Document
stringlengths
87
1.67M
Source
stringclasses
5 values
  Ships & Wrecks Boat Building and Boat Propulsion Development Sinking and floating activity. Testing materials that float and sink. Resources A variety of materials including malleable ones e.g. plasticine or clay. Questions The next stage of boat development. How would these boats have been powered? Boat making Question How would boats have developed on from log boats? Remember that the materials used would have depended on the resources available to people in any particular area. Reed Boats and Coracles Questions Resources; Reeds/long straw or ‘Art straws’ and string. Questions Resources; Flexible willow, withy sticks, binding materials, plastic sheeting or oil cloth and waterproof glue. Further Question Rowing a boat is hard work. Sail Making. Objective To design and make effective sails that will best harness the power of the wind. Input Discuss how, boats travel through water and what makes them travel through water. Emphasise how rowing needs to use the energy provided by the rower and gather suggestions as to how we can use natural energy resources to assist the ‘sailor’. Activity Once the idea of wind power has been introduced, tell children that they will be designing and making sails and test their efficiency. Explain that children will need to think about size and shape of their sails. Think about: Question Is it possible to improve on sail design by changing size and/or shape?   Extension Question Does the position of the mast affect the boat’s efficiency? Will additional sails change the way the boat behaves? (Possibly test boat efficiency by timing their progress over a given distance.) Resources Parachute, boat models with masts, paper or fabric, pool, wind machine (flap a large piece of hardboard/thin MDF) and a stop watch. Vocabulary Energy Force Propulsion Wind Efficient Efficiency Sail Mast. Activity- Wind up Boats and Paddle Boats Using elastic bands to store energy and propel a model boat. Show elastic band aeroplane model. Question How can we adapt this to a model boat? To Make A Model Paddle Boat You Will Need… Balsa wood. Approximately 30cm x 45cm Balsa wood Hacksaw Small hack saw Stapler Stapler Elastic band Strong elastic band Diagram showing shapes required Activity – Motor Boats Use motors to drive a propeller Construct boat hulls from Lego, for example, and fix on a motor. Resources Construction kits, Lego, motors, propellers Activity – Jet propulsion Look at balloons when released and question how this may be adapted to a boat. Use bent straws to redirect the released air from the well of a model boat to the water. Resources Toy boats, balloons, plastic straws
ESSENTIALAI-STEM
User:Arkaroy2013 Arka Roy(born on 25 December 1990) is a Bengali film actor.[1][2] He made his acting debut in the film 'Ami Achhi Sei Jey Tomar ' released in 2010. He is one of the newest and one of the most talented actors in Tollywood. Biography Arka was born in Naihati, the birth place of the great Indian freedom fighter Rishi Bamkin Chandra Chatterjee, a small town about 40 km away from Kolkata, to Partha Roy and Rani Roy. He is the only son to his parents. His nickname is Ranti. He was brought up in Naihati. He attended St. Luke's Day School, and Rishi Bamkin Chardra College,both of them in Naihati. He had a diploma in acting from Pratibha Art Acadamy. He was very fond of cricket and has also played the CAB U-14 league. He is also a great swimmer.
WIKI
US Stocks End Mixed On Wednesday US Stocks End Mixed On WednesdayUnited States Stock MarketWall Street closed mostly in the green on Wednesday, as gains in technology stocks compensated for losses in energy shares caused by a more than 4 percent decline in crude oil prices after the latest data showed that OPEC's exports rose for the second consecutive month in June. The Dow Jones edged down 1 point to stay practically flattish at 21478. Contrastingly, the S&P 500 gained 4 points or 0.2 percent to 2433. The Nasdaq jumped 41 points or 0.7 percent to 6151. 2017-07-05T20:08:36.04
NEWS-MULTISOURCE
Page:Army Act, 1950 on Gazette of India.pdf/44 192(42) :(b) the amount and incidence of fines to be imposed under section 89; * (c) the specification of the punishments which may be awarded as field punishments under sections 75 and 80; * (d) the assembly and procedure of courts of inquiry, the recording of summaries of evidence and the administration of oaths or affirmations by such courts; * (e) the convening and constituting of courts-martial and the appointment of prosecutors at trials by courts-martial ; * (f) the adjournment, dissolution and sitting of courts-martial; * (g) the procedure to be observed in trials by courts-martial and the appearance of legal practitioners thereat; * (h) the confirmation, revision and annulment of, and petitions against, the findings and sentences of courts-martial; * (i) the carrying into effect of sentences of courts-martial; * (j) the forms of orders to be made under the provisions of this Act relating to courts-martial, transportation and imprisonment; * (k) the constitution of authorities to decide for what persons, to what amounts and in what manner, provision should be made for dependants under section 99, and the due carrying out of such decisions; * (l) the relative rank of the officers, junior commissioned officers, warrant officers, petty officers and non-commissioned officers of the regular Army, Navy and Air Force when acting together; * (m) any other matter directed by this Act to be prescribed. 192. Power to make regulations.—The Central Government may make regulations for all or any of tho purposes of this Act other than those specified in section 191. 193. Publication of rules and regulations In Gazette.—All rules and regulations made under this Act shall be published in the Official Gazette and, on such Publication, shall have effect as if enacted in this Act. 194. Repeals.—The Acts and Ordinances mentioned in tho Schedule are hereby repealed, CHAPTER XVI TRANSITORY PROVISIONS 195. Definition of "British officer".—(1) In this Chapter "British officer" a person of non-Indian domicile holding a commission in His Majesty's Land Forces or in tho Royal Marines or in the Territorial Army and serving in the regular Army. (2) The expression "superior officer" in this Act shall be deemed to include British officer. 196. Powers of British officer.—A British officer shall have all the powers conferred by this Act on an officer of corresponding rank or holding a corresponding appointment.
WIKI
Wikipedia:Graphics Lab/Illustration workshop/Archive/Nov 2019 Request Logo * Article(s): * Computer Service Directorate * Request: * In the Hebrew version there is a logo with background made from 0 and 1 repeating. Is there any way vectorizing this? -- רונאלדיניו המלך (talk) 12:17, 2 November 2019 (UTC) * Discussion: jpg to svg FOX 52 (talk) 04:19, 3 December 2019 (UTC) * Article(s): * Rohy * Request: * , please make svg of COA starting from svg of flag. -- <IP_ADDRESS> (talk) 10:23, 6 November 2019 (UTC) * Discussion: * something like File:Rohy znak.svg?  — Johannes Kalliauer - contrib. 18:52, 3 December 2019 (UTC) Apollo 13 timeline.svg FOX 52 (talk) 04:18, 3 December 2019 (UTC) * Article(s): * Apollo 13 * Request: * Details of your request go here… The figures next to the words "Fourth midcourse correction" should read "137:39:52". It looks like the the minute and second figures were copied from the figure immediately on the left. The figures I've given in quotes are stated in the Apollo 13 mission report, p. 3-2 and confirmed here. Can someone alter this?-- Wehwalt (talk) 14:57, 1 December 2019 (UTC) * Discussion: * ✅  — Johannes Kalliauer - contrib. 15:46, 1 December 2019 (UTC) * Many thanks.--Wehwalt (talk) 20:19, 1 December 2019 (UTC) Esmeralda Santiago FOX 52 (talk) 15:16, 5 December 2019 (UTC) Please remove the background color on this signature. Please just leave the signature of the author. Thank you, once again! * ✅ FOX 52 (talk) 06:10, 5 December 2019 (UTC)
WIKI
Wikipedia:Articles for deletion/Bauer Central Lancashire The result was Merge and redirect. Spinning Spark 19:52, 6 November 2012 (UTC) Bauer Central Lancashire * – ( View AfD View log Stats ) As per WP:NOTDIR and related AfD decisions, this is a channel guide for a private company, NOT a list of channels for reference. This is a list which can be accessed by subscribers, so is not WP:USEFUL. Connected nominations to be added in time. doktorb wordsdeeds 04:24, 30 October 2012 (UTC) I am also nominating the following related pages because [insert reason here]: Morwen - Talk 14:04, 30 October 2012 (UTC) * Merge and Redirect all to Bauer Radio per WP:NOTDIR. Merge any reliably sourced information and then redirect. -- Uzma Gamal (talk) 12:10, 30 October 2012 (UTC) * NOTDIR directs us to delete, not merge. It would be appropriate to have a single paragraph article saying "Bauer Radio is such and such", but it must avoid being a list of channels doktorb wordsdeeds 13:27, 30 October 2012 (UTC) * These are not quite simple directory articles - the articles do also contain historical information about the DAB licensing process, changes of ownership, and previous channels on the multiplexes. Perhaps the DAB licensing information should just be on one page for all the local ensembles, since there seems to be little local distinctiveness in the processes, just different dates... Also, note that the name "Bauer Central Lancashire" is not a customer-facing one, and I'm not sure that it's possible to tell what channel is on one plex on a radio, so it's not like it's an unnecessary duplication of publicity information. * Note: This debate has been included in the list of Business-related deletion discussions. — Frankie (talk) 20:25, 31 October 2012 (UTC) * Note: This debate has been included in the list of Radio-related deletion discussions. — Frankie (talk) 20:25, 31 October 2012 (UTC) * Note: This debate has been included in the list of United Kingdom-related deletion discussions. — Frankie (talk) 20:25, 31 October 2012 (UTC) * Merge all -- If the radio channels are operating separately under separate local brands, they could each have an article, but I cannot belkeive that we need one on each transmitting station in a network. Peterkingiron (talk) 20:38, 3 November 2012 (UTC) * This article is about neither "radio channels", the brands they operate under, or "transmitting stations in a network". Morwen (Talk) 11:38, 6 November 2012 (UTC)
WIKI
Talk:2009–10 South-West Indian Ocean cyclone season/October * 94S.INVEST - * Best status from NRL: 15kts 1010 MB * 94S.INVEST first appeared 2009-10-12, 1130z @ 7.5ºS 67.9ºE * Dissipated from NRL 2009-10-15, 1800z @ 9.0ºS 62.0ºE * 95S.INVEST - * Best status from NRL: 15kts 1010 MB * 95S.INVEST first appeared 2009-10-17, 1130z @ 10.8ºS 76.7ºE * 98S.INVEST - * Best status from NRL: 15kts 1010 MB * 98S.INVEST first appeared 2009-10-27, 0930z @ 3.6ºS 63.0ºE * POOR from ABIO10 2009-10-27, 1800z @ 3.6ºS 63.0ºE * Dissipated from ABIO10 2009-10-28, 1800z
WIKI
THE BEST KEPT SECRET FOR CHILDREN'S MENTAL HEALTH... THAT WORKS! Self-regulation resources and training to support children’s mental health What is the theory behind Relax Kids?  Find out all about the theory behind the 7 steps!  Relax Kids uses a unique method to take children from high energy and stress levels to a state of relaxation that has been shown to have a positive impact on children’s mental and emotional health and wellbeing. The process involves movement exercises, social games, stretching, peer or self massage, breathing exercises, affirmations and relaxations including visualisations, mindful and autogenic exercises, all elements of which are evidence-based and play an important part in self-regulation. Sessions are fun, interactive and inclusive and enable the child to engage and to fully experience the change for themselves. Seven-step holistic has been shown to have a positive affect on children’s mental and emotional health and wellbeing. The Relax Kids 7 steps are laid out in a certain order to work with children’s natural energy systems. The movement and games stimulate the sympathetic nervous system, stretching exercises encourages their muscles to stretch and stimulates the sympathetic and parasympathetic nervous systems. Massage helps release oxytocin and happy chemicals such as serotonin and dopamine and breathing exercises stimulate the vagus nerve and lowers the stress responses. Positive affirmations further encourages the release of endorphins as children think and speak positively and finally the relaxation and visualisation exercises, at the end, allow children to calm their inner alarm system and get into a state of deep relaxation. Our first two stages harness kids natural energy. Exercise and physical activity cause the hypothalamus to release endorphins, which are our bodies form of natural pain relief and pleasure chemicals. Exercise is often used as a treatment for depression and anxiety. Exercise has also been proven to have a positive effect on the concentration levels of children with ADHD and other attention span disorders, and promotes generally better concentration levels throughout the rest of the Relax Kids session. Muscle stretches have many of the same positive effects as higher intensity exercise. Relax Kids stretches are adapted to be effective and non-strenuous for children. Recent trials have found that Yoga stretches have a generally positive effect on treating depressive, and can also be used effectively to target symptoms of PTSD. It is also a calming warm-down activity that transitions into the following stage. The feel stage of the Relax Kids process involves consensual and clothed self or peer massage. This is an entirely optional stage that can be omitted for children with sensory issues. Massage and positive touch stimulates the long Vagus nerve. This nerve is responsible for the lowering of the heart rate and blood pressure and the production of oxytocin, a chemical produced during positive social experiences, which includes positive touch. Studies have shown people artificially dosed with oxytocin had lower stress levels and higher pleasure chemical levels. Oxytocin also promotes peer bonding, which is important for creating a safe social space within Relax Kids classes. Deep and controlled breathing promotes full oxygen exchange, which slows the heart rate and decreases blood pressure. Both of these act as a sedative for the body and mind. Deep and slow breathing can be used as an effective way to manage anxiety disorders. The believe section of a Relax Kids class focuses on simple self-affirmations such as I am special or I am a calm star. These positive statements affirm perceived good personal qualities, improving self-esteem. Studies have demonstrated that positive affirmations can have a dramatic effect on achievements. A group of stressed pupils performed badly in a problem-solving exercise. However, after doing the same activity following a brief self-affirmation exercise, the participants performed at normal levels. The relax stage consists of being led through a guided meditation either by one of our Coaches or by pre-recorded CD/MP3 tracks provided by Relax Kids. These tracks use a combination of mindfulness exercises, and progressive muscle relaxation too mentally and physically relax participants. Studies have shown that mindfulness can be effective in combating anxiety disorders in both adults and children, alleviating symptoms of depression, and reducing stress. A 2015 review of mindfulness research suggests that it has a generally positive effect on a wide variety of disorders. To find out more about our training DOWNLOAD YOUR INFORMATION PACK HERE – https://relaxkids.com/info-packs/
ESSENTIALAI-STEM
Linsy's 2-ng blog Writing a UNIX Shell in Rust Last update: Reading time: 7 minutes System calls System calls are APIs provided by the operating system. They are created so that applications can access system resources and use convenient features (like creating processes, do file I/O). Linux has about 380 system calls. Windows has more (about 2000). Doing system calls is a way to enter the kernel mode and do privileged operations for applications. The standard C library provides a portion of system call interface for Unix. For example, you can directly use fork function to do the fork system call, use printf to print characters to stdout (which uses the write system call under the hood). Process Process is an abstraction of the running program on the OS. Normally only one process can run on one CPU core, wither in user mode and kernel mode. Unix models process as some task_struct struct. OS will switch processes (context switch) faster than every 100 ms (varies on different OS). Process state A simple state diagram has five states. Process Control Block (PCB) To switch and restore processes, we need to represent a process internally in OS. It usually includes process state, pid, program counter, registers, memory info (base and limit registers, page tables, etc.), a list of open files, and other info OS needs. In Linux, it is task_struct. The Linux kernel maintains a doubly linked list and a pointer to the PCB of current running process. Scheduling queues There is a ready queue and several wait queues. When a process needs an I/O request, it will be put into an I/O wait queue and when the I/O resource is ready, OS will put the process again to the ready queue. Similarly there is a “child termination wait queue” (which we need for implementing shell). Process creation Unix stores processes as a tree structure. Every process has a unique id (pid) and it may have child processes. When a process create its child process via fork, data on the heap and stack will be “copied” (COW) and the open files will be inherited (duplicated). You may think fork as entering a new parallel universe. There are some system calls provided by Unix OS that can control processes. Interprocess Communication (IPC) Shared memory On Unix, we can use shm_open to create shared-memory object. Message passing This feature is provided by the OS and all the messages are stored in the kernel. In Rust, there is a similar model for thread communication: the mpsc library. Pipes There are two kinds of pipes in Unix: unnamed pipes and named pipes. Differences: answer. File descriptors A unique identifier (per process) that an operating system assigns to a file when it is opened On Unix 0 is the stdin, 1 is stdout and 2 is stderr. You can see them in /proc/<pid>/fd. Different processes may have different file descriptors pointing to the same opened file. Unnamed pipes Rule: read end will be blocked if there exists any write end. Think It makes sense to close the write end in the parent process because the read end cannot tell whether there is still input coming. But why is it necessary to close the read end in the child process? (It will not block any process) p1 | p2 p1 | p2 | p3 Named pipes Use mkfifo to create named pipes. You need to provide the file path. Warning Named pipes in Unix OS are not bi-directional. UNIX syscalls we need (The syscall name may not be exactly the same as below) What is a shell? Try bash, zsh, or fish. Our Unix shell features Download the exercise zip. Tasks: “Frontend” - Lexer and Parser We first need to parse the user input. A hand-written lexer and parser is provided. Final product The source code of the project is on my github repo.
ESSENTIALAI-STEM
304th Expeditionary Airlift Squadron The 304th Expeditionary Airlift Squadron is a provisional United States Air Force unit. It is assigned to the 13th Air Expeditionary Group, based at Hickam Air Force Base, Hawaii. Mission The 304th operates the Boeing C-17 Globemaster III airlifter in support of Joint Task Force-Support Forces Antarctica (JTF-SFA). The squadron provides the bulk of the air resupply between New Zealand and Antarctica. It also provides intercontinental transport of personnel and cargo to and from the United States. The squadron consists of aircraft and personnel deployed to New Zealand from the 62d and 446th Airlift Wing at Joint Base Lewis-McChord, Washington. World War II The squadron was first activated as the 304th Troop Carrier Squadron in September 1943 under I Troop Carrier Command and equipped with Douglas C-47 Skytrains. It trained in various parts of the eastern United States until early 1944. The squadron deployed to England and became part of IX Troop Carrier Command. The unit prepared for the invasion of Nazi-occupied Europe. It began operations by dropping paratroops of the 101st Airborne Division in Normandy on D-Day on 6 June 1944 and releasing gliders with reinforcements on the following day. The unit received a Distinguished Unit Citation and a French citation for these missions. After the Normandy invasion the squadron ferried supplies in the United Kingdom. After moving to France in September, the unit dropped paratroops of the 82nd Airborne Division near Nijmegen and towed gliders carrying reinforcements during Operation Market Garden. the airborne attack on the Netherlands. In December, it participated in the Battle of the Bulge by releasing gliders with supplies for the 101st Airborne Division near Bastogne. When the Allies made the air assault across the Rhine River in March 1945, each aircraft of the squadron towed two gliders with troops of the 17th Airborne Division and released them near Wesel. The squadron also hauled food, clothing, medicine, gasoline, ordnance equipment, and other supplies to the front lines and evacuated patients to rear zone hospitals. It converted from C-47s to Curtiss C-46 Commandos and used the new aircraft to transport displaced persons from Germany to France and Belgium after V-E Day. It was inactivated in Germany in September 1946. Reserve and mobilization for the Korean War Postwar the squadron was activated in the air force reserve in 1949 at Fairfax Field, Kansas, operating Curtiss C-46 Commandos. It was called to active duty and activated during the Korean War in 1951. Its aircraft and personnel were used as fillers for active duty units, and the squadron was inactivated. Reactivation in the reserve The unit reformed in the reserve in 1952, moving to Richards-Gebaur Air Force Base near Kansas City in 1955. Conducted routine reserve training operating Douglas C-124 Globemaster IIs flying worldwide transport missions beginning in 1961. The squadron was called to active duty due to the Berlin Crisis of 1961, but returned to reserve service in the late summer of 1962. The squadron converted to the Lockheed C-130 Hercules aircraft on 27 October 1971. It routinely flew airlift support missions to the Pacific region and Southeast Asia from 1964 until 1972. It was inactivated on 30 June 1974 when personnel and equipment was merged into the 303d Tactical Airlift Squadron. Awards and decorations * Campaigns: World War II: Rome-Arno; Southern France; Normandy; Northern France; Rhineland; Central Europe. * Decorations: Distinguished Unit Citation: France, [6-7] Jun 1944. Air Force Outstanding Unit Award: 1 Aug 1967-25 Oct 1968. Republic of Vietnam Gallantry Cross with Palm: 1 Apr 1966-19 May 1972. Lineage * Constituted as the 304th Troop Carrier Squadron on 25 May 1943 * Activated on 1 September 1943 * Inactivated on 30 September 1946 * Redesignated 304th Troop Carrier Squadron, Medium' on 10 May 1949 * Activated in the reserve on 27 June 1949 * Ordered into active service on 10 March 1951 * Inactivated on 12 March 1951 * Activated in the reserve on 15 June 1952 * Inactivated on 26 July 1955 * Activated in the reserve on 16 November 1957 * Redesignated 304th Troop Carrier Squadron, Heavy on 8 May 1961 * Ordered into active service on 1 Oct 1961 * Relieved from active duty on 27 August 1962 * Redesignated 304th Air Transport Squadron, Heavy on 1 December 1965 * Redesignated 304th Military Airlift Squadron on 1 January 1966 * Inactivated on 30 June 1974 * Redesignated 304th Expeditionary Airlift Squadron and converted to provisional status on 27 March 2003 * Activated on 15 August 2003 * Inactivated on 1 March 2004 * Activated on 15 August 2004 * Inactivated on 28 February 2005 * Activated 29 July 2005 * Inactivated c. 28 February 2006 * Activated 2007 Assignments * 442d Troop Carrier Group, 1 September 1943 – 30 September 1946 * 442d Troop Carrier Group, 27 June 1949 – 12 March 1951 * 442d Troop Carrier Group, 15 June 1952 – 26 July 1955 * 442d Troop Carrier Group, 16 November 1957 * 442d Troop Carrier Wing, 14 April 1959 * 936th Troop Carrier Group (later 936th Air Transport Group, 936th Military Airlift Group, 936th Tactical Airlift Group), 17 January 1963 – 30 June 1974 * Air Mobility Command to activate or inactivate at any time after 27 Mar 2003 * 500th Air Expeditionary Group, 15 August 2003 – 1 March 2004 * Attached to 715th Air Mobility Operations Group, 15 August 2004 – 28 February 2005 * 500th Air Expeditionary Group, 29 July 2005 – c. 28 February 2006 * Attached to: 13th Air Expeditionary Group, 1 October 2007 Stations * Sedalia Army Air Field, Missouri, 1 September 1943 * Alliance Army Air Field, Nebraska, 15 December 1943 * Pope Field, North Carolina, 26 January 1944 * Baer Field, Indiana, 2–8 March 1944 * RAF Fulbeck (AAF-488), England, 27 March 1944 * RAF Weston Zoyland (AAF-447), England, 12 June 1944 (operated from Follonica Airfield, Italy, 18 July – 24 August 1944) * Saint-André-de-l'Eure Airport (B-24), France, 5 November 1944 (operated from Metz Airfield (Y-34), France, 21 April – 15 May and 26 May – 10 September 1945) * AAF Station Munich (R-82), Germany, September 1945 – 30 September 1946 * Fairfax Field, Kansas, 27 June 1949 * Olathe Naval Air Station, Kansas, 27 May 1950 – 12 March 1951 * Olathe Naval Air Station, Kansas, 15 June 1952 * Grandview Air Force Base (later Richards-Gebaur Air Force Base), Missouri, 3 April 1955 – 30 June 1974 * Christchurch, New Zealand, 15 August 2003 – 1 March 2004 * Christchurch, New Zealand, 15 August 2004 – 28 February 2005 * Christchurch, New Zealand, 29 July 2005 – c. 28 February 2006 * Hickam Air Force Base, Hawaii, 1 October 2007 – present Aircraft * Douglas C-47 Skytrain, 1943-1946; 1949-1950 * Waco CG-4A Glider, 1944-1945 * C/TC-46 Commando, 1949, 1950-1951, 1952-1955 * Fairchild C-119 Flying Boxcar, 1957-1961 * Douglas C-124 Globemaster II, 1961-1971 * Lockheed C-130 Hercules, 1971-1974 * Boeing C-17 Globemaster III, when active since 2003
WIKI
Node.js/Express Convention-Based Routes I’ve always been a fan of convention-based routing so I converted a local route generation script I’ve been using with Node.js/Express applications into an npm package called express-convention-routes. The package can be used to automate the creation of Express routes based on a directory structure. What’s a convention-based Express route? It’s a route that is dynamically generated and associated with a “controller” function without having to explicitly code the route yourself (i.e. you don’t write code such as app.use(‘/foo’, router)). express-convention-routes creates routes automatically by parsing a convention-based folder structure such as the one below when the server first starts. -controllers -customers -customers.controller.js -api -cart -cart.controller.js -index.controller.js This allows application routes to be created without having to write any app.use() code to define the individual routes. Using the previous folder structure, express-convention-routes would create the following routes (and associate them with the appropriate “controller” functions): /customers /api/cart / Each folder contains a “controller” file that defines the functionality to run for the given route. For example, if you want a root route you’d add a file into the root controllers folder (index.controller.js for example). If you want an api/cart route you’d create that folder structure under the controllers folder (see the folder example above) and add a “controller” file such as cart.controller.js into the api/cart folder. You can name the controller files anything you’d like and they can have as many HTTP actions (GET/POST/PUT/DELETE, etc.) in them as you want. To get started using the npm package, perform the following steps: • Install the express-convention-routes package locally: npm install express-convention-routes --save • Create a controllers folder at the root of your Express project. • To create a root (/) route, add an index.controller.js file into the folder (you can name the file whatever you’d like). Put the following code into the file: module.exports = function (router) { router.get('/', function (req, res) { res.end('Hello from root route!'); }); }; • To create a /customers route, create a subfolder under controllers named customers. • Add a customers.controller.js file into the customers folder (you can name the file anything you’d like): module.exports = function (router) { router.get('/', function (req, res) { res.end('Hello from the /customers route!'); }); }; • Once the routing folder structure is created, add the following code into your express server code (index.js, server.js, etc.) to load the routes automatically based on the folder structure in the “controllers” folder when the Express server starts: var express = require('express'), app = express(), router = require('express-convention-routes'); router.load(app, { //Defaults to "./controllers" but showing for example routesDirectory: './controllers', //Root directory where your server is running rootDirectory: __dirname, //Do you want the created routes to be shown in the console? logRoutes: true }); • Try out the included sample app by running the following commands: • npm install • npm start • The sample app included with the package (see the Github project) follows a feature-based approach where the controller and associated view are in the same folder (handlebars is used for the views in the sample). If you prefer the more traditional approach where all of the views live in the “views” folder you can simply move the .hbs files there into the proper folders. I originally got the convention-based routes idea from ASP.NET MVC (as well as other MVC frameworks) and KrakenJS . These frameworks automate the process of creating routes so I wanted to do something similar with express-convention-routes while keeping the dependencies as minimal as possible and the code as simple as possible.
ESSENTIALAI-STEM
Kane Hamidou Baba Kane Hamidou Baba (كان حاميدو بابا; 10 April 1954 – 28 December 2021) was a Mauritanian politician. A member of the Union of Democratic Forces, he served in the National Assembly from 2006 to 2013. He died in a traffic collision in Las Palmas, Spain, on 28 December 2021, at the age of 67.
WIKI
Paid Notice: Deaths MORRISSEY, M. GERTRUDE (NEE SAVAGE) MORRISSEY-M. Gertrude (nee Savage). December 5. 2001. Retired NYC teacher. Formerly of Quincy, Mass. Beloved wife of the late John Morrissey, FDNY, Ret. Loving mother of John, James and Blanche. Reposing Saturday 79 PM and Sunday 2-5 and 7-9 PM, Martin A. Gleason Funeral Home, 149-20 Northern Blvd., Flushing, NY. Funeral Monday, 11:00 AM, Holy Family Church, Flushing. Interment Mt. St. Mary's Cemetery.
NEWS-MULTISOURCE
Page:The Enchanted Parrot.djvu/89 Rh " A rich man is wise; a rich man is generous; a rich man is the incarnation of virtue; a rich man is thought much of, and has no end of friends. But if his money go, everything else goes with it." So this Bhûdhara having lost everything that he possessed except some weights and scales, went away to another country, leaving the relics of this property in the care of a friend, who was also a merchant. After a time he made another fortune and returned to his own country. The first thing he did was to go to his friend and ask for the weights and scales. The merchant did not want to give them up, and after some demur he said: " Really I am very sorry, but they have been eaten by the mice." Bhûdhara said nothing but bided his time, and one day soon after this he was walking by the merchant's house, and saw his boy playing outside. Bhûdhara promptly kidnapped the boy. The merchant was in a terrible state at the loss of his son, and started off with his whole family to try and find him. One of the neighbours met the party, who were full of weeping and lamentations, and said (hearing the cause of all this grief): " Oh ! I know where the boy is; I saw him with Bhûdhara." So they went to Bhûdhara's house, and the father asked
WIKI
Talk:Dave Winfield Draft Who is the other person drafted in three sports??? I thought Winfield was drafted by a hockey team as well. Would that make him the only person drafted in four sports? User: Abisai * Yeah... I'm wondering the same thing? Was it Bo Jackson, Deion Sanders, or maybe Michael Jordan? Some guy from way back when? David Bergan 04:24, 4 October 2006 (UTC) The other three-sport draftee, in 1976, was the Cleveland Browns wide receiver Dave Logan, who had been a three-sport star at the University of Colorado and Wheat Ridge High School in the 1970s. Paul 05:16, 10 February 2007 (UTC) * Thanks Paul. That was bugging me. David Bergan 19:41, 10 February 2007 (UTC) It should be noted that Noel Jenke from the University of Minnesota (1968) was drafted in three sports by the Red Sox, Black Hawks and Vikings. —Preceding unsigned comment added by Detroitgopherfan (talk • contribs) 20:30, 26 July 2009 (UTC) Induction & Bird So was he inducted as a yankee or a padre? both are stated in article. was he aiming at the bird that he hit? —Preceding unsigned comment added by <IP_ADDRESS> (talk • contribs) 08:06, 26 August 2006 * The article now says "accidentally killed a seagull by throwing a ball at it" wording implies he was aiming at it? Source here says he wanted to "scare" it. Dunno but I'm taking out "accidentally" as it's not supported by any source. He threw a ball it hit a seagull. RomaC (talk) 08:59, 12 June 2009 (UTC) * ADDING: Have digged around and found another source in which Winfield says killing the gull was an accident. I think it's still prudent not to conclude "accidental" as a fact in the article though, or to say that Winfield's cap-doffing was "mocking" which also interprets intent. RomaC (talk) 09:27, 12 June 2009 (UTC) * added trumped up charge because Toronto Police were acting as homers in arresting an opposing player. If a Toronto player would have killed a bird, no chareges at all LaidOff (talk) 01:33, 10 August 2009 (UTC) > I Can't find a video of him hitting the bird anywhere on the internet. —Preceding unsigned comment added by <IP_ADDRESS> (talk) 03:19, 20 August 2010 (UTC) Yankees or Padres should the colors be Yankees or Padres--Yankees10 03:07, 26 June 2007 (UTC)Yankees10 * Since Winfield elected to go into the Hall of Fame as a Padre, I would have to say the page colors should be the Padres', though I personally came to admire him as a Yankee. Merkinmuffly 05:26, 16 July 2007 (UTC) I like the idea of Padres. He's a HoF padre, he represent the Padres in the celebrity softball game, and something about "Mr. May" and Steinbrenner being banned from MLB that I don't agree with Yankees colors.Mghabmw 03:21, 17 July 2007 (UTC) He played his ten best years as a Yankee but won a World Series as a Blue Jay. LaidOff (talk) 01:33, 10 August 2009 (UTC) Padres' Cap in HOF I removed the comment about the HOF deciding which cap Winfield wears on his Hall plaque. While it is technically true that the Hall can decide for a player, in Winfield's case they allowed him to choose for himself. This article on Padres Nation confirms: "The Hall of Fame has the final choice of which logo will be on the plaque, but Winfield was allowed to choose because the majority of his career was split between the Padres (1,117 games) and Yankees (1,172)." Merkinmuffly 05:24, 16 July 2007 (UTC) They changed padre colors... should we, too? Mghabmw 23:45, 10 August 2007 (UTC) Dave's Picture The picture is from the Hall of Fame induction and was added by request of Mr. Winfield. I didn't know how to tag it at first so it it was deleted. Hotcop2 23:36, 15 August 2007 (UTC) Winfield Foundation I've added this section as this was not only very important to Mr. Winfield, it actually did inspire many of today's athletes (from all sports) to follow suit and, as one of the first, not only accomplished some pretty notable things, but set the standard for giving back in the world of sports. Hotcop2 14:19, 7 September 2007 (UTC) WikiProject class rating This article was automatically assessed because at least one WikiProject had rated the article as start, and the rating on other projects was brought up to start class. BetacommandBot 05:56, 8 September 2007 (UTC) Nice addition by Stnick00 Great table. Hotcop2 (talk) 00:18, 29 March 2008 (UTC) Probable mistake Article said a 22 year career. I count 23. Oops, I goofed. He missed the entire 1989 season due to injury. External links modified Hello fellow Wikipedians, I have just added archive links to 2 one external links on Dave Winfield. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes: * Added archive https://web.archive.org/20120214135748/http://www.baseballhalloffame.org/media/player/mp_tpl.jsp?w=http://mfile.akamai.com/31386/wmv/mlb.download.akamai.com/31386/open/members/winfield_d/hof_induction_speech_winfield_400.wmv&type=v_free&_mp=1 to http://www.baseballhalloffame.org/media/player/mp_tpl.jsp?w=http%3A//mfile.akamai.com/31386/wmv/mlb.download.akamai.com/31386/open/members/winfield_d/hof_induction_speech_winfield_400.wmv&type=v_free&_mp=1 * Added archive https://web.archive.org/20140328041149/http://www.bigtennetwork.com/dpp/about_us/Winfield-Icon-No.-15-20101013 to http://www.bigtennetwork.com/dpp/about_us/Winfield-Icon-No.-15-20101013 Cheers. —cyberbot II Talk to my owner :Online 10:33, 29 August 2015 (UTC) External links modified Hello fellow Wikipedians, I have just modified 4 external links on Dave Winfield. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes: * Added archive https://web.archive.org/web/20091002174547/http://www.sdhoc.com/awards/hall-of-fame/baseball/dave-winfield/ to http://www.sdhoc.com/awards/hall-of-fame/baseball/dave-winfield/ * Added archive https://web.archive.org/web/20091002174547/http://www.sdhoc.com/awards/hall-of-fame/baseball/dave-winfield/ to http://www.sdhoc.com/awards/hall-of-fame/baseball/dave-winfield/ * Corrected formatting/usage for http://sandiego.padres.mlb.com/sd/history/sd_padres_hof.jsp * Added tag to http://www.ncaa.com/sports/m-basebl/spec-rel/050610aaa.html * Added archive https://web.archive.org/web/20110712232954/http://www.humc.com/davewinfield/ to http://www.humc.com/davewinfield Cheers.— InternetArchiveBot (Report bug) 10:25, 27 July 2017 (UTC) A Commons file used on this page has been nominated for deletion The following Wikimedia Commons file used on this page has been nominated for deletion: Participate in the deletion discussion at the. —Community Tech bot (talk) 15:36, 9 August 2019 (UTC) * Winfield 2001 2.jpg 1994 Season The only reason I added that Winfield would have faced the Yankees in the 1994 postseason had the strike not occurred is because the Indians were leading the AL wild card and the Yankees had the best record in American League. News organizations said the same thing, that it would have been likely that it would have been the Yankees and the Indians in the postseason or Winfield making attempts to knock the Yankees out of the postseason in 1994. This would be revenge for Steinbrenner's reinstatement. SnoopyAndCharlieBrown202070 (talk) 17:59, 7 February 2024 (UTC) * You wrote Had the strike not occurred and the 1994 season finished, then he would have faced the Yankees in the inaugural ALDS in the Indians first postseason appearance since. But this is incorrect. Had the strike not occurred, there would have been another six weeks or so of the season, and the playoff qualifiers and seeding could have changed. I don't know what those references say, since you didn't provide links to them, but they likely said something like "had the season ended on August 12" or the like. There was no 1994 postseason and there's no need to speculate about whether or not Cleveland would have made the postseason that year, or who they would have played if there was one and they had made it. – Muboshgu (talk) 18:12, 7 February 2024 (UTC)
WIKI
Managed Installation of FileMaker Pro 16 philipwoods New Contributor III I've been meaning to figure for some time how we can manage the installation and updates of FileMaker Pro on our network using Jamf, particularly since managing updates of the FileMaker Pro.app has migrated to an in app process that our users always put off. It's not very well documented for version 16, but I found this link that showed me the way: https://fmhelp.filemaker.com/docs/15/en/fmp15_network_install_setup.pdf Some of the stuff it talks about is unnecessary because all we want to do is create a .pkg that includes scripts to complete registration, so this is how create a custom .pkg which includes all license information for silent installation or updates: 1. Create an installer folder on your computer for the installation files. I used ~/Desktop/FMP 2. Copy the following files to that folder 3. The FileMaker Pro Installer.pkg 4. Assisted Install.txt personalised as required (see instructions on this via link above) 5. Registration.app Note To locate Registration.app on the FileMaker.dmg, you must show hidden files. In the Terminal application in OS X, type the following on one line, then press Return: defaults write com.apple.finder AppleShowAllFiles YES ; killall Finder 1. Download the Apple Remote Desktop Deployment script for FileMaker Pro. The script can be found in the fmp_osx_deployment.zip file located at http://www.filemaker.com/documentation. 2. Start Terminal and type: cd ~/Desktop/FMP 3. Type the following command to make the script executable: sudo chmod +x ./AppleRemoteDesktopDeployment.sh 4. Type the following to run the script: ./AppleRemoteDesktopDeployment.sh ~/Desktop/FMP The script creates a personalized .pkg installer in the ~/Desktop/FMP folder that you can use to deploy via Jamf. The only negative is that there’s no way of creating smaller update .pkg’s for point releases, but the full package is only a few hundred megabytes in size so it shouldn’t cause any real issues. Hope that's helpful. 2 REPLIES 2 plarkin New Contributor II Where are you getting the full updated installer? Following your directions, I got it installed (thank you) but it immediately asks the user to update. ateazzie New Contributor III also working for me, thnx for posting
ESSENTIALAI-STEM
Mike Lee (bull rider) Michael "Mike" Lee (born June 11, 1983) is an American professional rodeo cowboy who specializes in bull riding. He was the 2004 Professional Bull Riders (PBR) PBR World Champion. He competed consistently in said organization from 2001 through 2017. However, he announced his retirement from the PBR in November 2017. He then competed in the Professional Rodeo Cowboys Association (PRCA), Championship Bull Riding (CBR), and Tuff Hedeman Bull Riding Tour (THBR) circuits, but later mainly rode in regional semi-professional bull riding organizations for the next five years. In the summer of 2022, he announced on his Instagram page his return to the PBR. He would ride sporadically in the PBR in 2022 and 2023 before returning to the semi-pro circuit in 2024. In 2023, Lee was ranked No. 28 on the list of the top 30 bull riders in PBR history. Career milestones Lee rode bulls while growing up, and he joined the PBR's Touring Pro Division in 2001 (then known as the Challenger Tour) when he was 18 years old. He also competed in the Professional Rodeo Cowboys Association and filled his permit within months. Lee first broke onto the PBR's Premier Series (then known as the Bud Light Cup Series) in 2002. He became the first rider to win both the PBR World Finals event title and World Championship simultaneously, which he accomplished in 2004. He is also the first rider to win the PBR World Championship without a regular-season event win. He qualified for the PBR World Finals every single year from 2002 through 2017. Lee was an early adapter among bull riders who favored a helmet to the familiar cowboy hat, which he attributes to avoidance and exacerbation of career and life-threatening injuries. He credits the helmet for having saved his life after incurring a severe head injury and skull fracture at a PRCA rodeo in Fort Smith, Arkansas, in 2003, which required brain surgery. Lee is the first world champion bull rider to have competed his entire professional career with a helmet. In 2006, during the last Built Ford Tough Series (BFTS) regular season event of the year in Columbus, Ohio, Lee won the first round of the event and became eligible for the Mossy Oak Shootout. He successfully rode his bull and won the $15,000 bounty. It was significant because not only was it the last successful ride to win the challenge, but also the very last Mossy Oak Shootout outing ever, as the challenge was discontinued after 2006. The year 2007 was a difficult one professionally for Lee due to severe head injuries. In 2010, he won the PBR Canada Finals event in Saskatoon, Saskatchewan. On Saturday night, April 16, 2016, at the Stanley Performance In Action Invitational, in Billings, Montana (Lee's place of birth), he joined Guilherme Marchi as the second bull rider in PBR history to complete 500 qualified rides. He rode Tahonta's Magic for 86.75 points during Round 2. At that time, Lee was 500-for-1,068 (46.82 percent) in his PBR Premier Series career. He has 14 event wins, 23 90-points rides, and one world championship. He has obtained 50 or more qualified rides in a season three times. One time was a career best of 54 qualified rides in 2008. About all of his success at the time of his 500 ride accomplishment, Lee had this to say, "It is all thanks to God that I am still here," Lee concluded. "Just to stay healthy and be blessed this much is something to be happy for and have joy for." Lee qualified for the PBR World Finals a record sixteen consecutive times (2002 to 2017). In November 2017, he announced via Facebook that he was going to focus his bull riding career in other associations. In 2018, he rode on the Professional Rodeo Cowboys Association (PRCA), Championship Bull Riding (CBR), and Tuff Hedeman Bull Riding (THBR) tours. In the summer of 2022, after five years of mainly riding in regional semi-professional bull riding circuits, Lee announced on his Instagram page his return to the PBR. Faith on the road Lee credits his successes to his Christian faith. "Taking a knee after each ride, no matter the outcome, Lee thanks God on the arena for safety and protection. Lee has a cross appliqué on his chaps and, whenever a fan asks for a signature, he accompanies it with three crosses". Lee was an instructor at the former Christian Bull Riding and Bull Fighting School which was held at the Frost Ranch in Lane, Oklahoma. It was an annual event in honor of Lane Frost, an iconic bull rider who died of injuries from a bucking bull in Cheyenne, Wyoming. On October 8, 2017, the school announced it was closing. It ran every June from 2005 through 2016. Personal life Lee was born in Billings, Montana, on June 11, 1983. When he was 4 years old, the family moved to Paradise, Texas. Later on, they moved to Decatur, Texas, where he still lives.
WIKI
7.5 Assistants tab An assistant is the main functionality of the chatbot, it helps the user in a certain task programmed from an instruction.  We can visualize our assistants in a table: There, we can filter by the model, and synchronize our assistants if we have changes in the Open AI web that we want to get. Clicking the  “+ assistant” button opens a modal with the settings of the assistant creation. 7.5.1 Assistant panel • Add a label to identify the assistant. • Add a description to help the user understand what the assistant does. • Add a programmed first message to the assistant when the user starts the conversation. 7.5.2 Model panel Select the AI model of the assistant to perform their task, take note that while the gpt-4 models are better for performing, answers may take longer loadings between requests and in some cases can cause problems if the answer is too complex. Add instructions to the assistant to perform better in their response. For example, if the assistant needs to assist in business sales, then the instruction needs to be sometime like:  “Take the role of a seller assistant, your duty is helps the customer in questions related about our products” Remember, the better the instructions are, the better the response will be. 7.5.3 Storage panel Select the storage, previously created in the storages tab, that the assistant will use to improve their response. 7.5.4 Visibility panel Tweak the visibility for the assistant, select the condition to show the assistant in different devices. Select if the assistant needs to be included or excluded for target (Home, Blog, Search, 404), posts, pages, categories and tags 7.6 Storages tab Vector store or Storage refers to the method of storing data in a high-dimensional vector space. When data (such as text, images, or other forms of information) is processed by an AI model, it is often converted into vectors, which are arrays of numbers that represent the features of the data in a way that the model can understand and work with. These vectors are processed to generate meaningful responses. This table displays our storages uploaded in Open AI and two buttons to synchronize or create a storage. Synchronize: get storages that were uploaded in Open Ai’s website and add it to the table. + Storage: create a new storage. Note that creating a storage will upload to Open AI automatically. As for the storage, we can see: Label. Description. Assistants: the assistants that use the storage. Files: files saved in the storage. Status: if the file was deleted from the Open AI it’s marked as deleted, you have the option to delete it or upload again. Lastly the are three actions to interact with the storage: • Upload: when the storage is deleted from Open Ai, we can upload again clicking in Upload. • Edit: edit the storage. • Delete: delete the storage. 7.6.1 Storage panel • Add a label to identify the storage. • Add a description to help the user understand what the storage does. 7.6.2 Files panel Select a file, previously created in files tab, to add it into the storage. Adding a file to a vector store allows for efficient information retrieval. The file is processed, chunked, embedded, and stored in a vector database, enabling accurate keyword and semantic searches for better, contextually relevant results. 7.7 Files tab This table displays our files uploaded in Open AI and three buttons to synchronize or upload files. • Synchronize: get files that were uploaded in Open Ai’s website and add it to the table. • + Post Type File: create a file with content selected from the post type (All, pages, posts) • + Extra Files: upload a file from the computer. Note that both actions, + Post Type File and + Extra Files, upload the file to the Open AI automatically. As for the file, we can see: • Label. • Description. • Post types. • Origin: external means that it was created in Open Ai’s website, and internal, it was created from the copilot plugin. • Assistants: the assistant that uses the file. • Approximate cost: for more info about costs here. • Status: if the file was deleted from the Open AI it’s marked as deleted, you have the option to delete it or upload again. • Date Lastly the are three actions to interact with the file: • Upload: when the file is deleted from Open Ai, we can upload again clicking in Upload. • Download: download the file. • Delete: delete the file 7.7.1 Actions • Add a label to identify the file. • Add a description to help the user understand what the storage does. • Select the post type for file generation. 7.7.2 Knowledge Base Generate a file containing the content selected for the post type, providing additional context to the assistant to comprehend more effectively. • Add a label to identify the file. • Add a description to help the user understand what the storage does. • Select the post type for file generation.
ESSENTIALAI-STEM
Template:Did you know nominations/Sazhen-S Sazhen-S * ... that Sazhen-S (pictured) uses lasers to discern the slant ranges of space craft? * Reviewed: Reconstruction Agency Created/expanded by Secretlondon (talk). Self nom at 19:21, 16 September 2012 (UTC) * Symbol confirmed.svg Date and size are fine. Image is free. However hook reference has been made more specific to the hook text in the article and minor editing done. Article good to go.-- Nvvchar . 00:13, 20 September 2012 (UTC)
WIKI
× zbMATH — the first resource for mathematics The 2D MHD equations with horizontal dissipation and horizontal magnetic diffusion. (English) Zbl 1270.35143 The following 2D incompressible MHD equations are studied in the paper. \[ \begin{aligned} \frac{\partial u}{\partial t}+u\cdot \nabla u+\nabla p-\frac{\partial^2 u}{\partial x^2}-b\cdot \nabla b=0, \\ \frac{\partial b}{\partial t}+u\cdot \nabla b-\frac{\partial^2 b}{\partial x^2}-b\cdot \nabla u=0,\\ \nabla\cdot u=0,\quad \nabla\cdot b=0,\\ u(x,y,0)=u_0(x,y),\quad b(x,y,0)=b_0(x,y), \end{aligned} \] where \((x,y)\in \mathbb{R}^2\), \(t\geq 0\), \(u(x,y,t)=(u_1,u_2)\) is the velocity, \(p(x,y,t)\) is the pressure, \(b(x,y,t)=(b_1,b_2)\) is the magnetic field. The paper presents several a priori estimates to the solutions of the problem. If \((u_0,b_0)\in H^2(\mathbb{R}^2)\) and \(2<r<\infty\) then the horizontal component of any solution satisfies to the inequality \[ \| (u_1,b_1)(t)\|_{2r}\leq B_0(t) \sqrt{r\log r}+B_1, \] where \(B_0\) is a smooth function of \(t\) and \(B_1\) depends only on \(\| (u_0,b_0)(t)\|_{2r}\). If \[ \int\limits_0^T\| (u_1,b_1)(t)\|_{\infty}^2dt<\infty \] for some \(T>0\), then \(\| (u,b)\|_{H^2}\) is finite on \([0,T]\). The pressure obeys the global bound for any \(T>0\) and \(0<t<T\) \[ \| p(\cdot,t)\|_q\leq C(T),\quad \int\limits_0^T\| p(\cdot,t)\|_{H^s}^2dt<C(T), \] where \(1<q\leq 3\) and \(0<s<1\). The regularized version of the problem is considered too: \[ \begin{aligned} \frac{\partial u}{\partial t}+u\cdot \nabla u+\epsilon(-\Delta)^\delta u+\nabla p-\frac{\partial^2 u}{\partial x^2}-b\cdot \nabla b=0,\\ \frac{\partial b}{\partial t}+u\cdot \nabla b+\epsilon(-\Delta)^\delta b-\frac{\partial^2 b}{\partial x^2}-b\cdot \nabla u=0, \\ \nabla\cdot u=0,\quad \nabla\cdot b=0,\\ u(x,y,0)=u_0(x,y),\quad b(x,y,0)=b_0(x,y) \end{aligned} \] with \(\epsilon>0\) and \(\delta>0\). The solution to this problem satisfies to the inequality for any \(T>0\) and \(0<t\leq T\) \[ \| (u,b)\|_{H^2}^2+\int\limits_0^t\left(\left\| (\frac{\partial u}{\partial x},\frac{\partial b}{\partial x})\right\|_{H^2}^2 +\epsilon\| (\Lambda^\delta u,\Lambda^\delta b)\|_{H^2}^2\right)d\tau\leq C, \] where \(C\) is a constant depending on \(T\) and \(\| (u_0,b_0)\|_{H^2}\) only. MSC: 35B45 A priori estimates in context of PDEs 35Q35 PDEs in connection with fluid mechanics 76D09 Viscous-inviscid interaction 76W05 Magnetohydrodynamics and electrohydrodynamics PDF BibTeX XML Cite Full Text: DOI
ESSENTIALAI-STEM
Chen Anzhong Chen Anzhong (born January 1954) is a former Chinese politician who served in a variety of positions in Jiangxi province. In 2015, he was sentenced to twelve years in prison for corruption. Biography Chen was born in Ningyuan County, Hunan in January 1954. During the Down to the Countryside Movement, Chen worked as a sent-down youth at Junshan Farm, in Yueyang, Hunan. Chen began working in March 1972 and he joined the Chinese Communist Party in December 1976. After the resumption of the University Entrance Examination in 1977, Chen entered Hunan Normal College in March 1978, majoring in political science, after graduating in January 1982 he was accepted to Central Party School of the Chinese Communist Party and graduated in December 1984, majoring in scientific socialism. After graduation, he taught there as an instructor. From September 1985 to June 1993, Chen worked in Changsha as an officer. In June 1993 he was promoted to become the deputy Party secretary of Hengyang, a position he held until August 1999. From November 1996 to August 1999, he was elected as the mayor of Hengyang; he ascended to a prefecture-level position at age 42. Chen served as the deputy Party secretary of Jingdezhen and mayor of Jingdezhen between August 1999 to June 2001. In June 2001, Chen was promoted to become the Party secretary of Pingxiang, he remained in that position until November 2006, when he was transferred to Jiujiang and appointed the Party secretary of Jiujiang. In January 2008, Chen was elevated to the vice-chairman of the Jiangxi Provincial Committee of the Chinese People's Political Consultative Conference, a position he held until January 2010. In January 2010, Chen was appointed as vice-chairman of Jiangxi Provincial People's Congress. Downfall On December 8, 2013, Chen was dismissed, arrested and investigated for corruption by the Central Commission for Discipline Inspection. Chen was sentenced 12 years in prison on June 19, 2015, upon being convicted on charges of bribery; it was said he took 8.1 million yuan (~$1.27 million) in bribes.
WIKI
Artenghala Formation The Artenghala Formation, also rendered A’ertenghala, is a geological formation located in the Inner Mongolia Autonomous Region and is dated to the Paleoproterozoic period.
WIKI
What is Sleep Apnea? Sleep apnea is a sleep disorder characterized by pauses in breathing or shallow breaths during sleep. These pauses can last from a few seconds to a few minutes and can occur multiple times during the night. Sleep apnea can be caused by obstructive sleep apnea (OSA), where the airway is partially or completely blocked during sleep, or central sleep apnea (CSA), where the brain is unable to control breathing during sleep. Sleep apnea can lead to serious health problems over time if left untreated, such as high blood pressure, heart disease, and stroke. Treatment options for sleep apnea may include lifestyle changes, such as losing weight and quitting smoking, using a continuous positive airway pressure (CPAP) machine, or surgery to remove obstructions in the airway. What are the signs and symptoms of sleep apnea? The signs and symptoms of sleep apnea can vary among individuals, but there are some common symptoms to look out for, such as: 1. Loud, chronic snoring during sleep 2. Gasping, choking, or snorting sounds during sleep 3. Pauses in breathing during sleep witnessed by a bed partner 4. Excessive daytime sleepiness or fatigue 5. Morning headaches 6. Trouble concentrating 7. Memory problems 8. Mood changes, such as irritability or depression 9. Dry mouth or sore throat upon waking up 10. Restless sleep or insomnia 11. Frequent urination during the night 12. Decreased sex drive or impotence If you have any of these symptoms, it is important to seek medical advice from a doctor or sleep specialist who may diagnose and treat the sleep disorder. Sleep apnea can lead to serious health problems if left untreated, so it is important to seek medical help as soon as possible. What is a Home Sleep Test? A home sleep test (HST) is a test that is used to diagnose sleep-related disorders, such as obstructive sleep apnea, without requiring an overnight stay at a sleep clinic. An HST is a portable device that can be used in the comfort of a person's own home to monitor the individual's sleep patterns and breathing. Here are the steps involved in the HST process: 1. Consultation: The individual's healthcare provider will perform a consultation to determine if an HST is appropriate and safe for the individual. 2. Equipment: A healthcare provider will provide HST equipment, which may include sensors that are placed on the individual to monitor breathing, oxygen levels, heart rate, and other sleep-related variables. The individual will also be provided with instructions on how to use the equipment. 3. Home Use: The individual will take the equipment home and use it while sleeping. The HST is typically worn for one to two nights and then returned to the healthcare provider. 4. Results: The healthcare provider will analyze the data collected from the HST and interpret the results. Based on the results, the healthcare provider will make a diagnosis and recommend a treatment plan if necessary. Compared to an in-lab sleep study, an HST is more convenient and cost-effective, as it can be performed at home and is typically less expensive. However, an HST may not provide as much data as an in-lab sleep study and may not be appropriate for every individual with sleep disorders. A healthcare provider can determine whether an HST or an in-lab sleep study is the best option per the individual's needs. How does CPAP Therapy work? CPAP (Continuous Positive Airway Pressure) therapy is a treatment for sleep apnea that involves using a machine that provides a constant flow of air pressure through a mask worn over the nose or mouth while sleeping. CPAP helps to keep the airway open by preventing the narrow air passages in the throat from collapsing during sleep. Here are the steps involved in CPAP therapy: 1. Diagnosis: To begin treatment with CPAP, a diagnosis of sleep apnea is required. Diagnosis is usually performed through an overnight sleep study in a sleep clinic, which measures the individual's sleep patterns, breathing, and oxygen levels. 2. Prescription: After diagnosis, a physician or sleep specialist will prescribe the appropriate air pressure settings based on the severity of the individual's sleep apnea, which is usually determined by the results of the sleep study. 3. CPAP Machine: A CPAP machine is provided, which includes a mask that fits over the nose or mouth, a hose, and a motor that generates the required air pressure. The mask is connected to the machine by the hose. 4. Setup: The individual needs to put on the mask and connect it to the hose on the CPAP machine, and then turn on the machine. The air pressure setting should be set to the prescribed level for the individual. Adjustments may be made to the mask and hose to ensure a comfortable fit. 5. Use: During sleep, the CPAP machine provides a continuous flow of air pressure through the mask and hose to keep the airway open and prevent breathing pauses or snoring. Regular use of CPAP therapy can improve symptoms of sleep apnea, leading to better quality of sleep and reduced health risks associated with the condition. It is important to use CPAP therapy as prescribed, consistently and correctly every night, to receive the maximum benefit from treatment. Regular follow-up with a healthcare provider may also be required to check the effectiveness of the therapy and make any necessary adjustments. What is a CPAP Machine and it's Accessories? A CPAP (Continuous Positive Airway Pressure) machine is a medical device used in the treatment of sleep apnea, a sleep disorder that causes breathing difficulties during sleep. The machine is designed to deliver constant air pressure to the individual's airway to keep it open, preventing pauses in breathing that are common in sleep apnea. Here are the key components of a typical CPAP machine: 1. Motor: The motor of the CPAP machine generates the air pressure required to treat sleep apnea and is powered by electricity. 2. Mask: The mask is placed over the individual's nose or mouth, or both, and is connected to the machine via a hose. The mask is designed to keep the airway open by creating a sealed air pocket. 3. Hose: The hose connects the mask to the motor and carries the pressurized air from the machine to the mask. 4. Filter: The filter is located in the machine and helps to clean the air before it is delivered to the individual's airway. CPAP machines can vary in size and shape and come with a variety of different features, depending on the individual's needs. Some machines are designed to be more portable, enabling individuals to take their therapy with them while traveling, while others come with extra features to improve comfort, such as ramp-up pressure that gradually increases the air pressure to reduce discomfort. It's important to work with a healthcare provider, such as a sleep specialist, to determine the appropriate type of CPAP machine and settings that are most effective for an individual's specific type of sleep disorder. What is CPAP Resupply? CPAP (Continuous Positive Airway Pressure) resupply refers to the process of regularly replacing the essential components of a CPAP machine, such as the mask, tubing, filters, and other supplies, to maintain the effectiveness and proper functioning of the machine. Regular CPAP resupply is important for several reasons: 1. Hygiene: After prolonged use, masks, hoses, and filters can become contaminated with bacteria and allergens, leading to potential infections and other respiratory problems. 2. Wear and Tear: Components of the CPAP machine, such as the mask and tubing, can become worn and less effective over time, which can contribute to mask leaks, air leaks, and poor therapy outcomes. 3. Compliance: Regular resupply can increase patient compliance by providing more convenience and improving the user experience, which can encourage more consistent and effective use of the CPAP therapy. The frequency of CPAP resupply varies depending on the specific components, the usage level, and the manufacturer recommendations. However, most CPAP manufacturers recommend that masks be replaced every three to six months, while filters and hoses should be replaced every one to three months, depending on usage levels. Many CPAP providers offer automated resupply programs that help individuals track their CPAP resupply needs and ensure that they receive timely replacements of the necessary components. These automated programs allow CPAP users to receive regular supplies of new components, often with free delivery and discounts offered. Does CPAP Therapy work? CPAP therapy is a highly effective treatment for obstructive sleep apnea (OSA), which is the most common type of sleep apnea. In OSA, the upper airway collapses during sleep, resulting in episodes of interrupted breathing. CPAP therapy works by providing a constant flow of air pressure through a mask to keep the airway open during sleep, preventing these interruptions and allowing for continuous breathing. Numerous studies have shown that CPAP therapy is effective in reducing the severity of sleep apnea symptoms, including snoring, daytime sleepiness, and fatigue. In addition, CPAP therapy has been shown to reduce the risk of certain health problems associated with untreated sleep apnea, such as high blood pressure, heart disease, and stroke. However, CPAP therapy is not a one-size-fits-all solution, and some people may find it difficult to adjust to wearing a mask and using the machine consistently. In addition, proper mask fitting and machine settings are critical for effective treatment, and some people may need to try different masks or machines before finding the right fit. Overall, CPAP therapy is considered to be a highly effective treatment for sleep apnea, but individual success may vary depending on factors such as adherence to treatment and individual patient factors. It is important for patients to work closely with their healthcare provider to determine the most effective treatment plan for their specific sleep disorder.  
ESSENTIALAI-STEM
Solution in O(x*y) #1 #include<bits/stdc++.h> using namespace std; float dist(pair<int,int> a,pair<int,int> b){ float distance=sqrt((a.first-b.first)*(a.first-b.first)+(a.second-b.second)*(a.second-b.second)); return distance; } class graph{ map<pair<int,int>,list<pair<int,int>>> l; public: void addedge(pair<int,int> a,pair<int,int> b){ l[a].push_back(b); l[b].push_back(a); } bool answer(pair<int,int> src,pair<int,int> dest,vector<int> E, vector<int> F,float r,int n,int arr[102][102],int dp[102][102]){ if(src==dest){ return true; } if(dp[src.first][src.second]==1) return true; else if(dp[src.first][src.second]==-1) return false; bool success=false; for(auto i:l[src]){ if(arr[i.first][i.second]==0){ arr[i.first][i.second]=1; if(answer(i,dest,E,F,r,n,arr,dp)) success=true; } } if(success) dp[src.first][src.second]=1; else dp[src.first][src.second]=-1; return success; } }; string Solution::solve(int x, int y, int N, int R, vector<int> &E, vector<int> &F) { bool ans; graph g; float radius=1.0*R; int arr[102][102]={0}; arr[0][0]=1; for(int i=0;i<=x;i++){ for(int j=0;j<=y;j++){ if(i<x && j<y) g.addedge(make_pair(i,j),make_pair(i+1,j+1)); if(i<x) g.addedge(make_pair(i,j),make_pair(i+1,j)); if(j<y) g.addedge(make_pair(i,j),make_pair(i,j+1)); if(i<x && j>0) g.addedge(make_pair(i,j),make_pair(i+1,j-1)); } } for(int m=0;m<=x;m++){ for(int n=0;n<=y;n++){ for(int i=0;i<N;i++){ if(dist(make_pair(m,n),make_pair(E[i],F[i]))<=radius) arr[m][n]=2; } } } int dp[102][102]={0}; for(int i=0;i<N;i++) if( dist(make_pair(x,y),make_pair(E[i],F[i]))<=radius) return "NO"; ans=g.answer(make_pair(0,0),make_pair(x,y),E,F,radius,N,arr,dp); if(ans) return "YES"; else return "NO"; }
ESSENTIALAI-STEM
Page:History of Norfolk 1.djvu/94 l''. 6s. But though several of them were lost, some were preserved, and put up in the Hall windows, as the emblem of the Trinity, St. John the Evangelist, St. Catharine, the Holy Virgin, and St. Margaret, together with the arms of Verdon, and Pilkington, and Bohun Earl of ''Northampton, viz. az''. on a bend arg. three mullets sab. between two cotises, and six lions rampant, or; all which (except the last coat) are now put up in the east chancel window, at the expense of the present rector. [1736.] This church suffered much in these times, for in 1664, 54l. 11s. 8d. was raised by rate to put it in order, and to buy it ornaments, of all which it was spoiled. About 1668 the town purchased, of the widow Lanham, certain lands called Le Holmes, with the stock that remained of Baldrio's land which was sold, and 10l. of the town money; 3 roods of it (in two pieces) lie upon Fersfield manor, and pays 6d. lord's rent, and 1 acre on Brisingham, which pays 1s per annum. It is now let at 39s. per annum. [1736.] The town close lying against Brisingham great common, heretofore called Chedbury Close, is freehold, and is let at 2l. 10s. per annum; this hath belonged to the church many ages even before 1400. The town-house, in which two poor families dwell, [1736,] standing on the east side of the great common, was erected about 1630, by the inhabitants, upon a piece of their common. Matthew Walter of Bliford gave 20s. per annum to the poor. (See his Will, under Fersfield.) Mr. John Welham, late an inhabitant here, obtained leave of the inhabitants, to enclose a cartway that led into the grounds at the east end of his orchard, and to make it a footway only; in consideration of which, he settled 40s. a year; 3s. 4d. of which to be distributed the first Sunday in every calendar month, in bread to the poor, and tied his estate in Brisingham for the payment thereof; it is now owned by Mr. John Prentice of Botisdale, and is called Welhams. [1736.] Elizabeth, widow of Mr. John Barker, rector of Fersfield, by will dated June 18, 1728, gave to the rector of the parish of Brisingham, and the church-wardens there, who should happen to be so, at the time of her decease, 2 acres of land called Round Meadow, and one tenement, and 2 acres and 20 feet of land, and half an acre of marsh, copyhold on Brisingham manor, lying in the said town, all which they are to hold to them, and the longest liver of them: and when all three are dead, the next rector and church-wardens to be admitted, to the use and trust following: that after the deduction of charges, the profits shall be by them applied, in the teaching of as many poor children (whose parents are settled inhabitants of Brisingham) above eight and under ten years old, in reading, writing, spiri ning,
WIKI
Behind The Scenes of Chrome’s URL Predictions I type C into the Omnibox and Chrome knows that I want to go to Chromestory.com, (99.99 times that is). I type Y and Chrome knows I want to open Youtube.com. So, how does this happen? chrome://predictors/ can give you some details. It stores the predictions that Google Chrome has made for you and some insights into the accuracy of such predictions. There are also 3 values: hit count (how often you type those characters), miss count (how often you pick a different suggestion), and confidence score = hit_count/(hit_count+miss_count). Check “Filter zero confidences” to remove entries with a 0 confidence score. Green entries have a 1 confidence score, which means that the text is always associated with the URL. Take a look. I am sure you will find this interesting. via Google System. Leave a Reply Your email address will not be published.
ESSENTIALAI-STEM
Page:Dictionary of Greek and Roman Biography and Mythology (1870) - Volume 2.djvu/843 Rh of Ills fiimily and connections, from the daj'S of the chaste wife of CoUatinuSj a narrative of his journey- to Athens for the prosecution of his philosophical studies, an account of the society in which he there lived, of the friendsiiips which he there formed, of the preceptors from whose lips he derived his enthusiasm for those tenets which he subsequently expounded with such fervid faith, of his return to his native country, and of his life and habits while enjoying the charms of literary ease and peaceful seclusion. But the whole of these parti- culars are a mere tissue of speculations, — a web of conjectures originally woven by the imagination of Lambinus and afterwards variously embroidered by the idle and perverse ingenuity of a long line of commentators. The period about which his piece was published can be reduced within narrow limits. The allusion to the unhappy dissensions by which his native country was distracted, have been supposed to bear special reference to the conspiracy of Catiline, but the expression " patriai tempore iniquo" is so ge- neral that it is applicable to any portion of the epoch when he flourished. From the manner, how- ever, in which Cicero, in a letter to his brother Quintus, written b. c. 55, gives his opinion on the merits of the poem, we may fairly conclude that it had been recently published ; and, taking into account the slowness with which copies were mul- tiplied, the conjecture of Forbiger becomes highly probable, that it may have been given to the world in the early part of the year B. c. 57, when the machinations of Clodius were producing a degree of disorder and anarchy almost without example even in those stormy times. The work which has immortalised the name of Lucretius, and which, happily, has been preserved entire, is a philosophical didactic poem, composed in heroic hexameters, divided into six books, ex- tending to upwards of seven thousand four hundred lines, addressed to C. Memmius Gemellus, who was praetor in B, c. 58 [Memmius], and is entitled De lierum Natura. It has been sometimes repre- sented as a complete exposition of the religious, moral, and physical doctrines of Epicurus, but this is far from being a correct description. The plan is not by any means so -vast or so discursive, and although embracing numerous topics requiring great minuteness of detail, and admitting of great variety of illustration, is extremely distinct, and possesses almost epical unity. Epicurus maintained that the unhappiness and degradation of mankind arose in a great degree from the slavish dread which they entertained of the power of the Gods, from terror of their wrath, which was supposed to be displayed by the misfortunes inflicted in this life, and by the everlasting tortures which were the lot of the guilty in a future state, or where these feelings were not strongly developed, from a vague dread of gloom and misery after death. To remove these apprehensions, which he declared were founded upon error, and thus to establish tranquillity in the heart, was the great object of his teaching ; and the fundamental doctrine upon which his system reposed was, that the Gods, whose existence he did not deny, lived for evermore in the enjoyment of absolute peace, strangers to all the passions, desires, and fears, which agitate the hum.an heart, totally indifferent to the world and its inhabitants, unmoved alike by their virtues and their crimes. As a step towards proving this position he called to his aid the atomic theory of Lencippus, by which he sought to demonstrate that the material universe is not the result of creative energy on the part of the Supreme Being, but that all the objects in which it abounds, mineral, vegetable, and animal, were formed by the union of ele- mental particles which had existed from all eter- nity, governed by certain simple laws ; and that all those striking phaenomena which, from their strangeness or mighty effects, had long been re- garded by the vulgar as direct manifestations of divine power, were merely the natural results of ordinary processes. To state clearly and develope fully the leading principle of this philosophy, in such a form as might render the study attractive to his countrymen, few of whom were disposed to take any interest in abstract speculations, was the task undertaken by the author of the De Rerum Natura, his work being simply an attempt to show that there is nothing in the history or actual con- dition of the world which does not admit of explana- tion without having recourse to the active interpo- sition of divine beings. The poem opens with a magnificent apostrophe to Venus, whom he ad- dresses as an allegorical representation of the re- productive power, after which the business of the piece commences by an enunciation of the great proposition on the nature and being of the gods (57 — 62), which leads to a grand invective against the gigantic monster superstition, and a thrilling picture of the horrors which attends his tyrannous sway. Then follows a lengthened elucidation of the axiom that nothing can be produced from nothing, and that nothing can be reduced to nothing {^Nil fieri ex iiildlo, in nikilum nil posse reverti) ; which is succeeded by a definition of the Ultimate Atoms, infinite in number, which, together with Void Space {Inane)., infinite in extent, constitute the universe. The shape of these corpuscules, their properties, their movements, the laws under which they enter into combination and assume forms and qualities appreciable by the senses, with other preliminary matters on their nature and affections, together with a refutation of objections and opposing hypotheses, occupy the first two books. In the third book, the general truths thus established are applied to demonstrate that the vital and intellectUcil principles, the Aninta and Animus, are as much a part of the man as his limbs and members, but like those limbs and members have no distinct and independent existence, and that hence soul and body live and perish together ; the argument being wound up by a magnificent exposure of the folly manifested in a dread of death, which will for ever extinguish all feeling. The fourth book — perhaps the most ingenious of the whole — is devoted to the theory of the senses, sight, hearing, taste, smell, of sleep and of dreams, ending with a disquisition upon love. The fifth book, generally regarded as the most finished and impressive, treats of the origin of the world and of all things that are therein, of the movements of the heavenly bodies, of the vicissitudes of the seasons, of day and night, of the rise and progress of man, of society, and of political institutions, and of the invention of the various arts and sciences which embellish and ennoble life. The sixth book comprehends an ex- planation of some of the most striking natural appearances, especially thunder, lightning, hail, rain, snow, ice, cold, heat, wind, earthquakes, volcanoes, springs and localities noxious to annual life, which
WIKI
There are many differences and similarities between Spartan and Athenian society. Neither was typical of Greek polis, both were large in comparison to other Greek city-states. Sparta restricted citizenship and developed a territorial state. Athens developed a democratic constitution. Both were similar in they used Greek language, alphabet, along with similar religious and mythic traditions. . Sparta is a located in Laconia, in the south central Peloponnesian plateau, its size and population is small in comparison to Athens with a citizen population of only 40,000. Spartan government was not typical of a Greek polis; its government resembled that of a territorial state, a primitive form of communism. Decisions in the Spartan government were made by the Gerousia which was a council of 28 elders who were at least 60 years old. There were 5 magistrates called Ephors who acted as citizen governors, and an assembly of primitive decision makers who were citizens of at least 30 years old called the Apella. Sparta's population including not only the citizens was 200,000. This population number includes three types of people, the Spartans known as the equals, the Helots who were slave-serfs numbered 80,000, and the Perkioikoi who were the neighboring peoples on the Peloponnesian who numbered 150,000. Spartan's were out numbered by the Helots in Laconia due to their restricted citizenship. . Spartan society was based on conditioning, they lived lives of necessity and rarely did people come or go. Spartan government reflects that of simple communism, that exploits its serfs, Helots. Spartans didn't have family lives, because Spartan men were soldiers, it was a barracks society. Only through military service could they achieve citizenship at the age of 30. The Agoge system was military training that Spartan boys began at age 5. Sparta was a soldier state that was feared by other Greek city states because of the Agoge.
FINEWEB-EDU
Opera Ad Blocker - or would uBlock Origin actually be much lighter? • There's a bunch of flags in Opera about ad blocking behavior. I'm not sure if those are enabled - sometimes one doesn't know is default actually disabled or enabled (I'm using Opera Stable (latest)). The creator of uBlock Origin and HTTPSwitchboard that later became uMatrix created a much much much less cpu & ram consuming and stressing way of 1) doing the measurements and 2) opted for "light" versions of Easylist and Easyprivacy. Now I wonder does Opera use this or similar - much more advanced (simpler) method of doing calculations (comparing sites & lists)? Also does Opera use these lighter lists (without element hide rules)? Can I switch on these lighter stuff from flags? Or should Opera Ad Blocking just be turned off and go to uBlock Origin with non-heavy calculations and lists? The better Easylist: https://easylist-downloads.adblockplus.org/easylist_noelemhide.txt Also Easyprivacy here: https://easylist-downloads.adblockplus.org/easyprivacy.txt And here's detailed background information: https://github.com/gorhill/httpswitchboard/wiki/Net-request-filtering:-overview https://github.com/gorhill/httpswitchboard/wiki/Net-request-filtering-efficiency:-HTTP-Switchboard-vs.-Adblock-Plus https://github.com/gorhill/httpswitchboard/wiki/Adblock-Plus-memory-consumption Is Opera's Ad Blocker by default using this easier and lighter method? • As far as I know, Opera uses regular EasyList and EasyPrivacy. Can I switch on these lighter stuff from flags? Nope, but you should be able to add that 'light' EasyList and disable the default one in Settings. Is Opera's Ad Blocker by default using this easier and lighter method? It seems that only UBlock uses it. • As far as I know Opera AdBlock is faster because it's integrated deeper in the webpage rendering engine, blocking stuff way earlier than extensions do. • Ok, thanks, here's my follow-up questions: Opera (stable) flags about adblocking: what does these actually mean? i) Advanced selectors for ad-blocking Mac, Windows, Linux Enables usage of advanced selectors in ad-blocking element hiding rules. #adblocker-advanced-selectors ii) Split internal ad-blocking rules Mac, Windows, Linux Allows selectively enabling internal rules. #adblocker-split-rules iii) Adblocker tagname support Mac, Windows, Linux Enables support for taganame selectors in adblocking lists. #adblocker-tagname-support Also there's some canvas related flags. Now the, if I rightly understood, renders pages differently meaning elements won't be used. Should this affect default Opera ad-blocking? Opera ad-blocking more efficient? Yes first I thought that they do ad-blocking in cloud and send the "cleaned" page to the user. But that doesn't seem to be the case: Lists are downloaded local, and local is where ad blocking occurs. Or how? • Lists are downloaded local, and local is where ad blocking occurs. Yes, this. Ad-Blocking is done locally. • Any insight to those #flags? • Anything that is integrated into the system will always most likely be better. Unless it doesn't work properly. But Opera's Adblock works with similar lists to other ad blockers and since it's in the browser itself, I'd go for inbuilt. The accuracy and how good it actually is would probably take some time to determine statistic wise. • adblocker-split-rules It allows you to manage ad-blocking lists. Disable it and 'Manage Lists' will disappear from the ad-block section in settings. adblocker-tagname-support What the description says, it enables/disable support for tagnames in lists. Log in to reply   Looks like your connection to Opera forums was lost, please wait while we try to reconnect.
ESSENTIALAI-STEM
/* gtkbuildable.c * Copyright (C) 2006-2007 Async Open Source, * Johan Dahlin * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Library General Public * License as published by the Free Software Foundation; either * version 2 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Library General Public License for more details. * * You should have received a copy of the GNU Library General Public * License along with this library. If not, see . */ /** * SECTION:gtkbuildable * @Short_description: Interface for objects that can be built by GtkBuilder * @Title: GtkBuildable * * GtkBuildable allows objects to extend and customize their deserialization * from [GtkBuilder UI descriptions][BUILDER-UI]. * The interface includes methods for setting names and properties of objects, * parsing custom tags and constructing child objects. * * The GtkBuildable interface is implemented by all widgets and * many of the non-widget objects that are provided by GTK+. The * main user of this interface is #GtkBuilder. There should be * very little need for applications to call any of these functions directly. * * An object only needs to implement this interface if it needs to extend the * #GtkBuilder format or run any extra routines at deserialization time. */ #include "config.h" #include "gtkbuildable.h" #include "gtkintl.h" typedef GtkBuildableIface GtkBuildableInterface; G_DEFINE_INTERFACE (GtkBuildable, gtk_buildable, G_TYPE_OBJECT) static void gtk_buildable_default_init (GtkBuildableInterface *iface) { } /** * gtk_buildable_set_name: * @buildable: a #GtkBuildable * @name: name to set * * Sets the name of the @buildable object. * * Since: 2.12 **/ void gtk_buildable_set_name (GtkBuildable *buildable, const gchar *name) { GtkBuildableIface *iface; g_return_if_fail (GTK_IS_BUILDABLE (buildable)); g_return_if_fail (name != NULL); iface = GTK_BUILDABLE_GET_IFACE (buildable); if (iface->set_name) (* iface->set_name) (buildable, name); else g_object_set_data_full (G_OBJECT (buildable), "gtk-builder-name", g_strdup (name), g_free); } /** * gtk_buildable_get_name: * @buildable: a #GtkBuildable * * Gets the name of the @buildable object. * * #GtkBuilder sets the name based on the * [GtkBuilder UI definition][BUILDER-UI] * used to construct the @buildable. * * Returns: the name set with gtk_buildable_set_name() * * Since: 2.12 **/ const gchar * gtk_buildable_get_name (GtkBuildable *buildable) { GtkBuildableIface *iface; g_return_val_if_fail (GTK_IS_BUILDABLE (buildable), NULL); iface = GTK_BUILDABLE_GET_IFACE (buildable); if (iface->get_name) return (* iface->get_name) (buildable); else return (const gchar*)g_object_get_data (G_OBJECT (buildable), "gtk-builder-name"); } /** * gtk_buildable_add_child: * @buildable: a #GtkBuildable * @builder: a #GtkBuilder * @child: child to add * @type: (allow-none): kind of child or %NULL * * Adds a child to @buildable. @type is an optional string * describing how the child should be added. * * Since: 2.12 **/ void gtk_buildable_add_child (GtkBuildable *buildable, GtkBuilder *builder, GObject *child, const gchar *type) { GtkBuildableIface *iface; g_return_if_fail (GTK_IS_BUILDABLE (buildable)); g_return_if_fail (GTK_IS_BUILDER (builder)); iface = GTK_BUILDABLE_GET_IFACE (buildable); g_return_if_fail (iface->add_child != NULL); (* iface->add_child) (buildable, builder, child, type); } /** * gtk_buildable_set_buildable_property: * @buildable: a #GtkBuildable * @builder: a #GtkBuilder * @name: name of property * @value: value of property * * Sets the property name @name to @value on the @buildable object. * * Since: 2.12 **/ void gtk_buildable_set_buildable_property (GtkBuildable *buildable, GtkBuilder *builder, const gchar *name, const GValue *value) { GtkBuildableIface *iface; g_return_if_fail (GTK_IS_BUILDABLE (buildable)); g_return_if_fail (GTK_IS_BUILDER (builder)); g_return_if_fail (name != NULL); g_return_if_fail (value != NULL); iface = GTK_BUILDABLE_GET_IFACE (buildable); if (iface->set_buildable_property) (* iface->set_buildable_property) (buildable, builder, name, value); else g_object_set_property (G_OBJECT (buildable), name, value); } /** * gtk_buildable_parser_finished: * @buildable: a #GtkBuildable * @builder: a #GtkBuilder * * Called when the builder finishes the parsing of a * [GtkBuilder UI definition][BUILDER-UI]. * Note that this will be called once for each time * gtk_builder_add_from_file() or gtk_builder_add_from_string() * is called on a builder. * * Since: 2.12 **/ void gtk_buildable_parser_finished (GtkBuildable *buildable, GtkBuilder *builder) { GtkBuildableIface *iface; g_return_if_fail (GTK_IS_BUILDABLE (buildable)); g_return_if_fail (GTK_IS_BUILDER (builder)); iface = GTK_BUILDABLE_GET_IFACE (buildable); if (iface->parser_finished) (* iface->parser_finished) (buildable, builder); } /** * gtk_buildable_construct_child: * @buildable: A #GtkBuildable * @builder: #GtkBuilder used to construct this object * @name: name of child to construct * * Constructs a child of @buildable with the name @name. * * #GtkBuilder calls this function if a “constructor” has been * specified in the UI definition. * * Returns: (transfer full): the constructed child * * Since: 2.12 **/ GObject * gtk_buildable_construct_child (GtkBuildable *buildable, GtkBuilder *builder, const gchar *name) { GtkBuildableIface *iface; g_return_val_if_fail (GTK_IS_BUILDABLE (buildable), NULL); g_return_val_if_fail (GTK_IS_BUILDER (builder), NULL); g_return_val_if_fail (name != NULL, NULL); iface = GTK_BUILDABLE_GET_IFACE (buildable); g_return_val_if_fail (iface->construct_child != NULL, NULL); return (* iface->construct_child) (buildable, builder, name); } /** * gtk_buildable_custom_tag_start: * @buildable: a #GtkBuildable * @builder: a #GtkBuilder used to construct this object * @child: (allow-none): child object or %NULL for non-child tags * @tagname: name of tag * @parser: (out): a #GMarkupParser to fill in * @data: (out): return location for user data that will be passed in * to parser functions * * This is called for each unknown element under . * * Returns: %TRUE if a object has a custom implementation, %FALSE * if it doesn't. * * Since: 2.12 **/ gboolean gtk_buildable_custom_tag_start (GtkBuildable *buildable, GtkBuilder *builder, GObject *child, const gchar *tagname, GMarkupParser *parser, gpointer *data) { GtkBuildableIface *iface; g_return_val_if_fail (GTK_IS_BUILDABLE (buildable), FALSE); g_return_val_if_fail (GTK_IS_BUILDER (builder), FALSE); g_return_val_if_fail (tagname != NULL, FALSE); iface = GTK_BUILDABLE_GET_IFACE (buildable); g_return_val_if_fail (iface->custom_tag_start != NULL, FALSE); return (* iface->custom_tag_start) (buildable, builder, child, tagname, parser, data); } /** * gtk_buildable_custom_tag_end: * @buildable: A #GtkBuildable * @builder: #GtkBuilder used to construct this object * @child: (allow-none): child object or %NULL for non-child tags * @tagname: name of tag * @data: (type gpointer): user data that will be passed in to parser functions * * This is called at the end of each custom element handled by * the buildable. * * Since: 2.12 **/ void gtk_buildable_custom_tag_end (GtkBuildable *buildable, GtkBuilder *builder, GObject *child, const gchar *tagname, gpointer *data) { GtkBuildableIface *iface; g_return_if_fail (GTK_IS_BUILDABLE (buildable)); g_return_if_fail (GTK_IS_BUILDER (builder)); g_return_if_fail (tagname != NULL); iface = GTK_BUILDABLE_GET_IFACE (buildable); if (iface->custom_tag_end) (* iface->custom_tag_end) (buildable, builder, child, tagname, data); } /** * gtk_buildable_custom_finished: * @buildable: a #GtkBuildable * @builder: a #GtkBuilder * @child: (allow-none): child object or %NULL for non-child tags * @tagname: the name of the tag * @data: user data created in custom_tag_start * * This is similar to gtk_buildable_parser_finished() but is * called once for each custom tag handled by the @buildable. * * Since: 2.12 **/ void gtk_buildable_custom_finished (GtkBuildable *buildable, GtkBuilder *builder, GObject *child, const gchar *tagname, gpointer data) { GtkBuildableIface *iface; g_return_if_fail (GTK_IS_BUILDABLE (buildable)); g_return_if_fail (GTK_IS_BUILDER (builder)); iface = GTK_BUILDABLE_GET_IFACE (buildable); if (iface->custom_finished) (* iface->custom_finished) (buildable, builder, child, tagname, data); } /** * gtk_buildable_get_internal_child: * @buildable: a #GtkBuildable * @builder: a #GtkBuilder * @childname: name of child * * Get the internal child called @childname of the @buildable object. * * Returns: (transfer none): the internal child of the buildable object * * Since: 2.12 **/ GObject * gtk_buildable_get_internal_child (GtkBuildable *buildable, GtkBuilder *builder, const gchar *childname) { GtkBuildableIface *iface; g_return_val_if_fail (GTK_IS_BUILDABLE (buildable), NULL); g_return_val_if_fail (GTK_IS_BUILDER (builder), NULL); g_return_val_if_fail (childname != NULL, NULL); iface = GTK_BUILDABLE_GET_IFACE (buildable); if (!iface->get_internal_child) return NULL; return (* iface->get_internal_child) (buildable, builder, childname); }
ESSENTIALAI-STEM
Dick Lehr Dick Lehr (born May 3, 1954) is an American author, journalist and a professor of journalism at Boston University. He is known for co-authoring The New York Times bestseller and Edgar Award winner Black Mass: Whitey Bulger, the FBI and a Devil's Deal, and its sequel, Whitey: The Life of America's Most Notorious Mob Boss with fellow journalist Gerard O'Neill. Life and career Lehr grew up in Connecticut. He attended The Gunnery School, in Washington, Connecticut, and later attended Harvard University, graduating in 1976. While working for the Hartford Courant, Lehr received a Juris Doctor degree from the University of Connecticut School of Law in 1984. Lehr was a John S. Knight Journalism Fellowships at Stanford in 1991-1992. From 1985 to 2003, he was a reporter at The Boston Globe, where he was the Globe's legal affairs reporter, magazine and feature writer, and a longtime member of the Spotlight Team, an investigative reporting unit. He was a Pulitzer Prize finalist in investigative reporting. He was a Visiting Journalist-in-Residence at The Schuster Institute for Investigative Journalism at Brandeis University in 2007. Lehr left the Globe in 2003 and became a professor of journalism at Boston University College of Communication. Published works In January 1989, he co-authored his first book, The Underboss: The Rise and Fall of a Mafia Family, with Gerard O'Neill published first by St. Martin's Press and later editions by PublicAffairs. In May 2000, Black Mass was released, which he also co-authored with O'Neill. Pulling from their investigations on the Spotlight Team, Black Mass detailed the illicit relationship between Boston crime boss James "Whitey" Bulger and FBI special agent John Connolly. The book became a New York Times bestseller and won the 2001 Edgar Award for best fact crime. In 2015 the film adaptation of Black Mass premiered, with Johnny Depp playing the role of Whitey Bulger and Benedict Cumberbatch playing Whitey's brother Bill Bulger. In the movie, Lehr makes a cameo as a patron in a restaurant. Judgment Ridge: The True Story Behind the Dartmouth Murders was published in September 2003 by HarperCollins, co-authored with fellow Globe reporter Mitchell Zuckoff. In June, 2009, Lehr published his first solo project, The Fence: A Police Cover-up Along Boston's Racial Divide published by HarperCollins, a non-fiction narrative about the police beating of Michael Cox, an officer working in plainclothes who was mistaken for a fleeing murder suspect. It was the worst known case of police brutality in Boston history. The Fence was an Edgar Award finalist for best non-fiction. Lionsgate Television is developing a limited dramatic series based on the book. In 2011, James "Whitey" Bulger was arrested in Santa Monica, California after successfully evading law enforcement for nearly two decades. After his capture, Lehr co-wrote with O'Neill the definitive biography of Bulger, Whitey: The Life of America's Most Notorious Mob Boss, which was published by Crown in February 2013. In 2014, Lehr authored The Birth of a Movement: How Birth of a Nation Ignited the Battle for Civil Rights published by PublicAffairs. In the book, Lehr recaptures the firestorm that ensued after the 1915 release of The Birth of a Nation, zeroing in on the parallel narratives of two men entrenched in the controversy: an African-American journalist and agitator William Monroe Trotter and D.W. Griffith who created the film. In February 2017, Lehr was featured in a PBS documentary titled The Birth of a Movement as part of its Independent Lens documentary series. In 2014, Lehr began penning his first young adult novel, Trell, inspired by a series of articles he wrote from the Globe about the questionable conviction for first-degree murder (later overturned) of a young drug dealer, Shawn Drumgold. The novel was published by Candlewick Press in September 2017. In it, a Boston teen named Trell teams up with a Globe reporter to try to uncover the evidence to show her father was wrongfully convicted for murder. Feature film rights were acquired by Tonik Productions. In 2020, Lehr completed his first World War II nonfiction narrative for HarperCollins, Dead Reckoning: The Story of How Johnny Mitchell and His Fighter Pilots Took on Admiral Yamamoto and Avenged Pearl Harbor. The epic true story chronicles the high-stakes operation undertaken in April 1943 to shoot down the iconic Japanese commander and architect of the deadly Pearl Harbor attack – a longshot mission hatched hastily at the U.S. base on Guadalcanal. In 2021, HarperCollins' Mariner Books published Lehr's riveting account of a secret plot by white nationalists in 2016 to bomb Somali refugees living in Kansas that was averted when a local man infiltrated the militia group for the FBI. White Hot Hate: A True Story of Domestic Terrorism in America's Heartland foreshadowed the growing far-right militia movement in the U.S. that culminated in the January 6, 2021 insurrection at the U.S. Capitol. In November 2021, Lehr was featured in documentary about the bomb plot produced by George Stephanopoulos Productions and ABC News. The Informant: Fear and Faith in America's Heartland debuted on Hulu on November 1, 2021. Honors * 1992 Gerald Loeb Award for Large Newspapers for "Coverage of Massachusetts' Public Pension Scandal" * 2001 Edgar Award for best fact crime. * The Hill School's writer-in-residence Books * The Fence: A Police Cover-up Along Boston's Racial Divide (2009) * Judgment Ridge: The True Story Behind the Dartmouth Murders (2009) * Black Mass: Der verhängnisvolle Pakt zwischen dem FBI und Whitey Bulger, einem der gefährlichsten Gangster der US-Geschichte (German Edition) (2015) * The Birth of a Movement: How Birth of a Nation Ignited the Battle for Civil Rights (2017) * Trell (2017) * Dead Reckoning: The Story of How Johnny Mitchell and His Fighter Pilots Took on Admiral Yamamoto and Avenged Pearl Harbor (2020) * White Hot Hate: A True Story of Domestic Terrorism in America's Heartland (2021) * Trell (2017) * Dead Reckoning: The Story of How Johnny Mitchell and His Fighter Pilots Took on Admiral Yamamoto and Avenged Pearl Harbor (2020) * White Hot Hate: A True Story of Domestic Terrorism in America's Heartland (2021)
WIKI
Cables Galore: Charging and More 90% of all Problems are Cables” MacMAD Meeting Topic Oct. 18, 2022 Cables are the unwanted stepchildren of our digital lives. More things are becoming wireless, but, we can’t get away from cables entirely. There are a bewildering variety of cable types, which are ever-changing. I’m sure many of you have a box of obsolete Apple cables like this one: Rat’s nest of obsolete white cables USB – Universal Serial Bus USB (Universal Serial Bus) is probably the most-used cable and interface type you will come across. The secret to understanding USB naming is that, generally, USB numbers have to do with speed, but USB letters tell you the connector type. So, USB 3 is faster than USB 2, which is faster than USB 1. The ABCs of USB The Familiar USB A Plugs and Jacks – Blue Indicates USB 3 Compatibility If you bought an iPhone in the last 10 years, it came with a lightning connector, and a lightning-to-USB cable. These were USB A cables for older iPhones, and USB C since (about iPhone 11?). USB B was mostly for Printers – Rarely Used Now USB B Jack and Plug for Printers USB C is the Most Common Connector for New Devices An Apple USB C to Lightning Cable USB C has two popular features: The connector is very compact, and the connector is symmetrical, meaning that it will connect in either orientation. The USB C connector also carries the high-speed Thunderbolt hardware interface which used to require a separate cable and connector. Thunderbolt is used primarily for display devices and high-speed mass storage. The complex USB and Thunderbolt standards appear to be merging such that USB 4 is the same protocol as Thunderbolt 3. The 1,2,3s of USB Speed USB Speeds Increase Dramatically with Recent Versions Choose Your Power Recent iPhones and iPads may not have come with a power adapter, so it is up to you to make sure you have an appropriate one. Apple currently sells a bewildering variety of power adapters. Considering only the USB power adapters, there are are adapters with power ratings of 5W, 12W, 20W, 30W, 35W (dual), 67W, 96W, and 140 Watts. These are all USB-C, except for the older 5 and 12 Watt models. These are all for household plug-in use and do not include adapters for use in the car. A similar range of compatible adapters are also available from other companies. Your device will not be harmed by a higher-wattage adapter. It will only draw the amount of current it actually needs. If you connect your device to a lower powered adapter, it may charge slowly, or not at all. If you connect your device to a higher powered adapter, it will charge faster, up to the device’s maximum charge rate. USB is a complex standard which includes multiple data and multiple power standards within the one USB name. You may “know” that USB provides 5 volt power. However, for adapters providing more than 15 Watts, USB adjusts to 20 Volts. For power above 100 Watts, USB uses 48 Volts. This is all while maintaining compatibility with older 5 Volt devices. If you still have the power adapter from a phone you got 10 years ago, even if it is “perfectly good”, it is probably not sufficient for your newer devices. Recommended Power Estimates Use an Adapter Appropriate to Your Device Apple Brand USB Chargers 5 Watts, 18 Watts and 30 Watts Which MagSafe Do You Mean? Incompatible MagSafe 3 and MagSafe 2 Power Connectors (MagSafe 1 not shown) Apple has had five different, incompatible things all called MagSafe: three cable types and two wireless chargers. MagSafe and Qi Wireless Charging Pucks (Notice they all have wires) Don’t Let Junky Power Damage Your Device Flea Market Bargain Bin Chargers Choose reputable cables and power adapters. Apple offers the “MFi” (Made for iPhone/iPad) certification to other vendors. These products have been tested and are up to standards. Not all cables that look alike work alike. Older or cheaper cables may work with low power devices, but may perform poorly or not at all for higher power modern devices. Reputable brands include, in alphabetical order: Ainope, Anker, Amazon Basics, Apple, Belkin and MonoPrice. Look for emphasis on safety and clean power. Look for “MFi”. Look for USB C and USB 3.x compatibility. Beware cheap deals that come in a six-pack. Having Problems? Clean Your Lightning Port Clean Dust Bunnies Out of the Lightning Port With a Toothpick Beware of Heat Your device may get hot when charging. Keep it out of the direct sun, especially on your car dashboard. In the car, positioning your phone in front of an air conditioning vent can keep it cool. A hot battery may charge more slowly, if at all. iPhone Overheating Warning Screen Fire Safety Don’t charge your device on the bed or upholstery, especially overnight. Throw away old, frayed, melted or intermittent cords. Throw away power adapters that have overheated. Charging in the Car Modern cars probably have USB ports for charging and for Car Play or for playing audio. Cars tend to lag behind in technology. Many still have USB A ports. It pays to check your owner’s manual to find out which USB ports in your car will charge more quickly. My Honda has low-powered ports in the front, and higher-powered (12.5 Watt) ports behind the center console. Devices can charge twice as fast plugged into those ports. Most cars have a 12 V accessory outlet somewhere (aka, the old cigarette lighter outlet). These can supply plenty of power. You can find modern adapters to get the USB power you need from these. They are much cheaper than a new car! 12 Volt Accessory Outlet to USB Adapter The World is Moving Toward USB C But, USB A will be around for a long while. You should get yourself some USB A to C adapters ( both directions) to make the transition easier. They are cheap. Adapters for USB C to A and vice versa
ESSENTIALAI-STEM
No. 100,359 State of Kansas, Appellee, v. Merardo Garza, Jr., Appellant. (236 P.3d 501) Opinion filed July 30, 2010. Michelle A. Davis, of Kansas Appellate Defender Office, argued the cause and was on the brief for appellant. Lesley A. Isherwood, assistant district attorney, argued the cause, and Nola Tedesco Foulston, district attorney, and Steve Six, attorney general, were with her on the brief for appellee. The opinion of the court was delivered by Biles, J.: Merardo Garza, Jr., appeals his sentence and convictions of aggravated indecent liberties with a child pursuant to K.S.A. 21-3504(a)(3)(A) and rape of a child under 14 years of age pursuant to K.S.A. 21-3502(a)(2). He was sentenced to life in prison with a mandatory minimum sentence of 25 years under K.S.A. 21-4643, commonly known as Jessica’s Law. This court has jurisdiction under K.S.A. 22-3601(b)(l) (off-grid crime; life sentence). The following questions are raised on appeal: (1) Was Garza entitled to new counsel before trial? (2) Did the district court exclude relevant evidence? (3) Was the charging document insufficient to sentence Garza to an off-grid crime because it did not list his age as an element of the crime? (4) Should Garza’s sentence be vacated and remanded for resentencing under State v. Bello, 289 Kan. 191, 195-200, 211 P.3d 139 (2009), and its progeny? (5) Did Garza preserve his claim that the off-grid sentence amounts to a cruel and unusual punishment? (6) Is the departure provision in K.S.A. 21-4643(d) unconstitutional because it allows arbitrary and capricious decision making? and (7) Should Garza’s conviction of aggravated indecent liberties with a child be reversed and vacated because he was charged in the alternative? We affirm Garza’s conviction of rape of a child under 14 years of age. We reverse and vacate his conviction of aggravated indecent liberties with a child because this offense was charged in the alternative. Our case law holds a defendant cannot be convicted of both offenses when the crimes are charged in the alternative. State v. Dixon, 252 Kan. 39, 49, 843 P.2d 182 (1992). But Garza’s sentence is affirmed nonetheless because the district court did not actually sentence him for the aggravated indecent liberties conviction. Other issues raised are addressed below and resolved against Garza. Factual and Procedural Background Garza and his wife, Amy, have four children, including the child victim, M.G. Garza also has two stepdaughters, X.S., who was 13 years old, and A.C., who was 11 years old. They lived with Garza. The incident giving rise to this case occurred on a Saturday evening after M.G. and other family members returned home from visiting relatives after midnight. M.G. testified she lay down on the living room floor to go to sleep. Garza was lying on the couch. M.G. testified Garza lay beside her, “put his fingers in [her] vagina and like wiggled them.” The next day, M.G. told her stepsisters. Then, she told her mother. Her mother took her to the hospital for an evaluation, and the incident was reported to police. Garza’s defense theory was that Amy forced M.G. to make a false accusation. He relied on testimony from one of his other daughters, who testified Garza and Amy had previously fought and that Amy went to jail. The daughter also testified Amy had said she would he to put Garza in jail. Garza testified he caught Amy communicating with other men on the Internet. He also testified M.G. was supposed to go to Kansas City with her uncle the night of the incident, but Amy did not let her go. The information charged Garza with aggravated indecent liberties with a child under K.S.A. 21-3504(a)(3)(A) and (c) and, in the alternative, rape under K.S.A. 21-3502(a)(2) and (c). Both were listed as off-grid person felonies, and Garza’s date of birth was listed as 1969. Neither charge included Garza’s age as an element of the offense. At trial, the investigating detective testified Garza was over 18 years of age. The district court issued the elements instruction from PIK Crim. 3d 57.06 and PIK Crim. 3d 57.01. The instructions did not include Garza’s age as an element of the offenses, and the jury did not make a finding regarding his age. He was convicted of both offenses. Garza filed a downward departure motion on his own behalf, and his counsel also filed a motion seeking a downward departure. Garza’s counsel’s motion stated: “This is a ‘Jessica’s Law’ case and the presumptive sentence is Life with parole eligibility in 25 years. The defendant would state that such a sentence would amount to cruel and unusual punishment. The Court has the option to depart to the sentencing guidelines and impose a guideline sentence.” • At the hearing on these motions, Garza argued a departure was appropriate because a life sentence exceeds the degree of harm committed in this case. He also argued he was entitled to a departure sentence because his criminal histoiy only includes one misdemeanor conviction. Finally, Garza cited the sexual offender evaluation, which determined Garza had a low risk of reoffending and that sexual offender treatment would be appropriate. The district court held it was required to find substantial and compelling reasons to depart. After addressing each claim, it held departure was not warranted. Garza filed a timely appeal. While his appeal was pending, Garza filed a letter of additional authority under Supreme Court Rule 6.09(b) (2009 Kan. Ct. R. Annot. 47), citing this court’s recent holdings that the defendant’s age is an element of the offense that must be determined by the jury to sentence for an off-grid offense. See State v. Morningstar, 289 Kan. 488, Syl. ¶¶ 2-3, 213 P.3d 1045 (2009); State v. Gonzales, 289 Kan. 351, Syl. ¶¶ 10-11, 212 P.3d 215 (2009); Bello, 289 Kan. 191, Syl. ¶¶ 3-4. Issue 1: Entitlement to New Counsel Refore voir dire, Garza requested substitute counsel. The district court denied the motion finding Garza had not presented sufficient grounds to appoint new counsel. On appeal, Garza argues he established “justifiable dissatisfaction” with his appointed counsel and he was entitled to have new counsel appointed. He argues his trial counsel was not prepared, citing concerns about the attorney’s failure to provide a preliminary transcript and to secure witness testimony. The State argues the district court did not err by refusing to appoint new counsel because Garza did not establish justifiable dissatisfaction with his trial counsel. Standard of Review Appellate courts review the district court’s refusal to appoint substitute trial counsel for an abuse of discretion. “Judicial discretion is abused when the district court’s action is arbitrary, fanciful, or unreasonable.” State v. McGee, 280 Kan. 890, 894, 126 P.3d 1110 (2006). The test is whether any reasonable person would take the view adopted by the district court. 280 Kan. at 894. Refore substitute counsel is appointed, a defendant must establish “justifiable dissatisfaction” with his or her current counsel. This may be established by showing a conflict of interest, an irreconcilable conflict, or a complete breakdown in communication between the defendant and appointed counsel. 280 Kan. at 894. Ultimately, a district court is justified in denying a request for new counsel if there is a reasonable basis for believing.the attorney-client relationship has not deteriorated to a point that appointed counsel could not give effective aid in the presentation of the client’s defense. State v. Bryant, 285 Kan. 970, 986, 179 P.3d 1122 (2008). Garza argues there was an irreconcilable conflict. Analysis Garza requested new counsel citing the following complaints: (1) Counsel failed to provide him with a copy of the preliminary hearing transcript; (2) counsel failed to contact witnesses; (3) counsel lied; and (4) Garza did not feel counsel was prepared to proceed. Regarding the preliminary hearing transcript, counsel stated he was unsure if a preliminary transcript had been ordered, but he would check and provide Garza a copy if one was available. The district court indicated counsel should look into getting the transcript but noted the failure to provide a transcript was not grounds for appointing new counsel because defendants do not have a constitutional right to a transcript. Counsel subsequently asked for a continuance to check the clerk’s office, which was granted. The proceedings resumed without mentioning whether a transcript was provided, but the record indicates the preliminary hearing transcript was not prepared until after trial. We must decide whether the failure to have the preliminary hearing transcript prepared for use at trial demonstrates an irreconcilable conflict existed between Garza and his attorney. We find it does not. Defendants are not automatically entitled to preliminary hearing transcripts. Indigent defendants are only entitled to transcripts required for an effective defense. Two factors are used to determine whether a transcript is required: (1) the necessity of the transcript for the defendant and (2) the availability of alternative devices. State v. Ruebke, 240 Kan. 493, 497, 731 P.2d 842, cert. denied 483 U.S. 1024 (1987). Garza’s wife and M.G. both testified at the preliminary hearing. A review of the record demonstrates they were thoroughly cross-examined during trial. Garza’s counsel was present at the preliminary hearing, so he was personally aware of these witnesses’ prior testimony at the preliminary hearing. As such, the district court correctly found the failure to request a transcript did not demonstrate an irreconcilable conflict. The complaints regarding counsel’s failure to contact witnesses and Garza’s accusation that his counsel lied are actually the same issue. Garza did not believe one witness would be willing to appear in court because the witness had an outstanding warrant. Garza believed counsel lied when counsel told him the witness had agreed to testily. Counsel stated he became aware of the witness the previous evening, spoke with him, and the witness agreed to testify. The attorney said he was meeting with the witness that afternoon. Counsel also acknowledged Garza may have had valid reservations about the witness because of the outstanding warrants, but he intended to follow up. Finally, the attorney said he intended to issue a subpoena for the witness if he kept the scheduled appointment and had meaningful testimony. The district court held it was not counsel’s fault the witness was not subpoenaed earlier because the information had just come to light and a continuance would be the more appropriate remedy if the witness could not be subpoenaed. A reasonable person would agree with the district court’s denial on this issue. Garza’s argument anticipated problems that had not occurred, and the better remedy would be to seek a continuance if the subpoena could not be served. At trial, no witnesses were called for the defense, but the record is silent as to why. No additional argument was made on appeal about the failure to call any defense witnesses. As to Garza’s final point raised at trial — that he did not feel counsel was prepared to proceed — Garza’s counsel said he was prepared. The district court found counsel had not done anything fhat prevented him from being prepared for trial. We agree. For the first time on appeal Garza argues he was entitled to new counsel because Garza stated he wanted to seek a continuance before voir dire to subpoena the witness but his counsel did not file the motion. Generally, new legal theories cannot be raised for the first time on appeal. State v. Kirtdoll, 281 Kan. 1138, 1149, 136 P.3d 417 (2006). Garza does not assert an exception applies. The district court could not have erred by refusing to appoint new counsel when the theory was not presented. But even if this issue were properly raised, it would fail because counsel had time to seek a continuance after the scheduled meeting with the witness if he could not issue the subpoena to secure the witness’ presence at trial. This circumstance does not signal an irreconcilable conflict existed between Garza and his attorney. Issue 2: Exclusion of Evidence Garza next argues the district court twice improperly excluded relevant evidence. The State disputes this. On review, we find only one instance in which the district court actually excluded evidence as claimed, and that evidence was irrelevant. Standard of Review The first step when reviewing the exclusion of evidence is to determine whether the evidence is relevant. K.S.A. 60-401(b) defines relevant evidence as “evidence having any tendency in reason to prove any material fact.” See State v. Henson, 287 Kan. 574, 578, 197 P.3d 456 (2008). This definition encompasses two components: whether the evidence is probative and whether it is material. 287 Kan. at 578; see State v. Dixon, 289 Kan. 46, 69-70, 209 P.3d 675 (2009). Probative evidence is evidence that “ ‘furnishes, establishes or contributes toward proof.’ ” Klose v. Wood Valley Racquet Club, Inc., 267 Kan. 164, 167, 975 P.2d 1218 (1999). It is reviewed under an abuse of discretion standard. Dixon, 289 Kan. at 69. Material evidence goes to a fact at issue that is significant under the substantive law of the case. State v. Reid, 286 Kan. 494, 505, 186 P.3d 713 (2008). The determination whether evidence is material is reviewed under a de novo standard. Dixon, 289 Kan. at 69. Once relevance is established, the evidentiary rules governing the admission or exclusion of evidence are applied as a matter of law or in the exercise of judicial discretion, depending on the applicable rule. But if the adequacy of the legal basis is questioned, appellate courts review this issue de novo. 289 Kan. at 70; State v. Gunby, 282 Kan. 39, 47-48, 144 P.3d 647 (2006). Analysis First, Garza sought to admit evidence that Amy (M.G.’s mother and Garza’s wife) had an Internet relationship with another man, who moved in after Garza’s arrest, and Amy left the man alone with the children. The district court allowed testimony that a man moved into the house after Garza’s arrest. The State objected before the next question. During a discussion at the bench, Garza’s counsel stated he intended to ask whether Amy left the children alone with this man to show she was not concerned for her children’s safety. The following exchange occurred: “THE COURT: Now that’s getting way out of field on it because that doesn’t have anything to do with the motive for her having her child falsify the aggravated situation. “[THE STATE]: Before he goes into anything like this in his case in chief, I want to have a hearing outside the presence of the jury because I don’t think it’s relevant. “[GARZA’S COUNSEL]: I won’t go there. “THE COURT: Okay.” Garza’s counsel returned and began questioning Amy on another issue. The transcript demonstrates only that the trial court questioned relevance, but it did not rule on the objection. Garza voluntarily declined to pursue the questioning further, presumably to avoid submitting additional testimony to establish relevance. Therefore, Garza’s challenge to this issue on appeal is misplaced. Second, Garza challenges the exclusion of testimony from the victim’s sister, A.C., regarding whether Garza once became upset “with you and the siblings and even Amy looking at inappropriate websites.” Garza argued it was relevant to show how the household was run, would demonstrate Garza was firm on inappropriate behaviors, and was admissible because it was not a specific instance of conduct. The State objected, arguing it was irrelevant and inadmissible as a specific instance of conduct described to impeach. The State argued Garza had already established how the household was run because one of Garza’s stepdaughters had just testified she thought her dad would ground them for looking at inappropriate material. The district court sustained the objection. Before addressing the testimony’s relevance, it should be noted Garza failed to proffer how A.C. would have testified. The question itself does not clearly indicate the substance of the evidence as required by K.S.A. 60-405, which states: “A verdict or finding shall not be set aside, nor shall the judgment or decision based thereon be reversed, by reason of the erroneous exclusion of evidence unless it appears of record that the proponent of the evidence either made known the substance of the evidence in a form and by method approved by the judge, or indicated the substance of the expected evidence by questions indicating the desired answers.” Counsel’s question contained avague reference to inappropriate websites and suggested the websites were sexually explicit. Garza’s appellate counsel now argues for the first time on appeal that this information was relevant to establish the children’s knowledge of sexual material. But this assumes evidence not in the record because counsel did not establish what he deemed an “inappropriate website” for an 11-year-old child, and it is unclear whether the victim, M.G., was involved in the incident allegedly involving her sister. Garza is not entitled to claim error because he did not make a proffer. See State v. Coleman, 253 Kan. 335, 344, 856 P.2d 121 (1993) (“It is well established that a party may not assert error based on the erroneous exclusion of evidence in the absence of a proffer of that excluded evidence.”). But even assuming the term “inappropriate websites” establishes A.C., her siblings, and Amy viewed pornography and Garza subsequently disciplined the children, this subject matter does not support Garza’s case. His defense theory was that M.G. made a false allegation because Amy encouraged it to get Garza out of the house without losing custody of the children. Evidence the children viewed pornography does not establish or contribute toward proof that Garza’s testimony was more credible than M.G.’s or Amy’s. In addition, while evidence suggesting Garza was the only parent who disciplined the children for viewing inappropriate websites helps establish Garza was firm on inappropriate behaviors, as he claimed, the evidence was not material to a fact at issue. Garza argued at trial that M.G. lied because Amy made her. The district court was correct to exclude this evidence. Issue 3: Sufficiency of the Charging Document Garza next argues the district court lacked jurisdiction to sentence him under K.S.A. 21-4643 because the charging instrument did not allege he was 18 years of age or older. He argues he should be sentenced under the guidelines because of this defect. This issue was raised for the first time on appeal, and it fails under this court’s analysis in Gonzales, 289 Kan. 351, and State v. Gracey, 288 Kan. 252, 200 P.3d 1275 (2009). Whether a charging document sufficiently confers subject matter jurisdiction is a question of law subject to unlimited review. The test governing the sufficiency of the charging document depends upon when the issue is raised. If it is challenged for the first time on appeal, the defendant must show the alleged defect either: (1) prejudiced the defendant’s preparation of a defense; (2) impaired the defendant’s ability to plead the conviction in any subsequent prosecution; or (3) limited the defendant’s substantial rights to a fair trial. Gracey, 288 Kan. at 254. In Gonzales, 289 Kan. at 368-69, and Gracey, 288 Kan. at 256-57, this court upheld the charging document’s validity under identical facts to those presented here. In all three cases, the information’s caption contained the defendant’s date of birth and the document stated it was. for an off-grid felony. Under these circumstances and in light of the standard of review, this court held the defendant was adequately informed about the crime charged and the penalty. Gonzales, 289 Kan. at 369; Gracey, 288 Kan. at 257. We believe the same is true in this appeal. The failure to allege Garza was 18 years of age or older does not invalidate his conviction. Issue 4: Proof of defendant’s age under Jessica’s Law As mentioned above, in Morningstar, Gonzales, and State v. Bello, 289 Kan. 191, 211 P.3d 139 (2009), this court held the defendant’s age had to be submitted to the jury before a defendant could be sentenced to an off-grid offense under K.S.A. 21-4643. Garza was convicted of rape, and he was sentenced to an off-grid offense under K.S.A. 21-3502 and K.S.A. 21-4643. The State concedes Garza’s age was not submitted to or determined by the jury. But unlike Morningstar, Gonzales, and Bello, there was evidence regarding Garza’s age presented to the jury. In this case, a detective testified Garza was older than 18 years of age. Nevertheless, Garza argues his sentence violates Apprendi v. New Jersey, 530 U.S. 466, 490, 147 L. Ed. 2d 435, 120 S. Ct. 2348 (2000), because his age— or the determination of whether he was 18 years of age or older— was an element of both aggravated indecent liberties with a child and rape when sentenced to the off-grid crimes under K.S.A. 21-4643. Bello and its progeny rely on Apprendi and the subsequent cases following Apprendi for their holdings. Garza also argues the harmless error analysis recognized in State v. Daniels, 278 Kan. 53, 91 P.3d 1147, cert. denied 543 U.S. 982 (2004), does not apply because of the importance assigned to the right to have a jury determine each element of the offense under Apprendi. The State argues Garza’s age is not an element of the offense and it was not required to be submitted to the jury. The State does not address whether the harmless error analysis in Daniels applies. According to Daniels, the failure to instruct a jury on an essential element is harmless error if “ ‘a reviewing court concludes beyond a reasonable doubt that the omitted element was uncontested and supported by overwhelming evidence, such that the jury verdict would have been the same absent the error.’ ” 278 Kan. at 62. This analysis is based upon Neder v. United States, 527 U.S. 1, 17-19, 144 L. Ed. 2d 35, 119 S. Ct. 1827 (1999). In State v. Reyna, 290 Kan. 666, 234 P.3d 761 (2010), we recently considered whether the failure to instruct the jury on this element of the crime was harmless when the trial record actually contained uncontested evidence about the defendant’s age that would have permitted the jury to make the appropriate finding, if properly instructed to do so. In Reyna, we concluded that a harmless error analysis was applicable. 290 Kan. at 682. The Reyna court analyzed the issue in light of this court’s decisions in Daniels, 278 Kan. at 57, and State v. Davis, 275 Kan. 107, 115, 61 P.3d 701 (2003), as well as Apprendi and Washington v. Recuenco, 548 U.S. 212, 165 L. Ed. 2d 466, 126 S. Ct. 2546 (2006). In Recuenco, the Court concluded that “[fjailure to submit a sen-tenting factor to the jury, like failure to submit an element to the jury, is not structural error.” 548 U.S. at 222. After reviewing these decisions, our court in Reyna explained its holding as follows: “Daniels stands for the proposition that this court will apply the harmless error analysis to the omission of an element from the instructions to the jury when a review of the evidence leads to the conclusion beyond a reasonable doubt that the omitted element was uncontested and supported by overwhelming evidence, such that the jury verdict would have been the same absent the error. And Re-cuenco stands for the proposition that characterizing the omission as an Apprendi-type error, i.e., judicial factfinding of the omitted element when that element enhances the maximum applicable sentence, does not change that analysis.” Reyna, 290 Kan. at 681. In Garza’s case, there was testimony Garza was more than 18 years of age. There was no dispute about this as the trial progressed. Therefore, there was uncontested evidence before the jury on which it could have based a finding about Garza’s age at the time of the offense, if properly instructed to do so. This evidence distinguishes Garza’s case from Morningstar, Gonzales, and Bello. As in Reyna, we are convinced the Apprendi-type error that occurred in Garza’s case, i.e., when the trial court made the age determination rather than having the jury make the actual finding, was harmless. Issue 5: Cruel and Unusual Punishment Argument Garza argues his life sentence violates the constitutional prohibition against cruel and unusual punishment under the Eight Amendment to the United States Constitution and § 9 of the Kansas Constitution Bill of Rights. He argues this issue was preserved for appeal because he stated the sentence would “amount to cruel and unusual punishment” in his departure motion. Finally, Garza cites the applicable analysis in State v. Freeman, 223 Kan. 362, 367, 574 P.2d 950 (1978), and argues the test for disproportionality is satisfied because the punishment for this offense is greater than the punishment for more serious crimes. The State argues this issue should not be reached because it is raised for the first time on appeal, citing State v. Ortega-Cadelan, 287 Kan. 157, Syl. ¶ 2, 194 P.3d 1195 (2008). The State also argues the first prong for the Freeman analysis is factually driven and must be raised before the district court. In the alternative, the State argues the sentence is not unconstitutional. In previous cases, this court declined to review this issue for the first time on appeal. State v. Easterling, 289 Kan. 470, 485-87, 213 P.3d 418 (2009); State v. Spotts, 288 Kan. 650, 652-54, 206 P.3d 510 (2009); State v. Thomas, 288 Kan. 157, 160-61, 199 P.3d 1265 (2009); Ortega-Cadelan, 287 Kan. at 161. These cases used the three-part test established in Freeman to determine whether a sentence is a cruel and unusual punishment. This test provides: “(1) The nature of the offense and the character of the offender should be examined with particular regard to the degree of danger present to society; relevant to this inquiry are the facts of the crime, the violent or nonviolent nature of the offense, the extent of culpability for the injury resulting, and the penological purposes of the prescribed punishment; “(2) A comparison of the punishment with punishments imposed in this jurisdiction for more serious offenses, and if among them are found more serious crimes punished less severely than the offense in question the challenged penalty is to that extent suspect; and “(3) A comparison of the penalty with punishments in other jurisdictions for the same offense.” 223 Kan. at 367. Since these factors include both legal and factual inquiries and the district court did not make these required findings, this court declined to address the issue. Easterling, 289 Kan. at 487; Thomas, 288 Kan. at 161. Garza argues this barrier should not apply because he raised the issue in his departure motion. But this argument has limited merit under State v. Seward, 289 Kan. 715, 721, 217 P.3d 443 (2009), in which this court remanded the issue for the district court to make the necessary findings. In Seward, the defendant mentioned this claim during plea negotiations, included it in his written downward departure motion, and reiterated the claim on the record at the sentencing hearing. This court held the issue was sufficiently raised before the district court. It then addressed whether the failure to move for additional findings under Supreme Court Rule 165 barred the claim. See Rule 165 (2009 Kan. Ct. R. Annot. 239). The court concluded it was not barred. This court remanded the issue to the district court to malee the required factual and legal determinations. 289 Kan. at 720-21. But the Seward court cautioned: “We emphasize that we believe this case to be exceptional. In the future, a defendant who wishes to appeal on the basis of a constitutional challenge to a sentencing statute must ensure the findings and conclusions by the district judge are sufficient to support appellate argument, by filing of a motion invoking the judge’s duty under Rule 165, if necessary.” 289 Kan. at 721. Garza’s claim is distinguishable from Seward because he failed to sufficiently raise the issue before the district court. In his departure motion, Garza stated a life sentence would constitute a cruel and unusual punishment. But he did not cite any authority, address the three-prong Freeman test, or argue this point during the departure hearing. In contrast to the defendant in Seward, there is no evidence of an effort to preserve this issue for appeal. Issues raised in passing that are not supported by argument or cited authority are deemed waived. Morningstar, 289 Kan. 488, Syl. ¶ 4. Issue 6: Arbitrary and Capricious Argument Garza next argues that K.S.A. 21-4643(d), the departure statute contained in Jessica’s Law, violates his due process rights under the Fourteenth Amendment to the United States Constitution and § 18 of the Kansas Constitution Bill of Rights because it allows for arbitrary and discriminatory decision making. Principally, Garza argues the departure statute is unconstitutional because it allows arbitrary decision making. The State treats this as a challenge to the district court’s determination that substantial and compelling reasons did not exist to justify departure. This court recently addressed a defendant’s due process rights at sentencing, and a part of our analysis determined that the sentencing court’s discretion, by itself, does not violate due process if the discretion is exercised within the requirements of procedural due process. Easterling, 289 Kan. at 482. In Easterling, the defendant argued his due process rights were violated because the sentencing judge based his sentence, in part, on information contained in an arrest report that the defendant could not dispute and the State did not prove. This court recognized a defendant is entitled to due process at sentencing. 289 Kan. at 476. It also recognized a sentencing court may consider any circumstance providing a more complete and accurate picture of the defendant’s background, history, or behavior, and that the use of such information does not by itself violate a defendant’s due process rights. 289 Kan. at 481. But this court added that due process required a court to assure itself the information was reliable, accurate, and trustworthy, and the defendant must have an opportunity to rebut the evidence. 289 Kan. at 482. Garza does not argue the judge violated his due process rights while using his discretion. Instead, he argues the discretion itself violates due process. Under the analysis in Easterling, this argument lacks merit. Issue 7: Conviction of the Alternative Charge Finally, Garza argues the district court erred by entering convictions for both aggravated indecent liberties with a child and rape of a child under 14 years of age because the information charged these counts in the alternative. Garza contends he is prejudiced by this error because the aggravated indecent liberties conviction appears on his criminal record. The State argues the conviction does not have to be reversed and vacated because these charges are not multiplicitous. In State v. Dixon, 252 Kan. 39, 49, 843 P.2d 182 (1992), this court held that “[a] defendant charged with more than one offense in a multiple-count complaint may be convicted of more than one offense. In contrast where, as here, the defendant has been charged in the alternative, he may be convicted of only one offense.” See State v. Blanchette, 35 Kan. App. 2d 686, 704, 134 P.3d 19, rev. denied 282 Kan. 792 (2006), cert. denied 549 U.S. 1229 (2007). The State attempts to distinguish Dixon by arguing it only applies when the charges are multiplicitous. But Dixon goes on to find that the jury does not need to deliberate on the lesser alternative charge if the defendant is convicted of the greater offense and the charges are multiplicitous. 252 Kan. at 49. Rather than supporting the State’s argument, this cuts against it because it reiterates that a defendant can only be convicted of one of the alternative crimes when charged in the alternative. Dixon clearly holds that a defendant cannot be convicted of both offenses when the crimes are charged in the alternative. The district court appeared to partially understand this since it did not sentence Garza for aggravated indecent liberties with a child. But the aggravated indecent liberties conviction must be reversed. Affirmed in part and reversed in part. Johnson, J., dissenting: I respectfully disagree with the majority’s decision to affirm Garza’s sentence for the off-grid version of rape under K.S.A. 21-3502(a)(2). I believe Garza should have been sentenced for the crime with which he was charged and of which he was convicted by the juiy, i.e., the severity level 1 version of the offense. I discussed my reasons for dissenting on this issue in State v. Reyna, 290 Kan. 666, 690, 234 P.3d 761 (2010), upon which the majority in this case relies. I will not replow that ground here. However, the majority’s opinion in this case has sparked some additional thoughts which I will share. In discussing Garza’s claim that the district court erroneously excluded relevant evidence, the majority notes that the materiality component of relevance requires that the evidence be material to a fact at issue in the case. If the defendant’s age was not identified as an element of the crime in either the charging document or the jury instructions, what made the defendant’s age a fact at issue during the guilt phase of the trial? I would submit that where the jury will not be asked to find that the defendant is age 18 years or older, that fact is not at issue during the trial and, therefore, is not material evidence. Accordingly, Garza received an enhanced sentence based upon evidence which was irrelevant when it was introduced. Apparently, the prosecutors in the State v. Morningstar, 289 Kan. 488, 213 P.3d 1045 (2009), State v. Gonzales, 289 Kan. 351, 212 P.3d 215 (2009), and State v. Bello, 289 Kan. 191, 211 P.3d 139 (2009), cases did not believe the defendants’ respective ages were material evidence, because no evidence of age was introduced at their trials. In fact, the evidence of Reyna’s age came not from the State but from Reyna’s direct testimony. One can only surmise, but it would not be totally unfair to presume, that defense counsel did not believe that the client’s age was a fact at issue in that trial when asking Reyna to recite his age. The result is that Reyna and Garza received hard 25 life sentences, whereas Momingstar, Gonzales, and Bello did not, based solely upon the fortuitous circumstance that immaterial evidence just happened to be placed in evidence at trial. One might ponder whether the framers of our federal and state Constitutions envisioned such a circumstance as comporting with due process of law and fundamental fairness. I think not.
CASELAW
Littell's Living Age/Volume 1 No. 1. — May 11, 1844. Contents. * 1) Simpson's Discoveries on the North Coast of America Quarterly Review * 2) Prescott's History of the Conquest of Mexico Quarterly Review * 3) Letter from Charles Edwards, Esq. Blackwood's Magazine * 4) Ralph Waldo Emerson Foreign Quarterly Review * 5) Fitz-Greene Halleck Foreign Quarterly Review * 6) W. C. Bryant Foreign Quarterly Review * 7) H. W. Longfellow Foreign Quarterly Review * 8) The Mauvais Pas Blackwood's Magazine * 9) On French Cookery London Magazine * 10) The Nile—Its Battles—Cairo Dublin University Magazine * 11) The Anonymous Letter Monthly Magazine * 12) The Queen - Royal George and Billiard Table Punch Poetry. * 1) Oh, ask me not how long * 2) Sir Hilary charged at Agincourt * 3) The Spring Shower * 4) Oh come to me now * 5) The Stolen Kiss * 6) I envy thee, thou careless wind * 7) Come from my first, aye come * 8) When heavenly sounds * 9) Yes, labor, love! No. 2 — May 25, 1844. Contents. * 1) Correspondence * 2) The Tailor Creditor Metropolitan * 3) Greece Spectator * 4) The British Fleet Blackwood’s Magazine * 5) Life upon the Nile—Songs of the Nile—Memphis Dublin Univcrsity Magazine * 6) The Greenwood Shrift Blackwood’s Magazine * 7) Cheap Postage Spectator * 8) The Client's Story Friendship’s Offering * 9) Barère's Memoirs (by Macaulay) Edinburgh Review * 10) New Books and Reprints Poetry. * 1) Come, gentle sleep * 2) Vale Crucis * 3) The Child's Warning * 4) The Family Meeting * 5) Village Blacksmith * 6) Song for the Million Scraps. * 1) Legal Examination * 2) Lifts for Lazy Lawyers * 3) To the Brothers Cheeryble * 4) Spanish Intelligence No. 3 — June 1, 1844. Contents. * 1) Correspondence * 2) The First Offence Chambers’ Journal * 3) Casa Wappy Hood’s Magazine * 4) Wellington and Napoleon Punch * 5) The Night before the Duel Spectator * 6) Polecats of the Press Punch * 7) Railways for the Million Spectator * 8) Our Family, a domestic Tale Hood’s Magazine * 9) The Freethinker Blackwood’s Magazine * 10) Duelling and its Punishment Punch * 11) /Issue 3/Hume Quarterly Review * 12) Emigrants of San Tommaso New Monthly Magazine * 13) The New Faith Spectator * 14) Pauper’s Christmas Carol Punch Poetry. * 1) Emigrant Mother * 2) What shall I have for Breakfast? Scraps. * 1) Heartless Spoliation * 2) Lifts for Lazy Lawyers * 3) Anecdote of Prince Albert * 4) Church Needlework Issue 12 Issue 12: Contents Title Page: Table Of Contents(page 705) Pages 706-7: Thomas Campbell Pages 707-9: Our Family- Chap. 5 Page 709: Fantastic Conceptions Pages 709-10: Rapid Growth of Plants Pages 710-16: Wine Pages 716-17: Atmospheric Railways Pages 717-739: Life of Lord Eldon Pages 739-749: Murder of the Duke D'Enghien Page 749: Benevolent Rustic Pages 749-50: Minister and his Friends Pages 750-51: The Heart of the Bruce Pages 751-52: Hope Page 752: Paul Bunyan's Journey-by Selous Pages 752-53: Afar in the Desert I Love to Ride Page 753: What People Say of the Peel Government Pages 753-54: 'Tis Past Pages 754-55: Thoughts On Being Sent For Pages 755-56: The Waterloo Banquet Page 756: Cape Town Pages 756-57: The Eagle Pages 757-58: Howitt's German Experiences Page 758: The Forlorn Hope Pages 758-59: Press On Pages 759-66: The Deaf, Dumb and Blind Page 766: To A Good Wife Page 766: To 13 Years of Age Page 766: Odd Turn Of The Wheel
WIKI
How to craft a Hellenistic statue of Socrates When you think of the origins of the world, you probably think of Greek civilization, and the sculptures that have appeared on the Greek-Roman border since then. But there is another group that is often overlooked, and that is the Hellenists, a collection of sculptors who flourished in the 4th to 6th centuries B.C. The earliest known sculpture from this time period was that of the figure of Socrates, who lived around 300 B.E. The sculptors had been practicing sculpture for more than two thousand years, and they were known for their elaborate, lifelike sculptures of deities and heroes. They are thought to have been influenced by Greek and Roman culture, and many of their works still survive in museums and private collections. But this group also included the most famous of all Greek statues, the statue of Apollo. When the statue was discovered in the city of Patrae, Greece, in 1831, it had been there for almost five centuries. It had been sitting in the museum for nearly a century, and it took several months to remove it. It took two years for the city’s governor to do so. The statue had been hidden for almost three centuries. “They had been buried for years,” said Susan Purdy, a professor of art history at Arizona State University and an expert on Hellenism. The Greek government wanted to get rid of the sculpture, but it was so important that it had to be removed from the site. After the statue had long been forgotten, the people of Patranae came up with a solution: They wanted to turn the sculpture into a gift to the people who had built the city. And the best way to do that was to create an exhibition. In the years that followed, a small number of sculptor-students began to assemble a collection to put on a museum-quality exhibit. The exhibition was called the Athens Olympiad, and for years, it held the most prestigious art show in the world. It was known as the most important show in ancient Greece. It wasn’t until a few decades later, in the late 1970s, that a few of the original sculptors came forward and started talking about their plans to take the statue and turn it into a sculpture. “I think this is the reason that it’s such a rare and unique piece,” said David Purdy. “This is what we did.” “I want to make sure that I’m not making people feel ashamed” A sculpture that goes into the Hellenic Olympiads exhibit is often painted in red, white and blue. Purdy was involved in the process, and he said the sculpture was painted with a paint called pomatum, a red pigment. The color is a symbol of rebirth, and if you paint the painting red, the colors of rebirth come back to you, and you feel reborn. The sculpture was not only the centerpiece of the show, it was also the centerpiece piece. It showed that the Greeks, and in particular the artists, had something special to offer. It also showed that they could show their creativity and skills, even if it was limited to their work on the Athenian wall. Puffy said that this was an important reason why the sculpture remained for so long. “There was something about the painting that allowed people to believe that they were seeing something that they had never seen before,” he said. The artwork on the wall was originally created by the sculptor Apollonios. But, he said, he started thinking that it was the artist who was responsible for creating the work. “If I painted the statue blue, and I put a paint on the statue, it would look like the painting had come from the sky,” he explained. “And if I put some paint on it, it’d look like it was coming from the sea.” “There’s nothing quite like the sight of a person looking down on you,” said Purdy in a phone interview. “It’s something that happens every day. It’s not just that they are looking up at you; it’s that they see the world through their eyes.” In a way, it’s not surprising that the sculpture that went into the exhibit was painted blue. The red paint was applied to the sculpture after it was first created, and when it was finally removed from that piece, the paint had to dry and then be remixed. Picking the right colors, Purdy said, is a difficult process. “The artists were always trying to match the colors, and so the colors that they put on the bronze and then put on an oil-based paint would never match the color that they’d put on something else,” he added. “So it’s a little bit of a balancing act. There’s not enough color to make it look like a bronze sculpture, so you have to get it to a point where you can match
FINEWEB-EDU
Being With Children’ Mini Trampolines Understanding infants well being could be very useful for a parent of a child. Instead kids health Understanding infants well being could be very useful for a parent of a child. Instead of having a peanut butter sandwich with a piece of fruit for a snack, kids are consuming foods which can be equivalent to full means because of the increase in portion sizes. Apples, oranges, bananas, strawberries, watermelon are straightforward “finger-kind” meals that may fulfill their craving. While the best supply is a glass of pure water, kids may get water into their bodies though certain foods. You should also take the time to take your kids to the park or any areas the place they will learn how to meet other youngsters. Lately, a whole lot of homework is done on-line, and lots of kids own or have access to digital gadgets, e.g. tablets, Android devices, iPads, iPhones, Amazon Fireplace and Kindles that they’re utilizing for longer periods of time every day. What you must do with the intention to encourage wholesome eating habits is to eat as a family. The every day activities and video games full with dynamic vigor of those days are in stark contrast with the extremely sedentary lifestyles of right this moment youngsters. Kids want the fresh air and sunshine, and a mini-golf course is one excellent spot for them to receive this needed health profit. Restrict display screen time to no a couple of hour a day for young children. Figuring out that our children’s eyesight is extra valuable and can last for much longer than our trusty smartphones, tablets and laptop screens is the lesson. The difficulty is the quantity of blue light exposure that we get every day via digital gadget use. Health Tips For Youngsters kids health If you are on the lookout for free Florida health insurance to your children, you will be please to be taught three ways to find free youngsters health insurance in Florida. Lastly, it’s worthwhile to share with your children what they need to eat or drink. You must be a resident of Arizona 18 or youthful A US Citizen Have no present medical insurance Not eligible to obtain medical insurance from a government agency like Medicaid A family of 3 can’t make more than $2,934 a month. And having a fat baby doesn’t essentially equal to having a healthy baby. As mother and father, you’ll be able to assist them through obesity problems, even controlling weight for youngsters or kids is troublesome factor. One attention-grabbing aspect effect of the delayed college beginning times is that kids have extra time to eat a full breakfast in the morning. We’re designed to drink water, nothing else. Children may or could not need to burn calories for weight reduction, however they do need to burn off vitality in order that they’ll concentrate during occasions of quiet research. Making it fun of serving quality meals for youths so getting children eat wholesome will not be hopeless. Important Nutrients That Should Be Present In Wholesome Diets For Children kids health When you are wondering about find out how to find the perfect medical health insurance for children in Colorado, there are just a few totally different approaches you may take. Wholesome snacks provide a further source of energy needed by youngsters all through their lively day. Very unhealthy, to not mention most of these drinks have caffeine which is a diuretic and really takes water out of your body. By choosing a plan to your kids that includes dental insurance, you possibly can offset among the expenses associated with common cleanings and checkups. Intense blue light causes harm to the back of the eye, the retina and exposure in kids could lead to early onset macular degeneration, the leading reason for blindness for these over 50, and to earlier incidences of cataracts. Dad and mom should benefit from this by refraining from utilizing their own cell telephones. As it is, the overuse of know-how and lack of active and free play is limiting youngsters’ physical exercise and the increase in screen time has led to the rise of a sedentary life-style.
ESSENTIALAI-STEM
Mägi Mägi is a surname of Estonian origin. The word "mägi" in Estonian means "mountain" or "hill". People with the surname Mägi include: * Anne Mägi (born 1960), Estonian track and field athlete and coach * Artur Mägi (1904–1981), Estonian legal scientist * Arvi Mägi (born 1949), Estonian actor and theatre director * Ester Mägi (1922–2021), Estonian composer * Harald Mägi (1932–2012), Estonian politician * Konrad Mägi (1878–1925), Estonian landscape painter * Laine Mägi (born 1959), Estonian actress and dancer * Leino Mägi (born 1955), Estonian politician * Maarja Johanna Mägi (born 1997), actress * Marin Mägi (born 1982), Estonian actress * Maris Mägi (born 1987), Estonian sprinter * Paul Mägi (born 1953), Estonian conductor * Taivo Mägi (born 1960), Estonian track and field athlete and coach * Rasmus Mägi (born 1992), Estonian hurdler * Tõnis Mägi (born 1948), Estonian singer, guitarist, composer and actor * Voldemar Mägi (1914–1954), Estonian wrestler
WIKI
Wikipedia:WikiTARDIS A WikiTARDIS is a wiki user who is shy, most-of-the-time-silent kind of peep. However, when it comes to editing, a WikiTARDIS happens to edit voraciously when going to random pages, especially the article Cardiff. WikiTARDISes can be adopted by a WikiDoctors/WikiMasters/WikiRanis usually, as WikiRose/Martha/WikiDonna are not Wikilords, so are unable to control a WikiTARDIS properly. However, if it comes that they must they can. How to find one A WikiTARDIS will just pop up on any old page, sporadically edit anything, then leave. How to know if you are one You edit for the – dare I say it – hell of it. You cannot keep yourself from it. Also you know many facts, and can translate AT LEAST a few languages to help out your owner.
WIKI
Saturday, May 18, 2024 Health Healthy Teeth and Gums: Expert Dental Tips for Pain-free Oral Care Healthy teeth and gums play a significant role in our overall wellbeing. However, achieving optimal oral hygiene isn’t always a piece of cake, is it? Fret not! This comprehensive guide shall introduce you to expert dental tips for maintaining healthy teeth and gums and provide pain-free oral care! First off, let’s understand why oral care is essential. The mouth is a gateway to our body. Therefore, a healthy mouth can pave the way for overall wellness. Moreover, nobody fancies the unwelcome pain and discomfort of toothaches and gum diseases. So, how can we ensure that our teeth smile as much as we do? Brushing the Right Way Brushing for two minutes twice a day is a dental mantra that we’re all familiar with. But more important than the frequency of brushing is the way we brush! Experts recommend holding the toothbrush at a 45-degree angle near the gum line to get the best results. Also, remember to replace your brush every three to four months. Floss Daily While brushing is vital, it doesn’t reach every nook and cranny. Hence, flossing becomes necessary to remove those surreptitious food particles and dental plaque in-between teeth. Make flossing a part of your daily routine for truly healthy teeth and gums. Healthy Diet for Healthy Teeth Our diet directly impacts our oral health. Be mindful of your intake of acidic and sugary foods as they routinely contribute to tooth decay. But also, consuming crunchy vegetables helps in the natural cleaning of teeth. Regular Dental Check-ups No matter how diligent you are about your oral care routine at home, regular dental check-ups are paramount. Dentists have the tools and expertise to detect potential issues early and keep your teeth and gums in top-notch health. Kick the Butt Smoking is detrimental to oral health. It not only causes staining but also increases the risk of gum disease and oral cancer. So, kick the butt for a healthier mouth! To truly grasp the importance of oral health, (here is a fantastic resource)[Dental and Oral Health]. Complete with expert advice and in-depth guides, it’s the perfect companion for your journey towards healthier teeth and gums. In conclusion, maintaining healthy teeth and gums is no rocket science. With a dash of discipline, care, and experts’ dental tips, pain-free oral care is within everyone’s reach. Never forget: a healthy mouth is the first step towards a healthier, happier you! Remember, it’s never too early to start on the road to better oral hygiene. So let’s get brushing, flossing, and eating right from today! One thought on “Healthy Teeth and Gums: Expert Dental Tips for Pain-free Oral Care Leave a Reply Your email address will not be published. Required fields are marked *
ESSENTIALAI-STEM
Wireless Participate in insightful discussions regarding issues related to Intel® Wireless Adapters and technologies Announcements The Intel sign-in experience has changed to support enhanced security controls. If you sign in, click here for more information. 6717 Discussions Intel(R) Wi-Fi 6 AX201 160MHz - 2.4GHz & 5GHz are not sensed simultaneously Viththahan Beginner 579 Views Windows was updated yesterday 16.04.2021 and until that the Wi-Fi was usable in both RF frequencies. I used a Wi-Fi Analyzer to identify the frequencies that were sensed. Wi-Fi SSIDs broadcasting in 5GHz were only sensed when 802.11a/g was selected in the preference in the driver settings. For the rest of the preferences showed only the SSIDs that were broadcasting in 2.4GHz frequencies. Both Wi-Fi frequencies were not sensed simultaneously. The SSIDs on preferred frequency band were only connected when the 802.11 standards were manually selected in the driver settings. This can't be practical as it should auto-sense Wi-Fi signals on both frequencies at the same time and to connect to the preferred SSID or the SSID with a strong RSSI. Any solutions for this? 0 Kudos 1 Reply Khun_Doug Valued Contributor I 552 Views Viththahan, There is more information needed to be able to assist you with this. Is this a desktop PC or laptop? If a laptop, what model is it? If desktop, did you custom build the PC, or is premade? And also it will be useful to know what type of router or access point you are connecting to. And as an added piece of information, how you are analyzing the wireless information. The easiest way to get detailed information about your hardware and OS is to use the Intel System Support Utility. The SSU does not collect sensitive information about your account(s) or passwords, only OS and hardware info. The link to the SSU is here: https://downloadcenter.intel.com/download/25293/Intel-System-Support-Utility-for-Windows- Just download and run the utility. Click Scan, then Next, and Save. After you save the results, please reply and include the saved file as an attachment.   Reply
ESSENTIALAI-STEM
Dancing After Hours Dancing After Hours is a book of short stories by Andre Dubus. First published in 1996 by Knopf, it was one of that year's New York Times Notable Books of the Year. Contents * "The Intruder" &mdash; a confused adolescent boy's fantasies bring disaster. * "A Love Song" &mdash; Catherine discovers her husband is having an affair. * "Falling In Love" &mdash; a Vietnam veteran's love affair ends when his lover seeks an abortion. * "Blessings" &mdash; Rusty deals with the aftermath of a horrific shark attack during a family vacation. * "Sunday Morning" &mdash; a woman whose friend was murdered is convinced that she will never love and be loved. * "All the Time in the World" &mdash; LuAnn Arceneaux meets Ted Briggs and falls in love. * "Woman on a Plane" &mdash; a woman who hates flying travels on a plane to visit her dying brother. * "The Colonel's Wife" &mdash; a veteran depends on his wife for everything after breaking his legs in a freak accident. * "The Lover" &mdash; an aging man has a love affair with a younger woman and feels guilty for his failed marriages. * "The Last Moon" &mdash; a young woman convinces her sixteen-year-old lover to murder her husband. * "The Timing of Sin" &mdash; LuAnn Arceneaux tells her friend Marsha of an occasion when she almost committed adultery. * "At Night" &mdash; an old woman's husband dies in the night beside her. * "Out of the Snow" &mdash; LuAnn Arceneaux beats two home invaders and scares them away. * "Dancing After Hours" &mdash; a quadriplegic's tale of skydiving illuminates an extraordinary evening among a group of people in a bar.
WIKI
A Peterson Graph Problem in C Program? CServer Side ProgrammingProgramming Suppose we have one graph like below. That graph is Peterson graph. The vertices are numbered from 0 through 9. Each vertex has some letters. Let consider one walk W, in that graph, where L vertices are used. A string S with L letters is realized by the walk W when the letter sequence in W and S are same. We can visit the vertices multiple times. For example, one string S is like “ABBECCD”, this is realized by the walk (0, 1, 6, 9, 7, 2, 3). Our task is to find such walk, and if that walk is present, then find lexicographically least such walk. If no suck walk is there, then return -1. Algorithm petersonGraphWalk(S, v) − begin    res := starting vertex    for each character c in S except the first one, do       if there is an edge between v and c in outer graph, then                v := c       else if there is an edge between v and c+5 in inner graph, then          v := c + 5       else          return false       end if          put v into res       done    return true end Example #include<iostream> using namespace std; bool adj_mat[10][10] = {{0, 1, 0, 0, 1, 1, 0, 0, 0, 0},    {1, 0, 1, 0, 0, 0, 1, 0, 0, 0},    {0, 1, 0, 1, 0, 0, 0, 1, 0, 0},    {0, 0, 1, 0, 1, 0, 0, 0, 1, 0},    {1, 0, 0, 1, 0, 0, 0, 0, 0, 1},    {1, 0, 0, 0, 0, 0, 0, 1, 1, 0},    {0, 1, 0, 0, 0, 0, 0, 0, 1, 1},    {0, 0, 1, 0, 0, 1, 0, 0, 0, 1},    {0, 0, 0, 1, 0, 1, 1, 0, 0, 0},    {0, 0, 0, 0, 1, 0, 1, 1, 0, 0} }; char S[100005]; char res[100005]; bool petersonGraphWalk(char* S, int v){    res[0] = v + '0';    for(int i = 1; S[i]; i++){       //traverse the outer graph       if(adj_mat[v][S[i] - 'A'] || adj_mat[S[i] - 'A'][v]){          v = S[i] - 'A';       }       //then check the inner graph       else if(adj_mat[v][S[i] - 'A' + 5] || adj_mat[S[i] - 'A' + 5][v]){          v = S[i] - 'A' + 5;       }else{          return false;       }       res[i] = v + '0';    }    return true; } main() {    char* str = "ABBECCD";    if(petersonGraphWalk(str, str[0] - 'A') || petersonGraphWalk(str, str[0] - 'A' + 5)){       cout << res;    }else{       cout << -1;    } } Output 0169723 raja Updated on 19-Aug-2019 14:22:04 Advertisements
ESSENTIALAI-STEM
Quadcopter Drone: Its History and Evolution Over Time July 5, 2018 The quadcopter drone has helped people to take airspace in a new and deep way and have revolutionized the flight, today the drone is part of our life. The modern drone comes with exceptional capabilities and the flight is the least of these.. These amazing devices allow the augmented reality game and allow us to capture incredible aerial images. Drones can reach inaccessible places which, by conventional methods, would be very costly or dangerous to be accessed by humans, allowing them to do much more than is believed possible. It’s really fascinating to see how the drone has evolved over the years. Drone: Its history and evolution over time What is a Drone or a Quadcopter? The drone belongs to a class of aerial vehicle known as UAV (unmanned aerial vehicle). This device can be aired without human pilots. This feature makes the drone ultimately a flying robot. Spanning airplanes and Cuadricópteros, drones have software-controlled flight plans integrated into their systems. These systems work with GPS to guide and track their movements. The Quadcopter drone is a newer unmanned aerial vehicle. As its name implies, the Cuadricópteros depend on four quick-turn rotors to give it thrust. Two rotors rotate clockwise and two rotors turn anti-clockwise. To assist in the process, the Cuadricópteros are equipped with two sets of identical fixed-pitch propellers. The pilots manage to control the cuadricópter by changing the speed of their rotor discs using remote control transmitters. The history of UAV Quadcopter drone have a very interesting story. They have been developed in an amazing way with the help of advanced engineering and technology.   Why were unmanned aerial vehicles built? Drones were initially used only by the armed forces. The Austrian army first developed these vehicles for war purposes. The Austrians attacked Venice in 1849 with unmanned aerial balloons full of explosives. Some of these balloons worked, while the wind flew others to Austrian territory, so these balloons showed potential. The first unmanned aerial vehicles appeared after the First World War. Elmer Sperry of Sperry Gyroscope Company developed the Hewitt Sperry automated Airplane. It was the first version of today’s aerial torpedoes (missiles). Hewitt Sperry Automated Airplane the first drone The US Army. usa. He turned the standard E-1 aircraft into a drone. Larynx was one of these planes. It was a small monoplane, and after being launched from a warship, it could fly in autopilot. The United States Army and the United Kingdom soon developed many other automated aircraft. The first mass-produced aircraft was the concept of Reginald Denny, a famous Hollywood actor. It pursued its interest in drones remote control and created Reginald Denny Company. This company produced the radio plane, which improved for the US Army. usa. In World War II. The American military experimented with this drone and built a variety of aerial torpedoes. The US Army. usa. He used this aircraft as a drone during the Cold War. These drones were also able to collect radioactive data and intelligence information. The first Quadcopters The Quadcopters were among the first VTOL planes (vertical takeoff and landing). Previous helicopters used tail rotors to counteract the torque generated by a single main rotor. This was ineffective and wasteful. To solve the problems that the helicopter pilots had when making vertical flights, the engineers developed Cuadricópteros. The first quadcopter was the Omnichen 2. It was invented by Etienne Omnichen in 1920. This plane flew a registered distance of 360 meters and made over 1000 successful flights. Quadcopter Oemichen N2 1922 The Quadcopter Convertawings Model A appeared in 1956. This quadcopter was designed by Dr. George E. Bothezat. The Quadcopter Convertawings Model A was the first to use propulsion to control the inclination, pitch and sway of an aircraft. In 1958, the company Curtis Wright developed the Curtis Wright V27. Convertawings Model A Current developments in the drone industry Technology has dramatically and this boosts the air industry and the creation of drones. In the last ten years, companies like Heli-Max, Blade, Walker, Parrot and DJI have produced mini-drones that use up-to-date computer technology for aerial photography and flight control. Quadcopter Drone: Main Features Remote control drones and Cuadricópteros have qualities that make them popular among the Entu Quadcopter Drone Phantom 4 Siastas and obtain new qualities almost every day. The Cuadricópteros have the characteristics of coaxial and launching helicopters. The helicopters launched are wind-resistant and agile, and the coaxial helicopters are more stable because they depend on two layers of rotors. The Cuadricópteros are a comfortable combination of both. Three-axis gyroscope technology stabilizes many of the latest Cuadricópteros. The Quadcopters drones are agile, stable and are perfect devices for aerial photography. They carry gimbals and cameras to make this possible, with image stabilizers. Center of gravity (CG) The Cuadricópteros depend on a strong center of gravity. Its CG (center of gravity) is in the middle of its four rotors and keeps them balanced. Placing loads on the Cuadricópteros can affect your center of gravity and stability. However, the Flyers can counteract this by adjusting the load of the quad. Quadcopter Drone have aerodynamic differences with a plane The Quadricopter and drone uses aerodynamic differences from the perspective of a plane to fly. The Cuadricópteros have four rotors, two rotate in a clockwise direction and two rotate counterclockwise and override any torque or force in the fuselage. They stabilize function and movement. Vice versa, the individual rotor of a typical helicopter that rotates clockwise forces the fuselage to move counterclockwise. The resulting torque exerts pressure on it and weakens it. Remote Control Transmitters (RC) The pilots use joysticks on remote controlled transmitters to control drones and Cuadricópteros. A receiver on the drone processes the controller commands. The command signals are combined with the output of the drone’s altitude sensors. After that, the flight controller points to the ESC (electronic speed controllers), which in turn move the drone’s engines. Simple and Beautiful Design The Quadcopter drones have a simple but beautiful design and this quality wins many adepts. Applications and uses of Quadcopter Drone The Quadcopter drone is not just a flying toy, from enthusiasts to radio-controlled airplanes. They also have other applications and beneficial uses. Companies are constantly looking for ways to leverage their capabilities. Current use of drone and QuadCopter drone Law enforcement agencies use drones in search and rescue operations because they can reach areas inaccessible to disaster survivors. Law enforcement agencies also use drones to discover criminal activities. Military scientists in different countries invented drones for reconnaissance and combat purposes. They still serve these functions. It is also used in the armed forces, as a weapon capable of recognizing, detecting and destroying targets with surgical precision. Augmented Reality Application Pilots can apply augmented reality with their drones. Augmented reality simulations give you a perspective on the real worlds, with a couple of exciting upgrades. Real-world simulation makes activities that can be developed on a drone; It makes the pilot as a real actor of the activity he is developing. In other words, it allows you to see and feel the pilot similar flight sensations, as if it were on the drone. This makes the drone a device that can cope with a lot of activities ranging from tactical to logistical; Not only in the military sphere, but also in civilian use. Research applications Researchers from universities working in different fields use the drone as a research tool. They collect the information needed to work on systems in real time, flight control and robotics. Drones and Cuadricópteros are suitable test platforms because they are relatively small and economical. Anyone can fly and this is why they are considered tools suitable for researchers. Apart from this, drones and quads can survive in hostile environments. They can reach inaccessible and dangerous places on behalf of the investigators. This helps solve many problems with logistics and cost. Aerial photography and commercial use Enthusiasts and beginner travelers love drones as their amazing aerial stunts are excellent talking points. Today, many people use drones to capture videos and aerial photos. The built-in three-axis gyroscope technology stabilizes many of the newer drones, allowing them to take these photos without a quivering “jelly” effect. Professional travelers consider the GoPro camera to be the best for use with drones. The DJI, Blade, and Walkera drones brochures can make use of your GoPro cameras, the GoPro application, and the GoPro channel on your smartphones. These cameras can simply connect to the drones to film. Today for a few dollars you can have teams with less benefits than a GoPro and professional teams like this cheap drone, which allows them to get very good photos and some respectable video. The evolution of the drone and the Quadcopter drone The Quadcopters and drones already have extensive uses. However, companies have already found ways to increase their potential. Environmental protection agencies and governments can take advantage of drones ‘ aerial image capabilities to talk about the environment. Analysis drones can fly over landscapes and take pictures on the ground without creating any hassles. They can capture wildlife images in remote locations and provide information that tells environmental protection agencies if wildlife is under threat. These drones can drastically reduce survey costs. Use in logistics, search and rescue Quadcopters and drones can reach places that people can’t. In the future, community agencies can use these vehicles to bring medicines and food to inaccessible places. Andreas Raptopoulous, a Matternet investigator, introduced a system of flying vehicles and landing stations, controlled by a routing software. He called this Matternet system. He explained how the drone can transport about 2 kg of drugs to inaccessible locations in about 15 minutes. Cuadricópteros and drones can navigate to terrestrial stations, in safe places, to deliver medicine and food. Routing software guides vehicles through adverse weather. This can help people in inaccessible places to recover and progress. Troubleshooting Motion People with disabilities and athletes often have problems with movement. Drones can help alleviate their problems. Raffaelo D’Andrea, a Global Ted researcher, demonstrated how drones can do difficult physical tasks that humans cannot perform. In a demonstration, he balanced a glass full of water on top of a drone. The drone flew without spilling water from the glass. The drone’s high speed annulled the aerodynamic effects and gravitational attraction on the water. In addition, the drone’s propellers are pointing upward, in the same direction as the glass and this was also useful. Such discoveries help athletes develop better posture and higher speed to overcome aerodynamics and severity problems. Conclusion Quadcopters and drones, with ample capacities and history, are the vehicles of the future. In the future, people will find it almost impossible to imagine life without them. It is clear that the evolution will come from the arms race, but in the civil field, thousands of applications will begin to be discovered day by day. A few years ago it was unthinkable that there would be new jobs such as registered pilots of drones. RELATED POSTS
ESSENTIALAI-STEM
-- Swiss Stocks Decline; Shares of UBS, Credit Suisse, Roche Lead SMI Lower Swiss equities declined as losses at banks and a slump in sales at Roche Holding AG overshadowed gains at Syngenta AG and Swiss Reinsurance Co. UBS AG lost 1.5 percent and Credit Suisse Group AG declined 1.4 percent. Roche Holding AG dropped 0.5 percent as it posted a decline in third-quarter revenue. Syngenta climbed 3.8 percent as the world’s biggest maker of agricultural chemicals reported quarterly sales ahead of analysts’ estimates. Swiss Reinsurance Co. advanced 2.5 percent as JPMorgan Chase & Co. upgraded the world’s second-biggest reinsurer. The Swiss Market Index lost 0.2 percent to 6,440.97 at the 5:30 p.m. close in Zurich. The gauge has lost 7.6 percent from this year’s high on April 15 as concern re-emerged that the sovereign-debt crisis in Europe will crimp economic growth. Still, the gauge has risen 2.3 percent this month amid speculation the Fed will announce plans to stimulate economic growth as the recovery wanes. The broader Swiss Performance Index decreased 0.1 percent today. “The earnings season will gather pace next week with more companies scheduled to deliver earnings after today’s news flow on sales by Syngenta and Roche,” said Manfred Hofer , head of equity analysis at LGT Capital Management AG in Pfaeffikon, Switzerland, which oversees about $73 billion. “There’s a potential for a setback in European markets and the SMI in the next weeks as suggested by the underperformance in banking shares, but that would give a buying opportunity. The benchmark for Swiss stocks could rise to a maximum of 6,600 points before the correction.” Syngenta, Swiss Re Syngenta increased 3.8 percent to 274 Swiss francs after posting third-quarter sales ahead of analysts’ estimates and saying improved profitability in seeds should help meet a goal of matching last year’s profit. Revenue totaled $2.2 billion, compared with $2 billion in the year-earlier period, the Basel-based company said in an e- mailed statement today. Analysts predicted $2.08 billion, according to a Bloomberg survey. Swiss Re rose 2.5 percent to 47.66 francs. JPMorgan lifted its recommendation to “overweight” from “neutral.” The brokerage said “the company looks undervalued relative to its peers for what we believe is an equal risk profile as we believe the Standard & Poor’s Ratings Services positive outlook means Swiss Re is likely to return to AA- by May 2011.” Roche lost 0.5 percent to 138.4 francs. The world’s biggest maker of cancer drugs reported a 7 percent decline in third- quarter revenue as demand for the Tamiflu antiviral fell. “The lower-than-expected third-quarter performance is likely to put more pressure on Roche’s share price,” Helvea SA wrote in a note. Sulzer, UBS Sulzer AG rose 1.3 percent to 118 francs. The world’s second-largest maker of pumps said its order intake this year will be “slightly” above last year’s figure, after reporting a 7.4 percent increase to 2.45 billion Swiss francs in the first nine months. UBS AG ended a two-day gain, losing 1.5 percent to 17.37 francs as banking stocks were the worst performers in Europe today. Switzerland’s biggest bank defended its decision not to take any legal action against former executives and board members, saying it “learnt the lessons” from the credit crisis and its dispute with U.S. tax authorities. Credit Suisse Group AG , the country’s second-biggest bank, lost 1.4 percent to 42.64 francs. Actelion Ltd. gained 6.6 percent to 53 francs, having earlier risen as much as 11 percent. Actelion hired investment bankers at Moelis & Co. for advice as the drugmaker considers a potential sale, people with knowledge of the matter said earlier this week. Spokesman Roland Haefeli declined to comment on today’s surge in a telephone interview. To contact the reporter on this story: Francesca Cinelli in Milan at fcinelli@bloomberg.net . To contact the editor responsible for this story: David Merritt at dmerritt1@bloomberg.net .
NEWS-MULTISOURCE
Wikipedia:Categories for discussion/Log/2014 October 16 Category:Saraswati Valley kingdoms * The result of the discussion was: delete; upmerge content to Category:Kingdoms in the Mahabharata. Good Ol’factory (talk) 04:06, 9 December 2014 (UTC) * Propose deleting saraswati valley kingdoms * Nominator's rationale: A valley is a region between hills, so 'Sarasvati valley' does not even begin to make sense. A disastrous creation that should not have been kept so long. Jayakumar RG (talk) 17:27, 16 October 2014 (UTC) * Comment -- This is about kingdoms from a work of myth. If they all lay in one river valley, this might be a legitiamte category, but I do not know enougfh of the subject to comment. Peterkingiron (talk) 19:19, 16 October 2014 (UTC) * There is no Saraswati valley at all since the river flows through the desert. I can find no sources where these kingdoms are mentioned as being near a Saraswati valley. This category is WP:OR. Jayakumar RG (talk) 01:48, 17 October 2014 (UTC) * Wouldn't a rename be a better solution than a delete? Marcocapelle (talk) 14:53, 18 October 2014 (UTC) * Other than the naming issue, the main reasons I tagged it for deletion are WP:OCLOCATION and WP:SMALLCAT. This category is never going to expand beyond its current 4 items. Jayakumar RG (talk) 04:08, 19 October 2014 (UTC) * I don't think that WP:OCLOCATION applies to literature or mythology. Perhaps WP:SMALLCAT could apply but then the category should be upmerged instead of deleted. Marcocapelle (talk) 23:12, 19 October 2014 (UTC) * If we have to rename the category, it would be something like 'Kingdoms mentioned in the Mahabharata along Saraswati river'. This is not at all an important category, and upmerging it would still leave the category visible in the articles. This is rather misleading. Jayakumar RG (talk) 03:18, 20 October 2014 (UTC) * The latter is not correct. If there would be consensus on upmerging, the upmerging process will take place automatically and the articles will be recategorised automatically. Meanwhile however, I guess it's difficult to reach consensus. Marcocapelle (talk) 13:57, 20 October 2014 (UTC) * WP:TRIVIALCAT applies too, since the categorization is peripheral to the topic's notability. Jayakumar RG (talk) 03:23, 20 October 2014 (UTC) * It's not very convincing to come up with new rationales all the time. Marcocapelle (talk) 13:50, 21 October 2014 (UTC) * Speedy keep and shut down - No policy backed rationale provided for the deletion. Bladesmulti (talk) 04:55, 20 October 2014‎ (UTC) * Speedy keep applies only when no argument was provided by the nominator at all. Here, an argument is provided and you should show why it is wrong. Speedy keep does not apply here. Jayakumar RG (talk) 13:00, 20 October 2014 (UTC) * Upmerge to the sole parent Category:Kingdoms_in_the_Mahabharata. – Fayenatic L ondon 21:00, 31 October 2014 (UTC) * Upmerge per FL. There is not enough evidence to show these are a distinct group that need seperate categorization.John Pack Lambert (talk) 04:30, 5 December 2014 (UTC) Category:CFR Cluj players * The result of the discussion was: merge. Good Ol’factory (talk) 03:29, 24 October 2014 (UTC) * Propose merging Category:CFR Cluj players to Category:FC CFR Cluj players * Nominator's rationale: Duplicate category TexasAndroid (talk) 14:19, 16 October 2014 (UTC) Category:Oklahoma articles without listas parameter * The result of the discussion was: no consensus. – Fayenatic L ondon 14:42, 5 December 2014 (UTC) * Propose deleting oklahoma articles without listas parameter * Nominator's rationale: This is really unnecessary tracking. As far as I'm aware, the only other project that has a category like this is Biography, which makes sense as biographical articles will likely have to be sorted by family name. On the other hand, Category:2006 in Oklahoma does not need to be sorted other than by its base pagename. Articles like Troy Aikman (via Talk:Troy Aikman) are also included, even though they do have a parameter for WPBIO. This makes even less sense, as these are alphabetized properly in all tracking categories (cf. Category:Top-importance National Football League articles or Category:Low-importance Oklahoma articles.) —Justin ( koavf ) ❤T☮C☺M☯ 09:16, 16 October 2014 (UTC) * Comment If people in that project use it to reduce the number of "without listas" problems in their topic area, then I don't see any problem with this. Talk page categories are not usually prime real estate that needs to be kept to a reasonable minimum. SFB 17:11, 16 October 2014 (UTC) * Listas is infrequently used. Not using it is normal and you would have fewer entries if the category was Category:Oklahoma articles using listas parameter. While not in that WP, I see no advantage to the category. I will admit that for some of the projects I work on I use it when needed. But out of say 3,000 articles, if you exclude people articles, the need for it probably runs well under 100 articles and my guess is most of those are for yearly events with yearly articles. Vegaswikian (talk) 20:01, 17 October 2014 (UTC) Category:Military personnel referenced in the Wehrmachtbericht * The result of the discussion was: no consensus on Category:Military personnel referenced in the Wehrmachtbericht, so merge others to it. – Fayenatic L ondon 14:48, 5 December 2014 (UTC) * Propose deleting military personnel referenced in the wehrmachtbericht * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, twice * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 3 times * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 4 times * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 5 times * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 6 times * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 7 times * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 8 times * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 10 times * Propose deleting Category:Military personnel referenced in the Wehrmachtbericht, 11 times * Nominator's rationale: That a military officer (e.g. Wilhelm Bittrich) was referred to in a radio broadcast is a WP:NON-DEFINING characteristic. See also Categories_for_discussion/Log/2014_August_3. DexDor (talk) 05:53, 16 October 2014 (UTC) * Keep Roughly 1,500 soldiers and officers were personally mentioned in the Wehrmachtbericht. In comparison 7,364 people received the Knight's Cross of the Iron Cross or one of its higher grades, Germany's highest award for military bravery and leadership. To be mentioned in the Wehrmachtberich is a very rare distinction and honour. See also MisterBee1966 (talk) 08:07, 16 October 2014 (UTC) * I am supportive of a merge into one category MisterBee1966 (talk) 07:41, 17 October 2014 (UTC) SBaker43 (talk) 07:29, 3 December 2014 (UTC) * Delete multiples People aren't generally grouped together on the numeric citational basis (i.e. 8 times is not profoundly different from 10 times, or 5 times for that matter). This is a poor choice of subcategory. The main category content seems to be at a manageable number and the category serves the purpose of grouping personnel of military note, but if division is necessary we could do so in many better ways (by rank, service or station, for example). SFB 17:16, 16 October 2014 (UTC) * Merge into groups. The root directory seems to be for those methioned once. Twice is a significant category. However all the "more than twice" categories can probably be merged. I know that this is effectively an award category, but this is a natioanl award. Peterkingiron (talk) 19:25, 16 October 2014 (UTC) * Merge all into Category:Military personnel referenced in the Wehrmachtbericht. Oculi (talk) 11:13, 17 October 2014 (UTC) * Delete no different than Categories_for_discussion/Log/2014_August_3 which we deleted. Why delete the UK one and keep the German one? Carlossuarez46 (talk) 22:06, 17 October 2014 (UTC) * Merge All/Neutral on Deletion I'm not sure this is defining but I'm way outside my areas of expertise here. If kept, merge them into one category. RevelationDirect (talk) 02:15, 19 October 2014 (UTC) * Merge all into one category per Oculi. Peacemaker67 (crack... thump) 11:11, 27 October 2014 (UTC) * Delete per reasoning given by Carlossuarez46. Similar categories in the past, if memory serves me a category for "Recipients of Army Achievement Medal", was deleted. This is about the same level of notoriety; therefore this article should be deleted.--RightCowLeftCoast (talk) 18:54, 5 November 2014 (UTC) * Not wanting to nitpick, but it's a category, RCLC, not an article. And a mention in the Wehrmachtbericht is not even remotely comparable to the award of the Army Achievement Medal. The German system was very different from the US or UK/Commonwealth systems. Peacemaker67 (crack... thump) 21:50, 8 November 2014 (UTC) * Keep or Merge per MisterBee1966. The context in which one's name is mentioned is an important aspect; the frequency of mention in some contexts would be a defining characteristic. If a person is discussed once in the Presidential Daily Briefing, it's significant; the number of discussions would be be a meaningful characteristic of their national importance; either friend or foe. I note that Super Bowl ring lists notable individuals who have won multiple Super Bowl rings. To quote Peacemaker67, "it's a category". * Merge all into one category per Oculi. Peacemaker67 (crack... thump) 11:11, 27 October 2014 (UTC) * Delete per reasoning given by Carlossuarez46. Similar categories in the past, if memory serves me a category for "Recipients of Army Achievement Medal", was deleted. This is about the same level of notoriety; therefore this article should be deleted.--RightCowLeftCoast (talk) 18:54, 5 November 2014 (UTC) * Not wanting to nitpick, but it's a category, RCLC, not an article. And a mention in the Wehrmachtbericht is not even remotely comparable to the award of the Army Achievement Medal. The German system was very different from the US or UK/Commonwealth systems. Peacemaker67 (crack... thump) 21:50, 8 November 2014 (UTC) * Keep or Merge per MisterBee1966. The context in which one's name is mentioned is an important aspect; the frequency of mention in some contexts would be a defining characteristic. If a person is discussed once in the Presidential Daily Briefing, it's significant; the number of discussions would be be a meaningful characteristic of their national importance; either friend or foe. I note that Super Bowl ring lists notable individuals who have won multiple Super Bowl rings. To quote Peacemaker67, "it's a category". * Delete This is basically a type of award. It comes under the criteria for award categories, and does not meet any of the rare exceptions for award categories and should be deleted.04:31, 5 December 2014 (UTC)
WIKI
User:Orangecholo/sandbox === Lev Zetlin (born July 14, 1918) was an American structural engineer known for engineering such projects as the New York State Pavilion at the 1964 World’s Fair and the Utica Memorial Auditorium. He held a number of patents, which included Structural Floor System Accommodating Multi-Dimensional Ducts (1974), employed in the La Guardia pier; Beamless Floor and Roof Structure (1975), used in the Utica Memorial Auditorium; Cantilever Roof Section, seen in the giant American Airlines Maintenance hangars in San Francisco and Los Angeles International Airports; and Structural Member of Sheet Metal, used in the Alcoa’s famous Paper Bridge. Lev Zetlin had a second career as a forensic engineer. He investigated the collapse of the walkways in the Kansas City Hyatt Regency on July 17, 1981. The collapse killed 114 people and injured 186, making it the most catastrophic collapse ever to occur in the United States. In recognition of his contribution to this field, he was awarded the National Forensic Engineer of the Year Award in 1993. === OVERVIEW Lev Zetlin was an internationally acclaimed structural engineer who ranked among the leading practitioners in his field. One would be hard-pressed to identify a 20th century engineer who did more than him to bolster the vitality and stimulate the advance of Civil Engineering. His imaginative use of structural shapes and materials, his creative and unconventional designs, and his interdisciplinary approach to problem solving, clearly distinguished him from his contemporaries. So, too, did his embrace of intuition and disregard of conventional wisdom, traits that were rare in his profession. His ability as an engineer attracted the attention of such famous architects as Philip Johnson and I.M. Pei. Both of these men engaged Zetlin to work with them on a variety of projects. He could take their architectural designs and translate them into physical reality in ways that refined and augmented their conceptual schemes. Johnson described Zetlin as "the best engineer I ever had--exciting, imaginative and reliable, a combination hard to get." High praise from one of the leading architects of the period. Moreover, Zetlin’s professional reach was global. His projects spanned the world, encompassing the United States, Europe, the Soviet Union, South America, the Middle East, India, and the Caribbean. He rose to prominence during an era in which the contours of building construction were in a state of flux. Conventional engineering as practiced over the last century was giving way to a new dynamic that introduced new aesthetics, new materials, new concepts, new labor conditions, and a new and greater emphasis on economy. Dr. Zetlin navigated through this new world with great skill and insight. In the last half of his career, he also excelled as an expert on structural forensics, investigating some of the most publicized engineering disasters of the late 20th century. Aware of the forces that were reshaping engineering, he was ideally suited to push the boundaries of engineering design and to quickly ferret out the root causes of structural calamities. For many aspects of both construction and forensic engineering, he accomplished truly ground-breaking work. Professionally, he is best known for his innovations in cable roofs and thin shells, special structures, kinetic structures, dynamic analysis, synthetic materials, and airport piers, hangars, and terminals. Dr. Zetlin’s engineering innovations and his ability to devise economical solutions to structural problems propelled his reputation. That reputation was further enhanced by his personality and character. He was extremely sociable, urbane, broadminded, and humorous, often telling jokes and entertaining anecdotes relating to the conversation or situation at hand. This eminent engineer was also well-rounded: he was a patron and aficionado of the arts, a philologist of some note, and a polyglot. One of his most engaging traits was his lack of pretense. He was direct without being offensive, devoid of affectation, straightforward, authentic, and amiable. He could laugh at himself and acknowledge his imperfections. He did not make assumptions about people but accepted them for who they were. What he said and did were not shrouded by ulterior motives or by subterfuge. Nor did he tailor his behavior or his actions with an eye towards achieving a favorable outcome in the future. He was what one might rightfully characterize as the archetypal straight shooter. PERSONAL LIFE Lev Zetlin had a cosmopolitan upbringing. He was born in Namangan, Russia on July 14, 1918. Lev was the son of Mayer and Alexandra (Senelnikoff) Zetlin. As a young child, he moved with his family to Tehran, Persia (Iran). There, Zetlin attended elementary and middle schools at American College in that city. Later, he and his family migrated to Palestine where Lev completed his education. He graduated from the prestigious Higher Technical Institute (Technion) in Haifa with a Civil Engineering Diploma in 1939. After graduation, Zetlin began matriculating at City and Guilds College, London University. He graduated from that institution in 1940 with a Diploma in Engineering (First Class). After the outbreak of World War II, he was commissioned in the British Army and served in that force from 1941 to 1943. Before deploying to North Africa, he was trained as an intelligence officer. Throughout the [second] Battle of Alamein, he was on the staff of the British Eighth Army, where he worked in the intelligence section and, because of his engineering expertise, oversaw a number of military construction projects for them. Lev Zetlin was with Montgomery’s Army during Operation Bertram, a deception operation conducted by the Allied forces in Egypt before and during the Battle of El Alamein. The operation employed engineers, architects, and a host of other technical specialists. It consisted of physical and electromagnetic deceptions that misled Rommel about the timing and location of the British attack (see comments in endnote #10). After his service in Montgomery's army, he was transferred to Tehran where he was assigned to the Russian Army as a liaison officer. He was an ideal choice: he spoke Farsi and Russian and had lived in both Iran and Russia. In 1944, he moved back to Palestine where he established a one-person engineering consulting office in Tel Aviv, which he maintained until 1950. While operating as an independent consultant, he concurrently served as chief structural engineer for what would later be called Israel's Department of Agriculture and Industrial Settlements. In 1945, he married Eve Shmueli with whom he later had three children: Alexandra, Thalia, and Michael. During Israel's War for Independence, he served as a company commander in the Haganah, where he learned how to evaluate people systematically, and became the Commanding Officer of the Civil Engineering Division of the Israeli Air Force. He held the rank of Captain in that organization from 1948 until his discharge from the service in 1949. His experience during the war was professionally and intellectually formative. It was while he was the Commanding Officer of the Israeli Air Force's Civil Engineering enterprise that Lev Zetlin acquired his sense for the intuitive elements behind structural design. Serving under wartime constraints, he designed and oversaw the construction of transmission towers and other military buildings. He often worked under tight schedules and dangerous battlefield conditions. His experience of performing demanding duties under difficult circumstances and with scarce resources sharpened his critical thinking and improvisational skills, which he needed in abundant measure to operate effectively in such an ambiguous and challenging environment. In 1950, he left Israel to study engineering in the United States at Cornell University. Israel's defense establishment sponsored his attendance. At Cornell, he refined the knowledge and experience gained in the war and expanded his intellectual horizons. From Cornell he received his Master's in Civil Engineering in 1951 and his Ph.D. in Engineering (Structural Engineering, Applied Mechanics, Soil Mechanics) in 1953. He was a Research Associate in Structural Engineering from 1951 to 1953 while in graduate school. Following his attainment of the Ph.D., he did not return to the Israeli defense establishment as planned but accepted a position as an assistant professor of Civil Engineering at Cornell. Dr. Zetlin remained in that post from 1953 to 1955. This academic appointment testified to his ability as an engineer: few graduates were accomplished enough to secure such an appointment immediately after earning their doctorate. Zetlin left Cornell in 1955 to set up his own multidisciplinary consulting firm -- Lev Zetlin Associates, Consulting Engineers -- in New York City, which he founded in 1956. He later set up branch offices in Boston, Atlanta, and Washington, D.C. Dr. Zetlin headed the enterprise until 1971, when he sold it to Gable Industries. He continued to play a key role in the firm’s operations until the early 1990s. Throughout his career, Dr. Zetlin maintained a foothold in the academic world. From 1956 to 1959, he was a Visiting Professor of Civil Engineering at Manhattan College. During that same period, he was a guest lecturer at Columbia University and the University of Minnesota. Lev Zetlin also served as a professor of Civil Engineering at Pratt Institute, where he held the title of Professorial Lecturer in the School of Architecture from 1961 until 1970 and  Distinguished Professor of Engineering from 1985 to 1987. In 1968, he made a major career move, accepting a position as University Professor of Architecture and Engineering at the University of Virginia, where he served concurrently as the Director of UVA’s Center for Research and Innovation for Building (CRIB); he left that position in 1976. Dr. Zetlin held a number of other appointments and positions during these two decades as well. He was a consultant to the Union Carbide Corporation and served as Chairman of that firm’s Research Bureau; a member of the Manhattan College Board of Consultants in Civil Engineering; the Architectural Critic for CCNY’s College of Architecture; a member of the U.S. President’s Advisory Board Panel for the General Services Administration; and an advisor to the U.S. Department of Commerce and HUD on construction and housing. He was also on the Editorial Board of Building Construction Magazine; President of the International Technical Cooperation Center, an international organization devoted to fashioning sustainable national development objectives for emerging economies; and a member of the International Board of Consultants for the $1.2 billion Montreal Stadium and Olympic Structures. In the late seventies, Dr. Zetlin began a second career as a forensic structural investigator. It is at this time that he set up Zetlin-Argo, a firm that specialized in the investigation of structural failures. Zetlin and his firm were hired as engineering detectives to probe disasters and took the lead or played a very significant role in a number of high-profile cases. He investigated the collapses of the Hartford Civic Center roof in 1978;  the Pleasants Power Station in West Virginia in 1979 (at the time, the deadliest construction accident in U.S. history, responsible for the deaths of 51 workers); the Kansas City Hyatt’s suspended walkway in 1981 (in which 110 people died); the Mianus River Bridge (Connecticut) on I-95 in 1983; the PATH station roof at Journal Square in New Jersey in 1983; the L’Ambiance Plaza Building in Bridgeport, Connecticut in 1987; and the Daytona apartment complex collapse in 1989. Zetlin was also engaged to prevent disasters. He was hired by prospective buyers of high-rise buildings in New York City to analyze the impact of high street-level winds on structures and pedestrians. Dr. Zetlin became so concerned about the wind problem that he proposed new laws be adopted to counteract the dangers of street-level winds. “The inertia of our profession is to stay just to the building you’re designing,” he declared. “There should be a city ordinance to make sure that, when somebody designs a tall building, tests are done to prevent severe winds on the street.” Profiles of and interviews with Dr. Zetlin appeared frequently in prominent publications, among them Business Week, Fortune, Discover, Engineering Today, Progressive Architecture, L’Architecture d’Aujourd’hui, and Modern Steel Construction. Notable newspapers like the New York Times, Hartford Courant, and Detroit News carried feature stories about him and his many accomplishments. Descriptions of his projects and ideas also appeared in leading professional publications, such as Proceedings of the American Society of Civil Engineers, Journal of the American Concrete Institute, and The Military Engineer. Several distinguished scholars wrote books about Zetlin. The most detailed and analytical of these was entitled Emerging Form in Architecture: Conversations With Lev Zetlin. Another book that focused on Zetlin as well as other leading engineers and architects of the 20th century was written by Ivan Margolius and entitled Architects and Engineers=Structure. Lev Zetlin himself was a prolific author. In addition to a host of articles appearing in professional journals, he wrote chapters on structural topics for the Handbook for Civil Engineers and the Handbook for Structural Engineers as well as an entry on “Stadiums” for the Encyclopedia Britannica. Dr. Zetlin also held a number of patents. They included (1) Structural Floor System Accommodating Multi-Dimensional Ducts (1974), employed in the La Guardia pier; (2) Beamless Floor and Roof Structure (1975), used in the Utica Memorial Auditorium; (3) Cantilever Roof Section, seen in the giant American Airlines Maintenance hangars in San Francisco and Los Angeles International Airports; and (4) Structural Member of Sheet Metal, used in the famous Paper Bridge (More about these patents in the next section under Significant Accomplishments). In his later years, he lived and practiced engineering in Manhattan and Palm Beach, Florida. He continued to work until his untimely death in 1992. Lev Zetlin passed away at the age of 74 years at St. Mary's Hospital in Milwaukee. PHILOSOPHY and METHODOLOGY Lev Zetlin was a philosopher as well as an engineer. His philosophy infused the projects he undertook and the courses he taught. The Philosophy of Engineering and Structure was one of his most frequently offered and well-attended courses at Pratt Institute. He was fond of quoting various masters to illustrate the principles by which he lived and worked and of lacing his speeches and conversations with philosophical allusions. Dr. Zetlin appreciated the pragmatism and instrumentalism of Machiavelli and would hand out a copy of The Prince to all engineers upon joining his firm. One of the lessons that Zetlin hoped his engineers would extract from Machiavelli was a sense for the importance of economy in the projects they undertook. Aesthetics were important, he would say, but so were cost and durability. To Dr. Zetlin, engineering was more than facts, figures, calculations, and margins of safety. It was also a world of imagination, creativity, and intuition. His philosophical approach to life and engineering fed his intuitiveness, which in turn helped him conceptualize engineering projects holistically and look for how all the many separate components of a particular project were connected. Zetlin’s holistic perspective served him well because he lived in an era when the old linear concepts of engineering were eroding. As buildings grew in height and complexity, old models and methodologies lost much of their relevance. A new intellectual model emerged, one which promoted an emphasis on an integrated and comprehensive approach to construction and problem solving rather than on the narrowly focused procedures of the past. It was Dr. Zetlin’s iconoclasm that played a key role in forging this new paradigm. Many structural design formulas, Zetlin contended, rested on simplified assumptions about the properties of materials, loads, and conditions. He believed that building codes and engineering books brimmed with nonsensical provisions that had no basis in fact. Many of the fundamental tenets of engineering practice rested on stereotypical approaches and outdated standards that were too unwieldy to adapt to unanticipated engineering conditions. Construction became—from design to use—part of a complex social, economic, and political system. Engineers now had to consider a great number of complex variables simultaneously. They could no longer operate in a world of standard formulas and prepackaged reactions. Lev Zetlin dealt with modern construction issues in several ways. Freed from fixed patterns of thought and traditional methods of engineering, he innovated and approached projects on their own terms. Zetlin’s world was one of connected force and counterforce, stress and strain. These forces held a building’s structural form together and were susceptible to endless manipulation and adjustment. Dr. Zetlin insisted on more precision in engineering design and resorted to various methods to achieve this. Among them was his use of modern analytic tools. In fact, Dr. Zetlin was one of the pioneers in this field. As early as the 1960s, he employed such tools as computer-aided design programs and wind-tunnel tests to find solutions to construction problems. Sophisticated stress analysis, mathematical simulations, and optimization algorithms were also pieces of his analytical arsenal. The new analytical tools allowed a more precise calculation of the optimum, which involved a delicate balance among a host of factors -- cost, space, aesthetics, location, and available labor, among others. Zetlin realized that the optimum solution could not be found until all the conditions affecting the problem were known. And by the late 20th century, these variables had grown beyond the ability of a single person to comprehend them. Modern analytical tools could help close the conceptual gap and improve the capacity of the engineer to cope with the new construction calculus. To deal with the increasing complexity of engineering, Dr. Zetlin also adopted an interdisciplinary approach to construction. He often remarked that we no longer lived in the world of the lone-wolf engineer. The days of Thomas Edison, he quipped, were over. As the building process became more complex, its parameters necessarily expanded. Engineers now had to consider factors such as architectural requirements, the construction sequence, field conditions, materials, and project economics—factors that they previously had not looked at holistically. A good example of the need for an interdisciplinary approach to engineering was the building of the La Guardia Pier. In that project, Zetlin had to bring civic and aeronautical engineers together to design a runaway that was viable and affordable. The former had to redesign the pier while the latter had to widen the wheelbase of the airplane. Only in this way could an affordable solution be achieved. Lev Zetlin employed the theme-and-variation method of design. All ideas, once developed and articulated, were later re-examined, refined, and used again. Changes that started as evolutionary building adjustments appeared later as major urban elements. The hyperbolic panels of Israel’s nuclear reactor were seen a decade later in the gigantic cantilevers of the American Airline terminals in Los Angeles and San Francisco and in a market roof for Montreal. The self-dampening cable system that Dr. Zetlin patented appeared for the first-time in 1955 with the construction of the Utica Auditorium. It made another appearance in 1964 in the New York State Pavilion at the New York World’s Fair and in his design of a cable system to transport ships across the Isthmus of Panama in 1972. Other engineers borrowed his innovation. For example, the self-dampening cable system was employed in the construction of Madison Square Garden in 1968. SECOND CAREER as a FORENSIC ENGINEER Dr. Zetlin’s second career as a forensic engineer became intertwined with the methods and tools he had employed as a construction engineer. That career took off when he was called in as an expert on a rash of structural disasters that began in the late 1970s and extended through the early 1990s. Many of these disasters resulted from trends that Lev Zetlin had previously identified and pioneered ways to counteract. According to Dr. Zetlin, these disasters sprang from the use of traditional engineering and design methods. The methods used were imprecise constructs that worked fine in an earlier era of smaller buildings and different labor conditions but did not work so well in an era when new materials with different properties, sophisticated structural connections, prefabricated components, and the deterioration of field skill had introduced new dynamics into the construction business. The result sometimes proved disastrous. Lev Zetlin excelled in his second career and gained quite a reputation as a forensic engineer. In recognition of his important contribution to this field, he was posthumously awarded the National Forensic Engineer of the Year Award in 1993. This award was given to innovators who contributed most to the Science of Engineering Forensics, were exemplary in their pursuit of forensic solutions, and guided the development and education of young engineers. VIEW of CIVIL ENGINEERING In light of his character and personality, it should come as no surprise that Dr. Zetlin held a rather unique perspective on his profession. He clearly recognized its shortcomings. Engineering, he would say, was not an exact science. Whatever the image of a Civil Engineer had been before the last half of the 20th century, he felt that image was no longer adequate to meet the contemporary challenges of the profession. The modern Civil Engineer, he was convinced, had to know more than how to calculate torque, tension, and the modulus of elasticity. Engineers had to be attuned to the needs of society and to changes in human values; be able to apply the immense store of modern technology to their work; and be mindful of the economic capability of our society and of the nation when planning projects. In this environment, the traditional lexicon and theories of Civil Engineering became obsolete; as did the traditional fragmentation of Civil Engineering into the specialties of sanitary, highway, hydraulics, structural, and other branches of the profession. The boundaries between the various fields of science were disintegrating, as were the boundaries between the varied fields of engineering. No field of specialized engineering endeavor, he wrote, could operate in a vacuum independently of other branches of technology or human sciences. For example, sanitary engineers were no longer assigned the function of designing a sewage plant just to process the sewage. They had to now consider the effects of the operating plant on the environment, the future economic development of the area, the transportation system, and other impacts on the community. He also warned repeatedly that the plant could not be designed by following handbooks: engineering, financing, and all the other functions that affected the construction process had to be considered in the design. And these developments and the responses of users were subject to frequent change.
WIKI
JudyAnn Bigby JudyAnn Bigby is an American doctor and the former Secretary of the Executive Office of Health and Human Services of the Commonwealth of Massachusetts from 2007 to 2013. She currently serves as director of the Harvard Medical School Center of Excellence in Women's health. Prior to becoming Secretary, Bigby was a primary care physician and medical director of Community Health Programs at Brigham and Women's Hospital. One of her patients was Boston Mayor Thomas Menino, who declared January 18, 2001 "Dr JudyAnn Bigby Day" in Boston. In addition to her work as a doctor, Bigby was also an Associate Professor of Medicine at Harvard Medical School and Director of the school's Center of Excellence in Women's Health. A resident of Jamaica Plain, Bigby holds a B.A. from Wellesley College and an M.D. from Harvard Medical School.
WIKI
-- Deutsche Bank Found Partly Liable Over Kirch Media Bankru Deutsche Bank AG (DBK) was found partially liable over the collapse of Leo Kirch ’s media group and must pay damages, which will be determined later, a German court said. The Munich Higher Regional Court ruled the lender and its former Chief Executive Officer Rolf Breuer are liable for statements in 2002 before the Kirch group filed for bankruptcy. The late media magnate’s heirs seek as much as 2 billion euros ($2.6 billion). The case is one of several lawsuits continuing after Leo Kirch’s July 2011 death that allege the bank secretly plotted to bring about the end of his media empire. Part of the conspiracy, they argue, was a 2002 interview on Bloomberg Television in which Breuer said “everything that you can read and hear” is that “the financial sector isn’t prepared to provide further” loans or equity to Kirch. After almost two years of hearings, the court next will hear more testimony from expert witnesses on how much to award in damages, Presiding Judge Guido Kotschy said. The trial spawned its own criminal probe over Breuer’s testimony last year. Former Deutsche Bank CEO Josef Ackermann , former Chairman Clemens Boersig and former board member Tessen von Heydebreck are also under investigation over their testimony in the case. Deutsche Bank has denied wrongdoing by any of its executives. Always Setbacks “In every litigation that takes that long, there are always setbacks like this one today,” Peter Heckel, a lawyer for the bank, said. “But this isn’t the end of the story.” The court ruled today on appeal, overturning a lower court’s dismissal of the suit. The judges said Deutsche Bank can’t fight the case further. Heckel said the bank will analyze the written judgment and then decide whether to petition the top court to allow a second appeal. At the last hearing, in November, Kotschy urged them to settle, saying the court would likely find the bank liable, at least in part, and damages could range from 120 million euros to 1.5 billion euros. The court hasn’t changed its assessment since then, he said today. This case bundled claims by 17 former Kirch companies in the group. Six units’ cases were dismissed. The judges said one, Kirch Media, can seek damages because it had to sell 70 million shares of ProSiebenSat.1 Media AG (PSM) in August 2003 for 7.50 euros per share. Alongside 10 others, including one that held a Formula One stake and the sports broadcasting rights group, it can also claim damages caused by the Breuer interview, they ruled. New Rule “This court intends to create a new legal rule: holding a person liable for making use of his freedom of speech while making use of his constitutional right to the free exercise of your profession,” Markus Meier, another lawyer for Deutsche Bank, told the judges today. “The top civil court must look into whether that legal creation should be allowed to stand.” Deutsche Bank rejected a settlement offer in March. The lender and Kirch’s heirs discussed a possible 800 million-euro deal, a person with knowledge of the negotiations said at the time. The Frankfurt-based bank last year was said to have rejected a 775 million-euro accord proposed by the Munich court. Kirch, who was 84 when he died, sought as much as 3.3 billion euros in his claims against Breuer and Deutsche Bank. He started his legal battle in 2002 after his group filed the biggest German bankruptcy. A case seeking about 1.5 billion euros is pending at another chamber of the same Munich court. Today’s case is: OLG Muenchen, 5 U 2472/09. To contact the reporter on this story: Karin Matussek in Berlin at kmatussek@bloomberg.net To contact the editor responsible for this story: Christopher Scinta at cscinta@bloomberg.net
NEWS-MULTISOURCE
Legion Ascot Speedway Legion Ascot Speedway was an American race track in Los Angeles, California that operated from 1924 to 1936. It hosted AAA Champ Car races. Early success under Bentel ends with a scandal After the construction of a $5⁄8$-mile dirt oval near Lincoln Park had been announced in early December 1923, the new Ascot speedway, which was built by promoter George R. Bentel and his publicist Bill Pickens, opened on January 20, 1924, when 35,000 spectators attended the inaugural event, which featured both auto and motorcycle racing. The next racing program, which was held two weeks later, was marred by the tracks' first fatality when Jimmy Craft was killed on the southeast turn. Many drivers would die at this curve, which was immediately nicknamed "death curve." The promotion of Ascot during the first months of its existence was a popular and financial success. However, the Ascot Gold Cup, a road race held on Thanksgiving Day 1924, saw its outcome challenged by drivers contesting both the eligibility of other competitors to participate and the official race distance. Drivers also charged that prize money had been withheld. Bentel and other officials of the Ascot Speedway Association were handed suspended 30-day jail sentences for false advertising in April 1925. In the meantime, Ascot had been taken over by the creditors' committee of the association, the new management being headed by its trustee John S. White, who scheduled the next racing event for late January 1925. The site was run unsuccessfully by various promoters in the years that followed, occasionally serving as a venue for boxing matches. Fame and mounting deaths under the American Legion The American Legion Post 127 of Glendale, which had started promoting the track in the fall of 1928, entered into a long-term lease of the property in early March 1929, having secured AAA sanction for the American Legion Speedway. 15 months later, it was renamed Legion Ascot Speedway based on the legionnaires' assessment that they had rehabilitated "Ascot," giving the track the name it would be widely known by. Major drivers raced at the track such as Bill Cummings, Al Gordon, Ernie Triplett, Kelly Petillo, Wilbur Shaw and Rex Mays. It also attracted celebrity spectators such as Bing Crosby, Andy Devine, Loretta Young, Clark Gable, Charlie Chaplin, Edward G. Robinson, Douglas Fairbanks Jr., Clara Bow and Carole Lombard. Actresses sometimes presented trophies to the winning drivers. The high speeds the racers reached contributed to heavy and spectacular crashes at the speedway. About two dozen people died in the twelve years that Legion Ascot operated, earning it the nickname "killer track." It had the most deaths of any American race track in that time period. In 1933 alone, six deaths occurred, stirring turmoil in the newspapers as racing continued before large crowds. The Legion leaves, final fatalities and fire In July 1934, a flat half-mile dirt oval was opened. It was built inside the old track, the banked five-eighths-mile oval, which at some point had been paved with asphalt and was reopened in November of the same year after its south curve had been refurbished for safety purposes. With the bulk of its tenure a profitable effort, the Glendale American Legion post had been facing a host of problems since 1934: anti-racing sentiment in the public, upcoming competition from midget car racing luring away popular drivers and waning interest among the fans as a consequence, as well as disagreements with the lessors on rent and other issues. Hence the leasing contract was not renewed and expired at the end of September 1935. Management of Ascot was then assumed by former race car owner and promoter Bill S. White, who was asked to do so by his peers. The last race was to be held on January 26, 1936, when both Al Gordon and his riding mechanic, Spider Matlock, suffered fatal injuries as a result of a crash. The track was closed, being denied an AAA license. In late April 1936, a quarter of the grandstand of the abandoned speedway was destroyed by fire. Seven years later, Linden Emerson, a former janitor at the track, turned himself in, confessing that he had burned down the grandstand because he did not want to see any more of his friends die there. Today, Multnomah Elementary School and a tract of houses cover the land that Legion Ascot Speedway had occupied. The dangerous "south curve" remains as a curve in Hatfield Place, being the only trace of the track and its checkered history. Series of Ascot race tracks Legion Ascot was the second of four Ascot sites in Los Angeles after the original one-mile South-Central oval was open between 1907 and 1919. Ascot Park was then replaced by a Goodyear tire factory. A third site, which opened as Southern Speedway near South Gate in June 1936, was renamed Southern Ascot in January 1938 and held races on a half-mile dirt oval until 1942. The fourth track in the series was Ascot Park in Gardena, which operated from 1957 through 1990.
WIKI
My Way Is My Decision My Way Is My Decision is the first single of Slovenian Alpine skier Tina Maze released in 2012. Background While in primary school, in addition to skiing, Maze also played piano. During preparations for the 2013 season she recorded her first song "My Way Is My Decision". She also blogged about the story on her trip into music. The news of Maze becoming a "popstar" or "rockstar" was a celebrity news in her country and she got some attention in foreign media too. Song writing The song "My Way Is My Decision" was produced by Raay, one of the top Slovenian producers and music written by Matjaž Jelen & Raay, lyrics by Charlie Mason & Leon Oblak. It's a modern mainstream radio-friendly up-tempo song with a hint of rock. It was released on 26 October, the day before the first race of the season in Solden. The music video has become the most viewed new video on YouTube by a Slovenian music artist as it reached over 400,000 views in less than 3 days, which is Slovenia's fastest growing video in music business industry. In February 2013, it reached 1,000,000 views. Credits and personnel * Raay – music, arranger, producer * Matjaž Jelen – music * Charlie Mason – lyrics * Leon Oblak – lyrics * Tina Maze – vocals
WIKI
Chinese, European companies express interest in Chile-Argentina tunnel SANTIAGO (Reuters) - Ten consortiums including companies from China and Europe formally expressed interest on Wednesday in building a landmark $1.5 billion tunnel under the Andes mountains to connect Argentina and Chile. Chinese companies Power China and the Chinese Communications Construction Company, Spain’s OHL and FCC, and Italy’s Astaldi and Salini Impregilo are among the interested parties, Chile’s minister of public works Alberto Undurraga said. The planned Agua Negra tunnel would be over 13 kilometers (8 miles) in length and would connect Chile’s Coquimbo region with the Argentine province of San Juan, both mining regions. The tunnel would be able to operate year round, unlike existing cross-border roads that pass over the Andes and often must close during winter snowstorms. Both Chile and Argentina are revamping their infrastructure, drawing interest from Asian companies for the first time. Infrastructure in the area has traditionally been dominated by Spanish and Italian companies. On Tuesday, Chile said it received five offers to build a new highway in Santiago, including the first bid by a Chinese company for a metropolitan highway concession in Latin America. Building the tunnel would be an ambitious and complex project that would likely take more than 10 years to complete, Argentine Transport Planning Secretary German Bussi said at the event. The tender for the project is due to start in September or October, said Undurraga. Reporting by Fabian Cambero; Writing by Gram Slattery, Editing by Rosalba O'Brien and David Gregorio
NEWS-MULTISOURCE
Avon, Massachusetts Avon is a town in Norfolk County, Massachusetts, United States. The population was 4,777 at the 2020 census. History The first settler in the land that would become Avon was Moses Curtis (c. 1720), a blacksmith from Braintree, Massachusetts. With most of his surviving children living near him, by 1749 the locale was called Curtis Corners. The Third Baptist Meeting House was erected in East Stoughton on March 30, 1848. Following a petition sent through the Massachusetts House of Representatives and the Massachusetts Senate, the new town of Avon was separated from Stoughton and incorporated on February 21, 1888. The town was named after Stratford-upon-Avon, Warwickshire, England. The town's seal features a portrait of William Shakespeare, who was born in Stratford-upon-Avon. Geography According to the United States Census Bureau, the town has a total area of 4.6 sqmi, of which 4.4 sqmi is land and 0.2 sqmi (4.16%) is water. Avon is bordered by the City of Brockton on the south, Stoughton on the west, Randolph on the northeast, and Holbrook on the east. Avon is 17 mi south of Boston. Demographics At the 2000 census, there were 4,443 people, 1,705 households and 1,220 families residing in the town. The population density was 1,014.7 PD/sqmi. There were 1,740 housing units at an average density of 397.4 /sqmi. The racial makeup of the town was 93.45% White, 3.74% African American, 0.27% Native American, 0.92% Asian, 0.77% from other races, and 0.86% from two or more races. Hispanic or Latino of any race were 1.44% of the population. There were 1,705 households, of which 26.7% had children under the age of 18 living with them, 55.5% were married couples living together, 12.0% had a female householder with no husband present, and 28.4% were non-families. Of all households 23.5% were made up of individuals, and 12.3% had someone living alone who was 65 years of age or older. The average household size was 2.61 and the average family size was 3.13. Age distribution was 22.5% under the age of 18, 7.0% from 18 to 24, 28.8% from 25 to 44, 24.2% from 45 to 64, and 17.6% who were 65 years of age or older. The median age was 40 years. For every 100 females, there were 91.8 males. For every 100 females age 18 and over, there were 88.0 males. The median household income was $50,305, and the median family income was $60,625. Males had a median income of $41,582 versus $32,837 for females. The per capita income for the town was $24,410. About 4.3% of families and 6.6% of the population were below the poverty line, including 12.5% of those under age 18 and 4.2% of those age 65 or over. Government Avon is governed by a three-person Board of Selectmen who appoint a Town Administrator to carry out the day to day executive functions of the Board. Legislation is enacted in an Open Town Meeting. Education The Avon School District serves Avon. Transportation The town is served by the Brockton Area Transit Authority and the Massachusetts Bay Transportation Authority (MBTA), which provide public transit service to Brockton and Boston.
WIKI
How Do Desert Turtles Adapt to Their Land? Jupiterimages/Comstock/Getty Images Desert tortoises (Gopherus agassizii) are terrestrial turtles that live in both the United States and Mexico. In the U.S., they roam throughout Nevada, Arizona, California and Utah. Like many other varieties of animals, desert tortoises have a handful of convenient adaptations that help make their lives easier. Basic Information Desert tortoises are of the family Testudinidae. They have deep brown, green or gray upper shells and lighter lower ones, usually yellow, that are usually between 9 and 15 inches long. Desert tortoises generally weigh between 8 and 15 pounds, with heights of 4 to 6 inches. The herbivores feed mostly on flowers, stems, forbs, foliage, shrubs, grass and herbs. Cacti are desert tortoise dining favorites. Since fully mature individuals of this species have such dense and sturdy shells, predation isn't often a massive worry for them. However, mountain lions do indeed have the ability to get through their shells. Sandy dirt is a must for them. Temperature Adaptation Since desert tortoises are often desert inhabitants, they are all too familiar with dry and hot climates. They try to minimize temperature discomfort by heightening their movement during monsoon weather, which is a period of milder temperatures and more easily available H20. They further attempt to adapt to their surroundings by being the busiest during the morning and evening hours of the day. Water Adaptation Mature desert tortoises have the ability to manage for a minimum of a year without taking in any water. This is courtesy of their water-stashing abilities, as they are capable for setting the stuff aside within their urinary bladders. Desert tortoises frequently retrieve water out of their meals, which is extremely handy for life in the middle of arid and harsh desert lands. When they do gain access to water, however, they tend to take in lots of it at once. Burrowing Adaptation In unpleasant and seemingly unrelenting times of excessive heat, desert tortoises typically aim to gain relief through burrowing. Burrowing is how they manage amidst soil temperatures that are sometimes even higher than 140 degrees Fahrenheit. They use their front limbs to dig out these relaxation spots. Their limbs are simultaneously sturdy, flat and robust -- all major pluses for digging. They're equipped with long and pointy claws, another big advantage. Desert tortoises also frequently use burrows when it simply is too cold to search for food. Their burrows are often anywhere between 3 and 6 feet in depth. Shell Shape Adaptation Desert tortoises possess carapaces that are dome-like in form. The outline of their shells not only offers their lungs ample room, it also helps desert tortoises maintain their body temperatures. Photo Credits • Jupiterimages/Comstock/Getty Images
ESSENTIALAI-STEM
Page:National Lyrics.pdf/241 Rh I bless thee!—yet not for the beauty which dwells In the heart of thy hills, on the rocks of thy shore; And not for the memory set deep in thy dells, Of the bard and the hero, the mighty of yore; And not for thy songs of those proud ages fled, —Green land, Poet-land of my home and my dead! I bless thee for all the true bosoms that beat, Where'er a low hamlet smiles up to thy skies, For thy cottage hearths, burning the stranger to greet, For the soul that shines forth from thy children’s kind eyes! May the blessing, like sunshine, about thee be spread, Green land of my childhood, my home, and my dead!
WIKI
Nigel Farage says Meghan Markle made Prince Harry less popular A UK politician has criticized Meghan Markle, claiming the former actress made Prince Harry's popularity "fall of a cliff."Brexit Party leader Nigel Farage said the Duke of Sussex was "the most popular royal" until he met Markle, in a recording obtained by The Guardian.Farage was speaking at the Conservative Political Action Conference in Sydney when he reportedly made the comments, although a spokesperson for the politician told the BBC the comments weren't part of his speech.Several sources who attended the event told The Guardian that he referred to Harry as "the prince of wokeness."Visit INSIDER's homepage for more stories.Nigel Farage has claimed Prince Harry was "the most popular royal" until he met Meghan Markle.The Brexit Party leader made comments about the Duke and Duchess of Sussex during the Conservative Political Action Conference in Sydney, The Guardian initially reported.Read more: Prince Harry and Meghan Markle's friends have reportedly stopped inviting them to dinner parties because of their PDA, and an etiquette expert says they have a point"Well, if I want the Queen to live a long time to stop Charlie Boy becoming king, I want Charlie Boy to live even longer and William to live forever to stop Harry becoming king," said Farage, in a recording obtained by the newspaper. "Terrifying! Here was Harry, here he was this young, brave, boisterous, all male, getting into trouble, turning up at stag parties inappropriately dressed, drinking too much and causing all sorts of mayhem," he went on."And then, a brave British officer who did his bit in Afghanistan. He was the most popular royal of a younger generation that we've seen for 100 years."And then he met Meghan Markle, and it's fallen off a cliff." The politician also addressed Harry's comments that he and Markle will only have two children, saying: "We've been told in the last week that Meghan and Harry will only have two children … and we're all completely ignoring, the real problem the Earth faces, and that is the fact the population of the globe is exploding but no one dares talk about it, no one dares deal with it, and whether Prince Harry has two kids is irrelevant given there are now 2.6 billion Chinese and Indians on this Earth."Read more: Prince Harry said he wants to have 'maximum' 2 children with Meghan MarkleSeveral sources who were at the event told the paper he referred to Harry as "the prince of wokeness," although this was not included in the recording, The Guardian noted.The party leader is also said to have criticized the late Queen Mother, calling her an "overweight, chain-smoking gin drinker" in the voice clip.While The Guardian reports Farage's comments were made during his speech at the conference in Sydney, a representative for the party leader told the BBC that these comments were not part of the speech. INSIDER has contacted Nigel Farage's representatives for comment. Our Royal Insider Facebook group is the best place for up-to-date news and announcements about the British royal family, direct from Insider's royal reporters. Join here. Read the original article on INSIDER. Copyright 2019. Follow INSIDER on Facebook. Follow INSIDER on Twitter.
NEWS-MULTISOURCE
Project 1 Calculations 301 days ago by sehunt2000 The Collatz conjecture, as known as the Hailstone sequence, is the 3n+1 problem which can be defined as the following function f(n) where n must be a positive integer greater than one and f(n) is used to produce the next value in the Collatz conjecture.  def f(n): #defines f(n) if n.is_integer() and n >0: #checks if n is a positive integer greater than 1 if n==1: return(0) elif is_odd(n): return(3*n+1) else: return(n/2) else: return("Please enter a positive integer.")          f(6)          3 3 f(-2)          'Please enter a positive integer.' 'Please enter a positive integer.' f(9)          28 28 To obain all iterations within a specific n value's Collatz conjecture, the equation f(n) is used continuously until terminated by the values 4-2-1. Sage is a very useful tool when computing conditonal values as such, especially larger values with lots of iterations.            def f_seq(n): # function to display sequence of Hailstone numbers for n L = [n] # sets values in brackets x = n while x != 1: # checks if input is not 1 x=f(x) # plugs input into f equation L.append(x) # adds vaule to existing list return (L)          f_seq(12)          [12, 6, 3, 10, 5, 16, 8, 4, 2, 1] [12, 6, 3, 10, 5, 16, 8, 4, 2, 1] f_seq(29)          [29, 88, 44, 22, 11, 34, 17, 52, 26, 13, 40, 20, 10, 5, 16, 8, 4, 2, 1] [29, 88, 44, 22, 11, 34, 17, 52, 26, 13, 40, 20, 10, 5, 16, 8, 4, 2, 1] f_seq(44)          [44, 22, 11, 34, 17, 52, 26, 13, 40, 20, 10, 5, 16, 8, 4, 2, 1] [44, 22, 11, 34, 17, 52, 26, 13, 40, 20, 10, 5, 16, 8, 4, 2, 1]           What if we only want the value for the number of iterations it takes f(n) to reach the Collatz conjecture? def f_its(n): # defining function to calculate number of iterations x = n its = 1 # creates a starting point for counting at 1 to consider original n while x != 1: x=f(x) its = its + 1 return(its)          f_its(12)          10 10 f_its(50)          25 25 f_its(429)          103 103 f_its(29)          19 19 Now that we can calculate the value of f(n), the entire range of values for f(n), and the number of iterations of f(n), we will observe their behavior linearly. hailstone=[[1,0]] # defines initial point champions=[] # creates variable for outliers max_value_seen=3 # creates max value variable for i in srange(2,10001): # applies range for vaules stepcounter=0 n=i while n> 1: # while loop to generate x component n=f(n) # sets n into f(n) stepcounter+=1 # counter to obtain number of iterations if stepcounter> max_value_seen: # if statement to check for outliers max_value_seen = stepcounter # sets max value to counter when it occurs champions.append([i,max_value_seen]) # correlates max value to champions hailstone.append([i,stepcounter])          Here we can see the hailstone values for n with a range up to 10,000. Although f(12) only has 10 iterations to reach the Collatz conjecture, we can observe all iterations of every value produced.  list_plot(hailstone[12:10000])          list_plot(hailstone[12:500])          list_plot(hailstone[12:100])          Notice, there are values far from the general trend of log and decay curves. These values are called champions, which take longer than any other iterations within f(n). list_plot(champions)          We can see that the champion values have a general pattern of the log curve. Why is this important? Taking this for example and looking back at the previous hailstone plots, we can see that 2 general patterns occur, a positve logrithmic curve a negative decay curve. What does tell us about the iterations of f(n)?                              
ESSENTIALAI-STEM
Page:Points of View (1924).pdf/375 some débris of humanity. . . . The people, you say! The people is yourself and myself. It would be useless to deny it. There are not two races. . . . No, no, people do not isolate themselves; the ties of blood are not broken; people do not curse or scorn their kind. Humanity is not a vain word. Our life is composed of love, and not to love is to cease to live." This is, if you please, an effusion of sentiment, a chant of faith. In a world more and more given to judging trees by their fruits, we should err if we dismissed this sentiment, this faith, too, lightly. Flaubert may have been a better disputant; he had a talent for writing. George Sand may have chosen her side with a truer instinct; she had a genius for living. This faith of hers sustained well the shocks of many long years, and this sentiment made life sweet.
WIKI
Talk:Bryan Robinson (physician) Untitled The pages from VIAF and the library of congress given in the authority control template do seem to refer to this author, but they seem to be attributing works of a much more recent author to him. I can't decide what to do with them so I will leave them in for now. James500 (talk) 18:03, 10 August 2013 (UTC)
WIKI
Gosport and Fareham R.F.C. Gosport and Fareham R.F.C. is a Rugby Union club located in Gosport in Hampshire, England, with home games and training taking place at Gosport Park on Dolphin Crescent. The men's first XV currently play in London 3 South West (a league at level 8 of the English rugby union system) following their relegation from London 2 South West at the end of the 2018–19 season. The men's second XV will play in Hampshire Premier (level 9) from the 2018–19 season. History / Background Gosport and Fareham R.F.C. was founded in 1946. In 2004 the club built a new clubhouse at a cost £800,000 funded by Sport England and various Councils. While the 1st XV play in the London 2 South West, the 2nd XV play in the Hampshire Merit One league and the 3rd XV play in friendly matches but are looking to return to competitive rugby. The club is a community rugby club and has a very active mini youth section from U6 - U12 (School Year 7, along with youth teams U13 - U16 (School Year 11). There is also Colts team (U17-U18). Honours * Hampshire 1 champions (2): 1987–88, 1993–94 * Hampshire Plate winners: 1993 * London 2 South West champions (2): 1999–00, 2011–12 * London 2 (south-east v south-west) promotion playoff winners (2): 2000–01, 2013–14 * Hampshire Bowl winners: 2010 * Hampshire Cup winners: 2011 * London Division 3 South West champions: 2009–10
WIKI
NCLEX RN Practice Question # 888 NCLEX Examination. Practice Question # 888. nclex examination Basics of Electrocardiography ▪ An electrocardiogram (ECG) reflects the electrical activity of cardiac cells and records electrical activity at a speed of 25 mm/second. ▪ An electrocardiographic strip consists of horizontal lines representing seconds and vertical lines representing voltage. ▪ Each small square represents 0.04 second. ▪ Each large square represents 0.20 second. ▪ The P wave represents atrial depolarization. ▪ The PR interval represents the time it takes an impulse to travel from the atria through the atrioventricular node, bundle of His, and bundle branches to the Purkinje fibers. ▪ Normal PR interval duration ranges from 0.12 to 0.2 second. ▪ The PR interval is measured from the beginning of the P wave to the end of the PR segment. ▪ The QRS complex represents ventricular depolarization. Leave a Reply
ESSENTIALAI-STEM
A small organ located beneath the liver, the gallbladder collects and stores bile made by the liver. Bile assists in digestion by moving water and waste fats out of the body. Occasionally, bile crystallizes in the gallbladder, forming tiny stones made of salts, cholesterol and bilirubin (the pigment that gives bile its color). Most gallstones pass through the intestines with solid waste without any symptoms, while others, due to size, can get stuck in narrow sections of the digestive system, causing pain. Sifting your feces is the only sure way to tell if you have passed a gallstone. Do not flush the toilet after you pass solid waste. Place on protective latex gloves. Lift the mass of feces into the old strainer. Sift through the feces for small stones. These gallstones can be as small as the head of a pin or as large as a quarter. They may also be black, brown or dark green in color. Rinse any stones you find an place in sealable container. Bring this container to your next medical appointment to confirm that the stones are gallstones. Flush remaining fecal matter and dispose of latex gloves safely, away from children or pets. Clean strainer with a bleach and water solution, and then wash your hands with soap and water. Tip • Consult with your health care practitioner to determine your risk for, or presence of, gallstones. Risks include high-fat diets, being female or being overweight. Gallstones can be located with an ultrasound or a CT scan. Tip • Whether or not you expect to pass a gallstone, if you experience any pain, you should seek immediate medical care. Do not use the strainer for any other purpose after you have used it to look for gallstones. About the Author A writer and professional lab assistant based in Seattle, Kate Bruscke has been writing professionally about health care and technology since 1998. Her freelance clients include "The Seattle Times," KGB.com, Reading Local: Seattle, Nordstrom and MSN/Microsoft. Bruscke holds a Master of Fine Arts from The School of the Art Institute of Chicago. Photo Credits • zveiger alexandre/iStock/Getty Images SHARE
ESSENTIALAI-STEM
American2020 American2020 - 1 year ago 57 Java Question I need a way to randomize outcomes passing and holding classes I'm trying to add let's say 5 classes that they all extend a General class and implements an init() method in a different way. What I need is a way to store those classes while passing a number of chances for that Class to "happen" For this I created a Class holder: public class ClassHolder { private Class<? extends GeneralOutcome> holdClass; private int chances; public ClassHolder(Class<? extends GeneralOutcome> holdClass, int chances) { super(); this.holdClass = holdClass; this.chances = chances; } public Class<? extends GeneralOutcome> getHoldClass() { return holdClass; } public void setHoldClass(Class<? extends GeneralOutcome> holdClass) { this.holdClass = holdClass; } public int getChances() { return chances; } public void setChances(int chances) { this.chances = chances; } } Also a GeneralOutcome class that the ones that will be added to a list will extend: public class GeneralOutcome { public void init(String text, int times) { } } And the way I'm adding them to a list: public class Randomizer { private static List<ClassHolder> myList = new ArrayList<ClassHolder>(); private static ClassHolder outcome01 = new ClassHolder(Outcome01.class, 10); private static ClassHolder outcome02 = new ClassHolder(Outcome02.class, 10); private static ClassHolder outcome03 = new ClassHolder(Outcome03.class, 10); private static ClassHolder outcome04 = new ClassHolder(Outcome04.class, 10); private static ClassHolder outcome05 = new ClassHolder(Outcome05.class, 10); public static void main(String[] args) { for(int i = 0; i < outcome01.getChances(); i++) { myList.add(outcome01); } for(int i = 0; i < outcome02.getChances(); i++) { myList.add(outcome02); } for(int i = 0; i < outcome03.getChances(); i++) { myList.add(outcome03); } for(int i = 0; i < outcome04.getChances(); i++) { myList.add(outcome04); } for(int i = 0; i < outcome05.getChances(); i++) { myList.add(outcome05); } System.out.println(myList.size()); int rand = (int) (Math.random() * myList.size()); System.out.println(rand); ClassHolder theHoldClass = myList.get(rand); System.out.println(theHoldClass.getHoldClass()); Class<? extends GeneralOutcome> theOutcome = theHoldClass.getHoldClass(); theOutcome.init(); } } The problem is that I'm not able (Don't know how really) cast back to GeneralOutcome to I can access the .init() method. I get The method init() is undefined for the type Class<capture#3-of ? extends GeneralOutcome> I know this isn't the best way to do this. So I'm open to both, a fix for this and also what would be a better way to achieve something like this. Answer Source What you are trying to do here doesn't work for some reasons. First of all, your init method isn't static. So that call Class<? extends GeneralOutcome> theOutcome = theHoldClass.getHoldClass(); theOutcome.init(); leads directly to a compile-time error. But then, the whole design looks strange. What is the point of holding Class objects in the first place? Why don't you create an interface public interface OutcomeFunctionality { public void foo(String text, int times); } to later instantiate objects of whatever class implementing that interface? So that you can finally can deal with lists of such objects (together with those probabilities)? [ I used the name foo on purpose: alone the strange name "init" makes it very unclear what your code is intended to do! In that sense you should rethink your design, and find better method names to express what those methods will be doing! ] Long story short: using/holding Class objects doesn't buy you anything in your example code - it only adds complexity. So my advise is: start working there and get rid of that "detour". You might also want to read about the Open/Closed principle - that could give you some guidance how a good OO design looks like that uses abstract classes / subclassing in order to split "behavior" between base and derived classes.
ESSENTIALAI-STEM
Basant (festival) Basant is a spring time kite flying event during the Basant Panchami festival in the Punjab. It falls on Basant, also called Basant Panchami. According to the Punjabi calendar it is held on the fifth day of lunar month of Magha (in late January or early February) marking the start of spring. Central/Majha Punjab Amritsar, Lahore, and Kasur are the traditional areas where kite flying festivals are held. A popular Basant Mela is held in Lahore (see Festivals of Lahore). However, the festival has also been traditionally celebrated in areas such as Sialkot, Gujranwala and Gurdaspur. Historically, Maharaja Ranjit Singh held an annual Basant fair and introduced kite flying as a regular feature of the fairs held during the 19th century which included holding fairs at Sufi shrines. Maharaja Ranjit Singh and his queen Moran would dress in yellow and fly kites on Basant. The association of kite flying with Basant soon became a Punjabi tradition with the centre in Lahore which remains the regional hub of the festival throughout the Punjab region. Indeed, Maharaja Ranjit Singh held a darbar or court in Lahore on Basant which lasted ten days during which time soldiers would dress in yellow and show their military prowess. Other traditions of the Basant in Lahore included women swaying on swings and singing. Malwa, Punjab, India The festival of Basant is celebrated across Malwa, Punjab where people organize gatherings to fly kites. In areas such as Firozpur, children generally fly kites to mark the auspicious occasion. A large fair is organised on the day of Basant Panchmi in the Shiva temple of Bansari and Gudri which is located in Dhuri, Sangrur district. The fair includes swings, rides and food. Punjab, Pakistan In North India, and in the Punjab province of Pakistan, Basant is considered to be a seasonal festival and is celebrated as a spring festival of kites. The festival marks the commencement of the spring season. In the Punjab region (including the Punjab province of Pakistan), Basant Panchami has been a long established tradition of flying kites and holding fairs. This includes the Pothohar Plateau where Basant is celebrated in Ralwalpindi, Pakistan with the flying of kites. Despite the ban on flying kites, kite enthusiasts still continue to celebrate the festival. According to The Express Tribune "in spite of a ban, kites of all sorts, spindles, twines are available freely in the old city area" of Rawalpindi in 2020. People also light fireworks and play loud music. Ban While the date of Basant Panchami is set by a traditional Hindu calendar, the date of the Basant kite festival in Lahore, Pakistan until 2007 was determined by the authorities, always on a Sunday and usually at the end of February or the beginning of March. In 2007, the festival was banned, primarily because of an increasing number of deaths and serious injuries. These had various causes related to the festival, including: • Bullets and tracer bullets fired during celebratory gunfire • Dangerous types of kite strings, such as metal wire, or strings coated in ground glass or metal filings • Electrocutions caused by flying metal wire kites near power lines • Electrocutions caused by people touching power lines while trying to retrieve kites • Falls from rooftops related to flying or trying to retrieve kites Another reason cited for the ban was the cost to the electricity power transmission system related to • Shortcircuits from metal kite wires touching power lines • Costs incurred from switching off the power grid to prevent short circuits It has been widely reported in Pakistan since 2017 that the ban is to be lifted, however as of 2019 this has not happened. In 2004, Nawa-i-Waqt, a Pakistani daily opposed Basant Panchami celebrations in Pakistan, arguing that the festival celebrated Haqiqat Rai's insult of Muhammad.
WIKI
Public Enemies (group) Public Enemies was a Norwegian rhythm and blues band from Oslo, known for its performances at Club 7 and later work with Karin Krog. They released a notable version of Sunny and Watermelon Man with Karin Krog. The group toured Northern Europe, sharing stages with, among others, Steve Winwood from Traffic. Band members The members of Public Enemies were Hans Petter Holm (vocals, guitar, bass), Bjørn Johansen (guitar, vocals), Thomas Berg Monsen (harmonica, vocals), Arild Boman (organ), Hans Marius Stormoen (bass) and Jan Lie (drums, vocals). Success Public Enemies was voted the most popular band in Norway in 1966, with a good margin down to The Pussycats. They featured in the Norwegian film Hurra for Andersens, performing their hit single "Shotgun". Later that year "Shotgun" reached #7 on Radio Luxembourg Top 20, making Public Enemies the first Norwegian band with success on international hit lists. Their 1967 album From Public Enemies Without Love, simply titled Public Enemies, was released also in Italy with a different cover on the Thunder label. Dissolution In 1967 Christian Reim (organ) joined Public Enemies. The band was dissolved the same year when Hans Marius Stormoen and Reim went on to form Dream with Terje Rypdal. Bjørn Johansen and Jan Lie later formed the band The Prophets. Discography * I Call It Pretty Music (EP, 1965) * Elevate Me (EP, Volt, 1965) * Believe Me (EP, Thunder, 1966) * Shotgun (EP, Triola, 1966) * Familien Andersen (EP, 1966) * Sunny/Whole Lotta Shakin' Goin' On (EP, Sonet, featuring Karin Krog, 1966) * From Public Enemies Without Love (LP, Sonet, 1966) * Public Enemies (LP, Thunder, 1966)
WIKI
5X5 Workout What’s The 5X5 Program & Is It EFFECTIVE? The 5X5 style of training is very popular training in strength circles, and for many an introduction to the world of strength. It has given way to other popular training programs, and most probably popularized the use of “5” as the standard rep range for strength training. There isn’t a set “5×5” program, although there are several popular iterations online: – Bill Starr 5×5 – Reg Park’s 5×5 – MadCow’s 5×5 – StrongLifts 5×5 Case in point: there are many types of 5×5 programs out there, each with their own structures and purported benefits (of said structure). All have success stories of some kind, and have been tried by thousands…yet they all have the same limitations, which we’ll examine today. You’re here for the question: will it work? Most likely. Depending on your past training history. For beginners who’ve never touched a barbell – it will work well for up to 10-12 weeks. For intermediates who’ve gone through other strength training programs – not as much. We’ll look at why, and what to do about it. For the sake of simplicity, let’s go with the most popular online version of 5×5 (currently): Workout A: • Squat 5X5 • Bench Press 5X5 • Barbell Row 5X5 Workout B: • Squat 5×5 • Overhead Press 5X5 • Deadlift 1X5 The straightforwardness of the program is immediately appealing to a novice trainee. I know it was for me. The progression is the same as it is for most novice linear progression programs: add 5 lbs on the upcoming workout if you completed all sets of five reps. The exercise selection is pretty minimal, and there’s plenty of exposure to the main lifts. As far as results go, these types of programs can be quite effective if followed to the letter. But why? And what are its shortcomings (if any)? Is 5X5 The Ultimate Beginner Strength Training Program? If we are in agreement that building strength effectively is a result of strength adaptations and muscular hypertrophy, as the two primary levers of strength growth, then it’s easy to see why the programs work. First, the 5-rep range that the program is based around is typically higher than the required 70% intensity range needed for strength improvements. Five reps at moderately challenging (RPE 8) to all-out (RPE 10) effort will generally be upwards of 80% of a lifter’s e1RM. Secondly, each session will average 25-reps per exercise (except for the deadlift: more on that later). By doing an average of three sessions every two weeks per lift, that will generally be averaged to: • 75 reps of squat • 37.5 reps of bench • 37.5 reps of press • 37.5 reps of rows • 7.5 reps of deadlifts Assuming that the lifter is doing the program, these reps will generally be performed at an 75-80% intensity rep range. Setting Up for Set of 5s Deadlift For a complete novice, these aren’t terrible volume numbers. While not characteristically high, they are enough to stimulate a hypertrophy response on a novice trainee. The reps on the squat are a bit higher than necessary. Benching reps are lower than would be ideal. With deadlifts being far too low. What I’d like to design for a beginner would be closer to: • 54 reps of squat • 72 reps of bench • 32 reps of press • 47 reps of deadlift As the base of the program, the lifter would be subjected to greater levels of volume in the bench & deadlift. As in, nearly double the bench volume, and almost five times the pulling volume. The squat volume is slightly less, but for a beginner trainee, 75 reps of squats per week is overkill. In fact, on the Starting Strength novice program, lifters are subjected to 45 reps of squats per week, and most people tend to see significant results at that volume level. It doesn’t appear immediately obvious that novice trainees need any more than this. When I first started training in the manner described above, I followed a template that was exactly like this. I was able to add 50 lbs to my squat (315 > 365), 40 lbs to my deadlift (345 > 385), and 50 lbs to my bench (195 > 245). This came along with a bodyweight gain of 3 lbs & 7 weeks of training. Although, in later trials, I actually achieved a much faster rate of progress by being more aggressive with the weight gain. Instead of micro-managing a 250-300 caloric surplus, I let myself have anywhere from 350 to 500 calories in excess. The rate of progress was 50% faster, and I didn’t notice too much extra fat. Although I’m sure there was some. It should be a noted that this was all done as post-novice training – a novice trainee would derive a much greater training effect. If I were to take an 18 year old, 5’8, 140-lb male who’s never followed any formal strength training protocol, I would have him gain 30-lbs over the next six months while following a training structure as outlined above. This individual would mostly like see a sustained rate of growth that would have him squat somewhere in the vicinity of 405, bench 275 (paused), & pull 455. For sets of five. A trainee that followed the training as described without missing/skipping meals or workouts should very well set these numbers as their targets. To see a full layout for what I’d recommend for novice powerlifters, or novice strength trainees in general, see the post about my Beginner Powerlifting Program. Why would I program like this & what are its inherent benefits over the 5X5 program? What is Good & Bad About the 5X5 Training Program The 5X5 program although decent as an introductory training protocol for beginner lifters, it has some drawbacks that are mainly noticeable in the long term. Simplicity & Structured Programming So, for starters, it’s a simple and straightforward program. Again, that’s very appealing to someone just starting out. It also has an element of structuring and progression. Rather than not being sure what to do, or what the best way to progress is, the program states it simply: add 5 lbs. This also distills more abstract concepts like progressive overload into simple, actionable strategies. Although this simplicity is attractive to more novice trainees, and it’s a feature built into the program: “adding 5 lbs” as a novice linear progression is not unique to 5X5. Frequent Exposure to Main Lifts Another plus that isn’t unique to 5X5 but a good feature nevertheless is the exposure to the main lifts. The fact that you’re squatting, pressing, and pulling rather frequently helps the lifter improve their technique (if done correctly) very rapidly: or much quicker than if they were not doing so. It can also cement the idea that training heavy, frequently, and with compound barbell movements is completely fine. Decent Level of Volume at Proper Intensity While not generally considered a high volume program, compared to other beginner programs, it is actually quite decent. Although I would tweak it as I demonstrated before, the program does contain sufficient volume for novice liters. Skill Practice, Strength Adaptations & Hypertrophy Overall, when compared to other programs in the primary levers of strength growth, the 5X5 program tends to fare fairly well. There’s frequent exposure to the main lifts, adequate intensity for strength adaptations, and enough volume to stimulate hypertrophy. So – what are its drawbacks? Why 5X5 is Not An Optimal Training Program Although it is a reasonably good program, there are some reasons for why it is not optimal. The Repeated Bout Effect & the SAID Principle Without going into too much detail, what the (SAID Principle) means is that your body adapts specifically to the stress imposed upon it. And it doesn’t create tangential adaptations. Meaning: there’s very little cross-over to other “related” movements or exercises. In other words: If you want to get stronger in the squat, bench, and deadlift – you have to train for strength in the squat, bench, and deadlift. Which means that anything that is not a Squat, Bench, or Deadlift will not impact your strength output in these lifts. Leg presses, dumbbell presses, reverse hypers, or any of these “similar” exercises do not have direct carry over. (This is a more complex subject outside the scope of this post. See that “direct” is bolded above). The 5X5 programs are great at improving your numbers because you’re training the same movements over, and over, and over again. This is great, however… Your body is also very good at adapting to external stresses (The Repeated Bout Effect). This means that if you continue to train at the same intensity, with the same rep range, with the same movement patterns, with the same level of effort: your body becomes increasingly better at creating adaptations so that each workout disrupts its homeostatic balance less and less. It might first appear as a decrease in muscle soreness, as every workout becomes “less novel” – over time, however, the Repeated Bout Effect also means less gains. This means that each training session becomes continually less effective and the effects of the program are cut prematurely. Daily Undulating Prioritization This is where DUP comes in. By changing rep ranges, effort levels, energy pathways, and intensity percentages – the lifter is able to impose different stresses upon the body with every workout. This continual “shifting” of required stress adaptations from workout to workout means that your body does not become nearly as efficient at dealing with them as they otherwise would. Therefore, by altering certain parameters within the training program – the lifter is able to enjoy a much greater return on their time spent in the gym. Volume Isn’t HUGE Although the squat enjoys a great deal of high-intensity volume – the same cannot be said for the other lifts. Particularly the deadlift. This is another big reason for why the program isn’t effectively optimal. By applying the tweaks that I mentioned in the “Beginner Powerlifting Program”, you can elevate the volume of the training schedule in a way that produces maximal long-term hypertrophy benefits. Lack of Continual Stress Increases During The Program The last point being that the program is “set”. As the lifter becomes more trained, the program does not adjust its nature to the trainee’s apparent progression. As your body continues to develop adaptations to combat the training stress imparted by a workout, the effect of the program noticeably decreases. While in part this is dealt with by combining different training stresses & movement patterns (DUP), this is not addressed by volume or total weekly training stress. In other words, you’re doing the same amount of work throughout the entirety of the program. This will cause the effectiveness of the program to diminish quite sharply. Instead, your programming needs to reflect the reality of what’s happening: as you become better trained & capable of handling your current workload – your training must adjust to continue to stimulate progress. This kind of continued “stress programming” or adjustments to workload are not addressed by this program. In the beginning, when the stress of training is a novel stimulus, trainees will not need to adjust their workload too much. As the increased stress (“progressive overload”) will be handled primarily by the novelty of the stimuli & the slight weight increments. However, because that volume remains equal & the stimulus no longer remains “novel”- the weight increases (5-lb per workout/week) no longer become a suitable overload progression strategy. In this case, manipulating volume as the primary driver of stress and hypertrophy (i.e. muscle mass) will be the primary tool for continuing to stimulate further strength gains. Instead of trying to force a 5-lb increase & using that as the dose for which adaptations need to occur. As such, training protocols need to remain dynamic in order to remain effective in the face of continued adaptations. The Final Verdict To wrap things up, although the program is quite effective & suitable for beginners: if a lifter is most interested in maximizing their strength potential at level of advancement, they would be better suited with a more deliberate planning approach that addresses: • Intensity requirements for strength adaptations (the SAID principle) • Frequent exposure & practice with the main lifts • Volume demands for hypertrophy • Combatting the Repeated Bout Effect (DUP) • Long-term programming considerations for continued progress See these programs here: Strength Training for Beginners & Powerlifting Program.
ESSENTIALAI-STEM
Page:Chinese Local Dialects Reduced to Writing- An Outline of the System Adopted for Romanizing the Dialect of Amoy (IA jstor-592283).pdf/12 Rh Tones and Tonal Marks. The Chinese of Amoy count eight tones; two of these, however (to wit, the 2d and the 6th), are one and the same. The names of these tones are as follows: * is chiⁿū piⁿâ = upper even. * chiⁿū siⁿa = upper tone. * chiⁿū khikhì [sic] = upper departing. * 4th chiⁿū jiṕ = upper entering. * 5th ē piⁿâ = lower even. * 6th ē siⁿa = lower tone. * 7th ē khì = lower departing. * 8th ē jiṕ = lower entering. These two jiṕ tones always end in h, k, p, t. If the other tones end in a vowel, then the jiṕ ends in h, as: ba, bah. If the other tones end in ng, the jiṕ ends in k, as: kang, kak. If the other tones end in n, the jiṕ ends in t, as: kun, kut. If the other tones end in m, the jiṕ ends in p, as: kim, kip. The chiⁿū siⁿa (2d) and ē siⁿa (6th) are the same. The two jip tones are distinguished from all the others by their termination. The ē jiṕ (8th) is distinguished from the chiⁿū jiṕ (4th) by the mark ◌́ placed over it, as kut, kút; bak, bák. The chiⁿū jiṕ, therefore, needs no mark. The chiⁿū piⁿâ (ist tone) has no tonal mark: its termination distinguishes it from the jiṕs, and its having no tonal mark distinguishes it from the other tones. The 2d tone, or chiⁿū siⁿa is marked ◌́, as: kóng, bí. The 3d tone (chiⁿū khikhì [sic]) is marked ◌̀, as: kàng. The 5th tone (ē piⁿâ) is marked ◌̂, as: hêng. The 7th tone (ē khì) is marked ◌̄, as: khiām. Examples.
WIKI
User:DUKyleXY/List of Alpha Sigma Phi brothers/ The list of Alpha Sigma Phi brothers includes notable initiated members of Alpha Sigma Phi (ΑΣΦ), the tenth oldest all-male, college, Greek-letter social fraternity. Founded on December 6, 1845, at Yale College in New Haven, Connecticut, Alpha Sigma Phi has established over 150 chapters across the United States. Alpha Sigma Phi has initiated over 55,000 men into its brotherhood since its founding, and includes numerous men of note. Academia {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }} Business {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }} Entertainment {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }} Government and Politics {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }} Literature {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }} Science and Technology {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }} Sports {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }} Other Notable Brothers {{mem/fstart * ilist= {{mem/f * alist= * name= * chapter= * nota= * ref= }}
WIKI
List of universities and colleges in Cyprus This is a list of universities and colleges in Cyprus, including campuses of foreign universities. Universities For the full list of universities and colleges in Northern Cyprus, see. Ecclesiastical schools The Cyprus Church Theological School (ΘΣΕΚ) was founded as a private school on June 19, 2015. It is under the auspices of the Church of Cyprus and will give students a theological education with the possibility of the scientific work and critical discussion. This degree course enables candidates to engage in the Orthodox priesthood. Private Institutions of Tertiary Education * American College (Nicosia) * Aigaia School of Art and Design * Alexander College * Arte Music Academy * Atlantis College * Casa College * CBS - College of Business Studies Cyprus * CDA College * Church of Cyprus - School of Theology * City Unity College Nicosia * Cyprus Academy of Art * Cyprus College * Cyprus International Institute of Management * Cyprus School of Molecular Medicine * Frederick Institute of Technology * Freshart College of Arts * Global College * Institute of Professional Studies (IPS), UCLan Cyprus * Intercollege * InterNapa College (Ammochostos) * KES College * Larnaca College (Larnaka) * Ledra College * Mesoyios College (Lemesos) * M.K.C. City College Larnaca (Larnaka) * P.A. College (Larnaka) * Susini College * The CTL EuroCollege (Lemesos) * The Cyprus Institute * The Cyprus Institute of Marketing * The Limassol College - T.L.C. (Lemesos) * The Philips College * Vladimiros Kafkaridis School of Drama Defunct * Higher Technical Institute
WIKI
Talk:Beryl Vertue Agent by stealth ? Was this Vertue's own description ? It sounds slightly underhanded. The book 'Spike & Co' makes clear that Vertue became an agent by accident, by default, not 'by stealth', behind their backs. The 'boys' of ALS expected her to do everything, so that they would not be distracted from their writing. Vertue did the lot, from making tea, answering the phone, typing, liaising with TV execs, and eventually they asked her to re-negotiate their writing contracts. 'Beryl will do that,' was their answer to every managerial or boring office problem. So in this way, Vertue became an agent, without any training or experience, or ever expecting to. 2001:44B8:3102:BB00:1982:3B34:85D9:35B (talk) 04:16, 27 January 2019 (UTC)
WIKI
Antonia Strattman Your On-line Feet Troubles Source How Typical Is Leg Length Discrepancy After Hip Replacement Overview The majority of people in the world actually have some degree of leg length discrepancy, up to 2cm. One study found that only around 1/4 of people have legs of equal lengths. LLD of greater than 2cm is relatively rare, however, and the greater the discrepancy, the greater the chances of having a clinical problem down the road. A limp generally begins when LLD exceeds 2cm and becomes extremely noticeable above 3cm. When patients with LLD develop an abnormal gait, one of the debilitating clinical features can be fatigue because of the relatively high amount of energy needed to walk in the new, inefficient way. Poliomyelitis, or polio, as it is more commonly known, used to account for around 1/3 of all cases of LLD, but due to the effectiveness of polio vaccines, it now represents a negligible cause of the condition. Functional LLD, described above, usually involves treatment focused on the hip, pelvis, and/or lower back, rather than the leg. If you have been diagnosed with functional LLD or pelvic obliquity, please ask your orthopaedic surgeon for more information about treatment of these conditions.Leg Length Discrepancy Causes There are many causes of leg length discrepancy. Structural inequality is due to interference of normal bone growth of the lower extremity, which can occur from trauma or infection in a child. Functional inequality has many causes, including Poliomyelitis or other paralytic deformities can retard bone growth in children. Contracture of the Iliotibial band. Scoliosis or curvature of the spine. Fixed pelvic obliquity. Abduction or flexion contraction of the hip. Flexion contractures or other deformities of the knee. Foot deformities. Symptoms Patients with significant lower limb length discrepancies may walk with a limp, have the appearance of a curved spine (non-structural scoliosis), and experience back pain or fatigue. In addition, clothes may not fit right. Diagnosis The doctor carefully examines the child. He or she checks to be sure the legs are actually different lengths. This is because problems with the hip (such as a loose joint) or back (scoliosis) can make the child appear to have one shorter leg, even though the legs are the same length. An X-ray of the child?s legs is taken. During the X-ray, a long ruler is put in the image so an accurate measurement of each leg bone can be taken. If an underlying cause of the discrepancy is suspected, tests are done to rule it out. Non Surgical Treatment Heel lifts and sole lifts are simple ways Pedorthists can compensate for leg length deficiencies. These small modifications can make a tremendous difference to a person?s comfort, balance and mobility. Although people do not always know if they have LLD if you have any of the symptoms I have mentioned you should consult a Pedorthist as treating your condition early will reduce the development of serious problems later on. LLD Insoles how to increase height in 1 week Surgical Treatment Shortening techniques can be used after skeletal maturity to achieve leg length equality. Shortening can be done in the proximal femur using a blade plate or hip screw, in the mid-diaphysis of the femur using a closed intramedullary (IM) technique, or in the tibia. Shortening is an accurate technique and involves a much shorter convalescence than lengthening techniques. Quadriceps weakness may occur with femoral shortenings, especially if a mid-diaphyseal shortening of greater than 10% is done. If the femoral shortening is done proximally, no significant weakness should result. Tibial shortening can be done, but there may be a residual bulkiness to the leg, and risks of nonunion and compartment syndrome are higher. If a tibial shortening is done, shortening over an IM nail and prophylactic compartment release are recommended. We limit the use of shortenings to 4 to 5 cm leg length inequality in patients who are skeletally mature.
ESSENTIALAI-STEM
Instagram suddenly chokes off developers as Facebook chases privacy – TechCrunch Without warning, Instagram has broken many of the unofficial apps built on its platform. This weekend it surprised developers with a massive reduction in how much data they can pull from the Instagram API, shrinking the API limit from 5,000 to 200 calls per user per hour. Apps that help people figure out if their followers follow them back or interact with them, analyze their audiences or find relevant hashtags are now quickly running into their API limits, leading to broken functionality and pissed off users. Two sources confirmed the new limits to TechCrunch, and developers are complaining about the situation on StackOverflow. In a puzzling move, Instagram is refusing to comment on what’s happening while its developer rate limits documentation site 404s. All it would confirm is that Instagram has stopped accepting submissions of new apps, just as Facebook announced it would last week following backlash over Cambridge Analytica. Developers tell me they feel left in the dark and angry that the change wasn’t scheduled or even officially announced, preventing them from rebuilding their apps to require fewer API calls. Some developers suspect the change is part of Instagram parent company Facebook’s scramble to improve data privacy in the wake of its non-stop string of data scandals. In the past week, Facebook announced it was shutting down Partner Categories ad targeting based on third-party data brokers. TechCrunch reported that Facebook also plans to require businesses to pledge that they have consumers’ consent to attain their email addresses, which they use for ad targeting through Custom Audiences. Third-party Instagram platform apps like Reports+ provide users analytics on their audiences, but are breaking due to the new API limits Third-party Instagram platform apps like Reports+ provide users analytics on their audiences, but are breaking due to the new API limits Most public backlash has focused on #DeleteFacebook and ignored its subsidiaries like Instagram and WhatsApp. But Instagram may hope to prevent the virus of distrust from infecting its app too by cutting the API call limit to 1/25th of its previous volume. Causing this kind of platform whiplash could push developers away from the Instagram ecosystem, not that the company was too keen on some of these apps. For example, Reports+ charges $3.99 per month to give people analytics about their Instagram followers. Sensor Tower tells TechCrunch that Reports+ has grossed more than $18 million worldwide since October 2016 on the App Store and Google Play, and made more than $1.2 million last month alone. Instagram might have understandably seen these apps as parasitic, charging users for unofficial functionality or encouraging audience growth hacking that can lead to spam. In January, Instagram announced it would shut down the old API over the next two years, starting with removing the ability to pull a user’s follower list and follow/unfollow people on their behalf on July 31st. Instagram has been slowly trying to clean up its platform for years, having previously threatened legal actions against derivative apps with “Insta” or “Gram” in their names in 2013, and shut down its feed API in 2015 that allowed for unofficial Instagram feed-reading apps. Instagram is now pushing developers on a much more restrictive platform that only lets approved partners post at users’ behest, and that can only pull mentions of and analytics about business accounts. These changes were slated to kill many of the apps broken by this weekend’s API limit reductions. But at least developers were given fair warning about the July 31st deadline. The problem is exacerbated by the fact that Facebook put a pause on reviewing any new applications last Monday as it tries to shore up data privacy safeguards in the wake of Cambridge Analytica . Instagram confirms to TechCrunch that the moratorium on app submissions extends to Instagram’s new Graph API, but wouldn’t explain anything about the API limits. So Instagram is breaking old apps while not allowing developers to submit new, compliant ones. “Instagram’s lack of communication is frustrating to me because now I’m scrambling to update my apps and dealing with loads of unhappy customers,” a developer told me on the condition of anonymity. “If I had had a month to prep for this, I could’ve tweaked things so that limit was harder to reach. I’d be more frugal with my requests. What happened is all of a sudden, I’m getting dozens of emails, DMs on Instagram, with people saying the app’s not working.” While Facebook is wise to scrutinize apps pulling in lots of user data, doing so without warning or even an announcement is how Facebook hurt its relationships with developers circa 2009 as it tried to rapidly reign in spammy virality. Facebook is enduring a crisis of conscience regarding whether its apps can be misused as weapons by those trying to interfere with elections or just exploit our data for profit. But as the owner of some of the world’s most popular developer platforms, it’s worrying to see it flail and thrash this way. If Facebook and Instagram can’t even communicate changes to its policies with proper procedure and transparency, it’s hard to imagine it’s composed enough to firmly and fairly enforce them. For more on Facebook and Instagram’s troubles, check out our feature pieces: Facebook plans crackdown on ad targeting by email without consent Zuckerberg’s response to Cambridge scandal omits why it delayed investigating The real threat to Facebook is the Kool-Aid turning sour
NEWS-MULTISOURCE
Process Returned 3 &lt;0x3)&gt; problem Hi there! We are trying to migrate a project from our laptop to a computer that will stay with our installation. We’re moving our code to a windows xp boot camp partition on a mac mini. All seems to work ok and codeblocks is compiling and running the OF examples without incident. When we try to make our own code work, we’re able to get past the compiling stage, but as soon as the code runs we are presented with a This application has requested the Runtime to terminate it in an unusual way blalabla (contact team ) Process Returned 3 <0x3>’ press any key to continue. We are sitting here hoping to get this thing working so we can go home! Any one have any pointers for us? Thanx! David I would guess you have a problem that will reveal itself when compiled on another platform / compiler. common causes (which I’ve seen often) are: accessing arrays out of bounds an uninitilized variable (which gets the value of whatever is there in memory) also common is not having the media in the data directory, etc. one option is to compile in debug and try to debug the app (debug works very well in xcode and codeblocks) or to comment out the draw(), then the update() then the setup() to find out where the crash is occuring. Ie, it happens in the first update() or it happens in setup(), etc. That can be very helpful for figuring out what it’s not working. hope that helps!! zach Hi Zach, thanks for the swift reaction! It seems our problem was related to a network connection / configuration issue. We are sending (osc) data over a local network to a custom made basestation (which distributes the data to a whole bunch of light objects)… The basestation is using a static ip-address and after turning off the dhcp setting and switching our computer to a specified address, it just worked! :slight_smile: Cheers, -Tim
ESSENTIALAI-STEM
Afrofuturism: The Next Generation The Year in Style 2016 In the September issue of W magazine, Rihanna was cast as Tomorrow, an otherworldly warrior queen and champion of the downtrodden, resplendent in diamonds and foil. A month earlier, at the MTV Video Music Awards, Beyoncé projected a similarly astral vibe. Flanked on the stage by twin columns of attendants, she was a galactic goddess in a white ermine cape. In November, on “Saturday Night Live,” her sister, Solange Knowles, flaunted a sundial-size headdress of crystals and tight-woven braids, looking every inch a regal visitor from distant planet. Each was in her way a beacon of Afrofuturism, a social, political and cultural genre that projects black space voyagers, warriors and their heroic like into a fantasy landscape, one that has long been the province of their mostly white counterparts. [See more Year in Style articles] Familiar to some, exotic to others, the term refers loosely to an unlikely fusion of parts: Egyptian and other non-Western mythologies, mysticism and magical realism with Afrocentricity, modern technology and science fiction. A freighted concept in more ways than one, it gained traction this year, muscling its way into the pop cultural mainstream via the intertwined worlds of entertainment, art and style. In part, Afrofuturism, an aesthetic dating roughly from the 1970s, has taken on a new public face through a new generation of recording artists — Erykah Badu, Missy Elliott and Janelle Monáe among them — who have given it not only a voice, but also a look. You will likely know it when you see it: a high-shine mash-up of cyborg themes, loosely tribal motifs, android imagery and gleaming metallics that might be appropriate for a voyage to Pluto’s outer reaches. Its latest incarnation seems timely, if not downright inevitable. “With the diversity of the nation and world increasingly standing in stark contrast to the diversity in futuristic works, it’s no surprise that Afrofuturism emerged,” writes Ytasha L. Womack, who chronicled and popularized the evolution of the genre in her 2013 book, “Afrofuturism: The World of Black Sci-Fi and Fantasy Culture.” “But when, even in the imaginary future,” she goes on, “people can’t fathom a person of non-Euro descent a hundred years into the future, a cosmic foot has to be put down.” The internet has lent the movement a force unknown in previous incarnations. A visual metaphor for empowerment on sites like the Afrofuturist Affair and influential Instagram accounts like Inkrayable_girafe, it permits black men and women to take charge of their image. Today, Ms. Womack writes, “a fledgling filmmaker can shoot his sci-fi web series on a $500 DV cam, post it on YouTube, and promote it on Instagram and Twitter.” Lina Iris Viktor, a British-Liberian artist in New York who paints queenly self-portraits with a futuristic edge, picked up the thread. “The internet democratized the playing field,” she said. “Now the voices you hear are authentically ours. Instead of everybody else telling you stories, explaining to you what our work is about, we are telling you what it’s about.” An Afrofuturist narrative is embedded as well in a recent flurry of museum shows. On view through November at El Museo del Barrio were the fashion illustrations of Antonio Lopez, a pioneer in the genre whose works of the ’70s and ’80s featured a multiracial cast of robotlike figures and astronauts propelled into a far-off Tomorrowland. It is a brave new world, as a review in The New York Times noted in June, “in which race and gender were fluid, and existing social inequities corrected or transcended.” Afrofuturism is a current in the multimedia installations of the artist Saya Woolfalk, whose utopian universes and Empathics, a future race fusing — and all but erasing — racial and ethnic boundaries, were featured this year in shows at the Brooklyn Museum, a light show in Times Square and, just this month, an installation at Art Basel Miami Beach. Afrofuturist allusions crop up less overtly in the sprawling canvases of Kerry James Marshall, whose exhibition at the Met Breuer, through Jan. 29, includes idealized portraits of African-American Boy and Girl Scouts wreathed in halos of the kind often seen on comic-book heroes. This summer, the movement flexed its muscle at the megaplex, where “Captain America: Civil War” featured the Black Panther (Chadwick Boseman), a superhero who in 2018 will star in “Black Panther” as the king and protector of the imaginary nation of Wakanda. Afrofuturism’s resurgence could not be more timely, arriving as it does in a climate perceived as indifferent, if not downright inimical, to racial and ethnic minorities. In her book, Ms. Womack recalls a time when black or brown sci-fi characters were all but invisible in the culture at large. As a girl, she would fantasize that she was Princess Leia of “Star Wars.” “While it was fun to be the chick from outer space in my imagination,” Ms. Womack writes, “the quest to see myself or browner people in this space age, galactic epic was important to me.” It was in the absence of minorities from pop lore, she goes on, “that seeds were planted in the imaginations of countless black kids who yearned to see themselves in warp-speed spaceship too.” Count among them Tim Fielder, a New York graphic artist and animator whose sci-fi illustrations, produced over a 30-year span, drew visitors last spring to “Black Metropolis,” at the Gallatin Galleries at New York University. Mr. Fielder’s pioneering cartoon narratives — notably those of “Matty’s Rocket,” his spirited black female cosmonaut, who will lift off next year in graphic novel form — are particularly relevant now, he maintained: “They let young artists know that they’re not on dangerous turf, that someone has gone there before them.” Afrofuturism’s epic imagery offers youth a mirror, Mr. Fielder said. “These kids are able now to see themselves in environments that are expansive, both technologically and in terms of social mores and gender,” he said. They also see themselves newly reflected in the comic books that remain a potent form of Afrofuturist expression. Last spring, the Black Panther, lately of “Captain America,” was resurrected by Marvel as the noble protagonist of his own comic book series, written by Ta-Nehisi Coates, the author of “Between the World and Me.” And this year, Riri Williams, an Afro-coiffured teenage superheroine with an M.I.T. degree, will slip into the fabled power suit in the “Iron Man” comic series. Such vanguard characters can trace their genesis to early champions of Afrofuturism, paramount among them Sun Ra, the jazz composer, poet and philosopher who incorporated sci-fi themes into his music and his seminal film, “Space Is the Place,” a mid-1970s tale of interplanetary time travel. Afrofuturism owes as important a debt to the writer Octavia Butler, whose 1979 best-seller, “Kindred,” posits an alternate reality in which an African-American heroine is transported from mid-70s Los Angeles to early 19th-century Maryland. It owes a debt as well to the music of George Clinton and Parliament Funkadelic, with their prophetic lyrics in “Mothership Connection”: Time to move on Light years in time Ahead of our time. Afrofuturist themes were revisited in the ’90s, but still as a genre without a name until the cultural critic Mark Dery formally christened it in his 1994 essay “Black to the Future,” after which it flourished for a time before retreating to the shadows. Now the movement has returned in force, beamed down to the concert stage. Last month, the ’70s disco diva Grace Jones, Afrofuturism’s flat-topped mascot, toured in the British Isles, her stage persona, covered head-to-toe in tribal paint and feathers, a reprise of her hula-hoop-twirling performance at the Afropunk Fest in Brooklyn last year. On a broadcast of “The Tonight Show” in February, the singer FKA Twigs seemed to alight from the clouds swathed in a incandescent white. Her costume, a-shimmer in crystals, was created with Grace Wales Bonner, a London designer whose work in the past has been rife with Afrofuturist allusions. In her “Lemonade” album, released in April, Beyoncé reigns in an all-female utopia, leading a phalanx of women in ethereal white dresses that simultaneously conjure ancient and space-age societies. The style world, too, has now embraced the movement, if only, perhaps, to reinforce its stature as an arbiter of cool. For the W September cover and 18-page editorial feature shot by Steven Klein, Rihanna’s over-the-top costumes were cobbled from scratch. “She’s a one-off, a queen,” said Edward Enninful, the magazine’s fashion and style director. “A queen does not wear clothes off the runways.” Instead she wears an otherworldly pastiche of vanguard creations by Gareth Pugh, Prada, Proenza Schouler and others, clothes conceived, Mr. Enninful said, to emphasize Rihanna’s majestic persona. “It’s a look that many young black females out there haven’t seen before,” he said. Riccardo Tisci of Givenchy was among the first to integrate Afrofuturist imagery into his runway shows. Two years earlier, he signed Ms. Badu as the fierce-looking face of the brand. Mr. Tisci followed up repeatedly, most recently with a fall 2016 line replete with cosmological symbols, including that familiar Afrofuturist talisman, the Egyptian Eye of Horus. Calvin Klein released a fall advertising campaign starring the rapper Young Thug, dressed in flares and a fitted pinstripe chasuble, its neckline embellished with an astral-looking orb. A recent campaign from Chanel featured Willow Smith festooned in Afrofuturistic jewels. Others are advancing this high-concept aesthetic in more subtle ways, thrusting aside clichés as they go. “Afrofuturism has to become something more than just an idea of black people in shiny metallic clothing,” said Michelle Busayo Olupona, the Nigerian-American designer behind Busayo NYC, a label incorporating Afrofuturist themes in a stripped-down, abstract way. “In my own work, I try to create an aesthetic and style evocative of the past but very much grounded in the now.” Ms. Olupona said her abstract, Afrocentric designs, some incorporating fantasy fauna and futurist imagery, “suggest ways in which we can differentiate ourselves.” “What they say about the future,” she continued, “is that we’re always going to be here.” Another showcase for contemporary, less literal interpretations of Afrofuturism is 9J, a boutique and gallery recently sprung up on Bruckner Boulevard in the South Bronx. It aims to usher in the movement’s next wave, with items like a ribbed trunk-neck sweater worthy of “Star Wars,” created by a local designer Jesenia Lopez; gravity-defying Birkenstock platforms covered in feathers and Swarovski “gems”; and an outsize headdress of spiraling silver wire. These pieces mingle technology, fantasy and Afrocentric themes with a streamlined progressive-looking opulence. The shop’s owner, Jerome LaMaar, whose line, 5:31 Jérôme, has drawn high-visibility clients like Beyoncé and the model Hailey Baldwin, wore fur-rimmed virtual-reality goggles the other week while presiding at the opening of Africollision, an installation at 9J that eschewed the space-is-the-place hallmarks of old school Afrofuturism. “We want to play with the idea of what is tribe, what is Africa, what is the future, and mix it all up without being predictable.” Mr. LaMaar insisted. “Who wants to see what’s already been done?” An earlier version of this article misstated Lina Iris Viktor’s nationality. She is British-Liberian, not Liberian-born. An earlier version of a photo caption with this article misstated the name of a boutique. It is 9J, not J9.
NEWS-MULTISOURCE
What Is Big Data and Where to Find It? • March 11, 2020 • 15 min what is big data 2020 technology trends have officially taken the floor, and the digital world is already watching the headliners running this year's tech show.  Since we live in the era of information abundance, it's no wonder that one of the key 2020 technologies is Big Data. Its popularity and scale of usage come from some of the indisputable benefits it has to offer: • The data is coming from various resources that contribute to its accuracy. • The constant influx of data guarantees its relevance. • Instead of manual analysis, it is processed automatically with the help of algorithms, which reduces the error probability and allows increasing the data volume. • Centralized data access has become possible with the help of Big Data technologies. The world statistics show that the number of companies using Big Data has grown from 17% to 50% since 2015.  The increase rate is impressive, and the truth is, it's no longer just a fancy word a cool tech guy would use when discussing what's behind supercomputer VIKI from I'Robot. In fact, many large industries have already adopted Big Data technologies and are gaining profit. Let's have a closer look at those and who knows, maybe your business is just on the list, too. Big Data in Medicine and Healthcare Big data in medicine and healthcare When discussing Big Data in healthcare, one should distinguish the three aspects of its application. Firstly, it's the so-called clinical aspect that involves disease diagnosis, treatment, and prevention.  Then comes the management aspect aimed at better management of healthcare institutions by improving their operational and economic efficiency, on both regional and governmental levels.   Finally, the scientific aspect is the one where Big Data can play a truly revolutionary role. Disease studies and drug development are the core areas here. How exactly can Big Data technologies be useful to a particular patient and a specific doctor?  The fundamental concept lies within the development of electronic health records (EHR). EHR is a system that collects and stores medical and other personal data related to an individual's health. EHR contains the patient's disease and ailments' history, all the hospitalization records and doctor visits, laboratory tests, vaccinations, examinations, allergies, or any other related facts. Apart from serving as a storage of accurate medical data, EHR can control the patient undergo regular screenings and treatments by sending corresponding reminders and notifications.  Many experts claim Blockchain to be a good technology choice for EHR: it fulfills some of its major requirements, such as completeness of data, its protection, and verification. Big Data combined with Blockchain and AI Combining Blockchain with Big Data and AI makes it possible to use millions of EHR's for detecting hidden dependencies between a disease along with other side-factors as social, territorial, age-related, demographic, genomic, etc., which in its turn, allows providing a patient with exceptionally individual recommendations. The synergy of these three rising technologies allows creating a diagnostic system of a brand new quality level.  Watson for Oncology by IBM is a prototype example of such a system. Its database includes more than 600 000 diagnosis records as well as 2000 000 text pages from medical journals and clinic tests. By processing this data, the program can produce the most optimal treatment plan.  A retrospective analysis of treatment plans prescribed says that in regards to lung cancer, Watson selected efficient treatment tactics in 90% of the cases. In comparison, US hospitals averaged the rate of around 50%. Big Data also represents the core technology for forecasting medical institutions' spendings. It relies on a multifactor analysis of such statistical data as the number of repeat visits, ailments recorded against specific experts and departments, the prevalence of certain pathologies, number of chronic patients, epidemiologic indicators, etc. British National Health Service serves as a good example here: they use Big Data to analyze the efficiency of surgery sub-departments. Repeated hospitalization, missed doctor appointments, drug supply are the major factors included. McKinsey's recent research says that Big Data helps to not only reduce healthcare costs but also contributes to the quality of life enhancement. McKinsey reports that it can be achieved through Big Data capability to unite the data stored in separate sources wholly isolated from one another. For instance:  • Clinic data (medical history, laboratory tests, etc.); • Patients' behavior insights based on purchase preferences: the data collected from portable and home medical devices; • Scientific research and tests; • Medical establishments' records of the services provided: pharmacies' reports on the drugs sold, price statistics from the healthcare market. Consolidating these types of data from the sources above opens up unique possibilities for the medicare. Optimizing the operational activities is essential for bringing the established treatment practices to a whole new level. Personalized and preventive approaches based on remote monitoring can become the new reality thanks to vast volumes being analyzed. Big Data in Retail Big data in retail Every minute millions of people are purchasing by carrying out millions of transactions, so it's no surprise that retail is one of the top industries leveraging Big Data.  The significant tasks retail is trying to solve from both technological and entrepreneur standpoints are the following: • process huge amounts of data; • get updates on the sales performed and the stock dynamics in the entire retail chain; • react quickly to the changing situations and produce forecasts by addressing all the contributing factors (weather conditions, seasonality, holidays, distribution points, competitors, etc.); • analyze promo activities. Any retail business is looking for very explicit recommendations which steps one should take in a particular situation. Nowadays, Big Data analytics can help with that.  One of the aspects of a company's steady income depends on - is the smart pricing policy. Price correction is one of the principal retail management mechanisms. The studies show that, on average, managers spend half of their work time on goods reevaluation, which still isn't accurate enough due to human factors. In addition, one cannot guarantee that the process operates such crucial variables as seasonality, stock available, supply and demand structure, competitors' activities, etc. That is why large retail chains switch to automatized price reevaluation using Big Data technologies.  Macy's, for instance, that counts 800 stores with 73 trade items, has implemented a similar solution, which has spared the need for pricing correction by 22 times. What's also important here, the new price wasn't just somebody's judgment call but was carefully deduced, relying on the variables mentioned above. Using the same method, Amazon is adjusting its prices every two minutes.  Apart from the optimizations the technology brings to the existing businesses, it plays a big role in making strategic decisions when developing a new entity. By analyzing competitors' locations nearby, transport access, potential customers' income rate, their habits, and preferences, it gives a comprehensive idea of the territory's commercial potential for future business.  Big Data in Law Enforcement Big Data in law enforcement Historically, law-enforcement facilities have been working with huge volumes of data. There are few directions where data-based insights can be of particular value to the law-enforcement establishments.  First and foremost, it's cybersecurity. As unfortunate as it may seem, but fraudulent activities and malware have become a very often type of crime for today's police. Big Data analytical function is said to be today's most efficient instrument for fraud identification and, thus, prevention. Big Data algorithms can detect suspicious activities before they actually occur and alert consumers or companies about a potentially fraudulent action. It's becoming a must for many businesses to take proper care of enterprise data security.  Big Data analytics is also behind modern policing strategies. It allows the police to take a more proactive role in combating criminal activities. By using various sources of data such as the number of arrests, crime rates, fines issued in regards to a particular neighborhood, the police can monitor the areas prone to criminal activities more closely. Predictive policing - is the term used to describe this method in criminology. Lastly, advanced analytics Big Data offers is an efficient tool for governing establishments on various levels. It gives the authorities unprecedented access to very different kinds of precise information from all over the world to help understand the global picture of a situation and make well-informed decisions. Economy, health, climate, social issues are just a few fields the law enforcement agencies need data science analytics for. Summary what is big data summary "Information is the oil of the 21st century, and analytics is the combustion engine" - Peter Sondergaard at Gartner. It's safe to say that data represents the main value today. But a great opportunity can be a big challenge at the same time. So if you are having a hard time with structuring and organizing your business data and you feel like there is a better way to deal with it, spare yourself the hesitations and contact us to get a piece of valuable expert advice on how it can make your business profit and prosper! Author Darya Zarya Business Development Manager Table of contents Do you have an awesome business idea? Let’s make it real! Join our newsletter! Get weekly updates of the top IT news delivered straight to your inbox OFFER OF THE MONTH Magento website development. Empower your online store! WhatsApp
ESSENTIALAI-STEM
Page:Women Wanted.djvu/95 a change of policy and took on in its various departments five hundred women and girls. The Municipal Service Commission in New York last fall was holding its first examination to admit women to the position of junior draughtsmen in the city's employ. The Civil Service Commission at Washington, preparing to release every possible man from government positions for war service, had compiled a list of 10,000 women eligible for clerical work in government departments. Like that it is happening all about us. This is the new woman movement. And you're in it. We all are. I know: you may never have carried a suffrage banner or marched in a suffrage procession or so much as addressed a suffrage campaign envelope. But you're "moving" to-day just the same if you've only so much as rolled a Red Cross bandage or signed a Food Administration pledge offered you by the women's committee of the Council of National Defence. All the women of the world are moving. "Suffrage de la morte," a Senator on the Seine has termed the vote offered the French feminists in the form of a proposition that every man dying on the field of battle may transfer his ballot to a woman whom he shall designate. And the French women have drawn back in horror, exclaiming: "We don't want a dead man's vote. We want only our own vote." Nevertheless it is something like this which is occurring. And we may shudder, but we may not draw back.
WIKI
Getting Started 1. Create a new demo database # Docker # Create a Docker container and set some options $ mkdir data $ docker run -i -t --rm --name nervatura \ -e NT_API_KEY=DEMO_API_KEY \ -p 5000:5000 -v "$(pwd)"/data:/data nervatura/nervatura:latest In a new command window: $ docker exec -i nervatura /nervatura \ -c DatabaseCreate -k DEMO_API_KEY \ -o "{\"database\":\"demo\",\"demo\":true}" Snap # $ sudo NT_API_KEY=DEMO_API_KEY \ NT_ALIAS_DEMO="sqlite://file:/var/snap/nervatura/common/demo.db?cache=shared&mode=rwc" \ /snap/nervatura/current/nervatura -c DatabaseCreate \ -k DEMO_API_KEY -o "{\"database\":\"demo\",\"demo\":true}" Windows # Open a PowerShell and set the (temporary) variables: $env:NT_API_KEY="DEMO_API_KEY" $env:NT_ALIAS_DEMO="sqlite://file:///C:/ProgramData/Nervatura/data/demo.db?cache=shared&mode=rwc" Launch nervatura CLI (in the same command window!), and create a database: & "C:\Program Files\Nervatura\nervatura.exe" -c DatabaseCreate -k DEMO_API_KEY -o '{\"database\":\"demo\",\"demo\":true}' Default Nervatura data directory: C:/ProgramData/Nervatura Launch nervatura server (in the same command window or Start menu): & "C:\Program Files\Nervatura\nervatura.exe" Of course, the environment variables can also be set permanently (see more SystemPropertiesAdvanced.exe). In this case, the server can be started from anywhere. Alternatively, the settings can be specified in the parameter: & "C:\Program Files\Nervatura\nervatura.exe" -env C:\ProgramData\Nervatura\.env.example NPM # See Node.js Examples Admin GUI # You can use the ADMIN GUI Database section: API-KEY: DEMO_API_KEY Alias name: demo Demo database: true 2. Login to the database: # Nervatura Client Username: admin Password: Empty password: Please change after the first login! Database: demo
ESSENTIALAI-STEM
Page:History of Woman Suffrage Volume 3.djvu/78 48 Men do not need to be convinced of the righteousness of entire freedom for us; they have long been convinced of its justice; they confess that it is only expediency which makes them withhold that which they profess is precious to them. We await only an awakened conscience and an enlarged statesmanship. I bid you and the women of the republic God-speed, and close in the language of one who went before us, Mary Wollstonecraft, who did so much in a thoughtless age to bring both men and women back to virtue and religion. She says: "Contending for the rights of woman, my main argument is built on this simple principle, that if she be not prepared by education to become the companion of man, she will stop the progress of knowledge and virtue; for truth must be common to all or it will be inefficacious with respect to its influence in general practice. And how can woman be expected to coöperate unless she know why she ought to be virtuous; unless freedom strengthen her reason till she comprehends her duty and sees in what manner it is connected with her real good? If children are to be educated to understand the true principle of patriotism, their mother must be a patriot; and the love of mankind from which an orderly train of virtues spring, can only be produced by considering the moral and civil interests of mankind; but the education and situation of woman at present, shuts her out from such investigations." With the greatest possible interest in your celebration and deliberations, and assuring you that I shall be with you in thought and spirit, I am most earnestly and cordially yours, 2em N. Y., June 27, 1876. * I thank thee most deeply for the assurance of a welcome to your deliberative councils in our country's centennial year, to reannounce our oft-repeated protest against bondage to tyrant law. Most holy cause! Woman's equality, why so long denied?... I was ready at the first tap of the drum that sounded from that hub of our country, Seneca Falls, in 1848, calling for an assembly of men and women to set forth and remonstrate against the legal usurpation of our rights.... I cannot think of anything that would give me as much pleasure as to be able to meet with you at this time. I am exceedingly glad that you appreciate the blessings of frequent visits and wise counsel from our beloved and venerated pioneer, Lucretia Mott. I hope her health and strength will enable her to see and enjoy the triumphant victory of this work, and I wish you all the blessings of happiness that belong to all good workers, and my love to them all as if named. 2em 2em July 4, 1776, our revolutionary fathers—in convention assembled—declared their independence of the mother country; solemnly asserted the divine right of self-government and its relation to constituted authority. With liberty their shibboleth, the colonies triumphed in their long and fierce struggle with the mother country, and established an independent government. They adopted a "bill of rights" embodying their ideal of a free government.
WIKI
Bertolaso Bertolaso is an Italian surname. Notable people with the surname include: * Giorgio Bertolaso (1918-2009), Italian aviator * Guido Bertolaso (born 1950), Italian physician and state functionary
WIKI
Babson College professor fired after making ‘sloppy’ Facebook joke on Iran bombing U.S. sites In an uneasy moment, Asheen Phansey was trying to be funny. Amid recent tensions between Washington and Tehran, during which President Trump threatened to target 52 sites “important to Iran & the Iranian culture,” Phansey suggested that Iran’s supreme leader might want to do the same ― and get specific. Ayatollah Ali Khamenei “should tweet a list of 52 sites of cultural American heritage that he would bomb,” Phansey, an adjunct professor and administrator at Babson College in Wellesley, Mass., wrote on Facebook earlier this week. “Um … Mall of America? … Kardashian residence?” Phansey would later describe the post as “a bad attempt at humor,” telling Boston news outlets that he was only poking fun at the nation’s relative lack of ancient culture. But his apology couldn’t save his job: The business school announced Thursday that it had fired him. “This particular post from a staff member on his personal Facebook page clearly does not represent the values and culture of Babson College,” it said in a statement. Phansey expressed regret that Babson did not come to his defense — and instead fired him “just because people willfully misinterpreted a joke I made to my friends on Facebook,” he told to the Boston Herald. The incident marks the most recent instance of professors drawing flak for their commentary on current events, particularly as questions of academic freedom and free speech play out in an increasingly volatile era of politics and policy. While decades of First Amendment case law prevents officials at public universities from restricting what their employees can say, or punishing them for expressing their views, private schools like Babson have much greater leeway. So when academics have made controversial posts on social media about any number of news items — mass shootings, the death of former first lady Barbara Bush or North Korea’s imprisonment of Otto Warmbier — their posts have resulted in a range of disciplinary outcomes. Phansey may be one of the first administrators to be disciplined for his Facebook posts. Just a few months after receiving his MBA from Babson in 2008, he began working as an adjunct professor in the university’s graduate program. In between teaching courses about marketing and sustainable entrepreneurship, he also helped develop curriculum for an undergraduate class combining biology and business. In February, he made the jump to campus full time, joining Babson’s administration to lead the school’s sustainability initiatives. As Trump floated the possibility on Saturday of retaliatory strikes against Iran, drawing widespread condemnation, Phansey chimed in on Facebook. (Trump has since backed away from the possibility of war with Iran.) His post drew attention almost immediately, first boosted online by a Massachusetts tabloid-blog hybrid that is alternately devoted to supporting the New England Patriots and investigating “social justice warriors.” The blog predicted that echoing Trump’s threats would cost Phansey his job, but that a Facebook post encouraging Iran was likely to get the professor tenure. The opposite turned out to be true. On Wednesday, just one day after the blog post, Babson said it had launched an investigation into the matter and suspended Phansey with pay. Through a public relations firm, Phansey told local news outlets on Wednesday that, as a “born and raised” American, he “regretted” the post, which had merely been his attempt at making a humorous juxtaposition: Whereas Iran has centuries-old churches and mosques, he said, the United States is home to a gargantuan mall in Minnesota and multimillion-dollar homes for reality stars. “I am completely opposed to violence and would never advocate it by anyone,” he wrote in a statement to the Herald. “I am sorry that my sloppy humor was read as a threat. I condemn all acts of violence. I am particularly sorry to cause any harm or alarm for my colleagues at Babson, my beloved alma mater.” Less than 24 hours later, he was fired. In other cases where professors have mixed mentions of Trump or his politics with suggestions of violence, schools have made similar moves. In 2017, the University of Tampa fired a visiting sociology professor who tweeted that Hurricane Harvey was “instant Karma” for the state of Texas going for Trump in the presidential election. In New Jersey that year, a similar fate awaited a gender studies adjunct at Montclair State University, who was stripped of two courses after he posting to Twitter that Trump was a “f------ joke” and should be shot. And at Drexel University in Philadelphia, a politics and global studies professor was placed on leave — and then resigned two years ago — after controversial tweets in which he said “Trumpism” was to blame for the 2017 mass shooting in Las Vegas. As he reflected on his own firing, Phansey seemed to pick up on that trend. “Beyond my own situation, I am really concerned about what this portends for our ability as Americans,” he told the Herald, “to engage in political discourse without presuming the worst about each other.”
NEWS-MULTISOURCE
User:Macnar28/sandbox =Test Page= Demographics Hyuga is a small city with a total population of 63,011 persons, 30,150 males and 32,861 females, as of November 2015. The over all area is 336.29 km2 giving a general population density of 188 persons per km2. However, about 77.8% of the land is mountainous and forested. Much of the remaining land is used for farming or industry leaving about 4% of the total land area inhabitable ; this puts the defacto population density in inhabitable areas at about 851 persons per km2. Hyuga's primary population centers are the Zaikoji and Hichiya regions of centeral Hyuga City which house over 60% of the city's overall population. Overall, Hyuga is primarily a very homogenous city with 99.6% of the population Japanese and a mere 0.4% of the population of foreign descent as of 2010. The majority of the foreigners in Hyuga are temporary fishermen, factory workers, or teachers. Prehistory Archaeologists working in Hyūga have reported finding artifacts such as stone tools and stone piles from as much as 30,000 years ago, the Japanese Paleolithic period. There is also evidence of inhabitation during the Jomon Period. Archaeological digs uncovering pottery from this time period continue today in parts of the city. Classical Period Asuka/Nara Period 550 BE - 794 AD Heian Period 794 - 1185 Kamakura Period 1185 - 1333 Feudal Period Moromachi Period 1333 - 15658 Momoyama Period 1568 - 1600 Edo (Tokugawa) 1600 - 1868 The failed Teradaya Incident Modern Period Meiji Period onward 1869~ ===Classical era=== After the Taika Reform of 646, Ikata and the greater surrounding area became known as the Uwa District in 701. The Uwa District covered the entire Nanyo region (map) until it was split in two in 866. Since districts were defined by population, one can infer that the area was underdeveloped and sparsely populated at the time. ===Feudal era=== Towards the end of the Heian Period, the Yawatahama and Ikata area became known as Yano (矢野郷). As ownership of farmlands became increasingly concentrated in the hands of local ruling families, control of the Yano area was given to Taira no Tadamitsu, a member of the Heike clan. Some members of the Heike family secretly settled in the Seto area in 1185 after being defeated in the Genpei Wars. Entering the Edo Period and the Tokugawa shogunate, the Uwa District came under control of the Uwajima Domain (宇和島藩). From 1610 to 1612, the first Uwajima feudal lord, Tomita Nobutaka, gathered farmers from the local area to dig a canal through the thinnest part of the Sadamisaki Peninsula, Seto's Mitsukue neighborhood. The project was soon canceled due to insufficient funds. By this time, the name Ikata (伊方浦) can be seen in records of taxes paid to the feudal lords. The Mitsukue neighborhood prospered as a port town during the feudal period, as it was used as a port of rest for daimyos on their way to and from the capital as part of the sankin kōtai system. This traffic was likely the source of the demand for Nobutaka's abortive attempt to create a shortcut through the peninsula. ===Modern era=== A decade after the Meiji Restoration, in March 1878 the Uwa District was divided into the current Kitauwa, Minamiuwa, Higashiuwa, and Nishiuwa districts (North-, South-, East-, and West-Uwa, respectively). Ikata was designated a village (村) in 1889, and other neighborhoods along the peninsula soon followed suit, many merging to reduce the number of independent settlements from 26 to 6. More recently, Seto's Mitsukue Bay was used for submarine training operations by the Japanese navy leading up to World War II, as the bay's shape is similar to that of Pearl Harbor. A monument named The Nine War Heroes (九軍神) stands in Suka Park in Mitsukue as a memorial dedicated to the nine young men (ages 21–28) who were stationed in the Mitsukue area for these exercises. According to the plaque on the monument, the men were quite friendly with the locals, and stories are still told about them in the neighborhood to this day. The men died on December 8, 1941, during one of the initial attacks on Pearl Harbor. In 1955 another round of mergers corresponding to the Great Shōwa Merger reduced the number of municipal entities to 3. In 1977 the Ikata Nuclear Power Plant began operation as the first nuclear power plant on the island of Shikoku. On April 1, 2005, Ikata merged with the nearby towns of Misaki and Seto to create the new town of Ikata, which spans the Sadamisaki Peninsula. ===Current events=== :*March, 2014. National attention turns to Ikata as the towns elections near. Many wonder if Ikata will approve the restart of its nuclear power generators. :*The installation of many new windmills in 2006 and 2007 solicited a significant amount of noise complaints from nearby residents.
WIKI
-- Materis Gets 1.9 Billion-Euro Loan Extension From 91% of Lenders Materis SA, the French building materials supplier, won consent from 91 percent of its lenders to extend maturities and reset terms on about 1.9 billion euros ($2.4 billion) of debt that funded its buyout in 2007. Materis, owned by private-equity firm Wendel (MF) , paid extension fees, increased the interest on senior loans and injected 25 million euros of equity to gain creditors’ approval, according to an e-mailed statement from Paris-based Wendel. It also got permission to sell as much as 700 million euros of high-yield bonds to refinance debt. Materis will pay interest of 4.5 percentage points, or 450 basis points, more than the euro interbank offered rate on about 1.6 billion euros of senior loans maturing in 2016, which were previously due in 2013, 2014 and 2015, Wendel said. Creditors will get extension fees of 25 basis points to 75 basis points. The senior loan interest margin drops to 4 percentage points if the company’s debt falls to less than 4.25 times earnings before interest, tax, depreciation and amortization, according to a person with knowledge of the transaction. A proposal in October set the ratio at 4.75 times. Wendel will add at least 25 million euros to a working capital facility that may be increased to as much as 50 million euros in 2013 under certain conditions, the company said. The facility will be repaid if any of Materis’s four subsidiaries are sold. BNP Paribas SA and Rothschild have been hired to conduct a strategic review and possible sale of the units, Wendel said. Materis also lengthened the maturities of its 422 million euros of mezzanine debt to December 2016, according to the statement. Wendel bought Materis for about 2 billion euros in 2006, with lenders led by BNP Paribas SA providing 1.97 billion euros of loans, according to data compiled by Bloomberg. Wendel and Materis’s managers had to inject 45 million euros of cash in 2009 as part of a debt restructuring. To contact the reporter on this story: Stephen Morris in London at smorris39@bloomberg.net . To contact the editor responsible for this story: Faris Khan at fkhan33@bloomberg.net .
NEWS-MULTISOURCE
Reinhard F. Stocker Reinhard F. Stocker (born 1944) is a Swiss biologist. He pioneered the analysis of the sense of smell and taste in higher animals, using the fly Drosophila melanogaster as a study case. He provided a detailed account of the anatomy and development of the olfactory system, in particular across metamorphosis, for which he received the Théodore-Ott-Prize of the Swiss Academy of Medical Sciences in 2007, and pioneered the use of larval Drosophila for the brain and behavioural sciences. Life, education and scientific career Reinhard Felix Stocker was born on March 12, 1944, in Basel, Switzerland as the middle of three sons to Heidi and Emil Stocker, a chemist with J.R. Geigy AG, Basel. He grew up in Riehen near Basel and received his Matura in 1963 at the Realgymnasium Basel. In 1963 Stocker enrolled as student of Zoology at the University of Basel, Switzerland. He received his PhD with the grade summa cum laude in 1972 for a thesis featuring an electron-microscopy investigation of the development of the ventral nerve cord of the ant Myrmica laevinodis during metamorphosis, supervised by Hans Nüesch. There followed two studies with Hans Nüesch, likewise using electron microscopy, on how the nerve-muscle contacts develop in pupal and early adult stages of the butterfly Antheraea polyphemus. Inspired by breakthrough insights into how genes orchestrate development in the fruit fly Drosophila melanogaster, Stocker turned his attention to the role of the Antennapedia gene in neurogenetic development. The Antennapedia gene is one of a family of homeotic genes that determine the identity of body segments. In 1971, Postlethwait and Schneiderman (Devel. Biol. 25, 606-640) had discovered that in mutants of this gene the appendages of one of the head segments develop not as an antenna, as in the wild-type fly, but as a thoracic leg. As a post-doc at the University of Washington, Seattle, USA (1974 to 1975), and mentored by John S. Edwards, Gerold Schubiger, John Palka and James W. Truman, Stocker revealed how this change in segment identity – or the surgical displacement of appendages – affects the connections of sensory neurons from the appendage towards the central brain. The developmental neurogenetics of the sensory systems in Drosophila melanogaster then emerged as Stocker's main research interest throughout his further career. In 1976 Stocker returned to the University of Basel, and in 1978 accepted a position as post-doctoral researcher (Assistant docteur) at the Institute of Zoology (later Department of Biology) at the University of Fribourg, Switzerland, where he was tenured as post-doctoral fellow (Maître-assistant) in 1980. Summarized in his Habilitation at the University of Fribourg from 1985, Stocker's studies combined dye-filling of neurons, electron microscopy and the manipulation of the developmental fate of neurons by homeotic mutations. Adopting the Gal4-UAS method for the cell-type specific manipulation of neurons as established by Brand and Perrimon in 1993 (Development 118, 401-415), this allowed him and his co-workers to describe at unprecedented detail and completeness the first relay of the olfactory system, the antennal lobe, and how it develops during metamorphosis. These studies were instrumental to map the wiring of olfactory sensory neurons expressing different olfactory receptor genes to these glomeruli and to understand the functional significance of this wiring for the combinatorial coding of odours. They were also the basis for his promotion as Professor (Professeur associé) at the University of Fribourg in 1993, and were cited by the Swiss Academy of Medical Sciences in awarding him the Théodore-Ott-Prize in 2007. Over the years the Stocker lab at Fribourg University provided early insight into the neurogenetic and developmental bases of chemosensation and sexual behaviour as well as into the origin of chemosensory neurons and their fate across metamorphosis. From the 1990s on, Stocker and his co-workers furthermore established larval D. melanogaster as a study case for research into the behavioural neurogenetics of chemosensation and chemosensory learning, and the central brain circuits serving these functions (see Scientific publications: 34., 39., 47., 48., 50., 51., 55.-57., 59.-78.). Across his career, Stocker's scientific interests thus gradually shifted from the sensory periphery towards the central nervous system and behaviour. This ‘outside-in’ approach was grounded in a precise and complete description of the anatomy and development of the neuronal systems under study. Characteristic of his work furthermore is the pioneering, early-adopting use of new methods and technology, including electron microscopy, immunohistochemistry, cell-type specific transgene expression, and the use of larval Drosophila melanogaster as a study case for the brain and behavioural sciences. After his retirement from the University of Fribourg in 2011, Stocker published a book of fiction. Distinctions 2007: Théodore Ott Prize of the Swiss Academy of Medical Science 2008-today: Editorial board of The Journal of Comparative Neurology Technical collaborators and mentees Technical collaborators and lab management: Martine Schorderet, Nanaë Gendre PhD students: Markus Lienhard, Madeleine Tissot, Klemens Störtkuhl, François Python, Julien Colomb, Mareike Selcho, Dennis Pauls Post-docs: Hans Schmid, Klemens Störtkuhl, Gertrud Heimbeck, Bertram Gerber, Ariane Ramaekers, Nicola Grillenzoni, Andreas Thum Congress organization and co-organization 2004: "Neurofly", Neuchâtel, Switzerland 2007: "Swiss Drosophila Meeting", Fribourg 2009: "Swiss Society of Neuroscience", Fribourg 2010: "Swiss Drosophila Meeting", Fribourg 2010: "Drosophila Maggot Meeting: Neural Circuits to Behavior", Bangalore, India Scientific publications 78. Stocker RF (2017) Was uns Fliegen(maden) über den Geruchssinn lehren. From: Natura Obscura – 200 Jahre Naturforschende Gesellschaft Basel, p. 193; Schwabe-Verlag, Basel; ISBN 978-3-7965-3686-1 77. Michels B, Saumweber T, Biernacki R, Thum J, Glasgow RDV, Schleyer M, Chen YC, Eschbach C, Stocker RF, Toshima N, Tanimura T, Louis M, Arias-Gil G, Gerber B (2017) Pavlovian conditioning of larval Drosophila. ''Front. Behav. Neurosci.'', 19 April 2017 https://doi.org/10.3389/fnbeh.2017.00045 76. Selcho M, Pauls D, Huser A, Stocker RF, Thum AS (2014) Characterization of the octopaminergic and tyraminergic neurons in the central brain of Drosophila larvae. ''J. Comp. Neurol.'' 522, 3485-3500. 75. Huser A, Rohwedder A, Apostolopoulou AA, Widmann A, Pfitzenmaier JE, Maiolo EM, Selcho M, Pauls D, von Essen E, Gupta T, Sprecher SG, Birman S, Riemensperger T, Stocker RF, Thum AS (2012) The serotonergic central nervous system of the Drosophila larva: Anatomy and behavioral function. PLoS ONE 7(10): e47518. 74. Selcho M, Pauls D, el Jundi B, Stocker RF, Thum AS (2012) The role of octopamine and tyramine in Drosophila larval locomotion. ''J. Comp. Neurol.'' 520, 3764-3785. 73. Stocker RF (2011) 30 Jahre Drosophila als weltweit etabliertes olfaktorisches Modellsystem. ''Bull. Soc. Sci. Nat. Frib''. 100, 42-74 72. Thum AS, Leisibach B, Gendre N, Selcho M, Stocker RF (2011) Diversity, variability, and suboesophageal connectivity of antennal lobe neurons in D. melanogaster larvae. ''J. Comp. Neurol''. 519, 3415-3432. 71. Pauls D, Selcho M, Gendre N, Stocker RF, Thum AS (2010) Drosophila larvae establish appetitive olfactory memories via mushroom body neurons of embryonic origin. J. Neurosci. 30, 10655-10666 70. Pauls D, Pfitzenmaier JER, Krebs-Wheaton R, Selcho M, Stocker RF, Thum AS (2010) Electric shock-induced associative olfactory learning in Drosophila larvae. ''Chem. Senses'' 35, 335-346 69. Selcho M, Pauls D, Han KA, Stocker RF, Thum AS (2009) The role of dopamine in Drosophila larval classical olfactory conditioning. PLoS ONE 4(6): e5897. 68. Masuda-Nakagawa LM, Gendre N, O’Kane CJ, Stocker RF (2009) Localized representation of olfactory input in the mushroom bodies of Drosophila larvae. ''Proc. Natl. Acad. Sci. USA'' 106, 10314-10319 67. Gerber B, Stocker RF, Tanimura T, Thum AS (2009) Smelling, tasting, learning: Drosophila as a study case. In: "Chemosensory Systems in Mammals, Fishes, and Insects" (ed. S. Korsching & W. Meyerhof), pp. 139–185, Springer Review Series "Results and Problems in Cell Differentiation" 66. Stocker RF (2009) The olfactory pathway of adult and larval Drosophila: conservation or adaptation to stage-specific needs? ''Ann. N.Y. Acad. Sci.'' 1170, 482-486 65. Stocker RF (2008) Design of the larval chemosensory system. In: "Brain Development in Drosophila melanogaster" (ed. Gerhard M. Technau), Advances in Experimental Medicine and Biology, Vol 628. pp. 69–81. Landes Bioscience, ISBN 978-0-387-78260-7 64. Colomb J, Stocker RF (2007) Combined rather than separate pathways for hedonic and sensory aspects of taste in fly larvae? (Extra view) Fly 1, 232-234 63. Vosshall LB, Stocker RF (2007) Molecular architecture of smell and taste in Drosophila. ''Annu. Rev. Neurosci''. 30, 505-533 62. Colomb J, Grillenzoni N, Stocker RF, Ramaekers A (2007) Complex behavioural changes after odour exposure in Drosophila larvae. ''Anim. Behav.'' 73, 587-594 61. Bader R, Colomb J, Pankratz B, Schröck A, Stocker RF, Pankratz MJ (2007) Genetic dissection of neural circuit anatomy underlying feeding behavior in Drosophila: distinct classes of hugin expressing neurons. ''J. Comp. Neurol.'' 502, 848-856 60. Colomb J, Grillenzoni N, Ramaekers A, Stocker RF (2007) Architecture of the primary taste center of Drosophila melanogaster larvae. ''J. Comp. Neurol.'' 502, 834-847 59. Grillenzoni N, de Vaux V, Meuwly J, Vuichard S, Jarman A, Holohan E, Gendre N, Stocker RF (2007) Role of proneural genes in the formation of the larval olfactory organ of Drosophila. ''Devel. Genes Evol.'' 217, 209-219 58. Krattinger A, Ramaekers A, Grillenzoni N, Gendre N, Stocker RF (2007) DmOAZ, the unique Drosophila melanogaster OAZ homologue is involved in posterior spiracle development. ''Devel. Genes Evol.'' 217, 197-208 57. Gerber B, Stocker RF (2007) The Drosophila larva as a model for studying chemosensation and chemosensory learning: a review. ''Chem. Senses'' 32, 65-89 56. Stocker RF (2006) Olfactory coding: Connecting odorant receptor expression and behavior in the Drosophila larva (Dispatch). ''Curr. Biol''. 16, R16-R18 55. Ramaekers A, Magnenat E, Marin EC, Gendre N, Jefferis GSXE, Luo L, Stocker RF (2005) Glomerular maps without cellular redundancy at successive levels of the Drosophila larval olfactory circuit. ''Curr. Biol.'' 15, 982-992 54. Stocker RF (2004) Taste perception: Drosophila – A model of good taste (Dispatch). ''Curr. Biol''. 14, R560-R561 53. Jefferis GSXE, Vyas RM, Berdnik D, Ramaekers A, Stocker RF, Tanaka NK, Ito K, Luo L (2004) Developmental origin of wiring specificity in the olfactory system of ''Drosophila. Development'' 131, 117-130 52. Gendre N, Lüer K, Friche S, Grillenzoni N, Ramaekers A, Technau GM, Stocker RF (2004) Integration of complex larval chemosensory organs into the adult nervous system of Drosophila. Development 131, 83-92 51. Gerber B, Scherer S, Neuser K, Michels B, Hendel T, Stocker RF, Heisenberg M (2004) Visual learning in individually assayed Drosophila larvae. J. Exp. Biol. 207, 179-188 50. Scherer S, Stocker RF, Gerber B (2003) Olfactory learning in individually assayed Drosophila larvae. Learning & Memory 10, 217-225 49. Bhalerao S, Sen A, Stocker RF, Rodrigues V (2003) Olfactory neurons expressing identified receptor genes project to subsets of glomeruli within the antennal lobe of Drosophila melanogaster. J. Neurobiol. 54, 577-592 48. Python F, Stocker RF (2002) Immunoreactivity against choline acetyltransferase, gamma-aminobutyric acid, histamine, octopamine, and serotonin in the larval chemosensory system of ''Drosophila melanogaster. J. Comp. Neurol.'' 453, 157-167 47. Python F, Stocker RF (2002) Adult-like complexity of the larval antennal lobe of D. melanogaster despite markedly low numbers of odorant receptor neurons. ''J. Comp. Neurol.'' 445, 374-387 46. Heimbeck G, Bugnon V, Gendre N, Keller A, Stocker RF (2001) A central neural circuit for experience-independent olfactory and courtship behavior in Drosophila melanogaster. ''Proc. Natl. Acad. Sci. USA'' 98, 15336-15341 45. Stocker RF (2001) Drosophila as a focus in olfactory research: mapping of olfactory sensilla by fine structure, odor specificity, odorant receptor expression and central connectivity. ''Micros. Res. Techn''. 55, 284-296 44. Jefferis GSXE, Marin EC, Stocker RF, Luo LL (2001) Target neuron prespecification in the olfactory map of Drosophila. Nature 414, 204-208 43. Ottiger M, Soller M, Stocker RF, Kubli E (2000) Binding sites of Drosophila melanogaster sex-peptide pheromones. J. Neurobiol. 44, 57-71 42. Tissot M, Stocker RF (2000) Metamorphosis in Drosophila and other insects: the fate of neurons throughout the stages. ''Progr. Neurobiol''. 62, 89-111 41. Balakireva M, Gendre N, Stocker RF, Ferveur JF (2000) The genetic variant Voila1 causes gustatory defects during Drosophila development. J. Neurosci. 20, 3425-3433 (joint first authors) 40. Stocker RF, Rodrigues V (1999) Olfactory Neurogenetics. In: B.S. Hansson (ed.) “Insect Olfaction”, Springer Verlag, Heidelberg-Berlin-New York, pp. 283–314 39. Heimbeck G, Bugnon V, Gendre N, Häberlin C, Stocker RF (1999) Smell and taste perception in D. melanogaster larva: toxin expression studies in chemosensory neurons. J. Neurosci. 19, 6599-6609 38. Laissue PP, Reiter C, Hiesinger PR, Halter S, Fischbach KF, Stocker RF (1999) Three-dimensional reconstruction of the antennal lobe in ''Drosophila melanogaster. J. Comp''. Neurol. 405, 543-552 37. Tissot M, Gendre N, Stocker RF (1998) Drosophila P[Gal4] lines reveal persistence through metamorphosis of motor neurons involved in feeding. J. Neurobiol. 37, 237-250 36. Balakireva M, Stocker RF, Gendre N, Ferveur JF (1998) Voila: A new Drosophila courtship variant that affects the nervous system: Behavioral, neural and genetic characterization. J. Neurosci. 18, 4335-4343 35. Stocker RF, Heimbeck G, Gendre N, de Belle JS (1997) Neuroblast ablation in Drosophila P[GAL4] lines reveals origins of olfactory interneurons. J. Neurobiol. 32, 443-456 34. Tissot M, Gendre N, Hawken A, Störtkuhl KF, Stocker RF (1997) Larval chemosensory projections and invasion of adult afferents in the antennal lobe of Drosophila ''melanogaster. J. Neurobiol''. 32, 281-297 33. Batterham P, Crew JR, Sokac A, Andrews JR, Pasquini GMF, Davies AG, Stocker RF, Benzer S, and Pollock JA (1996) Genetic analysis of the lozenge gene complex of Drosophila melanogaster: adult visual system phenotypes. J. Neurogenet. 10, 193-220 32. VijayRaghavan K, Gendre N, Stocker RF (1996) Transplanted wing and leg imaginal discs in Drosophila melanogaster demonstrate interactions between epidermis and myoblasts in muscle formation. ''Devel. Genes Evol''. 206, 46-53 31. Stocker RF, Tissot M, Gendre N (1995) Morphogenesis and cellular proliferation pattern in the developing antennal lobe of Drosophila melanogaster. Roux's Arch. ''Devl. Biol''. 205, 62-75 30. Ferveur JF, Störtkuhl KF, Stocker RF, Greenspan RJ (1995) Genetic feminization of brain structures and changed sexual orientation in male Drosophila melanogaster. Science 267, 902-905 29. Gendre N, Stocker RF (1994) Surface transplantation of imaginal discs for generating ectopic legs and wings on the thorax. ''Dros. Inf. Serv''. 75, 113-114 28. Störtkuhl KF, Hofbauer A, Keller V, Gendre N, Stocker RF (1994) Analysis of immunocytochemical staining patterns in the antennal system of Drosophila melanogaster. ''Cell Tiss. Res''. 275, 27-38 27. Stocker RF (1994) The organization of the chemosensory system in Drosophila melanogaster: a review. ''Cell Tiss. Res''. 275, 3-26 26. Stocker RF, Gendre N, Batterham P (1993) Analysis of the antennal phenotype in the Drosophila mutant lozenge. J. Neurogenet. 9, 29-53 25. Stocker RF, Gendre N, Lienhard MC, Link B (1992) Drosophila olfaction: Structural, behavioral, developmental, and genetic approach. In: R.N. Singh (ed.) “Nervous Systems: Principles of Design and Function”, Wiley Eastern, New Delhi, pp 351–372 24. Venard R, Stocker RF (1991) Behavioral and electroantennogram analysis of olfactory stimulation in lozenge: a Drosophila mutant lacking antennal basiconic sensilla. J. Insect Behav. 4, 683-705 23. Lienhard MC, Stocker RF (1991) The development of the sensory neuron pattern in the antennal disc of wild-type and mutant (lz3, ssa) Drosophila melanogaster. Development 112, 1063-1075 22. Stocker RF, Lienhard MC, Borst A, Fischbach KF (1990) Neuronal architecture of the antennal lobe in Drosophila melanogaster. ''Cell Tiss. Res''. 262, 9-34 21. Stocker RF, Gendre N (1989) Courtship behavior of Drosophila, genetically and surgically deprived of basiconic sensilla. ''Behav. Genet''. 19, 371-385 20. Foelix RF, Stocker RF, Steinbrecht RA (1989) Fine structure of a sensory organ in the arista of Drosophila melanogaster and some other dipterans. ''Cell Tiss. Res''. 258, 277-287 19. Stocker RF, Gendre N (1988) Peripheral and central nervous effects of lozenge3, a Drosophila mutant lacking basiconic antennal sensilla. ''Devl. Biol''. 127, 12-27 18. Pinto L, Stocker RF, Rodrigues V (1988) Anatomical and neurochemical classification of the antennal glomeruli in Drosophila melanogaster. ''Int. J. Insect Morphol. Embryol''. 17, 335-344 17. Lienhard MC, Stocker RF (1987) Sensory projection patterns of supernumerary legs and aristae in ''D. melanogaster. J. Exp. Zool''. 244, 187-201 16. Schmid H, Gendre N, Stocker RF (1986) Surgical generation of supernumerary appendages for studying neuronal specificity in ''Drosophila melanogaster. Devl. Biol''. 113, 160-173 15. Stocker RF, Schorderet M (1985) Sensory projections of homoeotically transformed eyes in D. melanogaster. ''Dros. Inf. Serv''. 61, 166-168 14. Stocker RF, Schmid H (1985) Sensory projections from dorsal and ventral appendages in Drosophila grafted to the same site are different. Experientia 41, 1607-1609 13. Stocker RF (1985) Neuronale Spezifität im sensorischen System von Drosophila melanogaster (Habilitation, University of Fribourg) 12. Stocker RF, Singh RN, Schorderet M, Siddiqi O (1983) Projection patterns of different types of antennal sensilla in the antennal glomeruli of Drosophila melanogaster. ''Cell Tiss. Res''. 232, 237-248 11. Stocker RF (1982) Genetically displaced sensory neurons in the head of Drosophila project via different pathways into the same specific brain regions. ''Devl. Biol''. 94, 31-40 10. Stocker RF, Schorderet M (1981) Cobalt filling of sensory projections from internal and external mouthparts in Drosophila. ''Cell Tiss. Res''. 216, 513-523 9. Stocker RF, Lawrence PA (1981) Sensory projections from normal and homoeotically transformed antennae in Drosophila. ''Devl. Biol''. 82, 224-237 8. Stocker RF (1979) Fine structural comparison of the antennal nerve in the homeotic mutant Antennapedia with the wild-type antennal and second leg nerves of ''Drosophila melanogaster. J. Morphol''. 160, 209-222 7. Stocker RF, Edwards JS, Truman JW (1978) Fine structure of degenerating abdominal motor neurons after eclosion in the sphingid moth, Manduca sexta. ''Cell Tiss. Res''. 191, 317-331 6. Stocker RF (1977) Gustatory stimulation of a homeotic mutant appendage, Antennapedia, in ''Drosophila melanogaster. J. Comp. Physiol''. A 115, 351-361 5. Stocker RF, Edwards JS, Palka J, Schubiger G (1976) Projection of sensory neurons from a homeotic mutant appendage, Antennapedia, in ''Drosophila melanogaster. Devl. Biol.'' 52, 210-220 4. Nüesch H, Stocker RF (1975) Ultrastructural studies on neuromuscular contacts and the formation of junctions in the flight muscle of Antheraea polyphemus (Lep.). II. Changes after motor nerve section. ''Cell Tiss. Res.'' 164, 331-355 3. Stocker RF, Nüesch H (1975) Ultrastructural studies on neuromuscular contacts and the formation of junctions in the flight muscle of Antheraea polyphemus (Lep.). I. Normal adult development. ''Cell Tiss. Res''. 159, 245-266 2. Stocker RF (1974) Elektronenmikroskopische Beobachtungen über die Fusion myogener Zellen bei Antheraea polyphemus (Lepidoptera). Experientia 30, 896-898 1. Stocker R (1974) Die Entwicklung der ventralen Ganglienkette bei der Arbeiterinnenkaste von Myrmica laevinodis Nyl. (Hym., Form.). Rev. Suisse Zool. 80, 971-1029 (Dissertation, University of Basel) Further publications 80. Stocker R (2020) Katastrophen, Krisen und kluge Köpfe – eine andere Weltgeschichte. tredition, Hamburg, ISBN 978-3-347-07071-4 79. Stocker R (2006) Immer der Nase nach. Universitas, Freiburg/ Fribourg, September, 19-21. Sources, interviews, and publications about RF Stocker In: Fritz Müller. Vermindern, verfeinern, vermeiden. Universitas, Freiburg/ Fribourg, September 2009, p40. Prix Théodore Ott. Unireflets, Freiburg/ Fribourg, 28. 08. 2008, p6. Théodore-Ott-Preis 2007 für Theodor Landis und Reinhard Stocker. Schweizerische Akademie der Medizinischen Wissenschaften, SAMW Bulletin, 2007, 3, p8. Le Prof. Reinhard Stocker reçoit le Prix Théodore Ott 2007. Unireflets, Freiburg/ Fribourg, 21. 06. 2007, p11. In: Annemarie Schaffner. Interview mit Reinhard Stocker. Bulletin der Aargauischen Naturforschenden Gesellschaft, 2005, 2, p21-27. In: Sonja Spreitzer. Dem Geruchssinn auf der Spur. Universitas, Freiburg/ Fribourg, März 2002, p26-27. Verständnis für das Gehirn fördern. Freiburger Nachrichten, 16. 03. 2002. A l’Université et à l’Hôpital cantonal, Fribourg se passionne pour le cerveau. La Liberté, 19. 03. 1999 Bourse pour une année. La Liberté, 11. 11. 1999 Erste bisexuelle Taufliegen, die ihre Veranlagung vererben können. Freiburger Nachrichten, 14. 02. 1995. https://onlinelibrary.wiley.com/page/journal/10969861/homepage/editorialboard.html https://www.samw.ch/en/Funding/Theodore-Ott-Prize.html
WIKI
User:AES514 I am a general (vascular) surgical registrar in Wessex undertaking research at Imperial college.
WIKI
Talk:I'm entitled to my opinion/Archives/2018 In Canada.... ..Our Charter of Rights and Freedoms does give us entitlement to our opinions - 2. Everyone has the following fundamental freedoms: (a) freedom of conscience and religion; (b) freedom of thought, belief, opinion and expression, including freedom of the press and other media of communication; (c) freedom of peaceful assembly; and (d) freedom of association. Grandma Roses (talk) 22:08, 13 April 2017 (UTC) I believe this is missing the point <IP_ADDRESS> (talk) 22:08, 8 February 2018 (UTC)
WIKI
Can you feel when people touch your elbow? Can you feel when people touch your elbow? You have probably heard a lot about not being able to lick your own elbow, of course some people can do that ! However, here’s another licking elbow fact for you! It’s a curious fact that you cannot feel someone if they touch your elbow. In fact they can even lick it and you may not even notice. Has someone licked their elbow? As you weap tears of frustration, how you must long to be Gerkary Bracho. The 20-year-old from Florida is a contortionist – but it isn’t her body-bending skills that enable her to perform this astonishing feat. She has an extraordinarily long tongue and can lick not only her elbow, but also her eye. Is it possible to touch your elbow with your tongue? If you’ve got the right build for it, you should be able to stretch your tongue to your elbow in this position. If at this point, you can’t touch your tongue to your elbow, stop. If you can’t, it’s because your upper arm is too long and no amount of stretching will make it happen. What does touch elbows mean? According to a study, it has been shown that if you briefly touch a persons elbow, which is considered a public space, for less than three seconds, that gesture will makes the chances of getting what you want, three times more likely. Why can’t you feel your elbow skin? Pinch the skin on your elbow as hard as you can. It barely hurts because different areas of your skin have different nerve endings. Tough skin, like that on elbows, has fewer pain detectors. Parts of your body at a higher risk from being damaged have more nerve endings, so are more sensitive. What does Weenis mean? Weenus (or weenis or wenis) is a slang word for the excess or loose skin at the joint of one’s elbow, which is technically referred to as olecranal skin. Is it really impossible to lick your elbow? It’s physically impossible to lick your elbow. The reason being that from any angle that you take your tongue is instantly too short to reach the tip of your elbow. Unless you have an unusual sized tongue or you are incredibly flexible, you won’t be able to perform this act. Can you kiss the tip of your elbow? No matter how flexible you are, you can’t kiss the tip of your elbow. Is it possible to lick your elbow point? What are the impossible things to do? 10+ Things Almost No Human Can Do, According to Science • Fold paper 8 times: A4 paper can be folded no more than 7 times. • Bend your pinky without moving your ring finger. • Do difficult tongue tricks. • Wiggle your ears. • Fit your fist in your mouth: you need to have a very small fist and a big mouth. Is it rude to have your elbows on the table? The rule doesn’t apply. As you converse with your table neighbors before or after the meal—after the food has been cleared—propping your elbows up is perfectly acceptable. But if you are going to do so, try to maintain some form of posture. This involves not resting your head in your hands, notes Farley. Why does my elbow hurt when touched? Touching your skin or placing pressure on your elbow can cause discomfort and pain. If bursitis continues to develop, bending your arm may become nearly impossible due to pain. Infectious bursitis turns your skin warm and red, which can also cause pain and discomfort. What could be cause of elbow pain? Elbow pain is most often the result of tendinitis, which can affect the inner or outer elbow. Treatment includes ice, rest, and medication for inflammation. Elbow pain has many other causes including trauma, arthritis, and bursitis. What causes constant pain in the elbow? Constant elbow pain may also be due to dislocation of the elbow, muscle strain, ligament sprain, and bursitis which is the inflammation of the fluid-containing sacs in the joint. Why does my elbow ache at night? Elbow pain while sleeping is usually a sign of tennis elbow where your extensor tendon that attaches at your elbow has suffered a small micro tear. If you sleep with your arm fully extended or straight, this puts tension and strain on your forearm extensor muscles and extensor tendon.
ESSENTIALAI-STEM
Thomas Bourke (cricketer) Thomas Joseph Deane Bourke (7 February 1815 – 28 February 1875) was an Irish first-class cricketer. Bourke made his first-class debut for Marylebone Cricket Club (MCC) against Hampshire in 1843. This was his only first-class match for MCC. In 1844 Bourke made his debut for Hampshire against Marylebone Cricket Club. In 1845 Bourke played two further first-class matches for Hampshire against the Marylebone Cricket Club and Petworth Cricket Club.
WIKI
SQL - Structured Query Language SQL Subquery Subquery is a query that is nested inside a SELECT, INSERT, UPDATE or DELETE SQL Statement, or inside another subquery. Subquery can define within SELECT Column(s) expression or else WHERE / HAVING clause expression. Each subquery must be declares with open and close parentheses operators. Format of Subquery -- Format of Subquery --   SELECT (subquery) FROM Table   SELECT Column(s) FROM Table WHERE expression (subquery)   SELECT Column(s) FROM Table WHERE expression ALL (subquery)   SELECT Column(s) FROM Table WHERE expression ANY (subquery)   SELECT Column(s) FROM Table WHERE expression SOME (subquery)   SELECT Column(s) FROM Table WHERE [NOT] EXISTS (subquery)   SELECT Column(s) FROM Table WHERE expression [NOT] IN (subquery) If a subquery declared within SELECT statement is called INNER subquery or else a subquery declared in WHERE clause expression is called OUTER subquery. The following INNER subquery is used to find out Department wise maximum salary information. -- Example 50 --   USE EBusiness GO   SELECT DEPT.Dept_Code, DEPT.Dept_Name, ������ (SELECT MAX(EMP.Salary) FROM EMP �������� WHERE DEPT.Dept_Code = EMP.Dept_Code) AS 'Max Salary' FROM DEPT Query Output Screen Basic Rules of Subquery The select list of a subquery introduced with a comparison operator can include only one expression or column name (except that EXISTS and IN operator on SELECT * or a list, respectively). If the WHERE clause of an outer query includes a column name, it must be join compatible with the column in the subquery select list. The ntext, text, and image data types cannot be used in the select list of subqueries. Because they must return a single value, subqueries introduced by an unmodified comparison operator (one not followed by the keyword ANY or ALL) cannot include GROUP BY and HAVING clauses. The DISTINCT keyword cannot be used with subqueries that include GROUP BY. The COMPUTE and INTO clauses cannot be specified. ORDER BY can only be specified when TOP is also specified. A view created by using a subquery cannot be updated. The select list of a subquery introduced with EXISTS, by convention, has an asterisk (*) instead of a single column name. The rules for a subquery introduced with EXISTS are the same as those for a standard select list, because a subquery introduced with EXISTS creates an existence test and returns TRUE or FALSE, instead of data. More Reference URL: http://technet.microsoft.com/en-us/library/ms189543%28v=sql.105%29.aspx * * * * * Email Your Comment To AUTHOR
ESSENTIALAI-STEM
colportage Etymology 1840s, from, from (1723). Noun * 1) The distribution or selling of publications via carriers, particularly devotional literature.
WIKI
Rotary Encoder Wheel mounts for rotary encoder Basically, Rotary Encoder converts the angular motion of wheel or shaft intoanalog or digital codes, and by codes we can count the number of rotations of the same. That seems pretty simple. 😛 First thing one faces in robotics, is the motion update of the bot. This motion update requires the tracking of the number of rotation which when multiplied by the circumference of the wheel base gives the distance travelled. However, this approach is not for motion including turns 😛 Types of Rotary Encoders? Generally, there are two types of rotary encoders: absolute and incremental. Absolute:An absolute encoder produces a value that is representative of the absolute position of the angle of rotation either in analog or digital code. Incremental: An incremental encoder generates digital signals that decrease or increase the measurement incrementally, providing information regarding the general position of the shaft. Depending on the number of output channels, types are : Single channel, Quadrature Rotary encoder. Single Channel: This only gives the number of rotations, and not the direction. (Scalar Quantity :P) Quadrature Rotary encoder: This uses two channels for output, and hence can provide the direction as well as number of rotations. (Vector Quantity :P) I am going to discuss Quadrature Incremental Rotary Encoder here.  Consider the picture above, where alternate black and white sectors are marked, to be sensed by the IR sensor module. Setup the components as shown below. Setup for rotary encoder Setup for rotary encoder Note: Developement board is just for power supply issues. 😀 For the height of the sensors wrt the motor, see picture below: Sensor height wrt wheel Sensor height wrt wheel Working principle ?? First most important thingy here is the use of interrupts by the two sensors. Pins used are 2, 3. Sensors can be connected to pins in any order. Second one is the generation of code bit patterns during motion. Careful observations of the diagram below will show you the generation of GRAY bit pattern. 00,01,11,10,…,00,01,11,10… Code pattern generation     A and B are the two sensors. 0- black sector 1- white sector       Thanks to “bilder” for the simplest code. I have done little modifications, while the kernel of the code is same. Firstly, Attaching interrupts to the pins in arduino is so simple. Secondly we need a volatile variable to keep track of the number of rotations. Volatile variable are free from any optimization performed by the compiler. Algorithm for tracking: The encoder has 2 digital pins that are either HIGH (1) or LOW (0). We read them as 00, 01, 10, or 11. Sequence generated during CW rotation is 00->01->11->10. Sequence generated during CCW rotation is 10->11->01->00. So if you have a reading of 01, the next reading can either be 00 or 11 depending on the direction of the wheel. So by adding the previous encoded value to the beginning of the current encoded value we get 1 of 8 possible numbers (0001, 0010, 0100, 0111, 1000, 1011, 1110 & 1101) As for every reading, two cases are there: one for backward other for forward. Hence for 4, we have 8 total combinations possible. 1101, 0100, 0010 & 1011 all mean CW movement. 1110, 0111, 0001 & 1000 are all CCW movement. This can be coded as: if(sum == 0b1101 || sum == 0b0100 || sum == 0b0010 || sum == 0b1011) encoderValue ++; //clockwise movement if(sum == 0b1110 || sum == 0b0111 || sum == 0b0001 || sum == 0b1000) encoderValue --; //counter-clockwise movement   Complete code is to be run in arduino is as follows:   int encoderPin1 = 2; int encoderPin2 = 3; volatile int lastEncoded = 0; volatile long encoderValue = 0; long lastencoderValue = 0; int lastMSB = 0; int lastLSB = 0; void setup() { Serial.begin (9600); pinMode(encoderPin1, INPUT); pinMode(encoderPin2, INPUT); digitalWrite(encoderPin1, HIGH); //turn pullup resistor on digitalWrite(encoderPin2, HIGH); //turn pullup resistor on //call updateEncoder() when any high/low changed seen //on interrupt 0 (pin 2), or interrupt 1 (pin 3) attachInterrupt(0, updateEncoder, CHANGE); attachInterrupt(1, updateEncoder, CHANGE); } void loop(){ } void updateEncoder(){ int MSB = digitalRead(encoderPin1); //MSB = most significant bit int LSB = digitalRead(encoderPin2); //LSB = least significant bit int encoded = (MSB << 1) |LSB; //converting the 2 pin value to single number int sum = (lastEncoded << 2) | encoded; //adding it to the previous encoded value if(sum == 0b1101 || sum == 0b0100 || sum == 0b0010 || sum == 0b1011) encoderValue ++; if(sum == 0b1110 || sum == 0b0111 || sum == 0b0001 || sum == 0b1000) encoderValue –; lastEncoded = encoded; //store this value for next time Serial.println(encoderValue);// this will print the encoder value every time interrupt calls. } Here is the video link of the model working… http://youtu.be/F4QHuH_EZg8 Advertisements About Shantanu Sharma Currently working as Software R&D member in Samsung R&D India. Posted on October 23, 2013, in 8-Bit Embedded World, Projects and tagged , , , , , , . Bookmark the permalink. Leave a comment. Leave a Reply Fill in your details below or click an icon to log in: WordPress.com Logo You are commenting using your WordPress.com account. Log Out / Change ) Twitter picture You are commenting using your Twitter account. Log Out / Change ) Facebook photo You are commenting using your Facebook account. Log Out / Change ) Google+ photo You are commenting using your Google+ account. Log Out / Change ) Connecting to %s
ESSENTIALAI-STEM
TimedText:Evanescence - My Immortal.ogg.en.srt 1 00:00:00,100 --> 00:00:01,300 —me alone 2 00:00:02,100 --> 00:00:05,000 These wounds won't seem to heal 3 00:00:05,100 --> 00:00:08,100 This pain is just too real 4 00:00:08,200 --> 00:00:14,000 There's just too much that time cannot erase 5 00:00:14,100 --> 00:00:20,200 When you cried, I'd wipe away all of your tears 6 00:00:20,200 --> 00:00:26,000 When you'd scream, I'd fight away all of your f[ears]
WIKI
FieldStorageDefinitionInterface.php Same filename in other branches 1. 8.9.x core/lib/Drupal/Core/Field/FieldStorageDefinitionInterface.php 2. 10 core/lib/Drupal/Core/Field/FieldStorageDefinitionInterface.php 3. 11.x core/lib/Drupal/Core/Field/FieldStorageDefinitionInterface.php Namespace Drupal\Core\Field File core/lib/Drupal/Core/Field/FieldStorageDefinitionInterface.php View source <?php namespace Drupal\Core\Field; use Drupal\Core\Cache\CacheableDependencyInterface; use Drupal\Core\Entity\FieldableEntityInterface; /** * Defines an interface for entity field storage definitions. * * Field storage definitions represent the part of full field definitions (see * FieldDefinitionInterface) that is responsible for defining how the field is * stored. While field definitions may differ by entity bundle, all of those * bundle fields have to share the same common field storage definition. Thus, * the storage definitions can be defined by entity type only. * The bundle fields corresponding to a field storage definition may provide * additional information; e.g., they may provide bundle-specific settings or * constraints that are not present in the storage definition. However bundle * fields may not override or alter any information provided by the storage * definition except for the label and the description; e.g., any constraints * and settings on the storage definition must be present on the bundle field as * well. * * @see hook_entity_field_storage_info() */ interface FieldStorageDefinitionInterface extends CacheableDependencyInterface { /** * Value indicating a field accepts an unlimited number of values. */ const CARDINALITY_UNLIMITED = -1; /** * Returns the machine name of the field. * * This defines how the field data is accessed from the entity. For example, * if the field name is "foo", then $entity->foo returns its data. * * @return string * The field name. */ public function getName(); /** * Returns the field type. * * @return string * The field type, i.e. the id of a field type plugin. For example 'text'. * * @see \Drupal\Core\Field\FieldTypePluginManagerInterface */ public function getType(); /** * Returns the storage settings. * * Each field type defines the settings that are meaningful for that type. * For example, a text field can define a 'max_length' setting, and an image * field can define an 'alt_field_required' setting. * * The method always returns an array of all available settings for this field * type, possibly with the default values merged in if values have not been * provided for all available settings. * * @return mixed[] * An array of key/value pairs. */ public function getSettings(); /** * Returns the value of a given storage setting. * * @param string $setting_name * The setting name. * * @return mixed * The setting value. */ public function getSetting($setting_name); /** * Returns whether the field supports translation. * * @return bool * TRUE if the field supports translation. */ public function isTranslatable(); /** * Sets whether the field supports translation. * * @param bool $translatable * Whether the field supports translation. * * @return $this */ public function setTranslatable($translatable); /** * Returns whether the field storage is revisionable. * * Note that if the entity type is revisionable and the field storage has a * cardinality higher than 1, the field storage is considered revisionable * by default. * * @return bool * TRUE if the field is revisionable. */ public function isRevisionable(); /** * Returns the human-readable label for the field. * * @return string * The field label. */ public function getLabel(); /** * Returns the human-readable description for the field. * * This is displayed in addition to the label in places where additional * descriptive information is helpful. For example, as help text below the * form element in entity edit forms. * * @return string|null * The field description, or NULL if no description is available. */ public function getDescription(); /** * Gets an options provider for the given field item property. * * @param string $property_name * The name of the property to get options for; e.g., 'value'. * @param \Drupal\Core\Entity\FieldableEntityInterface $entity * The entity for which the options should be provided. * * @return \Drupal\Core\TypedData\OptionsProviderInterface|null * An options provider, or NULL if no options are defined. */ public function getOptionsProvider($property_name, FieldableEntityInterface $entity); /** * Returns whether the field can contain multiple items. * * @return bool * TRUE if the field can contain multiple items, FALSE otherwise. */ public function isMultiple(); /** * Returns the maximum number of items allowed for the field. * * Possible values are positive integers or * FieldStorageDefinitionInterface::CARDINALITY_UNLIMITED. * * @return int * The field cardinality. */ public function getCardinality(); /** * Gets the definition of a contained property. * * @param string $name * The name of property. * * @return \Drupal\Core\TypedData\DataDefinitionInterface|null * The definition of the property or NULL if the property does not exist. */ public function getPropertyDefinition($name); /** * Gets an array of property definitions of contained properties. * * @return \Drupal\Core\TypedData\DataDefinitionInterface[] * An array of property definitions of contained properties, keyed by * property name. */ public function getPropertyDefinitions(); /** * Returns the names of the field's subproperties. * * A field is a list of items, and each item can contain one or more * properties. All items for a given field contain the same property names, * but the values can be different for each item. * * For example, an email field might just contain a single 'value' property, * while a link field might contain 'title' and 'url' properties, and a text * field might contain 'value', 'summary', and 'format' properties. * * @return string[] * The property names. */ public function getPropertyNames(); /** * Returns the name of the main property, if any. * * Some field items consist mainly of one main property, e.g. the value of a * text field or the @code target_id @endcode of an entity reference. If the * field item has no main property, the method returns NULL. * * @return string|null * The name of the value property, or NULL if there is none. */ public function getMainPropertyName(); /** * Returns the ID of the entity type the field is attached to. * * This method should not be confused with EntityInterface::getEntityTypeId() * (configurable fields are config entities, and thus implement both * interfaces): * - FieldStorageDefinitionInterface::getTargetEntityTypeId() answers "as a * field storage, which entity type are you attached to?". * - EntityInterface::getEntityTypeId() answers "as a (config) entity, what * is your own entity type?". * * @return string * The entity type ID. */ public function getTargetEntityTypeId(); /** * Returns the field schema. * * Note that this method returns an empty array for computed fields which have * no schema. * * @return array[] * The field schema, as an array of key/value pairs in the format returned * by \Drupal\Core\Field\FieldItemInterface::schema(): * - columns: An array of Schema API column specifications, keyed by column * name. This specifies what comprises a single value for a given field. * No assumptions should be made on how storage backends internally use * the original column name to structure their storage. * - indexes: An array of Schema API index definitions. Some storage * backends might not support indexes. * - unique keys: An array of Schema API unique key definitions. Some * storage backends might not support unique keys. * - foreign keys: An array of Schema API foreign key definitions. Note, * however, that depending on the storage backend specified for the field, * the field data is not necessarily stored in SQL. */ public function getSchema(); /** * Returns the field columns, as defined in the field schema. * * @return array[] * The array of field columns, keyed by column name, in the same format * returned by getSchema(). * * @see \Drupal\Core\Field\FieldStorageDefinitionInterface::getSchema() */ public function getColumns(); /** * Returns an array of validation constraints. * * See \Drupal\Core\TypedData\DataDefinitionInterface::getConstraints() for * details. * * @return array[] * An array of validation constraint definitions, keyed by constraint name. * Each constraint definition can be used for instantiating * \Symfony\Component\Validator\Constraint objects. * * @see \Symfony\Component\Validator\Constraint */ public function getConstraints(); /** * Returns a validation constraint. * * See \Drupal\Core\TypedData\DataDefinitionInterface::getConstraints() for * details. * * @param string $constraint_name * The name of the constraint, i.e. its plugin id. * * @return array * A validation constraint definition which can be used for instantiating a * \Symfony\Component\Validator\Constraint object. * * @see \Symfony\Component\Validator\Constraint */ public function getConstraint($constraint_name); /** * Returns the name of the provider of this field. * * @return string * The provider name; e.g., the module name. */ public function getProvider(); /** * Returns the storage behavior for this field. * * Indicates whether the entity type's storage should take care of storing the * field values or whether it is handled separately; e.g. by the * module providing the field. * * @return bool * FALSE if the storage takes care of storing the field, TRUE otherwise. */ public function hasCustomStorage(); /** * Determines whether the field is a base field. * * Base fields are not specific to a given bundle or a set of bundles. This * excludes configurable fields, as they are always attached to a specific * bundle. * * @return bool * Whether the field is a base field. */ public function isBaseField(); /** * Returns a unique identifier for the field storage. * * @return string */ public function getUniqueStorageIdentifier(); /** * Returns whether the field is deleted or not. * * @return bool * TRUE if the field is deleted, FALSE otherwise. */ public function isDeleted(); } Interfaces Title Deprecated Summary FieldStorageDefinitionInterface Defines an interface for entity field storage definitions. Buggy or inaccurate documentation? Please file an issue. Need support? Need help programming? Connect with the Drupal community.
ESSENTIALAI-STEM
How to Piss in Public How to Piss in Public: From Teenage Rebellion to the Hangover of Adulthood is the 2012 autobiography of the British-Canadian media personality Gavin McInnes. It has also been published as The Death of Cool. Summary Gavin McInnes envisioned the book as a collection of his best bar stories. It consists of 41 stories from his life arranged in a three-act structure. He grew up in small-town Canada and tells stories of how he took drugs, was drunk and played in a punk band. As a young man, he moved to Montreal and co-founded the magazine Vice, which he sold for a large sum of money when it became successful. Much of the book consists of McInnes' anecdotes about intoxication, sex and violence. The latter part of the book is about how he met his wife and became a father. Reception Caitlin Stall-Paquet of Paste wrote that the book reveals "the infuriating man-child within this punk-rocker-writer-hipster-king", and yet manages to be "an exciting, continuously forward-moving narrative". Kirkus Reviews called it "a monumentally unfunny memoir of being a jerk", and wrote that it seems like McInnes wants to write like Hunter S. Thompson but lacks Thompson's "inspired lunacy".
WIKI
User:Natediazufc/Identity tourism Digital blackface refers to when non-black people use the images or voices of black people to describe their own feelings or actions. People use these images to claim aspects of black identity all while not being black themselves. Using these gifs, images and videos of black people can perpetuate stereotypes about black people, Jardin Dogan M.Ed., Ed.S., a counselor and educator specializing in Black mental health, explains. The problematic nature of digital blackface can be traced back to the 19th century when blackface became a popular form of entertainment and white performers would paint their faces black and mimic the portrayal of Black people for all-white audiences. The same stereotypes that paint black men as violent and black woman as hypersexual, are based on minstrel shows, so even though using these images or voices of black people may seem harmless, they just further perpetuate stereotypes of black people. Not only does digital blackface perpetuate stereotypes, it is also a form of cultural appropriation because non-Black people get to take on aspects of "Blackness" that can be shed and taken on whenever and however they please, while not having to deal with any of the consequences that black people do for their race on a daily basis. Digital blackface contributes to identity tourism because people can assume aspects of racial identity for recreational purposes. '''Writer Victoria Princewell, for the BBC News, even said that using black emojis and black gifs as a non-black person was digital blackface. Blackface was originally used to mock black people and over exaggerate stereotypes, therefore she maintains that it is the modern day version of blackface, as it's "White people using gifs to perform some kind of exaggerated blackness." This tradition of using dark makeup to exaggerate the stereotypes of people of darker complexion, has roots that can be traced all the way back to Shakespeare's day, as performers in his plays wore blackface and brown face makeup. Russell Contreras of AP News, wrote about Hollywood actors in the 1950's who used makeup to portray black, Latino and Asian people, and how it hasn't even stopped; In 2012, actor Ashton Kutcher used brown face makeup and an exaggerated Indian accent in a Popchips commercial, showing that stereotypical portrayals of people of color in media is still alive. In 2019, a Mexican TV personality dressed in brown face makeup and wore a fake nose, as they were trying to poke fun at indigenous Mexican actress, Yalitza Aparicio. And in 2014, James Ramsey, who at the time was the president of the University of Louisville, along with staff were photographed wearing sombreros and fake mustaches, possibly related to Hispanic Heritage Month, but that was unclear. All of these incidents represent different versions of digital blackface/brown face, and show how it contributes to identity tourism, because people are assuming aspects of certain identities to get laughs on the internet, or make fun of someone else on television.'''
WIKI
1938 Soviet Top League The 1938 Soviet Top League combined all the Groups into one Super League. The season started on May 10 with the game between FC Torpedo Moscow and FC Spartak Kharkiv in Moscow. The last game was played on November 14 between FC Dynamo Rostov-na-Donu and FC Dynamo Odessa in Rostov-na-Donu. Each team played once with every other. The point system changed as well and stayed this way to the end of the competition in 1991: 2 for win, 1 for draw, and none for loss. This all-National championship was experimental and was disbanded next year. A half of the League was relegated at the end of the season. Spartak beside becoming the champion in the League format won the national cup competition, defeating a surprise team Elektrik from Leningrad, that last year was called Krasnaya Zarya. Top scorers * 20 goals * Makar Goncharenko (Dynamo Kiev) * 19 goals * Grigory Fedotov (CDKA Moscow) * Aleksandr Ponomarev (Traktor Stalingrad) * 18 goals * Sergei Kapelkin (Metallurg Moscow) * Aleksei Sokolov (Spartak Moscow) * 15 goals * Pyotr Petrov (Torpedo Moscow) * Aleksandr Sinyakov (Torpedo Moscow) * 14 goals * Arkadi Alov (Dynamo Leningrad) * Pyotr Layko (Dynamo Kiev) * Boris Paichadze (Dinamo Tbilisi) * Sergei Protsenko (Traktor Stalingrad)
WIKI
/*************************************************************** * * MODULE: v.delaunay * * AUTHOR(S): Martin Pavlovsky (Google SoC 2008, Paul Kelly mentor) * Based on "dct" by Geoff Leach, Department of Computer * Science, RMIT. * * PURPOSE: Creates a Delaunay triangulation vector map * * COPYRIGHT: (C) RMIT 1993 * (C) 2008-2009 by the GRASS Development Team * * This program is free software under the GNU General * Public License (>=v2). Read the file COPYING that * comes with GRASS for details. * * The following notices apply to portions of the code originally * derived from work by Geoff Leach of RMIT: * * Author: Geoff Leach, Department of Computer Science, RMIT. * email: gl@cs.rmit.edu.au * * Date: 6/10/93 * * Version 1.0 * * Copyright (c) RMIT 1993. All rights reserved. * * License to copy and use this software purposes is granted provided * that appropriate credit is given to both RMIT and the author. * * License is also granted to make and use derivative works provided * that appropriate credit is given to both RMIT and the author. * * RMIT makes no representations concerning either the merchantability * of this software or the suitability of this software for any particular * purpose. It is provided "as is" without express or implied warranty * of any kind. * * These notices must be retained in any copies of any part of this software. * **************************************************************/ #include #include "defs.h" #include "data_types.h" #include "memory.h" #include "geometry.h" #include "geom_primitives.h" #include "edge.h" static void find_lowest_cross_edge(struct edge *r_cw_l, struct vertex *s, struct edge *l_ccw_r, struct vertex *u, struct edge **l_lower, struct vertex **org_l_lower, struct edge **r_lower, struct vertex **org_r_lower); static void merge(struct edge *r_cw_l, struct vertex *s, struct edge *l_ccw_r, struct vertex *u, struct edge **l_tangent); void divide(unsigned int l, unsigned int r, struct edge **l_ccw, struct edge **r_cw) { unsigned int n; unsigned int split; struct edge *l_ccw_l, *r_cw_l, *l_ccw_r, *r_cw_r, *l_tangent; struct edge *a, *b, *c; double c_p; n = r - l + 1; if (n == 2) { /* Base case #1 - 2 sites in region. Construct an edge from two sites in the region */ *l_ccw = *r_cw = create_edge(&(sites[l]), &(sites[r])); } else if (n == 3) { /* Base case #2 - 3 sites. Construct a triangle or two edges */ a = create_edge(&(sites[l]), &(sites[l + 1])); b = create_edge(&(sites[l + 1]), &(sites[r])); splice(a, b, &(sites[l + 1])); c_p = CROSS_PRODUCT_3P(&(sites[l]), &(sites[l + 1]), &(sites[r])); if (c_p > 0.0) { /* Create a triangle */ c = join(a, &(sites[l]), b, &(sites[r]), RIGHT); *l_ccw = a; *r_cw = b; } else if (c_p < 0.0) { /* Create a triangle */ c = join(a, &(sites[l]), b, &(sites[r]), LEFT); *l_ccw = c; *r_cw = c; } else { /* Cross product is zero. Sites are located on a line. Triangle cannot be created */ *l_ccw = a; *r_cw = b; } } else if (n > 3) { /* Recursive case. Continue splitting */ /* Splitting point */ split = (l + r) / 2; /* Divide into two halves */ divide(l, split, &l_ccw_l, &r_cw_l); divide(split + 1, r, &l_ccw_r, &r_cw_r); /* Merge the two triangulations */ merge(r_cw_l, &(sites[split]), l_ccw_r, &(sites[split + 1]), &l_tangent); /* The lower tangent added by merge may have invalidated l_ccw_l or r_cw_r. Update them if necessary. */ if (ORG(l_tangent) == &(sites[l])) l_ccw_l = l_tangent; if (DEST(l_tangent) == &(sites[r])) r_cw_r = l_tangent; /* Update leftmost ccw edge and rightmost cw edge */ *l_ccw = l_ccw_l; *r_cw = r_cw_r; } } /* * Find the lowest cross edge of the two triangulations */ static void find_lowest_cross_edge(struct edge *r_cw_l, struct vertex *s, struct edge *l_ccw_r, struct vertex *u, struct edge **l_lower, struct vertex **org_l_lower, struct edge **r_lower, struct vertex **org_r_lower) { struct edge *l, *r; struct vertex *o_l, *o_r, *d_l, *d_r; unsigned char ready; l = r_cw_l; r = l_ccw_r; o_l = s; d_l = OTHER_VERTEX(l, s); o_r = u; d_r = OTHER_VERTEX(r, u); ready = FALSE; while (ready == FALSE) /* left_of */ if (LEFT_OF(o_l, d_l, o_r)) { l = PREV(l, d_l); o_l = d_l; d_l = OTHER_VERTEX(l, o_l); /* right_of */ } else if (RIGHT_OF(o_r, d_r, o_l)) { r = NEXT(r, d_r); o_r = d_r; d_r = OTHER_VERTEX(r, o_r); } else ready = TRUE; *l_lower = l; *r_lower = r; *org_l_lower = o_l; *org_r_lower = o_r; } /* * The most time-expensive function, most of the work gets done here. */ static void merge(struct edge *r_cw_l, struct vertex *s, struct edge *l_ccw_r, struct vertex *u, struct edge **l_tangent) { struct edge *base, *l_cand, *r_cand; struct vertex *org_base, *dest_base; double u_l_c_o_b, v_l_c_o_b, u_l_c_d_b, v_l_c_d_b; double u_r_c_o_b, v_r_c_o_b, u_r_c_d_b, v_r_c_d_b; /* cross product */ double c_p_l_cand, c_p_r_cand; /* dot product */ double d_p_l_cand, d_p_r_cand; unsigned char above_l_cand, above_r_cand, above_next, above_prev; struct vertex *dest_l_cand, *dest_r_cand; double cot_l_cand, cot_r_cand; struct edge *l_lower, *r_lower; struct vertex *org_r_lower, *org_l_lower; /* Create first cross edge by joining lower common tangent */ find_lowest_cross_edge(r_cw_l, s, l_ccw_r, u, &l_lower, &org_l_lower, &r_lower, &org_r_lower); base = join(l_lower, org_l_lower, r_lower, org_r_lower, RIGHT); org_base = org_l_lower; dest_base = org_r_lower; /* Need to return lower tangent. */ *l_tangent = base; /* The merge loop */ while (TRUE) { /* Initialise edges l_cand and r_cand */ l_cand = NEXT(base, org_base); r_cand = PREV(base, dest_base); dest_l_cand = OTHER_VERTEX(l_cand, org_base); dest_r_cand = OTHER_VERTEX(r_cand, dest_base); /* Vectors used for above and modified IN_CIRCLE tests u/v left/right candidate origin/destination */ CREATE_VECTOR(dest_l_cand, org_base, u_l_c_o_b, v_l_c_o_b); CREATE_VECTOR(dest_l_cand, dest_base, u_l_c_d_b, v_l_c_d_b); CREATE_VECTOR(dest_r_cand, org_base, u_r_c_o_b, v_r_c_o_b); CREATE_VECTOR(dest_r_cand, dest_base, u_r_c_d_b, v_r_c_d_b); /* Above tests. */ c_p_l_cand = CROSS_PRODUCT_2V(u_l_c_o_b, v_l_c_o_b, u_l_c_d_b, v_l_c_d_b); c_p_r_cand = CROSS_PRODUCT_2V(u_r_c_o_b, v_r_c_o_b, u_r_c_d_b, v_r_c_d_b); above_l_cand = c_p_l_cand > 0.0; above_r_cand = c_p_r_cand > 0.0; /* Terminate merge loop. No valid sites left in L or R. The top-most cross-edge have already been added. */ if (!above_l_cand && !above_r_cand) break; /* Move to next l_cand ccw, delete the old l_cand edge, until the in_circle test gets invalid. */ if (above_l_cand) { double u_n_o_b, v_n_o_b, u_n_d_b, v_n_d_b; double c_p_next, d_p_next, cot_next; struct edge *next; struct vertex *dest_next; d_p_l_cand = DOT_PRODUCT_2V(u_l_c_o_b, v_l_c_o_b, u_l_c_d_b, v_l_c_d_b); cot_l_cand = d_p_l_cand / c_p_l_cand; while (TRUE) { next = NEXT(l_cand, org_base); dest_next = OTHER_VERTEX(next, org_base); CREATE_VECTOR(dest_next, org_base, u_n_o_b, v_n_o_b); CREATE_VECTOR(dest_next, dest_base, u_n_d_b, v_n_d_b); c_p_next = CROSS_PRODUCT_2V(u_n_o_b, v_n_o_b, u_n_d_b, v_n_d_b); above_next = c_p_next > 0.0; if (!above_next) break; /* Terminate loop. */ d_p_next = DOT_PRODUCT_2V(u_n_o_b, v_n_o_b, u_n_d_b, v_n_d_b); cot_next = d_p_next / c_p_next; if (cot_next > cot_l_cand) break; /* Terminate loop. */ delete_edge(l_cand); l_cand = next; cot_l_cand = cot_next; } } /* Essentially the same done for r_cand symmetrically. */ /* Move to prev r_cand cw, delete the old r_cand edge, until the in_circle test gets invalid. */ if (above_r_cand) { double u_p_o_b, v_p_o_b, u_p_d_b, v_p_d_b; double c_p_prev, d_p_prev, cot_prev; struct edge *prev; struct vertex *dest_prev; d_p_r_cand = DOT_PRODUCT_2V(u_r_c_o_b, v_r_c_o_b, u_r_c_d_b, v_r_c_d_b); cot_r_cand = d_p_r_cand / c_p_r_cand; while (TRUE) { prev = PREV(r_cand, dest_base); dest_prev = OTHER_VERTEX(prev, dest_base); CREATE_VECTOR(dest_prev, org_base, u_p_o_b, v_p_o_b); CREATE_VECTOR(dest_prev, dest_base, u_p_d_b, v_p_d_b); c_p_prev = CROSS_PRODUCT_2V(u_p_o_b, v_p_o_b, u_p_d_b, v_p_d_b); above_prev = c_p_prev > 0.0; if (!above_prev) break; /* Terminate. */ d_p_prev = DOT_PRODUCT_2V(u_p_o_b, v_p_o_b, u_p_d_b, v_p_d_b); cot_prev = d_p_prev / c_p_prev; if (cot_prev > cot_r_cand) break; /* Terminate. */ delete_edge(r_cand); r_cand = prev; cot_r_cand = cot_prev; } } /* Add a successive L-R cross edge from base If both candidates are valid, choose the one with smallest circumcircle. Set the base to the new L-R cross edge. */ dest_l_cand = OTHER_VERTEX(l_cand, org_base); dest_r_cand = OTHER_VERTEX(r_cand, dest_base); if (!above_l_cand || (above_l_cand && above_r_cand && cot_r_cand < cot_l_cand)) { /* Connect to the right */ base = join(base, org_base, r_cand, dest_r_cand, RIGHT); dest_base = dest_r_cand; } else { /* Connect to the left */ base = join(l_cand, dest_l_cand, base, dest_base, RIGHT); org_base = dest_l_cand; } } }
ESSENTIALAI-STEM
Rubber Chem Encyclopedia Effect of rubber filler on fatigue resistance of reclaimed rubber products Create Date:2018-11-06 08:58:12Click volume:242 Effect of rubber filler on fatigue resistance of reclaimed rubber products The change of structure and performance of reclaimed rubber under the external force such as dynamic stretching, compression, shearing or bending is called “fatigue”. When the recycled rubber product is cracked during use, the fracture is fatigue aging. Therefore, the fatigue resistance of the rubber compound directly affects the service life of the recycled rubber product, and the rubber filler type is one of the main factors affecting the fatigue resistance of the recycled rubber. Rubber filler is the most used compounding agent in the rubber products industry (the consumption is second only to rubber). Commonly, there are carbon black, white carbon black, calcium carbonate, clay, etc. The structure and performance of different kinds of fillers are very different. The effect of the anti-fatigue properties of recycled rubber is also different. For rubber fillers (such as carbon black) which have affinity with reclaimed rubber, the highly structured filler tends to produce more dense rubber phase around the filler particles, thereby improving the fatigue aging resistance of the reclaimed rubber product; In the case of inert fillers with no affinity for reclaimed rubber, the greater the filling amount, the greater the effect on the fatigue resistance of the reclaimed rubber vulcanizate. Excessive dosage will lead to a sharp decrease in the fatigue aging resistance of the reclaimed rubber product. Therefore, when using recycled rubber to produce rubber products with high fatigue resistance, it is necessary to select a rubber filler with good affinity with the rubber. Carbon black is a good choice, and the inert filler is used with caution. Taking carbon black as an example: selecting carbon black with large specific surface area in the formula of reclaimed rubber products can improve the crack growth growth strength of reclaimed rubber products, thereby improving the fatigue life; carbon black varieties are various, although soft carbon black is in the rubber compound. The reinforcing effect is poor, but the particles are moderate, and the average particle diameter is in the range of 31-500 nm, which is very advantageous for improving the fatigue resistance of the recycled rubber product; white carbon black is used as a substitute for carbon black in the light-colored reclaimed rubber product. Similar to the performance of carbon black, the effect of improving the tear strength of reclaimed rubber and improving the fatigue resistance of the rubber is better than that of carbon black. It is often used to improve the fatigue life in black reclaimed rubber products (such as tires) and light reclaimed rubber products. When reclaimed rubber products manufacturers use rubber fillers to improve the fatigue resistance of reclaimed rubber products, in addition to selecting suitable types of rubber fillers of appropriate particle size, it is also possible to add an appropriate amount of aliphatic polyamines to the reclaimed rubber products. The reclaimed rubber acts to form an unstable salt bond and a strong covalent bond, and can activate the rubber filler, strengthen the filler dispersion and combine with the macromolecule in the rubber compound, and significantly improve the fatigue resistance of the recycled rubber product; for example, the active ultra-fine calcium carbonate is resistant to bending Flexibility is much better than light calcium, and flex resistance is close to clay. Rubber packing is not the only way to improve the fatigue resistance of recycled rubber products. Rubber product processing enterprises can also extend the fatigue life of recycled rubber products through reasonable vulcanization system design, softening plasticizing system design and anti-aging system design. Share with you.
ESSENTIALAI-STEM
Category:Locomotive engines Engines (i.e. self-contained prime movers) used to power rail locomotives. These are almost all diesel engines, although a few of the early examples used petrol (gasoline) and spark ignition, a few later examples are gas turbines. Steam locomotives are not included here, as they don't contain a separate prime mover as such.
WIKI
Dakota Access Pipeline: 5 things to know (CNN)In what looks to be a possible sequel to the Keystone XL Pipeline dispute, another fight has begun over a proposed US oil route. The Standing Rock Sioux Tribe has sued the federal government, saying the Native American tribe was not properly consulted over the project to construct a 1,168-mile crude oil pipeline that extends over four states. While proponents of the Dakota Access Pipeline tout its economic boost, opponents question its environmental impact. The US Army Corps of Engineers approved the project, granting final permits in July, to the dismay of environmentalists and the Standing Rock Sioux Tribe. 1. What is the pipeline project? The proposed Dakota Access Pipeline would transport crude oil from North Dakota through South Dakota and Iowa and into Illinois. The pipeline is also known as the Bakken Oil Pipeline, named for the oil-rich area in North Dakota. An estimated 7.4 billion barrels of undiscovered oil is believed to be in the US portion of the Bakken Formation, according to the US Geological Survey. The underground pipeline would transport 470,000 barrels of crude oil a day, which would be sent to markets and refineries in the Midwest, East Coast and Gulf Coast regions, according to Energy Transfer Crude Oil Co. 2. Why is the pipeline being constructed? The project developer, Dakota Access, a subsidiary of Energy Transfer Crude Oil, says the pipeline would help the United States become less dependent on importing energy from unstable regions of the world. It says a pipeline is the safest, most cost-effective and environmentally responsible way to move crude oil, removing dependency on rails and trucks. It also estimates the pipeline would bring an estimated $156 million in sales and income taxes to state and local governments as well as add 8,000 to 12,000 construction jobs. The proposal comes as a glut of cheap oil has devastated North Dakota's economy. The state had enjoyed a major boom, but after hitting highs in 2014, it suffered a major economic downturn. The project developers say the $3.7 billion project will "bring significant economic benefits to the region that it transverses." 3. Who is protesting? The Standing Rock Sioux Tribe filed a complaint in federal court alleging that "the construction and operation of the pipeline ... threatens the Tribe's environmental and economic well-being, and would damage and destroy sites of great historic, religious, and cultural significance to the Tribe." There are also concerns that digging the pipeline under the Missouri River would affect the tribe's drinking water supply. The tribe, represented by Earthjustice, a nonprofit environmental law firm, has asked for an injunction. Read the complaint Based in Fort Yates, North Dakota, the Standing Rock Sioux Tribe is a federally recognized Indian tribe, a successor to the Great Sioux Nation. Other Native American tribes and nations have joined its efforts. "We have laws that require federal agencies to consider environmental risks and protection of Indian historic and sacred sites," Dave Archambault II, the elected chairman of the Standing Rock Sioux Tribe, said in a statement. "But the Army Corps has ignored all those laws and fast-tracked this massive project just to meet the pipeline's aggressive construction schedule." Sen. John Hoeven of North Dakota disputes the tribe's chief complaint that the Army Corps did not properly consult it. "If there is some way for the corps to work to meet the concerns of the tribe, they should certainly do that. But (there) has been a consultation process. If the tribe doesn't feel that that has been sufficient, again, they can protest as long as they do it peacefully and safely, but ultimately their recourse is to the courts," the Republican senator told CNN affiliate KFYR-TV in Bismarck, North Dakota. About 30 environmental groups, including the Sierra Club and Greenpeace, signed a letter to President Barack Obama, slamming the Dakota Access Pipeline as "yet another example of an oil pipeline project being permitted without public engagement or sufficient environmental review." They appealed to him to reject the project -- as he did with the Keystone XL pipeline. Protests have been held in North Dakota and Washington. Construction equipment involved in the pipeline project in Iowa was set ablaze in suspected arson fires, reports say. 4. Who's on which side? Bernie Sanders spoke out against the pipeline in November 2015, but Democratic presidential nominee Hillary Clinton has not addressed the issue. CNN reached out to the Clinton campaign for comment on the issue and has not yet received a response. "If candidate Clinton does nothing to address this issue yet continues into November promising Native Americans that she is our champion, then her words will be nothing but false promises -- just more bombast, more white lies to Indians," Simon Moya-Smith, a citizen of the Oglala Lakota Nation and culture editor at Indian Country Today, wrote recently in a CNN op-ed. Celebrities such as Shailene Woodley, Susan Sarandon and Rosario Dawson have spoken out against the pipeline. Leonardo DiCaprio tweeted that he was "inspired by the Standing Rock Sioux's efforts to halt the Dakota Access Pipeline." 5. What's next? The tribe's actions may be the start of a lengthy, legal fight over the Dakota Access Pipeline. Meanwhile, construction work on the pipeline is ongoing. US District Judge James Boasberg said he wants to absorb both sides of the argument before issuing a ruling, which is expected by September 9, KFYR reported.
NEWS-MULTISOURCE
Quality of life in older adults with aortic stenosis: a narrative review Judith Horrocks, José Closs, Felicity Astin Research output: Contribution to journalArticlepeer-review 12 Citations (Scopus) Abstract Background: Aortic stenosis in older adults can lead to symptoms of breathlessness, dizziness, syncope and angina. While surgical AVR is the optimum treatment, it is not suitable for frail older people who may have other significant comorbidities. TAVI provides a safer alternative. There is evidence that aortic valve replacement reduces mortality and morbidity, but less is known about its effect on quality of life (QoL) in older adults. Aims and objectives: To carry out a narrative review of the existing literature on quality of life (QoL) after surgical aortic valve replacement (AVR) or transcatheter aortic valve replacement (TAVI) with the aim of identifying what is known about QoL pre- and postvalve replacement. Conclusions: There is some evidence that QoL improves after aortic valve replacement, but there are significant gaps in our knowledge. There are no studies that compare QoL after TAVI vs. surgical AVR; thus, we do not know the relative effect of the different procedures on QoL. The literature does not adequately explore why some people have improved QoL after aortic valve replacement and others do not. There appears to be some evidence that the existence of comorbidities may negatively influence QoL after valve replacement, but there is not enough consistent data on comorbidities to explore this further. Study designs are heterogeneous and prevent any meta-analysis of findings. Implications for practice: Decision-making processes regarding the suitability of patients for aortic valve replacement should include an assessment of the potential effects on overall QoL, rather than just relief of cardiac-related symptoms. Consideration of patients' social, emotional and physical needs both before and after valve replacement is essential if health services are serious about improving QoL as well as mortality and morbidity. Original languageEnglish Pages (from-to)227-246 Number of pages20 JournalInternational journal of older people nursing Volume9 Issue number3 Early online date11 Apr 2013 DOIs Publication statusPublished - Sep 2014 Externally publishedYes Fingerprint Dive into the research topics of 'Quality of life in older adults with aortic stenosis: a narrative review'. Together they form a unique fingerprint. Cite this
ESSENTIALAI-STEM
St Luke's Church, Lower Whitley St Luke's Church is in the village of Lower Whitley, in the civil parish of Whitley, Cheshire, England. The church is recorded in the National Heritage List for England as a designated Grade II* listed building. It is an active Anglican parish church in the diocese of Chester, the archdeaconry of Chester and the deanery of Great Budworth. It is one of three parish churches in the parish of Aston-by-Sutton, Little Leigh and Lower Whitley. The other two being St Peter, Aston-by-Sutton and St Michael and All Angels, Little Leigh. The three were previously individual parishes in a united benefice with St Mark, Antrobus. History The church on this site was originally a chapel of ease in the parish of Great Budworth. Its date of foundation is not known but in the later part of the 16th century it was in a "very ruinous condition" and was rebuilt on its original foundations by Thomas Touchet. Alterations were made during the 19th century, the major ones being in 1880 when the gallery was removed from the west end, a new organ was installed on the south side, a new pulpit was installed and the font was moved. During this time a polygonal apse was added at the east end. Exterior The church is built in brown brick with sandstone dressings; the roof is of grey slates. The plan consists of a west porch, a nave of four bays and a chancel of three bays. The sanctuary is a polygonal apse. At the northwest is a stone bell turret with a slate spire containing one bell. Interior The hammerbeam roof is intricately carved and is described as being "outstanding". The pews date originally from the 17th century; their ends have panels and ball finials. The stained glass dates probably from the 1860s, and is probably by Clayton and Bell. The two-manual organ was built around 1880 by Henry Willis and Company, with additions in 1907 by Rushworth and Dreaper, and alterations in 1950 by Kingsgate Davidson. The parish baptism registers begin in 1777. External features In the churchyard is a sundial dating probably from the mid 18th century. It is listed at Grade II. The lychgate is a memorial to the First World War and incorporates a clock.
WIKI