at Pessinus, and restored her worsliip. 6. Els Toiis diraidevTovs Kvuas ; and 7. Upos 'Bpd- K€iov KwiKOf^ Trepl rov thus Kvviarcov, Kal et vpeirei r(f< KvvX fxidovs TrpaTreiu, two orations on true and false Cynicism, the latter addressed to the Cynic Heracleius. 8. 'Eirl rf/ e^oSqu tov dyadw- rdrov 'Xa.WovaTiov Trapajj.vQ-qriKos^ a letter to the aforesaid Sallustius, in which he consoles himself and his friends on the recal of Sallustius, by the emperor Constantius, from Gaul to the East. 9. A letter, or more correctly dissertation, addressed to his former tutor, the pliilosopher Themistius, on the difficulty the author thinks he would experience in showing himself so perfect an emperor as Themis- tius expected. III. Otlier Worlis. 1. Kaiaap^s ^ 'Zv^iroaiov^ the " Caesars or the Banquet," a satirical com- position, which Gibbon justly calls one of the most agreeable and instructive productions of ancient wit. Julian describes the Roman emperors ap- proaching one after the other to take their seat round a table placed in the heavens ; and as they come up, their faults, vices, and crimes, are cen- sured with a sort of bitter mirth by old Silenus, whereupon each Caesar defends himself as well as he can, that is, as well as Julian allows him to do; but in this Julian shows much partiality, especially towards Constantine the Great and other members of the imperial family. Alexander the Great also appears. He and other great heroes at last ac- knowledge that a royal philosopher is greater than a royal hero, and the piece finishes with a great deal of praise bestowed upon Julian by himself. There are many editions and translations ot this remarkable production. Of these, the most im- portant are the text with a Latin translation by C. Cantoclanis, Paris, 1577, 8vo., the Editio Piiii- ceps; the aaue,Ibid. 1583, 8 vo.; the same, corrected by Frederic Sylburg, in the third volume of his Romanae Historiae Scriptores Minores, and sepa- rately, Frankfort, 1 590, fol. ; by Petrus Cunaeas, with an elegant Latin translation, Leyden, 1612, 12mo., 1632, 12mo. ; the same with the notes of Cellarius, Leipzig, 1693, 8vo., 1735, 8vo. The best editions are by J. M. Heusinger, Gotha, 1736, 8vo., 1741, 8vo., and by Harless, the editor of Fabricius, Bibl. Graeca, Erlangen, 1785, 8vo. An English translation of the Caesares, the Misopogon, and several other productions of Julian, is contained in " Select Works of the Emperor Julian, and some Pieces of the Sophist Libanius, &c., with Notes from Petav, La Bleterie, Gibbon, &c., and a translation of La Bleterie 's ViedeJovien, by John Duncombe," London, 1784, 8vo. Several French, German, Italian, and Dutch translations are mentioned by Fabricius. 2. 'AvTioxiKos ri Miffoiruiyaiv^ "the Antiochian, or the Enemy of the Beard,"a severe satire on the licen- tious and eifeminate manners of the inhabitants of JULIANUS. Gi9 Antioch, with occasional ironical confessions of the author's own faults, who was induced to write this amusing piece during his stay at Antioch, as men- tioned above. Julian chose the title Miaonwywv because the inhabitants of Antioch, being accus- tomed to shave themselves, ridiculed Julian, who allowed his beard to grow, in the ancient fashion. Editions : by Petrus Martinius, Paris, 1567, 8vo., 1583, 8vo. ; by H. I. Lasius, together with the Caesares, and a German translation of both, Greifs- wald, 1770, 8vo. ; there are also English, French, and German translations of the Misopogon. The following English translations of some of the minor productions of Julian are worthy of mention: " Julian's Letter to the Bostrens," translated by the Earl of Shaftesbury, in his " Characteristics," London, 1733, 12mo. ; two Orations of the Em- peror Julian, viz. to the Sun, and to the Mother of the Gods, with notes, &c.. London, 1793, 8vo. The English literature is rich in works on Julian. IV. Poems. Three epigrams of little import- ance, in the " Anthologia Graeca," and a fourth, discovered by Boissonade, in the " Analecta,'' and in Heyler's edition of Julian's Letters. V. Lost Works. The most important is, Kard. XpiarTiaucov, a refutation of the Christian religion, in seven books, according to Hieronymus, al- though Cyrill only speaks of three. These three books were directed against the dogmatical part of the Christian religion, as contained in the Gospels ; and it is against this part of the work that Cyrill wrote his famous work 'TTrep TTjy rwv Xpicrria- vwv ivayovs Bp7]aKelas, irpos rd rou Iv dOeoLS ^lovXiavov, which is separately printed in Spanheim's edition of the works of Julian. All the copies of Julian's work which could be found were de- stroyed by order of the emperor Theodosius II., and the whole would have been lost for ever but for Cyrill, who gives extracts from the three first books in his refutation of Julian. But these extracts are far from giving an adequate idea of the work. Cyrill confesses that he had not ventured to copy several of the weightiest arguments of the author. The Kard Xpiariafwv was likewise refuted by Apollinaris, whose Aoyos inrep d]deias KaTd 'lovAcavov, however, is lost, as are the refutations of Photius and Philippus of Sida. The marquis d'Argens, a chamberlain to Frederic the Great, king of Prussia, translated the extracts made by Cyrill, and tried to complete them, according to^ some, at the suggestion of his master. The title of the translation is, " Defense du Paganisme par PEmpereur Julien, en Grec et en Fran9ais," &c. &c., Berlin, 1764, 8vo. ; lb.' (Geneva), 1768, 8vo.; lb. 1769, 2 vols. 8vo. The marquis was any thing but a Christian, and his opinions on Julian and Paganism were attacked by G. F. Meier in his " Beurtheilung der Betnachtungen des Marquia d'Argens liber Julian," Halle, 1764, 8vo. ; by W. Crichton,"Betrachtungen ii her den Abfall Julian's;" and by others. Other lost works of Julian are : Uepl rwp Tpmu (rxV/J-druv ; Ilepi tov irodep rd KttKa Kard roiJs d-rraiSevTovs ; Td /coAou/Lteva Kp6via ; Memoirs on his Campaigns in Gennany ; his Journal, in which he used to write down the events of every day ; and others, especially many letters. Julian composed his works in the following chronological order: — The Encomia on Constantius; the Encomium on the Empress Eusebia, not before A. D. 356 ; the Letter to Sallustius, in a. d. 360 j
WIKI
Zimbabwe inflation almost doubles, stirring memories of economic chaos JOHANNESBURG/LONDON (Reuters) - Prices of cooking oil and other basics soared in Zimbabwe as inflation nearly doubled in June, data showed on Monday, piling pressure on a population struggling with shortages and stirring memories of economic chaos a decade ago. Annual inflation hit 175.66%, up from 97.85% in May, statistics agency ZIMSTATS said - the highest rate since runaway money-printing and associated hyperinflation forced the country to abandon its currency in 2009. The figures cast a shadow over President Emmerson Mnangagwa’s bid to revitalise an economy that suffered decades of decline and bouts of financial chaos under veteran leader Robert Mugabe’s near four-decade rule. Abrupt changes in monetary policy and dire economic readings, some dating back to before Mnangagwa took over in 2017, have spooked locals and investors alike. “The economy is in bad shape and conditions continue to worsen,” said Jee-A van der Linde, economist at NKC African Economics. “There is no doubt that the economy is going to suffer a contraction this year.” On a month-on-month basis, the consumer price index rose 39.26% in June compared to 12.54% in May, ZIMSTATS said - nearing the monthly 50% figure that would mark the start of hyperinflation. Prices of basic goods from sugar to cooking oil to building materials soared during the month as much as 200%, the agency added, as the local currency fell. (GRAPHIC: Zimbabwe inflation - tmsnrt.rs/2jQmqb7) Zimbabwe abandoned its currency after inflation peaking at 500 billion percent in 2008 wiped out pensions, savings and any vestiges of confidence in the unit. The southern African state then experimented with a few forms of tenders from quasi currency bond notes to electronic iterations, though foreign currencies such as the U.S. dollars and South African rand dominated local transactions. But in June, Mnangagwa’s government surprised the market when it brought back a national currency - making the interim unit the sole legal tender, renaming it the Zimbabwe dollar and banning the use of foreign currencies for local transactions. The new sole tender ZWL= has tumbled 27.9% percent since then, lingering at 8.77 against the dollar in official exchanges on Monday. Exchange rates on the black market showed the pressure even more: the greenback fetched 10.5 Zimbabwe dollars on Monday. (GRAPHIC: Zimbabwe's currency weakens - tmsnrt.rs/32kybb0) Zimbabweans have continued to suffer shortages of hard currency, fuel and bread in recent years. Public anger burst out into street protests in January. With a vast chunk of economic activity being in the informal sector, many analysts suspect the inflation numbers are significantly understated. “If things continue to deteriorate like they have, it is probable that prices can snowball into a hyperinflation scenario,” van der Linde said. The government is under pressure to raise wages for its workers and its offer of an average increase of 97 Zimbabwe dollars ($11) a month, was rejected by unions last week as too little. Finance Minister Mthuli Ncube said last week he expected the monthly inflation rate to start to fall from October. While one-off effects would have skewed the latest numbers, analysts have warned that inflationary pressures will remain high, particularly at a time when the government is having to step up food imports to cope with a severe drought. “What’s not clear is if the government really does have a handle on the budget,” said Charles Robertson at Renaissance Capital. “If it does, the monthly inflation rate could fall abruptly. If not, continued currency depreciation and more inflation are inevitable.” Editing by Andrew Heavens
NEWS-MULTISOURCE
User:Osakabrash/sandbox Transact24 is a Wan Chai, Hong Kong-based Internet payment services company. It was founded in 2006 by a Swedish Venture Capital entity and staff and Hong Kong was chosen as its home in order to take advantage of the emerging Chinese online market. Philip Meyer has acted as Executive Chair and Managing Director of T24 since establishing the company. Overview T24’s head office is in Hong Kong, but the company has operations, technical, and support centers in Zhuhai, China and South Africa as well. Regional satellite offices and/or service entities are also located in Australia, Singapore, Mauritius, Gibraltar, Saipan, Austria, the United Kingdom, Indonesia, Macau, and the United States. The company’s staff is a mix of Chinese and Western staff. In January 2016, Net 1 UEPS Technologies, Inc. (Net1), a payment processing company in South Africa and the Republic of Korea, acquired the remaining 56% of T24’s shares, after having acquired 44% of T24 in May 2015. Since January 2016, T24 has operated as a subsidiary of Net1.
WIKI
T2 tumors larger than five centimeters in diameter can be upgraded to T3 in non-small-cell-lung cancer Emanuela Carbone, Hisao Asamura, Hidefumi Takei, Haruhiko Kondo, Kenji Suzuki, Etsuo Miyaoka, Ryosuke Tsuchiya, Giovanni Motta 研究成果: Article査読 50 被引用数 (Scopus) 抄録 Objective: Among the TNM criteria, tumor size is a well-assessed factor in the prognosis of small tumors. A 3-cm cutoff point separates T1 from T2 tumors, whereas a size larger than 3 cm is not ascribed any prognostic value. Instead, N2 is considered to be the worst prognostic factor for intrathoracic extended disease. Method: The prognosis of 545 patients with non-small cell lung cancer larger than 3 cm in diameter (T2, T3, and T4) was studied. These tumors were completely resected by pneumonectomy (n = 126) or lobectomy (n = 411) or were partially resected (n = 8). Survivals were compared according to the following factors: tumor size (3.1-5 cm, 5.1-7 cm, >7 cm), nodal status, age, sex, histologic type, degree of pleural involvement, operative procedure, stage, and T factor. For the multivariate analysis, the Cox proportional hazard model was used with the same variables. Results: The univariate analysis showed that age, sex, degree of pleural involvement, operative procedure, tumor size, nodal status, and stage were all significant prognostic factors. Further comparison of survival between different tumor sizes (≤5 cm vs >5 cm) in the same nodal category demonstrated a significantly poor prognosis for larger tumors in NO (P = .00374) and N2+N3 (P = .0157), but not in N1 (P = .3452). T2 tumors (n = 349) were divided, according to size, into T2a (n = 238) and T2b (n = 111), and survival was compared with those in T3 and T4. The 5-year survivals were 51.3%, 35.1%, 47.8%, and 25.3%, respectively. The difference between T2a and T2b was statistically significant (log-rank P = .0170, Breslow P = .0055). Conclusions: A tumor size of more than 5 cm in diameter was indicative of a poor prognosis in non-small cell lung cancer, because patients with T2b tumors had a significantly different survival from that of patients with T2a tumors, and the survival curve was located between those for patients with T3 and T4 tumors. Consequently, T2b might be upgraded to at least T3. 本文言語English ページ(範囲)907-912 ページ数6 ジャーナルJournal of Thoracic and Cardiovascular Surgery 122 5 DOI 出版ステータスPublished - 2001 11 1 外部発表はい ASJC Scopus subject areas • Surgery • Pulmonary and Respiratory Medicine • Cardiology and Cardiovascular Medicine フィンガープリント 「T2 tumors larger than five centimeters in diameter can be upgraded to T3 in non-small-cell-lung cancer」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。 引用スタイル
ESSENTIALAI-STEM
Talk:Rape/Archive 26 Semi-protected edit request on 17 October 2022 The etymology should also referred to “bringing pleasure to” because at this time men thought they were bringing pleasure to the other person because they thought the other person “really wanted it” and since the other person climaxed against their will through stimulation, not pleasure; the term was written by men for men in a man’s world that only they created languages - which weren’t inclusive in much of the world - women were largely seen as a commodity and property, as a second rate citizen or below that. i.e. the etymology of the word “man” meant “the hand which held intellect and knowledge” aka why men created the word “woman” People are often misinformed and lead to think or assume the word “wo” is derived from the word womb which it is not. The etymology of “wo” meant “wife of man” and “man” being “the hand which held intellect and knowledge“. Girls were raised to become a wife. (Girl you’ll be a woman soon) * read/audible The indignities of being a woman** Thank you 🙏 Ferrari Unicorn (talk) 12:44, 17 October 2022 (UTC) Following Ferrari Unicorn (talk) 12:45, 17 October 2022 (UTC) * Red information icon with gradient background.svg Not done: please provide reliable sources that support the change you want to be made. It looks like the current prose is well sourced. ScottishFinnishRadish (talk) 13:10, 17 October 2022 (UTC) Heavy United States emphasis The article has a heavy American emphasis. Some facts are specifically written that they apply in the United States, so there is no general information. Crucially, other facts stated as general, but actually apply to the United States. The majority of women live under rape laws that follow a coercive-model and/or always allow marital sex (see sexual consent). Following the information in the article may lead to being misled about what someone needs to do in a sexually risky situation or in seeking justice. Travelmite (talk) 00:17, 15 December 2022 (UTC) Issue with images on page There are numerous issues with the graphs and plots in this article. I have mentioned one case in the "Lead image" section on this talk page. Here are some further issues: * "Non genital injuries to women who are sexually assaulted.PNG" has no citation for where the data was sourced from; the file page simply says "own work". What populations does the data apply to; people in the USA? Worldwide? Those who live in British overseas territories? It is also not clear what time periods these statistics range over; the year 2011? The decade 1990-1999? I think this image should be removed from the article. * "Rape perpetrator pie chart.PNG" likewise does not say what populations the statistics apply to nor which time periods the statistics range over. This image does cite a textbook (author: Gary F. Kelly), but does not cite which pages the info was taken from. This image is also used on the page Marital rape#Prevalence where the description box in the article says the data is from "a study cited by Gary F. Kelly". Is this an appropriate source for Wikipedia? If not, the image should be removed. If it is, I think the image should be removed until it can be updated with the relevant information on population and time frame. The Elysian Vector Fields (talk) 00:23, 29 September 2022 (UTC) * "Rape Rate.png" claims to take data from "UNODC : Rape Rate Per 100,000 Population (2011)", this is the extent of the reference. I am having difficulty finding the source of this data. The choice of countries to represent in the image also seems arbitrary. Unless this can be properly sourced the image should be removed. * After no further feedback from the community I have decided to remove the images Non genital injuries to women who are sexually assaulted and Rape perpetrator pie chart. The images were removed for the reasons listed above. I do wish to note that the "Relationship to perpetrator" image notably stated 4% of perpetrators were strangers which is inconsistent with the text of the article; under the "statistics" section it is stated that "7 out of 10 cases of sexual assault involved a perpetrator known to the victim". The Elysian Vector Fields (talk) 01:58, 30 March 2023 (UTC) Additional facets to elaborate upon Consideration should be given to including these aspects of the topic, seemingly little or indirectly referenced, or not referenced at all: - The ludicrous improbability that the mean figure - for reporting, given as Lithuania at 6.3/100,000/year, is other than a gross under-estimation of the true rate of occurrence, as distinct from the rate of reporting. - The recent public discourse - in much of the West at least - of the distinction and importance of the notion of "enthusiastic", and otherwise "less than enthusiastic" consent, as it relates to consent, and consequent criminal culpability. - The near ubiquitous poor public understanding of the topic generally. To wit, my personal experience that, when pressed, very many persons of both sexes reveal a limited and wholly inadequate, unsatisfactory and insufficient understanding of what constitutes sexual assault, and the confounding effect this has on people's perceptions and views of the issue. Namely, it's not generally understood that any conduct whatever that could be construed as of a sexual nature, that another party does not consent to, and which you nevertheless persist in, constitutes - prima facie - a sexual assault. When queried people almost invariably, and inappropriately, describe sexual assault (or rape) in specific terms, and not with a more appropriate general characterisation, as given above. <IP_ADDRESS> (talk) 05:52, 9 April 2023 (UTC) * If you believe you have verifiable sources which bear on the issue at 91), you should edit the text and include them. * The third issue is more pertinent to the separate WP article on Sexual Assault and should be raised on the talk page there. Sbishop (talk) 09:19, 9 April 2023 (UTC)
WIKI
Jon Spector Jonathan Spector is the former president and CEO of The Conference Board, and currently a senior advisor to the organization. Spector, a graduate of Wesleyan University and Harvard Business School, joined The Conference Board after serving as vice dean of The Wharton School at the University of Pennsylvania. During his tenure at Wharton, Spector was responsible for the significant growth and strategic repositioning of the school's executive education activities, and for strengthening Wharton's involvement in book publishing, globalization and collaborations across the university. Before joining The Wharton School he spent 20 years with McKinsey & Company, where he was a senior partner in the firm. He serves on the board of directors of The Demand Institute, The Conference Board of Canada, and the March of Dimes Foundation. He is the co-author of We Are Smarter Than Me (2007), which highlights the ways in which businesses can harness the power of collective intelligence.
WIKI
Page:Economic History of Virginia Vol 1.djvu/658 which place they were to remain at anchor at least twenty-four hours, expressly included servants in its provisions, because to permit the bulk of a cargo to be broken, so far as the personal merchandise on board was concerned, was to encourage its being broken in the case of ordinary goods by furnishing the amplest opportunity for this to be done. This Act of Assembly did not include in its scope either the Eastern Shore or York River. It was afterwards repealed on account of the serious inconvenience which it produced. The merchants were strongly opposed to its continuation because it increased the cost of a voyage to Virginia by prolonging the delay in the discharge of a cargo, and the planters objecting to it because they were indirectly compelled to recoup the traders for this additional expense. In all the abortive laws which were afterwards passed to establish ports, servants were required to be landed in these ports along with ordinary merchandise. When a large proportion of servants on board of a ship arriving in Virginia were consigned under indenture to planters named in the bills of lading, the vessel either proceeded directly to the landings of these planters, or to some general port where it could be conveniently reached by them. Special instructions were given to Berkeley in 1611, that no passengers of this class were to be turned ashore until their masters had been informed of their presence and had been allowed ample time to send for them.
WIKI
Does Smoking Affect Botox Results?  In Botox Smokers are often aware of the negative effects of smoking. Outside of the risks of wrinkles, disease, and even dental health, smoking does have another surprising effect when it comes to Botox. Many smokers who consider Botox do so because of the wrinkles that have developed as a result of smoking, but will find that Botox might not be the right solution for them. This is what you need to know about smoking and Botox. Smoking Reverses Benefits To begin with, if you have already received Botox injections and you are a smoker, smoking will shorten the results of your Botox. While it will not undo the effects immediately, you will find that Botox does not have the same positive results as it does for non-smokers. What this means, is that when Botox lasts the average person three to six months, that does not include smokers. Instead, a smoker will go through the Botox much quicker, reversing the effects in little time. Healing Time Takes Longer Another consideration that you should know before you have Botox is that it will take you longer to recover from the Botox treatment if you are a smoker. Sometimes there is slight bruising on the face from where the injections are placed, but bruising is more likely to happen and is more noticeable with smokers. Smoking causes harm to your immune system and overall health, which means that you are more likely to have side effects from Botox if you are a smoker. Smoking Defeats the Purpose of Botox If you are a smoker who is considering Botox, think about the reasons that you want to receive the treatment. If it is because you are suffering from smokers lines around your mouth, Botox is not going to help you if you continue to smoke. You will still be making the same pucker movement with your mouth, further deepening the lines. Botox is a great choice to relax the muscles that are working hard at pulling wrinkles around your face. But if you are forcing those muscles to move that way regardless, Botox really cannot help you make them go away. There is a Perk While it might seem hopeless if you are smoker considering Botox injections, there actually is a benefit to receiving Botox as a smoker. If you are focusing on the pucker lines around your mouth from smoking and have the injections focused right in that area, you will find that it is more challenging to smoke and pucker if enough of the muscles have been hit. Having a barrier to help remind you not to smoke can be used as an advantage to help you quit smoking. If you receive Botox as a smoker, but then stop; you will not experience the same adverse effects as those who continue to smoke even after receiving the injections. Botox can be used as a tool to help you quit smoking, improving your health while helping reduce your wrinkles. We all know how damaging smoking is our bodies. If you are a smoker and want to have Botox, you really should consider quitting for your overall health and longevity as well as the ability of having successful Botox treatments. If you have no intention of quitting and still want Botox, be prepared for the side effects and you need to understand that you will have to have the injections repeated more often than non-smokers do. Instead, you should seriously consider quitting smoking and use Botox as a tool to help you get rid of those smoker lines and keep them away.
ESSENTIALAI-STEM
User:Hamdullah tolo/sandbox Nangarhar Cricket Academy (NCA) established in Nangarhar province, Jalalabad city, in 2009. The first and pioneer cricket academy in private sector in Afghanistan. Before, only National Cricket Academy of ACB was available for our national heroes in Kabul city, while most of the player were belonging to Nangarhar. NCA has backbone role in Afghan cricket development. It has introduced many players to National team, U19, U17, U16 and state level cricketers so far. It has been in the service of national players since 2009, major camps and training sessions for National team, U19 and other young teams has been offering by NCA. It has a wide, opened and 30,000 sq. m greened area in the heart of city. Among six turf wickets, a cement concrete pitch is also available. All cricketing services are available in NCA, it is the second home for cricket in Afghanistan after ACB.
WIKI
Edward Litton Edward Litton may refer to: * Edward Litton (1787–1870), Irish Member of Parliament (MP) for Coleraine 1837–1843 * Edward Falconer Litton (1827–1890), Irish Member of Parliament for Tyrone 1880–1841 * Ed Litton (Harry Edward Litton Jr., born 1959), president of the Southern Baptist Convention 2021-
WIKI
Edit Article wikiHow to Face Your Fear of Thunderstorms Four Parts:Understanding thunderstormsGetting supportDistracting yourselfBlocking the noise and lightCommunity Q&A It is a primal fear, that feeling of fear that creeps over one in the face of raw thunder. The sound sends a chill down to the very marrow of your bones, splitting asunder your usually calm exterior and leaving you trembling, afraid, and in need of flight. To cope with your fear of thunderstorms, learn the following techniques and stop dreading the next storm. Part 1 Understanding thunderstorms 1. 1 Do some research on thunderstorms. If you do your research, you'll find that thunderstorms aren't as scary as they seem. Few accidents as a result of lightning strikes occur, especially for those indoors. Lightning will always strike the nearest electrically conductible object in its vicinity, and if you're indoors, that is most definitely not you. 2. 2 Be informed. Watch a local weather channel and see how strong the storm is and if it's moving out of your area. Part 2 Getting support 1. 1 Get reassurance from your friends and family. If they tell you there's nothing to be afraid of, then believe them. It's true. Remember, it's just a bunch of noise that seems like it's trying to scare you. If you fall for it, you'll just get more and more scared every time. 2. 2 Speak to a loved one. Find someone who will stay up with you all night just to comfort you. This could be a family member, a friend, even your boyfriend or your girlfriend. Just be sure to choose someone who doesn't mind thunderstorms! They will distract you from the thunder and can keep reassuring you. • If they are having to cope with it too, then you can be thunder buddies reassuring each other as much as yourself. Everyone is afraid of something, even if they act brave all the time. 3. 3 Don't be afraid to climb into bed with another family member. It's nothing to be ashamed of, they will know why you are scared. Alternatively, make a den under the quilt of your bed or pull blankets over your head. 4. 4 Call someone if you're alone. Talk to them to try to calm down. If your heart is beating fast, talk together about happy moments. 5. 5 Cuddle up with a favorite stuffed animal or blanket. They always make you feel better and will make you feel safe. 6. 6 If going to school when a thunderstorm is about to happen, walk with a friend. They will keep you company and hopefully cheer you up! Part 3 Distracting yourself 1. 1 Distract yourself from the loud noises and bright flashes. Find a place to do something you love like reading a book or watching TV. 2. 2 Use your imagination. Imagine that the lightning is just lights coming from a party in the sky. Picture the thumping of feet on the ground from the dancing. Having a fun picture in your head makes thunder storms easier to bear. In fact, you might actually start to like them! • Thunder may sound scary right? Well it's just a bunch of noise outside your window. Thunderstorms aren't really scary; they just sound scary. Think of them as a person and they are really annoying, and what do you do to people that are really annoying? You ignore them, so do that to the thunderstorms. • Pretend the lightning is just party lights and the thunder is banging footsteps from dancing. 3. 3 Make a mix of songs you like that you think can help you relax during a thunderstorm. Burn them on to a CD or your iPod/MP3 Player. If possible, wear headphones. You can turn it up so that it blocks out the noise of the storm, but don't have it blasting in your ear. Ask someone to stand 3–4 feet (0.9–1.2 m) away from you. If they can hear the music coming from your headphones, then it's too loud. If it truly means enough to you, you can buy noise-canceling headphones that allow you to tune out the outside world and listen to your favorite jams at the same time. Part 4 Blocking the noise and light 1. 1 Try blocking out the noise with something. For example: Use a blanket over your head or place headphones over your ears with music. Or, if you are really that bothered, get earplugs for your ears; they work just as well. 2. 2 Try to find something to block out the light. For example, use something like a scarf over your eyes, to block out the lightning. 3. 3 Shut your windows and try to think about happy things. Play music, if possible. Community Q&A Search Add New Question • What happens if no one cared about my fear of thunderstorms? wikiHow Contributor Try to share your feelings with them or just simply tell that you are afraid. If they still don't care, try to play music to decrease anxiety. Simply ignore them if they called you a baby. You can always cuddle a pet or even a stuffed toy, for comfort. • What happens if you hate storms? wikiHow Contributor Many of the suggestions for thunderstorms should be helpful for you. A good way of coping is to remain around people whom you consider to be reliable and sensible and who respond calmly in a crisis, as they ca help to keep you calm. Also, being with a pet can help, as the animal's needs can take your mind off your own worries, as you tend to keeping the pet safe, warm and happy. • I'm currently ill and fear of thunder make my illness worse. What should I do? wikiHow Contributor This is psychosomatic. That means your mind/worries are making you feel sick. Just remember it's all in your head and there's nothing to be afraid of. Try to relax, take slow deep breaths and think about something else. • How can I fall asleep if there is a thunderstorm at night? wikiHow Contributor Pull the covers up over your head or put some headphones on while you sleep. • How can I apply these tips while in a car? wikiHow Contributor Cars have rubber wheels, so they absorb lightning strikes (if they happen). Using the same techniques, such as reading a book and listening to music, should distract you. Just don't do anything to induce car sickness or you'll have more problems! • Why are storms so loud? wikiHow Contributor Thunderstorms are highly chaotic events with a lot of different sources of noise. Wind and rain beat against the various surfaces outside and lightning strikes all around, causing the sound known as thunder. Thunder is loud because the lightning causes the air around it to rapidly expand. This creates a really strong pressure wave, and pressure waves in the air are registered as noise by the ear. • Should I be cautious with lightning strikes? wikiHow Contributor Yes and no. If indoors, then you shouldn't be worried as lightning strikes don't usually hit buildings where you would be. However, if outdoors, take caution. For example, don't stand under or near trees as they are like "magnets" for lightning strikes. Also, if stuck in a flat area without the safety of a building, lie flat on the floor as lightning would not be as attracted towards you. • Why do we even have thunderstorms? wikiHow Contributor The air cools as it rises. Water vapor condenses and forms cumulus clouds. When condensation occurs, heat (latent heat/energy ) is released and helps the thunderstorm grow. At some point, condensation high in the cloud (now in the form of water droplets and ice) falls to the ground as rain. Source: "How Do Thunderstorms Form?" Dangerous Weather. N.p., n.d. Web. 15 Apr. 2016. • What if everyone I know is afraid of thunderstorms too? wikiHow Contributor Take responsibility and set a good example for those around you. Remember that it's just a storm and it'll be over soon. • What if there's a blackout during a thunderstorm? wikiHow Contributor Have your phone/eReader/tablet/etc with you, and make sure that it is charged. You can also switch on a flashlight and read a good book. Show more answers Unanswered Questions Show more unanswered questions Ask a Question If this question (or a similar one) is answered twice in this section, please click here to let us know. Tips • If you have a friend, sister or brother with you during the thunderstorm, create a small tent using blankets and pillows, it will keep you distracted and then go inside the tent with snacks, stuffed animals, computer/phone/ iPod, music, books, and a flash light. Turn off all the lights and turn on the flash light and pretend to be camping! You will feel safe inside your small little home. • Cuddle with your old stuffed animal and huddle in your quilt. If this isn't enough watch a movie! An old one you haven't watched in a long time. Wear headphones if necessary. • Know that rain is just water. The worst that lightning could do to you indoors is illuminating the room. Buildings (especially multi-story buildings) are made to withstand lightning strikes. Thunder is the sound of air expanding due to the heat of a lighting strike. You can feel thunder because of the super low-frequency sound it makes by vibrating the air, much like being at a concert and you can feel the bass. Warnings • Never become careless. If a thunderstorm strong enough to cause destruction comes your way, be prepared to take measures to stay safe. If you hear a siren coming from outside, you need to get into your basement or bathroom. Try to stay away from windows. • Thunderstorms often come with lightning, which is sometimes fatal when struck; if you are caught outside when you hear the thunder, run to a shelter (your house or your car). • If you have a kid that is not afraid, don't try to scare him/her ex. A thunderstorm is coming!! Go to sleep! Your child might develop fear or even worse,phobia. Things You'll Need • A stuffed animal • Research • A Flashlight • Radio (In Case Power Goes Out) Article Info Categories: Phobias In other languages: Español: enfrentar tu miedo por las tormentas, Italiano: Affrontare la Paura dei Temporali, Português: Enfrentar o Medo de Tempestades, Русский: перебороть боязнь грозы Thanks to all authors for creating a page that has been read 191,501 times. Did this article help you?  
ESSENTIALAI-STEM
St Lawrence Academy, Scunthorpe The St Lawrence Academy (formerly High Ridge School) is a coeducational Church of England secondary school with academy status, in Scunthorpe, North Lincolnshire, England. The Academy teaches GCSEs and BTECs, and has specialisms in sports and science. Grammar school Scunthorpe Grammar School opened in 1927. It became a comprehensive, as High Ridge School, in 1968 when the Scunthorpe division of Lindsey turned comprehensive. Comprehensive A community school administered by North Lincolnshire Council, High Ridge School converted to academy status on 1 September 2008 and was renamed The St Lawrence Academy. The school is sponsored by the Church of England Diocese of Lincoln. In 2011 demolition of the old building began and construction started as part of the Building Schools for the Future programme. The new building was built by May Gurney and was completed in October 2013. The old hall is refurbished but still remains. Scunthorpe Grammar School * Roy Axe, car designer with Chrysler Europe in the 1970s, designing the Talbot Horizon and Alpine, later working for Austin Rover Group in the late 1980s * Prof Gordon Dougan FRS, Head of Pathogen Research at the Wellcome Trust Sanger Institute in Cambridgeshire * Ric Parker CBE FREng, Director of Research and Technology from 2001–16 at Rolls-Royce (at High Ridge from 1968) * John Peck (politician), can be seen in the film Saturday Night and Sunday Morning, who belonged to the Communist Party of Great Britain (CPGB) * David Plowright, CBE, television producer, younger brother of Joan, Controller of Programmes from 1969–79 at Granada Television (which helped his brother-in-law) * Dame Joan Plowright, actress, married to Laurence Olivier from 1961 to his death in July 1989 * Major-General Dennis Shaw CB CBE, Head from 1975-78 of the Commando Logistic Regiment * Graham Taylor OBE, former manager from 1990-93 of England * Michael Tomlinson (engineer) FICE FIStructE, Chairman from 1969-71 of the British Geotechnical Association, who researched soil mechanics, groundwater control and design of piles who lived at Burton upon Stather * Prof Stephen Westaby FRCS, Senior Cardiac Surgeon since 1986 at the John Radcliffe Hospital, and Professor of Biomedical Sciences since 2006 at the University of Wales * Neil Cox, former Premier League footballer
WIKI
Published on May 11, 2023 at 8:00 / Updated on May 26, 2023 at 8:00 Bipolar disorder, also known as manic depression, is a highly complex illness. It is a mental disorder that disrupts mood and behaviour and has consequences in all spheres of life, affecting family, relationships, and careers. Bipolar disorder usually appears in adolescence or early adulthood. It affects both men and women. Bipolar disorder causes individuals to go through mood cycles that shift from one extreme to the other. They typically experience three states: a high state (mania), a low state (depression), and a well state. There are several types of bipolar disorder, which are distinguished by the frequency, duration, and intensity of the manic and depressive episodes. Often unrelated to life events, these episodes are interspersed with moments of well-being during which the individual feels "normal" and functions well. Manic episodes The beginning of a manic episode is characterized by boundless energy and creativity. This state can quickly turn into a sustained period of extreme agitation. Individuals experiencing a manic episode are not always happy or euphoric; they may be highly irritable, feel intense anger, or exhibit aggressive behaviour. A number of other symptoms may also be present: • Trouble concentrating • Rapid, loud, rambling speech • Hallucinations, delusions • Hyperactivity • Involvement in many activities (social, professional, academic, family) • Exaggerated self-esteem, sense of grandeur • Poor judgment, impulsiveness • Risky, pleasure-seeking behaviour • Reduced need for sleep Depressive episodes Depressive episodes often involve a constant state of intense sadness, despair, or frustration. Individuals typically experience several of the following symptoms: • Anxiety • Constant self-deprecation • Difficulty making decisions • Inability to concentrate • Fatigue, weakness • Restlessness or, conversely, low energy • Health problems such as headaches, back pain, or stomach pain • Isolation • Change in appetite or weight • Suicidal thoughts • Loss of interest in daily activities • Disturbed sleep (insomnia, hypersomnia) • Symptoms of psychosis, such as hearing voices or having delusions • Feelings of guilt or worthlessness Manic and depressive symptoms sometimes occur at the same time, which is deeply painful for the individual. Causes and triggers What causes bipolar disorder is unknown. However, genetics have been shown to play a key role. Individuals are more likely to develop bipolar disorder if they have relatives with the condition. While certain events (family problems, intense stress, periods of insomnia, taking medication or drugs, etc.) can trigger episodes of mania or depression, they cannot cause the disease. Treatment To date, there is no cure for bipolar disorder, but the symptoms can be managed with medication and psychosocial treatment. In both cases, the main goal is to alleviate symptoms and minimize relapses. Bipolar disorder is treated primarily with mood stabilizers, medications that reduce the abnormal mood swings caused by the illness. They must be taken continuously to be fully effective. Adjunctive medications may also be prescribed to treat specific problems (e.g., anxiety, insomnia) or to increase the efficacy of mood stabilizers. Psychosocial treatment is usually suggested once an individual's symptoms are under control. It includes psychoeducation (learning about the disease), psychotherapy, and support groups. Psychotherapy involves speaking with a therapist and developing strategies to address problems related to the disease. Support groups allow individuals to share their experiences with other people who are dealing with the same illness. When should I see a health care professional? Speak with your health care provider in the following cases: • You are experiencing psychological distress. • Your symptoms are preventing you from functioning properly. • Your social, professional, and family commitments and obligations have become a burden and you are no longer able to fulfill them. • You are having suicidal thoughts. For more information: The drugs and pharmaceutical services featured on the familiprix.com website are offered by pharmacists who own the affiliated pharmacies at Familiprix. The information contained on the familiprix.com site is for informational purposes only and does not in any way replace the advice and advice of your pharmacist or any other health professional. Always consult a health professional before taking or discontinuing medication or making any other decision. Familiprix inc. and the proprietary pharmacists affiliated with Familiprix do not engage in any way by making this information available on this website.
ESSENTIALAI-STEM
How to Access Auto GPT Demo: A Must-Read Guide Right the world is full of the latest technology and artificial intelligence. Along with all AI platforms, there’s a new player in town that’s making waves: Auto GPT. This innovative open-source application, powered by the GPT-4 language model, has the potential to revolutionize the way we approach complex tasks and achieve goals autonomously. Imagine an AI tool that can not only write and debug code but can also correct its own writing mistakes, manage files, and even develop entire websites. Auto GPT brings these capabilities and much more to the table, offering a versatile and powerful solution for a wide range of applications. Find more: Agent GPT Reworkd Ai As the demand for AI-driven solutions continues to grow, Auto GPT has emerged as a game-changer, poised to transform industries and redefine the limits of artificial intelligence. Its sophisticated language model enables users to generate high-quality content, streamline workflows, and optimize various processes across multiple domains. The capabilities of Auto GPT extend far beyond simple text generation, making it an invaluable asset for developers, content creators, data analysts, and more. Here, we will dig deep into the world of Auto GPT, exploring its features, potential use cases, and the steps required to access the demo, download, and install the application on your system. Join us as we uncover the secrets behind this cutting-edge AI tool and learn how to harness its power for your own projects and applications. How to Access Auto GPT Demo To access the Auto GPT demo, follow these simple steps: 1. Visit the Auto GPT GitHub repository: https://github.com/significantgravitas/auto-gpt 2. Locate the demo video within the repository and download it to your device. Watching the demo video will provide you with an overview of Auto GPT’s capabilities and potential use cases. Understanding Auto GPT’s Features Auto GPT offers a variety of features that make it a powerful tool for various applications: • Autonomous operation: Auto GPT can perform tasks independently, reducing the need for human intervention. • Code writing and debugging: The AI can write and debug code, making it a valuable asset for developers. • Text generation and correction: Auto GPT can generate text based on prompts and correct its own writing mistakes. • Web development: The tool can assist in the development of websites, offering streamlined and efficient solutions. • File management: Auto GPT can manage files on your system, simplifying organization and navigation. How to Setup Up the Environment for AutoGPT Before using Auto GPT, you need to set up your environment. Ensure you have the following: 1. Visual Studio Code + devcontainer 2. Docker 3. Python 3.10 or higher Having the correct environment in place ensures smooth operation and compatibility with Auto GPT. How to Download Auto GPT To download Auto GPT, follow these steps: 1. Visit the Auto GPT GitHub release page: https://github.com/significantgravitas/auto-gpt/releases 2. Click on “Source code (zip)” to download the ZIP file. 3. After downloading, extract the ZIP file and copy the “Auto-GPT” folder. How to Install Auto-GPT on Windows Here’s a step-by-step guide to installing Auto GPT on your Windows system: 1. Install Python and Git: Download Python from the official website (https://www.python.org/downloads/) and Git from its official website (https://git-scm.com/downloads). 2. Add API Keys: Obtain your OpenAI API keys from the OpenAI website and add them to your system. 3. Clone the Repository: Open the command prompt, navigate to your desired directory, and clone the Auto GPT repository using this command: git clone https://github.com/significantgravitas/auto-gpt.git. 4. Install Dependencies: Navigate to the auto-gpt directory and install the required packages using this command: pip install -r requirements.txt. 5. Run Auto GPT: Execute the following command to run Auto GPT: python app.py. Auto GPT for Mac OS Yes, Auto GPT is available for Mac OS users. You can use it directly in a browser or install MacGPT, an application developed by Jordi Bruin, which allows you to use ChatGPT as a remote browser on your Mac desktop. To use Auto GPT directly in a browser, follow the instructions provided on the Open AI Master website. For installing MacGPT, download the application from the developer’s website, install it on your Mac OS, and start using ChatGPT as a remote browser. MacGPT closely resembles Apple’s Safari browser but is powered by ChatGPT. You can use MacGPT to generate high-quality content, chat with ChatGPT, and perform other tasks. MacGPT is currently free, but the developer accepts donations. Also Read: How to Enable Continuous Mode in Auto-GPT What Are the Use Cases of Auto-GPT Auto GPT can be applied to various industries and use cases, making it a versatile tool. Some examples include: 1. Content creation: Generate high-quality articles, blog posts, and social media content. 2. Code generation: Develop code snippets or entire applications in different programming languages. 3. Customer support: Respond to customer queries and provide support through AI-powered chatbots. 4. Data analysis: Analyze and interpret large datasets, identifying trends and patterns. 5. Language translation: Translate text between multiple languages with high accuracy. Tips for Using Auto GPT Effectively To get the most out of Auto GPT, consider the following tips: • Use clear and concise prompts to guide the AI’s text generation. • Experiment with different phrasings to achieve desired outcomes. • Utilize Auto GPT’s text completion feature to save time and generate ideas. • Continuously monitor and evaluate the AI’s performance to ensure optimal results. Signing Out… Auto GPT is an innovative AI tool that harnesses the power of the GPT-4 language model to execute complex tasks autonomously. By accessing the demo, downloading, and installing Auto GPT, you can streamline various processes, including content creation, code development, and more. With its wide range of applications and capabilities, Auto GPT is set to revolutionize the way we approach artificial intelligence and language models. Leave a Comment %d bloggers like this:
ESSENTIALAI-STEM
Florida's gun vote was going to fail, even before Parkland Washington (CNN)On Tuesday night, even as 100 or so students from Marjory Stoneman Douglas High School were making their way to the state capitol in Tallahassee, the state House voted against proceeding to a debate on an assault weapons ban. The vote -- and the images of several of the students from the school that, a week ago, saw 17 people murdered, crying in the House gallery -- drew national attention. It also got me to wondering about whether the school shooting in Parkland, Florida, will have any real legislative impact in the Sunshine State. To answer that question -- and for more context about how Florida's state government has dealt with gun laws in recent years -- I reached out to Mary Ellen Klas, the Tallahassee bureau chief of the Miami Herald. Our conversation, conducted via email and lightly edited for flow, is below. Cillizza: The Florida state House voted down the chance to move on to a debate about an assault weapons ban on Tuesday night. Was that a surprise given the circumstances? Klas: The vote was to add to the calendar a bill sponsored by Democrats that had never gotten a hearing. It was a procedural move planned by the incoming Democratic leader and intended to embarrass the Republican-led House. But the vote would never have gotten the super-majority to vote needed. The students clearly were not prepared for what they saw but it demonstrated the predicted path of gun control measures in the Florida Legislature. Cillizza: What's been the legislature's stance on gun policy over the past decade or so? More stringent gun laws? Less? Any major legislation either way? Klas: Florida's gun laws have gotten more lenient for the last decade as the conservative majority, pushed by gun rights groups, have passed so-called "stand your ground" laws and measures to prevent counties and cities from passing stricter gun laws than the state. Cillizza: Florida Gov. Rick Scott, a Republican, promised gun control legislation that would "move the needle." Do we have any sense of what he is planning? Klas: He is expected to embrace the proposal advanced by House and Senate leaders that would be the first limit on gun access in Florida in more than a decade. The plan will raise the age of possession and sale of a semi-automatic weapons from 18 to 21 and apply the three-day waiting period to those sales as well. Cillizza: What could pass the GOP-controlled state House and Senate? Is there a majority for background checks? Raising the age to buy a gun? Klas: There appears to be clear support for passage of the plan to raise the age to buy a semi-automatic weapon and increase the requirements of background checks. But the legislation has not yet been filed, so many legislators are withholding a commitment until they see the language. Cillizza: Finish this sentence: "A year from now, the legislative impact of the pop-up activism by the students of MSD will be considered _________." Now, explain. Klas: "incremental but significant." Although the initial change will be modest, the fact that it took this tragedy to soften the Florida legislature's resistance to modifying its gun laws will be remembered in history. The question remains: Will this be the beginning or the end?
NEWS-MULTISOURCE
Many people who are blind or have low vision may use sunglasses to protect their eyes from glare, or UV light, or for aesthetic reasons. It is a misconception that all blind people cannot see at all. Only around 15% of individuals with eye disorders have complete blindness. Blind people might wear sunglasses to protect their eyes from debris or to signal to others that they are blind. In this article, we examine why blind people wear sunglasses. We discuss each reason in detail and determine whether people wear them for protection or aesthetic purposes. Two blind athletes running outside while wearing sunglasses.Share on Pinterest Eri Miura/Getty Images Blind people wear sunglasses for many of the same reasons as sighted people. They may wear them: • to protect the eyes from UV light • to reduce glare • for aesthetic reasons Sunglasses may also provide some additional benefits for blind people, such as: • reducing light sensitivity • protecting the eyes from foreign objects such as falling leaves or insects • maximizing vision • quickly communicating to others that they are blind or have low vision Many people are sensitive to bright sunlight. It can trigger a natural reflex to squint, reducing the light that reaches the eyes. However, for a person with low vision, squinting can make it harder to see. Sunglasses reduce the need to squint, maximizing the vision they have. Light sensitivity also has links with many eye disorders. Some people with low vision may experience extreme discomfort from bright light, also known as photophobia, and this can reduce their ability to see. As sighted people do, blind people may wear sunglasses to protect their eyes from UV light. UV rays from the sun are harmful to the eyes and the skin. In addition to wearing sunscreen, all people should wear sunglasses to reduce the impact of UV light. Constant bright light exposure can damage the cornea, which is the transparent outer layer of the eye, as well as the lens of the eye and the retina, which sends images to the brain. Even on cloudy days, as much as 80% of UV light from the sun can pass through the clouds. Over time, UV light can lead to eye problems such as: • cornea inflammation or burning • clouding of the eye lens (cataracts) • protein and fat deposits in the white of the eye (pinguecula) • tissue growth on the surface of the eye (pterygium) • age-related macular degeneration • cancers of the eyelid, such as basal cell carcinoma and squamous cell carcinoma • melanoma of the eye Many blind people have some degree of vision. By reducing glare, sunglasses can help people with low vision maximize what they can see. Glare is a common issue for people with low vision. Overly intense light, such as sunlight on a bright, sunny day, can produce glare when reflecting off surfaces and objects. People with cataracts often experience increased light scattering within the eye, which reduces the contrast of visual images. Individuals with glaucoma can also experience issues with glare. Research indicates a link between the severity of glaucoma and worse sharpness of vision under glare conditions. Additionally, people with macular degeneration may experience sensitivity to glare. Sunglasses can protect against foreign objects, such as grit, shattered glass, or branches, that may enter the eye during accidents. This is important because seemingly small injuries and scratches from debris can damage the eyes. If a foreign object damages the cornea, it can be very painful. Abrasions and scarring can lead to further vision loss. Sunglasses may also prevent injuries to the eyes if a person falls or collides with an object. Blind people can have fewer visual cues to alert them to potential hazards, such as a low hanging branch. This means they have less opportunity to close or shield their eyes if a collision is unavoidable. People with low vision also have a higher risk of collisions and falls than people with typical vision. According to the Centers for Disease Control and Prevention (CDC), visual impairment more than doubles the risk of falling among older adults. Some blind people wear dark glasses to communicate their blindness to others. For example, a person may wear sunglasses and use a cane or a guide dog to help them navigate when walking outside. This quickly lets others know they have low vision and allows people to adopt helpful behaviors such as: • moving out of the way • removing belongings from their path • avoiding petting or distracting the guide dog It is important not to assume that a blind person needs help. If someone appears to be having difficulty, people can: • say hello and introduce themselves • ask whether the person would like assistance • listen to their answer It is a media stereotype that all blind people wear sunglasses to hide their eyes. Like sighted people, blind people may wear sunglasses for practical reasons or because they enjoy fashion. However, some people may wear sunglasses to obscure signs of an eye condition. For example, if a person became blind as a result of an injury, they may wear sunglasses to hide facial scarring. Similarly, some people who have been blind from birth may feel self-conscious that their eyes do not track people or objects in the same way as a sighted person’s eyes would. People’s feelings about being blind and about their appearance vary considerably, though, and many people do not wear sunglasses for these reasons. Blind people wear sunglasses for various reasons, many of which are the same as those of sighted people. They may wear sunglasses to protect against UV light, to shield their eyes from bright light, or for aesthetic purposes. Additional reasons blind people sometimes wear sunglasses include maximizing their vision, protecting against injuries, and communicating their blindness to others. Each person will have different reasons for choosing to wear sunglasses.
ESSENTIALAI-STEM
Talk:2006 CECAFA Cup Cosafa same scenario, useful gto mention? -Koppapa (talk) 18:18, 30 December 2014 (UTC)
WIKI
Support Forum The Forums are a place to find answers on a range of Fortinet products from peers and product experts. Carlos_A_Almeida New Contributor III Fortigate 1000D SFP+ 10G Trasceiver and Cisco 4500-X SFP+ Trasceiver Someone knows if it's possible to connect a Fortigate 1000D using the 10 GE SFP+ transceiver module and a Cisco Switch model 4500-X with the Cisco SFP+ trasceiver? Someone tried to do that? Did Work?   Thank you, 4 REPLIES 4 Chura New Contributor I have 1500D and Cisco GBIC's but you will need to be more specific about the exactly GBIC model. //Chura CCIE, NSE7, CCSE+ //Chura CCIE, NSE7, CCSE+ Carlos_A_Almeida Chura wrote: I have 1500D and Cisco GBIC's but you will need to be more specific about the exactly GBIC model.   Cisco GBIC: SFP+ Cisco SFP-10G-SR-S Fortigate GBIC: 10 GE SFP+ Transceiver Module, Short Range FG-TRAN-SFP+SR 10 GE SFP+   I don't know if these information are sufficient. But thank you for your help. emnoc Esteemed Contributor III I highly doubt that would work. If the SFP+ is a dual-rate model, you might be able to get it to work. They only ones that are dual-rate that I've manage to get to work are the intel-stuff.   I would fist start with a show port cap command on the cisco 4500-X  and a diag hard dev nic <port name >   I'm also guessing you have nothing to loose, with just trying ;) PCNSE  NSE  StrongSwan   PCNSE NSE StrongSwan Stemjay New Contributor hi , i have a similar challenge, how was this resolved Labels Top Kudoed Authors
ESSENTIALAI-STEM
Improved ankle mobility following a 4-week training program affects landing mechanics: a randomized controlled trial Howe, Louis P and Waldron, Mark and North, Jamie and Bampouras, Theo (2020) Improved ankle mobility following a 4-week training program affects landing mechanics: a randomized controlled trial. Journal of Strength and Conditioning Research. ISSN 1064-8011 [img] Text (Howe et al_2020_JSCR Manuscript) Howe_et_al_2020_JSCR_Manuscript.pdf - Accepted Version Available under License Creative Commons Attribution-NonCommercial. Download (523kB) Abstract This study examined the effects of a 4-week ankle-mobility intervention on landing mechanics. Twenty participants with restricted ankle dorsiflexion range of motion (DF ROM) were allocated to either a strength training only (n = 9) or a strength training and ankle mobility program (n = 11). Participants performed a weight-bearing lunge test and bilateral drop-landings before and following the intervention. Normalized peak vertical ground reaction force (vGRF), time to peak vGRF and loading rate were calculated, alongside sagittal-plane initial contact angles, peak angles and sagittal-plane joint displacement for the ankle, knee and hip. Frontal-plane projection angles were also calculated. Following the intervention, only the strength and mobility group improved ankle DF ROM (mean difference = 4.1°, effect size (ES) = 1.00, P = 0.002). A one-way analysis of covariance found group effects for ankle joint angle at initial contact (P = 0.045), ankle (P < 0.001) and hip joint angle at peak flexion (P = 0.041), and sagittal-plane ankle (P < 0.001) and hip joint displacement (P = 0.024) during bilateral drop-landings. Post-hoc analysis revealed that the strength and mobility group landed with greater ankle plantar flexion at initial contact (mean difference = 1.4 ± 2.0˚, ES = 0.46) and ankle dorsiflexion at peak flexion (mean difference = 6.3 ± 2.9˚, ES = 0.74) following the intervention, resulting in greater ankle joint displacement (mean difference = 7.7 ± 4.0˚, ES = 1.00). However, the strength training only group landed with increased peak hip flexion (mean difference = 14.4 ± 11.0˚, ES = 0.70) and hip joint displacement (mean difference = 8.0 ± 6.6˚, ES = 0.44) during post-testing. The findings suggest that changes in landing strategies following the performance of a strength training program are specific to whether restrictions in ankle mobility are considered as part of the intervention. Item Type: Journal Article Journal or Publication Title: Journal of Strength and Conditioning Research Uncontrolled Keywords: /dk/atira/pure/subjectarea/asjc/3600/3612 Subjects: ID Code: 144101 Deposited By: Deposited On: 18 May 2020 10:45 Refereed?: Yes Published?: Published Last Modified: 28 Oct 2021 05:05
ESSENTIALAI-STEM
Page:A treasury of war poetry, British and American poems of the world war, 1914-1919.djvu/95 Rh Where is the giant shot that kills Wordsworth walking the old green hills? Trample the red rose on the ground,— Keats is Beauty while earth spins round! Bind her, grind her, burn her with fire, Cast her ashes into the sea,— She shall escape, she shall aspire, She shall arise to make men free: She shall arise in a sacred scorn, Lighting the lives that are yet unborn; Spirit supernal, Splendour eternal, ENGLAND! Helen Gray Cone HEN the fire sinks in the grate, and night has bent Close wings about the room, and winter stands Hard-eyed before the window, when the hands Have turned the book's last page and friends are sleeping, Thought, as it were an old stringed instrument Drawn to remembered music, oft does set The lips moving in prayer, for us fresh keeping Knowledge of springtime and the violet. And, as the eyes grow dim with many years, The spirit runs more swiftly than the feet, Perceives its comfort, knows that it will meet God at the end of troubles, that the dreary Last reaches of old age lead beyond tears To happy youth unending. There is peace In homeward waters, where at last the weary Shall find rebirth, and their long struggle cease. So, at this hour, when the Old World lies sick, Beyond the pain, the agony of breath Hard drawn, beyond the menaces of death, O'er graves and years leans out the eager spirit.
WIKI
Born free in 1815 in Baltimore, Maryland, John B. Bailey was one of the first black Americans to use sports to carve out a living and avoid drudgery. As a sparring master and an expert with pistols, Bailey had unique skills he could market. He also had a practical reason to master the art of self-defense and pistol shooting. Physically defending himself could have been the difference between his freedom and bondage in Baltimore where free blacks had to worry about being kidnapped and sold into slavery. Like all free blacks in Baltimore, Bailey faced the threat of racism in a slave society that limited his rights, economic opportunities, and constantly put his life in danger. When Bailey opened his first gymnasium in 1838, he was one of a few men in the nation that had their own gym. During the 1830s he taught sparring lessons in Baltimore and also traveled to Boston and Philadelphia for exhibitions. In Philadelphia, he sparred with the black sparring master Joseph Battis, who ran a sparring academy and barbershop. In 1846, Bailey opened “Bailey’s Gymnasium,” where taught sparring, gymnastics, and operated a pistol gallery. At the time it was illegal to sell “gunpowder, shot, or lead” to a free black person, mulatto, or slave. Although he trained black men like Harry Sallars, who eventually became a boxing champion in Australia, Bailey’s success derived from that fact that he geared his business toward white middle-class anxieties and became a leader in the physical culture movement. The growth of the American physical culture movement started as an urban response to rapid industrial change. Health seekers believed industrialization weakened Americans, and they urged that individuals needed to transform their bodies to battle urbanization. Bailey only had one competitor. As a business owner, Bailey smartly used the language of health reform to attract customers. He ran ads offering sparring lessons and training in gymnastics, telling his readers about the “advantages which accrue from a course of Gymnastic exercise potential healthy qualities of exercise,” like a “promotion of a healthy and vigorous state of system,” “muscular powers,” and he suggested that working out could help fight off “diseases of a nervous and dyspeptic nature.” He also told his potential middle-class clients that fitness was essential for those who lived a “sedentary lifestyle.” Even though he thrived as a businessman, the tightening legal restrictions, the Fugitive Slave Law, and continuous oppressive racism pushed him out of Baltimore. In 1851, he took his athletic and business skills to San Francisco, California. When he arrived in California he was only one of 2,000 free blacks to complete the journey voluntarily, and one of 18 blacks to open a barbershop in San Francisco. Along with his barbershop he also operated a pistol gallery and taught sparring lessons. For whatever reason, he left San Francisco, returned to Baltimore, and then took his family to Boston in 1853. In Boston, along with black gymnasium owner Patton Stewart Jr., Bailey became a leading figure in the physical culture movement. He taught sparring lessons, operated a pistol gallery, bowling alley, and had one of the few facilities where men could lift heavy weights. For most of the 1850s Bailey and Stewart operated the only two middle-class gyms in Boston. In his book Colored Patriots of the Revolution, the black leader William C. Nell wrote “it may be noted, that the two most popular gymnasium galleries are in the proprietorship of J.B. Bailey and Peyton Stewart.” By the end of the decade Bailey’s real estate holdings jumped from $500 to $5000. During the 1860s Bailey left the gymnasium and pistol business and opened up a sparring academy. He operated one of the most successful sparring academies in the nation until his death in 1886. As a sparring master he gave lessons and hosted numerous sparring exhibitions, including exhibitions with his friend Aaron Molienaux Hewlett, the first black teacher at Harvard. Molineaux taught physical culture and also owned a gymnasium with his wife in Cambridge. During his tenure in Boston, Bailey’s most successful student was the Colored Heavyweight Champion (1883-1888) George Godfrey. Most importantly, Bailey was more than just an athlete. He was an activist who worked to integrate Boston’s schools, fought for abolition, and was part of the Underground Railroad. According to his obituary, his “career has in it something to admire and something to praise. He was a race man in every sense of the word.” “He was deeply interested in all movements which tended to lift up his people.” As a black athlete-activist, Bailey set the bar high for others to follow. A part of American history i had not known. Very interesting and inspirational.ReplyDelete
FINEWEB-EDU
Summary: Treat "::-webkit-whatever-stuff" as valid CSS selectors. Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1424106 Link to standard: * https://github.com/whatwg/compat/issues/103 * https://github.com/w3c/csswg-drafts/issues/2156 (previous discussion of this topic) Platform coverage: All platforms Estimated or target release: maybe 64 Preference behind which this will be implemented: layout.css.unknown-webkit-pseudo-element Is this feature enabled by default in sandboxed iframes? Yes. DevTools bug: Do we need one? Do other browser engines implement this? WebKit and Blink have this behavior for long, and it causes compat issue for us. web-platform-tests: A new web-platform-test is being added as part of the implementing bug. Is this feature restricted to secure contexts? No, because this doesn't provide any additional functionality, it's purely treating something previously invalid as valid without actually do anything with them. _______________________________________________ dev-platform mailing list dev-platform@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-platform Reply via email to
ESSENTIALAI-STEM
Hot answers tagged 6 That UA string suggests it isn't Internet Explorer at all, supporting ionFish's theory that it's a bot. Windows NT 9.0 gives it away. Even Windows 8 only calls itself Windows NT 6.2. It also makes no reference to Trident, IE's rendering engine. It should be more like Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0). See ... 4 As of right now developers would be doing this partially out of curiosity and partly to get ahead of the game. After all, as you've pointed out, the user base is tiny right now and even at full saturation the maximum numbers of users will be limited to those running IE9 and Win 7 (or newer). I think it is a good idea, but shouldn't be a priority, to start ... 4 One of my coworkers started exhibit the symptoms (random requests for http://www.vistaprint.com/scanImageUrl from IE8), so I hopped on her computer to figure out what was causing the issue. The problem appears to be due to a malware IE add-on called Yontoo v2.051. I doubt anyone intentionally installs the software, but, among other installers, it is ... 4 This article from MSDN should tell you everything you need to know. 4 Checking the IE9 website, this is the ONLY thing relating to URL case. 400 BAD FILE REQUEST: This error occurs due to input of incorrect URL by the user, like we unknowingly use uppercase letters while specifying a URL rather than lower case letters and sometimes use of incorrect punctuation causes this error. I do have a hunch though: since they're all ... 3 This can be annoying. The reason this happens is because the browser treats the # in the url as an anchor and then tries to find the html element who has an id that matches that anchor. Eduardos answer about using Javascript is the solution. You can use jquery or javascript to change the url hash when a link is clicked to something that does not exist. ... 3 This meta tag should do it: <meta http-equiv="X-UA-Compatible" value="IE=9"> You can also send it out as an HTTP header 3 The key metric is percentage of repeat visitors. Web applications usually have a high percentage of repeat visitors. A visitor is more likely to do a specific set of tasks on the app, so if you provide a deep URL that saves 3 clicks, he'd appreciate it. If you provide custom shortcuts for each user based on what he is does often, that would be even better. ... 2 This is being caused by a problem with your server configuration for your SSL: When I checked the SSL for your domain funraise.me using this SSL Installation Diagnostics Tool, it indicates the DNS resolves to IP address 107.21.216.112 When I used this tool to check the SSL for the IP address 107.21.216.112 however, it listed the domain onmodulus.net ... 2 This is due to the "Same Origin" security policy. The “Same Origin” policy limits the access of one window to another. The reason behind that is security. If you have blabla.com in one window and gmail.com in another one, then you’d not want a script from blabla.com to access or modify your mail or run actions in context of gmail on your ... 2 Just have that page send out anti-caching headers every time a user loads it. This will force the browser to get a fresh copy of the page every time. You can do this without affecting the caching of the other pages in the site. You can use meta tags: <META HTTP-EQUIV="CACHE-CONTROL" CONTENT="NO-CACHE"> <META HTTP-EQUIV="PRAGMA" ... 2 When a well behaved web browser encounters cached content, it generally still requests the head portion of the cached document so that it can ensure that the content hasn't changed since it was last cached. Just as long as the last-modified or content-length changes, then you shouldn't have a problem. Issues arise when your web server has explicitly told ... 2 For initial testing in IE this may be sufficient, but there will always be some differences between how a site loads in an emulator to the real thing. The amount of testing you do should really be strategically influenced by the target user base and the amount of traffic the site receives. By using a web analytics tool such as Google Analytics or Piwik ... 1 Hanselman also did a good writeup about pinned sites. 1 You can use document compatibility mode. <html> <head> <!-- Mimic Internet Explorer 8 --> <meta http-equiv="X-UA-Compatible" content="IE=EmulateIE8" > <title>My webpage</title> </head> <body> <p>Content goes here.</p> </body> </html> You can also set this as an HTTP header. ... 1 or simply you can use CSS - Conditional comments for IE http://www.css-tricks.com/how-to-create-an-ie-only-stylesheet http://www.javascriptkit.com/dhtmltutors/csshacks.shtml which will be quiet simple if you are a newbie hope it helps. 1 There's an MSDN blog post explaining how to build "reputation" for your download, but overall this is at least somewhat out of your control. It seems to be a rather unpopular feature(also see comments there), and I expect it'll receive some adjusting or even removal soon. I hate to say this, but is it out of the question to put a notice on the download ... 1 It's not. Compatibility mode is just emulation and not the browser versions themselves. I occasionally run into differences that aren't noticed till I look at it on a test system. Microsoft did come out with VMs that you can install on Windows that do contain the real versions of older IE. 1 Probably you are using and incorrect/malformed doctype tag. This is the usual trigger for this behavior. 1 Anchoring with ids is a feature of html4 of which many of the new browsers try to support, practically id behave like anchor name: The id attribute may be used to create an anchor at the start tag of any element (including the A element). In the same document says: The id and name attributes share the same name space. This means that they ... Only top voted, non community-wiki answers of a minimum length are eligible
ESSENTIALAI-STEM
Getting started with – Azure Backup gstarted-backup We continue our series of “Getting Started” articles, with most up-to-date information I use with Microsoft Partners and customers when enabling them with Azure infrastructure services. I follows the same structure which is: getting started, training videos if available, then reference architectures, capacity planning and pricing information. Backup is generally not creating a lot of excitement in IT teams, that’s the very least we can say. The fundamentally difficult parts of it are: 1. defining data retention and archival policies. 2. defining the appropriate sizing for the solution. 3. executing the offsite data copy policy. I’m not even talking about testing the restore of the backup, because people usually don’t do it Winking smile Here’s really why Azure can help: 1. You only have to size for the local backup storage system, archival is done is the cloud. 2. With all hidden costs of tape systems included like offsite processing, storage on cloud is very likely to be always cheaper than any on-premises storage. 3. You can easily test restoring data in a separate and isolated environment. 4. You can easily backup files on servers and client with a small backup agent 5. You can easily backup your applications running on Hyper-V on Vmware with Azure Backup Server. Here’s what you need to get started building solutions on Azure: Overview video https://azure.microsoft.com/en-us/resources/videos/what-is-azure-backup/ Overview article https://docs.microsoft.com/en-us/azure/backup/backup-introduction-to-azure-backup Training Videos: https://mva.microsoft.com/en-us/training-courses/hybrid-cloud-workloads-storage-and-backup-8335?l=QeQ9Uyay_6204984382 Pricing reference: http://azure.microsoft.com/en-us/pricing/details/backup/ Technical References: Azure Virtual Machine Backup: https://azure.microsoft.com/en-us/documentation/articles/backup-azure-vms/ Microsoft Azure Backup: https://azure.microsoft.com/en-us/documentation/articles/backup-azure-backup-windows-server/ Microsoft Azure Backup Server: https://azure.microsoft.com/en-us/documentation/articles/backup-azure-dpm-introduction/ Architecture references: Azure Backup Limitations – http://social.technet.microsoft.com/wiki/contents/articles/28395.azure-backup-limits.aspx Security features for protecting hybrid backups using Azure Backup – https://docs.microsoft.com/en-us/azure/backup/backup-azure-security-feature Third parties’ backup solutions supporting Azure Commvault – https://www.commvault.com/solutions/by-technology/virtual-machine-and-cloud/microsoft-azure Veaam – https://www.veeam.com/cloud-connect.html Veritas – https://www.veritas.com/solution/azure Service updates information https://azure.microsoft.com/en-us/updates/?product=backup When you have deployed the solution and want to go further with Automation, there’s a pretty nice course on Microsoft OpenEDX: https://openedx.microsoft.com/courses/course-v1:Microsoft+AZURE210x+2016_T4/about  If you want to get started on Azure the good way, you can register to IT Pro Cloud Essentials, it includes online trainings, MCP vouchers and  monthly free credits to use Azure: https://www.microsoft.com/itprocloudessentials/en-US  Feel free to connect with me and provide feedbacks! Arnaud
ESSENTIALAI-STEM
Prehabilitation Prehabilitation Article by Zoe Russell What is Prehabilitation? To help prevent injuries, sports physiotherapists have begun to employ what they call “prehabilitation” strategies. Prehabilitation is essentially preventive injury risk assessment and training to prevent the problem before it happens. 3 Phases of Prehabilitation The three phases needed to come up with a good prehabilitation plan are: 1. Analyzing an uninjured player’s posture, joint alignment, flexibility, muscle control, biomechanics, core stability and movement patterns, 2. Understanding the risks of the sport itself, and 3. Considering other specifics such as the player’s position. Following these three steps, your sports physiotherapist can better predict injury risk. They can then develop specific training programs to help you prevent common overuse and other sports injuries. What Exercises Are Best? Prehabilitation exercises and techniques are sports-specific.  They can even be athlete-specific, as they highlight the predominant muscle movement patterns present in the position they play sport. A goalkeeper, for example, will have different athletic requirements to a field player. Prehabilitation Benefits Prehabilitation helps you to: • achieve normal static and dynamic posture • correct muscle length imbalance, joint alignment and flexibility • normalise core stability (upper, lower and left vs right) • enhance muscle endurance, strength and power • boost movement pattern efficiency; and • enhance proprioception, which is the ability for your mind to sense the position of different joints related to the rest of the body. Obviously, the prehabilitation approach for each sport and position (e.g. defender vs attacker) within those sports will differ. That’s why it is important to seek the advice of a sports physiotherapist with interest in your sport. How to Arrange Pre-Injury Screening If you are interested in either individual, team or club sports screening or prehabilitation programs, please get in touch with PhysioWorkss today. You’ll benefit from improved performance and a lower injury rate. PhysioWorks offers club, school, team and individual pre-injury screening, injury risk profiling and injury-prevention strategies. What Causes Arm Pain? Arm pain and injuries are widespread. Arm pain can occur as a result of either sudden, traumatic or repetitive overuse. The causes can be related to sports injuries, work injuries or simply everyday arm use. Arm pain can be a local injury, musculoskeletal injury or could even be referred from nerves in your neck (cervical radiculopathy). This can result in neck-arm pain. Causes of Arm Pain by Region Causes of Arm Pain by Structure Neck-related Arm Pain Shoulder-related Arm Pain Elbow-related Arm Pain Wrist-related Arm Pain Hand-related Arm Pain Muscle-related Arm Pain Other Sources of Arm Pain Common Causes of Arm Pain The most common sources of arm pain include shoulder painwrist pain and elbow pain. Referred Arm Pain As mentioned earlier, arm pain can be referred to from another source. Cervical radiculopathy is a common source of referred arm pain. Cervical radiculopathy will not respond to treatment where you feel the arm pain. However, it will respond positively to treatment at the source of the injury (e.g. your neck joints). Professional assessment from a health practitioner skilled in diagnosing both spinal-origin and local-origin (muscle and joint) injuries (e.g. your physiotherapist) is recommended to ensure an accurate diagnosis and prompt treatment directed at the arm pain source. Arm Pain has Diverse Causes. The causes of your arm pain can be extensive and varied. Due to this diversity, your arm pain should be assessed by a suitably qualified health practitioner to attain an accurate diagnosis, treatment plan and implementation specific to your arm pain. What Arm Pain is Associated with a Heart Attack? Left-arm pain can be an early sign of a life-threatening cardiac issue. Based on this, a professional medical assessment that involves an accurate history, symptom analysis, physical examination and diagnostic tests to exclude a potential heart attack is important to exclude this potentially life-threatening source of arm pain. For more information, please consult with your health practitioner, call an ambulance on 000, or visit a hospital emergency department to put your mind at ease. Good News. Most Arm Pain is NOT Life-Threatening. Luckily, life-threatening arm pain is far less likely than a local musculoskeletal injury. Arm pain caused by a localised arm muscle, tendon or joint injury should be assessed and confirmed by your health practitioner before commencing treatment. Arm Pain Prognosis The good news is that arm pain, and injury will normally respond very favourably to medical or physiotherapy intervention when early professional assessment and treatment is sought. Please do not delay in consulting your healthcare practitioner if you experience arm pain. Common Arm Pain Treatments With accurate assessment and early treatment, most arm injuries respond extremely quickly to physiotherapy or medical care, allowing you to resume pain-free and normal activities of daily living quickly. Please ask your physiotherapist for their professional treatment advice. Muscle Pain Injuries Myalgia, or muscle pain, can have many sources. Here are some of the more common sources of your muscle pain. Please click the links for more information. Muscle Strains By Region Neck & Back: Leg: Arm: Haematoma-related Myalgia Fatigue-related Myalgia Systemic Causes of Myalgia More Information: Myalgia You've just added this product to the cart: Physio Works...
ESSENTIALAI-STEM
DIYLILCNC From P2P Foundation Jump to navigation Jump to search = project to build a cheap 3-axis CNC for the everymaker URL = http://www.diylilcnc.org Description "The DIYLILCNC project is a set of plans for an inexpensive, fully functional 3-axis CNC mill that can be built by an individual with basic shop skills and tool access. CNC devices are used to fabricate physical objects with a high degree of precision. Some CNC devices, including the DIYLILCNC, feature a gantry-mounted cutting tool (like a router) that can move in two or more directions. The operation of the tool is controlled by a computer, which is tasked with translating a digital design into actual tool movement. The DIYLILCNC can be built for around $700. This cost includes all the stock hardware and sheet material used in construction. CAD files for custom laser-cut parts are distributed along with the plans. Anyone with access to a laser cutter can use these files to fabricate all the panel parts necessary for construction; those without ready laser-cutter access can use local or online laser-cutting services. Plans and instructions for building the DIYLILCNC are distributed freely and intended for wide distribution and modification with few restrictions. The plans are formatted to facilitate easy fabrication, especially for beginners. The DIYLILCNC can be built by an individual, a student group, or a class. Besides being immensely fun, building the DIY LIL CNC is a great way to learn about motion control and CAD/CAM/CAE." (http://diylilcnc.org/)
ESSENTIALAI-STEM
Fraunhofer-Gesellschaft Publica Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten. Replication of a distinct psoriatic arthritis risk variant at IL23R   : Budu-Aggrey, A.; Bowes, J.; Lohr, S.; Uebe, S.; Zervou, M.I.; Helliwell, P.; Ryan, A.W.; Kane, D.; Korendowych, E.; Giardina, E.; Packham, J.; McManus, R.; FitzGerald, O.; McHugh, N.; Behrens, F.; Burkhardt, H.; Huffmeier, U.; Ho, P.; Martin, J.; Castaneda, S.; Goulielmos, G.; Reis, A.; Barton, A. : Annals of the rheumatic diseases 75 (2016), Supplement 2, S.667-668 ISSN: 0003-4967 Annual European Congress of Rheumatology (EULAR) <2016, London> Englisch Abstract Fraunhofer IME () Abstract Background: Psoriatic arthritis (PsA) is an inflammatory arthritis that is associated with psoriasis. Although the majority of PsA genetic risk loci identified also confer risk for psoriasis, we have recently reported evidence of loci that are associated with PsA and not psoriasis, including an association at the IL23R locus which is also independent of a psoriasis variant at the same locus. Methods: The PsA-specific SNP rs12044149, and the psoriasis SNP rs9988642 at the IL23R locus were genotyped in a cohort of 914 PsA cases and 6,945 controls from Spain, Crete, Germany and the UK, with the Life Technologies QuantStudio genotyping platform. Association testing was carried out using PLINK, and a meta-analysis was performed with PsA Immunochip data (1,962 cases, 8,923 controls). Genotype data was also available from the psoriasis WTCCC2 study (excluding known PsA, n=1,784) to compare effect sizes between PsA and psoriasis using multinomial logistic regression in Stata, and to directly compare PsA and psoriasis genotypes. Credible SNP sets were calculated for the PsA and psoriasis IL23R associations using the Bayesian refinement method, and functionally annotated. Results: We replicated the association rs12044149 with PsA (P=4.03x10–6), which remained significant when conditioning upon the psoriasis variant, rs9988642 (Pcond=4.86x10–6), and reached genome-wide significance during meta-analysis of the combined PsA dataset (Pmeta=4.76x10–20). Only a modest association was found for rs9988642 (P=0.04), with no genome-wide significance found during meta-analysis (P=4.61x10–4). Within the psoriasis dataset, this association remained significant when conditioning upon rs12044149 (P=1.0x10–07 vs. Pcond=1.63x10–5). Effect estimates for rs12044149 were significantly different between PsA and psoriasis (P=2.0x10–3), and direct comparison of genotypes for PsA and psoriasis found the risk allele to be significantly increased in PsA (P=4.52x10–4, OR=1.3). Credible SNPs for rs12044149 mapped to promoter and enhancer regions within memory CD8+ T cells, which we have previously reported to be critical for PsA. Conclusions: We have successfully replicated a PsA-specific (associated with PsA but not psoriasis) risk variant at the IL23R locus in an independent cohort, confirming rs12044149 to be distinct from rs9988642 (r2=0.02). This gives five PsA-specific associations that have now been identified. : http://publica.fraunhofer.de/dokumente/N-467479.html
ESSENTIALAI-STEM
Diana Ciucă Diana Cristiana Ciucă (born 1 June 2000) is a Romanian handball player for CS Rapid București and the Romanian national team. In September 2018, she was included by EHF in a list of the twenty best young handballers to watch for the future. She represented Romania at the 2019 World Women's Handball Championship. Achievements * Liga Națională: * Winner: 2019, 2022 * Supercupa României: * Winner: 2018 * Cupa României: * Finalist: 2018 * Youth European Olympic Festival: * Silver Medalist: 2017 Individual awards * All-Star Goalkeeper of the Youth European Championship: 2017
WIKI
User:Dmk003/sandbox Janet Taylor Spence's parents met in New York where John was working as a reporter and Helen was studying for a master's degree in economics at Colombia.[6] It's important to note that while attending Yale University as a clinical student, Spence worked under Clark L. Hull, the predominant learning theorist of his era.
WIKI
Android Camera1 API guide android_camera1.png Camera1 API Using the camera to take photos is relatively easy. It is somewhat harder to setup the camera preview to work properly. Using the camera on the Android device can be done via the integration of existing camera application. In this case you would start the existing Camera application via an intent and use the return data of the application to access the result. Alternatively you can also directly integrate the camera into your application via the Camera API. This application will capture an image and save it to the image directory using Camera API. Let's start! Add the android.permission.CAMERA permission to access your camera and the android.permission.WRITE_EXTERNAL_STORAGE to be able to write to the SD card to your AndroidManifest.xml file. <uses-permission android:name="android.permission.CAMERA" /> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" /> <uses-feature android:name="android.hardware.camera" /> For demo purpose I have created a simple layout with GridView. Change the activity_main.xml file in the res/layout folder to the following <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:orientation="vertical" tools:context=".MainActivity"> <GridView android:id="@+id/gvPhotos" android:layout_height="match_parent" android:layout_width="match_parent" android:padding="10dp" android:verticalSpacing="10dp" android:horizontalSpacing="10dp" android:numColumns="auto_fit" android:columnWidth="100dp" android:stretchMode="columnWidth" android:gravity="center" /> </LinearLayout> MainActivity will hold GridView with all saved photos. import android.content.Intent; import android.graphics.Bitmap; import android.graphics.BitmapFactory; import android.graphics.drawable.BitmapDrawable; import android.graphics.drawable.Drawable; import android.os.Environment; import android.support.v7.app.ActionBar; import android.support.v7.app.AppCompatActivity; import android.os.Bundle; import android.view.Menu; import android.view.MenuItem; import android.widget.GridView; import java.io.File; import java.util.ArrayList; import java.util.List; public class MainActivity extends AppCompatActivity { private GridView gvPhotos; private PhotoAdapter adPhotos; public static final String REQUEST_RESULT="REQUEST_RESULT"; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); ActionBar actionBar = getSupportActionBar(); actionBar.setLogo(R.drawable.ic_launcher); actionBar.setDisplayUseLogoEnabled(true); actionBar.setDisplayShowHomeEnabled(true); adPhotos = new PhotoAdapter(this, getPhotos()); gvPhotos = (GridView)findViewById(R.id.gvPhotos); gvPhotos.setAdapter(adPhotos); } @Override public boolean onCreateOptionsMenu(Menu menu) { getMenuInflater().inflate(R.menu.menu_main, menu); return super.onCreateOptionsMenu(menu); } @Override public boolean onOptionsItemSelected(MenuItem item) { switch (item.getItemId()) { case R.id.menu_photo: Intent i = new Intent(this, TakePhotoActivity.class); startActivityForResult(i, 1); break; default: break; } return true; } @Override protected void onActivityResult(int requestCode, int resultCode, Intent data) { super.onActivityResult(requestCode, resultCode, data); if (resultCode == RESULT_OK) { adPhotos.setPhotos(getPhotos()); } } public List<Drawable> getPhotos() { File rootDir = Environment.getExternalStoragePublicDirectory(Environment.DIRECTORY_PICTURES); File pictureDir = new File(rootDir, "CV"); List<Drawable> list = new ArrayList<>(); // fix java.lang.OutOfMemoryError BitmapFactory.Options options = new BitmapFactory.Options(); options.inSampleSize = 8; for(File f : pictureDir.listFiles()){ Bitmap original = BitmapFactory.decodeFile(f.getAbsolutePath(), options); Drawable drawable = new BitmapDrawable(getResources(), original); list.add(drawable); } return list; } } Create new class PhotoAdapter for our GridView import android.content.Context; import android.graphics.drawable.Drawable; import android.view.View; import android.view.ViewGroup; import android.widget.BaseAdapter; import android.widget.GridView; import android.widget.ImageView; import java.util.List; public class PhotoAdapter extends BaseAdapter { private Context ctx; List<Drawable> list; public PhotoAdapter(Context ctx, List<Drawable> list) { this.ctx = ctx; this.list = list; } public int getCount() { return list.size(); } public Object getItem(int position) { return position; } public long getItemId(int position) { return position; } public void setPhotos(List<Drawable> list) { this.list = list; notifyDataSetChanged(); } public View getView(int position, View convertView, ViewGroup parent) { ImageView imageView; if (convertView == null) { imageView = new ImageView(ctx); imageView.setLayoutParams(new GridView.LayoutParams(185, 185)); imageView.setScaleType(ImageView.ScaleType.CENTER_CROP); imageView.setPadding(5, 5, 5, 5); } else { imageView = (ImageView) convertView; } imageView.setImageDrawable(list.get(position)); return imageView; } } Menu file <?xml version="1.0" encoding="utf-8"?> <menu xmlns:android="http://schemas.android.com/apk/res/android" xmlns:app="http://schemas.android.com/apk/res-auto"> <item android:id="@+id/menu_photo" android:title="Take photo" app:showAsAction="ifRoom" android:icon="@android:drawable/ic_menu_camera" > </item> </menu> Create the following TakePhotoActivity class which will be responsible for taking the photo and saving to the SD card. I'm going to use TextureView to display a content stream. Unlike SurfaceView, TextureView does not create a separate window but behaves as a regular View. This key difference allows a TextureView to be moved, transformed, animated, etc. In order to use TextureView, all you need to do is get its SurfaceTexture. The SurfaceTexture can then be used to render content. In order to do this, you just need to do instantiate an object of this class and implement SurfaceTextureListener interface. Then we need to override the below methods to complete implementation • public void onSurfaceTextureAvailable(SurfaceTexture arg0, int arg1, int arg2) - invoked when a TextureView's SurfaceTexture is ready for use. • public boolean onSurfaceTextureDestroyed(SurfaceTexture arg0) - invoked when the specified SurfaceTexture is about to be destroyed. • public void onSurfaceTextureSizeChanged(SurfaceTexture arg0, int arg1,int arg2) - invoked when the SurfaceTexture's buffers size changed. • public void onSurfaceTextureUpdated(SurfaceTexture arg0) - invoked when the specified SurfaceTexture is updated through updateTexImage(). Any view that is displayed in the TextureView can be rotated and its alpha property can be adjusted by using setAlpha and setRotation methods. import android.app.Activity; import android.content.Context; import android.content.Intent; import android.content.pm.PackageManager; import android.graphics.SurfaceTexture; import android.os.Environment; import android.os.Bundle; import android.util.Log; import android.view.TextureView; import android.view.View; import android.hardware.Camera; import android.hardware.Camera.PictureCallback; import android.widget.Toast; import java.io.File; import java.io.FileOutputStream; import java.io.IOException; import java.text.SimpleDateFormat; import java.util.Date; @SuppressWarnings("deprecation") public class TakePhotoActivity extends Activity implements TextureView.SurfaceTextureListener { private final static String DEBUG_TAG = "APP"; private final static String DIR_APP_PHOTO = "CV"; private TextureView textureView; private Camera camera; private int cameraID = 0; public class PhotoHandler implements PictureCallback { private final Context context; public PhotoHandler(Context context) { this.context = context; } @Override public void onPictureTaken(byte[] data, Camera camera) { File rootDir = Environment.getExternalStoragePublicDirectory(Environment.DIRECTORY_PICTURES); File pictureDir = new File(rootDir, DIR_APP_PHOTO); if (!pictureDir.exists() && !pictureDir.mkdirs()) { Log.d(TakePhotoActivity.DEBUG_TAG, "Can't create directory to save image."); Toast.makeText(context, "Can't create directory to save image.", Toast.LENGTH_LONG).show(); return; } SimpleDateFormat dateFormat = new SimpleDateFormat("yyyymmddhhmmss"); String date = dateFormat.format(new Date()); String photoFile = "photo_" + date + ".jpg"; String filename = pictureDir.getPath() + File.separator + photoFile; File pictureFile = new File(filename); try { FileOutputStream fos = new FileOutputStream(pictureFile); fos.write(data); fos.close(); Toast.makeText(context, "Photo saved to " + photoFile, Toast.LENGTH_LONG).show(); } catch (Exception error) { Log.d(TakePhotoActivity.DEBUG_TAG, "File" + filename + "not saved: " + error.getMessage()); Toast.makeText(context, "Image could not be saved.", Toast.LENGTH_LONG).show(); } Intent i = new Intent(); i.putExtra(MainActivity.REQUEST_RESULT, photoFile); setResult(RESULT_OK, i); finish(); } } private int findBackCamera() { int cameraID = -1; int numberOfCameras = Camera.getNumberOfCameras(); for (int i = 0; i < numberOfCameras; i++) { Camera.CameraInfo info = new Camera.CameraInfo(); Camera.getCameraInfo(i, info); if (info.facing == Camera.CameraInfo.CAMERA_FACING_BACK) { Log.d(DEBUG_TAG, "Camera found!"); cameraID = i; break; } } return cameraID; } @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.take_photo_activity); if (!getPackageManager().hasSystemFeature(PackageManager.FEATURE_CAMERA)) { Toast.makeText(this, "No camera on this device", Toast.LENGTH_LONG).show(); } else { cameraID = findBackCamera(); if (cameraID < 0) { Toast.makeText(this, "No back camera found.", Toast.LENGTH_LONG).show(); } else { camera = Camera.open(cameraID); textureView = (TextureView)findViewById(R.id.textureView); textureView.setSurfaceTextureListener(this); } } } public void onSurfaceTextureAvailable(SurfaceTexture surface, int width, int height) { if (camera != null) { try { Camera.Parameters parameters = camera.getParameters(); parameters.setRotation(90); camera.setParameters(parameters); camera.setPreviewTexture(surface); camera.setDisplayOrientation(90); camera.startPreview(); } catch (IOException e) { e.printStackTrace(); } } } public boolean onSurfaceTextureDestroyed(SurfaceTexture surface) { if (camera != null) { camera.stopPreview(); camera.release(); } return true; } public void onSurfaceTextureSizeChanged(SurfaceTexture surface, int width, int height) {} public void onSurfaceTextureUpdated(SurfaceTexture surface) {} public void takePicture(View view) { if (camera != null) { camera.takePicture(null, null, new PhotoHandler(getApplicationContext())); } } } Result android_camera2.png Camera2 API Compared with the old camera API, the Camera2 API introduced in the L is a lot more complex: more than ten classes are involved, calls (almost always) are asynchronized, plus lots of capture controls and meta data that you feel confused about. Following are steps of using camera2 API 1. Start from CameraManager. 2. Setup the output targets. 3. Get a CameraDevice. 4. Create a CaptureRequest from the CameraDevice. 5. Create a CaptureRequestSession from the CameraDevice. 6. Submit a CaptureRequest to CaptureRequestSession. 7. Get the CaptureResults. You can see example of Camera2 API in android-Camera2Basic github. comments powered by Disqus
ESSENTIALAI-STEM
Persian Bert For Long-Range Sequences Overview ParsBigBird: Persian Bert For Long-Range Sequences The Bert and ParsBert algorithms can handle texts with token lengths of up to 512, however, many tasks such as summarizing and answering questions require longer texts. In our work, we have trained the BigBird model for the Persian language to process texts up to 4096 in the Farsi (Persian) language using sparse attention. big bird's attention block Big bird's attention block from BigBird's paper Evaluation: 🌡️ We have evaluated the model on three tasks with different sequence lengths Name Params SnappFood (F1) Digikala Magazine(F1) PersianQA (F1) distil-bigbird-fa-zwnj 78M 85.43% 94.05% 73.34% bert-base-fa 118M 87.98% 93.65% 70.06% • Despite being as big as distill-bert, the model performs equally well as ParsBert and is much better on PersianQA which requires much more context • This evaluation was based on max_lentgh=2048 (It can be changed up to 4096) How to use As Contextualized Word Embedding from transformers import BigBirdModel, AutoTokenizer MODEL_NAME = "SajjadAyoubi/distil-bigbird-fa-zwnj" # by default its in `block_sparse` block_size=32 model = BigBirdModel.from_pretrained(MODEL_NAME, block_size=32) # you can use full attention like the following: use this when input isn't longer than 512 model = BigBirdModel.from_pretrained(MODEL_NAME, attention_type="original_full") text = "😃 امیدوارم مدل بدردبخوری باشه چون خیلی طول کشید تا ترین بشه" tokenizer = AutoTokenizer.from_pretrained(MODEL_NAME) tokens = tokenizer(text, return_tensors='pt') output = model(**tokens) # contextualized embedding As Fill Blank from transformers import pipeline MODEL_NAME = 'SajjadAyoubi/distil-bigbird-fa-zwnj' fill = pipeline('fill-mask', model=MODEL_NAME, tokenizer=MODEL_NAME) results = fill('تهران پایتخت [MASK] است.') print(results[0]['token_str']) >>> 'ایران' Pretraining details: 🔭 This model was pretrained using a masked language model (MLM) objective on the Persian section of the Oscar dataset. Following the original BERT training, 15% of tokens were masked. This was first described in this paper and released in this repository. Documents longer than 4096 were split into multiple documents, while documents much smaller than 4096 were merged using the [SEP] token. Model is warm started from distilbert-fa’s checkpoint. • For more details, you can take a look at config.json at the model card in 🤗 Model Hub Fine Tuning Recommendations: 🐤 Due to the model's memory requirements, gradient_checkpointing and gradient_accumulation should be used to maintain a reasonable batch size. Considering this model isn't really big, it's a good idea to first fine-tune it on your dataset using Masked LM objective (also called intermediate fine-tuning) before implementing the main task. In block_sparse mode, it doesn't matter how many tokens are input. It just attends to 256 tokens. Furthermore, original_full should be used up to 512 sequence lengths (instead of block sparse). Fine Tuning Examples 👷‍♂️ 👷‍♀️ Dataset Fine Tuning Example Digikala Magazine Text Classification Contact us: 🤝 If you have a technical question regarding the model, pretraining, code or publication, please create an issue in the repository. This is the fastest way to reach us. Citation: ↩️ we didn't publish any papers on the work. However, if you did, please cite us properly with an entry like one below. @misc{ParsBigBird, author = {Ayoubi, Sajjad}, title = {ParsBigBird: Persian Bert For Long-Range Sequences}, year = 2021, publisher = {GitHub}, journal = {GitHub repository}, howpublished = {\url{https://github.com/SajjjadAyobi/ParsBigBird}}, } You might also like... Addon for adding subtitle files to blender VSE as Text sequences. Using pysub2 python module. Addon for adding subtitle files to blender VSE as Text sequences. Using pysub2 python module. Import Subtitles for Blender VSE Addon for adding subtitle files to blender VSE as Text sequences. Using pysub2 python module. Supported formats by py When doing audio and video sentiment recognition, I found that a lot of code is duplicated, often a function in different time debugging for a long time, based on this problem, I want to manage all the previous work, organized into an open source library can be iterative. For their own use and others. Extracting Summary Knowledge Graphs from Long Documents GraphSum This repo contains the data and code for the G2G model in the paper: Extracting Summary Knowledge Graphs from Long Documents. The other basel ThinkTwice: A Two-Stage Method for Long-Text Machine Reading Comprehension ThinkTwice ThinkTwice is a retriever-reader architecture for solving long-text machine reading comprehension. It is based on the paper: ThinkTwice: A Ptorch NLU, a Chinese text classification and sequence annotation toolkit, supports multi class and multi label classification tasks of Chinese long text and short text, and supports sequence annotation tasks such as Chinese named entity recognition, part of speech tagging and word segmentation. Pytorch-NLU,一个中文文本分类、序列标注工具包,支持中文长文本、短文本的多类、多标签分类任务,支持中文命名实体识别、词性标注、分词等序列标注任务。 Ptorch NLU, a Chinese text classification and sequence annotation toolkit, supports multi class and multi label classification tasks of Chinese long text and short text, and supports sequence annotation tasks such as Chinese named entity recognition, part of speech tagging and word segmentation. Official Pytorch implementation of Test-Agnostic Long-Tailed Recognition by Test-Time Aggregating Diverse Experts with Self-Supervision. Official Pytorch implementation of Test-Agnostic Long-Tailed Recognition by Test-Time Aggregating Diverse Experts with Self-Supervision. This repository is the official Pytorch implementation of Test-Agnostic Long-Tailed Recognition by Test-Time Aggregating Diverse Experts with Self-Supervision. Japanese Long-Unit-Word Tokenizer with RemBertTokenizerFast of Transformers Japanese-LUW-Tokenizer Japanese Long-Unit-Word (国語研長単位) Tokenizer for Transformers based on 青空文庫 Basic Usage from transformers import RemBertToken Code for Discovering Topics in Long-tailed Corpora with Causal Intervention. Code for Discovering Topics in Long-tailed Corpora with Causal Intervention ACL2021 Findings Usage 0. Prepare environment Requirements: python==3.6 te Long text token classification using LongFormer Long text token classification using LongFormer Comments • Fine Tuning Example for summarization Fine Tuning Example for summarization Hi, Thanks for publishing this model. 1-Is there an example of fine-tuning it for summarization? 2-How to fine-tune it on my dataset using Masked LM in pytorch? Thanks opened by FatemehMashhadi 5 Owner Sajjad Ayoubi Wants to be a Machine Learning Engineer Sajjad Ayoubi Beyond Paragraphs: NLP for Long Sequences Beyond Paragraphs: NLP for Long Sequences AI2 338 Dec 2, 2022 LV-BERT: Exploiting Layer Variety for BERT (Findings of ACL 2021) LV-BERT Introduction In this repo, we introduce LV-BERT by exploiting layer variety for BERT. For detailed description and experimental results, pleas Weihao Yu 14 Aug 24, 2022 VD-BERT: A Unified Vision and Dialog Transformer with BERT VD-BERT: A Unified Vision and Dialog Transformer with BERT PyTorch Code for the following paper at EMNLP2020: Title: VD-BERT: A Unified Vision and Dia Salesforce 44 Nov 1, 2022 Pytorch-version BERT-flow: One can apply BERT-flow to any PLM within Pytorch framework. Pytorch-version BERT-flow: One can apply BERT-flow to any PLM within Pytorch framework. Ubiquitous Knowledge Processing Lab 59 Dec 1, 2022 Yet Another Sequence Encoder - Encode sequences to vector of vector in python ! Yase Yet Another Sequence Encoder - encode sequences to vector of vectors in python ! Why Yase ? Yase enable you to encode any sequence which can be r Pierre PACI 12 Aug 19, 2021 Big Bird: Transformers for Longer Sequences BigBird, is a sparse-attention based transformer which extends Transformer based models, such as BERT to much longer sequences. Moreover, BigBird comes along with a theoretical understanding of the capabilities of a complete transformer that the sparse model can handle. Google Research 457 Dec 23, 2022 Compute distance between sequences. 30+ algorithms, pure python implementation, common interface, optional external libs usage. TextDistance TextDistance -- python library for comparing distance between two or more sequences by many algorithms. Features: 30+ algorithms Pure pyt Life4 3k Jan 6, 2023 Compute distance between sequences. 30+ algorithms, pure python implementation, common interface, optional external libs usage. TextDistance TextDistance -- python library for comparing distance between two or more sequences by many algorithms. Features: 30+ algorithms Pure pyt Life4 1.9k Feb 18, 2021 Implementation of COCO-LM, Correcting and Contrasting Text Sequences for Language Model Pretraining, in Pytorch COCO LM Pretraining (wip) Implementation of COCO-LM, Correcting and Contrasting Text Sequences for Language Model Pretraining, in Pytorch. They were a Phil Wang 44 Jul 28, 2022
ESSENTIALAI-STEM
Luis Antonio de Castro y Castillo Luis Antonio de Castro y Castillo (died 1653) was a Roman Catholic prelate who served as Bishop of La Paz (1647–1653). Biography Luis Antonio de Castro y Castillo was born in Alcala la Real. On 13 September 1647, he was selected as Bishop of La Paz and confirmed by Pope Innocent X on 13 January 1648. On 26 April 1648, he was consecrated bishop by Juan de Arguinao y Gutiérrez, Bishop of Santa Cruz de la Sierra. He served as Bishop of La Paz until his death on 7 October 1653. External links and additional sources * (for Chronology of Bishops) $[self-published]$ * (for Chronology of Bishops) $[self-published]$
WIKI
FortiSOAR Knowledge Base FortiSOAR: Security Orchestration and Response software provides innovative case management, automation, and orchestration. It pulls together all of an organization's tools, helps unify operations, and reduce alert fatigue, context switching, and the mean time to respond to incidents. anerot-forti Staff Staff Article Id 309450 Description This article describes that when sending an API request to FortiSOAR, it is necessary to authenticate it. Several authentication methods are available: • Login: Typically normal FortiSOAR User (Requires 1 user seat, Do not forget to Logout). • HMAC: Appliances (Public/Private API Key). • API Key: FortiSOAR 7.5.0 minimum . Fortinet Document Library - FSR HMAC Authentication explains the concept of creating an Identifier and proposes some sample PHP and Python scripts but Postman pre-script language is Javascript. Scope FortiSOAR, API, Postman. Solution Here is a Postman collection of API requests to FortiSOAR organized by folders depending on the authentication mechanism. Just download the collection + environment variable files and import them into Postman. The HMAC folder includes APIs with the pre-script in javascript.   Here is the Javascript available in the pre-script tab of HMAC-based authenticated requests:   // //This script is based on https://docs.fortinet.com/document/fortisoar/7.4.3/api-guide/797122/hmac-authentication // //Get URI and replace any {{my_var}} with the relevant value var replaceVars = function(string) { return string.replace(/\{\{.+?\}\}/g, function(match) { var varName = match.substr(2, match.length - 4); var varValue = environment[varName] || globals[varName]; return varValue ? replaceVars(varValue) : match; // recursive! }); //Thanks to Gitfool for this replace code } var fulluri = replaceVars(request.url); // Build the timestamp value YYYY-MM-DD HH:MM:SS const currentDate = new Date(); const year = currentDate.getFullYear().toString(); const month = (currentDate.getMonth() + 1).toString().padStart(2, '0'); const day = currentDate.getDate().toString().padStart(2, '0'); const hour = currentDate.getUTCHours().toString().padStart(2, '0'); const minute =currentDate.getMinutes().toString().padStart(2, '0'); const seconde=currentDate.getSeconds().toString().padStart(2, '0'); var timestamp = `${year}-${month}-${day} ${hour}:${minute}:${seconde}`; // Get the verb var verb = pm.request.method; // Build the HASHED Payload and X-CS-Data Header var payload = pm.environment.get("pub_key"); var hashedpayload = CryptoJS.SHA256(payload).toString(); pm.request.addHeader("X-CS-Data: " + hashedpayload); // Build the HMAC256 Fingerprint var SecretPassphrase = pm.environment.get("priv_key"); var rawFingerprint = "sha256." + verb + "." + timestamp + "." + fulluri + "." + hashedpayload; var hashedFingerprint = CryptoJS.HmacSHA256(rawFingerprint, SecretPassphrase).toString(); // Build the Authorization Header var rawauth_header = "sha256;" + timestamp + ";" + payload + ";" + hashedFingerprint; var auth_header = CryptoJS.enc.Base64.stringify(CryptoJS.enc.Utf8.parse(rawauth_header)); pm.request.addHeader("Authorization: CS " + auth_header); // For debug only. Please uncomment to see some values console.log("rawFingerprint:"+rawFingerprint,"rawauth_header:"+rawauth_header);    
ESSENTIALAI-STEM
Santeri Pohjolainen Santeri Pohjolainen (born 5 May 2002) is a Finnish professional footballer who plays as a midfielder for Ykkösliiga club Järvenpään Palloseura (JäPS). Club career Pohjolainen debuted in Veikkausliiga with Turun Palloseura (TPS) in the 2020 season. He signed with Ykkösliiga club JäPS for the 2024 season. Honours TPS * Ykkönen runner-up: 2022
WIKI
Voxel-based supervised machine learning of peripheral zone prostate cancer using noncontrast multiparametric MRI Neda Gholizadeh, John Simpson, Saadallah Ramadan, Jim Denham, Peter Lau, Sabbir Siddique, Jason Dowling, James Welsh, Stephan Chalup, Peter B. Greer Research output: Contribution to journalArticlepeer-review 9 Citations (Scopus) Abstract Purpose: The aim of this study was to develop and assess the performance of supervised machine learning technique to classify magnetic resonance imaging (MRI) voxels as cancerous or noncancerous using noncontrast multiparametric MRI (mp-MRI), comprised of T2-weighted imaging (T2WI), diffusion-weighted imaging (DWI), and advanced diffusion tensor imaging (DTI) parameters. Materials and methods: In this work, 191 radiomic features were extracted from mp-MRI from prostate cancer patients. A comprehensive set of support vector machine (SVM) models for T2WI and mp-MRI (T2WI + DWI, T2WI + DTI, and T2WI + DWI + DTI) were developed based on novel Bayesian parameters optimization method and validated using leave-one-patient-out approach to eliminate any possible overfitting. The diagnostic performance of each model was evaluated using the area under the receiver operating characteristic curve (AUROC). The average sensitivity, specificity, and accuracy of the models were evaluated using the test data set and the corresponding binary maps generated. Finally, the SVM plus sigmoid function of the models with the highest performance were used to produce cancer probability maps. Results: The T2WI + DWI + DTI models using the optimal feature subset achieved the best performance in prostate cancer detection, with the average AUROC, sensitivity, specificity, and accuracy of 0.93 ± 0.03, 0.85 ± 0.05, 0.82 ± 0.07, and 0.83 ± 0.04, respectively. The average diagnostic performance of T2WI + DTI models was slightly higher than T2WI + DWI models (+3.52%) using the optimal radiomic features. Conclusions: Combination of noncontrast mp-MRI (T2WI, DWI, and DTI) features with the framework of a supervised classification technique and Bayesian optimization method are able to differentiate cancer from noncancer voxels with high accuracy and without administration of contrast agent. The addition of cancer probability maps provides additional functionality for image interpretation, lesion heterogeneity evaluation, and treatment management. Original languageEnglish Pages (from-to)179-191 Number of pages13 JournalJournal of Applied Clinical Medical Physics Volume21 Issue number10 DOIs Publication statusPublished - 1 Oct 2020 Externally publishedYes Fingerprint Dive into the research topics of 'Voxel-based supervised machine learning of peripheral zone prostate cancer using noncontrast multiparametric MRI'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
FIS Nordic World Ski Championships 2023 The 43rd FIS Nordic World Ski Championships were held from 21 February to 5 March 2023 in Planica, Slovenia. Championships Slovenia hosted the Nordic World Championships for the first time. All competitions took place at the Planica Nordic Centre, located in the Planica monument valley. Host selection The World Championships were awarded at the 51st FIS Congress, held between 13 and 19 May 2018 in Costa Navarino, Greece. Planica's bids to host the championships had been unsuccessful on three previous occasions. The detailed application had to be submitted by 1 September 2017. On 17 May 2018, Planica was announced as the host, beating Norwegian Trondheim. Venues * Bloudkova velikanka is a large hill (HS138), completely rebuilt in 2012 after the previous hill collapsed. A total of ten world records were set on the hill. * Srednja skakalnica is a normal hill (HS102) standing right next to Bloudkova velikanka, and hosted events in ski jumping and nordic combined. * Rateče Planica track is a cross-country skiing track that stretches across the entire valley between Rateče and Planica. Schedule All times are local (UTC+1). Participating nations Over 2,000 athletes from 66 countries participated at the Championships.
WIKI
Share Superior Semicircular Canal Dehiscence (SSCD) What is superior Semicircular canal dehiscence? Vestibular and auditory symptoms and signs can result from a dehiscence (opening) in the bone overlying the superior semicircular canal of the inner ear. This clinical syndrome—superior semicircular canal dehiscence syndrome (SSCD)—was first described by Minor and colleagues in 1998. Patients with SSCD can experience vertigo and oscillopsia (the apparent motion of objects that are known to be stationary) evoked by loud noises and/or by maneuvers that change middle-ear or intracranial pressure (such as coughing, sneezing, or straining). Auditory manifestations of the syndrome include autophony (increased resonance of one’s own voice), hypersensitivity to bone-conducted sounds, and an apparent conductive hearing loss revealed on audiometry. Some patients have exclusively vestibular symptoms and signs; some have both auditory and vestibular manifestations; and still other patients have exclusively auditory complaints. Following is a video filmed by Dr. P. Ashley Wackym of Portland, Oregon's Ear & Skull Base Center, showing a patient who has suffered from superior semicircular canal dehiscence. View this and more videos by Dr. Wackym on his YouTube channel. Causes With a dehiscence in the bone that is supposed to cover the superior semicircular canal, the fluid in the membranous superior semiciruclar canal (which is located within the lumen—tubular cavity—of the bony canal) can be displaced by sound and pressure stimuli. There are normally only two points of increased compliance (yielding to pressure) in the inner ear: the oval window, through which sound energy is transmitted into the inner ear via the stapes bone; and the round window, through which sound energy is dissipated from the inner ear after traveling around the cochlea. SSCD creates a third mobile window into the inner ear. The signs and symptoms in this syndrome are due to the physiological consequences of this third window. The mean age at the time of diagnosis is around 45 years. Unilateral SSCD occurs relatively equally in the right and left ears. About one-third of patients have evidence of bilateral SSCD at the time of diagnosis. In patients with bilateral dehiscence, there is typically one ear from which the symptoms and signs are greater. In patients with unilateral dehiscence, the bone overlying the contralateral superior canal (in the opposite ear) is often abnormally thin. These findings support the notion that SSCD is due to a developmental abnormality. Temporal-bone histopathological studies suggest that 1–2% of the population have abnormally thin bone overlying the superior canal (Carey et al. 2000). Disruption of this thin layer (as may perhaps occur with trauma or over time due to the pressure of the overlying temporal lobe of the brain) leads to the onset of symptoms and signs. Diagnosis Vestibular symptoms and signs: The vestibular symptoms in SSCD can be debilitating and often provoke patients to seek medical attention. Patients may note that loud noises cause them to see things moving or that they experience a similar sensation when they cough, sneeze, or strain to lift something heavy. They may perceive that objects are moving in time with their pulse (pulsatile oscillopsia). Some indi¬viduals can bring on the sensation of motion—and cause their eyes to move—by pressing on their tragus (the area of skin and cartilage located just outside the ear canal). Patients may experience a feeling of constant disequilibrium and imbalance. The signs of vestibular abnormalities in SSCD relate directly to the effect of the dehiscence in creating a third mobile window into the inner ear. One of the most important functions of the vestibular system is to keep the eyes focused on objects of interest during head movements. A principle underlying the organization of these vestibulo-ocular reflexes is that the eyes move in the plane of the semicircular canal that is being activated. Analysis of the eye movements evoked by sound and pressure stimuli in patients with SSCD led Minor and colleagues (1998) to the identification of this syndrome. These evoked eye movements often align with the plane of the superior canal. Furthermore, the direction of the eye movements provides support for the theory of a third-mobile-window mechanism. Stimuli that result in inward motion of the stapes footplate (such as loud sounds, applying pressure to the external ear canal, or blowing pressure through the nose while pinching the nostrils) produce an excitation of the superior canal. Evoked eye movements in these situations are typically vertical-torsional, with the eyes moving up and the superior pole of each eye moving away from the SSCD ear. Stimuli that result in outward motion of the stapes footplate (such as negative pressure applied to the external ear canal) or that increase intracranial pressure (such as taking a deep breath and bearing down, or compressing the jugular vein with pressure on the neck) typically result in eye movements that are in the same plane but opposite in direction. The eyes move down, and the superior pole of each eye moves toward the SSCD ear. Auditory symptoms and signs: The auditory symptoms and signs in SSCD may mimic those in other ear disorders and may at times seem bizarre. Some patients have a conductive hearing loss for low-frequency sounds that can resemble the pattern in otosclerosis. These diagnostic entities can be distinguished by acoustic reflex testing: patients with otosclerosis lose the acoustic reflex response in the affected ear early in the course of the disorder, whereas the response remains intact in SSCD. This distinction is important because patients who have conductive hearing loss resulting from SSCD will not benefit from stapedectomy surgery. Patients with SSCD may also complain of symptoms such as hearing their eye movements, hearing their own voice too loudly in the affected ear (autophony), or having a distorted sensation of sound in the affected ear during activities such as running. These auditory symptoms and signs are also manifestations of the third mobile window created by the dehiscence. Bone-conducted sounds are amplified by the effects of the dehiscence, whereas the energy from air-conducted sounds is partially shunted away from the cochlea and through the dehiscence. CT imaging: High-resolution CT scans of the temporal bones are very useful in making the diagnosis of SSCD. These scans demonstrate the opening in the bone that should cover the superior canal. Care must be exercised, however, because such scans may miss a thin layer of intact bone overlying the canal. Applying specific parameters for the CT imaging can improve the specificity of the scans (Belden et al. 2003), but false positives can still occur, even with the highest-resolution scans. Individuals who are suspected of having SSCD are strongly urged to have their CT scans performed at a center experienced in the diagnosis of SSCD. It must be emphasized that even with these scans, the diagnosis depends upon characteristic clinical findings and other physiologic tests. Vestibular evoked myogenic potentials (VEMP): In SSCD, loud tones evoke a short-latency relaxation potential in the ipsilateral sternocleidomastoid muscle. Patients with SSCD typically have a lower-than-normal threshold for the VEMP response, and the amplitude of the VEMP waveform in an SSCD ear is greater for comparable stimulus intensities than in an ear without dehiscence. The VEMP test plays an important role in the evaluation of patients with suspected SSCD (Zhou et al. 2007). Treatment Many patients with SSCD are able to tolerate their symptoms and reduce the more severe effects by avoiding the stimuli that make the symptoms worse, such as loud noises. For other patients, the symptoms are much more debilitating. Pulsatile oscillopsia, chronic disequilibrium, and autophony are some of the symptoms for which avoidance of stimuli is unlikely to be helpful. Surgical correction: For patients whose well-being is severely affected by SSCD, surgical repair of the dehiscence can be very beneficial. The middle cranial fossa approach has been used most commonly. Plugging of the canal with fascia (fibrous tissue), using small bone chips to secure the fascia in place, has been shown to be more effective than canal resurfacing in achieving long-term control of symptoms. The main risk of this procedure is hearing loss in the affected ear, although this risk is low in patients who have not undergone prior SSCD surgery or prior stapedectomy. The procedure is very effective in relieving both the vestibular symptoms and the auto¬phony associated with SSCD. Plugging of the superior canal typically results in decreased function in this canal alone, while preserving function in the other semicircular canals (Carey et al. 2007). The reduction of function in the superior canal has minimal negative functional consequences for the patient. In patients with bilateral SSCD, surgery on the more severely affected ear may be sufficient to control their symptoms. Conclusions Dehiscence of bone overlying the superior semicircular canal can cause a constellation of vestibular and auditory symptoms and signs. These abnormalities can be understood in terms of the effect of the dehiscence in creating a third mobile window into the inner ear. The diagnosis is made based upon characteristic symptoms, specific findings on clinical examination, CT imaging, and findings on VEMP testing. The diagnosis should never be made exclusively on the basis of CT findings. For many patients, an understanding of the cause of the symptoms and avoidance of provocative stimuli such as loud noises may be sufficient. For those patients who are debilitated by their symptoms, surgical plugging of the superior canal can be very beneficial in alleviating or substantially reducing the symptoms and signs. References 1. Minor LB, Solomon D, Zinreich J, Zee DS. Sound- and/or pressure-induced vertigo due to bone dehiscence of the superior semicircular canal. Archives of Otolaryngology—Head & Neck Surgery 1998;124:249–258. 2. Carey JP, Minor LB, Nager GT. Dehiscence or thinning of bone overlying the superior semicircular canal in a temporal bone survey. Archives of Otolaryngology—Head and Neck Surgery 2000;126:137–147. 3. Belden CJ, Weg N, Minor LB, Zinreich SJ. CT evalu¬ation of bone dehiscence of the superior semicircular canal as a cause of sound- and/or pressure-induced vertigo. Radiology 2003;226:337–343. 4. Zhou G, Gopen Q, Poe DS. Clinical and diagnostic characterization of canal dehiscence syndrome: A great otologic mimicker. Otology & Neurotology 2007; epub ahead of print. 5. Carey JP, Migliaccio AA, Minor LB. Semicircular canal function before and after surgery for superior semicircular canal dehiscence. Otology & Neurotology 2007;28:356–364. Click here to download the "Superior Semicircular Canal Dehiscence" publication.
ESSENTIALAI-STEM
File:MissionBearSculpturePanorama.jpg Summary Photograph taken by Jonbeebe 05:49, 27 January 2007 (UTC) Metadata: * Aperture: f/11 * Shutter: 60 seconds * Camera: Olympus E-500 * This image was stitched together from 8 individual shots into a single panorama
WIKI
Black Friday Winners: 7 Retail Stocks Set for Post-Holiday Gains InvestorPlace - Stock Market News, Stock Advice & Trading Tips Given so much talk about stubbornly elevated inflation and soaring borrowing costs, it’s not surprising that retail stocks incurred much skepticism throughout this year. However, Black Friday and Cyber Monday sales may have shifted the narrative. And it also appears to have caught the bears on the wrong side of the trade. Notably, The Wall Street Journal reported that the day after Thanksgiving represented a bonanza for so-called holiday stocks. Yes, overall, Americans are hurting. However, the WSJ pointed out that shoppers are increasingly financing their purchases via buy now, pay later (BNPL) platforms. Now, that might be problematic down the line. However, for now, the message is that consumers will do what is necessary to keep retail therapy alive. Moreover, Forbes reported that Cyber Monday sales also hit fresh records. Again, we’re seeing a familiar theme that households are doing whatever they can to participate in the festivities. It also demonstrates an uncompromising attitude that bolsters certain Black Friday stock winners. For a heads up, I’m basing a large portion of my argument on short-covering speculation. So, that’s a topic you may want to read up on to get the most out of these retail stocks. Best Buy (BBY) Source: Ken Wolter / Shutterstock.com A multinational consumer electronics retailer, Best Buy (NYSE:BBY) in the first two years of the Covid-19 pandemic benefited from the retail revenge phenomenon. However, 2022 represented an entirely different story, with skyrocketing inflation taking the air out of demand for consumer discretionary items. After all, with consumers sating themselves in prior years, there wasn’t as much of a point to gorge last year. However, after consumers adjusted to the new normal of monetary policy, BBY suddenly appears as one of the enticing retail stocks. To be sure, analysts don’t really like it, rating it a consensus hold with a $72.62 average price target. At time of writing, this view symbolizes about 1% downside risk. However, you’ve got to respect the recent performance. In the trailing month, BBY gained almost 11% of equity value. Looking at Fintel’s options flow screener – which filters exclusively for big block transactions likely made by institutions – we see that major entities have sold calls. One option in particular, the Jan 19 ’24 75.00 Call, seems risky for the bulls because it’s about to get blown up. With BBY priced at $73.42, it could be an early Christmas gift for the bulls. Target (TGT) Source: jejim / Shutterstock.com One of the most popular big-box retailers, Target (NYSE:TGT) earlier this year appeared quite problematic. In fact, in May of this year, I warned investors away from TGT via my TipRanks article. I suggested that organized retail crime – which remains a problem for Target and its ilk – imposes a dark cloud over the business. Looking at the share price performance, I’m glad I made that call. However, TGT may now be one of the retail stocks to buy. Sure, analysts peg shares a moderate buy with a $151.04 price target, implying 12% growth. Still, the overall assessment is quite split: 14 buys, 13 holds. That doesn’t exactly inspire confidence. And it’s fair to point out that TGT is still down 11% since the January opener. Nevertheless, you’ve got to respect the near-term performance. In the trailing month, Target shares jumped more than 21%, sparked by a surprisingly robust third-quarter earnings report. Still, options flow data shows that some major parties are still bearish on TGT. Notably, I’m looking at the sold Dec 29 ’23 130.00 Call options. With TGT priced at nearly $135, the call writers (sellers) are getting blown up. Cynically, TGT represents one of the holiday stocks to consider. Five Below (FIVE) Source: Jonathan Weiss / Shutterstock.com Fundamentally, Five Below (NASDAQ:FIVE) in my view makes an almost no-brainer case for retail stocks to buy. It’s a chain of specialty discount stores so that alone makes the company incredibly relevant. After all, we don’t know what might appear on the economic horizon. Even better, Five Below doesn’t sell the typical dollar-store junk. Rather, by extending the prices up to five bucks, consumers get more product diversity. Also, Five Below sells a select range of products that price between $6 to $25. Therefore, the company stands to attract shoppers beyond those who must patronize discount chains out of necessity. Besides, everyone loves a good bargain, no matter where it’s from. So, it’s not a shocker to see FIVE carry a consensus strong buy rating. What might be off-putting, though, is the average price target of $216.92. That only implies upside of less than 9%, which might be too low. While FIVE incurred much choppiness this year, it’s been on a strong run recently. In the trailing month, FIVE gained over 13% of market value. It has the makings of one of the Black Friday stock winners due to the relevance of the business. Williams-Sonoma (WSM) Source: designs by Jack / Shutterstock.com One of the riskier ideas among retail stocks to speculate on, Williams-Sonoma (NYSE:WSM) under ordinary circumstances wouldn’t arouse much controversy. As a retailer that sells premium kitchenware and home furnishings, Williams-Sonoma benefits from a higher-income consumer base. So, in theory, WSM should be better insulated from economic headwinds. To be sure, the controversy over WSM isn’t so much that “this time, it’s different.” No, if anything, this time, it’s the same. Since the start of the year, WSM skyrocketed nearly 72%. That’s so much better than other holiday stocks as you’ve no doubt witnessed. Therefore, Wall Street rates WSM a hold but with a $166.29 average price target. From the time of writing, that target implies a loss of 15%. So, in perhaps any other circumstance, WSM should be an idea to be dumped. I mean, in the trailing month, it’s gone up over 28%. However, the bulls are determined to blow up bearish positions, particularly the Feb 16 ’24 185.00 Call. And there are other bearish bets that could also suffer a reckoning. So, WSM just might be one of the sustained Black Friday stock winners. Kimco (KIM) Source: rafapress / Shutterstock.com If you’re looking for retail stocks to bet on amid a possible shift in consumer spending behaviors, Kimco (NYSE:KIM) appears a wise idea. Structured as a real estate investment trust (REIT), Kimco specializes in grocery-anchored, open-air shopping centers. Naturally, this directive enjoys relevance because let’s face it – no matter how advanced we become as a society, we must have access to nutritional sustenance. Even better, Kimco recognizes – amid all the uncertainty – the viability of this no-nonsense protocol. Earlier this year, the company boosted its grocery-anchored portfolio with a key acquisition. Now, it did suffer some negative rumblings, with shares still finding themselves below breakeven for the year. However, as I’ve stated earlier, you’ve got to respect the near-term performance. In the trailing one-month period, KIM gained over 8% of equity value. Nevertheless, a major entity (or entities) sold 2,303 contracts of the Jan 19 ’24 20.00 Call last Friday. That seems like an unadvisable wager. At the time of the transaction, KIM stock traded at $19.90. By the close, it was at $20.05 and really showing no signs of stopping. It also pays a forward dividend yield of 4.79%. Therefore, it’s one of the holiday stocks to consider. Nordstrom (JWN) Source: Jonathan Weiss / Shutterstock.com If the year had ended on Nov. 13, department store giant Nordstrom (NYSE:JWN) would look an ineffective investment. As mentioned earlier, consumers had suffered heavily from inflation and rising interest rates. With one of the easiest mitigation protocols centering on putting the scissors to discretionary purchases, Nordstrom seemed doomed. However, it redeemed itself beautifully. For its Q3 earnings report, the company posted earnings per share of 25 cents, beating the consensus view of 12 cents. Revenue did miss but slightly, coming in at $3.32 billion against the expected $3.4 billion. Still, after some digestion, Wall Street appreciated the report, sending JWN higher. In the trailing one-month period, the security swung up over 11%, perhaps making it one of the Black Friday stock winners. But can this momentum continue forward? Analysts don’t think so, rating JWN a hold with a $15.73 average price target, thus implying almost 3% downside risk. Under normal circumstances, JWN should arguably be a sell. However, the bulls are hungry. Specifically, they may be looking to really blow up the sold Jan 19 ’24 15.00 Call. With JWN still running hot at over $16, this may be among the retail stocks to speculate on. Macy’s (M) Source: digitalreflections / Shutterstock.com Another iconic department store, Macy’s (NYSE:M) also represented one of the retail stocks that benefited from the retail revenge phenomenon. However, that momentum stopped in late 2021 as the realities of blisteringly hot inflation dominated the public discourse. Add the spiked interest rates and subsequent mass layoffs and consumers simply had little reason to spend unnecessarily. Sure enough, M stock is still trying to recover what was lost. Since the beginning of the year, the company lost about 15% of equity value. However, this negative print ignores the fact that the recent performance has been phenomenal. In the trailing five sessions, it jumped over 15%. And in the past 30 days, M shares returned stakeholders almost 37%. Undergirding sentiment was the company’s Q3 earnings report, which posted better-than-expected results. Additionally, management reaped the rewards associated with improved margins, cost cuts and reduced inventory. Subsequently, institutional investors began buying call options in large volumes, betting on a sustained rally. However, bears have also sold calls, especially the Jun 21 ’24 13.00 Call. With shares priced at more than $17 and showing little sign of slowing, the bears may have bitten off more than they can chew. On the date of publication, Josh Enomoto did not have (either directly or indirectly) any positions in the securities mentioned in this article. The opinions expressed in this article are those of the writer, subject to the InvestorPlace.com Publishing Guidelines. A former senior business analyst for Sony Electronics, Josh Enomoto has helped broker major contracts with Fortune Global 500 companies. Over the past several years, he has delivered unique, critical insights for the investment markets, as well as various other industries including legal, construction management, and healthcare. Tweet him at @EnomotoMedia. More From InvestorPlace Musk’s “Project Omega” May Be Set to Mint New Millionaires. Here’s How to Get In. The #1 AI Investment Might Be This Company You’ve Never Heard Of The Rich Use This Income Secret (NOT Dividends) Far More Than Regular Investors The post Black Friday Winners: 7 Retail Stocks Set for Post-Holiday Gains appeared first on InvestorPlace. The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.
NEWS-MULTISOURCE
Talk:Danielle Tumminio Hansen External links modified Hello fellow Wikipedians, I have just modified 3 one external links on Danielle Elizabeth Tumminio. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20080117152152/http://www.yaledailynews.com:80/authors/view/69 to http://www.yaledailynews.com/authors/view/69 * Added archive https://web.archive.org/web/20090418200311/http://www.yale.edu/divinity/notes/080616/tumminio.shtml to http://www.yale.edu/divinity/notes/080616/tumminio.shtml * Added archive https://web.archive.org/web/20110814070934/http://danielletumminio.com/?page_id=6 to http://danielletumminio.com/?page_id=6 Cheers.— InternetArchiveBot (Report bug) 11:22, 6 December 2016 (UTC) Proposed name change: Danielle Tumminio Hansen Proposing a name change to this page from "Danielle Elizabeth Tumminio" to "Danielle Tumminio Hansen." Recent articles written by Tumminio Hansen display her name as such. Elizabeth just happens to be her middle name at this point which used to be used to identify her. Looks like formally the middle name has been dropped. --PerpetuityGrat (talk) 03:54, 1 July 2021 (UTC)
WIKI
Bodorna Bodorna (ბოდორნა) is a small village in Georgia, situated on the S3 highway (Georgia) originally the Georgian Military Road, 8 km from the town of Dusheti, Mtskheta-Mtianeti region, in the east of the country. Bodorna lies on the right bank of the small river Dushetis-Khevi, a right tributary to the Aragvi River, at an elevation of 880 m. above sea level. The village was fortified in the Middle Ages in a way to accommodate the fugitives from nearby locales during foreign incursions. Thus, the man-hewn caves at Bodorna are known to have served as a shelter for the populace of the Aragvi valley when the Turco-Mongol army of Timur penetrated the Georgian highlands in the 1390s. South of the village is a 15 m. high column whose origin is not completely clear. It resembles a human figure, that of a monk, and may be a man-made structure, hewed from a natural, denudational relict, for cult purposes in the early Christian period, possibly the 5th-6th centuries. The column contains a large cave, one of those that were utilized as a shelter during Timur's invasion. According to a medieval chronicle, the soldiers of Timur descended the column using ropes and shoot fiery arrows into the crowded cave. Bodorna is a home to a 15th-century Church of the Nativity of the Mother of God, which then served as a familial abbey and a burial ground for the Dukes of Aragvi of the Shaburidze family. It was almost completely rebuild in 1717 as revealed by a contemporaneous inscription. The extant structure is a single-nave domed church erected on a woody hill (pictured).
WIKI
Template talk:Vandalism information How do i create my variant How do i create my own version of the temp. VarunFEB2003 (talk) 13:06, 13 July 2016 (UTC) Semi-protected edit request on 17 May 2017 ° Heading text <IP_ADDRESS> (talk) 23:12, 17 May 2017 (UTC) * Red question icon with gradient background.svg Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format. &mdash; KuyaBriBri Talk 00:00, 18 May 2017 (UTC) Halving the update frequency? Anyone mind if I run the bot every two hours, instead of every hour? I don't really have a compelling reason, so if anyone says something I won't make the change. It would clutter the bot's contribs a bit less, which is basically it. Enterprisey (talk!) 04:04, 11 July 2018 (UTC) * I think every hour is reasonable, every two hours seams too long. – BrandonXLF (t@lk) 00:38, 14 September 2018 (UTC) * Cluttering the bot's contribs page isn't really a reason as far as I'm concerned. If we're talking about a tool that in theory is supposed to tell vandal fighters whether or not they're needed, then once every two hours is far too infrequent. — k6ka 🍁 ( Talk · Contributions ) 11:48, 15 September 2018 (UTC) * Fair, thank you both for your comments. I will not be changing the update frequency. Enterprisey (talk!) 17:09, 15 September 2018 (UTC) Put at top bar? Is there a way to put this at the bar at the top of the page with your username, preferences, etc.? Bᴇʀʀᴇʟʏ • Talk to me∕What have I been doing 10:49, 3 March 2020 (UTC) Bot fixed I didn't check the edit summaries case-insensitively, so the bot would recognize "reverted" but not "Reverted". Oops. Anyway, should be fine now. Enterprisey (talk!) 22:32, 22 April 2020 (UTC) Is it normal for it not to update for over 3 hours? Hello, I've just discovered this template, and just found out that it says "3.70 RPM according to EnterpriseyBot 20:10, 18 August 2022 (UTC)". - that's more than 3 hours old. Using "purge" button does not update it. I'm not asking for its refreshing every minute, but I think that is too long. ArtiK-99 (talk) 23:30, 18 August 2022 (UTC) * This is normal and expected behaviour. The bot only updates the template when the Defcon level needs to be changed. So, if there are very few reverts per minute (RPM) during a six hour period and it doesn't go over the threshold where the Defcon level would change, then the bot won't edit. The bot checks the RPM every hour, so at most it would update every hour. — k6ka 🍁 ( Talk · Contributions ) 03:13, 19 August 2022 (UTC) DEFCON level inaccurate? The template currently shows a DEFCON level of 2 with 6.12 RPM, but according to the documentation that means it should be on level 3. Heythereimaguy (talk) 19:04, 26 March 2023 (UTC) Bot's broken. @EnterpriseyBot isn't updating the DEFCON level. Neuropol's updating it for now, but EnterpiseyBot is broken, and should be fixed at the earliest possible time by @Enterprisey. <IP_ADDRESS> (talk) 13:49, 4 April 2024 (UTC) Abnormal bot inactivity For over 13 hours the template hasn't been updated for level four. Just slightly before that, it was at level three for just an hour earlier, and further back it was level five. Isn't it abnormal that it doesn't change for 13-now 14+ hours? Apollo getticax | talk 04:12, 25 June 2024 (UTC)
WIKI
Human 5' UTR design and variant effect prediction … Human 5' UTR design and variant effect prediction from a massively parallel translation assay Update: This paper has now been published at Nature Biotechnology. “Human 5’ UTR design and variant effect prediction from a massively parallel translation assay” by Paul J. Sample, Ban Wang, David W. Reid, Vlad Presnyak, Iain McFadyen, David R. Morris, and Georg Seelig. https://doi.org/10.1101/310375 I selected this article for review for two reasons: • I am excited to learn about applications of massively parallel reporter assays (MPRAs). • I have a general interest in methods that use deep learning (in this case convolutional neural networks) with genomic data. There are an increasing number of papers using deep learning with genomics data every year. Furthermore, the advent of MPRAs has revolutionized our ability to understand the functional consequences of noncoding regions in a high-throughput manner. Here, the authors were able to use a MPRA to measure protein expression (translation) from 5’ untranslated regions (UTRs). They also trained convolutional neural networks (CNN) that related human 5’ UTR sequence to translation. Both reviewers felt this work was thoughtful and they were excited about the performance improvements of the CNN over a linear model. However, they posed some interesting questions about the work and made some suggestions that would improve the manuscript. Specifically, it would be great if the authors could (1) substantiate some of the claims with additional analyses, (2) expand the discussion to address potential problems with the CNN e.g. model overfitting, observational noise or over-parameterization, (3) include more comparisons to baseline and alternative approaches, (4) include additional references, (5) provide more intuition and explanations about the CNNs. These details would significantly enhance the manuscript. I want to thank the authors for sharing their work on bioRxiv before it has undergone peer review. I also want to take an opportunity to thank the reviewers who have donated their time to evaluate the novelty, strengths, and limitations of this work. Both reviewers have chosen to be named. Both reviewers were graduate students. The two reviews are available in full below. Reviewer 1 (Matthew Ploenzke) The authors develop a massively parallel reporter assay based on polysome profiling and RNA-seq to measure the degree of translation of over 300,000 random 5’ untranslated regions (UTRs) in order to quantify the translational effects of noncoding variants within 50bp upstream of a coding sequence (CDS). The polysome fractions were collected for each UTR, providing a distribution of ribosome occupancy, from which the mean ribosome load (MRL) was calculated. Two convolutional neural networks (CNNs) were then trained on the 50bp UTR sequences to predict 1) MRL and 2) the full polysome distribution (14 output predictions corresponding to 14 polysome fractions). The authors report strong performance, specifically noting improved predictive accuracy on the test set in comparison to a linear model utilizing 5-mers as features. Feed-forward visualizations were used to interpret the convolutional filters revealing recognizable motifs including stop codons and translation initiation sites. The trained CNN was also used to design novel UTRs targeting a specific level of protein expression (MRL) under either of two training procedures; both of which rely upon a genetic algorithm to modify the UTR sequence during calibration. These model-generated sequences were subsequently tested via polysome profiling to assess accuracy. The model performed poorest on those UTRs targeting high levels of MRL due to these UTRs containing long stretches of poly-U sequences, a feature rarely encountered in the original 300,00 UTRs. The original model was in turn retrained on these new sequences and model performance was reassessed, noting improvements. This retrained model was then tested on a collection of 50bp UTRs preceding the start codon of over 35,000 human transcripts. 3,577 variant sequences were also included in this set, all of which were subsequently tested via polysome profiling to assess accuracy. 81% of variation in MRL was captured by the model indicating that relevant cis-regulatory properties of human 5’ UTRs were learned through the randomized UTR training procedure. Lastly, a mutation analysis of common 5’ UTR single nucleotide variants indicated the strongest effects were for mutations introducing an upstream start codon. Major issues: • The claim regarding the learning of secondary structures’ repressive effect on ribosomal load is not substantiated: the only figure is provided in the supplementary material and there is no statistical assessment of the agreement (correlation). • The claim that filters do not match previously described PWMs indicates potential “previously undescribed regulatory interactions” (page 5) is just one possibility and the authors fail to mention potential others including model overfitting, observational noise, or over-parameterization. In other words, the CNN may simply have learned nuances in training data that do not pertain to real biology and the claim should address the other possibilities. • How did the k-mer model perform on the polysome distribution prediction? How did it perform on the pseudouridine or 1-methyl-pseudoridine analysis? These analyses should all include an accuracy benchmark. All descriptions regarding model accuracy, such as 93% constituting “exceedingly well”, should be made in reference to a baseline model. • There are alternatives to the genetic algorithm for designing sequences and these should be mentioned. One would be deep motif (using the trained model) and two would be deep generative modeling. These should be mentioned to convey alternatives or limitations of the algorithm. Another limitation may be the uniform randomness with which nucleotide mutations/switches are induced during calibration. Given that location in the 50bp UTR is important, the uniform assignment may not be ideal and possibly lead to local minima. Minor issues: • The second paragraph on page 5 switches to reporting R instead of R2, as reported in the rest of the paper. • The mutation analysis presented on page 7 is similar to the Zhou and Troyanskaya procedure (reference 5) and does not cite attribution. • Results for the human transcript analysis (page 6) should also contain the original (not retrained) model. Since these high-U stretches don’t exist in nature, it shouldn’t impact model accuracy. To that end it would be interesting to provide an analysis of what sequences the model misses on. These may provide information about what the model has learned from randomness relative to human UTRs. • Why do categories 9 and Max not match the increasing trend described in the last paragraph of page 5 when they do in fact seem to? Further, the range of the MRL for the realized values in the plot of figure 3B is much larger than the CNN predictions. This may be used to infer more about model uncertainty versus biological uncertainty and should be addressed. It may also indicate overfitting as the model does not capture the true variability in the data. • Please provide justification or citations for the selection of 50 base-pair sequences as opposed to, for example, 30bp. The location of the maximal convolutional activations is slightly touched on in the text but does not explicitly justify the selection of 50bp. Note also that not all 50bp random sequences are generated in the experiment whereas a shorter selection could examine all possibilities. With this in mind, were any sequences deliberately left out (like those high-U sequences mentioned later), or was the procedure truly random? • How were the representative sequences to be measured via IncuCyte live cell imaging in figure2E selected? Were they randomly selected or chosen due to specific characteristics? Also, the 15-fold range based on fluorescence is mentioned but no comparison to the prediction ranges is provided. Further, how did the bulk model perform on the library with an mCherry CDS replacing eGFP (only the performance of the polysome distribution model is reported)? The decrease in accuracy is attributed to specific protocols differences but left unaddressed. • In figure 2D, the model performance was worst for the polysome fractions near the middle of the distribution. Why might this be and what does this mean for what the CNN has learned? Why is correlation shown in 2F and not discussed? • Please describe the biological inspiration or provide the citation for the step-wise evolutionary technique being inspired by the evolution of a UTR. Secondly, the dashed line in figure 3C does not seem to match the 800 iterations description on page 5. • Do iterations refer to epochs (the classifier having seen the entirety of the training data once) or a different unit of training? • The claim on page 5 that “Prediction accuracy could be further improved by training the models directly on data from the modified RNAs” need not be stated. However the subsequent claim that this would be due to learning the impact of ? and m1? on secondary structure is non-trivial given the earlier lack of evidence of the model learning secondary structure. • On page 8 it is noted that the the introduction of an upstream codon dramatically affects ribosome loading and this claim is validly supported. However, how come different upstream-codon-inducing mutations do not exhibit such a strong effect (for example, figure 4C: RPL5 position -41 mutation: G ? U)? If this is due to the frame, a plot such as figure 1C would suffice. Typos: • X-axis labelling/limits in the figure 3C bottom-right plot. Editorial note: While biOverlay is not an academic journal that publishes content, this reviewer noted that, in his opinion, this paper should be accepted with major revisions. Reviewer 2 (Leslie Myint) The authors develop a massively parallel reporter assay to measure the translational activity induced by different 5’ UTRs via polysome profiling. From this data, they build a convolutional neural network model to predict the translational activity of a mRNA transcript from its 5’ UTR. They also use similar modeling techniques to design 5’ UTRs that target certain levels of activity. Overall, this is interesting work with thoughtful and meaningful evaluations. Continued evaluation of these models in increasingly realistic in vivo contexts would be a worthwhile line of future work. Comments: • Figure 1E: Regarding “This analysis recapitulated the importance of a purine (A or G) at position -3 relative to AUG and a G at +4”, it would help to have the x-axis indices labeled. It was unclear if the A in AUG was 0 or 1. • Page 2: Define abbreviation CDS = coding sequence • Page 3: To allow readers to better assess the validation, it would be helpful to have all results from references 10, 22, and 23 summarized in a table or incorporated within Figure 1E. This helps with interpretation of other positions in the seqlogo. • Page 3: Add that the train and test sequences were randomly selected. (This is in the Supplement but a short note in the main is useful.) • Figure 2B: It is natural to want to see a y=x line, but it seems that by using R-squared as a performance metric interest is more in predicting that certain sequences have higher or lower translational activity than other (i.e. relative activity prediction). Can the authors explain the departure from the y = x line? • Figure 2B: What are the outlier sequences (top left)? Are there systematic features about why they predict poorly (consistently over predict)? • Figure 2D: Why do certain polysome fractions lead to lower or higher accuracy? Is it just random variation or something systematic? • Page 6, endogenous transcripts: How similar are the sequences in this new 5’ UTR library to the original completely random library? This experiment is worthwhile, but I don’t think it answers the interesting question of predicting activity of fully endogenous sequences. It would have been interesting to see the predictive ability of the model on fully endogenous sequences despite the confounding factors if the experimental design allowed for some reasoning about how the confounding factors would alter the prediction. This is more of a comment than a criticism because I don’t know how feasible it is to do such an experiment. Stephanie Hicks is an Assistant Professor in the Department of Biostatistics at Johns Hopkins Bloomberg School of Public Health. She develops statistical methods, tools and open software for the analysis of (epi)genomics, functional genomics and single-cell genomics data.
ESSENTIALAI-STEM
PG&E to get pulled out of S&P 500, shares near 2001 lows ** Embattled power utility company PG&E Corp (PCG.N) will be replaced by healthcare equipment maker Teleflex Inc (TFX.N) in the S&P 500 .SPX on Friday ** PG&E shares were down 4.1 pct, trading near 2001 lows following its plans to seek Chapter 11 protection in the wake of large potential claims related to California’s catastrophic wildfires ** Session’s decline bring PCG’s WTD decline to ~61 pct; Co said on Sunday CEO Geisha Williams stepped down and announced bankruptcy protection plans on Monday ** Teleflex will be replaced by consumer finance co Green Dot GDOT.O in the S&P MidCap 400 index, S&P Global said; TFX shares dip 1.2 pct ** Softwood pulp producer Mercer International Inc (MERC.O) will replace Green Dot in S&P SmallCap 600 index; MERC jumps 15.7 pct and GDOT drops 2.7 pct ** Changes will be reflected before trading opens on Friday, S&P said Reporting by Sruthi Shankar in Bengaluru
NEWS-MULTISOURCE
Purple Martin Look for Our largest swallow (at 8 inches), the purple martin is a graceful flyer with a bubbly, liquid song. The adult male has a deep blue body and black wings and tail. Females and youngsters are gray and black with some blue on the back. In flight, martins can be confused with European starlings, but martins have a notched tail and call out almost constantly. Listen for Both male and female Purple Martins sing. Main vocalization is a liquid, warbling chortle given in a series of down-slurred notes: teer, teeer, teer, jeer-deert, teer! Males perform a predawn song display in spring, flying high over their nesting colony, hoping to attract females and other martins. Find it No other North American bird has a closer association with humans than the purple martin. For more than four hundred years, martins in eastern North America have nested in human-supplied housing, at first in hollow gourds offered by Native Americans and today in a variety of specialized housing. Generations of people and martins have grown up together. Even non-bird watchers can appreciate this friendly and familiar bird. Purple martins breed across eastern North America, except for the extreme north. They spend winters in South America but return to the southern United States in mid-January, their arrival eagerly anticipated by their human landlords. Because of their reliance on human- supplied housing, most martins are found around cities, towns, and settlements. Feed it Martins eat flying insects almost exclusively, but—contrary to popular opinion and marketing hype—martins do not eat many mosquitoes. Instead, their diet includes larger flying insects, such as beetles, flies, dragonflies, wasps, butterflies, and moths. In cold, rainy weather, martin landlords often resort to feeding them mealworms and bits of scrambled egg in an effort to keep their beloved birds alive. Some landlords even shoot mealworms into the air with a slingshot just so the martins can catch their food. Nesting Behavior Martins are rather selective in choosing colony nest sites, but one thing is certain: They like to be with other martins. Research has revealed that they prefer white housing with a large (8x8x8-inch) interior and an 1 ½-inch entry hole. The housing should be mounted near a human dwelling in an open area. Martins build a loose cup nest inside the cavity out of pine needles and grass, lined with green leaves (which limit parasites). The female lays four to six eggs and does most of the incubation, lasting about 16 days. Both parents feed the nestlings for the month-long period before fledging. WOW! Hundreds of years ago Native Americans placed hollowed-out gourds on poles for the martins to use. The martins returned the favor by controlling flies and wasps around the village. Hear it:
ESSENTIALAI-STEM
Solved Microsoft OLE DB Provider for ODBC Drivers erro '80040e14' Posted on 2013-05-23 1 597 Views Last Modified: 2013-05-25 Hi everyone. I'm not at all talented with asp, so I'd really appreciate any help. I am getting this error after i convert my MS ACCESS db to Mysql.  (in ms access works fine). ------------------------- Microsoft OLE DB Provider for ODBC Drivers erro '80040e14' You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'UNION (SELECT mensalidades.tipo_pagto, mensalidades.data_cheque, mensalidades.em' at line 1 http://localhost/finance/financeMfac/includes/lado01.asp,  line36 -------------------------- lado01.txt 0 Comment Question by:artmx 1 Comment   LVL 82 Accepted Solution by: hielo earned 500 total points ID: 39194542 >>...and cdate(data_cheque)=cdate("&formatdatetime(now,2)&") cdate() is not a mysql built-in function, so your queries will not work.  Use the STR_TO_DATE() function instead: http://dev.mysql.com/doc/refman/5.1/en/date-and-time-functions.html#function_str-to-date You will also need to refer to the DATE_FORMAT() section to look at the valid format specifiers: http://dev.mysql.com/doc/refman/5.1/en/date-and-time-functions.html#function_date-format Let's say that in the table in question the "data_cheque" field has "7/6/2012".  Depending where you live, that may be interpreted as "July 6, 2012" OR "7th of June 2012".  The STR_TO_DATE() function needs the format parameter so that there wouldn't be any  confusion. The format parameter to STR_TO_DATE(), "tells" mysql what part of your field value is the month, which part is the day of the month, and which part is the year.  The most popular/common format specifiers are explained below: If the month is stored: without leading zeros use %c with leading zeros use %m If the day of the month is stored: without leading zeros use %e with leading zeros use %d If the year is stored: with two digits use %y with four digits use %Y Assuming the value above is "July 6, 2012", the way to rewrite the above condition would be: >>...and STR_TO_DATE(data_cheque,'%c/%d/%Y')=Now() Notice that I got rid of cdate("&formatdatetime(now,2)&") since what you are doing is comparing data_cheque against the current time.  MySQL has a built-in function named "Now()" that will give you the current time.  So you can compare against it directly. What if your date was stored as "07/06/2012" (notice the leading zeros).  In that case you would need: >>...and STR_TO_DATE(data_cheque,'%m/%e/%Y')=Now() 0 Featured Post The Eight Noble Truths of Backup and Recovery How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud. Question has a verified solution. If you are experiencing a similar issue, please ask a related question Foreword In the years since this article was written, numerous hacking attacks have targeted password-protected web sites.  The storage of client passwords has become a subject of much discussion, some of it useful and some of it misguided.  Of cou… This demonstration started out as a follow up to some recently posted questions on the subject of logging in: http://www.experts-exchange.com/Programming/Languages/Scripting/JavaScript/Q_28634665.html and http://www.experts-exchange.com/Programming/… The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr… Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa… 790 members asked questions and received personalized solutions in the past 7 days. Join the community of 500,000 technology professionals and ask your questions. Join & Ask a Question
ESSENTIALAI-STEM
HP picks Cosco's Greek pier as regional transport hub| Reuters ATHENS Hewlett Packard will transport its goods across Europe, the Middle East and Africa through Greece's biggest port, the Greek government said on Wednesday, after a deal with China's Cosco Pacific that Athens hopes will attract investors and bolster cargo business at its commercial docks. The agreement is expected to take effect at the end of the year, the government said. Cosco Pacific, one of the world's biggest container terminal operators, signed a deal with Greece in 2008 to run a pier at the state-owned Piraeus port. HP is the world's largest manufacturer by sales of personal computers. The conservative-led government of Prime Minister Antonis Samaras has made investment and growth a priority since taking over in June. Greece is battling its biggest economic downturn in six decades. Samaras hailed the deal as a vote of confidence in Greece in this effort we are undertaking today to revive the Greek economy. It reaffirms the role our country can play on the global business map, he said after meeting representatives of both companies and the shipping and development ministers. In 2011 more than 20 million passengers and 1.7 million containers passed through Piraeus, the country's busiest port and a gateway to Eastern Europe, according to the Piraeus Port Authority (OLP). The Development Ministry, which announced the preliminary agreement, did not place a value on the deal but said it could increase local cargo business at Piraeus by 50 percent. It is also expected to create hundreds of jobs, the ministry said. HP's merchandise would be distributed by sea through the Cosco terminal and by land though Greece's Trainose, the monopoly that operates 500 freight and passenger routes on 2,500 km (1,550 miles) of railways, the ministry said. (Reporting by Karolina Tagaris and Renee Maltezou; Editing by Toni Reinhold) SEOUL Samsung Electronics Co said on Tuesday it has got back around 60 percent of recalled Galaxy Note 7 smartphones sold in South Korea, the United States and Europe, suggesting it is making progress in its attempts to recover from the crisis. AMSTERDAM Uber is making an aggressive drive into meal delivery, backed by a wave of staff recruitment, with the U.S. tech heavyweight gearing up to enter at least 22 new countries and take on local rivals. DUBAI Ride-hailing service Careem is targeting profitability next year or in 2018 and is in talks with potential investors about its latest fundraising plans, co-founder Mudassir Sheikha told Reuters on Tuesday. Reuters is the news and media division of Thomson Reuters. Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Learn more about Thomson Reuters products: All quotes delayed a minimum of 15 minutes. See here for a complete list of exchanges and delays.
NEWS-MULTISOURCE
Multimedia Kiosks AutomotiveAutomotive engineering or vehicle engineering is likely one of the most challenging careers with wide scopes. Automotive retailers do not should be artists and inside decorators with an incredible flair for style, but they do need to have the respect for you to keep their establishment clean. There are a variety of parts to remove and get out of the way earlier than you will get to the wheel bearing, particularly on a four-wheel-drive or entrance-wheel-drive automobile. So advancements have been being made in printing in addition to automotive and agricultural progress. The underlying concrete will fracture and/or crack and will undoubtedly injury the coating and can necessitate a repair. Pin striping (pinstriping) is a very thin line of paint or thin vinyl tape applied to a car or any product. Unfortunately, those who own both of these rare units could have quite a tough time finding body elements if these are wanted for a restoration. So to help you maintain your automobile on the road longer at a decrease price, check these simple maintenance and restore tasks you can do yourself in your won storage. The coupe and the convertible share a lot of parts between them but not with the 4 door. My advice is that for those who go to a Dealer for service remember to get an in depth quote before you let them touch your automobile. This step is just really helpful in case your paint job is around 12 or more years outdated, has many small scratches, or seems to be like it was poorly painted. Each phase offers a quick and clear picture of what is happening within the automotive business from the perspective of Autoblog’s expert editorial workers, auto executives, and trade professionals. Back then, many individuals had data of the automotive subject and had tailored to many adjustments over the brief history of the sector. There are many books available on the market that can give you some clues for the components to gather and the place you might have to get machine work performed. Way again in 2000, a third of all Americans1 informed us that they’d be taken with a car that drives for you when you do not really feel like driving — clearly an early, weak sign that this kind of expertise was at the least intriguing to customers. As an ACP I produce at the least one sort of automotive element in Australia for use as original equipment in at the very least 30,000 motor automobiles or 30,000 engines yearly and the production value of that part should be not less than $500,000 in the previous 12 months. In after-gross sales companies / spare components services, we operate advanced distribution networks and warehouses using absolutely automated warehouse equipment and offering worth added companies to ensure that dealers receive the support essential to keep prospects happy. The American public needs honesty and reality as the essential working premise for any business they go to, especially within the automotive area. The sheet showed that the automobile was originally sold in light green polyester paint. Let me put it this manner, if you are not providing exceptional service and quality you will never get forward in an auto restore store, and it’s the rare individual who succeeds to any diploma in my expertise here and overseas. Here are a couple extra stable recommendations which are recognized to be reliable and specs-compliant for these within the engineering field. Deductibles and co-pays are usually waived if it is related or a comply with up. If you do not like the answer your technician offers, you may go some place else.
ESSENTIALAI-STEM
A12.7 Headache attributed to social anxiety disorder (social phobia) Diagnostic criteria: A. Any headache fulfilling criterion C B. Social anxiety disorder (social phobia) has been diagnosed according to DSM-5 criteria C. Headache occurs solely when the patient is exposed or anticipating exposure to social situations D. Not better accounted for by another ICHD-3 diagnosis. Comment: In social anxiety disorder (social phobia), there is marked fear or anxiety about one or more social situations in which the individual is exposed to possible scrutiny by others. Examples include social interactions (eg, having a conversation), being observed (eg, eating or drinking) or performing in front of others (eg, giving a speech). The person fears that he or she will act in a way or show anxiety symptoms that will cause him or her to be negatively evaluated (eg, be humiliated, embarrassed or rejected) or that will offend others. In children, the fear or anxiety may be expressed by crying, tantrums, freezing, clinging, shrinking or failure to speak in social situations. The fear or anxiety is out of proportion to the actual threat posed by the social situation. The disorder is persistent, typically lasting six or more months.
ESSENTIALAI-STEM
A97 road The A97 is a major road in Aberdeenshire, Scotland. A very short section of the road is within Moray. Route It runs south from Banff on the north coast through Aberchirder, Huntly, Rhynie and Mossat before terminating at its junction with the A93 road at Dinnet.
WIKI
Ignacio Elosu Ignacio Elosu (born 31 October 1980) is a rugby union player whose principal position is prop. He has previously played for Exeter Chiefs in Premiership Rugby and he joined Esher RFC in the RFU Championship from Exeter in the summer of 2011.
WIKI
HSBC recommends selling pound versus dollar, target $1.2040 LONDON (Reuters) - HSBC has advised its clients to sell sterling at $1.2540 with a target of $1.2040 and stop loss at $1.2810, a recommendation from the bank shows. “We expect GBP-USD to fall back towards 1.20 during February, in part because of an anticipated rally in the dollar, but also because UK politics will undermine the currency and the market has become too hawkish given the downside risks to the economy,” it said. The note was sent to the bank’s clients on Monday and provided to media on Tuesday. Sterling last traded around $1.2565. Reporting by Marc Jones; editing by Nigel Stephenson
NEWS-MULTISOURCE
Volltext-Downloads (blau) und Frontdoor-Views (grau) A novel bioinspired switchable adhesive with three distinct adhesive states • A novel switchable adhesive, inspired by the gecko's fibrillar dry attachment system, is introduced. It consists of a patterned surface with an array of mushroom-shaped pillars having two distinct heights. The different pillar heights allow control of the pull-off force in two steps by application of a low and a high preload. For low preload, only the long pillars form contact, resulting in a low pull-off force. At higher preload, all pillars form contact, resulting in high pull-off force. Even further loading leads to buckling induced detachment of the pillars which corresponds to extremely low pull-off force. To achieve the respective samples a new fabrication method called double inking is developed, to achieve multiple-height pillar structures. The adhesion performance of the two-step switchable adhesive is analysed at varying preload and for different pillar aspect ratios and height relations. Finally, the deformation behavior of the samples is investigated by in situ monitoring. Download full text files Export metadata Additional Services Search Google Scholar Statistics frontdoor_oas Metadaten Document Type:Article Author:Paula Isla Yagüe, Elmar KronerORCiD URN:urn:nbn:de:bsz:291:415-3712 DOI:https://doi.org/10.1002/adfm.201500241 ISSN:1616-3028 Parent Title (English):Advanced Functional Materials Volume:25 Issue:16 First Page:2444 Last Page:2450 Language:English Year of first Publication:2015 Release Date:2022/11/18 Tag:bioinspired adhesives; patterned; pull-off; responsive; switchable Impact:11.382 (2015) Funding Information:European Research Council. Grant Number: 340929 Open Access:Open Access Signature:INM 2015/33 Licence (German):License LogoCreative Commons - CC BY-NC-ND - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 International
ESSENTIALAI-STEM
-- Tsingtao Reports Profit That Trails Analysts’ Estimates Tsingtao Brewery Co. (168) posted first- half profit that missed analysts’ estimates as slowing economic growth damped demand for beer produced by China ’s second-largest brewer. The stock dropped. Net income rose to 1 billion yuan ($157 million) in the six months ended June 30 from 990 million yuan a year earlier, according to a statement to the Hong Kong Stock Exchange late yesterday. That compares with the 1.13 billion yuan average of four analyst estimates compiled by Bloomberg. Tsingtao is increasing production as competitors including SABMiller Plc (SAB) and China Resources Enterprise Ltd. (291) expand in the world’s most-populous country. The brewer in March said challenges this year will include a weakening global economy and slower growth in domestic consumption. “The disappointing first half 2012 results evidence our view that Tsingtao is entering a slower earnings growth phase,” Morgan Stanley analysts Lillian Lou, Angela Moh and Mark Yuan wrote in a note distributed today. They rate the stock “underweight.” Tsingtao shares fell 4.4 percent to HK$43.20 at the 4 p.m. close in Hong Kong. The benchmark Hang Seng Index dropped 0.45 percent. Sales rose 11 percent to 13.4 billion yuan from 12 billion yuan a year earlier, according to the company’s statement. Tsingtao also said it is confident of meeting its annual production target of 10 billion liters beer. Market Share China Resources Enterprise, which makes Snow beer through its joint venture with SABMiller, had a 22 percent share of the China beer market in 2011, according to data from Euromonitor International. Tsingtao was second with a 14 percent share. Chairman Jin Zhiguo resigned, Tsingtao reported in June, less than two weeks after an investor sold a block of shares 7 percent below market price. The beermaker said at the time Jin resigned for health reasons and that the company had no contact with the investor before the share sale. Tsingtao plunged 7.8 percent, the most in two years, on June 19 as billionaire investor Chen Fashu offered 32 million shares at HK$47 apiece, 7 percent less than the previous closing price of HK$50.55. To contact the reporter on this story: Vinicy Chan in Hong Kong at vchan91@bloomberg.net To contact the editor responsible for this story: Anjali Cordeiro at acordeiro2@bloomberg.net
NEWS-MULTISOURCE
European Parliament Committee on Foreign Affairs The Committee on Foreign Affairs (AFET, after the French name ‘Affaires étrangères’), previously called Political Affairs, is a committee of the European Parliament. It is responsible for the common foreign, security, and defence policy of the European Union, as well as relations with other European and international institutions, strengthening relations with third countries, the accession of new member states, and human rights. During the Ninth European Parliament (2019–2024), the committee has 79 members and is chaired by David McAllister from Germany. The committee has two subcommittees: the Subcommittee on Human Rights (DROI) and the Subcommittee on Security and Defence (SEDE). Members As of 12 April 2022, the 79 members of the committee are: Relations with Central Asia The Committee on Foreign Affairs has established strong cooperation with Kazakhstan, Central Asia's most prosperous country, through regular visits and meetings. The European Parliament and Kazakhstan hold annual meetings of Parliamentary Cooperation Committee.
WIKI
Page:What Maisie Knew (Chicago & New York, Herbert S. Stone & Co., 1897).djvu/54 40 start she had yet enjoyed, but she had a shy fear of not exactly believing them. "Well, what reason is proper?" she thoughtfully demanded. "Oh, a long-legged stick of a tomboy; there's none so good as that!" Her father enjoyed both her drollery and his own, and tried again to get possession of her—an effort resisted by the third person and leading again to something of a public scuffle. Miss Overmore declared to the child that she had been all the while with good friends, on which Beale Farange went on: "She means good friends of mine, you know—tremendous friends of mine. There has been no end of them about—that I will say for her!" The child felt bewildered and was afterwards for some time conscious of a vagueness, just slightly embarrassing, as to the subject of so much amusement and as to where her governess had really been. She did n't feel at all as if she had been seriously told, and no such feeling was supplied by anything that occurred later. Her embarrassment, of a precocious, instinctive order, attached itself to the idea that this was another of the matters that it was not for her, as her mother used to say, to go into.
WIKI
Cart Tretinoin: The Perfect Anti-Ageing Solution? Acne and skin ageing are the daily consultations of every dermatologist since everyone wants to have clean and healthy skin nowadays.  Tretinoin has been for years one of the best treatments to fight ageing signs and inflammatory conditions, providing visible results in a short time (compared to other drugs).  Also called retinoic acid, it comes from vitamin A (retinol) and belongs to the retinoid group. Let's find out its key points; actual benefits and effectiveness rate proved by science. What is tretinoin, and what is it used for?  Tretinoin is the acid form of retinol (vitamin A), a drug with comedolytic action (destroys comedones, a.k.a blackheads) to normalise the skin renewal or desquamation to avoid the follicle-clogging while having anti-inflammatory properties. It is medically indicated in conditions such as non-inflammatory (comedones) and inflammatory (pustules and papules) lesions in mild to moderate acne vulgaris, as well as to improve the signs of sun-induced ageing (photoaging). But retinoids are not only limited to the skin, as they are helpful in several processes due to their immunomodulatory, chemopreventive, steroid antagonist, and new blood vessel growth (angiogenesis) properties. It has been used as a cancer treatment, especially in leukaemia, chromosomal disorders, psoriasis, psoriasiform processes such as pityriasis rubra pilaris, and premalignant and malignant skin conditions. Although some are off-label uses (not FDA approved), tretinoin represents a drug with an excellent not-fully-understood potential to date. What does tretinoin do for the skin? Here we can get a little dense as the working mechanism of every drug is complex, but we will explain in a short and easy-to-understand way. There are nuclear-type receptors within each cell. These are proteins responsible for recognising molecules and other products to produce a specific effect.  Topical tretinoin binds to two types of nuclear receptors once applied to the skin; retinoic acid receptors (RAR) and retinoid X receptors (RXR). This binding allows for different outcomes on cells such as: 1. Stopping inflammation (prevents the release of inflammatory substances). So it usually reduces the redness of pimples. 2. Increases the procollagen production to make collagen I (80% in photoaged skin), III and VII, and the collagen reorganisation in new tissue bundles. Ideal for aged skin. 3. Modifies the abnormal cycle of keratinocytes in acne through the detachment of the corneous layer cells. In short, it regulates skin cell activity, both in oily production and in its regeneration. 4. Increases the cells reproductive activity to boost the turnover of old cells to new ones to prevent comedones and improve blemishes (thus exfoliating). How do I use tretinoin?  Its use depends on what you are looking for and the severity of the lesions. Topical application is the most first used and recommended form, and it can be applied in gel or cream for: • Treatment of acne vulgaris • As a complementary treatment of photoaging The topical administration consists of applying a thin layer daily, before bedtime, to the skin only on the affected areas. You need to keep the medication away from eyes, mouth, nasal creases, and mucous membranes. Dosages vary amongst different brands, but in general, the higher the dosage, the greater the exfoliative effect. How to use First, wash the skin with water and mild soap. Take a pea and apply a thin layer. Let dry without rubbing for 15-30 minutes. After use, wash your hands. Use it preferably before bedtime, and protect your skin by wearing sunscreen the following day. An initial improvement can be noticed after 2-4 weeks of treatment, and the maximum effect is not reached until 6-8 weeks. The orally taken form of tretinoin is called isotretinoin, a highly effective drug given orally in severe forms of acne such as moderate to severe cystic acne. It is indicated orally since its topical application produces the opposite effect; to cancel or diminish sebum control. How long does it take tretinoin to work? You may see results after the first month of use, and its daily application can be extended up to two years if needed. How effective is it really? Treatment should be maintained for at least two years to treat the signs of photoaging such as fine wrinkles or hyperpigmented spots, as it has been shown that this long-term regimen improves 21% and 9% of them, respectively. Of course, the more advanced the ageing, the lower the response rate or noticeable changes. The improvement can be highlighted as follows: • 1 month for coarse wrinkling • 2 months for fine wrinkling • 4 months for blemishes such as mottled hyperpigmentation, sallowness, and lentigines.  However, tretinoin is not as incredible as it seems. It is possible that the treatment and its skin response may become dose-dependent over time and that upon discontinuation, acne, fine wrinkles, and rough appearance may reappear again. For example, two 12-week treatment regimens with tretinoin (0.1% and 0.025%) can reduce blackheads by 80% and 35%, respectively. The same happens with other retinoids such as adapalene, whose efficacy is higher when used at 0.3% than 0.1%. So, in short, its effectiveness increases as its dosage does. How does it compare with non-medicine skincare products? Its efficacy compared to other products depends on the intended use. Studies show that: • 0.1% tretinoin is highly effective in melasma (hyperpigmented spots), reducing 36% of pigment after use versus a 50% increase with a standard cream after 9 months of continued treatment. • Treatment with tretinoin emollient cream 0.05% for 2 years is much more effective in improving the appearance of fine wrinkles than a generic emollient cream by 20%. • It reduces both inflammatory and non-inflammatory acne by 40% to 70% compared to generic creams.  • 0.1% tretinoin is also effective at a ratio of 83% vs 32% vehicle cream against inflammatory severe acne lesions.  However, natural treatments such as aloe vera may be just as effective as tretinoin when used at 50% due to its anti-bacterial and anti-inflammatory properties. The anti-inflammatory effect may be enhanced when combined, but further testing is still required.  Conclusion Tretinoin is the acid form of vitamin A with multiple working mechanisms in cells, so many that we fall short when we talk about its action here. Concerning the skin, tretinoin was the first retinoid for treating acne and the photoaged skin, and it is still a significant mainstay against both today. Its daily use can provide benefits that depend on how long the treatment lasts, doses and condition severity. Being more effective in cystic or pustular acne but less so in advanced photoaging. As mentioned, tretinoin is not a magic medical compound. On the contrary, it is like any other drug with side effects such as irritation, redness, and unsuccessful cases. Many patients have relapses of acne and wrinkles, while its daily topical application may not work in others. This is when oral isotretinoin takes over. Tretinoin versus non-medical compounds appears to be more effective or equal when combined. However, more tests and studies are needed to prove it. If you are considering using tretinoin, keep in mind that you must do so under medical supervision and according to the instructions of a dermatologist after a thorough evaluation of your skin. Tretinoin is not intended for everyone, but you will likely see good results with continuous use if you are a potential candidate for it.
ESSENTIALAI-STEM
Standard Character Mode From C64-Wiki Jump to navigationJump to search Introduction[edit] Standard Character Mode is an official Graphics Mode for the Commodore 64. It is sometimes referred to as Low Resolution (LoRes). The mode allows for pictures of up to 40 x 25 character blocks filled with PETSCII characters (although technically still 320 x 200 pixel resolution) and 16 colors across the screen. However, there are limitations on how the colors are implemented. Implementation[edit] In Control Register 1 ($d011) bit 6 (ECM) must be cleared and bit 5 (BMM) must be cleared. In Control Register 2 ($d016), bit 4 (MCM) must be cleared. Table 1 highlights these bits. Table 1 - VIC-II Control Registers Hex Address Dec Address Type Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0 Contents $D011 53265 Register RST8 ECM BMM DEN RSEL YSCROLL Control Register 1 $D016 53270 Register - - RES MCM CSEL XSCROLL Control Register 2 Standard Character Mode is 1 of 5 legal graphics modes achievable by the VIC-II; the others being combinations of the bits ECM, BMM and MCM. Table 2 shows the possible graphics modes available from the VIC-II. Table 2 - Graphics Modes VIC-II Bit Combinations Mode ECM BMM MCM Result 0 0 0 0 Standard Character Mode 1 0 0 1 Multicolor Character Mode 2 0 1 0 Standard Bitmap Mode 3 0 1 1 Multicolor Bitmap Mode 4 1 0 0 Extended Background Color Mode 5 1 0 1 Extended Background Color Multicolor Character Mode (invalid) 6 1 1 0 Extended Background Color Standard Bitmap Mode (invalid) 7 1 1 1 Extended Background Color Multicolor Bitmap Mode (invalid) Characteristics[edit] Standard Character Mode is used primarily for writing text, however Low Resolution pictures are possible using PETSCII characters (which each comprise of an 8 x 8 pixel block). A Standard Character Mode picture, or screen of text, consists of a maximum size 40 x 25 character locations each filled with a PETSCII character. Each 8 x 8 pixel character location can contain 2 different colors: 1 color is defined per character location, and 1 color is defined for the entire screen background. All 16 colors can be used. Technical The memory required to hold the data for a bitmap is 1.5 kilobytes; 1 kilobyte for the Screen Memory ($0400-$07ff) and 500 bytes for color RAM ($d800-$dbff). Inconveniently, only the lower nibble for each of the 1000 character locations is used in color RAM with the upper nibble unused; and so the data still spans a block of nearly 1 kilobyte. The background color is defined in $d021. PETSCII characters are stored in Character Generator ROM although other memory locations can hold user-defined characters. User defined characters are popular in when creating tiles in games and it is notably easier to soft scroll a screen of Standard Character Mode than Standard Bitmap Mode. Examples[edit] Gary by Mermaid Victor Charlie by Mermaid N00NEFUKWITEN0NE by Archmage PETSCII and Pilt by Pal Editors[edit]
ESSENTIALAI-STEM
'Game of Thrones' scores record-breaking 32 Emmy nominations | TheHill The final season of “Game of Thrones” received a record-breaking 32 Emmy nominations, the awards show announced on Tuesday.  The HBO fantasy adaptation — used as a political metaphor for modern-day Americans across the idealogical spectrum — has been nominated for outstanding drama series, with its stars Kit Harrington and Emilia Clarke nominated for outstanding lead actor and actress, respectively. The hit series also packed the supporting actor and actress categories, with three out of the seven nominees for outstanding supporting actor coming from “Game of Thrones” and four out of the six nominees for outstanding supporting actress coming from the show. The mega-hit show is popular among Democrats running for president despite a controversial final season that left many fans unsatisfied. South Bend, Ind., Mayor Pete ButtigiegPeter (Pete) Paul ButtigiegSanders leads Democratic field in Colorado poll Poll: Trump trails three Democrats by 10 points in Colorado Castro qualifies for next Democratic primary debates MORE called the show his “guilty pleasure” during a town hall in May and joked about holding the event just before the show’s finale. Sens. Elizabeth Warren (D-Mass.) and Kirsten Gillibrand (D-N.Y.) both knocked the show’s final episodes, with both lawmakers disappointed over the handling of character Daenerys Targaryen, one of its multiple female leaders. Surveys shows that interest in "Game of Thones" stretched across the aisle, with 55 percent of Republicans and 47 percent of Democrats picking the popular character Jon Snow to sit on the Iron Throne. Other shows leading among the nominees include Amazon’s “The Marvelous Mrs. Maisel,” up for 19 awards, and HBO’s “Chernobyl,” following closely behind with 18 nominations. The political comedy "Veep," also highly popular among Beltway insiders, was also nominated for its final season. The Emmy Awards airs Sep. 22 on Fox. View the discussion thread. The Hill 1625 K Street, NW Suite 900 Washington DC 20006 | 202-628-8500 tel | 202-628-8503 fax The contents of this site are ©2019 Capitol Hill Publishing Corp., a subsidiary of News Communications, Inc.
NEWS-MULTISOURCE
Development of selective protease inhibitors via engineering of the bait region of human α2-macroglobulin Seandean Lykke Harwood, Nadia Sukusu Nielsen, Khang Diep, Kathrine Tejlgård Jensen, Peter Kresten Nielsen, Kazuhiro Yamamoto, Jan J. Enghild Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review Abstract Human α2-macroglobulin (A2M) is an abundant protease inhibitor in plasma, which regulates many proteolytic processes and is involved in innate immunity. A2M's unique protease-trapping mechanism of inhibition is initiated when a protease cleaves within the exposed and highly susceptible "bait region." As the wild-type bait region is permissive to cleavage by most human proteases, A2M is accordingly a broad-spectrum protease inhibitor. In this study, we extensively modified the bait region in order to identify any potential functionally important elements in the bait region sequence and to engineer A2M proteins with restrictive bait regions, which more selectively inhibit a target protease. A2M in which the bait region was entirely replaced by glycine-serine repeats remained fully functional and was not cleaved by any tested protease. Therefore, this bait region was designated as the "tabula rasa" bait region and used as the starting point for further bait region engineering. Cleavage of the tabula rasa bait region by specific proteases was conveyed by the insertion of appropriate substrate sequences, e.g., basic residues for trypsin. Screening and optimization of tabula rasa bait regions incorporating matrix metalloprotease 2 (MMP2) substrate sequences produced an A2M that was specifically cleaved by MMPs and inhibited MMP2 cleavage activity as efficiently as wild-type A2M. We propose that this approach can be used to develop A2M-based protease inhibitors, which selectively inhibit target proteases, which might be applied toward the clinical inhibition of dysregulated proteolysis as occurs in arthritis and many types of cancer. OriginalsprogEngelsk Artikelnummer100879 TidsskriftThe Journal of Biological Chemistry Vol/bind297 Nummer1 Antal sider12 ISSN0021-9258 DOI StatusUdgivet - jul. 2021 Fingeraftryk Dyk ned i forskningsemnerne om 'Development of selective protease inhibitors via engineering of the bait region of human α2-macroglobulin'. Sammen danner de et unikt fingeraftryk. Citationsformater
ESSENTIALAI-STEM
EntityGraph API: map (key/value) subgraph support broken Description When programatically creating EntityGraph subgraphs we need to add subgraphs for keys and values independently using addKeySubgraph(...) and addSubgraph(...) methods. However, each of these method will replace the attribute node from the previous step with a new one. Thus, if we first "add" a key subgraph, adding the value subgraph later will effectively remove the key subgraph and vice versa - if we add the value subgraph first, then the key, the value one will be removed. In other words, the last one wins and the previous state is lost. For example, given MockEntity.java: ... the following two methods illustrate the the two cases (only the order of adding subgraphs is different): and: There is even a debug-level logged note in the org.hibernate.jpa.graph.internal.AbstractGraphNode addAttributeNode() method that seems related to this case (does not expect it) - specifically "Encountered request to add entity graph node [%s] using a name [%s] under which another node is already registered [%s]": Environment Any Assignee A Susnjar Reporter Learner Evermore Fix versions None Labels None backPortable None Suitable for new contributors None Requires Release Note None Pull Request None backportDecision None Components Affects versions Priority Major Configure
ESSENTIALAI-STEM
Autopsy Alternative Titles: necropsy, postmortem, postmortem examination Autopsy, also called necropsy, postmortem, or postmortem examination, dissection and examination of a dead body and its organs and structures. An autopsy may be performed to determine the cause of death, to observe the effects of disease, and to establish the evolution and mechanisms of disease processes. The word autopsy is derived from the Greek autopsia, meaning “the act of seeing for oneself.” History of autopsy The early Egyptians did not study the dead human body for an explanation of disease and death, though some organs were removed for preservation. The Greeks and the Indians cremated their dead without examination; the Romans, Chinese, and Muslims all had taboos about opening the body; and human dissections were not permitted during the Middle Ages. The first real dissections for the study of disease were carried out about 300 bce by the Alexandrian physicians Herophilus and Erasistratus, but it was the Greek physician Galen of Pergamum in the late 2nd century ce who was the first to correlate the patient’s symptoms (complaints) and signs (what can be seen and felt) with what was found upon examining the “affected part of the deceased.” This was a significant advance that eventually led to the autopsy and broke an ancient barrier to progress in medicine. It was the rebirth of anatomy during the Renaissance, as exemplified by the work of Andreas Vesalius (De humani corporis fabrica, 1543) that made it possible to distinguish the abnormal, as such (e.g., an aneurysm), from the normal anatomy. Leonardo da Vinci dissected 30 corpses and noted “abnormal anatomy”; Michelangelo, too, performed a number of dissections. Earlier, in the 13th century, Frederick II ordered that the bodies of two executed criminals be delivered every two years to the medical schools, one of which was at Salerno, for an “Anatomica Publica,” which every physician was obliged to attend. The first forensic or legal autopsy, wherein the death was investigated to determine presence of “fault,” is said to have been one requested by a magistrate in Bologna in 1302. Antonio Benivieni, a 15th-century Florentine physician, carried out 15 autopsies explicitly to determine the “cause of death” and significantly correlated some of his findings with prior symptoms in the deceased. Théophile Bonet of Geneva (1620–89) collated from the literature the observations made in 3,000 autopsies. Many specific clinical and pathologic entities were then defined by various observers, thus opening the door to modern practice. The autopsy came of age with Giovanni Morgagni, the father of modern pathology, who in 1761 described what could be seen in the body with the naked eye. In his voluminous work On the Seats and Causes of Diseases as Investigated by Anatomy, he compared the symptoms and observations in some 700 patients with the anatomical findings upon examining their bodies. Thus, in Morgagni’s work the study of the patient replaced the study of books and comparison of commentaries. With Karl von Rokitansky of Vienna (1804–78), the gross (naked eye) autopsy reached its apogee. Rokitansky utilized the microscope very little and was limited by his own humoral theory. The French anatomist and physiologist Marie F.X. Bichat (1771–1802) stressed the role of the different generalized systems and tissues in the study of disease. It was the German pathologist Rudolf Virchow (1821–1902), however, who introduced the cellular doctrine—that changes in the cells are the basis of the understanding of disease—in pathology and in autopsy. He warned against the dominance of pathologic anatomy—the study of the structure of diseased tissue—alone as such and stressed that the future of pathology would be physiologic pathology—study of the functioning of the organism in the investigation of disease. The modern autopsy has been expanded to include the application of all knowledge and all of the instruments of the specialized modern basic sciences. The examination has been extended to structures too small to be seen except with the electron microscope, and to molecular biology to include all that can be seen as well as what still remains unseen. Procedure The autopsy procedure itself has changed very little during the 20th century. The first step is a gross examination of the exterior for any abnormality or trauma and a careful description of the interior of the body and its organs. This is usually followed by further studies, including microscopic examination of cells and tissues. The main incisions in the body remain the same. For the torso, a Y-shaped incision is made. Each upper limb of the “Y” extends from either the armpit or the outer shoulder and is carried beneath the breast to the bottom of the sternum, or breastbone, in the midline. From this point of juncture at the bottom of the sternum the incision is continued down to the lower abdomen where the groins meet in the genital area. There are different schools as to procedure beyond this point. In one method, each organ is removed separately for incision and study. In the so-called en masse methods the chest organs are all removed in a single group and all of the abdominal organs in another for examination. The great vessels to the neck, head, and arms are ligated—tied off—and the organs removed as a unit for dissection. The neck organs are explored in situ only or removed from below. Dissection then proceeds usually from the back, except where findings dictate a variation in the procedure. Usually groups of organs are removed together so that disturbances in their functional relationships may be determined. After study of the brain in position, it is freed from its attachments and removed in toto. The spinal cord also can be removed. The dissector proceeds to examine the external and cut surface of each organ, its vascular structures, including arteries, lymphatics, fascial or fibrous tissue, and nerves. Specimens are taken for culture, chemical analysis, and other studies. Immediately upon completion of the procedure, all of the organs are returned to the body and all incisions carefully sewn. After the body’s proper restoration, no unseemly evidence of the autopsy need remain. After the gross examination of the body the findings are balanced one against another and a list of pathological findings is compiled; this list comprises the tentative or “provisional anatomical diagnoses.” Such diagnoses are grouped and arranged in the order of importance and of sequence. On occasion a quick microscopic study is done to confirm a diagnosis so as to assure its proper listing. Autopsies document the disease processes that were in place at the time of the patient’s death, and most autopsies do not list an immediate or proximate cause of death. These factors are important in forensic cases, and they are often required in autopsy analysis even in situations when an autopsy itself is not required by law. After all studies—histological, chemical, toxicological, bacteriological, and viral—are completed, any errors of the provisional anatomical diagnoses are corrected and the final anatomical diagnoses and the final cause of death are listed. A statement of analysis of the autopsy that correlates the findings with the clinical picture, the “clinical pathological correlation,” concludes the record of the autopsy. Forensic autopsy The forensic pathologist goes beyond the mere cause of death; he must establish all the facts, both lethal and nonlethal, with any potential bearing whatsoever on the criminal or civil litigation. The cause of death is not automatically revealed when the body is opened; it is not an isolated tangible and delimited entity; it is a concept—an opinion—as to mechanism or happening and as such is subject occasionally to differences in interpretation. The legal autopsy requires meticulous detailed descriptions, measurements, and documentation. The goal of forensic autopsies is to determine whether or not death was due to natural causes. Experience in the investigation of the scene of a death in medicolegal cases is important, for the evaluation of circumstances of death may be critical in establishing the mode of death—e.g., suicide. The autopsy may not be able, of itself, to determine intent, whereas the scene and the circumstances may provide unmistakable evidence. Photographic documentation is important in the medicolegal autopsy. The medicolegal postmortem examination must always be complete to rule out any other potential contributory cause of death and therefore must never be limited to a partial study. The identification of the deceased and of all specimens taken from the body is critical; the time of death and the blood grouping must, if possible, be established. In all autopsies, but especially in forensic cases, findings must be dictated to a stenographer or recording instrument during the actual performance of the procedure. The record often becomes legal evidence and therefore must be complete and accurate. Purposes The autopsy deals with the particular illness as evidenced in one individual and is more than simply a statistical average. Every autopsy is important to expose mistakes, to delimit new diseases and new patterns of disease, and to guide future studies. Morbidity and mortality statistics acquire accuracy and significance when based on careful autopsies; they also often give the first indication of contagion and epidemics. Nor can the role of the autopsy in medical education be understated. It is the focal point at which the profession learns to assess and to apply medical knowledge. Thus, the autopsy does more than merely determine the cause of death. While the medicolegal autopsy in particular has this important primary objective, most autopsies have a larger purpose. Learn More in these related articles: More About Autopsy 4 references found in Britannica articles Assorted References × subscribe_icon Britannica Kids LEARN MORE MEDIA FOR: Autopsy Previous Next Email You have successfully emailed this. Error when sending the email. Try again later. Edit Mode Autopsy Tips For Editing We welcome suggested improvements to any of our articles. You can make it easier for us to review and, hopefully, publish your contribution by keeping a few points in mind. 1. Encyclopædia Britannica articles are written in a neutral objective tone for a general audience. 2. You may find it helpful to search within the site to see how similar or related subjects are covered. 3. Any text you add should be original, not copied from other sources. 4. At the bottom of the article, feel free to list any sources that support your changes, so that we can fully understand their context. (Internet URLs are the best.) Your contribution may be further edited by our staff, and its publication is subject to our final approval. Unfortunately, our editorial approach may not be able to accommodate all contributions. Thank You for Your Contribution! Our editors will review what you've submitted, and if it meets our criteria, we'll add it to the article. Please note that our editors may make some formatting changes or correct spelling or grammatical errors, and may also contact you if any clarifications are needed. Uh Oh There was a problem with your submission. Please try again later. Keep Exploring Britannica Email this page ×
ESSENTIALAI-STEM
Page:Catholic Encyclopedia, volume 2.djvu/849 BREVIARY 769 BREVIARY iarium), signifies in its primary acceptation an abridg- ment, or a compendium. It is often employed in this sense by Christian authors, e. g. Breviarium fidci, Breviarium in psalmos, Breviarium canonum, Breviarium regularum. In liturgical language Brcriary has a special meaning, indicating a boolc furnishing the regulations for the celebration of Mass or the canonical Office, and may be met with under the titles Breviarium Ecclesiastiei Ordinis, or Brev- iarium Ecclesi(B Romirtsw {Romana). In the ninth century Alcuin uses the word to designate an office abridged or simplified for the use of the laity. Pru- dent ius of Troyes, about the same period, composed a Breviarium Psalterii (v. inf. V. History). In an ancient inventory occurs Breviarium Antiphotiarii, meaning "Extracts from the Antiphonary". In the " Vita Aldrici " occurs "sicut in plenariis et brev- iariis Ecclesise ejusdem continentur". Again, in the inventories in the catalogues, such notes as these may be met with: "Sunt et duo cursinarii et tres benedictionales Libri; ex his unus habet obsequium mortuorum et unus Breviarius", or, "Praeter Brev- iarium quoddam quod usque ad festivitatem S. Joannis Baptistaj retinebunt", etc. Monte Cassino about A. D. 1100 obtained a book entitled "Incipit Breviarimn sive Ordo Officiorum per totam auni de- cursionem". From such references, and from others of a like nature, Quesnel gathers that by the word Brev- iarium was at first designated a book furnishing the rubrics, a sort of Ordo. The title Breviary, as we employ it — that is, a book containing the entire canonical Office — appears to date from the eleventh century. St. Gregory VII having, indeed, abridged the order of prayers, and having simplified the Liturgy as performed at the Roman Court, this abridgment received the name of Breviary, which was suitable, since, according to the etymology of the word, it was an abridgment. The name has been extended to books which contain in one volume, or at least in one work, liturgical books of different kinds, such as the Psalter, the Antiphonary, the Responsoriary, the Lectionary, etc. In this connexion it may be pointed out that in this sense the word, as it is used nowadays, is illogical; it should be named a Ple- ruirium rather than a Breviarium, since, liturgically speaking, the word Plenarium exactly designates such books as contain several different compilations united under one cover. This is pointed out, how- ever, simply to make still clearer the meaning and origin of the word; and section V will furnish a more detailed explanation of the formation of the Breviary. II. Contents. — The Roman Breviary, which with rare exceptions (certain religious orders, the Am- brosian and Mozarabic Rites, etc.) is used at this day throughout the Latin Church, is divided into four parts according to the seasons of the year: Winter, Spring, Summer, and Autumn. It is constructed of the following elements: (a) the Psalter; (b) the Proper of the Season; (c) Proper of the Saints; (d) the Common; (e) certain special Offices. (a) The Psalter. — Tlie Psalter is the most ancient and the most venerable portion of the Breviary. It consists of 1.50 psalms, divided in a particular way, to Ix; described later. These psalms formed the groundwork of the Liturgy of the Jews for twelve centuries before Christ, and He certainly made use of these formularies for His prayers, and quoted them on several occasions. The Apostles followed His example, and handed down to the Christian Churches the inheritance of the Psalter as the chief form of Christian prayer. The Church h;js carefully preserved tliem during the lapse of centuries and has never sought to replace them by any other formu- laries. Attempts have been made from time to time to compose Christian psalms, such as the Gloria in excelsis, the Te Deum, the Lumen Hilare, the Te Decet Laus, and a few others; but those which the Church has retained and adopted are singularly few in number. The rhythmic hymns date from a period later than the fourth and fifth centuries, and at best hold a purely secondary place in the scheme of the Office. Thus the Book of Psalms forms the groundwork of Catholic prayer; the lessons which fill so important a place in this prayer are not, after all, prayer properly so called; and the antiphons, responsories, versicles, etc., are but psalms utilized in a particular manner. In the Breviary, however, the Psalter is divided according to a special plan. In the earliest period the use of the Book of Psalms in the Office was doubtless exactly similar to that which prevailed amongst the Jews. The president of the choir chose a particular psalm at his o\\ii will. Some psalms, such as xxi, seem specially appropriate to the Passion. Another was adapted to the Resurrection, a third suited the Ascension, while others again are specially referable to the Office of the Dead. Some psalms provide morning prayers, others those for night. But the choice was left in the hands of the bishop or president of the choir. Later, probably from the fourth century, certain psalms began to be grouped together, to respond to the divers requirements of the Liturgy. Another cause led to these groupings and arrange- ments of the Psalter. Some monks were in the liabit of reciting daily the whole of the 1.50 psalms. But this form of devotion, apart from lessons and other formularies, occupied so much time that they began to spread the recitation of the entire Psalter over a whole week. By this method each day was di- ^nded into hours, and each hour had its o^\ti portion of the Psalter. From this arrangement arose the idea of dividing the Psalter according to specially devised rules. St. Benedict was one of the earliest to set himself to this task, in the sixth centurj'. In his Rule he gives minute directions how, at that period, the psalms were to be distributed at the dis- position of the abbot; and he himself drew up such an arrangement. Certain psalms were set apart for the night offices, others for Lauds, others for Prime, Terce, Sext, and None, others for Vespers and Compline. It is a subject of discussion amongst liturgists whether this Benedictine division of the psalms is anterior or posterior to the Roman Psalter. Although it may not be possible to prove the point definitely, still it would seem that the Roman arrangement is the older of the two, because that drawn up by St. Benedict shows more skill, and would thus seem to be in the nature of a reform of the Roman division. In any case, the Roman arrangement of the P.salter reaches back to a hoary antiquity, at least to the seventh or eighth century, since when it has not undergone any alteration. The following is its dis- position. Psalms i-cviii are recited at Matins, twelve a day; but Sunday Matins have six more psalms divided between the three nocturns. Thus:^ Sunday — Psalms i, ii, iii, vi-xiv; xv, x\n, xvii; xviii, xi.x, XX. Monday — Psalms xxvi-xxxvii. Tuesday — Psalms xxxviii-xli, .xliii-xlix, li. Wednesday — Psalms Iii, liv-lxi, Ixiii, Ixv, bcvii. Thursday — Psalms Ixviii-lxxix. Friday — Psalms lxxx-lxx.xviii, xciii, xcv, xcvi. Saturday — Psalms xcvii-cviii. The psalms omitted in this series, namely, iv, v, xxi-xxv, xlii, I, liii, Ixii, Ixiv, Ixvi, Ixxxix-xcii, and xciv, are, on account of their special aptitude, re- served for Lauds, Prune, and Compline. The series, from Ps. cix to Ps. cxlvii inclusively, are used at Vespers, five each day, except Psalms c.xvii, cxviii, and c.xlii, reserved for other hours.
WIKI
Building Act 1984 The Building Act 1984 (c. 55) is a United Kingdom statute consolidating previous legislation concerning the construction process, and the design and specifications for buildings and their component parts, and related matters, in England and Wales. The Welsh Government may make its own building regulations for Wales under this Act. This Building Act 1984 does not extend to Scotland or Northern Ireland, which both have similar but differing legislation. The Building Act 1984 permits detailed regulations to be made by the UK Secretary of State and/or the Welsh Ministers (of the Senedd). The building regulations made under the Building Act 1984 have been periodically updated, rewritten or consolidated, with the latest and current version being the Building (Amendment) Regulations 2016 (SI 2016/490). More minor amendments have been issued, for example in 2019 and 2020 in respect of enhanced fire safety measures. (Building Regulation 7(2) placed a ban on the use of combustible materials in external walls, of high-risk buildings – over (six floors) 18 metres high). Following the Grenfell Tower Fire of 2017, in which 72 people died in a 24-floor block of flats (without sprinklers and combustible external wall materials had been recently added to the block – for improved energy-efficiency and other building management reasons), an independent review into Building Regulations and fire safety was commissioned by the UK Government and chaired by Dame Judith Hackitt. The review's report was published on 17 May 2018. The UK Government surveyed 1,200 recently erected "high-rise" buildings and it was found that far too many were in fact not compliant with the pre-2017 fire safety requirements of the English building regulations. The government has now ordered many of these "dangerous" higher-risk buildings to be "remediated". The government has asked many more 'older' high-rise building owners to examine their stock for safety risks. Some 12,000 blocks have now been reviewed. Local housing authorities and regional fire authorities have been instructed to ensure remediation of recently erected blocks is carried out as quickly as possible. Power to make regulations S.1 Power to make building regulations The Secretary of State (or The Welsh Assembly) may for any purposes of : * (a) securing the health, safety, welfare and convenience of persons regards buildings * (b) conserving fuel and power * (c) preventing waste, undue consumption, or contamination of water * (d) protecting or enhancing the environment * (e) facilitating sustainable development or * (f) preventing and detecting crime make building regulations in respect of: * (a) the design and construction of buildings * (b) the demolition of buildings * (c) services, fittings and equipment provided in or in connection with buildings. The powers to make building regulations have been amended and extended in their scope by two recent Acts of Parliament; the Sustainable and Secure Buildings Act 2004 and the Climate Change and Sustainable Energy Act 2006. The latter Act also alters and extends the enforcement powers of local building control authorities, in England and Wales. The Building Act 1984 is to be greatly altered in both its scope and its enforcement powers, by the forthcoming "Building Safety Act 2021". The legal obligation to ensure controlled building work does comply with the requirements of the building regulations will to be shared between more defined "individual dutyholders". Enforcement powers will be available for use by a building control authority for up to ten years after any offence. New legislation On 20 July 2020, a new draft "Building Safety Act" was published, for public consultation, and the Building Safety Bill was introduced into the House of Commons on 5 July 2021. This was enacted into statute law on 28 April 2022 and will greatly alter the scope and remit of the existing legislation. The bill defines "higher-risk" (high-rise) as those blocks of flats "with 6 floors or more" or those blocks of flats "over 18m high", whichever occurs first. The new law (Act) heavily amends and extending the Building Act 1984 and for example, abolishes "approved inspectors", creates a single state register for all building control inspectors (with 'legal duties' now being at the individual and personal level of professional and legal responsibility), creates a new national Building Safety Regulator (BSR). The Act creates several new criminal offences – including one of impersonating a registered building control inspector. The Act creates new building control authorities – initially at the district or unitary local authority level. The Act confirms the new national Building Safety Regulator will be a building control authority for all "higher-risk" buildings. (Residential buildings with two or more flats over 18 metres high). The national regulator will be the sole building control authority for 'higher-risk' (high-rise) buildings. All existing and under construction, "higher-risk" (high-rise – over 18m high) buildings are to be transferred to the "National Building Safety Regulator" jurisdiction. All "higher-risk" buildings will have to register with the BSR and prove (over the whole-lifetime of the building) that they are still safe to use and occupy and monitor the "higher-risk" building's fire and structural safe features and systems, to keep this safety case registered with the national regulator (for England). Periodic re-registration (with the BSR) will be required for all high-risk buildings. The new law will also alter the Architect Registration Board's operational rules to require all 'architects' to undertake annual CPD and competency training for the whole of the "practising career". Developers, designers and contractors will no longer be able to choose their "regulator". The national regulator will also have powers to test and/or ban any building material or building product, which it knows is "unsafe" or "non-compliant" with the "requirements of the Building Regulations". The national regulator will also have powers to require all claims made about the performance or nature of a building product or material to be truthful and supported by 'up-to-date' scientific testing. The devolved Welsh Government has welcomed the draft Building Safety Bill, and will legislate for it to apply (with some Welsh amendments) to future building work within the nation of Wales. Scotland Scotland has its own Building (Scotland) Act 2003 and its own Building (Procedures) (Scotland) Regulations 2004.
WIKI
Flethuseo Flethuseo - 4 months ago 24 Ruby Question Trying to relocate of a word using a multi-line regular expression I'm trying to change a file with struct definitions like: "typedef struct PET_fun1 { ... } " to have definitions like this: "typedef struct { ... } PET_fun1;" str = <<END typedef struct PET_fun1 { char tam[1]; char tma[2]; char mta[2]; } typedef struct PET_fun2 { def : abc[3] def : bac[3] def : acb[3] } typedef struct PET_fun3 { abc } typedef struct PET_fun4 { ... } END puts str.gsub(/(typedef\s+struct\s+)(PET_\w+) ({.*})/m, '\1\3\2') # This regular expression isn't working. The output I want after a successful string transformation would look like this: typedef struct { char tam[1]; char tma[2]; char mta[2]; } PET_fun1; typedef struct { def : abc[3] def : bac[3] def : acb[3] } PET_fun2; typedef struct { abc } PET_fun3; typedef struct { ... } PET_fun4; Answer Your .* element is greedy, it's matching all the way from the very first { in the string on line 1 to the last } in the string on the last line. You need to use a lazy quantifier so that the regex stops at the first } it finds. You also probably want PET_ to bring its preceeding space with it. Your final regex should look something like this: str.gsub(/(typedef\s+struct\s*)( PET_\w+)( {.*?})/m)
ESSENTIALAI-STEM
cowry Derived terms * money cowry (, syn. ) * money cowry (, syn. ) * money cowry (, syn. ) * money cowry (, syn. )
WIKI
Symptoms Chest pain and discomfort Chest pain and discomfort can frequently be attributed to digestive issues, rather than cardiac problems. Non-cardiac chest pain is the medical term for chest pain that does not originate from the heart. Conditions such as acid reflux can generate a sharp, agonizing sensation in the chest. If you experience symptoms such as shortness of breath or chest tightness, it is important to seek emergency medical assistance. Our gastroenterologist possesses the expertise necessary to identify whether your chest pain or discomfort is due to digestive issues. Related Symptoms Is your chest pain an emergency? Seek immediate medical advice for the following symptoms: These are signs of a heart attack and require immediate assistance. If you experience these symptoms, call 999 or go to the nearest emergency room. Chest pain symptoms caused by digestive problems While it isn’t always clear what is causing your chest pain and discomfort, some key signs would indicate your pain is due to a digestive problem rather than a heart problem.  Signs include: If you experience the following digestive symptoms alongside your chest pain, it suggests your pain is due to a digestive problem. Though, you should discuss your symptoms with a doctor to rule out other causes of your chest pain first. Symptoms that could indicate digestive problems include : Causes of non-cardiac chest pain and discomfort : Acid reflux, heartburn and indigestion Acid reflux often causes a burning sensation in your chest, known as heartburn. You may also experience an unpleasant taste in your mouth. Individuals with indigestion (dyspepsia) will often feel uncomfortably full after eating and may feel sick (nausea) and bloated. Gastro-oesophageal reflux disease Gastro-oesophageal reflux disease (GORD) refers to excessive acid reflux. Acid and bile flow up from the stomach via the food pipe (oesophagus) due to a relaxed or weak sphincter. Left untreated, this can lead to Barrett’s oesophagus, which has similar symptoms to acid reflux. GORD is the most common reason for non-cardiac chest pain. Irritable bowel syndrome (IBS) IBS usually causes abdominal pain, though it may also cause pain in your chest, back, and jaw. For people with IBS, trapped gas often causes chest pain. Functional dyspepsia Functional dyspepsia is a medical condition characterized by persistent symptoms of indigestion without a clear underlying cause. Symptoms of functional dyspepsia may include a burning sensation in the lower chest, bloating, nausea, and belching.   Swallowing disorders Swallowing disorders are medical conditions that affect the food pipe or oesophagus, resulting in difficulty swallowing. Pain along the oesophagus, which can be felt in the chest and other areas, may also be experienced. Such conditions may include achalasia or oesophageal spasm.   Additional digestive conditions that can cause non-cardiac chest pain Below we list other conditions that cause chest pain and discomfort and where you are likely to feel that pain. When to speak to a gastroenterologist : After a cardiac condition has been excluded by your physician, alternative causes may be explored. If additional gastrointestinal symptoms, such as those aforementioned, are present, it would be prudent to consult with a gastroenterologist. Our team of gastroenterologists will request a comprehensive account of your symptoms, their duration, and degree of severity. Moreover, we will delve into your medical history and that of your immediate family to deduce the most plausible causes. Diagnosing non-cardiac chest pain Primarily, it is imperative to establish the underlying cause of the discomfort before determining an appropriate treatment course. We can administer a variety of examinations to diagnose the source of the pain, such as an endoscopic investigation to scrutinize your oesophagus and upper gastrointestinal (GI) system. Furthermore, other evaluations that may be conducted include: Treatment For a multitude of conditions that elicit thoracic pain and discomfort, we generally initiate lifestyle modifications to gauge the impact on your symptoms. If there is an improvement in your symptoms, we may opt for monitoring your condition. Conversely, if no alteration or exacerbation is observed, pharmaceutical intervention may be prescribed. In cases of acute symptoms, alternative treatments may be recommended, contingent on the underlying cause of the condition. Schedule an appointment
ESSENTIALAI-STEM
WP_Widget_Media_Video::render_media( array $instance ) Render the media on the frontend. Parameters $instance array Required Widget instance props. Top ↑ Source File: wp-includes/widgets/class-wp-widget-media-video.php. View all references public function render_media( $instance ) { $instance = array_merge( wp_list_pluck( $this->get_instance_schema(), 'default' ), $instance ); $attachment = null; if ( $this->is_attachment_with_mime_type( $instance['attachment_id'], $this->widget_options['mime_type'] ) ) { $attachment = get_post( $instance['attachment_id'] ); } $src = $instance['url']; if ( $attachment ) { $src = wp_get_attachment_url( $attachment->ID ); } if ( empty( $src ) ) { return; } $youtube_pattern = '#^https?://(?:www\.)?(?:youtube\.com/watch|youtu\.be/)#'; $vimeo_pattern = '#^https?://(.+\.)?vimeo\.com/.*#'; if ( $attachment || preg_match( $youtube_pattern, $src ) || preg_match( $vimeo_pattern, $src ) ) { add_filter( 'wp_video_shortcode', array( $this, 'inject_video_max_width_style' ) ); echo wp_video_shortcode( array_merge( $instance, compact( 'src' ) ), $instance['content'] ); remove_filter( 'wp_video_shortcode', array( $this, 'inject_video_max_width_style' ) ); } else { echo $this->inject_video_max_width_style( wp_oembed_get( $src ) ); } } Top ↑ Changelog Changelog Version Description 4.8.0 Introduced. Top ↑ User Contributed Notes You must log in before being able to contribute a note or feedback.
ESSENTIALAI-STEM
@inproceedings{5692, abstract = {We consider Max-min Share (MmS) fair allocations of indivisible chores (items with negative utilities). We show that allocation of chores and classical allocation of goods (items with positive utilities) have some fundamental connections but also differences which prevent a straightforward application of algorithms for goods in the chores setting and viceversa. We prove that an MmS allocation does not need to exist for chores and computing an MmS allocation - if it exists - is strongly NP-hard. In view of these non-existence and complexity results, we present a polynomial-time 2-approximation algorithm for MmS fairness for chores. We then introduce a new fairness concept called optimal MmS that represents the best possible allocation in terms of MmS that is guaranteed to exist. We use connections to parallel machine scheduling to give (1) a polynomial-time approximation scheme for computing an optimal MmS allocation when the number of agents is fixed and (2) an effective and efficient heuristic with an ex-post worst-case analysis.}, author = {Aziz, Haris and Rauchecker, Gerhard and Schryen, Guido and Walsh, Toby}, booktitle = {Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17)}, pages = {1--7}, title = {{Algorithms for Max-Min Share Fair Allocation of Indivisible Chores}}, year = {2017}, } @article{5676, author = {Rauchecker, Gerhard and Schryen, Guido}, journal = {Im Einsatz}, pages = {44--46}, publisher = {Stumpf & Kossendey}, title = {{Projekt KUBAS: Koordination ungebundener Vor-Ort-Helfer}}, volume = {23}, year = {2016}, } @inproceedings{5595, author = {Wagner, Gerit and Prester, Julian and Roche, Maria and Benlian, Alexander and Schryen, Guido}, booktitle = {International Conference on Information Systems}, title = {{Factors Affecting the Scientific Impact of Literature Reviews: A Scientometric Study}}, year = {2016}, } @article{5617, abstract = {CAPTCHAs are challenge-response tests that aim at preventing unwanted machines, including bots, from accessing web services while providing easy access for humans. Recent advances in artificial-intelligence based attacks show that the level of security provided by many state-of-the-art text-based CAPTCHAs is declining. At the same time, techniques for distorting and obscuring the text, which are used to maintain the level of security, make text-based CAPTCHAs diffcult to solve for humans, and thereby further degrade usability. The need for developing alternative types of CAPTCHAs which improve both, the current security and usability levels, has been emphasized by several researchers. With this study, we contribute to research through (1) the development of two new face recognition CAPTCHAs (Farett-Gender and Farett-Gender&Age), (2) the security analysis of both procedures, and (3) the provision of empirical evidence that one of the suggested CAPTCHAs (Farett-Gender) is similar to Google's reCAPTCHA and better than KCAPTCHA concerning effectiveness (error rates), superior to both regarding learnability and satisfaction but not effciency.}, author = {Schryen, Guido and Wagner, Gerit and Schlegel, Alexander}, journal = {Computers & Security}, keyword = {CAPTCHA, Usability, Facial features, Gender classiffcation, Age classification, Face recognition reverse Turing test}, number = {July}, pages = {95--116}, publisher = {Elsevier}, title = {{Development of two novel face-recognition CAPTCHAs: a security and usability study}}, volume = {60}, year = {2016}, } @inproceedings{5618, abstract = {Literature reviews play an important role in the development of knowledge. Yet, we observe a lack of theoretical underpinning of and epistemological insights into how literature reviews can contribute to knowledge creation and have actually contributed in the IS discipline. To address these theoretical and empirical research gaps, we suggest a novel epistemological model of literature reviews. This model allows us to align different contributions of literature reviews with their underlying knowledge conversions - thereby building a bridge between the previously largely unconnected fields of literature reviews and epistemology. We evaluate the appropriateness of the model by conducting an empirical analysis of 173 IS literature reviews which were published in 39 pertinent IS journals between 2000 and 2014. Based on this analysis, we derive an epistemological taxonomy of IS literature reviews, which complements previously suggested typologies.}, author = {Schryen, Guido and Wagner, Gerit and Benlian, Alexander}, booktitle = {International Conference on Information Systems (ICIS)}, keyword = {Literature review, Research methods/methodology, Theory of knowledge}, title = {{Theory of Knowledge for Literature Reviews: An Epistemological Model, Taxonomy and Empirical Analysis of IS Literature}}, year = {2015}, } @inproceedings{5588, abstract = {The protection of information technology (IT) has become and is predicted to remain a key economic challenge for organizations. While research on IT security investment is fast growing, it lacks a theoretical basis for structuring research, explaining economic-technological phenomena and guide future research. We address this shortcoming by suggesting a new theoretical model emerging from a multi-theoretical perspective adopt-ing the Resource-Based View and the Organizational Learning Theory. The joint appli-cation of these theories allows to conceptualize in one theoretical model the organiza-tional learning effects that occur when the protection of organizational resources through IT security countermeasures develops over time. We use this model of IT security invest-ments to synthesize findings of a large body of literature and to derive research gaps. We also discuss managerial implications of (closing) these gaps by providing practical ex-amples.}, author = {Weishäupl, Eva and Yasasin, Emrah and Schryen, Guido}, booktitle = {International Conference on Information Systems}, keyword = {Information Security, Investment, Literature review, Resource-based View, Organi-zational Learning Theory, Multi-theoretical Perspective}, title = {{A Multi-Theoretical Literature Review on Information Security Investments using the Resource-Based View and the Organizational Learning Theory}}, year = {2015}, } @inproceedings{5590, abstract = {Nowadays, providing employees with failure-free access to various systems, applications and services is a crucial factor for organizations? success as disturbances potentially inhibit smooth workflows and thereby harm productivity. However, it is a challenging task to assign access rights to employees? accounts within a satisfying time frame. In addition, the management of multiple accounts and identities can be very onerous and time consuming for the responsible administrator and therefore expensive for the organization. In order to meet these challenges, firms decide to invest in introducing an Identity and Access Management System (IAMS) that supports the organization by using policies to assign permissions to accounts, groups, and roles. In practice, since various versions of IAMSs exist, it is a challenging task to decide upon introduction of an IAMS. The following study proposes a first attempt of a decision support model for practitioners which considers four alternatives: Introduction of an IAMS with Role-based Access Control RBAC) or without and no introduction of IAMS again with or without RBAC. To underpin the practical applicability of the proposed model, we parametrize and operationalize it based on a real world use case using input from an expert interview.}, author = {Weishäupl, Eva and Kunz, Michael and Yasasin, Emrah and Wagner, Gerit and Prester, Julian and Schryen, Guido and Pernul, Günther}, booktitle = {2nd International Workshop on Security in highly connected IT Systems (SHCIS?15)}, keyword = {Identity and Access Management, Economic Decision Making, Information Systems, Information Security Investment, Decision Theory}, title = {{Towards an Economic Approach to Identity and Access Management Systems Using Decision Theory}}, year = {2015}, } @article{5622, author = {Schryen, Guido and Rauchecker, Gerhard and Comes, Martina}, journal = {Business & Information Systems Engineering (BISE)}, number = {4}, pages = {243--259}, publisher = {Springer}, title = {{Resource Planning in Disaster Response - Decision Support Models and Methodologies}}, volume = {57}, year = {2015}, } @article{5634, author = {Schryen, Guido}, journal = {Communications of the AIS}, number = {Art 12}, pages = {286--325}, publisher = {Association for Information Systems (AIS); Association for Computing Machinery (ACM)}, title = {{Writing qualitative IS literature reviews ? Guidelines for synthesis, interpretation and guidance of research}}, volume = {37}, year = {2015}, } @inproceedings{5541, author = {Yasasin, Emrah and Schryen, Guido}, booktitle = {23rd European Conference on Information Systems (ECIS 2015)}, title = {{Requirements for IT Security Metrics - An Argumentation Theory Based Approach}}, year = {2015}, }
ESSENTIALAI-STEM
Fed up with Rails fixtures? (part two) Previously I described how you can write unit tests for ActiveRecord models without using fixtures – just using models in memory. Although only a limited subset of tests can be written this way, it’s often overlooked. Another technique is to use constructor-based dependency injection (DI) in combination with mock objects. However, thanks to ActiveRecord::Associations::AssociationProxy#raise_on_type_mismatch it isn’t straightforward to use mocks for associated models. However, DI can be used effectively for ActionController controllers: class ArticleController < ApplicationController def initialize(article_class = Article) super() @article_class = article_class end def show @article = @article_class.find(params[:id]) end end The controller constructor defaults to using the real Article model class, but in the test we’re going to inject a mock object in its place. You could use one of the many mocking libraries for this, but I’m going to use our home-grown one, Mocha, in a “functional” controller test. require File.dirname(__FILE__) + '/../test_helper' require 'article_controller' class ArticleController; def rescue_action(e) raise e end; end class ArticleControllerTest < Test::Unit::TestCase def setup @article_class = mock() @controller = ArticleController.new(@article_class) @request = ActionController::TestRequest.new @response = ActionController::TestResponse.new end def test_should_display_article article = Article.new @article_class.expects(:find).with('1').returns(article) get :show, :id => 1 assert_template 'show' assert_equal article, assigns(:article) end end I wrote this at about 6am on the train from Durham to London without the aid of a coffee, so it may not make much sense!
ESSENTIALAI-STEM
Ideological: A basic thing to remember about this is the famous phrase "No taxation without representation." The colonists did not want to be taxed without representation. This lit the fire of revolt and started the wheels turning for independence. Additionally, after the French and Indian War, the colonists felt that they had rights to the newly gained territory. Yet, the British government did not want the colonists to settle the area because of clashing with indian tribes, but the colonists felt that they were being deprived of their rights. This lead to conflicts and the colonists resented the British and began a push for representation. However, the British felt that the colonists were represented. This leads to the political issue. politically: Virtual representation was the crowns defense for not having any colonist in
FINEWEB-EDU
Wikipedia:Articles for deletion/Ethiopian Heritage Museum The result was redirect to Ethiopian Jews in Israel. Spartaz Humbug! 18:31, 21 December 2019 (UTC) Ethiopian Heritage Museum * – ( View AfD View log Stats ) No significant updates to the status of a proposed museum since page creation in 2007. Only one source in article and tagged for update needed since 2008 with no sources added. That sole source is now 404 and WP:BEFORE does not disclose alternatives. Only search result is probably not for this organization due to not being located in same place, no indication of same organizers being involved, not having the same name, and still not being built three years later. Doubtful if this proposal was ever notable and no current evidence of significant coverage in reliable sources. Eggishorn (talk) (contrib) 06:45, 3 December 2019 (UTC) * Note: This discussion has been included in the list of Museums and libraries-related deletion discussions. Eggishorn (talk) (contrib) 06:45, 3 December 2019 (UTC) * Note: This discussion has been included in the list of History-related deletion discussions. Eggishorn (talk) (contrib) 06:45, 3 December 2019 (UTC) * Comment -- The 2016 news item is probably the culmination of the project described in the article, and may well refer to something notable enough to need an article. I do not know whether there is enough in the article for it to be rescued and restructured into an article on the new centre, with a historical section describing the efforts of the Ethiopian Jews to het such a centre. Peterkingiron (talk) 16:02, 4 December 2019 (UTC) * , thanks for your input. I thought something similar but if it was the culmination of the effort described in our article, it was an awfully odd one. There is nothing in the Times of Israel article that reasonably establishes any kind of continuity between the projects and the "launch" of the later museum was only an announcement of an intention to actually build it. I can find no indication that this announcement has resulted in actual building activity or other definite progress. Eggishorn (talk) (contrib) 16:33, 4 December 2019 (UTC) * Note: This discussion has been included in the list of Israel-related deletion discussions. Coolabahapple (talk) 12:57, 5 December 2019 (UTC) * Merge to the existing section Ethiopian Jews in Israel, including by adding reference there. It does look to be a prior plan for what became National Institute for Ethiopian Jewry Heritage Center covered in the 2016 article cited in the deletion nomination. Add a bit to that section, saying it was planned but didn't happen as expected, apparently, then this probably related result happened. --Doncram (talk) 23:25, 5 December 2019 (UTC) * The "Ethiopian Heritage Museum" section title probably should be changed, to broaden the section to be about initiatives to create cultural heritage center(s) in Israel. This 2016 article by a Judy Jaffe-Schagen, titled "Creating Space. The Construction of Ethiopian Heritage and Memory in Israel" provides broader context, about how Israel in the past pressured immigrant/refugee Ethiopian Jews to abandon their heritage, but more recently shifted to seeing the merit of recognizing their heritage, and that this latter approach would actually help in their assimilation. Anyhow, the article that is target of this AFD can/should be merged to there, and the section should be broadened. But, right, it probably isn't right for Wikipedia to keep the current article as it is, with its very specific title that was one specific proposal that hasn't panned out. This is similar to AFD i have seen about some Riverwalk type development in Colorado Springs (?), where the proposal was specific in one name, while the built project took a slightly different name. It was silly to be deleting the article that was created at the time of the proposal, it just needed to be moved to the new name. --Doncram (talk) 02:20, 6 December 2019 (UTC) * Comment -- The parent section in the article pointed to also clearly cannot survive on its present form. The whole thing seems to fail WP:CRYSTAL. The 2016 article might constitute the basis for a substitute section. Peterkingiron (talk) 15:54, 6 December 2019 (UTC) * Yes, sure the section there should be renamed to something more general like "Movement to create museums" or "Scholarship about, and education of the public in Israel about, Ethiopian Jewish heritage". Because "Ethiopian Heritage Museum" as a specific proposed title of a museum didn't pan out. But it still makes sense as a section to have, and we can have an anchor there. Okay, I am now defining an anchor there which will still work even if/when the section is renamed. So I think Ethiopian Heritage Museum can be merged and redirected specifically to Ethiopian Jews in Israel, where there [already is info] about this specific name, within the section whatever is its revised section title [and more needs to be merged, including the source]. --Doncram (talk) 02:29, 10 December 2019 (UTC) [revised --Doncram (talk) 02:59, 14 December 2019 (UTC)] * Note: This discussion has been included in the list of Ethiopia-related deletion discussions. Eggishorn (talk) (contrib) 17:15, 10 December 2019 (UTC) Relisted to generate a more thorough discussion and clearer consensus. Please add new comments below this notice. Thanks, &mdash; Coffee // have a ☕️ // beans // 04:01, 11 December 2019 (UTC) * Delete or reditrect to the later project Ethiopian Jews in Israel. The current article is about a project that was not carried out and accordingly fails WP:CRYSTAL. Perhaps one or two sentences from the present content might be merged. Peterkingiron (talk) 15:03, 15 December 2019 (UTC) * Delete or redirect, same as what Peterkingiron said.--SharabSalam (talk) 13:48, 21 December 2019 (UTC)
WIKI
s2Member not behaving in the way it suppose to Happy new year to all. I just realised yesterday that many members who had EOT scheduled by s2Member, were not demoted automatically to free subscribers, therefore, all those members had a "Free Pass’ to all premium content since November. I had to look into each member’s account manually, checking if their payments were actually cancelled on PayPal side, then, I demoted manually one by one to a free subscriber status. Then, I also realised that for some reason, s2Member is not passing any API instructions to Getresponse to change lists once are demoted, so, I had to also move all those members manually to their respective lists. Apparently this has been going on since Nov 2021. What’s Going On?. I’m a s2Member PRO customer since 2012 and I never had ANY similar situation till now. s2Member aways worked as expected. But not now. Is there ANY known similar case, or is it just my site?. Is there any way we could diagnose what’s creating this issue?. I’m attaching two screen captures done today 03/01/2022 to show how members having EOT scheduled on NOV, are still active at level_4. Also, some are from few days back, or even from yesterday. s2Member is not demoting them automatically and I have to do it manually. Not to mention the getresponse part… Could you please help?. Thank you. Hi! Open your url.com/?s2member_auto_eot_system_via_cron=1 Replace url.com with your own domain name, of course… Do it every now and then, it should demote everybody that’s pending. Sometimes you have to open that url more than once since it won’t process all records at once but stop after a certain number of records is processed. Hey there thesimarchitect, thank you for your input. My question is why I see this problem now after 11 years using s2Member?. I never did what you mention before. Also, how do I deal with s2Member not passing information to getresponse to update at which list members should go to?. Something happened with s2Member sometime in OCT or NOV and things are not working in the way it did before… Any hint to that?. Thank you!! Its a bug since years, from time to time the demotion Cron service depetes itself. Have to check regularly and reactivate it in the PayPal options but applies for all gateways. 1 Like I just noticed it. I still have people able to access protected content with memberships that expired months ago. Thanks for pointing this out. I sorted my users by EOT and manually changed the ones with an EOT of yesterday or earlier to Subscriber. The issue for me seems to date back to September 2021. Users before then were demoted automatically. 1 Like Well, I’ve also had problem with one site around the same time period. I thought things stopped working when I added a 7th EOT Renewal Reminder Email. I reduced the number to 5 thinking there was a limit of 5 or 6 and email messages started going out again and after a few hours those who had expired were set to subscribers. Perhaps I unstuck the cron by doing something to get it running again. With 18,000 members it doesn’t take much to have a small problem become large quickly. I frequently export the s2Member list to a FileMaker Pro database I’ve made to make reports and tests not available within s2Member. I added a test for expired records that weren’t correct and found over 700. The next day the cron fixed every record and we were back to normal. Jim When I check my cron events, it shows “ws_plugin__s2member_auto_eot_system__schedule” running every 10 minutes. But it doesn’t seem to be accomplishing anything when it runs. Would adding “/?s2member_auto_eot_system_via_cron=1” to the end of my URL make any difference? You open your url with that termination in your browser, manually, to manually run the EOT task from your computer at the time you do it. It’s more of a test/temporary fix until you get your cron tasks fixed. Also handy if you set users to expire and you don’t want to wait for the next cron to run. Sorry, I do understand how to run the command in the browser. I just can’t figure out why my cron events show the s2member Auto EOT event running every 10 minutes and yet it’s not actually doing anything. Which is why I’m wondering if running the command manually in the browser would have any effect. Update: It looks like it may have started working again. I just noticed that s2Member demoted the accounts that expired today. Have to keep an eye on it I guess. Its only demoting one or a certain per run afaik. So for 700 needs many runs. And it’s a pita that it so often deactivates itself. At least once per year for me. There’s a fix for that, you add the php instructions below using a plugin that lets you add your own plugin or you create a php file and you create a php with them (adjust the number according to what you believe will work best): // Increase per process SQL records scanned for EOT Reminder Emails add_filter('ws_plugin__s2member_auto_eot_system_per_process', 's2_eots_per_process'); add_filter('ws_plugin__s2member_pro_eot_reminders_per_process', 's2_eots_per_process'); function s2_eots_per_process() { return 500; } Sometimes Wordpress’s Cron glitches. Sometimes even your server cron’s glitch (I know mine does because I use cloudflare). I never had a glitch except for the s2member Cron. Could you write a plugin that reinstates the s2member Cron job once a day? I am running into the same problem. Can you please elaborate on how you would “Open” the domain/?s2member_auto_eot_system_via_cron=1? Where would you do this and what action would need to be done “every now and then”? Thanks Just open your website in your browser as you normally would. Then add “/?s2member_auto_eot_system_via_cron=1” (without the quotes) after the “.com” and press Enter to run it. 1 Like For those that have access wouldn’t it make sense to add a daily cron job? 1 Like I don’t know how to write such a Cron job. How can you write a Cron job that inserts another cron Job? Also maybe this is not possible as it would be s security risk? There are many plugins letting you fiddle with Cron jobs, so most people should be able to do it. 1 Like I use a plugin called WP Crontrol which not only lets you see the scheduled cron events but also gives you a Run Now option for each one. I clicked Run Now for s2Member’s Auto EOT job a couple of days ago and it has been working fine ever since. 1 Like I use that plugin too, if the Cron job is not starting, that’s a different problem. Not related to S2. The problem is that S2 is deleting the Cron job from time to time. So you need to insert a new Cron job, or inside the PayPal options set the auto demotion to on again. If the Cron is missing it will be blank. Cron job needs someone to visit the site from time to time. But that is not a problem. If no-one visits your site it doesn’t matter if accounts are denoted or not. There needs to be a plugin or another cron job restoring the missing/deleted Cron job from time to time. I never lost any other Cron job. This is a very old (since beginning?) Bug in s2 member 1 Like My site gets tons of traffic so “no one visits” would not have been the issue. I did re-save the Automatic EOT Behavior options (even though they appeared to still be set correctly) so maybe that’s what caused it to start working again. Seems strange, if this has indeed been a bug from day 1, that I’ve been using s2Member since 2012 yet this was the first time it stopped demoting expired memberships. 1 Like
ESSENTIALAI-STEM
        Where to Discuss? Local Group Preface Goal: A few method to highlight code. From default, triple backtick, to prismjs. Source Code You can download the source code of this article here. Extract and run on CLI using $ npm install. 1: Highlighting There are at least two way to highlight in Hexo. Both should show similar result. Triple Backtick ```haskell -- Layout Hook commonLayout = renamed [Replace "common"] $ avoidStruts $ gaps [(U,5), (D,5)] $ spacing 10 $ Tall 1 (5/100) (1/3) ``` Code Block {% codeblock lang:haskell %} -- Layout Hook commonLayout = renamed [Replace "common"] $ avoidStruts $ gaps [(U,5), (D,5)] $ spacing 10 $ Tall 1 (5/100) (1/3) {% endcodeblock %} 2: Stylesheet Issue Code block is not pygment compatible Content: Example Now edit one of your content, and put some code block. Plain Plain without language type should not have any stylesheet issue. {% codeblock %} -- Layout Hook commonLayout = renamed [Replace "common"] $ avoidStruts $ gaps [(U,5), (D,5)] $ spacing 10 $ Tall 1 (5/100) (1/3) {% endcodeblock %} The result in the browser is just fine Hexo Syntax Highlighting: Plain Formatting Adding language type would result in html formatting. {% codeblock lang:haskell %} -- Layout Hook commonLayout = renamed [Replace "common"] $ avoidStruts $ gaps [(U,5), (D,5)] $ spacing 10 $ Tall 1 (5/100) (1/3) {% endcodeblock %} The result in the browser is not what we are expected. Hexo Syntax Highlighting: Formatting The stylesheet is mixed-up with Bulma stylesheet. 3: Reset Class in Figure Element Hexo code block is using figure element, while formatting the syntax highlight. What we need to do is unstyle, the class inside figure element. SASS: Syntax Highlight figure.highlight table span.line .title, .number, .type, .string font-size: unset padding: unset margin: unset height: unset min-width: unset I also style the layout. So long code won’t occupy the whole page. figure.highlight table max-height: 350px You may also add necessary nice color. figure.highlight table span.line .title color: #1976d2 // blue 700 .comment color: #9e9e9e // grey 500 font-style: oblique .number color: #0097a7 // cyan 700 font-weight: 500 .type color: #3f51b5 // indigo 500 text-decoration: underline dotted .string color: #004d40 // teal 900 font-style: italic text-decoration: underline wavy :hover background-color: $yellow box-shadow: 0 0.5rem 1rem rgba(0,0,0,0.15) tbody box-shadow: 0 0.5rem 1rem rgba(0,0,0,0.15) tbody:hover box-shadow: 0 1rem 3rem rgba($black, .175) This is just an example. Of course you can add your own style. Such as adding horizontal scrollbar or else. Render: Browser Now you can see the result in the browser. Hexo Syntax Highlighting: Reset Class in Figure Element What is Next ? Consider continue reading [ Hexo - Meta - SEO ]. There are, some interesting topic about using Meta in Hexo, such as Opengraph and Twitter. Thank you for reading.
ESSENTIALAI-STEM
Aqmal Hakeem Abdul Hamid Muhamad Aqmal Hakeem bin Abdul Hamid (born 14 November 1990) is a Bruneian footballer who plays as a midfielder or forward. He has won two league championships with Indera and previously QAF FC. He also made three appearances for the Brunei national football team in 2009. Club career Aqmal was one of the first students who enrolled for Brunei's Sports School when it first opened in 2003. He first played for AH United after he graduated. Then he joined defending league champions QAF FC for the 2009–10 Brunei Premier League, scoring three times and contributing to QAF's third straight league title. He joined Indera SC in 2011 and stayed there until early 2014, winning the inaugural Brunei Super League in the 2012–13 season. After a four-year hiatus, Aqmal returned to the pitch for Indera at the start of the 2018 Brunei Super League. International career As a member of QAF FC, Aqmal had the opportunity to represent the Brunei national football team at the 2010 AFC Challenge Cup qualification matches held in Sri Lanka in April 2009. He played in all of the three matches against Sri Lanka, Pakistan and Chinese Taipei, losing each time. Three years later, Aqmal was a squad member of the Brunei under-21 side that won the 2012 Hassanal Bolkiah Trophy, appearing once against Timor-Leste. Aqmal represented Brunei at the 27th SEA Games hosted by Myanmar in December the following year. He played in all four group matches in a disappointing campaign for the Young Wasps, finishing with zero points. Team * QAF FC * Brunei Premier League: 2009–10 * Indera SC * Brunei Super League: 2012–13 * Brunei U21 * Hassanal Bolkiah Trophy: 2012 Individual * Pingat Jasa Kiebaktian (PJK).gif Meritorius Service Medal (PJK) (2012)
WIKI
Page:EB1911 - Volume 04.djvu/290 Histoire de St Charles Borromée (Milan, 1884); and A. Cantono, Un grande riformatore del secolo XVI (Florence, 1904); article “Borromäus” in Herzog-Hauck, Realencyklopädie (Leipzig, 1897). BORROMINI, FRANCESCO (1599–1667), Italian architect, was born at Bissone in 1599. He was the chief representative of the style known in architecture as “baroque,” which marked a fearless and often reckless departure from the traditional laws of the Renaissance, and often obtained originality only at the cost of beauty or wisdom. One of the main opponents of this style was (q.v.). Borromini was much employed in the middle of the 17th century at Rome. His principal works are the church of St Agnese in Piazza Navona, the church of La Sapienza in Rome, the church of San Carlino alle Fontane, the church of the Collegio di Propaganda, and the restoration of San Giovanni in Laterano. He died by his own hand at Rome in 1667. Engravings of his chief compositions are to be found in the posthumous work, Francisci Borromini opus Architectonicum (1727). BORROW, GEORGE HENRY (1803–1881), English traveller, linguist and author, was born at East Dereham, Norfolk, on the 5th of July 1803, of a middle-class Cornish family. His father was a recruiting officer, and his mother a Norfolk lady of French extraction. From 1816 to 1818 Borrow attended, with no very great profit, the grammar school at Norwich. After leaving school he was articled to a firm of Norwich solicitors, where he neglected the law, but gave a great deal of desultory attention to languages. He was encouraged in these studies by William Taylor, the friend of Southey. On the death of his father, in 1824 he went to London to seek his fortune as a literary adventurer. In 1826 he published a volume of Romantic Ballads translated from the Danish. Engaged by Sir Richard Phillips, the publisher, as a hack-writer at starvation wages, his experiences in London were bitter indeed. His struggles at last became so dire that if he would escape Chatterton’s doom, he must leave London and either return to Norwich and share his mother’s narrow income, or turn to account in some way the magnificent physical strength with which nature had endowed him. Determining on the latter of these courses, he left London on tramp. As he stood considerably more than 6 ft. in height, was a fairly trained athlete, and had a countenance of extraordinary impressiveness, if not of commanding beauty—Greek in type with a dash of the Hebrew—we may assume that there had never before appeared on the English high-roads so majestic-looking a tramp as he who, on an afternoon in May, left his squalid lodging with bundle and stick to begin life on the roads. Shaping his course to the south-west, he soon found himself on Salisbury Plain. And then his extraordinary adventures began. After a while he became a travelling hedge-smith, and it was while pursuing this avocation that he made the acquaintance of the splendid road-girl, born at Long Melford workhouse, whom he has immortalized under the name of Isopel Berners. He was now brought much into contact with the gipsies, and this fact gave him the most important subject-matter for his writings. For picturesque as is Borrow’s style, it is this subject-matter of his, the Romany world of Great Britain, which—if his pictures of that world are true—will keep his writings alive. Now that the better class of gipsies are migrating so rapidly to America that scarcely any are left in England, Borrow’s pictures of them are challenged as being too idealistic. It is unfortunate that no one who knew Borrow, and the gryengroes or horse-dealers with whom he associated, and whom he depicted, has ever written about him and them. Full of “documents” as is Dr Knapp’s painstaking biography, it cannot be said to give a vital picture of Borrow and his surroundings during this most interesting period of his life. It is this same peculiar class of gipsies (the gryengroes) with whom the present writer was brought into contact, and he can only refer, in justification of Borrow’s descriptions of them, to certain publications of his own, where the whole question is discussed at length, and where he has set out to prove that Borrow’s pictures of the section of the English gipsies he knew are not idealized. But there is one great blemish in all Borrow’s dramatic scenes of gipsy life, wheresoever they may be laid. This was pointed out by the gentleman who “read” Zincali for Mr Murray, the publisher:— “The dialogues are amongst the best parts of the book; but in several of them the tone of the speakers, of those especially who are in humble life, is too correct and elevated, and therefore out of character. This takes away from their effect. I think it would be very advisable that Mr Borrow should go over them with reference to this point, simplifying a few of the terms of expression and introducing a few contractions—don’ts, can’ts, &c. This would improve them greatly.” It is the same with his pictures of the English gipsies. The reader has only to compare the dialogues between gipsies given in that photographic study of Romany life, In Gipsy Tents, by F. H. Groome, with the dialogues in Lavengro and The Romany Rye, to see how the illusion in Borrow’s narrative is disturbed by the uncolloquial locutions of the speakers. It is true, no doubt, that all Romanies, especially perhaps the English and Hungarian, have a passion for the use of high-sounding words, and the present writer has shown this in his remarks upon the Czigany Czindol, who is said to have taught the Czigany language to the archduke Joseph, often called the “Gipsy Archduke.” But after all allowance is made for this racial peculiarity, Borrow’s presentation of it considerably weakens our belief in Mr and Mrs Petulengro, Ursula, and the rest, to find them using complex sentences and bookish words which, even among English people, are rarely heard in conversation. As to the deep impression that Borrow made upon his gipsy friends, that is partly explained by the singular nobility of his appearance, for the gipsies of all countries are extremely sensitive upon matters of this kind. The silvery whiteness of the thick crop of hair which Borrow retained to the last seemed to add in a remarkable way to the nobility of his hairless face, but also it gave to the face a kind of strange look “not a bit like a Gorgio’s,” to use the words of one of his gipsy friends. Moreover, the shy, defiant, stand-off way which Borrow assumed in the company of his social equals left him entirely when he was with the gipsies. The result of this was that these wanderers knew him better than did his own countrymen. Seven years after the events recorded in Lavengro and The Romany Rye Borrow obtained the post of agent to the Bible Society, in which capacity he visited St Petersburg (1833–1835) (where he published Targum, a collection of translations), and Spain, Portugal and Morocco (1835–1839). From 1837 to 1839 he acted as correspondent to the Morning Herald. The result of these travels and adventures was the publication, in 1841, of Zincali, or The Gypsies in Spain, the original MS. of which, in the hands of the present writer, shows how careful was Borrow’s method of work. In 1843 appeared The Bible in Spain, when suddenly Borrow became famous. Every page of the book glows with freshness, picturesqueness and vivacity. In 1840 he married Mary Clarke, the widow of a naval officer, and permanently settled at Oulton Broad, near Lowestoft, with her and her daughter. Here he began to write again. Very likely Borrow would never have told the world about his vagabond life in England as a hedge-smith had not The Bible in Spain made him famous as a wanderer. Lavengro appeared in 1851 with a success which, compared with that of The Bible in Spain, was only partial. He was much chagrined at this, and although Lavengro broke off in the midst of a scene in the Dingle, and only broke off there because the three volumes would hold no more, it was not until 1857 that he published the sequel, The Romany Rye. In 1844 he travelled in south-eastern Europe, and in 1854 he made a tour with his step-daughter in Wales. This tour he described in Wild Wales, published in 1862. In 1874 he brought out a volume of ill-digested material upon the Romany tongue, Romano Lavo-lil, or Word-book of the Gypsy Language, a book which has been exhaustively analysed and criticized by Mr John Sampson. In the summer of 1874 he left London, bade adieu to Mr Murray and a few friends, and returned to Oulton. On the 26th of July 1881 he was found dead in his house at Oulton, in his seventy-ninth year. Borrow was indisputably a linguist of wide knowledge, though he was not a scholar in the strict sense. The variety of his
WIKI
Cecil Masey Cecil Aubrey Masey (28 December 1880 – 7 April 1960) was an English theatre and cinema architect, born on 28 December 1880 in Lambeth, London. Masey was a pupil of Bertie Crewe—with whom he worked on the Empire music hall in Edmonton of 1908—and from 1909, he went into partnership with architect Roy Young. Some of Masey's earliest designs include the Grade II listed New Wimbledon Theatre, built in 1919 together with Roy Young on the Broadway in Wimbledon, London, and the Electric Theatre in Bournemouth, built in 1919 for Alexander Bernstein. In 1920 Masey also designed the Empire Cinema in Willesden for Bernstein. The Grade II listed Phoenix Theatre was designed together with Giles Gilbert Scott and Bertie Crewe, and opened in 1930. It is a West End theatre in the London Borough of Camden, located on Charing Cross Road, at the corner with Flitcroft Street, and with the entrance on Phoenix Street. Other buildings he was involved with include the Grade I listed Granada Cinema with four Corinthian style pillars over the entrance, located in Tooting, an area in the London Borough of Wandsworth, London, which opened in 1931 - one of the great, luxurious cinemas built in the 1930s; the 1932 Grade II listed cinema in Northfields Avenue, West Ealing, later used as a club and since converted into a church and the now-demolished Rex Cinema, 1936, in Station Approach, Hayes in the London Borough of Hillingdon, West London. He also designed the Grade II* listed Granada Cinema, Woolwich (with Reginald Uren and Theodore Komisarjevsky) and the Granada Theatre, Clapham Junction (with H. R. Horner and Leslie Norton), both built in 1937. Masey died on 7 April 1960. His address was 29 Woodcote Avenue, Wallington, Surrey.
WIKI
A time-dependent cylindrically symmetric computer model of the Hofsjökull ice cap, Central Iceland, has been defined in order to investigate the time-scale of possible glacier variations. The model is forced with a set of hypothetical mass balance scenarios, chosen to span the range of plausible mass balance variations of Hofsjökull caused by greenhouse warming. For each mass balance scenario the model computes the change in the volume of the ice cap and the associated time-dependent runoff variations. The response time of the ice cap is found to be of the order of 50-100 years,˜when mass balance - elevation feedback is taken into account. The response time increases with the size of the climatic perturbation. The model indicates that increased runoff from the area now covered by Hofsjökull, caused by a possible greenhouse warming, will be significant for 100-200 years after the climate starts to change. A mass balance scenario produced by raising the equilibrium line by 200 m (corresponding roughly to a warming of 1-1.5°C) over a 50-year period leads to a maximum runoff increase of about 40 m3s−1 occurring 50 years after the equilibrium line starts to rise. This amounts to approximately 50 % of the total precipitation that falls on Hofsjökull at present and approximately 25 % of the present discharge of rivers that issue from Hofsjökull and the neighbouring area.
ESSENTIALAI-STEM
User:Dave.Dunford My Gallery Useful links and bits * Stub sorting * List of stub categories * Template:Infobox_UK_place * A-Z list of Stubs * Category:United Kingdom articles missing geocoordinate data * Edit summary: Stub-sorting. You can help! (Stub-sorting) * VfD process * Vandalism warning templates * Article * [[Image:SettValleyTrail.jpg|thumb|right|250 px|The Sett Valley Trail near Birch Vale]] * Reverted edits by <IP_ADDRESS> (talk) to last version by Username * ISO 3166-2:GB * Crag Hall – example use of * Woodbank, Stockport – example use of embedded * [[Image:SettValleyTrail.jpg|thumb|right|250 px|The Sett Valley Trail near Birch Vale]] * Reverted edits by <IP_ADDRESS> (talk) to last version by Username * ISO 3166-2:GB * Crag Hall – example use of * Woodbank, Stockport – example use of embedded * Reverted edits by <IP_ADDRESS> (talk) to last version by Username * ISO 3166-2:GB * Crag Hall – example use of * Woodbank, Stockport – example use of embedded * Crag Hall – example use of * Woodbank, Stockport – example use of embedded * Crag Hall – example use of * Woodbank, Stockport – example use of embedded
WIKI
Talk:affect affect * # A strong emotional experience. See usage notes below. The dictionaries I use (MW3rdIntl & APA Dictionary of Psychology (2006)) don't report this meaning of "strong" experience. Where is it used this way? * 1) A strong emotional experience. * You might search Victorian-age literature for examples on Wikisource. It sounds like a Victorian usage to me. --EncycloPetey 03:30, 4 October 2007 (UTC) * Victorian, psychology, and colloquial seem to make an empty set. I thought she was dead by the time psychological words became colloguial. DCDuring 16:50, 6 October 2007 (UTC) Section title changed from “Affect noun 3rd sense” to “ affect ” to repair the RfV tag link. † Raifʻhār Doremítzwr 08:25, 4 October 2007 (UTC) Arranged by etymology? Why is this arranged by etymology? Surely it would make more sense to arrange it by meaning? --<IP_ADDRESS> 01:41, 22 October 2009 (UTC) * Arranging the senses chronologically by etymology not only conveys the term's history, but also gives us an objective method of ordering senses (and as a global, descriptive and highly current dictionary, objective methods are essential). When you say "arrange it by meaning", whose preferred meaning would come first? (And why?)--Tyranny Sue 02:45, 23 October 2009 (UTC) Simpler example? Take this or leave it: but wouldn't the affect/effect point be much easier to follow with a simpler example? Instead of: * ''new governing coalitions during these realigning periods have effected major changes in governmental institutions ...maybe some thing more like: * ''the new policies have effected major changes in government. ...which would (if I understand it correctly???) enable the same point to be made. <IP_ADDRESS> 15:04, 22 March 2010 (UTC) * Agreed. The original sentence had way too much cruft. Since noone has commented in four years, I've gone ahead and made the change. --<IP_ADDRESS> 04:17, 3 March 2014 (UTC) Why three etymologies? I don't understand the difference between the Etymology 1 section and the Etymology 2 section. Their meanings seem to overlap, the pronunciations are identical, and the etymologies themselves are more or less the same. Why are they listed as distinct? Should they be merged? --<IP_ADDRESS> 04:10, 3 March 2014 (UTC) * The difference is subtle, but it's definitely real. There are some senses that are hard to place with one or the other, but the core of Etymology 1 has to do with having an effect on something (or in the archaic senses, the other way around), while the core or Etymology 2 is trying to be or pretending to be something. There were also some senses that seem to have ended up under Etymology 1 by mistake, which I moved. * As for the etymologies, they may start from the same Latin verb, but they get to English by different routes: Etymology 1 went by way of the past participle of the original verb, which became a noun, which was then used to form a verb. Etymology 2 went by way of a frequentative verb derived from the original verb, which stayed a verb all the way into English. Etymology 1 and Etymology 3 are actually closer to each other than either is to Etymology 2, because they both include the past participle as a noun, though Etymology 1 made a verb out of it on its way through Middle French and Middle English, while Etymology 3 borrowed it directly into Middle English from Latin itself. Chuck Entz (talk) 06:10, 3 March 2014 (UTC) Missing obsolete noun sense? Equinox ◑ 02:17, 24 February 2015 (UTC) * Tobias Whitaker, The Blood of the Grape * whether or not wine may be granted, in such doloriferous affects in the joints * I agree this is a usage not well documented here. I also wonder about the use of "affect" to describe the emotional content of a word or the displaying of emotions by a person, usually in the negative, "The patient displayed no affect." Since this meaning in my dialect has a different pronunciation / ˈɑː.fɛkt / should they be separated some how ?Bcent1234 (talk) 14:50, 13 September 2016 (UTC)
WIKI
One of my biggest pet peeves with Google Webmaster Tools is its lack of a complete API to programatically submit updated URLS for indexing. At the moment, Google’s Indexing API only allows submission of pages with specific kinds of structured data – JobPosting or BroadcastEvent embedded in a VideoObject. Hopefully Google will open up the Indexing API for all pages in the future, but I’m not holding my breath. After some digging around, I disovered that Bing Webmaster Tools has a complete API that allows for up to 10,000 URL submissions per day. Instead of going to bed, I decided to stay up a little later to develop a script that checks my GitHub repo for content changes in the most recent commit, and submits any changed URLs to Bing. Hopefully I can use this script for Google Webmaster Tools in the future as well if Google ever opens up the Indexing API. For this script, I used Python 3. Let’s go through the dependecies. The script uses base64, json, re, requests. I believe the only non-standard library is requests, so be sure you have that installed. import base64 import json import re import requests Next, I specified some information and credentials for GitHub. Since my Hugo repository is private, I needed to access it with a personal access token. After the credentials have been specified, gh_session creates a session and gh_session.auth authorizes the session with the provide username and token. # GitHub Info gh_username = "username" gh_token = "token" gh_repos_url = f"https://api.github.com/repos/username/repo/commits/master?access_token={gh_token}" gh_session = requests.Session() gh_session.auth = (gh_username, gh_token) Next, commit gets the data for the latest commit. At this point, submission_url_list initializes a Python list with “https://brianli.com”. While this isn’t 100% necessary, I thought it wouldn’t hurt to re-submit my homepage in case the latest commit contained a new post. # Get latest commit info. commit = json.loads(gh_session.get(gh_repos_url).text) # Initialize list of URLs to submit to Bing. submission_url_list = ["https://brianli.com"] The code block below loops through all the changed files in the latest commit, and grabs the filename. After that, I wrote a check to make sure the rest of the code only affects file in the content folder. To do this, I just wrote an if statement that checks if the first seven characters of the file path is “content” – if changed_file[0:7] == "content":. I also added a second check to filter out draft posts. Finally, I used regex to find the post slug to build the submission URL - re.findall(r"slug:\s?(\S+)". The last if statement checks whether a URL returns a 200 status code. If it does, it is appended to submission_url_list. # Check latest commit, find changed files, check files for slug, build URL, append to URL list. for x in range(len(commit["files"])): changed_file = commit["files"][x]["filename"] #print(changed_file) #print(changed_file[0:7]) if changed_file[0:7] == "content": #Only match files in the content folder. r = requests.get(f"https://api.github.com/repos/username/repo/contents/{changed_file}?access_token={gh_token}") json_string = json.loads(r.text) file_content = base64.b64decode(json_string["content"]).decode("utf-8") if "draft:true" in file_content or "draft: true" in file_content: #Ignore drafts because they are not published. pass else: file_content_slug = re.findall(r"slug:\s?(\S+)", file_content)[0] submission_url = f"https://brianli.com/{file_content_slug}/" r = requests.get(submission_url) if r.status_code == 200: #Check URL is valid (200 response code) before appending to list. submission_url_list.append(submission_url) In this last section, I specified some credentials for Bing Webmaster Tools’ API. If you want to submit URLs programatically, you’ll need to create an API key in your dashboard. Finally, I built a POST request containing the list of URLS for submission. After executing, the script returns “Submission to Bing was successful” if the request returns a 200 status code. # Bing Info bing_submission_url = "https://ssl.bing.com/webmaster/api.svc/json/SubmitUrlbatch?apikey=" bing_api_key = "apikey" bing_submission_urls = { "siteUrl":"https://brianli.com", "urlList":submission_url_list } #Create URL list to submit to Bing. headers = { "Content-Type": "application/json; charset=utf-8" } #Bing response headers. # Make request to Bing. submission_request = requests.post(f"{bing_submission_url}{bing_api_key}", headers=headers, json=bing_submission_urls) if submission_request.status_code == 200: print("Submission to Bing was successful.") else: print("Submission was not successful. Please try again.") Check the GIF below to see the script in action. After the script runs, you can see the submission URL counter in Bing’s dashboard increase from 23 to 26. A Python script to submit URLs to Bing. Now that the script is complete, I’m thinking about the best way to deploy it. There are a few options that come to mind. 1. Run the script manually after each site build. 2. Set up a cron to run the script every few hours. 3. Deploy the script to Google Cloud Functions and instruct Netlify (my web host) to ping the trigger URL after each site build. Yeah, I’ll probably go with the third option because it sounds the coolest.
ESSENTIALAI-STEM
How to Replace Bruno Stairlift Batteries Hunker may earn compensation through affiliate links in this story. Bruno stairlifts can be plugged into a power source, such as an electrical outlet. They can also operate on battery power. Once you disconnect a stairlift from power, the battery lasts approximately 28 to 36 hours, which is about eight to 15 trips riding the stairlift up and then down the stairs. Charge the battery again when the power is nearing its end. Your battery may stop holding a charge at some point and you will need to replace it. Step 1 Purchase the batteries required by your Bruno stairlift, which are two rechargeable 12-volt batteries. Step 2 Examine the battery charger to determine where you need to put the new batteries. The charger stays plugged into the same electrical outlet where your stairlift is plugged. Step 3 Remove the old batteries from the charger. They should pop out when you pull on one end, as with any other charger. Step 4 Place the new batteries where you removed the old ones. Pay close attention to the "+" and "-" signs, which indicate how to replace the batteries. The top of the battery will have a plus sign which corresponds to the "+" on the inside of your battery charger. references J. Johnson J. Johnson has been completing freelance writing work since September 2009. Her work includes writing website content and small client projects. Johnson holds a degree in English from North Carolina State University.
ESSENTIALAI-STEM