text
stringlengths 1
3.78M
| meta
dict |
|---|---|
Karnataka: BSP MLA quits Congress-JDS alliance, resigns as minister
India
oi-Chennabasaveshwar P
Bengaluru, Oct 11: BSP MLA N Mahesh, Primary and Secondary Education Minister in Congress-JDS coalition government, resigned on Thursday.
BSP will rather fight alone than beg for seats in alliance: Mayawati
His resignation comes in the wake of Bahujan Samaj Party Supremo Mayawati boycotting the Congress ahead of the Madhya Pradesh and Rajasthan state elections and this has created ripples in Karnataka.
He had said that he will walk out of the Congress-JDS alliance if Mayawati asks him to. Mahesh had also accused the Congress, BJP, and Janata Dal of being castist parties.
After BSP, Congress loses out on SP and CPM in 5 poll bound states
"I'm saying this openly, whether it is Congress or BJP or Janata Dal, their workers will not understand the ideology that I'm speaking about. They don't need it because until there is this caste system and inequality- Congress, BJP and Janata Dal will continue to exist," Mr Mahesh said at a BSP event at Chamarajanagar.
"The day the caste system and inequality is eradicated, that day Bahujan Samaj Party, the party of Basavanna (12th-century social reformer) will come to power, " he said.
N Mahesh was the first MLA to become a minister outside Uttar Pradesh. He is the MLA from Chamarajanagar's Kollegal constituency.
(With PTI inputs)
|
{
"pile_set_name": "OpenWebText2"
}
|
Landmine conference ends with organizers citing gains
Government representatives and NGO delegations have concluded their 12th international meeting in the past 15 years after the Mine Ban Treaty was opened for signature in Ottawa, Canada.
The meeting was highlighted with the announcement that Poland had become the 161st State Party to the treaty, making the ban on antipersonnel mines universal among European Union countries.
The United States, meanwhile, which sent an observer to the gathering, is the lone holdout among NATO countries. The US declared that it would announce its decision on whether to join the treaty, “soon,” following a policy review that began in 2009.
Antipersonnel mines and cluster munitions are indiscriminate weapons that injure and kill civilians in every corner of the globe, every day. Placed under or on the ground, antipersonnel mines explode from the contact or presence of a person. When triggered, they kill or cause injuries like blindness, burns, destroyed limbs and shrapnel wounds.
Until the 1990s, antipersonnel landmines had been used by almost all armed forces of the world, in one form or another. Following the 1997 Mine Ban Treaty landmine use has dramatically dropped...
The presence of 17 states (not parties to the treaty) at the meeting - including China, Lao People’s Democratic Republic, Lebanon, Libya, Myanmar, Oman, Saudi Arabia, Singapore, the United Arab Emirates, United States, and Vietnam – “reaffirmed the strength of the treaty’s norm and the priority placed by the international community on achieving a mine-free world,” according the conference organizers.
Additionally, Palestine attended the annual meeting for the first time and declared its strong desire to accede to the Mine Ban Treaty as soon as possible. With its new status at the UN, it is now eligible to join.
International Campaign to Ban Landmines (ICBL) Head of Delegation, Stephen Goose, says: “Fifteen years after the opening of the Mine Ban Treaty, we still see a high level of commitment from States Parties and a vibrant partnership of civil society, governments, international organizations and UN agencies aimed at ending for all time the scourge of landmines...”
Six States Parties declared completion of their obligation to clear all mined areas under their jurisdiction or control, including the Congo, Denmark, Gambia, Guinea-Bissau, Jordan and Uganda.
There are now 23 States Parties that have complied with this obligation, including eleven in Africa, six in Europe, five in Latin America and one in the Middle East. Thirty-six States Parties are still in the process of clearing mined areas.
Hungary confirmed that it will conclude mine clearance efforts in 2013. Mozambique and Venezuela reported that they aim to complete mine clearance by 2014.
Statements by survivors also highlighted the humanitarian effects of anti-personnel landmines and the need to continue prevention and also support for victims.
Advertisement
Anti-landmine advocates say:
Landmines slow repatriation of refugees and displaced people, or even prevent it altogether.
They hamper the provision of aid and relief services and threaten, injure and kill aid workers.
|
{
"pile_set_name": "Pile-CC"
}
|
Effect of a visual-based sensory motor task on muscle tuning during a dynamic balance task.
In this research, we explored visually-based sensory motor learning when a transformation was applied to the trajectory used to move and track a visual target in a virtual environment. The virtual task was controlled by the subject's center of foot pressure (COP), where the COP position was mapped to an on-screen cursor. Target balloons appeared randomly on the screen; the subject was instructed to move the COP-controlled cursor to intersect and burst the balloons. A transformation was applied to the movement trajectory, which rotated the on-screen cursor counter-clockwise by 60 degrees . The transformation required the subjects to update their spatial reference coordinates between the physical COP position and the on-screen cursor. To investigate learning during the transformation, electromyogram (EMG) data was recorded from the tibialis anterior and peroneus longus muscles. The muscle activity, calculated as the root mean square (RMS) of the EMG data, was calculated for each muscle as a function of the movement direction during movement initiation. The preferred direction (PD) for each muscle was then determined as the directional sum of the RMS values. The results showed a shift in the preferred direction (PD) of the muscles with learning.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Role of serine esterase in hydrogen peroxide-mediated activation of phospholipase A2 in rabbit pulmonary arterial smooth muscle cells.
Exposure of rabbit pulmonary arterial smooth muscle cells to hydrogen peroxide cause dose-dependent stimulation of [14C] arachidonic acid (AA) release and enhancement of the cell membrane-associated phospholipase A2 activity as well as of the cell membrane-bound serine esterase activity tested against synthetic substrate p-tosyl-L-arginine methyl ester. While pretreatment of cells with serine protease inhibitors, viz. phenyl methyl sulphonyl fluoride, diisopropyl fluorophosphate and alpha-1-proteinase inhibitor, and antioxidant vitamin E prevents H2O2 stimulation of AA release and the cell membrane-bound serine esterase and PLA2 activities, that with actinomycin D and cycloheximide is devoid of any effect on H2O2 caused stimulation of AA release and the smooth muscle cell membrane associated serine esterase and PLA2 activities. Treatment of the smooth muscle cell membrane suspension with the serine protease trypsin markedly stimulates PLA2 activity. These results suggest that on exposure to H2O2 the smooth muscle cell membrane-bound serine esterase plays an important role in stimulating the cell membrane associated PLA2 activity thereby resulting in an increase in AA release.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Motivation gift - Inspirational necklace
What beter can you give than inspiration? Share your inspiration and love with your loved woman!
This sterling silver necklace can be like a letter you send to her! Engrave an inspiratinal quote or some words to motivate. Make the gift even more romantic when adding a secret message on the back pendant side.This would be a great birthday, anniversary gift for her! Give her the special piece to treasutre!
|
{
"pile_set_name": "Pile-CC"
}
|
b.cBold
{
font-weight: bold
}
code.cCode
{
font-family: Courier New, Courier, mono
}
.codebox
{
background: #f1f5f9;
border: 1px solid #c7cfd5;
font-family: Courier New, Courier, mono
margin: 20px 0;
padding: 8px;
text-align: left;
}
em.cEmphasis
{
font-style: italic
}
sub.cSubscript
{
vertical-align: sub
}
sup.cSuperscript
{
vertical-align: super
}
u.cUnderline
{
text-decoration: underline
}
p.pBody
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pBodyRelative
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 6pt;
margin-left: 0em;
margin-right: 0em;
margin-top: 6pt;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pCellBody
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 0em;
margin-left: 0em;
margin-right: 0em;
margin-top: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pCellHeading
{
color: #FFFFFF;
background-color: #999999;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-bottom: 0em;
margin-left: 0em;
margin-right: 0em;
margin-top: 0em;
text-align: center;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pCopyrightText
{
color: #999999;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 10px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-top: 0em;
margin-bottom: 0em;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h2.pGroupTitlesIX
{
color: #CC0000;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 16px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h2.pHeading1
{
color: #CC0000;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 16px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-top: 0em;
margin-bottom: 0em;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h3.pHeading2
{
color: #CC0000;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h4.pHeading3
{
color: #CC0000;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 10px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h5.pHeading4
{
color: #CC0000;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 9px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pIndented1
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 2.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pIndented2
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pIndented3
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 7.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pIndented4
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 10em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pIndented5
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 12.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pIndentedRelative
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 2.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pLevel1IX
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 2.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pLevel2IX
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pLevel3IX
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 7.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pLevel4IX
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 10em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pLevel5IX
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 12.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h2.pNewHTMLPage
{
color: #CC0000;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 16px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-top: 0em;
margin-bottom: 0em;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pNoteTitle
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
margin-bottom: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pNote
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-top: 0em;
margin-left: 1.25em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pPopup
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pPopupAppend
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pPreformatted
{
color: 666666;
font-family: Courier New, Courier, mono;
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 0em;
margin-left: 0em;
margin-right: 0em;
margin-top: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pPreformattedRelative
{
color: 666666;
font-family: Courier New, Courier, mono;
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 0em;
margin-left: 0em;
margin-right: 0em;
margin-top: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pRelatedTopic
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pSeeAlsoRef
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 10px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-top: 0em;
margin-bottom: 0em;
margin-left: 2.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pSmartList1
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 6pt;
margin-left: 0em;
margin-right: 0em;
margin-top: 6pt;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pSmartList2
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 6pt;
margin-left: 0em;
margin-right: 0em;
margin-top: 6pt;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pSmartList3
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 6pt;
margin-left: 0em;
margin-right: 0em;
margin-top: 6pt;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pSmartList4
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 6pt;
margin-left: 0em;
margin-right: 0em;
margin-top: 6pt;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pSmartList5
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: normal;
margin-bottom: 6pt;
margin-left: 0em;
margin-right: 0em;
margin-top: 6pt;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
div.pTableTitle
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h2.pTitle
{
color: #CC0000;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 18px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
h2.pTOC1
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 0em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pTOC2
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 2.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pTOC3
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pTOC4
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 7.5em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pTOC5
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 12px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-left: 10em;
margin-right: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
p.pWebSiteLink
{
color: #666666;
font-family: 'Verdana', 'Arial', 'Helvetica', 'sans-serif';
font-size: 10px;
font-style: normal;
font-variant: normal;
font-weight: bold;
margin-top: 0em;
margin-left: 0em;
margin-right: 0em;
margin-bottom: 0em;
text-align: left;
text-decoration: none;
text-indent: 0em;
text-transform: none
}
|
{
"pile_set_name": "Github"
}
|
Many wireless networks, including UWB networks, send information between devices in the network through the use of discrete data frames. Data at a transmitter is broken up into discrete pieces of data, which are processed, placed into frames, and sent over a wireless channel. The receiver then takes the received frames, extracts the embedded information, and reconstructs the data that was sent by the transmitter.
Some of the parameters for a data frame must remain fixed, such as its header composition. But others, such as frame size can vary a great deal. For example, frame size can be varied in response to the quality of the channel being used for transmission. Smaller data frames generally have a lower probability of packet error rate and so using smaller packets can improve the probability that a frame will be successfully transmitted.
A device could thus use a large frame size when the channel is of good quality, and then move to a smaller frame size when the channel quality deteriorates. Then, if the channel quality improves, the device could return to using the larger frame size.
Frame size is generally handled at a medium access control (MAC) layer. The MAC layer receives data in discrete blocks and then can either forward these blocks on for transmission as they are, group multiple blocks together for transmission, or break a block up into multiple pieces for transmission. Aggregation is what happens when multiple blocks of data are grouped together, and fragmentation is what happens when one block of data is broken up into multiple pieces.
But although aggregation and fragmentation provide advantages in allowing for greater flexibility in frame size, they also impose some disadvantages. Primarily, they require additional circuitry and time to handle the aggregation and fragmentation on the transmitting end, and also additional time and circuitry on the receiving end split apart aggregated data and reassemble fragmented data (called defragmentation). Of these two, defragmentation data is much more complex and is also more time consuming.
Accordingly, it would be desirable in the art for a solution to the problems associated with fragmentation. In particular, it would be desirable to provide a UWB device that avoids the use of fragmentation, yet still provides flexibility in determining data frame size.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Monday, August 24, 2015
New England boast some endurance when it comes to winter weather. It can also put a feather in its cap for the ability to manage massive amounts of snow. But it cannot poke fun at North Texas when it was shut down for six days in December 2013.
A lot of good things came out of that winter. I started this blog and a Twitter account. Here's the Tweet that started it all.
Thinking about the DFW freeze, September 12, 2014 will be a busy day for the delivery rooms.
I remember that it took three and a half hours to drive for milk. It was normally a 20-minute round trip.
These were essential for making it home. I actually helped a guy push his vehicle out of the street. He was thrilled to have help, and I was happy to be one of the cars that made it down the holler in and up the hill. That only happened after my New Englander sense kicked in when I convinced everyone that we had to get speed and stay off the breaks -- to trust the steering wheel.
I don't know if everyone made it because I did and didn't look back.
This is the gas station outside Karen's workplace. It was the worst I had ever seen. But I wasn't worried. I remember feeling adventurous.
Day five meant that the stores were once again stocked. But if I remember correctly, the schools were closed another day because the ice was still everywhere, including the roof where it did some damage.
Friday, August 21, 2015
I recently reunited with my wife and kids after a 10-day excursion to Texas and Massachusetts – the details of which are not important for this post. It was hard being away so long, but oh does distance make the heart grow fonder.
... Or so I thought.
In anticipation of my arrival, I missed my family more than ever. I envisioned seeing them pull up to the airport with smiles and hugs, which is exactly what I got. Only, something was different.
The feeling of reconnecting was not sustained. I felt like it was right back to the honey-do list and kids screaming and fighting. The blues set in.
Why did this happen?
I looked around and realized that while I was gone, everything continued as usual. The kids enjoyed splash pads and playgrounds. Karen made preparations for moving to Massachusetts and visited with her family. We were all happy to be reunited, but our emotional journey over the last 10 days was very different.
I was on the same page, yet it was a different book. This is only significant now – as opposed to the many times I've traveled in the past – because, unlike the past, I am more so living in the same book as Karen and the kids than ever before.
It's one thing to be physically present, and it's a whole new level of being-there when you are emotionally immersed in each moment as your family grows and you fall more deeply in love with your wife. That's being in the same book.
For some, this is not hard. Their minds turn on and off as the work days begin and end. That's not me. It never stops, and the same goes for my family while I'm at work. I think about them, talk about them, and dream about what comes next.
This sounds all well, but it comes with struggle. I've worked hard to pay attention to the feedback from those closest to me, especially Karen. I've reflected, tested, and even prayed to become more mentally present with my family.
Here's what I've learned.
I travel sometimes and therefore need to be involved with what is happening at home while I'm away.
Connected devices are awesome and make our lives easier. This is not without consequence, however. Psychologists are seeing similar symptoms that resemble those of sibling rivalry. It can stress a relationship.
Most importantly, to strengthen a connection with your family (when your work takes you away) takes practice. Start with one event at a time and reflect on it.
Inquire before you comment. I still haven't mastered this one (ask Karen), but I keep trying and it's getting better.
This was my big emotional lesson of the summer. Stay tuned for a post on mileage and the culture shock of talk.
|
{
"pile_set_name": "Pile-CC"
}
|
Effects of amygdala kindling and electroconvulsive seizures on the expression of corticotropin-releasing hormone in the rat brain.
Wjile low doses of corticotropin-releasing hormone (CRH) induce behavioral activation as part of the stress response, higher doses cause pathological excitability and seizures. Single CRH-induced convulsions resemble those following amygdala "kindling" in which intermittent exposure to a subconvulsive electrical stimulus eventually produces a motor seizure. To examine the possibility that alterations in CRH activity occur in kindling we used in situ hybridization to determine if electrical kindling of the amygdala or electroconvulsive seizures (ECS) could alter the expression of CRH mRNA in the rat brain. Amygdala kindling resulting in either after-discharges alone or full-blown motor seizures produced a dramatic increase in CRH but not glutamic acid decarboxylase (GAD) mRNA in the dorsal hippocampus, specifically in the large interneurons of the polygonal layer of the dentate hilus. CRH mRNA per cell and the number of cells expressing CRH increased at 30 min, 2 h, and 24 h but not at 3 weeks following the last kindled seizure. Repeated ECS also induced an up-regulation of CRH mRNA in the dentate hilus. Immunohistochemistry confirmed that seizures increased the number of hilar cells expressing CRH peptide. This induction of CRH could not be explained by nonspecific stress effects as neither restraint stress nor adrenalectomy had any influence on CRH mRNA in the dentate hilus. Both repeated ECS and kindled seizures also caused an increase in CRH mRNA in the hypothalamic paraventricular nucleus similar to that induced by chronic stress. Our results indicate that epileptiform activity induces CRH mRNA in the dentate hilus where normally very little CRH is expressed, suggesting that CRH may be important in mediating electrical excitability in the dentate gyrus and hippocampus.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Relationship between human papillomavirus type 16 in the cervix and intraepithelial neoplasia.
To evaluate a temporal relationship between the presence of cervical human papilloma virus (HPV) type 16 and the risk of developing cervical intraepithelial neoplasia (CIN). Fifty-four women with HPV 16 polymerase chain reaction (PCR)-positive tests were selected from the gynecologic outpatient clinic of the Reinier de Graaf Hospital, Delft, The Netherlands. At least three successive PCR tests were performed in each woman at intervals of 6 months. The PCR HPV 16 assay was performed in conjunction with cervical smear, and colposcopy and biopsy, if indicated. Women with at least three consecutive positive PCR tests were defined as having persistent HPV 16 infections. Women with one positive test followed by two negative tests were defined as having transient infections. Subdivided into two groups, 25 women had persistent infections and 29 had transient infections. In significantly more women in the persistent group compared with the transient group, CIN developed (11 of 25 versus six of 29, P = .036). Lesions in women with persistent HPV 16 infection were more severe (six of 11 were CIN III versus one of six P = .041). Persistent infection with HPV 16 is associated with a higher risk of developing CIN, which is often high-grade.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Player Movement
I started developing games recently, teaching myself using a german book about C++ and Direct3D 9.
The author states, player movement should be implemented using a time delta, like this
player.position.x += time.delta * movementFactor
as opposed to an implementation without incorporating the time passed since last frame; i.e like this
player.position.x += movementFactor
Latter solution would cause other players to move faster, since the expression above would be executed more often on faster CPUs. (More explanation on Tayacan's answer below)
Is there any other solution to this problem?
Old, poorly phrased question I wrote when I was young:
I'm reading on a Book that's about Gamedevelopment with C++ and
DirectX 9.
There is something that interrests me: It says that playermovements
are increasing with the power of the CPU. Becouse a faster CPU will
move the player with every frame ( better CPU = better FPS ) To
bypass it, it says you have just to multiplicate time*movementfactor .
I'd like to know is there an another way to bypass it ?
A:
Why do you want another way? The one you describe is what you'd use in any kind of game development, whether or not you use DirectX.
The problem is this: In (most) games you have a main loop. This loop runs as fast as the hardware allows. However, people use different hardware, so on some computers, this will be faster than on others. So in order to make an object in a game move with the same speed on any hardware, you multiply the movement vector with the time, in seconds, since last time the loop was run. This also has the benefit that if you're moving the object, say, 5 * time units in some direction, that's the same as saying "move it 5 units/seconds".
|
{
"pile_set_name": "StackExchange"
}
|
org.jsoup.helper.DescendableLinkedList
org.jsoup.helper.StringUtil
org.jsoup.helper.Validate
org.jsoup.Jsoup
org.jsoup.nodes.Attributes
org.jsoup.nodes.Comment
org.jsoup.nodes.DataNode
org.jsoup.nodes.Document
org.jsoup.nodes.DocumentType
org.jsoup.nodes.Element
org.jsoup.nodes.Entities
org.jsoup.nodes.Node
org.jsoup.nodes.TextNode
org.jsoup.parser.CharacterReader
org.jsoup.parser.HtmlTreeBuilder
org.jsoup.parser.HtmlTreeBuilderState
org.jsoup.parser.ParseErrorList
org.jsoup.parser.Parser
org.jsoup.parser.Tag
org.jsoup.parser.Token
org.jsoup.parser.Tokeniser
org.jsoup.parser.TokeniserState
org.jsoup.parser.TokenQueue
org.jsoup.parser.TreeBuilder
org.jsoup.parser.XmlTreeBuilder
org.jsoup.select.Collector
org.jsoup.select.CombiningEvaluator
org.jsoup.select.Elements
org.jsoup.select.Evaluator
org.jsoup.select.NodeTraversor
org.jsoup.select.NodeVisitor
org.jsoup.select.QueryParser
org.jsoup.select.Selector
|
{
"pile_set_name": "Github"
}
|
By Bernie Woodall
(Reuters) - The U.S. Justice Department has opened an investigation into child sex abuse by priests in Pennsylvania, six Roman Catholic Church dioceses said on Thursday.
The investigation is the first statewide probe by federal authorities of allegations of sex abuse and cover-up by the Catholic Church in the United States, according to groups representing abuse victims.
The Church in Chile, Australia and Ireland is also reeling from crises involving sexual abuse of minors with surveys showing the scandal has eroded confidence in the Church and Pope.
The Pennsylvania dioceses said they had received federal subpoenas following a state grand jury report that alleged over 300 Catholic priests in Pennsylvania had sexually abused children over 70 years. The Associated Press first reported the Justice Department investigation on Thursday.
The dioceses of Allentown, Erie, Harrisburg, Philadelphia, Pittsburgh and Scranton said they were cooperating with the investigation but declined further comment.
The Justice Department and U.S. Attorney's Office in Philadelphia declined to comment.
An 884-page report made public in August by Pennsylvania Attorney General Josh Shapiro after a two-year investigation contained graphic examples of children being groomed and sexually abused by clergymen. Shapiro said at the time that it was largely based on documents from secret archives kept by the dioceses, including handwritten confessions by priests.
The report cited 301 priests, some of whom have died.
Tim Lennon, president of Survivors Network of those Abused by Priests (SNAP), said the investigation was long overdue. Four statewide grand juries in Pennsylvania since 2003 identified around 500 alleged sexual predators among acting or former Catholic clergy, he said.
"In what other institution could you have 500 criminals and not be prosecuted?" asked Lennon, who said he was raped by a Catholic priest when he was a child.
Lennon said SNAP had asked the federal government three times since 2002 for a nationwide investigation of 15,000 active or retired Catholic clergy accused of being sexual predators.
Story continues
"This is a first. Federal law enforcement has been awfully silent on the Catholic abuse problem, and it's about time," said Anne Barrett-Doyle, co-director of BishopAccountability.org, a U.S.-based resource center that tracks cases of clerical abuse worldwide.
She said the only other U.S. federal probe was of a bishop in Boston in the early 2000s.
In September, U.S. Catholic bishops said they would set up a hotline for accusations of sexual abuse against bishops and other church leaders, or allegations of cover ups by such people.
(Reporting by Bernie Woodall in Fort Lauderdale, Florida; Writing by Andrew Hay; Editing by Lisa Shumaker and Toni Reinhold)
|
{
"pile_set_name": "OpenWebText2"
}
|
/*
* This file is part of wl1271
*
* Copyright (C) 2008-2010 Nokia Corporation
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* version 2 as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA
*
*/
#include <linux/module.h>
#include <linux/platform_device.h>
#include <linux/err.h>
#include "../wlcore/wlcore.h"
#include "../wlcore/debug.h"
#include "../wlcore/io.h"
#include "../wlcore/acx.h"
#include "../wlcore/tx.h"
#include "../wlcore/rx.h"
#include "../wlcore/boot.h"
#include "wl12xx.h"
#include "reg.h"
#include "cmd.h"
#include "acx.h"
#include "scan.h"
#include "event.h"
#include "debugfs.h"
static char *fref_param;
static char *tcxo_param;
static struct wlcore_conf wl12xx_conf = {
.sg = {
.params = {
[CONF_SG_ACL_BT_MASTER_MIN_BR] = 10,
[CONF_SG_ACL_BT_MASTER_MAX_BR] = 180,
[CONF_SG_ACL_BT_SLAVE_MIN_BR] = 10,
[CONF_SG_ACL_BT_SLAVE_MAX_BR] = 180,
[CONF_SG_ACL_BT_MASTER_MIN_EDR] = 10,
[CONF_SG_ACL_BT_MASTER_MAX_EDR] = 80,
[CONF_SG_ACL_BT_SLAVE_MIN_EDR] = 10,
[CONF_SG_ACL_BT_SLAVE_MAX_EDR] = 80,
[CONF_SG_ACL_WLAN_PS_MASTER_BR] = 8,
[CONF_SG_ACL_WLAN_PS_SLAVE_BR] = 8,
[CONF_SG_ACL_WLAN_PS_MASTER_EDR] = 20,
[CONF_SG_ACL_WLAN_PS_SLAVE_EDR] = 20,
[CONF_SG_ACL_WLAN_ACTIVE_MASTER_MIN_BR] = 20,
[CONF_SG_ACL_WLAN_ACTIVE_MASTER_MAX_BR] = 35,
[CONF_SG_ACL_WLAN_ACTIVE_SLAVE_MIN_BR] = 16,
[CONF_SG_ACL_WLAN_ACTIVE_SLAVE_MAX_BR] = 35,
[CONF_SG_ACL_WLAN_ACTIVE_MASTER_MIN_EDR] = 32,
[CONF_SG_ACL_WLAN_ACTIVE_MASTER_MAX_EDR] = 50,
[CONF_SG_ACL_WLAN_ACTIVE_SLAVE_MIN_EDR] = 28,
[CONF_SG_ACL_WLAN_ACTIVE_SLAVE_MAX_EDR] = 50,
[CONF_SG_ACL_ACTIVE_SCAN_WLAN_BR] = 10,
[CONF_SG_ACL_ACTIVE_SCAN_WLAN_EDR] = 20,
[CONF_SG_ACL_PASSIVE_SCAN_BT_BR] = 75,
[CONF_SG_ACL_PASSIVE_SCAN_WLAN_BR] = 15,
[CONF_SG_ACL_PASSIVE_SCAN_BT_EDR] = 27,
[CONF_SG_ACL_PASSIVE_SCAN_WLAN_EDR] = 17,
/* active scan params */
[CONF_SG_AUTO_SCAN_PROBE_REQ] = 170,
[CONF_SG_ACTIVE_SCAN_DURATION_FACTOR_HV3] = 50,
[CONF_SG_ACTIVE_SCAN_DURATION_FACTOR_A2DP] = 100,
/* passive scan params */
[CONF_SG_PASSIVE_SCAN_DURATION_FACTOR_A2DP_BR] = 800,
[CONF_SG_PASSIVE_SCAN_DURATION_FACTOR_A2DP_EDR] = 200,
[CONF_SG_PASSIVE_SCAN_DURATION_FACTOR_HV3] = 200,
/* passive scan in dual antenna params */
[CONF_SG_CONSECUTIVE_HV3_IN_PASSIVE_SCAN] = 0,
[CONF_SG_BCN_HV3_COLLISION_THRESH_IN_PASSIVE_SCAN] = 0,
[CONF_SG_TX_RX_PROTECTION_BWIDTH_IN_PASSIVE_SCAN] = 0,
/* general params */
[CONF_SG_STA_FORCE_PS_IN_BT_SCO] = 1,
[CONF_SG_ANTENNA_CONFIGURATION] = 0,
[CONF_SG_BEACON_MISS_PERCENT] = 60,
[CONF_SG_DHCP_TIME] = 5000,
[CONF_SG_RXT] = 1200,
[CONF_SG_TXT] = 1000,
[CONF_SG_ADAPTIVE_RXT_TXT] = 1,
[CONF_SG_GENERAL_USAGE_BIT_MAP] = 3,
[CONF_SG_HV3_MAX_SERVED] = 6,
[CONF_SG_PS_POLL_TIMEOUT] = 10,
[CONF_SG_UPSD_TIMEOUT] = 10,
[CONF_SG_CONSECUTIVE_CTS_THRESHOLD] = 2,
[CONF_SG_STA_RX_WINDOW_AFTER_DTIM] = 5,
[CONF_SG_STA_CONNECTION_PROTECTION_TIME] = 30,
/* AP params */
[CONF_AP_BEACON_MISS_TX] = 3,
[CONF_AP_RX_WINDOW_AFTER_BEACON] = 10,
[CONF_AP_BEACON_WINDOW_INTERVAL] = 2,
[CONF_AP_CONNECTION_PROTECTION_TIME] = 0,
[CONF_AP_BT_ACL_VAL_BT_SERVE_TIME] = 25,
[CONF_AP_BT_ACL_VAL_WL_SERVE_TIME] = 25,
/* CTS Diluting params */
[CONF_SG_CTS_DILUTED_BAD_RX_PACKETS_TH] = 0,
[CONF_SG_CTS_CHOP_IN_DUAL_ANT_SCO_MASTER] = 0,
},
.state = CONF_SG_PROTECTIVE,
},
.rx = {
.rx_msdu_life_time = 512000,
.packet_detection_threshold = 0,
.ps_poll_timeout = 15,
.upsd_timeout = 15,
.rts_threshold = IEEE80211_MAX_RTS_THRESHOLD,
.rx_cca_threshold = 0,
.irq_blk_threshold = 0xFFFF,
.irq_pkt_threshold = 0,
.irq_timeout = 600,
.queue_type = CONF_RX_QUEUE_TYPE_LOW_PRIORITY,
},
.tx = {
.tx_energy_detection = 0,
.sta_rc_conf = {
.enabled_rates = 0,
.short_retry_limit = 10,
.long_retry_limit = 10,
.aflags = 0,
},
.ac_conf_count = 4,
.ac_conf = {
[CONF_TX_AC_BE] = {
.ac = CONF_TX_AC_BE,
.cw_min = 15,
.cw_max = 63,
.aifsn = 3,
.tx_op_limit = 0,
},
[CONF_TX_AC_BK] = {
.ac = CONF_TX_AC_BK,
.cw_min = 15,
.cw_max = 63,
.aifsn = 7,
.tx_op_limit = 0,
},
[CONF_TX_AC_VI] = {
.ac = CONF_TX_AC_VI,
.cw_min = 15,
.cw_max = 63,
.aifsn = CONF_TX_AIFS_PIFS,
.tx_op_limit = 3008,
},
[CONF_TX_AC_VO] = {
.ac = CONF_TX_AC_VO,
.cw_min = 15,
.cw_max = 63,
.aifsn = CONF_TX_AIFS_PIFS,
.tx_op_limit = 1504,
},
},
.max_tx_retries = 100,
.ap_aging_period = 300,
.tid_conf_count = 4,
.tid_conf = {
[CONF_TX_AC_BE] = {
.queue_id = CONF_TX_AC_BE,
.channel_type = CONF_CHANNEL_TYPE_EDCF,
.tsid = CONF_TX_AC_BE,
.ps_scheme = CONF_PS_SCHEME_LEGACY,
.ack_policy = CONF_ACK_POLICY_LEGACY,
.apsd_conf = {0, 0},
},
[CONF_TX_AC_BK] = {
.queue_id = CONF_TX_AC_BK,
.channel_type = CONF_CHANNEL_TYPE_EDCF,
.tsid = CONF_TX_AC_BK,
.ps_scheme = CONF_PS_SCHEME_LEGACY,
.ack_policy = CONF_ACK_POLICY_LEGACY,
.apsd_conf = {0, 0},
},
[CONF_TX_AC_VI] = {
.queue_id = CONF_TX_AC_VI,
.channel_type = CONF_CHANNEL_TYPE_EDCF,
.tsid = CONF_TX_AC_VI,
.ps_scheme = CONF_PS_SCHEME_LEGACY,
.ack_policy = CONF_ACK_POLICY_LEGACY,
.apsd_conf = {0, 0},
},
[CONF_TX_AC_VO] = {
.queue_id = CONF_TX_AC_VO,
.channel_type = CONF_CHANNEL_TYPE_EDCF,
.tsid = CONF_TX_AC_VO,
.ps_scheme = CONF_PS_SCHEME_LEGACY,
.ack_policy = CONF_ACK_POLICY_LEGACY,
.apsd_conf = {0, 0},
},
},
.frag_threshold = IEEE80211_MAX_FRAG_THRESHOLD,
.tx_compl_timeout = 700,
.tx_compl_threshold = 4,
.basic_rate = CONF_HW_BIT_RATE_1MBPS,
.basic_rate_5 = CONF_HW_BIT_RATE_6MBPS,
.tmpl_short_retry_limit = 10,
.tmpl_long_retry_limit = 10,
.tx_watchdog_timeout = 5000,
.slow_link_thold = 3,
.fast_link_thold = 10,
},
.conn = {
.wake_up_event = CONF_WAKE_UP_EVENT_DTIM,
.listen_interval = 1,
.suspend_wake_up_event = CONF_WAKE_UP_EVENT_N_DTIM,
.suspend_listen_interval = 3,
.bcn_filt_mode = CONF_BCN_FILT_MODE_ENABLED,
.bcn_filt_ie_count = 3,
.bcn_filt_ie = {
[0] = {
.ie = WLAN_EID_CHANNEL_SWITCH,
.rule = CONF_BCN_RULE_PASS_ON_APPEARANCE,
},
[1] = {
.ie = WLAN_EID_HT_OPERATION,
.rule = CONF_BCN_RULE_PASS_ON_CHANGE,
},
[2] = {
.ie = WLAN_EID_ERP_INFO,
.rule = CONF_BCN_RULE_PASS_ON_CHANGE,
},
},
.synch_fail_thold = 12,
.bss_lose_timeout = 400,
.beacon_rx_timeout = 10000,
.broadcast_timeout = 20000,
.rx_broadcast_in_ps = 1,
.ps_poll_threshold = 10,
.bet_enable = CONF_BET_MODE_ENABLE,
.bet_max_consecutive = 50,
.psm_entry_retries = 8,
.psm_exit_retries = 16,
.psm_entry_nullfunc_retries = 3,
.dynamic_ps_timeout = 1500,
.forced_ps = false,
.keep_alive_interval = 55000,
.max_listen_interval = 20,
.sta_sleep_auth = WL1271_PSM_ILLEGAL,
.suspend_rx_ba_activity = 0,
},
.itrim = {
.enable = false,
.timeout = 50000,
},
.pm_config = {
.host_clk_settling_time = 5000,
.host_fast_wakeup_support = CONF_FAST_WAKEUP_DISABLE,
},
.roam_trigger = {
.trigger_pacing = 1,
.avg_weight_rssi_beacon = 20,
.avg_weight_rssi_data = 10,
.avg_weight_snr_beacon = 20,
.avg_weight_snr_data = 10,
},
.scan = {
.min_dwell_time_active = 7500,
.max_dwell_time_active = 30000,
.min_dwell_time_active_long = 25000,
.max_dwell_time_active_long = 50000,
.dwell_time_passive = 100000,
.dwell_time_dfs = 150000,
.num_probe_reqs = 2,
.split_scan_timeout = 50000,
},
.sched_scan = {
/*
* Values are in TU/1000 but since sched scan FW command
* params are in TUs rounding up may occur.
*/
.base_dwell_time = 7500,
.max_dwell_time_delta = 22500,
/* based on 250bits per probe @1Mbps */
.dwell_time_delta_per_probe = 2000,
/* based on 250bits per probe @6Mbps (plus a bit more) */
.dwell_time_delta_per_probe_5 = 350,
.dwell_time_passive = 100000,
.dwell_time_dfs = 150000,
.num_probe_reqs = 2,
.rssi_threshold = -90,
.snr_threshold = 0,
},
.ht = {
.rx_ba_win_size = 8,
.tx_ba_win_size = 64,
.inactivity_timeout = 10000,
.tx_ba_tid_bitmap = CONF_TX_BA_ENABLED_TID_BITMAP,
},
/*
* Memory config for wl127x chips is given in the
* wl12xx_default_priv_conf struct. The below configuration is
* for wl128x chips.
*/
.mem = {
.num_stations = 1,
.ssid_profiles = 1,
.rx_block_num = 40,
.tx_min_block_num = 40,
.dynamic_memory = 1,
.min_req_tx_blocks = 45,
.min_req_rx_blocks = 22,
.tx_min = 27,
},
.fm_coex = {
.enable = true,
.swallow_period = 5,
.n_divider_fref_set_1 = 0xff, /* default */
.n_divider_fref_set_2 = 12,
.m_divider_fref_set_1 = 0xffff,
.m_divider_fref_set_2 = 148, /* default */
.coex_pll_stabilization_time = 0xffffffff, /* default */
.ldo_stabilization_time = 0xffff, /* default */
.fm_disturbed_band_margin = 0xff, /* default */
.swallow_clk_diff = 0xff, /* default */
},
.rx_streaming = {
.duration = 150,
.queues = 0x1,
.interval = 20,
.always = 0,
},
.fwlog = {
.mode = WL12XX_FWLOG_CONTINUOUS,
.mem_blocks = 2,
.severity = 0,
.timestamp = WL12XX_FWLOG_TIMESTAMP_DISABLED,
.output = WL12XX_FWLOG_OUTPUT_DBG_PINS,
.threshold = 0,
},
.rate = {
.rate_retry_score = 32000,
.per_add = 8192,
.per_th1 = 2048,
.per_th2 = 4096,
.max_per = 8100,
.inverse_curiosity_factor = 5,
.tx_fail_low_th = 4,
.tx_fail_high_th = 10,
.per_alpha_shift = 4,
.per_add_shift = 13,
.per_beta1_shift = 10,
.per_beta2_shift = 8,
.rate_check_up = 2,
.rate_check_down = 12,
.rate_retry_policy = {
0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00,
},
},
.hangover = {
.recover_time = 0,
.hangover_period = 20,
.dynamic_mode = 1,
.early_termination_mode = 1,
.max_period = 20,
.min_period = 1,
.increase_delta = 1,
.decrease_delta = 2,
.quiet_time = 4,
.increase_time = 1,
.window_size = 16,
},
.recovery = {
.bug_on_recovery = 0,
.no_recovery = 0,
},
};
static struct wl12xx_priv_conf wl12xx_default_priv_conf = {
.rf = {
.tx_per_channel_power_compensation_2 = {
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
},
.tx_per_channel_power_compensation_5 = {
0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
},
},
.mem_wl127x = {
.num_stations = 1,
.ssid_profiles = 1,
.rx_block_num = 70,
.tx_min_block_num = 40,
.dynamic_memory = 1,
.min_req_tx_blocks = 100,
.min_req_rx_blocks = 22,
.tx_min = 27,
},
};
#define WL12XX_TX_HW_BLOCK_SPARE_DEFAULT 1
#define WL12XX_TX_HW_BLOCK_GEM_SPARE 2
#define WL12XX_TX_HW_BLOCK_SIZE 252
static const u8 wl12xx_rate_to_idx_2ghz[] = {
/* MCS rates are used only with 11n */
7, /* WL12XX_CONF_HW_RXTX_RATE_MCS7_SGI */
7, /* WL12XX_CONF_HW_RXTX_RATE_MCS7 */
6, /* WL12XX_CONF_HW_RXTX_RATE_MCS6 */
5, /* WL12XX_CONF_HW_RXTX_RATE_MCS5 */
4, /* WL12XX_CONF_HW_RXTX_RATE_MCS4 */
3, /* WL12XX_CONF_HW_RXTX_RATE_MCS3 */
2, /* WL12XX_CONF_HW_RXTX_RATE_MCS2 */
1, /* WL12XX_CONF_HW_RXTX_RATE_MCS1 */
0, /* WL12XX_CONF_HW_RXTX_RATE_MCS0 */
11, /* WL12XX_CONF_HW_RXTX_RATE_54 */
10, /* WL12XX_CONF_HW_RXTX_RATE_48 */
9, /* WL12XX_CONF_HW_RXTX_RATE_36 */
8, /* WL12XX_CONF_HW_RXTX_RATE_24 */
/* TI-specific rate */
CONF_HW_RXTX_RATE_UNSUPPORTED, /* WL12XX_CONF_HW_RXTX_RATE_22 */
7, /* WL12XX_CONF_HW_RXTX_RATE_18 */
6, /* WL12XX_CONF_HW_RXTX_RATE_12 */
3, /* WL12XX_CONF_HW_RXTX_RATE_11 */
5, /* WL12XX_CONF_HW_RXTX_RATE_9 */
4, /* WL12XX_CONF_HW_RXTX_RATE_6 */
2, /* WL12XX_CONF_HW_RXTX_RATE_5_5 */
1, /* WL12XX_CONF_HW_RXTX_RATE_2 */
0 /* WL12XX_CONF_HW_RXTX_RATE_1 */
};
static const u8 wl12xx_rate_to_idx_5ghz[] = {
/* MCS rates are used only with 11n */
7, /* WL12XX_CONF_HW_RXTX_RATE_MCS7_SGI */
7, /* WL12XX_CONF_HW_RXTX_RATE_MCS7 */
6, /* WL12XX_CONF_HW_RXTX_RATE_MCS6 */
5, /* WL12XX_CONF_HW_RXTX_RATE_MCS5 */
4, /* WL12XX_CONF_HW_RXTX_RATE_MCS4 */
3, /* WL12XX_CONF_HW_RXTX_RATE_MCS3 */
2, /* WL12XX_CONF_HW_RXTX_RATE_MCS2 */
1, /* WL12XX_CONF_HW_RXTX_RATE_MCS1 */
0, /* WL12XX_CONF_HW_RXTX_RATE_MCS0 */
7, /* WL12XX_CONF_HW_RXTX_RATE_54 */
6, /* WL12XX_CONF_HW_RXTX_RATE_48 */
5, /* WL12XX_CONF_HW_RXTX_RATE_36 */
4, /* WL12XX_CONF_HW_RXTX_RATE_24 */
/* TI-specific rate */
CONF_HW_RXTX_RATE_UNSUPPORTED, /* WL12XX_CONF_HW_RXTX_RATE_22 */
3, /* WL12XX_CONF_HW_RXTX_RATE_18 */
2, /* WL12XX_CONF_HW_RXTX_RATE_12 */
CONF_HW_RXTX_RATE_UNSUPPORTED, /* WL12XX_CONF_HW_RXTX_RATE_11 */
1, /* WL12XX_CONF_HW_RXTX_RATE_9 */
0, /* WL12XX_CONF_HW_RXTX_RATE_6 */
CONF_HW_RXTX_RATE_UNSUPPORTED, /* WL12XX_CONF_HW_RXTX_RATE_5_5 */
CONF_HW_RXTX_RATE_UNSUPPORTED, /* WL12XX_CONF_HW_RXTX_RATE_2 */
CONF_HW_RXTX_RATE_UNSUPPORTED /* WL12XX_CONF_HW_RXTX_RATE_1 */
};
static const u8 *wl12xx_band_rate_to_idx[] = {
[NL80211_BAND_2GHZ] = wl12xx_rate_to_idx_2ghz,
[NL80211_BAND_5GHZ] = wl12xx_rate_to_idx_5ghz
};
enum wl12xx_hw_rates {
WL12XX_CONF_HW_RXTX_RATE_MCS7_SGI = 0,
WL12XX_CONF_HW_RXTX_RATE_MCS7,
WL12XX_CONF_HW_RXTX_RATE_MCS6,
WL12XX_CONF_HW_RXTX_RATE_MCS5,
WL12XX_CONF_HW_RXTX_RATE_MCS4,
WL12XX_CONF_HW_RXTX_RATE_MCS3,
WL12XX_CONF_HW_RXTX_RATE_MCS2,
WL12XX_CONF_HW_RXTX_RATE_MCS1,
WL12XX_CONF_HW_RXTX_RATE_MCS0,
WL12XX_CONF_HW_RXTX_RATE_54,
WL12XX_CONF_HW_RXTX_RATE_48,
WL12XX_CONF_HW_RXTX_RATE_36,
WL12XX_CONF_HW_RXTX_RATE_24,
WL12XX_CONF_HW_RXTX_RATE_22,
WL12XX_CONF_HW_RXTX_RATE_18,
WL12XX_CONF_HW_RXTX_RATE_12,
WL12XX_CONF_HW_RXTX_RATE_11,
WL12XX_CONF_HW_RXTX_RATE_9,
WL12XX_CONF_HW_RXTX_RATE_6,
WL12XX_CONF_HW_RXTX_RATE_5_5,
WL12XX_CONF_HW_RXTX_RATE_2,
WL12XX_CONF_HW_RXTX_RATE_1,
WL12XX_CONF_HW_RXTX_RATE_MAX,
};
static struct wlcore_partition_set wl12xx_ptable[PART_TABLE_LEN] = {
[PART_DOWN] = {
.mem = {
.start = 0x00000000,
.size = 0x000177c0
},
.reg = {
.start = REGISTERS_BASE,
.size = 0x00008800
},
.mem2 = {
.start = 0x00000000,
.size = 0x00000000
},
.mem3 = {
.start = 0x00000000,
.size = 0x00000000
},
},
[PART_BOOT] = { /* in wl12xx we can use a mix of work and down
* partition here */
.mem = {
.start = 0x00040000,
.size = 0x00014fc0
},
.reg = {
.start = REGISTERS_BASE,
.size = 0x00008800
},
.mem2 = {
.start = 0x00000000,
.size = 0x00000000
},
.mem3 = {
.start = 0x00000000,
.size = 0x00000000
},
},
[PART_WORK] = {
.mem = {
.start = 0x00040000,
.size = 0x00014fc0
},
.reg = {
.start = REGISTERS_BASE,
.size = 0x0000a000
},
.mem2 = {
.start = 0x003004f8,
.size = 0x00000004
},
.mem3 = {
.start = 0x00040404,
.size = 0x00000000
},
},
[PART_DRPW] = {
.mem = {
.start = 0x00040000,
.size = 0x00014fc0
},
.reg = {
.start = DRPW_BASE,
.size = 0x00006000
},
.mem2 = {
.start = 0x00000000,
.size = 0x00000000
},
.mem3 = {
.start = 0x00000000,
.size = 0x00000000
}
}
};
static const int wl12xx_rtable[REG_TABLE_LEN] = {
[REG_ECPU_CONTROL] = WL12XX_REG_ECPU_CONTROL,
[REG_INTERRUPT_NO_CLEAR] = WL12XX_REG_INTERRUPT_NO_CLEAR,
[REG_INTERRUPT_ACK] = WL12XX_REG_INTERRUPT_ACK,
[REG_COMMAND_MAILBOX_PTR] = WL12XX_REG_COMMAND_MAILBOX_PTR,
[REG_EVENT_MAILBOX_PTR] = WL12XX_REG_EVENT_MAILBOX_PTR,
[REG_INTERRUPT_TRIG] = WL12XX_REG_INTERRUPT_TRIG,
[REG_INTERRUPT_MASK] = WL12XX_REG_INTERRUPT_MASK,
[REG_PC_ON_RECOVERY] = WL12XX_SCR_PAD4,
[REG_CHIP_ID_B] = WL12XX_CHIP_ID_B,
[REG_CMD_MBOX_ADDRESS] = WL12XX_CMD_MBOX_ADDRESS,
/* data access memory addresses, used with partition translation */
[REG_SLV_MEM_DATA] = WL1271_SLV_MEM_DATA,
[REG_SLV_REG_DATA] = WL1271_SLV_REG_DATA,
/* raw data access memory addresses */
[REG_RAW_FW_STATUS_ADDR] = FW_STATUS_ADDR,
};
/* TODO: maybe move to a new header file? */
#define WL127X_FW_NAME_MULTI "ti-connectivity/wl127x-fw-5-mr.bin"
#define WL127X_FW_NAME_SINGLE "ti-connectivity/wl127x-fw-5-sr.bin"
#define WL127X_PLT_FW_NAME "ti-connectivity/wl127x-fw-5-plt.bin"
#define WL128X_FW_NAME_MULTI "ti-connectivity/wl128x-fw-5-mr.bin"
#define WL128X_FW_NAME_SINGLE "ti-connectivity/wl128x-fw-5-sr.bin"
#define WL128X_PLT_FW_NAME "ti-connectivity/wl128x-fw-5-plt.bin"
static int wl127x_prepare_read(struct wl1271 *wl, u32 rx_desc, u32 len)
{
int ret;
if (wl->chip.id != CHIP_ID_128X_PG20) {
struct wl1271_acx_mem_map *wl_mem_map = wl->target_mem_map;
struct wl12xx_priv *priv = wl->priv;
/*
* Choose the block we want to read
* For aggregated packets, only the first memory block
* should be retrieved. The FW takes care of the rest.
*/
u32 mem_block = rx_desc & RX_MEM_BLOCK_MASK;
priv->rx_mem_addr->addr = (mem_block << 8) +
le32_to_cpu(wl_mem_map->packet_memory_pool_start);
priv->rx_mem_addr->addr_extra = priv->rx_mem_addr->addr + 4;
ret = wlcore_write(wl, WL1271_SLV_REG_DATA, priv->rx_mem_addr,
sizeof(*priv->rx_mem_addr), false);
if (ret < 0)
return ret;
}
return 0;
}
static int wl12xx_identify_chip(struct wl1271 *wl)
{
int ret = 0;
switch (wl->chip.id) {
case CHIP_ID_127X_PG10:
wl1271_warning("chip id 0x%x (1271 PG10) support is obsolete",
wl->chip.id);
wl->quirks |= WLCORE_QUIRK_LEGACY_NVS |
WLCORE_QUIRK_DUAL_PROBE_TMPL |
WLCORE_QUIRK_TKIP_HEADER_SPACE |
WLCORE_QUIRK_START_STA_FAILS |
WLCORE_QUIRK_AP_ZERO_SESSION_ID;
wl->sr_fw_name = WL127X_FW_NAME_SINGLE;
wl->mr_fw_name = WL127X_FW_NAME_MULTI;
memcpy(&wl->conf.mem, &wl12xx_default_priv_conf.mem_wl127x,
sizeof(wl->conf.mem));
/* read data preparation is only needed by wl127x */
wl->ops->prepare_read = wl127x_prepare_read;
wlcore_set_min_fw_ver(wl, WL127X_CHIP_VER,
WL127X_IFTYPE_SR_VER, WL127X_MAJOR_SR_VER,
WL127X_SUBTYPE_SR_VER, WL127X_MINOR_SR_VER,
WL127X_IFTYPE_MR_VER, WL127X_MAJOR_MR_VER,
WL127X_SUBTYPE_MR_VER, WL127X_MINOR_MR_VER);
break;
case CHIP_ID_127X_PG20:
wl1271_debug(DEBUG_BOOT, "chip id 0x%x (1271 PG20)",
wl->chip.id);
wl->quirks |= WLCORE_QUIRK_LEGACY_NVS |
WLCORE_QUIRK_DUAL_PROBE_TMPL |
WLCORE_QUIRK_TKIP_HEADER_SPACE |
WLCORE_QUIRK_START_STA_FAILS |
WLCORE_QUIRK_AP_ZERO_SESSION_ID;
wl->plt_fw_name = WL127X_PLT_FW_NAME;
wl->sr_fw_name = WL127X_FW_NAME_SINGLE;
wl->mr_fw_name = WL127X_FW_NAME_MULTI;
memcpy(&wl->conf.mem, &wl12xx_default_priv_conf.mem_wl127x,
sizeof(wl->conf.mem));
/* read data preparation is only needed by wl127x */
wl->ops->prepare_read = wl127x_prepare_read;
wlcore_set_min_fw_ver(wl, WL127X_CHIP_VER,
WL127X_IFTYPE_SR_VER, WL127X_MAJOR_SR_VER,
WL127X_SUBTYPE_SR_VER, WL127X_MINOR_SR_VER,
WL127X_IFTYPE_MR_VER, WL127X_MAJOR_MR_VER,
WL127X_SUBTYPE_MR_VER, WL127X_MINOR_MR_VER);
break;
case CHIP_ID_128X_PG20:
wl1271_debug(DEBUG_BOOT, "chip id 0x%x (1283 PG20)",
wl->chip.id);
wl->plt_fw_name = WL128X_PLT_FW_NAME;
wl->sr_fw_name = WL128X_FW_NAME_SINGLE;
wl->mr_fw_name = WL128X_FW_NAME_MULTI;
/* wl128x requires TX blocksize alignment */
wl->quirks |= WLCORE_QUIRK_TX_BLOCKSIZE_ALIGN |
WLCORE_QUIRK_DUAL_PROBE_TMPL |
WLCORE_QUIRK_TKIP_HEADER_SPACE |
WLCORE_QUIRK_START_STA_FAILS |
WLCORE_QUIRK_AP_ZERO_SESSION_ID;
wlcore_set_min_fw_ver(wl, WL128X_CHIP_VER,
WL128X_IFTYPE_SR_VER, WL128X_MAJOR_SR_VER,
WL128X_SUBTYPE_SR_VER, WL128X_MINOR_SR_VER,
WL128X_IFTYPE_MR_VER, WL128X_MAJOR_MR_VER,
WL128X_SUBTYPE_MR_VER, WL128X_MINOR_MR_VER);
break;
case CHIP_ID_128X_PG10:
default:
wl1271_warning("unsupported chip id: 0x%x", wl->chip.id);
ret = -ENODEV;
goto out;
}
wl->fw_mem_block_size = 256;
wl->fwlog_end = 0x2000000;
/* common settings */
wl->scan_templ_id_2_4 = CMD_TEMPL_APP_PROBE_REQ_2_4_LEGACY;
wl->scan_templ_id_5 = CMD_TEMPL_APP_PROBE_REQ_5_LEGACY;
wl->sched_scan_templ_id_2_4 = CMD_TEMPL_CFG_PROBE_REQ_2_4;
wl->sched_scan_templ_id_5 = CMD_TEMPL_CFG_PROBE_REQ_5;
wl->max_channels_5 = WL12XX_MAX_CHANNELS_5GHZ;
wl->ba_rx_session_count_max = WL12XX_RX_BA_MAX_SESSIONS;
out:
return ret;
}
static int __must_check wl12xx_top_reg_write(struct wl1271 *wl, int addr,
u16 val)
{
int ret;
/* write address >> 1 + 0x30000 to OCP_POR_CTR */
addr = (addr >> 1) + 0x30000;
ret = wlcore_write32(wl, WL12XX_OCP_POR_CTR, addr);
if (ret < 0)
goto out;
/* write value to OCP_POR_WDATA */
ret = wlcore_write32(wl, WL12XX_OCP_DATA_WRITE, val);
if (ret < 0)
goto out;
/* write 1 to OCP_CMD */
ret = wlcore_write32(wl, WL12XX_OCP_CMD, OCP_CMD_WRITE);
if (ret < 0)
goto out;
out:
return ret;
}
static int __must_check wl12xx_top_reg_read(struct wl1271 *wl, int addr,
u16 *out)
{
u32 val;
int timeout = OCP_CMD_LOOP;
int ret;
/* write address >> 1 + 0x30000 to OCP_POR_CTR */
addr = (addr >> 1) + 0x30000;
ret = wlcore_write32(wl, WL12XX_OCP_POR_CTR, addr);
if (ret < 0)
return ret;
/* write 2 to OCP_CMD */
ret = wlcore_write32(wl, WL12XX_OCP_CMD, OCP_CMD_READ);
if (ret < 0)
return ret;
/* poll for data ready */
do {
ret = wlcore_read32(wl, WL12XX_OCP_DATA_READ, &val);
if (ret < 0)
return ret;
} while (!(val & OCP_READY_MASK) && --timeout);
if (!timeout) {
wl1271_warning("Top register access timed out.");
return -ETIMEDOUT;
}
/* check data status and return if OK */
if ((val & OCP_STATUS_MASK) != OCP_STATUS_OK) {
wl1271_warning("Top register access returned error.");
return -EIO;
}
if (out)
*out = val & 0xffff;
return 0;
}
static int wl128x_switch_tcxo_to_fref(struct wl1271 *wl)
{
u16 spare_reg;
int ret;
/* Mask bits [2] & [8:4] in the sys_clk_cfg register */
ret = wl12xx_top_reg_read(wl, WL_SPARE_REG, &spare_reg);
if (ret < 0)
return ret;
if (spare_reg == 0xFFFF)
return -EFAULT;
spare_reg |= (BIT(3) | BIT(5) | BIT(6));
ret = wl12xx_top_reg_write(wl, WL_SPARE_REG, spare_reg);
if (ret < 0)
return ret;
/* Enable FREF_CLK_REQ & mux MCS and coex PLLs to FREF */
ret = wl12xx_top_reg_write(wl, SYS_CLK_CFG_REG,
WL_CLK_REQ_TYPE_PG2 | MCS_PLL_CLK_SEL_FREF);
if (ret < 0)
return ret;
/* Delay execution for 15msec, to let the HW settle */
mdelay(15);
return 0;
}
static bool wl128x_is_tcxo_valid(struct wl1271 *wl)
{
u16 tcxo_detection;
int ret;
ret = wl12xx_top_reg_read(wl, TCXO_CLK_DETECT_REG, &tcxo_detection);
if (ret < 0)
return false;
if (tcxo_detection & TCXO_DET_FAILED)
return false;
return true;
}
static bool wl128x_is_fref_valid(struct wl1271 *wl)
{
u16 fref_detection;
int ret;
ret = wl12xx_top_reg_read(wl, FREF_CLK_DETECT_REG, &fref_detection);
if (ret < 0)
return false;
if (fref_detection & FREF_CLK_DETECT_FAIL)
return false;
return true;
}
static int wl128x_manually_configure_mcs_pll(struct wl1271 *wl)
{
int ret;
ret = wl12xx_top_reg_write(wl, MCS_PLL_M_REG, MCS_PLL_M_REG_VAL);
if (ret < 0)
goto out;
ret = wl12xx_top_reg_write(wl, MCS_PLL_N_REG, MCS_PLL_N_REG_VAL);
if (ret < 0)
goto out;
ret = wl12xx_top_reg_write(wl, MCS_PLL_CONFIG_REG,
MCS_PLL_CONFIG_REG_VAL);
out:
return ret;
}
static int wl128x_configure_mcs_pll(struct wl1271 *wl, int clk)
{
u16 spare_reg;
u16 pll_config;
u8 input_freq;
struct wl12xx_priv *priv = wl->priv;
int ret;
/* Mask bits [3:1] in the sys_clk_cfg register */
ret = wl12xx_top_reg_read(wl, WL_SPARE_REG, &spare_reg);
if (ret < 0)
return ret;
if (spare_reg == 0xFFFF)
return -EFAULT;
spare_reg |= BIT(2);
ret = wl12xx_top_reg_write(wl, WL_SPARE_REG, spare_reg);
if (ret < 0)
return ret;
/* Handle special cases of the TCXO clock */
if (priv->tcxo_clock == WL12XX_TCXOCLOCK_16_8 ||
priv->tcxo_clock == WL12XX_TCXOCLOCK_33_6)
return wl128x_manually_configure_mcs_pll(wl);
/* Set the input frequency according to the selected clock source */
input_freq = (clk & 1) + 1;
ret = wl12xx_top_reg_read(wl, MCS_PLL_CONFIG_REG, &pll_config);
if (ret < 0)
return ret;
if (pll_config == 0xFFFF)
return -EFAULT;
pll_config |= (input_freq << MCS_SEL_IN_FREQ_SHIFT);
pll_config |= MCS_PLL_ENABLE_HP;
ret = wl12xx_top_reg_write(wl, MCS_PLL_CONFIG_REG, pll_config);
return ret;
}
/*
* WL128x has two clocks input - TCXO and FREF.
* TCXO is the main clock of the device, while FREF is used to sync
* between the GPS and the cellular modem.
* In cases where TCXO is 32.736MHz or 16.368MHz, the FREF will be used
* as the WLAN/BT main clock.
*/
static int wl128x_boot_clk(struct wl1271 *wl, int *selected_clock)
{
struct wl12xx_priv *priv = wl->priv;
u16 sys_clk_cfg;
int ret;
/* For XTAL-only modes, FREF will be used after switching from TCXO */
if (priv->ref_clock == WL12XX_REFCLOCK_26_XTAL ||
priv->ref_clock == WL12XX_REFCLOCK_38_XTAL) {
if (!wl128x_switch_tcxo_to_fref(wl))
return -EINVAL;
goto fref_clk;
}
/* Query the HW, to determine which clock source we should use */
ret = wl12xx_top_reg_read(wl, SYS_CLK_CFG_REG, &sys_clk_cfg);
if (ret < 0)
return ret;
if (sys_clk_cfg == 0xFFFF)
return -EINVAL;
if (sys_clk_cfg & PRCM_CM_EN_MUX_WLAN_FREF)
goto fref_clk;
/* If TCXO is either 32.736MHz or 16.368MHz, switch to FREF */
if (priv->tcxo_clock == WL12XX_TCXOCLOCK_16_368 ||
priv->tcxo_clock == WL12XX_TCXOCLOCK_32_736) {
if (!wl128x_switch_tcxo_to_fref(wl))
return -EINVAL;
goto fref_clk;
}
/* TCXO clock is selected */
if (!wl128x_is_tcxo_valid(wl))
return -EINVAL;
*selected_clock = priv->tcxo_clock;
goto config_mcs_pll;
fref_clk:
/* FREF clock is selected */
if (!wl128x_is_fref_valid(wl))
return -EINVAL;
*selected_clock = priv->ref_clock;
config_mcs_pll:
return wl128x_configure_mcs_pll(wl, *selected_clock);
}
static int wl127x_boot_clk(struct wl1271 *wl)
{
struct wl12xx_priv *priv = wl->priv;
u32 pause;
u32 clk;
int ret;
if (WL127X_PG_GET_MAJOR(wl->hw_pg_ver) < 3)
wl->quirks |= WLCORE_QUIRK_END_OF_TRANSACTION;
if (priv->ref_clock == CONF_REF_CLK_19_2_E ||
priv->ref_clock == CONF_REF_CLK_38_4_E ||
priv->ref_clock == CONF_REF_CLK_38_4_M_XTAL)
/* ref clk: 19.2/38.4/38.4-XTAL */
clk = 0x3;
else if (priv->ref_clock == CONF_REF_CLK_26_E ||
priv->ref_clock == CONF_REF_CLK_26_M_XTAL ||
priv->ref_clock == CONF_REF_CLK_52_E)
/* ref clk: 26/52 */
clk = 0x5;
else
return -EINVAL;
if (priv->ref_clock != CONF_REF_CLK_19_2_E) {
u16 val;
/* Set clock type (open drain) */
ret = wl12xx_top_reg_read(wl, OCP_REG_CLK_TYPE, &val);
if (ret < 0)
goto out;
val &= FREF_CLK_TYPE_BITS;
ret = wl12xx_top_reg_write(wl, OCP_REG_CLK_TYPE, val);
if (ret < 0)
goto out;
/* Set clock pull mode (no pull) */
ret = wl12xx_top_reg_read(wl, OCP_REG_CLK_PULL, &val);
if (ret < 0)
goto out;
val |= NO_PULL;
ret = wl12xx_top_reg_write(wl, OCP_REG_CLK_PULL, val);
if (ret < 0)
goto out;
} else {
u16 val;
/* Set clock polarity */
ret = wl12xx_top_reg_read(wl, OCP_REG_CLK_POLARITY, &val);
if (ret < 0)
goto out;
val &= FREF_CLK_POLARITY_BITS;
val |= CLK_REQ_OUTN_SEL;
ret = wl12xx_top_reg_write(wl, OCP_REG_CLK_POLARITY, val);
if (ret < 0)
goto out;
}
ret = wlcore_write32(wl, WL12XX_PLL_PARAMETERS, clk);
if (ret < 0)
goto out;
ret = wlcore_read32(wl, WL12XX_PLL_PARAMETERS, &pause);
if (ret < 0)
goto out;
wl1271_debug(DEBUG_BOOT, "pause1 0x%x", pause);
pause &= ~(WU_COUNTER_PAUSE_VAL);
pause |= WU_COUNTER_PAUSE_VAL;
ret = wlcore_write32(wl, WL12XX_WU_COUNTER_PAUSE, pause);
out:
return ret;
}
static int wl1271_boot_soft_reset(struct wl1271 *wl)
{
unsigned long timeout;
u32 boot_data;
int ret = 0;
/* perform soft reset */
ret = wlcore_write32(wl, WL12XX_SLV_SOFT_RESET, ACX_SLV_SOFT_RESET_BIT);
if (ret < 0)
goto out;
/* SOFT_RESET is self clearing */
timeout = jiffies + usecs_to_jiffies(SOFT_RESET_MAX_TIME);
while (1) {
ret = wlcore_read32(wl, WL12XX_SLV_SOFT_RESET, &boot_data);
if (ret < 0)
goto out;
wl1271_debug(DEBUG_BOOT, "soft reset bootdata 0x%x", boot_data);
if ((boot_data & ACX_SLV_SOFT_RESET_BIT) == 0)
break;
if (time_after(jiffies, timeout)) {
/* 1.2 check pWhalBus->uSelfClearTime if the
* timeout was reached */
wl1271_error("soft reset timeout");
return -1;
}
udelay(SOFT_RESET_STALL_TIME);
}
/* disable Rx/Tx */
ret = wlcore_write32(wl, WL12XX_ENABLE, 0x0);
if (ret < 0)
goto out;
/* disable auto calibration on start*/
ret = wlcore_write32(wl, WL12XX_SPARE_A2, 0xffff);
out:
return ret;
}
static int wl12xx_pre_boot(struct wl1271 *wl)
{
struct wl12xx_priv *priv = wl->priv;
int ret = 0;
u32 clk;
int selected_clock = -1;
if (wl->chip.id == CHIP_ID_128X_PG20) {
ret = wl128x_boot_clk(wl, &selected_clock);
if (ret < 0)
goto out;
} else {
ret = wl127x_boot_clk(wl);
if (ret < 0)
goto out;
}
/* Continue the ELP wake up sequence */
ret = wlcore_write32(wl, WL12XX_WELP_ARM_COMMAND, WELP_ARM_COMMAND_VAL);
if (ret < 0)
goto out;
udelay(500);
ret = wlcore_set_partition(wl, &wl->ptable[PART_DRPW]);
if (ret < 0)
goto out;
/* Read-modify-write DRPW_SCRATCH_START register (see next state)
to be used by DRPw FW. The RTRIM value will be added by the FW
before taking DRPw out of reset */
ret = wlcore_read32(wl, WL12XX_DRPW_SCRATCH_START, &clk);
if (ret < 0)
goto out;
wl1271_debug(DEBUG_BOOT, "clk2 0x%x", clk);
if (wl->chip.id == CHIP_ID_128X_PG20)
clk |= ((selected_clock & 0x3) << 1) << 4;
else
clk |= (priv->ref_clock << 1) << 4;
ret = wlcore_write32(wl, WL12XX_DRPW_SCRATCH_START, clk);
if (ret < 0)
goto out;
ret = wlcore_set_partition(wl, &wl->ptable[PART_WORK]);
if (ret < 0)
goto out;
/* Disable interrupts */
ret = wlcore_write_reg(wl, REG_INTERRUPT_MASK, WL1271_ACX_INTR_ALL);
if (ret < 0)
goto out;
ret = wl1271_boot_soft_reset(wl);
if (ret < 0)
goto out;
out:
return ret;
}
static int wl12xx_pre_upload(struct wl1271 *wl)
{
u32 tmp;
u16 polarity;
int ret;
/* write firmware's last address (ie. it's length) to
* ACX_EEPROMLESS_IND_REG */
wl1271_debug(DEBUG_BOOT, "ACX_EEPROMLESS_IND_REG");
ret = wlcore_write32(wl, WL12XX_EEPROMLESS_IND, WL12XX_EEPROMLESS_IND);
if (ret < 0)
goto out;
ret = wlcore_read_reg(wl, REG_CHIP_ID_B, &tmp);
if (ret < 0)
goto out;
wl1271_debug(DEBUG_BOOT, "chip id 0x%x", tmp);
/* 6. read the EEPROM parameters */
ret = wlcore_read32(wl, WL12XX_SCR_PAD2, &tmp);
if (ret < 0)
goto out;
/* WL1271: The reference driver skips steps 7 to 10 (jumps directly
* to upload_fw) */
if (wl->chip.id == CHIP_ID_128X_PG20) {
ret = wl12xx_top_reg_write(wl, SDIO_IO_DS, HCI_IO_DS_6MA);
if (ret < 0)
goto out;
}
/* polarity must be set before the firmware is loaded */
ret = wl12xx_top_reg_read(wl, OCP_REG_POLARITY, &polarity);
if (ret < 0)
goto out;
/* We use HIGH polarity, so unset the LOW bit */
polarity &= ~POLARITY_LOW;
ret = wl12xx_top_reg_write(wl, OCP_REG_POLARITY, polarity);
out:
return ret;
}
static int wl12xx_enable_interrupts(struct wl1271 *wl)
{
int ret;
ret = wlcore_write_reg(wl, REG_INTERRUPT_MASK,
WL12XX_ACX_ALL_EVENTS_VECTOR);
if (ret < 0)
goto out;
wlcore_enable_interrupts(wl);
ret = wlcore_write_reg(wl, REG_INTERRUPT_MASK,
WL1271_ACX_INTR_ALL & ~(WL12XX_INTR_MASK));
if (ret < 0)
goto disable_interrupts;
ret = wlcore_write32(wl, WL12XX_HI_CFG, HI_CFG_DEF_VAL);
if (ret < 0)
goto disable_interrupts;
return ret;
disable_interrupts:
wlcore_disable_interrupts(wl);
out:
return ret;
}
static int wl12xx_boot(struct wl1271 *wl)
{
int ret;
ret = wl12xx_pre_boot(wl);
if (ret < 0)
goto out;
ret = wlcore_boot_upload_nvs(wl);
if (ret < 0)
goto out;
ret = wl12xx_pre_upload(wl);
if (ret < 0)
goto out;
ret = wlcore_boot_upload_firmware(wl);
if (ret < 0)
goto out;
wl->event_mask = BSS_LOSE_EVENT_ID |
REGAINED_BSS_EVENT_ID |
SCAN_COMPLETE_EVENT_ID |
ROLE_STOP_COMPLETE_EVENT_ID |
RSSI_SNR_TRIGGER_0_EVENT_ID |
PSPOLL_DELIVERY_FAILURE_EVENT_ID |
SOFT_GEMINI_SENSE_EVENT_ID |
PERIODIC_SCAN_REPORT_EVENT_ID |
PERIODIC_SCAN_COMPLETE_EVENT_ID |
DUMMY_PACKET_EVENT_ID |
PEER_REMOVE_COMPLETE_EVENT_ID |
BA_SESSION_RX_CONSTRAINT_EVENT_ID |
REMAIN_ON_CHANNEL_COMPLETE_EVENT_ID |
INACTIVE_STA_EVENT_ID |
CHANNEL_SWITCH_COMPLETE_EVENT_ID;
wl->ap_event_mask = MAX_TX_RETRY_EVENT_ID;
ret = wlcore_boot_run_firmware(wl);
if (ret < 0)
goto out;
ret = wl12xx_enable_interrupts(wl);
out:
return ret;
}
static int wl12xx_trigger_cmd(struct wl1271 *wl, int cmd_box_addr,
void *buf, size_t len)
{
int ret;
ret = wlcore_write(wl, cmd_box_addr, buf, len, false);
if (ret < 0)
return ret;
ret = wlcore_write_reg(wl, REG_INTERRUPT_TRIG, WL12XX_INTR_TRIG_CMD);
return ret;
}
static int wl12xx_ack_event(struct wl1271 *wl)
{
return wlcore_write_reg(wl, REG_INTERRUPT_TRIG,
WL12XX_INTR_TRIG_EVENT_ACK);
}
static u32 wl12xx_calc_tx_blocks(struct wl1271 *wl, u32 len, u32 spare_blks)
{
u32 blk_size = WL12XX_TX_HW_BLOCK_SIZE;
u32 align_len = wlcore_calc_packet_alignment(wl, len);
return (align_len + blk_size - 1) / blk_size + spare_blks;
}
static void
wl12xx_set_tx_desc_blocks(struct wl1271 *wl, struct wl1271_tx_hw_descr *desc,
u32 blks, u32 spare_blks)
{
if (wl->chip.id == CHIP_ID_128X_PG20) {
desc->wl128x_mem.total_mem_blocks = blks;
} else {
desc->wl127x_mem.extra_blocks = spare_blks;
desc->wl127x_mem.total_mem_blocks = blks;
}
}
static void
wl12xx_set_tx_desc_data_len(struct wl1271 *wl, struct wl1271_tx_hw_descr *desc,
struct sk_buff *skb)
{
u32 aligned_len = wlcore_calc_packet_alignment(wl, skb->len);
if (wl->chip.id == CHIP_ID_128X_PG20) {
desc->wl128x_mem.extra_bytes = aligned_len - skb->len;
desc->length = cpu_to_le16(aligned_len >> 2);
wl1271_debug(DEBUG_TX,
"tx_fill_hdr: hlid: %d len: %d life: %d mem: %d extra: %d",
desc->hlid,
le16_to_cpu(desc->length),
le16_to_cpu(desc->life_time),
desc->wl128x_mem.total_mem_blocks,
desc->wl128x_mem.extra_bytes);
} else {
/* calculate number of padding bytes */
int pad = aligned_len - skb->len;
desc->tx_attr |=
cpu_to_le16(pad << TX_HW_ATTR_OFST_LAST_WORD_PAD);
/* Store the aligned length in terms of words */
desc->length = cpu_to_le16(aligned_len >> 2);
wl1271_debug(DEBUG_TX,
"tx_fill_hdr: pad: %d hlid: %d len: %d life: %d mem: %d",
pad, desc->hlid,
le16_to_cpu(desc->length),
le16_to_cpu(desc->life_time),
desc->wl127x_mem.total_mem_blocks);
}
}
static enum wl_rx_buf_align
wl12xx_get_rx_buf_align(struct wl1271 *wl, u32 rx_desc)
{
if (rx_desc & RX_BUF_UNALIGNED_PAYLOAD)
return WLCORE_RX_BUF_UNALIGNED;
return WLCORE_RX_BUF_ALIGNED;
}
static u32 wl12xx_get_rx_packet_len(struct wl1271 *wl, void *rx_data,
u32 data_len)
{
struct wl1271_rx_descriptor *desc = rx_data;
/* invalid packet */
if (data_len < sizeof(*desc) ||
data_len < sizeof(*desc) + desc->pad_len)
return 0;
return data_len - sizeof(*desc) - desc->pad_len;
}
static int wl12xx_tx_delayed_compl(struct wl1271 *wl)
{
if (wl->fw_status->tx_results_counter ==
(wl->tx_results_count & 0xff))
return 0;
return wlcore_tx_complete(wl);
}
static int wl12xx_hw_init(struct wl1271 *wl)
{
int ret;
if (wl->chip.id == CHIP_ID_128X_PG20) {
u32 host_cfg_bitmap = HOST_IF_CFG_RX_FIFO_ENABLE;
ret = wl128x_cmd_general_parms(wl);
if (ret < 0)
goto out;
/*
* If we are in calibrator based auto detect then we got the FEM nr
* in wl->fem_manuf. No need to continue further
*/
if (wl->plt_mode == PLT_FEM_DETECT)
goto out;
ret = wl128x_cmd_radio_parms(wl);
if (ret < 0)
goto out;
if (wl->quirks & WLCORE_QUIRK_TX_BLOCKSIZE_ALIGN)
/* Enable SDIO padding */
host_cfg_bitmap |= HOST_IF_CFG_TX_PAD_TO_SDIO_BLK;
/* Must be before wl1271_acx_init_mem_config() */
ret = wl1271_acx_host_if_cfg_bitmap(wl, host_cfg_bitmap);
if (ret < 0)
goto out;
} else {
ret = wl1271_cmd_general_parms(wl);
if (ret < 0)
goto out;
/*
* If we are in calibrator based auto detect then we got the FEM nr
* in wl->fem_manuf. No need to continue further
*/
if (wl->plt_mode == PLT_FEM_DETECT)
goto out;
ret = wl1271_cmd_radio_parms(wl);
if (ret < 0)
goto out;
ret = wl1271_cmd_ext_radio_parms(wl);
if (ret < 0)
goto out;
}
out:
return ret;
}
static void wl12xx_convert_fw_status(struct wl1271 *wl, void *raw_fw_status,
struct wl_fw_status *fw_status)
{
struct wl12xx_fw_status *int_fw_status = raw_fw_status;
fw_status->intr = le32_to_cpu(int_fw_status->intr);
fw_status->fw_rx_counter = int_fw_status->fw_rx_counter;
fw_status->drv_rx_counter = int_fw_status->drv_rx_counter;
fw_status->tx_results_counter = int_fw_status->tx_results_counter;
fw_status->rx_pkt_descs = int_fw_status->rx_pkt_descs;
fw_status->fw_localtime = le32_to_cpu(int_fw_status->fw_localtime);
fw_status->link_ps_bitmap = le32_to_cpu(int_fw_status->link_ps_bitmap);
fw_status->link_fast_bitmap =
le32_to_cpu(int_fw_status->link_fast_bitmap);
fw_status->total_released_blks =
le32_to_cpu(int_fw_status->total_released_blks);
fw_status->tx_total = le32_to_cpu(int_fw_status->tx_total);
fw_status->counters.tx_released_pkts =
int_fw_status->counters.tx_released_pkts;
fw_status->counters.tx_lnk_free_pkts =
int_fw_status->counters.tx_lnk_free_pkts;
fw_status->counters.tx_voice_released_blks =
int_fw_status->counters.tx_voice_released_blks;
fw_status->counters.tx_last_rate =
int_fw_status->counters.tx_last_rate;
fw_status->log_start_addr = le32_to_cpu(int_fw_status->log_start_addr);
}
static u32 wl12xx_sta_get_ap_rate_mask(struct wl1271 *wl,
struct wl12xx_vif *wlvif)
{
return wlvif->rate_set;
}
static void wl12xx_conf_init(struct wl1271 *wl)
{
struct wl12xx_priv *priv = wl->priv;
/* apply driver default configuration */
memcpy(&wl->conf, &wl12xx_conf, sizeof(wl12xx_conf));
/* apply default private configuration */
memcpy(&priv->conf, &wl12xx_default_priv_conf, sizeof(priv->conf));
}
static bool wl12xx_mac_in_fuse(struct wl1271 *wl)
{
bool supported = false;
u8 major, minor;
if (wl->chip.id == CHIP_ID_128X_PG20) {
major = WL128X_PG_GET_MAJOR(wl->hw_pg_ver);
minor = WL128X_PG_GET_MINOR(wl->hw_pg_ver);
/* in wl128x we have the MAC address if the PG is >= (2, 1) */
if (major > 2 || (major == 2 && minor >= 1))
supported = true;
} else {
major = WL127X_PG_GET_MAJOR(wl->hw_pg_ver);
minor = WL127X_PG_GET_MINOR(wl->hw_pg_ver);
/* in wl127x we have the MAC address if the PG is >= (3, 1) */
if (major == 3 && minor >= 1)
supported = true;
}
wl1271_debug(DEBUG_PROBE,
"PG Ver major = %d minor = %d, MAC %s present",
major, minor, supported ? "is" : "is not");
return supported;
}
static int wl12xx_get_fuse_mac(struct wl1271 *wl)
{
u32 mac1, mac2;
int ret;
ret = wlcore_set_partition(wl, &wl->ptable[PART_DRPW]);
if (ret < 0)
goto out;
ret = wlcore_read32(wl, WL12XX_REG_FUSE_BD_ADDR_1, &mac1);
if (ret < 0)
goto out;
ret = wlcore_read32(wl, WL12XX_REG_FUSE_BD_ADDR_2, &mac2);
if (ret < 0)
goto out;
/* these are the two parts of the BD_ADDR */
wl->fuse_oui_addr = ((mac2 & 0xffff) << 8) +
((mac1 & 0xff000000) >> 24);
wl->fuse_nic_addr = mac1 & 0xffffff;
ret = wlcore_set_partition(wl, &wl->ptable[PART_DOWN]);
out:
return ret;
}
static int wl12xx_get_pg_ver(struct wl1271 *wl, s8 *ver)
{
u16 die_info;
int ret;
if (wl->chip.id == CHIP_ID_128X_PG20)
ret = wl12xx_top_reg_read(wl, WL128X_REG_FUSE_DATA_2_1,
&die_info);
else
ret = wl12xx_top_reg_read(wl, WL127X_REG_FUSE_DATA_2_1,
&die_info);
if (ret >= 0 && ver)
*ver = (s8)((die_info & PG_VER_MASK) >> PG_VER_OFFSET);
return ret;
}
static int wl12xx_get_mac(struct wl1271 *wl)
{
if (wl12xx_mac_in_fuse(wl))
return wl12xx_get_fuse_mac(wl);
return 0;
}
static void wl12xx_set_tx_desc_csum(struct wl1271 *wl,
struct wl1271_tx_hw_descr *desc,
struct sk_buff *skb)
{
desc->wl12xx_reserved = 0;
}
static int wl12xx_plt_init(struct wl1271 *wl)
{
int ret;
ret = wl->ops->boot(wl);
if (ret < 0)
goto out;
ret = wl->ops->hw_init(wl);
if (ret < 0)
goto out_irq_disable;
/*
* If we are in calibrator based auto detect then we got the FEM nr
* in wl->fem_manuf. No need to continue further
*/
if (wl->plt_mode == PLT_FEM_DETECT)
goto out;
ret = wl1271_acx_init_mem_config(wl);
if (ret < 0)
goto out_irq_disable;
ret = wl12xx_acx_mem_cfg(wl);
if (ret < 0)
goto out_free_memmap;
/* Enable data path */
ret = wl1271_cmd_data_path(wl, 1);
if (ret < 0)
goto out_free_memmap;
/* Configure for CAM power saving (ie. always active) */
ret = wl1271_acx_sleep_auth(wl, WL1271_PSM_CAM);
if (ret < 0)
goto out_free_memmap;
/* configure PM */
ret = wl1271_acx_pm_config(wl);
if (ret < 0)
goto out_free_memmap;
goto out;
out_free_memmap:
kfree(wl->target_mem_map);
wl->target_mem_map = NULL;
out_irq_disable:
mutex_unlock(&wl->mutex);
/* Unlocking the mutex in the middle of handling is
inherently unsafe. In this case we deem it safe to do,
because we need to let any possibly pending IRQ out of
the system (and while we are WL1271_STATE_OFF the IRQ
work function will not do anything.) Also, any other
possible concurrent operations will fail due to the
current state, hence the wl1271 struct should be safe. */
wlcore_disable_interrupts(wl);
mutex_lock(&wl->mutex);
out:
return ret;
}
static int wl12xx_get_spare_blocks(struct wl1271 *wl, bool is_gem)
{
if (is_gem)
return WL12XX_TX_HW_BLOCK_GEM_SPARE;
return WL12XX_TX_HW_BLOCK_SPARE_DEFAULT;
}
static int wl12xx_set_key(struct wl1271 *wl, enum set_key_cmd cmd,
struct ieee80211_vif *vif,
struct ieee80211_sta *sta,
struct ieee80211_key_conf *key_conf)
{
return wlcore_set_key(wl, cmd, vif, sta, key_conf);
}
static int wl12xx_set_peer_cap(struct wl1271 *wl,
struct ieee80211_sta_ht_cap *ht_cap,
bool allow_ht_operation,
u32 rate_set, u8 hlid)
{
return wl1271_acx_set_ht_capabilities(wl, ht_cap, allow_ht_operation,
hlid);
}
static bool wl12xx_lnk_high_prio(struct wl1271 *wl, u8 hlid,
struct wl1271_link *lnk)
{
u8 thold;
if (test_bit(hlid, &wl->fw_fast_lnk_map))
thold = wl->conf.tx.fast_link_thold;
else
thold = wl->conf.tx.slow_link_thold;
return lnk->allocated_pkts < thold;
}
static bool wl12xx_lnk_low_prio(struct wl1271 *wl, u8 hlid,
struct wl1271_link *lnk)
{
/* any link is good for low priority */
return true;
}
static u32 wl12xx_convert_hwaddr(struct wl1271 *wl, u32 hwaddr)
{
return hwaddr << 5;
}
static int wl12xx_setup(struct wl1271 *wl);
static struct wlcore_ops wl12xx_ops = {
.setup = wl12xx_setup,
.identify_chip = wl12xx_identify_chip,
.boot = wl12xx_boot,
.plt_init = wl12xx_plt_init,
.trigger_cmd = wl12xx_trigger_cmd,
.ack_event = wl12xx_ack_event,
.wait_for_event = wl12xx_wait_for_event,
.process_mailbox_events = wl12xx_process_mailbox_events,
.calc_tx_blocks = wl12xx_calc_tx_blocks,
.set_tx_desc_blocks = wl12xx_set_tx_desc_blocks,
.set_tx_desc_data_len = wl12xx_set_tx_desc_data_len,
.get_rx_buf_align = wl12xx_get_rx_buf_align,
.get_rx_packet_len = wl12xx_get_rx_packet_len,
.tx_immediate_compl = NULL,
.tx_delayed_compl = wl12xx_tx_delayed_compl,
.hw_init = wl12xx_hw_init,
.init_vif = NULL,
.convert_fw_status = wl12xx_convert_fw_status,
.sta_get_ap_rate_mask = wl12xx_sta_get_ap_rate_mask,
.get_pg_ver = wl12xx_get_pg_ver,
.get_mac = wl12xx_get_mac,
.set_tx_desc_csum = wl12xx_set_tx_desc_csum,
.set_rx_csum = NULL,
.ap_get_mimo_wide_rate_mask = NULL,
.debugfs_init = wl12xx_debugfs_add_files,
.scan_start = wl12xx_scan_start,
.scan_stop = wl12xx_scan_stop,
.sched_scan_start = wl12xx_sched_scan_start,
.sched_scan_stop = wl12xx_scan_sched_scan_stop,
.get_spare_blocks = wl12xx_get_spare_blocks,
.set_key = wl12xx_set_key,
.channel_switch = wl12xx_cmd_channel_switch,
.pre_pkt_send = NULL,
.set_peer_cap = wl12xx_set_peer_cap,
.convert_hwaddr = wl12xx_convert_hwaddr,
.lnk_high_prio = wl12xx_lnk_high_prio,
.lnk_low_prio = wl12xx_lnk_low_prio,
.interrupt_notify = NULL,
.rx_ba_filter = NULL,
.ap_sleep = NULL,
};
static struct ieee80211_sta_ht_cap wl12xx_ht_cap = {
.cap = IEEE80211_HT_CAP_GRN_FLD | IEEE80211_HT_CAP_SGI_20 |
(1 << IEEE80211_HT_CAP_RX_STBC_SHIFT),
.ht_supported = true,
.ampdu_factor = IEEE80211_HT_MAX_AMPDU_8K,
.ampdu_density = IEEE80211_HT_MPDU_DENSITY_8,
.mcs = {
.rx_mask = { 0xff, 0, 0, 0, 0, 0, 0, 0, 0, 0, },
.rx_highest = cpu_to_le16(72),
.tx_params = IEEE80211_HT_MCS_TX_DEFINED,
},
};
static const struct ieee80211_iface_limit wl12xx_iface_limits[] = {
{
.max = 3,
.types = BIT(NL80211_IFTYPE_STATION),
},
{
.max = 1,
.types = BIT(NL80211_IFTYPE_AP) |
BIT(NL80211_IFTYPE_P2P_GO) |
BIT(NL80211_IFTYPE_P2P_CLIENT),
},
};
static const struct ieee80211_iface_combination
wl12xx_iface_combinations[] = {
{
.max_interfaces = 3,
.limits = wl12xx_iface_limits,
.n_limits = ARRAY_SIZE(wl12xx_iface_limits),
.num_different_channels = 1,
},
};
static const struct wl12xx_clock wl12xx_refclock_table[] = {
{ 19200000, false, WL12XX_REFCLOCK_19 },
{ 26000000, false, WL12XX_REFCLOCK_26 },
{ 26000000, true, WL12XX_REFCLOCK_26_XTAL },
{ 38400000, false, WL12XX_REFCLOCK_38 },
{ 38400000, true, WL12XX_REFCLOCK_38_XTAL },
{ 52000000, false, WL12XX_REFCLOCK_52 },
{ 0, false, 0 }
};
static const struct wl12xx_clock wl12xx_tcxoclock_table[] = {
{ 16368000, true, WL12XX_TCXOCLOCK_16_368 },
{ 16800000, true, WL12XX_TCXOCLOCK_16_8 },
{ 19200000, true, WL12XX_TCXOCLOCK_19_2 },
{ 26000000, true, WL12XX_TCXOCLOCK_26 },
{ 32736000, true, WL12XX_TCXOCLOCK_32_736 },
{ 33600000, true, WL12XX_TCXOCLOCK_33_6 },
{ 38400000, true, WL12XX_TCXOCLOCK_38_4 },
{ 52000000, true, WL12XX_TCXOCLOCK_52 },
{ 0, false, 0 }
};
static int wl12xx_get_clock_idx(const struct wl12xx_clock *table,
u32 freq, bool xtal)
{
int i;
for (i = 0; table[i].freq != 0; i++)
if ((table[i].freq == freq) && (table[i].xtal == xtal))
return table[i].hw_idx;
return -EINVAL;
}
static int wl12xx_setup(struct wl1271 *wl)
{
struct wl12xx_priv *priv = wl->priv;
struct wlcore_platdev_data *pdev_data = dev_get_platdata(&wl->pdev->dev);
BUILD_BUG_ON(WL12XX_MAX_LINKS > WLCORE_MAX_LINKS);
BUILD_BUG_ON(WL12XX_MAX_AP_STATIONS > WL12XX_MAX_LINKS);
wl->rtable = wl12xx_rtable;
wl->num_tx_desc = WL12XX_NUM_TX_DESCRIPTORS;
wl->num_rx_desc = WL12XX_NUM_RX_DESCRIPTORS;
wl->num_links = WL12XX_MAX_LINKS;
wl->max_ap_stations = WL12XX_MAX_AP_STATIONS;
wl->iface_combinations = wl12xx_iface_combinations;
wl->n_iface_combinations = ARRAY_SIZE(wl12xx_iface_combinations);
wl->num_mac_addr = WL12XX_NUM_MAC_ADDRESSES;
wl->band_rate_to_idx = wl12xx_band_rate_to_idx;
wl->hw_tx_rate_tbl_size = WL12XX_CONF_HW_RXTX_RATE_MAX;
wl->hw_min_ht_rate = WL12XX_CONF_HW_RXTX_RATE_MCS0;
wl->fw_status_len = sizeof(struct wl12xx_fw_status);
wl->fw_status_priv_len = 0;
wl->stats.fw_stats_len = sizeof(struct wl12xx_acx_statistics);
wl->ofdm_only_ap = true;
wlcore_set_ht_cap(wl, NL80211_BAND_2GHZ, &wl12xx_ht_cap);
wlcore_set_ht_cap(wl, NL80211_BAND_5GHZ, &wl12xx_ht_cap);
wl12xx_conf_init(wl);
if (!fref_param) {
priv->ref_clock = wl12xx_get_clock_idx(wl12xx_refclock_table,
pdev_data->ref_clock_freq,
pdev_data->ref_clock_xtal);
if (priv->ref_clock < 0) {
wl1271_error("Invalid ref_clock frequency (%d Hz, %s)",
pdev_data->ref_clock_freq,
pdev_data->ref_clock_xtal ?
"XTAL" : "not XTAL");
return priv->ref_clock;
}
} else {
if (!strcmp(fref_param, "19.2"))
priv->ref_clock = WL12XX_REFCLOCK_19;
else if (!strcmp(fref_param, "26"))
priv->ref_clock = WL12XX_REFCLOCK_26;
else if (!strcmp(fref_param, "26x"))
priv->ref_clock = WL12XX_REFCLOCK_26_XTAL;
else if (!strcmp(fref_param, "38.4"))
priv->ref_clock = WL12XX_REFCLOCK_38;
else if (!strcmp(fref_param, "38.4x"))
priv->ref_clock = WL12XX_REFCLOCK_38_XTAL;
else if (!strcmp(fref_param, "52"))
priv->ref_clock = WL12XX_REFCLOCK_52;
else
wl1271_error("Invalid fref parameter %s", fref_param);
}
if (!tcxo_param && pdev_data->tcxo_clock_freq) {
priv->tcxo_clock = wl12xx_get_clock_idx(wl12xx_tcxoclock_table,
pdev_data->tcxo_clock_freq,
true);
if (priv->tcxo_clock < 0) {
wl1271_error("Invalid tcxo_clock frequency (%d Hz)",
pdev_data->tcxo_clock_freq);
return priv->tcxo_clock;
}
} else if (tcxo_param) {
if (!strcmp(tcxo_param, "19.2"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_19_2;
else if (!strcmp(tcxo_param, "26"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_26;
else if (!strcmp(tcxo_param, "38.4"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_38_4;
else if (!strcmp(tcxo_param, "52"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_52;
else if (!strcmp(tcxo_param, "16.368"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_16_368;
else if (!strcmp(tcxo_param, "32.736"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_32_736;
else if (!strcmp(tcxo_param, "16.8"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_16_8;
else if (!strcmp(tcxo_param, "33.6"))
priv->tcxo_clock = WL12XX_TCXOCLOCK_33_6;
else
wl1271_error("Invalid tcxo parameter %s", tcxo_param);
}
priv->rx_mem_addr = kmalloc(sizeof(*priv->rx_mem_addr), GFP_KERNEL);
if (!priv->rx_mem_addr)
return -ENOMEM;
return 0;
}
static int wl12xx_probe(struct platform_device *pdev)
{
struct wl1271 *wl;
struct ieee80211_hw *hw;
int ret;
hw = wlcore_alloc_hw(sizeof(struct wl12xx_priv),
WL12XX_AGGR_BUFFER_SIZE,
sizeof(struct wl12xx_event_mailbox));
if (IS_ERR(hw)) {
wl1271_error("can't allocate hw");
ret = PTR_ERR(hw);
goto out;
}
wl = hw->priv;
wl->ops = &wl12xx_ops;
wl->ptable = wl12xx_ptable;
ret = wlcore_probe(wl, pdev);
if (ret)
goto out_free;
return ret;
out_free:
wlcore_free_hw(wl);
out:
return ret;
}
static int wl12xx_remove(struct platform_device *pdev)
{
struct wl1271 *wl = platform_get_drvdata(pdev);
struct wl12xx_priv *priv;
if (!wl)
goto out;
priv = wl->priv;
kfree(priv->rx_mem_addr);
out:
return wlcore_remove(pdev);
}
static const struct platform_device_id wl12xx_id_table[] = {
{ "wl12xx", 0 },
{ } /* Terminating Entry */
};
MODULE_DEVICE_TABLE(platform, wl12xx_id_table);
static struct platform_driver wl12xx_driver = {
.probe = wl12xx_probe,
.remove = wl12xx_remove,
.id_table = wl12xx_id_table,
.driver = {
.name = "wl12xx_driver",
}
};
module_platform_driver(wl12xx_driver);
module_param_named(fref, fref_param, charp, 0);
MODULE_PARM_DESC(fref, "FREF clock: 19.2, 26, 26x, 38.4, 38.4x, 52");
module_param_named(tcxo, tcxo_param, charp, 0);
MODULE_PARM_DESC(tcxo,
"TCXO clock: 19.2, 26, 38.4, 52, 16.368, 32.736, 16.8, 33.6");
MODULE_LICENSE("GPL v2");
MODULE_AUTHOR("Luciano Coelho <coelho@ti.com>");
MODULE_FIRMWARE(WL127X_FW_NAME_SINGLE);
MODULE_FIRMWARE(WL127X_FW_NAME_MULTI);
MODULE_FIRMWARE(WL127X_PLT_FW_NAME);
MODULE_FIRMWARE(WL128X_FW_NAME_SINGLE);
MODULE_FIRMWARE(WL128X_FW_NAME_MULTI);
MODULE_FIRMWARE(WL128X_PLT_FW_NAME);
|
{
"pile_set_name": "Github"
}
|
Lumbar synovial cysts: experience with nine cases.
Nine patients treated surgically for lumbar spinal synovial cyst were reviewed. Four patients had synovial, two had ganglion, one had posterior longitudinal ligament, and two had ligamentum flavum cyst. Synovial cysts had a single layer of epithelial cells in the inner layer of the cyst with continuity with the facet joint. Ganglion cyst had no continuity with the facet joint and epithelial lining was present in one and absent in one case. Posterior longitudinal ligament and ligamentum flavum cysts had no continuity with the facet joint and no epithelial lining. Magnetic resonance imaging showed the cysts better than computed tomography. All patients treated for nerve root compression or lumbar spinal canal narrowing. One patient suffered recurrence 1 year later and was reoperated. Operative results were excellent in six and good in three patients. Lumbar spinal synovial cysts should be considered in differential diagnosis of lumbar radiculopathy/neurogenic claudication and is surgically treatable.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Substantial effort has been expended by a wide variety of entities in attempting to develop highly effective pesticides, particularly insecticide and/or insect repellents, which are capable of eradicating or controlling insects which destroy ornamental and agricultural plants, crops, trees, etc. or which attack, harm, or annoy humans and animals. Particularly bothersome for humans and animals are blood-sucking insects, such as mosquitos, ticks, fleas, lice, etc. These insects are annoying as well as possibly harmful due to the potential transmission of diseases. Although substantial need has existed in the industry for products which control or eradicate these insects, prior art attempts have failed to provide effective formulations which are capable of fully eradicating or controlling insects, while also being non-toxic to humans and animals.
In an attempt to meet the consumer demand for products of this nature, various pesticides, insecticides and insect repellant formulations have been developed. However, these prior art formulations typically incorporate active ingredients which are highly toxic to humans and to many animals. Consequently, the usable concentration of these toxic chemicals must be reduced, typically to the point of rendering the resulting formulation ineffective in providing the desired killing effect.
Another problem that exists with prior art pesticides is the ability of the insects to become resistant or immune to the pesticide. Due to the highly adaptive nature of most insects and the manner in which pesticides typically function, many prior art insecticides are effective initially, but lose their effectiveness over time due to insect developed immunity or resistance.
Insects which cause injury to plants, crops, trees, food supplies, humans and animals have existed for centuries and have always been considered as pests. Virtually all of these pests are members of the phylum Arthropoda, which comprises about 75% of known animal species. More than 930,000 arthropod species have been described and over 6,000,000 species are estimated to exist.
Of particular importance to the present invention are the species of arthropods found in the classes Insecta, Arachnida, Anoplura, and Siphonaptera. The need for pest control by developing pesticides dates back to ancient times, where fumigation was employed in an attempt to control pests on plant growth. In this century, numerous chemical formulations have been developed. Initially, inorganic metallic compounds were used as the principal active ingredients. More recently, purely organic pesticides have been employed.
One most well-known organic pesticide which has been developed and which had been particularly effective is dichlorodiphenyltrichloroethane (DDT). Although this compound was found to have extraordinary insecticidal properties and had been widely used as one of the most effective pesticides, its use has now been banned in the United States and in other countries due to its more recently discovered toxicity to humans and animals.
Following the discovery of the efficacy of DDT, numerous other organochlorides, such as cyclodienes were developed as practical pesticides, with further discoveries revealing organophosphate compounds as highly effective pesticides. However, as use of these chemical compounds grew, the deleterious effects of these compounds were also discovered and their use was restricted.
Another group of pesticides that have been employed in the prior art comprise pyrethroids or pyrethrins. Compounds, coming within this classification, have been widely used in a wide variety of insecticides and insect repellant products. However, although originally effective, the pyrethroids are examples of pesticides which are now increasingly ineffective, due to acquired resistance by the insects. Presently, many insects have developed resistance or immunity to the insecticidal effect of the pyrethroids and, as a result, these compounds are increasingly unusable for effectively controlling undesirable insects and pests.
While other attempts have been made to eliminate the toxicity of pesticides or develop non-toxic pesticides, these attempts have failed to provide a completely effective, non-toxic pesticide. In particular, most of these prior art pesticides are non-biodegradable, causing the pesticide to continuously build up in the soil and, subsequently, in the food chain. This long-term build up has been found to be particularly hazardous to the long-term health of the population. As a result, use of many such pesticides has been either banned or severely restricted by recent legislation.
Although the need for an effective, non-toxic, biodegradable pesticide has existed for decades, an effective pesticide has not been realized. As an alternative, non-chemical methods have been used. However, little success has been attained with non-chemical methods. As a result, in addition to these non-chemical methods, pesticides continue to be used in limited concentrations with reduced efficacy.
Therefore, it is a principal object of the present invention to provide an effective pesticide which is capable of providing long-term control and eradication of a wide range of insects which attack or feed on plants, crops, trees, animals, and ht mans without harming the plants, crops, trees, animals, or humans coming in contact with the pesticide.
Another object of the present invention is to provide a pesticide having the characteristic features described above which is completely non-toxic to humans, animals, and the environment.
Another object of the present invention is to provide a pesticide which effectively functions as an insecticide for killing a wide range of insects as well as an acaricide for controlling lice, mites and ticks.
Another object of the present invention is to provide an insecticide having the characteristic features described above which is completely biodegradable and completely safe for application directly to desired plants, humans and animals.
A further object of the present invention is to provide an insecticide having the characteristic features described above which is not harsh or irritating to the skin of humans and animals and can be safely applied, without harm, to skin, scalp, or hair.
Another object of the present invention is to provide an insecticide having the characteristic features described above which kills insects in a manner that prevents the insects from developing a resistance or immunity thereto.
Another object of the present invention is to provide an insecticide having the characteristic features described above which can be employed as an insect repellant without harmful side effects to the user.
Another object of the present invention is to provide an insecticide having the characteristic features described above which has no adverse effects on the food products produced by treated plants, crops, and trees, as well as no adverse effect on the soil or water.
Other and more specific objects will in part be obvious and will in part appear hereinafter.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
You are here
Leeds-Bradford superhighway needs your comments
CityConnect: the Leeds-Bradford superhighway, city centre parking, canal towpath refurbishment, etc. The consultation is just getting underway and we need every cyclist in Leeds to make our voices heard! Already there have been lots of comments from residents and Councillors about the possible loss of car parking spaces, and it has the potential to water down the design. If we want to keep it Super, we need to act! (A bit like little Ricky in Superman 3...)
If you can get along to an event, please do - and help to win over the doubters by proving that cyclists are real people! The consultation team are risking their lives out there on the street, promoting a way of travelling that is apparently popular over in Europe, but hasn't really caught on in Yorkshire yet.
Give them some much needed cheer by telling them you love the scheme and think it'll be great! Or give them some contructive comments about the design. What journeys might you use this route for? What are the particular hotspots that will need careful treatment? Vital links to and from nearby schools or public buildings? Nasty right turn that needs to be made safe? Bear in mind this route is meant to be safe for 11 year olds and 91 year olds alike, so racing to get in front of a van in the third lane of four should definitely be off the menu.
You can help from the sofa, by registering as a user and adding your comments to the map here:
|
{
"pile_set_name": "Pile-CC"
}
|
ue
Does 174 divide 103497984?
True
Is 183 a factor of 291374979?
True
Is 20740032 a multiple of 72?
True
Is 58914817 a multiple of 2578?
False
Is 5669 a factor of 87126861?
True
Is 77533053 a multiple of 3?
True
Does 1803 divide 68189380?
False
Does 7 divide 30401717?
False
Is 3034 a factor of 567824400?
False
Is 387104468 a multiple of 34?
False
Is 573645223 a multiple of 617?
False
Is 1355855872 a multiple of 1024?
True
Is 190 a factor of 56853955?
False
Is 32286570 a multiple of 222?
True
Does 972 divide 396362160?
True
Is 19724403 a multiple of 2091?
True
Does 328 divide 11252696?
True
Does 1444 divide 2391414176?
True
Is 29002839 a multiple of 69?
True
Does 11 divide 104057338?
True
Is 268 a factor of 910284280?
False
Is 146545146 a multiple of 198?
True
Is 105535307 a multiple of 2633?
False
Does 4121 divide 148406756?
False
Does 3229 divide 1223007597?
False
Is 137407294 a multiple of 2414?
True
Is 25 a factor of 16788436?
False
Does 2 divide 66708769?
False
Is 2894 a factor of 3743853322?
False
Is 1184 a factor of 200498758?
False
Is 26 a factor of 632709762?
False
Is 94 a factor of 312153978?
True
Does 1038 divide 29843233?
False
Is 10 a factor of 486862910?
True
Does 11 divide 1091977902?
False
Is 35518960 a multiple of 1978?
False
Does 5214 divide 2005530742?
False
Is 5738 a factor of 50142419?
False
Does 13 divide 63022123?
False
Does 1452 divide 158461116?
True
Is 864058032 a multiple of 36?
True
Is 1051365187 a multiple of 53?
True
Does 599 divide 12010203?
False
Is 218208105 a multiple of 26?
False
Is 11 a factor of 392988790?
False
Is 26 a factor of 186264?
True
Is 4 a factor of 5164764?
True
Is 908415734 a multiple of 4283?
True
Is 5251 a factor of 342160411?
True
Is 4796 a factor of 4164031080?
True
Is 5135 a factor of 537655040?
True
Is 70741067 a multiple of 5?
False
Is 241023821 a multiple of 97?
False
Does 56 divide 143553195?
False
Does 142 divide 26284262?
False
Is 105847252 a multiple of 172?
True
Does 9 divide 100273509?
True
Is 384 a factor of 3457832103?
False
Is 731 a factor of 344820508?
False
Does 5 divide 2289105?
True
Is 1672 a factor of 3624301?
False
Does 294 divide 1266552?
True
Does 8 divide 1296928?
True
Is 36209989 a multiple of 294?
False
Does 14 divide 270254740?
True
Is 1379974740 a multiple of 20?
True
Is 46355325 a multiple of 25?
True
Is 42 a factor of 818118714?
True
Is 56 a factor of 105755608?
True
Is 12015108 a multiple of 84?
True
Is 1181034030 a multiple of 15?
True
Is 621426308 a multiple of 5663?
False
Does 19 divide 285580412?
True
Is 20 a factor of 148841375?
False
Does 392 divide 15996333?
False
Does 3629 divide 712403035?
False
Is 22235812 a multiple of 218?
False
Does 121 divide 9908206?
True
Is 965 a factor of 6938350?
True
Does 1847 divide 5518836?
True
Is 576897145 a multiple of 13805?
True
Is 12682435 a multiple of 3?
False
Is 1432 a factor of 11592994?
False
Is 2 a factor of 11231124?
True
Does 128 divide 231882496?
True
Is 893401 a multiple of 8?
False
Does 161 divide 18013988?
False
Is 304 a factor of 156229309?
False
Is 1013 a factor of 287220955?
True
Is 100772640 a multiple of 160?
True
Is 146 a factor of 532457182?
True
Does 2749 divide 233616320?
False
Is 814437209 a multiple of 58?
False
Is 2973797492 a multiple of 17?
False
Does 25 divide 345686500?
True
Is 110 a factor of 73835850?
True
Is 2547168974 a multiple of 302?
False
Does 967 divide 49150642?
False
Is 4777648391 a multiple of 8649?
False
Is 2637020714 a multiple of 8?
False
Does 23 divide 322021045?
True
Does 1994 divide 818546639?
False
Is 53438684 a multiple of 62?
False
Is 8 a factor of 13869776?
True
Is 18 a factor of 166266190?
False
Is 70 a factor of 19624357?
False
Is 2078011354 a multiple of 1858?
True
Is 294848000 a multiple of 200?
True
Is 2848 a factor of 560142018?
False
Is 647029920 a multiple of 16?
True
Is 250705773 a multiple of 6417?
True
Is 6 a factor of 1235034?
True
Is 1155121912 a multiple of 715?
False
Is 18 a factor of 4322735142?
False
Is 28 a factor of 5491867?
False
Is 393600402 a multiple of 60?
False
Is 20 a factor of 16988320?
True
Is 49764462 a multiple of 2803?
True
Is 10210040 a multiple of 3?
False
Does 30 divide 351652710?
True
Does 12 divide 11303157?
False
Is 248119542 a multiple of 1092?
False
Does 34 divide 83003724?
True
Is 138906159 a multiple of 21?
True
Is 83 a factor of 32812025?
False
Is 45 a factor of 183636501?
False
Is 12925418 a multiple of 2?
True
Is 15 a factor of 111862725?
True
Does 2391 divide 335007792?
True
Does 15 divide 761358801?
False
Is 233428662 a multiple of 529?
False
Is 66 a factor of 28876432?
False
Is 677593041 a multiple of 31?
False
Does 2 divide 31857547?
False
Is 49 a factor of 418859777?
False
Is 239 a factor of 92704037?
True
Does 73 divide 13407024?
False
Is 735846192 a multiple of 24?
True
Is 429600226 a multiple of 352?
False
Does 484 divide 600265512?
True
Is 11937402 a multiple of 5?
False
Is 68 a factor of 7529509?
False
Does 67 divide 7386348?
True
Does 387 divide 50047614?
True
Is 143 a factor of 950386294?
True
Is 39992456 a multiple of 110?
False
Does 5 divide 928436056?
False
Is 14 a factor of 153826467?
False
Is 27060045 a multiple of 361?
False
Does 61 divide 11919068?
False
Does 525 divide 100850945?
False
Is 184 a factor of 90380452?
False
Is 20 a factor of 5276907020?
True
Does 7 divide 247983563?
False
Does 9 divide 28677935?
False
Does 110 divide 13376000?
True
Does 17 divide 518602?
True
Is 33086984 a multiple of 210?
False
Is 22 a factor of 215688122?
False
Is 3457792026 a multiple of 117?
True
Does 823 divide 100540972?
True
Is 42104630 a multiple of 30?
False
Is 48614230 a multiple of 14?
True
Is 427 a factor of 14343021?
False
Is 86 a factor of 201986136?
True
Is 39081602 a multiple of 61?
True
Does 19 divide 71553251?
False
Does 1250 divide 264336934?
False
Does 113 divide 1033322624?
True
Does 2692 divide 57659888?
False
Is 24610980 a multiple of 346?
True
Is 242 a factor of 2972257286?
False
Is 26919560 a multiple of 2696?
True
Does 1164 divide 487080308?
False
Does 304 divide 24847440?
True
Does 12 divide 6794016?
True
Does 1329 divide 49130482?
False
Is 56150536 a multiple of 59?
True
Does 163 divide 144596648?
True
Is 62 a factor of 1189842?
True
Is 593 a factor of 799272885?
False
Is 41 a factor of 304938509?
False
Is 521036500 a multiple of 428?
True
Does 1621 divide 22057574?
False
Is 275572275 a multiple of 1353?
True
Does 60 divide 661998613?
False
Is 4104 a factor of 357093144?
True
Does 69 divide 80652927?
True
Is 193041872 a multiple of 602?
False
Is 596792415 a multiple of 4197?
True
Is 233 a factor of 44822210?
True
Is 1668647700 a multiple of 180?
True
Is 25 a factor of 475748000?
True
Does 1283 divide 9726297?
False
Is 2380 a factor of 10748775?
False
Does 1577 divide 11997816?
True
Is 9 a factor of 9223472?
False
Does 5 divide 400080686?
False
Does 5 divide 130841069?
False
Is 54 a factor of 6021702?
True
Does 42 divide 14141546?
False
Is 24218074 a multiple of 289?
False
Is 14242103 a multiple of 29?
True
Is 34 a factor of 64533700?
True
Is 173019361 a multiple of 622?
False
Is 90 a factor of 158121000?
True
Is 1656624106 a multiple of 86?
True
Does 187 divide 19801804?
True
Does 73 divide 1384964833?
True
Is 433 a factor of 83316588?
False
Is 2 a factor of 2715865?
False
Is 205 a factor of 47247170?
True
Does 186 divide 64292460?
False
Is 46110893 a multiple of 7?
False
Is 3372994371 a multiple of 7?
False
Does 47 divide 21880062?
False
Is 154354915 a multiple of 3245?
True
Is 10867352 a multiple of 13?
False
Is 11309298 a multiple of 78?
True
Is 13931525 a multiple of 35?
False
Is 518 a factor of 16462558?
True
Is 5683 a factor of 1008850988?
False
Is 77424620 a multiple of 1729?
True
Is 636 a factor of 199355?
False
Is 1503996 a multiple of 13?
True
Is 140637090 a multiple of 106?
True
Is 6745640 a multiple of 220?
True
Does 486 divide 1524398763?
False
Is 579076234 a multiple of 1591?
False
Is 48 a factor of 412184064?
True
Is 26367780 a multiple of 60?
True
Is 1201 a factor of 801559410?
True
Is 4 a factor of 855702464?
True
Is 3352230 a multiple of 153?
True
Is 66 a factor of 1900121984?
False
Is 61182869 a multiple of 83?
True
Is 15 a factor of 72076545?
True
Is 84945008 a multiple of 7352
|
{
"pile_set_name": "DM Mathematics"
}
|
Prostaglandin E2 suppositories as a second-trimester abortifacient.
Despite the large number of second-trimester abortions performed each year in the United States through labor induction, the optimal method of inducing labor has not been developed. This study was performed to evaluate the efficacy and safety of vaginal prostaglandin E2 suppositories as an abortifacient. We analyzed the abortions at 14-24 menstrual weeks' gestation performed at Women's Hospital, Los Angeles, in 1985 and 1986. The abortion rate at 24 hours was 90.4%, with a mean induction-to-abortion time of 13.8 hours. Although gastrointestinal side effects were frequent, hemorrhage, infection and live births were infrequent. Prostaglandin E2 suppositories are a simple, effective and safe means of effecting second-trimester abortion that requires little surgical skill.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The Trump presidency has brought into focus just how ugly American politics has become. Of course, our politics have had a dark side long before Trump came to Washington. But the Trump era has taken us to a new low. While many Americans are aware of our dire situation, a closer examination should help concentrate our attention on the urgent need to remedy this catastrophic state of affairs.
First, let’s look at Trump’s cabinet. He demonstrated his desire to dismantle or undermine much of the executive branch by appointing cabinet members who, in large part, had little or no expertise in the subject matter of their respective departments, e.g. Rick Perry, the new Secretary of Energy. It’s alarming that he has no background in nuclear weapons policy, a major role of the Energy Department. Or, worse yet, Trump nominated people like anti-environmentalist Scott Pruitt, Director of the Environmental Protection Agency, whose intended goals were in direct conflict with the mission of the departments they were chosen to lead.
Next, Trump tried to intimidate his former FBI director, James Comey, into silence by threatening to release secret recordings of their conversations, which, in fact, he never possessed. At the same time, Trump ignored the real threat to our democracy, the Russian meddling in our elections, while he accepted Putin’s denials and encouraged America’s intelligence chiefs to belittle the FBI’s Russia probe.
Then, Trump used the presidency for his personal profit; for example, doubling the membership fee at his Mar-a-Lago private club after he became president. At the same time, Trump’s companies continue to register trademarks in foreign countries since his taking office, which is not only ethically questionable, but likely violates the Constitution. The list of Trump’s abuses of presidential power goes on and on.
Most recently, Trump intensified his assault on the media with a tweet of a video showing him tackling and beating someone who clearly represented CNN. Such outrageous messages could very well lead to physical attacks on members of the media, or worse.
What’s just as troubling, however, is the fact that almost nothing is being done to curb or halt Trump’s un-American abuses of the presidency. Yes, Congress and the independent counsel are investigating Trump’s activities. But, these investigations could drag on for months, if not years. Meanwhile, Trump’s Republican Party seems unable or unwilling to take any action to rein him in. While some Republican officials call Trump’s behavior disturbing, they cower and do nothing. Their failure to stand up to Trump and protect our democratic values exposes how little they really care about the future of the United States or their constituents.
Unfortunately, the Democratic Party is not much better at pushing back against Trump’s corrupt politics. As the minority party with very little power, they still blast him on television and file lawsuits to deter him. Democratic senators, however, could bring Senate business to a practical standstill through numerous time-consuming procedural hurdles. Additionally, they could use the filibuster as frequently as the Republicans did against Obama, which was a record-breaking number of times. In any event, Trump pays little attention to them, and continues to trample on our civil liberties and dismantle our regulatory protections. Our democracy is sadly crumbling before our very eyes and respect for our country around the world is plummeting.
Nevertheless, there may still be reason for hope. The resistance to Trump and his Republican enablers is growing among the American people. In the most recent Gallup Poll, only 37 percent of Americans approved of Trump’s performance. The GOP Senate version of Trump’s healthcare plan received a dismal 17 percent approval rating. And, around the country, more and more Americans want Trump impeached. Last week forty-five marches calling for his impeachment occurred in cities across the country.
So what is the cure for Trump’s plague on America? We, the people! The key is building a broad-based, massive grassroots movement, which presents a positive alternative to Trump’s destructive administration. Beyond resistance, Americans must organize a Democracy movement to replace Trump’s regime. This must include a coming together of disaffected Republicans as well as Democrats and Independents, ethnic minorities, rich and poor, and all the various interest groups whose issues Trump has ignored or derailed.
Next month at the University of Minnesota in Minneapolis, the Democracy Convention (See https://www.democracyconvention.org) will bring people from all sectors of society together to unite them “in a common, deeply rooted, broad based, movement for democracy.” In addition, Our Revolution (See https://ourrevolution.com.), which arose out of Bernie Sander’s presidential campaign has a progressive agenda for America’s future that is gaining a good deal of support. Indivisible (See https://www.indivisibleguide.com.) is yet another group fighting to reverse the Trump fiasco. It is happening, but it will take all of us rolling up our sleeves and working together. I urge you not to sit on the sidelines. Join the millions of Americans who are mobilizing to save our crippled democracy.
|
{
"pile_set_name": "OpenWebText2"
}
|
We help you realize your capacity to realize The Digital Plant by introducing new, digital solutions and technologies to answer nagging problems. Don’t wait to play catch up: future proof your resources, investments and workforce with technology and digital applications that will scale and advance you in the digital world.
Renovate the supply chain
to harness sensor data and RFID tracking. Focus on making the order, delivery and timing perfect – every time.
Power the production line
Connect the sales team
to a dynamic CPQ and mobile sales enablement system, enabling transparency into real-time inventory while shortening the sales cycle by as much as 90 percent.
Improve refinery
turnaround performance
with mobile solutions that enable quicker inspections and testing of critical infrastructure.
Keep refinery workers safe
with mobile workforce solutions that push out alerts in the event of a crisis or emergency.double operator productivity.
Industrial internet of things
Your people, your equipment, your environment produce a lot of data. We plug into IIoT to contextualize and visualize critical data in the right way, enabling you to manage workforce, machines and investments in more efficient, automated ways.
|
{
"pile_set_name": "Pile-CC"
}
|
The Steelers begin their 2019 season in New England as they take on the Patriots at Gillette Stadium
|
{
"pile_set_name": "OpenWebText2"
}
|
Pardosa danica
Pardosa danica is a wolf spider species endemic to Mols Bjerge in Denmark. It is only known from a single specimen that was found in 1883 and currently is on display at the Copenhagen Zoological Museum. The exact site where it was found was covered in heathers, but is now covered with bushes and trees. However, significant patches of heathers remain nearby. Wolf spiders are generally quite conspicuous and the spider fauna of Mols Bjerge has been intensely studied. Its apparent disappearance is a mystery and it is considered possibly extinct.
See also
List of Lycosidae species
References
External links
Category:Pardosa
Category:Wolf spiders of Europe
Category:Spiders described in 1904
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Stone Temple Pilots have announced that they will be capping off a busy year with a first-ever live album, Live 2018. The limited release comes to us via Rhino for Record Store Day Black Friday on November 23.
As per the PR: “Live 2018 features STP founding members Dean DeLeo, Robert DeLeo, Eric Kretz, along with Gutt, on 11 live performances captured during the band’s 2018 tour. The collection weaves live renditions of classic STP tracks such as “Sex Type Thing” and “Vasoline” with songs from the band’s new studio album such as “Meadow” and “Roll Me Under.” The album concludes with live acoustic versions of “Big Empty,” “Interstate Love Song,” and “Pretty Penny.”
Live 2018 will be available on red vinyl as a limited edition of 5000 through participating independent retailers.
SOURCE: Press Release – October 9, 2018
|
{
"pile_set_name": "OpenWebText2"
}
|
1948 Other Makes REO Speedwagon
1948 Reo Speedwagon 2 ton truck. 6-cyl, -sp. manual with two speed rearend. PTO dump bed.A very solid old truck that would run with some minor work. It needs a fuel pump and the battery cables replaced. Six volt system, ngine turns over slowly if you leave a six volt charger hooked up to the battery for a while. Truck rolls easy, nd has good tires. I have the two (stainless) trim pieces for upper front part of hood.The flatbed is 18 ft. long and in good shape. It tilts all the way to the ground to facilitate loading machinery I am told. That is what I was going to use it for. Plans have changed, o I have to let it go.I bought truck from the original owners grandson. I have the title.On Oct-07-15 at 15:30:08 PDT, eller added the following information:
Can possibly assist with shipping.
Truck was previously sold. Buyer did not have shipping lined up? Decided not to buy truck after a month. PLEASE do not bid unless you are a serious buyer. We are willing to assist with shipping options. Thanks!
|
{
"pile_set_name": "Pile-CC"
}
|
Genetic predisposition to obesity in bulimia nervosa: a mutation screen of the melanocortin-4 receptor gene.
Obesity has been identified as a risk factor for the development of bulimia nervosa (BN). Accordingly, we hypothesize that genotypes predisposing to obesity can be detected in patients with this eating disorder. In order to investigate this hypothesis we screened the melanocortin-4 receptor gene (MC4R) for mutations using single strand conformation analysis in 81 female inpatients treated for BN. A single patient with both extreme obesity and BN had a haplo-insufficiency mutation in the MC4R. Comparison of current and maximal body mass index (BMI) of all patients with cross-sectionally obtained BMI in the general population revealed an age appropriate distribution for current BMI and a substantially increased frequency for overweight at time of maximal BMI. Our findings suggest that overweight is a risk factor for BN in clinically ascertained patients. For the first time a genotype predisposing to obesity has been detected in an extremely obese patient with BN.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Roberto Serniotti
Roberto Serniotti (born ) is an Italian volleyball coach. A head coach of Cuneo Volley currently playing in Italian Serie A3. A former head coach of many teams in the whole of Europe, among others, Berlin Recycling Volleys, Tours VB, Trentino Volley. He was an assistant coach of France men's national volleyball team and Italy men's national volleyball team.
Sporting achievements
CEV Champions League
2004/2005, with Tours VB
CEV Cup
2007/2008, with Roma Volley
2015/2016, with Berlin Recycling Volleys
FIVB Club World Championship
Brazil 2013, with Trentino Volley
National championships
1999/2000 Italian SuperCup, with Cuneo Volley
2003/2004 French Championship, with Tours VB
2004/2005 French Cup, with Tours VB
2005/2006 French SuperCup, with Tours VB
2005/2006 French Cup, with Tours VB
2005/2006 French Championship, with Tours VB
2013/2014 Italian SuperCup, with Trentino Volley
2015/2016 German Cup, with Berlin Recycling Volleys
2015/2016 German Championship, with Berlin Recycling Volleys
2016/2017 German Championship, with Berlin Recycling Volleys
References
External links
LegaVolley coach profile
Category:1962 births
Category:Living people
Category:Italian volleyball coaches
Category:Volleyball coaches of international teams
Category:Sportspeople from Turin
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Tag Archives: James Malone
Neel-Schaffer recently hired four new members to its growing staff within its Environmental Science Division. The firm recently made a key hire aimed at beefing up its GIS division, adding Carl Gordon as an environmental scientist. Gordon has worked as a consultant for numerous federal, state and local entities, including the General Services Administration, USDA Forest Service, Western Area Power ...
|
{
"pile_set_name": "Pile-CC"
}
|
Ecteinascidin 770, a tetrahydroisoquinoline alkaloid, sensitizes human lung cancer cells to anoikis.
The strategies for achieving anti-metastasis have received increased research interest and clinical attention. The anoikis-sensitizing effect of ecteinascidin 770 (ET-770) was investigated in the present study in non-small cell lung cancer cells. ET-770 isolated from Ecteinascidia thurstoni was tested for its anoikis-sensitizing effect on H23 and H460 human lung cancer cells by 2,3-b-(2-methoxy-4-nitro-5-sulfophenyl)-2H-tetrazolium-5-carboxanilide salt (XTT) assay. The levels of proteins being involved in anoikis of cells were determined by western blot analysis. ET-770 was shown to enhance anoikis response of human lung cancer H23 cells in a dose-dependent manner. The underlying mechanism was investigated and it was found that ET-770 sensitized the cells by activating the p53 protein, which in turn down-regulated anti-apoptotic myeloid cell leukemia sequence-1 (MCL1) and up-regulated BCL2-associated X protein (BAX) proteins. However, B-cell lymphoma-2 (BCL2) proteins were not significantly affected by ET-770. Further, the anoikis sensitization of ET-770 was observed in H460 lung cancer cells. The present results reveal for the first time that ET-770 can sensitize anoikis through the p53 pathway and further development of this compound for therapeutic use is warranted.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Dictionary (ObservableCollection) binding to ListView in Windows Phone 8.1
I am trying to bind a dictionary to two textblocks in a listview. The listview ItemsSource binding is defined in the code behind and the text blocks content is in the XAML.
I am able to display the items but they are displayed with square brackets around each row like [stringA, stringB]. However, this format will not work. The latest code that I tried was by setting the Key and Value which did not work was:
XAML:
<ListView Name="lvListLogs"
Margin="0,10,0,0">
<ListView.ItemTemplate>
<DataTemplate x:Name="ListItemTemplate">
<Grid Margin="5,0,0,0">
<Grid.ColumnDefinitions>
<ColumnDefinition Width="122"/>
<ColumnDefinition Width="*"/>
</Grid.ColumnDefinitions>
<Grid.RowDefinitions>
<RowDefinition MaxHeight="104"></RowDefinition>
</Grid.RowDefinitions>
<TextBlock x:Name="tb_PointName" Grid.Column="1"
Text="{Binding Key}"
Margin="10,0,0,0" FontSize="40"
TextWrapping="Wrap"
MaxHeight="72"
Foreground="#FFFE5815" />
<TextBlock x:Name="tb_PointValue" Grid.Column="1"
Text="{Binding Value}"
Margin="10,0,0,0" FontSize="40"
TextWrapping="Wrap"
MaxHeight="72"
Foreground="#FFFE5815" />
</Grid>
</DataTemplate>
</ListView.ItemTemplate>
</ListView>
C# (abridged for clarity):
public Dictionary<string, string> mydict2 { get; set; }
mydict2 = new Dictionary<string, string>();
if (item != null)
{
var props = item.GetType().GetRuntimeProperties();
foreach (var prop in props)
{
foreach (var itm in group1.Items.Where(x => x.UniqueId == prop.Name))
{
var _Title = prop.Name;
var _Value = prop.GetValue(item, null);
string propertyValue;
string propertyName;
propertyValue = Convert.ToString(_Value);
propertyName = _Title;
mydict2.Add(_Title, propertyValue);
}
}
//binding here
lvListLogs.ItemsSource = mydict2;
}
Any assistance would be appreciated.
A:
To achieve the required binding, instead of the Dictionary I used an ObservableCollection with the class and constructor.
To databind the listview (xaml) to ObservableCollection:
Create the Class with Constructor
public class PointInfoClass
{
public string PointName { get; set; }
public string PointValue { get; set; }
public PointInfoClass(string pointname, string pointvalue)
{
PointName = pointname;
PointValue = pointvalue;
}
}
Create collection of the PointInfoClass
public ObservableCollection<PointInfoClass> PointInfo
{
get
{
return returnPointInfo;
}
}
Instantiate the collection
ObservableCollection<PointInfoClass> returnPointInfo = new ObservableCollection<PointInfoClass>();
Add item to collection
returnPointInfo.Add(new PointInfoClass(string1, string2));
Databind to the ObservableCollection name.
The xaml code:
<ListView
Grid.Row="1"
ItemsSource="{Binding PointInfo}"
IsItemClickEnabled="True"
ItemClick="ItemView_ItemClick"
Margin="19,0.5,22,-0.333"
x:Name="lvPointInfo"
Background="White">
<ListView.ItemTemplate>
<DataTemplate >
<Grid Margin="0,0,0,20">
<Grid.ColumnDefinitions>
<ColumnDefinition Width="Auto"/>
<ColumnDefinition Width="270"/>
<ColumnDefinition Width="60"/>
</Grid.ColumnDefinitions>
<StackPanel Orientation="Vertical" Grid.Column="1" VerticalAlignment="Top">
<TextBlock x:Name="tb_PointSubTitle" Grid.Column="1"
Text="{Binding PointName}"
Margin="10,0,0,0" FontSize="20"
TextWrapping="Wrap"
MaxHeight="72"
Foreground="#FF5B5B5B"
/>
</StackPanel>
<StackPanel Orientation="Vertical" Grid.Column="2" VerticalAlignment="Top" HorizontalAlignment="Right">
<TextBlock x:Name="tb_PointValue"
Grid.Column="1"
Text="{Binding PointValue}"
Margin="0,5,0,0" FontSize="20"
HorizontalAlignment="Right"
TextWrapping="Wrap"
FontWeight="Normal"
Foreground="Black" />
</StackPanel>
</Grid>
</DataTemplate>
</ListView.ItemTemplate>
</ListView>
Set the DataContext of the ListView
lvPointInfo.DataContext = this;
This code is edited for clarity.
|
{
"pile_set_name": "StackExchange"
}
|
E.L.F.S. Touring Troupe, the teen musical theater arm of Bulverde S.T.A.G.E., is preparing to take the musical “Stupid Wig” to the Texas Nonprofit Theatres' Youth Conference in Odessa next week. It's based on the real-life experiences of a woman who was diagnosed with leukemia at the age of 10. Before the company members leave, they'll give one performance in their home space. It starts at 4 p.m. Saturday at S.T.A.G.E., 1300 Bulverde Road in Bulverde. Tickets cost $5. Call 830-438-2339 for reservations.
|
{
"pile_set_name": "Pile-CC"
}
|
Google is responding to the disastrous earthquake in Haiti with a $1 million donation that will go to organizations "on the ground that are rescuing those still trapped and providing clean water, food, medical care, shelter and support to those affected."
The generous donation was announced this morning on Google's blog. It's being made in conjunction with the search giant's continued efforts to encourage and support your donations to organizations. As we reported this morning, Google is also providing a satellite view of the damage in Haiti using Google Earth. It's also using YouTube as a means to collect and share video from Haiti and expand the outreach.
Google's efforts, combined with text message donations to the Red Cross — which now total more that $3 million — show the power of social media to inspire action, and the significance of individuals and companies pulling together to support the hundreds of thousands of people in need in Haiti.
Haiti Earthquake: Additional Coverage
[img credit: thesuperph, iStockphoto]
|
{
"pile_set_name": "OpenWebText2"
}
|
With the miniaturization of various communication devices or electronic devices, piezoelectric vibrating devices such as crystal oscillators or crystal controlled oscillators need to be downsized. A crystal vibrating piece using piezoelectric vibrating devices is attached to a ceramic package by thermosetting resin. On this occasion, the thermosetting resin is heated up either 150° C. or 250° C. to attach the crystal vibrating piece. Therefore, the crystal vibrating piece is heated up either 150° C. or 250° C. as well. Also, when a packaged piezoelectric vibrating device is mounted to an epoxy laminate, the piezoelectric vibrating device is treated with heat by a solder reflow furnace and the crystal vibrating piece in the package is also heated up to 200° C.
After the temperature of piezoelectric vibrating device became 200° C. through the heat treatment, the piezoelectric vibrating device is back to a room temperature. However, sometimes piezoelectric vibrating devices are not back to a designated primary frequency form a varied frequency. In such a case, those products are considered as defective products at the shipment. Supposedly, when such defective products of piezoelectric vibration devices are mounted to the epoxy laminate, they go through a heat treatment such as solder reflow furnace. Inside of the solder reflow furnace is set to 180° C. or 250° C. and after ten seconds, the piezoelectric vibrating device is treated with heat. As described above, after the piezoelectric vibrating device is treated with heat, its frequency is varied as well, even if it is back to a room temperature, and the whole epoxy laminate is considered as defective products. Japanese Unexamined Patent Application Publication No. 2003-17977 disclosed that although such piezoelectric vibrating device considered as a defective product, it is acknowledged that it vibrated proper frequency after few months because remaining stress of crystal vibrating piece was released.
However, if it does not work properly for few months, the product cannot be shipped. Especially, when it is more than 100 MHz, it tends to have a greater frequency change.
Therefore, the purpose of this invention is to provide a piezoelectric vibrating piece and piezoelectric vibrating device having less frequency change for a heat change a heat treatment.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
89 F.3d 848
77 A.F.T.R.2d 96-2204, 96-1 USTC P 50,307
NOTICE: Ninth Circuit Rule 36-3 provides that dispositions other than opinions or orders designated for publication are not precedential and should not be cited except when relevant under the doctrines of law of the case, res judicata, or collateral estoppel.Duane H. WALL, Plaintiff-Appellant,v.UNITED STATES of America, Defendant-Appellee.
No. 94-56541.
United States Court of Appeals, Ninth Circuit.
Argued and Submitted April 10, 1996.Decided May 1, 1996.
Before: SCHROEDER and LEAVY, Circuit Judges, and TRIMBLE,* District Judge.
MEMORANDUM**
Duane H. Wall appeals from the district court's entry of summary judgment in favor of the government, arguing that the district court erred by concluding that it lacked subject matter jurisdiction over his tax refund claim. We review de novo, see Skagit County Pub. Hosp. v. Shalala, --- F.3d ----, ----, No. 95-35385, slip op. 4119, 4133 (9th Cir. Apr. 5, 1996), and we reverse.
Prior to the enactment of the Tax Equity and Fiscal Responsibility Act of 1982 ("TEFRA"), Pub.L. No. 97-248, 96 Stat. 324 (1982), audits of tax items attributable to partnerships were conducted at the individual partner level. For partnership tax years beginning after September 3, 1982 (i.e., the date of the enactment of TEFRA), however, audits of tax items attributable to partnerships are to be conducted at the partnership level, see 26 U.S.C. §§ 6221-6233, while individual proceedings are governed by 26 U.S.C. § 6212. Thus, the usual authorization for individuals to sue for refund under 26 U.S.C. § 7422(a) is inapplicable to refund claims of partnership items (as defined by 26 U.S.C. § 6231(a)(3)), see 26 U.S.C. § 7422(h), unless the individual can bring his claim within one of two exceptions.
Under the peculiar facts of this case, we conclude that the instant refund action falls within the exception set out at 26 U.S.C. § 6228(b), because Wall substantially complied with the procedures governing requests for administrative adjustment of partnership items under 26 U.S.C. § 6227(b). While the situation presented is an unusual one, we can discern no substantive purpose that would be served by requiring Wall to have filed, in addition to his second form 1040X, a partnership form 8082 that would have reflected no information beyond what was already set out in the second 1040X and the Partnership's Schedule K-1, particularly when the government itself treated the instant dispute at all times as an individual matter, and did not suggest that it could or should be viewed as a TEFRA partnership matter until the case was ready for decision by the district court.1
REVERSED and REMANDED.
*
The Honorable James T. Trimble, Jr., United States District Judge for the Western District of Louisiana, sitting by designation
**
This disposition is not suitable for publication and may not be cited to or by the courts of this Circuit except as provided by 9th Cir. 36-3
1
By virtue of our holding on this point, we necessarily reject the government's contention that Wall's claim is time-barred
|
{
"pile_set_name": "FreeLaw"
}
|
^You say we are sheep for having opinions, now you want us to change our opinion so that we are not sheep? Wouldn't that be... somewhat hypocritical?
Pip Tweek wrote:^^ Suffice it to say the OP is almost entirely incoherent to begin with.
And no, OP, I'm not "killing art" by having the punchline to the gay fish joke as my sig. Get a hold of yourself.
...who's op?
Pip Tweek wrote:But really, I get annoyed when I see this board bombarded with posts about how SP is not the sacred cow it used to be and it's no longer the work of genius intellect and high art that it used to be.
This happens every time a new half season comes on, at least since I joined the boards. It does get a tad annoying, but I do think that SP is different from the older episodes, not always in a good way either, but that is just my opinion.
Kelly MacCornmac wrote:^You say we are sheep for having opinions, now you want us to change our opinion so that we are not sheep? Wouldn't that be... somewhat hypocritical?
Pip Tweek wrote:^^ Suffice it to say the OP is almost entirely incoherent to begin with.
And no, OP, I'm not "killing art" by having the punchline to the gay fish joke as my sig. Get a hold of yourself.
...who's op?
Pip Tweek wrote:But really, I get annoyed when I see this board bombarded with posts about how SP is not the sacred cow it used to be and it's no longer the work of genius intellect and high art that it used to be.
This happens every time a new half season comes on, at least since I joined the boards. It does get a tad annoying, but I do think that SP is different from the older episodes, not always in a good way either, but that is just my opinion.
f*ck half season they are more annoying then half birthdays if we need to count these things then we are not enjoying ourselves and yes i am a hypocrite hooooray what r u going to do about it that the purpose we are all a little hypocritcal and fake but that waS NOT THE GOAL OF THE SHOW IN MY OPINION EXAMINE THY SELF
I wouldn't say South Park has "sold out," per se, but their latest episodes haven't been all that great. Can't say I've been too impressed with them, especially because they keep reusing the same characters in the same ways with slight twists in the plot that really don't add to the overall creativity of the episode. It's become predictable and mundane. I'd really love to see an episode that makes me laugh really hard at least once.
Hey big douche OP, I don't understand your english. Seriously, I know its the internet but at least make your posts somewhat coherent. What're you like twelve anyway? Were you even born when the show started? That's what your ramblings make me think. Honestly though you are lauding this show as high art? I'm sure Matt and Trey will probably tell you their first goal on this show is to make a show that people will laugh at. That the majority will laugh at, none the less.That is the goal of any comedy series. They started out with construction paper honestly c'mon. You are the person that they consistently make fun of in their episodes. You need to take step back and stop dwelling on the negative. Again you big giant douche.
Also I have to say: Character and plot development in the course of twenty two minutes is f*cking ridiculous to think possible in the day to day life of an episode. The episodes lately have had potential that they haven't reached but its time constraint related. So to do what they do in a week is actually pretty amazing you big douche.
Somehow I think anyone who does comedy has to think their own work is hilarious because humor can be really subjective. You can get away with making formulaic crap in music that is produced specifically to be hit material, but I don't think it's possible for someone to write comedy for a mass audience that they themselves don't think is funny.
Speaking of selling out, has anyone here seen THIS at their local supermarket?
When this caught my eye, I did a double-take and almost dropped my groceries and ran out of the store screaming.
tommy2tone20 wrote:Dear Fellow Members and/or devoted fans, I have started this forum to recruit those of you who believe that south park sold out after the 10th season. This is a funeral. This is a debate. I want those who disagree with me to please join this madness. The world ends when the show is killed! Chef died! Issac Hayes converted to scientology! God Damn it! it was so wonderful at it's peek and has become way to direct with it's messages. It used to be subtle and now it's sickeningly uncreative. I am angry and want you to be angry with me! i am depressed and want you to be depressed with me! Why is kenny a drug addict? Why is Mr. Garrison a man again! What the f*ck happened to Cartman! They made him too blunt. They gave away the secret and threw away the magic and recipe. WHere is the piano music? WHere is the cynicism and since when did south park become the new family guy or even The Simpsons? When did this happen and how can we change it? How can i be offended by south park? I am a fan of the show being offensive! I love you guys! Trey Parker and Matt stone are brilliant but dissapoint me. I am dedicated to watching each episode! Does any other fan agree with me? Am i alone! PLease help me! What happened to towlie? Who's saying baby that don't mean a thing? Nowadays clancy can;t even sing! I guess this economy is effecting everyone, even our heroes, the animators and show writers!
Maybe you should like... do something productive with your life calling Matt and Trey your heroes, eating sleeping and breathing South Park, hating every episode since season 10 yet still obsessively watching it as of season 13. "Am I alone! Please help me!" OH NO! My favorite TV show isn't as good to me anymoar! HELP! Yes, my friend, South Park is certainly serious bussiness.
Welcome to the all new southpark.cc.com!
We've Updated Our Terms
By clicking outside of this box or X, you agree to the Site's updated Terms of Use and consent to the collection, use, disclosure and transfer of information as described in this Site's updated Privacy Policy and to third parties receiving information about the videos you watch as described in this Site’s Video Privacy Terms. Before you do, please read them and check out some of these changes (such as arbitration for disputes - see our FAQs). Please also note that you are accessing a site which is designed for and targeted to U.S. audiences and is governed by and operated in accordance with U.S. laws.
|
{
"pile_set_name": "Pile-CC"
}
|
Former Weather Underground terrorist group leader Bill Ayers on Tuesday said he was on an airplane “dancing in the aisles” over news that President Obama commuted the sentence of FALN activist Oscar López Rivera, whose group was linked to over 100 bombs placed in U.S. cities in the 1970s and 1980s.
Ironically, Ayers, a former associate of Obama’s, was on his way from Havana, where he wrote that he was celebrating the 75th birthday of his wife, fellow Weather Underground member Bernadine Dohrn.
Like the FALN, Ayers’ Weather Underground was also linked to bombings in U.S. cities, including those targeting the U.S. Capitol building, the Pentagon, and numerous New York police stations.
Ayers wrote on his Facebook page on Tuesday:
Still in the air, dancing in the aisles: Just in from sister Jan Susler:
We are thrilled to announce that today President Obama made the wise and just decision to grant unconditional executive clemency to Puerto Rican political prisoner Oscar López Rivera, who served 35 years in U.S. prison.
One day earlier, he had tweeted that he was on his way to Havana and would return “in time to rise up in Washington” – seemingly a reference to the protests slated for President-elect Donald Trump’s inauguration on Friday.
Oscar Lopez freed!
Chelsea Manning out!!!
Great news! Joy an Justice!
Free Leonard!
Pardon Ethel!
Keep rolling! — Bill Ayers (@WilliamAyers) January 17, 2017
Obama commuted the sentence of Rivera, the longest-serving FALN member who was convicted of numerous crimes, including seditious conspiracy, conspiracy to commit robbery and transport explosives with intent to destroy government property, and later a conspiracy to escape from prison.
The New York Times reported thusly on Rivera’s FALN, which is the Spanish acronym for the Armed Forces of National Liberation:
The F.A.L.N., which waged a violent campaign for the independence of Puerto Rico, was considered by the authorities to be among the most elusive and resilient terrorist groups to operate in the United States. Among its notable attacks was a bombing at Fraunces Tavern in New York in 1975 that killed four people.
The group was known for its tight-knit membership, fanatical zeal and hit-and-run tactics, as exemplified by the bombings of four government buildings in Manhattan and Brooklyn on New Year’s Eve in 1982 that seriously wounded three police officers.
Mr. Lopez Rivera was not specifically charged in the Fraunces Tavern bombing but more broadly with, among other things, the interstate transportation of firearms with the intent to commit violent crimes, and transportation of explosives with intent to kill and injure people and to destroy government buildings and property.
From 1999 to 2002, Obama served alongside Ayers as a paid director of the Chicago nonprofit the Woods Fund.
Obama also worked closely with Ayers in 1995 at the Chicago Annenberg Challenge education group, according to the CAC’s archived records.
I previously reported:
The records also show Obama’s and Ayers’ foundation granted money to radical leftist activist causes.
News reports, archived records, interviews and Ayers’ own curriculum vitae document that Ayers was a founder of the CAC, which billed itself as a school-reform organization. Ayers also served as co-chairman of the Chicago School Reform Collaborative, one of the two operational arms of the CAC, from its formation in 1995 until 2000.
Ayers made presentations to board meetings chaired by Obama. Ayers also spoke for the Chicago School Reform Collaborative before Obama’s board, while Obama periodically spoke for the board at meetings of the collaborative, according to CAC documents.
According to the documents, first reviewed by National Review Online writer Stanley Kurtz, the CAC granted money to far-left causes, such as the now-defunct Association of Community Organizations for Reform Now, or ACORN.
“Everything was absolutely ideal on the day I bombed the Pentagon,” Ayers wrote in his memoirs, Fugitive Days. He added a disclaimer that he didn’t personally plant the explosives.
Aaron Klein is Breitbart’s Jerusalem bureau chief and senior investigative reporter. He is a New York Times bestselling author and hosts the popular weekend talk radio program, “Aaron Klein Investigative Radio.” Follow him on Twitter @AaronKleinShow. Follow him on Facebook.
With additional research by Joshua Klein.
|
{
"pile_set_name": "OpenWebText2"
}
|
I followed a link and ended up on Redstate to read a post by their leader, Eric Erickson. It's extremely rare that I end up on that site (less than 5 times I think in my life), but this was a fun article.
It seems that the rubes of the right wing have been suckered out of a lot of cash by con men calling themselves conservatives. You'd almost think they don't like the market for political contributions. :-) Maybe they want regulations?
The dumbshit haters are being fleeced. Made me smile.
My mother constantly gets mail at her house begging her for money to fight the good fight. More often than not, the groups begging her for help have “Tea Party” in their name and they are all scams. snip The professional right bled Mitt Romney dry, scammed millions of conservatives out of their hard earned money so that consultants could fly on Gulfstream jets, and sent kids to bars in Wisconsin to get drunk while actual grassroots groups went door to door only to see the professional groups take credit for work they did not do.
In a party based on rapacious exploitation of people, he should not be surprised that the Republican grass roots get exploited also.
Seems like justice to me.
|
{
"pile_set_name": "OpenWebText2"
}
|
Sign up to get the latest Burton news in a daily email bulletin Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
Shamed sex text MP Andrew Griffiths will be able to vote tonight to help keep Theresa May in power after the Conservative party whip was restored, it has been revealed.
Mr Griffiths had been suspended from the Tory Party since mid-July for sending a series of vile sex texts to two Burton barmaids, but the Chief Whip has restored his place in the Party to enable him to vote.
He has already told Burton Live that he will be supporting Mrs May in the fight to keep her position.
He said: “Theresa May has shown huge determination and bravery in negotiating and arguing for her deal.
"I believe she remains the best person to deliver the Brexit people in Burton and Uttoxeter voted for, and I will be supporting her in tonight’s ballot.”
He has been sitting as an independent MP since his suspension from the Party. He also resigned as minister for small business but has refused to step down as MP for Burton and Uttoxeter.
But Mrs May now needs his support in the secret ballot as a Conservative MP to help win a majority and save her job following the decision to call a vote of no confidence.
The vote will be cast tonight after some Conservative MPs were unhappy about the progress of Mrs May's Brexit negotiations and the required total of 48 MPs casting votes of no confidence - 15 per cent of the Tories - has now been achieved.
There are 315 MPs sitting for the Conservative Party. Mrs May needs to win the backing of at least 50 per cent of the vote plus one, which equates to at least 158 votes.
However, voting numbers had been unclear because Mr Griffiths and MP Chris Elphicke had the whip removed.
Mr Elphicke has been suspended by the Conservatives after "serious allegations" over alleged sexual offences that have been referred to the police, the party has said.
Mr Elphicke, a former party whip who has been the MP for Dover since 2010, has denied any wrongdoing.
RELATED STORIES:
|
{
"pile_set_name": "OpenWebText2"
}
|
Germany's Leading Digital Rights Blog Netzpolitik.org Accused Of 'Treason' After Leaking Bulk Surveillance Plans
from the still-enough-disk-space dept
Netzpolitik.org is arguably the most influential German blog in the realm of digital rights. It played a key role in marshalling protests against ACTA three years ago. You'd think the German government would be proud of it as an example of local digital innovation, but instead, it seems to regard it as some kind of traitor: The president of the German domestic secret service has filed criminal charges with the public prosecutor because of two of our articles. The accusation: leaking state secrets. Those two articles concerned a leak about extending bulk surveillance of online users (original in German), and plans to create a new department of the German secret service to extend its Internet surveillance capabilities (in English.) As Netzpolitik's founder and Editor-in-chief, Markus Beckedahl, explains, he decided to publish this information because it showed that despite Edward Snowden's revelations about NSA surveillance, the German government still thinks the best way of spending taxpayers' money is by spying on them. He adds: Naturally, we uploaded the original documents relating to our article because there was still enough disk space and because it is part of our philosophy to enable our readers to inform themselves using the original source. Thus, they can scrutinise us and our reporting.
Apparently, this suffices for a twice charge for treason because it seems to be confidential when the Federal Office for the Protection of the Constitution expands the Internet’s surveillance and keeps social networks under surveillance using the dragnet principle. This affects everybody, e.g. we could be under surveillance because we have sign up for the same Facebook event as a potential terrorist. But a public debate thereon is undesired. This is not the first time that the German government has given Netzpolitik.org a hard time: Already in the autumn of 2014, the German Federal Chancellery (German: Bundeskanzleramt, translator’s note) has threatened us with a charge which was also announced but later on abandoned. Like the present case, that seems a clear attempt to intimidate reporting. As Beckedahl points out, even though the new hunt for whistleblowers is not aimed directly at the blog and its journalists, they are likely to be caught up in any investigation, probably just to act as a warning: It is very rare that the German Federal Public Prosecutor investigates against journalistic sources. We could not find any case since 2005. Now we shall experience the full rigour of the constitutional state. The charge is not directed straight to our reporting but we are nevertheless affected. We are mentioned and have to expect to be under surveillance and possibly to be subject to a house search. What makes this kind of bullying doubly outrageous is that there is a rather bigger story regarding the press in Germany: the fact that both the NSA and CIA spied on the news magazine Der Spiegel. And yet rather than investigate that fact, or that other newspapers seem to have been victims too, the German government is more concerned about intimidating journalists that dare to report on its own plans to spy on millions of its citizens.
Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community. Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis. While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: chilling effects, digital rights, germany, investigative reporting, surveillance, treason, whistleblowing
Companies: nezpolitik
|
{
"pile_set_name": "OpenWebText2"
}
|
RENT will perform Mondays and Wednesday through Saturdays at 8pm, Sundays at 7:30pm, with Saturday and Sunday matinees at 2pm, at New World Stages, 340 West 50 Street, between 8th and 9th Avenues. Preview prices $65- $85; prices after August 12 are $69.50 - $89.50.
RENT will sell 16 seats via a lottery for each performance at New World Stages (340 West 50th Street). The tickets will be $25, cash only. All tickets include a $1.50 facility fee. For more information and tickets, visit www.siteforrent.com
|
{
"pile_set_name": "Pile-CC"
}
|
Cramer Gets a Jump on Jobs Number
Paychex reported weaker than expected earnings. Mad Money host Jim Cramer speaks with the company's CEO Marty Mucci about its earnings, the state of business creation and hiring in the U.S. and the impact Obamacare might have.
One of the many ways Cramer prepares is by checking in with Paychex, the payroll processing company with a focus on small business.
"Paychex just reported last Wednesday, and the numbers were a bit lower than what Wall Street was looking for. The company earned 34-cents a share, a 3-cent miss, on revenues that were a tad light, up 6% year over year," Cramer said.
Looking at these results as a precursor for the Labor Department's June non-farm payrolls number Cramer said "the most important metric here is checks per payroll, which increased by just one percent for the quarter—a sign that Paychex's clients simply didn't add many new workers," he explained.
Steve Cole | Photodisc | Getty Images
Back on June 28th, Cramer called Paychex earnings commentary a wake-up call.
At that time, the chief financial officer, Efrain Rivera said that to generate the kind of growth Wall Street would like to see 'there needs to be a slightly different environment in terms of new business formation.'
The Street interpreted the comments to mean Paychex isn't getting the volume of small business clients that they should be getting if the economy is truly starting to turn a corner.
And small business may be at the epicenter of the recovery. According to the Small Business Council, firms with fewer than 100 workers employ 34.9 percent of private sector payrolls.
There may be some reason for optimism, however. Paychex CEO Martin Mucci tells Cramer, "I am pleased with housing – price are up and inventories are down – as new houses are built a lot of jobs come around."
Turning attention to Wall Street expectations, Reuters says that on average the Street is looking for nonfarm payrolls to come in at 165,000 last month.
While the anticipated rise would be a bit below May's tally of 175,000 jobs, it would be higher than the monthly average of 155,800 over the past three months. The unemployment rate is expected to fall a tenth of a percentage point to 7.5 percent.
"Don't forget that Thursday is Independence Day," reminded Cramer. "Trading will be thin due to the holiday so the important thing to consider is that the reaction will be wildly disproportional versus other non-farm payroll reports."
June's employment report will come two weeks after Fed Chairman Ben Bernanke said the U.S. central bank expected to trim its bond purchases later this year and to halt the program by mid-2014, as long as the economy progresses as it expects.
The Fed has said it expects the jobless rate to drop to around 7 percent by the middle of next year, when it anticipates ending the bond purchases it has been making to reduce borrowing costs and spur stronger economic growth.
|
{
"pile_set_name": "Pile-CC"
}
|
The Homes for Families Network
Our network represents the diverse stakeholders who are dedicated to ending homelessness in the Commonwealth of Massachusetts. Individually, each component provides unique perspectives and insights into the emergency and permanent solutions to homelessness. Together, we provide a strong voice for the children, families, and communities facing housing crises.
Our network includes:
Families who are currently homeless or have experienced homelessness
Shelter and service providers in our membership
Family homelessness service providers
Provider staff from family shelters across Massachusetts,
including executive directors, program directors, and case managers
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
jquery date picker get date string in dd/mm/yy
I have the string
'Thu Oct 20 2011 00:00:00 GMT-0400 (Eastern Daylight Time)'
and would like to get date in format dd/mm/yyyy out of this. How can I do this using jquery date picker library?
A:
This is a dupe question asked here before:
jQuery UI DatePicker - Change Date Format
You can do this:
$( ".selector" ).datepicker({ dateFormat: 'yy-mm-dd' }).val();
Just to note though, the JqueryUIDatePicker has a formatdate and parseDate function too.
A:
You can use the javascript Date() method
var dateTime = new Date($("#yourSelector").datepicker("getDate"));
var strDateTime = dateTime.getDate() + "/" + (dateTime.getMonth()+1) + "/" + dateTime.getFullYear();
console.log(strDateTime);
A:
If you already set dateFormat parameter in datepicker initiation, you may use only
$( ".selector" ).val();
Because, else, using :
$( ".selector" ).datepicker({ dateFormat: 'yy-mm-dd' }).val();
is causing datepicker's onSelect event not to be triggered (don't know why, just observed).
|
{
"pile_set_name": "StackExchange"
}
|
// Copyright 2016 The go-ethereum Authors
// This file is part of the go-ethereum library.
//
// The go-ethereum library is free software: you can redistribute it and/or modify
// it under the terms of the GNU Lesser General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// The go-ethereum library is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Lesser General Public License for more details.
//
// You should have received a copy of the GNU Lesser General Public License
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
//+build windows
package netutil
import (
"net"
"os"
"syscall"
)
const _WSAEMSGSIZE = syscall.Errno(10040)
// isPacketTooBig reports whether err indicates that a UDP packet didn't
// fit the receive buffer. On Windows, WSARecvFrom returns
// code WSAEMSGSIZE and no data if this happens.
func isPacketTooBig(err error) bool {
if opErr, ok := err.(*net.OpError); ok {
if scErr, ok := opErr.Err.(*os.SyscallError); ok {
return scErr.Err == _WSAEMSGSIZE
}
return opErr.Err == _WSAEMSGSIZE
}
return false
}
|
{
"pile_set_name": "Github"
}
|
Dog spot
Country:
South Africa
Province:
Western Cape
City / Town:
George
Street Address:
17 Jan Smuts Street Dormehlsdrift George
Directions: In a quiet suburb close to York street, opposite a park.
Description for Dog spot
3 Bed roomed home with large rooms. Self catering.Lovely mountain view. Quiet area but central. Can accommodate up to 9 people easily and up to 3 dogs depending on size. Fenced front garden available to pets too. Pet bedding available. Pets sleep inside. Lovely area for walks. 700m from the vet.
The daily rate of the house to R2200.00. After ten days stay, the 11th day is free
Name tags are important for all visitors:
No
Rules for all our Best Friends visiting:
All pet owners are responsible to clean up after their pets. Cleaning service for house and garden is available at an extra cost. During your stay with us, your pets are not to be left alone in the house but may be left in the garden or stoep room, provided barking/howling is kept to a minimum. Pet Sitting services may be made available. Please ensure your pets have sufficient food and water at all times.
|
{
"pile_set_name": "Pile-CC"
}
|
Introduction {#s1}
============
Biological invasions are problematic in terrestrial, marine, and freshwater ecosystems. Native communities are often severely affected by ecological effects of invaders, anthropogenic habitat alterations, and their combinations [@pone.0077597-Vitousek1], [@pone.0077597-Mack1], [@pone.0077597-Pyek1], [@pone.0077597-Strayer1]. In freshwaters, non-indigenous invasive crayfish species (NICS) belong to a group of invaders with substantial effects on autochthonous biota and habitats throughout the world [@pone.0077597-Holdich1]. They negatively influence indigenous crayfish populations, along with other aquatic organisms, through competition, disease transfer, and predation, and can alter habitat conditions through extensive burrowing, reducing available food, and resource depletion [@pone.0077597-Holdich2]. In addition, NICS often establish populations in areas of deteriorated environmental conditions and prevent restoration of native stocks even after improvement in water and habitat quality [@pone.0077597-SoutyGrosset1]. Non-indigenous invasive crayfish use a wide range of ecological features to invade inhabited sites, compete with native species, and spread to new localities. Once established, they may eradicate indigenous crayfish species (ICS) and reduce the abundance of forage species such as gastropods, algae, and macrophytes, thereby executing a trophic cascade effect on the ecosystem [@pone.0077597-Nystrm1], [@pone.0077597-Klocker1]. Other factors facilitating NICS establishment and spread are crayfish plague infection (*Aphanomyces astaci*, Schikora 1906) [@pone.0077597-Kozubkov1], climate fluctuations [@pone.0077597-DiguezUribeondo1], and human activity such as deliberate or accidental stocking and watercourse regulation [@pone.0077597-SoutyGrosset1]. In general, a complex system of mechanisms supports invasions [@pone.0077597-Strayer1].
The most important factors in establishing and spreading new invasive species involve anthropogenic activity [@pone.0077597-Pyek1], [@pone.0077597-Perdikaris1] and, in crayfish, the presence of the crayfish plague pathogen, fatal to European ICS [@pone.0077597-Vogt1]. Non-indigenous crayfish exhibit a number of competitive advantages enabling them to establish dense and expanding populations. In general, invasive NICS can be considered r-selected species compared to their K-selected ICS antagonists. This difference is demonstrated by earlier maturation, higher fecundity, faster growth, and a higher level of activity and aggressiveness in NICS [@pone.0077597-Lindqvist1]. With respect to invasive crayfish of the Cambaridae, reproductive characteristics play a significant role. Obligate parthenogenesis in marbled crayfish (*Procambarus fallax* f. *virginalis*) [@pone.0077597-Martin1], [@pone.0077597-Martin2] and facultative parthenogenesis in spiny-cheek crayfish (*Orconectes limosus*) [@pone.0077597-Bui1] enables the recovery of small populations and the establishment of a new viable population from few specimens. Apart from the marbled crayfish, which reproduces by apomictic parthenogenesis only, and the facultative parthenogenetic spiny-cheek crayfish, the only decapod species for which a potential for asexual reproduction has been suggested is the red swamp crayfish (*Procambarus clarkii*) [@pone.0077597-Yue1], [@pone.0077597-Yue2]. This characteristic undoubtedly plays an important part in the success of NICS invasion. However, other specifics of the reproduction and life cycle are still not completely understood.
With respect to *O. limosus*, which colonized at least 20 European countries from 90 introduced specimens, without an apparent bottleneck effect [@pone.0077597-Filipov1], the role of environmental, behavioral, and chemical cues in the switch from sexual to asexual reproduction need to be investigated. The behavior may be associated with their prolonged mating period. Autumn and spring mating seasons extend from 7 to 8 months (∼ from September to April). Females store sperm in a ventral body cavity, the *annulus ventralis*, until spawning in April/May [@pone.0077597-Andrews1], [@pone.0077597-Hamr1], [@pone.0077597-Kozk1]. The hypothetical basis for this strategy are numerous, with three key provisions: a) multiple paternity, to achieve as many mates as possible to increase the genetic diversity of progeny; b) mate selection, the search for a male with a preferred traits, and c) increasing chance of successful mating in a low population. Probably only after an unsuccessful mating season does asexual reproduction come into play [@pone.0077597-Bui1]. The aim of this study was to increase understanding of reproductive mechanisms in an important aquatic invasive species by evaluating differences in reproductive output among crayfish groups under four mating regimes.
In accordance to above described hypothetical basis we can indicate a number of potential differences among the studied mating regimes. Females with the opportunity to mate in both mating seasons should have the highest possibility of successful selecting of the best mates or collecting spermatophores from the maximum number of males without additional effort. On the other hand, females mating only in spring would have less time to seek a suitable mate and additionally, oogenesis could be hypothetically negatively influenced due to lack of chemical stimulation by mature males during the autumn period. Autumn only mating provides females a shorter time for seeking a suitable mate and necessitates the long term storage of the spermatophores until the spring spawning season. Such mechanism could also affect reproductive success of females. The fourth regime excludes male participation entirely. It implies the use of special mechanisms to reproduce in such conditions (switching to asexual reproduction). There were therefore assumed hypothetical conspicuous differences in reproduction success between above described mating regimes. There could be hypothetically assumed conspicuous differences in reproduction success between above described mating regimes.
Materials and Methods {#s2}
=====================
No specific permissions were required for sampling crayfish (capture, manipulation, transport) for presented study. The locality where capture was made is not included in any protected area with requirement of any permission. The field studies did not involve endangered or protected species. Crayfish used in experimental work is dangerous invasive species and there was not necessary any permission to capture them.
Animals {#s2a}
-------
Spiny-cheek crayfish were captured (n = 1157; carapace length, CL = 24.1±7.8 mm) in the Černovický Brook (South Bohemia, Czech Republic; 49°15'51"N, 14°43'02"E) in August 2007. Captured animals were separated according to sex and held under laboratory conditions for 30 days acclimation. Adult individuals (n = 596) were selected according to glair gland development in females and form I gonopods presence in males [@pone.0077597-Bui2], [@pone.0077597-Bui3]. Of these, 150 females and 75 males were randomly selected for the trial.
Experimental conditions {#s2b}
-----------------------
Animals were maintained in circular tanks supplied with ∼ 3 shelters per crayfish. Photoperiod and water temperature were natural ambient, provided by natural daylight and a flow-through water supply. During the experiment, dissolved oxygen (Oxi 315i, WTW GmbH, Weilheim, Germany), and pH (pH 315i, WTW GmbH, Weilheim, Germany) were measured daily. Tanks were cleaned regularly. Crayfish were fed frozen chironomid larvae, carrots, and fish pellets to satiation.
Experimental design {#s2c}
-------------------
Selected crayfish were divided at random into five tanks. Mean carapace length (CL) and weight (w) did not differ among groups (ANOVA, F*~CL~* = 0.55, P*~CL~* = 0.650, F*~w~* = 0.68, P*~w~* = 0.565) for either females or males (ANOVA, F*~CL~* = 1.27, P*~CL~* = 0.287, F*~w~* = 1.53, P*~w~* = 0.223) ([Table 1](#pone-0077597-t001){ref-type="table"}). Three groups, thirty females and fifteen males per each tank, were allowed to move freely about the tanks, so that visual, chemical, and tactile contact, including mating behavior, was possible. Group 4 consisted of thirty free-ranging females and fifteen males placed in separate cages of ∼ 3 mm plastic mesh suspended approximately 0.3 m above the tank bottom. Therefore chemical communication between the sexes was possible, but physical contact was prevented. The groups described above differed only in the duration of male presence as follows: Group 1 - males available only during the autumn mating season (from October to January); Group 2 - males available only during the spring mating season (from January to May); Groups 3 - females and males maintained together throughout the mating season (from October to May); and Group 4 - without physical contact of sexes ([Table 1](#pone-0077597-t001){ref-type="table"}).
10.1371/journal.pone.0077597.t001
###### Experimental groups with number of specimens, mean carapace length (CL), and the duration of male exposure.
{#pone-0077597-t001-1}
Group No. of females Females CL (mm) No. of males Males CL (mm) The exposure time of males
----------------------------- ---------------- ----------------- -------------- --------------- ---------------------------------------------------------
1--Autumn mating only 30 31.2±2.92^a^ 15 32.9±3.95^a^ 7.10.2007 -- 17.1.2008
2--Spring mating only 30 30.8±2.74^a^ 15 35.1±2.63^a^ 17.1.2008 -- 12.5.2008
3--Autumn and spring mating 60 31.7±3.20^a^ 30 33.9±3.57^a^ 7.10.2007 -- 12.5.2008
4--Without mating 30 31.2±2.88^a^ 15 33.1±2.55^a^ 7.10.2007 -- 12.5.2008[\*](#nt102){ref-type="table-fn"}
Different alphabetic superscripts in the same column indicate significant differences at α = 0.05 (ANOVA, Tukey post hoc test).
Placed in cage 0.3 m above the tank bottom. Physical contact with females was prevented.
When spawning was completed in all groups, males were removed and females were kept separately until the hatched juveniles reached the 2^nd^ developmental stage [@pone.0077597-Andrews1]. During incubation, egg clutches were examined weekly to assess egg loss. Juveniles were removed from the successfully reproducing females and counted. Seven microsatellite loci of the females and their offspring (randomly selected 40 specimens from each female) from Group 4 were analyzed, according to Buřič *et al*. [@pone.0077597-Bui1] and Hulák *et al*. [@pone.0077597-Hulk1], to confirm the asexual reproduction in non-mated females. In addition, females and their offspring from "mated" groups were analyzed in the same way to confirm paternal alleles and thus sexual reproduction.
Data analysis {#s2d}
-------------
The data were analyzed with Statistica 9.0 (StatSoft, Inc.). All values were examined for normal distribution (Kolmogorov-Smirnov test) and homoscedaticity (Levene test). The one way ANOVA with Tukey's post hoc test was used for comparing crayfish size, weight, and fecundity at the 2^nd^ developmental stage. The chi-square test was used for comparing crayfish mortality, egg loss, spawning and hatching success. The null hypothesis was rejected at α = 0.05. Data are presented as means ± standard deviation.
Results {#s3}
=======
The lowest mortality of spiny-cheek crayfish females was observed in Group 4 (Chi-square = 11.39, P = 0.010). Female mortality in Groups 1, 2, and 3 occurred during the period when males were stocked with the females. Females in all experimental groups successfully produced eggs ([Table 2](#pone-0077597-t002){ref-type="table"}) without differences between experimental groups (Chi-square = 0.36, P = 0.948). Spawning took place from May 15 to 27. Significant, including total, eggs losses occurred during incubation for several females, mainly in Groups 3 and 4 ([Table 2](#pone-0077597-t002){ref-type="table"}, Chi-square = 30.46, P \< 10^−5^). Hatching of viable offspring was observed in all groups without significant differences between groups (Chi-square = 1.33, P = 0.721) and took place between June 10 and 17. The number of juveniles per female at the 2^nd^ developmental stage, immediately prior to leaving the mother, was high in all groups ([Table 2](#pone-0077597-t002){ref-type="table"}). The number of offspring in the non-mated Group 4 was significantly lower (more than 40% fewer) than in the other four groups (ANOVA, F = 5.45, P = 0.002), which did not differ from one another. Analysis of seven microsatellite loci showed that females from Group 4 produced genetically homogeneous offspring identical to the mother [@pone.0077597-Bui1] ([Table 3](#pone-0077597-t003){ref-type="table"}). In mated groups were found paternal alleles, which implying sexual reproduction ([Table 4](#pone-0077597-t004){ref-type="table"}).
10.1371/journal.pone.0077597.t002
###### The number (n) of females and percent (%) mortality, and spawning in each group, the number and percent of crayfish females in which \> 50% or total egg losses were observed, the number and percent of females hatching eggs, and the number of juveniles in 2^nd^ developmental stage (mean ± standard deviation) in each group.
{#pone-0077597-t002-2}
Experimental group Initial stock Mortality Successful spawning Loss of\> 50% eggs Total lossof eggs Successful hatching Number of juveniles
----------------------------- --------------- ----------- --------------------- -------------------- ------------------- --------------------- --------------------- --- --------- ---- ---------- -----------------
1--Autumn mating only 30 4 13.3^a^ 25 96.2^a^ 1 4.0^b^ 0 0.0^b^ 25 100.0^a^ 142.96±55.38^a^
2--Spring mating only 30 6 20.0^a^ 22 91.7^a^ 1 4.6^b^ 0 0.0^b^ 22 100.0^a^ 133.73±43.95^a^
3--Autumn and spring mating 60 8 13.3^a^ 52 100.0^a^ 10 19.2^a^ 7 13.5^a^ 45 86.5^a^ 138.00±44.19^a^
4--Without mating 30 1 3.3^b^ 28 96.6^a^ 8 28.6^a^ 2 7.1^a^ 26 92.9^a^ 96.46±46.82^b^
Different alphabetic superscripts in the same column indicate significant differences at α = 0.05 (Chi-square test for mortality, spawning, egg loss and hatching; ANOVA, Tukey post hoc test for number of juveniles).
excluding dead females, \*\* in successfully spawned females.
10.1371/journal.pone.0077597.t003
###### Example of multilocus genotypes of 5 spiny-cheek crayfish females reproduced by apomictic parthenogenesis (Group 4), and their offspring.
{#pone-0077597-t003-3}
Allele sizes (bp) for seven microsatellite loci
--------------- ------------------------------------------------- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- -----
Female 1 297 301 278 285 171 195 145 158 151 153 208 222 297 301
juvenile 1.1 297 301 278 285 171 195 145 158 151 153 208 222 297 301
juvenile 1.2 297 301 278 285 171 195 145 158 151 153 208 222 297 301
juvenile 1.3. 297 301 278 285 171 195 145 158 151 153 208 222 297 301
Female 2 294 302 274 285 195 195 158 158 147 147 222 227 297 297
juvenile 2.1 294 302 274 285 195 195 158 158 147 147 222 227 297 297
juvenile 2.2 294 302 274 285 195 195 158 158 147 147 222 227 297 297
juvenile 2.3 294 302 274 285 195 195 158 158 147 147 222 227 297 297
Female 3 297 306 281 283 195 225 158 158 147 161 224 229 293 297
juvenile 3.1 297 306 281 283 195 225 158 158 147 161 224 229 293 297
juvenile 3.2 297 306 281 283 195 225 158 158 147 161 224 229 293 297
juvenile 3.3 297 306 281 283 195 225 158 158 147 161 224 229 293 297
Female 4 301 301 278 278 195 225 158 158 147 147 208 229 295 301
juvenile 4.1 301 301 278 278 195 225 158 158 147 147 208 229 295 301
juvenile 4.2 301 301 278 278 195 225 158 158 147 147 208 229 295 301
juvenile 4.3 301 301 278 278 195 225 158 158 147 147 208 229 295 301
Female 5 292 298 274 274 171 225 158 158 147 161 222 229 301 301
juvenile 5.1 292 298 274 274 171 225 158 158 147 161 222 229 301 301
juvenile 5.2 292 298 274 274 171 225 158 158 147 161 222 229 301 301
juvenile 5.3 292 298 274 274 171 225 158 158 147 161 222 229 301 301
Alleles are given as fragment sizes in base pairs. All analyzed juveniles of these females had multilocus genotypes identical to their mothers, so only three juvenile genotypes are shown.
10.1371/journal.pone.0077597.t004
###### An example of allelic inheritance after sexual reproduction in spiny-cheek crayfish.
{#pone-0077597-t004-4}
Allele sizes (bp) for seven microsatellite loci
--------------- ------------------------------------------------- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- -----
Female 1 297 297 278 283 195 225 158 158 147 161 227 227 291 295
juvenile 1.1 297 297 283 285 195 195 145 158 147 161 227 227 295 295
juvenile 1.2 297 297 283 285 195 195 145 158 147 161 227 227 295 295
juvenile 1.3. 297 297 281 283 195 195 145 158 147 161 227 227 291 301
Female 2 297 297 278 283 195 229 158 158 147 161 227 227 291 295
juvenile 2.1 297 301 274 278 225 229 145 158 147 161 227 227 291 295
juvenile 2.2 297 301 274 278 225 229 145 158 147 161 227 227 291 295
juvenile 2.3 297 301 274 278 225 229 145 158 147 161 227 227 291 295
Female 3 294 294 274 274 225 225 158 158 147 161 208 208 295 295
juvenile 3.1 294 304 274 274 225 237 158 158 147 163 208 208 295 295
juvenile 3.2 294 304 274 274 225 237 158 158 147 163 208 208 295 295
juvenile 3.3 294 304 274 274 225 237 158 158 147 163 208 208 295 295
Female 4 294 294 283 283 225 225 145 145 147 147 227 227 301 301
juvenile 4.1 294 306 283 283 225 232 145 145 147 147 219 227 301 301
juvenile 4.2 294 306 283 283 225 232 145 145 147 147 227 227 301 301
juvenile 4.3 294 306 283 283 225 232 145 145 147 147 219 227 301 301
Female 5 301 304 274 274 195 225 145 158 147 147 208 227 293 301
juvenile 5.1 294 304 274 278 195 225 145 158 147 147 208 227 295 301
juvenile 5.2 294 301 274 281 225 225 145 158 147 161 208 227 295 301
juvenile 5.3 294 304 274 278 225 229 145 158 147 161 208 208 293 295
Multilocus genotypes for 5 females and their offspring (juveniles) carrying paternal alleles are presented as the sizes (in base pairs) of alleles at seven microsatellite loci.
Discussion {#s4}
==========
Crayfish are key inhabitants of aquatic ecosystems [@pone.0077597-Momot1]. They often have significant impact, positive as well as negative, on benthic communities. In addition to their ecological role, crayfish have economic value [@pone.0077597-Holdich2]. For these reasons, crayfish have often been transferred from their natural range and, since the 19^th^ century, even across continents, mainly from North America to Europe. This allowed introduction of new pathogens including the oomycete *Aphanomyces astaci*, Schikora, 1903, a crayfish plague disease lethal to European crayfish, leading to massive losses of autochthonous crayfish species. The newly introduced crayfish vectors of the disease successfully established populations in abandoned habitats [@pone.0077597-SoutyGrosset1]. This resulted in the establishment of two groups of crayfish on the old continent: an indigenous species (ICS), characterized by usually a sharply demarcated occurrence, decreased populations, and localization in headwaters or separate backwaters, and a non-indigenous crayfish species (NICS), distinguishable by high population density, rapid spread and establishment in new localities, and wide tolerance to varying habitat conditions.
One of the most important NICS is the spiny-cheek crayfish (*Orconectes limosus*), which has been found in European freshwaters for more than 120 years. Despite its wide distribution throughout the continent [@pone.0077597-SoutyGrosset1], the probable source of all *O. limosus* populations in Europe is suggested, according to haplotype variation [@pone.0077597-Filipov1], to be the introduction of 90 specimens into Poland at the end of 19^th^ century [@pone.0077597-McDonald1], [@pone.0077597-Kossakowski1]. The overwhelming success of further invasions of *O. limosus* into numerous European waters probably arose from a combination of factors. First, there was the effect of *O. limosus* resistance to crayfish plague and its transmission to indigenous species. This could have reduced competition with native crayfish populations [@pone.0077597-Kozubkov1], [@pone.0077597-Lindqvist1] and facilitated establishment in newly vacant habitats. Secondly, *O. limosus* exhibit characteristics favorable for competition with ICS, such as aggressive behavior [@pone.0077597-Lozan1], [@pone.0077597-Musil1], tolerance to poor environmental conditions [@pone.0077597-SoutyGrosset1], and the capability of rapid migration [@pone.0077597-Puky1], [@pone.0077597-Bui4]. However, the current distribution in Europe would not have been possible through natural dispersal alone, and was accomplished by a combination of natural spreading from the region of first introduction (via rivers and connecting canals between watersheds) and long distant transport by humans within or between watersheds [@pone.0077597-SoutyGrosset1], [@pone.0077597-Filipov1], [@pone.0077597-Holdich3].
Finally, the uncommon reproductive plasticity of *O. limosus* reinforces these other characteristics. These features, common in the majority of Cambaridae, but specifically *O. limosus* consist of early maturation enabling a short generation cycle [@pone.0077597-Hamr1], [@pone.0077597-Holdich3], [@pone.0077597-Schulz1]; high fecundity even of small females maximizing numbers of offspring [@pone.0077597-Kozk1], [@pone.0077597-Pieplow1], [@pone.0077597-Stucki1]; periodic occurrence of morphologically distinct sexually active (form I) and sexually inactive forms (form II) in males and females providing a mechanism to utilize resources effectively in the most important life stages [@pone.0077597-Bui2], [@pone.0077597-Bui3], [@pone.0077597-Smith1], [@pone.0077597-Hobbs1]; autumn and spring mating maximizing the probability of successful mating [@pone.0077597-Hamr1], [@pone.0077597-Bui4], [@pone.0077597-Stucki1], [@pone.0077597-VanDenBrink1]; the capability of sperm storage to circumvent extreme conditions [@pone.0077597-SoutyGrosset1], [@pone.0077597-Andrews2], [@pone.0077597-Albaugh1]; and parthenogenesis as a tool for alternative reproduction if males are not available [@pone.0077597-Bui1].
The goal of the present work was to clarify reproductive factors having substantial impact on successful establishment of populations at new sites and their subsequent spread. The reasons underlying the double mating season are not known, nor do we have information regarding the impact on reproductive success if a mating season is absent. The four mating regimes used in this trial, optimal as well as deficient, resulted in successful reproduction. The most appropriate situation was when males were present during both the autumn and spring mating seasons. The less adequate regime provided a single mating period either in autumn (expected long term spermatophores storage in *annulus ventralis*, or spring (extensive wait for mating). Under those regimes, a female:male ratio of 2:1 was chosen to provide a sufficient number of potential mates [@pone.0077597-Taugbl1], [@pone.0077597-Reynolds1], [@pone.0077597-Wickins1], while limiting effects of aggressive encounters with males on the fitness of females [@pone.0077597-Gherardi1]. Males were proportionally larger ([Table 1](#pone-0077597-t001){ref-type="table"}) than females, as is recommended for successful mating [@pone.0077597-Andrews2], [@pone.0077597-Wickins1]. The Group 4 regime was the most inadequate variant, as there was no possibility of mating.
What are the hypothetical differences among the regimes? Females with the opportunity to mate in both mating seasons had the highest possibility of selecting the best mates or collecting spermatophores from the maximum number of males. Mechanisms of sexual selection in crayfish have been described [@pone.0077597-Villanelli1], [@pone.0077597-Gherardi2], [@pone.0077597-Galeotti1], but it is unclear whether females can strictly limit mating only to the best males. In addition, the number of males from which a female can store the spermatophores is not known. Studies reporting multiple paternity have detected offspring from 2--4 males for a single female [@pone.0077597-Walker1], [@pone.0077597-Yue3]. Moreover, males are known to damage or remove the sperm from prior matings [@pone.0077597-Villanelli1], [@pone.0077597-Berrill1], [@pone.0077597-Rubolini1]. The primary effect of the long mating season may be to maximize the probability of finding a suitable mate.
Females mating only in spring would have less time to seek a suitable mate. In addition, oogenesis could hypothetically be negatively influenced due to lack of chemical stimulation by mature males during the autumn period [@pone.0077597-Butler1], [@pone.0077597-CluttonBrock1]. However, this has not been well-documented, in contrast to observations of stimulation of males by female pheromones [@pone.0077597-Stebbing1], [@pone.0077597-Belanger1] or the effect of chemical stimuli on sexual selection [@pone.0077597-Berry1], [@pone.0077597-Gherardi3].
Autumn only mating provides females a shorter time for seeking a suitable mate and necessitates the long term storage of the spermatophores (four months) until the spring spawning season. Long-term sperm storage has been confirmed in cambarid crayfish [@pone.0077597-SoutyGrosset1], [@pone.0077597-Albaugh1], [@pone.0077597-Butler1].
Despite these variables, suggesting differences in reproductive output among mating regimes, no significant difference was found among the experimental groups ([Table 2](#pone-0077597-t002){ref-type="table"}). Females in all mated groups produced eggs and hatched and carried viable offspring. The number of 2^nd^ developmental stage juveniles per female was high in all groups ([Table 2](#pone-0077597-t002){ref-type="table"}) and was comparable to the literature [@pone.0077597-SoutyGrosset1], [@pone.0077597-Filipov1], [@pone.0077597-Kozk1]. This suggests that omitted or truncated mating periods, long-term sperm storage, and absence of chemical stimulation by males at the start of a mating season did not reduce fecundity, and, conversely, the completion of both mating periods had no positive influence on reproductive output.
The present study included another regime, in which females had no possibility of meeting males for 10 months. In this situation, reproductive success was observed in the vast majority of females, showing the facultative parthenogenesis in *O. limosus* [@pone.0077597-Bui1]. However, compared to the mated groups, the number of hatchlings was significantly lower (by \>40%) in asexually reproducing females ([Table 2](#pone-0077597-t002){ref-type="table"}). Butler & Stein [@pone.0077597-Butler1] argued that reproductive success would decline with fewer mates, nevertheless that is probably not relevant to the asexual reproduction observed in the present study. Secondary factors may affect reproduction, such as the ability to manage clutch size, and size of eggs relative to the quality of mate [@pone.0077597-Galeotti2]. Decreased reproductive success due to partial egg loss during incubation suggests a cost of asexuality, probably associated with alternating between sexual and asexual reproduction [@pone.0077597-Bui1]. The mechanisms underlying the switching between sexual and asexual reproduction are still unclear. Further research is necessary, as recent studies indicate that this reproductive feature could be more widespread [@pone.0077597-Yue1], [@pone.0077597-Yue2].
Other variables determining the success of reproduction include the percent of females that successfully spawned eggs and carried offspring, egg losses during incubation, and the mortality of females. Considerable differences would be expected, at least between mated groups and the non-mated group. However, minimal variations in these parameters were observed among groups.
The timing of spawning and hatching was similar among the experimental groups. The timing can be influenced by environmental cues, mainly water temperature and photoperiod [@pone.0077597-Stucki1], [@pone.0077597-Dub1], or by the size (age) of females [@pone.0077597-Smith1], [@pone.0077597-Reynolds2]. Our experimental groups were kept in the same conditions, and females were of similar size, suggesting similar age. We can therefore conclude that differences in the reproductive regimes did not influence the time of spawning and the hatching of juveniles.
The factors determining reproduction success are successful egg laying, incubation, and hatching of viable offspring. All experimental groups, regardless of the mating regime, showed high spawning success ([Table 2](#pone-0077597-t002){ref-type="table"}), with more than 90% of females producing eggs. In groups in which both mating seasons were completed, spawning success was 100%, but it is not clear whether other groups were negatively influenced by fewer matings [@pone.0077597-Butler1]. Contrary to spawning success, loss of full egg clutches was observed for several females in the non-mated group (7%) and 7 and 20% of females in the two groups with continuous mating ([Table 2](#pone-0077597-t002){ref-type="table"}). Such egg losses could be caused by failed fertilization, unsuccessful egg attachment, or lack of female fitness [@pone.0077597-Reynolds2]. Partial egg losses occurred in the non-mated group, with nearly 30% of females losing more than 50% of the egg clutch. This could be a further reason for decreased fecundity in this experimental group. However, a number of partial egg losses also occurred in the groups completing both mating seasons (11 and 28%). This could be the result of inadequate egg attachment to pleopods, poor egg quality, or removal of dead eggs by the female [@pone.0077597-Gherardi1], [@pone.0077597-Reynolds2].
The fecundity of only non-mated females was affected, which can be ascribed to a combination of the mentioned factors (cost of asexuality, secondary reproductive effort, poor egg attachment, environmental conditions, and possible reduced fitness of the parthenogenetic eggs) [@pone.0077597-Bui1], [@pone.0077597-Gherardi1], [@pone.0077597-Galeotti2], [@pone.0077597-Dub1], [@pone.0077597-Reynolds2]. On the other hand, asexual reproduction would have benefits in eliminating aggressive encounters with males, which probably caused the observed mortality (10 -- 20%) in the mated groups, since it only occurred when males were present in the experimental tanks.
The omitted autumn or spring mating period, long-term sperm storage, and the absence of chemical stimulation by males at the start of mating season was not shown to affect fecundity, and conversely, the completion of both mating periods did not influence reproductive output. Even with no males present, fecundity was relatively high. Moreover, discussed mating scenarios have fundamental effect not only for female reproductive output, but also for male contribution on offspring. Males which failed suitable mate search in autumn, can still deposit their spermatophores to females during spring mating period and vice versa, males which participated in autumn period only, have still good probability of their contribution on offspring. On the other hand, females are able to store spermatophores from more males (evidently from both, autumn and spring mates), resulting in multiple paternity [@pone.0077597-Walker1], [@pone.0077597-Yue3]. They therefore can increase the variability within offspring. Such mechanism can hypothetically restore the lost diversity after potential previous introduction bottlenecks, and therefore can maintain population viability. However, there are much more unanswered questions waiting for future scientific work - including e.g. switching mechanism between sexual and asexual reproduction, male contribution on offspring according to their phenotypic quality [@pone.0077597-Galeotti2] or their time and order of copulation).
The result of the complex mechanisms described in the present study is to achieve optimal production of offspring in the shortest possible time and under a wide spectrum of ecological conditions. The reproductive plasticity of *O. limosus* directly determines its status of a high risk invasive species [@pone.0077597-Gherardi4] and contributes to its successful and rapid spread into new localities. *Orconectes limosus* is a highly adaptive species, which can exert a strong direct and indirect influence on the environment. The present data also indirectly supports the results of Filipová *et al*. [@pone.0077597-Filipov1] that, based on haplotype variation of populations in North America and Europe, all European *O. limosus* populations are descendants of only 90 specimens initially introduced into one small pond. Moreover, the recently acquired knowledge of *O. limosus* reproduction may question the effectiveness of eradication techniques [@pone.0077597-Aquiloni1], [@pone.0077597-Gherardi5]. Currently, there is no known means of eliminating *O. limosus* spread.
The reproductive plasticity of *O. limosus* implies a serious threat, not only for autochthonous European astacofauna, but for other aquatic organisms, as well as entire ecosystems [@pone.0077597-Holdich2], [@pone.0077597-Holdich3], [@pone.0077597-Gherardi4]. The combined effects of *O. limosus* invasive behavior, continued habitat destruction, pollution of waters, and human activity can accelerate an invasion and prevent future ICS restoration. In order to decelerate *O. limosus* invasion, steps must be taken to increase public awareness to prevent new crayfish transfers, and to continue NICS invasion monitoring and research.
Thanks to the Lucidus Consultancy for language corrections.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: MB AK PK. Performed the experiments: MB AK. Analyzed the data: MB. Contributed reagents/materials/analysis tools: MB AK PK. Wrote the paper: MB AK.
|
{
"pile_set_name": "PubMed Central"
}
|
/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#include <aws/ec2/model/GetTransitGatewayRouteTablePropagationsRequest.h>
#include <aws/core/utils/StringUtils.h>
#include <aws/core/utils/memory/stl/AWSStringStream.h>
using namespace Aws::EC2::Model;
using namespace Aws::Utils;
GetTransitGatewayRouteTablePropagationsRequest::GetTransitGatewayRouteTablePropagationsRequest() :
m_transitGatewayRouteTableIdHasBeenSet(false),
m_filtersHasBeenSet(false),
m_maxResults(0),
m_maxResultsHasBeenSet(false),
m_nextTokenHasBeenSet(false),
m_dryRun(false),
m_dryRunHasBeenSet(false)
{
}
Aws::String GetTransitGatewayRouteTablePropagationsRequest::SerializePayload() const
{
Aws::StringStream ss;
ss << "Action=GetTransitGatewayRouteTablePropagations&";
if(m_transitGatewayRouteTableIdHasBeenSet)
{
ss << "TransitGatewayRouteTableId=" << StringUtils::URLEncode(m_transitGatewayRouteTableId.c_str()) << "&";
}
if(m_filtersHasBeenSet)
{
unsigned filtersCount = 1;
for(auto& item : m_filters)
{
item.OutputToStream(ss, "Filter.", filtersCount, "");
filtersCount++;
}
}
if(m_maxResultsHasBeenSet)
{
ss << "MaxResults=" << m_maxResults << "&";
}
if(m_nextTokenHasBeenSet)
{
ss << "NextToken=" << StringUtils::URLEncode(m_nextToken.c_str()) << "&";
}
if(m_dryRunHasBeenSet)
{
ss << "DryRun=" << std::boolalpha << m_dryRun << "&";
}
ss << "Version=2016-11-15";
return ss.str();
}
void GetTransitGatewayRouteTablePropagationsRequest::DumpBodyToUrl(Aws::Http::URI& uri ) const
{
uri.SetQueryString(SerializePayload());
}
|
{
"pile_set_name": "Github"
}
|
The Beginners Guide To Lawyers (Chapter 1)
UncategorizedNovember 27, 2017, by Comments Off
Discover Pointers In Selecting A Perfect Law Firm To Handle Your Case
Choosing a law firm to work with is a big decision and there are some factors an individual should be aware of to help in the search. Whether one is going through a divorce, business dispute or a child custody case, you need to choose the right lawyer since they improve your chances of winning the case. Be choosy when getting a lawyer because one needs to go through the process once and move on with your life.
The reputation of a law firm matters and if people are talking negative about the firm, you do want to deal with a company which might not hold onto their end of the deal. If the lawyer one picks is experienced, they need to look at your case from both sides and give one the possible scenarios because what one needs is honesty. Read their body language and the intonation these individuals use when talking with you and if these individuals have am issue maintaining eye contact, they could be hiding something.
An attorney can be best gauge by the number of years they have been in existence because one has made ,mistakes and learned from them which helps ion dealing with s current case. If one expects results, pick someone who specializes in particular issues like divorce, child custody or business lawyers if there are business disputes. There is no need of taking risks with a general lawyer especially when one is so determined to win; so, look for someone who knows the jargon used and where to get witnesses if they are required.
Big law firms have a lot of clients to deal with and in most cases one will not feel like they are being given full attention, that is why an individual should consider settling for a smaller firm. Here, attorneys have the time to look at your case without rushing through thus ensuring there are no details missed out, hence giving your case more attention. Working with bigger firms has its benefits too; therefore, one should look at their budget and weigh on the options at your disposal.
Attorneys use different means to price their charges in that some charge per hearing, others have a standard amount, so know if the attorney fits into your budget and compare with what others have to offer. If done right, one has a chance of finding the right person for the case, so get recommendations and do not forget to ask for referrals from someone trustworthy. Never settle for someone who does not guarantee the best results considering an individual has one chance to get that one thing you have been fighting for, thus, investigation helps ion winning the case.
|
{
"pile_set_name": "Pile-CC"
}
|
The pointer_traits class template provides the standardized way to access certain properties of pointer-like types. The standard template std::allocator_traits relies on pointer_traits to determine the defaults for various typedefs required by Allocator.
|
{
"pile_set_name": "Pile-CC"
}
|
FT-IR Hyperspectral Imaging and Artificial Neural Network Analysis for Identification of Pathogenic Bacteria.
Identification of microorganisms by Fourier transform infrared (FT-IR) spectroscopy is known as a promising alternative to conventional identification techniques in clinical, food, and environmental microbiology. In this study we demonstrate the application of FT-IR hyperspectral imaging for rapid, objective, and cost-effective diagnosis of pathogenic bacteria. The proposed method involves a relatively short cultivation step under standardized conditions, transfer of the microbial material onto suitable IR windows by a replica method, FT-IR hyperspectral imaging measurements, and image segmentation by machine learning classifiers, a hierarchy of specifically optimized artificial neural networks (ANN). For cultivation, aliquots of the initial microbial cell suspension were diluted to guarantee single-colony growth on solid agar plates. After a short incubation period when microbial microcolonies achieved diameters between 50 and 300 μm, microcolony imprints were produced by using a specifically developed stamping device which allowed spatially accurate transfer of the microcolonies' upper cell layers onto IR-transparent CaF2 windows. Dry microcolony imprints were subsequently characterized using a mid-IR microspectroscopic imaging system equipped with a focal plane array (FPA) detector. Spectral data analysis involved preprocessing, quality tests, and the application of supervised modular ANN classifiers for hyperspectral image segmentation. The resulting easily interpretable segmentation maps suggest a taxonomic resolution below the species level.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
/*
* Copyright (C) 2006 Mike McCormack
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
*/
#if 0
#pragma makedep install
#endif
[
object,
uuid(0c733a8a-2a1c-11ce-ade5-00aa0044773d),
pointer_default(unique)
]
interface IDBProperties : IUnknown {
[local] HRESULT GetProperties(
[in] ULONG cPropertyIDSets,
[in, size_is(cPropertyIDSets)] const DBPROPIDSET rgPropertyIDSets[],
[in, out] ULONG *pcPropertySets,
[out, size_is(,*pcPropertySets)] DBPROPSET **prgPropertySets);
[call_as(GetProperties)] HRESULT RemoteGetProperties(
[in] ULONG cPropertyIDSets,
[in, unique, size_is(cPropertyIDSets)] const DBPROPIDSET *rgPropertyIDSets,
[in, out] ULONG *pcPropertySets,
[out, size_is(,*pcPropertySets)] DBPROPSET **prgPropertySets,
[out] IErrorInfo **ppErrorInfoRem);
[local] HRESULT GetPropertyInfo(
[in] ULONG cPropertyIDSets,
[in, size_is(cPropertyIDSets)] const DBPROPIDSET rgPropertyIDSets[],
[in, out] ULONG *pcPropertyInfoSets,
[out, size_is(,*pcPropertyInfoSets)] DBPROPINFOSET **prgPropertyInfoSets,
[out, annotation("__deref_out_z_opt")] OLECHAR **ppDescBuffer);
[call_as(GetPropertyInfo)] HRESULT RemoteGetPropertyInfo(
[in] ULONG cPropertyIDSets,
[in, unique, size_is(cPropertyIDSets)] const DBPROPIDSET *rgPropertyIDSets,
[in, out] ULONG *pcPropertyInfoSets,
[out, size_is(,*pcPropertyInfoSets)] DBPROPINFOSET **prgPropertyInfoSets,
[in, out] ULONG *pcOffsets,
[out, size_is(,*pcOffsets)] DBBYTEOFFSET **prgDescOffsets,
[in, out] ULONG *pcbDescBuffer,
[in, out, unique, size_is(,*pcbDescBuffer)] OLECHAR **ppDescBuffer,
[out] IErrorInfo **ppErrorInfoRem);
[local] HRESULT SetProperties(
[in] ULONG cPropertySets,
[in, out, size_is(cPropertySets)] DBPROPSET rgPropertySets[]);
[call_as(SetProperties)] HRESULT RemoteSetProperties(
[in] ULONG cPropertySets,
[in, unique, size_is(cPropertySets)] DBPROPSET *rgPropertySets,
[in] ULONG cTotalProps,
[out, size_is(cTotalProps)] DBPROPSTATUS *rgPropStatus,
[out] IErrorInfo **ppErrorInfoRem);
}
|
{
"pile_set_name": "Github"
}
|
import React from 'react';
import PropTypes from 'prop-types';
import { showModal } from 'components/common/Modal';
import './style.scss';
const playViaModal = (title, component, language) =>
showModal({
title,
component,
language,
showFooter: false,
});
const typeIconsMap = {
video: 'bfi-film',
audio: 'bfi-music',
embed: 'bfi-code',
};
const PlayerModal = ({
title,
type,
language,
name,
url,
poster,
children,
onRemove,
}) => {
return (
<div className={`bf-player-holder ${type}`}>
<div className="icon-badge">
<i className={typeIconsMap[type]} />
<span className="text">{language.media[type]}</span>
</div>
<button onMouseDown={onRemove} className="button-remove">
<i className="bfi-close" />
</button>
<button
onMouseDown={() =>
playViaModal(name ? `${title}:${name}` : title, children, language)
}
className="button-play"
>
<i className="bfi-play_arrow" />
</button>
{name ? <h5 className="bf-name">{name}</h5> : null}
<h6 className="bf-url">{url}</h6>
{poster ? (
<div
className="bf-poster"
style={{ backgroundImage: `url(${poster})` }}
/>
) : null}
</div>
);
};
PlayerModal.propTypes = {
title: PropTypes.any,
type: PropTypes.any,
language: PropTypes.any,
name: PropTypes.any,
url: PropTypes.any,
poster: PropTypes.any,
children: PropTypes.any,
onRemove: PropTypes.any,
};
export default PlayerModal;
|
{
"pile_set_name": "Github"
}
|
Effects of non-steroidal anti-inflammatory agents on human neutrophil functions in vitro and in vivo.
Human blood neutrophils exposed to appropriate stimuli aggregate, degranulate and generate superoxide anion (O2-). These responses are anteceded by mobilization of membrane-associated calcium, monitored as a decrease in fluorescence of cells preloaded with chlortetracycline (CTC). We studied the effects, both in vitro and in vivo, of non-steroidal anti-inflammatory agents (aspirin, indomethacin, ibuprofen and piroxicam) on these neutrophil responses to three stimuli: a chemoattractant, N-formyl-methionyl-leucyl-phenylalanine (FMLP); a tumor promotor, phorbol myristate acetate (PMA); and a lectin, concanavalin A (Con A). The effects of these drugs were compared with those of two polyenoic inhibitors of arachidonate metabolism: eicosatrienoic acid (ETI) and eicosatetraynoic acid (ETYA). The pattern of inhibition of neutrophil functions varied both with inhibitor and the nature of the stimulus. Thus, aspirin, piroxicam, ETYA and ETI inhibited neutrophil aggregation, degranulation, and O2- generation in response to FMLP, whereas ibuprofen inhibited only aggregation and degranulation and indomethacin only inhibited aggregation. None of the agents inhibited aggregation or degranulation induced by PMA or Con A: only piroxicam inhibited O2- generation in response to PMA or Con A. ETI and ibuprofen inhibited decrements of CTC fluorescence induced by FMLP, but whereas ETI inhibited the CTC response to PMA or Con A, ibuprofen was without effect. The agents had varying effects on binding of the stimulus [( 3H]FMLP, [3H]Con A), but these did not correlate with neutrophil responses to the ligands. Neutrophils from subjects taking therapeutic doses of ibuprofen, indomethacin, or piroxicam showed profiles of inhibited responses to FMLP similar to those observed with these agents in vitro. These data suggest that, although non-steroidal anti-inflammatory agents may inhibit discrete neutrophil functions both in vitro and in vivo, their effects do not duplicate those of polyenoic inhibitors of arachidonate metabolism. Moreover, since the susceptibility of neutrophils differed not only with respect to each inhibitor, but also to the stimulus, it is unlikely that all neutrophil responses are necessarily linked by a common pathway that is blocked by inhibitors of arachidonic acid metabolism.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Considering the employee point of view: perceptions of job satisfaction and stress among nursing staff in nursing homes.
To document job satisfaction and sources of stress among nursing staff working in nursing homes and to evaluate the extent to which the reasons of stress differ by type of nursing staff. Cross-sectional study. Twenty-five nursing homes in North Carolina participating in a demonstration project of a new model of long-term care pharmacy. Nurses and nursing assistants employed at the time of the survey in the spring and summer of 2002 (n = 1283). Health Professional Stress Inventory modified for use in the nursing home setting and ratings of job satisfaction. The situations most stressful for nurses were not having enough staff, having too much work to do, interruptions, having non-health professionals determine how to do their job, poor pay, and ultimately being responsible for patient outcomes. The top most stressful situations for nursing assistants included poor pay, not enough staff, and too much work to do. Nursing assistants were more likely than nurses to report stress because they do not have adequate information regarding a patient's condition. Nurses were more likely than nursing assistants to report stress because non-health professionals (eg, surveyors) determine how they must do their job. The findings of this study support the need to improve recognition for nursing, improve staffing, and provide competitive compensation in nursing homes.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
I suppose you can’t blame Westworld for trying. The HBO series, which launches its third season on March 15, has had some trouble working its way to the galactic center of the zeitgeist the way its erstwhile sibling, Game of Thrones, did. They are two very different shows, of course—but I do think that HBO hoped Westworld, an expensive series plagued by production problems, would become a similar kind of international watercooler hit. (Remember gathering ‘round the watercooler, before COVID forced us all into isolation?)
Despite decent ratings, Westworld hasn’t permeated the cultural discourse like its Westerosi brethren. Especially not in its second season, which doubled down on the foundational mysteries at the heart of the series—about a futuristic amusement park where rich humans visit their fantasies upon an increasingly conscious population of robots—to sometimes inscrutable effect. Audiences were handed a knot of intricately woven timelines that was pretty hard to untie into coherent strands, on top of having to unpack a black box full of dreamy existential babble about self and soul and autonomy. I really liked the season’s moody, opaque operatics—some episodes were downright stunning—but plenty of people understandably did not. How, then, would Westworld proceed, in perhaps its last chance to become a genuinely big deal?
A strategy is near immediately apparent in Season 3, which explores the world outside the park. (The Season 2 finale gave us a glimpse, in what would have been a perfect series closer, ahem.) The four episodes I’ve seen ramp up the red-meat butt-kicking stuff while uncomplicating the mysteries and motivations that have heretofore guided the series into its enticing abstractions.
This new iteration of the show is, to use a dated word, a bit basic. It’s got some cool sci-fi stuff going on, but the twists and loops have been ironed out to create a smoother surface for more action-movie content. But will the show’s transformation into something more easily legible and digestible be enough to attract new eyeballs? Or should Westworld have not worried so much about an imagined wider audience and just stuck to its six-shooters, delivering a third (and final) season that stood strong in its idiosyncrasy—putting it in the same league not as Game of Thrones, but HBO’s The Leftovers?
At this point, the latter seems like it would have been the wiser—or at least more fulfilling—option. I don’t love this leaner, meaner Westworld. The show suddenly seems so much less sexy and dangerous and alluring than it once did: it’s flat, more obvious, occasionally hokey. It tries a bit too hard to appeal to those who only want a shoot-and-stab-’em-up about sexy robots. Westworld has always been a violent show, one that, quite like its fictional park guests, is a bit turned-on by wanton bloodshed. But the show used to be careful to offset that, at least a little bit, with some horror and revulsion in response to that annihilation. Less so in this new version, which happily makes a monotonously butt-kicking badass out of lead robot Dolores as she charges along on her quest to, I think, destroy humanity.
What the show has smartly retained, for the most part, is its core cast. Evan Rachel Wood manages to find levels within Dolores’s newfound monomania. She’s clever and frightening, satisfyingly shrewd with a jolt of danger. Tessa Thompson, as the robot now pretending to be corporate shark Charlotte Hale, gives off that same purring menace, though she’s given a bit more emotional roundness to work with. Charlotte, or this version of Charlotte, brings to mind the conflicted, confused robots of older Westworld, unsure of her purpose while programmed to pursue it.
|
{
"pile_set_name": "OpenWebText2"
}
|
‘76% parents hit their kids to make them behave’
Around 76% parents use physical violence to discipline their children, while 67% resorted to bribing them to make them behave, said the survey of 3,000 parents in Mumbai and Bangalore by the Podar Education Institute, Santacruz.
Hitting children may be banned in schools, but a majority of parents are not sparing the rod at home, a survey has revealed.
Around 76% parents use physical violence to discipline their children, while 67% resorted to bribing them to make them behave, said the survey of 3,000 parents in Mumbai and Bangalore by the Podar Education Institute, Santacruz.
Corporal punishment involves hitting the child physically. Spanking, smacking, pinching or violently shaking the child were the most commonly used punishments.
Of the parents who admitted to hitting their children, 64% said they did so regularly and 12% said they only hit their child if there was severe provocation.
In 74% of homes where children were hit, both the mother and father were involved; in 21% homes, it was only the mother who hit children and in 5% homes, only the fathers.
Many parents also admitted to emotionally threatening their children, bribing them or humiliating them in front of their friends, to get them to behave. While 36% parents threatened their children with physical violence, 23% used threats of sending them away to a boarding school and 21% parents said they even threatened abandoning their children if they did not listen to them.
The study pointed out such disciplining techniques have adverse effects on the child.
“Sometimes, these methods may open up the child to dangers, such as keeping secrets from parents,” said Swati Popat Vats, president, Podar Education Network. “They will rebel and misbehave in school.”
Further, threatening children will also make them easy targets for child predators, Vats warned.
“Paedophiles use threats to ensure children do not report abuse. If parents also threaten kids at home, they will not be able to open up to them,” said Vats.
Another popular parenting style is bribing children with goodies and gadgets. Close to 60% parents bribed their children with toys or chocolates and 31% with gadgets. A few parents – 9% - used pocket money as an incentive.
Psychiatrists said the lack of time and low-tolerance levels forced parents to use these disciplining tools. “Parents need to find creative ways of disciplining children. Hitting, bribing, these are easy methods,” said Dr Harish Shetty, a senior psychiatrist at Dr LH Hiranandani Foundation Hospital, Powai.
Such punishments will have long-term consequences, experts said. “Any kind of violence on a child, be it a rap on the back or a slap across the face, is unacceptable,” said Dr Dayal Mirchandani, psychiatrist. “According to a western study, children who have experienced severe physical violence could end up with severe mental and physical illnesses in their adulthood.”
|
{
"pile_set_name": "Pile-CC"
}
|
Podcast Review: “The Right Time with Bomani Jones”
After a far too long hiatus The Right Time with Bomani Jones returns as a podcast that will post a couple of times a week according to the host. Bomani is a wickedly smart guy whose life experiences and cultural background could not be more different than my own and while his take may be one you’ve heard I suspect the path he guides you to that point will be different than other voices on ESPN.
Surprisingly Bomani didn’t mention his upcoming ESPN TV show with Pablo Torre, offer any updates on the status of that project or discuss his three-month hiatus.
Instead, he jumped right into the sports news, talking about the win by Villanova and had a bit of fun talking about the game’s star player whom he dubbed #whitedonte. Bomani shoved aside the developing controversy over the Twitter comments by the star, saying “I’m not getting mad at you for what you said at 14” And I have to agree that it is troubling pattern that as soon as someone gets a bit of spotlight people dig through their Twitter history seemingly in an effort to destroy them. Along with his show producer, Gabe, they went on to discuss how good life can be right now for Donte walking around campus today.
Bomani’s unique upbringing shined in his analysis of the Jim Mora’s comments on Josh Rosen that are burning up sports talk currently. While most of the talking heads I’ve heard are directly engaging the slight of “millennials,” Bomani moves beyond that generational “get off my lawn” talk into Rosen’s background and how that can play into certain biases saying, “He’s going to need to find a way to make people feel good about how smart he is.”
As is often the case with Bomani, various references led me to “Google it.” Today it was a current news item about RZA and the WuTang Clan (Bomani has an amazing knowledge of music history), Dave Chappelle’s “Racial Draft” skit and rediscovered Tiger Woods’ given name is Eldrick. I had to smile when he found that lower register close to the mic, and with a wink in his voice talked about the “out of the town” weekend and moments later compared Tiger Woods role in golf popularity to Bob Marley and reggae, “Not many who really like Reggae but love Bob Marley.”
But it was Bomani’s rants on self-driving cars and self-checkout that found me nodding my head in full agreement. These were found in a segment “If You Haven’t Heard”, three non-sports articles that were introduced by the journalists who wrote them.
With today’s podcast, I was very happy to see the return of his segment “Why I Quit Football.” Among today’s reports was Neil in El Paso who back in the sixth grade suited up, but after he got hit so hard his facemask got stuck under a chain length fence, he took off the gear and never went back. Neil figures the helmet is still there. Sometimes the stories are like this where kids discover the realities of the physical toll of football while other times it is older men realizing that the clock has expired on their time on the field.
Sometime in the next few weeks, ESPN is expected to premiere an afternoon show featuring Bomani Jones and Pablo Torre — a fascinating pairing: two highly educated, well-spoken individuals who are not afraid to demonstrate their broad knowledge base and expansive vocabulary. They definitely don’t reflect the barstool debate or average joe dialogue that dominated sports talk previously and hopefully will have a chance find their rhythm within the new show. Until then, I suspect that, along with this regular podcast, Bomani and Pablo will continue to pop-up on various ESPN programming such The Dan Le Batard Show with Stugotz and Around the Horn.
The Right Time with Bomani Jones is available on ESPN.com, iTunes, and other various podcast outlets.
|
{
"pile_set_name": "Pile-CC"
}
|
Acne cosmetica revisited: a case-control study shows a dose-dependent inverse association between overall cosmetic use and post-adolescent acne.
Case-control studies to support the concept of acne cosmetica are lacking. To examine the association of post-adolescent acne with the use of cosmetics and cosmetic procedures. 910 post-adolescent patients with acne and an equal number of matched controls were studied for exposure to cosmetics and cosmetic procedures. A cumulative cosmetic exposure index was stratified into four quarters of increasing exposure. Comparison of different cumulative exposure categories with the lowest exposure category (multivariate analysis, logistic regression) showed that the odds ratios, which were always <1, progressively declined as cosmetic exposure increased [odds ratios (95% confidence intervals): 0.679 (0.501-0.922), 0.355 (0.258-0.487), 0.307 (0.217-0.433)]. However, some individual cosmetics had odds ratios >1. Overall cosmetic use was negatively associated with post-adolescent acne. The term 'acne cosmetica' is appropriate in the sense that some cosmetics may cause acne.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Why does first version document show as minor version?
When I allow SharePoint 2013 to create major and minor versions, the first document uploaded shows up as a minor version. It has a decimal number instead of a whole number. Shouldn't it show up as a major version with a whole number?
However, when I only allow Major Versions, the document is uploaded as a Major Version.
Thanks for your help.
A:
No. When minor versioning is used, the initial upload will be .1 and will continue to increment upward until the file is Published as a major version. At that point, it will be 1.0.
This is the draft versioning and publishing type scenario where you work on a document and publish it when it is finished.
Major versioning only does just that, increments major version numbers on every change of the document, no matter how small or insignificant. The notion of going from a 1.0 to a 2.0 usually implies some significant change. In this case, you can quickly go from 1.0 to 7.0, by rephrasing something, then fixing a typo, then later altering metadata.
|
{
"pile_set_name": "StackExchange"
}
|
Intrauterine inflammation, cerebral oxygen consumption and susceptibility to early brain injury in very preterm newborns.
In utero exposure to inflammation results in elevated cerebral oxygen consumption. This increased metabolic demand may contribute to the association between chorioamnionitis and intraventricular haemorrhage (P/IVH). We hypothesised that intrauterine inflammation imposes an elevated cerebral metabolic load and increased fractional oxygen extraction (cFTOE) with cFTOE further increased in the presence of early P/IVH. Eighty-three infants ≤30 weeks gestation were recruited. Exposure to intrauterine inflammation was determined by placental histology. Total internal carotid blood flow (Doppler ultrasound) and near infrared spectroscopy were measured and cerebral oxygen delivery (mcerbDO2), consumption (mcerbVO2) and cFTOE were calculated on days 1 and 3 of life. Primary outcome was defined as death or P/IVH >grade II (cranial sonograph) by day 3. Infants exposed to intrauterine inflammation had higher total internal carotid blood flow (92 vs 63 mL/kg/min) and mcerbDO2 (13.7 vs 10.1 mL/kg/min) than those not exposed to inflammation. Newborns with P/IVH had both higher oxygen consumption and extraction compared with those without sonographic injury regardless of exposure to intrauterine inflammation. Further, in preterms exposed to inflammation, those with P/IVH had higher consumption (6.1 vs 4.8 mL/kg/min) and extraction than those without injury. These differences were observed only on day 1 of life. Although P/IVH is multifactorial in preterm newborns, it is likely that cerebral hypoxic-ischaemia plays a central pathophysiological role. These data provide a mechanistic insight into this process and suggests that the increased cerebral metabolic load imposed by the presence of inflammation results in a higher risk of critical hypoxic ischaemia in the preterm with increased susceptibility to significant P/IVH.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
00
Let b = 0.684822 - 0.686. What is b rounded to 4 dps?
-0.0012
Suppose -4*t + 4*u + 4 = 0, u = -u + 6. Suppose -12562622 + 115762622 = -t*m. Round m to the nearest 1000000.
-26000000
Let f be 1/9 + 294/27. Suppose -7*y - 12820 = -f*y - 5*h, y - 2*h = 3192. Round y to the nearest one thousand.
3000
Let u = -429 + 429.0002058. What is u rounded to five dps?
0.00021
Let k = 13.00000602 - 13. What is k rounded to 7 decimal places?
0.000006
Suppose 64*y - 180 = 59*y. What is y rounded to the nearest one hundred?
0
Suppose 8*r = 4*r. Suppose r = -o - o. Suppose -t = -3*l + 6 - 174, 2*t + 6 = o. What is l rounded to the nearest 10?
-60
Let b = 4 - 50. Let j = -46.068 - b. Round j to two dps.
-0.07
Let j = 10210449 + -10210250.99769. Let n = 198 - j. What is n rounded to 4 dps?
-0.0023
Let a(b) = 1772501*b**2 - b - 2. Let t be a(2). Round t to the nearest 1000000.
7000000
Let f = 0.239 + 300.861. Let x = 266 - f. What is x rounded to zero decimal places?
-35
Let q(m) = m**3 + 7*m**2 + 2. Let l be q(-7). Suppose -2*y + 4 = -l. Suppose -2*z = y*z + 1250000. What is z rounded to the nearest one hundred thousand?
-300000
Let v = 31 - 31.0000034. What is v rounded to five decimal places?
0
Let y = 145 + 28. What is y rounded to the nearest ten?
170
Let k(s) = 26*s**2 - 7*s - 65. Let o be k(-13). What is o rounded to the nearest one hundred?
4400
Let r = 1768.001021 - 1768. Round r to 4 dps.
0.001
Let n be 300*(-5)/(3*(-1)/125). Let l be n*(11/77 - (-173)/(-35)). What is l rounded to the nearest one million?
0
Let i = 27.960375 - -0.048825. Let f = -0.07 + 28.07. Let m = i - f. Round m to 3 dps.
0.009
Let d = -5760.8172 - -5758.31719816. Let s = d - -2.5. Round s to 7 decimal places.
-0.0000018
Let s = -21 - -18.3. Let o = 17.7 + s. Let p = -14.999992 + o. Round p to five decimal places.
0.00001
Let g = -0.5739 - -0.573896249. Round g to seven dps.
-0.0000038
Let u = -377 + 423. Round u to the nearest one hundred.
0
Suppose -3*r = -2*r + 5*c + 29, r + 4*c + 24 = 0. Let l be 102000 + ((-8)/r - 2). Round l to the nearest 10000.
100000
Let h = 68.745 + -68.8. What is h rounded to 3 dps?
-0.055
Let m(l) = -l + 4 + 85*l**3 + 5*l**2 + 9*l**2 - 15*l**2 + 3*l**2. Let w be m(-4). What is w rounded to the nearest 1000?
-5000
Let t = 34.12 - 35. Let a = 7449.1139 + -7450. Let i = a - t. What is i rounded to 3 decimal places?
-0.006
Let o = -28327 - -60543. Suppose -c + 5*w = -150809 - o, c - 4*w = 183020. Round c to the nearest ten thousand.
180000
Let c = -45.5 - -65. Let p = -2.5 + c. Let a = p + -22.5. What is a rounded to 0 decimal places?
-6
Let g be ((2 - 1) + -1)*17/34. Let b(k) = -k**2 + 447. Let d be b(0). Suppose -h + 5*l - 94 = g, -d = 5*h - 3*l + l. Round h to the nearest ten.
-90
Let q = -2738 + 2738.0000005686. What is q rounded to seven decimal places?
0.0000006
Let l = -0.05 + 16.55. Let k = 7 + 14. Let n = k - l. Round n to 0 decimal places.
5
Let j = 66 + -123. Let o = 180 + j. Let y = -123.00051 + o. What is y rounded to 4 dps?
-0.0005
Let z be 5480004 - (-12 + 0)/(-3). What is z rounded to the nearest one million?
5000000
Let v = 24914839971.29 - 25103372341. Let p = v - -188532279.70999839. Let r = p - -90. Round r to seven decimal places.
-0.0000016
Let i = 3422 - 3421.99997867. Round i to six dps.
0.000021
Suppose 2*j + b + 0*b = 15, 0 = -5*j + 2*b + 24. Suppose -j*s = -7*s - 5. Round s to the nearest ten.
-10
Let l = -10.10000273 - -10.1. What is l rounded to six dps?
-0.000003
Suppose 144*q - 134*q = -1414000. What is q rounded to the nearest 100000?
-100000
Let t = 65.000000222 - 65. Round t to 7 dps.
0.0000002
Suppose -f = 2*x - 83 + 20, -3*x + 97 = 4*f. Round x to the nearest one hundred.
0
Let v = -296971851 - -296971849.02265541. Let j = v - -34.97730919. Let o = j + -33. What is o rounded to six dps?
-0.000035
Suppose 1260701 = -42*f - 12767299. Round f to the nearest 10000.
-330000
Let l = 1672 - 459. Let q = 1767 - l. Round q to the nearest 100.
600
Let k = 0.7054 - 0.0573. What is k rounded to 2 dps?
0.65
Let m = 41813756 - 41813734.19999546. Let b = 21.8 - m. What is b rounded to 7 decimal places?
-0.0000045
Let h = 702.77 - 706. Let p = h - -3.409. What is p rounded to 2 dps?
0.18
Let c = 0.4716 - 0.2442. Let o = -0.117 + c. Let g = o + -0.1. Round g to 3 decimal places.
0.01
Let m = 3.9 - 2.4. Let y = m + -1.4956. What is y rounded to three decimal places?
0.004
Let n = -8898 - -16807. Round n to the nearest 100.
7900
Suppose 0*q + q = -5, 3*q = 4*w - 2079. Suppose -274 = -p + l - 10, -l = 2*p - w. Round p to the nearest 100.
300
Let n = -0.01237 + -319.18963. Let i = n - -320. Round i to 2 decimal places.
0.8
Let j = 24.3 + 41.9. Let k = j + -56. Round k to zero dps.
10
Let y(t) = 832*t**3 - 8*t**2 - 2*t - 12. Let l be y(6). Round l to the nearest 10000.
180000
Let w be (-2)/((-3)/(-4) + 3025363/(-4033828)). Let g = w + 1734457. What is g rounded to the nearest one hundred thousand?
700000
Let h = 32.4 - 59.2. Round h to the nearest ten.
-30
Suppose -5*n - 92 = -7. Let p = -15 - n. Suppose -5*i + p*m + 11504 = 0, -9196 = -5*i + i - 2*m. Round i to the nearest one thousand.
2000
Let f be (-1202550)/(-125) - (-2)/(-5). Round f to the nearest 100.
9600
Let n = -465.13 + -43.47. Round n to the nearest 10.
-510
Let b = -1288 - -1286.7. Round b to the nearest integer.
-1
Let v = 5.2 + 26.6. Round v to the nearest 10.
30
Suppose 5*l = -3*k - 10039430 - 64360567, 4*l + 4*k = -59519996. Round l to the nearest 1000000.
-15000000
Let i = 992 - 991.482. What is i rounded to 2 dps?
0.52
Let g = -112454163.23753 - -112445439.3. Let f = 8724 + g. Let v = 0.063 - f. Round v to 4 decimal places.
0.0005
Let w = -0.083196 + 0.085. Round w to 4 dps.
0.0018
Let q = 27 - 106. Let b = 297 - q. What is b rounded to the nearest ten?
380
Let a = -8.07 - -8. Let o = -0.1 - a. Let n = -2.31 - o. Round n to 1 decimal place.
-2.3
Let i = -38.54 + 0.54. Let l = -37.9999995 - i. Round l to six dps.
0.000001
Suppose -y = -179922 + 1366309. Let j be y - (-1 - 1)*-1. Let w = -2076389 - j. What is w rounded to the nearest one hundred thousand?
-900000
Let v(b) = b**2 + 9748*b**3 + 23253*b**3 + 0*b**2. Let z be v(-1). Round z to the nearest 10000.
-30000
Suppose -2*w - g - 16 = 0, 2*w + 2*w = -3*g - 36. Let o = w - -10. Suppose -5*p + 471 = -f - 234, -2748 = o*f + 4*p. Round f to the nearest 100.
-700
Let s = 57 - 164. Let j = -107.047 - s. What is j rounded to 2 dps?
-0.05
Let l = -6.9 + 7. Let i = 0.15 + -0.09. Let m = l + i. Round m to one decimal place.
0.2
Suppose -31 + 11 = -4*v. Suppose -2*q = -v*q. Suppose -4*l + 54400016 = 4*f, -2*l + q*l = -3*f - 27199988. Round l to the nearest 1000000.
14000000
Let z = 300741 - 300735.39988. Let l = z + -5.6. What is l rounded to 4 dps?
0.0001
Let o = -2605.9995658 - -2606. Round o to four decimal places.
0.0004
Let q = 27 - 19. Let z = -11.1 + q. Round z to the nearest integer.
-3
Let p = -5.39297 - 20.61613. Let a = -26 - p. What is a rounded to 3 decimal places?
0.009
Let f = 404435.67 + -398622. Let u = f - 5879. Let r = u - -68. What is r rounded to one decimal place?
2.7
Suppose -d - d = -6012. Suppose -2*b = -3*z - 6026, z - 3*z + d = b. Suppose -4*o = 2*h + h + 6034, 0 = 2*o + 5*h + b. Round o to the nearest one hundred.
-1500
Let r = -152.22 + 271.05. What is r rounded to the nearest ten?
120
Suppose 0 + 5 = j. Suppose 29274 = j*n + 99274. What is n rounded to the nearest ten thousand?
-10000
Suppose 5*i + 5*s = 20, i - s = s + 4. Suppose -2*o - 3*l + 2*l + 999 = 0, 3*l + 2003 = i*o. What is o rounded to the nearest one thousand?
1000
Let f = 2620432.69 - 2632656. Let y = f - -12066. Let u = 158 + y. What is u rounded to 1 decimal place?
0.7
Let a = -2.32 + 2. Let n = a - -0.354. Let o = n - 0.04. What is o rounded to three decimal places?
-0.006
Let z = -12.104 - -12.6. Let u = z - 0.4959639. Round u to six dps.
0.000036
Let x = -5508 + 5452.29. Round x to the nearest ten.
-60
Let w = 769.97906 + -770. Round w to three decimal places.
-0.021
Let a = 1767 + 13648. Round a to the nearest 1000.
15000
Let i = -29 + 4. Let p = i - -26.57. Round p to one dp.
1.6
Let p = 3.81 + -3.7265. Round p to two dps.
0.08
Let q = 537 - 536.9341. What is q rounded to 2 dps?
0.07
Let q = 3.1 + -157.1. Let w = 17260815724 - 1
|
{
"pile_set_name": "DM Mathematics"
}
|
Pages
Letter from Birmingham Jail
Letter from Birmingham Jail an Analysis
From a jail cell in Alabama we get a clear look into the philosophy and mindset of Martin Luther King Jr. Mr. King was jailed in the Birmingham city jail for participating in a non violent protest in Birmingham, Alabama. He believed that through non violent protest he could create enough pressure and tension throughout the communities, that they would be more willing to negotiate real change, in regards to racial equality in the 1960's.
As you may know, Martin Luther King Jr. was killed on the balcony of the Lorraine Motel, in Memphis, Tennessee on April 4, 1968, by James Earl Ray.
You may not know that there was a wrongful death suit that suggested that others might have been involved.
Martin Luther King Jr. was born In Atlanta, Georgia on January 15th, 1929. Martin Luther King Jr.'s father, Martin Luther King, Sr. was a Baptist Minister that supported racial equality in the 20th century. It is no doubt that Martin Luther King Jr.'s father would have a major impact on his son. Martin Luther King Jr. would go on to arguably have the biggest impact on civil rights and racial equality than any other man. Along with Martin Luther King Jr.'s father, Mr. King was also influenced by Gandhi, especially in regards to Gandhi's effective use of passive resistance.
Martin Luther King Jr.'s letter from his Alabama jail cell is partially directed toward community leaders that are criticizing his tactics. Although the letter is primarily directed as a rebuttal to that criticism, his letter holds deeper truths overall. The criticism consists of believing that Mr. King should allow the courts or justice system to get the desired change and that Mr. King is an agitator or extremist.
In his Letter from Birmingham Jail you can see that Mr. King is not affected by people with bad or evil intent. He has no expectations of those that have bad intentions; to him they are what they are. Mr. King's frustration is with people that seem good, but are unwilling to challenge the status quo.
His Letter from Birmingham Jail illustrates this indignation towards those that suggest, we should be patient, or give more time for things to change. In other words, passively do nothing and hope for the best. Mr. King rejects this notion-
In his Letter from Birmingham Jail, Mr. King talks about how time is neutral. Time can be used for good or bad, but the rationale or reasoning, that the simple passing of time can effect change is an erroneous conclusion. In fact he believed that bad people used time much more effectively than good people simply doing nothing, hoping for the best.
In my opinion, Mr. King believes that if you just wait it out and do nothing you are literally worse than people of ill intent. Time marches on for them and they march with it. You are not doing anything by sitting on your hands; but just giving evil the carte blanche to do as it wishes, with all the time it needs to accomplish it. Time goes in favor of those unwilling to change, or in other words, if you do nothing, that is going to be the results:nothing or worse.
Mr. King believes that not only will we all have to someday acknowledge the things we have actually done wrong but also acknowledge that we kept silent or did nothing about injustice, as well.
Martin Luther King Jr. Answers His Critics
Martin Luther King Jr. was called an extremist by his detractors and by people that should have supported him. At first, Mr. King was dismayed and disappointed at being called an extremist. Afterward, Mr. King realized that many people throughout history have been labeled extreme, when fighting for justice or a good cause. Mr. King cites many people from history that were called extreme, yet are counted as some of the most important people in history. He concludes that there are two types of extremists; extremists for good and extremists that attempt to preserve that which is wrong in the world.
|
{
"pile_set_name": "Pile-CC"
}
|
In a movement that is as much political as it is religious, China’s Uighurs, a Muslim community of about 10 million (0.8 percent of China’s population), have been agitating for an independent nation for decades. All too often, that has involved the use of terrorist violence that’s barely distinguishable from that committed by the Uighurs’ extremist brethren in Afghanistan, Iraq, Syria, Chechnya, and so on.
Here‘s the latest example:
Fifteen people were killed when a group threw explosives into a crowded street where vendors were selling food in China’s restive region of Xinjiang, the official Xinhua news agency said on Saturday. Eleven were attackers who were killed by the police, the agency said, and 14 people were injured. The attackers also stabbed people in Friday’s attack in Shache County, state-owned Xinjiang news website Tianshan News said. It said police found detonation devices, large knives and axes at the scene. Deadly attacks in the north-western region in recent years have left hundreds dead. The government has mostly blamed attacks on ethnic Uighur separatists, who it says want to form an independent country called East Turkestan.
Heavy restrictions on journalists in Xinjiang have made verifying details about such incidents difficult. Knife-wielding attackers killed 38 people in an incident in Shache County in July. A local court sentenced 12 of the attackers to death in October. China has tightened its controls over the region as unrest grows. On Friday, the Xinjiang People’s Congress passed a regulation banning people from wearing or forcing others to wear logos or clothes associated with religious extremism, state-backed newspaper China Daily reported on Saturday.
Vital caveat: It’s hard to know the exact extent and scale of Uighur violence, and even harder to know the possible provocations that preceded it (not that there can be any excuse for the indiscriminate mass murder of innocents). The Chinese government is not only a known suppressor of religious freedom, including the Uighurs’, but also controls the Uighur narrative in almost obsessive fashion.
Then again, it’s somewhere between plausible and confirmed that in 2014 alone, Uighur separatists have carried out a number of horrifically violent operations. Wikipedia supplies this list:
– On 1 March 2014, a group of knife-wielding assailants attacked people at the Kunming Railway Station killing at least 29 and injuring 130 others… – On 30 April 2014, two attackers stabbed people before detonating their suicide vests at an Ürümqi train station. Three people, including the two attackers, were killed. – On 22 May 2014, twin suicide car bombings occurred after the occupants had thrown multiple explosives out of their vehicles at an Ürümqi street market. The attacks killed 31 people. … – On 28 July, 2014, … Chinese state media Xinhua said 37 civilians were killed by a gang armed with knives and axes in Xinjiang, with 59 attackers killed by security forces. … The incident is disputed as the Uyghur American Association (UAA) said that local Uyghurs had been protesting at the time of the attack. – On 30 July 2014, the imam of China’s largest mosque, Jume Tahir, in the city of Kashgar in Xinjiang, died after reportedly being stabbed after morning prayers for his reported pro-Beijing stance. – On September 21, 2014, Chinese state media Xinhua reported a series of bomb blasts killed in total 50 people in Luntai County, southwest of the regional capital, Ürümqi. … – On October 12, 2014, four ethnic minority Uyghur men armed with knives and explosives attacked a farmers’ market in northwestern China’s Xinjiang region, which according to police, left 22 people dead — including police officers and the attackers themselves.
The string of attacks will do nothing to dispel the notion that Islam is anything but a religion of peace.
|
{
"pile_set_name": "OpenWebText2"
}
|
The effect of electron correlation on the adsorption of hydrogen fluoride and water on magnesium fluoride surfaces.
We have performed periodic density functional and periodic local MP2 calculations for the adsorption of hydrogen fluoride and water on the four low index surfaces (001), (100), (101) and (110) of magnesium fluoride. While the adsorption of HF is described well using B3LYP, MP2 is required for a good description of the adsorption of H2O. Post-optimization dispersion corrections of B3LYP are found to consistently overestimate the adsorption energy. The coordination of surface cations, the presence of hydroxyls on the surface, as well as the coverage appear to play an equally important role in the adsorption.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
Seeing all store categories under my Appixia BasicCategoryListActivity instead of only primary categories
I added the BasicCategoryListActivity module to my mobile app in order to show my store categories.
I'm trying to create a tab for category navigation through my store: show primary categories and only when they are tapped on, show the subcategories.
Instead, what I got is a very long list of the categories in my store - both primary, subcategories, everything... How do I hide all the categories I don't want from the list?
A:
By default, the categories that are displayed in the list are unfiltered. This means that every category in the store should show up - so this is behaving as it should.
What you probably want to add is a filter to the category list.
Add a filter using the Filter property of the category list. If you only want the root categories (your primary store categories), a filter on the category ParentId is probably the most appropriate. Use the root category id as the value for this filter. If you're unsure what your root category id is, just leave it empty.
|
{
"pile_set_name": "StackExchange"
}
|
Messias José Baptista
Messias José Baptista (24 May 1968 – 11 September 2005) was a Brazilian athlete. He competed in the men's triple jump at the 1996 Summer Olympics. He died from complications of leukemia aged 37.
References
Category:1968 births
Category:2005 deaths
Category:Athletes (track and field) at the 1996 Summer Olympics
Category:Brazilian male triple jumpers
Category:Olympic athletes of Brazil
Category:Place of birth missing
Category:Deaths from leukemia
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Ian Kinsler only spent four seasons with the Detroit Tigers, but he felt like a native son from day one. His quiet, “f*** you” attitude on the field is as Detroit as it gets, and he was a hard-nosed player who gave his all in a Tigers uniform — including that time he was bleeding all over the place. He played Stevie Wonder’s “Superstition” as his walk-up song, just because. He and Detroit native Jack White are BFFs, and now make baseball bats together.
And now the Tigers are interested in a reunion with the 36-year-old second baseman. A reun-Ian, if you will.
The Tigers aren’t the only club interested in Kinsler’s services. According to MLB Network’s Jon Morosi, the Milwaukee Brewers, Oakland Athletics, and Washington Nationals have all checked in on Kinsler’s availability at the Winter Meetings. All three teams need a second baseman this winter, and Kinsler is one of several options available on the free agent market. Morosi notes that D.J. LeMahieu is one of the bigger fish out there, and a certain former All-Star shortstop might consider switching positions in the right situation.
In other words, get your grubby hands off our Kinsler, other teams.
Even if you ignore all of the feels we would get from seeing Kinsler don a Tigers uniform again, this would be a good fit for both parties. Kinsler is entering his age-37 season, and has clearly taken a couple steps back from his lengthy and productive prime. He hit just .240/.301/.380 in 534 plate appearances last season, and produced a horrible 64 OPS+ in 37 games with the Boston Red Sox. He is now two years removed from his last above-average season at the plate, and has declined as a baserunner as well (despite 30 steals in 42 attempts). A team looking to contend probably shouldn’t bet the farm on a 37-year-old suddenly bouncing back at the plate.
The Tigers, on the other hand, could use Kinsler’s veteran savvy and defensive prowess. He bounced back defensively after a down year in 2017, and posted +10 Defensive Runs Saved (DRS) last year. That total was tied for the American League lead at second base — only LeMahieu finished with more across baseball — and resulted in Kinsler’s second career Gold Glove. Ultimate Zone Rating (UZR) also thought he was better; his +9.7 UZR in 2018 was his best total since 2011.
Both sides would also benefit from a one-year deal. Sure, Kinsler might like to get paid for seasons beyond 2019, but his declining on-field production might not warrant such a contract. The Tigers have several interesting players that could potentially take over at second base in the future, including teenage sensation Isaac Paredes and 2018 third round pick Kody Clemens. Dawel Lugo is also in the mix, but is coming off a down year at Triple-A Toledo.
And while Niko Goodrum likely isn’t a future starter at second, he spent plenty of time there in 2018, and could spell Kinsler with regularity in order to keep him fresh throughout the season. Kinsler could also benefit from Detroit’s newly vacant designated hitter spot, in case he does somehow rediscover his stroke at the plate.
Is there a downside here?
Not really, if you’re the Tigers. Sure, they could stand to spend a bit more on an actual solution at the position — we like LeMahieu just fine, thank you — and force one of the young prospects to actually win the job down the line. However, since it seems unlikely that the Tigers will spend that kind of coin this winter, someone like LeMahieu, Jed Lowrie, or Marwin Gonzalez may not be in the cards. Enter Kinsler, who will likely be had for a relatively cheap one-year contract.
As for Kinsler? It kind of depends on what his priorities are in 2019 and beyond. He finally won a championship in 2018, and may be content with returning to Detroit for one last hurrah before riding off into the sunset. Getting a chance to hang out with former teammates, Jack White, and whoever else he made friends with in his four years in Detroit could be more appealing than getting accustomed to a new city and clubhouse — even if that new home offers him a chance at more championship glory.
Either way, please make this happen, Tigers.
|
{
"pile_set_name": "OpenWebText2"
}
|
// @flow
import { ReactComponentStyled } from "styled-components";
type ImageObject = {|
"*"?: string,
jpg?: string,
webp?: string,
|};
export type Props = {|
placeholder?: ImageObject,
original: ImageObject,
name: string,
|};
export type PictureProps = {|
pictures: ImageObject,
name: string,
loaded: boolean,
onLoad?: () => void,
lowRes?: boolean,
|};
declare export default React$ComponentType<Props>;
declare export var StyledLazyImage: ReactComponentStyled<any>;
|
{
"pile_set_name": "Github"
}
|
#ubuntu-design 2012-01-16
<dholbach> good morning
<bkerensa> sladen: Any chance of seeing a Ubuntu 125x125 web badge with the latest design guidelines?
<MrChrisDruif> A 125x125 web badge with the "latest" design guidelines? Where can I find those guidelines bkerensa ?
<MrChrisDruif> Do you mean the COF with that web badge btw?
<bkerensa> MrChrisDruif: http://design.canonical.com/the-toolkit/ubuntu-brand-guidelines/ and yeah just a badge so bloggers and contributors can advocate on their blog for Ubuntu.... I have a Mozilla badge for instance
<MrChrisDruif> Have they changed recently?
<MrChrisDruif> Something like twibbon for adding to someone's avatar?
<bkerensa> well the only one I could find was on Spreadubuntu and it uses the old logo
<MrChrisDruif> I've used something like twibbon to add the COF to my avatar on facebook
<bkerensa> nice
<MrChrisDruif> So it's already out there, but not always as user-friendly as you'd want
<bkerensa> But that is for avatars and not mean as a 125x125 web badge for blogs
<bkerensa> http://affiliates-cdn.mozilla.org/media/uploads/banners/download_beta_small.png
<bkerensa> thats what I mean something inviting
<MrChrisDruif> bkerensa; can't you use this svg to make a 125x125 png? http://en.wikipedia.org/wiki/File:UbuntuCoF.svg
<czajkowski> wendar: we're going to be busy on panels at fosdem
<sladen> bkerensa: could you clarify, a pre-rendered PNG @ 125x125 and do you want CoF, or Word mark, or just the text?
<sladen> bkerensa: or a banner
<czajkowski> sladen: you coming to FOSDEM ?
<bkerensa> sladen: I was think a banner with the wordmark and some sort of text that said maybe Try Ubuntu today or something
<sladen> bkerensa: so more like a blog advert banner etc
<MrChrisDruif> Ah, a bit like that firefox icon you showed yesterday?
<bkerensa> sladen: Yeah like Mozzilla pushes for their FOSS products
* bkerensa would rather advertise FOSS then actually sell products on his blog for instance
<sladen> bkerensa: http://launchpad.net/ubuntu-branding/+filebug?field.title=Wishlist:+advert+banners+for+blogs+in+standard+sizes
<sladen> bkerensa: and list the sizes that you're after, and what you'd like to see in them (if there are standards for these, can you link to them too)
<bkerensa> k
#ubuntu-design 2012-01-17
<wendar> czajkowski: yup, FOSDEM is shaping up nicely (I'm at Linux.conf.au this week, just got network access to catch up)
<dholbach> good morning
<czajkowski> wendar: busy !
<om26er> oh co'mon
#ubuntu-design 2012-01-18
<dholbach> good morning
<doctormon> hey everyone
<doctormon> Our weekly meeting will start in 8 mins
<doctormon> OK time to start
<doctormon> does anyone have any questios before I go into our progress?
<doctormon> ok great
<doctormon> So this week wendar is at SCALE and can't join us.
<doctormon> There haven't been any further requests for design help from any projects this week
<doctormon> There haven't been any requests for production help either.
<doctormon> The work items on https://blueprints.launchpad.net/ubuntu/+spec/community-p-ux-participation are going well.
<doctormon> Does anyone have anything to add?
<doctormon> Okay then, thanks to everyone for coming and I'll see you all next week.
<doctormon> Remember to email or message here in IRC if you have any requests or ideas.
#ubuntu-design 2012-01-19
<dholbach> good morning
<om26er> swilson, Hey! about the wallpaper changing on the login screen, as the selected username changes, someone made an interesting point
<om26er> "Don't they have some sorta privacy problem with this? Like, if teenage boy wants to have nekkid lady wallpapers, maybe he don't want it to come up on family computer... Dunno, maybe it's not an issue?"
<swilson> hi there! yes, i believe that a bug has been created which raises this same issue - about embarrassing or confidentiality issues with this
<swilson> this seems to be a bit of an edge case, but it may be significant enough to warrant giving some careful thought
<imnichol> Or if you have bank info on your screen before it's locked
#ubuntu-design 2012-01-20
<doctormon> pleia2: https://bugs.launchpad.net/spreadubuntu/+bug/919197
<webbugs> Launchpad bug 919197 in SpreadUbuntu "New Category Needed 'Banners'" [Undecided,New]
<pleia2> doctormon: yay!
<pleia2> I'll send an email to the web guy who usually runs things when I have a chance (am at SCALE10x this weekend, and muy busy)
<doctormon> pleia2: awesome, thanks
<mcbaine1> Hi there ::: I'm really excited about going to FOSDEM ... I put an advert in the national newspaper to see if anyone else is going and to get in touch etc... Anybody available for abit of travelling / FLOSS advice here atmo. ??
<mcbaine1> http://goo.gl/6knuF
#ubuntu-design 2012-01-21
<doctormon> mcbaine1: Hello
<mcbaine1> yeah.. just realized that I uninstalled compix
<mcbaine1> **compiz
<mcbaine1> can someone ask :::: "Is the desktop on the bottom ??"...please
<doctormon> mcbaine1: I don't understand your question.
<mcbaine1> it's irrelevant to U.
<doctormon> mcbaine1: I see, is it relevant to anyone here?
#ubuntu-design 2013-01-14
<coalwater> hello, there's this tool i usually see on omgubuntu, they create wireframes for mockups and stuff, what's the tool used for that ?
<xnox> coalwater: pencil, balsamiq, lucidcharts, dia...
<xnox> inkscape =)
<coalwater> xnox: ill check those, ty
<PaoloRotolo> Hi all!
<MrChrisDruif> Hi PaoloRotolo!
<coalwater> MrChrisDruif everywhere :P
<MrChrisDruif> Nah, not everywhere.
<coalwater> MrChrisDruif: at least every where i go to, even my gtalk lol
<coalwater> not complaining though
<MrChrisDruif> =)
#ubuntu-design 2013-01-15
<PaoloRotolo> Hi all!
#ubuntu-design 2013-01-16
<mpt> Is there a "download" icon in the icon theme? I guess there must be.
<mpt> Can't find it, though.
<xnox> mpt: down pointing green arrow, let me find it for you.
<mpt> thanks
<mpt> Dear Gimp, showing/hiding a layer is not the type of action that should go into the undo/redo stack
<xnox> find /usr/share/icons/ -name '*download*'
<xnox> gives me: /usr/share/icons/Humanity/actions/48/browser-download.svg
<xnox> /usr/share/icons/gnome/scalable/places/folder-download-symbolic.svg
<xnox> (which is a fancy dotted down arrow)
<davidcalle> mpt, hi, I see you have trouble finding icons : do you know about https://launchpad.net/icon-library ?
<mpt> davidcalle, I did not!
<davidcalle> mpt, it's fantastic. You just need to download it and run the icon-library.py file
<davidcalle> life changer :)
<mpt> Sweet!
<mpt> ...And no, there doesn't seem to be a plain download icon. There's browser-download, cluttered with a disk.
<mpt> I guess that's the closest.
<xnox> mpt: /usr/share/icons/gnome/48x48/emblems/emblem-downloads.png here is one cluttered with progress-bar
<mpt> yeah :-)
<xnox> /usr/share/icons/unity-icon-theme/places/svg/group-downloads.svg is a generic one, cluttered with a circle and it's not green
<mpt> Is there ever a good time to include a progress bar in an icon?
<xnox> /usr/share/icons/gnome/scalable/places/folder-download-symbolic.svg or dots?! =)
<mpt> As opposed to overlaying a genuine progress bar over top of the icon.
<xnox> mpt: well it's a clear indication that progress bars lie to you and huge downloads usually stall anyway and one never gets what one wants? =)))))
* mpt wonders if "It's just a string change!" is the UI equivalent of "It's just a flesh wound!"
<mpt> When I insert an audio CD, I get a dialog, "You have just inserted an audio CD. Choose what application to launch."
<mpt> The default option is "Ask what to do", but it's ALREADY DONE THAT
<xnox> so the drop down default should be moved further down to "Lauch Music Player Rhythmbox"?
<xnox> yeah that option doesn't make sense. cause i want to keep it asking what to do & offer what to do _now_ at the same time.
<PaoloRotolo> Hi all!
#ubuntu-design 2013-01-17
<mpt> Hi snwh!!!
<mpt> LOUD NOISES
<mpt> Oh dear, what did I do
<snwh> mpt, what did you do?
<mpt> snwh, you complained how quiet #ubuntu-design was, so I said "Hi snwh!!!" and "LOUD NOISES" and you dropped off IRC immediately
<snwh> mpt, oh. I wasn't complaining, it was just an observation. :) -and skype had crashed by computer :/
<mpt> You make a valid point, though, we should do more here
<snwh> "Topic for #ubuntu-design set by wendar at Fri Dec 16 12:02:30 2011"
<snwh> 2011 lol
<mpt> Right now I'm designing the fix for bug 1033226
<ubot5> bug 1033226 in update-manager (Ubuntu) "No close option, only restart" [Medium,In progress] https://launchpad.net/bugs/1033226
<snwh> I've been getting feedback from gnome designer regarding an icon I did for dconf-editor (https://dl.dropbox.com/u/7027392/dconf-editor.svg)
<mpt> A consummate V
<snwh> ?
<snwh> /me googled
<mpt> http://www.homestarrunner.com/sbemail58.html
<snwh> i was thinking consummate as in marriage night
<snwh> I'm still confused.
<mpt> "And then, using consummate Vs, give him teeth, spinities, and angry eyebrows."
<mpt> Anyway, the point is that that checkmark looks a bit more like a V than a checkmark. :-)
<mpt> Moving it to the left would fix that.
<snwh> there's an "unmagnified" that's outside the glass too that is unseen on white
<snwh> and I did have a smaller 'v' in an older version: http://dl.dropbox.com/u/7027392/dconf-editor-alt.svg
<snwh> mpt, since you're working on it :P - I've just noticed that the tabs are bit close to the "Techinical Description" https://dl.dropbox.com/u/7027392/updater.png
<mpt> snwh, true, I want to merge those tabs into a single field
<mpt> but I'd better discuss that with mterry
<snwh> I also thought that it doesn't expand very much either -the treeview especially for a long list
<mpt> ugh, yeah, expanders are busted in GTK generally
<mpt> By default it's supposed to be "tall enough to show six items in the list, with a minimum height of three items"
<mpt> https://wiki.ubuntu.com/SoftwareUpdates#expanded
<mpt> But then it doesn't resize properly when you collapse it, so you resize it manually, then when you expand it it tries to obey that manual sizing, etc
<snwh> Oh GTK
<snwh> speaking of GTK, do you know (or know of someone who can tell me) how the breadcrumbs a la GCC are done? we want to emulate them in unity tweak tool.
<mpt> GCC has breadcrumbs?
<mpt> oh I see
<snwh> the All Settings > Whatever
<mpt> snwh, <https://code.launchpad.net/~software-store-developers/software-center/4.0> has better ones, with interlocking buttons
<mpt> (we dropped them altogether in 5.0)
<snwh> cool, cause right now we have duplication with the toolbar and overview layout https://dl.dropbox.com/u/7027392/utt.png
<mpt> If you have just that many panels, you don't need those toolbar buttons at all
<mpt> And if you have only two levels of hierarchy -- the table of contents + the individual panels -- you don't need breadcrumbs either
<mpt> snwh, you could have something like the navigation mocked up in <https://wiki.ubuntu.com/SoftwareAndUpdatesSettings?action=AttachFile&do=view&target=drivers-settings.mockup.png> instead.
<snwh> mpt, the All Settings button, just being a button to the front page?
#ubuntu-design 2013-01-18
<mpt> snwh, yes ... I've wondered whether it should have a home icon as well as a label
<mpt> Currently designing fixes for bug 165065 and <https://blueprints.launchpad.net/ubuntu/+spec/foundations-r-uefi-fastboot-ui>
<ubot5> bug 165065 in gnome-session (Ubuntu) "[wishlist] Ubuntu reboot into other OS" [Wishlist,Triaged] https://launchpad.net/bugs/165065
* xnox got totally confused when I got update email, since there are _two_ fastboots.
<xnox> one is UEFI as above, another is a clashing name of android utility to flash android devices (e.g. nexus7) which is also called fastboot.....
<mpt> Done: https://wiki.ubuntu.com/SessionHandling#Restart
<xnox> mpt: amazing =) pinged slangasek about it.
<xnox> we are not sure fastboot machines are available on the market yet =)
#ubuntu-design 2015-01-13
<Guest34> johnlea_ping
#ubuntu-design 2016-01-18
<mpt> âLock the screenâ is a weird synecdoche
|
{
"pile_set_name": "Ubuntu IRC"
}
|
Q:
SQL query to return a grouped result as a single row
If I have a jobs table like:
|id|created_at |status |
----------------------------
|1 |01-01-2015 |error |
|2 |01-01-2015 |complete |
|3 |01-01-2015 |error |
|4 |01-02-2015 |complete |
|5 |01-02-2015 |complete |
|6 |01-03-2015 |error |
|7 |01-03-2015 |on hold |
|8 |01-03-2015 |complete |
I want a query that will group them by date and count the occurrence of each status and the total status for that date.
SELECT created_at status, count(status), created_at
FROM jobs
GROUP BY created_at, status;
Which gives me
|created_at |status |count|
-------------------------------
|01-01-2015 |error |2
|01-01-2015 |complete |1
|01-02-2015 |complete |2
|01-03-2015 |error |1
|01-03-2015 |on hold |1
|01-03-2015 |complete |1
I would like to now condense this down to a single row per created_at unique date with some sort of multi column layout for each status. One constraint is that status is any one of 5 possible words but each date might not have one of every status. Also I would like a total of all statuses for each day. So desired results would look like:
|date |total |errors|completed|on_hold|
----------------------------------------------
|01-01-2015 |3 |2 |1 |null
|01-02-2015 |2 |null |2 |null
|01-03-2015 |3 |1 |1 |1
the columns could be built dynamically from something like
SELECT DISTINCT status FROM jobs;
with a null result for any day that doesn't contain any of that type of status. I am no SQL expert but am trying to do this in a DB view so that I don't have to bog down doing multiple queries in Rails.
I am using Postresql but would like to try to keep it straight SQL. I have tried to understand aggregate function enough to use some other tools but not succeeding.
A:
The following should work in any RDBMS:
SELECT created_at, count(status) AS total,
sum(case when status = 'error' then 1 end) as errors,
sum(case when status = 'complete' then 1 end) as completed,
sum(case when status = 'on hold' then 1 end) as on_hold
FROM jobs
GROUP BY created_at;
The query uses conditional aggregation so as to pivot grouped data. It assumes that status values are known before-hand. If you have additional cases of status values, just add the corresponding sum(case ... expression.
Demo here
|
{
"pile_set_name": "StackExchange"
}
|
cheats = 6
cheat0_desc = "Infinite Lives - Player 1"
cheat0_code = "00C0-6705"
cheat0_enable = false
cheat1_desc = "Infinite Lives - Player 2"
cheat1_code = "00C0-6805"
cheat1_enable = false
cheat2_desc = "Final Round [51]"
cheat2_code = "00C0-4C32+00C0-4D33"
cheat2_enable = false
cheat3_desc = "Collect one dot to finish a Round"
cheat3_code = "00CD-0F01"
cheat3_enable = false
cheat4_desc = "Final Round (51)"
cheat4_code = "00C0-4C32+00C0-4D33"
cheat4_enable = false
cheat5_desc = "Infinite Lives"
cheat5_code = "00B-BCA-3BE"
cheat5_enable = false
|
{
"pile_set_name": "Github"
}
|
Can I put my girlfriend on my health insurance if she lives with me? Or do we have to be married? Can I put my girlfriend on my health insurance if she lives with me? Or do we have to be married? ANSWER: I suggest you to visit this internet site where one can compare… Continue reading Can I put my girlfriend on my health insurance if she lives with me? Or do we have to be married?
|
{
"pile_set_name": "OpenWebText2"
}
|
*Funding information*
No funding
Presented to the 99th meeting of the Association of Surgeons of Great Britain and Ireland, Telford, UK, May 2019; winner of the Moynihan prize
Introduction {#bjs550277-sec-0005}
============
In the West, most patients who are offered attempted curative therapy for oesophageal adenocarcinoma (OAC) will undergo a multimodal treatment involving either neoadjuvant chemotherapy (NAC) followed by surgery[1](#bjs550277-bib-0001){ref-type="ref"}, perioperative chemotherapy[2](#bjs550277-bib-0002){ref-type="ref"}, or neoadjuvant chemoradiotherapy[3](#bjs550277-bib-0003){ref-type="ref"}. Despite evidence of survival benefit, a meta‐analysis[4](#bjs550277-bib-0004){ref-type="ref"} comparing NAC with surgery alone in 2062 patients found only a 5·1 per cent absolute 2‐year survival advantage after NAC, because only a small minority experienced a significant pathological response. In a multicentre cohort study[5](#bjs550277-bib-0005){ref-type="ref"}, a clinically meaningful local response to NAC was restricted to the 14·8 per cent of patients with a tumour regression grade (TRG) of 1--2.
Inflammation is now widely recognized as a feature of many cancers[6](#bjs550277-bib-0006){ref-type="ref"}. Among a variety of inflammatory markers, derivative biomarkers -- neutrophil to lymphocyte ratio (NLR), platelet to lymphocyte ratio (PLR), neutrophil to platelet score, and the modified Glasgow Prognostic Score (mGPS) -- have been reported to be associated with poor survival[7](#bjs550277-bib-0007){ref-type="ref"}, [8](#bjs550277-bib-0008){ref-type="ref"}, [9](#bjs550277-bib-0009){ref-type="ref"}.
The aim of this study was to determine whether clinically readily available serum markers of inflammation obtained from routinely performed patient screening blood profiles might predict response to potentially curative NAC in OAC, and whether there was a subsequent relationship with survival after potentially curative oesophagectomy.
Methods {#bjs550277-sec-0006}
=======
To test the proposed hypotheses, a single cohort of patients diagnosed with OAC between 1 January 2010 and 31 August 2018 was recruited, and included patients with radiological TNM stage I--III deemed amenable to treatment with curative intent. All patients were managed by a multidisciplinary specialist team (MDT) with an interest in oesophageal cancer, including clinical nurse specialists, gastroenterologists, surgeons, oncologists, radiologists, anaesthetists and pathologists[10](#bjs550277-bib-0010){ref-type="ref"}. Management plans were individually tailored according to both patient and disease factors. Staging was done by means of CT, endoscopic ultrasonography, CT--PET and staging laparoscopy as appropriate. The South‐East Wales MDT treatment algorithms for oesophageal carcinoma have been described previously[11](#bjs550277-bib-0011){ref-type="ref"}, [12](#bjs550277-bib-0012){ref-type="ref"}, [13](#bjs550277-bib-0013){ref-type="ref"}.
The majority of patients received two cycles of cisplatin 80 mg/m^2^ and 5‐fluorouracil 1000 mg/m^2^ for 4 days. A minority received three cycles of epirubicin 50 mg/m^2^, cisplatin 60 mg/m^2^ and 5‐fluorouracil 200 mg/m^2^ or capecitabine 625 mg/m^2^ (ECF/X regimen). Definitive chemoradiotherapy was offered to patients with localized squamous cell carcinoma and those with adenocarcinoma deemed unsuitable for surgery because of disease extent and/or medical co‐morbidity[14](#bjs550277-bib-0014){ref-type="ref"}, [15](#bjs550277-bib-0015){ref-type="ref"}.
The standard surgical approach was subtotal transthor‐acic oesophagectomy (TTO), as described by Lewis[16](#bjs550277-bib-0016){ref-type="ref"} and Tanner[17](#bjs550277-bib-0017){ref-type="ref"}. Transhiatal oesophagectomy (THO), as described by Orringer[18](#bjs550277-bib-0018){ref-type="ref"}, was used selectively in patients with adenocarcinoma of the lower third of the oesophagus who had significant cardiorespiratory co‐morbidity, cT1--3 N0 disease. A modified extended D2 lymphadenectomy (preserving the pancreas and spleen where possible) was performed.
Ethical approval was sought, but the chair of the Cardiff and Vale University Health Board ethics committee confirmed that individual patient consent was not required to report clinical outcomes alone, and no formal approval was necessary.
Clinicopathological characteristics {#bjs550277-sec-0007}
-----------------------------------
Tumours were staged using the seventh edition of the AJCC/UICC TNM staging system. Pathological factors were recorded from pathology reports issued at the time of surgery, and included tumour differentiation, margin status and the number of lymph nodes with and without metastasis. The TRG was quantified using the Mandard system[19](#bjs550277-bib-0019){ref-type="ref"} by a histopathologist with a special interest in oesophagogastric cancer. Briefly, Mandard TRGs range from 1 to 5, based on the ratio of fibrosis to viable cancerous cells[5](#bjs550277-bib-0005){ref-type="ref"}, [19](#bjs550277-bib-0019){ref-type="ref"}. In keeping with the Oesophageal Cancer Clinical And Molecular Stratification (OCCAMS) reporting methodology, TRGs of 1 and 2 were considered to constitute good response, with TRGs of 3, 4 and 5 constituting poor response[5](#bjs550277-bib-0005){ref-type="ref"}.
Routine laboratory measurements of haemoglobin, whole white cell count, neutrophil, lymphocyte and platelet counts at the time of diagnosis were recorded. Derivate measurements of systemic inflammation were constructed by calculating the NLR and PLR[7](#bjs550277-bib-0007){ref-type="ref"}, [20](#bjs550277-bib-0020){ref-type="ref"}.
Patients were followed up at regular intervals of 3 months in the first year and 6 months thereafter. In the event that patients developed symptoms suggestive of recurrent disease, investigations were undertaken sooner. Follow‐up surveillance was conducted for 5 years or until death, whichever was sooner. Overall survival was calculated from time of diagnosis to the date of death or censoring. Disease‐free survival was measured from the date of surgery to the date of recurrence or censoring. The time of recurrence was taken as the date of the confirmatory investigation, on an intention‐to‐treat basis. Death certification was obtained from the Office for National Statistics via the Cancer Network Information System Cymru.
Statistical analysis {#bjs550277-sec-0008}
--------------------
Grouped data were expressed as median (i.q.r.) values, and non‐parametric methodology was used throughout. Receiver operating characteristic (ROC) curve analysis was employed to assess the predictive value of continuous variables with the primary outcome measure. ROC analysis was also used to determine dichotomization thresholds for poor Mandard TRGs, as described by Youden[21](#bjs550277-bib-0021){ref-type="ref"}. Univariable and multivariable logistical regression analysis was used to identify independent associations of categorical variables with poor Mandard TRGs. Variables with *P* \< 0·100 were included in the model using backward conditional methodology. Patient demographics were analysed between the treatment modalities by means of χ^2^ or non‐parametric tests, including the Mann--Whitney *U* test. These tests were also employed in the analysis of disease recurrence and time to recurrence for the treatment groups.
Overall survival was measured from the date of diagnosis, and disease‐free survival from date of surgery. This approach was adopted in the randomized trials to allow for the variable interval to surgery after diagnosis, depending on whether NAC was prescribed[22](#bjs550277-bib-0022){ref-type="ref"}. As in the trials, events resulting in a failure to complete curative treatment, such as not proceeding to surgery, open and close laparotomy, palliative resection and in‐hospital mortality, were assumed to have occurred at this landmark time, in order to maintain the intention‐to‐treat analysis. Cumulative survival was calculated according to the Kaplan--Meier method, with differences between groups analysed using the log rank test. A univariable analysis examining factors influencing survival was performed initially by the life‐table method of Kaplan and Meier, and factors with associations found to be significant at the *P* \< 0·010 level were retained in a Cox proportional hazards model using backward conditional methodology to assess the prognostic value of individual variables.
All statistical analysis was performed in SPSS® Statistics v25.0.0.0 (IBM, Armonk, New York, USA) with extension R.
Results {#bjs550277-sec-0009}
=======
A total of 136 patients with OAC were identified and underwent surgery after NAC; the operative approach was open in 120 patients with 16 patients undergoing laparoscopically assisted surgery. Details of patients\' clinicopathological factors can be found in *Table* [1](#bjs550277-tbl-0001){ref-type="table"}. Their median age was 68 (i.q.r. 63--73) years; 106 (77·9 per cent) were men and 30 (22·1 per cent) were women. Twenty‐three patients (16·9 per cent) had a good pathological response to NAC (TRG 1--2); the Mandard TRG groupings were: TRG 1, 18 (13·2 per cent); TRG 2, five (3·7 per cent); TRG 3, six (4·4 per cent); TRG 4, 56 (41·2 per cent); and TRG 5, 51 (37·5 per cent). During follow‐up, 36 patients (26·5 per cent) developed cancer recurrence and 69 (50·7 per cent) died. Median follow‐up of survivors was 27 (range 6--60) months. Around two‐thirds of the patients were followed up for at least 5 years or until death.
######
Clinicopathological patient factors
No. of patients (*n* = 136)
--------------------------------------- -----------------------------
**Age (years)**
\< 65 46 (33·8)
66--75 68 (50·0)
\> 75 22 (16·2)
**Sex ratio (F** : **M)** 30 : 106
**Operative approach** *n* = 113
TTO 71 (62·8)
THO 42 (37·2)
**Neutrophil** : **lymphocyte ratio**
\< 2·25 36 (26·5)
≥ 2·25 100 (73·5)
**pT category**
pT0 11 (8·1)
pT1 10 (7·4)
pT2 10 (7·4)
pT3 69 (50·7)
pT4 13 (9·6)
No resection 23 (16·9)
**pN category**
pN0 35 (25·7)
pN1 34 (25·0)
pN2 26 (19·1)
pN3 18 (13·2)
No resection 23 (16·9)
**Mandard TRG**
Good 23 (16·9)
Poor 113 (83·1)
**Differentiation**
Well or moderate 64 (47·1)
Poor 72 (52·9)
**CRM**
Negative 58 (42·6)
Positive 55 (40·4)
No resection 23 (16·9)
**Lymph node yield** *n* = 113
\< 15 43 (38·1)
≥ 15 70 (61·9)
Values in parentheses are percentages. TTO, transthoracic oesophagectomy; THO, transhiatal oesophagectomy; TRG, tumour regression grade; CRM, circumferential resection margin.
Baseline and area under the ROC curve (AUC) values for markers of the systemic inflammatory response (SIR) are shown in *Table* [2](#bjs550277-tbl-0002){ref-type="table"}. The median value for NLR was 3·00 (i.q.r. 2·15--3·89). NLR was strongly associated with a poorer Mandard TRG (AUC 0·71, 95 per cent c.i. 0·58 to 0·83; *P* = 0·002) (*Fig*. [1](#bjs550277-fig-0001){ref-type="fig"}). Using the Youden index, the optimal dichotomization threshold was 2·25, with 70·5 per cent considered to have a raised NLR. This gave sensitivity and specificity values of 80·5 and 60·9 per cent respectively. To adjust for potential confounding, a binary logistic regression model was developed to include the clinical factors available to the MDT at the point of commencing neoadjuvant therapy (*Table* [3](#bjs550277-tbl-0003){ref-type="table"}).
######
Association between pretreatment markers of systemic inflammatory response and poor Mandard tumour regression grade
No. of patients with marker level[†](#bjs550277-note-0006){ref-type="fn"} ROC analysis
-------------------------------- ------------------- --------------------------------------------------------------------------- -------------- ---- ------------------- -------
Haemoglobin (g/l) 138 (128--148) 33 103 0 0·47 (0·33, 0·62) 0·699
White cell count (× 10^9^/l) 7·6 (6·2--8·1) 2 124 10 0·59 (0·46, 0·72) 0·158
Neutrophil count (× 10^9^/l) 5·0 (3·9--6·1) 2 118 16 0·68 (0·56, 0·80) 0·008
Lymphocyte count (× 10^9^/l) 1·7 (1·3--2·1) 8 123 5 0·40 (0·25, 0·54) 0·115
Platelet count (× 10^9^/l) 281 (233--330) 3 123 10 0·52 (0·40, 0·65) 0·691
Neutrophil to lymphocyte ratio 3·00 (2·15--3·89) 0·71 (0·58, 0·83) 0·002
Platelet to lymphocyte ratio 160 (122--198) 0·66 (0·52, 0·79) 0·019
Values in parentheses are 95 per cent confidence intervals unless indicated otherwise;
values are median (i.q.r.).
Based on local thresholds.
AUC, area under the receiver operating characteristic (ROC) curve.
{#bjs550277-fig-0001}
######
Logistic regression analysis of preoperative factors associated with poor Mandard tumour regression grade
Univariable analysis Multivariable analysis
---------------------------------------------------------- ---------------------- ------------------------ --------------------- ----------
Age (\< 65 *versus* 66--75 *versus* \> 75 years) 1·11 (0·58, 2·15) 0·753
Sex (F *versus* M) 1·31 (0·47, 3·68) 0·610
Differentiation (well/moderate *versus* poor) 17·09 (3·82, 76·55) \< 0·001 15·92 (3·42, 74·02) \< 0·001
cTNM (1 *versus* 2 *versus* 3 *versus* 4) 1·38 (0·76, 2·48) 0·289
Neutrophil to lymphocyte ratio (\< 2·25 *versus* ≥ 2·25) 6·43 (2·47, 16·77) \< 0·001 5·86 (2·03, 16·92) 0·001
Values in parentheses are 95 per cent confidence intervals.
The relationship between clinicopathological factors and overall survival is shown in *Table* [4](#bjs550277-tbl-0004){ref-type="table"}, and that between clinicopathological factors and disease‐free survival in *Table* [5](#bjs550277-tbl-0005){ref-type="table"}. Five‐year overall survival rates for patients with a low and high NLR were 50 and 20 per cent, respectively. Five‐year disease‐free survival rates for low and high NLR were 80 and 40 per cent, respectively.
######
Cox proportional hazards analysis of factors associated with overall survival
Univariable analysis Multivariable analysis
------------------------------------------------------------- ---------------------- ------------------------ -------------------- -------
Age (\< 65 *versus* 66--75 *versus* \> 75 years) 0·87 (0·58, 1·30) 0·494
Sex (F *versus* M) 1·13 (0·57, 2·21) 0·731
Operative approach (TTO *versus* THO) 1·25 (0·69, 2·24) 0·462
Neutrophil to lymphocyte ratio (\< 2·25 *versus* ≥ 2·25) 2·33 (1·16, 4·68) 0·017 2·26 (1·03, 4·93) 0·042
pT category (0 *versus* 1 *versus* 2 *versus* 3 *versus* 4) 2·14 (1·43, 3·21) \< 0·001 1·81 (1·06, 3·08) 0·029
pN category (0 *versus* 1 *versus* 2 *versus* 3) 1·70 (1·34, 2·15) \< 0·001 1·57 (1·14, 2·17) 0·006
Mandard TRG (good *versus* poor) 2·67 (1·22, 5·86) 0·014 4·28 (1·37, 13·34) 0·012
Differentiation (well/moderate *versus* poor) 2·26 (1·27, 4·02) 0·006 2·71 (1·39, 5·29) 0·004
CRM (negative *versus* positive) 2·46 (1·43, 4·22) 0·001 0·171
Lymph node yield (\< 15 *versus* ≥ 15) 0·75 (0·43, 1·31) 0·306
Values in parentheses are 95 per cent confidence intervals. TTO, transthoracic oesophagectomy; THO, transhiatal oesophagectomy; TRG, tumour regression grade; CRM, circumferential resection margin.
######
Cox proportional hazards analysis of factors associated with disease‐free survival
Univariable analysis Multivariable analysis
------------------------------------------------------------- ---------------------- ------------------------ ------------------- -------
Age (\< 65 *versus* 66--75 *versus* \> 75 years) 0·95 (0·59, 1·53) 0·823
Sex (F *versus* M) 1·08 (0·49, 2·38) 0·847
Operative approach (TTO *versus* THO) 2·64 (1·36, 5·11) 0·004 3·10 (1·58, 6·12) 0·001
Neutrophil to lymphocyte ratio (\< 2·25 *versus* ≥ 2·25) 2·48 (1·08, 5·67) 0·032 0·288
pT category (0 *versus* 1 *versus* 2 *versus* 3 *versus* 4) 1·54 (1·09, 2·17) 0·014 1·72 (1·01, 2·93) 0·047
pN category (0 *versus* 1 *versus* 2 *versus* 3) 1·17 (0·98, 1·40) 0·081 0·091
Mandard TRG (good *versus* poor) 3·68 (1·12, 12·08) 0·032 0·936
Differentiation (well/moderate *versus* poor) 1·82 (0·94, 3·53) 0·078 0·372
CRM (negative *versus* positive) 1·38 (0·69, 2·74) 0·361
Lymph node yield (\< 15 *versus* ≥ 15) 0·71 (0·37, 1·36) 0·302
Values in parentheses are 95 per cent confidence intervals. TTO, transthoracic oesophagectomy; THO, transhiatal oesophagectomy; TRG, tumour regression grade; CRM, circumferential resection margin.
{#bjs550277-fig-0002}
Discussion {#bjs550277-sec-0010}
==========
The principal finding of this study is that a single biomarker of SIR, a raised NLR, was a significant and independent prognostic indicator of response to NAC before potentially curative oesophagectomy for cancer. Based on a dichotomization threshold of 2·25, 100 of the 136 patients (73·5 per cent) had a raised NLR, and were nearly sixfold more likely to have a poor TRG response to NAC. Median overall survival in patients with a low NLR was, on average, 34 months longer than that in patients with a high NLR. Similarly, 5‐year disease‐free and overall survival rates in patients with a low NLR were around 80 and 50 per cent respectively, approximately double those of patients with a high NLR.
The relationship between the SIR and TRG in oesophageal cancer has been described previously[23](#bjs550277-bib-0023){ref-type="ref"}, in a study in which no association between NLR and TRG was identified. Key differences in methodology from that in the present study may account for these different findings. The definition of good TRG response differed. In the earlier study[23](#bjs550277-bib-0023){ref-type="ref"}, patients with TRG 1--3 were considered good responders, whereas in the present study TRG 1--2 was considered to represent a good response. The OCCAMS research consortium currently favours the TRG 1--2 as indicative of good response[5](#bjs550277-bib-0005){ref-type="ref"}. The statistical methods also differed. The earlier study[23](#bjs550277-bib-0023){ref-type="ref"} looked only at differences in NLR measurements between responders and non‐responders (2·26 *versus* 2·73; *P* = 0·127), but did not examine the predictive value of NLR by ROC curve or logistic regression analysis. Statistical nuances may, of course, be overanalysed, but half of the TRG responders in the earlier study had a NLR below 2·26, which implicitly supports the critical threshold of 2·25 employed in the present study. At the very least, markers of SIR require further evaluation.
The prognostic power of SIR in relation to neoadjuvant therapies has been reported previously, involving rectal[24](#bjs550277-bib-0024){ref-type="ref"}, [25](#bjs550277-bib-0025){ref-type="ref"}, ovarian[26](#bjs550277-bib-0026){ref-type="ref"}, lung[27](#bjs550277-bib-0027){ref-type="ref"} and breast[28](#bjs550277-bib-0028){ref-type="ref"} cancers. A high mGPS was associated with poor response to NAC in rectal cancer (odds ratio (OR) 0·18, *P* = 0·006), and low NLR was associated with a good pathological response (OR 0·27, *P* = 0·046), although this did not retain independent significance in multivariable analysis[24](#bjs550277-bib-0024){ref-type="ref"}. Although other studies have not specifically examined the role of SIR\'s association with pathological response to NAC, preoperative NLR has been reported to predict overall survival, with high NLR values being associated with poor survival[29](#bjs550277-bib-0029){ref-type="ref"}. Exactly why SIR should be associated with poor response to neoadjuvant chemotherapy in OAC is not understood, although *in vivo* and *in vitro* evidence suggests that activation of the JAK/STAT3 (Janus kinase/signal transducers and activators of transcription) pathway by interleukin 6 may play a role in chemoresistance[30](#bjs550277-bib-0030){ref-type="ref"}, [31](#bjs550277-bib-0031){ref-type="ref"}.
There are a number of inherent limitations to all studies of this type, which have been reported previously[7](#bjs550277-bib-0007){ref-type="ref"}, [32](#bjs550277-bib-0032){ref-type="ref"}, [33](#bjs550277-bib-0033){ref-type="ref"}. Cohort size was modest, and stage‐by‐stage subanalysis was therefore impractical. The patients represented a selected cohort (most had undergone a potentially curative oesophagogastrectomy) and were consequently not representative of all patients diagnosed with oesophageal cancer; indeed, only about one‐quarter of all patients in South Wales with OAC undergo potentially curative surgery[34](#bjs550277-bib-0034){ref-type="ref"}. The strengths of the study, nevertheless, included robust follow‐up data with no patient lost to follow‐up, a reasonable duration of follow‐up, and accurate causes and dates of death. A National Health Service laboratory using standardized techniques performed the serum analyses and histopathological examinations, so reproducing these results should be easy. Patients were recruited from a consecutive series diagnosed with OAC, from a single UK geographical region, all treated by the same group of specialists, using a standardized staging algorithm and operative techniques, with internationally recognized and published key performance indicators[10](#bjs550277-bib-0010){ref-type="ref"}.
Despite improvements in staging and surgical technique, approximately half of the patients who undergo potentially curative oesophagectomy for cancer will suffer disease recurrence[13](#bjs550277-bib-0013){ref-type="ref"}, [22](#bjs550277-bib-0022){ref-type="ref"}. Determination of the NLR, derived and calculated from absolute counts of serum lymphocytes and neutrophils, is performed routinely during preoperative blood profile work, and is readily available. The findings suggest that SIR offers a novel therapeutic target for patients susceptible to NAC resistance and cancer recurrence. Incorporation of the NLR into management pathways is presently limited by inconsistent dichotomization thresholds. Adequately powered studies comparing critical dichotomization or categorization thresholds are needed. Given the association between SIR and relative chemoresistance, the identification of the group with high NLR would suggest that these patients might benefit from alternatives to NAC at the outset.
Collaborators {#bjs550277-sec-0011}
=============
Members of the South‐East Wales Oesophagogastric Cancer Collaborative: G. Blackshaw, G. Clark, X. Escofet, A. Foliaki, T. Havard, M. Henwood, J. Witherspoon, W. G. Lewis.
Disclosure {#bjs550277-sec-0012}
==========
The authors declare no conflict of interest.
|
{
"pile_set_name": "PubMed Central"
}
|
Monday, March 14, 2016
Writing What You Don’t Know
In a writer’s workshop I took this past January, the workshop leader took the time to talk about the strong need for diverse characters in our writing. It was slightly surreal, as the leader and every single participant was a white woman. Still, it was hardly the first time I’d heard this plea. #WeNeedDiverseBooks is a very common hashtag among publishing professionals on Twitter.
Does it follow, though, that stories starring diverse characters need to be written by diverse writers? Should they? Can a white writer authentically write a story with a black protagonist? If not, are we also saying that black writers should not write stories with white characters? Can “color-blind casting,” which is exploding on television these days, be adapted for a written narrative?
J.K. Rowling’s recent experience doesn’t bode well for warm acceptance of white writers writing about cultures not their own. Native American communities were infuriated when her recent history of magic in North America, written as a run-up to the debut of the Fantastical Beasts and Where to Find Them movie, touched on certain tropes and beliefs about Native Americans. What does a white woman from the U.K. know about the Cherokees and Navajos?
I’m not writing this to defend Rowling – I haven’t read the stories and don’t know enough about Native American cultures to even form an opinion. But I’ve cherished the Harry Potter books, and Jo’s interactions with fans and her charitable giving. I can only imagine how horrified she must feel, being accused of appropriating someone else’s culture. Getting it wrong.
I am a white woman – a wife and mother – and in every book I’ve written so far, my first-person protagonist is the same. True, one of them was also a half-vampire, but I didn’t get a lot of emails from half-vampires complaining I’d gotten it wrong. However, I did get one review that mentioned her Hispanic co-worker, Vic Ramirez, was Hispanic in name only.
In that writer’s workshop in January, I presented the first 25 pages of a YA novel I’m working on, featuring a morbidly obese teenager who decides to have gastric bypass surgery. I’ve had my issues with weight, but I’ve never been nearly that heavy. I’ve done research, and had a live-in nanny who had the procedure, but still, I have no personal experience with being that weight. So as much as I love my story and my protagonist, I still feel that I don’t have the right to write it. (Reading this blog post reinforced that feeling. ) I feel panicky at the thought of querying agents or publishers, imagining a similar reaction. Who are you to write about this girl? More broadly, do I have the right to write from the perspective of a bi-racial teen, or a black woman, or an Asian man – of anyone whose experience of the world is fundamentally different from mine? I can make up plots and whole universes, but do I have the right to make up people?
And if the answer is no, then are we saying that at obese person shouldn’t write from the point of view of characters who don’t struggle with their weight? That a black man shouldn’t attempt to write a story about a white woman? That a gay man should only write about gay men? Of course not. How much smaller our literary world would be if we only accepted stories in which a protagonist mirrored her creator.
And yet … some of the most well-known books about characters from minority populations are written by writers from those populations.
I don’t have any answers. Just lots of questions.
I honestly don’t know if I’m going to finish my story about my obese teenager. As much as I love her, the writing is tough, and there are other ideas that come easier. One of them is about a white wife and mother.
Are you writing a story in which your protagonist differs from you in a major way? How did you build her world, being different than yours?
1 comment:
This is a great topic and I've dealt with it a bit, too. One of my editors said that the book she was editing had no diversity in the characters and she was right. I think I'm afraid to write about a different ethnicity/cultural background because I don't want to get it "wrong" and I also don't want it to be cliche. I added an Asian woman into my last book but her part was very small and I never actually mentioned that she was Asian. I described her physically. But I understand your fears. Most of my books feature a single, white female (not THAT single, white female...) who works in the legal field because...well...yes, that's me. Even though their personalities are nothing like my own and their stories are fictional, there was not much research to be done in that regard. My newest book features a woman and other characters with a completely different career and background and even that is scaring me but I need to stretch myself and, you're correct, the literary world would be way too small if authors were only allowed to "write what we know."
|
{
"pile_set_name": "Pile-CC"
}
|
Introduction {#ccr3875-sec-0001}
============
Primary aldosteronism (PA) is a major cause of endocrine hypertension [1](#ccr3875-bib-0001){ref-type="ref"}. There are two major subtypes. One is unilateral PA, mainly due to aldosterone‐producing adenoma (APA) and the other is bilateral PA, mainly due to idiopathic hyperaldosteronism (IHA). It is important to determine the PA subtype because the recommended treatment for APA is an adrenalectomy and that for IHA is pharmacological therapy with a mineralocorticoid receptor antagonist [2](#ccr3875-bib-0002){ref-type="ref"}. Adrenal venous sampling (AVS) is recommended for determining the PA subtype [3](#ccr3875-bib-0003){ref-type="ref"}. Regardless of its diagnostic efficacy, AVS is a difficult procedure. The catheterization of the right adrenal vein is particularly difficult because of its small diameter [4](#ccr3875-bib-0004){ref-type="ref"}. By contrast, the left adrenal vein is catheterized in almost all patients because it enters the left renal vein, which can be used as a guide to the left adrenal vein. However, in the rare case of an anomalous left adrenal vein, it is difficult to cannulate the left adrenal vein [5](#ccr3875-bib-0005){ref-type="ref"}. In this report, we describe the successful left adrenal vein cannulation under contrast‐enhanced computed tomography (CT) guidance in a patient with PA and left inferior vena cava (IVC) whose left adrenal vein drained directly into the IVC.
Case Report {#ccr3875-sec-0002}
===========
A 43‐year‐old man presenting with a 6‐year medical history of hypertension was referred to our hospital for suspected PA. He was taking antihypertensive drug of amlodipine 5 mg. The laboratory data were as follows: creatinine, 0.67 mg/dL; plasma aldosterone concentration (PAC), 249 pg/mL; plasma renin activity (PRA), 0.7 ng/mL/h; and PAC/PRA ratio, 356. Captopril challenge test and saline infusion test confirmed the diagnosis of PA. Contrast‐enhanced CT showed no adrenal tumor. CT also revealed that the left inferior vena cava joined the left renal vein and crossed over the aorta to the right side (Fig. [1](#ccr3875-fig-0001){ref-type="fig"}).
{#ccr3875-fig-0001}
Adrenal venous sampling was performed using a sheath inserted in the right femoral vein. The right adrenal vein was cannulated using a catheter. The left adrenal vein was then explored through the left renal vein. However, venography showed no left adrenal vein joining the left renal vein. A coronal section of the CT indicated that the left adrenal vein directly drained into the left IVC at a point close to the center of the left renal vein (Fig. [2](#ccr3875-fig-0002){ref-type="fig"}). After examining the area, it was found that the left adrenal vein could be cannulated (Fig. [3](#ccr3875-fig-0003){ref-type="fig"}A). However, a blood sample could not be obtained because the catheter was wedged; therefore, a multipurpose 4.2 French catheter was used to obtain a blood sample (Fig. [3](#ccr3875-fig-0003){ref-type="fig"}B). AVS was performed after adrenocorticotropic hormone stimulation. The patient was diagnosed with bilateral adrenal hyperplasia (Table [1](#ccr3875-tbl-0001){ref-type="table-wrap"}) and treated with mineralocorticoid receptor antagonist.
{#ccr3875-fig-0002}
{#ccr3875-fig-0003}
######
Adrenal venous sampling results after adrenocorticotropic hormone stimulation
Aldosterone (pg/mL) Cortisol (*μ*g/dL) Aldosterone cortisol ratio
-------------------- --------------------- -------------------- ----------------------------
Right adrenal vein 34,189 1130 30
Left adrenal vein 24,379 1100 22
Inferior vena cava 212 20 11
John Wiley & Sons, Ltd
Discussion {#ccr3875-sec-0003}
==========
The IVC can present with a multitude of anatomical variations, such as double and left IVC, which are caused by complex embryonic developments. Based on the involvement of iliac and gonadal veins, several classifications have been proposed for IVC variations [6](#ccr3875-bib-0006){ref-type="ref"}, [7](#ccr3875-bib-0007){ref-type="ref"}, [8](#ccr3875-bib-0008){ref-type="ref"}. To perform a successful AVS, knowledge of possible anatomical variations related to adrenal vein drainage is crucial. For example, in patients with double IVC, the left adrenal vein may drain either directly into the IVC or into the left renal vein. In patients with left IVC, the left adrenal vein drains directly into the IVC [6](#ccr3875-bib-0006){ref-type="ref"}. In almost all individuals, the right adrenal vein drains directly into the IVC. Alper et al. reviewed the anatomy of adrenal veins [9](#ccr3875-bib-0009){ref-type="ref"}.
Contrast‐enhanced CT is useful in planning for AVS because it reveals the positions of the adrenal veins [5](#ccr3875-bib-0005){ref-type="ref"}. In this case, a coronal section of CT was helpful in detecting the left adrenal vein. Stack et al. reported a case where the left adrenal vein drained directly into the IVC [10](#ccr3875-bib-0010){ref-type="ref"}. To our knowledge, our patient is the first reported case of AVS being performed in the left IVC wherein the left adrenal vein directly into the IVC.
Conclusion {#ccr3875-sec-0004}
==========
We report an unusual case wherein the left adrenal vein drained directly into the left IVC. This anomaly makes cannulation of the left adrenal vein for AVS difficult. Contrast‐enhanced CT should be routinely performed in all patients undergoing AVS to rule out or clearly left any unusual anatomical variations that might complicate the procedure.
Authorship {#ccr3875-sec-0005}
==========
YF and HT: drafted the article and conception of this study; YF and TU: performed the adrenal venous sampling; YU: performed the consultation and evaluation; YF: revised the article critically for important intellectual content.
Conflict of Interest {#ccr3875-sec-0006}
====================
None declared.
|
{
"pile_set_name": "PubMed Central"
}
|
Q:
Can't find where form is processed?
I'm using a wordpress theme that i want to customize and i cannot find where the custom post type Services form $_POST values are processed. The form action returns to the same page but when looking at the page and the wrapper page, i cannot see any functions that process $_POST values?
Here is the form action
<form id="edit-service" class="edit-service" enctype="multipart/form-data" method="post" action="http://example.com/add-service/?step=edit-info&hash=427d72b2fe6d0e70a9cb" novalidate="novalidate"></form>
How do i debug this to find where $_POST values are being processed?
A:
In the add-service (controller?) you can either do the following:
echo "<pre>";
var_dump($_POST);
echo "</pre>";
exit;
If you are using firefox you could also use the Tamper Data extension, which let's you view and edit all POST data.
|
{
"pile_set_name": "StackExchange"
}
|
Posted on May 1, 2014 in Overviews |
By Henry Seltzer for ASTROGRAPH Horoscopes
The astrology of May follows a month that was very intense in its transformational import, including a stressed-out Earth Day, and therefore represents something of an aftermath to this significant time for the planet and for ourselves, thus a month when we could find ourselves taking stock, and attempting to further understand the changes taking place within us. This is indeed an excellent time for introspection with the retrograde of Mars in Libra coming into mutual reception with Venus in Aries, and stationing to direct motion on the 19th. Just before this month began, the Solar Eclipse New Moon of Tuesday, April 28th, taking place in Taurus, indicated that we have yet another intense month ahead of us. This extra-potent New Moon had many chimes with the Uranus-Pluto square that therefore remains largely active in the current month. Although this powerful collision of outer planet energies begins to fade after this month's cycle, it returns in December, thus promising by the end of this year further developments in the ongoing transformation that we remain in the midst of.
With Venus, the ruler of Taurus, poised to enter Aries, we have a very active relationship equation brewing. We may well come to review more completely and reflect on the way that relationships work themselves out in our lives. Venus conjoins Uranus by the time of the mid-month Full Moon, taking place on Wednesday, May 14th. Interestingly, Saturn is also bi-quintile Uranus just as Venus conjuncts it. This is a very dynamic Full Moon, with Mercury also participating, and Mars preparing to station in aspect to the degree of the recent eclipse. This implies greater consciousness around the issues of assertion and relationship, along with taking greater responsibility for relationship issues that we have been gradually facing up to.
Another astrological archetype that remains a powerful factor in these May skies is Chiron, the Wounded Healer, which is trined by Jupiter for much of the month, most especially at the time of the mid-month Full Moon. Saturn forms a grand trine in Water signs with Chiron and Jupiter at the time of New Moon of April 28th, an aspect pattern that perfects by mid-month. We are looking more closely into our wounding, and that residue of early trauma that prevents us from entering into the transformative nature of these times more wholeheartedly. We can unlock an amazing degree of power and freedom for constructive change once we are able to accept ourselves in the dark places within us, and begin to move beyond their crippling effect on our lives.
Uranus and Pluto continue to some extent all this year in their storied square, symbolizing the drastic realizations of this period and the urge to act in concert with them. Uranus and Pluto remain only a degree or two apart for the entire month of May. Over the summer this potent aspect wanes, returning in December. We are therefore making the requisite adjustments required in our lives, however reluctantly or slowly at times, at other times more quickly, over this entire period, indeed right up through to the end of the decade. These two years, of 2014 and 2015, do seem to represent the crux of the decade, at least as far as this aspect of radical transformative change is concerned. These times of epiphany and change do make a difference. However we can come to this, we need to know that our faith in the universe will be repaid, and that our actions actually matter, in order that we truly succeed in what we are currently attempting.
|
{
"pile_set_name": "OpenWebText2"
}
|
#ifndef ZC_INCREMENTALMERKLETREE_H_
#define ZC_INCREMENTALMERKLETREE_H_
#include <array>
#include <deque>
#include <boost/optional.hpp>
#include <boost/static_assert.hpp>
#include "uint256.h"
#include "serialize.h"
#include "Zcash.h"
#include "zcash/util.h"
namespace libzcash {
class MerklePath {
public:
std::vector<std::vector<bool>> authentication_path;
std::vector<bool> index;
ADD_SERIALIZE_METHODS;
template <typename Stream, typename Operation>
inline void SerializationOp(Stream& s, Operation ser_action) {
std::vector<std::vector<unsigned char>> pathBytes;
uint64_t indexInt;
if (ser_action.ForRead()) {
READWRITE(pathBytes);
READWRITE(indexInt);
MerklePath &us = *(const_cast<MerklePath*>(this));
for (size_t i = 0; i < pathBytes.size(); i++) {
us.authentication_path.push_back(convertBytesVectorToVector(pathBytes[i]));
us.index.push_back((indexInt >> ((pathBytes.size() - 1) - i)) & 1);
}
} else {
assert(authentication_path.size() == index.size());
pathBytes.resize(authentication_path.size());
for (size_t i = 0; i < authentication_path.size(); i++) {
pathBytes[i].resize((authentication_path[i].size()+7)/8);
for (unsigned int p = 0; p < authentication_path[i].size(); p++) {
pathBytes[i][p / 8] |= authentication_path[i][p] << (7-(p % 8));
}
}
indexInt = convertVectorToInt(index);
READWRITE(pathBytes);
READWRITE(indexInt);
}
}
MerklePath() { }
MerklePath(std::vector<std::vector<bool>> authentication_path, std::vector<bool> index)
: authentication_path(authentication_path), index(index) { }
};
template<size_t Depth, typename Hash>
class EmptyMerkleRoots {
public:
EmptyMerkleRoots() { }
Hash empty_root(size_t depth) const {
return Hash::EmptyRoot(depth);
}
template <size_t D, typename H>
friend bool operator==(const EmptyMerkleRoots<D, H>& a,
const EmptyMerkleRoots<D, H>& b);
private:
std::array<Hash, Depth+1> empty_roots;
};
template<size_t Depth, typename Hash>
bool operator==(const EmptyMerkleRoots<Depth, Hash>& a,
const EmptyMerkleRoots<Depth, Hash>& b) {
return a.empty_roots == b.empty_roots;
}
template<size_t Depth, typename Hash>
class IncrementalWitness;
template<size_t Depth, typename Hash>
class IncrementalMerkleTree {
friend class IncrementalWitness<Depth, Hash>;
public:
BOOST_STATIC_ASSERT(Depth >= 1);
IncrementalMerkleTree() { }
size_t DynamicMemoryUsage() const {
return 32 + // left
32 + // right
parents.size() * 32; // parents
}
size_t size() const;
void append(Hash obj);
Hash root() const {
return root(Depth, std::deque<Hash>());
}
Hash last() const;
IncrementalWitness<Depth, Hash> witness() const {
return IncrementalWitness<Depth, Hash>(*this);
}
ADD_SERIALIZE_METHODS;
template <typename Stream, typename Operation>
inline void SerializationOp(Stream& s, Operation ser_action) {
READWRITE(left);
READWRITE(right);
READWRITE(parents);
wfcheck();
}
static Hash empty_root() {
return emptyroots.empty_root(Depth);
}
template <size_t D, typename H>
friend bool operator==(const IncrementalMerkleTree<D, H>& a,
const IncrementalMerkleTree<D, H>& b);
private:
static EmptyMerkleRoots<Depth, Hash> emptyroots;
boost::optional<Hash> left;
boost::optional<Hash> right;
// Collapsed "left" subtrees ordered toward the root of the tree.
std::vector<boost::optional<Hash>> parents;
MerklePath path(std::deque<Hash> filler_hashes = std::deque<Hash>()) const;
Hash root(size_t depth, std::deque<Hash> filler_hashes = std::deque<Hash>()) const;
bool is_complete(size_t depth = Depth) const;
size_t next_depth(size_t skip) const;
void wfcheck() const;
};
template<size_t Depth, typename Hash>
bool operator==(const IncrementalMerkleTree<Depth, Hash>& a,
const IncrementalMerkleTree<Depth, Hash>& b) {
return (a.emptyroots == b.emptyroots &&
a.left == b.left &&
a.right == b.right &&
a.parents == b.parents);
}
template <size_t Depth, typename Hash>
class IncrementalWitness {
friend class IncrementalMerkleTree<Depth, Hash>;
public:
// Required for Unserialize()
IncrementalWitness() {}
MerklePath path() const {
return tree.path(partial_path());
}
// Return the element being witnessed (should be a note
// commitment!)
Hash element() const {
return tree.last();
}
uint64_t position() const {
return tree.size() - 1;
}
Hash root() const {
return tree.root(Depth, partial_path());
}
void append(Hash obj);
ADD_SERIALIZE_METHODS;
template <typename Stream, typename Operation>
inline void SerializationOp(Stream& s, Operation ser_action) {
READWRITE(tree);
READWRITE(filled);
READWRITE(cursor);
cursor_depth = tree.next_depth(filled.size());
}
template <size_t D, typename H>
friend bool operator==(const IncrementalWitness<D, H>& a,
const IncrementalWitness<D, H>& b);
private:
IncrementalMerkleTree<Depth, Hash> tree;
std::vector<Hash> filled;
boost::optional<IncrementalMerkleTree<Depth, Hash>> cursor;
size_t cursor_depth = 0;
std::deque<Hash> partial_path() const;
IncrementalWitness(IncrementalMerkleTree<Depth, Hash> tree) : tree(tree) {}
};
template<size_t Depth, typename Hash>
bool operator==(const IncrementalWitness<Depth, Hash>& a,
const IncrementalWitness<Depth, Hash>& b) {
return (a.tree == b.tree &&
a.filled == b.filled &&
a.cursor == b.cursor &&
a.cursor_depth == b.cursor_depth);
}
class SHA256Compress : public uint256 {
public:
SHA256Compress() : uint256() {}
SHA256Compress(uint256 contents) : uint256(contents) { }
static SHA256Compress combine(
const SHA256Compress& a,
const SHA256Compress& b,
size_t depth
);
static SHA256Compress uncommitted() {
return SHA256Compress();
}
static SHA256Compress EmptyRoot(size_t);
};
class PedersenHash : public uint256 {
public:
PedersenHash() : uint256() {}
PedersenHash(uint256 contents) : uint256(contents) { }
static PedersenHash combine(
const PedersenHash& a,
const PedersenHash& b,
size_t depth
);
static PedersenHash uncommitted();
static PedersenHash EmptyRoot(size_t);
};
template<size_t Depth, typename Hash>
EmptyMerkleRoots<Depth, Hash> IncrementalMerkleTree<Depth, Hash>::emptyroots;
} // end namespace `libzcash`
typedef libzcash::IncrementalMerkleTree<INCREMENTAL_MERKLE_TREE_DEPTH, libzcash::SHA256Compress> SproutMerkleTree;
typedef libzcash::IncrementalMerkleTree<INCREMENTAL_MERKLE_TREE_DEPTH_TESTING, libzcash::SHA256Compress> SproutTestingMerkleTree;
typedef libzcash::IncrementalWitness<INCREMENTAL_MERKLE_TREE_DEPTH, libzcash::SHA256Compress> SproutWitness;
typedef libzcash::IncrementalWitness<INCREMENTAL_MERKLE_TREE_DEPTH_TESTING, libzcash::SHA256Compress> SproutTestingWitness;
typedef libzcash::IncrementalMerkleTree<SAPLING_INCREMENTAL_MERKLE_TREE_DEPTH, libzcash::PedersenHash> SaplingMerkleTree;
typedef libzcash::IncrementalMerkleTree<INCREMENTAL_MERKLE_TREE_DEPTH_TESTING, libzcash::PedersenHash> SaplingTestingMerkleTree;
typedef libzcash::IncrementalWitness<SAPLING_INCREMENTAL_MERKLE_TREE_DEPTH, libzcash::PedersenHash> SaplingWitness;
typedef libzcash::IncrementalWitness<INCREMENTAL_MERKLE_TREE_DEPTH_TESTING, libzcash::PedersenHash> SaplingTestingWitness;
#endif /* ZC_INCREMENTALMERKLETREE_H_ */
|
{
"pile_set_name": "Github"
}
|
An improved tobacco smoke filter for use with cigarettes has a plurality of expansion chambers and ambient air inlets for greater cooling of the smoke and increased nicotine and tar removal.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
While most women are overweight or obese when they reach menopause, we know little about how obesity affects this transition and its impact on metabolic health. We have hypothesized that the enhanced production of estrogens in peripheral tissues of obese women protects adipose tissue, skeletal muscle, and bone from the menopause-related decline in function. We have merged well-characterized preclinical models of obesity (obesity-resistant/prone rats) and menopause surgical ovariectomy (OVX) to study how pre-existing obesity affects this transition. In the first aim, we examine obesity's effects on the loss of ovarian estrogen production and its impact on energy balance, fuel utilization, and metabolic health. The role of extragonadal estrogen production in obesity's effects will be dissected with the use of aromatase inhibitors. Diet-induced weight loss is common in women with weight control problems, but the body compensates with homeostatic adaptations that drive weight regain. The loss of ovarian function in weight reduced women may exacerbate this metabolic drive to gain weight and create a potentiated vulnerability to metabolic disease. Regular exercise and estrogen have many overlapping effects on energy balance and fuel utilization that may counter these consequences to energy homeostasis and disease. In the second aim, we examine how energy restricted weight loss from obesity affects the drive to gain weight and the decline in metabolic health after the loss of ovarian function. The impact of regular exercise, with actions that reflect an estrogen mimetic, will be examined in weight reduced subjects. These studies will provide insight into how one of the most common preconditions of menopause, obesity, affects the loss of ovarian function and its consequences to energy homeostasis and metabolic disease. Observations from these studies may provide evidence that certain populations of obese woman (treated with aromatase therapy, energy restricted) who may be particularly vulnerable to menopausal weight gain and metabolic disease unless they maintain a program of regular physical activity.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Q:
How can I automate the process of copying files from one folder to another in Centos
I have a statistical application which runs every minute and creates charts accordingly.
In order to make these charts available to other users, I need to copy the whole folder containing the charts and paste it to a shared folder where other users can see the contents.
How can I automate this process so that e.g each 5 minutes the files and folders are updated?
A:
This sounds like something which could perhaps be perfectly solved with rsync. In its simplest form it can be called like this
rsync sourceFolder destinationFolder
Called in a crontab every 5 minute:
*/5 * * * * /usr/bin/rsync sourceFolder destinationFolder
For options, permissions, exlude of special files or directories see man rsync.
|
{
"pile_set_name": "StackExchange"
}
|
The term *working memory* refers to the process or collection of processes responsible for the complex cognitive coordination necessary for everyday human thoughts and actions. Researchers generally agree about the importance of working memory for human cognition. There is also general agreement that it supports the ready availability of a small amount of information in support of current tasks, and has a key role in updating and processing that information moment to moment (e.g., [@c30]; [@c52]). However, there are multiple different definitions of working memory (see [@c30], for a discussion), and each definition gives rise to different theoretical assumptions and different experimental paradigms designed to test those assumptions. Contrasting results across labs might then reflect the specific experimental paradigms adopted, and theoretical debates may be based on differences that are more apparent than real ([@c49]). Rarely do researchers who assume different definitions of working memory adopt the exact same paradigm to directly test their contrasting predictions.
We present four experiments that addressed the debate about what limits the capacity of working memory to undertake both memory maintenance and ongoing processing. Unlike most studies in this area, the experiments were carried out across different labs within an "adversarial collaboration" in which the coauthors agreed on a common experimental paradigm to test predictions from their contrasting, and well-established theoretical frameworks for working memory. The experiments described here are part of a larger project called Working Memory Across the Adult Life Span: An Adversarial Collaboration (WoMAAC; <https://womaac.psy.ed.ac.uk>). Specifically, these frameworks are referred to as the multiple-component model (MCM; [@c7]; [@c49], [@c50]), time-based resource sharing (TBRS; [@c11], [@c12]), and embedded processes (EP; [@c26], [@c27]). This approach allows a more direct test of the different predictions than is possible across different studies, with the aim of contributing new insights, both theoretically and empirically, to this important area of cognition. First, we give an overview of each of the three theoretical frameworks that motivated our experiments, and then go on to describe the expectations from each for the series of experiments that follow. All of the predictions from each theory, and the experimental methods, were preregistered on the Open Science Framework (OSF, see the project page at <https://bit.ly/2KTKMgb>).
Multiple-Component Model (MCM) {#s2}
==============================
The MCM assumes a coordinated system of specialized cognitive resources serving specific functions in online cognition. The model specifies separate components for storage and processing, with distinct stores based on modality-specific codes that need not match the modality of presentation. For example, words may be stored as visual codes or as phonological or semantic codes, regardless of whether they are presented visually or aurally, and nonverbal stimuli such as shapes and colors may be stored as visual codes or as phonological or semantic codes for the associated names. Originally ([@c2]; [@c5]), a central executive was proposed as a domain-general processing and control mechanism, but subsequently ([@c4]; [@c50]), a number of separate executive functions were proposed, such as inhibition, updating, task-switching ([@c60]), dual-tasking ([@c51]; [@c59]), and the manipulation of mental images ([@c15]; [@c79]). Executive functions have therefore been suggested to be emergent properties of the interaction between these multiple functions ([@c49], [@c50]).
The phonological loop has been proposed as a temporary store for serial ordered phonological codes (e.g., [@c3]). Items stored within the phonological loop are said to be vulnerable to interference among themselves due to phonological similarity ([@c23]) and interference from asking participants to repeat aloud an irrelevant word (e.g., the--the--the) while encoding or retaining verbal sequences (a technique known as articulatory suppression \[AS\]), as well as from presentation of irrelevant speech ([@c71]). While the limited capacity store can maintain small list lengths without any attentional cost, the MCM also proposes a separate subvocal rehearsal mechanism that can "boost" performance. Maintenance of longer lists through subvocal rehearsal has been found to be affected by a number of temporal factors, such as the length of words in a sequence and individual reading and speech rates ([@c8]; [@c42]), although some recent studies have debated this issue ([@c41]; [@c44]; [@c65]). The links between memory performance and phonological characteristics of the to-be-remembered items are therefore argued as evidence for a specific verbal store. Additional evidence has come from studies of brain damaged individuals who appear to have very specific impairments of short-term retention of phonological sequences ([@c76]; [@c78]).
The visual cache is said to store an array of visual items or a single visual item that may vary in complexity ([@c47], [@c48], [@c49]). The broader concept of visuospatial working memory is assumed to comprise separable resources and mechanisms dedicated to visual and spatial information ([@c49]; [@c56]; [@c57]). Evidence for separate visual and spatial components also comes from the finding that spatial and visual memory spans increase at different rates with age during childhood, and are poorly correlated within age groups ([@c57]).
While separate stores for verbal and visuospatial material are assumed by the MCM, the theory also states that material is often recoded for storage in other formats. For example, evidence that verbal material is represented in memory in the form of the visual appearance of the letters comes from the presence of visual similarity effects in serial written recall for visually presented verbal materials ([@c54]; [@c58]; [@c70]), and other evidence has pointed to the use of verbal labels for abstract visual patterns ([@c16]). MCM also assumes that different participants may approach tasks in multiple different ways that may not include phonological or visuospatial rehearsal mechanisms, using strategies such as employing mnemonics for remembering lists of words ([@c53]). In sum, working memory is viewed as a set of mental tools that can be applied in different combinations to support task performance, and the same task may be performed in different ways depending on which combination of working memory components are deployed.
The structure of working memory proposed by the MCM assumes a separation of processing and storage functions. In their seminal article, [@c5] investigated the effect of concurrent memory load on processing tasks (e.g., sentence verification/comprehension, logical statement verification), and found that dual-task costs to processing were only observed at longer list lengths, and that greater interference effects than those observed should be expected if both storage and processing relied on a single limited resource. This argument has been made in a number of subsequent studies citing small or null effects as evidence for separate resources for each type of task (e.g., [@c37]; [@c38], [@c39]). Evidence for the separation of memory and processing is further provided by reports of low correlations between measures of memory span and measures of processing span (e.g., [@c35]; [@c55]; [@c82]). Neuropsychological studies have also been used to argue for a dual-tasking ability based on coordination of multiple components; for example, [@c51]) and [@c59]) identified a specific dual-task deficit in Alzheimer's patients that was not present in younger and older healthy controls. A key feature of dual-tasking studies within the MCM framework is that the cognitive demand of each task is adjusted (titrated) to the ability each individual participant, and this measured single-task ability is used to set the demand level both when performing each task on its own and when performing the two tasks together. This is done to ensure that any dual-task effect can be attributed specifically to the dual-task condition, and not because the individual-tasks were simply set at too high a level for the participant (for a more detailed discussion, see [@c51]).
Time-Based Resource Sharing (TBRS) Model {#s3}
========================================
The TBRS model assumes that both functions of working memory, processing and storage, rely in part on a shared, general-purpose, limited capacity attentional resource. Because a central bottleneck constrains cognitive operations to take place one at a time, when attention is occupied by processing it is no longer available for maintaining memory traces and so these traces suffer from temporal decay and interference. However, decayed memory traces may be restored through attentional refreshing when attention is available during pauses in processing. While temporary verbal memory can be bolstered by subvocal rehearsal in a phonological loop, performance is highly dependent on access to the focus of attention. The empirical basis for the theory is a number of observations of how the demand of a secondary processing task is inversely correlated with memory performance in a dual-task complex span paradigm (see [@c12], for a review). This attentional demand of a processing task is discussed in terms of its "cognitive load," which refers to the proportion of time the processing task captures attention and therefore diverts the focus away from maintenance of temporary memory traces. Crucially, the TBRS model differentiates itself from pure decay-based theories of short-term forgetting in stating that it is not the overall duration of the processing component that matters but rather how much time between processing items is available for maintaining the representations of the memoranda.
TBRS research has demonstrated how cognitive load can be increased by increasing the number of retrievals from long-term memory (LTM; or the number of responses required by a secondary task), increasing the time taken to respond to each item of a distractor task, and decreasing the time of the processing period while keeping other factors constant (resulting in a smaller proportion of the time being available to refresh memory traces). These manipulations all result in higher cognitive load and thus poorer memory performance (e.g., [@c9]; [@c10]).
Attentional refreshing, the specific process that is interrupted by high cognitive load tasks, is described as separate from the subvocal rehearsal that is assumed to take place in the phonological loop (for reviews, see [@c17]; [@c18]). Supporting evidence from brain imaging studies shows different activation patterns for each form of maintenance ([@c68]; [@c77]). The TBRS model states that refreshing can be actively or passively engaged depending on whether subvocal rehearsal is available or effective given task parameters or indeed whether participants are instructed to rehearse or refresh ([@c19]). In the same way as processing prevents refreshing, refreshing activities postpone processing, as [@c81] observed a slowing of processing task responses with increasing memory loads (see also [@c20]). It is important to note that this effect occurs only when the phonological loop is unavailable (e.g., under AS) or when its capacity is exceeded. Importantly, the same study by [@c81] provided evidence that, contrary to verbal information for which a domain-specific storage system exists (i.e., the phonological loop), visuospatial information is not maintained by any domain-specific storage system and so its maintenance relies entirely on attention ([@c61]; see also [@c62]).
Embedded Processes (EP) {#s4}
=======================
The EP model, in its iterations over the years, has been developed to account for a wide range of empirical findings within a single framework ([@c25], [@c26], [@c27], [@c28], [@c29]). According to the model, a subset of features from environmental stimuli and past events associated with present thoughts are temporarily activated within LTM. This embedded subset of information then enjoys a heightened state of activation while remaining vulnerable to time-based decay and similarity-based interference. A subset of the activated features can be made further salient and integrated into coherent objects and scenes when placed under the focus of attention, which allows a deeper semantic analysis of stimuli. The focus of attention is said to be limited to somewhere between three and five representational units ([@c31]), which may be single-featured items or "chunked" items with multiple features (e.g., shape, color, location, orientation; [@c27]).
The EP model assumes a limited-capacity domain-general central attentional controller ([@c26]). Its role is to supervise covert processes that serve to maintain information over time by reactivating decaying memory representations via subvocal rehearsal, as well as × activation × way of the focus of attention. These activation procedures have been found to have an observable cost to processing tasks within a dual-task paradigm, such as drop in accuracy on nonverbal choice reaction time (RT) tasks with increasing concurrent verbal memory load ([@c20]).
Temporary information in working memory is therefore represented within this hierarchical system. LTM representations are initially activated by incoming stimuli and information is then further activated within the focus of attention where it must be maintained. Once information leaves the focus of attention it begins to decay, and this decay can only be combated by reactivation within the focus of attention or through subvocal rehearsal. Although items represented within activated LTM memory are partially protected from decay, interference between items can occur based on overlapping features between individual items.
Comparisons Between the Theoretical Views {#s5}
=========================================
In the present work, the three theoretical views we have described were compared in terms of the effects of processing on storage and vice versa, in a dual-task setting in which a verbal recall task is combined with processing in a different domain. A conundrum that must be appreciated to understand our approach is that all three of the views are capable of predicting interference between tasks under some circumstances. In the MCM approach, if the capacity of verbal storage is reached, additional items can be saved by recoding the information in visuospatial terms (or semantic representations), at the expense of visuospatial or semantic aspects of processing. In the TBRS approach, any attention needed for processing conflicts with attention needed for refreshing of the items to be retained. Finally, in the EP approach, the limited capacity of the focus of attention must be shared between items to be remembered and the goals, procedures, and data for processing. Given this convergence between approaches, a comparison of the models depends on more specific predictions and suppositions related to the experimental tasks.
The detailed predictions from the three theoretical frameworks will be presented after the task methods. Crucially, these methods incorporate key features that were intended to avoid some procedural differences across labs that might have given rise to contrasting results between testing sites. One aspect of working memory that is widely accepted is that its capacity varies from one individual to another, even if there are debates about how that individual variability should be measured. However, in many studies in which working memory load is manipulated, the task demands in different conditions are the same for all participants. This means that for someone with a high working memory capacity, an experimental manipulation intended to impose a high cognitive load, might, for them, actually be a low load relative to their capacity. Conversely, for someone with a low working memory capacity, what is deemed to be a low cognitive load in an experiment might, for this individual, effectively be a high cognitive load. By averaging the results across participants, in one lab that happens to recruit high capacity individuals, they might observe little or no effect of increasing the load of a single-task, or of requiring a processing task to be performed while retaining a memory load. In labs that happen to recruit lower capacity individuals, there will be very clear effects observed for cognitive load and of dual-task manipulations. We addressed this possible sampling error in two ways. One was to run each experiment in parallel in two independent labs that have previously reported contrasting results, and to use identical equipment and software to rule out subtle, but potentially important differences between labs. More importantly, in all experiments we measured the memory span and processing span for each participant. Then the memory load without and with a processing task was set at the span-level for each participant. Likewise, the processing load without and with a memory load was set at the level of the processing span for each participant. This process of adjusting, or titrating, cognitive demand according to the span of each participant is commonly used by labs that work within the MCM framework (e.g., [@c37]), but tends not to be adopted by other labs.
A second important procedural detail is the extent to which trade-offs between memory and processing arise because of input and output conflicts when the two tasks are performed concurrently, or incompatibility between input modalities or output modalities, rather than because they require overlapping cognitive resources. Two tasks might mutually interfere because they both involve visual input, or both require an oral or keypress response. So, presenting verbal material visually and requiring an oral response, or presenting verbal material aurally and requiring a written response will require more cognitive operations than if the input and output modalities are more compatible, that is, aural input and oral response or visual input and written/typed response. We can avoid input and output conflicts by using a memory preload, with the processing task performed during the retention interval. Again, the extent to which these procedural details are considered varies across laboratories. Therefore in our experiments we avoid these potential artifacts by contrasting conditions in which there is aural presentation and oral recall of verbal memoranda with visual presentation and typed recall of these memoranda, without and with a visually presented processing task with a speeded single keypress response during a retention interval. This is illustrated in [Figure 1](#fig1){#fgc1-1 ref-type="fig"}.[](#fig1){ref-type="fig-anchor"}
Finally, when comparing single- and dual-task conditions, in some experiments, the single-task conditions always come first, or the order of single- and dual-tasks is counterbalanced across participants. The former approach could lead to practice effects on the tasks that could reduce the potential impact of requiring dual-task performance. The latter approach could lead to half of the participants showing a dual-task trade-off, because of unfamiliarity with each task and with performing two tasks together when the dual-task condition comes first, and the other half showing no such trade-off. We avoided these potential problems by requiring single-task performance before and after the dual-task condition. Comparing before and after single-task allowed an assessment of whether practice effects were evident in the tasks being combined. Also, the procedure for assessing span on each task acted to familiarize participants with each task before assessing single- and dual-task performance, and this should help to reduce the impact of task practice. In all of the experiments reported here we observed either null or small practice effects between the first and second single-task blocks, but crucially these practice effects did not change the observed patterns of statistically significant dual-task effects. For this reason the results of these analyses of practice effects are reported in the [online supplementary materials](#supp).
Overview of Experiments {#s6}
=======================
In the current article, we present the results of four experiments with young adults. These experiments were designed to address differences among the assumptions and associated predictions from the three theoretical frameworks regarding whether or how the combination of processing and remembering affects performance of each relative to when they are each performed on their own. The theories also predict different effects of AS on visually or aurally presented verbal memory stimuli due to differences in the number of components or subsystems each framework contains.
In all of the experiments reported here, the focus was on how processing during a memory retention interval affects, or is affected by, serial ordered recall of a verbal memory preload when both the memory load and the processing load are set at the measured span (titrated) for each individual. The memory task involved presentation of a random letter sequence, followed by a blank retention interval (single-task) or a processing task (dual-task), then serial ordered recall of the letter sequence. The processing task involved speeded verification of simple arithmetic. The materials for each task were chosen to be compatible with testing English-speaking (U.K.) participants and French-speaking (Swiss) participants. The tasks were performed without or with AS, for reasons given later in the predictions from each theoretical framework. In line with our earlier discussion about possible procedural artifacts, in Experiments 1 and 3, the memory list was presented visually and recall responses were typed on the computer keyboard. In Experiments 2 and 4, the memory list was presented aurally and participants recalled the list orally. In Experiments 1 and 2, titration of span was carried out without AS, while it was carried out under AS in Experiments 3 and 4. For each experiment we tested differential predictions from each of the three theoretical frameworks.
Experiment 1 {#s7}
============
The starkest contrast between the theories is MCM's assumption that, with healthy adults, storage and processing can occur in parallel with little to no effect on performance in either task (e.g., [@c55]), particularly if tasks are titrated according to each participant's individual abilities (e.g., [@c37]; [@c51]), while both TBRS (e.g., [@c11]; [@c9], [@c10]) and EP (e.g., [@c20]; [@c32]) argue for interference effects due to a shared central resource. MCM also argues for a visual store to support memory for visually presented verbal material (see [@c47]; [@c54], [@c58]; [@c70]) and use of mnemonics (e.g., [@c53]; [@c66]) that can have a small effect on concurrent processing accuracy when rehearsal is prevented by AS, and so predicts more complex interaction effects than the additive main effects predicted by TBRS, and different patterns of interactions than the slot-based capacity of temporary memory argued by the EP theory. Experiment 1 aimed to investigate different predictions from each theory for the effects on a visually presented verbal memory task and a visually presented verbal processing task of performing both memory and processing together relative to performing each on its own, and also the effect of AS on the presence or magnitude of these effects.
Method {#s8}
------
This experiment, and all subsequent experiments, were approved by the ethics committees for The University of Edinburgh, The University of Fribourg, and The University of Geneva. The general trial sequences for all experiments are shown in [Figure 1](#fig1){#fgc1-2 ref-type="fig"}.
### Participants {#s9}
Participants were recruited from the student populations at the University of Edinburgh, United Kingdom, and the Universities of Fribourg and Geneva, Switzerland. They received different honoraria in each country due to concerns about differing motivation for cash rewards in each location. In the United Kingdom, participants were compensated for their time with an honorarium of £12. In Switzerland, participants were either offered cinema vouchers (equivalent to 16 CHF) or course credit. Sixty-four participants were recruited in total, 32 from each country (48 female and 16 male, *M*~age~ = 22.19, *SD* = 2.56). The sample size in each lab was selected to be comparable with previous research in the working memory literature, but to consist of a relatively large sample when compared to previous MCM, TBRS, and EP research.
### Apparatus {#s10}
Because the experiment was conducted across laboratories, efforts were made to ensure that the same equipment was used in each location. Each lab was equipped with the same model of laptop running PsychoPy (Version 1.84.2; [@c67]), connected to the same models of external monitor, headphones, and button boxes. Due to differences in British English and Swiss French keyboard layouts, different models of keyboards were used at each site. PsychoPy settings and external monitors were set so that text stimuli were presented with an approximate vertical visual angle height of 1.3°. The same equipment and settings were used for all other experiments described in this article. The experimenter remained in the room during the experiment.
### Procedure {#s11}
The session began with a recognition task, in which participants were shown letters on screen and immediately typed the presented letter. Data from the pretest served as a check that the memory stimuli were sufficiently distinguishable from each other, and are reported in the [online supplementary materials](#supp). The pretest was followed by the memory and processing titration conditions, which set the load levels for the single- and dual-task conditions for each participant. Participants completed the single- and dual-task conditions without and with AS, with half the participants completing the no-AS condition first and half starting with the AS condition. In each no-AS and AS block, participants started a single-task memory block and a single-task processing block consisting of 10 trials each (the order of the memory and processing blocks were also counterbalanced). This was followed by two blocks of 10 dual-task trials, followed again by two single-task blocks of memory and processing. Each participant therefore completed 40 single-task memory trials (20 without and 20 with AS), 40 single-task processing trials (20 without and 20 with AS), and 40 dual-task trials (20 without and 20 with AS).
#### Memory and processing titration procedure {#s12}
Before the experimental conditions, both memory and processing loads were titrated to each participant's individual abilities. The titration conditions followed a "staircase" procedure, in which the demand of a task was increased or decreased depending on a participant's performance. Sixteen trials were presented in total, in pairs of two set at each level of demand, starting at five items for both tasks. If accuracy across a pair of trials was ≥80%, the demand of the task was increased for the next two trials; if accuracy was below 80% the demand was decreased. If a participant passed the final two trials (i.e., the eighth pair, Trials 15 and 16), and these two trials were the highest "level" they had reached up until that point, then additional pairs of trials were administered until failure to reach the 80% correct criterion. Participants' memory and processing spans were recorded as the highest level at which they achieved 80% accuracy or above. Three practice trials were given at the start of each titration, with demand set to four items. Memory and processing titration were completed without AS in this experiment.
#### Single-task memory {#s13}
The same set of letters was used for both English and French stimulus sets, which contained all the letters of the alphabet except vowels (to reduce pronounceability of memory sequences), and multisyllable letters from either language (*w*, *y*). The letter *z* was also excluded due to the desire to maintain parity with the stimulus sets for WoMAAC aging studies conducted across U.K. and U.S. laboratories, as *z* is pronounced differently in British and American English. Lists were randomly generated for each trial, without replacement. Participants initiated each trial with a button press, which was followed by a 2-s interval. Letters were then presented in the center of the screen sequentially for 250 ms each, with a 750-ms interstimulus interval (ISI). Therefore, the study phase lasted *n* × 1,000 ms. The onset of the last letter was followed by a two second interval, followed by a 10-s retention interval that consisted of five circles flashed on the monitor at a rate of one every 2 s, with a 250-ms ISI. Following the retention interval a 400-Hz tone sounded to prompt recall. Participant recalled items using the keyboard, and were able to pass on a letter by pressing the *0* key.
The AS conditions proceeded in much the same way, except that 1 s before the presentation of the first letter, a 400-Hz tone sounded to prompt participants to begin repeating "ba" at a rate of two per second (see [Figure 1](#fig1){#fgc1-3 ref-type="fig"}). Before each AS condition participants were presented with a tone playing twice every second to demonstrate the speed they should be repeating "ba." Participants were instructed to cease AS when they heard the second tone (after the 10-s interval), and recall the memory items by typing them on the keyboard. To be clear, AS commenced prior to the start of the presentation of the memory sequence, and continued until after the filled or unfilled retention interval. This procedure was important for the MCM, which assumes that AS disrupts the use of phonological encoding and subvocal rehearsal of the visually presented letter sequence.
#### Single-task processing (arithmetic verification) {#s14}
The processing task required participants to verify simple equations (e.g., "3 + 5 = 8, correct/incorrect?"). These equations were randomly generated for each trial, with each equation having a 50% probability of being presented with a correct solution. Participants initiated trials with a button press, after which they heard five 250-ms-long, 300-Hz "placeholder" beeps played once every second. Two seconds after the onset of the final beep, the first equation appeared for (10,000/*n*) -- 250 ms (where *n* is the number of items to be presented), followed by a 250-ms ISI, then the next equation. Following the presentation of the final equation, a 400-Hz tone played to signify the end of the trial. Participants pressed a button marked with a "tick" (or "check") for correct equations, and a button marked with a "cross" for incorrect equations (as they appeared on the screen). The task progressed whether the participant responded within the presentation time or ISI or not, that is, the sums remained on screen during their entire presentation window, and the ISI always occurred in full, regardless of the RT of the participant.
In the AS condition, a 400-Hz beep preceded the first 300-Hz placeholder beep to prompt participants to begin repeating "ba--ba--ba." They were instructed to cease AS once they heard the second 400-Hz beep.
#### Dual-task {#s15}
The single-task memory and processing procedures were designed to match the timing of the dual-task condition with the use of placeholder beeps or circles. Dual-task trials therefore proceeded in a similar fashion to the single-task memory condition, both without and with AS, except that instead of the placeholder circles appearing during the 10-s retention interval the arithmetic verification task appeared. Participants were instructed to complete both tasks, with no importance being placed on one task or the other by the instructions or by the experimenter. Participants were given three practice trials before the first 10 experimental dual-task trials were presented. The demand for the dual-task practice trials was set at one item below each participant's span.
### Predictions {#s16}
Although each of the theoretical frameworks incorporates different assumptions, and therefore makes different predictions, none is a formal computational model and therefore the predictions are qualitative. The predictions refer to whether or not an effect is expected to be present, and whether any such effect will be small, medium, or large. Because the models cannot make specific predictions for the size of effects, particular emphasis was placed on predicting the size of effects in relation to other factors within the experiment (e.g., the size of the dual-task effect compared to the AS effect), and in later experiments predicting effect sizes in relation to previous experiments. The hierarchical models we describe in the upcoming analysis section estimate a random participant effect standard deviation, therefore summarizing the average difference between participants in the dependent variable (i.e., accuracy, or more specifically the log odds of a correct response). It is therefore possible to specify the size of effects arising from experimental designs by placing them on a scale of differences due to individual differences. WoMAAC partners were asked to generate their predictions with this scale in mind.
Predictions were specified in terms of small, medium, and large effects. Translating these into a common scale we used conventional criteria to refer to effects on the scale of expected individual differences ([@c22]). Consequently, 0.2 of the average difference between individuals represents a small effect, 0.5 a medium effect, and 0.8 a large effect. These values were chosen as reasonable for effect sizes in research on memory ([@c63]).[^1^](#fn1){ref-type="fn"} To supplement the description of each account's predictions simulated data conforming to the described expectations were generated and plotted and can be found on the OSF. Although each framework was required to generate predictions on the full set of variables, some predictions were speculative and not central to a particular theory. For example, the TBRS model has in the past largely focused on costs on memory, so predicted effects of dual-tasking on processing were generated from what the model would ideally expect when attention is split between tasks. Predictions were also generated in each theory's proponents own chosen format: MCM and TBRS predictions focused on previous findings in the working memory literature, while EP generated predictions based on a simple capacity model created specifically for this experimental paradigm. The mathematical model generated by EP is available to view on the OSF, while a written summary of it is reported here for easy comparison with the predictions from the other theories. [Table 1](#tbl1){ref-type="table"} summarizes the predictions made by each of the theories, and the full descriptions of these predictions are described in the next sections.[](#tbl1){ref-type="table-anchor"}
### Multiple components {#s17}
In the MCM, serial-ordered recall with visual presentation of a letter sequence is assumed to reflect (a) translation of the visually presented items into a phonological code; (b) the involvement of the phonological loop, comprising a passive phonological store and subvocal articulatory rehearsal to retain both item and serial order information as phonological codes; (c) visual encoding of the letters in a visual cache or temporary visual memory that can support item and order information; and (d) activation of representations of the visual and phonological information (of item, but not order) about the letters in LTM. All elements are thought to contribute to the observed span score. However, phonological encoding will dominate span performance when subvocal articulatory rehearsal is available. For memory above the span levels that are typical of healthy adults, there is thought to be an additional contribution from a range of mnemonic strategies such as chunking or semantic associations.
Visually presented items for arithmetic verification are assumed to involve activation of arithmetic knowledge in LTM and a decision process together with initiation of a manual response. None of these aspects of the task is thought to require use of the phonological loop, and so no effect of AS on processing is predicted by the MCM.
Visually presented memory items may be disrupted by the arithmetic verification task during the retention interval due to the concurrent activation in LTM of arithmetic knowledge and of letter representations. In addition to these disruptive effects, there may be an additional small disruption to memory because of the visually presented arithmetic disrupting the contents of the visual cache. The overall disruption will be seen as a small effect size because the operation of the phonological store and articulatory rehearsal will be unaffected by visually presented arithmetic verification. This prediction is derived from previous studies that have shown no, or small dual-task costs when combining an at-span verbal memory preload with a processing task (e.g., [@c21]; [@c51]), and evidence showing low correlations between processing and memory performance (e.g., [@c35]; [@c55]; [@c82]).
MCM assumes that AS during the encoding and retention phases will prevent phonological encoding and articulatory rehearsal of the memory items, and encourage the use of visual codes (e.g., [@c54], [@c58]; [@c70]). Memory for visually presented letters will be impaired, because of a lack of phonological encoding and articulatory rehearsal, but will only be a medium effect size and will remain well above floor through a combination of passive storage within the visual cache, and activation of letter representations in LTM.
For dual-task with AS, memory for visually presented items will be impaired with a medium effect size because of the use of visual codes to support memory even when there is a lack of phonological encoding and articulatory rehearsal. This means there will be a Dual-Task × AS interaction, with a larger dual-task effect under AS. The support from visual codes may be less effective than for memory alone plus suppression because of interference from the visual presentation and manual response for arithmetic verification.
Under AS, there will be a small dual-task effect on verification because of participants attempting to use mnemonic strategies for retaining the letters to try to compensate for the lack of articulatory rehearsal. Therefore, for processing, a small interaction is also predicted such that there is a dual-task effect only under AS.
### Time-based resource sharing {#s18}
Verbal memory span reflects the involvement of both the phonological loop and the executive loop in the TBRS model (see [@c18] for a review). At span (single-task, no AS), participants should recruit all the resources at their disposal, that is, because the phonological loop is limited to about four letters, the executive loop is used to "boost" performance beyond this limit. Thus, performing a processing task that involves attention (i.e., addition verification task) should disrupt the maintenance of verbal information through the executive loop and lead to a poorer memory performance than in the single-task condition.
The addition of concurrent articulation will impair the use of the phonological loop, resulting in poorer recall performance. Previous experiments showed that such a reduction is stronger than the reduction produced by a concurrent attentional-demanding task (e.g., [@c17]). Thus, TBRS predicts a medium main effect of task and a large main effect of suppression. Finally, the joint impairment of the phonological and executive loops by a concurrent articulation and the addition verification task, respectively, should lead to additive effects, and to a minimum recall performance. This should constitute a residual memory performance that remains when working memory maintenance mechanisms are blocked.
For the processing task, performing the addition verification task involves the executive loop. Because maintaining letters at span also involves the executive loop, a medium detrimental effect on processing should be observed in the dual-task condition compared with the single-task condition. AS should not have any effect on addition verification, except if AS induces a small attentional capture. In such a case, the addition of AS should result in a small reduction in processing performance. Therefore, two additive main effects are predicted, with the possibility of a small interaction to the extent that the addition task requires phonological processes.
### Embedded processes {#s19}
The EP model assumes that task relevant information from LTM is held in a heightened state of activation subject to decay and interference from other items with similar features. A subset of that activated information can be held in the focus of attention, which helps to overcome decay and interference. Additionally, a way to prolong and improve the maintenance of some verbal information with very little contribution of attention is through subvocal rehearsal.
To coordinate a verbal memory and verbal processing, dual-task participants must share the capacity of the focus of attention between these tasks. Compared to single-task performance, dual-task accuracy on memory and processing is predicted to be lower due to the need to split attention between these two tasks. Both tasks are assumed to benefit from subvocal rehearsal, and so an effect of AS on both tasks is predicted. However, memory performance also benefits from both rehearsal during encoding (as there is no AS during encoding for visually presented memory items) and visual sensory memory (due to memory items being presented visually). While rehearsal prevents time-based decay, visual sensory memory supports performance by providing additional storage while also freeing up the focus of attention for storage of other memory items. Likewise, the arithmetic task is assumed to rely on some mechanisms that are not relevant to the memory task (likely well-learned mathematical rules that can be recalled from LTM). This task also benefits from visual sensory memory, as the use of this separate storage frees up the focus of attention for processing.
These different factors contributing to single- and dual-task performance for each task lead to a set of predictions based on the overlap in shared mechanisms for each tasks. To make these predictions, some assumptions need to be made regarding the behavior of participants: (a) that participants are motivated to use all available resources to complete tasks and (b) that the attentional costs of the processing task can be expressed in terms of the number of items held in the focus of attention, as it is with the memory task. Although the theory does not specify the allocation of attention between tasks, when encouraged to make a guess at the allocation, the protagonists of this theory simply guessed that participants would split attention and other shared resources equally between the memory and processing tasks.
In sum, based on the assumptions made by the model as to the separate and shared mechanisms utilized for the memory and processing tasks, EP predicts large dual-task and AS costs to both memory and processing tasks. The model also predicts a smaller dual-task cost under AS (i.e., a medium interaction effect), as the shared subvocal resource is no longer split between the two tasks in single- and dual-task conditions, so the dual-task costs are reduced compared to the no AS condition.
Results {#s20}
-------
### Analysis method {#s21}
To avoid the potential pitfalls of conventional methods (e.g., ANOVA and other normal models can lead to spurious results, particularly in the interpretation of interaction effects [@c36]; [@c43]), data were analyzed using generalized linear mixed effects models ([@c14]). This method allowed modeling of non-normal response variables (via a logit link function) while also acknowledging that observations are nested within individuals (i.e., repeated measures). The analyses were conducted using the lme4 package (Version 1.1--17, [@c13]), and the full analysis scripts for the experiments reported in this article are available on the OSF. List of memory items and sequences of sums were analyzed on a by item basis: that is, if a participant remembered/responded correctly to three out of four items in a list/sequence, then the log odds would be modeled on this performance. Although participants were able to answer pass for the memory task, these responses were simply coded as incorrect for the purposes of analysis.
As detailed in the previous section, WoMAAC partners provided effect size predictions, but the first step of our analyses involved reducing the complexity of models to effects of interest. Initially full models, with all main effects and interactions plus a random intercept for each participant, were fitted to the memory and processing data. For both memory and processing data the main effects were task (single vs. dual), AS (without vs. with), and site (Switzerland vs. United Kingdom), and all interactions, including the three-way Task × AS × Site interaction, were included. The first model comparison involved removing the highest order interaction (the three-way interaction), and comparing it with the reduced candidate model. Model comparison was based on Bayesian information criterion (BIC) values ([@c75]): If these values were lower for the candidate model, this was evidence for the removal of the effect and to use the new simpler model for future comparisons. Two-way interactions, and then main effects, were then considered in turn. Each two-way interaction and main effect was considered separately with a model containing all other effects (apart from already removed higher order effects). If model comparison favored the inclusion of an interaction, lower order interactions or main effects contained within that interaction were not considered for removal later in the chain. Summaries of the best-fitting statistical models from each experiment are reported in this article, but the full analysis script showing each step is available on the OSF.
### Analyses {#s22}
Mean memory span was 6.34 (*SD* = 1.28), and mean processing span was 8.00 (*SD* = 2.0). The best fitting memory and processing statistical models are summarized in [Table 2](#tbl2){ref-type="table"}. Because model comparison was conducted via BIC comparison, it is possible to calculate a Bayes factor comparing the winning statistical models to the next best candidate model. The Bayes factor in favor of the best fitting statistical model for memory was 31.34 (BIC for best fitting statistical model = 21,696.57; BIC for next best candidate model = 21,703.46), and for processing the Bayes factor in favor of the best fitting statistical model was 6,734.51 (BIC = 16,022.03; BIC for next best candidate model = 16,039.67). For memory, there were statistically significant main effects of dual-task (*ES*~scaled~ = −0.73) and of AS (−2.96). Although the effect of site was not statistically significant, the model comparison method described earlier resulted in the retention of Condition × Site and AS × Site interactions, both of which were statistically significant in the model (*ES*~scaled~ = −0.30 and 0.39, respectively). These interactions reflect a larger dual-task effect at the U.K. lab, and a smaller AS effect in the U.K. lab compared to the Swiss lab (note that the former interaction effect runs counter to the pattern that would be expected due to testing site bias). [Figure 2](#fig2){#fgc2-1 ref-type="fig"} summarizes dual-task and AS effects split across labs and clearly demonstrates the source of the interactions is the larger single-task AS effect in the Swiss lab reducing the dual-task effect in the same lab. Contrary to the memory task, processing performance was not affected by either dual-task or AS manipulations (see [Figure 3](#fig3){#fgc3-1 ref-type="fig"} for plotted data).[](#tbl2){ref-type="table-anchor"}[](#fig2){ref-type="fig-anchor"}[](#fig3){ref-type="fig-anchor"}
Discussion: Summary of Experiment 1 {#s23}
-----------------------------------
All three theories made clear predictions for the outcome of Experiment 1, ranging from null effects (MCM), to additive effects of dual-task and AS (TBRS), to interactions between these two effects (MCM/EP). While each of the models predicted some of the observed effects, no account predicted the complete pattern of results.
A large dual-task effect was observed for memory performance. This does not fit with the predictions from the MCM of a small disruptive effect of processing on memory accuracy. Both TBRS and EP predicted the dual-task effect, yet both models predicted medium effect sizes where a very large effect size was observed. All three models predicted an effect of AS, though both MCM and EP predicted a medium effect size where a large effect as predicted by TBRS was in fact observed.
It is important to note that constrained effect sizes were used for predictions of small, medium, and large effect sizes (0.2, 0.5, and 0.8, respectively), so it may be considered more informative to compare each model's predicted magnitude of dual-task and AS effects. Thus, TBRS correctly predicted that the dual-task effect would be smaller than the AS effect. MCM also predicted this pattern, but only because such a small effect of dual-task was predicted and the predicted size of the AS effect was still smaller than that observed. When forced to make a prediction of the relative effect sizes for dual-task and AS, EP assumed equal contribution of attention to rehearsal and processing and so predicted that these effects would be equal, which the data do not support.
MCM and EP both predicted Dual-Task × AS interactions with memory, though each predicted different patterns. Neither of these interactions was present in the data. Contrary to the MCM prediction, the effect of dual-task was present without and with AS, and the introduction of AS did not reduce the size of the dual-task effect as predicted by EP. That is, it appeared that the effects of dual-task and of AS were independent and additive.
TBRS predicted a medium dual-task effect and a small AS effect on processing with no interaction, while the EP model predicted the same Dual-Task × AS interaction as it did for memory where a smaller dual-task effect was observed under AS. Neither of these patterns was observed in the data. The MCM prediction of no dual-task effect on processing when there was no concurrent AS was accurate, yet the Dual-Task × AS interaction prediction was not confirmed, as AS did not introduce a statistically significant effect of task.
Finally, although large effects of AS and dual-task were found for memory performance, performance levels were still well above chance even when both dual-task and AS were required. This highlights a difference in emphasis between the three theoretical approaches, with MCM studies typically pointing to the size of the residual performance levels, even under high cognitive load, whereas TBRS and EP typically note the reduction in performance relative to baseline levels.
In summary, while each model predicted some trends no account provided a satisfactory approximation of all the observed data patterns. Where some models succeeded, for example TBRS and EP in predicting dual-task effects on memory, those same models failed to predict patterns in the processing task. The opposite pattern was partially true for MCM, where small dual-task effects on processing were predicted while the dual-task effects on memory were not. Considering that the models all specify some interplay between memory and processing in working memory, accurate or semiaccurate predictions of one half of the data are not sufficient to identify a "winning" framework.
Experiment 2 {#s24}
============
Experiment 1 investigated the effect of the dual-task and AS on memory and processing, and found large effects of both on memory but no effects on processing. Experiment 1 featured visual presentation of memory items, which, according to the MCM, meant that these items were verbally recoded when there was no concurrent AS but that suppression prevented recoding leading to a dual-task effect. It occurred that there was a dual-task effect in both no-AS and AS conditions, but such a recoding hypothesis was only presented by the MCM and so may be of use when differentiating between the models. Experiment 2, therefore, replaced the visually presented memory task and typed recall with an aurally presented task and oral recall. In Experiment 2, we aimed to investigate whether the presentation format changed the pattern of statistically significant effects or increased/decreased the magnitude of these effects, as only the MCM would make strong predictions regarding differences in performance due to presentation format.
Method {#s25}
------
### Participants {#s26}
As mentioned previously, data collection for Experiments 1 and 2 ran concurrently, and so participants were recruited in the same way as described in Experiment 1, resulting in a sample of 64 participants, 32 from the United Kingdom and 32 from Switzerland (46 female and 18 male, *M*~age~ = 20.96, *SD* = 2.46). The samples for Experiments 1 and 2 were independent.
### Procedure {#s27}
The procedure for Experiment 2 proceeded in the same way as in Experiment 1, except for the substitution of an aurally presented task in place of the visually presented memory task, and participants responded orally rather than typing their responses.
### Aurally presented verbal memory task {#s28}
Memory task stimuli were generated using the built-in Apple OS × 10.11.4 voice. The American English voice "Allison" was used in the U.K. lab, and the French voice "Audrey" was used in the Swiss lab. The same list of letters from Experiment 1 was used in Experiment 2, and lists were again randomly generated for each trial without replacement. The auditorily presented memory task proceeded with the same timing as the visual presentation memory task in Experiment 1. Memory item onsets were separated by 1,000 ms, so that the study phase (as with Experiment 1) was *n* × 1,000 ms. Following the blank retention interval, or the retention interval filled with the processing phase, a 400-Hz tone prompted participants to orally recall the letters, saying, "pass" for any letter they could not remember. The experimenter typed the participants' responses on a separate keyboard and monitor. Both the experimenter's keyboard and monitor were out of view of participants.
In the AS conditions, the 400-Hz tone signaling the beginning of the AS component of the task was played 1,000 ms after the onset of the last memory item, rather than before the onset of the memory items as it had in Experiment 1. In Experiment 1 the AS during encoding was to maximize the use of nonphonological memory processes (i.e., to avoid phonological storage through recoding of the memory items); the encoding phase in the AS condition for Experiment 2 was presented in silence to maximize the likelihood of phonological storage of memory items---an important procedural consideration for the MCM.
### Predictions {#s29}
Data for Experiments 1 and 2 were collected concurrently, so the predictions for Experiment 2 do not take into account the findings from Experiment 1. The predictions for Experiment 2 are summarized in [Table 1](#tbl1){ref-type="table"}.
### Multiple components {#s30}
In the MCM, serial-ordered memory span with aural presentation of letters is assumed to reflect (a) a passive phonological store, (b) articulatory rehearsal, and (c) activation of representation of the letters in LTM for items, but not order. All three elements are thought to contribute to the observed span score. For memory above span levels that are typical for healthy adults, there is thought to be a contribution from a range of mnemonic strategies such as chunking or semantic associations.
When arithmetic verification is performed during a retention interval for an aural letter sequence, it is expected that the concurrent activation in LTM of arithmetic knowledge and of letter representations may result in some disruption of letter memory, because of a small contribution of LTM activation to item memory in auditory, serial order letter span. However, this disruption will not be statistically reliable because the operation of the phonological store and articulatory rehearsal will be unaffected by visually presented arithmetic verification. Thus, no dual-task cost is predicted. It is expected that there will be no effect on arithmetic verification of a memory preload of an at-span aurally presented letter sequence.
AS was added during a blank retention interval, but not during encoding. This is important because it allows for initial phonological encoding and rehearsal during presentation of the at-span letter sequence, but prevents articulatory rehearsal to retain the sequence during the retention interval. Memory for aurally presented letters will be impaired, showing a large effect of AS. Memory performance will remain above floor through a combination of passive storage within the phonological store and activation of letter representations in LTM.
When AS is added to visually presented arithmetic verification, it is anticipated that there will be no effect on verification performance. When AS is added to arithmetic verification after presentation (without suppression during encoding) of an aural preload of an at-span letter sequence, memory for the letter sequence will be impaired for the same reasons as for suppression during memory retention without arithmetic verification. The extent of the disruption will show as a large effect on memory. Thus there is no interaction predicted between suppression and task (single- vs. dual). There will be a small dual-task effect on verification under AS because of participants attempting to use mnemonic strategies for retaining the letters in an attempt to compensate for the lack of articulatory rehearsal. Therefore, for processing a small interaction is predicted such that performance should be below span (\<80%) in the dual-task with AS condition.
### Time-based resource sharing {#s31}
The TBRS predictions for Experiment 2 are unchanged from Experiment 1, with medium effect of dual-task, a large effect of suppression on memory, and a small dual-task effect on processing.
### Embedded processes {#s32}
EP predictions for Experiment 2 closely match those from Experiment 1, and follow a similar set of assumptions. While in Experiment 1 letter memory was assumed to be supported by visual sensory memory, in this experiment memory performance is assumed to be supported by auditory sensory memory. Auditory sensory memory is assumed to be more efficient than visual sensory memory for verbal materials, providing an additional source of memory that does not have to be divided between storage and processing, and so medium dual-task and AS costs are predicted in contrast to the large effects predicted in Experiment 1. As in the previous experiment, EP predicts a medium interaction between dual-task and AS in which the dual-task cost under AS is smaller due to the fact that subvocal mechanisms are no longer utilized and therefore shared between memory and processing tasks.
Results {#s33}
-------
Data from Experiment 2 were analyzed using the same methods as Experiment 1. Mean memory span was 6.52 (*SD* = 1.04), and mean processing span was 8.61 (*SD* = 2.00).
The best fitting statistical model for memory is summarized in [Table 3](#tbl3){ref-type="table"}, which displays coefficient estimates for each effect. The Bayes factor in support of this model over the more complicated candidate model (calculated using BIC values, winning model = 21,293.38, more complicated candidate = 21,309.80) was 3,677.54, and over 1 million for the simpler candidate model (BIC for simpler model = 22,739.29). There were statistically significant dual-task and AS effects. Scaling the dual-task effect in terms of average differences between participants, the effect of going from single- to dual-task results in an effect size of −1.21. The scaled AS effect size was −2.00.[](#tbl3){ref-type="table-anchor"}
There was also a large effect of site (0.68), with U.K. participants performing better on the memory task than Swiss participants. As with Experiment 1, and contrary to what would be expected by site bias, there was also a slightly larger dual-task effect in U.K. participants (Condition × Site interaction, −0.34). Interpreting this main effect of site and interaction is straightforward when splitting participants' performance across site (see [Figure 4](#fig4){#fgc4-1 ref-type="fig"}): The higher single-task performance in U.K. participants explains the larger dual-task effect. It is difficult to explain why Swiss participants did not perform at the 80% titration level, but because the interaction effect is small (and does not include the AS effect) it does not complicate interpretation of the overall data pattern.[](#fig4){ref-type="fig-anchor"}
The best fitting statistical model for processing is also summarized in [Table 3](#tbl3){ref-type="table"}. Unlike memory performance, processing performance was only affected by the introduction of a dual-task (*ES*~scaled~ = −0.43). Note that this dual-task effect was not present in Experiment 1. Processing data are summarized in [Figure 5](#fig5){#fgc5-1 ref-type="fig"}. The Bayes factor in support of the best fitting statistical model was 4103.13 (BIC for best fitting model = 15,853.39, next best candidate model BIC = 15,870.03).[](#fig5){ref-type="fig-anchor"}
Discussion {#s34}
----------
### Comparison of Experiments 1 and 2 {#s35}
Memory and processing performance in Experiments 1 and 2 were compared using the same analysis method utilized for the separate analyses, except with the addition of a format between-subjects factor. The model comparison followed the same procedure of removing effects from the model and comparing BIC values, and the winning models for each task are summarized in [Table 4](#tbl4){ref-type="table"}. The Bayes factors supporting best fitting statistical models for memory and processing were 40.20 (BIC for winning model = 42,986.90, next best candidate model = 42,994.29) and 3,344.26 (winning model = 31,876.44, next candidate = 31,892.66), respectively.[](#tbl4){ref-type="table-anchor"}
For memory, aside from the clear effects of dual-task and AS (*ES*~scaled~ = −1.65 and −2.89), the best fitting statistical model also contained format interactions (though the main effect of format was not statistically significant). The Dual-Task × Format interaction reflects a larger dual-task effect for the auditory/oral task in Experiment 2 compared to the visual/typed task of Experiment 1 (*ES* = 0.57). However the AS effect was smaller for auditory/oral compared to visual/typed (*ES* = −1.38). There was also a Format × Site interaction as U.K. participants' auditory/oral performance was higher than Swiss participants' (this effect was also detected in the memory analysis of Experiment 1). For processing, there was an overall statistically significant dual-task effect (*ES* = −0.61) which was driven by the effect observed in the auditory/oral condition (Experiment 2) as evidenced by the Dual-Task × Format interaction (0.46).
### Summary of Experiment 2 {#s36}
As with Experiment 1, a large dual-task effect on memory was observed with aural presentation of stimuli. MCM did not predict an effect of dual-task (either with or without AS), while TBRS and EP both predicted medium dual-task effects. The AS effect was predicted by all three theories, but only TBRS correctly predicted that this effect would be larger than the dual-task effect.
For processing, a medium dual-task effect was observed. TBRS predicted a small effect, and EP predicted a medium effect. MCM, however, predicted that the dual-task effect would only be present under AS (the same prediction as for Experiment 1), but this was not the case as no interaction between dual-task and AS was observed.
The between-experiment comparison revealed that the dual-task effect on memory was larger than that observed in Experiment 1. For processing, the between-experiments comparison confirmed the different patterns of data in Experiments 1 and 2 where a dual-task effect was only observed in the auditory/oral format condition. However, it is important to note the methodological differences between Experiments 1 and 2 relating to the onset of AS: For Experiment 1 (visual presentation), AS was carried out during the encoding phase, whereas in Experiment 2 the AS onset was after the presentation of the last memory item and before the processing phase/retention interval. This difference was important theoretically, as discussed in the introduction to Experiment 2. However, it may be that the differences in dual-task effect sizes were due to this difference in procedure, as AS may have interfered with encoding in Experiment 1 while having a start up cost that interfered with processing in Experiment 2.
MCM was the only model to propose different patterns of memory performance between Experiments 1 and 2, predicting a small dual-task effect with visual presentation and no effect for aural presentation. However, the opposite pattern was observed with a larger effect of dual-task on memory being observed in Experiment 2 compared to Experiment 1. While EP stated that different supporting memory processes were involved in visual and aural presentation tasks (i.e., visual and auditory sensory memory), the model did not predict that these differences would have an observable outcome on behavior. TBRS specifically predicted no difference between experiments, but differences were observed with a larger dual-task effect of memory in Experiment 2 than in Experiment 1, and a dual-task impact on processing in Experiment 2 that was not observed in Experiment 1. So, none of the three theoretical frameworks correctly predicted the full pattern of results observed across the two experiments.
### Titration under AS {#s37}
Experiments 1 and 2 revealed large dual-task effects on memory with both visual and auditory presentation formats, and null/small dual-task effects on processing. The three models had mixed success in predicting the patterns of results, though all three missed large trends in the data. Because Experiment 1 (visual/typed) most closely conformed to TBRS/EP for memory data, and to MCM for processing data, Experiment 3 adapted this procedure to investigate further the different assumptions regarding maintenance and processing and how maintenance and processing are affected by AS.
Each of the models makes some assumptions regarding the involvement of phonological/verbal rehearsal of memory items, and that these processes are affected by the addition of concurrent AS to the dual-task conditions. The goal of the titration procedure was to ensure that all participants were performing tasks set at appropriate levels of demand, but also to provide a reliable single-task measure of memory and processing performance. Titration of memory and processing tasks were completed without concurrent AS suppression, meaning that the memory task demand was adjusted to a level where memory was being supported by rehearsal.
Whereas all three models agreed that memory was supported by some form of subvocal rehearsal, only the MCM states that a small number of verbal memory items can be maintained with no requirement to rehearse or refresh (i.e., no attentional requirement). In MCM, subvocal rehearsal is said to "boost" memory performance beyond the capacity of this store. In Experiments 1 and 2 this means that, according to MCM, single-task memory performance is a product of not only attention-free storage but also rehearsal methods that are also affected by concurrent AS ([@c6]; [@c64]). Experiments 3 and 4 aimed to test the MCM's proposal of an attention-free verbal store by titrating memory under AS for both visual and auditory presentation formats in an attempt to more accurately measure the capacity of memory for verbal items when subvocal rehearsal is not available.
Experiment 3 {#s38}
============
Method {#s39}
------
### Participants {#s40}
Participants were recruited in the same way as in previous experiments, half in the United Kingdom and half in Switzerland. The total sample consisted of 32 participants who had not taken part in either of the previous experiments (24 female and eight male, *M*~age~ = 21.72, *SD* = 2.25).
### Procedure {#s41}
The procedure for Experiment 3 closely resembled that of Experiment 1, with visual presentation and typed recall of memory items. The primary way in which the procedure deviated was that titration of memory and processing tasks was completed under AS. The trial procedures for memory and processing trials in the titration conditions followed the same timings as the AS conditions from Experiment 1. Single- and dual-task conditions were then completed in the same order as in previous experiments, however only data for performance under AS were collected.
### Predictions {#s42}
Predictions are summarized in [Table 1](#tbl1){ref-type="table"}.
### Multiple components {#s43}
The MCM predicted that there would be no subvocal rehearsal for the memory items because this would be prevented by the AS. There may be both phonological and visual encoding, with retention in passive, domain-specific temporary memory systems. Without suppression in previous experiments, rehearsal is assumed to be a strategy to boost temporary memory performance, and so span without suppression overestimates temporary memory capacity. Because rehearsal cannot be used under AS, the titrated spans will provide a more accurate measure of the capacity of the temporary memory systems. However, there might be attempts by some participants to use mnemonic strategies instead of rehearsal, and this would use a small amount of processing resource. Thus, MCM predicts that there will be at most a small dual-task effect, but possibly no effect on memory performance (contrary to Experiment 1), and no dual-task effect on processing performance (as was found in Experiment 1).
### Time-based resource sharing {#s44}
Under AS, memory span reflects the involvement of the executive loop in the TBRS model. Thus, performing a processing task that involves attention (i.e., the addition verification task) should disrupt the maintenance of verbal information through the executive loop and lead to poorer memory performance than in the single-task condition. The model therefore predicts a medium dual-task effect on memory.
For processing, performing the addition verification task involves the executive loop. Because maintaining letters at span also involves the executive loop, a detrimental effect on processing should be observed in the dual-task condition compared to the single-task condition. The TBRS model predicts a large dual-task effect on processing.
### Embedded processes {#s45}
In Experiments 1 and 2 participants were able to make use of subvocal rehearsal to reach a high span level during the titration procedure. The data from these previous experiments have led us to revise our account such that we no longer assume that rehearsal makes a contribution to processing. Thus, the manipulation of suppression and single- versus dual-task are assumed to be independent. Therefore, we predict a large effect of single- versus dual-task on memory in the present experiment where participants are titrated under suppression. Further, we predict that the dual-task cost on memory will be larger in this experiment relative to that found in Experiments 1 and 2. This is because we assume that the processing task consumes a constant "number of items" worth of attention and consequently it will have a greater cost in terms of proportion correct items recalled in position on the smaller list lengths obtained via titration under suppression.
For processing, there is a clear asymmetry in the data from Experiments 1 and 2. According to the EP account this is due to the preferential allocation of attention to the processing items as they appear at the expense of maintaining items in memory. Therefore, we predict no effect of single- versus dual-task on processing performance.
Results {#s46}
-------
Data from Experiment 3 were analyzed using the same methods as previous experiments, yet because all the conditions were performed with suppression the process was simplified because there were only two main effects to consider: dual-task and site. Mean memory span under AS was 5.00 (*SD* = 1.00), and mean processing span under AS was 8.56 (*SD* = 2.00).
The best fitting statistical model for memory is summarized in [Table 5](#tbl5){ref-type="table"} and contained a significant main effect of dual-task (*ES*~scaled~ = −1.64) and a Dual-Task × Site interaction (−0.49). The model comparison procedure produced a Bayes factor of 1.06 against the removal of the Dual-Task × Site interaction (BIC full model = 4,498.70, BIC for model without interaction = 4,498.81). As stated in the preregistered materials, we treated BIC as a binary choice in our model comparison procedure despite the inconclusive Bayes factor. The interaction reflects a larger dual-task cost in U.K. participants. There were no effects of dual-task or site on processing, with a Bayes factor of 361.41 supporting the removal of both of these factors (BIC for best fitting statistical model = 3,813.78, BIC for next best candidate model = 3,825.56). Memory and processing data are summarized in [Figures 6](#fig6){#fgc6-1 ref-type="fig"} and [7](#fig7){#fgc7-1 ref-type="fig"}.[](#tbl5){ref-type="table-anchor"}[](#fig6){ref-type="fig-anchor"}[](#fig7){ref-type="fig-anchor"}
Discussion: Summary of Experiment 3 {#s47}
-----------------------------------
MCM predicted a small or null effect of dual-task on memory due to titration under AS resulting in a more accurate measure of the verbal memory store. Conversely, TBRS and EP predicted medium and large effects respectively. Contrary to MCM predictions, and in line with TBRS and EP, a large dual-task effect on memory was observed in Experiment 3.
Both EP and MCM predicted no effect of processing (as was observed in Experiment 1 with visual presentation and typed recall), though for different reasons. MCM predicted no effect due to separation of processing resources from memory, while EP predicted no effect on processing due to preferred allocation of attention to this more immediate task. TBRS predicted a dual-task effect on processing due to the involvement of the executive loop in maintaining memory items when subvocal rehearsal is prevented by AS. The results from Experiment 3 revealed no dual-task effect on processing---the same as was observed in Experiment 1.
Experiment 4 {#s48}
============
Experiments 3 and 4 were run consecutively (unlike Experiments 1 and 2), and so some predictions for the latter experiment were influenced by the results from the former.
Method {#s49}
------
### Participants {#s50}
Thirty-two participants took part in Experiment 4, split evenly between the two labs as with previous experiments (23 female and nine male, *M*~age~ = 21.66, *SD* = 2.39). None of the participants had taken part in previous experiments.
### Procedure {#s51}
The procedure for Experiment 4 followed that of Experiment 3, with titration under suppression. However, Experiment 4 utilized the aural presentation and oral recall memory task from Experiment 2.
### Predictions {#s52}
Predictions are summarized in [Table 1](#tbl1){ref-type="table"}.
### Multiple components {#s53}
MCM assumes that AS will prevent rehearsal of memory items but will not prevent temporary phonological storage. Participants may attempt to use mnemonic strategies instead of rehearsal, which would use a small amount of processing resources leading to (at most) a small dual-task effect on memory and processing.
So, while a large dual-task effect on memory was observed for the visual/typed experiment with titration under AS (Experiment 3), a small or zero effect is predicted by MCM with auditory presentation because aurally presented memory items will have direct access to the phonological store. A small or zero dual-task effect is also predicted for processing, with any effect due to the aforementioned potential use of mnemonics.
### Time-based resource sharing {#s54}
The TBRS model predicts the same pattern of results as observed in Experiment 3. The TBRS model does not make specific predictions about differences in effect sizes, but states that titration with AS will result in participants relying to different degrees on the phonological and executive loops. The extent to which participants will rely on one mechanism or the other is not precisely predictable, but the switch from a visual/typed memory task to auditory/oral is not predicted to make a difference for the effect size, so TBRS predicts that the observed dual-task effect size for memory will be at least as large as the effect observed in Experiment 3 (−1.64). TBRS amends their processing task predictions to state only that a dual-task effect will be present (without specifying an effect size) because the theory does not specify working memory mechanisms or resources uniquely related to arithmetic verification, but that it induces an attentional cost that will disrupt refreshing via the executive loop.
### Embedded processes {#s55}
As with Experiment 1 and 3, EP again predicts that the dual-task cost will be *larger* in this experiment compared to that observed in Experiment 2, because processing task has greater cost in terms of the number of items in smaller lists.
The full analysis of Experiments 1 and 2 revealed a two-way interaction between format (auditory/oral, visual/typed) and task (single, dual). Given that this comparison was, in part, made between subjects, this interaction is not expected to replicate. Consequently, with regards to comparison to the follow-up study with visual presentation and typed response titrated under AS (Experiment 3), EP predicts that the dual-task cost for memory in this auditory/oral experiment will be at least as large if not larger.
For processing, EP predicts no effect of dual-task because of the preferential allocation of attention to the processing items in the retention interval. While Experiment 2 revealed a small dual-task cost for processing, EP does not predict a replication of this pattern in this follow-up experiment. A replication of a dual-task processing cost with auditory/oral presentation of memory items when we have not observed this with visual/typed (Experiments 1 and 3) would require further theoretical changes to the EP model.
Results {#s56}
-------
Mean memory span under AS was 5.20 (*SD* = 0.94), and mean processing span under AS was 7.66 (*SD* = 2.00). The best fitting statistical models for the memory and processing are summarized in [Table 6](#tbl6){ref-type="table"}, and data are summarized in [Figures 8](#fig8){#fgc8-1 ref-type="fig"} and [9](#fig9){#fgc9-1 ref-type="fig"}. Statistically significant dual-task effects were found for both memory (*ES*~scaled~ = −1.32) and processing (−0.42). For memory, a Bayes factor of 30.67 was found in support of the best fitting statistical model (BIC = 4,432.40) over the next best candidate model (BIC = 4,439.25). For processing the best fitting statistical model was supported by a Bayes factor of 33.78 (BIC = 3,648.41) over the next best candidate model (BIC = 3,655.45). As with previous experiments, no one theoretical framework correctly predicted the full pattern of results.[](#tbl6){ref-type="table-anchor"}[](#fig8){ref-type="fig-anchor"}[](#fig9){ref-type="fig-anchor"}
Discussion {#s57}
----------
### Full comparison of Experiments 1--4 {#s58}
Following completion of the fourth experiment, we found it pertinent to compare it with all previous experiments (and EP specifically made predictions regarding effect sizes between experiments). The analysis method followed the same procedure as for individual experiments, and the best fitting statistical models for memory and processing are summarized in [Table 7](#tbl7){ref-type="table"}. For memory, the Bayes factor in support of the full model was over a million (BIC = 56,563.51) compared to the next simplest candidate model (BIC = 56,614.56), and for processing the winning model was preferred by a Bayes factor of 106.17 (BIC = 39,313.58) over the next more complex candidate model (BIC = 39,322.91).[](#tbl7){ref-type="table-anchor"}
For memory, a number of statistically significant effects were found. The dual-task and format effects and the Dual-Task × Format interaction were observed in previous analyses. The titration effect and the Format × Titration reveal performance was *higher* with titration under AS. However, these effects are artifacts due to the differences in experimental designs of Experiments 1 and 2 versus 3 and 4: Mean performance was lower in the former two experiments because AS was added after titration levels were set. This means that in Experiments 1 and 2, on average, performance was lower as the mean was "pulled down" by the AS conditions. In Experiments 3 and 4, task demands were titrated under AS to 80% performance levels, and no additional load was added apart from dual-task.
Of interest is the Dual-Task × Titration Type interaction for memory, which reveals that the dual-task cost to memory was larger when titration was performed under AS (Experiments 3 and 4 vs. 1 and 2). Also, the three-way Dual-Task × Format × Titration Type interaction reveals a larger dual-task effect in Experiment 3 compared to other experiments.
### Summary of Experiments 3 and 4 {#s59}
For both Experiments 3 and 4, MCM predicted a small or null effect of dual-task due to the memory task being titrated under AS, which was assumed to result in a more accurate measure of the verbal memory store by removing the "boost" to memory performance from rehearsal. However, a large effect of dual-task on memory was observed in both experiments (TBRS predicted a medium effect, while EP predicted a large effect). The between-experiment comparison revealed that this effect was in fact larger than the memory dual-task effects in Experiments 1 and 2, in which memory (and processing) were titrated without concurrent AS. This larger effect was predicted by the EP model, and was attributed to the fact that the attentional cost of the secondary task will result in a larger proportion of the shorter list lengths being forgotten (the shorter lists being a result of titrating under AS).
Experiments 3 and 4 also replicated the finding in Experiment 1 and 2, where a dual-task cost to processing was only observed when the memory stimuli were presented aurally. However, as discussed previously, it is difficult to ascertain whether this effect on processing is related to the presentation format of the memory task or due to the differences in AS onset. Specifically, the EP model predictions stated that this pattern might not be replicated in Experiments 3 and 4. MCM predicted no effect on processing in either Experiment 3 or 4, while TBRS predicted a large effect in Experiment 3 and a measurable effect (with an unspecified magnitude) in Experiment 4. As noted earlier, none of the theoretical frameworks predicted the pattern of observed results.
General Discussion {#s60}
==================
Theories of working memory attempt to both explain existing behavioral data and to predict performance on tasks based on an assumed structure and functional organization of working memory. One of the starkest differences between working memory theories, and the focus of the present study, is the effects of dual-tasking on memory and processing performance; specifically whether or not retention of memoranda relies on continued or repeated access to an attentional resource, and the performance cost of this access to a concurrent processing task. The three theories investigated in this article provided predictions ranging from no effect of dual-task on memory or processing (MCM), to a linear trade-off between the two tasks (TBRS), and to an interactive pattern of effects due to the allocation of attention to different mechanisms supporting maintenance of memory items and verifying equations (EP). No one set of predictions matched the results obtained.
One of the possible explanations for differences between studies that found null/small dual-task effects in younger adults (e.g., [@c51]) and studies that found large trade-offs between processing and storage (see review [@c12]) is that they could be due to a lack of titration in the latter body of research which instead focused on the maximum memory span achievable under dual-task rather than performance at span. For this reason, a titration procedure was utilized to ensure demand was set at appropriate levels for individual participants, therefore (according to the MCM) maximizing the likelihood that they would rely on specialized verbal stores rather than resorting to potentially attention-demanding strategies to cope with high task demand. The titration under suppression procedure in Experiments 3 and 4 aimed to further increase the use of a dedicated verbal store by removing participants' ability to subvocally rehearse.
Despite setting memory and processing demand according to each participant's individually measured spans, clear dual-task costs were observed in memory performance in all four experiments. This finding differed from previous MCM research with titrated demand that found little or no effect on memory ([@c21]; [@c37]; [@c51]), and were more consistent with dual-task costs observed in previous EP and TBRS studies. In contrast, dual-task costs on processing were either not present or very small which was consistent with previous MCM studies on younger and older adults but not consistent with EP and TBRS.
Predictions from each framework were based on supporting evidence from the literature associated with each theoretical framework. The MCM predicted no dual-task effects based on previous findings (e.g., [@c37]) and based on the assumption of a dedicated verbal store. As discussed previously, the assumption of a dedicated store dates back to the findings of [@c5] in which dual-task costs were only observed at longer list lengths (hence the use of a titration procedure here to ensure list lengths, and processing task speed, were appropriate for individual participant's abilities).
In Experiments 1 and 2 (for memory), only the prediction by MCM for the effect of AS for memory was supported by the data as a large effect of single- versus dual-task was observed in both experiments. TBRS predicted an additive effect of dual-task and AS on memory accuracy in Experiments 1 and 2, as was found. As summarized previously, the TBRS theory assumes that both storage and processing share, on a temporal basis, a common limited attentional resource through the alternating occupation of an executive loop while, for verbal maintenance, a domain-specific phonological loop can store some additional items to supplement the executive loop ([@c12]). The predicted pattern of additive effects of dual-task and AS predicted by TBRS and borne out in the data from Experiments 1 and 2 is argued by TBRS to result from independent effects of diverting attention away from refreshing and preventing subvocal rehearsal. TBRS also predicted the relative magnitude of dual-task and AS effects, with AS having a greater impact on memory accuracy presumably due to greater reliance on subvocal rehearsal mechanisms when they are available, with the comparatively lower reliance on attention-based resources remaining great enough to evoke a substantial dual-task cost.
EP also correctly predicted dual-task (and AS) effects on memory in Experiments 1 and 2, yet attributed the cause to different mechanisms. The EP and TBRS approaches are consistent in many ways, most notably the use of attention to assist memory maintenance. It is therefore difficult to distinguish between the TBRS view in which the speed of attention-based refreshing explains capacity, and the EP view in which capacity may determine the speed of refreshing, with multiple items up to the capacity limit refreshed in parallel (for simulations of these models, see [@c46]).
EP also predicted an interaction between dual-task and AS, where a smaller dual-task cost under AS was expected. The fact that these interactions were not observed is relatively inconsequential for the framework as they were predicted based on arbitrary parameter values; there was no attempt to tweak the model or optimize it to get the best fit, as is often done in a model-fitting approach. Unlike TBRS, EP does not view the lack of interaction between dual-task and AS factors as evidence for separate systems, as it is not clear whether they would benefit performance in an additive or subadditive manner.
The MCM interpretation of the interim memory data from Experiments 1 and 2 was that allowing participants full use of subvocal rehearsal and some attention-demanding maintenance mechanism during the memory titration (i.e., titration being conducted in silence) resulted in spans representing input from additional resources (e.g., a visual store, mnemonics) rather than only the specialized short-term verbal memory store. This interpretation is supported by [@c37] in which dual-task costs to processing were observed with no cost to memory spans, argued to be due to the fact that domain- or task-general attention-based sources could support memory performance (at a cost to the processing task) but that memory could not support processing due to the specialized nature of short term verbal storage resources. However, in Experiments 1 and 2 dual-task effects on processing were null and small respectively (Experiments 3 and 4 replicated the same pattern),[^2^](#fn2){ref-type="fn"} suggesting no drop in performance to support memory. This contrast with the findings from [@c37] merits exploration in future studies. It is notable that the lack of dual-task cost for processing is consistent with other previous MCM studies ([@c51]).
To further investigate the possible additional support from attention-demanding maintenance mechanisms, Experiments 3 and 4 aimed to reduce spans to be more representative of the capacity of the verbal store argued by the MCM. Titrating under AS, MCM presumed, would remove or reduce the ability of the participants to subvocally rehearse verbal memory items, and so performance would rely solely on the number of items they could store in verbal memory without rehearsal (auditory presentation), or on the support afforded by both a verbal and a visual store (visual presentation). For Experiments 3 and 4 (visual and auditory presentation respectively) MCM therefore predicted at most small effects of dual-task on verbal memory due to reliance on the verbal store and support from the visual store, with a small cost to memory performance potentially arising from the use of mnemonics being impaired by the processing task. However the MCM memory prediction was not supported by the data, as dual-task effects were larger than those observed in Experiments 1 and 2 were observed. The MCM interpretation of the observed effects speculates that, in the absence of rehearsal, people try to use mnemonic techniques to support performance, and this involves repeated access to LTM that is also required for the arithmetic verification task. It is notable that, in the original [@c5] experiments, a memory load of 3 items resulted in no impact on a reasoning or language comprehension task performed during a retention interval. A memory load of six items did affect performance on the interpolated processing task, but only on response time, not on accuracy. It is possible that titrated span scoring generates an overestimate of the capacity of the phonological store, and as with the six-item memory list used by [@c5], our titrated memory span exceeded that capacity.
Conversely, TBRS and EP both correctly predicted that the dual-task effects on memory in Experiments 3 and 4 would be larger than those observed in the previous experiments. According to TBRS, the larger dual-task effect on memory in Experiments 3 and 4 is interpreted as demonstrating the cost of diverting attention once tasks have been titrated to a level relying solely on this mechanism due to the prevention of subvocal rehearsal by AS. Forcing participants to rely on attentional refreshing results in span levels indicative of the lower capacity of this mechanism for maintenance of verbal memoranda compared to subvocal rehearsal. According to TBRS, the larger dual-task effect was observed in Experiments 3 and 4 because of greater reliance on refreshing throughout. Conversely, EP interpreted the larger dual-task effect to be due to the fact that the processing task costs memory a certain fixed number of items by taking attention, and that number of items results in a larger proportional loss when span has been reduced by eliminating the contribution of subvocal rehearsal. While both interpretations are similar the key difference is that TBRS specifies that the loss of memoranda during dual-task is due to participants reduced ability to attentionally refresh memoranda, while EP attributes forgetting to displacement of items from attention by the processing task.
The null/small dual-task effects on processing in Experiments 1--4 most closely match MCM predictions, as both TBRS and EP predicted medium/large effects. However, EP revised their predictions for Experiments 3 and 4, removing the assumption of an involvement of AS and interpreting the asymmetry in dual-task effects as being due to preferential allocation of attention to the processing task at the expense of memory performance. TBRS had assumed that because attention must be shared between memory and processing that participants would share "perfectly" between these two tasks and so the framework predicted the same dual-task cost would be observed in both. However, typical TBRS methodology has always placed a high priority on ensuring that participants are performing the processing task at a reliable level of accuracy (typically 80%) to ensure that the task reliably diverts attention away from refreshing memoranda. This emphasis typically leads to the removal of participants who perform below the accuracy criterion, though the majority of the sample is retained (e.g., [@c17], between ∼ 1% and 5% of participants removed; [@c80], between ∼6% and 8%). It appears, therefore, that although TBRS predicted dual-task costs in both tasks, the asymmetry in which the dual-task costs are present only in memory is not inconsistent with previous TBRS findings in which there are often large dual-task effects on memory, yet the majority of participants are able to maintain processing performance \>80% accuracy.
EP had predicted dual-task costs to processing based on other situations in which a processing task has, in fact, been affected by a memory task. For example, [@c20] presented a three-choice task, in which participants had to press one of three buttons corresponding to a light on screen, with the task speed adjusted to produce errors. When this processing task occurred between digits to be recalled, the increasing memory load had a strong impact on three-choice performance. The results of [@c81], in which increasing memory loads affected processing task RTs, also influenced EP predictions on the speeded choice RT task used in this set of experiments. One difference between these findings is that the arithmetic verification task is more demanding ([@c81] featured relatively simple spatial and parity judgment tasks), and so EP speculates that it may not be possible for participants to divert attention during any one processing episode to engage in mnemonic restoration.
There was mixed success by each framework in predicting trends in the data, but all missed large trends in the data. Each theory requires some reconsideration of its core assumptions, or at least under what circumstances expected effects should be observed.
For example, MCM consistently predicted no dual-task effects on memory accuracy, and incorrectly predicted that the titration under suppression manipulation would remove the unexpected dual-task effect on memory observed in Experiments 1 and 2. MCM, however, was the only theory to predict small/null dual-task effects on processing, though the framework also predicted small Dual-Task × AS interactions that were not observed. These interactions were predicted as evidence for a trade-off from the processing resource to support memory when subvocal rehearsal was prevented/reduced by AS (small dual-task effects were tentatively predicted by the MCM in Experiments 3 and 4 for the same reason). Small yet statistically significant dual-task effects were only observed in auditory/oral experiments, in which the MCM would assume that aurally presented verbal memoranda had more immediate access to a phonological store and so performance would rely less on recruitment of additional resources or the use of mnemonics and so should predict smaller effects of dual-tasking on processing than when material is presented visually.
In sum, the MCM did not predict the large dual-task effects on memory accuracy, even when the experimental procedure was altered with the goal of maximizing the use of a dedicated verbal store. The MCM processing predictions were a close approximation of the processing data and the lack of small predicted interactions is not crucial for the framework which assumes separate resources for memory and processing. The between-experiment interactions cannot be easily explained by the framework or serve as clear cut evidence of the trade-offs in performance the theory assumes. By virtue of predicting small dual-task effects on memory, the MCM did expect the large residual performance in memory performance that was observed. MCM proposes that this residual memory performance is evidence for the involvement of multiple supportive mechanisms for memory, because if only subvocal rehearsal or attention supported verbal memory performance then the introduction of both these costs should have very substantially reduced performance to a larger absolute degree than observed. Although the effects on memory were medium or large relative to the intersubject variability, even the statistically large effects were small compared with the overall performance. For example, from [Figure 2](#fig2){#fgc2-2 ref-type="fig"} (Experiment 1), the dual-task condition showed a ∼10% drop in mean proportion correct relative to single-task both with and without suppression. In [Figure 4](#fig4){#fgc4-2 ref-type="fig"} (Experiment 2), the drop is around 15% in mean proportion correct. These drops in accuracy are comparable with previous dual-task studies in the MCM framework (e.g., [@c2]; [@c39]), although previous research analyzed data using ANOVA models, whereas here we analyzed data using more appropriate methods for accuracy data. While these effects may typically be labeled as "small" in terms of changes in proportion correct, predictions on proportion correct are only appropriate when dealing with computational models, and so scaling effects in the way described in this article provide information regarding the size of the dual-task cost in relation to a reliable metric, that is, between participant variability. To qualify predictions expressed in terms of proportion correct one solution might be for MCM to develop a computational model, or to adapt the existing qualitative model to predict effects scaled to between-participants variability.
Although the MCM expected large residual performance, it should be noted that neither TBRS and EP accounts predicted a performance drop to zero; TBRS would require both AS and a cognitive load of 1, that is, complete attentional capture, to predict floor performance. In fact, the residual memory performance observed in these experiments closely resembles that observed under extreme conditions of cognitive load (e.g., [@c9]). Likewise, EP posits that participants are able to split attention between tasks while also benefiting from activations in LTM, and so would not expect floor performance with the dual-task procedure utilized in the reported experiments. While neither EP nor TBRS makes predictions about the size of the residual performance, even if they have implicit assumptions that allow a plausible explanation for the residual that was observed, MCM is more explicit in predicting a large residual. This illustrates a difference in emphasis between the theoretical frameworks, with the former two focusing on the dual-task costs, while the latter focuses on the substantial residual memory performance relative to modest dual-task effect costs to proportion correct. Also, the MCM assumption of separate storage and processing stores was based on previous findings where low correlations between memory and processing spans were observed (e.g., [@c35]; [@c55]; [@c82]), and a post hoc analysis of the data from the current experiments reveals no statistically significant correlations between memory and processing spans (for Experiments 1, 2, 3, and 4, Pearson's *r* coefficients were .24, .23, .2, and .01, respectively, all *p* \> .05). The low level of shared variance between memory and processing spans, to the MCM, indicates evidence for separate components contributing to performance on each task and could explain the large residual performance observed in even the most demanding experimental conditions reported here. Again, the MCM focus on what performance remains and how separate working memory components could account for this performance further demonstrates differences in approaches between the theoretical frameworks and warrants further investigation.
The TBRS model successfully predicted both the presence of dual-task effects on memory, their relative magnitude to AS effects, and that the dual-task effect size would increase when span was measured under suppression. TBRS failed to predict the small/null dual-task effects, and the lack of AS effects, on processing. It remains unclear whether this theoretical framework requires modification to accommodate these findings. As already discussed, the asymmetric dual-task costs between memory and processing is not inconsistent with previous TBRS research. However, the lack of an effect is somewhat inconsistent with the findings of [@c81], where memory load was observed to affect processing RTs. Because processing titration relied on increasing the speed of the arithmetic verification task until participants' accuracy dropped below 80%, it is logical to assume that any RT cost to processing performance should be reflected in accuracy. A post hoc analysis of RT revealed a small dual-task cost (see [online supplementary materials](#supp) to this article). This RT cost was either too small to impact speeded-response accuracy, or participants may be engaging in some speed/accuracy trade-off that preserves performance on the task enough to prevent a measurable drop in accuracy.
According to the TBRS model, a possible explanation for the lack of dual-task effects on processing (one that does not require the separation of memory and processing resources, or speculation of some representation-based interference based on Presentation/Recall × Processing Dual-Task interactions[^3^](#fn3){ref-type="fn"}), is that participants prioritized the addition verification task over the memory task. Studies on dual-tasking have established that interference between tasks can be modulated by priorities ([@c74]) and external cues play a role in the way participants select their goals ([@c1]; [@c45]). It is possible that the successive presentation of additions on screen and the requirement to produce immediate responses led participants to prioritize the verification task over the maintenance of letter lists. [@c81] detected dual-task effects on processing only after trials with imperfectly recalled lists were removed from the analysis: it may be the case that the effects resulting from resource sharing mainly appear when tasks are explicitly or implicitly given priority by participants (e.g., due to their immediacy) or by researchers (e.g., by designing paradigms that emphasize perfect or high performance on one or the other task within a dual-task paradigm). Accounting for prioritization phenomena within the TBRS model would require specifying the mechanisms by which attention is devoted either to maintenance or processing activities and what are the mechanisms that lead the executive loop to switch from one activity to the other, something that the current version of the TBRS model does not. For example, it might be imagined that remembering memory items is participants' initial main goal in working memory tasks, and that the occurrence of a to-be-processed distractor on screen would trigger the reinstantiation of the task set associated with the concurrent task, thus leading attention to switch from maintenance to processing. Beyond this preliminary suggestion, what is needed is a temporally fine-grained description of the cognitive processes that successively take place during dual-task completion as well as the internal (volitional, strategic) and external cues that trigger them.
The EP framework ([@c25], [@c26]) has evolved since it was first proposed. [@c25] left open the issue of how much semantic information is automatically analyzed and retained without attention, but the answer has to date appeared to be "little if any" (e.g., [@c24]). Also, assumptions about attention and information storage have changed; for example, dual-modality memory task results of [@c72] suggested that when participants cannot rehearse to-be-recalled items, memory is limited to three or four items. A psychometrically more thorough examination by [@c33] suggests that instead, participants first widen attention to take in three to four items in a set but then can quickly offload information to the activated portion of LTM. Cowan has long realized that the EP is a modeling framework to be filled in, not a complete model; an approach made clear by the revision of assumptions and predictions between Experiments 1 and 2 and Experiments 3 and 4 in this article.
Although the EP framework correctly predicted effects of processing on storage, and its magnification under AS, the aspect of the results most surprising for the framework is the absence of effects of concurrent storage on processing. A post hoc interpretation would concern the nature of the processing task, which might require attention but in a manner that is obligatory rather than optional. Previous studies suggest that simple arithmetic can involve direct retrieval from LTM as a preferred route of performance (e.g., [@c40]), and other work suggests that this LTM retrieval is obligatory; people may not have the ability to modulate this use of attention to share with other tasks while the retrieval is ongoing ([@c34]; [@c73]). This assumption can be implemented without a change in the modeling framework but with an additional clarity in predictions, so that we would now predict that attention costs would accrue to processing as well as storage provided that the processing task was changed to one not requiring LTM retrieval (for a similar approach see [@c69]). The outcome of such research examining different processing tasks in a dual-task design might not only explain the results reported here but may also inform future iterations of the EP framework, and/or help distinguish between MCM, TBRS, and EP accounts.
Conclusion {#s61}
==========
The present work aimed to contrast predictions from MCM, TBRS, and EP theories of working memory by collaboratively designing a set of experiments for which (to the greatest extent possible) disparate predictions could be generated by each theory. We focused on the absence/presence/magnitude of dual-task effects on a pairing of verbal memory and verbal processing tasks, and on how AS modulated these effects. This research represents, to our knowledge, the first attempt at an adversarial collaboration to contrast working memory theories directly with the same experimental paradigm. Its main strength is the a priori design considerations made for each of the theories, resulting in outcomes that challenge the assumptions of all three models.
The experiments also highlight two novel challenges for adversarial collaborations. First, despite our initial assumptions based on the high level of debate in the working memory literature, it is difficult to design experimental procedures that result in clearly contrasting predictions from all three theories. The main difference between theories, at least for dual-task effects, is in how effects are interpreted. This is most evident in how EP and TBRS each explain the increased dual-task cost between Experiments 1 and 2 and Experiments 3 and 4. By challenging the three theoretical frameworks with the observed data patterns, the current experiments have highlighted the strengths and limitations of those frameworks, while providing new insights into how working memory functions under dual-task demands. However, to fully disentangle the subtle differences in interpretation will require future effort for new experimental designs. The differences between the theoretical frameworks are also highlighted by the tendency for MCM to focus on the substantial residual performance that remains even under very demanding dual-task conditions, whereas EP and TBRS focus on the presence of a drop in performance relative to single-task or low cognitive load demands, suggesting that the differences may not be as substantial as they appear. However, each of the three approaches would require modification to develop a more integrated account for the current set of data, for previous data sets generated within each framework and to generate more accurate predictions for future experiments.
Second, while the collaborative design process aimed to reduce post hoc interpretations of effects, such explanations are unavoidable. We do not, however, view this as a negative. Because the experiments were designed to take into consideration assumptions from each theoretical framework the scale of post hoc explanation is considerably reduced compared to what one might expect between competing theories researching and publishing work independently. Instead, the adversarial collaboration approach has resulted in a set of interpretations which rely on additional assumptions not directly tested here. These interpretations present a clear roadmap for future research; for example, whether task priority plays a role in the distribution of dual-task costs, if/how the input from additional resources supporting memory can be increased or reduced, and how the distribution of dual-task costs and/or the input from other mechanisms accounts for the residual performance in memory accuracy.
Our findings support statistically large dual-task costs to memory accuracy that favor a shared resource structure of working memory such as that proposed by TBRS and EP accounts, but with residual memory performance that may indicate input from other resources or mechanisms argued by the MCM. While this residual performance in and of itself is insufficient to distinguish a "winning" framework, both it and the asymmetry between memory and processing dual-task costs pose questions as to whether working memory can ever be explained by any one of these three frameworks, or whether some integrated combination of the three accounts will be needed to provide a comprehensive explanation of these and both previously published and future behavioral data.
Supplementary Material
======================
10.1037/xlm0000668.supp
Upon analysis of the data, effects far larger than 0.8 were in fact observed. Because predictions of large effect sizes were based on this smaller value, the magnitude of predicted effects were unavoidably underestimated. However, because each framework made predictions based on this same scale, it was still possible to evaluate contrasting predictions when data were analyzed.
The differences in dual-task effects on processing across different memory presentation/recall formats were not predicted or easily explained by any of the three frameworks. A follow-up experiment had mixed success in replicating the pattern (i.e., dual-task effect on processing only in the auditory/oral memory condition), but this replication only occurred at the U.K. site. The effect remained small, and so we concluded that these small dual-task effects on processing are unreliable and possibly due to sampling effects. In any regard, these dual-task effects were always considerably smaller than for memory. The experiment is reported in the [online supplementary materials](#supp) to this article.
See the [online supplementary materials](#supp) to this article for the between-subjects follow-up investigation of these interactions.
###### Summary of the Predictions From Each of the Three Models for Experiments 1--4
{#tbl1a}
Effect MCM TBRS EP Observed
------------------ ------------ ----------------------- --------------------------------- ----------------------
Experiment 1
DT (mem.) Small Medium Large *ES*~scaled~ = −.73
DT (proc.) Null Medium Large *n.s*.
AS (mem.) Medium Large Large *ES*~scaled~ = −2.96
AS (proc.) Null Small Large *n.s*.
DT × AS (mem.) Small Null Medium *n.s.*
DT × AS (proc.) Small Null Medium *n.s.*
Experiment 2
DT (mem.) Null Medium Medium *ES*~scaled~ = −1.21
DT (proc.) Null Medium Medium *ES*~scaled~ = −.43
AS (mem.) Large Large Medium *ES*~scaled~ = −2.00
AS (proc.) Null Small Medium *n.s*.
DT ×AS (mem.) Null Null Medium *n.s.*
DT × AS (proc.) Small Null Medium *n.s.*
Experiment 3
DT (mem.) Null/Small Medium Larger than Experiments 1 and 2 *ES*~scaled~ = −1.64
DT (proc.) Null Large Null *n.s.*
Experiment 4
DT (mem.) Null/Small Equal to Experiment 3 Larger than Experiment 2 *ES*~scaled~ = −1.32
DT (proc.) Null/Small Effect predicted^a^ Null *ES*~scaled~ = −.42
###### Memory and Processing Analyses From Experiment 1, Displaying Coefficient Estimates and Standard Errors From the Winning Models for Each Task
{#tbl2a}
Parameter Task
------------------ --------------------- --------------------
Intercept 1.190\*\*\* (.091) 1.410\*\*\* (.048)
Dual-task −.356\*\*\* (.034)
AS −1.436\*\*\* (.034)
Site (Swiss/UK) .010 (.129)
Dual-Task × Site −.143\*\*\* (.048)
AS × Site .191\*\*\* (.049)
###### Memory and Processing Analyses From Experiment 2, Displaying Coefficient Estimates and Standard Errors From the Winning Models for Each Task
{#tbl3a}
Parameter Task
------------------ -------------------- --------------------
Intercept 1.051\*\*\* (.083) 1.540\*\*\* (.054)
Dual-task −.537\*\*\* (.033) −.175\*\*\* (.024)
AS −.890\*\*\* (.024)
Site (Swiss/UK) .304\*\*\* (.116)
Dual-Task × Site −.152\*\*\* (.047)
###### Mixed-Factorial Analyses Comparing Memory and Processing Performance Between Experiments 1 and 2, Displaying Coefficient Estimates and Standard Errors From the Winning Models for Each Task
{#tbl4a}
Parameter Task
-------------------- -------------------- --------------------
Intercept 1.080\*\*\* (.087) 1.539\*\*\* (.052)
Dual-task −.539\*\*\* (.029) −.175\*\*\* (.024)
AS −.941\*\*\* (.029)
Format (AO/VT) .086 (.122) −.107 (.073)
Site (Swiss/UK) .246\*\* (.122)
Dual-Task × Format .185\*\*\* (.034) .133\*\*\* (.035)
AS × Format −.452\*\*\* (.034)
Dual-Task × Site −.147\*\*\* (.034)
AS × Site .104\*\*\* (.034)
Format × Site −.186 (.168)
###### Memory and Processing Analyses From Experiment 3, Displaying Coefficient Estimates and Standard Errors From the Winning Models for Each Task
{#tbl5a}
Parameter Task
------------------ --------------------- --------------------
Intercept 1.422\*\*\* (.178) 1.582\*\*\* (.064)
Dual-task −1.076\*\*\* (.087)
Site (Swiss/UK) .078 (.250)
Dual-Task × Site −.321\*\*\* (.119)
###### Memory and Processing Analyses From Experiment 4, Displaying Coefficient Estimates and Standard Errors From the Winning Models for Each Task
{#tbl6a}
Parameter Task
----------- -------------------- --------------------
Intercept 1.428\*\*\* (.111) 1.696\*\*\* (.086)
Dual-task −.759\*\*\* (.057) −.182\*\*\* (.053)
###### Mixed-Factorial Analyses Comparing Memory and Processing Performance in Experiments 1 Through 4, Displaying Coefficient Estimates and Standard Errors From the Winning Models for Each Task
{#tbl7a}
Parameter Task
-------------------------------- -------------------- --------------------
Intercept .725\*\*\* (.064) 1.536\*\*\* (.047)
Dual-task −.585\*\*\* (.023) −.176\*\*\* (.022)
Format (AO/VT) −.251\*\*\* (.091) −.097 (.061)
Titration (no AS/AS) .696\*\*\* (.117) .163\*\*\* (.063)
Dual-Task × Format .201\*\*\* (.033) .129\*\*\* (.031)
Dual-Task × Titration −.172\*\*\* (.061)
Format × Titration .286\* (.167)
Dual-Task × Format × Titration −.687\*\*\* (.088)
{#fig1}
{#fig2}
{#fig3}
{#fig4}
{#fig5}
{#fig6}
{#fig7}
{#fig8}
{#fig9}
|
{
"pile_set_name": "PubMed Central"
}
|
Field of the Invention
The present invention relates to a vehicle wheel having a rigid rim on which can be mounted a pneumatic tire. The rim has rim flanges that essentially extend radially inwardly. The wheel also has a drop base that is centrally disposed relative to the rim, and is open radially outwardly. Disposed on the radially inner side of the rim, between the drop base and each rim flange, are respective recessed mounting portions for receiving the beads of a tire.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
As an example, from German Published Patent Application No. DE 196 26 576 an electromagnetically actuable fuel injector is known, in which, for the electromagnetic actuation, an armature cooperates with an electrically energizable magnetic coil, and the lift of the armature is transmitted to a valve-closure member via a valve needle. The valve-closure member cooperates with a valve-seat surface to form a sealing seat. A plurality of fuel channels is provided in the armature. The armature is reset by a resetting spring.
Disadvantageous in the fuel injector known from German Published Patent Application No. DE 196 26 576 is, in particular, that the fuel quantity qdyn flowing through the fuel injector cannot be metered with sufficient precision when the valve-closure member lifts off from the sealing seat. The ratio of maximally sprayed-off fuel quantity relative to minimally sprayed-off fuel quantity, qmax/qmin, is relatively low. The characteristic curve of the fuel injector, which represents the profile of the dynamic flow rate qdyn as a function of the valve needle lift, is relatively flat, so that considerable fluctuations occur in the dynamic flow rate.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
West Nile Virus (WNV) is one of the many neurotropic flaviviruses that is widely spread throughout the world, and continues to cause significant morbidity and mortality. In the US alone there were 24,000 cases of human WNV infection and 1000 fatalities since 2006. Both innate and adaptive immune components, including CDS, CD4 T cells and B cells contribute to WNV clearance and prevent infection of neurons. The adaptive immune components also form memory, which is the hall-mark for vaccination strategies. The generation of adaptive immunity is linked to innate activation, primarily via viral sensing by host pattern recognition receptors (PRRs), which in turn lead to ARC activation and generation of inflammatory mediators. One class of these early inflammatory mediators, type-l interferons (IFN-I) induce an anti-viral state in infected and neighboring cells. Many viruses, including WNV, developed potent IFN-I evasive strategies. Recent studies from our and other labs show that IFN-I can also exert profound influence on T cells responses, and generation of immune memory;but very little is known about the roles of specific pattern recognition receptors and the IFN-signaling in generating flavivirus-specific adaptive response. An understanding of this is critical for generating improved vaccines. We hypothesize that IFN-I signaling plays a critical role in generating WNV-specific adaptive immunity and that strategies to interfere with viral IFN-I evasive mechanisms should yield better vaccines. In Aim 1 we will define the role of dendritic cell signaling via RNA helicases and TLRs for generating WNV-specific CDS T cell responses. In Aim 2 we will examine the role of IFN-I signaling in the generation of WNV-specific CDS T cell responses. In Aim 3 we will assess the importance of the timing of IFN-I signals in programming T cell responses. Using the knowledge gained from these and the studies proposed in the other four projects of this U19, in Aim 4 we will modulate IFN-I signaling as means to enhance vaccination. Thus, this proposal will contribute to attainment of multi-project objectives of this U19.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Variant Covers of this Issue
Pride & Prejudice (Hardcover)
Pride & Prejudice (Hardcover)
Published: October 14, 2009
"IT is a truth universally acknowledged, that a single man in possession of a good fortune must be in want of a wife..." Tailored from the adored Jane Austen classic, Marvel Comics is proud to ...
more
"IT is a truth universally acknowledged, that a single man in possession of a good fortune must be in want of a wife..." Tailored from the adored Jane Austen classic, Marvel Comics is proud to present PRIDE AND PREJUDICE! Two-time Rita Award-Winner Nancy Butler and fan-favorite Hugo Petrus faithfully adapt the whimsical tale of Lizzy Bennet and her loveable-if-eccentric family, as they navigate through tricky British social circles. Will Lizzy's father manage to marry off her five daughters, despite his wife's incessant nagging? And will Lizzy's beautiful sister Jane marry the handsome, wealthy Mr. Bingley, or will his brooding friend Mr. Darcy stand between their happiness? "This project has been like a dream come true for me as a writer and as a former graphic designer-not only am I adapting a book I love, I am doing it in the one forum, comics, where words and pictures carry equal weight." Nancy Butler, two-time RITA winner and multiple RT Reviewer's Choice winner in Regency. Collecting PRIDE & PREJUDICE #1-5.
Rated T ...$19.99
more
The Story
"IT is a truth universally acknowledged, that a single man in possession of a good fortune must be in want of a wife..." Tailored from the adored Jane Austen classic, Marvel Comics is proud to present PRIDE AND PREJUDICE! Two-time Rita Award-Winner Nancy Butler and fan-favorite Hugo Petrus faithfully adapt the whimsical tale of Lizzy Bennet and her loveable-if-eccentric family, as they navigate through tricky British social circles. Will Lizzy's father manage to marry off her five daughters, despite his wife's incessant nagging? And will Lizzy's beautiful sister Jane marry the handsome, wealthy Mr. Bingley, or will his brooding friend Mr. Darcy stand between their happiness? "This project has been like a dream come true for me as a writer and as a former graphic designer-not only am I adapting a book I love, I am doing it in the one forum, comics, where words and pictures carry equal weight." Nancy Butler, two-time RITA winner and multiple RT Reviewer's Choice winner in Regency. Collecting PRIDE & PREJUDICE #1-5.
Rated T ...$19.99
|
{
"pile_set_name": "Pile-CC"
}
|
Bay Area emo-rockers Tommy Boys are teaming up with AP to bring you an early listen to their debut self-titled album, which is streaming in full below. Produced by Sam Pura (State Champs, Basement, the Story So Far), the record will be officially released January 27 via Other People Records. (Pre-orders are on sale now.)
“We spent way too much time writing and refining this record,” singer/bassist Robbie Donovan tells AP, “but it was purely a labor of love. Hopefully, a few years from now, we'll be able to look back and be proud of the excruciating amount of sweat and blood we put into making this happen. [We] cannot wait to hit the road hard in 2015.”
|
{
"pile_set_name": "OpenWebText2"
}
|
package com.dozingcatsoftware.vectorpinball.fields;
import com.badlogic.gdx.math.Vector2;
import com.badlogic.gdx.physics.box2d.Body;
import com.dozingcatsoftware.vectorpinball.model.Ball;
import com.dozingcatsoftware.vectorpinball.model.BaseFieldDelegate;
import com.dozingcatsoftware.vectorpinball.model.Field;
import com.dozingcatsoftware.vectorpinball.elements.DropTargetGroupElement;
import com.dozingcatsoftware.vectorpinball.elements.FieldElement;
import com.dozingcatsoftware.vectorpinball.elements.RolloverGroupElement;
import com.dozingcatsoftware.vectorpinball.elements.SensorElement;
import com.dozingcatsoftware.vectorpinball.elements.WallElement;
public class Field2Delegate extends BaseFieldDelegate {
static final double TAU = 2 * Math.PI; // pi is wrong.
static class RotatingGroup {
String[] elementIDs;
double centerX, centerY;
double radius;
double rotationSpeed;
double startAngle;
double currentAngle;
double angleIncrement;
RotatingGroup(
String[] ids, double cx, double cy, double radius, double startAngle,
double speed) {
this.elementIDs = ids;
this.centerX = cx;
this.centerY = cy;
this.radius = radius;
this.rotationSpeed = speed;
this.startAngle = this.currentAngle = startAngle;
this.angleIncrement = TAU / ids.length;
}
/**
* Creates a RotatingGroup by computing the distance and angle to center from the first
* element ID in the ids array.
*/
static RotatingGroup create(
Field field, String[] ids, double cx, double cy, double speed) {
FieldElement element = field.getFieldElementById(ids[0]);
Body body = element.getBodies().get(0);
Vector2 position = body.getPosition();
double radius = Math.hypot(position.x - cx, position.y - cy);
double angle = Math.atan2(position.y - cy, position.x - cx);
return new RotatingGroup(ids, cx, cy, radius, angle, speed);
}
void applyRotation(Field field, double dt) {
currentAngle += dt * rotationSpeed;
if (currentAngle > TAU) currentAngle -= TAU;
if (currentAngle < 0) currentAngle += TAU;
for (int i = 0; i < elementIDs.length; i++) {
double angle = currentAngle + angleIncrement * i;
FieldElement element = field.getFieldElementById(elementIDs[i]);
Body body = element.getBodies().get(0);
double x = centerX + radius * Math.cos(angle);
double y = centerY + radius * Math.sin(angle);
body.setTransform((float) x, (float) y, body.getAngle());
}
}
}
RotatingGroup[] rotatingGroups;
RotatingGroup createRotatingGroup(Field field, String centerID, String[] ids, double speed) {
FieldElement centerElement = field.getFieldElementById(centerID);
Vector2 centerPosition = centerElement.getBodies().get(0).getPosition();
return RotatingGroup.create(field, ids, centerPosition.x, centerPosition.y, speed);
}
private void setupRotatingGroups(Field field) {
// Read rotation params from variables defined in the field.
float b1Speed = ((Number) field.getValueWithKey("RotatingBumper1Speed")).floatValue();
float b2Speed = ((Number) field.getValueWithKey("RotatingBumper2Speed")).floatValue();
float b2cx = ((Number) field.getValueWithKey("RotatingBumper2CenterX")).floatValue();
float b2cy = ((Number) field.getValueWithKey("RotatingBumper2CenterY")).floatValue();
String[] group1Ids = {
"RotatingBumper1A", "RotatingBumper1B", "RotatingBumper1C", "RotatingBumper1D"
};
rotatingGroups = new RotatingGroup[] {
createRotatingGroup(field, "CenterBumper1", group1Ids, b1Speed),
RotatingGroup.create(field, new String[] {"RotatingBumper2A", "RotatingBumper2B"},
b2cx, b2cy, b2Speed)
};
}
@Override public void tick(Field field, long nanos) {
if (rotatingGroups == null) {
setupRotatingGroups(field);
}
double seconds = nanos / 1e9;
for (RotatingGroup rotatingGroup : rotatingGroups) {
rotatingGroup.applyRotation(field, seconds);
}
}
private void restoreLeftBallSaver(Field field) {
((WallElement) field.getFieldElementById("BallSaver-left")).setRetracted(false);
}
private void restoreRightBallSaver(Field field) {
((WallElement) field.getFieldElementById("BallSaver-right")).setRetracted(false);
}
private void startMultiball(final Field field) {
field.showGameMessage(field.resolveString("multiball_started_message"), 2000);
restoreLeftBallSaver(field);
restoreRightBallSaver(field);
Runnable launchBall = () -> {
if (field.getBalls().size() < 3) field.launchBall();
};
field.scheduleAction(1000, launchBall);
field.scheduleAction(3500, launchBall);
}
/**
* Always return true so the rotating bumpers animate smoothly
*/
@Override public boolean isFieldActive(Field field) {
return true;
}
@Override public void allRolloversInGroupActivated(
Field field, RolloverGroupElement rolloverGroup, Ball ball) {
// Rollover groups increment field multiplier when all rollovers are activated.
rolloverGroup.setAllRolloversActivated(false);
field.incrementAndDisplayScoreMultiplier(1500);
}
@Override
public void processCollision(Field field, FieldElement element, Body hitBody, Ball ball) {
// When center red bumper is hit, start multiball if all center rollovers are lit,
// otherwise retract left barrier.
String elementID = element.getElementId();
if ("CenterBumper1".equals(elementID)) {
WallElement barrier = field.getFieldElementById("LeftTubeBarrier");
RolloverGroupElement multiballRollovers =
field.getFieldElementById("ExtraBallRollovers");
if (multiballRollovers.allRolloversActive()) {
barrier.setRetracted(false);
startMultiball(field);
multiballRollovers.setAllRolloversActivated(false);
}
else {
// don't retract during multiball
if (field.getBalls().size() == 1) {
barrier.setRetracted(true);
}
}
}
}
@Override public void allDropTargetsInGroupHit(
Field field, DropTargetGroupElement targetGroup, Ball ball) {
// activate ball saver for left and right groups, "increment" multiball rollover for
// left/right/center column
int startRolloverIndex = -1;
String id = targetGroup.getElementId();
if ("DropTargetLeft".equals(id)) {
restoreLeftBallSaver(field);
field.showGameMessage(field.resolveString("left_save_enabled_message"), 1500);
startRolloverIndex = 0;
}
else if ("DropTargetRight".equals(id)) {
restoreRightBallSaver(field);
field.showGameMessage(field.resolveString("right_save_enabled_message"), 1500);
startRolloverIndex = 2;
}
else if ("DropTargetTopLeft".equals(id)) {
startRolloverIndex = 1;
}
// activate next rollover for appropriate column if possible
if (startRolloverIndex >= 0) {
RolloverGroupElement multiballRollovers =
field.getFieldElementById("ExtraBallRollovers");
int numRollovers = multiballRollovers.numberOfRollovers();
while (startRolloverIndex < numRollovers) {
if (!multiballRollovers.isRolloverActiveAtIndex(startRolloverIndex)) {
multiballRollovers.setRolloverActiveAtIndex(startRolloverIndex, true);
if (multiballRollovers.allRolloversActive()) {
field.showGameMessage(field.resolveString(
"shoot_red_bumper_message"), 1500);
}
break;
}
else {
startRolloverIndex += 3;
}
}
}
}
// support for enabling launch barrier after ball passes by it and hits sensor, and disabling
// for new ball or new game
void setLaunchBarrierEnabled(Field field, boolean enabled) {
WallElement barrier = field.getFieldElementById("LaunchBarrier");
barrier.setRetracted(!enabled);
}
@Override
public void ballInSensorRange(final Field field, SensorElement sensor, Ball ball) {
String sensorID = sensor.getElementId();
// enable launch barrier
if ("LaunchBarrierSensor".equals(sensorID)) {
setLaunchBarrierEnabled(field, true);
}
else if ("LaunchBarrierRetract".equals(sensorID)) {
setLaunchBarrierEnabled(field, false);
}
else if ("LeftTubeSensor".equals(sensorID)) {
if (ball.getLinearVelocity().y > 0) {
// ball going up, retract barrier after delay
field.scheduleAction(1000, () -> {
WallElement barrier = field.getFieldElementById("LeftTubeBarrier");
barrier.setRetracted(false);
});
}
}
}
@Override public void gameStarted(Field field) {
setLaunchBarrierEnabled(field, false);
}
@Override public void ballLost(Field field) {
setLaunchBarrierEnabled(field, false);
}
}
|
{
"pile_set_name": "Github"
}
|
With The Outer Worlds done and dusted, Obsidian Entertainment is switching gears to move onto a triple-a role-playing game for next-generation platforms. The unannounced project was already known to be in the works but now, an indirect confirmation has arrived alongside some minor details.
Earlier today, Obsidian Entertainment updated its careers website to open over two dozen job listings across the board. Many of the senior positions mention an unknown next-generation role-playing game that will feature both melee and ranged combat, as well as “exceptional” gunplay, in first-person perspective. Multiplayer elements have also been mentioned and in traditional Obsidian Entertainment fashion, the upcoming triple-a project will have voiced characters and branching dialogues to make a “fun” narrative.
In regards to the destined platforms, the developer has cited next-generation consoles and PC. That can perhaps be taken as an indication that Microsoft will not be trying for an Xbox Series X exclusivity. The company has been touting accessibility over exclusivity for the next generation, and even The Outer Worlds landed on PlayStation 4 and will so on Nintendo Switch. Hence, whatever Obsidian Entertainment is working on will possibly release for PlayStation 5.
Take note that Obsidian Entertainment is currently working on Grounded, an adorable survival game set for spring. The developer is also working to bring The Outer Worlds to Steam and Nintendo Switch, which remains on a temporary hiatus due to the coronavirus outbreak.
In addition, Obsidian Entertainment will probably want to return with a sequel to The Outer Worlds in the future. That being said, the aforementioned triple-a role-playing offering is something completely new and not to be confused with another The Outer Worlds installment. Development looks to be in the early stages, meaning that a release should not be expected anytime soon.
|
{
"pile_set_name": "OpenWebText2"
}
|
Target House
Target House may refer to:
Target House, London, a modern commercial building
Target House, Memphis, a long-term housing solution for families of patients at the city's St. Jude Children's Research Hospital
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Brendon Walsh, funny to some
Even though Brendon Walsh is a relatively new comic, it seems as though he’s been around since the Seinfeld days.
His stage presence is classic and unpretentious, with a hint of aggravation, and his jokes are more low-key than obvious. Walsh, who won the “Funniest Person in Austin” title back in 2004, has an HBO special and is a favorite of the late-night comedy circuit (check out his “Scary Monster” act).
|
{
"pile_set_name": "Pile-CC"
}
|
Houston Rockets General Manager Daryl Morey announced today that the team has signed guard Courtney Fortson of the D-League L.A. Defenders to a 10-day contract. This marks Fortsonís second NBA Call-Up of the season. He also played four games with the L.A. Clippers this season, averaging 4.3 points, 2.0 rebounds and 1.3 assists in 11.2 minutes per game.
|
{
"pile_set_name": "Pile-CC"
}
|
South Arabia during World War I
The campaign in South Arabia during World War I was a minor struggle for control of the port city of Aden, an important way station for ships on their way from Asia to the Suez Canal. The British Empire declared war on the Ottoman Empire on 5 November 1914, and the Ottomans responded with their own declaration on 11 November. From the beginning, the Ottomans had planned an invasion of Britain's Aden Protectorate in cooperation with the local Arab tribes. The Ottomans had gathered in some strength on the Cheikh Saïd, a peninsula which juts out into the Red Sea towards the island of Perim.
At the start of the war, the British had one force stationed in the Aden Protectorate, the Aden Brigade, which was part of the British Indian Army. In November 1914, an Ottoman force from Yemen attacked Aden, but was driven off by the Brigade.
Land campaign
Capture of Cheikh Saïd
The 29th Indian Brigade, under Brigadier-General H. V. Cox, CB, then on its way from India to Suez, was ordered to interrupt its voyage to capture Cheikh Saïd and destroy the Ottoman works, armaments, and wells there. On 10 November transports conveying three battalions of the 29th Indian Brigade and the 23rd Sikh Pioneers arrived off the coast of the peninsula. They were accompanied by the armoured cruiser HMS Duke of Edinburgh, which opened fire on the Ottoman defences while the transports were seeking a satisfactory landing-place. The point that had been at first selected proved impossible on account of the weather, and the troops had to land a little way off under the cover of the fire of the cruiser. They stormed the Ottomans' positions and compelled them to retreat, leaving their field guns behind. The sailors took active part in the fighting with the troops, and a naval demolition party assisted, on 11 November, in destroying the Ottoman fortifications. Having accomplished its task, the British force re-embarked and continued on to Suez. It was not considered advisable at this time to push an expedition inland. The Ottomans, consequently, retained some forces on the northern boundary of the Aden Protectorate.
Seven months later they reoccupied Cheikh Saïd and endeavoured from there to effect a landing on the north coast of Perim. This attack was successfully repulsed by the garrison of the island, the 23rd Sikh Pioneers.
Battle of Lahij
Sultanate of Lahij
In July 1915 an Ottoman force from North Yemen crossed the frontier of the Aden hinterland and advanced towards Lahij, which was at this time one of the most important towns in South Arabia and the capital of the Abdali Sultanate of Lahij (Lahaj). Placed in an oasis, surrounded by a fertile plain with the deserts beyond, it was the centre of trade between Aden, a British crown colony, and its hinterland, the princely states under a protectorate. In the years leading up to the war, relations between Britain and Lahij had been friendly, the British paying the sultan a subsidy for the occupation of certain land in the interior and protecting him and his agricultural people against the tribes of the desert, who frequently raided them. Propagandising during the war, British historian F. A. McKenzie wrote of the sultan:
Under our protection the Sultan of Lahaj had waxed very prosperous. His city, with its palace, its gallows— built for ornament rather than use—its purely Oriental life, its fine horses, its little show army, and its constant traffic in camels and caravans, seemed like a vision out of the Arabian Nights. When war broke out the Abdali Sultan proved that his loyalty to Britain was real. Though other tribes turned against us he came to our side and prepared to help us. He soon made himself an object of special detestation to the [Ottoman] and to many of the surrounding tribes by his open and unwavering friendship for Britain.
Siege
The sultan sent word to General D. G. L. Shaw, commanding the Aden Brigade, that the Ottomans were advancing from Mawiyah to attack him, and asked for help. General Shaw ordered the Aden Movable Column, under Lieutenant-Colonel H. E. A. Pearson, towards Lahij. The Aden Camel Troop was despatched to reconnoitre. It discovered a strong Ottoman force beyond Lahij, supported by a large number of Arab tribesmen. The Camel Troop fell back on Lahij, where it was reinforced by the advance guard of the Movable Column, numbering two hundred and fifty rifles, with two ten-pounder guns. This advance guard had moved up under most trying conditions. The heat was intense, there was great shortage of water, and progress was difficult over the sand. The main body of the Column was so delayed by difficulties of transport and by shortage of water that it did not reach Lahij at all.
The British in the sultan's capital found themselves faced by several thousand Ottoman troops and twenty guns. In addition, Arab tribesmen had rallied by the thousand to help the Ottomans. The British were backed by the few hundred men of the sultan of Lahij's native army. The Arab camp-followers of the Aden detachment deserted them in a body at the most critical hour, taking with them all their camels. Fighting opened on the evening of Sunday, 4 July. The Ottoman forces made several attacks against the British line, but each was driven off. Although after the battle the efforts of the Royal Artillery drew a tribute from General Shaw, the superior Ottoman artillery had kindled fires in different parts of Lahij, and the British were in danger of being outflanked and cut off by the Arab tribal horsemen. The sultan was killed with many of his men. When the main Aden Column never arrived, the British withdrew on 5 July with the loss of three officers wounded, but the main loss was not so much in men as in prestige.
Analysis
In the official report on the operations issued by the Government of India much stress was laid on "the intense heat, sand, and shortage of water", and "[t]he desertion of the camel-drivers and the severe climatic conditions so delayed and distressed the main body as to necessitate a withdrawal from Lahij". McKenzie notes that "we do not seem to have made such arrangements for transport and for water supply as would have prepared us for the difficulties which every experienced traveller knew we would have to face. . . But the severe heat of the climate, the potential treachery of hired Arabs, and the shortage of water were all of them factors which had been familiar from the beginning to the Indian authorities, and, one might suppose, ought to have been allowed for."
Reinforcements from India
After the debacle at Lahij, the British force fell back on the Kawr. The Ottomans followed them up and occupied Shaikh Othman, a town about two miles inland from the harbour of Aden. This place was formerly part of the Sultanate of Lahij, within the British protectorate. The Ottomans at this stage held practically the whole of the Aden hinterland, except immediately around the crown colony itself. They had reoccupied Cheikh Saïd and had destroyed Lahij. The Indian authorities, under Commander-in-Chief Beauchamp Duff, decided to increase the Aden garrison after "subsequent Turkish victories". Major-General Sir George J. Younghusband, a soldier with a distinguished career, succeeded to the command of the Aden Brigade.
On 20 July 1915, troops from the Aden Brigade, the 28th Indian Brigade, 1/B Battery, HAC, 1/1st Berkshire Battery, RHA, and a detachment of Sappers and Miners, under the command of Lieutenant-Colonel A. M. S. Elsmie, a soldier well trained in frontier fighting, surprised the Ottomans at Shaikh Othman, completely defeated them and drove them out of the place. Between fifty and sixty Ottoman soldiers were killed and wounded, and several hundred men, mostly Arab tribesmen, were made prisoners. This success was followed up in the following month by an attack by a small column on an Ottoman post between Lahij and Shaikh Othman. The Ottomans were driven from the town. Another attack in a different direction was equally successful. Reports reached Aden that the Ottomans were preparing to retire from Lahij itself, and in September a column under Colonel Elsmie set out in the direction of Waht. Here it surprised a force of seven hundred Ottomans, with eight guns, who were supported by about a thousand Arabs. The Ottomans were driven back, and Waht fell to the British troops, who had been aided both on sea and land by the cooperation of the cruiser HMS Philomel of the New Zealand Naval Forces, under Captain Percival Hill-Thompson.
Ottoman claims of victory
A series of minor engagements and skirmishes between the Ottomans and Arabs and the British followed, during which the latter were generally successful, but found it impossible to hold the country far inland. Early in 1916 the Ottomans claimed that the British had been driven back on to Aden itself, and had retreated to within range of the covering fire of their warships, where they had been inactive for some months. Many of the Ottoman claims were greatly exaggerated, and some wholly false. In February 1916, Major John Pretyman Newman, MP, asked in the British Parliament for any information about the fighting near Aden. Austen Chamberlain, then Secretary of State for India, responded that the Ottoman claim of success which had recently been put forward would seem to have been founded on an engagement which took place on 12 January between a reconnoitring column of the Aden garrison and an Ottoman force in the neighbourhood of Shaikh Othman. The loss on our side was one British officer and thirty-five Indian rank and file killed, and four British and thirty-five Indian rank and file wounded. The enemy losses were severe, amounting to about two hundred killed and wounded. The British column was neither annihilated nor defeated, but withdrew when the purpose of the movement was completed, Chamberlain said.
Later on, the Ottomans officially claimed to have scored a substantial victory in further heavy fighting around Shaikh Othman and Bir Ahmad. This was a sheer invention. In January 1916, the Aden Movable Column moved out to protect some friendly troops to the east of the Aden Protectorate against Ottoman troops who had been sent to coerce them. The column located the Ottoman force near Subar, and defeated it. The general position was so unsatisfactory, however, that in April 1916, it was decided, on the suggestion of the Government of India, that ladies should not be allowed to land at Aden without receiving permission from the Commander-in-Chief in India.
End of the campaign in South Arabia
The eruption of the British-sponsored Arab Revolt in the Hejaz diverted Ottoman attention from Aden in the summer of 1916. Those Ottoman troops which remained reverted to the defensive, while the British built an eleven-mile-long defensive perimeter around Aden. They did not attempt to resecure lost territories in the hinterland, and no major fighting with the British took place after 1916. The Ottomans continued to hold territories in the protectorate until the Armistice of Mudros in October 1918 and the partition of the Ottoman Empire after the war.
Naval campaign
Uses of the South Arab ports during the war
On 18 October 1914, a convoy of ten troopships carrying the New Zealand Expeditionary Force was escorted by the Imperial Japanese battlecruiser Ibuki out of Wellington. It joined a group of twenty-eight ships carrying the First Australian Imperial Force, and the total convoy, with Ibuki and the Australian cruiser , crossed the ocean, which was being patrolled by the Japanese protected cruiser Chikuma. While Sydney was sidetracked, and ended up in the Battle of Cocos, the rest of the convoy reached Aden on 25 October.
On 9 November 1914, a small landing party, numbering five officers, one surgeon, and forty-seven petty officers and men, under Lieutenant Hellmuth von Mücke, was separated from their ship, the SMS Emden during the Battle of Cocos, and piloted the Ayesha to the Dutch port of Padang on the west coast of Sumatra. There von Mücke arranged a rendezvous with the German freighter Choising, which transported him and his men to the Ottoman city of Hodeida in Yemen. Once on the Arabian Peninsula, von Mücke and his men experienced months of delay securing the assistance of local Turkish officials to return to Germany. At last he decided to lead his men on an over-water voyage up the east coast of the Red Sea to Jiddah. Ultimately, Von Mücke and forty-eight of his men returned to Berlin.
When the Arabs of the revolt of June 1916 attacked the port of Jiddah, they were supported by the seaplane carrier , based at Aden.
Occupation of Kamaran
On 17 February 1915, the British Resident in Aden, Brigadier William Crawford Walton, wired the Government of India that dhows bearing telegrams, mail and money from Jiddah had made it to Ottoman headquarters in Yemen, and that it was necessary that these be stopped. He proposed the occopuation of Kamaran with 200 men from the RMS Empress of Russia, the RMS Empress of Asia and HMS Minto. This had the support of the Admiralty, the Commander-in-Chief at Port Said—who wished to use Kamaran as a "naval base for small vessels"—and the India Office, which duly informed the Viceroy of India to give the necessary orders. The viceroy demurred, fearing that the local population would be "unlikely to acquiesce", that an occupation might "alarm the Idrisi", was likely to be misunderstood by Muslims, and would reduce the defences of Aden, at just the moment when the Turks were advancing. On 3 March the India Office rescinded its order, but when intelligence suggested that some Germans stranded in Massawa in Italian Eritrea at the outbreak of war were attempting to sail across the sea to Arabia, the resident renewed his request for 200 men (7 March). Again the viceroy refused (11 March).
References
Further reading
Bidwell, Robin L. "The Turkish attack on Aden 1915–1918", Arabian Studies, 6 (1982), 171–94.
Bruce, Anthony. The Last Crusade: The Palestine Campaign in the First World War. London: Murray, 2002.
Connelly, Mark. "The British Campaign in Aden, 1914–1918". Journal of the Centre for First World War Studies, 2:1 (2005) 65–96.
Kühn, Thomas. "Shaping and Reshaping Colonial Ottomanism: Contesting Boundaries of Difference and Integration in Ottoman Yemen, 1872–1919." Comparative Studies of South Asia, Africa and the Middle East, 27:2 (2007), 315–31.
Mehra, R. N. Aden and Yemen, 1905–1919. Delhi: Agram Prakashan, 1988.
Walker, G. Goold. Honourable Artillery Company in The Great War 1914–1919. London: Seeley, Service & Co. Ltd., 1930.
External links
Turkey in the First World War: Arabian Campaign
Photograph of camel being unloaded by crane in Aden, 15 September 1915
Photograph of camels aboard a ship at Aden, 15 September 1915
Category:Campaigns and theatres of World War I
Category:Middle Eastern theatre of World War I
Category:British Empire in World War I
Category:Ottoman Empire in World War I
Category:Modern history of Yemen
Category:Aden
|
{
"pile_set_name": "Wikipedia (en)"
}
|
be 83/3 + 2/(-3). Let v = -8 + k. Suppose -28 - 22 = -5*d. Calculate the remainder when v is divided by d.
9
Let l(s) = -s**3 - 3*s**2 + 5*s + 5. Let j(n) = 10*n - 1. Let r be j(-2). Let d = 37 + r. What is the remainder when l(-5) is divided by d?
14
Let b = -6 + 91. Let q = 10 + 12. What is the remainder when b is divided by q?
19
Suppose 0 = d - 1 - 21. What is the remainder when d is divided by 12?
10
Let t = 28 - 22. Calculate the remainder when 35 is divided by t.
5
Let c = 4 + -2. Let o be 10/c*(2 - -1). Suppose -o = 3*i, -4*i = -3*k - 0*i + 38. Calculate the remainder when 17 is divided by k.
5
Let l be -1 + 0 + 0 - -2. What is the remainder when 11 is divided by (-4)/l*6/(-6)?
3
Suppose -3*t + 4 = -35. Suppose -4*n + 0*n + 200 = 0. What is the remainder when n is divided by t?
11
What is the remainder when 59 is divided by ((-96)/(-168))/((-2)/5)*-14?
19
Let x(h) = -h**3 - 5*h**2 - 4*h - 1. Calculate the remainder when x(-5) is divided by (0 - 4/16)*-28.
5
Let j = -5 + 45. Let p = -4 - -16. Suppose -3*h + p = -51. Calculate the remainder when j is divided by h.
19
Let c(p) = -p**3 + 6*p**2 + 8*p + 1. Let k be c(7). Suppose -115 = -k*v + 3*v. Calculate the remainder when 66 is divided by v.
20
Let z(r) = 6*r**2 + 11*r + 5. Calculate the remainder when z(-5) is divided by 26.
22
Let j = -7 + 18. Suppose 0 = h + 3*v - 8, 4*h - 49 - j = 2*v. Calculate the remainder when 55 is divided by h.
13
Let d(r) = 23*r - 3. Suppose 4*n - 3 = 1, -2*a - 2*n = 4. Let z be d(a). Calculate the remainder when (z/15)/(6/(-20)) is divided by 6.
4
What is the remainder when (1 - 0)/(1/23) is divided by (-6)/27 + 112/18?
5
Suppose -7*q + 2*q + g = -1, 5*q = -2*g + 13. Suppose -4*p + 79 = 5*l, 5*p + 0 = -l - q. Calculate the remainder when l is divided by 11.
8
Let j(o) = 13*o**3 - 2*o + 1. Let t be (-2 - 1 - -3) + 1. Calculate the remainder when 33 is divided by j(t).
9
Let g = 1 + -9. Let u(z) = z**2 - 3*z + 3. Calculate the remainder when (-12)/g*14 + -2 is divided by u(4).
5
Suppose 4*r - 213 = -0*r - 3*i, -2*r + 96 = -2*i. Let z = r + -32. Let c = 23 - 16. Calculate the remainder when z is divided by c.
5
Suppose 340 = -4*q - 24. Let v = q - -135. Calculate the remainder when v is divided by 15.
14
Suppose 0 = -5*h + 4*a + 77, -h + 0 = 5*a + 2. Let w(c) = -9*c - 3. Let b be w(-6). Let m = b + -27. Calculate the remainder when m is divided by h.
11
Suppose 144 = 4*s + 4*t, -3*s + 3*t + 120 = -0*t. Calculate the remainder when 185 is divided by s.
33
What is the remainder when 64 is divided by (2 + (-24)/9)*(-32 - 1)?
20
Let b(r) = 0*r**2 + 2 + 7*r**2 + 0 - 5*r**2 - 4*r. Calculate the remainder when b(-4) is divided by 13.
11
Let h(x) = -x**2 - 3*x + 4. Let u = 9 + 1. Calculate the remainder when u is divided by h(-3).
2
Let q = 1 - -43. Let t = 68 - q. Let r = -6 + 19. Calculate the remainder when t is divided by r.
11
Let s(n) = -1 - 2*n + 6*n - 3*n. Let x(m) = -4*m + 12. Let r(j) = -12*s(j) - x(j). What is the remainder when 46 is divided by r(-2)?
14
Let q(t) be the third derivative of t**5/60 - t**4/24 + 7*t**3/6 + 5*t**2. What is the remainder when q(-6) is divided by 17?
15
What is the remainder when 27 - (-4 + (3 - 2)) is divided by 8?
6
Let d(f) = f**2 - 4*f - 4. Let r be d(6). Suppose 0 + r = j. Let t(n) = n**3 - 9*n**2 + 10*n + 3. What is the remainder when t(j) is divided by 7?
5
What is the remainder when 32 is divided by (-37 - 2)/(-3) - (2 + -1)?
8
Let p(i) = -2*i**3 - 5*i**2 - 2*i + 2. What is the remainder when 48 is divided by p(-3)?
14
Let v(z) = 4*z**2 - z. Calculate the remainder when 77 is divided by v(-3).
38
Let p(a) = -2*a - 13. Calculate the remainder when 13 is divided by p(-8).
1
Let w(k) = -k**2 + 7*k + 1. Let m be 16 + (-1 - 5)/3. Let j be (-111)/(-21) - 4/m. What is the remainder when 20 is divided by w(j)?
9
Let l(k) = 10*k. What is the remainder when 19 is divided by l(1)?
9
Let r(a) be the second derivative of a**4/12 - a**3/2 - a**2 - 3*a. Calculate the remainder when r(5) is divided by 3.
2
Suppose -3 = -2*o + 7. Suppose -n = -3*x - x + 8, n = 0. What is the remainder when o is divided by 2/(4/(-3) + x)?
2
Suppose 4*h - 2*m - 126 = -40, 3*m = -4*h + 101. Suppose a - h = 2*f, -4*a + 2*a + 2*f + 36 = 0. What is the remainder when 23 is divided by a?
10
Let c(x) = -x**2 + 11*x + 4. What is the remainder when 52 is divided by c(10)?
10
Let j = -13 - -8. Suppose -p + 2 + 7 = 3*y, -4*y - 5*p + 23 = 0. What is the remainder when (6/j)/(4/(-10)) is divided by y?
1
Suppose 0*o = -o + 1, 3*o - 1 = h. Let f = 23 + -16. Suppose -f = -i - 5*c - 23, -3*c - 12 = 0. What is the remainder when i is divided by h?
0
Let x = 890 + -884. Suppose 3*g - 71 = -f, 0 = 3*g - 2*f - 89 + 24. What is the remainder when g is divided by x?
5
Suppose -10*p - 51 + 141 = 0. Calculate the remainder when 41 is divided by p.
5
Suppose -3*s + 4*s - 3*w - 1 = 0, -s - 2*w = -21. Suppose 2*j = -0*j + 8. What is the remainder when s is divided by j?
1
Suppose -3*p = -10 + 1. What is the remainder when 4 is divided by p?
1
Suppose j - 3*j + 8 = 0. Suppose -j*q - 17 = -161. Suppose 5*g - q = g. What is the remainder when 16 is divided by g?
7
Suppose 45 = 2*b - 2*q - 3, 0 = q + 4. Calculate the remainder when 56 is divided by b.
16
Suppose -4*t = t. Let z be 2 + (t - 2)/(-2). Suppose 0 = 5*r + 4*u - 23, -5 + 32 = z*r - 2*u. Calculate the remainder when 19 is divided by r.
5
Suppose -r = -16 + 1. Let d = -28 + 56. What is the remainder when d is divided by r?
13
Let s(n) = -n**2 + 7*n - 5. Suppose -3*q = 2*x - 15 + 1, 4*q - 12 = 4*x. What is the remainder when 13 is divided by s(q)?
6
Let s(d) = -d**3 - 4*d**2 + 4*d + 20. Calculate the remainder when s(-6) is divided by 12.
8
Suppose y + 2 = 0, 3*g + y - 13 = -0*y. Calculate the remainder when 2/(-4) - (-105)/6 is divided by g.
2
Let o = 19 - 6. What is the remainder when 47 is divided by o?
8
Suppose -2*n + 6 + 0 = 0. Let f be -3 - (n - (-1 - -2)). What is the remainder when 4 is divided by (-1 - f) + 0 + -1?
1
Suppose -390 = 7*o - 13*o. Calculate the remainder when o is divided by 23.
19
Let c(f) = 1 - 2*f**2 + 2*f + f**2 - 4 + 2*f**3. Calculate the remainder when c(2) is divided by 5.
3
Suppose -4 = 3*v - 5*v. Suppose -f = -v*f + 10. What is the remainder when f is divided by 3?
1
Let x = 11 + -8. Suppose -x*u + 7 = -53. Calculate the remainder when u is divided by 7.
6
Let z(s) = -s**3 + 6*s**2 - 4*s - 3. Let w be z(5). Suppose -w*i + i = 4*t - 59, -16 = -t + i. Calculate the remainder when 29 is divided by t.
14
Let v = 33 + -20. Suppose 3 = -2*x + v, -2*x = -5*d + 245. What is the remainder when d/4 - 2/(-8) is divided by 7?
6
Let i(m) = 7*m + 3. Let v(a) = a**2 - 4*a - 8. Calculate the remainder when i(5) is divided by v(7).
12
Suppose 2*t + 4 = -0. Calculate the remainder when (-5)/10 + (-5)/t is divided by 2.
0
Calculate the remainder when (-3 + 6 + -74)/(-2 - -1) is divided by 12.
11
Suppose -2*c - 4*j - 18 = 0, 3*c + 0*j + 26 = -5*j. Let s = c - -10. Suppose s*l + 7 - 70 = 0. What is the remainder when 62 is divided by l?
20
Let x(u) = u**3 - 9*u**2 - 10*u + 5. What is the remainder when 19 is divided by x(10)?
4
Suppose -2*a + 3*a = -3. Let d(u) = 3*u**2 + 5*u + 3. What is the remainder when 27 is divided by d(a)?
12
Let v(u) = -3*u + 2. Let z(c) = 3*c**3 - c. Let d be z(-1). What is the remainder when 15 is divided by v(d)?
7
Suppose 564 = 5*d + 69. What is the remainder when d is divided by 25?
24
Let g = -6 + 12. Let f(a) = a**3 - 11*a**2 + 12*a + 14. Let t be f(10). Let v = 51 - t. Calculate the remainder when v is divided by g.
5
What is the remainder when (3 + (-4)/2)/((-2)/(-76)) is divided by 21?
17
Suppose -4*q + 18 = 3*k, -2*k = -3*q - k + 20. Let d(l) = -l**3 + 4*l**2 + 6*l + 6. What is the remainder when d(5) is divided by q?
5
Suppose -3*o = -5*j - 52, 64 = -0*o + 5*o + 3*j. Calculate the remainder when 37 is divided by o.
9
Let d be (-2 - 0/2)*-2. Suppose -x + 2*u = d - 6, -x = 2*u - 6. Calculate the remainder when 5 is divided by x.
1
Suppose 0 = -i + 4*i - 48. Let h(f) = f**3 - 6*f**2 + f - 4. Let s be h(6). Suppose 2*t = -s*t + 36. What is the remainder when i is divided by t?
7
Suppose 3*r + i + 0 = 8, -4*r + 12 = i. Suppose r*x - 77 - 31 = 0. What is the remainder when x is divide
|
{
"pile_set_name": "DM Mathematics"
}
|
Posting settings question.. PHOTO ADDED IN COMMENT
Today at a 1st birthday party I played around taking some pictures in Manual because the lighting wasn't working in Auto and I thought since it wasn't a session (so to speak) then was as good a time as any to play around.
So, now in order to post for CC I know you all ask for settings, once you take the picture how do you find out what your settings were? I can't remember what I used and I think I changed it a few times since I was experimenting. Help!
Cute little girl. That paper thing in front is distracting, that is where my attention goes. It would have been nice to see your whole subject. Your SS was good, you were able to avoid getting any blur that way. And for having such a high ISO its not noisy.
I do think it's a nice picture, with a little edit tweaking it a keeper! cute kiddo <3
The ISO is a high, about 800 and above you start getting grainy. So in the future I would lower that.I am not sure how the lighting was, I change my WB usually rather then up the ISO in a floursant light type situation but to each his own, some do the opposite.
1/200 is pretty close, I usually set mine to 1/250 with toddlers.
The fstop depends on if you were shooting with a kit lens etc. I usually go lower but most kit lens don't go much lower. The lower the number the more light you let in, which is how you get bokeh ( blurry background)
I did use a flash because her mom put her right in front of a window that had the sun blaring right in. The black stuff is beadboard and some of that glare may have been from the other 10 people in front of the little girl snapping pictures lol. (You know how family gets with 1 year olds!)Â
The paper thing was a decoration and I kind of just snapped whatever I could to practice with the Manual mode. I've been playing around with it more often.
It seemed that if I lowered the ISO it got really dark, but maybe it was the lighting. Not only was there a window with direct light right behind her, there was virtually no other lighting in the place (very awful building for pictures). Â
Â
But, I'm bringing this little girl in for her very own personal (only me shooting) smash cake session in a couple weeks (for practice and for better pictures for mama!)
There is a way to blur out the paper puffball with a kit lens, and keep the little girl in view...unfortunately you were working in some less than camera friendly conditions. What did you meter off of? And does your camera have flash fill, dialing down the power of the flash may have helped a little, but kudos for playing around in Manual...PP is right....it does get easier the more you use it. Maybe you can clone the darker part of beadboard over the glary flashed part, maybe you can turn this into an edit contest.
|
{
"pile_set_name": "Pile-CC"
}
|
Arbitrary-order all-fiber temporal differentiator based on a fiber Bragg grating: design and experimental demonstration.
A new technique to design an all-fiber temporal differentiator that has a large bandwidth and an arbitrary differentiation order is proposed and investigated. The proposed temporal differentiator is a special fiber Bragg grating (FBG) that is designed by controlling its magnitude and phase responses with the discrete layer peeling (DLP) method. There are three important features of this technique: 1) the temporal differentiator has an arbitrary magnitude response and a controllable bandwidth; 2) the temporal differentiator can be designed and fabricated with an arbitrary differentiation order that is realized in a single FBG; 3) the required maximum index modulation of the FBG-based differentiator is largely decreased by using a Gaussian windowing function. The use of the proposed technique to design temporal differentiators with a differentiation order up to the fourth and with a bandwidth up to 500 GHz is studied. A proof-of-concept experiment is then carried out. A first- and a second-order temporal differentiator with a bandwidth of 25 GHz are experimentally demonstrated.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
If $-1$is a root for $ax^2+bx−3$, find $a^2+b^2$
Given: -1 is a root for $ax^2+bx-3$, with $a,b$ being positive primes, $x\in \Bbb R$.
Find: the numeric value for $a^2+b^2$.
Background: question asked in an entrance exam (Colégio Militar 2005).
My attempt: the other root is $3/a$ and by substitution we can easily find that $$a-b=3\ \ \text{or}\ \ a^2+b^2-2ab=9.$$
I got stuck at this point... how to get the value for $ab$? Hints please.
A:
Starting from $a-b=3$, which is odd, this implies the positive primes cannot be both odd. So one of them is $2$, the other is an odd prime. As $a-b>0$, it's $b$ which is equal to $2$, so $a=3+b=5$, and $a^2+b^2=29$.
A:
Pure obfuscation.
Nothing about roots or algebra or the sum of $a^2 + b^2$ are relevant. That $-1$ is a root simply means $a(-1)^2 + b(-1)-3 = 0$ or in other words $a - b =3$ or $a = b+3$.
What does matter is that $a,b$ are positive primes and all primes except $2$ are odd. If they were both odd primes then $a -b$ would be an even number. So one of them is even so one of them is $2$. So the other is $2+3 = 5$.
So $a^2 + b^2 = 29$.
|
{
"pile_set_name": "StackExchange"
}
|
Mental disorders in patients with metabolic syndrome. The key role of central obesity.
The Authors sought to evaluate current prevalence of mental disorders in patients affected by metabolic syndrome compared with patients affected by central obesity alone. 186 (63.5%) patients affected by central obesity and 107 (36.5%) affected by metabolic syndrome according to ICF criteria were interviewed by means of SCID I. Axis I current prevalence was respectively 45.7% and 44.9% among patients with central obesity and patients with metabolic syndrome, differences which were not significant. No statistically significant differences were found between groups as far as each single axis I diagnostic category was concerned. Moreover, current prevalence of any axis I, anxiety and mood disorders were independent of the number of components of metabolic syndrome. metabolic syndrome is associated to an higher risk for current mental disorders, which seems to be mainly due to the strong association of central obesity to psychopathology.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Just like the fate that binds together wolves and sheep, such is the difference between you and me-- you, with your sides burned by Spanish ropes and your shins by hard shackles. Although you can swagger about with your arrogant wealth, Fortune has not changed who you really are.
Don’t you see as you strut along the Via Sacra in your outrageous toga that passersby turn their eyes away in absolute disgust? “Cut by the lashes of the triumvir capitals until the herald was disgusted, now… Continue
Ὄφις πατούμενος
Another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text and a segmented version here; for grammar notes and more information, please visit the wiki. You can keep up with the latest Bestiaria posts by using the RSS feed, or you can…
I''m writing to inform you, if you haven't been able to see the display boards that have traveled to APA Chicago, Eta Sigma Phi, and just recently, CAMWS, that the winners and honorable mention entries from the 2008 APA Comics Contest are traveling the country at the request of teachers like you.
The theme was the statue of Ceres that crowns the Chicago Board of Trade building. The cost of the display is nominal, since it entails merely the price… Continue
Κύνες λέοντος δορὰν σπαράττοντες
Another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text and a segmented version here; for grammar notes and more information, please visit the wiki. You can keep up with the latest Bestiaria posts by using the RSS feed, or…
If ever someone with an impious hand, has broken the aged neck of a parent, make them eat garlic-- it’s worse than hemlock! Oh, the tough guts of harvesters! What sort of poison rages in my stomach? Has the gore of a viper been boiled with these vegetables without my notice? Or has that witch Canidia handled this evil stew?
When Medea gazed upon Jason, shining brighter than all the rest of the Argonaughts, she anointed him with this stuff when he was about to bind the bulls unused to… Continue
Λέων ἐγκάθειρκτος καὶ ἀλώπηξ
Another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text and a segmented version here; for grammar notes and more information, please visit the wiki. You can keep up with the latest Bestiaria posts by using the RSS feed, or you…
One of the two evening sessions on April 17 at CAMWS focused on AP Latin, specifically the results of the two 2007 exams, how the exams were created, and how they were graded. The three panelists included Mary Pendergraft, Dawn La Fon, and Wells Hansen. At the start of the session, Pendergraft stated that there would be plenty of time at the end for questions about AP Latin Literature, which turned out to be a solid… Continue
Κύων καὶ χαλκεῖς
Another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text and a segmented version here; for grammar notes and more information, please visit the wiki. You can keep up with the latest Bestiaria posts by using the RSS feed, or you can…
Ἔλαφος ἐπὶ νάματι καὶ θηρευταί
Another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text and a segmented version here; for grammar notes and more information, please visit the wiki. You can keep up with the latest Bestiaria posts by using the RSS feed, or you…
A friend once said that the Four Horsemen of the Apocalypse were McDonald's, Coca-Cola, Starbucks, and Disney. He saw the developing multi-national corporate model in each business, and the fact that they would bring about a homogenization, at the expense of the individual history and culture.
That's what I thought when I saw this about the Parthenon, sent by a student . What developer wouldn't love to get ahold of the Acropolis?
“Happy is he who avoids the rat race, like the ancient race of mortals, cultivates his ancestral lands with cows, who is free from debt, who’s neither a soldier, roused by the cruel trumpet, nor dreading the wrathful sea, nor living at the Forum and the haughty thresholds of more powerful men.
“So, when the shoots of his vines mature, he weds them to tall poplars, or in a remote vale, he watches the wanderings of the bellowing flocks, and removing… Continue
Additions to Latinum:
1. Vocabulary learning help for GCSE Latin - word files in English-Latin of core vocabulary to play in the background while you are doing something more useful, like rollerblading. The painless way to learn vocab.
2. General vocabulary building files:
I have uploaded the first 20 episodes of vocabulary items classified according to their subject matter. This keeps the vocabulary in semantic fields, and makes it easier to learn. There will be over 20… Continue
Ἀλώπηξ καὶ πίθηξ
Another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text and a segmented version here; for grammar notes and more information, please visit the wiki. You can keep up with the latest Bestiaria posts by using the RSS feed, or you can…
Λέων καὶ δύο ταῦροι
Another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text and a segmented version here; for grammar notes and more information, please visit the wiki. You can keep up with the latest Bestiaria posts by using the RSS feed, or you can…
I am currently working on a translation of Horace's Epodes. I thought it would be nice to post some here for comment. Keep in mind that these are a work in progress and any comments woudl be appreciated.
Epode 1
Friend, you are going in a Liburtine galley among the ship’s tall ramparts, prepared, Maecenas, to undergo all of Caesar’s dangers yourself.
What about us, whose life will be sweet if you survive and loathsome if you don’t?
Should I pursue leisure,… Continue
Ποιμὴν καὶ λέων
Hi, everybody! I'm back after a LONG hiatus - blame it on Bolchazy-Carducci (just kidding), because I was finishing up the ms. of a book for them on Barlow's Aesop (yeah!!!). I finally finished that last week, so I'm blogging fables here again, this time with another fable from Syntipas - check out the GreekAesop wiki for more information about Syntipas and his fables! I've included the text…
The following letter was written by Ronnie Ancona in response to an urgent e-mail from Judy Hallett to the APA Board and some others (like Ronnie) involved in AP. Now posted on Latinteach and Classics list:
Dear colleagues,
Thanks to Judy for calling this matter to your attention. I was truly stunned by this announcement. There seem to be three issues involved, (1) the announced change itself (2) the lack of professional consultation and (3) the lack of lead time for… Continue
|
{
"pile_set_name": "Pile-CC"
}
|
Cape chimaera
The cape chimaera (Chimaera notafricana) is a chimaera species in the family Chimaeridae, which lives in South Africa and Namibia.
Taxonomy
The cape chimaera is one of 16 species in the genus Chimaera. The species was described in 2010 by Kemper, Ebert Compagno and Didier. Prior to 2010, specimens were classified under the species Chimaera monstrosa, commonly known as the rabbit fish, before further studies showed that they had a number of differences in distribution and appearance, enough to classify them as two separate species.
Habitat and distribution
The cape chimaera is found in the southeast Atlantic Ocean, in the waters off Namibia as well as South Africa, particularly in the Western Cape, Northern Cape Province, and Eastern Cape Province. Its exact population being unknown, but it is thought to be an uncommon species. Although the species is occasionally caught as a bycatch by deepwater fisheries, it is not threatened and is not sought out for commercial purposes. Currently, there are no conservation measures taking place on behalf of the species and as of November 18, 2010 it is listed as Least Concern by IUCN.
The cape chimaera lives in waters – deep. It is believed to be a benthic species, living at the sea floor of the continental slope. Little else is known about its habitat of the species.
References
Category:Chimaera
Category:Marine fish of South Africa
Category:Fish of Namibia
Category:Fish described in 2010
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.