text
stringlengths
1
2.31M
meta
dict
Skype today updated its iOS app to version 6.25, adding support for new features that were introduced with iOS 10. Skype now integrates with Siri, allowing users to ask Siri to make a call using Skype for a hands-free way to keep in touch with friends and family. With iOS 10 and SiriKit, calling someone on Skype is as simple as using the same voice commands you're already using. Let's say you're trying to call Lucy Archer on Skype. If you have her Skype contact information saved in your iOS device, simply say "Call Lucy Archer." Siri may ask for you to confirm it has the right contact--one click later and your Skype call is initiated! In iOS 10, contact details for Skype users can be added directly to the Contacts app, which makes it easier to initiate Skype calls and messages through Siri without the need to open the Skype app. You can also invite friends to join Skype from the Contacts list. Today's update also introduces support for CallKit, allowing incoming Skype calls to be displayed on the iPhone just like a regular phone call. Skype calls can be answered like traditional phone calls using the built-in iOS functionality, which means they're answerable from the lock screen. Skype can be downloaded from the App Store for free. [Direct Link: iPhone/iPad]
{ "pile_set_name": "OpenWebText2" }
A Map of Titan's Lakes There is only one place in our solar system with stable liquid lakes and seas on its surface, besides planet Earth. Saturn's moon Titan is this place.
{ "pile_set_name": "OpenWebText2" }
Autonomic effects of nebivolol versus atenolol in healthy subjects. Nitric oxide may stimulate sympathoinhibitory reflexes. Nebivolol is a beta(1) selective adrenergic receptor antagonist with ancillary vasodilating properties by modulating nitric oxide secretion. We investigated whether nebivolol affects autonomic function differently compared with atenolol, another selective beta(1)-blocker without vasorelaxant actions. Fourteen healthy volunteers (9 men, 5 women; 25 +/- 3.7 years) received single oral doses of 5 mg nebivolol, 50 mg atenolol, and 100 mg atenolol, each taken for a 2-week period. Heart rate variability (HRV) measurements in time- (SDNN; rMSSD; pNN50) and frequency-domain (low frequency-LF; high frequency-HF; LF/HF ratio) were used to study the autonomic effects of the three regimens on the same patients from serial 24-hour ECGs. Both nebivolol and atenolol, the 50 mg dose as well as the 100 mg dose, produced similar decreases in heart rate compared with baseline throughout the 24-h period (from 82 +/- 9 beats/min to 72 +/- 7 beats/min, 69 +/- 9, and 68 +/- 8 beats/min, respectively, p < 0.001). Overall, the administration of each beta -blocker led to directionally similar increases in the HRV variables, which were most significant following 100 mg atenolol. Nebivolol and the 50 mg dose of atenolol produced similar increases in rMSSD and pNN50 during the entire 24-h period, and in HF power, particularly during the nighttime (p < 0.05). However, the coefficient of HF variance resulted in similar values after either beta -blocker regimen. The LF/HF ratio was most reduced throughout the 24-h period following 100 mg atenolol (p < 0.001), and to a similar extent decreased in the nighttime following nebivolol and atenolol 50 mg (p < 0.01). Nebivolol 5 mg exerts similar effects on time and frequency domain indexes of HRV as 50 mg atenolol. Nebivolol attenuates sympathetic tone, but does not appear to promote vagal activity more than atenolol.
{ "pile_set_name": "PubMed Abstracts" }
Q: Get First Element from Collection and delete it I need to get the first element from a Firebase Collection and then delete it, but can't figure out how to do it. I need it for a cloud function. await ref .doc(ref.limit(1).get().docs[0]); A: Bohkoval's overall logic, as presented in his/her answer is correct, however the answer is related to the Realtime Database, while the OP is working with Firestore (from the tags used in his question). Making the assumption that you "have a timestamp property which [you] can sort by" as you said in the comment below, in a Cloud Function you would do as follows for Firestore: return admin.firestore().collection("yourCollection") .orderBy("yourTimestamp", "desc") .limit(1) .get() .then(querySnapshot => { if (!querySnapshot.empty) { //We know there is one doc in the querySnapshot const queryDocumentSnapshot = querySnapshot.docs[0]; return queryDocumentSnapshot.ref.delete(); } else { console.log("No document corresponding to the query!"); return null; } });
{ "pile_set_name": "StackExchange" }
Q: Searching in large PDF files. What technology to use? I have a side project where I have about 1000 text only PDF files (Average size around 500 kb) on which dataset I want to do fast free text searching. The search results should at least tell the matched text, the PDF File which contained the matched text and optionally the location in the PDF. Does this project sound like a good candidate for cloud hosted elastic search? Or would that be an overkill for this data size? Shall I just go with Apache Lucene and put that in my own web server? Or something completely different? I would also like to put a UI in front of this functionality. I am no UI developer and our team is really lacking in UI expertise. Can you suggest some NoUI framework that generates a UI in front of a Rest API endpoint? Is there such a thing? Our language preference is python in this team as the common divisor. A: I made an applicant tracking system which has more than 20,000 CV and the best approach for you is ElasticSearch, Because: very high performance 100% accuracy for searching very easy to use with simplest APIs easy to backup with replicas And I recommend to use ElasticSearch amazon service ES. And about UI framework I just use JavaScript with FineUploader what hepled me a lot with chunking and parallel upload.
{ "pile_set_name": "StackExchange" }
An identified class of neurons in the cerebral cortex respond characteristically to both acetylcholine and norespinephrine. The increase in cell firing produced by acetylcholine is closely mimicked by cyclic GMP while the depression of cell firing produced by norepinephrine was mimicked by cyclic AMP. Other nucleotides (e.g. 5'AMP and adenosine) also produce profound depression of these same neurons which can, however, be selectively blocked by theophylline. In addition, simultaneous application of both norepinephrine and either 5'AMP or adenosine by microiontophoresis result in a synergistic action of both depressants, suggesting that these two substances (norepinephrine and 5'AMP' or adenosine) have an interaction in the cerebral cortex which may be quite important in modulating the output of these neurons. BIBLIOGRAPHIC REFERENCE: T.W. Stone and D.A. Taylor: Microiontophoretic studies of the effects of cyclic nucleotides on the excitability of neurones in the rat cerebral cortex. J. Physiol. 266: 523-543, 1977.
{ "pile_set_name": "NIH ExPorter" }
If You Go Away (New Kids on the Block song) "If You Go Away" is a song by pop group New Kids on the Block (although the group was credited under the moniker of NKOTB on the jacket.) Released as a stand-alone single on 1992, the only new song on the compilation H.I.T.S., it was later included on their 1994 album Face the Music. Written by John Bettis, Trey Lorenz and Walter Afanasieff, the latter of whom also served as the songs producer. Lead vocals are shared by Jordan Knight and Joey McIntyre, with a spoken word by Danny Wood. It was, at that point, the first song the group put out after having split with longtime manager and producer Maurice Starr. Reception The song returned the group to the US top twenty, peaking at number sixteen on the Billboard Hot 100 and number nine on the UK Singles Chart, and was a commercial rebound for the group after having seen its three previous songs all fail to reach the top forty. The group performed the song on The Arsenio Hall Show, while addressing an alleged lip-synching controversy. The single was the group's last hit until the release of the top 40 hit "Summertime" in 2008, and to date remains its final top twenty entry. Personnel Jordan Knight, Joey McIntyre: lead vocals Danny Wood: spoken voice John Bettis, Trey Lorenz: songwriters Walter Afanasieff: songwriter, producer, arranger, keyboards, Mini Moog bass, drum programming, percussion, Synclavier acoustic guitar Dan Shea: additional synthesizer and MacIntosh programming Ren Klyce: Akai AX60 and Synclavier programming Michael Landau: guitar New Kids on the Block, Claytoven Richardson, Gary Cirimelli, Skyler Jett: background vocals Track listings UK Vinyl, 7" If You Go Away – 4:00 Call It What You Want [C&C Pump It Up 7" Mix] – 4:12 Maxi-CD If You Go Away – 4:00 Didn't I (Blow Your Mind) – 4:24 Please Don't Go Girl – 4:30 I'll Be Loving You (Forever) – 4:22 Charts References Category:1991 singles Category:New Kids on the Block songs Category:Pop ballads Category:Songs with lyrics by John Bettis Category:Songs written by Walter Afanasieff Category:Columbia Records singles Category:Song recordings produced by Walter Afanasieff Category:Songs written by Trey Lorenz
{ "pile_set_name": "Wikipedia (en)" }
In today’s film news roundup, Mary Elizabeth Winstead joins Aaron Paul in “The Parts You Lose,” “Kangaroo — A Love-Hate Story” gets a U.S. release, and Phillip Noyce is honored in his native Australia. CASTING The H Collective has hired Mary Elizabeth Winstead to join Aaron Paul and newcomer Danny Murphy in Christopher Cantwell’s “The Parts You Lose.” The dramatic-thriller is fully financed by the H Collective, with Mark Johnson producing under his Gran Via banner with Tom Williams and Paul. Principal photography began Tuesday in Winnipeg, Canada. “The Parts You Lose,” written by Darren Lemke, follows the unlikely friendship that unfolds between a young deaf boy and a fugitive criminal who takes refuge in an abandoned barn on the family’s rural North Dakota farm. After forming a deep bond with the man, the boy must decide where to place his allegiances when the authorities begin to close in on the fugitive. Winstead will play the boy’s mother. “We are extremely pleased to begin production on our first film just six months after launching The H Collective,” says CEO Nic Crawley. “Mary Elizabeth is a wonderful addition to the film and we are proud to have assembled such a talented group who will breathe life into this project.” Winstead’s credits include “10 Cloverfield Lane,” “Smashed,” and the third season of the FX crime-thriller “Fargo” as well as the PBS period drama “Mercy Street.” Winstead recently wrapped production on Eva Vives’ “All About Nina” opposite Common. Winstead is represented by WME. The news was first reported by Deadline Hollywood. ACQUISITION Abramorama has acquired the North American rights to Kate McIntyre Clere and Mick McIntyre’s documentary “Kangaroo – A Love-Hate Story.” The movie will have its U.S. theatrical premiere on Jan. 19 at the Village East Cinemas in New York and the Laemmle’s Music Hall in Los Angeles, followed by a nationwide release to select cities Richard Abramowitz of Abramorama said, “We’re releasing ‘Kangaroo – A Love-Hate Story’ on January 19th leading up to Australia Day on January 26th to call attention to the fascinating and troubling dichotomy afflicting that continent. We expect this extraordinary film to open a lot of eyes.” “Kangaroo – A Love-Hate Story “explores the complex and conflicting opinions around this unique marsupial at the center of the largest mass destruction of wildlife in the world and the future of the largest remaining marsupial species left on the planet. NOYCE HONORED Phillip Noyce has been selected as the recipient of the Australian Academy of Cinema and Television Arts’ (AACTA) Longford Lyell Award – Australia’s highest screen accolade. The award will be presented at the 7th AACTA Awards Ceremony on Dec. 6 at The Star Event Centre in Sydney. The honor was first presented in 1968 as a tribute to Australian film pioneer Raymond Longford and his partner in filmmaking and life, Lottie Lyell. Noyce started his career making self-funded short films in the late 1960s and was one of the inaugural students of the Australian Film, Television and Radio School, studying alongside Gillian Armstrong and Chris Noonan. His first directing credit came in 1978 on “Newsfront”; he directed his first Hollywood film a decade later with “Dead Calm,” starring Nicole Kidman and Sam Neill. Other credits include “Clear and Present Danger,” “The Bone Collector,” “The Quiet American,” “Rabbit Proof Fence,” “Mary and Martha” and “The Giver.” Previous recipients of the award include Peter Weir, Fred Schepisi, Charles Chauvel, George Miller and Ken G. Hall, the first Australian to win an Oscar.
{ "pile_set_name": "OpenWebText2" }
Q: .htaccess redirect root to index.php I need to redirect from http://example.com/ to http://example.com/index.php. A: Use this: DirectoryIndex index.php A: Try this: RewriteEngine On RewriteBase / RewriteCond %{REQUEST_URI} ^$ RewriteCond %{HTTP_HOST} ^example.com$ RewriteRule ^$ http://example.com/index.php [L,R=301]
{ "pile_set_name": "StackExchange" }
COURT OF APPEALS EIGHTH DISTRICT OF TEXAS EL PASO, TEXAS ALEJANDRO JIMENEZ,                                     Appellant, v. THE STATE OF TEXAS,                                     Appellee. § § § § § § No. 08-08-00193-CR Appeal from  Criminal District Court No. 1 of El Paso County, Texas (TC # 20070D02194)       O P I N I O N             Alejandro Jimenez, pro se, appeals his convictions for possession with intent to distribute a controlled substance. Appellant pled guilty to possession of cocaine in an amount more than four grams and less than 200 grams, enhanced (Count I), and to possession of cocaine in an amount more than 400 grams (Count II). In accordance with a plea bargain, the trial court sentenced him to fifteen years’ imprisonment (Count 1) and twenty years’ imprisonment (Count II), said sentences to be served concurrently in the Texas Department of Criminal Justice--Institutional Division. He was also fined $1.00 in connection with Count II.             After Appellant's retained attorney filed a motion to withdraw due to Appellant’s indigence, we directed the trial court to conduct a hearing to determine whether Appellant had retained new counsel, or whether he was indigent and entitled to the appointment of counsel. The trial court called the case for hearing on June 11, 2008 and took judicial notice from the Judicial Information Management System that Appellant was not in jail. When Appellant did not appear, the bailiff called his name three times in the hallway. There being no response and no evidence before the court regarding Appellant’s financial status, the court entered an order that Appellant is not indigent. On July 24, 2008, this court notified Appellant regarding his failure to make financial arrangements for the reporter’s record. On July 30, 2008, we received Appellant’s pro se response asking the court to appoint counsel to represent him. The court then notified Appellant that (1) the trial court had determined he is not indigent, (2) the cause would be submitted without a reporter’s record, and (3) his pro se brief was due on or before September 13, 2008. No pro se brief having been filed, the court advised Appellant that the appeal would be considered without briefs pursuant to Tex.R.App.P. 38.8(b)(4).             In the interest of justice, we have reviewed the entire record for unassigned fundamental error. See Tex.R.App.P. 38.8(b)(4); Lott v. State, 874 S.W.2d 687, 688 (Tex.Crim.App. 1994). Having found no unassigned fundamental error, we affirm the judgment of the trial court. February 24, 2010                                                                                                                                           ANN CRAWFORD McCLURE, Justice Before Chew, C.J., McClure, and Rivera, JJ. (Do Not Publish)
{ "pile_set_name": "FreeLaw" }
Jared Taylor, American Renaissance, April 2002 Joanne Mariner, No Escape: Male Rape in U.S. Prisons, Human Rights Watch, 2001, 378 pp. There are probably more men than women raped in the United States every year — most of them in prison. Best estimates put the annual number of prison rapes at about 140,000, which is 50,000 more than the 90,000 or so rapes of women reported to police. Gang rape of the most brutal kind is common, and weaker prisoners often seek protection from a “daddy” who fights off other predators in exchange for total submission and sex on demand. There is an ugly racial dimension to prison rape: Blacks and Mexicans deliberately seek out white victims, and black-on-white rape is probably more common than any other kind. Prison rape is an appalling secret in a country that prides itself on human rights. One reason there is so much prison rape is that Americans refuse even to think about it. The sheer brutality of it and the racial hatred that so often drives it are too gruesome to face. To its immense credit, a lefty organization called Human Rights Watch has done a serious prison-rape study and has published its findings in a book-length report called No Escape. Human Rights Watch ordinarily specializes in trendy causes: opposition to landmines, the death penalty, and alleged violence against homosexuals in American schools. In this case, it has taken on the most untrendy of subjects, and describes inmate rape — and hatred for whites — in unflinching detail. It solicited accounts of rape by advertising in Prison Legal News and Prison Life — magazines that have high circulation in prisons — and reaped a wealth of first-hand horror stories. There is considerable variation from one prison system to another, and among different prisons within the same system, but the general picture that emerges is of a world of constant violence. As one prisoner explains in No Escape: When a new inmate enters an open barracks prison it triggers a sort of competition among the convicts as to who will seduce and subjugate that new arrival . . . Every new arrival is a potential victim. Unless the new arrival is strong, ugly, and efficient at violence, they are subject to get seduced, coerced, or raped . . . Psychosocially, emotionally, and physically the most dangerous and traumatic place I can conceive of is the open-barracks prison when first viewed by a new inmate. The only sure defense against rape is a willingness to fight, and even this may be no protection against gang assault. In many prisons a small, unaggressive white is sure to be raped, probably by blacks or Hispanics. As one prison guard explains, a young white has “almost zero” chance of escaping rape “unless he’s willing to stick someone with a knife and fortunate enough to have one.” Some of the tougher inmates may even fight each other for the chance to rape an effeminate young white. Rape is so common it has its own terminology. To rape a heterosexual man and turn him into a sexual plaything is to “turn him out,” and the victim is known as a “turnout” or “punk.” If a turnout seeks the protection of another inmate to avoid an endless series of rapes by other prisoners, he is “riding with” his protector. He becomes essentially the property of his protector and is known as his “bitch” or “ho” or “boy.” One inmate uses the lingo to explain the importance of violence: “If you’re knocked down and don’t get up you’re a ‘ho’; you have to ride.” This is because an essential quality in prison is “heart,” or a man’s willingness to keep fighting long after he is clearly beaten. As inmates explained to Human Rights Watch, a real man “would die before giving up his anal virginity.” A man who will not fight is a “punk” who deserves humiliation and exploitation. The racial dynamic in prisons puts whites at a tremendous disadvantage. First, whites are often outnumbered by both blacks and Hispanics. But far more important, just as they show no racial solidarity in “the free world,” whites in prison do not band together to protect each other from predators. As No Escape reports, Hispanics sometimes rape Hispanics, and blacks sometimes rape blacks, but neither group permits anyone of another race to rape its own people. If a black tried to “turn out” a Mexican, the Mexicans would riot and try to kill him. Blacks also defend each other from white or Hispanic rapists. It is only whites — unless they are known members of white racialist gangs who do stick together — who are on their own and can be raped with impunity. It would be hard to think of a more cruel consequence of stripping whites of racial consciousness. Some whites must choose between being the sex slave of one man or facing repeated assault. The stories they told No Escape read like nightmares: I had no choice but to submit to being Inmate B’s prison wife. Out of fear for my life, I submitted to sucking his dick, being fucked in my ass, and performing other duties as a woman, such as making his bed. In all reality, I was his slave . . . I determined I’d be better off to willingly have sex with one person, than I would be to face violence and rape by multiple people. The most tragic part to this is that the person I chose to ‘be with’ has AIDS. A Michigan inmate writes: [Another prisoner] claimed me as his property and I didn’t dispute it. I became obedient, telling myself at least I was surviving . . . He publicly humiliated and degraded me, making sure all the inmates and guards knew that I was a queen and his property. Within a week he was pimping me out to other inmates at $3.00 a man. This state of existence continued for two months until he sold me for $25.00 to another black male who purchased me to be his wife. A different inmate describes how he became a black man’s “ho.” You will clean the house, he said, have my clothes clean, and when I’m ready to get my ‘freak’ [sex] no arguments or there will be a punishment! I will, he said, let my homeboys have you or I’ll just sale you off. Do we have an understanding? With fear, misery, and confusion inside me . . . I said yes. Once a man “owns” another — and it is almost always a black “owning” a white — he is property in every sense. He can be rented out, sold or auctioned, told how to dress and talk, and given a woman’s name. That this can happen is essentially unknown outside the prison world. “It would amaze you (as it did me) to see human beings bought & sold like shoes,” writes a Texan prisoner. “You can buy a kid for 20 or 30 dollars on most wings!!” writes another. “They sell them like cattle.” “Riding” with a “daddy” may be the only way to avoid the degradation of one Virginia inmate who described what happened when six blacks entered his cell and demanded sex: I said to myself, ‘Oh no! I’m in trouble!’ I looked toward the door for an escape route finding it blocked. It was at this time that the floor officer came by on the bottom tier (I was on the top tier), doing or supposedly doing, his rounds. He noticed the inmates in my cell and asked if everything was all right. Too terrified to answer, I just nodded. [The officer] never came to the top tier during his round. I was then dragged back to my bed . . . [All of them, plus one more] took turns anally and orally raping me at the same time. All of them repeatedly did this. Somewhere in the middle of this, inmate F entered and said “suck this dick you white bitch.” . . . [One said,] ‘If you snitch on us, we’ll kill you!!’ At that time, I really believed them, and I still think this today. As one Indiana prisoner explains, repeated rape takes a staggering physical and psychological toll: I’ve been sentenced for a D.U.I. offense. My 3rd one. I’m a tall white male, who unfortunately has a small amount of feminine characteristics. And very shy. These characteristics have got me raped so many times I have no more feelings physically. I have been raped by up to 5 black men at a time . . . I probably have AIDS now. I have great difficulty raising food to my mouth from shaking after nightmares or thinking so hard on all this . . . I’ve laid down without a physical fight to be sodomized. To prevent so much damage in struggles, ripping and tearing. Though in not fighting, it caused my heart and spirit to be raped as well. Something I don’t know if I’ll ever forgive myself for. Needless to say, men will do just about anything to avoid this kind of horror. Suicide is the leading cause of death in prisons, and is the only way out for some rape victims. Some break prison rules so they will be locked up in punitive custody. One prisoner even had his family deposit money into bank accounts owned by the black Crips gang in the hope of buying protection. Of course, he was raped anyway. No Escape recognizes reluctantly that blacks and Hispanics often rape whites out of pure hatred, and relish the chance to degrade whites. As one inmate explains, “Gangs of black and Spanish inmates are very angry at free-world white people for a variety of reasons, and this results in an attitude of vengeance towards white people in prisons.” Blacks reportedly like to say “Y’all may run it out there, but this is our world!” or “Ain’t no fun when the rabbit’s got the gun, is it?” One white explains that “those two races [blacks and Hispanics] have a lot of people in here and take advantage of us by making the small and weak ones ride or turn them out, and the big ones have to fight all the time.” Human Rights Watch appears surprised to discover the obvious: Certain prison systems seem to have almost no positive social interaction — not even the most trivial — between members of different races. Prisoners’ social relationships are largely determined by race; their gang affiliation, if they have one, is racially defined; and whatever racist beliefs they may have held prior to their imprisonment are likely to be significantly strengthened over the course of their stay in prison. Despite what the book tells us about what happens to so many whites, No Escape cannot resist conventional pieties: Many white prisoners told Human Rights Watch that they were uncomfortable with blacks and would prefer to live in a racially segregated environment. A few espoused virulently racist views. More so than African American prisoners, many whites asserted that the prison experience had made them racist — or, as they tended to put it, ‘racially aware.’ It is hardly astonishing that white prisoners should be “uncomfortable” around blacks. Nor is it surprising that they want to get away from them, whereas blacks are less inclined to be separated from people they can rape, buy and sell, pimp out, and humiliate with impunity. It is true that prison doesn’t teach blacks and Hispanics to hate whites; they hate whites long before they get to prison. Needless to say, this book makes no attempt to understand this hatred, implying that it is normal for victims of a “racist” society. Nor is any black or Hispanic reported to express “virulently racist views,” not even when he tells a white victim, “suck this dick, you white bitch.” The book is full of recommendations — some good — but the one about race relations is an almost perfect distillation of liberal foolishness: Given the element of racial bias in many instances of prisoner-on-prisoner sexual abuse, steps should be taken to address racial tensions in the inmate population. DOC [Department of Corrections] staff should receive racial sensitivity training. Racial slurs and other forms of harassment — whether from inmates or staff — should not be tolerated. As anyone not blinded by orthodoxy knows, the only thing that will “address racial tensions in the inmate population” is segregation. Blacks and Hispanics hate whites because they cannot build the societies and institutions whites can, and because everyone — including whites — tells them whites are to blame for their failures. They also hate whites because whites are weak and refuse to defend each other. “Sensitivity training” for prison guards would affect this as much as it would affect the law of gravity. Even some of the inmates don’t understand what is happening. “I hate to say this,” [emphasis added] says one, “but if you weren’t racist when you came to prison more than likely you will be when you leave.” Despite what he has seen and suffered, this man still thinks he has to apologize for not wanting to be around blacks and Hispanics. Why is prison rape so well hidden, and why haven’t prisoners brought huge damages suits against the prisons that permit it? First, the guards appear to be uniformly oblivious to rape. No Escape finds that “raped inmates frequently say that they are treated scornfully by guards who do not bother to hide the fact that they despise prisoners who are so ‘weak’ as to be victimized.” The report quotes one warden who testified at a trial that “it was the prisoners’ own responsibility to fight off sexual abuse — that prisoners had to let the others ‘understand that [they]’re not going to put up with that.’” No Escape does not go into this, but prison guards are likely to be a low breed of cattle themselves. Many are likely to be black, and some may be just as happy as the rapists to see whites humiliated. Many victims therefore do not report rapes. Some are afraid that if they “snitch” their tormentors will kill them. Others are so ashamed of what has happened they tell no one. There are times when talking might do some good. John King became famous for dragging a black man to death in Jasper, Texas, in 1998. He became a byword for white “racism,” but with some luck and savvy he could have turned the tables and made the case one of black brutality. Before he killed James Byrd, he had just spent 21 months for burglary in one of Texas’ toughest prisons, the Beto Unit. He was 5 feet 7 inches tall and weighed only 140 pounds when he was sentenced, and reportedly had no pronounced racial views. He emerged covered with white-power tattoos. His lawyer said rape by blacks had deeply affected Mr. King, but that he rarely talked about it. Whites who kill blacks get no mercy, and Mr. King could not have avoided a death sentence no matter how often he was gang-buggered, but a full account of his horrors would have won considerable public sympathy and attracted badly-needed attention to the tortures white prisoners often face. For a country that is ever on the hunt for “root causes” of black deviance, it would have been edifying to know just what it was that made John King hate blacks. Needless to say, the press never let on, and his crime has been recorded as yet another example of the unfathomable evil of whites. Rape is, of course, a crime, whether committed in prison or the “free world.” However, prosecutors do not think of criminals as part of their constituency, and get little credit in the community for charging perpetrators who are already in jail. Also, they prefer to stay on good terms with prison authorities and let them take care of discipline problems. As this report points out, most violence goes unpunished in prisons, and guards often ignore rape or simply lock the victim in protective custody. Prisoners face actual criminal charges in only extreme cases: murder or assault on a guard. Human Rights Watch has been unable to find a single case in which a prisoner has been charged with rape, though it would be a strong deterrent if rapists got half a dozen more years tacked onto their sentences. There have been a few successful civil suits against prison systems, but No Escape explains why they are hard to win: Under the ‘deliberate indifference’ standard that is applicable to legal challenges to prison officials’ failure to protect prisoners from inter-prisoner abuses such as rape, the prisoner must prove to the court that the defendants had actual knowledge of a substantial risk to him, and that they disregarded that risk. As the courts have emphasized, it is not enough for the prisoner to prove that ‘the risk was obvious and a reasonable prison official would have noticed it.’ Instead, if a prison official lacked knowledge of the risk — no matter how obvious it was to anyone else — he cannot be held liable. In other words, rather than trying to ascertain the true dimensions of the problem of prisoner-on-prisoner sexual abuse, prison officials have good reason to want to remain unaware of it. The United States is always lecturing other countries about human rights, yet we do virtually nothing about a scandalous practice we would denounce in the most self-righteous tones were it to come to light in China or Iraq. It is difficult not to conclude that the racial aspect of these horrors has a lot to do with our determination to ignore them. If whites were routinely gang-buggering and enslaving blacks, there would be a high-powered campaign to stop them, with movie stars queuing up to befriend the victims, and senators preening themselves on their virtuous concern. Because whites are the victims, any investigation would run head-on into facts too awful for public consumption: that blacks and Hispanics are the “racists,” and that forced integration is even more of a disaster behind bars than in the free world. At the same time, it is a testimony to the power of liberal propaganda that it has driven white racial solidarity out of the minds even of convicted felons. One would have expected an elemental tribalism among the lower orders, but even here only a few “white supremacists” are willing to fight for each other. To those who can see beyond liberal clichés about race, the dynamics of prison rape are perfectly understandable. To those, like the author of this report, who cannot or will not understand what race really means, this book is an incomprehensible horror. Our prisons reflect our society, and as long as whites are official scapegoats and are forbidden to act in their own interests, and as long as we insist on forcing on prisoners a brutal form of integration no one would choose for himself, white prisoners will be pimped, beaten, gang raped, and infected with AIDS. America refuses to face this problem because it refuses to face itself. The full text of the Human Rights Watch report can be read at http://www.hrw.org/reports/2001/prison
{ "pile_set_name": "OpenWebText2" }
The 'Compact Firebowl' Lets You Port Your Grill Want to be able to barbecue on the go? Then the Compact Firebowl is for you. This grill definitely lives up to its name. The Compact Firebowl allows you to create your own barbecue without having to lug around a heavy BBQ pit. It’s perfect for picnics, or tail gate parties. All you do is fill the bowl with your favorite charcoal briquettes. It even works as a container for firewood or coal. Plus, with its stainless steel construction, you know that it will stand the test of time, and the elements. A must for the avid outdoorsmen or women who want to cook their food on the grill, even when a normal sized grill is not close by. Stats for Sleek Portable BBQs Trending: Older & AverageTraction:16,194 clicks in 322 w Interest: > 3 minutes Concept: Sleek Portable BBQsRelated: 74 examples / 57 photosSegment: Males, 18-35 Comparison Set: 27 similar articles, including: alternative energy barbecue, small-space cooking solutions, and hot tub and barbecue all in one.
{ "pile_set_name": "Pile-CC" }
Q: Can I create a fusion drive with an HDD that already has a boot camp partition? I'm planning to replace the optical drive in my MacBook Pro 9,1 (mid-2012, non-retina) with an SSD and make the two internal drives into a fusion drive, and I know that creating a boot camp partition on a Mac without an optical drive can be a challenge. So I want to create my boot camp partition before I create my fusion drive. I couldn't find an answer to this in my googling. I know that you can create a Boot Camp partition if you already have a fusion drive. Can I create a fusion drive using an HDD that already has a boot camp partition on it? A: From my hands-on experience, I'd have to say, "negative". I've created a couple of fusion drives on a 2008 Mac Pro from devices with preexisting partitions. Building the fusion in Core Storage destroyed all partitions on the media.
{ "pile_set_name": "StackExchange" }
Main menu The real facts about vaccination “There is a great deal of evidence to prove that immunization of children does more harm than good.” Dr J Anthony Morris, former Chief Vaccine Control Officer, US Food and Drug Administration Vaccinations are favored today, for we have become dependent consumers, always “wanting more” and manufacturers have well understood this dependency. Vaccinations reflect the concept of having the disease, the role of the doctor and the control of individual and collective health, a concept that leads to reliance on others as opposed to taking responsibility for oneself. Vaccination was practiced at a time when nothing was known about microbes, viruses or the immune system. Nevertheless, it was soon promoted to the first rank of general medical practice, routinely applied and unquestioned. It took on the aspects of a faith rather than of a science. Vaccination efforts have been met with some controversy since their inception, on scientific, ethical, political, medical safety, religious, and other grounds. In some cases, vaccinations can injure people and, in the United States, they may receive compensation for those injuries under the National Vaccine Injury Compensation Program. What is it? Vaccination is the administration of antigenic material (a vaccine) to stimulate the immune system of an individual to develop adaptive immunity to a disease. Vaccines can prevent or ameliorate the effects of infection by many pathogens. The efficacy of vaccination has been studied and verified (some harmful effects are also reported); for example, the influenza vaccine, the HPV vaccine among others. Generally it is said that vaccination is considered to be the effective method of preventing infectious diseases. The active agent of a vaccine may be intact but inactivated (non-infective) or attenuated (with reduced infectivity) forms of the causative pathogens. Toxoids are produced for the immunization against toxin-based diseases, such as the modification of tetanospasmin toxin of tetanus to remove its toxic effect but retain its immunogenic effect. History of vaccine It is believed likely that some form of inoculation was developed India or China before the 16th century. Scholar Ole Lund comments: “The earliest documented examples of vaccination are from India and China in the 17th century, where vaccination with powdered scabs from people infected with smallpox was used to protect against the disease. Smallpox used to be a common disease throughout the world and 20% to 30% of infected persons died from the disease. Smallpox was responsible for 8% to 20% of all deaths in several European countries in the 18th century. The tradition of inoculation may have originated in India in 1000 BCE.” The mention of inoculation in the Sact’eya Grantham, an Ayurvedic text, was noted by the French scholar Henri Marie Husson in the journal Dictionaire des sciences me`dicales. Almroth Wright, the professor of pathology at Netley, further helped shape the future of vaccination by conducting limited experiments on the professional staff at Netly, including himself. The outcome of these experiments resulted in further development of vaccination in Europe. The Anatolian Ottoman Turks knew about methods of inoculation. This kind of inoculation and other forms of variolation were introduced into England by Lady Montagu, a famous English letter-writer and wife of the English ambassador at Istanbul between 1716 and 1718, who almost died from smallpox as a young adult and was physically scarred from it. She came across the Turkish methods of inoculation, consenting to have her son inoculated by the Embassy surgeon Charles Maitland in the Turkish way. Lady Montagu wrote to her sister and friends in England describing the process in details. On her return to England she continued to propagate the Turkish tradition of inoculation and had many of her relatives inoculated. The breakthrough came when a scientific description of the inoculation operation was submitted to the Royal Society in 1724 by Dr Emmanual Timoni, who had been the Montagu’s family physician in Istanbul. Inoculation was adopted both in England and in France nearly half a century before Jenner’s famous smallpox vaccine of 1796. Since then vaccination campaigns have spread throughout the globe, sometimes prescribed by law or regulations. Vaccines are now used against a wide variety of diseases besides smallpox. Louis Pasteur further developed the technique during the 19th century, extending its use to killed agents protecting against anthrax and rabies. The method Pasteur used entailed treating the agents for those diseases so they lost the ability to infect, whereas inoculation was the hopeful selection of a less virulent form of the disease, and Jenner’s vaccination entailed the substitution of a different and less dangerous disease for the one protected against. Pasteur adopted the name vaccine as a generic term in honor of Jenner’s discovery. It is also said that it began at the end of the 18th century, to protect against smallpox. The English doctor, Edward Jenner, experimented with inoculation of the bovine disease, cowpox, which was considered similar to variola (or small pox, as opposed to the great pox, syphilis), a disease of man. The word vaccination was first used by Edward Jenner in 1796. Louis Pasteur furthered the concept through his pioneering work in microbiology. How does it work? The theory goes like this that when a weakened form of disease germ is injected to the body, body produces antibodies to fight these invaders. If the actual disease germs ever attack the body it is believed that the antibodies will still be there to destroy them. “Every vaccine carries certain hazards and can produce inward reactions in some people…in general; there are more vaccine complications than is generally appreciated.” Professor George Dick, London University Is our body so weak!? Each child is born with a full immune system composed of cells, glands, organs, and fluids that are located throughout his or her body to fight invading bacteria and viruses. The immune system recognizes germs that enter the body as “foreign” invaders, or antigens, and produces protein substances called antibodies to fight them. A normal, healthy immune system has the ability to produce millions of these antibodies to defend against thousands of attacks every day. Many antibodies disappear once they have destroyed the invading antigens, but the cells involved in antibody production remain and become “memory cells.” Memory cells remember the original antigen and then defend against it when the antigen attempts to re-infect a person, even after many decades. This protection is called immunity. Natural healers believe that, it is not the germs that provoke disease; it is breakdown of metabolic equilibrium. The germs begin to proliferate when the organism changes and disorganization sets in. Certain pathogenic agents can persist without causing damage; others can trigger disease without the presence of antibodies. Vaccine supporters are obsessed with the idea that polio can kill or handicap endlessly, whereas millions of infants are infected with the virus with no sign of the disease, the microbe being a “table companion” in the intestines. Why should your child get vaccinated? (From the supporter side) Without immunizations your child may have to be excluded from school or child care:-During disease outbreaks, unimmunized children may be excluded from school or child care until the outbreak is over. This is for their own protection and the protection of others. It can cause hardship for the child and parent. Vaccine-preventable diseases haven’t gone away. The viruses and bacteria that we vaccinate against and that cause illness and death still exist. Without the protection of vaccines, we will experience more disease outbreaks, more severe illnesses, and more deaths. Vaccines won’t give you the disease they are designed to prevent. You cannot “catch” the disease from the vaccine. Some vaccines contain “killed” virus, and it is impossible to get the disease from them. Others have weakened viruses designed to ensure that you cannot catch the disease. Vaccine-preventable diseases are expensive. An average influenza illness can last up to 15 days, translating into five or six missed work days. Adults who get hepatitis A lose an average of one month of work. Immunizations can save your child’s life:- Because of advances in medical science, your child can be protected against more diseases than ever before. Some diseases that once injured or killed thousands of children, have been eliminated completely and others are close to extinction– primarily due to safe and effective vaccines. One example of the great impact that vaccines can have is the elimination of polio in the United States. Polio was once America’s most-feared disease, causing death and paralysis across the country, but today, thanks to vaccination, there are no reports of polio in the United States. Vaccination is very safe and effective: – Vaccines are only given to children after a long and careful review by scientists, doctors, and healthcare professionals. Vaccines will involve some discomfort and may cause pain, redness, or tenderness at the site of injection but this is minimal compared to the pain, discomfort, and trauma of the diseases these vaccines prevent. Serious side effects following vaccination, such as severe allergic reaction, are very rare. The disease-prevention benefits of getting vaccines are much greater than the possible side effects for almost all children. It’s true that newborn babies are immune to many diseases because they have antibodies they got from their mothers. However, the duration of this immunity may last only a month to about a year. Further, young children do not have maternal immunity against some vaccine-preventable diseases, such as whooping cough. If a child is not vaccinated and is exposed to a disease germ, the child’s body may not be strong enough to fight the disease. Before vaccines, many children died from diseases that vaccines now prevent, such as whooping cough, measles, and polio. Those same germs exist today, but babies are now protected by vaccines, so we do not see these diseases as often. Immunizing individual children also helps to protect the health of our community, especially those people who are not immunized. People who are not immunized include those who are too young to be vaccinated (e.g., children less than a year old cannot receive the measles vaccine but can be infected by the measles virus), those who cannot be vaccinated for medical reasons (e.g., children with leukemia), and those who cannot make an adequate response to vaccination. Also protected, therefore, are people who received a vaccine, but who have not developed immunity. In addition, people who are sick will be less likely to be exposed to disease germs that can be passed around by unvaccinated children. Immunization also slows down or stops disease outbreaks. Why do some moms fear to get their babies vaccinated?! Vaccines contain toxic additives and heavy metals: The list of vaccine ingredients includes toxins such as formaldehyde, a substance which the Queensland Poisons Control Centre has said was ‘unsafe at any level if injected into the human body’; carbolic acid, also a strong poison which was implicated in deaths and serious injuries in a recent Sydney hospital mishap; aluminium which is linked with the development of Alzheimer’s disease and allergies; and Thiomersal, a mercury-based preservative which is a known neurotoxin and whose inclusion in vaccination sparked a series of Congressional hearings which saw the US Government and the AAP (American Academy of Paediatrics) call for its immediate withdrawal from any vaccine product and which was withdrawn over two years ago in the USA from any over-the-counter medicines. It was also withdrawn from the American Hepatatis B vaccines, Engerix and HB Vax II, though their Australian counterparts which are still being injected into children here today, are only just being made mercury free or mercury reduced (though the old, mercury-laced stocks will be used up rather than being withdrawn from use). Vaccines are contaminated with human and animal viruses and bacteria:- All childhood vaccines, apart from the Hepatitis B (which is genetically engineered and carries with it a different set of problems,) are cultured on either animal tissue, a broth of animal and/or human blood and blood products or the cell lines from aborted human foetuses. None of these culturing methods is able to guarantee an uncontaminated vaccine. In fact, it is well known that many foreign viruses and bacteria can and do contaminate vaccines. Almost none of these contaminants have been studied. The few which have been leave many parents concerned about the long-term effects of injecting these substances into their children. Vaccines can cause serious immediate side effects:- As long as there have been vaccines, there have been reports of serious side effects following their administration. These side effects include (but are not limited to) convulsions and epilepsy, permanent brain damage, anaphylactic (life threatening allergic) reactions, Sudden Infant Death Syndrome (SIDS), retinal and brain haemorrhages (now being confused with Shaken Baby Syndrome) and death. Vaccines can cause serious long-term side effects:- According to medical reports, children are now less healthy than they have ever been before. More than 40% of all children now suffer from chronic conditions , something that was unheard of prior to mass vaccination. Vaccines have been associated with such conditions as Asthma, Eczema, Food Allergies, Chronic Ear Infections, Insulin Dependent Diabetes, Arthritis, Juvenile Rheumatoid Arthritis, Autism, Attention Deficit Disorder, Ulcerative Colitis, Irritable Bowel Syndrome, Hyperactivity, Schizophrenia, Multiple Sclerosis, Cancer and a raft of other chronic and auto-immune conditions which are experiencing dramatic rises in incidence. Vaccines do not necessarily protect against infectious diseases:- For many years, parents were told that once a child was fully vaccinated, they would be protected for life. That has now turned into a series of life-long boosters that are still not able to protect either children or adults from infectious diseases. For the very real risk of both short and long-term side effects from vaccines, parents are asked to allow their children to be given vaccines that at best, will provide a temporary sensitisation to illnesses and at worst, can make their children more susceptible to both opportunistic and infectious illness. Doctors, as paid salesmen for vaccine products, are no longer considered to be trustworthy arbiters of their safety and effectiveness:- Doctors are currently receiving several payments from the government to push vaccines. These include $6 for reporting vaccinations to the Australian Childhood Immunisation Register (ACIR), a national database which tracks vaccination status in our children and which has been called ‘back-door Australia Card’; $18.50 on top of their Medicare rebate for vaccinating a child on time; and a bulk payment at the end of each year based upon them having a practice vaccination rate in excess of 80%. These payments can add up to many tens of thousands of dollars in a busy inner-city practice. Some childhood illnesses have beneficial aspects and therefore, prevention may not necessarily be in the best interests of the child:- Measles, for example, has been used in Scandinavian countries to successfully treat such autoimmune conditions as eczema and many studies have performed which show that children who do not contract measles naturally as a child are more likely to suffer from certain cancers later in life. In addition, recent studies have shown that contracting the common childhood illnesses help to prime and strengthen the immune system in a way that vaccinations just cannot do. This priming means that children are much less likely to suffer from the now common allergic and autoimmune conditions that plague them today Conditions such as asthma, diabetes and cancer. In addition, vaccinated mothers cannot confer passive immunity to their children even if they have contracted the wild form of the disease. This immunity used to protect all children during their vulnerable first months and years. Now, a vaccinated mother will give birth to a child who will be susceptible to these infections when, prior to vaccines, they would normally have been immune. “Immunization against smallpox is more hazardous than the disease itself.” Professor Ari Zuckerman, World Health Organisation Why do natural healers oppose it? Natural healers believe that the actual cause of the disease is not germs but the derangement of vital energy in emotional physical and spiritual planes as WHO said. It is proved that everyone who got exposed to some germs will not get disease. Nowadays SIDS, Autism, ADHD and Learning disabilities have increased markedly; Vaccination has a great role in this. When we go to the historical data it is really horrible. An unpublished study by the World Health Organisation (WHO) on a “measles susceptible” (malnourished) group of children showed that the group who hadn’t been vaccinated contracted measles at the normal contract rate of 2.4%. Of the group who had received the measles vaccine (MMR), 33.5% contracted measles. In an Australian study, a group of recruits were immunized for Rubella, and all produced the expected antibodies. When later exposed to the disease, 80% of the recruits contracted it. According to the U.S. National Childhood Vaccine Injury Act (est.1986): To qualify for compensation, the adverse effects of vaccination must occur within four hours of receiving the vaccine. Despite this extremely severe limitation, as of February 28, 1998 compensatory payments have totaled $871,800,000.00. This figure is even more alarming when it is revealed that only one in four claimants were awarded compensation. Some researchers postulate that the use of live viral vaccines introduce foreign genetic material into the human system, which has contributed to the unprecedented escalation of auto-immune disorders (like multiple sclerosis, rheumatoid arthritis, lupus, cancer, Crohn’s disease, asthma, etc.) in recent decades. Fully Vaccinated Children are the Unhealthiest, Most Chronically Ill Children :- One thing that completely confounds me is that there are no studies comparing the health of unvaccinated children to the health of vaccinated children. This seems like such an obvious study and it should have been conducted decades ago. Why hasn’t it been done yet? My guess is because the health of the nonvaccinated children would so totally blow away the health of the vaccinated children that the discussion about the dangers of vaccines could finally be put to bed and the case would be closed emphatically in favor of those that accuse shots of causing chronic illness and auto immune disease. Take an informal poll of the folks in your circle and see for yourself. Observation is a powerful tool, so put it to use. The kids with the most problems – allergies, asthma, ADHD, autism, coordination and other gross motor issues, etc sure seem to be the ones that are right on track with their vaccination schedule, don’t you think? Even more powerful, ask Moms with several children, some of whom are vaccinated and some who are not. In my own circle, the Moms I know who have one or two older kids who are fully vaccinated and the younger kids who did not get any shots tell me that, hands down, that the unvaccinated children are healthier and have less problems A Number of Vaccines Have Already Had Problems/Been Removed from the Market:- Here is a brief list of some of the vaccines that have caused serious injury in recent years. Please comment with others that you know of if they are not on this list: – In Feb 2002, GlaxoSmithKline removed the Lyme Disease vaccine from the market citing poor sales when in fact a number of folks who received the vaccine reported symptoms worse than the disease itself such as incurable arthritis or neurological impairment. – The Rotavirus vaccine (Rotashield) was removed from the market in 1999 due to an association between the vaccine and life threatening bowel obstruction or twisting of the bowl! Interestingly, my pediatrician at the time (who was a lifelong friend of our family) had highly recommended that this vaccine be given to my newborn baby at the time. I trusted my instincts and said no to the shot – am I glad I did! My pediatrician (remember, lifelong family friend) subsequently dropped me as a patient. Guess he wasn’t such a friend after all! – A warning was issued concerning the second Rotavirus vaccine (Rotateq) in 2007 as it caused the same twisting of the bowel problem in 28 infants (16 of which required intestinal surgery). This second vaccine has not yet been removed from the market. Unfortunately, it’s virtually impossible to determine the real incidence of damaging adverse reactions. For example, a British government report claims the rate of permanent neurologic damage from the DPT vaccine to be 1 in 300,000. However, other researchers indicate the permanent damage level to be anywhere from 1 in 62,000 to 1 in 300. Research by Coulter and Fisher on the 3.3 million children vaccinated yearly in the U.S. found there to be a total of 33,006 cases of acute neurological reactions (encephalitic screaming, convulsions, collapse) within 48 hours of receiving the DPT shot. Long term consequences The worrying aspect of live viral vaccines is they introduce foreign genetic material into the human body. Dr. R. Moskowitz, MD and Harvard graduate, explains how this can lead to auto-immune disease susceptibility: “Vaccinal attenuated viruses attach their own genetic ‘episome’ to the genome (half set of chromosomes and their genes) of the host cell, and are thus capable of surviving or remaining latent within the host cells for years. The presence of foreign antigenic material within the host cell sets the stage for their unpredictable provocation of various auto-immune phenomena such as herpes, shingles, warts, tumors – both benign and malignant – and diseases of the central nervous system, such as varied forms of paralysis and inflammation of the brain.” Dr. Markowitz states that in addition, vaccines do not just produce mild versions of the original disease, but all of them commonly produce a variety of their own symptoms. In some cases, “these illnesses may be considerably more serious than the original disease, involving deeper structures, more vital organs, and less of a tendency to resolve spontaneously. Even more worrisome is the fact that they are almost always more difficult to recognize.” It cannot be concluded! It is suspected that the number of adverse reactions and vaccine-damaged children is actually much, much higher than is currently presented by the medical/pharmaceutical community. There is a big much bigger lobby behind it. The real truth about vaccination is terrifying. Many physicians are not cognizant of the importance of reporting untoward reactions, or may be unaware of their clinical features. Combine this ignorance with the millions of dollars in profit generated by vaccination that goes straight into the pockets of manufacturing companies, governments and medical doctors, and it becomes clear that vaccination is of a political and economic issue, than a health issue. Barbara Fisher, who served for ten years on the U.S. National Vaccine Advisory Committee states: “We have bad science and bad medicine translated into law to ensure that vaccine manufacturers make big profits, that career bureaucrats at the Public Health Service meet the mass vaccination goals promised to politicians funding their budgets, and pediatricians have a steady flow of patients…As the drug companies have often stated in meetings I have attended, if a vaccine they produce is not mandated to be used on a mass basis, they do not recoup their R&D costs and do not make the profit they want. In the medical literature official studies of vaccine risk are published purportedly proving there is no cause and effect. What the reader does not know is that often the studies have been designed and conducted by physicians who sit on vaccine policy-making committees at the Centers for Disease Control…some of whom receive money from vaccine manufacturers for their universities and for testifying as expert witnesses in vaccine-injury cases. And others are federal employees with an eye on career advancement within HHS and a future job with a vaccine manufacturer after retirement from public service. Many of these same physicians sit on the peer review boards of the major medical journals such as Pediatrics and JAMA, where they refuse space for studies or letters from the few brave physicians who dare to challenge their assertions that there is no cause and effect”
{ "pile_set_name": "Pile-CC" }
Of course we’ll take a look at some of the excellent (and fairly diverse) figures coming out of the 3.75″ camp. Special shout out to Cloak (above) from Cloak and Dagger fame! One of my favorite Marvel Universe characters…Check it out after the break… Share this: Email Print Tweet
{ "pile_set_name": "OpenWebText2" }
Katherine C Wu The use of novel adhesive patch electrocardiographic monitoring for extended time periods has the potential to improve our detection and pathophysiologic understanding of ambient arrhythmias. Here we present a case of torsade de pointes in an HIV-infected individual highlighting the multiple mechanisms that may contribute to increased ventricular a... Read More»
{ "pile_set_name": "Pile-CC" }
After playing Super Mario Sunshine for 8 years, I finally finished the game with all the 120 Shine Sprites.That inspired me to create this incredible vector of Celestia with FLUDD and behind, shadow Celly.Super Mario Sunshine, not an easy game but definitely, one of my favorites.Enjoy !You can't use it for suggestive, belic, gore or hate material.For NON-PROFIT use only.NO BASES.If you use it, leave a comment with the link of your work.++ I don't own "My Little Pony" or anything related to the series. That's property of Hasbro Ltd. (c) and the producers. ++
{ "pile_set_name": "OpenWebText2" }
An Electropolymerized Crystalline Film Incorporating Axially-Bound Metalloporphycenes: Remarkable Reversibility, Reproducibility, and Coloration Efficiency of Ruthenium(II/III)-Based Electrochromism. Oxidative electropolymeization of an axially bound, bithiophene-pyridine complex of ruthenium(III)-porphycene [Ru(TPrPc) (btp)2]PF6 (1) gives a submicrometer-thick, polymeric film on an ITO electrode with a crystalline morphology. The polymeric film, the first example of axially linked multimetalloporphycene coordination arrays, exhibits highly stable and reproducible electrochromic response with high electrochromic efficiency upon electrochemical control over the metal-centered electron transfer process (Ru(II)/Ru(III)).
{ "pile_set_name": "PubMed Abstracts" }
uc? 5/26 What is prob of sequence uxux when four letters picked without replacement from xxuuuuxxxu? 5/63 Calculate prob of sequence eiii when four letters picked without replacement from {e: 3, i: 4}. 3/35 Calculate prob of sequence dund when four letters picked without replacement from hrhurhnnnednhrnhh. 0 Two letters picked without replacement from epppppppveppeeipv. What is prob of sequence ev? 1/34 Three letters picked without replacement from {j: 1, h: 1, b: 1, q: 1, w: 1}. What is prob of sequence bjq? 1/60 Two letters picked without replacement from {p: 2, c: 1, i: 1, a: 5}. Give prob of sequence ia. 5/72 Three letters picked without replacement from qjjjqj. What is prob of sequence qjq? 1/15 Calculate prob of sequence cccc when four letters picked without replacement from bbcccccbbccbbbbcbcb. 21/646 Two letters picked without replacement from igwwbpz. Give prob of sequence pi. 1/42 What is prob of sequence ykk when three letters picked without replacement from kyyykkyyyjkjkyy? 16/273 Four letters picked without replacement from {h: 4, a: 8, t: 1}. What is prob of sequence tahh? 4/715 Two letters picked without replacement from {s: 5, f: 1, h: 3, r: 2, m: 1, u: 3}. Give prob of sequence fm. 1/210 Four letters picked without replacement from qjqgqig. What is prob of sequence qjgq? 1/70 Three letters picked without replacement from jyy. What is prob of sequence yyj? 1/3 Calculate prob of sequence jnys when four letters picked without replacement from {j: 4, n: 1, m: 1, y: 9, s: 2}. 3/2380 Three letters picked without replacement from {v: 2, h: 9, w: 5, q: 2}. Give prob of sequence qww. 5/612 Three letters picked without replacement from vbonvookvooo. What is prob of sequence nvk? 1/440 Two letters picked without replacement from jhnyycjah. Give prob of sequence nc. 1/72 Calculate prob of sequence hp when two letters picked without replacement from pppmpppkppmhmkm. 4/105 What is prob of sequence os when two letters picked without replacement from scllttocq? 1/72 Calculate prob of sequence tltl when four letters picked without replacement from lltlltlll. 1/36 What is prob of sequence dw when two letters picked without replacement from {d: 2, w: 4, z: 2, a: 3, v: 3, r: 1}? 4/105 What is prob of sequence cao when three letters picked without replacement from {o: 1, c: 4, g: 6, a: 2}? 2/429 Calculate prob of sequence eea when three letters picked without replacement from {d: 5, a: 3, e: 3, s: 1}. 3/220 Calculate prob of sequence dd when two letters picked without replacement from {t: 3, d: 3}. 1/5 What is prob of sequence hdzz when four letters picked without replacement from {z: 2, d: 5, h: 4}? 1/198 Calculate prob of sequence cwwu when four letters picked without replacement from {w: 3, h: 2, u: 3, c: 8}. 3/910 Calculate prob of sequence gg when two letters picked without replacement from {s: 2, g: 4}. 2/5 Calculate prob of sequence iwn when three letters picked without replacement from {w: 9, a: 2, i: 3, k: 1, n: 2}. 9/680 What is prob of sequence gt when two letters picked without replacement from {t: 2, e: 3, g: 3, q: 1, m: 1, d: 1}? 3/55 Calculate prob of sequence crr when three letters picked without replacement from {r: 4, n: 2, c: 5}. 2/33 Calculate prob of sequence zz when two letters picked without replacement from {z: 5, s: 9}. 10/91 Calculate prob of sequence xn when two letters picked without replacement from enex. 1/12 Four letters picked without replacement from qqggggggqggggggqgg. What is prob of sequence gqgg? 91/765 Two letters picked without replacement from {v: 6, c: 2, l: 2, r: 3, o: 5}. What is prob of sequence vo? 5/51 Three letters picked without replacement from {p: 2, y: 1}. Give prob of sequence pyp. 1/3 Three letters picked without replacement from wnnfwoddnwwownwdwwd. What is prob of sequence dfw? 16/2907 Three letters picked without replacement from okokdodkko. What is prob of sequence ooo? 1/30 Two letters picked without replacement from {r: 1, l: 3, a: 1, q: 3, t: 3, o: 8}. Give prob of sequence qq. 1/57 Calculate prob of sequence uyoy when four letters picked without replacement from ooooyuyoooooooy. 11/5460 What is prob of sequence iigi when four letters picked without replacement from iigibvrvmgmmmgmgv? 1/2380 Three letters picked without replacement from {j: 2, u: 10, r: 1, f: 3}. What is prob of sequence urf? 1/112 Four letters picked without replacement from {x: 3, s: 3, z: 10, e: 3}. What is prob of sequence zzzs? 15/646 Three letters picked without replacement from {d: 1, o: 2, l: 2, m: 1, r: 1}. What is prob of sequence orl? 2/105 What is prob of sequence vyey when four letters picked without replacement from {e: 8, v: 3, y: 7}? 7/510 Two letters picked without replacement from tggzzzzgxzg. What is prob of sequence zx? 1/22 Calculate prob of sequence iz when two letters picked without replacement from {z: 7, b: 2, i: 2}. 7/55 Calculate prob of sequence fii when three letters picked without replacement from {i: 5, f: 2}. 4/21 Two letters picked without replacement from viivviiiviiiiv. Give prob of sequence vv. 10/91 Calculate prob of sequence bbb when three letters picked without replacement from hhhhhhbbhbb. 4/165 What is prob of sequence ap when two letters picked without replacement from {y: 4, a: 1, p: 2}? 1/21 Calculate prob of sequence yw when two letters picked without replacement from lqyqwlywww. 4/45 Calculate prob of sequence dddd when four letters picked without replacement from ddddd. 1 Two letters picked without replacement from {h: 9, k: 7, j: 3}. Give prob of sequence hj. 3/38 What is prob of sequence zodg when four letters picked without replacement from {g: 1, d: 1, i: 1, o: 1, z: 1}? 1/120 Calculate prob of sequence immi when four letters picked without replacement from miio. 0 Calculate prob of sequence jq when two letters picked without replacement from qajqp. 1/10 Three letters picked without replacement from ppppppppwpoppp. What is prob of sequence wpo? 1/182 Two letters picked without replacement from xmeqxm. Give prob of sequence ex. 1/15 Calculate prob of sequence no when two letters picked without replacement from {o: 1, a: 1, k: 1, t: 3, n: 1}. 1/42 Calculate prob of sequence cevc when four letters picked without replacement from vcveecveecevvvceev. 49/6120 Two letters picked without replacement from {q: 4, r: 1, o: 1, d: 5}. What is prob of sequence rd? 1/22 What is prob of sequence pqp when three letters picked without replacement from qhqqpppsqpq? 2/33 What is prob of sequence atxt when four letters picked without replacement from tetcxea? 1/420 Calculate prob of sequence rr when two letters picked without replacement from {s: 1, r: 2}. 1/3 Three letters picked without replacement from bvbr. What is prob of sequence bvb? 1/12 What is prob of sequence hbdh when four letters picked without replacement from {x: 10, h: 5, b: 4, d: 1}? 2/2907 Calculate prob of sequence vv when two letters picked without replacement from vokggvu. 1/21 Four letters picked without replacement from ppppppppbppb. Give prob of sequence pbpb. 1/66 Calculate prob of sequence oe when two letters picked without replacement from oeyyoba. 1/21 Four letters picked without replacement from {i: 3, w: 1, j: 1}. What is prob of sequence iiij? 1/20 What is prob of sequence pelp when four letters picked without replacement from {g: 3, l: 2, d: 3, e: 2, p: 3}? 1/715 Four letters picked without replacement from kkkkkk. Give prob of sequence kkkk. 1 Four letters picked without replacement from {h: 2, v: 3, x: 2, g: 5}. Give prob of sequence gvxh. 1/198 What is prob of sequence oytt when four letters picked without replacement from {p: 1, y: 5, t: 2, o: 1}? 5/1512 Four letters picked without replacement from ttktrtrktttttkkr. Give prob of sequence trkt. 9/455 Three letters picked without replacement from {n: 1, v: 7, d: 2, h: 4, j: 6}. Give prob of sequence vdn. 7/3420 Four letters picked without replacement from xidfedddiiixix. What is prob of sequence xide? 5/2002 What is prob of sequence rfw when three letters picked without replacement from {w: 4, f: 3, y: 3, h: 1, u: 2, r: 2}? 4/455 Four letters picked without replacement from ggiiigg. Give prob of sequence gggi. 3/35 Three letters picked without replacemen
{ "pile_set_name": "DM Mathematics" }
<?xml version="1.0" encoding="UTF-8"?> <project version="4"> <component name="ProjectModuleManager"> <modules> <module fileurl="file://$PROJECT_DIR$/.idea/react-nodebird.iml" filepath="$PROJECT_DIR$/.idea/react-nodebird.iml" /> </modules> </component> </project>
{ "pile_set_name": "Github" }
Every day, thousands of Filipinos go abroad to seek greener pastures and provide a better life for their loved ones back home. Their sacrifice and endurance to face the unknown for the sake of their families, as well as helping the country’s economy through their remittance, have earned them the title, “Bagong Bayani”. Clamor for Liza Soberano to be the next Darna is growing more intense now more than ever. But her manager Ogie Diaz said there is “no official confimation yet” if indeed the young actress will take the role of the Filipina heroine.
{ "pile_set_name": "Pile-CC" }
A new Chinese league called the International Games League (IGL) has been announced, which will give out 1,270,000 CNY (~$195,000) over two seasons in 2016. Each season of the International Games League, powered by NiceTV and Tencent Sports, will feature three stages - qualifiers consisting of qualifiers, an online part of the league and the LAN finals at the end. Two seasons, in spring and in summer, will be held across 2016, each featuring 270,000 CNY (~$42,000). The online part will have 16 teams spread into four groups, half of which will be directly invited. TyLoo expected to pop up in the invite list for IGL Spring Eight teams will then take part in the playoff bracket, which will send the top four teams to the season's LAN finals. Top two teams from each season's LAN finals will then play at the annual finals, which will give out another 730,000 CNY (~$110,000), adding up to a total of a whopping 1,270,000 CNY (~$195,000) across 2016. Each season's prizepool will be spread among the top four as follows:
{ "pile_set_name": "OpenWebText2" }
(ns sicp.chapter01.1-14) (defn first-denomination [kinds-of-coins] (cond (= kinds-of-coins 1) 1 (= kinds-of-coins 2) 5 (= kinds-of-coins 3) 10 (= kinds-of-coins 4) 25 (= kinds-of-coins 5) 50)) (defn cc [amount kinds-of-coins] (cond (zero? amount) 1 (or (neg? amount) (zero? kinds-of-coins)) 0 :else (+ (cc amount (dec kinds-of-coins)) (cc (- amount (first-denomination kinds-of-coins)) kinds-of-coins)))) (defn count-change [amount] (cc amount 5))
{ "pile_set_name": "Github" }
Browse Jewelry Browse stores Women's House of Holland Shorts Since officially launching his eponymous label 'House of Holland 'in 2008, British designer Henry Holland has been building upon the cult following that began with his debut line of graphic T-shirts a few years earlier. Providing a fun mix of urban streetwear elements and high-end design, this contemporary brand offers bold, standout clothing that will make a statement whatever the occasion. From sports-inspired styles featuring clashing prints to classic denim cut-offs adorned with bright embroidery, House of Holland shorts are fun, casual and undeniably cool. International We use cookies to provide you with the best possible experience on our website. This includes third party cookies and personalised content. If you continue we’ll assume you’re happy to receive all cookies. However, you can change your mind at any time. Read more
{ "pile_set_name": "Pile-CC" }
LAS VEGAS — Dennis Smith Jr. watched the free-agent market play out without a star coming to the Knicks, then spent the day at the team’s practice Saturday watching the young players on the roster. And it was enough for him to make a bold proclamation. “I think we can hit the playoffs,” Smith said. “Everybody does a lot of talking and things like that. I never really been one to feed into it on social media and things like that. But I think we have a really good team, and especially with the way I’ve been working this summer, I think I’m going to take my game to the next level and it’s going to put us in the playoffs.” If Smith did feed into the social media scene, he might see that he doesn’t have a lot of company in that assessment. But he believes that his improvement — he has retooled his shot after shooting only 28.9 percent from three-point range after joining the Knicks — will start things, and he is a huge fan of Julius Randle. Smith was at Knicks practice at a high school far off the Las Vegas Strip, sweating through a workout with assistant coach Royal Ivey. He returns to the Knicks with the experience of his three months with the team last season and a summer working with another assistant coach, Keith Smart. He believes that is enough to prove he is ready to ascend to another level. Asked if he thinks this could be the season in which he justifies being chosen ninth in the 2017 NBA Draft, he said, “Yeah. I think it is. I honestly felt like I was supposed to be 1. Probably like everybody else in the class. I feel like that this the perfect time to come out and prove why I feel that way.”
{ "pile_set_name": "OpenWebText2" }
-s 5 1 apple.bmp 1 1 1
{ "pile_set_name": "Github" }
Interactive programming Interactive programming is the procedure of writing parts of a program while it is already active. This focuses on the program text as the main interface for a running process, rather than an interactive application, where the program is designed in development cycles and used thereafter (usually by a so-called "user", in distinction to the "developer"). Consequently, here, the activity of writing a program becomes part of the program itself. It thus forms a specific instance of interactive computation as an extreme opposite to batch processing, where neither writing the program nor its use happens in an interactive way. The principle of rapid feedback in extreme programming is radicalized and becomes more explicit. Synonyms: on-the-fly-programming, just in time programming, conversational programming Application fields Interactive programming techniques are especially useful in cases where no clear specification of the problem that is to be solved can be given in advance. In such situations (which are not unusual in research), the formal language provides the necessary environment for the development of an appropriate question or problem formulation. Interactive programming has also been used in applications that need to be rewritten without stopping them, a feature which the computer language Smalltalk is famous for. Generally, dynamic programming languages provide the environment for such an interaction, so that typically prototyping and iterative and incremental development is done while other parts of the program are running. As this feature is an apparent need in sound design and algorithmic composition, it has evolved significantly there. More recently, researchers have been using this method to develop sonification algorithms. Using dynamic programming languages for sound and graphics, interactive programming is also used as an improvisational performance style live coding, mainly in algorithmic music and video. Example code Live coding of 3D graphics in ActionScript using COLT An example of some code in the dynamic programming language SuperCollider is available here. Another example, written in ChucK is available here Live coding of graphics with fluxus: a screenshot impromptu An example of livecoding in English with Quoth Hot-swapping in the functional reactive programming language Elm See also Live coding Rapid application development Read–eval–print loop References Category:Programming paradigms
{ "pile_set_name": "Wikipedia (en)" }
Square Enix will host a Final Fantasy XV Active Time Report on November 29 at 22:00 JST, the company announced. You’ll be able to watch it live on YouTube and Niconico. The broadcast will look back on Final Fantasy XV one year after its worldwide release, and reveal the latest video and information on the game, from the results of the latest survey to the “Multiplayer Expansion Pack: Comrades” and “Episode Ignis” add-ons, and the “surprising” update due out in December. Square Enix also teases that “there may be even more news…!?” Final Fantasy XV is available now for PlayStation 4 and Xbox One, and will launch for PC in early 2018.
{ "pile_set_name": "OpenWebText2" }
Introduction {#s1} ============ Bees navigate in a range of several kilometers around their hive and communicate about locations using the waggle dance to transmit information about the flight vector towards a feeding place or a nest site [@pone.0091364-vonFrisch1], [@pone.0091364-Seeley1]. Navigation and communication require multiple cognitive faculties. Among these are, for example, recognition of the sun compass, visual distance estimation, learning of multisensory cues inside and outside the hive and translating as well as reading the codes of the waggle dance, all processes that require integration of different navigational information. Several forms of memory have been found to guide navigation (recent reviews: [@pone.0091364-Gruter1], [@pone.0091364-Menzel1], [@pone.0091364-Menzel2], [@pone.0091364-Galizia1]). In particular, route flights between hive and feeder lead to a memory of the flight vector that are bound to the sun compass and can be communicated in the waggle dance. A more flexible memory about spatial relations of landmarks is formed during the exploratory orientations flights of bees leaving the hive for the first time. This latter form of memory allows bees to steer to learned locations e.g. the hive, a different feeding site, and a dance communicated site along novel short cutting routes. It has been concluded that that these multiple spatial representations are integrated in a common frame of spatial reference. Insecticides acting on neural functions of the insect brain are possibly compromising the sensory, motor and central processing required for these cognitive functions [@pone.0091364-Decourtye1], [@pone.0091364-Schneider1], [@pone.0091364-Henry1], [@pone.0091364-Gill1], [@pone.0091364-Bortolotti1], [@pone.0091364-Medrzycki1]. Here we ask whether non-lethal doses of three neonicotinoids (imidacloprid, clothianidin, thiacloprid) interfere with navigational performance during returning flights after relocation during a foraging trip. Neonicotinoids are insecticides widely used in agriculture to protect crops against pest species. They act as agonists of the insect neuronal nicotinic acetylcholine receptors (nAChR). Since they exhibit much lower affinity to the mammalian nAChRs [@pone.0091364-Tomizawa1], they are rather specific (review [@pone.0091364-Jeschke1]). Unlike acetylcholine the neonicotinoids are not degraded by the enzyme acetyl cholinesterase. Binding of the neonicotinoid at the nAChRs will activate the receptor and via depolarization cause excitation of the postsynaptic membrane (e.g. [@pone.0091364-Brown1]--[@pone.0091364-Dglise1], [@pone.0091364-Palmer1], [@pone.0091364-Bai1], [@pone.0091364-Jepson1]). Thus, signal transmission via the neuronal insect nAChR is disturbed either by continuous synaptic stimulation or by blocking the binding of the natural transmitter, acetylcholine. The excitation of nAChRs even at sublethal doses leads to muscle cramps, activation and paralysis, and is suspected to interfere with central nervous processing. Acetylcholine is the most abundant excitatory transmitter in the insect central nervous system. Within the brain cholinergic synaptic transmission is suggested to occur from axons of the olfactory receptor neurons onto local interneurons and projection neurons within the antennal lobes (in addition some of the local interneurons are cholinergic), from antennal lobe projection neurons onto mushroom body Kenyon cells and onto neurons of the lateral horn, between ocellar second-order neurons and their postsynaptic neurons. In addition, the insect central brain, optic lobes and the thoracic ganglia contain cholinergic neurons (e. g., *Manduca sexta*: [@pone.0091364-Homberg1], *Schistocerca gregaria*: [@pone.0091364-Leitinger1], *Periplaneta americana*: [@pone.0091364-Fusca1], *Drosophila melanogaster*: [@pone.0091364-Buchner1], [@pone.0091364-Schuster1], [@pone.0091364-Yusuyama1], [@pone.0091364-Yasuyama1], *Apis mellifera*: [@pone.0091364-Kreissl1]). Given this wide-spread central nervous distribution, it is not surprising that sublethal neonicotinoid doses compromise behavior and cognitive abilities also in honeybees including memory formation and retrieval [@pone.0091364-Aliouane1], [@pone.0091364-KacimiElHassani1], social interactions, navigation and communication [@pone.0091364-Bortolotti1], [@pone.0091364-Medrzycki1] [@pone.0091364-Belzunces1]. Sublethal behavioral effects on pollinating bees may thus be the most likely exposure scenario in agriculture from neonicotinoid plant treatment. Although the concentrations detected in pollen and nectar from seed-treated crops with neonicotinoids are generally too low to cause immediate death from acute poisoning [@pone.0091364-Blacquiere1], [@pone.0091364-Cresswell1], neonicotinoid residues in pollen and nectar often lead to long-term pesticide exposure when honeybees are foraging on treated crops. Our study aims to elucidate acute effects of three neonicotinoids at doses that cause no obvious modification of bees sensory or motor performance during a natural test condition of foraging. The doses applied are somewhat higher than those expected under agricultural conditions [@pone.0091364-Blacquiere1], [@pone.0091364-Cresswell1]. Honeybees trained to an artificial feeding site after performing their exploratory orientation flights navigate back to their hive after being caught at the feeding site on departure, transported to a release site within their explored area and released there (catch-and-release experiment [@pone.0091364-Menzel3]). In a catch-and-release situation bees fly first along a vector they would have taken if not removed from the feeding site. Then they perform search flights which end in a rather straight flight towards the hive. The first flight component will be called vector flight and the second homing flight. These two flight components refer to different navigational memories. The vector flight is based on the current memory store which the animal applies during its multiple route flights between the hive and a feeding place. The homing flight requires activation of a remote memory acquired during orientation flights and possibly other flight performances, and involves some form of localization relative to the hive [@pone.0091364-Menzel2]. Here we find that the tested neonicotinoids affect these two navigation memories differently. Vector flights showed only slight alterations but homing flights are compromised depending on the particular neonicotinoid and its administered dose. These results indicate selective actions of neonicotinoids on higher level processing in the honeybee brain. Materials and Methods {#s2} ===================== Training procedure {#s2a} ------------------ A group of 15--20 bees (*Apis mellifera carnica*) from a full colony (\>30,000 bees) were trained to a feeding site 250 m east of the hive in an open field 1 km west of the town of Wittenberge (Brandenburg, Germany, coordinates: N 52.97555, E 11.83677). No permission was required to work in this area. The grassland is privately owned by Frau and Herr Nickel, An der Kirche 8, 19322 Klein Lüben (Brandenburg, Germany).The use of the privately owned land was permitted. No endangered or protected species were involved. No protected area was used. All trained bees were marked with colored number tags on the dorsal thorax, and a full protocol of the visits to the feeder was recorded for all bees. The test bees where caught at the feeder before they were able to drink and quickly transferred individually to a small container equipped with a miniature feeder providing 49 µl of a sucrose solution plus 1 µl of the neonicotinoids clothianidin, imidacloprid or thiacloprid. The bees were kept in a dark Styrofoam box for 90 minutes (incubation) during which they imbibed all of the sucrose solution. Six bees were caught at 15 minutes intervals in the morning for the experiments of the same day. In the afternoon, these bees were transported to the release site 450 m south of the feeding site and individually fed with the respective solution. After incubation they were put into a special holding device with a mesh at the top to attach a radar transponder onto the thorax. The transponder was glued to the number tag with a double sticky tape. Immediately afterwards the bees were released at intervals of 15 minutes to ensure the same incubation time in each bee. Care was taken that the control group and the treatment groups were evenly distributed each day. In the afternoon, during the recordings, three people worked together, one released the bees, another one ran the radar device and a third person waited at the hive for the bee to arrive. This person caught the bee, removed the transponder and killed it. Thus, it was ensured that each bee was used only once in the experiment. The person at the radar station informed the person at the hive when the bee had almost reached the hive. Data were collected during two experimental seasons (2011, 2012). Since we did not observe any differences in the flight behaviors between the years, we pooled the data were appropriate. The location of the hive and the feeder were slightly different ([Fig. 1](#pone-0091364-g001){ref-type="fig"}). The total number of bees tested was 98 in 2011 and 110 in 2012. Representative examples of the flights tracks are shown in the Supporting Information with the file names referring to the five experimental groups ([Archive S1](#pone.0091364.s001){ref-type="supplementary-material"}, [Archive S2](#pone.0091364.s002){ref-type="supplementary-material"}, [Archive S3](#pone.0091364.s003){ref-type="supplementary-material"}, [Archive S4](#pone.0091364.s004){ref-type="supplementary-material"} and [Archive S5](#pone.0091364.s005){ref-type="supplementary-material"}). ![Examples of flight paths of two individual bees.\ The dashed lines (green, yellow) depict the vector flight component and the blue and red lines the homing flight component. The green and blue traces come from a control bee, the yellow and red traces from a bee treated with thiacloprid. The initial flight path from the release site towards west-northwest (dashed lines) is called the vector flight because it predominantly resembles the flight vector the animals would have taken if they had not been transported to the release site (catch-and-release design of experiment). The following flight path (full lines) is called the homing phase since in most animals the flight ended at the hive. If an animal did not reach the hive (as in this case after thiacloprid treatment) the homing phase was analyzed until the animals were not seen any more at the radar screen. Both bees were released at the same release site (release site 2012) and both bees showed a similar flight vector at first. Notice that the locations of the hives, the feeding sites and the release sites differed somewhat in the two experimental seasons (2010, 2011). The map was created using Google Earth (Google Inc. 2012). A scale bar is shown for 100 meter.](pone.0091364.g001){#pone-0091364-g001} The following measures were taken: release time, start time of flying, arrival time at the hive and the flight trace recorded with the harmonic radar. From these measures the following parameters were derived for each bee: departing/not departing bee (if a bee did not depart, was observed sitting in the grass for longer than 30 minutes, or was never seen on the radar then it was classified as non-departing), immediate/delayed departure (if a bee delayed its departure by up to 15 minutes and was then seen on the radar then it was classified as a delayed departure), arriving/non-arriving bee (if a bee was observed by radar but disappeared from the radar and was not seen arriving on the same day then it was classified as non- arriving). In addition, the readings from the radar trace consisted in flight time, flight length, flight speed, directedness of the initial vector flight component and of the homing component. The transition from the vector flight to the homing flight was characterized by an angular turn \>60° allowing to define the end of the vector flight and the beginning of the homing flight. Substances {#s2b} ---------- Three drugs were tested during the experiment: clothianidin, imidacloprid and thiacloprid (thiacloprid: Bayer Crop Science Deutschland, Monheim, clothianidin and imidacloprid: Sigma Aldrich, Hamburg Germany). All three neonicotinoids were first dissolved in acetone (final concentration in the feeding solution was 0.005%--0.01%). The clothianidin and imidacloprid solutions were further diluted in water. Finally, all solutions were diluted 1 to 9 with 2 M sugar water. The final concentrations were: clothianidin (0.2 µM), imidacloprid (0.6 µM and 0.9 µM), thiacloprid (0.1 mM) leading to doses of 2.5 ng/bee (equivalent to 25 ppb) of clothianidin, 7.5 ng/bee (equivalent to 75 ppb), and 11.25 ng/bee (equivalent to 112.5 ppb) of imidacloprid and 1.25 µg/bee (equivalent to 12.5 ppm) of thiacloprid. The considerable higher thiacloprid dose was chosen due to the higher resistance of bees to this particular neonicotinoid, as reflected in the higher LD~50~.Thiacloprid was not tested in 2011. Imidacloprid at 11.25 ng was only tested in 2011, the higher dose was omitted in 2012. This resulted in a lower number of tested individuals for this dose. The sucrose solution given to the control bees contained 0.01% acetone. We compared the return rates between control bees of our experiments with the control bees in a parallel running experiment that were trained from the same hive to the same feeder and released in parallel from the same release site without acetone in the sucrose solution [@pone.0091364-Cheeseman1] and found no difference (88% in our control bees and 90% in the control, bees of [@pone.0091364-Cheeseman1]). Harmonic radar tracking {#s2c} ----------------------- Tracking bees with a harmonic radar system is described in [@pone.0091364-Riley1], [@pone.0091364-Riley2], [@pone.0091364-Menzel4]. We used a system with a sending unit consisting of 9.4 GHz radar transceiver (Raytheon Marine GmbH, Kiel, NSC 2525/7 XU) combined with a parabolic antenna providing approx. 44 dBi providing a signal from the transponder on the bee thorax every 3 s. The transponder consisted of a dipole antenna with a Low Barrier Schottky Diode HSCH-5340 of centered inductivity. The second harmonic component of the signal (18.8 GHz) was the target for the radar. The receiving unit consisted of an 18.8 GHz parabolic antenna, with a low-noise pre-amplifier directly coupled to a mixer (18.8 GHz oscillator), and a downstream amplifier with a 90 MHz ZF-Filter. A 60 MHz ZF-Signal was used for signal recognition. The transponder was made of a silver or gold wire with a diameter of .3 mm, a length of 11 mm, a weight of 10.5 mg and a loop inductance of 1.3 nH. The range of the harmonic radar was 1 km radius. Occasionally radar signals were missing as identified by a time interval between two consecutive radar signals \>3 s. In such a case a surrogate signal was produced by assuming equal distance along a straight line between the two adjacent signals. Representative examples of flights tracks are given in the Supporting Information in file archives for each of the five experimental groups ([Archive S1](#pone.0091364.s001){ref-type="supplementary-material"}, control group; [Archive S2](#pone.0091364.s002){ref-type="supplementary-material"}, clothianidin treatment; [Archive S3](#pone.0091364.s003){ref-type="supplementary-material"}, imidacloprid 0.6 µM treatment, [Archive S4](#pone.0091364.s004){ref-type="supplementary-material"}, imidacloprid 0.9 µM treatment; [Archive S5](#pone.0091364.s005){ref-type="supplementary-material"}, thiacloprid treatment). The x- and y-axis is scaled in meters and the 0/0 coordinate marks the radar position. Analysis of the flight tracks and statistical analysis {#s2d} ------------------------------------------------------ We acquired recordings for each bee separately, consisting of x/y coordinates for distinct timepoints of the radar signals. These were used to reconstruct the flight path of the corresponding bee. All flights consisted of more than 15 data points per bee. Additionally, we recorded the time of departure and arrival (if the bee arrived at the hive). Non- circular statistics were done with Matlab v.R2011b (The MathWorks, Inc., USA). We used Barnard\'s Exact Probability Test for comparison of arriving or not arriving bees. Data for flight time and length were tested for normal distribution with the Lilliefors test. We found in each variable group at least one treatment group with non-parametric data. Therefore, we used a Kruskal-Wallis multi comparison between the groups with a Scheffe correction to find differences in the groups. This was followed by a group to group comparison using a Wilcoxon Ranksum test. The circular statistics for comparison of the angles for the different treatments was done with Oriana v4 (Kovach Computing Services, Wales, U.K.). Angular deviation was calculated with the Watson -Williams F-test, distribution for angular data between groups was tested with the Mardia-Watson-Wheeler test. Results {#s3} ======= Global analysis {#s3a} --------------- In a catch-and-release experiment as applied here bees were trained first to forage at a feeder for at least 2 days ([Fig. 1](#pone-0091364-g001){ref-type="fig"}), and were then caught at the feeder upon arrival, transferred to a container equipped with a miniature feeder containing a defined volume of sucrose solution with or without the neonicotinoid to be tested. When released at a remote release site 1.5 hours later bees frequently settled in the grass for a while, then performed a few narrow circular flights and flew straight to the west resembling the vector they would have taken from the feeder to the hive (vector flight, [Fig. 1](#pone-0091364-g001){ref-type="fig"}, see also [Archive S1](#pone.0091364.s001){ref-type="supplementary-material"}, [Archive S2](#pone.0091364.s002){ref-type="supplementary-material"}, [Archive S3](#pone.0091364.s003){ref-type="supplementary-material"}, [Archive S4](#pone.0091364.s004){ref-type="supplementary-material"} and [Archive S5](#pone.0091364.s005){ref-type="supplementary-material"}). The experimental setting in our experiments brought the vector flight of the bees close to an extended landmark, a narrow irrigation channel stretching approximately south-north. Well oriented bees took a sharp turn at the end of their vector flight to the north close to this landmark and flew straight back to the hive which was located close to this landmark in the north of the test field. Less well oriented bees ended their vector flights also by a sharp turn but then started search flights before and during their flight back to the hive. Thus the flight track of a bee from the release site to the hive can be divided into two phases, the vector flight and the homing flight. If bees did not start immediately they settled in the grass and could be observed until they departed. Since we preselected the dose of the tested neonicotinoids such that the treated bees were able to fly after 90 min incubation only a small number of bees did not start to fly, and there were no significant differences between the control and the treatment groups (control: 1 of 57, clothianidin: 1 of 55, imidacloprid 0.6 µM: 2 of 58, imidacloprid 0.9 µM: 2 of 19, thiacloprid: 3 of 27). However, significantly more delayed starts were found in thiacloprid treated bees (p\<0.05, Barnard\'s Exact Probability test, see [Table 1](#pone-0091364-t001){ref-type="table"}). The proportion of bees returning to the hive differed between the control groups, and 3 out of the 4 treated groups. Fifty out of 57 (88%) control bees successfully returned to the hive. The respective numbers of the neonicotinoid treated bees are: clothianidin (0.2 µM): 43 (n = 55, 78%); imidacloprid (0.6 µM): 42 (n = 58, 72%); imidacloprid (0.9 µm): 6 (n = 19, 32%); thiacloprid (0.1 mM): 12 (n = 27, 44%). Treatment with either imidacloprid (0.6 µM), imidacloprid (0.9 µM) or thiacloprid (0.1 mM) significantly increased the number of bees failing to return to the hive (p\<0.05; Barnard\'s Exact Probability test) although they departed from the relase site and did not show any obvious changes in their flight behavior. 10.1371/journal.pone.0091364.t001 ###### Overview of the total number of bees released, the number of bees that returned to the hive, the "non starting bees" and bees that delayed their start. ![](pone.0091364.t001){#pone-0091364-t001-1} treatment total number of bees not started arrived at the hive not arrived ----------------------- ---------------------- ------------- --------------------- ------------- control 57 1 50 7 clothianidin (0.2 µM) 55 1 43 12 imidacloprid (0.6 µM) 58 2 42 16 imidacloprid (0.9 µM) 19 2 6 13 thiacloprid (0.1 mM) 27 3 12 15 Vector fligth {#s3b} ------------- The analysis of the length of the vector flight showed a significantly shorter length for the imidacloprid 0.9 µM treated bees (p = .0242) and a longer length for the thiacloprid treated bees (p  = .0275 rank-sum test) as compared to the control group ([Fig. 2](#pone-0091364-g002){ref-type="fig"}.). Duration of the vector flights did not differ significantly between the control groups and the respective treatment groups (data not shown) indicating that longer vector flights were compensated for by higher flight speed. The directional components of the vector flights as indicated by their intersections with a 200 m radius around the release site are shown in [Fig. 3](#pone-0091364-g003){ref-type="fig"}. The angle from the feeder to the hive was 294°, from the release site to the hive 343°. The average directions of the vector flights for the control bees is 319° and for bees treated with clothianidin: 311°, with imidacloprid 0.6 µM: 313°, with imidacloprid 0.9 µM: 308°, and with thiacloprid: 317°. Thus the angular distribution for the control bees is skewed towards the shortest direction to the hive indicating that these bees may have initiated a homing component already during the vector flight. Clothianidin and both imidacloprid treatments resulted in a significant difference in the direction compared to the control group (p\<0.05; Watson -Williams F-test). ![Length of vector flights for all treatment groups in meters.\ Groups are shown as boxplots with the median indicated in red, the edges of the box indicates the 25^th^ and 75^th^ percentiles. Outliers are shown as red crosses. Groups with no significant difference share the same letter under the lower whisker. Animals treated with imidacloprid 0.9 µM performed significant shorter vector flights than those of the control group, the clothianidin treated group, those treated with the lower concentration of imidacloprid, as well as animals treated with thiacloprid. . The thiacloprid treatment led to significantly longer vector flights compared to bees from the control group, the clothianidin group and the animals treated with the higher concentration of imidacloprid (p\<0.05, Rank-sum test).](pone.0091364.g002){#pone-0091364-g002} ![Direction of vector flights.\ The direction is defined by the intersection of the vector flight with a 200° bins. The x-axes give the angels in degrees clockwise from north. The median angle is marked in red for each group. Significant differences in the direction are indicated by different letters under the group names. Clothianidin treated and both imidacloprid treated groups differ significant from the control group but not from each other. The thiacloprid treated group did not differ significantly from all other group (p\<0.05, Watson -Williams F-test). The direction of the learned route from the feeder to the hive is 294°, and the direct route from the release site to the hive would be 343°. Note that the x-axis is interrupted for the imidacloprid 0.6 µM group as there was one bee flying north-east with a 10.9° angle from north.](pone.0091364.g003){#pone-0091364-g003} We next analyzed the directedness of the vector flights. The directional changes during the vector flight were calculated as angles between two consecutive radar locations and expressed as deviations from the direction of the last line between two consecutive radar locations. Thus small angles indicate few changes in the flight direction, regardless of the general direction in which the bee was currently flying, and a broad data distribution indicates frequent changes in direction ([Fig. 4](#pone-0091364-g004){ref-type="fig"}). Both imidacloprid-treated groups showed more directional changes as compared to the control group (imidacloprid 0.6 µM p = .001; imidacloprid 0.9 µM p = .011, Mardia-Watson-Wheeler test). The broadest distribution of direction changes was found in the thiacloprid-treated group, indicating frequent directional changes. Thus, the vector flights performed by treated bees (besides those treated with clothianidin) were less straight than those of the control bees. Taken together these findings indicate that bees after neonicotinoid treatment controlled their vector flights performance less well and relied more on the sun compass related direction of their foraging flights. ![Distribution of directional changes during vector flights.\ Data are grouped in 50 segments ( = 7,2° each segment). Bars are scaled as percentages from 0% to 17% of the cumulative data. The black line shows the mean direction with standard deviation. Angles are given in relation to the direction of the stretch of flight shortly before, and are not related to a geographic direction (see text). The main component in all groups lies around the 0° direction indicating that the bees flew rather straight. Significant differences between the groups are shown by different letters in the parenthesis. Both imidacloprid treatments (0.6 and 0.9 µM) led to broader distributions of directions and thereby more changes in the flight path as compared to the control group. (p\<0.05, Mardia-Watson-Wheeler Test).](pone.0091364.g004){#pone-0091364-g004} Homing flight {#s3c} ------------- All animals performed a sharp turn (\>60°) at the end of the vector flight. We classified the directions in which the bee initially chose to fly after this turn, and separated them into northerly, southerly (along the channel), and into other directions ([Table 2](#pone-0091364-t002){ref-type="table"}). The shortest flight paths (except for a direct flight from the release site to the hive in a control bee) resulted in L-shaped flights with a sharp turn towards north. Many bees followed this flight pattern, and no significant difference was found between the control group and the bees treated with clothianidin or the two doses of imidacloprid. However, thiacloprid-treated bees had a significantly lower probability to perform L-shaped flights (p\<0.05; Barnard\'s Exact Probability test, [Table 2](#pone-0091364-t002){ref-type="table"}) and an increased probability to perform other types of flights. 10.1371/journal.pone.0091364.t002 ###### Flight direction after the end of the vector flight. ![](pone.0091364.t002){#pone-0091364-t002-2} flight direction after the end of vector flight percentage of L-type flights of north flying bees ------------------------------- ------------------------------------------------- --------------------------------------------------- --- --- ----- control (n = 48) 31 14 3 0 74% clothianidin (0.2 µM, n = 41) 29 12 0 0 62% imidacloprid (0.6 µM, n = 41) 31 5 1 4 74% imidacloprid (0.9 µM, n = 9) 7 0 0 2 57% thiacloprid (0.1 mM, n = 14) 5 5 4 3 60% The sharp turns (60°) were categorized as leading to a northerly (column north) or southerly (column south) direction, or any other direction (e.g. returning to the release site or continuing the vector flight with only a minor correction). Three thiacloprid bees (column other direction) terminated their flight at the end of the vector. Both imidacloprid- and thiacloprid-treated bees were less successful reaching the hive during the final phase of homing. Further evaluation of the homing phase requires considering the fact that the probability of bees successfully returning to the hive differs between the control group and 3 of the 4 treatment groups (both imidacloprid- and thiacloprid-treated groups). We therefore analyzed further the flight path as recorded by the radar, without taking into account whether or not the animal arrived at the hive. Since none of the animals flew out of the range of the radar any loss of radar signals outside of the vicinity of the hive indicated landing and failure to find the hive. These animals were not captured by the person at the hive, whereas animals tracked until close to the hive were always captured by the person at the hive. The total flight path during the homing phase had a significantly longer length in bees treated with clothianidin (p\<0.05, Ranksum--test) ([Fig. 5](#pone-0091364-g005){ref-type="fig"}), and the duration of the recorded homing flight was increased for clothianidin and thiacloprid (p\<0.05, Ranksum-- test) ([Fig. 6](#pone-0091364-g006){ref-type="fig"}). The flight speed of thiacloprid-treated bees is lower than that of all other groups (p\<0.05, Ranksum-- test). ![Cumulated lengths of flights during the homing phase.\ The homing phase started at the end of the vector flight as characterized by a turn of \>60° during the vector flight and ended when the bee either arrived at the hive or was not recorded with the radar anymore. Groups are shown as boxplots with the median indicated in red, the edges of the box indicates the 25^th^ and 75^th^ percentile. Groups with no significant difference share the same letter under the lower whisker. Only clothianidin treatment resulted in a significant longer flight during the homing phase, compared to the control group and the imidacloprid 0.6 µM group (p\<0.05, Rank-sum test).](pone.0091364.g005){#pone-0091364-g005} ![Duration of the homing phase.\ The homing phase started at the end of the vector flight as characterized by a turn of \>60° during the vector flight and ended when the bee either arrived at the hive or was not recorded with the radar anymore. Groups are shown as boxplots with the median indicated in red, the edges of the box indicates the 25^th^ and 75^th^ percentile. Note that the y-axis is scaled logarithmically. Significant differences between the groups are shown by different letters at the bottom of each boxplot. Clothianidin 0.2 µM treatment resulted in a longer homing phase as compared to the control group and the imidacloprid 0.6 µM group. The median homing duration of the bees treated with 0.1 mM thiacloprid was significantly longer than the control group (p\<0.05, Rank-sum test).](pone.0091364.g006){#pone-0091364-g006} The highest increase in flight duration was caused by bees that landed in the grass. In this case the recording of the radar track was stopped at the location where the individuals landed, and later resumed at this area. These interruptions in the flight where found in 6 animals from the thiacloprid treated group and lasted for more than 1500 seconds. Similar but shorter interruptions in the flight where also found in the other treatments but only for \<500 seconds (5 control bees, 3 clothianidin bees, 4 imidacloprid 0.6 µM bees, none imidacloprid 0.9 µM bees). Few bees were not recorded until their arrival at the hive but returned to the feeder at the next or the over next day. This was the case for one control bee (arrived on the next day), 4 thiacloprid treated bees (1 arrived on the next day and 3 days later), 2 clothianidin treated bees (arrived next day) and 3 imidacloprid 0.6 µM treated bees (arrived next day). As expected the directedness of homing flights was lower than that of the vector flights ([Fig. 7](#pone-0091364-g007){ref-type="fig"}, compare with [Fig. 4](#pone-0091364-g004){ref-type="fig"}). A broader distribution of the directional changes in the homing phase than in the vector phase was found for the control group and the thiacloprid-treated group, and the clothianidin-treated group showed no difference. Both imidacloprid treatments led to a tendency towards broader distribution. Comparing the directedness of the homing flights between the experimental groups we found significantly lower directedness in both imidacloprid-treated groups and in the thiacloprid-treated group as compared with the control group (p\<0.05, Mardia-Watson-Wheeler Test). ![Distribution of directional changes during the homing flight.\ Data are shown in percent and are grouped in 50 segments ( = 7,2° each segment). Bars are scaled as percentages from 0% to 12% of the cumulative data. The black line shows the mean direction with standard deviation. Like in [Fig. 4](#pone-0091364-g004){ref-type="fig"} all angles are in relation to the direction that the bee already flew, and are not related to a geographic direction. Thus the figure shows the straightness of the bees\' homing flights. Significant differences were found between the control group and the group treated with clothianidin on the one side and both imidacloprid treated (0.6 and 0.9 µM) and thiacloprid 0.1 mM treated groups on the other side (p\<0.05, Mardia-Watson-Wheeler test). These latter groups showed a broader spread of directions than the control and the clothianidin group, and did not differ from each other.](pone.0091364.g007){#pone-0091364-g007} Discussion {#s4} ========== Radar tracking of honeybee flights in a catch-and-release experiment uncovers two navigational components, the initial vector flight and the ensuing homing flight. The vector component would have brought the animal back to the hive were it not transported to an unexpected release site [@pone.0091364-Menzel3].The sun compass is the dominant guiding factor in a rather even landscape as the one used here which lacked a panorama and any beacon close to the hive [@pone.0091364-Menzel3], [@pone.0091364-Menzel4], [@pone.0091364-Cheeseman1]. However, the ground structure of the pasture provided additional information for being south of the hive and this information was used by the control animals but not by the treated animals since the directions of the vector flights were skewed to north for the controls. Thus the treated animals were more precise in replaying the directional component of the vector flight. Furthermore, the differences in flight speed and directedness of vector flight between control and treated animals indicates more dourness for replaying the flight performance they would have applied if not transported. Thus treated bees replay their recent navigation memory more stereotypically. Flight speed during vector flights in thiacloprid-treated bees was lower than that of all other groups, indicating either an effect on flight performance or a form of reduced activation of the vector memory. Stronger effects of neonicotinoid treatment became apparent during homing flights. The transition from vector flight to homing flight requires the activation of a different reference system, namely that which was established earlier in the life of a forager during its exploratory orientation flights and possibly during natural foraging flights. The latter is rather unlikely because no natural food sources were available in the south of the hive during the experimental period. Since the bees arrived at an unexpected location at the end of their vector flight they needed to determine in which direction the hive might be located. The experimental conditions selected for our experiments were chosen to exclude several navigation mechanisms for the bees. They could not use path integration since the animal was transported to an unexpected release site and had not the path information of this displacement. Furthermore, navigation towards a beacon at the hive and a sequential matching strategy with respect to the panorama was not possible, due to a lack of the necessary distant visual cues [@pone.0091364-Menzel3]. However, it offered a strong cue, namely the irrigation channel close to which the hive was located north of the region where the vector flights ended (see [Fig. 1](#pone-0091364-g001){ref-type="fig"}).Thus the test conditions made it rather easy for the bees to find the hive. Even under these conditions treated bees were significantly compromised in successful homing. The strongest effect was seen for thiacloprid-treated bees, which also showed the strongest effect on flight speed during vector flights. The doses of neonicotinoids applied here (imidacloprid 7.5 or 11.25 ng/bee, clothianidin 2.5 ng/bee, thiacloprid 1.25 µg/bee) were selected on the finding that the treated bees were able to fly 90 minutes after starting to imbibe the solution, and to depart from the release site without obvious changes of their flight behavior. Thus, our study comprises a behavioral-toxicological approach and not an eco-toxicological approach. Nevertheless it will be interesting to compare the doses used here with those used by other authors on the basis of estimates about the doses of the respective neonicotinoids expected to be taken up by bees in an agricultural environment. Our doses of imidacloprid and clothianidin were close to the highest doses tested by Schneider et al. [@pone.0091364-Schneider1] and Henry et al. [@pone.0091364-Henry1]. Furthermore, Whitehorn et al. [@pone.0091364-Whitehorn1] who fed bumble bees with pollen containing 6 µg/kg and sugar water containing 0.7 µg/l imidacloprid found significant depressing effects on several parameters of their natural development (queen production, growth rate). The authors reported that the doses were selected on the basis of findings in the agricultural conditions. Gill et al. [@pone.0091364-Gill1] exposed bumblebees to two pesticides (neonicotinoid and pyrethroid) at concentrations that could approximate field-level exposure and detected impaired natural foraging behaviour and worker mortality leading to significant reductions in brood development and colony success. Clothianidin of 10 ppb is often exceeded in pollen carried back by foragers, and a value of 88 ppb has been measured [@pone.0091364-Guez1]. It has been estimated that nectar collected by bees on oil rape flowers whose seeds were treated with imidacloprid contains on average (with very large variance) about 10 ppb [@pone.0091364-Blacquiere1], [@pone.0091364-Cresswell1], which is approximately 15 times less than the lower doses of imidacloprid used in our study. Thus, 15 foraging trips of bees to such oil rape flowers combined with full absorption of the collected nectar would lead to a similar dose as in our study under the assumptions that the pesticides are fully absorbed and are not metabolized substantially. Thus, the doses in our study and those of [@pone.0091364-Schneider1], [@pone.0091364-Henry1] can be considered to reflect a worse case as compared to those taken up by an individual bee during one foraging trip (see also EFSA Journal 201210(6) 2752). Although the debate about the relevance of the doses in behavioral-toxicological studies for the evaluation of environmental hazards through neonicotinoids is not settled [@pone.0091364-Guez1], [@pone.0091364-Henry2] it is obvious that the doses in these studies are not far from what one would expect for bees foraging on the flowers of treated plants. In honeybees nicotinic acetylcholine receptors (nAChRs) targeted by neonicotinoids are involved in multiple neural nets of sensory integration and higher order information processing. Eleven candidate nAChRs subunits were identified in the honeybee genome with 9 putative alpha and 2 beta subunits (Amelα1--9, Amelβ1--2) [@pone.0091364-Jones1]. In situ hybridization showed that 4 subunits are differentially expressed within the honeybee brain [@pone.0091364-Thany1], [@pone.0091364-Thany2]: the Amelα8 subunit is expressed in pupal Kenyon cells and antennal lobe neurons, Amelα5 and Amelα7 in type II Kenyon cells of the mushroom body and in antennal lobe neurons of the adult brain, Amelα2 in type I and type II Kenyon cells but not in the antennal lobes, and Amelα7 in type I KCs. Although the physiological and pharmacological properties as well as the stoichiometry of the various honeybee nAChRs is still unknown, it is obvious from behavioral experiments using nicotinergic antagonists that the honeybee nAChRs are involved in olfactory learning and memory formation [@pone.0091364-Gauthier1], [@pone.0091364-Gauthier2]. Furthermore, these studies indicated that 2 pharmacologically different nAChRs are differentially involved during olfactory learning and memory [@pone.0091364-Gauthier1], [@pone.0091364-Dupuis1]. The honeybee nAChRs are targets for neonicotinoids. Imidacloprid acts as a partial agonist on cultured native Kenyon cells [@pone.0091364-Dglise1] and antennal lobe neurons [@pone.0091364-Nauen1], [@pone.0091364-Barbara1], [@pone.0091364-Barbara2]. Palmer et al. [@pone.0091364-Palmer1] showed that applications of imidacloprid or clothianidin depolarize Kenyon cells in isolated honeybee brains via nAChR activation with different efficacies. Similarly to *Drosophila* neurons, clothianidin has a higher potency for receptor activation than imidacloprid [@pone.0091364-Brown1], [@pone.0091364-Palmer1]. However, both substances block the transmitter binding and thus act as blockers of cholinergic receptors upon prolonged applications in honeybees [@pone.0091364-Dglise1], [@pone.0091364-Palmer1]. The nAChRs located in the mushroom body neurons are particularly relevant in our context, since the mushroom body in honeybees is a key structure in multimodal integration, learning and memory formation as well as memory retrieval [@pone.0091364-Menzel5]. Neonicotinoids interfere with cholinergic synaptic transmission in a complex way and may, thus, impair cognitive functions in the honeybee. Conclusion {#s4a} ---------- Application of the three neonicotinoids imidacloprid, clothianidin and thiacloprid at sublethal doses interfered with navigation of honeybees, although it did not affect flight performance *per se* or the bees\' motivation to return to the hive. The active and recently acquired navigation memory which would have brought the animals back to the hive (vector memory) is less compromised and appears even more stereotypical than in control bees because control bees tend to correct the displacement already during the vector flight. Thiacloprid treatment slowed the flight speed of bees while the other neonicotinoids did not affect flight speed. The second phase (homing) is impaired in treated bees reducing the probability of arriving at the hive, performing the correct turn at a salient landscape structure, and following a straight flight towards the hive. Since the homing phase in catch-and-release experiments documents the ability of the animal to activate a remote memory acquired during the exploratory orientation flights of a young bee and possibly during foraging flights before training to the feeder, we conclude that sublethal doses of the three neonicotinoids tested either block the retrieval of a remote memory or alter this form of navigation memory. These findings reinforce existing reservations about the application of neonicotinoids in plant protection [@pone.0091364-Henry1], [@pone.0091364-KacimiElHassani1], [@pone.0091364-Decourtye2], and uncover rather selective and highly relevant impairment of the foraging behavior of bees. Supporting Information {#s5} ====================== ###### **This file archive contains 10 flight traces of control bees.** (ZIP) ###### Click here for additional data file. ###### **This file archive contains 10 flight traces of clothianidin (0.2 µM) treated bees.** (ZIP) ###### Click here for additional data file. ###### **This file archive contains 10 flight traces of imidacloprid (0.6 µM) treated bees.** (ZIP) ###### Click here for additional data file. ###### **This file archive contains 5 flight traces of imidacloprid (0.9 µM) treated bees.** (ZIP) ###### Click here for additional data file. ###### **This file archive contains 8 flight traces of thiacloprid (0.1 mM) treated bees.** (ZIP) ###### Click here for additional data file. The harmonic radar device was constructed and built by Prof. Haass and Bernd Fischer. We thank Dr. James Cheeseman and Dr. Craig Millar for their help with the experiments. We are grateful to Anne Carney for her help with the English. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: RM JF BG. Performed the experiments: TM A-KS UG RM JF. Analyzed the data: JF UG. Wrote the paper: JF RM BG.
{ "pile_set_name": "PubMed Central" }
package pl.touk.nussknacker.ui.process.migrate import pl.touk.nussknacker.engine.api.deployment.GraphProcess import pl.touk.nussknacker.engine.canonicalgraph.CanonicalProcess import pl.touk.nussknacker.engine.marshall.ProcessMarshaller import pl.touk.nussknacker.engine.migration.{ProcessMigration, ProcessMigrations} import pl.touk.nussknacker.restmodel.process.ProcessId import pl.touk.nussknacker.restmodel.processdetails.ProcessDetails import pl.touk.nussknacker.ui.process.marshall.ProcessConverter import pl.touk.nussknacker.ui.process.processingtypedata.ProcessingTypeDataProvider import pl.touk.nussknacker.ui.process.repository.WriteProcessRepository.UpdateProcessAction case class MigrationResult(process: CanonicalProcess, migrationsApplied: List[ProcessMigration]) { def id : String = process.metaData.id def toUpdateAction(processId: ProcessId): UpdateProcessAction = UpdateProcessAction(processId, GraphProcess(ProcessMarshaller.toJson(process).noSpaces), s"Migrations applied: ${migrationsApplied.map(_.description).mkString(", ")}" ) } class ProcessModelMigrator(migrations: ProcessingTypeDataProvider[ProcessMigrations]) { def migrateProcess(processDetails: ProcessDetails) : Option[MigrationResult] = { for { migrations <- migrations.forType(processDetails.processingType) displayable <- processDetails.json } yield migrateWithMigrations(migrations, ProcessConverter.fromDisplayable(displayable), processDetails.modelVersion) } private def migrateWithMigrations(migrations: ProcessMigrations, process: CanonicalProcess, modelVersion: Option[Int]) : MigrationResult = { val migrationsToApply = migrations.processMigrations.toList.sortBy(_._1).dropWhile { case (migrationNumber, _) => migrationNumber <= modelVersion.getOrElse(0) }.map(_._2) val resultProcess = migrationsToApply.foldLeft(process) { case (processToConvert, migration) => migration.migrateProcess(processToConvert) } MigrationResult(resultProcess, migrationsToApply) } }
{ "pile_set_name": "Github" }
Walter De Donder Walter De Donder (b. 12 July 1960) is a Belgian actor and politician and is best known for parts in Flemish children's television series. De Donder started in entertainment as an amateur and performed with a puppet called Bibberlip. His breakthrough came in 1989 when he was asked to play the role of the mayor in children's TV show Samson en Gert. Through this role he was able to become a professional actor. In 1997 he took on the role of the title character in the children's series Kabouter Plop, produced by Studio 100. In 2000 he joined the cast of the satirical program Brussels New Street (Brussel Nieuwsstraat) as a cop. This program also stars Koen Crucke who also played in Samson and Gert. De Donder is active in the CD & V N-VA party, and in 2000 was elected to the city council of Affligem and was reelected in the 2006 municipal elections. During party coalition talks, it was agreed that he would become Mayor from 2011 and he took on this role on the first of January of that year. Filmography Television Samson en Gert (1989 – ) Mr. Mayor F.C. De Kampioenen (F.C. The Champions) (1990) extra in the first season F.C. de Kampioenen (F.C. The Champions) (2006) episode "Food Poisoning" as Inspecteur Kimpe Kabouter Plop (1997 – ) television – Kabouter Plop Brussels New Street [Brussel Nieuwsstraat] (2000) TV series – Flik Urban Zone (January 3, 2004) episode "Flight Crime" Film Verdomme !? (God damn !?) (1996) De Kabouterschat (The Gnome Treasure) (1999) – Kabouter Plop Plop in de Wolken (Plop in the Clouds) (2000) – Kabouter Plop Plop en de Toverstaf (Plop and the Magic Wand) (2003) – Kabouter Plop Plop en Kwispel (Plop and Kwispel) (2004) – Kabouter Plop Plop en het vioolavontuur (Plop and the Violin Adventure) (2005) - Kabouter Plop Plop in de stad (Plop in the city) (2006) – Kabouter Plop Plop en de Pinguïn (Plop and the Penguin) (2007) – Kabouter Plop Samson en Gert: Hotel op Stelten (Hotel on Stilts) (2008) – Mr. Mayor Plop en de kabouterbaby (Plop and the gnome baby) (2009) – Kabouter Plop Footnotes External links Category:1960 births Category:Living people Category:Christen-Democratisch en Vlaams politicians Category:Flemish male television actors Category:21st-century Flemish male actors Category:Actor-politicians Category:Belgian Roman Catholics
{ "pile_set_name": "Wikipedia (en)" }
Country Demographics {#sec1-1} ==================== In 2012, the population was estimated to be 164 million with 47% under 15 years. There is no national population based cancer registry but using worldwide incidence rates of between 80 and 150/million children we would expect 6-9000 new cases/year\[[@ref1]\] in Bangladesh. Only about 25% of those numbers are actually currently diagnosed. Under-5 mortality is now 56/1000 live births due to considerable government focus on maternal and child health, and disease prevention. Poverty is a major issue but the national economy is showing positive growth. Children present late with cancer as a result of poor public and local health worker awareness of the meaning of signs and symptoms of cancer. Consequently, only about 80% of children reaching secondary/tertiary hospitals can be offered potentially curative therapy, and of those many families cannot afford to pay for full treatment. Bangabandhu Sheikh Mujib Medical University {#sec2-1} ------------------------------------------- The largest specialist pediatric oncology center (created in the early 1990s) is at the multidisciplinary Bangabandhu Sheikh Mujib Medical University (BSMMU) in Dhaka funded directly by the Government. The Ministry of Health and Family Welfare send pediatricians there for specialist training, including 10 who have completed Doctorate level degrees since 2002. The Social welfare department provides support and help to patients/families. Nevertheless at present the cost of cytotoxic therapy falls to parents. This center has other essential pediatric specialties including nephrology, cardiology, nutrition and gastro-enterology, surgery, and general pediatrics. There are good basic diagnostic hematology and pathology services. Some limited immune histo-chemistry, using a limited number of antibodies has been initiated in the last 6 months. There is a flow cytometer in the unit, but it is not currently functioning. Radiology includes ultrasonography, computed tomography scanning and magnetic resonance Imaging. The number of children with cancer presenting at BSMMU has been rising year on year (280 in 2010, 400 in 2011, 455 in 2012). The relative incidence of malignancies seen at BSMMU in 2012 was: Acute lymphoblastic leukemia 58%, non-hodgkin lymphoma 11%, acute myeloblastic leukemia 10%, neuroblastoma 5%, Wilm\'s tumor 2%, hepatoblastoma 3.5%, hodgkin lymphoma 3%, retinoblastoma 2%, germ cell tumors 2%, histocytosis 2%, central nervous system tumors 1%, osteosarcoma 1%. As part of a twinning project in June 2012, an online database (POND) [\@www.POND4kids.org](@www.POND4kids.org) was established and can provide comprehensive, reliable incidence and outcome data for the unit. Most brain tumor patients referred to BSMMU are managed by neurosurgeons and radiotherapists (latter at Dhaka Medical College (DMC)) or the National Cancer Research institute (NCRI)). In Bangladesh, there are now 6 trained pediatric hematologists/oncologists working as professor, associate professor, assistant professor and consultant level at BSMMU and 7 Government funded pediatric haemato-oncologists at other MC and at the NCRI. Of the Government funded colleges, 3 are in Dhaka (Dhaka MC, Siri Sollimulllah MC and Mymensingh) and 1 each in Sylhet, Chittagong, Rajshahi, Barrishal and Rangpure. A number of private facilities also provide some services. BSMMU and the DMC see more leukemia cases and the NCRI more solid tumors. NCRI is the national referral center for retinoblastoma. All those requiring radiotherapy go to Dhaka Medical College or the NCRI. Training/Network {#sec1-2} ================ In addition to the MD training program at BSMMU (currently 17 residents are enrolled at different phases of the MD course), the Unit is spearheading an extensive training program and network development of pediatric oncology services, in part funded by a 5 year World Child Cancer ([www.worldchildcancer.org](www.worldchildcancer.org)) twinning program linking BSMMU with University College London Hospitals and Vancouver Children\'s Hospital. This project is supporting the creation of regular training workshops, subsidies for drug costs and data management, installation of online tumor registries and family support. Dhaka MC and NCRI are also using the POND database, since 2012. ASHIC Foundation created a shelter/home from home in Dhaka for patients/families from distant parts and Chittagong has a parent support group (CLASS). More family support will be developed as the network expands. Challenges {#sec1-3} ========== Following awareness campaigns through the media and workshops, the number of children referred are increasing, creating capacity problems within referral unitsLate diagnosis and advanced disease at presentation persists (about 20% of cases are incurable at presentation)The early toxic death rate is about 10% with very ill children presenting43% of families refused treatment and/or stopped treatment prematurely in 2012 (cost, family disruption, doubts about curability and after initial good response)Most cytotoxics are imported -- The cost of all drugs, but especially L-asparaginase and an inconsistent supply of 6-Mercaptopurine are the major drug problems encountered. Conclusion {#sec1-4} ========== Those who complete treatment have a 50-60% cure rate. Concerted efforts are being made to raise public and professional awareness, reduce diagnostic delays and subsidise drug and travel costs. **Source of Support:** Nil **Conflict of Interest:** None declared.
{ "pile_set_name": "PubMed Central" }
It's utterly despicable that the girl jailed for killing my daughter has become a celebrity From Meredith Kercher’s father, a passionate attack on the cult of 'Foxy Knoxy' Last week, I switched on my television to see the parents of the young woman convicted of ­taking my daughter’s life proclaiming her innocence. And, once again, I felt the pain and the anger and the raw grief resurface. Amanda Knox was found guilty of ­killing my daughter Meredith at the house they shared in Italy three years ago. Yet since that act of horrific ­violence, Knox, it seems, has been accorded the status of a minor celebrity. Sometimes it seems that there is no escape from her or her jaunty nickname, ‘Foxy Knoxy’ (doubly hurtful, for the way it trivialises the awfulness of her offence). Cherished memories: John Kercher misses daughter Meredith every day Last week, Knox’s parents were given star billing on the ITV breakfast show Daybreak, where they had free rein to profess their conviction that their daughter is not guilty. Kurt Knox and his ex-wife Edda ­Mellas have never expressed their condolences to our family for our grievous loss. There has been no letter of sympathy; no word of regret. Instead, I have watched them repeatedly reiterate the mantra of their daughter’s innocence. Alas, I fear there is more yet to come. Their TV appearance last week, trailed for two days as if it were some exclusive media coup, coincided with the resumption of Knox’s appeal against her conviction. This appeal, like the initial court case, will drag on for months, while the dark tunnel between my family and our ­ability to grieve for Meredith in peace becomes ever longer. If Knox doesn’t get the result she wants, our agony will be even more ­protracted: she may then take her case to Italy’s Supreme Court in Rome. Put simply, our ordeal could go on for years. Knox is one of three people convicted of killing my beautiful and talented daughter. It was a brutal murder. Meredith’s throat was slit, and she was stabbed to death. Knox and her former boyfriend, ­Italian Raffaele Sollecito, are serving jail sentences of 26 and 25 years ­respectively for their heinous crime. A third person, drifter Rudy Guede, convicted with them, is also in prison. Yet it is Knox who still exerts such a hold over the media. As a journalist myself, I know the reason why. Knox is young, attractive and female. To many, she seems an unlikely killer. Yet to my family she is, unequivocally, culpable. As far as we are concerned, she has been ­convicted of taking our precious Meredith’s life in the most hideous and bloody way. And the sadness is, the nature of that death too often prevents us from celebrating her life. She has become ‘Meredith Kercher, ­murder victim’, not Meredith Kercher, our lovely, intellectually curious daughter. So, today, I’d like to redress the balance and tell you about our irredeemable loss. About the ­Merdeith we knew and loved. Minor celebrity status: Amanda Knox at her appeal hearing in Italy last week Our girl was 21 when she died; a bright, sweet-natured and engaging young woman. She had been studying for a degree in European Studies and Italian at Leeds ­University when she had opted to spend some time in the medieval Italian town of Perugia, at the ­university there, improving her knowledge of the Italian language and culture. On November 1, the third anniversary of her death, I gathered with the rest of the family in the cold, grey cemetery where she is buried. One by one, we laid bright flowers on her grave and left messages. Mine said simply, ‘I miss you’. Along with our own handwritten notes, there were dozens from Meredith’s friends. They write as if she’s still with us, telling her about their new jobs, their boyfriends. They remind her of all the wonderful times they had, of the shared laughter. And like us, they hope — really, they do — that Meredith might somehow know what they have written. None of us, you see, wants to forget her for even one second. So she is here, among us, everywhere. She lives on in the public memorials, with trees planted in her ­honour at her old school and university, and in the private ones, too. At her home in Surrey, where she lived with her mum during the university holidays, her room remains as it always was. It is not a shrine; but neither will it ever be disturbed. 'All we want now is the peace to be able to celebrate her life. Is that so much to ask?' Her clothes remain in the wardrobe, her posters on the wall. Study books are piled on the table, make-up arranged beside them. It is just as she left it — and sometimes I even convince myself that one day she will return to it. I wait to hear the cheerful cadence of her laughter. Even now, the memory of it has the power to make me smile. People also always remember Meredith’s kindness and caring nature. She never gave the impression of being studious, but she was. She worked quietly and assiduously for her degree. But she was generous too. Several friends commented that she would lend out her lecture notes to ­anyone who asked: to her, it was second nature. But Meredith, of course, was not perfect. Punctuality was never one of her qualities. The last time I saw her, during a weekend trip back to London, she breezed into the Italian restaurant where I was waiting for her a full hour late. Yet when I saw her, wreathed in that famous smile, my annoy­ance instantly evaporated. The vision of her delightedly showing me the new boots she’d bought that day is one I continue to hold dear. The next thing we knew, we were travelling to Italy to identify her body. And then there was the ordeal of the court case, the details of which have been picked over too often to bear repeating here. Glamorised: Actress Hayden Panettiere is playing Knox in a new film about the events of Meredith's death But still, the hurt wasn’t over. I’ll share one small example. Two years after her death, we were told that we could finally take Meredith’s possessions home with us. I expected a large suitcase full of her belongings, which we could all cherish. Instead, I was given a small, ­battered case. Her beloved clothes had all been taken for forensic tests. Not even her treasured ­possessions were sacrosanct. So we concentrate on the happy memories instead. Meredith was a Christmas baby, and as the festive season approaches, we hold in our hearts the memory of her 21st birthday, celebrated in a local Italian restaurant. None of us could have dreamed it would be her last. Meredith meant so much to us all. Our lives have, of course, moved on, but not a minute passes when she is not in our thoughts. And the question that nags insistently at us is: ‘Why?’ Why was she taken from us prematurely and with such horrific brutality? Like all grieving parents, we sometimes wonder what she would be doing now if she were still with us. She would have graduated with her degree from Leeds University in 2009. But, of course, we were never able to share her pride in reaching that milestone. She was, however, awarded a posthumous degree, and her ­sister, Stephanie, collected it for her. Every student in the vast hall rose to their feet to applaud her that day. The standing ovation lasted a full minute, and my eyes brimmed with tears. Sometimes, even now, I find it hard to believe she is not still with us. Her passing is easier to bear if I pretend she has just gone away for a while; that some day soon she will ring me — her voice ­bubbling with laughter and enthusiasm — to tell me about her ­latest adventure. Meredith was the baby of the family, the beloved youngest child. Her mum, her siblings and I ­cherish every memory of her short life. It is her untimely and horrific death we would all prefer to obliterate from our minds. All we want now is the peace to be able to celebrate her life. Is that so much to ask? Share or comment on this article: From Meredith Kercher's father, a passionate attack on the cult of 'Foxy Knoxy'
{ "pile_set_name": "Pile-CC" }
{ "id": "lopezs-poster", "name": "Lopez's Poster", "games": { "nh": { "sources": [ "Nook Shopping after using Amiibo on Harvey's Island" ], "sellPrice": { "currency": "bells", "value": 250 }, "buyPrices": [ { "currency": "bells", "value": 1000 } ] } }, "category": "Photos" }
{ "pile_set_name": "Github" }
Share This Item Additional Information Don't get mad, get plaid! Specifically, these plaid leggings. A playful take on the tartan pattern with navy, hot pink and white hues, the full length style has the comforts you love with a stretch waistband and a tapered leg. Torrid.com ships to all 50 states, APO/FPO addresses, U.S. territories and possessions and over 150+ countries. For information on shipping to APO/FPO addresses or on International shipping. Standard U.S. Flat Rate Shipping is $6. Free Shipping to U.S. Stores & Free Returns to U.S. Stores. Recently Viewed Rated 5 out of 5 by BabygrlC from Love, love, loveI received these and are in love. Great fit, soft material and super comfy!! Great price and Fast shipping also. Date published: 2017-08-16 Rated 5 out of 5 by momofnine from great fitmy daughter loves theses leggings. They dont feel cheap. Date published: 2017-04-03 Rated 5 out of 5 by Schlie920 from Great!I bought these and they look great with just about everything. Date published: 2017-03-20 Rated 5 out of 5 by amber82 from best leggingsI purchased these leggings and i love them.they fit so comfortable.i would tell all plus size wokmen to go out and shop here.thanks torrid. Date published: 2017-03-15 Rated 5 out of 5 by KitViolet9 from Amazing!In the past Torrids leggings have run a little big and awkward on me but these are perfect :D Definitely recommend these! Date published: 2017-03-07 Rated 5 out of 5 by Bobbie4 from fits greatI bought these a few weeks ago and i love them. I would buy them again Date published: 2017-03-06 Rated 5 out of 5 by junebugsmommie from Perfect LookI bought these to wear with my t-shirt and converse for a comfortable but not lazy look and I was right I look great I even got a compliment from my mother who insults me quite often lol They fit great and are super comfy Date published: 2017-02-27 Rated 5 out of 5 by Princess Minnie from Awesome leggingsI bouts these for the colder weather at work very comfortable very happy buyer Date published: 2017-01-26 Rated 5 out of 5 by carik1 from So cute!love the colors and the fit/comfort of these leggings Date published: 2017-01-09 Rated 5 out of 5 by Jae marie from knew i had to have em soon as i saw themsooooo cute the colors are perfect l, you can't go wrong with torrid leggings!!!! they fit perfect just perfect Date published: 2017-01-04 Rated 5 out of 5 by LeA LeA from Absolutely loveThey are way toooooo cute. One of my favorite pairs. Date published: 2016-12-29 Rated 5 out of 5 by baby23 from Trendy leggings!!!I bought 2 pair of leggings a couple weeks ago and couldn't be more happier with them. They are so comfortable and slimming. Got lots of compliments. Bought other leggings in different colors. Love them!!! Date published: 2016-12-29 Rated 5 out of 5 by reneepoo from I love Torrid leggings!I bought my first pair of Torrid leggings a month ago and I loved them so much, I've bought 5 more pairs since. Date published: 2016-12-29 Rated 5 out of 5 by GothGranny from I LOVE these leggings!I'm 5'11" and these were indeed full length.True to size , and as comfy as PJs. I bought two other pairs in different pattern and would buy more. Date published: 2016-12-29 Rated 5 out of 5 by Bombom from Awesome fitBought these for myself, hey I'm only 61. They fit great length & tooshy. Have gotten many compliments. My grown daughter's want a pair too. Date published: 2016-12-27 Rated 5 out of 5 by Beth2000 from Great leggings!!Great fit!! Love the color and how comfortable they are
{ "pile_set_name": "Pile-CC" }
7月1日、エジプトのシナイ半島で軍の複数の検問所が同時に襲撃され、過激派戦闘員100人以上、兵士17人が死亡した。写真はガザ地区から見たシナイ半島北部(2015年 ロイター/Ibraheem Abu Mustafa) [イスマイリア/カイロ(エジプト) 1日 ロイター] - エジプトのシナイ半島で1日、軍の複数の検問所が同時に襲撃され、過激派戦闘員100人以上、兵士17人が死亡した。同国軍が明らかにした。過激派組織「イスラム国」傘下の「シナイ州」が犯行声明を出した。15カ所以上の検問所を襲撃し、自爆攻撃を3カ所で行ったとしている。 同国では6月29日に首都カイロで検事総長が爆弾攻撃で殺害されたばかり。
{ "pile_set_name": "OpenWebText2" }
/* * /MathJax/jax/output/HTML-CSS/fonts/STIX/General/Italic/CurrencySymbols.js * * Copyright (c) 2012 Design Science, Inc. * * Part of the MathJax library. * See http://www.mathjax.org for details. * * Licensed under the Apache License, Version 2.0; * you may not use this file except in compliance with the License. * * http://www.apache.org/licenses/LICENSE-2.0 */ MathJax.Hub.Insert(MathJax.OutputJax["HTML-CSS"].FONTDATA.FONTS["STIXGeneral-italic"],{8355:[653,0,611,8,645],8356:[670,8,500,10,517],8359:[653,13,1149,0,1126],8364:[664,12,500,16,538]});MathJax.Ajax.loadComplete(MathJax.OutputJax["HTML-CSS"].fontDir+"/General/Italic/CurrencySymbols.js");
{ "pile_set_name": "Github" }
Q: Play few seconds of video onclick Is there a way to play html video only for few seconds? Currently when a user clicks on a table row the video seeks to a predefined time (highlighted below). So in the below example the video would seek to 7 seconds. Is there a way to play the video from seconds onwards for just 10 seconds? i.e seek to 00:07 and play to 00:17 and stop? Thanks A: You can use timeupdate event along with currentTime attrribute function playVideo() { var starttime = 7; // start at 7 seconds var endtime = 17; // stop at 17 seconds var video = document.getElementById('yourVideoId'); video.addEventListener("timeupdate", function() { if (this.currentTime >= endtime) { this.pause(); } }, false); //suppose that video src has been already set properly video.load(); video.play(); //must call this otherwise can't seek on some browsers, e.g. Firefox 4 try { video.currentTime = starttime; } catch (ex) { //handle exceptions here } }
{ "pile_set_name": "StackExchange" }
Ever since NBC bought the rights to show the Premier League, they have dedicated themselves to showing all ten games on the final day of the Premier League season. The Premier League, like most soccer leagues around the world, have every game on the final day of the season kick off at the same time in order to avoid anyone having an advantage knowing what they need to do to finish where they want to be. It’s usually an incredibly important day that could bring some intense drama to finish out the season. Since NBC doesn’t have ten sports networks to put all the games on, they have to outsource their games to the other NBC/Comcast owned networks. That’s why there were games on Syfy, MSNBC, Bravo, E! and Oxygen, among other networks. All but Golf Channel, who previously showed Stanley Cup Playoff hockey, had a Premier League game. 10 matches on 10 networks. Here's where you can find all of today's @premierleague matches ? pic.twitter.com/SKKaUvA72I — #MyPLSummer (@NBCSportsSoccer) May 13, 2018 This didn’t sit well with the notable viewers looking to start their Mother’s Day Sunday with housewives or the news or a sci-fi movie. In a non-Masters tradition unlike any other, the people took to social media and aired their grievances/confusion about why soccer is on a bunch of non-sports channels. The most vocal of this group were the people who missed out on MSNBC and AM Joy with Joy Reid along with Meet the Press on NBC. Despite cable news being a thing 24/7, there were still people who had a major problem that soccer took out a couple hours of news time. Soccer! Instead of #MTP. Jesus Christ #NBC .Watching a Tim Russert rerun. OMG! It's so much better. #hownottorunaNetwork — The Anonymous Comic (@Nobodyknowsme49) May 13, 2018 I’m sorry. I “get” the need for USA to see Premier Soccer but it’s on EVERY channel owned by @nbc #MSNBC #CNBC Can someone please explain? Was this to free everyone up for #MothersDay ? — Jody (@Collegebound973) May 13, 2018 @OptimumHelp have you been hacked? Premeier League Soccer is on like 15 channels, including NBC. No Meet The Press? — Steve Schultz (@mvabl_steve) May 13, 2018 Thought i could watch snapped all morning and enjoy my mother’s day. but nope. @nbc is forcing people to watch soccer ???? — Master Roshi Baby Mama (@DopeQueen_E) May 13, 2018 It is Sunday morning. Why is NBC & NBC owned stations flooding us with 2 hours of British Premier League soccer. Who cares? — Howard Willens (@adprof225) May 13, 2018 Miss you! My daughter brought me a delicious breakfast in bed of homemade waffles with steaming cup of coffee. I brought it out to watch with am Joy. What's this? Soccer? — Strong for Kamala, Coffee & Confluence (@Lovolition) May 13, 2018 @amjoyshow @MSNBC Never Preempts Hallie,Andrea,Ruhle,Jansing(53%percenters)nor,@HARDBALL w/some Soccer Sh*t?Had my kids come home when they were young&said2me,they wanted2play Soccer?i would've sent them2the corner store for Milk&moved out of"State"N the interim!GMAFB&my,#Remote! — figmore (@figmore) May 13, 2018 Really. . . . REALLY @MSNBC? I turn on to see @amjoyshow and you've got soccer on? There's like 100 sports networks and YOU'RE showing soccer. Where's that 'keep sports out of politics' crowd when I need them? pic.twitter.com/qqQVDkc05u — K D Webb (@bayoubigun) May 13, 2018 Just turned off @MSNBC due to soccer. I pay for enough sports channels that I never watch. MSNBC needs to ditch the sports. — Cyndee Millichamp ????????? @? (@CMillichamp1) May 13, 2018 My only day to watch @amjoyshow and MSNBC is airing soccer, which I don’t give 2 effs about! — Sue Brinton (@Eyemsue) May 13, 2018 @MSNBC Why do you have soccer on instead of AM Joy? If I wanted to watch soccer I would change to a sports channel! WTF??? ??? — Irene Boniece ☕️ (@irbnyc) May 13, 2018 @amjoyshow When you’re all set on a Sunday morning to watch @JoyAnnReid on @MSNBC and you find a bunch of soccer players instead. Bummer. — Island212 (@10021barb) May 13, 2018 Wait! What? You're showing soccer? Where the hell is #AmJOY @msnbc? Was this an actual we-meant-to-do-this thing or was there nobody around to pinch hit? Did you ask Jonathan Capehart? Even the soccer guy is bummed out. Guess it's Fareed Zakaria this morning. pic.twitter.com/7bGhrJ6EUz — Julie Formay (@JulieFormay) May 13, 2018 This was a very dumb management decision … not many who watch #AmJoy or #msnbc would be interested in a soccer game. I watch politics, not sports. And if we wanted to, we can watch soccer on a sports channel not a news channel. Know your audience @msnbc https://t.co/hqRtz0Hn2T — Bmblbeeb? (@Bmblbeeb) May 13, 2018 @MSNBC WHAT THE F____K IS GOING ON ?This morning the biggest day for political news I expected to turn on AM Joy ,and what do I get SOCCER ???Have you sold out to the Plutocrat Traitor Republicans ( PTR`s ) — Lawrence Circosta (@cirlar49) May 13, 2018 @MSNBC SOCCER??? SERIOUSLY? I wake up on Saturday and Sunday just to watch AM JOY and you've got a blasted SOCCER game on LIVE? WTH?? With everything going on in our government right now, and YOU HAVE SOCCER? What is WRONG with you? 24 hour news – NOT SOCCER!! — Beverley Hughes (@ShutterBugBev13) May 13, 2018 It's a special kind of insult on Mother's Day to wake up for AMJoy only to find it pre-empted for soccer. Soccer. Are you fucking kidding me, @MSNBC all politics all the time? SOCCER??? I'm just gonna barf. — Juli Bunting#BlackLivesMatter (@JuliBunting) May 13, 2018 Is anyone else watching @MSNBC? Why are they playing soccer? Where is @JoyAnnReid @amjoyshow Confusing . . . Also #NBC seems to be down, also playing soccer, no commercials — Christine Reinauer (@CoxReinauer) May 13, 2018 Some people theorized that because it was Mother’s Day, that AM Joy host Joy Reid got the day off and MSNBC showed soccer instead. That’s a nice way to look on the bright side but that was merely a coincidence. There weren’t as many tweets about the other networks but there were a sizable amount from the Syfy/E!/Bravo/Oxygen crowd. They weren’t at all pleased as well. I woke up this morning and turned my tv on…there is soccer on the Syfy channel, not like zombie soccer, real premiere league soccer — Joe Hunk (@JoeHunk) May 13, 2018 @SYFY so how the hell does shitty soccer count as Syfy. You are not ESPN. Holy shit we want science fiction not sports. — Truth (@Truthissll) May 13, 2018 Nice move, @Syfy : You guys think its a good idea to cancel The Expanse AND fill your Mother's Day with soccer! I bet those sci-fi fans out there are really loving you guys right about now. #SaveTheExpanse — shadowed (@shadowed_dream) May 13, 2018 @SYFY programmers: Mother's Day morning and you're televising soccer tournaments?? ??whose bright idea was that??!! #hellolightbulbs ? — Phyllis Davis (@pcdavis33) May 13, 2018 @SYFY yo why tf is soccer playing on your channel? And it’s not aliens vs robots? pic.twitter.com/CBQLjRG3Vs — aka_cojin (@th3laughingman) May 13, 2018 Disappointed @e_entertainment is playing soccer right now ???? it’s Mother’s Day! I want my terrible reality TV or cheesy movies ????????‍♀️ — L (@laceyy_g) May 13, 2018 Why is soccer playing on E! — The Main Character (@KalaTweets_) May 13, 2018 Why is premier league soccer on E? — George T (@GeorgeSteven512) May 13, 2018 Pretty dumb of @Bravotv and @e_entertainment to put soccer on both channels for #mothersday2018. The one morning I can watch whatever I want they play the exact thing my husband wants to watch ? — Ali Halbert (@aligriff10) May 13, 2018 And as it turns out, on Syfy, USA and E!. Someone is really over estimating the lure of English soccer. — Lauren Down South (@LaurenDownSouth) May 13, 2018 They’re showing a soccer game on @oxygen. No Snapped? No Dateline? This is not the start to Mother’s Day I envisioned. — Alexis. (@lexclem) May 13, 2018 @oxygen, the new network for crime and premier league soccer. Because the demographics are the same, right? ? — Angie S (@AngieDownSouth) May 13, 2018 @NBCUniversal @Bravotv @e_entertainment @nbc @oxygen maybe next Mother's Day you guys can NOT play soccer on every channel? Maybe just a simple vanderpump rule marathon? Or some real housewives? Just a thought. — Dominique Danielle (@domidaniellec) May 13, 2018 This happens every year and it’s gotten to the point where many soccer fans get a good chuckle about it. No doubt, soccer fans get angry when games are preempted for something else and many act a lot like these people, so it’s not like soccer fans are any better. I guess it’s just amusing for soccer fans to see it happen the other way around once a year. FYI: This will happen again May 19 next year so if you don’t prefer watching soccer, I recommend planning another activity that morning because NBC is going to do this again. [Photo: @NBCSN]
{ "pile_set_name": "OpenWebText2" }
Advertize Your Products on Indian-Commodity.com Indian-commodity.com works out to be an optimum marketing platform for finance and investment market products, for we reach out to thousands of unique visitors daily. We do offer options of text links and text+image links on our website. You can opt for only home page link, or category page link, or category-wide links, or even full website links. Your site-wide or category-wide links, are listed on the old news articles as well. Sounds tempting!! For any business queries or custom needs, please write us at advertise@indian-commodity.com Capital First is currently trading at Rs. 710.00, up by 5.95 points or 0.85% from its previous closing of Rs. 704.05 on the BSE. The scrip opened at Rs. 707.00 and has touched a high and low of Rs. 712.35 and Rs. 700.05 respectively. So far 8063 shares were traded on the counter. The BSE group 'A' stock of face value Rs. 10 has touched a 52 week high of Rs. 839.00 on 13-Sep-2017 and a 52 week low of Rs. 492.05 on 23-Nov-2016. Last one week high and low of the scrip stood at Rs. 716.85 and Rs. 658.05 respectively. The current market cap of the company is Rs. 6996.36 crore. The promoters holding in the company stood at 35.97%, while institutions and non-institutions held 37.45% and 26.59% respectively. Capital First has received an approval for issue of Rated, Listed, secured, Redeemable, Non-Convertible Debentures of Rs 40 crore plus Green Shoe option of Rs 40 crore on private placement basis. The Debenture Committee constituted by the board of directors of the company at its meeting held on November 23, 2017 has approved for the same. The tenure of the instrument will be for 2353 days and will mature on May 3, 2024. The debentures will offer interest of 8.45% per annum payable annually. Capital First is an MSME and consumer financing company which provides debt financing to these segments and also offers home loans, two wheeler loans and durable loans to entry and mid-level salaried employees of corporates. (19-Mar-2018) Tata Power Delhi Distribution (TPDDL), a joint venture (JV) of Tata Power and the Government of Delhi has launched artificial intelligence solution for Indian Discoms to make their operations smarter.......click on news to read complete article. (19-Mar-2018) Lupin has received final approval for its Desoximetasone Topical Spray, 0.25%, 30 ml, 50 ml, and 100 ml from the United States Food and Drug Administration (USFDA) to market a generic version of Taro Pharmaceuticals......click on news to read complete article. (19-Mar-2018) Most of the Asian equity indices are trading down in the early deals on Monday as caution gripped investors in a week in which the Federal Reserve is likely to hike US interest rates and perhaps signal......click on news to read complete article. (17-Mar-2018) The US markets closed modestly higher on Friday, with the S&amp;P 500 breaking a four-day losing streak after mostly upbeat economic data, though major indexes still suffered hefty weekly declines.......click on news to read complete article. (17-Mar-2018) The US markets closed modestly higher on Friday, with the S&amp;P 500 breaking a four-day losing streak after mostly upbeat economic data, though major indexes still suffered hefty weekly declines.......click on news to read complete article. Disclaimer By clicking on this page you accept all the terms and conditions framed by us. News made available here are for informational purpose only. While utmost care has been taken in providing the same. We claim no responsibility for its accuracy. Readers of this blog who make their decision based on the information posted here are solely responsible for their actions.
{ "pile_set_name": "Pile-CC" }
Major disruption to c2c trains this July-August Due to works on the London Overground extension to Barking Riverside, services on the c2c railway lines in the area are going to be hit with several weeks of serious disruption. Work starts on Saturday 20 July and finishes on Sunday 4 August. The engineering work will close the London-bound track between Purfleet and Barking. In order to keep trains into London running, the services will be diverted via Ockendon, which in turn means that that line will be one-way only, towards London. However, the line via Ockendon is a single track and has limited capacity, which further restricts how many trains they can run. Anyone heading into London will go via Ockendon, while services out of London in the evening, will loop around via Dagenham Dock, and up to Ockendon. There will also be significant alterations to off-peak services and a reduced weekend service. The map below shows: In red: areas where services are only running in one direction, with significantly extended journey times In amber: areas where service levels are reduced with some increase in journey times In black: areas where peak services will be retimed but no significant changes to frequency or journey times The full c2c timetable for this period is currently being finalised with Network Rail and freight train operators and c2c said that they will publish it as soon as it is finalised, which is expected to be in June.
{ "pile_set_name": "Pile-CC" }
#!/bin/sh # SPDX-License-Identifier: GPL-2.0 # # nft_concat_range.sh - Tests for sets with concatenation of ranged fields # # Copyright (c) 2019 Red Hat GmbH # # Author: Stefano Brivio <sbrivio@redhat.com> # # shellcheck disable=SC2154,SC2034,SC2016,SC2030,SC2031 # ^ Configuration and templates sourced with eval, counters reused in subshells KSELFTEST_SKIP=4 # Available test groups: # - reported_issues: check for issues that were reported in the past # - correctness: check that packets match given entries, and only those # - concurrency: attempt races between insertion, deletion and lookup # - timeout: check that packets match entries until they expire # - performance: estimate matching rate, compare with rbtree and hash baselines TESTS="reported_issues correctness concurrency timeout" [ "${quicktest}" != "1" ] && TESTS="${TESTS} performance" # Set types, defined by TYPE_ variables below TYPES="net_port port_net net6_port port_proto net6_port_mac net6_port_mac_proto net_port_net net_mac net_mac_icmp net6_mac_icmp net6_port_net6_port net_port_mac_proto_net" # Reported bugs, also described by TYPE_ variables below BUGS="flush_remove_add" # List of possible paths to pktgen script from kernel tree for performance tests PKTGEN_SCRIPT_PATHS=" ../../../samples/pktgen/pktgen_bench_xmit_mode_netif_receive.sh pktgen/pktgen_bench_xmit_mode_netif_receive.sh" # Definition of set types: # display display text for test report # type_spec nftables set type specifier # chain_spec nftables type specifier for rules mapping to set # dst call sequence of format_*() functions for destination fields # src call sequence of format_*() functions for source fields # start initial integer used to generate addresses and ports # count count of entries to generate and match # src_delta number summed to destination generator for source fields # tools list of tools for correctness and timeout tests, any can be used # proto L4 protocol of test packets # # race_repeat race attempts per thread, 0 disables concurrency test for type # flood_tools list of tools for concurrency tests, any can be used # flood_proto L4 protocol of test packets for concurrency tests # flood_spec nftables type specifier for concurrency tests # # perf_duration duration of single pktgen injection test # perf_spec nftables type specifier for performance tests # perf_dst format_*() functions for destination fields in performance test # perf_src format_*() functions for source fields in performance test # perf_entries number of set entries for performance test # perf_proto L3 protocol of test packets TYPE_net_port=" display net,port type_spec ipv4_addr . inet_service chain_spec ip daddr . udp dport dst addr4 port src start 1 count 5 src_delta 2000 tools sendip nc bash proto udp race_repeat 3 flood_tools iperf3 iperf netperf flood_proto udp flood_spec ip daddr . udp dport perf_duration 5 perf_spec ip daddr . udp dport perf_dst addr4 port perf_src perf_entries 1000 perf_proto ipv4 " TYPE_port_net=" display port,net type_spec inet_service . ipv4_addr chain_spec udp dport . ip daddr dst port addr4 src start 1 count 5 src_delta 2000 tools sendip nc bash proto udp race_repeat 3 flood_tools iperf3 iperf netperf flood_proto udp flood_spec udp dport . ip daddr perf_duration 5 perf_spec udp dport . ip daddr perf_dst port addr4 perf_src perf_entries 100 perf_proto ipv4 " TYPE_net6_port=" display net6,port type_spec ipv6_addr . inet_service chain_spec ip6 daddr . udp dport dst addr6 port src start 10 count 5 src_delta 2000 tools sendip nc bash proto udp6 race_repeat 3 flood_tools iperf3 iperf netperf flood_proto tcp6 flood_spec ip6 daddr . udp dport perf_duration 5 perf_spec ip6 daddr . udp dport perf_dst addr6 port perf_src perf_entries 1000 perf_proto ipv6 " TYPE_port_proto=" display port,proto type_spec inet_service . inet_proto chain_spec udp dport . meta l4proto dst port proto src start 1 count 5 src_delta 2000 tools sendip nc bash proto udp race_repeat 0 perf_duration 5 perf_spec udp dport . meta l4proto perf_dst port proto perf_src perf_entries 30000 perf_proto ipv4 " TYPE_net6_port_mac=" display net6,port,mac type_spec ipv6_addr . inet_service . ether_addr chain_spec ip6 daddr . udp dport . ether saddr dst addr6 port src mac start 10 count 5 src_delta 2000 tools sendip nc bash proto udp6 race_repeat 0 perf_duration 5 perf_spec ip6 daddr . udp dport . ether daddr perf_dst addr6 port mac perf_src perf_entries 10 perf_proto ipv6 " TYPE_net6_port_mac_proto=" display net6,port,mac,proto type_spec ipv6_addr . inet_service . ether_addr . inet_proto chain_spec ip6 daddr . udp dport . ether saddr . meta l4proto dst addr6 port src mac proto start 10 count 5 src_delta 2000 tools sendip nc bash proto udp6 race_repeat 0 perf_duration 5 perf_spec ip6 daddr . udp dport . ether daddr . meta l4proto perf_dst addr6 port mac proto perf_src perf_entries 1000 perf_proto ipv6 " TYPE_net_port_net=" display net,port,net type_spec ipv4_addr . inet_service . ipv4_addr chain_spec ip daddr . udp dport . ip saddr dst addr4 port src addr4 start 1 count 5 src_delta 2000 tools sendip nc bash proto udp race_repeat 3 flood_tools iperf3 iperf netperf flood_proto tcp flood_spec ip daddr . udp dport . ip saddr perf_duration 0 " TYPE_net6_port_net6_port=" display net6,port,net6,port type_spec ipv6_addr . inet_service . ipv6_addr . inet_service chain_spec ip6 daddr . udp dport . ip6 saddr . udp sport dst addr6 port src addr6 port start 10 count 5 src_delta 2000 tools sendip nc proto udp6 race_repeat 3 flood_tools iperf3 iperf netperf flood_proto tcp6 flood_spec ip6 daddr . tcp dport . ip6 saddr . tcp sport perf_duration 0 " TYPE_net_port_mac_proto_net=" display net,port,mac,proto,net type_spec ipv4_addr . inet_service . ether_addr . inet_proto . ipv4_addr chain_spec ip daddr . udp dport . ether saddr . meta l4proto . ip saddr dst addr4 port src mac proto addr4 start 1 count 5 src_delta 2000 tools sendip nc bash proto udp race_repeat 0 perf_duration 0 " TYPE_net_mac=" display net,mac type_spec ipv4_addr . ether_addr chain_spec ip daddr . ether saddr dst addr4 src mac start 1 count 5 src_delta 2000 tools sendip nc bash proto udp race_repeat 0 perf_duration 5 perf_spec ip daddr . ether daddr perf_dst addr4 mac perf_src perf_entries 1000 perf_proto ipv4 " TYPE_net_mac_icmp=" display net,mac - ICMP type_spec ipv4_addr . ether_addr chain_spec ip daddr . ether saddr dst addr4 src mac start 1 count 5 src_delta 2000 tools ping proto icmp race_repeat 0 perf_duration 0 " TYPE_net6_mac_icmp=" display net6,mac - ICMPv6 type_spec ipv6_addr . ether_addr chain_spec ip6 daddr . ether saddr dst addr6 src mac start 10 count 50 src_delta 2000 tools ping proto icmp6 race_repeat 0 perf_duration 0 " TYPE_net_port_proto_net=" display net,port,proto,net type_spec ipv4_addr . inet_service . inet_proto . ipv4_addr chain_spec ip daddr . udp dport . meta l4proto . ip saddr dst addr4 port proto src addr4 start 1 count 5 src_delta 2000 tools sendip nc proto udp race_repeat 3 flood_tools iperf3 iperf netperf flood_proto tcp flood_spec ip daddr . tcp dport . meta l4proto . ip saddr perf_duration 0 " # Definition of tests for bugs reported in the past: # display display text for test report TYPE_flush_remove_add=" display Add two elements, flush, re-add " # Set template for all tests, types and rules are filled in depending on test set_template=' flush ruleset table inet filter { counter test { packets 0 bytes 0 } set test { type ${type_spec} flags interval,timeout } chain input { type filter hook prerouting priority 0; policy accept; ${chain_spec} @test counter name \"test\" } } table netdev perf { counter test { packets 0 bytes 0 } counter match { packets 0 bytes 0 } set test { type ${type_spec} flags interval } set norange { type ${type_spec} } set noconcat { type ${type_spec%% *} flags interval } chain test { type filter hook ingress device veth_a priority 0; } } ' err_buf= info_buf= # Append string to error buffer err() { err_buf="${err_buf}${1} " } # Append string to information buffer info() { info_buf="${info_buf}${1} " } # Flush error buffer to stdout err_flush() { printf "%s" "${err_buf}" err_buf= } # Flush information buffer to stdout info_flush() { printf "%s" "${info_buf}" info_buf= } # Setup veth pair: this namespace receives traffic, B generates it setup_veth() { ip netns add B ip link add veth_a type veth peer name veth_b || return 1 ip link set veth_a up ip link set veth_b netns B ip -n B link set veth_b up ip addr add dev veth_a 10.0.0.1 ip route add default dev veth_a ip -6 addr add fe80::1/64 dev veth_a nodad ip -6 addr add 2001:db8::1/64 dev veth_a nodad ip -6 route add default dev veth_a ip -n B route add default dev veth_b ip -6 -n B addr add fe80::2/64 dev veth_b nodad ip -6 -n B addr add 2001:db8::2/64 dev veth_b nodad ip -6 -n B route add default dev veth_b B() { ip netns exec B "$@" >/dev/null 2>&1 } sleep 2 } # Fill in set template and initialise set setup_set() { eval "echo \"${set_template}\"" | nft -f - } # Check that at least one of the needed tools is available check_tools() { [ -z "${tools}" ] && return 0 __tools= for tool in ${tools}; do if [ "${tool}" = "nc" ] && [ "${proto}" = "udp6" ] && \ ! nc -u -w0 1.1.1.1 1 2>/dev/null; then # Some GNU netcat builds might not support IPv6 __tools="${__tools} netcat-openbsd" continue fi __tools="${__tools} ${tool}" command -v "${tool}" >/dev/null && return 0 done err "need one of:${__tools}, skipping" && return 1 } # Set up function to send ICMP packets setup_send_icmp() { send_icmp() { B ping -c1 -W1 "${dst_addr4}" >/dev/null 2>&1 } } # Set up function to send ICMPv6 packets setup_send_icmp6() { if command -v ping6 >/dev/null; then send_icmp6() { ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null B ping6 -q -c1 -W1 "${dst_addr6}" } else send_icmp6() { ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null B ping -q -6 -c1 -W1 "${dst_addr6}" } fi } # Set up function to send single UDP packets on IPv4 setup_send_udp() { if command -v sendip >/dev/null; then send_udp() { [ -n "${src_port}" ] && src_port="-us ${src_port}" [ -n "${dst_port}" ] && dst_port="-ud ${dst_port}" [ -n "${src_addr4}" ] && src_addr4="-is ${src_addr4}" # shellcheck disable=SC2086 # sendip needs split options B sendip -p ipv4 -p udp ${src_addr4} ${src_port} \ ${dst_port} "${dst_addr4}" src_port= dst_port= src_addr4= } elif command -v nc >/dev/null; then if nc -u -w0 1.1.1.1 1 2>/dev/null; then # OpenBSD netcat nc_opt="-w0" else # GNU netcat nc_opt="-q0" fi send_udp() { if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}" dev veth_b __src_addr4="-s ${src_addr4}" fi ip addr add "${dst_addr4}" dev veth_a 2>/dev/null [ -n "${src_port}" ] && src_port="-p ${src_port}" echo "" | B nc -u "${nc_opt}" "${__src_addr4}" \ "${src_port}" "${dst_addr4}" "${dst_port}" src_addr4= src_port= } elif [ -z "$(bash -c 'type -p')" ]; then send_udp() { ip addr add "${dst_addr4}" dev veth_a 2>/dev/null if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}/16" dev veth_b B ip route add default dev veth_b fi B bash -c "echo > /dev/udp/${dst_addr4}/${dst_port}" if [ -n "${src_addr4}" ]; then B ip addr del "${src_addr4}/16" dev veth_b fi src_addr4= } else return 1 fi } # Set up function to send single UDP packets on IPv6 setup_send_udp6() { if command -v sendip >/dev/null; then send_udp6() { [ -n "${src_port}" ] && src_port="-us ${src_port}" [ -n "${dst_port}" ] && dst_port="-ud ${dst_port}" if [ -n "${src_addr6}" ]; then src_addr6="-6s ${src_addr6}" else src_addr6="-6s 2001:db8::2" fi ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null # shellcheck disable=SC2086 # this needs split options B sendip -p ipv6 -p udp ${src_addr6} ${src_port} \ ${dst_port} "${dst_addr6}" src_port= dst_port= src_addr6= } elif command -v nc >/dev/null && nc -u -w0 1.1.1.1 1 2>/dev/null; then # GNU netcat might not work with IPv6, try next tool send_udp6() { ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null if [ -n "${src_addr6}" ]; then B ip addr add "${src_addr6}" dev veth_b nodad else src_addr6="2001:db8::2" fi [ -n "${src_port}" ] && src_port="-p ${src_port}" # shellcheck disable=SC2086 # this needs split options echo "" | B nc -u w0 "-s${src_addr6}" ${src_port} \ ${dst_addr6} ${dst_port} src_addr6= src_port= } elif [ -z "$(bash -c 'type -p')" ]; then send_udp6() { ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null B ip addr add "${src_addr6}" dev veth_b nodad B bash -c "echo > /dev/udp/${dst_addr6}/${dst_port}" ip -6 addr del "${dst_addr6}" dev veth_a 2>/dev/null } else return 1 fi } # Set up function to send TCP traffic on IPv4 setup_flood_tcp() { if command -v iperf3 >/dev/null; then flood_tcp() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}/16" dev veth_b src_addr4="-B ${src_addr4}" else B ip addr add dev veth_b 10.0.0.2 src_addr4="-B 10.0.0.2" fi if [ -n "${src_port}" ]; then src_port="--cport ${src_port}" fi B ip route add default dev veth_b 2>/dev/null ip addr add "${dst_addr4}" dev veth_a 2>/dev/null # shellcheck disable=SC2086 # this needs split options iperf3 -s -DB "${dst_addr4}" ${dst_port} >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B iperf3 -c "${dst_addr4}" ${dst_port} ${src_port} \ ${src_addr4} -l16 -t 1000 src_addr4= src_port= dst_port= } elif command -v iperf >/dev/null; then flood_tcp() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}/16" dev veth_b src_addr4="-B ${src_addr4}" else B ip addr add dev veth_b 10.0.0.2 2>/dev/null src_addr4="-B 10.0.0.2" fi if [ -n "${src_port}" ]; then src_addr4="${src_addr4}:${src_port}" fi B ip route add default dev veth_b ip addr add "${dst_addr4}" dev veth_a 2>/dev/null # shellcheck disable=SC2086 # this needs split options iperf -s -DB "${dst_addr4}" ${dst_port} >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B iperf -c "${dst_addr4}" ${dst_port} ${src_addr4} \ -l20 -t 1000 src_addr4= src_port= dst_port= } elif command -v netperf >/dev/null; then flood_tcp() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}/16" dev veth_b else B ip addr add dev veth_b 10.0.0.2 src_addr4="10.0.0.2" fi if [ -n "${src_port}" ]; then dst_port="${dst_port},${src_port}" fi B ip route add default dev veth_b ip addr add "${dst_addr4}" dev veth_a 2>/dev/null # shellcheck disable=SC2086 # this needs split options netserver -4 ${dst_port} -L "${dst_addr4}" \ >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B netperf -4 -H "${dst_addr4}" ${dst_port} \ -L "${src_addr4}" -l 1000 -t TCP_STREAM src_addr4= src_port= dst_port= } else return 1 fi } # Set up function to send TCP traffic on IPv6 setup_flood_tcp6() { if command -v iperf3 >/dev/null; then flood_tcp6() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr6}" ]; then B ip addr add "${src_addr6}" dev veth_b nodad src_addr6="-B ${src_addr6}" else src_addr6="-B 2001:db8::2" fi if [ -n "${src_port}" ]; then src_port="--cport ${src_port}" fi B ip route add default dev veth_b ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null # shellcheck disable=SC2086 # this needs split options iperf3 -s -DB "${dst_addr6}" ${dst_port} >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B iperf3 -c "${dst_addr6}" ${dst_port} \ ${src_port} ${src_addr6} -l16 -t 1000 src_addr6= src_port= dst_port= } elif command -v iperf >/dev/null; then flood_tcp6() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr6}" ]; then B ip addr add "${src_addr6}" dev veth_b nodad src_addr6="-B ${src_addr6}" else src_addr6="-B 2001:db8::2" fi if [ -n "${src_port}" ]; then src_addr6="${src_addr6}:${src_port}" fi B ip route add default dev veth_b ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null # shellcheck disable=SC2086 # this needs split options iperf -s -VDB "${dst_addr6}" ${dst_port} >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B iperf -c "${dst_addr6}" -V ${dst_port} \ ${src_addr6} -l1 -t 1000 src_addr6= src_port= dst_port= } elif command -v netperf >/dev/null; then flood_tcp6() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr6}" ]; then B ip addr add "${src_addr6}" dev veth_b nodad else src_addr6="2001:db8::2" fi if [ -n "${src_port}" ]; then dst_port="${dst_port},${src_port}" fi B ip route add default dev veth_b ip -6 addr add "${dst_addr6}" dev veth_a nodad \ 2>/dev/null # shellcheck disable=SC2086 # this needs split options netserver -6 ${dst_port} -L "${dst_addr6}" \ >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B netperf -6 -H "${dst_addr6}" ${dst_port} \ -L "${src_addr6}" -l 1000 -t TCP_STREAM src_addr6= src_port= dst_port= } else return 1 fi } # Set up function to send UDP traffic on IPv4 setup_flood_udp() { if command -v iperf3 >/dev/null; then flood_udp() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}/16" dev veth_b src_addr4="-B ${src_addr4}" else B ip addr add dev veth_b 10.0.0.2 2>/dev/null src_addr4="-B 10.0.0.2" fi if [ -n "${src_port}" ]; then src_port="--cport ${src_port}" fi B ip route add default dev veth_b ip addr add "${dst_addr4}" dev veth_a 2>/dev/null # shellcheck disable=SC2086 # this needs split options iperf3 -s -DB "${dst_addr4}" ${dst_port} sleep 2 # shellcheck disable=SC2086 # this needs split options B iperf3 -u -c "${dst_addr4}" -Z -b 100M -l16 -t1000 \ ${dst_port} ${src_port} ${src_addr4} src_addr4= src_port= dst_port= } elif command -v iperf >/dev/null; then flood_udp() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}/16" dev veth_b src_addr4="-B ${src_addr4}" else B ip addr add dev veth_b 10.0.0.2 src_addr4="-B 10.0.0.2" fi if [ -n "${src_port}" ]; then src_addr4="${src_addr4}:${src_port}" fi B ip route add default dev veth_b ip addr add "${dst_addr4}" dev veth_a 2>/dev/null # shellcheck disable=SC2086 # this needs split options iperf -u -sDB "${dst_addr4}" ${dst_port} >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B iperf -u -c "${dst_addr4}" -b 100M -l1 -t1000 \ ${dst_port} ${src_addr4} src_addr4= src_port= dst_port= } elif command -v netperf >/dev/null; then flood_udp() { [ -n "${dst_port}" ] && dst_port="-p ${dst_port}" if [ -n "${src_addr4}" ]; then B ip addr add "${src_addr4}/16" dev veth_b else B ip addr add dev veth_b 10.0.0.2 src_addr4="10.0.0.2" fi if [ -n "${src_port}" ]; then dst_port="${dst_port},${src_port}" fi B ip route add default dev veth_b ip addr add "${dst_addr4}" dev veth_a 2>/dev/null # shellcheck disable=SC2086 # this needs split options netserver -4 ${dst_port} -L "${dst_addr4}" \ >/dev/null 2>&1 sleep 2 # shellcheck disable=SC2086 # this needs split options B netperf -4 -H "${dst_addr4}" ${dst_port} \ -L "${src_addr4}" -l 1000 -t UDP_STREAM src_addr4= src_port= dst_port= } else return 1 fi } # Find pktgen script and set up function to start pktgen injection setup_perf() { for pktgen_script_path in ${PKTGEN_SCRIPT_PATHS} __notfound; do command -v "${pktgen_script_path}" >/dev/null && break done [ "${pktgen_script_path}" = "__notfound" ] && return 1 perf_ipv4() { ${pktgen_script_path} -s80 \ -i veth_a -d "${dst_addr4}" -p "${dst_port}" \ -m "${dst_mac}" \ -t $(($(nproc) / 5 + 1)) -b10000 -n0 2>/dev/null & perf_pid=$! } perf_ipv6() { IP6=6 ${pktgen_script_path} -s100 \ -i veth_a -d "${dst_addr6}" -p "${dst_port}" \ -m "${dst_mac}" \ -t $(($(nproc) / 5 + 1)) -b10000 -n0 2>/dev/null & perf_pid=$! } } # Clean up before each test cleanup() { nft reset counter inet filter test >/dev/null 2>&1 nft flush ruleset >/dev/null 2>&1 ip link del dummy0 2>/dev/null ip route del default 2>/dev/null ip -6 route del default 2>/dev/null ip netns del B 2>/dev/null ip link del veth_a 2>/dev/null timeout= killall iperf3 2>/dev/null killall iperf 2>/dev/null killall netperf 2>/dev/null killall netserver 2>/dev/null rm -f ${tmp} sleep 2 } # Entry point for setup functions setup() { if [ "$(id -u)" -ne 0 ]; then echo " need to run as root" exit ${KSELFTEST_SKIP} fi cleanup check_tools || return 1 for arg do if ! eval setup_"${arg}"; then err " ${arg} not supported" return 1 fi done } # Format integer into IPv4 address, summing 10.0.0.5 (arbitrary) to it format_addr4() { a=$((${1} + 16777216 * 10 + 5)) printf "%i.%i.%i.%i" \ "$((a / 16777216))" "$((a % 16777216 / 65536))" \ "$((a % 65536 / 256))" "$((a % 256))" } # Format integer into IPv6 address, summing 2001:db8:: to it format_addr6() { printf "2001:db8::%04x:%04x" "$((${1} / 65536))" "$((${1} % 65536))" } # Format integer into EUI-48 address, summing 00:01:00:00:00:00 to it format_mac() { printf "00:01:%02x:%02x:%02x:%02x" \ "$((${1} / 16777216))" "$((${1} % 16777216 / 65536))" \ "$((${1} % 65536 / 256))" "$((${1} % 256))" } # Format integer into port, avoid 0 port format_port() { printf "%i" "$((${1} % 65534 + 1))" } # Drop suffixed '6' from L4 protocol, if any format_proto() { printf "%s" "${proto}" | tr -d 6 } # Format destination and source fields into nft concatenated type format() { __start= __end= __expr="{ " for f in ${dst}; do [ "${__expr}" != "{ " ] && __expr="${__expr} . " __start="$(eval format_"${f}" "${start}")" __end="$(eval format_"${f}" "${end}")" if [ "${f}" = "proto" ]; then __expr="${__expr}${__start}" else __expr="${__expr}${__start}-${__end}" fi done for f in ${src}; do __expr="${__expr} . " __start="$(eval format_"${f}" "${srcstart}")" __end="$(eval format_"${f}" "${srcend}")" if [ "${f}" = "proto" ]; then __expr="${__expr}${__start}" else __expr="${__expr}${__start}-${__end}" fi done if [ -n "${timeout}" ]; then echo "${__expr} timeout ${timeout}s }" else echo "${__expr} }" fi } # Format destination and source fields into nft type, start element only format_norange() { __expr="{ " for f in ${dst}; do [ "${__expr}" != "{ " ] && __expr="${__expr} . " __expr="${__expr}$(eval format_"${f}" "${start}")" done for f in ${src}; do __expr="${__expr} . $(eval format_"${f}" "${start}")" done echo "${__expr} }" } # Format first destination field into nft type format_noconcat() { for f in ${dst}; do __start="$(eval format_"${f}" "${start}")" __end="$(eval format_"${f}" "${end}")" if [ "${f}" = "proto" ]; then echo "{ ${__start} }" else echo "{ ${__start}-${__end} }" fi return done } # Add single entry to 'test' set in 'inet filter' table add() { if ! nft add element inet filter test "${1}"; then err "Failed to add ${1} given ruleset:" err "$(nft -a list ruleset)" return 1 fi } # Format and output entries for sets in 'netdev perf' table add_perf() { if [ "${1}" = "test" ]; then echo "add element netdev perf test $(format)" elif [ "${1}" = "norange" ]; then echo "add element netdev perf norange $(format_norange)" elif [ "${1}" = "noconcat" ]; then echo "add element netdev perf noconcat $(format_noconcat)" fi } # Add single entry to 'norange' set in 'netdev perf' table add_perf_norange() { if ! nft add element netdev perf norange "${1}"; then err "Failed to add ${1} given ruleset:" err "$(nft -a list ruleset)" return 1 fi } # Add single entry to 'noconcat' set in 'netdev perf' table add_perf_noconcat() { if ! nft add element netdev perf noconcat "${1}"; then err "Failed to add ${1} given ruleset:" err "$(nft -a list ruleset)" return 1 fi } # Delete single entry from set del() { if ! nft delete element inet filter test "${1}"; then err "Failed to delete ${1} given ruleset:" err "$(nft -a list ruleset)" return 1 fi } # Return packet count from 'test' counter in 'inet filter' table count_packets() { found=0 for token in $(nft list counter inet filter test); do [ ${found} -eq 1 ] && echo "${token}" && return [ "${token}" = "packets" ] && found=1 done } # Return packet count from 'test' counter in 'netdev perf' table count_perf_packets() { found=0 for token in $(nft list counter netdev perf test); do [ ${found} -eq 1 ] && echo "${token}" && return [ "${token}" = "packets" ] && found=1 done } # Set MAC addresses, send traffic according to specifier flood() { ip link set veth_a address "$(format_mac "${1}")" ip -n B link set veth_b address "$(format_mac "${2}")" for f in ${dst}; do eval dst_"$f"=\$\(format_\$f "${1}"\) done for f in ${src}; do eval src_"$f"=\$\(format_\$f "${2}"\) done eval flood_\$proto } # Set MAC addresses, start pktgen injection perf() { dst_mac="$(format_mac "${1}")" ip link set veth_a address "${dst_mac}" for f in ${dst}; do eval dst_"$f"=\$\(format_\$f "${1}"\) done for f in ${src}; do eval src_"$f"=\$\(format_\$f "${2}"\) done eval perf_\$perf_proto } # Set MAC addresses, send single packet, check that it matches, reset counter send_match() { ip link set veth_a address "$(format_mac "${1}")" ip -n B link set veth_b address "$(format_mac "${2}")" for f in ${dst}; do eval dst_"$f"=\$\(format_\$f "${1}"\) done for f in ${src}; do eval src_"$f"=\$\(format_\$f "${2}"\) done eval send_\$proto if [ "$(count_packets)" != "1" ]; then err "${proto} packet to:" err " $(for f in ${dst}; do eval format_\$f "${1}"; printf ' '; done)" err "from:" err " $(for f in ${src}; do eval format_\$f "${2}"; printf ' '; done)" err "should have matched ruleset:" err "$(nft -a list ruleset)" return 1 fi nft reset counter inet filter test >/dev/null } # Set MAC addresses, send single packet, check that it doesn't match send_nomatch() { ip link set veth_a address "$(format_mac "${1}")" ip -n B link set veth_b address "$(format_mac "${2}")" for f in ${dst}; do eval dst_"$f"=\$\(format_\$f "${1}"\) done for f in ${src}; do eval src_"$f"=\$\(format_\$f "${2}"\) done eval send_\$proto if [ "$(count_packets)" != "0" ]; then err "${proto} packet to:" err " $(for f in ${dst}; do eval format_\$f "${1}"; printf ' '; done)" err "from:" err " $(for f in ${src}; do eval format_\$f "${2}"; printf ' '; done)" err "should not have matched ruleset:" err "$(nft -a list ruleset)" return 1 fi } # Correctness test template: # - add ranged element, check that packets match it # - check that packets outside range don't match it # - remove some elements, check that packets don't match anymore test_correctness() { setup veth send_"${proto}" set || return ${KSELFTEST_SKIP} range_size=1 for i in $(seq "${start}" $((start + count))); do end=$((start + range_size)) # Avoid negative or zero-sized port ranges if [ $((end / 65534)) -gt $((start / 65534)) ]; then start=${end} end=$((end + 1)) fi srcstart=$((start + src_delta)) srcend=$((end + src_delta)) add "$(format)" || return 1 for j in $(seq ${start} $((range_size / 2 + 1)) ${end}); do send_match "${j}" $((j + src_delta)) || return 1 done send_nomatch $((end + 1)) $((end + 1 + src_delta)) || return 1 # Delete elements now and then if [ $((i % 3)) -eq 0 ]; then del "$(format)" || return 1 for j in $(seq ${start} \ $((range_size / 2 + 1)) ${end}); do send_nomatch "${j}" $((j + src_delta)) \ || return 1 done fi range_size=$((range_size + 1)) start=$((end + range_size)) done } # Concurrency test template: # - add all the elements # - start a thread for each physical thread that: # - adds all the elements # - flushes the set # - adds all the elements # - flushes the entire ruleset # - adds the set back # - adds all the elements # - delete all the elements test_concurrency() { proto=${flood_proto} tools=${flood_tools} chain_spec=${flood_spec} setup veth flood_"${proto}" set || return ${KSELFTEST_SKIP} range_size=1 cstart=${start} flood_pids= for i in $(seq ${start} $((start + count))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) add "$(format)" || return 1 flood "${i}" $((i + src_delta)) & flood_pids="${flood_pids} $!" range_size=$((range_size + 1)) start=$((end + range_size)) done sleep 10 pids= for c in $(seq 1 "$(nproc)"); do ( for r in $(seq 1 "${race_repeat}"); do range_size=1 # $start needs to be local to this subshell # shellcheck disable=SC2030 start=${cstart} for i in $(seq ${start} $((start + count))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) add "$(format)" 2>/dev/null range_size=$((range_size + 1)) start=$((end + range_size)) done nft flush inet filter test 2>/dev/null range_size=1 start=${cstart} for i in $(seq ${start} $((start + count))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) add "$(format)" 2>/dev/null range_size=$((range_size + 1)) start=$((end + range_size)) done nft flush ruleset setup set 2>/dev/null range_size=1 start=${cstart} for i in $(seq ${start} $((start + count))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) add "$(format)" 2>/dev/null range_size=$((range_size + 1)) start=$((end + range_size)) done range_size=1 start=${cstart} for i in $(seq ${start} $((start + count))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) del "$(format)" 2>/dev/null range_size=$((range_size + 1)) start=$((end + range_size)) done done ) & pids="${pids} $!" done # shellcheck disable=SC2046,SC2086 # word splitting wanted here wait $(for pid in ${pids}; do echo ${pid}; done) # shellcheck disable=SC2046,SC2086 kill $(for pid in ${flood_pids}; do echo ${pid}; done) 2>/dev/null # shellcheck disable=SC2046,SC2086 wait $(for pid in ${flood_pids}; do echo ${pid}; done) 2>/dev/null return 0 } # Timeout test template: # - add all the elements with 3s timeout while checking that packets match # - wait 3s after the last insertion, check that packets don't match any entry test_timeout() { setup veth send_"${proto}" set || return ${KSELFTEST_SKIP} timeout=3 range_size=1 for i in $(seq "${start}" $((start + count))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) add "$(format)" || return 1 for j in $(seq ${start} $((range_size / 2 + 1)) ${end}); do send_match "${j}" $((j + src_delta)) || return 1 done range_size=$((range_size + 1)) start=$((end + range_size)) done sleep 3 for i in $(seq ${start} $((start + count))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) for j in $(seq ${start} $((range_size / 2 + 1)) ${end}); do send_nomatch "${j}" $((j + src_delta)) || return 1 done range_size=$((range_size + 1)) start=$((end + range_size)) done } # Performance test template: # - add concatenated ranged entries # - add non-ranged concatenated entries (for hash set matching rate baseline) # - add ranged entries with first field only (for rbhash baseline) # - start pktgen injection directly on device rx path of this namespace # - measure drop only rate, hash and rbtree baselines, then matching rate test_performance() { chain_spec=${perf_spec} dst="${perf_dst}" src="${perf_src}" setup veth perf set || return ${KSELFTEST_SKIP} first=${start} range_size=1 for set in test norange noconcat; do start=${first} for i in $(seq ${start} $((start + perf_entries))); do end=$((start + range_size)) srcstart=$((start + src_delta)) srcend=$((end + src_delta)) if [ $((end / 65534)) -gt $((start / 65534)) ]; then start=${end} end=$((end + 1)) elif [ ${start} -eq ${end} ]; then end=$((start + 1)) fi add_perf ${set} start=$((end + range_size)) done > "${tmp}" nft -f "${tmp}" done perf $((end - 1)) ${srcstart} sleep 2 nft add rule netdev perf test counter name \"test\" drop nft reset counter netdev perf test >/dev/null 2>&1 sleep "${perf_duration}" pps="$(printf %10s $(($(count_perf_packets) / perf_duration)))" info " baseline (drop from netdev hook): ${pps}pps" handle="$(nft -a list chain netdev perf test | grep counter)" handle="${handle##* }" nft delete rule netdev perf test handle "${handle}" nft add rule "netdev perf test ${chain_spec} @norange \ counter name \"test\" drop" nft reset counter netdev perf test >/dev/null 2>&1 sleep "${perf_duration}" pps="$(printf %10s $(($(count_perf_packets) / perf_duration)))" info " baseline hash (non-ranged entries): ${pps}pps" handle="$(nft -a list chain netdev perf test | grep counter)" handle="${handle##* }" nft delete rule netdev perf test handle "${handle}" nft add rule "netdev perf test ${chain_spec%%. *} @noconcat \ counter name \"test\" drop" nft reset counter netdev perf test >/dev/null 2>&1 sleep "${perf_duration}" pps="$(printf %10s $(($(count_perf_packets) / perf_duration)))" info " baseline rbtree (match on first field only): ${pps}pps" handle="$(nft -a list chain netdev perf test | grep counter)" handle="${handle##* }" nft delete rule netdev perf test handle "${handle}" nft add rule "netdev perf test ${chain_spec} @test \ counter name \"test\" drop" nft reset counter netdev perf test >/dev/null 2>&1 sleep "${perf_duration}" pps="$(printf %10s $(($(count_perf_packets) / perf_duration)))" p5="$(printf %5s "${perf_entries}")" info " set with ${p5} full, ranged entries: ${pps}pps" kill "${perf_pid}" } test_bug_flush_remove_add() { set_cmd='{ set s { type ipv4_addr . inet_service; flags interval; }; }' elem1='{ 10.0.0.1 . 22-25, 10.0.0.1 . 10-20 }' elem2='{ 10.0.0.1 . 10-20, 10.0.0.1 . 22-25 }' for i in `seq 1 100`; do nft add table t ${set_cmd} || return ${KSELFTEST_SKIP} nft add element t s ${elem1} 2>/dev/null || return 1 nft flush set t s 2>/dev/null || return 1 nft add element t s ${elem2} 2>/dev/null || return 1 done nft flush ruleset } test_reported_issues() { eval test_bug_"${subtest}" } # Run everything in a separate network namespace [ "${1}" != "run" ] && { unshare -n "${0}" run; exit $?; } tmp="$(mktemp)" trap cleanup EXIT # Entry point for test runs passed=0 for name in ${TESTS}; do printf "TEST: %s\n" "$(echo ${name} | tr '_' ' ')" if [ "${name}" = "reported_issues" ]; then SUBTESTS="${BUGS}" else SUBTESTS="${TYPES}" fi for subtest in ${SUBTESTS}; do eval desc=\$TYPE_"${subtest}" IFS=' ' for __line in ${desc}; do # shellcheck disable=SC2086 eval ${__line%% *}=\"${__line##* }\"; done IFS=' ' if [ "${name}" = "concurrency" ] && \ [ "${race_repeat}" = "0" ]; then continue fi if [ "${name}" = "performance" ] && \ [ "${perf_duration}" = "0" ]; then continue fi printf " %-60s " "${display}" eval test_"${name}" ret=$? if [ $ret -eq 0 ]; then printf "[ OK ]\n" info_flush passed=$((passed + 1)) elif [ $ret -eq 1 ]; then printf "[FAIL]\n" err_flush exit 1 elif [ $ret -eq ${KSELFTEST_SKIP} ]; then printf "[SKIP]\n" err_flush fi done done [ ${passed} -eq 0 ] && exit ${KSELFTEST_SKIP}
{ "pile_set_name": "Github" }
GENOME ANNOUNCEMENT {#h0.0} =================== *Bacillus* is one of the most extensively studied microorganisms among plant growth-promoting rhizobacteria (PGPR). Owing to the production of various antibiotics and the formation of stress-resistant endospores, *Bacillus* strains are more amenable to the formulation of commercial products and have been widely used as biocontrol agents ([@B1]). Induced systemic resistance (ISR) elicited by *Bacillus* strains has been recently recognized as one of the key mechanisms by which crops can protect themselves against phytopathogens with the aid of PGPR ([@B2], [@B3]). The four *Bacillus* strains sequenced in this study, all purchased from the Korean Collection for Type Cultures (KCTC), were chosen based on the partial results of a systematic screening approach used to search for plant probiotic bacteria. The three type strains, *Bacillus endophyticus* KCTC 13922 ([@B4]), "*Bacillus gaemokensis*" KCTC 13318 ([@B5]), and *Bacillus trypoxylicola* KCTC 13244 ([@B6]), were shown to promote plant growth (*Arabidopsis thaliana*) by volatiles, whereas *Bacillus* sp. strain KCTC 13219 (=b04i-3) triggers ISR in *A. thaliana* against *Pectobacterium carotovorum* (our unpublished data). The type strains *B. gaemokensis* JCM 15801 and *B. trypoxylicola* NRBC 102646, obtained from the Japan Collection of Microorganisms (JCM) and the NITE Biological Resource Center (NBRC), respectively, were sequenced by other research groups and made available through accession numbers JOTM00000000 ([@B7]) and BCWA00000000 while this paper was being prepared. Genome sequencing was carried out using the Illumina HiSeq 2000 platform at the National Instrument Center for Environmental Management at Seoul National University (Seoul, Republic of Korea). One hundred one-nucleotide paired reads produced from a library with a fragment size of ca. 500 bp were pretreated using Trimmomatic version 0.32 ([@B8]), and 600-Mb subsamples were randomly extracted from them. After k-mer-based error correction using SGA version 0.10.13 ([@B9]), *de novo* genome assembly was conducted using the A5-miseq pipeline ([@B10]). The assembled sequences were annotated using the RAST server ([@B11]) and Prokaryotic Genome Annotation Pipeline from the NCBI. Biosynthetic genes for secondary metabolites were predicted using antiSMASH 3.0 ([@B12]). The list of strains used in this study, the sequencing and assembly statistics, and the accession numbers are all provided in [Table 1](#tab1){ref-type="table"}. Compared with the previously published records, the genome sequences of KCTC 13318 and KCTC 13244 obtained through this study were shown to be superior in terms of the assembly statistics. KCTC 13219, isolated from Pu-erh tea, was tentatively named "*Bacillus nitroreducens*" by the submitter but did not lead to a proposal for a novel species (J. S. Lee, personal communication). Very recently, the species *Bacillus nitroreducens* sp. nov. was proposed for another unrelated bacterium ([@B13]). Phylogenetic analysis using the 16S rRNA sequence revealed that KCTC 13219 should be classified into the genus *Lysinibacillus* (99.93% similarity with "*Lysinibacillus fluoroglycofernilyticus*" cmg86^T^). The genome sequencing results will provide insight into the genomic basis of the versatile *Bacillus* strains and the interspecies interaction between soil bacteria and plants, which can lead to eco-friendly agricultural applications. Additional information is available at <http://genoglobe.kr/kribb/four_bacillus_strains_2016>. Nucleotide sequence accession numbers. {#s1} -------------------------------------- These whole-genome shotgun projects have been deposited at DDBJ/EMBL/GenBank, and the accession numbers for all four genome sequences are listed in [Table 1](#tab1){ref-type="table"}. ###### Summary of genome sequencing results *Bacillus* species Draft coverage (×)[^a^](#ngtab1.1){ref-type="table-fn"} Genome size (bp) No. of contigs G+C content (%) No. of secondary metabolite biosynthesis gene clusters[^b^](#ngtab1.2){ref-type="table-fn"} Accession no. ---------------------------------- --------------------------------------------------------- ------------------ ---------------- ----------------- --------------------------------------------------------------------------------------------- ------------------------------------------------------------------ *B. endophyticus* KCTC 13922^T^ 741 5,121,484 42 36.50 11 [LTAP00000000](http://www.ncbi.nlm.nih.gov/nuccore/LTAP00000000) *B. gaemokensis* KCTC 13318^T^ 878 5,616,250 70 35.54 18 [LTAQ00000000](http://www.ncbi.nlm.nih.gov/nuccore/LTAQ00000000) *B. trypoxylicola* KCTC 13244^T^ 9,024 4,347,941 40 35.73 6 [LTAO00000000](http://www.ncbi.nlm.nih.gov/nuccore/LTAO00000000) *Bacillus* sp. KCTC 13219 1,244 3,853,058 37 38.31 3 [LUFJ00000000](http://www.ncbi.nlm.nih.gov/nuccore/LUFJ00000000) Subsamples of 600 Mb were randomly taken from pretreated reads and assembled. Predicted by antiSMASH 3.0. **Citation** Jeong H, Park S-H, Choi S-K. 2016. Draft genome sequences of four plant probiotic *Bacillus* strains. Genome Announc 4(3):e00358-16. doi:10.1128/genomeA.00358-16 We would like to thank Jung-Sook Lee (KCTC) for her helpful discussions. This work was supported by the Industrial Source Technology Development Program of the Ministry of Trade, Industry, and Energy (grant 10044909), and by the KRIBB Research Initiative Program, Ministry of Science, ICT and Future Planning, Republic of Korea.
{ "pile_set_name": "PubMed Central" }
A novel Gfer-Drp1 link in preserving mitochondrial dynamics and function in pluripotent stem cells. Mitochondria, the dynamic energy powerhouses of the cell, have vital roles in a multitude of cellular processes including differentiation and cell survival. Tight regulation of mitochondrial dynamics, integrity and function is indispensible for preservation of homeostasis in all cells, including pluripotent stem cells. The ability to proliferate and self-renew indefinitely bestows the pluripotent embryonic stem cells (ESCs) with immense curative potential. Mechanisms that preserve mitochondrial well-being, and therefore maintain "stemness," are vital in realizing the full potential of ESCs in therapeutic regenerative medicine. However, virtually nothing is known regarding the regulation of mitochondrial dynamics and function and the relationship thereof to overall cell fate and function in pluripotent ESCs or other somatic stem cells. Using loss- and gain-of-function approaches, we show that growth factor erv1-like (Gfer) plays an essential pro-survival role in the maintenance of murine ESC pluripotency by preserving the structural and functional integrity of their mitochondria, through modulation of the key mitochondrial fission factor Drp1.
{ "pile_set_name": "PubMed Abstracts" }
Humans, for better or for worse, love to swim with sea creatures: be it a green sea turtle in the waters of Kauai, a whale shark in the Maldives, or a chipper little dolphin in a bay (or for some reason, still, a tank). We humbly admit to being out of our element—gawky land-lubbers who want nothing more than to snorkel, scuba, or swim with these majestic beings on their home turf. But we've been greedy, especially in Hawaii, where federal regulators are stepping up on behalf of a stressed-out dolphin population. The National Marine Fisheries Service says spinner dolphins—the ones typically showcased during swim-with-dolphin "experiences of a lifetime"—face "chronic disturbances" due to an uptick in tourist activities. Spinner dolphins are some of the most common in Hawaii's sheltered bays, says NOAA Fisheries, feeding offshore at night and resting along the coastlines during the day. However, with all the daytime outings for our entertainment, dolphins aren't getting enough sleep. And all that charming spinning, leaping, tail slapping, and rapid-fire swimming? It may be a sign that they're stressed out, acting erratically because of disturbances and elevated heart rates. NOAA Fisheries has proposed a new rule that would prohibit swimming with Hawaiian spinner dolphins, and keep people from coming within 50 yards (be it by boat or otherwise) of the mammals near the shore—technically, within "two nautical miles from shore of the Main Hawaiian Islands and in designated waters between Maui, Lanai, and Kahoolawe where spinner dolphins are found throughout the day." This isn't happening immediately; there will be a public debate period, and any prohibitions would go into effect sometime closer to September 2017. But if you ask the dolphins, they might appreciate a little extra sleep, starting now.
{ "pile_set_name": "Pile-CC" }
Q: Hibernate: Multiple select queries made by Hibernate for Fetch mode Eager I have just started using Hibernate in my application. Also I'm using JPA repository for using custom query. I have multiple entities which have relationships between them. I have used Fetch mode as 'EAGER' on the join column and also using Cache. I observed that Hibernate is making multiple select queries to fetch each entity and not doing it in a single query. Below is an entity: @Entity @Table(name = "entity_a") public class EntityA implements Serializable { @Id @GeneratedValue(strategy = GenerationType.AUTO) private Long id; ... @OneToMany(fetch = FetchType.EAGER, mappedBy = "entity_a") @JsonIgnore @Cache(usage = CacheConcurrencyStrategy.NONSTRICT_READ_WRITE) private Set<EntityB> entityB = new HashSet<>(); I'm fetching my entity as below, using JPA custom queries: EntityA entityA = entityARepository.findOneById(id); Hibernate issues a select query for the above statement. Whenever I do a entityA.getEntityB() it issues another select statement on EntityB. How to avoid this. How can I get both entities in a single select using Hibernate? A: Does EntityB contain a field named entity_a? The name should be exactly as declared in the mappedBy attribute. In general, JPA providers are required to honor the FetchType.EAGER mode. This seems to be a misconfiguration issue. Even so, while the JPA provider is required to load eager associations eagerly, there is no guarantee it will be done in a single query. There is a Hibernate-specific annotation that can be used as a hint: @Fetch(FetchMode.JOIN). Try it out and see if it works.
{ "pile_set_name": "StackExchange" }
Elongated oligomers assemble into mammalian PrP amyloid fibrils. In prion diseases, the mammalian prion protein PrP is converted from a monomeric, mainly alpha-helical state into beta-rich amyloid fibrils. To examine the structure of the misfolded state, amyloid fibrils were grown from a beta form of recombinant mouse PrP (residues 91-231). The beta-PrP precursors assembled slowly into amyloid fibrils with an overall helical twist. The fibrils exhibit immunological reactivity similar to that of ex vivo PrP Sc. Using electron microscopy and image processing, we obtained three-dimensional density maps of two forms of PrP fibrils with slightly different twists. They reveal two intertwined protofilaments with a subunit repeat of approximately 60 A. The repeating unit along each protofilament can be accounted for by elongated oligomers of PrP, suggesting a hierarchical assembly mechanism for the fibrils. The structure reveals flexible crossbridges between the two protofilaments, and subunit contacts along the protofilaments that are likely to reflect specific features of the PrP sequence, in addition to the generic, cross-beta amyloid fold.
{ "pile_set_name": "PubMed Abstracts" }
--- abstract: 'The paper presents a systematic strategy for implementing Hilbert’s space filling curve for use in online exploration tasks and addresses its application in scenarios wherein the space to be searched obstacles (or holes) whose locations are not known a priori. Using the self-similarity and locality preserving properties of Hilbert’s space filling curve, a set of evasive maneuvers are prescribed and characterized for online implementation. Application of these maneuvers in the case of non-uniform coverage of spaces and for obstacles of varying sizes is also presented. The results are validated with representative simulations demonstrating the deployment of the approach.' author: - 'Siddharth H. Nair$^{1}$, Arpita Sinha$^{2}$ and Leena Vachhani$^{3}$[^1][^2][^3]' bibliography: - 'IEEEabrv.bib' - 'IEEEexample.bib' title: '**Hilbert’s Space-filling Curve for Regions with Holes** ' --- INTRODUCTION ============ Investigations on space filling curves began when George Cantor proved that there exists a bijective map between any two finite-dimensional manifolds. The continuity of such maps, however, was a mystery until E. Netto demonstrated that a bijective map between two finite-dimensional manifolds of different dimensions is necessarily discontinuous. All was not lost though- in 1890, Peano relaxed the bijectivity condition of such maps and discovered a continuous surjective mapping from the unit interval $\mathbf{I}=[0,1]$ to the unit square $\mathbf{Q}=[0,1]^{2}$. This paved the way to designing continuous maps to fill a higher dimensional space from a lower dimensional space[@c10].\ Space filling curves are primarily used in applications that require visiting various regions in a space. Numerous works pertaining to use of various space filling curves for optimization exist in literature ([@c1; @c2; @c3]). The advantage of using Hilbert curve lies within the very nature of the map. The images of points in the domain of the map neighbour each other thereby lending a sense of “anticipation" during implementation. This inspires the use of the curve for robotic applications. In [@c4], a robot motion planning problem is introduced and uses the Hilbert space-filling curve to uniformly cover a space with a single agent or multiple agents coordinating with each other. In [@c5], space filling curves are used to decompose an arbitrary shape using space filling curves and thus use the technique for planning a path for a tool to machine the desired shape. In [@c6], the strategy presented in [@c4] is implemented using an aerial robot for search operations and also uses Moore’s space filling curve (a modification of the Hilbert curve). In [@c7], a tree is used to arrange nodes for uniformly covering the unit square. The nodes are numbered according to that of the Hilbert curve. In [@c8], a new approach is proposed to search this coverage tree to explore a space non-uniformly via an aerial agent by using the self-similarity of the Hilbert curve (which is a fractal curve) to define various levels for the tree.\ Literature pertaining to exploration for robots using space filling curves in spaces with holes/obstacles is sparse. A rigorous solution to search a space with holes is offered in [@c9] with applications in sensor networks by mapping any search domain canonically to a torus and design space-filling trajectories on this torus. However, the method requires knowledge of the structure of the search domain beforehand and involves complex computations. An investigation of a technique that uses feedback and traces Hilbert’s curve would support sensor based autonomous strategies. Therefore, this paper addresses tracing the Hilbert curve when holes of fixed size in the space are present, but their locations are sensed online. A modification of the map of the Hilbert’s curve is also presented for robotic exploration applications. It shall be seen that a simplified approach can be derived by examining the properties of the Hilbert curve and its map. Furthermore, this is extended to the case of non-uniform coverage of spaces along the lines of [@c8] and for obstacles of varying sizes.\ The rest of the paper is divided into five sections. Section \[S2\] introduces the map that defines the Hilbert curve. Section \[S3\] highlights the underlying properties of the Hilbert curve and addresses the obstacle avoidance problem while Section \[S4\] extends the formulation for non-uniform coverage of spaces. Section \[S5\] presents an algorithm for online implementation of the prescribed strategy with simulation results followed by concluding remarks in Section \[S6\]. Preliminary on Hilbert’s Space-filling Curve {#S2} ============================================ Hilbert [@c10] was the first to propose a geometric generation principle for the construction of a space filling curve which can be encapsulated by the following procedure: - The unit interval $\mathbf{I}$ is mapped continuously onto the unit-square $\mathbf{Q}$. $\mathbf{I}$ is partitioned into four equal sub-intervals and $\mathbf{Q}$ is partitioned into four congruent sub-squares, so as to map the same continuously onto one of the sub-squares. This is repeated for the all the sub-intervals and sub-squares.\ - When repeating this procedure ad infinitum, the sub-squares are arranged in such a way that adjacent sub-squares correspond to adjacent sub-intervals hence preserving the overall continuity of the mapping. Hence, the $nth$ order Hilbert curve divides the space $\mathbf{Q}$ and interval $\mathbf{I}$ into $4^{n}$ subsets. Now, the map $f_{h}: \mathbf{I} \rightarrow \mathbf{Q}$ is defined such that every $t\in \mathbf{I}$ corresponds to a unique sequence of nested closed squares that shrink into a point of $\mathbf{Q}$, the image $f_{h}(t)$. Let us represent $t \in \mathbf{I}$ in quaternary form as $ t= 0._{4}q_{1}q_{2}q_{3}q_{4}....= \frac{q_{1}}{4} + \frac{q_{2}}{4^{2}} + \frac{q_{3}}{4^{3}} +...$ where $q_i=\{0,1,2,3\}$. The map $f_{h}: \mathbf{I} \rightarrow \mathbf{Q}$ is called the Hilbert space-filling curve and is defined as a composition of transformations as $ f_{h}(t) = \lim_{n\rightarrow \infty} T_{q_{1}}T_{q_{2}}..T_{q_{n}}\mathbf{Q}$ where the transformations $T_{q_i}$ acting on $\mathbf{Q}$ are defined as $$\begin{aligned} T_{0}\left(\begin{bmatrix} x\\y \end{bmatrix}\right)&= \dfrac{1}{2}\underbrace{\begin{bmatrix} 0 & 1\\1 & 0 \end{bmatrix}}_{H_0} \begin{bmatrix} x\\y \end{bmatrix} + \dfrac{1}{2}\underbrace{\begin{bmatrix}0\\0\end{bmatrix}}_{h_0}\\ T_{1}\left(\begin{bmatrix} x\\y \end{bmatrix}\right)&= \dfrac{1}{2}\underbrace{\begin{bmatrix} 1 & 0\\0 & 1 \end{bmatrix}}_{H_1} \begin{bmatrix} x\\y \end{bmatrix} + \dfrac{1}{2}\underbrace{\begin{bmatrix}0\\1\end{bmatrix}}_{h_1}\\ T_{2}\left(\begin{bmatrix} x\\y \end{bmatrix}\right)&= \dfrac{1}{2}\underbrace{\begin{bmatrix} 1 & 0\\0 & 1 \end{bmatrix}}_{H_2} \begin{bmatrix} x\\y \end{bmatrix} + \dfrac{1}{2}\underbrace{\begin{bmatrix}1\\1\end{bmatrix}}_{h_2}\\ T_{3}\left(\begin{bmatrix} x\\y \end{bmatrix}\right)&= \dfrac{1}{2}\underbrace{\begin{bmatrix} 0 & -1\\-1 & 0 \end{bmatrix}}_{H_3} \begin{bmatrix} x\\y \end{bmatrix} + \dfrac{1}{2}\underbrace{\begin{bmatrix}2\\1\end{bmatrix}}_{h_3}\\\end{aligned}$$ For example, the image of the point $t=0._{4}203$ lies in the $(3+1)th$ sub-square, of the $(0+1)th$ sub-square, of the $(2+1)th$ sub-square of $\mathbf{Q}$ (see Figure \[ex1\]). ![$t=0._{4}203$ mapped into the unit square via Hilbert’s map[]{data-label="ex1"}](fig/eg) Also note that any finite quaternary represents the starting of an interval and so, $$\begin{aligned} \label{mapold} f(0._{4}q_{1}q_{2}..q_{n})&=T_{q_{1}}..T_{q_{n}}(\lim_{p\rightarrow\infty}T^p_{0}(\mathbf{Q}))\nonumber\\&=T_{q_{1}}..T_{q_{n}}\begin{bmatrix}0\\0\end{bmatrix}\end{aligned}$$ Defining $e_{0j}= {No.\ of\ times\ T_{0}\ occurs\ before\ T_{q_{j}}\ (mod 2)}$ and $e_{3j}= {No.\ of\ times\ T_{3}\ occurs\ before\ T_{q_{j}}\ (mod 2)}$, Equation simplifies (see [@c10]) to $$f(0._{4}q_{1}q_{2}..q_{n})= \sum_{j=1}^{n}\frac{1}{2^j}H_{0}^{e_{0j}}H_{3}^{e_{3j}}h_{q_{j}}$$ The implementation of a Hilbert curve is done via its approximating polygon which is obtained by mapping $4^n$ nodes of the form $ 0,\frac{1}{4^n},\frac{2}{4^n},...\frac{4^n-1}{4^n}$ to $\mathbf{Q}$ and joining the images using straight lines. Details of this analysis can be found in [@c10]. An implementation of a second order Hilbert curve is shown in Figure \[fig:old\]. [.25]{} ![Figures \[fig:old\] and \[fig:new\] are Hilbert’s curves obtained using (\[mapold\]) and (\[mapnew\]) respectively.](fig/HilbertOld "fig:") [.25]{} ![Figures \[fig:old\] and \[fig:new\] are Hilbert’s curves obtained using (\[mapold\]) and (\[mapnew\]) respectively.](fig/HilbertNew "fig:") For our application, we shift the nodes to the centres of the sub-squares and thus modify the map slightly as follows. $$\begin{aligned} \label{mapnew} f(0._{4}q_{1}q_{2}..q_{n})&=T_{q_{1}}T_{q_{2}}..F_{q_{n}}=\frac{1}{2}H_{q_{1}}..H_{q_{n-1}}F_{q_{n}}+\sum_{j=1}^{n-1}\frac{1}{2^j}H_{0}^{e_{0j}}H_{3}^{e_{3j}}h_{q_{j}}\end{aligned}$$ where $F_{0}=\begin{bmatrix} \frac{1}{4}\\\frac{1}{4} \end{bmatrix}$, $F_{1}=\begin{bmatrix} \frac{1}{4}\\\frac{3}{4} \end{bmatrix}$, $F_{2}=\begin{bmatrix} \frac{3}{4}\\\frac{3}{4} \end{bmatrix}$ and $F_{3}=\begin{bmatrix} \frac{3}{4}\\\frac{1}{4} \end{bmatrix}$.\ \ An implementation of the modified map is shown in Figure \[fig:new\]. This modification is motivated for exploration tasks where it would make sense to identify each node (sub-square) in the search space by its centre and not by its edges which could be shared with other nodes.\ This implementation of the Hilbert’s curve is restricted to all euclidean spaces that are homeomorphic to a unit square (polygons, circles etc.). The nodes obtained for the unit square can be mapped back into the actual space via the homeomorphism ([@c13]). Extension of Hilbert’s Space-filling curve to domains with blocked nodes {#S3} ======================================================================== Consider a problem wherein a searching agent traverses the space $\mathbf{Q}$ along the nodes of the $nth$ order Hilbert curve and there is a single “obstacle” node of the same resolution. The presence of the obstacle leaves that particular node unaccessible or blocked. The space is “unknown” in the sense that the searching agent starts from a corner of the search space and only the boundary of the search space is known. It is also assumed that information about the occupancy of the neighbouring nodes (the sub-squares touching the sub-square occupied by the agent) is available to the agent. Before introducing the obstacle avoidance strategy, some definitions and properties of the Hilbert curve are presented. The nodes that enter or leave one of the $(n-1)th$ order Hilbert curves in the $nth$ order Hilbert curve are defined as corner nodes of the $nth$ order Hilbert curve. \[def\] ![Corner points for a third order Hilbert curve](fig/Corner) The corner points of a Hilbert curve of order $n$ are given by $t=0._{4}q_{1}\underbrace{00...0}_{n-1\ 0s}$ or $t=0._{4}q_{1}\underbrace{33...3}_{n-1\ 3s}$.\ *Proof* By definition, intervals of the form $[\frac{q_{1}}{4},\frac{q_{1}+1}{4}]$ map into one of the four $(n-1)th$ order Hilbert curves in the $nth$ order Hilbert curve. Therefore, the corner node that enters the $(n-1)th$ order Hilbert curve is simply the first of the $4^{n-1}$ nodes within the same. Hence, it is given by $t=0._{4}q_{1}00...0$.\ Similarly, the corner node that leaves the $(n-1)th$ order Hilbert curve is the last node of the same and is given by $t=0._{4}q_{1}33...3$.$\blacksquare$\ \ Note that each lower order Hilbert curve within the $nth$ order Hilbert curve also contains corner nodes defined in a similar fashion. In general, each corner node (of every order) is given by $t=0._{4}q_{1}q_{2}..q_{n}$ where $q_{n}=0$ or $3$. Hence, all nodes that enter or leave the first order Hilbert curve are the corner nodes. Every other node lies between two corner nodes and due to the locality preserving property of the Hilbert curve, lie adjacent to each other. This is an important consequence which helps in devising a simple strategy to avoid an obstacle that is placed on a non-corner node as shown in Figure \[nc\] which depicts a first order Hilbert curve. In essence, the locality preserving property ([@c12]) of the Hilbert curve helps us to skip the blocked node. However if the blocked node is a corner node, it may not be possible to simply skip it because the sub-square containing the next node may not intersect the sub-square containing the node preceding the obstacle node. Figure \[exx\] illustrates the point in the case of a second order Hilbert curve where simply skipping the blocked node is not possible without disturbing the sequence of nodes dictated by map for the Hilbert curve. [.25]{} ![](fig/noncorner "fig:") [.25]{} ![](fig/inter "fig:") Now, we characterize the factors that come into play when deciding on a maneuver to avoid an obstacle node when placed on a corner node for a Hilbert curve of any order. Additionally, we also assume that the first node and the last node of the $nth$ order Hilbert curve are unblocked.\ For the $nth$ order Hilbert curve, let $e_{n}= n\ (mod\ 2)$ and the entering and exiting corner nodes be given by $t=0._{4}(q_{1}+1)00...0$ and $t=0._{4}q_{1}33...3$ respectively where $q_{1}=0,1,2$. Then, the required evasive maneuver to avoid an obstacle on a corner node depends solely on the type of corner node (i.e, entering node or exiting node).\ *Proof* Consider the corner node which leaves the $(q_{1}+1)$th sub-square of the $n$th order Hilbert curve. It is denoted by $t=0._{4}q_{1}33...3$. The succeeding and preceding nodes are $t_{1}=0._{4}(q_{1}+1)00...0$ and $t_{2}=0._{4}q_{1}33...2$. These points are mapped into $\mathbf{Q}$ as follows. $$\begin{aligned} f_{h}(t_{1})=&\frac{1}{2^{n-1}}H_{q_{1}+1}H_{0}H_{0}...F_{0}+\frac{1}{2}h_{q_{1}+1}+\\ &\frac{1}{2^{2}}H_{q_{1}+1}(h_{0}+\frac{1}{2}H_{0}h_{0}+\frac{1}{2^{2}}h_{0}+..\frac{1}{2^{n-1}}H_{0}^{1-e_{n}}h_{0})\end{aligned}$$ Since $h_{0}=\begin{bmatrix} 0\\0 \end{bmatrix}$ and $F_{0}=\begin{bmatrix}\frac{1}{4}\\\frac{1}{4}\end{bmatrix}$, we have $$f_{h}(t_{1})=\frac{1}{2^{n-1}}H_{q_{1}+1}F_{0}+\frac{1}{2}h_{q_{1}+1}$$ Now, $$\begin{aligned} f_{h}(t_{2})=&\frac{1}{2^{n-1}}H_{q_{1}}H_{3}H_{3}...F_{2}+\frac{1}{2}h_{q_{1}}+\\ &\frac{1}{2^{2}}H_{q_{1}}(h_{3}+\frac{1}{2}H_{3}h_{3}+\frac{1}{2^{2}}h_{3}+..\frac{1}{2^{n-1}}H_{3}^{1-e_{n}}h_{3})\end{aligned}$$ Again, since $H_{3}=-H_{0}$ and $F_{2}=\begin{bmatrix}\frac{3}{4}\\\frac{3}{4}\end{bmatrix}$, we have $$\begin{aligned} f_{h}&(t_{2})=-\frac{1}{2^{n-1}}H_{q_{1}}F_{2}+\frac{1}{2}h_{q_{1}}+\\ &\frac{1}{2^{2}}H_{q_{1}}(h_{3}-\frac{1}{2}H_{0}h_{3}+\frac{1}{2^{2}}h_{3}+..\frac{1}{2^{n-1}}(-H_{0})^{1-e_{n}}h_{3})\end{aligned}$$ $$\begin{aligned} \Rightarrow f_{h}&(t_{2})=-\frac{1}{2^{n-1}}H_{q_{1}}F_{2}+\frac{1}{2}h_{q_{1}}+\\ &\frac{1}{2^{2}}H_{q_{1}}(h_{3}-\frac{1}{2}H_{0}h_{3}+\frac{1}{2^{2}}h_{3}+..\frac{1}{2^{n-1}}(-H_{0})^{1-e_{n}}h_{3}) \\\end{aligned}$$ The evasive maneuver to be chosen depends on the distance between the nodes preceding and succeeding the obstacle node. Hence, we find $f_h(t_{1})-f_h(t_{2})$. $$\begin{aligned} f_h(t_{1})-&f_h(t_{2})=\frac{1}{2^{n-1}}(H_{q_{1}+1}F_{0}+H_{q_{1}}F_{2})+\frac{1}{2}(h_{q_{1}+1}-h_{q_{1}})\\ &-\frac{1}{2^2}H_{q_{1}}\begin{bmatrix} 2-\frac{1}{2}+\frac{1}{2}-\frac{1}{4}+\frac{1}{4}..-\frac{1}{2^{n-3}}(1-e_{n})\\1-1+\frac{1}{4}-\frac{1}{4}+\frac{1}{8}-\frac{1}{8}-\frac{1}{2^{n-2}}e_{n} \end{bmatrix}\end{aligned}$$ Defining $e_{q_{1}}= q_{1}\ (mod 2)$, $$\begin{aligned} \Rightarrow f_h(t_{1})-f_h(t_{2})=&\begin{bmatrix} (\frac{1}{2^{n}})^{floor(\frac{q_{1}}{2})}+\frac{e_{q_{1}}}{2}\\\frac{1}{2^{n}})^{floor(\frac{q_{1}}{2})}+\frac{1-e_{q_{1}}}{2} \end{bmatrix}\\ &-\frac{1}{2^2}H_{q_{1}}\begin{bmatrix} 2-\frac{1}{2^{n-3}}(1-e_{n})\\ -\frac{1}{2^{n-2}}e_{n}\end{bmatrix}\end{aligned}$$ Noting the fact that term $\frac{1}{2^{n}}$ is merely a scaling factor, the distant between the nodes, $||f_h(t_{1})-f_h(t_{2})||_{2}$, is primarily dependent on $q_{1}$ and $e_{n}$. A similar analysis for the second type of corner node(entering a Hilbert curve of the same order) yields a similar result.$\blacksquare$\ \ The same result can be obtained for lower order curves within the given Hilbert curve because of its self-similarity property. Consider a general corner node $t=0._{4}q_{1}q_{2}..q_{p}mmm..m$ where $m$ is either 0 or 3. This node enters or exits an $(n-p)th$ order Hilbert curve and so, the “effective” order of the Hilbert curve is $n_{eff}=n-p+1$. So, to decide on an evasive maneuver, we obtain $e_{n_{eff}},\ q_{p},$ and $m$ (which is known to the agent due to position feedback). Table \[tabev\] depicts the various evasive maneuvers that can be employed for various scenarios to avoid an obstacle placed on a corner node. By identifying the dependancy of the maneuver on $e_{n},\ q_{p},$ and $m$, the various scenarios can be identified canonically and hence, presents the possibility of designing strategies for evasion that can be used online. Considering the assumption that the first node and the last node of the $nth$ order Hilbert curve are unblocked, the number of combinations of $(e_{n},q_p,m)$ is given by $$\underbrace{2}_{e_n}\times \underbrace{4}_{q_p} \times \underbrace{2}_{m} - \underbrace{4}_{Start\ and\ end\ points}=12$$ The various combinations are categorized together based on the distance between the current node and the node succeeding the obstacle. The evasive strategies are presented in two forms : - in a discrete setting wherein the strategy prescribes the sequence of nodes to be traversed to evade the obstacle and not disturb the sequence of nodes as prescribed by Hilbert’s map. - in a continuous setting wherein the piecewise linear map that defines the approximating polygon for the Hilbert curve is modified. For example, for a third order Hilbert curve if the position of the obstacle is $t=0._{4}110$, then $p=2$ and $n_{eff}=3-2+1=2$. Therefore, $\ e_{n_{eff}}=0, \ q_{p}=1,\ m=0$ and the prescribed maneuver is the last maneuver of the table. The paths described in Table \[tabev\] can be implemented using mobile robots by fitting splines along the nodes as is shown in [@c11] [llll]{} $(e_{n},q_p,m)$ & Evasion Maneuver & Change in Path & Change in Map\ & & & $f':\mathbf{I} \rightarrow \mathbf{Q}$\ --------- (0,0,3) (0,3,0) (1,1,0) (1,2,3) --------- & & &\ --------- (0,1,3) (0,2,0) --------- & &&\ --------- (1,0,3) (0,2,3) --------- & &&\ (1,1,3) & &&\ --------- (0,1,0) (1,3,0) --------- & & &\ (1,2,0) & &&\ Using the evasion strategies enlisted in Table \[tabev\], a mobile agent traverses every available node of a Hilbert curve of any order in the space $\mathbf{Q}$ if an obstacle is placed on any node (barring the first and last node of the curve) of the same.\ *Proof* We proceed to prove the above statement using induction on the order of the Hilbert curve.\ Consider the first order Hilbert curve. Since the obstacle can’t be placed on the starting or ending node, it has to lie on a non-corner node as shown in figure \[nc\]. Hence, the map is modified to just skip the blocked node and the rest of the nodes are visited. Hence, the proposed hypothesis holds true for $n=1$.\ \ Suppose that the hypothesis holds true for $n=k$. Now, the Hilbert curve of order $n=k+1$ is composed of 4 units of $kth$ order Hilbert curves. There are two possible cases for the position of the obstacle node:\ *Case 1:* The obstacle node occupies a node which is neither the first nor the last node of one of the four $kth$ order Hilbert curves.\ From definition \[def\], this would imply that obstacle doesn’t lie on the corner nodes of $(k+1)th$ order Hilbert curve and the solution for $n=k$ is used for which the hypothesis holds true.\ \ *Case 2:* The obstacle node occupies a corner node of the $(k+1)th$ order Hilbert curve that isn’t the starting or ending node of the same.\ In this case, $(e_{n},p,m)$ are obtained and the corresponding maneuver is performed. Note that the evasive maneuvers preserve the sequence of nodes everywhere except the first order Hilbert curve within which the obstacle node lies. However, every node in this first order Hilbert curve is visited prior to resorting back to the correct sequence of nodes and thus every available node in the $(k+1)th$ order Hilbert curve is visited.\ Since the hypothesis holds true for $n=k+1$ as well, we conclude using the principle of mathematical induction that using the evasion strategies enlisted above, a mobile agent traverses every available node of a Hilbert curve of any order in the space $\mathbf{Q}$ if an obstacle is placed on any node (barring the first and last node of the curve) of the same.$\blacksquare$\ The evasive strategies proposed in Table \[tabev\] can accommodate multiple obstacles nodes provided that no two obstacles share an edge of their respective sub-squares.\ This modification of Hilbert’s curve can be used online for exploration tasks by robotic agents. A specific example that could draw benefits from this algorithm is using ground bots for demining abandoned mine fields. After locating a search space, an array of ground bots can be left to explore the area and detonate the mines. Due to the modification of the map of the Hilbert’s curve to accommodate for obstacles, detonated bots act as blocked nodes and are accordingly avoided by the remaining bots. Non-uniform Coverage {#S4} ==================== Non-uniform coverage using a Hilbert’s space filling curve has been studied in [@c8]. The region to be searched is divided into regions of varying “interest". The “interesting" regions are to be searched with a higher resolution (more finely, using a higher order Hilbert’s curve). This is done by searching the space using coverage trees ([@c14]) where the root node is the centre of the square space and the subsequent levels are the nodes of Hilbert’s curves of increasing order. Such a tree structure requires the use of a self-similar, locality preserving curve because when zooming in or out, the successive nodes need to be close to each other([@c12]). This neccesitates the use of a space-filling fractal like the Hilbert’s curve. Moreover, it is shown in [@c8] that using the Hilbert’s curve for ordering of nodes in the coverage tree leads to more efficient coverage solutions. We extend their algorithm to accommodate for spaces with obstacles using the evasion strategy presented earlier (Table \[tabev\]) via a simple modification. For the Shortcut Heuristic proposed in [@c14], when the next node belongs to a Hilbert’s curve of different order, the we first go to the parent or child node of the current node to match the order of the next node. Then, we proceed to the next node unless if it is an obstacle node; in which case, the proposed obstacle avoidance strategy can be used because the current node (after ascending or descending accordingly) and the obstacle node are of the same order. This modified strategy can also be used to avoid multiple obstacle nodes of orders different from that of the nodes dictated by required search resolution. The implicit assumption is that the obstacles are nodes of Hilbert’s space-filling curve and it is also assumed that no two obstacles are adjacent. ![Using Hilbert’s curves for ordering of nodes in the Coverage Tree for non-uniform coverage[]{data-label="e"}](fig/exnonuni) Implementation and Simulations {#S5} ============================== The algorithm presented in the earlier sections can be used for online implementation because no apriori information about the location of the obstacle nodes is required. For non-uniform coverage, the resolutions with which particular sections of the space are to be searched can be relayed to a ground agent by an aerial agent working in tandem in real time. The prescribed strategies are deployed in various situations to demonstrate its effectiveness in figure \[sim\]. The various cases are tested for $n=2 (e_{n}=0)$ and $n=3 (e_{n}=1)$ for both types of corner nodes for the cases $p=0,1$. [0.25]{} [0.25]{} [0.25]{} [0.25]{} [0.25]{} [0.25]{} Repeat for every node\ **Input [$n$, $node\_is\_obstacle$, $obstacle\_size$]{}**\ **Memory [$t$]{}**\ $t=t+\frac{1}{4^{n}}$;\ Node$(:)=\begin{bmatrix} 0\\0 \end{bmatrix}$; %% Initializing vector of nodes\ $q(1:n)=[0 0..0]$; %%Vector to store digits\ $j=n$;\ %% Extracting digits\ **While{$j\geq 1$}{\ ** $q(j)=4(4^{j-1}t-floor(4^{j-1}t))-4^{j}t+floor(4^{j}t)$\ $j=j-1$;}\ %% Mapping node via the Modified Hilbert Map\ $k=n$;\ **While{$k\geq 1$}{\ ** **$\quad$ if {$k=n$}{\ ** Node$(:)=F(q(n))$;}\ **else{\ ** Node$(:)=T_{q(k)}$Node$(:)$;}\ $k=k-1$;}\ %%Obstacle Avoidance\ **if [$node\_is\_obstacle$]{}**{\ **if** [Node$(:)$ is a corner node]{}{\ $n=obstacle\_size$;\ Calculate Node(:) at $t-\frac{3}{4^n}$, $t$, $t+\frac{1}{4^n}$, $t+\frac{2}{4^n}$, $t+\frac{3}{4^n}$, $t+\frac{4}{4^n}$;\ Obtain $(e_{n_{eff}}, p, m)$ at $t$ and perform evasion maneuver;}\ **else{\ ** Not a corner node, so just skip the node;}}\ **else{\ ** Make the robot go to the node;}\ [.25]{} ![](fig/multi "fig:") [.25]{} ![](fig/nonuni "fig:") If the obstacles are far enough, the prescribed evasive strategies yield good results as shown in Figure \[m\]. Cases like this could appear in real life situations like demining of mine fields as mentioned earlier. Furthermore, application of the algorithm for non-uniform coverage of a space with obstacles of varying sizes is presented in Figure \[e\]. Conclusion {#S6} ========== The paper suggested a change in the map for plotting Hilbert’s curve via its approximating polygon for use in exploration tasks. In the following sections, the problem of using the Hilbert’s curve for exploring a space with an obstacle/a hole was considered and an inductive solution to the same was obtained using the locality preserving and self-similarity property of the Hilbert curve. The prescribed strategy is suitable for online implementation because location of the obstacle is not required apriori. The algorithm can be also used during non-uniform coverage operations. Future work entails consideration of arbitrary obstacles occupying a space to develop strategies for path planning and searching. [^1]: $^{1}$Siddharth H. Nair is with Department of Aerospace Engineering, Indian Institute of Technology Bombay, 400076 India. [siddharth.nair@iitb.ac.in]{} [^2]: $^{2}$Arpita Sinha is with the Faculty of Systems and Control Engineering, Indian Institute of Technology Bombay, 400076 India. [arpita.sinha@iitb.ac.in]{} [^3]: $^{3}$Leena Vachhani is with the Faculty of Systems and Control Engineering, Indian Institute of Technology Bombay, 400076 India. [leena.vachhani@iitb.ac.in]{}
{ "pile_set_name": "ArXiv" }
Kholmishche Kholmishche () is a rural locality (a village) in Semizerye Rural Settlement, Kaduysky District, Vologda Oblast, Russia. The population was 6 as of 2002. Geography The distance to Kaduy is 12 km, to Malaya Rukavitskaya is 14 km. Verkhovye is the nearest rural locality. References Category:Rural localities in Vologda Oblast
{ "pile_set_name": "Wikipedia (en)" }
Q: In a canvas, is it better to have a single context or multiples? i'm currently developing a js app. I'm not a js expert so i'm asking for tips. My question is: Is it good practice (performance-wise as well) to draw in a canvas with an array of context or it is better to have a single context with all the drawing inside? Case 1: for (i = 0; i < 8; i++) { contextAr[i] = canvasAr.getContext('2d'); contextAr[i].beginPath(); contextAr[i].arc(canvasAr.width / 2, canvasAr.height / 2, ... } Case 2: contextAr.beginPath(); contextAr.arc(...); contextAr.moveTo(...); contextAr.LineTo(...); A simple example could be a circle divided in 4 quarters. Should i treat the draw with a single context or should i treat each pieces separately. I think i'm not fully grasping the meaning of context though. Is contextAr[i] = canvasAr.getContext('2d'); a redundant call? I would not be surprise if contextAr[i] had identical elements. Thank you. A: It's rather pointless obtaining a 2D context several times from the same canvas element as the same context object will be returned. From the standard (my emphasis) - Return the same object as was returned the last time the method was invoked with this same first argument. So the common and best practice is to obtain a single reference to a context per canvas element and use that successively.
{ "pile_set_name": "StackExchange" }
Fully automated standard addition method for the quantification of 29 polar pesticide metabolites in different water bodies using LC-MS/MS. A reliable quantification by LC-ESI-MS/MS as the most suitable analytical method for polar substances in the aquatic environment is usually hampered by matrix effects from co-eluting compounds, which are unavoidably present in environmental samples. The standard addition method (SAM) is the most appropriate method to compensate matrix effects. However, when performed manually, this method is too labour- and time-intensive for routine analysis. In the present work, a fully automated SAM using a multi-purpose sample manager "Open Architecture UPLC®-MS/MS" (ultra-performance liquid chromatography tandem mass spectrometry) was developed for the sensitive and reliable determination of 29 polar pesticide metabolites in environmental samples. A four-point SAM was conducted parallel to direct-injection UPLC-ESI-MS/MS determination that was followed by a work flow to calculate the analyte concentrations including monitoring of required quality criteria. Several parameters regarding the SAM, chromatography and mass spectrometry conditions were optimised in order to obtain a fast as well as reliable analytical method. The matrix effects were examined by comparison of the SAM with an external calibration method. The accuracy of the SAM was investigated by recovery tests in samples of different catchment areas. The method detection limit was estimated to be between 1 and 10 ng/L for all metabolites by direct injection of a 10-μL sample. The relative standard deviation values were between 2 and 10% at the end of calibration range (30 ng/L). About 200 samples from different water bodies were examined with this method in the Rhine and Ruhr region of North Rhine-Westphalia (Germany). Approximately 94% of the analysed samples contained measurable amounts of metabolites. For most metabolites, low concentrations ≤0.10 μg/L were determined. Only for three metabolites were the concentrations in ground water significantly higher (up to 20 μg/L). In none of the examined drinking water samples were the health-related indication values (between 1 and 3 μg/L) for non-relevant metabolites exceeded.
{ "pile_set_name": "PubMed Abstracts" }
Principles of Anticancer Immunotherapy ====================================== A documented clinical effort to employ immunotherapy against malignancies can be traced back to the late 1800s, when the New York surgeon William Coley started to treat patients with a concoction of inactivated bacterial products known as "Coley's toxin."[@R1] Over the last century the immunotherapeutic approaches against both solid and hematological tumors have become more refined, due to an improved understanding of the tumor immune response. The recognition that malignant cells (over)express antigenic proteins that are not present, or are present in relatively low amounts, in normal tissue has brought forth immunotherapeutic strategies focusing on T lymphocytes that target such tumor-associated antigens (TAAs). TAAs are products of mutated cellular genes or viral proteins that are not expressed in physiological conditions by somatic cells. Such antigens are expressed in herpesvirus- or retrovirus-induced malignancies such as Burkitt's lymphoma.[@R2] Cancer-testes antigens are expressed on germ (but not on somatic) cells, except in the context of malignant transformation. NY-ESO-1 is a prototypic cancer-testes antigen originally identified in esophageal adenocarcinoma,[@R3] and melanoma-associated antigen A3 (MAGE-A3) is a similar antigen that has been actively studied as a target for immunotherapy.[@R4] Alternatively, normal cellular proteins such, as glycoprotein 100 (gp100) and melanoma antigen recognized by T cells 1 (MART-1), can be overexpressed on malignant cells and induce a tumor-specific immune response.[@R5] Incidental observations indicating that a selected group of individuals with circulating antibodies against melanoma-associated antigens may have a more indolent disease course[@R3] suggest that manipulating the immune system of cancer patients may offer therapeutic applications. In a series of elegant clinical trials, Rosenberg and colleagues demonstrated that autologous T cells, be they derived from tumor-infiltrating lymphocytes or engineered to express a melanoma-reactive T-cell receptor (TCR)---expanded ex vivo and then reinfused into patients---can mediate tumor regression and, sometimes, a durable tumor-specific immune response.[@R6]^,^[@R7] It has recently been demonstrated that the ex vivo modification and reinfusion of autologous T cells expressing a chimeric TCR targeting a B-cell antigen I is particularly efficient for the treatment of chronic lymphocytic leukemia.[@R8] Other immunotherapeutic strategies rely on tumor "vaccines," resulting in the expansion of TAA-reactive T lymphocytes in vivo. Sipuleucel-T (Provenge™) is a therapeutic vaccine recently approved by FDA for use in metastatic hormone-refractory prostate cancer patients. It relies on the isolation of autologous dendritic cells, their loading with the prostate-specific antigen prostatic acid phosphatase (PAP) ex vivo, and their re-administration to patients. Such a treatment has been shown to provide a survival advantage due to the activation of PAP-reactive T lymphocytes.[@R9] Other strategies for activating TAA-reactive T lymphocytes, such as the administration of MAGE-A3-derived peptides along with an adjuvant, have also demonstrated some degree of efficacy in malignant melanoma patients.[@R10] Limited Success of Immunotherapy Against Lung Cancer ==================================================== In contrast to melanoma and prostate cancer, limited success has been reported for immunotherapeutic strategies against lung cancer, in particular for approaches targeting T lymphocytes, including vaccination. Mucin 1 (MUC1) is a transmembrane protein expressed on epithelial cells and overexpressed in some lung cancers.[@R11] A randomized Phase IIB trial testing a liposomal vaccine targeting MUC1 in patients with stage IIIB and IV non-small cell lung carcinoma (NSCLC) has recently been completed, demonstrating only a marginal, non-statistically significant improved in survival as compared with control patients.[@R12] A vaccine targeting MAGE-A3 has recently been evaluated in a Phase II trial enrolling lung cancer patients affected by Stage Ib or II tumors after resection.[@R13] Despite the fact that MAGE-A3 was expressed by all patients, no statistically significant increase in survival was noted in this study. Unlike the case of malignant melanoma,[@R14] immunotherapeutic approaches based on the blockade of immune checkpoint demonstrated minimal efficacy in NSCLC patients,[@R15] albeit in an early phase trial. Such a reported lack of efficacy of immunotherapy against lung cancer may stem from a significant discrepancy in the number of trials enrolling NSCLC patients as compared with individuals affected by other tumors, such as melanoma, but it may also reflect the fact that vaccines against lung cancer, or lung cancer immunotherapy in general, is not efficacious. The second possibility seems unlikely, as one of the earliest trials based on ex vivo expanded peripheral blood-derived leukocytes or lymphokine activated killer cells (LAKs) reported tumor regression in a lung adenocarcinoma patient.[@R16] Immunosurveillance of Lung Cancer ================================= All clinical trials successfully testing immunotherapeutic strategies in cancer patients have been based on initial studies in small animal models. The recent clinical success of immunotherapy in the treatment of malignant melanoma,[@R14] for example, can be directly linked to preclinical studies demonstrating the success of such therapy in rodents.[@R17] Alternatively, it can be argued that animal models of immunotherapy are developed as a result of observational studies focusing on naturally-occurring mechanisms of immunosurveillance. Surprisingly, the immunosurveillance of lung cancer has been poorly investigated. To address this deficiency, we have recently undertaken a series of studies focusing on the mechanisms of immunosurveillance and immunoregulation of lung cancer.[@R18] Using a well-established model of urethane-induced primary lung cancer, we have demonstrated that bone marrow-derived cells play a critical role in the elimination of lung cancer cells. However, to our surprise, T cells played no role in this process. Identical tumor burdens characterized indeed wild-type and mice lacking the adaptive immune system ([Fig. 1A](#F1){ref-type="fig"}). This situation differs significantly from that observed in other types of cancer, such as fibrosarcoma or gastrointestinal stromal tumor, two settings in which T lymphocytes play a critical role in both immunosurveillance and therapeutic responses.[@R19]^,^[@R20] The reasons for this are difficult to understand since lung cancer, just like melanoma and fibrosarcoma, expresses TAAs[@R11] that should, at least in theory, activate antigen-specific T lymphocytes. One possibility is that lung cancer contains a high prevalence of regulatory T lymphocytes, especially CD4^+^CD25^+^ regulatory T cells (Tregs). In fact, the earliest description of tumor-infiltrating Tregs was made in human lung cancer.[@R21] It is thus possible that the rapid infiltration of lung tumors with Tregs may inhibit all antitumor immune responses, giving the false impression that this malignancy remains "invisible" to the adaptive immune system. An alternative hypothesis to explain the aforementioned discrepancy may relate to immunoregulation associated with mucosal antigen presentation. ![**Figure 1.** Involvement of the adaptive immune system in the control of lung cancer. (**A**) No difference in lung tumor burden is evident in B6 wild-type, T cell-deficient nude or *Rag2^−/−^* mice treated with urethane. (**B**) Analysis of splenocytes from chimeric mice demonstrates a relative deficiency of OT-1 ovalbumin-reactive CD8^+^ T cells in mice bearing lung tumors as compared with those subcutaneous tumors in the flank. A decreased production of interferon γ (IFNγ) is also evident among OT-1 CD8^+^ T cells in lung tumor-bearing mice. (**A**) is modified from ref. [@R18].](onci-2-e23563-g1){#F1} Mucosal tolerance plays an important role in normal physiology and homeostasis of barrier organs, preventing exaggerated immune responses to innocuous environmental antigens.[@R22] Multiple experimental models have demonstrated that mucosal antigen delivery results in the generation of CD4^+^ Tregs,[@R23] but the effects on cytotoxic T lymphocytes (CTLs), most of which are CD8^+^ T cells, remain poorly defined. Some authors have reported that mucosal antigen presentation can activate CD8^+^ T lymphocytes,[@R24] while others have demonstrated a downregulation of CD8^+^ T-cell responses under similar conditions.[@R25] In order to directly address this issue in a model of lung cancer-specific antigen presentation, we generated murine bone marrow chimeras with animals bearing a mixture of CD8^+^ T cells derived from OT-1 ovalbumin-specific transgenic mice (on a CD45.2^+^ background) and wild-type CD45.1^+^ congenic mice. Such a system allowed us to identify ovalbumin-reactive T cells as CD8^+^CD45.2^+^CD45.1^-^ cells. After an engraftment period of 3 mo, mice were randomized into 3 groups. Group \#1 was injected with saline while Group \#2 was *s.c.* administered with 1 x 10^6^ cells derived from ovalbumin-expressing Lewis lung carcinoma cells (LLC-ova), kindly provided by D. Gabrilovich.[@R26] Group \#3 received an intratracheal injection of LLC-ova cells. Such a system, relying on ovalbumin as a surrogate TAA, allows for tracking tumor-specific immune responses. All mice were sacrificed two weeks later and splenocytes analyzed by flow cytometry. Of CD8^+^ T cells from mixed bone marrow chimeras in Group \#1, 66.5% were of OT-1 origin with a non-statistically significant decrease to 58% in animals injected with tumor cells *s.c.* (Group \#2). Mice injected with intratracheal LLC-ova cells (Group \#3), however, demonstrated a significant decrease in the proportion of OT-1 T cells to 37.4% ([Fig. 1B](#F1){ref-type="fig"}). Furthermore, upon overnight stimulation with ovalbumin, OT-1 T cells from mice in Group \#3 demonstrated decreased interferon γ (IFNγ) production, suggesting the development of anergy to antigen-specific stimulation. These data are in line with previous reports demonstrating that the mucosal delivery of antigens can downregulate systemic CD8^+^ T-cell immune responses.[@R25]^,^[@R27] It is thus possible that the poor efficiency of TAA-based vaccines in lung cancer patients may be due to either the absence of TAA-specific CD8^+^ cytotoxic T lymphocytes as a result of deletion or sequestration, or to alternative forms of T-cell inactivation associated with mucosal antigen presentation. The Innate Immune System Plays a Dominant Role in the Immunosurveillance of Lung Cancer ======================================================================================= Since we determined that the adaptive immune system fail to control the growth of lunf cancer, we focused our attention on innate immune mechanisms. Unlike T cell-deficient mice, mice lacking natural killer (NK) cells exhibited a statistically significant increase in lung cancer incidence and overall tumor burden as compared with wild-type animals ([Fig. 2A](#F2){ref-type="fig"}).[@R18] Furthermore, we observed a negative correlation between NK-cell cytotoxicity and the susceptibility of mice to carcinogen-induced lung cancer. NK cells from AJ and 129 mice, for example, demonstrated minimal cytolytic activity against lung cancer cells in vitro, and these two strains of mice were found to be highly susceptible to the development of carcinogen-induced lung cancer.[@R18] NK cells from the B6 mouse strain, conversely, exhibited high levels of lung cancer-specific cytotoxicity and B6 mice were resistant to lung cancer carcinogenesis ([Fig. 2B](#F2){ref-type="fig"}).[@R18] These data suggest that NK cells rather than T lymphocytes constitute the main immunological barrier to the development of lung cancer, and might therefore constitute a better targer for lung cancer immunotherapy. In order to directly address this question, we generated AJ/B6 F1 chimeric mice, which have a susceptibility to lung cancer that lays somewhat in between highly susceptible AJ and resistant B6 mice. Upon treatment with urethane, AJ/B6 F1 mice were randomized into three groups. Group \#1 was injected with 1 x 10^6^ freshly isolated NK cells from B6 mice, while Groups \#2 and \#3 were treated with saline or NK cells isolated from AJ mice, respectively. All animals were injected *i.p.* every two weeks for total of four months and tumor burden was determined at sacrifice as previously described.[@R18] Mice in Group \#1 had the lowest tumor burden, suggesting that exogenously administered NK cells can control the development and/or progression of lung cancer, and individual differences in NK cytotoxicity could be utilized as a therapeutic application ([Fig. 2C](#F2){ref-type="fig"}). Very early studies by Rosenberg's group demonstrated that at least one patient affected by primary lung adenocarcinoma exhibited a partial response to the reinfusion of autologous LAKs expanded ex vivo, which are highly enriched in activated NK cells.[@R16] Most subsequent clinical trials by the same group, however, have focused on melanoma. One recent Phase I clinical trial from Greece demonstrated that the administration of haploidentical NK cells expanded ex vivo may offer clinical efficacy against unresectable lung cancer.[@R28] However, unlike the case of hematologic malignancies,[@R29] NK cell-based immunotherapeutic approaches against lung cancer are poorly explored. ![**Figure 2.** Involvement of natural killer cells in the control of lung cancer. (**A**) The depletion of natural killer (NK) cells leads to an increased incidence of carcinogen-induced lung cancer and increased tumor burden in mice. (**B**) NK cells from lung cancer-resistant B6 mice demonstrate more robust lung-cancer specific cytotoxicity than cells from lung cancer-susceptible 129 and A/J animals. (**B**) The adoptive transfer of NK cells from B6 mice decreases tumor burden in urethane-treated mice. (**A and B**) are modified from ref. [@R18].](onci-2-e23563-g2){#F2} Conclusions =========== Lung cancer is the number one cancer-related cause of death in the Western world, being associated with a higher disease-specific mortality then prostate, colon and breast cancer combined.[@R30] Despite this fact, the development of immunotherapeutic approaches against lung cancer lags far behind that of strategies to exploit the immune system against tumors, such as malignant melanoma. Our data and those of others[@R27] demonstrate that the adaptive immune system plays a limited role in the control of lung cancer growth. This may be due to the highly immunosuppressive environment created by lung cancer cells as well as to the unique immunological properties of the lung, which alter TAA-reactive T lymphocytes. Nevertheless, we present compelling data suggesting that immunotherapeutic strategies that are (at least in part) successful against other solid tumors may not be applicable to lung cancer without significant refinement. We also demonstrate a prominent role for NK cells in the primary immunosurveillance of lung cancer as well as their potential as an immunotherapeutic tool against this dreadful disease. We therefore suggest that a different immunotherapeutic approach, perhaps closer to that employed against hematological tumors such as acute myeloid leukemia,[@R29] may offer an improved efficacy for the treatment of lung cancer. Supported by ATS/Lungevity Foundation, the Alvin Siteman Cancer Center Internal Research Grant by The American Cancer Society, NIH K08CA131097, NIH R01HL094601, R01HL113931, and NIH F32HL114270, the Barnes Jewish Research Foundation, and Thoracic Surgery Foundation for Research and Education Previously published online: [www.landesbioscience.com/journals/oncoimmunology/article/23563](http://www.landesbioscience.com/journals/oncoimmunology/article/23563/) No potential conflicts of interest were disclosed.
{ "pile_set_name": "PubMed Central" }
Double-Shuffle {#Sec1} ============== Richard Horton, *The Lancet*'s[1](#Fn1){ref-type="fn"} editor-in-chief, has delivered a swift response to Covid-19. Mid-pandemic, the world is suffering post-traumatic stress disorder as leaders and medical experts appear incoherent and disorganized. Academics also scramble to respond and are producing manifold coronavirus publications. Horton's *The Covid-19 Catastrophe: What's Gone Wrong and How to Stop it Happening Again* ([@CR8]) has managed to stand out for its sharp polemic (Knight [@CR10]). Horton denounces Donald Trump's decision to withdraw funding from the World Health Organization (WHO) as a crime against humanity and accuses Boris Johnson of misconduct in public office. But while being critical of governments for failing their nations, his rebuttal, in my opinion, could have gone further in exposing the rotten nexus of techno-capitalism, the medical industry, and politics at the core of the health crisis. Horton has authority, acumen and social conscience. But his reluctance to strike out more explicitly against the marketisation of national health provision is what sociologist Stuart Hall ([@CR6]) might have called a 'double-shuffle.' At the time of writing this review, the coronavirus has caused over 549,749 deaths and reached 12 million cases globally (BBC News [@CR1]). It has battered economies, public and private sectors. Covid-19 demonstrates the need for health services to care for the many rather than the few. But there are few signs that this pandemic will lead to increased spending on public healthcare, as Trump presses ahead with 'terminating' the Affordable Care Act (Woodward [@CR13]). Britain's National Health Service (NHS) was irreversibly reduced by Thatcherism in the 1980s and undone further by backdoor privatisation throughout the 2000s (Hall [@CR7]). During the current coronavirus crisis, key workers, doctors and nurses are applauded as heroes. This is poignant and well-deserved but negates from the behind-the-scenes' trashing of public funding for health services, medical science and academic research. Rather than the Covid-19 emergency strengthening of national health services, we are more likely to end up with the reverse. Simultaneously, the WHO's, doctors' and scientists' ability to speak effectively on the issues continues to be undermined and effectively muzzled. Horton conveys that the current pandemic is also a discursive crisis. Philosophy of Fear {#Sec2} ================== Horton points out that Covid-19 is triggering a domino fall of experts' reputations, officials shirking responsibilities, and politicians pivoting. Trump has blamed China and the WHO. Horton blames Trump, the British government and ineffectual leaders, incensed by the nonsense shouted and tweeted by Trump, Johnson, and Jair Bolsonaro in Brazil. But their voters, who are also experiencing intense economic, social and health insecurity, evidently crave solutions, digestible promises and easy to blame targets in this undeniable emergency. Therefore, to understand the extent to which the Covid-19 pandemic is also a political crisis, we need to reflect more critically on why millions of people, suffering economic hardships, health dangers and environmental catastrophe, vote for parties who capitalise on hyper-inequalities and divisive individualism. Horton understands that human beings can be driven by anxiety, as he quotes Lars Svendsen's *A Philosophy of Fear* ([@CR12]) and returns to him in the final chapter. He also realises that crisis plays an instrumental role in global history. Yet, the discursive emergency is not only top-down. What Horton underestimates, in my view, is the professional classes' acquiescence of the brazen neoliberal cruelty in marketising human life, health and the attack on the state sector. Henry Giroux ([@CR5]), amongst other critical pedagogues, has written about the strategic undermining of state education. He suggests neoliberalism, or the logic of marketisation; chips away at investments into the physical buildings, playing fields and precious physical resources; and also erodes the frameworks and vocabularies for thinking and talking about education (Giroux in Jandrić [@CR9]). Insights from Giroux, concerning neoliberalism's cultural apparatus for dismantling material and discursive infrastructure, indicate that the Covid-19 emergency is therefore, in part, the result of the loss of state funding for health services as well as the wearing away of collective thinking about health planning and reactions to pandemics. Throughout the book's seven chapters, Horton articulates some of these issues around the interconnections of state, health, politics and economics. There are sprinklings of political theory: Benthamite history; Foucauldian philosophy of surveillance culture; Didier Fassin's ([@CR3]) public-health anthropology, addressing the racialised and discriminatory biopolitics of life and otherness; and reference to Slavoj Žižek's ([@CR14]) musings on the Covid-19 pandemic. Horton's style is accessible as he maps some of the political, social and medical practices that enmesh the world in crisis. He provides a listing of who has done what, has not done anything or has been misrepresented during the pandemic, while hinting at controversies surrounding *The Lancet*'s slow response and lack of fact checking (Wilson 2020). His ambitious spread of information is delivered to readers as heated rhetoric. While this position of anger is no doubt justifiable, considering governments' mismanagement of the health crisis, it is also (ironically) indicative of the current *Zeitgeist* of Trumpian hot retort. Horton's coverage is fast and furious, ranging from the pandemic's emergence in China's Wuhan province, the slow international response to the warnings, the paradox of science's success and failure, key workers on the frontline, politics of Covid-19, the continuing risk of pandemics and preparing for futures public health emergencies. He defends Dr. Tedros Adhanom Ghebreyesus, the WHO's director-general, since Dr. Tedros (along with China) has been branded by Trump as the pandemic's fall guy. Trump is a leading figure in Horton's book as lengthy Trump quotes fill the pages. While these ill-formed and often downright offensive responses to the pandemic are certainly bizarre, many readers will be already aware of such 'Trumpisms.' Arguably, Trump's scapegoating of China is a shrewd move (from his camp's perspective) in detracting from American domestic policy. It is a nasty cocktail of latent cold-war tensions and Sinophobia, the anti-Chinese feeling in Europe, USA and other white settler societies that peaked in the nineteenth century (Frayling [@CR4]). Furthermore, we know Trump is not speaking to Democrat voters and/or those on the left, and we urgently require deeper theorising of why Trumpian register resonates, the tacit reasoning and ideology of his discursive moves. Triumph of Ignorance {#Sec3} ==================== But if this is also a crisis of words, arguably then, it is not enough for Horton to rage against Trump. Trump, Johnson and other inadequate leaders are doing a great job of emphasising their own inadequacies. Instead, we need to reflect more deeply and critically on the Trumpian political and discursive brand in order to reveal the latent, compressed and historical significance of the values that it embodies. Trumpism is the triumph of ignorance over not only science but also professionalism, academic research and social collegiality. In its contemporary form, the Trumpian crisis has descended into a circus of tweets, broad generalisations over fact-checking, bullying rather than compassion, empty gesturing and heckling as opposed to dialogue and debate. But to understand the callousness of the political discursive crisis, we should interrogate its discursive appeal, as a form of negative freedom, to the growing number of anti-vaxxers, libertarians, patriots and the alt-right. Being free from state control could mean, for some, freedom not to wear a mask, impunity from being tested and/or freefall from social responsibility or any social contract altogether. Trumpism fuels these ideologies while, conveniently, freeing state responsibility. Horton has been in a hurry to address some of these issues and could be commended for writing this short book so quickly during lockdown but, in his haste, some points are repetitive despite the text being only 133 pages long. Although referring to important issues, including how the health pandemic is being experienced differently by varying countries, ethnic minorities, the working class and women, he does not drill deeply into any particular issue as he jumps from history to medicine, science and political theory. As *The Lancet*'s editor-in-chief, an experienced medical practitioner and doctor, Horton is in a key position to consider the perspectives of care providers, doctors and nurses on the frontline. This book also provides an important opportunity to give voice to those bearing the brunt of the underfunding and mismanagement of the health crisis. Horton does include several pages of quotes from different health professionals, whose sense of incredulity, fear and desperation are apparent. From an ethnographic perspective, I wanted to hear more about these frontline workers' stories, opinions and divergent perspectives since their accounts of the crisis, as it unfolds, are essential testimonies. At a macro level, Horton importantly calls for an international inquiry into the global mishandling of the health crisis since a post-pandemic reckoning will be necessary. But the international community's more unified responses to injustice historically, for example the Nuremberg Trials held by the Allies after World War II, or the global support for South Africa's Truth and Reconciliation Commission in 1996, are almost unimaginable on today's fractured world stage. In the midst of the current Covid-19 pandemic and escalating political crisis, it is not clear who will be willing or able to speak for those without a privileged platform. Conversely, Horton ([@CR8]: 126) tells us: 'Capitalism has many virtues. But the intense version of capitalism that has emerged over the past forty-years has weakened something essential in the social fabric of our societies. Those weaknesses contributed to the tragic toll of deaths.' Circling Sharks {#Sec4} =============== However, considering the scale of the pandemic, governments' global rivalries and policies of competition that Horton signals throughout the book, it is difficult to realise the 'virtues' of capitalism that he refers to in the final chapter. Firstly, capitalism's deep roots go back much further than forty years. Secondly, Horton's phrase 'intense version of capitalism,' insufficiently calls out neoliberalism's contribution to the crisis. Thirdly, the 'something,' that Horton appears reluctant to name are state sector services, operating at the material, ethical and discursive levels. Stuart Hall ([@CR7]) addressed neoliberalism's unhealthy bite into the state sector. He explained that the privatisation in the UK, by the early 2000s, was already playing a massive, profit-making role in healthcare through the privatisation of hospitals, care homes and clinics. The conservative government's top-down reorganisation of the NHS, grouped practitioners (GPs) into private consortia, part of whose profits they retained. Since few GPs had the know-how or time to run complex budgets assigned; they turned to the private health companies who were, according to Hall ([@CR7]: 720), 'circling the NHS like sharks waiting to feed.' Britain's once admirable NHS has been unable to provide enough protective personal equipment or Covid-19 tests for its frontline workers. Horton warns us that the pandemic is far from over, due to the crisis of leadership, and there will likely be other health emergencies from which we may not recover. That is a terrifying prospect and the theme of fear runs throughout Horton's book. Yet, we also need to develop brave responses to Covid-19 and to mitigate against the closing-in of capitalism's circling sharks. As the global health fiasco continues, we should acknowledge that the world leaders are not the only ones running the show and figures like Bill Gates are instrumental in bringing platform capitalism, politics and medicine closer together. Simultaneously, the problem with neoliberalism's erosion of the state, in the Covid-19 moment and beyond, is that private venture capitalists, according to the forward-thinking economist Mariana Mazzucato ([@CR11]), rarely venture much at all. For example, after the SARS outbreak in 2002--2003, private investors were not willing to invest in coronavirus research while publicly funded research continued, and the US government contributed \$700 million. Tech giants like Apple, Google and Elon Musk's companies have also profited from substantial government funding (Bregman [@CR2]). Horton must realise that, while we wait for breakthrough vaccines, they are more likely to come through publicly funded initiatives. Theorising of the Covid-19 crisis could therefore draw strength from an informed axiology, or study of values, to realise the importance of the state, collective and global solutions. An aspect of this involves developing braver critical tools to explore tech-politics, social and medical practices at discursive levels. See <https://www.thelancet.com/>. Accessed 10 July 2020.
{ "pile_set_name": "PubMed Central" }
Adalbold I Adelbold I (or Odilbald) was a bishop of Utrecht from 867/879 to 898. Just like his predecessors and successors, Adelbold resided in Deventer because Utrecht was still threatened by Viking raids. A few times he acted as arbiter in matters at Cologne, and he visited the Synods at Cologne in 873 and 887, and the Synod at Trebur in 895. Adelbold was buried in the St. Salvator Church in Utrecht. Category:898 deaths Category:Bishops of Utrecht Category:9th-century bishops Category:Year of birth unknown
{ "pile_set_name": "Wikipedia (en)" }
Role of expiratory flow limitation in determining lung volumes and ventilation during exercise. We determined the role of expiratory flow limitation (EFL) on the ventilatory response to heavy exercise in six trained male cyclists [maximal O2 uptake = 65 +/- 8 (range 55-74) ml. kg-1. min-1] with normal lung function. Each subject completed four progressive cycle ergometer tests to exhaustion in random order: two trials while breathing N2O2 (26% O2-balance N2), one with and one without added dead space, and two trials while breathing HeO2 (26% O2-balance He), one with and one without added dead space. EFL was defined by the proximity of the tidal to the maximal flow-volume loop. With N2O2 during heavy and maximal exercise, 1) EFL was present in all six subjects during heavy [19 +/- 2% of tidal volume (VT) intersected the maximal flow-volume loop] and maximal exercise (43 +/- 8% of VT), 2) the slopes of the ventilation (DeltaVE) and peak esophageal pressure responses to added dead space (e.g., DeltaVE/DeltaPETCO2, where PETCO2 is end-tidal PCO2) were reduced relative to submaximal exercise, 3) end-expiratory lung volume (EELV) increased and end-inspiratory lung volume reached a plateau at 88-91% of total lung capacity, and 4) VT reached a plateau and then fell as work rate increased. With HeO2 (compared with N2O2) breathing during heavy and maximal exercise, 1) HeO2 increased maximal flow rates (from 20 to 38%) throughout the range of vital capacity, which reduced EFL in all subjects during tidal breathing, 2) the gains of the ventilatory and inspiratory esophageal pressure responses to added dead space increased over those during room air breathing and were similar at all exercise intensities, 3) EELV was lower and end-inspiratory lung volume remained near 90% of total lung capacity, and 4) VT was increased relative to room air breathing. We conclude that EFL or even impending EFL during heavy and maximal exercise and with added dead space in fit subjects causes EELV to increase, reduces the VT, and constrains the increase in respiratory motor output and ventilation.
{ "pile_set_name": "PubMed Abstracts" }
Effects of coal dust contiguity on xerophthalmia development. To study the occurrence of ocular surface diseases on coal miners working under wells and to investigate the relation between xerophthalmia occurrence and coal dust contiguity. To observe the influence of coal dust to ocular surface by using Schirmer to detect lacrimal gland secreting function, and breakup time of tear film (BUT) to evaluate the stability of lacrimal film and the quantity of lysozyme in lacrimal fluid. These values were lower for underground coal miners than other workers not contacting coal dust, and showed negative correlation to period of their services. Conditions in coal miners were worse than that of other workers. Coal dust exposure plays an important role in the development of dry eye.
{ "pile_set_name": "PubMed Abstracts" }
A Fox Lake woman was critically injured Sunday after she was hit on her motorcycle in a hit-and-run crash in north suburban unincorporated Antioch. The woman, 30, was westbound on her Harley Davidson motorcycle about 1:45 a.m. on Grass Lake Road when she crossed into the eastbound lanes and struck a Chrysler near Hillside Avenue, the Lake County sheriff’s office said. The Chrysler took off from the scene and stopped at a restaurant in the 24500 block of West Bluff Lane, where the driver, a 26-year-old man, reported his vehicle stolen, the sheriff’s office said. After being questioned, the man admitted that his vehicle had not been stolen and he was driving the Chrysler at the time of the crash, the sheriff’s office said. The woman driving the motorcycle was taken to Condell Medical Center with serious-to-critical injuries, the sheriff’s office said. The driver of the Chrysler was taken to the hospital for toxicology testing, the sherriff’s office said. Charges are pending.
{ "pile_set_name": "OpenWebText2" }
Like all buzzwords, “diversity” has several uses. Deployed thoughtfully, it can transform shamefully homogeneous institutions for the better. However, it can also be used as a form of nonsensical virtue-signalling that changes very little. The new Boris Johnson cabinet, which has been lauded for its “record numbers” (four!) of black and minority ethnic (BAME) members is an example of this. Yes, there are two British Asians, Priti Patel and Sajid Javid, in high state office, as well as James Cleverly who is a black Briton. Is their inclusion, along with that of Alok Sharma, in this cabinet really going to change a fundamentally regressive government headed by a prime minister who has a record, not of championing minorities or multiculturalism, but of making unacceptably racist as well as sexist and homophobic pronouncements? The harsh truth is that diversity-washing Johnson’s regime with a handful of black and brown faces is a way to shore up hierarchical rule and vicious class and race inequalities. It serves the purpose of performing inclusion without changing the exploitative and racist politics of One Nation Conservatism. It is laughable for a cabinet that is two-thirds privately educated and nearly half of whom have Oxbridge degrees to claim to be among the “most diverse” in history. Boris Johnson's cabinet: Who's in and who's out Show all 40 1 /40 Boris Johnson's cabinet: Who's in and who's out Boris Johnson's cabinet: Who's in and who's out In: Jacob Rees-Mogg Jacob Rees Mogg appointed Leader of the Commons AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Esther McVey Esther McVey appointed housing secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Jo Johnson Jo Johnson appointed new business and energy secretary EPA Boris Johnson's cabinet: Who's in and who's out In: Brandon Lewis Brandon Lewis appointed immigration secretary Getty Boris Johnson's cabinet: Who's in and who's out In: James Cleverly James Cleverly appointed Conservative Party chairman PA Boris Johnson's cabinet: Who's in and who's out In: Baroness Evans Baroness Evans remains Leader of Lords PA Boris Johnson's cabinet: Who's in and who's out In: Julian Smith Julian Smith appointed Northern Irish secretary Reuters Boris Johnson's cabinet: Who's in and who's out In: Alister Jack Alister jack appointed Scottish secretary PA Boris Johnson's cabinet: Who's in and who's out In: Alun Cairns Alun Cairns remains Welsh secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Grant Shapps Grant Shapps appointed transport secretary Getty Boris Johnson's cabinet: Who's in and who's out In: Alok Sharma Alok Sharma appointed international development secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Robert Buckland Robert Buckland appointed justice secretary Getty Boris Johnson's cabinet: Who's in and who's out In: Amber Rudd Amber Rudd remains work and pensions secretary Getty Boris Johnson's cabinet: Who's in and who's out In: Robert Jenrick Robert Jenrick appointed housing and communities secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Andrea Leadsom Andrea Leadsom appointed business secretary Reuters Boris Johnson's cabinet: Who's in and who's out In: Nicky Morgan Nicky Morgan appointed culture secretary Getty Boris Johnson's cabinet: Who's in and who's out In: Gavin Williamson Gavin Williamson appointed education secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Theresa Villiers Theresa Villiers appointed environment secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Liz Truss Liz Truss is appointed international trade secretary Reuters Boris Johnson's cabinet: Who's in and who's out In: Ben Wallace Ben Wallace appointed defence secretary EPA Boris Johnson's cabinet: Who's in and who's out In: Stephen Barclay Stephen Barclay remains EU secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Dominic Raab Dominic Raab appointed foreign secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Priti Patel Priti Patel appointed home secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out In: Michael Gove Michael Gove given Chandellor of the Duchy of Lancaster AFP Boris Johnson's cabinet: Who's in and who's out In: Sajid Javid Sajid Javid is appointed Chancellor of the Exchequer AP Boris Johnson's cabinet: Who's in and who's out Out: Jeremy Hunt Jeremy Hunt sacked as foreign secretary Reuters Boris Johnson's cabinet: Who's in and who's out In: Matt Hancock Matt Hancock remains health secretary AFP/Getty Boris Johnson's cabinet: Who's in and who's out Out: Chris Grayling Chris Grayling resigned as transport secretary Getty Boris Johnson's cabinet: Who's in and who's out Out: Jeremy Wright Jeremy Wright sacked as culture secretary PA Boris Johnson's cabinet: Who's in and who's out Out: Karen Bradley Karen Bradley sacked as Northern Ireland secretary Getty Boris Johnson's cabinet: Who's in and who's out Out: James Brokenshire James Brokenshire sacked as housing and communities secretary Reuters Boris Johnson's cabinet: Who's in and who's out Out: Penny Mordaunt Penny Mourdaunt sacked as defence secretary Reuters Boris Johnson's cabinet: Who's in and who's out Out: Liam Fox Liam Fox sacked as international trade secretary Getty Boris Johnson's cabinet: Who's in and who's out Out: Greg Clarke Greg Clarke sacked as business secretary PA Boris Johnson's cabinet: Who's in and who's out Out: David Mundell David Mundell sacked as Scottish secretary Getty Boris Johnson's cabinet: Who's in and who's out Out: Damien Hinds Damien Hinds sacked as education secretary Getty Boris Johnson's cabinet: Who's in and who's out Out: David Gauke David Gauke resigned as justice secretary EPA Boris Johnson's cabinet: Who's in and who's out Out: Rory Stewart Rory Stewart resigned as international development secretary Getty Boris Johnson's cabinet: Who's in and who's out Out: David Lidlington David Lidlington resigned as deputy Prime Minister PA Boris Johnson's cabinet: Who's in and who's out Out: Philip Hammond Philip Hammond resigned as Chancellor of the Exchequer AFP/Getty It is, however, possible to fool some of the people some of the time. Along with a tranche of self-congratulatory white commentators, some BAME pundits have also insisted that the prominence of a handful of non-white faces in cabinet indicates progress for black and Asian communities, empowering them through greater symbolic “visibility”. This would make sense if the record of ministers like Javid and Patel indicated that they would stand up for these communities. Instead, Javid has repeatedly and falsely associated both the sexual “grooming” of young women and “terror” with Islam, while Patel was a prominent face in the xenophobic and anti-immigrant Vote Leave campaign. She has also stated publicly that she has no desire to be identified with ethnic minorities, apparently an “insulting” affiliation rather than a descriptive one. At the very least, those who claim a victory for “diversity” should ask how often these non-white faces in cabinet have actually challenged racism or discrimination. Carefully chosen for their distance from the communities they supposedly now represent, both Javid and Patel have track records that clearly indicate they will help implement racist and anti-immigrant policies rather than challenge white supremacy, the lifeblood of the 97 per cent white Conservative Party. Independent Minds Events: get involved in the news agenda Beloved of so many Tories and Brexiteers including Johnson (who has called for Africa to be colonised again), the British empire and its racist hierarchy were historically enabled by a small number of Asian and African elite collaborators. In the appointment of small number of non-white loyalists to the current government, we see this pattern repeat itself. If diversity is to mean something other than a set of superficial differences, then it is vital not to replicate the homogenising assumptions of racism whereby only skin colour matters or to assume that non-white complexions automatically stand for change. For one thing, it is as possible to be a brown or black person with regressive, even racist, politics as it is to be a white anti-racist. A place at the majority table often comes at the price of silence or active complicity.
{ "pile_set_name": "OpenWebText2" }
Q: How to pass PHP $variables in cURL array I would like to pass some simple PHP variables (such as $name1 and $email1) to the following cURL block (PHP-Curl) CURLOPT_POSTFIELDS =>"{\n\"email\": \"percy.jackson@gmail.com\",\n\"name\": \"Percy Jack\",}" Basically replace: percy.jackson2290@gmail.com with $email1 Percy Jack with $name1 Is this possible? Please help! A: Don't try to create JSON by hand, create an array and use json_encode() CURLOPT_POSTFIELDS => json_encode(["email" => $email1, "name" => $name1]), For the more complex version in the comment: CURLOPT_POSTFIELDS => json_encode([ "sequence" => 1, "recipients" => [ "signers" => [ ["email" => $email1, "name" => $name1, "recipientId" => "1", "roleName" => "Client"] ], ] ]), Edited version: CURLOPT_POSTFIELDS => json_encode([ "emailSubject" => "DocuSignAPI-CompositeTemplates", "emailBlurb" =>"CompositeTemplatesSample1", "status" => "sent", "compositeTemplates"=> ["serverTemplates"=> ["sequence"=>"1", "templateId"=>"ff32490f-58ab-4e26-a505-b32c863b2398"]], ["inlineTemplates"=> ["sequence"=>"1", "recipients"=> ["signers"=> [ ["email" => $email1, "name" => $name1,"recipientId"=>"1","roleName"=>"Client"]]]]]]),
{ "pile_set_name": "StackExchange" }
Exploring Mobile App Development’s Connection to IoT Share This is the age of the Internet of Things (IoT), and those things have quite a role to play in the world of app development. IoT networks, which consist of multiple smart devices, are built to communicate with one another and share information. With the number of IoT objects rising — which is expected to hit 18 billion by 2022 (including 1.5 billion with cellular connections) — it’s time to look at the connection between IoT and mobile apps. This growth means that more applications in a variety of industries will be introduced. It also opens up the opportunity to leverage IoT solutions in mobile apps. Let’s look at the ways in which mobile app development influences IoT. Smartphones make IoT management easier Billions of users around the world have smartphones, with that number increasing every day. It also makes sense that mobile apps are the preferred channel for accessing IoT, due to the ease of developing them. Mobile has a more flexible platform for transmitting data as well. With a single device and app, IoT devices can be managed and monitored. Mobile apps leveraging IoT Mobile apps have made life easier in a variety of ways. Now, they have the power to link lots of devices and exchange information. An app is a hub that can leverage IoT to do even more amazing things with technology. It’s already happening, and this relationship will grow as more devices are created and more apps are developed. Here are some key areas where mobile apps are leveraging IoT: Wearables Wearable devices are essential in IoT solutions. With Bluetooth and Wi-Fi, smart watches, eyeglasses, or other kinds of wearable bands can all be connected to a device. This creates a two-way conversation about data between the devices. Smartphone apps and smartwatches are the most prolific pairing. The watch becomes an extension of the smartphone, with information shared back and forth. Your watch pings when you get a text message. Your watch collects the number of steps in a day and communicates that back to the app so that the data is accessible and aggregated with what you ate and how you slept. Then you’re looking at data that tells a story about your overall health and fitness. Without the mobile app, the smart devices would have nowhere to send their data. It would be inconvenient to have to hook up a smartwatch to a laptop every day to download data. Healthcare and medicine There are multiple IoT-enabled devices used in the field of healthcare, including IVs, vital sign monitors, infusion pumps, and more. These devices all use sensors to collect data. This data is transferred to an app, creating a smooth workflow. Medical IoT devices also need “direction” in a two-way conversation. Mobile apps can set the dosage of medicine through pumps and IVs. They can also collect vitals and share them with a patient’s electronic medical record. Healthcare is one of the leading industries for IoT development, and the market will only grow. However, the connection between IoT devices and a smartphone in healthcare does come with caveats. Exchanging personal healthcare information must be done so on a secure network to comply with HIPAA rules. So, this must be a consideration when talking about leveraging IoT in the medical field — in addition to an important for blockchain technology. Smart homes Home automation is in full motion with the use of IoT devices. So many features can be controlled within a home from the AC to locks and security. Mobile apps make all this easier for homeowners. They can even see from cameras exactly what’s going on in their home remotely. These devices have the ability to “learn” as well from the instruction and conversation it receives from the mobile app. For example, if your smart thermostat learns the settings you like best throughout the day, it can eventually automate this process. The same with turning lights on or off. Agriculture Agriculture needs an evolution if it’s going to meet the rising demand for food in the world, as the global population continues to increase. Enter IoT devices, which via sensors can monitor the crop and conditions, looking at light, temperature, humidity, and soil condition. Farmers have the ability to review all this information with a mobile app, which leads to more efficient farming. Additionally, the industry is using smart drones to survey the land, and monitoring has also begun being used in tracking livestock. Retail In retail environments, it’s all about making the customer experience better. IoT devices enable the collection of data, which retailers can use to craft a better experience. For example, if Wi-Fi foot traffic monitoring and sensors show that customers linger in certain areas, this could be a sign of your most enticing products. That could change a store layout or affect the type of content played on digital signage. With an app, the data is more accessible, and improvements can be made faster. In addition to in stores, retailers are using smart transportation to get goods where they need to go with better route optimization. IoT devices use GPS to track and route trucks. Using a mobile app to access this data and direct the route makes for a much more efficient process. Smart cities There is a huge wave of IoT devices that are creating smarter urban areas. There are numerous applications of how devices can be used to make city living easier. What if you could use an app to find parking? With the right sensors and communication, a driver could know exactly where to find the best spot. IoT devices can also help ease congestion with sensors and data exchanges. This not only helps drivers, but it also provides critical data to urban planners about where high-traffic areas exist. Why app dev and IoT? App development is a cost-effective approach to control and communication. Integrating apps with IoT development offers more convenience and ease on both a personal and a business level. The physicality of needing to be there is removed, creating more efficiency. Challenges with developing apps for IoT solutions What kind of challenges does leveraging the IoT have on app development? Well, IoT is still a journey not fully known. The issues often can’t be simulated; they have to be discovered. Specific protocols also have to be considered. But this is an exploration with new solutions. Developers can gain complete control over how development moves forward, playing with trial and error until virtually seamless. There are also security concerns. The more devices are added to a network, the more vulnerable it is to security threats. So both the IoT devices and the apps that control them must be secure by design. Everything relating to operating systems needs to be updated, as not patching can also pose a huge security risk. Opportunities in IoT await Leveraging IoT with mobile apps improves workflows and offers convenience in everyday life. IoT devices would be used a lot less and not have such accessibility without mobile apps. That’s why it’s critical that IoT devices be made compatible with mobile apps from the start. This opens up tremendous opportunity in the space. So what’s your next move? If your business is using or developing IoT devices, then mobile app development is crucial. But how will you get there? It helps to work with developers that have experience with IoT and mobile app development — like the ones at Topcoder.
{ "pile_set_name": "Pile-CC" }
Background {#Sec1} ========== Forensic Mental Health Services (FMHS) provide treatment and care for the minority of people with mental disorders who come in contact with criminal justice services or require specialized care \[[@CR1], [@CR2]\]. Although there is evidence that forensic patients have a lower risk of re-offending compared to prisoners, it is not known whether the lower risk arises from clinical interventions \[[@CR3]\]. The effectiveness of pharmacotherapy is well documented for treating symptoms \[[@CR4]\]. There is less evidence for improved real world function though there is evidence that pharmacotherapy can reduce violence \[[@CR5], [@CR6]\]. However many community and forensic patients do not adhere to their medication when discharged. Psychosocial interventions may improve not only adherence to medication \[[@CR5]--[@CR8]\] but also a range of other 'real world' functional outcomes. Currently there is mixed evidence that forensic patients benefit from psychosocial interventions for non-adherence, refractory symptoms and violence risk \[[@CR9]--[@CR13]\]. Randomized controlled trials in this field are difficult and there are few available as guides \[[@CR12], [@CR13]\]. Paradoxically pharmacotherapy may compromise the effectiveness of psychosocial interventions to some extent by impairing neurocognition and functioning \[[@CR14], [@CR15]\]. In a review of effective interventions for reducing violence and aggression, McGuire \[[@CR16]\] recommended that because of the complexity of the problem, it appears advisable to research multimodal interventions only, with greater intensity of treatment and improved targeting. Similarly, Wampold \[[@CR17]\] reviewed the common factors in psychotherapy and concluded that common factors such as alliance, empathy, expectations, cultural adaptation and therapist differences have large effect sizes in meta analyses, while specific factors such as treatment differences, adherence and competence have smaller effects. Because measurement of response to psychosocial programmes is difficult, we have designed and validated a measure of multi-modal treatment, the DUNDRUM-3 \[[@CR18]\]. Accordingly the form and content of the DUNDRUM-3 programme completion scale \[[@CR18]\] corresponds to a framework for assessing response to multi-modal treatments relevant to reducing violence broadly in accordance with McGuire \[[@CR16]\]. The DUNDRUM-3 is rated according to progress in cycle of change \[[@CR19]\], therapeutic engagement, recovery \[[@CR20]\], Maslow's hierarchy \[[@CR21]\] and cultural engagement, a synthesis of theories of therapeutic effectiveness and change, broadly based on Wampold \[[@CR17]\]. The scoring system for the DUNDRUM-3 programme completion scale \[[@CR18]\] is designed to assess readiness to move from more secure to less secure locations \[[@CR22]--[@CR24]\] and is therefore rated in clinically meaningful units, relevant to outcomes. Factors to be considered when evaluating psychosocial treatments include the method of measurement, the duration of treatment required, and cognitive impairment. Many forensic services evaluate progress using violence risk assessments such as the Historical-Clinical Risk management-20 (HCR-20) \[[@CR25]\]. Meta-analyses demonstrate the validity of the HCR-20 for predicting violence \[[@CR26], [@CR27]\]. However, the clinical and risk items of the HCR-20 may not be sensitive to change \[[@CR28]--[@CR31]\]. The HoNOS and HoNOS-SECURE also appear insensitive to change \[[@CR31], [@CR32]\]. There are also questions concerning the duration and intensity of interventions to optimize outcomes \[[@CR14]--[@CR16]\]. Forensic patients may require longer durations of treatment than community patients. Many patients are hospitalized within forensic services for more than five years \[[@CR33]--[@CR38]\]. Reasons for this are complex, with legal reasons balanced by clinical complexity \[[@CR31], [@CR36], [@CR38]\] and treatment needs \[[@CR22], [@CR23]\]. Cognitive impairment is likely to be an important determinant of ability to benefit from interventions in patients with schizophrenia \[[@CR9], [@CR39], [@CR40]\]. Cognitive impairments are associated with many mental disorders including schizophrenia, autism, dementias, bipolar disorder and depression \[[@CR41]--[@CR43]\]. Patients with cognitive impairments may struggle to focus on relevant information and to process, store, and utilize the information when required \[[@CR44]\]. Forensic patients who have been hospitalized for longer periods may be refractory to pharmacological and psychosocial treatments as a consequence of cognitive impairment \[[@CR23], [@CR45], [@CR46]\]. Because many studies find that a mean or median length of stay in medium security is approximately five years \[[@CR33]--[@CR38]\] and because this was close to the median length of stay in this sample, we took five years as a likely distinction between those who were responsive to treatment relevant to length of stay in a forensic hospital and those who were less responsive to relevant treatment. Because forensic services are costly and because of the limitations of pharmacological treatments, establishing the effectiveness of psychosocial treatments within this setting is a priority \[[@CR47]\]. We hypothesized that:forensic patients can benefit from a range of psychosocial treatment programs offered at a forensic hospital.patients hospitalized for less than five years benefit more from treatment than patients who were hospitalized for more than five years.cognitive impairment accounts for a significant amount of the variance in patients' ability to benefit from treatment programs.the DUNDRUM-3 will be sensitive to changes that are relevant to violence proneness. Methods {#Sec2} ======= Setting and sample {#Sec3} ------------------ This was part of a naturalistic four-year observational cohort study beginning in December 2012 ending in December 2016 carried out at the Central Mental Hospital (CMH), the only medium and high secure forensic hospital in the Republic of Ireland \[[@CR48]\]. At the time of the study, there were 94 secure beds on campus and 13 beds in the community for those on leave or conditionally discharged. These were stratified according to therapeutic security and risk-need principles, with high staff-to-patient ratios of multi-disciplinary care including nursing, psychology, social work, occupational therapy and psychiatry \[[@CR3], [@CR48]--[@CR51]\]. Only patients with a DSM-IV diagnosis of schizophrenia or schizoaffective disorder and who were in-patients at the start of the study were included (SCID) \[[@CR52]\]. Figure [1](#Fig1){ref-type="fig"} (CONSORT flow diagram) describes the sample and attrition at follow-up. In total 69 patients participated and completed all measures, 58 with schizophrenia and 11 with schizoaffective disorder.Fig. 1Consort flow diagram Most patients (82.6%) stayed in the study until the end of 2016. For those who did not stay until the end of 2016 the last assessment was taken as follow-up measure. Demographics are summarized in Table [1](#Tab1){ref-type="table"}. The mean DUNDRUM-1 triage security score was 3.03 (SD 0.47) indicating that all had a history of serious violence and the group had a need for treatment in conditions of medium or high therapeutic security at the time of admission.Table 1Demographics and sample characteristicsFull sample (*n* = 69)Less than 2112 days (*n* = 35)More than 2112 days (*n* = 34)$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$MS.D.$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$MS.D.$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$MS.D.Age39.7238.0011.1334.1133.006.9145.5043.5011.77DUNDRUM-1 triage security (0--4)3.033.000.472.953.000.553.073.060.38Length of stay at baseline (years)7.945.008.712.543.001.9613.5011.009.46Length of follow-up (years)3.424.001.323.034.001.623.824.000.76MCCB composite (t-score)21.0921.0014.2119.6816.0014.3422.5323.5014.14PANSS total score64.2760.0021.8067.7463.0025.7960.7158.5016.36PANSS positive14.3112.007.9815.4113.009.3813.2211.506.23PANSS negative19.0818.507.8618.6918.008.2519.4719.007.56CPZeq (mg/day)529.57467.00341.92526.66500.00284.27532.58458.50397.03*Note*: $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$ mean, *SD* standard deviation, *M* median, *MCCB* MATRICS consensus cognitive battery, *PANSS* Positive and Negative Syndrome Scale, *CPZeq* Chlorpromazine equivalent During the period of this naturalistic observational study, patients participated in a range of treatments routinely offered within forensic mental health services that could be described as 'treatment as usual'. The treatments target seven pillars of care which include programs focused on 1) physical health, 2) mental health, 3) drugs and alcohol, 4) problem behaviors, 5) self-care and activities of daily living, 6) education occupation and creativity, 7) family and social networks. Patients progress from less demanding to more demanding programs as operationalized within the DUNDRUM Toolkit manual \[[@CR18]\]. We believe these can be regarded as in keeping with multi-modal treatment \[[@CR16]\]. Measures {#Sec4} -------- ### Cognitive functioning {#Sec5} Cognition was assessed using the composite score of the MATRICS Consensus Cognitive Battery (MCCB) \[[@CR53]\] for patients with schizophrenia \[[@CR54]\]. The MCCB covers seven cognitive domains affected by schizophrenia: processing speed; attention /vigilance; working memory; verbal learning; visual learning; reasoning and problem solving; social cognition. In validation studies and in antipsychotic trials of stable patients, the MCCB demonstrated excellent reliability, minimal practice effects and significant correlations with measures of functional capacity \[[@CR54]\]. The MCCB was administered by masters level assistant psychologists trained in its use who worked independently of patients' multidisciplinary teams (MDT). The MDTs were blind to the MCCB results. Results are reported as t-scores (normal population mean = 50, standard deviation = 10). ### Presence of positive and negative symptoms {#Sec6} The total score of the Positive and Negative Syndrome Scale (PANSS) \[[@CR55]\] was used for the assessment of the severity of symptoms of schizophrenia. The PANSS was assessed by masters level assistant psychologists trained in its use. The inter-rater reliability of the PANSS is well established in this setting \[[@CR50], [@CR51]\]. Those rating the PANSS were blind to the MCCB and DUNDRUM-3 ratings for the same patients. ### Risk assessment {#Sec7} The Historical Clinical Risk Management Scale-20 (HCR-20; Version 2) \[[@CR25]\] is a structured professional judgment tool for assessing risk of violence, or violence proneness. The HCR-20 is among the most widely used violence risk assessment schemes \[[@CR26], [@CR27]\]. The HCR-20 contains ten historical or static items, five current or clinical items (HCR-20-C) and five future risk items (HCR-20-R). Both the clinical and risk items are thought to be dynamic in nature in that they can change over time and are amenable to therapeutic intervention and evaluating outcome. Because the historical items are static in nature only the dynamic scale (HCR-20-D) consisting of the sum of the HCR-20-C and HCR-20-R and the clinical and risk scales themselves will be used as outcome measurements. Each item is scored 0 to 2 (absent, possible and present) so that the sub-scales HCR-20-C and HCR-20-R each has a range 0 to 10 and the HCR-20-dynamic has range 0 to 20. In decision making, these are used as the basis for a structured clinical judgment; they are not interpretable as units of meaningful change. The inter-rater reliability and validity of clinically rated HCR-20 V2 is well established in this setting \[[@CR50], [@CR51]\]. Those rating the HCR-20 were blind to the ratings of MCCB and PANSS for the same patients and blind to the DUNDRUM-3 ratings of the consultant psychiatrist. ### Program completion {#Sec8} The DUNDRUM-3 programme completion scale measures participation, engagement and change in relation to seven treatment domains \[[@CR18]\]. It is an outcome measure, and is therefore compatible with any set of hospital programmes. This means that the DUNDRUM-3 can be used in any forensic hospital or other mental health settings and allows comparison across services. Progress is regularly reviewed at MDT case conferences. The DUNDRUM-3 allows for patients to be positively or negatively scored according to sustained evidence of having benefited from each treatment domain. This has good inter-rater reliability and internal consistency \[[@CR56]\] and has been validated against 'real world' outcomes including moves to less secure places \[[@CR22]\], conditional discharge \[[@CR23]\] and in-patient violence \[[@CR51]\]. #### Treatment as usual {#FPar1} The DUNDRUM-3 programme completion scale deliberately does not require any specific manualized or other treatment programmes, since individual patients will have varying needs, and there is no current basis to prefer any one manualised programme over another. Nor is there evidence that manualised programmes are necessarily better than less structured programmes \[[@CR17]\], when alternative structures may be more effective, including errorless learning and scaffolding \[[@CR57]\]. Each of the seven items of the DUNDRUM-3 programme completion scale lists representative programmes where useful \[[@CR18], [@CR31], [@CR56]\]. During the period studied, pillar I 'physical health' was managed in accordance with national standards \[[@CR58], [@CR59]\] while other relevant standards have also been summarized \[[@CR60]\]. This included a six-monthly full review by family practitioner and primary care nurse and access to a metabolic physician along with dentist, dietician, physiotherapy and other allied health professionals; pillar II 'mental health' programmes are based on internationally recognized treatment \[[@CR61]\] and medication protocols \[[@CR62]\] up-dated as appropriate in the light of evidence based guidance, the Wellness Recovery Action Plan \[[@CR63]\] and a range of modern evidence-based psychotherapies including cognitive remediation \[[@CR57]\], metacognitive therapy \[[@CR64]\] and cognitive behaviour therapies; pillar III the 'substance misuse recovery' programme included a four session brief information group then an eight session education group \[[@CR65], [@CR66]\], a full 28 session relapse prevention programme \[[@CR67]\] and an aftercare self-help group; pillar IV 'problem behaviours' are delivered in the form of a self-risk management group programme which includes a 33 session first phase in six modules \[[@CR68]\] and a second phase framework for behavioural analysis which typically includes an analysis of the most serious index offence in one to one work \[[@CR69]\]; pillar V 'self-care and activities of daily living' are delivered in accordance with principles of the Model of Human Occupation (MOHO) \[[@CR70]\]; pillar VI 'education' was delivered in accordance with national curricula while 'occupation and creativity' were delivered according to MOHO and educational principles; pillar VII 'family and intimate relationship' therapies were delivered variously by mental health social workers and trained family therapists. All programmes were organised into three phases: introductory phases consisting of short course interventions often oriented around giving information suitable for delivery during acute phases of illness, substantive phases delivered after the acute phases of illness and self-maintenance phases for follow-up. All were assessed for successful engagement according to five over-arching principles including cycle of change \[[@CR19]\], engagement, recovery \[[@CR20]\], hierarchy of needs \[[@CR21]\] and cultural integration (Table [2](#Tab2){ref-type="table"}) \[[@CR18]\]. Frequency and intensity of sessions has been described above. We regularly audited hours of engagement in structured therapeutic activities in accordance with the quality standard of 25 h per week \[[@CR71]\] and found that this was consistently met for 85% of patients. However during the period of this study we were not able to audit hours in each domain for each patient.Table 2Theoretical background for scoring DUNDRUM-3Units of meaningful changeCycle of change \[[@CR19]\]Engagement \[[@CR18]\]Recovery \[[@CR20]\]Hierarchy of needs \[[@CR21]\]Spiritual and cultural integration4: not ready to move down a level of securityPre-contemplation.Reluctance/ resistanceMoratoriumPhysiological needsAlienated3: ready for a move e.g. from high to medium securityContemplation & preparation, ambivalencePassive engagementAwareness, finding hopeSafety and basics of lifeCan engage only in 'trading' interactions on an impersonal or binary basis.2: ready for a move e.g. from medium to low securityAction / decisional balanceActive engagementPreparation, search for personal resources and external help, taking responsibilityFriendship and family relationshipsAccepts and commits to communal and social customs and affiliations.1: ready for a move to supported community living e.g. conditional discharge or community treatment orderMaintenance, supportedPositive engagementRebuilding, taking positive steps, establishing a positive identitySelf-esteem, confidence, social standingAccepts and commits to communal and social concepts of value and virtue.0: ready for independenceMaintenance, stabilityTaking personal responsibilityGrowth / sense of control / looking forward, finding meaning and purpose in lifeSelf-actualisation\ Expresses self in creative and communicative ways.Self-transcendence\ Fulfils roles and shares own resources (time, effort) for communal good #### Clinically meaningful units of change {#FPar2} DUNDRUM-3 programme completion scale is rated as seven items corresponding to the seven pillars of care and treatment listed above. Each item has five points (0--4), calibrated in clinically meaningful units of change. DUNDRUM-3 scores which are mostly 4 indicate that a move to a less secure place is not yet appropriate, 3 indicates a move from high to medium security, 2 indicates a move from medium to low security, 1 indicates readiness for discharge to community settings and 0 corresponds to independence \[[@CR18], [@CR56]\]. When all seven items are summated and dividing by seven this returns a mean item score that has the same range as the subscales (0 to 4) \[[@CR56]\] again corresponding to units of clinically meaningful change. The DUNDRUM-toolkit was found to meet most criteria for routine outcome measures in FMHS \[[@CR24]\]. The use of the mean item score has been documented elsewhere \[[@CR18], [@CR22], [@CR23], [@CR51], [@CR56], [@CR72], [@CR73]\]. The DUNDRUM-3 was completed by treating consultant psychiatrists all of whom act as trainers in its use. Those rating the DUNDRUM-3 were blind to the MCCB and PANSS ratings and blind to the current HCR-20 ratings. Statistical analysis {#Sec9} -------------------- Data were analyzed using SPSS-24. All measures were screened for outliers and normality. In total, four cases of the HCR-20-D were labeled as outliers identified by the outlier labeling rule and were winsorized \[[@CR74], [@CR75]\]. Paired sample *t*-tests were used to investigate whether HCR-20 dynamic scales or mean DUNDRUM-3 scores changed significantly from baseline to follow-up and within-group effect sizes (Cohen's *d*) were calculated where \> 0.2 is small, \> 0.4 is moderate and \> 0.8 is large \[[@CR75]\]. Additionally, a Reliable Change Index (RCI) \[[@CR30], [@CR32], [@CR76]\] was calculated for the DUNDRUM-3 and the HCR-20 dynamic scales to determine whether the magnitude of change was statistically reliable and not the result of measurement error. The RCI is a standard means of determining if a measured change is beyond that expected by measurement error. Because the DUNDRUM-3 is calibrated in clinically meaningful units of change, when the RCI is less than one such clinically meaningful unit, then a change of one unit in the mean item DUNDRUM-3 score is a reliable and meaningful change (RMC). The number and percentages of patients achieving RCI and RMC is also reported. The median length of stay at baseline was 2122 days, in keeping with the international average of approximately five years \[[@CR31], [@CR33]--[@CR37]\]. To explore the effect that length of stay at baseline had on change, a median split was applied. Paired samples t-tests were again applied to sub-groups with above or below median length of stay for the HCR-20 dynamic scales and the mean DUNDRUM-3 scores. Hierarchical multiple regression was performed to explore factors influencing change in the mean DUNDRUM-3. MCCB and PANSS were entered in two steps while controlling for age, gender and mean DUNDRUM-3 baseline score. PANSS was entered in the final step for two reasons: first, neurocognitive decline occurs prior to onset of psychosis and is relatively static whereas psychopathology is more amenable to treatment \[[@CR39]\], and second because the PANSS is contaminated by function. To investigate predictors in the group of patients who stayed in hospital for less than 2112 days at baseline, the regression was repeated for this subgroup. The mediation effects between MCCB, change in mean DUNDRUM-3, and change in HCR-20-C were explored using Hayes process macro model 4 in SPSS \[[@CR77]\] with 10,000 bootstrapped samples (Fig. [2](#Fig2){ref-type="fig"}).Fig. 2This figure is labelled to explain the meaning of the columns in Table [5](#Tab5){ref-type="table"}. C1, Direct effect of X on Y, before mediation via M; C2, direct effect of X on Y after mediation via M; A, indirect effect of X on Y mediated via M; B, direct effect of M on Y, adjusted for X HCR-20-C baseline scores and mean DUNDRUM-3 baseline scores were added as covariates. Results {#Sec10} ======= Hypothesis 1: Change in the mean DUNDRUM-3 and the HCR-20 dynamic scales {#Sec11} ------------------------------------------------------------------------ Mean DUNDRUM-3 scores for the total sample reduced by a mean of 0.29 points (range, 0 to 4) over the four-year period. This change was statistically significant (*t*(68) = 2.98, *p* = 0.004, d = 0.367). There was no significant reduction in the HCR-20 dynamic scale (*t*(68) =1.555, *p* = 0.125). The HCR-20 dynamic scales were further investigated by applying paired sample t-tests to the HCR-20-C and HCR-20-R scales separately. HCR-20-C reduced by an average of 0.81 points (range, 9) over the four year period, which was statistically significant (*t*(68) = 3.125, *p* = 0.003, d = 0.377). There was no significant reduction of the HCR-20-R (*t*(68) = − 0.436, *p* = 0.664) (Table [3](#Tab3){ref-type="table"}).Table 3Baseline, Follow-up and change over 4-year periodBaselineFollow-updifference*RCIRMC*$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$SDM$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$SDM$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$SDM*pd*n%n%Full sample *n* = 69 D-32.350.952.422.071.131.860.290.790.140.0040.3672231.81723 HCR-D7.984.488.007.294.576.000.703.710.000.1250.187710.1 HCR-C4.522.775.003.712.623.000.812.160.000.0030.377710.1 HCR-R3.462.103.003.562.423.00−0.101.930.000.664−0.05334.3Less than 2112 days (*n* = 35) D-32.620.963.002.291.162.140.330.870.140.0300.3921337.11131.4 HCR-D8.575.139.007.574.817.0014.071.000.1560.246411.4 HCR-C4.943.175.003.912.413.001.032.241.000.0100.495514.3 HCR-R3.632.283.003.662.763.00−0.282.050.000.935−0.12725.7More than 2112 days (*n* = 34) D-32.080.882.071.841.071.710.240.720.140.0650.339926.4617.1 HCR-D7.383.687.007.004.376.000.383.340.000.5090.11638.8 HCR-C4.092.263.003.472.463.000.592.080.000.1080.30225.9 HCR-R3.291.914.003.502.493.00−0.181.830.000.578−0.11912.9*Note*: $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \overline{x} $$\end{document}$ mean, *SD* standard deviation, *M* median, *D-3* DUNDRUM-3 Programme Completion scale, *HCR-D* HCR-20 dynamic items, *HCR-C* HCR-20 clinical items, *HCR-R* HCR-20 risk item, *RCI* Reliable Change Index, *RMC* Reliable and Meaningful Change The RCI for the mean DUNDRUM-3 was 0.81. It follows that the clinically meaningful change in mean DUNDRUM-3 score of one whole unit is always more than the reliable change index and is generally also a clinically meaningful change (RMC) representing a step from one level of therapeutic security to the next. RCI for the HCR-20-C was 3.35, a score that cannot be related to clinically meaningful change in the same way. For the mean DUNDRUM-3, 22 patients (30.4%) had a RCI change of 0.81 or more and 17 (23%) had a reliable and clinically meaningful change (RMC) of 1 or more. Seven patients (10.1%) showed RCI change when measured by the HCR-20-C. Hypothesis 2: Change in mean DUNDRUM-3 and HCR-20-C in shorter and longer stay subgroups {#Sec12} ---------------------------------------------------------------------------------------- Comparing baseline assessment and follow-up assessment of mean DUNDRUM-3 scores, paired t-tests revealed that there was a significant change in those who were in the hospital for less than 2112 days at baseline (*n* = 35; *t*(34) = 2.270, *p* = 0.030, d = 0.392) but not for the group of patients who were in the hospital for more than 2112 days at baseline (*n* = 34; *t*(33) = 1.908, *p* = 0.065). The HCR-20-C also changed significantly for the sub-group with shorter length of stay at baseline (*p* = 0.01, d = 0.495) but not for the longer stay sub-group. The two subgroups did not differ significantly in MCCB score, gender or baseline DUNDRUM-3. Patients who stayed in the CMH for more than 2112 days were significantly older and scored lower on the PANSS total score. Hypothesis 3: Cognitive impairment and symptom severity as predictors of change in mean DUNDRUM-3 over 4-year period in total sample {#Sec13} ------------------------------------------------------------------------------------------------------------------------------------ In hierarchical multiple regression the total model accounted for 19.2% (*F*(5, 53) = 4.235, *p* = 0.002) of the total variance in mean DUNDRUM-3 change scores. After controlling for age, gender, and mean DUNDRUM-3 baseline score, cognition explained 9.9% of the total variance of change in mean DUNDRUM-3 (*F-*change (1, 64) = 7.689, *p* = 0.007). Psychopathology added 7.4% to the total variance explained in mean DUNDRUM-3 change scores (*F-*change (1, 63) = 6.207, *p* = 0.015) (Table [4](#Tab4){ref-type="table"}).Table 4Summary of hierarchical linear regression model of the effect of predictors on change on program completion mean (D-3) at 4-year follow-upModel summary for each stepAdjusted *R*^2^*R*^2^ changeFull sample (*n* = 69) Age, gender, mean D-3 baseline0.0370.079  + MCCB0.1260.099\*\*  + PANSS0.1920.074\*Less than 2112 days (*n* = 35) Age, gender, mean D-3 baseline−0.0100.079  + MCCB0.1930.209\*\*  + PANSS0.3040.118\*Note: \**p* ≤ 0.05, \*\**p* ≤ 0.01. *MCCB* MATRICS Consensus Cognitive Battery, *PANSS* Positive and Negative Syndrome Scale, *D-3* mean DUNDRUM-3 Program Completion scale In the final model, three measures were statistically significant predictors of change in mean DUNDRUM-3 score, with mean DUNDRUM-3 baseline score having the highest beta value (β = 0.523, *p* = 0.001), followed by psychopathology (β = − 0.351, *p* = 0.015), and cognition (β = 0.338, *p* = 0.015). Hypotheses 3 and 2: Predictors of change in DUNDRUM-3 over 4-year period with patients with shorter length of stay at baseline {#Sec14} ------------------------------------------------------------------------------------------------------------------------------ In the subsample who were hospitalized for less than 2112 days, the model accounted for 30.4% of variance in the change of the mean DUNDRUM-3 over a four-year period (*F* (5, 29) = 3.965, *p* = 0.007). Cognition contributed 20.9% (*F*-change (1, 30) = 8.803, *p* = 0.006) to the model after controlling for age, gender, mean DUNDRUM-3 and cognition at baseline. Adding psychopathology increased the variance explained by 11.8% (*F-*change (1, 29) = 5.777, *p* = 0.023). Three predictors showed statistical significance in the final model. Baseline mean DUNDRUM-3 had the highest beta (β = 0.668, *p* = 0.002), followed by cognition (β = 0.501, *p* = 0.007), and psychopathology (β = − 0.447, *p* = 0.023). Hypotheses 4 and 2: Mediation analysis concerning the relationship between neurocognition, change in DUNDRUM-3 and change in HCR-20-C {#Sec15} ------------------------------------------------------------------------------------------------------------------------------------- We used mediation analysis (Fig. [2](#Fig2){ref-type="fig"}) between neurocognition (MCCB) as cause, change in violence proneness (HCR-20-C) as outcome and change in mean DUNDRUM-3 as mediator while controlling for baseline HCR-20-C and baseline mean DUNDRUM-3 for the total sample, and applied the same model to the subsamples with length of stay more than five years, and less than five years (Table [5](#Tab5){ref-type="table"}).Table 5Hayes Process Mediation Model 4 for 10,000 bootstrapped samples: Regression and mediation coefficientsChange in YC1: direct effect of X on Y before mediationC2: direct effect of X on Y after mediationA: indirect effect of X on Y mediated via MB: direct effect of M on Y adjusted for X*R* ^2^*p*Unstandardized effect size95% CIUnstandardized effect size95% CIUnstandardized effect size95% CIUnstandardized effect size95% CITotal sample n = 69 Model A  X = MCCB0.62410.0000−0.0065−0.0345, 0.02150.0307− 0.0057, 0.0671**0.03720.0129, 0.06631.84061.3673, 2.3138**  M = change D-3 mean Model B  X = MCCB0.60440.0000**0.01210.0019, 0.02230.02020.0064, 0.0340**0.0081−0.0020, 0.0168**0.26370.1959, 0.3316**  M = change HCR-CLess than 5 years *n* = 35 Model A  X = MCCB0.67480.0000−0.0338−0.0758, 0.00810.0213−0.0312, 0.0738**0.05510.0239, 0.09111.85971.1937, 2.5257**  M = change D-3 mean Model B  X = MCCB0.67680.0000**0.02370.0092, 0.03820.02960.0093, 0.0500**0.0059−0.0075, 0.0199**0.27970.1795, 0.3799**  M = change HCR-CMore than 5 years *n* = 34 Model A  X = MCCB0.65030.00000.0240−0.0146, 0.06260.0419−0.0144, 0.09810.0179−0.0211, 0.0744**2.0991.3878, 2.8104**  M = change D-3 mean Model B  X = MCCB0.63150.0000−0.0026−0.0167, 0.00150.0085−0.0115, 0.02850.0111−0.0018, 0.0260**0.26530.1754, 0.3551**  M = change HCR-CNote: *CI* Confidence interval, *MCCB* MATRICS consensus cognitive battery, *D-3* DUNDRUM-3 Programme Completion Scale mean total score, *HCR-C* History-Clinical-Risk Management-20 clinical items. In Model A the outcome variable (Y) was change in HCR-20 clinical items during the study. In Model B the outcome variable (Y) was change in DUNDRUM-3 Programme Completion Scale mean total score during the study. X, independent variable; M, mediator variable. All models were controlled for HCR-20 clinical baseline scores and DUNDRUM-3 mean total score at baselineModel A: Y = HCR-20 clinical score change over four years. Model B: Y = DUNDRUM-3 mean total score change over four years; Results in bold are statistically significant For the total sample and the shorter stay subsample the effect of MCCB on change in HCR-20-C was completely mediated via change in mean DUNDRUM-3. To explore the direction of the effect, we next tested the MCCB as cause, change in mean DUNDRUM-3 as outcome and mediation between MCCB and DUNDRUM-3 via change in HCR-20-C. There was a direct effect of MCCB on change in mean DUNDRUM-3 and this was not mediated via change in HCR-20-C. MCCB did not affect change in DUNDRUM-3 when controlling for change in HCR-20-C. Therefore this was specific to change in mean DUNDRUM-3 as mediator. Change in mean DUNDRUM-3 had a significant effect on violence proneness (HCR-20 clinical items) when controlling for cognition for the total sample and subsamples (Table [4](#Tab4){ref-type="table"}). This shows that for the total sample in the mediation model a change of 1 point on the mean DUNDRUM-3 score (range 0 to 4) is related to a change of 1.8 on the HCR-20-C score (range 0 to 10). For the longer stay sub-sample, the relationship between neurocognition and violence proneness was not mediated by change in mean DUNDRUM-3. Discussion {#Sec16} ========== Although there is evidence that FMHS reduce the risk of reoffending for patients with schizophrenia and a history of violence it is unclear whether this is attributable to psychosocial treatments \[[@CR3]\]. Using the mean DUNDRUM-3 programme completion score, a measure of response to multi-modal treatment, we have shown that patients with schizophrenia or schizoaffective disorder treated within a forensic hospital can achieve both reliable (31%) and reliable and clinically meaningful change (23%). This change concerns their participation, engagement and sustained progress across seven domains of treatment over four years. Changes in the mean DUNDRUM-3 were also associated with changes in a measure of violence proneness, the HCR-20-C. The latter is important because of the link between perceived risk of violence, treatment completion, recovery and longer lengths of stay \[[@CR22], [@CR23], [@CR28], [@CR30], [@CR31], [@CR45]\]. It has also been shown that factors related to seriousness of violence and need for higher levels of therapeutic security predict length of stay \[[@CR46]\] and the DUNDRUM-3 is calibrated in units relevant to diminishing need for secure care. Patients hospitalized for less than five years at baseline benefited more from treatment than patients who were hospitalized for more than five years. Cognitive impairment accounted for a significant amount of the variance in patients' ability to benefit from treatment programs. For the full sample we found no significant change in the HCR-20-D other than a small but significant reduction in the HCR-20-C scale (10.1% achieved reliable change). For the mean DUNDRUM-3 there was a significant mean change though this was also small. However, substantial numbers of forensic patients achieved reliable (31%) and clinically meaningful change (23%) in the mean DUNDRUM-3 score. This was hidden within what appear to be small mean changes. In this study effect sizes for mean change (d) \[[@CR74], [@CR75]\] were uninformative, appearing moderate even when actual mean change was small. In contrast, percentages achieving reliable and clinically meaningful change \[[@CR76]\] were more informative. Because many patients experience cognitive impairment and remain symptomatic even when adhering to pharmacotherapy we also investigated the impact of cognition and symptoms on treatment outcome \[[@CR44], [@CR57]\]. Cognition accounted for 12.6% of the variance in mean DUNDRUM-3 change and when combined with symptoms the total model accounted for 19.2%. We hypothesized that those with a longer length of stay at baseline would have less response to treatment than those who were earlier in their hospital stay. We divided the sample using a median split for length of stay approximating to five years. Those who had shorter lengths of stay at the point of entry had a greater change in the DUNDRUM-3. Within the group with shorter length of stay, both cognition and symptoms accounted for larger significant changes on the DUNDRUM-3 scale with cognition accounting for 20.9% of the variance. Finally, because there was a small but significant change in the HCR-20-C we carried out a mediation analysis to investigate whether cognition affected patients' violence risk when mediated by treatment change. We compared two models to find a preferred model. The effect of cognition on violence risk was completely mediated by change in mean DUNDRUM-3 within the total sample and the shorter stay subsample. We then found that there was no evidence that change in violence risk mediated ability to benefit from programmes. Violence risk as measured by the HCR-20-C scale was reduced by participation in psychosocial treatments, where participation was in part determined by cognitive ability. Because cognitive problems amongst patients with schizophrenia are thought to occur prior to the onset of psychosis and cannot be ameliorated by medication \[[@CR39], [@CR40]\] we have not included symptoms in these mediation models. Our comparison of models suggests a causal pathway from cognition, to ability to make progress in psychosocial treatment as measured by change in the mean DUNDRUM-3, to change in violence risk as measured by the HCR-20-C. For every change of one point mean DUNDRUM-3 score (out of a possible 0 to 4) the HCR-20-C scale changed by 1.8 points (out of a possible 0 to 10). The findings of this study have theoretical and practical implications. Careful consideration needs to be given to how change is measured. Although the HCR-20 is used to guide treatment and there is some evidence of sensitivity to change between admission and discharge, though not in relation to risk factors such as stress or lack of personal support \[[@CR27]\], this study casts doubt on the sensitivity of the HCR-20 to detect change, in line with recent work \[[@CR28]--[@CR31]\]. Whilst the HCR-20 measures risk factors for violence, the mean DUNDRUM-3 focuses on participation in multi-modal clinical interventions and appears to be more sensitive to change. The findings of this study support a model in which multi-modal program completion mediates the relationship between cognition and violence risk. We have shown that change in a measure of multi-modal treatments was related to a reduction in a measure of violence proneness. Clinicians need to be aware of the impact that cognition and symptoms have on patients' ability to participate in treatment. Patients may benefit from cognitive remediation therapy \[[@CR57]\] and medication review \[[@CR14]\] prior to commencing psychosocial interventions. It remains unclear for how long patients should be hospitalized. Increased duration of treatment appears to benefit outcomes only to a point. Patients require a period of time before making reliable and clinically meaningful changes but within this study, those hospitalized for longer than five years had little further change. The reason for this is unclear. The longer stay group did not have lower scores on neurocognition and had a lower symptom score. Patients hospitalized for longer periods may have complex needs and require different interventions. Limitations and strengths {#Sec17} ------------------------- This is a mixed cross-sectional and prospective cohort study. While a fully prospective study of incident cases would have many advantages, it would take many more years to complete. Cross-sectional studies also have advantages in generating timely information \[[@CR37]\]. We are gathering information for an eventual incident prospective cohort study. The majority of patients were male. The effect of gender might be underestimated \[[@CR26], [@CR27]\]. The findings of this study apply to forensic patients with schizophrenia and schizoaffective disorder at a medium and high level of therapeutic security. The findings may not apply to patients with personality disorders as sole diagnosis. We did not prospectively investigate the number of hours of participation in each program or reduction of violence proneness from the point of admission into the hospital but rather followed up a cross-sectional sample with varying initial lengths of stay. The methodology employed may obscure important temporal and cohort effects on patients' ability to benefit from treatment. A prospective study of incident cases would need to be conducted over an extensive time period. Only randomized positive controlled trials would help determine the causal relationships between psychosocial interventions and outcomes. Strengths of this study were that it included most of a national cohort of forensic patients, it used a longitudinal design over four years and employed a range of independently made measures. We have not relied exclusively on manualised treatment programmes for reasons set out above \[[@CR16], [@CR17]\]. There are examples of problems with over-reliance on manualised programmes. Livingston et al. \[[@CR78]\] in a demonstration project found that "Despite succeeding in supporting patients' participation, the intervention had minimal impacts on internalized stigma, personal recovery, personal empowerment, service engagement, therapeutic milieu, and the recovery orientation of services. Peer support demonstrated positive effects on internalized stigma and personal recovery". Similarly, for the manualised START NOW for offending behaviour the lead validation study \[[@CR79]\] showed that in a retrospective cohort analysis of prisoners, the more sessions attended, the greater the benefit. In a secondary analysis of this non-randomised cohort study \[[@CR80]\] the authors noted "unmeasured external forces concurrent to START NOW may have influenced later hospitalization (for example, other programming)." We believe this is particularly important for two reasons. First, those who completed other treatments such as substance misuse programmes may have had better outcomes than those who only did START NOW. In keeping with this, Yoon et al. \[[@CR81]\] noted that studies of psychological treatments of prisoners that used waiting list or 'no treatment' control groups had higher effect sizes than studies using active treatment 'treatment as usual' controls. The DUNDRUM-3 addresses this directly by including a range of relevant treatment domains to measure TAU. Secondly, the 'dose-response' design \[[@CR80]\] is vulnerable to the criticism that those who are most able will attend the most sessions and have the best outcomes, not because of the benefits of treatment but because of some pre-treatment factor \[[@CR82]\] such as the common underlying (confounding) factor of neurocognitive ability. It is for this reason that we have adopted the method of mediation analysis with respect to functional neurocognitive ability. Finally a number of recent studies have examined psychosocial approaches to treatment in this patient group. Dumont et al. \[[@CR83]\] showed that an intervention to increase patient engagement by establishing a peer support program, strengthening a patient advisory committee, and creating a patient-led research team did strengthen patient engagement but "strengthening patient engagement contributes toward improving experiences of care in a forensic hospital, but it may have limited effects on outcomes". Fazel et al. \[[@CR84]\] and Chang et al. \[[@CR85]\] demonstrated that antipsychotic medication, stimulant medication and medication for addictions reduced violent recidivism in appropriate diagnostic groups; in secondary analyses they showed that completion of psychological treatments targeting general criminal attitudes and substance misuse was associated with reductions in violent reoffending. Further, the associations with these psychological programs were not stronger than those for medications. Specific violence prevention therapies were not associated (positively or negatively) with violent recidivism. Young et al. \[[@CR86]\] offer the nuanced interpretation that a stable mental state following antipsychotic medication is a key factor that predicts treatment completion, while the best predictor of treatment effectiveness was attitude towards violence. Many further questions arise: for example, in a substance misuse programme designed for delivery in 28 group sessions of two hours each, is it better to have one session a week for six months, two sessions a week for three months or three sessions a week for nine weeks? For patients with schizophrenia and cognitive impairment, will such programmes work better after a course of cognitive remediation, meta-cognitive therapy or other elements of an in-patient multi-modal therapy programme in a secure forensic hospital? How many hours per week can patients with schizophrenia and neurocognitive impairments benefit from before becoming cognitively overloaded? These important and unanswered questions could be addressed based on the methodology described here. We suggest that a system capable of assessing change due to a range of multi-modal treatments over sustained periods is a way forward, enabling dismantling studies to determine the benefits of individual elements and enabling randomised positive controlled trials to compare the addition of new treatments to treatment as usual. Future research should continue to investigate the roles that the method of measurement, cognition, psychopathology, and length of stay have as moderators or mediators of treatment outcome. The 'dose' and intensity of treatment and the sequencing of treatments such as cognitive remediation, metacognitive therapies, cognitive behavioural therapy and specific programmes for specific problem behaviours all require further 'dismantling' research \[[@CR16]\]. It would be advantageous to develop an international consensus on 'treatment as usual' within forensic services as a means of benchmarking progress and clinical innovation. Randomized controlled trials can only be meaningfully interpreted when there is a consensus about 'treatment as usual'. This method of measurement of change in units of reliable and clinically meaningful outcome represents one possible method for comparing outcomes across services, time periods and case mixes, when case mix is controlled for. Conclusion {#Sec18} ========== This study set out to employ several methodological advances concerning the conduct of clinical research and service evaluation. These results demonstrated that the methods used capture measures of 'treatment as usual' which will form the basis for randomised controlled trials. These findings illustrate the importance of using reliable and clinically meaningful change \[[@CR30], [@CR32], [@CR76]\], and more fundamentally, we have shown the value of using measurement scales calibrated in clinically meaningful units \[[@CR18]\]. These methods were used to examine the extent to which prolonged treatment for schizophrenia in a secure forensic hospital is beneficial, and the limits of that benefit over time. This study provides a means of assessing the multi-modal, biopsychosocial treatment offered for patients with schizophrenia as 'treatment as usual' in a secure forensic hospital. In keeping with those findings which suggest a lower risk of reoffending \[[@CR3]\], forensic patients with schizophrenia and schizoaffective disorder appear to benefit from multi-modal psychosocial treatment. A lowered risk of violence is itself an indication of functional recovery in an important domain \[[@CR22], [@CR23], [@CR44], [@CR45]\]. This study suggests that the lowered risk of re-offending may be partially attributable to participation and engagement in psychosocial interventions while cognitive impairment and symptom severity reduce the benefits of treatment on violence proneness. The magnitude of this benefit appears to be a function of the phase of treatment \[[@CR87], [@CR88]\], the outcome measure used, the use of meaningful units of change, the degree of cognitive impairment, psychopathology, and length of stay. Careful consideration needs to be given to these variables when designing and delivering programs, estimating required duration of treatment, evaluating progress and designing future randomized controlled trials. We believe this is in keeping with the growing movement towards routine outcome measurement and feed-back informed treatment \[[@CR89]\]. For the future, the effect of the 'dose' of treatment should be considered as duration and frequency of treatment sessions, the sequencing of various modalities (cognitive remediation followed by metacognitive therapy followed by problem focused approaches) and sequencing or concurrence of treatment programmes (physical health, mental health, substance misuse, specific problem behaviours and negative attitudes, self-care and activities of daily living, education occupation and creativity, family and intimate relationships). It would also be useful to examine the ways in which these treatment programme variables interact with patient characteristics such as phase or stage of illness, neurocognitive and social cognitive impairments and symptom severity. A : Indirect effect of X on Y mediated via M B : Direct effect of M on Y, adjusted for X C1 : Direct effect of X on Y, before mediation via M C2 : Direct effect of X on Y after mediation via M CI : Confidence interval CMH : Central Mental Hospital, Dundrum, Dublin CPZeq : Chlorpromazine equivalents D : Cohen's d, effect size D-3\` : DUNDRUM-3 programme completion scale DSM-IV : Diagnostic and Statistical Manual 4th edition DUNDRUM toolkit : Dangerousness, Understanding, Recovery and Urgency Management Manual DUNDRUM-1 : Dundrum-1 triage security scale (nine item) DUNDRUM-3 : Dundrum-3 programme completion scale FMHS : Forensic mental health services HCR-20 : Historical-Clinical-Risk Management Scale-20 Version 2 HCR-20-C : HCR-20 current or clinical items scale HCR-20-D : HCR-20 dynamic (sum of C and R) items scale HCR-20-R : HCR-20 risk or future items scale M : Median MCCB : MATRICS consensus cognitive battery MDT : Multi-disciplinary team NFMHS : National Forensic Mental Health Service PANSS : Positive and negative symptom scale RCI : Reliable change index RMC : Reliable and clinically meaningful change SCID : Structured clinical interview for DSM disorders SD : Standard deviation SPSS-24 : Statistical package for the social sciences version 24 x : Mean The authors wish to acknowledge the patients who participated in the study and who actively participated in earlier parts of this programme when the treatment programmes themselves were developed. The authors also wish to acknowledge the many psychology assistants and other clinicians whose work formed the basis for this study. Funding {#FPar3} ======= This work was carried out as part of routine outcome measurement and service evaluation. No special funding was provided. Availability of data and materials {#FPar4} ================================== The DUNDRUM toolkit is freely available to download subject to creative commons license. The datasets analysed during the current study were collected in the course of routine outcome measurement. These are not publicly available due to the sensitivity of the data, but are available from the corresponding author (HGK) on reasonable request. HGK initiated the study. HGK and KO'R designed the study and supervised the processes of data collection and data analysis, with AC and GD. MSR carried out the data analysis and wrote the first draft of the article. MD, CH, OB and KS collated and organised data collection. DOS, PO'F, CC, TN, AN and PO'C organised and delivered interventions and carried out ratings. All authors contributed to the final draft. All authors read and approved the final manuscript. Ethics approval and consent to participate {#FPar5} ========================================== The Research Ethics and Effectiveness Committee of the NFMHS CMH approved the study in accordance with the Declaration of Helsinki. All subjects gave written informed consent prior to participating and were assessed as having the functional mental capacity to do so and did so voluntarily. This study did not make new demands on patients: they needed only to consent to the use of their data in research. The most important ethical issues were understanding of the proposed use of their data and given that all were detained initially, their voluntariness. No data that could identify any individual is published. Consent for publication {#FPar6} ======================= Not applicable. No data that could identify any individual is published. Competing interests {#FPar7} =================== The authors declare that they have no competing interests. Publisher's Note {#FPar8} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
{ "pile_set_name": "PubMed Central" }
Spring is here! At last after a long winter we’re now seeing blue skies, warmer days and fresh new plants arriving daily. It’ll soon be time to start using the garden again and enjoying the largest room of your home. Now is the perfect time to start realizing your dreams for that perfect […] Clean Air Plants For centuries people have brought plants indoors to decorate their homes. There’s just something about the lush, living greenness that comforts and soothes the soul. Now there is scientific evidence to corroborate that feeling. In 1989 a study was conducted by NASA to find what effects plants have on air quality. Over […] We are excited to be partnering with the Woodman Museum! For the month of December bring your museum receipt or membership card into Wentworth Greenhouses and receive 10%off your purchase, bring your Wentworth Greenhouse receipt to the Woodman Museum and receive half price admission! Discover the Woodman Museum
{ "pile_set_name": "Pile-CC" }
--- bibliography: - 'lit.bib' --- [**Diboson-Jets and the Search for\ Resonant $Zh$ Production**]{} 1.0cm [Minho Son$^1$, Christian Spethmann$^2$, and Brock Tweedie$^2$]{} 0.4cm [*$^1$Department of Physics, Yale University, New Haven, CT 06511*]{}\ [*$^2$Physics Department, Boston University, Boston, MA 02215*]{} 2.5cm New particles at the TeV-scale may have sizeable decay rates into boosted Higgs bosons or other heavy scalars. Here, we investigate the possibility of identifying such processes when the Higgs/scalar subsequently decays into a pair of $W$ bosons, constituting a highly distinctive “diboson-jet.” These can appear as a simple dilepton (plus ) configuration, as a two-prong jet with an embedded lepton, or as a four-prong jet. We study jet substructure methods to discriminate these objects from their dominant backgrounds. We then demonstrate the use of these techniques in the search for a heavy spin-one $Z'$ boson, such as may arise from strong dynamics or an extended gauge sector, utilizing the decay chain $Z' \to Zh \to Z(WW^{(*)})$. We find that modes with multiple boosted hadronic $Z$s and $W$s tend to offer the best prospects for the highest accessible masses. For 100 fb$^{-1}$ luminosity at the 14 TeV LHC, $Z'$ decays into a standard 125 GeV Higgs can be observed with 5$\sigma$ significance for masses of 1.5–2.5 TeV for a range of models. For a 200 GeV Higgs (requiring nonstandard couplings, such as fermiophobic), the reach may improve to up to 2.5–3.0 TeV. Introduction {#sec:intro} ============ Tagging Diboson-Jets {#sec:jetsub} ==================== $Z' \to Zh$ Search {#sec:results} ================== Conclusions {#sec:conclusion} =========== Analysis Details {#sec:details} ================ Detector Model {#sec:detector} ==============
{ "pile_set_name": "ArXiv" }
The present invention relates to a plate-like plant carrier for purposes of cultivating layers, i.e. plants in their very early growth, and to have seeds germinate; and particularly the invention relates to a plant growth structure on or as part of plant tables in horticulture, or to be used directly in the ground, or in flower boxes or other open growth systems or in closed systems (glass houses), all for cultivating plants in their early stages. It is known to cultivate plants in boxes, in flats, i.e. in flat boxes made of wood or synthetic material. The flat configuration may also be the result of a small, usually square or rectangularly-shaped and usually plastic flower boxes. What happens to the boxes after planting has obtained is often not deemed a factor, but for reasons of ecology it is. Reference is not made here to the situation of the direct re-use of the boxes after emptying them for planting; of course such boxes can be used over and over again for the same purpose. But presently it is of interest here are that there are situations in which, for some reason, it is not desirable to disturb the seedlings or plants but to leave the container in place, i.e. the plants are just planted in their container. This may readily result in ecological problems. The principle of containing a plant and root system in a small, box-like container carries with it the following problem: a certain amount of water retention is required so that the root system and surrounding soil will not dry out too quickly. On the other hand, if insufficient drainage is provided, then the plant system may begin to rot or be prone to other forms of sickness. It is also known to use very finely ground peat and to press a certain portion into a rod-like configuration. This peat rod is then surrounded by and held in a net made of synthetic material which is configured in this case in that it can deform elastically. Such a rod or strand is then cut into a suitable length and is used for individual cultivating and planting of seeds and small plants. If the pressed strand is watered it will swell as the surrounding synthetic net expands. The finely ground peat, however, has a very small pore volume when compressed, which has an effect on the growth of the plant. In addition, any capillary action is rather poor in compressed peat. Hence, such finally ground peat is a poor agent as far as rewetting is concerned. Certain greening flats are known, for example, for use as roof covers or as embankment covers. In the latter case, the task is to have the roots of the plants traverse their container as fast as possible so that the roots physically combine with the underlying soil. In this way one makes sure that the entire arrangement is rapidly and so-to-speak naturally anchored to the ground. On the other hand, roof covers are usually made of mats which contain both plant food and grass seed. These mats are constructed such that the cover on which the mat rests should not receive much moisture, that is, the mat is comprised, for example, of a synthetic layer upon which are deposited layers of nutrients and other plant food to enable the grass to germinate and grow. These mats are constructed for exactly that particular purpose, namely, for providing a green cover on a roof, and these rather highly, specialized mats are usually not useful in a different environment.
{ "pile_set_name": "USPTO Backgrounds" }
Wednesday, November 14, 2012 The Perfect Fall Salad: Redbor Kale with Roasted Squash and Orange Calling this the perfect fall salad is a big claim. But really, it is. Earthy Redbor kale (a purple or pinkish variety) is dressed in a lightly sweet, tangy vinaigrette with thefragranceof fresh orange. Roasted butternut squash lends heartiness and fall color to the salad, and supremed oranges make it delightful. Fall color abounds, with a wonderful selection of seasonal vegetables and fruit. I daresay this is just the salad to grace your Thanksgiving table, or perhaps just a healthy something for the chef as he or she cooks. Either way, you need this kale salad. Read more from Elizabeth and Brian on Brooklyn Supper. Follow Brooklyn Supper on Facebook and Twitter for updates. Dont miss the latest from The Family Kitchen Like Us on Facebook! Were pinning are you? Follow Brooklyn Supper on Pinterest! Banana Squash Information, Recipes and Facts Information about Banana Squash including applications, recipes, nutritional value, taste, seasons, availability, storage, restaurants, cooking, geography and history. Liz Johnson - Small Bites Food Finds in the Lower Hudson Valley Food Finds in the Lower Hudson Valley ... Hey Hey! A pleasure to meet you all, Im Christina Halpin and I couldnt be more thrilled to participate in Hudson ... A Veggie Venture's Recipe Box: Letter T Alphabet of Vegetables A huge collection of vegetable recipes. Calorie, carb counts, Weight Watchers points, time requirements. Great for families, singles, CSA shareholders, all vegetable ... Recipes Whole Foods Market Make this simple seasonal jam in minutes and gift to friends and family in small jars. Since this is a quick jam, it's not meant for long-term storage but rather for ... Easy Recipes - KitchenDaily - Recipes and Cooking Inspiration ... Easy Recipes with ratings, reviews and menus ... Browse all recipes from chicken to zucchini, find menu ideas, and get nutritional information from KitchenDaily. Recipes - How To Information eHow.com Season 1: Grilled Zucchini Medallions With Pita Recipe; Season 1: Fresh Garden Salad & Goat Cheese Toast Recipe; Season 1: Creamy Thyme Scrambled Eggs Recipe All About Food Food, photos and recipes from here, there and ... It can be a challenge cooking for two. When I made a big batch of Baked Garden Vegetable Stack the other day, I had a lot of tender vegetables left over. Healthy Recipes and Meal Ideas Trying to find healthy and delicious recipes? Food Network makes that easy with their collection of low fat, low calorie and low carb recipes. Food on Shine - Yahoo! Shine - Women's Lifestyle Healthy Living ... Secrets to make the most of your slow-cooker Shine Food - Mon, Nov 5, 2012 5:30 PM EST. By Mandy Major Slow cooking is the savoir of a hectic home kitchen: It's ... Food & Drink - How To Information eHow.com Food & Drink: Don't let that next party be a flop. Be the envy of your friends thanks to eHow's entertaining secrets sure to make that next affair a success. Food is ...
{ "pile_set_name": "Pile-CC" }
A recent Washington Post article, citing a Chicago Council poll, suggests President Trump’s base is arguably opposed to a drawdown from Syria. That seemed counter-intuitive to me, because in the last four U.S. presidential elections the candidate who promised to draw down from endless foreign entanglements has won. Of course, none of them followed through. President George W. Bush wanted to focus on China, and opposed the humanitarian interventions in the Balkans, only to face the September 11 attacks, which put the United States into overdrive. At least he had a genuine excuse in the early days of Islamist militancy. President Obama had none. After promising a restrained, realist foreign policy based on national interest and not values promotion, Obama was blindsided by three, er, advisors—Hillary Clinton, Susan Rice, and Samantha Power—who pushed to double down in regime changes in the Middle East. The results altered the geopolitics and demographics of North Africa and Europe for decades to come. As I delved deep into the Chicago Council Poll, it became a lot clearer. The key, you see, is in the question’s framing. The question asked is so vague and diluted that it is almost meaningless. It asked: Would Americans support the deployment of U.S. troops “to fight against violent Islamic extremist groups in Iraq and Syria”? Well, of course, no rational individual would oppose that. But that doesn’t really give you much. Imagine if this same question was turned on its head, to “Would you support and pay taxes to champion the open-ended deployment of your cousin or colleague from Michigan to see that the Turks and Kurds don’t fight over Manbij?” The answer would be a lot more complicated. Yet you would still see polls and surveys being shared by “journalists” that attest to the confirmation bias of the publications they write for. Why is this skullduggery tolerated? To paraphrase Peter Hitchens, polls and surveys have ceased to be objective ways to measure public opinion and instead aim to influence and channelize them. But the public deserves to know and deliberate, which is one of the beauties of democracy, unlike certain authoritarian countries, where bodies of soldiers are buried in the dark. With that in mind, let us do a simulation, and discuss some key questions to ask any time someone is suggesting a foreign intervention. 1. Where Should One Intervene, and Why? Are interventions for humanitarian purposes? If so, where and which countries deserve an intervention, and for how long? There are currently 17 civil wars going on in the world, other than the four one often hears about in Yemen, Syria, Iraq, and Afghanistan. There are severe civil wars going on in Darfur, Somalia, Burkina Faso, Philippines, Eastern Ukraine, Libya, Nigeria, Central African Republic, Mali, and Myanmar. Should we intervene in all of these? If not, which, and why? What happens when humanitarian interests collide with strategic interests? In Syria, for example, there are no friendly forces, but a trilateral proxy war between Saudi-Qatari backed Islamists, ISIS, and Assad-Iran-Russia axis. So the only forces America can realistically back are the Kurds, who intend to establish a Stalinist statelet. But is the United States willing to create a Kurdish state, even in the face of hostility and threat of invasion of Turkey and Iran, both of whom would lose portions of their country if Kurdistan turns independent? The cynic in me doubts the prudent U.S. foreign policy would risk a scenario of Turkey drifting towards Iran and Russia, opposing an independent, U.S.-backed, Kurdish state. 2. What Constitutes a ‘Win’? What are the end goals of intervention? Is it establishing civil society and liberal democracy in regions that have historically never been liberal or democratic? Every single region on the planet has its own system of governance influenced by history, geography, and culture. The examples of Germany and Japan after the Second World War are often given, but Germany and Japan were both westernized advanced societies, even prior to the world war. The institutions were already there. In feudal and tribal regions, the way that could be changed is through hundreds of years of colonization. An example might be India, which was feudal in the last days of the Mughal Empire but turned into a parliamentary democracy, even if not fully liberal. But it took more than 300 years of British colonization to set up and consolidate those institutions. So, to put it simply, are American taxpayers willing to fund the cost to colonize large swathes of Middle East, North Africa, and Central America to see if they turn to liberal paradises? That would entail establishing colonial outposts and permanent constabulary forces to maintain law and order in frontiers like El Salvador, Honduras, Afghanistan, and Iraq. It is theoretically a valid strategy but, like everything else, it would need explicit approval of the majority of Americans and their representatives in the Congress, after careful cost-benefit analysis. If the end goal is anything but this, I’m afraid there’s disappointment ahead. It is unlikely there’s going to be a geostrategic change on the ground, and that justifies greater Russian and Iranian interest in the region. Simply put, Russia and Iran had a client state in Syria since the 1970s, which is key not just to their naval and air bases, but also to their geostrategy in the region. To use a Vietnamese phrase, when we fight to win, they fight to survive. Their will to escalate will always be more than ours, simply because we have nothing to lose in that region. The American regional footprint, to give an example, is more than 50,000 soldiers, and three naval bases. No matter the humanitarian cost, Syria isn’t strategically important to the United States. Losing Syria for Russia, however, would mean they would not have a single naval base in the Mediterranean. The question, therefore, is this: Should we escalate and see how far this goes, over a cancerous and hostile hell on earth that is insignificant to greater American geostrategy? 3. Do We Have the Requisite Brutality to Finish Any Insurgency? This is the most important question one can hear in talks in strategic circles. A recent research paper, for example, suggests that the Western way of a counterinsurgency operation is simply not brutal enough to end insurgencies permanently. Post-WWII, the rules of engagement by Western military forces broadly follow the dictates of human rights. It’s broadly because sometimes it gets impossible, like the evacuation operations in Raqqa. But overall, the dogma is one of winning “hearts and minds”—that is, setting up institutions—to counter insurgencies. Research suggests otherwise. Of the recent successful counterinsurgency operations, the ones that succeeded, like against the Tamil Tigers in Sri Lanka, Malaya by Great Britain, Punjab by India, and Grozny by Russia, didn’t aspire to win hearts and minds, but a more medieval, “Carthage must be destroyed” clean-up operations with minimal respect to rights-based engagement. In sum, the evidence overwhelmingly suggests that instead of winning “hearts and minds,” extreme and prejudicial punitive deterrence, circling and walling off the cancerous region, and establishing strongman client rules instead of liberal institutions has ended insurgencies. The alternative to that is this whack-a-mole forever war, which the West and especially the United States have been continuing since 1993. These questions are admittedly more difficult than the sham surveys one can see justifying open-ended interventions and talking points in the media. Nor is it in the scope of this article to answer all these questions. But these are necessary nevertheless and needed to determine the course of a future conservative, restrained, and realist foreign policy, strictly based on narrow national interests and not some utopian, open-ended, idealistic endeavor to change the course of history. Sumantra Maitra is a doctoral researcher at the University of Nottingham, UK, and a writer for The Federalist. His research is in great power-politics and neorealism. You can find him on Twitter @MrMaitra.
{ "pile_set_name": "Pile-CC" }
Guntis Valneris Guntis Valneris (born in Riga) is a Latvian draughts player. 1994 World champion in international draughts, two-times European champion (1992, 2008), two-times World champion in fast draughts (1999, 2007), three-times Junior World champion (1984–1986), multiple times Latvian national champion. Career highlights Guntis Valneris started playing draughts when he was 10 years old. Viktor Adamovich became his first coach. In a year, Guntis won the Latvian U18 championship in Russian checkers, and at the age of 13 he was already the winner of the Latvian senior championships and the U18 USSR Champion. Another future World champion, Alexander Schwarzman, was one of the players he defeated at the Soviet U18 championships. In 1982 Guntis Valneris switched to international draughts, with Emmanuils Merins becoming his new coach. Under Merins's guidance, Valneris three times in a row won the World Junior Championships. In 1985 he won his first senior Latvian championships in international draughts, and two years later he shared the first place at the senior USSR championships, losing gold medal in an ensuing barrage. 1987 was Valneris's debuting year in the European senior championships, and the next year he for the first time played in the senior World championships. Both times he finished with a good overall balance but not on a podium. Then in 1990 he tied for the second place at the World championships with the Dutch master Ton Sijbrands; a re-match for the silver medals was supposed to take place, but Sijbrands forfeited, and Valneris automatically proceeded to the championship match against the defending world champion Alexei Chizhov next year. The match that took place in Tallinn ended with Chizhov's unqualified victory. This defeat did not stop Guntis. He won the European championships in Parthenay in 1992 and then the World championships in the Hague in 1994. The next year, in a return match, Chizhov took the world title back from him. In fact, the match was tied after the initial four sets, and then Chizhov managed to win a tie-breaking barrage set. After that, Valneris multiple times won medals at the World and European championships, including the gold medal at the 2008 European championship. At the 2003 World championship he shared the first place in a three-way tie with Chizhov and Alexander Georgiev but lost to Georgiev in a marathon tie-break barrage and finished third overall. In 1999 and 2007 he also won the World championships in fast draughts (blitz), and in 2005 he won a medal at the World team championships where he took part as the leader of the Latvian national team. Guntis Valneris currently remains one of the world international draughts leaders. Participation in World and European Championships References External links Profile at the Dutch draughts Federation archive Profile at the Balt Cup website Short biography (Russian) Category:Latvian draughts players Category:Soviet draughts players Category:International draughts players Category:Sportspeople from Riga Category:1967 births Category:Living people
{ "pile_set_name": "Wikipedia (en)" }
Myles Wilder Myles Wilder was a television comedy writer and producer. Wilder attended and graduated from UCLA's Theater Arts Department. During his senior year, he and two of his friends, Mitch Rose and Wayne Thoms, produced a documentary entitled "The Sports Car" that depicted the history of and interest in sports cars. He later wrote for The Tim Conway Show, a 1970 situation comedy, and the 1977 situation comedy The San Pedro Beach Bums. Wilder's father was director-producer W. Lee Wilder, and his uncle was Oscar-winning director Billy Wilder. ... more on Wikipedia
{ "pile_set_name": "Pile-CC" }
Q: Troubleshooting 'Unknown record property / related component "user" on "sfGuardUserProfile"' when loading fixture data I am some trouble loading fixture data, that I have added manually in my admin backend and then simply exported the data using 'symfony doctrine:data-dump' schema.yml http://pastebin.com/5LTzNtU1 fixtures.yml (snippet) http://pastebin.com/CNWyhrgc Now everything works fine when I run symfony doctrine:build --all, but when i try to load the data, I get: Unknown record property / related component "user" on "sfGuardUserProfile" This is really odd, as I have saved users and they've gone into both tables fine, just not when loading the fixtures that I exported fomr the database. Does anyone have any ideas what the problem could be? Thanks A: Try this. create users.yml with sfGuardUser: sfGuardUser_1: email_address: test@example.com username: test_user algorithm: sha1 salt: 6fdcd99a2c73d6270f1ed8dbbf7ccd3e password: fed98ad16c318197d16a2d7375f81e1afbce0792 is_active: true is_super_admin: true last_login: '2011-05-03 09:37:08' first_name: '' last_name: '' created_at: '2011-04-11 11:29:02' updated_at: '2011-05-03 09:37:08' and profile.yml with sfGuardUserProfile: sfGuardUserProfile_1: User: sfGuardUser_1 email_new: test@example.com firstname: Test lastname: User validate_at: null validate: null created_at: '2011-04-19 15:46:16' updated_at: '2011-04-19 15:49:14' Maybe it help you.
{ "pile_set_name": "StackExchange" }
Thymic carcinoid. Carcinoid of the thymus is a rare neoplasm. Differentiation from thymoma is important because they have entirely different prognosis. A patient in whom a 19 x 18 x 12 cm carcinoid tumor of the thymus was surgically removed is presented. The tumor metastasized to peritracheal and internal mammary nodes, and invaded the SVC, pleura, lung, and pericardium. This is apparently the largest reported tumor of its kind. Prior to induction of anesthesia cardiopulmonary bypass and rigid bronchoscopy were readily available. Awake intubation was utilized. Even though long-term prognosis is poor, an aggressive surgical approach and adjuvant radiotherapy may achieve extended survival with excellent quality of life. Central aspects of the disease as well as pivotal therapeutic points are discussed.
{ "pile_set_name": "PubMed Abstracts" }
Q: AttributeError: 'dict' object has no attribute 'charss' I am new to OOP with python. I have 3 classes with one being called from the other as a parameter instance: class Characters: def __init__(self, b="", c = ""): self.b= b self.c= c class Words: def __init__(self, charss=Characters()): self.charss= charss class Sentences: def __init__(self, w=Words()): self.w = w I am then creating a new instance of class Words form another Class and filling it with data i have from a json file. s = Sentences() s.__dict__ = json.loads(output.content) When debugging i can see that s is populated correctly. I am then trying to print out the values of s like this: print(s.w[0].charss[0]) an error occurs:AttributeError: 'dict' object has no attribute 'charss' is it because I am populating from the JSON as __dict__ where charss instantiated as list. If that is so what would be the best solution changing the __dict__ from json input or instantiating the object as __dict__? A: The problem is the way the instance s is being accessed for printing. I am saving the json output as a dictionary but the instance of a class is by default a list. therefore instead of print(s.w[0].charss[0]) that line should be print(s.w[0]["charss"][0])
{ "pile_set_name": "StackExchange" }
Thrive Furniture is absolutely crushing it! This was my main takeaway after visiting their factory here in Los Angeles where they design, manufacture and ship all product. Alex Del Toro (Thrive’s talented online director and the man responsible for their slick website) gave me an extended tour throughout the Thrive factory as well as their other workshop where they manufacture Versa office furniture and Vanity Girl Hollywood. According to Alex every product is built by hand in their factory and it was easy to see how true this was. Fabric sewing machines were being used next to the wood workers who were next to the painters who were next to the staplers and on and on. In the course of 10 months they have outgrown their warehouse space and are looking to expand. They can finally keep up with demand but that means rolling back some marketing efforts. Once they have more space and can staff accordingly they should continue to grow. I feel fortunate to see how they have managed their growth and they also continue to invest in their customer service as one of the larger pieces of machinery they purchased is used almost solely for cutting free fabric swatch samples which otherwise was done by hand. This is a direct investment in their customer’s experience with Thrive and it seems to be paying off. Timothy’s background includes stints at This Old House, ELLE DECOR, Metropolitan Home and Woman’s Day. His work has been published on Wired Design, Bob Vila, DIY Network, The Family Handyman and Popular Mechanics and he has been featured on the Martha Stewart radio show and as a speaker at the ALT Design Summit, K/BIS and the National Hardware Show.
{ "pile_set_name": "Pile-CC" }
The Dutch Famine ('Hunger Winter') of 1944-1945 provides a unique opportunity to identify early life determinants of life course health and well-being. To date, studies have concentrated on health and mortality outcomes in ~45,000 army recruits who were examined at age 18 in the early 1960s. Famine exposure in these men can be inferred from place and date of birth. Funding is now requested to link a wide variety of socio-economic outcomes (employment, wages, and disability benefits) from government sources to our studied population. The study is collaboration between epidemiologists and demographers and economists (Dr. Heckman, University of Chicago). The newly linked data will be analyzed with state-of-the-art epidemiologic and econometric approaches to reliably identify, estimate, and interpret the effects of an early life shock throughout the lifecycle. This work will integrate currently separated research traditions from the medical and social sciences and lead to a better understanding of 'fetal programming' and its implications.
{ "pile_set_name": "NIH ExPorter" }
Meet all awesome and cheap red cocktail evening dress on Cocomelody.com! With the purpose of saving your time, we make a product list for you to browse. From price to popularity, you can rank our glorious red cocktail evening dress as you wish. As for the quality, you are guaranteed by us to receive a real great estate item in time. Besides, the price is the biggest treat! Begin your exciting shopping trip on Cocomelody.
{ "pile_set_name": "Pile-CC" }
Optical lectin based biosensor as tool for bacteria identification. Biosensor techniques are based on biospecific interaction between the biological parts of biosensor with the analyte. In biosensor construction, antibodies are usually used for the detection of analytes such as microorganism, because of very strong and highly specific interaction. The disadvantages of this assay are a long time needed for antibody isolation and purification as well as difficult regeneration of biosensor chip. The use of lectins instead of antibodies could solve these problems because a several hundred lectins are commercially available and their stability in standard buffers is better compared to monoclonal antibodies. While antibody can only be used to detect that antigen it was designed for, lectin as low affinity molecule may bind several different pathogens. Using the discriminative effect of an artificial neural network the application of a lectin array will compensate for the lower specificity. Microbial surfaces bear many of the sugar residues capable of interacting with lectins. The ability of lectins to react with microbial glycoconjugates means that it is possible to employ them as probes and sorbents for whole cells, mutants and numerous cellular constituents and metabolites, and it makes them useful tools for identification or typing of bacteria. Lectins are attractive reagents for the clinical diagnostic laboratory because of their diverse specificity, commercial availability, a wide range of molecular weights, and their stability in standard buffers. The construction of lectin biosensor could be an advantage method for detection of pathogenic bacteria.
{ "pile_set_name": "PubMed Abstracts" }
The author is a Forbes contributor. The opinions expressed are those of the writer. Loading ... Loading ... This story appears in the {{article.article.magazine.pretty_date}} issue of {{article.article.magazine.pubName}}. Subscribe Balaji Viswanathan, Founder, Zingfin.com The main difference between India and China is that China's savior, Deng Xiaoping, came to power in the 1970s and started the liberalization from 1976. Our savior, Narasimha Rao, came late, and we could start moving only from 1991. Look at the GDP of both nations for the first twenty seven years in the chart below. Both competed at the bottom of the pit. Nehru and Mao fought on who could ruin their nation the most. Fortunately for China, Mao's siblings and most of his children died young or were lost. Unfortunately for India, Nehru's progeny survived, and the madness continued. India vs. China in GDP 1950-2005 (Notice China since 1976 when Mao died. India had a similar bump in 1964 when Nehru died. But, the euphoria was short lived, as Nehru's successor could not live long enough to keep Nehru's daughter out.) This fifteen year lag is the main difference between the nations. In most economic indicators, India is just a decade behind China (at current rate, India's GDP in 2025 will be the same as China's GDP in 2010). In the past few years, investors and world leaders have already recognized India's growing power. GDP Growth rates Look at the growth rates of both nations for the past sixty years. Both had comparable rates until 1976 (with China swinging far more), but since then, it has been consistently ahead of India (except 1989 at the time of Tianenmen). Then we caught up with them in the mid-1990s, and since then, the gap in growth has narrowed down. There are a few more advantages for China: They are more than 3X the size of India and with far richer natural resources. Thus, they always had better abilities to feed their population and run manufacturing better than India. China didn't have a very long foreign rule - their imperialism period lasted only a few decades and not a complete colony either. We on the other hand were colonized for centuries. That meant that India's base was far weaker than China at the time of independence. Due to Nehru's ignorance and poor leadership, India gave away the UN Security Council permanent seat to China and also didn't start the nuclear program soon enough. Thus, China got to nuclear status twelve years earlier than India. UNSC veto power + sizable population + economic growth + nuclear status = superpower. India is a democracy. That means we traded away the short-term military gains for long term social gains. In fact, we have already started reaping the benefits of democracy by going fast in the services/creative market. The lag behind India and China in economic indicators is reducing. See modern India going up with better consistency since 1991. I was asked about poverty. In the first seven years of economic freedom, India pulled sixty million people out of poverty - most of this in rural India. If you take the population growth at the bottom into account, the actual numbers could be close to one hundred million. That is no mean achievement.
{ "pile_set_name": "Pile-CC" }
What are we looking for at portal: Affordable girls providing Bdsm, sex dating in St-Polycarpe, where are they girls in St-Polycarpe, make Professional massage, Passionate skank St-Polycarpe in apartments, order girls to the party I've just added a section under China Massage. To me, it seems obvious that it should be there, and for that matter equally obvious that I should have included general price range info for the sexual services. Girls St-Polycarpe - I was as far away from myself as I have ever been, and it was such a strange and deeply disconcerting feeling, lying there feeling all the sensations that would have been arousing had I been welcome to inhabit my own body. For those who talk of prostitution as work, know this: So as for these two experiences: And as for the second: Her body is useful-the rest of her is irrelevant, and unwelcome. But one even greater than the scribes and Pharisees stood in her midst-Jesus. Nothing the religious leaders said could override His authority, and when He spoke, her accusers fled. When He speaks mercy over us, by His blood, our accuser, Satan, flees as well.
{ "pile_set_name": "Pile-CC" }
Immunological Characteristics of Colitis Associated with Anti-CTLA-4 Antibody Therapy. Anti-CTL4-A therapy is associated with development of colitis. We characterized ipilimumab-associated colitis in nine melanoma patients (6 male, mean age: 55.3-yrs). Median value for diarrhea grade was 2, number of ipilimumab doses 2, and interval since last administration 3-wks. Endoscopic characteristics resembled inflammatory bowel disease and histology revealed predominance of plasmacytes or CD4+ T-cells. We observed significant upregulation of Th1 and Th17 effector pathways (>10-fold increase for IFN-γmRNA, >5-fold for IL-17A, p < 0.01 vs. controls). Significant elevation of FoxP3 was also detected. In conclusion, ipilimumab administration results in elevations of effector lymphocytes and pro-inflammatory mediators in the gut lamina propria.
{ "pile_set_name": "PubMed Abstracts" }
Is age just a number? I'm hard on myself. Especially for being 25 and not ---- I'll spare you the list. I didn't notice how often I ask people their age until this past weekend . It may not be normal to ask age before occupation, but what is normal today? Maybe I do this to see if I’m the only 25 year old not fully immersed in my passion. On the outside I smile and champion them in whatever it is they are doing with their life- it's sincere I promise. On the inside I battle my subconscious thoughts. “Why aren’t you at that level? Why are you still at home?” “ I haven’t always lived at home. I wasn’t always working a blah job.” I am listening on the outside as I try to ignore the loud war within. Two of the people I was with this weekend noticed that I was very curious about everyones age. Both of them are older than me and both of them are married. Both of them live different lives and both have a list, like myself, of things they wished by their age they would be doing or have already done. One of them is only 5 months older than me. When I look at their lives I would have never thought there’d be a list. Sure, things aren’t perfect in their lives, but a list as long as mine? One of my friends said something that might have shifted my perspective of age- forever. Maybe we had thought we were ready for whatever it is we had wanted to already do, but we weren't. And maybe we aren’t now. And maybe we won't be for years to come. God knows the right timing because He knows us best. I had no comeback. It was simple, straight and real. Something I'm sure I've heard before, but had never sunk deep until that moment. “Would you be okay if you weren't married by 30? Would you be okay if your music never took off when and if you fully pursued it?” -They challenged me. The questions kept rolling and I got it. But just because I understood the point didn't mean I sat there and told them I could accept all those things and would go on laughing my way through life. It was a hard conversation. But it was truth filled and I only have ever looked at truth as freedom. Isaiah 48:17 NIV: “This is what the Lord says- your Redeemer, the Holy One of Israel: “I am the Lord your God, who teaches you what is best for you, who directs you in the way you should go.” God knows the correct time for our desired dreams. Take the risks and let faith stir because we do need to work hard at them. We can’t always wait around for the right time. Learn to listen and lean on Him because what if you let go today and let God know what is best for you? Maybe you’d save some time beating yourself up and comparing yourself to others. He knows- even when it’s not easy to accept, He knows.
{ "pile_set_name": "Pile-CC" }
Follow @frozenroyalty LOS ANGELES — On June 14, Los Angeles, more specifically, Los Angeles area hockey fans, proved the critics wrong. Indeed, those who claim that Los Angeles is not a hockey town were blown off the ice 250,000 times over, maybe more than that, by the fans who packed the parade route and the rally inside Staples Center, celebrating the Los Angeles Kings winning the 2012 Stanley Cup, the first Stanley Cup Championship in franchise history. In a story published this morning, Kings fans, young and old, recent fans to those who have been there from Day One back in 1967, shared their feelings and experiences about what it meant to see their team win it all…finally. Their remarks and sentiments were thoughtful, heartfelt, and deeply personal, and they run the gamut of emotions. I hope you will take the time to see what this championship means to a representative sampling of fans, from different walks of life: Los Angeles To The Hockey World: Here’s 250,000 Reasons Why This Is A Hockey Town In this accompanying photo essay, photographer David Sheehan, a Kings fan dating back to the mid-1970’s, captured some of the approximately 250,000 faces behind those thoughts and emotions along the parade route, during the parade, and inside Staples Center during the rally, and afterwards. Congratulations Los Angeles hockey fans! Like the Kings, you shined, both on Monday night, when the Kings hoisted the Stanley Cup over their heads for the first time, and again during the victory parade and rally on Thursday. You all did Los Angeles proud. You screamed at the tops of your lungs to the hockey world that Los Angeles is, without question, a hockey town. Moreover, in true hockey fashion, you powerfully told the non-believers everywhere what they could do with their skepticism. Way to go LA! Los Angeles To The Hockey World: Here’s 250,000 Reasons Why This Is A Hockey Town – In Photos All photos © 2012 David Sheehan/FrozenRoyalty.net. All rights reserved. Duplication/reproduction/distribution is prohibited without explicit permission. View as a Gallery (154 photos; Click on an image to view a larger version): Frozen Royalty by Gann Matsuda is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. You may copy, distribute and/or transmit any story or audio content published on this site under the terms of this license, but only if proper attribution is indicated. The full name of the author and a link back to the original article on this site are required. Photographs, graphic images, and other content not specified are subject to additional restrictions. Additional information is available at: Frozen Royalty – Licensing and Copyright Information. Frozen Royalty’s Comment Policies
{ "pile_set_name": "OpenWebText2" }
Microsoft is reinventing Windows as a platform for creators via a host of innovations such as Paint 3D. And though Redmond boasted it's bringing 3D to everyone at the October 2016 reveal, consumers don't know that because Microsoft isn't telling them. Conversely, tech enthusiasts know all about Microsoft's vision for creators which includes Paint 3D, the Fall Creators Update, the innovative Surface devices, HoloLens and mixed reality and the recent Creators Update. Microsoft's Creators Updates are bringing new features to Windows while HoloLens leads the industry's charge into mixed (virtual and augmented) reality. With these tools, Microsoft's creating a robust platform for creators of varying skill levels. Sadly most "regular" consumers don't know any of this. Even those with the Creators Update may be unaware of Microsoft's reimagining of a Windows classic, Microsoft Paint, with Paint 3D: Best VPN providers 2020: Learn about ExpressVPN, NordVPN & more Paint 3D makes "creating" on a Windows PC using touch and a pen an entirely new and robust, yet simple experience. Furthermore, as part of Microsoft's strategy to implement 3D throughout Windows and to bring 3D to everyone it is core to Microsoft's vision for the Creators Updates. It's therefore ironic (even confusing) that Microsoft isn't doing more to promote Paint 3D to consumers. Microsoft, you get out what you put in Microsoft's repositioning of Windows as a creators and mixed reality platform, implementing system-wide inking, and refocusing on gaming with game mode and Mixer are a reflection of it's attempt at a renewed commitment to consumers. Sadly, most consumers have no clue Microsoft has made that commitment. Nor do they realize Windows is being reimagined as a platform to appeal to the creator in all of us. If Microsoft's relying on users discovering new Windows features, and subsequently understanding and then embracing its creators vision, the company may be unpleasantly surprised when that doesn't happen. Microsoft, you gotta show 'em Microsoft's challenge as a historically enterprise-focused company is communicating with consumers. According to Chief Marketing Officer Chris Capossela, the company has focused on a marketing strategy which relies on the integration of products as a means to promote other products. Think Skype integration in Office. This marketing strategy relies on users discovering one product by using another. It's not the aggressive "in your face" marketing method that's needed to introduce consumers to and educate them on Microsoft's expanded vision of Windows-as-a-creators-platform. Microsoft hasn't abandoned its forte; it's simply positioned new creation tools alongside the familiar productivity-focused tools like Office. Just as Microsoft historically equipped consumers for traditional productivity, it now also sees us as creators and is equipping us accordingly. Paint 3D is just part of the picture Ben Reed of Microsoft's Windows Next Generation Experiences Team demonstrates how Microsoft is "enabling the creator in all of us" with Paint 3D in the video below: Paint 3D's a familiar yet powerful tool that Microsoft can market to introduce its "creators" vision to the masses. This isn't just about Paint 3D, however. It's about Microsoft taking the initiative to tell consumers about Paint 3D, mixed reality, gaming and more which are part of its expanding vision for Windows. Rather than hoping consumers will discover these new features Microsoft must be proactive in establishing mindshare for each. And a little child shall lead them Windows Chief Terry Myerson expressed that the next generation of children inspired the creators vision for Windows. We're thinking about each of us as creators ... a distinct inspiration has been watching today's younger generation and the trends in how they're embracing computing. My interaction with CAD came when I was in mechanical engineering school. And these kids are so fluent and interactive in really quite rich 3D concepts. Myerson observed children's affinity for and fluency with complex 3D content creation and sharing. He also shared that children are an indicator for what's coming next in personal computing. Microsoft is, therefore, building features into Windows that are forward-looking and currently relevant as seen here: The skills displayed by Microsoft's partners in the above video may intimidate those who don't fancy themselves as an artist, musician or some other professional creator. However, whether we're using Windows to create a symphony, painting, sketch, PowerPoint or even a document Microsoft says we're all creators. How will Microsoft convince the masses of this vision? Windows and Office trickled from the enterprise to homes organically. It was also virtually unchallenged; thus, aggressive marketing wasn't required. That strategy won't work here. Paint 3D, the bridge to Microsoft's creators vision In a personal computing past dominated by traditional enterprise and desktop productivity, Microsoft Paint was fun and useful but also intentionally overshadowed by Office. Today, content creation and sharing are parallel to traditional productivity, thus Microsoft's vision ideally gives Paint 3D a front row seat in Windows. Paint 3D embodies Microsoft's mission to make Windows a creative platform for everyone. It's available to the masses, easy to use, allows 3D creations to be integrated into other products and with Remix 3D, provides a community for users to share creations. It's an easy onramp to Microsoft's modern vision for Windows. Moreover, as a tool for creating 3D objects, it opens the door to Windows Mixed Reality. Mainstreaming 3D with smartphones Microsoft even created a mobile app called Windows Capture 3D Experience. The cross-platform app (with the consumer-unfriendly name) will allow users to scan an object with their phone's camera to create a 3D representation of that object that can be edited, integrated into other programs and shared. Microsoft's General Manager, Megan Saunders, demos this app on an HP Elite x3 in the video below:
{ "pile_set_name": "OpenWebText2" }
The Ontario government appears headed for a showdown with environmentalists over its new bill to cut red tape, which will rely more on fines than prosecutions to penalize polluters except in cases of "serious violations." While Environment Minister Jeff Yurek said expanding administrative fines "will give us a quick and effective tool against polluters," the lobby group Environmental Defence maintains the proposed legislation will let polluters off easier by eliminating daily fines for infractions in favour of fines per incident. "It's less money and removes any incentive for somebody who's been caught in contravention to stop doing whatever they're doing," group spokesman Keith Brooks said Friday. Money from the fines will be redirected to environmental projects throughout the province, said Yurek, adding that the current regime of fines is limited and "results in an overreliance on burdensome, costly and time-consuming enforcement tools." The wide-ranging bill — known as the Better for People Smarter for Business Act — was introduced Monday. Its environmental provisions are up for public comment on the provincial environment registry until Nov. 27. Yurek's office said the bill will expand the environment ministry's powers to levy penalties on "many offences," with fines of up to $200,000 per contravention under the Environmental Protection Act and the Ontario Water Resources Act, $100,000 under the Safe Drinking Water Act and Pesticides Act, and $10,000 under the Nutrient Management Act. "There is a gap in the ministry's compliance and enforcement tool kit, which is why we are proposing to expand the list of environmental offences these penalties can be applied to," it said. But Environmental Defence and the New Democrats said the per-contravention fines will send the wrong message for polluters who use toxic pesticides, dump sewage into waterways or foul the air. "The Ford government has proposed eliminating an existing $100,000-per-day penalty for environmental polluters and replacing it with a one-off fine of $10,000. Further, the government is pushing to cap environmental fines at an overall maximum of $200,000," said NDP environment critic Ian Arthur, MPP for Kingston and the Islands. "That means a company dumping toxic waste into a lake for 10 days will be fined $200,000 instead of $1 million." Yurek's office said the proposed expansion of fines is more complex than critics realize and insisted "the ministry is not lowering any penalties." "There are, in fact, instances where there are higher penalties that before, and we're expanding the ability to charge these monetary penalties to offences that are currently not even allowed to be subject to monetary penalties," said communications director Chelsea Dolan. "The ministry still has the discretion to pursue charges once determining the severity of the offence." Brooks said the proposed changes from the government "came out of left field" and took the environmental movement by surprise. "They have not really met with environmental groups and don't really seem interested in doing so," he added, noting that the 30-day comment period is the legal minimum. "We had no indication this was coming. We're still trying to get our heads around this bill to itemize all the problems." Loading... Loading... Loading... Loading... Loading... Loading... Just last month, Ontario's Divisional Court ruled in a split decision that the Ford government acted illegally by axing the previous Liberal administration's cap-and-trade program without public consultation.
{ "pile_set_name": "OpenWebText2" }
U.S. Visa Waiver Program The Visa Waiver Program (VWP), administered by the Department of Homeland Security (DHS) in consultation with the State Department, permits citizens of 38 countries[1] to travel to the United States for business or tourism for stays of up to 90 days without a visa. In return, those 38 countries must permit U.S. citizens and nationals to travel to their countries for a similar length of time without a visa for business or tourism purposes. Since its inception in 1986, the VWP has evolved into a comprehensive security partnership with many of America’s closest allies. The VWP utilizes a risk-based, multi-layered approach to detect and prevent terrorists, serious criminals, and other mala fide actors from traveling to the United States. This approach incorporates regular, national-level risk assessments concerning the impact of each program country’s participation in the VWP on U.S. national security and law enforcement interests. It also includes comprehensive vetting of individual VWP travelers prior to their departure for the United States, upon arrival at U.S. ports of entry, and during any subsequent air travel within the United States. Economic Benefits A strong and vibrant economy is essential to our national security. The United States welcomed approximately 20 million VWP travelers in FY 2014 who, according to the Department of Commerce, spent approximately $84 billion on goods and services. VWP travelers injected nearly $231 million a day into local economies across the country. Initial and Continuing Designation Requirements The eligibility requirements for a country’s designation in the VWP are defined in Section 217 of the Immigration and Nationality Act as amended by the Secure Travel and Counterterrorism Partnership Act of 2007. Pursuant to existing statute, the Secretary of Homeland Security, in consultation with the Secretary of State, may designate into the VWP a country that: Has an annual nonimmigrant visitor visa (i.e., B visa) refusal rate of less than three percent, or a lower average percentage over the previous two fiscal years; Accepts the repatriation of its citizens, former citizens, and nationals ordered removed from the United States within three weeks of the final order of removal; Enters into an agreement to report lost and stolen passport information to the United States via INTERPOL or other means designated by the Secretary; Enters into an agreement with the United States to share terrorism and serious criminal information; Undergoes a DHS-led evaluation of the effects of the country’s VWP designation on the security, law enforcement, and immigration enforcement interests of the United States; and Undergoes, in conjunction with the DHS-led evaluation, an independent intelligence assessment produced by the DHS Office of Intelligence and Analysis (on behalf of the Director of National Intelligence). National-Level Risk Assessments After designation in the VWP, countries must maintain high and consistent security standards. DHS, in consultation with the State Department, is statutorily required to conduct reviews of the effects of each VWP country’s designation in the program on U.S. national security, law enforcement, and immigration interests at least once every two years. During the review process, DHS assesses VWP countries’ counterterrorism, law enforcement, immigration enforcement, passport security, and border management capabilities. DHS collects information from the government of the VWP country under review, the U.S. diplomatic mission in that country, the Departments of State and Justice, the U.S. Intelligence Community, and other sources. Many reviews also include operational site inspections of airports, seaports, land borders, and passport production and issuance facilities in VWP countries. In addition to the biennial review process, DHS continuously monitors all VWP countries to ensure that their continued designation in the VWP will not adversely affect the security of the United States. Continuous monitoring allows DHS to react rapidly to evolving security threats. The Secretary of Homeland Security, in consultation with the Secretary of State, has statutory authority to immediately terminate or suspend a country’s designation in the VWP without notice if there is a credible threat originating from that country which poses an imminent danger to the United States or its citizens. Following the conclusion of every review, DHS, in consultation with the State Department, provides a report to Congress regarding the assessment results and designation determination. Comprehensive Traveler Vetting In addition to national-level risk assessments, DHS conducts targeted, individualized vetting of all VWP travelers at various points throughout the travel continuum. The Department requires all prospective VWP travelers to obtain pre-travel authorization via U.S. Customs and Border Protection’s (CBP) Electronic System for Travel Authorization (ESTA) prior to boarding a plane or ship bound for the United States. DHS coordinates with the National Counterterrorism Center (NCTC) to vet ESTA applications to ensure that travel authorizations are not issued to individuals who pose a threat to national security. In November 2014, DHS began requiring ESTA applicants to provide additional information to further enhance its ability to identify applicants on the U.S. terrorist watchlist. DHS automatically screens all ESTA information against numerous U.S. law enforcement and counterterrorism databases, as well as INTERPOL databases, while upholding strict privacy standards. DHS recurrently vets ESTA data on a daily basis to ensure that we are taking advantage of the latest law enforcement and intelligence information. CBP carefully evaluates any ESTA check that raises a counterterrorism concern. Since ESTA’s inception in 2008, CBP has denied several thousand ESTA applications as a result of vetting against the U.S. Government’s terrorist watchlist. The enhanced ESTA requirements implemented in November have already resulted in demonstrable security benefits. In addition, U.S. law requires commercial air and sea carriers operating flights to, from, or through the United States to provide Advance Passenger Information (API) and Passenger Name Records (PNR) to CBP. This information includes travelers’ biographic and travel reservation information. CBP screens this data against U.S. and international law enforcement and counterterrorism databases to identify high-risk individuals before they depart for the United States and when they travel by air within the United States. All VWP travelers are subject to this vetting. Mutually-Reinforcing Security Criteria The statutory requirement that VWP countries sign information sharing agreements with the United States pertaining to known and suspected terrorists, serious criminals, and lost and stolen passports enhances our vetting of individual travelers. VWP countries have provided the United States with information on more than 6,000 known or suspected terrorists as a result of VWP information sharing arrangements. This information exchange augments the already strong information exchange between the United States and VWP countries’ security services. Moreover, VWP countries have provided nearly 70 percent of the records in INTERPOL’s Stolen and Lost Travel Document Database, which DHS utilizes in its daily vetting of ESTA applications and Advance Passenger Information/Passenger Name Record data.[2] This information significantly bolsters DHS’s ability to identify and disrupt the travel of terrorists, serious criminals, and other mala fide actors who pose a threat to U.S. security. Visa Waiver Program Enhancements DHS continuously adapts VWP to address current threats. In August 2015, DHS introduced a number of additional security enhancements to the VWP, including enhanced traveler vetting, information sharing, and other security requirements for VWP countries to address the threat posed by foreign terrorist fighters. Specifically, the 2015 VWP enhancements include: Implementation of the Homeland Security Presidential Directive 6 (HSPD-6) and Preventing and Combating Serious Crime (PCSC) agreements that VWP countries have signed relating to the sharing of criminal and terrorist information; Use of e-passports for all VWP travelers, regardless of the passport’s date of issuance and of the date of the country’s designation in the VWP [NOTE: currently, citizens of the 27 countries designated into the VWP before 2007 may use a machine-readable non-biometric passport if that passport was issued before October 26, 2006 and is still valid]; For VWP countries with a last point of departure to the United States, the conclusion of a federal air marshal agreement; Use of INTERPOL Lost and Stolen Passport Database to screen travelers crossing a VWP country’s borders (or, for Schengen Member States, entering or exiting the Schengen area); Reporting of Foreign Fighters to multilateral security organizations such as INTERPOL or EUROPOL; and Cooperation with the United States in the screening of refugees and asylum seekers. As of April 1, 2016, all travelers must have an e-passport to use the VWP. An e-Passport, denoted by the symbol , is an enhanced secure passport with an embedded electronic chip. E-Passports are issued by the proper passport issuing authority and must meet international standards for securing and storing information corresponding to the passport and bearer. DHS and the Department of State are working with VWP countries to implement the new requirements, which will strengthen U.S. security and the security of our partners. Conclusion The Visa Waiver Program is a rigorous security partnership that promotes secure travel to the United States, while also facilitating Americans’ travel to VWP partner nations. No other program enables the U.S. Government to conduct such broad and consequential assessments of foreign security standards and operations. DHS will continue to strengthen its efforts to ensure that VWP provides for the security and prosperity of the American people. [1] With respect to all references to “country” or “countries” in this document, the Taiwan Relations Act of 1979, Pub. L. No. 96-8, Section 4(b)(1), provides that “[w]henever the laws of the United States refer or relate to foreign countries, nations, states, governments, or similar entities, such terms shall include and such laws shall apply with respect to Taiwan.” 22 U.S.C. § 3303(b)(1). Accordingly, all references to “country” or “countries” in the Visa Waiver Program authorizing legislation, Section 217 of the Immigration and Nationality Act, 8 U.S.C. 1187, are read to include Taiwan. This is consistent with the United States’ one-China policy, under which the United States has maintained unofficial relations with Taiwan since 1979.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The present invention relates generally to semiconductor devices and image forming apparatus, and more particularly to a semiconductor device having a light-emitting element array adaptable for use as a light source in electronic equipment including but not limited to laser printers and laser display units plus optical communications systems as well as optical signal processing apparatus, along with an image formation apparatus using the semiconductor device. 2. Description of the Related Art In image formation equipment such as laser printers or the like, in the case where a light-emitting element array with a plurality of light-emitting elements is employed as the light source for producing light according to respective pixels of an image to be formed, it is required that each light-emitting element be driven in a way independent of others; to this end, one typical prior known approach is to provide lead wires for electrically feeding respective light-emitting elements (referred to as "individual leads" hereinafter) on a one-per-element basis. Accordingly, in the case of a light-emitting element array constituted from n rows and m columns of light-emitting elements, i.e. n.times.m light-emitting elements, a great number of connection leads as many as n.times.m lines are required resulting in creation of a problem as to an increase in production cost while making it difficult to achieve higher integration density of light-emitting elements. One approach to avoiding this problem has been described in Published Unexamined Japanese Patent Application ("PUJPA") No. 61-31271, which teaches the use of a technique for employing an LED array light source to form a hard copy or "print" image of high density. As shown in FIG. 11, the LED array 29 is made up of LED elements laid out two-dimensionally which are associated with a mesh-like or "matrix" pattern of rows of parallel leads (referred to as "cathode leads" hereinafter) 3 and columns of leads ("anode leads") 4. These cathode leads 3 and anode leads 4 have certain terminate ends at which wire bonding pads 33 and 32 are provided for use in individually driving the LED elements. Another related art technique is found in PUJPA No. 7-503104 ("JP-A-7-503104"), which suggests use of a lamination of vertical-cavity surface-emitting laser structures with a transistor structure to thereby form a matrix lead pattern associated with respective transistor elements in the transistor structure. Driving a given transistor element permits light production at a corresponding vertical-cavity surface-emitting laser element that is placed on the upper side or the lower side of the transistor being presently driven. The related art techniques set forth in the Japanese documents JP-A-61-31271 and JP-A-7-503104 require the use of a reduced number (n+m) in total of leads for the light-emitting element array of a 2D matrix of n rows and m columns of light-emitting elements; thus, it becomes possible to greatly reduce the required number of connection leads when compared to the case of the individual lead connection stated above. As a single wire bonding is formed per lead for example, a decrease in number of connection leads would lead to a decrease in number of wire bonding and also to a decrease in channel number of driver circuitry for use in driving the light-emitting element array. This in turn makes it possible to reduce production costs of the entire of equipment that employs this light-emitting element array, and also to achieve high integration density of such light-emitting element array. Unfortunately, the related art approaches as taught by the Japanese documents JP-A-61-31271 and JP-A-7-503104 cited above are encountered with a problem which follows. In case the light-emitting elements constituting the light-emitting element array are further increased in number and disposed with higher integration density while narrowing the interval between rows of light-emitting elements and/or between columns thereof, the layout pitch of such leads (anode leads and cathode leads) becomes narrower resulting in incapability of implementation of the intended wire bonding, which in turn makes it impossible to achieve electrical interconnection required. In other words, the minimum lead pitch enabling wire bonding or else limits the row distance and column distance of those light-emitting elements making up a light-emitting element array. This will be explained more practically below. In currently available wire-bonding techniques the minimum allowable pitch is 80 .mu.m, or more or less. Suppose that wire-bonding pads are arrayed in a staggered or "zigzag" pattern in which pads are arrayed in two parallel lines with each pad in one line opposing a midway between adjacent one of the pads forming the other line. If this is the case, even where the minimum pitch of wire-bonding pads in each line is set at approximately 80 .mu.m, the minimum lead pitch can be reduced down to about 40 .mu.m, which is half of the minimum pad pitch. However, even in this case, the minimum lead pitch stays as large as about 40 .mu.m. Alternatively, imagine that the required number of connection leads is relatively less. In this case, expanding those portions of leads near the wire bonding pads into a sector shape might enable enlargement of the wire-bonding pad pitch. However, if the required number of such leads increases beyond several hundreds, then this pad pitch enlargement approach will no longer work well. This can be said because an increase in pitch of wire-bonding pads would result in an excessive increase in size of a substrate used. In view of this, the minimum layout pitch of those light-emitting elements constituting a light-emitting element array of relatively high density has been typically limited to 40 mm, or more or less. It has been discussed that the related art approaches stated above suffer from a problem that a light-emitting element array having multiple light-emitting elements is strictly required to set the pitch of its leads at a limited value that permits electrical connection by wire bonding or the like, which hardly allows the pitch to decrease below a prespecified value of several tens of .mu.m. This is a serious bar to reduction of the row distance and column distance of respective light-emitting elements, which in turn makes it impossible, or at least greatly difficult, to manufacture the intended light-emitting element array with high integration density required.
{ "pile_set_name": "USPTO Backgrounds" }
Blow-molded bottles of thermoplastic synthetic resinous material are, for unavoidable reasons, produced with round bottoms and it is, therefore desireable to apply flat-bottomed base cups to the bottles so that they will stand up. One machine for applying flat-bottomed base cups to bottles with round bottoms is disclosed in U.S. Pat. No. 4,132,584. One object of this invention is to provide an improved machine for applying flat-bottomed base cups to round-bottomed bottles. More specifically, it is an object of this invention to provide such a machine with a loader mechanism adapted to transfer a plurality of bottles received from the blow-molding machine directly and simultaneously to an orbiting conveyor on which the base cups are applied to the bottles. The plastic bottles are formed in a well-known manner several at a time in the chambers of a blow-molding machine from which they are deposited on the loader mechanism. The loader mechanism in the specific embodiment about to be described is a pivoted structure adapted to swing about a horizontal axis to transfer several bottles simultaneously to the orbiting conveyor. Another object of the invention is to provide a machine in which the base cups are applied to the bottles automatically in response to the movement of an orbiting conveyor, preferably by means of a cam rail located beneath the conveyor. Another object is to provide a machine in which an orbiting conveyor supports a plurality of support units of novel construction each comprising a bottle holder and a base cup seat beneath the bottle holder. Another object is to provide a machine having novel means for moving a line of base cups to an orbiting conveyor on which the base cups are applied to the bottles and simultaneously for carrying away the bottles after the base cups have been applied.
{ "pile_set_name": "USPTO Backgrounds" }
Embossed Velvet Dinner Dress, 1929 1929 Dinner dress and matching slip of lemon yellow cut velvet on a georgette base. The dress has a tiered skirt cut on the bias. Accents include a yellow chiffon puff and streamer on the right shoulder at the back. This garment was owned by Matilda Dodge Wilson (October 19, 1883 – September 19, 1967),who was the wife of John Francis Dodge (October 25, 1864 – January 14, 1920), co-founder of the Dodge Motor Car Company in Detroit, Michigan. Additional Information Resource Type: three dimensional object Rights: Digital Objects Rights from Digital Dress Collection: Users can cite and link to these materials without obtaining permission. Users can also use the materials for non-commercial educational and research purposes in accordance with fair use. For other uses or to obtain high resolution images, please contact the copyright holder.
{ "pile_set_name": "Pile-CC" }
HOUSTON – 12 ways to improve security at your apartment: Before moving in: 1. Research local crime When you think you’ve found your dream apartment, check local crime data in that neighborhood. Make sure you know the troubling activities taking place in that area before signing your lease. Ask neighbors on the block, by going door to door, about crime in the area. Websites like CrimeReports.com, CrimeMapping.com and SpotCrime.com can help. 2. Test lighting Check the entrances, hallways, parking areas, elevators, stairways, mail areas and laundry rooms to make sure they provide enough light at night. Thieves target areas that are poorly lit because they can more easily hide their identity. If the lighting is inadequate, tell your prospective landlord you want it changed or you will not be moving in. Hopefully they will want to accommodate you and keep their residents happy. 3. Observe general upkeep Take in the general look and feel of your new place. Broken windows, broken outdoor fencing, broken lights and cracked drywall show a lack of concern for all things, and that should be a warning to you. 4. Check entrances Make sure the outside entrances to your building require a key, a pass code or buzz-in access to the hallways, the parking lots, pool, gym and laundry room to keep intruders and thieves outside. 5. Make sure it has peepholes A peephole may seem like a small thing, but it can save you and your family by allowing you to see who’s at the door before you unlock and open it. If your future apartment doesn’t have one, ask the landlord to install one for you free of charge. 6. New door locks Many landlords will say they have replaced the door locks on your new apartment, but how do you know? Tell your landlord you want new locks put on the door and have them show you the new lock before they put it on the door. 7. Examine window locks Good window locks keep burglars at bay. This is especially true with first-floor apartments. Check all the windows and locking devices on your windows to make sure they are working and they are strong enough to keep you from throwing them open. 8. Check the fire escapes Exterior fire escapes, while necessary during an emergency, can provide easy access to upper balconies and windows in some apartment units. If your complex has a fire escape, make sure it is kept off the ground and not accessible to thieves, burglars and the general public. After moving in 1. Buy additional locks For more security, consider installing an additional deadbolt lock on your front door, as well as a chain lock. The second deadbolt should be located at least a foot away from the first deadbolt, which should already be on your front door. 2. Bolster sliding doors Balconies are great for sunshine and great views, but they can pose a hazard if they are not properly secured. Beef up the security of your sliding door by placing a pole or pipe on the window track to keep burglars from being able to force the door open. You can also install a secondary lock with a pull-pin for further security. 3. Invest in good blinds Good blinds prevent burglars from looking inside your home and being tempted by what they see. They also hide the fact that you may or may not be home. When you leave your apartment, make sure you close your blinds. 4. Get a safe A safe can be a last line of defense to protect your most valuable items and the items thieves are most likely to take, such as cash, jewelry and guns. The important thing is to buy a safe that can be bolted to a shelf or to the wall, so the thieves can't just walk off with it. Safes can range in price from under $100 to thousands of dollars for larger ones.
{ "pile_set_name": "OpenWebText2" }
Adverse reactions to food additives in children with atopic symptoms. In a multicenter study conducted at four Danish hospital pediatric departments, the parents of 472 consecutive children were informed of this project to determine the incidence of intolerance of food additives among children referred to an allergy clinic with symptoms of asthma, atopic dermatitis, rhinitis, or urticaria. After a 2-week period on an additive-free diet, the children were challenged with the eliminated additives. The food additives investigated were coloring agents, preservatives, citric acid, and flavoring agents. Carbonated "lemonade" containing the dissolved additives was used for the open challenge. Two doses were used: a low dose and a 10-fold higher dose. Gelatin capsules were used for a double-blind challenge. The children were 4-15 years old, and they were attending an outpatient pediatric clinic for the first time. Of the 379 patients who entered the study, 44 were excluded and 335 were subjected to open challenge. A total of 23 children developed positive reactions after the open challenge. Sixteen of these patients accepted the double-blind challenge, and six showed a positive reaction to preservatives (atopic dermatitis, asthma, rhinitis), coloring agents (atopic dermatitis, asthma, urticaria, gastrointestinal symptoms), and citric acid (atopic dermatitis, gastrointestinal symptoms). The incidence of intolerance of food additives was 2% (6/335), as based on the double-blind challenge, and 7% (23/335), as based on the open challenge with lemonade. Children with atopic skin symptoms had a statistically increased risk of a positive reaction. This may have consequences for the future clinical investigation of children with atopic cutaneous symptoms.
{ "pile_set_name": "PubMed Abstracts" }
The Samsung Galaxy Grand 2 is one of the best affordable mobiles from Samsung with decent features. In Android phones, the manufacturer will not provide access to root by default. But we can access the root and use the device to full extent. You can root Samsung Galaxy Grand 2 with Chainfire’s autoroot package easily and modify it to your desired way. Rooting Galaxy Grand 2 lets you install custom ROMs, Kernels and you can customize the device to suit your desire. Before getting into the tutorial, you should know what does rooting mean? If you are ready to root Samsung Galaxy Grand 2, do follow the prerequisites below to safeguard your personal data and to ensure successful rooting process. PREREQUISITES Check Device Model Number It is vital to check device model number before rooting/unlocking/flashing process to ensure flashing compatible files on the device. The device model name should be Samsung Galaxy Grand 2(SM-G7102). If the device model number doesn’t match with mentioned one, do not attempt the tutorial. Samsung Galaxy Grand 2 USB Drivers To root Samsung Galaxy Grand 2, it is to be connected with PC. For the PC to detect the device, it should have installed Samsung USB drivers. If you’ve not installed previously, download them form below source and install manually. Download Samsung USB drivers Steps To Be Considered Enable USB debugging on the Samsung Galaxy Grand 2 which lets the device establish a stable connection with computer via USB. You can do it by following the below mentioned path. In latest versions of Android, the Enable Debugging option will be hidden in depth of settings panel. You can follow our guide to enable USB debugging. which lets the device establish a stable connection with computer via USB. You can do it by following the below mentioned path. In latest versions of Android, the Enable Debugging option will be hidden in depth of settings panel. You can follow our guide to enable USB debugging. Rooting the device erase entire data on the device including internal SD card. So, make sure you create a backup of entire important data. If you are not familiar with Android backup process, you can refer our guide to Backup Android phone data. Make sure the phone’s battery is at least 60% charged at the start up of tutorial. If battery runs off during unlocking process, it may turn your phone into brick. So, charge the device before tutorial. If the device bootloader is locked, it is to be unlocked before rooting process. You cannot gain root access unless bootloader is unlocked. Are you sure you completed all the above steps? Yes, you can now get started with the rooting process. Downloads Section CF-Auto-Root Package ODIN Flashing tool Guide to root Samsung Galaxy Grand 2 on Android 4.4.2 Kitkat Disclaimer: Rooting/Unlocking/Installing custom ROMs and Kernels are not official methods. So, neither device manufacturer nor Droid Word team is responsible if anything goes wrong with your device during the process. This article is only for educational purpose. You can continue with the implementation at your own risk. Steps to be followed Step 1: Download CF-Auto-Root Package and ODIN flashing tool from the downloads section above. Step 2: Unzip both the packages to a folder on desktop. Step 3: Turn off the Galaxy Grand 2 and enter download mode. Don’t know how? Do follow the below steps: Turn off the device. Press and hold Home+Volume Down buttons. buttons. Now press the Power button until you see the Android logo. Now press Power button again to confirm Step 4: Launch the previously unzipped ODIN set up file. Step 5: Using a USB cable connect Galaxy Grand 2 to the PC in download mode. If the box under ID:COM turns yellow, it says connection is successful. Step 6: Once the connection is established, click on PDA button in ODIN and choose CF-Auto-Root-ms013g-ms013gxx-smg7102.tar.md5 file from the previously unzipped files. Step 7: Check Auto Reboot and F. Reset time if not checked previously. Step 8: If all the above steps are done successfully, click Start button in ODIN which starts flashing the Autoroot package. Do no interrupt the installation process. Step 9: After the installation completes, the box under ID:COM turns green. It says installation is successful. The device reboots and you can disconnect the USB once Home screen appears on Grand 2. That’s it! You’ve successfully rooted Samsung Galaxy Grand 2 running Android 4.4.2 Kitkat. If you face any issues while following the above guide, do let us know through the comments section. We may help you out.
{ "pile_set_name": "OpenWebText2" }
Q: PHP: Alternative to returning a blank file In my blank.php it currently has following: <?php // Blank file... I am using this file to replace a particular template in my WordPress like so: add_filter( 'comments_template', blank_file' ); function blank_file() { return PLUGIN_PATH . '/blank.php'; } However, instead of creating a blank file to return, is it possible to just return a blank value to get the same results? I tried the following which would make sense to me logically, but it didn't work: function blank_file() { $blank = '<?php'; return $blank; } A: I found a similar question on WordPress Stack Exchange here. However, it looks like the solutions require more coding than what I am currently using which works for me: add_filter( 'comments_template', 'comments_template', 20, 1 ); function comments_template() { return plugin_dir_path( __FILE__ ) . 'blank.php'; } Where blank.php has: <?php // Blank file...
{ "pile_set_name": "StackExchange" }
Breathable bnt online live stream 46% OFF Plus free return a seven-year process, echate pa ca urband 5 sluggish cells and cancer cells will proliferate; do something about the cancer cells, before the notion of social blog-style user interfaces — applications you see traditionally on LinkedIn,
{ "pile_set_name": "Pile-CC" }
Carl Tietz Carl Tietz (25 January 1831 – 3 August 1874) was a German architect who practiced in Austria. Life and career Tietz was born in Jastrow and came from a humble background. He completed an apprenticeship as a bricklayer and later worked as a construction inspector. In 1852, he passed the Master Craftsman examination. That same year, his employer sent him to manage construction of the Circus Renz building in Vienna, where he decided to remain and become an architect, although his plans to attend the Academy of Architecture in Berlin had to be abandoned. Initially, he concentrated on contracts for industrial buildings, but soon developed connections with wealthy German immigrants who admired his classical, monumental style. He became involved in the Ringstraße project and eventually produced 36 luxurious buildings in its vicinity. By 1869, overwork began to have an effect on his health and he took several trips to Italy with his wife, but to no avail. In 1870, following the collapse of a wall at one of his buildings that killed eight people, he became mentally ill (or had a stroke; it's not clear which). He was placed in a private psychiatric clinic in Oberdöbling and died there, aged 43. Major buildings Circus Renz, Zirkusgasse, Wien 2 (1853–1854) Galvagnihof, Hoher Markt 10–11, Wien 1 (1854) Palais Schlick, Türkenstraße 25, Wien 9 (1856–1858) Grand Hotel, Kärntner Ring 9, Wien 1 (1861–1865) Werkstätten- und Kulturhaus, Währinger Straße 59, Wien 9 (1866) Palais Klein, Dr.-Karl-Lueger-Platz 2, Wien 1 (1867) Palais Gutmann, Kantgasse 6, Wien 1 (1871) References Further reading Constantin von Wurzbach: Biographisches Lexikon des Kaiserthums Österreich. 60 Volumes, 1856–1891. Felix Czeike: Historisches Lexikon Wien, Vol. 5. Kremayr & Scheriau, Wien 1997. Category:1831 births Category:1874 deaths Category:19th-century Austrian architects Category:19th-century German architects
{ "pile_set_name": "Wikipedia (en)" }
Knowledge of Suicide Risk Factors, But Not Suicide Ideation Severity, Is Greater Among College Students Who Viewed 13 Reasons Why. To test associations between viewing 13 Reasons Why, Season 1 and past week suicide ideation severity, behavior risk, stigma, and knowledge in college students. To explore whether personal exposure to suicide and depressive symptom severity moderated these associations. Eight-hundred and eighteen college students, 64% (n = 522) of whom watched 13 Reasons Why. Students completed surveys online. Multivariate negative binomial regressions were used to test associations between watching 13 Reasons Why and suicide-related variables, and interaction terms. Suicide ideation severity and suicide behavior risk were not significantly associated with viewing 13 Reasons Why; however, there was limited statistical power to detect associations. The association between watching 13 Reasons Why and greater suicide knowledge was stronger among those who did not have personal exposure to suicide. 13 Reasons Why may be a platform for psychoeducation on suicide, particularly among those who do not have personal exposure.
{ "pile_set_name": "PubMed Abstracts" }
Is Artificial Intelligence in Government a Good Idea? It may be hard for most of us to believe but there used to be a time when people were actually scared of machines with cognitive abilities, and that magical period was called the 60s. If you were living in the 60s this subject would have sparked so much debate and controversy. Well at that time so did talk of aliens, women’s rights, racism and going to school. Hey, wait a minute that stuff happens today as well, so I must tread carefully. Yes indeed the 60s were fun times, but what’s not strange is the reality that the robots are here and by the looks of things it seems they might be starting to govern us already. Things are escalating quite fast indeed, the good news here is that we will all be still alive to see the rise of the machines, and that’s the bad news as well. What Process in Government Could AI Take Over? Beyond the obvious stereotypes, there are a lot of processes within the government that happen on an unfathomable scale. The fact is unless you are going through that process you wouldn’t realize the sheer volume of documents government agencies process every day. We often forget the fact that the government deals with documents of millions of people and most of the time these are in hard copy format. It is no wonder that government employees are grumpy all the time. If we were to break down the government’s functioning, it would take us days to cover all of them. So, for the sake of brevity, we’ll narrow it down to three major functions. Automated Document Based Processes At the heart of any public sector are the processes revolving around documents. And as mentioned earlier there are a lot of them. So, most of the jobs in government are based on document processing. This is a repetitive process with a certain mechanical edge to it. The rather mechanical nature of the process makes it optimal for automation. Machine learning is a technology that could be applied quite effectively here to prepare the systems for any contingency. Again, as with most machine-based processes, the margin of error is largely reduced. However, there are concerns over how well an automated system could be used to process handwritten documents. Not everything today is in digital format and the use of good old pen and paper are still quite popular and in a government agency, an AI system will have to face such tasks often. Natural Language Processing has its own limitation and the range of variety in handwritten documents could prove quite challenging for even the most advanced AI systems. Predictive Analysis This is a technology that is in particular useful in fields such as Income Tax where detection on various levels is mandatory. While filing taxes, it is quite common for people and companies to cheat, which cannot be determined using traditional methods. Machine Learning again plays a major role in coming up the right algorithms to process all such data, particularly ones that are based on Natural Language. Natural Language Processing is a vital part of such government processes. However, the threat here again is the AI’s limitations. Here if the machine misreads information it could cost dearly as people could be convicted of an error the machine made. Ironically this is not unprecedented. Weak AI in the 90s have been applied to a great extent and has lead to plenty of dispute and criticism. With access to IoT today we could run documents through several stages of cross-checking to ensure that nothing is missed out or misinterpreted. Sensor-Based Technology This is where AI stops being a helpful tool and starts bordering on the level of menacing. It is often debated whether or not the use of AI could replace humans. When AI really takes over on a mainstream level the first jobs to go will probably be on the maintenance and security levels. As far as maintenance goes we already have several automated devices that work 24/7 with various tasks both on the domestic as well as enterprise levels. However, the use of AI in security has largely been on a monitoring level with visual, touch as well as audio cues being constantly tracked and later processed. That is not saying that the use of automated physical security is unprecedented. There have been several instances where the use AI in security has gone beyond the mere monitoring level, particularly in defense services. However, as far as the government is concerned the requirement for such security has not yet arisen with the exception of the postal workers going ‘postal’ back in the 90s. But that was an internal strife and there is no man-made machine that can stop the wrath of the postmen. Anyway sensor based security in government could be used in the widespread implementation of tracking services such as the RFID chip and biometric transaction/enrolling services. Conclusion While the potential for AI in government yet again is quite vast, adoption in this sector is not as swift as other verticals. This is quite understandable considering how slowly digitalization seeped into government and the process is not yet complete in developed countries let alone countries that don’t yet have widespread internet access. So, AI in government is something that could bring about huge changes along with massive layoffs, but the time it would take for such an event to come to pass would be much like waiting at the ATMs back in 2016 when the generous government of India decided to alleviate all our monetary issues. What fun times we live in indeed.
{ "pile_set_name": "OpenWebText2" }
In vitro and in vivo efficacy of sulfo-carrabiose, a sugar-based cosmetic ingredient with anti-cellulite properties. Most of adult women exhibit cellulite on the hips, buttock and thighs. Although extracellular matrix and lymphatic system disorders can increase its appearance, cellulite basically results from an excessive fat storage in the adipose tissue which exerts considerable pressure on the surrounding skin tissue and creates a dimpled irregular appearance. Caffeine, the most widely used anti-cellulite ingredient, favours fat break-down by inhibiting the phosphodiesterase enzyme and encouraging a high intracellular level of cAMP. A series of studies has shown that spermine and spermidine, two ubiquitous polyamines, encouraged fat storage and slowed fat break-down in the adipose tissue. Besides, it was shown that heparan sulfate glycosaminoglycans had a strong affinity for polyamines. To design a new cosmetic ingredient with anti-cellulite properties, we used molecular modelling to screen several ingredients with a structure similar to that of heparan sulfate glycosaminoglycans. This way, we identified sulfo-carrabiose as a potent molecule for trapping spermine and spermidine. These virtual results were first confirmed in tubo where sulfo-carrabiose was shown to dose-dependently inactivate spermine and spermidine. In vitro, adipocytes cultured with sulfo-carrabiose exhibited a significant reduction of lipogenesis and a significant increase of lipolysis. When sulfo-carrabiose was incorporated in a cosmetic formula, significant improvements were observed in thigh circumference, with better results than those obtained with caffeine after 28 days of use. Furthermore, a combination of caffeine and sulfo-carrabiose led to results significantly better than those obtained with caffeine alone. As measured by fringe projection, thigh volume was also significantly reduced after sulfo-carrabiose treatment. Finally, the appearance of cellulite assessed by clinical evaluation was also significantly reduced within 28 days.
{ "pile_set_name": "PubMed Abstracts" }
Cristal Kaytlin – My first Triple Penetration. Cristal Kaytlin get DP/DAP/GAPES/BALLDEEP. Top Style Czech Girl getting facialized 2350 72%
{ "pile_set_name": "OpenWebText2" }
The research described in this proposal aims to increase our knowledge concerning the fever response in animals other than humans; specifically relating to the occurrence of the fever response in one species of amphibian and two species of mammals living in their natural environment, the generality of the fever response in reptiles, and the energetic cost of the fever response in a free-living reptile. All of the studies concerning the fever response has never been demonstrated or investigated under natural field conditions where the greater heterogeneity of biotic and abiotic factors may lead to a more complex response. Also, although the fever response has been demonstrated in a number of ectothermic vertebrates under laboratory conditions, no systematic study of the fever response has been undertaken with any specific taxonomic group of ectothermic vertebrates to demonstrate the generality of the response and its relationship to life history characteristic of a species. Data on the fever response of the bullfrog, the California Ground squirrel, and the desert cottontail rabbit will first be gathered in the laboratory and than the laboratory baseline data will be applied to experiments on free-living animals. Body temperatures will be determined with the use of temperature sensitive radio transmitters. In the survey of the Class Reptilia for the fever response, II species representing 7 different Families will be given injections of heat-killed Aeromonas hydrophila, a gram negative bacterium known to be pathogenic to reptiles. The reptilian species to be used represent animals from different habitats (aquatic, mesic, desert), with different food habits (herbivorous, insectivorous, carnivorous), and with different activity patterns (diurnal, nocturnal). In the section that pertains to the energetic cost of the fever response, time budget analysis and oxygen consumption measurements will be combined to yield an estimate of the energetic cost of the fever response in a free-living reptile; the chuckwalla.
{ "pile_set_name": "NIH ExPorter" }
Q: highcharts display tooltip on category label hover In Highcharts how do i get access to the click event on the category labels? Im looking to add a tooltip to each label but struggling to find a way many thanks A: You can iterate on each SVG label element and add click event by "on" function. $.each(chart.xAxis[0].ticks,function(i,tick){ tick.label.on('click',function(){ alert(tick.pos); }); }); http://jsfiddle.net/aPg8H/
{ "pile_set_name": "StackExchange" }
24 divide 123672? True Does 4 divide 45? False Is 134 a factor of 20541? False Is 7 a factor of 2504? False Is 25 a factor of 775? True Is 4515 a multiple of 3? True Is 114 a factor of 5884? False Is 6 a factor of 662? False Is 16127 a multiple of 11? False Does 6 divide 2130? True Is 18 a factor of 5523? False Is 55 even? False Is 265 a multiple of 4? False Is 123 a multiple of 41? True Is 1344 a multiple of 18? False Does 9 divide 1161? True Is 72 a factor of 2952? True Is 56 a factor of 19312? False Does 7 divide 739? False Is 4060 a multiple of 70? True Is 71 a factor of 1147? False Is 24 a factor of 3432? True Is 596 a multiple of 14? False Does 4 divide 500? True Is 1212 a multiple of 12? True Is 15 a factor of 2700? True Does 76 divide 12008? True Is 14 a factor of 36705? False Does 100 divide 14000? True Is 113 a multiple of 5? False Is 1812 a multiple of 12? True Is 41 a factor of 18147? False Is 2044 a multiple of 14? True Is 69223 a multiple of 203? True Is 22389 a multiple of 5? False Does 58 divide 1740? True Is 916 a multiple of 16? False Is 18 a factor of 2322? True Does 22 divide 1536? False Is 14 a factor of 2379? False Is 5 a factor of 1005? True Is 76 a multiple of 38? True Does 5 divide 297? False Is 16 a factor of 2026? False Is 162 a factor of 20574? True Does 17 divide 6647? True Does 19 divide 17282? False Does 33 divide 693? True Does 7 divide 1064? True Is 26892 a multiple of 162? True Does 179 divide 5554? False Is 1900 a multiple of 10? True Is 33 a factor of 6159? False Is 22785 a multiple of 217? True Is 10 a factor of 4650? True Is 4118 a multiple of 142? True Is 46 a factor of 26270? False Is 1573 a multiple of 13? True Does 15 divide 8430? True Is 3119 a multiple of 18? False Is 1362 a multiple of 13? False Is 3 a factor of 84? True Is 51 a factor of 102? True Does 150 divide 7126? False Is 5461 a multiple of 68? False Is 6108 a multiple of 6? True Is 18204 a multiple of 148? True Is 713 a multiple of 19? False Is 1102 a multiple of 38? True Is 29184 a multiple of 192? True Is 6 a factor of 2909? False Does 5 divide 370? True Is 1552 a multiple of 8? True Does 74 divide 4736? True Does 34 divide 462? False Does 43 divide 7224? True Is 205 a factor of 17835? True Is 1155 a multiple of 10? False Does 143 divide 63635? True Is 7 a factor of 329? True Does 3 divide 14213? False Does 14 divide 7350? True Does 27 divide 3132? True Does 10 divide 246? False Does 19 divide 855? True Does 43 divide 2324? False Does 21 divide 43701? True Does 14 divide 1380? False Is 54 a factor of 5616? True Does 7 divide 21? True Is 715 a multiple of 97? False Does 18 divide 144? True Is 5 a factor of 84? False Is 45133 a multiple of 121? True Is 1983 a multiple of 71? False Does 4 divide 1500? True Is 44 a factor of 44? True Is 107 a factor of 107? True Does 25 divide 25? True Does 208 divide 69680? True Is 2378 a multiple of 6? False Does 312 divide 71760? True Does 12 divide 744? True Is 11 a factor of 67889? False Is 1239 a multiple of 21? True Is 12 a factor of 159? False Does 2 divide 2635? False Is 464 a multiple of 6? False Is 32 a factor of 55856? False Does 290 divide 24026? False Is 39304 a multiple of 33? False Is 17 a factor of 3706? True Is 68110 a multiple of 14? True Is 14 a factor of 376? False Is 40 a factor of 29027? False Does 196 divide 21428? False Does 16 divide 1152? True Is 2025 a multiple of 5? True Is 3111 a multiple of 51? True Is 1228 a multiple of 12? False Is 6612 a multiple of 58? True Is 29 a factor of 377? True Does 241 divide 23618? True Does 2 divide 12? True Is 15 a factor of 9323? False Does 9 divide 2745? True Is 30182 a multiple of 13? False Does 19 divide 10026? False Does 67 divide 201? True Does 23 divide 12995? True Does 6 divide 54298? False Is 165 a factor of 2215? False Does 20 divide 60? True Does 10 divide 1650? True Is 4 a factor of 171? False Is 826 a multiple of 14? True Is 89 a multiple of 14? False Does 33 divide 726? True Is 78 a factor of 2855? False Is 595 a multiple of 7? True Is 162 a multiple of 81? True Is 275 a multiple of 5? True Is 549 a multiple of 3? True Is 146 a factor of 4818? True Is 640 a multiple of 20? True Is 26 a factor of 41642? False Is 8468 a multiple of 23? False Does 10 divide 13510? True Is 24 a factor of 11884? False Is 155 a factor of 13175? True Is 3080 a multiple of 88? True Is 68 a factor of 17952? True Is 15979 a multiple of 162? False Does 6 divide 204? True Does 8 divide 6270? False Is 6 a factor of 6? True Is 14484 a multiple of 17? True Does 359 divide 149344? True Does 87 divide 2124? False Is 5 a factor of 525? True Is 546 a multiple of 14? True Is 116 a multiple of 58? True Is 435 a multiple of 3? True Is 19 a factor of 20? False Does 13 divide 21931? True Is 76 a multiple of 11? False Is 13296 a multiple of 12? True Is 27 a factor of 5662? False Does 13 divide 1183? True Is 3591 a multiple of 57? True Is 208 a multiple of 16? True Is 9 a factor of 5712? False Is 85682 a multiple of 50? False Does 20 divide 1866? False Does 46 divide 5428? True Is 60972 a multiple of 284? False Does 18 divide 504? True Is 8 a factor of 770? False Is 446 a multiple of 19? False Is 8 a factor of 1386? False Does 10 divide 6390? True Does 169 divide 1014? True Is 108 a multiple of 5? False Is 13 a factor of 97021? False Is 1386 a multiple of 7? True Is 81 a factor of 3078? True Is 4128 a multiple of 43? True Is 18666 a multiple of 102? True Is 13014 a multiple of 86? False Is 14 a factor of 978? False Does 8 divide 106? False Is 4974 a multiple of 43? False Is 38 a factor of 12242? False Does 202 divide 2901? False Is 16 a factor of 784? True Is 1152 a multiple of 96? True Is 116 a factor of 4640? True Does 13 divide 624? True Does 4 divide 7538? False Does 4 divide 2661? False Is 57 a factor of 1196? False Is 15 a factor of 8643? False Is 14 a factor of 3334? False Does 22 divide 528? True Does 85 divide 500? False Is 5855 a multiple of 26? False Is 34 a multiple of 2? True Is 998 a multiple of 19? False Is 18645 a multiple of 33? True Is 4255 a multiple of 23? True Is 11 a factor of 6979? False Is 50528 a multiple of 142? False Is 20 a factor of 2361? False Is 238 a multiple of 34? True Does 19 divide 513? True Is 10336 a multiple of 8? True Is 23 a factor of 958? False Is 15 a factor of 750? True Is 34 a factor of 102? True Does 10 divide 12799? False Is 28 a factor of 420? True Is 10 a factor of 50? True Is 232 a factor of 44532? False Is 1196 a multiple of 52? True Does 77 divide 1162? False Does 46 divide 748? False Is 136656 a multiple of 13? True Is 4 a factor of 1542? False Is 29 a factor of 13021? True Is 8559 a multiple of 27? True Is 30 a factor of 1130? False Is 39208 a multiple of 169? True Is 3143 a multiple of 51? False Does 22 divide 17495? False Does 7 divide 623? True Is 21993 a multiple of 13? False Is 792 a multiple of 60? False Is 33 a multiple of 19? False Is 228 a factor of 9442? False Is 11 a factor of 4180? True Is 967 a multiple of 10? False Does 19 divide 10705? False Is 50 a factor of 10500? True Is 6933 a multiple of 13? False Is 1944 a multiple of 72? True Does 13 divide 780? True Does 7 divide 245? True Is 40 a multiple of 4? True Is 22279 a multiple of 34? False Does 7 divide 602? True Is 4 a factor of 4868? True Does 28 divide 112? True Is 4 a factor of 56? True Is 45255 a multiple of 92? False Is 58 a factor of 290? True Is 11 a factor of 5686? False Is 217 a multiple of 93? False Is 19 a factor of 2981? False Does 38 divide 152? True Is 33 a factor of 488? False Does 56 divide 5469? False Is 970 a multiple of 14? False Is 639 a multiple of 37? False Is 3 a factor of 76? False Is 129 a factor of 14614? False Is 14 a factor of 998? False Is 210 a multiple of 21? True Is 77 a factor of 2002? True Is 2957 a multiple of 3? False Is 2 a factor of 486? True Is 27195 a multiple of 35? True Does 22 divide 66? True Is 55 a factor of 7854? False Is 931 a multiple of 3? False Is 7044 a multiple of 12? True Is 35041 a multiple of 128? False Is 58 a factor of 18509? False Is 28 a factor of 1120? True Is 78 a multiple of 2? True Does 22 divide 5720? True Is 13115 a multiple of 94? False Is 18 a factor of 578? False Is 13 a factor of 279?
{ "pile_set_name": "DM Mathematics" }
INTRODUCTION ============ Worldwide, around 5-10 million people may be infected with the human T cell lymphotropic virus type I (HTLV-I) with high prevalences in southern Japan, parts of West Africa, the Caribbean Islands, Melanesia and South America[@B1] ^,^ [@B2]. Brazil is considered one of the largest endemic areas of HTLV-I and associated diseases, and the city of Salvador, capital of the State of Bahia presents the highest prevalence (1.76% in the overall population)[@B3]. Nevertheless, HTLV-I worldwide prevalence is probably underestimated since it remains uninvestigated in many large and highly populated regions[@B4]. In endemic areas, mother to child transmission, which is mainly linked to extended breastfeeding is a main route of HTLV-I transmission, but sexual intercourse, blood transfusion and contaminated needle sharing are other forms of transmission[@B4]. Most HTLV-I infected individuals remain lifelong asymptomatic carriers, while 2-5% may develop adult T-cell leukemia/ATL and 0.25-3.8% may develop HTLV-I-associated myelopathy/tropical spastic paraparesis (HAM/TSP)[@B4]. HAM/TSP, the most common neurological manifestation of HTLV-1 is a slowly progressive inflammatory demyelinating disease of the central nervous system (CNS) with gradual spastic paraparesis, neurogenic bladder disturbances, and other sensory signs[@B5]. High proviral loads are associated with faster disease progression, increased proliferation and migration of HTLV-I infected lymphocytes to the CNS[@B6]. HAM/TSP is an immune-mediated disease of the CNS, but its precise immunopathogenic mechanism is not completely understood. CD4^+^ T cells represent the main virus reservoirs and infiltrates of virus infected CD4^+^/CD8^+^ T cells in the spinal cord and increased production of inflammatory cytokines such as IFN𝛾, TNFα and IL1β have been described[@B6] ^,^ [@B7] ^,^ [@B8]. Alterations in magnetic resonance imaging (MRI) of the brain and spinal cord in HAM/TSP are probably a result of the virus-induced inflammatory process[@B9] ^,^ [@B10]. Several laboratory alterations in systemic and cerebrospinal fluid (CSF) have been described in HAM/TSP patients[@B11] ^,^ [@B12] ^,^ [@B13]. In neuro-inflammatory diseases, neopterin concentration in biological specimens has been proposed as a marker of disease activity indicating cellular-mediated immunity (CMI) activation. Neopterin, a pteridine derived from guanosine triphosphate is produced by activated monocytes-macrophages and dendritic cells following IFN𝛾 production by TH1 cells[@B14] ^,^ [@B15]. Neopterin has been associated with HAM/TSP diagnosis and prognosis indicating the degree of intrathecal CMI activation[@B16] ^,^ [@B17]. This study describes clinical and laboratory parameters which include serum and CSF neopterin measurements in HAM/TSP patients and in asymptomatic anti HTLV-I positive carriers from the Brazilian Amazon. MATERIAL AND METHODS ==================== HAM/TSP Patients and HTLV-I Carriers ------------------------------------ Fifty-two participants from the city of Manaus (Amazonas State, North Brazil) were investigated: 11 HAM/TSP patients, 21 HTLV-I carriers and 20 healthy individuals. HAM/TSP patients (\> 18 years old, positive anti HTLV-I in serum and CSF, confirmed by western blot or PCR) were recruited at the Neurology Ambulatory, *Getúlio Vargas* *University Hospital*, Federal University of Amazonas. The following exclusion criteria were considered: neoplastic or vascular diseases of the spinal cord, neurodegenerative or demyelinating diseases, myelopathy associated with vitamin B12 deficiency, infectious myelopathies, auto-immune diseases, positive serology to CMV, HBV, HCV, HIV, HTLV-II, syphilis or Chagas disease; history of malaria or pulmonary tuberculosis; previous treatment with corticosteroids or other immune modulating drug. The clinical diagnosis of HAM/TSP was conducted by an expert neurologist (Takatani M) according to criteria proposed by the World Health Organization[@B18]. Patients were classified according to the Osame's motor disability score/OMDS grading incapacity level from 0 (normal gait and running), to 10 (completely bedridden)^19^. MRI of the brain and spinal column was performed for the differential diagnosis with other brain or spinal cord pathologies as multiple sclerosis. Gender, age, duration of disease and symptoms were also recorded. Recently diagnosed, asymptomatic anti HTLV-I positive carriers, confirmed by western-blot or PCR were recruited among blood donors of a main public blood bank (Hematology and Hemotherapy Foundation from Amazonas State /FHEMOAM), Manaus, Amazonas State. HTLV-I carriers (both genders, \> 18 years old, without myelopathy-related symptoms) were included. Exclusion criteria were: chronic liver, kidney or heart disease, pneumopathy, dermatological diseases, any sign of infectious disease such as fever, auto-immune diseases, positive serology for HBV, HCV, HIV, HTLV-II, syphilis, Chagas disease and pregnancy. For comparisons of serum neopterin levels, 20 healthy individuals (10 males, 10 females; median age = 34.6 years, min.23- max. 44) were recruited among blood donors at FHEMOAM. They were all seronegative for HIV, HCV, HBV, Chagas disease, syphilis and HTLV-I/II. Clinical Specimens ------------------ HAM/TSP patients had venous blood and CSF collected at *Getúlio Vargas* *University Hospital*; HTLV-I carriers had biological samples collected at FHEMOAM. CSF (8mL) was collected by lumbar puncture performed by a single expert professional (Takatani M); only samples devoid of red blood cells were used. For HAM/TSP patients and HTLV-I carriers who consented, paired blood and CSF samples were collected within a two-hours period. Biological samples were aliquoted and stored at -80^o^C until tested. For ethical reasons, only blood samples were collected from healthy participants. HTLV-I Diagnosis and Neopterin Measurements ------------------------------------------- HTLV-I status of all the participants was determined by ELISA (MUREX HTLV I+ II GE80/81, MUREX Diagnosticos, Brasil) and confirmed by western blot (HTLV BLOT 2.4, Genelabs Diagnostics, Singapore) or PCR as previously described[@B20]. Competitive ELISA was used to evaluate neopterin levels in serum and CSF (IBL neopterin ELISA, Hamburg, Germany), the normal serum neopterin concentration being \< 10 nmol/ L. As previously reported, the normal neopterin CSF value was considered 4.2 nmol/ L.[@B21] CSF was also used for routine laboratory tests (cell count, total protein, glucose levels). Comorbidities and other exclusion conditions were also evaluated through the following laboratory parameters: blood cell count, erythrocyte sedimentation rate/ESR, lipidogram, glucose, urea, creatinine, AST, ALT, ALP, prothrombin and bilirubin levels. Statistical Analysis -------------------- Exploratory data analyses including mean, medians, box-plots, interquartile ranges, frequencies were calculated by using the t student test, Pearson's correlation. Kruskal Wallis and Man Whitney tests were used for both HAM/TSP and asymptomatic carriers data; when applicable the Graph Pad Prism 6 was used; *p* values \< 0.05 were considered significant. RESULTS ======= Clinical and Demographic Profiles of HAM/TSP Patients and HTLV-I Carriers ------------------------------------------------------------------------- Among HAM/TSP patients ([Table 1](#t1){ref-type="table"}), females predominated; the median age was 48 years (27-66 years), the duration of symptoms ranged from 1-16 years and the Osame's motor disability score/OMDS varied from 2 to 8. Most HAM/TSP patients (9/11, 81,9%) were able to walk (OMDS ≤ 6) while 2 (18,1%) were wheel chair-users. The lowest disability scores were seen in patients with the shortest duration of disease (patients \# 7 and 10: 1 and 3 years of disease, respectively). All the HAM/TSP patients reported difficulty to walk, around half (54.5%) had low-back pain and paresthesia in the lower limbs was the most common sensory complaint (45.4%). The two male HAM/TSP patients did not report erectile or bladder dysfunction while 8 out of 9 female patients reported bladder dysfunction, with urinary frequency alterations, urgency or incontinence. Among 21 HTLV-I carriers (15 females, 6 males), the median age was 44 years (20-54 years). Table 1Main demographic, clinical and laboratory features of HAM/TSP patients.Case \#GenderAge (years)OMDSDisease (years)Neopterin Serum nmol/LNeopterin CSF nmol/LProtein CSF mg/dLGlucose CSF mg/dLCell count CSF cell/mm^3^1F564106.57.8325042F52456.216.5401133F6681635166444744F62462.87.84141215F55586.8NANANANA6F445154.81245.75017M48211220735838M277410174758189F404741742531310F402312.5181850711F4461412.52616261[^2] Leukocyte, Protein and Glucose levels in CSF of HAM/TSP patients and HTLV-I Carriers ------------------------------------------------------------------------------------ Three HAM/TSP patients had CSF protein levels above the normal range (patients \# 6, 7 and 8, [Table 1](#t1){ref-type="table"}) and patients \# 3, 4 and 9 presented CSF protein concentration slightly higher than the normal range. The highest CSF protein concentration was seen in the most recently diagnosed patient (\# 7: 1 year of disease). All the HAM/TSP patients had normal levels CSF glucose, four patients had CSF leukocyte counts above the normal range (\# 4, 8, 9, 10), and lymphocytes represented the predominating cell population. In HTLV-I carriers ([Table 2](#t2){ref-type="table"}), only case \# 2 had normal CSF protein level, all the carriers had normal CSF glucose levels and leukocyte cell counts were above the normal limit in 2 out of 6 carriers. Table 2Main demographic and laboratory features of HTLV-I carriers\*Control \#GenderAge (years)Neopterin serum nmol/LNeopterin CSF nmol/LProtein CSF mg/dLGlucose CSF mg/dLCell count CSF cel/mm^3^1M384.32.2566822F463.62.7397703F474.53.2756184F354.85.29857145M546.63.0887816F362.84.552673[^3] Neurologic Characterization of HAM/TSP Patients ----------------------------------------------- Brain MRI of 7 out of 11 HAM/TSP patients (\# 1, 2, 3, 4, 5, 9, 10; [Table 1](#t1){ref-type="table"}) presented unspecific lesions in the white matter (WM) described as gliosis. Patient \#1 showed multiple white matter confluent lesions extended from periventricular to subcortical locations, suggestive of a demyelinating disease ([Figure 1](#f1){ref-type="fig"}) without lesions in the posterior fossa or in the thoracic spine. This 56 years old female patient, with 10 years of disease, had a motor incapacity score = 4 (needs support while using stairs but could walk without assistance). Only one patient (\# 3) showed spinal cord MRI alteration while no sign of spinal cord swelling was seen in the other patients. Cerebral atrophy was observed in one HAM/TSP patient (\# 5, [Table 1](#t1){ref-type="table"}) without association with dementia. No correlation between the symptoms and the number of WM lesions was found, and no evidence of cerebellar dysfunction was detected. Cranial nerve functions were normal in all the patients. Figure 1Brain magnetic resonance imaging (MRI, axial flair) showing hyper intense multiple lesions in the periventricular and subcortical white matter in a 56-year-old female HAM/TSP patient with 10 years of disease symptoms and motor disability grade 4. Neopterin Levels in Peripheral Blood and CSF in HAM/TSP Patients and HTLV-I Carriers ------------------------------------------------------------------------------------ Serum neopterin levels in healthy individuals (n = 20, median = 4.7 nmol/ L; min. 2.7- max. 8.0 nmol/L) and asymptomatic HTLV-I carriers were similar (n = 21; median = 4.3 nmol /L; min. 2.7- max. 7.2 nmol/ L) (Figure 2A; *p* \> 0.05). However serum neopterin concentrations in HAM/TSP patients (n = 11; median = 6.8; min. 2.8-max. 35 nmol/ L, [Table 1](#t1){ref-type="table"}, [Fig. 2](#f2){ref-type="fig"}A) were higher compared to the HTLV-I carriers (*p* = 0.0033) and the healthy participants (*p* \< 0.0001). Figure 2(A). Neopterin concentrations in serum of healthy individuals, in serum and cerebrospinal fluid (CSF) of HTLV-I asymptomatic carriers and of HAM/TSP patients. Boxes encompass 25th and 75th percentiles of the distribution; black lines within boxes refer to the median values; (B). Neopterin concentrations in paired serum and CSF samples of HAM/TSP patients; (C). Neopterin concentrations in paired serum and CSF samples of HTLV-I carriers. In HAM/TSP patients, the median serum concentration of neopterin was 6.8 nmol/ L (2.8-35 nmol/ L) while the median CSF neopterin was 17 nmol/ L (7.8-166 nmol/ L), [Table 1](#t1){ref-type="table"}, [Figures 2](#f2){ref-type="fig"}A, 2B). In HTLV-I carriers (n = 6) normal serum and CSF neopterin levels were detected (serum: median = 4.4 nmol/ L; min. 2.7- max. 7.2 nmol/ L; CSF median = 3.1 nmol/L; min. 2.2 - max. 5.2 nmol/ L). CSF neopterin concentrations in HAM/TSP patients (n = 10) were higher when compared to HTLV-I carriers (*p*= 0.0016, [Fig. 2](#f2){ref-type="fig"}A). In HAM/TSP, paired serum-CSF analysis of neopterin showed consistently higher levels in CFS (*p* = 0.024, [Figures 2](#f2){ref-type="fig"}A, 2B). In contrast, in HTLV-I carriers (n = 6), the median neopterin concentration in serum and in CSF was similar (*p* \> 0.05) ([Figures 2](#f2){ref-type="fig"}A, 2C). However, in HTVL-I carriers a heterogeneous pattern was seen: in 4 out of 6 carriers neopterin levels in serum samples were higher compared to CSF, whereas in two other carriers, neopterin levels were higher in CSF compared to the serum samples. In HAM/TSP patients, a moderate correlation was found between CSF neopterin and motor incapacity level/OMDS (r = 0.62, *p* = 0.043). In HAM/TSP patients we have also analyzed if the difference of neopterin levels between the two compartments (CSF minus serum) would correlate with the data available. These analyses showed a moderate correlation between the difference of neopterin in CSF minus serum and OMDS (r = 0.62, *p* = 0.05). No correlation was found between CSF neopterin and duration of disease, CSF cell count, CSF glucose, CSF protein concentration (*p*\> 0.05). No correlation was found between serum neopterin levels and duration of disease or motor incapacity level (*p* \> 0.05). In asymptomatic HTLV-I carriers no correlation was observed between CSF neopterin concentrations and CSF cell counts, protein or glucose concentrations. DISCUSSION ========== Brazil represents one of the largest endemic areas for HTLV-I, however there are scarce data from many areas in the country including the Amazonas State. In this context, our study provides detailed laboratory and clinical features of HAM/TSP patients from the Brazilian Amazon. As previously reported, in our study young adult females predominated in both symptomatic HAM/TSP patients and asymptomatic HTLV-I carriers[@B22]. Females are reported to have higher incidences of HAM/TSP with faster disease progression especially when symptoms precede menopause, suggesting a role for sex hormones[@B23]. A Brazilian nationwide survey (1994-1995) has shown that the ratio of infected females increased from South to North[@B24]. It is also stated that, regardless of different socio-economic and cultural environments, in highly endemic regions, HTLV-I seroprevalence increases gradually with age, especially in women. This increment may be associated with the overtime accumulation of risky sexual exposure or of other transmission risk factors[@B25] ^,^ [@B26] ^,^ [@B27]. A study showed that among HTLV-I positive blood donor carriers from Iran, males predominated, probably reflecting the lower tradition of female blood donors in this country, whereas among HAM/TSP patients, females predominated[@B28]. We acknowledge limitations in our study including the small sample size and the lack of HTLV-I proviral loads; however, our data on serum and CSF neopterin measurements confirms its role as a marker of central nervous system disease with inflammatory activity[@B29]. In our study, HAM/TSP patients had higher serum neopterin concentrations compared to HTLV-I carriers and healthy participants. Moreover, in HAM/TSP patients, paired serum-CSF neopterin analysis showed higher values in CSF, which were also higher compared to CSF neopterin in asymptomatic carriers. In contrast, among HTLV-I carriers, serum and CSF neopterin concentrations were similar. HAM/TSP patients compared to HTLV-I carriers had higher neopterin concentrations both in serum and in CSF, indicating that a less invasive sample as the peripheral blood may also give valuable information about the level of CNS/spinal cord inflammation and CMI activation. Our results corroborate previous data indicating that neopterin represents another potential marker of disease activity in HAM/TSP patients with potential applications to assess the disease progression and to monitor the treatment efficacy[@B17] ^,^ [@B30]. In fact, in our study group, the oldest HAM/TSP patient (66 years old) had the longest duration of symptoms (16 years), and the highest motor disability score (OMDS = 8). This patient had the highest neopterin concentrations in both serum (35 nmol/L) and CSF (166 nmol/ L). This patient had a slowly progressive myelopathy, which evolved rapidly to superior member incapacity in the last 6 months prior to the study enrollment. Serial brain and spinal cord MRI did not reveal any alteration that could be possibly related to this rapid clinical deterioration. During the disease course, no immunosuppressive or corticosteroid therapy was prescribed. There is no cure for HAM/TSP but different treatments can alleviate symptoms, so that biomarkers to indicate the risk and the rate of disease progression may have a potential clinical relevance and application[@B31]. Among routine laboratory tests, moderate pleocytosis and raised protein content represent the most frequent CSF findings in HAM/TSP, especially during recent clinical manifestations, and these parameters tend to gradually decline[@B32]. Mild CSF mononuclear pleocytosis and discrete increase of CSF protein have been reported[@B11]. In our HAM/TSP patients, mild pleocytosis, mainly of mononuclear cells was reported, as previously described[@B18]. A study in 20 HAM/TSP Brazilian patients described mild pleocytosis in 30%[@B13]. In our HAM/TSP patients the highest CSF protein level was detected in the patient with the most recent diagnosis (\# 7, 1 year, [Table 1](#t1){ref-type="table"}) indicating the possible association of CSF inflammatory markers with recent disease[@B33]. Interestingly, in our study, in 5 out of 6 asymptomatic carriers who had CSF collected, protein levels were abnormal, probably reflecting a more recent infection. In our HAM/TSP patients and asymptomatic carriers, there was lack of correlation between CSF neopterin concentrations and CSF cell counts, protein or glucose concentrations, similarly to data previously described[@B34]. However, one study showed correlation between both CSF neopterin and pleocytosis/ glucose levels in 41 HAM/TSP patients[@B35]. In our small group of HAM/TSP, time since diagnosis ranged widely and it is possible that differences in viral loads, which were not available, may have influenced these correlations. A slowly progressive disease course is considered the hallmark of HAM/TSP[@B33] ^,^ [@B36]. However, the rate at which symptoms progress varies widely including patients that deteriorate rapidly while others remain clinically stable over the years. Therefore, biomarkers able to predict the level and speed of disease progression are important to identify patients at higher risk and can provide clinicians with a more precise prognosis and more appropriate treatment. A retrospective study has compared the prognostic value of several potential biomarkers for HAM/TSP in peripheral blood and CSF of deteriorating and stable HAM/TSP patients[@B37]. This study has identified CSF levels of CXCL10, CXCL9 and neopterin as promising candidate prognostic biomarkers for HAM/TSP progression, with better correlations than HTLV-I proviral loads in peripheral blood mononuclear cells. These results corroborate the importance of neopterin as a biomarker for HAM/TSP as shown in our study. Moreover, these results suggest that assessing multiple prognostic biomarkers in both, blood and CSF, may better discriminate patients with higher risk of disease progression and in need of a more effective treatment. Most HAM/TSP patients from our study had slowly progressive symptoms, except for one patient (\#8, [Table 1](#t1){ref-type="table"}, 27 years old male, OMDS=7, 4 years of symptoms) that progressed rapidly. Disease progression in HAM/TSP can reflect an active inflammatory process in the spinal cord. In fact, this patient had elevated neopterin levels in serum and CSF indicating inflammation and reactivation or maintenance of the inflammatory process which has been reported in HAM/TSP patients with long disease duration[@B35]. Mononuclear inflammatory infiltrates were reported in the white and gray matter of the spinal cord in a 74 years old, female HAM/TSP patient with 29 years of disease[@B36]. However, two autopsy cases of HAM/TSP patients reporting 15 and 21 years of symptoms showed very few inflammatory cells in the spinal cord and brain[@B38]. Another autopsy study of a HAM/TSP patient with 28 years of disease showed degenerative lesions in the spinal cord without inflammation[@B39]. Corticosteroid and immunosuppressive treatment for HAM/TSP patients reduce the intensity of the inflammatory reaction and consequently the tissue damage, however prolonging the reparative process[@B40]. In our observational study, no HAM/TSP patient was under immunosuppressive or corticosteroid treatment as these interventions are known to influence the inflammatory marker levels. Disease progression in HAM/TSP is considered multifactorial and the potential host and viral factors that influence the natural course of disease are not completely understood[@B41] and are beyond the scope of our study. Brain and spinal cord MRI is highly sensitive to detect and control CNS abnormalities and complications and is important for the diagnosis and treatment follow up in HAM/TSP[@B42] ^,^ [@B31]. Unspecific periventricular and subcortical white matter (WM) lesions on brain MRI are frequent in HAM/TSP patients[@B41]. It has been suggested that WM lesions may represent small vessel vasculitis and since they predominate in middle aged/older patients, they could be due to degenerative microangiopathy[@B43] ^,^ [@B44]. Among our HAM/TSP patients, most showed small lesions in the subcortical and periventricular WM, however these lesions were not associated with symptoms, as reported[@B45] ^,^ [@B46]. MRI findings of 28 Brazilian HAM/TSP patients, mostly with severe neurological incapacity, showed hyper intense lesions in brain WM, indirect atrophy signs and occasionally spinal cord lesions[@B44]. Among our HAM/TSP patients, no sign of spinal cord swelling was reported, whereas only one patient showed spinal cord atrophy, however variable levels of spinal cord abnormalities have been reported[@B46] ^,^ [@B47]. For logistic and operational reasons, our study did not include MRI to investigate possible WM abnormalities in the spinal cord and brain of HTLV-I carriers and in negative controls. In conclusion, our study shows a wide range of clinical and laboratory profiles among HAM/TSP patients, suggesting the influence of host and viral factors. Consistent with the literature, no association was found between cerebral WM lesions and disease duration or degree of motor disability. Our laboratory data reinforce the importance of neopterin measurement as a biomarker associated with CNS disease activity and as a potential biomarker of CNS disease progression. Biomarkers of CNS activity can be helpful in the clinical management of high-risk HAM/TSP patients helping to anticipate interventions to minimize spinal cord damage and to monitor treatment efficacy. The authors are thankful to the participants' cooperation, and to the support of FHEMOAM. MM Stefani is a recipient of a fellowship from CNPq/ Brazil (PQ grant \# 308381/2015-7). ETHICAL CONSIDERATIONS This study was approved by the institutional review board at FHEMOAM (protocol \# 0010). All the participants signed an informed consent form before the collection of biological specimens. [^1]: These authors have contributed equally [^2]: M: male, F: Female; OMDS: Osame's motor disability score; CSF: cerebrospinal fluid; Reference values for: serum neopterin concentration\<=10nmol/L, CSF neopterin concentration\<= 4.2nmol/L, CSF protein concentration=15-40mg/dl; CSF glucose levels=2/3 of serum glucose levels or 50-70mg/dl, CSF cell count\<=4 cell/mm^3^; NA= data not available because patient did not consent CSF collection. [^3]: \* HTLV-I carriers who consented to have CSF collected; M: male, F: Female; Age (years); CSF: cerebrospinal fluid; Reference values for: serum neopterin concentration ≤ 10 nmol/L, CSF neopterin concentration ≤ 4.2 nmol/L, CSF protein concentration = 15-40 mg/dL; CSF glucose levels = 2/3 of serum glucose levels or 50-70 mg/dL, CSF cell count ≤ 4 cell/mm^3^.
{ "pile_set_name": "PubMed Central" }