text
stringlengths
1
3.78M
meta
dict
Q: Using PyQt5, How do I make a QComboBox searchable? I am using PyQt5 to make a GUI. On it, I have a QComboBox that has a dropdown list that has over 400 items. I was wondering if there is any way in which I can type into the QComboBox to search for a matching case? A: You could use a QCompleter for this. For an editable QComboBox a QCompleter is created automatically. This completer performs case insensitive inline completion but you can adjust that if needed, for example from PyQt5 import QtWidgets from itertools import product app = QtWidgets.QApplication([]) # wordlist for testing wordlist = [''.join(combo) for combo in product('abc', repeat = 4)] combo = QtWidgets.QComboBox() combo.addItems(wordlist) # completers only work for editable combo boxes. QComboBox.NoInsert prevents insertion of the search text combo.setEditable(True) combo.setInsertPolicy(QtWidgets.QComboBox.NoInsert) # change completion mode of the default completer from InlineCompletion to PopupCompletion combo.completer().setCompletionMode(QtWidgets.QCompleter.PopupCompletion) combo.show() app.exec()
{ "pile_set_name": "StackExchange" }
1. Field of the Invention The present invention generally relates to field effect transistors (FET's) and more particularly to FET's which are capable of operating properly at nanoscale dimensions. 2. Description of the Related Art The metal oxide semiconductor field effect transistor (MOSFET) is the universal switching device in current computer logic and memory technology. The on-chip density and speed of MOSFETs has doubled every few years, resulting in the high performance of present day logic and, following Moore's Law, in memory. However, recent predictions show that, in its present form with Si as the semiconductor and SiO.sub.2 as the gate insulator, the MOSFET cannot be reduced in scale below a channel length of approximately 55 nm. This will result in less rapid performance improvement in logic chips, and eventually in performance saturation within a few years, unless significant design or material changes can be implemented within the relevant time frame. The invention described below is a high performance nanoscale field effect transistor (nanoscale FET) designed to be fabricated at scales corresponding to a channel length on the order of 1 nm. The FET according to the invention, termed the "nanoscale FET", is also an extremely fast switch. In terms of on-chip device density and device speed, the nanoscale FET offers an improvement of about 100 over current in-process technology, amounting to a factor of 10,000 improvement in speed-density. The invention achieves these improvements over current technology by material and design changes relative to existing MOSFET design practice, as described below. One application for the nanoscale FET is in future hybrid logic and memory technology "computer on a chip" high performance systems.
{ "pile_set_name": "USPTO Backgrounds" }
21 = 5*s - 0*s, -3*c + 4*s + 26 = 0. Let k(u) = 4*u - 71. Let y be k(18). Sort -4, y, c in ascending order. -4, y, c Suppose -2*m - 3 = -3*a, 3*a - 9*m = -13*m - 15. Put 142, -2, a in increasing order. -2, a, 142 Let g be (-3)/(-3*3/12). Suppose -g*a + 3 - 23 = 0. Let j = -8 + 13. Sort 3, a, j in descending order. j, 3, a Let r be ((-35)/10)/(2/4). Let t = 51 + -49. Sort -3, -1, r, t. r, -3, -1, t Suppose 4*l + 38 = 10. Let q = 1.04 - 0.04. Let a = -46.6 + 47. Sort a, l, q. l, a, q Suppose 0 = -3*j + 715 - 919. Sort j, -1, 5 in increasing order. j, -1, 5 Let g = 991 + -992. Put 6, g, 12, 3 in decreasing order. 12, 6, 3, g Let z = 0.85 - 1.25. Let d be (-26)/(-14) + (-3)/(-21). Let p = d + -7. Put z, p, 0 in increasing order. p, z, 0 Suppose 24 = 13*y - 14*y + 4*h, -2*y = 4*h + 12. Sort -5, 0, y, 6 in ascending order. y, -5, 0, 6 Let d = -7 - -8. Let g be 38/(-247) - (-72)/39*-1. Let t be ((-2)/2)/((-1)/(-4)). Sort d, g, t. t, g, d Let w = 3 + -2.5. Let j = 765.8 + -765.5. Put -1/8, 0.7, j, w in descending order. 0.7, w, j, -1/8 Let j = -84 + 22. Let i = 62.4 + j. Put i, -3, 9/8 in decreasing order. 9/8, i, -3 Let d = 32.64 - 30. Let f = d - 2.7. Let i = -45/82 - -2/41. Sort f, -1/10, i in ascending order. i, -1/10, f Suppose 4*t = 10*t + 3*t. Suppose t = -5*r + 23 - 8. Put r, -5, 7 in ascending order. -5, r, 7 Let y = 469 + -470. Sort y, 54, -5 in descending order. 54, y, -5 Let v be 3*(-2)/(-33) - 54/(-66). Sort 3, v, -20. -20, v, 3 Suppose o = m + 3*m + 4, o + 5*m = -5. Sort -3, 1, -1, o. -3, -1, o, 1 Suppose -22 - 5 = -z + 2*j, -5*z + 4*j = -123. Suppose 7 - z = -4*w. Suppose 4*m - 3*u - 2*u = 83, -3*m + 5*u = -61. Sort m, -3, w in decreasing order. m, w, -3 Let x = -0.025 + -0.195. Let p = x + 0.52. Let v be (-1 - 1)*2/(-4). Sort v, 16/9, p. p, v, 16/9 Let c(m) = -3*m**3 - 5*m**2 - m + 4. Let w be c(-4). Suppose 0 = -0*v - 5*v - w. Let q be v/(-231) + 14/(-49). Sort 1/4, q, 0.01. q, 0.01, 1/4 Let u be (-3)/(-2)*112/42 + -103. Put -3, u, 2 in descending order. 2, -3, u Let j(k) = -2*k**3 - 10*k**2 + 5. Let z be j(-5). Let t(m) = m**2 + 13*m - 67. Let c be t(4). Put z, 0, c in decreasing order. z, c, 0 Let u(q) be the first derivative of -q**2/2 + 3*q - 18. Let x be u(2). Sort -4, 3, x in decreasing order. 3, x, -4 Suppose 7*j = -1 + 29. Suppose 18 = -j*a + 10*a. Put a, 5, -6 in decreasing order. 5, a, -6 Let r = -1 + 1. Suppose 0 = -7*j - j - 6*j - 56. Sort j, 2, r in descending order. 2, r, j Let y = 0.09 - 2.09. Let o = 3 - 3.38. Let b = -0.3 - o. Sort y, b, -1/3 in increasing order. y, -1/3, b Let m = -260 + 257. Sort -2/13, m, 2/9 in ascending order. m, -2/13, 2/9 Let a be (-4 + 1)*(2 + -1). Let c(o) = 2*o + 1. Let y be c(a). Let g(n) = 2*n**2 + 32*n + 3. Let u be g(-16). Put y, 2, u in descending order. u, 2, y Let t = -6.9 - 23.1. Let k = t + 31. Sort -0.2, k, -2 in decreasing order. k, -0.2, -2 Let q = 8 + -4. Suppose 0*h + q*w + 4 = -3*h, 4 = 4*h + 3*w. Suppose 0 = -5*c + 3*l + 40, -2*l = 2*c - 5*c + 25. Sort 2/11, h, c in descending order. c, h, 2/11 Suppose 124 = 5*w - 36. Suppose -4*l + w = 4*l. Sort 2, -20, l. -20, 2, l Let m = -0.87 - -4.87. Let z = 2.93 + 0.07. Sort z, m, 0 in descending order. m, z, 0 Let x(l) = l**3 + l**2 - l. Let y be x(0). Suppose 0 = 10*j - 11*j + 6. Let i be (j + -8)*(-3)/12*-2. Sort -2, y, i in decreasing order. y, i, -2 Let l(u) = 6*u + 12. Let m be l(3). Let a = 34 - m. Sort a, 0, 3 in descending order. a, 3, 0 Suppose -45 = -b - 40. Suppose -5*s = -2*y + 3, -3*y - 2*s - 7 = 2*s. Sort b, y, -4, -2 in descending order. b, y, -2, -4 Let x = -0.097 + 191.097. Sort -4, 4, x in descending order. x, 4, -4 Let p = -256 + 255. Sort 77, -5, -3, p in ascending order. -5, -3, p, 77 Suppose -11*b - 5*m - 26 = -12*b, m + 22 = 3*b. Sort -2, b, -1. -2, -1, b Let o = 503/3 - 169. Let q = o - -19/12. Sort q, 0.2, 0, -1 in increasing order. -1, 0, 0.2, q Let d = 1.29 + -92.29. Let l = d + 96. Sort l, 15, 4. 4, l, 15 Let h be (-24)/(-60) - (-1819)/15. Let j = -121 + h. Let o = 3.9 - -0.1. Sort -5, o, j in increasing order. -5, j, o Let h = -35 - -16. Let s = -15 - h. Let b = 8 - 3. Sort 0.1, s, b in increasing order. 0.1, s, b Suppose -2*n + j - 179 = 0, 0 = -4*n - 5*j - 386 + 21. Put 5, n, -2 in increasing order. n, -2, 5 Suppose 4*w = 3*j - 43, 2*w + 16 + 6 = 2*j. Suppose 40*k = 42*k + 2*m - 2, 4*k - m = -11. Sort w, 4, k in decreasing order. 4, k, w Let d(j) = -2*j + j + 16 - j**2 - 17. Let s be d(-1). Sort -4, 1, s in decreasing order. 1, s, -4 Let d = -14.5 + 7.7. Let m = -2.2 + d. Let g = 0 - 3. Sort -3/7, m, g in increasing order. m, g, -3/7 Suppose 2*a + 2*k - 2 = 0, 4*a + 164*k = 162*k. Let v = 3 - -3. Suppose -2*x - 2*s = -8, -4*x + s = v*s - 19. Sort x, 2, a. a, x, 2 Let n be (-2 + 3)*3 - -18. Put n, -0.3, -5 in increasing order. -5, -0.3, n Suppose 3*k - 9 = x + 2*k, -5*x - 21 = k. Let c(z) = z**3 - 6*z**2 - 8*z + 8. Let y be c(7). Sort x, y, 9 in descending order. 9, y, x Let r = 1.3 - 6.3. Let z = 3 + r. Let g = 0.2 - -0.2. Sort 0, z, g. z, 0, g Let f(r) = -3*r**2. Let z be f(10). Let h = 3898/13 + z. Put 3, h, -3 in descending order. 3, h, -3 Suppose 0*w + w + 5 = u, 2*u = 0. Sort -2, 5, 0, w in descending order. 5, 0, -2, w Suppose -259 = 18*r - 259. Sort r, -4, 30 in decreasing order. 30, r, -4 Let h = 1 - -4. Suppose -z = 6*p - 2*p + 4, -2*p + z - 8 = 0. Put p, h, 3 in ascending order. p, 3, h Suppose -14 = 2*d + 2*d - f, -4*d = -2*f + 16. Suppose 0 = -3*v - 3*t - 18, -4*t - 10 = 5*v + 18. Put v, d, -1, -2 in decreasing order. -1, -2, d, v Let p = -152 - -148. Let r = -336/325 - -22/25. Put r, 1/8, p in increasing order. p, r, 1/8 Let a = -3144 - -3143. Let z = -3911/92 - -1670551/39468. Let s = z + 1/33. Put -9, a, s in descending order. s, a, -9 Let y = 571 - 569. Sort 294, y, -1. -1, y, 294 Let f = -75 + 71. Let b be (-2)/(-1*(-3 - -4)). Suppose -b*m = -m. Put f, m, 3 in ascending order. f, m, 3 Let y(v) = 94*v + 844. Let i be y(-9). Sort 0, -9, i in descending order. 0, i, -9 Suppose 3*s + 3 + 27 = 0. Let q be 2 + -5 + 2 + -5 + 4. Sort 5, q, s in ascending order. s, q, 5 Suppose -4*u = -6 + 6. Let g(t) = 6*t + 4. Let y be g(u). Sort 14, y, 0.2. 0.2, y, 14 Let u = -1143 + 1145. Let o = -27.1 - -30. Let d = -0.1 - o. Sort u, -0.4, d. d, -0.4, u Let p = 728 - 728.4. Let f be (-2)/5 - 62/(-80). Suppose -2*m - 2*m + 16 = 0. Sort f, m, p in ascending order. p, f, m Suppose -21 = -5*a + 4. Let y(s) = s**3 - 12*s**2 - 46*s + 27. Let d be y(15). Sort d, -2, a, -3 in descending order. d, a, -2, -3 Suppose -u + 13 = 10. Suppose -u*l - 15 = 2*h, 2*l + 5*h + 4 = -6. Sort l, 0, 1 in ascending order. l, 0, 1 Suppose -160 = 4*z - 128. Put z, -1, 2 in increasing order. z, -1, 2 Let p(z) = -z**3 - 7*z**2 - 10*z. Let t be p(-5). Suppose 0 = -3*n + y + y + 4, t = 4*n - 5*y - 10. Put 5, -4, n in ascending order. -4, n, 5 Let b = 86 - 86.354. Let d = 0.054 + b. Let o be -5*2/(0 - -2). Sort o, d, 1 in increasing order. o, d, 1 Let a = -10.4 + 7.4. Sort -0.036, -1/6, a in decreasing order. -0.036, -1/6, a Let x be (0 - 0)*(-2 + 1). Suppose 2*u = -0*k - 5*k + 3, u - 5*k - 9 = x. Suppose u = 2*t + 2*b, -4*t + 0*b + 4*b + 8 = 0. Put 1, t, -4 in descending order. t, 1, -4 Let x = 22 - 13. Let c = x + -9. Let g = -2 + 12/7. Sort 2, g, c in decreasing order. 2, c, g Let j = -602 - -603. Sort 11, j, -5, -4 in decreasing order. 11, j, -4, -5 Let r = 0.023 - -0.004. Let y = r - 0.527. Let x(v) = -v**3 + 8*v**2 - v - 2. Let u be x(8). Put u, 5, y in ascending order. u, y, 5 Suppose n + 4*g - 24 = 0, n - 2*g - 3 = -9. Let u be (-5 + 3)/(-2) - n. Sort u, 2, -1 in ascending order. u, -1, 2 Let n be ((-6)/4)/(3/4). Let o be (6 - 2) + n + 30. Suppose -z - 3*m - 2*m = 16, 3*z - 5*m = o. Put z, 1, 5 in increasing order. 1, z, 5 Let d = 518 - 522. Put d, 1, 4, -5 in ascending order. -5, d, 1, 4 Let h(u) = u - 7. Let n = 9 + -3. Suppose -2 = -z + n. Let f be h(z). Put 8, 3, f in descending order. 8, 3, f Let u(q) = 4*q - 7. Let b be u(2). Let s be (-2 - -2)/(-2 + b). Put -3, s, -1 in increasing order. -3, -1, s Suppose -2*o = -2 - 6, -14 = f - 4*o. Suppose -7*m = 1 + 41. Let c be 12/m*2/(-4). Put -5, c, f in decreasing order. f, c, -5 Suppose 3*s + 23 = q, 4 = -5*s - 5*q - 1. Let k(d) = d + 10. Let r be k(s). Suppose 48*u = 52*u, -2*x
{ "pile_set_name": "DM Mathematics" }
Share this: The Buffalo Sabres lost again Tuesday night when the Florida Panthers won the NHL draft lottery despite having the second-best chance to win the top selection in June’s draft. Buffalo had the best odds to win, but it will pick second. Aside from the top two picks, the rest of the lottery order went as expected. Now that we know the order of the first 14 selections, it’s time to predict which prospects these teams will draft. Here’s an early NHL mock draft, post-lottery edition. Note: The New Jersey Devils were a lottery team but will pick 30th because of the Ilya Kovalchuk contract situation. Picks 14 through 29 will be determined by the results of the 2014 Stanley Cup playoffs. 1) Florida Panthers — Aaron Ekblad, D, Barrie (OHL) Nearly every Stanley Cup champion has its blue line anchored by a franchise defenseman — a player such as Shea Weber, Zdeno Chara or Duncan Keith. Ekblad could be that player for Florida based on his exceptional strength (6-foot-4, 215 pounds), great positioning, a high hockey IQ and tremendous poise with the puck. Very few D-men are as polished defensively at 18 years old as Ekblad, who also shows promise as a dependable penalty killer. In addition to his defensive prowess, Ekblad tallied a career-high 53 points (23 goals, 30 assists) in 58 games for the Barrie Colts in 2013-14. 2) Buffalo Sabres — Sam Reinhart, C, Kootenay (WHL) The Sabres need help at every position, but after finishing the season ranked last in goals scored and second-to-last in power-play percentage, selecting a forward with this pick should happen. Reinhart is an exceptional playmaker with elite offensive awareness and protects the puck well with his balance and poise. He tallied 105 points (36 goals, 69 assists) in 60 games for Kootenay this season. Another reason for Buffalo to select Reinhart is his NHL readiness. He’s capable of making an impact at the pro level in 2014-15 based on his maturity and hockey IQ. A lot of the league’s best teams are built with strong depth down the middle, which is why the Sabres should select Reinhart to form a three-headed monster at center with former first-round picks Zemgus Girgensons and Cody Hodgson. 3) Edmonton Oilers — Sam Bennett, C, Kingston (OHL) The Oilers should trade this pick as part of a package for an established NHL D-man, but if they do make the pick, it should be a forward because there aren’t any defensive prospects worth taking in the top five after Ekblad. Bennett is the best choice because of his fantastic play-making skills, ability to dominate on the power-play and a polished two-way game. He doesn’t make a lot of mistakes and scores clutch goals. He tallied 91 points (36 goals, 55 assists) in 57 games in 2013-14. Drafting Bennett would give Edmonton a solid 1-2 punch down the middle with former No. 1 pick Ryan Nugent-Hopkins. 4) Calgary Flames — Leon Draisaitl, C, Prince Albert (WHL) Calgary took center Sean Monahan with the sixth overall pick last year, and he’s turned into a quality player with superstar potential. This year’s selection should be used to bolster the team’s center depth even more. Draisaitl has a high hockey IQ, impressive skating, a powerful shot and play-making skills that elevate the production of his linemates. The German forward posted 105 points (38 goals, 67 assists) in 64 games this season. Draisaitl doesn’t have amazing strength, but he protects the puck well and is willing to battle in the corners. His hard-working attitude would fit in well with this Flames forward group. 5) New York Islanders — Michael Dal Colle, LW, Oshawa (OHL) The Islanders need to send their 2014 or 2015 first-round pick to Buffalo as part of the Thomas Vanek trade, and because the top prize in the 2015 draft is a potential Sidney Crosby-type player in Connor McDavid, the best choice would be to give up this year’s selection. If the Islanders keep the pick, it should be used on a natural goal-scoring winger in Dal Colle. His accurate shot, great speed and soft hands make him a perfect winger for No. 1 center John Tavares. Dal Colle also would bring some much-needed toughness to the Islanders’ top nine. 6) Vancouver Canucks — Jake Virtanen, LW, Calgary (WHL) Vancouver needs a defenseman, but it would be tough to pass on a power winger with goal-scoring skills and speed such as Jake Virtanen, who reminds a lot of people of Anaheim Ducks superstar Corey Perry. Virtanen scored 41 goals in 71 games for the Calgary Hitmen this season. In addition to his offensive skill, Virtanen also is a polished defensive player who back checks consistently and will engage physically to win possession of the puck. He’s not NHL-ready yet, and might need another year in juniors and one season in the AHL, but he’s exactly what an aging Vancouver offense needs long term. 7) Carolina Hurricanes — KasperiKapanen, RW, Kalpa (SM-Liiga) The Hurricanes likely are headed for a complete rebuild, which would give them plenty of time to let talented players such as Kapanen fully develop. Kapanen, a son of a former NHL D-man, tallied 14 points (seven goals, seven assists) over 47 games in Finland’s top professional league SM-liiga. His high-end goal-scoring skill, blazing speed and impressive vision would significantly upgrade a Carolina offense that ranked 22nd in goals scored and 28th in power-play percentage this season. 8) Toronto Maple Leafs — William Nylander, C, MODO (SHL) Toronto’s eternal search for a No. 1 center should continue with the selection of Nylander, the son of a former NHLer. He has fantastic hands and tremendous play-making ability, and he’s responsible in his own zone. His offensive awareness and speed are breathtaking, and are reasons why he’s one of the most exciting players in this class. Nylander already has proven he can score goals and excel on the power play against professional opponents in Sweden, and he’d only need one more season of development before being ready for the NHL. 9) Winnipeg Jets — Ivan Barbashev, C, Moncton (QMJHL) The Jets have plenty of depth on the wings with talented top-six forwards such as Evander Kane, Andrew Ladd and Blake Wheeler. It’s time to upgrade the depth down the middle, and Barbashev is the best choice for that need. Barbashev tallied 68 points (23 goals, 45 assists) in 45 games this season, and he’s also steadily improving defensively. The Russian forward has developed into a dependable penalty killer, and he’s back checking with more consistency. He’s not a great faceoff man, but his combination of size, strength and skill is quite impressive. Barbashev is close to being NHL-ready and is one of the more complete centers in this class. Ehlers has game-changing speed, an accurate and powerful shot, and the stick-handling ability to move past defenders and protect the puck in traffic. He would be a fantastic fit on Anaheim’s top line alongside superstars Ryan Getzlaf and Corey Perry, and his elite offensive skill could really benefit the Ducks’ 22nd-ranked power play. The Ducks received this pick from Ottawa as part of the summer trade that sent Bobby Ryan to the Senators. However, if Anaheim is eliminated in the first or second round of the playoffs, it wouldn’t be surprising if it uses this pick as part of a trade to acquire an impact player. 11) Nashville Predators — Nick Ritchie, LW, Peterborough (OHL) Ritchie is a power forward who scores goals and battles hard in all three zones. The Predators play a heavy, defense-first style of hockey, and there’s no doubt Ritchie would be a good fit in this system. He tallied 74 points (35 goals, 39 assists) in 61 games this season, which was almost double his previous career high. Nashville finished 18th in goals scored and relied too much on its defensemen to provide offense. The team needs to take an all-around offensive prospect with this pick. 12) Phoenix Coyotes — Brendan Perlini, LW, Niagra (OHL) The Coyotes ranked 20th in goals scored, lack elite offensive players, and several of its best forwards (Shane Doan, Radim Vrbata, etc.) are in the final stages of their careers. This is why an extraordinary talent like Perlini is the perfect choice at No. 12. Perlini is a gifted goal scorer with a booming shot, soft hands and impressive size (6-foot-3, 206 pounds). He tallied 71 points (34 goals, 37 assists) over 58 games in his first full OHL season. His willingness to play a physical brand of hockey, block shots and back check would allow him to make a smooth transition to Coyotes head coach Dave Tippett’s defense-first style of play. 13) Washington Capitals — Haydn Fleury, D, Red Deer (WHL) The Capitals have plenty of offensive defensemen with Mike Green and John Carlson in their top four, but outside of Karl Alzner, they lack a stay-at-home blueliner who kills penalties well and plays physical. Fleury is a tough kid who skates well, and in addition to his fundamentally strong defensive skills, he moves the puck well and can skate his way out of trouble in the defensive zone. Fleury’s maturity, poise with the puck and good decision-making illustrate how polished he is at a young age. Fleury could play in the NHL as soon as 2015-16. For the Canucks I can see them taking Virtanen and that would be a good pick. He may be a bit one dimensional but he is big, fast, physical and can score BUT I would look at Ehlers (dynamic speed and offense), or Ritchie (big very good good skater for his size with decent offensive skills and shot) As for the Leafs, given what this mock is saying would be available I would take Ritchie, Ehlers, or maybe even Perlini (not knocking Nylander who is talented)
{ "pile_set_name": "Pile-CC" }
The organ size is controlled through changes in rates of cell growth and division[@b1][@b2]. The underlying mechanisms of organ size control, such as Insulin/IGF signaling (IIS) and Target of Rapamycin complex 1 (TORC1) signaling pathways, have been intensively investigated by using proliferating and morphologically simple cells, such as those in epithelial monolayers of the Drosophila imaginal disc[@b3][@b4]. However, it is still largely unknown how the size of postmitotic and morphologically complex cells such as neurons scale with body size and which molecules control such scaling. We therefore explored these scaling mechanisms in Drosophila neurons. For our investigation, we used the dendritic arbor of one class of sensory neurons in Drosophila adults as a readout ([Figure 1A and 1B](#f1){ref-type="fig"})[@b5][@b6][@b7][@b8][@b9]. Dendrites are the antennae of neurons that receive and integrate sensory and/or synaptic inputs[@b10][@b11]. Our model neuron in this study, previously designated as v\'ada, is one of the dendritic arborization (da) neurons, whose arbor for adult life is regenerated during pupal stages and entirely covers the lateral plate (pleura) in the abdomen ([Figure 1A--1C](#f1){ref-type="fig"})[@b7][@b8]. Results ======= Scaling of dendritic arbors of the wild-type da neuron with body size --------------------------------------------------------------------- To examine how body-size changes affect the size and the branching pattern of the dendritic arbor of the wild-type neuron, we starved larvae beyond 91--96 hr after egg laying (AEL). This is because it has been shown that larvae exposed to such starvation after the "critical weight" stop body growth, but develop to become fertile adults that are smaller than normal, without any developmental delay[@b12][@b13][@b14][@b15]. Under this mild starvation condition, the size of the dendritic arbor was significantly decreased in proportion to the decreased body size ([Figure 1D--1G](#f1){ref-type="fig"}). Importantly, the number of branch endings was not changed and the branch density (total length/arbor size and ending number/arbor size) was significantly increased ([Figure 1H--1K](#f1){ref-type="fig"}). We also quantified the branching complexity, by assigning Strahler orders to individual segments (intervals between branching points; see [Figure 1L](#f1){ref-type="fig"})[@b16][@b17][@b18]. The numbers of individual order segments were similar under the fed and starved conditions ([Figure 1M](#f1){ref-type="fig"}), while 2^nd^ to 4^th^ order segments became shorter under the starved condition ([Figure 1N](#f1){ref-type="fig"}). These results are consistent with the hypothesis that the wild-type neuron can respond commensurately to the decrease in body size and/or the starvation and can form a "miniature" dendritic arbor by tuning its dendritic segment length. Neurons with defective IIS/TORC1 signaling pathways show dendritic "undergrowth" -------------------------------------------------------------------------------- The above result suggested that the wild-type neuron is able to scale with the body size and/or the nutrition condition, while keeping the branching complexity intact. We wondered if the IIS/TORC1 pathways ([Supplementary Figure S1A](#s1){ref-type="supplementary-material"}) participate in this scaling, and whether defects in the pathways would affect the size and the branching pattern of the dendritic arbor in adults, when larvae were raised under the normal food condition. Neurons with disruptions of *Drosophila insulin receptor* (*dinr*) or *Akt* downsized and simplified the dendritic arbors, as evidenced by decreases in the arbor size, the ending number, and the total length ([Supplementary Figure S1B--S1D and S1H--S1J](#s1){ref-type="supplementary-material"}). In contrast, the branch density (total length/arbor size and terminal number/arbor size) was not significantly altered from that of the wild-type neuron ([Supplementary Figure S1K and S1L](#s1){ref-type="supplementary-material"}). A loss of function mutation of *tor*, overexpression of a dominant negative form of Phosphoinositide 3-kinase (PI3K), or a knockdown of *raptor* encoding an essential component of TORC1 not only decreased the arbor size, but also the branching complexity ([Supplementary Figure S1E--S1G](#s1){ref-type="supplementary-material"}). Thus this "undergrowth" phenotype is distinct from the "miniature" dendrite of the wild-type neuron under the starved condition ([Figure 2L](#f2){ref-type="fig"}), suggesting that a regulatory mechanism other than the IIS/TORC1 pathways may contribute to the dendritic scaling in the normal da neuron. *CHORD* mutant neurons form miniature dendrites ----------------------------------------------- To explore the hypothetical mechanism of the dendritic scaling, we conducted a forward genetic screen by employing the mosaic analysis with a repressible cell marker (MARCM) system[@b19]. To facilitate the generation of mosaic clones, we made "SOP-FLP" lines that express FLP recombinase in sensory organ precursors (SOPs; see details in Methods). In our screening under the fed condition, we found a mutant chromosome that generated miniature dendritic patterns in homozygous neurons ([Figure 2B and 2C](#f2){ref-type="fig"}). Indeed a number of quantitative features indicated that the arbor of this mutant neuron was a proportionally scaled down miniature or a microcopy of the wild-type neuron ([Figure 2E--2I](#f2){ref-type="fig"}): decreases in the arbor size and the total dendritic length, an unaltered ending number, an increase in branch density, profiles of the Strahler-order analysis similar to those of the wild-type neuron under the starvation condition (compare [Figure 1M--1N](#f1){ref-type="fig"} with [Figure 2J--2K](#f2){ref-type="fig"}), and an unaltered distribution of angles at individual branching points (data not shown). In a word, the mutant neuron reduced the dendritic segment length ([Figure 2K](#f2){ref-type="fig"}), without simplifying the branching pattern, which is reminiscent of how the wild-type neuron constructed its arbor under the starved condition ([Figure 1F](#f1){ref-type="fig"}). Whole-genomic sequencing and complementation mapping using Drosophila deficiency stocks identified a 1 bp deletion that leads to a frameshift in the *CHORD*/*morgana* gene (denoted *CHORD^2^* hereafter; [Figure 2A](#f2){ref-type="fig"}). CHORD is an evolutionarily conserved co-chaperone of HSP90, and it negatively regulates Rho-kinase (Rok) activity to suppress overduplication of centrosomes[@b20][@b21]. Introduction of the 4757-base-pair (bp) genomic fragment including the *CHORD* gene almost fully rescued the above phenotypes to normal, demonstrating that *CHORD* is the causative gene for the miniature dendrite phenotype ([Figure 2D and 2E--2K](#f2){ref-type="fig"}). The miniature arbor of the *CHORD* mutant neuron may mimic a default state of the wild-type neuron -------------------------------------------------------------------------------------------------- One possible explanation of the *CHORD* phenotype is that the mutant neuron no longer interprets favorable or unfavorable extracellular conditions (either the nutrition and/or body size) and generates the miniature arbor as an invariable default. Alternatively, the *CHORD* mutant neuron misreads the size of the abdominal lateral plate; consequently, the arbor occupies only a portion (e.g., 50% instead of 100%) of the body surface. To distinguish these possibilities, we examined dendritic arbors of *CHORD* mutant neurons under the starved condition ([Figure 3A and 3B](#f3){ref-type="fig"}). Neither the size nor the branching complexity significantly changed between the two nutrition conditions ([Figure 3C--3I](#f3){ref-type="fig"}), showing that the *CHORD* mutant neuron formed the miniature arbor irrespective of the extracellular condition. This result suggested that the latter possibility was less likely. It appears that the wild-type neuron possesses a CHORD-dependent mechanism that extends the branch segment length beyond a preset value in response to a favorable environment. Elongation/retraction rate of terminal branches is critical for reproducing the miniature phenotype of the *CHORD* mutant neuron -------------------------------------------------------------------------------------------------------------------------------- We next investigated the dynamics of dendrite formation whereby the *CHORD* mutant neuron produced the miniature arbor during pupal stages. First we found that the mutant arbor underwent a persistent increase in complexity and size, but the overall appearance had already become miniature-like before eclosion ([Supplementary Figure S2A--S2H](#s1){ref-type="supplementary-material"}). Then we performed time-lapse recordings of the wild-type and mutant neurons at 70--75 hr after puparium formation (APF), when dendritic arbors were under active construction, and dissected the dendrite dynamics of elongation/retraction and branching. We quantified frequencies of elongations and retractions of terminal branches (branches of Strahler order 1, see [Figure 1L](#f1){ref-type="fig"}) and found that these parameters were not altered in *CHORD* mutant neurons ([Supplementary Figure S2I and S2J](#s1){ref-type="supplementary-material"}). We also used a Fano Factor as a quantitative descriptor of branch tip dynamics (see details in Methods)[@b22] and observed that there was no significant difference between the wild-type and *CHORD* mutant neurons ([Supplementary Figure S2K](#s1){ref-type="supplementary-material"}). In contrast, the rates of branch--length changes (μm/min) were significantly decreased in the mutant neurons ([Supplementary Figure S2L](#s1){ref-type="supplementary-material"}). In this sensory neuron, most of the branches are collaterals that sprout from stalks, rather than bifurcations of branch tips[@b9]. Therefore, we quantified the frequency of lateral branching and found that wild-type and *CHORD* mutant neurons showed similar values ([Supplementary Figure S2M](#s1){ref-type="supplementary-material"}). Altogether, dendritic dynamics of *CHORD* mutant neurons are very similar to that of wild-type neurons, with the exception that the rates of change of branch lengths decrease in the mutant neurons. We then asked whether these changes can explain the miniature phenotype of the mutant neurons or not. We addressed this question with a computer-assisted simulation of dendrite growth using experimental values. The elongation and retraction of the terminals was represented as the addition and removal, respectively, of one unit segment per 1 minute ( = 1 step in simulation) at the terminal of the dendrites, and lateral branching was reproduced by the addition of unit segments to the existing branches[@b23][@b24][@b25]. The probabilities of elongation, retraction, and lateral branching were determined by experimental data (see details in Methods and [Supplementary Table S3](#s1){ref-type="supplementary-material"}). We defined the unit length of a segment as 0.9 μm or 0.75 μm, based on the experimental data for the wild-type or *CHORD* mutant neurons, respectively ([Supplementary Figure S2L](#s1){ref-type="supplementary-material"}). Representative images of the wild-type and mutant model neurons closely resembled those of in vivo neurons ([Supplementary Figure S2N](#s1){ref-type="supplementary-material"}). In fact, our quantification showed decreases in the arbor size and the total length, an unaltered ending number, and an increase in the branch density of the mutant model arbors, compared to the wild-type model arbors ([Supplementary Figure S2O--S2S](#s1){ref-type="supplementary-material"}). Thus, these results support the hypothesis that subtle but significant differences in the rates of branch-length changes play a critical role in scaling the dendritic arbor, and that the miniature arbor of the *CHORD* mutant neuron can be attributed to the scaled-down elongation/retraction dynamics of dendritic branches. Finally, we examined whether the dendrite dynamics in starved wild-type animals is comparable to that of *CHORD* mutant neurons. We found that the wild-type neurons under the starved condition showed significantly decreased rates of branch--length changes compared to those under the fed condition, while other parameters were not significantly changed ([Supplementary Figure S2I--S2M](#s1){ref-type="supplementary-material"}), very much resembling *CHORD* mutant neurons under the fed condition. These results strengthened our hypothesis that coordinated regulation of the elongation/retraction dynamics of branches contributes to scaling of the dendritic arbor. Genetic interaction between CHORD and the TORC2 component Rictor ---------------------------------------------------------------- We next asked how body size/nutrition state is conveyed to CHORD. As a candidate of such an upstream molecule, we examined the involvement of TORC2, another TOR complex, for the following reasons: (1) TORC2 is activated by association with ribosomes in a growth factor dependent manner, thus it may mediate between the extracellular environment and growth capacity of individual cells[@b26][@b27][@b28]. (2) TORC2 regulates the actin cytoskeleton and controls dendrite pattern formation[@b27][@b28][@b29][@b30]. We assessed the phenotype of mutant neurons of *rictor*, which encodes an essential and specific component of TORC2 ([Figure 4A and 4B](#f4){ref-type="fig"}). *rictor* mutant neurons showed complicated but intriguing phenotypes; that is, combined features of undergrowth and miniaturization. They showed a decrease in the arbor size, the total length, and the ending number ([Figure 4D--F](#f4){ref-type="fig"}), which is characteristic of the undergrowth phenotype. On the other hand, they also exhibited features of the miniature phenotype: increases in the branch density (both the total length/arbor size and the ending number/arbor size, as shown in [Figure 4G and 4H](#f4){ref-type="fig"}) and a decrease in segment length ([Figure 4J](#f4){ref-type="fig"}). Importantly, overexpression of the *CHORD* transgene in *rictor* mutant neurons partially restored the features of the miniature phenotype ([Figure 4G--4J](#f4){ref-type="fig"}), but not those of the undergrowth phenotype ([Figure 4D--4F](#f4){ref-type="fig"}). In contrast to this genetic interaction between CHORD and TORC2 (Rictor), *CHORD* overexpression did not rescue simplified phenotype of the *dinr* knockdown ([Supplementary Figure S1M and S1N](#s1){ref-type="supplementary-material"}). All these results could be explained by the hypothesis that CHORD functions downstream of TORC2, being at least partly separate from TORC1. The partially separate nature was further supported by our KD experiment using S2 cells ([Supplementary Figure S1O](#s1){ref-type="supplementary-material"}). Even when *CHORD* was knocked down, phosphorylation of S6K (a readout of TORC1 activity) was up-regulated in an insulin-dependent manner, as in the control knockdown cells. We then asked whether the TORC2 activity is altered under the nutrient-limited condition that was employed to decrease body size. We starved larvae for 8 hrs beyond 91--96 hr AEL and analyzed the phosphorylation of Akt at Ser505 as an established readout of the TORC2 activity[@b31]. The level of S505 phosphorylation was significantly and reproducibly reduced under this condition compared to that in well-fed flies ([Figure 4K](#f4){ref-type="fig"}). All these results suggest the possibility that TORC2 may communicate the extracellular conditions (body size and/or nutrients) to CHORD proteins ([Figure 4L](#f4){ref-type="fig"}). Discussion ========== This study provides novel mechanistic insights into size control of neuronal dendritic arbors. To sample sensory input precisely, certain types of neurons should adjust their dendritic arbor size to cover the receptive field completely. We showed that there are two distinct ways of downsizing dendritic arbors when the field size is reduced: one way is to arrest both growth and branching during maturation of dendrite morphologies, causing the "undergrowth" phenotype. The other way is to regulate the elongation of dendrites (more specifically speaking, the length of branch segments) selectively, thereby making a "miniature" form ([Figure 2L](#f2){ref-type="fig"}). Our results support the notion that dendritic growth and branching are controlled by at least partly separate mechanisms, which is also seen in other instances such as the development of postembryonic dendritic architecture of motorneurons[@b32]. At the molecular level, the IIS/TORC1 pathways control both growth and branching to avert underdevelopment, whereas CHORD and TORC2 tunes the segment length to realize proportional scaling of the entire arbor ([Figure 4L](#f4){ref-type="fig"}). Ablation of the TORC2 component Rictor in mouse Purkinje cells causes multiple structural changes of dendritic arbors, including a decrease in total dendrite length and an increase in the number of primary branches[@b30]. It will require further investigation to address how the overall branching complexity and the segment length is affected in the absence of Rictor, and to fully characterize the loss of function phenotype of CHORD in this subtype of neurons. CHORD was originally discovered in plants as a key player in the innate immune response[@b33][@b34]; in animals, CHORD negatively regulates Rho kinase activity, thereby suppressing overduplication of centrosomes[@b20][@b21]. *CHORD* is also expressed in tissues that are populated by postmitotic cells, such as brains[@b35], and has been proposed to function beyond regulating cell division. Here, we revealed that CHORD regulates the size of dendritic arbors: cells defective in CHORD showed a decreased elongation/retraction rate of terminal branches; thus, by extrapolation, the normal function of CHORD must be to accelerate the elongation and retraction of terminal branches. Rho-kinase (Rok) is reported to inhibit neurite outgrowth, dendritic branching, and spine formation[@b36]. Therefore, we pursued the possibility that Rok acts downstream of CHORD. However, we couldn\'t find any genetic and biochemical evidence for the interaction between Rok and CHORD ([Supplementary Figure S3](#s1){ref-type="supplementary-material"}; see details in the legend). Instead, our results suggested that CHORD is functionally related to the TORC2 signaling pathway, which regulates the actin cytoskeleton[@b28]. It has been reported in mammalian fibroblasts that phosphorylation by TORC2 facilitates folding of some AGC kinases, such as Akt and conventional PKCs, and stabilizes them, and that newly synthesized, unphosphorylated Akt is protected by HSP90 from degradation[@b37][@b38]. Therefore, CHORD may contribute as a co-chaperone to the stability of the AGC kinases by recruiting HSP90 to those clients, or it may employ its own chaperone activity[@b39] to perform this task. This hypothetical role of CHORD might underlie the partial rescue of the *rictor* mutant neuron by *CHORD* overexpression. Comparative anatomical studies have reported that dendrites of some types of neurons, such as sympathetic neurons, become larger and increase branching complexity as the brain or the body size increases across species[@b40][@b41], which we designate overgrowth as opposed to undergrowth. In contrast, other types of neurons such as somatosensory thalamocortical projection neurons increase their dendritic arbor size with larger brains, while preserving key features of the dendritic branching pattern[@b42][@b43], which is proportional magnification. These two distinct ways of scaling, overgrowth/undergrowth and miniaturization/magnification, might be regulated by IIS/TORC1 and TORC2/CHORD, respectively, and may contribute to neuronal cell-type specific information processing. It should be noted that "scaling growth" of dendritic arbors does take place during larval development, but mechanistically it is distinct from the arbor scaling at postlarval stages, which we reported in this study. Larval da neurons regulate their growth in coordination with the expanding body whose mass increases by approximately 200-fold during the complete larval development[@b18][@b44]. This is accomplished by increasing both branching numbers and the total length, where IIS/TORC1 plays a critical role[@b29][@b45], but *CHORD* appears to be dispensable ([Supplementary Figure S2](#s1){ref-type="supplementary-material"}), and TORC2 is required for dendritic tiling for larval da neurons[@b29]. On the other hand, the da neuron during pupal development first prunes its dendrites and then starts constructing arbors for adult life; thus this neuron completes this task in a body whose volume has been predetermined by the nutritional status during larval development. It is this task that requires the role of CHORD, which fits the dendritic arbor to the final adult body size. We speculate that this hypothetical CHORD-dependent mechanism somehow senses body size by receiving as-yet undetermined signals, either local or systemic, from other tissues. Candidate tissues for sources of such signals would be either those adjacent to the neuron, such as lateral tergosternal muscles, abdominal histoblasts (epitherial cells), and glial cells, and/or tissues that secrete growth factors, such as fat body and insulin producing cells[@b8][@b45][@b46][@b47][@b48]. Therefore the dendrite scaling of the adult da neuron might provide a useful model system to study interactions between neurons and other organs. Methods ======= Molecular cloning ----------------- Six tandem repeats of a 20-base-pair (bp) sequence that includes a proneural binding site (\[scE1\]~6~)[@b49] were used to build a *SOP-FLP* transgene. The *hsp70* minimal promoter and the entire coding sequence of *flp* from the UAS-FLP vector (DGRC) were inserted between \[scE1\]~6~ and a SV40-polyA sequence. This *SOP-FLP* transgene was cloned into the pHStinger vector, or a pUAST vector from which the UAS sequence and *hsp70* minimal promoter had been removed. To generate a rescue construct, the 4754-bp sequence (3R: 20009616-20013777 in version FB2013_05) that includes *CHORD* was amplified from *yw* genomic DNA and cloned into the vector pCasper. To generate UAS shRNA for each gene, we followed a protocol previously described[@b50]. The target sequences of the shRNAs are as follows: 5′-CACCGAGTTCCTCAACATCAA-3′ and 5′-TTCGACCTGGATGACATTAAA-3′. These shRNAs were cloned into the vector pUAST-attB. All constructs were injected, in accordance with standard protocols, to generate transgenic fly lines. Drosophila strains ------------------ Detailed genotypes of the animals and clones are described and summarized in [Supplementary Table S1](#s1){ref-type="supplementary-material"}. To visualize dendrites and /or express transgenes, we used the following *Gal4* drivers: *Gr28b.c*[@b51][@b52] and *Gal4^5-40^*[@b53]. To express fluorescent proteins, we used *UAS-mCD8:GFP* (\#5137 of the Bloomington Stock Center) or *UAS-Venus-pm*[@b44][@b54][@b55]. Other strains used were *dinr^339^*[@b56], *Akt^q^*[@b57], *Tor^ΔP^*[@b58], *rok^2^*[@b59], *UAS-dicer2* (\#60009 of Vienna Drosophila RNAi Center), *UAS-raptor^RNAi^* (HMS00124/\#34814 of the Bloomington Stock Center), *UAS-mCherry^RNAi^* (\#35785 of the Bloomington Stock Center), *UAS-CHORD^RNAi^* (this study), *UAS-Dp110\[D954A\]* (\#25918 of the Bloomington Stock Center), *UAS-rok^RNAi^* (GD1522/\#3793 and KK107802/\#104675 of the Vienna Drosophila RNAi Center; JF03225/\#28797, HMS01311/\#34324, and GL00209/\#35305 of the Bloomington Stock Center), *UAS-hsp90^RNAi^* (HMS00899/\#33947 of the Bloomington Stock Center) and *UAS-Rok.CAT^48.2^* [@b60]. MARCM-based forward genetic screen ---------------------------------- The *piggyBac* insertion collection with FRT insertion[@b61] was used for genetic screening. We crossed individual insertion stocks to "*SOP-FLP* based MARCM-ready" fly stocks (for 2^nd^-chromosome left arm screen, *Gal4^5-40^ UAS-Venus:pm SOP-FLP^\#42^; tubP-Gal80 FRT40A*; for 3^rd^-chromosome left arm screen, *SOP-FLP^\#42^; Gal4^109(2)80^ UAS-mCD8:GFP SOP-FLP^\#73^/CyO; tubP-Gal80 FRT2A*; and for 3^rd^-chromosome right arm screen, *hsFLP UAS-mCD8:GFP; Gal4^109(2)80^ UAS-mCD8:GFP SOP-FLP^\#73^/CyO; FRT82B tubP-Gal80*). We then mounted adult abdomens, and dendrites were imaged under a laser scanning microscope. We screened 1537 *piggyBac* stocks and isolated 3 stocks (*LL04611*, *LL04133*, and *LL03277*) that showed the "miniature" phenotype, and 19 that showed the "undergrowth" phenotype ([Supplementary Table S2](#s1){ref-type="supplementary-material"}). Both *LL04611* and *LL04133* were homozygous lethal. Mapping and identification of the mutation that was responsible for the "miniature" phenotype --------------------------------------------------------------------------------------------- Starting from the above *LL04611* and *LL04133* stocks of the *piggyBac* collection, we generated precise excision strains. These precise excision strains were still homozygous lethal, and MARCM clones of those strains showed the miniature dendritic phenotypes. We performed a complementation test for lethality between *LL04611* and *LL04133*, and found that they belong to the same complementation group. These results suggested that the lethality and the "miniature" dendrite phenotype were caused by a background mutation(s) that was not linked to the piggyBac insertion. We backcrossed the excision strains to the control *FRT82B* stock three times and used the progeny for the phenotypic analysis below. To identify the mutated gene that gave rise to the phenotype, we determined whole-genomic sequences of the two mutant strains with an Illumina next-generation sequencer and directly compared them with each other. For the sequencing, we prepared genomic DNA from larvae that were heterozygous for *LL04611* or *LL04133* and employed paired-end Illumina sequencing technology. We also determined the sequences of *LL02779* and *LL00232*, whose MARCM clones did not show a miniature phenotype, as negative controls. Then we mapped the sequence data to the wild-type reference genome and identified variants relative to the wild-type reference genome by using Burrows-Wheeler Aligner (BWA) and SAMtools. In addition to the whole genome sequencing, we performed conventional deficiency mapping of the lethality by using the Bloomington Deficiency Kit, and mapped the mutation responsible for the lethality (and possibly the clone phenotype) within a \~45 kb region in the right arm of the 3rd chromosome. Within this \~45 kbp mapped region, we found only one mutation unique to *LL04611* and *LL04133*: a 1 bp deletion in the *CHORD/morgana* gene that caused a frame shift (denoted as *CHORD^2^*), which was confirmed by the Sanger method. Image collection and image analysis ----------------------------------- Imaging da neurons in whole-mount adults was done as described earlier[@b7]. Briefly, we collected adult females within 12-hour after eclosion unless described otherwise, washed them in 0.7% NaCl and 0.3% Triton X-100, removed the heads and legs of adult flies, and mounted the abdomens in 50% glycerol on slides, between spacers made of vinyl tape. All of the images were acquired using a Nikon C1 laser-scanning confocal microscope or a Zeiss LSM 510 META laser-scanning confocal microscope. For quantification of dendritic patterns of da neurons, live imaged dendrites were first traced using Simple Neurite Tracer plugin in Fiji and tracing data was exported as csv files. Quantification of total length, terminal number, total length/arbor size, and terminal number/arbor size and analysis of Strahler order were performed using Excel. Arbor size was quantified by analyzing skeletonized tracing images by using the convex-hull selection in Fiji. The data of different genotypes were compared by one-way ANOVA with Tukey\'s HSD post hoc analysis, or by Student\'s t-test using KaleidaGraph (version 4.0; Synergy Software). Time-lapse recording -------------------- Time-lapse recordings of branch formation ([Supplementary Figure S2I--S2M](#s1){ref-type="supplementary-material"} and [Supplementary Video S1--S3](#s1){ref-type="supplementary-material"}) were performed as described previously[@b9]. Briefly, each pupa between 70--74 hour after puparium formation (APF) was taken out of its puparium and mounted on a 35-mm glass-bottomed dish. In mounting, we folded legs and put abdomens on the dish and tilted them to retain an appropriate angle. All images were collected at 2-minute intervals for 1-hour with a 2-μm Z-step using a Nikon C1 laser-scanning confocal microscope. After image acquisition, each pupa was kept at 25°C, and their survival was confirmed to at least the pharate stage or the adult stage. Acquired movies were traced manually using Simple Neurite Tracer plugin in Fiji and the frequency and rate of elongation/retraction were quantified using Excel. As an unbiased indicator of branch dynamics, a Fano factor (FF) value was calculated based on branch tip length measurements. The FF is defined as the variance in the measured length of an individual branch across all imaging sessions, divided by the mean length of that branch[@b22]. We quantified neurons whose FF was above 0.35, which is defined as dynamic neurons[@b22]. Reconstruction of dendrite dynamics in a computer-aided simulation ------------------------------------------------------------------ Dendrite growth dynamics was modeled in two-dimensional space following previous mathematical models[@b23][@b24][@b25]. The 'elongation' and 'retraction' were represented by the addition and removal of 1 unit segment, respectively. As a length of 1 unit segment, we employed the 0.9 μm and 0.75 μm to recapitulate the wild-type and *CHORD* mutant neurons, respectively. Lateral branching was reproduced by the addition of unit segments to the existed branches. The angle of elongation was assumed to follow a homogenous distribution from −7.5° to +7.5°, while that of branching was assumed to follow a normal distribution with average 97° and standard deviation 38°. The initial condition was as follows: 2 branches with 20-segment lengths sprout from the origin in anti-parallel directions along the y axis and bifurcate with angle 30°, and each of these 4 branches elongate 10-segments in length. Other parameters used in the simulation are summarized in [Supplementary Table S3](#s1){ref-type="supplementary-material"}. Production of antibodies, RNAi, and Western blotting ---------------------------------------------------- Guinea pigs were immunized with GST proteins that had been fused to the N-terminal 200 amino acids of CHORD to generate anti-CHORD antibody. For RNAi experiments, S2 cells were cultured with 20 μg/ml dsRNA of the full-length CHORD or GFP-coding sequence for 3 days. Lysates were separated on a 8% polyacrylamide gel and transferred to PVDF (Millipore). Antibodies were used at the following concentrations: guinea pig anti-CHORD, 1:1000 (this study); rabbit anti-phospho-Myosin light chain 2 (Ser-19), 1:1000 (Cell Signaling \#3671); rabbit anti-phospho-Akt (Ser-505), 1:1000 (Cell Signaling \#4054); rabbit anti-Akt, 1:1000 (Cell Signaling \#9272); mouse anti-actin, 1:1000 (Millipore MAB1501). Signals were detected with ECL plus (Amersham). To obtain stronger signals, we employed Can Get Signal Immunoreaction Enhancer solution (TOYOBO). Author Contributions ==================== K.S. carried out most of the experiments; K.F., T.N., M.O., T. Usui and M.K. helped some experiments. K.S. and T. Uemura wrote the paper. Supplementary Material {#s1} ====================== ###### Supplementary Information Recording of dendritic dynamics of the wild-type neuron under the fed condition ###### Supplementary Information Recording of dendritic dynamics of the CHORD mutant neuron ###### Supplementary Information Recording of dendritic dynamics of the wild-type neuron under the starved condition ###### Supplementary Information Supplementary Figures and Tables The reagents were provided by the Drosophila Genetic Resource Center at Kyoto Institute of Technology, the Bloomington Stock Center, Y.N. Jan, B. Yi, T. Chihara, K. Emoto, L.M. Powell, B. Lemaitre, S. Cohen, R. Niwa, T. Nishimura, R. Karess, N. Fuse, S. Hayashi, and J. Zallen. We thank O. Nishimura, N. Fuse, and R. Ueda for help with next-generation sequencing analysis, S. Yonehara for use of the DNA sequencer, N. Yamamoto for discussion about the neuron size, J.A. Hejna for his efforts to polish the manuscript, and M. Futamata, Y. Miyake, K. Shimizu, J. Mizukoshi, and K. Oki for their technical assistance. We also thank the members of Comparative Genomics Laboratory in National Institute of Genetics for technical and computational assistance. This study was supported by a Grant-in-Aid for Scientific Research (A) and for Scientific Research on Innovative Areas "Mesoscopic neurocircuitry" (22115006) to T. Uemura, by the Funding Program for Next Generation World-Leading Researchers (NEXT Program) to M. K., by Research and Education Platform on Dynamic Living Systems, by NIG Collaborative Research Program (2011-A48), and by a Grant-in-aid for Scientific Research on Innovative Areas 'Genome Science' and 'Comprehensive Brain Science Network' from the Ministry of Education, Science, Sports and Culture of Japan. K.S. was a recipient of a Fellowship of the Japan Society for the Promotion of Science for Young Scientists. ![Scaling of dendritic arbors of the da neuron in the wild-type adult.\ (A) A lateral view of an adult female (top). Its abdomen is highlighted at the bottom. Courtesy of Naoyuki Fuse. (B and C) A representative image of a MARCM clone of da neuron v\'ada (B) and a diagram that illustrates the spatial arrangement of a dendritic arbor in an adult abdomen (C). A spiracle and sternite are indicated by an arrow and an asterisk, respectively. (D) Anterior-posterior body length of adult flies under the fed or starved condition. (E and F) Representative images of MARCM clones of the wild-type neurons under fed (E) and starved (F) conditions. In these and subsequent images of the neurons, posterior is to the right and dorsal is at the top, and dark blue arrows indicate spiracles. Scale bars, 50 μm. (G--N) Quantitative analysis of individual dendritic-arbor patterns. (G) Dendritic arbor size. (H) Total length of dendritic branches. (I) The number of endings of dendritic branches. (J and K) The branch density: total length/arbor size (J) and ending number/arbor size (K). (L) A diagram showing Strahler order. (M and N) The number (M) and segment length (N) of branches of each order. All data are presented as means ± standard deviation (SD). \*p \< 0.05, \*\*p \< 0.01, and \*\*\*p \< 0.001.](srep04415-f1){#f1} ![*CHORD* mutant neurons form "miniature" dendrites.\ (A) Whole-genome sequencing identified a 1 bp deletion in the *CHORD* gene unique to the mutant strain that was isolated from our forward genetic screening (bottom). We denoted this allele as *CHORD^2^* hereafter. Note that we determined the sequences of flies heterozygous for the mutation. (Top) The domain structure of CHORD protein[@b20]. The 1 bp deletion caused a frame shift that resulted in a premature stop codon (M172 → STOP) in the 2^nd^ CHORD domain. (B--D) Representative images of MARCM clones of the wild-type neuron (B), the *CHORD^2^* mutant neuron (C) and the *CHORD^2^* mutant neuron to which a genomic fragment including the wild-type *CHORD* gene was introduced (D). The *CHORD^2^* mutation is early larval lethal, and note that all of the data throughout this study are from single neurons homozygous for individual mutations in otherwise heterozygous animals, using the MARCM system (hence, a mosaic analysis), except for the data from RNAi. Scale bars, 50 μm. (E--K) Quantification of branching patterns of dendritic arbors. (E) Dendritic arbor size. (F) Total length of dendritic branches. (G) The number of endings of dendritic branches. (H and I) The branch density: total length/arbor size (H) and ending number/arbor size (I). (J and K) The number (J) and length (K) of branches of each order. All data are presented as means ± standard deviation (SD). \*p \< 0.05, \*\*p \< 0.01, and \*\*\*p \< 0.001. Blue asterisks indicate statistically significant differences of the cohort from the wild-type neuron; and orange asterisks indicate statistically significant differences of the cohort from the *CHORD* mutant neuron. NS: Statistically not significant (*P* \> 0.05). (L) Schematic representation of two partly distinct ways of downsizing dendritic arbors. In neurons with defective IIS/TORC1 signaling pathways showed the final arbor pattern similar to the proximal arbor of the normal neuron (left). In contrast *CHORD* mutant neurons proportionally downsize the original structure, making a miniature form (right).](srep04415-f2){#f2} ![*CHORD* mutant neurons cannot respond to body size changes.\ (A and B) Representative images of MARCM clones of *CHORD^2^* mutant neurons under the fed (A) or starved condition (B). Scale bars, 50 μm. (C--I) Quantification of dendritic arbors showed no statistical significance between the two conditions. (C) Dendritic arbor size. (D) Total length of dendritic branches. (E) The number of endings of dendritic branches. (F and G) The branch density: total length/arbor size (F) and ending number/arbor size (G). (H and I) The number (H) and length (I) of branches of each order. All data are presented as means ± standard deviation (SD). \*p \< 0.05, \*\*p \< 0.01, and \*\*\*p \< 0.001.](srep04415-f3){#f3} ![Phenotype of neurons defective in TORC2, and a genetic interaction between CHORD and TORC2.\ (A--C) Representative images of MARCM clones of the wild-type neuron (A), the *rictor^2^* mutant neuron (B), and the *rictor^2^* mutant neuron in which a *CHORD* transgene was overexpressed (C). Scale bars, 50 μm. (D--J) Quantification of branching patterns of dendritic arbors. (D) Dendritic arbor size. (E) Total length of dendritic branches. (F) The number of endings of dendritic branches. (G and H) The branch density: total length/arbor size (G) and ending number/arbor size (H). (I and J) The number (I) and length (J) of branches of each order. (K) Western blot analysis of extracts of larvae under the fed or starved condition with the indicated antibodies (top). Larvae of 91--97 hr AEL were collected, placed under either the fed or starved condition for 8 hrs, and then homogenized. Levels of phospho-S505 Akt were normalized to the total Akt levels in three independent preparations and the ratios were plotted (bottom). Uncropped images of the blots are shown in [Supplementary Figure S4](#s1){ref-type="supplementary-material"}. All data are presented as means ± standard deviation (SD). \*p \< 0.05, \*\*p \< 0.01, and \*\*\*p \< 0.001. Blue asterisks indicate statistically significant differences of the cohort from the wild-type neuron; and orange asterisks indicate statistically significant differences of the cohort from the *rictor* mutant neuron. NS: Statistically not significant (*P* \> 0.05). (L) Hypothetical molecular complexes that regulate dendrite growth and branching in response to the extracellular environment (the body size and/or the nutrition condition). The environmental cue(s) controls CHORD downstream of TORC2, which tunes the segment length (growth); on the other hand, the cue(s) also regulates the IIS/TORC1 pathway and affects both growth and branching.](srep04415-f4){#f4}
{ "pile_set_name": "PubMed Central" }
SOC1 translocated to the nucleus by interaction with AGL24 directly regulates leafy. Suppressor of overexpression of constans1 (SOC1) is one of the flowering pathway integrators and regulates the expression of LEAFY (LFY), which links floral induction and floral development. However, the mechanism by which SOC1, a MADS box protein, regulates LFY has proved elusive. Here, we show that SOC1 directly binds to the distal and proximal region of the LFY promoter where critical cis-elements are located. Intragenic suppressor mutant analysis shows that a missense mutation in the MADS box of SOC1 causes loss of binding to the LFY promoter as well as suppression of the flowering promotion function. The full-length SOC1 protein locates in the cytoplasm if expressed alone in protoplast transient expression assay, but relocates to the nucleus if expressed with AGAMOUS-LIKE 24 (AGL24), another flowering pathway integrator and a MADS box protein. The domain analysis shows that co-localization of SOC1 and AGL24 is mediated by the MADS box and the intervening region of SOC1. Finally, we show that LFY is expressed only in those tissues where SOC1 and AGL24 expressions overlap. Thus, we propose that heterodimerization of SOC1 and AGL24 is a key mechanism in activating LFY expression.
{ "pile_set_name": "PubMed Abstracts" }
Mouse cyp2g1 gene: promoter structure and tissue-specific expression of a cyp2g1-lacz fusion gene in transgenic mice. The structure of the mouse Cyp2g1 gene was determined to identify regulatory regions important for its olfactory mucosa-specific expression. Two Cyp2g1 genomic clones were isolated and characterized. A 3.6-kilobase 5'-flanking sequence was used to prepare a Cyp2g1--LacZ fusion gene for transgenic mice production. Transgene expression, as determined by beta-galactosidase activity in tissue extracts, was detected in the olfactory mucosa, but not in any other tissues examined, in five different transgenic lines. Thus, the 3.6-kilobase fragment contained regulatory elements sufficient for olfactory mucosa-specific and proper developmental expression of the reporter gene. However, histological and immunohistochemical studies indicated that the expression of the transgene in the olfactory mucosa was patchy and the cellular expression patterns of the transgene did not exactly match that of the endogenous gene. These results implicate the presence of additional regulatory sequences that are necessary for the correct cell type-selectivity within the olfactory mucosa.
{ "pile_set_name": "PubMed Abstracts" }
[Systemic chemotherapy for advanced colorectal cancer with liver metastasis]. We report the progress of systemic chemotherapy for advanced colorectal cancer with liver metastasis. It must be noted that the purpose of this treatment is to prolong the symptom-free period. Review of hepatic arterial infusion (HAI) compared with systemic chemotherapy for the treatment of unresectable liver metastases from colorectal cancer showed that was attained with HAI a much higher response rate and survival benefit than systemic chemotherapy. However, systemic chemotherapy has shown progress since that time. Regarding administration methods, continuous injection is better than bolus injection for 5-FU. New modulators of 5-FU have also became available, such as leucovorin, CPT-11, and I-OHP. Futhermore, many studies of 5-FU-based combination therapy have shown that the mean survival time (MST) and response rate (RR) are now close to those of HAI. Finally, the combination with HAI with systemic chemotherapy using CPT-11 resulted in the highest RR of 74%. Further trials of such combination therapy will be performed in the future.
{ "pile_set_name": "PubMed Abstracts" }
Samsung Could Be About to Release the Results From Its Galaxy Note 7 Probe Korean electronics giant Samsung ssnlf will reportedly announce the final results of an internal investigation into what went wrong with the Galaxy Note 7 by the end of the year, according to the Investor. The embattled company has been operating in full damage control mode, particularly after posting a 96% plunge in third quarter earnings last month. Part of the damage control operation has been to independently seek answers as to why batteries in some of its products were spontaneously catching fire, and a new round of investigations kicked off earlier this month. While faulty batteries seem to have been the catalyst, the company wanted to determine other factors that could have led to the explosions. Since launching the tablet phone in August, over 4.2 million Galaxy Note 7s have been sold globally, reports the Investor. But the reports of fires and exploding batteries led to a recall then a total discontinuation of the device in October. “We are considering all possibilities to find out the exact cause of the accidents,” a Samsung official told the Investor. The findings of the new investigation will be the deciding factor in whether or not the phones can be re-used, saving huge environmental and financial costs, and could have an impact on the the Galaxy S8 launch next year. For more on the Samsung Galaxy Note 7, watch this Fortune video: The results could also be a deciding factor in whether “heads will roll,” at the company, after Chief Executive Kwon Oh-hyun said Samsung would only assign responsibility after the crisis was resolved, reported Fortune earlier this year. It has been a busy week for the “crown jewel” of South Korea’s largest conglomerate, with the enterprise reportedly considering a major structural overhaul as part of a wider succession plan. Korean electronics giant Samsung ssnlf will reportedly announce the final results of an internal investigation into what went wrong with the Galaxy Note 7 by the end of the year, according to the Investor. The embattled company has been operating in full damage control mode, particularly after posting a 96% plunge in third quarter earnings last month. Part of the damage control operation has been to independently seek answers as to why batteries in some of its products were spontaneously catching fire, and a new round of investigations kicked off earlier this month. While faulty batteries seem to have been the catalyst, the company wanted to determine other factors that could have led to the explosions. Since launching the tablet phone in August, over 4.2 million Galaxy Note 7s have been sold globally, reports the Investor. But the reports of fires and exploding batteries led to a recall then a total discontinuation of the device in October. “We are considering all possibilities to find out the exact cause of the accidents,” a Samsung official told the Investor. The findings of the new investigation will be the deciding factor in whether or not the phones can be re-used, saving huge environmental and financial costs, and could have an impact on the the Galaxy S8 launch next year. For more on the Samsung Galaxy Note 7, watch this Fortune video: The results could also be a deciding factor in whether “heads will roll,” at the company, after Chief Executive Kwon Oh-hyun said Samsung would only assign responsibility after the crisis was resolved, reported Fortune earlier this year. It has been a busy week for the “crown jewel” of South Korea’s largest conglomerate, with the enterprise reportedly considering a major structural overhaul as part of a wider succession plan.
{ "pile_set_name": "Pile-CC" }
The program aims to develop ‘college-going ambition’ within the school system by providing scholarships to state colleges and universities to local high school graduates, all funded by partner Yale University. The New Haven Promise, announced in November 2010, was the result of a key question that was circulating in the mayor’s office: What does it take to help move an entire city forward into the next generation? The answer, according to Mayor DeStefano, was simple: “The most powerful way that we as a city can organize and envision our future is around the aspirations and potential of our young people.” The New Haven Promise is part of a broader move towards educational reform as well as a means to revitalize the city by attracting new families to New Haven. Even immigration status will have no bearing on a student’s participation in the program. Says Mayor John DeStefano, Jr., “[This is a] contract that says to kids: If you work hard, you demonstrate academic achievement and display appropriate behaviours, we’ll give you the tools to go to college and therefore inject choice and opportunity in your lives.”
{ "pile_set_name": "Pile-CC" }
Comparative carcinogenicity in F344 rats of the tobacco-specific nitrosamines, N'-nitrosonornicotine and 4-(N-methyl-N-nitrosamino)-1-(3-pyridyl)-1-butanone. The tobacco-specific carcinogens, N'-nitrosonornicotine (NNN) and 4-(N-methyl-N-nitrosamino)-1-(3-pyridyl)-1-butanone (NNK), were tested for carcinogenicity in F344 rats. Each nitrosamine in trioctanoin was administered by s.c. injection to 12 male and 12 female rats over a period of 20 weeks. The total dose of each nitrosamine was 3.4 mmol. The experiment was terminated after 12 months. NNK induced nasal cavity tumors in 83% of the males and in 83% of the females, liver tumors in 83% of the males and in 100% of the females, and lung tumors in 67% of the males and in 67% of the females. NNN induced nasal cavity tumors in 92% of the males and in 75% of the females. Only one liver tumor and no lung tumors were observed in the NNN-treated rats. These results indicate that, in the F344 rat, NNK is a more powerful carcinogen than is NNN.
{ "pile_set_name": "PubMed Abstracts" }
Q: passing data parameters to updata SQL table A user enters in his information via 8 JTextFields. This information is passed via parameters into the updateUser method and the method updates the SQL table with this information. This is what I am currently trying to do although when User presses update button, no changes are made to the database table retrieve user data, create UserOperation and call updateUser method String userName = textFieldUserName.getText(); String userPassword = textField_1.getText(); String securityQuestion = textFieldSecQuestion.getText(); String securityAnswer = textFieldAnswer.getText(); String email = textFieldEmail.getText(); String fName = textFieldName.getText(); String phoneNumber = textFieldPhone.getText(); String department = textFieldDepartment.getText(); UserOperations userOperations = new UserOperations(); userOperations.updateUser(userName, userPassword, securityQuestion, securityAnswer, email, fName, phoneNumber, department); the updateUser method public void updateUser (String userName, String userPassword, String securityQuestion, String securityAnswer, String email, String fName, String phoneNumber, String department) { try { String sql = "UPDATE systeuser SET username = ?,userpassword = ?,securityquestion = ?,securityanswer = ?,email = ?,fname = ?,phonenumber = ?,department = ? WHERE username = ?"; stmt = conn.prepareStatement(sql); stmt.setString (1, userName); stmt.setString (2, userPassword); stmt.setString (3, securityQuestion); stmt.setString (4, securityAnswer); stmt.setString (5, email); stmt.setString (6, fName); stmt.setString (7, phoneNumber); stmt.setString (8, department); stmt.setString (9, userName); stmt.executeUpdate( ); } catch (Exception e) { e.printStackTrace ( ); } } A: Its because of the single quotes placed around the ?. You need not give those single quotes, since you're doing this:- stmt.setString(1, userName); // setString says that this parameter is a String Thus, the single quote generally used to enclose String in a query is not needed in your case.
{ "pile_set_name": "StackExchange" }
Initiation and reinitiation of anticoagulation therapy. A thorough understanding of the pharmacology, pharmacokinetics, and pharmacodynamics of the most commonly prescribed anticoagulants is necessary to ensure optimal therapeutic outcomes and patient safety. Evidence is available to guide some, but not all aspects of anticoagulation therapy initiation. Issues related to the initiation of anticoagulation therapy, including the resumption of therapy following interruption of anticoagulation for invasive procedures, are reviewed. Initiating unfractionated heparin (UFH), low-molecular-weight heparin (LMWH), or fondaparinux is challenging for patients with renal dysfunction and obesity. UFH is preferred in patients with severe renal dysfunction. Morbidly obese patients may require higher than usual prophylactic doses of LMWH. Therapeutic doses of LMWH should be based on actual body weight, even in obese patients. Currently available evidence does not demonstrate the superiority of one initial warfarin dose over another. All anticoagulants increase the risk of bleeding and should therefore only be initiated in appropriately selected patients with sufficiently low underlying bleeding risk.
{ "pile_set_name": "PubMed Abstracts" }
Q: Text Scrolling in java Pleae help to solve this problem... I has a page designed in JFrames Now i need to make a text scrolling at the top of the page.... Please provide me the code... A: Check this out, is is commented and will most likely help you. http://www.abbeyworkshop.com/howto/java/ta_scroll/index.html
{ "pile_set_name": "StackExchange" }
1. Field of the Invention This field of the present invention is the manufacture of imitation cheese-like food products. 2. Brief Description of the Prior Art The manufacture of natural dairy cheese conventionally involves the treatment of milk products, including inoculation with particular and specific strains of microorganisms, treatment with enzymes (especially coagulating enzymes of which rennin is the preferred enzyme) allowing a cheese curd to form, separating the cheese whey, collecting the cheese curd, and pressing of this curd into molds, followed by ripening and aging for various periods of time, depending upon the established standard of identity for the particular cheese product. These processes are described in detail in standard reference books such as "Cheese and Fermented Milk Foods", by F. V. Kosikowski published in 1966 by F. V. Kosikowski (printed and distributed by Edwards Bros., Inc., Ann Arbor, Mich.). In view of the costs, both in respect to raw material and holding time involved in traditional procedures for natural cheese manufacture, the food industry has attempted to produce processed cheese or cheese-like food material which have a relatively high food value, similar in many cases to naturally produced cheese, at least with respect to the protein content thereof, and which, furthermore have the general taste and texture of natural cheese. The products are made from other edible foodgrade starting materials, preferably lower in cost than the milk products used for cheese manufacture. There has long been a need in the industry for such imitation cheeses which would be acceptable to the public from the point of view of taste, texture and nutritional value, especially when the cheese materials are used as a component or ingredient in traditional recipes which employ natural cheese such as, for example, salad dressings, pizzas, lasagna, omelets, cheese-flavored pastries and the like. Some approaches producing such processed imitation or synthetic cheeses are as follows: A synthetic cheese is described in U.S. Pat. No. 3,806,606, patented Apr. 23, 1974, which is prepared by homogenizing a composition containing 10 to 40% of a narrow melting range fat having a solid content index of less than 3 at 92.degree. F. and from 15 to 25 at 70.degree. F.; from 10 to 25% of wheat gluten; from 3 to 6% of egg white, from 3 to 6% gelatin, flavor and water followed by heat treatment to set the composition. The product is said to have the eating qualities of natural cheese to a great extent and is a successful synthetic imitation of a natural dairy cheese product. U.S. Pat. No. 3,694,219, patented Sept. 26, 1972, describes a spreadable food material from heat-treated soybean flour, water and a cheese processing salt. This product is sometimes mixed with additional cheese material and is described as having a taste or flavor similar to cheese. An edible pasteurized process cheese composition is described in U.S. Pat. No. 3,244,535, which includes a homogeneous reaction mixture of cheese and an emulsifying proportion of sodium aluminum phosphate. This process, however, uses a natural cheese starting material to produce a processed cheese food which has good storage stability. A similar process is described in U.S. Pat. No. 3,615,586. One of the difficulties with the prior art processes has been a cost problem since many of the techniques for making process cheese or imitation cheese involve the use of natural cheese materials which constitute a substantial portion of the imitation of synthetic cheese product. Obviously, the elimination of the natural dairy cheese or milk components would represent a cost savings over these processes. Likewise, many of the processes of the prior art rely on natural cheese products for a flavor or taste of the material and, therefore, present a problem from the point of view of uniformity of flavor and control over the composition of the final product. Finally, one of the difficulties of the prior art methods has been the obtaining of a synthetic or imitation cheese product which has uniformity of taste and texture normally associated with natural cheese products. Obviously, it is necessary to achieve these desiderata in order for the imitation cheese product to be acceptable to the consuming public.
{ "pile_set_name": "USPTO Backgrounds" }
"(man) not tomorrow." "The day after." "Right." "You, me, gary, brad." "We'll be teeing off at..." " I like gary." " Doctor, i'm in a hurry... we'll tee off at 7:30. if you're not there because of gary, come on." "I gotta go." "Am I missing something?" "Why a head x-ray when the man was bitten on the hand?" "The patient was in a barfight." "He was admitted at six that's 6:00am." "That's when I started my shift." "Where is he now?" "I'd like to see him." " They moved him." "A night nurse..." " page me when you find him." "Sure." "I'll do that." "Cora, can you locate a patient for me?" "Hey, ana." "Sure." " Edward solomon?" " Yep." " Aren't you off?" " An hour ago." "Here he is." "They had him backwards." "Solomon edward." "He's in icu." " From a bite?" " I don't know what from." "Toxicology's working him up tomorrow." " I'm going." "Can you let dr." "Dandewar know?" " Sure." " Thanks." " Did you talk to luis about Sunday?" " I will." "Night, cora." " Night." " Hey." " Hey, ana." " (radio crackles)" " Let's go." "It's starting early." " Great." "Later." " (driver) let's go, let's go!" "(siren starts)" "(woman) '... an unconfirmed... ' (man) '... not an isolated... '" "(# stereophonics:" "Have a nice day)" "# So have a nice day # have a nice day # have a nice day... # hey, vivian." " Look, I can go backwards." " Let me see." "Hey, that's amazing." "Maybe tomorrow i'll do a few backward laps with you." " Ok." " Careful, now, I gotta pull in." " Say hey to your mom for me, ok?" " Ok." "(tv plays quietly)" " Hey." " Hey, you." "You missed it." "They just cut the mailman loose." "No, richie?" "The chubby one?" "He had such a sweet voice." "I can't believe that." "Hey, you." "Hey, you." "Come here." " How'd it go today?" " Not bad." "You?" "Good." "I'm trading shifts with cora so if I take Sunday, i'll have a three-day weekend at the end of the month." " Is that ok?" " Yeah." "I think cora has a new guy she's keeping secret." "Really?" "Wow." "Lucky her." "I thought maybe you'd gone out with the girls." "What, and miss date night?" "(man on tv) 'I decided to take action." "'I went to see harvey at the men's weight loss farm... '" "(tv) '27 horsepower, turbocharged... ' 'stay tuned to this special news bulletin." "'We will return to our regular programming following this report.'" "(creaking)" "Vivian's here." "Vivian, honey." "Sweetie, are you ok?" "Oh, my god." "Oh, fuck." " Call an ambulance!" " (choking shriek)" "Vivian!" "(shrieks)" "(hisses)" "(yells)" "Luis, luis, luis." "Let go!" "let go!" " (banging and shrieking)" " Let go!" "let go!" "let go!" "I can't get it!" "hold it!" "hold it!" "let go." "Let go!" "i'm going to call for help." " 'All circuits are busy at this time.'" " God, no." "No." "(ana dialing, panting)" "(banging)" " 'All circuits are busy... ' - don't do this to me, please!" "911." " 'All circuits are busy... ' - luis?" "What are you doing?" "(roars)" "(shrieking roar)" "(pants and moans)" "Luis?" "(shrieks)" "(sirens wailing in distance)" "Help!" "get back, ana." " Get back!" " just tell me what's going on!" " I told you to get back." " (siren wailing)" "(horn blares)" "(shouting, tires squealing)" "(explosion)" "(shrieking roar)" "(engine starts)" "(tires squeal)" "(luis growls)" "(woman screams)" "'... emergency broadcast here in the milwaukee area.'" "'The following is information for local evacuation centers." "'If you live in waukesha county... ' help!" "can you help?" "Please!" "'... 22 robin lane." "'If you live in southern milwaukee county, there's a shelter... '" " (siren wailing) - '... 1353 henderson road." "'If there is no activity where you live, stay inside and lock all doors.'" " (screaming) - 'If you live in jefferson county... 'this is the emergency broadcast system for the greater milwaukee area." "'If you live in racine county, there is no information available at this time." "'Please stay inside and lock all doors and windows." "'Miller park is no longer considered a safe haven." "'Please avoid the stadium and proceed to other locations." "'Meanwhile, civil unrest is still being reported in the area of the riverwalk." " 'Please avoid traveling to... ' - (horns blaring)" "'There are unconfirmed reports that several military personnel... '" "(screaming)" "'The following locations are still listed on the milwaukee emergency safe haven list... '" "(shrieking)" "(woman screaming)" "(bang)" "Give me your car!" "(tires squeal)" "Get off me!" "get off!" "(screams)" "(birds twittering)" "(chanting)" "(man) 'i'll take your questions.' (2nd man) 'is it a virus?" "'" "(man) 'we don't know.' (woman) 'how does it spread?" "Airborne?" "'" "(man) 'airborne is a possibility." "We don't know.'" "(3rd man) 'is this an international health hazard or a military concern?" "'" "(man) 'both.'" "(2nd woman) 'are these people alive or dead?" "'" "Hold him down!" " 'we don't know.' - (reporters shouting)" "(# johnny cash:" "The man comes around) # There's a man going round taking names # and he decides who to free" " # and who to blame - 'these shelters have been compromised.'" " # Everybody won't be treated the same - 'i've lost the teleprompter.'" "# There'll be a golden ladder reaching down # when the man comes around" "'... shifted from containment to... ' # the hairs on your arm will stand up" "# at the terror in each sip and in each sup # will you partake of that last offered cup" "# or disappear into the potter's ground # when the man comes around" "# hear the trumpets, hear the pipers # one hundred million angels singing" "# multitudes are marching to the big kettledrum" " # voices calling, voices crying - 'i've just spoken with the president." " 'He's in contact with cdc and fema.' - # Some are born and some are dying" " 'no more questions.' - # It's alpha and omega's kingdom come" "(screaming)" "# And the whirlwind is in the thorn trees # the virgins are all trimming their wicks" "'a us off!" " 'God, they're here!" "' - (shrieking) #... the four beasts and I looked and behold, a pale horse # and his name that sat on it was death # and hell followed with him #" "(gun cocking)" "Say something." "Please." "(distant siren)" "(gunshot)" "All right, ok." "Put the guns down!" "what are you doing?" "He's a cop!" "come on, put the gun down." "I thought you were one of them." " You do not want to go that way." " What's that way?" "Officer." "Sir?" "You do not want to go that way." " What's that way?" " It's pretty bad." "What about fort pastor?" "If you had wings." "The road's thick with those motherfuckers." " How do you know?" " We just tried." "Come on." "Back when there was eight of us." "(airplane passing overhead)" "We're going to the mall." "Shit." "Damn." "(woman screams)" "Hurry up!" "back up." "(snarling)" "Open the door." "(banging)" "(banging, snarling continues outside)" "Lights." "Here." "(static on line)" " No?" " No." "(# muzak version of don't worry, be happy)" "Come on." "Sit right there." "(gun cocking)" "We need to make sure this place is safe." "I'll see if the doors this way are locked." "I'll check down there." "Maybe, officer, you could go check... all right." "Ok." "Maybe it's better you stay here with the gun." "Andre and I will check around." "Baby, i'll be right back." "No, just stay right here." "Stay right here." "(rattling)" "(rattling)" "Shatterproof, asshole." "Shit." "(distant clunking, man grunting)" "(grunting)" "(snarls)" "(distant crashing and snarling)" "(distant yelling)" "(snarling roar)" "(screaming)" "(snarling)" "(hissing snarl)" " What happened?" " Come on, move." "Move!" " which way?" " Here." "Elevators." "Let's go, let's go!" "(lift dings)" "Can I see that arm?" "I need to suture that." " Are you ok?" " Yeah." " Find someplace else." " We just need a place..." " maybe you didn't hear me." " There is no place else." "Tough shit." "This is our place and you can't stay here." "Yeah." "And you already trashed metropolis." " My wife is pregnant." "We can't run." " (bell dings)" " His arm..." " those things are down there." "These are your problems, not mine." "If I put my foot up your ass, would that be your problem?" "Hey, asshole, i'm the one pointing the gun at you." "He is a cop, cj." " (bell dings)" " So what?" "(ana) we're not gonna cause any trouble." "Just let us stay here for a little while." "Please." "Ok." "Come out slowly and give your weapons to bart and terry." " Don't do it." " You must be crazy." "You can take your ass on over to quality inn, shaq." "Huh?" "You want to do that?" "Let's go." "Hey, don't give him that gun." "Fuck." "Smart move." "(reporter) 'nobody knows what's going on." "There's a lot of blood and bodies." "'There's a slew of fires." "We're going back to a live picture now.'" "(news reports overlapping)" "'One second." "Ma'am, are you american?" "'" "All right." "Let's go, guys." "Come on." "Get your own little tv." "Come on." "Let's go." "(russian accent) excuse me." "Please." "Is there a restroom?" "No." "You're staying here." "Then tell us where in here you'd like us to piss." "It's around the corner, that way." "Whoa, where are you going?" "She's not going anywhere alone." ""She's not going anywhere..." this is a fucking nursery school!" "go with them." "'I'm bill vibert for 23-v cable news." "'I'm at one of the collection depots to interview sheriff cahill." "'How do you kill these things?" "'" "'Just shoot 'em in the head." "'They go down permanently when you shoot 'em in the head." "Then burn them." "'Danny!" "put another round in that woman!" "'look!" "she's a twitcher!" "' twitcher!" "now, that is one cool motherfucker." "He's still bleeding." "I need to stitch his arm." " You a fucking doctor?" " No, i'm a fucking nurse." " 'I know some of these people.'" " First aid kit's in the off!" "Ce." "'What are you gonna do?" "It's gotta be done.'" " Huh?" "What did I tell you boys?" " 'Get those bodies off the truck!" "' america always sorts its shit out." "You're lucky." "He could have bitten it off." "'You're referring to a report that came in this morning." "'That report was completely... ' 'what can we tell people that don't know what to do?" "'" "'I would suggest that you come to fort pastor." "'If you can't get here, our search-and-rescue teams will find you.'" "My brother's there." "He's waiting for me." "(sobs)" "What's the holdup, darling?" "Hm?" "(shouting on tv)" "So what's the plan?" "The plan is you drink a tall glass of shut-the-fuck-up." " (sirens on tv)" " Ok." "That's one idea." "What about locking this place down?" "Sooner or later, they'll get in." "That's good." "I hadn't thought of that." "No doubt." "You probably already thought about putting a sign up on the roof cos there's still planes in the air." "Might be good to let them know we're alive." "We can get paint from case hardware." "Use doors to board up the weak spots." "That's a solid plan." "Cj, is it?" " Yeah." " All right, cj." "(clears throat) listen up." "I'm giving everybody a job and I expect you to do it." "I don't want to see any half-assin'." "You can start by cleaning up that mess you made in metropolis." "Hey, cj, look!" "terry." "Look at ben cozine." "(squawking)" "Hey, ben." "Ben!" "christ." "Look at him." "(bart) look, he's a twitcher." "Tv says you gotta shoot 'em in the head." "Tv said a lot of things." "Fuck the fucker." "I told him not to go downstairs." "Let's go." "Let's get to work." "Holy shit." "(growling)" "(snarls)" "(bart) let's do it." "(terry) all right, let's pick him up, then." "Ready?" "One, two, three." "On two." "All right?" "One, two." "(snarling below)" "What are they?" "I don't know." "Why are they coming here?" "Memory, maybe." "Instinct." "Maybe they're coming for us." "(gunshots)" " (snarling) - (gunshot)" "Look over there." "There's someone on the roof." "His name's andy." "He's alone." "He may as well be on the moon." "(ana) poor guy." "What's he pointing at?" "(engine overhead)" " Helicopter." " Hey, it's coming." " (cj) fuckin' a, man!" " (all shouting)" "(ana) hey!" "(michael) hey!" " hey!" " where's he...?" "Please... what's he doing?" "Where's he going?" "No." "I mean, they saw us, so... they'll be coming back, baby." "Don't worry." "They'll send somebody." "(ana) it's safe here." "We'll just wait for them to come back." "I don't want anybody sneaking around and stealing shit." "Comprende?" "Sweet dreams." "Those assholes are gonna get us killed." "(sighs)" "We have to do something." "I'm not doing anything to create problems for luda and me." " The helicopter's coming back soon." " I hope so." " What's that supposed to mean?" " It's means it might come and it might not." "What do you mean?" "You said it was coming back!" " we have to get to hospital." " Baby, listen." "Don't worry, ok?" "This guy, he doesn't know shit." "All right?" "It's coming back." "My man, I hear you talking a lot, you're always saying something, who the fuck are you that we should listen?" "Were you like in the marines?" "What the fuck do you do?" "I sell televisions at best buy." "(laughs)" "Wow." "Hey, officer, how do you like following a guy that sells tvs?" "About as much as I like following a guy who steals them." "I'm not following anyone." "I'm going to fort pastor to get my brother." "'They seem to need to feed on warm flesh." "'Some basic skills remain." "'They don't seem to have much, if any, reasoning power.'" " 'And how does this spread?" "'" " This is shit." "The same thing all day." "Tell me something I don't know, asshole!" " 'we're going off the air... ' - wanna hear something that sucks?" "'... and switching to the emergency broadcasting system.'" " You know that chick at dairy queen?" " 'I don't know when we'll be back.'" " The fat one?" " Yeah." "She was coming over tonight." "I would have tapped that shit." "Bart, dude, everybody's dead, ok?" "Your mom's dead." "Your brother." "That fat chick at dairy queen." "Dead." " Yeah." " 'God bless america.'" "That sucks too." "'Hell is overflowing 'and satan is sending his dead to us." "'Why?" "'Because 'you have sex out of wedlock," "'you kill unborn children, 'you have man-on-man relations, 'same-sex marriage." "'How do you think your god will judge you?" "'Well, friends, 'now we know." "'When there is no more room in hell, 'the dead 'will walk the earth.'" "(snarling and banging echoing faintly)" "What the hell?" "(tvs crackling)" "(# muzak:" "You light up my life)" " Hey, dumb-ass." " Hm?" "It's the timers." "It's eight o'clock." "Terry." " Go shut 'em off." " It's bart's turn." "You're the trainee, man." "Shit rolls downhill." "I wish somebody was working at hallowed grounds." "How hard is it to make coffee?" "I wanted a soya mocha latte with foam." "Faggot." "What are you doing?" "What's the news?" "Bad." "Hey!" "hey!" "hey." "What?" "The bathroom in here is fake, it doesn't work." " I'll tell cj." " I'm telling you." "You're the type of cat that goes to church and all that shit, right?" "Yeah, I do all that shit." "So what do you think?" "What is this?" "Is this the end of times?" "Cos if it is, i'm fucked." "I'm serious." "I've done some bad things." "Oh, I get it." "You saw hell yesterday, now you're scared of going to hell for all the bad things you've done." "Go in the stall, say five hail marys, wipe your ass, and you and god can call it even." "You think I feel like I deserve to be here?" " Yeah." " Well, I don't." "And i'm cool with that." "But that's not it." "I feel like i'm here for another reason." "I feel like i'm here to bring that baby on this earth and give it everything that I never had." "I just want the opportunity to change things." "(# muzak stops)" "Shit!" "(gunshot)" "(gunshots)" "Cj!" "how did you get out?" "Who said you could loot the stores?" " What are we going to do about that truck?" " Nothing." " There's people in it." " How do you know they're not fucked up?" " For one thing, they're driving a truck." " (gunfire)" "Oh, and shooting guns." "We might let the wrong ones in." "Then i'm dead." "And I don't want to die." " Who are the wrong ones?" " Nobody here is sick." "It stays that way." " I think..." " I did not ask for your opinion!" " if you want to argue, argue with this." " Relax shut your fucking mouth." " Move the gun." " You can't turn them away." "They'll die." "Tough shit." "Self-defense." " I won't kill anybody." " I'll kill you." " Stop it, cj." "Don't do this." " Shut up!" "i'll kill all of you to stay alive." "Get the fucking gun out of my face!" " oh." "You got a mouth on you." " Somebody should show her how to use it." " Is there a holding cell?" " Yeah." "Back of the security room." "That's real good." "You're gonna get us all killed, dumb-ass!" "fucking traitor." "Get off me." "I hope you got a good plan." "Come on." "(distant snarling)" " Hey!" " through here." " I can't see a damn thing." " Me, either." "(beeping)" "Why is he backing up the truck?" "(crash)" " Through here!" " hey!" "shit." "What the fuck?" " We gotta go out there." " Throw that bullshit out of your head." "That's not part of the plan." "Change of plan." "I'll open the door." "No." "Ok." "One, two..." " don't do it, man." "...three." "Come on, man." " Thanks." " Yeah." "Shoot them in the head!" "I don't see anybody." " Get back inside!" " get back inside!" " here you go." " There are six more people in the truck!" "andre!" "(clicks)" "(shrieking and snarling)" "(woman) thank god." "I couldn't stay in that fucking truck anymore." "(ana) anybody who's injured, go to metropolis." "I'll take a look at you." "Let me take a look at her." "Can you help me?" "What's your name?" "Glen." "Yeah, sure." "Just give me a second to collect myself." " Thanks." " Ok." "Wait in there." "I'll look at your leg." " Can you hold this?" " Yeah." " We're just going right there." " Oh, my arm." "We'll make you nice and comfortable." "We got plenty of food and water." " Help should be along soon." " (laughs)" "Help?" "You hear that from the same jackass who said to go to st." "Verbena?" " The church downtown?" " Yeah." "It's the first place I went." "Some dipshit on the radio said it was safe." "He was wrong." "That's where you got them?" "I got a call on the cb from glen saying these folks were in the chapel." " He's a priest?" " No, he plays the organ." "I was in the neighborhood so I picked them up." " Well done." " Thanks." "Excuse me, when you two fellows are done blowing each other, maybe davy crockett can tell us the deal." "Since the tvs went down..." " excuse me." "Whose rig is that?" " It's mine." " You mind if I borrow it?" " I'm not using it." " Keys?" " They're in the cab." " The truck won't make it to fort pastor." " Forget it." "That place is fucked." " Bloodbath city." " How do you know?" "We just came from there." " Is everyone there dead?" " Dead-ish." " Is everyone there dead?" " Yeah." "In the sense that they all sort of fell down and then..." " I have to see." " You won't make it." "...got up and..." " i'll get as far as I can." " One foot." "...started eating each other." " I'll take my chances." " Don't be an idiot." "Please." "The people here could use your help." "Fuck y'all." "It's nice to see you've all bonded through this disaster." "(distant snarling)" " Hey." "You need anything?" " No, we're fine." "He's got a bite on his hand." " She's cold." " (wheezing)" "That's good, right?" "I don't know." "It's weird." "An infection this bad usually comes with a fever." "That guy's arm looks pretty bad." "You should check it out." " (wheezing and moaning)" " All right." "Stay with her for a minute." " Let me take a look at that." " I'm fine, really." "They don't hurt much." "Tucker could use you more than me." "His ankle's cut pretty bad." "I'll just clean it up a bit." " You ok?" " (wheezing gasp)" "Ma'am, can I get you something?" "Like a glass of water?" "(wheezing gasps)" "Anal ana, come here!" "anyone know her name?" "Died without a name?" "Damn." "You wanna use the other room?" "Holy shit!" "(shrieking roar)" " (squelch) - (grunts)" "(panting)" "Holy shit." "Holy shit." "I think it's the bites." "Frank said she was walking on her own five hours ago." "The bites killed her." "The bites brought her back." "How do you know?" "I watched it happen." "I felt her pulse, she was gone." "Then... yesterday I saw the same thing." "I think that's why it spread so fast." "All right." "So who else in the group is bitten?" " Frank for sure." " And the one with the foot?" "Tucker?" "He says no, he fell." "So it's frank." "Tall guy, right?" "Right." "So we have to quarantine him." "Where do we do that?" "There must be a place in here." "Then what?" "I don't know." "But... it's too dangerous to keep him here." "What are we talking about?" "Are we talking about killing him?" "You'd rather wait for him to die and then he kills us?" "Yes." "No." "You can't kill him." "He's got a daughter!" "i'm sorry." "There's no other choice." "He's right." "Michael, no." "What if i'm wrong?" "You've seen it happen before." "Frank." "Michael's coming to shoot you." " What?" " You're infected." "You're going to become one of them." "(frank) is this true?" "Are you here to kill me?" " You were bitten." "It's only a matter of time." " No." "No." "No." "Leave my dad alone." "Go away." "You can't do this." "You have to understand that she's lost everyone." "Her mother, her two brothers." "I'm all she's got." "Well, michael, what are you waiting for?" " Go ahead." "Kill him." " (daughter sobbing)" " Hey, kill tucker, too." " Wait a minute." "I was never bit." "We can't be sure." "Do it, michael." "Are you sure it's the bite?" "No." "She's sure." "I'm sorry." " Hey." " Hi." " Are you ok?" " Mm." "Let me see your arm." "It hurts." "It's already starting to heal." "Andre, I can't have baby here." "Why not?" "People have had babies for millions of years, all on their own, no hospitals." " Wait." " Oh, yeah." " It's moving." " I felt it." "We gotta come up with a name." " I want russian name." " Don't start that." "African name." " Please?" " Come here and give me a hug." "(frank) sweetie." "I'm so proud." "I couldn't ask for anything more in a daughter." "(frank) I love you." "I love you too." " Time to go, honey." " No." "(whimpering)" "(sniffs)" "Terry, come on." "Open the door." " Shut up." " Don't tell me to shut up." "Open the door." "(bart) I got you this job." "Come on." "(hoarse whisper) you want... every... single second." "Ana." "I'm glad you didn't do it." "(shriek, gunshot)" "(# richard cheese:" "Down with the sickness)" "# Oh, shit # wa-ah-ah-ah" "# wa-ah-ah-ah # get up, come on, get down with the sickness # get up, come on, get down with the sickness # get up, come on, get down with the sickness # open up your hate and let it flow into me" "# get up, come on, get down with the sickness # you mother, get up, come on, get down with the sickness # you fucker, get up, come on, get down with the sickness" "# madness is the gift that has been given to me" "# I can see inside you, the sickness is rising # it seems that all that was good has died" " # oh no, the world is a scary place... # - (snarling)" "# Now that you've woken up the demon in me # bobby, will you give it to me?" "# Two, three, four # wa-ah-ah-ah-ah # get up, come on, get down with the sickness # you mother, get up, come on, get down with the sickness # you fucker, get up, come on, get down with the sickness" "# open up your hate and let it flow into me # why can't you just fuck off and die?" "Get down with the sickness" " # fuck you, I don't need this shit... # - (moaning)" " # You stupid, sadistic, abusive, fucking... # - fuck me harder." "# Here it comes, get ready to die # get ready to... #" "(clunk)" "# Die #" "ok, here's a good one." "Top ten ingredients to a successfu I relationship." "(mutters)" "I'm gonna skip to the top three." "Number three. "he listens to me."" "Number two. "he tells me he loves me."" "And number one." "It's trust." "Number one is trust." "(snarling)" "(gunshot)" "(laughing) holy shit." "He got him." " So, who do we have next?" " Er... yeah." "Burt reynolds." "Tell him to get burt reynolds." "(laughs)" " (steve) my goodness." " Man, he's good." "It barely even looked like him." "Oh, oh... er..." " rosie o'donnell." "Tell him rosie." " Yeah, rosie." "Nah, too easy." "Give him something hard." "You guys had rough childhoods?" "A little bit rocky?" "Hey, sweetheart, let me tell you something." "You have my permission - if I ever turn into one of those things, blow my fucking head off." "Oh, yeah, you can count on that." "I guess the first time I knew I was gay I was 13." "This guy, todd," "he was building a deck in our backyard... oki just, please, stop." "He had the most astonishing blue eyes." "Oh, my god!" "i'm in hell." "(groans in frustration)" "How's luda doing?" "She's fine." "Hey, where's that lemon stuff?" "It's all gone." "Steve likes to put it in his booze." "Try the vanilla stuff." "All right." "I'd like to check on her, see how she's doing." "No, thanks." "She's fine." " You sure?" " Yeah, i'm sure." "It's ok, hon." "We understand." "(meows)" "Thanks." "(snarling below)" "And before that, I worked in a stationery store." "And I drove a snowplow." "Fixed copiers." "It's a shame this whole end-of-the-world thing's holding you back." "(laughter)" "Ok, worst job." "I know which job I was the worst at - it was being a husband." " That's not a job." " It sure is." "You guys just haven't met the right girl." "I tried it three times and..." "I got pink slips every time." "What were you best at?" "Being a dad." "I think I was best at that." "(all gasp and scream)" "(kenneth) calm down." "(norma) are they in?" "(michael) no." "Are there generators?" "(wails)" " (wails)" " Shh." "Ok, shh." "Shhh... it's all right, baby." "(wails)" "(wails)" "Baby, please." "You got to be quiet, ok?" "It's gonna be all right." "Our baby is on the way." "It's coming." "That's it." "It's in employee parking level 3." "They're in a pen near the parking shuttles." " Have fun." " Wait a minute." "You're coming too." "No, i'm not." "I said i'd tell you where the generators are, not show you." "Did you think i'd just leave you two up here?" "You come with me or go back in the cell." "All right." "I ain't going anywhere without a gun." " You're not getting a gun." " Trust." "The primary ingredient in any relationship." "Have at 'em, cowboy." "Asshole." "Bart, get the chains." "(chains jangling, gun cocking)" " You ready to roll?" " You're coming with us?" "No, you're coming with me." "I've done this before." "Know how to use that?" "This one's the dangerous end, right?" " (clicks)" " Now it is." "(faint squeaking)" "This is level 1. we gotta walk down to 3." "(dripping)" "(echoing clunks)" "(echoing clang)" "(rattling)" "What the fuck was that?" "I just saw something." "You didn't see shit." "Shut the fuck up." "(loud clunk)" "(banging)" "Oh, shit." "Here it comes." "(panting)" "Jesus christ." "It's a fucking dog." " Come here, boy. (claps) - (whimpers)" "Nothing's here or it would've eaten him." " See?" "I told you I saw something." " (barking)" " What's wrong, boy?" " There's nothing wrong." "That dog's just fucked up." "(screaming, gunshot)" "(wailing)" "(snarls)" "(distant snarling)" "Run!" "(snarling)" "(bart) wait, cj!" "wait up!" "wait!" "it's locked!" "it's fucking locked!" "(snarling and screaming)" "Come on, let's go!" "(snarling, gunshot)" "Cj!" "(bell dings)" "I'm out!" "cj!" "matches!" "(snarling and shrieking)" "Breathe." "You're doing good." "Breathe." " (wheezing)" " You're doing good, baby." "(wheezing)" "(wheezing stops)" "I'm sorry." "(whispers) i'm sorry." "(shrieks)" "(hissing)" "(# mobile plays lullaby)" " Thanks." " Ok." "That's the last." "I'm gonna go check on luda." " I'll go." " You sure?" " Yeah." "I'll take them some candles." " Ok." " Let me know if they need anything." " I'll have a smoke on the way." " See you." " Bye." "(muffled shrieking)" "It's coming." "I see it." "(squelching)" "(fly buzzing)" "Guys?" "Oh, my god." "It's a girl." "(muffled snarling)" "Oh... you want to kill luda?" "You want to kill my family?" "(gasping)" "(gasping)" "Normal come on, norma." "What happened?" "(chokes) the son of a bitch shot me." " Get away from her." " Wait." "Just wait." "She died of the gunshot." "She wasn't bitten." "But she'll wake up, right?" "No." "No, if she was one of them, she'd be up by now." " Terry?" " Yeah." "Hold this." "(shrieking)" "Oh, god." "(resounding gunshot)" " Somebody should say something." " Yeah." "Glen?" "No." "You worked in the church." "I played the organ." "You must have heard the priest say something about life and death." "It was a job." "I don't believe in god." "I don't see how anyone could." "Somebody should say something." "There's nothing to say." "I've been to a lot of funerals." "I've folded the flag and given it to a lot of wives and fathers and kids and told them how sorry I was." "But that's not what I was really feeling." "In the back of my mind, I was always saying, "better them than me."" "But I don't believe that now." "Now I realize there are some things worse than death and one of them is sitting here waiting to die." "I don't want to die here." "I saw a couple of buses in the garage." "We could reinforce them, then get as far from here as possible." " And then what?" " I have an idea." "Um... why don't we swing by the marina and hop in my boat and take it for a pleasure cruise, you jackasses." "Wait." "There's islands in the lakes, there's not a lot of people on them." "I was kidding." " How far is the marina?" " Oh, my god!" " you're serious?" " I think it's a damn good idea." "How about the rest of you?" " Kenneth?" " Yeah, it's a good idea." "We have to pick up andy." "He's part of the group." "Excuse me." "Not to shit on anyone's riff but let me see if I grasp this concept." "You're saying we take the parking shuttles, reinforce them with aluminum siding and then head to the gun store where our friend andy plays some cowboy-movie, jump-on-the-wagon bullshit." "Then we drive across a ruined city through thousands of dead cannibals, all so we can sail off into the sunset on this fucking asshole's boat?" "And head for some island which may not even exist?" " Yeah." " Pretty much, yeah." "Yeah." "Ok." "I'm in." "(# the hangman's song)" "# Armageddon time is coming soon # the fires will turn us all into dust" "# and we will be judged one last time # you, your son and me" "# oh, oh # woe is me # soon we'll all be swinging from that tree" "# pray your neck breaks when the rope gets tossed # pray your mother isn't there to see" "# oh, oh # woe is me #" "we have 12 of these shotgun shells, 26 of those pussy. 9" " Mils, and 16 of the.357 magnums." "Yeah?" "That's still not very much, so hopefully there won't be too many of them at the dock." "Nice to see you busting your ass." "Oh, that's sarcasm." "That is awesome." "You know, I would love to help but, er, a captain never works alongside his men." "(lmitates whip cracking) You guys have a good 'un." "What a total dick." "Guys, where did chips go?" " Chips?" " I can't find him." "Chips?" "Come on, chips!" " (squeaks) "come on, chips!" - where'd you go, honey?" " (whistles) - (barking)" "There you are." "There's my boy." "Don't you ever leave me again, ok?" "Ever, ever." "Hey." "Kenneth wants a meeting upstairs." "Come in here first." "I want you to see this." "When those things are on the side of the bus, this'll get them off." "Cool, huh?" "Wow." "That might be the most romantic thing anyone's ever shown me." "I'm trying here." "Yeah, I know." "It's not just about him starving." "If we pick him up and he doesn't have his strength, we'll be carrying him." "She's right." "He's a hell of a shot." "We need him." " I'm not saying we don't." " There's no point in arguing." "We need to get some food over there." "I know." "We draw straws and the loser runs across the lot with a ham sandwich." " Could you be a bigger prick?" " Yes, but that's irrelevant." "My question is, what's your plan?" " Come on!" " (toy squeaks)" " I got it." " (all arguing)" " Shut up!" "...more ammunition." "I have an idea." " It's hurting him!" "it's not safe!" " they're not interested in him." "They want us, ok?" "Chips is gonna be fine." "(zombies snarling)" "(barking)" "(whistle)" "See?" "Look, they're not even paying attention to him." "(kenneth) the walkie's in the bag?" "(cj) yeah." "Let me see." "Let me see!" "(andy blowing whistle)" " There he is." " (barking)" "Good boy." "Good boy, chips." " Ok, he's there, he's in." " Give me those." "(kenneth) oh, man." " What?" "What?" " No." "No." "Oh, man." "They got him." "They got him!" "(gunfire)" "I'll try him on the radio." "Andy." "Andy, do you copy?" "Andy, can you hear me?" "Andy?" "(andy) 'can you hear me?" "Hello?" "This thing working?" "'I'm dinged up pretty bad but I think i'll be ok.'" " Where are you hurt?" " 'Goddamn, those bastards bite hard." "'I just have to stop the bleeding." "It's really going.'" " (chips barks) - 'Easy, boy." "Easy." "Is this ken?" "'Is that you, man?" "'" " Yeah, it's me, brother." " 'Hey, man, good to hear your voice." "'I guess we'll meet up-close pretty soon." "'Shit, hang on." "'Ah, jesus." "He got me good.'" "You just hang in there." "You got the food, right?" " 'Yeah.'" " Do we tell him?" " (chips barks) - 'Hey, this dog got a name?" "'" " See, nicole, chips... nicole?" " (tires squealing)" " What the hell's that?" " Oh, my god, it's nicole!" "(tires squealing)" "Shit." "That idiot's going after the fucking dog." "She made it!" "she's in!" "(nicole) 'guys, I found chips!" "I got him." "He's oki' nicole, how's andy looking?" "'I don't know." "There's a lot of blood in here." "There's blood everywhere.'" "Wait, I see him." "He's on the roof." " He's writing something." " What's it say?" "(nicole) 'guys?" "'" " Tell her to get out!" " what's wrong?" " Nicole, how's the truck?" " 'I'm not going back out there.'" " '(barking)' - 'Chips, be quiet!" "' tell her to get the hell out!" " you need to hide." "Can you do that?" " 'What do you mean?" "What's going on?" "'" " Nicole?" " 'Here's andy." " 'Oh, my god!" "' - tell her to get out!" "nicole, listen to me." "'(sobbing) i'm in a closet but he's outside trying to get... ' nicole?" "Nicole?" "'Help me." "Please, you have to help me!" "i'm gonna die!" "'" "(buzzing and crackling)" "We need to do something." "Now." "Tucker, when we come back we may have company." "Stay here and make sure this door stays open." "Wait, wait." "I'm sorry." "Why does he stay here while I go on the suicide mission to rescue terry's already dead girlfriend?" " Fuck you." " We don't know that." "Either way, we need the guns to get out of this parking lot." " Michael, it's ok." "Let him stay." " Yeah." " Steve, don't fuck this up." " Yeah." "Totally." "(crashing)" "(squeaking)" " All right." "That's it." " Are you sure?" "I'd say we're at the end of the line." "(snarling and wheezing)" "(clang)" "Go!" "go!" " through here!" " hurry up!" " hurry up, hurry." " (snarling)" "(guttural snarling)" "(cj).357,.357. what do you need?" "(terry).38,.38." " (cj) here." " Damn it." "(cj) hurry up." "All right." "Oh, shit." "Nicole?" "(banging)" "(banging continues)" "(banging and snarling)" " Andy." " (snarling)" "I'm sorry, brother." "(shrieks)" "(body thuds on floor)" " (terry) nicole, are you in there?" " I'm here, i'm here!" "(chips whines)" "(kenneth) get as much ammo as you can." " You got a plan?" " Uh-uh." "You?" "How about a barbecue?" "(snarling)" "(snarling and banging)" "(doors rattling)" "How do we know if he hits it?" "(grunts)" "(terry) cj!" "over here, hurry up!" "over here!" "go!" "get down!" "look out!" "(cj) come on, tucker!" " shit!" " (screams)" " Ah, my leg!" " I got you, tucker." " Go!" "go!" " (shrieking)" "Shit!" "go!" "go!" "(roars)" "(wailing and shrieking)" "(gunfire continues)" "(screams)" "Shoot me!" "shoot me!" " (nicole) hurry!" "come on!" " (barking)" "Hurry, hurry!" "goddamn steve markus!" " steve, come on!" " open up!" " open the door!" "open the door!" " steve!" " i'll fucking kill him!" " open the door." " Steve!" " (snarling)" "(shrieking)" "Let's go." "(shrieking)" "Goddamnit!" "move!" " go!" " move it, guys, move it!" " where are you going?" " Just go right now!" "go!" "go!" " they're right behind us!" " go!" " (snarling) - (lift bell dings)" "Come on, move!" "they're right behind us!" "get in!" "close the door!" "(# muzak:" "All out of love)" "I like this song." "(chips barking)" " Everybody in!" " what the hell happened to you guys?" " Prick." " I'll deal with you later, motherfucker!" " wait a minute!" "nicole!" " get in!" "i'll take the gun." "Ok." "Ok, let's get out of here!" "hold on!" "(snarling)" "Oh, christ!" "cj, now!" "go!" "(snarling and shrieking)" "They're trying to turn us over!" "hit 'em with the saw!" "(shrieks)" "(grunts)" "(cj) give me a shotgun!" "holy shit." "(sporadic snarling)" "(tires squealing)" "There's still one hanging on." " Which fucking side?" " Right side!" "(tires squeal)" " I got him." " You gotta drive faster, man." "(snarling)" "Hard left here!" "(tires squealing, chain saw buzzing)" "(screaming)" "Whoa, stop!" "stop, guys." " What?" " We lost them." " (brakes squeal)" " Back it up!" "kenneth, are you there?" "(coughing)" "(ana) 'kenneth, are you there?" "'Kenneth, are you ok?" "'" "(dripping)" "What the fuck?" " (snarling) - (screaming)" " What are you doing?" " Fucking nursery school." "Cj!" "ana, no!" "everyone's dead." " Steve took off." " What?" "Let's go!" "come on!" "steve!" " (roars)" " I got him." "Damn." " (shrieking) - (cj) look out!" "come on, come on!" "(snarling)" "Go, go, go!" " open the door!" "hurry up!" " come on!" "(nicole) guys, get in!" "let's go." "Where's ana?" "Anal anal get in." "What the hell were you doing?" "(barking)" "(chips barking)" "Hold on!" "(chips barking)" "Come on, boy." "Kenneth." "Here." "Get out on the end of the dock." " Cj, come on." " Do it!" "i'll catch up." " There it is!" " terry, get the bowline!" " (gun clicking)" " Shit." "Cj!" "damn!" "fuck!" "come on!" "come on!" "bitch!" "shit." "Come on." "I'll blow every fucking thing up." "(distant snarling)" "Ok, let's go, let's go." " I can't go." " What?" " Downtown when they jumped on us." " Oh, no, michael." "No." " I have to stay here." " You can't." "No, you..." " i'm sorry, ana." " I can help you." "No, you can't." "You can help them." "Stay on the boat." "I can help you." "It's ok." "It's gonna be all right." "No." " It won't." " Hey." "It will." "You sure you wanna do this?" "Yeah." "I think i'll just stay here a while." "Enjoy the sunrise." "(engine starts)" "(gunshot)" "(# the jim carroll band:" "People who died)" "# Teddy sniffing glue, he was 12 years old # fell from the roof on east two-nine # cathy was 11 when she pulled the plug # on 26 reds and a bottle of wine # bobby got leukemia, 14 years old" "# he looked 65 when he died he was a friend of mine # those are people who died, died # those are people who died, died # those are people who died, died # those are people who died, died they were all my friends... #" "'I run a tight ship.'" " 'Where did you get that?" "' - (terry) 'I found steve's camera.' #... and they died # those are people who died, died # those are people who died, died # those are people who died, died" "# those are people who died, died # they were all my friends, and they died #" "'(seagulls crying)'" "'Put that down and help us.'" "(terry) 'ah!" "kenneth, fucking shoot it!" "'" "'(gunshot)'" "(terry) 'christ!" "'" "'(engine chugs to a stop)'" "'(seagulls crying)'" "(terry) 'oh, shit!" "'" "'get your damn camera out my face.'" " '... if there's anyone there.' - '(barking)'" "'Terry, put the camera down and help us off the boat.'" "'(birdsong)'" " '(chips whining)' - (terry) 'nicole, what is it?" "'" " (nicole) 'chips, no!" "' - '(barking)'" "'(barking continues)'" " (snarling) - (terry) 'oh, shit!" "'" "(kenneth) 'stay behind me.'" "'(snarling, gunfire)'" "(# disturbed:" "Down with the sickness)" "# Get up, come on, get down with the sickness # get up, come on, get down with the sickness # get up, come on, get down with the sickness # open up your hate and let it flow into me" "# get up, come on, get down with the sickness # you mother, get up, come on, get down with the sickness # you fucker, get up, come on, get down with the sickness" "# madness is the gift that has been given to me" "# and when I dream" "# and when I dream" "# and when I dream" "# and when I dream # no, mommy, don't do it again # don't do it again, i'll be a good boy # i'll be a good boy, I promise # no, mommy, don't hit me" "# why did you have to hit me like that, mommy?" "# Don't do it, you're hurting me # why did you have to be such a bitch?" "# Why don't you, why don't you fuck off and die # why can't you just fuck off and die?" "# Why can't you just leave here and die?" "# Never stick your hand in my face again, bitch # fuck you I don't need this shit # you stupid, sadistic, abusive fucking whore # would you like to see how it feels, mommy?" "# Here it comes, get ready to die" "# oh, wa-ah-ah-ah # get up, come on, get down with the sickness # you mother, get up, come on, get down with the sickness # you fucker, get up, come on, get down with the sickness" "# madness has now come over me #"
{ "pile_set_name": "OpenSubtitles" }
Effect of 1DMe, a neuropeptide FF analog, on acetylcholine release from myenteric plexus of guinea pig ileum. Since neuropeptide FF (NPFF) is a putative neurotransmitter to exert anti-opioid activity, we examined the effects of [D-Tyr', (NMe)Phe3]neuropeptide FF (IDMe), a stable NPFF analog, on acetylcholine (ACh) release from a longitudinal muscle-myenteric plexus (LMMP) preparation of guinea pig ileum in which opioids were known to inhibit ACh release when muscarinic autoinhibition was not fully activated. In the presence of atropine, 1DMe increased spontaneous and electrical field stimulation (EFS)-evoked ACh release in a concentration-dependent manner. Naloxone also increased ACh release. The stimulatory effects of 1DMe and naloxone were not additive. In the absence of atropine, 1DMe did not affect ACh release. Morphine decreased spontaneous and EFS-evoked ACh release in the presence of 1 microM atropine. 1DMe as well as naloxone counteracted the inhibitory effects of morphine on EFS-evoked ACh release. The combination of 1DMe and naloxone was not more inhibitory than either drug alone. 1DMe had no appreciable effect on norepinephrine-induced inhibition of spontaneous and EFS-evoked ACh release. These results first demonstrated the effects of a NPFF analog on neurotransmitter release: 1DMe had a stimulatory effect on spontaneous and EFS-induced ACh release from the LMMP preparation of guinea pig ileum, probably by counteracting the inhibitory effect of endogenous opioids on ACh release.
{ "pile_set_name": "PubMed Abstracts" }
Sanders Jett-Folk | United States Former Massachusetts Governor Bill Weld has faced intense heat from members of the Libertarian Party since he ran alongside former New Mexico Governor Gary Johnson on the 2016 Libertarian Presidential ticket. However, as we enter the 2020 primary season, it is fully clear Weld is the best choice for the Presidency. He is the liberty-minded man that seeks to dethrone President Trump for the Republican nomination. Governor Bill Weld: A Proven Record of Liberty Weld is a highly educated man with a history in law and politics, having received his law degree from Harvard University. He served as both the United States Attorney for the District of Massachusetts and the United States Assistant Attorney General for the Criminal Division under President Ronald Reagan. Bill Weld was a champion for liberty during his two-term tenure as Governor of Massachusetts. His care for personal freedom earned the Republican two terms in the heavily blue state. Under Weld’s first term in office, unemployment fell by over 3%. He continuously cut wasteful spending within the state and privatized many unnecessary organizations. The Cato Institute awarded him high grades year after year due to his smart fiscal policies. Moreover, he cut taxes 15 times in the state during his tenure and never raised them. National Policies While Governor Bill Weld may no longer be a Libertarian on paper, he is, without question, a libertarian in principle. During the 2016 election, Weld consistently stated his desire to cut the funding of every federal agency by 20%. He also voiced support for lowering taxes to fit the lesser funding needs. Furthermore, he supports the right of states and local governments to regulate educational standards. Bill Weld would seek to end the federal government’s one-size-fits-all education approach. He also acknowledges the existence of man-made climate change. But to fix the problem, he has stated we should “Promote competition” and “Incentivize innovation” rather than regulate carbon emissions and other harmful chemicals. Weld has continuously spoken in support of free trade and stood against harmful tariffs. He has spoken out against regime change efforts that the United States has led over the years. He has additionally noted that handling what occurs in other countries is not in the interest of our citizens. Personal Freedoms Weld believes the government should have no place policing how peaceful Americans live their lives. In 1992, he stated that he wants “the government out of your pocketbook and your bedroom”. He extends this idea to issues such as LGBT marriage and abortion. In 2016, he affirmed that abortion is a “fundamental constitutional right of the individual.” The former governor angered many Libertarians when they discovered that he supported a gun control bill as governor. The bill would have raised the gun buying age to 21, among other restrictions. However, in 2016, Weld made public that his stance had changed, affirming that he was a lifelong hunter who supported the Second Amendment in its entirety. He stated: “Restricting gun rights doesn’t make us safer, and threatens our constitutional freedoms”. There is no candidate that will fight harder for the personal freedoms of Americans than Governor Bill Weld. The Democrats will likely choose a progressive who touts higher taxes and gun control. The current options within the Libertarian Party are anarchists and idealists with no realistic policy ideas. Bill Weld, on the other hand, is a breath of fresh air, a candidate who will truly put Americans first. 71 Republic is the Third Voice in media. We pride ourselves on distinctively independent journalism and editorials. Every dollar you give helps us grow our mission of providing reliable coverage. Please consider donating to our Patreon. Featured Image Source
{ "pile_set_name": "OpenWebText2" }
KHA"* LAWYERS DEC 14 2015 KETTERMAN HEDLESTEN & AMANN, PLLC , CHfHSTOPHca . , www.khalawyers.com JULIE A. KETTERMAN Cert/fed fa(nfy/ CPSMecforor julie@khalawyers. com JAMES R. HEDLESTEN james@khalawyers.com COLIN B. AMANN colin@khalawyers.com December 10,2015 »Se/f/ via email: bmeverGbcbvlaw.com First Court of Appeals Attn: Christopher A. Prine, Clerk of the Court 301 Fannin Street Houston, Texas 77002 RE: Cause No. 01-15-0.0755-CV; Brandy M Weido v. Don Weido Mr. Prine: Wedo not represent DonWeido inthis appeal. As a courtesy to our former client in the initial matter, please be advised that Don Weido will not be filing a Motion for Extension of Time nor a Brief. This matter may be considered by the Court without any further action from Mr. Weido. If you have any questions, you may contact DonWeido directly. Sincerely, James R. Hedlesten JRH/cdw 1004 Prairie, Suite 300 I Houston, TX 77002 I Phone: 713.652.2003 I Fax: 713.652.2002 The Isis Building MOflTH HOUSTON Ta 773^ 1004 Prairie, Suite 300 KHA LAWYERS Houston, TX 77002 11. &EC 2SMS PM 9 1 nt-uc J !FIRST CO!'PT | DEC 1 4 Z0I5 I I CHRISTOPHER A. pRjf.jp KLERK •HOUSTON ,1€XAS ^fROOZ- /7002SS0&S CO1& ,||„|l.».||l.„.|JjHI|.|..f||llllH"'»«l'l"»'ll»Ill'%
{ "pile_set_name": "FreeLaw" }
Pathogenesis of parathyroid dysfunction in end-stage renal disease. The parathyroid functions to maintain normal calcium and phosphate homeostasis and is central to normal bone physiology. In end-stage renal disease (ESRD), there is a failure of these normal homeostatic mechanisms with the frequent development of secondary hyperparathyroidism, which contributes to the pathogenesis of renal bone disease. The phosphate retention of ESRD, together with the reduced serum calcium and 1,25-dihydroxycholecalciferol vitamin D(3) (1,25[OH](2)D(3)) concentrations are the known factors that determine the progression to secondary hyperparathyroidism. 1,25(OH)(2)D(3) markedly decreases parathyroid hormone (PTH) gene transcription, whereas the effects of calcium and phosphate are on PTH mRNA stability, PTH secretion, and parathyroid cell proliferation. The mechanisms of these effects are discussed in this review.
{ "pile_set_name": "PubMed Abstracts" }
This invention relates to a shifting apparatus especially suited for use on motor vehicles having an automatic transmission. Since their inception, motor vehicles have required a power train to transmit the force of the vehicle's engine to its wheels. The power train's main component is typically referred to as the "transmission". Engine speed and torque are converted in the transmission through the changing of gears to satisfy the requirements encountered during the typical duty cycle of a motor vehicle. Transmissions are generally referred to as manually actuated or automatic transmissions. Manual transmissions generally include mechanical mechanisms for coupling rotating gears to produce different ratio outputs to drive the wheels. Manual transmissions require an operator input from a shift lever or the like to effect each desired gear change ratio. More recently, automatic transmissions have become popular in which much of the shifting is done without operator input in response to a sensed speed and throttle opening parameters. Automatic transmissions typically include a shift position select lever on the transmission housing moveable between a plurality of selected positions corresponding to a respective plurality of shift positions within the transmission. The shift position select lever is moveable between its several shift positions by a cable or linkage mechanism extending from the shift position select lever to a suitable gear selector lever located in the passenger compartment of the vehicle. Typically, the gear selector is located adjacent the driver seat or, alternatively, on the steering column. Various proposals have been made in the past to eliminate the mechanical linkage between the driver operated gear select lever and the shift position select member and provide instead a shifting mechanism that responds to a driver actuated by sending an electrical signal to a power means arranged to move the shift position select member. While these proposals may overcome many of the disadvantages of the prior art, they nevertheless leave something to be desired from one or several standpoints. For example, under one of the proposals, U.S. Pat. No. 4,817,471, an electrical control system for control of an automatic transmission apparatus is set forth. The control system includes, among other things, a means for determining the present transmission shift position. The means includes an encoder wheel and a pick-up device. The encoder wheel is provided with a plurality of arcuate tracks and the pick-up device is provided with several flexible resilient contact fingers arranged for coaction with the arcuate tracks. Determination of the present transmission shift position is made through movement of the contact fingers and their rather complicated interaction with the arcuate tracks. Thus, there is a need in the art to provide a shifting apparatus that includes an improved means for determining the present transmission shift position. Additionally, the shifting apparatus of the present invention may be operated in security mode. More particularly, under security mode, a user code must be provided that matches one or more previously stored identification codes to start and operate the motor vehicle. The security mode is provided with a feature wherein once a matching user code has been inputted, a security override key may depressed to eliminate entry of a matching user code each subsequent time the vehicle is started for operation.
{ "pile_set_name": "USPTO Backgrounds" }
God to the rescue By Mark Steele (also published at his blog http://steelefives.blogspot.com/) A few weeks ago at church, we talked about past ‘rescues’ God has made, and what our role is in assisting those rescues. Then we were asked to tell of a time when we were rescued. I shared a critical experience in my recent life, and have written it out here. This was a rescue from my own ignorance. _______________________________________________ Almost six years ago (January 2008), our soon to be 19-year-old daughter let us know that after several years of struggle with the issue, she had determined she was gay. Before that moment we had not thought deeply about this topic, but had just accepted our church’s position that homosexuality was a sin, and to be avoided at all cost. I believe we were outwardly calm, but inwardly in turmoil. We weren’t sure what to understand about our daughter’s sexual orientation, and about her. Was she misguided or sinful? Should we rebuke her? Ignore her state? Do as some others had done, and throw her out or turn our back on her so she wouldn’t adversely affect the younger children in our home? Coexist in love? When we asked our daughter’s bishop about it, the most memorable thing he said was, “Don’t pray for her not to be gay; just pray for her to be safe.” In the midst of our prayer, and thinking, and confusion, Peggy and I took off on our own to Gateway Center in Salt Lake. We talked about our options as to how we should respond to our daughter and this situation. Nothing was clear. Then Peggy noticed a Barnes and Noble store across the way, and suggested we go there. Once we got in the store, Peggy went to the back, as if led to a particular area, and there in a display was a book by Carol Lynn Pearson, titled No More Goodbyes, and it was about our specific situation! Peggy excitedly brought it to me, and I spent the next hour in the store reading through it. It talked about sexual orientation and the church, prescribed a loving approach toward our loved ones with same sex attraction, and included the stories of many who had struggled with this already in their own families, some unsuccessfully as they drove away their loved, leading in all too many cases to despair and even death. Some of her concluding words seared my heart and mind: “When we [Mormons] see a need, we respond. When we are conscious, we act. That new pioneer journey I spoke of in the first part of this book is a journey of consciousness. Now that you have the stories of anguish and of healing, have met our gay loved ones and the parents, sisters, brothers, and friends who have circled the wagons around them, you have journeyed in consciousness and have, I believe, arrived at a new place.” “Now you know.” (p. 275) After further reading and considering the message in No More Goodbyes, we had a new heart. We knew that we should not allow anything to separate us from our daughter and our love for her. Not fear, not anger, not what we thought we understood from our church. This was a gift from God, a new understanding. And a chance to keep things right. This of course didn’t made everything easy. Shelly’s life path was changed, and we grieved the loss of many things we’d hoped for in her life. The science is clearer, but the mind of theology remains murky to us. How does gender identity and sexual orientation relate to the eternities? We have learned to leave that to God. Then we encountered a new round of thought and consideration a couple of years later as Shelly determined she was transgender. A whole new change of direction and expectations! A new name, Jack Kadin. A new set of pronouns. It took us time, and experiences. But six years later, I know we are still a family, working to be knit together in love. And the direction we have taken, faithful both to our son and to our church, still rings true. God had rescued us from a terrible mistake.
{ "pile_set_name": "Pile-CC" }
192 F.3d 1246 (9th Cir. 1999) UNITED STATES OF AMERICA, PLAINTIFF-APPELLEE,V.FRANCISCO ALONSO PORTILLO-CANO, DEFENDANT-APPELLANT. No. 98-10189 U.S. Court of Appeals, Ninth Circuit Argued and Submitted March 12, 1999September 20, 1999Amended December 6, 1999 [Copyrighted Material Omitted] Francisco Leon, Law Office of Francisco Leon, Tucson, Arizona, for the defendant-appellant. Anne E. Mosher, Assistant United States Attorney, Tucson, Arizona, for the plaintiff-appellee. Appeal from the United States District Court for the District of Arizona; John M. Roll, District Judge, Presiding. D.C. No. CR-96-00375-JMR Before: John T. Noonan and A. Wallace Tashima, Circuit Judges, and Jane A. Restani,* Judge, United States Court of International Trade. Restani, Judge: 1 Francisco Alonso Portillo-Cano ("Portillo-Cano" or "defendant") appeals his guilty plea entered before the district court on the ground that his plea did not conform to the requirements of Rule 11(c) of the Federal Rules of Criminal Procedure. The government asserts that defendant is barred from appealing his sentence because his plea agreement included a waiver of his right to appeal. We hold that we may hear defendant's appeal in order to determine whether his guilty plea failed to comply with the requirements of Rule 11 because the trial Judge did not explain the nature of the charges. We also hold that the plea colloquy at issue did not conform to Rule 11. We have jurisdiction under 28 U.S.C. S 1291 (1994) and we vacate and remand for further proceedings. I. BACKGROUND 2 In June 1996, Portillo-Cano was indicted by a grand jury on four counts: Count 1 that he conspired to possess with intent to distribute marijuana, in violation of 21 U.S.C.S 841(a)(1) (1994); Count 2 that he possessed with intent to distribute, and aided, abetted... or induced... others to possess with intent to distribute marijuana, in violation of 21 U.S.C. S 841(a)(1) and 18 U.S.C. S 2 (1994); and, Counts 3 and 4, that he used and carried a firearm during and in relation to a drug trafficking crime, in violation of 18 U.S.C.S 924(c) (1994). 3 In 1995, Portillo-Cano negotiated with a confidential informant ("CI") who worked for the U.S. Customs Service. On March 28, 1995, Portillo-Cano gave the CI a two-ounce sample of marijuana. One week later, Portillo-Cano told the CI that a large quantity of marijuana was available right away. Portillo-Cano brought the CI to a residence in Tucson, Arizona where the CI observed a large quantity of marijuana at the premises. Two men wereguarding the marijuana, one of whom was holding a handgun. A federal search of the residence led to the seizure of 1,160 pounds of marijuana and two firearms. 4 Pursuant to a Rule 11(e)(1)(C) plea agreement, Portillo-Cano entered a change of plea and pled guilty to Counts 1 and 4 of the indictment on May 28, 1997. Upon entering into an enforceable Rule 11(e)(1)(C) agreement, Portillo-Cano would have waived his right to appeal a sentence called for by the agreement.1 The plea agreement included a provision that Portillo-Cano understood he was giving up his right to appeal the sentence. Portillo-Cano also was to forfeit all right and title to the two firearms. The district court sentenced defendant on March 31, 1998 to 60 months for Count 1, and 11 months for Count 4, to run consecutively.2 5 Defendant appealed his conviction and sentence to this court on April 8, 1998. Portillo-Cano claims that in the plea allocution of May 28, 1997 the district court Judge failed to comply with the requirement of Fed. R. Crim. P. 11(c)(1) that the Judge explain, in open court, the nature of the charges brought against the defendant. II. STANDARD OF REVIEW 6 We review the validity of a defendant's waiver of the right to appeal de novo. United States v. Buchanan, 59 F.3d 914, 916 (9th Cir. 1995). We also review de novo whether a trial court's colloquy with a defendant satisfies the requirements of Rule 11(c)(1) of the Federal Rules of Criminal Procedure. United States v. Smith, 60 F.3d 595, 597 n.1 (9th Cir. 1995). III. DEFENDANT'S RIGHT TO APPEAL 7 The government's only argument on appeal is that Portillo-Cano waived his right to appeal his sentence in his plea agreement. A defendant has a statutory right to appeal his criminal sentence. See 18 U.S.C. S 3742(a)(1). This right, however, may be waived if the defendant knowingly and voluntarily agrees to the waiver. United States v. NavarroBotello, 912 F.2d 318, 321 (9th Cir. 1990) (holding that waiver of right to appeal as part of negotiated plea agreement does not violate due process or public policy). Nevertheless, in Navarro-Botello we also looked at the quality of the Rule 11(c) colloquy to ascertain that the defendant's waiver was knowingly and voluntarily made. See id. (prior to addressing waiver of right to appeal, court reviewed record and found Rule 11 requirements satisfied). 8 We recognize that a defendant who has waived the right to appeal may still appeal a criminal sentence under certain circumstances. See United States v. Schuman, 127 F.3d 815, 818 n.* (9th Cir. 1997) (Kozinski, J., Concurring) (reviewing cases in which defendant may appeal sentence in spite of waiver). For instance, a waiver of a right to appeal if the sentence violates the law or is based on "an incorrect application of the sentencing guidelines." United States v. Littlefield, 105 F.3d 527, 528 (9th Cir.)(per curiam) (interpreting waiver of right to appeal pursuant to a Rule 11(e)(1)(C) agreement), cert. Denied 520 U.S. 1258, 117 S.Ct. 2423, 138 L.Ed.2d 186 (1997). 9 The cases cited by the Government in support of its argument that the right to appeal was waived validly do not involve situations where the defendant challenged compliance with the Rule 11(c) procedure. In Schuman, the court dismissed the appeal on the grounds that the waiver in the plea agreement was expressly stated, and that statements by the district court judgethat the defendant may still have had some rights to appeal did not give rise to a contrary result because the prosecution objected to this advisement by the court. Schuman, 127 F.3d at 817. The court also rejected Schuman's contention that the Government had failed to comply with the plea agreement. Id. Buchanan, also cited by the Government, stands for the proposition that, generally, when the district court Judge tells the defendant he may have a right to appeal, that "oral pronouncement must control," because the defendant "could have a reasonable expectation" that he could appeal his sentence. Buchanan, 59 F.3d at 917. In neither of these cases was the defendant denied the right to appeal a sentence even though compliance with the procedural requirements of Rule 11(c) was at issue. 10 As stated by the Seventh Circuit, waivers of appeal must "stand or fall with the agreement of which they are a part." United States v. Wenger, 58 F.3d 280, 282 (7th Cir. 1995). "If the agreement is voluntary, and taken in compliance with Rule 11, then the waiver of appeal must be honored. If the agreement is involuntary or otherwise unenforceable, then the defendant is entitled to appeal. " Id. 11 Portillo-Cano is challenging the soundness of his plea allocution under Rule 11, which goes to the heart of whether his guilty plea, including the waiver of appeal, is enforceable. Thus, we must determine whether the plea was valid in order to determine if appeal is permitted. 12 Our holding in United States v. Vences, 169 F.3d 611 (9th Cir. 1999), is not to the contrary. In Vences, we held that we lacked jurisdiction on appeal where the defendant waived the right to appeal in his plea agreement, even though the trial Judge failed to explain the reasons for imposing the sentence, as required by 18 U.S.C. S 3553 (1994). The trial Judge's failure to comply with 18 U.S.C. S 3553 did not make the sentence illegal, 169 F.2d at 613, and did not implicate the voluntariness of the defendant's plea. By contrast, compliance with Rule 11 is the means by which the court is assured that the defendant's guilty plea is voluntarily and knowingly made. IV. COMPLIANCE WITH RULE 11(C)(1) 13 Rule 11(c)(1) of the Federal Rules of Criminal Procedure requires that before accepting a plea of guilty, the "court must address the defendant personally in open court and inform the defendant of, and determine that the defendant understands, the following: (1) the nature of the charge to which the plea is offered [and the mandatory minimum penalty and maximum possible penalty]." The purpose of Rule 11 is to "ensure that guilty pleas are knowing and voluntary." United States v. Longoria, 113 F.3d 975, 977 (9th Cir. 1997) ("defendant's right to be informed of the charges against him is at the core of Rule 11."). 14 In reviewing the compliance of a plea with Rule 11(c), we review only the record of the plea proceeding. United States v. Jaramillo-Suarez, 857 F.2d 1368, 1372-73 (9th Cir. 1988) (quoting United States v. Kamer, 781 F.2d 1380, 1383 (9th Cir. 1986)). We are therefore confined to analyzing the transcript of the Discussion between the trial Judge and Portillo-Cano on May 28, 1997. Upon review we conclude that the trial Judge failed in only one respect with regard to the requirements of Rule 11. He did not explain the nature of the charges for which Portillo-Cano was indicted. 15 As stated in Smith, failure to explain the nature of the charge "requires the vacation of a plea of guilty." 60 F.3d at 597 (citing United States v. Bruce, 976 F.2d 552, 559-60 (9th Cir. 1992)).3 Theplea colloquy in Smith was similar to, and clearly no more deficient than, the one at issue in this case. In Smith the defense attorney waived the reading of the indictment, but this waiver did not "excuse the omission" by the trial court. Id. at 597.4 16 In Smith the Government argued that other events at the plea hearing showed that the defendant understood the nature of the charges brought against him, and that the district court had complied with all of the remaining requirements of Rule 11(c). Id. The prosecutor in Smith established the factual basis for the plea, and the defendant admitted all of those facts. We held that "[w]hile these recitations may satisfy other requirements of Rule 11(c), they do not convey to Smith the nature of the charges against him.... [A]n admission of the facts does not speak to the nature of the charge." Id. at 597. We held that a guilty plea cannot be truly voluntary unless the defendant "possesses an understanding of the law in relation to the facts." Id. (quoting McCarthy v. United States, 394 U.S. 459, 466 (1969)). 17 A statement by the defendant and his attorney that they discussed the nature of the charge is also insufficient to satisfy Rule 11(c), because "vague references to Discussion of `the charges' and `the nature of the charges' does not provide a complete record showing compliance with Rule 11(c)." Smith, 60 F.3d at 598.5 Smith also held that a provision in the plea agreement stating the acts the defendant must have committed in order to be found guilty of the crime charged cannot cure the failure to describe the nature of the charges in open court where that provision of the plea agreement was not "recited or even referred to in the plea proceeding." Smith, 60 F.3d at 599. Likewise, in Portillo-Cano's plea proceeding no mention was made of what acts he must have committed in order to be found guilty of either charge, and the plea agreement also did not contain such statements. Furthermore, assurances that at some point outside of the plea agreement the defendant was informed of the nature of the charge cannot cure the Judge's failure to do so in open court. Smith, 60 F.3d at 599 (quoting United States v. Kennell, 15 F.3d 134, 136 (9th Cir. 1994) ("reading of the plea agreement is no substitute for rigid observance of Rule 11.")). 18 Smith also establishes that the failure to identify the nature of the charges is not harmless error pursuant to Rule 11(h). The omission to identify and explain the crime is "fundamental." Smith, 60 F.3d at 599. We recently held that "[a]ny deviation from the requirements of Rule 11 is reversible unless the government demonstrates that it was `harmless.' " United States v. Odedo, 154 F.3d 937, 940 (9th Cir. 1998) (quoting United States v. Lyons, 53 F.3d 1321, 1322 n.1 (D.C. Cir. 1995)).6 In the absence of "anyreference at the plea hearing to the charge or its nature, we can assume nothing more than total ignorance of the charge on the part of [the defendant]." Smith, 60 F.3d at 600. 19 The trial Judge in this case did identify the two crimes: conspiracy and use of a firearm during a drug trafficking crime. 20 The Judge did not, however, discuss the elements of these crimes in order to demonstrate on the record that the defendant understood the nature of the charges. See Kamer, 781 F.2d at 1384 (failure to read indictment and explain nature of offense violated Rule 11) (citing Irizarry v. United States, 508 F.2d 960, 965-66 (2d Cir. 1974) ("trial Judge should at least set out the bare bones elements of the offense.")). V. CONCLUSION 21 Because Portillo-Cano's plea allocution did not include a description of the nature of the charges, including an application of the law to the facts, we find that this plea did not conform to the requirements of Fed. R. Crim. P. 11(c)(1) and that defendant's right to appeal was not waived. Accordingly, we VACATE the conviction and REMAND for further proceedings consistent with this opinion. VACATED and REMANDED NOTES: * The Honorable Jane A. Restani, Judge of the United States Court of International Trade, sitting by designation. 1 Pursuant to 18 U.S.C. S 3742(c)(1) (1994) the defendant waives his right to challenge on appeal a sentence imposed pursuant to a plea agreement that "includes a specific sentence under rule 11(e)(1)(C)." 2 The district court appears unintentionally to have reversed the sentences for Counts 1 and 4. Count 4 is the count under which the statute requires that a consecutive 60-month sentence be imposed. See 18 U.S.C. S 924(c). 3 In Bruce, we found that a statement that defendant was pleading guilty to "conspiracy to manufacture methamphetamine " was a "brief, vague explanation [that] in no way satisfied the requirements of Rule 11(c)(1)." Bruce, 976 F.2d at 559. 4 The prosecutor, instead of the Judge, may explain the nature of the charges, Smith, 60 F.3d at 597 (citing United States v. Sharp, 941 F.2d 811, 816 (9th Cir. 1991)), but in both Smith and Portillo-Cano's case, there was no explanation of the charges by either the Judge or the prosecutor. There was also no mention of the indictment, or a waiver of the reading of the indictment, during Portillo-Cano's Rule 11 colloquy. 5 In Smith we recognized that under an earlier version of Rule 11(c), it was sufficient for the Judge to ascertain that the defendant and his attorney had discussed the nature of the charges, because the pre-1974 version of the rule did not require that the trial Judge inform the defendant in open court of the nature of the charge. See Smith 60 F.3d at 598 (citing United States v. O'Donnell, 539 F.2d 1233, 1236 (9th Cir. 1976); Guthrie v. United States, 517 F.2d 416, 418 (9th Cir. 1975)). 6 Prior to the 1975 amendments to Rule 11, any noncompliance with the rule was reversible error. See McCarthy, 394 U.S. at 468-69; Odedo, 154 F.3d at 940 (discussing McCarthy and amendments to Rule 11 in 1975). Rule 11(h) "makes no change in the responsibilities of the Judge at Rule 11 proceedings, but instead merely rejects the extreme sanction of automatic reversal." Odedo, 154 F.3d at 940 (quoting Advisory Comm. Notes to Fed. R. Crim. P. 11(h), 1983 Amendment).
{ "pile_set_name": "FreeLaw" }
Synthesis and cytotoxicity evaluation of biaryl-based chalcones and their potential in TNFα-induced nuclear factor-κB activation inhibition. A series of biaryl-based chalcones were designed as a combination of the natural chalcone and biphenyl moieties, and synthesized by two step chemistry involving Knoevenagel reaction and microwave assistant Suzuki coupling. Sulforhodamine B (SRB) assay was performed to evaluate the cell viability inhibitory abilities of these compounds against five cancer cell lines (A549, CNE2, SW480, MCF-7, and HepG2) from different tissues. Their Nuclear Factor-κB (NF-κB) nuclear translocation inhibitory activities were further investigated by High Content Analysis (HCA) based assay. Most of the compounds showed moderate to strong anticancer and NF-κB nuclear translocation inhibition activities and potent compounds were found.
{ "pile_set_name": "PubMed Abstracts" }
Q: Issue of convertHtml data missing Have you guys faced the data loss after converted HTML to pdf? Here is my problem. $scope.current.clause_note = '<ul><li>This is for testing <strong>TINTERIOR WORKS</strong></li></ul><p><br></p>' $scope.current.clause_note = self.convertHtml($scope.current.clause_note); The result remained the TINTERIOR WORKS strong parts and other tags were missing. How to ensure all the contents convert to pdf without data loss? A: Use $sce as shown below. var app = angular.module('myApp', []); app.controller('MyController', function MyController($scope, $sce) { $scope.current = '<ul><li>This is for testing <strong>TINTERIOR WORKS</strong></li></ul><p><br></p>' $scope.current = $sce.trustAsHtml($scope.current); }); <script src="https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.7.5/angular.min.js"></script> <div ng-controller='MyController' ng-app="myApp"> <div ng-bind-html="current"></div> </div>
{ "pile_set_name": "StackExchange" }
Bar Raid At Alamo Leather Contest Edit by Vonn Tramel 3:48pm 2/7/16: Dave Rhodes and I have spoken with Event Producer Steven Parker, who informed me that "TABC told me during their "raid" that we (the event) did nothing wrong and they were going after the bar." /end edit Original Post: Attendees of The 2016 Alamo Leather Contest will certainly never forget! Late Saturday evening, at approximately 1030, just a few minutes prior to the announcement of The Alamo Leather Contest’s Winners bar staff swept through the Mad Marlin’s basement and parking lot. They were instructing customers in the basement to finish their drinks and instructed to dump their drinks if they were in the parking lot. Soon thereafter contest producers abruptly announced Mr. Alamo Leather 2016 Shawn Fox and Alamo Bootblack 2016 Sugar Bear. At this time the Texas Alcoholic Beverage Commission and San Antonio Police Department proceeded to raid the north side establishment. It was announced at the beginning of the raid that persons with faces not matching their photo ID could be ticketed and or arrested. Members of the Sisters of Perpetual Indulgence and the event’s emcee bolted from the establishment. The neighborhood watering hole has been described by Website My San Antonio as a fun, unpretentious addition to the neighborhood who is valiantly trying to set itself apart. According to International Ms Olympus Leather 2016 boo, “that describes the bar, its owner and management to the Tee”. She went on describing the bar as completely accepting of all folks just wanting people to have a good time. “The bartenders were asked to dress in fetish wear and seemed to have fun with the evening. During an auction for Project H.O.T. An HIV outreach program, the bars owners announced that they would match each bid. We do not yet know if, any arrests were made or if this raid was related to an incident in December during which a young man and a young woman were shot after an incident occurred in the parking lot at the bar. We have reached out to both the bar and San Antonio information officers, but do not have any more information at this time. ______ Update can be found here
{ "pile_set_name": "OpenWebText2" }
Simplify 6*(sqrt(11) + sqrt(176))*-3 + (0 + sqrt(396) + -4)**2. -138*sqrt(11) + 412 Simplify ((sqrt(15)/sqrt(5))**2 + -3 - sqrt(3)) + sqrt(9)/sqrt(75). -4*sqrt(3)/5 Simplify -4*((0 + sqrt(605) + 1*sqrt(605))**2 + sqrt(605) - (-2 + -1*sqrt(605) + sqrt(605))). -9688 - 44*sqrt(5) Simplify 2 + (((sqrt(38) - (sqrt(342) - sqrt(38) - sqrt(38)))*4)/sqrt(2))**2. 2 Simplify 2*(3 + 0 + sqrt(252) + 4)**2. 168*sqrt(7) + 602 Simplify (sqrt(76) + sqrt(76)*3 + 1)**2. 16*sqrt(19) + 1217 Simplify (-2*-2*-5*sqrt(363)*-1)**2. 145200 Simplify (sqrt(88)/(3*sqrt(8) + sqrt(8) + sqrt(8)))**2 - 2*sqrt(11)*-2. 11/25 + 4*sqrt(11) Simplify (-1*sqrt(30)*6)/(sqrt(24)/(sqrt(16)/sqrt(4) + sqrt(4))). -12*sqrt(5) Simplify ((sqrt(68) + -1 - sqrt(68))*-4)**2. 16 Simplify sqrt(13) + 4 + sqrt(325) + sqrt(1872). 4 + 18*sqrt(13) Simplify 2 + ((sqrt(27) - sqrt(3))*1 - (sqrt(108) + 4))**2. 32*sqrt(3) + 66 Simplify ((sqrt(120)/sqrt(4)*-3)/sqrt(10))**2 + -3. 24 Simplify ((sqrt(102) + (sqrt(102) - -1*sqrt(102)) - sqrt(102))*3)/(sqrt(54)/(sqrt(144) - sqrt(9))). 18*sqrt(17) Simplify (sqrt(3) - (3*(sqrt(3) + 1*sqrt(3) + sqrt(3)))**2) + (sqrt(147) + sqrt(147)*2)**2. sqrt(3) + 1080 Simplify -1 + 1 + sqrt(7) - (0 + sqrt(175)). -4*sqrt(7) Simplify 5 + 3 + (2*sqrt(11))**2. 52 Simplify 0 + (2*sqrt(1331) - (5 + sqrt(11)*1))**2 + 4. -210*sqrt(11) + 4880 Simplify ((sqrt(60) - 2*sqrt(1500))/((sqrt(108)*-1)/sqrt(9)))**2. 405 Simplify -2*((sqrt(13) - (0 + sqrt(13))) + 3). -6 Simplify (0 + (2*sqrt(242)*5 - sqrt(242) - sqrt(242)) + 5)**2. 880*sqrt(2) + 15513 Simplify (4 + sqrt(162)*3 - 6*-2*sqrt(162))**2. 1080*sqrt(2) + 36466 Simplify ((sqrt(480) + sqrt(480)*-1)/sqrt(12))/sqrt(8). 0 Simplify (-5 + -1*sqrt(2205) + (sqrt(2205) + (sqrt(2205) + 0 - sqrt(2205)))*-6)**2. 1470*sqrt(5) + 108070 Simplify -1 + ((sqrt(2160) - (-2*sqrt(2160) - sqrt(2160)))/sqrt(12))**2. 2879 Simplify sqrt(85)/(sqrt(30)/sqrt(54)). 3*sqrt(17) Simplify (sqrt(17) + sqrt(85)/sqrt(5) + 0 - (2 + sqrt(17))*6)**2. 96*sqrt(17) + 416 Simplify sqrt(114)/(sqrt(6) + (sqrt(18)/sqrt(3) - sqrt(6))) - (-1 + sqrt(1900)) - (1 + sqrt(1539))**2*3. -4619 - 63*sqrt(19) Simplify (sqrt(22) + sqrt(22) + (sqrt(1408) - sqrt(1408)*1))/(sqrt(162)*-2) + 4. -sqrt(11)/9 + 4 Simplify (3*sqrt(102)*-1)/(sqrt(6) + (sqrt(72) - (sqrt(72) + -3*sqrt(72) - sqrt(72)))/sqrt(12)). -3*sqrt(17)/5 Simplify 3*(5 + (sqrt(4)/sqrt(2)*-6 + sqrt(2) - sqrt(2)) + 3). -18*sqrt(2) + 24 Simplify (((sqrt(66) + sqrt(66) + (sqrt(66) - ((1*sqrt(66) - sqrt(66)) + sqrt(66) - sqrt(66))))*5)/sqrt(6))**2. 2475 Simplify sqrt(30)/sqrt(6) + -3 + ((sqrt(50)*-3)/sqrt(10))**2. sqrt(5) + 42 Simplify (sqrt(132) - (sqrt(132) - (-5*-2*sqrt(132) + sqrt(132))))/(sqrt(24)/(sqrt(32) + sqrt(2))). 55*sqrt(11) Simplify (sqrt(320) - (-1 + sqrt(320)*1))*-6. -6 Simplify (sqrt(672)/(2*sqrt(12)))/(sqrt(72)/(sqrt(18)/sqrt(2))). sqrt(7)/2 Simplify sqrt(14)/(sqrt(1078)/sqrt(11)). sqrt(7)/7 Simplify (2*sqrt(80))**2 + sqrt(80) + -4. 4*sqrt(5) + 316 Simplify (sqrt(55)/(sqrt(5) - sqrt(5)*-2) - (1 + sqrt(704))) + 1. -23*sqrt(11)/3 Simplify sqrt(27)/(sqrt(9) + (2*sqrt(81) + sqrt(81))/sqrt(9)). sqrt(3)/4 Simplify 2*((3 + sqrt(3) - sqrt(3)) + sqrt(3))**2 - (sqrt(3)*-4 + -3). 27 + 16*sqrt(3) Simplify ((sqrt(72)*-2)/sqrt(4))/(-3*sqrt(24)). sqrt(3)/3 Simplify (((sqrt(102) - 4*-1*sqrt(102)) + sqrt(102))/sqrt(6) + 3)*2. 6 + 12*sqrt(17) Simplify sqrt(33)/(sqrt(9)/sqrt(3)) - (3*sqrt(99))**2. -891 + sqrt(11) Simplify -5 + (sqrt(400)/sqrt(8))/sqrt(10). -5 + sqrt(5) Simplify (sqrt(44)/(2*sqrt(4) + sqrt(4)))**2 + sqrt(11) + sqrt(176) + 4. 47/9 + 5*sqrt(11) Simplify sqrt(45)/(sqrt(36)/sqrt(4)) + -1 + sqrt(5) + -5. -6 + 2*sqrt(5) Simplify 2 + (-6*sqrt(11)*-2)**2. 1586 Simplify (2 + sqrt(847) + -4)**2*3. -132*sqrt(7) + 2553 Simplify (1 + (sqrt(832) - (3*sqrt(832) + -2)))**2. -96*sqrt(13) + 3337 Simplify -4 + sqrt(192)*1. -4 + 8*sqrt(3) Simplify (-3*sqrt(104)*-1)/(sqrt(512)*-1). -3*sqrt(13)/8 Simplify ((6*sqrt(130)*-1)/((-2*sqrt(490) - sqrt(490) - sqrt(490)) + sqrt(10))*5)**2. 1300/81 Simplify sqrt(76)/(sqrt(196) - sqrt(196)*-2). sqrt(19)/21 Simplify (sqrt(117)*2)**2 - (sqrt(1872)*-2)**2. -7020 Simplify -5*sqrt(17)*2*-6. 60*sqrt(17) Simplify (sqrt(288)/sqrt(288))/sqrt(12). sqrt(3)/6 Simplify 2*(sqrt(1900) + 1) - 2*(-1 + sqrt(1900)). 4 Simplify sqrt(2448)*-2 + sqrt(2448) + -2. -12*sqrt(17) - 2 Simplify 6*(-4 + (sqrt(99) - (sqrt(99) - (1 + sqrt(99) + -2)))). -30 + 18*sqrt(11) Simplify (sqrt(1872)*1*-2*-3)**2. 67392 Simplify 2*sqrt(5)*-3 - -6*sqrt(15)/sqrt(3). 0 Simplify (3*(sqrt(88) + sqrt(88) + sqrt(88) + sqrt(88)*1 + sqrt(88)))/((sqrt(24) + sqrt(120)/sqrt(5))/sqrt(3)). 15*sqrt(11)/2 Simplify sqrt(56)/(sqrt(200)*-2). -sqrt(7)/10 Simplify sqrt(104)/(-4*sqrt(8)*2). -sqrt(13)/8 Simplify (sqrt(77) + sqrt(77) + -2*(sqrt(77)*-2 + sqrt(77)) + sqrt(77) + sqrt(77))/(sqrt(28)*3 - sqrt(7)). 6*sqrt(11)/5 Simplify (-3*sqrt(2) + 5 - 3*sqrt(162))**2. -300*sqrt(2) + 1825 Simplify 2 + sqrt(102)/((sqrt(42) - sqrt(42)*-1)/sqrt(7)). 2 + sqrt(17)/2 Simplify -1*((-1*sqrt(99))**2 - sqrt(99)). -99 + 3*sqrt(11) Simplify ((sqrt(10) + -2*(sqrt(10) - sqrt(30)/sqrt(3)))/(sqrt(162)*2))**2. 5/324 Simplify (sqrt(190)/(sqrt(40)/(5*sqrt(4))))**2. 475 Simplify ((sqrt(11) + 0)**2 + sqrt(11) + 1 - sqrt(704)*-2) + (-4 + (sqrt(11) - (sqrt(11) + sqrt(44)/sqrt(4) + sqrt(11)))**2)*5. 17*sqrt(11) + 212 Simplify (-4 + -2 + sqrt(19))*-6*2. -12*sqrt(19) + 72 Simplify (sqrt(3)*2*-1 + 2 + -2 + sqrt(3) + sqrt(3))**2. 0 Simplify 3 + (sqrt(75) - (sqrt(75)*1)**2). -72 + 5*sqrt(3) Simplify (-2*3*sqrt(300) + 0)**2. 10800 Simplify 3 + (sqrt(32)/sqrt(4) - sqrt(8))**2 + 4*sqrt(2)*-1. -4*sqrt(2) + 3 Simplify -2 + sqrt(128)*2. -2 + 16*sqrt(2) Simplify (0 + (sqrt(171) + 1)**2 - sqrt(171) - sqrt(171) - sqrt(171))*-3*-2. -18*sqrt(19) + 1032 Simplify 5 + sqrt(176) + 3. 8 + 4*sqrt(11) Simplify -3*(-3 + (sqrt(17) + 1 - sqrt(17)) + 5). -9 Simplify -2*(-1*sqrt(3)*-4)**2. -96 Simplify (sqrt(108)*2)/(-6*sqrt(9)*1). -2*sqrt(3)/3 Simplify (sqrt(17) + sqrt(204)/(sqrt(36)/sqrt(3)))*-2. -4*sqrt(17) Simplify 4 + (sqrt(30)/sqrt(6) - sqrt(5)) + sqrt(40)/(sqrt(8) + 3*sqrt(8)). sqrt(5)/4 + 4 Simplify ((sqrt(42)/sqrt(2))/sqrt(7) - 1*sqrt(363))**2. 300 Simplify (sqrt(156) - (sqrt(156) + sqrt(156) + -1*sqrt(156)*-2))/(sqrt(1200)*1). -3*sqrt(13)/10 Simplify ((sqrt(209) - (sqrt(209)*3 + sqrt(209)) - sqrt(209))*3)/(sqrt(22)/sqrt(2)*2). -6*sqrt(19) Simplify 1*(sqrt(12)/sqrt(4))**2 - (-1*sqrt(243) + sqrt(243)). 3 Simplify 2*-6*(sqrt(80) + sqrt(80) + -2)**2. -3888 + 384*sqrt(5) Simplify 6*(sqrt(605) + 1). 6 + 66*sqrt(5) Simplify (sqrt(20) + sqrt(5))*3*-4. -36*sqrt(5) Simplify sqrt(684)*2 + ((-2*sqrt(152) - sqrt(152))/sqrt(8))**2. 12*sqrt(19) + 171 Simplify -3 + sqrt(76)/(sqrt(4) - sqrt(16)) + sqrt(38)/(sqrt(2) + (sqrt(32) - sqrt(2) - sqrt(2))) + sqrt(19). -3 + sqrt(19)/3 Simplify sqrt(2) - (5 + sqrt(2)*-2) - sqrt(22)/sqrt(176). -5 + 11*sqrt(2)/4 Simplify (sqrt(76)/sqrt(100))**2 + 5 + sqrt(76). 144/25 + 2*sqrt(19) Simplify (sqrt(7) - sqrt(42)/sqrt(6))*-5 - (3 + sqrt(252)). -6*sqrt(7) - 3 Simplify sqrt(42)/(sqrt(216) + sqrt(6) + sqrt(6)). sqrt(7)/8 Simplify -1*-4*(-3*sqrt(304) + (sqrt(19) + 1)*5)**2. -280*sqrt(19) + 3824 Simplify sqrt(119)/(sqrt(7) - sqrt(42)/sqrt(6)*-1)*-3. -3*sqrt(17)/2 Simplify -1*(sqrt(2)*2 + sqrt(2)) + -3 + (sqrt(18))**2. -3*sqrt(2) + 15 Simplify (sqrt(5) - (sqrt(15)/sqrt(3) + -4))**2 + (5 + sqrt(20))**2. 20*sqrt(5) + 61 Simplify 1 + sqrt(49)/(sqrt(112) + (2*sqrt(112) - sqrt(112))). sqrt(7)/8 + 1 Simplify ((sqrt(24) + -5*sqrt(24))/sqrt(8))**2 + (sqrt(3) - (sqrt(3) + -5*sqrt(108))). 48 + 30*sqrt(3) Simplify 0 + sqrt(80) + (sqrt(605) + 0)**2. 4*sqrt(5) + 605 Simplify (-2*sqrt(3888))**2 + sqrt(27) - (sqrt(168)/(sqrt(16)/sqrt(2)))/sqrt(7). 2*sqrt(3) + 15552 Simplify sqrt(34)/sqrt(18) - sqrt(544)/sqrt(2). -11*sqrt(17)/3 Simplify ((sqrt(36)/sqrt(2)*-5)/(-2*sqrt(441)))**2. 25/98 Simplify (sqrt(700) + sqrt(700)*2 + 2 - (2 + sqrt(700) + -1))**2 + -1. 40*sqrt(7) + 2800 Simplify (0 + ((sqrt(13) + 4 + 4)**2 - sqrt(13)))*-3. -231 - 45*sqrt(13) Simplify -4 + (sqrt(72) - (-1*sqrt(72)*-2)**2 - sqrt(72)) + -4. -296 Simplify sqrt(24)/(-6*sqrt(588)). -sqrt(2)/42 Simplify (sqrt(96)/sqrt(4))/sqrt(8) + sqrt(300)*6. 61*sqrt(3) Simplify (sqrt(19)*-1*4 - (-4 + sqrt(57)/sqrt(3)) - sqrt(76)/(sqrt(4)*-1 + sqrt(4) + sqrt(4))*-2)**2. -24*s
{ "pile_set_name": "DM Mathematics" }
A fighter taking off from the Chinese aircraft carrier – Source: navi.mil An aircraft carrier that navigating upon the waters between the Japanese islands of Miyako and Okinawa towards the Ocean Pacific Ocean- in what was described as a “exercise of routine” by the president Xi Jinping- ; the construction of the second aircraft carrier- a military program characterized as a State Secret-; a budget of defense that has been increased by fifth time to more than 5 trillions of yens (approximately 42.500 million dollars); and the new images of satellite- that show the installation of a few possible defensive “significant” weapon, including anti-aircraft and antiballistic systems in seven of the artificial islands that Beiging has built in the last years in the disputed West Philippine Sea, show the long increase of the naval expansion of small stone in the region of Pacific Asia. Since Chine revealed in 2015 his strategy of naval expansion, that so much secrecy had aroused, it could have been seen putting in March across a strategy that has taken her to “native rejuvenation”. The above mentioned program reflects the desire of Chine of becoming a maritime power capable of guaranteeing the defense of his shores, but also of assuring the projection of his commercial expansion overseas opposite of the “threats” inevitable. This “threats” are the revisionist policy of Japan, the high level of uncertainty in the peninsula of Korea, the independent movement in Taiwan and Tibet, the new president, Donald Trump, in the White House and the increase of the tensions in the West Philippine Sea for the intervention of the external actors. All this has provoked an increase of the tension and the displacement of the principal military effort of China, from ground forces to sea forces and, by extension, the air forces. Traditionally, China has been exclusively a continental power, basing his strategy in the control of the resources and the territories, having as an advantage the denominated “deeply strategy”, it means, the big territory to controlling, which protects them from a fast invasion. But, for the first time in the last century, China is turning in a maritime power basing his strategy in the control of the routes to assure his supply and his markets and to assure his different enemies far from his shores. In the last year, China has returned to coin the Maoist concept of “active defense” that it consists in the idea of a China must never give the “first blow” but if the “next four”. Therefore, it is possible to see the desire of the current Mandarins to reach the status of regional superpower and global power. In addition, it has chosen to use the heartland strategy that consists of going out of the isolation, which is given when you are a continental power, by means of the access to practicable and like that seas to manage to turn into a Thalassocracy – in geopolitical terms, it would be a question of a power been founded on the control of the sea-. The control of the sea tries safety against the invasions and the distant supplies. This way, a power supported in his bases, ports and islands, prefigures the victory of the network on the territories. On the other hand, we can associate this to the control of the sea routes and the control of the all the fluid elements of the economy (such as the flows of information, workers and the capitals). From this point, the only Thalassocracy nowadays in the world is The United States, being this his major worry because it insists on the patrolling the Pacific Ocean under the pretext of guaranteeing the maritime traffic through his military intensification in the West Philippine Sea. Beyond this polemic, which seems to be clear is, that one must possess not only a China in the highest of the economic world power, but also as military power capable of influencing decisively the world matters. Every day turns out to be more difficult to discuss that the XXI century will be the century of the ascent to the summit of a new China. Just his “internal demon” (the enormous social inequalities, the lack of freedoms and juridical safety, the monopoly of the incontestable power of the PCC and the territorial tensions) can stop the above mentioned ascent.
{ "pile_set_name": "Pile-CC" }
If you own one of Apple’s Retina MacBook Pros (from 2012–2015, which is the model before the newest, Touch Bar-equipped iteration), then you know that they’re not exactly meant to be taken apart once you’ve bought one. Most parts are attached directly to the logic board, and the battery is particularly hostile to user replacement. The entire unit is physically glued in place with some industrial adhesive. Still, the good folks over at iFixit believe that everyone should be able to repair, replace, and upgrade the gadgets that they own, and they’ve spent some serious time and effort coming up with a way to allow Retina MacBook Pro users to replace their batteries, allowing them to dramatically extend the usable lifespan of their laptops. The end result is the company’s new Battery Replacement Kits for 2012–2015 Retina MacBook Pros, which cost between $89.95 to $109.95, depending on your particular model. The kit comes with all the parts and instructions you’ll need to resurrect your aging MacBook Pro. The catch is that the process of actually replacing the battery isn’t exactly what you’d call simple. The location of the battery makes heating up the glue to weaken it unfeasible. (Remember: fire + batteries = bad.) So iFixit had to take a slightly more ridiculous-looking approach: it developed a chemical solvent that can dissolve Apple’s adhesive so you can remove the old battery successfully. It’s an impressive workaround. As iFixit notes, even Apple doesn’t remove the entire battery for in-house repairs, instead the company just replaces the whole piece of the case that the battery is attached to. Even with the kit and iFixit’s detailed instructions, battery replacement isn’t for the faint of heart. But if your MacBook Pro’s battery has been giving you issues and you don’t mind the extra effort, then grab your screwdriver, plastic pry bar, and your trusty syringe and get to work.
{ "pile_set_name": "OpenWebText2" }
Letter: Since the initial report of infection with the coronavirus disease 2019 (COVID-19) in December 2019, the number of confirmed COVI-19 cases has exceeded 1.6 million globally.[@bib1] Without a vaccine in sight and given the success of social distancing, we expect the outbreak to last longer than originally projected. Social distancing while at work remains a challenge of us all. Mid-March, we implemented separate call teams, so that each of us only comes into contact with 4 to 5 coworkers at maximum over the course of the pandemic. These changes are necessary to maintain the workforce required to continue to be able to provide mechanical thrombectomy (MT) for our patients. Every stroke care system must prepare for the worst-case scenario involving a surge that completely overwhelms the capacity of that system to function. Over the last several weeks, we have been learning from our colleagues around the nation---first, news out of Seattle and then New York City, and now most recently from Detroit, with greater than 800 providers testing positive for COVID-19 at Henry Ford. With approximately 25% of health care providers being infected with the virus, we are faced with the challenge of providing the care our patients desperately require while ensuring the safety of our health care providers.[@bib2] We must be mindful that our selfless tendencies as dedicated frontline providers do not become our biggest vulnerability. This challenge requires that we adjust our mindset and also place at the forefront the safety of ourselves and our teams. We make up one of the smallest and most subspecialized units in our hospitals. As such, we are easily incapacitated with quarantine or illness; who will take care of our community then? This safeguarding requires major changes to our pre-COVID-19 workflow, to which the current pandemic has added multiple layers of complexity. Engagement of multiple specialties, including emergency department (ED) physicians, stroke neurologists, anesthesiologists and neurointensivists, is required. Fears and anxieties are normal human responses to a pandemic, and each must be acknowledged and addressed, never dismissed. In the acute stroke setting, the stakes are greatest because every minute counts. Although it may seem that there is not enough time to get it right, we must remember that this is also no time to get it wrong. That could mean being placed on diversion and not having the capacity to continue to treat our patients with stroke. It begins with not overly burdening an already-tenuous hospital system. In the current COVID-19 crisis, there is critical bed shortage at greater level of care hospitals. We must therefore reduce the number of "futile transfers" from community hospitals and ensure that only patients who are likely to receive MT are transferred to the thrombectomy-capable center. Turning down a transfer could be the difference between being able to accept the next. This will entail obtaining advanced imaging at spoke hospitals to confirm the presence of proximal large vessel occlusion (LVO) before transport. Patients ruled out for LVO can remain at the spoke for routine care, even those who receive intravenous thrombolysis, particularly those spokes that are primary stroke center certified. Even for patients in whom an LVO is confirmed, the criteria for transfer to the thrombectomy capable center should be decided on by a multidisciplinary team. During a pandemic and in the context of bed shortages, plus the prospect of bringing in vulnerable patients into an environment in which they might have a greater likelihood of acquiring the virus, hard decisions must be made. Accept the hard truth that your center should be more stringent in your criteria for MT, particularly for patients who don\'t fall within the guideline recommendations. As a team, discuss how you will handle those falling outside the "trial criteria"---very elderly patients, patients with mild, yet disabling stroke symptoms, and patients with distal occlusions. Only patients with a high likelihood of receiving thrombectomy should be transferred. Once the patient with LVO who is an MT candidate arrives to your ED, all teams must be in alignment. Pre-thrombectomy screening for COVID-19 is a major challenge; often these patients are unable to provide a history and collateral information is typically lacking. The Society of NeuroInterventional Surgery currently recommends that patients with unknown COVID-19 status should be screened for fever and respiratory symptoms.[@bib3] Given that approximately 35% of patients with COVID-19 are asymptomatic and the growing awareness that asymptomatic patients are able to transmit the virus, this screening might not be sufficient.[@bib4] It may therefore be prudent to consider is to obtain a computed tomography (CT) scan of the chest to evaluate for underlying infiltrates at the time of obtaining a CT angiogram and perfusion. Although extending the CT to capture the entire chest entails additional radiation, identifying a lung infiltrate suggestive of likely COVID-19 infection in an asymptomatic patient affords the health care team the ability to don the proper precautions before the procedure. Another question that has sparked major debate is whether to intubate patients before MT. Some proponents of an "intubate-all" approach argue that it protects the small and highly specialized MT team from exposure. Although all valid points, this approach fails to consider the other facets and team members along the way. Thrombectomy in and of itself is a low-risk procedure for contracting the virus, whereas the intubation and extubation are by far the greatest-risk components and would incur additional risk to your ED and neuro-intensive care unit (ICU) colleagues, respectively. In addition, intubating an elderly patient adds morbidity, and the airway management would require negative-pressure rooms in both the ED and the neuro-ICU. These are resources expected to be either in very short supply or not available at all during peak surge. The lowest-risk pathway to the system as a whole is to get the LVO patient through the thrombectomy awake and cooperative without requiring pre-procedure intubation. However, the greatest potential risk to both the anesthesia and MT teams is in the event the thrombectomy unexpectedly transforms into an aerosol-generating procedure. A patient coughing or vomiting mid-procedure, would entail the worse possible scenario not just by the greatest-risk exposure to the providers but also in the delay it would incur. Neuroangiography suites are positive-pressure rooms (exceptions would be hybrid angio/operating room suites), necessitating a clearing out of the room by personnel following an aerosol-generating procedure like an intubation. Thus, the "lowest-risk" pathway is not necessarily the safest. Finding the balance of risk to patient versus provider and resource use (negative-pressure rooms and personal protective equipment \[PPE\]) is delicate, and the decision of which patient should undergo preprocedural intubation is not straightforward. The Society of NeuroInterventional Surgery recommends a lower threshold for intubation for patients with suspected COVID-19, however, without specific criteria for intubation.[@bib3] We suggest that those patients at risk for converting an otherwise non--aerosol-generating procedure (thrombectomy) to a greater-risk procedure due to airway compromise should be intubated before MT. These would include those with severe stroke symptoms, patients with receptive aphasia, any signs of respiratory distress, or vertebrobasilar occlusion should be intubated before MT. Intubation ideally takes place in a negative-pressure room in the ED. Patients should then be transferred to the ICU with the same ventilator so that a closed circuit can be maintained. The emergence of a faster COVID-19 test that provide results within minutes will provide us with a more efficient and reliable way to rapidly triage patients with LVO and avoid unnecessary intubations. However, until that test becomes widely available, following vigilant screening and maximizing precautions will be of paramount importance to protect our health care providers. Another consideration is modification to your angio-suites for team protection. At our center, we have designated one of the biplanar rooms a "COVID-19" room, in which patients with suspected or confirmed COVID-19 receive MT. The door to this room has been sealed off, making it impermeable to aerosolized particles to completely isolate it from the control room. We have rehearsed an elaborate protocol to deliver additional supplies and devices into that room should they be needed via the hallway, as well as donning/doffing of PPE for room entry/exit protocol. Due to staff and PPE shortages, only essential personnel should be allowed into the COVID room during the procedure. This means that only one nurse, one technologist, the interventionists, and anesthesiologist are the only staff member to be in the room. Once the procedure is finished, patients are transferred to the ICU, where they are extubated in a negative-pressure room. Remarkable challenges lie ahead of us, but we remain optimistic knowing that our field is graced with tremendously devoted, talented, and innovative people. Our solutions may not always be perfect, but these are also imperfect times, and we may have to do the best with what we can. However, one certainty remains: on reflecting back on these unprecedented times, it will be known that we answered the call for our patients.
{ "pile_set_name": "PubMed Central" }
Q: Android Bulk insert Or Update rather then insertOrReplace My Problem: I m working on an Android application (using SQLite) where I have to fetch a lot of data from a server and store it to DB. Currently, I m getting a list from the server, Loop over it and inserting it into DB one by one. But before every record insertion, I m checking if it already exists in DB. If does then I update that record. This is happing across the application ( My app have over 50 tables ). Now a week ago I noticed this process taking extra time. I mean we got a list from the server, we loop through it and run two queries for each record ( One to check whether it already exist or not and one is for insert or update). Now I need to optimise it. I know about batch insertion and I'm thinking about inserting all records at once. But there's a problem in it. I need to check if the record already exists in DB or not. If yes then update else insert. I know about insetOrReplace but it does not serve my purpose. I need to update some specific records rather than replacing everything (in the case of data already in DB and filled by the user from the app locally). So what would be the solution of it? Do I have to check which records already exists in DB by one query then run one query to update the records and one to insert remaining? But it still three queries? Can it be solved by one query only? Or any other solution? A: After two days of work. I finally found a solution. Which increase process speed more than 35%. Also, this technique helps my case (insert If not exist else update). SQLite has method insertOrIgnore. As name refer, it inserts the record or ignores it (on primary Key). So for the first part. insert or ignore into contact ( _id , cntct_id ) ) values ( COALESCE ( ( Select _id from contact where _id = '10' or cntct_id = '46' ) ,null ), '46') ; Now, this insert check, if primary key _id already exists it will ignore the insertion. Here is the other part. Which will update the record? Update contact set cntct_id = '46' ,_id='10' , where _id = 10 or cntct_id = '46'; So I generate 30 queries like these (create a single String which holds all of these) and run it using SQL Batch insertion. Like this SQLiteStatement statementAdd = database.compileStatement(addQuery); statementAdd.execute(); One thing to consider here while doing this. Once a record is inserted it will update ( with same values ) as well ( A little overhead but in the case of ignore it works perfectly. Hope it helps.
{ "pile_set_name": "StackExchange" }
Tuatha Traits Though the tuatha bloodlines are varied, they are all linked by their fey blood. Your tuatha character has several traits in common with all other tuatha. Ability Score Increase. Your Dexterity score increases by 1. Age. Tuatha mature at the same rate as humans and reach maturity in their late teens. However, they can live much longer than humans do, up to 250 years. Alignment. The tuatha prefer to live by their own rules, and as such are often chaotic. Their temperaments can vary wildly, just like the heroes and villains of a storybook. There are just as many good tuatha as there are evil. Size. Tuatha stand at about the same height as humans, ranging from 5 to 6 feet tall. Your size is Medium. Darkvision. Due to your fey blood, you can easily see in dark and dim conditions. You can see in dim light within 60 feet of you as if it were bright light, and in darkness as if it were dim light. You can’t discern color in darkness, only shades of gray. Shapechanger's Physique. You are proficient in your choice of the Acrobatics skill or the Athletics skill. Beast Shape. You can use your action to magically transform into a Tiny beast of Challenge Rating 0 that does not have a flying or swimming speed. You can remain in this form indefinitely, and can revert to your normal form as a bonus action, and automatically revert to your natural form when you are rendered unconscious. While you are transformed in this way, your game statistics are replaced by the statistics of your chosen form, but you retain your current and maximum hit points, as well as your alignment, personality, and Intelligence, Wisdom, and Charisma scores. You also retain each of your skill and saving throw proficiencies, unless the form you assume already has proficiency in that skill or saving throw. You can’t cast spells, and your ability to speak or take any action that requires hands is limited to those actions your chosen form may take. You retain the benefit of any features from your class, race or other source and can use them if your current form is physically capable of doing so. When you transform, you choose whether your equipment and anything you are carrying falls to the ground or merges into your new form. Any equipment that merges into your new form has no effect until you leave that form. Languages. You can speak, read, and write Common and Sylvan. Subrace. Though the tuatha are borne from ancient lineage, over the ages three bloodlines have emerged: selkies, swanmays, and the storied. Choose one of these subraces. Selkie As a selkie, you live equally between the land and sea. Tougher than most tuatha, you can transform into aquatic creatures. Selkies are sometime sought after by sailors and fisherman, as they are seen as good luck. As such, many selkies search out remote islands and beaches to make their home in peace. However, some adventurous selkies travel the roads and the tides of the world to experience all its wonders. Ability Score Increase. Your Constitution score increases by 2. Natural Swimmer. You can hold your breath for a number of minutes equal to your Constitution score. Additionally, you have advantage on Athletics checks made to swim. Seal Skin. Whenever you finish a long rest, you gain temporary hit points equal to your level. Beasts Beneath the Waves. When you use your Beast Shape feature to transform into a beast, you can assume the form of a Tiny beast with a swim speed, or the form of a seal.
{ "pile_set_name": "OpenWebText2" }
1. Field of the Invention The present invention relates to a liquid crystal display (LCD) device, and more particularly, to an LCD device with reduced thickness and bezel width. 2. Discussion of the Related Art LCD devices display an image by using thin film transistors (TFTs) as switching elements. The LCD devices are widely used as display devices for notebook computers, tablet computers, smartphones, portable display devices, and various portable information devices, in addition to televisions or monitors. Since the LCD devices cannot self-emit light, the LCD devices display an image by using light emitted from a backlight unit which is disposed under a liquid crystal display panel. FIG. 1 is a cross-sectional view schematically illustrating a portion of a general LCD device. Referring to FIG. 1, the general LCD device includes a liquid crystal display panel 10, a backlight unit 20, a lower case 30, a guide panel 40, and an upper case 50. The liquid crystal display panel 10 includes a lower substrate 12 and an upper substrate 14 which are coupled to each other with a liquid crystal layer therebetween, and displays an image by using light emitted from the backlight unit 20. Polarizing films 16 and 18 are adhered to a bottom and top of the liquid crystal display panel 10, respectively. The backlight unit 20 is disposed under the liquid crystal display panel 10, and irradiates light on the bottom of the liquid crystal display panel 10. The backlight unit 20 includes: a reflective sheet 21 that is disposed at the lower caser 30; a light source module 23 that is disposed at one side of the lower case 30, and emits light; a light guide plate 25 that is disposed on the reflective sheet 21, and guides light, which is incident from the light source module 23 onto a light input part, toward the liquid crystal display panel 10; a plurality of optical sheets 27 that are disposed on the light guide panel 25, and enhance a luminance characteristic of light traveling from the light guide plate 25 to the liquid crystal display panel 10; and a light source housing 29 that supports the light source module 23. The light source module 23 includes a light emitting diode (LED) array board 23a and a plurality of LED packages 23b. The LED array board 23a is disposed at a side wall of the light source housing 29 to face the light input part of the light guide plate 25. A plurality of driving power lines, which respectively supply driving power to the plurality of LED packages 23b, are formed at the LED array board 23a. The plurality of LED packages 23b are mounted at certain intervals on the LED array board 23a, and emit light with the driving power supplied from the respective driving power lines to irradiate the light having certain luminance on the light input part of the light guide plate 25. The light emitted from the plurality of LED packages 23b is incident on the light input part of the light guide plate 25, is reflected from and refracted inside the light guide plate 25, and is irradiated on the liquid crystal display panel 10 through the plurality of optical sheets 27 along with light reflected by the reflective sheet 21. The lower case 30 is provided to have an accommodating space. The lower case 30 accommodates the backlight unit 20, and supports the guide panel 40. The guide panel 40 is provided in a tetragonal band shape to the support a bottom edge portion of the liquid crystal display panel 10. The guide panel 40 includes a panel supporting part, which supports the bottom edge portion of the liquid crystal display panel 10, and a guide side wall that is formed vertically to the panel supporting part and surrounds all side walls of the backlight unit 20. The upper case 50 is provided in a tetragonal band shape in order for one side of the upper case 50 to have a ┌-shape, and surrounds a top edge portion of the liquid crystal display panel 10 and all side surfaces of the guide panel 40. As described above, the general LCD device includes a certain gap G that is provided between the bottom of the liquid crystal display panel 10 and a top of the optical sheet 27. This, as illustrated in FIGS. 2 and 3, is for preventing mura from occurring due to interference between elements caused by a bending or twist of the liquid crystal display panel 10, the light guide plate 25, and the optical sheet 27. In particular, the mura mainly occurs due to a contact between the optical sheets 27 and the liquid crystal display panel 10 when moisture penetrates into the gap G at an environment of high temperature and humidity. In order to prevent the mura, the optical sheet 27 and the liquid crystal display panel 10 should be separated from each other by an interval of 1.5 mm to 2 mm, in which case a thickness T of the LCD device increases due to the gap G between the optical sheet 27 and the liquid crystal display panel 10. Moreover, in the general LCD device, the guide panel 40 maintains a constant interval between the optical sheet 27 and the liquid crystal display panel 10 and supports the liquid crystal display panel 10, and the upper case 50 covers the top edge portion of the liquid crystal display panel 10. Therefore, a bezel width W increases due to the guide panel 40 and the upper case 50. For this reason, the general LCD device has a limitation in reducing the thickness T and bezel width W thereof.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Understanding undefined behavior for a binary stream using fseek(file, 0, SEEK_END) with a file The C spec has an interesting footnote (#268 C11dr §7.21.3 9) "Setting the file position indicator to end-of-file, as with fseek(file, 0, SEEK_END), has undefined behavior for a binary stream (because of possible trailing null characters) or for any stream with state-dependent encoding that does not assuredly end in the initial shift state." Does this ever apply to binary streams reading a file? (as from a physical device) IMO, a binary file on a disk is just a sea of bytes. It seems to me that a binary file could not have state-dependent encoding as it is a binary file. I'm fuzzy on the concept of "binary wide-oriented streams" and if that even could apply to disk I/O. I see that calling fseek(file, 0, SEEK_END) on a serial stream like a com port or maybe stdin may not get to the true end as the end is yet to be determined. Thus the narrowing of the question to physical files. [edit] Answer: A concern with older (maybe up to late 1980s). Presently in 2014, Windows, POSIT-specific and non-exotic others: not a problem. @Shafik Yaghmour provides a good reference in Using fseek and ftell to determine the size of a file has a vulnerability?. There @Jerry Coffin discusses CP/M as binary files not always having a precise length. (128-byte records per wiki). Thanks to @Keith Thompson answer for the meat of the answer. Together this explains the specs's "(because of possible trailing null characters)" comment. A: Binary files are going to be sequences of 8-bit bytes, with an exact specified size, on any system you're likely to use. But not all systems store files that way, and the C standard is carefully designed to allow portability to systems with unusual characteristics. For example, a conforming C implementation might run on an operating system that stores files as sequences of 512-byte blocks, with no indication of how many bytes of the final block are significant. On such a system, when a binary file is created, the OS might pad the remainder of the final block with zero bytes. When you read from such a file, the padding bytes might either appear in the input (even though they were never explicitly written to the file), or they might be ignored (even though the program that created the file might have written them explicitly). If you're reading from a non-seekable stream (for example keyboard input), then fseek(file, 0, SEEK_END) won't just give you a bad result, it will indicate failure by returning a non-zero result. (On POSIX-compliant systems, it returns -1 and sets errno; ISO C doesn't require that.) On most systems, fseek(file, 0, SEEK_END) on a binary file will either seek to the actual end of the file (a position determined by exactly how many bytes were written to the file), or return a clear failure indication. If you're using POSIX-specific features anyway, you can safely assume this behavior; you can probably make the same assumption for Windows and a number of other systems. If you want your code to be 100% portable to exotic systems, you shouldn't assume that binary files won't be padded with extra zero bytes.
{ "pile_set_name": "StackExchange" }
[Different steps in construct validation of the Basel Drug and Alcohol Questionnaire (BDA)]. In a first study we developed a test (BDA) for measuring the degree of dependence on alcohol, medicaments and drugs in alcoholics as well as drug addicts. The present study analysed this test according to the principles of construct validity. The aim was to create a test with those items that optimally fulfil some of the following criteria. This was achieved with 22 out of the original 59 items of the test. The shortened test contains those items that optimally differentiate both externally (the addicted population from the rest of the sample: depressives, neurotics and normals) and internally (the degree of dependence). The score obtained with 22 items was more efficacious in differentiating the addicts from the rest of the sample than the total score of 59 items. 86% of the 22 items are sufficiently sensitive to measure changes during hospitalisation in a psychiatric clinic. However only 33% of the 22 items can effectively discriminate between alcohol-, medicaments- und drug-dependence. Intercorrelation and factor analyses with other variables that were also measured indicate that a large part of the variance arises from unspecific "general psychopathology" and only a small part is specific for drug-dependence. The test is sufficiently reliable (rtt = .89), unifactoral, and with clear mean test-item correlation (rit = .54), to justify further investigation. We recommend this 22 items test for scientific research into dependence, in spite of the questions that still remain open. The English version of the 22 items is given in the appendix.
{ "pile_set_name": "PubMed Abstracts" }
Origin of Disagreements in Tandem Mass Spectra Interpretation by Search Engines. Several proteomic database search engines that interpret LC-MS/MS data do not identify the same set of peptides. These disagreements occur even when the scores of the peptide-to-spectrum matches suggest good confidence in the interpretation. Our study shows that these disagreements observed for the interpretations of a given spectrum are almost exclusively due to the variation of what we call the "peptide space", i.e., the set of peptides that are actually compared to the experimental spectra. We discuss the potential difficulties of precisely defining the "peptide space." Indeed, although several parameters that are generally reported in publications can easily be set to the same values, many additional parameters-with much less straightforward user access-might impact the "peptide space" used by each program. Moreover, in a configuration where each search engine identifies the same candidates for each spectrum, the inference of the proteins may remain quite different depending on the false discovery rate selected.
{ "pile_set_name": "PubMed Abstracts" }
Maybe she was jealous of all the attention being focused on Michelle Wolf, so another comedian, Kathy Griffin, picked the White House Correspondents Dinner to corner Trump's Deputy Press Secretary and launch into a foul-mouthed diatribe against him and the president. Then, on a daytime TV show promoting her new stand up comedy tour, Griffin uttered so many expletives that they had to cut her mic — which is pretty incredible considering she was on The View... Remember when Griffin "apologized" for that "beheaded Trump" picture? She says now she takes that back.
{ "pile_set_name": "OpenWebText2" }
VIDEO: National prize for Southwick school Glebe Primary School has won the Royal Society’s Young People’s Book Prize 2017 video competition with a brilliant book review film featuring its Chatterbooks reading group. The Southwick school beat almost 100 other entries and won £500 worth of book tokens. For the annual book prize, an adult judging panel selects a shortlist of six books then the overall winner is selected entirely by young people across the UK, involving schools, science centres, reading clubs, community groups, Scouts and Brownies. The winner of this year’s prize was Home Lab by Robert Winston. The video competition tasked groups involved in judging shortlisted books with making a short video about the experience. The videos were judged on creativity, enthusiasm and production by the Royal Society and chairman of the shortlist judges, Professor Christl Donnelly, from Imperial College London. The videos had to feature each of the books, the children’s opinions and some shots of the children judging the books but the rest was up to them.
{ "pile_set_name": "Pile-CC" }
Malignant mesothelioma in Israel, 1961-1992. The authors monitored time trends in the incidences and distributions of malignant mesotheliomas during 1961-92 in 223 Israeli persons, including 21 men from a cohort of 3,057 asbestos-cement workers (83,122 person-years). The annual incidence rates of malignant mesotheliomas in Jewish men ranged between 2.5 per million in 1961-82 and 4.6 per million in 1985-92. The male-to-female incidence ratio rose from 1.2 in the 1960s to 2.9 during 1985-92, as a result of increases in risk among Israeli-born males. Females accounted for 37.6% of all cases, after exclusion of the cohort of asbestos workers. Of the 223 cases, 202 (91%) had no indication of direct occupational exposure to asbestos. In Jewish females, the incidence of malignant mesotheliomas did not increase after 1961. The mean age at diagnosis in all cases was lowest in the Israeli-born (53.0 years). High levels of asbestos exposure in the 1970s and the relatively early age of onset of the disease indicate that exposure began at a younger age in Israel than in European countries. Asbestos manufacture and use peaked in Israel during the mid-1970s, so the maximum impact of these trends has yet to be seen.
{ "pile_set_name": "PubMed Abstracts" }
Technology evaluation: BL22, NCI. BL22 (RFB4(dsFv)-PE38) is a recombinant Pseudomonas exotoxin-based immunotoxin under development by the National Cancer Institute for the treatment of B-cell malignancies. It is composed of the disulfide-stabilized Fv portion of the anti-CD22 antibody RFB4 genetically fused to a truncated form of Pseudomonas exotoxin A. It has entered phase I trials for the treatment of B-cell lymphoma.
{ "pile_set_name": "PubMed Abstracts" }
Rule Change Could Give Restaurants More Control Over Workers' Tips Enlarge this image toggle caption Francis Dean/Corbis via Getty Images Francis Dean/Corbis via Getty Images Americans are big tippers. Every year, we leave more than $30 billion in tips, mostly in restaurants but also casinos, nail salons and other service businesses. Traditionally, the owners of those businesses have not had much control over how tips are distributed. But a proposed rule from the Trump administration could change that. "This rule has really been pushed by the restaurant industry," said Heidi Shierholz, chief economist for the Labor Department during the Obama administration. "They really want to get control of tips. They've finally found an administration that will do it for them." Restaurant owners are promoting the rule change as a way to address long-standing inequities in pay between servers and kitchen staff. "Cooks historically and even today have always received the short end of the stick in terms of the tip world," said Kurt Huffman, who runs more than two dozen restaurants in Portland, Ore. Kitchen workers in his restaurants earn starting wages of about $13.50 an hour. With tips, servers can earn two or three times as much. Huffman tries to compensate by encouraging servers to share a portion of their tips with cooks and dishwashers. "We've tried to be very, very careful in just communicating the fact to our servers and our bartenders that our kitchen is a critical part of our business," Huffman said. "It is, in fact, the motor that runs the business." He said most servers are happy to comply. "You don't want to be known as the guy or the girl who stiffs the kitchen," he said. "The cooks are going to find out and that's just bad news for you and your table. So there's a certain common sense to it." But under current federal rules, any such tip sharing with kitchen staff must be voluntary, unlike tip pools with busboys and hostesses, which employers are allowed to mandate. As a result, the shared tips add only a few dollars to kitchen workers' pay, and Huffman often struggles to find qualified cooks and dishwashers. If the proposed Labor Department rule goes through, restaurant owners would have more control over tips and could redirect more money to kitchen workers. "I think all of us see this as a way to reallocate the tips a little bit more fairly," Huffman said. "And it's nice from an ownership perspective to feel like finally we have an opportunity to truly decide where these tips go." But critics warn the proposed rule would give restaurant owners too much leeway. "As long as employers pay their workers the full minimum wage, they then take full control over the tips above that, and can do whatever they want to with them, including simply pocket them," says Shierholz, who's now with the Economic Policy Institute, a left-leaning think tank. "The issue that I have with tip pooling is not that I'm sharing the tips," says former waitress Misty Cumbie. "It's that the owner would have control over the tips." "I think in general people assume that the money that they're leaving is for the server or the person behind the counter," Cumbie says. "And definitely not for the owner." Cumbie, who has worked as both a waitress and in the kitchen, agrees that cooks and dishwashers deserve higher pay. But she says that money shouldn't come from the pockets of servers. Cumbie sued a former employer who insisted servers share the bulk of their tips with kitchen staff. The federal court initially ruled against her, finding that employers may take control of tips so long as servers are paid the minimum wage. The Obama administration then issued a rule making it clear that tips belong to the worker who receives them, whether that worker is paid minimum wage or not. The Trump administration is now preparing to reverse that with its own rule. The Labor Department has already received thousands of comments on the proposal. Its final decision may determine who keeps the money you leave as a tip. NPR RAD researcher Jane Gilvin contributed to this story.
{ "pile_set_name": "OpenWebText2" }
Perioral Ruler in Routine Esthetic Surgery: Convenient and Exact. Lip and perioral surgery, like any other esthetic surgery, requires an exact and convenient measurement tool to ensure reliable and reproducible outcomes. Although three-dimensional measuring equipment has proven its effectiveness in measuring facial parameters over the past two decades, it has some drawbacks, including high cost, long scanning times, and non-portability. Thus, digital photography remains the standard tool of measurement in esthetic surgery to date. Many authors have presented evaluation and measurement methods using digital photography in combination with different tools. However, there are no specific tools for the perioral region. Therefore, we devised a specific ruler for perioral measurements. The ruler has differently colored lines for length and angle measurements and a reference point for correct positioning. It can be used in preoperative consultation, intraoperative orientation, and postoperative evaluation.Level of Evidence IV This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266.
{ "pile_set_name": "PubMed Abstracts" }
Ahmadiyya view on Jihad In Ahmadiyya Islam, Jihad is a radical concept. It is primarily one's personal inner and outer struggle for self-purification. Armed struggle or military exertion is only to be used in defense. However, even then it can only be carried out under the direct instruction of a Caliph, purely for the sake of God and the preservation of religion. It is not permissible that jihad be used to spread Islam violently or for political motives, or that it be waged against a government that maintains religious freedom. Political conflicts (even from a defensive stand) over independence, land and resources or reasons other than religious belief cannot be termed jihad. There is a clear distinction, in Ahmadi theology, between Jihad (striving) and qitāl or jihad bil-saif (fighting). While Jihad may involve fighting, not all fighting can be called Jihad. Rather, according to Ahmadiyya belief, qitāl or military jihad is applicable, only as a defensive measure in very strictly defined circumstances and those circumstances do not exist at present. Ahmadiyya claims its objective to be the revival and peaceful propagation of Islam with special emphasis on defending and extending Islam 'by the pen' and by argumentation. Ahmadis point out that as per prophecy, Mirza Ghulam Ahmad (whom they believe to be the promised messiah) rendered Jihad in its military form as inapplicable in the present age since Islam, as a religion, is not being attacked militarily but through literature and other media, therefore the response should be likewise. Spread of faith Ahmadis denounce the usage of a sword or any other form of coercion as a method of the propagation of the Islamic faith. In contrast to some of the commonly held views that historically Islam was spread by force, Ahmadis maintain that early Muslims did not take up the sword in order to spread their faith, but rather for the preservation of religion. In particular, the founder of the movement, Mirza Ghulam Ahmad stated that when Islam began gaining converts upon its birth, there was an ever-increasing tension against the new converts by the pagans of Mecca, which resulted in them being severely persecuted for many years. After many years of patience, the Muslim converts migrated to the neighbouring city of Medina. This did not stop persecuting the Muslims. They were pursued by the Pagans and it was only then that the Muslims first took up the sword in order to defend their lives and preserve the religion. Ahmadis denounce the usage of a sword as an Islamic concept with support from the Qur'an which according to them categorically rejects any form of coercion in religion. The Qur'an states: Terrorism The fourth Caliph, of the Ahmadiyya Muslim Community, Mirza Tahir Ahmad states: See also Jihad Ahmadiyya Militia, an Ahmadiyya self-defense unit during the Partition of India Furqan Force, an Ahmadiyya military unit during the First Kashmir War The British Government and Jihad References External links Concept of Jihad True Meaning of Jihad, compiled by Imam Kalamazad Mohammed; published by the Muslim Literary Trust, Trinidad Category:Ahmadiyya beliefs and doctrines
{ "pile_set_name": "Wikipedia (en)" }
All Saints' Church, Brailsford All Saints’ Church, Brailsford is a Grade I listed parish church in the Church of England in Brailsford, Derbyshire. History The church dates from the 12th century. It comprises a west tower, nave with south aisle, chancel and north vestry. It was restored between 1882 and 1883 when the galleries were removed. The walls and pillars of the church were scraped of plaster and whitewash. The stonework of the doors and windows was cleaned and restored by Mr. Walker of Ashbourne. The pews were removed and oak benches installed. The floor of the nave was relaid with oak blocks and the chancel was laid with Minton encaustic tiles. Parish status The church is in a joint parish with St James' Church, Edlaston St Martin's Church, Osmaston St Michael's Church, Shirley Holy Trinity Church, Yeaveley Memorials Edward Cox (d. 1846) by Hall of Derby Annie Mosse (d. 1868) by Hall of Derby Mary Horsfall (d. 1862) by Hall of Derby Thomas Cox (d. 1842) by Hall of Derby John Boden (d. 1840) by Hall of Derby Anna Palmer (d. 1840) by Hall of Derby William Cox (d. 1900) by Lomas of Derby Roger Cox (d. 1843) and Francis Cox (d. 1853) by J B Robinson of Derby Dorothy Draper (d. 1683) Organ The pipe organ was built by Harrison and Harrison and dates from 1914. A specification of the organ can be found on the National Pipe Organ Register. Bells The church tower contains a peal of 6 bells, with 3, 4, and 5 dating from 1717 by Abraham I Rudhall. The tenor and 2 are from 1816 by William Dobson and the treble is from 1956 by John Taylor & Co. References Category:Church of England church buildings in Derbyshire Category:Grade I listed churches in Derbyshire
{ "pile_set_name": "Wikipedia (en)" }
The reason I'm squinting so much is because my face is fighting the rest of my body 192 shares
{ "pile_set_name": "OpenWebText2" }
Q: How to power a device using a USB port instead of AA batteries? I have a device that uses 3 AA batteries and I would like to power it from a USB port instead. As I understand I will have to use resistors but I have no idea on which ones. I have found the following calculator: Voltage Divider Calculator While it does its work, the wiring shown in diagram is quite confusing: I guess this is some logical schema rather than real wiring schema. Question: What resistor values do I need to get ~3.6V from a 5V USB port, and how should I wire them ? Is there a better way than using resistors to get 3.6V from 5V? A: Resistors will not be the best option, you need to know the source current of the device and there will be large voltage swings if the device changes it's current. Resistors may also not be possible if the device draws large amounts of current. Three alkaline batteries is lower than 4.5V (could be as low as 3.6V when their dead). Since the device running from 3 alkaline batteries should be able to accept 4.5V, a voltage regulator like the might be a good way to ensure that the device is getting the appropriate voltage, however you might need to select one with a lower dropout than 0.5V which might be hard if your device needs more than 100mA. Another option would be to find out if the device already has a linear regulator or switching regulator on the input. If it does, then you might be able to run 5V straight into the device.
{ "pile_set_name": "StackExchange" }
Reliability and reproducibility of a clinical application of a simple technique for repeated circumferential leg measurements. The aim of this study is to determine the reliability and reproducibility of repeated tape measurements to assess the leg circumference during a long period. A tape measure is a simple instrument that is applicable in the presence of oedema. Measurements were performed by four observers on 11 volunteers. Four measurements were done in the first week (short term), a fifth measurement at two weeks (medium term) and a sixth measurement was done at 12 weeks (long term). The short-, medium- and long-term intra-class correlation coefficients for repeated measurements were 0.90, 0.89 and 0.78, respectively. The short-term and long-term reproducibility indices equalled 4.4% and 6.5%. If only a single observer would be involved, the short-term intra-class correlation coefficients would improve to 0.94 (reproducibility index 3.3%). Tape measurements have been proved to be a reliable and reproducible method to asses the lower limb circumference.
{ "pile_set_name": "PubMed Abstracts" }
Q: How to auto resize contents in CollectionViewCell after the cell's size changed? In Xcode, I created a UICollectionView and dragged some labels to the UICollectionViewCell. The issue was that when changing devices, the cell won't adjust its size to the screen size. So I implemented the following code: func collectionView(_ collectionView: UICollectionView, layout collectionViewLayout: UICollectionViewLayout, sizeForItemAtIndexPath indexPath: NSIndexPath) -> CGSize { let layout = collectionView.collectionViewLayout as! UICollectionViewFlowLayout layout.sectionInset = UIEdgeInsets(top: 10, left: 10, bottom: 10, right: 10) return CGSize(width: self.collectionView.frame.width * 0.9, height:self.collectionView.frame.height *0.8) } After this, I noticed that the cell's size did change. However, the width and height of the labels inside the cell remained the same. I'm not sure how to resolve this problem. Thank you in advance for your help!! A: set Constraint of your labels, like, for Constraint pic. your label pic. or you can also use UI property autoresizingMask like, yourLbl.autoresizingMask = [.flexibleWidth, .flexibleHeight]
{ "pile_set_name": "StackExchange" }
Mostly recently, Revengeseason 2 delivered the episode of “Masquerade” unto us. And boy, was it ever delicious. Plus, the fashion was amazing. But it’s time for our weekly question…is Revenge new tonight on ABC? Emily and Daniel in “Masquerade” The answer, sadly, is no. But don’t run away all sad just yet… Revenge season 2 episode 19 does have a title for us to ruminate upon… and that title is, “Identity.” The episode will air on April 28, 2013. We also know the episode titles for the rest of the season. They are as follows: “Falcon”, “Truth Part 1”, and “Truth Part 2.” That’s not too telling, considering the show is unlikely to reveal too many big truths to us…ever. However, season finales are the best time to drop some knowledge on fans….especially by way of cliffhangers. And, no doubt, Revenge will have plenty for us to savor and think about over the summer. Thank you, Mike Kelley. But…throw a spoiler or two our way, maybe? Just a tiny one?
{ "pile_set_name": "Pile-CC" }
Q: Applying Button+Macro across all worksheets Forgive my ignorance (newby and little knowledge of VBA)... I have developed some macros that are attached to buttons, and working in one worksheet in a workbook. The macros perform various jobs on a calendar. There is one calendar for each of 10 bedrooms in the wing of a hospital. I now want to make identical worksheets with the same buttons and macros for each bedroom i.e. 10 worksheets. But try as I might I cant get the macros to work in the other worksheets. The macros are in the VBA code editor for the first worksheet (Bed1). I have copied the code into the "This Workbook" page within the VBA editor - but that had no effect, other than to stop them working at all. This is a typical macro: '============================================ Private Sub Prevw1_Click() '============================================ ' DAILY PATIENT TIMETABLE ' PRINT PREVIEW '============================================ ActiveSheet.Select ActiveSheet.AutoFilterMode = False Range("_Daily").Select ActiveSheet.PageSetup.PrintArea = "_Daily" ' Call page_SetUp ' ' Variations for page setup With ActiveSheet.PageSetup .LeftMargin = Application.InchesToPoints(1.5) .RightMargin = Application.InchesToPoints(0.9) .Zoom = 75 End With ActiveSheet.PrintPreview ActiveSheet.PageSetup.PrintArea = "" Range("H126, H126").Select End Sub Q. What have I done wrong that makes this only work in the Bed1 worksheet where it was developed first? Kind regards Russ A: Take the code out of the ThisWorkbook module and put it in a normal code module. In Design Mode, in the Excel window (not VBE), right-click the button and do Assign Macro, then choose the macro "Prevw1_Click". That should work. You'll have to assign the macro to each button, or you could simply copy/paste the button to the other sheets. If your button is an ActiveX Control, then I think you may need to have the subroutine for each button in the worksheet where the button resides. So, each worksheet may have an activeX command button called "CommandButton1", then each Worksheet code module should have a subroutine like: Sub CommandButton1_Click() Call ClickTheButton End Sub You will basically put all of this same code in each of the 10 worksheet code modules. Then, rename your routine in the ordinary code module, like: Private Sub ClickTheButton() '============================================ ' DAILY PATIENT TIMETABLE ' PRINT PREVIEW '============================================ ActiveSheet.Select ActiveSheet.AutoFilterMode = False Range("_Daily").Select ActiveSheet.PageSetup.PrintArea = "_Daily" ' Call page_SetUp ' ' Variations for page setup With ActiveSheet.PageSetup .LeftMargin = Application.InchesToPoints(1.5) .RightMargin = Application.InchesToPoints(0.9) .Zoom = 75 End With ActiveSheet.PrintPreview ActiveSheet.PageSetup.PrintArea = "" Range("H126, H126").Select End Sub The reason I would do this, instead of copying the existing macro to each of 10 worksheets is simple: If you ever need to modify your subroutine, you only need to modify it in one place. Likewise, if you add a new worksheet(s) you need only copy 3 lines of code instead of 20. It's just easier to maintain this way, since each sheet's button is calling the same code, each sheet's button should just have a simple sub that calls the "main" procedure.
{ "pile_set_name": "StackExchange" }
Q: Multiple ColladaLoader loads fail. Is it thread safe? I am trying to load multiple pieces simultaneously. Either only one piece shows up, correctly, or both pieces show up, with one correct and one incorrect. Here's my code: var loader = THREE.ColladaLoader(); loader.load('model.dae', function colladaReady(result) { var piece = result.scene.children[0]; piece.position.set(-100, 0, 0); scene.add(piece); renderer.render(scene, camera); }); loader.load('model2.dae', function colladaReady2(result2) { var piece2 = result2.scene.children[0]; piece2.position.set(100, 0, 0); scene.add(piece2); renderer.render(scene, camera); }); A: The reason is because ColladaLoader is not thread-safe, so multiple load() calls cannot be made on the same object. Simply create a new instance of ColladaLoader like so and all should work var loader = THREE.ColladaLoader(); loader.load('model.dae', function colladaReady(result) { var piece = result.scene.children[0]; piece.position.set(-100, 0, 0); scene.add(piece); renderer.render(scene, camera); }); /*** Line added here! ***/ var loader2 = THREE.ColladaLoader(); loader.load('model2.dae', function colladaReady2(result2) { var piece2 = result2.scene.children[0]; piece2.position.set(100, 0, 0); scene.add(piece2); renderer.render(scene, camera); });
{ "pile_set_name": "StackExchange" }
Novel method for estimation of chlorinated pesticide residues in milk. A new, simple, and rapid procedure for determining chlorinated pesticide residues in milk is described. The entire acetonitrile extract from milk is passed through a 0.5 g activated charcoal chromatographic column. Chlorinated pesticides adsorbed on the charcoal are eluted with 100 mL acetone-hexane (1 + 1). The eluate is washed with water and 1% sodium carbonate solution, and chlorinated pesticides are extracted with hexane. The extract is concentrated and measured by electron capture gas chromatography. Recoveries from 50 mL milk samples fortified with 0.04-1.6 micrograms of different BHC isomers, 0.05-2 micrograms DDT and its metabolites, and 0.05-0.5 micrograms dieldrin ranged from 86.9 to 103.2%.
{ "pile_set_name": "PubMed Abstracts" }
Lymph node biopsy does not impair survival after therapeutic dissection for palpable melanoma metastases. To determine the effects of disrupting a nodal basin in patients with American Joint Committee on Cancer stage III melanoma with clinically palpable lymph nodes, we studied patients who underwent therapeutic lymph node dissection after excisional lymph node biopsy, after fine-needle aspiration (FNA) biopsy, or without a preoperative biopsy. We performed a retrospective review of our patients with American Joint Committee on Cancer stage III melanoma who were treated between January 1972 and June 1995, using data acquired from our 8200-patient database. The study group included 670 patients with melanoma, with known primary tumors, who underwent therapeutic lymph node dissection for palpable nodal metastases diagnosed by open biopsy (227 patients), by FNA (66 patients), or by clinical observation without biopsy (377 patients). Regional node recurrence, 5-year disease-free survival, and overall survival rates were calculated. The same-basin regional node recurrence rates were similar for the three groups (open biopsy, 4.6%; FNA, 3.2%; no biopsy, 4.6%; P = .14). The 5-year disease-free survival rates were 36.8% for the open-biopsy group, 29.6% for the FNA group, and 28.9% for the no-biopsy group (P = .08); corresponding 5-year overall survival rates were 40.6%, 43.9%, and 36.1%, respectively (P = .18). Multivariate analysis failed to identify preoperative biopsy as a significant risk factor. Matched-pair analysis using age, gender, primary tumor site, Breslow thickness, and tumor burden showed no differences in the 5-year disease-free survival rates (33% for the open-biopsy group vs. 27% for the FNA and no-biopsy groups, P = .42) and the 5-year overall survival rates (41% vs. 35%, P = .32). For patients with melanoma with palpable regional adenopathy, histological confirmation of clinical suspicion with either FNA or excisional lymph node biopsy does not adversely affect survival or recurrence rates.
{ "pile_set_name": "PubMed Abstracts" }
Click to share on Twitter (Opens in new window) Click to share on Facebook (Opens in new window) Elmo’s In The Clear: Court of Appeals Dismisses Three Sex Abuse Lawsuits Against Former Sesame Street Voice Actor Kevin Clash Elmo’s In The Clear: Court of Appeals Dismisses Three Sex Abuse Lawsuits Against Former Sesame Street Voice Actor Kevin Clash Elmo’s In The Clear: Court of Appeals Dismisses Three Sex Abuse Lawsuits Against Former Sesame Street Voice Actor Kevin Clash For former longtime Elmo voice actor and puppeteer Kevin Clash, it’s truly a sunny day. This month, the United States Court of Appeals dismissed the cases of three alleged victims—Cecil Singleton, Kevin Kiadii and a man identified only by initials “S.M.”—who all claim they were sexually abused by Clash, 53, more than ten years ago as minor teenagers. A New York judge previously threw out the lawsuits in July 2013, claiming they were filed after the six-year statute of limitation had expired. But the three men brought their cases to the Court of Appeals, alleging they didn’t fully realize the psychological effects of the abuse until 2012. For a second time, the cases were dismissed, RadarOnline.com has learned. The Court of Appeals argued the alleged victims “failed to provide any reason why [they] were unable to discover their injuries prior to 2012,” court documents state. The Court of Appeals found the arguments to be “without merit,” affirming the New York judge’s previous decision to dismiss all three suits. The actor still faces other legal woes: Pennsylvania man Sheldon Stephens sued Clash in March 2013, claiming the star smoked crystal meth as he sexually abused him at age 16. The state has a more lenient policy toward statute of limitations. Another unnamed accuser recanted his sex abuse allegations in 2012, a lawyer stating his client and Clash shared an “adult consensual relationship”. Clash resigned from his 28-year run as loveable monster Elmo as sex abuse allegations surfaced in November 2012.
{ "pile_set_name": "OpenWebText2" }
// // CSLayoutSwitcherHostingView.m // CocoaSplit // // Created by Zakk on 3/5/17. // Copyright © 2017 Zakk. All rights reserved. // #import "CSLayoutSwitcherHostingView.h" #import <Quartz/Quartz.h> #import "CSPreviewGLLayer.h" #import "CSLayoutSwitcherWithPreviewWindowController.h" @implementation CSLayoutSwitcherHostingView @end
{ "pile_set_name": "Github" }
Braff Braff is a surname. Notable people with the surname include: Joshua Braff (born 1967), American fiction author, the older brother of actor Zach Braff Menalton Braff (born 1938), Brazilian author Ruby Braff (1927–2003), American jazz trumpeter and cornetist Zach Braff (born 1975), American actor and film director
{ "pile_set_name": "Wikipedia (en)" }
Identification of salivary basic proline-rich proteins as receptors for Candida albicans adhesion. The adherence of Candida albicans cells to oral surfaces is believed to be an important step in the development of oral candidosis. Electrophoretically separated parotid salivary proteins were transferred to nitrocellulose membranes and incubated with [35S]methionine-radiolabelled C. albicans cells in a cell overlay adherence assay. A subset of four proteins with apparent molecular masses of 17, 20, 24 and 27 kDa (designated bands A-D) acted as receptors for cells of C. albicans ATCC 10261 and four clinical C. albicans isolates, in overlay assays. The N-terminal amino acid sequence of bands A-D indicated that these proteins were members of the basic proline-rich protein (bPRP) family. Digestion of protein A with endoproteinase Glu-C resulted in a single band (designated Ap) detected by Coomassie blue staining after SDS-PAGE. This band was not bound by C. albicans cells in overlay assays and comprised two fragments, designated ApN and ApC. These fragments had N-terminal sequences corresponding to the N-terminal and post endoproteinase Glu-C cleavage site sequences of bPRP IB-6 and had molecular masses of 6189 and 4261 Da as determined by mass spectrometry. Thus intact bPRP IB-6, and other bPRPs, may act as receptors for C. albicans adhesion.
{ "pile_set_name": "PubMed Abstracts" }
In particular, the present invention relates to a method of stabilizing tires extracted, at a relatively high temperature, generally of about 180.degree. C., from a curing mold. When manufacturing tires, particularly vehicle tires having internal body plies formed from nylon cords or other synthetic fibers which shrink when cooled, it is now customary to subject each tire, upon extraction from the curing mold, to a stabilizing operation generally consisting in mounting the tire on a support, inflating it to a given pressure, usually of about 3 atmospheres, and maintaining this pressure long enough for the tire to cool below a given temperature, usually of about 100.degree. C. Such a process, usually referred to as "post inflation", provides, not only for preventing the synthetic cords from shrinking, thus avoiding undesired distortion of the tire, but also for stabilizing the shape of the cords, which is extremely useful in terms of finished tire quality. Stabilizing cured tires, however, usually involves a number of drawbacks for the manufacturer, mainly due to the relatively long time required for cooling, and the size of currently used stabilizing equipment. Generally speaking, in fact, the time required at present for ensuring correct stabilization of a tire is roughly twice that required for curing. Consequently, two stabilizing machines are usually required for each curing mold, each of which usually features complex centralized systems for supplying cooling fluids such as water and/or air, for cooling the outer surface of the tires during stabilization.
{ "pile_set_name": "USPTO Backgrounds" }
Introduction {#Sec1} ============ Heart failure is an ever-growing disease with a growing number of patients in end-stage disease, requiring heart transplantation. However, there is a shortage of organs available to replace failing hearts in these patients. Organs from other species, such as swine, have been proposed to meet the demand in these situations as they are anatomically similar to human hearts, genetically manipulatable, have short breeding cycles and are readily available. However, the arduous immunologic barriers between cross-species transplantation has limited its immediate use. Heterotopic cardiac transplantation in the intra-abdominal position in a large animal model has been essential in the progression of the field of cardiac transplantation. Our group has over 10 years of experience in cardiac xenotransplantation with pig to baboon models, the longest xenograft of which survived over 900 days, with rejection only after reducing immunosuppression^[@CR1]^. This abdominal model facilitates immunologic monitoring through the period from implantation until graft rejection at reduced cost and complexity compared to orthotopic (life-supporting) models, with the additional advantage that, since the native heart remains in place, rejection of the heterotopic xenograft does not result in primary hemodynamic compromise and/or death. Here, we demonstrate the approach to implantation of a cardiac graft into the intra-abdominal position in a baboon recipient for the study of transplantation and briefly highlight our model's ability to provide insight into not only xenotransplantation but across disciplines. We include details that have provided us with consistent success in this model; performance of the anastomoses, de-airing of the graft, implantation of a long-term telemetry device for invasive graft monitoring, and ideal geometric positioning of the heart and telemetry device in the limited space of the recipient abdomen. We additionally detail surveillance techniques to assess long-term graft function. This heterotopic model, namely that it provides a readily reproducible method for long-term and whole-organ cardiac perfusion without compromising the recipient, should be seen as a standard model for testing iterative improvements in immunosuppression regimens and xenograft genetic manipulations for the further enhancements of cardiac xenotransplantation and allotransplantation at large. While we describe this in the context of transplantation from our extensive experience using this model, considerations are otherwise similar in any other large animal model. As this model uniquely provides *in vivo* assessment of whole organ function without compromising host physiology, it can be used for assessing cardiac physiology across disciplines, where other models have failed or are limited. Materials {#Sec2} ========= Specific pathogen-free (SPF) baboons of either sex weighing 15--30 kg (2--3 years of age) from Oklahoma University of Health Sciences (Norman, OK) were housed in a clean pathogen-free facility and were used as recipients. 6 to 8 week-old genetically modified swine of either sex, with an established genetic backbone known to produce prolonged xenograft survival, alpha 1--3 galactosyltransferase gene knockout (GTKO) and overexpression of human CD46 (hCD46) and thrombomodulin (hTBM), GTKO.hCD46.hTBM, were used as donors (Revivicor Inc., Blacksburg, VA) as our standard donor^[@CR1]^. However, we have also demonstrated success in pigs that additionally express human transgenes for thromboregulation (endothelial protein C receptor, tissue factor pathway inhibitor), complement inhibition (decay accelerating factor), and cellular immune suppression (hCD39, hCD47). SPF baboons were selected for low non-gal antibody titers as previously published^[@CR2]^. Critical materials are listed in Table [1](#Tab1){ref-type="table"} and the immunosuppression regimen has been previously described^[@CR1],[@CR3]--[@CR5]^.Table 1Additional information on critical materials for heterotopic cardiac transplantation: while these are suggestions based on materials we have used, there are likely other suitable alternatives.Heterotopic Cardiac Xenotransplantation-Important MaterialsNameManufactererReference \#9 Fr Cardioplegia Aortic Root CannulaMedtronic (USA)20012Bladder Irrigation Tubing for CardioplegiaBaxter (USA)2C4041Extension IV Tubing Seticumedical (USA)12656-28PlegisolHospira Inc. (USA)409796905Data Sciences International (DSI) Telemetry Device L21DSI (USA)DSI L2110 Fr Hickmann Tunneled Triple Lumen CatheterBARD (USA)606560 Methods {#Sec3} ======= All procedures described here have been approved by the Institutional Animal Care and Use Committee (IACUC) at the University of Maryland School of Medicine. All methods were carried out in accordance with relevant guidelines and regulations. Heterotopic cardiac transplantation technique {#Sec4} --------------------------------------------- The intra-abdominal heterotopic model (HHTx) is a two-anastomosis system utilizing arterial supply from the infrarenal aorta of the recipient baboon to perfuse the coronaries of the donor heart with drainage of the cardiac graft through the donor pulmonary artery remnant anastomosed to the intra-abdominal inferior vena cava of the baboon recipient (Fig. [1](#Fig1){ref-type="fig"}). A list of critical materials is provided in Table [1](#Tab1){ref-type="table"}. A brief description is provided followed by step-by-step instructions for performing HHTx. A supplemental video is also provided (supplementary video [1](#MOESM1){ref-type="media"}).Figure 1Intraabdominal placement of a cardiac xenograft with pressure telemetry monitor in the apex. IVC-inferior vena cava, Ao-Aorta, PA-pulmonary artery, EKG-electrocardiogram leads from telemetry device. Of note, whereas the telemetry device depicted here only has one pressure sensor and it is placed in the left ventricle at the apex, the pressure can be placed in the right atrium, pulmonary artery or aorta as well, depending on which hemodynamic parameters of interest are to be studied. Image Copyright: Tim Phelps JHU/AAMM, 2020. Briefly, the cardiac donor is prepped and draped sterilely, and a midline sternotomy is performed. Pericardium is opened and major vessels are isolated. Silk ties are placed around both superior (SVC) and inferior (IVC) vena cavae. Cold blood cardioplegia is administered through a 9 Fr aortic root canula after ligating the SVC and applying a vascular cross clamp on the aorta. The heart is decompressed by venting the IVC and left atrium or pulmonary vein and cardiectomy is performed. The heart is placed on ice during backtable preparation. The IVC is ligated and pulmonary vein common channel is created and over sewn (Fig. [2](#Fig2){ref-type="fig"}). The cardiac graft is now readily for transplantation into the abdomen.Figure 2Backtable preparation of the heart for transplantation. Ao-ascending aorta, PA-pulmonary artery, Pvv-Pulmonary vein common channel, Cava-superior and inferior vena caval junction. Image Copyright: Tim Phelps JHU/AAMM, 2020. Retroperitoneal exposure of the infrarenal abdominal aorta and IVC of the recipient is performed and proximal and distal control of these vessels are obtained. Aortotomy and cavotomies are placed approximately 2 centimeters (cm) distal to the renal vessel takeoffs. The aorta-aorta anastomosis is carried out before the pulmonic-caval anastomosis (Fig. [3](#Fig3){ref-type="fig"}).Figure 3Aortic and Pulmonic Anastomosis to the Recipient. Abdomen. Image Copyright: Tim Phelps JHU/AAMM, 2020. Aortic and Pulmonic Anastomosis to the Recipient. Abdomen. Image Copyright: Tim Phelps JHU/AAMM, 2020. Step-by-step performance of HHTx transplantation is as follows, with clinical pearls based on observation and experience denoted at relevant points of the procedure. All procedures described here have been approved by the Institutional Animal Care and Use Committee (IACUC) of our residing institution. Here we describe these steps in the context of pig-to-baboon xenotransplantation, however, this can be conducted similarly in baboon heterotopic allotransplantation. ### Procurement of the Cardiac graft {#Sec5} #### Preparation of the cardiac donor {#Sec6} The donor is sedated with 10 milligrams per kilogram (mg/kg) of Ketamine intramuscular (I.M.) and 2 mg/kg xylazine for transfer to the operating room. Clinical pearl*In swine, xylazine is used as an adjunct to ketamine, as many are somewhat refractory to the sedative effects of ketamine. While xylazine is known to cause second degree heart block and hypotension requiring atropine in some cases, this has not been our experience, although the true incidence is not known. Alternatively Ketamine and 0.12 mg/kg IV of Dexmedetomidine or Telazole 1 mg/kg can be used as an adjunct to ketamine*^[@CR1]^. A peripheral intravenous catheter is placed for medication administration. A 24 gauge angiocatheter in an ear or forelimb vein is preferred. Alternatively, a percutaneous femoral venous cannula can be placed if peripheral IV access is difficult to obtain. Additionally, a femoral arterial line is placed in either groin after appropriate sterility is obtained. Induction of anesthesia is performed with isofluorene (1--1.5%). Routinely, both prophylactic amiodarone and lidocaine are given at 2 mg/kg and 1 mg/kg, respectively. A 6--7 mm cuffed endotracheal tube is used for oral tracheal intubation. Anesthesia is maintained with isofluorene, with a goal minimal alveolar concentration (MAC) of 1.0--1.2. Paralytics such as succinylcholine and opiates such as fentanyl are given as needed to maintain paralysis and analgesia, respectively after ensuring appropriate levels of anesthesia. Clinical pearl*In our experience, sevofluorene requires high doses for anesthetic effect in swine and thus the cardio suppressive effects of inhaled anesthetic agents is accentuated. However, there is some evidence that in the setting of experimentally induced MI models, sevoflurane increases the risk of fatal ventricular arrythmias. In regards to intubation, we sometimes elect to place a surgical tracheostomy as the swine anatomy can make oral tracheal intubation difficult and put the swine at risk for laryngospasms*^[@CR6],[@CR7]^. *In terms of antiarrhythmics, lidocaine is well tolerated, however, amiodarone often causes bradycardia and hypotension. This can be mitigated by slow infusion, however, in severe cases this is refractory to most agents except calcium chloride, which can be given as a 100 mcg push. Amiodarone should be given only after hemodynamic stability is assured, an arterial line has already been placed and the surgeon is aware that it will be administered.* Place EKG leads to the skin of the chest for cardiac monitoring, as lateral as possible to remain away from the surgical field. Following intubation and induction of general anesthesia, the surgical field is prepped, with a series of three alternating scrubs with 10% betadine and 70% alcohol solution from the angle of the mandible to the upper abdomen at least 4 cm below the xyphoid process and laterally to the proximal arms. #### Exposure of the donor cardiac graft {#Sec7} The skin is incised from above the sternal notch to below the xyphoid process using a 10-blade or cutting electrocautery. It is deepened through the subcutaneous fat and muscle using coagulating electrocautery. The sternal midline is identified by feeling the sternal edges in the rib interspaces and should be from associated muscle and tissue. Clinical pearl*One must attend to the most superior portion of this incision. There is thick muscle to be cleared from the keel at the manubrium circumferentially and posteriorly.* The xyphoid process may be amputated with electrocautery. The retrosternal space is cleared from cardiac adhesions and pericardium using finger dissection and blunt scissors working superiorly from the subxyphoid space. Electrocautery may be used to take down diaphragmatic attachments. An oscillating sternal saw or thick shears is used divide the sternum at the midline, taking care to protect the right ventricle from injury. Clinical pearl*The manubrium's keel is too thick to perform a midline sternotomy at this portion. Once resistance is met at the superior edge of the sternum, this area should be avoided and the sternum should be incised laterally in one direction or the other as the sternal saw is not able to cut this keel. Thus, soft tissue and muscle should be cleared here along this path as well. However, caution must be taken as the innominate vein is just deep to this area, as damage can cause devastating bleeding.* Adequate hemostasis is ensured of the divided sternal edges utilizing electrocautery and bone wax if preferred. An appropriately sized sternal retractor is placed for exposure and the pericardium is carefully divided. Take care to avoid irritation of the myocardium to prevent cardiac arrythmias. Pericardial sutures are placed with 2-0 silk to create a well, if needed. A plane is created through sharp dissection or electrocautery between the ascending aorta and pulmonary artery to accommodate eventual cross-clamp of the aorta. The superior vena cava is dissected inferior to the azygos vein and tagged with two 2-0 silk ties. Clinical pearl*In swine, the azygos vein is small, posterior, and fragile. During dissection of the superior vena cava (SVC), care must be taken to avoid injuring or avulsing the azygos vein located on the posterior medial surface of the SVC. Alternatively, this can be ligated without consequence with surgical clips or tie.* Similarly, the IVC is isolated and two silk ties are placed on a tension-free tag #### Cardioplegia and arrest of donor cardiac graft {#Sec8} A purse-string or U-stitch of 5-0 Prolene is placed in the ascending aorta for securing of the cardioplegia cannula. This should be at least 2 cm distal to the aortic root. The cardioplegia cannula is placed and secured with a Rummel tourniquet. Clinical pearl*Great care should be taken to prevent puncture of the posterior wall of the aortic root with the aortic cannula by pointing the tip of the needle bevel side anterior and pointed about 15 degrees inferiorly toward the aortic root. Hypotension can prevent proper resistance and distensibility of the aorta, increasing the risk of posterior wall puncture. Similarly, ensuring that systolic pressures are not higher than 120 mmHg prior to cannulation prevents excessive bleeding and reduces the risk of aortic dissection.* 500 un/kg of systemic heparin is administered. Ensure at least three minutes between administration and cross-clamp. Ensure the readiness of cardioplegia tubing and solution, sterile ice, and the entire team for cross-clamp and arrest. In rapid sequence, ligate the cranial superior vena cava, place the aortic cross-clamp, vent the right atrium by dividing the inferior vena cava, and vent the left atrium either through incising the left atrial appendage or the inferior pulmonary veins. Immediately upon venting, begin running cardioplegia and fill the mediastinum with sterile ice slush. Clinical pearl*It is important to prevent distention of the right and left ventricle with venting, as described above, for proper arrest and myocardial protection. Additionally, in order to facilitate optimal cooling of the heart on ice, the pleural spaces can be opened bilaterally allowing drainage of blood and cardioplegia. This prevents excess fluid from accumulating in the mediastinum and inefficient myocardial cooling.* 30 cc/kg of cardioplegia is administered through the cardioplegia cannula (Plegisol with 50 millimoles (mmol) sodium bicarbonate 8.4%, 50 mmol potassium chloride). Ensure that the heart is soft and relaxed with appropriate pressure (20 mmHg) and distention of the aortic root. Clinical pearl*Cardioplegia should be kept on ice. Additionally, great care must be taken to ensure no air is present, as even small amounts of air can cause ischemia. Cardioplegia should be administered through pressure-resistant tubing (Table* [*1*](#Tab1){ref-type="table"} *for our preference) and a pressure bag. To ensure appropriate root pressures an aortic cannula arterial line can be placed, but this can be cumbersome. To a trained surgeon, this can be easily assessed by palpation of the aortic root.* #### Donor cardiectomy {#Sec9} The superior vena cava is ligated and divided. The division of the inferior vena cava is completed from the venting step during cardioplegia administration, if necessary. The aorta is incised distal to the cardioplegia cannula at the junction of the aortic root and arch. The pulmonary artery is incised just proximal to the bifurcation. Cardiectomy is completed by dividing the remaining pulmonary veins along the pericardial reflection. ### Backtable Preparation of the Cardiac Graft {#Sec10} #### Closure of caval orifices {#Sec11} The superior and inferior vena cava are tied with 2-0 silk prior to cardiectomy. However, alternatively this can be done on the backtable. (Fig. [2](#Fig2){ref-type="fig"}). #### Closure of pulmonary vein orifices {#Sec12} A common orifice is created between the pulmonary veins at the level of the left atrium. This common orifice is closed in two layers with a back-and-forth running 5-0 Prolene suture (Fig. [2](#Fig2){ref-type="fig"}). #### Preparation of the aorta and pulmonary artery for anastomosis {#Sec13} The donor aorta and pulmonary should be beveled about 20--30 degrees from the axis parallel to the recipient IVC and abdominal aorta. It should also be an appropriate length to minimize kinking and tension (see Fig. [3](#Fig3){ref-type="fig"}). While this can be approximated on the backtable, it likely will need to be refined once the donor heart is placed in the recipient abdomen just prior to the anastomosis. ### Exposure of the Recipient Abdominal Aorta {#Sec14} #### Preparation of the graft recipient {#Sec15} The recipient is sedated with 10 mg/kg of Ketamine I.M. for transport to the operating room. Preoperatively, a tunneled triple lumen central venous catheter for administration of induction immunotherapy and maintenance immunotherapy, anticoagulation and other medications postoperatively is placed in either internal jugular veins (see Table [1](#Tab1){ref-type="table"} for model number). Our Immunosuppression has been previously described^[@CR1],[@CR3]^. One to two peripheral intravenous catheters for access for medication and fluid administration if needed and the central venous catheter is insufficient. 18--20 gauge catheters in forearm veins are preferred. EKG leads are placed to the skin of the chest for cardiac monitoring, as lateral as possible to remain away from the surgical field. A foley catheter is placed into the bladder for decompression and urine output monitoring Following intubation and induction of general anesthesia, prepare the skin with a series of three alternating scrubs with 10% betadine and 70% alcohol solution from the xyphoid process to distal to the pubic symphysis across the bilateral groins for sterile femoral access. Clinical pearl*We mirror our anesthesia strategy to the swine donor's, as we believe the anesthesia strategy should mirror the cardioprotective approach.* #### Safe entrance into the abdomen {#Sec16} A midline laparotomy is performed from the xyphoid to the pubic symphysis. The skin is incised using a 10 blade and deepened to the fascia using electrocautery. Two forceps are used to elevate fascia and make a small (3 mm) sharp incision through fascia and peritoneum to enter the abdomen. Extend this incision to its full length using a finger or malleable retractor to protect the intra-abdominal contents (bowel) from transmitted electrocautery. Clinical pearl*Great care should be taken to prevent electrocautery injury to the bowel. It is best to use Metzenbaum scissors for initial entry through the fascia into the abdomen. Additionally, the dome of the bladder should be cared for and avoided on the inferior portion of the incision. Despite a foley catheter, its peritoneal reflection can still be present above the pubic symphysis. While we have never encountered this, injuries to the bowel or bladder should be promptly repaired in 2 layers, the inner layer with an absorbable suture such as a 2-0 vicryl and a permanent suture such as a 2-0 silk for the outer layer. Missed bowel injuries can cause fatal abdominal sepsis in an immunosuppressed recipient.* The bowel is protected with wet lap pad or towel and gently retracted cranially using an abdominal retractor. The retroperitoneal space is opened inferior to the kidneys and at least 5 cm of inferior vena cava and abdominal aorta are exposed for accommodation of partially occlusive vascular clamps The inferior vena cava and aorta are encircled with proximal and distal vessel loops, respectively, for proximal and distal control of the vessels. ### Two-Anastomosis Implantation of the Cardiac Graft {#Sec17} #### Aorto-aortic anastomosis {#Sec18} A partially occlusive vascular clamp is placed on the superior portion of the infrarenal abdominal aorta after administration of 300 un/kg of heparin. See special notes for step 4.1.2. The aortotomy is created sharply in a longitudinal fashion with an 11 blade, to a length of approximately 1 centimeter. Adjust this to accommodate the size of the donor ascending aorta with Pott's scissors. Clinical pearl*Take care not to cause a dissection of the abdominal aorta during this incision or injure the lateral or posterior walls during this incision. It is very important to remain partially occlusive on the abdominal aorta during the anastomosis to prevent prolonged totally occlusive clamp times. Additionally, variant anatomy sometimes yields an infrarenal abdominal aorta that is too small to accommodate an anastomosis and a suprarenal clamp must be placed instead. While this should be avoided, sometimes it is not possible but clamp times should be minimized to prevent kidney and spinal cord ischemia.* An end-to-side, donor aorta to recipient infrarenal aorta, anastomosis using a running 5-0 Prolene on an RB-2 needle. Alternatively, the anastomosis can be created with two 5-0 prolene sutures as well. Clinical pearl*The aortic anastomosis is performed prior to the pulmonary-caval anastomosis for technical reasons. We have found that the resultant orientation of the xenograft is more optimal and the sewing of the anastomosis is easier this way. If, when orienting the heart and creating the abdominal aortotomy and cavotomy, it is found to be more suitable to begin with the pulmonary anastomosis, one may do so. However, we have not found this to be the case.* #### Pulmonary artery-caval anastomosis {#Sec19} A partially occlusive vascular clamp to the infrarenal IVC is placed after completion of the aorto-aortic anastomosis. Clinical pearl*It is very important to remain partially occlusive during the anastomosis as prolonged totally occlusive clamp times of the IVC can contribute to bowel edema. See comments of vascular clamping noted in step 4.1.2.* The inferior vena cava is opened sharply in a longitudinal fashion to a length of approximately 1 cm. It is adjusted to accommodate the size of the donor pulmonary artery remnant. The incision can be made using Pott's scissors or an 11 blade. Clinical pearl*Take care not to injure the lateral or posterior walls of the cava during this incision. Additionally, the cavotomy is usually placed slightly superior to the aortotomy's position as to accommodate proper placement of the heart in the abdomen to prevent kinking or tension*. The xenograft is placed in a position that will not cause tension on the aorto-aortic anastomosis and trim the donor pulmonary artery to the shortest possible length to create an end-to-side caval anastomosis in this position. An end-to-side, donor pulmonary artery to recipient IVC, anastomosis is performed using a running 5-0 Prolene on an RB-2 needle. The xenograft can be temporarily flipped laterally over the axis of the anastomosis in order to expose the contralateral edge of the anastomosis if needed. Alternatively, similar to the arterial anastomosis, two 5-0 Prolene anastomosis can be performed, depending on surgeon preference. Partially occlusive vascular clamps can be placed superiorly or inferiorly oriented, depending on exposure, angle and orientation of the cardiac graft (Fig. [3](#Fig3){ref-type="fig"}) ### Reperfusion of the cardiac graft {#Sec20} An 18-gauge angiocath needle is used to access the apex of the left ventricle for de-airing. This site will ultimately be used for implantation of the telemetry pressure probe. Administer systemic sodium bicarbonate 1 mmol/kg, lidocaine 1 mg/kg, and mannitol 0.3 gm/kg in preparation for reperfusion. The IVC clamp is removed first to allow for retrograde filling of the right ventricle, followed by release of the aortic cross clamp. Clinical pearl*Be prepared for electric cardioversion in the case of fibrillation. Hearts of swine are prone to ventricular arrhythmias and is very common upon reperfusion. Prompt unsynchronized internal fibrillation of 10--15 Joules should be initiated.* ### Implantation of the telemetry device {#Sec21} A pocket is formed in the lateral abdominal wall, between the fascia and muscle of the external oblique, to accommodate a telemetry device. The telemetry device is placed in this pocket and the fascia closed over the device, for soft tissue coverage of the device, prior to implanting the pressure probe and EKG leads. The pressure probe is placed in the apex of the left ventricle, preferably at the prior site of de-airing. Secure the probe with a 5-0 Prolene purse string using felt pledgets. Clinical pearl*Notably, some telemetry devices come with two pressure probe channels. The pressure probes can be safely placed in the left or right atrial appendage or ascending aorta, if other parameters are desired.* The first EKG lead to the left ventricle is placed with a simple 5-0 Prolene stitch. The second lead may be free in the peritoneal cavity as a ground. ### Closure of the Recipient Abdomen {#Sec22} The midline fascia is closed with running 0 Prolene suture. Take care to avoid catching the leads in the closure and protect bowel during closure. Close the remaining incision in two layers using absorbable suture (2-0 Vicryl followed by 3-0 vicryl at the skin is our preference). Clean and dry the incision and apply skin glue. Dress the wound as desired for 48 hours. Recover the animal from general anesthesia. Place on systemic anticoagulation (e.g., heparin) 24 hours after surgery, once surgical risk is deemed minimal. The goal ACT is twice the level of baseline or aPTT 60--80. ### Transabdominal Myocardial Biopsies {#Sec23} The recipient is placed under anesthesia as previously described, along with administration of prophylactic antiarrhythmics. The point of maximal cardiac impulse is located and the smallest incision at the skin and underlying fascia, as required to safely perform a myocardial punch biopsy, is performed to expose the heart. Any scar tissue, overlying bowel or omentum is cleared from the heart and a point for biopsy is located. Similar for telemetry pressure lead placement (as described above), a 5-0 Prolene purse string using felt pledgets is performed around the site of planned punch biopsy A full thickness punch biopsy is performed using a 2-3 Fr punch biopsy tool at the center of this purse string The purse string is tied down in a standard fashion and hemostasis is ensured Closure of the abdominal wall is closed as previously described above Long-term evaluation of the cardiac graft {#Sec24} ----------------------------------------- The primary mechanisms for evaluation of results are the following: transabdominal palpation of the xenograft, transabdominal ultrasonography of the xenograft, direct vascular, atrial or ventricular pressure and EKG monitoring utilizing the implanted telemetry device and serial serum laboratory values including complete blood count and troponin. Transabdominal myocardial punch biopsies are performed a maximum of two times over the lifetime of the recipient, at least one month apart, as limited by our local IACUC for histopathologic surveillance (described in detail above). Palpation allows the easy grading by feel of the contractility of the xenograft. A system of 0 to 4+ is utilized, where 0 indicates no contractility and 4+ indicates full contractility (supplementary video 2). On transabdominal ultrasonography, the contractility of the left and right ventricles, the presence or absence of left ventricular thrombus and/or left ventricular hypertrophy may be assessed (supplementary video 2). Left ventricular thrombus (Fig. [4](#Fig4){ref-type="fig"}) is common but may be partially or completely resolved with the administration of a systemic heparin infusion, which is recommended to be performed routinely.Figure 4Left ventricular thrombus in porcine xenograft. Progressive left ventricular hypertrophy may indicate ongoing xenograft rejection and will generally be seen prior to depressed left ventricular function. Elevated and increasing troponin, particularly in conjunction with thrombocytopenia, can increase the suspicion for rejection. The most precise measure, however, is pressure tracings of the telemetry device, which we have previously characterized^[@CR8]^. We have found the most sensitive measure of rejection is an increase in left ventricular end diastolic pressure (LVEDP). Cardiac contractility ceases after the pulse pressure is reduced to \<10 mmHg. We have also previously characterized intracardiac thrombus as an indicator of rejection (Fig. [4](#Fig4){ref-type="fig"})^[@CR4]^. Results and Discussion {#Sec25} ====================== We have extensive experience with this model over the last 10 years. With establishment of this model and consistent long-term survival, we can now take observations made *in vitro* that can be rigorously tested. Additionally, this model can yield clinical insights regarding allotransplantation, immunology and cardiac specific tissue injury. We have been able to characterize and expand CD4 + CD25 + FoxP3+ regulatory (Treg) T-cells and demonstrate their suppressive effects onto xenografts, recipient B and T-cell populations and their potential role in allotransplantation^[@CR9]--[@CR11]^. Additionally, we have shown that Rapamycin, a currently clinically approved immunosuppressive drug in allotransplantation, promotes enrichment of functional Treg cells with immunoregulatory properties^[@CR12]^. Lastly, we have extensively characterized transgenic pigs for the use in cardiac xenotransplantation and identified early markers for rejection that are applicable to not only cardiac xenotransplantation but also as a generic marker of tissue injury relevant to other fields of study and are graft specific for this model^[@CR13]--[@CR16]^. Lastly, we have extensively studied co-stimulation blockade and B-cell depletion's role in xenotransplantation, which has transformed the field and extended survival not only in cardiac, but also kidney, liver and islet cell xenotransplantation^[@CR17]--[@CR19]^. There are several critical steps in this procedure. Smooth procurement of the xenograft, with adequate myocardial protection, is the first critical step. Anastomosis in the recipient abdomen in a way that avoids narrowing or kinking of either of the two anastomoses, but particularly the pulmonary artery-caval anastomosis, is the next. Finally, maintenance of xenograft contractility in a normal sinus rhythm is necessary for coronary perfusion and ultimately xenograft survival. During procurement of the xenograft, the cardioplegia must be administered under pressure. The heart must be adequately vented and the output should become clear. The distention of the aortic root can be assessed manually, as can the distention of the xenograft itself. Generally, if there is difficulty running the cardioplegia or distention of the graft or root, extending the incision in the inferior vena cava, left atrial appendage, and/or pulmonary veins will aid in venting and resolve this difficulty. Once transferred into the recipient abdomen, care in the performance of the anastomoses, such that the vascular lumens to not become narrowed, is critical. The geometry of the xenograft can be assessed during implantation. The more common error in this step is creating a pulmonary-artery caval connection in which the pulmonary artery remnant is too long, and allows the xenograft to fold on itself and kink the anastomosis. Finally, utilization of both chemical and electrical means to establish normal sinus rhythm early following implantation is imperative. The limitations of this model are in its non-life-supporting nature. The native recipient heart supplies complete cardiac output, hemodynamic support and end-organ perfusion. The intra-abdominal xenograft does not contribute to this support. Rather, it remains in continuity with the recipient's vascular supply, allowing continuous perfusion of the xenograft with recipient blood and exposure to the full recipient immune response (Fig. [5](#Fig5){ref-type="fig"}).Figure 5Perfusion of Blood Through the Heterotopic Cardiac Graft: The graft is perfused via its coronary vessels during graft diastole and aortic valve cooptation, supplied from the recipient aorta. Perfused blood from the graft is then drained into the right atrium via the coronary sinus. Solid arrows denote recipient native blood flow. Dotted arrows represent graft blood flow in systole (outward from graft major vessels) and diastole (into graft atria/ventricles). However, this non-life supporting model allows the evaluation of cardiac transplant rejection, testing of different porcine genetic modifications and immunosuppressive regimens, without life-threatening physiologic perturbations of the recipient. Life-sustaining studies require the recipient to be placed on cardiopulmonary bypass just to undertake the transplantation. Additionally, these recipients require critical care postoperatively, as perturbations of the cardiac graft can compromise supporting perfusion for all vital organs. This model requires no critical care and can be immediately transferred to a non-intensive setting similar to preoperative housing. The incidence of cardiovascular disease causing end-stage heart failure requiring transplantation is growing^[@CR20]^. Genetically modified porcine organs that have been tested in this model and that are now being used in orthotopic studies are increasingly meeting preclinical efficacy requirements for their eventual use^[@CR21]--[@CR23]^. While survival has been obtained for up to 6 months, there is much still to learn regarding the physiologic and immunologic mismatch between swine and baboon (and human for that matter) as these hearts eventually still succumb to end-stage failure by an unknown mechanism^[@CR24]--[@CR27]^. Additionally, porcine endogenous retrovirus (PERV) knockout swine have been produced out of concern for the theoretical transmission of PERV (although there has been no evidence of human transmission and PervC null animals are being produced regularly without gene editing)^[@CR28]--[@CR31]^. All things considered, this model continues to be relevant for demonstrating pre-clinical efficacy, safety and testing iterative changes in genetic constructs of porcine xenografts. Further successes in reproducing this model in other institutions may enable continued enhancement of porcine cardiac xenotransplantation for the eventual use in humans, but also push the boundaries of discovery as has been limited by other disease models across disciplines. For example, knowledge gained by insights in xenotransplantation, an arduous immunological barrier in excess of human allotransplantation, can shed light onto strategies to abrogate problems faced by dysregulation in immunity such as antibody mediated rejection or graft versus host disease. Additionally, as this model uniquely provides *in vivo* assessment of whole organ function without compromising host physiology, it serves as a way to assess cardiac physiology beyond the limitations of what current models can provide^[@CR32]--[@CR33]^. Supplementary information ========================= {#Sec26} Supplementary Video 1. Supplementary Video 2. **Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary information ========================= is available for this paper at 10.1038/s41598-020-66430-x. M.M.M. designed, supervised and conducted the experiments; interpreted data and wrote the manuscript. C.E.G., A.K.S. and T.Z. conducted the experiments, analyzed data and contributed to writing of manuscript and assembling figures and tables. L.D. contributed to writing the manuscript. K.H. and P.C.C. contributed in surgical procedures. F.S. and B.L. contributed to day-to-day animal care and helped with surgical care. D.A. provided the genetically engineered pigs. I.T. directed cared for the animals in this study and helped review the manuscript. A.H. conducted many of the assays in this study and helped review the manuscript. All authors critiqued and the manuscript and assembled the video. This study was supported by funding from United Therapeutics, Inc and the NIAID, NIH grant 5U19090959-10. David Ayares is an employee of Revivicor, Inc. There are no conflicts of interest to disclose by any other authors.
{ "pile_set_name": "PubMed Central" }
Hello, my name’s John Curnow, I am in Immunologist, I have a research group here at the University of Birmingham and I’m the programme director for the new MSc in Immunology and Immunotherapy. The programme is delivered as a mixture of both lectures and small group tutorials of 10 to 15 students. There’s also a substantial research project carried out in one of the laboratories across the campus. Immunology impacts on every area of medicine and we have an enormous potential to control the immune response. Examples include vaccination for infectious disease but also vaccination for cancer. So why study immunology at Birmingham? Because you will be taught by scientists at the cutting edge of their discipline. These scientists study both the fundamentals of the immune system, but also there are clinical scientists who are carrying out clinical trials in the use of immunotherapy to treat disease. To complement the expertise of the teaching staff we have a fantastic range of cutting edge research laboratories and equipment available to the students, especially when they carry out their research projects. Every student on the programme will carry out a research project of around four months and they will carry these out in these internationally renowned research groups being fully integrated into those research environments. So when you’ve completed your MSc programme, what will this enable you to do? Well many of our students will go on and study at PhD, either staying at the University of Birmingham or going elsewhere in the UK or the rest of the world. In addition, however, there is of course a very large job market in this multi-billion dollar industry in the pharmaceutical and biotechnology world. Alongside that, some people may decide that they want to move slightly sideways and may go into scientific media or publishing. We welcome applications from anyone with any biological science or biomedical science degree. If you require any further information, please feel free to contact me by email and I hope to see you in September.
{ "pile_set_name": "YoutubeSubtitles" }
Zsolt Fehér (footballer, born 1985) Zsolt Fehér (born 13 September 1985 in Székesfehérvár) is a Hungarian football player who currently plays for Tiszafüred VSE. References External links Profile at HLSZ Zsolt Fehér at MLSZ Category:1985 births Category:Living people Category:Sportspeople from Székesfehérvár Category:Hungarian footballers Category:Association football defenders Category:Fehérvár FC players Category:Lombard-Pápa TFC footballers Category:FC Tatabánya players Category:BFC Siófok players Category:Békéscsaba 1912 Előre SE footballers Category:Nemzeti Bajnokság I players Category:Nemzeti Bajnokság II players
{ "pile_set_name": "Wikipedia (en)" }
Comforting chatbot February 5, 2014 Chatting with the customer service is now considered normal. But what if 'Eva', 'John' or 'Julia' were capable of not just solving technical problems but also providing us with emotional support? Janneke van der Zwaan investigated this possibility in the NWO research programme Responsible Innovation. She will defend her doctoral thesis on March 10. Someone who is upset, angry or depressed is less capable of taking wise decisions and solving problems. That was the starting point for the research of Janneke van der Zwaan, who will shortly defend her doctoral thesis at Delft University of Technology. Sometimes a person needs a sympathetic listening ear before they can be receptive to good advice. That applies just as much in the virtual world as it does in real life. But an empathic chatbot did not exist yet. Bullied children Van der Zwaan is an expert in the area of artificial intelligence. She developed a prototype for an empathic virtual 'buddy' for children who are being bullied. His name is Robin. 'I was mainly interested in the effects of Robin's appearance and behaviour on his conversation partners', says Van der Zwaan. 'I therefore kept the programme behind the robot as simple as possible. For example, I make use of multiple-choice answers. Chatting in a natural language is in itself already very difficult and that would only obscure our view of the interaction.' Imitating people Robin looks like a sort of SpongeBob who can do two things: chat (according to a preprogrammed question and answer model) and show emotions through his facial expressions. The emotions Robin can show have also been programmed. How can a fully programmed chatbot do something so inherently human as offer comfort? Very simple, explains Van der Zwaan: 'By imitating people.' Models She based the software behind Robin on models for human conversations in which emotional support is provided. Some of these are 'from textbooks', prescribed as an effective method for holding coaching conversations. Others have been acquired from hundreds of informal conversations in which friends, acquaintances or colleagues tried to support each other. From the various models, Van der Zwaan distilled a single conversation model with questions such as 'what happened exactly?', 'how do you feel now?' and 'have you tried this before?' and answers such as 'I am really sorry for you' and 'well done', 'smart, that you blocked this bully', or 'well done, that you talked to someone about the bullying'. Tests Van der Zwaan first tested the comforting cyberbuddy among one hundred students, then among professional care providers and then finally a group of children. The majority of people were convinced that a bullied child would feel better after chatting with Robin. The professional care providers found Robin's appearance too square and unnatural, whereas the children liked this aspect. The professional care providers found the combination of answers and facial expressions particularly comforting but for the students, the children were most happy with the practical advice. First step 'On balance, Robin therefore appears to be a successful empathic virtual buddy', says Van der Zwaan. 'This is still just a first step. The animations can be refined far more and greater variation needs to be brought into the conversations. But the underlying principle works; this study has demonstrated that. Also people who initially felt resistance towards the idea of a virtual character that got involved with human emotions still "came round" once they had talked with Robin.' Taboos Bullying is not the only area where empathic chatbots can play a role. Van der Zwaan: 'I deliberately chose this subject because children find it difficult to talk about it with their parents. The threshold for bringing up the subject with a virtual buddy is far less. There are more such taboo subjects. Examples are abuse, coping with grief or loneliness. A buddy could also be used as a coach for people who are on a diet, need to take medicines or quit smoking.' Further development Van der Zwaan is now looking for investors with who she can develop her prototype further. Of course a virtual buddy can never replace real human contact, she emphasises, let alone treatment. 'However, chatbots can certainly play a role in the first step towards a broader package of support or be a part of such a package, as long as they are warm and empathic. My research has shown that we can construct such "warm" virtual personalities.' Related Stories University of Twente researcher Machiel van der Bijl has developed a system that eliminates the need to test software manually. The system not only facilitates quick and accurate software testing, but it will also save software ... Honeybees can do far more than simply pollinate plants or make honey. The busy creatures also make excellent environmental monitors. This has been demonstrated by Wageningen UR bee researcher Sjef van der Steen. He used ... Nanotechnology can help solve many problems. But it is a technology that involves risks as well, for people and for the environment. In a PhD study conducted at Alterra Wageningen UR and Wageningen University, doctoral candidate ... (Phys.org) —Researchers working at the French National Center for Scientific Research have for the first time, directly measured the Van der Waals force between two atoms. In their paper published in the journal Physical ... Recommended for you It sounds like a science-fiction nightmare. But "killer robots" have the likes of British scientist Stephen Hawking and Apple co-founder Steve Wozniak fretting, and warning they could fuel ethnic cleansing and an arms race. Photos. Messages. Bank account codes. And so much more—sit on a person's mobile device, and the question is, how to secure them without having to depend on lengthy password codes of letters and numbers. Vendors promoting ... A startup team calls their work a product. They also call it a social movement. Many people in the over-7,000 islands in the Philippines lack access to electricity .The startup would like to make a difference. Their main ...
{ "pile_set_name": "Pile-CC" }
using CSharpGL; using System; using System.Collections.Generic; using System.Drawing; using System.Linq; using System.Text; namespace PointLight { /// <summary> /// Render a Cube with single color in modern opengl. /// </summary> public class LightPositionNode : PickableNode, IRenderable { private const string inPosition = "inPosition"; private const string projectionMat = "projectionMat"; private const string viewMat = "viewMat"; private const string modelMat = "modelMat"; private const string color = "color"; private const string vertexCode = @"#version 330 core in vec3 " + inPosition + @"; uniform mat4 " + projectionMat + @"; uniform mat4 " + viewMat + @"; uniform mat4 " + modelMat + @"; void main(void) { gl_Position = projectionMat * viewMat * modelMat * vec4(inPosition, 1.0); } "; private const string fragmentCode = @"#version 330 core uniform vec3 " + color + @" = vec3(1, 1, 1); layout(location = 0) out vec4 outColor; //out vec4 outColor; void main(void) { outColor = vec4(color, 1); } "; private CSharpGL.PointLight light; /// <summary> /// Render propeller in modern opengl. /// </summary> /// <returns></returns> public static LightPositionNode Create() { var vs = new VertexShader(vertexCode); var fs = new FragmentShader(fragmentCode); var provider = new ShaderArray(vs, fs); var map = new AttributeMap(); map.Add(inPosition, CubeModel.strPosition); var builder = new RenderMethodBuilder(provider, map, new PolygonModeSwitch(PolygonMode.Line), new LineWidthSwitch(3)); var node = new LightPositionNode(new CubeModel(), CubeModel.strPosition, builder); node.Initialize(); return node; } /// <summary> /// Render propeller in legacy opengl. /// </summary> private LightPositionNode(IBufferSource model, string positionNameInIBufferable, params RenderMethodBuilder[] builders) : base(model, positionNameInIBufferable, builders) { this.ModelSize = new vec3(1, 1, 1) * 0.3f; this.AutoRotate = true; } /// <summary> /// /// </summary> public bool AutoRotate { get; set; } private ThreeFlags enableRendering = ThreeFlags.BeforeChildren | ThreeFlags.Children | ThreeFlags.AfterChildren; /// <summary> /// Render before/after children? Render children? /// RenderAction cares about this property. Other actions, maybe, maybe not, your choice. /// </summary> public ThreeFlags EnableRendering { get { return this.enableRendering; } set { this.enableRendering = value; } } /// <summary> /// /// </summary> /// <param name="arg"></param> public void RenderBeforeChildren(RenderEventArgs arg) { if (!this.IsInitialized) { this.Initialize(); } if (this.AutoRotate) { float delta = 1; this.RotationAngle += delta * 31; var position = new vec3( (float)Math.Cos(this.RotationAngle / 5 * Math.PI / 180.0), (float)Math.Cos(this.RotationAngle / 50 * Math.PI / 180.0), (float)Math.Sin(this.RotationAngle / 5 * Math.PI / 180.0)) * 9; this.light.Position = position; this.WorldPosition = position; } ICamera camera = arg.Camera; mat4 projection = camera.GetProjectionMatrix(); mat4 view = camera.GetViewMatrix(); mat4 model = this.GetModelMatrix(); var method = this.RenderUnit.Methods[0]; // the only render unit in this node. ShaderProgram program = method.Program; program.SetUniform(projectionMat, projection); program.SetUniform(viewMat, view); program.SetUniform(modelMat, model); method.Render(); } public void RenderAfterChildren(RenderEventArgs arg) { } public void SetLight(CSharpGL.PointLight light) { this.light = light; } class CubeModel : IBufferSource { public vec3 ModelSize { get; private set; } public CubeModel() { this.ModelSize = new vec3(xLength * 2, yLength * 2, zLength * 2); } public const string strPosition = "position"; private VertexBuffer positionBuffer; private IDrawCommand drawCmd; #region IBufferable 成员 public IEnumerable<VertexBuffer> GetVertexAttribute(string bufferName) { if (bufferName == strPosition) { if (this.positionBuffer == null) { this.positionBuffer = positions.GenVertexBuffer(VBOConfig.Vec3, BufferUsage.StaticDraw); } yield return this.positionBuffer; } else { throw new ArgumentException(); } } public IEnumerable<IDrawCommand> GetDrawCommand() { if (this.drawCmd == null) { this.drawCmd = new DrawArraysCmd(DrawMode.TriangleStrip, positions.Length); } yield return this.drawCmd; } #endregion private const float xLength = 0.5f; private const float yLength = 0.5f; private const float zLength = 0.5f; /// <summary> /// four vertexes. /// </summary> private static readonly vec3[] positions = new vec3[] { new vec3(+xLength, +yLength, +zLength),// 0 new vec3(+xLength, -yLength, +zLength),// 1 new vec3(+xLength, +yLength, -zLength),// 2 new vec3(+xLength, -yLength, -zLength),// 3 new vec3(-xLength, -yLength, -zLength),// 4 new vec3(+xLength, -yLength, +zLength),// 5 new vec3(-xLength, -yLength, +zLength),// 6 new vec3(+xLength, +yLength, +zLength),// 7 new vec3(-xLength, +yLength, +zLength),// 8 new vec3(+xLength, +yLength, -zLength),// 9 new vec3(-xLength, +yLength, -zLength),// 10 new vec3(-xLength, -yLength, -zLength),// 11 new vec3(-xLength, +yLength, +zLength),// 12 new vec3(-xLength, -yLength, +zLength),// 13 }; } } }
{ "pile_set_name": "Github" }
Getting started, Hello Java 3D! 3.1 Installation 3.2 Your first Java 3D application3.3 Exercises for the reader 3.4 Summary Now the fun begins. It’s time to begin conquering the Java 3D development environment, setting ourselves up for serious Java 3D fun in the chapters to come. I’ll introduce a realistic Java 3D application to test your configuration, and allow you to experiment with some of the features described in later chapters. You’ll look at a simple Java 3D example, SimpleTest, that illustrates building an AWT−based Java 3D application. The SimpleTest example uses the Sun utility classes MainFrame and SimpleUniverse (included with your Java 3D distribution) to hide some of the complexities that we will be delving into in the chapters to come.
{ "pile_set_name": "Pile-CC" }
The present invention relates generally to a novelty card having printed images thereon and the method for making the same where, upon removal of an insert from the card by the user, a foreground image is combined with a background image to produce a new, combined image. The novelty card can be used as a magazine insert component, direct mail unit, hand out, or other means within the print media area of the graphic arts industry. Novelty cards having an image which changes upon the removal or repositioning of a panel, divider or insert have been known for some time. Typically, these novelty cards have a foreground image printed upon a transparent sheet, which is separated by a divider from a background image printed on an opaque sheet of paper. The transparent sheet and the opaque sheet are attached along one of their respective edges, and together straddle a divider which is fixed to the card and which keeps the images separated. The background image is hidden from view until the attached transparency and opaque sheet are pulled out of the card and spatially displaced from the divider. Upon pulling the sheets from the card, the foreground image is superimposed upon, and combines with the background image to either complete the foreground image or to create a new, combined image. The opaque sheet may include laterally projecting stop tabs to prevent the complete withdrawal of the sheets from the card. U.S. Pat. No. 4,697,364 to Dean is an example of this type of novelty card. Unfortunately, because currently available novelty cards of the type described are generally expensive and complicated and slow to manufacture, they have not been extensively used in volume type advertising, promotion or other commercial uses. The high costs of manufacturing currently available novelty cards having changeable images is basically attributable to the limitations of typical basic printing and off-line assembly machinery, and usually by human hand operations. Novelty cards of this type generally use a fixed divider that separates the images, and are manufactured by complicated separate functions and expensive folding, die cutting and gluing techniques that cannot be performed on in-line web offset printing and/or in-line finishing systems. Currently available novelty card production processes require costly and time consuming reorientation of the paper and transparency plastic webs, and multiple passes through the printing, die cutting, folding and gluing assembly machinery to manufacture the cards properly. Further, currently available novelty cards of this type typically entail the use of costly photographic techniques for forming the desired images to be used on the card. Finally, not only is it expensive to manufacture such novelty cards, but the availability of such novelty cards has been limited because those in the printing business have not found it technically practical to make the necessary adaptations to their production lines.
{ "pile_set_name": "USPTO Backgrounds" }
Krajowe Eliminacje Krajowe Eliminacje (National Qualification) is the Polish national selection for the country's entry to the Eurovision Song Contest. The first Krajowe Eliminacje contest was held in 2010. In 2003–2004 the national selection was named to the Krajowe Eliminacje do Konkursu Piosenki Eurowizji and in years 2006–2009 under the name Piosenka dla Europy. History 2010–2011 In 2010, TVP decided to change the name of the national finals to National Qualification. By fans' involvement Marcin Mroziński with his song "Legenda" got a wild card to national final and he won national eliminations. At Eurovision he did not qualify for the final and in the semi-finals he took 13th place. In 2011 the national qualification was won by Magdalena Tul with her song "Jestem", the song met with positive reception of the fans, however, Magdalena did not qualify to the Eurovision final and she took the worst result in the history of Poland on the Eurovision Song Contest. After that, TVP decided that it would not send Polish representatives to Eurovision in 2012 and 2013. 2016–2018 Polish Television (TVP) decision not to send representatives to Eurovision in 2012 and 2013 caused a controversy in Poland.http://muzyka.interia.pl/pop/news/eurowizja-znow-bez-polski,1866063,50 It has resumed its support in 2014. However, unlike in the previous recent editions, the Polish representative was selected not by the public, but by an internal TVP commission (as has happened in the years 1994–2002 and 2005); the resulting lack of transparency was also criticized. Because of this, the selection returned in 2016, supported by the new management of TVP and deemed as a more correct way to choose the entry for Eurovision. The legend of Polish Eurovision Edyta Górniak and biggest Polish stars (Margaret, Michał Szpak etc.) came to pre-selection in 2016. In 2016 the national final were won by Michał Szpak with his song "Color of Your Life". Michał Szpak achieved great success in Stockholm, he took 6th place in semi final (he qualify to final) and in the final he took 8th place. The TVP recognized that the pre-selections were successful and decided to continue organizing them. In 2017, the interest turned out to be smaller. Kasia Moś with her song "Flashlight" won National Qualificiation 2017. She was qualify to the finals from 9th place and in the finals she took 22nd place. National Qualification 2018 wins Polish DJ Gromee with Swedish singer Lukas Meijer with song "Light Me Up". They did not reach the final. After this in 2019 Polish national broadcaster back to internal selection due poor results at Eurovision. List of winners See also Krajowe Eliminacje do Konkursu Piosenki Eurowizji Piosenka dla Europy Poland in the Eurovision Song Contest External links Polish Official Site References Category:Poland in the Eurovision Song Contest Category:Eurovision Song Contest selection events es:Piosenka dla Europy pl:Eliminacje do Konkursu Piosenki Eurowizji w Polsce
{ "pile_set_name": "Wikipedia (en)" }
Kris Jenner vows revenge on the guy who called CPS Kris Jenner vows revenge on the guy who called CPS Kris Jenner vows revenge on the guy who called CPS October 30, 2012JEREMY FEIST Soooooo … hurricane Sandy. Look, I’m sure most of you don’t live on the east coast, but holy hell, last night was not fun. NO ME GUSTA. Lindsay Lohan was wrong: You cannot get rid of a hurricane with happy thoughts and sunshine dreams. Who knew? Well, everything seems to be on the up-and-up again, so let’s sally forth into the realm of stupid famous rich people being stupid, shall we? First up, here’s a bit from TMZ about how Kris Jenner is vowing to get the guy who called in a fake report to Child Protection Services, claiming that her daughters Kylie and Kendall Jenner were in danger. As we previously reported, the L.A. County Department of Children and Family Services launched an investigation into the K-family last week after receiving a tip from an anonymous caller. The tip was determined to be bogus … and we’re told Kris believes the culprit is a tabloid reporter who was trying to make up a story. Now, a rep for the Kardashian family tells TMZ the accusations are nothing short of “ridiculous” … adding, “It’s such a shame that anyone can make up such hurtful and hideous untruths especially when children are involved.” The rep continues, “We are taking this matter very seriously and investigating to find out who is responsible for fabricating such a terrible story and will take the necessary legal action so that this does not happen again.” In all fairness, we managed to get a transcript of the call to CPS, and here it is in its entirety: CPS: Hello, Child Protection Services, how can I help you?Caller: Children are living with Kris Jenner.CPS: We’re sending our entire FBI squad right now, sir.Caller: Did I mention it’s Kris Jenner?CPS: We’re sending an old priest and a young priest too.
{ "pile_set_name": "Pile-CC" }
Two novel mutations of the vasopressin gene associated with familial diabetes insipidus and identification of an asymptomatic carrier infant. Familial diabetes insipidus (FDI) is a syndrome of central vasopressin deficiency that is inherited in an autosomal dominant manner and that typically becomes clinically apparent in the first decade of life. Two novel mutations of the vasopressin gene have been identified in two previously unstudied kindreds with FDI. In each kindred, the inheritance of the FDI phenotype was consistent with an autosomal dominant mode of inheritance. In each proband, the diagnosis of central diabetes insipidus had been confirmed previously with a water deprivation protocol. After extraction of genomic DNA from each individual, the three exons of the vasopressin gene were separately amplified by PCR and directly sequenced using an automated dye termination method. In the proband and two other carriers of one kindred, a heterozygous C to T mutation was identified at nucleotide 1857. This is predicted to produce a serine to phenylalanine substitution at residue 56 of the vasopressin-related neurophysin peptide encoded by the mutated allele. The mutation also abolished an MspI site in the vasopressin sequence, and analysis of genomic DNA from eight members of the kindred (five with FDI) confirmed segregation of the mutation with the FDI phenotype. Another member of the kindred, a 13-month-old infant, also has the heterozygous C to T mutation, but a formal water balance study showed no evidence of diabetes insipidus. In the proband of the other kindred, a heterozygous G to A mutation was identified at nucleotide 1873. This mutation would be predicted to cause a cysteine to tyrosine substitution at residue 61 of the neurophysin encoded by the mutated allele. This heterozygous mutation was confirmed by the presence of an RsaI restriction site in one vasopressin allele in two members of the kindred. Therefore, two novel heterozygous mutations of the vasopressin gene have been identified in FDI kindreds. In one kindred, an asymptomatic carrier infant was identified and will require continued observation to determine whether she will develop clinical diabetes insipidus. The presence of these two novel mutations in a region of the vasopressin gene where other FDI mutations have been reported suggests that the part of the neurophysin peptide encoded by these sequences may be critically important in the appropriate expression of vasopressin.
{ "pile_set_name": "PubMed Abstracts" }
Romidepsin in relapsed/refractory T-cell lymphomas: Italian experience and results of a named patient program. Clinical trial results indicate that romidepsin, a histone deacetylase inhibitor, is a promising treatment in relapsed/refractory T-cell lymphomas (TCLs). This retrospective multicenter study was conducted in patients with relapsed/refractory TCL treated with romidepsin monotherapy through a Named Patient Program (NPP) in Italy. Principal endpoints were overall response rate (ORR), safety, and overall survival (OS). The ORR in 33 evaluable patients was 24.2% with an ORR in the cutaneous TCL of 35.7%. Global OS was 39.3% at 30 months. There were not any specific differences on hematological and extrahematological adverse events. Data from patients treated with romidepsin outside a controlled clinical trial give additional information about the clinical use, efficacy, and toxicity of the drug given to relapsed or refractory TCL patients in a real life context as TCLs are rare diseases and more information is needed. These findings suggest that romidepsin is effective and safe for heavily pretreated TCL patients.
{ "pile_set_name": "PubMed Abstracts" }
TV Review: 'Game of Thrones' Returns With Its Ambitious Glory Intact Proving again that a genre series can be as serious and challenging as traditional dramas, "Game of Thrones" kicks off what should be its most ambitious season -- which is really saying something for this dense, layered epic. TWITTER Season 3 promises to be filled with even more characters and locations as the epic fantasy series proves it's one of television's finest dramas. Much of the chatter that drives HBO’s addictive and outstanding drama series Game of Thrones tends to come from people who have read the books by George R.R. Martin, even though relatively speaking they are a minority. But they know a lot. They are very devoted and insider-y and can recall characters that barely have graced the screen -- and even then are covered in dirt and hardly recognizable. These book-first, awesome-television-series second types are way, way ahead of everyone else. PHOTOS: 'Game of Thrones' Season 3 Preview: 23 New Photos They have conversations amongst themselves about what’s being left out from the books and how effectively the massive tomes are being divided into a TV series. And much of their driving internal force comes from wondering what David Benioff and D.B. Weiss, the series creators, writers and show runners will do with the characters and events these fans already know the fates of; they can’t be satiated. For the rest of us, well, Game of Thrones is first and foremost one of the most ambitious and creatively challenging (and rewarding) series on television. Secondly, it’s mighty dense. If you lack sufficient bandwidth in your memory or you haven’t “marathoned” the previous season right before staring the next one, break out the Advil. That said, having watched the first four episodes of Season 3, there are barely a handful of series that generate this kind of fervent appreciation for the skills at hand. It’s like being in some epic tale that never ceases to be engrossing and creates a kind of demanding, spoiled attitude that culminates in this despondent and annoyed declaration: “Why do they only make 10 episodes a season!?” PHOTOS: 'Game of Thrones' Season 3 Premiere: Westeros Meets Hollywood And yes, after the first two 10-episode seasons on HBO, it’s clear that no other genre series has managed the leap to greatness quite as quickly as Game of Thrones. The series took fantasy, a la The Lord of the Rings, and made it as intellectually significant as the deep existential musings of Mad Men and as rigorously fast-paced and addictive as Breaking Bad by creating worlds and rules and legends that have no bearing on “the real world” but echo its deepest mysteries, worries, complications and mundane daily realities. In that sense, it takes what outsiders might consider “some sci-fi show” and turns it on its head, revealing that great art can come from any genre provided (in the television landscape) if the writing, acting and ambition are there. Season 3, starting at 9 p.m. Sunday, can be comfortably described as insanely ambitious. In a series that already has so many characters and interwoven storylines, viewers get two fascinating new characters in Mance Rayder (Ciaran Hinds), the King-Beyond-the-Wall and Olenna Redwyne (Diana Rigg), a new location in Astapor, bands of warriors forgotten since Season 1 and enough fallout and intrigue from Season 2 to last a whole lot longer than 10 episodes (the third book in Martin’s series will be split into this season and the next because it was so massive). PHOTOS: 'Game of Thrones' Season 3 Character Posters Benioff and Weiss have said that Season 3 will, in fact, be the most packed of all because it builds so many stories (and necessitates new arrivals) but that moving forward there will the typical Game of Thrones winnowing out, which usually means some popular character you think will live forever ends up with his or her head on a spike. (In this area, so much praise must be given to the readers of Martin’s books because they haven’t spoiled anything for the rest of us -- though, given the influence of social media, they quite easily could if they wanted. It’s that devotion to quality television and not wanting to ruin it for anybody that makes shows like this so special.) And in keeping with the no-spoiler rule, all that really needs to be said about Season 3 is that the first four hours are immensely enjoyable and leave you, at the end of each, pleading like a junkie for the next six. This, of course, is the curse of Thrones' finest achievement, and it does have one unfortunate side effect for the individual episodes: This sprawling story being told in only 10 episode doles out in an hour only precious morsels of plot from a variety of characters and clans, then abruptly switches to the next character or clan and so on. The end result is, despite the brilliant quality, a bubbling frustration for more, more, more. But if that’s the main drawback of your series -- that viewers are so enraptured that they get frustrated in their desire for additional scenes, episodes or seasons -- then you’re doing something truly right. Here’s to a dense, layered, enterprising and fascinating journey through Season 3, and as many more seasons as need be to complete this incomparable fantasy. Email: Tim.Goodman@THR.com Twitter: @BastardMachine
{ "pile_set_name": "OpenWebText2" }
Solution structure of BmP01 from the venom of scorpion Buthus martensii Karsch. From the venom of scorpion Buthus martensii Karsch,a short peptide (BmP01, 29 amino acid residues) was isolated and characterized as previously reported (Lebren, R. R., et al. (1997) Eur. J. Biochem. 245, 457-464). It was shown to reduce 33% outward K(+) channel (hippocampal neurons) currents at 10 microM. The solution structure of BmP01 was determined by 2D (1)H NMR spectroscopy. The NOEs, coupling constants, and H-D exchange obtained from NMR spectroscopy were used in structural calculations. The conformation of BmP01 is composed of a short alpha-helix (Cys 3-Thr 12) and a two-stranded antiparallel beta-sheet (Ala 15-Asp 20 and Lys 23-Pro 28). There are three disulfide bridges (Cys 3-Cys 19, Cys 6-Cys 24 and Cys 10-Cys 26) connecting the alpha-helix and beta-sheet. Asp 20 to Lys 23 form a type II turn linking the two strands. Structural and electrostatic potential comparison between BmP01 and its analogues are also presented.
{ "pile_set_name": "PubMed Abstracts" }
How to Ask for Support and Create Networks in the Early Stages of Your Career is hosted by BlackRock. ICEDR partner companies may send 6 early career women. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. For high-potential women in the first decade of their careers, this program will help early career women build meaningful and effective relationships at work. The program will feature the latest research on how to ask for support and create networks. Alison Wood Brooks, Assistant Professor, Harvard Business School will deliver a session on “How to Talk: The Transformative Power of Conversation." In addition, we will explore how to build connections through dialogue, stories from women role models, and interactive exercises. Join other HR leaders to discuss the leadership that will be needed to help organizations thrive in the new world of work. You will hear recent work one the topic from London Business School's Julian Birkinshaw and ICEDR's President Doug Ready. ICEDR partner companies may send 4 early career women. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. For high-potential women in the first decade of their careers, QUEST offers a one-day program to give early career women the skillsets and mindsets to grow their careers. The program will feature tactical sessions on the essential skills emerging women leaders must cultivate. Isabel Fernandez-Mateo, Adecco Professor of Strategy and Entrepreneurship, London Business School will deliver a session on “Building Your Career Strategy”, which is a version of the course she teaches at LBS. In addition, participants will benefit from a skill-building session on “Leading Authentically” and will enhance their ability to be the best possible version of themselves. The program will also feature the outputs of QUEST’s “Make It Happen” research that highlights the mindsets high-powered women display. A panel of senior-level women executives will bring this research to life through their career lessons for the next generation of women leaders. ICEDR partner companies may send 6 emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. For high-potential women in the first decade of their careers, QUEST offers a one-day program to give early career women the skillsets and mindsets to grow their careers. The program will feature tactical sessions on the essential skills emerging women leaders must cultivate. In addition, we will explore the mindsets of high-powered women through dialogue, stories from women role models, and interactive exercises. The ICEDR What Great Top Leadership Teams Do Program is hosted by Shell. Virtually every organization has a leadership team. But what is it that makes a leadership team a great team? What does it do either better or differently from other top teams? What does it feel like in the organization when that top team is operating at peak performance? How do top teams become great? Is it luck- the draw of the cards? Or, do they need nurturing, pruning, and cultivation? During this one-day highly interactive session we will examine the skillsets and mindsets of great top leadership teams, and we’ll look at how these teams work together to build new capabilities and drive change. We will also look at case examples of what companies are doing to build great leadership teams. The session will be highly relevant to today’s challenges, drawing upon recent research and extensive practical applications. We had an extraordinary Global Talent Summit at Fung Academy in Hong Kong April 17-18, 2018, with many of China’s leading companies presenting. We videotaped much of the summit and will be posting edited versions of some of the presentations over the next few weeks. Here are the first videos-check back often for new releases: Looking Ahead: Talent Strategy along the New Silk Road The QUEST Early Career Women's Program - Hong Kong is hosted by Esquel Group. ICEDR partner companies may send 4 high-potential emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. For high-potential women in the first decade of their careers, ICEDR offers a one-day program to give early career women the skillsets and mindsets to grow their careers. The program will feature tactical sessions on the essential skills emerging women leaders must cultivate. In addition, we will explore the mindsets of high-powered women through dialogue, stories from women role models, and interactive exercises. Partner companies may send 6 participants from all parts of the organization (not just HR). Partner business schools may send 1 participant. Today’s leaders need to demonstrate both vertical and horizontal depth- they must lead their businesses, functions, projects and geographies while also behaving with the broader enterprise in mind. As such, these “next-gen leaders” must possess the skillsets of a business leader and the “mindset” of an enterprise leader. During this day-long session we will explore the skillsets and mindsets of the enterprise leader and look at examples of excellence in practice in developing your next generation of enterprise leaders. The QUEST Early Career Women's Program - London is hosted by HSBC. ICEDR partner companies may send 4 emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. For women in the first decade of their careers, we offer a one-day program to give early career women the skillsets and mindsets to grow their careers. QUEST research on early career women identifies five factors that rising women stars value. Thus, the program is structured along 5 modules: Know Me: Invest the time to know me as a person, including my passions, interests, and needs both in and out of work.Challenge Me: I need to grow and continue my learning through new challenges and see multiple paths to advancement.Connect Me: I want to interact, collaborate, and build relationships with a dynamic network of peers, leaders, mentors, coaches, and sponsors.Inspire Me: I want purpose from my workplace from which I derive a sense of meaning.Unleash Me: I want to lead initiatives, have my voice heard, and use my entrepreneurial flair. At this interactive program, aspiring women leaders will connect with peers from top firms, take a strategic approach to their professional development, and be inspired by executive women role models. The HR’s Journey to the C-Suite – Becoming an Enterprise Leader Program is hosted by London Business School. Partner companies may send 4 participants. Partner business schools may send 1 participant. We live in a world that is in a permanent state of uncertainty and turbulence. Business leadership success is founded on having the right asset, product, financial and human capital strategy. The Board and CEO look to the top HR team to provide expertise, leadership and guidance on how best to position and re-position the human capital strategy, in order to cope with these ever-changing economic, technological and political circumstances. For those in HR who aspire to be a part of their organizations’ leadership team, learning how to adapt and thrive in this environment is essential for success. Whether you are a senior specialist or HR generalist, understanding and acquiring the skillsets and mindset of an enterprise leader are essential in order to be effective at the highest organization level. This program explores what it takes to progress to an enterprise leadership role and to have a real voice in both the C-Suite and the Boardroom. The QUEST Early Career Women's Program - Washington D.C. is hosted by Georgetown University's McDonough School of Business. ICEDR partner companies may send 6 emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. For women in the first decade of their careers, we offer a one-day program to give early career women the skillsets and mindsets to grow their careers. This program features a world-class faculty team, including Christine Porath, Associate Professor of Management, Georgetown University’s McDonough School of Business and Betsy Myers, Former Senior Advisor on Women’s Issues to Presidents Barack Obama and Bill Clinton. At this interactive program, aspiring women leaders will connect with peers from top firms, take a strategic approach to their professional development, and be inspired by executive women role models. This research roundtable is hosted by Shire. The target audience for this roundtable is women in the first decade of their careers in line roles. QUEST is moving forward with the next phase of research focusing on "Make It Happen! How Women Leaders Unleash Their Strengths". This roundtable will be led by the QUEST research team and will allow participants to have their voices heard, connect with peers from top companies, and contribute to this important initiative. The ICEDR Global Innovations Summit - Developing Leaders for a VUCA World is hosted by Baker McKenzie and McKinsey. We know the world is changing fast. We know technological breakthroughs have accelerated beyond what we thought possible. We know that demographics and cultural norms are changing the way work is done, as well as the relationships between employees and their organizations. We know that economic power is shifting from West to East. We know that customers have more knowledge than ever before and are therefore more demanding than ever before. But do we know what this means from a talent management, leadership development and organizational design perspective? Are we fully prepared to spot the leaders of the future in this ever-changing world? Are we as agile and resilient as we know we need to be? We will tackle these and other topics at the ICEDR Summit, with fresh research and practical company presentations on innovations concerning the workplace of the future and the leadership capabilities needed to not only survive, but to thrive in a VUCA World. ICEDR partner companies may send 4 emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. Are you an early career woman leader looking to enhance your business skills and develop strategies to achieve your goals? At this interactive program, you will connect with peers from top firms, take a strategic approach to your professional development, and be inspired by executive speakers. The Building Game Changing Organizations Program is hosted by AGSM Business School.Partner companies may send 4 participants. This program would be especially beneficial to senior level line and HR leaders who are engaged in building next generation organizational capabilities in their companies. Partner business schools may send 1 participant. Game-changing organizations rewrite traditional playbooks. They stand out. They often create disproportionate value relative to their size and resources. They have big dreams but know how to get things done. These organizations have a palpable "buzz" to them. They have a breakaway business model, but they also have a breakaway spirit and organizational culture. Leaders of these game-changing organizations understand the power and importance of telling their companies' compelling stories. They are hard-edged business leaders but they also embrace what others might consider to be the "soft side" of leading: purpose, vision, and climate. They know how to integrate the hard and soft sides of leadership into a powerful formula that makes them game-changers. These leaders and their organizations are purpose-driven, performance-oriented, and principles-led. The weaving together of these three capabilities simultaneously is what helps them get and stay out in front. ICEDR partner companies may send 4 emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. Are you an early career woman leader looking to enhance your business skills and develop strategies to achieve your goals? At this interactive program, you will connect with peers from top firms, take a strategic approach to your professional development, and be inspired by executive speakers. ICEDR partner companies may send 4 emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. Are you an early career woman leader looking to enhance your business skills and develop strategies to achieve your goals? At this interactive program, you will connect with peers from top firms, take a strategic approach to your professional development, and be inspired by executive speakers. The Building Game Changing Organizations Program is hosted by London Business School. Partner companies may send 4 participants.This program would be especially beneficial to senior level line and HR leaders who are engaged in building next generation organizational capabilities in their companies. Partner business schools may send 1 participant. Game-changing organizations rewrite traditional playbooks. They stand out. They often create disproportionate value relative to their size and resources. They have big dreams but know how to get things done. These organizations have a palpable "buzz" to them. They have a breakaway business model, but they also have a breakaway spirit and organizational culture. Leaders of these game-changing organizations understand the power and importance of telling their companies' compelling stories. They are hard-edged business leaders but they also embrace what others might consider to be the "soft side" of leading: purpose, vision, and climate. They know how to integrate the hard and soft sides of leadership into a powerful formula that makes them game-changers. These leaders and their organizations are purpose-driven, performance-oriented, and principles-led. The weaving together of these three capabilities simultaneously is what helps them get and stay out in front. ICEDR partner companies may send 4 emerging women leaders. The target audience for this program is women in the first decade of their careers in line roles. ICEDR partner business schools may send 1 participant. At this interactive program hosted by HubSpot, you will discover strategies that will help you - the early career woman - succeed. You will gain insights from two remarkable women leaders - Katie Burke, VP Culture & Experience, HubSpot and Betsy Myers, Senior Advisor, QUEST and former Chair of Women for Obama and former Senior Advisor on Women's Issues to President Bill Clinton. At this event, you will learn how companies are creating cultures where aspiring women leaders thrive, discover how you can bring your authentic self to work, and connect with peers from top firms. ICEDR partner companies may send 4 early career talents (target audience: men and women in first decade of their careers in line roles). ICEDR partner business schools may send 1 participant. Are you an early career leader looking to enhance your business skills and develop strategies to achieve your goals? What is key in your journey from individual contributor to manager? How can you become a better “reverse” mentor and learn from your interactions? At this interactive program, you will connect with peers from top firms, take a strategic approach to your professional development, and be inspired by executive speakers. The annual ICEDR Global Innovations Summit is ICEDR's flagship program and is intended as a learning opportunity for ICEDR's most senior-level audience. Each year, approximately 60 senior-level HR executives from ICEDR sponsor companies and senior Executive Education professionals from ICEDR partner business schools gather together to exchange practices, ideas, and challenges. The Summit is highly interactive, leaving ample time for dialogue so participants are able to discuss the challenges their organizations are facing. The ICEDR NextGen Women Leaders Program is hosted by Baker & McKenzie. ICEDR sponsor companies may send 4 emerging women leaders. The primary audience for this program is women in the first decade of their careers in line roles. ICEDR sponsor companies may also send 1 talent management executive. ICEDR partner business schools may send 1 participant. Are you a nextgen woman leader looking to develop your skills, connect with peers from an amazing group of companies, and be inspired to achieve your goals? Join a peer group of millennial women from world-class companies at the ICEDR NextGen Women Leaders Program. At this program, you will learn insights from ICEDR’s research on millennial women, enhance your business acumen, and discover practical strategies that will help you achieve your goals. What are the mission-critical challenges facing companies in the ASEAN region and throughout Asia Pacific? How can a company’s human capital policies and practices help address these pressing challenges? What are the most successful companies doing to attract, develop, reward, and retain the best talent? Can these practices work for your organization? Many CEOs have come to believe that the best way to achieve competitive advantage is through leveraging human resources strategically. The key question is: do your organization’s high potential HR leaders have the strategic thinking skills, action orientation and business acumen required to help your company achieve its objectives? The Asian Talent Summit has been created to help your organization develop these critical capabilities in your next generation talent management and human capital professionals. Program Topics -Look at the talent challenge through the CEO’s eyes -Understand the megatrends that are impacting every company’s competitive strategy -Understand cutting edge practices in talent management -Address the global/local challenge when it comes to building a game-changing talent strategy -Develop globally-minded managers and organizations -Facilitate enterprise-wide change to create next-generation organizations -Gain insights into new challenges for rising talent management executives The world of work is changing at an ever quickening pace. Buffeted by the winds of disruption, Australian organizations are facing an unprecedented challenge to modernise their human capital practices and remain competitive. In an “adapt or perish” style battle for survival, HR teams find themselves squarely in the front line. However, as a function established to manage processes and policies, HR hasn’t traditionally been called on to innovate. So how will we develop innovation capability to deliver what’s needed in the future of work? In this interactive session we’ll ask and answer some of the big questions on the minds of CHRO’s in Australia today: What is HR innovation? Who does it well? How can we develop innovation capability?
{ "pile_set_name": "Pile-CC" }
Q: Chrome extension : jQuery.js conflicts in background file conflics with plugins in websites I am including jQuery in background_page like this, <script type="text/javascript" src="libs/jquery.js"></script> Here's the problem: In websites, where jQuery plugins are used (with jQuery.extend method), they do not work when my extension is installed. I guess this is because I had my jQuery.js over 'their' jQuery.js' file and all .extend do not work. So, I thought of adding jQuery.js only when its not avaialable. So, I tried adding jQuery like this, <script type="text/javascript"> if (typeof jQuery == 'undefined') { var script = document.createElement('script'); script.type = "text/javascript"; script.src = "libs/jquery.js"; document.getElementsByTagName('head')[0].appendChild(script); } </script> But no luck. Can someone suggest me a good way to add jQuery.js file in background page. A: Found an answer later, Doing jQuery.nocConflict jQ = jQuery.noConflict and replacing $ with jQ everywhere, solved the problem. Conclusion: content_scripts can also interfere with webpage javascripts.
{ "pile_set_name": "StackExchange" }
Q: In The Dark Knight, what happened to all the bank robbers? The opening scene of The Dark Knight shows a bank robbery being perpetrated by a gang hired by the Joker. It transpires that they are all supposed to kill each other, with presumably each of them thinking he will be the only one left to split the takings with the Joker, but as they are all wearing clown masks you only find out towards the end of the scene that one of them is The Joker himself. The scene starts with five robbers; two on the roof, and three in the van. One is killed by another after he bypasses the emergency phone call. One is killed after he opens the safe. One is shot by the bank manager after being tricked into believing the manager has run out of ammo in his shotgun, but is shown alive after that as he says to the other "Who taught you how to count?" One (this same one) is killed by the bus when it hits him, and the Joker then kills the bus driver. We don't see what happened to the other one. Are there any deleted scenes or transcripts that tell us what happened to him? A: For the record, the official screenplay identifies the two men on the roof as Dopey and Happy, the three men in the car as Grumpy, Chuckles and Bozo. You've confused Chuckles (whose gunshot was fatal) with Grumpy (whose gunshot was 'superficial') GRUMPY: He’s got three left? [Bozo raises two fingers. Grumpy squeezes off a shot. The Bank Manager fires. Fires again. Grumpy looks at Bozo, who nods. Grumpy jumps up. The Bank Manager fires. Grumpy grunts as buckshot clips his shoulder. Falls. The Bank Manager moves in for the kill, fumbling for new shells. Bozo stands – shoots him.] [Bozo picks up the shotgun. Grumpy checks his wound – it’s superficial. He struggles to his feet.] GRUMPY: Where’d you learn to count?! He was killed by the bus coming in through the front of the bank GRUMPY: Bus driver? What bus – [Bozo steps backwards. Smash. Hostages scream as the tail end of a yellow school bus rockets through the front of the bank, slamming Grumpy into the teller’s window.] For the avoidance of doubt. Happy shoots Dopey on the roof Grumpy shoots Happy in the vault Chuckles is killed by the Bank Manager Grumpy is killed by the bus Bozo presumably kills the unnamed bus driver Bozo survives
{ "pile_set_name": "StackExchange" }
Secretary-General Antonio Guterres has warned that by 2050 global demand for fresh water is projected to grow by more than 40 per cent and at least a quarter of the world’s population will live in countries with a “chronic or recurrent” lack of clean water. He told the Security Council yesterday that “strains on water access are already rising in all regions,” noting that three-quarters of the 193 UN member states share rivers or lake basins with their neighbours. “Water, peace and security are inextricably linked,” Guterres said. “Without effective management of our water resources, we risk intensified disputes between communities and sectors and increased tensions among nations.” The secretary-general said the United Nations is ready to engage in preventive diplomacy to keep the competition for water from sparking conflicts. Bolivian President Evo Morales, whose country currently holds the council presidency, noted that since 1947, some 37 conflicts have taken place between countries related to water. “Our planet, the human family and life in all its myriad forms on Earth are in the throes of a water crisis that will only get worse over the coming decades,” he said. “If current patterns of consumption continue unabated, two-thirds of the world’s population will be facing water shortages as a daily reality by 2025,” Morales added. Right now, he said, more than 800 million people lack access to safe drinking water and more than 2.5 billion don’t have basic sanitation. Morales, who presided over the meeting, said the limited availability of fresh water underscores the importance of tackling the issue and ensuring that access to clean water is shared and doesn’t become “a pretext for domestic or international conflict.” British Ambassador Matthew Rycroft said the world has already seen what can happen “when the waters run dry,” pointing to drought in Somalia that is driving acute food shortages and threatening famine and a lack of clean water that is exacerbating the crisis sparked by Boko Haram in northeast Nigeria and sickening thousands. He said the world currently is not on track to meet UN goals for 2030 calling for improved water security, access to drinking water and sanitation, as well as stronger management of water resources shared by countries. In South Asia, Rycroft said, 1 billion people across Afghanistan, Bangladesh, Bhutan, China, India, Nepal and Pakistan rely heavily on just three rivers, but “despite facing similar problems posed by water demand and climate change, regional collaboration between these countries is limited.” Rycroft said Britain has provided USD 30 million over the past five years to support a regional approach to “identify and resolve challenges affecting these transboundary waters.” But to tackle the problem globally, he urged the world’s developed nations to also invest in delivering improved water security within and between states. In one example of regional cooperation, Ethiopian Ambassador Tekeda Alemu said that while there are differences between the six countries that are upstream and downstream on the Nile River, those nations negotiated for 13 years to produce an agreement on using its waters. It was signed by all six nations and is awaiting ratification by three of them. “The cooperation between Ethiopia, Egypt and Sudan and the signing of the Declaration of Principles by the leaders of the three countries is also another manifestation of regional cooperation that needs to be enhanced further,” he said.
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention The invention relates to a duplicate type servo actuator apparatus which causes an operation unit to be displaced on the basis of an input signal, and also to an aircraft control apparatus which uses such a duplicate type servo actuator apparatus. 2. Description of the Related Art In an aircraft such as a helicopter, a servo actuation system of a hydraulic, electric or electrohydraulic type is used in a control system, a stability augmentation system (SAS), and an automatic flight control system (AFCS). Such a servo actuation system is provided with various countermeasures against hardover. In a system of the mechanical hydraulic type, duplicate spools of a hydraulic control valve and the like are used to realize multiplication of the mechanical and hydraulic systems. In a system of the electric or electrohydraulic type are employed the following countermeasures: 1) the maximum operation amount is restricted so as to exist within such a range that the flight safety is not critically affected even when a hardover occurs; and 2) the system is multiplied to be redundantly managed so that the probability of occurrence of hardover is suppressed to an allowable value or less. As the performance and function of aircraft such as a helicopter are made higher, mechatronics systems are more frequently used. Therefore, it has been studied that a system is highly multiplied to expand an operable range while the maximum operation amount is not limited too much. In particular, triple or quadruple multiplication of a Fly-By-Wire control system, SAS, AFCS or the like realizes the following: a) the probability of function loss (including hardover) suppressed to 10.sup.-9 times/hour in commercial planes or 10.sup.-7 times/hour in military planes; b) specification of the probability of function loss (including hardover) corresponding to the failure influence request level (e.g., 10.sup.-5 times/hour); and c) a failure influence suppression (fail passive, fail soft, fail safe) and separation from a failure system. As higher redundancy is made by multiplication of a system, higher the flight safety is improved. However, such multiplication causes the system to be complicated and increased in size, and cost.
{ "pile_set_name": "USPTO Backgrounds" }
Coronary artery bifurcation narrowing treated by Axxess stent implantation: The CARINAX registry. To compare the safety and efficacy of the Axxess™ biolimus-eluting stent with the second-generation drug-eluting stent (DES) in the treatment of bifurcation lesions. The Axxess™ is a dedicated bifurcation stent, designed to cover the lesion at the carina level. Between April 2012 and August 2014, 165 patients with de novo bifurcation lesions were treated with the Axxess™ stent (Axxess group). A propensity-score matched group of 165 patients treated with DES in the same period was selected (Control group). The primary objectives were (1) the procedural complication rate, including side branch (SB) occlusion and trouble in SB access after main vessel stenting; and (2) the device, the angiographic, and the procedural success rate. Procedural complications occurred in 1 patient (0.6%) in the Axxess group and in 20 patients (12%) in the Control group (OR = 0.03; 95% confidence interval 0.005-0.27; P < 0.001). Device success was obtained in 164 (99.5%) patients in the Axxess group and in all in the Control group (P = 1.00). Angiographic success was obtained in all patients. Inaccurate Axxess™ stent position occurred in 21 (13%) patients, and was more often associated with moderate-to-severe calcifications and distal lesion site. Procedural success was obtained in 91.5% patients in the Axxess group and in 90% patients in the Control group (P = 0.72). The present registry suggests that the Axxess™ stent (1) may represent a valid alternative approach for the treatment of bifurcation lesions and (2) should be avoided in moderate-to-severe calcifications and/or in distal lesions. © 2016 Wiley Periodicals, Inc.
{ "pile_set_name": "PubMed Abstracts" }
President Yo La Tengo President Yo La Tengo is the third album by American indie rock band Yo La Tengo, released in 1989 by record label Coyote. Recording President Yo La Tengo was recorded at Waterhouse studio, except for tracks 4 and 6, recorded at CBGB. The lineup includes Georgia Hubley on drums, Ira Kaplan on guitar and vocals, and Gene Holder on bass guitar (except tracks 4 and 6, recorded live with Stephan Wichnewski on bass). Content The album contains two new versions of instrumental vehicle "The Evil That Men Do" (previously featured on the 1986 album Ride the Tiger), including an extensive live performance. "Orange Song" is a cover of the Antietam song. Release The CD version (released by Coyote/Twin Tone Records) included the band's previous album New Wave Hot Dogs and the A-side of the 1987 single "The Asparagus Song". It was re-released by Matador Records, in 1996. Reception Stereogum wrote: "Featuring a number of great early Yo La Tengo compositions, President Yo La Tengo is an initiation into the creative ethic of a good band that is going to turn great". Track listing References External links Category:Yo La Tengo albums Category:1989 EPs
{ "pile_set_name": "Wikipedia (en)" }
I was struck by a recent study showing that people might be more likely to cheat on a partner in the year before a milestone birthday. This suggests that if you’re in a committed relationship, you’re at roughly a 10-year cycle for heightened risk of infidelity. Researchers said they worked with Ashley Madison, a dating website for people seeking extramarital affairs, to analyze data on more than 8 million men who had registered with the site. The study was one of six published together in the journal “Proceedings of the National Academy of Sciences” in 2014 that examined when people make big life changes. It found 950,000 men were ages 29, 39, 49 or 59, or “9-enders,” and their numbers on the dating site were 18% higher than what would be expected by chance, according to the researchers from New York University’s Stern School of Business and the Anderson School of Management at the University of California, Los Angeles. The study also looked at data for women and found a similar, though less pronounced, pattern. Infidelity is one of the most complex, least clear-cut areas of relationship research. Most people don’t want to admit they have been unfaithful. Everyone, even the experts, has a different definition of “infidelity.” Some define it narrowly as sexual intercourse with someone who isn’t your spouse or committed partner. Others define it more broadly to encompass a range of sexual activities, or even emotional infidelity such as flirting or sharing secrets. To be clear: If you break the rules of sexual or emotional commitment in your relationship, whatever they may be, it is infidelity. Different relationships have different rules. You know when you’ve breached them.
{ "pile_set_name": "OpenWebText2" }
DFB fiber laser hydrophone with band-pass response. A distributed-feedback fiber laser hydrophone with band-pass response is presented. The design of the hydrophone aims to equalize static pressure and eliminate signal aliasing of high-frequency acoustic components. Theoretical analysis is presented based on electro-acoustic theory. The experimental results agree well with the theory. The measured underwater responses show that the hydrophone has a pressure sensitivity of -170 dB re:pm/μPa over a bandwidth between 100 Hz and 500 Hz. A sensitivity reduction exceeding -35 dB is observed at 2500 Hz. The tested static pressure sensitivity of the hydrophone is -226 dB. The proposed fiber laser hydrophone of this kind is expected to have important application in deep water fiber-optic sonar systems with anti-aliasing, and the understanding gained through this work can be extended to a guide of hydrophone design for required filtering bandwidth.
{ "pile_set_name": "PubMed Abstracts" }
A prominent Australian psychologist has warned Australia is currently raising a generation of spoilt brats, because their parents are "crap" and "never say no". Dr Michael Carr-Gregg believes today's parents have a lot to answer for, and there may be serious long-term consequences for Australia. Space to play or pause, M to mute, left and right arrows to seek, up and down arrows for volume. Listen Duration: 3 minutes 15 seconds 3 m 15 s Listen to Sarah Sedghi's report Download 6 MB Dr Carr-Gregg attributes the rise of poorly-behaved children to five major parenting problems. "The first [problem] is that there are too many parents being doormats for their kids. They have got what I call a vitamin N deficiency, which is a failure to say no. "It's incredibly important that parents set limits and boundaries and I don't know that that's happening at the moment." Dr Carr-Gregg identified the "helicopter parent" as another "model of crap parenting" he was targeting in his work. "The high-strung, control-freak parents that want to smother their kids with so much love and attention and monitoring and supervision that they never, ever develop any self-reliance and can't solve their own problems later on." Evidence of bad parenting 'in schools around Australia' The Australian psychologist said he has seen ample evidence of the consequences to these types of parenting, not just in his own clinic but in schools around Australia. "For the last 15 years I have been on the speakers' circuit in schools around Australia, and it's the teachers in early learning centres, the primary schools, the secondary schools that regale me with stories." An evolution in parenting styles over the last 20 years is to blame for the influx of bad parenting, Dr Carr-Gregg said. "We've had people moving to these artificial villages called cities, primarily to get jobs and in doing so, a lot of the kinship networks have been destroyed. "A lot of the wisdom around parenting, which was derived from grandparents, for example, has no longer been so readily available." The consequences of bad parenting has both short- and long-term effects, warned Dr Carr-Gregg. "The short-term consequences you can see in restaurants and in waiting rooms and in airports throughout Australia, where you have these kids who are just completely feral, running out of control. "Parents don't do anything about it because they're frightened of being seen as bad parents or frightened to say no." Dr Carr-Gregg said this style of parenting has major effects on the mental health of children and adolescents as they grow up. "Long-term, I think what we're doing is infantilising a lot of children into incompetence."
{ "pile_set_name": "OpenWebText2" }
/* * Copyright (c) Facebook, Inc. and its affiliates. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.facebook.buck.android; import static com.facebook.buck.android.aapt.RDotTxtEntry.IdType.INT; import static com.facebook.buck.android.aapt.RDotTxtEntry.IdType.INT_ARRAY; import static com.facebook.buck.android.aapt.RDotTxtEntry.RType.ATTR; import static com.facebook.buck.android.aapt.RDotTxtEntry.RType.ID; import static com.facebook.buck.android.aapt.RDotTxtEntry.RType.STYLEABLE; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertNotEquals; import static org.junit.Assert.assertThat; import com.facebook.buck.android.MergeAndroidResourcesStep.DuplicateResourceException; import com.facebook.buck.android.aapt.RDotTxtEntry; import com.facebook.buck.android.aapt.RDotTxtEntry.RType; import com.facebook.buck.android.aapt.RDotTxtEntryUtil; import com.facebook.buck.android.aapt.RDotTxtEntryUtil.FakeEntry; import com.facebook.buck.core.build.execution.context.ExecutionContext; import com.facebook.buck.core.model.BuildTarget; import com.facebook.buck.core.model.BuildTargetFactory; import com.facebook.buck.core.model.impl.BuildTargetPaths; import com.facebook.buck.core.rules.ActionGraphBuilder; import com.facebook.buck.core.rules.BuildRuleResolver; import com.facebook.buck.core.rules.SourcePathRuleFinder; import com.facebook.buck.core.rules.resolver.impl.TestActionGraphBuilder; import com.facebook.buck.core.sourcepath.FakeSourcePath; import com.facebook.buck.core.sourcepath.resolver.SourcePathResolverAdapter; import com.facebook.buck.io.filesystem.impl.FakeProjectFilesystem; import com.facebook.buck.step.StepExecutionResult; import com.facebook.buck.step.TestExecutionContext; import com.google.common.collect.ImmutableList; import com.google.common.collect.ImmutableMap; import com.google.common.collect.ImmutableSet; import com.google.common.collect.ImmutableSortedSet; import com.google.common.collect.SortedSetMultimap; import java.io.IOException; import java.nio.file.Path; import java.nio.file.Paths; import java.util.ArrayList; import java.util.EnumSet; import java.util.HashSet; import java.util.List; import java.util.Map; import java.util.Optional; import java.util.Set; import java.util.SortedSet; import java.util.stream.Collectors; import org.hamcrest.CoreMatchers; import org.hamcrest.Matchers; import org.hamcrest.core.StringContains; import org.junit.Rule; import org.junit.Test; import org.junit.rules.ExpectedException; public class MergeAndroidResourcesStepTest { @Rule public ExpectedException thrown = ExpectedException.none(); private List<RDotTxtEntry> createTestingFakesWithIds(List<RDotTxtEntry> ls) { return ls.stream().map(RDotTxtEntryUtil::matchId).collect(Collectors.toList()); } @Test public void testGenerateRDotJavaForMultipleSymbolsFiles() throws DuplicateResourceException { RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); // Merge everything into the same package space. String sharedPackageName = "com.facebook.abc"; entriesBuilder.add( new RDotTxtFile( sharedPackageName, "a-R.txt", ImmutableList.of( "int id a1 0x7f010001", "int id a2 0x7f010002", "int string a1 0x7f020001"))); entriesBuilder.add( new RDotTxtFile( sharedPackageName, "b-R.txt", ImmutableList.of( "int id b1 0x7f010001", "int id b2 0x7f010002", "int string a1 0x7f020001"))); entriesBuilder.add( new RDotTxtFile( sharedPackageName, "c-R.txt", ImmutableList.of("int attr c1 0x7f010001", "int[] styleable c1 { 0x7f010001 }"))); SortedSetMultimap<String, RDotTxtEntry> packageNameToResources = MergeAndroidResourcesStep.sortSymbols( entriesBuilder.buildFilePathToPackageNameSet(), Optional.empty(), ImmutableMap.of(), Optional.empty(), /* bannedDuplicateResourceTypes */ EnumSet.noneOf(RType.class), ImmutableSet.of(), entriesBuilder.getProjectFilesystem(), false); assertEquals(1, packageNameToResources.keySet().size()); SortedSet<RDotTxtEntry> resources = packageNameToResources.get(sharedPackageName); assertEquals(7, resources.size()); Set<String> uniqueEntries = new HashSet<>(); for (RDotTxtEntry resource : resources) { if (!resource.type.equals(STYLEABLE)) { assertFalse( "Duplicate ids should be fixed by renumerate=true; duplicate was: " + resource.idValue, uniqueEntries.contains(resource.idValue)); uniqueEntries.add(resource.idValue); } } assertEquals(6, uniqueEntries.size()); // All good, no need to further test whether we can write the Java file correctly... } @Test public void testGenerateRDotJavaForWithStyleables() throws DuplicateResourceException { RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); // Merge everything into the same package space. String sharedPackageName = "com.facebook.abc"; entriesBuilder.add( new RDotTxtFile( sharedPackageName, "a-R.txt", ImmutableList.of( "int attr android_layout 0x010100f2", "int attr buttonPanelSideLayout 0x7f01003a", "int attr listLayout 0x7f01003b", "int[] styleable AlertDialog { 0x7f01003a, 0x7f01003b, 0x010100f2 }", "int styleable AlertDialog_android_layout 2", "int styleable AlertDialog_buttonPanelSideLayout 0", "int styleable AlertDialog_multiChoiceItemLayout 1"))); entriesBuilder.add( new RDotTxtFile( sharedPackageName, "b-R.txt", ImmutableList.of( "int id a1 0x7f010001", "int id a2 0x7f010002", "int attr android_layout_gravity 0x7f078008", "int attr background 0x7f078009", "int attr backgroundSplit 0x7f078008", "int attr backgroundStacked 0x7f078010", "int attr layout_heightPercent 0x7f078012", "int[] styleable ActionBar { }", "int styleable ActionBar_background 10", "int styleable ActionBar_backgroundSplit 12", "int styleable ActionBar_backgroundStacked 11", "int[] styleable ActionBarLayout { 0x7f060008 }", "int styleable ActionBarLayout_android_layout 0", "int styleable ActionBarLayout_android_layout_gravity 1", "int[] styleable PercentLayout_Layout { }", "int styleable PercentLayout_Layout_layout_aspectRatio 9", "int styleable PercentLayout_Layout_layout_heightPercent 1"))); SortedSetMultimap<String, RDotTxtEntry> packageNameToResources = MergeAndroidResourcesStep.sortSymbols( entriesBuilder.buildFilePathToPackageNameSet(), Optional.empty(), ImmutableMap.of(), Optional.empty(), /* bannedDuplicateResourceTypes */ EnumSet.noneOf(RType.class), ImmutableSet.of(), entriesBuilder.getProjectFilesystem(), false); assertEquals(23, packageNameToResources.size()); ArrayList<RDotTxtEntry> resources = new ArrayList<>(packageNameToResources.get(sharedPackageName)); assertEquals(23, resources.size()); System.out.println(resources); ImmutableList<RDotTxtEntry> fakeRDotTxtEntryWithIDS = ImmutableList.of( FakeEntry.createWithId(INT, ATTR, "android_layout_gravity", "0x07f01005"), FakeEntry.createWithId(INT, ATTR, "background", "0x07f01006"), FakeEntry.createWithId(INT, ATTR, "backgroundSplit", "0x07f01007"), FakeEntry.createWithId(INT, ATTR, "backgroundStacked", "0x07f01008"), FakeEntry.createWithId(INT, ATTR, "buttonPanelSideLayout", "0x07f01001"), FakeEntry.createWithId(INT, ATTR, "layout_heightPercent", "0x07f01009"), FakeEntry.createWithId(INT, ATTR, "listLayout", "0x07f01002"), FakeEntry.createWithId(INT, ID, "a1", "0x07f01003"), FakeEntry.createWithId(INT, ID, "a2", "0x07f01004"), FakeEntry.createWithId( INT_ARRAY, STYLEABLE, "ActionBar", "{ 0x07f01006,0x07f01007,0x07f01008 }"), FakeEntry.createWithId(INT, STYLEABLE, "ActionBar_background", "0"), FakeEntry.createWithId(INT, STYLEABLE, "ActionBar_backgroundSplit", "1"), FakeEntry.createWithId(INT, STYLEABLE, "ActionBar_backgroundStacked", "2"), FakeEntry.createWithId( INT_ARRAY, STYLEABLE, "ActionBarLayout", "{ 0x010100f2,0x07f01005 }"), FakeEntry.createWithId(INT, STYLEABLE, "ActionBarLayout_android_layout", "0"), FakeEntry.createWithId(INT, STYLEABLE, "ActionBarLayout_android_layout_gravity", "1"), FakeEntry.createWithId( INT_ARRAY, STYLEABLE, "AlertDialog", "{ 0x010100f2,0x07f01001,0x7f01003b }"), FakeEntry.createWithId(INT, STYLEABLE, "AlertDialog_android_layout", "0"), FakeEntry.createWithId(INT, STYLEABLE, "AlertDialog_buttonPanelSideLayout", "1"), FakeEntry.createWithId(INT, STYLEABLE, "AlertDialog_multiChoiceItemLayout", "2"), FakeEntry.createWithId( INT_ARRAY, STYLEABLE, "PercentLayout_Layout", "{ 0x00000000,0x07f01009 }"), FakeEntry.createWithId(INT, STYLEABLE, "PercentLayout_Layout_layout_aspectRatio", "0"), FakeEntry.createWithId( INT, STYLEABLE, "PercentLayout_Layout_layout_heightPercent", "1")); assertEquals(createTestingFakesWithIds(resources), fakeRDotTxtEntryWithIDS); } @Test public void testGenerateRDotJavaForMultipleSymbolsFilesWithDuplicates() throws DuplicateResourceException { RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); // Merge everything into the same package space. String sharedPackageName = "com.facebook.abc"; entriesBuilder.add( new RDotTxtFile( sharedPackageName, "a-R.txt", ImmutableList.of("int id a1 0x7f010001", "int string a1 0x7f020001"))); entriesBuilder.add( new RDotTxtFile( sharedPackageName, "b-R.txt", ImmutableList.of( "int id a1 0x7f010001", "int string a1 0x7f010002", "int string c1 0x7f010003"))); entriesBuilder.add( new RDotTxtFile( sharedPackageName, "c-R.txt", ImmutableList.of( "int id a1 0x7f010001", "int string a1 0x7f010002", "int string b1 0x7f010003", "int string c1 0x7f010004"))); thrown.expect(DuplicateResourceException.class); thrown.expectMessage("Resource 'a1' (string) is duplicated across: "); thrown.expectMessage("Resource 'c1' (string) is duplicated across: "); BuildTarget resTarget = BuildTargetFactory.newInstance("//:res1"); SourcePathRuleFinder ruleFinder = new TestActionGraphBuilder(); MergeAndroidResourcesStep.sortSymbols( entriesBuilder.buildFilePathToPackageNameSet(), Optional.empty(), ImmutableMap.of( entriesBuilder.getProjectFilesystem().getPath("a-R.txt"), AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(ruleFinder) .setBuildTarget(resTarget) .setRes(FakeSourcePath.of("a/res")) .setRDotJavaPackage("com.res.a") .build(), entriesBuilder.getProjectFilesystem().getPath("b-R.txt"), AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(ruleFinder) .setBuildTarget(resTarget) .setRes(FakeSourcePath.of("b/res")) .setRDotJavaPackage("com.res.b") .build(), entriesBuilder.getProjectFilesystem().getPath("c-R.txt"), AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(ruleFinder) .setBuildTarget(resTarget) .setRes(FakeSourcePath.of("c/res")) .setRDotJavaPackage("com.res.c") .build()), Optional.empty(), /* bannedDuplicateResourceTypes */ EnumSet.of(RType.STRING), ImmutableSet.of(), entriesBuilder.getProjectFilesystem(), false); } @Test public void testGenerateRDotJavaForLibrary() throws Exception { BuildTarget resTarget = BuildTargetFactory.newInstance("//:res1"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); entriesBuilder.add( new RDotTxtFile( "com.res1", BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), resTarget, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of("int id id1 0x7f020000"))); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); AndroidResource res = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(resTarget) .setRes(FakeSourcePath.of("res")) .setRDotJavaPackage("com.res1") .build(); graphBuilder.addToIndex(res); MergeAndroidResourcesStep mergeStep = MergeAndroidResourcesStep.createStepForDummyRDotJava( filesystem, graphBuilder.getSourcePathResolver(), ImmutableList.of(res), Paths.get("output"), /* forceFinalResourceIds */ false, /* unionPackage */ Optional.empty(), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ false); ExecutionContext executionContext = TestExecutionContext.newInstance(); assertEquals(0, mergeStep.execute(executionContext).getExitCode()); // Verify that the correct Java code is generated. assertThat( filesystem.readFileIfItExists(Paths.get("output/com/res1/R.java")).get(), CoreMatchers.containsString("{\n public static int id1=0x07f01001;")); } @Test public void testGenerateRDotJavaForOneSymbolsFile() throws Exception { BuildTarget target = BuildTargetFactory.newInstance("//android_res/com/facebook/http:res"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); String symbolsFile = BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), target, "__%s_text_symbols__/R.txt") .toString(); String rDotJavaPackage = "com.facebook"; ImmutableList<String> outputTextSymbols = ImmutableList.<String>builder() .add("int id placeholder 0x7f020000") .add("int string debug_http_proxy_dialog_title 0x7f030004") .add("int string debug_http_proxy_hint 0x7f030005") .add("int string debug_http_proxy_summary 0x7f030003") .add("int string debug_http_proxy_title 0x7f030002") .add("int string debug_ssl_cert_check_summary 0x7f030001") .add("int string debug_ssl_cert_check_title 0x7f030000") .add("int styleable SherlockMenuItem_android_visible 4") .add( "int[] styleable SherlockMenuView { 0x7f010026, 0x7f010027, 0x7f010028, 0x7f010029, " + "0x7f01002a, 0x7f01002b, 0x7f01002c, 0x7f01002d }") .build(); entriesBuilder.add(new RDotTxtFile(rDotJavaPackage, symbolsFile, outputTextSymbols)); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); Path uberRDotTxt = filesystem.resolve("R.txt").toAbsolutePath(); filesystem.writeLinesToPath(outputTextSymbols, uberRDotTxt); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); AndroidResource resource = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(target) .setRes(FakeSourcePath.of("res")) .setRDotJavaPackage("com.facebook") .build(); graphBuilder.addToIndex(resource); MergeAndroidResourcesStep mergeStep = new MergeAndroidResourcesStep( filesystem, graphBuilder.getSourcePathResolver(), ImmutableList.of(resource), ImmutableList.of(uberRDotTxt), Paths.get("output"), /* forceFinalResourceIds */ true, /* bannedDuplicateResourceTypes */ EnumSet.noneOf(RType.class), /* filteredResourcesProvider */ Optional.empty(), /* overrideSymbolsPath */ ImmutableList.of(), /* unionPackage */ Optional.empty(), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ false); ExecutionContext executionContext = TestExecutionContext.newInstance(); assertEquals(0, mergeStep.execute(executionContext).getExitCode()); // Verify that the correct Java code is generated. assertEquals( "package com.facebook;\n" + "\n" + "public class R {\n" + " public static class id {\n" + " public static final int placeholder=0x7f020000;\n" + " }\n" + "\n" + " public static class string {\n" + " public static final int debug_http_proxy_dialog_title=0x7f030004;\n" + " public static final int debug_http_proxy_hint=0x7f030005;\n" + " public static final int debug_http_proxy_summary=0x7f030003;\n" + " public static final int debug_http_proxy_title=0x7f030002;\n" + " public static final int debug_ssl_cert_check_summary=0x7f030001;\n" + " public static final int debug_ssl_cert_check_title=0x7f030000;\n" + " }\n" + "\n" + " public static class styleable {\n" + " public static final int SherlockMenuItem_android_visible=4;\n" + " public static final int[] SherlockMenuView={ 0x7f010026, 0x7f010027, 0x7f010028, " + "0x7f010029, 0x7f01002a, 0x7f01002b, 0x7f01002c, 0x7f01002d };\n" + " }\n" + "\n" + "}\n", filesystem .readFileIfItExists(Paths.get("output/com/facebook/R.java")) .get() .replace("\r", "")); } @Test public void testGenerateRDotJavaForCustomDrawables() throws Exception { BuildTarget target = BuildTargetFactory.newInstance("//android_res/com/facebook/http:res"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); String symbolsFile = BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), target, "__%s_text_symbols__/R.txt") .toString(); String rDotJavaPackage = "com.facebook"; ImmutableList<String> outputTextSymbols = ImmutableList.<String>builder() .add("int drawable android_drawable 0x7f010000") .add("int drawable fb_drawable 0x7f010001 #") .build(); entriesBuilder.add(new RDotTxtFile(rDotJavaPackage, symbolsFile, outputTextSymbols)); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); Path uberRDotTxt = filesystem.resolve("R.txt").toAbsolutePath(); filesystem.writeLinesToPath(outputTextSymbols, uberRDotTxt); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); AndroidResource resource = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(target) .setRes(FakeSourcePath.of("res")) .setRDotJavaPackage("com.facebook") .build(); graphBuilder.addToIndex(resource); MergeAndroidResourcesStep mergeStep = new MergeAndroidResourcesStep( filesystem, graphBuilder.getSourcePathResolver(), ImmutableList.of(resource), ImmutableList.of(uberRDotTxt), Paths.get("output"), /* forceFinalResourceIds */ true, /* bannedDuplicateResourceTypes */ EnumSet.noneOf(RType.class), /* filteredResourcesProvider */ Optional.empty(), /* overrideSymbolsPath */ ImmutableList.of(), /* unionPackage */ Optional.empty(), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ false); ExecutionContext executionContext = TestExecutionContext.newInstance(); assertEquals(0, mergeStep.execute(executionContext).getExitCode()); // Verify that the correct Java code is generated. assertEquals( "package com.facebook;\n" + "\n" + "public class R {\n" + " public static class drawable {\n" + " public static final int android_drawable=0x7f010000;\n" + " public static final int fb_drawable=0x7f010001;\n" + " }\n" + "\n" + " public static final int[] custom_drawables = { 0x7f010001 };\n" + "\n" + "}\n", filesystem .readFileIfItExists(Paths.get("output/com/facebook/R.java")) .get() .replace("\r", "")); } @Test public void testGetRDotJavaFilesWithSkipPrebuiltRDotJava() { BuildTarget res1Target = BuildTargetFactory.newInstance("//:res1"); BuildTarget res2Target = BuildTargetFactory.newInstance("//:res2"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); BuildRuleResolver buildRuleResolver = new TestActionGraphBuilder(); AndroidResource res1 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(buildRuleResolver) .setBuildTarget(res1Target) .setRes(FakeSourcePath.of("res1")) .setRDotJavaPackage("com.package1") .build(); AndroidResource res2 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(buildRuleResolver) .setBuildTarget(res2Target) .setRes(FakeSourcePath.of("res2")) .setRDotJavaPackage("com.package2") .build(); ImmutableList<HasAndroidResourceDeps> resourceDeps = ImmutableList.of(res1, res2); MergeAndroidResourcesStep mergeStep = MergeAndroidResourcesStep.createStepForDummyRDotJava( filesystem, buildRuleResolver.getSourcePathResolver(), resourceDeps, Paths.get("output"), /* forceFinalResourceIds */ false, Optional.of("com.package"), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ true); ImmutableSortedSet<Path> rDotJavaFiles = mergeStep.getRDotJavaFiles(); assertEquals(rDotJavaFiles.size(), 1); ImmutableSortedSet<Path> expected = ImmutableSortedSet.<Path>naturalOrder() .add(mergeStep.getPathToRDotJava("com.package")) .build(); assertEquals(expected, rDotJavaFiles); } @Test public void testGetRDotJavaFilesWithoutSkipPrebuiltRDotJava() { BuildTarget res1Target = BuildTargetFactory.newInstance("//:res1"); BuildTarget res2Target = BuildTargetFactory.newInstance("//:res2"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); BuildRuleResolver buildRuleResolver = new TestActionGraphBuilder(); AndroidResource res1 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(buildRuleResolver) .setBuildTarget(res1Target) .setRes(FakeSourcePath.of("res1")) .setRDotJavaPackage("com.package1") .build(); AndroidResource res2 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(buildRuleResolver) .setBuildTarget(res2Target) .setRes(FakeSourcePath.of("res2")) .setRDotJavaPackage("com.package2") .build(); ImmutableList<HasAndroidResourceDeps> resourceDeps = ImmutableList.of(res1, res2); MergeAndroidResourcesStep mergeStep = MergeAndroidResourcesStep.createStepForDummyRDotJava( filesystem, buildRuleResolver.getSourcePathResolver(), resourceDeps, Paths.get("output"), /* forceFinalResourceIds */ false, Optional.of("com.package"), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ false); ImmutableSortedSet<Path> rDotJavaFiles = mergeStep.getRDotJavaFiles(); assertEquals(rDotJavaFiles.size(), 3); ImmutableSortedSet<Path> expected = ImmutableSortedSet.<Path>naturalOrder() .add(mergeStep.getPathToRDotJava("com.package")) .add(mergeStep.getPathToRDotJava("com.package1")) .add(mergeStep.getPathToRDotJava("com.package2")) .build(); assertEquals(expected, rDotJavaFiles); } @Test public void testGenerateRDotJavaWithResourceUnionPackageAndSkipPrebuiltRDotJava() throws Exception { BuildTarget res1Target = BuildTargetFactory.newInstance("//:res1"); BuildTarget res2Target = BuildTargetFactory.newInstance("//:res2"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); entriesBuilder.add( new RDotTxtFile( "com.res1", BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), res1Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of("int id id1 0x7f020000"))); entriesBuilder.add( new RDotTxtFile( "com.res2", BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), res2Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of("int id id2 0x7f020000"))); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); AndroidResource res1 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res1Target) .setRes(FakeSourcePath.of("res1")) .setRDotJavaPackage("res1") .build(); graphBuilder.addToIndex(res1); AndroidResource res2 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res2Target) .setRes(FakeSourcePath.of("res2")) .setRDotJavaPackage("res2") .build(); graphBuilder.addToIndex(res2); MergeAndroidResourcesStep mergeStep = MergeAndroidResourcesStep.createStepForDummyRDotJava( filesystem, graphBuilder.getSourcePathResolver(), ImmutableList.of(res1, res2), Paths.get("output"), /* forceFinalResourceIds */ false, Optional.of("res"), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ true); ExecutionContext executionContext = TestExecutionContext.newInstance(); assertEquals(0, mergeStep.execute(executionContext).getExitCode()); String resJava = filesystem.readFileIfItExists(Paths.get("output/res/R.java")).get(); assertThat(resJava, StringContains.containsString("id1")); assertThat(resJava, StringContains.containsString("id2")); Optional<String> res1Java = filesystem.readFileIfItExists(Paths.get("output/res1/R.java")); Optional<String> res2Java = filesystem.readFileIfItExists(Paths.get("output/res2/R.java")); assertFalse(res1Java.isPresent()); assertFalse(res2Java.isPresent()); } @Test public void testGenerateRDotJavaWithResourceUnionPackage() throws Exception { BuildTarget res1Target = BuildTargetFactory.newInstance("//:res1"); BuildTarget res2Target = BuildTargetFactory.newInstance("//:res2"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); entriesBuilder.add( new RDotTxtFile( "com.res1", BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), res1Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of("int id id1 0x7f020000"))); entriesBuilder.add( new RDotTxtFile( "com.res2", BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), res2Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of("int id id2 0x7f020000"))); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); AndroidResource res1 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res1Target) .setRes(FakeSourcePath.of("res1")) .setRDotJavaPackage("res1") .build(); graphBuilder.addToIndex(res1); AndroidResource res2 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res2Target) .setRes(FakeSourcePath.of("res2")) .setRDotJavaPackage("res2") .build(); graphBuilder.addToIndex(res2); MergeAndroidResourcesStep mergeStep = MergeAndroidResourcesStep.createStepForDummyRDotJava( filesystem, graphBuilder.getSourcePathResolver(), ImmutableList.of(res1, res2), Paths.get("output"), /* forceFinalResourceIds */ false, Optional.of("res1"), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ false); ExecutionContext executionContext = TestExecutionContext.newInstance(); assertEquals(0, mergeStep.execute(executionContext).getExitCode()); String res1java = filesystem.readFileIfItExists(Paths.get("output/res1/R.java")).get(); String res2java = filesystem.readFileIfItExists(Paths.get("output/res2/R.java")).get(); assertThat(res1java, StringContains.containsString("id1")); assertThat(res1java, StringContains.containsString("id2")); assertThat(res2java, CoreMatchers.not(StringContains.containsString("id1"))); assertThat(res2java, StringContains.containsString("id2")); } @Test public void testGenerateRDotJavaWithPreviouslyEmptyResourceUnionPackage() throws Exception { BuildTarget res1Target = BuildTargetFactory.newInstance("//:res1"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); entriesBuilder.add( new RDotTxtFile( "com.res1", BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), res1Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of("int id id1 0x7f020000"))); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); AndroidResource res1 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res1Target) .setRes(FakeSourcePath.of("res1")) .setRDotJavaPackage("res1") .build(); graphBuilder.addToIndex(res1); MergeAndroidResourcesStep mergeStep = MergeAndroidResourcesStep.createStepForDummyRDotJava( filesystem, graphBuilder.getSourcePathResolver(), ImmutableList.of(res1), Paths.get("output"), /* forceFinalResourceIds */ false, Optional.of("resM"), /* rName */ Optional.empty(), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ false); ExecutionContext executionContext = TestExecutionContext.newInstance(); assertEquals(0, mergeStep.execute(executionContext).getExitCode()); String res1java = filesystem.readFileIfItExists(Paths.get("output/res1/R.java")).get(); String resMjava = filesystem.readFileIfItExists(Paths.get("output/resM/R.java")).get(); assertThat(res1java, StringContains.containsString("id1")); assertThat(resMjava, StringContains.containsString("id1")); } @Test public void testGenerateRDotJavaWithRName() throws Exception { BuildTarget res1Target = BuildTargetFactory.newInstance("//:res1"); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(); entriesBuilder.add( new RDotTxtFile( "com.res1", BuildTargetPaths.getGenPath( entriesBuilder.getProjectFilesystem(), res1Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of("int id id1 0x7f020000", "int id id2 0x7f020002"))); FakeProjectFilesystem filesystem = entriesBuilder.getProjectFilesystem(); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); AndroidResource res1 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res1Target) .setRes(FakeSourcePath.of("res1")) .setRDotJavaPackage("res1") .build(); graphBuilder.addToIndex(res1); MergeAndroidResourcesStep mergeStep = MergeAndroidResourcesStep.createStepForDummyRDotJava( filesystem, graphBuilder.getSourcePathResolver(), ImmutableList.of(res1), Paths.get("output"), /* forceFinalResourceIds */ true, Optional.of("res1"), Optional.of("R2"), /* useOldStyleableFormat */ false, /* skipNonUnionRDotJava */ false); ExecutionContext executionContext = TestExecutionContext.newInstance(); assertEquals(0, mergeStep.execute(executionContext).getExitCode()); String resR2Java = filesystem.readFileIfItExists(Paths.get("output/res1/R2.java")).get(); assertThat(resR2Java, StringContains.containsString("static final int id1=0x07f01001;")); assertThat(resR2Java, StringContains.containsString("static final int id2=0x07f01002;")); } @Test public void testDuplicateBanning() throws Exception { BuildTarget res1Target = BuildTargetFactory.newInstance("//:res1"); BuildTarget res2Target = BuildTargetFactory.newInstance("//:res2"); ActionGraphBuilder graphBuilder = new TestActionGraphBuilder(); FakeProjectFilesystem filesystem = new FakeProjectFilesystem(); RDotTxtEntryBuilder entriesBuilder = new RDotTxtEntryBuilder(filesystem); entriesBuilder.add( new RDotTxtFile( "package", BuildTargetPaths.getGenPath(filesystem, res1Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of( "int string app_name 0x7f020000", "int drawable android_drawable 0x7f010000"))); entriesBuilder.add( new RDotTxtFile( "package", BuildTargetPaths.getGenPath(filesystem, res2Target, "__%s_text_symbols__/R.txt") .toString(), ImmutableList.of( "int string app_name 0x7f020000", "int drawable android_drawable 0x7f010000"))); AndroidResource res1 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res1Target) .setRes(FakeSourcePath.of("res1")) .setRDotJavaPackage("package") .build(); graphBuilder.addToIndex(res1); AndroidResource res2 = AndroidResourceRuleBuilder.newBuilder() .setRuleFinder(graphBuilder) .setBuildTarget(res2Target) .setRes(FakeSourcePath.of("res2")) .setRDotJavaPackage("package") .build(); graphBuilder.addToIndex(res2); ImmutableList<HasAndroidResourceDeps> resourceDeps = ImmutableList.of(res1, res2); checkDuplicatesDetected( graphBuilder.getSourcePathResolver(), filesystem, resourceDeps, EnumSet.noneOf(RType.class), ImmutableList.of(), ImmutableList.of("app_name", "android_drawable"), Optional.empty()); checkDuplicatesDetected( graphBuilder.getSourcePathResolver(), filesystem, resourceDeps, EnumSet.of(RType.STRING), ImmutableList.of("app_name"), ImmutableList.of("android_drawable"), Optional.empty()); checkDuplicatesDetected( graphBuilder.getSourcePathResolver(), filesystem, resourceDeps, EnumSet.allOf(RType.class), ImmutableList.of("app_name", "android_drawable"), ImmutableList.of(), Optional.empty()); checkDuplicatesDetected( graphBuilder.getSourcePathResolver(), filesystem, resourceDeps, EnumSet.allOf(RType.class), ImmutableList.of("android_drawable"), ImmutableList.of("app_name"), Optional.of(ImmutableList.of("string app_name", "color android_drawable"))); } private void checkDuplicatesDetected( SourcePathResolverAdapter resolver, FakeProjectFilesystem filesystem, ImmutableList<HasAndroidResourceDeps> resourceDeps, EnumSet<RType> rtypes, ImmutableList<String> duplicateResources, ImmutableList<String> ignoredDuplicates, Optional<List<String>> duplicateWhitelist) throws IOException { Optional<Path> duplicateWhitelistPath = duplicateWhitelist.map( whitelist -> { Path whitelistPath = filesystem.resolve("duplicate-whitelist.txt"); filesystem.writeLinesToPath(whitelist, whitelistPath); return whitelistPath; }); MergeAndroidResourcesStep mergeStep = new MergeAndroidResourcesStep( filesystem, resolver, resourceDeps, /* uberRDotTxt */ ImmutableList.of(), Paths.get("output"), true, rtypes, duplicateWhitelistPath, /* overrideSymbolsPath */ ImmutableList.of(), Optional.empty(), Optional.empty(), /* useOldStyleableFormat */ false, false); StepExecutionResult result = mergeStep.execute(TestExecutionContext.newInstance()); String message = result.getStderr().orElse(""); if (duplicateResources.isEmpty()) { assertEquals(0, result.getExitCode()); } else { assertNotEquals(0, result.getExitCode()); assertThat(message, Matchers.containsString("duplicated")); } for (String duplicateResource : duplicateResources) { assertThat(message, Matchers.containsString(duplicateResource)); } for (String ignoredDuplicate : ignoredDuplicates) { assertThat(message, Matchers.not(Matchers.containsString(ignoredDuplicate))); } } // sortSymbols has a goofy API. This will help. private static class RDotTxtEntryBuilder { private final FakeProjectFilesystem filesystem; private final ImmutableMap.Builder<Path, String> filePathToPackageName = ImmutableMap.builder(); RDotTxtEntryBuilder() { this(new FakeProjectFilesystem()); } RDotTxtEntryBuilder(FakeProjectFilesystem filesystem) { this.filesystem = filesystem; } public void add(RDotTxtFile entry) { filesystem.writeLinesToPath(entry.contents, entry.filePath); filePathToPackageName.put(entry.filePath, entry.packageName); } Map<Path, String> buildFilePathToPackageNameSet() { return filePathToPackageName.build(); } public FakeProjectFilesystem getProjectFilesystem() { return filesystem; } } static class RDotTxtFile { public ImmutableList<String> contents; String packageName; Path filePath; RDotTxtFile(String packageName, String filePath, ImmutableList<String> contents) { this.packageName = packageName; this.filePath = Paths.get(filePath); this.contents = contents; } } }
{ "pile_set_name": "Github" }
Alterations in vascular gene expression in invasive breast carcinoma. The molecular signature that defines tumor microvasculature will likely provide clues as to how vascular-dependent tumor proliferation is regulated. Using purified endothelial cells, we generated a database of gene expression changes accompanying vascular proliferation in invasive breast cancer. In contrast to normal mammary vasculature, invasive breast cancer vasculature expresses extracellular matrix and surface proteins characteristic of proliferating and migrating endothelial cells. We define and validate the up-regulated expression of VE-cadherin and osteonectin in breast tumor vasculature. In contrast to other tumor types, invasive breast cancer vasculature induced a high expression level of specific transcription factors, including SNAIL1 and HEYL, that may drive gene expression changes necessary for breast tumor neovascularization. We demonstrate the expression of HEYL in tumor endothelial cells and additionally establish the ability of HEYL to both induce proliferation and attenuate programmed cell death of primary endothelial cells in vitro. We also establish that an additional intracellular protein and previously defined metastasis-associated gene, PRL3, appears to be expressed predominately in the vasculature of invasive breast cancers and is able to enhance the migration of endothelial cells in vitro. Together, our results provide unique insights into vascular regulation in breast tumors and suggest specific roles for genes in driving tumor angiogenesis.
{ "pile_set_name": "PubMed Abstracts" }
The Red-eared Slider (RES) is a medium-to-large sized turtle capable of reaching straight carapace lengths of 7 to 9" in males & 10 to 12" in females (note: in rare cases larger red-ears have been found). Male RES are smaller than their female counterparts, reaching ~ 7 - 9" adult SCL. Males have elongated front claws to aid in courtship and mating rituals & their tails are much longer than females. THINK CUTE? THINK TWICE! Many times people believe and are told by the vendors that the hatchling will not grow. WRONG! They will grow into the size of this paper very fast. Those cute turtle lagoons usually sold along the turtle are what we call “Death Bowls”. The images speak for them selves. DIET Throughout their lives, RES are omnivores progressing from predominant carnivore as juveniles to predominant herbivore as adults. Be careful not to overfeed your Slider. Recommended feeding only 2 to 3 times a week for adult turtles and every day or every other day for the rapidly growing hatchlings. Sliders will consume vegetables, greens such as mustard greens, turnip greens, dandelion, spinach, carrots, zucchini and any aquatic vegetation, i.e. duckweed, water lettuce, water hyacinth, etc. They will also consume insects, worms, snails and fish. Many of the commercially prepared turtle diets that exist on the market today are excellent Slider food. You must provide Calcium for proper shell growth. Powdered calcium can be sprinkled on foods. It is suggested that one use calcium supplemented with vitamin D3 if the animal is being maintained indoors and calcium without D3 if it is outdoors. Provision of a cuttlefish bone, which can be gnawed if desired, is also recommended. RECOMMENDED ENCLOSURE TEMPERATURE RANGE (°F) Air Temperature: mid 70's - 80's Basking Temperature: High 80's to low 90's Water Temperature: ~ 72 to 76 degrees for sub-adults & adults, 78 to 80 degrees for hatchlings & smaller juveniles. For single adult male RES could do okay in a 75 gallon aquarium. Single large adult females need a minimum of a 125 gallon tank. This allows them decent room (quality of life) in addition to plenty of water to assist in good health and filtration. Basking areas can be made of anything that will support their weight and is non-abrasive. Smaller enclosures tend to resemble prison cells. Would you like to spend your whole life in the bathroom size prison cell? Predator safe outdoor pond is the BEST! Tuesday, October 6, 2015 In the early fall wild box turtles will begin to search for a protected place to spend the winter. It’s crucial to assess your box turtle’s health before you allow it to hibernate. There are many questions you need to ask and answer before your box turtle can safely hibernate. The first is should you even hibernate the turtle? If it is healthy, then yes. Hibernation helps turtles maintain normal thyroid activity, synchronize their reproduction cycles, and complete their normal life expectancies. Here are do’s and don’ts for successful hibernation: • Do take the time to prepare a proper hibernation place for your outdoor box turtle. Don’t leave it up to chance. • Do choose an area that does not flood or collect run-off water. Your turtles could drown. • Don’t hibernate sick, light weight or young box turtles. Keep them indoors in a roomy, well heated tank and feed them all winter long. • Do protect your hibernating box turtles from foraging wild animals like rats, mice or raccoons and from other pets that may break open their hibernation boxes or dens. • Do check on your hibernating turtles once in awhile. You may find ill turtles above ground or the signs of wild animals foraging for food. Friday, May 23, 2014 May is a busy month for turtles. Turtles wake up from hibernation and it's time for mating, migrating, nesting, and babies. Therefore in 2000, May 23 was designated World Turtle Day. Spring and early summer is a time of turtle nesting and babies. You can see turtles walking on the road or turtle hatchlings around local ponds and creeks. However cute they look and no matter how much your child wants to pick them up and take them home it’s not a good idea. Turtles—sea, freshwater, or terrestrial—are the favorite animals of many people. These attractive creatures continue to beat incredible odds to survive in today’s world of increasing pet and food trade, pollution and shrinking habitat. Please, read some suggestions on how you can help those beautiful and important little creatures, which have been part of our ecosystem for a long, long time on our website:10 Things to Do for Turtleshttp://dfwturtletortoiseclub.blogspot.com/2007/08/10-things-to-do-for-turtles.html DFW Turtle & Tortoise Club is volunteer based and thrives on donations.We provide great community for local turtle enthusiasts and people interested in turtles and tortoises. We educate public, provide consultations about captive care and wildlife rescue in cooperation with other wildlife and turtle organizations. We also offer educational presentations for schools, museums, and youth groups. Feel free to contact us for more information. Wednesday, June 26, 2013 10 Things to Do for Turtles Spring and early summer is a time of turtle nesting and babies. You can see turtles walking on the road or turtle hatchlings around local ponds and creeks. However cute they look and no matter how much your child wants to pick them up and take them home it’s not a good idea. Turtles—sea, freshwater, or terrestrial—are the favorite animals of many people. These attractive creatures continue to beat incredible odds to survive in today’s world of increasing pet and food trade, pollution and shrinking habitat. Here are some suggestions on how you can help those beautiful and important little creatures, which have been part of our ecosystem for a long, long time: 1. Give Turtles a Brake. First, be safe and don’t have an accident; then if possible avoid hitting the turtle. If you can safely stop and you want to do so, move the turtle off the road in the direction in which it was going. If the turtle is a large one, or a snapping turtle, use a stick to nudge him gently across the road without getting too close. Do not pick up a turtle by its tail, as it can cause dislocation of the turtle’s spine. 2. Protect Turtle habitat. Support your local turtle conservation programs. Report any abuse, poaching (of sea turtles, her eggs or hatchlings for example), or any other of your concerns to a local legal agency like Texas Parks & Wildlife department. These activities are violations of U.S. state and federal laws. 3. Don’t take turtles out of the wild. A game warden will fine you if you get caught. Turtles take up to 10 years before reaching sexual maturity to reproduce. Taking a turtle out of the wild will cause great harm to the future population of turtles. When the population is thinned beyond a certain point, adults are unlikely to find each other for mating. Many turtle species lays relatively few eggs and the hatchlings are very vulnerable during their first years to predation. This means not enough turtles can be produced for the population to survive and the population becomes reproductively dead. 4. Enjoy Turtles in the Wild. Never keep wild turtles as pets or buy them from a pet store. The trade in reptiles as pets is responsible for tremendous animal suffering and serious damage to turtle populations. Learn to enjoy turtles by observing them in their natural habitat, where they belong. If turtles live in your yard, why not keep them happy by building a pond and by landscaping with plants that provide protection and food? Edible plants for turtles include tropical hibiscus, dandelion, geraniums, and Chinese lantern. (Make sure that your plants are free of pesticide and herbicide residue.) Piles of leaves, vines, and downed trees make perfect turtle hiding places. 5. Don't release turtles back in wild. Think twice before buy turtle as a pet. Turtles can live 40, 60 even hundred years. They can grow large and need lots of space to roam or/and swim. This is the number one reason of turtles being released back in wild. Turtles kept in captivity for a while often lose the need for hunting since they have been fed and they will not be able to survive in the wild. An even bigger problem can develop, that is releasing the turtle, even in its potentially native habitat, will affect biodiversity of the pond or lake you release it in. Introduction of parasites and illnesses can wipe out entire fish or other local fauna population. For help, contact your local Turtle Club, Herpetological Society, Wildlife rehabilitator or your local animal shelter. 6. Get Turtles out of U.S. Live Animal Markets. Turtles are among the most popular offerings at live animal markets in the United States. They suffer terrible abuse in filthy, neglectful conditions, and are slaughtered by being cut apart while conscious. The vast majority of market turtles are taken from the wild, contributing to declining U.S. turtle populations. Tell state wildlife agencies that you’re concerned about the increasing collection of wild turtles to supply animal markets in the United States and abroad (mostly in Asia). 7.Say NO to turtle racing.Turtle racing is an event that is often held for the entertainment of young children at fairs, picnics, rodeos and socials across the U.S. usually without knowing what harm they are doing to the local turtle population as well as to the individual turtles. Turtles are found and collected in the wild and the overwhelming majority is picked up off of the roads. These “collectors” often exceed their legal limit of turtles. Turtles are piled up in five gallon buckets or cardboard boxes for a time ranging from several days to several weeks without food or water. As a result the turtles are under enormous amount of stress and sometimes covered with urine and feces which could spread disease among the turtles. 8. Don’t Mess with Texas. Pollution makes its way into bodies of water and wild areas, poisoning turtles and destroying their habitats. Always properly dispose of any hazardous materials such as paint or oil. Garbage, such as plastic bags, kills many pond turtles and sea turtles that either ingest it or become entangled in it. Reduce the amount of garbage you produce, recycle, and dispose of it properly. 9. Spread the Word. Educate others about the importance of protecting turtles from commercial exploitation and abuse in your community and throughout the world. Be a voice for turtles. 10. Join and/or support turtle conservation and educational organizations. You can find and join local Turtle & Tortoise Club/society like DFW Turtle & Tortoise club www.dfwttc.org so you can connect with others with great knowledge about chelonians and help with local efforts to protect turtles. Many other organizations like TSA - Turtle Survival Alliance and World Chelonian Trust www.chelonia.org have a great resources and extensive information about captive care and conservational issues. Follow us on Facebook Contact urbanveggie@yahoo.com or join our club on yahoo (link below)(Please check you spam box for answers just in case, thanks)Thanks for your patience :-)When you email us please include your LOCATION and PICTURES of your turtles. Thanks
{ "pile_set_name": "Pile-CC" }
The Ukraine Crisis Is Entering A Dangerous New Phase Yannis Behrakis/REUTERSPro-Russian rebels of the Battalion Vostok take positions outside the local administration building in the eastern Ukrainian city of Donetsk, May 29, 2014. Russia's professional troublemakers have arrived by the hundreds in Eastern Ukraine. The Vostok Battalion, a Russian intelligence-linked Chechen-founded paramilitary consisting of battle-hardened militants from the most restive regions within Moscow's orbit, has arrived to take charge of Ukraine's pro-Russian rebels. Vostok's presence in Eastern Ukraine signals a subtle and important pivot in Russian president Vladimir Putin's strategy. Russia has drawn down its uniformed forces from Ukraine's border, creating the impression that there's no imminent threat of a conventional invasion. At the same time, experienced irregulars with connections to Russia's intelligence services have helped extend Moscow's reach inside of it southern neighbor. As New York University professor and Russia expert Mark Galeotti explained to Business Insider when reached in Moscow, Vostok consists of militants from Chechnya, Dagestan, and Ossetia — some of the most conflict-torn places in Russia's domain. "They aren't there to replace the militias in Eastern Ukraine. They're there to be the force that essentially controls them in Moscow's name," says Galeotti. Vostok was disbanded after the 2008 Russian incursion into Georgia, in which it participated. The battalion had been managed by a Chechen family with a longstanding vendetta against Ramzan Kadyrov, Chechnya's pro-Russian leader. Now that Vostok can be useful again, it's been allowed to reconstitute itself. Moscow's current objective in eastern Ukraine isn't annexation or direct control. Rather, Putin wants to maintain relative order with an eye towards reaching a favorable accord with the new government in Kiev — one that effectively resets the situation to late 2013, when Ukraine's pro-Moscow government was still planning on joining Putin's Eurasian customs union and spurning any EU or NATO overtures. Under this strategy, Ukraine remains a permanent member of Russia's "near abroad," with its politics operating within parameters set by Moscow. The Vostok Battalion helps advance that goal. "This is a specifically Russian military intelligence operation," says Galeotti. "They stood this force up and its role is to try and reassert some degree of control over the situation. Moscow is beginning to become alarmed how Eastern Ukraine was spinning into chaos and warlordism." Vostok is one of Moscow's instruments in achieving this victor's peace. Their role is "essentially political," Galeotti says: Vostok is Putin's way of controlling other, less disciplined pro-Russian militants. But there are between 300 and 400 Russian fighters from Vostok in Ukraine right now, and they are highly capable soldiers. "They are mainly battle-hardened veterans," says Galeotti. "They are a cut above not just almost all of the other militia, but at the same time they are also more capable than almost any of the Ukrainian regular military."
{ "pile_set_name": "Pile-CC" }
772 F.2d 906 Unpublished DispositionNOTICE: Sixth Circuit Rule 24(c) states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Sixth Circuit.REGINALD HARRIS, PLAINTIFF-APPELLANT,v.ELTON SCOTT; DANIEL TRUDELL; LARRY STANLEY; LEE CLARK ANDJOHN WIREMAN, DEFENDANTS-APPELLEES. NO. 85-1044 United States Court of Appeals, Sixth Circuit. 8/6/85 E.D.Mich. APPEAL DISMISSED ORDER BEFORE: ENGEL, JONES and KRUPANSKY, Circuit Judges. 1 This matter is before the Court upon consideration of the appellant's motion for appointment of counsel. 2 A review of the record indicates that the district court entered an order on December 3, 1984. That order granted leave to amend the complaint, denied two motions for summary judgment, and granted the motion to dismiss as to all the claims except the claim of denial of religious practice. Appellant appealed. The December 10, 1984, order disposed of fewer than all the claims involved in the action. The district court did not expressly determine that there is no just reason for the delay and did not direct entry of a final judgment pursuant to Rule 54(b), Federal Rules of Civil Procedure. Therefore, the December 10, 1984, order appealed is not final and appealable. McIntyre v. First National Bank of Cincinnati, 585 F.2d 190 (6th Cir. 1978); Moody v. Kapica, 548 F.2d 133 (6th Cir. 1976); Oak Construction Company v. Huron Cement Company, 475 F.2d 1220 (6th Cir. 1973). The final decision of the district court has not been entered during the pendency of this appeal; therefore, this Court lacks jurisdiction. Gillis v. Department of Health and Human Services, 759 F.2d 565 (6th Cir. 1985). 3 It is ORDERED that the motion for appointment of counsel be and hereby is denied. 4 It is further ORDERED that the appeal be and it hereby is dismissed for lack of jurisdiction. Rule 9(d)(1), Rules of the Sixth Circuit.
{ "pile_set_name": "FreeLaw" }
[Strict additivity of the antispasmodic effects of papaverine and tiemonium: an example of sequential blockage]. The interaction of papaverine and tiemonium alone or combined, with BaCL2 and histamine on guinea pig ileum and with acetylcholine on rat jejunum have been studied with the help of molecular pharmacology techniques. The competitive antagonist effects of tiemonium and the non competitive antagonist effects of papaverine are evidenced and shown to be strictly additive when the two drugs are combined. This reflects a sequential blockage of the effects of acetylcholine, histamine and barium ions at the smooth muscle level. No such antagonism has been previously described in the case of the interaction with barium chloride with any other combination of two spasmolytic drugs.
{ "pile_set_name": "PubMed Abstracts" }
A task analysis of the shift from teacher instructions to self-instructions in performing an in-common task. Three preschool children repeatedly did four kinds of sorts with a deck of stimulus cards: a difficult, untaught target sort and three other sorts considered analytic of self-instructing the target performance. The untaught target sort was to find in a deck of cards those matching what two sample cards had in common. Most preschool children must be taught to mediate this problem. The three other kinds of sorts taught skills involved in the target performance or its mediation. As correct self-instructive talk emerged in the target sorts, it was confirmed. The untaught target sorts were interspersed infrequently among the three alternating directly taught skill sorts, to see if accurate target sorts, and accurate self-instructive talk about the target sorts, would emerge as the three skill sorts were mastered. As all the sorts progressed, increasing accuracy was seen first in the skill sorts and then in the untaught target sorts. All three subjects showed subsequent generalization to new target sorts involving other stimulus sets. Correct spontaneous self-instructions about the target sorts increased from near zero at the beginning of the experiment to consistency at its end. Thus the three skill sorts appeared sufficient for the emergence of a self-instructed solution to the previously insoluble target performance.
{ "pile_set_name": "PubMed Abstracts" }
To ensure the best quality of data report, raw data used in this trial are available upon request (<jean-philippe.bertocchio@aphp.fr>). Introduction {#sec006} ============ Calcineurin inhibitors (CNIs), such as Cyclosporine A (CsA) or tacrolimus, are the most commonly used maintenance immunosuppressive drugs after kidney transplantation \[[@pone.0153635.ref001]\] even if CNIs could lead to nephrotoxicity \[[@pone.0153635.ref002]\]. The mechanisms underlying CsA-induced nephrotoxicity (CIN) remain not fully elucidated \[[@pone.0153635.ref003]\]. Renal hemodynamic plays a central role during acute CIN: renal vasoconstriction has been reported as an initial event linked to CIN \[[@pone.0153635.ref003]\]. CsA is associated with renal afferent arteriolar vasoconstriction in rats and tubular injury during acute CsA nephrotoxicity \[[@pone.0153635.ref004]\]. The pharmacological antagonism of Mineralocorticoid Receptor (MR) reduces both cardiovascular and all-cause morbidity and/or mortality during chronic related (or not) heart failure \[[@pone.0153635.ref005], [@pone.0153635.ref006]\]. The MR expressed in endothelium and smooth muscle cells participates to the control of vascular tone: both endothelial and vascular smooth muscle MR modulate the responses to vasodilators and vasoconstrictors \[[@pone.0153635.ref007], [@pone.0153635.ref008]\]. Pharmacological antagonism of MR by both spironolactone \[[@pone.0153635.ref009], [@pone.0153635.ref010]\] and eplerenone \[[@pone.0153635.ref011], [@pone.0153635.ref012]\] is highly efficient to blunt CIN in experimental models. The vascular smooth muscle MR has been recently shown to play a key role during acute CIN in mice by preventing increased renal vascular resistance in acute CIN \[[@pone.0153635.ref013]\]: this could explain, at least partially, the beneficial effects of MR antagonism in CIN. Chronic renal impairment could limit the use of MR antagonists (MRAs): even if hyperkalemia is feared, spironolactone and eplerenone could be safely used if a close monitoring of kalemia and renal function is ensured \[[@pone.0153635.ref014], [@pone.0153635.ref015]\]. However, the higher frequency of polypharmacy in chronic kidney disease patients could lead to drug-drug interactions and limit MRAs use, especially during kidney transplantation when immunosuppressive drugs metabolized by the P450 cytochrome (like CsA) are necessary. MRAs are not commonly used in this population despite the potential benefits to reduce cardiovascular risk and CIN after renal transplantation. Gonzalez Monte *et al*. reported the benefits of adding spironolactone to a dual-blockade renin--angiotensin--aldosterone system (by both angiotensin-converting enzyme inhibitor \[ACE-I\] and type-2 angiotensin-receptor blockers \[ARB\]) in 11 kidney-transplant recipients with persistent proteinuria: after 6 months, proteinuria had decreased significantly with no adverse event \[[@pone.0153635.ref016]\]. Serum potassium remained stable (no severe hyperkalemia) and no serum bicarbonate was reported \[[@pone.0153635.ref016]\]. Since MRAs have never been tested in CsA-treated kidney-transplant recipients with impaired renal function, the present study was designed to test the tolerance of eplerenone in this population. Subjects and Methods {#sec007} ==================== We conducted a single-center, prospective, open-label study. The primary endpoint was the tolerance to eplerenone, assessed by the occurrence of the following expected adverse events: severe hyperkalemia (\>6 mmol/L), metabolic acidosis (serum bicarbonate \<15 mmol/L), hypotension (systolic blood pressure \<100 mmHg), acute kidney failure (increase in serum creatinine \>30% from baseline), or any adverse event that required discontinuation of eplerenone. Eplerenone was chosen due to its lower affinity for other steroid (progesterone, androgen and glucocorticoid) receptors and the absence of long-acting metabolites: this could lead to less frequent adverse events. We calculated the number of patients to include based upon the risk of severe hyperkalemia (\>6 mmol/L), which was considered as the major adverse event. Levels of kalemia were defined during the study as follow: normal (3.5 to ≤5 mmol/L), mild hyperkalemia (\>5 to 5.4 mmol/L), moderate hyperkalemia (\>5.5 to 5.9 mmol/L) and severe hyperkalemia (\>6 mmol/L). Study design {#sec008} ------------ We performed the study by using a two-steps Simon's plan (**[Fig 1](#pone.0153635.g001){ref-type="fig"}**) \[[@pone.0153635.ref017]\]. During the first step, 14 patients took eplerenone 25 mg/d for 8 weeks. This posology was chosen to be the minimum efficient. If three or more adverse events occurred, then study had to be discontinued. If not, 17 new patients were included within step 2 and also received the same treatment for 8 weeks. If four or more adverse events occurred in both steps (1 and 2), then study had to be discontinued, and the alternate hypothesis (a risk of adverse events \>20%) could not be rejected: i.e., the safety of eplerenone could not be concluded. If not, we could conclude that eplerenone at 25 mg/d could be safety used in such a population. ![Design of the EpleCsAT: Safety trial.\ Sequential inclusion was performed: 14 patients during step 1; then 17 new patients during step 2.](pone.0153635.g001){#pone.0153635.g001} All included patients were aged \>18 years on the date of inclusion, belonged to a healthcare system, gave their informed written consent, had a functional kidney allograft for at least 1 year from the date of inclusion, was receiving CsA, and had impaired renal function, estimated by the MDRD formula \[[@pone.0153635.ref018]\], at between 30 and 50 mL/min/1.73 m^2^. Exclusion criteria were serum potassium of ≥5 mmol/L on the date of inclusion; one or more incidences of severe hyperkalemia (≥6 mmol/L), for whatever reason; currently receiving potassium-exchange resin treatment; on-going pregnancy or lack of effective contraception during the whole study period; uncontrolled high arterial blood pressure (systolic blood pressure \>140 mmHg); orthostatic hypotension; systolic arterial blood pressure ≤110 mmHg; heart failure within the 3 months before the date of inclusion or chronic heart failure (NYHA III or IV); severe hepatic failure (Child-Pugh C score); allergy to one or more of the components of eplerenone (INSPRA^®^); on-going treatment, including spironolactone or eplerenone; on-going treatment that could not be withdrawn during the study period: e.g., potassium-sparing diuretics, potassium salts, CYP3A4 enzyme inhibitors other than CsA; malabsorption syndrome; abnormal galactose metabolism or a deficiency of galactase; on-going non-steroidal anti-inflammatory treatment, or lithium, or another nephrotoxic agent; or on-going treatment with a double-blockade of the renin--angiotensin--aldosterone system with ACE-I and ARB. The treatment could include ACE-I or ARB, but not in combination. Clinical parameters (body weight, blood pressure, and adverse events) were monitored on days (D) 0, 14, 28, and 56. Serum potassium was closely monitored on days 0, 2, 7, 14, 21, 28, 35, 42, 49, and 56. Other biological parameters (such as serum creatinine and bicarbonate) were monitored on D 0, 14, 28, and 56. At any time during the study period, adverse events that required discontinuation of eplerenone included serum potassium \>6 mmol/L, serum potassium \>5.5 mmol/L under potassium-exchange resin, metabolic acidosis assessed by a serum bicarbonate \<15 mmol/L, and any other clinical outcome that required discontinuation of eplerenone. Statistical methods and analyses {#sec009} -------------------------------- According to previously reported data, the probabilities to develop hyperkalemia (\> 6 mmol/L) during 8 weeks of eplerenone treatment are \<7% with the 25mg/d dose and \<10% with the 50mg/d dose \[[@pone.0153635.ref005], [@pone.0153635.ref006], [@pone.0153635.ref016], [@pone.0153635.ref019]\]. Included patients exerted a better renal function than the population of the present study: herein, estimated glomerular filtration rate (eGFR) range was fixed between 50 and 70 mL/min/1.73m^2^. In our population, the expected risk (null hypothesis, H~0~) was supposed to be \< 7% whereas a risk higher than 20% of developing major hyperkalemia (\>6 mmol/L) was considered unacceptable (alternative hypothesis, Ha). Using a sample proportion test, the power to detect this adverse outcome was calculated at 95% (the β risk was 5%). Otherwise, in such conditions, the risk of not identifying an unacceptable risk of major hyperkalemia (\>6 mmol/L) under eplerenone in these patients is 5%: the α risk was calculated at 22.5%. With these hypotheses, the inclusion of 31 patients was required: if 4 (/31) or more patients had to stop the treatment, the safety (\< 20%) could not be assumed. Quantitative data are described by their median and range and qualitative data as numbers and percentages. Variations of serum potassium at different times were evaluated using variance analysis for repeated measures. Comparisons between patients with mild hyperkalemia (\>5 mmol/L) during the study protocol and those with normal kalemia (\<5 mmol/L) at anytime of the study period were performed using univariate analyses (Wilcoxon\'s test or Fisher's exact test, as appropriate) and multivariate analyses (stepwise logistic regression). The multivariate stepwise logistic regression included only significant factors at *p* ≤ 0.10 with entry and removal limits set at 0.10: basal cyclosporine A posology, creatininemia, serum potassium and bicarbonate. Sensitivities and specificities of basal serum potassium and bicarbonate were calculated, and a receiver-operating characteristic (ROC) curve was calculated to determine a cut-off value with optimal sensitivity and specificity: the statistical software (SAS) calculated automatically the coordinates of the ROC curve and calculated both the sensitivity and specificity (1---specificity for more precision) for all coordinates. Then, the cut-off value obtaining the best ratio between the sensitivity and the specificity was chosen. Whatever the test used, a *p*-value \<0.05 was considered statistically significant. All statistical analyses were performed using SAS software, release 9.3 (SAS INC, Cary, California). Ethical considerations {#sec010} ---------------------- This trial (**[S1](#pone.0153635.s001){ref-type="supplementary-material"} and [S2](#pone.0153635.s002){ref-type="supplementary-material"} Figs**) received specific agreements from an appropriate independent ethics committee, was registered in the European registry (EudraCT 2011-003759-20) and in clinicaltrials.gov (NCT01834768) and has therefore been performed in accordance with the ethical standards laid down in an appropriate version of the Helsinki Declaration of 1975, as revised in 2000, as well as the Declaration of Istanbul 2008. All persons gave their informed written consent prior to their inclusion to the study. The clinical and research activities being reported are consistent with the Principles of the Declaration of Istanbul as outlined in the "Declaration of Istanbul on Organ Trafficking and Transplant Tourism". Results {#sec011} ======= A total of 31 patients were included (**[Table 1](#pone.0153635.t001){ref-type="table"}**) and all completed the study period (8 weeks), except one (last follow-up on D35 due to an unplanned move). Serum potassium increased slightly from baseline (4.2±0.4 mmol/L): on d2, serum potassium became increased and then remained in a steady state (**[Fig 2A](#pone.0153635.g002){ref-type="fig"}**). Nine patients experienced at least one episode of mild hyperkalemia (\>5 mmol/L) but there was only one episode of moderate hyperkalemia (\>5.5 mmol/L). This patient received a specific intervention (potassium-exchange resin) on D35. Half the incidences of mild hyperkalemia (\>5 mmol/L) occurred within 7 days after beginning eplerenone treatment. ![Eplerenone induced mild hyperkalemia.\ **(A)** Kalemia increased from day 2 (D2) and became stable during the treatment period. **(B)** Systolic blood pressure (SBP), **(C)** body weight, and **(D)** serum bicarbonate did not change during the treatment period. Data are represented as their median and range (whiskers). \* *p* \<0.05 *vs*. D0.](pone.0153635.g002){#pone.0153635.g002} 10.1371/journal.pone.0153635.t001 ###### Characteristics of included patients. ![](pone.0153635.t001){#pone.0153635.t001g} ---------------------------------------------- --------------------- ***Demography*** *n* = 31  Age (years) 56 \[32--70\] Gender ratio (M/F) 18/13 Time since transplantation (months) 126 \[18--326\] Body-mass index at inclusion (kg/m^2^) 23.8 \[18.2--36.8\] Diabetes, *n* (%) 3 (10) ***Biology***   Creatininemia (μmol/L) 145 \[87--239\] eGFR (mL/min/1.73 m^2^) 41 \[26--59\] Serum potassium at inclusion (mmol/L) 4.2 \[3.4--4.9\] Serum bicarbonate at inclusion (mmol/L) 24 \[12--30\] Natriuresis at inclusion (mmol/d) 136 \[29--360\] Kaliuresis at inclusion (mmol/d) 60 \[0--176\] Proteinuria at inclusion (mg/d) 123 \[0--648\] ***Drug therapies***   Cyclosporine posology at inclusion (mg/kg/d) 2.1 \[1.4--4.0\] Cyclosporinemia at inclusion (ng/mL) 94 \[38--152\] MMF/azathioprine, *n* (%) / *n* (%) 24 (77) / 4 (1) ACE-i/ARB, *n* (%) / *n* (%) 13 (42) / 6 (2) Diuretics, *n* (%) 12 (39) β-blockers, *n* (%) 14 (45) Oral bicarbonate, *n* (%) 7 (23) Steroids, *n* (%) 5 (16) ---------------------------------------------- --------------------- M: male; F: female; eGFR: estimated glomerular-filtration rate; MMF: mycophenolate mofetil. Data are expressed by their median \[range\]. Three patients presented with other adverse events: two unspecific outcomes (diarrhea and sweats) and one acute kidney injury (\>30% increased creatininemia from baseline) on D56, secondary to acute diarrhea. None of these adverse events needed specific management. We observed no modifications to systolic blood pressure (**[Fig 2B](#pone.0153635.g002){ref-type="fig"}**), body weight (**[Fig 2C](#pone.0153635.g002){ref-type="fig"}**), or serum bicarbonate (**[Fig 2D](#pone.0153635.g002){ref-type="fig"}**). Other biological or clinical parameters remained stable. The risk of at least one episode of mild hyperkalemia (\>5 mmol/L) under eplerenone was studied using baseline data: demographic and biological parameters were analyzed as well as treatments. Two groups were individualized (patients with at least one episode of mild hyperkalemia (\>5 mmol/L) *versus* others). After stepwise multivariate analyses (including CsA posology, creatininemia, serum potassium and bicarbonate), only serum potassium and bicarbonate at baseline were independently associated with a higher risk of developing at least one episode of mild hyperkalemia (\>5 mmol/L) under eplerenone treatment (**[Table 2](#pone.0153635.t002){ref-type="table"}**). Higher serum potassium at baseline was associated with a higher risk (OR 6.5 \[1.4;30.5\]) of developing mild hyperkalemia and lower serum bicarbonate was also associated with a higher risk (OR 0.7 \[0.5;0.9\]) of developing mild hyperkalemia. 10.1371/journal.pone.0153635.t002 ###### Candidate parameters for predicting the risk of mild hyperkalemia. ![](pone.0153635.t002){#pone.0153635.t002g} Parameter Kalemia \>5 mmol/L (*n* = 9) No kalemia \> 5 mmol/L (*n* = 22) Univariate analysis[^\#^](#t002fn002){ref-type="table-fn"} Multivariate analysis[\*](#t002fn003){ref-type="table-fn"} ------------------------------------------------ ------------------------------ ----------------------------------- ------------------------------------------------------------ ------------------------------------------------------------ ----- -------------- ***Demography***             Age (years) 50.7 \[32.7--70.1\] 57.4 \[35.8--66.5\] 0.31 Gender (M/F) 7/2 11/11 0.12 Body weight (kg) 75.0 \[66--90\] 70.1 \[43.8--109\] 0.17 Body-mass index (kg/m^2^) 23.8 \[23.0--28.2\] 24.4 \[18.2--36.8\] 0.84 Diabetes at inclusion (*n*) 0 3 0.34 Time since transplantation (months) 152.0 \[24--326\] 119.5 \[18--264\] 0.29 Systolic blood pressure (mmHg) 120 \[110--140\] 130 \[110--140\] 0.42 ***Biology***             Creatininemia on day 0 (μmol/L) 170.0 \[121.0--232.0\] 138.0 \[87.0--239.0\] 0.06 eGFR (mL/min/1.73 m^2^) 36.0 \[26.0--53.0\] 44.5 \[26.0--59.0\] 0.17 Serum potassium at baseline (mmol/L) 4.7 \[4.0--4.9\] 4.1 \[3.4--4.7\] ***\<0*.*01*** ***0*.*003*** 6.5 \[1.4;30.5\] Kaliuresis (mmol/d) 62.0 \[33.0--92.0\] 57.0 \[0--176\] 0.33 Kaliuresis/creatininuria (mmol/mmol) 4.8 \[0.3--7.0\] 4.7 \[0--21.5\] 0.57 Natriuresis (mmol/d) 143 \[71--300\] 135.5 \[29--360\] 0.84 Natriuresis/creatininuria (mmol/mmol) 10 \[1.2--14.8\] 12.7 \[1.8--64.6\] 0.25 Serum bicarbonate at baseline (mmol/L) 21.0 \[12.0--25.0\] 24.0 \[19.0--30.0\] ***0*.*02*** ***0*.*007*** 0.7 \[0.5;0.9\] ***Drug therapy***             Cyclosporine A posology at inclusion (mg/d) 180 \[120--220\] 140 \[100--280\] 0.08 Cyclosporine A posology at inclusion (mg/kg/d) 2.1 \[1.6--2.8\] 2.0 \[1.4--4.0\] 0.37 Cyclosporinemia at inclusion (ng/mL) 98 \[38--145\] 92.5 \[40--152\] 0.81 ACE-I at inclusion (*n*) 3 10 0.26 ARB at inclusion (*n*) 2 4 0.36 Diuretics at inclusion (*n*) 4 8 0.29 β-blockers at inclusion (*n*) 4 10 0.31 Oral bicarbonate at inclusion (*n*) 2 4 0.36 Steroids at inclusion (*n*) 1 4 0.39 M: male; F: female; eGFR: estimated glomerular-filtration rate; OR: odds ratio; CI: confidence interval. Data are expressed as their median \[range\]. All urine tests were performed on 24-h urine collections. ^\#^ Univariate analyses using Wilcoxon tests for quantitative variables and Fisher exact test for qualitative variables. \* Multivariate analysis by stepwise logistic regression was performed including creatininemia, serum potassium, serum bicarbonate and cyclosporine A posology on day 0. ROC analyses were performed to test if a cut-off value for serum potassium and/or bicarbonate at baseline could distinguish which patients had a higher risk of developing mild hyperkalemia (\>5 mmol/L) under eplerenone treatment. Only serum potassium at baseline (**[Fig 3A](#pone.0153635.g003){ref-type="fig"}**) showed this ability (AUC = 0.846 \[0.681--1.0\]), whereas serum bicarbonate at baseline (**[Fig 3B](#pone.0153635.g003){ref-type="fig"}**) did not (AUC = 0.222 \[0.048--0.397\]). Serum potassium of \>4.35 mmol/L at baseline was a marker for a higher risk of developing mild hyperkalemia (\>5 mmol/L) during the treatment period, with a sensitivity of 78% and a specificity of 77%. ![Risk factors for developing mild hyperkalemia under treatment.\ Receiver-operating characteristic (ROC) curves for **(A)** serum potassium and **(B)** serum bicarbonate at baseline.](pone.0153635.g003){#pone.0153635.g003} Discussion {#sec012} ========== During this study, we found that eplerenone could be safely given to kidney-transplant recipients treated with CsA and impaired renal function. The only acute renal failure observed during eplerenone treatment was not considered to be associated to this treatment due to the diarrhea. This gastro-intestinal adverse outcome was no longer related to eplerenone, regarding to the context of known contact. Moreover, other ongoing drugs could have facilitated this event. After the RALES study \[[@pone.0153635.ref019]\], MRAs were considered to be at risk of major hyperkalemia \[[@pone.0153635.ref020]\], especially in patients with chronic kidney disease \[[@pone.0153635.ref021]\]. Most of the cases of severe hyperkalemia were due to the lack of serum potassium monitoring after initiating the treatment \[[@pone.0153635.ref022]\]. All CNIs increase the risk of hyperkalemia \[[@pone.0153635.ref023]\], especially after adding a renin--angiotensin--aldosterone-system blocker, such as ACE-I or ARB \[[@pone.0153635.ref024]\]: the underlying mechanisms may rely on the decreased efficacy of loop diuretics (like furosemide) \[[@pone.0153635.ref025]\], the activation of the sodium-chloride co-transporter \[[@pone.0153635.ref026], [@pone.0153635.ref027]\], and decreased ROMK channel activity \[[@pone.0153635.ref028]\]. CNIs are also associated with mild renal tubular acidosis in about one-third of patients \[[@pone.0153635.ref029]\]. The acidosis observed during CsA-treatment \[[@pone.0153635.ref030]\] can worsen potassium shift from the intracellular to the extracellular compartment: distal renal tubular acidosis \[[@pone.0153635.ref031]\] appears to be related to Na^+^/K^+^ ATPase pump impairment \[[@pone.0153635.ref032]\] under CsA-treatment. MRAs could worsen metabolic acidosis, especially when it pre-exists \[[@pone.0153635.ref033]\]. In our study, serum bicarbonate was closely monitored: if it was associated with a higher risk of developing mild hyperkalemia (\>5 mmol/L) during the treatment period, a basal cut-off value could not be proposed. The use of oral bicarbonate was allowed and was monitored due to its possible effects on preserving renal function decline \[[@pone.0153635.ref034]\] and counteracting the acidotic effect of MRAs. Even if patients that had at least one episode of mild hyperkalemia (\>5 mmol/L) had lower serum bicarbonate at baseline, they were not more frequently treated with oral bicarbonate (2/9 patients) than other patients (4/22, *p* = 0.36). Other treatments that could interact with the metabolism of potassium were screened: the frequencies of ACE-I, ARB, diuretics and/or β-blockers were not different between both groups. Renal impairment is a risk factor of hyperkalemia: during chronic kidney disease, renal potassium handling increases as glomerular-filtration rate decreases \[[@pone.0153635.ref035]\], leading to hyperkalemia because of the loss in nephron mass. In the present study (where all patients had a renal impairment), renal function assessed by the MDRD formula \[[@pone.0153635.ref018]\] was not associated with a higher risk of developing mild hyperkalemia (\>5 mmol/L) during the treatment period. Because of the creatininemia assay used in our study (modified Jaffe's method), the use of the CKD-EPI formula--which necessitates an enzymatic assay--was not appropriate \[[@pone.0153635.ref036]\]. For ranges of eGFR between 30 to 59 mL/min/1.73m^2^, the MDRD formula misclassifies 5% of patients that should be mostly in the upper eGFR group (60 to 89 mL/min/1.73m^2^) \[[@pone.0153635.ref036]\]: as the included patients in the present study had eGFR ranging from 30 to 50 mL/min/1.73m^2^, misclassifications may had been rare. Even if creatininemia at baseline tended to be different between patients that experienced at least one episode of mild hyperkalemia (\>5 mmol/L) during the study, eGFR was not different. Moreover, multivariate analysis included creatininemia at inclusion: it did not explain the higher frequency of mild hyperkalemia (\>5 mmol/L) observed in these patients. The risk of developing moderate to severe hyperkalemia during treatment with eplerenone is less than 10% in both hypertension and heart-failure indications, depending on the definition of hyperkalemia (\>5.5 mmol/L or 6 mmol/L) and drug dosage \[[@pone.0153635.ref037]\]: in our study, only one (1/31, about 3%) moderate hyperkalemia (\>5.5 mmol/L) was observed. Laboratory monitoring (serum potassium and renal function), after initiating MRA treatment, is the best way to prevent hyperkalemia and hospitalization \[[@pone.0153635.ref038]\]. Even though our cohort was relatively small (*n* = 31), higher serum potassium at baseline was associated with a higher risk of developing mild hyperkalemia (\>5 mmol/L) during the treatment period. In our study, mild hyperkalemia was not associated with a higher rate of 24-h kaliuresis, neither at baseline nor during the follow-up. At a steady state, kaliuresis reflects potassium intake and is not related to a higher risk of developing hyperkalemia: this is consistent with a previous study \[[@pone.0153635.ref039]\]. To evaluate the risk of developing mild hyperkalemia during treatment with eplerenone, a cut-off value of 4.35 mmol/L at baseline was determined to have both the best sensitivity and specificity. A previous study also reported that, during hypertension therapy, predictive factors for developing moderate hyperkalemia (\>5.5 mmol/L) under MRA treatment were eGFR \<45 mL/min/1.73 m^2^ and baseline serum potassium \>4.5 mmol/L \[[@pone.0153635.ref040]\]: this is consistent with our findings. Such data are easy to use in clinical practice, especially when hyperkalemia is feared: in our study, among patients who experienced at least one episode of hyperkalemia (\>5 mmol/L), only two had serum potassium levels at baseline that were lower than this cut-off value, defining a negative predictive value of close to 90%. The beneficial effects of MRAs have been well established during heart failure, with strong data obtained during randomized controlled trials, especially when cardiac ejection fraction is reduced \[[@pone.0153635.ref041]\]: both eplerenone and spironolactone have demonstrated improved survival benefits. During chronic kidney disease, the use of MRAs is associated with reducing proteinuria \[[@pone.0153635.ref042]\]. As proteinuria is one of the most common predictive factors for the progression of kidney disease \[[@pone.0153635.ref043]\], a beneficial effect of MRAs on kidney survival could be expected but has not been demonstrated previously, due to a lack of randomized controlled trials with kidney survival as the primary endpoint. MRAs could also be useful during CIN \[[@pone.0153635.ref044]\]: both drugs (MRAs and CsA) act on vascular function. MRAs could limit CsA-induced vascular toxicity. Several animal studies suggest a beneficial effect of MRA use under CsA treatment \[[@pone.0153635.ref009], [@pone.0153635.ref010], [@pone.0153635.ref013]\]. It could be related to vascular MR-induced remodeling \[[@pone.0153635.ref045]\]. To date, no study was published using MRAs and including tacrolimus-treated patients. The beneficial effects of MRAs could be related to their diuretic effects or their pleiotropic actions (tissue remodeling), as occurs during heart failure \[[@pone.0153635.ref041]\]. In our study, no effect was observed on systolic, diastolic or mean blood pressure nor on body weight. This is consistent with previous studies: during-end stage renal disease in anuric hemodialyzed patients, MRAs use was effective in reducing mortality without causing a diuretic effect \[[@pone.0153635.ref046]\], and post-hoc analysis of the EPHESUS trial showed that the beneficial effects of eplerenone were independent of diuretic effects \[[@pone.0153635.ref047]\]. In our study, MRA dosage was low but was efficient enough at increasing serum potassium. Dose-efficiency has been demonstrated for both spironolactone \[[@pone.0153635.ref048]\] and eplerenone \[[@pone.0153635.ref049]\] in reducing morbi-mortality. Moreover, electrolyte disturbances (hyperkalemia) appear to be also dose-dependent \[[@pone.0153635.ref041]\]. Survival benefits in heart failure have been shown with low posologies: the means were 26 mg/d for spironolactone during the RALES trial \[[@pone.0153635.ref019]\] and 42 mg/d and 39 mg/d for eplerenone during the EPHESUS \[[@pone.0153635.ref006]\] and EMPHASIS-HF \[[@pone.0153635.ref005]\] trials, respectively. Such a low dose has been shown to be efficient during end-stage renal disease in reducing mortality in hemodialyzed patients \[[@pone.0153635.ref046]\] and morbidity in peritoneal dialysis patients \[[@pone.0153635.ref050]\]. All these data are consistent with the dosage we chose in the present study: it appeared to be the best compromise between achieving higher efficacy and lower toxicity in our population. Further studies should test the safety and efficiency of higher doses (50 mg/d) that should be facilitated by the use of potassium binders \[[@pone.0153635.ref051]\]. Taken together, our data show the safe use of eplerenone in CsA-treated transplant recipients, despite renal impairment. This is consistent with a previous study in another population of chronic kidney-disease patients \[[@pone.0153635.ref015]\]. Of note, our study is the first performed on kidney-transplant recipients. Further studies are needed to analyze the potential benefits of MRAs in kidney-allograft transplantation: an adequately powered prospective randomized controlled trial should test the efficiency (and safety) of eplerenone in reducing chronic renal-allograft dysfunction, and the potential benefits to survival. Supporting Information {#sec013} ====================== ###### CONSORT/TREND statement checklist. To improve the quality of nonrandomized trials, this checklist helped verifying all items. (PDF) ###### Click here for additional data file. ###### Trial protocol (English). All the extended methods used in this trial are available here in English and was approved by legal authorities. (PDF) ###### Click here for additional data file. ###### Trial protocol (French). All the extended methods used in this trial are available here in French and was approved by legal authorities. (PDF) ###### Click here for additional data file. Reims University Hospital and the Institut National de la Santé et de la Recherche Médicale funded the present study. The authors thank Drs Aldjia Hocine and Antoine Braconnier for the follow-up of participants and Mr Eymeric Lagonotte and Dr Vincent Vuiblet for blood and urine management and storage. [^1]: **Competing Interests:**The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: JPB CB SL OT PN PR. Performed the experiments: JPB SL OT. Analyzed the data: JPB CB PR. Contributed reagents/materials/analysis tools: JPB CB FJ PR. Wrote the paper: JPB CB.
{ "pile_set_name": "PubMed Central" }
#extendmOOC – Experimenter Module – ACTIVITY 3 I chose it because it reminds us how much education has changed. The box is old and reminiscent of a time when education was all paper and pencil and teachers were the purveyors of all information. Now students can learn almost anything they want from the Internet. Teachers and the education system have to change and evolve to make the learning experience better for all. That’s what I love about the #extendmOOC Experimenter module. We get to play around and try new things and ponder how we can apply them to our practice. It’s fun, engaging and we can make mistakes (and learn from them). Activity 1 – Reflection The first activity asked us to try at least 3 Daily Extends. I tried more because I find them so fun. I like them because they are quick (usually), I get to learn something new and sometimes I can utilize what I learn in my courses. #oext1 challenged us to look around our home/office for an object that allows us to extend the capabilities of a task. I chose three things that fit the bill for me. Here’s my post on Twitter The second #extend I chose was #oext13. For this one we had to Define Yourself in One or More Noun Project Icons. We were to explore the Noun Project site for one or more icons that might represent you. I had never heard of the noun project. It had some great images that I will go back to and incorporate into lessons and presentations. By asking you to give credit to the source, it reminds faculty that just because it’s for education, doesn’t mean you don’t have to give credit (and it is also serves as an example to students when they see you giving credit). the following was my post: @ontarioextend#oext13 – I care about my students and am always thinking about new ways to reach and engage them. Because of this, I don’t get enough sleep and need my coffee to wake up every morning. All this can stress me out….just a bit…#extendmOOC The third one I chose was #oext123. This daily activity brought in the curation and collaboration modules. We collaborated by curating a list of videos on how and why to use ed-tech tools. I actually did 2 posts for this one. I found a great video on one of my favourite tools (Socrative). My post on Twitter: What is Tagboard? Tagboard is a really useful tool for finding tweets about various topics (based on the hashtag you use). It allows you to see tweets in a more visual way that looks almost like a Padlet wall. Our school is taking a deeper look into Micro-credentials, so I decided to make a tagboard that would find any reference to micro-credentials on Twitter using the hashtag #microcredentials. There were some very interesting posts that I will be exploring further. Link: https://tagboard.com/microcredentials/480738 Last week, I was in an online workshop on digital badges and they were talking about how using digital badges to show skills is important in bridging the gap between what employers are looking for and the skills candidates have. This was one of my favourites posts and it confirms what they said in the workshop: This tool allowed me to quickly search posts about specific topics. In this case, it lead me to articles and people who are interested in the topic. This is an awesome tool that I plan to use from now on! Overall, I think this may be one of my favourite modules. I’ve never been afraid to try new things when it comes to technology. I like to bring the students along for the ride and get their input. Sometimes we (teachers) think we know what a student will like or find intuitive. It’s important to get them involved in the process. I find that when they are, those are the activities that are embraced by the students the most. If you look both the diagram and the definition, we are still looking for some of the same skills that we always have, only now we focus on the utilization of technology to achieve the task. For example, one element: “Communications and collaboration. Participate in digital networks for learning and research”. Just because we have technology available to better communicate/collaborate, doesn’t mean we didn’t expect students to be able to communicate before technology was around. Technology has changed the way we communicate and hence, students need to be able to communicate this way. Collaboration once meant that students would have to get together physically in order to collaborate on projects. Now they can do it all virtually and don’t even have to be in the same time zone. As teachers, we can help our students to become more digitally literate by demonstrating effective technology use and/or incorporating it into our assignments. E.g. Utilizing a simulation to enhance understanding and application of subject material. The All Aboard: Digital Skills in Higher Education resource listed some specific examples of what can be utilized. For example, under “Teach and Learn”, things like simulations, digital badges, lecture capture etc. are listed. Quite often, when we hear the words “digital literacy”, we think of knowing how to use a computer. Too often we assume that because students are “digital natives” that it also means they know how to utilize digital tools effectively. I have found that most of the times this is not the case. How many times have you, as a teacher, stood at the front of the classroom and asked: “any questions?” And how many of those times have you been met with blank stares, and silence? Have you, like me, resorted to a “Ferris Bueller” reference: “Anyone…? Anyone…? Bueller…? Bueller…?” only to be met, yet again, with blank stares from the much-younger-than-you-even-think-they-are, born in the post-Bueller era, students in the room? This nugget resonated with me because I know if I ask my students, “any questions”, most of the time, I will get the same response that the teacher in Ferris Bueller’s Day Off did; blank stares. Sometimes, just to see who’s actually listening, I’ve said the exact thing from the movie: ”Anyone…? Anyone…? Bueller…?” and I get laughter (and the occasional student who has never seen the movie). At the very least, it gets students smiling. I learned a long time ago that I needed other ways to check how students were doing. For many of them, asking if there are any questions scares them and they stay silent rather than speak. They think they are the “only one” that doesn’t understand. A number of years ago, I received a grant as part of the HP Catalyst Initiative for a Math project that I proposed. We received 50 touchscreen PC computers and some money to utilize them in my Business Math classes. Each student had a laptop to use in the class and my notes were broadcast out to each device. They saw everything I wrote on their devices as I wrote it. They could add their own notes and save all of it. Two of the best features were the “stop light” and the ability for students to work on a question and ‘send’ it back to me. Photo by Davis Sanchez on Pexels.com The stop light was simple. With a press of a button, I could ask the students if they understood the material (Green), were somewhat confused (yellow) or they didn’t understand (Red). It was quick and no one else knew what they answered except me. There was one instance where ½ of them didn’t understand the material. When I mentioned this, all of a sudden, hands went up. Realizing that they were not the only one confused gave students the confidence to ask questions. We reviewed the material and were able to move on and not leave anyone behind. The other feature allowed me to push out a question to the students, and the students could answer it and send it back to me. Since this was a math question and they had touch screen devices with pens, they could write their answers just like they would on a piece of paper. This gave me the ability to see in detail what they were thinking when answering questions and I could address any issues through feedback that I could write on their submission and send back to them. I could also choose a solution that was correct and display it for the whole class (without a name). When I moved to a classroom that did not have these devices, I had to find new ways to accomplish the same thing. I turned to Socrative to help me get quick feedback on how students were doing. Most students download the app which makes it quick and easy to use. At the beginning of each class, I give students a quick poll with some questions that are based on the lesson from the previous class. I take up the questions they have issues with before moving on. I can see who is having trouble and can use that information to give more individual help as well. Photo by freestocks.org on Pexels.com I would like to find another tool that would allow me to see their process when solving problems. Since most, if not all, students have a smart phone, I was considering using something like Flipgrid to get them to video themselves solving a problem. Another one I’d like to try is goformative. I will have to do some testing to see what works and get feedback from the students on what they liked. I find involving the students in the decision adds to the buy in. That’s how I settled on Socrative. We tried a few things and they told me they liked Socrative the best. Every class I would hear “are we doing a Socrative today miss?” There’s nothing better than having students look forward to doing math!! This is post is my submission for the Ontario Extend MOOC Activity: Like Driving a Car Many concepts I teach build on other concepts learned at the beginning of the course, or on concepts that should have been learned in grade school or high school. Because so many students come with a variety of backgrounds, we find we have to teach concepts such as Order of Operations, exponents and fractions. There are many examples I could use. But I am working on one example in my Business Math 2 course that demonstrates this point. Students have been working with the compound interest formula To work with the formula, the need to understand What each operation/symbol means Order of operations Exponents How to use the exponent button in their calculator We are now moving on to finding i In order to isolate i in the equation, they need to be able to apply algebraic skills to rearrange the formula. know how to take the nth root (and that this is how they can get rid of the exponent) understand that they need to do the correct operations in the right order This is just one concept that depends on understanding previously learned material. I believe that many students struggle in math because they don’t understand the basics. Applying this to more complicated problems is very difficult if they don’t have the foundation they need. This is the last 9x9x25 post and its nice that it aligns closely with the end of the Fall term. It provides an opportunity to reflect on the entire term as we prepare for the end of semester and look toward the holidays and some much deserved time off. There have been lots of ups and downs this semester. I’ve had a number of challenges trying to motivate students to not only come to class, but stay and participate. I’ve also had some great successes where I saw students actively participating and having fun with math. I have found this time writing blog posts for the 9x9x25 challenge a great way to reflect on my teaching in a different way than I am used to. So often, reflecting means looking at how the class went, making notes for next time and moving on. It’s a personal process and it’s usually not shared with others. By taking time each week to write a post, that process became a shared process, especially when others responded through comments. I know it thrilled me when JR reflected on my post. And this week, I found Prof Mel’s post about HyFlex (which I made sure to Like). I am interested in exploring it at our school and should we move ahead, I know one person I will reach out to. The only thing I wish I could have done better is reading more of the 9x9x25 posts. There are so many wonderful posts, it’s hard to read them all! I do have one suggestion for future Challenges (and I hope there will be more). I would like to see more interaction between participants. I am not sure how that would be accomplished. One thought – one or two of the posts we do should have to be as a response to another? This has been a very interesting journey and I am glad I took the time to do it. Now it’s time to start thinking about the next term. A New Year… A New Term… I’ve got lots of plans for this winter, both personal and professional. I will be teaching my first full online course this winter. This is a course I have been working with our Online Learning Center to develop since January and it’s finally going live this Winter. I am very excited and nervous at the same time. I’ve taught hybrid courses before, but never fully online. I am looking forward to starting the @OntarioExtend #ExtendmOOC in January! I’ve enjoyed taking part in the PD offerings through Ontario Extend over the past 7-8 months. I’ve learned so much and “met” (virtually) some great people. One of the highlights of my term will be heading back to Arizona to meet up with the people I have been working with on the ShapingEDU project. The 10 Actions to Shape the Future of Learning that were identified last year are pictured above. If you are interested in the future of learning in the digital age, check out https://shapingedu.asu.edu/home And of course, the winter also brings with it – Ski Season! I get to spend my weekends enjoying the great outdoors with my winter family at Alpine Ski Club in Collingwood. 9x9x25 Post #8 This week’s post is not really teaching related. It’s about balance. Balancing our work life and home life so that we can bring the best of ourselves to our teaching. Sometimes we get so busy with our teaching; prepping, marking, answering emails, lesson plans, helping students etc. that we don’t take time for ourselves. I am guilty of doing this. Taking the time to do something that we enjoy and makes us happy, keeps us balanced. I’ve become very unbalanced over the years. Maybe that’s why I decided to take this challenge. It’s making me do something new and I am really enjoying it. When I first started teaching, I always made time for my crafts, especially scrapbooking and card making. I used to call it my right brain activity that kept my life balanced. I teach mostly math and computers, two activities I associate with being left brain activities. I know there’s research indicating that there is no left or right brain, but I can’t help but think there’s something more to it. There may not be a “left” or “right” brained activity, but I do believe that activities fall into different types of categories (logical, creative, etc.). For me, when I do something that’s more creative and is different than the numerical and logical things I do every day, I feel I’m a more balanced as a person. I think it also helps me be more creative in my profession as it helps me to find creative solutions to problems in my classroom. Unfortunately, I have gotten away from using my creative side. Perhaps it’s because I have more responsibilities outside of work than I used to and they are taking up my spare time. My mom passed away 4.5 years ago and my siblings and I have taken over my dad’s care. He just turned 90 last April. I think this (and getting older) has also contributed to an increasing stress level which in turn has created other problems. In August I decided to start taking care of me. I still help take care of my dad and do all the other things on my plate, but now I also make time for me. I’ve cut out processed foods, gluten, dairy and sugar and limit my wine. I feel so much better. I’ve also decided to make a conscious effort to put creativity back into my life. I signed up for a pottery class for this Friday, a couple of paint classes (chalk paint) and starting in January my friend and I will be taking a 10-week pottery course. I am also looking forward to dusting off my DSLR camera to get some great winter shots up at the ski hill. I could write a ton about how much joining Alpine Ski Club has meant to me and my family (https://alpineskiclub.com). But that’s another post for another day. I find when I take the time to do the things I love, I feel better, I am more positive and I think that helps me be more positive with my students There’s lots of research about the benefits of crafts. According to the University of California, Berkeley, a few of the benefits of crafting include: Who doesn’t want to feel better and keep their mind sharp? Being more creative doesn’t have to be limited to knitting, crocheting or sewing…There are lots of ways to de-stress and head off cognitive decline. “There’s promising evidence coming out to support what a lot of crafters have known anecdotally for quite some time,” says Catherine Carey Levisay, a clinical neuropsychologist and wife of Craftsy.com CEO John Levisay. “And that’s that creating — whether it be through art, music, cooking, quilting, sewing, drawing, photography (or) cake decorating — is beneficial to us in a number of important ways.” (https://www.cnn.com/2014/03/25/health/brain-crafting-benefits/index.html) The other class was quiet, but only because it had very poor attendance. The students were quick to tell me that they had two tests that day and because of that, many of the students were not attending so they could study. I thanked them for choosing to come to class. Perhaps that should be the focus of this week’s blog post. I had 25% of the students show up for that class this week. Yes, 25%. I think the ones that attended class came because they clearly recognize that skipping one class to study for another doesn’t help. They knew that they would get behind in the course material and end up playing catch-up. Unfortunately, most of the students that skipped the class are the ones that are already struggling and needed to be there. Because of this, I made sure that I posted a notice outlining what we covered and gave direction on how they could catch up and be ready for next class. I even posted a video covering the material so they didn’t have to try and learn it themselves. I emphasized that because they missed class, they would need to catch up on their own and that we would be moving to the next topic on Tuesday. As an incentive, I told them we’d be having an in-class assignment on last week’s material. I’m not sure how many of them will actually do the work. That’s the bigger problem. If they can’t manage their time well enough to be prepared for a test (and have to skip class to study) are they going to take the time to do the work to learn the missed material? At the time I wrote this, 10 people had gone to the page with the video link. That’s 25% of the class. Most of them were in class that day and were obviously using it to review. So how do I get those kids to understand that skipping class is not a good idea AND that THEY are responsible for making up the work? Those that attended already get it so saying anything to them is pointless. I did some quick research (Google) and it was interesting that many of the posts I found about skipping class were written by students. One article I found on Students.org, (“Is It Worth It To Skip Class To Study?”) was a first-person account of skipping a class to study. The author made some great points. She said it herself: “Skipping class meant missing out on a lot of knowledge I’d need for future tests”. She went on to talk about the anxiety that goes along with trying to make sure she got the notes and anything else she missed. Her conclusion: She doesn’t recommending skipping class. This is what I try and get across to my students, but so few of them believe it. Skipping class has become an epidemic. When I first started teaching, students rarely skipped class. It was a small percentage. Now, it seems even in-class assignments aren’t enough to entice students. I know things have changed. Many students have too many competing priorities. For example, they take on too many hours at their jobs. Instead of a part time job, they’re trying to work 30-40 hours and go to school full-time. The sad part is, some of them end up failing because they can’t put enough time into their schoolwork and end up paying more in the long run. I think the other problem is that some of the students are just not mature enough to realize that attendance is important. I can’t count how many times I have heard “Did I miss anything important?”. Really? I found post that listed the top 5 reasons why students skipped class (as tracked through their social media posts) Hanging with Friends:37 percent of the Twitter posts referenced skipping class to spend more time with their friends. Too Tired:32 percent of students tweeted that they were sleeping or too tired to go to class. Recreation:17 percent of students indicated a specific recreational event or activity that took precedence over attending class. There were a vast number of specific events mentioned, including sports, watching television and playing video games. Studying:11 percent of students mentioned being too busy with other school work to attend class. The article went on to say: “Studies show that class attendance is the number one predictor of grades in a college course, outranking time spent studying, studying skills, high school grades or standardized tests. Despite this clear connection, even the most optimistic academic studies find that nearly one in five U.S. college students are skipping on any given day—with absentee rates reaching up to 70 percent for some large classes at major state universities.” Although they didn’t list where those studies came from, results from my own classes have shown a similar thing. Below is an example from one of my previous classes. Some of the students in this particular class who don’t show up initially, never showed up. However, the graph does show that as attendance goes down, the average grade on the tests have also gone down. I show the students this chart every term in hopes that it might make them think twice before skipping class. This past week I had a student come to me within issue. Let’s call her “Jane”. Jane was not going to be able to make class today and wanted to find out what she was going to miss. Jane’s a good student and I know it was bothering her she wasn’t going to be able to be in class. I told her that if she had any problems, she could email me an we could either meet or do an online help session. I do online help sessions using a variety of different programs. I have recently started using Zoom. It’s easy to use and since I have a Surface Pro which has a touch screen, I can share my screen and write out the problems in OneNote for students to see while I am explaining them. Jane has attended my online help sessions before, so that gave me an idea. I asked Jane if she wanted tryout an experiment with me. Just before class started, I opened a Zoom session (https://zoom.us/) and invited her to login. I shared my screen with her and taught the class as I would normally. Jane could hear everything I was saying and was able to follow along with the lesson as I wrote on my laptop. Normally during an online help session, I would have students post questions to the chat area. In this case, my screen was being shown on the projector. Since I didn’t want to have Jane’s comments broadcast to the entire class, I needed a different tool for questions. I use Remind (https://www.remind.com/) to send quick text messages to students. This has come in very handy when I can’t get access to the LMS and need to get a message out quick. I can easily send a quick note through the Remind App. It’s a great tool that I have been using for over 5 years. One of the new things it has added over the years is a chat function that allows students to text their teacher without giving away either’s phone number. For this lesson, we used the Remind App for questions. She could ask questions (or answer questions I put to the class), but I could also ask her if things were working well from her side or if she had any questions. Everything worked well and she was so happy that she was able to follow along in the class while she was at home. I got the idea to try this from an article I had read about HyFlex Course Models. According to an Educause report, “HyFlex is a course design model that presents the components of hybrid learning (which combines face-to-face with online learning) in a flexible course structure that gives students the option of attending sessions in the classroom, participating online, or doing both.” (https://library.educause.edu/~/media/files/library/2010/11/eli7066-pdf.pdf ) In a very rough way, this experiment what is a HyFlex delivery model. In the past, HyFlex required expensive technology and a special set up in the classroom. With advances in wireless accessibility, software such as Zoom and Tablet PCs which allow writing on the screen, HyFlex isn’t as expensive a venture as it used to be. The beauty of HyFlex is that it gives students the ability to choose which model works for them. For some students, being in the physical classroom is the best way for them to learn. For others, online, whether it’s in person or watching a video, works just as well. Given that the lesson can be recorded, students have the opportunity to review the material if they are still confused or just want a refresher. I’ve spoken to a professor who used this model and their experience was that 1/3 of students come to class, 1/3 students are online and 1/3 watch the video later. The professor was quite pleased with the HyFlex model. I believe those that disagree with HyFlex cite that students will just not come to class and some of those students do not have the study skills to do the work at home. I don’t disagree. Unfortunately, many of those students don’t come to class anyway. At least having a recording gives them an option should they choose to use it. It’s hard to believe that this is post #5 for the 9x9x25 challenge. We are past the halfway point! Since writing (and hence blogging) isn’t my strength, I sometimes find it hard to figure out what to write about. This week I had to look around the other 9x9x25 posts for some inspiration. If you have been reading my other posts, you will know I have been having trouble with one particular class. In particular, they are very unfocussed. They would rather sit and wait for me to take up a question, then attempt it on their own (even though I encourage them to work together). Most never do any homework outside of class. They come unprepared for class (some have come to a test with no calculator!!) and then beg for more time or a second chance. Some arrive late for class or leave early. I am constantly searching for a new ideas I can try. I find myself reading the other 9x9x25 posts (and other blogs) as often as I can for help. As I reflected on the past week at school, I found myself both frustrated and energized at the same time. One class, continues to frustrate me. Since I’ve already written about them, I will leave that for now. In my other class, which is a level 1 foundational math class, we had some fun and laughs. I love it when the class is positive and engaged!! I was teaching a topic that most students learn in early high school, if not before. Many students have not seen these topics since then. For others, it’s been even longer if they have been away from high school for a while. The topic was ratios, rates and proportions. The nice part about this topic is that there are lots of examples all around us that help students to understand the material. I told them stories about when I go grocery shopping and take pictures for math class. They thought that it was pretty funny (and I am sure they thought it was geeky too). If I can, I like bringing in clips from movies or television and use them as part of the teaching. It’s a fun way to learn math.
{ "pile_set_name": "Pile-CC" }
Pediatric kidney transplantation. Kidney transplantation in pediatric patients has become a routinely successful procedure, with 1- and 5-year patient survival rates of 98% and 94%, and 1- and 5-year graft survival rates of 93% to 95% and 77% to 85% (the range takes into account differences between living and deceased donors). These good outcomes represent the cumulative effect of improvements in pre- and posttransplant patient care, operative techniques, immunosuppression, and infection prophylaxis, diagnosis, and treatment. This article provides a brief historical overview, discusses the indications for transplantation, describes the evaluation process for the recipient and the potential donor, outlines the operative details, reviews the various causes of and risk factors for graft dysfunction, and analyzes outcomes.
{ "pile_set_name": "PubMed Abstracts" }
A lack of communication is what led to the protests, says Tim Bennett, the president of Jackson-based Overtime Sports. Bennett has spent the better part of nine years trying to bring a team to Biloxi after leading the movement that brought a Southern League franchise to Pearl, Miss., in 2005. He notes that plans call for the city to be repaid for the bulk of its $21 million investment. Another $15 million would be provided by the state of Mississippi from the $1 billion that five states are sharing as part of the Gulf oil spill settlement from BP. The stadium will be built on a plot of land the city will lease from neighboring MGM Resorts International rent-free for 20 years. To help clear the air and bring the two sides together, Bennett has organized a pro baseball rally this afternoon, in which he plans to explain the history of baseball on the Gulf Coast—the Tigers played their spring training games in Biloxi in 1919 and the Washington Senators did the same from 1930-35—and detail the financial benefits of bringing a stadium to downtown Biloxi. “Baseball is more of a uniter than a divider,” Bennett said. “I’ve had people tell me that this is making a dream a reality.” That dream is not necessarily dependent on getting the ballpark built in time for next season, but getting shovels in the ground as soon as possible certainly improves the odds of the project getting completed. Five of the seven Biloxi city council members who approved the ballpark funding will be replaced by new members in July, and while Bennett says “the project is strong enough to stand on its own,” there is no incentive to give a new group of legislators the opportunity to reconsider the previous board’s decision. In addition the two returning members on Wednesday proposed a new site for the ballpark, located in one of the members’ district. “We’re locked in on our location,” Bennett said. “Like I said before, it’s one of the best in the country, second to none. If I believe that, why would I want to move to a different one?” Local opposition to a city-funded ballpark is what led to the unraveling of the plan to move the Braves’ Carolina League affiliate from Lynchburg to a new $37 million ballpark in downtown Wilmington, which would have been funded primarily through an increase in property taxes. The team and the stadium was to be run by a joint venture between the Braves and Mandalay Baseball—former manager Bobby Cox was a visible supporter on hand for an initial proposal and a rally supporting the project after local activists began to oppose the city’s involvement. Those activists acquired the needed signatures on a petition to bring a voter referendum, and the measure was soundly defeated last November with about 70 percent of voters opposing it. There are no plans in the works to revisit the project. “We’re not anticipating trying to resurrect the effort. This was the effort,” Mandalay CEO Art Matin said at the time. “We have stated why this (plan) makes sense and people in Wilmington have decided not to support it.” On the same day voters rejected a ballpark in Wilmington, residents of El Paso, Texas, voted in favor of a hotel tax increase to help pay for a $50 million ballpark to host the Padres’ Triple-A Pacific Coast League franchise. Groundbreaking for the stadium happened earlier this month and construction is scheduled to be completed in time for Opening Day next season. Bennett has said that he does not expect the project to face similar opposition as what happened in Wilmington, and some of the protestors on Wednesday admitted to be in favor of a ballpark but wanted more opportunity to have a say in how the city spent its money. Bennett said if the project does not hit any roadblocks, an announcement regarding which team would be purchased and relocated to Biloxi could come in the next 30 days.
{ "pile_set_name": "Pile-CC" }
The government assigned the Ministry of Finance to submit to the National Assembly for consideration and decision of the new corporate income tax (CIT) of 20 percent for small and medium-sized enterprises (SMEs) from July 1st, 2013.The rate would be 10 percent for income from social housing business, applying from July 1st, 2013. The government has just issued Resolution No. 02/NQ-CP on a number of solutions to solve difficulties for businesses and support market. Under the Resolution, the government extended 6 months for payable CIT in Q1/2013 and extended 3 months for payable CIT in Q2 and Q3/2013 for SMEs (which have less than 200 employees and less than 20 billion revenue) and processing, manufacturing businesses which use intensive labours. Businesses in housing investment sector will enjoy tax payment extension for their income from housing investment activities. The government also extended 6 months for payable Value Added Tax (VAT) in Q1/2013 for SMEs, processing and manufacturing enterprises using intensive labours, businesses carrying housing activities (sale, lease, rent…) and producers of Iron, steel, cement, bricks, tiles which have been paid VAT under the deduction method. Refunding Environmental Protection Tax paid from January 1st, 2012 to November 14th, 2012 for nylon bags used in pre-packed products. In addition, the government also deduct 50 percent of land rent fees for 2013 and 2014 for businesses, households, individuals suffered payable rent fees under the government’s Decree No. 121/ 2010/NQ-CP dated December 30, 2010 exceeding 2 times of the paid fees in 2010.The Decree also stated that the fees applied for each vehicle to restrict personal vehicles on road will be not applied. Tags: Share: Testimonials SBLAW Company have advised us in real estate projects. We are satisfied with the professionality and responsibility of the lawyers of SBLAW. Thể legal service of SBLAW contributed to the success of our projects. We highly appreciated the capacity and methodology of SBLAW. We are glad that we found S&B Law team. S&B Law provided us effective legal solutions. All our questions were answered in detail and in a comprehensible. The S&B Law team works as professionals and meets international standards. We appreciated that time-frames announced were respected and their valuable ideas. We are really satisfied with your services that lead to the best result. We no need to be worry to co-operate with you so that you become the top of our best partners. Congratulation on your professional operation. S&B Law’s advice are clear and concise, they have a small team of dedicated lawyers who have a keen sense of the local business environment. Mr. Tran Trung Kien is highly recommended because of his commitment and professional insight. S&B Law’s service is comparable to that of the first tier firm within the corporate advisory sector. S&B Law has always committed to our queries professionally. S&B Law was very professional in their approach and we managed to obtain approvals from various Vietnamese authorities within the time frame expected. We are very satisfied and pleased with their assistance and services extended to us. S&B law provided us with effective legal solutions covering our licensing, financing and intellectual property needs. Dynamic and enthousiastic, the S&B team govern their firm with professional international standards while remaining always up-to-date to the most recent laws and business practices in Vietnam. Mr. Voltz Clement Romain Benedickt - Managing Director at METISECO VIETNAM CO.,LTD Follow Us Brouchure SBLAW has been recognized as one of the leading and highly recommended business law firms in Vietnam. Today, our two offices in Hanoi and Ho Chi Minh city are staffed by a strong team of about 40 lawyers /attorney and legal professionals.
{ "pile_set_name": "Pile-CC" }
Identification and characterization of human ZNF274 cDNA, which encodes a novel kruppel-type zinc-finger protein having nucleolar targeting ability. A human cDNA encoding a novel zinc-finger protein, ZNF274, was identified by the "nuclear transportation trap" method (Ueki, N., Oda, T., Kondo, M., Yano, K., Noguchi, T., and Muramatsu, M., 1998, Nat. Biotechnol. 16: 1338-1342). Based on sequence analysis of the full-length cDNA, this novel gene has two alternative splicing forms, ZNF274a and ZNF274b, which encode putative proteins of 621 and 584 amino acids, respectively. ZNF274a contains five C2H2-type zinc-finger motifs, two KRAB-A (Kruppel-associated box) domains, and one leucine-rich domain. ZNF274b lacks the first KRAB-A domain at the N-terminus. ZNF274 mRNA is detected in various human tissues by Northern analysis. The ZNF274 gene is mapped distal to marker RP S28 1 in the human chromosome 19qter region, by RH mapping. The KRAB domains of ZNF274 exhibited transcription repressor activity when tested in GAL4 fusion protein assays. EGFP-ZNF274 fusion protein expressed in COS7 cells predominantly localized to the nucleoli. A series of deletion constructs revealed that a minimal domain consisting of the third and fourth zinc-fingers possesses nucleolar targeting ability. These results suggest that ZNF274 is a ubiquitous transcription repressor that plays a role in the nucleoli.
{ "pile_set_name": "PubMed Abstracts" }
DAB389EGF fusion protein therapy of refractory glioblastoma multiforme. Primary brain tumors including anaplastic astrocytomas and glioblastoma multiforme are difficult to treat because of their locally invasive nature and chemoradioresistance. Novel therapies are needed. One class of therapeutics is fusion proteins consisting of peptide toxins fused to brain tumor selective ligands. DAB389EGF is a fusion protein composed of the catalytic and translocation domains of diphtheria toxin fused via a His-Ala linker to human epidermal growth factor (EGF). DAB389EGF is selectively toxic to EGF receptor (EGFR) overexpressing cells. Close to half of all high-grade primary brain tumors have EGFR gene amplification and EGFR overexpression. With the use of convection-enhanced delivery (CED), DAB389EGF may be delivered locally at high concentrations to the brain tumor. CED would avoid many of the pharmacologic and toxicologic barriers which have limited effective use of this agent including rapid clearance from the circulation, high anti-diphtheria toxin antibody titers in the blood and toxicities to the liver and kidney. Both cell lines and animal models are available to assess the potential of this agent for brain tumor therapy. Since significant amounts of clinical grade DAB389EGF are available, some careful additional preclinical efficacy work should lead to testing of this agent in patients within the next few years.
{ "pile_set_name": "PubMed Abstracts" }
Episodes 2 With Sara out of commission, the team finds a new Anachronism that leads them to the jungles of Vietnam and right in the middle of the war. Ray, Amaya and Zari pose as journalists and trek through the jungle when they are lead to time-displaced Gorilla Grodd. Meanwhile, Nate and Rory run into someone Rory knows which give a glimpse into his past. With the timeline barely stable, the Legends must tackle two anachronisms at the same time to try and keep Mallus at bay. Sara and Rip team up to stop Grodd from going after a particular target leaving Nate and Wally to stop Amaya from changing her future. Meanwhile, the Legends think they have found a way to destroy Mallus, but they will have to create an uneasy alliance with one of their enemies.
{ "pile_set_name": "Pile-CC" }
Sandi Sissel Sandra "Sandi" Sue Sissel (Born August 9, 1949) is an American cinematographer, director and producer. Her interest in photography was apparent as early as high school, where she was a photojournalist for her school paper. She is best known for her work in documentaries such as Salaam Bombay!, Chicken Ranch, Mother Teresa (1986) as well as TV shows like 60 Minutes, and feature films like Mr. and Mrs. Smith. She has been a member of the American Society of Cinematographers since 1994 and the Academy of Motion Picture Arts and Sciences since 2004. Biography She started college in 1967. She pursued her interests and desire to become a reporter by studying journalism and television. While she still wanted to pursue journalism, she did contribute to a few small films during her time in college. After completing this degree, she moved to Wisconsin with her husband where she taught and filmed for the University of Wisconsin. After this career, she moved to New York City, where she soon got a job with both NBC and later ABC. During this time, she contributed as cinematographer for "The Wobblies" and assisted in camera or electrical work for Best Boy, Paul Jacobs and the Nuclear Gang, Free Voice of Labor: The Jewish Anarchists, Fame, No Nukes and "Rush". After working for ABC for a few years, she eventually decided to pursue a career that focussed primarily on cinematography for documentaries and feature films. In her pursuit of this career she has gained a great deal of respect from her colleagues as a female working behind the camera. She currently teaches "Advanced Cinematography Techniques" and "Advanced Cinematography Practicum" at Tisch School of the Arts. Cinematography Sandi is best known for her work as a cinematographer. She has a very impressive filmography that includes many well known, important documentaries. Her interest in being behind the camera may have originated from her father's interest in photography during her childhood. Credits Teaching Sandi has had experience teaching at the University of Wisconsin, and Tisch School of the Arts. In both cases she has taught film related classes. Awards Vision Award Nescens (1998) Women in Film Crystal Awards (1998) Television Award, nominated (2001) Best photography, British Academy of Film and Television Awards (2001) Golden Satellite Award, nomination (2004) Best cinematographer, International Press Academy (2004) References Category:1949 births Category:Living people Category:American cinematographers Category:University of Wisconsin–Madison faculty Category:American Society of Cinematographers members Category:American women cinematographers
{ "pile_set_name": "Wikipedia (en)" }
January 13, 2011 President Obama’s remarks at the memorial for the Tuscon shooting were moving, appropriate, and at times powerful. Taking one step back from the specifics of that terrible event, several portions of his speech have potential meaning for homeland security in general. As the quote from the remarks I used as the title of this post makes clear, bad things happen and the reasons are not always easily identified. Scripture tells us that there is evil in the world, and that terrible things happen for reasons that defy human understanding. In the words of Job, “When I looked for light, then came darkness.” Bad things happen, and we have to guard against simple explanations in the aftermath. This holds true not only for the tragic actions of madmen, but also in the motivation of terrorists of any ideological stripe (think all the talk about “draining the swamp” that produces terrorism following 9/11) and even technological disasters like the BP Deepwater Horizon oil spill (find the final report of the National Commission here). Problems that at first seem easily explained can instead be found to be caused by a web of interconnected failures. Simple explanations may not hold true, and assumptions require examination: You see, when a tragedy like this strikes, it is part of our nature to demand explanations –- to try and pose some order on the chaos and make sense out of that which seems senseless. Already we’ve seen a national conversation commence, not only about the motivations behind these killings, but about everything from the merits of gun safety laws to the adequacy of our mental health system. And much of this process, of debating what might be done to prevent such tragedies in the future, is an essential ingredient in our exercise of self-government. So yes, we must examine all the facts behind this tragedy. We cannot and will not be passive in the face of such violence. We should be willing to challenge old assumptions in order to lessen the prospects of violence in the future. Questioning assumptions is in general good practice, and especially vital for homeland security. Are the threats we perceive the ones we should be most concerned about? Do the systems currently in place to prepare for and respond to disasters and terrorist attacks meet the benchmarks set? Is it even possible to set goals or benchmarks for an amorphous subject such as resilience? And the following passage makes me wonder if Homeland Security Watch’s own Philip Palin had a hand in the drafting process: Rather than pointing fingers or assigning blame, let’s use this occasion to expand our moral imaginations, to listen to each other more carefully, to sharpen our instincts for empathy and remind ourselves of all the ways that our hopes and dreams are bound together. Update: To be a little more provocative and question a larger underlying assumption, whither resilience? I understand the concept as a philosophy, can see the importance of the idea for homeland security in general, and can point to particular actions taken in the realm of critical infrastructure….but as an overarching strategy for homeland security at all levels of government across all possible constituents: where is the beef? At this point, aspiration should not count as progress. If a NSS desk is referred to as resilience, shouldn’t it mean something besides continuation and evolution of pre-existing policy?
{ "pile_set_name": "Pile-CC" }
Conrad V, Count of Rietberg Count Conrad V of Rietberg (died 31 October 1472) was Count of Rietberg from 1428 until his death. His father was Count Conrad IV of Rietberg. Marriage and issue Conrad married before 1450 to Jacoba (d. 23 February 1492), a daughter of Count Gumprecht II of Neuenahr and Margaret of Limburg-Broich. They had six children: John I, succeeded Conrad V in 1472 as Count of Rietberg and ruled until his death in 1516 Emegart, married in 1443 to Arnd Balke Conrad (d, 1508), was elected prince-bishop of Osnabrück on 2 February 1482, and became prince-bishop of Münster in 1497 Simon, was a canon at Cologne Gumprecht, was mentioned only in 1468 Margaret, married on 10 March 1483 to Duke Frederick III of Brunswick-Calenberg-Göttingen His grave Conrad V was buried in a section of the cloister of the former Cistercian Marienfeld Abbey which has not been preserved. His grave stone contained a Latin text: Mille quadringentis septuagesimo secundo annis Transactis, Mensis the penultimate Octobris pius et illustris liberalis Conrad de Reberg comes, proelio miles, A migrans mundo divina quiescat pace. In English translation: After 1472 years were oever, on the penultimate day of October, did the respected and bountiful Count Conrad of Rietberg leave the worldly battle field as a soldier. May he rest in the peace of God. The grave stone of his wife also contained Latin text: Quam premit high sacrum coniux veneranda sepulchro, Retbergi comitis, Jacoba dicta fuit. Illustrious genuit *** generosa propago (Jacoba von Neuenahr) Hanc comitum, inde par nupserat illa thoro Excoluit Quam format, vitam, prudentia, virtus Candida apud superos vivat it illa pios MCCCCXCII, nocte sancti Matthiae In English translation: The venerable woman on whom this unholy grave stone rests, was Jacoba, the wife of the Count of Rietberg. She sprang forth from a noble family and she married in par. She was distinguished by her beauty and her wisdom and virtue distinguished her life. May she lie without sin in the righteous heaven. On the eve of St. Matthias, 1492. Legacy Conrad V built a chapel in the castle at Rietberg; it was consacreted on 2 July 1464. In 1456, he had to give up his imperial immediacy and accept Rietberg as a fief from the Landgraviate of Hesse, in return for a compensation of 600 Rhenish guilders. References External links Biographical summary About the County of Rietberg Footnotes Category:Counts of Rietberg Category:15th-century births Category:Year of birth uncertain Category:1472 deaths
{ "pile_set_name": "Wikipedia (en)" }
Find a Lithonia Precalculus Tutor Subject: ZIP: ...Here we get more involved with non-linear functions as well as imaginary and complex numbers. As an engineer and as a college level tutor, I have worked with algebra 2 type functions and problems for many years. I have been working with spreadsheets for more than 20 years. ...My background in teaching is for Math and Science. I have experience tutoring all age groups, from elementary up to the collegiate level. My personal approach to teaching is to tackle the student's unique problems in their technique and try to improve upon that by correcting the problem at the source, whether that is a lack of practice or plain rustiness. ...Ultimately, my goal is to foster an attitude of self-reliance and curiosity, and to impart the tools necessary to find your own answers.I took the MCAT after completing the pre-med program in the honors program at the University of Georgia. I scored a 35 overall and made an "S" on the writing po... ...I have taught martial arts for the past 8 years and currently have several students that I tutor on a regular basis in TaeKwonDo. Many of my students have reached the rank of Black Belt under my tutelage. I completed a course in linear algebra as part of my coursework at the Georgia Institute of Technology. ...I am a native English speaker and a very patient and soft-spoken individual. I will take as much time as you need until you feel comfortable in the subject of your choice. If you are looking for a reliable and patient tutor for math and science subjects, please do not hesitate to contact me.
{ "pile_set_name": "Pile-CC" }