text
stringlengths 1
3.78M
| meta
dict |
|---|---|
The Tree Frog Hat and scarf set is cute and lofty for your favorite little person. Because the set is crocheted with a larger hook and super bulky yarn, you can work the whole set up in no time. Make a few for thoughtful, last minute gifts in bright and fun yarn. This pattern is also great for charity projects or charity groups because it is super warm for the recipient and easy to make!
|
{
"pile_set_name": "Pile-CC"
}
|
Orban, apel la românii din Italia: Să nu mai vină în România decât în situații absolut necesare sau urgente pentru a preveni răspândirea coronavirusului în țară
Premierul desemnat Ludovic Orban a făcut un apel, luni seară, la românii aflați în Italia, cărora le-a transmis să nu mai vină în România în perioada următoare decât în situații urgente sau absolut necesare, pentru a împiedica răspândirea coronavirusului în rândul familiilor și prietenilor din țară: Cea mai mare problemă este a cetățenilor care intră în țară cu mașina proprie. Toți cei care intră sunt obligați să completeze un formular, li se cer actele de identitate, nu pot fi forțați să arate actele din Italia, dar recomandarea asta ar fi, să li se solicite și să arate actele din Italia.
Dacă vin din zonele afectate, intră automat în carantină. Dacă vin din regiunile unde există risc crescut, măsura este de izolare la domiciliu. Carantină înseamnă și carantină instituționalizată.
Am inventariat și posibilitățile de tratare, de diagnosticare. Există un sistem de diagnosticare care presupune un anumit timp (…). Nu putem forța un cetățean român din Italia să ne prezinte pașaportul sau actul de identitate românesc, dar am insistat către Poliția de Frontieră și DSP să afle cu precizie unde stă în Italia, unde lucrează, astfel încât să stabilim cu precizie dacă este cazul să luăm o măsură sau alta.
Fac un apel la cetățenii români din zonele afectate să evite pe cât posibil deplasările care nu sunt necesare. Dacă pot să nu se deplaseze spre România, e un act de responsabilitate. Dacă au fost în zone cu risc minim, își pot contamina familia și prietenii.
Avem foarte multe intrări din Italia. Este un trafic mare.
Românii să evite deplasările în zone cu risc mare de contaminare. Din fericire până astăzi nu este niciun cetățean român care să fie bolnav. În România nu există niciun caz confirmat. Am solicitat cetățenilor români să respecte toate deciziile și informările privind coronavirusul.
|
{
"pile_set_name": "OpenWebText2"
}
|
Latest content added for UNT Digital Library Partner: UNT Libraries Government Documents Departmenthttp://digital.library.unt.edu/explore/partners/UNTGD/browse/?fq=untl_collection:WWI2014-02-28T10:41:57-06:00UNT LibrariesThis is a custom feed for browsing UNT Digital Library Partner: UNT Libraries Government Documents DepartmentCongressional Medal of Honor, the Distinguished Service Cross, and the Distinguished Service Medal Issued by the War Department Since April 6, 1971 Up to and including General Orders, Number 126, War Department, November 11, 19192014-02-28T10:41:57-06:00http://digital.library.unt.edu/ark:/67531/metadc276268/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc276268/"><img alt="Congressional Medal of Honor, the Distinguished Service Cross, and the Distinguished Service Medal Issued by the War Department Since April 6, 1971 Up to and including General Orders, Number 126, War Department, November 11, 1919" title="Congressional Medal of Honor, the Distinguished Service Cross, and the Distinguished Service Medal Issued by the War Department Since April 6, 1971 Up to and including General Orders, Number 126, War Department, November 11, 1919" src="http://digital.library.unt.edu/ark:/67531/metadc276268/thumbnail/"/></a></p><p>Book containing the names and deeds of the recipients of the Congressional Medal of Honor, the Distinguished Service Cross, and the Distinguished Service Medal awarded for actions during World War I. It includes information such as whether the award was posthumous, the person's rank, and their company (if applicable).</p>What Libraries Learned from the War.2014-02-28T10:41:57-06:00http://digital.library.unt.edu/ark:/67531/metadc276270/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc276270/"><img alt="What Libraries Learned from the War." title="What Libraries Learned from the War." src="http://digital.library.unt.edu/ark:/67531/metadc276270/thumbnail/"/></a></p><p>Pamphlet containing lessons learned by librarians during their service in World War I. Topics covered include how men were not influenced by books or libraries, that libraries must be organized, and that libraries could be used to foster the understanding of world problems.</p>The War with Germany: A Statistical Summary2014-02-28T10:41:57-06:00http://digital.library.unt.edu/ark:/67531/metadc276266/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc276266/"><img alt="The War with Germany: A Statistical Summary" title="The War with Germany: A Statistical Summary" src="http://digital.library.unt.edu/ark:/67531/metadc276266/thumbnail/"/></a></p><p>Book containing statistical figures regarding the United States of America's conflict with Germany during World War I, including statistics for casualties, expenditures, and ordnance. Index starts on page 151.</p>Remember! the flag of liberty, support it! : buy U.S. government bonds, 3rd. Liberty Loan.2010-11-29T16:26:05-06:00http://digital.library.unt.edu/ark:/67531/metadc29409/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc29409/"><img alt="Remember! the flag of liberty, support it! : buy U.S. government bonds, 3rd. Liberty Loan." title="Remember! the flag of liberty, support it! : buy U.S. government bonds, 3rd. Liberty Loan." src="http://digital.library.unt.edu/ark:/67531/metadc29409/thumbnail/"/></a></p><p>A group of people stand in front of the American flag. A ship is in the background.</p>Pour le triomphe, souscrivez à l'emprunt national : les souscriptions sont reçues à Paris et en province à la Banque Nationale de Crédit.2006-06-13T17:00:03-05:00http://digital.library.unt.edu/ark:/67531/metadc254/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc254/"><img alt="Pour le triomphe, souscrivez à l'emprunt national : les souscriptions sont reçues à Paris et en province à la Banque Nationale de Crédit." title="Pour le triomphe, souscrivez à l'emprunt national : les souscriptions sont reçues à Paris et en province à la Banque Nationale de Crédit." src="http://digital.library.unt.edu/ark:/67531/metadc254/thumbnail/"/></a></p><p>French soldiers of World War I march on the ground through the Arc de Triomphe in Paris. From the clouds, a crowd of soldiers from past wars descend to join them. The figure of Bellona (the Roman goddess of war) of the "Marseillaise" sculpture on the arch appears to urge the soldiers on to battle.</p>4e Emprunt de la Défense Nationale : les souscriptions sont reçues sans frais à la Banque Privée ....2006-06-13T16:59:50-05:00http://digital.library.unt.edu/ark:/67531/metadc255/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc255/"><img alt="4e Emprunt de la Défense Nationale : les souscriptions sont reçues sans frais à la Banque Privée ...." title="4e Emprunt de la Défense Nationale : les souscriptions sont reçues sans frais à la Banque Privée ...." src="http://digital.library.unt.edu/ark:/67531/metadc255/thumbnail/"/></a></p><p>In the forefront is a drawing of a drummer boy marching with a look of surprise on his face. Hovering above and behind him is a female figure in a long dress. In the background are soldiers carrying tattered flags.</p>Pour que la France soit victorieuse! : souscrivez au 4ème Emprunt de la Défense Nationale, Crédit Français, 52_54, rue de Châteaudun, Paris.2006-06-13T16:59:31-05:00http://digital.library.unt.edu/ark:/67531/metadc259/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc259/"><img alt="Pour que la France soit victorieuse! : souscrivez au 4ème Emprunt de la Défense Nationale, Crédit Français, 52_54, rue de Châteaudun, Paris." title="Pour que la France soit victorieuse! : souscrivez au 4ème Emprunt de la Défense Nationale, Crédit Français, 52_54, rue de Châteaudun, Paris." src="http://digital.library.unt.edu/ark:/67531/metadc259/thumbnail/"/></a></p><p>Lithograph, of a black and white drawing of a cock and an eagle preparing to fight. The eagle wears a crown. The French cock appears to be standing over a miniature town. The imperial eagle is representative of the Central Powers and the Gallic cock is a symbol of France. The poster is bordered with a blue, white, and red stripe.</p>Le Cardinal Mercier protège la Belgique.2006-06-13T16:59:15-05:00http://digital.library.unt.edu/ark:/67531/metadc260/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc260/"><img alt="Le Cardinal Mercier protège la Belgique." title="Le Cardinal Mercier protège la Belgique." src="http://digital.library.unt.edu/ark:/67531/metadc260/thumbnail/"/></a></p><p>Illustration of Cardinal Mercier in a gold cape and mitre (headdress). He holds a staff in his left hand. A fallen man is slumped over at his feet and there is a crowd of people behind him, most of whom appear to be women. The Cardinal is depicted in color and the other people are depicted in black & white.</p>3e Emprunt de la Défense Nationale : souscrivez : pour la France qui combat! Pour celle qui chaque jour grandit.2006-06-13T16:58:59-05:00http://digital.library.unt.edu/ark:/67531/metadc311/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc311/"><img alt="3e Emprunt de la Défense Nationale : souscrivez : pour la France qui combat! Pour celle qui chaque jour grandit." title="3e Emprunt de la Défense Nationale : souscrivez : pour la France qui combat! Pour celle qui chaque jour grandit." src="http://digital.library.unt.edu/ark:/67531/metadc311/thumbnail/"/></a></p><p>A bearded man in a blue coat and helmet holds a young child in his arms. In front of him, a mother is seated and breastfeeding an infant. The man and child are illustrated in color, while the image of the mother and infant is a black pencil drawing.</p>1778-1783. America owes France the most unalterable gratitude : 1917- -- . French Comrade your children shall be as our children.2006-06-13T16:58:46-05:00http://digital.library.unt.edu/ark:/67531/metadc313/<p><a href="http://digital.library.unt.edu/ark:/67531/metadc313/"><img alt="1778-1783. America owes France the most unalterable gratitude : 1917- -- . French Comrade your children shall be as our children." title="1778-1783. America owes France the most unalterable gratitude : 1917- -- . French Comrade your children shall be as our children." src="http://digital.library.unt.edu/ark:/67531/metadc313/thumbnail/"/></a></p><p>Black and white drawing of a soldier saluting the grave of another soldier. A weeping boy and a girl kneeling in prayer are at his sides. In the sky to the upper right there is a faint drawing of a row of soldiers standing guard and a commander on horseback.</p>
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
What logic does one use to solve this probability question?
Bill, George, and Ross, in order, roll a die. The first one to roll an even number wins and the game is ended. What is the probability that Bill win the game ?. How I approached the question: Since Bill is the first one to roll the die, he has a $.5$ probability of winning the game, if he does win then the question is solved the probability is $.5$, however if he doesn't roll an even number he has still a probability of winning, this probability would be $(.5)^3$. It seems to me that the probability of him winning is $(0.5)^n$ where $n$ is the number of die rolls. Is my logic correct, if not how is the problem answered ?.
A:
Your logic is somehow not bad. However it is not complete, because Bill can win at the first roll, the 4th roll, the 7th roll, etc etc. Let $X_n$ be the event that Bill wins at the $n$-th roll. Clearly $P(X_1)=\frac{1}{2}$ (you know this). $P(X_2)=P(X_3)=0$ because then it is not his game. $P(X_4)$ then Bill must not win one time, George must not win one time, and Ross neither, that together gives $(\frac{1}{2})^3$ and then Bill must win the fourth roll so $P(X_4)=(\frac{1}{2})^4$. In general we have:
\begin{align}
P(\text{ Bill wins }) &= P(\text{ Bill wins at the first roll, fourth roll, seventh roll,..})\\
&=\sum_{n=0}^\infty \left( \frac{1}{2}\right)^{3n+1}\\
&=\frac{1}{2}\frac{1}{1-\frac{1}{8}}\\
&=\frac{4}{7}
\end{align}
So Bill wins with probability $4/7$. You can check that the probability that George and Ross win is $2/7$ and $1/7$ respectively.
|
{
"pile_set_name": "StackExchange"
}
|
Practice Guidelines for blood component therapy: A report by the American Society of Anesthesiologists Task Force on Blood Component Therapy.
In 1994, the American Society of Anesthesiologists established the Task Force on Blood Component Therapy to develop evidence-based indications for transfusing red blood cells, platelets, fresh-frozen plasma, and cryoprecipitate in perioperative and peripartum settings. The guidelines were developed according to an explicit methodology. The principal conclusions of the task force are that red blood cell transfusions should not be dictated by a single hemoglobin "trigger" but instead should be based on the patient's risks of developing complications of inadequate oxygenation. Red blood cell transfusion is rarely indicated when the hemoglobin concentration is greater than 10 g/dL and is almost always indicated when it is less than 6 g/dL. The indications for autologous transfusion may be more liberal than for allogeneic (homologous) transfusion. The risks of bleeding in surgical and obstetric patients are determined by the extent and type of surgery, the ability to control bleeding, the actual and anticipated rate of bleeding and the consequences of uncontrolled bleeding. Prophylactic platelet transfusion is ineffective when thrombocytopenia is due to increased platelet destruction. Surgical and obstetric patients with microvascular bleeding usually require platelet transfusion if the platelet count is less than 50 times 10(9)/l and rarely therapy if it is greater than 100 times 10(9)/l. Fresh-frozen plasma is indicated for urgent reversal of warfarin therapy, correction of known coagulation factor deficiencies for which specific concentrates are unavailable, and correction of microvascular bleeding when prothrombin and partial thromboplastin times are >1.5 times normal. It is contraindicated for augmentation of plasma volume or albumin concentration. Cryoprecipitate should be considered for patients with von Willebrand's disease unresponsive to desmopressin, bleeding patients with von Willebrand's disease, and bleeding patients with fibrinogen levels below 80-100 mg/dL. The task force recommends careful adherence to proper indications for blood component therapy to reduce the risks of transfusion. (Key words:Practice guide-lines: anemia: blood component therapy; coagulopathy; cryoprecipitate; fresh-frozen plasma; red blood cells; transfusion.)
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Submission timestamp of custom Form using Google Apps Script
I wanted to create a form for data collection that included a field for image upload. I tried Google Forms, which natively doesn't support file upload, but I found this example: Form and file upload with htmlService and app script not working
I managed to configure it with image upload, BUT, native Google Forms does have a timestamp column on the Spreadsheet responses.
I tried:
var timestamp = theForm.getTimestamp();
But didn't work...
How can I get the response timestamp?
Code excerpt:
function processForm(theForm) {
var fileBlob = theForm.myFile;
var folder = DriveApp.getFolderById(folderId);
var doc = folder.createFile(fileBlob);
// Fill in response template
var template = HtmlService.createTemplateFromFile('Thanks.html');
var name = template.name = theForm.name;
var email = template.email = theForm.email;
var timestamp = template.timestamp = theForm.getTimestamp();
// Record submission in spreadsheet
var sheet = SpreadsheetApp.openById(submissionSSKey).getSheets()[0];
var lastRow = sheet.getLastRow();
var targetRange = sheet.getRange(lastRow+1, 1, 1, 5).setValues([[timestamp,name,department,message,email,fileUrl]]);
// Return HTML text for display in page.
return template.evaluate().getContent();
}
A:
HTML forms do not automatically pass any timestamp to the server on submit, like Google Forms do. You will have to generate that timestamp yourself. new Date() will do what you want:
var timestamp = template.timestamp = new Date();
If you need to output this date object to screen in your page, you will need to make it human-readable by formatting it. You can use Utilities.formatDate() method to do this.
|
{
"pile_set_name": "StackExchange"
}
|
Silver-catalyzed [3 + 2] domino reaction: an efficient strategy to synthesize imidazole-5-carbaldehydes.
An unprecedented regioselective silver-catalyzed [3 + 2] domino reaction of amidines and ynals for the formation of C-N bonds has been developed. The reaction provided a new route to prepare imidazole-5-carbaldehydes which are important intermediates for the construction of fine chemicals. The reaction proceeds smoothly with a broad range of substrates to give imidazoles in good yields.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
/* Modify your Face program from the previous exercise to draw the new output
* shown below. The window size should be changed to 520 x 180 pixels, and the
* faces' top-left corners are at (10, 30), (110, 30), (210, 30), (310, 30),
* and (410, 30).
*/
public class Face2 {
public static void main(String[] args) {
DrawingPanel panel = new DrawingPanel(520, 180);
Graphics g = panel.getGraphics();
for(int i = 0; i < 5; i++)
drawFace(g, 10 + 100 * i, 30);
}
public static void drawFace(Graphics g, int x, int y) {
g.setColor(Color.BLACK);
g.drawOval(x, y, 100, 100); // face outline
g.setColor(Color.BLUE);
g.fillOval(x + 20, y + 30, 20, 20); // eyes
g.fillOval(x + 60, y + 30, 20, 20);
g.setColor(Color.RED); // mouth
g.drawLine(x + 30, y + 70, x + 70, y + 70);
}
}
|
{
"pile_set_name": "Github"
}
|
Q:
How do I configure a Kendo Grid dataSource to use the parameterMap functionality?
I have a Kendo Grid and I want to pass a parameter to my Controller Action. I am able to use the transports read.data successfully but I'm trying to learn how to use the parameterMap functionality.
Here is what I have that works:
<script>
$(document).ready(function () {
var employeeNumber = @(ViewBag.EmployeeNumber); //passed in from controller
$("#ShoppingCartGrid").kendoGrid({
dataSource: {
dataType: "json",
type:"GET",
transport: {
read: {
url:"../Requisitions/GetShoppingCartSummary/",
data: {
employeeNumber:employeeNumber //passing param this way works
},
}
},
schema: {
...... //omitted for brevity
</script>
Here is what does not work but I don't know what I should put here:
<script>
$(document).ready(function () {
var employeeNumber = @(ViewBag.EmployeeNumber);
$("#ShoppingCartGrid").kendoGrid({
dataSource: {
dataType: "json",
type:"GET",
transport: {
read: {
url:"../Requisitions/GetShoppingCartSummary/"
},
parameterMap:function(options,operation){ // here is where I'm
if (operation == "read") { // running into issues- even
return employeeNumber:"140412"; // hard coding param- no joy
}
};
},
schema: {
...... //omitted for brevity
</script>
I have looked for hours for a solution but I can't seem to find a post that explains this concept well enough for me to grasp. Please don't send links to Kendo's documentation, been there, have the mental scars to prove it. Thanks for any suggestions.
A:
Your transport datatype is Json, therefore you need to return valid Json parameters. Kendo appends result of function provided in parameterMap to the method name you defined in your url.
In your case - employeeNumber:"140412" is not a valid Json, you need to provide parmas in following format { paramname : value , otherparamname : value }.
It is very handy to use JSON.stringify(o) to get your params correct.
Below structure for parameterMap works for me:
parameterMap: function (o, operation) {
var output = null;
switch (operation) {
case "create":
output = '{ id: ' + JSON.stringify(o) + ' }';
break;
case "read":
output = '{ id: ' + globalVariable + ' , filters: ' + JSON.stringify(o) + '}';
break;
case "update":
output = '{ id:' + JSON.stringify(o) + '}';
break;
case "destroy":
output = '{ id : ' + o.param+ ' }';
break;
}
return output;
}
Bit more detail as per your comment :
parameterMap: function (o, operation) {
var output = null;
switch (operation) {
case "read":
var txt1 = $('#myTextBox1').val();
var txt2 = $('#myTextBox2').val();
var txt3 = $('#myTextBox3').val();
output = '{ textBoxValue1: ' + txt1 + ', textBoxValue2: ' + txt2 + ',textBoxValue3: ' + txt3 + '}';
break;
}
return output;
}
Server side method signature should look like :
GetShoppingCartSummary(string textBoxValue1, string textBoxValue2, textBoxValue3);
|
{
"pile_set_name": "StackExchange"
}
|
Prognosis of and factors associated with dental status in the adult Swedish population, 1975-1989.
The aim was to describe changes in dental status in the Swedish population during the period 1975-89 and to make a prognosis based on these data for the year 2000. This study is based on investigations of the living conditions in 1975, 1977, 1980/81 and 1988/89 performed by The National Central Bureau of Statistics. The samples varied for each year from 11,500 to 15,000 participants and a response rate from 80 to 86%. The odontological questions of the interview were focused on dental status, utilization of dental services and chewing ability. The prevalence of edentulism in age group 16-74 yr decreased from 15% in 1975 to 6% in 1988/89. In 1988/89 19% of the 65-74-yr-old inhabitants of the big cities were edentulous and 45% in rural populations, indicating a 15-20-yr delay of the development in rural areas. The prognosis for the year 2000 indicates a further decrease of edentulism to 3-4% in age groups 45-64 yr and in age 75-84 yr more than 60% will be dentate. As a consequence of the reduction in edentulism and changes in populations the number of dentate inhabitants in age group 25-74 yr increased by about 800,000 from 1975 to 1989 and a further increase of 400,000 will occur up to the year 2000. The consequences of these changes for the dental care services are discussed.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
There is an increase in the risk of bone fracture with aging and adult diabetes, and this increase cannot be solely explained by changes in bone mineral density (BMD). One barrier to new diagnostic tools and treatments is that the underlying cause for the disproportionate increase in fracture risk among diabetics and the elderly is currently unknown. Consequently, there is a need to identify the biophysical basis of the age- and diabetes-related changes in bone that decrease fracture resistance, not just bone strength. Addressing this, the proposal aims to determine whether increases in advanced glycation end-products (AGEs) explain the effect of diabetes and aging on the fracture resistance of bone (as characterized by fracture properties) and to determine whether an AGE inhibitor and/or an antioxidant can both improve the quality of bone structure and increase the fracture properties of bone. Aim 1 will determine the role of bone structure, BMD, and AGEs in the effect of Type 2 Diabetes (T2D) and aging on the fracture properties of bone. In the first experiment, bones will be collected from T2D rats and non-diabetic rats at 24 weeks and 32 weeks of age. In the second experiment, bones will be harvested from aging rats at 4 months (young), 12 months (adult), and 24 months (old) of age. All the bones will undergo extensive analysis in order to identify the relative contribution of compositional properties such as BMD and AGEs and structural properties such as moment of inertia to a set of biomechanical properties including traditional measurements of strength and new measurements of fracture toughness and fatigue life. Aim 2 will evaluate how exogenous glycation of collagen affects the fracture properties of bone. This aim investigates whether the direct accumulation of AGEs within the extracellular matrix of bone decreases the fracture resistance of bone and whether the AGE inhibitor pyridoxamine, a B6 vitamin, protects against such a change. With appropriate controls, both human cortical bone and rodent bone will be incubated in diabetic concentrations of glucose with and without the inclusion of pyridoxamine. After quantifying the concentration of pentosidine, a biomarker for AGEs, and BMD, each specimen will be subjected to a mechanical test. In the case of the human bone, tests will determine the effects of increasing AGE on bone strength, post-yield energy dissipation, fatigue life, and crack-initiation & crack-growth toughness. For the rodent bones, tests will determine the effect of increasing AGE on fatigue life and fracture toughness, the ability to resist crack propagation. Aim 3 will assess the efficacy of pyridoxamine and N-acetylcysteine to increase fracture resistance of bone in an aging rat model of T2D through changes in bone structure, BMD, and AGEs. In this translation aim, the role of oxidative stress and AGE accumulation in the aging and diabetic effects on bone will be investigated using these two compounds. Starting at 4 months of age, non-diabetic and T2D rats will drink water, water with pyridoxamine, or water with N-acetylcysteine, an antioxidant. After 4 months, 8 months, and 14 months (aging) of treatment, bones will be harvested for extensive analysis to determine the effects of treatment on the structural, compositional, and biomechanical properties of bone. Additionally, histological and cell culture assays will assess the biological effects of the compounds on oxidative stress and osteoblast differentiation. To achieve these aims, Micro-Computed Tomography will quantify volumetric BMD; high performance liquid chromatography will quantify the concentration of crosslinks and collagen content; and thermal gravimetric analysis will quantify the collagen and mineral fractions as well as water content. Statistical models will determine the relative contribution of the structural and the compositional properties to the fracture properties of bone. This will address the relevance of targeting oxidative stress and AGEs to improve the bone health of Veterans and prevent bone fractures. The long-term goal is to identify the factors affecting the important determinants of fracture resistance and developing accurate diagnostic assessments of fracture risk.
|
{
"pile_set_name": "NIH ExPorter"
}
|
mplify (z**(-2))**(-26)*(z*z*z*z*((z*z*z/(z*z*z*z**(2/17)*z))/z)/z)/(z/z**7) assuming z is positive.
z**(1001/17)
Simplify ((w*((w/(w**(2/3)*w))/w*w)/w*w)/w*w)**(-29)*(w/(w/(w*w**0*w)))/w*w*w**(-5) assuming w is positive.
w**(-38/3)
Simplify (y**(-4/5)*y*y*y**(-1))/(y*y**0/y*y*y)**18 assuming y is positive.
y**(-179/5)
Simplify ((z*z*(z*(z*z*z**(-2))/z*z)/z*z)**4)**(-31) assuming z is positive.
z**(-372)
Simplify l**(11/2)/l*l*l**(-2/5) assuming l is positive.
l**(51/10)
Simplify (p**(-1/6)*p**(-10)/p*p)**(6/7) assuming p is positive.
p**(-61/7)
Simplify (b*b/b**(-2/37))/b**(-12) assuming b is positive.
b**(520/37)
Simplify (b**(-1)*b*b**(-1/2))/(b**(-1/5)*b*b**(8/3)) assuming b is positive.
b**(-119/30)
Simplify (m/(m/((m*m**(2/5)/m)/m)))/(m*m/(m*(((m/(m**(-7/2)/m))/m)/m)/m))*m**(-2/15)*m/(m**(-1)/m) assuming m is positive.
m**(113/30)
Simplify (i**(-1/3)*i*i*i/(i**3/i))**(-1/53) assuming i is positive.
i**(-2/159)
Simplify s**10/s*s/s**21 assuming s is positive.
s**(-11)
Simplify (q**(-49))**(-3/8) assuming q is positive.
q**(147/8)
Simplify (j/(j**0/j))**(-1/6)/(((j*(j*j**(-6))/j*j)/j)/j**2) assuming j is positive.
j**(20/3)
Simplify ((s**(-2))**(-18/11))**(-7) assuming s is positive.
s**(-252/11)
Simplify ((v**(-14)*v)/v)**(-34) assuming v is positive.
v**476
Simplify x**1/(x**(-1/5)/x)*(x**7*x)/x**(1/3) assuming x is positive.
x**(148/15)
Simplify (b*b**9*b/(b/(b*b*b**5*b*b)))**37 assuming b is positive.
b**703
Simplify ((c*c**(-3))/(c*c/(c**(-6)*c)))**(-32) assuming c is positive.
c**288
Simplify ((c*c**(1/4))**(-1/20))**(-8/3) assuming c is positive.
c**(1/6)
Simplify ((m**(-3))**(-28))**39 assuming m is positive.
m**3276
Simplify (m**(2/85))**23 assuming m is positive.
m**(46/85)
Simplify ((x**(-7)/x)/x**(-2/25))**(3/11) assuming x is positive.
x**(-54/25)
Simplify (z**(-4/5))**(7/2) assuming z is positive.
z**(-14/5)
Simplify (v*v**(2/109)*v*v)/(v/(v/(v**(4/11)/v)*v)) assuming v is positive.
v**(5581/1199)
Simplify c**(-2/7)/(c*c/(c/(c**(-5/2)*c)))*(c/(c/(c/(c*c**(-2/17)))))/c**(4/9) assuming c is positive.
c**(-241/2142)
Simplify (((u**(-12)/u*u)/u*u)/(u*u*u**(-12)))**(-20) assuming u is positive.
u**40
Simplify (z*z**(-1/12)*z)/z**(-2/33) assuming z is positive.
z**(87/44)
Simplify (j**(-2/73)*j)/j*j**19*j assuming j is positive.
j**(1458/73)
Simplify p**(-17/5)/(p*(p*p**(4/33)*p)/p*p) assuming p is positive.
p**(-1076/165)
Simplify (r/(r*r/r**(2/3)))/(r/((r*r**(-6))/r*r)*r)*(r**0)**(-28) assuming r is positive.
r**(-22/3)
Simplify (w*w**6)/(w/w**(2/3))*(w**(2/7))**(-5/13) assuming w is positive.
w**(1790/273)
Simplify c**5*c*c**(4/5)*c*c*c**5*c**4 assuming c is positive.
c**(89/5)
Simplify u*u/(u*u*u*u*u**(16/3)*u)*u**(-14/3) assuming u is positive.
u**(-13)
Simplify (u/(u**(-2/55)/u)*u)/u**(2/119) assuming u is positive.
u**(19763/6545)
Simplify (h/h**(-7))**47 assuming h is positive.
h**376
Simplify c**5*c**(-4/7)*(c**(-2/3)/c)/(c/(c*(c*c**(-6))/c)) assuming c is positive.
c**(-68/21)
Simplify f**(-1/13)/(f**0*f) assuming f is positive.
f**(-14/13)
Simplify (k**(2/7))**(-7/5)*((k**(-1)/k)/k)/(k/(k/(k*((k**(3/2)*k)/k)/k))) assuming k is positive.
k**(-49/10)
Simplify (d/(d/(d/((d/((d**(2/29)/d)/d)*d)/d))))**(-15/7) assuming d is positive.
d**(120/29)
Simplify (n**(3/7)*n*(n*n**(2/7))/n)/(n/((n/n**(-7))/n)*(n/(n/n**3))/n) assuming n is positive.
n**(40/7)
Simplify (((v/(v**6/v))/v)/(v/(v**(3/5)*v)))**(-41) assuming v is positive.
v**(902/5)
Simplify (y/y**(-2/9))/y*y*y*y*y*(y/(y*y/(y*(y*y/y**(26/3))/y)*y))/y assuming y is positive.
y**(-49/9)
Simplify (f*f**(-21))/(f*(f**(-11/6)/f)/f) assuming f is positive.
f**(-103/6)
Simplify p/(p/(p/((p/(p*p/(p**(-3/8)*p)*p*p*p))/p))*p)*(p/(p*p**(-8/5)*p))/p assuming p is positive.
p**(159/40)
Simplify ((y*(((y**1*y*y)/y*y)/y)/y)**(-31))**(3/31) assuming y is positive.
y**(-6)
Simplify y**(-4)*y*y*((y**(-4/5)/y*y)/y)/y assuming y is positive.
y**(-24/5)
Simplify m/((m/m**(-2/77)*m*m*m*m)/m*m)*m**(-1/75) assuming m is positive.
m**(-23327/5775)
Simplify ((u**(-2/5)*u)/u**(-5/7))/(u*u**(-6)*u*u**(-1/4)) assuming u is positive.
u**(779/140)
Simplify ((w**(-3/7))**(3/28))**44 assuming w is positive.
w**(-99/49)
Simplify b**(4/7)*b**(-3/5)*b**(1/5)*b*b**7 assuming b is positive.
b**(286/35)
Simplify ((k*k**(-2/25))/k**(-2/27))/((k*k**5*k)/((k*k**(9/2)*k)/k)) assuming k is positive.
k**(-683/1350)
Simplify (k/(k*k/(k**1/k*k)))**(4/3)/(k**(-2/3)*k**4) assuming k is positive.
k**(-10/3)
Simplify ((((h/((((h*h/(h*h**26*h)*h)/h)/h)/h))/h)/h*h)/h)/(h/h**(-9/2)*h) assuming h is positive.
h**(41/2)
Simplify (((t/(t*t*t**(-2/43)/t)*t)/t)/t)/(t/(t*t**(-12))) assuming t is positive.
t**(-557/43)
Simplify (j**(-2/9)/j*j*((((j/(j*j**5/j))/j)/j)/j)/j)/(j**(-2/13)/j*j*j*j**(-5/6)) assuming j is positive.
j**(-1927/234)
Simplify ((y**(2/7)*y)/y)**(-18/13)/(y**0)**26 assuming y is positive.
y**(-36/91)
Simplify (a*a/(a*a*a**35))**(-23) assuming a is positive.
a**805
Simplify ((i*i*i**(2/5)*i)/i)**(1/10)/(i/(i*i**(-1/2)/i))**(-3/14) assuming i is positive.
i**(393/700)
Simplify c**(-3)/(c**(-6)*c*c) assuming c is positive.
c
Simplify (c**(3/5)/c**(-3))**36 assuming c is positive.
c**(648/5)
Simplify (i**(-1/3)*i**(-1))/((i*i**4)/(i/i**(-11))) assuming i is positive.
i**(17/3)
Simplify (q/q**(2/3))**(-2/21)*(q/q**(2/11))/q**3 assuming q is positive.
q**(-1534/693)
Simplify ((y/(y*y**(3/4)))/(((y/(y/(y/(y/(y**(-2/19)/y)))))/y)/y))/(y**(2/5))**(2/55) assuming y is positive.
y**(48921/20900)
Simplify (((p*p/(p/(p**(-14)/p)))/p)/p)/(p*p*p/(p/(p/(p/(p*p**(-25)))))) assuming p is positive.
p**6
Simplify ((m*(m/m**7)/m)/m)**(-19) assuming m is positive.
m**133
Simplify a**9*a/a**24 assuming a is positive.
a**(-14)
Simplify ((o*o/o**(-3/2))/o)**(-2/17) assuming o is positive.
o**(-5/17)
Simplify ((l/(l*l**(1/2)))/l)/l**(-8)*(l*l**(-7))/((l/(l/l**(-1/7)))/l) assuming l is positive.
l**(23/14)
Simplify o**(-2/85)*o*o*o*o**(1/4) assuming o is positive.
o**(1097/340)
Simplify (q**(-1))**(1/7)/(q/(q/(q/((q*q*q*q*q/(((q*q*q**(-1/3))/q)/q)*q)/q))*q)*(q*q*q*(q/(q/q**(-8)))/q*q)/q*q) assuming q is positive.
q**(214/21)
Simplify (j*j/(j*j**(2/19)*j))/(j/j**29) assuming j is positive.
j**(530/19)
Simplify (b*b**2)**(-1) assuming b is positive.
b**(-3)
Simplify k*k*k**(-5)/k*k*k**7/k*k**8/k**(-7) assuming k is positive.
k**18
Simplify (g*g**(-21)*g)/(g/(g**(3/11)*g*g*g)) assuming g is positive.
g**(-184/11)
Simplify y**13*y*y*y/(y*y**(-1/3)/y)*y assuming y is positive.
y**(52/3)
Simplify (((t/(t/(t/(t/((((t*t**(-2/9))/t)/t*t)/t)))))/t)/t)/t*t**(-3/5)*t/t**(-5)*(t/(t*t**(1/5))*t*t)/t assuming t is positive.
t**(89/45)
Simplify (x*(x*x**(-2/37))/x)**49 assuming x is positive.
x**(1715/37)
Simplify (v**(5/3)*v**(-1/6))/(v/(v*v**(2/3)*v*v*v))**33 assuming v is positive.
v**(245/2)
Simplify g**0*g**(-2/3) assuming g is positive.
g**(-2/3)
Simplify (f/((f*f**3)/f*f*f)*f**0/f)/(f*f**(2/9)*f/(f**4*f)*f) assuming f is positive.
f**(-29/9)
Simplify ((w/((w**(2/15)*w)/w*w*w*w*w))/w)/(w*w*w**(-2/7))*w**(-6)*w*w*w**(-2/9) assuming w is positive.
w**(-3172/315)
Simplify g**(-7)*g**(-2/9)*g/g**(-2/7)*g**(-5/6)*g assuming g is positive.
g**(-727/126)
Simplify y**(2/7)/y**15 assuming y is positive.
y**(-103/7)
Simplify f**(-3/2)/f**(2/15)*f*(f**(-2)/f)/f*((f**(-1/4)*f)/f)/f assuming f is positive.
f**(-353/60)
Simplify (s/(s*s/(s*s**(-12))*s))**(-23) assuming s is positive.
s**299
Simplify ((l*l/(l**(-1/3)*l))**16)**47 assuming l is positive.
l**(3008/3)
Simplify (h**(-2/7))**50/((h/(h/h**(2/7)))/(h/(h/((h/h**(-7))/h)))) assuming h is positive.
h**(-53/7)
Simplify y/((y*(y*(y/(y*y/y**(2/5)))/y*y)/y)/y*y)*y/(y/(y**8/y*y))*y**(-1)/y**(4/5) assuming y is positive.
y**(34/5)
Simplify (r/(r**(2/3)/r*r*r)*(r*r*r**1*r)/r)/(r**1/r)**24 assuming r is positive.
r**(7/3)
Simplify (i**(-2/5))**(17/6)*i**1/((i*i**2)/i) assuming i is positive.
i**(-32/15)
Simplify q**(-28)/q*q**(-11) assuming q is positive.
q**(-40)
Simplify (f/(f**2/f))**(-2/39)/(f**(-5)*f*f/(f/((f*f**(-7)*f)/f))*f*f) assuming f is positive.
f**8
Simplify (z**(1/6))**(-23) assuming z is positive.
z**(-23/6)
Simplify t**4/t*t*t*t**(-2/3)*t*(t/((t*(t*t*t*(t*t*(((t/(t**(-1/4)/t))/t)/t*t)/t*t)/t*t*t)/t)/t))**(-46) assuming t is positive.
t**(1481/6)
Simplify ((u/u**(-5))/(u**(2/21)*u))/(((((u/(u/(u*
|
{
"pile_set_name": "DM Mathematics"
}
|
Abstract
If free-will beliefs support attributions of moral responsibility, then reducing these beliefs should make people less retributive in their attitudes about punishment. Four studies tested this prediction using both measured and manipulated free-will beliefs. Study 1 found that people with weaker free-will beliefs endorsed less retributive, but not consequentialist, attitudes regarding punishment of criminals. Subsequent studies showed that learning about the neural bases of human behavior, through either lab-based manipulations or attendance at an undergraduate neuroscience course, reduced people’s support for retributive punishment (Studies 2–4). These results illustrate that exposure to debates about free will and to scientific research on the neural basis of behavior may have consequences for attributions of moral responsibility.
|
{
"pile_set_name": "OpenWebText2"
}
|
Wednesday, August 27, 2008
A Welcome Note
Welcome to my blog. My name is Joseph L. Mbele. I am a Tanzanian educator, with particular interest in Literature, Folklore and Cultural Studies. I have taught at the University of Dar es Salaam in Tanzania, the University of Burundi, and St. Olaf College in Northfield, Minnesota.
I like writing: academic papers, books, reviews, and newspaper columns. My best known publication is the book Africans and Americans: Embracing Cultural Differences, available online at http://www.lulu.com/content/105001. I also like translating folklore from Matengo and Swahili into English.
I travel around much and have been all over the world, attending conferences, giving lectures, and participating in cultural events, especially book fairs. What else? For many years, I have been a cultural consultant for Americans going to Africa and for Africans living in America. My role has been to share perspectives on cultural differences that are bound to affect the interactions between Africans and Americans. As I talk with these people, I not only share what I know, but I also learn much from their experiences, concerns, and questions, and the more I learn, the more I can share. It has always been this way.
I have created this blog as a site for sharing these matters, but, who knows? There could be other things as well. The sky is the limit. I hope you will find this blog worth visiting, again and again.
3 comments:
Welcome to the blogging world Joseph Mbele. It is great that you have joined us online. I am sure alot of our youths who do not know your brains, books and general expertise on world and African literature but especially traditional and popular Tanzanian writing will benefit.Please give us as much as you can. TUNAKUHITAJI.I have also sent a note here for Kiswahili readers; who you should sometimes pen too:
Joseph,I am overjoyed to find out that you have decided to blog.I have been eagerly waiting for a day like this.You are warmly welcome and I am sure you will enjoy not only filling the pages of your blog but also the discussions or interactions that will come along as you keep blogging.
I have just enjoyed your take on Mbamba Bay.I have never been there but I could easily tell that it's a beautiful,relaxing and peaceful place. No wonder one of my aunt is married there.I should then visit her one day!
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
open a file in a non existing directory c versus c++
I tried to open a file in a non existing directory in C++ and for some reason my application didn't crash. I find that a bit "weird" because I'm used to C, where the equivalent program does crash. Here is my C++ version followed by the equivalent C version:
$ cat main.cpp
#include <fstream>
int main(int argc, char **argv)
{
std::ofstream f("/home/oren/NON_EXISTING_DIR/file.txt");
f << "lorem ipsum\n";
f.close();
printf("all good\n");
}
$ g++ main.cpp -o main
$ ./main
all good
When I try the equivalent thing with C I get a segfault:
$ cat main.c
#include <stdio.h>
int main(int argc, char **argv)
{
FILE *fl = fopen("/home/oren/NON_EXISTING_DIR/file.txt","w+t");
fprintf(fl,"lorem ipsum\n");
fclose(fl);
printf("all good\n");
}
$ gcc main.c -o main
$ ./main
Segmentation fault (core dumped)
Why is that?
A:
"I'm used to C", but then "[...] in C++" - well, C++ is not C, but that's irrelevant here. First, have a look at this - writes to an unopened stream (which is the case here) are ignored after setting the failbit.
In your C example, however, the problem is that if fopen fais, it returns a NULL pointer. Then you pass it to fprintf. That's where the Undefined Behaviour1 happens. No such thing in the C++ example.
1Do note that the C example is not guaranteed to SEGFAULT. Undefined behaviour is undefined.
|
{
"pile_set_name": "StackExchange"
}
|
Ask us about Algiers and we could go on for an entire day. Our long list of “Why Algiers” begins with the bedroom community feel, to the great family style neighborhoods to the new levee bike and walking path which connects three parishes. There has been a movement towards being open to new ideas, there is a unique and driven entrepreneurial spirit that creates and environment which fosters the new ideas being brought to life. Schedule an Algiers tour and find out why such a well-balanced mixed of families has chosen the West Bank.
Are you looking to start your business?
Not sure what structure you should choose?
When starting a new business, there are many important decisions to make and many rules and procedures that must be addressed. While there is no single source for all filing requirements, the Secretary of the State is a good starting point. Click the image below to be taken there.
INCENTIVES
ANGEL INVESTOR TAX CREDIT
Up to a 35 percent tax credit for individual investors who invest in early stage, wealth-creating businesses that seek start-up and expansion capital.
|
{
"pile_set_name": "Pile-CC"
}
|
<?xml version="1.0" encoding="utf-8"?>
<!--
~ Copyright (c) 2016 JustWayward Team
~
~ Licensed under the Apache License, Version 2.0 (the "License");
~ you may not use this file except in compliance with the License.
~ You may obtain a copy of the License at
~
~ http://www.apache.org/licenses/LICENSE-2.0
~
~ Unless required by applicable law or agreed to in writing, software
~ distributed under the License is distributed on an "AS IS" BASIS,
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
~ See the License for the specific language governing permissions and
~ limitations under the License.
-->
<LinearLayout xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:orientation="vertical">
<RelativeLayout
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:layout_marginBottom="10dp"
android:gravity="center_vertical"
android:padding="15dp">
<ImageView
android:id="@+id/ivBookCover"
android:layout_width="50dp"
android:layout_height="50dp"
android:layout_alignParentLeft="true"
android:layout_centerVertical="true"
android:layout_marginRight="10dp"
android:scaleType="centerInside"
android:src="@drawable/avatar_default" />
<TextView
android:id="@+id/tvBookTitle"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_toRightOf="@id/ivBookCover"
android:ellipsize="end"
android:singleLine="true"
android:text="我就是静静"
android:textColor="@color/light_coffee"
android:textSize="13sp" />
<TextView
android:id="@+id/tvTime"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_below="@id/tvBookTitle"
android:layout_marginTop="5dp"
android:layout_toRightOf="@id/ivBookCover"
android:ellipsize="end"
android:singleLine="true"
android:text="昨天"
android:textColor="@color/common_h3" />
</RelativeLayout>
<TextView
android:id="@+id/tvTitle"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:layout_marginTop="10dp"
android:paddingLeft="15dp"
android:paddingRight="15dp"
android:text="1111"
android:textColor="@color/common_h1"
android:textSize="16dp" />
<com.justwayward.reader.view.BookContentTextView
android:id="@+id/tvContent"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:layout_marginTop="10dp"
android:lineSpacingExtra="1dp"
android:paddingLeft="15dp"
android:paddingRight="15dp"
android:text=""
android:textColor="@color/common_h2"
android:textSize="16dp" />
<RelativeLayout
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:padding="15dp">
<TextView
android:id="@+id/tvLike"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:background="@drawable/shape_common_btn_selector"
android:gravity="center"
android:paddingBottom="5dp"
android:paddingLeft="10dp"
android:paddingRight="10dp"
android:paddingTop="5dp"
android:text="同感"
android:textColor="@color/colorPrimary"
android:textSize="12dp" />
<ImageView
android:id="@+id/ivMore"
android:layout_width="30dp"
android:layout_height="30dp"
android:layout_alignParentRight="true"
android:src="@drawable/post_detail_more" />
<ImageView
android:id="@+id/ivShare"
android:layout_width="30dp"
android:layout_height="30dp"
android:layout_marginRight="10dp"
android:layout_toLeftOf="@+id/ivMore"
android:src="@drawable/post_detail_share" />
</RelativeLayout>
<TextView
android:id="@+id/tvBestComments"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:background="@color/common_gray_bg"
android:padding="15dp"
android:text="@string/comment_best_comment"
android:textColor="@color/common_h3"
android:visibility="gone"
tools:visibility="visible" />
<android.support.v7.widget.RecyclerView
android:id="@+id/rvBestComments"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:visibility="gone"
tools:visibility="visible" />
<TextView
android:id="@+id/tvCommentCount"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:background="@color/common_gray_bg"
android:padding="15dp"
android:text="@string/comment_comment_count"
android:textColor="@color/common_h3" />
</LinearLayout>
|
{
"pile_set_name": "Github"
}
|
Safety Forward app for iPhone and iPad
Safety forward is an effective and time-efficient way of conducting company driver safety meetings. Using online media to provide safety meetings, testing and record keeping, allows drivers to complete meetings on there own time while maintaining company safety compliance.
|
{
"pile_set_name": "Pile-CC"
}
|
A light and electron microscopic examination of budgerigar fledgling disease virus in tissue and in cell culture.
Morphological changes induced by a newly described avian virus in budgerigar (Melopsittacus undulatus) tissues were examined with light and electron microscopes. Infected cells viewed with the light microscope were found to have enlarged nuclei containing marginated chromatin. Cytoplasmic contents were frequently clear in appearance. Tissues affected included skin, feather, follicle, kidney, uropygial gland, crop, lung, liver, heart, bone marrow, spleen and brain. Serum from infected birds contained viral particles. No tumours were found in affected birds. Electron microscopy demonstrated viral particles that were naked, predominantly icosehedral, and 42-49 nm in diameter. Occasional elongate forms of the virions were seen in kidney tissue. Small groups of virions were occasionally enclosed within nuclear and cytoplasmic membranes. Viral particles were observed in chicken embryo fibroblast cultures 18 hours post-inoculation. The particles first appeared in swollen nuclei and subsequently were found in the cytoplasm of more senescent cells. Cytoplasmic disruption and swollen rough endoplasmic reticulum were also observed in infected cells. Negatively stained preparations of the fluid from infected chicken embryo fibroblast cultures contained typical cubic viral particles as well as elongate forms similar to those seen in excised tissue preparations.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Facile Preparation of Doxorubicin-Loaded and Folic Acid-Conjugated Carbon Nanotubes@Poly(N-vinyl pyrrole) for Targeted Synergistic Chemo-Photothermal Cancer Treatment.
We developed a bifunctional nanoplatform for targeted synergistic chemo-photothermal cancer treatment. The nanoplatform was constructed through a facile method in which poly(N-vinyl pyrrole) (PVPy) was coated on cut multiwalled carbon nanotubes (c-MWNTs); FA-PEG-SH was then linked by thiol-ene click reaction to improve the active targeting ability, water dispersibility, and biocompatibility and to extend the circulation time in blood. The PVPy shell not only enhanced the photothermal effect of c-MWNTs significantly but also provided a surface that could tailor targeting molecules and drugs. The resulting MWNT@PVPy-S-PEG-FA possessed high drug-loading ratio as well as pH-sensitive unloading capacity for a broad-spectrum anticancer agent, doxorubicin. Owing to its outstanding efficiency in photothermal conversion and ability in targeted drug delivery, the material could potentially be used as an efficient chemo-photothermal therapeutic nanoagent to treat cancer.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
In a typical vehicle transmission, an output gear is splined on a hub. The output gear is clamped in a desired position on the hub by a bolt. However, in time the bolt will loosen if it is not prevented from rotating. When the bolt loosens, the output gear can shift away from its desired position. What is needed is a simple, effective means to prevent the bolt from rotating.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Arts Council Confirmation: Alan Gilsenan appointed as Film Artist in Residence at UCC
The Arts Council and University College Cork are delighted to announce the appointment of Alan Gilsenan as Film Artist in Residence for 2019–2020.
The Film Artist in Residence role is jointly funded by the Arts Council and UCC, and is offered in association with the Cork Film Festival. It is designed to provide a screenwriter of distinction with a unique opportunity to develop his/her practice in a university environment, while offering students the opportunity to engage with a practising artist in a meaningful way during the course of their studies and their wider cultural involvement in campus life.
The appointment of Alan Gilsenan as Film Artist in Residence is for one year and he will be paid a fee of €20,000, of which 10,000 will be provided by the Arts Council. He will offer five contact hours per week in the form of screenwriting workshops, lectures and individual student mentoring over two semesters, and will enjoy uninterrupted time to advance his own work during the university vacations. A dedicated public event with Alan Gilsenan will be held during the 2019 Cork Film Festival.
Alan Gilsenan is the sixth film artist to be appointed to the role and follows Carmel Winters, Gerry Stembridge, Hugh Travers, Mark O’Halloran and Pat Murphy who enjoyed successful residencies at UCC since 2014.
During his residency, Alan Gilsenan will engage with students in UCC, both specialists in Film and Screen Media and undergraduates and postgraduates more widely through a range of events on campus. He will also participate in a public event at the Cork Film Festival in November 2019 and a public event in UCC in 2020.
Speaking of the appointment Fionnuala Sweeney, Head of Film and Architecture at the Arts Council, said: ‘The Arts Council wishes to congratulate Alan Gilsenan on his appointment as Film Artist in Residence at UCC. Alan has had a distinguished film career as a writer and director over thirty years and will bring his unique film-making talent to the role. We hope the residency will provide him with the time and space to further his own artistic practice.’
Professor Chris Williams, Head of the College of Arts, Celtic Studies and Social Sciences, UCC, added:“We are very excited to be welcoming Alan Gilsenan to the College of Arts, Celtic Studies and Social Sciences in UCC as Film Artist in Residence. His residency will generate some fantastic opportunities for students across the campus, and we are enormously eager to anticipate the multiple ways in which the presence of an artist of his extraordinary range and accomplishment will enrich our ongoing commitment to developing a creative environment for the university and the wider community.”
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Detecting Shift modifiers on MouseEvent generated from click in swing
I'm handling some MouseEvent in a GUI application using Java Swing.
Since now i was analyzing mouse events inside mousePressed method, only to determine if
a left or right click happened.
My code was:
public void mousePressed(MouseEvent me) {
if (me.getModifiers == InputEvent.BUTTON1_DOWN_MASK){
//left click
}else if (me.getModifiers == InputEvent.BUTTON3_DOWN_MASK){
//right click
}
Now my application is becoming more complicated and I need also to check if Shift button was pressed while mouse was left clicking.
I would like to do something like this:
public void mousePressed(MouseEvent me) {
if (me.getModifiers == InputEvent.BUTTON1_DOWN_MASK && me.isShiftDown()){
//left click
}
Now this doesn't work. In particular if I click the left button while holding SHIFT isShiftDown returns true (rigth. i was expecting that), but now seems that modifiers are also changed and the comparison with BUTTON1_DOWN_MASK fails.
me.getModifiers == InputEvent.BUTTON1_DOWN_MASK //failed..modifiers are changed
What am I doing wrong? How can I fix my code?
A:
Note that the method is called getModifier_s_(), with an "s", because it can return more than one modifier, combined using bitwise "or". It's technically never correct to use "==": you should use bitwise "&", like this:
if ((me.getModifiers() & InputEvent.BUTTON1_DOWN_MASK) != 0) ...
then you'll respond to that one modifier, even if others are present.
|
{
"pile_set_name": "StackExchange"
}
|
Send a file to Diana the Valkyrie
Because if someone sends me a few files of a kind, I can dig out others
like it and make a Gallery
Because Diana the Valkyrie says thank you to contributors.
Please make the file names as meaningful as possible. So, if it's a picture of Jane Doe, call the
file doe_jane_003.jpg. If it's a modification of Jane Doe, then doe_jane_mod_003.jpg. This naming will
help me tremendously in sorting the files out.
If you have a collection of related files, it's easier for you and me if you use ZIP to bundle them together.
Please don't use spaces in filenames; your computer might be happy with them, but many computers aren't.
If you send me a file and want to ask or tell me something about it, please tell me the filename.
I get hundreds of files each week.
There's lots of different ways, they all work fine
If you're using Netscape, click on
this link then drag-and-drop the file (or files) you want to upload onto your
browser. This won't work if you're using Microsoft's Internet Explorer.
Don't worry about not being able to see what you've sent, that's just
a security precaution. I can see them, and I'll check them out before I
repost them.
You can either use put, or mput does a multiple put and you can use the usual
wildcards. If you use mput, and don't want to be asked about each one, use the
prompt command. Help is another useful command.
Here's another way.
Click on the browse button and pick a file to send me. If there isn't a browse
button, then your browser doesn't have what it takes to use this method, so
don't use it, use ftp or email.
File to send:
Don't worry about overwriting files with the same name - you can't,
there's something on my server that prevents that.
Don't worry about not being able to see what you've sent, that's just
a security precaution. I can see them, and I'll check them out before I
repost them.
If you want to send me a lot of files, then it would be better to use
FTP. For Windows, I use and recommend CuteFTP, which you can get from
the usual shareware sources, but any good FTP program will do.
For the Mac, the thing to use seems to be Interarchy, which you can get from
their web site,
your browser should be able to download it. A lot of people use
Fetch
My server is ftp.TheValkyrie.com
The directory to use is /incoming
If you can't use FTP, then you can email things to me. Ideally, zip
everything into a big file and email it to
If you can't do that, then I can handle MIME encoded files. If you don't
know what that means, just email me however you can, and I'll tell you
if I can't handle it.
If you have a really huge amount of material, send me an email and we'll
talk about the best way to handle it.
The act of anyone sending
any information to us in the way of photographs, manuscripts, drawings,
charts, designs, videos, etc. shall constitute an absolute warranty by
the contributor that the material is original and does not infringe upon
the rights of others. Furthermore, if you're the copyright holder, then unless
you specifically say otherwise, then anything you send to me includes
permission to put it on any part of my web site, including the pay areas, for whatever period
of time I consider appropriate. You do this in the knowledge that members pay a
subscription for access to the web site.
|
{
"pile_set_name": "Pile-CC"
}
|
ADA Events {#s1}
==========
**59th Annual Advanced Postgraduate Course**
**17--19 February 2012**
**Hyatt Regency San Francisco**
**San Francisco, California**
**Contact:** Shirley Ash
**E-mail:** <sash@diabetes.org>
**2012 Diabetes Professional Educators Conference**
**9--10 March 2012**
**Country Springs Conference Center**
**Waukesha, Wisconsin**
**Contact:** Penny Kasprzak
**E-mail:** <pkasprzak@diabetes.org>
**27th Clinical Conference on Diabetes**
**24--27 May 2012**
**Hyatt Regency Coconut Point**
**Bonita Springs, Florida**
**Contact:** Pauline Lowe
**E-mail:** <plowe@diabetes.org>
**72nd Scientific Sessions**
**8--12 June 2012**
**Pennsylvania Convention Center**
**Philadelphia, Pennsylvania**
**Web site:** <http://scientificsessions.diabetes.org>
**73rd Scientific Sessions**
**21--25 June 2013**
**McCormick Place Convention Center**
**Chicago, Illinois**
**Web site:** <http://scientificsessions.diabetes.org>
**Contact for information on ADA events:** American Diabetes Association, 1701 N. Beauregard St., Alexandria, VA 22311. **Tel:** 800-232-3472, select option 1. **Fax:** 703-549-1715 **or** 703-253-4358. **E-mail:** <professionaleducation@diabetes.org>. **Web site:** <http://professional.diabetes.org/ce>.
Other Events {#s2}
============
**Circadian Clocks and Metabolic Disease**
**2012 UCLA Symposium**
**20--22 April 2012**
**Lake Arrowhead Conference Center**
**Lake Arrowhead, California**
**Web site:** <http://www.ccmdsymposium.med.ucla.edu>
|
{
"pile_set_name": "PubMed Central"
}
|
Abortion providers in Ohio say they are still open for business, still performing abortions, and still providing care for patients in their communities after an order to stop 'non-essential' surgeries last week.
"Abortion is an essential and time sensitive procedure," said Iris Harvey, CEO of Planned Parenthood of Greater Ohio, "we are in compliance."
Iris Harvey, CEO of Planned Parenthood of Greater Ohio
No more elective surgeries
On Wednesday March 18, the Ohio Department of Health ordered that "all non-essential or elective surgeries" be stopped in an effort to preserve personal protective equipment like masks, gloves and gowns during the COVID-19 pandemic.
The health department said "a non-essential surgery is a procedure that can be delayed with undue risk to the current or future health of a patient."
Examples of criteria to consider include:
Threat to patient's life if surgery or procedure is not performed
Threat of permanent dysfunction of an extremity or organ system
Risk of metastasis or progression of staging; or
Risk of rapidly worsening to severe symptoms (time sensitive)
AG sends letters to abortion providers
Just two days later, the Attorney General Dave Yost's office said it was forwarded complaints that abortion clinics weren't complying with the non-essential surgery order.
Ohio Attorney General Dave Yost
On Friday March 20, the Attorney General sent letters to the Planned Parenthood of Southwest Ohio and the Women's Medical Center in Dayton ordering they "stop performing non-essential and elective surgical abortions."
The letters went on to say, "Non-essential surgical abortions are those that can be delayed without undue risk to the current or future health of a patient."
The letter then threatened unspecified action, "If you or your facility do not immediately stop performing non-essential or elective surgical abortions in compliance with the attached order, the Department of Health will take all appropriate measures."
Essential or Non-Essential?
"I don't think there is a 'non-essential' abortion," said Harvey.
At their daily briefings, Governor DeWine and Dr. Amy Acton have been pressed by reporters to clarify which abortion procedures would be determined "essential" and which would be considered 'non-essential'.
Neither the Governor nor Dr. Acton would answer those questions but referred them to the Attorney General, who declined our request for an interview.
In an email, the AG's communications director Bethany McCorkle wrote News 5: "As our client, if Dr. Acton’s office determines that her order was violated by any surgical facility in Ohio, they can refer it to our office to pursue legal action on behalf of the Ohio Department of Health. We cannot provide legal interpretations of her order."
On Saturday March 21, the Attorney General also sent a letter to stop elective surgeries to the Urology Group in Cincinnati.
McCorkle also wrote, "This is not an abortion issue. A letter was also sent to a urology group that was allegedly performing elective surgeries."
Lawmaker Appalled
State Senator Nickie Antonio, a Democrat who represents the west side of Cleveland and its suburbs, disagrees.
“I was so appalled at the vehemence of the order,” said Antonio.
OhioSenate.gov Ohio State Senator Nickie Antonio (right)
“I put the total focus of this whole interpretation of the original order on Attorney General Yost,” she said. “To selectively, just to focus on clinics that provide abortion care, put it into a political nature.”
Now is not the time “to politicize anything,” she said.
Antonio said she has spoken with abortion care providers about the order to halt elective surgeries.
“These clinics are in full compliance with the governor’s orders,” she said. “The misnomer was that somehow they weren’t.”
She also said it is critical women continue to have access to health care, including abortion services, during the coronavirus pandemic.
“Not only is it essential, it’s also time-sensitive,’ she said, due to Ohio’s restrictions on abortions services.
“The AG (attorney general) should not practice medicine without a license,” said Antonio. “It is not his job to identify what is essential for women’s reproductive health care.
”He should just stay in his lane,” she said.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
access each object stored in an array
I just want to clear up how it is possible to use an object that is stored in an array? In Laravel I trigger a query.
$accounts = Account::where('customer_no', '=', $customer->customer_no)->get();
this returns two objects in an array here is a die and dump:
array(2) {
[0]=>
object(Account)#40 (5) {
["attributes"]=>
array(11) {
["acc_no"]=>
int(5)
["acc_type"]=>
string(7) "CURRENT"
["start_date"]=>
string(19) "2012-09-05 00:00:00"
["status"]=>
int(1)
["balance"]=>
string(5) "57.67"
["end_date"]=>
NULL
["interest_rate"]=>
string(4) "0.60"
["pin"]=>
string(4) "1112"
["attempts"]=>
int(2)
["bank_code"]=>
int(1)
["customer_no"]=>
int(10000003)
}
[1]=>
object(Account)#43 (5) {
["attributes"]=>
array(11) {
["acc_no"]=>
int(6)
["acc_type"]=>
string(7) "SAVINGS"
["start_date"]=>
string(19) "2007-01-01 00:00:00"
["status"]=>
int(1)
["balance"]=>
string(7) "1002.01"
["end_date"]=>
NULL
["interest_rate"]=>
string(4) "0.80"
["pin"]=>
string(4) "3427"
["attempts"]=>
int(2)
["bank_code"]=>
int(1)
["customer_no"]=>
int(10000003)
}
So I want to access these objects individually so I can make use of them, instead of having to do a foreach to access them individually.
How can I store these objects independently in PHP?
A:
You can just grab the object from an array index.
$account_one = $accounts[0];
$account_two = $accounts[1];
Is there a reason you don't want to use a foreach though? You could also use a regular for loop and use $accounts[i] to refer to a specific account.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
What's wrong with this Fluent NHibernate Configuration?
What's wrong with the following setup? The Where filter on the AutoPersistanceModel does not appear to be working and the table name convention does not appear to be working either. The error I'm evenually getting is "The element 'class' in namespace 'urn:nhibernate-mapping-2.2' has invalid child element 'property' in namespace 'urn:nhibernate-mapping-2.2'. List of possible elements expected: 'meta, jcs-cache, cache, id, composite-id' in namespace 'urn:nhibernate-mapping-2.2'." Here's my code:
public ISessionFactory BuildSessionFactory()
{
return Fluently.Configure()
.Database(
OracleConfiguration.Oracle9.ConnectionString(
c => c.FromConnectionStringWithKey("ConnectionString")))
.Mappings(m =>
{
m.AutoMappings.Add(GetAutoPersistanceModel);
m.FluentMappings.AddFromAssembly(Assembly.GetExecutingAssembly());
})
.BuildSessionFactory();
}
public AutoPersistenceModel GetAutoPersistanceModel()
{
return AutoPersistenceModel.MapEntitiesFromAssemblyOf<User>()
.Where(type => type.IsClass && !type.IsAbstract && type.Namespace == "Some.Namespace")
.ConventionDiscovery.Add<IConvention>(
Table.Is(x => "tbl" + x.EntityType.Name.Pluralize())
);
}
A:
The exception is saying NHibernate has encountered a <property /> element first, which is invalid. The first element in an NHibernate hbm file should (nearly) always be an Id, so it seems the AutoPersistenceModel isn't finding your identifiers.
How are your Ids named in your entities? The AutoPersistenceModel expects them to be literally called Id, if they're anything different then it won't find them.
You can use the FindIdentity configuration option to override how the AutoPersistenceModel finds Ids, which can be useful if you're unable to modify your entities.
// if your Id is EntityId
.WithSetup(s =>
s.FindIdentity = property => property.DeclaredType.Name + "Id"
)
A:
James is leading you correctly but his snippet is wrong.
.WithSetup(s=> s.FindIdentity = p => p.Name == "ID"));
Is what you're after! Replace "ID" with what ever your actual property is.
|
{
"pile_set_name": "StackExchange"
}
|
// Copyright 2014 The Go Authors. All rights reserved.
// Use of this source code is governed by a BSD-style
// license that can be found in the LICENSE file.
package icmp
import "syscall"
func init() {
freebsdVersion, _ = syscall.SysctlUint32("kern.osreldate")
}
|
{
"pile_set_name": "Github"
}
|
Chloroxiphite
Chloroxiphite is a rare olive green to pistacio green lead copper halide mineral with formula: Pb3CuO2Cl2(OH)2.
It was first discovered in 1923 in the Mendip Hills, Somerset, England associated with mendipite. Like mendipite it is an oxychloride mineral and formed from the alteration of lead ore (galena) by secondary oxidation. In addition to mendipite, it occurs with diaboleite, parkinsonite, wulfenite, cerussite and hydrocerussite. Its name comes from the Greek words (χλωρός) "green", describing its color, and (ζιφος) "blade" as its crystal form is long blade-like crystals that often show the growth pattern and time taken to form.
References
Category:Lead minerals
Category:Copper(II) minerals
Category:Halide minerals
Category:Monoclinic minerals
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Donal O'Donoghue (Gaelic footballer)
Donal O'Donoghue is a Gaelic footballer for Westmeath & for his local club Mullingar Shamrocks. O'Donoghue joined the panel in 2003 which proved to be less successful as Donal & his team crashed out of the Leinster Championship against neighbours Meath before exited in the qualifiers by Monaghan. The year after proved to be a shock as he won his first Leinster medal under Kerry man Páidí Ó Sé only to be denied in the Quarter-final by Derry.
2017 Season
O'Donoghue has decided to give his club, Mullingar Shamrocks, one final season. Many people in and around Mullingar have questioned this decision given he hasn't been a regular starter for Shamrocks since 2014. Some feel that his complete lack of pace will be exposed this summer. However, he is seen as a good team-mate to the younger players and can always be depended on to drive the star men to away games in his sparkling new Audi estate.
References
Category:Year of birth missing (living people)
Category:Living people
Category:Westmeath inter-county Gaelic footballers
Category:Mullingar Shamrocks Gaelic footballers
|
{
"pile_set_name": "Wikipedia (en)"
}
|
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Principal": {
"Federated": "cognito-identity.amazonaws.com"
},
"Action": "sts:AssumeRoleWithWebIdentity",
"Condition": {
"StringEquals": {
"cognito-identity.amazonaws.com:aud": "<IDENTITY_POOL_ID>"
},
"ForAnyValue:StringLike": {
"cognito-identity.amazonaws.com:amr": "unauthenticated"
}
}
}
]
}
|
{
"pile_set_name": "Github"
}
|
Cluster size dependence and yield linearity in cluster bombardment simulations of benzene.
Cluster bombardment of a molecular solid, benzene, is modeled using molecular dynamics simulations in order to investigate the effect of projectile cluster size and incident energy on the resulting yield. Using the mesoscale energy deposition footprint (MEDF) model, we are able to model large projectiles with incident energies from 5 to 140 keV and predict trends in ejection yield. The highest ejection yield at 5 keV was observed at C 20 and C 60, but shifts toward larger clusters for higher energies. These trends are explained in terms of the MEDF model. For these projectiles, all of the incident energy is deposited in the near-surface region, which is optimal for the projectile energy to contribute to the ejection yield. Because the energy is deposited in the optimal position for contributing to the ejection process, the yields increase linearly with incident energy with a slope that is nearly independent of the cluster size.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Zygozenillia
Zygozenillia is a genus of parasitic flies in the family Tachinidae. There is one described species in Zygozenillia, Z. plumbea.
References
Further reading
Category:Flies
Category:Articles created by Qbugbot
|
{
"pile_set_name": "Wikipedia (en)"
}
|
# Concurrent Programming in Mac OS X and iOS
### Vandad Nahavandipoor
#### Editor
### Andy Oram
Copyright © 2011 Vandad Nahavandipoor
O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com.
Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. _Concurrent Programming in Mac OS X and iOS_ , the image of a Russian greyhound, and related trade dress are trademarks of O'Reilly Media, Inc.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc., was aware of a trademark claim, the designations have been printed in caps or initial caps.
While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
O'Reilly Media
* * *
# A Note Regarding Supplemental Files
Supplemental files and examples for this book can be found at <http://examples.oreilly.com/0636920020332/>. Please use a standard desktop web browser to access these files, as they may not be accessible from all ereader devices.
All code files or examples referenced in the book will be available online. For physical books that ship with an accompanying disc, whenever possible, we've posted all CD/DVD content. Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.
# Preface
With the introduction of multicore devices such as the iPad 2 and the quad-core MacBook Pro, writing multithreaded apps that take advantage of multiple cores on a device has become one of the biggest headaches for developers. Take, for instance, the introduction of iPad 2. On the launch day, only a few applications, basically those released by Apple, were able to take advantage of its multiple cores. Applications like Safari performed very well on the iPad 2 compared to the original iPad, but some third-party browsers did not perform as well as Safari. The reason behind this is that Apple has utilized Grand Central Dispatch (GCD) in Safari's code base. GCD is a low-level C API that allows developers to write multithreaded applications without the need to manage threads at all. All developers have to do is define tasks and leave the rest to GCD.
The trend in the industry is _mobility_. Mobile devices, whether they are as compact as an iPhone or as strong and full-fledged as an Apple MacBook Pro, have many fewer resources than computers such as the Mac Pro, because all the hardware has to be placed inside the small devices' compact bodies. Because of this, it is very important to write applications that work smoothly on mobile devices such as the iPhone. We are not that far away from having quad-core or 8-core smartphones. Once we have 8 cores in the CPU, an app executed on only one of the cores will run _tremendously more slowly_ than an app that has been optimized with a technology such as GCD, which allows the code to be scheduled on multiple cores without the programmer having to manage this synchronization.
Apple is pushing developers away from using threads and is slowly starting to integrate GCD into its various frameworks. For instance, prior to the introduction of GCD in iOS, operations and operation queues used threads. With the introduction of GCD, Apple completely changed the implementation of operations and operation queues by using GCD instead of threads.
This book is written for those of you who want to do what Apple suggests and what seems like the bright future for software development: migrating away from threads and allowing the operating system to take care of threads for you, by replacing thread programming with GCD.
# Audience
In this book, I assume that you have a fairly basic understanding of the underlying technologies used in writing iOS and/or Mac OS X applications. We will not be discussing subjects related to Cocoa Touch or Cocoa. We will be using code that works, in principle and GCD layer, both with iOS and Mac OS X. Therefore, you will need to know the basics of Objective-C and your way around basic functionalities utilized by Core Foundation, such as string manipulation and arrays.
### Note
O'Reilly's iOS 4 Programming Cookbook is a good source for more about object allocation, arrays, and UI-related code, in case you are looking to broaden your perspective toward iOS programming.
# Conventions Used in This Book
The following typographical conventions are used in this book:
Italic
Indicates new terms, URLs, email addresses, filenames, and file extensions.
`Constant width`
Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords.
**`Constant width bold`**
Shows commands or other text that should be typed literally by the user.
_`Constant width italic`_
Shows text that should be replaced with user-supplied values or by values determined by context.
### Tip
This icon signifies a tip, suggestion, or general note.
# Using Code Examples
This book is here to help you get your job done. In general, you may use the code in this book in your programs and documentation. You do not need to contact us for permission unless you're reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing a CD-ROM of examples from O'Reilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your product's documentation does require permission.
We appreciate, but do not require, attribution. An attribution usually includes the title, author, publisher, and ISBN. For example: " _Concurrent Programming in Mac OS X and iOS_ by Vandad Nahavandipoor (O'Reilly). Copyright 2011 Vandad Nahavandipoor, 9781449305635."
If you feel your use of code examples falls outside fair use or the permission given above, feel free to contact us at permissions@oreilly.com.
# Safari® Books Online
### Note
Safari Books Online is an on-demand digital library that lets you easily search over 7,500 technology and creative reference books and videos to find the answers you need quickly.
With a subscription, you can read any page and watch any video from our library online. Read books on your cell phone and mobile devices. Access new titles before they are available for print, and get exclusive access to manuscripts in development and post feedback for the authors. Copy and paste code samples, organize your favorites, download chapters, bookmark key sections, create notes, print out pages, and benefit from tons of other time-saving features.
O'Reilly Media has uploaded this book to the Safari Books Online service. To have full digital access to this book and others on similar topics from O'Reilly and other publishers, sign up for free at http://my.safaribooksonline.com.
# How to Contact Us
Please address comments and questions concerning this book to the publisher:
O'Reilly Media, Inc.
---
1005 Gravenstein Highway North
Sebastopol, CA 95472
800-998-9938 (in the United States or Canada)
707-829-0515 (international or local)
707-829-0104 (fax)
We have a web page for this book, where we list errata, examples, and any additional information. You can access this page at:
<http://www.oreilly.com/catalog/9781449305635>
---
To comment or ask technical questions about this book, send email to:
bookquestions@oreilly.com
---
For more information about our books, courses, conferences, and news, see our website at <http://www.oreilly.com>.
Find us on Facebook: <http://facebook.com/oreilly>
Follow us on Twitter: <http://twitter.com/oreillymedia>
Watch us on YouTube: <http://www.youtube.com/oreillymedia>
# Content Updates
## June 3, 2011
* Minor technical fix: In the first example of block objects, two parameters were passed to a block object, but only one was used in the subtract operation.
# Acknowledgments
Working with O'Reilly to write books has always been a pleasure and this book is not an exception. I must say I am very fortunate to have fantastic friends and a fantastic support team around me, for without them, I wouldn't be the person I am today and you wouldn't be reading this book.
Andy Oram and Brian Jepson have been incredibly supportive of my efforts and have, for the fourth time, given me a chance to reach out to those who want to be educated further in cutting-edge technologies such as Grand Central Dispatch.
I am grateful for my wonderful friends who have been a continuous source of inspiration and support. Thanks to my friends and colleagues Sushil Shirke, Shency Revindran, Angela Rory, Chris Harman, Natalie Szrajber, Simon Whitty, Shaun Puckrin, Gary McCarville, Mark Harris, and Kirk Pattinson.
I would also like to thank everybody from O'Reilly who has helped me so far with my sometimes-incredibly-annoying requests. Thanks to Sarah Schneider for helping me with SVN setup and other technical DocBook questions. Thanks to Rachel James for helping me manage readers' requests for my existing books. A big thank you goes to Betsy Waliszewski and Gretchen Giles of O'Reilly for arranging a three-day half-price offer on many O'Reilly titles to help with Japanese disaster relief. With all you wonderful readers' help, O'Reilly donated $200,000 to Japanese disaster relief in March 2011.
Last but not least, I would like to thank you for reading this book. Your belief in my work is what keeps me writing more books that help readers be more productive and creative.
# Chapter 1. Introducing Block Objects
Block objects are _packages_ of code that usually appear in the form of methods in Objective-C. Block objects, together with Grand Central Dispatch (GCD), create a harmonious environment in which you can deliver high-performance multithreaded apps in iOS and Mac OS X. What's so special about block objects and GCD, you might ask? It's simple: no more threads! All you have to do is to put your code in block objects and ask GCD to take care of the execution of that code for you.
In this chapter, you will learn the basics of block objects, followed by some more advanced subjects. You will understand everything you need to know about block objects before moving to the Grand Central Dispatch chapter. From my experience, the best way to learn block objects is through examples, so you will see a lot of them in this chapter. Make sure you try the examples for yourself in Xcode to really _get_ the syntax of block objects.
# Short Introduction to Block Objects
Block objects in Objective-C are what the programming field calls _first-class objects_. This means you can build code dynamically, pass a block object to a method as a parameter, and return a block object from a method. All of these things make it easier to choose what you want to do at runtime and change the activity of a program. In particular, block objects can be run in individual threads by GCD. Being Objective-C objects, block objects can be treated like any other object: you can retain them, release them, and so forth. Block objects can also be called _closures_.
### Note
Block objects are sometimes referred to as _closures_.
Constructing block objects is similar to constructing traditional C functions, as we will see in Constructing Block Objects and Their Syntax. Block objects can have return values and can accept parameters. Block objects can be defined inline or treated as a separate block of code, similar to a C function. When created inline, the scope of variables accessible to block objects is considerably different from when a block object is implemented as a separate block of code.
GCD works with block objects. When performing tasks with GCD, you can pass a block object whose code can get executed synchronously or asynchronously, depending on which methods you use in GCD. Thus, you can create a block object that is responsible for downloading a URL passed to it as a parameter. That single block object can then be used in various places in your app synchronously or asynchronously, depending on how you would like to run it. You don't have to make the block object synchronous or asynchronous per se; you will simply call it with synchronous or asynchronous GCD methods and the block object will _just work_.
Block objects are quite new to programmers writing iOS and OS X apps. In fact, block objects are not as popular as threads yet, perhaps because their syntax is a bit different from pure Objective-C methods and more complicated. Nonetheless, block objects are enormously powerful and Apple is making a big push toward incorporating them into Apple libraries. You can already see these additions in classes such as `NSMutableArray`, where programmers can sort the array using a block object.
This chapter is dedicated entirely to constructing and using block objects in iOS and Mac OS X apps. I would like to stress that the only way to get used to block objects' syntax is to write a few of them for yourself. Have a look at the sample code in this chapter and try implementing your own block objects.
# Constructing Block Objects and Their Syntax
Block objects can either be inline or coded as independent blocks of code. Let's start with the latter type. Suppose you have a method in Objective-C that accepts two integer values of type `NSInteger` and returns the difference of the two values, by subtracting one from the other, as an `NSInteger`:
- (NSInteger) subtract:(NSInteger)paramValue
from:(NSInteger)paramFrom{
return paramFrom - paramValue;
}
That was very simple, wasn't it? Now let's translate this Objective-C code to a pure C function that provides the same functionality to get one step closer to learning the syntax of block objects:
NSInteger subtract(NSInteger paramValue, NSInteger paramFrom){
return paramFrom - paramValue;
}
You can see that the C function is quite different in syntax from its Objective-C counterpart. Now let's have a look at how we could code the same function as a block object:
NSInteger (^subtract)(NSInteger, NSInteger) =
^(NSInteger paramValue, NSInteger paramFrom){
return paramFrom - paramValue;
};
Before I go into details about the syntax of block objects, let me show you a few more examples. Suppose we have a function in C that takes a parameter of type `NSUInteger` (an unsigned integer) and returns it as a string of type `NSString`. Here is how we implement this in C:
NSString* intToString (NSUInteger paramInteger){
return [NSString stringWithFormat:@"%lu",
(unsigned long)paramInteger];
}
### Note
To learn about formatting strings with system-independent format specifiers in Objective-C, please refer to String Programming Guide, iOS Developer Library on Apple's website.
The block object equivalent of this C function is shown in Example 1-1.
Example 1-1. Example block object defined as function
NSString* (^intToString)(NSUInteger) = ^(NSUInteger paramInteger){
NSString *result = [NSString stringWithFormat:@"%lu",
(unsigned long)paramInteger];
return result;
};
The simplest form of an independent block object would be a block object that returns `void` and does not take any parameters in:
void (^simpleBlock)(void) = ^{
/* Implement the block object here */
};
Block objects can be invoked in the exact same way as C functions. If they have any parameters, you pass the parameters to them like a C function and any return value can be retrieved exactly as you would retrieve a C function's return value. Here is an example:
NSString* (^intToString)(NSUInteger) = ^(NSUInteger paramInteger){
NSString *result = [NSString stringWithFormat:@"%lu",
(unsigned long)paramInteger];
return result;
};
- (void) callIntToString{
NSString *string = intToString(10);
NSLog(@"string = %@", string);
}
The `callIntToString` Objective-C method is calling the `intToString` block object by passing the value 10 as the only parameter to this block object and placing the return value of this block object in the `string` local variable.
Now that we know how to write block objects as independent blocks of code, let's have a look at passing block objects as parameters to Objective-C methods. We will have to think a bit abstractly to understand the goal of the following example.
Suppose we have an Objective-C method that accepts an integer and performs some kind of transformation on it, which may change depending on what else is happening in our program. We know that we'll have an integer as input and a string as output, but we'll leave the exact transformation up to a block object that can be different each time our method runs. This method, therefore, will accept as parameters both the integer to be transformed and the block that will transform it.
For our block object, we'll use the same `intToString` block object that we implemented earlier in Example 1-1. Now we need an Objective-C method that will accept an unsigned integer parameter and a block object as its parameter. The unsigned integer parameter is easy, but how do we tell our method that it has to accept a block object _of the same type_ as the `intToString` block object? First we `typedef` the signature of the `intToString` block object, which tells the compiler what parameters our block object should accept:
typedef NSString* (^IntToStringConverter)(NSUInteger paramInteger);
This `typedef` just tells the compiler that block objects that accept an integer parameter and return a string can simply be represented by an identifier named `IntToStringConverter`. Now let's go ahead and write our Objective-C method that accepts both an integer and a block object of type `IntToStringConverter`:
- (NSString *) convertIntToString:(NSUInteger)paramInteger
usingBlockObject:(IntToStringConverter)paramBlockObject{
return paramBlockObject(paramInteger);
}
All we have to do now is call the `convertIntToString:` method with our block object of choice (Example 1-2).
Example 1-2. Calling the block object in another method
- (void) doTheConversion{
NSString *result = [self convertIntToString:123
usingBlockObject:intToString];
NSLog(@"result = %@", result);
}
Now that we know something about independent block objects, let's turn to inline block objects. In the `doTheConversion` method we just saw, we passed the `intToString` block object as the parameter to the `convertIntToString:usingBlockObject:` method. What if we didn't have a block object ready to be passed to this method? Well, that wouldn't be a problem. As mentioned before, block objects are first-class functions and can be constructed at runtime. Let's have a look at an alternative implementation of the `doTheConversion` method (Example 1-3).
Example 1-3. Example block object defined as function
- (void) doTheConversion{
IntToStringConverter inlineConverter = ^(NSUInteger paramInteger){
NSString *result = [NSString stringWithFormat:@"%lu",
(unsigned long)paramInteger];
return result;
};
NSString *result = [self convertIntToString:123
usingBlockObject:inlineConverter];
NSLog(@"result = %@", result);
}
Compare Example 1-3 to the earlier Example 1-1. I have removed the initial code that provided the block object's signature, which consisted of a name and argument, `(^intToString)(NSUInteger)`. I left all the rest of the block object intact. It is now an anonymous object. But this doesn't mean I have no way to refer to the block object. I assign it using an equal sign to a type and a name: `IntToStringConverter inlineConverter`. Now I can use the data type to enforce proper use in methods, and use the name to actually pass the block object.
In addition to constructing block objects inline as just shown, we can construct a block object _while_ passing it as a parameter:
- (void) doTheConversion{
NSString *result =
[self convertIntToString:123
usingBlockObject:^NSString *(NSUInteger paramInteger) {
NSString *result = [NSString stringWithFormat:@"%lu",
(unsigned long)paramInteger];
return result;
}];
NSLog(@"result = %@", result);
}
Compare this example with Example 1-2. Both methods use a block object through the `usingBlockObject` syntax. But whereas the earlier version referred to a previously declared block object by name (`intToString`), this one simply creates a block object on the fly. In this code, we constructed an inline block object that gets passed to the `convertIntToString:usingBlockObject:` method as the second parameter.
I believe that at this point you know enough about block objects to be able to move to more interesting details, which we'll begin with in the following section.
# Variables and Their Scope in Block Objects
Here is a brief summary of what you must know about variables in block objects:
* Local variables in block objects work exactly the same as in Objective-C methods.
* For inline block objects, local variables constitute not only variables defined within the block, but also the variables that have been defined in the method that implements that block object. (Examples will come shortly.)
* You _cannot_ refer to `self` in independent block objects implemented in an Objective-C class. If you need to access `self`, you must pass that object to the block object as a parameter. We will see an example of this soon.
* You can refer to `self` in an inline block object only if `self` is present in the lexical scope inside which the block object is created.
* For inline block objects, local variables that are defined _inside_ the block object's implementation can be read from and written to. In other words, the block object has read-write access to variables defined inside the block object's body.
* For inline block objects, variables local to the Objective-C method that implements that block can only be read from, not written to. There is an exception, though: a block object can write to such variables if they are defined with the `__block` storage type. We will see an example of this as well.
* Suppose you have an object of type `NSObject` and inside that object's implementation you are using a block object in conjunction with GCD. Inside this block object, you will have read-write access to declared properties of that `NSObject` inside which your block is implemented.
* You can access declared properties of your `NSObject` inside independent block objects _only if_ you use the setter and getter methods of these properties. You cannot access declared properties of an object using dot notation inside an independent block object.
Let's first see how we can use variables that are local to the implementation of two block objects. One is an inline block object and the other an independent block object:
void (^independentBlockObject)(void) = ^(void){
NSInteger localInteger = 10;
NSLog(@"local integer = %lu", (unsigned long)localInteger);
localInteger = 20;
NSLog(@"local integer = %lu", (unsigned long)localInteger);
};
Invoking this block object, the values we assigned are printed to the console window:
local integer = 10
local integer = 20
So far, so good. Now let's have a look at inline block objects and variables that are local to them:
- (void) simpleMethod{
NSUInteger outsideVariable = 10;
NSMutableArray *array = [[NSMutableArray alloc]
initWithObjects:@"obj1",
@"obj2", nil];
[array sortUsingComparator:^NSComparisonResult(id obj1, id obj2) {
NSUInteger insideVariable = 20;
NSLog(@"Outside variable = %lu", (unsigned long)outsideVariable);
NSLog(@"Inside variable = %lu", (unsigned long)insideVariable);
/* Return value for our block object */
return NSOrderedSame;
}];
[array release];
}
### Note
The `sortUsingComparator:` instance method of `NSMutableArray` attempts to sort a mutable array. The goal of this example code is just to demonstrate the use of local variables, so you don't have to know what this method actually does.
The block object can read and write its own `insideVariable` local variable. However, the block object has read-only access to the `outsideVariable` variable by default. In order to allow the block object to write to `outsideVariable`, we must prefix `outsideVariable` with the `__block` storage type:
- (void) simpleMethod{
__block NSUInteger outsideVariable = 10;
NSMutableArray *array = [[NSMutableArray alloc]
initWithObjects:@"obj1",
@"obj2", nil];
[array sortUsingComparator:^NSComparisonResult(id obj1, id obj2) {
NSUInteger insideVariable = 20;
outsideVariable = 30;
NSLog(@"Outside variable = %lu", (unsigned long)outsideVariable);
NSLog(@"Inside variable = %lu", (unsigned long)insideVariable);
/* Return value for our block object */
return NSOrderedSame;
}];
[array release];
}
Accessing `self` in inline block objects is fine as long as `self` is defined in the lexical scope inside which the inline block object is created. For instance, in this example, the block object will be able to access `self`, since `simpleMethod` is an instance method of an Objective-C class:
- (void) simpleMethod{
NSMutableArray *array = [[NSMutableArray alloc]
initWithObjects:@"obj1",
@"obj2", nil];
[array sortUsingComparator:^NSComparisonResult(id obj1, id obj2) {
NSLog(@"self = %@", self);
/* Return value for our block object */
return NSOrderedSame;
}];
[array release];
}
You cannot, without a change in your block object's implementation, access `self` in an independent block object. Attempting to compile this code will give you a compile-time error:
void (^incorrectBlockObject)(void) = ^{
NSLog(@"self = %@", self); /* self is undefined here */
};
If you want to access `self` in an independent block object, simply pass the object that `self` represents as a parameter to your block object:
void (^correctBlockObject)(id) = ^(id self){
NSLog(@"self = %@", self);
};
- (void) callCorrectBlockObject{
correctBlockObject(self);
}
### Note
You don't have to assign the name `self` to this parameter. You can simply call this parameter anything else. However, if you call this parameter `self`, you can simply grab your block object's code later and place it in an Objective-C method's implementation without having to change every instance of your variable's name to `self` for it to be understood by the compiler.
Let's have a look at declared properties and how block objects can access them. For inline block objects, you can use dot notation to read from or write to declared properties of `self`. For instance, let's say we have a declared property of type `NSString` called `stringProperty` in our class:
#import <UIKit/UIKit.h>
@interface GCDAppDelegate : NSObject <UIApplicationDelegate> {
@protected
NSString *stringProperty;
}
@property (nonatomic, retain) NSString *stringProperty;
@end
Now we can simply access this property in an inline block object like so:
#import "GCDAppDelegate.h"
@implementation GCDAppDelegate
@synthesize stringProperty;
- (void) simpleMethod{
NSMutableArray *array = [[NSMutableArray alloc]
initWithObjects:@"obj1",
@"obj2", nil];
[array sortUsingComparator:^NSComparisonResult(id obj1, id obj2) {
NSLog(@"self = %@", self);
self.stringProperty = @"Block Objects";
NSLog(@"String property = %@", self.stringProperty);
/* Return value for our block object */
return NSOrderedSame;
}];
[array release];
}
- (void) dealloc{
[stringProperty release];
[super dealloc];
}
@end
In an independent block object, however, you cannot use dot notation to read from or write to a declared property:
void (^correctBlockObject)(id) = ^(id self){
NSLog(@"self = %@", self);
/* Should use setter method instead of this */
self.stringProperty = @"Block Objects"; /* Compile-time Error */
/* Should use getter method instead of this */
NSLog(@"self.stringProperty = %@",
self.stringProperty); /* Compile-time Error */
};
Instead of dot notation in this scenario, use the getter and the setter methods of this synthesized property:
void (^correctBlockObject)(id) = ^(id self){
NSLog(@"self = %@", self);
/* This will work fine */
[self setStringProperty:@"Block Objects"];
/* This will work fine as well */
NSLog(@"self.stringProperty = %@",
[self stringProperty]);
};
When it comes to inline block objects, there is one _very_ important rule that you have to remember: inline block objects copy the value for the variables in their lexical scope. If you don't understand what that means, don't worry. Let's have a look at an example:
typedef void (^BlockWithNoParams)(void);
- (void) scopeTest{
NSUInteger integerValue = 10;
/*************** Definition of internal block object ***************/
BlockWithNoParams myBlock = ^{
NSLog(@"Integer value inside the block = %lu",
(unsigned long)integerValue);
};
/*************** End definition of internal block object ***************/
integerValue = 20;
/* Call the block here after changing the
value of the integerValue variable */
myBlock();
NSLog(@"Integer value outside the block = %lu",
(unsigned long)integerValue);
}
We are declaring an integer local variable and initially assigning the value of 10 to it. We then implement our block object but _don't call the block object yet_. After the block object is _implemented_ , we simply change the value of the local variable that the block object will later try to read when we call it. Right after changing the local variable's value to 20, we call the block object. You would expect the block object to print the value 20 for the variable, but it won't. It will print 10, as you can see here:
Integer value inside the block = 10
Integer value outside the block = 20
What's happening here is that the block object is keeping a read-only copy of the `integerValue` variable for itself right where the block is implemented. You might be thinking: why is the block object capturing a _read-only_ value of the local variable `integerValue`? The answer is simple, and we've already learned it in this section. Unless prefixed with storage type `__block`, local variables in the lexical scope of a block object are just passed to the block object as read-only variables. Therefore, to change this behavior, we could change the implementation of our `scopeTest` method to prefix the `integerValue` variable with `__block` storage type, like so:
- (void) scopeTest{
__block NSUInteger integerValue = 10;
/*************** Definition of internal block object ***************/
BlockWithNoParams myBlock = ^{
NSLog(@"Integer value inside the block = %lu",
(unsigned long)integerValue);
};
/*************** End definition of internal block object ***************/
integerValue = 20;
/* Call the block here after changing the
value of the integerValue variable */
myBlock();
NSLog(@"Integer value outside the block = %lu",
(unsigned long)integerValue);
}
Now if we get the results from the console window after the `scopeTest` method is called, we will see this:
Integer value inside the block = 20
Integer value outside the block = 20
This section should have given you sufficient information about using variables with block objects. I suggest that you write a few block objects and use variables inside them, assigning to them and reading from them, to get a better understanding of how block objects use variables. Keep coming back to this section if you forget the rules that govern variable access in block objects.
# Invoking Block Objects
We've seen examples of invoking block objects in Constructing Block Objects and Their Syntax and Variables and Their Scope in Block Objects. This section contains more concrete examples.
If you have an independent block object, you can simply invoke it just like you would invoke a C function:
void (^simpleBlock)(NSString *) = ^(NSString *paramString){
/* Implement the block object here and use the
paramString parameter */
};
- (void) callSimpleBlock{
simpleBlock(@"O'Reilly");
}
If you want to invoke an independent block object within another independent block object, follow the same instructions by invoking the new block object just as you would invoke a C method:
/*************** Definition of first block object ***************/
NSString *(^trimString)(NSString *) = ^(NSString *inputString){
NSString *result = [inputString stringByTrimmingCharactersInSet:
[NSCharacterSet whitespaceCharacterSet]];
return result;
};
/*************** End definition of first block object ***************/
/*************** Definition of second block object ***************/
NSString *(^trimWithOtherBlock)(NSString *) = ^(NSString *inputString){
return trimString(inputString);
};
/*************** End definition of second block object ***************/
- (void) callTrimBlock{
NSString *trimmedString = trimWithOtherBlock(@" O'Reilly ");
NSLog(@"Trimmed string = %@", trimmedString);
}
In this example, go ahead and invoke the `callTrimBlock` Objective-C method:
[self callTrimBlock];
The `callTrimBlock` method will call the `trimWithOtherBlock` block object, and the `trimWithOtherBlock` block object will call the `trimString` block object in order to trim the given string. Trimming a string is an easy thing to do and can be done in one line of code, but this example code shows how you can call block objects within block objects.
In Chapter 2, you will learn how to invoke block objects using Grand Central Dispatch, synchronously or asynchronously, to unleash the real power of block objects.
# Memory Management for Block Objects
iOS apps run in a reference-counted environment. That means every object has a retain count to ensure the Objective-C runtime keeps it as long as it might be used, and gets rid of it when no one can use it anymore. You can think of a retain count as the number of leashes on an animal. As long as there is at least one leash, the animal will stay where it is. If there are two leashes, the animal has to be unleashed twice to be released. As soon as all leashes are released, the animal is free. Substitute all occurrences of _animal_ with _object_ in the preceding sentences and you will understand how a reference-counted environment works. When we allocate an object in iOS, the retain count of that object becomes 1. Every allocation has to be paired with a release call invoked on the object to decrement the release count by 1. If you want to keep the object around in memory, you have to make sure you have retained that object so that its retain count is incremented by the runtime.
### Note
For more information about memory management in iOS apps, please refer to iOS 4 Programming Cookbook (O'Reilly).
Block objects are objects as well, so they also can be copied, retained, and released. When writing an iOS app, you can simply treat block objects as normal objects and retain and release them as you would with other objects:
typedef NSString* (^StringTrimmingBlockObject)(NSString *paramString);
NSString* (^trimString)(NSString *) = ^(NSString *paramString){
NSString *result = nil;
result = [paramString
stringByTrimmingCharactersInSet:
[NSCharacterSet whitespaceCharacterSet]];
return result;
};
- (void) callTrimString{
StringTrimmingBlockObject trimStringCopy = Block_copy(trimString);
NSString *trimmedString = trimStringCopy(@" O'Reilly ");
NSLog(@"Trimmed string = %@", trimmedString);
Block_release(trimStringCopy);
}
Use `Block_copy` on a block object to declare ownership of that block object for the period of time you wish to use it. While retaining ownership over a block object, you can be sure that iOS will not dispose of that block object and its memory. Once you are done with that block object, you must release ownership using `Block_release`.
If you are using block objects in your Mac OS X apps, you should follow the same rules, whether you are writing your app in a garbage-collected or a reference-counting environment. Here is the same example code from iOS, written for Mac OS X. You can compile it with and without garbage collection enabled for your project:
typedef NSString* (^StringTrimmingBlockObject)(NSString *paramString);
NSString* (^trimString)(NSString *) = ^(NSString *paramString){
NSString *result = nil;
result = [paramString
stringByTrimmingCharactersInSet:
[NSCharacterSet whitespaceCharacterSet]];
return result;
};
- (void)applicationDidFinishLaunching:(NSNotification *)aNotification
{
StringTrimmingBlockObject trimmingBlockObject = Block_copy(trimString);
NSString *trimmedString = trimmingBlockObject(@" O'Reilly ");
NSLog(@"Trimmed string = %@", trimmedString);
Block_release(trimmingBlockObject);
}
In iOS, you can also use autorelease block objects, like so:
NSString* (^trimString)(NSString *) = ^(NSString *paramString){
NSString *result = nil;
result = [paramString
stringByTrimmingCharactersInSet:
[NSCharacterSet whitespaceCharacterSet]];
return result;
};
- (id) autoreleaseTrimStringBlockObject{
return [trimString autorelease];
}
You can also define declared properties that hold a copy of a block object. Here is the _.h_ file of our object that declares a property (`nonatomic, copy`) for a block object:
#import <UIKit/UIKit.h>
typedef NSString* (^StringTrimmingBlockObject)(NSString *paramString);
@interface GCDAppDelegate : NSObject <UIApplicationDelegate> {
@protected
StringTrimmingBlockObject trimmingBlock;
}
@property (nonatomic, retain) IBOutlet UIWindow *window;
@property (nonatomic, copy) StringTrimmingBlockObject trimmingBlock;
@end
### Note
This code is written inside the application delegate of a simple universal iOS app.
Now let's go ahead and implement our application's delegate object:
#import "GCDAppDelegate.h"
@implementation GCDAppDelegate
@synthesize window=_window;
@synthesize trimmingBlock;
NSString* (^trimString)(NSString *) = ^(NSString *paramString){
NSString *result = nil;
result = [paramString
stringByTrimmingCharactersInSet:
[NSCharacterSet whitespaceCharacterSet]];
return result;
};
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
self.trimmingBlock = trimString;
NSString *trimmedString = self.trimmingBlock(@" O'Reilly ");
NSLog(@"Trimmed string = %@", trimmedString);
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
- (void)dealloc{
[trimmingBlock release];
[_window release];
[super dealloc];
}
@end
What we want to achieve in this example is, first, to declare ownership over the `trimString` block object in our application delegate, and then to use that block object to trim a single string off its whitespaces.
### Note
The `trimmingBlock` property is declared as `nonatomic`. This means that this property's thread-safeness must be managed by us, and we should make sure this property won't get accessed from more than one thread at a time. We won't really have to care about this at the moment as we are not doing anything fancy with threads right now. This property is also defined as `copy`, which tells the runtime to call the `copy` method on any object, including block objects, when we assign those objects to this property, as opposed to retaining those objects by calling the `retain` method on them.
As we saw before, the `trimString` block object accepts a string as its parameter, trims this string, and returns it to the caller. Inside the `application:didFinish``Launching``WithOptions:` instance method of our application delegate, we are simply using dot notation to assign the `trimString` block object to the `trimmingBlock` declared property. This means that the runtime will immediately call the `Block_copy` on the `trimString` block object and assign the resulting value to the `trimmingBlock` declared property. From this point on, until we release the block object, we have a copy of it in the `trimmingBlock` declared property.
Now we can use the `trimmingBlock` declared property to invoke the `trimString` block object, as shown in the following code:
NSString *trimmedString = self.trimmingBlock(@" O'Reilly ");
Once we are done, in the `dealloc` instance method of our object, we will release the `trimmingBlock` declared property by calling its `release` method.
With more insight into block objects and how they manage their variables and memory, it is finally time to move to Chapter 2 to learn about the wonder that is called Grand Central Dispatch. We will be using block objects with GCD a lot, so make sure you have really understood the material in this chapter before moving on to the next.
# Chapter 2. Programming Grand Central Dispatch
Grand Central Dispatch, or GCD for short, is a low-level C API that works with block objects. The real use for GCD is to dispatch tasks to multiple cores without making you, the programmer, worry about which core is executing which task. On Mac OS X, multicore devices, including laptops, have been available to users for quite some time. With the introduction of multicore devices such as the iPad 2, programmers can write amazing multicore-aware multithreaded apps for iOS. See the preface for more background on the importance of multicores.
In Chapter 1 we learned how to use block objects. If you have not read that chapter, I strongly suggest that you do straight away, as GCD relies heavily on block objects and their dynamic nature. In this chapter, we will learn about really fun and interesting things that programmers can achieve with GCD in iOS and Mac OS X.
# Short Introduction to Grand Central Dispatch
At the heart of GCD are dispatch queues. Dispatch queues, as we will see in Different Types of Dispatch Queues, are pools of threads managed by GCD on the host operating system, whether it is iOS or Mac OS X. You will not be working with these threads directly. You will just work with dispatch queues, dispatching _tasks_ to these queues and asking the queues to invoke your tasks. GCD offers several options for running tasks: synchronously, asynchronously, after a certain delay, etc.
To start using GCD in your apps, you don't have to import any special library into your project. Apple has already incorporated GCD into various frameworks, including Core Foundation and Cocoa/Cocoa Touch. All methods and data types available in GCD start with a _dispatch__ keyword. For instance, `dispatch_async` allows you to dispatch a task on a queue for asynchronous execution, whereas `dispatch_after` allows you to run a block of code after a given delay.
Traditionally, programmers had to create their own threads to perform tasks in parallel. For instance, an iOS developer would create a thread similar to this to perform an operation 1000 times:
- (void) doCalculation{
/* Do your calculation here */
}
- (void) calculationThreadEntry{
NSAutoreleasePool *pool = [[NSAutoreleasePool alloc] init];
NSUInteger counter = 0;
while ([[NSThread currentThread] isCancelled] == NO){
[self doCalculation];
counter++;
if (counter >= 1000){
break;
}
}
[pool release];
}
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
/* Start the thread */
[NSThread detachNewThreadSelector:@selector(calculationThreadEntry)
toTarget:self
withObject:nil];
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
The programmer has to start the thread manually and then create the required structure for the thread (entry point, autorelease pool, and thread's main loop). When we write the same code with GCD, we really won't have to do much:
dispatch_queue_t queue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
size_t numberOfIterations = 1000;
dispatch_async(queue, ^(void) {
dispatch_apply(numberOfIterations, queue, ^(size_t iteration){
/* Perform the operation here */
});
});
In this chapter, you will learn all there is to know about GCD and how to use it to write modern multithreaded apps for iOS and Mac OS X that will achieve blazing performance on multicore devices such as the iPad 2.
# Different Types of Dispatch Queues
As mentioned in Short Introduction to Grand Central Dispatch, dispatch queues are pools of threads managed by GCD. We will be working with dispatch queues a lot, so please make sure that you fully understand the concept behind them. There are three types of dispatch queues:
Main Queue
This queue performs all its tasks on the main thread, which is where Cocoa and Cocoa Touch require programmers to call all UI-related methods. Use the `dispatch_get_main_queue` function to retrieve the handle to the main queue.
Concurrent Queues
These are queues that you can retrieve from GCD in order to execute asynchronous or synchronous tasks. Multiple concurrent queues can be executing multiple tasks in parallel, without breaking a sweat. No more thread management, yippee! Use the `dispatch_get_global_queue` function to retrieve the handle to a concurrent queue.
Serial Queues
These are queues that, no matter whether you submit synchronous or asynchronous tasks to them, will always execute their tasks in a first-in-first-out (FIFO) fashion, meaning that they can only execute one block object at a time. However, they do _not_ run on the main thread and therefore are perfect for a series of tasks that have to be executed in strict order without blocking the main thread. Use the `dispatch_queue_create` function to create a serial queue. Once you are done with the queue, you must release it using the `dispatch_release` function.
At any moment during the lifetime of your application, you can use multiple dispatch queues at the same time. Your system has only one main queue, but you can create as many serial dispatch queues as you want, within reason, of course, for whatever functionality you require for your app. You can also retrieve multiple concurrent queues and dispatch your tasks to them. Tasks can be handed to dispatch queues in two forms: block objects or C functions, as we will see in Dispatching Tasks to Grand Central Dispatch.
# Dispatching Tasks to Grand Central Dispatch
There are two ways to submit tasks to dispatch queues:
* Block Objects (see Chapter 1)
* C functions
Block objects are the best way of utilizing GCD and its enormous power. Some GCD functions have been extended to allow programmers to use C functions instead of block objects. However, the truth is that only a limited set of GCD functions allow programmers to use C functions, so please do read the chapter about block objects (Chapter 1) before proceeding with this chapter.
C functions that have to be supplied to various GCD functions should be of type `dispatch_function_t`, which is defined as follows in the Apple libraries:
typedef void (*dispatch_function_t)(void *);
So if we want to create a function named, for instance, `myGCDFunction`, we would have to implement it in this way:
void myGCDFunction(void * paraContext){
/* Do the work here */
}
### Note
The `paraContext` parameter refers to the context that GCD allows programmers to pass to their C functions when they dispatch tasks to them. We will learn about this shortly.
Block objects that get passed to GCD functions don't always follow the same structure. Some must accept parameters and some shouldn't, but none of the block objects submitted to GCD return a value.
In the next three sections you will learn how to submit tasks to GCD for execution whether they are in the form of block objects or C functions.
# Performing UI-Related Tasks
UI-related tasks have to be performed on the main thread, so the main queue is the only candidate for UI task execution in GCD. We can use the `dispatch_get_main_queue` function to get the handle to the main dispatch queue.
There are two ways of dispatching tasks to the main queue. Both are asynchronous, letting your program continue even when the task is not yet executed:
`dispatch_async` function
Executes a block object on a dispatch queue.
`dispatch_async_f` function
Executes a C function on a dispatch queue.
### Note
The `dispatch_sync` method _cannot_ be called on the main queue because it will block the thread indefinitely and cause your application to deadlock. All tasks submitted to the main queue through GCD must be submitted asynchronously.
Let's have a look at using the `dispatch_async` function. It accepts two parameters:
Dispatch queue handle
The dispatch queue on which the task has to be executed.
Block object
The block object to be sent to the dispatch queue for asynchronous execution.
Here is an example. This code will display an alert, in iOS, to the user, using the main queue:
dispatch_queue_t mainQueue = dispatch_get_main_queue();
dispatch_async(mainQueue, ^(void) {
[[[[UIAlertView alloc]
initWithTitle:NSLocalizedString(@"GCD", nil)
message:NSLocalizedString(@"GCD is amazing!", nil)
delegate:nil
cancelButtonTitle:NSLocalizedString(@"OK", nil)
otherButtonTitles:nil, nil] autorelease] show];
});
### Note
As you've noticed, the `dispatch_async` GCD function has no parameters or return value. The block object that is submitted to this function must gather its own data in order to complete its task. In the code snippet that we just saw, the alert view has all the values that it needs to finish its task. However, this might not always be the case. In such instances, you must make sure the block object submitted to GCD has access in its scope to all the values that it requires.
Running this app in iOS Simulator, the user will get results similar to those shown in Figure 2-1.
Figure 2-1. An alert displayed using asynchronous GCD calls
This might not be that impressive. In fact, it is not impressive at all if you think about it. So what makes the main queue truly interesting? The answer is simple: when you are getting the maximum performance from GCD to do some heavy calculation on concurrent or serial threads, you might want to display the results to your user or move a component on the screen. For that, you _must_ use the main queue, because it is UI-related work. The functions shown in this section are the _only_ way to get out of a serial or a concurrent queue while still utilizing GCD to update your UI, so you can imagine how important it is.
Instead of submitting a block object for execution on the main queue, you can submit a C function object. Submit all UI-related C functions for execution in GCD to the `dispatch_async_f` function. We can get the same results as we got in Figure 2-1, using C functions instead of block objects, with a few adjustments to our code.
As mentioned before, with the `dispatch_async_f` function, we can submit a pointer to an application-defined context, which can then be used by the C function that gets called. So here is the plan: let's create a structure that holds values such as an alert view's title, message, and cancel-button's title. When our app starts, we will put all the values in this structure and pass it to our C function to display. Here is how we are defining our structure:
typedef struct{
char *title;
char *message;
char *cancelButtonTitle;
} AlertViewData;
Now let's go and implement a C function that we will later call with GCD. This C function should expect a parameter of type `void *`, which we will then typecast to `AlertViewData *`. In other words, we expect the caller of this function to pass us a reference to the data for our alert view, encapsulated inside the `AlertViewData` structure:
void displayAlertView(void *paramContext){
AlertViewData *alertData = (AlertViewData *)paramContext;
NSString *title =
[NSString stringWithUTF8String:alertData->title];
NSString *message =
[NSString stringWithUTF8String:alertData->message];
NSString *cancelButtonTitle =
[NSString stringWithUTF8String:alertData->cancelButtonTitle];
[[[[UIAlertView alloc] initWithTitle:title
message:message
delegate:nil
cancelButtonTitle:cancelButtonTitle
otherButtonTitles:nil, nil] autorelease] show];
free(alertData);
}
### Note
The reason we are `free`ing the context passed to us in here instead of in the caller is that the caller is going to execute this C function asynchronously and cannot know when our C function will finish executing. Therefore, the caller has to `malloc` enough space for the `AlertViewData` context and our `displayAlertView` C function has to free that space.
And now let's call the `displayAlertView` function on the main queue and pass the context (the structure that holds the alert view's data) to it:
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
dispatch_queue_t mainQueue = dispatch_get_main_queue();
AlertViewData *context = (AlertViewData *)
malloc(sizeof(AlertViewData));
if (context != NULL){
context->title = "GCD";
context->message = "GCD is amazing.";
context->cancelButtonTitle = "OK";
dispatch_async_f(mainQueue,
(void *)context,
displayAlertView);
}
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
If you invoke the `currentThread` class method of the `NSThread` class, you will find out that the block objects or the C functions you dispatch to the main queue are indeed running on the main thread:
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
dispatch_queue_t mainQueue = dispatch_get_main_queue();
dispatch_async(mainQueue, ^(void) {
NSLog(@"Current thread = %@", [NSThread currentThread]);
NSLog(@"Main thread = %@", [NSThread mainThread]);
});
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
The output of this code would be similar to that shown here:
Current thread = <NSThread: 0x4b0e4e0>{name = (null), num = 1}
Main thread = <NSThread: 0x4b0e4e0>{name = (null), num = 1}
Now that you know how to perform UI-related tasks using GCD, it is time we moved to other subjects, such as performing tasks in parallel using concurrent queues (see Performing Non-UI-Related Tasks Synchronously and Performing Non-UI-Related Tasks Asynchronously) and mixing our code with UI-related code if need be.
# Performing Non-UI-Related Tasks Synchronously
There are times when you want to perform tasks that have nothing to do with the UI or interact with the UI as well as doing other tasks that take up a lot of time. For instance, you might want to download an image and display it to the user after it is downloaded. The downloading process has absolutely nothing to do with the UI.
For any task that doesn't involve the UI, you can use global concurrent queues in GCD. These allow either synchronous or asynchronous execution. But synchronous execution does _not_ mean your program waits for the code to finish before continuing. It simply means that the concurrent queue will wait until your task has finished before it continues to the next block of code on the queue. When you put a block object on a concurrent queue, your own program _always_ continues right away without waiting for the queue to execute the code. This is because concurrent queues, as their name implies, run their code on threads other than the main thread. (There is one exception to this: when a task is submitted to a concurrent or a serial queue using the `dispatch_sync` function, iOS will, if possible, run the task on the _current_ thread, which _might_ be the main thread, depending on where the code path is at the moment. This is an optimization that has been programmed on GCD, as we shall soon see.)
If you submit a task to a concurrent queue synchronously, and at the same time submit another synchronous task to _another_ concurrent queue, these two synchronous tasks will run asynchronously in relation to each other because they are running two _different concurrent queues_. It's important to understand this because sometimes, as we'll see, you want to make sure task A finishes before task B starts. To ensure that, submit them synchronously to the _same_ queue.
You can perform synchronous tasks on a dispatch queue using the `dispatch_sync` function. All you have to do is to provide it with the handle of the queue that has to run the task and a block of code to execute on that queue.
Let's look at an example. It prints the integers 1 to 1000 twice, one complete sequence after the other, without blocking the main thread. We can create a block object that does the counting for us and synchronously call the same block object twice:
void (^printFrom1To1000)(void) = ^{
NSUInteger counter = 0;
for (counter = 1;
counter <= 1000;
counter++){
NSLog(@"Counter = %lu - Thread = %@",
(unsigned long)counter,
[NSThread currentThread]);
}
};
Now let's go and invoke this block object using GCD:
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
dispatch_sync(concurrentQueue, printFrom1To1000);
dispatch_sync(concurrentQueue, printFrom1To1000);
If you run this code, you might notice the counting taking place on the main thread, even though you've asked a concurrent queue to execute the task. It turns out this is an optimization by GCD. The `dispatch_sync` function will use the current thread—the thread you're using when you dispatch the task—whenever possible, as a part of an optimization that has been programmed into GCD. Here is what Apple says about it: | As an optimization, this function invokes the block on the current thread when possible.
|
---|---|---
| \--Grand Central Dispatch (GCD) Reference
To execute a C function instead of a block object, synchronously, on a dispatch queue, use the `dispatch_sync_f` function. Let's simply translate the code we've written for the `printFrom1To1000` block object to its equivalent C function, like so:
void printFrom1To1000(void *paramContext){
NSUInteger counter = 0;
for (counter = 1;
counter <= 1000;
counter++){
NSLog(@"Counter = %lu - Thread = %@",
(unsigned long)counter,
[NSThread currentThread]);
}
}
And now we can use the `dispatch_sync_f` function to execute the `printFrom1To1000` function on a concurrent queue, as demonstrated here:
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
dispatch_sync_f(concurrentQueue,
NULL,
printFrom1To1000);
dispatch_sync_f(concurrentQueue,
NULL,
printFrom1To1000);
The first parameter of the `dispatch_get_global_queue` function specifies the priority of the concurrent queue that GCD has to retrieve for the programmer. The higher the priority, the more CPU timeslices will be provided to the code getting executed on that queue. You can use any of these values for the first parameter to the `dispatch_get_global_queue` function:
`DISPATCH_QUEUE_PRIORITY_LOW`
Fewer timeslices will be applied to your task than normal tasks.
`DISPATCH_QUEUE_PRIORITY_DEFAULT`
The default system priority for code execution will be applied to your task.
`DISPATCH_QUEUE_PRIORITY_HIGH`
More timeslices will be applied to your task than normal tasks.
### Note
The second parameter of the `dispatch_get_global_queue` function is reserved and you should always pass the value 0 to it.
In this section you saw how you can dispatch tasks to concurrent queues for synchronous execution. The next section shows asynchronous execution on concurrent queues, while Constructing Your Own Dispatch Queues will show how to execute tasks synchronously and asynchronously on serial queues that you create for your applications.
# Performing Non-UI-Related Tasks Asynchronously
This is where GCD can show its true power: executing blocks of code asynchronously on the main, serial, or concurrent queues. I promise that, by the end of this section, you will be completely convinced GCD is the future of multithread applications, completely replacing threads in modern apps.
In order to execute asynchronous tasks on a dispatch queue, you must use one of these functions:
`dispatch_async`
Submits a block object to a dispatch queue (both specified by parameters) for asynchronous execution.
`dispatch_async_f`
Submits a C function to a dispatch queue, along with a context reference (all three specified by parameters), for asynchronous execution.
Let's have a look at a real example. We'll write an iOS app that is able to download an image from a URL on the Internet. After the download is finished, the app should display the image to the user. Here is the plan and how we will use what we've learned so far about GCD in order to accomplish it:
1. We are going to launch a block object asynchronously on a concurrent queue.
2. Once in this block, we will launch another block object _synchronously_ , using the `dispatch_sync` function, to download the image from a URL. Synchronously downloading a URL from an asynchronous code block holds up just the queue running the synchronous function, not the main thread. The whole operation still is asynchronous when we look at it from the main thread's perspective. All we care about is that we are not blocking the main thread while downloading our image.
3. Right after the image is downloaded, we will synchronously execute a block object on the _main queue_ (see Performing UI-Related Tasks) in order to display the image to the user on the UI.
The skeleton for our plan is as simple as this:
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
dispatch_async(concurrentQueue, ^{
__block UIImage *image = nil;
dispatch_sync(concurrentQueue, ^{
/* Download the image here */
});
dispatch_sync(dispatch_get_main_queue(), ^{
/* Show the image to the user here on the main queue*/
});
});
The second `dispatch_sync` call, which displays the image, will be executed on the queue after the first synchronous call, which downloads our image. That's exactly what we want, because we _have_ to wait for the image to be fully downloaded before we can display it to the user. So after the image is downloaded, we execute the second block object, but this time on the main queue.
Let's download the image and display it to the user now. We will do this in the `viewDidAppear:` instance method of a view controller displayed in an iPhone app:
- (void) viewDidAppear:(BOOL)paramAnimated{
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
dispatch_async(concurrentQueue, ^{
__block UIImage *image = nil;
dispatch_sync(concurrentQueue, ^{
/* Download the image here */
/* iPad's image from Apple's website. Wrap it into two
lines as the URL is too long to fit into one line */
NSString *urlAsString = @"http://images.apple.com/mobileme/features"\
"/images/ipad_findyouripad_20100518.jpg";
NSURL *url = [NSURL URLWithString:urlAsString];
NSURLRequest *urlRequest = [NSURLRequest requestWithURL:url];
NSError *downloadError = nil;
NSData *imageData = [NSURLConnection
sendSynchronousRequest:urlRequest
returningResponse:nil
error:&downloadError];
if (downloadError == nil &&
imageData != nil){
image = [UIImage imageWithData:imageData];
/* We have the image. We can use it now */
}
else if (downloadError != nil){
NSLog(@"Error happened = %@", downloadError);
} else {
NSLog(@"No data could get downloaded from the URL.");
}
});
dispatch_sync(dispatch_get_main_queue(), ^{
/* Show the image to the user here on the main queue*/
if (image != nil){
/* Create the image view here */
UIImageView *imageView = [[UIImageView alloc]
initWithFrame:self.view.bounds];
/* Set the image */
[imageView setImage:image];
/* Make sure the image is not scaled incorrectly */
[imageView setContentMode:UIViewContentModeScaleAspectFit];
/* Add the image to this view controller's view */
[self.view addSubview:imageView];
/* Release the image view */
[imageView release];
} else {
NSLog(@"Image isn't downloaded. Nothing to display.");
}
});
});
}
As you can see in Figure 2-2, we have successfully downloaded our image and also created an image view to display the image to the user on the UI.
Figure 2-2. Downloading and displaying images to users, using GCD
Let's move on to another example. Let's say that we have an array of 10,000 random numbers that have been stored in a file on disk and we want to load this array into memory, sort the numbers in an ascending fashion (with the smallest number appearing first in the list), and then display the list to the user. The control used for the display depends on whether you are coding this for iOS (ideally, you'd use an instance of `UITableView`) or Mac OS X (`NSTableView` would be a good candidate). Since we don't have an array, why don't we create the array first, then load it, and finally display it?
Here are two methods that will help us find the location where we want to save the array of 10,000 random numbers on disk on the device:
- (NSString *) fileLocation{
/* Get the document folder(s) */
NSArray *folders =
NSSearchPathForDirectoriesInDomains(NSDocumentDirectory,
NSUserDomainMask,
YES);
/* Did we find anything? */
if ([folders count] == 0){
return nil;
}
/* Get the first folder */
NSString *documentsFolder = [folders objectAtIndex:0];
/* Append the file name to the end of the documents path */
return [documentsFolder
stringByAppendingPathComponent:@"list.txt"];
}
- (BOOL) hasFileAlreadyBeenCreated{
BOOL result = NO;
NSFileManager *fileManager = [[NSFileManager alloc] init];
if ([fileManager fileExistsAtPath:[self fileLocation]] == YES){
result = YES;
}
[fileManager release];
return result;
}
Now the important part: we want to save an array of 10,000 random numbers to disk _if and only if_ we have not created this array before on disk. If we have, we will load the array from disk immediately. If we have not created this array before on disk, we will first create it and then move on to loading it from disk. At the end, if the array was successfully read from disk, we will sort the array in an ascending fashion and finally display the results to the user on the UI. I will leave displaying the results to the user up to you:
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
/* If we have not already saved an array of 10,000
random numbers to the disk before, generate these numbers now
and then save them to the disk in an array */
dispatch_async(concurrentQueue, ^{
NSUInteger numberOfValuesRequired = 10000;
if ([self hasFileAlreadyBeenCreated] == NO){
dispatch_sync(concurrentQueue, ^{
NSMutableArray *arrayOfRandomNumbers =
[[NSMutableArray alloc] initWithCapacity:numberOfValuesRequired];
NSUInteger counter = 0;
for (counter = 0;
counter < numberOfValuesRequired;
counter++){
unsigned int randomNumber =
arc4random() % ((unsigned int)RAND_MAX + 1);
[arrayOfRandomNumbers addObject:
[NSNumber numberWithUnsignedInt:randomNumber]];
}
/* Now let's write the array to disk */
[arrayOfRandomNumbers writeToFile:[self fileLocation]
atomically:YES];
[arrayOfRandomNumbers release];
});
}
__block NSMutableArray *randomNumbers = nil;
/* Read the numbers from disk and sort them in an
ascending fashion */
dispatch_sync(concurrentQueue, ^{
/* If the file has now been created, we have to read it */
if ([self hasFileAlreadyBeenCreated] == YES){
randomNumbers = [[NSMutableArray alloc]
initWithContentsOfFile:[self fileLocation]];
/* Now sort the numbers */
[randomNumbers sortUsingComparator:
^NSComparisonResult(id obj1, id obj2) {
NSNumber *number1 = (NSNumber *)obj1;
NSNumber *number2 = (NSNumber *)obj2;
return [number1 compare:number2];
}];
}
});
dispatch_async(dispatch_get_main_queue(), ^{
if ([randomNumbers count] > 0){
/* Refresh the UI here using the numbers in the
randomNumbers array */
}
[randomNumbers release];
});
});
There is a lot more to GCD than synchronous and asynchronous block or function execution. In Running a Group of Tasks Together you will learn how to group block objects together and prepare them for execution on a dispatch queue. I also suggest that you have a look at Performing Tasks After a Delay and Performing a Task at Most Once to learn about other functionalities that GCD is capable of providing to programmers.
# Performing Tasks After a Delay
With Core Foundation, you can invoke a selector in an object after a given period of time, using the `performSelector:withObject:afterDelay:` method of the `NSObject` class. Here is an example:
- (void) printString:(NSString *)paramString{
NSLog(@"%@", paramString);
}
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
@selector(performSelector:withObject:afterDelay:)
[self performSelector:@selector(printString:)
withObject:@"Grand Central Dispatch"
afterDelay:3.0];
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
In this example we are asking the runtime to call the `printString:` method after 3 seconds of delay. We can do the same thing in GCD using the `dispatch_after` and `dispatch_after_f` functions, each of which is described here:
`dispatch_after`
Dispatches a block object to a dispatch queue after a given period of time, specified in nanoseconds. These are the parameters that this function requires:
Delay in nanoseconds
The number of nanoseconds GCD has to wait on a given dispatch queue (specified by the second parameter) before it executes the given block object (specified by the third parameter).
Dispatch queue
The dispatch queue on which the block object (specified by the third parameter) has to be executed after the given delay (specified by the first parameter).
Block object
The block object to be invoked after the specified number of nanoseconds on the given dispatch queue. This block object should have no return value and should accept no parameters (see Constructing Block Objects and Their Syntax).
`dispatch_after_f`
Dispatches a C function to GCD for execution after a given period of time, specified in nanoseconds. This function accepts four parameters:
Delay in nanoseconds
The number of nanoseconds GCD has to wait on a given dispatch queue (specified by the second parameter) before it executes the given function (specified by the fourth parameter).
Dispatch queue
The dispatch queue on which the C function (specified by the fourth parameter) has to be executed after the given delay (specified by the first parameter).
Context
The memory address of a value in the heap to be passed to the C function (for an example, see Performing UI-Related Tasks).
C function
The address of the C function that has to be executed after a certain period of time (specified by the first parameter) on the given dispatch queue (specified by the second parameter).
### Note
Although the delays are in nanoseconds, it is up to iOS to decide the granularity of dispatch delay, and this delay might not be as precise as what you hope when you specify a value in nanoseconds.
Let's have a look at an example for `dispatch_after` first:
double delayInSeconds = 2.0;
dispatch_time_t delayInNanoSeconds =
dispatch_time(DISPATCH_TIME_NOW, delayInSeconds * NSEC_PER_SEC);
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
dispatch_after(delayInNanoSeconds, concurrentQueue, ^(void){
/* Perform your operations here */
});
As you can see, the nanoseconds delay parameter for both the `dispatch_after` and `dispatch_after_f` functions has to be of type `dispatch_time_t`, which is an abstract representation of absolute time. To get the value for this parameter, you can use the `dispatch_time` function as demonstrated in this sample code. Here are the parameters that you can pass to the `dispatch_time` function:
Base time
If this value was denoted with _B_ and the delta parameter was denoted with _D_ , the resulting time from this function would be equal to _B_ + _D_. You can set this parameter's value to `DISPATCH_TIME_NOW` to denote _now_ as the base time and then specify the delta from now using the delta parameter.
Delta to add to base time
This parameter is the nanoseconds that will get added to the base time parameter to create the result of this function.
For example, to denote a time 3 seconds from now, you could write your code like so:
dispatch_time_t delay =
dispatch_time(DISPATCH_TIME_NOW, 3.0f * NSEC_PER_SEC);
Or to denote half a second from now:
dispatch_time_t delay =
dispatch_time(DISPATCH_TIME_NOW, (1.0 / 2.0f) * NSEC_PER_SEC);
Now let's have a look at how we can use the `dispatch_after_f` function:
void processSomething(void *paramContext){
/* Do your processing here */
NSLog(@"Processing...");
}
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
double delayInSeconds = 2.0;
dispatch_time_t delayInNanoSeconds =
dispatch_time(DISPATCH_TIME_NOW, delayInSeconds * NSEC_PER_SEC);
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
dispatch_after_f(delayInNanoSeconds,
concurrentQueue,
NULL,
processSomething);
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
# Performing a Task at Most Once
Allocating and initializing a singleton is one of the tasks that has to happen exactly once during the lifetime of an app. I am sure you know of other scenarios where you had to make sure a piece of code was executed only once during the lifetime of your application.
GCD lets you specify an identifier for a piece of code when you attempt to execute it. If GCD detects that this identifier has been passed to the framework before, it won't execute that block of code again. The function that allows you to do this is `dispatch_once`, which accepts two parameters:
Token
A token of type `dispatch_once_t` that holds the token generated by GCD when the block of code is executed for the first time. If you want a piece of code to be executed at most once, you must specify the same token to this method whenever it is invoked in the app. We will see an example of this soon.
Block object
The block object to get executed at most once. This block object returns no values and accepts no parameters.
### Note
`dispatch_once` always executes its task on the current queue being used by the code that issues the call, be it a serial queue, a concurrent queue, or the main queue.
Here is an example:
static dispatch_once_t onceToken;
void (^executedOnlyOnce)(void) = ^{
static NSUInteger numberOfEntries = 0;
numberOfEntries++;
NSLog(@"Executed %lu time(s)", (unsigned long)numberOfEntries);
};
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
dispatch_queue_t concurrentQueue =
dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0);
dispatch_once(&onceToken, ^{
dispatch_async(concurrentQueue,
executedOnlyOnce);
});
dispatch_once(&onceToken, ^{
dispatch_async(concurrentQueue,
executedOnlyOnce);
});
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
As you can see, although we are attempting to invoke the `executedOnlyOnce` block object twice, using the `dispatch_once` function, in reality GCD is only executing this block object once, since the identifier passed to the `dispatch_once` function is the same both times.
Apple, in its Cocoa Fundamentals Guide, shows programmers how to create a singleton. However, we can change this model to make use of GCD and the `dispatch_once` function in order to initialize a shared instance of an object, like so:
#import "MySingleton.h"
@implementation MySingleton
static MySingleton *sharedMySingleton = NULL;
+ (MySingleton *) sharedInstance{
static dispatch_once_t onceToken;
dispatch_once(&onceToken, ^{
if (sharedMySingleton == NULL){
sharedMySingleton = [[super allocWithZone:NULL] init];
}
});
return sharedMySingleton;
}
+ (id) allocWithZone:(NSZone *)paramZone{
return [[self sharedInstance] retain];
}
- (id) copyWithZone:(NSZone *)paramZone{
return self;
}
- (void) release{
/* Do nothing */
}
- (id) autorelease{
return self;
}
- (NSUInteger) retainCount{
return NSUIntegerMax;
}
- (id) retain{
return self;
}
@end
# Running a Group of Tasks Together
GCD lets us create _groups_ , which allow you to place your tasks in one place, run all of them, and get a notification at the end from GCD. This has many valuable applications. For instance, suppose you have a UI-based app and want to reload the components on your UI. You have a table view, a scroll view, and an image view. You want to reload the contents of these components using these methods:
- (void) reloadTableView{
/* Reload the table view here */
NSLog(@"%s", __FUNCTION__);
}
- (void) reloadScrollView{
/* Do the work here */
NSLog(@"%s", __FUNCTION__);
}
- (void) reloadImageView{
/* Reload the image view here */
NSLog(@"%s", __FUNCTION__);
}
At the moment, these methods are empty, but later you can put the relevant UI code in them. Now we want to call these three methods, one after the other, and we want to know when GCD has finished calling these methods so that we can display a message to the user. For this, we should be using a group. You should know about four functions when working with groups in GCD:
`dispatch_group_create`
Creates a group handle. Once you are done with this group handle, you should dispose of it using the `dispatch_release` function.
`dispatch_group_async`
Submits a block of code for execution on a group. You must specify the dispatch queue on which the block of code has to be executed _as well as_ the group to which this block of code belongs.
`dispatch_group_notify`
Allows you to submit a block object that should be executed once all tasks added to the group for execution have finished their work. This function also allows you to specify the dispatch queue on which that block object has to be executed.
`dispatch_release`
Use this function to dispose of any dispatch groups that you create using the `dispatch_group_create` function.
Let's have a look at an example. As explained, in our example we want to invoke the `reloadTableView`, `reloadScrollView`, and `reloadImageView` methods one after the other and then display a message to the user once we are done. We can utilize GCD's powerful grouping facilities in order to accomplish this:
dispatch_group_t taskGroup = dispatch_group_create();
dispatch_queue_t mainQueue = dispatch_get_main_queue();
/* Reload the table view on the main queue */
dispatch_group_async(taskGroup, mainQueue, ^{
[self reloadTableView];
});
/* Reload the scroll view on the main queue */
dispatch_group_async(taskGroup, mainQueue, ^{
[self reloadScrollView];
});
/* Reload the image view on the main queue */
dispatch_group_async(taskGroup, mainQueue, ^{
[self reloadImageView];
});
/* At the end when we are done, dispatch the following block */
dispatch_group_notify(taskGroup, mainQueue, ^{
/* Do some processing here */
[[[[UIAlertView alloc] initWithTitle:@"Finished"
message:@"All tasks are finished"
delegate:nil
cancelButtonTitle:@"OK"
otherButtonTitles:nil, nil] autorelease] show];
});
/* We are done with the group */
dispatch_release(taskGroup);
In addition to `dispatch_group_async`, you can also dispatch asynchronous C functions to a dispatch group using the `dispatch_group_async_f` function.
### Note
`GCDAppDelegate` is simply the name of the class from which this example is taken. We have to use this class name in order to typecast a context object so that the compiler will understand our commands.
Like so:
- (void) reloadTableView{
/* Reload the table view here */
NSLog(@"%s", __FUNCTION__);
}
- (void) reloadScrollView{
/* Do the work here */
NSLog(@"%s", __FUNCTION__);
}
- (void) reloadImageView{
/* Reload the image view here */
NSLog(@"%s", __FUNCTION__);
}
void reloadAllComponents(void *context){
GCDAppDelegate *self = (GCDAppDelegate *)context;
[self reloadTableView];
[self reloadScrollView];
[self reloadImageView];
}
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
dispatch_group_t taskGroup = dispatch_group_create();
dispatch_queue_t mainQueue = dispatch_get_main_queue();
dispatch_group_async_f(taskGroup,
mainQueue,
(void *)self,
reloadAllComponents);
/* At the end when we are done, dispatch the following block */
dispatch_group_notify(taskGroup, mainQueue, ^{
/* Do some processing here */
[[[[UIAlertView alloc] initWithTitle:@"Finished"
message:@"All tasks are finished"
delegate:nil
cancelButtonTitle:@"OK"
otherButtonTitles:nil, nil] autorelease] show];
});
/* We are done with the group */
dispatch_release(taskGroup);
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
### Note
Since the `dispatch_group_async_f` function accepts a C function as the block of code to be executed, the C function must have a reference to `self` to be able to invoke instance methods of the current object in which the C function is implemented. That is the reason behind passing `self` as the context pointer in the `dispatch_group_async_f` function. For more information about contexts and C functions, please refer to Performing UI-Related Tasks.
Once all the given tasks are finished, the user will see a result similar to that shown in Figure 2-3.
Figure 2-3. Managing a group of tasks with GCD
# Constructing Your Own Dispatch Queues
With GCD, you can create your own serial dispatch queues (see Different Types of Dispatch Queues for serial queues). Serial dispatch queues run their tasks in a first-in-first-out (FIFO) fashion. The asynchronous tasks on serial queues will _not_ be performed on the main thread, however, making serial queues highly desirable for concurrent FIFO tasks.
All synchronous tasks submitted to a serial queue will be executed on the current thread being used by the code that is submitting the task, whenever possible. But asynchronous tasks submitted to a serial queue will always be executed on a thread other than the main thread.
We'll use the `dispatch_queue_create` function to create serial queues. The first parameter in this function is a C string (`char *`) that will uniquely identify that serial queue in the _system_. The reason I am emphasizing _system_ is because this identifier is a system-wide identifier, meaning that if your app creates a new serial queue with the identifier of _`serialQueue1`_ and somebody else's app does the same, the results of creating a new serial queue with the same name are undefined by GCD. Because of this, Apple strongly recommends that you use a reverse DNS format for identifiers. Reverse DNS identifiers are usually constructed in this way: com. _`COMPANY`_. _`PRODUCT`_. _`IDENTIFIER`_. For instance, I could create two serial queues and assign these names to them:
com.pixolity.GCD.serialQueue1
com.pixolity.GCD.serialQueue2
After you've created your serial queue, you can start dispatching tasks to it using the various GCD functions you've learned in this book. Once you are done with the serial dispatch queue that you've just created, you _must_ dispose of it using the `dispatch_release` function.
Would you like to see an example? I thought so!
dispatch_queue_t firstSerialQueue =
dispatch_queue_create("com.pixolity.GCD.serialQueue1", 0);
dispatch_async(firstSerialQueue, ^{
NSUInteger counter = 0;
for (counter = 0;
counter < 5;
counter++){
NSLog(@"First iteration, counter = %lu", (unsigned long)counter);
}
});
dispatch_async(firstSerialQueue, ^{
NSUInteger counter = 0;
for (counter = 0;
counter < 5;
counter++){
NSLog(@"Second iteration, counter = %lu", (unsigned long)counter);
}
});
dispatch_async(firstSerialQueue, ^{
NSUInteger counter = 0;
for (counter = 0;
counter < 5;
counter++){
NSLog(@"Third iteration, counter = %lu", (unsigned long)counter);
}
});
dispatch_release(firstSerialQueue);
If you run this code and have a look at the output printed to the console window, you will see results similar to these:
First iteration, counter = 0
First iteration, counter = 1
First iteration, counter = 2
First iteration, counter = 3
First iteration, counter = 4
Second iteration, counter = 0
Second iteration, counter = 1
Second iteration, counter = 2
Second iteration, counter = 3
Second iteration, counter = 4
Third iteration, counter = 0
Third iteration, counter = 1
Third iteration, counter = 2
Third iteration, counter = 3
Third iteration, counter = 4
It's obvious that although we dispatched our block objects asynchronously to the serial queue, the queue has executed their code in a FIFO fashion. We can modify the same sample code to make use of `dispatch_async_f` function instead of the `dispatch_async` function, like so:
void firstIteration(void *paramContext){
NSUInteger counter = 0;
for (counter = 0;
counter < 5;
counter++){
NSLog(@"First iteration, counter = %lu", (unsigned long)counter);
}
}
void secondIteration(void *paramContext){
NSUInteger counter = 0;
for (counter = 0;
counter < 5;
counter++){
NSLog(@"Second iteration, counter = %lu", (unsigned long)counter);
}
}
void thirdIteration(void *paramContext){
NSUInteger counter = 0;
for (counter = 0;
counter < 5;
counter++){
NSLog(@"Third iteration, counter = %lu", (unsigned long)counter);
}
}
- (BOOL) application:(UIApplication *)application
didFinishLaunchingWithOptions:(NSDictionary *)launchOptions{
dispatch_queue_t firstSerialQueue =
dispatch_queue_create("com.pixolity.GCD.serialQueue1", 0);
dispatch_async_f(firstSerialQueue, NULL, firstIteration);
dispatch_async_f(firstSerialQueue, NULL, secondIteration);
dispatch_async_f(firstSerialQueue, NULL, thirdIteration);
dispatch_release(firstSerialQueue);
// Override point for customization after application launch.
[self.window makeKeyAndVisible];
return YES;
}
# About the Author
Vandad Nahavandipoor has developed software using Cocoa, Cocoa Touch,Assembly, Delphi, and .NET for many years. As a staff member of acompany that is a global leader in mobile money solutions in London,he has worked with some of the world's biggest brands--such as Visaand US Bank---to deliver mobile applications to their customers.Vandad brings an interest in management, leadership andentrepreneurship to his work, believing in the synergy that isachieved as a result of cooperation and working together in a team.
|
{
"pile_set_name": "Books3"
}
|
using System.Collections.Generic;
using PlatoCore.Abstractions.Routing;
namespace Plato.Tenants.SignUp
{
public class HomeRoutes : IHomeRouteProvider
{
public IEnumerable<HomeRoute> GetRoutes()
{
return new[]
{
new HomeRoute("Plato.Tenants.SignUp", "Home", "Index"),
};
}
}
}
|
{
"pile_set_name": "Github"
}
|
Pages
January 3, 2012
New Renault Koleos Bose Edition
Available in some 20 countries worldwide, the initial Bose® Edition limited edition version of the model accounted for almost 30 percent of Phase 1 Koleos' sales across Europe in 2011. This popularity did not only concern Koleos, however, since Mégane and Laguna have both also benefited from the innovative partnership Renault enjoys with Bose®.
To build on this success, this limited edition has been carried over to New Renault Koleos and is poised to appear in Renault's French showrooms next March. Its return is seen as an opportunity to pursue the positive dynamic which followed the launch of New Koleos in September.
New Renault Koleos Bose® Edition is positioned as an attractive core-range version, which combines the refined listening pleasure delivered by Bose® Premium sound, with modern, distinctive styling. Based on the Carminat equipment level, it is powered by the reliable and highly efficient 2.0 dCi 150 engine which can be mated to one of three types of transmission: six-speed manual/front-wheel drive, six-speed manual/4x4 or six-speed automatic/4x4.
Koleos Bose® Edition's appeal has been further enhanced thanks to the incorporation of a number of specific styling details, including:
|
{
"pile_set_name": "Pile-CC"
}
|
C1-inhibitor concentrate for individual replacement therapy in patients with severe hereditary angioedema refractory to danazol prophylaxis.
Hereditary angioedema (HAE) caused by functional deficiency of C1-inhibitor (C1-INH) is a rare disease that manifests with recurrent spontaneous nonallergic edema of the subcutaneous tissues and mucous membranes. In cases of laryngeal edema that are not treated immediately, HAE is associated with high mortality rates. Attenuated androgens (e.g., danazol) are usually administered for prophylaxis, but associated side effects may limit their use. This study investigated the efficacy, safety, and quality of life (QoL) associated with a pasteurized plasma-derived C1-inhibitor (pC1-INH) concentrate for individual replacement therapy (IRT) in patients with severe HAE suffering from frequent attacks who were intolerant or not responding to danazol. Twenty-two patients with severe HAE and danazol incompatibility or insufficient efficacy of danazol were recruited. Intraindividual comparisons of efficacy, safety, and QoL with pC1-INH concentrate IRT versus danazol treatment were made using retrospective and prospective patient data. Pharmacokinetic data were collected for 15 of the 22 patients. In patients receiving pC1-INH regularly, the median number of attacks per year decreased significantly compared to danazol prophylaxis (p < 0.001), and the 24 laryngeal edema episodes per year ceased. Superior efficacy of pC1-INH was found for all QoL variables (e.g., general condition, social activities). No transmission of human immunodeficiency virus or hepatitis A, B, or C was observed. In patients with severe HAE who experience severe side effects and/or lack of efficacy of danazol prophylaxis, very early substitution with pC1-INH can completely abolish the incidence of potentially fatal laryngeal edema and can reduce the incidence of acute attacks.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Seasonal abundance, number of annual generations, and effect of an entomopathogenic fungus on Phlebotomus papatasi (Diptera: Psychodidae).
The monthly density of the sand fly, Phlebotomus Papatasi Scopoli (Diptera: Psychodidae), was monitored during 2009 at Burg El-Arab, a rural district located close to the Mediterranean coast of Egypt. The number of annual generations and the efficacy of microbial control by the entomopathogenic fungus, Metrahizium anisopliae (Metsch.) Sorok (Ma79), were determined in the laboratory under atmospheric conditions, simulating those of the animal shelters in the study area. We used two collecting techniques; CDC light traps and oiled paper traps, to quantify sand fly density inside houses and in the open field. Adult flies exhibited a seasonal range from April to December. The seasonal pattern was bimodal, with one peak in July and the second one in October. Calculations of the correlation coefficient (r) revealed a significant role of temperature and relative humidity in the monthly abundance of the sand flies in the study area. P. papatasi colony completed seven annual generations under semifield conditions, but the mean developmental time of each immature stage and the mean total duration of development from egg to adult for each generation varied according to the prevailing temperature. The longest generation time was observed in winter (the mean ± SD was 118 ± 11.70 d), and the shortest one occurred at the highest temperatures in summer (the mean ± SD was 25.21 ± 2.04 d). In microbial control studies, the entomopathogenic fungus, M. anisopliae, was used at 15 × 10(8) spores/g food as a standard dose against the second-instar larvae of P. papatasi at the different seasons during 2009. Mortality reached 100% in winter and decreased to 56.0% as the prevailing temperature increased during the summer season.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Jeff Ruby Culinary Entertainment
Opticare Vision
Wednesday, January 4, 2017
Fort Thomas Visioning Presented To Council
Joey Hood and Chris Manning discuss the results from the first three stakeholder visioning meetings that will lead to a comprehensive plan for the city of Fort Thomas. FTM file.
It's been over a year since Mayor Eric Haas led a whiteboard session in the Centennial Room on the third floor at The City Building. That session led to ideas like a skate park, zip line, roundabouts and a city-wide yard sale in Fort Thomas.
When the discussion started lending itself to broader topics, like "making more use of The Mess Hall" and "Midway District accessibility," Haas knew he needed a different approach.
"We thought we had some really good ideas and knew we needed to expand on them," he said. "We have real talent in this city to tap into so that's what we did."
Haas and council authorized the city to contract Fort Thomas residents, Chris Manning of Human Nature, Inc and Tom Fernandez of SHP Leading Design to help lead that new visioning process that will ultimately lead to a new comprehensive plan for the city of Fort Thomas.
"It doesn't have anything to do with spending or saving money," said Haas. "It doesn’t have anything to do with money, it’s about progress. We have moved passed whether or not we should stand pat or progress. I think we are all on board that we need to continue to move the city forward.”
FTM file.
Manning led three visioning meetings, two in October and one in November, with three separate city groups: city council, city staff and invited city stakeholders.
"The intent of that work was to create a foundation for building the next comprehensive plan update, park and recreation plan and the city's first comprehensive pedestrian and bicycle plan," said Manning. "We didn’t dive into too much detail in these meetings on purpose. Each one of these topics will take on a life of their own. So this is a framework."
The groups first looked at the population growth of Fort Thomas, originally named the District of the Highlands, and first incorporated on February 27 1867.
There are four distinct chapters in the city's history, which are defined by clear changes in character of the city, population and density of the community. From 1870 to the early 1970s's population growth remained steady as there was room to grow. Since the 1970's the population of Fort Thomas has remained stable with approximately 16,000 residents.
"We had some healthy discussion on whether or not that (population) number should be pushed up or not," said Manning. "It was decidedly evident that 16,500 was a comfortable number. But this exercise allowed us to study those moments in time and will help guide us when building a robust vision for the future."
In terms of density, greenspace was a buzzword heard often through the stakeholders meetings. According to the last General Services Annual Report, new construction for residential units are at a 10-year high when 34 new homes, mostly in the Villagrande subdivision, were constructed.
That said, greenspace was a commodity that stakeholders saw as something that should be preserved.
Asset mapping was a tool used during the three meetings to identify the community assets and identify ways of connecting the assets to find areas of future opportunities.
Manning said to help facilitate the dialogue, a series of base maps were created to highlight what the city's greatest assets were by utilizing a live mapping feature.
For example, on the south end of town near the Midway Business District, there are many assets that don't necessarily connect or synergize with one another: the reservoir, VA Hospital, Tower Park and Midway Businesses are all in the same area, but don't have an easy way to connect.
Lose weight. Win money at Orangetheory Fitness at Newport Pavilion. Mention this ad. This is an advertisement.
"That's what we spent most of the time doing, was asset mapping. What are the significant opportunity areas for our future? That's what we tried to summarize," he said. "I was inspired by leadership that came from city staff in terms of wanting the city building to be an example of governance and services."
Manning mentioned three over-arching takeaways:
1) To continue the momentum and quest for continual self-improvement
2) Strengthen the city's assets and connectivity
3) Stay true to who we are.
Manning said a lot of the stakeholder input involved around connectivity and so much dialogue that involved pedestrian and bicycle connectivity that he advised the city to create its first Comprehensive Pedestrian and Bicycle Plan.
"There was so much energy toward linking these assets and it became clear there was a large focus on a more robust trail network. It was such a strong voice that if it gets folded into a comprehensive plan it sort of gets lost."Trails and a stronger pedestrian network were common themes at each of the stakeholders meetings. The direct impact it has on the safety and health of our community it became clear that it was time to develop the city's first comprehensive pedestrian and bicycle plan."
Manning said the plan would focus on community engagement after assessing current conditions and needs before implementing of bicycles and pedestrian elements in the statewide transportation plans.
"Collaboration with our neighbors becomes very important. Riverfront Commons in Dayton or working with the hospital and city of Newport, Southgate, or Highland Heights and at our edges. You start talking about transportation, then you start talking about having partnerships with Kentucky Transportation Cabinet or OKI."
A road diet to take away a lane of Grand Avenue was also discussed and had favorable feedback.More input regarding connectivity:
- Trail connection to the Ohio River through city parcels and Duke Energy easements near Dayton
- Trail connection through Highland Park for students and residents
- Connecting Highlands High and Middle School to Ohio River through the hillside greenbelt
- Creating a new park entry to Highland Park behind the Fort Thomas Swim Club
- Creating a pedestrian connection behind the Central Business District
- Connecting Tower Park to the Ohio River
- Connecting the Midway District to the Ohio River
- Connecting the Midway District to neighborhood pockets
- Connecting the potential Alexandria Pike District with the Ohio River
The next step will be to get more input to start to hone in on some of these over-arching themes with more stakeholders.
|
{
"pile_set_name": "Pile-CC"
}
|
"To the extent that there's additional uncertainty with regard to the company's future, it will only create more challenges," says Cantor Fitzgerald analyst Derek Brown, whose firm makes a market in both Yahoo! and its rival Google ( GOOG).
Yahoo!'s shares have so far benefited from Microsoft's proposal. The stock has jumped as much as 53% since last Friday, when Microsoft publicly revealed its desire to merge the two companies, despite having been privately rebuffed by Yahoo! since 2006. Meanwhile, Microsoft's shares have dipped 7%.
Nonetheless, Yahoo!'s 14,000 employees, who might have been hoping for some much-needed direction, may not be getting it anytime soon. It could take months at best for the company to emerge with some sort of a resolution, and maybe even longer if the deal reaches the hands of the Federal Trade Commission or the U.S. Justice Department for review.
Such lengthy delays could put any one of Yahoo!'s current initiatives in limbo. Darren Chervitz, director of research at the Jacob Internet Fund, which has a position in Yahoo!, notes in particular the company's recent acquisition of Zimbra, which provides open source, next-generation email.
"If you're a Zimbra employee, you might be itching to jump," Chervitz says. "Anything that's new will be more vulnerable."
Yahoo! declined to comment beyond its original statement from Friday in which it said its board of directors will carefully and promptly evaluate Microsoft's proposal. John Robb, a spokesman for Zimbra, said the company's team "remains focused on our customers and delivering new production innovation."
He further noted that Zimbra has moved ahead with the 5.0 version of its product, released on Tuesday, as well as its latest version of Zimbra Desktop.
Even Yang has realized the need for him to keep up his troops' spirits. In a memo to his employees, written in informal lowercase letters, he acknowledged the disruption caused by the Microsoft proposal but urged everyone to stay on track.
"We can't let any of the noise we're hearing around this situation distract us from our core mission," he wrote. "It's critical that we continue to focus on running the business, executing our strategy and delivering value to all of our users, advertisers and publishers."
Easier said than done. Even if Microsoft never swooped in, Yahoo! would have had a difficult time retaining employees already pessimistic about the company's future.
"In the time that Yang's been CEO, we have not been particularly impressed with the plan he's laid out so far or the efforts that have seemed apparent to the Street," Brown says.
For all those who wondered whether they should rough it out with Yahoo! even before Microsoft's proposal, they may have a harder time convincing themselves to stay now, Chervitz says.
"These are in-demand computer engineers and marketing people in still pretty strong markets," Chervitz says.
For Microsoft, that could mean losing some of the very people it hopes to bring on board if the merger goes through. And for Google, whose search engine already has a sizable lead over Microsoft and Yahoo! combined, that could mean widening the gap as Yahoo! tries to sort out its future.
Still, Chervitz says Google's market is shrinking, so any increase in market share may end up being negligible. And given the current state of the economy, Yahoo!'s employees might not be so eager to put themselves back on the job market.
He imagines that turnover at the company may pick up 1% or 2% tops.
"I have a tough time believing it'll be a huge brain drain," Chervitz says. "But even a small level is not great."
|
{
"pile_set_name": "Pile-CC"
}
|
Pages
Tuesday, August 18, 2015
Video: Torn Gradient
In today’s video, I'll show you how to create a cool, color-blocked look with some ink pads, torn paper and my Wild at Heart set. (Back in stock! Shop now if you want it, sold out again in one day when we posted the last video) This technique is fast and easy and a new twist on the concepts of gradient and paper piecing in just one project. Save the remaining torn pieces for layering onto another card!
So many gorgeous color combos for this technique, so try autumnal hues for upcoming fall projects. You can also use contrasting colors rather than different shades of one color (like the red to pink shown here.) Mixing it up will be very striking and unexpected! And, check out the super minimal supply list below!
2 comments:
Love this card, Mel! I copied it and and gave it to a friend yesterday. She was blown away. This has been an extra busy year for me not much time to play. It's funny how the mojo goes south when you don't stay in practice. It seems like all the cards I've made this year are copies of your cards. Hope you don't mind :)I sure appreciate your sharing!
See more of my cards here
Copyright Notice
All Content including, designs, concepts, text, and photographs are COPYRIGHT2018 Melanie Muenchinger. Original artworks are shared for your personal enjoyment only and may not be used for publications (print or online), galleries or contests. Thanks so much for your support!
Follow by Email
Illustrator
About Me
I am a stamp illustrator, author and Senior Design Team Member for Gina K Designs and a WAHM of two terrific boys. I've been stamping and creating cards and other papercrafts for 14 years, and was one of the Splitcoast Original Dirty Dozen Team (melmel). My first book of stamping tutorials came out in January 2012 and the second in May 2013. God has blessed me beyond measure with opportunities to use my gifts and a loving husband who supports my work and art. I pray you find inspiration in the creations and stories I post here!
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Helpful linux command for do some forensic on compromised linux web server
What are helpful linux command for do some forensic on compromised linux web server for giving out sort of information/evidence/backtrace? for example checking log, checking last file edit, suspicious open port, and others usefull automatic command for forensic?
A:
dd. Take an image of your compromised machine, then wipe it and start over. You cannot trust anything your host is telling you any more.
Once you have said disk image though, the question is very much 'what do you want to accomplish'? If it's evidence/legal, then you're going to have to be incredibly careful, and probably want to consult with a legal professional before you even start.
If it's just to figure out what's happened to compromise it, then I'd start with:
find (look for 'odd' permissions, especially setuid).
look through binaries in common locations (e.g. search path). md5sum and verify the signature against the source.
log files - look for 'odd' entries in logs, and especially things like process crashes. Segmentation Faults are a big alarm bell for a buffer overflow exploit.
But at the end of the day, a really good compromise of a system is really hard to exhaustively backtrace. Logs will have been 'tidied up', timestamps corrected. The only reliable sources are off host monitoring, such as a remote syslog server, a firewall or an intrusion detection system... but these are things that if you don't have in advance, you're too late.
|
{
"pile_set_name": "StackExchange"
}
|
Police say a man has been charged with sexually assaulting a woman he met inside a night club in Oak Lawn.[[365597711,R]]
Investigators said 31-year-old Prince Karim met the woman inside the Station 4 nightclub at 3811 Cedar Springs at about 2 a.m. Sunday.
According to police, Karim sexually assaulted the woman and was arrested later that morning.
Karim was held in the Dallas County Jail and charged with sexual assault, which is a second degree felony, police said.
His bond was set at $25,000.
|
{
"pile_set_name": "OpenWebText2"
}
|
<!-- Creator : groff version 1.18.1 -->
<html>
<head>
<meta name="generator" content="groff -Thtml, see www.gnu.org">
<meta name="Content-Style" content="text/css">
<title>AUTOPOINT</title>
</head>
<body>
<h1 align=center>AUTOPOINT</h1>
<a href="#NAME">NAME</a><br>
<a href="#SYNOPSIS">SYNOPSIS</a><br>
<a href="#DESCRIPTION">DESCRIPTION</a><br>
<a href="#OPTIONS">OPTIONS</a><br>
<a href="#AUTHOR">AUTHOR</a><br>
<a href="#REPORTING BUGS">REPORTING BUGS</a><br>
<a href="#SEE ALSO">SEE ALSO</a><br>
<hr>
<a name="NAME"></a>
<h2>NAME</h2>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p>autopoint − copies standard gettext
infrastructure</p>
</td>
</table>
<a name="SYNOPSIS"></a>
<h2>SYNOPSIS</h2>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p><b>autopoint</b> [<i>OPTION</i>]...</p>
</td>
</table>
<a name="DESCRIPTION"></a>
<h2>DESCRIPTION</h2>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p>Copies standard gettext infrastructure files into a
source package.</p>
</td>
</table>
<a name="OPTIONS"></a>
<h2>OPTIONS</h2>
<!-- TABS -->
<table width="100%" border=0 rules="none" frame="void"
cols="5" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="11%"></td>
<td width="8%">
<p><b>−−help</b></p>
</td>
<td width="13%"></td>
<td width="35%">
<p>print this help and exit</p>
</td>
<td width="30%">
</td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p><b>−−version</b></p></td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="21%"></td>
<td width="77%">
<p>print version information and exit</p>
</td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p><b>−f</b>, <b>−−force</b></p></td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="21%"></td>
<td width="77%">
<p>force overwriting of files that already exist</p>
</td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p><b>−n</b>,
<b>−−dry−run</b></p></td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="21%"></td>
<td width="77%">
<p>print modifications but don’t perform them</p>
</td>
</table>
<a name="AUTHOR"></a>
<h2>AUTHOR</h2>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p>Written by Bruno Haible</p>
</td>
</table>
<a name="REPORTING BUGS"></a>
<h2>REPORTING BUGS</h2>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p>Report bugs to <bug-gnu-gettext@gnu.org>.</p>
<!-- INDENTATION -->
<p>Uses a versions archive in git format. Copyright (C)
2002-2010 Free Software Foundation, Inc. License GPLv3+: GNU
GPL version 3 or later
<http://gnu.org/licenses/gpl.html> This is free
software: you are free to change and redistribute it. There
is NO WARRANTY, to the extent permitted by law.</p>
</td>
</table>
<a name="SEE ALSO"></a>
<h2>SEE ALSO</h2>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p>The full documentation for <b>autopoint</b> is maintained
as a Texinfo manual. If the <b>info</b> and <b>autopoint</b>
programs are properly installed at your site, the
command</p>
</td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="20%"></td>
<td width="79%">
<p><b>info autopoint</b></p>
</td>
</table>
<!-- INDENTATION -->
<table width="100%" border=0 rules="none" frame="void"
cols="2" cellspacing="0" cellpadding="0">
<tr valign="top" align="left">
<td width="10%"></td>
<td width="89%">
<p>should give you access to the complete manual.</p>
</td>
</table>
<hr>
</body>
</html>
|
{
"pile_set_name": "Github"
}
|
Getty Images
Being a hard-core NFL fan is getting more expensive.
DirecTV is raising prices on its NFL Sunday Ticket package, which is the only way to watch every NFL game. The retail price will reach an all-time high of $293.94 in 2018, with the package that includes Red Zone Channel increasing to $395.95.
Many subscribers don’t pay full price, as DirecTV often offers discounts to entice new subscribers, or to convince current subscribers to renew. But the base price of the package is higher than ever.
And that may point to the future of the NFL on television: For many years, the NFL has thrived by reaching as broad an audience as possible. But with audiences shrinking the last two years and advertising revenue down last year, the league may seek to make more money off fans who are paying more money to see games. That includes fans who buy the Sunday Ticket package and fans who pay for the cable Red Zone Channel.
Although there were scattered reports of people canceling Sunday Ticket last year to protest players protesting during the national anthem, DirecTV can likely continue to raise Sunday Ticket prices for some time and lose few subscribers. It remains a popular package, one that millions of fans think is well worth a few hundred dollars a year.
|
{
"pile_set_name": "OpenWebText2"
}
|
Oklahoma sheriff hit with more serious charge in inmate's death
ENID — Garfield County Sheriff Jerry Niles was charged again Wednesday in a jail inmate's death, this time with first-degree manslaughter.
Anthony Huff died in 2016 after he was unlawfully confined to a restraint chair "without food, water, oversight and monitoring" in excess of 55 hours, a prosecutor alleged.
Huff, 58, of Enid, had been jailed for public intoxication and was restrained after he began hallucinating.
Niles, 60, was first elected sheriff in 2012.
|
{
"pile_set_name": "OpenWebText2"
}
|
Although antiestrogens are known to be effective against many metastatic breast cancers and are presently undergoing extensive clinical trials, little is known of their mechanism of action beyond the fact that they mimic estradiol in binding cytoplasmic estrogen receptor and translocating it to the cell nucleus. I therefore propose to compare selected antiestrogens with active estrogens at four critical steps of estrogen action: 1) temperature-dependent estrogen-induced receptor transformation; 2) receptor translocation rate into cell nuclei; 3) receptor binding to specific nuclear acceptor sites; and 4) antiestrogen retention by nuclear receptor and its relation to clearance from the general circulation. Three model systems will be compared: the normal rat and mouse uterus, the dimethylbenzanthracene-induced rat mammary tumor system, and the MCF-7 human breast cancer cell line. The goal will be discovery of the critical differences between estrogen and antiestrogen action, particularly in mammary tumor cells and particularly as correlated with tumor responsiveness to antiestrogen therapy. The results should help improve the design of atiestrogen therapy alone or in combination with chemotherapy, should aid in the search for more effective antiestrogens, and should also contribute substantially to knowledge of normal estrogen action and the nature of hormone dependence in breast cancer.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Monthly Archives: March 2016
Recently, Judge Gregory Woods of the Southern District of New York dismissed a Title IX lawsuit against Columbia University, asserting “reverse Title-IX” lawsuits do not constitute sex-based discrimination. In 2013, Paul Nungesser was accused of rape by fellow Columbia University (“Columbia”) student, Emma Sulkowicz. Columbia ultimately found Nungesser “not-responsible” for “non-consensual sexual intercourse.” Notwithstanding Columbia’s […]
|
{
"pile_set_name": "Pile-CC"
}
|
<?xml version="1.0" encoding="utf-8"?>
<!--
VS SDK Notes: This resx file contains the resources that will be consumed from your package by Visual Studio.
For example, Visual Studio will attempt to load resource '400' from this resource stream when it needs to
load your package's icon. Because Visual Studio will always look in the VSPackage.resources stream first for
resources it needs, you should put additional resources that Visual Studio will load directly into this resx
file.
Resources that you would like to access directly from your package in a strong-typed fashion should be stored
in Resources.resx or another resx file.
-->
<root>
<!--
Microsoft ResX Schema
Version 2.0
The primary goals of this format is to allow a simple XML format
that is mostly human readable. The generation and parsing of the
various data types are done through the TypeConverter classes
associated with the data types.
Example:
... ado.net/XML headers & schema ...
<resheader name="resmimetype">text/microsoft-resx</resheader>
<resheader name="version">2.0</resheader>
<resheader name="reader">System.Resources.ResXResourceReader, System.Windows.Forms, ...</resheader>
<resheader name="writer">System.Resources.ResXResourceWriter, System.Windows.Forms, ...</resheader>
<data name="Name1"><value>this is my long string</value><comment>this is a comment</comment></data>
<data name="Color1" type="System.Drawing.Color, System.Drawing">Blue</data>
<data name="Bitmap1" mimetype="application/x-microsoft.net.object.binary.base64">
<value>[base64 mime encoded serialized .NET Framework object]</value>
</data>
<data name="Icon1" type="System.Drawing.Icon, System.Drawing" mimetype="application/x-microsoft.net.object.bytearray.base64">
<value>[base64 mime encoded string representing a byte array form of the .NET Framework object]</value>
<comment>This is a comment</comment>
</data>
There are any number of "resheader" rows that contain simple
name/value pairs.
Each data row contains a name, and value. The row also contains a
type or mimetype. Type corresponds to a .NET class that support
text/value conversion through the TypeConverter architecture.
Classes that don't support this are serialized and stored with the
mimetype set.
The mimetype is used for serialized objects, and tells the
ResXResourceReader how to depersist the object. This is currently not
extensible. For a given mimetype the value must be set accordingly:
Note - application/x-microsoft.net.object.binary.base64 is the format
that the ResXResourceWriter will generate, however the reader can
read any of the formats listed below.
mimetype: application/x-microsoft.net.object.binary.base64
value : The object must be serialized with
: System.Runtime.Serialization.Formatters.Binary.BinaryFormatter
: and then encoded with base64 encoding.
mimetype: application/x-microsoft.net.object.soap.base64
value : The object must be serialized with
: System.Runtime.Serialization.Formatters.Soap.SoapFormatter
: and then encoded with base64 encoding.
mimetype: application/x-microsoft.net.object.bytearray.base64
value : The object must be serialized into a byte array
: using a System.ComponentModel.TypeConverter
: and then encoded with base64 encoding.
-->
<xsd:schema id="root" xmlns="" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:msdata="urn:schemas-microsoft-com:xml-msdata">
<xsd:import namespace="http://www.w3.org/XML/1998/namespace" />
<xsd:element name="root" msdata:IsDataSet="true">
<xsd:complexType>
<xsd:choice maxOccurs="unbounded">
<xsd:element name="metadata">
<xsd:complexType>
<xsd:sequence>
<xsd:element name="value" type="xsd:string" minOccurs="0" />
</xsd:sequence>
<xsd:attribute name="name" use="required" type="xsd:string" />
<xsd:attribute name="type" type="xsd:string" />
<xsd:attribute name="mimetype" type="xsd:string" />
<xsd:attribute ref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:element name="assembly">
<xsd:complexType>
<xsd:attribute name="alias" type="xsd:string" />
<xsd:attribute name="name" type="xsd:string" />
</xsd:complexType>
</xsd:element>
<xsd:element name="data">
<xsd:complexType>
<xsd:sequence>
<xsd:element name="value" type="xsd:string" minOccurs="0" msdata:Ordinal="1" />
<xsd:element name="comment" type="xsd:string" minOccurs="0" msdata:Ordinal="2" />
</xsd:sequence>
<xsd:attribute name="name" type="xsd:string" use="required" msdata:Ordinal="1" />
<xsd:attribute name="type" type="xsd:string" msdata:Ordinal="3" />
<xsd:attribute name="mimetype" type="xsd:string" msdata:Ordinal="4" />
<xsd:attribute ref="xml:space" />
</xsd:complexType>
</xsd:element>
<xsd:element name="resheader">
<xsd:complexType>
<xsd:sequence>
<xsd:element name="value" type="xsd:string" minOccurs="0" msdata:Ordinal="1" />
</xsd:sequence>
<xsd:attribute name="name" type="xsd:string" use="required" />
</xsd:complexType>
</xsd:element>
</xsd:choice>
</xsd:complexType>
</xsd:element>
</xsd:schema>
<resheader name="resmimetype">
<value>text/microsoft-resx</value>
</resheader>
<resheader name="version">
<value>2.0</value>
</resheader>
<resheader name="reader">
<value>System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</resheader>
<resheader name="writer">
<value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value>
</resheader>
<assembly alias="System.Windows.Forms" name="System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />
<data name="110" xml:space="preserve">
<value>VsTemplateDesigner</value>
</data>
<data name="112" xml:space="preserve">
<value>Information about my package</value>
</data>
<data name="400" type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>Resources\Package.ico;System.Drawing.Icon, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a</value>
</data>
<data name="100" xml:space="preserve">
<value>[Read Only]</value>
</data>
<data name="101" xml:space="preserve">
<value>File has been changed outside the environment. Reload the new file?</value>
</data>
<data name="102" xml:space="preserve">
<value>VsTemplateDesigner</value>
<comment>Name of the editor to show for the Keybindings</comment>
</data>
<data name="105" xml:space="preserve">
<value>VsTemplateDesigner Files</value>
</data>
<data name="106" xml:space="preserve">
<value>VsTemplateDesigner</value>
</data>
<data name="107" xml:space="preserve">
<value>MyTemplate</value>
</data>
<data name="109" xml:space="preserve">
<value>VsTemplateDesigner File (vstemplate)</value>
</data>
<data name="401" type="System.Resources.ResXFileRef, System.Windows.Forms">
<value>Resources\File.ico;System.Drawing.Icon, System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a</value>
</data>
</root>
|
{
"pile_set_name": "Github"
}
|
Q:
Units of eigenvalues
Suppose you have the system $\bf x' = \bf Ax$, where $\bf x$ is a vector and $\bf A$ is a matrix. What are the units of the eigenvalues of $\bf A$? I think they should be $1/t$ but I'm not sure how to verify this. Can you give me a starting point?
A:
Your intuition is correct, they should be 1/(the dimension of what you are taking the derivative with respect to). If your derivative is with respect to time, then it should be $1/t$. If your derivative is with respect to something unitless, the eigenvalue will be unitless, too. Write it as $\frac {dx}{dt}=Ax$ The units of $A$ are then $1/t$ and so the eigenvalues will be, too. If you are taking derivatives with respect to time, maybe the question belongs at physics.
|
{
"pile_set_name": "StackExchange"
}
|
2016 Guam Democratic caucuses
The 2016 Guam Democratic caucus took place on May 7 in the U.S. territory of Guam as one of the Democratic Party's primaries ahead of the 2016 presidential election.
No other primary election was scheduled for this day. The Republican Party's Guam caucus took place on March 12, 2016.
Results
References
Guam
Democratic caucus
2016
|
{
"pile_set_name": "Wikipedia (en)"
}
|
15 SHARES Facebook Twitter
If you’re going to make your feature film directorial debut, you can do a hell of a lot worse than finding a script written by Paul Schrader as your foundation. That’s exactly what director Bradley Bredeweg is doing with the upcoming film “Life From the Other Side.”
READ MORE: Paul Schrader has nothing nice to say about Brian De Palma
According to Deadline, Bredeweg has optioned the script written by Schrader for “Life from the Other Side” as his feature directorial debut. Previously, the director had worked as the co-creator/writer/director on the YA Freeform series “The Fosters” and its spin-off “Good Trouble.” And while maybe this body of work does not quite line up with the kind of mature self-destructive screenplays Schrader is known to write, hey, a good script is a good script and Schrader knows how to write a really great script. So, perhaps Bredeweg will knock it out of the park?
“Life from the Other Side” tells the story of Emily, a 23-year-old Instagram influencer, and her friend Moussa “Mouse” Lafitte, a 35-year-old boxer and Algerian immigrant, as they attempt to survive in New York City. As mentioned, Emily, being a young Millennial influencer, is a hustler and does whatever it takes to make money. “Mouse” is her older bodyguard and driver.
READ MORE: Paul Schrader on why he ‘never really respected’ the Academy Awards
Obviously, if you’re a fan of The Playlist, you’re well aware of Schrader and his accolades. If not, well, suffice it to say that the screenwriter is one of the best in U.S. cinema history, with films like “Taxi Driver,” “American Gigolo,” “Raging Bull,” and “The Last Temptation of Christ” to his name. Just last year, Schrader also made a huge impact on the awards season with his film “First Reformed,” which landed him an Oscar nomination for Original Screenplay.
No word on when we might see “Life from the Other Side” in theaters, but Bredeweg is reportedly eyeing an early 2020 production start date.
|
{
"pile_set_name": "OpenWebText2"
}
|
---
abstract: |
We represent a theory of polymer gelation as an analogue of liquid-glass transition in which elastic fields of stress and strain shear components appear spontaneously as a consequence of the cross-linking of macromolecules. This circumstance is explained on the basis of obvious combinatoric arguments as well as a synergetic Lorenz system, where the strain acts as an order parameter, a conjugate field is reduced to the elastic stress, and the number of cross-links is a control parameter. Both the combinatoric and synergetic approaches show that an anomalous slow dependence of the shear modulus on the number of cross-links is obtained.
[*PACS:*]{} 05.70Ln, 47.17+e, 61.43Fs
[*Keywords:*]{} [Polymer gelation; sol-gel transition; Shear stress/strain; Shear modulus]{}
address:
- |
Sumy State University\
Rimskii-Korsakov St. 2, Sumy, 40007 Ukraine\
- |
Department of Macromolecular Physics, Faculty of Mathematics & Physics\
Charles University\
V Holešovičkách 2, 180 00 Prague 8, Czech Republic\
author:
- 'Alexander I. Olemskoi'
- Ivan Krakovský
title: 'Two Simple Approaches to Sol-Gel Transition'
---
INTRODUCTION
============
Within the phenomenological framework the basic distinction between a liquid and a glass consists in character of the relaxation law of shear components of the elastic stress: if in an ideal glass they are kept infinitely long, in a liquid such relaxation proceeds in the finite time $\tau =
\eta /G$, where $\eta$ is the dynamical shear viscosity and $G$ is the shear modulus [@1]. In naive manner it is possible to assume, that a glass transition is caused purely by kinetic effect of a liquid freezing, for which viscosity $\eta$ gets infinite value for a finite value of the shear modulus $G$ [@2]. However in the course of usual second-order phase transition, where infinite increase of the $\tau$ at critical point is also observed the situation is reverse. Really, proceeding from the viscoelastic liquid to a general case, one has $\tau = \chi / \gamma$, where $\chi$ is the generalized susceptibility and $\gamma$ is the kinetic coefficient (in the case under consideration they are reduced to the quantities $G^{-1},~\eta^ {-1}$, respectively) [@3]. The infinite increase of a susceptibility $\chi$ occurs and a kinetic coefficient $\gamma$ does not manifest any peculiarity at the phase transition. In our case, this is equivalent to the situation when the shear modulus $G$ is approaching zero value at a fixed viscosity $\eta$. This situation corresponds to a viscoelastic transition [@4].
Usually under a glass transition, the transition into a glassy state which occurs during fast cooling of a liquid is understood. However, an analogous type of transition occurs during polymer network formation ([*polymer gelation*]{}) from monomers or linear macromolecules ([*sol*]{}) by means of a chemical reaction at constant temperature. This transition is referred to as the [*sol-gel transition*]{}. In such a case, thermodynamic peculiarities are observed as, e.g., appearance of the shear modulus when the system reaches a critical point.[^1] The first theoretical representations of such type transitions have been elaborated in classical works by Flory [@flory1] – [@flory3]. Modern description of the glassy state of the macromolecule networks (see [@G] – [@E]) is based on pioneering contributions to the theory of soft condensed matter: the Deam-Edwards theory [@DE] of a cross-linked tangled macromolecule, and the Edwards-Anderson theory [@EA] of spin glass.
The aim of this paper is to elaborate the simplest theoretical scheme so that the transition occurring during polymer gelation can be explained on the base of obvious combinatoric arguments (Section 2) as well as within framework of a synergetic theory (Section 3). In the former case, the critical point and behaviour of the system behind the critical point are obtained using information about the cross-linking properties of the constituent parts of the system ([*monomers*]{}) and extent of the cross-linking process, only. In Section 3, the starting point is that a sol-gel transition is ensured by self-organization of the elastic fields of stress and strain shear components and the number of cross-links. Both the combinatoric approach and the synergetic one allow to obtain anomalous dependence of the shear modulus on the number of cross-links.
Combinatoric approach
=====================
The gelation process has been described first by Flory[@flory1] and Stockmayer[@stock]. They used a laborious approach based on combinatoric considerations of the most probable composition of the system. A much more effective variant of this approach, exploiting theory of branching processes, has been developed later by Dobson and Gordon [@dg1; @dg2]. This approach allows also an analysis of structural details of the system behind the critical point, see, e.g. [@dusek].
As the simplest case let us consider the gelation process in the system which at the beginning consists of a large number of monomers $\cal N$, wearing $f$ functional terminal groups of independent reactivity. Monomers react mutually and irreversibly via their terminal groups and if $f>2$, branched molecules of increasing size and complexity are formed progressively in the system. Extent of the reaction is described by the conversion of terminal groups $\alpha$, which is defined as the ratio of the number of groups consumed by the reaction at given time and the starting number of groups. Eventually, when a critical conversion $\alpha_{\rm c}$ is achieved a molecule of macroscopic dimensions ([*gel*]{}) appears in the system [[@flory1], [@flory2]]{}. Gel contains cycles of long sequences of linked monomers and, consequently, attains elastic properties. Flory [@flory3] has shown that shear modulus of gel $G$ is proportional to its “cycle rank” $\xi$ defined as the number of “superfluous” links formed in gel which can be cut without breaking integrity of gel. In other words, cycle rank is the number of cuts needed for elimination of all cycles from gel.
The key role in the approach is played by the extinction probability $v$, which is a probability that a link formed in the process has just a finite continuation. It can be shown easily [@dg1] that for the system considered here the extinction probability can be obtained as a root of the equation $$v=(1-\alpha+\alpha v)^{f-1}
\label{v1}$$ satisfying the condition $0\le v\le 1$. Eq.(\[v1\]) expresses fact that a given link has a finite continuation in a direction only if $f-1$ functional groups remaining on the monomer connected by the link are either unreacted (with probability $1-\alpha$) or reacted giving rise to links with finite continuation only (with probability $\alpha v$). Below the critical conversion, the only solution of Eq.(\[v1\]) is $v=1$, i.e., only molecules of finite size are formed in the system. However, behind the critical conversion monomers can be found either in sol or in gel: $v<1$. As a measure of the “distance” from the critical conversion let us introduce the parameter $\epsilon$ defined as $$\epsilon\equiv\alpha-\alpha_{\rm c}
\label{eps}$$ and expand the extinction probability in a series: $$v=1+A_{1}\epsilon+A_{2}\epsilon^{2}+\ldots
\label{v3}$$ Substituting Eqs.(\[eps\]) and (\[v3\]) into Eq.(\[v1\]), expressions for the critical conversion and the parameters $A_{i}$ are obtained as $$\begin{aligned}
\alpha_{\rm c}&=&\frac{1}{f-1}\label{alpha},\\
A_{1}&=&-2~\frac{(f-1)^{2}}{f-2}\label{a1},\\
A_{2}&=&\frac{4}{3}~\frac{(2f-3)(f-1)^{3}}{(f-2)^{2}}.
\label{a2}\end{aligned}$$
The expression for the cycle rank can be found in the following way. Obviously, to join $\cal N$ monomers into a cycle-free structure, ${\cal N}-1$ links are necessary. By definition, the cycle rank $\xi$ is the number of “superfluous” links formed in gel, i.e., the difference between the number ${\rm N}_{\rm G}$ of all links formed in gel and the number ${\cal N}_{\rm G}-1$ of links sufficient to join together ${\cal N}_{\rm G}$ monomers of gel: $$\xi\equiv {\rm N}_{\rm G}-({\cal N}_{\rm G}-1)\simeq
{\rm N}_{\rm G}-{\cal N}_{\rm G} \label{xi1}$$ as ${\rm
N}_{\rm G}$, ${\cal N}\gg 1$. Correspondingly, the number of links formed in gel is the difference between the numbers of links formed in the total system and in sol, i.e., $${\rm N}_{\rm
G}=\frac{1}{2}{\cal N}\alpha f(1-v^2) \label{ng}$$ as any link in sol has to have finite continuations in two directions. On the other hand, the number ${\cal N}_{\rm G}$ of monomers incorporated in gel is the difference between the total number of monomers and the number of monomers in sol which is made of monomers with links of only finite continuation: $${\cal
N}_{\rm G}={\cal N}-{\cal N}(1-\alpha+\alpha v)^{f}. \label{Ng}$$ By virtue of Eqs.(\[xi1\]) – (\[Ng\]), one gets for cycle rank of the system considered $$\frac{\xi}{\cal N} = (1-\alpha+\alpha
v)^{f}+\frac{1}{2}\alpha f(1-v^{2})-1. \label{xi2}$$ Finally, substituting Eqs.(\[v3\]),(\[a1\]) and (\[a2\]) into the formula (\[xi2\]), one gets the necessary expansion: $$\frac{\xi}{\cal N} =
\frac{2}{3}~\frac{(f-1)^{4}}{(f-2)^2}f~\epsilon^3+O(\epsilon^{4}).
\label{xi3}$$ Respectively, the weight fraction of gel $w_{\rm G}\equiv{\cal N}_{\rm G}/{\cal N}$ is determined by Eq.(\[Ng\]) to read $$w_{\rm G}=2~\frac{(f-1)^{2}}{f-2}~\epsilon+O(\epsilon^{2}).
\label{wg2}$$ So, if the critical exponent of the gel weight fraction is equal 1 as usual, this for the cycle rank is anomalous large being equal 3. It is worthwhile to note that combinatoric approach is based exclusively on the information about the functionality of the monomers and extent of the chemical reaction between the monomers in the system considered.
Synergetic approach
===================
Now, let us consider the polymer network as a viscoelastic continuum matter that is characterized by the shear modulus $G$ and the shear viscosity $\eta$. Process of polymer gelation is determined by the number of the cross-links $N$, which value is different from a stationary magnitude $N_0$ at a time $t$. Therein, an elastic state of the polymer is defined by the shear component of the proper (internal) values of deformation $\varepsilon(t)$ and stress $\sigma(t)$. The keypoint is that these values are not reduced to the external elastic deformation $e\ll 1$ and stress $\sigma_e\ll G$, in particular they can get large magnitudes $\varepsilon\sim 1$, $\sigma\sim G$.
Our consideration of evolution of the elastic continuum with the internal structure is stated on the phenomenological equations by Maxwell-Kelvin [@1] $${d\varepsilon\over dt}=-{\varepsilon\over \tau}+{\sigma\over\eta},
\label{a}$$ $${d\sigma\over dt}=-{\sigma\over \tau_{\sigma}}+
g_{\sigma}\varepsilon N.
\label{b}$$ Here we introduce a macroscopic relaxation time $\tau$ for the strain and a microscopic one $\tau_{\sigma}$ for the stress, as well as a constant $g_{\sigma} > 0$ of the positive feedback between the deformation $\varepsilon$ and the number of cross-links $N$. Within the microscopic interval $t\gg\tau_{\sigma}$, steady-state condition $d\sigma/dt=0$ in Eq.(\[b\]) leads to the Hooke law with the microscopic shear modulus $$G_{\sigma}\equiv\tau_{\sigma} g_{\sigma}N
\label{c}$$ being determined by the number of cross-links $N$. Respectively, within a macroscopic interval $t\gg\tau$ Eq.(\[a\]) gives the magnitude $G\equiv\eta/\tau$ that is characteristic for the usual modulus of the viscoelastic matter. Lastly, a variation rate $dN/dt$ of the internal degree of freedom is supposed to be determined by the equation $${dN\over dt}={N_0-N\over
\tau_N}-g_N\sigma\varepsilon \label{e}$$ where $\tau_N$ is a mesoscopic relaxation time, $g_N > 0$ is constant of negative feedback between the deformation $\varepsilon$ and the stress $\sigma$. Within a mesoscopic interval $\tau_N\ll t\ll\tau$, Eq.(\[e\]) determines a steady-state value $$N=N_0-\tau_N g_N\sigma\varepsilon
\label{f}$$ that is smaller than the magnitude $N_0$ fixed by external conditions due to the fact that the elastic energy is proportional to the product $\sigma\varepsilon$.
System of Eqs.(\[a\]), (\[b\]) and (\[e\]) is known in synergetics [@Haken] as the Lorenz system where the deformation $\varepsilon$, the stress $\sigma$ and the number of cross-links $N$ play roles of an order parameter, a conjugate field and a control parameter, respectively. It is very important for following considerations that the relation between micro-, meso- and macroscopic values of the relaxation times $$\tau_{\sigma}, \tau_N \ll
\tau \label{g}$$ is satisfied. Due to this condition the evolution of the quantities $\sigma$, $N$ turns out to be subordinated to the long-time variation of $\varepsilon$. A peculiarity of the Lorenz system consists in linear character of the equation (\[a\]) for the order parameter $\varepsilon$ and in non-linearity of equations (\[b\]), (\[e\]) for the conjugate field $\sigma$ and the control parameter $N$. The negative nature of non-linearity in Eq.(\[e\]) means a decrease of the number $N$ of cross-links. Evidently, this fact reflects Le Chatelier principle. A non-linear term in Eq.(\[b\]) for a field $\sigma$ describes the positive feedback causing the system self-organization.
Expressions (\[a\]), (\[b\]) and (\[e\]) form the complete system of equations determining the polymer cross-linking behaviour. Because of a slow evolution, the order parameter $\varepsilon(t)$ subordinates variations of quantities $\sigma (t)$, $N(t)$, so that one can take $d\sigma/dt =dN/dt =0$ within the framework of the adiabatic approximation [@Haken]. Then $N$, $\sigma$ are expressed in terms of $\varepsilon$ by the equations: $$N={N_0\over 1+
\varepsilon^2/
\varepsilon^2_m},\quad
\varepsilon_m^{-2}\equiv \tau_{\sigma} \tau_N g_{\sigma} g_N;
\label{h}$$ $$\sigma=G_0{\varepsilon \over 1+
\varepsilon^2/
\varepsilon^2_m},\quad
G_0 \equiv \tau_{\sigma} g_{\sigma} N_0.
\label{i}$$ In accordance with Eq.(\[h\]) the number of cross-links $N$ decreases monotoneously with increase of the strain $\varepsilon$ from the value $N_0$ at $\varepsilon = 0$ to $N_0/2$ at $\varepsilon
=\varepsilon_m$.[^2] In Eq.(\[i\]) the elastic stress in terms of the strain has the linear form of the Hooke law at $\varepsilon\ll
\varepsilon_m$ with the effective shear modulus $G_0$. Then, at $\varepsilon = \varepsilon_m$ the function $\sigma (\varepsilon) $ has a maximum and at $\varepsilon > \varepsilon_m$ it decreases which is physically meaningless. Thus, the constant $\varepsilon_m$, defined by the second equation (\[h\]), has the meaning of the maximum achievable strain.
Substituting Eq.(\[i\]) in Eq.(\[a\]) we find the equation describing evolution of a system in the course of the sol-gel transition: $${d\varepsilon\over dt}=-\gamma
{\partial E \over \partial\varepsilon},\qquad
\gamma\equiv {\varepsilon_m^2\over\tau T~N_0}
\label{j}$$ where constant $\gamma$ plays a role of the kinetic coefficient. Behaviour of the system under consideration is determined by the dependence $E (\varepsilon) $ of the elastic energy on the strain: $$E \equiv {T~N_0\over 2}
\left [{\varepsilon^2 \over \varepsilon^2_m} - {N_0\over N_c}
\ln\left(1+{\varepsilon^2\over
\varepsilon^2_m}\right)\right]
\label{k}$$ where the characteristic value of the number of cross-links is introduced $$N_c \equiv {\eta\over\tau_{\sigma} g_{\sigma}}.
\label{l}$$ At $N_0\le N_c$ dependence (\[k\]) is monotoneously increasing with a minimum at the point $\varepsilon = 0$. It means that in the stationary state ($\dot\varepsilon {=} 0$) the elastic strain is not spontaneous. Thus, a liquid state is realized, in which the strain caused by the external stress relaxes during the time $$\tau_ {ef} = \tau \left (1 -
N_0/N_c\right)^{-1}.
\label{m}$$ The relaxation time increases infinitely when the number of cross-links $N_0$ reaches the critical value $N_c$ and at $N_0> N_c$ the system undergoes a sol-gel transition. In the gel state the multiplier 1/2 appears in the dependence (\[m\]), and the minimum of the elastic energy corresponds to the elastic strain $${\varepsilon^2 \over \varepsilon^2_m} = {N_c
\over N_0}~{N_0-N_c\over N_c}\equiv {\epsilon \over 1 +
\epsilon}
\label{n}$$ where we introduce the distance from the critical value $N_c$ $$\epsilon\equiv
{N_0-N_c\over N_c} \label{o}$$ being equivalent to the definition (\[eps\]). Inserting Eq.(\[m\]) into the dependence (\[k\]), we obtain the elastic energy of the steady-state: $$E_0\equiv E(\varepsilon_0)=-~{TN_0\over
4}~\epsilon^2 + O(\epsilon^3).
\label{p}$$ As would be expected, this energy is proportional to the second power of the parameter (\[o\]) and is negative in nature (the latter means the energy benefit of the gel state in comparison with the liquid state).
Taking into account that the glassy state is determined by density of the localized monomers, let us find now the shear modulus of the appeared gel state. It is principally important in our considerations that the gel state is determined by the value of the Deam-Edwards parameter of localization $\omega$ [@DE] which is supposed to be proportional to the square of the proper strain $\varepsilon_0$ of the matter. Under the condition of the appearance of the elastic strains $e$, a generalized Deam-Edwards parameter $\omega(e)$ has to be considered which is related to the condition $\omega(e=0)\equiv \omega$. Then, expanding the function $\omega(e)$ into a series and keeping the first two terms only, one obtains $$\omega(e)\simeq
\omega(1+e^2), \quad \omega\propto\varepsilon^2_0,\quad e\ll 1.
\label{r1}$$ By virtue of the parity condition $\omega(e)=\omega(-e)$, this expansion does not contain a linear term.[^3] Because of that the total strain $\varepsilon\propto\sqrt{\omega(e)}$, internal one $\varepsilon_0\propto\sqrt{\omega}$ and elastic one $e$ are connected by the following relation: $$\varepsilon^2 =
\varepsilon_0^2 (1+e^2), \qquad e\ll 1. \label{r}$$ The key point is that Eq.(\[r\]) supposes the additivity rule holds not for quantities $\varepsilon$, $\varepsilon_0$, $e$ themselves, but for their squares. The physical reason for such a situation is that the system under consideration is random in character and described by a symmetrical distribution function. Therefore, all odd-power moments vanish identically and making use of the additivity rule (\[r\]) for variances follows.
It is worthwhile to note the seeming contradiction between above relations for the localization parameter $\omega$ and the Deam-Edwards results [@DE]. Obvious reason consists in that the formers are obtained within framework of the mean-field theory, whereas the latters suppose fluctuation effects. According to [@DE] the cross-linking process is not sensible to strain $\varepsilon$ and corresponding localization parameter $\omega$ is proportional to the cross-link number $N$ but not to the difference $N-N_c$, as in Eqs.(\[n\]), (\[o\]). In our opinion, this is caused by non-self-consistency of the approach [@DE] in sense that the stress field $\sigma$ is switched off. On the other hand, making use of the statistical scheme [@DE] arrives at the strain-dependence for the localization parameter $\omega$ due to appearance of the polymer network entanglement, whereas within the above phenomenological approach this dependence has to be postulated.
A contribution to the elastic energy caused by the external strain is determined by equality $$\Delta
E(e)\equiv | E\left(\varepsilon(e)\right)- E(\varepsilon_0)|.
\label{s}$$ With use of Eqs. (\[k\]), (\[p\]), (\[r\]) and expansion $\ln(1+x)\approx x-x^2/2+x^3/3$, $ x\ll 1$ the expression $$\Delta E(e)\approx N_0~{T\epsilon^3\over 2} e^2
\label{u}$$ is easily obtained where only the first non-zero term is kept. Comparing this relation with the usual expression for the elastic energy [@1] $$\Delta E(e)\equiv V~{G\over
2} e^2 \label{v}$$ where $V$ is volume, we arrive at the final expression for the shear modulus of the gel state of the polymer network: $$G={T\epsilon^3\over\Omega},
\quad \epsilon\equiv {N_0-N_c\over N_c}\ll 1,
\quad \Omega\equiv
{V\over N_0}.
\label{w}$$ The notable peculiarity of this result consists in that, in accordance with previous result (\[xi3\]), the shear modulus is proportional to the third power of the distance $\epsilon$. It is worthwhile to note that an expression of this kind can be obtained only within framework of the synergetic approach used, but not on the basis of the phase transition theory by Landau.
Finally, comparing Eqs. (\[xi3\]) and (\[w\]), we obtain the relation between the micro- and macroscopic parameters of the gel under consideration in the proximity of the critical point ($\epsilon\ll 1$): $$G=g~\frac{\xi}{\cal N}~\frac{T}{\Omega},\quad
g\equiv\frac{3}{2}~f^{-1}~\frac{(f-2)^2}{(f-1)^{4}}.
\label{xy}$$
[00]{}
L. D. Landau, E. M. Lifshitz, [*Elasticity Theory*]{} (Nauka, Moscow, 1987).
A. Havranek, M. Marvan, Ferroelectrics [**176**]{}, 25 (1996).
A. I. Olemskoi, [*Theory of Structure Transformations in Non-equilibrium Condensed Matter*]{} (NOVA Science, N.-Y., 1999).
V. G. Bar’yakhtar, A. I. Olemskoi, Sov. Phys. Solid State [**33**]{}, 2705 (1991).
P. J. Flory, J.Am.Chem.Soc. [**63**]{}, 3083 (1941).
P. J. Flory, [*Principles of Polymer Chemistry*]{} (Cornell University Press, 1953).
P. J. Flory, Proc.Roy.Soc.London A[**351**]{}, 351 (1976).
P. M. Goldbart, H. E. Castillo, A. Zippelius, Adv. Phys. [**45**]{}, 393 (1996).
S. Panyukov, Y. Rabin, Phys. Rep. [**269**]{}, 1 (1996).
S. F. Edwards, H. Takano, E. M. Terentjev, cond-mat/0007270.
R. T. Deam, S. F. Edwards, Phil.Trans.R.Soc. A[**280**]{}, 317 (1976).
S. F. Edwards, P. W. Anderson, J.Phys. F[**5**]{}, 965 (1975).
W. H. Stockmayer, J.Chem.Phys. [**11**]{}, 45 (1943).
G. R. Dobson, M. Gordon, J.Chem.Phys. [**41**]{}, 2389 (1964).
G. R. Dobson, M. Gordon, J.Chem.Phys. [**42**]{}, 705 (1965).
K. Dušek, Adv.Polym.Sci. [**78**]{}, 1 (1986).
G. Haken, [*Synergetics*]{} (Springer-Verlag, Berlin, Heidelberg, N.Y., 1983).
[^1]: Of course, when the temperature of the polymer network formed is decreased the kinetic glass transition in above sense occurs, as well.
[^2]: Obviously this decrease is caused by the negative feedback in Eq.(\[e\]), that is reflection of Le Chatelier principle for analyzes problem. Actually, a liquid self-organization, resulting in a sol-gel transition, is caused by the positive feedback between the strain $\varepsilon$ and the number of cross-links $N$ in Eq.(\[b\]). Hence, the increase of the number of cross-links should intensify the self-organization effect. However, according to Eq.(\[h\]) system behaves in such way that the consequence of self-organization, i.e., growth of the elastic strain, leads to decrease of its origin – the number of cross-links.
[^3]: Otherwise, the usual squared dependence (\[u\]) will not be obtained.
|
{
"pile_set_name": "ArXiv"
}
|
Cystic nephroma in adults. A report of two cases and review of the literature.
We present two cases of cystic nephroma in a 55-year old and a 61-year old women. In both patients the results of ultrasound and clinical examinations were not characteristic enough to establish the precise preoperative diagnosis. Due to the age of the patients and the location of the lesions, possibility of clear cell carcinoma with cystic changes was considered. However, microscopic examination of postoperative specimens revealed benign nature of the tumors.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Convert html string to pdf with prawnto
I have field which stores html content. I want to convert html strings in the pdf. I am using prawnto to generate pdf.
Any idea ? How to convert specific html string to pdf string ?
A:
It's easy with PDFKit:
@your_object = YourObject.find(params[:id])
respond_to do |format|
format.pdf do
#html = render_to_string(:action => "show.html.haml", :layout => "pdf.html.haml")
html = @your_object.your_html_field
content = PDFKit.new(html)
send_data(content.to_pdf, :filename => "content.pdf", :type => 'application/pdf', :disposition => 'inline')
end
end
It uses wkhtmltopdf in a background and it's pretty easy to install too. It has a lot of options allowing to customize a pdf generation.
Ryan Bates has a screencast on it.
|
{
"pile_set_name": "StackExchange"
}
|
The FBI has arrested Ars Technica writer and male feminist ally Peter Bright. He is charged with soliciting sex with children online.
Bright allegedly sought to molest a 7- and 9-year old and disclosed his intentions to an undercover FBI special agent who made contact with him on KinkD, a social media fetish platform. According to the federal complaint filed in the U.S. District Court for the Southern District of New York, Bright met with the special agent and was arrested. He is currently being held without bail.
The complaint also states that Bright also claimed to be in a sexual relationship with an 11-year-old.
“From on or about April 18, 2019 up to and including on or about May 22, 2019, in the Southern District of New York and elsewhere, PETER BRIGHT, the defendant, willfully and knowingly, did use a facility and means of interstate and foreign commerce to persuade, induce, entice, and coerce an individual who had not attained the age of 18 years to engage in sexual activity for which a person can be charged with a criminal offense, and attempted to do the same, to wit, BRIGHT used computers and/or telephones to communicate with an undercover FBI agent about arranging to engage in sexual activity with a purported nine-year old boy and a seven-year old girl, and attempted to meet with the boy and the girl to engage in sexual activity, in violation of New York Penal Law Sections 130.25(2), 130.30(1), 130.35(3), 130.55, 130.60(2), and 130.65(3) and (4).
The complaint states that on April 17, 2019, the undercover agent posed as a mother of a nine-year old boy and seven-year old girl and posted a message on KinkD “seeking to chat with people who are, in sum and substance, interested in teaching her children lessons about the ‘birds and the bees.’”
The next day, a KinkD user going by the handle “randomanon” allegedly took the bait. It turned out to be Peter Bright, who allegedly urged them to continue their conversation on WhatsApp. Between May 14 and May 22, the male feminist allegedly engaged the undercover agent in discussions about his ongoing sexual experience with an 11-year-old, as well as his previous sexual experience.
The complaint further alleges that Bright sought to meet the agent and the two minors to engage in sex, “including BRIGHT penetrating the Girl with a finger, a toy, or his penis.”
Bright allegedly inquired about whether he could teach the children “lessons” involving his private parts. “I’m thinking maybe something involving foreskin is the way to start,” he allegedly said.
The FBI provided a transcript of the dialogue, which we will not reprint on Human Events.
Bright’s bio on his Twitter profile, @drpizza, identifies him as an Ars Technica writer. He sexually identifies as “poly/pan/pervy” and lists his pronouns “he/him.”
Bright allegedly provided the agent with test results for several sexually transmitted diseases and sent the agent two photographs of himself, which identify him as the man who showed up in person. He also allegedly sent the agent a photograph of his privates. The agent’s review of records from T-Mobile associate Bright’s identity with the phone number used by the same individual on WhatsApp.
On May 22, Bright met with the undercover agent and was arrested shortly thereafter. His appearance was a visual match with the individual the agent spoke to online.
Peter Bright’s bio on his Twitter profile, @drpizza, identifies him as an Ars Technica writer. He sexually identifies as “poly/pan/pervy” and lists his pronouns “he/him.”
The tech journalist has made the rounds on Twitter as an avowed “male feminist” who once bragged about “dating 3 feminists right now” and spoken extensively about feminist issues and repeatedly condemned the #GamerGate movement for ethics in games journalism. Despite being a journalist in games and technology, Bright often spoke out against “male gamers,” referring to them as “irredeemable.” He also defended the concept of cuckoldry.
In several posts, Bright claimed to understand the psychology of child molesters, expressed his disagreement with age-based rape laws, and once remarked that one should “please ignore the [child’s] howling coming from the basement.”
Conde Nast, the publisher of Ars Technica, confirmed to the Daily Dot that Bright was indeed arrested and that he is no longer employed.
Ian Miles Cheong is the managing editor of Human Events
|
{
"pile_set_name": "OpenWebText2"
}
|
Radiation-induced gastrointestinal syndrome (RIGS) results from a combination of direct cytocidal effects on intestinal crypt and endothelial cells and subsequent loss of the mucosal barrier, resulting in microbial infection, septic shock and systemic infiammatory response syndrome. Currentiy, there is no therapy for RIGS. Irradiation induces apoptosis of crypt endothelial cells, intestinal stem cells (ISC) and enterocytes within hours. We rationalized that the acute loss of cells in situ requires rapid compensation of their functions and this was best achieved with cell replacement therapies, e.g., blood transfusion for hemorrhage. The stroma of solid organs contains a variety of supporting cells, such as, mesenchymal and microvascular endothelial cells, macrophages and lymphocytes. These stromal cells provide the niche and could supply critical growth factor/signals for ISC regeneration. For example, upon intestinal mucosal disruption, resident macrophages in the intestinal submocosal layers are activated by pathogen-derived ligands for Toll-like receptors (TLR) and transmit regenerative signals to ISCs. We thereby propose intestinal regenerative therapy with a combination of systemic administration of growth factors and cell replacement therapy to salvage Gl function post-radiation exposure. In order to develop an stem cell-based therapeutic strategy for RIGS, we hypothesized that combinations of: a) intestinal stem cell growth factor, R-spondinl (R-spol), b) TLR ligands, and c) transplantation of bone marrow-derived endothelial progenitor cells (EPC) and mesenchymal stem cells (MSC) would restore the IR-damaged ISC niche, protect against IR-induced cell death and provide growth signals for host ISC regeneration, thus providing protection and mitigation from RIGS. Aim I Pathophysiologic Mechanisms, Discovery and Validation of Molecular Targets in RIGS Aim II will investigate whether acceleration of ISC regeneration could mitigate/protect RIGS by administration of a Wnt agonist, R-spondinl and a BMP antagonist. Aim III will examine whether repair of the ISC niche by TLR activation and/or bone marrow-derived adherent stromal cell-based therapies could mitigate RIGS in mice. The final goal is to identify radio-mitigating factors secreted by stromal cells.
|
{
"pile_set_name": "NIH ExPorter"
}
|
require 'spec_helper'
module Bogus
describe OverwritesMethods do
let(:method_stringifier) { MethodStringifier.new }
let(:makes_substitute_methods) { isolate(MakesSubstituteMethods) }
let(:overwriter) { isolate(OverwritesMethods) }
let(:object) { SampleOfOverwriting.new }
context "with regular objects" do
class SampleOfOverwriting
def greet(name)
"Hello #{name}"
end
def wave(part_of_body = "hand", speed = "slowly")
"I'm waving my #{part_of_body} #{speed}"
end
end
before do
overwriter.overwrite(object, :greet)
end
it "does not change the method signature" do
expect(object.method(:greet).arity).to eq(1)
end
it "does not change the method signature" do
expect {
object.greet("John", "Paul")
}.to raise_error(ArgumentError)
end
it "adds interaction recording to the overwritten object" do
object.greet("John")
expect(object).to Bogus.have_received.greet("John")
expect(object).not_to Bogus.have_received.greet("Paul")
end
it "can reset the overwritten methods" do
overwriter.reset(object)
expect(object.greet("John")).to eq("Hello John")
end
it "is imdepotent when overwriting" do
overwriter.overwrite(object, :greet)
overwriter.overwrite(object, :greet)
overwriter.overwrite(object, :greet)
overwriter.reset(object)
expect(object.greet("John")).to eq("Hello John")
end
end
context "with objects that use method missing" do
class UsesMethodMissing
def respond_to?(name)
name == :greet
end
def method_missing(name, *args, &block)
"the original return value"
end
end
let(:object) { UsesMethodMissing.new }
before do
overwriter.overwrite(object, :greet)
end
it "can overwrite the non-existent methods" do
expect(object.methods).to include(:greet)
end
it "can be reset back to the original state" do
overwriter.overwrite(object, :greet)
overwriter.overwrite(object, :greet)
overwriter.reset(object)
expect(object.greet).to eq("the original return value")
end
end
context "with fakes" do
let(:fake) { Samples::FooFake.new }
it "does nothing because fakes methods already work as we need" do
overwriter.overwrite(fake, :foo_bar)
expect(fake).not_to respond_to(:foo_bar)
end
it "does not reset fakes, because there is nothing to reset" do
expect {
overwriter.reset(fake)
}.not_to raise_error
end
end
end
end
|
{
"pile_set_name": "Github"
}
|
Q:
How to fix overlapping objects on the stage in AS3
I have a flash game where I have a picture designed to be the textbox for a prompt and textbox inside with the relevant text but the textbox is being hidden by the image. Anyone know how to make is so that the textbox is guaranteed to be on top or whatever I need to do to keep this from happening?
A:
The other answer using setChildIndex will definitely work, however, I think a different design approach is really what you should be doing to remove the headache altogether.
For example in a game I might have different layers such as :
backgroundLayer
gameLayer
interfaceLayer
Those 3 Sprite layers would get added to the stage in that order. I would then add display objects to the appropriate layers. So anything I added to the backgroundLayer or gameLayer would ALWAYS be 'behind' my user interface on the interfaceLayer.
That allows you to not have to worry about the layering constantly. The answer with setChildIndex will fix the problem for that moment, but should something else be added to the container it will overlap your textbox, which is something I don't assume you want.
here's an example :
var backgroundLayer:Sprite = new Sprite;
var gameLayer:Sprite = new Sprite;
var interfaceLayer:Sprite = new Sprite;
addChild(backgroundLayer);
addChild(gameLayer);
addChild(interfaceLayer);
now, whatever you add to interfaceLayer, will ALWAYS be on top of objects you add to gameLayer or backgroundLayer.
So in the case of your text box, just add it to your interfaceLayer and any other objects you want behind it, you add to the gameLayer or backgroundLayer.
|
{
"pile_set_name": "StackExchange"
}
|
Anthony Chickillo
Anthony Chickillo (born December 10, 1992) is an American football outside linebacker for the Pittsburgh Steelers of the National Football League (NFL). He played college football at the University of Miami.
Early years
Chickillo attended Gaither High School in Tampa, Florida prior to transferring to Braulio Alonso High School, which is also in Tampa, before his junior year. As a senior, he had 140 tackles, 18 sacks and two interceptions. Chickillo was named the MVP of the 2011 Under Armour All-America Game after he recorded 1.5 sacks and a fumble recovery. He was rated by Rivals.com as a four-star recruit and was ranked as the third best defensive end in his class. He committed to the University of Miami to play college football.
College career
Chickillo played at Miami from 2011 to 2014. He entered his freshman season as a backup before becoming a starter. After three games, he became a starter and would start the next 47 games through his senior year. He finished his career with 170 tackles and 15.5 sacks.
Professional career
Coming out of college, Chickillo was projected by some analysts to be a fourth to sixth-round draft pick. He was rated the 13th-best defensive end out of the 148 available by NFLDraftScout.com. Many scouts were divided on what position he was best suited for and classified him as a tweener. He received mostly mixed reviews from analysts and was thought to be a future rotational defensive end. Chickillo was invited to the NFL Scouting Combine and was able to participate in the full workout and complete all the positional drills. He also attended Miami's Pro Day but was satisfied with his combine performance and only did positional workouts. Pittsburgh Steelers' head coach Mike Tomlin attended his pro day and has said he envisioned Chickillo switching to an outside linebacker.
2015
On May 2, 2015, Chickillo was drafted by the Steelers in the sixth round (212th overall) of the 2015 NFL Draft. Chickillo was the 24th defensive end drafted in 2015.
On May 11, 2015, the Pittsburgh Steelers signed Chickillo to a four-year, $2.37 million contract that includes a signing bonus of $73,700.
On September 6, 2015, he was waived by the Steelers after initially making the 53-man roster. He was signed to the practice squad three days later. On September 30, 2015, Chickillo was activated from the practice squad to the Steelers' active roster.
On October 18, 2015, he appeared in his first career game against the Arizona Cardinals.
He appeared in seven regular-season games for the Steelers in his rookie year, recording six tackles and forcing a fumble. The following week, he recorded his first tackle during a 23–13 loss to the Kansas City Chiefs. He had a season-high two tackles and forced a fumble during the Steelers' Week 17 victory over the Cleveland Browns. Chickillo finished his rookie season with a total of six combined tackles and a forced fumble, while appearing in seven regular-season contests and two postseason games.
2016
He began his second season as the third left outside linebacker on the depth chart behind Bud Dupree and Arthur Moats. Although he was mainly featured on special teams, he began to receive more reps as a rotational outside linebacker after Dupree missed the first ten games due to an abdominal injury.
On October 9, 2016, Chickillo recorded three solo tackles, a forced fumble, and his first career sack on New York Jets' quarterback Ryan Fitzpatrick, during the Steelers' 31–13 victory. The following week, he earned his first career start against the Miami Dolphins and finished the loss with three solo tackles. During a Week 9 13–21 loss to the Baltimore Ravens, Chickillo made a season-high six combined tackles and was credited with a half a sack on Joe Flacco. The next game, he made a total of four tackles, forced a fumble, and sacked Dak Prescott during a 30–35 loss to the Dallas Cowboys.
2017
On February 14, 2017, the Pittsburgh Steelers signed Chickillo to a one-year, $615,000 restricted free agent tender. He returned as the Steelers' third left outside linebacker behind Dupree and Moats, but began the regular season featured on special teams.
On September 10, in the season-opening 21–18 victory over the Cleveland Browns, Chickillo had two sacks. In addition, Tyler Matakevich blocked a punt, which Chickillo recovered in the end zone for his first career touchdown and gave the Steelers their first points of the season.
2018
On March 13, 2018, the Pittsburgh Steelers extended an original round tender offer to Chickillo as a restricted free agent. On April 21, 2018, Chickillo officially signed his one-year, $1.90 million contract.
2019
On March 12, 2019, Chickillo signed a two-year, $8 million contract extension with the Steelers. After he was arrested for domestic violence on October 20, 2019, he was placed on the exempt/commissioner's permission list on October 23, 2019. The domestic violence charges were withdrawn on October 30, and he was brought back to the active roster on October 31.
Personal life
His father Tony Chickillo and grandfather Nick Chickillo both played at the University of Miami and in the NFL.
References
External links
Miami Hurricanes bio
Category:1992 births
Category:Living people
Category:Sportspeople from Tampa, Florida
Category:Players of American football from Florida
Category:American people of Italian descent
Category:American football defensive tackles
Category:American football defensive ends
Category:Miami Hurricanes football players
Category:Pittsburgh Steelers players
Category:American football linebackers
|
{
"pile_set_name": "Wikipedia (en)"
}
|
1. Field of the Invention
The present invention generally relates to modular connectors having a female housing and a removable male plug and, more particularly, to multi-purpose modular connectors.
2. Brief Description of the Prior Art
RJ-type modular connectors generally include an RJ-type female housing configured to releasably receive an RJ-type male plug. RJ-type modular connectors are commonly used in conjunction with electronic telecommunications, data networking equipment, and computers. The female housing is generally a hollow box which defines an internal cavity and four interior surfaces. A latch groove is generally defined adjacent to one of the four interior surfaces. A plurality of contact terminals is positioned inside the interior cavity, adjacent to one of the four interior surfaces and preferably opposite the interior surface defining the latch groove. Each of the contact terminals is electrically connected to a corresponding phone line, wire, printed circuit board lead, or some other system or device. One RJ-type modular connector is described in U.S. Pat. No. 4,978,317 to Pocrass, herein incorporated by reference in its entirety.
The internal cavity of the female housing receives the male plug. The male plug is generally box-shaped and defines four external surfaces, an open end, a closed end, and usually an internal cavity. One of the four external surfaces defines a plurality of partitioned wire grooves, wherein the open end, the internal cavity, and each of the plurality of partitioned wire grooves are connected to one another. A collapsible wire holder may be defined by any one of the four external surfaces, and a flexible latch is usually positioned adjacent to the external surface positioned opposite to the external surface defining the plurality of partitioned wire grooves.
In one typical configuration, a plurality of wires is inserted into the open end of the male plug. One end of each of the plurality of individual wires is positioned in a corresponding one of the plurality of partitioned wire grooves. The collapsible wire holder is then compressed to hold each of the plurality of individual wires securely within the male plug. The male plug is then inserted into the female housing, such that a ridge on the flexible latch releasably seats in the latch groove, and each of the plurality of individual wires contacts a corresponding one of the plurality of contact terminals. The other end of each of the plurality of individual wires may also be individually connected to another male plug in the same manner described above, forming a plurality of individual wires having a housing at both ends.
A significant limitation of prior art RJ-type modular connectors is that the modular connectors are dedicated to one particular function. For example, RJ11 modular connectors are often used in telecommunication applications. RJ11 female housings generally include up to six separate contact terminals, with a corresponding number of male plug partitioned wire grooves. In data networking applications, an RJ45 modular connector is often used. The RJ45 modular connectors generally include up to eight separate contact terminals, with a corresponding number of male partitioned wire grooves, and are specially designed for Local Area Network (LAN) or ETHERNET connectivity. Therefore, if both telecommunication modem and networking capabilities are desired in one particular type of device, such as a computer, the device is generally configured with at least one RJ11 modular connector and at least one RJ45 modular connector. The need for at least two different types of modular connectors increases the size of the device, which is an unwanted design limitation, particularly in the hand-held or laptop computer markets.
To help ease the limitations currently imposed by the prior art, the present invention generally includes an RJ-type modular connector which includes an RJ-type female housing and an RJ-type male plug. The RJ-type female housing is configured to receive the RJ-type male plug. The RJ-type female housing has an open, plug receiving end and least two interior surfaces. A first RJ-type contact terminal configuration is positioned along one of the interior surfaces, and a second RJ-type contact terminal configuration is positioned along another interior surface, wherein the second RJ-type contact terminal configuration has a different configuration than the first RJ-type contact terminal configuration, and the first and second contact terminal configurations are adapted to selectively mate with the RJ-type male plug when the plug is oriented with respect to the first and second contact terminals.
These and other advantages of the present invention will be clarified in the description of the preferred embodiment taken together with the attached drawings in which like reference numerals represent like elements throughout.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
John Scale
Lieutenant Colonel John Dymoke Scale DSO, OBE (born 27 December 1882) was a MI6 (SIS) agent, originally from Merthyr Tydfil in Glamorgan. He was involved in a British propaganda unit called the Anglo-Russian Commission in St Petersburg, where his responsibilities included running Mohammed Beck Hadjetlaché. Scale served in the British Indian Army and was first sent to Russia in 1912. He qualified as a Russian translator in 1913 and rejoined the 87th Punjabis in 1914. In 1916, Scale served with Stephen Alley and Oswald Rayner under Mansfield Cumming at the time of the murder of Grigori Rasputin. Whilst a Captain in St Petersburg, in the weeks leading up to the killing, Scale is recorded as having met with Oswald Rayner and Felix Yusupov in the diary of their chauffeur, William Compton. Several other books and documentaries have claimed Scale's involvement in Rasputin's death, or even alleged that Scale commanded Rayner to fatally shoot him. A letter from Alley to Scale provides the best evidence of British Intelligence involvement in the murder and torture that reads :
In March 1918, Scale was an SIS bureau commander in Stockholm.
References
Category:1882 births
Category:World War I spies for the United Kingdom
Category:Year of death missing
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
Read the request stream multiple times
We have a Tomcat ValveBase class implementation that is doing the authentication for our servlet container apps. One way to authenticate our http REST calls is to sign them and then check the signature on the server side. We do this check in the ValveBase class.
The problem is that after we consume the InputStream of the request (for validating the signature), we pass the request (org.apache.catalina.connector.Request) to the next valve implementation and by the time it hits the servlet, the inputStream is gone. No content to be delivered, since it was consumed at the signature verification procedure.
In the javax.servlet api, you can use an HttpServletRequestWrapper to implement your own ServletRequest and pass the real request as a constructor argument. In that case, we were able to avoid the situation where the content was read only once, but in the case of the catalina Request, seemed to be more delicate than we thought. Any ideas? Thanks.
A:
There is a long standing enhancement request open against Tomcat to support wrappers for use in Valves in a similar manner to Filters.
The bug includes a patch that is likely to need updating for Tomcat 7.0.x.
Given that you are already using a custom valve adding the patch may not be too much of a leap. With that patch in place, you should be able wrap the internal Request object and solve this problem in a similar manner to the Filter solution (which I assume involves saving a copy of the request body - watch out for DoS issues).
This is, of course, completely untested. As an incentive to try it, if it does work and you provide the updated patch (attach it to the Bugzilla report) I'll look at getting it included in Tomcat 8.0.x and 7.0.x (providing it doesn't require any changes to the existing API).
|
{
"pile_set_name": "StackExchange"
}
|
How Were Samurai Paid?
Samurai were paid by their feudal lords, the Daimyo, in rice or land. As Japan became more peaceful and the need for warriors decreased, many samurai moved into administrative positions or became tradesmen.
Samurai, who were in the service of feudal lords, were paid in units of rice called koku. One koku was equivalent to the amount of rice needed to feed a man for one year. Sometimes they were paid in gold coins called ryo, one ryo being equivalent to one koku.
The amount of rice a piece of land could produce was also measured in koku. The land would be worked by a lord's peasants. Some of the rice produced was collected as tax, while some was distributed to the lord's samurai as a stipend. The rice could be traded for coins so that the samurai could purchase goods and services from the merchant class. Some samurai were given land in return for their loyalty, giving them the ability to grow their own food and generate wealth.
After the Meiji Restoration, when feudalism was abolished and samurai were no longer allowed to carry swords, the samurai class became bureaucrats, farmers or tradesmen to make up for the lost income.
|
{
"pile_set_name": "Pile-CC"
}
|
"Captain's log, stardate 46041.1." "We have located the USS Yosemite, a science vessel sent to observe a remote plasma streamer." "The ship has not been heard from in days." "Magnify." "The last report says they were observing at medium range." "Maybe they went in, got more than they bargained for." "Hail them." " No response." " Life signs?" "Scanners cannot penetrate the plasma streamer's distortion field." " Can we tractor them out?" " No." "Ionic interference is too heavy." " I'll take a shuttle in." " Too risky." "You could be pulled in." "Bridge to Engineering." "Mr. La Forge, can we beam over?" "We can, but we might not get a lock to bring them back." "If we bridged our transporter system to theirs we might cut through the ionic field." "That's a good idea, Barclay." "Captain, I think we can do it by bridging the transporters." "Acknowledged." "Meet Riker in transporter room three." "Aye, sir." "Barclay, I'll need a systems engineer." "I'll ask Ensign Dern to join you." "I meant you, Barclay." "Shouldn't I stay here and set up the remote link?" "Dern can do that." "Let's go." " Status, Mr. O'Brien?" " I have to send you one at a time and transport will take longer." " How much longer?" " Twice the normal time." " You're in for a bumpy ride." " What do you...?" "What exactly do you mean by a bumpy ride?" "There may be static." "You'll feel some tingling, but don't worry." "Let's do it." "Mr. Worf." "Engaging system interlock." "Pattern buffers synchronized." "Phase-transition coils at stand-by." "Energizing." "He's there." "I'll go next." "Engaging interlock." "Buffers synched." "Energizing." "I'm ready." "Engaging interlock." "Buffers in synch." "Wait a minute." "An ionic fluctuation in the matter stream." "No problem." "OK." "Energizing." "Reg, you're up." "Aye, sir." "Engaging interlock." "Buffers in synch." " Phase coils are..." " Sorry." "I can't do this." "Space, the final frontier." "These are the voyages of the Starship Enterprise." "Its continuing mission, to explore strange new worlds,... ..to seek out new life and new civilizations,..." "..to boldly go where no one has gone before." "Reg, you were faced with a difficult transport." "Anyone would have been apprehensive." "Tell that to Cmdr La Forge and the team." "I'm sure they understand." "As soon as you feel OK, join them." "No." "Reg, is there something you're not telling me?" "Actually..." "This is not the..." "This is not the first time I've been apprehensive." "Every single time that I tried to do it," "I had this certain feeling." "I guess you could call it mortal terror." " Why have you kept it a secret?" " Why?" "Because my career in Starfleet would be over." "That's why." " I doubt that." " I've always avoided it." "You wouldn't believe the hours I've logged in shuttlecraft." "The idea of being deconstructed, molecule by molecule, it's more than I can stand." "Even when I was a child," "I always had a dreadful fear that if ever I was dematerialized, ... ..that I would never come back again whole." "I know, it sounds crazy." "It's not crazy at all." "You are being taken apart molecule by molecule." "You're not the first person to have anxiety about transporting." "We can desensitize you to this type of fear." "It's a slow and gradual process, but it works." "It does?" "How?" "You might try a relaxation technique, like plexing." " Plexing?" " Yes, it's a Betazoid method." "The next time you feel nervous, you stimulate a neural pressure point, like this." "There's a nerve cluster just behind the carotid artery." "It stimulates the brain to release natural endorphins." "Plexing." "Sounds easy enough." "Here." "You know, I feel better already." "I think I can do this." "There's no need to rush." "We talked about confronting fear." "The best way out is through." "You said that once." " I suppose I did." " I'm gonna beam over." "I can do it!" "There's no sign of anyone." " Maybe they abandoned ship." " Unlikely." "The escape pods are still on board." " There was an explosion." " What caused it?" "I've ruled out a core failure or systems overload." "Blast analysis indicates the explosion originated here... ..in the transport chamber." "How?" "The transporter is still functional." "Could they have beamed aboard an explosive device?" "Cmdr Riker, could you come here?" "Excuse me." "Lt Joshua Kelly." "He was the ship's engineer." "How did he die?" "He has burns over his body, but I don't think they were the cause." "I'd like to take him back to do an autopsy." " You're sure, sir?" " Sure." " Please, proceed." " It'll only take a minute." "It should be smooth." "Good." "I know how you feel, sir." "You're afraid of transporting, too?" "No." "Arachnids." "Sickening, crawly little things, don't you think?" " All those legs." " Spiders never bothered me." "A few years back," "I was called in to reroute an emitter array on Zayra IV." "The entire system was infested with Talarian hook spiders." "Have you ever seen one?" "Their legs are half-a-metre long." "I had a choice." "Do I let the emitter blow itself to hell?" "Or do I crawl in the Jeffries tube with 20 hook spiders?" "What happened?" "It was the hardest thing I ever did." "I got through it." " After that I was never so afraid." " Thanks." "Energizing." "Welcome aboard." " You ready to work?" " Yes, sir." "Good." "Start downloading the ship's science logs over there." "Four crew members unaccounted for." "Did you get anything?" "I don't know how these fit in." "They were around the transporter." "They look like pieces of sample container." "We'll take these back to the ship for analysis." "Mr. Barclay." " Glad you could join us." " Me too, sir." "The Ferengi claim two freighters were destroyed by Cardassians in your sector." "Is there any evidence?" "I'm loathe to believe them about anything... ..but there was evidence of Cardassian weapons." "If the Cardassians also attacked the Yosemite, it could indicate a large movement in this sector." "I have an away team on board." "The initial report indicates there was an explosion, but not if it was an attack." " How soon until you know?" " A few hours." "If it looks like Cardassians, I'll contact you." "Very well." " Bridge to Capt Picard." " Go ahead, Mr. Data." "The away team is returning to the Enterprise." "Acknowledged." "Have Cmdr Riker come to my ready room." "Aye, sir." "La Forge to transporter room three." "Ready." "Stand by, Commander." "Barclay to Enterprise." "One to beam back." "Stand by, sir." "See, sir?" "That wasn't so bad, was it?" "Mission logs, science and medical logs, all scrambled." "Looks like the blast wiped out the ship's core memory." "We could try to reconstitute the data stream." "It's worth a try." "Commander, has anything strange happened to you during transport?" "Like what?" "I don't know." "Anything out of the ordinary." "No, not really." "This looks hopeless." "We won't get anything from these logs." "Maybe this broken container I found can tell us something." "Let's get this thing back into one piece." "I mean, have you ever seen anything?" " Where?" " During transport." "Sometimes my visor picks up resonance patterns." "It's actually kind of pretty." "Why?" "I'm just wondering." "What are you getting at?" "Did you see something?" "When I was returning to the Enterprise, ... ..I could've sworn I saw something in the stream." "Something?" "In the phased matter round me." "At first I thought it was some kind of energy discharge." "But then it flew toward me and touched my arm." "How could something be in there?" "Molecules flying apart, half-phased?" "I mean, it's impossible, isn't it?" "We better check it out." "When we're done here, we'll run a full diagnostic, alright?" "Alright." "The confinement-beam subsystems check out." " So do the phase-transition coils." " Pattern buffer is fine." "Emitter pads, targeting scanners, they're all working fine." "This system's clean." "So is the science vessel's." "There's a lot of energy in the beam." "Maybe you saw a surge in the matter stream." "Yeah." "I'll scan the Heisenberg compensators." " Chief, you've done enough." " It's no problem." "Give me a hand." "You know, maybe ignorance really is bliss." "Sir?" "If I knew less about these things, they wouldn't scare me." "I remember the day in Dr Olafson's transporter-theory class, when he was talking about the body being converted into billions of kiloquads of data, zipping through subspace, and I realized there's no margin for error." "One atom out of place..." "You never come back." "It's amazing people aren't lost all the time." "With all due respect," "I've done this for 22 years and haven't lost anybody." "Yes, but you realize if the imaging scanners are off even one thousandth of a percent..." "That's why each pad has four redundant scanners." "If one fails, the others take over." "How many accidents have there been in the last ten years?" "Two?" "Three?" "There are millions of people who transport safely every day." "I've heard of problems." "What about transporter psychosis?" "Transporter psychosis?" "There hasn't been a case in 50 years." "Not since they perfected the multiplex pattern-buffers." "Transporting really is the safest way to travel." "I'd like a closer look at those burns." "Take a tissue sample, please." "Damage to the epidermis only." "Initiate a circulatory probe." "His heart's beating." "Cardio-stimulator." "Now." "It's gone." "Neuro-electrical activity in the cerebral cortex." "Nothing." "Now his respiratory system's active." "What the hell is going on?" "Water, ten degrees Celsius." "Computer, access Starfleet medical database." "Tell me about..." "Describe the disorder transporter psychosis." "Transporter psychosis was diagnosed in the year 2209 by researchers on Delinia II." "No, stop." "All I need is..." "What causes it?" "Neurochemical molecules break down during transport, affecting motor functions, autonomic systems and the brain's higher reasoning centres." "What are the symptoms?" "Victims suffer from paranoid delusions, multi-infarct dementia, hallucinations..." "Hallucinations?" "What kind of hallucinations?" "Victims experience somatic, tactile and visual hallucinations, accompanied by psychogenic hysteria." "Peripheral symptoms include sleeplessness, accelerated heart rate, diminished eyesight leading to acute myopia, painful spasms in the extremities,... ..and in most cases, dehydration." "Computer." "What is the treatment for transporter psychosis?" "There is no known treatment." "The autopsy showed ionization in every one of Lt Kelly's systems." "I think that caused the muscular contractions." "From where did the ionization come?" "There's evidence of electrical burns on his body, as if he was exposed to ionized gas or high-energy plasma." "Plasma?" "There's no way they could have been exposed." "Unless it was from the streamer." "Is there evidence of a breach?" "Could the plasma enter the ship?" "No." "Data, what's the report on that broken sample container?" "The analysis of the fragments is not yet complete." "Captain, if there's ionization in those fragments, it could mean they beamed aboard material from the streamer." "If the plasma exploded, that would explain a few things." "Let me know when the analysis is complete." "From the look of these fractures, the explosion came from within." "The container does show evidence of residual ionization." "I believe you are correct." "It was used to store plasma." "So they were collecting samples from the streamer." "They had the proper container." "How could it have exploded?" "Perhaps we should recreate their experiment to see what happens when matter is beamed aboard in the same way." "Good idea." "We'll prepare a new container." "I don't want to take any chances." "Set up a containment field." "Aye, sir." " Are you alright, Lieutenant?" " I'm fine." "Yes, thank you." "Geordi, Lt Barclay appears inordinately preoccupied with his physiological condition." "I have seen him check his pulse and vision several times over the last 20 minutes." "Thanks, Data." " Yes, sir?" " Are you OK?" " I'm just fine, sir." " You look a little pale." "I do?" "Look, Reg..." "It's been a long couple of days." "Get some rest." "We got everything under control here." "I think I'll do that." "Thank you." " La Forge to Counsellor Troi." " Go ahead." "Counsellor, do you have a minute?" "Lt Barclay, I've been calling you." "Why haven't you responded?" "What are you doing?" " Walking." " So I see." "Where to?" "Nowhere." "I don't get to see these decks often." "Stellar Cartography." "I thought that was deck 11 ." "I was having trouble sleeping." "I'm trying to wear myself out." "A perfectly normal thing to be doing." "Cmdr La Forge said you seemed nervous this morning." "I'm always nervous." "Everybody knows that." "He also mentioned that you saw something in the transporter beam." "I was wrong." "They checked the transporter." "I imagined it." "You don't sound very convinced of that." "Counsellor, I appreciate your concern in this matter." "But I wish you wouldn't continue." "I'm perfectly fine." "Mr. Barclay, you're exhausted and highly agitated." "I cannot allow a crew member to endanger himself or others." "I'm not endangering anyone and I wish..." "I think it is in your interest to take a leave of absence." "I'm temporarily relieving you of duty." "Fine." "Do what you have to do, Counsellor." "Computer, more birds." "End stress-reduction program." " Water." " Specify temperature." "I don't care." "Just give me water." "Calm, calm." "Stay calm." "Alright, computer, let's try some music." "Something soothing." "Sir, couldn't this wait till the morning?" "No." "Chief, I've been reviewing the transport logs." "What are these energy variations that keep appearing?" "There was one when I transported." "They're just... ionic fluctuations, a result of our interlock with the Yosemite." "A fluctuation occurred while I was inside the matter stream." "It's nothing to worry about, sir." "I need you to transport me to the science ship and back again." "And while I'm in the beam, can you recreate an ionic fluctuation?" "I guess so." "But, sir, what for?" "Cmdr La Forge wants some tricorder readings." " We can do that here." " No!" "The sensors may not be sensitive enough." "I'm giving you an order, Mr. O'Brien." "Aye, sir." "If you don't mind an observation, sir, ... ..you forgot your tricorder." "Either there's something there or I'm crazy." "I've got to know." "You can understand that, can't you?" "Yes, sir, I can." "Stand by, sir." "Wake the senior staff." "And then I saw it again just 20 minutes ago." "It was the same, exact thing, just moving around in the transporter beam." "Let me get this straight." "You think it was alive?" "It... was dark and distorted and it had what looked like a mouth." "A mouth?" "I don't see anything wrong." "Why didn't you tell anybody about your arm?" "Well, I thought I was hallucinating, that I had... ..that it was transporter psychosis." "But now I know it was real." "I was the only one who experienced ionic fluctuations in the transport." "Maybe that's why I saw it." "Mr. Barclay, I'm told that you've been under considerable strain." "Isn't it possible that you simply imagined...?" "I know what you're going to say." "I've acted strange." "But believe me," "I would never have called you in here unless I was certain." "Mr. La Forge, get Mr. O'Brien." "Take that transporter system apart piece by piece if you have to." "Mr. Worf, I want a level-three security alert." "Aye." "I'll run a microcellular scan of Mr. Barclay's arm." "It takes time, but if there's a problem, I'll find it." "Keep me apprised." "Dismissed." "I'm picking up minute levels of ionization from the tissue of his left arm." "The patterns correspond exactly to those in Lt Kelly's body... and in the sample container." "There's no question." "You have been exposed to the plasma." "So, something did happen in the transporter beam." "You might've been exposed on the science ship." "You did say something touched your arm during transport." "That's exactly where the ionization is focused." " Does this pose a threat to him?" " It might." "I'll run a base-pair correlation for any sign of DNA breakdown." "Cmdr La Forge and I were planning to recreate the explosion." "That might give us some answers." "Permission to continue?" "Granted." "Tell Mr. O'Brien to take primary transporters off line." "I don't want further contaminations." " Make sure you take precautions." " Aye, sir." "I'd like you to wear this monitoring device." "It will tell me if there's increased ionization." "Yes, Doctor." "Structural reinforcement is at 240 percent." "Activating containment field." "That should do it." "We've locked on to the plasma." "Beam aboard a sample." "OK." "What would they do first?" "Standard would be a resonance-frequency scan." "That sounds like a good place to start." "Initiating resonance sweep." "Frequency range at three..." "Barclay, check the containment field." "The field is at maximum but it is holding." "My visor's picking up biomagnetic energy." "Highly complex patterns." "You know, I think these things are alive." "Life forms?" "That is correct." "They appear to be microbes that exist within the distortion field of the plasma." "We didn't detect them until we ran the scan." "Apparently, they didn't like it." " They shattered the container." " Which caused an explosion similar to the one on the science ship." "When we linked up with their transporter, one or more of the microbes got into ours." "We think they're caught in the buffer." "It might explain what you saw." "But what I saw was much bigger than a microbe." "Normal spatial relationships are distorted in the matter stream, exaggerating your perceptions." "Some of these microbes are also in your body." "Inside me?" "They were in Lt Kelly's body, causing the contractions during the autopsy." "The biofilter should have screened them out." "The microbes exist simultaneously as matter and energy." "The biofilter cannot distinguish them." "If we held Barclay suspended in mid-transport at the point where matter loses molecular cohesion..." "The molecules would emit nucleonic particles." "We may be able to derive a pattern the computer would recognize." "Then the biofilters could screen the microbes." "I think this'll work, Reg." "You'd suspend me?" "I don't like the sound of this." " We'd have to keep you in there." " How long?" "30, 40 seconds, tough to tell." "I think it'd be safe." "But if I'm in the matter stream too long...?" "Your pattern would degrade and your signal would be permanently lost." "After 15 seconds, you might feel light-headed." "Try to stay calm." "It's important not to move around too much." "Initializing the pattern buffer." " Holding at stand-by." " Ready, Reg?" "Energize." "Molecular resolution at 60 percent." "Engaging static mode." "His pattern is locked and holding." "Starting biofilter scan." "Signal's holding." "The imaging scanners haven't isolated the microbes." "I'll increase molecular dispersion." " His resolution's now 55 percent." " I can hold him together." "Commander, the resolution's 50 percent." "Bring him back." "I know, give me one more second." "We need to increase phase-transition frequency." "Aye, sir." "The scanners are actuating." "Got it." "Pattern acquisition... positive." "Programming biofilter." "Don't worry, Reg, this won't hurt a bit." "A 92 percent increase in mass." "There's something in the beam with him." " Security to transporter room three." " Right away." "I'm setting up a force field round the chamber." "Drop the force field." "There are more in the beam." "Grab them and hold on." "Understood." "Follow me." "Reg, what happened?" "When I saw that there was more than one," "I thought the other crew were trying the same thing." "We're infected with something." "Lt Kelly tried to reprogram the biofilter." "Looks like he pushed molecular dispersion past integrity point." "Your patterns got caught." "The residual energy must have amplified the charge in the buffer and stopped your patterns degrading." "Captain's log, stardate 46043.6" "The reprogrammed biofilter was effective in removing the alien microbes from all crew members." "The microbes have been returned to the plasma streamer." " Chief." " Lieutenant." "I'm glad you could make it." "This is the first time we've spoken outside the transporter room." " I've always avoided you." " Why?" "You run the transporters that I hate." "At least, I used to." "So, what's in the box?" "I thought you might like to meet Christina." "Christina, Lt Barclay." "It's your pet spider." "Lycosa tarantula." "Don't worry, she won't bite." "She's... very large." "I found her on Titus IV." "Almost stepped on her by accident." "I'll get us a couple of drinks." " Keep an eye on her." " Sure." "Chief!"
|
{
"pile_set_name": "OpenSubtitles"
}
|
Eyes on You (EP)
Eyes on You is the eighth extended play by South Korean boy band Got7. It was released by JYP Entertainment and iriver Inc on March 12, 2018. Like their other albums, the members also participated in co-writing and co-producing the songs with the help of other producers including Mirror BOY, D.ham, Munhan Mirror. It contains seven songs, including the singles "Look" and "One and Only You" featuring Hyolyn.
Track listing
Charts
Weekly charts
Year-end charts
Singles
"Look"
"One and Only You"
Certifications
Awards
Music programs
Release history
See also
List of Gaon Album Chart number ones of 2018
List of K-pop songs on the Billboard charts
List of K-pop albums on the Billboard charts
References
Category:2018 EPs
Category:Got7 albums
Category:K-pop EPs
Category:Korean-language EPs
Category:JYP Entertainment albums
Category:IRIVER EPs
|
{
"pile_set_name": "Wikipedia (en)"
}
|
---
author:
- 'C. Horellou'
- 'H.T. Intema'
- 'V. Smol[č]{}i[ć]{}'
- 'A. Nilsson'
- 'F. Karlsson'
- 'C. Krook'
- 'L. Tolliner'
- 'C. Adami'
- 'C. Benoist'
- 'M. Birkinshaw'
- 'C. Caretta'
- 'L. Chiappetti'
- 'J. Delhaize'
- 'C. Ferrari'
- 'S. Fotopoulou'
- 'V. Guglielmo'
- 'K. Kolokythas'
- 'F. Pacaud'
- 'M. Pierre'
- 'B.M. Poggianti'
- 'M.E. Ramos-Ceja'
- 'S. Raychaudhury'
- 'H.J.A. Röttgering'
- 'C. Vignali'
bibliography:
- 'Horellou\_final\_20180723.bib'
date: 'Received 6 March 2018 / Accepted 12 July 2018'
subtitle: 'A tale of two radio galaxies in a supercluster at z = 0.14'
title: 'The XXL Survey: [XXXIV]{}. Double irony in XXL-North'
---
[We show how the XXL multiwavelength survey can be used to shed light on radio galaxies and their environment.]{} [Two prominent radio galaxies were identified in a visual examination of the mosaic of XXL-North obtained with the Giant Metrewave Radio Telescope at 610 MHz. Counterparts were searched for in other bands. Spectroscopic redshifts from the GAMA database were used to identify clusters and/or groups of galaxies, estimate their masses with the caustic method, and quantify anisotropies in the surrounding galaxy distribution via a Fourier analysis.]{} [Both radio galaxies are of FR [i]{} type and are hosted by early-type galaxies at a redshift of 0.138. The first radio source, named the Exemplar, has a physical extent of $\sim 400$ kpc; it is located in the cluster XLSSC 112, which has a temperature of $\sim 2$ keV, a total mass of $\sim10^{14} M_\odot$, and resides in an XXL supercluster with eight known members. The second source, named the Double Irony, is a giant radio galaxy with a total length of about 1.1 Mpc. Its core coincides with a cataloged point-like X-ray source, but no extended X-ray emission from a surrounding galaxy cluster was detected. However, from the optical data we determined that the host is the brightest galaxy in a group that is younger, less virialized, and less massive than the Exemplar’s cluster. A friends-of-friends analysis showed that the Double Irony’s group is a member of the same supercluster as the Exemplar. There are indications that the jets and plumes of the Double Irony have been deflected by gas associated with the surrounding galaxy distribution. Another overdensity of galaxies (the tenth) containing a radio galaxy was found to be associated with the supercluster.]{} [Radio galaxies can be used to find galaxy clusters/groups that are below the current sensitivity of X-ray surveys.]{}
Introduction
============
{width="8.8cm"} {width="8.8cm"}
The study of radio galaxies benefits enormously from a multiwavelength approach, from the X-ray to the radio (e.g., @2006LNP...693...39W). X-ray emission can be produced both by the active galactic nucleus (AGN) and the diffuse surrounding hot gas. Optical and infrared imaging and spectroscopy provide valuable information on the host galaxy, which most of the time is an early-type galaxy with very little or no star formation (some host galaxies, however, do contain dust and gas in a disk; e.g., ). In the radio, synchrotron radiation directly shows the extent and structure of the emitting plasma that contains relativistic electrons and magnetic fields. The jets may cover tens to hundreds of kiloparsecs before terminating in extended lobes. These jets and lobes may heat the intergalactic gas, displace material, and create cavities and shocks that are seen in the X-ray surface brightness distribution of galaxy clusters (e.g., @2005Natur.433...45M). This process, called radio-mode AGN feedback, is believed to play an important role in preventing gas infall on the host galaxy and regulating its evolution (e.g., @croton06).
The XXL survey (@pierre16, hereafter ) is particularly well suited to the study of AGN and galaxy clusters. With a total observing time of 6.9 Ms, it is the largest X-ray survey carried out by XMM-[*Newton*]{}. It covers two fields of 25 square degrees each, one in the southern hemisphere (XXL-South) and the other at an equatorial declination (XXL-North). The X-ray observations have been complemented by an extensive multiwavelength program.[^1]
In this paper we discuss two double-lobed radio galaxies (see Fig. \[figCFHTcolGMRTcont\]) that we have identified in the mosaic of XXL-North obtained with the Giant Metrewave Radio Telescope (GMRT). The GMRT-XXL-N 610 MHz survey is presented in this issue (@smolcic2018, hereafter ). It is of interest to compare the properties of the two sources as they are both at the same redshift ($z\simeq 0.14$) and the exact same data set is available for both. Their redshift is near the peak of the redshift distribution of the most securely detected clusters in XXL (, hereafter ). As our analysis shows, the radio galaxies are both part of the same supercluster, but their immediate surroundings are different.
The first radio galaxy appears regular, with symmetric jets leading to two radio lobes. It is located at the center of a cluster and hosted by the brightest cluster galaxy (BCG), both of which have been detected and characterized in studies of the sample of the brightest 100 XXL clusters (, hereafter ; ; , hereafter ; , hereafter ; @2016MNRAS.462.4141L, hereafter ). Because of its appearance with twin jets and plumes and its association with an early-type galaxy in a cluster, we refer to this source in the remainder of this paper as [*the Exemplar*]{}. The other radio galaxy stands out for its very large extent (a total length of $7\farcm56$, or 1100 kpc in our adopted cosmology[^2]) and its peculiar shape reminiscent of two reversed question marks, the reason why we named it [*the Double Irony.*]{}[^3]
------------ ----------- ----------------- ------------- -----------------------
Survey Frequency Resolution Pixel size $\sigma$
(MHz) ($\arcsec$) ($\arcsec$) (mJy beam$^{-1}$)
TGSS ADR1 150 25 6.4 5.0
GMRT-XXL-N 610 6.5 1.9 0.060
FIRST 1400 $6.8\times 5.4$ 1.8 0.15
NVSS 1400 45 15 0.45 (I), 0.29 (Q, U)
------------ ----------- ----------------- ------------- -----------------------
\[tabRadioData\]
This paper is organized as follows. The available data sets are presented in Sect. \[SectData\]. In Sect. \[SectExemplar\] we discuss the Exemplar radio galaxy, its host galaxy, and host cluster; the radio images are presented and analyzed. Section \[SectDbleIrony\] is about the Double Irony and follows a similar structure; an overdensity of galaxies is found. In Sect. \[SectCompa\] the two radio galaxies are compared and discussed. In particular, the distributions of surrounding galaxies are examined in relation to the orientation of the radio galaxies to search for environmental effects. In Sect. \[SectSuperclu\] it is shown that the group of galaxies associated with the Double Irony radio galaxy is part of the same supercluster as the Exemplar’s cluster and this large-scale structure is discussed. In Sect. \[SectDiscussionRadiogalsSuperclu\] we discuss the occurrence of radio galaxies in superclusters and their potential use as tracers of the large-scale structure. We conclude in Sect. \[SectSummary\].
Data and data analysis {#SectData}
======================
Radio {#SectDataRadio}
-----
As detailed below, we used images at three different frequencies obtained from four different surveys carried out with the Very Large Array (VLA) and the GMRT. These surveys have different sensitivities and angular resolutions, and are also sensitive to different angular scales. The characteristics of the data are summarized in Table \[tabRadioData\].
The most important data set is the GMRT-XXL-N 610 MHz radio continuum survey described in . XXL-North contains the XMM-LSS area that was observed earlier with the GMRT (@tasse06, [-@tasse07]). The rest of the XXL-North field was recently observed at higher sensitivity, and the data were combined. The final mosaic has an angular resolution of $6\farcs5$. The two radio galaxies discussed here are located outside the XMM-LSS region, in the newly covered region of 12.66 square degrees that has an average sensitivity of 45 $\mu$Jy beam$^{-1}$.
The other radio continuum data were taken from the following, publicly available surveys:
- the Tata Institute of Fundamental Research (TIFR) GMRT Sky Survey (TGSS) first alternative data release (TGSS ADR1) at 150 MHz and 25$\arcsec$ resolution [@TGSS_ADR1];
- the Faint Images of the Radio Sky at Twenty Centimeters (FIRST) at 1.4 GHz, $6\farcs8\times 5\farcs4$ resolution (@first95; @first15);
- the NRAO VLA Sky Survey (NVSS) at 1.4 GHz, 45$\arcsec$ resolution (@NVSS). NVSS also contains polarization information. We downloaded Stokes $Q$ and $U$ images from the NVSS website[^4] and produced images of the polarized intensity and of the polarization angle using the task [POLC]{} in the Astronomical Image Processing System[^5] ([AIPS]{}) that corrects for the Ricean bias in polarized intensity [@1974ApJ...194..249W].
Total-intensity images do not always do justice to the details of the surface brightness distributions in astronomical sources. Images of the norm of the intensity gradient, $|\nabla I|$, have been used to reveal the paths of jets and substructures in radio galaxies (e.g., @2011MNRAS.417.2789L). We computed images of $|\nabla I|$ at 610 MHz using a Sobel filter (Sobel & Feldman 1968, unpublished, reported in Wikipedia[^6]). Flux densities and spectral indices were measured within defined regions. The statistical uncertainties on the flux density measurements were calculated as $\sigma \sqrt{N_{\rm beam}}$, where $\sigma$ is the standard deviation of the noise and $N_{\rm beam}$ is the number of beams within the region. The survey images were used and no attempt was made to re-image the data to match the $(u,v)$ ranges or the imaging weighting scheme. Only the FIRST image of the Double Irony may have extended emission that has been filtered out (the largest angular scale of FIRST is $2'$), and this is discussed in Sect. \[SectDbleIronySpectralIndex\]. The sources are barely resolved in TGSS and in NVSS, and some of the features of the Double Irony are only marginally detected in TGSS, leading to large uncertainties in the flux measurements that would not be improved much by re-imaging.
Throughout the paper we use the following convention for the radio spectral index, $\alpha$: $S_\nu \propto \nu^\alpha$, where $S_\nu$ is the flux density at frequency $\nu$. The uncertainties on the spectral indices measured between two frequencies were calculated using standard error propagation, $$\Delta\alpha =
\sqrt{
\left(
\frac{\Delta S_1}{S_1}
\right)^2
+
\left(
\frac{\Delta S_2}{S_2}
\right)^2
}
\Bigg/
\ln\left(\frac{\nu_2}{\nu_1}\right) \, ,
\label{equncalpha}$$ where $\Delta S_i$ is the uncertainty on the flux density $S_{i}$ measured at frequency $\nu_i$ and $\nu_2 > \nu_1$.
A systematic uncertainty of 10% on each flux density measurement (due to uncertainties on the absolute flux calibration and from the imaging process) results in the following systematic uncertainties on the spectral indices (Eq. \[equncalpha\]): $$\Delta\alpha_{\rm sys}(\nu_1,\nu_2) =
\left \{
\begin{tabular}{l}
0.10\\
0.17\\
0.06\\
\end{tabular}
\right.
{\rm if\, } \frac{\nu_1}{\nu_2} =
\left \{
\begin{tabular}{l}
150 MHz/610 MHz\\
610 MHz/1400 MHz\\
150 MHz/1400 MHz\\
\end{tabular}
.
\right.
\label{eqDeltaAlphaSys}$$
Multiwavelength
---------------
We used data from the following surveys:
- The X-ray measurements with XMM-[*Newton*]{} and the XXL project are described in . The cluster catalogs are presented in and , and the AGN catalogs by (; ) and by @lucio2018 ([-@lucio2018], hereafter ).
- There is a large overlap between XXL-North and the CFHT-LS W1 region covered in several optical bands by the Canada-France-Hawaii Telescope (CFHT). All XXL-North clusters but five have $ugriz$ photometry from MegaCam [@2012AJ....143...38G].
- The Sloan Digital Sky Survey (SDSS) Data Release 14 (SDSS DR14[^7]) contains optical and near-infrared images of our fields and spectra of some of the sources.
- The Galaxy and Mass Assembly (GAMA) database[^8] contains spectra, spectroscopic redshifts, and information on the detected spectral lines for the host galaxies of our two radio sources and other galaxies in the field [@2018MNRAS.474.3875B].
- The Wide-field Infrared Survey Explorer (WISE; @2010AJ....140.1868W) has detected the host galaxies of our two radio sources in several bands.
The Exemplar {#SectExemplar}
============
[lll]{} Quantity & Value & Notes Cluster name & XLSSC 112 &(1)\
RA$_{\rm cluster}$(J2000) & $32\fdg514$ &(1)\
Dec$_{\rm cluster}$(J2000) & $-5\fdg462$ &(1)\
$z_{\rm cluster}$ & 0.139 &(1)\
$N_{\rm galaxies}$ & 14 &(1)\
$L_{\rm 500,MT}^{\rm XXL}$ &$(0.61\pm0.08) \cdot 10^{43}$ erg s$^{-1}$ &(1)\
$F_{60}$ & $(5.89\pm0.62) \cdot 10^{-17}$ Wm$^{-2}$ &(2)\
$T_{\rm 300~kpc}$ & $1.76^{+0.25}_{-0.15}$ keV &(2)\
$M_{\rm 500,MT}$ & $(9.0 \pm4.1) \cdot 10^{13} M_\odot$ &(2)\
$r_{\rm 500,MT}$ & 0.653 Mpc &(2)\
$M_{\rm gas,500}$ & $(0.42\pm0.12)\cdot 10^{13} M_\odot$ &(3)\
$r_{\rm 500,WL}$ & $0.6^{+0.1}_{-0.2}$ Mpc &(4)\
$M_{\rm 500,WL}$ & $0.8^{+0.6}_{-0.5} \cdot 10^{14} M_\odot$ &(4)\
$M_{\rm 200,WL}$ & $1.2^{+0.9}_{-0.8} \cdot 10^{14} M_\odot$ &(4)\
RA$_{\rm BCG}$ (J2000) &$32\fdg5093$ &(5)\
Dec$_{\rm BCG}$ (J2000) &$-5\fdg4678$ &(5)\
Offset from X-ray center &$24\farcs5$ &(5)\
$z_{\rm BCG}$ & 0.138 &(5)\
$M_{\rm BCG}$ &$5.35^{+0.41}_{-0.29} \cdot 10^{11} M_\odot$ &(5)\
$M_{\rm stellar}$ & $2.13^{+0.30}_{-0.56}\cdot10^{11}~M_\odot$ &(6)\
SFR1 (2–20 Myr ago) & $0~M_\odot$ yr$^{-1}$ &(6)\
SFR2 (20–600 Myr ago) & $5.6~M_\odot$ yr$^{-1}$ &(6)\
SFR3 (0.6–5.6 Gyr ago) & $46.2~M_\odot$ yr$^{-1}$ &(6)\
SFR4 ($> 5.6$ Gyr ago) & $14.9~M_\odot$ yr$^{-1}$ &(6)\
LW-age & $3.6\times10^9$ yr &(6)\
MW-age & $5.8\times10^9$ yr &(6)\
$\sigma_V$ &$282.0\pm 8.6$ km s$^{-1}$ &(7)\
$z_{\rm SDSS\, DR14}$ &$0.13818\pm 0.00002$ &(7)\
$z_{\rm GAMA}$ &0.13814 &(8)\
In Fig. \[figExemplarOptXrayradio\] we show a multiband false-color image of the field of the Exemplar: the optical image is shown in green, the X-ray emission in blue and in contours, and the 610 MHz radio emission from the GMRT in red. Several X-ray point sources are seen, in addition to diffuse X-ray emission associated with a cluster. The two brightest X-ray point-like sources (X3 and X4) are galaxies with optical counterparts and photometric redshifts in SDSS DR14; they are not associated with the cluster (see caption of Fig. \[figExemplarOptXrayradio\]). The fainter X-ray source X1 coincides with the radio source S1 (see discussion in Sect. \[subSectExemplarRadio\]). It has an optical galaxy counterpart, but no redshift is available.
Host galaxy in the cluster XLSSC 112 in the supercluster XLSSsC N03
-------------------------------------------------------------------
### Cluster XLSSC 112
The Exemplar is located at the center of a galaxy cluster listed among the 100 brightest clusters in XXL (). Cataloged as XLSSC 112, the cluster has a mean redshift of $z = 0.139$ calculated from the spectroscopic redshifts of 14 member galaxies (Table \[tabTheOtherOne\]). The intracluster gas has a temperature of $\sim1.8$ keV measured within the central radius of 300 kpc . The total cluster mass was estimated from a mass–temperature scaling relation and from weak gravitational lensing , yielding consistent values of about 10$^{14} M_\odot$ within a radius $r_{500} = 0.6$ Mpc (the parameter $r_{500}$ is the radius within which the mean density is 500 times the critical density of the universe at the cluster’s redshift).
![Multiband false-color image of the Exemplar: X-ray emission in the \[0.5–2\] keV band in blue, optical emission ($i$-band CFHT image) in green, radio emission (GMRT 610 MHz) in red. The ten contours showing the X-ray surface brightness increase logarithmically between $3\times 10^{-17}$ and $6\times 10^{-16}$ erg s$^{-1}$ cm$^{-2}$. Four X-ray point sources are visible in the image, labeled X1 to X4 above the yellow circles that indicate their positions. The point sources were subtracted before calculating the flux density of the cluster given in and quoted in Table \[tabTheOtherOne\], but they are shown in this image. X3 corresponds to 3XLSS J021002.1-052655 and X4 to 3XLSS J020958.2-052853 in the XXL point source catalog . There are optical counterparts to X3 (a galaxy at photometric redshift of $0.028\pm 0.014$, SDSS J021002.25-052655.5) and to X4 (a galaxy at a photometric redshift of $0.351\pm0.118$, SDSS J020958.27-052853.5). The other two X-ray sources did not match the criteria to be included in the X-ray catalog. The size of the image is about $4'\times4'$. Diffuse X-ray emission is seen, and is associated with the galaxy cluster XLSSC 112. []{data-label="figExemplarOptXrayradio"}](fig2ExemplarRGBradioOptXrays.png){width="8.8cm"}
### Supercluster XLSSsC N03
The cluster was found to be part of a larger structure of seven clusters, all at a redshift of $z \simeq 0.14$, with a total mass of about $10^{15} M_\odot$ (XLSSC-b; ). Five such superstructures were identified in the sample of the 100 brightest clusters in XXL using a friends-of-friends algorithm in 3D space (). New supercluster candidates were found in the larger sample of 365 clusters cataloged by @adami2018 ([-@adami2018], hereafter ). The five superclusters identified in were confirmed. However, the supercluster hosting the Exemplar, which was described as a double structure in , with an eastern component of four clusters and a western component of three clusters (including XLSSC 112), has been split into two superclusters in the new study: the four clusters in the eastern part form XLSSsC N08, at a mean redshift of $z = 0.141$, and the three clusters in the western part joined five other clusters to form a larger structure, the supercluster XLSSsC N03, at a mean redshift of $z = 0.139$ . XLSSC 112 is therefore affiliated to a supercluster with eight cluster members. This is discussed in Sect. \[SectSuperclu\] (see also Fig. \[figSuperclu\]).
{width="8.8cm"} {width="8.8cm"} {width="8.8cm"} {width="8.8cm"}
### Brightest cluster galaxies and the nearest neighbor {#subSectExemplarBCG}
The properties of the BCG of the 100 brightest XXL clusters have been studied in . @guglielmo2018a ([-@guglielmo2018a]; ) have assembled a catalog of optically detected galaxies in the X-ray–detected clusters and groups of XXL-North. In Fig. \[figGAMAspectra\] (top panel) we show the GAMA spectrum of the BCG, typical of an old stellar population. We fitted the GAMA spectrum using the full spectral fitting code [SINOPSIS]{} () and obtained an estimate of its stellar mass of about $2\times10^{11}~M_\odot$ (using a @2003PASP..115..763C initial mass function). This is lower than had been estimated from broadband photometry (). This analysis also provided an estimate of the star formation history of the galaxy. The characteristics of the cluster and of its BCG are summarized in Table \[tabTheOtherOne\].
There is a second, smaller galaxy located 7$\arcsec$ to the NE of the BCG (about 17 kpc on the sky) at a similar redshift ($z = 0.13623$, galaxy GAMA J021002.58-052759.8). Companions like this are very common for radio sources of this type (e.g., 3C296).
Radio {#subSectExemplarRadio}
-----
### Radio morphology
![Grayscale image of the norm of the intensity gradient of the Exemplar at 610 MHz. It reveals the path of the jets and substructures in the brightness distribution of the radio lobes. The beam is shown in orange in the bottom left corner. []{data-label="figExemplarGradI"}](fig4ExemplarGMRTgrad.png){width="8.8cm"}
Figure \[figSarcasmAllradioimages\] shows the four radio continuum images of the Exemplar used in this work. The Exemplar has two jets and lobes that appear clearly in the higher resolution images (GMRT 610 MHz and the FIRST 1.4 GHz images, Figs. \[figSarcasmAllradioimages\]b and d), but are not resolved in the lower resolution images (TGSS and NVSS, Figs. \[figSarcasmAllradioimages\]a and c). The TGSS ADR1 catalog of [@TGSS_ADR1] lists three individual Gaussian sources.[^9] The NVSS catalog lists two sources[^10] [@NVSS]. The XXL-GMRT-610 MHz catalog[^11] lists three resolved sources within a radius of 4$'$ from the core of the Exemplar . From end to end the radio source stretches over 160$\arcsec$ (396 kpc) in the GMRT 610 MHz image.
Zooming into the central region, we see that the radio surface brightness peaks about $3\farcs5$ (8.7 kpc) away from the optical center of the BCG on either side of the jets, with a flux density of about 8.8 mJy in the NW and 9.8 mJy to the SE at 610 MHz. There are two corresponding sources in the FIRST catalog[^12]. We note that these brighter radio spots are located just outside the optical extent of the host galaxy. No cataloged FIRST source is found at the central location of the BCG. The radio core is unresolved and is likely embedded in the jet and/or is synchrotron self-absorbed.
The jets have position angles of $+130^\circ$ and $-50^\circ$ (measured counterclockwise from the north). They are straight out to a distance of 32$\arcsec$ to the NW and 40$\arcsec$ to the SE from the center of the BCG, at which point they change direction and turn right (that is, the NW jet turns toward the W and the SE jet turns toward the E). The NW jet moves into two brighter regions embedded in a diffuse lobe. The SE jet continues to grow fainter but remains collimated for another 15$\arcsec$ before reaching a diffuse lobe. This morphology suggests an interaction with the surrounding medium at a distance of about 80 kpc (30$\arcsec$) to the NW and about 90 kpc (35$\arcsec$) to the SE.
Two compact radio sources are seen near the radio galaxy. They are named S1 and S2 in Tables \[tabExemplarFlux\] and \[tabExemplarAlpha\] and their flux densities and their spectral index were estimated between 610 MHz and 1.4 GHz (FIRST image). The spectral indices are used to estimate the flux at 150 MHz. The contributions of those two sources are subtracted from the total flux densities measured within the regions outlined in Fig. \[figSarcasmAllradioimages\]. The radio photometry of the Exemplar is presented in the coming section.
In Fig. \[figExemplarGradI\] we show an image of the gradient of the intensity in the GMRT image at 610 MHz, $|\nabla I|$. The path of the jet is clearly delineated in white where the intensity has a local maximum. Strong gradients are seen near the inner jets where the jet bends as it enters the NW lobe, and at the extremity of the SE lobe. Similar features have been seen in deep images of nearby low-luminosity radio galaxies (@2011MNRAS.417.2789L).
---------------------------------------------------- -------------------- ------------------- --------------------------- --------------------------
Region $S_{\rm 150~MHz}$ $S_{\rm 610~MHz}$ $S_{\rm 1.4~GHz}$ (FIRST) $S_{\rm 1.4~GHz}$ (NVSS)
(mJy) (mJy) (mJy) (mJy)
S1 25.73 $\pm$ 3.11 3.27 $\pm$ 0.14 0.97 $\pm$ 0.40 –
S2 6.74 $\pm$ 3.30 2.48 $\pm$ 0.14 1.38 $\pm$ 0.40 –
A (SE lobe) 61.14 $\pm$ 9.46 32.25 $\pm$ 0.43 8.21 $\pm$ 1.19 12.98 $\pm$ 0.37
B (NW lobe) 71.98 $\pm$ 7.85 38.76 $\pm$ 0.36 13.11 $\pm$ 1.00 10.91 $\pm$ 0.28
C 97.07 $\pm$ 10.94 56.64 $\pm$ 0.50 29.89 $\pm$ 1.40 30.60 $\pm$ 0.41
C $\setminus$ S2 90.33 $\pm$ 11.42 54.16 $\pm$ 0.52 28.52 $\pm$ 1.45 29.23 $\pm$ 0.44
T 284.79 $\pm$ 26.63 138.16 $\pm$ 1.21 44.81 $\pm$ 3.38 74.95 $\pm$ 0.99
T$_{\rm A \cup B \cup C}$ 230.20 $\pm$ 16.45 127.66 $\pm$ 0.75 51.21 $\pm$ 2.09 54.50 $\pm$ 0.63
T$_{\rm (A \cup B \cup C) \setminus (S1 \cup S2)}$ 197.72 $\pm$ 28.60 121.90 $\pm$ 1.30 48.87 $\pm$ 3.63 52.16 $\pm$ 1.09
T $\setminus$ (S1 $\cup$ S2) 252.32 $\pm$ 27.01 132.40 $\pm$ 1.23 42.47 $\pm$ 3.43 72.61 $\pm$ 1.01
---------------------------------------------------- -------------------- ------------------- --------------------------- --------------------------
------------------------------ -------------------------------------- --------------------------------------- ---------------------------------------
Region $\alpha_{\rm 150~MHz}^{\rm 610~MHz}$ $\alpha_{\rm 610~MHz}^{\rm 1400~MHz}$ $\alpha_{\rm 150~MHz}^{\rm 1400~MHz}$
(1) (2) (3)
$\Delta\alpha_{\rm sys}$ 0.1 0.17 0.06
A (SE lobe) $-0.46 \pm 0.11$ $-1.65 \pm 0.18$ $-0.69 \pm 0.07$
B (NW lobe) $-0.44 \pm 0.00$ $-1.30 \pm 0.09$ $-0.84 \pm 0.05$
C $-0.38 \pm 0.08$ $-0.77 \pm 0.06$ $-0.52 \pm 0.05$
C $\setminus$ S2 $-0.36 \pm 0.09$ $-0.77 \pm 0.04$ $-0.51 \pm 0.06$
T $-0.52 \pm 0.07$ $-1.36 \pm 0.09$ $-0.60 \pm 0.04$
T $\setminus$ (S1 $\cup$ S2) $-0.46 \pm 0.08$ $-1.37 \pm 0.06$ $-0.56 \pm 0.05$
------------------------------ -------------------------------------- --------------------------------------- ---------------------------------------
: Spectral index measurements in the different regions of the Exemplar shown in Fig. \[figSarcasmAllradioimages\].
\[tabExemplarAlpha\]
### Luminosity, flux density, spectral index {#SectExemplarSpectralIndex}
Flux densities were measured at the three different frequencies in the regions indicated in Fig. \[figSarcasmAllradioimages\]; the values are listed in Table \[tabExemplarFlux\].
The spectral luminosity, $L_\nu$, can be calculated following $$\left(
\frac{L_{\nu}}
{{\rm W~ Hz}^{-1}}
\right) =
5.257\times 10^{22} \,
\left(
\frac{S_{\nu}}
{{\rm mJy}}
\right)
\left(
\frac{D_L}
{{\rm 662.8~Mpc}}
\right)^2 \, .
\label{eqLnu}$$
In the commonly used classification of [@fanaroff74], FR [i]{} radio galaxies have been observed to have a spectral luminosity lower than $5\times 10^{25}$ W Hz$^{-1}$ at 178 MHz, while the FR [ii]{} radio galaxies are more luminous. The Exemplar has a total flux density of about 250 mJy at 150 MHz (taking an average of the value obtained by summing up the different regions and by measuring in a larger ellipse). For a spectral index of $-0.7$, this gives $L_{\rm 178~MHz}\simeq 1.5\times 10^{25}$ W Hz$^{-1}$, making it an FR [i]{} radio galaxy. Its morphology is also that of an FR [i]{}.
Spectral indices were calculated in the regions overlaid on Fig. \[figSarcasmAllradioimages\] (Table \[tabExemplarAlpha\]). The central region has flatter spectral indices than the lobes. The spectral indices calculated at high frequencies are systematically steeper than those at low frequencies[^13] Using the NVSS 1.4 GHz image and the TGSS 150 MHz image gives intermediate values.
Unfortunately, the quality of the data does not allow a quantitative analysis of the evolution of the cosmic-ray electrons, and deeper images with matching angular resolutions are required to measure the curvature of the radio spectrum.
### Polarization
No polarization is seen in the NVSS images of the Exemplar. The lobes have a flux density at 1.4 GHz ranging between 8 and 13 mJy, and the flux density of the core/central region is about 30 mJy (Table \[tabExemplarFlux\]). The noise level in polarized intensity is about 0.4 mJy in NVSS. So we place a $3\sigma$ upper limit on the fractional polarization of 15% in the lobes and 4% in the central region.
The Double Irony as a giant radio galaxy {#SectDbleIrony}
========================================
[llc]{} Quantity & Value & Notes\
RA$_{\rm galaxy}$(J2000) &$30\fdg97696$ & (1)\
Dec$_{\rm galaxy}$(2000) &$-4\fdg23247$ & (1)\
$z_{\rm spec}$ & 0.13751 & (1)\
Central point source:\
RA$_{\rm X-ray}$(J2000) & $30\fdg977942$ & (2)\
Dec$_{\rm X-ray}$(J2000) & $-4\fdg232405$ & (2)\
$F_{\rm X,[0.5-2]~keV}$ & $2.4\times 10^{-15}$ erg s$^{-1}$ cm$^{-2}$ & (2)\
$F_{\rm X,[2-10]~keV}$ & undetected &(2)\
$L_{\rm X,[0.5-2]~keV}$ & $1.26\times10^{41}$ erg s$^{-1}$ &(3)\
Limit on cluster:\
Count rate & $< 0.032$ ct s$^{-1}$ &(4)\
$T_{\rm 300~kpc}$ & $< 1.26$ keV &(4)\
$M_{500}$ & $< 5.13\times 10^{13} M_\odot$ &(4)\
$L_{500}$ & $< 1.76\times 10^{42}$ erg s$^{-1}$ &(4)\
$F_{\rm X,[0.5-2]~keV, < 300~kpc}$ &$< 2.82\times 10^{14}$ erg s$^{-1}$ cm$^{-2}$ &(4)\
$M_{\rm stellar}$ & $(2.97\pm0.25)\times10^{11}~M_\odot$ &(5)\
SFR1 (2–20 Myr ago) & $0~M_\odot$ yr$^{-1}$ &(5)\
SFR2 (20–600 Myr ago) & $1.48~M_\odot$ yr$^{-1}$ &(5)\
SFR3 (0.6–5.6 Gyr ago) & $33.08~M_\odot$ yr$^{-1}$ &(5)\
SFR4 ($> 5.6$ Gyr ago) & $42.36~M_\odot$ yr$^{-1}$ &(5)\
LW-age & $5.7\times10^9$ yr &(5)\
MW-age & $7.9\times10^9$ yr &(5)\
The Double Irony stands out in XXL-North because of its large angular size and peculiar shape. As we show in Sect. \[sectDbleIronyRadio\], it has a total physical length of about 1.1 Mpc, which makes it a member of the rare class of giant radio galaxies (GRGs), i.e., Mpc-sized radio galaxies. Samples of GRGs have been built based on searches in large radio surveys at GHz frequencies such as the Westerbork Northern Sky Survey[^14] (e.g., ); the NVSS[^15] and the FIRST survey[^16] (e.g., , ; ; @2016ASSP...42..231S; @2016ApJS..224...18P), or the Sydney University Molonglo Sky Survey[^17] (e.g., @2005AJ....130..896S). The total number of known GRGs is about 300 [@2017MNRAS.469.2886D], but this number is likely to increase rapidly with the advent of radio surveys at lower frequencies where the flux densities are stronger because most of the emission comes from the more numerous lower energy relativistic electrons that have a longer lifetime. Surveys carried out for example with the LOw Frequency ARray (LOFAR, ), MSSS[^18] [*Herschel*]{}-ATLAS, and LoTSS[^19] have begun to reveal even larger GRGs than those discovered at higher frequencies (e.g., @2016MNRAS.462.1910H; ). GRGs are interesting in their own right, but also as probes of their environment. As radio lobes expand beyond the halos of their host galaxies, they may interact with the so-called Warm-Hot Intergalactic Medium (WHIM), a diffuse plasma at a temperature of $10^5$ to $10^7$ K that is associated with galaxies in the large-scale structure (e.g., @2008ApJ...677...63S; @2009MNRAS.393....2S). They are therefore useful probes of the intergalactic medium and possibly even of its evolution if they can be found at high redshift [@2007AcA....57..227M]. The large sizes of GRGs do not seem to be due to stronger nuclear activity (@1999MNRAS.309..100I) and GRGs do not seem to form a class that is fundamentally different from normal-sized radio galaxies (; @2012MNRAS.426..851K). The general picture is that GRGs are able to grow to larger sizes because of their lower density environments and/or simply because they are older (e.g., @2008MNRAS.385.1286J). In this section we begin by examining the host galaxy of the Double Irony; then we look at the X-ray information and the galaxy distribution in the optical before presenting the radio maps; finally the possible nature of this unusual radio galaxy is discussed. In the next section the two radio galaxies will be compared and more quantities will be derived.
Host galaxy
------------
![Multiband false-color image of the Double Irony: X-ray emission in blue displayed at the noise level, optical emission ($i$-band image from the CFHT) in green, radio emission from the GMRT at 610 MHz as yellow contours. []{data-label="figDbleIronyOptXrayradio"}](fig5DbleIronyRGB.png){width="8.8cm"}
{width="8.8cm"} {width="8.8cm"} {width="8.8cm"} {width="8.8cm"}
We identify a galaxy with a spectroscopic redshift of $z= 0.13751$ (GAMA J020354.47-041356.8) as the host galaxy of the Double Irony based on its position with respect to the radio contours. The GAMA spectrum is displayed in Fig. \[figGAMAspectra\] (bottom panel). It is very similar to the spectrum of the host galaxy of the Exemplar, and reflects an old stellar population. We derived an estimate of its stellar mass of about $3\times10^{11}~M_\odot$. This analysis provides some insight into the star formation history of the galaxy: it has no ongoing star formation, but had a star formation rate (SFR) of about 1.5 $M_\odot$ yr$^{-1}$ $\sim20$–600 Myr ago, and an even higher SFR of $\sim30$–45 $M_\odot$ yr$^{-1}$ in the more distant past (see Table \[tabDbleIrony\]).
There is also an X-ray point-like counterpart to the optical/near-IR host (see Table \[tabDbleIrony\]). The source is detected only in the \[0.5 – 2\] keV band, and the detection is not of sufficient quality to say anything about the nature of the X-ray spectrum (thermal or non-thermal). The corresponding X-ray luminosity is $1.26\times10^{41}$ erg s$^{-1}$. found a relation between the X-ray luminosity and the SFR of nearby star-forming galaxies. Using their relation (their Eq. 14) gives a SFR estimate of about 28 $M_\odot$ yr$^{-1}$, which is significantly higher than that inferred from the analysis of the optical spectrum. It is very unlikely that the X-ray emission is related to star formation; since the X-ray emission is point-like and the optical major axis of the galaxy is about 20$\arcsec$ (more than double the full width at half maximum (FWHM) of the point response function of XMM-[*Newton*]{}), it indicates that the X-ray emission does not come from hot gas surrounding the elliptical galaxy. We conclude that it is likely to come from the AGN. The signal is, however, very weak, with only about 12 counts, and a detection likelihood of 15.6, just above the threshold of 15 below which sources are considered spurious and not included in the catalog (@lucio2018).
Host cluster/group {#SectDbleIronyHostCluster}
-------------------
In the following we review the information that can be gathered from X-ray and optical observations on the possible existence of a cluster or group around the Double Irony.
– X-ray. No cluster is listed at the location of the Double Irony radio galaxy in the new XXL catalog of X-ray detected clusters . From the 1$\sigma$ upper limit on the count rate within a radius of 300 kpc, we were able to place an upper limit on the X-ray flux, temperature, and luminosity within a radius $r_{500}$ using scaling relations established for XXL clusters (see Table \[tabDbleIrony\]): a cluster/group around the Double Irony would have a temperature lower than 1.3 keV and a mass within $r_{500}$ lower than $5.1\times10^{13}~M_\odot$. This is significantly lower than the corresponding values measured for the Exemplar’s cluster.
A closer inspection of the X-ray image (Fig. \[figDbleIronyOptXrayradio\]) does not reveal any clear extended emission. The noise varies across the image and the quality of the data does not allow us to say anything about the presence or absence of gas interaction with the radio lobes.
– Optical.
A search in the GAMA database led to the identification of 32 galaxies with spectroscopic redshifts in the $0.13 \leq z \leq 0.15$ range and within a radius of $6.3'$ (0.92 Mpc) of the core of the Double Irony. This radius was chosen as it corresponds to $r_{200}$ (which is approximately the virial radius) of the Exemplar galaxy cluster. The actual virial radius of the Double Irony galaxy might be different, but this shows that the radio galaxy is surrounded by a large number of galaxies. In Fig. \[figDbleIronyGAMAgalaxies\] we show the GMRT 610 MHz image of the Double Irony radio galaxy in red, superimposed on an optical $i$-band image from the CFHT in blue. The yellow circles indicate the positions of some of the galaxies in the field cataloged in the GAMA survey; their spectroscopic redshifts are also indicated. We defer the analysis of the spectroscopic redshifts to Sect. \[sectDiscusssionClusterMass\] (cluster mass estimates) and Sect. \[sectCompaEnvironment\] (study of the anisotropy of the surrounding galaxy distribution).
Radio {#radio}
-----
### Radio morphology {#sectDbleIronyRadio}
![Grayscale image of the norm of the intensity gradient of the Double Irony at 610 MHz. The path of the jets is clearly visible, in particular the abrupt turn in the region of the Elbow. The beam is shown in the bottom left corner. []{data-label="figDbleIronyGradI"}](fig7DbleIronyGMRTgrad.png){width="8.8cm"}
In Fig. \[figDbleIronyAllradioimages\] we show the radio images of the Double Irony. The structure of the source is best seen in the GMRT 610 MHz image that combines high angular resolution and good sensitivity.[^20] The yellow cross indicates the location of the center of the host galaxy. Several features appear clearly in this image: the central east–west jets, a bright lobe to the southwest, a diffuse plume farther out (SW2), a bright region to the northeast (known as the “Elbow”), and a second diffuse plume-like feature to the north that breaks into several lumps. These five main features are also seen in the lower resolution (45$\arcsec$) 1.4 GHz image from the NVSS. The higher resolution FIRST image at the same frequency is badly affected by stripes that prevent us from seeing the two plumes in the north and the southwest. The TGSS ADR1 image is noisy as well. Only the lobe in the SW1 region is clearly visible. While the lumps of emission in the north and in the Elbow are discernible, it is clear that flux measurements in these regions are affected by the artifacts from the imaging.
Most striking perhaps are the multiple bends: on the eastern side the nearly horizontal jet turns abruptly, but remains collimated until the bright Elbow; the continued structure to the north of the Elbow is fainter and at about 90 degrees from its original direction. On the SW side, the jet shows a small deviation before entering the SW1 lobe, and the SW2 plume is at another angle. The entire structure covers about 4$'$ and shows a remarkable symmetry by rotation of 180 degrees, which suggests that it is not a superposition of several sources, but forms one system. We examined optical images and could not find any counterparts to the individual features described above.
The XXL-GMRT-610 MHz catalog[^21] lists seven resolved sources within 4$'$ of the core of the Double Irony . Figure \[figDbleIronyGradI\] shows the GMRT 610 MHz intensity gradient map. The white line (which corresponds to the peaks in the intensity map where the gradient is zero) extends far out and traces the path of the jets. Areas of strong gradients in the inner region and in the Elbow region have a flatter spectral index (Table \[tabDbleIronyAlpha\]). This has been observed in more nearby low-luminosity FR [i]{} radio galaxies by [@2011MNRAS.417.2789L]. Following the jet’s path out to the 5$\sigma$ contour of the GMRT 610 MHz map, we measure a total length of $\sim 7.56'$, which corresponds to a projected physical size of 1100 kpc. [*This means that the Double Irony is a GRG.*]{}
{width="8.8cm"} {width="8.8cm"}
### Luminosity, flux density, spectral index {#SectDbleIronySpectralIndex}
-------- -------------------- ------------------- --------------------------- --------------------------
Region $S_{\rm 150~MHz}$ $S_{\rm 610~MHz}$ $S_{\rm 1.4~GHz}$ (FIRST) $S_{\rm 1.4~GHz}$ (NVSS)
(mJy) (mJy) (mJy) (mJy)
C 31.60 $\pm$ 10.06 23.75 $\pm$ 0.45 10.95 $\pm$ 1.23 11.54 $\pm$ 0.84
Elbow 17.09 $\pm$ 9.14 20.83 $\pm$ 0.40 7.59 $\pm 1.10$ 8.67 $\pm$ 0.68
N 136.25 $\pm$ 23.15 77.76 $\pm$ 1.03 7.06 $\pm 2.79^*$ 29.29 $\pm$ 1.82
SW1 98.17 $\pm$ 12.54 46.29 $\pm$ 0.56 14.43 $\pm 1.52^*$ 23.98 $\pm$ 0.99
SW2 99.51 $\pm$ 22.84 63.97 $\pm$ 1.02 22.93 $\pm 2.77^*$ 27.88 $\pm$ 1.79
T 434.95 $\pm$ 79.70 205.76 $\pm$ 3.54 21.57 $\pm 9.65^*$ 131.23 $\pm$ 6.27
-------- -------------------- ------------------- --------------------------- --------------------------
--------------------------- -------------------------------------- ---------------------------------------
Region $\alpha_{\rm 150~MHz}^{\rm 610~MHz}$ $\alpha_{\rm 150~MHz}^{\rm 1400~MHz}$
$\Delta \alpha_{\rm sys}$ 0.1 0.17
C $-0.20 \pm 0.23$ $-0.45 \pm 0.15$
Elbow $+0.14 \pm 0.38$ $-0.30 \pm 0.24$
N $-0.40 \pm 0.12$ $-0.69 \pm 0.08$
SW1 $-0.54 \pm 0.09$ $-0.63 \pm 0.06$
SW2 $-0.31 \pm 0.16$ $-0.57 \pm 0.11$
T $-0.53 \pm 0.13$ $-0.54 \pm 0.08$
--------------------------- -------------------------------------- ---------------------------------------
: Spectral index measurements in the different regions of the Double Irony shown in Fig. \[figDbleIronyAllradioimages\].[]{data-label="tabDbleIronyAlpha"}
From the NVSS flux density measurement (Table \[tabDbleIrony\]) we derive a spectral luminosity at 1.4 GHz of $6.9\times10^{24}$ W Hz$^{-1}$ (Eq. \[eqLnu\]), or of $2.9\times10^{25}$ W Hz$^{-1}$ at 178 MHz assuming a spectral index of $-0.7$. This is about twice the spectral luminosity of the Exemplar, but still in the range of luminosities of FR [i]{} radio galaxies. Some GRGs are powerful radio galaxies with FR [ii]{} structures (e.g., @1996MNRAS.279..257S; @1999MNRAS.309..100I; ); as the sensitivity of observations increases, more FR [i]{} GRGs (or hybrid FR [i]{}/FR [ii]{}) with lobes of lower surface brightness are found (e.g., ; @2005AJ....130..896S). In Tables \[tabDbleIronyFlux\] and \[tabDbleIronyAlpha\] we list the values for the flux densities and the spectral indices measured in different regions displayed in Fig. \[figDbleIronyAllradioimages\]. The spectral indices measured between 150 MHz and 1.4 GHz are systematically steeper than the low-frequency spectral indices measured between 150 MHz and 610 MHz, an indication of spectral aging of the cosmic-ray electrons.
The Elbow and the central region both have a relatively flat spectral index, but no systematic pattern is seen. We intend to model the evolution of cosmic-ray electrons in the Double Irony and in the Exemplar and to derive spectral age estimates by analyzing more sensitive low-frequency data (pending GMRT observations below 500 MHz).
### Polarization
Figure \[figDbleIronyPolar\] shows images of the polarization detected by NVSS[^22] at 1.4 GHz. The left panel shows the polarized intensity image overlaid with vectors showing the direction of the electric field of the polarized wave rotated by 90$^\circ$. In the absence of Faraday rotation, this would correspond to the direction of the magnetic field component on the plane of the sky, $B_\perp$, in the source. The length of the vectors is proportional to the fractional polarization.
The vectors follow the large-scale distribution of the total intensity rather well, except in the very center where they are almost perpendicular to the direction of the inner jets and may trace a poloidal magnetic field. We note, however, that one vector per pixel is shown, so the vectors (like the pixels) are correlated, and variations on scales smaller than the synthesized beam (45$\arcsec$, shown in the bottom left corner) are smoothed out.
In the right panel of Fig. \[figDbleIronyPolar\] we show an image of the fractional polarization. The position of the core is indicated by a cross. It appears that the fractional polarization peaks on the right side of the core, while the left side is less polarized. This could be a signature of the Laing–Garrington effect (@1988Natur.331..149L; @1988Natur.331..147G): stronger external Faraday depolarization [@1966MNRAS.133...67B] occurs along the line of sight of the counter-jet due to the longer path length through a fluctuating magnetic field component. This would mean that [the eastern part of jet points away from us, and the more strongly polarized western jet points toward us.]{}
Dedicated observations of the polarization at several radio frequencies are required to map the magnetic field pattern in this radio galaxy and measure the Faraday rotation.
Nature of the Double Irony {#SectDiscussionNatureDbleIrony}
--------------------------
The nature of the Double Irony radio galaxy remains somewhat of a mystery. Given the very large extent on the sky, we suspect that the inclination is not very large, perhaps 30$^\circ$ to 45$^\circ$ relative to the plane of the sky, but the structure is probably not entirely coplanar. The radio galaxy displays a remarkable symmetry by rotation of 180$^\circ$, except for the strong bend near the Elbow in the northeast, while the western part is more regular.
Similar features have been seen in other FR [i]{} radio galaxies. For example 3C 31 has two 90-degree elbows, and the overall radio structure could be nicely reproduced in the dynamical model of an unbound gravitational encounter with a neighboring galaxy (@1978MNRAS.185..527B). The morphology of the Double Irony is similar to that of NGC 326, a radio galaxy that has been the subject of different interpretations, such as jet precession (@1978Natur.276..588E), jet realignment due to gravitational interaction between two galaxies (@1982AJ.....87..602W), or buoyancy forces that redirect the lobes into regions of lower pressure in the surrounding medium (@1995ApJ...449...93W). In the following we discuss some physical effects that may have shaped the Double Irony.
### A restarted radio galaxy?
Some other GRGs have a morphology that is indicative of a recurrent nuclear activity. For example [@2002ApJ...565..256S] found an inner double radio structure within larger edge-brightened lobes. The two bright regions of the Double Irony (the SW lobe and the Elbow) and the two diffuse outer plumes beyond the SW lobe and the Elbow may be due to two separate events, where the two brighter inner features would be more recent. However, it would be a coincidence for the restarting lobes to have just reached the bends. It seems more likely that it is a quasi-steady structure influenced by the intergalactic medium.
### Gravitational interaction with the second brightest galaxy {#sectDiscussion2ndGal}
A second galaxy is clearly visible to the NE of the host of the Double Irony. It is the next brightest galaxy within a radius of 1 Mpc and is listed in SDSS (SDSS J020357.62-041321.5). With a spectroscopic redshift (from BOSS) of 0.13433, the line-of-sight velocity difference with the host of the Double Irony is 840 km s$^{-1}$. It is at a distance on the sky of 59$\arcsec$, or a projected distance of 146 kpc. An analysis of the spectrum in the GAMA database (GAMA J20357.62-041321.5) yields a stellar mass of about $0.9\times10^{11}~M_\odot$, which is about one-third of the stellar mass of the host of the Double Irony (Table \[tabDbleIrony\]). There is no sign of tidal perturbations in the optical surface brightness distribution of this galaxy, which is an argument against a prograde encounter with the host of the Double Irony. Nevertheless, given the relative line-of-sight velocity difference and their projected distance, the two galaxies could have been interacting gravitationally in the past $\sim100$ Myr, causing a motion of the host of the Double Irony in the general direction of the second galaxy during the lifetime of the radio source. The drop-like morphology of the SW1 radio lobe is consistent with [a global motion of the AGN of the Double Irony toward the east, in the general direction of the companion]{}.
An observation of the distribution of atomic hydrogen via the H[i]{} 21 cm line in the companion galaxy may reveal a possible interaction between the two galaxies. The galaxy must contain some atomic hydrogen gas since it is disk-like and star forming: from the GAMA spectrum, we estimated a SFR of about 0.8 $M_\odot$ yr$^{-1}$ in the last 2–20 Myr and a higher SFR earlier (8.8 $M_\odot$ yr$^{-1}$ 20–600 Myr ago and about 19 $M_\odot$ yr$^{-1}$ 0.6–5.6 Gyr ago). The detection of H[i]{} tidal tails would constrain the dynamical history of this galaxy. Unfortunately, its redshift places the H[i]{} line near 1250 MHz, in a region that is usually affected by radio-frequency interference.
### Interaction with the gaseous environment
In the absence of a deeper X-ray image not much can be said about the surrounding medium of the Double Irony. The upper limit on the X-ray emission provides an upper limit on the temperature of about 1.3 keV and a limit on the mass within $r_{500}$ of about $5\times 10^{13} M_\odot$ (Table \[tabDbleIrony\]). The ejected radio-emitting plasma may have been able to travel farther out because of the low-density of the surrounding medium. The absence of significant X-ray emission may also indicate that the atmosphere of the cluster/group has been so spread out by the radio galaxy’s heating and pushing that the $n^2 L$ (density squared times pathlength) through the cluster has dropped from what it was when the radio source turned on. The change in direction of the outer plumes may also be a sign of backflow, as seen for instance in the FR [i]{} radio galaxies 3C 296 [@2006MNRAS.372..510L], 3C 270 [@2015MNRAS.450.1732K], or NGC 326 (@2012ApJ...746..167H). The circumgalactic medium (the gas located outside the optical body of a galaxy but inside the galaxy’s virial radius) extends in some cases on scales larger than 100 kpc () and the Double Irony may have interacted with the circumgalactic medium of its bright neighbor located beyond the bend and mentioned in the previous section.
Comparison of the two radio galaxies {#SectCompa}
====================================
{width="17.7cm"}
In Sect. \[SectSuperclu\] we show that the Double Irony and the Exemplar are part of the same large-scale structure, a supercluster at $z\simeq 0.14$. In this context it is of interest to compare the two radio galaxies and their environments.
In Sect. \[SectDiscussionMBH\] we estimate their black hole masses from scaling relations. In Sect. \[SectDiscussionLERGs\] we discuss the properties of the optical spectra of the host galaxies in relation to what is known from large samples of radio galaxies. In Sect. \[sectDiscusssionClusterMass\] we analyze the distribution of galaxies surrounding the radio galaxies and make estimates of the cluster/group masses. In Sect. \[SectDiscussionClusterAges\] we derive an age estimate from the properties of the two brightest galaxies in each cluster/group. Finally, in Sect. \[sectCompaEnvironment\] we examine the distributions of galaxies that surround each radio galaxy and quantify their degrees of anisotropy in relation to the orientation of the radio jets and lobes.
Estimation of the black hole masses {#SectDiscussionMBH}
-----------------------------------
There is a well-known correlation between the mass of the black hole and the stellar mass (bulge mass) of the host galaxy (e.g., @2000ApJ...539L...9F). This correlation is expressed as $$\log_{10}\left(
\frac{M_{\rm BH}}{M_\odot}
\right) =
a + b \log_{10}(X) \, ,$$ where $X$ is the stellar mass itself or an indicator of it (e.g., the velocity dispersion, the $K$-band absolute magnitude).
We have stellar mass estimates for both galaxies (Tables \[tabTheOtherOne\] and \[tabDbleIrony\]). Using the parameters given by [@2013ApJ...764..184M] in their fits to the stellar mass–black hole mass relation ($a = 8.56\pm 0.10$; $b = 1.34\pm0.15$), we obtain $$\begin{array}{lcl}
M_{\rm BH}^{\rm Exemplar} &\simeq &1.0\times10^9 M_\odot\\
\medskip
M_{\rm BH}^{\rm Double~Irony} &\simeq &1.6\times10^9 M_\odot \, .\\
\end{array}$$
For the Exemplar we can also use the value of the velocity dispersion from SDSS DR 14 (Table \[tabTheOtherOne\]). The fits of [@2013ApJ...764..184M] for elliptical galaxies when $X$ is the velocity dispersion in units of 200 km s$^{-1}$ have the following parameters: $a = 8.39 \pm 0.06$ and $b = 5.20 \pm 0.36$. This gives a black hole mass of about $1.5\times10^9$ $M_\odot$.
We see that [the black holes of the Double Irony and Exemplar both have a mass on the order of $10^9$ $M_\odot$]{}.
Brightest cluster galaxies {#SectDiscussionLERGs}
--------------------------
The host galaxy of the Double Irony is somewhat brighter than that of the Exemplar in all bands except the WISE W1 and W2 bands (the difference is largest in the $u$ band, Tables \[tabOptNIRphot\] and \[tabWISEphot\]).
The two host galaxies have very similar optical spectra (Fig. \[figGAMAspectra\]) characteristic of old stellar populations. Detection of H$\alpha$, H$\beta$, and \[O[ii]{}\] is reported in the GAMA database for both galaxies. However, there is no detection of high-excitation emission lines such as \[O[iii]{}\] that is seen in the host galaxies of high-excitation radio galaxies (HERGs). It has been shown that the most luminous radio galaxies (FR [ii]{}) are predominantly HERGs, while the hosts of the less powerful FR [i]{} radio galaxies do not exhibit such spectral lines. Low-excitation radio galaxies (LERGs) are in general hosted by galaxies that have a lower star formation rate, are located in clusters, and are more massive than the host galaxies of HERGs. They are believed to have different modes of accreting gas: the LERGs accrete mostly hot gas, whereas the HERGs accrete cold gas and radiate more efficiently (e.g., @hardcastle07; ; @smolcic09; @best12; @best14). [The Exemplar and the Double Irony can both be classified as LERGs.]{}
Both radio galaxies can be classified as FR [i]{} from their morphologies. By examining the mid-infrared photometry and colors of the host galaxies of radio galaxies, [@2014MNRAS.438..796S] was able to show that FR [i]{} and FR [ii]{} fall in different parts of the (W1-W2)-(W2-W3) color-color diagram ((\[3.4 $\mu$m\] - \[4.6 $\mu$m\])-(\[4.6 $\mu$m\]-\[12 $\mu$m\]), their Fig. 13). The WISE colors of the hosts of our radio galaxies are consistent with those of FR [i]{} radio galaxies (Table \[tabWISEphot\]).
Mass of the clusters {#sectDiscusssionClusterMass}
--------------------
The spectroscopic redshifts obtained from the GAMA database allow us to obtain a new mass estimate of the galaxy cluster that hosts the Exemplar, and to search for a cluster/group of galaxies around the Double Irony. The velocities $v_i$ in the rest frame of a cluster at redshift $z_{\rm cluster}$ are simply $$v_i = c \frac{z_i - z_{\rm cluster}}{1 + z_{\rm cluster}}\, ,$$ where $z_i$ are the redshifts of the galaxies.
The velocity dispersion within the virial radius can be used to obtain an estimate of the virial mass. However, this mass estimate relies on a single number and does not take into account the full distribution of galaxies on the sky and in redshift space. A more sophisticated method is the caustic method developed by [@1997ApJ...481..633D] and [@1999MNRAS.309..610D]. The idea is to estimate the group’s escape velocity from the characteristic trumpet shape of the distribution of galaxies in the plane defined by the group/cluster-centric distance and the line-of-sight velocities with respect to the median recession velocity of the group. We used the modified caustic mass estimation algorithm written by [@2012MNRAS.426.2832A] to calculate the total masses of galaxy groups in the GAMA group catalog (G$^3$Cv1; @2011MNRAS.416.2640R).
### Cluster/group membership
The first step is to identify the member galaxies of our two clusters/groups. We simply selected all the galaxies located within an estimated radius (which corresponds to $r_{200}$ for the Exemplar’s cluster) and within a certain spectroscopic redshift range: $$\left \{
\begin{tabular}{l}
$R < r_{200} = r_{500}/0.7 = 6.3' = 934$~kpc\\
$0.13 < z < 0.15\, .$\\
\end{tabular}
\right.$$ To estimate the radius $r_{200}$, we used the relation of : $r_{200} = r_{500}/0.7$, which gives $r_{200} = 934$ kpc $= 6.3'$ for the Exemplar’s cluster, using the value of $r_{500}$ given in Table \[tabTheOtherOne\]. In the absence of other information on the Double Irony, we took the same value of $r_{200}$ as for the Exemplar. The number of galaxies selected in this manner is given in Table \[tabClusterMasses\]. It should be noted that mass estimates depend on how accurately the cluster members have been selected. However, as we see below, the caustic mass method provides a way to assess cluster membership that is complete to a very large degree for massive clusters (@2013ApJ...768..116S).
### Caustic mass method
The caustic mass method requires the cluster’s redshift and velocity dispersion as inputs in addition to the catalog of positions and redshifts of the individual member galaxies. Rather than using a simple median value and standard deviation, we used the “gapper estimator” introduced by [@1990AJ....100...32B]. This estimator has been shown to be unbiased, even for groups with few member galaxies and robust to weak variations in group memberships. The estimated “scale” in velocity space (an estimator of the “velocity dispersion”) is calculated as $$\sigma_{\rm gap} = \frac{\sqrt{\pi}}{N(N-1)} \sum_{i = 1}^{N-1} w_i g_i \, ,
\label{eqBeersGap}$$ where $g_i = v_{i+1} - v_{i}$ is the velocity difference between each velocity pair computed after having sorted the galaxies’ recession velocities in the catalog in increasing order; the weights are $w_i = i(N-i)$, where $N$ is the number of galaxy redshifts and $i$ varies between 1 and $N-1$.
Following [@2011MNRAS.416.2640R], we increased the velocity dispersion by a factor $\sqrt{N/(N-1)}$ to take into account the fact that the central galaxy is moving with the center of mass of the halo (associated cluster); we also corrected for the measurement uncertainties on the recession velocities of the individual galaxies (50 km s$^{-1}$ for GAMA, @2011MNRAS.413..971D) by subtracting the contribution for the $N$ galaxies in the cluster ($\sigma_{\rm err} = 50 \sqrt{N}$ km s$^{-1}$): $$\sigma = \left(
\frac{N}{N-1} \sigma_{\rm gap}^2 - \sigma_{\rm err}^2
\right)^{1/2} \, .
\label{eqBeersGapcorr}$$For the Exemplar we used the position of the BCG as the central position. For the Double Irony we used the position of the host galaxy, which is also the brightest galaxy within a radius of about 1 Mpc.
In Fig. \[figCaustic\] we show the results of the caustic mass analysis. The dots show the distribution of the galaxies in phase space, and the magenta lines show the caustic lines fitted to the black parabola. The dots outside the caustics are, by definition, beyond the turn-around radius of the cluster and have a velocity that is greater than the escape velocity. The results are summarized in Table \[tabClusterMasses\].
While there are more galaxies in the area around the Double Irony, the estimated mass of the Double Irony cluster is about three times smaller than that of the Exemplar. The caustic mass analysis shows that many galaxies fall outside the caustic line (see Fig. \[figCaustic\]), which indicates that they are not cluster members.
![Result of the caustic mass analysis for the Exemplar (top panel) and the Double Irony (bottom panel). The dots shows the positions of the galaxies in phase space ($R$ is the distance on the sky to the brightest galaxy, and $v_{\rm los}$ is the line-of-sight velocity relative to the mean line-of-sight velocity of the galaxies in the region. The magenta lines show the caustic lines. Galaxies outside the caustic lines have a $v_{\rm los}$ greater than the escape velocity of the cluster/group. []{data-label="figCaustic"}](fig10CausticExemplar.png "fig:"){width="8.8cm"} ![Result of the caustic mass analysis for the Exemplar (top panel) and the Double Irony (bottom panel). The dots shows the positions of the galaxies in phase space ($R$ is the distance on the sky to the brightest galaxy, and $v_{\rm los}$ is the line-of-sight velocity relative to the mean line-of-sight velocity of the galaxies in the region. The magenta lines show the caustic lines. Galaxies outside the caustic lines have a $v_{\rm los}$ greater than the escape velocity of the cluster/group. []{data-label="figCaustic"}](fig10CausticDbleIrony.png "fig:"){width="8.8cm"}
### Scaling relations
Now let us estimate the mass within $r_{200}$ using a simple scaling relation with the velocity dispersion within the same radius, $\sigma_{200}$. [@2004cgpc.symp....1E] showed that the following relation is an excellent fit to a wide range of simulated clusters over a wide range of redshifts, $$M_{200} = \frac{10^{15} h^{-1} M_\odot}{H(z)/H_0}
\left(
\frac{\sigma_{200}}{1080~{\rm km~s}^{-1}}
\right)^3 \, ,
\label{eqM200}$$ where $H(z)$ is the value of the Hubble parameter at the redshift $z$ of the cluster. This relation is very close to the mass–velocity dispersion relation for a singular isothermal sphere truncated at the virial radius. For such a model in hydrostatic equilibrium, there is a simple relation between mass and temperature (e.g., @2005RvMP...77..207V) $$k_B T_{200} = ({\rm 8.2~keV})
\left(
\frac{M_{200}}
{10^{15} h^{-1} M_\odot}
\right)^{2/3}
\left(
\frac{H(z)}{H_0}
\right)^{2/3} \, ,
\label{eqIsoSphereT200M200}$$ where $k_B$ is the Boltzmann constant and $T_{200}$ is the temperature within $r_{200}$.
$M_{200}$ and $M_{500}$ are related by the factor $$M_{500} = M_{200}/1.35
\label{eqM500}$$ for an appropriate value of the concentration parameter.
The mass estimates are given in Table \[tabClusterMasses\]. The caustic mass estimates are somewhat larger than the estimates from a single scaling relation with the velocity dispersion, and from the X-ray derived masses (an upper limit in the case of the Double Irony). Several galaxies in the field of the Double Irony fall outside the caustic line (e.g., the brightest neighbor on the sky has a relatively high velocity relative to the mean velocity of the cluster/group). Given the relatively small number of galaxies, the caustic method may not be reliable to assess cluster membership for individual galaxies. It is also difficult to attach a realistic uncertainty to the caustic mass estimate when the number of galaxies is small. For the GAMA group catalog (G3Cv1), [@2012MNRAS.426.2832A] showed that “on average, the caustic mass estimates agree with dynamical mass estimates within a factor of 2 in about 90% of the groups and compares equally well to velocity dispersion based mass estimates for both high and low multiplicity groups over the full range of masses probed by the G3Cv1.” [According to all indicators, the cluster/group of the Double Irony is less massive than that of the Exemplar.]{}
The temperature estimates derived from Eq. \[eqIsoSphereT200M200\] are 2.1 keV for the Exemplar and 0.7 keV for the Double Irony. These values are consistent with the X-ray estimates ($\approx 1.8$ keV for the Exemplar, Table \[tabTheOtherOne\], and $\lessapprox 1.3$ keV for the Double Irony, Table \[tabDbleIrony\]).
From the estimates of $M_{500}$ in Table \[tabClusterMasses\], we can estimate that the corresponding radius, $r_{500}$, for the Double Irony’s group is about 0.6 times that of the Exemplar’s cluster, or about 380 kpc, which corresponds to $2\farcm6$. A circle of that radius roughly encompasses the entire radio structure.
Exemplar Double Irony Note
----------------------------------- ---------------------------- --------------------- ------
$N (R < 6\farcm3)$ 46 55 (1)
$N (< 6\farcm3, 0.13 < z < 0.15)$ 23 32 (2)
$z_{\rm cluster}$ 0.1387 0.1368 (3)
$\sigma_v [{\rm km~s}^{-1}]$ 475 275 (4)
$M_{\rm Caustic} [M_\odot]$ $3.2\times10^{14}$ $9.1\times10^{13}$ (5)
$M_{\rm 200} [M_\odot]$ $1.7\times10^{14}$ $3.3\times10^{13}$ (6)
$M_{\rm 500} [M_\odot]$ $1.3\times10^{14}$ $2.5\times10^{13}$ (7)
$M_{\rm 500}^{MT} [M_\odot]$ $(0.9\pm0.4)\times10^{14}$ $<5.1\times10^{13}$ (8)
Cluster ages and dynamical states {#SectDiscussionClusterAges}
---------------------------------
The luminosity difference between the BCG and the second brightest galaxy in a cluster is used as an indicator of the evolutionary state of a cluster (e.g., ). In the hierarchical model of galaxy formation, BCGs located at the center of a cluster will grow by accretion and mergers faster than other galaxies. The difference in mass (and luminosity) is expected to increase with time, and galaxy groups/clusters with a large magnitude difference $\Delta m_{12}$ between their two brightest galaxies are expected to have assembled early. [@2014MNRAS.442.1578R] used galaxies drawn from semi-analytic models of [@2011MNRAS.413..101G] based on the Millennium simulations, and investigated how some measurable parameters are related to the age of the groups. They defined “young” galaxy groups as those that have assembled up to 30% of their mass by redshift $z = 1$, and “old” groups as the ones that had assembled more than 50% of their mass at redshift $z = 1$. Plotting the distributions of the magnitude gap $\Delta m_{12}$ versus the absolute magnitude in the $r$ band ($M_r$) of the BCG, they were able to quantify the fraction of old and young groups in different parts of the diagram.
For the Exemplar’s cluster (XLSSC 112), the difference in the $r$-band magnitude is 0.97, while for the BCG of the Double Irony group it is much lower, 0.35. The second brightest galaxy in the Double Irony environment is a late-type galaxy located near the Elbow radio structure (see Fig. \[figDbleIronyOptXrayradio\] and Sect. \[sectDiscussion2ndGal\]). The Exemplar has $M_r = -22.73$ and the Double Irony has $M_r = -22.85$. Placing them in the diagram of @2014MNRAS.442.1578R, we see that the Double Irony group has a higher probability of being a young galaxy group (box (3) with 63% probability of being young and 4% probability of being old). The Exemplar group, XLSSC 112, falls in box (7) with a 30% probability of being young and a 22% probability of being old. This means that the probability that the Exemplar’s cluster is older that the Double Irony’s group/cluster is 51%, while the probability that the Double Irony is older than the Exemplar is 13%; there is a 36% probability that they are in the same age group (young, old, or in between). While this is not conclusive in itself, it is consistent with the idea that the Double Irony’s group/cluster is not as evolved as XLSSC 112.
Comparing the surrounding galaxy distributions {#sectCompaEnvironment}
----------------------------------------------
{height="6.5cm"} {height="6.5cm"}
[lccccrcccc]{} Name & $R_{\rm max}$ & $N$ & $n$ & $\bar{N}_{\rm env}$ & $N/\bar{N}_{\rm env}$ & $A_2$ &$A_3$ &$A_4$ &$A_5$& (Mpc) & & (Mpc$^{-3}$) & Exemplar & 0.5 & 15 & 0.794 & 1.12 & 13.3 & ${\bf -0.337 \pm 0.014}$ & ${\bf -0.086 \pm 0.012}$ & $+0.048 \pm 0.012$ & ${\bf -0.250 \pm 0.015}$ Exemplar & 1.0 & 24 & 0.318 & 3.62 & 6.6 & ${\bf -0.183 \pm 0.006}$ & ${\bf -0.188 \pm 0.006}$ & $-0.017 \pm 0.006$ & $+0.041 \pm 0.007$ Double Irony & 0.5 & 19 & 1.006 & 0.75 & 25.3 & ${\bf +0.119 \pm 0.009}$ & ${\bf -0.178 \pm 0.009}$ & ${\bf +0.161 \pm 0.008}$ & $-0.007 \pm 0.010$ Double Irony & 1.0 & 38 & 0.503 & 3.38 & 11.3 & ${\bf +0.187 \pm 0.003}$ & ${\bf -0.173 \pm 0.003}$ & ${\bf +0.097 \pm 0.003}$ & ${\bf +0.261 \pm 0.003}$
{width="17.7cm"}
A number of studies have been carried out to search for a relation between the large-scale distribution of galaxies surrounding GRGs and the orientation of the radio lobes and plumes (e.g., ; @2008ApJ...677...63S; @2009MNRAS.393....2S; @2013MNRAS.434.2877T; @2015MNRAS.449..955M). There is increased evidence that overdensities of galaxies are found on the side of the shorter radio lobes, and that jets are oriented in directions perpendicular to the overall galaxy distribution surrounding the host galaxy; also, non-colinear radio jets and lobes seem to have directions perpendicular to the surrounding galaxy distribution, suggesting that they have been deflected [@2015MNRAS.449..955M]. XXL-North has been covered by the GAMA spectroscopic survey (G02 region in the GAMA Data Release 3; @2018MNRAS.474.3875B) that is 95.5% redshift complete to a magnitude $r < 19.8$ mag. In this section, we begin with a qualitative description of the distribution of galaxies located within a radius of 1 Mpc of the centers of the two radio galaxies and with a spectroscopic redshift from the GAMA database close to that of the radio galaxy (see Fig. \[figRadiogalsEnv\]). Then we carry out a more quantitative analysis in terms of Fourier components of the distribution of the galaxies surrounding the radio sources.
In Fig. \[figRadiogalsEnv\] we show the distribution of the galaxies with a spectroscopic redshift $z_{\rm RG} -\Delta z < z < z_{\rm RG} +\Delta z$, where $z_{\rm RG} = 0.138$ is the redshift of the radio galaxy and $\Delta z = 0.003$. The galaxies are color-coded in redshift bins of 0.001, increasing from blue to red. The overlaid contour corresponds to the 5$\sigma$ level (0.3 mJy beam$^{-1}$) in the 610 MHz images of the radio galaxies. The arrows point in the directions of the brightest regions in the lobes. The lines were extended to separate the regions above and below the radio axes.
In the Exemplar, the jets and lobes point in opposite directions, but the SW lobe is farther away from the core than the NE lobe. The red arrow points to the brightest region in the longer lobe and the blue arrow to the shorter one. We note the following:
– more galaxies are clearly situated above the Exemplar’s radio axis;
– an overdensity of galaxies are in the direction of the shorter lobe relative to the opposite direction;
– in the central region, the galaxy distribution is roughly perpendicular to the radio axis.
The Double Irony radio galaxy is not a linear structure. The red arrow points to the brightest region in the SW lobe and the blue arrow to the Elbow; these two regions are at about the same distance from the center of the host galaxy ($90\arcsec$), but have different position angles. We see:
– an overdensity of galaxies above the radio axis (at positive angles, measured counterclockwise).
– in the direction of the blue arrow, an overdensity of galaxies beyond the Elbow and to the east of the northern plume;
– an overdensity to the northwest of the SW plume.
To quantify the distribution of the galaxies around our two radio galaxies and those apparent features, let us use the Fourier component method proposed by [@2013MNRAS.434.2877T] and applied to a sample of GRGs by [@2015MNRAS.449..955M]. The method consists of estimating five components defined as $$A_1 = \sum\limits_{i=1}^{N} f_k (\theta_i) \, , \\$$ and $$A_k = \frac{1}{N} \sum\limits_{i=1}^{N} f_k (\theta_i) \,\,\,\,\, {\rm for}\,\, k = 2, ..., 5,$$ where the summation is over the number of galaxies, $N$, within a radius $R$ (taken to 0.5 or 1 Mpc) and a redshift $\Delta z = \pm 0.003$ of the position and redshift of the radio galaxy; the values of $\theta_i$ are the angles measured counterclockwise on the sky between the direction of galaxy $i$ and that of the longer radio lobe; the $f_k$ functions are $f_1 = 1$, $f_2 = \sin(\theta_i)$, $f_3 = \cos(\theta_i)$, $f_4 = \sin(2 \theta_i)$, $f_5 = \cos(2 \theta_i)$.
We use a slightly different notation from that of [@2015MNRAS.449..955M] ($A_k$ rather than $a_k$) to make it clear that our $A_k$ are normalized by dividing by the number of galaxies $N$ in the corresponding volume surrounding the radio galaxy, while [@2015MNRAS.449..955M] divided by the number of galaxies located farther out in the environment of the radio sources. The absolute values of their $a_k$ are therefore a mixture of information related to the actual local anisotropy of the galaxy distribution and the overdensity with respect to the more distant environment. The difference is therefore simply a normalization factor (which is different for every radio galaxy) and we find the use of $A_k$ more intuitive because they are actual mean quantities.
The $A_k$ components are illustrated in Fig. \[figSketchAnisotropies\] and can be understood as follows:
1. $A_1 = N$ is simply the number of galaxies located within the pre-defined radius from the core of the radio galaxy.
2. $A_2$ and $A_3$ are sensitive to a dipolar distribution of galaxies. The $A_3$ parameter (average of the cosines) is sensitive to asymmetries in the density distribution of galaxies along the radio axis (e.g., a positive $A_3$ indicates an overdensity of galaxies along the longer radio lobe compared to the opposite direction; a negative $A_3$ indicates an overdensity along the shorter radio lobe). The $A_2$ parameter (average of the sines) expresses asymmetries between the two sides of the radio axis (i.e., in the direction perpendicular to that of the radio axis, above or below the radio axis);
3. $A_4$ and $A_5$ are sensitive to a quadrupolar distribution. A positive $A_5$ (average of $\cos(2\theta_i)$) corresponds to overdensities of galaxies along the radio axis compared to the direction perpendicular to the radio axis; a negative $A_5$ will indicate an overdensity above and below the radio axis compared to along the radio axis. $A_4$ (average of $\sin(2\theta_i)$ also indicates a quadrupolar anisotropy, but at a $45^\circ$ angle compared to the previous distribution (see Fig. \[figSketchAnisotropies\]).
In the case of a non-uniform distribution of surrounding galaxies, all $A_k$ components will differ significantly from zero.
The quoted uncertainties on the $A_k$ Fourier coefficients ($k\geq 2)$ are standard errors and were calculated using jackknives: the $A_k$ coefficients were recalculated by removing one galaxy at a time; then the standard error on the $A_k$ values was calculated.
To estimate the overdensity of galaxies around the radio galaxy, we defined a $3\times3$ grid centered on the radio galaxy host at (RA$_{\rm RG}$,DEC$_{\rm RG}$) with eight points placed at RA = RA$_{\rm RG}\pm \Delta\theta$ and DEC = DEC$_{\rm RG}\pm\Delta\theta$, with $\theta = 0.5^\circ$. Then we calculated the mean number of galaxies in eight 24 Mpc$^3 $ volumes (radius of 1 Mpc and $z = z_{RG}\pm 0.003$), $\bar{N}_{\rm env}$. The overdensity is $N/N_{\rm env}$, where $N$ is the number of galaxies within the same volume centered on the radio galaxy (in the middle of the grid).
The distribution of galaxies with spectroscopic redshifts from the GAMA database close to that of the two radio galaxies is displayed in Fig. \[figRadiogalsEnv\]. The Fourier analysis was applied to this data set and the resulting $A_k$ components are listed in Table \[tabFourierComps\]. The main results can be summarized as follows:
{width="9.0cm"} {width="8.6cm"}
– $N$ ($= A_1$) and $N/\bar{N}_{env}$: There are significantly more galaxies within a radius of 1 Mpc of the host of the Double Irony than around the Exemplar. The overdensity compared to the local environment is almost twice as large for the Double Irony as for the Exemplar. Given such a large number of galaxies in the Double Irony, the non-detection of X-ray emitting gas may seem surprising. Could it be that the galaxies around the Double Irony are less massive than in and around the Exemplar’s cluster? To answer this question we retrieved the $ugriz$ magnitudes (model magnitudes from SDSS) of the galaxies with spectroscopic redshifts from GAMA. Figure \[figColorDiagSDSS\] (right panel) is a color-magnitude diagram for both regions. Error bars are shown only for the two BCGs so as not to clutter the figure (the error bars on the $z$-magnitudes are smaller than the widths of the points). The distributions of galaxies in the radio galaxies’ environment are similar: most galaxies are red, with a $(g-r)$ color around 1.05. On the $x$-axis we show the $z$-band magnitude which can be used as a proxy for the mass. The two BCGs stand out in the upper left corner of the plot as the brightest (and likely most massive galaxies), with a $z$-band magnitude difference of at least one compared to the other galaxies, except for the second brightest galaxy (marked as a red star) discussed in Sect. \[sectDiscussion2ndGal\] and located about 1$'$ to the NE of the Double Irony host; we note that this galaxy was not included in the Fourier component analysis because its redshift falls just below the selected redshift interval of $0.138\pm0.003$. [The distribution of galaxies is more concentrated around the Exemplar than around the Double Irony]{} (Fig. \[figRadiogalsEnv\]; left panel of Fig. \[figColorDiagSDSS\]).
– Dipole ($A_2$ and $A_3$): $A_2 >0$ for the Exemplar and $<0$ for the Double Irony. In both cases this means that there are more galaxies above the radio axes (see Fig. \[figSketchAnisotropies\]; we note that for the Examplar the origin of the angles is taken as the longer lobe (red arrow), directed toward the SE, so the positive $A_2$ are under the radio axis; this is the opposite for the Double Irony where the red arrow points toward the SW). There is also an anisotropy in the other direction ($A_3$).
– Quadrupole ($A_4$ and $A_5$): Most interesting are the negative $A_5$ values for the Exemplar that reflect overdensities in the direction perpendicular to the radio axis, as noted through visual examination. This anisotropy is considerably stronger within a radius of 0.5 Mpc. For the Double Irony, the effect is the opposite: the anisotropy corresponds to overdensities in the direction of the radio axis that corresponds to the orange arrow). Interestingly, the jets seems to be deflected in both directions and redirected into regions of lower galaxy densities (see right panel of Fig. \[figRadiogalsEnv\]).
It seems that the Double Irony radio galaxy has been able to expand and become a GRG in an environment that may not be significantly less dense in galaxies than that of the Exemplar, and has been strongly affected by this environment: the jets deviated from their paths and the lobes expanded away from regions of higher galaxy density into sparser regions.
{width="8.8cm"} {width="8.8cm"}
{height="8.2cm"} {height="8.2cm"}
Large-scale structure at [*z*]{} = 0.14 {#SectSuperclu}
=======================================
In Fig. \[figSuperclu\] we show the distribution of the galaxies with a spectroscopic redshift from the GAMA database between 0.135 and 0.141 (top panel) and the GMRT 610 MHz image (bottom panel) of the region of XXL-North that encompasses the supercluster XLSSsC N03 identified in . The supercluster contains eight cluster members, five of which are securely detected clusters in X-rays (C1 class). The cluster hosting the Exemplar, XLSSC 112, is a secure X-ray detection and its position is circled in red. There is an interesting alignment on the sky of four clusters, with a decrease in size and mass from the more massive Abell cluster (XLSSC 60) to the other clusters on the right. This large structure might lead to the formation of a massive cluster if infall and merger occur.
The Double Irony radio galaxy is seen in the top right corner of Fig. \[figSuperclu\] (left panel). The redshift of its surrounding cluster/group is very similar to the redshifts of the members of the supercluster ($z \simeq 0.14$). We performed a new friends-of-friends analysis with exactly the same parameters as those used in the study presented in , which used 326 clusters with $0.03 < z < 1.0$, but adding the Double Irony’s cluster to the list of clusters. Very interestingly, [*the Double Irony’s cluster was identified as a new member (the ninth) of the supercluster XLSSsC N0*]{}.
We note an overdensity of galaxies at RA$\simeq 32\fdg445$, DEC$\simeq -4\fdg38$ (upper panel) where there is no reported XXL cluster. When this structure is added to the list of identified clusters/groups, [the friends-of-friends algorithm identifies it as a new member (the tenth) of the same supercluster.]{} [Even at this location, a radio source is found in the GMRT 610 MHz mosaic;]{} we call it “the Unhinged” because of its bizarre appearance (see Fig. \[figMoreRadiogals\]).
Radio galaxies in superclusters {#SectDiscussionRadiogalsSuperclu}
===============================
We note that XLSSC 201, another cluster member of the supercluster, also hosts an extended radio source, shown in Fig. \[figMoreRadiogals\] and denoted the “Eyebrow.” It is remarkable that four out of ten clusters/groups in this structure contain well-developed radio galaxies. The Eyebrow and the Unhinged may be the superposition of radio sources at different redshifts and deserve a separate detailed study.
More work is clearly needed to quantify the incidence of radio galaxies in clusters residing inside superclusters. A number of superclusters have been identified in XXL (21 in XXL-North and 14 in XXL-South; ). [@guglielmo2018b] characterized the stellar populations of the galaxies in the richest XXL supercluster (at $z\simeq 0.3$) and found evidence for an active role of the environment on the star formation rates and stellar masses. detected a number of X-ray AGN in three XXL superclusters, but a larger study is needed to reach firm conclusions on the frequency of AGN in superclusters. The first supercluster detected in XXL is at $z = 0.43$ (; ). Its galaxy and AGN populations have been studied in the optical and in the radio, but no large radio galaxies were found within the supercluster’s overdensities (@baran16; ). The GMRT-XXL-N 610 MHz survey () can be used to search for radio galaxies in superclusters in XXL-North; XXL-South has been covered with the Australia Telescope Compact Array (@butler2018a; , @butler2018b; ).
In the hierarchical model of structure formation, structures grow by accretion and mergers, small structures forming first. Superclusters of X-ray-detected clusters/groups are large structures that may still be collapsing. Both the AGN of a radio galaxy and its host galaxy (usually a massive elliptical) have accreted significant amounts of material, and the jets and lobes trace the relatively recent (a few $10^7$ years) ejection of plasma. Because of their sizes, radio galaxies are easily seen and might be a powerful way to find new clusters/groups that have escaped detection in X-ray surveys (e.g., @2016MNRAS.460.2376B, from the Radio Galaxy Zoo).
Summary and conclusion {#SectSummary}
======================
We have presented an analysis of two radio galaxies at $z\sim 0.14$ identified in the GMRT-XXL-N 610 MHz survey of XXL-North. We have made use of the extensive multiwavelength coverage of XXL to gain a better understanding of those sources. We were able to identify their host galaxies, and in the case of the Exemplar the host cluster that had been detected in the X-ray and cataloged as an XXL cluster. The second and more spectacular source, the Double Irony, is a giant radio galaxy with a linear size of about 1100 kpc on the sky. We were able to show that it is hosted by the BCG of a lower mass cluster with member galaxies detected in the optical and listed in the GAMA database. Using a friends-of-friends algorithm, we were able to show that both clusters are part of the same supercluster. We identified another overdensity of galaxies in the supercluster that is associated with a radio galaxy of peculiar shape. This brings the total number of members of this supercluster to ten. Four of these clusters/group host a radio galaxy. Anisotropies were found in the distribution of the surrounding galaxies, possibly indicating that the jets and lobes/plumes reside in lower density regions. This shows the potential of the XXL survey to lead to the discovery of new structures, and the use of radio galaxies as tracers of large-scale structure.
Future work on the two clusters presented here will require more sensitive, higher angular resolution radio and X-ray data. In particular, the JVLA (including polarization) at GHz frequencies and the GMRT below 500 MHz will allow a detailed modeling of the aging of the cosmic-ray electrons in the radio jets and lobes and will constrain timescales. In the X-ray, a deeper XMM-[*Newton*]{} observation of the Double Irony is necessary to detect the hot gas that is likely to be associated with the optically detected group; higher resolution images with [*Chandra*]{} may reveal the structure of the gaseous atmosphere around the radio galaxies and possibly shocks.
The XXL fields contain other remarkable radio galaxies that will be analyzed following an approach similar to the one presented here. Special attention will be given to their potential relation to clusters and superclusters.
XXL is an international project based on an XMM Very Large Programme surveying two 25 deg$^{2}$ extragalactic fields at a depth of $\sim5\times10^{-15}$ erg cm$^{-2}$ s$^{-1}$ in the [\[]{}0.5–2[\]]{} keV band for point-like sources. The XXL website is [<http://irfu.cea.fr/xxl>]{}. Multiband information and spectroscopic follow-up of the X-ray sources are obtained through a number of survey programs, summarized at [<http://xxlmultiwave.pbworks.com/>]{}.
We thank the staff of the GMRT who made these observations possible. The GMRT is run by the National Centre for Radio Astrophysics of the Tata Institute of Fundamental Research.
This work is based on observations obtained with XMM-Newton, an ESA science mission with instruments and contributions directly funded by ESA Member States and NASA.
It is also based on observations obtained with MegaPrime/MegaCam, a joint project of CFHT and CEA/IRFU, at the Canada-France-Hawaii Telescope (CFHT) which is operated by the National Research Council (NRC) of Canada, the Institut National des Science de l’Univers of the Centre National de la Recherche Scientifique (CNRS) of France, and the University of Hawaii. This work is based in part on data products produced at Terapix available at the Canadian Astronomy Data Centre as part of the Canada-France-Hawaii Telescope Legacy Survey, a collaborative project of NRC and CNRS.
This research has made use of the NASA/IPAC Extragalactic Database (NED) which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration.
This research has made use of the VizieR catalog access tool, CDS, Strasbourg, France. The original description of the VizieR service was published by . We have also made use of the table analysis software [topcat]{} [@topcat] and of the caustic mass estimation algorithm written by [@2012MNRAS.426.2832A]. This research made use of Astropy, a community-developed core Python package for Astronomy [@astropy].
This research also made use of the Matplotlib plotting library [@matplotlib].
GAMA is a joint European-Australasian project based around a spectroscopic campaign using the Anglo-Australian Telescope. The GAMA input catalog is based on data taken from the Sloan Digital Sky Survey and the UKIRT Infrared Deep Sky Survey. Complementary imaging of the GAMA regions is being obtained by a number of independent survey programs including GALEX MIS, VST KiDS, VISTA VIKING, WISE, Herschel-ATLAS, GMRT, and ASKAP providing UV to radio coverage. GAMA is funded by the STFC (UK), the ARC (Australia), the AAO, and the participating institutions. The GAMA website is [<http://www.gama-survey.org/>]{}.
This research has made use of the NASA/ IPAC Infrared Science Archive, which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration.
VS acknowledges support from the European Union’s Seventh Frame-work program under grant agreement 337595 (ERC Starting Grant, “CoSMass”). MERC acknowledges support from the German Aerospace Agency (DLR) with funds from the Ministry of Economy and Technology (BMWi) through grant 50 OR 1514. The Saclay group acknowledges long-term support from the Centre National d’Etudes Spatiales (CNES). SF acknowledges financial support from the Swiss National Science Foundation. CH thanks Michael Olberg for his help with the $R$ software and John H. Black for useful comments and moral support. We thank the referee for pointing out relevant references and for other constructive comments.
Mid-infrared photometry and optical spectra of the host galaxies
================================================================
Table \[tabWISEphot\] contains the WISE photometry and Table \[tabOptNIRphot\] the optical and near-IR photometry. The optical spectra of the host galaxies are shown in Fig. \[figGAMAspectra\].
[lcccccc]{} Source &W1 &W2 &W3 &W1-W2 &W2-W3 Exemplar &12.93 &12.79 &12.04 &0.14 &0.75Double Irony &13.10 &12.95 &11.56 &0.15 &1.39Difference &$-0.17$ &$-0.16$ & 0.48 &$-0.01$ &$-0.64$
[ccccccccc]{} Source &$u$ &$g$ &$r$ &$i$ &$z$ &$J$ &$H$ &$K_s$ Exemplar & $19.59\pm0.08$ &$17.43\pm0.01$ &$16.37\pm0.00$ &$15.90\pm0.00$ &$15.56\pm0.01$ &15.5 &14.742 &14.176Double Irony &$19.26\pm0.06$ &$17.35\pm0.91$ &16.26 &15.82 &$15.47\pm0.01$ &15.223 &14.634 &13.987Mag. difference & 0.33 &0.08 & 0.11 &0.08 &0.09 &0.28 &0.11 &0.189
{width="17.7cm"} {width="17.7cm"}
[^1]: <http://xxlmultiwave.pbworks.com>
[^2]: Throughout this paper and for consistency with the first XXL series of papers, we use the WMAP9 cosmology ($\Omega_{\rm m} = 0.28$, $\Omega_\Lambda = 0.72$, $H_0 = 70$ km s$^{-1}$ Mpc$^{-1}$; @2013ApJS..208...19H). At the redshift of the radio galaxies discussed here ($z \simeq 0.138$), this gives a scale of 2.443 kpc/$\arcsec$ and a luminosity distance of 652.5 Mpc.
[^3]: The percontation point (a reversed question mark, ?) was invented by the English printer Henry Denham at the end of the sixteenth century to mark the end of a rhetorical question and was later used to denote irony.
[^4]: <http://www.cv.nrao.edu/nvss>
[^5]: <http://www.aips.nrao.edu>
[^6]: [ https://en.wikipedia.org/wiki/Sobel\_operator]( https://en.wikipedia.org/wiki/Sobel_operator), page last edited on 22 February 2018, at 14:58
[^7]: <http://skyserver.sdss.org/dr14>
[^8]: <http://www.gama-survey.org>
[^9]: TGSS J021006-052841, which corresponds to the SE lobe, is listed as an isolated single-Gaussian source with a flux density of $57.2\pm7.0$ mJy; TGSS J021002-052804, which corresponds to the core and the inner jets, has $90.5\pm9.9$ mJy; TGSS J020959-052738, which corresponds to the NW lobe, has $73.3\pm 3.3$ mJy. The second and third sources overlap.
[^10]: NVSS J021007-052842 has a total flux density of $15.3\pm1.0$ mJy. NVSS J021001-052758 has a total flux density $58.8\pm 2.2$ mJy,
[^11]: The three sources listed as resolved within a radius of 4$'$ from the core of the Exemplar are XXL-GMRT J021006.7-052840, XXL-GMRT J021004.3-052826, and XXL-GMRT J021000.9-052753. The two compact sources that we named S1 and S2 are XXL-GMRT J021009.1-052834 and XXL-GMRT J021003.7-052751, respectively.
[^12]: FIRST J021001.9-052800 with a peak flux density of 4.15 mJy beam$^{-1}$ (integrated flux density $S_{\rm T} = 5.53$ mJy) and FIRST J021002.4-052806 with a peak flux density of 6.32 mJy beam$^{-1}$ ($S_{\rm T} = 10.19$ mJy). From the peak values this gives a spectral index of $-0.90$ for the fainter NW peak and $-0.53$ for the SE peak between 610 MHz and 1.4 GHz.
[^13]: Flux loss in the FIRST 1.4 GHz image would produce a similar effect. The largest angular scale to which the FIRST observations are sensitive is 2$'$ and the radio galaxy stretches over $\sim$$2\farcm5$. On the other hand, the lobes themselves are smaller than 1$'$ across. For the SE lobe, the flux density measured in the FIRST image within the elliptical region displayed in Fig. \[figSarcasmAllradioimages\] is lower than that measured in the NVSS image (about 8.2 vs. 13 mJy, see Table \[tabExemplarFlux\]), an indication that some of the extended emission might have been filtered out. For the NW lobe on the other hand, the FIRST flux is higher than the NVSS flux, perhaps because the region (within a circle of 50$\arcsec$ diameter) does not include all the flux of the 45$\arcsec$ resolution NVSS image.
[^14]: WENSS,
[^15]: NVSS, [@NVSS]
[^16]: FIRST, [@first95], [@first15]
[^17]: SUMSS, [@1999AJ....117.1578B]
[^18]: The LOFAR Multifrequency Snapshot Sky Survey,
[^19]: The LOFAR Two-metre Sky Survey,
[^20]: The Double Irony lies in the northwestern corner of the GMRT 610 MHz mosaic at the intersection of two pointings where the noise is slightly higher than average (see Fig. 5 of ).
[^21]: Seven sources are listed as resolved in the XXL-GMRT-610 MHz catalog (@smolcic2018) within 4$'$ of the core of the Double Irony: XXL-GMRT J020354.8-041356, XXL-GMRT J020353.0-041358, XXL-GMRT J020357.6-041244, XXL-GMRT J020359.1-041303, XXL-GMRT J020348.5-041416, XXL-GMRT J020356.1-041216, and XXL-GMRT J020344.7-041505.
[^22]: Four continuum sources associated with the Double Irony are listed in the NVSS catalog [@NVSS]; all of them are listed as polarized, with polarized flux densities ranging from 1.71 to 5.95 mJy. None of these sources appears in the NVSS rotation measure (RM) catalog of [@2009ApJ...702.1230T], which had a selection threshold of 5 mJy on the Stokes $I$ intensity and of 8$\sigma$ on the polarized intensity.
|
{
"pile_set_name": "ArXiv"
}
|
EPA may roll back chemical plant safety rules The rules set new standards for how companies communicate with the public.
-- Environmental Protection Agency Administrator Scott Pruitt has delayed regulations that were made in response to a 2013 explosion at a fertilizer storage plant in West, Texas, that killed 15 people and injured more than 250 others.
The effective date of the rules, focusing on preparing for chemical accidents, has been pushed back to June 19, according to the EPA. The public comment period for the rule has been extended to May 13, which will allow time for the agency to decide if it wants to further delay the rule.
Last December, the Obama administration put the regulations in place in response to the explosion, at the West Fertilizer Co. plant in April 2013, according to Hillary Cohen, a spokesperson for the Chemical Safety Board, an independent federal agency charged with investigating industrial chemical accidents.
The regulations, which were based on the CSB's recommendations, were devised to set standards for how companies that own chemical plants, like West Fertilizer, make information available to their surrounding communities so that residents and first responders can prepare for accidents like the explosion.
Cohen told ABC News that her organization recommended the regulations primarily to keep people better informed about what is happening at nearby facilities.
"The CSB's investigation of the West Fertilizer accident found significant gaps in information critical to first responders. The EPA's proposed rule was in part a response to our findings and recommendations," Cohen said. "In the final analysis, facility employees, communities and first responders should have adequate information to understand the risks inherent in such facilities, to ensure everyone's safety."
The American Chemistry Association, a lobbying arm for the industry, expressed concerns about the regulations and promised to undertake an effort to review them.
Scott Jensen, a spokesperson for the group, said in a statement that the EPA made the "right call in delaying the implementation of problematic changes to the Risk Management Plan program."
Pruitt, 48, a former Oklahoma attorney general, was narrowly confirmed by the Senate for his post in February. President Trump has said he wants to roll back many Obama-era EPA regulations.
Industry groups submitted a petition to Pruitt in February, asking him for a delay, saying that "an administrative stay is appropriate and necessary while the agency considers and addresses the numerous flaws" in the regulations.
He issued a statement on the EPA's website on Monday, saying the agency needs time to reconsider the Obama-era regulations.
"As an agency, we need to be responsive to concerns raised by stakeholders regarding regulations so facility owners and operators know what is expected of them," Pruitt wrote.
Twelve of the 15 people who died at the West Fertilizer plant explosion were first responders, according to Frank Patterson, who led the Federal Emergency Management Agency's response to the incident.
Firefighters responded to a fire at the plant and began evacuating people in the vicinity.
Shortly thereafter, an explosion tore through a four-to-five-block radius, leveling roughly 80 homes and a middle school and trapping 133 residents of a nursing home in rubble. The blast was so powerful, residents said, that it shook the ground. There were reports that people heard it several miles away, according to an ABC News article published at the time.
Patterson declined to comment on Pruitt's decision to delay the regulations until he could appraise the agency's final decision but told ABC News that the man-made disaster was the the worst such incident he had encountered in his career in emergency management.
"I was headed to what I was told was a fire, and when I got there, I realized how bad it was," Patterson said.
"For me, it was a pressure situation, and I think everybody who responded to the incident felt that pressure," he added.
|
{
"pile_set_name": "OpenWebText2"
}
|
Malicious messages such as malicious email can take many forms. Common forms of malicious email include spoofed messages utilized in phishing, malware or social engineering attacks. Cybercriminals send an email message that appears to be a legitimate email message representing a legitimate identity from what appears to be a legitimate email server to an unsuspecting victim but this email message is actually a spoofed email message. While the email server that originates the spoofed email may not have a previous history of malicious behavior, it is not a legitimate source for the identity the spoofed email claims to represent.
The spoofed email may contain malicious attachments or may link to a malicious target destination controlled by the cybercriminal to phish information from the victim for criminal purposes. For example, a cybercriminal sends an email message that appears to be sent by a financial bank institution by spoofing the text of the “from” address to be a legitimate email address of the financial bank institution. However the message will contain a link that links to a webpage of the criminal requesting login credentials of the victim. Alternatively, the email message may spoof a trusted identity and contain instructions or simply establish a history of communications that can be exploited at a later date. For example, a cybercriminal sends an email message to the finance department of a company that appears to be sent by an executive of the company requesting a wire transfer to an account that is controlled by the criminal.
Although standardized email validation platforms may be utilized to verify that an identified sender of the message has actually sent the message, much email traffic today does not take advantage of these email validation platforms. Therefore, there exists a need for a more flexible way to identify authenticity and security risk of a message and reputation of a sender.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Potential candidates for hyperhalogens: a comparative study of BO2, AlO2, and VO3 species.
Recent work has shown that BO(2) which is a superhalogen with an electron affinity of 4.46 eV, can be used as building block of a new class of molecules/clusters whose electron affinities can exceed that of BO(2). This class of molecules was named hyperhalogens and the concept was illustrated by focusing on Au(BO(2))(2). Here we explore other superhalogens besides BO(2) to see if they too can be used to form hyperhalogens. We have chosen to focus on AlO(2) which is valence isoelectronic with BO(2) as well as VO(3) which involves a transition metal atom. The results obtained using density functional theory show unexpected behavior: Although AlO(2) and VO(3) are both superhalogens such as BO(2), only Na(BO(2))(2) is a hyperhalogen while Na(AlO(2))(2) and Na(VO(3))(2) are not. The origin of this anomalous result is traced to the large binding energy of the dimers of AlO(2) and VO(3).
|
{
"pile_set_name": "PubMed Abstracts"
}
|
A generalisable methodology for stability assessment of walking aid users.
To assist balance and mobility, older adults are often prescribed walking aids. Nevertheless, surprisingly their use has been associated with increased falls-risk. To address this finding we first need to characterise a person's stability while using a walking aid. Therefore, we present a generalisable method for the assessment of stability of walking frame (WF) users. Our method, for the first time, considers user and device as a combined system. We define the combined centre of pressure (CoPsystem) of user and WF to be the point through which the resultant ground reaction force for all feet of both the WF and user acts if theresultant moment acts only around an axisperpendicular tothe ground plane. We also define the combined base of support (BoSsystem) to be the convex polygon formed by the boundaries of the anatomical and WF feet in contact with the ground and interconnecting lines between them. To measure these parameters we have developed an instrumented WF with a load cell in each foot which we use together with pressure-sensing insoles and a camera system, the latter providing the relative position of the WF and anatomical feet. Software uses the resulting data to calculate the stability margin of the combined system, defined as the distance between CoPsystem and the nearest edge of BoSsystem. Our software also calculates the weight supported through the frame and when each foot (of user and/or frame) is on the floor. Finally, we present experimental work demonstrating the value of our approach.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Nutella is love for Chocolate lovers. When you are tired at night and feel some late-night cravings, don’t worry no matter how tired you are these easy peasy Nutella cake recipes will help you quench your thirst.
So let’s start baking.
CINNAMON NUTELLA CAKE
INGREDIENTS
175g golden caster sugar
175g softened butter
3 eggs
200g self-raising flour
2 tsp ground cinnamon
1 tsp baking powder
4 tbsp milk
4 rounded tbsp Nutella
50g hazelnut, roughly chopped.
METHOD
Preheat the oven at 160C Greece the base of the cake tin with the help of butter Now add sugar, butter, eggs, baking powder, flour, cinnamon and milk into a bowl Beat it with a mixer until it turns into a fluffy material Make the first layer with 1/4 of the mixture into the tin and spread it evenly Then make another layer of Nutella on top of the first one Repeat the same method for 3 to 4 layers Sprinkle the hazelnut on top of it Now, bake it for 1 hour. After 1 hour take it out and let it cool inside the tin Your delicious cake is ready for you.
NUTELLA MUG CAKE
INGREDIENTS
3 tbsp Nutella
3 tbsp milk
4 tbsp self-rising flour
4 tbsp white caster sugar
1 egg
3 tbsp cocoa powder
3 tbsp oil
METHOD
First of all, put all the ingredients in a large mug Now beat it well until it is turned into a fluffy mixture Microwave the mug for 2 – 3 minutes until it looks soft Finally, if you like to you can add topping with the help of whipped cream, and enjoy your mug cake.
NUTELLA CRUNCH ICE CREAM CAKE
INGREDIENTS
2 cups Nutella
6 cups of cereal
1 Gallon vanilla ice cream
METHOD
Place a large bowl of vanilla ice cream inside the freezer to chill On a medium flame in a saucepan combine Nutella and cereal together and mix well until the cereal is completely covered with Nutella Now remove it from the stove On a wax paper, pour Nutella coated cereal and place it inside the freezer for 30 minutes After that, place the ice cream all on top of the Nutella coated cereal Now place it back into the freezer for 4 – 5 hours until it completely freezes Now cut it into slices and serve.
NUTELLA CHEESECAKE
INGREDIENTS
250g biscuits
80g unsalted butter
3/4 cup roasted hazelnut
400g Nutella
500g cream cheese
1/2 cup icing sugar
METHOD
Blend the biscuits in the mixer, Add butter, hazelnuts, and Nutella in the biscuit mixture and mix it Put a wax paper inside the cake pan and place the mixture in it and let it chill inside the freezer Now, for the topping. Mix and beat the cream cheese with Nutella and icing sugar After that, take out the biscuit mixture from the freezer and put the topping we made in the previous step on it. Now place it in the freezer again and let it chill for 3 – 4 hours again. Your yummiest cake is ready for you now.
NUTELLA BROWNIES
INGREDIENTS
1/2 cup Nutella
1 egg
5 tbsp flour
1/2 cup chopped hazelnut
METHOD
Preheat the oven to 350 degrees. Line a 12 mini muffin pan with foil paper Put Nutella, egg, and flour in a bowl and whisk until smooth and fluffy Place the material in the mini muffin pan and sprinkle it with chopped hazelnut Finally, bake until the material turns into a muffin shaped Now set it on a rack to cool down and serve it with Love.
So these are the easy-peasy Nutella cake recipes for you. What are you waiting for getting in the kitchen and make some delicious cake with Nutella and don’t forget to share.
|
{
"pile_set_name": "OpenWebText2"
}
|
National Police of Colombia Upgrading to BlackBerry 10 & BES 10
BlackBerry is really focusing on the enterprise and government wins since Fairfax announced their bid and focus on enterprise. The latest is the National Police of Colombia announcing that they are switching to BES 10 and BlackBerry 10. More details below:
The National Police of Colombia Upgrading BlackBerry Smartphones, Migrating to BlackBerry Enterprise Service 10
The National Police of Colombia selected the BlackBerry solution for its embedded controls that support regulatory compliance in government environments with the highest security requirements. To date, more than 25,000 BlackBerry Enterprise Service 10 commercial and test servers have been installed globally, including within the world’s top organizations.
"The National Police of Colombia needs to be able to access critical information on the go in order to effectively do their jobs, which is why BlackBerry is essential to the force," said Eduardo Fernandez Rojo, Managing Director for the region at BlackBerry. "The BlackBerry 10 platform provides an enterprise mobility management solution that is secured end-to-end, which is why it is the most trusted mobile platform by government organizations around the world."
BlackBerry Enterprise Service 10 represents a consolidation of BlackBerry’s EMM product portfolio, which includes Mobile Device Management (MDM), security, infrastructure and app management. Secure Work Space for iOS and Android is managed through BlackBerry Enterprise Service 10 and provides the most secure infrastructure for data-at-rest and data-in-transit to iOS(R) and Android(TM) devices, making it easy and convenient to manage all devices from a single console.
The combination of BlackBerry smartphones and BlackBerry Enterprise Service 10 provides high security standards against data leakage and unauthorized device access to corporate assets. Security of corporate applications and data stored on personal devices (for BYOD deployments) is also embedded seamlessly within the user interface through BlackBerry(R) Balance(TM) technology. BlackBerry Balance separates corporate data from personal content, while preserving the end user’s privacy and consumer experience.
|
{
"pile_set_name": "Pile-CC"
}
|
Bela Vista do Toldo
Bela Vista do Toldo is a municipality in the state of Santa Catarina in the South region of Brazil.
See also
List of municipalities in Santa Catarina
References
Category:Municipalities in Santa Catarina (state)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
The blips of a heart monitor, the hum of an MRI, the intense lights of a surgical room: all can bring both comfort and fear — and all require a lot of power. But new hospitals are being filled with natural, calming light and are leveraging energy from the sun and earth to power the machines, instruments, and tools medical professionals use to help patients recover.
Hospitals use a lot of energy to save lives. In fact, they use more than 836 trillion BTUs of energy every year and produce more than 2.5 times the carbon dioxide emissions of commercial office buildings.
The U.S. Department of Energy’s (DOE) Commercial Buildings Program and DOE’s National Renewable Energy Laboratory (NREL) are working with the American Society of Heating, Refrigerating, and Air Conditioning Engineers (ASHRAE) and the buildings industry to find ways to reduce the energy intensity of large hospitals, schools, and retail buildings by 50%.
“The Advanced Energy Design Guidelines [AEDG] series represents the best practices in industry for energy efficiency in buildings,” NREL Senior Research Engineer and AEDG Project Chair Shanti Pless said. “Our job is to develop those best practices, along with the professionals in the industry, and put them together in an easy-to-implement guide. NREL created the modeling and optimization software used to determine that what is going into the guides achieves a 50% savings goal.”
The NREL commercial buildings team of Pless, Eric Bonnema, and Matt Leach led the development of the Large Hospital, Retail, and School 50% Savings AEDGs. Pless was chair of the project committees of industry experts, and Bonnema and Leach provided efficiency expertise and energy modeling optimization support.
U.S. hospitals spend more than $5 billion annually on energy, often equaling 1% to 3% of a typical hospital’s operating budget. “Healthcare is a big opportunity for energy savings,” Pless said. “We felt this industry needed resources, and there weren’t many out there helping them to achieve 50% savings in energy.”
The 50% AEDG series is a new group of publications that builds on previous successes. Collaborators including DOE and NREL published a series of six 30% AEDGs covering structures ranging from small office buildings to highway lodging to self-storage buildings. Between the 30% and 50% AEDGs, there are roughly 450,000 copies currently in circulation. The full series of AEDGs is available as a free download atwww.ashrae.org/aedg.
“ASHRAE, a professional organization consisting of 60,000 mechanical engineers who work on energy efficiency in buildings, is an excellent organization through which we disseminate the guides,” NREL Principal Lab Program Manager for Building Energy Technologies Ron Judkoff said. “ASHRAE also maintains commercial building standards for industry.”
But Don’t Just Follow Code
Geothermal coils are visible in a partially filled heat rejection lake at the Great River Medical Center in Burlington, Iowa. For buildings that are predominantly in cooling mode, lake source geothermal can provide substantial energy savings.
The building code is the baseline for the least energy-efficient building an owner can construct. Fortunately, there is nothing in building codes to stop building owners and construction companies who want to go for the most energy savings they can find — and that’s where the AEDGs can bridge the gap.
“There is a lot of interest out there for 50% energy savings in buildings because just about anyone can do it, if they are paying attention,” Pless said. “And it doesn’t have to cost more if you are using streamlined design and construction processes.”
The AEDGs are written for owners, design teams, and contractors — the professionals who will be constructing these buildings. If they don’t have experience in energy efficiency, they can look to these guides for examples and details on how to do it themselves. The guides have recommendation tables for all climate zones in the United States.
AEDG recommendations are also built on technical support documents written by the national labs that accompany the design guidelines. These support documents cover the details of the energy modeling used. For instance, while daylighting works well in almost all climate zones, heating and cooling can require different solutions from zone to zone, especially in hospitals because of the high demand for fresh air.
“Hospitals have strict ventilation requirements, and they bring in a certain amount of fresh air along with a certain amount of re-circulated air,” Bonnema said. “There is a huge potential for savings if you set up your system differently, since most hospitals are using energy to cool the air and then heat it back up.”
Jeff Boldt is the director of engineering for KJWW Engineering Consultants, and he was also a project team member for the Large Hospital AEDG. “It’s really interesting when you look at a large hospital energy model; the biggest use of energy is the reheat. It’s because you have to dehumidify all the air. For instance, you cool it down to 52 degrees in order to dehumidify it. Then, your boiler comes on to reheat the air. That process is usually the single largest use of energy in a hospital. This guide figures out how to get that reheat for free or cause the reheat not to happen at all.”
According to Boldt, the AEDG will help the healthcare industry understand that there are practical ways to design a building that uses 50% less energy. “I like that they are prescriptive because a lot of people aren’t comfortable with energy modeling. With the AEDGs, we’ve done all the energy modeling, and you can hand this to your design team and say ‘I want you to follow the items in this AEDG,’ and your team can go from a checklist and know what they are getting.”
Running those energy models and finding climate-by-climate solutions wouldn’t be possible without the computer modeling muscle at NREL. “From our optimization tools to mass modeling capabilities using 16 climate zones and five building types, all running different ‘what if’ scenarios, we are able to do all the modeling on a pretty condensed timeline,” Pless said.
Schools are Ahead of the Class
The Evie Garrett Dennis K-12 campus in Denver, Colorado, includes four academic buildings. The high school built as part of this project is the first for Denver Public Schools in the past 30 years; the common area is pictured above. The campus sees an average 38.1% energy savings each year from renewable sources.
“Research has demonstrated that the quality of the physical environment affects student performance,” Pless said. “An environment that includes appropriate lighting, sound, temperature, humidity, and air quality can help students learn better. In many cases, improving these can also reduce energy use.”
Schools can have similar heating, ventilation and air conditioning (HVAC) issues as hospitals — specifically, decoupling of ventilation air from space heating and cooling. If engineers are able to provide the heating and cooling separately from ventilation, this basically eliminates the issue of reheat in schools. NREL and the AEDG team have also produced a guide for K-12 Schools that includes:
Three different HVAC system types that achieve significant energy savings
Different ways to daylight 100% of the floor area of classrooms, resource rooms, cafeterias, gymnasiums, and multipurpose rooms for two-thirds of school hours
Recommendations for computers, vending machines, kitchen cooking equipment, walk-in refrigeration equipment, kitchen exhaust hoods, and service water heating.
The K-12 Schools AEDG was one that NREL chose to do early on because a number of schools are at the 50% energy-savings level, and there were many case studies to draw from. Pete Jefferson, a principal with Denver-based M.E. GROUP, was on the project committee for the K-12 Schools AEDG. He said the guides give professionals a solid starting base for energy design.
“These guides are a great shortcut for anybody who is working on a school. You can jump to the AEDG recommendations and start from there and see how much further you can go as a design professional,” Jefferson said. “When we do our energy models, we use the AEDG recommendations as our new baseline to see how we can improve from there.”
Some schools are even pushing the envelope to net-zero energy levels — which is something the team hopes to tackle in the next round of design guides. A net-zero energy building is one in which annual on-site renewable energy production is equal to or greater than energy use.
“Net-zero makes a lot of sense for schools. They are built to last for 50 years, and a lot of effort goes into making them robust,” Pless said. “There are also teaching opportunities with energy-efficiency features and on-site renewables. So there are net-zero schools popping up, but having a design guide with best practices is key to helping them become widespread.”
The NREL team sees a need for a complete net-zero design guide series. “Industry is starting to understand that it can be done,” Pless said. “Having a net-zero office design guide is needed. There are examples across the country of offices that are attempting to do this.”
The United States adds 2% every year in new buildings and only tears down 1%, which means the nation continues to add to its energy use when it comes to buildings. The AEDG team sees the opportunity to make the new buildings more energy efficient and sees even greater opportunities when it comes to deep retrofits, because the recommendations in the guides can apply to both.
“At these building rates, over the course of 20 years, you’ve touched over half of the buildings in America through retrofits or bringing new construction to 50% savings,” Pless said. “That’s measureable impact on the 40% of the nation’s energy that gets used in buildings.”
Another area where the AEDGs have had an impact is the town of Greensburg, Kansas. After a 2007 tornado leveled nearly the entire town, DOE and NREL helped the town leaders create a newer, more efficient Greensburg. In this case, a whole town was constructed that was able to achieve 50% energy savings. “Greensburg was kind of a demonstration for us that if 50% energy savings can be done here, it can be done anywhere,” Pless said. “It exemplifies all the AEDG work that has been done.”
This article was originally published on NREL and was republished with permission.
|
{
"pile_set_name": "OpenWebText2"
}
|
Comparative genomics on SFRP2 orthologs.
SFRP1, SFRP2, SFRP3, SFRP4, SFRP5, DKK1, DKK2, DKK3, DKK4, and WIF1 are soluble modulators of WNT signaling. SFRP2 gene at human chromosome 4q31.3 is claimed as a tumor suppressor gene inactivated by the epigenetic CpG hypermethylation in colorectal cancer. SFRP2 methylation is a sensitive single DNA-based marker for the fecal screening of colorectal cancer. On the other hand, SFRP2 is claimed to induce cellular resistance to apoptosis in mammary tumors. Here, we identified and characterized the rat Sfrp2 gene by using bioinformatics. Rat Sfrp2 gene, consisting of three exons, was located within AC129161.3 genome sequence. Rat Sfrp2 gene was found to encode a 295-aa Sfrp2 protein, consisting of signal peptide, Frizzled domain with ten conserved Cys residues, and Netrin (NTR) domain with six conserved Cys residues. Rat Sfrp2 showed 98.6% and 97.6% total-amino-acid identity with mouse Sfrp2 and human SFRP2, respectively. Phylogenetic analyses revealed that Sfrp2 orthologs were more related to Sfrp1 and Sfrp5 orthologs than to Sfrp3 and Sfrp4 orthologs. Human SFRP2 promoter (nucleotide position 71417-71152 of AC020703.7 genome sequence) and rat Sfrp2 promoter (nucleotide position 184090-184357 of AC129161.3 genome sequence) showed 88.7% total nucleotide identity. GC content of human SFRP2 promoter was 63.9%. Binding site for POU domain transcription factors (POU2F1, POU2F2, etc.) was conserved between human SFRP2 promoter and rat Sfrp2 promoter. SFRP2 mRNA was expressed in embryonic stem (ES) cells, diffuse type gastric cancer with signet ring cell features, pancreatic cancer, colorectal cancer, retinoblastoma, and insulinoma. This is the first report on comparative integromics analyses on SFRP2 orthologs.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The content published in Cureus is the result of clinical experience and/or research by independent individuals or organizations. Cureus is not responsible for the scientific accuracy or reliability of data or conclusions published herein. All content published within Cureus is intended only for educational, research and reference purposes. Additionally, articles published within Cureus should not be deemed a suitable substitute for the advice of a qualified health care professional. Do not disregard or avoid professional medical advice due to content published within Cureus.
Introduction
============
Bombay phenotype was first discovered by Dr. Bhende in Bombay, India and named accordingly \[[@REF1]\]. The H antigen is located on red blood cells and is the precursor compound of A and B antigens. The A and B allele produce different transferase enzymes which add complex carbohydrates to the H antigen, transforming it into A antigen and B antigen, respectively. In individuals with blood group O there is no functional transferase enzyme to modify the H antigen, therefore it remains unchanged. The h allele is a result of the mutation of the H gene that expresses H antigen in the red blood cells. Individuals with Bombay phenotype inherit the homozygous recessive (hh) genotype instead of the homozygous dominant (HH) or heterozygous (Hh) genotypes of the ABO blood group. As the A and B antigens cannot be formed without the H antigen precursor, their red blood cells also lack these antigens. Consequently, these individuals produce anti-H, anti-A, and anti-B antibodies. Serum from these individuals contain antibodies that react with red blood cells from all O, A, B, and AB blood groups. It is of concern to note that people with Bombay phenotype can only be transfused with red blood cells that lack the H, A, and B antigens, leaving room for either autologous blood or blood from another Bombay blood group \[[@REF2]\].
Here, we report a case where a patient with Bombay blood group presented with upper gastrointestinal bleeding and severe anemia. Once his blood group was determined, donors were reached and he received two successful blood transfusions of Bombay blood group. After stabilizing the patient, he was discharged and follow-up investigations including serum von Willebrand factor antigen, von Willebrand factor functional activity and factor VIII levels were ordered. He was consequently labelled as type 3 von Willebrand disease. This case report emphasizes the significance of both forward (cell) typing and reverse (serum) typing during ABO blood grouping in blood banks.
Case presentation
=================
A 19-year-old male presented in the emergency department with one episode of melena per day, for one week. It was associated with vomiting, shortness of breath and palpitations. His hemoglobin level on initial complete blood count was 5.80 g/dL, signifying severe anemia according to WHO guidelines \[[@REF3]\]. His lab parameters on admission are presented in Table [1](#TAB1){ref-type="table"}.
###### Laboratory investigations on admission.
RBC: Red blood cell; WBC: White blood cell; INR: International normalised ratio; APTT: Activated partial thromboplastin time; SGOT (AST): Serum glutamic oxaloacetic transaminase (Aspartate aminotransferase); SGPT (ALT): Serum glutamic pyruvic transaminase (Alanine aminotransferase).
---------------------------- ------------- ------------------------
Test Result Normal Reference Range
Hemoglobin 5.80 g/dL 13.5-18.0 g/dL
RBC total 2.02 m/μL 4.5-6.5 m/μL
WBC total 13900/μL 4000-10500/μL
Platelet count 474000/μL 150000-400000/μL
Prothrombin time 10.40 sec 9.5-11.7 sec
INR 1.0 0.8-1.3
APTT 48.60 sec 24.8-36.2 sec
Fibrinogen level 171.1 mg/dL 199-463 mg/dL
Factor VIII 18.5% 75-216%
SGOT (AST) 27 U/L 5-34 U/L
SGPT (ALT) 24 U/L 0-55 U/L
Alkaline phosphatase 81 U/L 40-150 U/L
Total bilirubin 0.22 mg/dL 0.2-12 mg/dL
Direct bilirubin 0.102 mg/dL 0.0-0.5 mg/dL
Gamma-glutamyl transferase 22 U/L 12-64 U/L
C-reactive protein 0.78 mg/L Up to 5.0 mg/L
Serum sodium 141 mEq/L 136-145 mEq/L
Serum potassium 3.4 mEq/L 3.5-5.1 mEq/L
Serum chloride 105 mEq/L 98-107 mEq/L
Serum bicarbonate 24 mEq/L 22-29 mEq/L
Serum glucose(random) 133 mg/dL \<200 mg/dL
Blood urea nitrogen 4.0 mg/dL 8.9-20.6 mg/dL
Serum creatinine 0.8 mg/dL 0.72-1.25 mg/dL
---------------------------- ------------- ------------------------
Immediately packed red blood cells (RBCs) were requested from the blood bank. On forward typing his blood group was labeled as O positive and his serum showed strongly positive indirect Coomb's test with a negative direct Coomb's. On extended 11 cell panel antibody testing, his serum demonstrated pan-agglutination which matched with monoclonal panel cells having anti-Kell, anti-Lub, and anti-Kpb antibodies. On cross match with four O negative and four O positive packed RBCs, +4 incompatibility was seen with all. Meanwhile a detailed history of the patient revealed two distinct episodes of epistaxis in childhood and a family history of his paternal grandmother having an increased bleeding tendency. In view of his past history of fresh frozen plasma infusions, it was interpreted that the patient may have multiple alloantibodies in blood leading to gross incompatibility. Considering the urgency of the situation, one unit of the least incompatible (O negative) packed RBCs was issued after washing with normal saline thrice, to the emergency department. Transfusion was started under strict monitoring by the emergency department physicians. After slow transfusion of around 10 ml blood, the patient started shivering and his temperature spiked to 101°F with tachycardia and hypotension. The transfusion was stopped immediately and the patient was given intravenous antihistamine and hydrocortisone. Meanwhile, he was transferred to the intensive care unit (ICU) where he received intranasal desmopressin and intravenous factor VIII.
Transfusion reaction workup revealed a grade 4+ pan agglutination in his serum. During repeat blood grouping, forward typing did not demonstrate any reaction to anti-A and anti-B antisera, like a normal O blood group. However, on reverse typing, his serum showed strong agglutination with group O pooled control cells. His post saline wash incompatibility with O negative red cell concentrate showed minor difference from grade +4 agglutination (pre-wash) to grade +3 clumping (post-wash). A fresh RBCs sample from the patient showed negative direct Coomb's test, while fresh serum sample remained positive for indirect Coomb's test. This workup strongly raised the suspicion of Bombay phenotype and his red cells were tested with anti-H lectin, which showed no agglutination. This confirmed his blood group as Bombay phenotype. The reactions observed with Bombay phenotype compared to other blood groups, on forward and reverse typing, are illustrated in Table [2](#TAB2){ref-type="table"}.
###### Forward and reverse grouping with different blood groups.
(+) = Agglutination, (-) = No reaction
------------------- ------------------- ------------------- --------------------- ---------- --------- ---------
Blood group Anti-A antibodies Anti-B antibodies Anti-A,B antibodies A1 cells B cells O cells
A + - + - + -
B - + + + - -
AB + + + - - -
O - - - + + -
Bombay phenotype - - - + + +
------------------- ------------------- ------------------- --------------------- ---------- --------- ---------
Immediately, voluntary donor pools were contacted in blood banks throughout the country. Overnight, a donor with Bombay negative blood group was arranged from Karachi. The packed RBCs were airlifted to Islamabad maintaining the cold chain. After crossmatching with recipient's blood showed no reaction, the donor blood was transfused to the patient. Meanwhile, a distant relative of the patient from a nearby city, with Bombay positive blood group, consented to donate blood at our blood bank. Two days later, another unit of packed RBCs was transfused to the patient. His hemoglobin after two transfusions rose up to 7.40 g/dL. As his melena settled down on supportive therapy, an endoscopy was performed that suggested an underlying hiatal hernia. After surgical consultation, the patient was advised to reduce weight and discharged from the hospital, with a scheduled follow-up visit.
In view of the patient's past medical history and family history, during the follow-up visit, a von Willebrand factor antigen, von Willebrand factor functional activity and factor VIII levels were ordered. His von Willebrand factor antigen level was \<2.0%, von Willebrand factor functional activity was \<4.0% and factor VIII level was 18.5%, consistent with type 3 von Willebrand disease. The patient and his family were counselled accordingly and referred to the hematology clinic.
Discussion
==========
The prevalence of Bombay phenotype is 1:10,000 in India however it is much less prevalent in the Caucasians with an incidence of 1:250,000 \[[@REF4]\]. A study amongst an urban population in Puducherry, India demonstrated that 0.008% population had Bombay blood group and it was strongly associated with consanguineous marriage (66.66%) \[[@REF5]\]. This prompts for pre-marital blood phenotyping for all individuals and discouragement of marriage amongst individuals carrying the h allele.
Another descriptive study spanning over a period of six years (2012--2017) comprising 36,964 blood donors at a blood bank in Bangalore, showed a prevalence of 0.005% of Bombay phenotype \[[@REF6]\]. There has not been enough documentation of reported cases of Bombay phenotype in Pakistan. Some sporadic cases have been reported in the past, but there is a need to maintain a separate record of Bombay phenotype individuals in all leading blood banks across the country. Since this blood group is passed to offspring, one way to trace Bombay individuals is to perform thorough screening of family members and relatives of a known case. Once labelled as having Bombay blood group, these individuals should be motivated to become voluntary donors and register themselves with reference regional donation centers. Blood from Bombay blood group should only be reserved for patients with the Bombay blood group phenotype as it is extremely rare.
In the event of a surgery, where blood loss is suspected and no Bombay phenotype blood is available, acute normovolemic hemodilution may be employed. This involves removal of blood from a patient after induction of anesthesia while maintaining normovolemia with crystalloids or colloids. The blood collected is stored at room temperature in the operating room and is infused back to the patient within eight hours of collection, allowing platelets and coagulation factors to remain functional \[[@REF7]\]. Other options may include cryopreservation of blood donated by Bombay individuals.
As individuals with Bombay phenotype are often misdiagnosed as O blood group on forward typing and reverse typing is not routinely performed in some blood banks, these individuals may be transfused with O blood group in an emergency situation. This may lead to an acute hemolytic transfusion reaction. This can be avoided by providing these patients with wrist bands or a rare blood group card, identifying their blood group. These individuals also require comprehensive counselling, emphasizing the rarity of their blood group and the need to develop a careful behaviour to avoid episodes of bleeding in the future. The importance of counselling is paramount in females where the need for blood transfusion may arise in the setting of child birth.
Von Willebrand disease (VWD) is caused by mutations that lead to an impairment in the synthesis or function of von Willebrand factor (VWF). The disease can also be acquired due to various pathophysiologic defects. It is classified as quantitative defect (type 1 and type 3) or qualitative defect (type 2). Type 2 is further subdivided into type 2A, 2B, 2M, and 2N \[[@REF8]\]. A study observed a significant effect of ABO blood group on plasma von Willebrand antigen (VWF:Ag) levels. It demonstrated that VWF:Ag levels in patients with Bombay blood group (median VWF:Ag = 0.69 IU/dL) were significantly lower than in groups AB, A, or B. It further established that VWF:Ag levels in Bombay blood group individuals were even lower than in group O individuals (median VWF:Ag = 0.82 IU/dL), however this difference was statistically not significant \[[@REF9]\]. Various other reports \[[@REF10], [@REF11]\] confirm that plasma VWF:Ag concentration is significantly influenced by the ABO blood group. In this case report too, laboratory investigations on follow-up visit demonstrated a markedly low VWF antigen level in the patient. Therefore, in dealing with a patient of Bombay blood group presenting with a history of bleeding diathesis, the suspicion of von Willebrand disease should be kept high.
Conclusions
===========
Bombay phenotype is one of the rarest ABO blood groups which often leads to a delayed diagnosis. It is important to perform both forward and reverse blood grouping routinely in all first time O blood group labelled patients. Once identified, these individuals should carry a form of identification of their blood group at all times. Meanwhile, their family members should be screened for Bombay phenotype and affected individuals should be counseled to become voluntary donors. Blood banks also need to create a rare group registry for prompt response in the wake of any emergency situation.
The authors have declared that no competing interests exist.
Consent was obtained by all participants in this study
|
{
"pile_set_name": "PubMed Central"
}
|
Q:
Can't load jrxml located in jar file via JRXmlLoader: getting java.io.FileNotFoundException
I' m using JasperReports in my Java application.
I have a package named "reports" to store all the reports generated. Here is the way I'm calling my jasper report in my application.
JasperDesign jd = JRXmlLoader.load("C:\\Users\\Sandaru Weerathunga\\Desktop\\Dasatha Institute\\src\\reports\\teacherPay.jrxml");
This is working.
Instead of giving the full path , I tried:
JasperDesign jd = JRXmlLoader.load("/reports/teacherPay.jrxml");
But this is showing an Error while running the program:
net.sf.jasperreports.engine.JRException: java.io.FileNotFoundException:
/reports/teacherPay.jrxml (The system cannot find the path specified)
at net.sf.jasperreports.engine.xml.JRXmlLoader.load(JRXmlLoader.java:176)
at net.sf.jasperreports.engine.xml.JRXmlLoader.load(JRXmlLoader.java:156)
It is not suitable to give the full path to the JRXmlLoader because if you are going to run this application in other computer you have to change all the coding according to the computer path. So help me on this
A:
/reports/teacherPay.jrxml is an absolute file path, meaning, go to the root of the current drive and find the file teacherPay.jrxml in the reports directory...
Which, if I read your question correctly, isn't what you want
Instead, try loading the report as a resource (given the fact that you state that it's within a package
JasperDesign jd = JRXmlLoader.load(getClass().getResource("/reports/teacherPay.jrxml"));
If the report isn't packaged within your application context, then you will need to use a relative path instead, for example.
JasperDesign jd = JRXmlLoader.load("reports/teacherPay.jrxml");
Now, having said that. Unless you are making dynamic changes at runtime, you shouldn't be loading the jrxml file, but instead, should have pre-compiled the file and should be loading the .jasper file instead. This will be faster and generally less error prone...
|
{
"pile_set_name": "StackExchange"
}
|
Luxe Lotion is not your ordinary moisturizer. This patented formula is made without the traditional drying ingredients found in 99.9% of all moisturizers/creams on the market. We say no to alcohol, no to glycerin, and no to beeswax.
This unique formula feels like silk, and provides a luxurious texture that penetrates deeply and quickly without leaving a sticky or oily.
Specifically formulated to hydrate, rejuvenate, restore, and protect the skin. It truly moisturizes the skin without clogging pores; therefore it is safe for those with acne prone skin ( non-comedogenic).
Customer Reviews
Luxe Lotion is not your ordinary moisturizer. This patented formula is made without the traditional drying ingredients found in 99.9% of all moisturizers/creams on the market. We say no to alcohol, no to glycerin, and no to beeswax.
This unique formula feels like silk, and provides a luxurious texture that penetrates deeply and quickly without leaving a sticky or oily.
Specifically formulated to hydrate, rejuvenate, restore, and protect the skin. It truly moisturizes the skin without clogging pores; therefore it is safe for those with acne prone skin ( non-comedogenic).
About Us
Luxe Beauty products are made with All Natural, Organic, Plant-based ingredients. We use only effective and powerful ingredients combined with innovated green chemistry to ensure our products deliver results.
MEDICAL DISCLAIMER: Statements made, or products sold through this web site, are not intended to diagnose, give medical advise, treat, cure, or prevent disease, and are not intended to to be used for medical purposes.
Thanks for contacting us! We'll get back to you as soon as possible.
Thanks for subscribing
|
{
"pile_set_name": "Pile-CC"
}
|
Select Date and Travelers
Extras (optional)
Extra hour.
$
45.00
What to Expect
I'm a certified tour guide speaking English and taxi driver with a van equipped with a rear entry accessible lift. The van can accommodate 1to2 wheelchairs ,another 3 to 4 passengers and their luggage to accompany them on the ride. I can see you and see you off at Kansai International Airport,Shin-kansen stations and the like.
With it on the ride, you can visit Osaka Castle ,Tenjinbashi ,Tsutenkaku, and the other exciting sites starting your hotel front. You can find all kinds of Japanese food here.There are a lot of restaurants offering Tako-yaki(octopus balls),Okonomi-yaki(pancake fried on a hot plate),Udon noodles,Yakitori(barbecued chicken),Suki-yaki(stewed beef and vegitables),Tecchiri(blowfish cuisine) and so on at lower prices than any other cities in Japan.
Frequently Asked Questions
A letter from one of my cutomers
Aloha Zumi san,
On behalf of Mr. and Mrs. Les Murakami, Mr. and Mrs. Richard Sato and my wife and I, we extend our heartfelt appreciation for your services during our stay in Osaka and Kyoto. Your assistance was invaluable in making this trip filled with fond and happy memories. This is especially true for Mr. and Mrs. Murakami as it has been over 20 years since their last visit to Japan. As you well know, it is so difficult for them to travel to Japan without assistance and the services you provided made it all possible.
Autumn in Japan is one of the best seasons and we were able to visit so many places in Osaka, Nara and Kyoto. Although we encountered some rainy conditions, you kindly adjusted our schedule enabling us see just about everything on the itinerary. One example of the extraordinary service you provided relates to us enjoying the train ride along the Hozu River on the Saga Scenic Railway. Initially, there were no tickets available; however, your wife, Akiko san, made a special effort, on her day off from work, to secure tickets for us to enjoy the autumn foliage on this rail journey. We also enjoyed having Akiko san spend the rest of the afternoon on tour with us.
Zumi san, you made it all possible for us to have such as wonderful vacation. We are all amazed and thankful that you were able to do so much handling the wheelchair for Mr. Murakami. Having seen the full extent of your services, we will recommend you to our friends who need wheelchair assistance and who are interested in visiting the Kansai area.
All of us wish you and your family continued good health and success with your business.
GOKURO SAMA DE SHITA.
George Sakurai
Can I make changes after I book?
Yes! If you need to make changes such as removing or adding someone to your booking or changing the date or time of your tour, contact us by phone or email
Starting and ending points of the tour.
After you secure your booking, the starting and ending points of your tour can be customized to your convenience (ex.: your hotel, nearby stations, etc.). Don't worry, we will take care of you! Some tours may have an extra fee for this service, make sure to check the tour page.
What happens after I book a tour?
After booking a tour, the guide will accept (or decline) your booking within 24 hours. Then you will be noticed by email from Triplelights.
Is the price per person or per group?
The price is charged per group. Which means that you make a one-time payment for your entire group and the price will not change if it is less or more people.
Can I add more people to my booking?
Some guides accept extra people (more than the specified number) for an extra charge. Please check for the extras on the tour or booking page, or contact your guide directly to clarify.
Will there be other tourists in my tour?
No. Your tour is private, only for you and your family or friends, there will be no other group of tourists together in your tour.
Can the guide pickup me at the airport?
Yes, but there will be additional charge for that and it is not by car. The guide will go pick you up using public transportations. For further details, please contact your guide directly.
I'm travelling alone. Can I book this tour?
Yes, you can and you may be able to get a discount if you are traveling alone. Price depends on which guide you choose.
“ Takehiko (Zumi) was great! ”
He was so knowledgeable! He was pleasant and kind. His vehicle was cramped and uncomfortable, but he was great!
Takehiko:
Dear,Cheryl.
Thank you for taking the service and also your comment.
Excuse me for my van ,usually for wheelchair persons and their relatives.
If you have friends with a wheelchair in it,kindly introduce me to them.
Thank you so much.
Sincerly.
Zumi
“ Amazing guide and driver! ”
Takehiko is an amazing driver as well as Guide, although we had some difficulty communicating, but i will consider that he is quite well with his english and especially kind to all of us, we really
Enjoy the whole day with him and it was an amazing experience!
“ Nice Kyoto Tour with Zumi San ”
Taking a 7 hour Kyoto Tour with Zumi San.. He’s very responsive. Talking about the destinations via messages before my arrival.
Even tough a bit rush in time, because of the limited time with many destinations, Zumi San can manage it well. So We visit the destinations that we planned.
He’s cool. Not talking to much, but giving needed informations about the places..
Thanx a lot Zumi San
See U again when I Visited Japan...
Takehiko:
Dear,Ike san.
Thank you so much for taking the service and giving me such a good message.
I tried to do my best to guide you and your family in the limited time.
The reason I talked less was based on that I wouldn't have liked to disturb your dialogue.Excuse me.
I'll talk more than this time on our next meeting.
Thank you.Sincerly.
Zumi
“ Osaka, Kyoto, Nara trip ”
Zumi as we called him by his nickname was so patient, understanding, helpful as my husband was on a wheelchair zumi helped push him. Zumi is full of knowledge in all the places we visited. Zumi explained explicitly about the history of every place we visited.
Zumi made our visit really pleasant. Thank you Zumi.
Ed and Yvonne Wong
Takehiko:
Dear,Ed san and Yvonne san.
Thank you for taking the service and also giving me an excellent messags .
Was that OK with your hasband to transfer from the hotel to the airport?
I was wondering if it was successfull or not.
I'm just looking forward to seeing you in the near furure.
Merry Christmas and hope you will have a happy new year.
Thank you.
Best regards.
Zumi
“ good service ”
Me and my family are very happy with Mr Takehiko service. He is so attentive to us.
Takehiko:
Dera,Jessie san.
Thank you for your comment despite of being busy.
I also can guide people with the aged and in disablity.
I'm so happy for you to introduce the service to someone.
Thank you so much.
King regards.
Takehiko
|
{
"pile_set_name": "Pile-CC"
}
|
#!/usr/bin/env python
"""
The WiPy firmware update script. Transmits the specified firmware file
over FTP, and then resets the WiPy and optionally verifies that software
was correctly updated.
Usage:
./update-wipy.py --file "path_to_mcuimg.bin" --verify
Or:
python update-wipy.py --file "path_to_mcuimg.bin"
"""
import sys
import argparse
import time
import socket
from ftplib import FTP
from telnetlib import Telnet
def print_exception(e):
print("Exception: {}, on line {}".format(e, sys.exc_info()[-1].tb_lineno))
def ftp_directory_exists(ftpobj, directory_name):
filelist = []
ftpobj.retrlines("LIST", filelist.append)
for f in filelist:
if f.split()[-1] == directory_name:
return True
return False
def transfer_file(args):
with FTP(args.ip, timeout=20) as ftp:
print("FTP connection established")
if "230" in ftp.login(args.user, args.password):
print("Login successful")
if "250" in ftp.cwd("/flash"):
if not ftp_directory_exists(ftp, "sys"):
print("/flash/sys directory does not exist")
if not "550" in ftp.mkd("sys"):
print("/flash/sys directory created")
else:
print("Error: cannot create /flash/sys directory")
return False
if "250" in ftp.cwd("sys"):
print("Entered '/flash/sys' directory")
with open(args.file, "rb") as fwfile:
print("Firmware image found, initiating transfer...")
if "226" in ftp.storbinary("STOR " + "mcuimg.bin", fwfile, 512):
print("File transfer complete")
return True
else:
print("Error: file transfer failed")
else:
print("Error: cannot enter /flash/sys directory")
else:
print("Error: cannot enter /flash directory")
else:
print("Error: ftp login failed")
return False
def reset_board(args):
success = False
try:
tn = Telnet(args.ip, timeout=5)
print("Connected via Telnet, trying to login now")
if b"Login as:" in tn.read_until(b"Login as:", timeout=5):
tn.write(bytes(args.user, "ascii") + b"\r\n")
if b"Password:" in tn.read_until(b"Password:", timeout=5):
# needed because of internal implementation details of the WiPy's telnet server
time.sleep(0.2)
tn.write(bytes(args.password, "ascii") + b"\r\n")
if b'Type "help()" for more information.' in tn.read_until(
b'Type "help()" for more information.', timeout=5
):
print("Telnet login succeeded")
tn.write(b"\r\x03\x03") # ctrl-C twice: interrupt any running program
time.sleep(1)
tn.write(b"\r\x02") # ctrl-B: enter friendly REPL
if b'Type "help()" for more information.' in tn.read_until(
b'Type "help()" for more information.', timeout=5
):
tn.write(b"import machine\r\n")
tn.write(b"machine.reset()\r\n")
time.sleep(2)
print("Reset performed")
success = True
else:
print("Error: cannot enter friendly REPL")
else:
print("Error: telnet login failed")
except Exception as e:
print_exception(e)
finally:
try:
tn.close()
except Exception as e:
pass
return success
def verify_update(args):
success = False
firmware_tag = ""
def find_tag(tag):
if tag in firmware_tag:
print("Verification passed")
return True
else:
print("Error: verification failed, the git tag doesn't match")
return False
retries = 0
while True:
try:
# Specify a longer time out value here because the board has just been
# reset and the wireless connection might not be fully established yet
tn = Telnet(args.ip, timeout=10)
print("Connected via telnet again, lets check the git tag")
break
except socket.timeout:
if retries < 5:
print("Timeout while connecting via telnet, retrying...")
retries += 1
else:
print("Error: Telnet connection timed out!")
return False
try:
firmware_tag = tn.read_until(b"with CC3200")
tag_file_path = args.file.rstrip("mcuimg.bin") + "genhdr/mpversion.h"
if args.tag is not None:
success = find_tag(bytes(args.tag, "ascii"))
else:
with open(tag_file_path) as tag_file:
for line in tag_file:
bline = bytes(line, "ascii")
if b"MICROPY_GIT_HASH" in bline:
bline = (
bline.lstrip(b"#define MICROPY_GIT_HASH ")
.replace(b'"', b"")
.replace(b"\r", b"")
.replace(b"\n", b"")
)
success = find_tag(bline)
break
except Exception as e:
print_exception(e)
finally:
try:
tn.close()
except Exception as e:
pass
return success
def main():
cmd_parser = argparse.ArgumentParser(
description="Update the WiPy firmware with the specified image file"
)
cmd_parser.add_argument("-f", "--file", default=None, help="the path of the firmware file")
cmd_parser.add_argument("-u", "--user", default="micro", help="the username")
cmd_parser.add_argument("-p", "--password", default="python", help="the login password")
cmd_parser.add_argument("--ip", default="192.168.1.1", help="the ip address of the WiPy")
cmd_parser.add_argument(
"--verify", action="store_true", help="verify that the update succeeded"
)
cmd_parser.add_argument("-t", "--tag", default=None, help="git tag of the firmware image")
args = cmd_parser.parse_args()
result = 1
try:
if args.file is None:
raise ValueError("the image file path must be specified")
if transfer_file(args):
if reset_board(args):
if args.verify:
print("Waiting for the WiFi connection to come up again...")
# this time is to allow the system's wireless network card to
# connect to the WiPy again.
time.sleep(5)
if verify_update(args):
result = 0
else:
result = 0
except Exception as e:
print_exception(e)
finally:
sys.exit(result)
if __name__ == "__main__":
main()
|
{
"pile_set_name": "Github"
}
|
Q:
What is the relationship between django cms and custom plugin models?
I've been working with django cms recently for the first time and I've created a gallery plugin for uploading images.
It's quite a simple plugin, using a ImageGalleryPlugin model which inherits from CMSPluginBase and then an Image model which has a ForeignKey to the gallery.
The gallery plugin is attached to pages using a placeholder and then to view the images within a gallery I have created an apphook to link the plugin template to a view similar to;
def detail(request, page_id=None, gallery_id=None):
"""
View to display all the images in a chosen gallery
and also provide links to the other galleries from the page
"""
gallery = get_object_or_404(ImageGalleryPlugin, pk=gallery_id)
# Then get all the other galleries to allow linking to those
# from within a gallery
more_galleries = ImageGalleryPlugin.objects.all().exclude(pk=gallery.id)
images = gallery.images_set.all()
context = RequestContext(request.context, {
'images': images,
'gallery': gallery,
'more_galleries': more_galleries
})
return render_to_template('gallery-page.html', context)
Now the problem I have with this method is when you publish a page in CMS it duplicates all of the ImageGalleryPlugin objects on that page, so when I'm viewing the images, I've got twice as many links to the other galleries because the query collects the duplicate objects.
I haven't been able to properly understand this behaviour from the docs but I think the CMS is keeping the original objects which you've created and then creating the duplicates as 'live' versions of the galleries to display to users.
Where in CMS does this happen and where are the ID's of my ImageGalleryPlugin objects stored so that I can only collect the right ones in this view instead of collecting all objects?
A:
I've finally solved my own problem.
The association between my CMSPlugin object and the Page is myobj.placeholder.page so the solution to my filtering is;
# Get the ImageGalleryPlugin object
gallery = get_object_or_404(ImageGalleryPlugin, pk=gallery_id)
# Get all other ImageGalleryPlugin objects
galleries = ImageGalleryPlugin.objects.all().exclude(pk=gallery.id)
# Get all the images in the chosen gallery
images = gallery.image_field.images
# Filter the list of other galleries so that we don't get galleries
# attached to other pages.
more_galleries = [
g for g in galleries if unicode(g.placeholder.page.id) == page_id
]
|
{
"pile_set_name": "StackExchange"
}
|
This grant application requests five years of renewed support for the Arizona Alzheimer's Disease Core Center (ADCC). Scientifically, the ADCC is intended to optimize the development and use of its Cores, so as to capitalize on Arizona's scientific and organizational resources in the understanding, very early detection, and tracking of Alzheimer's disease (AD) and in the discovery of disease-slowing and prevention therapies. Organizationally, the ADCC is intended to establish a leading model of statewide collaboration in AD research. The Administrative Core provides the leadership and support needed to optimize the development, interaction, and use of its Cores. Working closely with researchers inside and outside Arizona, the National Alzheimer's Coordinating Center (NACC), and other AD Centers, it promotes the development and progress of AD-related studies and collaborations. It administers a program for the statewide solicitation, competitive review, and support of pilot studies. It helps solve the challenges and fulfill the opportunities associated with the ADCCs statewide collaborative model, and ensures the ADCC's accountability to the NIA. The Clinical Core maintains a large pool of clinically well characterized and annually assessed research subjects for the scientific study of AD and aging. The subjects include patients with AD and other dementias, patients with mild cognitive impairment (MCI), and normal controls, almost all of whom are enrolled in a brain donation program, and a growing pool of Latino and American Indian research subjects. This Core ensures the comparability and productive and appropriate use of subjects and data from its five clinical sites. It also promotes the productive and appropriate scientific use of longitudinally followed subjects, DNA, and data from three independently funded ancillary programs, yielding new information about the transition from cognitively normal aging to cognitive decline in persons at differential risk for AD. The Data Management and Statistics Core maintains the ADCC's database, helps ensure the quality of data and the protection of subject confidentiality, and provides statistical services in a manner that best serves the needs of the statewide ADCC. It works closely with researchers, NACC, and other AD Centers, sharing data in the most productive, timely, and appropriate way. The Neuropathology Core provides neuropathological diagnoses and extremely high-quality brain tissue from expired Clinical Core subjects to support research studies in Arizona and around the world. It also promotes the productive and appropriate use of biological materials from a large additional number of clinically and neuropathologically well characterized non-demented elderly subjects from its independently funded ancillary brain donation program, helping to address a critical need in the AD research community. The Education and Information Core provides training, innovative educational and outreach programs, and strategic partnerships to promote the development of AD-related researchers, address needs of professional and family caregivers, provide information about the ADCC, and address unmet needs of Arizona's American Indian and rapidly growing Latino communities.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Abstract
According to Transparency International, Africa is the most corrupt region in the world. In South Africa, there is an annual 'loss' of about R30 billion as a result of bribery and corruption. It would appear that it is exactly the poor and the vulnerable who suffer most under the scourge of corruption. The purpose of this research was to investigate the effect of corruption on victim(s) and to evaluate it in an effort to formulate solutions as to how such individuals can be guided and supported in the suffering and hardship that they endure and that specifically emanate from corruption. In the research, an effort was made to move away from the trend of the fragmenting of aid and to present guidelines or suggestions that can lead to a global solution, where multi-disciplinary involvement can be facilitated. The researchers agree that the church can play a key role in this, and the solution was sought in the principles expounded in 1 Corinthians 12. The research method known as action research was investigated as a workable method to be used by the multi-disciplinary aid team in their struggle against corruption. In the final instance, the principles used by Touching Africa in their work were investigated so that these could also be used in the quest for a solution.
|
{
"pile_set_name": "Pile-CC"
}
|
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;
namespace NoteTaker
{
public class Note
{
public Guid NoteId { get; set; }
public string Text { get; set; }
public DateTime Created { get; set; }
public bool IsUploaded { get; set; }
}
}
|
{
"pile_set_name": "Github"
}
|
WTB Vanagon Auto transmission - Will have a fairly low mile 091 6-rib trans for sale shortly - I'm either getting old or lazy, cause I want something that does the shifting for me nowadays. Guess I could just install a cupholder but I do things the hard way - Lemme know what you have! I am in San Diego area- thanks
|
{
"pile_set_name": "Pile-CC"
}
|
What is the effect of compression garments on a balance task in female athletes?
To investigate the effect of long leg compression garments on the postural sway and balance ability of female athletes at a state sports institute. A laboratory was set up to analyse kinetic and kinematic variables using a double blind, randomised controlled repeated measures cross over design. Participants were required to perform a single leg balance task for up to 60s across six conditions; including eyes-open and eyes-closed while wearing conventional shorts (control), loose-fitted compression garment and well-fitted compression garments. Simultaneous measurements of ground reaction forces and full body joint kinematics were recorded. Postural stability was assessed by measuring the overall stabilisation time as well as the movement of the centre of pressure (CoP) and centre of mass (CoM) from baseline measures. During one leg stance, significantly greater postural stability (p < 0.01) was observed with eyes open vs eyes closed, irrespective of compression group. A significantly greater (p < 0.05) balance time was observed with eyes closed when wearing well-fitted compression garments compared to conventional shorts. Differences were not present with use of the loose-fitted garment. Additionally, a significant interaction effect between compression condition and vision was observed analysing the variation about the sway (swaySD) of the CoP and CoM data (p < 0.05). The interaction effect revealed greater variability of movement with eyes closed as participants' level of compression decreased. No significant differences were observed with eyes open. The difficulties of postural stability while maintaining the single leg stance wearing conventional shorts were improved with use of the well-fitted compression garments (in the eyes-closed condition). Proper fitted compression garments may be beneficial for injury management and injury prevention.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Jurgen Klinsmann is pleased with his back line but remains disappointed with the United States' crop of young goalkeepers, and plans to continue with the veteran duo of Tim Howard and Brad Guzan, perhaps even platooning them in the starting role as he sees fit.
That was one of several interesting notes from the US national team coach – on a range of topics – as he held his latest question-and-answer session with fans via live Facebook video on Sunday afternoon ahead of Tuesday's World Cup qualifier vs. Trinidad & Tobago in Jacksonville, Florida (8 pm ET; FS1, UniMás, UDN).
“I think we are looking good in our defensive side over the last couple of months, also throughout the Copa America, except maybe the Argentina [semifinal] game, as you guys remember,” said Klinsmann when asked about his defensive corps. “They played a tremendous tournament.
“We have a lot of very good center backs at the moment in the senior national team. That is a good thing for us. Where we always have to find solutions is obviously on the wings. Here and there we rotate Fabian Johnson from the left to the right, back to the left. I think Kellyn Acosta, in our opinion, coaches' opinion, he played a very good game [at left back] in St. Vincent. He's a player that is just growing, getting more mature. He's versatile, he can play in midfield as well, as he does usually with FC Dallas. So it's good to see that our back line gives us options.”
The USMNT boss will have to make significant changes to the back four that shut out St. Vincent & the Grenadines on Friday. Right back DeAndre Yedlin returned to his new club Newcastle United on Sunday morning after earning a yellow card that leaves him suspended for Tuesday's clash, while center back Matt Besler flew home to spend time with his wife and first child, who was born on Friday.
Fans may not see any significant changes in goal any time soon, however. On Sunday Klinsmann laid down his latest pointed criticism of the young crop of US 'keepers like Bill Hamid, Sean Johnson and David Bingham.
“We are obviously blessed with Brad Guzan and Tim Howard,” he said. “As long as the younger ones are not stepping it up even more and pushing them – kind of pushing them out, basically – these two will defend their spots. And in order to have both always available and in good spirit, here and there we can rotate.
“It's not a big problem. They get along. So if one game is Brad Guzan playing and the next one is Tim Howard, it's not a big problem. They handle that very, very professionally. And then we keep waiting. We keep waiting for the next generation of goalkeepers to step it up and to challenge these two very experienced ones.”
Though Guzan started throughout most of the Copa America, Klinsmann announced last week that the two would alternate in these qualifiers. Howard is set to guard the pipes on Tuesday after Guzan got the nod Friday.
Klinsmann also addressed matters like US youth development, the fortunes of Yanks plying their trade abroad and the recent displays of Sacha Kljestan and Christian Pulisic. Here are a few of his notable statements:
On player development: “Youth development in the United States is a very, very different topic than in every other country in the world. Because of the school system, because of the situation that you get, through a sport, to a prestigious or a good university and maybe to a scholarship, sports is driven very, very differently to Latin America and especially Europe … it's a huge country so we're trying as hard as we can to speed up through certain developments. You saw over the last years the growth of the academy system in the United States. Also the fact that Major League Soccer is now investing heavily into youth development, building their own academies, obviously eventually being the lead academies in the country, because that's how it works in every other country in the world. There's a lot of work to get done, still, but I think we're making big, big progress.”
On the return of captain Michael Bradley, who was suspended for Friday's match: “It means a lot to us because obviously Michael is the captain. His experience and his drive is really important. The job is still not done. So we need Michael here on Tuesday night in Jacksonville to make sure that everybody's on board, everybody is tuned in and 100 percent focused to go with the right aggressiveness and determination into this game against Trinidad & Tobago.”
On the prospects of young US internationals abroad like Gedion Zelalem and Cameron Carter-Vickers: “We are in contact with our players, we try to help them as much as we can. At the end of the day, they need to be hungry, determined, nasty, and they need to be ready to fight their fights in their club teams and sooner or later break through, like the example maybe right now of Lynden Gooch at Sunderland. He found a way to fight through and now he has to find a way to keep his spot.”
|
{
"pile_set_name": "OpenWebText2"
}
|
f**2 - 5159*f + 368. Let z be p(-23). Find a, given that -5*a - 1/3*a**3 - 16/3*a**2 + z = 0.
-15, -1, 0
Let y = 3720 + -7439/2. Let n(r) be the second derivative of 1/4*r**4 + 0 - 7*r + y*r**3 - 3/2*r**2 - 3/20*r**5. Solve n(i) = 0 for i.
-1, 1
Let 1399/5*x - 1398/5*x**2 + 93*x**3 - 933/10 + 1/10*x**4 = 0. What is x?
-933, 1
Suppose -15*s = -12*s + 4*a - 682, 2*s + 3*a = 453. Factor -13 + 318*p + 101 - 4*p**2 - s*p.
-4*(p - 22)*(p + 1)
Let v(x) = -36*x**2 + 37*x**2 + 40*x - 38*x. Let u(f) = -9*f**2 - 242*f - 3364. Let g(z) = -u(z) - 5*v(z). Solve g(s) = 0 for s.
-29
Let v(i) be the first derivative of -3*i**5/5 + 495*i**4/4 - 7206*i**3 + 49440*i**2 - 115200*i + 7577. Factor v(g).
-3*(g - 80)**2*(g - 3)*(g - 2)
Let g(v) be the third derivative of -v**6/96 - 27*v**5/160 - 5*v**4/16 - 21*v**3/2 - 6*v**2. Let l(z) be the first derivative of g(z). Factor l(h).
-3*(h + 5)*(5*h + 2)/4
Let c be (1/4)/(1/(-2)) - (-62755)/11410. Let w(j) be the second derivative of 40/3*j**3 + 0 - 17/12*j**4 - 32*j**2 + 1/20*j**c - 31*j. Factor w(m).
(m - 8)**2*(m - 1)
Let k(v) be the third derivative of -1/105*v**7 + 9/2*v**3 + 0*v - 255*v**2 + 0 - 7/20*v**5 + 13/120*v**6 - 3/8*v**4. What is g in k(g) = 0?
-1, 3/2, 3
Let w(c) be the third derivative of 283*c**2 + 0 + 0*c + 1/2*c**5 - 9/8*c**4 - 1/40*c**6 + 0*c**3. Determine a so that w(a) = 0.
0, 1, 9
Let p = 737 - 501. Let -24*g**2 + 451 - p + 54*g - 243 - 2*g**3 = 0. What is g?
-14, 1
Let p(h) be the second derivative of -h**5/20 + 6*h**4 - 70*h**3/3 - 2219*h. Determine o, given that p(o) = 0.
0, 2, 70
Let p(g) be the third derivative of 3*g**7/560 + 247*g**6/80 - 25*g**5/6 - 413*g**4/12 - 55*g**3 - 6*g**2 - 108*g. Find c such that p(c) = 0.
-330, -2/3, 2
Let s(u) be the second derivative of 183*u**5/20 + 94*u**4 + 609*u**3/2 + 135*u**2 - 294*u - 7. Factor s(n).
3*(n + 3)**2*(61*n + 10)
Suppose -63*z + 47*z + 1050 = 134*z. Let c(b) be the third derivative of 0*b**3 + 1/45*b**5 + 0 + 0*b + z*b**2 + 13/18*b**4. Factor c(v).
4*v*(v + 13)/3
Let m(r) = r**3 + 13*r**2 - 74*r - 635. Let a be m(-15). Let c(g) be the second derivative of -1/8*g**4 - g**3 + 0 + a*g - 9/4*g**2. Factor c(i).
-3*(i + 1)*(i + 3)/2
Suppose -80*d**2 + 4*d**4 - d**4 - 18*d**3 + 219*d + 27*d**2 + 51*d - 58*d**2 = 0. What is d?
-5, 0, 2, 9
Let m(w) be the first derivative of -27 + 1/140*w**5 - 11*w + 0*w**3 + 1/42*w**4 + 0*w**2. Let q(z) be the first derivative of m(z). Factor q(r).
r**2*(r + 2)/7
Let y(z) = -z**2 - 5561*z - 22226. Let i be y(-4). Let w be (-1426)/(-72) + 6/(-24). Factor 386/9*q**i + 32/9 - 50/9*q**5 - w*q + 230/9*q**4 - 422/9*q**3.
-2*(q - 1)**3*(5*q - 4)**2/9
Let z be ((-30)/(-14) + -2)/((-729)/(-7290)). Factor 2/7*u**3 - 2/7*u - z*u**2 + 10/7.
2*(u - 5)*(u - 1)*(u + 1)/7
Suppose -9*i + 388 - 91 = 0. Determine a, given that -74 - i*a**2 + 141 - 94 + 57*a + 3*a**3 = 0.
1, 9
Determine y, given that 140/11 - 2/11*y**2 - 6/11*y = 0.
-10, 7
Let t be 1 + (-27)/(-9)*-1. Let f be (-10 - t - 2) + 10. Solve 1/2*q**3 + 3/2*q**2 + f + 0*q = 0 for q.
-3, 0
Solve 0 + 62/3*g**2 + 22/3*g**3 - 4*g = 0.
-3, 0, 2/11
Let n = -20530 + 102654/5. Factor -n + 4/5*c**2 - 2/5*c + 2/5*c**3.
2*(c - 1)*(c + 1)*(c + 2)/5
Let a(x) be the first derivative of -x**4/10 - 14*x**3/5 + 301*x**2/5 - 558*x/5 - 678. Factor a(t).
-2*(t - 9)*(t - 1)*(t + 31)/5
Let j(l) = l + 19. Suppose -f + 2*f = -8. Let b be j(f). Factor b*q**4 + 17*q**2 - 3*q**4 + 16*q**3 - q**2 - 4*q**4.
4*q**2*(q + 2)**2
Determine c so that 15972 - 252*c**3 - 1/2*c**5 + 2057/2*c - 19*c**4 - 1177*c**2 = 0.
-11, -8, 3
Let c(g) be the second derivative of -32*g**5/5 + 2088*g**4 - 272484*g**3 + 17779581*g**2 - 3*g - 76. Factor c(v).
-2*(4*v - 261)**3
Let a(n) be the first derivative of -3*n**5/35 - 6*n**4 - 159*n**3/7 + 6*n**2/7 + 636*n/7 - 1371. Let a(q) = 0. Calculate q.
-53, -2, 1
Let j(u) = -u**3 - 5*u**2 - 5*u - 2. Let z be j(-5). Find b such that 970*b**4 - 64*b - 966*b**4 + b**2 + z*b**2 + 36*b**3 = 0.
-8, -2, 0, 1
Factor -212/3*z - 2/3*z**2 + 370.
-2*(z - 5)*(z + 111)/3
Suppose 4*l - l = 3*z - 30, 0 = 4*l + 24. Let h(b) be the first derivative of 0*b + 6/5*b**3 - 27/10*b**2 - 3/20*b**z + 23. Factor h(y).
-3*y*(y - 3)**2/5
Let j(d) be the first derivative of 15/2*d**2 + 0*d + 1/150*d**5 - 1/60*d**4 - 2/15*d**3 - 45. Let c(x) be the second derivative of j(x). Factor c(v).
2*(v - 2)*(v + 1)/5
Let w(g) be the third derivative of g**7/168 - 19*g**6/12 + 325*g**5/2 - 21875*g**4/3 + 156250*g**3/3 + 57*g**2 + 13. Find x, given that w(x) = 0.
2, 50
Let n(h) be the first derivative of -5*h**3/3 + 1275*h**2/2 + 9170*h + 4853. Suppose n(d) = 0. Calculate d.
-7, 262
Factor 125*n + 10798 - 11568 + 4*n**2 - 9*n**2.
-5*(n - 14)*(n - 11)
Let t = -79 - -105. Let 27*y**4 + 4*y**2 + 4*y - 4*y**3 + 8 - 16*y**2 + t*y**4 - 49*y**4 = 0. What is y?
-1, 1, 2
Let t(r) be the second derivative of -3*r**4/8 - 1801*r**3/6 - 200*r**2 - 6301*r. Factor t(p).
-(p + 400)*(9*p + 2)/2
Suppose 0 - 5/7*b**2 + 12*b - 1/7*b**3 = 0. What is b?
-12, 0, 7
Find c, given that -605/4*c**2 - 359/4*c - 21/2 - 301/4*c**3 - 13/4*c**4 = 0.
-21, -1, -2/13
Let u(q) = 4*q + 4*q + 2*q - 50*q**2 + 94*q**3 - 37*q**4. Let z(j) = j**4 - j**2 - j. Let x(w) = -u(w) - 2*z(w). Suppose x(i) = 0. Calculate i.
0, 2/7, 2/5, 2
Let p(o) be the third derivative of -o**8/112 + 71*o**7/70 + 371*o**6/40 + 677*o**5/20 + 265*o**4/4 + 76*o**3 + 16*o**2 - 11*o. Factor p(r).
-3*(r - 76)*(r + 1)**3*(r + 2)
Factor -26/25*r**2 + 2/5*r**3 + 14/25*r + 0 + 2/25*r**4.
2*r*(r - 1)**2*(r + 7)/25
Let r(q) be the second derivative of -4*q**7/63 - 284*q**6/45 - 5029*q**5/30 + 430*q**4/9 + 15691*q**3/9 + 10082*q**2/3 + 1895*q + 1. Solve r(w) = 0.
-71/2, -1, 2
Suppose -4*h = -3*i + 7*i - 16, i = 4*h + 9. What is f in i*f**2 - 588*f - 20 + 1170*f - 567*f = 0?
-4, 1
Let b be 3/(-4)*(45 + -49). Let o be (-205)/(-33) - (3 + (-10)/b). Determine h, given that -162/11*h**2 - o*h - 8/11 = 0.
-2/9
Suppose 12725 - 5*h**2 - 990*h - 13145 - 48585 = 0. Calculate h.
-99
Let u(o) be the third derivative of -o**7/70 + 59*o**6/40 + 17*o**5/5 - 117*o**4/2 - 360*o**3 - 320*o**2 + o - 1. Factor u(r).
-3*(r - 60)*(r - 3)*(r + 2)**2
Let q be (1 - 11)/(-31 - (35 + -62)). Factor -q*j**3 + 0 + 5/2*j + 5/2*j**4 - 5/2*j**2.
5*j*(j - 1)**2*(j + 1)/2
Let x(o) = o - 1. Let j(i) = 5*i**2 + 45*i - 1315. Let r(n) = -j(n) - 5*x(n). Let r(p) = 0. Calculate p.
-22, 12
Let f(t) be the first derivative of 3/4*t**4 - 13*t**3 + 147*t + 105/2*t**2 - 45. Factor f(o).
3*(o - 7)**2*(o + 1)
Let v(c) = 6*c**2 + c + 3. Let l(d) = -14*d**2 + 316*d + 314. Let h(r) = l(r) + 2*v(r). Factor h(y).
-2*(y - 160)*(y + 1)
Determine u, given that 3 - 1964*u - 26605*u**2 + 26604*u**2 - 3 = 0.
-1964, 0
Let n(z) = 25*z**2 + z - 2. Let v(a) = 155*a**2 + 9506*a - 12. Let b(h) = -6*n(h) + v(h). Factor b(p).
5*p*(p + 1900)
Find p, given that -108*p + 2*p**3 + p**3 + 42*p**2 - 168 - 5*p**3 + 116*p = 0.
-2, 2, 21
Let z(d) = -d**3 - 3*d**2 - 397*d - 790. Let w be z(-2). Solve w + 8*h + 2/9*h**4 + 20/9*h**3 + 22/3*h**2 = 0.
-4, -3, 0
Let g(d) = 4*d**2 - 2132*d + 2131. Let s be g(1). Find v, given that 3/10*v**s + 1/10*v**4 + 1/10*v**2 - 1/5 - 3/10*v = 0.
-2, -1, 1
Let m(b) be the second derivative of b**4/4 + 585*b**3 + 1026675*b**2/2 - 459*b + 3. Factor m(p).
3*(p + 585)**2
Let s be (4311/97716)/((-6)/(-34)). Find g such that -9/4 + 1/4*g**3 + s*g**2 - 9/4*g = 0.
-3, -1, 3
Let j(q) be the third derivative of -q**8/4032 - q**7/126 - q**6/12 + 89*q**5/30 - q**2 + 60*q. Let m(p) be the third derivative of j(p). Factor m(h).
-5*(h + 2)*(h + 6)
Let w = 2/253919 + 507832/761757. Find m such that 4*m**2 + 24*m - w*m**3 - 144 = 0.
-6, 6
Suppose -i - 9 = -4*d, 0 = 2*d - 159*i + 157*i. Let o be (-55)/(-77) - 2/7. Solve -6/7*z**2 + 9/7*z**d + 0 + 0*z**4 - o*z**5 + 0*z = 0.
-2, 0, 1
Determine z, given that 19*z**2 - 128/7 - 5/7*z**4 + 318/7*z - 318/7*z**3 = 0.
-64, -1, 2/5, 1
Let c(y) = 4*y**3 + y - 1. Let n be c(-2). Let s = n + 48. Factor -9*t**4 + 19*t**4 + 3*t**3 - s*t**4.
-3*t**3*(t - 1)
Let q(f) be the second derivative of 5*f**4/24 - 2405*f**3/3 + 1156805*f**2 + 6044*f. What is d in q(d) = 0?
962
Let r = 354 - 352. Factor 2 + 18*k**2 - r - 13*k**2 + 5*k.
5*k*(k + 1)
Let i(f) be the first derivative of 6*f - 2*f**3 + 3/4*f**4 - 3/2*f**2 - 79. Determine u so
|
{
"pile_set_name": "DM Mathematics"
}
|
The untold stories behind a cup of coffee are what directors Andrés Ibáñez Díaz and Alejandro Díaz tell in their new documentary A Six Dollar Cup of Coffee, which premiered in Mexican City last week after making the rounds in the international film festival circuit.
The film focuses on a Tzeltal family that works in a coffee cooperative in Chiapas and the trend of specialty coffee in Seattle, U.S., questioning the paradigms of quality in the coffee world.
“We opted for this type of documentary because we’re big-time coffee drinkers, we have up to five or six cups a day,” said co-director Ibáñez. “And although we like it a lot, we didn’t know from where it came or what it entailed.”
Alejandro Díaz assured viewers that A Six Dollar Cup of Coffee isn’t a documentary meant to make them feel bad for drinking their favorite pick-me-up.
“What we hope to do is to initiate a conversation. That coffee drinkers look at the product with instinctive eyes and check the label before consuming it, or that when they want a coffee, they analyze whether it’s good to go to the chain store or walk another block to buy it from their neighborhood cafe,” he said.
“You shouldn’t be shocked by a six-dollar cup of coffee,” says a person interviewed for the trailer for the film. “You should be shocked by a one-dollar cup of coffee. Because if a cup of coffee costs one dollar, and you truly know and understand the process and where that coffee came from, someone is getting screwed along the way.”
Ibáñez explained that coffee from Mexico to Ecuador is cultivated by indigenous people.
“We have no idea who is paying the producers, but it’s a chain of intermediaries that usually pays them very little,” he said.
Despite the market benefiting the farmers the least, the directors found them to be resilient, positive and self-affirming. Far from seeing themselves as victims, they saw themselves as enterprising producers of a quality product.
“The first thing we encountered [at the cooperative] was a syncretic Mayan/Catholic ceremony to celebrate the beginning of the coffee planting season, and we delved into the cosmogony,” said Ibáñez. “And their stories blew our minds.”
It took Ibáñez and Díaz five years to complete the documentary, which was shown at film festivals in Havana, Vancouver, Turkey, Spain, Germany and the Czech Republic, as well as in Querétaro and Guadalajara.
“We learned to be patient because the documentary moved at different rhythms from our own . . . We had to wait until the coffee was ready to be harvested . . . It was a long process, but it filled us with satisfaction,” said Díaz.
Source: La Jornada (sp)
|
{
"pile_set_name": "OpenWebText2"
}
|
Surgical therapy for chronic aphakic cystoid macular edema.
Aphakic cystoid macular edema (ACME) is a common condition seen after intracapsular cataract extractions. In an overwhelming majority of these cases, the condition improves spontaneously. Those cases that persist for months or years, however, are often associated with vitreous strands adherent to the surgical wound and distortion of the pupil. This article reviews the surgical and photocoagulation therapies for this condition that have been reported over the past two decades. All studies report encouraging results, but all have been nonrandomized, uncontrolled trials. This paper describes two randomized, controlled clinical studies that are attempting to evaluate objectively the role of vitrectomy for chronic cases of aphakic cystoid macular edema.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
1. Field of the Invention
The present invention relates to systems and methods for sending and receiving messages. In particular, the present invention relates to a system and method for sending and receiving messages using a publish/subscribe architecture. Still more particularly, the present invention relates to devices and methods for efficiently implementing a publish/subscribe messaging system on a distributed computing architecture.
2. Description of the Background Art
The use and proliferation of distributed computing networks is ever increasing. With the advent and business use of the Internet, the need for more efficient distributed computing system has become critical. The business use of the Internet has forced the integration of disparate computing environments with distributed computing systems that enable data transfer between such disparate systems. However, this in turn has created a need for better messaging systems that can handle amount of data and communication that are needed to effectively let disparate systems operate together and share information.
There have been attempts in the prior art to provide a solution to communication and data transfer problems associated with distributed computing. These attempts in the prior art attempt to solve this messaging problem by adding messaging systems that allow different applications to communicate with each other such as Message Oriented Middleware (“MOM”) architectures. MOM systems include software that performs the message-handling tasks that enable disparate software applications to communicate without requiring programmers know the details of the message handling operations. MOM architectures often require additional message processors to handle such message processing responsibilities. Thus, there is a significant amount of administrative overhead associated with such architectures. Moreover, unless messages are at a consistent level and a high volume, the added administrative processing resources can be underutilized and waste bandwidth. This is especially true as networks and systems grow in size and scale.
Another issue in the prior art is that most messaging systems provide only point-to-point communication methods. With point-to-point communication methods, there is significant processing overhead associated with establishing a point-to-point connection to every destination when a single message is sent to multiple destinations. As the distributed networks become more complex this only increases the amount of computing bandwidth that gets consumed. Further, the topology and connectivity changes are continual, especially in distributed computing architectures. This adds to the administrative overhead of existing point-to-point messaging systems because they must propagate such changes for each message.
Therefore, what is needed is a system and methods for implementing a publish/subscribe messaging system that overcomes the limitations found in the prior art.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Editor’s note: The Chronicle is reviewing the season of each player after the Warriors’ second straight championship run.
A brash, emotional leader, Draymond Green needs high stakes to be at his best.
That is why those who know him didn’t fret when he struggled with consistency during the regular season. They recognized that, when the playoffs arrived, Green would return to his do-everything ways.
He didn’t disappoint. After a regular season that failed to reach his lofty standard, Green was a driving force in the Warriors’ third championship run in four years.
He averaged 14.8 points, 11.8 rebounds and 10.0 assists against New Orleans in the Western Conference finals to become the first player in franchise history to average a triple-double in a playoff series. In the West finals and NBA Finals, Green played with his signature fury, lifting his team out of its doldrums at just the right moment.
It was easy to forget that he was dealing with nagging injuries.
Right shoulder soreness, the lingering aftermath from JaVale McGee undercutting him on a block attempt in November, bothered Green almost all season. At various points, Green dealt with a swollen elbow, knee soreness, a bruised pelvis and emergency dental surgery to correct a tooth that was knocked back on a Russell Westbrook drive.
Still, Green’s issues this past season were rooted in more than injuries.
More Information Draymond Green bio Age: 28 Position: Power forward Ht./Wt.: 6-7, 230 pounds Hometown: Saginaw, Mich. College: Michigan State Years pro: 6 2017-18 averages: 11.0 points, 7.6 rebounds, 7.3 assists, 1.3 blocks, 32.7 minutes per game Contract status: Entering fourth year of a five-year, $82 million deal
Read More
In November, while speaking to a standing-room-only crowd of more than 150 students and faculty members at Harvard’s Institute of Politics, he took responsibility for Golden State’s first three losses of the season. For reasons he did not reveal, Green was having a tough time finding the emotional bravado that had fueled him since his days playing the older kids at Civitan Recreation Center in Saginaw, Mich.
After being the centerpiece of a top-five defense for four straight seasons, Green was part of the reason the Warriors slumped to ninth this past season. His focus waned as he made uncharacteristic defensive mistakes. With Green on the court in the regular season, Golden State’s defensive rating was 103.7 — a far cry from the 98.4, 96.0, 97.5 and 99.3 it posted the four previous seasons.
It didn’t help matters that Green struggled to rein in his emotions. Instead of moving on to the next play, he often jawed with referees on his way back down-court. His 15 technical fouls were one shy of a league-mandated one-game suspension.
Though Green unleashed on the officials multiple times in the playoffs, he did a much better job of avoiding run-ins without sacrificing his tenacity. In April, May and June, when Green played at an All-NBA level, one thing was clear: By coasting at times in the regular season, he preserved necessary energy for the sport’s biggest stage.
Offseason outlook: Warriors majority owner Joe Lacob has said that he plans to offer Green, who is entering the fourth year of a five-year, $82 million deal, a new contract this summer.
However, odds are that he’ll prefer to wait until free agency. Green could make far more than the three-year, $71.7 million deal he could be extended for this summer if he just holds out.
Connor Letourneau is a San Francisco Chronicle staff writer. Email: cletourneau@sfchronicle.com Twitter: @Con_Chron
|
{
"pile_set_name": "OpenWebText2"
}
|
Luiz - Would you please look over the last update that you provided me with, and let me know if there are any recent updates I should include in the November report to Jim? Also - If there are any new projects that you are working on, please let me know.
Thank you,
Bryan
|
{
"pile_set_name": "Enron Emails"
}
|
Escalating violence in South Sudan is casting a light on Israel's murky involvement in that conflict and raising questions about Prime Minister Benjamin Netanyahu's new strategy of strengthening ties with African countries.
Follow Ynetnews on Facebook and Twitter
Netanyahu has been forging alliances across Africa in an effort he says will help blunt Palestinian diplomatic initiatives against Israel at the United Nations.
But critics say these new ties — illustrated by Netanyahu's high-profile visit to several African countries in July — have come without regard for the human rights records of those allies.
Netanyahu meets with the leaders of seven African states (Photo: Kobi Gideon GPO)
Such concerns have been magnified by Israel's close ties to South Sudan, whose government has used Israeli arms and surveillance equipment to crack down on its opponents. Critics say Israel's global arms export policies lack transparency and proper oversight, and ignore the receiving country's intended use.
"It is the role of the prime minister, the defense minister and the foreign minister to look out for Israel's interests. But this has a limit: not at any cost and not with everyone," said Tamar Zandberg, an Israeli opposition lawmaker who has filed a court appeal to halt Israeli sales of sensitive technology to South Sudan.
Israel has long viewed South Sudan as an important ally and a counterweight to neighboring Sudan's support for Islamic Palestinian militants. Israel was one of the first countries to recognize South Sudan's independence in 2011, and South Sudanese leader Salva Kiir visited Israel months later.
Since South Sudan descended into civil war in 2013, some 50,000 people have been killed and 2 million have been displaced.
In July, hundreds died when fighting erupted in the capital, Juba. South Sudanese troops went on a nearly four-hour rampage at a hotel, killing a local journalist while forcing others to watch, raping several foreign women, and looting the compound, several witnesses told The Associated Press.
Just days earlier, Netanyahu had traveled to four African countries — Uganda, Kenya, Rwanda and Ethiopia — in a visit meant to cultivate new allies. It was the first visit to sub-Saharan Africa by a sitting Israeli prime minister in nearly three decades.
During the visit, he convened a summit with seven regional leaders, including Kiir — nearly all of whom have been criticized by rights watchdogs for alleged abuses.
Kenyan President Uhuru Kenyatta has been charged by the International Criminal Court with crimes against humanity for his role in stoking ethnic violence, charges that were later withdrawn, with the prosecutor accusing Kenya of blocking her investigation. Ugandan President Yoweri Museveni, 71, has served for 30 years and is trying to change the constitution so he can effectively extend his rule for life. Rwandan President Paul Kagame has been dogged by allegations of human rights abuses in neighboring Democratic Republic of Congo and criticized by rights groups for being an authoritarian ruler.
Prime Minister Netanyahu with Ethiopian Prime Minister Hailemariam Desalegn (Photo: Kobi Gideon GPO)
Israeli Foreign Ministry spokesman Emmanuel Nahshon said Israel is "extremely satisfied with our renewed relations with many African countries and Israel does not interfere in those countries' internal affairs." He rejected criticism of the Israeli outreach, suggesting Israel was being unfairly singled out. The United States and other Western countries also consider many African countries important allies.
A UN report in January said Israeli surveillance equipment was being used by South Sudanese intelligence, allowing it to intercept communications in a "significantly enhanced" crackdown on government opponents.
The report also found that an Israeli automatic rifle known as the Micro Galil is "present in larger numbers than before the outbreak of the conflict."
According to the report, Israel sold the rifles to Uganda in 2007, which transferred the weapons to South Sudan's National Security Service in 2014. According to the report, Israel said it didn't receive a request from Uganda for the transfer.
Eitay Mack, an Israeli lawyer working with Zandberg said weapons export licenses require knowledge of end users and mid users — meaning the transfer would either have been done with Israel's knowledge or would have prompted an investigation into the offending company. He said no investigation was known to have been opened.
The UN report said Israeli ACE rifles were used in a massacre that targeted Nuer citizens in Juba in 2013.
Zandberg said Israel stopped sending firearms to South Sudan in 2013 but that export licenses for the surveillance equipment continue. The Israeli Defense Ministry did not respond to requests for comment.
The European Union has placed an arms embargo on South Sudan, and following the outbreak of violence, the US imposed sanctions on top military officials from both sides of the conflict.
In August, the UN Security Council approved an additional regional protection force to enter South Sudan, but decided against an arms embargo on the country.
"Even without an international arms embargo, states should unilaterally suspend arms transfers given the likelihood that arms would be used to commit human rights violations," said Elizabeth Deng, Amnesty International's South Sudan researcher.
Zandberg and Mack asked Israel's Supreme Court in May to force Israel to explain why it has continued export licenses for the surveillance system to South Sudan. Reflecting Israel's typically opaque approach to such transfers, the Defense Ministry asked for a gag order to be imposed on the proceedings. A hearing is scheduled later this month.
Netanyahu meets with Uhuru Kenyatta (Photo: AFP)
Zandberg is also seeking to change Israel's weapons export oversight law, which she says does not adequately ensure that
Israeli arms don't end up in troubled countries.
The law states that Israel shall not supply weapons to any country under a Security Council arms embargo. But the council can often be slow to act, and Zandberg wants Israel's Foreign Ministry to have clout in determining whether it should allow arms transfers.
A 2013 report by Israel's state comptroller pointed to "shortcomings, some of them significant," in export oversight, including a lack of personnel to investigate possible breaches and lax enforcement of requirements for exporters.
"A country that hands out these export licenses has to be accountable and to take responsibility for the (weapons') final use," Zandberg said.
|
{
"pile_set_name": "OpenWebText2"
}
|
Gallery: Eleven down Nashville SC for 1st win at Lucas Oil
INDIANAPOLIS — Two USL newcomers squared off at Lucas Oil Stadium on Saturday afternoon, with the Indy Eleven ultimately triumphing 2-1 over Nashville SC.
Soony Saad’s brace led the way for Indy, while the assists came from Ayoze and Jack McInerney. Ropapa Mensah tallied for Nashville on a pass from Lebo Moloto. Gallery:
Follow Robbie on Twitter: @RobbMeh.
Support Soc Takes on Patreon for access to exclusive content and supporter benefits. Click here to become a patron today.
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
CSS Proper alignment next to image in a row
I'm trying to align text to the right of an image but I can't seem to get it working, I've tried different methods of css but can't get it too work.
Edit: Also, How would I adjust this if i were to put it at the top? If I mvoe it manually then the bottom row will mess up too.
What it looks like (Default)
What I want it too look like (Only the first one, the others mess up)
Here is the css:
.slider__contents {
height: 100%;
padding: 2rem;
text-align: center;
display: -webkit-box;
display: -webkit-flex;
display: -ms-flexbox;
display: flex;
-webkit-box-flex: 1;
-webkit-flex: 1;
-ms-flex: 1;
flex: 1;
-webkit-flex-flow: column nowrap;
-ms-flex-flow: column nowrap;
flex-flow: column nowrap;
-webkit-box-align: center;
-webkit-align-items: center;
-ms-flex-align: center;
align-items: center;
-webkit-box-pack: center;
-webkit-justify-content: center;
-ms-flex-pack: center;
justify-content: center;
}
.slider__image {
font-size: 2.7rem;
color: #2196F3;
}
.slider__caption {
font-weight: 300;
top: 95px;
margin-left: 80px !important;
position: absolute;
margin: 2rem 0 1rem;
text-shadow: 0 1px 1px rgba(0, 0, 0, 0.1);
text-transform: uppercase;
vertical-align: text-bottom;
}
.slider__txt {
color: #f00;
margin-bottom: 3rem;
max-width: 300px;
position: absolute;
top: 95px;
margin-left: 10px;
font-size: 17px;
text-align: left;
}
Here is the html:
<div class="row">
<div class="col-md-4">
<div class="slider__contents">
<img class="img-avatar1" src="/images/team/1.jpg"/>
<h2 class="slider__caption">Matt Sowards</h2>
<p class="slider__txt">Founder</p>
<!-- <a href="#" target="_blank"><p class="slider__steam">Steam Profile</p></a> -->
</div>
</div>
</div>
A:
Wrapping your text tags into extra markup and switching to proper flex usage will net you the result you're after. Using absolute positioning is not the way to go here. See the snippet below (I have removed some code, my additions are followed by a comment):
.slider__contents {
height: 100%;
padding: 2rem;
text-align: center;
display: flex;
flex: 1;
align-items: center;
justify-content: center;
background: gray;
}
.slider__image {
font-size: 2.7rem;
color: #2196F3;
display: block;
width: 4rem; /* Supposed to be the default size of the avatar */
height: 4rem; /* Supposed to be the default size of the avatar */
padding: 4px; /* Just to replicate your styles */
border: 2px solid red; /* Just to replicate your styles */
border-radius: 50%; /* Just to replicate your styles */
background-color: white; /* Just to replicate your styles */
overflow: hidden; /* Just to replicate your styles */
}
.slider__image img {
width: 100%; /* Fit to container */
border-radius: 50%; /* Round image */
}
.slider__copy { /* Added to wrap the text */
display: flex;
flex-direction: column;
margin-left: 10px; /* Avoids text sticking to the avatar */
}
.slider__caption {
font-weight: 300;
text-shadow: 0 1px 1px rgba(0, 0, 0, 0.1);
text-transform: uppercase;
vertical-align: text-bottom;
margin: 0; /* Removes default margins, season to taste */
}
.slider__txt {
color: #f00;
max-width: 300px;
font-size: 17px;
text-align: left;
margin: 0; /* Removes default margins, season to taste */
order: -1; /* Places it first in the current flex flow */
}
<div class="row">
<div class="col-md-4">
<div class="slider__contents">
<div class="slider__image"><!-- Added this wrapper around your image, name as you wish -->
<img class="img-avatar1" src="/images/team/1.jpg" alt="Avatar"/>
</div>
<div class="slider__copy"><!-- Added this wrapper around your text, name as you wish -->
<h2 class="slider__caption">Matt Sowards</h2>
<p class="slider__txt">Founder</p>
<!-- <a href="#" target="_blank"><p class="slider__steam">Steam Profile</p></a> -->
</div>
</div>
</div>
</div>
|
{
"pile_set_name": "StackExchange"
}
|
Introduction {#sec1-1}
============
Leukoencephalopathy, intracranial calcifications, and cysts (LCC) is a very rare cerebral disorder, first described in 3 children in 1996.\[[@CIT1]\] It has been later reported from around the world in children and adults, with onset up to 59 years.\[[@CIT2]\] The clinical presentation is insidious and variable. Typically, initial symptoms are of raised intracranial pressure, later followed by focal neurologic deficits. All the reported patients have a characteristic triad of calcification in the deep cerebral nuclei and white matter, diffuse leukoencephalopathy, and multiple cystic brain lesions on brain imaging. The histopathologic findings described include a peculiar angiopathy and abundant Rosenthal fibers.\[[@CIT3]\] All these features justify the designation of LCC as a distinct, although extremely rare, nosologic entity.
We report an adult case with clinical, radiologic, and pathologic features consistent with LCC from a tertiary care hospital in South India.
Case Report {#sec1-2}
===========
A 50-year-old man presented in June 2009 with headache of 4 months duration, progressive unsteadiness of gait since 1 month and recurrent vomiting since 1 week. Headache was holocranial, throbbing, almost continuous, and tended to disturb sleep. Cough worsened the headache. He never had diplopia or visual obscurations. He felt unsteady while walking, but gave no history of falls. He did not have tremors or difficulty in using the upper limbs.
He had a past history of seizures during childhood, associated with fever, which had not recurred so far. He worked as a vendor for herbal medications, and was continuing to do so until a month prior to the onset of symptoms.
Clinical examination showed early papilledema, normal eye movements, bilateral finger--nose and heel--knee incoordination as well as dysdiadochokinesia. He had a spastic-ataxic gait.
Complete blood count, sedimentation rate, liver and renal function tests, serum calcium, phosphate, alkaline phosphatase levels, chest radiograph, and abdominal ultrasonogram were within normal limits. Serological tests for HIV 1 and 2 were negative.
Magnetic resonance imaging (MRI) of the brain showed multiple bilateral cerebral cystic lesions and a large right cerebellar cyst with mass effect, compressing the 4th ventricle and brainstem. Diffuse T2 hyperintense lesions were seen bilaterally in the subcortical and cerebellar white matter. The cystic lesions enhanced with contrast administration. No hemorrhage was noted \[Figures [1a](#F0001){ref-type="fig"}--[c](#F0001){ref-type="fig"}\].
{#F0001}
Lumbar cerebrospinal fluid (CSF) was slightly xanthochromic and showed 26 leukocytes (45% polymorphs, 55% lymphocytes) with protein of 106 mg% and glucose of 149 mg%. CSF cryptococcal antigen was negative.
The differential diagnosis considered included cystic metastases, infective cysts, and tumefactive demyelination. We decided to proceed with posterior fossa craniectomy and excision of the right cerebellar cyst. Peroperatively, the cyst contained brownish fluid and showed visible calcification in the wall.
A computed tomography of brain was done postoperatively and confirmed the presence of multiple calcifications in the white matter and basal ganglia \[[Figure 1d](#F0001){ref-type="fig"}\]. Histopathology of the excised cyst wall showed intensive gliosis with Rosenthal fibers, prominent angiomatous changes, microcalcifications, and microhemorrhages. Angiomatous changes consisted of numerous small blood filled vessels with many showing hyalinized walls. Gliosis was pilocytic and showed plenty of Rosenthal fibers. Microcalcifications were extensive and there was also concentric fine calcification around blood vessel walls. Foci of microhemorrhages and hemosiderin pigment deposits were also noted in relation to the abnormal blood vessels \[Figures [2a](#F0002){ref-type="fig"}--[d](#F0002){ref-type="fig"}\].
{#F0002}
Postoperatively the patient reported improvement in headache, while ataxia persisted. He was discharged on the 8th postoperative day and is being followed-up.
Discussion {#sec1-3}
==========
We report an adult patient diagnosed with LCC from South India. Our patient has all the characteristic clinical, radiologic, and pathologic features of LCC described in the previous reports.
Our patient presented with raised intracranial pressure and cyst-related mass effects, which are the 2 main presenting features of LCC. Large posterior fossa cysts causing pressure effects requiring surgical decompression are frequently noted and may be considered as a characteristic feature.\[[@CIT4]\] Some of the patients tend to be relatively well preserved, with no major cognitive or motor deficits, until they develop symptoms related to the mass effect of large cysts.\[[@CIT5]\] Repeated surgical procedures may be required to relieve symptoms caused by the enlarging cysts.
Some patients diagnosed with LCC also have Coat's retinopathy.\[[@CIT3]\] It has been proposed that Coat's retinopathy is a part of the spectrum of this disorder--the combined presentation has been termed as "cerebroretinal microangiopathy with calcification and cysts" or Coat's plus.\[[@CIT6]\] However, our patient did not have any evidence of retinal involvement.
Raised CSF protein has been described in a patient diagnosed with LCC and large posterior fossa cysts.\[[@CIT1]\] Our patient also had raised CSF protein, but also had pleocytosis, which has not been previously described, and is of unclear significance--the possibility of an associated sterile meningeal inflammation may be considered.
Histopathology of LCC is characterized by angiopathy, calcification, and Rosenthal fibers, and the tissue from our patient showed all these cardinal features. The primary abnormality is probably the obliterative cerebral angiopathy, which involves small vessels. Dystrophic calcifications (via slow necrosis) and formation of cysts and secondary white matter abnormalities may be secondary changes.\[[@CIT1]\] It has also been suggested based on MRI characteristics that the white mater hyperintensities on T2-weighted images represent vasogenic edema affecting the parenchyma.\[[@CIT3]\]
In the first reported adult case, genetic analyses did not identify any significant mutations in 2 candidate genes, glial fibrillary acidic protein (GFAP) and cerebral cavernous malformation (CCM), although a mutation of unknown importance was identified in the gene for GFAP.\[[@CIT7]\]
The cause of this mysterious disorder remains unknown, but is probably genetic. Further genetic testing may provide more insights. The other case reports are from France,\[[@CIT1]\] Switzerland,\[[@CIT2]\] Brazil,\[[@CIT3]\] Turkey,\[[@CIT4]\] the United States,\[[@CIT5]\] the United Kingdom,\[[@CIT6]\] and Finland.\[[@CIT8]\] We add India to this list, raising the possibility that although rare, LCC has a global distribution.
We are indebted to Dr. KG Alexander, Chairman and Chief Physician, Baby Memorial Hospital, for his valuable help and support.
**Source of Support:** Nil
**Conflict of Interest:** Nil
|
{
"pile_set_name": "PubMed Central"
}
|
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "services/audio/loopback_coordinator.h"
#include "services/audio/group_coordinator-impl.h"
namespace audio {
template class GroupCoordinator<LoopbackGroupMember>;
} // namespace audio
|
{
"pile_set_name": "Github"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.