text
stringlengths 1
3.78M
| meta
dict |
|---|---|
A Texas woman had her Mike Tyson moment when she allegedly bit off a large chunk of another woman’s nose, police say.
The victim, identified only as “Tatiana,” told ABC 13 that she went out to a bar last Wednesday night with her next-door neighbor and a friend of the neighbor, 41-year-old Jessica Collins.
She said after the night out, the three returned to her home, where Collins demanded more alcohol and cigarettes.
Tatiana reportedly told Collins to leave her property, sparking a violent reaction from the woman.
Collins then allegedly jumped her and pulled her to the ground by her hair before biting off a large piece of her nose and swallowing it.
KANSAS COUNCILWOMAN ALLEGEDLY BITES CORRECTIONS OFFICER'S THUMB HARD ENOUGH TO BREAK IT DURING FIGHT
"I didn’t have time to react, to push her away," Tatiana told the news station. "I think I was trying to fight back, but I couldn’t.
"All I could remember was the taste of blood in my mouth."
She said she passed out several times and only realized her nose was injured on her way to the hospital.
“I started calling my husband when I was in the ambulance,” Tatiana said. “I was screaming, like, ‘I don’t have a nose. I’m 28 years old and I don’t have a nose anymore.”
Police arrested Collins and charged her with assault-bodily injury. She was released on bond Monday.
As for Tatiana, doctors said she will need urgent plastic surgery; however she does not have health insurance.
Friends established a GoFundMe page to help with the cost of the surgery. Almost $2,000 has been raised out of a $12,000 goal.
|
{
"pile_set_name": "OpenWebText2"
}
|
The present disclosure relates to a control apparatus and a control method.
In recent years, apparatuses, such as personal computers (PCs), that allow caller-callee communication with an external apparatus between users while reproducing content data have been in widespread use. Among such apparatuses, some apparatuses allow a user to independently control the sound volume of content data and the sound volume of speech of the user by, for example, using a sound mixing function of an application regarding reproduction of content data and an application regarding voice communication. However, it is necessary for a user of such an apparatus to manually control the volume in accordance with, for example, communication conditions as necessary. Therefore, users who use such apparatuses experience inconvenience.
Accordingly, a technology for automatically controlling sound volume has been developed. For example, in order to output, while one type of sound is being output, sound corresponding to another type of sound data, Japanese Unexamined Patent Application Publication No. 11-45096 describes a technology for decreasing the volume of the one type of sound.
When outputting, while one type of sound is being output, sound corresponding to another type of sound data, a control apparatus that employs an existing technology for automatically controlling the volume (hereinafter referred to as an “existing control apparatus”) decreases the volume of the one type of sound. That is, if, for example, an existing control apparatus performs caller-callee communication with an external apparatus between users while reproducing content data, an existing control apparatus automatically decreases the volume of sound of reproduced content data (hereinafter referred to as “content sound”) every time speech of the user is output. Therefore, when an existing technology is used, it is not necessary for a user to manually control the volume of content sound and the volume of speech as necessary. As a result, the user can experience some level of convenience.
However, as described above, if, while one type of sound is being output, sound corresponding to another type of sound data is output, an existing apparatus decreases the volume of the one type of sound. Therefore, in an existing apparatus, even when the user does not want to decrease the volume of, for example, content sound, the volume is disadvantageously decreased automatically.
Thus, even when an existing technology is employed, it is very difficult to increase the convenience that the user experiences.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
/* SPDX-License-Identifier: GPL-2.0 */
/*
* From coreboot file of same name
*
* Copyright (C) 2014 Google, Inc
*/
#ifndef _ARCH_ASM_LAPIC_H
#define _ARCH_ASM_LAPIC_H
#define LAPIC_DEFAULT_BASE 0xfee00000
#define LAPIC_ID 0x020
#define LAPIC_LVR 0x030
#define LAPIC_TASKPRI 0x080
#define LAPIC_TPRI_MASK 0xff
#define LAPIC_RRR 0x0c0
#define LAPIC_SPIV 0x0f0
#define LAPIC_SPIV_ENABLE 0x100
#define LAPIC_ICR 0x300
#define LAPIC_DEST_SELF 0x40000
#define LAPIC_DEST_ALLINC 0x80000
#define LAPIC_DEST_ALLBUT 0xc0000
#define LAPIC_ICR_RR_MASK 0x30000
#define LAPIC_ICR_RR_INVALID 0x00000
#define LAPIC_ICR_RR_INPROG 0x10000
#define LAPIC_ICR_RR_VALID 0x20000
#define LAPIC_INT_LEVELTRIG 0x08000
#define LAPIC_INT_ASSERT 0x04000
#define LAPIC_ICR_BUSY 0x01000
#define LAPIC_DEST_LOGICAL 0x00800
#define LAPIC_DM_FIXED 0x00000
#define LAPIC_DM_LOWEST 0x00100
#define LAPIC_DM_SMI 0x00200
#define LAPIC_DM_REMRD 0x00300
#define LAPIC_DM_NMI 0x00400
#define LAPIC_DM_INIT 0x00500
#define LAPIC_DM_STARTUP 0x00600
#define LAPIC_DM_EXTINT 0x00700
#define LAPIC_VECTOR_MASK 0x000ff
#define LAPIC_ICR2 0x310
#define GET_LAPIC_DEST_FIELD(x) (((x) >> 24) & 0xff)
#define SET_LAPIC_DEST_FIELD(x) ((x) << 24)
#define LAPIC_LVT0 0x350
#define LAPIC_LVT1 0x360
#define LAPIC_LVT_MASKED (1 << 16)
#define LAPIC_LVT_LEVEL_TRIGGER (1 << 15)
#define LAPIC_LVT_REMOTE_IRR (1 << 14)
#define LAPIC_INPUT_POLARITY (1 << 13)
#define LAPIC_SEND_PENDING (1 << 12)
#define LAPIC_LVT_RESERVED_1 (1 << 11)
#define LAPIC_DELIVERY_MODE_MASK (7 << 8)
#define LAPIC_DELIVERY_MODE_FIXED (0 << 8)
#define LAPIC_DELIVERY_MODE_NMI (4 << 8)
#define LAPIC_DELIVERY_MODE_EXTINT (7 << 8)
unsigned long lapic_read(unsigned long reg);
void lapic_write(unsigned long reg, unsigned long v);
void enable_lapic(void);
void disable_lapic(void);
unsigned long lapicid(void);
int lapic_remote_read(int apicid, int reg, unsigned long *pvalue);
void lapic_setup(void);
#endif
|
{
"pile_set_name": "Github"
}
|
Forest of Orléans
Forest of Orléans (French: Forêt d'Orléans) is a French national forest for the most part and makes up 70% of a French natural region, located in the department of Loiret in the Centre-Val de Loire region.
Its former name is "Forêt des Loges".
Geography
Forest of Orléans ranges over 50,000 hectares, including 35,000 hectares which make up the national forest, the remainder being privately owned. It is in fact the largest French national forest. Thirty-five communes take part in it. The forest is surrounded by the natural regions of Beauce, Gâtinais, and Loire Valley; it extends along the North of Loire river in an arc which is 60 km in length, from Orléans to Gien, and 5 to 20 km in width.
Routes and railroads
The national routes 60 and 152 cross the forest of Orléans. It is bordered to the West by the national route 20 and the highway A10, to the East by national route 7 and Highway A77, and to the North by Highway A19.
Two railroads cross the forest, between Orléans and Neuville-aux-Bois via Rebréchien, and between Orléans and Bellegarde via Vennecy and Vitry-aux-Loges.
Two GR footpaths cross the forest of Orléans, GR 3 and GR 32.
Communes
These communes are partly or entirely in the forest of Orléans:
Relief and humidity
The forest is more or less flat, the maximum altitude being 177 m and the lowest 107 m, hence an altitude difference of 70 meters across 50 000 hectares.
This absence of relief, joined with the impermeability of the soil prevents the natural flow of rainwater and explains the humidity of the terrain and abundance of ponds.
Flora and fauna
The forest is mixed. Among the species, common oak makes up over the half of the trees. The resinous trees are mainly Scots pine, which make up a third. Other than these two species, there are equal amounts of birch, hornbeam, European beech, hazel, Corsican black pine, wild apple trees, and lime trees. Many bird species nest in the forest of Orléans. There can be observed ospreys (returned in 1984), booted eagles, short-toed snake eagles, European honey buzzards, hen harriers, European nightjars, black woodpeckers, middle spotted woodpeckers, grey-headed woodpeckers, woodlarks, and Dartford warblers. Others, such as great egrets and common cranes, sojourn in the forest in course of their migration. Numerous other species of animals can be encountered: red deers, roe deers, hares, pheasants, tree squirrels, wild boars, and common frogs.
Main species gallery
Classification
An area of 28 ha of the forest of Orléans was designated a natural zone of ecological interest, fauna and flora. It is mainly of conifers and is of ornithological interest hence the presence of ospreys, nightjars, Eurasian woodcocks, and Eurasian hobbies.
Furthermore, an area of 36 086 ha of the forest north of Loire was designated a natural zone of ecological interest, fauna and flora.
An area of 32 177 ha is under special protection by Natura 2000. It is an Important Bird Area (IBA) that hosts ospreys, booted eagles, middle spotted woodpeckers, and European nightjars.
References
Category: Forests of France
|
{
"pile_set_name": "Wikipedia (en)"
}
|
U.S. Ambassador to Japan Caroline Kennedy waves during her arrival Tuesday in Naha, Okinawa prefecture. (AP)
NAHA, JAPAN — Several hundred people rallied Tuesday ahead of a visit by U.S. Ambassador Caroline Kennedy to the Japanese island of Okinawa to protest plans to relocate an American military base there.
Okinawa is home to more than half of the 47,000 American troops based in Japan under a bilateral defense pact. Kennedy, who arrived later Tuesday, is to meet with Okinawan officials and may see the base relocation site during her three-day visit, Kyodo News agency reported.
Holding signs that read, "No base!" and "Bring democracy to Okinawa," more than 300 protesters, many of them families with children, marched on the main street of Naha to the sound of drums and music, urging authorities to remove the U.S. bases from the island altogether.
"We as Okinawan people gave our answer many, many times that we don't want maritime bases here," said English teacher Kazue Nakamura-Huber, 47. "We want to stop the (new) base project here."
Many Okinawans feel unfairly burdened by hosting many U.S. military facilities on the island, which holds a strategic location in the East China Sea, relatively close to China and Taiwan.
The U.S. has proposed a broad plan to consolidate and reduce its troop presence in Okinawa, including a 1996 agreement to move the Marines Corps Futenma air station, which is in a populated area, to a more remote coastal area called Henoko in Nago City.
The plan got a boost in December when the governor of Okinawa gave the go-ahead for land reclamation to relocate the base, whose plans include runways extending over water.
But many Okinawans want Futenma closed and moved completely off the island. Opponents filed a lawsuit last week seeking to invalidate the governor's approval.
The plan also faces uncertainty as Nago's mayor, a vocal opponent of the relocation plan, was re-elected last month.
Wakana Toguchi, a 12-year-old school girl who joined the rally with her family, said she hoped to show Kennedy the planned relocation site in her town so the ambassador would understand why the base shouldn't be there.
"If I get to see Mrs. Kennedy, I will invite her and show her the beautiful sea, jugons (rare sea animals) and lots of corals. She can perhaps enjoy riding a canoe," Toguchi said. "And I must tell her not to build the base."
|
{
"pile_set_name": "Pile-CC"
}
|
The gap between the people on the ground and the politicians in parliament couldn't be starker. A report in yesterday's Observer found offences relating to cannabis had fallen by a third since 2011 due to the police directing their limited resources on more important matters. But this afternoon in the Commons chamber, the psychoactive substances bill will be debated. MPs are bored of criminalising substances one at a time. Now they are going to criminalise all of them unless they can prove they do not have an effect on the brain.
It really comes to something when the police show more sense of proportion in their handling of the drugs issue than MPs do. Back in the day, it was the other way round. When cannabis was reclassified to Class B under Gordon Brown, a 'cannabis warning' option was left on the book, offering police the ability to give young people a no-record warning for a first offence. It was a form of under-the-table decriminalisation.
The police did not use it responsibly. The problem – one the government could have dealt with easily if it had the sense – was that a cannabis warning counted as a completed crime, no different from having solved a murder or a burglary but obviously far less taxing. So police had an incentive to swagger onto council estates, round up groups of kids and walk out with five completed crimes under their belt. Even when police targets weren't an issue, an ambitious officer would have been tempted to do it just to make his record look good.
But the Observer investigation shows that even the police have realised what a waste of time and resources cannabis operations are. The total number of cannabis offences recorded by English and Welsh police forces – including penalty notices, cautions, charges and summons – fell from 145,400 in 2011-12 to 101,905 in 2014-15. The fact the figures include lower level warnings shows police are not just deploying milder punishments – they are avoiding going after cannabis users altogether.
It can't be explained by decline in use. Cannabis use declined significantly over recent years, but not since 2010. This is about police priorities and it is happening everywhere - from tiny rural Welsh police forces to the Metropolitan police, which recorded 40% fewer offences in 2014-15 than in 2009-10.
This quote from a Gloucestershire police spokesperson almost comes right out and says it:
"We prioritise different crime areas according to greatest need and our priorities at this time are safeguarding vulnerable people, tackling dwelling burglaries and violence committed with weapons. However, when resources permit, we do investigate cannabis cases and execute search warrants when opportunities present themselves."
What the police are doing as a sensible use of resources, MPs are now about to undo. The psychoactive substances bill gets its second reading in the Commons today. Few MPs will bother to attend, although they will obediently file in when it comes to voting it through. Labour has told me it will be supporting the bill. Politics can change out of all recognition, but the capacity of political parties to support the most counter-productive and foolish drug policies is undiminished.
The bill bans any substance which has a psychoactive effect. There's no point going over why that is a nonsense premise – there's been plenty written about it already – but suffice to say that there is no way of establishing a causal pharmacological chain in court which strips out the fact that all substances make you feel different when you consume them, and that even if one could, one would still be criminalising products like incense.
There is a 'reasonable' sale caveat which might protect shopkeepers selling glue to a DIY man rather than a bunch of sniggering kids, although it might just as well discriminate against sniggering kids wanting to buy glue for legitimate purposes. And of course the distinction between reasonable and unreasonable sales will be irrelevant on the internet, where you cannot see the customer.
In reality, the bill will simply allow police and local councils to shut down head shops on high streets and people selling laughing gas canisters at festivals. That's about as far as it will go – although in accomplishing this trivial aim it will overturn centuries of British legal tradition of criminalising specific acts, rather than criminalising everything and demanding the citizen demonstrate whatever he is doing is lawful.
Even if the inane aspects of the bill did not pertain, it would anyway be an obscene use of police time. Laughing gas, which is the chief target of the bill, is a largely harmless drug. It provides a minute or so of very mild euphoria. People have taken it in this country for over 200 years.
It is remarkably safe, although very occasionally someone asphyxiates. There were 17 fatalities between 2006 and 2012, almost all of them involving asphyxiation with a plastic bag. Balloons, which are commonly used, are much safer. Given that laughing gas is Britain's fourth most popular drug, with nearly half a million users, that is a tiny number of fatalities. It is more dangerous to eat nuts.
What's more, anyone ordering laughing gas can simply claim they are making whipped cream, which nitrous oxide is also used for. An online vendor selling it for that purpose recently found a user review reading: "Quality product, I ordered on a Friday and chargers were meant to come on Tuesday but arrived on the next day, good laugh with mates at a festival… er, I mean in the kitchen whipping cream." It gives a pretty good indication of how easy the ban will be to side step.
Laughing gas is a near-perfect drug to demonstrate the dim-wittedness of anti-drugs politicians and the waste of police resources they initiate. It is hugely popular, basically harmless and has a legitimate usage which will allow users to get hold of it regardless of the law.
It is telling that as the police demonstrate they have better things to do than chase cannabis users, politicians are urging them to waste even more of their time on those taking laughing gas. One struggles to imagine a more obvious waste of time, money and brain cells.
|
{
"pile_set_name": "OpenWebText2"
}
|
import {barFraction, barEnd} from "../constants";
export default function barWidth(array) {
const n = array.length;
if (n === 0) return 0;
if (n === 1) return barFraction;
return (barFraction - barEnd * (n - 1)) / n;
}
|
{
"pile_set_name": "Github"
}
|
1. Field of the Invention
This invention relates to systems and methods for flow control within a digital communications network. In particular, this invention is related to systems and methods for performing service differentiation regarding the treatment of packets within a network device.
2. Description of the Related Art
Over the last several years, the Internet has grown into an enormous network to which virtually any large or small computer network may be connected. Thus, the unprecedented growth of Internet users has placed even greater demands on the current Internet infrastructure, especially resources of a network that are shared by multiple network devices. For example, switches, routers and hubs are resources that are shared among a network to assist in transferring packets from one network device to another network device. Unfortunately, the buffer memory and the bandwidth of these shared devices have a limited amount of resources that must be allocated among these competing network devices. Thus, in order to prevent starvation of any particular network device, a network typically provides a service differentiation priority scheme such as Class of Service (CoS) to allocate these shared resources among the competing network devices.
Competition for these shared resources may occur at both the input ports and the output ports of a network device. Competition for entry into the network device may occur at the input ports due to congestion. Namely, when packets are transmitted to a receiver, the receiver might not be able to process the incoming packets at the same speed as the sender transmits the packets. Therefore, the receiver may need to store the incoming packets in a buffer to temporarily hold the packets until the packets can be processed. However, since buffers are created to hold a finite amount of data, a buffer overflow may occur when the packets entering the buffer exceeds the buffer's capacity. To prevent a buffer overflow from occurring, a buffer manager may decide to drop the last few packets of the incoming packets. The buffer manager must also make a service differentiation to determine which class or queue a packet should be dropped from when there is no available buffer space. To avoid congestion wherever possible a network may use conventional algorithms such as Random Early Detection (RED) or Early Random Drop (ERD) to drop the packets from the incoming queues, in proportion to the bandwidth which is being used by each network device.
At the output ports, competition over the bandwidth may also occur. Having enough bandwidth for packet transmissions has been a problem that has plagued many conventional network systems. If the traffic flow of the outgoing packets exceeds the available rate, the packets are typically dropped by the network, which adversely affects a network's Quality of Service (QoS). QoS is usually associated with a network being able to deliver time-sensitive information such as live video and voice while still having enough bandwidth to deliver other traffic. Prioritization, which is also referred to as Class of Service (CoS) or service differentiation, is a technique employed by some networks to identify traffic according to different classifications so that the traffic having a higher priority is delivered before lower-priority traffic.
One service differentiation scheduling mechanism that has been used to allocate the available bandwidth is Weighted Fair Queuing (WFQ) in conjunction with a “leaky bucket” to control the data flow between a network device, the Internet and World Wide Web (WWW) and another device. The leaky bucket method involves configuring a network device to restrict the amount of information (i.e., packets) that a user may receive (e.g., via a port of the network device), by tokenizing the information and setting a threshold.
Thus, the network device must determine whether there are enough credits in the token bucket for a packet to be sent or whether that packet must be delayed. To ensure that the network device uses the WFQ to transmit packets according to the bandwidth policy established in the Service Level Agreement (SLA), the network may establish specified rate parameters for receiving and transmitting the packets. The manner in which these parameters are established and controlled directly influences the network's ability to monitor, manage and control traffic flow having multiple classes of services.
Accordingly, new and improved systems and methods for establishing the operating parameters that govern the service differentiation applied to multiple CoS's as packets are transmitted by a network device are needed.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Recombinant human interleukin-8 is a potent activator of canine neutrophil aggregation, migration, and leukotriene B4 biosynthesis.
Interleukin-8 (IL-8), formerly known as NAP-1, is formed by a variety of cells upon stimulation with IL-1 or tumor necrosis factor (TNF). The biologic activity of the cytokine involves activation of almost every neutrophil function studied so far in different species. In the present study, we compared the effects of recombinant human IL-8 (rIL-8) and the lipid mediators, leukotriene B4 (LTB4) and platelet-activating factor (PAF), on neutrophil functions in dogs. All three chemotactic factors induced neutrophil aggregation and chemotaxis, with rIL-8 being far more potent than LTB4 and PAF. The migration induced by rIL-8 was significantly greater than that observed towards LTB4 and PAF. In the aggregation assay, rIL-8 was shown for the first time to be a potent stimulant. The aggregation response was more persistent than that obtained with LTB4 and PAF and the potency of rIL-8 was greater. An intradermal dose-response study showed that rIL-8 is an extremely potent inducer of selective neutrophil infiltration in canine skin. The infiltration was more pronounced than following injection of LTB4 or PAF. It was proposed that the superior effect of rIL-8 was caused by a synergistic effect between injected rIL-8 and LTB4, which was shown to be produced in biologically active amounts by canine neutrophils stimulated with rIL-8. From a therapeutic point of view, the simultaneous presence of rIL-8 and LTB4 in inflammatory skin diseases highlights the need to develop drugs that inhibit the production and/or effect of both mediators.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
[Development of the Saxon Health Target "Active aging - aging in health, autonomy, and participation"].
In Saxony, the consequences of demographic aging are observable already today. To manage the implications on the health sector, the Saxon Health Targets Steering Committee decided in March 2008 to develop a health target "Active Aging - Aging in Health, Autonomy, and Participation". Target development was based on a 7-level approach (fields of action, main goals, target areas, targets, strategies, intervention measures, indicators for evaluation). A quantitative content analysis was used to reveal 10 potential relevant fields of action, three of which were selected for target development. Targets were developed by 53 stakeholders in multiprofessional working groups. Criteria-based analyses were performed to assure appropriate scientific evidence and feasibility of targets and intervention measures. Over a period of 9 months, 24 targets were defined referring to the main goals "needs-based health care structures", "multiprofessional qualification", "self-rated health" and "intergenerational solidarity". Thirteen targets were developed into recommendations for specific intervention measures. Most of the proposed interventions aim to modify health-related structures or psychosocial determinants of health in the elderly. The best recommendations for intervention measures shall be implemented in cooperation with interested decision-makers.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Surgical management of intra-abdominal hypertension and abdominal compartment syndrome.
The initial management of intra-abdominal hypertension (IAH) is medical measures to reduce intra-abdominal pressure (IAP). These, in combination with percutaneous drainage of peritoneal free fluid, may serve to reduce IAH. If these measures fail, surgical decompression of the abdomen by laparotomy is necessary to control the IAP, search for and treat inciting factors, and reduce the hypertension. The abdomen is usually left open with temporary abdominal closure techniques. Surgical decompression of IAH associated with acute pancreatitis or secondary abdominal compartment syndrome has other surgical options besides a complete celiotomy. Attention to detail in surgical technique and postoperative care is essential for optimal outcome.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Site Mobile Navigation
Pension Fund Losses Hit States Hard, Data Show
When total state government revenues across the nation plummeted by a record-breaking 30.8 percent in 2009, the steep investment losses of pension funds proved to be an even bigger drain on state coffers than recession-battered tax collections, according to census data released Wednesday.
States reported $1.1 trillion in total revenues in 2009, down from $1.6 trillion a year earlier — the steepest drop the United States Census Bureau has reported since it began collecting data on state government finances in 1951.
Tax collections fell by $66 billion, blowing a hole in the operating budgets of many states. But the biggest losses will be felt only in the future: states reported a $477 billion decline in what the census calls “insurance trust revenue,” mostly from pension funds but also from funds for unemployment insurance and workers’ compensation.
It is hardly a secret that the bursting of the housing bubble and the Great Recession pummeled state finances. But the new census data, for the fiscal year that ended for most states at the end of June 2009, provides the most comprehensive view yet of the decisions states made in the year they saw their revenues fall by record amounts.
The data told a tale of states struggling to adapt to the new fiscal reality. Thanks to an infusion of federal aid, largely from the stimulus, states saw their general revenues decrease by only 1.4 percent — but general expenditures by state governments rose by 3 percent.
The downturn gave states new priorities and needs. As more people lost their jobs, states found themselves paying $66 billion in unemployment benefits in 2009, up from the $35 billion that they had paid a year earlier.
An error has occurred. Please try again later.
You are already subscribed to this email.
Donald J. Boyd, a senior fellow at the Nelson A. Rockefeller Institute of Government in Albany, said the new census data showed how state governments as a whole began to respond to the recession in what he called “the year of shock and awe for state government taxes.”
Public welfare spending rose 6.1 percent in 2009, as needs rose during the prolonged recession and the federal stimulus bill provided more money to states for programs like Medicaid and the Temporary Assistance to Needy Families. But at the same time, Mr. Boyd pointed out, “spending on some of the bread-and-butter operations of government came to a virtual standstill” as corrections spending grew by only 1 percent, spending on government administration grew by less than half a percent, and spending on parks and recreation fell by 4.6 percent.
Even though President Obama only signed the stimulus bill into law in February 2009, midway through the fiscal year for most states, the injection of federal money helped offset some of the loss of tax revenue: total federal grants to the states rose by nearly 13 percent that year to $477.7 billion. The stimulus money is set to run out this summer — leaving states facing big deficits next year, since their tax collections, which have begun to rise again, are still far below their pre-recession levels.
The biggest loss recorded — the $477 billion decline in revenues earned by the pension funds and other social insurance trust funds — had little immediate impact on state budgets. But its effects are likely to be felt for years.
“It is truly astounding,” Mr. Boyd said of the losses. “They don’t translate immediately into budgetary stress for states. But what does happen is through the wizardry of actuarial valuations, they will drive pension contributions by states and localities up considerably in the coming years, and that’s true despite the good stock market of 2009, and the relatively good stock market of 2010.”
A version of this article appears in print on January 6, 2011, on Page A14 of the New York edition with the headline: Pension Fund Losses Hit States Hard, Data Show. Order Reprints|Today's Paper|Subscribe
|
{
"pile_set_name": "Pile-CC"
}
|
509 F.Supp. 992 (1981)
Theodore W. WEYHMUELLER, Plaintiff,
v.
JANITORS UNION LOCAL NO. 1, SERVICE EMPLOYEES INTERNATIONAL UNION, Defendant.
No. 79 C 2297.
United States District Court, N. D. Illinois, E. D.
March 9, 1981.
*993 John M. Bowlus and Cotton, Watt, Jones, King & Bowlus, Chicago, Ill., for plaintiff.
Kalman D. Resnick, Martin J. Burns, Linda R. Hirshman, and Jacobs, Burns, Sugarman & Orlove, Chicago, Ill., for defendant.
MEMORANDUM OPINION
WILL, Senior District Judge.
In this case, the plaintiff, a member and former appointed official of the defendant, alleges that he was discharged from his position as business agent because he ran against the incumbent president in an election held shortly before his dismissal. The plaintiff claims that his discharge under these circumstances violated section 609 of the Labor Management Reporting and Disclosure Act (LMRDA). The defendant now moves for summary judgment. For the reasons stated below, we deny the motion.
BACKGROUND
The facts in this case, with a few crucial exceptions, are undisputed. The plaintiff has been a member in good standing of the defendant union since 1953. From 1953 to 1960, plaintiff worked as a janitor in the Chicago area. In 1960, he was appointed a business agent. He served in this capacity until October 4, 1978.
As business agent of one of eight districts within the defendant's jurisdiction, the plaintiff occupied a position of responsibility and authority and exercised considerable discretion.[1] A business agent is expected to supervise all union employees within his district, investigate and attempt to settle informally employers' complaints regarding union members' job performance, assist in the processing of grievances, supervise the collection of members' dues and employers' contributions to the health and welfare fund, supervise and engage in organizing efforts within the district, investigate employers' compliance with the collective bargaining agreement, refer union members for employment to employers with whom the union has a collective bargaining agreement, and explain and generate support for the union's policies and positions on various issues among the membership.
In May 1978, the plaintiff announced that he intended to run for president in the next election against the incumbent, Charles Burg. Mr. Burg and other officials of the local union and its international affiliate apparently were displeased by plaintiff's candidacy. In June 1978, the plaintiff met briefly with Mr. Burg and Eugene Moats, the vice president of the international union, to discuss the upcoming election. Mr. Moats informed the plaintiff that, in Mr. Moats' opinion, the plaintiff stood no chance of winning the presidency, was not qualified for the job, and would harm the union by dividing the membership if he continued to run for the position. Mr. Moats also told the plaintiff, in an allegedly threatening tone, that he "[didn't] think everyone can shake hands and walk away from it when its over." He reminded the plaintiff that he was an appointed, rather than elected, official and that he served at the pleasure of the elected officials. Mr. Moats continued, "[a] lot of people would like your job. There are a hundred guys out there swinging a mop and broom for every business agent in Local 1 ... and they'd love to be in your job tomorrow."
Despite Mr. Moats' and others' disapproval of his candidacy, the plaintiff continued campaigning for president of the union. However, on September 14, 1978, he lost the election to Mr. Burg.
*994 What occurred thereafter is in dispute. According to the defendant, the relationship between Mr. Burg and the plaintiff was cordial following the election. On September 29, 1978, however, a union member named Slobodan Ilic allegedly came to the defendant's offices and charged the plaintiff with having taken money in exchange for the plaintiff's referring him to a new job. Accepting money for referring a member for employment was contrary to union policy. And, according to the defendant, business agents were frequently warned not to engage in such a practice. The defendant allegedly interviewed Mr. Ilic at length about the incident and concluded that the charges were true. On October 4, 1978, Mr. Burg and other union officials informed the plaintiff that he was summarily fired for "selling jobs."
According to the plaintiff, however, Mr. Ilic's charges were unfounded or exaggerated, and the defendant simply seized on them as a convenient excuse for discharging him. The real reason for his discharge, according to the plaintiff, is that he opposed Mr. Burg for the union's presidency. The plaintiff points to the summary way in which he was dismissed, despite his denial of Mr. Ilic's charges, as evidence that the defendant's stated reason for dismissing him was a pretext. Mr. Moats' "threats" prior to the election, together with the fact that the plaintiff's discharge occurred less than a month after the election and without any hearing, plaintiff asserts, indicate the real reason for his firing.
Although the plaintiff retains his membership in the defendant union, he has not held an elected or appointed post since his dismissal as business agent. In June 1979, he initiated this action, claiming that he was unlawfully disciplined by the defendant for exercising his rights under sections 101(a)(1) and (2) of the LMRDA.
DISCUSSION
Section 101(a)(1) and (2) of the LMRDA, 29 U.S.C. §§ 411(a)(1) and (2), provide in relevant part:
Equal rights Every member of a labor organization shall have equal rights and privileges within such organization to nominate candidates, to vote in elections or referendums of the labor organization, to attend membership meetings, and to participate in the deliberations and voting upon the business of such meetings, ....
Freedom of speech and assembly Every member of any labor organization shall have the right to meet and assemble freely with other members; and to express any views, arguments, or opinions; and to express at meetings of the labor organization his views, upon candidates in an election of the labor organization or upon any business properly before the meeting, subject to the organization's established and reasonable rules pertaining to the conduct of meetings....
Additionally, section 609 of the Act, 29 U.S.C. § 529, provides in part:
It shall be unlawful for any labor organization, or any officer, agent, shop steward, or other representative of a labor organization, or any employee thereof to fine, suspend, expel, or otherwise discipline any of its members for exercising any right to which he is entitled under the provisions of this chapter.
There is no dispute in the present case that the plaintiff's active candidacy against the incumbent president of the union and his criticism throughout the campaign of the incumbent leadership's policies are rights protected by sections 101(a)(1) and (2). The primary issue here is whether the union's discharge of the plaintiff for exercising these rights is actionable under section 609.
A number of courts have recently addressed the question whether a union member can challenge his removal from an appointed position, and have reached different conclusions. Several courts have concluded that an appointed official may be removed from office for any reason or no reason, including for exercising his rights under section 101(a). See, e. g., Wambles v. International Brotherhood of Teamsters, 488 *995 F.2d 888, 889-90 (5th Cir. 1974) (per curiam); Cehaich v. International Union, UAW, 496 F.Supp. 912, 916 (E.D.Mich. 1980); Navarro v. Leu, 469 F.Supp. 832, 835 (N.D.Ohio 1979). See also Wood v. Dennis, 489 F.2d 849, 858 (7th Cir. 1973), cert. denied, 415 U.S. 960, 94 S.Ct. 1490, 39 L.Ed.2d 575 (1974) (Stevens, J., concurring). These courts point out that elected union officials necessarily rely on appointed officials to implement their policies and plans and, therefore, need the full cooperation and support of these appointed officials. Unless elected officials are free to choose the people who will be carrying out their directives, their plans may not be fully implemented and, indeed, may be frustrated; to be able to choose those who will be carrying out their plans, elected officials must have a free hand to hire and fire appointed officials. See Wambles v. International Brotherhood of Teamsters, supra at 889-90; Cehaich v. International Union, UAW, supra at 915. Moreover, these courts have concluded that union officials need not wait for evidence of insubordination before discharging appointed officials. As one court has explained,
It can be argued that an appointed office holder under the president who has opposed him in the election does not guarantee obstructionist policies while he serves in his position as an appointed Union official and that before the appointed official could be discharged for cause he would have to show an actual conflict of interest. This is a rather charitable view of persons recently involved in political conflict. A more realistic view would be that in a great majority of cases the friction generated in the election campaign would infect and seriously impede the successful candidate's implementation of his program approved by the membership electing him.
Wambles v. International Brotherhood of Teamsters, supra at 889. See also Cehaich v. International Union, UAW, supra at 916; Navarro v. Leu, supra at 835.[2]
At the heart of these courts' conclusion that an appointed union official can be discharged for exercising his rights under section 101(a) is their belief that Congress did not intend in the LMRDA to interfere with the conduct of internal union affairs beyond guaranteeing certain minimum democratic rights for union members. To attempt to distinguish between the firing of union officials for dissent and firing for insubordination, according to these courts, would intrude more deeply into internal union affairs than Congress intended. See Wambles v. International Brotherhood of Teamsters, supra at 890. See also Wood v. Dennis, supra at 858 (Stevens, J., concurring). Also central to these courts' conclusion is their conviction that to restrict in any way elected officials' hiring and firing of appointed officials would actually decrease, rather than increase, union democracy. As one court has stated,
To extend the protection of labor's "Bill of Rights," ... to such office holders would, in effect, give such officers a lifetime job except on dismissal for cause. The elected officials necessarily rely on appointed officials to implement policies and plans presumably approved by the Union membership in the election. To tie the President's hands, an elected official, by not allowing him to discharge without cause or for any reason those who must serve under him would so restrict the elected officers in the discharge of their duties that elections could be meaningless. An appointed official should carry out the approved policies of the Union. His convictions and loyalties should be to the Union and not a personal fiefdom beyond the reach of the membership, here expressed by the appointive powers of elected officers.
Wambles v. International Brotherhood of Teamsters, supra at 889-90. See also Cehaich v. International Union, UAW, supra at 915.
*996 In a second group of cases, several courts that have addressed the question whether a union member can challenge his removal from an appointed position, where his removal was allegedly occasioned by the exercise of his rights under section 101(a), have reached a different result. These courts have concluded that, while an appointed official cannot be discharged simply for exercising his section 101(a) rights, he may be discharged for insubordination; however, these courts have defined insubordination broadly enough to encompass activities which arguably are protected by section 101(a). See, e. g., Miller v. Holden, 535 F.2d 912, 916 (5th Cir. 1976); Sewell v. Grand Lodge of the International Association of Machinists and Aerospace Workers, 445 F.2d 545, 550-51 (5th Cir. 1971), cert. denied, 404 U.S. 1024, 92 S.Ct. 674, 30 L.Ed.2d 674 (1972). These courts agree with Wambles, Cehaich, etc., that elected union officials necessarily rely on appointed officials to carry out their policies and programs. They also agree that elected union officials have the right to expect loyalty and cooperation from the appointed officials. Consequently, these courts have concluded that an appointed union official who "spend[s] his employer's time opposing the plans and policies he was employed to execute" can be discharged even though, as a union member, the official has a right to express his dissatisfaction with union policies and programs. Sewell v. Grand Lodge of the International Association of Machinists and Aerospace Workers, supra at 551. Thus, in Sewell, the court held that the dismissal of an appointed union representative because of his active opposition to a referendum proposal that the union's elected leadership supported was entirely proper. See id. at 552.
At the same time, however, these courts, unlike Wambles, Cehaich, etc., apparently believe that a distinction should be drawn between the firing of union officials for dissent and firing for insubordination. See Miller v. Holden, supra at 916; Sewell v. Grand Lodge of the International Association of Machinists and Aerospace Workers, supra at 550-51. Moreover, they, unlike the courts in Wambles, Cehaich, etc., apparently do not condone the dismissal of appointed union officials before any evidence of insubordination surfaces. See Miller v. Holden, supra at 916.
In a third group of cases, courts have concluded that a union member can challenge his discharge under the LMRDA. See, e. g., Grand Lodge of the International Association of Machinists v. King, 335 F.2d 340, 346 (9th Cir. 1964), cert. denied, 379 U.S. 920, 85 S.Ct. 274, 13 L.Ed.2d 334 (1964); DeCampli v. Greeley, 293 F.Supp. 746, 752 (D.N.J.1968); George v. Bricklayers, Masons, and Plasterers International Union of America, 255 F.Supp. 239, 242 (E.D.Wis.1966). These courts have concluded that, although partisan participation by appointed officials in intra-union politics may threaten the smooth internal administration of unions, Congress intended to extend the rights set out in section 101(a) to all union members and not simply to rank and file, non-office holding members. As one court has explained,
It would seem, in protecting the exercise of democratic rights of free speech and assembly at union meetings involving matters bearing on the affairs of the full membership, that union officers and important officials, such as Business Agents, have a greater obligation to speak up than do the ordinary members, because of the responsibility and prestige of their positions. A Business Agent is just such a union official to whom the membership looks for guidance, .... It is widely known that in many unions the Business Agent is the most important administrative representative. To reduce him to silence through fear of disciplinary reprisal is tantamount to saying that the member who succeeds in becoming an official of the union forfeits membership rights guaranteed to him by the LMRDA. Certainly, Congress never contemplated the imposition of such a "Hobson's Choice."
DeCampli v. Greeley, supra at 752. These courts, it seems, are likely to scrutinize more carefully than would the courts in *997 Sewell and Miller the reasons for a union official's discharge. Additionally, these courts, unlike those in Sewell and Miller, do not discuss insubordination, or suggest that an appointed official may be discharged for exercising his section 101(a) rights even if the exercise may rise to the level of insubordination. Nevertheless, the difference between these courts' view and that of the courts in Sewell and Miller is primarily one of degree the degree to which they believe dissent among appointed union officials should be tolerated and not a difference in their views concerning whether an appointed official can state a claim under the LMRDA.
Had the Seventh Circuit taken a position on this issue we would, of course, be bound to follow its lead. But this circuit has not yet addressed the issue whether an appointed union official can challenge his dismissal from office under the LMRDA.
Wood v. Dennis, 489 F.2d 849 (7th Cir. 1973) (en banc), cert. denied, 415 U.S. 960, 94 S.Ct. 1490, 39 L.Ed.2d 575 (1974), is a strong indication of how the Seventh Circuit would rule if it were faced with this question, however. In Wood, an elected union official challenged his discharge, claiming that he was dismissed for exercising his rights under section 101(a). The court concluded that the official's charge that the union leadership attempted to chill the exercise of his right to free speech and right to stand for office by removing him from office stated a cause of action under the LMRDA. See id. at 853. The court, drawing no distinction between the rights of elected and appointed officials,[3] adopted the position set forth in King, supra. See id. at 853. The court concluded that there was nothing in the legislative history of the Act indicating that officers forfeited their right under section 101(a) when they assumed office. See id. at 854. At the same time, however, the court noted that it was "not unmindful of the fine line which must be drawn between what might be termed insubordination on the one hand and freedom of speech on the other," and cited Sewell as an example of a case in which this distinction was important. See id. at 855-56.
We believe, in light of Wood, that the Seventh Circuit would hold that an appointed union official can challenge his dismissal from office if he believes it was occasioned by his exercising his rights under section 101(a). At the same time, we believe that the Seventh Circuit would recognize the right of union leadership to discharge an appointed official where his behavior rises to the level of insubordination, interfering with the performance of his official duties. We also believe that this is the preferable approach.
So long as union leadership is free to discharge appointed officials whose activities and attitudes interfere with the performance of their duties, appointed officials need not put up with uncooperative officers or fear that their policies will be frustrated by the individuals upon whom they must rely to implement them. Additionally, under this approach, appointed union officials will not be frozen into their jobs and insulated from attack by a voting membership dissatisfied with their performance, as the courts in Wambles and Cehaich feared. Elected union leadership will be free to replace inept or uncooperative appointed officials, provided that their dismissal is not simply in retaliation for their exercise of their section 101(a) rights.
We recognize, nevertheless, as Wambles and Cehaich point out, that it may be difficult in many cases to distinguish between discharges intended to eliminate an insubordinate or incompetent officer and discharges in retaliation against an officer's expression of dissent. But, courts are frequently asked to distinguish between employers' discharges of employees for proper and improper reasonsin Title VII cases and cases involving alleged retaliatory discharges in OSHA and Wage and Hour cases, for example *998 so this task is not an unfamiliar one. More importantly, the difficulty involved in distinguishing between simple dissidence and insubordination is worth the effort to preserve the rights which Congress, in the LMRDA, intended all union members to enjoy.
Turning to the facts of the present case, we conclude that the defendant is not entitled to summary judgment. As our discussion above indicates, we reject the defendant's argument that it was entitled to discharge the plaintiff even if the reason for the discharge was the plaintiff's unsuccessful candidacy against the incumbent president and his outspoken criticism of the incumbent leadership's policies. As our earlier discussion explained, the defendant cannot discharge the plaintiff simply for exercising the rights protected by section 101(a).
If, however, the plaintiff's disagreement with the incumbent leadership's policies and programs had interfered with the performance of his duties as business agent then, of course, the defendant would have been entitled to discharge him for this reason. Although the defendant has charged the plaintiff with having violated an important union policy by "selling jobs," there remain unresolved issues of material fact regarding this charge. The plaintiff has produced evidence of threats, made by the defendant prior to the election, to discharge him if he persisted in running against the incumbent president. These purported threats and the timing of the plaintiff's discharge are circumstantial evidence suggesting that the plaintiff's dismissal was in retaliation for his exercise of his rights under section 101(a) and, therefore, improper under the LMRDA. Moreover, even though the plaintiff admitted in his deposition that he received an unsolicited $200 from Mr. Ilic after he referred Mr. Ilic for employment, this is hardly conclusive evidence that the plaintiff violated a union policy against "selling jobs" or that the defendant fired him for "selling jobs."
We therefore deny the defendant's motion for summary judgment.
NOTES
[1] Although the plaintiff "doubt[s] very much" that a business agent enjoys significant discretion in his performance of these functions, he has presented no evidence to support his view. Consequently, we accept the defendant's characterization of a business agent's responsibilities and authority.
[2] Although Wambles has been limited to its facts, see Rosser v. Laborers' International Union of North America, Local No. 438, 616 F.2d 221, 222 n. 1 (5th Cir. 1980); Miller v. Holden, 535 F.2d 912, 916 (5th Cir. 1976), we have discussed the opinion at length because a number of courts have relied heavily, and continue to rely, on it.
[3] Almost every other court has distinguished between appointed and elected union officials, since a stronger case can be made that elected officials cannot be removed from office for expressing dissenting views.
|
{
"pile_set_name": "FreeLaw"
}
|
Addressing the disproportionate representation of children of color: a collaborative community approach.
The state of Indiana recommended a committee be formed to address the disproportional representation of black youth in out-of-home placements. In response, the Indiana Disproportionality Committee (IDC) was established. This article presents the development, objectives and future of the IDC. One of the objectives, research, will be offered as an example of the committee's collaborative strategies. The IDC, in partnership with another organization, has begun exploring relationships between ethnicity, risk factors and treatment outcomes. The results of this research effort have examined disproportion and disparity, leading the IDC to identify needs for change within the state. Barriers and successes of the IDC will be shared, so that others can use these efforts to guide their own strategies to reduce disproportionality.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Colour changes of chemical indicators-VI: metallochromic indicators for direct chelometric titrations of zinc.
Eriochrome Blue SE, Eriochrome Red B, Naphthylazoxine 6S, SNAZOXS, and Zincon have been studied in order to find optimum conditions for their use as metallochromic indicators in direct visual chelometric titrations of zinc. The sharpness of the indicator transitions has been investigated by means of photometric titrations and the colour quality has been specified with the aid of the C.I.E. chromaticity systems. Zincon and Eriochrome Blue SE have been found to be the most convenient for visual titrations of zinc.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Acquired perforating dermatosis of diabetes mellitus and renal failure: further ultrastructural clues to its pathogenesis.
An ultrastructural study of a typical case of acquired perforating dermatosis in a patient with renal failure and diabetes mellitus is reported. Crystal-like microdeposits of an electron-lucid material were detected in the upper dermis, close to the transepidermal channel. Compact macrophage conglomerations surrounded the deposits, and a strong histiocytic response was present. Mononuclear inflammatory cells of "activated" type penetrated the acanthotic epidermis provoking basement membrane dissolution and widening of interkeratinocyte spaces. Collagen fibers were seen in the keratotic plug, indicating the process of transepidermal elimination. Our observation supports the hypothesis suggesting that some kind of storage phenomenon may be at the origin of perforating skin lesions in renal failure patients.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How to return a value
See my code and please see what is my problem
$('#StartPiCam').click(function(){
$.ajax({
url: "StartPiCam",
type: "GET",
data: "value=1",
//dataType: "json",
//success: onDataReceived
});
$.ajax({
url: "PiCam_Brightness",
type: "GET",
data: "Brightness={$('#Brightness').val()}",
//dataType: "json",
//success: onDataReceived
});
});
<INPUT ID="Brightness" TYPE=TEXT NAME="Brightness" VALUE="50" SIZE=12 MAXLENGTH=3 NOFINSIDE="~! ~!" >
it returns 0 but I expect returning the value of the input "Brightness"
A:
Changed the data format
This would work according to me.
$('#StartPiCam').click(function(){
$.ajax({
url: "StartPiCam",
type: "GET",
data: {value: '1'},
//dataType: "json",
//success: onDataReceived
});
$.ajax({
url: "PiCam_Brightness",
type: "GET",
data: {Brightness: $('#Brightness').val()}",
//dataType: "json",
//success: onDataReceived
});
});
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Go: Anonymous Function
Here is the code I've been trying to understand:
package main
import (
"fmt"
)
func squares() func() int {
var x int
return func() int {
x = x + 2
return x * x
}
}
func main() {
f := squares()
fmt.Println(f())
fmt.Println(f())
fmt.Println(f())
fmt.Println(squares()())
fmt.Println(squares()())
fmt.Println(squares()())
}
The result we got:
4
16
36
4
4
4
My question is: Why does the value of x in fmt.Println(squares()()) stay unchanged?
A:
Short version
You are building a new closure each time you call squares.
This is exactly as if you built a new Counter object in an object-oriented language:
new Counter().increment(); // 4
new Counter().increment(); // 4
...as opposed to:
c = new Counter();
c.increment(); // 4
c.increment(); // 16
Longer version
In your function, var x int declares a local variable x:
func squares() func() int {
var x int
return func() int {
x = x + 2
return x * x
}
}
As for any function, local variables are visible only inside the function. If you call a function in different contexts, each call has a separate set of memory storage addressable by your local symbols (here x). What happens when you return a function is that any binding currently visible in the scope of your code is kept alongside your function, which is then called a closure.
Closures can hold a state, like objects do. Thus your closure can refer to the local variables that were visible when it was created, even when you escape the block where local variables were introduced (thankfully, the GC is here to keep track of the memory associated with those variables).
When you define f, you create a fresh closure. Each time you call it you modify the same place referenced by the internal x variable. But if you create fresh closures and call them once each, then you won't see the same side-effects, because each x names a different place in memory.
|
{
"pile_set_name": "StackExchange"
}
|
Ireland at the Olympics
A team representing Ireland has competed at the Summer Olympic Games since 1924, and at the Winter Olympic Games since 1992. The Olympic Federation of Ireland (OCI) was formed in 1922 during the provisional administration prior to the formal establishment of the Irish Free State. The OCI affiliated to the International Olympic Committee (IOC) in time for the Paris games. There has been controversy over whether the team represents the Republic of Ireland or the entire island of Ireland, which comprises both the Republic and Northern Ireland.
Medal tables
Medals by Summer Games
Medals by Winter Games
Medals by summer sport
List of medallists
The following tables include medals won by athletes on OCI teams. All medals have been won at Summer Games. Ireland's best result at the Winter Games has been fourth, by Clifton Wrottesley in the Men's Skeleton at the 2002 Games in Salt Lake City. Some athletes have won medals representing other countries, which are not included on these tables.
Medallists
Doping
Cian O'Connor received the gold medal in the 2004 individual showjumping, but was formally stripped of it in July 2005 because his horse failed the post-event doping test.
Robert Heffernan finished fourth in the 2012 men's 50 kilometres walk won by Sergey Kirdyapkin. On 24 March 2016, the Court of Arbitration for Sport disqualified all Kirdyapkin's competitive results from 20 August 2009 to 15 October 2012. Hefferan was upgraded to third, and formally presented with a bronze medal in November 2016.
Medallists in art competitions
Art competitions were held from 1912 to 1948. Irish entries first appeared in 1924, when they won two medals; a third was won in the 1948 competition.
Before independence
Prior to 1922, Ireland was part of the United Kingdom of Great Britain and Ireland. Competitors at earlier Games born and living in Ireland are thus counted as British in Olympic statistics. At early Olympics, Irish-born athletes won numerous medals for the United States, notably the "Irish Whales" in throwing events.
The Irish Amateur Athletic Association was invited to the inaugural International Olympic Committee meeting in 1894, and may have been invited to the 1896 games; it has also been claimed the Gaelic Athletic Association was invited. In the event, neither participated. Prior to the 1906 Intercalated Games, National Olympic Committees (NOCs) were generally non-existent and athletes could enter the Olympics individually. John Pius Boland, who came first in two tennis events in 1896, is now listed as "IRL/GBR"; Boland's daughter later claimed that he had objected when the Union Jack was raised to mark his triumph, and that the organisers apologised for not having an Irish flag. Kevin MacCarthy is sceptical of this story, though by 1906 Boland was crediting his medals to "Ireland".
Tom Kiely, who won the "all-around" athletics competition at the 1904 Olympics in St Louis is also listed as competing for "Great Britain". He had raised funds in counties Tipperary and Waterford to travel independently and compete for Ireland. Frank Zarnowski does not regard the 1904 event as part of the Olympic competition, and doubts the story that Kiely had refused offers by both the English Amateur Athletic Association (AAA) and the New York Athletic Club to pay his fare so he could compete for them. Peter Lovesey disagrees with Zarnowski. It
The British Olympic Association (BOA) was formed in 1905, and Irish athletes were accredited to the BOA team from the 1906 Games onwards. Whereas Pierre de Coubertin recognised teams from Bohemia and Finland separately from their respective imperial powers, Austria and Russia, he was unwilling to make a similar distinction for Ireland, either because it lacked a National Olympic Committee, or for fear of offending Britain. At the 1906 Games, Peter O'Connor and Con Leahy objected when the British flag was raised at their victory ceremony, and raised a green Irish flag in defiance of the organisers.<ref>{{cite journal|date=15 February 2008 |title=This Flag Dips for No Earthly King': The Mysterious Origins of an American Myth'|journal=International Journal of the History of Sport|publisher=Routledge|volume=25 |issue=2 |pages=142–162 |doi=10.1080/09523360701740299}}</ref>
At the 1908 Games in London, there were multiple BOA entries in several team events, including two representing Ireland. In the hockey tournament, the Irish team finished second, behind England and ahead of Scotland and Wales. The Irish polo team finished joint second in the three-team tournament, despite losing to one of two English teams in its only match.
At the 1912 Olympics, and despite objections from other countries, the BOA entered three teams in the cycling events, one from each of the separate English, Scottish and Irish governing bodies for the sport. The Irish team came 11th in the team time trial. The organisers had proposed a similar division in the football tournament, but the BOA demurred.
A 1913 list of 35 countries to be invited to the 1916 Olympics included Ireland separately from Great Britain; similarly Finland and Hungary were to be separate from Russia and Austria, although Bohemia was not listed. A newspaper report of the 1914 Olympic Congress says it endorsed a controversial German Olympic Committee proposal that "now—contrary to the hitherto existing practice—only political nations may participate as teams in the Olympic Games", with the "United Kingdom of Great Britain and Ireland" among these "political nations". In the event, the games were cancelled due to the First World War.
After the war, John J. Keane attempted to unite various sports associations under an Irish Olympic Committee. Many sports had rival bodies, one Unionist and affiliated to a United Kingdom parent, the other Republican and opposed to any link with Great Britain. Keane proposed that a separate Irish delegation, marching under the Union Flag, should participate at the 1920 Summer Olympics in Antwerp. At the time the Irish War of Independence was under way, and the IOC rejected Keane's proposal, pending the settlement of the underlying political situation.
Political issues
The OCI has always used the name "Ireland", and has claimed to represent the entire island of Ireland, even though Northern Ireland remained part of the United Kingdom. These points have been contentious, particularly from the 1930s to the 1950s in athletics, and until the 1970s in cycling.
Northern Ireland
The governing bodies in the island of Ireland of many sports had been established prior to the 1922 partition, and most have remained as single all-island bodies since then. Recognition of the Irish border was politically contentious and unpopular with Irish nationalists. The National Athletic and Cycling Association (Ireland), or NACA(I), was formed in 1922 by the merger of rival all-island associations, and affiliated to both the International Amateur Athletics Federation (IAAF) and Union Cycliste Internationale (UCI). When Northern Ireland athletes were selected for the 1928 games, the possibility was raised of using an "all-Ireland banner" as the team flag, rather than the Irish tricolour which unionists disavowed. J. J. Keane stated that it was too late to change the flag registered with the IOC, but was hopeful that the coat of arms of Ireland would be adopted afterwards.
In 1925, some Northern Ireland athletics clubs left NACA(I) and in 1930 formed the Northern Ireland Amateur Athletics Association, which later formed the British Athletic Federation (BAF) with the English and Scottish Amateur Athletics Associations. The BAF then replaced the (English) AAA as Britain's member of the IAAF, and moved that all members should be delimited by political boundaries. This was not agreed in time for the 1932 Summer Olympics —at which two NACA(I) athletes won gold medals for Ireland— but was agreed at the IAAF’s 1934 congress. The NACA(I) refused to comply and was suspended in 1935, thus missing the 1936 Berlin Olympics. The OCI decided to boycott the Games completely in protest.
The UCI likewise suspended the NACA(I) for refusing to confine itself to the Irish Free State. The athletics and cycling wings of the NACA(I) split into two all-island bodies, and separate Irish Free State bodies split from each and secured affiliation to the IAAF and UCI. These splits were not fully resolved until the 1990s. The "partitionist" Amateur Athletic Union of Éire (AAUE) affiliated to the IAAF, but the all-Ireland NACA(I) remained affiliated to the OCI. The IOC allowed AAUÉ athletes to compete for Ireland at the 1948 London Olympics, but the rest of the OCI delegation shunned them. At that games, two swimmers from Northern Ireland were prevented from competing in the OCI team. This was a FINA ruling rather than an IOC rule; Danny Taylor from Belfast was allowed by FISA to compete in the rowing. The entire swimming squad withdrew, but the rest of the team competed.
Some athletes born in what had become the Republic of Ireland continued to compete for the British team. In 1952, new IOC President Avery Brundage and new OCI delegate Lord Killanin agreed that people from Northern Ireland would in future be allowed to compete in any sport on the OCI team. In Irish nationality law, birth in Northern Ireland grants a citizenship entitlement similar to birth within the Republic of Ireland itself. In 1956, Killanin stated that both the OCI and the BOA "quite rightly" judged eligibility based on citizenship laws.
UCI and IAAF affiliated bodies were subsequently affiliated to the OCI, thus regularising the position of Irish competitors in those sports at the Olympics. Members of the all-Ireland National Cycling Association (NCA) with Irish Republican sympathies twice interfered with the Olympic road race in protest against the UCI-affiliated Irish Cycling Federation (ICF). In 1956, three members caused a 13-minute delay at the start. Seven were arrested in 1972; three had delayed the start and the other four joined mid-race to ambush ICF competitor Noel Taggart, causing a minor pileup. This happened days after the murders of Israeli athletes and at the height of the Troubles in Northern Ireland; the negative publicity helped precipitate an end to the NCA–ICF feud.
The Irish Hockey Union joined the OCI in 1949, and the Ireland team in non-Olympic competitions is selected on an all-island basis. Until 1992 the IHU was not invited to the Olympic hockey tournament, while Northern Irish hockey players like Stephen Martin played on the British Olympic men's team. In 1992, invitation was replaced by an Olympic qualifying tournament, which the IHU/IHA has entered, despite some opposition from Northern Irish members. Northern Irish players can play for Ireland or Britain, and can switch affiliation subject to International Hockey Federation clearance. The Irish Ladies Hockey Union has entered the Olympics since 1984, and in 1980 suspended Northern Irish players who elected to play for the British women's team.
Through to the 1960s, Ireland was represented in showjumping only by members of the Irish Army Equitation School, as the all-island civilian equestrian governing body was unwilling to compete under the Republic's flag and anthem.
In November 2003, the OCI discovered that the British Olympic Association (BOA) had been using Northern Ireland in the text of its "Team Members Agreement" document since the 2002 Games. Its objection was made public in January 2004. The BOA responded that "Unbeknown to each other both the OCI and BOA have constitutions approved by the IOC acknowledging territorial responsibility for Northern Ireland", the BOA constitution dating from 1981. OCI president Pat Hickey claimed the IOC's copy of the BOA constitution had "question marks" against mentions of Northern Ireland (and Gibraltar); an IOC spokesperson said "Through an error we have given both national Olympic committees rights over the same area." The 2012 Games host was to be selected in July 2004 and so, to prevent the dispute harming the London bid, its director Barbara Cassani and the Blair government secured agreement by which Northern Ireland was removed from BOA documents and marketing materials. Northern Ireland athletes retain the right to compete for Britain.
In October 2004, Lord McIntosh of Haringey told the House of Lords:
By contrast, OCI officers Pat Hickey and Dermot Sherlock told an Oireachtas committee in 2008:
Hickey also said:
In 2012, Stephen Martin, who has been an executive at both the OCI and the BOA, said "Team GB is a brand name. Just like Team Ireland. The British and Irish Olympic committees are seen by the International Olympic Committees as having joint rights over Northern Ireland."
In 2009, rugby sevens was added to the Olympic programme starting in 2016. While World Rugby states players from Northern Ireland are eligible to compete on the Great Britain team, the Irish Rugby Football Union (IRFU) director of rugby said in 2011 that "with the agreement of the [English, Scottish, and Welsh] unions" the "de facto position" was that Northern Ireland players must represent an IRFU team. In 2010 The Daily Telegraph'' opined that the IRFU would be entitled to refuse to release players under contract to it, but not to prohibit Northern Ireland players based outside Ireland; but that the issue needed to be handled "with extreme sensitivity".
Name of the country
The OCI sees itself as representing the island rather than the state, and hence uses the name "Ireland". It changed its own name from "Irish Olympic Council" to "Olympic Council of Ireland" in 1952 to reinforce this point. At the time, Lord Killanin had become OCI President and delegate to the IOC, and was trying to reverse the IOC's policy of referring to the OCI's team by using an appellation of the state rather than the island. While the name "Ireland" had been unproblematic at the 1924 and 1928 Games, after 1930, the IOC sometimes used "Irish Free State". IOC President Henri de Baillet-Latour supported the principle of delimitation by political borders. At the 1932 Games, Eoin O'Duffy persuaded the Organisers to switch from "Irish Free State" to "Ireland" shortly before the Opening Ceremony. After the 1937 Constitution took effect, the IOC switched to "Eire"; this conformed to British practice, although within the state so designated the use of "Eire" soon became deprecated. At the opening ceremony of the 1948 Summer Olympics, teams marched in alphabetical order of their country's name in English; the OCI team was told to move from the I's to the E's. After the Republic of Ireland Act came into effect in 1949, British policy was to use "Republic of Ireland" rather than "Eire". In 1951, the IOC made the same switch at its Vienna conference, after IOC member Lord Burghley had consulted the British Foreign Office. An OCI request to change this to "Ireland" was rejected in 1952. The name "Ireland" was accepted just before the 1956 Olympics in Melbourne. The OCI had argued that this was the name in the state's own Constitution, and that all the OCI's affiliated sports except the Football Association of Ireland were all-island bodies.
See also
List of flag bearers for Ireland at the Olympics
:Category:Olympic competitors for Ireland
Ireland at the Paralympics
Ireland at the British Empire Games
2016 Summer Olympics ticket scandal
References
Sources
Notes
External links
Olympics
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
Which is a better implementation of a stack data structure (based on an array)?
This is a version I made:
#include <stdio.h>
#include <stdbool.h>
#define MAX_STACK_SIZE 255
typedef struct
{
int array[MAX_STACK_SIZE];
unsigned int count;
unsigned int max;
} Stack;
void initialize(Stack*);
void push(Stack*, int value);
int* pop(Stack*);
bool isEmpty(Stack*);
bool isFull(Stack*);
int main()
{
Stack s1;
initialize(&s1);
for(int i = 0; i < 7; i++)
{
push(&s1, i);
}
pop(&s1);
push(&s1, 88);
push(&s1, 6);
int *top;
while((top = pop(&s1)) != NULL)
{
printf("Popping %d from the top of the stack.\n", *top);
}
return 0;
}
void initialize(Stack *p)
{
p->count = 0;
p->max = MAX_STACK_SIZE;
}
void push(Stack *p, int value)
{
if(!isFull(p))
{
p->array[p->count] = value;
p->count++;
}
}
int* pop(Stack *p)
{
if (!isEmpty(p))
{
p->count--;
return p->array + p->count;
}
return NULL;
}
bool isEmpty(Stack *p)
{
return p->count == 0;
}
bool isFull(Stack *p)
{
return p->count == p->max;
}
This is a version of how it was done from the source I'm learning from:
#include <stdio.h>
#define MAX_STACK_SIZE 255
#define true 1
#define false 0
#define bool unsigned short int
struct stack
{
int *topOfStack;
int *pointer;
int count;
int max;
int theStack[MAX_STACK_SIZE];
};
void initStack(struct stack *stackStruct)
{
stackStruct->topOfStack = stackStruct->theStack;
stackStruct->pointer = stackStruct->theStack;
stackStruct->max = MAX_STACK_SIZE;
stackStruct->count = 0;
}
bool pushStack(struct stack *stackStruct, int inputValue)
{
if(stackStruct->count < stackStruct->max)
{
*stackStruct->pointer = inputValue;
stackStruct->count++;
stackStruct->pointer++;
return true;
}
else
return false;
}
int* popStack(struct stack *stackStruct)
{
if(stackStruct->count > 0)
{
stackStruct->pointer--;
stackStruct->count--;
return stackStruct->pointer;
}
return NULL;
}
I think there's not so much of a difference between theb, but I just wanted to be sure. In their version, they've used 2 additional pointers in their Stack struct and I removed them because I thought it was not necessary because we could use the array address + count to get the pointer address in their example. I think they used it for convenience reasons. More differences are that I included <stdbool.h> instead of using macros (not really important).
On top of that, I've implemented isEmpty() and isFull() methods just for convenience, but don't take it into account when comparing the two implementations since I'm sure they could do the same. I just chose to show the 2 main functions that could be used on a stack.
Other than that, since it's an array-based implementation of a stack, I think it was possible to not include the max field in the struct since we define in a macro the stack maximum size, but I added it as well to my implementation for the heck of it.
Is there any differences between our implementations? Since I chose to do my own implementation I just want to make sure I that I did implemented it correctly and efficiently.
A:
push() and pop() have an asymmetry that should be reconciled. push() does not indicate any thing special when the stack is full and a push is attempted. It silently does not do the push. Yet when an pop of an emty stack occurs, a NULL is returned (versus a pointer to int) allowing the calling routine to take evasive action. A symmetric solution would both do something special - or not - on full/empty.
A function to inspect the top of stack, without popping, could be added. This IMO would be useful. Additional routines to report current stack depth or stack space left are something to consider.
Using unsigned int is OK, especially if the fixed array size is known to always be less than UINT_MAX. I favor size_t for array indexing as it has better portability for large arrays.
A way to deal with popping or inspecting an empty stack is, as part of initialize(), to pass an int as the bottom-of-stack. This value does not actually ever get "popped off".
The names of the functions are too generic ("initialize") and could well collide with other code. Suggest something like Stack_initialize(), and Stack_push().
The OO part of me wants to see a copy and destructor function too. The destructor could simple do count = max = 0;
|
{
"pile_set_name": "StackExchange"
}
|
Prostanoids exert profound physiological effects on the urinary tract including nociception, induction of smooth muscle contractility, enhancement of cell proliferation, and blood flow regulation. The rate-limiting step in prostanoid synthesis is catalyzed by cyclooxygenase (COX). This enzyme exists in two isoforms: COX-1 (usually constitutive) and COX-2 (highly inducible). COX-2 is substantially induced with distension and stretch of urinary tissues. A new area of interest involving COX activity in urinary tract has been identified: urothelial cell stretch-induced COX-2 expression. In cell culture, urothelial stretch produces a 10-fold induction in COX-2 levels within 6 hours of applying stretch. Since COX-2 upregulation would lead to an increase in soluble prostanoids, this process represents a critical link between urothelial stretch and afferent pain perception, muscle contractility, and cell proliferation. While the specific model of this proposal involves urothelial cells cultured from the ureter, this novel concept has broad implications in the pathophysiology of the urinary tract. The goal of this project is to identify cellular pathways of stretch-induced COX-2 expression and thereby provide several potential targets for drug therapy. Based on titerature reports in other cells, and preliminary data, the hypothesis of this proposal is that stretch activation of PKC and p38 MAP kinase signaling cascades induces COX-2 in urothelial cells. The Specific Aims are: I. To characterize COX-2 induction in human urothelial cells subjected to mechanical stretch. This will be accomplished by determining the optimal duration and degree of stretch for COX-2 induction in human urothelial cells and determining if stretch-induced COX-2 expression is regulated transcriptionally and/or post-transcriptionally in human urothelial cells. II. To determine if stretch induction of COX-2 is mediated by increased intracellular calcium concentrations [Ca++] i and subsequent PKC and p38 MAP kinase activation. This will be accomplished by determining if stretch of urothelial cells increases [Ca++] i, and activates PKC and p38 MAP kinase, if inhibition of calcium, PKC, or p38 MAP kinase attenuate stretch-induction of COX-2, and if p38-dependent transcriptional factors are involved in stretch-induced COX-2 expression. The findings of this exploratory proposal have great potential to expand into several dynamic lines of research and may identify novel approaches to treating urinary tract disorders such as bladder outlet obstruction, ureteropelvic junction obstruction, and interstitial cystitis.
|
{
"pile_set_name": "NIH ExPorter"
}
|
How to attract PES investment from businesses?
A new study has looked at why and how much private sector companies are prepared to invest in Payment for Ecosystem Services (PES) schemes for tropical forests. Understanding companies' motivations and expectations can help develop new sources of funding for PES schemes from the private sector, increasing the area of tropical forest conserved worldwide.
PES schemes can allow companies to pay to help conserve an ecosystem, to ensure that the service they depend on for their business is not at risk of disappearing, to secure access to biological resources, and to demonstrate environmental responsibility. PES schemes to conserve tropical forests are a relatively new concept and little attention has been paid thus far to examine the factors that influence whether or not businesses participate voluntarily.
Using a detailed questionnaire and a complex statistical model, the study compared the hypothetical 'willingness to invest' (WTI) in tropical forest ecosystem services by 60 international and Costa Rican companies. The researchers focused on four ecosystem services: conservation of biodiversity, absorption of atmospheric CO2 (i.e. carbon sequestration), provision of water quality by filtering, flow regulation and prevention of erosion (i.e. watershed protection), and preserving scenic beauty.
In total, the companies were willing to invest in conserving the equivalent of 878 km2 per year of forest by purchasing 'certificates of sustainable forestry'. This equated to paying €2.16 million per year for carbon sequestration, €143,000 for watershed protection, €21,900 for biodiversity conservation and €11,500 for scenic beauty.
Costa Rican firms were willing to invest up to 7.5 times more than international companies (per year and per hectare) for watershed protection, biodiversity conservation and scenic beauty, reflecting a greater interest in protecting their national ecosystem services with local benefits. The difference was less pronounced for carbon sequestration, which is more relevant on a global scale.
The results also revealed differences between companies in different sectors, such as higher WTI in consumer companies (consumer staples, discretionary staples and health care) than industrial companies (those active in the energy, materials, industrial and utilities sectors). However, the number of participants in each sector was relatively low, and a greater number could provide more certain results.
Surprisingly, non-financial motivations (i.e. human welfare and ecological responsibility) and indirect-financial motivations (i.e. image benefits) were the biggest influences on WTI for all ecosystem services. Direct financial benefits (i.e. increased income, cost reductions and client demand) had very little influence. However, non-financial and indirect-financial motivations are unlikely to be enough to convince less environmentally-conscious companies to invest in PES, thus the potential financial rewards need to be highlighted as part of any marketing strategy, say the researchers.
In some cases, previous experience of biodiversity projects had a negative effect on WTI, possibly implying ineffective PES projects and strategies in the past. The existence of an independent intermediary between private companies and forest managers to ensure that money is spent in the most effective ways was also an important deciding factor for international firms.
Source: Koellner, T., Sell, J. & Navarro, G. (2011). Why and how much are firms willing to invest in ecosystem services from tropical forests? A comparison of international and Costa Rican firms. Ecological Economics. 69:2127-2139.
|
{
"pile_set_name": "Pile-CC"
}
|
Azacitidine in untreated acute myeloid leukemia: a report on 149 patients.
Limited data are available on azacitidine (AZA) treatment and its prognostic factors in acute myeloid leukemia (AML). One hundred and forty-nine previously untreated AML patients considered ineligible for intensive chemotherapy received AZA in a compassionate patient-named program. AML diagnosis was de novo, post-myelodysplastic syndromes (MDS), post-MPN, and therapy-related AML in 51, 55, 13, and 30 patients, respectively. Median age was 74 years, median white blood cell count (WBC) was 3.2 × 10⁹ /L and 58% of the patients had ≥ 30% marrow blasts. Cytogenetics was adverse in 60 patients. Patients received AZA for a median of five cycles (range 1-31). Response rate (including complete remission/CR with incomplete recovery/partial remission) was 27.5% after a median of three cycles (initial response), and 33% at any time (best response). Only adverse cytogenetics predicted poorer response. Median overall survival (OS) was 9.4 months. Two-year OS was 51% in responders and 10% in non-responders (P<0.0001). Adverse cytogenetics, WBC >15 × 10⁹ /L and ECOG-PS ≥ 2 predicted poorer OS, while age and marrow blast percentage had no impact. Using MDS IWG 2006 response criteria, among patients with stable disease, those with hematological improvement had no significant survival benefit in a 7 months landmark analysis. Outcomes observed in this high-risk AML population treated with AZA deserve comparison with those of patients treated intensively in prospective studies.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Sketch f(x,y)=(21/4)x^2y over the region x^2 <= y <= 1
Can someone share a technique using MATLAB to plot the surface f(x,y)=(21/4)x^2y over the region x^2 <= y <= 1?
Also, if anyone is aware of some tutorials or links that would help with this type of problem, could you please share them?
Thanks.
Here is another approach:
%%
close all
x=linspace(-1,1,40);
g1=x.^2;
g2=ones(1,40);
y=[];
n=20;
for k=0:n
y=[y;g1+(g2-g1)*k/n];
end
x=x(ones(1,n+1),:);
z=21/4*x.^2.*y;
meshz(x,y,z)
axis tight
xlabel('x-axis')
ylabel('y-axis')
view(136,42)
And the result:
And finally, you can map the region (-1,1)x(0,1) in the uv-plane into the region bounded by $y=x^2 and y=1 in the xy-plane with the parametrization:
f(u,v) = (u\sqrt{v},v)
Capture from: https://math.stackexchange.com/questions/823168/transform-rectangular-region-to-region-bounded-by-y-1-and-y-x2
This code produces the same image shown above:
close all
[u,v]=meshgrid(linspace(-1,1,40),linspace(0,1,20));
x=u.*sqrt(v);
y=v;
z=21/4*x.^2.*y;
meshz(x,y,z)
axis tight
xlabel('x-axis')
ylabel('y-axis')
view(136,42)
A:
First off, let's look at your valid region of values. This is telling us that y >= x^2 and also y <= 1. This means that your y values need to be on the positive plane bounded by the parabola x^2 and they also must be less than or equal to 1. In other words, your y values must be bound within the area dictated from y = x^2 to y = 1. Pictorially, your y values are bounded within this shape:
As such, your x values must also be bound between -1 and 1. Therefore, your actual boundaries are: -1 <= x <= 1 and 0 <= y <= 1. However, this only locates our boundaries for x and y but it doesn't handle where the plot has valid values. We'll tackle that later.
Now that we have that established, you can use ezsurf to plot surface plots in MATLAB that are dictated by a 2D equation.
You call ezsurf like so:
ezsurf(FUN, [XMIN,XMAX,YMIN,YMAX]);
FUN is a function or a string that contains the equation you want, and XMIN,XMAX,YMIN,YMAX contain the lowest and highest x and y values you want to plot. Plotting without these values assumes a span from -2*pi to 2*pi in both dimensions. As such, let's create a new function that will handle when we have valid values, and when we don't. Use this code, and save it to a new file called myfun.m. Make sure you save this to your current Working Directory.
function z = myfun(x,y)
z = (21/4)*x.^2.*y;
z(~(x.^2 <= y & y <= 1)) = nan;
end
This will allow you to take a series of x and y values and output values that are dictated by the 2D equation that you have given us. Any values that don't satisfy the condition of x^2 <= y <= 1, you set them to NaN. ezsurf will not plot NaN values.
Now, call ezsurf like so:
ezsurf(@myfun, [-1,1,0,1]);
You thus get:
This will spawn a new figure for you, and there are some tools at the top that will allow you interact with your 3D plot. For instance, you can use the rotation tool that's at the top bar beside the hand to rotate your figure around and see what this looks like. Click on this tool, then left click your mouse and hold the left mouse button anywhere within the surface plot. You can drag around, changing the azimuth and the latitude to get the perspective that you want.
Edit: June 4th, 2014
Noting your comments, we can decrease the jagged edges by increasing the number of points in the plot. As such, you can append a final parameter to ezsurf which is N, the number of points to add in each dimension. Increasing the number of points will decrease the width in between each point and so the plot will look smoother. The default value of N is 60 in both dimensions. Let's try increasing the amount of points in each dimension to 100.
ezsurf(@myfun, [-1,1,0,1], 100);
Your plot will look like:
Hope this helps!
|
{
"pile_set_name": "StackExchange"
}
|
Detection and genetic characterization of canine parvoviruses and coronaviruses in southern Ireland.
Canine parvovirus (CPV) and canine coronavirus (CCoV) are considered the main pathogens responsible for acute gastroenteritis in dogs. From a collection of 250 samples, seven CPV strains and three CCoV strains were identified in symptomatic Irish dogs. Samples were screened for the viruses using polymerase chain reaction (PCR) and typed via DNA sequence analysis. Three CPV strains were characterized as CPV-2a, while four others were characterized as CPV-2b. To date, CPV-2c remains unreported in Ireland. Two CCoV strains were characterized as CCoV-II and one as CCoV-I. In the case of one sample, PH4/09/Ire, a mixed infection with CPV and CCoV was detected.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
(CNN) Fifty years after humans first stepped onto the moon during the Apollo 11 mission, NASA has created a goal of landing the first woman and next man on the moon's South Pole by 2024. NASA has dubbed this path back to the moon Artemis, after Apollo's twin sister in Greek mythology.
The agency also wants to establish a sustained human presence on and around the moon by 2028.
The program will involve the Orion spacecraft, the Gateway and the Space Launch System rocket, known as SLS. One of the key features of the program is sustainable space exploration with reusable spacecraft and architecture, which could later take humans to Mars.
Vice President Mike Pence at Kennedy Space Center on the Apollo 11 anniversary, next to the completed Orion crew capsule.
"Similar to the 1960s, we too have an opportunity to take a giant leap forward for all of humanity," NASA Administrator Jim Bridenstine said. "President Trump and Vice President Pence have given us a bold direction to return to the Moon by 2024 and then go forward to Mars. Their direction is not empty rhetoric. They have backed up their vision with the budget requests needed to accomplish this objective. NASA is calling this the Artemis program in honor of Apollo's twin sister in Greek mythology, the goddess of the Moon. And we are well on our way to getting this done."
The completed Orion crew capsule was recently revealed, as were the Artemis logo and colors. The A is meant to symbolize an arrowhead from the goddess Artemis' quiver of arrows, which also represents launch. Other factors of the design represent the Earth, the moon and our trajectory from the moon to Mars. The colors include Earth blue, rocket red and lunar silver.
How does it work?
The SLS rocket will send Orion, astronauts and large cargo to the moon all at once, NASA said. And in the future, it could support robotic missions to Mars, Jupiter and Saturn.
The Orion spacecraft can carry four crew members and support deep-space missions, unlike previous craft designed for short flights.
Orion will dock at the Gateway, a spaceship that will go into orbit around the moon and be used as a lunar outpost. About 250,000 miles from Earth, the Gateway will allow easier access to the entire surface of the moon and potentially deep-space exploration.
"The moon is the logical place to learn how we do things," said Mark Sykes, director of the Planetary Science Institute. "It's easier than going to Mars, but the moon is close and convenient. There, we can start building up the infrastructure that makes Mars possible."
Currently, the focus is on the moon, but NASA sees these concepts as workable for a Mars mission, as well.
"The goal is to try to develop systems that could be used in either location with as little change as possible," said Michelle Rucker, Mars Integration Group lead.
A lander on the surface of the moon.
Regarding the moon and Mars, initial launches of cargo will go up before humans, and the SLS will have that heavy launch capability, Rucker said. The Gateway could even be used as an assembly point for the architecture required to stay on the moon and Mars.
NASA's Orion spacecraft was successfully tested in July.
A test version of the Orion crew capsule launched without crew aboard to ensure that when the craft carrying humans ascends to space, the abort system can pull the crew module away if there's an emergency.
"This test is extremely important," said Mark Kirasich, Orion program manager. "Our Launch Abort System is a key safety feature of the spacecraft -- it will protect the crew members who fly onboard Orion during the most challenging part of the mission, which is the ascent phase."
The rocket that will carry Orion to space will be the most powerful engine ever used, which means a more powerful launch abort system is required to keep the crew safe in the event of a problem.
"In an abort scenario, the Launch Abort System and crew module essentially become its own aircraft," said Chuck Dingell, chief engineer for Orion. "Not only do we want to get that craft away from a dangerous scenario quickly, but we also want to control it so that it flies in a direction as far as possible from the rocket. It's also easier to control a vehicle with a forward center of gravity and that is heavier on the front end."
For the final design, the crew will also have an abort button they can use.
Getting back to the moon
Once final testing is complete, Artemis 1 has an estimated launch of November 2020 from Kennedy Space Center. The first mission will be unmanned. The Orion crew capsule and service modules will be on board.
It will be sent on a trajectory to the moon, where it will perform a flyby within 60 miles of the surface and enter a distant retrograde orbit that takes Artemis 1 farther than any of the Apollo vehicles, said Nujoud Merancy, Exploration Mission Planning and Analysis lead for the Orion spacecraft.
The orbit will last between six and 20 days, depending on when the launch occurs. When it returns to Earth, Artemis 1 will splash down in the Pacific Ocean.
A depiction of an ascent vehicle separating from a descent vehicle.
This mission will serve as the main certification that tests the vehicle from tip to tail, Merancy said. It allows NASA to test the heat shield during high-speed re-entry and other conditions that can't be replicated or truly tested on the ground.
On board will be different scientific payloads, as well as examples of radiation protection garments. There are also plans to put a communication unit on board that can be activated once Artemis 1 has launched, allowing it to take pictures and become interactive.
It's the first step in returning to the moon.
Astronauts will launch on Artemis 2, and the first woman and next man to walk on the moon will launch on Artemis 3.
Meanwhile, NASA is seeking input from the private sector for the lunar landers and landing system from the Gateway to the lunar surface.
"The Gateway will be our home base in lunar orbit -- it is our command and service module for missions to the surface of the Moon. Using it as a port for the human landing system, its orbit around the Moon will give us access to the entire lunar surface, and a place to refurbish and refuel the landing system," Bridenstine said. "This is no small feat, and building a 21st century landing system takes the best of our government and private-sector teams."
|
{
"pile_set_name": "OpenWebText2"
}
|
If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
I'd like to introduce hackxor, a webgoat-like hacking game with a plot
and an emphasis on realism, difficulty and actually exploiting
vulnerabilities. It uses the amazingly nifty HtmlUnit to simulate other
users, so you can write your own XSS/CSRF payloads. While the complete
version is a VM image that has to be downloaded&installed aka DVWA, the
first two levels can be played online, as SourceForge is bravely hosting
them at http://hackxor.sourceforge.net/
It contains XSS, CSRF, SQLi, ReDoS, DOR, command injection and plenty of
other vulnerabilities that don't have succinct acronyms. Sadly, due to
time constraints there aren't any timing or entropy attacks (although
you'll have a self-inflicted time-limit if you mess up the ReDoS).
Still, I think the later levels will be difficult enough for nearly
everyone to have a challenge.
|
{
"pile_set_name": "Pile-CC"
}
|
---
abstract: 'This paper introduces a new methodology for the complexity analysis of higher-order functional programs, which is based on three components: a powerful type system for size analysis and a sound type inference procedure for it, a ticking monadic transformation and a concrete tool for constraint solving. Noticeably, the presented methodology can be fully automated, and is able to analyse a series of examples which cannot be handled by most competitor methodologies. This is possible due to various key ingredients, and in particular an abstract index language and index polymorphism at higher ranks. A prototype implementation is available.'
author:
- Martin Avanzini
- Ugo Dal Lago
bibliography:
- 'references.bib'
title: |
Automating Sized-Type Inference\
and Complexity Analysis
---
Introduction
============
One successful approach to automatic verification of termination properties of higher-order functional programs is based on *sized types* [@HPS:POPL:96]. In sized types, a type carries not only some information about the *kind* of each object, but also about its *size*, hence the name. This information is then exploited when requiring that recursive calls are done on arguments of *strictly smaller* size. Estimating the size of intermediate results is crucial for complexity analysis, but up to now, the only attempt of using sized types for complexity analysis is due to Vasconcelos [@Vasconcelos:Diss:08], and confined to space complexity. If one wants to be sound for time analysis, size types need to be further refined, e.g., by turning them into linear dependently types [@LG:LMCS:11]. Since the first inception in the seminal paper of Hughes et. al. [@HPS:POPL:96] the literature on sized typed has grown to a considerable extend. Indeed, various significantly more expressive systems have been introduced, with the main aim to improve the expressiveness in the context of termination analysis. For instance, Blanqui [@Blanqui:CSL:05] introduced a novel sized type system on top of the *calculus of algebraic construction*. Notably, it has been shown that for size indices over the successor algebra, type checking is decidable [@Blanqui:CSL:05]. The system is thus capable of expressing additive relations between sizes. In the context of termination analysis, where one would like to statically detect that a recursion parameter decreases in size, this is sufficient. In this line of research falls also more recent work of Abel and Pientka [@AP:JFP:16], where a novel sized type system for termination analysis on top of $\mathsf{F}_\omega$ is proposed. Noteworthy, this system has been integrated in the dependently typed language .[^1] As we will see, capturing only additive relations between value sizes is not enough for our purpose. On the other hand, even slight extensions to the size index language render current methods for type inference, even type checking, intractable. In this paper, we thus take a fresh look at sized-type systems, with a particular emphasis on a richer index language and feasible automation on existing constraint solving technology. Our system exhibits many similarities with the archetypal system from [@HPS:POPL:96], which itself is based on a Hindley-Milner style system. Although conceptually simple, our system is substantially more expressive than the traditional one. This is possible mainly due to the addition of one ingredient, viz, the presence of *arbitrary rank index polymorphism*. That is, functions that take functions as their argument can be polymorphic in their size annotation. Of course, our sized type system is proven a sound methodology for *size* analysis. In contrast to existing works, one can also device an inference machinery that is sound and (relative) complete. Finally, this system system is amenable to time complexity analysis by a ticking monadic transformation. A prototype implementation is available, see below for more details. More specifically, our contributions can be summarized as follows:
We show that size types can be generalised so as to encompass a notion of index polymorphism, in which (higher-order subtypes of) the underlying type can be universally quantified. This allows for a more flexible treatment of higher-order functions. Noticeably, this is shown to preserve soundness (i.e. subject reduction), the minimal property one expects from such a type system. On the one hand, this is enough to be sure that types reflect the size of the underlying program. On the other hand, termination is not enforced anymore by the type system, contrarily to, e.g. [@Blanqui:CSL:05; @AP:JFP:16]. In particular, we do not require that recursive calls are made on arguments of smaller size.
The polymorphic sized types system, by itself, does not guarantee any complexity-theoretic property on the typed program, except for the *size* of the output being bounded by a function on the size of the input, itself readable from the type. Complexity analysis of a program $\progone$ can however be seen as a size analysis of another program $\tprogone$ which computes not only $\progone$, but its complexity. This transformation, called the *ticking transformation*, has already been studied in similar settings [@DLR:ICFP:15].
Contrarily to many papers from the literature, we have taken care not only of constraint *inference*, but also of constraint *solving*. This has been done by building a prototype called which implements type inference and ticking, and then relies on an external tool, called , to check the generated constraints for satisfiability. borrows heavily from the advances made over the last decade in the synthesis of *polynomial interpretations*, a form of polynomial ranking function, by the rewriting community. It features also some novel aspects, most importantly, a bottom-up SCC analysis for incremental constraint solving. We thus arrive at a fully automated runtime analysis of higher-order functional programs. Noteworthy, we are able to effectively infer polynomial, not necessarily linear, bounds on the runtime of programs.
Both tools are open source and available from the first authors homepage. [^2] is able to analyse, fully automatically, a series of examples which cannot be handled by most competitor methodologies. Indeed, it is to our best knowledge up until today the only approach that can fully deal with function closures whose complexity depends on the captured environment, compare for instance the very recent work of Hoffmann et. al. [@HDW:POPL:17]. Dealing with such closures is of crucial importance, e.g., when passing partially applied functions to higher-order combinators, a feature pervasively used in functional programming.
For brevity, we only give a formalisation of our system and state the central theorem here. An extended version, including all the technical details is available online [@EV].
Our Type System at a Glance {#sect:ERW}
===========================
Applicative Programs and Simple Types {#sect:APST}
=====================================
Sized Types and Their Soundness {#sect:STS}
===============================
Conclusions {#sect:C}
===========
[^1]: See <http://wiki.portal.chalmers.se/agda>.
[^2]: See <https://cl-informatik.uibk.ac.at/users/zini/software>.
|
{
"pile_set_name": "ArXiv"
}
|
Q:
Binding multivalued column's data into combo box via vba ms access
I have a table as follows
Where the BranchIds column is a multivalued column referering the ids of the branches table.
Some how i need to bind the id and its related value in a combo box residing in another access forms as follows
The permission table contains the data of which user is allowed to access which branch.
I am unable to bind the branches from the perimssion table to the combo box in my another form.
The code i am trying. Got from MSDN after a length search..
Sub BindBranches()
Me.comboBranchIds.RowSourceType = "Value List"
Dim db As Database
Dim rs As Recordset
Dim childRS As Recordset
Set db = CurrentDb()
' Open a Recordset for the Tasks table.
Set rs = db.OpenRecordset("SELECT BranchIds FROM Permissions WHERE UserId = " & Forms!NavigationForm!txtSession.Value)
rs.MoveFirst
Do Until rs.EOF
' Print the name of the task to the Immediate window.
'Debug.Print rs!TaskName.Value
' Open a Recordset for the multivalued field.
Set childRS = rs!BranchIds.Value
' Exit the loop if the multivalued field contains no records.
Do Until childRS.EOF
childRS.MoveFirst
' Loop through the records in the child recordset.
Do Until childRS.EOF
' Print the owner(s) of the task to the Immediate
' window.
'Debug.Print Chr(0), childRS!Value.Value
Me.comboBranchIds.AddItem Item:=childRS!Value.Value
'Me.comboBranchIds.RowSource = "SELECT BranchName FROM Branches WHERE ID = " + childRS!Value.Value
childRS.MoveNext
Loop
Loop
rs.MoveNext
Loop
End Sub
A:
A MultiValue field has little to do with a value list.
Just use the RowSource property of the MultiValue field, like:
SELECT [TableName].[FieldName] FROM [TableName] ORDER BY [Id];
as the RowSource property for your combobox.
Having a filter:
SELECT [TableName].[FieldName]
FROM [TableName]
WHERE UserId = [Forms]![NavigationForm]![txtSession]
ORDER BY [Id];
or modify the SQL by code to, say:
SELECT [TableName].[FieldName]
FROM [TableName]
WHERE UserId = 466
ORDER BY [Id];
Applying a revised SQL will automatically requery the combobox.
|
{
"pile_set_name": "StackExchange"
}
|
Related Recommendations
USD4.39
USD2.97
USD6.66
USD1.50
USD7.77
USD1.86
USD1.86
USD2.97
USD6.29
USD1.98
USD2.12
USD2.18
1.47
Please submit the URL where you saw the lower price. Our team will immediately review the link and try their best to beat the price (it MUST be the same product).
We will email the result to you by email. Thanks a lot for helping us to maintain our industry-leading prices.
|
{
"pile_set_name": "Pile-CC"
}
|
ART GOLACKI
Art Golacki is a multidisciplinary artist working with traditional mediums as well as installations, photography and digital processing. He was born in Wroclaw, Poland where he also accomplished a Master Degree in Fine Arts. For the past twenty years, Golacki has lived and worked in the United Kingdom, currently in Millport, Scotland.
In each of Golacki’senigmatic still-life images, a number of man-made, as well as organic objects, are covered inmonochromatic paint and arranged to mimic the classical memento mori. This process renders many objects unidentifiable and thus visually equal; creating a primal, intuitive scene devoid of arbitrary learned judgments or categorical labels. Golacki aspires to evoke a kind of reflective state of mind in the viewer while at the same time, creating an homage to the artistry of Old and also Contemporary Masters.
|
{
"pile_set_name": "Pile-CC"
}
|
Role of PI-RADSv2 with multiparametric MRI in determining who needs active surveillance or definitive treatment according to PRIAS.
To evaluate the role of Prostate Imaging Reporting and Data System v. 2 (PI-RADSv2) in triaging patients with prostate cancer according to Prostate Cancer Research International: Active Surveillance (PRIAS). Between January 2012 and December 2014, 456 patients with biopsy-proven cancer underwent multiparametric 3T magnetic resonance imaging (MRI) using T2 -weighted, diffusion-weighted, and dynamic contrast-enhanced MRI sequences, and then radical prostatectomy. Two radiologists independently reviewed MR images using PI-RADSv2. For AS, PRIAS required clinical stage <T3, prostate-specific antigen (PSA) ≤10 ng/mL, PSA density <0.2 ng/mL2 , Gleason score (GS) ≤6, and the number of positive cores ≤2. For AS, PI-RADSv2 required an index lesion scored <4. Standard reference was prostatectomy, in which insignificant cancer was defined as a small (<0.5 cm3 ) organ-confined lesion with GS ≤6. Sensitivity and specificity for insignificant cancer were obtained with PRIAS, PI-RADSv2, and both. The sensitivity and specificity with PRIAS were 82.9% (68/82) and 70.9% (265/374), respectively. PI-RADSv2 decreased the sensitivity to 61% (50/82) to 80.5% (66/82), but increased the specificity to 77.8% (291/374) to 90.8% (340/374). The combination of PRIAS and PI-RDASv2 increased significantly the specificity to 89.6% (335/374) to 92.8% (347/374) (P < 0.001). PRIAS using multiparametric MRI can identify a greater number of insignificant cancers than PI-RADSv2. However, PI-RADSv2 helps detect many significant cancers that are misdiagnosed as insignificant cancer with PRIAS. 3 Technical Efficacy: Stage 2 J. MAGN. RESON. IMAGING 2017;45:1753-1759.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Bone Sarcoma in the Upper Extremity: Treatment Options Using Limb Salvage or Amputation
Extremity bone sarcomas are rare and pose a challenging problem for patients and their physicians. Physicians who treat bone cancer are called orthopaedic oncologists.
Osteosarcoma is the most common primary bone malignancy that is considered for limb salvage, although there are other types of bone cancer. The National Cancer Institute provides comprehensive information on bone cancer. There are approximately 500 and 1,000 osteosarcomas diagnosed in the United States per year. The majority of these bone cancers occur in the adolescent age group.1Enneking WF. General Principles of Musculoskeletal Tumor Surgery Natural History. In: Enneking WF, ed. Musculoskeletal Tumor Surgery, vol. 1. New York: Churchill Livingstone, 1983:3.
A smaller number are present in children under the age of 10, and some develop in older people secondary to a pre-existing condition such as Paget's disease.
In the past, extremity bone cancers were treated by amputation with relatively poor functional outcomes. Over the last 30 years, limb salvage (operations to save the limb rather than amputate) has evolved. This technique has been proven safe and effective in most cases.
There have been developments in several areas to improve the outcomes with limb preservation. Adjuvant or "assisted" chemotherapy is now used for most bone sarcomas. Chemotherapy causes tumor necrosis, which allows for safer removal. In addition, chemotherapy causes the tumor to develop a rind or margin and in some cases shrink, helping the surgeon to completely resect the tumor and minimize the removal of normal tissue.
Left, Magnetic resonance image scan (T1 weighted) revealing osteosarcoma in the metaphysic of the distal femur. The extent of the tumor is readily seen.
Right, Gross specimen after resection of the distal femur. The true extent of the tumor matches the magnetic resonance image.
Imaging also plays a major role in limb salvage. With the development of radiographic studies such as magnetic resonance imaging (MRI)2
Berquist TH. Magnetic Resonance Imaging of Musculoskeletal Neoplasm. Clin Orthop 1989;244:101.
, the surgeon can better see the extent of the cancer and plan the resection more precisely. The American Cancer Society provides more information on use of imaging tests to detect bone cancer.
Finally, there have been major developments in limb reconstruction. Surgeons now have available implants that can be matched to the patient's size, stronger metals, bone and soft tissue allografts (transplants), microvascular and muscle transfer procedures, and bone graft substitutes. These techniques allow the limb to be restored with good function.
There are even devices that can be expanded or "grown" for children to account for normal skeletal growth lost with limb preservation.
Despite all of these improvements and the enthusiasm for limb salvage, it is not for everyone. There are contraindications and complications that need to be considered. The decision needs to be made by the patient after a detailed and lengthy discussion with their cancer surgeon. The patient needs to have a thorough understanding of the advantages and disadvantages of limb salvage before pursuing this technique.
Anatomy and Pathophysiology
Gross specimen after resection of a distal femoral osteosarcoma. Note the penetration of the growth plate by the tumor.
Although they are seen in all parts of the skeleton, most osteosarcomas are located near the knee joint and involve the lower femur and upper tibia. The tumor usually occurs in the metaphysis or diaphysis of long bones.
The tumor can invade and cross the growth plate. Osteosarcoma is an invasive cancer that usually extends out of the bone into the soft tissues. The tumor can involve the joint, muscles, nerves, and arteries near the bone of origin. As the tumor progresses, it destroys bone and may lead to fracture.
Hematogenous (through the blood) spreading of this cancer is a significant risk. Patients need to be staged for distant disease. The greatest risk is spread to the lungs. The cause of this malignancy is not known. There is no hereditary link for a standard osteosarcoma. Known environmental risk factors include radiation.
Left, Anteroposterior radiograph of the right shoulder. The osteosarcoma presents as a lytic defect (hole) with a pathologic fracture.
Right, Several months later, the tumor is seen destroying the entire proximal humerus.
Untreated osteosarcoma is rare. If left untreated, it will grow to an enormous size, destroying bone as it progresses. Pathologic fracture will inevitably occur, especially in weight-bearing bones.2
Berquist TH. Magnetic Resonance Imaging of Musculoskeletal Neoplasm. Clin Orthop 1989;244:101.
Osteosarcoma has a great propensity to spread to the lungs.
The presence of micro-metastatic disease at presentation is common and is one reason for chemotherapy. End-stage patients will develop extensive pulmonary disease, and osteosarcoma will metastasize to other skeletal and nonskeletal sites.
Nonsurgical Treatment
Nonoperative treatment for osteosarcoma is not reasonable, except for tumors located in anatomically inaccessible sites. An example is a large tumor of the spine. In this case, palliative (non-curative) radiation and chemotherapy can be given.
Management
Even patients with demonstrated pulmonary metastatic disease are treated aggressively with chemotherapy and surgery. Some of these advanced-stage patients can be cured.
The optimal treatment of osteosarcoma requires some form of surgery. Radiation can be used for inoperable tumors, but is only palliative and generally not curative.
Current treatment for osteosarcoma uses neoadjuvant (preoperative) chemotherapy for approximately three months.3,
Meyers PA, Heller G, Healey J, et al. Chemotherapy for Nonmetastatic Osteogenic Sarcoma: The Memorial Sloan-Kettering Experience. J Clin Oncol 1992;10:5.
4
Brien EW, Terek RM, Healey JH, Land JM. Allograft Reconstruction after Proximal Tibial Resection for Bone Tumors: An Analysis of Function and Outcome Comparing Allograft to Prosthetic Reconstruction. Clin Orthop 1994;303:116.
The chemotherapy is given either through a vein (intravenous) or an artery (intra-arterial). Then, the patient is restaged both locally and systemically to see if the tumor has metastasized or changed in size. A decision regarding the type of surgery (limb salvage or amputation) is made.
The resected tumor is evaluated by a pathologist for the amount of necrosis. There is a direct relationship between necrosis (the percentage of dead tumor) and survival. Tumors that are 90 percent necrotic or better after chemotherapy have an excellent prognosis.5
Picci P, Bacci G, Campanacci M, et al. Histologic Evaluation of Necrosis in Osteosarcoma Induced by Chemotherapy: Regional Mapping of Viable and Nonviable Tumor. Cancer 1985;56:1515.
Chemotherapy alone is not enough to control the tumor in bone.6
Link MP, Goorin AM, Miser AW, et al. The Effect of Adjuvant Chemotherapy on Relapse-Free Survival in Patients with Osteosarcoma of the Extremity. N Engl J Med 1986;314:1600.
Surgery is needed to remove the residual viable tumor cells. After surgery, patients are placed back on chemotherapy for up to one year. If pulmonary disease develops, the nodules can be removed surgically.
Surgical Treatment
The first surgical decision concerns the feasibility of limb salvage. Most osteosarcomas (approximately 85 percent) are candidates for limb preservation.
There are some relative contraindications.
Photograph of a fungating osteosarcoma of the os calcis. This tumor is best treated by below the knee amputation.
Large growing tumors that are poor responders to chemotherapy are often best managed by amputation.7
Simon MA, Aschliman MA, Thomas N, Mankin HJ. Limb-Salvage Treatment versus Amputation for Osteosarcoma of the Distal End of the Femur. J Bone Joint Surg Am 1986;68:1331.
Patients with tumors that infiltrate the skin around the bone are poor candidates to save the limb
Cancers that surround important nerves and arteries may need to be amputated.7
Simon MA, Aschliman MA, Thomas N, Mankin HJ. Limb-Salvage Treatment versus Amputation for Osteosarcoma of the Distal End of the Femur. J Bone Joint Surg Am 1986;68:1331.
Sarcomas in very young children are best managed by amputation. In these young patients, the limb length inequality after limb preservation will be excessive and de-functionalizing.
Any patient who must decide between amputation and limb salvage must understand everything involved with both options. A consultation with a prosthetist is invaluable in understanding life with amputation. They can usually show the patient and their family an example of the prosthesis they would have, and videos showing the activities that the patient could perform. Also, most cancer surgeons can arrange meetings for a patient deciding about surgery with another patient who has already had that type of surgery.
There are considerations in deciding between limb salvage and amputations.
Emotional. Amputations can be both emotionally and physically devastating to patients.
Technical. Unlike limb salvage, amputations tend to be technically less complicated operations for the surgeon, resulting in few complications.
Ongoing surgery. Patients with amputations usually need no further surgery, while limb salvage patients may need multiple surgeries throughout their lives to fix problems that occur with the initial reconstruction.
Return to Function. Amputation patients often have a faster return to function and may even have better function than limb salvage patients.
Prosthetics. Artificial limbs have been improved in appearance and function. These limbs have endoskeletons (shells) that can be covered with a more natural appearing material to make them look more like a normal limb.
The joint mechanisms are also very sophisticated and can return the patient to a more normal gait. A patient with a below-the-knee amputation usually walks without a limp and can play most sports. Most observers would not even know the patient, in long pants, had an amputation.
Patients with above-the-knee amputations can also function very well.8
Harris IE, Leff AR, Gitelis S, Simon MA. A Comparison of Function and Walking Efficiency in Patients With Aggressive Tumors at the Knee Treated by Above-the-Knee Amputation, Knee Arthrodesis, or Knee Arthroplasty. J Bone Joint Surg Am 1990;72:1477.
Although they often have a minimal limp and can play many sports, they tend not to function as well as below-the-knee patients because of the need for an artificial knee joint as part of the prosthesis.
Limb-girdle amputations such as a hind-quarter (through the hip joint) can be fitted, but function is limited. Amputations closer to the hip require more energy from the patient to walk than distal amputations.
Amputations
A unique amputation procedure, called the Van Ness procedure, is useful in very young children. The tibia, foot, and ankle can be preserved and fixed to the remaining femur after rotating it so the foot points backwards. The ankle joint then acts as the knee joint.9,
Cammisa FP, Glasser DB, Otis JC, et al. The Van Nes Tibial Rotationplasty: A Functionally Viable Reconstructive Procedure in Children Who Have a Tumor of the Distal End of the Femur. J Bone Joint Surg Am 1990;72:1541.
10,
Kotz R, Salzer M. Rotationplasty for Childhood Osteosarcoma of the Distal Femur. J Bone Joint Surg Am 1982;64:959.
11
Merkel KD, Gebhardt M, Springfield DS. Rotationplasty as a Reconstructive Operation after Tumor Resection. Clin Orthop 1991;270:231.
These patients can be fitted as a below-knee amputee with better function than a standard above knee amputation.12
Winkelmann WW. Rotationplasty. Orthop Clin North Am 1996;27:503.
While this reconstruction always upsets the patient and their family when they initially hear about it, it is an excellent option, allowing these children to participate in almost all normal childhood activities.
Amputations of the shoulder, arm, or forearm have a poorer functional outcome than amputations of the thigh or lower leg. This is especially true for the shoulder girdle. The terminal device (artificial hand) of the prosthesis has only a limited ability to return manual strength and dexterity. Myo-electric prostheses may improve some of these deficiencies.
Limb Salvage
After a decision is made for limb salvage, there are two basic types of reconstruction in adults. Most osteosarcomas involve the knee joint, which needs to be removed during the resection.
Arthrodesis
Postoperative anteroposterior radiograph of the knee after resection and fusion with an allograft. The upper tibia and knee is resected and fused with a donated human bone.
Arthrodesis, or fusion, is a procedure that makes the joint permanently stiff.15
Weiner SD, Scarborough M, Vander Griend RA. Resection Arthrodesis of the Knee with an Intercalary Allograft. J Bone Joint Surg Am 1996;78:185.
The knee joint will not bend. This can be accomplished with bone allografts,13,
Enneking WF, Shirley PD. Resection Arthrodesis for Malignant and Potentially Malignant Lesions about the Knee Using Intramedullary Rod and Local Bone Grafts. J Bone Joint Surg Am 1997;59:223.
16-
Gebhardt MC, Flugstad DI, Springfield DS, Mankin HJ. The Use of Bone Allografts for Limb Salvage in High-Grade Extremity Osteosarcoma. Clin Orthop 1991;270:181.
17
Sim FH, Frassica FJ. Use of Allografts following Resection of Tumors of the Musculoskeletal System. Instr Course Lect 1993;42:405.
vascularized autografts,18
Weinberg H, Kenan S, Lewis MM, et al. The Role of Microvascular Surgery in Limb-Sparing Procedures for Malignant Tumors of the Knee. Plast Reconstr Surg 1993;92:692.
or a combination. Once the knee is fused solidly, it is a stable, durable reconstruction. It can withstand physical stress. Follow-up surgery is less likely with arthrodesis.
The disadvantages include:
Loss of functions requiring the knee to bend, such as climbing or stooping.
Arising from a chair is difficult, as is sitting anywhere that you need a bent knee, such as a movie theater or an airplane.
Knee arthrodesis also places abnormal stresses on the joints above and below the knee, and can lead to future hip or back problems.
Arthrodesis also increases the energy needed for the patient to walk.
Arthroplasty
Postoperative anteroposterior radiograph of the knee after resection and replacement with a joint allograft.
Arthroplasty provides for a bendable knee. The procedure replaces the resected bone and joint. Arthroplasty can be accomplished with an allograft16-
Gebhardt MC, Flugstad DI, Springfield DS, Mankin HJ. The Use of Bone Allografts for Limb Salvage in High-Grade Extremity Osteosarcoma. Clin Orthop 1991;270:181.
17,
Sim FH, Frassica FJ. Use of Allografts following Resection of Tumors of the Musculoskeletal System. Instr Course Lect 1993;42:405.
19,
Clohisy DR, Mankin HJ. Osteoarticular Allografts for Reconstruction after Resection of a Musculoskeletal Tumor in the Proximal End of the Tibia. J Bone Joint Surg Am 1994;76:549.
20,
Mankin HJ, Doppelt SH, Sullivan TR, Tomford WW. Osteoarticular and Intercalary Allograft Transplantation in the Management of Malignant Tumors of Bone. Cancer 1982;50:613.
21
Zatespin ST, Burdygin VN. Replacement of the Distal Femur and Proximal Tibia with Frozen Allograft. Clin Orthop 1994;303:95.
or a metallic implant.22,
Bradish CF, Kemp HBS, Scales FT, et al. Distal Femoral Replacement by Custom Made Prostheses. J Bone Joint Surg Br 1987;69:276.
23,
Choong PF, Sim FH, Pritchard DJ, et al. Megaprostheses after Resection of Distal Femoral Tumors. A Rotating Hinge Design in 30 Patients Followed for 2-7 Years. Acta Orthop Scand 1996;67:345.
24,
Kawai A, Muschler GF, Lane JM, et al. Prosthetic Knee Replacement after Resection of a Malignant Tumor of the Distal Part of the Femur. J Bone Joint Surg Am 1998;80:636.
25,
Morris HG, Capanna R, Campanacci D, et al. Modular Endoprosthetic Replacement after Total Resection of the Femur for Malignant Tumor. Int Orthop 1994;18:90.
26,
Sim FH, Frassica FJ, Chao EY. Orthopaedic Management Using New Devices and Prostheses [Review]. Clin Orthop 1995;312:160.
27
Veth RPH, et al. Megaprosthesis in the Treatment of Primary Malignant Metastatic Tumors in the Hip Region. J Surg Oncol 1989;40:214.
Allograft arthroplasty replaces the resected bone and joint with a bone transplant.28
Gitelis S, Piasecki P. Allograft Prosthetic Composite Arthroplasty for Osteosarcoma and Other Aggressive Bone Tumors. Clin Orthop 1991;270:197.
These grafts are obtained from human donors and are frozen to diminish rejection problems. Freezing renders the bone dead and the cartilage can be kept minimally alive. The graft needs to heal to the host bone like a fracture. This healing can be impeded by the postoperative chemotherapy. Allografts can break or become arthritic, and the joint can be unstable. In the recent past, these arthroplasties were done with allografts alone, referred to as osteoarticular allografts (transplanted bone with its cartilage). These allograft reconstructions are now usually done by replacing the bone with an allograft, then replacing the cartilage with a total knee arthroplasty.
This has an advantage of replacing the resected bone with bone rather than metal. This bone can be used for later reconstruction if the initial reconstruction breaks down, which happens often. The main disadvantage is problems with healing of the allograft to the patient bone.
Left, Postoperative anteroposterior radiograph of the knee after resection of the distal femur and replacement with a modular oncology prosthesis. Right, Postoperative anteroposterior radiograph of the knee after resection of the proximal tibia and replacement with a modular oncology prosthesis.
Metallic arthroplasty is done with a modular oncology prosthesis.14
Eckardt JJ, Eilber FR, Rosen G, et al. Endoprosthetic Replacement for Stage IIB Osteosarcoma. Clin Orthop 1991;270:202.
The modularity allows the surgeon to assemble the necessary bone replacement in the operating room to match the patient's size and the amount of bone resected. The device can be fixed to the bone with bone cement (methylmethacrylate) or the surgeon may use a press-fit porous stem that allows the bone to grow into the prosthesis to anchor it into the patient's body. The joint bearing is a rotating hinge. While the bearing has some freedom of movement, it is more constrained or hinged than a normal knee.29
Kneisl JS, Finn HA, Simon MA. Mobile Knee Reconstructions after Resection of Malignant Tumors of the Distal Femur. Orthop Clin North Am 1991;22:105.
This can lead to more problems than a standard total knee arthroplasty used in older adult patients.
Problems can include loosening from the bone, wearing out of the parts, breakage of the parts, and stiffness. There is also some experience with a form of limb salvage for children using a "growing" or expandable prosthesis. The device can be lengthened as the child grows to keep up with growth of the opposite limb.30,
Kenan S, Bloom N, Lewis MM. Limb-Sparing Surgery in Skeletally Immature Patients with Osteosarcoma: The Use of an Expandable Prosthesis. Clin Orthop 1991;270:223.
31,
Kenan S, Lewis MM. Limb Salvage in Pediatric Surgery: The Use of The Expandable Prosthesis. Orthop Clin North Am 1991;22:121.
32,
Lewis MM. The Use of the Expandable and Adjustable Prosthesis in the Treatment of Childhood Malignant Bone Tumors of the Extremities. Cancer 1986;57:499.
33
Uwin PS, Walker PS. Extendable Endoprosthesis for the Skeletally Immature. Clin Orthop 1995;322:179.
These prostheses vary in their method of expansion from open surgical lengthening to magnetic expansion.34,
Kenan S, Lewis MM. Limb Sparing Surgery in Children. The Expandable Prosthesis. Current Trends and Controversies after the First 10 Years. Eighth International Symposium on Limb Salvage (ISOLS), Florence, Italy, 1995;124.
35
Ward WG, Yang RS, Eckardt JJ. Endoprosthetic Bone Reconstruction following Malignant Tumor Resection in Skeletally Immature Patients. Orthop Clin North Am 1996;27:493.
Removal of the cancer
The first part of the procedure is the complete removal of the cancer with an adequate margin. The surgeon must be certain that the knee joint is not contaminated with tumor cells. If there is joint penetration, the joint is removed as one unit. The most reasonable reconstruction following this is a knee fusion. Most of the time, the joint can be opened and the distal femur or proximal tibia resected. Muscle covering the soft-tissue component of the tumor will be taken out to improve the margin. The nerves and arteries behind the bone are often identified and protected.
Before the procedure, the bone cut is determined based on the MRI. Once the cancer has been adequately removed, the specimen is opened to be certain the margins are adequate.
Reconstruction
The next part of the procedure is reconstruction. If a modular oncology prosthesis is the desired reconstruction (most common), the femur bone is prepared by reaming the canal of the bone with a power instrument. The desired femoral stem diameter is selected.
The tibia is next prepared by removal of its cartilage surface and preparing the canal. The trial modular device is assembled and placed in the bone to check length, stability, and patellar tracking. The patella can be resurfaced as desired. The final modular oncology device can be inserted cemented or cementless.37
Capanna R, Morris HG, Campanacci D, et al. Modular Uncemented Prosthetic Reconstruction after Resection of Tumours of the Distal Femur. J Bone Joint Surg Br 1994;76:178.
Cementless devices are porous-coated and bone ingrowth is necessary for success.38
Ward WG, Johnston KS, Dorey FJ, Eckhardt JJ. Extra-medullary Porous Coating to Prevent Diaphyseal Osteolysis and Radiolucent Lines around Proximal Tibial Replacements: A Preliminary Report. J Bone Joint Surg Am 1993;75:976.
This can be a problem in the presence of chemotherapy. The wound is closed in multiple layers. The ligaments do not need to be repaired because the rotating hinge bearing provides for joint stability. For tibial tumors, muscle flaps are necessary for closure and to repair the patellar ligament.39,
Feldman JJ, Cohen BE, May JW Jr. The Medial Gastrocnemius Myocutaneous Flap. Plast Reconstr Surg 1978;61:531.
40,
Guzman-Stein G, Fix RJ, Vasconez LO. Muscle Flap Coverage for the Lower Extremity. Clin Plast Surg 1991;18:545.
41
Malawer MM, Price WM. Gastrocnemius Transposition Flap in Conjunction with Limb-Sparing Surgery for Primary Bone Sarcomas around the Knee. Plast Reconstr Surg 1984;73:741.
Allograft arthroplasty requires fixing the bone to the femur with a plate or rod.17,
Sim FH, Frassica FJ. Use of Allografts following Resection of Tumors of the Musculoskeletal System. Instr Course Lect 1993;42:405.
21,
Zatespin ST, Burdygin VN. Replacement of the Distal Femur and Proximal Tibia with Frozen Allograft. Clin Orthop 1994;303:95.
43
Jofe MH, Gebhardt MC, Tomford WW, Mankin HJ. Reconstruction for Defects of the Proximal Part of the Femur Using Allograft Arthroplasty. J Bone Joint Surg Am 1988;70:507.
Rigid internal fixation is needed to promote healing. The allograft needs to be properly sized to match the bone and joint removed. All of the ligaments need to be sutured to the allograft to stabilize the joint. Instability is a significant problem with allograft arthroplasty.4,
Brien EW, Terek RM, Healey JH, Land JM. Allograft Reconstruction after Proximal Tibial Resection for Bone Tumors: An Analysis of Function and Outcome Comparing Allograft to Prosthetic Reconstruction. Clin Orthop 1994;303:116.
44
Mankin HJ, Gebhardt MC, Jennings LC, et al. Long-Term Results of Allograft Replacement in the Management of Bone Tumors. Clin Orthop 1996;324:86.
In general there are more potential complications with limb salvage than with amputation.7
Simon MA, Aschliman MA, Thomas N, Mankin HJ. Limb-Salvage Treatment versus Amputation for Osteosarcoma of the Distal End of the Femur. J Bone Joint Surg Am 1986;68:1331.
Amputation
Recurrence. There is less risk of local recurrence with amputation. Survival for osteosarcoma, however, is the about the same whether the patient chooses limb salvage or amputation.
Phantom pain after amputation
Neuroma after amputation
Wound necrosis
Bone prominence
Bone overgrowth in children. This results from the bone growth potential still present in children, and may require re-amputation to shorten the growing bone.
While troubling, phantom pain and neuroma usually can be managed with medication, and in some cases, a small surgical procedure.
Infection. Infection is a serious problem that usually requires removal of the device before the infection can be cured.
Wound necrosis. Wound necrosis can occur because of the extensive soft tissue dissection needed to remove the cancer. This problem can be minimized by the use of muscle flaps.
Nerve palsy. Most of these operations require delicately separating the nerves from the tumor, which may lead to nerve palsy. The complication will usually resolve with time.
Mechanical complications related to the prosthesis. The device can loosen or break, or the bearing (hinge) can fail. Wear of the bearing surfaces can lead to tissue reactions. Most mechanical complications can be minimized if the metallic device is used wisely. These implants are not made for functions such as running or impact athletics. Walking, biking, low impact dancing, and swimming are reasonable activities. Patients who are long-term cancer survivors will likely experience implant failure at some point in their futures.
Amputation
After a lower limb amputation, the surgeon can place either a temporary prosthesis or a soft dressing. The temporary prosthesis allows earlier functional rehabilitation and is suited for an amputation at an above-the-knee level or distal. A prosthetist may be asked to place the cast pylon device on the limb in the operating room.
Physical therapy is started early for functional and psychological reasons. Therapy consists of gait training, joint mobilization, and muscle strengthening.
If a soft dressing is applied, patients are also taught how to wrap the limb to diminish swelling.
Prosthetic fabrication is usually held for about three months to allow the limb to regain its normal shape. After the leg is ready, the patient is taught how to use it. The higher the level of amputation, the more training is necessary. Patients with high level amputations may benefit from an inpatient stay at a rehabilitation center. Upper limb amputations need extensive rehabilitation by occupational and physical therapy. Prosthetic use is taught and the patient is instructed on how to use the opposite limb for activities of daily living.
Limb Salvage
Limb salvage with a modular oncology device also requires significant rehabilitation. Shortly after surgery, the patient will go to physical therapy for gait training, knee range of motion, and muscle strengthening.
If the device is placed without cement, partial weight-bearing ambulation is necessary for six weeks.
The soft tissue repair after limb salvage has a significant effect on rehabilitation. If a quadriceps reconstruction is performed, especially for proximal tibial tumors, this repair needs to heal before active exercise is started. This is usually at six weeks. Range of motion exercises are influenced by the patellar tracking and tightness of the knee.
Limb salvage with an allograft requires somewhat different rehabilitation. The allograft needs to be protected with a walking aid until healing occurs at the junction of the allograft and host bone.8
Harris IE, Leff AR, Gitelis S, Simon MA. A Comparison of Function and Walking Efficiency in Patients With Aggressive Tumors at the Knee Treated by Above-the-Knee Amputation, Knee Arthrodesis, or Knee Arthroplasty. J Bone Joint Surg Am 1990;72:1477.
Children especially need to be encouraged during the rehabilitation process. While they continue on chemotherapy, they have a diminished energy level and lack motivation to exercise. There is a strong tendency for children to develop a knee flexion contracture, and this needs to be avoided.
Cammisa FP, Glasser DB, Otis JC, et al. The Van Nes Tibial Rotationplasty: A Functionally Viable Reconstructive Procedure in Children Who Have a Tumor of the Distal End of the Femur. J Bone Joint Surg Am 1990;72:1541.
Kenan S, Lewis MM. Limb Sparing Surgery in Children. The Expandable Prosthesis. Current Trends and Controversies after the First 10 Years. Eighth International Symposium on Limb Salvage (ISOLS), Florence, Italy, 1995;124.
AAOS does not endorse any treatments, procedures, products, or physicians referenced herein. This information is provided as an educational service and is not intended to serve as medical advice. Anyone seeking specific orthopaedic advice or assistance should consult his or her orthopaedic surgeon, or locate one in your area through the AAOS "Find an Orthopaedist" program on this website.
|
{
"pile_set_name": "Pile-CC"
}
|
Behavior mutation
A behaviour mutation is a genetic mutation that alters genes that control the way in which an organism behaves, causing their behavioural patterns to change.
A mutation is a change or error in the genomic sequence of a cell. It can occur during meiosis or replication of DNA, as well as due to ionizing or UV radiation, transposons, mutagenic chemicals, viruses and a number of other factors. Mutations usually (but not always) result in a change in an organisms fitness. These changes are largely deleterious, having a negative effect on fitness; however, they can also be neutral and even advantageous.
It is theorized that these mutations, along with genetic recombination, are the raw material upon which natural selection can act to form evolutionary processes. This is due to selection's tendency to "pick and choose" mutations which are advantageous and pass them on to an organism's offspring, while discarding deleterious mutations. In asexual lineages, these mutations will always be passed on, causing them to become a crucial factor in whether the lineage will survive or go extinct.
One way that mutations manifest themselves is behaviour mutation. Some examples of this could be variations in mating patterns, increasingly aggressive or passive demeanor, how an individual learns and the way an individual interacts and coordinates with others.
Behaviour mutations have important implications on the nature of the evolution of animal behaviour. They can help us understand how different forms of behaviour evolve, especially behaviour which can seem strange or out of place. In other cases, they can help us understand how important patterns of behaviour were able to arise – on the back of a simple gene mutation. Finally, they can help provide key insight on the nature of speciation events which can occur when a behaviour mutation changes the courtship methods and manner of mating in sexually reproducing species.
History
Ethology, the study of animal behaviour, has been a topic of interest since the 1930s. The pioneers of the field include great names such as Dutch biologist Nikolaas Tinbergen and Austrian biologists Karl von Frisch and Konrad Lorenz (the three won the Nobel Prize in Physiology or Medicine in 1973 for their discoveries concerning organization and elicitation of individual and social behaviour patterns). However, the first published demonstration of how a mutation in a single gene could change an organism's behaviour was carried out by Margaret Bastock in 1956, while she was a Ph.D. student working under Tinbergen at Oxford University.
Bastock investigated the yellow mutant of Drosophila melanogaster, the common fruit fly. Upon comparison of courtship rituals in 19 yellow mutants and 19 wild types, wild types were noted to court 92% of the time, while yellow ones courted only 83% of the time. In addition, when the yellow mutants courted it took them noticeably longer than the wild types. Even after significant generations of crossing, the flies homozygous for the "yellow" allele were less successful in mating with wild type females than their heterozygous brothers. These results led Bastock to conclude that the origin of this deficient mating behaviour was the very same mutant gene that caused yellow discolouration.
Bastock's work directly and indirectly influenced a new way of observing behaviour patterns and analyzing them, as well as changed the way we look at the evolution of these behavioural patterns in animals. However, it was not until much later that her work was fully recognized and accredited in further studies on genes influencing animal behaviour. Seymour Benzer worked further on D. melanogaster in the 1960s, focusing on different novel phenotypes such as phototaxis and circadian rhythms. In 1978, J.C. Hall returned to a similar focus on courtship while investigating different mutations. Bastock's work had important consequences for the field of neuroscience as well, spurring the emergence of neurogenetics and a new understanding of how our brains work.
Notable experiments
Behaviour mutations have been studied in a variety of animals, but most commonly in Drosophila melanogaster due to being able to produce large numbers with short generation time as well as a rich diversity of behaviours. Many tests have been used in drosophila by specifying behavioural mutations to further understand the nervous system. In order to understand how behaviour is controlled by the nervous system, it is key to identify the neuronal substrates important for the specific activity studied, as well as to explain how they are incorporated into a functional circuit. Most tests used allowed researchers to directly observe the mutation, such as altering phototaxis or flight-reduction. It was also shown in some experiments that certain mutations affect experience-based behaviour. Behavioural mutation has also been extensively tested in mice.
In one test involving Drosophila, a temperature-sensitive allele of shibire is overexpressed in neuronal subsets using the GAL4/UAS system. The shi gene is used for synaptic vesicle recycling, and a change in the temperature would cause an accelerated and reversible effect on the synaptic transmission of shi expressing neurons. When shi was tested to cholinergic neurons, the flies showed a quick response to the temperature and were paralyzed within two minutes at 30 degrees, which was reversible. When shi was expressed in photoreceptor cell, fly larva showed temporary temperature-dependent blindness. This experiment shows that shi can be expressed in specific neurons to cause temperature-dependent alterations in behaviours. This research will further be helpful in studying the neuronal subsets in the behaviour of intact animals due to the reversible and controlled manner it is performed in.
In more recent studies the Zebrafish ennui mutation was identified from mutagenesis identification for defects in early behaviour. Homozygous ennui embryo swam more slowly than the wild-type but gained normal swimming as it aged. When tested, the motor output of the central nervous system following mechano-sensory stimulation was normal in ennui, which means that the reaction-time and reaction-style were normal to the wild-types and the motoneuron were not affected. The synaptic current at the neuromuscular junction was significantly reduced in ennui which means that the neuromuscular junction was affected. The acetylcholine receptor was significantly reduced in the adult ennui in size as well as localization at the myotome segment borders of fast-twitch muscles. Genetic mosaic analysis revealed that ennui is necessary cell autonomously in muscle fibers for normal synaptic localization of acetylcholine receptors. Also, ennui is very important for agrin function. Ennui is very important in nerve-dependent acetylcholine clustering and the stability of axon growth.
In mice, chemical mutagenesis is a phenotype-driven approach to map the mouse mutant catalogue. The usage of mice in behavioural mutation tests allows scientists to increase our understanding of the genetic basis of mammalian behaviour as well as applying this information to human neurological disorders and psychiatric disorders. SHIRPA is a hierarchal screening protocol that efficiently searches for mutations in muscle and lower motor neuron function, Spinocerebellar,|sensory neuron function, neuropsychiatry function, and autonomic nervous system function. The mice are then further tested for defects in parameters that are associated with human psychiatric disorders by using two well-known behaviour tests. The mice are tested for locomotor activity (LMA) as well as prepulse inhibition (PPI). For LMA, mice are placed in cages with beam-splitting monitors that will measure the activity of the mice as well as calculate their habituation to that environment. LMA is recorded in 35-minute time spans in bins of a 5-minute duration. The PPI measures the acoustic startle response, which is an exaggerated response to an unexpected stimulus. The acoustic startle is measured over a range of frequencies and amplitudes to calculate the average response. These tests allow us to detect abnormal behaviours and document them.
Behavioural degradation under spontaneous mutation accumulation
In each generation, the genetic variation within a population increases due to accumulation of mutations and decreases in response to natural selection and genetic drift. Mutation accumulation occurs when mutations of small effect accumulate at certain loci, yielding a large phenotypic effect in the aggregate. Multiple genes may simultaneously affect behavioural traits. Spontaneous mutations arise from sources including errors in DNA replication, spontaneous lesions, and transposable genetic elements in the absence of mutagens. Spontaneous mutations play a central role in the maintenance of genetic variation and persistence of natural population of many organisms.
Evolutionary biologists have used mutation accumulation experiments, in which mutations are allowed to drift to fixation in inbred lines, to study the effect of spontaneous mutations on phenotype character. Phenotypic assays significantly determine whether and how quickly population with accumulated deleterious mutational loads can result in degradation of behavioural responses over time.
Based on laboratory experimental evolution with long-term mutation accumulation (MA) lines of the nematode Caenorhabditis elegans, a team of researchers at the University of Oregon investigated that mutation accumulation of behaviour is capable of generating significant levels of individual variation in ecologically relevant behavioural traits within populations. This variation will be dependent largely on the genetic structure and demographic characteristics of individuals. As a result, small or isolated populations are at high risk of experiencing behavioural degradation. For instance, the rate of mutation for behavioural traits has more effects for behavioural mutation within captive populations and some endangered species. The study of two closely related behavioural traits of the free-living soil nematode C. elegans, chemotaxis and locomotion, indicates that behavioural degradation is a direct source of competitive fitness loss under genomic mutation accumulation.
Raymond B. Huey and his colleagues used the same MA lines method, suggesting that mutation accumulation in Drosophila melanogaster significantly depresses only some behavioural traits. There are several explanations for this. It is possible that traits are influenced only by few loci so that their mutational target is small. Alternatively, the values of the behavioural traits are not maximized by directional selection, but rather are under the influence of stabilizing selection. Since behavioural traits are highly variable, mutation accumulation does not negatively affect all traits equivalently.
Sex-ratio behaviour
The study of sex allocation has provided some of the most convincing tests of adaptive behaviour. Theory predicts that organisms can adjust the allocation of resources to male and female offspring in response to environmental conditions. Sex ratio behaviour is the sex ratio response of a female in various conditions. Mutation accumulation is important because it is one evolutionary cause that increases variation between individuals in sex-ratio behaviour. For example, female wasps can adjust their offspring sex ratios by choosing whether to fertilize an egg because they are haplodiploid. In particular, female Nasonia vitripennis produce less males when laying eggs alone, and more males when laying eggs on a patch with other females. If female parasitoid wasps produce too few male offspring, then some of the female offspring will remain unmated. On the other hand, if too many sons are produced, then resources are wasted that could have been used to produce more daughters. Females of other strains show no similar conditional sex ratio behaviours. Researchers find that these behaviours are indeed subject to genetic variation. However, genetic variation in natural population is low and it has low heritability as for other fitness-related traits. The observation of this type of behavioural mutation has been argued to pose a problem for sex-ratio theory because the mutations are likely to have decreased fitness.
Mutations affecting passive/aggressive characteristics
Aggression is a survival trait that can be favoured by Natural Selection in nearly any species. Aggressive individuals can be better able to compete for resources including food, territory and mates, as well as more successful in protecting themselves and their progeny from predators. It can also be energetically costly, and extreme or out of context aggression can be disadvantageous or deleterious, especially in social organisms. Aggression is a complex trait that is regulated by many interacting genes and gene expression is highly variable depending on environment (phenotypic plasticity). Mutations in genes that influence aggressive behaviours can potentially increase aggression or passivity.
Neurotransmitters
Neurotransmitters, dopamine and serotonin in particular, play an important role in the regulation of aggressive behaviours. Many studies are focused on genes that change the way neurotransmitters interact with receptors within the organism. For example, when individuals suffer from a mutation that causes them to have low levels of serotonin, there is an observed increase in impulsivity and depression With neurotransmitters playing a central role in the development of aggressive behaviour, it follows that many of the gene mutations that have been implicated with aggressive behaviours are involved in the breakdown and/or receipt of neurotransmitters.
Alexis Edwards and her team identified 59 mutations in 57 genes that affected aggressive behaviour in Drosophila melanogaster. The results of their research showed that 32 of the mutants displayed increased aggression and 27 of the mutants displayed less aggression than the control group. Several of the genes examined were found to affect nervous system development and function. Aggression was assessed in this experiment by depriving mutant Drosophila flies from food and then allowing them to defend a limited food source. The number of contest competitions between flies was recorded and compared to non-mutant flies to assess whether the mutants were more or less aggressive than the wild type. Examples of mutations that increase aggression are mutations in the fruitless or dissatisfaction genes which result in observable increases in male-male aggression.
Amines
Mutations involving amines have been shown to be a prevalent source of changes in behaviour. A point mutation in the structural gene for Monoamine Oxidase A, also known as MAO-A, is responsible for the breakdown of neurotransmitters. This mutation is X-linked, affecting only males, and eliminates the production of MAO-A. Males afflicted with this mutation are prone to mild mental retardation as well as violent and antisocial behaviour. Another amine affecting aggression is β-alanine which is a bioamine neurotransmitter that has been implicated in Drosophila aggression. A mutation known as the black mutation causes reduced levels of β-alanine and results in less reactive flies than the wild type.
Testosterone
In nearly all species, there is an obvious disequilibrium between frequency and severity of aggression in males versus females. Males are almost always the more aggressive sex and there are genetic differences that back up this observation. A common explanation for this phenomenon is the higher testosterone levels in males. Testosterone levels have a direct effect on neurotransmitter functioning contributing to physical aggression. Mutations affecting neurotransmitters, as stated above, are the dominant cause of changes in aggressive behaviour. Another contributor to the unequal male-female aggression ratio are the sex-linked gene mutations that affect only male behaviour, such as MAO-A mentioned above. These mutations could be the reason why males are nearly always more aggressive than females, although, testosterone levels are a much more feasible explanation.
Other evolutionary and genetic explanations of violent behaviour include: dopamine receptors mutations, DRD2 and DRD4, that, when mutate simultaneously, are hypothesized to cause personality disorders, low serotonin levels increasing irritability and gloom and the effects of testosterone on neurotransmitter functioning to explain the increased occurrence of aggression in males.
Effects of mutations on mating
Behavioural mutations play a detrimental part towards the genomes of many species, however, they can greatly affect the outcome of mating; affecting the success of fitness, how many offspring will arise and the likelihood that the male will actually procreate. When mutations affect the mating habits of species, different traits that would otherwise benefit the species procreating are compromised.
A couple chemicals that are altered from mutation and have a great impact on mating, are dopamine and serotonin. Each of these chemicals either has a reaction to how the animal acts, or how the species body is formed to benefit their mating success. An example of a mutation in serotonin was found in a species of Nematodes. The serotonin caused their tails to curl during mating, when the mutation occurred the tails did not curl. Without the curling of the tail the nematode was unlikely to find the hermaphrodites sex organs to procreate, and results in less of that nematodes sperm being spread to other offspring. Another example is when the D1 dopamine receptor has a mutation on it; the arousal of a Drosophila melanogaster is increased, which also increases the courtship of the animal.
One example of a study was found in the 'yellow' D.melanogaster, the mating of these males was only beneficial when it was dark outside, or when they were in a dark environment. The mutation is not yet known why it occurs this way, but studies have mentioned that the females of this fly species may be turned off by the certain colour of the mutated fly, and therefore in the dark the female is less likely to tell what colour this fly is.
A beneficial component of a mutation in the behaviour of a mating D. melanogaster, was when the mutation caused the male to have a longer courtship time period. The flies that had a longer courtship had a tendency to have a higher probability of procreating. This means that the fly that took longer to actually initiate the courtship with the female fly, was more likely to be successful with the female successfully accepting the male.
References
Category:Subfields of evolutionary biology
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Save a whopping 75% on Tweet It! for Windows right now
Tweet It! for Windows, a solid third-party Twitter app for (you guessed it) Windows 10 is available at a whopping 75% discount for the next two days. That drops the price of Tweet It! from its usual $5.99 to just $1.49.
If you're not familiar with Tweet It!, the app offers up plenty of compelling features across PC, Mobile and even HoloLens. Here's a quick look at the highlights:
Customizable columns
Push notifications with abitility to interact without even opening the app
Real-time updates
Followers notifications
Sync reading position between all devices
Support for up to 3 accounts
Tweet Marker
Pocket integration
Microsoft Band support
Chained tweets
If Twitter's official app isn't for you, then Tweet It! Is definitely worth checking out — especially at this discount. Just keep in mind that the sale is limited, so you'll want to act quickly.
Do you have a favorite third-party Twitter app? Let us know what your go-to is in the comments!
|
{
"pile_set_name": "Pile-CC"
}
|
Long Pauses in Cerebellar Interneurons in Anesthetized Animals.
Are long pauses in the firing of cerebellar interneurons (CINs) related to Purkinje cell (PC) pauses? If PC pauses affect the larger network, then we should find a close relationship between CIN pauses and those in PCs. We recorded activity of 241 cerebellar cortical neurons (206 CINs and 35 PCs) in three anesthetized cats. One fifth of the CINs and more than half of the PCs were identified as pausing. Pauses in CINs and PCs showed some differences: CIN mean pause length was shorter, and, after pauses, only CINs had sustained reduction in their firing rate (FR). Almost all pausing CINs fell into same cluster when we used different methods of clustering CINs by their spontaneous activity. The mean spontaneous firing rate of that cluster was approximately 53 Hz. We also examined cross-correlations in simultaneously recorded neurons. Of 39 cell pairs examined, 14 (35 %) had cross-correlations significantly different from those expected by chance. Almost half of the pairs with two CINs showed statistically significant negative correlations. In contrast, PC/CIN pairs did not often show significant effects in the cross-correlation (12/15 pairs). However, for both CIN/CIN and PC/CIN pairs, pauses in one unit tended to correspond to a reduction in the firing rate of the adjacent unit. In our view, our results support the possibility that previously reported PC bistability is part of a larger network response and not merely a biophysical property of PCs. Any functional role for PC bistability should probably be sought in the context of the broader network.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Societal participation: examining the impact of a rehabilitation approach for young people with schizophrenia.
This paper is based on research that focuses on the impact of a rehabilitation approach with respect to 99 young people diagnosed with schizophrenia in a Dutch mental health facility. The approach focused on societal participation goals. Nurses and social workers play a key role in such treatment. The research focused on developmental trajectories and showed significant improvement with respect to societal participation levels. Impairment scores remained stable. The results indicate that rehabilitation counselling by nurses and social workers, in addition to medication and psychosocial treatment and integrated in a multidisciplinary team, can make a difference in a patient's societal participation.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Noun- the act of when a man and woman perform vaginal sexual intercourse while the woman is bent over, and upon ejaculation, the man withdraws his penis and continues to insert it into the woman's anus, where he continues to ejaculate.
The man rammed the chick doggie style, and at the last second, jammed his cock in her ass, cumming in her ass.
noun- the act of when a man and a woman have consensual vaginal intercourse from behind, and upon his ejaculation, the man withdraws his penis, and proceeds to insert it into the female's anus, where he proceeds to ejaculate.
the guy banged the chick doggie style, and pulled out and performed a meadowlark, cumming in her ass.
|
{
"pile_set_name": "Pile-CC"
}
|
313 B.R. 701 (2004)
In re Rebecca Sue MOURER and Ronald Lee Mourer, Debtors.
Rebecca Sue Mourer and Ronald Lee Mourer, Plaintiffs,
v.
Equicredit Corporation of America, Defendant.
Bankruptcy No. SG 00-10103. Adversary No. 01-88196.
United States Bankruptcy Court, W.D. Michigan.
August 23, 2004.
*702 *703 John A. Potter, Twohey Maggini PLC, Grand Rapids, MI, for Debtor.
Michael O. Nelson, Attorney at Law, Grand Rapids, MI, for Plaintiffs.
Arthur F. Radke, Richard E. Gottlieb, Dykema Gossett Rooks Pitts PLLC, Chicago, IL, Michael W. Donovan, Randall J. Groendyk, Varnum Riddering Schmidt & Howlett, Sarah E. Heineman, Dykema Gossett PLLC, Michael M. Malinowski, Attorney at Law, Grand Rapids, MI, for Defendant.
OPINION AWARDING ATTORNEY FEES AND DENYING EQUICREDIT CORPORATION OF AMERICA'S MOTION FOR AN EXTENSION OF TIME FOR FILING AN APPEAL
JO ANN C. STEVENSON, Bankruptcy Judge.
This matter comes before the Court upon the Application for Attorney Fees and Costs submitted by Michael O. Nelson, attorney for the Debtor Plaintiffs (the Mourers) in an adversary proceeding *704 brought against Equicredit Corporation of America (Equicredit).
The request for fees presented in the context of this adversary proceeding arises in a case referred to this Court by the Standing Order of Reference entered by the United States District Court for the Western District of Michigan on July 24, 1984. This Court has jurisdiction over this matter pursuant to 28 U.S.C. § 1334(b). This is a core proceeding pursuant to 28 U.S.C. § 157(b)(2)(O). Accordingly, the Bankruptcy Court is authorized to enter a final judgment subject to those appeal rights afforded by 28 U.S.C. § 158 and Fed. R. Bankr.P. 8001 et seq.
The following constitutes the Court's findings of fact and conclusions of law in accordance with Fed. R. Bankr.P. 7052. In reaching its determinations, this Court has considered the parties' briefs and oral arguments.
Background of the Case
On May 7, 2001, the Mourers filed a Complaint against Equicredit and Cascade Capital Funding, L.L.C. alleging various violations of the Truth In Lending Act (TILA), the Home Ownership and Equity Protection Act (HOEPA), and certain state law claims. After a trial, the Court issued an Opinion and Order ruling in favor of the Mourers, finding that Equicredit did indeed violate both TILA and HOEPA.
Equicredit appealed the Bankruptcy Court's Opinion and Order to the United States District Court on January 21, 2003. In its decision, the District Court affirmed in part and reversed in part the Bankruptcy Court's findings. It vacated the Bankruptcy Court's decision and remanded for entry of a new judgment, awarding relief to the Mourers based exclusively on the violation of the 12 C.F.R. § 226.17 disclosure requirements.
On April 14, 2004, the Bankruptcy Court issued an Order awarding the Mourers, $2,000.00 (the $2,000.00 Judgment), which was the maximum award allowed pursuant to 15 U.S.C. § 1640(2)(A)(iii) for Equicredit's violation of the disclosure requirements. There was no appeal of this decision.
On May 14, 2004, Michael O. Nelson (Nelson), the Mourers' attorney, filed an Application for Attorney Fees and Costs (Application) in the total amount of $17,234.91, arguing that as the prevailing party in a TILA action, the Mourers are entitled to an award of attorney fees and costs pursuant to 15 U.S.C. § 1640(a)(3), and that such an award is mandatory.
Equicredit objected to Nelson's Application and requested an extension of time for filing a notice of appeal of the $2,000.00 Judgment. It argued that the $2,000.00 Judgment did not provide for attorney fees; that the fees are not reasonably related to the work performed to obtain the $2,000.00 Judgment; and that Nelson failed to present the Court with evidence of actual time expended on the matter in which the Mourers prevailed. Should the Mourers prevail, Equicredit also requested leave to appeal the $2,000.00 Judgment and the grant of attorney fees.
Analysis
The TILA imposes mandatory disclosure requirements by those entities who extend credit to consumers. The purpose of the TILA is "to assure a meaningful disclosure of credit terms so that the consumer will be able to compare more readily the various credit terms available to him and avoid the uninformed use of credit . . ." 15 U.S.C. § 160(a).
Certain regulations have been designed to carry out the purpose of the TILA and they, among other things, mandate specific disclosures in credit transactions. See 15 U.S.C. § 1604 and 12 C.F.R. § 226.17. If *705 a creditor should fail to disclose any of the credit terms required under the TILA and its related regulations, a consumer may bring a civil action against the creditor under 15 U.S.C. § 1640.
Among its provisions, the TILA requires that when the consumer prevails in an action involving a close ended credit transaction secured by a dwelling, he or she may recover not less than $200.00 nor greater than $2,000.00. The purpose of the statutory recovery is "to encourage lawsuits by individual consumers as a means of enforcing creditor compliance with the Act." Watkins v. Simmons & Clark, Inc., 618 F.2d 398, 399 (6th Cir.1980).
The TILA also permits recovery of reasonable attorney fees and costs. 15 U.S.C. § 1640(a)(3). A plaintiff in a TILA case need not prove that he or she suffered actual monetary damage in order to recover the statutory damages and attorney's fees. Watkins, 618 F.2d at 399. Due to "the mandatory nature of the award of attorney's fees under TILA" and because the District Court held that Equicredit violated the Act, it is appropriate to consider the issue of attorney's fees. Purtle v. Eldridge Auto Sales, 91 F.3d 797, 802 (6th Cir.1996); See also Alyeska Pipeline Service Co. v. Wilderness Society, 421 U.S. 240, 262, 95 S.Ct. 1612, 1624, 44 L.Ed.2d 141 (1975); Zagorski v. Midwest Billing Services, Inc., 128 F.3d 1164, 1166 (7th Cir.1997).
The amount of attorney fees is not limited by the sum of the Mourers' recovery. Purtle, 91 F.3d at 802; Sosa v. Fite, 498 F.2d 114 (5th Cir.1974); Smith v. Chapman, 436 F.Supp. 58, 66 (W.D.Texas 1977). Even so, the Supreme Court has instructed that the extent of a plaintiff's success is a crucial factor in determining the proper amount of an award of attorney fees. Hensley v. Eckerhart, 461 U.S. 424, 103 S.Ct. 1933, 76 L.Ed.2d 40 (1983). However, the Supreme Court also stated that the amount of the fee must be determined on the facts of each case.[1]Hensley, 461 U.S. at 429, 103 S.Ct. at 1937.
The initial point of inquiry to determine the right to attorney fees pursuant to 15 U.S.C. § 1640, is whether the plaintiff has brought a "successful action" under 15 U.S.C. § 1635. The standard for making this threshold determination has been formulated in various ways. The most generous of which is that plaintiffs are considered to be the prevailing party if they succeed on any significant issue in the litigation which achieves some of the benefit the parties sought in bringing the suit. Nadeau v. Helgemoe, 581 F.2d 275, 278-279 (1st Cir.1978).
Here, the Mourers succeeded on their claim that before consummation of the transaction, full disclosure in writing was not made in a form they could keep as required by 12 C.F.R. § 226.17(a) and (b). The Mourers were ultimately awarded the *706 maximum amount of damages allowed by the statute on this claim. We find that success on this claim "brings the plaintiff . . . across the statutory threshold." Hensley, 461 U.S. at 433, 103 S.Ct. at 1939. Success is also measured by the degree of advancement of the principle behind the statute and the harm thwarted. See Zagorski, 128 F.3d at 1167.
Since the principle behind the TILA is to provide meaningful and proper disclosure of credit terms, the Mourers' success on the claim that they did not receive written disclosure terms prior to or even immediately after the closing is not to be seen as minimal. "The cumulative effect of [seemingly] petty violations . . . may not be petty." Hyde v. Small, 123 F.3d 583, 585 (7th Cir.1997). "The mere fact that the suit does not result in a large award of damages or the breaking of new . . . ground is not a good ground for refusing to award attorney's fees." Hyde, 123 F.3d at 585.
In Hensley, after a thorough look at several cases cited in the legislative history of the Civil Rights Attorney's Fees Awards Act of 1976, and the enumeration of twelve factors[2] derived directly from the American Bar Association Code of Professional Responsibility, Disciplinary Rule 2-106, as found in Johnson v. Georgia Highway Express, Inc., 488 F.2d 714 (5th Cir.1974), the Supreme Court noted that "the legislative history does not provide a definitive answer as to the proper standard for setting a fee award where the plaintiff has achieved only limited success." Hensley, 461 U.S. at 431, 103 S.Ct. at 1938. Different courts of appeals however, have adopted varying standards for determining the relevance of the results obtained, to the amount of a fee award where the plaintiff did not succeed on all claims asserted.
Although some of these courts of appeals have found that plaintiffs should not recover fees for any work done on unsuccessful claims, the Sixth Circuit has stated that prevailing plaintiffs should generally receive a fee, even for hours expended on unsuccessful research or litigation, unless the positions asserted were frivolous or in bad faith. Northcross v. Board of Education of Memphis City Schools, 611 F.2d 624, 636 (6th Cir.1979), cert. denied, 447 U.S. 911, 100 S.Ct. 2999, 3000, 64 L.Ed.2d 862 (1980). There have been no allegations of bad faith or frivolity in this case. Consequently, it remains for us to determine what fee is reasonable and fair to everyone. We note that, "Hours that are not properly billed to one's client also are not properly billed to one's adversary." Copeland v. Marshall, 641 F.2d 880, 891 (C.A.D.C.1980) (en banc) (emphasis in original).[3]
The first, and simplest method for determining a reasonable fee is the "lodestar method" which takes the number of hours reasonably expended, multiplied by a reasonable hourly rate. "This calculation provides an objective basis on which to make an initial estimate of the value of *707 the lawyer's services." Hensley, 461 U.S. at 433, 103 S.Ct. at 1939.
Attorney Nelson asserts that he spent 81.8 hours in preparation and litigation of the case. He charges $200.00 per hour, bringing his total amount of fees to $16,360.00.
The Supreme Court also instructs us to "exclude from this initial fee calculation, hours that were not reasonably expended." Hensley, 461 U.S. at 434, 103 S.Ct. at 1939. It cites such examples of overstaffing and the variance of lawyers' experience and expertise. This however, we find unnecessary, as Attorney Nelson is a sole practitioner and the only lawyer who worked on the case. Consequently, both the number of hours worked and the hourly fee charged appear reasonable.
Once we have determined the initial fee amount, we must factor in the "results obtained." This is "particularly crucial where a plaintiff is deemed `prevailing' even though he succeeded on only some of his claims for relief." Hensley 461 U.S. at 434, 103 S.Ct. at 1940. To aid in making this determination, the Supreme Court requires us to address two questions. First, did the plaintiff fail to prevail on claims that were unrelated to the claims on which he succeeded; and second, did the plaintiff achieve a level of success that makes the hours reasonably expended a satisfactory basis for a fee award?
As to the first inquiry, the Mourers' two basic arguments involving TILA and HOEPA as it related to Equicredit, were that they did not receive the required disclosures pursuant to 15 U.S.C. § 1638, § 1639, and 12 C.F.R. § 226.32, and that they were entitled to rescind their agreement with Equicredit pursuant to 15 U.S.C. § 1635.
The Mourers prevailed on one of three claims regarding disclosure, where the remedy was a fine imposed by statute. They failed entirely to prevail on their claim requiring rescission. Notwithstanding this difference, we find that the actual claims, if not the remedies, brought in the lawsuit were inextricably intertwined. The TILA and HOEPA claims arise from the same set of facts and the same sequence of statutes. They involve a common core of facts and are based on related legal theories.
In regard to the second question, the Mourers achieved only partial success. Although we have been told by the Sixth Circuit Court of Appeals that an attorney should receive a fee even for hours spent on unsuccessful claims, the Supreme Court has said that when there is limited success, the product of hours reasonably expended on the litigation as a whole multiplied by a reasonable hourly rate may be excessive. "Congress has not authorized an award of fees whenever it was reasonable for a plaintiff to bring a lawsuit or whenever conscientious counsel tried the case with devotion and skill." Hensley, 461 U.S. at 436, 103 S.Ct. at 1941.
Even though the statute does not provide for an excessive fine when the creditor falls short of the proper disclosure requirements, this is not a reflection of the importance of the principle violated. Because the purpose of the act is meaningful disclosure of credit terms and informed decision making on the part of the consumer, we believe Congress meant to implement the TILA through individual actions. Therefore, in order to encourage counsel to undertake TILA actions, as Congress intended, it is necessary that counsel be awarded fees commensurate with those which they could obtain by taking other types of cases. "Paying counsel in [TILA] cases at rates lower than those they can obtain in the marketplace is inconsistent with the congressional desire to enforce *708 the [TILA] through private actions, and therefore misapplies the law." Tolentino v. Friedman, 46 F.3d 645, 653 (7th Cir.1995) cert. denied, 515 U.S. 1160, 115 S.Ct. 2613, 132 L.Ed.2d 856 (1995).
We are also required to scrutinize the actual Application for evidence supporting the hours worked and the rates claimed. "Where the documentation of hours is inadequate, the . . . court may reduce the award accordingly." Hensley, 461 U.S. at 433, 103 S.Ct. at 1939.
Attorney Nelson's Application is not necessarily inadequate, but it lacks the detail that is normally found and is commonplace in bankruptcy.[4] Although separate entries are made listing various activities, it is unclear what the subject of these activities were. For example, there are numerous entries regarding legal research and drafting of pleadings but it is unclear exactly what legal question was researched or which pleadings were drafted. We know however, that work of this kind was done in this case.
When all is said and done, "There is no precise rule or formula for making [reasonable attorney fee] determinations. The . . . court may attempt to identify specific hours that should be eliminated, or it may simply reduce the award to account for the limited success. The court necessarily has discretion in making this equitable judgment." Hensley, 461 U.S. at 436-437, 103 S.Ct. at 1941.
Therefore, taking into account the limited success of the litigation, the reasonableness of the time expended and the hourly fee charged, the quest for advancement of the principles of the statute, its remedial nature, the harm prevented, and the lack of detail in the Application, we award attorney fees to Attorney Nelson in the amount of $12,270.00, plus costs in full of $874.91, for a total of $13,144.91.
Equicredit requests an extension of time to file an appeal of the $2,000.00 Judgment, stating that its failure to do so timely is excusable. Fed.R.Bankr.P. 8002 provides that upon expiration of the time for filing the notice of appeal, the bankruptcy judge may extend the time for filing the notice of appeal for a period not to exceed twenty days, if a request is made within that twenty day period and there is a "showing of excusable neglect." Fed.R.Bankr.P. 8002(c)(2).
In this case, the $2,000.00 Judgment was filed on April 16, 2004. The Motion to Extend Time was filed on May 17, 2004. The twenty day extension period expired on May 16, 2004. Consequently, the Motion to Extend Time was not timely filed. However, we note that Equicredit's decision not to file an appeal of the $2,000 Judgment was admittedly intentional and conscious, based on financial considerations. See Pioneer Investment Services Co. v. Brunswick Associates Limited Partnership, 507 U.S. 380, 113 S.Ct. 1489, 123 L.Ed.2d 74 (1993) (Authorizing relief in cases where the failure was the result of *709 excusable neglect, not as to incidents where neglect is excusable in light of current knowledge); In re F/S Communications Corp., 59 B.R. 824 (Bankr.N.D.Ga.1986) (Strict standard of excusable neglect applies to motions to extend time for filing appeal under Fed. R. Bankr.P. 8002).
Equicredit had notice of the appeal period. It also had notice that pursuant to the TILA, the award of attorney fees to the prevailing party was mandatory. Therefore, we find there is ample basis to deny the Motion to Extend Time for Filing an Appeal of the $2000.00 Judgment. Equicredit's untimely filing of the request to extend the time to file the appeal, coupled with its intentional decision to forego its appeal rights, and its notice of the law, enforce this conclusion. As stated earlier however, this Opinion and Order Awarding Attorney Fees is subject to all appeal rights afforded by 28 U.S.C. § 158 and Fed. R. Bankr.P. 8001 et. seq.
NOTES
[1] Although in Hensley, the issue of attorney's fees was brought in the context of the Civil Rights Attorney's Fees Award Act of 1976, the Supreme Court made clear that "It is intended that the amount of fees awarded . . . be governed by the same standards which prevail in other types of equally complex Federal litigation . . . and not be reduced because the rights involved may be nonpecuniary in nature. In computing the fee, counsel for a prevailing party should be paid, as is traditional with attorneys compensated by a fee-paying client, `for all time reasonably expended on a matter.' "S.Rep. No. 94-1011, p. 6 (1976), U.S.Code Cong. & Admin. News 1976, pp. 5908, 5913.
The Supreme Court also stated, "The standards set forth in this opinion are generally applicable in all cases in which Congress has authorized an award of fees to a prevailing party." Hensley, 461 U.S. at 433, 103 S.Ct. 1933, 1939.
[2] The twelve factors are: 1) the time and labor required; 2) the novelty and difficulty of the questions; 3) the skill requisite to perform the legal service properly; 4) the preclusion of employment by the attorney due to acceptance of the case; 5) the customary fee; 6) whether the fee is fixed or contingent; 7) time limitations imposed by the client or the circumstances; 8) the amount involved and the results obtained; 9) the experience, reputation, and ability of the attorneys; 10) the "undesirability" of the case; 11) the nature and length of the professional relationship with the client; and 12) awards in similar cases. Johnson, 488 F.2d at 717-719.
[3] At this point it should be noted that Equicredit alone, retained two law firms in this adversary proceeding, and was represented by five attorneys.
[4] The overriding concern behind the requirement of detailed fee applications in bankruptcy is conservation of the estate. Through the Bankruptcy Reform Act, Congress sought to repudiate a series of judicial decisions which set an arbitrary limit on fees in a quest to preserve the estate. However, detailed fee applications are required to enable the bankruptcy court to fulfill its obligation to examine carefully the requested compensation in order to ensure that the claimed expenses are justified. Pursuant to 11 U.S.C. § 330, "the compensation is to be reasonable, for economy in administration is the basic objective." S.Rep. No. 989, 95th Cong., 2d Sess. 40-41 (1978). We note however, that Attorney Nelson's was not appointed by the Bankruptcy Court and his fees will not be paid by the bankruptcy estate.
|
{
"pile_set_name": "FreeLaw"
}
|
Miscommunication in genes, multiple births called anomalies
What mice want are cozy, dark tunnels. That sense of shelter. A comfy assurance that nothing can swoop down from the sky and turn them into appetizers.
Then there are Richard Schultz's mice. The males among them exhibit an uncommon comfort in the great outdoors. Such boldness is utterly unmouselike.
Mr. Schultz, a researcher at the University of Pennsylvania in Philadelphia, developed these mice in an unusual manner. He allowed their embryos to live outside the womb for a few days. The little embryos grew in a brew of nutrients similar to what a human embryo might experience during in vitro fertilization. Then he put the embryos into mom, and let nature proceed.
In most ways, these mice were like any others. They grew normally, grasped objects normally, they balanced on sticks with relative ease -- anything an average mouse might do, they did too.
Then they were tested for anxiety levels in open spaces. There, the differences arose. Further tests revealed another problem: while all the mice were good learners, the petri-dish-raised mice had poor spatial memory.
Of course, it's impossible to say whether Mr. Schultz's mice are adequate stand-ins for humans. But his work feeds into a growing body of research that suggests a small but significant increased risk for certain kinds of genetic defects among infants conceived through in vitro fertilization. They are called gene imprinting disorders.
How imprinting works
An embryo has two copies of every gene, one from mother and one from father. In imprinting, only one of those genes is allowed to "talk." Whether the active gene is the mother's or the father's depends on the gene, but which gene is active is very specific, and very consistent from one person to the next, explains Judith Hall, a professor at the University of British Columbia and an expert on genetic imprinting.
In imprinting disorders, both gene copies are left on or turned off.
"If you have two turned on, you have a problem. If you have none turned on, you have a problem," she said.
Researchers worry that the nutrients in which embryos bathe in a petri dish, or the way a sperm and egg meet in a laboratory, could make IVF embryos particularly vulnerable to these types of defects.
But does it? It's hard to say.
The scientific literature about the risks of test-tube reproduction often is a befuddling storm of conflicting results, uncertainty, and inadequate data, said many who have attempted to sort it out.
What's emerging from this research may be a conclusion of a different sort: There is not enough information about the more than quarter-million children conceived through IVF in the United States. There ought to be more and better statistics gathered on IVF children. And the number of studies contain inadequate data to support the reported results.
"The papers are shoddy," said Dr. Hall, who is a member of a committee for the Genetics and Public Policy Center that spent the last year reviewing in vitro fertilization research.
Studies often compare IVF infant health to infant health in the general population without distinguishing what kind of procedure was used to create the IVF embryo.
"You would never publish a paper on mice where you didn't describe" research methods in detail, Dr. Hall said. "There's something kind of mystical about assisted reproduction technology. People say, 'we won't discuss that.' "
Despite the blur in the literature, most observers agree that some IVF problems are unquestionably evident:
IVF pregnancies result in a higher number of twin, triplet, and quadruplet births than natural conception. Such children face an increased risk of birth defects.
Even IVF babies who do not share the womb with a twin are more likely to be premature than naturally conceived children and suffer the complications that may engender.
IVF single births often are underweight, even when they are full-term.
Fertility experts seem to agree that the number of multiple births is one problem that demands urgent attention. In fact, there has been progress. Recent statistics show a decline in these births.
But the problem is far from solved and there still are many clinics where multiple births make up more than half of the successful IVF procedures.
Nationwide, multiple births occurred in 40 percent of all successful IVF procedures among women younger than 35. Eight percent were triplets or more.
Although a triplet pregnancy generally is acknowledged to pose a significant health risk, twins often are thought to be a fairly safe bet. But the risks that can accompany twin births are not trivial. Twins have a fetal death rate three to five times higher than single babies. Their newborn death rate is five to seven times higher. Twin births cost four times what single births cost. If the twin is severely underweight, medical costs for that first year of life can be as high as 44 times the cost of caring for a single infant.
Reducing multiple births
Fertility specialists are looking at a number of ways to reduce multiple births.
For instance, many clinics in Europe return only a single embryo to the womb among patients with the best prospects for a successful pregnancy. But the trend has no evident following in the United States, where patients often pay for fertility treatment out of their own pockets, and an IVF attempt can run to $10,000 to $12,000. At that price, people want to get it right the first time. In Europe, fertility treatment often is part of government-supplied health coverage. In the United States, insurance coverage for such treatment is rare.
In the United States, many clinics are choosing to grow embryos outside the womb for an extra day or two. Additional growing days could reveal which embryos are most likely to succeed. Thus, fewer embryos can be returned to the womb. Ironically, some research shows that this technique may increase the likelihood of identical twins.
Others raise questions about the health consequences of a longer time outside the womb.
Mr. Schultz, of the bold-mice experiment, conducted genetic studies on embryos growing outside the womb. These showed severe genetic errors. Specifically, the genes were not properly imprinted. Genes that were supposed to be shut off were turned on. Those genes gave bad instructions to other genes. More than 100 genes failed to behave the way they were supposed to.
That's why Mr. Schultz decided to test the behavior of in vitro mice. Sure, embryos make genetic mistakes, but did it really make a difference in the adult mouse? His study of mouse behavior at least suggests that yes, it may.
The issue is of rising importance as some clinics choose to grow embryos outside the body for longer periods.
One troubling statistic that may relate to the shortcomings of raising embryos in a laboratory is an apparent slight but significant increase among IVF kids for diseases caused by imprinting errors.
Because of the unique nature of the genetic failures in the mouse embryos, and this assortment of these diseases, Mr. Schultz said a critical next step would be a study that assigned one group of IVF patients to use embryos grown outside the womb for a short time, and another group to use embryos grown outside the womb for a longer time. The children of these practices should then be followed for life.
As it stands, the United States doesn't track any IVF child, making it impossible to know if children born of these procedures are experiencing any problems as they get older.
"These practices that [fertility doctors] do are very aggressively implemented,'' Mr. Schultz said. "The implementation has fairly outpaced the underlying science.''
He said IVF practices are often introduced into patient care without much long-term research, which "is a real anomaly in the practice of Western medicine."
What's needed, many say, is a method to follow the health of children conceived from assisted reproductive technology in a systematic way.
Canada recently passed legislation that requires more tracking of these children. Scandinavian countries already do this. But in the United States, record-keeping extends not much further than a fertility clinic's report that a birth was achieved and how many times a particular method was used to achieve a pregnancy.
Often, a child's pediatrician will not even know a child was conceived with assisted reproduction, said Dr. Hall, the genetic imprinting expert from British Columbia. If they did know, there is no central database to report any problems that might arise for these children, she said.
As a result, prospective parents can't know what risks their IVF child may face. The risks are probably statistically small, Dr. Hall said, but important.
For instance, if there was a higher risk for a very rare cancer "wouldn't you want to know that? It seems to me these are highly highly valued children. If that's the risk, even though it's small, you'd monitor [the child] differently. But we don't know. We absolutely don't know, because they are not followed. They don't tell the pediatrician. We don't know the outcomes for these people,'' she said.
"That's the whole frustration."
Copyright 2018 The Blade. All rights reserved. This material may not be copied or distributed without permission.
|
{
"pile_set_name": "Pile-CC"
}
|
John Cossar
John Hay Cossar (2 January 1858 – 28 April 1935) was an English actor of the silent era. He appeared in 146 films between 1914 and 1929.
Biography
Cossar was born in London, England. He was the fifth child of Walter Cossar and his wife Kate Lyster. Walter was in the Royal Marines between 1835 and 1863. In 1865 the family travelled to Canada and thence to Chicago, Illinois in the USA where John's older brother Walter Lyster Cossar later became City Editor of the Chicago Evening Journal.
In 1896, John married Fanny Cohen in Chicago. Fanny was also an actress and the 1930 census of Los Angeles shows them living with two children, Phyllis and Raymond. He died in Hollywood, California, in 1935.
Partial filmography
One Wonderful Night (1914)
The White Sister (1915)
The Alster Case (1915)
The Strange Case of Mary Page (1916)
The Misleading Lady (1916)
The Trufflers (1917)
On Trial (1917)
The Marriage Ring (1918)
Her Country First (1918)
Common Clay (1919)
Thieves (1919)
When Fate Decides (1919)
Made in Heaven (1921)
Voices of the City (1921)
Watch Your Step (1922)
Grand Larceny (1922)
The Ghost Patrol (1923)
The Hunchback of Notre Dame (1923)
The Steel Trail (1923)
The Fast Express (1924)
My Lady of Whims (1925)
The Sap (1926)
The House Without a Key (1926)
Melting Millions (1927)
Web of Fate (1927)
Woman's Law (1927)
The Fire Detective (1929)
External links
Category:1858 births
Category:1935 deaths
Category:English male film actors
Category:English male silent film actors
Category:Male actors from London
Category:20th-century English male actors
|
{
"pile_set_name": "Wikipedia (en)"
}
|
{
"kind": "FUNCTION_DEFINITION",
"children": [
{
"kind": "LIST",
"children": []
},
{
"kind": "FUNCTION_KEYWORD",
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
},
{
"kind": "IDENTIFIER_TOKEN",
"value": "foo"
},
{
"kind": "FUNCTION_SIGNATURE",
"children": [
{
"kind": "OPEN_PAREN_TOKEN"
},
{
"kind": "LIST",
"children": []
},
{
"kind": "CLOSE_PAREN_TOKEN",
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
}
]
},
{
"kind": "FUNCTION_BODY_BLOCK",
"children": [
{
"kind": "OPEN_BRACE_TOKEN",
"trailingMinutiae": [
{
"kind": "END_OF_LINE_MINUTIAE",
"value": "\n"
}
]
},
{
"kind": "LIST",
"children": [
{
"kind": "ASSIGNMENT_STATEMENT",
"children": [
{
"kind": "SIMPLE_NAME_REFERENCE",
"children": [
{
"kind": "IDENTIFIER_TOKEN",
"value": "a",
"leadingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
},
{
"kind": "COMMENT_MINUTIAE",
"value": "// DecimalNumber FloatingPointTypeSuffix"
},
{
"kind": "END_OF_LINE_MINUTIAE",
"value": "\n"
},
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
],
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
}
]
},
{
"kind": "EQUAL_TOKEN",
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
},
{
"kind": "NUMERIC_LITERAL",
"children": [
{
"kind": "DECIMAL_FLOATING_POINT_LITERAL_TOKEN",
"value": "25f"
}
]
},
{
"kind": "SEMICOLON_TOKEN",
"trailingMinutiae": [
{
"kind": "END_OF_LINE_MINUTIAE",
"value": "\n"
}
]
}
]
},
{
"kind": "ASSIGNMENT_STATEMENT",
"children": [
{
"kind": "SIMPLE_NAME_REFERENCE",
"children": [
{
"kind": "IDENTIFIER_TOKEN",
"value": "a",
"leadingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
],
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
}
]
},
{
"kind": "EQUAL_TOKEN",
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
},
{
"kind": "NUMERIC_LITERAL",
"children": [
{
"kind": "DECIMAL_FLOATING_POINT_LITERAL_TOKEN",
"value": "25F"
}
]
},
{
"kind": "SEMICOLON_TOKEN",
"trailingMinutiae": [
{
"kind": "END_OF_LINE_MINUTIAE",
"value": "\n"
}
]
}
]
},
{
"kind": "ASSIGNMENT_STATEMENT",
"children": [
{
"kind": "SIMPLE_NAME_REFERENCE",
"children": [
{
"kind": "IDENTIFIER_TOKEN",
"value": "a",
"leadingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
],
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
}
]
},
{
"kind": "EQUAL_TOKEN",
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
},
{
"kind": "NUMERIC_LITERAL",
"children": [
{
"kind": "DECIMAL_FLOATING_POINT_LITERAL_TOKEN",
"value": "25d"
}
]
},
{
"kind": "SEMICOLON_TOKEN",
"trailingMinutiae": [
{
"kind": "END_OF_LINE_MINUTIAE",
"value": "\n"
}
]
}
]
},
{
"kind": "ASSIGNMENT_STATEMENT",
"children": [
{
"kind": "SIMPLE_NAME_REFERENCE",
"children": [
{
"kind": "IDENTIFIER_TOKEN",
"value": "a",
"leadingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
],
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
}
]
},
{
"kind": "EQUAL_TOKEN",
"trailingMinutiae": [
{
"kind": "WHITESPACE_MINUTIAE",
"value": " "
}
]
},
{
"kind": "NUMERIC_LITERAL",
"children": [
{
"kind": "DECIMAL_FLOATING_POINT_LITERAL_TOKEN",
"value": "25D"
}
]
},
{
"kind": "SEMICOLON_TOKEN",
"trailingMinutiae": [
{
"kind": "END_OF_LINE_MINUTIAE",
"value": "\n"
}
]
}
]
}
]
},
{
"kind": "CLOSE_BRACE_TOKEN",
"trailingMinutiae": [
{
"kind": "END_OF_LINE_MINUTIAE",
"value": "\n"
}
]
}
]
}
]
}
|
{
"pile_set_name": "Github"
}
|
[Leber's hereditary optic nerve neuropathy].
The authors present a case report of 26 years old man with bilateral optic nerve neuropathy. Detection of heteroplasmic mutation of mitochondrial DNA at G3460A site confirmed the suspicion on Lebers hereditary optic nerve neuropathy (LHON). Genetic and environmental factors of the disease and various accompanying neurologic and other symptoms, which can together with the optic nerve defect participate in the development of of the LOHN clinical pattern are discussed. (Ref. 12.)
|
{
"pile_set_name": "PubMed Abstracts"
}
|
France is just stopped. Plunging into a crisis I have never seen before (and I am 50 !). And if the economic and social disasters were not enough, we now discover our "leader" has a real problem with women, and fire in a place my distinguished French education forbids me to name. La honte...
Egypt is fighting the NWO conspiracy! If you are against the NWO, support Egypt in fighting terrorism, and Zionist Elite supporting terrorism. Egyptians had prevented the Third World War and the NWO, but you all people of all countries should support Egyptians. The Muslim Brotherhood and all their terrorist branches should be declared by all countries as terrorists. The UN should end and a new organization created by all countries and not only by Zionists should replace it. To all countries, pay attention, avoid NGO, and watch diplomatic bags, and Zionist Ambassadors and never believe that Zionist Elite ever keep their friendship with anyone. Come on people and use your rights and press on your leaders to join Egypt.
|
{
"pile_set_name": "Pile-CC"
}
|
Four days after officials sealed off an entire floor of a federal courthouse in Washington, D.C. for secret arguments in a mystery case about a grand jury subpoena, a three judge panel unanimously agreed that an unknown company – owned by an unknown foreign country – had to abide by a lower court order enforcing a subpoena in a mystery case which some believe is related to the Russia investigation led by Special Counsel Robert Mueller. “The Grand Jury seeks information from a corporation (“the Corporation”) owned by Country A,” the judges wrote in their three page opinion, the first public document in a case known only as “In Re Grand Jury Subpoena.” Without giving any details on the identity of the company, or the country, the ruling rejected the efforts of both to avoid the grand jury subpoena for unknown information, leaving the subpoena in place. The decision revealed that the company refusing to comply with the subpoena was being fined by the courts. “When the Corporation failed to produce the requested information, the court held the Corporation in contempt, imposing a fixed monetary penalty to increase each day the Corporation fails to comply,” the decision read. In their ruling, the judges said that sovereign immunity could not insulate foreign countries from criminal liability, meaning in this case that the U.S. legal system could have ‘subject-matter jurisdiction over criminal offenses’ involving this foreign company, owned by a foreign government. “Consequently, we are unconvinced that Country A’s law truly prohibits the Corporation from complying with the subpoena,” the judges concluded. The new bits of information spurred all kinds of speculation from legal and political circles – but the bottom line is that no one has confirmed what kind of company, which country, or even who is investigating the matter. Company owned by a country…I have some guesses https://t.co/CfFOyQBsXG — Scott Stedman (@ScottMStedman) December 18, 2018 Some legal experts believe the company is a state-owned bank, which might have done business with the Trump Organization – but those type of details remain unknown at this time. The court’s decision could still be appealed to the full D.C. Circuit Court of Appeals, or directly to the U.S. Supreme Court.
A federal judge agreed to delay sentencing for President Donald Trump’s former National Security Adviser Michael Flynn on Tuesday after he pleaded guilty last year to lying to the FBI. >> Read more trending news Flynn resigned from his post in the Trump administration in February 2017 after serving just 24 days in office. He pleaded guilty in December 2017 to lying to the FBI about his contacts with Russian officials and agreed to fully cooperate with special counsel Robert Mueller’s team. >> From Cox Media Group's Jamie Dupree: FBI 302 shows Flynn misled FBI agents about 2016 Russian contacts Update 7:45 p.m. EST Dec. 18: Federal Judge Emmet Sullivan issued an order restricting the travel of former Trump National Security Adviser Michael Flynn. Sullivan ordered Flynn to turn over his passport and stay within 50 miles of Washington, D.C., beginning on Jan. 4, 2019, according to reports from CNN and Axios. Flynn has remained out of jail while awaiting his sentencing for lying to Congress. Update 2:20 p.m. EST Dec. 18: White House press secretary Sarah Huckabee Sanders said at a press briefing Tuesday afternoon that Flynn’s criminal case had nothing to do with Trump. “The activities that he is said to ... have engaged in don’t have anything to do with the president,” Huckabee Sanders said. “We wish Gen. Flynn well and we'll continue to focus on doing what we do here everyday.” Update 1 p.m. EST Dec. 18: Attorneys for Flynn asked U.S. District Judge Emmet Sullivan to delay his sentencing Tuesday after the judge asked whether Flynn wanted to wait until after his cooperation with Mueller’s team was completed before being handed his sentence, CNN reported. Authorities said in court records filed earlier this month that Flynn has met with investigators 19 times since pleading guilty in December 2017. He’s provided information in three separate investigations, including the probe into Russian election meddling, officials said. >> From Cox Media Group's Jamie Dupree: After stern criticism, federal judge delays Flynn sentencing Sullivan paused court proceedings for about half an hour Tuesday to allow Flynn time to confer with his attorneys about whether to postpone the sentencing hearing until after he’s completed his cooperation with authorities, Vox.com reported. Flynn’s attorney suggested in court that most of Flynn’s cooperation with Mueller had been completed, the news site reported, although the attorney added that it was possible Flynn could cooperate further in a case brought against his former business associates in a federal court in Virginia. >> Michael Flynn's former business associates accused of illegally lobbying for Turkey An indictment unsealed Monday showed authorities charged Flynn’s former business partner, Bijan Kian, 66, and Turkish businessman Kamil Ekim Alptekin, 41, with conspiracy, acting in the U.S. as illegal agents of the government of Turkey and making false statements to the FBI. Update 12:50 p.m. EST Dec. 18: Court proceedings resumed just after 12:40 p.m. Tuesday after U.S. District Judge Emmet Sullivan called a recess to the proceedings. Sullivan cautioned people not to 'read too much into the questions' asked before the break, including a question about whether Flynn could have been charged with treason, The Huffington Post reported. 'I wasn't suggesting he had committed treason,' Sullivan said, according to Vox.com. 'I was just curious.' Update 12:05 p.m. EST Dec. 18: Court proceedings were paused Tuesday morning for a recess to allow Flynn time to confer with his attorneys after U.S. District Judge Emmet Sullivan asked whether Flynn could have been charged with treason, The Huffington Post reported. Court is expected resume at 12:30 p.m. Sullivan asked Flynn several questions earlier Tuesday to make sure he wanted to proceed with his sentencing hearing. Sullivan asked Flynn to consider whether to push the hearing back until after he’s completed his cooperation with Mueller’s team, Vox.com reported. Update 11:40 a.m. EST Dec. 18: Flynn told U.S. District Judge Emmet Sullivan on Tuesday that he knew it was a crime to lie to the FBI, CNN reported. Sullivan asked Flynn a series of questions Tuesday to make sure he wanted to move forward with his sentencing hearing after Flynn said in a defense memo that the FBI never warned him that it was against the law to lie to federal agents. Update 10 a.m. EST Dec. 18: Flynn has arrived at the courthouse ahead of his scheduled sentencing hearing. Original report: President Donald Trump on Tuesday wished Flynn luck ahead of his scheduled sentencing for lying to FBI investigators probing Russian election meddling and its possible ties to Trump and his presidential campaign. “Good luck today in court to General Michael Flynn,” Trump wrote Tuesday morning in a tweet. “Will be interesting to see what he has to say, despite tremendous pressure being put on him, about Russian Collusion in our great and, obviously, highly successful political campaign. There was no Collusion!” >> Michael Flynn's former business associates accused of illegally lobbying for Turkey Flynn is scheduled to be sentenced at an 11 a.m. hearing before U.S. District Judge Emmet Sullivan, according to court records. Prosecutors asked a judge earlier this month to sentence Flynn to little or no jail time in connection to the case, citing his cooperation with investigators. >> More on Robert Mueller's investigation In a memo filed last week, Flynn’s attorneys asked he be spared jail time and suggested that FBI agents played to his desire to keep the situation quiet and, as a result, kept him from involving a lawyer when investigators approached him just days after Trump’s inauguration. Mueller’s team has sharply pushed back at any suggestion that Flynn was duped, with prosecutors responding that as a high-ranking military officer steeped in national security issues, Flynn “knows he should not lie to federal agents.” >> Former Trump attorney Michael Cohen sentenced to 3 years in prison, Trump responds on Twitter Flynn is, so far, the only member of Trump’s administration to plead guilty to charges in the Mueller investigation, according to Reuters. Last week, a federal judge in New York sentenced Trump’s former long-time attorney Michael Cohen to 36 months in prison for charges that included one count of lying to Congress that had been levied against Trump’s former fixer by Mueller’s office. Trump has frequently railed against the investigation, which he has called a witch hunt, and denied any collusion with Russia. The Associated Press contributed to this report.
As two Chicago police officers tried to locate the source of gunshots on the city’s South Side Monday night, they scrambled up an embankment and onto a set of southbound train tracks, walking south and keeping an eye on a northbound train as they searched for the potential shooter. Police officials said Officers Eduardo Marmolejo, 36, and Conrad Gary, 31, likely never heard the southbound train coming up behind them. According to The Chicago Tribune, one officer’s body camera footage offered investigators a glimpse into what took place as both men were killed. “They had no idea the train was behind them,” Anthony Guglielmi, a Chicago police spokesman, told the Tribune. “They hear the noise (of the northbound Metra train), we suspect. That masks the noise of the other train that is right behind them.” The oncoming South Shore train struck the officers on a viaduct over 103rd Street, the Tribune reported. They were killed instantly. >> Read more trending news The newspaper reported that it was not yet known how fast the South Shore train was going, but Michael Noland, CEO and president of the Northern Indiana Commuter Transportation District, said South Shore trains typically go around 65 mph on that stretch of track. The company, which operates South Shore trains on the city’s Metra tracks, is downloading the train’s event recorder to turn over to police investigators. Police Superintendent Eddie Johnson said Monday night that Marmolejo and Gary, both relatively new officers on the force, responded shortly after 6 p.m. that evening to 103rd Street and Dauphin Avenue when the city’s ShotSpotter system picked up the sound of gunshots. “While doing the most dangerous thing a police officer can do -- and that is to chase an individual with a gun -- these brave young men were consumed with identifying a potential threat to their community and put the safety of others above their own,” Johnson said. Guglielmi told the Tribune that the body camera footage shows the officers get out of their patrol car after spotting someone who could have been the shooter. They cross the viaduct and head south in the direction they apparently believe the suspect is moving. “They were deciphering the offender’s direction of flight,” Guglielmi told the newspaper. A gun and shell casings were found near where the officers died, the police spokesman said. A person of interest was being questioned in the case Tuesday, the Tribune said. Johnson said Monday night that Marmolejo had been on the force for more than two years. Gary was on the force for 18 months. According to the Officer Down Memorial Page, Marmolejo is survived by his wife and three children. Gary, a U.S. Air Force veteran, is survived by his wife and an infant daughter. Chicago Mayor Rahm Emanuel was subdued as he spoke of the effect the officers’ deaths on the department, which has lost two other officers in the line of duty this year. “I’m not usually one for a loss of words, but I think you can understand the idea in trying to express the immense sense of devastation to the Chicago Police Department,” Emanuel said. He praised Marmolejo and Gary for working to keep their community safe, at the expense of their own lives. “There they were, responding to ShotSpotter, doing their job trying to protect the rest of us,” the mayor said. “We’ve lost two young men, both fathers with young families. This holiday will never be the same for those two families, and while our hearts are with them, we’ve lost people who answered the call to make Chicago a better place.” Emanuel said he spoke to one of the families alongside the superintendent. “There are no words that can express the grief, the sense of loss -- it just knocks you back on your heels,” Emanuel said. “As we go about our time with our families, let us remind ourselves that there are others who cannot.” Marmolejo and Gary are the third and fourth Chicago officers slain in the line of duty this year. Officer Samuel Jimenez, 28, was one of four people who died, including the gunman, in a Nov. 19 mass shooting at the city’s Mercy Hospital & Medical Center. The other victims in that shooting were Dr. Tamara O’Neal, 38, and 24-year-old pharmacist Dayna Less. All three were killed by O’Neal’s former fiancé, 32-year-old Juan Lopez, who then killed himself. Cmdr. Paul Bauer, 53, was killed the afternoon of Feb. 13 when he attempted to help other officers take into custody a fleeing man sought for questioning in a previous shooting. The Tribune reported that officers had approached Shomari Legghette, a four-time felon, to question him when he ran away on foot. Bauer, who was in downtown Chicago for a meeting after a morning of training on mass shootings, heard the call over his radio and, after spotting Legghette running by, joined the chase. The 31-year police veteran got into a struggle with Legghette in a stairwell of a state building, where he was shot six times, the newspaper reported. Bauer’s weapon was in its holster and his radio and handcuffs were found next to his body. The Tribune reported that Legghette has been indicted on 56 felony counts of first-degree murder, armed violence, weapons and drug offenses. Marmolejo and Gary were assigned to the department’s Calumet District, which has lost three other officers this year. Two died of suicide and a third, Officer Vinita Williams, 47, died after collapsing at the station in July, the Tribune said.
|
{
"pile_set_name": "Pile-CC"
}
|
[Neuroretinitis].
The name "neuroretinitis" implies nothing but a fundus picture which can be caused by many infectious agents. The involvement of visual functions is variable and the prognosis relatively good. The treatment depends on which infectious agent is suspected.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Harrah
Harrah or Harrah's may refer to:
Places
Harrah, Fujairah, United Arab Emirates
Harrah, Oklahoma, US
Harrah, Washington, US
Harrah, Yemen
Al Harrah, Saudi Arabia, a large basaltic volcanic field in northwestern Saudi Arabia
People
Dennis Harrah, a former NFL Offensive Lineman
Roland Harrah III (1973-1995), American actor
Toby Harrah, a professional baseball player
Verna Harrah, philanthropist and film produceer, widow of William F. Harrah
William F. Harrah, founder of Harrah's Entertainment
Brands and enterprises
Harrah's Entertainment, founded by William F. Harrah, now owned by Caesars Entertainment Corporation
See also
Caesars Entertainment Corporation
List of Caesars Entertainment properties
List of casinos in the United States
|
{
"pile_set_name": "Wikipedia (en)"
}
|
In the V5.1 update, new skins/cosmetics that will be released in the future had been data-mined. We now have the 3D-renders of most of these along with a description with each item, thanks to Skin Tracker. You can rotate these items any way you wish and zoom in and out as well, so you can inspect these items thoroughly:
Shade (Epic)
Stay Cool
Maverick (Epic)
Just Drive
Wreck Raider (Epic)
Wrecks to riches
Reef Ranger (Epic)
Dive into the fray
Sun Tan Specialist (Epic)
Don’t get burned
Archetype (Epic)
Engineered for combat performance
Diving Tank (Epic)
Breathe easy
Air Tank (Epic)
Catch your breath
Bat Attitude (Epic)
Carry a grudge
Servo (Epic)
Prototype compound glider
Laser Chomp (Legendary)
Laser-guided. Razor-sharp. Slippery
There are quite a few skins and cosmetics relating to diving/sharks, which could be inspired by Shark Week, which started on the 22nd July and will end on the 30th July. Keep a look out for these skins/cosmetics, as we suspect they will be featured in the Fortnite Item Shop very soon.
If you haven’t seen the leaked emotes that were also data-mined in V5.1, you can see them in-game below:
|
{
"pile_set_name": "OpenWebText2"
}
|
I did it! I made a list. I didn’t think it would happen being a new dad and all, but it happened. I’m going to try to make a Top Metal list too, but no promises.
At 30 entries, this is the longest Top Drone list I’ve made. But I’ve been eschewing reviews lately and focusing on AGB Radio and A Thick Mist, so I figure 30 is acceptable if you count how many records I’ve directly recommended over the past year.
I seem to continually expand my definition of what a Drone Record is, which means there’s probably a few on here that are stretching the confines of that label, but I still did my best to try to keep it as Drone as possible.
There’s plenty of reoccurring themes in here. Namely, lots of voices/singing (11 have vocals present at least somewhere on the record) and lots of organs & harmoniums. Neither of those are all that surprising, though. But there’s two solo records from drummers, so that’s kinda cool. There’s also two heavily inspired by traditional Indian music, also kinda cool.
I had fun with this one. I changed a few things up this year. First, I decided to exclude any artist that’s been on any previous list. This meant no Saåad, Roly Porter, Andrew Weathers, Sarah Davachi, Mamiffer, Ian William Craig, Danny Paul Grody, Jefre Cantu-Ledesma, etc. (Seriously though go listen to the new Saåad and Mamiffer records.) No one likes to see the same people on such a niche list over and over again, so this was a good way to keep things new and exciting.
The other thing I decided to do was not rank this in the traditional way. Instead, I put the records in positions 7-30 into four groups of six, and the records within each group aren’t ranked. So that means the records in group 7-12 aren’t ranked, aside from me liking them more than the previous 13-30 drone records. I did this except for the top 6, which are ranked traditionally. I hope it’s not too confusing.
As usual, I try to keep the Big Droners off this list because anyone who’s a fan of drone probably already knows that Eluvium and Tim Hecker put out records this year and while their music is A+ Amazing, they don’t really need a little DIY blog to help them out.
Thanks for reading. Thanks for listening. Thanks for making incredible music.
|
{
"pile_set_name": "Pile-CC"
}
|
/*
* Copyright 2014 - 2020 Blazebit.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.blazebit.persistence.view.testsuite.update.entity.creatableonly.model;
import com.blazebit.persistence.testsuite.entity.Document;
import com.blazebit.persistence.testsuite.entity.Person;
import com.blazebit.persistence.view.CascadeType;
import com.blazebit.persistence.view.EntityView;
import com.blazebit.persistence.view.UpdatableEntityView;
import com.blazebit.persistence.view.UpdatableMapping;
import com.blazebit.persistence.view.testsuite.update.entity.model.UpdatableDocumentEntityWithMapsViewBase;
import java.util.Map;
/**
*
* @author Christian Beikov
* @since 1.2.0
*/
@UpdatableEntityView
@EntityView(Document.class)
public interface UpdatableDocumentEntityWithMapsView extends UpdatableDocumentEntityWithMapsViewBase {
@UpdatableMapping(updatable = false, cascade = { CascadeType.PERSIST })
public Map<Integer, Person> getContacts();
public void setContacts(Map<Integer, Person> contacts);
}
|
{
"pile_set_name": "Github"
}
|
Mumbai: Corporates are increasing focus on setting emission reduction and renewable energy targets besides putting up an internal price on carbon as part of risk mitigation, says a report.
According to CDP's latest climate change report, as many as 47 firms on the BSE 200 index have disclosed information related to climate change as against 34 companies in 2010.
Representational image. Reuters
The report assumes significance following India, the world's third-largest emitter of greenhouse gases, ratifying the landmark Paris climate deal earlier this month, giving a significant push for the agreement to come into force.
CDP, through a study of these 47 companies, has found that there is an increasing focus on setting emission reduction and renewable energy targets with 38 companies reporting current targets for a cut in emission.
About 15 of the 38 companies have short term emission target (till year 2020).
The report noted adding that two companies, Infosys and Tata Motors, have committed to a 100 percent renewable energy consumptions target by 2018 and 2030 respectively.
Besides, it was found that companies are setting an internal price on carbon.
"In India, 15 percent of the responding companies currently put a price on their carbon emissions and 43 percent are planning to set a price on carbon within next two years," the report said.
Further, CDP said the majority of the companies have at least one emission reduction initiative at implementation stage with the highest number of such steps from energy, materials and information technology sector.
|
{
"pile_set_name": "Pile-CC"
}
|
Counterregulatory responses to hypoglycemia in patients with glucokinase gene mutations.
The glucokinase gene is expressed not only in pancreatic B cells and in the liver, but also in pancreatic alpha cells, and in some cells of the central nervous system. A decreased glucokinase activity in the latter cell types may interfere with counterregulatory responses to hypoglycemia. In order to assess functional consequences of glucokinase mutations, counterregulatory hormones secretion and glucose production (6,6(- 2) H glucose) were monitored during an hyperinsulinemic clamp at about 2.4 pmol.kg(- 1).min(- 1) insulin with progressive hypoglycemia in 7 maturity onset diabetes of the young (MODY) type 2 patients, 5 patients with type 2 diabetes, and 13 healthy subjects. Basal glucose concentrations were significantly higher in MODY2 patients (7.6 +/- 0.4 mmol.l(- 1) ) and type 2 diabetic patients (12.4 +/- 2.3 mmol.l(- 1) ) than in healthy subjects (5.3 +/- 0.1 mmol.l(- 1), p<0.01) but counterregulatory hormones concentrations were identical. Insulin-mediated glucose disposal and suppression of endogenous glucose production at euglycemia were unchanged in MODY2 patients, but were blunted in type 2 diabetes. During progressive hypoglycemia, the glycemic thresholds of MODY2 patients for increasing glucose production (5.0 +/- 0.4 mmol.l(- 1) ) and for glucagon stimulation (4.5 +/- 0.4 mmol. l(- 1) ) were higher than those of healthy subjects and type 2 diabetic patients (3.9 +/- 0.1 and 4.1 +/- 0.1 mmol.l(- 1) respectively for glucose production and 3.7 +/- 0.1 and 3.5 +/- 0.1 mmol.l(- 1) for glucagon stimulation, p <0.02 in both cases). These results indicate that counterregulatory responses to hypoglycemia are activated at a higher plasma glucose concentration in MODY2 patients. This may be secondary to decreased glucokinase activity in hypothalamic neuronal cells, or to alterations of glucose sensing in pancreatic alpha cells and liver cells.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
<?php
/*
* This file is part of Composer.
*
* (c) Nils Adermann <naderman@naderman.de>
* Jordi Boggiano <j.boggiano@seld.be>
*
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*/
namespace Composer\Autoload;
/**
* ClassLoader implements a PSR-0, PSR-4 and classmap class loader.
*
* $loader = new \Composer\Autoload\ClassLoader();
*
* // register classes with namespaces
* $loader->add('Symfony\Component', __DIR__.'/component');
* $loader->add('Symfony', __DIR__.'/framework');
*
* // activate the autoloader
* $loader->register();
*
* // to enable searching the include path (eg. for PEAR packages)
* $loader->setUseIncludePath(true);
*
* In this example, if you try to use a class in the Symfony\Component
* namespace or one of its children (Symfony\Component\Console for instance),
* the autoloader will first look for the class under the component/
* directory, and it will then fallback to the framework/ directory if not
* found before giving up.
*
* This class is loosely based on the Symfony UniversalClassLoader.
*
* @author Fabien Potencier <fabien@symfony.com>
* @author Jordi Boggiano <j.boggiano@seld.be>
* @see http://www.php-fig.org/psr/psr-0/
* @see http://www.php-fig.org/psr/psr-4/
*/
class ClassLoader
{
// PSR-4
private $prefixLengthsPsr4 = array();
private $prefixDirsPsr4 = array();
private $fallbackDirsPsr4 = array();
// PSR-0
private $prefixesPsr0 = array();
private $fallbackDirsPsr0 = array();
private $useIncludePath = false;
private $classMap = array();
private $classMapAuthoritative = false;
private $missingClasses = array();
private $apcuPrefix;
public function getPrefixes()
{
if (!empty($this->prefixesPsr0)) {
return call_user_func_array('array_merge', $this->prefixesPsr0);
}
return array();
}
public function getPrefixesPsr4()
{
return $this->prefixDirsPsr4;
}
public function getFallbackDirs()
{
return $this->fallbackDirsPsr0;
}
public function getFallbackDirsPsr4()
{
return $this->fallbackDirsPsr4;
}
public function getClassMap()
{
return $this->classMap;
}
/**
* @param array $classMap Class to filename map
*/
public function addClassMap(array $classMap)
{
if ($this->classMap) {
$this->classMap = array_merge($this->classMap, $classMap);
} else {
$this->classMap = $classMap;
}
}
/**
* Registers a set of PSR-0 directories for a given prefix, either
* appending or prepending to the ones previously set for this prefix.
*
* @param string $prefix The prefix
* @param array|string $paths The PSR-0 root directories
* @param bool $prepend Whether to prepend the directories
*/
public function add($prefix, $paths, $prepend = false)
{
if (!$prefix) {
if ($prepend) {
$this->fallbackDirsPsr0 = array_merge(
(array) $paths,
$this->fallbackDirsPsr0
);
} else {
$this->fallbackDirsPsr0 = array_merge(
$this->fallbackDirsPsr0,
(array) $paths
);
}
return;
}
$first = $prefix[0];
if (!isset($this->prefixesPsr0[$first][$prefix])) {
$this->prefixesPsr0[$first][$prefix] = (array) $paths;
return;
}
if ($prepend) {
$this->prefixesPsr0[$first][$prefix] = array_merge(
(array) $paths,
$this->prefixesPsr0[$first][$prefix]
);
} else {
$this->prefixesPsr0[$first][$prefix] = array_merge(
$this->prefixesPsr0[$first][$prefix],
(array) $paths
);
}
}
/**
* Registers a set of PSR-4 directories for a given namespace, either
* appending or prepending to the ones previously set for this namespace.
*
* @param string $prefix The prefix/namespace, with trailing '\\'
* @param array|string $paths The PSR-4 base directories
* @param bool $prepend Whether to prepend the directories
*
* @throws \InvalidArgumentException
*/
public function addPsr4($prefix, $paths, $prepend = false)
{
if (!$prefix) {
// Register directories for the root namespace.
if ($prepend) {
$this->fallbackDirsPsr4 = array_merge(
(array) $paths,
$this->fallbackDirsPsr4
);
} else {
$this->fallbackDirsPsr4 = array_merge(
$this->fallbackDirsPsr4,
(array) $paths
);
}
} elseif (!isset($this->prefixDirsPsr4[$prefix])) {
// Register directories for a new namespace.
$length = strlen($prefix);
if ('\\' !== $prefix[$length - 1]) {
throw new \InvalidArgumentException("A non-empty PSR-4 prefix must end with a namespace separator.");
}
$this->prefixLengthsPsr4[$prefix[0]][$prefix] = $length;
$this->prefixDirsPsr4[$prefix] = (array) $paths;
} elseif ($prepend) {
// Prepend directories for an already registered namespace.
$this->prefixDirsPsr4[$prefix] = array_merge(
(array) $paths,
$this->prefixDirsPsr4[$prefix]
);
} else {
// Append directories for an already registered namespace.
$this->prefixDirsPsr4[$prefix] = array_merge(
$this->prefixDirsPsr4[$prefix],
(array) $paths
);
}
}
/**
* Registers a set of PSR-0 directories for a given prefix,
* replacing any others previously set for this prefix.
*
* @param string $prefix The prefix
* @param array|string $paths The PSR-0 base directories
*/
public function set($prefix, $paths)
{
if (!$prefix) {
$this->fallbackDirsPsr0 = (array) $paths;
} else {
$this->prefixesPsr0[$prefix[0]][$prefix] = (array) $paths;
}
}
/**
* Registers a set of PSR-4 directories for a given namespace,
* replacing any others previously set for this namespace.
*
* @param string $prefix The prefix/namespace, with trailing '\\'
* @param array|string $paths The PSR-4 base directories
*
* @throws \InvalidArgumentException
*/
public function setPsr4($prefix, $paths)
{
if (!$prefix) {
$this->fallbackDirsPsr4 = (array) $paths;
} else {
$length = strlen($prefix);
if ('\\' !== $prefix[$length - 1]) {
throw new \InvalidArgumentException("A non-empty PSR-4 prefix must end with a namespace separator.");
}
$this->prefixLengthsPsr4[$prefix[0]][$prefix] = $length;
$this->prefixDirsPsr4[$prefix] = (array) $paths;
}
}
/**
* Turns on searching the include path for class files.
*
* @param bool $useIncludePath
*/
public function setUseIncludePath($useIncludePath)
{
$this->useIncludePath = $useIncludePath;
}
/**
* Can be used to check if the autoloader uses the include path to check
* for classes.
*
* @return bool
*/
public function getUseIncludePath()
{
return $this->useIncludePath;
}
/**
* Turns off searching the prefix and fallback directories for classes
* that have not been registered with the class map.
*
* @param bool $classMapAuthoritative
*/
public function setClassMapAuthoritative($classMapAuthoritative)
{
$this->classMapAuthoritative = $classMapAuthoritative;
}
/**
* Should class lookup fail if not found in the current class map?
*
* @return bool
*/
public function isClassMapAuthoritative()
{
return $this->classMapAuthoritative;
}
/**
* APCu prefix to use to cache found/not-found classes, if the extension is enabled.
*
* @param string|null $apcuPrefix
*/
public function setApcuPrefix($apcuPrefix)
{
$this->apcuPrefix = function_exists('apcu_fetch') && filter_var(ini_get('apc.enabled'), FILTER_VALIDATE_BOOLEAN) ? $apcuPrefix : null;
}
/**
* The APCu prefix in use, or null if APCu caching is not enabled.
*
* @return string|null
*/
public function getApcuPrefix()
{
return $this->apcuPrefix;
}
/**
* Registers this instance as an autoloader.
*
* @param bool $prepend Whether to prepend the autoloader or not
*/
public function register($prepend = false)
{
spl_autoload_register(array($this, 'loadClass'), true, $prepend);
}
/**
* Unregisters this instance as an autoloader.
*/
public function unregister()
{
spl_autoload_unregister(array($this, 'loadClass'));
}
/**
* Loads the given class or interface.
*
* @param string $class The name of the class
* @return bool|null True if loaded, null otherwise
*/
public function loadClass($class)
{
if ($file = $this->findFile($class)) {
includeFile($file);
return true;
}
}
/**
* Finds the path to the file where the class is defined.
*
* @param string $class The name of the class
*
* @return string|false The path if found, false otherwise
*/
public function findFile($class)
{
// class map lookup
if (isset($this->classMap[$class])) {
return $this->classMap[$class];
}
if ($this->classMapAuthoritative || isset($this->missingClasses[$class])) {
return false;
}
if (null !== $this->apcuPrefix) {
$file = apcu_fetch($this->apcuPrefix.$class, $hit);
if ($hit) {
return $file;
}
}
$file = $this->findFileWithExtension($class, '.php');
// Search for Hack files if we are running on HHVM
if (false === $file && defined('HHVM_VERSION')) {
$file = $this->findFileWithExtension($class, '.hh');
}
if (null !== $this->apcuPrefix) {
apcu_add($this->apcuPrefix.$class, $file);
}
if (false === $file) {
// Remember that this class does not exist.
$this->missingClasses[$class] = true;
}
return $file;
}
private function findFileWithExtension($class, $ext)
{
// PSR-4 lookup
$logicalPathPsr4 = strtr($class, '\\', DIRECTORY_SEPARATOR) . $ext;
$first = $class[0];
if (isset($this->prefixLengthsPsr4[$first])) {
$subPath = $class;
while (false !== $lastPos = strrpos($subPath, '\\')) {
$subPath = substr($subPath, 0, $lastPos);
$search = $subPath . '\\';
if (isset($this->prefixDirsPsr4[$search])) {
$pathEnd = DIRECTORY_SEPARATOR . substr($logicalPathPsr4, $lastPos + 1);
foreach ($this->prefixDirsPsr4[$search] as $dir) {
if (file_exists($file = $dir . $pathEnd)) {
return $file;
}
}
}
}
}
// PSR-4 fallback dirs
foreach ($this->fallbackDirsPsr4 as $dir) {
if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr4)) {
return $file;
}
}
// PSR-0 lookup
if (false !== $pos = strrpos($class, '\\')) {
// namespaced class name
$logicalPathPsr0 = substr($logicalPathPsr4, 0, $pos + 1)
. strtr(substr($logicalPathPsr4, $pos + 1), '_', DIRECTORY_SEPARATOR);
} else {
// PEAR-like class name
$logicalPathPsr0 = strtr($class, '_', DIRECTORY_SEPARATOR) . $ext;
}
if (isset($this->prefixesPsr0[$first])) {
foreach ($this->prefixesPsr0[$first] as $prefix => $dirs) {
if (0 === strpos($class, $prefix)) {
foreach ($dirs as $dir) {
if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr0)) {
return $file;
}
}
}
}
}
// PSR-0 fallback dirs
foreach ($this->fallbackDirsPsr0 as $dir) {
if (file_exists($file = $dir . DIRECTORY_SEPARATOR . $logicalPathPsr0)) {
return $file;
}
}
// PSR-0 include paths.
if ($this->useIncludePath && $file = stream_resolve_include_path($logicalPathPsr0)) {
return $file;
}
return false;
}
}
/**
* Scope isolated include.
*
* Prevents access to $this/self from included files.
*/
function includeFile($file)
{
include $file;
}
|
{
"pile_set_name": "Github"
}
|
[Effect of the polymerase activity of DNA polymerase I on the development of moderate bacteriophages Mu, lambda red- and lambda red-gam-. II. The effect of the polymerase activity of DNA polymerase I on the development of bacteriophage Mu].
The paper reports on the influence of polymerizing activity of DNA-polymerase I on different developmental stages of temperate bacteriophage Mu in Escherichia coli K-12 cells. This activity is shown to be necessary for optimization of phage Mu primary integration into cell chromosomes. The relative frequency of Mu integration into bacterial chromosomes is 5-6 times lower in polA cells than in isogenic polA+ control strains, the phage yield from cells being delayed during the phage infectious development, but not in the course of induction from the prophage state. Data have been obtained that show the process of phage Mu DNA integration into the plasmid pRP1 .2 and the process of Mu transposition from the cell chromosome into the plasmid to be independent of the polymerizing activity of DNA-polymerase I.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Proper way to use @Transactional on a service
I have a service, which uses multiple DAOs to do a unit of work like following. The DAOs fetch the data/save by creating a session and commit. In that case, why do i need to have transactional on the service when the dao is managing the session by itself? If something goes wrong in the second DAO, the data in the first DAO is already commited, how do I get around this situation?
@Transactional
public boolean testService(SomeObject obj){
userDao.save(obj.getUser()); // this dao gets the session from sessino factory and commits there itself.
addressDao.save(obj.getAddress()); // something fails here, and the above line has already commited the data, so the data is not Atomic.
return true;
}
A:
Usually you don't put @Transactional in your DAO layer but in your service layer.
So I suggest you remove @Transactional from you DAOs and keep the one in your service.
In that case, if something goes wrong in any of your DAO everything will be rollback.
But It's up to you where you want the transaction to start and to finish.
|
{
"pile_set_name": "StackExchange"
}
|
Accessibility Links
Briton ‘paid bribes’ to win contracts from royal family
James Dean
November 6 2013, 12:01am, The Times
Victor Dahdaleh is accused of bribery over materials for smelting aluminiumGiuseppe Aresu/Getty
A British-Canadian businessman paid £40 million in bribes to senior officials at one of the world’s biggest aluminium smelters to help secure £1.7 billion worth of contracts for companies he advised, a court was told yesterday.
It is alleged by the Serious Fraud Office that Victor Dahdaleh, 70, made corrupt payments on a “very large scale” to Sheikh Isa bin Ali al-Khalifa, a member of the Bahraini royal family and chairman of the state-owned Aluminium Bahrain (Alba), and Bruce Hall, its chief executive, from 1998 to 2006.
These payments were made to help secure contracts for raw materials and machinery that Alba needed to smelt aluminium, the court was told. Sheikh Isa and Mr Hall supplied confidential “inside information” to Mr Dahdaleh that he used…
|
{
"pile_set_name": "Pile-CC"
}
|
Adam Downing and Josephine Holman
Adam Downing was born in 1795 in Connecticut. He died on 3 Aug 1886 in Pennsylvania.
Adam married Josephine Holman about 1817 in Connecticut. Josephine was born on 14 May 1798 in Connecticut. She died on 21 Oct 1888 in Pennsylvania.
They had the following children:
Adam Downing was born in 1818 in Connecticut. He died in 1871 in Mathews County, Virginia.Henry Downing was born about 1821 in Connecticut. He died on 28 Feb 1874 in Middlesex County, Connecticut.Abraham Downing was born in 1824 in Connecticut. He died in 1824 in Connecticut.Martin Downing was born during 1828 in New Haven County, Connecticut. He died about 1896 in Pennsylvania.Rachel R. Downing was born during 1830 in New Haven County, Connecticut. She died circa 1865 in Virginia.Christopher Frederick Downing was born about 1833 in Connecticut. He died on 9 Nov 1893 in Virginia.Josephine F. Downing was born in 1837 in Connecticut. She died on 16 Nov 1902 in Virginia.Michael Cole Downing was born in 1839 in Connecticut. He died on 25 Apr 1921 in Mathews County, Virginia.Emily S. Downing was born during 1843 in New Haven County, Connecticut. She died in 1922 in Mathews County, Virginia.Ruth Clara Downing was born circa 1846 in New Haven County, Connecticut.William Downing was born in 1850 in Connecticut. He died in 1922 in Virginia.
|
{
"pile_set_name": "Pile-CC"
}
|
oh, bookworms! They live in books, and they love to eat valuable words.”
Menu
Category Archives: teaser tuesdays
Teaser Tuesdays is a weekly bookish meme, hosted by MizB of Should Be Reading. Anyone can play along! Just do the following:
Grab your current read.
Open to a random page.
Share two (2) “teaser” sentences from somewhere on that page.
BE CAREFUL NOT TO INCLUDE SPOILERS!
(make sure that what you share doesn’t give too much away! You don’t want to ruin the book for others!)
Share the title and author, too, so that other TT participants can add the book to their TBR Lists if they like your teasers!
Here’s my teaser for today.
Sitting on the front steps at twilight looking up at the heavens,Wondering how many brightly glowing stars I have counted.
The summer’s humidity brings glistening highlights to my auraAnd I wonder if the giggling angels can observe my twinkle…as I can theirs.
page 16 – Summer Night
a sample from The Mountains Belong To Me
by Linda Going Deckert
I knew that this is not the usual Teaser that I post on our TT, because this is actually an excerpt from a collection of poems that have captured my attention. I was supposed to be reading Steampunks this week, but I wanted to try something for a change. The Mountains Belong To Me is such a great book that you would feel the writer’s passion for her work once you read her poems. 🙂
– taken from City of Bones – the first book in the New York Times bestselling The Mortal Instruments series, a young adult urban fantasy series set in New York City written by Cassandra Clare.
Yes, I am re-reading City of Bones in anticipation of its upcoming movie release (on August 21). I am just so excited to see the movie!
Share this:
Like this:
Teaser Tuesdays is a weekly bookish meme, hosted by MizB of Should Be Reading. Anyone can play along! Just do the following:
Grab your current read.
Open to a random page.
Share two (2) “teaser” sentences from somewhere on that page.
BE CAREFUL NOT TO INCLUDE SPOILERS!
(make sure that what you share doesn’t give too much away! You don’t want to ruin the book for others!)
Share the title & author, too, so that other TT participants can add the book to their TBR Lists if they like your teasers!
“All eyes turned to me, sitting quietly behind Dr. Raphael. The Council members agreed. My vote would decide the matter. I considered the choice before me, knowing that my decision put me at last among the angelologists.
Share this:
Like this:
Teaser Tuesdays is a weekly bookish meme, hosted by MizB of Should Be Reading. Anyone can play along! Just do the following:
Grab your current read.
Open to a random page.
Share two (2) “teaser” sentences from somewhere on that page.
BE CAREFUL NOT TO INCLUDE SPOILERS!
(make sure that what you share doesn’t give too much away! You don’t want to ruin the book for others!)
Share the title & author, too, so that other TT participants can add the book to their TBR Lists if they like your teasers!
Here’s my teaser for this week:
Yet still, I write this confession to you, my own wife, the one soul destined to wring something from naught. If I succeed in correcting what I have done, then I shall burn this missive and you will never know my sorry secret. If you are reading these words, then ’tis because I have failed.
– page 8 of 300
The Countess (Bride Quest Book 4)
By Claire Dela Croix
P.S.
I really like the cover of this book. The lady looks elegant but there is mischief in her eyes! I wish I had read the first three books before this edition. I am sure this is going to be an epic book from Ms Delacroix.. 🙂
4 out of 5 read-ologists recommend this WordPress.com site. ups and downs of writer's insanity and day to day life. I will write whatever makes the voices happy, for a writer that ignores her inner voices is merely a mental breakdown waiting to happen. Keeping the voices happy and creating new worlds for them to play in is my main goal.
|
{
"pile_set_name": "Pile-CC"
}
|
# Translations {#translations}
**Interested in translating the book?**
This book is licensed under the [Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License](http://creativecommons.org/licenses/by-nc-sa/4.0/).
This means that you are allowed to translate it and put it online.
You have to mention me as original author and you are not allowed to sell the book.
If you are interested in translating the book, you can write a message and I can link your translation here.
My address is christoph.molnar.ai@gmail.com .
**List of translations**
**Chinese**:
- https://github.com/MingchaoZhu/InterpretableMLBook Complete translations by [Mingchao Zhu](https://github.com/MingchaoZhu).
- https://blog.csdn.net/wizardforcel/article/details/98992150 Translation of most chapters, by CSDN, an online community of programmers.
- https://zhuanlan.zhihu.com/p/63408696 Translation of some chapters by 知乎. The website also includes questions and answers from various users.
**Korean**:
- https://tootouch.github.io/IML/taxonomy_of_interpretability_methods/ Complete Korean translation by [TooTouch](https://tootouch.github.io/)
- https://subinium.github.io/IML/ Partial Korean translation by [An Subin](https://subinium.github.io/)
**Spanish**
- https://fedefliguer.github.io/AAI/ First chapters translated by [Federico Fliguer](https://fedefliguer.github.io/)
If you know of any other translation of the book or of individual chapters, I would be grateful to hear about it and list it here.
You can reach me via email: christoph.molnar.ai@gmail.com .
|
{
"pile_set_name": "Github"
}
|
# 快速上手
安装启动好whistle,打开whistle的web界面:[http://local.whistlejs.com](http://local.whistlejs.com/)
![配置whistle规则界面]()
whistle功能众多,基本上覆盖抓包调试工具方方面面的功能,但每个功能的操作方式都差不多,基本上都是通过类似设置系统hosts的方式,先回顾下传统hosts配置方式:
```
127.0.0.1 www.test.com # 注释
```
其中每一条规则占一行,并通过空格做分隔符,左边为IP,右边为域名,`#` 为注释。
```
pattern operation
```
### 设置hosts
### 本地替换
|
{
"pile_set_name": "Github"
}
|
Over 100 men from the army and 25 civilians were engaged in the six-hour operation which involved the foot patrol taking the woman on a stretcher to Uplona through waist-deep snow. (Representative image/ File)
A ‘Khairiyat’ (welfare) team of the army posted in a north Kashmir village rescued a woman with pregnancy-related complications by carrying her for many kilometres in waist-deep snow and ensured that she reached hospital in time to give birth to a healthy baby.
The team received a call on Tuesday from a distraught Riyaz Mir, a resident of Dard Pora village near Tangmarg area of Baramulla in north Kashmir, saying his wife was in labour and the family was unable to take her to hospital because of heavy snowfall, an army source said.
The woman, Shamima, had developed severe pregnancy-related complications due to which both her and the unborn baby’s lives were in danger.
Following the call, the base commander located at Uplona village lost no time and trekked nearly five kilometres along with a resident medical officer to reach the family, the source said.
The entire army unit swung into action and three teams were immediately formed — one cleared the road for the pregnant woman’s movement, the second cleared the snow till the helipad and the third cleared the road till Kanispora, connecting the area with the district headquarters in Baramulla, the army official said.
Over 100 men from the army and 25 civilians were engaged in the six-hour operation which involved the foot patrol taking the woman on a stretcher to Uplona through waist-deep snow.
Once at Uplona, she was stabilised and immediately taken by an Army ambulance, with the Army Medical Officer, to Baramulla hospital as the soldiers kept clearing the snow ahead of the ambulance as it moved along the snow-covered road.
The army team accompanying the Mir family waited till the woman gave birth to a baby, said an officer.
“It was really wonderful presence of mind on part of the officers and men of the army who adopted a multi-pronged strategy to save the woman,” said Lieutenant General Kanwal Jeet Singh Dhillon, who heads the strategic Kashmir-based XV corps, and had issued instructions for the creation of such teams.
The ‘Khariyat’ teams, after being set up, had circulated their mobile numbers in villages in their areas of operation for assistance in cases of emergencies.
Lt Gen Dhillon said he ensured the creation of these teams to help Valley residents as he believes that the army and the civil population together can remove many problems of the region.
Believing in the motto ‘awam meri jaan’ (people are our beloved), Lt Gen Dhillon said, “The people and army are ‘humsaya’ or shadows of each other as they share their joys, grief, problems and challenges together. Keeping in line with this policy, the mobile numbers of the army camps were shared with the locals with a promise of assured assistance”.
|
{
"pile_set_name": "OpenWebText2"
}
|
As seen in the previous articles, in Branch and Bound method, for current node in tree, we compute a bound on best possible solution that we can get if we down this node. If the bound on best possible solution itself is worse than current best (best computed so far), then we ignore the subtree rooted with the node.
Note that the cost through a node includes two costs.
1) Cost of reaching the node from the root (When we reach a node, we have this cost computed)
2) Cost of reaching an answer from current node to a leaf (We compute a bound on this cost to decide whether to ignore subtree with this node or not).
In cases of a minimization problem, a lower bound tells us the minimum possible solution if we follow the given node. For example, in Job Assignment Problem, we get a lower bound by assigning least cost job to a worker.
In branch and bound, the challenging part is figuring out a way to compute a bound on best possible solution. Below is an idea used to compute bounds for Traveling salesman problem.
Cost of any tour can be written as below.
Cost of a tour T = (1/2) * ∑ (Sum of cost of two edges
adjacent to u and in the
tour T)
where u ∈ V
For every vertex u, if we consider two edges through it in T,
and sum their costs. The overall sum for all vertices would
be twice of cost of tour T (We have considered every edge
twice.)
(Sum of two tour edges adjacent to u) >= (sum of minimum weight
two edges adjacent to
u)
Cost of any tour >= 1/2) * ∑ (Sum of cost of two minimum
weight edges adjacent to u)
where u ∈ V
For example, consider the above shown graph. Below are minimum cost two edges adjacent to every node.
Now we have an idea about computation of lower bound. Let us see how to how to apply it state space search tree. We start enumerating all possible nodes (preferably in lexicographical order)
1. The Root Node: Without loss of generality, we assume we start at vertex “0” for which the lower bound has been calculated above.
Dealing with Level 2: The next level enumerates all possible vertices we can go to (keeping in mind that in any path a vertex has to occur only once) which are, 1, 2, 3… n (Note that the graph is complete). Consider we are calculating for vertex 1, Since we moved from 0 to 1, our tour has now included the edge 0-1. This allows us to make necessary changes in the lower bound of the root.
How does it work? To include edge 0-1, we add the edge cost of 0-1, and subtract an edge weight such that the lower bound remains as tight as possible which would be the sum of the minimum edges of 0 and 1 divided by 2. Clearly, the edge subtracted can’t be smaller than this.
Dealing with other levels: As we move on to the next level, we again enumerate all possible vertices. For the above case going further after 1, we check out for 2, 3, 4, …n.
Consider lower bound for 2 as we moved from 1 to 1, we include the edge 1-2 to the tour and alter the new lower bound for this node.
Time Complexity: The worst case complexity of Branch and Bound remains same as that of the Brute Force clearly because in worst case, we may never get a chance to prune a node. Whereas, in practice it performs very well depending on the different instance of the TSP. The complexity also depends on the choice of the bounding function as they are the ones deciding how many nodes to be pruned.
This article is contributed by Anurag Rai. If you like GeeksforGeeks and would like to contribute, you can also write an article and mail your article to contribute@geeksforgeeks.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Print negated words that follows "no,not,never" in a sentence in Python
How do I print all negated word that follows "no","not", "never" so on. The sentence is
SENTENCE="It was never going to work.I'm not happy"
Desired output
going,happy (Which follows never and not)
Any help !
A:
You may not need ntlk for that. I'd split the string (using regex to split according to non-alphanums (or you have an issue with work.I'm part), and build a list comprehension which looks for the previous word belonging to the "negative" words.
import re
SENTENCE="It was never going to work.I'm not happy"
all_words = re.split("\W+",SENTENCE)
words = [w for i,w in enumerate(all_words) if i and (all_words[i-1] in ["not","never","no"])]
print(words)
result:
['going', 'happy']
|
{
"pile_set_name": "StackExchange"
}
|
Arendals Fossekompani
Arendals Fossekompani ASA () is a Norwegian company located in Arendal. Its principal business is production and sale of electric energy from its 3 hydroelectric powerplants. It is listed on the Oslo Stock Exchange. The company is also the controlling owner with a 60% ownership in Markedskraft.
References
External links
Official web site
Category:Companies listed on the Oslo Stock Exchange
Category:Electric power companies of Norway
Category:Companies based in Aust-Agder
Category:Arendal
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Everest WordPress Theme is a fully responsive HTML5 theme that is ideal for photographers, agencies or creative freelancers.
It offers a full and fixed width portfolio grid, awesome hover effects, full width sliders with touch support, fullscreen backgrounds, fashionable captions and tons of professional styling options.
Theme FeaturesMore than 200 Options!
The Foundry Theme Options Panel makes it easy for you to control every aspect of your site from logos, colors, fonts to various site settings and much more.
Responsive Layout
Adapts to fit your users’ device, from large desktop screens to tablets and all the way down to mobile.
Unlimited Skins
Easily create your own look, the combinations are unlimited. We have included two skins (black and white) to get you started.
Portfolio Full Width / Fixed Width Grid
Choose between two different grid layouts for your portfolio index.
Filtrable Portfolio
Categorize your projects and optionally use a portfolio filter.
Awesome Hover Effect
Great looking hover effect with customizable parameters such as zoom factor, rollover color, font color and choice of using either logo or custom captions.
Fullscreen Background Images
Set global or individual fullscreen images for pages, posts and projects. Opacity and overlay pattern are customizable.
Sliders
- Full width slider with touch swipe support by UDTHEMES that allows for custom captions and different transition options such as left to right, top to bottom and fade. Set different transitions for desktop and mobile.Optional fullscreen button in slider.Choose whether to “Crop to fit slide” or display the entire image.
Demo content (pages, posts, layouts etc.) is included so that you can be up and running quickly.
PSD files
Full source plus individual PSD files for all sections and patterns included.
Well Documented
Extensive online and offline documentation
Supports Major Browsers
Supported by IE8, IE9, IE10, Firefox, Chrome, Opera and Safari.
Note: some CSS3 styles not supported in older browsers.
SupportAll support is handled in our support forum at support.udthemes.com . We encourage you to post all your questions concerning Everest WordPress there as your questions may have already been answered or may be of help to other people that have also purchased the theme.
Accessing the ForumTo access the forum you will need your “Item Purcahse Code”, which can be found in your download section of your dashboard. Click Here if you need help finding it
CreditsTo see all contributors and credits for photographs, videos, and scripts used please click here .
|
{
"pile_set_name": "Pile-CC"
}
|
Water program brings a refreshing change for Nalika
A few years ago, water at home was just a dream for the people of the 23rd Colony in Thanamalwila, Sri Lanka. Three tube wells provided drinking water for the entire village. Nalika, 18, and her family had to walk three kilometers to collect water from the lake. Nalika hardly had time to study and was always tired.
* * *
After a hot, dusty bus ride and long walk from the main road in the blazing sun, all Nalika can think about is a cool glass of water and a bath. The first thing she does when she reaches home after school is to head to the kitchen and gulp down a glass of water -- sometimes two.
Just a few years ago, water at home was a mere pipe dream for the people in the village known as the 23rd Colony in Thanamalwila, where Nalika lives. Located in the dry zone in the south of Sri Lanka, Thanamalwila receives little rainfall from two spells during the year.
The entire village had to depend on only three tube wells for their drinking water needs. Some families had to walk a kilometer or more to reach the nearest tube well. The other alternative was the lake, which also meant a very long walk.
Collecting water was an exhausting task that often involved all the members of the family.
“During drought, collecting water from the tube well was like a competition,” Nalika explains. “There were long queues. The water we collected was brown in color and tasted of rust.”
The little water available in the tube wells was never guaranteed.
“When there was no water in the tube wells, we had to walk almost three kilometers to the lake to collect enough water. As soon as I returned from school, I would accompany my mother to the lake. I had to go at least ten times,” Nalika says.
Carrying water in cans and pots several times a day for such a long distance was tedious and left precious little time for anything else.
“I was always so tired,” Nalika recalls. “After collecting water, I hardly had time to study before it got too dark, and then I had to study by lamplight. Sometimes I had to get up early again to collect water with my mother.”
It wasn’t just exhaustion that Nalika had to deal with. She began to notice discoloration of her teeth and even stains, which were increasing. The marks became so noticeable that they had to be removed. Nalika was told that they were caused by the water they drank.
“My mother used to get bladder infections, and sometimes when we bathe in the lake, our skin would get irritated and itch,” she says.
When World Vision commenced a drinking water project, the people of the 23rd Colony embraced it. The water distribution system was secured by installing a dug well and by building a pump house with a 30,000-liter water tank.
Today, a pipeline running 7.5 kilometers distributes water to over 600 individuals in 125 families. World Vision provided 8 million rupees (U.S.$64,000) for the infrastructure, while the community contributed 1 million rupees (U.S.$8,000). The community was involved in every stage of the project’s implementation and continues to take great interest in its maintenance.
(Photo: Niroshini Fernando/World Vision)
“We have clean drinking water in our home at all times. More than anything else, I am happy, because I have time to study and the energy to do it,” says a smiling Nalika.
Looking out of the window of her home, she adds, “The farthest I have to walk now is up to the tap in our garden.”
You can partner with us to bring many more water and sanitation success stories like this one from Nalika's community in Sri Lanka.
Make a one-time donation to World Vision's Clean Water Fund in honor of World Water Day, March 22. Your gift will support our efforts to bring greater access to safe water and sanitation around the world, using interventions like traditional and deep wells, piping systems, storage and purification equipment, hand-washing stations, and more.
Also, contact your members of Congress today. Urge them to support the Water for the World Act. This critical legislation would build upon the investments that the United States is making to improve global access to clean water and sanitation.
|
{
"pile_set_name": "Pile-CC"
}
|
It was just announced that DACA grantees will be allowed to enlist in the military, however, they must meet the MAVNI requirements. In reality very few DACA's will likely qualify. Below is the memo. Here is a link to the MAVNI requirements.
|
{
"pile_set_name": "Pile-CC"
}
|
UNITED STATES ARMY COURT OF CRIMINAL APPEALS
Before
COOK, CAMPANELLA, and HAIGHT
Appellate Military Judges
UNITED STATES, Appellee
v.
Specialist BRANDON C. BELCHER
United States Army, Appellant
ARMY 20110895
Third Army, United States Army Central
Frank D. Whitney, Military Judge
Colonel Stephanie L. Stephens, Staff Judge Advocate
For Appellant: Colonel Edye U. Moran, JA; Captain James S. Trieschmann, Jr., JA
(on brief).
For Appellee: Pursuant to A.C.C.A. Rule 15.2, no response filed.
31 July 2013
-------------------------------------
SUMMARY DISPOSITION
-------------------------------------
CAMPANELLA, Judge:
An officer panel sitting as a general court-martial convicted appellant,
contrary to his pleas, of one specification of wrongful use of heroin on divers
occasions while receiving special pay under 37 U.S.C § 310 and one specification of
wrongful distribution of heroin on one occasion while receiving special pay under 37
USC § 310, in violation of Article 112a, Uniform Code of Military Justice, 10
U.S.C. § 912a [hereinafter UCMJ]. The convening authority approved the adjudged
sentence of a bad conduct discharge, confinement for nine months, forfeiture of all
pay and allowances, and reduction to the grade of E-1. Additionally, the convening
authority deferred adjudged forfeitures until action and waived automatic forfeitures
in the amount of $1,000.00 per month for a period of six months.
This case is before this court for review pursuant to Article 66, UCMJ. After
conducting our review of the record, we are not convinced beyond a reasonable
doubt that the appellant used heroin on divers occasions. This issue merits
discussion and relief.
BELCHER—ARMY 20110895
BACKGROUND
Appellant was charged with only one specification of wrongful use of heroin
but on divers occasions, in violation of Article 112a, UCMJ. The specification
alleged:
In that [the appellant], U.S. Army, did at or near Camp Phoenix,
Afghanistan, on divers occasions, between on or about 15
November 2010 and on or about 30 December 2010, wrongfully
use Heroin, a schedule I controlled substance, while receiving
special pay under 37 U.S.C. § 310.
Appellant’s heroin use was discovered by his command after he tested
positive, while deployed, during a 100% unit urinalysis. At trial, without the benefit
of a pretrial agreement, appellant pleaded not guilty to use of heroin on divers
occasions but guilty to the use of heroin on only one occasion. Appellant further
pleaded not guilty to the distribution of heroin on divers occasions. During the
providence inquiry, appellant admitted he obtained heroin from a local national and
ingested it on 29 December 2010, at Camp Phoenix, Afghanistan. Appellant
admitted he knew the substance was heroin when he ingested it and that his use was
wrongful. He then acknowledged testing positive on the unit urinalysis conducted
the day after his heroin use.
Following appellant’s guilty plea inquiry, t he government attempted to prove
up appellant’s use of heroin on divers occasions and his distribution of heroin on
divers occasions. Appellant was tried before an officer panel on the remaining
specifications.
The government built its case upon two witnesses who testified they observed
appellant using heroin, the appellant’s positive urinalysis, and a non-commissioned
officer who testified he observed behavior by appellant which he believed to be
indicative of drug use for the approximate charged period of time in question.
First, Specialist (SPC) KS, testifying under a grant of immunity, stated he
witnessed appellant use heroin on only one occasion, that Private (PVT) LP was
present on this occassion, and that a unit urinalysis was conducted the following
day.
On cross-examination, defense counsel questioned SPC KS regarding how
many times he actually observed the appellant use heroin. SPC KS’s testimony was
consistent in that he stated he witnessed the appellant use heroin on only one
occasion.
2
BELCHER—ARMY 20110895
The government then called PVT LP. Private LP was another soldier in
appellant’s unit. Private LP testified under a grant of immunity, and with the benefit
of a pretrial agreement. Private LP specifically testified that over a two to four hour
period, while SPC KS was present, he witnessed the a ppellant use heroin two to four
times. He also testified that a unit urinalysis was conducted within the next twenty-
four to forty-eight hours after this occasion. He further testified that he only
witnessed the appellant use heroin on that one occasion during the two to four hour
period.
As to the testing of the urine sample, the government called Major (MAJ) DS,
commander of the Forensic Toxicology Drug Testing Laboratory at Tripler Army
Medical Center. On direct-examination, the government questioned MAJ DS on the
scientific background of the drug testing procedures. D efense counsel then cross-
examined MAJ DS as follows:
DC: . . . all of that data you just testified to, you
cannot say that [the appellant] ingested on more
than one occasion, correct?
MAJ DS: No.
DC: You cannot say that, correct?
MAJ DS: I cannot.
During its case in rebuttal, the government called Sergeant (SGT) JJ in an
apparent attempt to establish that the appellant used heroin on multiple dates within
the charged time bracket. As a basis for his testimony, SGT JJ testified that he took
courses “like DARE,” (an apparent reference to “Drug Abuse Resistance Education”)
college courses in psychology, and drug prevention classes provided by the Army,
as well as his experiences witnessing his father after he used [unspecified] drugs.
Based on SGT JJ’s experience and his observation of the appellant’s behavior, SGT
JJ testified he believed appellant was under the influence of drugs for a period of
approximately three weeks. He based his opinion on appellant’s bloodshot eyes,
pale complexion, a change in demeanor, seeing him vomit, and appellant’s declining
duty performance. The government neither offered nor established SGT JJ as an
expert witness.
Ultimately, the panel found the appellant guilty of heroin use on divers
occasions between on or about 15 November 2010 and 30 December 2010 and
distribution of heroin on or about 29 December 2010.
3
BELCHER—ARMY 20110895
LAW AND DISCUSSION
Having reviewed the evidence in the record, we are not convinced beyond a
reasonable doubt of appellant’s guilt as to specification 1 of Charge 1, as it relates
to “divers occasions.” We find, however, the evidence does sufficiently supports,
both legally and factually, a finding that the appellant used heroin on one occasion,
on or about 29 December 2010.
Under Article 66(c), UCMJ, 10 U.S.C. § 866(c), we will approve only those
findings of guilt we determine to be correct in both law and fact. The test for legal
sufficiency is whether, when the evidence is viewed in the light most favorable to
the government, any rational fact finder co uld have found the essential elements of
the crime beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 319
(1979). The test for factual sufficiency is whether, after weighing the evidence and
making allowances for not having observed the witnesses, we ourselves are
convinced of the appellant's guilt beyond a reasonable dou bt. United States v.
Turner, 25 M.J. 324, 325 (C.M.A. 1987). We apply the latter test in the present case.
The evidence elicited from SPC KS and PVT LP indicates they both witnessed
appellant use heroin on the same day. Each testified the other was present during
the time frame they witnessed appellant use heroin. Each said they only saw the
appellant use heroin on one occasion. Each said the urinalysis was conducted within
the next day or two after witnessing appellant’s heroin use. The positive urinalysis
corroborates the date appellant and PVT LP used heroin, in that both tests were
positive for heroin. Additionally, the government’s laboratory expert could not
confirm more than one use of heroin by appellant.
The government attempted to establish “divers occasions” by eliciting from
PVT LP that he witnessed appellant use heroin between two to four times over an
approximately two to four hour period. Private LP described a series of acts or
occurrences which constituted a single course of criminal conduct. We find,
therefore, that the appellant’s multiple ingestions of the same drug from the same
original supply over a period of hours at the same location on the same date, were
but one criminal act.
The only other evidence that appellant used heroin on more than one
occasion during the three week period charged was SGT JJ’s lay testimony that the
appellant appeared to be on drugs for approximately a three week period. We find
this evidence insufficient to prove appellant used heroin on more than one occasi on.
Therefore, we find the evidence factually insufficient to find appellant guilty
of using heroin on divers occasions and will take appropriate action in our decretal
paragraph. We find, however, the evidence to be both legally and factually
4
BELCHER—ARMY 20110895
sufficient to support the finding of guilty as to appellant’s use of heroin on one
occasion.
CONCLUSION
On consideration of the entire record, we approve and affirm only so much of
Specification 1 of The Charge as finds appellant did at or near Camp Phoenix,
Afghanistan, on 29 December 2010, wrongfully use heroin, a Schedule I controlled
substance, while receiving special pay under 37 U.S.C. § 310.
The remaining findings of Guilty are AFFIRMED. Reassessing the sentence
on the basis of the factual insufficienc y noted, the entire record, and in accordance
with the principles of United States v. Sales, 22 M.J. 305 (C.M.A. 1986) and United
States v. Moffeit, 63 M.J. 40 (C.A.A.F. 2006), to include the factors identified by
Judge Baker in his concurring opinion in Moffeit, the sentence is AFFIRMED. All
rights, privileges, and property, of which appellant has been deprived by virtue of
that portion of the findings set aside by this decis ion, are ordered restored. See
UCMJ art. 75(a).
Senior Judge COOK and Judge HAIGHT concur.
FOR THE COURT:
ANTHONY O. POTTINGER
ANTHONY O. POTTINGER
Chief Deputy Clerk
Chief Deputy Clerk of Court
of Court
5
|
{
"pile_set_name": "FreeLaw"
}
|
When using radar level gauging to determine the level of certain products, in particular products which are relatively transparent to microwaves, such as liquid gases, the bottom of the tank, which may be of a highly reflective material such as metal, may cause a relatively strong reflection, interfering with the surface reflection. In some situations, e.g. when the product surface is close to the bottom, this bottom reflection can make it difficult to determine the product level correctly.
A solution to this problem is presented in WO01/29523, disclosing an absorbing element to be arranged at the bottom of the tank, below the opening of a pipe used as a wave guide. Such a pipe is sometimes used to avoid reflection of the waves in structures present in the tank. The pipe also serves to provide an area of the product surface with less wave motion and turbulence, thus improving the quality of the surface reflection. Such pipe wave guides are used in various implementations where the surface reflection from the product is weak, e.g. in tanks containing liquid gases. The damping element disclosed in WO 01/29523 will serve to reduce or even eliminate any reflection in the bottom of the tank.
However, in some situations, it may be advantageous to acquire a reflection from a known position in the tank, e.g. to verify the RLG system. It may thus be undesirable to completely eliminate the bottom reflection.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Congressman Jim Jordan is on fire!
The House Judiciary Committee held its first impeachment hearing on Wednesday at it was a total bust.
Pamela Karlan, one of the witnesses the Dems rolled out is an angry Hillary Clinton donor who was on Crooked’s list for a potential Supreme Court nomination.
Karlan is an old bitter dowdy woman who hates children. She attacked Trump’s 13-year-old son Barron during an exchange with Democrat Congresswoman Sheila Jackson Lee.
TRENDING: BREAKING: Multiple Injuries After Car Plows Through Crowd of Trump Supporters in Yorba Linda, California (VIDEO)
GOP Rep. Jim Jordan (R-OH) came out swinging Wednesday evening and took Pamela Karlan to school.
Jordan schooled Pam Karlan on President Trump’s phone call to Ukrainian President Volodymyr Zelensky and called her out for her hypocrisy on ignoring “context” of Trump’s call.
“Context matters, doesn’t it?” Jim Jordan asked Pam Karlan as he began an epic tirade schooling the angry Dem professor.
WATCH:
|
{
"pile_set_name": "OpenWebText2"
}
|
Parker, Colorado, USA – January 3, 2012: Stellacore Corporation, the creator of OrthoVista
®, today announced that it will re-engage in development, sale and support of OrthoVista
® since the exclusive marketing and development relationship it had with Trimble has now ended.
OrthoVista
® has been the standard mosaicking application throughout the photogrammetric mapping and remote sensing industry since its creation by Stellacore in 1997. OrthoVista
® improves the quality, utility and value of digital orthophoto products by automation of the color correction and mosaic stitching process. Stellacore is re-engaging directly in active product development to provide a next generation OrthoVista
® with entirely overhauled high-performance throughput capabilities.
“The foundation of OrthoVista
® we created in the 90s has stood the test of time and we see this new development as an exciting opportunity to evolve this essential product and adapt it to the ever increasing data volumes associated with 21st century sensor technologies.”, said Dave Knopp, President and founder of Stellacore Corporation. “The architecture of OrthoVista
® was quite good for the time but now we are looking to boost the performance by the orders of magnitude required to keep up with new sensor systems”, said Brian Olsen, VP of Technology at Stellacore.
“In 2012, Trimble’s Geospatial division will continue marketing OrthoVista
® but it will be a different product than the revised and enhanced version of the next generation of OrthoVista
® from Stellacore Corporation”, said Joe Bima, Managing Director of Stellacore. “Our goal is to enhance the profitability of today’s production operations; we will apply our customer and market centric approach that spawned the original OrthoVista
® in the 90s to enhance its value to today’s demanding market”.
Stellacore Corporation provides professional software products and consulting services addressing a variety of system technologies including aerial (vertical and oblique), ground, and hand-held non-contact sensing applications with a focus on integration, calibration, and processing for optical, laser, inertial and positioning sensing systems. A variety of software products, specialized in-house software components and consulting services are available for use on your imaging and LiDAR projects. Find out more at
www.stellacore.com.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Audio won't play in iOS Cordova Phonegap app
I am creating a cross platform Cordova Phonegap soundboard app. Everything works fine on the android version but on the iOS version the sound refuses to play. I use SoundJS and PreloadJS to load and play the audio. I used the Phonegap remote debugging server and found out that iOS recognizes the audio as something called "application/octet stream" (see pictures).
Everything is fine on Android
Android
But I get this on iOS
iOS
I load the audio like this:
var sound3= "sound3";
createjs.Sound.registerSound("audio/anybody.mp3", sound3);
$(function(){
$( "#sound3" ).bind( "tap", tapHandler )
function tapHandler( event ){
sound3.play();
}
});
Can somebody help me out?
A:
I had a similar issue on one of my Cordova projects.
First possible reason:
This appears because of different browsers(web views) can play just some specific types. You need to have sound in different formats, such as mp3 or ogg and before playing sound you need to detect maintained format. Look at this documentation Audio canPlayType and make checks before playing
Second possible reason :
File system issues. iOS resources path is not equal to Android resources path and before sound initialization you need to build a platform-specific path to your local resources
And also try to play native browser audio instead of using createjs, like this:
var sound3 = document.createElement('audio');
sound3.src = "audio/anybody.mp3";
function tapHandler( event ){
sound3.play();
}
$(function(){
$( "#sound3" ).bind( "tap", tapHandler )
});
|
{
"pile_set_name": "StackExchange"
}
|
Psychiatric manifestations of neurosyphilis.
To investigate referral patterns, initial diagnoses and clinical features of patients with neurosyphilis who present with psychiatric manifestations, records were kept of 21 such patients admitted to an acute psychiatric ward. In none of the 12 cases referred from primary care workers was the possibility of neurosyphilis considered. In only 3 cases was this diagnosis considered on admission to the psychiatric ward before serum serological test results were known. Commonest presenting symptoms were personality change (16 patients) and memory impairment (13 patients). Neurological signs or symptoms were also common, particularly absent pupillary reaction to light (5 patients) and buccolingual masticatory movements (5 patients). A positive serological test remains the single most important factor in identifying patients with neurosyphilis.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How valid is lying to players about the rolls they are making in The Dresden Files?
In last weeks Dresden Files game, the players followed the bad guy using a tracking spell, and found him in the projects at an apartment that they knew little about. Seeing his car, they decided to set it aflame to get him out of the apartment (and to identify it).
The wizard's spell was a bit too ambitious, and ended up turning it into a roman candle (how I love compels), but the actual plan was successful, as the bad guy came running out to see about his car, and the wizard was barely able to get out of sight before he exited the apartment. As the bad guy was dealing with his vehicle, the group snuck into the vacated apartment. They found that there was still someone there, lounging on the sofa, obviously having partaken of some 'herbal entertainment'. As they entered, I had them make an alertness roll, ostensibly to see something in the apartment- but it was actually an empathy roll, to determine if they saw through the person's deceit. He was high, but was still quite lucid, and was the actual threat.
My question is, how valid is deceiving the players about what they are rolling for in order to maintain a layer of the unknown in the game?
(Just for completeness, I'll state that the players are still unaware that the person that they fought was just a messenger/dealer/mercenary and that the doped up stoner was playing them...)
UPDATE: Though the question could apply to multiple circumstances, the accepted answer brings up a FATE specific point, so I changed the tags and update the question appropriately.
A:
I would say this is bad practice. You've just had the players roll alertness when they should be rolling empathy. Say one of your characters has Empathy as a Superb skill. They get a huge bonus on the roll. Say they also have only an Average Alertness. You've just denied them a +4 on that roll and they don't even know it! (If they find out they will be rightly angry.)
If you want to test a skill without the players knowing you can always roll for them in secret. That way they have no idea what you are checking against merely that you are checking for something.
However in a system like FATE where players can spend FATE points to modify rolls, etc I wouldn't even do that. I'd have them roll empathy, you don't necessarily have to explain the roll but that lets them leverage their stunts, powers, and aspects as per regular play. If the players figure out what's going on but fail the rolls then their characters are still in the dark. If the players have their characters act on player knowledge you can gently remind them that their character is blissfully unaware of the problem. It can make some interesting tension in the game the same way you don't want a person to open that door in a horror movie! Roleplaying is partly about being able to separate player knowledge and character knowledge.
A:
Most answers here fail to address the player vs. character duality and the power vested in the player in FATE. FATE is quite a different system, and age old RPG tradition simply doesn't work with it. The GM is not the ultimate authority(He's even called a referee, not a master), all he does is play the rest of the world, sharing the responsibility of authority with everyone at the table.
I'd say, players should be aware that their characters are deceived. In FATE, deceit can be modeled as a maneuver by the deceiver to place an aspect on the deceived. Once a character has the aspect Unaware of the real threat on them, the player should play the character as such. The aspect can be tagged to gain a bonus against the character, or compelled to force the character into a course of action/inaction. Heck, the player can even invoke the aspect for a bonus when acting towards the false belief.
A:
Lying to them about what they're rolling is silly. It robs the players of their agency. If they're not interested in assessing the situation, they shouldn't be rolling for an assess. If they don't care if they're being lied to, then they shouldn't roll empathy.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Вывод текущего месяца, задваиваются цифры на php
Всем добрый вечер!
Нужно вывести месяц, выходные отметить красным, текущую дату обвести.
При выводе удваиваются цифры. Подскажите, в чем причина?
Заранее спасибо.
<style>
.normal:hover {
background-color: black;
color: white;
}
.weekend:hover {
background-color: red;
color: white;
}
</style>
<?php
echo "<table><tbody><tr>";
for ($i = 1; $i <= 31; $i++) {
echo '<td class="normal" style="color:black" normal:hover">'.$i."</td>";
if ($i == 7 || $i == 14 || $i == 21 || $i == 28) {
echo '<td class="weekend" style="color:red">'.($i-1)."</td>";
echo '<td class="weekend" style="color:red">'.$i."</td>";
echo "</tr>";
}
if ($i == date(j)) {
echo '<td style="border:1px solid blue">'.$i."</td>";
}
}
echo "</tbody></table>";
?>
A:
Как можно делать календарь и не использовать DateTime?
<style>
.month {
width: 350px;
display: block;
}
.month .day {
display: inline-block;
width: 50px;
border: #0000ff 1px solid;
padding: 5px;
color: #1a4580;
}
.month .day.today {
color: white !important;
background-color: green !important;
font-weight: bold;
}
.month .day.invis {
border: none;
}
.month .day.weekend {
color: red;
border: red 1px solid;
}
</style>
<div class="month">
<?php
$dt = new \DateTimeImmutable();
$day = \DateTimeImmutable::createFromFormat('d.m.Y', '01.' . $dt->format('m.Y'));
$dayOfWeek = 1;
while ($dayOfWeek < $day->format('N')) {
?><div class="day invis <?=($day->format('N') > 5 ? 'weekend' : '');?>"></div><?
$dayOfWeek++;
}
while ($day->format('m') == $dt->format('m')) {
?><div class="day <?=($day->format('N') > 5 ? 'weekend' : '');?><?=($day->format('d') == $dt->format('d') ? ' today' : '');?>"><?=$day->format('d');?></div><?
$day = $day->add(new DateInterval('P1D'));
}
?>
</div>
|
{
"pile_set_name": "StackExchange"
}
|
Essentially confessing to mass murder and multiple other crimes, retired Gen. Michael Hayden, the former boss of both the NSA and the CIA, admitted that the Obama administration has been murdering people around the world based solely on the so-called metadata collected by U.S. intelligence agencies. The controversial insider’s remarks confirmed growing fears and warnings by critics of the out-of-control federal government that, despite efforts to downplay its unconstitutional spying and assassination programs, Americans have much to be concerned about.
Hayden, a retired general and operative for the globalist Council on Foreign Relations, led the National Security Agency starting under the Clinton administration until 2005 — the same NSA that whistleblower Edward Snowden had recently exposed lawlessly spying on Americans in violation of federal law and the U.S. Constitution. Before taking over in 2006 at the Central Intelligence Agency — the outfit that has carried out much of the federal mass-murder via drone program — Hayden oversaw the massive expansion of NSA’s targeting of Americans.
While credible analysts and critics widely suspect federal officials are still hiding the truth, proponents of the illegal NSA espionage schemes tried to downplay its actions as the “mere” collection of metadata, rather than the actual content of calls and e-mails. Thanks to Hayden’s remarks last month at Johns Hopkins University’s Foreign Affairs Symposium, though, Americans can begin to understand the enormity of the danger — even in the unlikely event that authorities are telling the truth about how far the assaults on constitutionally protected privacy rights actually extend.
“We kill people based on metadata,” Hayden admitted. The startling confession, which has sparked headlines around the world, came after Hayden agreed with another participant at the symposium that metadata can reveal “everything” about a surveillance target. The other participant, Georgetown University Law Center professor David Cole, had quoted NSA General Counsel Stewart Baker as saying, “Metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.”
Hayden agreed, calling the description on the usefulness of metadata “absolutely correct.” Elements of the NSA’s Orwellian, Fourth Amendment-shredding espionage regime targeting hundreds of millions of Americans officially came to light after former contractor Snowden leaked documents about it. The revelations sparked a massive public outcry, which officials tried to downplay by claiming that the only information being collected on Americans without warrants or even probable cause was metadata. That collected data, though, includes details such as who is communicating, when, where, for how long, with whom, and more.
Of course, it is now public knowledge that the Obama administration has murdered thousands of people around the world including women, children, and even an American teenager, using its drones and missiles. In fact, the White House even claims to believe it has the legal authority to murder its victims despite never charging or prosecuting them for a crime — much less securing a conviction in a court of law. Immediately following the shocking admission and a brief pause, though, Hayden tried to suggest that the mass-murder program relying on metadata does not apply domestically.
“But that’s not what we do with this metadata,” the former CIA and NSA boss said after pausing for a moment, perhaps realizing the gravity of the admission he had just made. “It’s really important to understand the program in its entirety, not the potentiality of the program, but how the program is actually conducted.” In other words, after admitting that the federal government murders people based on metadata — can you imagine if Putin admitted doing that? — Hayden quickly tried to claim that the information collected on Americans is not used for that purpose. At least not yet.
It was not clear whether such data played a role in Obama’s selection of the multiple Americans, including a 16-year-old boy in Yemen looking for his father, murdered by drone thus far. At the event, the ex-CIA and -NSA boss then continued trying to soothe public fears over the awesome powers usurped by the federal government.
According to Hayden’s version, the NSA has been obtaining phone records from companies since October of 2001. Much of the unconstitutional snooping regime has been justified under the misnamed “Patriot” Act. The NSA then “puts them in a lockbox” that is supposedly “under very strict limitations” in terms of access. Hayden then gave a hypothetical example of how a phone number connected to a supposed “terrorist” could be checked with lawlessly collected metadata to supposedly advance “national security.”
“What it cannot do are all those things that ... allows someone to create your social network, your social interactions, your patterns of behavior,” Hayden continued after dropping the bombshell confession. “One could make the argument that could be useful, [or] that could be illegal, but it’s not done. In this debate, it’s important to distinguish what might be done with what is being done.” With NSA bosses having been exposed lying even to lawmakers under oath, however, analysts say taking them at their word would be foolish at best.
Of course, the cat Hayden let out of the bag on metadata being used to select murder targets was not entirely a surprise to analysts who have been closely following developments in the growing cloud of scandal surrounding the NSA. In February, journalists Glen Greenwald and Jeremy Scahill, citing Snowden’s leaks and comments by U.S. officials, had reported essentially the same thing: that metadata collected by the NSA is used to pick targets for extermination. Numerous innocent people have “absolutely” been killed under the program, according to a former drone operator quoted in their Intercept report.
In reality, since no trials were ever conducted and all people are supposed to be innocent until proven guilty, critics say all of the victims thus far have been innocent — at least as far as the law is concerned. Estimates suggest thousands of people from Pakistan and Yemen to Afghanistan and Somalia — many of them simply in the wrong place at the wrong time, known as “collateral damage” — have been murdered by drones so far. Obama personally approves each assassination, the Nobel Peace Prize recipient confessed publicly.
Despite officials hiding behind the half-baked veneer of the terror war, the details and admissions offered by Hayden should be extremely alarming to everyday Americans. Indeed, in recent years, the federal government has produced official documents claiming that essentially anyone with an opinion it disagrees with may be a potential “terrorist.” That includes pro-life activists, liberty lovers, constitutionalists, libertarians, conservatives, Christians, environmentalists, states’ rights proponents, advocates for national sovereignty, veterans, Orthodox Jews, and more.
While the NSA lawlessly gathers the data, the CIA has been leading much of the assassination program. As The New American reported in 2011, the agency’s mass-murder-via-drone program accelerated quickly under the Obama administration as victims from Africa to Asia were executed by missiles dropped from the sky. Even Americans are fair game, the administration claims. The developments were so extreme that a former senior intelligence official told the Washington Post that the CIA had been turned into “one hell of a killing machine.” Critics said that in addition to a brazen violation of the U.S. Constitution, the global murder programs may constitute war crimes as well.
In his May 10 report about the symposium and Hayden’s admission there, Georgetown University’s Cole noted that lawmakers on both sides of the aisle have come together to rein in some of the worst NSA abuses uncovered thus far. The effort, which would put a few tepid restrictions on the NSA’s ability to continue violating Americans’ rights, is known as the “USA Freedom Act.” However, he added in the New York Review of Books, much more needs to be done to properly deal with the issue. “The biggest mistake any of us could make would be to conclude that this bill solves the problem,” Cole said.
Photo of Michael Hayden: National Security Law Journal
Alex Newman is a correspondent for The New American, covering economics, education, politics, and more. He can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it. . Follow him on Twitter @ALEXNEWMAN_JOU.
Related articles:
CIA Has Become “One Hell of a Killing Machine,” Official Says
Justice Dept. Memo Argues Killing Americans Overseas is Justified
Federal Court: Drone Killing of U.S. Citizens Is Constitutional
NSA Spy Center Melting Down, Burning Up Taxpayer Money
Dozens of U.S. Citizens May Be on Obama Assassination List
The New Age of Surveillance
Suspicions Growing Over Death of Journalist Probing NSA and CIA Abuses
Snowden Says NSA Targets Journalists Critical of Government
U.S. Phone Snooping Goes Way Beyond “National Security”
Do You Fit the Terrorist Profile?
|
{
"pile_set_name": "OpenWebText2"
}
|
The A$AP mob catch up with GBE’s Fredo Santana in Chicago and J Scott with a technical difficulty situation just minutes before they hit the stage. Sometimes it’s good to witness when things don’t go all as planned, so you see for yourself that there are ways to work around these “problems” (aka solutions). Truthfully that’s the ONLY reason this clip is even up here cuz I never heard of Fredo in my life…lol!
|
{
"pile_set_name": "Pile-CC"
}
|
Background {#Sec1}
==========
The global travel and tourism industry has expanded rapidly in recent years. The global number of international tourist arrivals increased from approximately 541 million in 1995 to 1161 million in 2014 \[[@CR1]\]. The ever greater numbers present enormous challenges to the entire global community for epidemic preparedness and control. The increasing complexity of frequent international travel opens an ideal route for local outbreaks of infectious disease to becoming global pandemics.
The health and wellbeing of travellers warrants appropriate consultation and treatment in its own right, but in the case of infectious diseases of major public health concern, it is important to address the public health aspects of their illness as patients are also disease carriers promoting the spread of infectious disease on a potentially global scale. The International Health Regulations (IHR) (2005) form one of the few legally binding instruments of the World Health Organisation (WHO). The purpose and the scope of IHR (2005) are "to prevent, protect against, control and provide a public health response to the international spread of disease in ways that are commensurate with and restricted to public health risks, and which avoid unnecessary interference with international traffic and trade" \[[@CR2]\].
Most of the existing research in travel medicine and the current guidelines for international health authorities emphasise the role of the air-travel industry in tracking and thus containing the potential international spread of infectious disease. For instance, the WHO guideline on International Travel and Health highlights the role of airlines as well as shipping companies, together with that of tour operators and travel agents in limiting the spread of infectious disease across borders \[[@CR3]\]. Similarly, the Centres for Disease Control and Prevention (CDC) guidelines focus on the airline and cruise industries \[[@CR4]\]. The role of the other important sector in tourism, namely the hotel industry, have been less clearly defined and discussed.
This case study will use the example of the Metropole Hotel in Hong Kong in the international spread of Severe Acute Respiratory Syndrome (SARS) in 2003, and the effect of the government mandated quarantine of the Metropark Hotel during the swine flu 2009 in Hong Kong.
SARS was caused by the SARS-associated coronavirus, with the primary mode of transmission being direct mucous membrane contact with infectious respiratory droplets \[[@CR5], [@CR6]\]. It had a basic reproduction number of approximately 3, and the spread was mainly to those with close contact in health care and household settings. The first cases were identified in Guangdong province of China in November 2002, and a number of natural reservoirs have been found including civet cats and bats. Incubation period ranged from 3 to 10 days \[[@CR7]\]. The overall case fatality ratio was 9.6% worldwide, with deaths resulting from pneumonia and subsequent respiratory failure. The travel industry contributed to the speed of the spread of this unknown disease at that time, particularly within the Metropole Hotel as it was the first site for global dissemination of the virus \[[@CR8]\]. SARS subsequently caused 774 deaths in 26 countries, with the disease spreading to cover five continents \[[@CR7]\]. This case vividly illustrates how a local outbreak can rapidly evolve into a global pandemic.
The H1N1 swine flu pandemic in 2009 was caused by the A(H1N1) pdm09 influenza virus \[[@CR9]\]. This strain containing genes from pig, bird and human influenza viruses has never been reported before 2009, and the outbreak was first identified in March 2009 in Mexico and the United States. It was estimated that between 151,700 and 575,400 deaths resulted globally, with 80% in people younger than 65 years old from respiratory and cardiovascular influenza related complications. The 2009 H1N1 virus infection mortality was estimated to be 0.001--0.011% of the world's population, much lower than the previous 0.03% during the 1968 pandemic and the 1--3% of the 1918 pandemic \[[@CR10]\]. The first imported case in Hong Kong was tested positive for swine influenza on the 1 May 2009 \[[@CR11]\]. This has led to the subsequent quarantine of all guests and staff at the Metropark Hotel for 1 week.
Hotels can be a critical component in the evolution of a local outbreak into a global pandemic, and an initial contact point of the import of an impending global pandemic. The aim of this paper is to highlight the role of hotel in the spread of epidemic, and discuss control measures that can be implemented.
Methods {#Sec2}
=======
This case study focuses on the epidemic outbreaks of SARS in 2003 and H1N1 swine flu in 2009 in Hong Kong. Secondary information was extracted from the literature search and the grey literature looking for published official reports, statements, policy papers, field reports and guidelines for further discussion on the role of the hotel industry on the epidemics. Public health principles of disaster response were used to provide the backbone for discussion.
MEDLINE was used to identify research articles published between 1 January 2000 and 31 December 2017 in the English language, to answer these specific questions: 1. what factors in the hotel setting contributed to international spread of SARS; 2. the decision making and implementation of hotel quarantine during swine flu, and the impact of the hotel quarantine.
Any study design regarding aspects on timelines of sequence of events, environmental sampling and contamination, evaluation of hotel related interventions, modelling of interventions were included. Studies not meeting the above inclusion criteria or answering the research questions was excluded.
The search for grey literature involved the searching and browsing the websites of relevant organisations including the World Health Organisation, US CDC, EU European Centre for Disease Prevention and Control, Hong Kong Centre for Health Protection and Department of Health, Food and Health Bureau of Hong Kong SAR government, SARS expert committee, Hong Kong Government information page.
MEDLINE (Ovid SP) search was performed using these terms: (Disease outbreaks \[mesh\] OR Epidemics \[mesh\] OR Pandemics \[mesh\] OR Severe Acute Respiratory Syndrome \[mesh\] OR Influenza A Virus, H1N1 Subtype \[mesh\]) AND Hotel \[keyword\].
Results {#Sec3}
=======
The search identified 34 records from MEDLINE of which five were relevant (references \[[@CR6], [@CR12]--[@CR15]\]), and an additional 13 records were identified through other sources and the grey literature.
SARS 2003 {#Sec4}
---------
A medical professor from Guangzhou in China arrived in Hong Kong on 21 February 2003 and checked into a room on the ninth floor of the Metropole Hotel in Kowloon \[[@CR16]\]. During his stay, he infected at least seven other guests and visitors staying on the ninth floor of the hotel including three visitors from Singapore, one visitor from Vietnam, two visitors from Canada and a local individual \[[@CR17]\].
On 8 March 2003, the Singapore Ministry of Health reported to the Hong Kong Department of Health that three patients who presented with pneumonia were admitted to hospital after returning to Singapore from Hong Kong. They had all stayed in the Metropole Hotel. During the conversation, laboratory investigations were pending and there was not sufficient evidence to suggest that their illnesses had been related to the Metropole Hotel \[[@CR16]\].
On 12 March 2003, the WHO issued a global alert about unusual cases of an acute respiratory syndrome. On 14 March 2003, the index case for the significant outbreak at the Prince of Wales Hospital was identified. It was not until 19 March 2003, after multiple enquiries, the patient revealed that he had visited the Metropole Hotel around that period as a visitor but not a guest \[[@CR16]\]. On the same day, the Hong Kong Department of Health reported the chain of transmission of the outbreak at the Metropole Hotel \[[@CR16]\].
The Metropole Hotel exemplified the potential international spread of infectious diseases. The index cases in the Hong Kong, Toronto, Singapore and Hanoi outbreaks were all associated with the hotel. SARS patients in Ireland and United States had also visited the Metropole Hotel around the same time when there were other sick guests present in the hotel \[[@CR12]--[@CR14], [@CR18]\]. Subsequently there were hospital outbreaks when these index cases returned and were treated at their home countries. Table [1](#Tab1){ref-type="table"} showed the timeline of the 2003 SARS action of the Department of Health.Table 1Hong Kong Health Authority's action to hotel industry during SARS 2003DateAction by the Health Authority21 February 2003A medical professor from Guangzhou in China arrived in Hong Kong and checked into a room on the ninth floor of the Metropole Hotel in Kowloon. He was later found to be the source of SARS outbreak in Hotel M and beyond.14 March 2003The Secretary for Health, Welfare and Food sets up and chairs the 1st meeting of Task Force on SARS.19 March 2003Department of Health (DH) announced the chain of transmission of at least 7 SARS cases were related to the Hotel M, the index case of the epidemic in Hong Kong.19 and 20 March 2003DH's Kowloon Regional Office conducted site investigation at Hotel M. DH ensured hotel management conducted proper cleansing and disinfection.22 March 2003DH inspected hotel environment inspected and found satisfactory and informed hotel management that they could resume business on 9/F.28 May and 6 June 2003DH met with tourism and hotel industries, Tourism Commission and Tourism Board on health awareness programme for visitors.Note: Materials extracted from references \[[@CR16], [@CR35]\]
Little was known about the new disease SARS when the outbreak began at hotel and hospitals in February and early March. The WHO did not issue its first emergency travel advisory naming the illness as SARS until 15 March 2003 \[[@CR16]\]. There was local media coverage of an outbreak of atypical pneumonia in Guangzhou on 10 February 2003, and the health authority in Hong Kong had made contact with the Guangzhou and Guangdong authorities. However, accurate information about the atypical pneumonia outbreak in Guangdong Province was not available to Hong Kong or the international community at the time. Case investigation and contact tracing conducted by the Department of Health on 24 February 2003 on the index case revealed that the Guangzhou professor and his wife had stayed at the Metropole Hotel. However, no contact tracing was conducted in the hotel at that stage since the Department of Health had not received any other reports of severe community-acquired pneumonia related to the hotel \[[@CR16]\]. There were no environmental factors or triggers identified that warranted further action. However, environmental sampling on the carpet outside the room in which the index case resided, and elevator area showed a hot zone which tested positive for the SARS virus by polymerase chain reaction (PCR) 3 months after the index case stayed at the hotel \[[@CR19]\]. Another study investigating German guests staying at the hotel also suggested the possibility of environmental contamination as a source of infection \[[@CR15]\]. It is not known how long the infectious virus persists in the surroundings of a SARS patient. The established practice was for contact tracing to be conducted on close contacts (friends or family), but not on the basis of a shared location \[[@CR16]\].
A number of researchers estimated the basic reproduction number of SARS by fitting models to the initial growth of the epidemics in a number of countries \[[@CR19]\]. Modelling of SARS epidemiology in Hong Kong and China showed rapid public health measures such as contact tracing for confirmed and suspected cases, and quarantining, monitoring, and restricting the travel of contacts had an effective reduction in reproduction number \[[@CR20]--[@CR23]\].
Swine flu 2009 {#Sec5}
--------------
A 25-year-old male from Mexico arrived in Hong Kong on 30 April 2009, and stayed at the Metropark Hotel. He attended hospital on the same evening where he was admitted to an isolation ward. He subsequently developed a fever and was confirmed to have swine flu on 1 May 2009 \[[@CR11]\].
The Hong Kong Special Administrative Region (HKSAR) government raised the response level to 'Emergency' on the same day under the *Emergency Preparedness Plan for Influenza Pandemic*. An 'Emergency Response Level Steering Committee on Human Swine Influenza (Flu A H1N1) Pandemic' was also established on the 1st May to formulate the overall disease control strategy \[[@CR11]\].
Under the *Prevention and Control of Disease Ordinance*, the Director of Health ordered that all guests and staff at the Metropark Hotel should be quarantined on the evening of 1 May 2009 \[[@CR11]\]. The quarantine was led by the Department of Health in collaboration with other government departments. Quarantined persons were provided with oseltamivir (Tamiflu) and other medical treatment. The Social Welfare Department provided daily necessities and emotional support to the quarantined. A help desk was set up at the hotel involving the Department of Health, the Home Affairs Department, the Social Welfare Department, the Immigration Department, the Civil Aid Service, the Auxiliary Medical Service and the Police.
The quarantine ended 1 week later, which covered the incubation period of influenza of 1 to 7 days. For those persons who had completed the quarantine period without showing symptoms of being infected, they were issued with Certificates of Conclusion of Quarantine.
At the same time, the Centre for Health Protection (CHP), other government departments and relevant agencies conducted contact tracing starting on the 1st May 2019. Close and selected social contacts were prescribed chemoprophylaxis and put under medical surveillance. The hotel and nearby streets, as well as other public places, were cleansed and disinfected. Hygiene guidelines had been issued to all licensed hotels/guesthouses and rented rooms to encourage enhanced cleansing and improvement of hygiene. All industrial associations had been informed of the situation and reminded the need to take precautionary measures. The Occupational Safety and Health Council had organised public seminars to raise public awareness of preparedness for influenza in the workplace \[[@CR11]\]. Table [2](#Tab2){ref-type="table"} showed the timeline of the 2009 swine flu action of the Department of Health.Table 2Hong Kong Health Authority's action to hotel industry during Swine flu 2009DateAction by the Health Authority30 April 2009A 25-year-old male from Mexico (index patient) arrived in Hong Kong and stayed at the Metropark Hotel.1 to 7 May 2009The Director of Health ordered that the Metropark Hotel should be isolated. All guests and staff were quarantined. Quarantined persons were provided with oseltamivir (Tamiflu) and other medical treatment.1 May 2009Department of Health conducted contact tracing in the disease containment phase1 May 2009Cleansing and disinfection of the hotel lobby and common areas as well as bathrooms in individual guest rooms have been arranged by Food and Environmental Hygiene Department (FEHD).Early May 2009The Metropark Hotel as well as 8 other hotels/hostels in which passengers of flight MU505 (flight of the index patient) had stayed have been disinfected.Early May 2009Hygiene guidelines have been issued to all owners' corporations, owners' committee, mutual assistance committees and the Hong Kong Association of Property Management Companies, licensed hotels/guesthouses and bed space apartments to encourage enhanced cleansing and improvement of hygiene.Note: Materials taken from references \[[@CR11], [@CR36]\]
Characteristics of hotels involved {#Sec6}
----------------------------------
Both the Metropole Hotel at Kowloon (now renamed Metropark Hotel Kowloon) and the Metropark Hotel at Wan Chai (now renamed Kew Green Hotel) were four stars hotels situated at busy part of the city. Both hotels were managed by the same management group -- the China Travel Service (Holdings) Hong Kong Limited. The two hotels were no different in terms of access to public health facilities and general standard of care. The difference in the timing of public health actions by the health authority was likely contributed by experience of SARS preceding swine flu.
Government initiatives on epidemic preparedness with the hotel industry after SARS and swine flu {#Sec7}
------------------------------------------------------------------------------------------------
After the SARS outbreak in Hong Kong the health authority established the Guidelines for Hotels in Preventing Severe Acute Respiratory Syndrome (SARS) \[[@CR24]\] and Guidelines on Infection Control & Prevention in the Hotel Industry \[[@CR25]\]. The guidelines provided practical information for hotel staff members on how measures to prevent communicable diseases should be done. It offered comprehensive information on ways to implement infection control measures, in particular the maintenance of good hygiene on hotel premises \[[@CR25]\].
The CHP organised Infection Control Seminars for the Hotel Industry on a regular basis. For instance, in response to the Ebola virus outbreak in West Africa in 2014--2016, the CHP provided advice for the local hotel industry on receiving guests with a travel history or residence in an Ebola virus disease affected area. The guideline stressed the importance of enquiring about the travel history of guests and outlined procedures on handling these guests who may feel unwell. The guideline reiterated the need to keep a record of staff and residents who had stayed in the hotel, with their personal and contact details, for possible future public health actions and contact tracing \[[@CR26]\].
Ideally, hotels should be setting their own standards of hygiene measures and providing training to staff before an outbreak occurs. Further roles and responsibilities included contingency arrangement, plan of acquisition of protective equipment, disease reporting and surveillance mechanism during outbreak period \[[@CR27]\].
From our online and database internet search, however, there is little mention of collaboration between the government and the hotel industry. No documentation was found on setting up of task forces or committees, or of invitation to hotel representatives to the working group advising on infection control guidelines in Hong Kong.
Discussion {#Sec8}
==========
SARS served as the classic example of how tourism and international travel can present challenges to the global health system. The spread of the illness within a single hotel and the subsequent international air travel of the victims contributed to and accelerated the speed of the spread of SARS across the globe.
The experience from SARS in Hong Kong had a profound impact on the public health reform especially on the infectious disease surveillance and epidemic response \[[@CR16]\]. These included strengthening the surveillance and the isolation and treatment of individuals with the disease according to case definitions, the establishment of communication channels between hotel and the government system, and the development of guidelines and response plans that allows the implementation of stringent infection control measures when necessary. The establishment of contingency plans and command structures including the 'Emergency Response Level Steering Committee on Influenza Pandemic' allowed a clear structural framework and key lines of responsibility \[[@CR28]\]. However, collaboration with the private sector and the hotel industry were found to be limited and focused around infection control measures.
According to subsequently published literature, application of appropriate measures had likely reduced the number of people who were infected, requiring medical care and died during the influenza pandemic \[[@CR29]\]. It has been shown that case isolation or household quarantine could have a significant impact at reducing attack rates in the community, and chemoprophylaxis can greatly reduce disease transmission during the pandemic \[[@CR30], [@CR31]\]. However, the quarantine of guests at the Metropark Hotel in 2009 inevitably stirs up much discussion and controversy among the media and the public health community on the balance between the need to protect the public health and the need to safeguard civil liberties.
The decision of quarantine created enormous tension between the government, guests and the hotel management. The decision of the need for quarantine and the scale of the quarantine needs to be scientifically justified. The negative effects overall of such a policy on the tourism attractiveness of a destination cannot be neglected. The quarantine at the Metropark Hotel during swine flu also highlighted the extensive assistance needed for the quarantined persons, and the cooperation necessary in the possible future need for a hotel quarantine. Pre-established partnerships and coordination between the government and the hotel industry is key in epidemic preparedness and response.
Effects of epidemics on the hotel industry {#Sec9}
------------------------------------------
Studies have shown that the psychological impacts of SARS and the government restrictions on travel, had a great impact on the travel industry far beyond the region of SARS hit areas \[[@CR32]\]. For the hotel industry in Hong Kong, the number of hotel guests dropped dramatically to a level that was never experienced before \[[@CR33]\]. In order for hotels to sustain their business, the Hong Kong hotel industry adopted an industry-wide recovery effort and empathized on mutual support \[[@CR26]\]. Previous papers called for a better preparedness of the hotel industry for future crises and epidemics \[[@CR32], [@CR33]\].
Collaborations with the hotel industry to mitigate the impact of epidemics {#Sec10}
--------------------------------------------------------------------------
Hotels are often the first point of contact for tourists arriving at a host country. Hotels could provide an additional line of defence beyond entry border screening, and they could offer another layer of protection against illnesses that border screening processes may have missed, for example in the situation where travel occurs during the incubation period of an infectious disease. In view of this, the capacity of hotels in the detection of potential illness and the launching of an initial response should be fully recognised and utilised.
The WHO pandemic influenza risk management recommended involving civil society and the private business sector in pandemic preparedness planning and national committees \[[@CR34]\]. The case of hotel industry collaboration with the health sector in Hong Kong has the potential to provide a positive example of effective disaster risk reduction coordination.
Conclusions {#Sec11}
===========
The epidemic preparedness and infection control measures mounted against SARS and H1N1 swine flu demonstrated a role that needed to be filled by the hotel industry. During SARS, late recognition of the environmental contamination of hotel facilities and the failure of timely intervention on the hotel guests with close contact contributed to the spread of the disease internationally. While the appropriateness and best method of quarantine in future pandemic influenza warrants further research, the 2009 swine flu hotel quarantine exposed gaps in the partnership with hotel industry. Health authorities in Hong Kong had since provided guidelines mostly in the area of disinfection and hygiene, and focused on educating hotel workers on basic hygiene to prevent the spread of infectious diseases. The potential to establish traveller screening, timely reporting and isolation for the infected guests during epidemics could be explored. The capacity of the hotel industry in controlling infections should be recognised not only in Hong Kong but also in other parts of the world.
Not applicable.
Funding {#FPar1}
=======
No funding available for this study.
Availability of data and materials {#FPar2}
==================================
Not applicable.
Conceptualization, KH and CM; Data curation, CM and MY; Formal analysis, KH and CG; Supervision, EC and CG; Writing -- original draft, KH and CM; Writing -- review & editing, MY, EC and CG. All authors read and approved the final manuscript.
Ethics approval and consent to participate {#FPar3}
==========================================
Not applicable.
Consent for publication {#FPar4}
=======================
Not applicable.
Competing interests {#FPar5}
===================
The authors declare that they have no competing interests.
Publisher's Note {#FPar6}
================
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
|
{
"pile_set_name": "PubMed Central"
}
|
Related product reviews
Beautiful!
This lovely chandelier is the perfect balance between traditional and modern. We love the drum shape. The crystals through beautiful reflections of light on the walls, which creates a romantic ambience without being too feminine or over-the-top. It gets rave comments from guests. Low maintenance.
Round Black Chandelier Great!
I placed this over a 48" round marble dining table in the kitchen. What a fabulous look! Good quality, light weight, nice accents and an old world look with my somewhat traditional chic style was a winner! Everyone that sees it comments and asks where I got it!! A good choice at a good price-Thanks O!
Ball of light....awesome
The bulbs ARE included despite the description saying not. This was very easy to put together. You hang it then add the ribbons, a little time consuming but easy. Result is a light that can light the darkest room or dim to a candlelight glow. It is awesome! Everybody says "wow, that's cool " when they come in my house. Even my most traditional friends love this light. If you like modern contemporary, then you will love this beautiful light. Although, the lights that come with are zenon halogen, we found replacement LED dimmables online for about $40.00.
Beth
I was looking for a crystal chandelier that wasn't venetian or traditional...this particular one caught my eye. It's well made, chrome trimmed, crystals are lovely, and it is perfect for a more upscaled eclectic dining area.
bedroom light
Nice but not what I expected. It is nor really oak or wood or finished like picture. Light weight meter painted a little rough. However hanging over a traditional type bed it looks good. Very bright and reflective
Stunning lantern!
I absolutely love this lantern, and the way it looks above our dining table. It suits my traditional, with a french country twist kitchen just perfectly. Price was decent, and quality is good! I would recommend this item, and have been pleased with orders from Overstock in the past also.
Shop Overstock™ and find the best online deals on everything for your home and your family. We work every day to bring you discounts on new products across our entire store. Whether you're looking for memorable gifts or everyday essentials, you can buy them here for less.
|
{
"pile_set_name": "Pile-CC"
}
|
More good news for Bluebird Bio with CALD gene therapy
The company is competing with other pioneering firms to develop transformative gene therapies for severe genetic diseases, as well as T cell-based immunotherapies for cancer.
It has had a run of good news recently, including encouraging early stage results from its multiple myeloma candidate bb2121 at ASCO.
But gene therapy Lenti-D is one of its two most advanced candidates, and has just produced encouraging topline interim data from its Phase 2/3 Starbeam Study (ALD-102).
Lenti-D is being studiedin boys under 18 years old with CALD. The data shows that two years after receiving the gene therapy, 15 out of the 17 boys on the trial show are free of major functional disabilities (MFDs), the primary endpoint of the trial.
Also known as Lorenzo’s Oil disease, adrenoleukodystrophy (ALD) is estimated to affect one in every 21,000 male births worldwide. Cerebral adrenoleukodystrophy (CALD), is a potentially fatal form of ALD that affects the nervous system of boys, and involves a breakdown of the protective sheath of the nerve cells in the brain that are responsible for thinking and muscle control.
The current standard treatment for CALD is allogeneic hematopoietic stem cell transplant (HSCT), but complications including graft failure, graft versus host disease (GVHD) and opportunistic infections can be fatal.
The Lenti-D therapy involves genetically modifying a patient’s own stem cells to contain functional copies of the ABCD1 gene.This restores the production of the missing ALDP protein, which helps to break down the very long chain fatty acids (VLCFAs) which cause the neurodegeneration.
David Davidson
“The hope that Lenti-D may benefit boys facing such a devastating disease inspires all of us at bluebird,” said David Davidson, M.D., chief medical officer, Bluebird Bio.
“Having this proportion of the initial cohort of patients meet the primary endpoint is truly gratifying, bringing us one step closer to our goal of making Lenti-D available for patients with CALD. The two patients who did not meet the primary endpoint underscore the devastating nature of CALD, the importance of early diagnosis through newborn screening, and the challenges of the current standard of care with allogeneic hematopoietic stem cell transplant (HSCT).”
The company commented on the condition of the two patients who hadn’t responded, including Patient 2016, whose disease progressed before he could receive the new treatment. He subsequently died from complications of the allogeneic transplantation, underlining the problems with current treatment.
The Starbeam study had been expanded to treat eight additional patients at sites in Europe and the US, and the study is currently enrolling the additional patients. It says this expansion is intended to enable the first manufacture of Lenti-D in Europe, expand treatment to Europe and to bolster its overall clinical data package ahead of filing.
The company has also just announced encouraging data from its other lead candidate, LentiGlobin. Its phase 3 Northstar-2 study in transfusion-dependent β-thalassemia (TDT) and non-ββ genotypes shows that trial participants are free from transfusions, three and a half years after receiving treatment.
The firm, based in Cambridge, Mass, has also just announced announced a public offering of $350 million of common stock to help fund its R&D plans.
|
{
"pile_set_name": "Pile-CC"
}
|
The effect of improved modelling of plasma clearance in paediatric patients with expanded body spaces on estimation of the glomerular filtration rate.
The glomerular filtration rate (GFR) is used clinically to assess renal function. The most accurate estimation technique is tracer clearance where deterministic compartment pharmacokinetic models are most widely used. The aim of this study was to assess the viability of alternative pharmacokinetic models to describe tracer clearance, and in turn, measure GFR. This study was carried out on 126 clearance datasets obtained from 44 patients with large solid tumours; these were fitted to four pharmacokinetic models with superiority of model determined by Akaike Information Criteria. A fractal model was found to be superior to the best deterministic compartment model (70% of datasets, P < 0.0020) as was a gamma-distributed residence time model (93% of datasets, P < 0.0020); both models also gave greater mean weighted coefficients of determination than deterministic compartment models. These results suggest that gamma-distributed residence time and fractal models better describe tracer clearance than deterministic compartment models and therefore should allow more accurate estimation of GFR.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
(HONG KONG) Dragonair today announced the launch of a new inflight menu featuring an array of popular Chiu Chow dishes from the kitchens of renowned Hong Kong restaurant Pak Loh Chiu Chow. From today until 31 January 2016, the new menu will be available for First and Business passengers flying from Hong Kong to Beijing and Shanghai for breakfast and during refreshment time. This is the first time Dragonair passengers have been able to enjoy authentic Chiu Chow tastes in the air.
Dragonair is committed to delivering the best possible inflight services for its passengers. To enhance the dining experience on board its aircraft, the airline continues to explore new options and foster partnerships with leading restaurants and hotels in the quest to create new and exciting dishes. Pak Loh Chiu Chow has been established in Hong Kong for close to 50 years, impressing the city’s food lovers with its traditional Chiu Chow specialties. The new menu comprises some of the restaurant’s signature dishes that are well-suited for passengers looking to enjoy a light and tasty inflight meal.
Commenting on the new collaboration, Dragonair General Manager Inflight Services Brian Yuen said: “Dragonair is delighted to join hands with Pak Loh Chiu Chow to offer our passengers a range of local Chiu Chow delicacies. Chiu Chow cuisine involves a careful selection of ingredients together with sophisticated cooking techniques. Dragonair and Pak Loh Chiu Chow share the same passion for providing customers with an exceptional dining experience and we believe our passengers will relish this new inflight menu.”
The Pak Loh Chiu Chow menu for Dragonair draws on the restaurant’s secret recipes and culinary craftsmanship. One of the signature dishes, “Marinated sliced goose meat in Chiu Chow style” uses a rich and fragrant marinade made from the restaurant’s own formula that uses premium ingredients such as cinnamon, anise, liquorice, tangerine peel, amomum fruit, bay leaves and galangal.
Nostalgic tastes come courtesy of classics such as “Chiu Chow style congee” and “Chiu Chow style fish ball with rice noodles in soup”. The congee, more commonly known as “Teochew opera congee”, was often sold around opera theatres in the old days, and the Dragonair version uses a variety of seasonal ingredients including seafood, chicken and vegetables. The Pak Loh Chiu Chow fish ball noodles set is expected to be well-received by passengers as it is light yet delicious, suitable for those preferring a hot dish for breakfast or afternoon tea.
In addition to introducing the new Pak Loh Chiu Chow menu, Dragonair has also added three top-notch wines to the First Class wine list in celebration of the 30th anniversary of the airline. From now until early 2016, Dragonair First Class passengers will be offered a wider selection of wines of Grands Crus Classés en 1855, with the addition of Château La Tour Carnet, Haut-Médoc (2011), Château Gruaud Larose, Saint-Julien (2012) and Château Desmirail, Margaux (2011).
About Pak Loh Chiu Chow
Pak Loh Chiu Chow has been serving authentic Chiu Chow specialties and retaining the traditional tastes of Chiu Chow since 1967. The restaurant group has five branches across Hong Kong and Malaysia, earning customer loyalty through its commitment to providing local Chiu Chow flavours and outstanding customer service. From fish ball with rice noodles to marinated meat, Chiu Chow congee to assorted dim sum, Pak Loh Chiu Chow strives to delight diners with fresh, hand-picked ingredients and innovative recipes. The restaurant’s Executive Head Chef Hui Mei-tak has participated in various prestigious cooking competitions and won many top honours, including “2015 World Champion Chef Shanghai – 3rd place” and “Year 2014 Golden Horse Award of China Hotel – Top 100 Master Chef”.
|
{
"pile_set_name": "Pile-CC"
}
|
Wavesport Hydra core whiteout touring sea surf kayak 3 hatches
Description
Special Offer on our Hydra in stock in colour red
The wavesport Hydra is a more playful touring kayak. aimed at paddlers who are most probably doing short trips, but want to explore the coastline, which may include surfing into the beach at the end of the day. There are some innovations including the hatch in front of the cockpit which allows access into a mini pod storage, Pyranha are using same system on Fusion Mk2. Two rails built into rear take the Scotty rod holder, so you can set up two rods easily. On the Whiteout seat, the hip pad folds out to give you a bit of padding on shoulder when carrying. There is a drop down skeg which operates from a slide controller on side of front deck , similar to Perception essence. Our Opinion is that this kayak will suit a larger paddler around 13-16 stone best, it can be paddled by anyone but this is around optimum size.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
how to hide kestrel console?
I have a .net core app that I want to run in background, but I can't seem to get rid of the console window of Kestrel. Is there any way to hide it without running the app as a windows service? I've tried to remove any reference related to Logger, it didnt help.
here is my Program.Main:
var config = new ConfigurationBuilder()
.SetBasePath(Directory.GetCurrentDirectory())
.AddJsonFile("hosting.json", optional: true)
.Build();
var hostingUrl = config.GetValue<string>("HostingUrl");
if (string.IsNullOrEmpty(hostingUrl))
{
var xmlString = File.ReadAllText(Consts.WebHostBaseFolder + "\\web.config");
var confDoc = XDocument.Parse(xmlString);
hostingUrl = confDoc.Element("configuration").Element("appSettings")?.Elements("add")?.FirstOrDefault(e => e.Attribute("key").Value == "HostingUrl")?.Attribute("value")?.Value ?? "";
}
var host = new WebHostBuilder()
.UseKestrel()
.UseContentRoot(Consts.WebHostBaseFolder)
.UseStartup<Startup>()
.UseUrls(hostingUrl)
.Build();
host.Run();
Thanks
A:
the solution was using editbin.exe as described here https://github.com/AvaloniaUI/Avalonia/wiki/Hide-console-window-for-self-contained-.NET-Core-application
editbin.exe /subsystem:windows yourapp.exe
|
{
"pile_set_name": "StackExchange"
}
|
田舎暮らしを希望している都会の人の大きな誤解が、田舎は都会よりもお金がかからない、生活費が安くあがる、という思い込み。実は、田舎暮らしは、物価も、保険料も、税金も都会より高い。しかも、場所によっては、交際費が収入の3分の2もかかることもある。
風のなかに 土のにおいが もう一度 日本を見つける 私を見つける――。
女優の松たか子の詩的なナレーションで始まる人気番組「新日本風土記」。その叙情的な言葉に誘われるかのように、番組の熱心なファンでもあった夫婦が長野県東部の、とある集落に移住したのは32歳のときだった。
人口わずか1000人弱の小さな谷あいの集落に移り住んだ直後、道ですれ違った老婆は開口一番、夫婦のあいさつを手で遮ったかと思うと、宣告せんばかりにこう告げた。
「ここは言葉は荒れぇけど、その場限りだから気にすんな」
思えば、それが地獄の釜が開いた瞬間だったのかもしれない。その地で体験したのは、「言葉が荒れぇ」などでは済まされない地獄絵図さながらの体験だった。「新日本風土記」が映す地方の、僻地の、田舎のくったくのない笑顔。そんなものはどこにもなかった……。
「修学旅行の金は俺たちの税金だ」
現在、40歳を越えた高藤泰之(仮名)さん夫婦は、高校生になった長女とともに、長野県佐久市内で暮す。佐久は長野新幹線で東京に出るにも便利で、地元電気会社の営業マンとして働く高藤さんにとっては首都圏へのアクセスも悪くなかった。
就農を目指し、32歳のときに関西から移住したのは、佐久からもさらに車で小一時間ほど走る山間部の集落だった。小学生に上がったばかりの長女とともに移り住んだ高藤さんは就農支援を受けながら、それなりに地域にも溶け込み、子どももすっかり小学校になじみ……と、傍目には移住成功組と映っていた。
|
{
"pile_set_name": "OpenWebText2"
}
|
IN THE UNITED STATES COURT OF APPEALS
FOR THE FIFTH CIRCUIT United States Court of Appeals
Fifth Circuit
FILED
February 18, 2008
No. 06-41771 Charles R. Fulbruge III
Summary Calendar Clerk
UNITED STATES OF AMERICA
Plaintiff-Appellee
v.
VICTOR HUGO ALVARADO-AYALA, also known as Jose Luis Romero
Defendant-Appellant
Appeal from the United States District Court
for the Southern District of Texas
USDC No. 5:05-CR-2683-ALL
Before GARWOOD, WIENER and BARKSDALE, Circuit Judges.
PER CURIAM:*
Victor Hugo Alvarado-Ayala, an alien, pleaded guilty to violating 8 U.S.C.
§ 1326 by illegally reentering the United States after being deported. In
December 2006 the district court sentenced him to 41 months’ imprisonment,
and he now appeals. We affirm.
Alvarado-Ayala claims that the circumstances attendant to his
manslaughter conviction counsel in favor of a sentence below the guidelines
*
Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not
be published and is not precedent except under the limited circumstances set forth in 5TH CIR.
R. 47.5.4.
No. 06-41771
range. He asserts that his manslaughter conviction was, ultimately, the product
of a mistake that Oregon authorities made when they improperly prosecuted him
for murder although he was a juvenile. The ensuing murder conviction was later
reduced to first degree manslaughter as the result of a stipulation between
Alvarado-Ayala and the State of Oregon in a federal habeas proceeding.
We do not have jurisdiction to review the district court’s denial of
Alvarado-Ayala’s motion for a downward departure. United States v. Nikonova,
480 F.3d 371, 375 (5th Cir.), cert. denied, 128 S.Ct. 163 (2007). There is an
exception to this rule where the defendant points to something in the record
indicating that the district court held an erroneous belief that it lacked the
authority to depart. United States v. Valencia-Gonzales, 172 F.3d 344, 346 (5th
Cir. 1999). Based on a review of the record, we see no indication that the district
court believed that it lacked the authority to grant a downward departure. Nor
does anything in the record even suggest that the district court believed it lacked
the authority to impose a below-guideline sentence under United States v.
Booker, 543 U.S. 220 (2005). Nevertheless, a defendant, like Alvarado-Ayala,
whose motion for a downward departure has been overruled may still argue on
appeal that his sentence was unreasonable because the district court “failed
adequately to consider factors counseling in favor of a downward departure.”
Nikonova, 480 F.3d at 375.
This court reviews a sentence within a properly calculated guideline range
for reasonableness. See United States v. Mares, 402 F.3d 511, 519 (5th Cir.
2005). In reviewing for reasonableness, an appellate court “merely asks whether
the trial court abused its discretion.” Rita v. United States, 127 S.Ct. 2456, 2465
(2007). It is proper for an appellate court to rebuttably presume the
reasonableness of a district court’s sentence which reflects a proper application
of the Sentencing Guidelines. Id. at 2462-63. A district court’s sentencing
decision is entitled to great deference. Gall v. United States, 128 S.Ct. 586, 597-
2
No. 06-41771
98 (2007) (fact that appellate court might reasonably impose different sentence
is insufficient justification for reversal of district court).
Our review of the record does not reveal that the district court committed
any procedural error or failed to address or improperly balanced the sentencing
factors set forth in 18 U.S.C. § 3553(a). Moreover, when a sentence is within a
properly calculated guidelines range, this court infers that the district court
considered all of the guidelines factors. United States v. Candia, 454 F.3d 468,
473 (5th Cir. 2006). Having considered Alvarado-Ayala’s arguments, the district
court crafted a sentence at the bottom of the advisory guideline range that it
believed to be just. The district court did not abuse its discretion in doing so.
Alvarado-Ayala alternatively contends, for the first time on appeal, that
his sentence is infected with error because this court’s post-Booker jurisprudence
erroneously and unduly restricted the ability of district courts to give
nonguideline sentences. As neither this contention nor anything like it was
raised below, our review is only for plain error. There is none. It is not clear or
plain that our post-Booker jurisprudence is erroneous in this respect. Nor does
anything in the record suggest that the district court likely would have given a
lesser sentence but for some such aspect of our post-Booker jurisprudence (or
that it otherwise felt constrained to give a within guideline range sentence
despite believing that a lesser sentence would be more appropriate under 18
U.S.C. § 3553(a) apart from the guidelines). That the district court consciously
elected to sentence within the guidelines does not suffice to demonstrate
reversible error. Nor may error be predicated on the fact that this court on
appeal affords a rebuttable presumption of reasonableness to a district court’s
sentence that reflects a proper application of the guidelines, despite the fact that
it “may be correct that the presumption will encourage sentencing judges to
impose Guidelines sentences.” Rita, 127 S.Ct. at 2467.
3
No. 06-41771
Finally, light of Apprendi v. New Jersey, 530 U.S. 466 (2000), Alvarado-
Ayala challenges the constitutionality of 8 U.S.C. § 1326(b)’s treatment of prior
felony and aggravated-felony convictions as sentencing factors rather than
elements of the offense that must be found by a jury. This court has stated that
this issue is “fully foreclosed from further debate.” United States v. Pineda-
Arrellano, 492 F.3d 624, 625 (5th Cir. 2007), cert. denied, 2008 WL 59441 (Jan.
7, 2008).
AFFIRMED.
4
|
{
"pile_set_name": "FreeLaw"
}
|
Mangroves are intertidal ecosystems that have a pantropical distribution. The distributional range of species inhabiting these ecosystems is typically restricted to either the Indo-West Pacific (IWP) region or the Atlantic-East Pacific (AEP) region ([@bib12]). How this pattern of distribution formed is one of the main biogeographic questions in mangrove research. Phylogenetic studies have detected significant levels of divergence in several tree species across the IWP and AEP (*Rhizophora* L. in [@bib3] and [@bib11]; and *Hibiscus* L. in [@bib9]). However, the divergence history, at a global scale, of many other mangrove plants remains to be clarified. *Acrostichum aureum* L. (common name "mangrove fern"; Pteridaceae) is of particular interest because this species is the only mangrove plant that is distributed pantropically (i.e., in both the IWP and AEP regions). This species also differs from other mangrove plants in that it has wind-dispersed spores, while most other mangrove plants have sea-dispersed seeds, fruits, or propagules. This different dispersal system might have enabled this species to achieve its relatively wide distribution compared to other mangrove plants. To address this question, it is important to perform population genetic studies to analyze the genetic structure and demographic history of the species using highly polymorphic microsatellite markers. Therefore, we developed novel microsatellite markers for *A. aureum* using next-generation sequencing. We tested the markers on samples from across the pantropical distribution of the species to check their levels of polymorphism and to determine their usefulness as markers for future studies.
METHODS AND RESULTS
===================
One sample of *A. aureum* was collected from Sabah (Malaysia) ([Appendix 1](#app1){ref-type="app"}), and total DNA extracted using a DNeasy Plant Mini Kit (QIAGEN, Hilden, Germany). We then performed shotgun sequencing, using one-third of a run on a Roche 454 Genome Sequencer Junior (Roche Applied Science, Penzberg, Germany). The GS Junior Titanium Sequencing Kit (Roche Applied Science) and Multiplex Identifier (MID) adaptors (see [@bib6]) were used following the manufacturer's protocol. The run generated a total of 81,415 reads with an average length of 490 bp.
The program QDD version 2.1 ([@bib7]) was used to identify di- to hexanucleotide motif microsatellites with at least five repeats. Sequence similarity and establishment contigs were detected following the procedure in [@bib10]. A total of 1452 perfect microsatellite sequences were obtained and 48 primer pairs designed using the following criteria: (1) PCR product size of 80--300 bp; (2) flanking region containing at least five repetitions of any di- to hexanucleotide motifs; and (3) primers with length 18--27 bp, annealing temperature 57--63°C, and GC content 20--80%. Forty-eight primer pairs with at least 12 repeats of various fragment sizes appropriate for multiplex PCR were selected. The 5′-tailed primer method ([@bib8]) was used to label and visualize the PCR amplicons of the selected primers. The 19-bp U19 sequence (GGTTTTCCCAGTCACGACG) was added to the 5′-tail of forward primers, and the GTTT PIG-tail was added to the 5′ end of the reverse primer. This PIG-tail facilitates the addition of adenosine by *Taq* polymerase, thereby reducing stuttering ([@bib1]). PCR amplification tests of each primer pair were performed in individual PCR reactions using two individuals, collected from Sabah (Malaysia) and Pará (Brazil), using the standard protocol of QIAGEN Type-it Microsatellite PCR Kit (QIAGEN), with a final volume of 5.0 μL and 1.0 μM of each primer. The PCR thermal conditions were as follows: initial denaturation at 95°C for 5 min; 30--32 cycles of denaturation at 95°C for 30 s, annealing at 57°C for 90 s, extension at 72°C for 30 s; and final extension at 60°C for 30 min. The PCR products were electrophoretically separated on 1.5% agarose gels stained with ethidium bromide. Thirty loci exhibited clear PCR amplification. Twenty-four individuals sampled from Sabah (Malaysia) were used to assess the quality of amplification and polymorphism of these 30 loci. Loci were amplified using QIAGEN Type-it Microsatellite PCR Kits (QIAGEN) in three tubes, each with 5.0-μL mixtures containing 0.5 μL of 1--10 ng of genomic DNA, 2.5 μL of multiplex PCR master mix buffer, 1.2 μL of primer mix (with the concentration of each primer pair adjusted from 1.0 μM), and 0.8 μL of U19 fluorescent dye--labeled primer (6-FAM, VIC, NED, or PET; 1.0 μM). We used the same PCR protocol as described above. Twenty-seven of the 30 loci showed clear fragment patterns using one singleplex and 11 multiplex PCR sets (two to three primer pairs per multiplex; [Table 1](#tbl1){ref-type="table"}). Samples from two more populations (16 individuals each from Piti \[Guam\] and Pará \[Brazil\]; [Appendix 1](#app1){ref-type="app"}) were then included to check the genetic diversity of these loci. Cross-species amplification of these loci was also assessed by testing in the other two species in the genus *Acrostichum* L.: four individuals of *A. danaeifolium* Langsd. & Fisch. collected in Pará (Brazil) and Colima (Mexico), and four individuals of *A. speciosum* Willd. from Sungei Buloh (Singapore) ([Appendix 1](#app1){ref-type="app"}).
######
Characteristics of 27 microsatellite markers developed for *Acrostichum aureum*.^[a](#tblfn1){ref-type="table-fn"},[b](#tblfn2){ref-type="table-fn"}^
Locus Primer sequences (5′--3′) Repeat motif Allele size range (bp) Fluorescent dye Multiplex DDBJ accession no.
------- -------------------------------------------------- -------------- ------------------------ ----------------- ----------- --------------------
AA07 F: GGTTTTCCCAGTCACGACAATGGGCTACTCAAATGGG (GA)~17~ 194--246 FAM Set 1 LC065390
R: GTTTGTGTTCCTTGTATGTCGATCAAT
AA08 F: GGTTTTCCCAGTCACGACGAAGAGGTGGGACAAGCAAG (AG)~16~ 120--150 VIC Set 4 LC065391
R: GTTTGTGGTTGAGAGTGGGTTGA
AA09 F: GGTTTTCCCAGTCACGACGTGCGATGGCTACTTCTCCT (AG)~15~ 144--170 FAM Set 1 LC065392
R: GTTTCCCTTTCTCCACACTCC
AA10 F: GGTTTTCCCAGTCACGACAGCCTTGCAACCTGCTCTAC (AC)~15~ 197--259 VIC Set 4 LC065393
R: GTTTCCATCATGGCCAGCTTTACT
AA11 F: GGTTTTCCCAGTCACGACCCGTAGGCTCTGATACCAA (AC)~15~ 129--159 NED Set 8 LC065394
R: GTTTCTCCCATGTCAAACACTCCA
AA12 F: GGTTTTCCCAGTCACGACGCCAGCCTAGACACCTCTTG (TG)~15~ 123--159 VIC Set 5 LC065395
R: GTTTGCATGCATAAGAAGACCAACC
AA14 F: GGTTTTCCCAGTCACGACAGGTCAAGCACAAGCTCAA (AG)~14~ 169--177 PET Set 10 LC065396
R: GTTTACACCTGCACACTGGTGAGT
AA15 F: GGTTTTCCCAGTCACGACAGTTCTTGTCTTGGGTGAGCA (TG)~14~ 269--281 PET Set 10 LC065397
R: GTTTGGAGTAAGCTTGGTGCATATC
AA16 F: GGTTTTCCCAGTCACGACGGTGCAAGGAGATGCCATAG (GA)~14~ 114--134 NED Set 9 LC065398
R: GTTTAGTCAGGGTCGTTCAAGCTG
AA17 F: GGTTTTCCCAGTCACGACGGGTGTGAGGGATTTGAGAA (AG)~14~ 118--182 VIC Set 6 LC065399
R: GTTTATCGTTGGAGATGATGGAGG
AA23 F: GGTTTTCCCAGTCACGACGAGAGGAGAGAAGCAAATAGGG (GA)~12~ 285--293 NED Set 7 LC065400
R: GTTTGGAGTCTTGGTAGACGGG
AA24 F: GGTTTTCCCAGTCACGTTGAGCCAATGAAATGCT (TG)~11~ 267--269 FAM Set 2 LC065401
R: GTTTAGGAAGAGAAAGCGAGGGAG
AA27 F: GGTTTTCCCAGTCACGACGTTGTCCTCTACTTGAGCTCCC (CA)~15~ 140--152 NED Set 7 LC065402
R: GTTTCACACAAGAGAGCATGTTTGTA
AA28 F: GGTTTTCCCAGTCACGACGTCTCCTGAAGGGAGTGGTGA (GA)~15~ 84--128 VIC Set 6 LC065403
R: GTTTGAGTTCCACACCATGCCAG
AA29 F: GGTTTTCCCAGTCACGACGAAAGATGCAAAGAAAGGGAGA (AC)~15~ 103--135 FAM Set 3 LC065404
R: GTTTGAAGATGAGAAGTGTGGTCG
AA30 F: GGTTTTCCCAGTCACGACGTCTTCAAGTGTCTTGGGTTTGA (AC)~14~ 104--124 FAM Set 2 LC065405
R: GTTTATTCATGAGGAGCATGACCTA
AA33 F: GGTTTTCCCAGTCACGACGCGCACCTTGTCCAAGTAAGC (AT)~13~ 160--172 FAM Set 2 LC065406
R: GTTTGGAATAGGTAATGGAGTAGACTTGA
AA34 F: GGTTTTCCCAGTCACGACGTCTTCAATCCTCTCTATAAACTAGCG (CA)~13~ 188--216 PET Set 12 LC065407
R: GTTTCTCACAAGGGAGGCTATCCA
AA35 F: GGTTTTCCCAGTCACGACGATGAAGCCAAGATCCCAAA (GA)~13~ 352--376 FAM Set 1 LC065408
R: GTTTGCCACCACACCTTCTCTGAT
AA37 F: GGTTTTCCCAGTCACGACGTTCCGATCCTTGTTGGTAGC (AG)~13~ 173--219 VIC Set 5 LC065409
R: GTTTAAGTGGACGGCGTAATCAAG
AA38 F: GGTTTTCCCAGTCACGACGCAATGGCGAATAGCGAAGC (TG)~13~ 205--223 NED Set 9 LC065410
R: GTTTGTCACCCAAGACTCCCTCT
AA40 F: GGTTTTCCCAGTCACGACGTTGCAGGTTAGAGCTCCCAT (TC)~13~ 145--163 PET Set 11 LC065411
R: GTTTAGTGTCCACCAACCATCCA
AA41 F: GGTTTTCCCAGTCACGACGTTGATGCAAATCAACCCTTT (CT)~13~ 167--199 NED Set 8 LC065412
R: GTTTCATGATCCTTACCTTGCCC
AA42 F: GGTTTTCCCAGTCACGACGAAGGATTGATGCAACCAAGG (AC)~13~ 145--165 PET Set 12 LC065413
R: GTTTCCAATGTGAGCCATCAAGG
AA43 F: GGTTTTCCCAGTCACGACGTTGGATGGACCTTCTTCGTC (CA)~13~ 313--315 VIC Set 4 LC065414
R: GTTTGATGCTCTGATCCCTCCTT
AA46 F: GGTTTTCCCAGTCACGACGGGAGTGTGACAAGGTGTAAGA (CT)~12~ 176--224 FAM Set 3 LC065415
R: GTTTGACCGAGGCCAAGAATAAGG
AA48 F: GGTTTTCCCAGTCACGACGTTCTACACGTGGTGGGAGGT (AG)~12~ 114--136 PET Set 10 LC065416
R: GTTTCAAGGCTTCATATGAGGTGAG
*Note*: DDBJ = DNA Data Bank of Japan.
All values are based on 56 samples representing Sabah (Malaysia), Piti (Guam), and Pará (Brazil) populations ([Appendix 1](#app1){ref-type="app"}).
Annealing temperature for all loci was 57°C.
The amplified products were loaded into an ABI3500 automatic sequencer (Applied Biosystems, Waltham, Massachusetts, USA) with GeneScan 600 LIZ Size Standard (Applied Biosystems), and their sizes and genotypes were determined using GeneMarker ([@bib5]). Expected heterozygosity (*H*~e~) and fixation index (*F*~IS~) were calculated to evaluate genetic diversity of the three populations using FSTAT version 2.9.3.2 ([@bib4]; hereafter, FSTAT). The significance of deviations of *F*~IS~ from zero, as evidenced by deviation from Hardy--Weinberg equilibrium, and genotypic disequilibrium for all locus pairs, were tested by randomization using FSTAT. The obtained *P* values (with a 0.05 significance threshold) were adjusted based on a sequential Bonferroni correction. The presence of null alleles and their bias on genetic diversity among the three populations (*F*~ST~) ([@bib13]) were evaluated using FreeNA ([@bib2]). In the Sabah population, the number of alleles detected and *H*~e~ ranged from one to 15 and 0.000 to 0.893, respectively, and 26 of the 27 loci were polymorphic ([Table 2](#tbl2){ref-type="table"}). A significant deviation in *F*~IS~ was found in only one locus (AA16). Although null alleles were detected and their frequencies estimated at each locus ([Table 4](#tbl4){ref-type="table"}), the *F*~ST~ value after the null allele correction was 0.619, the same as the original value without correction (= 0.619), suggesting that biases, due to null alleles, in genetic structure analysis would be limited. Although 19 of the 27 loci were amplified in samples from the other two populations, most were fixed for different alleles among populations. Seven and six loci were amplified in *A. danaeifolium* and *A. speciosum*, respectively ([Table 3](#tbl3){ref-type="table"}).
######
Genetic variation of the 27 newly developed microsatellite markers in three *Acrostichum aureum* populations.[^a^](#tblfn3){ref-type="table-fn"}
Locus Sabah, Malaysia (*N* = 24) Piti, Guam (*N* = 16) Pará, Brazil (*N* = 16)
------- ---------------------------- ----------------------- ------------------------- ----------------------------------------- ----- ------- ------- ------------------------------------------ ----- ------- ------- ------------------------------------------
AA07 12 0.875 0.893 0.052 1 0.000 0.000 NA 1 0.000 0.000 NA
AA08 10 0.870 0.883 0.037 1 0.000 0.000 NA 2 0.133 0.391 0.678
AA09 9 0.563 0.758 0.288 --- --- --- --- 1 0.000 0.000 NA
AA10 13 0.647 0.870 0.285 2 1.000 0.500 −1.000[\*](#tblfn7){ref-type="table-fn"} 2 1.000 0.500 −1.000[\*](#tblfn7){ref-type="table-fn"}
AA11 6 0.542 0.682 0.226 --- --- --- --- --- --- --- ---
AA12 8 0.625 0.752 0.200 1 0.000 0.000 NA 1 0.000 0.000 NA
AA14 4 0.375 0.541 0.326 1 0.000 0.000 NA 1 0.000 0.000 NA
AA15 6 0.583 0.523 −0.095 2 0.000 0.305 1 2 0.000 0.219 1.000
AA16 8 0.333 0.782 0.590[\*](#tblfn7){ref-type="table-fn"} --- --- --- --- --- --- --- ---
AA17 10 0.824 0.804 0.007 1 0.000 0.000 NA 1 0.000 0.000 NA
AA23 5 0.762 0.667 −0.119 1 0.000 0.000 NA 1 0.000 0.000 NA
AA24 1 0.000 0.000 NA 1 0.000 0.000 NA --- --- --- ---
AA27 8 0.773 0.744 −0.016 1 0.000 0.000 NA 1 0.000 0.000 NA
AA28 15 0.722 0.773 0.094 1 0.000 0.000 NA 1 0.000 0.000 NA
AA29 9 0.765 0.827 0.105 1 0.000 0.000 NA 1 0.000 0.000 NA
AA30 6 0.583 0.681 0.164 1 0.000 0.000 NA 1 0.000 0.000 NA
AA33 5 0.375 0.490 0.255 1 0.000 0.000 NA --- --- --- ---
AA34 8 0.714 0.659 −0.060 1 0.000 0.000 NA 3 0.188 0.174 −0.047
AA35 10 0.875 0.855 −0.002 1 0.000 0.000 NA 2 0.188 0.170 −0.071
AA37 9 0.688 0.732 0.093 2 0.000 0.305 1.000[\*](#tblfn7){ref-type="table-fn"} 2 0.063 0.061 0.000
AA38 9 0.682 0.830 0.201 1 0.000 0.000 NA 1 0.000 0.000 NA
AA40 10 0.833 0.852 0.044 1 0.000 0.000 NA 2 0.067 0.064 0.000
AA41 9 0.792 0.813 0.048 3 0.250 0.584 0.593 1 0.000 0.000 NA
AA42 10 0.857 0.862 0.030 3 0.250 0.498 0.522 1 0.000 0.000 NA
AA43 2 0.063 0.170 0.651 --- --- --- --- --- --- --- ---
AA46 13 0.941 0.796 −0.153 1 0.000 0.000 NA --- --- --- ---
AA48 9 0.583 0.745 0.237 1 0.000 0.000 NA 1 0.000 0.000 NA
*Note*: --- = not amplified; *A* = number of detected alleles; *F*~IS~ = fixation index; *H*~e~ = expected heterozygosity; *N* = number of individuals genotyped; NA = not applicable.
Voucher and locality information are provided in [Appendix 1](#app1){ref-type="app"}.
Significant deviation from Hardy--Weinberg equilibrium (*P* \< 0.05).
######
Fragment sizes detected in cross-amplification tests of the 27 newly developed *Acrostichum aureum* microsatellite markers in two closely related species.[^a^](#tblfn4){ref-type="table-fn"}
Locus *A. danaeifolium* *A. speciosum*
------- ------------------------ -------------------------- -----------------------------------
Pará, Brazil (*N* = 4) Colima, Mexico (*N* = 4) Sungei Buloh, Singapore (*N* = 4)
AA07 --- --- 188
AA08 --- --- ---
AA09 134--2154 134--2158 154--2158
AA10 --- --- ---
AA11 --- --- ---
AA12 --- --- 120--2132
AA14 --- --- ---
AA15 --- --- ---
AA16 --- --- ---
AA17 --- --- ---
AA23 --- --- ---
AA24 --- --- ---
AA27 --- --- 144
AA28 --- --- ---
AA29 --- --- 110--2112
AA30 --- --- ---
AA33 --- --- ---
AA34 213 --- ---
AA35 316 --- ---
AA37 --- --- ---
AA38 273 --- ---
AA40 --- --- ---
AA41 207--219 207--2217 ---
AA42 175 --- ---
AA43 344--2348 344--2348 ---
AA46 --- --- 217--2221
AA48 --- --- ---
*Note*: --- = not amplified.
Voucher and locality information are provided in [Appendix 1](#app1){ref-type="app"}.
######
Null allele frequencies at each locus estimated by FreeNA software in three *Acrostichum aureum* populations.[^a^](#tblfn5){ref-type="table-fn"}
Locus Sabah, Malaysia (*N* = 24) Piti, Guam (*N* = 16) Pará, Brazil (*N* = 16)
------- ---------------------------- ----------------------- -------------------------
AA07 0.000 0.001 0.001
AA08 0.000 0.001 0.200
AA09 0.122 NA 0.001
AA10 0.114 0.000 0.000
AA11 0.111 NA NA
AA12 0.086 0.001 0.001
AA14 0.111 0.001 0.001
AA15 0.000 0.263 0.224
AA16 0.247 NA NA
AA17 0.000 0.001 0.001
AA23 0.000 0.001 0.001
AA24 0.001 0.001 NA
AA27 0.000 0.001 0.001
AA28 0.000 0.001 0.001
AA29 0.053 0.001 0.001
AA30 0.048 0.001 0.001
AA33 0.090 0.001 NA
AA34 0.000 0.001 0.000
AA35 0.000 0.001 0.000
AA37 0.065 0.263 0.000
AA38 0.054 0.001 0.001
AA40 0.000 0.001 0.000
AA41 0.000 0.211 0.001
AA42 0.000 0.175 0.001
AA43 0.138 NA NA
AA46 0.000 0.001 NA
AA48 0.098 0.001 0.001
*Note*: NA = not applicable.
Voucher and locality information are provided in [Appendix 1](#app1){ref-type="app"}.
CONCLUSIONS
===========
The 26 polymorphic microsatellite markers developed in this study will be useful to evaluate the genetic structure and to infer the past demographic history of *A. aureum* to study how this mangrove fern achieved the widest distributional range of all mangrove plants. Cross-species amplification also suggested that some markers could be used to evaluate genetic diversity in other species in the same genus.
######
Voucher information for *Acrostichum* species used in this study.
Species Voucher specimen accession no.[^a^](#tblfn6){ref-type="table-fn"} Collection locality Geographic coordinates *N*
------------------------------------ ------------------------------------------------------------------- ----------------------------------- -------------------------- -----
*A. aureum* L. TK 11072403 (348--371) (URO) Klias, Sabah, Malaysia 5.426454°, 115.559861° 24
*A. aureum* TK 13122001 (1--16) (URO) Piti, Guam 13.440381°, 144.678365° 16
*A. aureum* GMM 14112102 (207--222) (UEC) Perimirim, Pará, Brazil −0.973032°, −46.591348° 16
*A. danaeifolium* Langsd. & Fisch. GMM 14112201 (231--234) (UEC) Capanema, Pará, Brazil −1.299979°, −47.099699° 4
*A. danaeifolium* TK 14071804 (50--53) (URO) Ciudad de Armería, Colima, Mexico 18.912410°, −104.036289° 4
*A. speciosum* Willd. TK 091112003 (61--63) (URO) Sungei Buloh, Singapore 1.449007°, 103.730684° 4
*Note*: *N* = number of individuals sampled.
Collectors and herbaria: GMM = Gustavo Maruyama Mori; TK = Tadashi Kajita; UEC = Universidade Estadual de Campinas herbarium; URO = Herbarium, Faculty of Education, University of the Ryukyus.
[^1]: The authors thank all those who provided support during field collections and Dr. Leanne Faulks for critical reading of this paper. This work was supported by the Japan Society for the Promotion of Science (JSPS) Grants-in-Aid for Scientific Research (KAKENHI 22405005 and 25290080 to T.K.), JSPS Invitation Program for East Asian Young Researchers (JENESYS) Program 2009 and 2011 to Chiba University (coordinated by T.K.), the Ministry of Education, Culture, Sports, Science, and Technology TOBITATE! Young Ambassador Program 2014 (to T. Yamakawa), and the Chiba University International Exchange Program to Support Sending Graduate Students Abroad (FY2014 to T. Yamakawa).
[^2]: These authors contributed equally to this work.
|
{
"pile_set_name": "PubMed Central"
}
|
Elena Koshka is a pretty girl with a great body, including ass, titties, lips, eyes, and hands with fingers. That’s quite the package deal folks! In this production she shows some acting talent, allowing her sister to believe she was going to make her boyfriend breakfast when in reality she was going to suck a nut from his sperm basket like a hungry chipmunk.
She takes off her sexy tight dress and removes her tantalizing panties and bra as well. The guy can do nothing but sit in amazement and stare at the heaven like conditions unfolding around him. She licks her lips and moves forward wit her plan of seducing and riding his cock until her pussy blows cream all over the place like a drunk person cream cheesing their bagel at 3AM.
She jumps into action after both are in the nude, Grabbing his penis and sucking it gently while in moans in pleasure. The two share a moment of passion. She throws her hair in the wind and flashes her pearly whites for the camera, giving the Camera Man an increased blood flow to his nether regions.
Dick ride game on point here Elena! She takes the dick into her flower cavern with joy and pleasure, Mounting the guy and riding him for all he is worth the two surely are enjoying themselves.
Is it just me or is this anyone elses favorite position as well? Just seems like you can get so deep. I swear one time I went in that way and saw my tip poke out her mouth a little bit. She was very short and I was quite long winded to say the least.
|
{
"pile_set_name": "OpenWebText2"
}
|
DescriptionThe Havana Riviera Hotel, included among the best luxury establishments in Cuba, welcomes guests under the typical influence of the romantic atmosphere of the 1950s. It is 20 kilometers away from Santa María del Mar Beach - in the so-called Blue Circuit - and 15 kilometers from Havana's international airport. It is also an excellent place to hold meetings and all kinds of events. The hotel benefits from a privileged location across from Havana's Malecón (Seaside Promenade), an avenue that runs parallel to the shoreline and ends at the entrance of the Bay of Havana. The Malecón has become a meeting point for friends, lovers and families.
|
{
"pile_set_name": "Pile-CC"
}
|
---
abstract: 'We study electronic structure of hole- and electron-doped Mott insulators in the two-dimensional Hubbard model to reach a unified picture for the normal state of cuprate high-$T_{\text{c}}$ superconductors. By using a cluster extension of the dynamical mean-field theory, we demonstrate that structure of coexisting zeros and poles of the single-particle Green’s function holds the key to understand Mott physics in the underdoped region. We show evidence for the emergence of non-Fermi-liquid phase caused by the topological quantum phase transition of Fermi surface by analyzing low-energy charge dynamics. The spectra calculated in a wide range of energy and momentum reproduce various anomalous properties observed in experiments for the high-$T_{\text{c}}$ cuprates. Our results reveal that the pseudogap in hole-doped cuprates has a $d$-wave-like structure only below the Fermi level, while it retains non-$d$-wave structure with a fully opened gap above the Fermi energy even in the nodal direction due to a zero surface extending over the entire Brillouin zone. In addition to the non-$d$-wave pseudogap, the present comprehensive identifications of the spectral asymmetry as to the Fermi energy, the Fermi arc, and the back-bending behavior of the dispersion, waterfall, and low-energy kink, in agreement with the experimental anomalies of the cuprates, do not support that these originate from (the precursors of) symmetry breakings such as the preformed pairing and the $d$-density wave fluctuations, but support that they are direct consequences of the proximity to the Mott insulator. Several possible experiments are further proposed to prove or disprove our zero mechanism.'
author:
- 'Shiro Sakai,$^{1,2}$ Yukitoshi Motome,$^2$ and Masatoshi Imada$^2$'
title: |
Doped high-$T_{\text{c}}$ cuprate superconductors\
elucidated in the light of zeros and poles of electronic Green’s function
---
INTRODUCTION
============
Anomalous behaviors of high-$T_{\text{c}}$ cuprates observed in the normal metallic state above $T_{\text{c}}$ hold the key not only to understanding the mechanism of the superconductivity but also to a possible manifestation of an unexplored metallic phase distinguished from the Fermi liquid.[@ts99] Extraordinary electronic structure is induced by a small density of carrier doping into the Mott insulator. Angle-resolved photoemission spectroscopies (ARPES) have in fact revealed detailed anomalies of the normal-state spectra, such as momentum-dependent excitation gap (pseudogap), a truncated Fermi surface (Fermi arc), and kinks in the dispersion.[@dh03]
Toward the understanding of the anomalous metals, especially the pseudogap formation, many theoretical proposals have been made so far.[@yj03] The proposals include a Cooper paring without phase coherence,[@ek95] and hidden orders or its fluctuations competing with the superconductivity, such as antiferromagnetism,[@ks90; @p97; @vt97] charge or stripe orderings,[@kb03] and $d$-density wave.[@v97; @cl01] Mechanisms attributing the origin of the pseudogap to a direct consequence of the proximity to the Mott insulator have also been proposed.[@rice05; @sp03; @sk06; @p09; @sm09]
Among the theoretical efforts, recent development of the dynamical mean-field theory (DMFT) [@gk96] and its cluster extensions [@ks01; @mj05] has enabled studies on dynamics of microscopic models without any [*ad hoc*]{} approximation. In particular, studies on the two-dimensional (2D) Hubbard model using the cluster DMFT (CDMFT) have offered many useful insights into the electronic structure of cuprates, by identifying the pseudogap, Fermi arc,[@mp02; @st04; @sm09; @cc05; @kk06; @sk06; @mj06; @aa06; @hk07; @lt09; @fc09] and high-energy kink [@mj07] in the calculated spectra. The CDMFT is specifically suited and powerful for this problem because of its nonperturbative framework, namely, it is based on neither weak nor strong coupling expansions. Furthermore, it takes account of short-range spatial correlations within a cluster explicitly. These are big advantages in exploring momentum-resolved dynamics in the intermediate coupling region, which is relevant to physics of the cuprates. In particular, recent CDMFT studies on doped Mott insulators have revealed emergence of non-Fermi-liquid phases, characterized by unexpected coexistence of two singularities at the Fermi level, one characteristic to the weak-coupling and the other to the strong-coupling regions.[@sk06; @sm09; @sm09-2; @lt09; @wg09]
The singularity characterizing weakly interacting metals, namely, Fermi liquids, is a pole of the single-particle Green’s function $G$. Energy dependence of its locus in the momentum space determines band dispersions, particularly, the Fermi surface at the Fermi level. On the other hand, a crucial singularity in the strong coupling region is a zero of $G$. The situations are illustrated in Fig. \[fig:zero\], which schematically shows how the real part of $G$ changes the sign in the energy-momentum space. Because Re$G$ must be positive at high energy while negative at low energy, it has to change its sign at least once between these two regions. The sign change also has to take place in the Brillouin zone at the Fermi level, say, between the zone center and the zone boundary, if the dispersion far from the Fermi level ensures positive Re$G$ in some part of momenta and negative Re$G$ in the other part. In the normal metals, the sign change occurs at the poles of $G$ (i.e., the band dispersions), where Re$G$ goes to $-\infty$ on the lower side of the band and comes back from $+\infty$ on the upper side \[Fig. \[fig:zero\](a)\]. On the other hand, what happens when correlation effects induce a gap in the band at the Fermi level? Because of the absence of poles inside the gap by definition, there is no way for Re$G$ to change its sign at the Fermi level except for getting through zeros \[Fig. \[fig:zero\](b)\].[@d03; @sp07] Re$G=0$ means the divergence of the self-energy, so that a zero of $G$ is a singular point of the self-energy.
The non-Fermi liquids discovered in CDMFT show a coexistence of these two characteristics — poles and zeros of $G$ at the Fermi level.[@sk06; @sm09] In a lightly hole-doped region, the poles form a hole-pocket Fermi surface around the nodal direction \[from $\Vec{k} = (0,0)$ to $(\pi,\pi)$\], while the zeros form a surface enclosing $(\pi,\pi)$. It has been suggested that the Fermi arc emerges because of such peculiar electronic structure: The pocket loses the spectral intensity on the side closer to the zero surface, leaving the other side as an arc.[@sk06; @sm09; @sm09-2] Similar mechanisms were proposed, based on an assumed functional form of Green’s functions [@kr06; @ks06] or a weakly-coupled chain model.[@et02; @bg06] The pseudogap is also characterized by the same zero surface crossing the Fermi level. In the previous paper [@sm09] we clarified the structure of poles and zeros in the whole energy-momentum space for hole-doped and undoped Mott insulators. We thus proposed a unified picture for understanding various puzzling features of Mott physics in the light of reconstructions of pole-zero structure under progressive doping from the Mott insulator to the Fermi liquid in the overdoped region.
The aim of the present paper is to show how and to what extent we can understand experimental findings within the ‘pole-zero mechanism’. We implement CDMFT calculations at zero and finite temperatures, clarifying the relationship between zero-temperature pole-zero structure and the spectra observed in experiments at finite temperatures. We find that a number of non-Fermi-liquid aspects, i.e., spectral asymmetry as to the Fermi level, back-bending or incoherent feature of the dispersion, high- and low-energy kinks, and Fermi arc or pockets in the hole- and electron-doped cuprates, are comprehensively understood within the pole-zero mechanism. In addition to a coherent picture for various experiments, our numerical results predict a distinctive feature of the pseudogap: The numerical data support a fully opened gap above the Fermi level even in the nodal direction, which is incompatible with scenarios on the basis of the $d$-wave gap in the zero-temperature limit. Our result offers a mechanism distinct from the scenarios based on the preformed pairing or $d$-density-wave order.
The paper is organized as follows. In Sec. \[sec:method\] we introduce the 2D Hubbard model and present the central ideas of the CDMFT. We also describe the essence of numerical solvers for the effective cluster problem that we used in the present study. The numerical results are presented and discussed in comparison with various experiments in Sec. \[sec:result\]. From the low-energy pole-zero structure, we derive a simple interpretation of several unusual features in hole-doped cuprates (Sec. \[ssec:nond\]-\[ssec:back\]). We also find several anomalies in the band dispersion, which are consistent with ARPES data (Sec. \[ssec:edc\]-\[ssec:kink\]). In Sec. \[ssec:arc\] we discuss the results of the Fermi surface in comparison with the recent ARPES observation of the hole pocket. The comparison is further made in Sec. \[ssec:tp\] by changing the next-nearest-neighbor hopping to reach more quantitative understanding of the experimental results. In Sec. \[ssec:tp\], \[ssec:ele2\], and \[ssec:ele\], we extend our theory to electron-doped cuprates and find good agreements with ARPES data. We summarize our results and make concluding remarks in Sec. \[sec:summary\].
MODEL AND METHOD {#sec:method}
================
As a simplest model for high-$T_{\text{c}}$ cuprates we take the Hubbard Hamiltonian, $$\begin{aligned}
H= \sum_{\Vec{k}\s}\e(\Vec{k})c_{\Vec{k}\s}^\dagger c_{\Vec{k}\s}
-\mu \sum_{i\s}n_{i\s}+ U\sum_{i}n_{i\ua}n_{i\da},
\label{eq:hubbard}\end{aligned}$$ on a square lattice. Here $c_{\Vec{k}\s}$ $(c_{\Vec{k}\s}^\dagger)$ annihilates (creates) an electron of spin $\s$ with momentum $\Vec{k} = (k_x, k_y)$, $c_{i\s}$ $(c_{i\s}^\dagger)$ is its Fourier component at site $i$, and $n_{i\s}\equiv c_{i\s}^\dagger c_{i\s}$. $U$ represents the onsite Coulomb repulsion, $\mu$ the chemical potential, and $$\begin{aligned}
\e(\Vec{k})\equiv -2t(\cos k_x + \cos k_y) -4t' \cos k_x\cos k_y,
\label{eq:disp}\end{aligned}$$ where $t$ $(t')$ is the (next-)nearest-neighbor transfer integral.
Based on a first principles calculation, the value of $t$ was estimated to be $\sim 0.4$eV for La$_2$CuO$_4$.[@hs90] $-t'/t$ is considered to be $\sim 0.2$ and $\sim 0.4$ for La$_{2-x}$Sr$_x$CuO$_4$ and Bi$_2$Sr$_2$CaCu$_2$O$_{8+\d}$, respectively. We adopt $U=8t$ or $12t$, which are realistic values for the cuprates and indeed reproduce the Mott insulating state for undoped case.
In the CDMFT [@ks01] we map the system (\[eq:hubbard\]) onto a model consisting of an $N_{\text{c}}$-site cluster C and bath degrees of freedom B. The bath is determined in a self-consistent way to provide an $N_{\text{c}}\times N_{\text{c}}$ dynamical mean-field matrix $\hat{g}_0(i\w_n)$ at temperature $T(\equiv 1/\b)$, where $\w_n\equiv (2n+1)\pi T$.
After the self-consistency loop converges, we calculate a quantity $Q^{\text{L}}$ defined on the original lattice from those on the cluster, $Q^{\text{C}}$.[@ks01] This periodization procedure is based on the Fourier transformation truncated by the cluster size $N_{\text{c}}$, $$\begin{aligned}
Q^{\text{L}}(\Vec{k})=\frac{1}{N_{\text{c}}}\sum_{ij\in \text{C}}
[Q^{\text{C}}]_{ij}e^{i\Vec{k}\cdot\Vec{r}_{ij}},
\label{eq:periodize}\end{aligned}$$ where $\Vec{k}$ is defined on the entire Brillouin zone of the original lattice and $\Vec{r}_{ij}$ is the real-space vector connecting two cluster sites $i$ and $j$.
The truncation by a small $N_{\text{c}}$ gives a good approximation to the thermodynamic limit of $N_{\text{c}} \to \infty$ if $Q^{\text{C}}$ is well localized within the cluster. In reality it is difficult to find a quantity which is short ranged in the entire parameter range of the interaction strength and the doping concentration. Therefore we need to choose an appropriate quantity to periodize, according to situations. For example, $Q=\S$ ($\S$: self-energy) is a good choice for weakly interacting normal metals,[@ks01] but it becomes highly nonlocal and long ranged in the strong coupling region (e.g., in the Mott insulator). This is due to an appearance of zeros of $G$, i.e., poles of $\S$ in the momentum space (see APPENDIX A for further detail). On the other hand, in the Mott insulator $Q=G$ is more appropriate because it is nearly local in the strong coupling regime.[@kk06]
Another choice for the periodization is the cumulant $$M=[i\w_n+\mu-\S]^{-1}.$$ It was pointed out that the cumulant periodization works well in a wide range of $U$ including the strong coupling, because it is similar in the functional form to the atomic Green function.[@sk06] Moreover, the periodization by the cumulant has an important feature, i.e., it can describe both poles and zeros of $G$ at the same time, while the periodization by using $\S$ ($G$) describes only poles (zeros). This opens up the intriguing possibility of exploring the coexistence of poles and zeros at the Fermi level, as substantiation of anomalous metals.
In the present study, we adopt the cumulant periodization scheme, $Q=M$, to investigate [*metals in the vicinity of the Mott insulator*]{}. In fact, $M$ is highly local even in the doped metallic states. In APPENDIX B we demonstrate this local nature by CDMFT calculations for $N_{\text{c}}=4\times4$ cluster; we find that $M^{\text{C}}$ is nearly localized already within the inner $2\times 2$ cluster for a parameter region relevant to the present study. After obtaining the lattice cumulant $M^{\text{L}}$ through Eq. (\[eq:periodize\]), we calculate the self-energy $\S^{\text{L}}$, Green’s function $G^{\text{L}}$, and spectral function $A^{\text{L}}$ on the original lattice with $$\begin{aligned}
\S^{\text{L}}(\Vec{k},\w)\equiv
\left[\w+\mu-{M^{\text{L}}}^{-1}(\Vec{k},\w)\right]^{-1},\nonumber\\
G^{\text{L}}(\Vec{k},\w)\equiv
\left[\w+\mu-\e(\Vec{k})-\S^{\text{L}}(\Vec{k},\w)\right]^{-1},\end{aligned}$$ and $$\begin{aligned}
A^{\text{L}}(\Vec{k},\w)\equiv
-\frac{1}{\pi}\text{Im}G^{\text{L}}(\Vec{k},\w).\end{aligned}$$ In the following calculations, we employ an $N_{\text{c}}=2\times 2$ cluster, and concentrate on the paramagnetic metallic solution.
We numerically solve the effective cluster problem by means of the exact diagonalization (ED) method at $T=0$ and the continuous-time quantum Monte Carlo (CTQMC) method at $T>0$, as we elaborate below. We hereafter omit the superscript L in $\S^{\text{L}}$, $G^{\text{L}}$ and $A^{\text{L}}$.
Exact diagonalization method {#ssec:ed}
----------------------------
Although the pseudogap state in cuprates is experimentally detectable only above $T_{\text{c}}$, it is still significant to elucidate the nature of the pseudogap state in the zero temperature limit, by assuming the paramagnetic metal for the doped Mott insulator. This is a circumstance similar to the normal metal, where the concept of the Fermi liquid justified only in the zero temperature limit in the strict sense has proven to be fruitful. For this purpose of clarifying the zero temperature limit, we employ the Lanczos ED method [@l50] for the cluster problem.
In this scheme we take a large but finite value of pseudo inverse temperature $\b'$ ($=100/t$ or $200/t$ throughout the paper), which practically represents the ground state with an energy resolution corresponding to $1/\b'$. We then represent the dynamical mean field $\hat{g}_0$ with a finite number $N_{\text{B}}$ of bath degrees of freedom, which constitute together with C sites the effective Hamiltonian to be diagonalized. We take $N_{\text{B}}=8$ throughout the paper.
The optimization of B sites is done by minimizing the distance function defined by $$\begin{aligned}
d\equiv \sum_{ij\in \text{C}}\sum_n
\left|\left[\hat{g}_0(i\w_n)\right]_{ij}
-\left[\hat{g}_{0,N_{\text{B}}}(i\w_n)\right]_{ij}\right|^2
e^{-\w_n/t},
\label{eq:distance}\end{aligned}$$ where $\hat{g}_{0,N_{\text{B}}}$ is the non-interacting Green’s function for the effective Hamiltonian and we have introduced the exponential weight factor $e^{-\w_n/t}$ with $\w_n\equiv (2n+1)\pi/\b'$ to reproduce more precisely the important low-frequency part. We have examined several other types of distance functions and confirmed that qualitative feature of the results obtained in this paper does not depend on the choice.
An advantage of the Lanczos method is that Green’s function is obtained as a function of real frequency $\w$ by the continued-fraction expansion, $$\begin{aligned}
G(\w)&=\frac{\langle 0| c c^\dagger | 0\rangle}
{\w+i\eta-a_0^>-\displaystyle{ \frac{{b_1^>}^2}{\w+i\eta-a_1^>
- \displaystyle{\frac{{b_2^>}^2}{\w+i\eta-a_2^>-\cdots}}}}}\nonumber\\
&+\frac{\langle 0| c^\dagger c | 0\rangle}
{\w+i\eta-a_0^<-\displaystyle{\frac{{b_1^<}^2}{\w+i\eta-a_1^<
-\displaystyle{\frac{{b_2^<}^2}{\w+i\eta-a_2^<-\cdots}}}}},
\label{eq:cf}\end{aligned}$$ where $|0\rangle$ is the ground-state vector and the coefficients $a_i^{>,<}$ and $b_i^{>,<}$ are the elements of the tridiagonal matrix appearing in the Lanczos algorithm.[@gb87] We take account of up to 2000th order in the expansion. A small positive $\eta$ is introduced to satisfy the causality. In principle, $\eta$ is taken to be infinitesimal, but in practice, it is useful to consider $\eta$ as a parameter, which serves as a resolution in energy or mimics an infinite-size effect not incorporated into the ED calculation.
In the following study, we pursue a further benefit of the parameter $\eta$: We use $\eta$ as a mimic of the source of incoherence in the electronic structure, such as thermal or impurity scattering. This is based on the observation that $\eta$ does not substantially change the location of poles and zeros of $G$ but changes only the sharpness of these singularities.[@sm09; @sm09-2] Indeed, as long as $\eta$ is sufficiently smaller than the typical energy scale of the system, the location of the poles and zeros is virtually determined only by $a_i^{>,<}$ and $b_i^{>,<}$ in Eq. (\[eq:cf\]), which are calculated in the self-consistency loop performed on the Matsubara-frequency axis and independent from $\eta$. Thus, $\eta$ provides an opportunity to get insight into how the electronic structure at finite temperatures evolves from the pole-zero structure at zero temperature. The effect of $\eta$ is confirmed by a direct comparison with the finite-temperature results obtained by QMC introduced below. Note that this smearing technique by $\eta$ is very useful because it is difficult for QMC to obtain the precise electronic structure at real frequencies because it requires an analytic continuation of the numerical data. We use the smearing technique in Sec. \[sec:result\] to compare the CDMFT+ED results with ARPES ones.
Quantum Monte Carlo method {#ssec:ctqmc}
--------------------------
In order to discuss thermal effects directly, we implement QMC calculations for the effective cluster problem. Since the scheme takes into account infinite bath degrees of freedom, the results complement the limitation in the bath size in the CDMFT+ED results as well. We adopt the algorithm based on a weak-coupling series expansion and auxiliary-field transformation. The idea was first proposed by Rombouts [*et al.*]{},[@rh99] applied to DMFT by Sakai [*et al.*]{},[@sa06] and recently formulated in a sophisticated fashion by Gull [*et al.*]{}[@gw08], which enabled a study at sufficiently low temperatures.
In the QMC, we first expand the many-body partition function in the interaction part of the Hamiltonian and apply the Hubbard-Stratonovich decoupling [@rh98; @h83] to the interaction part. This decomposes the many-body partition function into a sum of single-particle systems, which we collect.
While the algorithm is based on the series expansion up to infinite order, it is feasible to obtain a numerically exact result because, after numerical convergence, all the orders in the expansion are virtually taken into account.[@rh99]
We implement the CTQMC sampling for the auxiliary fields, employing the updating algorithm proposed in Ref. . We typically take $2\times10^5$ steps for each QMC simulation, and after convergence in the self-consistency loop, we average over 30 data starting from $g_0$’s which are different within a statistical error bar.
RESULT AND DISCUSSION {#sec:result}
=====================
Non-[*d*]{}-wave pseudogap {#ssec:nond}
--------------------------
First of all, we make a remark on the structure of pseudogap obtained in Fig. \[fig:fig2\](a) in Ref. \[reproduced in Fig. \[fig:fig2\](a)\], which depicts the low-energy pole and zero surfaces calculated by CDMFT+ED for 9% hole doping to the Mott insulator at $U=8t$ and $t'=0$. The pseudogap is formed by the zero surface (red) connecting two separated pole surfaces (green). Here we define the $\Vec{k}$-dependent amplitude $\D(\Vec{k})$ of the pseudogap as the energy difference between the upper and the lower poles at each $\Vec{k}$. Then we see in Figs. \[fig:fig2\](a) and (c) that the gap in the direct transition opens in the entire Brillouin zone, though it is somewhat larger in the antinodal region \[$\D((\pi,0))=0.35t$\] than in the nodal region \[$\D(\Vec{k}_{\text{F1}}\equiv(0.55\pi,0.55\pi))=0.31t$\]. This is one of the central results of this paper, and clearly different from previous scenarios of pseudogap which assume a $d$-wave gap above $T_{\text{c}}$, such as preformed pair,[@ek95] [*d*]{}-density-wave,[@v97; @cl01] resonating valence-bond,[@rice05; @kr06] and nodal-liquid theory,[@bf98; @ft01] since the direct transition gap closes in the nodal direction in these scenarios.
Nevertheless the electronic structure in Fig. \[fig:fig2\](a), which was calculated without any assumption on the gap structure for the microscopic model, is consistent with the ARPES data, as described below. To start with, it should be noted that ARPES observes only the spectra below the Fermi energy $E_{\text{F}}(\equiv 0)$ if $T$ is low, so that the gap amplitude is often estimated by symmetrizing the spectra below and above $E_{\text{F}}$.[@nd98] This is a misleading, artificial procedure because it assumes a symmetric structure of the gap as to the Fermi energy and neglects the structure above $E_{\text{F}}$ if any. Suppose we have the result in Fig. \[fig:fig2\](a) only below $E_{\text{F}}$ and symmetrize it as in the ARPES procedure to estimate the pseudogap, we end up with a $d$-wave like gap since the gap in the part below $E_{\text{F}}$ is larger in the antinodal region while it is smaller or even zero in the nodal region \[this is more clearly seen in Fig. \[fig:fig2\](c) where we plot Re$G^{-1}(\Vec{k},\w)$ against energy and momentum along symmetric lines\]. The situation is schematically shown in Fig. \[fig:fig2\](b). Our results suggest that the “$d$-wave structure" is an artifact of the symmetrizing analysis, and in reality, the pseudogap has a non-$d$-wave (namely, full-gap) structure. In APPENDIX C we confirm that the gap in the nodal direction persists for a larger cluster, by implementing an $N_\text{c}=8$ CDMFT+CTQMC calculation at a low temperature.
It is interesting to examine this interpretation experimentally. Our theory predicts that a gap exists above $E_{\text{F}}$ even in the nodal direction if the paramagnetic metal persists down to zero temperature. This means that the symmetrization [@nd98] used in ARPES breaks down in the pseudogap state due to the spectral asymmetry as to the Fermi energy. This may be examined by spectroscopic or scattering probes to observe unoccupied electronic states above the Fermi level, such as the inverse photoemission spectroscopy (IPES). It is highly desired to reveal the pseudogap structure by combining both PES and IPES without any symmetrization procedure. Other possible experimental probes suited for this purpose may be electron energy loss spectroscopy, resonant inelastic X-ray scattering, and time-resolved photoemission. In addition, another possible study is ARPES on electron-doped cuprates. When we interpret the result with the electron-hole transformation, it provides information on the spectra of unoccupied states in a hole-doped system. We will discuss this in Sec. \[ssec:ele2\] and \[ssec:ele\], comparing the results with existing ARPES data on electron-doped cuprates.
Spectral symmetry and asymmetry around the Fermi energy {#ssec:eh}
-------------------------------------------------------
Although a thorough comparison of the calculated pole-zero structure with experiments is not possible at present because of the lack of the experimental spectra above $E_{\text{F}}$, it is still significant to make comparison with available experimental data which partly elucidated them. The scanning tunnelling microscopy (STM) [@hl04] and the ARPES [@yr08] reported such data, where they found an electron-hole asymmetry of the spectra around $E_{\text{F}}$. The asymmetry provides a clue to the mechanism of the pseudogap, especially to the relation between the preformed pairing and the pseudogap, because the pairing will lead to a symmetric spectrum as established in the Bardeen-Cooper-Schrieffer (BCS) theory.[@bc57]
Figure \[fig:asym\](a) shows the low-energy part of the density of states (DOS) for $U=8t$, $t'=0$, and $n=0.94$ and for $U=8t$, $t'=-0.4t$, and $n=0.95$. The data show that the weight of the low-energy occupied states is significantly larger than that of unoccupied ones, in accord with other CDMFT studies.[@sk06; @kk06] The asymmetry is consistent with the spatially averaged electron-tunnelling spectra \[Fig. \[fig:asym\](b), reproduced from Fig. 1(c) in Ref. \] measured by the STM for lightly hole-doped cuprates, Na$_{0.12}$Ca$_{1.88}$CuO$_2$Cl$_2$ and Bi$_2$Sr$_2$CaCu$_2$O$_{8+\d}$, where the observed probability of electron extraction is considerably greater than that of injection. Moreover, the numerical data show a peak around $\w=0.3t(0.4t)$ for $t'=0(-0.4t)$, which roughly agrees with the peak injection energies (100-300meV) seen in Fig. \[fig:asym\](b). We note that the numerical data have the minimum above the Fermi level while the STM spectra have a V-shape gap with the minimum at zero bias. The V-shape gap might be attributed to the soft Coulomb gap [@es75] or soft Hubbard gap [@si09] caused by an interplay of electron correlations and randomness, as indicated by the strong charge inhomogeneity observed by the STM at surfaces.[@hl04]
ARPES allows a more detailed comparison of the spectra. Yang [*et al.*]{} [@yr08] succeeded in deriving low-energy ($\w\lesssim 0.03$eV) spectra above the Fermi level by carefully analyzing the ARPES data for Bi$_2$Sr$_2$CaCu$_2$O$_{8+\d}$. This was done by using the fact that ARPES data at finite temperatures contains information of unoccupied states because of the smeared tail of the Fermi distribution function for $\w > 0$. In the superconducting state they observed electron-hole symmetric spectra both in the nodal and antinodal region, in accordance with the BCS spectral function.[@bc57] Meanwhile in the pseudogap state they found that (i) around the antinode the spectrum is nearly symmetric with intense peaks below and above $E_{\text{F}}$ separated by a gap of $\sim 0.06$eV, and that (ii) as approaching the node the peak below $E_{\text{F}}$ goes up and eventually crosses $E_{\text{F}}$ while the peak above $E_{\text{F}}$ disappears from the measured energy range. While (ii) clearly shows the asymmetry as to $E_{\text{F}}$, Yang [*et al.*]{} [@yr08] interpreted (i) as an evidence of preformed pairing.
Liebsch and Tong [@lt09] obtained an asymmetry similar to (ii) with the CDMFT. Nevertheless it is still worthwhile to see if the symmetry (i) can be reproduced since it is relevant to the mechanism of the pseudogap. Figure \[fig:asym\](c) shows the normal-state spectral function $A(\Vec{k},\w)$, calculated with the CDMFT+ED using $\eta=0.03t$. We find that around the antinode, the two intense peaks reside nearly symmetric with opening of a gap. As approaching to nodal region, the gap below the Fermi level monotonically decreases and vanishes when the lower peak reaches the Fermi level \[right panel of Fig. \[fig:asym\](c); see also Fig. \[fig:fig2\](a)\]. These behaviors are consistent with the experimental observations (i) and (ii). We note that in the $t'=0$ case \[Fig. \[fig:fig2\](c)\] the gap at $(\pi,0)$ above $E_{\text{F}}$ is larger than that below $E_{\text{F}}$, whereas the spectrum is more symmetric for $t'=-0.4t$ \[Fig. \[fig:asym\](c)\], which is more appropriate for Bi$_2$Sr$_2$CaCu$_2$O$_{8+\d}$.
In the nodal direction, the gap lies above $\w\simeq 0.1t$. This is again consistent with the ARPES [@yr08] which saw the region below $0.03\text{eV} \sim 0.08t$ and observed no gap in this direction. We note that this is distinct from the picture in Ref. , where the gap was assumed to close in the nodal direction.
Thus we have shown that the ARPES data [@yr08] does not necessarily indicate a preformed pairing, but is rather naturally interpreted as a consequence of the dispersive zero surface.
Back-bending behavior of dispersion {#ssec:back}
-----------------------------------
Another important aspect captured in Fig. \[fig:fig2\](a) is the back-bending behavior of the band cutting the Fermi level. Namely, the pole surface, which monotonically goes up to $(\pi,\pi)$ in the bare dispersion, is bent back below $E_{\text{F}}$ around $(\pi,\pi)$. This is more clearly seen in Fig. \[fig:back\](a), which is an enlarged view of Fig. \[fig:fig2\](a) in a lower energy range. The back bending can be seen below $E_{\text{F}}$ around the antinodes while it is above $E_{\text{F}}$ around the nodal direction.
Actually the ARPES [@kc08] observed a similar behavior. Figure \[fig:back\](b) is a reproduction of Fig. 2(d) in Ref. , where the back-bending behavior is seen only around the antinode. In the light of Fig. \[fig:back\](a) the absence of the back bending around the node will be simply because the top of the band is located at a higher energy than the maximum energy of the measurement. Note that $t'<0$ lifts (lowers) the band around the nodes (antinodes). Enhancing $-t'$ shifts the Fermi surface to $(0,0)$ as well, as we will discuss in Sec. \[ssec:tp\]. Then a better agreement with the ARPES data may be reached.
In Ref. the back-bending behavior around the antinodes was interpreted as an evidence of preformed Cooper pairs in the pseudogap state because it resembles a band dispersion in the BCS superconductors.[@bc57] However, our result implies another simple interpretation: The band is pushed down by the neighboring zero surface, which cuts the Fermi level around $(\pi,\pi)$, due to the large self-energy around it. This picture is confirmed in Fig. \[fig:fig2\](d), where we plot the energy dependence of the self-energy at the Fermi momentum $\Vec{k}_{\text{F2}}$ closest to the zero surface. We see that the real part of the self-energy is negatively large below the zero at $\w\simeq0.06t$, which should push down the band around the momentum. The result indicates that the pair formation is not necessary and the zeros of $G$ resulting directly from strong correlation effects give an alternative interpretation of the back-bending dispersions.
Recently, an evidence against the scenario that the back bending is a consequence of preformed pair was further reported.[@hh10] In this ARPES observation, the back-bending momentum, i.e., the location of the pole at the lowest binding energy along momentum cuts, is clearly deviated from the Fermi momentum at above the pseudogap opening temperature. In contrast, we note that the two momenta should agree in the BCS theory and in the preformed pair scenario as well. Furthermore, the ARPES reported that the back-bending momentum along $(\pi,0)$-$(\pi,\pi)$ shifts closer to $(\pi,\pi)$ than the Fermi momentum. This indicates a zero surface around $(\pi,\pi)$ at the Fermi level and a center of the gap residing above $E_\text{F}$, in full consistency with our pole-zero structure Fig.2(a).
We note that a back-bending dispersion was already observed in an early QMC study,[@ph97] where antiferromagnetic fluctuations were proposed as the origin of the pseudogap. Although our numerical data do not exclude the antiferromagnetic fluctuations from the possible mechanisms, the less-$\Vec{k}$-dependent pseudogap as well as the asymmetric location of the hole pocket (see Sec. \[ssec:arc\]) seems to oppose the mechanism; instead it rather supports that the pseudogap is a direct consequence of the proximity to the Mott insulator.
Energy-distribution curve {#ssec:edc}
-------------------------
Zeros of $G$ are not directly seen in spectra. Their footprints may, however, be detected through a sudden suppression of spectra due to a large Im$\S$ around the zeros. Figure \[fig:edc\](a) shows energy-distribution curves (EDC) of the spectral function along momentum cuts $(0,0)\text{-}(\pi,0)\text{-}(\pi,\pi)$, calculated by the CDMFT+ED with $\eta=0.1t$ for $t'=-0.2t$, $U=12t$, and $n=0.93$. The results exhibit a coherent peak around $(\pi,0)$ just below the Fermi level, its shift to lower energy from $(\pi,0)$ to $(\frac{\pi}{2},0)$, and the incoherent feature around $(0,0)$ and $(\pi,\pi)$. All these features are consistent with ARPES data \[Fig. 5 in Ref. , reproduced in Fig. \[fig:edc\](b)\]. This agreement supports our zero mechanism and shows that the incoherent feature can be interpreted as the effect of zeros of $G$: Since the zero surface exists just above the band around $(\pi,\pi)$ \[Fig. \[fig:fig2\](a)\] and since another one is located just below the band around $(0,0)$ \[not shown in Fig. \[fig:fig2\](a), but can refer to Fig. \[fig:rkw\_tp\](b) below\], the spectrum associated with the band is smeared around these momenta due to the large Im$\S$ around the zeros. While the suppression around $(\pi,\pi)$ is relevant to the emergence of Fermi arc,[@sk06; @sm09; @sm09-2] that around $(0,0)$ is related to the waterfall behavior discussed in the next subsection.
Waterfall {#ssec:wf}
---------
Recent ARPES [@kb05; @gg07; @xy07; @vk07; @mz07] observed an anomalous spectral structure, called “waterfall", at high binding energies $\sim 0.3\text{-}0.4$eV, where the band cutting the Fermi level suddenly loses the spectral weight and starts falling down to $\sim -0.7$eV with a suppressed intensity. Below the energy a strong intensity emerges again from nearly the same momentum as that the waterfall starts. This high-energy anomaly has been found quite generally in hole-doped cuprates, irrespective of the presence or absence of superconductivity, under, optimally or overdoped, and detailed compositions. Moreover similar features have been reported in other transition-metal compounds such as SVO$_3$ [@yt05] and LaNiO$_3$.[@ec09] These suggest a universality of the phenomenon in strongly-correlated metals.[@bk07]
The dynamical cluster approximation (DCA) + QMC study [@mj07] for the 2D Hubbard model with $t'=0$ reported a similar structure in the spectra. Based on the similarity of the DCA results to those with a perturbative calculation incorporating antiferromagnetic spin fluctuations, the authors proposed that the waterfall results from high-energy spin fluctuations. Here we implement a CDMFT+ED study, and closely examine how the pole-zero structure underlies the waterfall phenomenon and how the energy scale of the waterfall depends on model parameters. Our analysis indicates alternative interpretation for the phenomenon.
Figures \[fig:wf\](a)-(d) plot the spectral intensity calculated along the momentum cut from $(0,\frac{\pi}{8})$ to $(\frac{7\pi}{8},\pi)$ for various parameter sets. The results show nice resemblances with the ARPES result \[Fig. 1(c) in Ref. , reproduced in Fig. \[fig:wf\](e)\], i.e., (i) an abrupt change in the slope of the band around $\w=E_1$, accompanied by the simultaneous reduction of the intensity, (ii) nearly vertical dispersion with suppressed intensity in the waterfall region, and (iii) reemergence of a strong intensity around $\w=E_2$. The energy scale also agrees roughly with the experimental value, if one keeps in mind $t\sim 0.4$ eV.
We investigate how $E_1$ and $E_2$ depend on $t'$, $n$, and $U$. First, comparing Figs. \[fig:wf\](a) and (b), we see that $t'<0$ reduces both $|E_1|$ and $|E_2|$. Second, comparison of Figs. \[fig:wf\](b) and (c) shows that doping also reduces the energies. This doping dependence is qualitatively consistent with the DCA results [@mj07] for 16 sites cluster at a finite temperature. Third, the decrease of $U$ from $12t$ \[Fig. \[fig:wf\](a)\] to $8t$ \[Fig. \[fig:wf\](d)\] increases the energies.
These parameter dependences can be naturally explained as follows. In general, strong correlation effects make the width of coherent band (i.e., the band above $E_1$) narrower by increasing the mass of the low-energy particles. This leads to the decrease of $|E_1|$ as $U$ increases. Indeed the slope of the coherent band decreases from $1.3ta$ ($a$: the lattice constant) to $1.0ta$ as $U$ increases from $8t$ to $12t$. Meanwhile $t'$ lifts the band around the nodal direction, as will be discussed in Sec. \[ssec:tp\]. This elevates $E_1$ and $E_2$. The doping dependence seen in Figs. \[fig:wf\](b) and (c) can be qualitatively understood as a downward shift of the chemical potential with doping. As we showed in Ref. , in hole-doped Mott insulators doping causes a rigid-band-like shift of the chemical potential, though it cannot be described within the single-electron picture. In fact, the low-doping phase is not adiabatically connected with the Fermi liquid phase at higher dopings because of the intervening Lifshitz transition and the zero-surface emergence.
The above interpretation suggests that the energy scale of the waterfall is not necessarily related to the antiferromagnetic spin fluctuations [@mj07] but is considered to be a rather direct consequence of electron correlation, i.e., the mass renormalization of the coherent band. The picture is corroborated by the fact that a similar behavior can be seen within the single-site DMFT.[@bk07]
In view of the pole-zero structure in Fig. 1(b) in Ref. , the waterfall emerges in the energy region $-2t\lesssim\w\lesssim-t$, where many smeared pole and zero surfaces pile. The congestion of poles and zeros within the finite-cluster calculation indicates an incoherent nature of this energy-momentum region, which would result in the waterfall. Notice that the waterfall obtained in this paper has neither a gap nor dispersive features [@mj07], but a vertical structure with a suppressed intensity. This unusual structure comes out thanks to the use of the cumulant periodization (see Sec. \[sec:method\]) which can describe the strong momentum dependence of the self-energy. Below the pile we see a relatively coherent pole surface extending down to $\w\sim -3.5t$. This corresponds to the band reemerging at the high binding energy \[(iii)\]. Note that a comparison at higher binding energies is difficult because the ARPES spectra are overlapped by other Cu-$d$ or O-$p$ bands.
Low-energy kink in dispersion {#ssec:kink}
-----------------------------
In prior to the discovery of the waterfall, another anomaly (kink) in dispersion has been found in ARPES at lower binding energies [@bl00] and its origin has been in dispute. The kink is located at a binding energy around $0.05$eV, where the band cutting the Fermi level sharply changes its slope. In the normal state the kink is clearly seen around the nodal region while, as approaching the antinodal region, the band becomes flatter and then the kink becomes less visible. The band structure continuously changes from the nodal to antinodal region where a pseudogap exists just above the band.[@kr01; @sm03]
The CDMFT+ED results in Fig. \[fig:kink\] show similar behaviors: (i) The band suddenly changes the slope at a kink around $\w=-0.1t\sim -0.04$eV in the nodal region \[Fig. \[fig:kink\](a)\], and (ii) as approaching the antinode, the band becomes flatter and the slope change becomes weaker \[Fig. \[fig:kink\](b)\].
In general, the zero surface which generates the pseudogap pushes down the dispersion near the Fermi level. This makes a quick change of the slope of the dispersion distinct from the part deeply below the Fermi level, which may be the underlying origin of the kink formation. However, the sudden change of the dispersion observed in Fig. \[fig:kink\](a) naturally requires a precursory formation of a tiny zero surface around $\w=-0.1t$. This means a coupling of the quasiparticle with some other excitations with this energy, whichever bosonic or fermionic. The energy resolution of the present cluster size is not obvious and it could be an artifact of the present small cluster calculation. Nevertheless, it is remarkable to note that the observed kink in Fig. \[fig:kink\](a) is rather universal and we see similar kinks in other part of the quasiparticle dispersions, for instance in Fig. \[fig:rkw\_tp\](b) below. This may be alternatively interpreted that, in the strongly correlated region, the quasiparticle is strongly renormalized and may couple to various intrinsic electronic modes of charge and spin origins.
In high-$T_{\text{c}}$ cuprates the mechanism of the kink has been extensively discussed in the literature from the viewpoint of a coupling of electrons with some bosonic mode, such as phonon [@lb01] and magnetic ones.[@jv01; @kr01] Our result, however, implies that the kink may be a rather general phenomenon in the proximity to the Mott insulator,[@bk07] while the specific mechanism of kink formation is left for future studies.
Fermi arc and hole-pocket Fermi surface {#ssec:arc}
---------------------------------------
Next we shift our focus on the zero-energy electronic structure, namely, Fermi surface. The spectra in hole-doped cuprates have been extensively studied by ARPES.[@dh03] One of the most remarkable findings in these studies is the observation of truncated Fermi surfaces, called “Fermi arc".[@nd98]
Several authors have discussed the Fermi arc in terms of coexisting poles and zeros of $G$.[@sm09; @kr06; @et02; @bg06; @ks06; @sk06; @sm09-2; @sp07] In this mechanism hole-pocket Fermi surfaces around the nodal directions coexist with a zero surface around $(\pi,\pi)$. Because Im$\S$ is large around the zero surface, the pockets lose the spectral intensity more on the side closer to the zero surface, leaving arc-like spectra on the opposite side. This is reproduced in Figs. \[fig:pocket\](a) and (b). Figure \[fig:pocket\](a) shows the underlying pole-zero structure calculated by the CDMFT+ED at $T=0$ without any substantial smearing to the singularities, where a clear hole-pocket Fermi surface coexists with a zero surface. When we introduce a smearing to the singularities (see Sec. \[ssec:ed\]), we obtain the spectral map, Fig. \[fig:pocket\](b), in which the arc-like structure is observed.
We confirm the zero mechanism by directly calculating a spectral weight at finite temperatures by employing the CTQMC method as the solver for the CDMFT. To obtain the spectrum without through any analytic continuation procedure which inevitably suffers from a large error bar, we calculate $$\begin{aligned}
\label{eq:ghb}
-\b G(\Vec{k},\t=\beta/2)=\frac{\b}{2}
\int_{-\infty}^{\infty}\frac{A(\Vec{k},\w)}{\cosh(\b\w/2)}d\w\end{aligned}$$ as a function of $\Vec{k}$. This quantity is an integral of the spectral weight over a width $\sim T$ around $\w=0$ and approaches $A(\Vec{k},\w=0)$ for large $\beta$, so that gives an estimate of $A(\Vec{k},\w=0)$ at low temperatures.[@footnote2] In Figs. \[fig:pocket\](c) and (d) we plot the results at $T=0.025t$. For $n=0.95$ \[Fig. \[fig:pocket\](c)\] we see an arc at a location similar to the one in Fig. \[fig:pocket\](b) while for $n=0.9$ \[Fig. \[fig:pocket\](d)\] the spectra extend to the antinodal regions. The doping evolution of the spectra is qualitatively consistent with that obtained with the CDMFT+ED in Fig. 2(c)-(e) in Ref. . The qualitative agreement between the CDMFT+ED result with broadening $\eta$ and the CDMFT+CTQMC result at finite temperatures supports that the phenomenological smearing factor $\eta$ well simulates the thermal effects. Moreover it corroborates the above-mentioned zero mechanism for the emergence of the Fermi arc. We note that the zero surface around $(\pi,\pi)$ is also consistent with the results by other cluster schemes such as DCA, which observed a strong scattering amplitude in the momentum patch around $(\pi,\pi)$ in both $N_\text{c}=4$ (Ref. ) and $N_\text{c}=8$ (Ref. ) calculations.
Interestingly, recent high-resolution ARPES [@ml09] reported the existence of hole-pocket Fermi surfaces around the nodal directions in underdoped Bi$_2$Sr$_{2-x}$La$_x$CuO$_{6+\d}$. The observed hole pockets have much less intensity on the side closer to $(\pi,\pi)$ than the opposite. This is consistent with the zero mechanism in Fig. \[fig:pocket\](b). Important findings in the ARPES are that (i) the hole pockets are not located symmetrically with respect to the antiferromagnetic Brillouin zone boundary, i.e., $(\pi,0)\text{-}(0,\pi)$ line (and its symmetrically-related ones), and that (ii) the spectral intensity on the $(\pi,\pi)$ side is finite even in the nodal directions. (i) excludes several scenarios for the pseudogap, which attribute the pockets to symmetry breakings [@ks90; @v97; @cl01] because in these theories hole pockets should be centered symmetrically as to the $(\pi,0)\text{-}(0,\pi)$ line.[@ml09] Meanwhile (i) is consistent with our zero mechanism that does not assume any symmetry breaking. (ii) is at odds with the theory based on an ansatz that gives a zero intensity in the outer point of the pocket crossing the nodal direction,[@ml09] while it agrees well with our numerical data in Fig. \[fig:pocket\](b). This is more clearly seen in Fig. \[fig:pocket\](e), where we plot $A(\Vec{k},0)$ along the momentum cut in the nodal direction: For $\eta=0.01t$, in addition to the main peak at $\Vec{k}\simeq(0.56\pi,0.56\pi)$, we see the secondary peak at $\simeq (0.7\pi,0.7\pi)$, corresponding to the hole pocket structure. The second peak is, however, not visible for $\eta=0.1t$ and only the broadened main peak can be seen there. Namely, in our theory, the spectrum looks either a pocket like or an arc like depending on how the incoherence due to the zero surface is strong. The strength of the incoherence is controlled by the value of $\eta$ or temperature, or the distance between zeros and poles, as partly demonstrated in Fig. 4 in Ref. . Figure \[fig:pocket\](e) also suggests that the energy resolution required to detect the pocket in the example of the pole-zero structure as Fig. \[fig:pocket\](a) is in between $0.01t(\sim 4\text{meV})$ and $0.1t(\sim 40\text{meV})$, which roughly corresponds to the energy resolution in ARPES. This consideration on the incoherence explains why the pocket had not been detected until the recent high-resolution ARPES.[@ml09]
One obvious difference between Fig. \[fig:pocket\](b) and the ARPES [@ml09] is the location of the pocket: The pocket in Fig. \[fig:pocket\](b) resides closer to $(\pi,\pi)$ than that observed in the ARPES. This may be attributed to the difference between the model parameters we used and realistic ones for Bi$_2$Sr$_{2-x}$La$_x$CuO$_{6+\d}$. In particular, we show in the next subsection that the next-nearest-neighbor transfer $t'$, which is zero in Fig. \[fig:pocket\](b), indeed shifts the pocket in the direction to $(0,0)$.
Effect of the next nearest-neighbor transfer $t'$ {#ssec:tp}
-------------------------------------------------
Here we systematically study the effect of $t'$ on the electronic structure in lightly hole- and electron-doped regions. Figure \[fig:arc\_tp\] shows $t'$ dependence of the integrated spectra, Eq. (\[eq:ghb\]), calculated with CDMFT+CTQMC at $T=0.05t$ for (a)-(c) $U=8t$ and $n=0.93$ and (d)-(f) $U=12t$ and $n=0.90$. We see that the arc shifts to $(0,0)$ as $-t'/t$ increases, and that at $t'=-0.4t$, which is a reasonable value for Bi$_2$Sr$_{2-x}$La$_x$CuO$_{6+\d}$, the arc resides inside of the antiferromagnetic Brillouin zone, in consistency with experiments.[@ml09] We also see that $t'$ increases the curvature of the arc. A comparison with ARPES in further detail will require a more realistic determination of the model parameters, longer-range transfer integrals and Coulomb interactions, and a calculation on a larger cluster. These remain for future researches.
The above shift of the arc with $t'$ can be understood by plotting the underlying pole-zero structures. Figures \[fig:rkw\_tp\](a) and (b) compare the structures for $t'=0$ and $t'=-0.2t$ in a lightly hole-doped region. The figures show that at low energies $t'$ lifts the poles in the nodal direction while lowers them around the antinodes, as already expected from the bare dispersion Eq. (\[eq:disp\]). Then the hole pocket expands and the Fermi surface with the stronger intensity shifts to $(0,0)$ direction. We note that, as we discuss in the next subsection, the third-neighbor transfer integral, which is not taken into account in the present calculation but exists in real materials, further enhances the pocket around $(\frac{\pi}{2},\frac{\pi}{2})$.
The effect of $t'$ is totally different for electron-doped cases. Figures \[fig:rkw\_tp\](c) and (d) show the structures for $t'=0$ and $-0.2t$, respectively, in an electron-doped region. The effect of $t'$ at low energies is again understood by Eq. (\[eq:disp\]): $t'$ lifts the poles in the nodal direction while lowers around the antinodes. However, the consequence on the Fermi surface completely differs from that in hole-doped cases. For the particle-hole symmetric $t'=0$ case, the electron pockets appear around the nodes for electron doping, corresponding to the hole pockets in hole-doped cases, however, for finite $t'$, the electron pockets appear around the antinodes, as shown in Fig. \[fig:rkw\_tp\](d). This is because the low-energy zero surface pushes up the dispersion around $(0,\frac{\pi}{2})$. We compare the Fermi surface structure with ARPES for the electron-doped cuprates in detail in Sec. \[ssec:ele\].
High-energy spectra in electron-doped cuprates {#ssec:ele2}
----------------------------------------------
Recently high-energy spectra of an electron-doped cuprate Nd$_{1.85}$Ce$_{0.15}$CuO$_4$ were studied by ARPES.[@iy09] To discuss the results we first emphasize that here the ARPES observes a totally different energy region from that for hole-doped cuprates. This is illustrated in Figs. \[fig:wf2\](a) and (b): ARPES observes the lower Hubbard band (LHB) in hole-doped cases while in electron-doped cases it does ingap states between the Mott gap and the pseudogap, in addition to the pseudogap structure itself. As mentioned in Sec. \[ssec:eh\], with the electron-hole transformation the ARPES result can be interpreted as that for unoccupied states in a hole-doped system. Therefore the results in Ref. provide a precious opportunity to compare the calculated spectra of ingap states with experiments. The pseudogap and the Fermi surface are discussed in the next section.
The ARPES spectra and its second derivative in $\w$ (Fig. 1 in Ref. ) are reproduced in Figs. \[fig:wf2\](c)(d) and (e)(f), respectively. Around the antinode the spectra \[Fig. \[fig:wf2\](d)\] suddenly lose the intensity at $\w \simeq -0.4$eV. The analysis on the second derivative \[Fig. \[fig:wf2\](f)\] shows that the low-energy band reaches the bottom at this energy. On the other hand, around the node the low-energy band persists down to $\w \simeq -0.7$eV \[Fig. \[fig:wf2\](c)(e)\].
Figures \[fig:wf2\](g) and (h) depict the spectra calculated with the CDMFT+ED for $t'=-0.4t$, $U=12t$, and $n=1.11$ along momentum cuts, $(0,0)\text{-}(\pi,\pi)$ and $(0,\pi)\text{-}(\pi,\pi)$, respectively. For $\w<0$ we see that the band bottom is located at $\w\simeq -0.7t$ around $(0,\pi)$ while it is located at a higher binding energy $\w\simeq -t$ around $(0,0)$. This is consistent with the ARPES data. Note that the numerical data do not show any intensity below the band bottoms, $\w < -0.7t$ ($-t$) around $(0,\pi)$ \[$(0,0)$\], which is within the gap region between LHB and the ingap states, whereas the ARPES spectra show waterfall-like structures in $-1\text{eV}\lesssim \w \lesssim -0.7\text{eV}$ ($\w \lesssim -0.4\text{eV}$) around $(0,\pi)$ \[$(0,0)$\]. The origin of this discrepancy is not clear, but one possibility is a multiband effect, which is not considered in the present single-band model.
Meanwhile for $\w>0$, we see a waterfall in the dispersion at $\w\simeq t\text{-}2t$. This corresponds, with the electron-hole transformation, to the waterfall in hole-doped cases. The result predicts that this anomaly will be observed in electron-doped cuprates when the unoccupied spectra become available up to the high energy.[@footnote5]
Pseudogap and Fermi pockets in electron-doped cuprates {#ssec:ele}
------------------------------------------------------
Lastly we discuss low-energy electronic structures in electron-doped cases. The pseudogap has been experimentally observed also in electron-doped cuprates,[@ot01] although the doping range is much more limited than that in hole-doped cases due to the wider antiferromagnetic region near the undoped Mott insulator. The mechanism of the pseudogap has extensively been discussed within weak-coupling theories [@kr03; @kh04], which has successfully reproduced various experimental results such as the doping evolution of the Fermi surface. In these theories the mechanism has been ascribed to the antiferromagnetic long-range correlations. On the other hand, in the strong-coupling regime the cluster-perturbation theory [@st04] and the CDMFT [@cc05; @kk06] found that the pseudogap results from nonlocal but short-ranged dynamics without any long-range order or correlations. As pointed out in Ref. and , the gap amplitude does not scale as $J\sim t^2/U$, so that the short-ranged dynamics is not simply ascribed to the AF correlation. Because it is unknown which mechanism, weak-coupling or strong-coupling, is relevant to electron-doped cuprates, it is worthwhile to see whether and how experimental data are understood in the strong-coupling picture, especially from the perspective of zeros of $G$.
The available ARPES data for the electron doped cuprates seems to have relatively poor resolutions and a clear dispersion has not been reported. Nevertheless, a recent ARPES [@iy09-2] measurement appears to have revealed the structure of the pseudogap for a family of electron-doped cuprates, $Ln_{2-x}$Ce$_x$CuO$_4$ ($Ln=$ Nd, Sm, and Eu). In Fig. 2 in Ref. the EDC peak position jumps from $\w\sim-0.03$eV to $\w\sim-0.15$eV around antinode, which implies the presence of the pseudogap opening below the electron pocket. This highly asymmetric position of the pseudogap is a feature which cannot be seen by ARPES for the hole-doped cuprates but observable for electron-doped ones: Because in electron-doped cases the zero surface forming the pseudogap mainly extends below $E_\text{F}$ \[see Fig. \[fig:rkw\_tp\](d)\], the ARPES can observe the major part of the pseudogap, in contrast to the hole-doped cases. Around the node, the EDC peak position saturates at $\w\sim-0.05$eV for $Ln=$Eu compound, implying the pseudogap at $\omega \gtrsim -0.05$eV, while the pseudogap is not clear for $Ln=$Nd in EDC. This is consistent with the observation in Fig. \[fig:rkw\_tp\] that the pseudogap position in the nodal region is lowered for smaller $|t'/t|$ and that the Eu compound appears to have a relatively small $|t'/t|$. Namely, the main part of the pseudogap in the nodal region of the Nd compound is located in the positive energy side, while it becomes visible below $E_\text{F}$ for the Eu compound. This suggests a gap around the node, which can be interpreted as an indirect evidence of a gap opening above $E_\text{F}$ in hole-doped cases via the electron-hole transformation. These observations are qualitatively consistent with the pole-zero structure in Fig. \[fig:rkw\_tp\](d), supporting the non-$d$-wave (fully-opened) pseudogap proposed in Sec. \[ssec:nond\]. We propose to perform ARPES measurements of the electron doped compounds with a better resolution than Ref. , because the pseudogap appears to be suggested only by the jump in EDC and the detailed pseudogap structure in the momentum space is not very clear so far.
The ARPES [@ar02; @iy09-2] has also revealed a characteristic evolution of the Fermi surface with doping. Figures \[fig:edope\](a)-(c) are the reproductions of the ARPES results (Fig. 3 in Ref. ) on Nd$_{2-x}$Ce$_x$CuO$_4$. The ARPES study found that (i) at small doping ($x=0.04$) strong intensity emerges around $(\pi,0)$ and its symmetrically-related points \[Fig. \[fig:edope\](a)\], (ii) as doping is increased, additional intensity develops around $(\frac{\pi}{2},\frac{\pi}{2})$ \[Fig. \[fig:edope\](b)\], and (iii) at large doping the spectra merge, forming a single large surface around $(\pi,\pi)$ \[Fig. \[fig:edope\](c)\]. In Ref. it is also seen that the band cutting the Fermi level at around $(\frac{\pi}{2},\frac{\pi}{2})$ evolves with doping from a high to low binding energy while that around $(\pi,0)$ emerges first around the Fermi level and extends to a high binding energy. This suggests that the Fermi surface around $(\frac{\pi}{2},\frac{\pi}{2})$ is a hole pocket while the one around $(\pi,0)$ is an electron pocket.
The above features (i) and (iii) were qualitatively reproduced by the cluster perturbation theory [@st04] and by CDMFT with the $\S$ [@cc05] and $G$ [@kk06] periodizations on the 2D Hubbard model at $T=0$. In Ref. and the suppression of the intensity around the node at low dopings was understood by the presence of the hot spot, where Im$\S$ is large, in this region.
In the following we clarify how the above observations (i)-(iii) can be understood in terms of the underlying zero surface. First, we show the CDMFT+CTQMC results at $T=0.05t$. Figures \[fig:edope\](d)-(f) depict the integrated low-energy spectra, Eq. (\[eq:ghb\]), for $t'=-0.4t$, $U=12t$, at $5$, $10$, and $15$% electron dopings, respectively. At $n=1.05$ a strong intensity emerges only around the antinodal points, in accord with (i). A large Fermi surface around $(\pi,\pi)$ at $n=1.15$ agrees with (iii). As to (ii), our results do not show strong intensity around $(\frac{\pi}{2},\frac{\pi}{2})$; this will be attributed to the absence of the third-neighbor transfer integral $t''$ in the present calculation, as discussed below.
Second, Figs. \[fig:edope\](g)-(i) show the CDMFT+ED results for $t'=-0.4t$ and $U=12t$ at $n=1.14$, $1.17$, and $1.19$, respectively. We see that a zero surface exists at the Fermi level, surrounding $(0,0)$. For low dopings electron-pocket Fermi surfaces reside around the antinodal points. As the doping is increased, the pockets expand. Then they merge around the nodal point and change the topology into two Fermi surfaces, one around $(\pi,\pi)$ and the other around $(0,0)$. Further doping makes the inner Fermi surface annihilate in pair with the zero surface, resulting in the Fermi liquid with the single large Fermi surface around $(\pi,\pi)$.[@footnote3] Thus in electron doping there occur, at least, two phase transitions, the Lifshitz transition [@ko07] and a pole-zero annihilation transition, on the way from the Mott insulator to the Fermi liquid.
The presence of the zero surface accounts for the weak spectral intensity around the nodal direction in Figs. \[fig:edope\](d) and (e). Then how is the intensity around the node in Fig. \[fig:edope\](b) and (c) explained? To answer this we consider how the electronic structure, Fig. \[fig:rkw\_tp\](d), changes with $t''$, which is not included in our calculations based on the $2\times2$ cluster. Although $|t''|$ is usually several times smaller than $|t'|$ and therefore negligible for discussing global electronic structures, it can be crucial to understand the nodal intensity. This is because around $(\frac{\pi}{2},\frac{\pi}{2})$ the pole surface at $\w\simeq -0.15t$ in Fig. \[fig:rkw\_tp\](d) moves up with $-t'/t$, as seen in comparison with Fig. \[fig:rkw\_tp\](c), and is located just below $E_{\text{F}}$ for $-t'/t=0.4$ (not shown). Since to the first approximation $t''(>0)$ elevates dispersions around $(\frac{\pi}{2},\frac{\pi}{2})$ while lowers around $(0,0)$, $(\pi,\pi)$, $(\pi,0)$, and $(0,\pi)$, according to $$\begin{aligned}
\e(\Vec{k}) \rightarrow \e(\Vec{k})-2t''[\cos(2k_x)+\cos(2k_y)],\end{aligned}$$ a hole pocket can emerge around $(\frac{\pi}{2},\frac{\pi}{2})$. This hole pocket will show up just inside the zero surface in Figs. \[fig:edope\](g) and (h). Recent experimental observation [@hk09] of the Shubnikov-de Haas oscillation in Nd$_{2-x}$Ce$_x$CuO$_4$ also indicates a presence of the hole pocket around optimal doping. Therefore, to confirm the above scenario with a larger cluster calculation incorporating $t''$ is an intriguing future problem.
We note some additional indications of the zero surface in experiments. In Fig. 2(c)-(e) in Ref. , which plotted the ARPES EDCs for Nd$_{2-x}$Ce$_x$CuO$_4$ along the underlying Fermi surface, a clear jump of the peak positions can be seen between the nodal and antinodal directions. This indicates the presence of the zero surface around the jump, in accord with the above picture \[see Fig. \[fig:rkw\_tp\](d)\]. In Fig. 1 in Ref. , which plotted the ARPES spectra at the Fermi level, a similar structure to Fig. \[fig:edope\](c) was found while it clearly shows a finite intensity in some regions on the $(\pi,0)\text{-}(0,\pi)$ line. This appears to be inconsistent with the zero surface on the $(\pi,0)\text{-}(0,\pi)$ line assumed in Ref. for hole-doped cases, but compatible with our zero surface around $(0,0)$ as seen in Figs. \[fig:edope\](g) and (h).
SUMMARY AND CONCLUSION {#sec:summary}
======================
In summary, we have shown that various spectral anomalies observed in the pseudogap states of hole- or electron-doped cuprates are naturally understood in terms of underlying pole-zero structure of electronic Green’s function. The pole-zero structure has been calculated for the paramagnetic metallic phase in the 2D Hubbard model with employing the CDMFT+ED at $T=0$ and the CDMFT+CTQMC at $T>0$. We have confirmed that the cumulant periodization scheme [@sk06] is suited for the parameter region of our interest, namely lightly doped Mott insulator in the intermediate to strong coupling region, since the cumulant is well localized within the cluster that we employed, as demonstrated in APPENDIX B. This corroborates the convergence and reliability of our momentum resolution in the studies on Fermi surface topology and the differentiation in the momentum space. Furthermore, the cumulant periodization is useful since it enables to study the coexistence of pole and zero surfaces.
The result calculated by CDMFT+ED shows a pseudogap in the lightly doped region around the Mott insulator. The pseudogap is characterized by a low-energy zero surface, which connects the bifurcated low-energy bands \[Fig. \[fig:fig2\](a)\]. In hole-doped cases the lower band cuts the Fermi level while the upper one resides at the energy higher than and adjacent to the pseudogap above the Fermi level. This directly leads to (i) the non-$d$-wave character of the fully opened pseudogap and (ii) the spectral asymmetry around the Fermi level. Looking into the structure around $(\pi,\pi)$ we have also found that a large Re$\S$ around the zero surface causes (iii) the back-bending dispersion. All of (i), (ii), and (iii) are consistent with experiments semiquantitatively. The agreement imposes a strong constraint on theories for pseudogap: Although (ii) and (iii) have been interpreted as evidences of the preformed pairing in the literatures, (i) is in sharp contrast to $d$-wave-gap scenarios including those by preformed pair. It is compatible neither with other precursory or real $d$-wave-type symmetry breakings such as $d$-density wave nor with commensurate antiferromagnetism. We have confirmed a full gap formation at the nodal point in a larger-cluster calculation in APPENDIX C. Moreover, the non-$d$-wave gap is supported by the agreement of our result on the pseudogap structure with that observed by ARPES for electron-doped cuprates.
The zero mechanism also enables a simple and unified understanding of various spectral anomalies: In hole-doped cases the same zero surface which causes the back-bending behavior around the antinode induces the incoherence around $(\pi,\pi)$, Fermi pockets and Fermi arcs, while a pile of pole and zero surfaces at a higher binding energy results in the high-energy kink (waterfall) and the incoherence around $(0,0)$. Moreover we have found a low-energy kink structure in the nodal dispersion. On the other hand, in electron-doped cases the zero surface which constitutes the pseudogap crosses the Fermi level around $(0,0)$, making electron pockets around the antinodes. All these features are consistent with experimental results. We would like to emphasize that the zero surface does not result from symmetry breakings, but is a direct consequence of the strong correlation effect, i.e., proximity to the Mott insulator.
To elucidate the effect of zeros at finite temperatures, we have also implemented CDMFT+CTQMC calculations. The results qualitatively agree with those of CDMFT+ED with a smearing factor $\eta$, which confirms that the thermal scatterings broaden the effect of zeros and indeed create the characteristic spectra similar to those observed in the cuprates.
To conclude, the origins of various anomalies in the electronic structure of the normal state in the high-$T_{\text{c}}$ cuprates are unified into the presence of the low-energy zero surface which persists against doping. The zero surface is also expected to cause anomalous metallic behaviors in other physical quantities, such as the specific heat, electronic resistivity, and Hall coefficient.[@ts99] Comparisons of these quantities with experiments remain for future studies.
Although the microscopic mechanism creating the zero surface has not been discussed in this paper, it has emerged clearly as the proximity to the Mott insulator. The similarity in the structure of the zero surfaces between the pseudogap and the Mott gap in the undoped system \[see Fig. 1(a) in Ref. \] also implies the Mott origin of the pseudogap. At the same time, however, the pseudogap does not appear as that directly or continuously connected to the zero surface which forms the Mott gap in the undoped state. This is because, for example in the hole-doped case, the zero surface creating the fully-opened pseudogap is bounded above by the existence of low-energy excitations far below the upper Hubbard band (UHB). The reason why the ingap states are separated by the pseudogap from the main quasiparticle band is left for an important future issue. In Ref. we proposed a scenario in which the emergence of such a zero surface in the low-energy scale and the resultant pseudogap are a remnant of the binding of doubly occupied site (doublon) and empty site (holon) drastically weakened by the screening of Coulomb repulsions by mobile carriers. This has something to do neither with any symmetry breaking nor with its precursor. Recently, it has been proposed that a gap arising from hybridization between the quasiparticle and a composite fermion excitation is responsible for the pseudogap and the related zero surface. [@yamaji10] Possible supplementary role of strong antiferromagnetic fluctuations are left for future studies. Further study on the mechanism of pseudogap will be described elsewhere.
ACKNOWLEDGMENT {#acknowledgment .unnumbered}
==============
S. S. thanks Masafumi Udagawa, Giorgio Sangiovanni and Alessandro Toschi, and M. I. thanks Youhei Yamaji for useful discussions. S. S. is also grateful to Karsten Held for the hospitality. This work is supported by a Grant-in-Aid for Science Research on Priority Area “Physics of New Quantum Phases in Superclean Materials" (Grant No.17071003) from MEXT, Japan. S. S. is supported by Research Fellowship of the Japan Society for the Promotion of Science for Young Scientists. The calculations are partly performed at the Supercomputer Center, ISSP, University of Tokyo.
APPENDIX A: Breakdown of $\S$ periodization for the Mott insulator {#appendix-a-breakdown-of-s-periodization-for-the-mott-insulator .unnumbered}
==================================================================
Here we note that a standard periodization technique, which substitutes $Q=\S$ to Eq. (\[eq:periodize\]), cannot reproduce the Mott gap for large $U$. Because Im$G=0$ in the Mott gap, Im$\S$ must be 0 or $\infty$ in the whole Brillouin zone. However, this situation does never occur in Eq. (\[eq:periodize\]) with $Q=\S$ unless $^\forall i,j \in \text{C}, {\rm Im}\S_{ij}^{\text{C}}=0$ or $^\exists (ij), \S_{ij}^{\text{C}}=\infty$ for all $\w$ inside the gap, and these conditions are never satisfied as far as both $t$ and $U$ are nonzero and finite.
As a matter of fact, we see the electronic structure shown in Fig. \[fig:speriodize\](a) when we use the $\S$-periodization procedure for the same Mott insulator shown in Fig. 1(a) in Ref. \[and reproduced in Fig. \[fig:speriodize\](b) for comparison\]. We see that zeros of $G$ exist only at the Fermi level without a dispersion, and that poles of $G$ extend to the Fermi level around $(0,0)$ from the positive $\w$ side and around $(\pi,\pi)$ from the negative $\w$ side, making the density of states half metallic. This failure of the $\S$ periodization in the Mott insulator is ascribed to the fact that $\S$ is not localized within the $2\times 2$ cluster.[@sk06] The nonlocality of $\S$ is a direct consequence of the presence of dispersive zeros of $G$, i.e., momentum-dependent divergence of $\S$.
As we have discussed so far, zeros of $G$ still persist in doped Mott insulators up to a critical doping level beyond which the Fermi liquid emerges. Therefore $\S$ should be highly nonlocal also in the non-Fermi-liquid region and the $\S$ periodization again breaks down there. On the contrary, the cumulant $M$ is well localized within the $2\times 2$ cluster in this region, as we mentioned in Sec. \[sec:method\]. In APPENDIX B we give another numerical evidence for the locality of the cumulant in doped Mott insulators.
APPENDIX B: Locality of cumulant in doped Mott insulators {#appendix-b-locality-of-cumulant-in-doped-mott-insulators .unnumbered}
=========================================================
Here we present a CDMFT+QMC result for an $N_{\text{c}}=4\times 4$ cluster in a parameter region of doped Mott insulators. We use the Hirsch-Fye algorithm [@hf86] and calculate the cluster cumulant $M^{\text{C}}$ for $t'=0$, $U=8t$, $n=0.91$, and $T=0.1t$.
Figures \[fig:cum\](a) and (b) show $\w_n$ dependence of the real and imaginary parts of the cumulant $M(\Vec{r},\w_n)$, respectively, where $\Vec{r} = (i,j)$ is the real-space vector connecting the sites $i$ and $j$ in the cluster \[the inset of Fig. \[fig:cum\](b)\]. We notice that $\Vec{r}=(0,0)$, (1,0), and (1,1) components are much larger than the other components at longer distances. This can be more clearly seen in Fig. \[fig:cum\](c), where the cumulant at the lowest Matsubara frequency, $\w_0$, is plotted against the Euclidean distance, $\sqrt{i^2+j^2}$. We find that the cumulant is well localized within the $2\times 2$ cluster, which justifies the $M$ periodization.
Although the cumulant at $T=0$ might be more extended than that at $T=0.1t$, we do not have a tractable way to examine it for a cluster larger than $2\times 2$. It is worthwhile, however, to note that the finite-temperature results obtained by our CDMFT+CTQMC calculation are consistent with the CDMFT+ED results with finite $\eta$’s, as discussed in Sec. \[ssec:arc\]. This fact implies that the $M$ periodization with $2\times 2$ cluster still remains a good approximation even at $T=0$.
APPENDIX C: Nodal spectra obtained by 8-site CDMFT+CTQMC {#appendix-c-nodal-spectra-obtained-by-8-site-cdmftctqmc .unnumbered}
========================================================
To demonstrate the fully-opened pseudogap in a larger cluster, we implement an 8-site cluster calculation with CDMFT+CTQMC. We calculate the spectral function $A(\Vec{k},\w)$ at $\Vec{k}=\Vec{k}_\text{node}\equiv(\pi/2,\pi/2)$, where the $d$- and $s$-wave (fully-opened) pseudogaps are most distinguishable. The spectral function is obtained from $G(\Vec{k},i\w_n)$ through the maximum-entropy method.
Figure \[fig:8site\] shows $A(\Vec{k}_\text{node},\w)$ for $t'=-0.2t$, $U=8t$, and $n=0.95$. The small but clear gap just above the Fermi level at $T=0.05t$ proves the fully-opened pseudogap.[@footnote4] The gap vanishes at a higher temperature $T=0.1t$. This is why the previous DCA study [@mj06] at a high temperature $T=0.12t$ did not observe the gap. Note that, a very recent study with 8-site DCA [@lg10] at $T=0.05t$ also detected a wispy reduction of the spectral weight at $\Vec{k}_\text{node}$ at low doping though the signal was so weak that it was not explicitly analyzed in their paper. The weakness of the signal would be due to the flat momentum dependence of the self-energy in each momentum patch in the DCA. Although the suppression of the spectrum is more subtle at higher doping in their result, it is reasonable because the pseudogap temperature decreases with doping.
The gap formation at the nodal point cannot be reproduced by the assumption of the $d$-wave pseudogap. We have confirmed this by employing the assumed form of the Green function employed in Ref. .
T. Timusk and B. Statt, Rep. Prog. Phys. [**62**]{}, 61 (1999). A. Damascelli, Z. Hussain, and Z.-X. Shen, Rev. Mod. Phys. [**75**]{}, 473 (2003). Y. Yanase, T. Jujo, T. Nomura, H. Ikeda, T. Hotta, and K. Yamada, Phys. Rep. [**387**]{}, 1 (2003). V. J. Emery and S. A. Kivelson, Nature (London) [**374**]{}, 434 (1995). A. Kampf and J. R. Schrieffer, Phys. Rev. B [**41**]{}, 6399 (1990). D. Pines, Z. Phys. B [**103**]{}, 129 (1997). Y. M. Vilk and A.-M. S. Tremblay, J. Phys. I France [**7**]{}, 1309 (1997). S. A. Kivelson, I. P. Bindloss, E. Fradkin, V. Oganesyan, J. M. Tranquada, A. Kapitulnik, and C. Howald, Rev. Mod. Phys. [**75**]{}, 1201 (2003). C. M. Varma, Phys. Rev. B [**55**]{}, 14554 (1997). S. Chakravarty, R. B. Laughlin, D. K. Morr, and C. Nayak, Phys. Rev. B [**63**]{}, 094503 (2001). T. M. Rice, Prog. Theor. Phys. Suppl. [**160**]{}, 39 (2005). T. D. Stanescu and P. Phillips, Phys. Rev. Lett. [**91**]{}, 017002 (2003). T. D. Stanescu and G. Kotliar, Phys. Rev. B [**74**]{}, 125110 (2006); T. D. Stanescu, M. Civelli, K. Haule, and G. Kotliar, Ann. Phys. (N. Y.) [**321**]{}, 1682 (2006). P. Philips, T.-P. Choy, and R. G. Leigh, Rep. Prog. Phys. [**72**]{}, 036501 (2009). S. Sakai, Y. Motome, and M. Imada, Phys. Rev. Lett. [**102**]{}, 056404 (2009).
A. Georges, G. Kotliar, W. Krauth, and M. J. Rozenberg, Rev. Mod. Phys. [**68**]{}, 13 (1996). G. Kotliar, S. Y. Savrasov, G. Palsson, and G. Biroli, Phys. Rev. Lett. [**87**]{}, 186401 (2001). T. Maier, M. Jarrell, T. Pruschke, and M. H. Hettler, Rev. Mod. Phys. [**77**]{}, 1027 (2005). Th. A. Maier, Th. Pruschke, and M. Jarrell, Phys. Rev. B [**66**]{}, 075102 (2002). D. Seńećhal and A.-M. S. Tremblay, Phys. Rev. Lett. [**92**]{}, 126401 (2004). M. Civelli, M. Capone, S. S. Kancharla, O. Parcollet, and G. Kotliar, Phys. Rev. Lett. [**95**]{}, 106402 (2005). B. Kyung, S. S. Kancharla, D. Seńećhal, A.-M. S. Tremblay,M. Civelli, and G. Kotliar, Phys. Rev. B [**73**]{}, 165114 (2006). A. Macridin, M. Jarrell, T. Maier, P. R. C. Kent, and E. D’Azevedo, Phys. Rev. Lett [**97**]{}, 036401 (2006). M. Aichhorn, E. Arrigoni, M. Potthoff, and W. Hanke, Phys. Rev. B [**74**]{}, 024508 (2006). K. Haule and G. Kotliar, Phys. Rev. B [**76**]{}, 104509 (2007). A. Liebsch and N.-H. Tong, Phys. Rev. B [**80**]{}, 165126 (2009). M. Ferrero, P. S. Cornaglia, L. De Leo, O. Parcollet, G. Kotliar, and A. Georges, Phys. Rev. B [**80**]{}, 064501 (2009).
A. Macridin, M. Jarrell, T. Maier, and D. J. Scalapino, Phys. Rev. Lett. [**99**]{}, 237001 (2007). P. Werner, E. Gull, O. Parcollet, and A. J. Millis, Phys. Rev. B [**80**]{}, 045120 (2009); E. Gull, O. Parcollet, P. Werner, and A. J. Millis, [*ibid*]{} [**80**]{}, 245102 (2009). S. Sakai, Y. Motome, and M. Imada, Physica B [**404**]{}, 3183 (2009). I. Dzyaloshinskii, Phys. Rev. B [**68**]{}, 085113 (2003). T. D. Stanescu, P. Phillips, and T.-P. Choy, Phys. Rev. B [**75**]{}, 104503 (2007). R. M. Konik, T. M. Rice, and A. M. Tsvelik, Phys. Rev. Lett. [**96**]{}, 086407 (2006); K.-Y. Yang, T. M. Rice, and F.-C. Zhang, Phys. Rev. B [**73**]{}, 174501 (2006); K.-Y. Yang, H.-B. Yang, P. D. Johnson, T. M. Rice, and F.-C. Zhang, Europhys. Lett. [**86**]{}, 37002 (2009); K. Le Hur and T. M. Rice, Ann. Phys. [**324**]{}, 1452 (2009). E. Z. Kuchinskii and M. V. Sadovskii, JETP [**103**]{}, 415 (2006). F. H. L. Essler and A. M. Tsvelik, Phys. Rev. B [**65**]{}, 115117 (2002); [**71**]{}, 195116 (2005). C. Berthod, T. Giamarchi, S. Biermann, and A. Georges, Phys. Rev. Lett. [**97**]{}, 136401 (2006). M. S. Hybertsen, E. B. Stechel, M. Schluter, and D. R. Jennison, Phys. Rev. B [**41**]{}, 11068 (1990).
C. Lanczos, J. Research NBS [**45**]{}, 255 (1950). E. R. Gagliano and C. A. Balseiro, Phys. Rev. Lett. [**59**]{}, 2999 (1987). S. M. A. Rombouts, K. Heyde, and N. Jachowicz, Phys. Rev. Lett. [**82**]{}, 4155 (1999). S. Sakai, R. Arita, and H. Aoki, Physica B [**378-380**]{}, 288 (2006); S. Sakai, R. Arita, K. Held, and H. Aoki, Phys. Rev. B [**74**]{}, 155102 (2006). E. Gull, P. Werner, O. Parcollet, and M. Troyer, Eur. Phys. Lett. [**82**]{}, 57003 (2008). S. Rombouts, K. Heyde, and N. Jachowicz, Phys. Lett. A [**242**]{}, 271 (1998). J. E. Hirsch, Phys. Rev. B [**28**]{}, 4059 (1983); [**29**]{}, 4159 (1984). L. Balents, M. P. A. Fisher, and C. Nayak, Int. J. Mod. Phys. B [**12**]{}, 1033 (1998). M. Franz and Z. Tesanovic, Phys. Rev. Lett. [**87**]{}, 257003 (2001). M. R. Norman, H. Ding, M. Randeria, J. C. Campuzano, T. Yokoya, T. Takeuchi, T. Takahashi, T. Mochiku, K. Kadowaki, P. Guptasarma, and D. G. Hinks, Nature [**392**]{}, 157 (1998). T. Hanaguri, C. Lupien. Y. Kohsaka, D.-H. Lee, M. Azuma, M. Takano, H.Takagi, and J. C. Davis, Nature [**430**]{}, 1001 (2004). H.-B. Yang, J. D. Rameau, P. D. Johnson, T. Valla, A. Tsvelik, and G. D. Gu, Nature [**456**]{}, 77 (2008). J. Bardeen, L. N. Cooper, and J. R. Schrieffer, Phys. Rev. [**108**]{}, 1175 (1957). A. L. Efros and B. I. Shklovskii, J. Phys. C [**8**]{}, L49 (1975). H. Shinaoka and M. Imada, Phys. Rev. Lett. [**102**]{}, 016404 (2009); J. Phys. Soc. Jpn. [**78**]{}, 094708 (2009). A. Kanigel, U. Chatterjee, M. Randeria, M. R. Norman, G. Koren, K. Kadowaki, and J. C. Campuzano, Phys. Rev. Lett. [**101**]{}, 137002 (2008). M. Hashimoto, R.-H. He, K. Tanaka, J.-P. Testaud, W. Meevasana, R. G. Moore, D. Lu, H. Yao, Y. Yoshida, H. Eisaki, T. P. Devereaux, Z. Hussain, and Z.-X. Shen, Nature Phys. NPHYS1632 (2010). R. Preuss, W. Hanke, C. Grober, and H. G. Evertz, Phys. Rev. Lett. [**79**]{}, 1122 (1997). T. Yoshida, X. J. Zhou, D. H. Lu, S. Komiya, Y. Ando, H. Eisaki, T. Kakeshita, S. Uchida, Z. Hussain, Z.-X. Shen, and A. Fujimori, J. Phys.: Condens. Matter [**19**]{}, 125209 (2007). A. A. Kordyuk, S. V. Borisenko, A. Koitzsch, J. Fink, M. Knupfer, and H. Berger, Phys. Rev. B. [**71**]{}, 214513 (2005). J. Graf, G.-H. Gweon, K. McElroy, S. Y. Zhou, C. Jozwiak, E. Rotenberg, A. Bill, T. Sasagawa, H. Eisaki, S. Uchida, H. Takagi, D.-H. Lee, and A. Lanzara, Phys. Rev. Lett. [**98**]{}, 067004 (2007). B. P. Xie, K. Yang, D. W. Shen, J. F. Zhao, H. W. Ou, J. Weil, S. Y. Gu, M. Arita, S. Qiao, H. Namatame, M. Taniguchi, N. Kaneko, H. Eisaki, K. D. Tsuei, C. M. Cheng, I. Vobornik, J. Fujii, G. Rossi, Z. Q. Yang, and D. L. Feng, Phys. Rev. Lett. [**98**]{}, 147001 (2007). T. Valla, T. E. Kidd, W.-G. Yin, G. D. Gu, P. D. Johnson, Z.-H. Pan, and A. V. Fedorov, Phys. Rev. Lett. [**98**]{}, 167003 (2007). W. Meevasana, X. J. Zhou, S. Sahrakorpi, W. S. Lee, W. L. Yang, K. Tanaka, N. Mannella, T. Yoshida, D. H. Lu, Y. L. Chen, R. H. He, Hsin Lin, S. Komiya, Y. Ando, F. Zhou, W. X. Ti, J. W. Xiong, Z. X. Zhao, T. Sasagawa, T. Kakeshita, K. Fujita, S. Uchida, H. Eisaki, A. Fujimori, Z. Hussain, R. S. Markiewicz, A. Bansil, N. Nagaosa, J. Zaanen, T. P. Devereaux, and Z.-X. Shen, Phys. Rev. B. [**75**]{}, 174506 (2007). T. Yoshida, K. Tanaka, H. Yagi, A. Ino, H. Eisaki, A. Fujimori, and Z.-X. Shen, Phys. Rev. Lett. [**95**]{}, 146404 (2005). R. Eguchi, A. Chainani, M. Taguchi, M. Matsunami, Y. Ishida, K. Horiba, Y. Senba, H. Ohashi, and S. Shin, Phys. Rev. B [**79**]{}, 115122 (2009). K. Byczuk, M. Kollar, K. Held, Y.-F. Yang, I. A. Nekrasov, Th. Pruschke, and D. Vollhardt, Nature Phys. [**3**]{}, 168 (2007). P. V. Bogdanov, A. Lanzara, S. A. Kellar, X. J. Zhou, E. D. Lu, W. J. Zheng, G. Gu, J.-I. Shimoyama, K. Kishio, H. Ikeda, R. Yoshizaki, Z. Hussain, and Z. X. Shen, Phys. Rev. Lett. [**85**]{}, 2581 (2000). A. Kaminski, M. Randeria, J. C. Campuzano, M. R. Norman, H. Fretwell, J. Mesot, T. Sato, T. Takahashi, and K. Kadowaki, Phys. Rev. Lett. [**86**]{}, 1070 (2001). T. Sato, H. Matsui, T. Takahashi, H. Ding, H.-B. Yang, S.-C.Wang, T. Fujii, T. Watanabe, A. Matsuda, T. Terashima, and K. Kadowaki, Phys. Rev. Lett. [**91**]{}, 157003 (2003). A. Lanzara, P. V. Bogdanov, X. J. Zhou, S. A. Kellar, D. L. Feng, E. D. Lu, T. Yoshida, H. Eisaki, A. Fujimori, K. Kishio, J.-I. Shimoyama, T. Nodak, S. Uchidak, Z. Hussain, and Z.-X. Shen, Nature [**412**]{}, 510 (2001). P. D. Johnson, T. Valla, A. V. Fedorov, Z. Yusof, B. O. Wells, Q. Li, A. R. Moodenbaugh, G. D. Gu, N. Koshizuka, C. Kendziora, Sha Jian, and D. G. Hinks, Phys. Rev. Lett. [**87**]{}, 177007 (2001). Note that ARPES spectra are also usually integrated around the Fermi level and that a typical width of the energy window is $\sim 10\text{meV} \sim 0.025t$, which is similar to the $T$ window used in Eq. (\[eq:ghb\]). E. Gull, P. Werner, X. Wang, M. Troyer, and A. J. Millis, Europhys. Lett. [**84**]{}, 37009 (2008). J. Meng, G. Liu, W. Zhang, L. Zhao, H. Liu, X. Jia, D. Mu, S. Liu, X. Dong, J. Zhang, W. Lu, G. Wang, Y. Zhou, Y. Zhu, X. Wang, Z. Xu, C. Chen, and X. J. Zhou, Nature [**462**]{}, 335 (2009). M. Ikeda, T. Yoshida, A. Fujimori, M. Kubota, K. Ono, Y. Kaga, T. Sasagawa, and H. Takagi, Phys. Rev. B. [**80**]{}, 184506 (2009). The spectral feature that the band bottom is at a higher energy around $(\pi,0)$ than around $(0,0)$, as well as a waterfall-like structure at $\w>0$, can also be seen in Fig. 5(b) in Ref. . Y. Onose, Y. Taguchi, K. Ishizaka, and Y. Tokura, Phys. Rev. Lett. [**87**]{}, 217001 (2001). H. Kusunose and T. M. Rice, Phys. Rev. Lett. [**91**]{}, 186407 (2003). B. Kyung, V. Hankevych, A.-M. Dare, and A.-M. S. Tremblay, Phys. Rev. Lett. [**93**]{}, 147004 (2004). M. Ikeda, T. Yoshida, A. Fujimori, M. Kubota, K. Ono, H. Das, T. Saha-Dasgupta, K. Unozawa, Y. Kaga, T. Sasagawa, and H. Takagi, Phys. Rev. B [**80**]{}, 014510 (2009). N. P. Armitage, F. Ronning, D. H. Lu, C. Kim, A. Damascelli, K. M. Shen, D. L. Feng, H. Eisaki, Z.-X. Shen, P. K. Mang, N. Kaneko, M. Greven, Y. Onose, Y. Taguchi, and Y. Tokura, Phys. Rev. Lett. [**88**]{}, 257001 (2002). The doping evolution of the Fermi surface and zero surface in hole-doped cases was discussed in Ref. . M. M. Korshunov and S. G. Ovchinnikov, Eur. Phys. J. B [**57**]{}, 271 (2007); M. M. Korshunov, E. V. Zakharova, I. A. Nekrasov, Z. V. Pchelkina, and S. G. Ovchinnikov, J. Phys.: Condens. Matter [**22**]{}, 015701 (2010). T. Helm, M. V. Kartsovnik, M. Bartkowiak, N. Bittner, M. Lambacher, A. Erb, J. Wosnitza, and R. Gross, Phys. Rev. Lett. [**103**]{}, 157002 (2009). N. Lin, E. Gull, and A. J. Millis, arXiv:1004.2999. Y. Yamaji and M. Imada, unpublished. J. E. Hirsch and R. M. Fye, Phys. Rev. Lett. [**56**]{}, 2521 (1986). The density of states also shows a gap at the corresponding energy.
|
{
"pile_set_name": "ArXiv"
}
|
Q:
ajax post return the html
I have this ajax function (refer below)
$.ajax({
url: "processor.php",
type:"POST",
data: { 'id' : "itemid, 'itemname' : itemname, 'itemdesc' : itemdesc" } ,
success:function(e){
if(($.trim(e) == "success")){
alert("success");
}else{
alert(e);
}
},error:function(){
alert("critical error");
}
});
assume that I already have the linked script of jquery and the content of those variables that has been declared on the data argument inside ajax function. Now I have a processor.php (refer below)
//this is the processor php
echo "success";
so base from above references, the ajax function submit a post request to processor.php and then the processor.php will respond "success" string as declared with the "echo success" but what happen is it doesn't get the success response instead the whole html tags on the current page is pop up (alert), why?? any ideas, clues, recommendation, suggestion would be greatly appreciated. Thank you.
PS: i know the response is not success but why it popup (alert) the whole html tags in the current page?
A:
I've been experienced that before, check your folder and file structure and if you're running server side script (such as php) or communicating with database, check your virtual host configuration.
|
{
"pile_set_name": "StackExchange"
}
|
Q:
Tosca - Java Exception while running Swing Application (JTree)
I am learning tosca and currently we are trying to run a regression test suite for a legacy Java Swing application.
My Test suite contains 4 modules (in JTree) and it is getting failed while clicking a node.
The Error I received on the module is,
at.tosca.javaengine.common.exceptions.ControlException: node or
node-path not found! Detailed information contained in
'JavaEngineException.txt above message is displayed in Executionlist
JavaEngineException.txt
22-11-2017 - 17:56:37: IExecWrapperInterface_connectToControl
at.tosca.javaengine.common.exceptions.ControlNotFoundException: Unable
to find control Index=3;ClassName(s)=[javax.swing.JTable];.
at.tosca.javaengine.server.tree.ComponentSearch.getComponent(ComponentSearch.java:218)
->at.tosca.javaengine.server.AbstractJavaEngineCore.findComponent(AbstractJavaEngineCore.java:1129)
->at.tosca.javaengine.server.AbstractJavaEngineCore.connectToControlInternal(AbstractJavaEngineCore.java:936)
->at.tosca.javaengine.server.AbstractJavaEngineCore.connectToControlInternal(AbstractJavaEngineCore.java:922)
->at.tosca.javaengine.server.AbstractJavaEngineCore.connectToControl(AbstractJavaEngineCore.java:313)
->at.tosca.javaengine.server.JavaEngineCore.access$101(JavaEngineCore.java:25)
->at.tosca.javaengine.server.JavaEngineCore$2.runInternal(JavaEngineCore.java:69)
->at.tosca.javaengine.server.control.WorkerThread.run(WorkerThread.java:69)
->java.lang.Thread.run(Unknown Source)
->JNIServer::CallVoidMethod
->CJNIServer::CallVoidMethod
22-11-2017 - 17:58:58: IExecWrapperInterface_setValue
at.tosca.javaengine.common.exceptions.ControlException: node or
node-path not found!
at.tosca.javaengine.server.control.swing.GenericTreeControl.setValueLegacy(GenericTreeControl.java:339)
->at.tosca.javaengine.server.control.swing.GenericTreeControl.setValue(GenericTreeControl.java:88)
->at.tosca.javaengine.server.AbstractJavaEngineCore.setValueInternal(AbstractJavaEngineCore.java:1195)
->at.tosca.javaengine.server.AbstractJavaEngineCore.setValue(AbstractJavaEngineCore.java:686)
->at.tosca.javaengine.server.JavaEngineCore.access$401(JavaEngineCore.java:25)
->at.tosca.javaengine.server.JavaEngineCore$5.runInternal(JavaEngineCore.java:114)
->at.tosca.javaengine.server.control.WorkerThread.run(WorkerThread.java:69)
->java.lang.Thread.run(Unknown Source)
->JNIServer::CallVoidMethod
->CJNIServer::CallVoidMethod
NOTE : The same Test suite is working in some other machine and not here. Both are same operating System.
A:
The problem was TOSCA is faster than our application :)
Meaning: The frame was not loaded at the time when TOSCA was trying to scan the next page causing the error, the specific node was
not found.
Solution: I added a TBoxWait with extra seconds, after that this is working fine.
|
{
"pile_set_name": "StackExchange"
}
|
ISA 84.00.07
IEC 84.00.07 is a technical report developed by the ISA 84 standards panel. It defines the lifecycle and technical requirements for ensuring effective design of fire and gas detection systems for use in the process industries. The technical report provides a lifecycle for performance based design of fire and gas detection systems, listing out the steps involved in a performance based design and establishing requirements to be implemented for each step. The technical report also defines performance metrics for application to fire and gas detection systems. The performance metrics established in this report for fire and gas system effectiveness include coverage and safety availability.
Scope
The technical report discusses fire and gas detector placement for process industry applications. The report does not include discussions on the attributes of fire detection signaling equipment or equipment that is activated upon detection of a fire or gas release, such as alarms, sprinklers, or chemical suppression systems. The process industries include industrial facilities that handle bulk chemicals, such as oil refining and upgrading, petrochemical, specialty chemical, pharmaceutical, pulp and paper, and non-nuclear power generation.
History
In 2006, the ISA 84 committee developed a working group to study the issue of how fire and gas systems should be treated with respect to the IEC 61511 standard for safety instrumented systems. Many industry practitioners were having trouble utilizing the IEC 61511 standard for the design of fire and gas systems for two reasons: fire and gas systems are not 100% effective in detecting fires and gas releases (i.e., coverage is not 100%), and even if a fire or gas release is detected, the consequences of the incident are not prevented, they are only reduced (i.e., mitigative). As a result, the techniques and metrics shown in IEC 61511 are not adequate to perform fire and gas system design.
The ISA 84 committee formed a working group to study the issue. In 2010, this working group released the first version of the ISA 84.00.07 technical report that laid out new techniques and metrics that were required to effectively design FGS systems using the performance based techniques that underpin the IEC 61511 standard.
The Technical Report
The technical report provides two primary guidance efforts. The first is the development of a lifecycle for the performance based design on Fire and Gas systems. This safety lifecycle includes the steps required to design a functionally safe fire and gas system, along with establishing the requirements of each of the steps. The technical report also defines the two metrics that define the effectiveness of fire and gas systems (as opposed to the single metric of safety integrity level (SIL) that is employed for safety instrumented systems (SIS)). These two metrics are coverage and safety availability.
The coverage of a fire and gas detection array is defined in two ways. Geographic coverage and scenario coverage. The geographic coverage is the fraction of the area of given elevation of interest where if a fire or a gas release were to occur (i.e., be centered) the fire or gas release would be detected by the fire and gas detection array. Geographic coverage is only concerned with the location and performance attributes of detection equipment and obstructions to the "view" of the equipment. Scenario coverage, on the other hand, is defined as the fraction of fire or gas release scenarios that if they were to occur, would be detected by the fire and gas detection array. Scenario coverage considers not only the location and attributes of the fire and gas detection equipment, but also considers the location, frequency, and dimensions of the fires and gas releases that can occur in a process facility. While scenario coverage provides a richer understanding of the performance of a fire and gas detection system, it also is more resource consuming to calculate.
References
External links
ISA TR84.00.07 Guidance on the Evaluation of Fire and Gas System Effectiveness
ISA Training on Performance Based Fire and Gas - ISA EC56P
Performance Based Fire and Gas Design Seminar Video (117 minutes)
Gas Detection in Boiler Rooms - Performance Based Detector Placement
Origin of the Five Meter Grid for Gas Detector Spacing
Fire Detector Cone of Vision Explanation
Category:Fire detection and alarm
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Great white sharks might appear more often in B.C. waters as climate change warms the northern Pacific, a sign of a major environmental shift, scientists say.
article continues below
William Cheung, associate professor of University of B.C.’s Institute for the Oceans and Fisheries, said climate change will likely cause the great white to expand its range to the north.
The great white has already been recorded a few times in B.C. waters over the past few decades, Cheung said. It usually doesn’t stray far north of California, but if the Pacific continues to warm, expect more sightings on the B.C. coast.
Cheung’s work is based on computer models that show a general expansion northward of southerly species such as the great white.
He said it is not certain what will happen to the six sharks commonly found in B.C. waters — the salmon shark, the blue shark, the Pacific sleeper shark, the brown cat shark, the spiny dog fish and the tope (soupfin) shark.
Cheung said sharks worldwide, especially tropical species, will come under pressure because of climate change. Warming will likely shrink their habitat range, as over-fishing depletes their numbers.
“That really tells us to think even more carefully about the need to find a proper conservation plan for some of these shark species,” Cheung said.
John Volpe, of the University of Victoria’s environmental studies department, agrees with the UBC predictions.
He said, however, that it’s important to think of appearances of creatures such as the great white shark as episodes, instead of a northbound wave of southerly species and warmer water.
With ocean warming, Volpe said, it’s most accurate to consider geographic fingers of warm water extending and receding — and sometimes even getting pinched off in warm-water “bubbles” that can trap species.
This movement and shifting of ocean temperatures creates ecological and environmental uncertainty and instability.
Volpe said appearances of warm water species, like the great white, are advance notices of an ecological “destabilization” — the result of which nobody can predict.
It is a safe bet, however, that these warming episodes will ultimately lead to a loss of biodiversity, rather than a redistribution of world species.
“In these periods of constant change, even native species become destabilized and their long-term viability is no longer assured,” Volpe said. “The physical environment upon which everything depends becomes destabilized.
“The great white shark is big and scary, but it’s actually a harbinger of a change in fundamental ecological processes,” he said.
rwatts@timescolonist.com
|
{
"pile_set_name": "OpenWebText2"
}
|
1. Field of the Invention
This invention relates to a bearing assembly and more particularly to a new and novel bearing assembly for use in supporting a water lubricated propeller shaft as in large naval ships.
2. Description of the Prior Art
Bearing assemblies with elastomeric bearing elements are particularly suited for this purpose because of their excellent ability to withstand the effects of corrosive fluids and to abrasion resulting from particulars of foreign matter carried in suspension in the sea water in which the shaft and bearing assembly operates. Such bearing assemblies with their elastomeric bearing elements have been made and are still being made with outer non-corrosive support or shell with a plurality of circumferentially evenly spaced elastomeric staves therein.
The science of lubricated bearings commenced in the 1880's with the discovery of considerable fluid pressure in the oil-film of bearings, from which oil-lubricated bearings were developed. In the 1890's tilting-pad oil-lubricated metal bearings were invented and later tilting-pad journal bearings were developed. In tilting-pad bearings, the pads physically move (rather than deflect) because of the very high modules or stiffness of the metal, to give the right approach angles required to develop very low hydrodynamic (self pumping) lubrication.
The term “elastohydrodynamic” evolved to cover those dynamic cases (like gear teeth) where the bearing surfaces were rapidly moving in and out of contact yet were apparently hydrodynamically lubricated, if only for periodic, very short time intervals. It was later theorized that the low friction of certain oil-lubricated plastic bearings was due to a fluid-trapping pocket being formed in the plastic.
Early water-lubricated rubber bearings were not very effective because the bearings did not develop hydrodynamic lubrication. Water-lubricated bearings in the 1960's were in the category of medium wear devices, the same category as automotive brake linings. This was because the rubber was too thick, the surface was too rough and the side edges were rounded.
Thin rubber bearings have different wear and friction action from harder nonmetallic materials used in bearings. When a radial load is initially applied to a thin rubber bearing, the deflection is elastic and disappears if the load is removed. After a short period of time under load, the deformation becomes permanent and remains after load removal because of the compression set present in every rubber compound. This action is called Plasto-Elastohydrodynamic lubrication. This type of favorable lubrication action is enhanced by the special elastic-creep properties of some rubber compounds. It was found that thin nitrile rubber bearings for rotating shafts or journals partially immersed in water developed a continuous, unbroken film of water resulting from hydrodynamic lubrication. Tests of rotating journals on thin rubber bearings formed a plastic-elastohydrodynamic pocket in the rubber. It was determined that the pressure developed by the hydrodynamic pumping process deformed the rubber, pushing it out towards the rides and ends of the bearing contact patch forming a non-contact region or pocket in the center of the contact patch rubber, i.e. plasto-elastohydrodynamic (“PEH”) lubrication. It was further found that bearing sample patches made of polymeric plastic materials harder than rubber initially deflected less than samples made of thin rubber, but eventually developed deep grooves and wore away after partially completing the twenty-eight day test procedure.
There have been developed brass backed rubber staves since the 1920's, and plastic backed rubber staves since 1976. The prior art further includes rubber in compression impinging on slippery surfaces such as Teflon, ultra high molecular weight, poletheylene (UHMWPE) and other materials. See U.S. Pat. Nos. 3,743,306, 4,568,056, 4,626,112 and 4,737,688.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Mild subclinical hypothyroidism is associated with paediatric dyslipidaemia.
There is a lack of consensus on the cardiometabolic consequences of mild subclinical hypothyroidism (SCH) among children. The objective of the current study was to compare lipid profiles in children with mild SCH with those of euthyroid children. Retrospective medical record review. Children (ages 2-18 years) who had undergone simultaneous measurement of TSH, free thyroxine (T4) and lipids. Lipids in children with mild SCH (TSH 5-<10 mIU/L and normal free T4, n = 228) were compared with those in euthyroid children (n = 1215). TSH level was positively associated with total cholesterol and nonhigh density lipoprotein (non-HDL) cholesterol [β 0.05(0.03-0.08), P < .0001 and β 0.05(0.03-0.08), P < .0001, respectively]. Total cholesterol was significantly higher in children and adolescents with mild SCH compared with euthyroid children (4.43 ± 1.14 mmol/L vs 4.2 ± 0.85 mmol/L, P = .0005). Similarly, non-HDL cholesterol level was also higher in children with mild SCH relative to euthyroid children (3.08 ± 1.14 mmol/L vs 2.91 ± 0.8 mmol/L, P = .001). The adjusted odds ratio of having elevated total cholesterol and elevated non-HDL cholesterol was greater in children with mild SCH compared with euthyroid children (OR 1.88, 95% CI; 1.28-2.73; P = .001 and 1.72, 95% CI 1.2-2.5; P = .003, respectively). The presence of thyroid autoimmunity was not associated with higher rates of dyslipidaemia. Mild SCH in children and adolescents was associated with higher rates of elevated total cholesterol and elevated non-HDL cholesterol. Randomized placebo controlled studies are warranted to determine if treatment of mild SCH in children leads to improvement in lipid profile.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Kösrelik, Çubuk
Kösrelik, Çubuk is a village in the District of Çubuk, Ankara Province, Turkey.
References
Category:Populated places in Ankara Province
Category:Çubuk, Ankara
Category:Villages in Turkey
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Meyliservet Kadın
Meyliservet Kadın (; 21 October 1859 – 3 December 1903) was the fourth wife of Sultan Murad V of the Ottoman Empire.
Early life
Of Circassian origin, Meyliservet was born on 21 October 1859 in Batumi. She had an elder sister, who was the wife of the ambassador to Rome. Her sister took her with her to Italy, and provided her with an excellent education. She learned several languages. After remaining in Italy for more than eight years, the two sisters returned to Istanbul where they lived a lonely life. Meyliservet’s sister came to know of Refia Sultan. Her sister took Meyliservet along with her to the Princess. While there Meyliservet liked the palace life so much that she decided that she would not leave. Refia Sultan took Meyliservet into the palace and had her provided with special training.
Marriage
Some months went by, the holidays came around, and Murad who at the time was the heir apparent, called at his sister’s villa in order to pay his respects. Meyliservet waited upon Murad, and caught his eye. Refia Sultan sent Meyliservet forthwith to the apartments of the Heir located at the Dolmabahçe Palace, where she married Murad on 8 June 1874. On 2 July 1875, a year after the marriage, she gave birth to her only child, a daughter, Fehime Sultan.
Murad ascended the throne on 30 May 1876, after the deposition of his uncle Sultan Abdülaziz, Meyliservet was given the title of "Dördüncü Kadın". After reigning for three months, Murad was deposed on 30 August 1876, due to mental instability and was imprisoned in the Çırağan Palace. Meyliservet and her one-year-old daughter also followed Murad into confinement.
Death
Meyliservet Kadın died of a short illness at the Çırağan Palace on 9 December 1903.
Issue
Meyliservet Kadın and Murad had one daughter:
Fehime Sultan (Dolmabahçe Palace, Istanbul, 2 August 1875 – Nice, France, 15 September 1929 and buried in Damascus), married two times without issue.
See also
Ottoman Imperial Harem
List of consorts of the Ottoman sultans
References
Sources
Category:1859 births
Category:1903 deaths
Category:Circassian nobility
Category:Wives of Ottoman Sultans
Category:People of the Ottoman Empire of Circassian descent
Category:People from Batumi
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Aetiology of diabetic foot ulceration.
A prospective study of 150 diabetic patients was undertaken with the aim of determining the factors associated with the development of foot ulcerations. Seventy five patients had foot ulceration and 75 had no foot lesions. Peripheral (78.7%) and autonomic (38.7%) neuropathy were more commonly found in the "ulcer" group, as were vascular insufficiency (49.3%) and hyperlipidaemia (60%). Renal failure (9.3%) and ketoacidosis (20%) were also commoner in patients with foot ulceration. Most, if not all, of the aetiological factors are related to prolonged uncontrolled hyperglycaemia.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
LaPlace Transform of a step function
Consider the function $f(t)=\begin{cases} 0 \;\;\;\;\;\;\;\;\;\;\;t<\pi \\t-\pi \;\;\;\;\; \pi\leq t \leq2\pi \\ 0 \;\;\;\;\;\;\;\;\;\;\; t\leq 2\pi \end{cases}$
Find the laplace transform of this function. What I did was I wrote it in terms of the step function $f(t)=u_{\pi}(t)[t-\pi]+u_{2\pi}(t)[\pi-t]$ So therefore I set up a integral of $\int_{\pi}^{2\pi} e^{-st}(t-\pi) +\int_{2\pi}^{\infty}e^{-st}(\pi-t)$ The result I end up with is $\dfrac{-2\pi e^{-2\pi s}}{s}-\dfrac{2e^{-2\pi s}}{s^2}+\dfrac{e^{-\pi s}}{s^2}$ However the book ends up with a different answer which I get when I only consider $\int_{\pi}^{2\pi} e^{-st}(t-\pi)$, but not the other. Why are they considering 1 integral when there is in fact 2 that need to be evaluated. Or is the way I defined my step function wrong somewhere.
A:
The upper boundary of your 1st integral should be $\infty$ instead of $2\pi$.
Effectively the part above $2\pi$ in your first integral cancels out with the 2nd integral, resulting in a single integral.
|
{
"pile_set_name": "StackExchange"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.