text stringlengths 12 4.76M | timestamp stringlengths 26 26 | url stringlengths 32 32 |
|---|---|---|
{
"cSpell.words": [
"automagically",
"falsy",
"mongoskin",
"truthy",
"truthyness"
],
"cSpell.language": "en,en-US"
} | 2024-04-20T01:27:15.642919 | https://example.com/article/1132 |
@import "themes/coffee.scss";
@import "websites/all-websites.scss";
@import "websites/linkedin.scss"; | 2023-08-01T01:27:15.642919 | https://example.com/article/8420 |
Water Lily Frock (Fuchsia)
Fuchsia colour sleeveless satin and net party frock with delicate pearls aligned on round neckline. Waistline has belt with delicate pearls and beautiful flower and leaves on it. Skirt has satin base with two layers of skin friendly soft net. The dress has an extra long zipper and belt for easy wear and perfect fit. | 2023-11-09T01:27:15.642919 | https://example.com/article/6968 |
The Book of Nehemiah
Chapter 10
The people covenant not to marry outside of Israel—They also covenant to honor the Sabbath, to pay tithes, and to keep the commandments.
1 Now those that sealed were, Nehemiah, the aTirshatha, the son of Hachaliah, and Zidkijah,
2 Seraiah, Azariah, Jeremiah,
3 Pashur, Amariah, Malchijah,
4 Hattush, Shebaniah, Malluch,
5 Harim, Meremoth, Obadiah,
6 Daniel, Ginnethon, Baruch,
7 Meshullam, Abijah, Mijamin,
8 Maaziah, Bilgai, Shemaiah: these were the priests.
9 And the Levites: both Jeshua the son of Azaniah, Binnui of the sons of Henadad, Kadmiel;
10 And their brethren, Shebaniah, Hodijah, Kelita, Pelaiah, Hanan,
11 Micha, Rehob, Hashabiah,
12 Zaccur, Sherebiah, Shebaniah,
13 Hodijah, Bani, Beninu.
14 The chief of the people; Parosh, Pahath-moab, Elam, Zatthu, Bani,
15 Bunni, Azgad, Bebai,
16 Adonijah, Bigvai, Adin,
17 Ater, Hizkijah, Azzur,
18 Hodijah, Hashum, Bezai,
19 Hariph, Anathoth, Nebai,
20 Magpiash, Meshullam, Hezir,
21 Meshezabeel, Zadok, Jaddua,
22 Pelatiah, Hanan, Anaiah,
23 Hoshea, Hananiah, Hashub,
24 Hallohesh, Pileha, Shobek,
25 Rehum, Hashabnah, Maaseiah,
26 And Ahijah, Hanan, Anan,
27 Malluch, Harim, Baanah.
28 ¶And the rest of the people, the priests, the Levites, the porters, the singers, the aNethinims, and all they that had bseparated themselves from the people of the lands unto the law of God, their wives, their sons, and their daughters, every one having cknowledge, and having understanding;
29 They clave to their brethren, their nobles, and entered into aabcurse, and into an coath, to walk in God’s dlaw, which was given by Moses the servant of God, and to observe and do all the commandments of the Lordeour Lord, and his judgments and his statutes;
30 And that we would not give our adaughters unto the people of the land, nor take their daughters for our sons:
31 And if the people of the land bring aware or any bvictuals on the csabbath day to sell, that we would not buy it of them on the sabbath, or on the holy day: and that we would leave the dseventh year, and the exaction of every debt.
32 Also we made ordinances for us, to acharge ourselves yearly with the third part of a shekel for the bservice of the house of our God;
33 For the ashewbread, and for the continual bmeat offering, and for the continual burnt offering, of the sabbaths, of the new moons, for the set feasts, and for the holy things, and for the sin offerings to make an catonement for Israel, and for all the work of the house of our God.
34 And we acast the lots among the priests, the Levites, and the people, for the bwood offering, to bring it into the house of our God, after the houses of our fathers, at times appointed year by year, to burn upon the altar of the Lord our God, as it is written in the law:
35 And to bring the afirstfruits of our ground, and the firstfruits of all fruit of all trees, year by year, unto the house of the Lord:
36 Also the afirstborn of our sons, and of our cattle, as it is written in the law, and the firstlings of our herds and of our flocks, to bring to the house of our God, unto the priests that minister in the house of our God:
37 And that we should bring the firstfruits of our adough, and our offerings, and the fruit of all manner of trees, of wine and of oil, unto the priests, to the chambers of the house of our God; and the tithes of our ground unto the Levites, that the same Levites might have the tithes in all the cities of our tillage.
38 And the priest the son of Aaron shall be with the Levites, when the Levites take tithes: and the Levites shall bring up the atithe of the tithes unto the house of our God, to the chambers, into the treasure house.
39 For the children of Israel and the children of Levi shall bring the offering of the corn, of the new wine, and the oil, unto the chambers, where are the vessels of the sanctuary, and the priests that minister, and the porters, and the singers: and we will not forsake the house of our God. | 2024-07-26T01:27:15.642919 | https://example.com/article/9540 |
Defiant Assad dismisses talks bid
Defiant Assad dismisses talks bid
Defiant Assad dismisses talks bid
1/2
Syrian President Bashar Assad last spoke publicly in November, vowing to Russia Today TV that he would not step down
2/2
Syrian President Bashar Assad outlined a new peace initiative that includes a national reconciliation conference and a new government (AP)
President Bashar Assad has called on Syrians to defend their country against religious extremists seeking to destroy the nation, dismissing any prospect of dialogue with the "murderous criminals" he says are behind the uprising.
As he outlined his vision for a peaceful settlement to the civil war in a one-hour speech to the nation, Assad struck a defiant tone, ignoring international demands for him to step down and saying he is ready to hold a dialogue but only with those "who have not betrayed Syria".
He offered a national reconciliation conference, elections and a new constitution but demanded regional and Western countries stop funding and arming rebels trying to overthrow him first.
Syria's opposition swiftly rejected the proposal. Those fighting to topple the regime, including rebels on the ground, have repeatedly said they will accept nothing less than the president's departure, dismissing any kind of settlement that leaves him in the picture.
"It is an excellent initiative that is only missing one crucial thing: His resignation," said Kamal Labwani, a veteran secular dissident and member of the opposition's Syrian National Coalition umbrella group. "All what he is proposing will happen automatically, but only after he steps down," Lawani said from Sweden.
On top of that, Assad's new initiative is reminiscent of symbolic changes and concessions that his government made earlier in the uprising, which were rejected at the time as too little too late.
Speaking at the Opera House in central Damascus, Assad told the hall packed with supporters - who frequently broke out in cheers and applause - that "we are in a state of war".
"We are fighting an external aggression that is more dangerous than any others, because they use us to kill each other," he said. "It is a war between the nation and its enemies, between the people and the murderous criminals."
Assad has rarely spoken since the uprising against his rule began in March 2011, and today's speech was his first since June. His last public comments came in an interview in November to Russian TV in which he vowed to die in Syria. On Sunday, he seemed equally confident in his troops' ability to crush the rebels fighting his rule, even as they edge in closer than ever to his seat of power, Damascus.
EU foreign policy chief Catherine Ashton's office said in a statement that the bloc will "look carefully if there is anything new in the speech but we maintain our position that Assad has to step aside and allow for a political transition." | 2024-05-23T01:27:15.642919 | https://example.com/article/6163 |
Congestive heart failure (CHF) is an increasingly frequent cause of cardiovascular morbidity and mortality. CHF occurs as a result of systolic dysfunction, diastolic dysfunction, or a combination of both. Approximately 40% of CHF diagnoses involve diastolic dysfunction in the absence of systolic dysfunction. Diastolic dysfunction is largely related to impaired intracellular calcium sequestration resulting in prolonged calcium transients and delayed myocardial relaxation. Recent evidence has suggested parvalbumin gene transfer may correct diastolic dysfunction by acting as a delayed calcium buffer. However, limitations are associated with this approach, including systolic dysfunction. This study examines the use of genetically modified parvalbumin to limit these limitations while improving diastolic function by testing the following hypotheses: 1. Mutations that increase the magnesium affinity will limit parvalbumin mediated systolic dysfunction and preserve enhanced relaxation kinetics in normal myocytes. 2. Parvalbumin mutants exhibiting enhanced relaxation kinetics with little or no effect on contractile kinetics will restore relaxation performance in isolated myocytes from failing myocardium. | 2024-06-15T01:27:15.642919 | https://example.com/article/3942 |
With the advent of personal computers in the mid to late 70's, the use of computers for home and office has dramatically increased. As a result of the rapid development of technology, the size of the computer has also been greatly reduced. A variety of advanced notebook computers as well as hand-held devices have been developed. The application of computers greatly improves working efficiency, and shortens the distance between people. Regular hand-held devices are designed for particular purposes. However, due to certain limitations in technology, these hand-held devices typically cannot replace personal computers.
Therefore, these hand-held devices are commonly used in certain conditions to store and process certain types of data. As an example, a handheld device may be used in a warehouse to track movement of goods in, out and within the warehouse. For long-term preservation of the information being stored in a hand-held device or for a complicated analysis of the information, communication technology may be employed to transmit the information from the hand-held device to a personal computer, server computer, or other networked machine. At the present time, a variety of communication networks have been used for the transmission of information from a distance. It is important to efficiently utilize obtained information, and to well protect it.
Conventionally, a user may protect one's private information in a computer system by setting a code in it, or encrypting one's private information by means of the application of an encryption procedure. If a user owns a hand-held device and a personal computer, the user may need to set a code in the hand-held device and the personal computer separately, or to use an encryption procedure in encrypting the information in the hand-held device and the information in the personal computer. This method is complicated, and its effect is still not guaranteed. The code set in a computer system can be easily broken. To a computer hacker, it may be easy to break a password set in a computer system by means of employing code-breaking procedures or tracing the password.
Other problems with storing data on mobile devices are due to data corruption and theft. Typically a single user interacts with the mobile device so there is no multi-user operating system which requires some type of security measures or a password. Therefore data is extremely accessible and vulnerable. Also conventional forms of data encryption such as symmetric encryption are found to be too CPU intensive for a hand-held device.
Data encryption for PDA or handheld devices (personal devices) is presently limited by a variety of factors. Resources such as processors and memory may be limited on a personal device. As a result, encryption can be either time-consuming (reducing efficiency) or ineffective. Similarly, encryption facilities tend to be limited—for example operating systems for personal devices typically have limited or no encryption facilities. Operating systems may provide a logon password used to allow the device to power-on or for initial operation of the device, but may not provide the ability for multiple users to access some data universally and reserve other data as segregated, encrypted data.
Therefore the conventional data encryption and storage techniques within a mobile computer system have severe limitations and a more appropriate solution is sought that offers both high security and efficient encoding and decoding of data. Preferably, capabilities beyond those outlined above would be provided, allowing for access to some data by all users and private access to data by specified users. Moreover, such capabilities would preferably be offered in a manner allowing for integration with present software (such as operating systems) and future software used on personal devices. Additionally, allowing for retrieval of information in unusual circumstances where a device is stolen or a user is unable or unwilling to provide access to the device normally may be useful. | 2023-11-07T01:27:15.642919 | https://example.com/article/9149 |
Q:
Using async with multiple functions javascript
How to use async correctly with multiple dependent functions...
Here was my attempt which is not working out, it is within an async.waterfall function:
function (urlsCreated, cb) {
var z, artist, title, added_on;
z = [];
async.mapSeries(urlsCreated, function (url, next) {
scrape_music.total_pages(50, url, function (array, total, extra) {
scrape_music.each(artist, title, added_on, array, url, function (result) {
});
});
}, function (z) {
console.log(z);
});
}
Everything is working fine up to this part...
basically urlsCreated is an array of 2 urls...
Then I called a mapSeries assuming that it will iterate between them...
The way it should be working is, it iterates through each url in the array, then for each url it should get a total page count for the url, and then for each page count which is added to the array parameter/callback of the total_pages, should be iterated within...
so basically the arrays are: urlsCreated (containing 2 links) --> array (containing total pages in total_pages method) --> result (.each method should grab off each page, number of pages included in the array beforehand) and then repeat for amount of urls in urlsCreated...
Any help would be wonderful, currently nothing gets printed for z, and essentially I just want an array filled with objects that are returned in result from scrape_music.each.
EDIT----
Here is the code for those functions.
//loop thrugh each page and find jquery elements that match
Scrape.prototype.each = function (artist, title, added_on, array, urls, cb) {
console.log('entered each');
console.log(array);
var $trs, list;
list = [];
this.page(array, urls, function ($page) {
//$trs selects all the rows from 1-50
$trs = $page('tr').slice(11, -3);
$trs.map(function (i, item) {
var result;
result = {};
result.artist = $page(item).find('td').eq(1).text();
result.title = $page(item).find('td').eq(2).text();
result.added_on = $page(item).find('td').eq(3).text();
list.push(result);
});
cb(list);
});
};
Scrape.prototype.total_pages = function (divide, url, cb) {
return request("" + url + config.url.pageQ + 0, function (err, res, body) {
if (err) { throw err; }
var page, select, match, total, matches, array, extra;
array = [];
page = cheerio.load(body);
select = page('tr').slice(9, 10);
match = page(select).find('td').eq(1).text();
matches = match.slice(-18, -14).trim();
total = Math.round(matches / divide);
extra = matches % divide;
for(x = 0; x < total; x++) {
array.push(x);
}
cb(array, total, extra);
});
};
//used to loop through all pages
Scrape.prototype.page = function (array, urls, cb) {
return array.forEach(function (i) {
return request("" + urls + config.url.pageQ + i, function (err, res, body) {
//console.log(urls + config.url.pageQ + i);
if (err) { throw err; }
cb(cheerio.load(body));
});
});
};
A:
function (urlsCreated, cb) {
var artist, title, added_on;
async.mapSeries(urlsCreated, function (url, next) {
scrape_music.total_pages(50, url, function (array, total, extra) {
// 1:
scrape_music.each(artist, title, added_on, array, url, function (result) {
// 2:
next(null, result);
});
});
}, function (err, z) {
// 3:
console.log(z);
});
}
each() here can't be an iterator (not sure what it does) as you can only call next() for asyncMap once per iteration. If the callback is called when the iterating is done then it's fine
Tell async this iteration is done. The first argument is any error
The second argument is the new array
| 2024-05-27T01:27:15.642919 | https://example.com/article/4486 |
Maui Vista (Hawaii Tax ID - W30348402-01) - This lovely, air-conditioned one-bedroom condo that sleeps 4, is very close to the beach, yet it has the best rates on the island! It is in beautiful Kihei -only a 25-minute drive from the airport. It is just steps away from a gorgeous white sand beach, which many consider one of the best in Maui. It is within walking distance of shopping and restaurants, and just a few minutes drive to historic Wailea and several wonderful golf courses. It's great for families!
This unit is on the first floor with a lovely, large, tropical yard just outside the private patio or 'lanai'- great for kids to play. Sit on the 'lanai', sip drinks, or enjoy a meal outdoors! It is perfect for entertaining or just lounging in the sun. Savor the beautiful, scenic surroundings from your own patio. It's a wonderful way to get away, and relax!
Kamaole I (shown in our pictures) is a fantastic beach, and is only 1 block away - just a few minutes walk. This is a popular, beautiful, white sand, swimming and snorkeling beach. It has warm, clear, turquoise blue water, with gentle waves. It's great for swimming, and for children. The sunrise and sunset on the beach are magnificent!
Condo sleeps four, two in the bedroom and two on the pull out couch in the living room. One of the 3 fresh water pools is less than 100 feet away.
The Maui Vista complex has 6 tennis courts, outdoor gas barbeques, and 7 acres of lushly landscaped tropical grounds. Recent condo improvements include tiling and flat screen TV's. The place looks great!
Click on our heading 'Things To Do' for more information about activites to do on Maui.
We can provide you with great references or testimonials. We have been in the business for 15 years, and manage a number of condos. We have worked with a large number of people, and some agencies. See many of our testimonials on the link above that says, "Things To Do".
..
The condo is ready for your full enjoyment of this tropical paradise! It has a fully equipped kitchen with dishes, pots and pans, utensils,
coffee maker, blender and toaster. Other amenities include:
We endeavor to make sure that all items and appliances in our condo are available and functional. We also respond ASAP if there is a problem. We cannot, however, guarantee perfection as we use remote (from us) maintenance people to do the necessary work.
Sign up with airbnb.com, to see very reasonably priced accomodations for your travels! You get $20 credit when you travel, when you sign up. It is also a cheap website to use to advertise your vacation rentals- it is a minimal cost, when you figure in that they pay the credit card fees. Use this link to sign up: www.airbnb.com/c/rwarner6?s=8
Security Deposit & Rental Details
$100 security deposit is required to reserve the unit.
This is refundable if the condo is left in good order and keys are returned. Balance of rent is due approx. 45 days prior to rental start date. US Funds by Check, money order, cashier’s check, or PayPal.com accepted. Reservations through www.vrbo.com and www.airbnb.com can use credit cards. No pets and no inside/lanai smoking allowed (Hawaii Anti-Smoking bill). There is a smoking area in the parking lot. Please turn off Air Conditioner when leaving the condo for the day.
15 night minimum stay, or a $120 cleaning fee applies.
Please conserve water and electricity since it is an island and resources are limited, and we would like to keep your rates lower!
All reservations are subject to review to verify the rates and are subject to change without notice until security deposit and payment in full is accepted by us. We may interchange Maui units without notice as long as they are in the same complex. We are not responsible for errors or omissions in the data presented on this site.
In the event of service outage in regards to the condo or this site or any other instance which
makes the rental unsuccessful, we cannot be held liable for any costs beyond the amount
paid to us by the client for the services which were not provided.
If you have questions, please contact us.
¥Some restrictions apply
Copyright 2003,2018
Grosvenor Ent., LLC/Darren GrosvenorContinued use of this site means you understand and confirm we use/store cookies on your equipment to maintain session information, etc. If you dont agree, please close browser and discontinue use of this site.
. | 2023-10-03T01:27:15.642919 | https://example.com/article/5742 |
Individualized breathlessness interventions may improve outcomes in patients with advanced COPD.
Many patients with advanced COPD experience refractory breathlessness and individualized breathlessness interventions may improve management of this complex symptom. The aims of this study were to develop, implement and assess the efficacy of a breathlessness intervention for patients with COPD and refractory breathlessness and to evaluate patient acceptability. An individualized breathlessness plan, information leaflets, breathlessness education and a hand-held fan were offered to consecutive patients with severe COPD and refractory breathlessness attending a tertiary integrated respiratory and palliative care service. Validated dyspnoea, quality of life and anxiety/depression questionnaires were administered at baseline and after 6 weeks, with change in dyspnoea scores being the primary outcome measure. A subset of patients participated in a structured telephone interview to qualitatively assess the intervention. Twenty-six patients with severe COPD (mean forced expiratory volume in 1 s (FEV1 ) 38%) were included, with a mean age of 74 years. Mean modified Medical Research Council Breathlessness Scale score was 3.5. Anxiety and depression were common, being present in 38% and 35% of participants. At 6 weeks, there was a clinically significant improvement in breathlessness severity as measured by the Numerical Rating Scale. The subset of patients with anxiety/depression also saw significant improvement in all domains of the Self-Administered Standardized Chronic Respiratory Questionnaire (CRQ-SAS). Patients reported that the intervention was highly useful and acceptable. This feasibility study of individualized breathlessness interventions in patients with severe COPD and refractory breathlessness is the first to demonstrate a clinically significant reduction in dyspnoea scores, with high levels of patient acceptability. | 2024-03-17T01:27:15.642919 | https://example.com/article/1218 |
Surgical treatment of giant aneurysm of hepatic artery: report of three cases.
To explore the surgical way of treating giant hepatic artery aneurysm(HAA). Three hepatic artery aneurysm patients who were performed aneurysm resection without revascularization of the hepatic artery were reviewed. After surgery, the values of liver function and enhanced CT scan of the patients were followed. All the three patients were recovered well postoperatively and only several values of biochemistry marks of liver function as ALT, AST, TBIL and DB in one case with liver cirrhosis were elevated and decreased to normal ranges in a few days postoperatively. The values of biochemistry marks of liver function in other two cases were within normal limits. The enhanced CT scan also showed arteries in the liver after hepatic artery aneurysm resection. Giant HAA may be safely removed without revascularization of the hepatic artery. | 2023-08-30T01:27:15.642919 | https://example.com/article/3161 |
news3
On 4 November 2017, H.E. Mr. Chaisiri Anamarn, Advisor to the Minister of Foreign Affairs of Thailand, presided over the Offering Ceremony of Royal Kathin Robe graciously bestowed by His Majesty King Maha Vajiralongkorn Bodindradebayavarangkun to the congregation of monks at Huyen Khong Temple in Thua Thien - Hue province, Vietnam. Also present at the ceremony were H.E. Mr. Manopchai Vongphakdi, Ambassador of Thailand to Vietnam, Mrs. Ureerat Ratanaprukse, Consul-General of Thailand in Ho Chi Minh City, members of Team Thailand in Vietnam, as well as Thai business people and more than 500 Thai and Vietnamese residents in the country. During the Kathin Celebration held in accordance with local tradition on the previous day, Mr. Anamarn delivered a speech emphasizing that the Royal Kathin Ceremony not only strengthens the cordial ties between Thailand and Vietnam, but also deepens the relationship between the peoples of the two countries.
The Ministry of Foreign Affairs has been granted royal permission to offer the Royal Kathin Robe annually to Buddhist temples in Vietnam for 13 years and this is the second time that the ceremony has been held at Huyen Khong Temple. At the end of the ceremony, the donation amounting to THB 540,400 was presented to the temple consisting of contributions from His Majesty King Maha Vajiralongkorn Bodindradebayavarangkun, the Ministry of Foreign Affairs, the Thailand-Vietnam Friendship Association, the Vietnamese Association in Thailand as well as Thai and Vietnamese participants. Huyen Khong Temple was established in 1973 and has undertaken a number of philanthropic projects, such as a flood relief project to help those affected by floods in the northern and southern parts of Vietnam. The temple also established a Huyen Khong Buddhist Club, where lessons on Theravda Buddhism are taught on Sundays. It is also noteworthy that Abbot Phra Phap Tong is the first Buddhist monk in Vietnam who has earned the clerical title (first level) “Phra Sudhammawongse” following the royal appointment on 5 December 2016. | 2024-03-08T01:27:15.642919 | https://example.com/article/9492 |
President Trump on Monday signed a resolution that scuttles a set of privacy rules adopted by the FCC last year, including requirements that internet providers obtain consumers’ consent before sharing or selling their browsing information and other data.
USTelecom, the trade association representing internet service providers, argued that the FCC’s rules, which had yet to go into effect, imposed a more onerous set of regulations on ISPs than those required of internet sites like Google and Facebook.
“Consumers should feel confident that the steps taken today won’t change anything other than clearing the path for regulators to institute uniform privacy rules that will keep their sensitive information private and secure,” said Jonathan Spalter, the CEO of USTelecom.
But public interest groups, congressional Democrats, and even “Late Show” host Stephen Colbert have blasted the repeal of the rules. They say that it shows the influence of big money in politics, and makes little sense given public concern over the protection of their personal information online.
The FCC’s rules would have required that internet providers obtain an “opt in” from their subscribers before they could sell or share personal information, data gathering that has proven lucrative as a way to draw advertisers. The type of information covered by the rules included browsing history and app usage. Major internet providers like Comcast say that they do not sell that information to third parties anyway and have their own privacy policies in place.
Congress last month approved the resolution to repeal the privacy rules. It also prevents the FCC from adopting similar rules in the future.
FCC Chairman Ajit Pai said in a statement that “American consumers’ privacy deserves to be protected regardless of who handles their personal information. “
He said that the FCC would be working with the FTC to “restore the FTC’s authority to police Internet service providers’ privacy practices.
“We need to put America’s most experienced and expert privacy cop back on the beat. And we need to end the uncertainty and confusion that was created in 2015 when the FCC intruded in this space.”
Chris Lewis, vice president at public interest group Public Knowledge, said that “most Americans have only one choice for high-speed broadband service, and now these broadband monopolies can set their own privacy policies, change them on a whim, or leave us with no protections at all.
Lewis added, “These companies can also force Americans to pay to preserve their online data, as some companies have posited. This potentially raises broadband prices for everyone and forces poor Americans to choose between their privacy and access to the internet — period.” | 2024-04-05T01:27:15.642919 | https://example.com/article/4497 |
/**************************************************************************\
* Copyright (c) Kongsberg Oil & Gas Technologies AS
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* Neither the name of the copyright holder nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
\**************************************************************************/
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif // HAVE_CONFIG_H
#ifdef HAVE_NODEKITS
/*!
\class SoWrapperKit SoWrapperKit.h Inventor/nodekits/SoWrapperKit.h
\brief The SoWrapperKit class is a simple kit for wrapping a transform and a sub-graph.
\ingroup nodekits
\NODEKIT_PRE_DIAGRAM
\verbatim
CLASS SoWrapperKit
-->"this"
"callbackList"
"topSeparator"
"pickStyle"
"appearance"
"units"
"transform"
"texture2Transform"
"childList"
--> "localTransform"
--> "contents"
\endverbatim
\NODEKIT_POST_DIAGRAM
\NODEKIT_PRE_TABLE
\verbatim
CLASS SoWrapperKit
PVT "this", SoWrapperKit ---
"callbackList", SoNodeKitListPart [ SoCallback, SoEventCallback ]
PVT "topSeparator", SoSeparator ---
"pickStyle", SoPickStyle ---
"appearance", SoAppearanceKit ---
"units", SoUnits ---
"transform", SoTransform ---
"texture2Transform", SoTexture2Transform ---
"childList", SoNodeKitListPart [ SoShapeKit, SoSeparatorKit ]
"localTransform", SoTransform ---
"contents", SoSeparator ---
\endverbatim
\NODEKIT_POST_TABLE
*/
#include <Inventor/nodekits/SoWrapperKit.h>
#include <Inventor/nodes/SoSeparator.h>
#include <Inventor/nodes/SoTransform.h>
#include "nodekits/SoSubKitP.h"
SO_KIT_SOURCE(SoWrapperKit);
/*!
Constructor.
*/
SoWrapperKit::SoWrapperKit(void)
{
SO_KIT_INTERNAL_CONSTRUCTOR(SoWrapperKit);
// Note: we must use "" instead of , , to humour MS VisualC++ 6.
SO_KIT_ADD_CATALOG_ENTRY(localTransform, SoTransform, TRUE, topSeparator, contents, TRUE);
SO_KIT_ADD_CATALOG_ENTRY(contents, SoSeparator, TRUE, topSeparator, "", TRUE);
SO_KIT_INIT_INSTANCE();
}
/*!
Destructor.
*/
SoWrapperKit::~SoWrapperKit()
{
}
// Documented in superclass.
void
SoWrapperKit::initClass(void)
{
SO_KIT_INTERNAL_INIT_CLASS(SoWrapperKit, SO_FROM_INVENTOR_1);
}
#endif // HAVE_NODEKITS
| 2024-02-04T01:27:15.642919 | https://example.com/article/1682 |
/*
* Copyright (C) Mellanox Technologies Ltd. 2019. ALL RIGHTS RESERVED.
* See file LICENSE for terms.
*/
package org.openucx.jucx.ucp;
import org.openucx.jucx.UcxParams;
import java.util.HashMap;
import java.util.Map;
/**
* Tuning parameters for UCP library.
* The structure defines the parameters that are used for
* UCP library tuning during UCP library {@link UcpContext} "initialization".
*
* <p>UCP library implementation uses the "features"
* parameter to optimize the library functionality that minimize memory
* footprint. For example, if the application does not require send/receive
* semantics UCP library may avoid allocation of expensive resources associated with
* send/receive queues.
*/
public class UcpParams extends UcxParams {
/**
* UCP ucp_feature "features" that are used for library
* initialization. It is recommended for applications only to request
* the features that are required for an optimal functionality
* This field must be specified.
*/
private long features;
private long tagSenderMask;
private boolean mtWorkersShared;
private long estimatedNumEps;
private Map<String, String> config;
@Override
public UcpParams clear() {
super.clear();
features = 0L;
tagSenderMask = 0L;
mtWorkersShared = false;
estimatedNumEps = 0L;
config = null;
return this;
}
/**
* Mask which specifies particular bits of the tag which can uniquely
* identify the sender (UCP endpoint) in tagged operations.
* This field defaults to 0 if not specified.
*/
public UcpParams setTagSenderMask(long tagSenderMask) {
this.tagSenderMask = tagSenderMask;
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_TAG_SENDER_MASK;
return this;
}
/**
* Indicates if this context is shared by multiple workers
* from different threads. If so, this context needs thread safety
* support; otherwise, the context does not need to provide thread
* safety.
* For example, if the context is used by single worker, and that
* worker is shared by multiple threads, this context does not need
* thread safety; if the context is used by worker 1 and worker 2,
* and worker 1 is used by thread 1 and worker 2 is used by thread 2,
* then this context needs thread safety.
* Note that actual thread mode may be different from mode passed
* to {@link UcpContext}.
*/
public UcpParams setMtWorkersShared(boolean mtWorkersShared) {
this.mtWorkersShared = mtWorkersShared;
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_MT_WORKERS_SHARED;
return this;
}
/**
* An optimization hint of how many endpoints would be created on this context.
* Does not affect semantics, but only transport selection criteria and the
* resulting performance.
* The value can be also set by UCX_NUM_EPS environment variable. In such case
* it will override the number of endpoints set by {@link #setEstimatedNumEps}.
*/
public UcpParams setEstimatedNumEps(long estimatedNumEps) {
this.estimatedNumEps = estimatedNumEps;
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_ESTIMATED_NUM_EPS;
return this;
}
/**
* Request tag matching support.
*/
public UcpParams requestTagFeature() {
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_FEATURES;
this.features |= UcpConstants.UCP_FEATURE_TAG;
return this;
}
/**
* Request remote memory access support.
*/
public UcpParams requestRmaFeature() {
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_FEATURES;
this.features |= UcpConstants.UCP_FEATURE_RMA;
return this;
}
/**
* Request 32-bit atomic operations support.
*/
public UcpParams requestAtomic32BitFeature() {
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_FEATURES;
this.features |= UcpConstants.UCP_FEATURE_AMO32;
return this;
}
/**
* Request 64-bit atomic operations support.
*/
public UcpParams requestAtomic64BitFeature() {
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_FEATURES;
this.features |= UcpConstants.UCP_FEATURE_AMO64;
return this;
}
/**
* Request interrupt notification support.
*/
public UcpParams requestWakeupFeature() {
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_FEATURES;
this.features |= UcpConstants.UCP_FEATURE_WAKEUP;
return this;
}
/**
* Request stream support.
*/
public UcpParams requestStreamFeature() {
this.fieldMask |= UcpConstants.UCP_PARAM_FIELD_FEATURES;
this.features |= UcpConstants.UCP_FEATURE_STREAM;
return this;
}
/**
* The routine sets runtime UCP library configuration.
*/
public UcpParams setConfig(String key, String value) {
if (config == null) {
config = new HashMap<>();
}
config.put(key, value);
return this;
}
}
| 2023-09-03T01:27:15.642919 | https://example.com/article/1949 |
Advocates for limiting contributions to political campaigns often cite the potential for large sums of money to influence decisions by public officials.
But rarely do allegations of conflict of interest related to campaign cash result in action against elected officials and their donors.
That changed in Colorado last week, when a judge ruled that Larimer County Commissioner Tom Donnelly should have recused himself from voting on a controversial plan to mine gravel near a residential development in Johnstown in 2018 because he received $10,000 in campaign cash from the owners of the mining company two years before.
Observers as well as lawyers on both sides of the case say such a decision is unusual.
Want exclusive political news and insights first? Subscribe to The Unaffiliated, the political newsletter from The Colorado Sun. Join now or upgrade your membership.
Christopher Jackson, a Denver attorney who follows campaign finance law, said he can’t recollect a similar court decision involving campaign contributions to an elected official.
“It’s certainly extremely rare, and I think the judge’s decision makes clear that it’s rare,” Jackson said. “It’s such a difficult thing to prove.”
The ruling by Larimer County District Court Judge Juan Villaseñor concluded that the decision to allow the 50-acre gravel pit near the Thompson River Ranch and Thompson Crossing subdivisions violated the plaintiffs’ “due-process rights to an impartial decision-making body.” It orders the commissioners to reconsider the 2-1 decision with Donnelly recused from the rehearing.
Loveland-based Coulson Excavating bought the property on the southeast side of the intersection of Interstate 25 and U.S. 34 in 1993 and originally applied for a permit in 2002. By the time the paving contractor decided to go through the permit process in 2016, nearly 1,000 homes surrounded the site.
“This is a pretty unique case in Colorado,” said Mark Lacis, who represented the Thompson Area Against Stroh Quarry group and also serves as mayor pro tem of Superior. “Our system only functions when the public has confidence that our … officials are going to be fair and impartial.”
Larimer County Justice Center. (Handout)
Chip Schoneberger, who represented Coulson Excavating, agreed the case is rare.
“It’s highly unusual,” he said. “We think the judge got the decision wrong.”
Schoneberger said he believed the link between campaign contributions and decisions by elected officials is sometimes raised as a legal issue, though he couldn’t recall a specific case. “We’ve never seen it succeed.”
It’s also a case that is unlikely to be made in the future. The legislature approved a bill this year limiting individual campaign contributions to county candidates to $2,500 total for the primary and general elections. Previously, those running for office at the county level could take unlimited contributions.
State lawmakers are limited to $400 maximum contributions from individuals, and rarely recuse themselves from votes on the floor.
Dick Coulson and his son Ken Coulson each gave $5,000 to Donnelly’s 2016 reelection campaign, when the Stroh gravel pit application was being considered by Larimer County. Donnelly, a Republican, raised about $54,000 during the campaign to his opponent’s $19,000. In 2012, the Coulsons each gave $500 to Donnelly’s campaign, and in 2008 they combined for $1,300 total.
Donnelly was a land surveyor before he was elected commissioner in 2008 and worked on several projects for Coulson Excavating, something Lacis said the Thompson Area group learned after bringing the court case.
Coulson Excavating expects to appeal the decision, Schoneberger said.
Larimer County Commissioner Tom Donnelly (Handout photo)
Donnelly on Tuesday said the Larimer Board of County Commissioners will consider whether to appeal the decision next week. “My hope is that board will appeal,” he told The Colorado Sun in an interview. “I followed the campaign finance rules of the state, just like every other politician does.
“Obviously I disagree with the decision,” he said. “I have a really long history of standing up for the people of Larimer County. I’ve been a strong advocate for property rights throughout my career.”
Donnelly noted that the town of Johnstown approved a permit for the excavation.
The makeup of the Larimer County board has changed since the 2018 decision. Commissioner Lew Gaiter III, a Republican who voted to allow the gravel mine, died of cancer in September. Former state Sen. John Kefalas, a Democrat, won the open seat in November. Commissioner Steve Johnson, a Republican, was the lone vote against allowing the mine, citing the residential development surrounding it.
Neighbors are heartened by the court decision. They brought the lawsuit through the nonprofit, Thompson Area Against Stroh Quarry, claiming Donnelly shouldn’t have voted under a state regulation on conflicts of interest.
“It was a stunning victory. It was most unexpected,” said Dani Korkegi, president of the Thompson nonprofit. She has since sold her home in Johnstown and moved to Windsor. “Given how easily it appeared that a Larimer County commissioner could be bought, we just didn’t know.”
Our articles are free to read, but not free to report Support local journalism around the state.
Become a member of The Colorado Sun today! $5/month $20/month $100/month One-time Contribution
The latest from The Sun | 2024-02-11T01:27:15.642919 | https://example.com/article/5483 |
1. Field of the Invention
The present invention relates to a klystron tuning mechanism, and more specifically to a high power klystron tuning mechanism for altering the high frequency power.
2. Description of the Prior Art
A high power klystron includes an electron gun for releasing electrons therefrom and thereby forming an electron beam, a RF section for interaction between the electron beam and the high frequency power, a collector for collecting the electrons, and a focusing unit for focusing the electron beam. The RF section includes cavity resonators, tuners for varying resonance frequencies of the cavity resonators, respectively, and a tuning mechanism for connecting and supporting the tuners. In case the high frequency power to be amplified is desired to be varied, it is necessary in the high power klystron to adjust a plurality of resonance frequencies of the cavity resonators to proper ones while observing frequency characteristics thereof on all such occasions. This causes inconvenience in its handling and operation as, compared with a travelling tube which is to amplify microwaves like the foregoing high power klystron.
To eliminate such inconvenience in the operation there is available a high power klystron including a tuning function which possesses a preset function in which it becomes possible at a previously set specific frequency to obtain easily a predetermined band width by carrying out only channel switching operation without performing any additional adjustment work. A prior art high power klystron including such a preset function as described above is arranged as illustrated in FIG. 1 for example. More specifically, the RF section of the high power klystron comprises a plurality of cavity resonators 1, tuners 2 of the same number as that of the cavity resonators wherein the cavity resonators 1 are varied in their volumes to change their resonance frequencies, and bellows 3 connected to the tuners 2 and the cavity resonators 1, respectively, for enabling the tuners 2 to go into and out (slide) the cavity resonators 1 by their mechanical deformation while keeping a vacuum in the high power klystron.
A tuning mechanism 4, which is connected to the tuners 2 each serving as described above to alter the resonance frequencies of the cavity resonators 1, comprises a tuner supporting mechanism 5 for exerting on the tuners 2 a biasing force in the opposite direction to the side of a vacuum tube of the high power klystron along the shafts of the tuners 2 at all times with the aid of restoring force of springs 8, a preset part 7 including means for moving parts on a preset plate 10 in parallel in response to a rotation of a pinion 11, the preset plate 10 being fixedly mounted on the RF section through the supporters 6 and allowing a plurality of sets of frequency setting screws 9 to be attached thereto, a tuning channel detector part 25 (refer to FIG. 2B) for detecting the fact that which frequency setting screw 9 is connected to the tuner 2, and a driving mechanism 13 for rendering a connection or a disconnection between the frequency setting screw 9 and the tuner shaft 12.
Herein, designated at 14 are bearings, 15 is a fixed plate, 16 is a locking shaft, 17 is a movable plate, 18 is a unlocking plate, 19 is a frequency alteration shaft, and 20 are locking plates.
Referring to FIGS. 2A and 2B, the tuning channel detector part 25 is illustrated in detail. In the lower part of the preset plate, 10, slits 21 are provided at locations corresponding to the frequency setting screws 9 (FIG. 2A). In order to permit the transmission of light through these slits 21, four successive photointerrupters 22 (each photointerrupter 22 comprises a light emitting diode 23 and a photodiode 24 as seen in FIG. 2B) are mounted on the preset plate 10 at the same pitch or interval as in the frequency setting screws 9. The photodiode 24 becomes conductive as light emanating from the light emitting diode 23 of the photointerrupter 22 reaches the photodiode 24 after passage through the slit 21, whilst the same photodiode 24 becomes non-conductive as the same light is interrupted. The slits 21 are disposed such that signals detected by the tuning channel detector part 25 are as listed in TABLE 1 for respective channels with the assumption of the conductive and non-conductive states of the photodiode 24 set to be 1 and 0.
TABLE 1 ______________________________________ Tuning Signals Detected by Tuning Channels Channel Detector Part ______________________________________ 1 1 0 1 1 2 0 1 1 0 3 1 1 0 1 4 1 0 1 0 5 0 1 0 0 6 1 0 0 0 ______________________________________
More specifically, with the arrangement illustrated in FIG. 2A (in the case of the tuning channel 1 in TABLE 1) a signal of 1011 is generated, and likewise once another frequency setting screw 9 is connected with the tuner 2 constituting part of the cavity resonator 1 by moving the preset plate 10, a signal corresponding to an associated tuning channel is generated from the tuning channel detector part 25. On the basis of the detected signal, it becomes possible to judge the fact that the associated klystron is set to which tuning channel.
A preset operation in the tuning mechanism, in which operation a predetermined band width is previously set for one tuning channel of the high power klystron through a set of the frequency setting screws 9 disposed along a drift tube of the cavity resonator, is performed as follows: First, an adjustment is performed with the aid of the frequency setting screws 9 such that the band width of the predetermined channel is yielded in the state of FIG. 1. In succession, the locking shaft 16 fixed through the bearing 14 to the fixing plate 15. The shaft is turned until the movable plate 17 makes contact with the unlocking plate 18. At this time, contacts between the tuner shafts 12 connected to the tuners 2 become disconnected. In this state, the frequency alteration shaft 19 is rotated to bring another frequency setting screw 9 into coincidence with the central axis of the timer shaft 12. At this location, the movable plate 17 is again moved until the movable plate strikes the locking plate 20 through the locking shaft 12. In this state, the degree of a projecting length of the frequency setting screw 9 is adjusted such that a predetermined band width characteristic is ensured in another tuning channel which is different from the foregoing tuning channel. With repetition of such adjustment a plurality of tuning channels of the high power klystron can be set previously.
In the tuning mechanism described above, any tuning channel is specified by a plurality of the slits 21 as illustrated in FIG. 2A, so that it is impossible to quickly and completely make the slits 21 and the photointerrupters 22 coincident with each other positionally, resulting in a difficulty of generated signals being slightly shifted in time. Accordingly, there might sometimes occur an inconvenience that upon alteration of a tuning channel, a signal of another tuning channel is sent from the tuning channel detector part. More specifically, an error might be produced in the signals detected by the tuning channel detection part listed in TABLE 1 that signals of other tuning channels are detected among the respective channels as listed in TABLE 2. Namely, there might be produced a possibility that erroneous detected signals with a pattern of TABLE 2 (signals indicated in parentheses) are issued.
TABLE 2 ______________________________________ Tuning Signals Detected by Tuning Channel Detector Channels Part ______________________________________ 6,4 1000 (0011, 1001, 0010, 0001), 1010 1 1011 6,5,4 1000 (00011, 1001, 0010, 0001), 0100, 1010 2 0110 6,5 1000, (0010), 1000 3 1101 6,5 1000, (0010), 0100 4 1010 6 1000, (0010) 5 0100 6 1000 ______________________________________
Channel alteration is thus recognized to have been completed at an incorrect location upon the alteration of a tuning channel, which impedes alteration to a tuning channel to be used. | 2023-08-27T01:27:15.642919 | https://example.com/article/4061 |
Product description
Introducing the Fanning Low from Reef. Fully equipped with a perforated and padded liner for breathability and comfort - a high rebound molded EVA footbed - 360 degree airbag under the heel - and of course - a bottle opener on the outsole.
Questions abound about the tiny pills — or patches, or condoms, or intrauterine devices — that we count on to sidestep unwanted pregnancies. I’ve often wondered:
Many women have obsessively Googled questions like these, along with other reproductive health queries. (And if they’re like me, they’ve poured to-the-brim glasses of Trader Joe’s wine after reading one too many contraception-gone-awry horror stories.)
Google no further. The Lily’s video series, “When Used Correctly,” has answers for you.
Our ace video editor, Maya Sugarman, filmed, edited and appears in the series. Here’s the origin story, in her own words:
My peers constantly bring up contraception in conversation. They all care deeply about their reproductive health, but felt a knowledge deficit when it came to contraception. They wanted to learn from trustworthy sources, but many used unapproachable language. Six months ago, we asked you what you wanted to watch. More than 200 of you answered. You want to hear from real people and experts. You’re interested in talking about contraception with your friends. I’m so excited to share “When Used Correctly” with you. I hope it brings you comfort, joy and knowledge. I hope the series makes you feel more in control of your own reproductive health.
The Internet can be educational. It can also be anxiety-inducing and wildly inaccurate. Scouring websites for health info can fuel cyberchondria, the digital version of hypochondria. Here are two sites you can trust, according to a board certified family nurse practitioner: birth control site Bedsider.org and the Centers for Disease Control and Prevention.
Measuring less than 2 inches, Nexplanon — the birth control implant that’s inserted in your arm — is short, but its life span is lengthy. The hormonal-based implant can ward off pregnancy for up to four years. Meet one woman who has the implant and another who’s considering it.
A Dalkon Shield in its original packaging. (Maya Sugarman for The Lily)
The Dalkon Shield, an early IUD, was used by more than 2 million women in the United States and throughout the world in the 1970s and 1980s. But the aftereffects were severe: Many of those women got pelvic inflammatory disease, and many died. These days, IUDs are more effective and less invasive.
What do “Gilmore Girls” and “Seinfeld” have in common? Both cultural touchstones feature scenes that hinge on birth control. In the former, Lorelai fears she might be pregnant after a night with her boyfriend, Luke, that got “primordial.” Despite the show’s focus on women, the episode is vague and skittish when it comes to the specifics of birth control. “Seinfeld,” however, takes the opposite approach. Elaine is forthright about her preferred contraceptive — the sponge — and when the product is pulled from shelves, limiting her supply, she’s unapologetic about gauging whether a guy’s “sponge-worthy.”
Breakups happen. This one happened over birth control. Lisa Bonos, writer and editor of The Washington Post’s Solo-ish, explains why she and a former partner split — and drops some wisdom along the way.
“There’s no pill to keep you safe emotionally, or keep sex free from consequence.” | 2024-07-19T01:27:15.642919 | https://example.com/article/4584 |
7 = 97. Which is greater: 75/8 or g?
g
Let c be ((-12 - -15)/(-9))/(1 - 21/18). Is c greater than or equal to 152/149?
True
Let s be (-116)/(-12) + 60/48*-8. Is s < 36/17?
True
Suppose 2*m + 347 = -5*n, 4*m + 19*n = 24*n - 799. Let h be -188 + 0 - 3/3. Is m less than or equal to h?
True
Let h(n) = 2*n**2 - 54*n + 101. Let p be h(36). Let f = 8241/11 - p. Is f bigger than -29?
True
Let g be (1 - 0)*(50 + -17). Let b = 44 + -39. Is g at least as big as b?
True
Suppose 108*q = 105*q - 648. Let h be 2*217*(-7)/14. Which is greater: q or h?
q
Suppose 10 - 49 = 13*y. Let r be 55*((-9)/(-15) + y). Is r not equal to -130?
True
Let x(h) = h**2 - 5*h + 4. Let u be x(4). Suppose u*i = i + 55. Let m be 11/i - ((-381)/105 - -2). Is m at least as big as 0?
True
Let i = -750 + 508. Let h = 243 + i. Which is smaller: h or -1/62?
-1/62
Let j be (0 - 4 - 0) + (54 - 49). Which is smaller: j or 3/5131?
3/5131
Suppose 2*h - 42 = -2*z, -90*z + 2*h = -95*z + 120. Are -15 and z non-equal?
True
Let z be ((-6)/(-82))/(3 - 1). Let l(k) = -13*k - 53. Let g be (-2550)/663 - 2/13. Let i be l(g). Which is smaller: i or z?
i
Let r(b) = b**3 + 9*b**2 - 11*b + 8. Let t be r(-10). Let s be 1/(-3)*1*(65 + t). Which is smaller: s or -27?
s
Suppose -88*q + 417*q - 914934 = 300392. Do q and 3694 have different values?
False
Let j = 59483 + -59466. Suppose -7*q + 10 = -2*q. Suppose 3*u + 9 - 34 = 5*r, 10 = -u - q*r. Which is greater: u or j?
j
Suppose -l = 8*l + 180. Let n be 1*5/(l/(-4)). Is -3 equal to n?
False
Suppose 0 = 2*s + 10. Let v = s + 10. Suppose 0 = 5*l - v. Which is greater: l or -2?
l
Let b(o) = -13*o - 6. Let v be b(11). Let z = v + 152. Suppose -4*x + 2*u + 204 = 0, -z*x = 2*u - 200 + 40. Is x < 52?
False
Suppose 11 + 7 = 9*d + 90. Which is greater: d or -243?
d
Let b = -2/1169 + 23474/54943. Are 1 and b nonequal?
True
Let s be (-9)/(-21) + (-1830)/(-42) + 0. Suppose 5*n = -4*c + 19, 3*c = 4*n - c - 44. Suppose a + 258 = n*a. Are s and a non-equal?
True
Let r = 0.00454 + 0.98546. Which is smaller: 0.03 or r?
0.03
Let u = 0.7 + 0.3. Let p(t) = 54*t**2 + 4*t - 6. Let j be p(2). Let b = 180 - j. Which is smaller: b or u?
b
Let k be ((-3)/44)/(((-783111)/(-56))/89). Which is bigger: -1 or k?
k
Let x = -0.407 + -1.893. Is 65 equal to x?
False
Suppose -3*k + t = -24, -3*t - t = 4*k - 16. Suppose -4*m = -2*u - 14, 0 = -9*u + k*u - 2. Are m and 15 unequal?
True
Suppose 4*s = 28 + 20. Let m be (-1 - -4)/((-4)/(-64)*s). Let b(d) = -d + 9. Let w be b(6). Which is greater: m or w?
m
Suppose 15 = -62*b + 59*b, -3*c - 16365 = 3*b. Is c bigger than -5446?
False
Let m = -11834 + 11855. Which is bigger: 593/28 or m?
593/28
Let o = 3 + 3. Let a = o - 2. Let g = 0.3 - -0.7. Do g and a have the same value?
False
Suppose 6*f - 5*f - 1 = 0, -2*s + 4*f - 136 = 0. Suppose -3*u = -g + 198, -3*u - 210 = -4*g + 7*g. Is u >= s?
False
Let g be -2*(-1)/(-7) + (-4402)/(-217). Let j be 25/g*4 + 1. Let z(n) = -n**3 + 3*n**2 + 16*n + 14. Let c be z(j). Which is greater: c or 3/5?
c
Suppose -5*i = 2*l - 4*l + 148, l = -3*i + 52. Let g = -69 + l. Let j be (-5 + (g - -10))*1/2. Is -1 less than j?
True
Suppose -110 = -4*j - 18. Let v = -1902 + 1914. Which is smaller: v or j?
v
Let s = 376351271/510 + -737946. Let c = s + 22/51. Is c at most -2?
False
Let w(l) = l**3 + 10*l**2 - 2*l - 2. Let r be w(-10). Suppose 0*g + r = -9*g. Let h = -31/13 - -24/13. Is h != g?
True
Suppose 36*p + 480 = 48*p. Let j be 292/p*(-60)/(-8). Which is greater: 56 or j?
56
Let s(k) = -17*k**2 - 4*k. Let r be s(-3). Let h be 2 + -1 - -3*6/(-12). Are h and r unequal?
True
Suppose 0 = -2*b - 4*y - 18, -4*b - 18 = -3*y + 2*y. Suppose -212 = -14*d + 180. Let z(u) = u**3 - 28*u**2 - 7. Let i be z(d). Is i at least as big as b?
False
Let k = 215 + -447. Let a be (-6)/(-21) + k/(-168). Let b(j) = j**2 - 8*j + 17. Let v be b(5). Is v at most as big as a?
False
Suppose -14*y + 18*y - 12 = -2*l, 2*y = -5*l + 6. Which is smaller: -3/1724 or l?
-3/1724
Suppose 5*b - 5*c + 335 = 0, 8*b + 199 = 5*b + c. Which is smaller: b or -55?
b
Suppose -1484 = 7*k - 1624. Suppose -3815 = -15*c - k*c. Which is greater: 107 or c?
c
Suppose 36 = 7*c + 8. Let b be (2/c)/(2/4). Let u be (3 - 3) + (13 - b). Which is bigger: u or 10?
u
Let f = -0.07 + -0.13. Let n(m) = -144*m - 1063. Let i be n(-7). Which is bigger: i or f?
f
Let w be (-19 + 0 - -3)*4. Let k be (-122)/((-105)/(-30) - (-6)/(-4)). Let c = k - w. Which is smaller: c or 8?
c
Let m = -124405/1518 + -433/138. Let h = -3975/44 - m. Let j = -11 + 6. Which is smaller: j or h?
h
Suppose -2*p - 5*j + 332 = 0, -j = 5*p - 4*j - 861. Let a be (5/(-30) + 24/p)*42. Which is smaller: a or -1?
a
Suppose -7 = -p - 4. Suppose -5*o = 5, -p*m - 2*o - 8 = -4*m. Suppose -m = -3*j - 3. Which is bigger: 0.14 or j?
j
Suppose 2*k - 26*w + 22 = -21*w, w + 6 = 3*k. Do 69/14 and k have different values?
True
Let h = 27 - -143. Let v = -11970 + 12140. Do h and v have different values?
False
Let s be (-14)/(-147)*21*5/2*-1. Is s at most as big as -156/25?
False
Suppose 36*t - 970 = 21*t + 770. Which is greater: 34 or t?
t
Suppose -15 = -4*x + 4*u + 1, -u = 2*x + 4. Which is smaller: 2/5893 or x?
x
Let n(g) = -g**3 - 194*g**2 - 332*g - 612. Let d be n(-192). Do d and -10596 have the same value?
True
Let q = 0.1079 + 7.8921. Let i = -9 + 3. Let a = q + i. Which is smaller: a or 10?
a
Let m = 11916 - 11807. Which is bigger: m or 29?
m
Let t be ((-2)/6)/(((-4)/54)/2). Suppose 48 = t*w - 12*w. Which is greater: -8 or w?
-8
Let u = 640/29 - 7952/87. Is -69 equal to u?
False
Let l = -0.199 - 233.801. Let b = l - -234. Is b smaller than -25?
False
Let f be (2/(-4))/((-674)/(-8)). Let r(v) = -v**3 + 14*v**2 + 73*v - 1023. Let h be r(14). Which is bigger: f or h?
f
Let n(y) be the third derivative of 44*y**2 + 23/24*y**4 + 0 + 0*y + 1/120*y**6 - 1/6*y**5 - 5/2*y**3. Let m be n(7). Is -3/79 smaller than m?
False
Let z(j) = 10*j**3 - j**2 + 2*j - 8. Let y be z(-4). Let k be (-3)/(-15) + y/3110. Let n = k + -237/23947. Is n > 0?
False
Let p = -3700 + 3701.9. Let u = -7 - -8. Is u < p?
True
Let k = -40 - -56. Suppose 308 = 6*s - 2*s. Suppose -5*b + o = 3*o - s, 2*o + 8 = 0. Which is smaller: k or b?
k
Let o be ((-2)/(-6))/(1/5). Let l(x) = 25*x - 226. Let s be l(10). Suppose -3*j - s = -102*g + 99*g, -4*j = 2*g + 14. Which is smaller: o or g?
o
Let g = -19 + 37. Suppose g*r - 14*r = 16. Suppose -r*n - 2 = -10. Which is greater: 8 or n?
8
Suppose -t + 7 = -24. Let l = 250 - 242. Suppose 305 + t = l*y. Which is smaller: 43 or y?
y
Let s = -144.6 + 161. Let h = s - 18.4. Which is bigger: -4/19 or h?
-4/19
Let g = 12.55 - 18.4. Let o = -7.85 - g. Is 66/13 greater than or equal to o?
True
Let c(v) = -187*v + 230. Let d be c(-1). Are 423 and d non-equal?
True
Let m = -1498 - -1497.902. Is -10 at least m?
False
Let d(s) = 2*s**2 + 10*s - 28. Let w be d(-10). Let z = w - 66. Let n = 27 - 85/4. Are n and z unequal?
True
Suppose -5*u = l - 3*u - 144, -3*l - 3*u = -420. Let f be ((-4)/42)/(l/12 + -12). Which is bigger: 55 or f?
55
Let m be ((-690)/184)/(5/(-260)). Is 1374/7 at most as big as m?
False
Suppose 9*v + i - 691 = 13*v, -5*v = -i + 864. Is -515/3 smaller than v?
False
Let v = 193 - 114. Let l = v - 126. Let j = -23 - l. Is j at least as big as 0.2?
True
Let s = 41 - 41. Which is bigger: -2/26397 or s?
s
Let i = 4511 - 4510. Is i greater than -3/548?
True
Let t(p) = 2*p**3 + p**2 - 9*p - 12. Let y be t(-2). Let q be ((-1)/(-2))/(y/(-6 - 30)). Which is smaller: q or 7/2?
q
Suppose 0 = -4*l - 3 - 1. Let a = 0.722 - 15.422. Which is greater: a or l?
l
Let g be ((-12)/318)/((-2)/(-18498)). Let s = g - -349. Let v be (1/(-2))/(5/10). Is v at least s?
False
Let l = -2987 + 2976. Which is bigger: -145 or l?
l
Let h = -3.311 + -1.689. Which is smaller: h or -1.18?
h
Let u = -11.68 + 0.68. Let m(k) = 2*k - 1. Let a be m(0). Let l be 1 - ((-4 - a) + 3). Which is greater: l or u?
l
Let c = 10553 + -749254/71. Is c != 0?
True
Let v = -13.79 - -10. Let c = -4 - v. Let i = c + 0.21. Is 0.09 at least as big as i?
True
Let t be -3 + 50255/(-525) - 2/(-12). Let s = t + 491/5. Is 1 at most as big as s?
False
Let g be 8/20*-5 - (-4007 - -1). Is g at least as big as 4004?
True
Let f = -5539/6 + 2686439/2910. Do f and 1 have different values?
True
Let g be | 2024-05-09T01:27:15.642919 | https://example.com/article/2414 |
Liposomes are closed vesicles comprising a lipid bilayer. Taking advantage of bioaffinity of liposomes, a number of proposals have been made to incorporate various drugs into the inner aqueous phase or the lipid bilayer of liposomes for use as a drug carrier. In many cases, however, liposomes as suspended in water are colloid-chemically instable, tending to undergo agglomeration or fusion among themselves, precipitation due to crystallization of the membrane component, an increase in particle size, or hydrolysis to form lyso-phospholipids that are considered to be hemolytic. These changes in effect and appearance result in impairment of commercial values.
Unexamined Published Japanese Patent Application No. 42733/87 furnishes a solution for the problem, which comprises stabilizing liposomes using an amino acid. What is achieved by this technique is stabilization in preservation at room temperature or lower temperatures, and stabilization in high temperature preservation was still insufficient. The technique was also insufficient for inhibition of lyso-phospholipid formation.
An object of the present invention is to provide a stable liposome aqueous suspension which does not undergo precipitation, agglomeration or change in particle size even when preserved at 40.degree. C. for 6 months and in which lyso-phospholipid formation is suppressed. | 2024-04-15T01:27:15.642919 | https://example.com/article/8217 |
Studies of the induction of ornithine decarboxylase activity in primary cultures of adult rat hepatocytes by the phorbol ester 12-O-tetradecanoyl-13-acetate and other substances.
Hepatocytes from adult rats, cultivated for 4 days in RPMI 1640 medium, were used for studies on mechanisms of induction of ornithine decarboxylase (ODC). The activity of ODC was measured partially in situ by an assay method using (3)H-labelled ornithine and analysing of the labelled putrescine formed. The tumour-promoting phorbol ester 12-O-tetradecanoyl-13-acetate (TPA) induced ODC by several hundred percent in this system. No ODC activity remained after the cells were incubated for 4 hr with both TPA and cycloheximide, and no induction of ODC occurred when actinomycin D and TPA were present, although some ODC activity remained. Experiments with cyclohexidine and Actinomycin D (Act. D), respectively, indicated that the induction of ODC by TPA was totally dependent on protein synthesis and was also dependent on transcriptional events. Sphingosine and H-7 (1-(5-isoquinolinyl-sulphonyl)-2-methylpiperazine) inhibited the induction of ODC by TPA indicating the involvement of protein kinase C (PK-C) in this process. Pre-incubation of the hepatocytes with TPA, a procedure which down-regulates PK-C, decreased the induction of ODC by a subsequent new exposure to TPA, but had no effect on the induction of ODC caused by asparagine in this system. The induction caused by asparagine was additive to that caused by TPA. Studies with copper (diisopropylsalicylate)(2) and manganese(IV) desferrioxamine, and with prostaglandin D(2), respectively, gave no indication that activated oxygen or prostaglandins were involved in the induction of ODC by TPA. The results of this study are generally consistent with previously published in vivo data and show that a well defined hepatocyte in vitro system is suitable for mechanistic studies of ODC induction. | 2024-07-10T01:27:15.642919 | https://example.com/article/2390 |
Sound poetry
Sound poetry is an artistic form bridging literary and musical composition, in which the phonetic aspects of human speech are foregrounded instead of more conventional semantic and syntactic values; "verse without words". By definition, sound poetry is intended primarily for performance.
History and development
The vanguards of the 20th century
While it is sometimes argued that the roots of sound poetry are to be found in oral poetry traditions, the writing of pure sound texts that downplay the roles of meaning and structure is a 20th-century phenomenon. The Futurist and Dadaist Vanguards of the beginning of this century were the pioneers in creating the first sound poetry forms. Filippo Tommaso Marinetti discovered that onomatopoeias were useful to describe a battle in Tripoli where he was a soldier, creating a sound text that became a sort of a spoken photograph of the battle. Dadaists were more involved in sound poetry and they invented different categories:
Bruitist poem it is the phonetic poem, not so different from the futurist poem. Invented by Richard Huelsenbeck.
Simultaneous poem a poem read in different languages, with different rhythms, tonalities, and by different persons at the same time. Invented by Tristan Tzara.
Movement poem is the poem accompanied by primitive movements.
Later developments
Sound poetry evolved into visual poetry and concrete poetry, two forms based in visual arts issues although the sound images are always very compelling in them. Later on, with the development of the magnetic tape recorder, sound poetry evolved thanks to the upcoming of the concrete music movement at the end of the 1940s. Some sound poetics were used by later poetry movements like the beat generation in the fifties or the spoken word movement in the 80's, and by other art and music movements that brought up new forms such as text sound art that may be used for sound poems which more closely resemble "fiction or even essays, as traditionally defined, than poetry".
Early examples
Das Große Lalulá (1905) by Christian Morgenstern, in the collection Galgenlieder.
Kroklokwafzi? Semememi!
Seiokrontro – prafriplo:
Bifzi, bafzi; hulalemi:
quasti basti bo...
Lalu lalu lalu lalu la!
Hontraruru miromente
zasku zes rü rü?
Entepente, leiolente
klekwapufzi lü?
Lalu lalu lalu lalu la!
Simarar kos malzipempu
silzuzankunkrei (;)!
Marjomar dos: Quempu Lempu
Siri Suri Sei [ ]!
Lalu lalu lalu lalu la!
Zang Tumb Tumb (1914) is a sound poem and concrete poem by Italian futurist F. T. Marinetti.
Hugo Ball performed a piece of sound poetry in a reading at Cabaret Voltaire in 1916:
"I created a new species of verse, 'verse without words,' or sound poems....I recited the following:
gadji beri bimba
glandridi lauli lonni cadori..."
(Albright, 2004)
Kurt Schwitters' Ursonate (1922–32, "Primal Sonata") is a particularly well known early example:
The first movement rondo's principal theme being a word, "fmsbwtözäu" pronounced Fümms bö wö tää zää Uu, from a 1918 poem by Raoul Hausmann, apparently also a sound poem. Schwitters also wrote a less well-known sound poem consisting of the sound of the letter W. (Albright, 2004)
Chilean Vicente Huidobro's explores phonetic mutations of words in his book "Altazor" (1931).
In his story The Poet at Home, William Saroyan refers to a character who practices a form of pure poetry, composing verse of her own made-up words.
Female practitioners
It has been argued that "there is a paucity of information on women's involvement in sound poetry, whether as practitioners, theorists, or even simply as listeners". Among the earliest female practitioners are Berlin poet Else Lasker-Schüler, who experimented in what she called "Ursprache" (Ur-language), and the New York Dada poet and performer Baroness Elsa von Freytag-Loringhoven. The Baroness’s poem "Klink-Hratzvenga (Death-wail)" was published in The Little Review in March 1920 to great controversy. Written in response to her husband Leopold von Freytag-Loringhoven’s suicide, the sound poem was "a mourning song in nonsense sounds that transcended national boundaries". The Baroness was also known for her sexually charged sound poetry, as seen in "Teke Heart (Beating of Heart)", only recently published.
Europe has produced at least 2 accomplished sound poets in the persons of Greta Monach (Netherlands) & Katlin Ladik (Hungary), who released an EP of her work, "Phonopoetica", in 1976. In England, Paula Claire has been working with improvisational sound since the 1960s.
The United States has produced at least one accomplished sound poet, Tracie Morris, from Brooklyn, New York. She began presenting sound poetry in the mid-1990s. Her live and installation sound poetry has been featured in numerous venues including the Whitney Biennial in 2002.
Other examples of sound poets
Later prominent sound poets include Henri Chopin, Bob Cobbing, Ada Verdun Howell, bpNichol, Bill Bissett, William S. Burroughs, Giovanni Fontana, Bernard Heidsieck, Enzo Minarelli, François Dufrene, Mathias Goeritz, Maurizio Nannucci, Andras Petocz, Joan La Barbara, Paul Dutton, multidisciplinary artists Jeremy Adler, Jean-Jacques Lebel, John Giorno, Henrik Aeshna, a Paris-based poet, artist and performer who experiments with Noise, shamanism and visual poetry, New York City jazz poet Steve Dalachinsky, Yoko Ono and Jaap Blonk, a Dutch sound poet who often works with improvising musicians.
The poet Edith Sitwell coined the term abstract poetry to describe some of her own poems which possessed more aural than literary qualities, rendering them essentially meaningless: "The poems in Façade are abstract poems—that is, they are patterns of sound. They are...virtuoso exercises in technique of extreme difficulty, in the same sense as that in which certain studies by Liszt are studies in transcendental technique in music." (Sitwell, 1949)
An early Dutch artist, Theo van Doesburg, was another prominent sound poet in the early 1900s.
Theories
In their essay "Harpsichords Metallic Howl—", Irene Gammel and Suzanne Zelazo review the theories of sound by Charles Bernstein, Gerald Bruns, Min-Quian Ma, Rachel Blau DuPlessis, Jeffrey McCaffery and others to argue that sonic poetry foregrounds its own corporality. Thus "the Baroness's sound poems let her body speak[;] through her expansive use of sound, the Baroness conveys the fluidity of gender as a constantly changing, polysemous signifier." In this way, somatic art becomes the poet's own "space-sound."
Of course, for many dadaists, such as Hugo Ball, sound poetry also presented a language of trauma, a cacophony used to protest the sound of the cannons of World War I. It was as T. J. Demos writes, "a telling stutter, a nervous echolalia."
See also
Angel Exhaust
Bob Cobbing
Crosstalk: American Speech Music
Electroacoustic music
Jas H. Duke
Magma (band)
Kobaïan
Line (music)
Line (poetry)
Scat singing
Sound art
Tracie Morris
References
Sources
Albright, Daniel (2004). Modernism and Music: An Anthology of Sources. University of Chicago Press. .
Sitwell, Edith (1949). The Canticle of the Rose Poems: 1917–1949, p.xii. New York: Vanguard Press.
External links
UbuWeb
Sound Poetry - A Survey by Steve McCaffery
Text Sound Art: A Survey Richard Kostelanetz
10 + 2 = 12 American Text-Sound Pieces The first major recorded anthology of American sound poetry, edited by Charles Amirkhanian for 1750 Arch Records, released on LP in 1975, re-released for CD/download by Other Minds in 2003.
Sound poetry—concrete, abstract, and postmodern.
List of sound poets with links to audio files
Sound poetry in french with audio files, Mitocarpe
"AN ART BETWEEN SPEECH AND MUSIC" By PAUL KRESH; New York Times, April 3, 1983,
Sound Poetry
Sound Poetry on 57productions
"Bring Da Noise: A Brief Survey of Sound Art Sound and The Literary Connection" by Kenneth Goldsmith NewMusicBox, March 1, 2004
Poesy Planet, Eight Geese
Messagio Galore
Category:Genres of poetry
Category:Dada
Category:Poetry movements
Category:Phonaesthetics
Category:Contemporary classical music | 2023-09-22T01:27:15.642919 | https://example.com/article/1633 |
Q:
Is it possible to lock a record and still allow other users to read it?
This might be a very dumb question, but as the saying goes, "The only dumb question is the one you don't ask"...
I've got a SQL Server 2008 database and I want to lock a record for editing. However, another user might want to see information in that record at the same time. So, I want the first person in to be able to lock the record in the sense that they are the only ones who can edit it. However, I still want other users to see the data if they want to.
This is all done from a C# front end as it's gonna be on our Intranet.
A:
Don't do your own locking - let SQL Server handle it on its own.
As long as you only SELECT, you'll put what's called a shared lock on a row - other users who want to also read that row can do so.
Only when your code goes to update the row, it will place an exclusive lock on the row in order to be able to update it. During that period of time, no other users can read that one single row you're updating - until you commit your transaction.
| 2024-04-08T01:27:15.642919 | https://example.com/article/7951 |
The BBC #100Women Event… starring Mom
My mother, Efua Dorkenoo OBE, and I were up chatting late last night as she waited for a car to take her to the BBC. She is taking part in the BBC World Service’s ‘100 Women’ celebrations that have been taking place throughout October.
I am very lucky to be a son to such a genuinely amazing woman. There is no one who inspires me more.
Here’s her official bio:
“Efua Dorkenoo, OBE, is the Advocacy Director, FGM programme in Equality Now’s London office. She is also a trained bio-social scientist in public health and an honorary Senior Research Fellow at the School of Health Sciences at City University, London. Starting in the early 1980s, her pioneering work on FGM has contributed to the international recognition of FGM as a public health and a human rights issue. From 1995-2001, she worked as the WHO’s first technical expert at their Geneva headquarters and assisted the organization in introducing FGM onto the agendas of the Ministries of Health of WHO Member States. Ms. Dorkenoo was awarded the British State Honours – OBE (Order of the British Empire) by the British Queen in recognition of her work as the founder of the UK NGO FORWARD in 1994 and for her campaigning work against FGM. In 2000, along with Gloria Steinem, she received Equality Now’s international human rights award for her lifelong activism on the issue of women’s rights. Ms. Dorkenoo’s book, ‘Cutting the Rose: Female Genital Mutilation, The Practice and its Prevention’ (Minority Rights Publications 1994), was considered a first on FGM and was selected by an international jury for inclusion on the 2002 prestigious book list, “Africa 100 Best Books for the 20th Century.”
Here’s the schedule for anyone who is interested (all times London: GMT+1)
0930 Opening and welcome from hosts Shaimaa Khalil and Rupa Jha, followed by address from Zeinab Bangura, UN special representative on sexual violence in conflict.
1000-1100 News debate: issues of the day up for debate, including Syria and the Roma. Presented by Chief International Correspondent Lyse Doucet. | 2023-09-27T01:27:15.642919 | https://example.com/article/1373 |
The Added Benefits Of Bone Broth Nutrition For Most Cancers Patients
Comments Off on The Added Benefits Of Bone Broth Nutrition For Most Cancers Patients
Suppliers Scramble To Keep Soup for the Sick post, I rarely add salt during the leaky tissues of the GI tract, teeth. Bring to boil, and let them cook at such a high level in daycare from 5weeks of age culture of getting a pot of broth, it must be 24 26 but finds the broth until it’s thick as beef and chook each offers biological broths to satisfy so unopened due to the fact there is literally nothing. extra dietary boost which could look small only 5 oz, that can easily last months for making broth using beef is the meat most people who are long time people who smoke displays the deficiency of vitamin C, and B nutrients. You also can freeze your Bone Broth Bar Boston. Combine broth ingredients Place the body and support detox pathways. Slow cooker Bring a pot pros out there have any of your recipes that call into query the legitimacy of. | 2023-10-15T01:27:15.642919 | https://example.com/article/8020 |
[The role of PCR for the diagnosis of Lyme arthritis].
We studied retrospectively four patients with Lyme arthritis of the knee, the role of PCR for the detection of B. burgdorferi DNA and its influence on further therapeutic decisions. All four patients with Lyme arthritis suffered from knee pain and effusions. None of them remembered having had a tick bite or an erythema migrans. The diagnosis was confirmed by positive serology and in three cases by detection of B. burgdorferi DNA by PCR analysis of the joint fluid. In one patient, PCR was also positive in the synovial tissue. Because of persistent symptoms after adequate antibiotic therapy, PCR was repeated in the joint fluid of two patients. In one patient a positive PCR suggested an ongoing infection. Thus, the antibiotic treatment was changed. A further PCR was negative. Symptoms resolved slowly in all patients over a time of two to seven months after the end of the antibiotic treatment. PCR to detect B. burgdorferi DNA in synovial fluid or tissue respectively is a helpful tool for the diagnosis of Lyme arthritis. Moreover, in patients with refractory Lyme arthritis PCR may be helpful in monitoring the course of the disease. | 2024-01-26T01:27:15.642919 | https://example.com/article/9419 |
Q:
Is the union of less than $2^{\aleph_0}$ (closed) sets of empty interior, a set of empty interior?
Baire category theorem gives this result for countable unions. But what can be said about unions of size less than $2^{\aleph_0}$?
I only need this to be true in $\mathbb{R}^2$, for my purposes.
Strictly speaking, I only need the following: An open set in $\mathbb{R}^2$ is not the union of less than $2^{\aleph_0}$ straight lines.
A:
Re: Strictly speaking, I only need the following: An open set in $\mathbb{R}^2$ is not the union of less than $2^{\aleph_0}$ straight lines.
This is true since for example: Every open set in plane contains a circle. And less than continuum lines cannot cover a circle.
A:
Meager sets, i.e. countable union of closed nowhere dense sets, have empty interior as you mentioned above.
The covering number of the meager ideal is the smallest cardinality $\kappa$ so that $\mathbb{R}$ is the union of $\kappa$ many meager set.
If the covering number of the meager ideal is less than $2^{\aleph_0}$, then $\mathbb{R}$ is the union of less than $2^{\aleph_0}$ meager sets. Replacing each meager set with the countably many closed nowhere dense set forming it will give you a less than $2^{\aleph_0}$ union of closed nowhere dense sets with empty interior.
This situation can occur but of course requires the failure of the continuum hypothesis.
| 2024-05-25T01:27:15.642919 | https://example.com/article/2320 |
I've been studying wood for a while now, and I bought some Wild Almond Burl in August of last year and it was very well received at KKF and sold out quickly. I even kept one piece for myself to add to my collection. Since it was such a good seller I looked for more, but could never find it again. The internet has very little on it, and most of that is what I put on there. There is a whole lot more on Pollyanna Burl and I'm starting to think that the seller in August was incorrect in his description and, in fact it was Pollyanna Burl. If anyone could talk more to the question of if they are the same it would be greatly appreciated. Thanks. | 2024-02-06T01:27:15.642919 | https://example.com/article/2809 |
#########################################################################
# #
# OCaml #
# #
# Xavier Leroy, projet Cristal, INRIA Rocquencourt #
# #
# Copyright 1999 Institut National de Recherche en Informatique et #
# en Automatique. All rights reserved. This file is distributed #
# under the terms of the Q Public License version 1.0. #
# #
#########################################################################
# The lexer generator
include ../config/Makefile
CAMLRUN ?= ../boot/ocamlrun
CAMLYACC ?= ../boot/ocamlyacc
CAMLC=$(CAMLRUN) ../boot/ocamlc -I ../boot
CAMLOPT=$(CAMLRUN) ../ocamlopt -I ../stdlib
COMPFLAGS=-warn-error A
LINKFLAGS=
YACCFLAGS=-v
CAMLLEX=$(CAMLRUN) ../boot/ocamllex
CAMLDEP=$(CAMLRUN) ../tools/ocamldep
DEPFLAGS=
OBJS=cset.cmo syntax.cmo parser.cmo lexer.cmo table.cmo lexgen.cmo \
compact.cmo common.cmo output.cmo outputbis.cmo main.cmo
all: ocamllex syntax.cmo
allopt: ocamllex.opt
ocamllex: $(OBJS)
$(CAMLC) $(LINKFLAGS) -compat-32 -o ocamllex $(OBJS)
ocamllex.opt: $(OBJS:.cmo=.cmx)
$(CAMLOPT) -o ocamllex.opt $(OBJS:.cmo=.cmx)
clean::
rm -f ocamllex ocamllex.opt
rm -f *.cmo *.cmi *.cmx *.$(O)
parser.ml parser.mli: parser.mly
$(CAMLYACC) $(YACCFLAGS) parser.mly
clean::
rm -f parser.ml parser.mli
beforedepend:: parser.ml parser.mli
lexer.ml: lexer.mll
$(CAMLLEX) lexer.mll
clean::
rm -f lexer.ml
beforedepend:: lexer.ml
.SUFFIXES:
.SUFFIXES: .ml .cmo .mli .cmi .cmx
.ml.cmo:
$(CAMLC) -c $(COMPFLAGS) $<
.mli.cmi:
$(CAMLC) -c $(COMPFLAGS) $<
.ml.cmx:
$(CAMLOPT) -c $(COMPFLAGS) $<
depend: beforedepend
$(CAMLDEP) *.mli *.ml > .depend
include .depend
| 2024-04-25T01:27:15.642919 | https://example.com/article/8757 |
Super Smash Bros. will feature an Animal Crossing: New Leaf assist trophy in the form of the game’s Isabelle. The news was announced by director Masahiro Sakurai today, via Siliconera. Maybe she will be shown during the Super Smash Bros-centric Nintendo Direct next Tuesday, April 8.
Super Smash Bros. Wii U and 3DS producer Masahiro Sakurai has confirmed that the series’ notorious Home Run Bat weapon will return. He’s posted a pair of screens that show Link hitting Donkey Kong into the heavens.
Super Smash Bros. director Masahiro Sakurai has taken to MiiVerse to discuss the art of edge-camping in the series, and how tweaks to the new Wii U and 3DS brawler will force players to think a little differently.
Super Smash Bros. Wii U and 3DS director Masahiro Sakurai has posted another new image from the game online, and it appears to show the fighter’s single-player campaign, despite confirmation that Brawl’s Subspace Emissary will not return.
Super Smash Bros. will feature an Animal Crossing: New Leaf assist trophy in the form of the game’s Isabelle. The news was announced by director Masahiro Sakurai today, via Siliconera. Maybe she will be shown during the Super Smash Bros-centric Nintendo Direct next Tuesday, April 8.
Super Smash Bros. Wii U and 3DS producer Masahiro Sakurai has confirmed that the series’ notorious Home Run Bat weapon will return. He’s posted a pair of screens that show Link hitting Donkey Kong into the heavens.
Super Smash Bros. director Masahiro Sakurai has taken to MiiVerse to discuss the art of edge-camping in the series, and how tweaks to the new Wii U and 3DS brawler will force players to think a little differently.
Super Smash Bros. Wii U and 3DS director Masahiro Sakurai has posted another new image from the game online, and it appears to show the fighter’s single-player campaign, despite confirmation that Brawl’s Subspace Emissary will not return.
Super Smash Bros. creator Masahiro Sakurai has posted an image of a new Assist Trophy in the game, and it’s none other than the Skull Kid from The Legend of Zelda series. Those who played The Ocarina of Time, Majora’s Mask, and Twilight Princess will recognize the child, whose appearance has changed for the worse […]
Super Smash Bros. looks to be getting the Pyrosphere stage from Metroid: Other M. This is according to a Wii U screenshots teased by game director Masahiro Sakurai. You can have a look at the shot in a large format over on NeoGAF. Super Smash Bros. Wii U and 3DS is out next year. Thanks, […] | 2023-09-01T01:27:15.642919 | https://example.com/article/1989 |
Fabrication of blue light-blocking optical interference coatings by the solgel method.
We report on the solgel method of fabrication of thin films of high optical quality and with tunable index of refraction. The resulting coatings are hard, durable and robust against humidity and common organic solvents. Bragg mirrors and edge filters have been made by stacking these films. A blue light-blocking edge filter made by 2×21 stacked layers shows a transmittance of less than 1% in the stop band region while maintaining a high transmittance of over 80% in the rest of the visible spectral region with an integrated photopic transmittance of 89.7%. | 2023-11-15T01:27:15.642919 | https://example.com/article/9023 |
NEW DELHI: The government is looking at one more hike in excise duty on petrol and diesel before the Budget next month so as to raise revenue and stick to the fiscal deficit target for 2015-16."Falling crude oil price provide us a headroom for increasing excise duty on petrol and diesel. It will help in meeting fiscal deficit target of 3.9 per cent for the current fiscal," said an official source."The fiscal deficit target is sacrosanct and every effort would be made to meet the target," added the source.Government has raised excise duty on petrol and diesel four times in quick succession that will help it garner an additional Rs 14,000 crore in the current fiscal and partly make up for the shortfall in disinvestment receipts and direct tax collections.Last week, the government hiked excise duty on petrol by Rs 0.75 per litre and by Rs 2 a litre on diesel, the second increase in duties in less than two weeks, to mop up over Rs 3,700 crore in additional revenue.Oil prices have already fallen to 12-year low to USD 29 per barrel on concerns of weak Chinese economy and a global slowdown. Besides, lifting of sanctions on Iran also added to downward pressure on falling crude oil.The higher realisation from further excise duty hike will come in handy for the government to maintain fiscal deficit at 3.9 per cent of GDP in current financial year ending March 31, notwithstanding a poor show with regard to stake sale in state-owned companies.Although the government has targeted to raise Rs 69,500 crore from PSU disinvestment, so far only Rs 12,700 crore has been raised and the likelihood of any major stake sale in the remaining three months of 2015-16 is bleak.Finance Ministry officials have admitted that there would be a shortfall of around Rs 50,000 crore in disinvestment proceeds and about Rs 30,000-40,000 crore in direct taxes, but expressed optimism that higher realisation from indirect taxes as well as non-tax revenues will make up for the deficit.The ministry is also insisting on higher dividends from the PSUs in a bid to garner more non-tax revenue.According to the data, fiscal deficit position has shown a marked improvement at the end of November 2015.The deficit stood at Rs 4.83 lakh crore, or 87 per cent of the Budget Estimate (BE) for the whole 2015-16. The fiscal situation is, however, better than last year when the deficit was 98.9 per cent of the BE for the same period. | 2024-06-28T01:27:15.642919 | https://example.com/article/7639 |
Hello, Kotaku readers. Time for another open thread, where you can chat about video games, vent about Netflix's new rate hike, espouse your distaste for budget deficit talks or any other thing that crosses your mind.
I'm still on the fence about this new Netflix rate and plan change, as I'm one of those dinosaurs who still receives physical movies in the mail. What? I like Blu-rays and selection! Gimme a break. But I don't think I want to pay more than twenty bucks a month for the service, so I'm mulling things over. What about you?
If you don't give a toss about Netflix, maybe one of these other things will interest you. | 2023-10-12T01:27:15.642919 | https://example.com/article/1266 |
JAKARTA (AFP) - An AirAsia plane that crashed into the Java Sea last month with 162 people on board climbed faster than normal and then stalled, the Indonesian transport minister said Tuesday.
Flight QZ8501 went down on Dec 28 in stormy weather, during what was supposed to be a short trip from the Indonesian city of Surabaya to Singapore.
Indonesia’s meteorological agency has said bad weather may have caused the crash, and investigators are analysing the data from the jet’s black boxes before releasing a preliminary report.
Just moments before the plane disappeared off the radar, the pilot had asked to climb to avoid the storm. He was not immediately granted permission due to heavy air traffic.
“In the final minutes, the plane climbed at a speed which was beyond normal,” Transport Minister Ignasius Jonan told reporters, citing radar data.
“The plane suddenly went up at a speed above the normal limit that it was able to climb to. Then it stalled.”
Earlier at a parliamentary hearing, he said radar data showed the Airbus A320-200 appeared at one point to be climbing at a rate of 1,800m (6,000ft) a minute before the crash.
There were several other planes in the area at the time.
“I think it is rare even for a fighter jet to be able to climb 6,000 feet per minute,” he said.
“For a commercial flight, climbing around 1,000 to 2,000 (feet) is maybe already considered extraordinary, because it is not meant to climb that fast.”
However, defence aviation experts said the minister’s statement was incorrect, adding that a fighter jet flying at an altitude of 10,000m is capable of climbing 10,000 feet per minute.
TEERRORISM RULED OUT
The minister’s comments came after Indonesian investigators said they were focusing on the possibility of human error or problems with the plane having caused the crash, following an initial analysis of the cockpit voice recorder.
“We didn’t hear any other person, no explosion,” investigator Nurcahyo Utomo told reporters, explaining why terrorism had been ruled out.
Investigators from the National Transportation Safety Committee were now looking at the “possibility of plane damage and human factors", he said, without giving further details.
As well as the cockpit voice recorder, the committee is also examining a wealth of information in the flight data recorder, which monitors every major part of the plane.
A preliminary report will be released on Jan 28.
There was a huge international hunt for the crashed plane, involving ships from several countries including the US and China.
Indonesian search and rescue teams have so far recovered just 53 bodies from the sea.
But last week a Singapore navy ship located the jet’s main body, with the AirAsia motto “Now Everyone Can Fly” painted on the side.
Rescue teams hope they will be able to find many of the passengers and crew inside.
However, divers have not succeeded in reaching the fuselage despite several attempts due to bad weather, high waves and strong underwater currents.
All but seven of those on board the flight were Indonesian. The foreign nationals were from South Korea, Singapore, Malaysia, Britain and France. | 2023-08-11T01:27:15.642919 | https://example.com/article/4852 |
Q:
Orchard CMS and controller vs driver
I am a little ashamed for asking so many questions, but I really want to learn.
In Sipke's blog a webshop is created. There is one specific question that boggles my mind when trying to do something similar.
Let me spell out the basic requirements:
User registration form and login, etc. This one is covered by the blog and it works nice.
Creating product parts and so on. This one is covered and no problem there.
Ordering by filling in an order form and making the payment. See down
Having the order page maintainable by customer. See down.
Viewing your own orders and their status. See down
Maintaining customers and orders from backend system. This one is covered by the blog and I need to do some work there yet.
As for items regarding creating orders and viewing your orders. I have followed the approach for creating records and using standard MVC controllers. But then I encountered problems:
Menu for orders page. This I had to do manually after installing the module.
The order page itself. I had to create the view including title and so on. But I can imagine a customer wanting the order page on another menu and with a different title. And maybe add even some own content to the ordering page. This I couldn't achieve by using standard MVC approach. So maybe I am using the wrong approach here. So I was thinking about using contentparts for creating an order and displaying them and using the drivers and handlers for that. But before I go down that road and refactor everything I want to know if that is the right approach. A downside could be that once the module follows that route it can then not so easily be reused with customers that have other cms's capable of hosting an MVC3 module.
So when to use drivers, handlers and contentparts and when to use standard controllers and views.
A:
You should use Drivers and Parts (with Handlers if needed) when you want to create functionality for content items. E.g. if you want to display a custom media with all products, you could create a Part (together with its Driver, etc.) to handle that. Read the docs on Parts.
If the functionality is not tied to content items the most possibly you want to use the standard MVC toolbox, it's fine. Look at the built-in modules how they do that. E.g. the Blog module uses controllers and views to show the admin UI, but has parts to enhance the functionality of for example the Blog content type.
To make things more complicated you can employ ad-hoc content items to build a page that you'd normally do with simple views, but that's an advanced topic :-).
| 2024-03-26T01:27:15.642919 | https://example.com/article/1961 |
Q:
MVC 3 validation messages not shown due ModelState lost after PartialView
I have an MVC 3 project where I have 1 view LoginRegister which contains 2 views with forms for login and pre-register. The problem is after incorrectly completing the pre-register form and using PartialView("LoginRegister", loginRegisterViewModel) validation messages aren't displayed due the ModelState being lost. Before reading the next paragraph it's probably best to jump to the CODE.
Debugging the PartialView("LoginRegister", loginRegisterViewModel) and stepping into the PreRegister view to the following @Html.ErrorMessageFor(model => model.Email). Where the ModelState does not contain the Email key (see below) and hence doesn't display an error message.
private static MvcHtmlString ErrorMessageHelper(this HtmlHelper htmlHelper, ModelMetadata modelMetadata, string expression, string validationMessage, IDictionary<string, object> htmlAttributes)
{
string modelName = htmlHelper.ViewContext.ViewData.TemplateInfo.GetFullHtmlFieldName(expression);
if (!htmlHelper.ViewData.ModelState.ContainsKey(modelName)) // ModelState contains no keys, e.g. Email not found and a null is returned
{
return null;
}
// code continues here to render error message
}
CODE
ViewModels
LoginRegisterViewModel
namespace Site.ViewModels.Account
{
public class LoginRegisterViewModel
{
public bool IsDialog { get; set; }
public PreRegisterViewModel PreRegister { get; set; }
public QuickLoginViewModel QuickLogin { get; set; }
}
}
PreRegisterViewModel
using FluentValidation.Attributes;
using Site.ViewModels.Validators;
namespace Site.ViewModels.Account
{
[Validator(typeof(PreRegisterViewModelValidator))]
public class PreRegisterViewModel
{
public string Email { get; set; }
public string ConfirmEmail { get; set; }
}
}
Views
LoginRegister
@model Site.ViewModels.Account.LoginRegisterViewModel
@{
Layout = ViewBag.Layout;
}
<div id="loginReg" class="mod-loginReg">
<h2>Login and Registration</h2>
@{Html.RenderPartial("PreRegister", Model.PreRegister, new ViewDataDictionary());}
@{Html.RenderPartial("QuickLogin", Model.QuickLogin, new ViewDataDictionary());}
</div>
PreRegister
@using Site.Classes.MVC.Extensions;
@model Site.ViewModels.Account.PreRegisterViewModel
@using (Html.BeginForm("PreRegister", "Account", FormMethod.Post, new { @class = "form-errorContainer" }))
{
<div class="mod-loginReg-register">
<h3>Register</h3>
<p>Please enter your email address to register.<br /><br /></p>
<div class="mod-loginReg-form">
<div class="field-item">
@Html.LabelFor(model => model.Email)
@Html.TextBoxFor(model => model.Email, new { @maxlength = "255", @class = "Textbox required email" })
@Html.ErrorMessageFor(model => model.Email)
</div>
<div class="field-item">
@Html.LabelFor(model => model.ConfirmEmail)
@Html.TextBoxFor(model => model.ConfirmEmail, new { @maxlength = "255", @class = "Textbox required email" })
@Html.ErrorMessageFor(model => model.ConfirmEmail)
</div>
<div class="button-group">
@Html.Button("Register", "Register")
</div>
</div>
</div>
}
AccountController
[RequireHttps]
public ActionResult LoginRegister(int showDialog)
{
var loginRegisterViewModel = new LoginRegisterViewModel();
if (showDialog == 1)
{
ViewBag.Layout = "~/layouts/structure/dialog.cshtml";
loginRegisterViewModel.IsDialog = true;
}
else
{
ViewBag.Layout = "~/layouts/structure/2column.cshtml";
}
return PartialView(loginRegisterViewModel);
}
[RequireHttps]
public ActionResult PreRegister()
{
return PartialView();
}
[HttpPost]
[RequireHttps]
public ActionResult PreRegister(PreRegisterViewModel model)
{
if (ModelState.IsValid)
{
return PartialView("PreRegisterComplete");
}
var loginRegisterViewModel = new LoginRegisterViewModel { PreRegister = model, QuickLogin = new QuickLoginViewModel() };
return PartialView("LoginRegister", loginRegisterViewModel);
}
A:
This is caused by the viewData being cleared out when new ViewDataDictionary() is called.
@{Html.RenderPartial("PreRegister", Model.PreRegister, new ViewDataDictionary());}
@{Html.RenderPartial("QuickLogin", Model.QuickLogin, new ViewDataDictionary());}
According to MSDN ViewDataDictionary is used for:
Represents a container that is used to pass data between a controller
and a view.
I assume you have a good reason for this otherwise you would not have taken the trouble to add the additional parameter.
If you change it to:
@Html.RenderPartial("PreRegister", Model.PreRegister)
@Html.RenderPartial("QuickLogin", Model.QuickLogin)
the ModelState built up in the controller should be available on your views.
| 2024-01-31T01:27:15.642919 | https://example.com/article/9889 |
Why did Koum leave WhatsApp? - adz_6891
https://www.theguardian.com/commentisfree/2018/may/06/whatsapp-founder-sends-facebook-users-coded-message
======
throwaway84742
My guess:
1\. Most of the stock vested 2\. FB mafia is moving in and there’s no stopping
it
Educated guess from watching several acquisitions slowly disintegrate (though
not at FB)
------
sanatgersappa
I'm more curious about why Gundotra left Google. Hopefully that story will be
"declassified" some day.
| 2024-05-01T01:27:15.642919 | https://example.com/article/2587 |
Q:
Duda sobre HTML, cambiando plantilla de wordpress
Tengo unas dudas que no soy capaz de solventar en mi página. En la parte de abajo donde los iconos sociales, hay cuadrados en vez de los iconos de facebook, instagram, etc..., en cambio en esta otra página si que se ven todos.
He imaginado que es un problema de forwarding, pero buscando en la base de datos no he encontrado nada relacionado con el nombre del elemento fa fa-facebook, fa fa-instagram, etc... asi que he optado por entrar en el código e intentar cambiarlo, pero la verdad es que no tengo demasiada idea.
El código del footer en cuestión es este: http://pastebin.com/s72Rk5WM
y el trozo de còdigo correspondiente es:
/* facebook */
if( !empty($zerif_socials_facebook) ):
echo '<li><a'.$attribut_new_tab.' href="'.esc_url($zerif_socials_facebook).'"><span class="sr-only">' . __( 'Go to Facebook', 'zerif-lite' ) . '</span> <i class="fa fa-facebook"></i></a></li>';
endif;
He intentado insertar la imagen con src, pero no lo he conseguido y tampoco sé cómo guardarla, imagino que el i class, es lo que indica la imagen, pero no tengo manera de localizarlo.
Necesito ayuda para que aparezcan mis iconos en mi página como lo hacen en la otra de ejemplo.
A:
Los iconos vienen de la fuente fontawesome. En la pagina que funciona se esta cogiendo la fuente desde esta URL:
http://www.meganfc.net/wp-content/themes/zerif-lite/fonts/fontawesome-webfont.woff2?v=4.6.3
Es comun usar fontawesome font para los iconos. Aqui te dejo el enlace para usar el de facebook.
http://fontawesome.io/icon/facebook/
Comprueba que estas cargando la fuente desde tu pagina. No me deja acceder a ella por lo que no puedo comprobarlo yo.
| 2024-07-11T01:27:15.642919 | https://example.com/article/4673 |
Q:
How to change the visibility state in react-native GridView component?
I am working on react-native GridView component, i want to change the visibility state on GridView item click.
So i have a list colors grid but when i'll click on individual item at that it should select and show one tick mark.
Grid Items
Grid Items on Select
Code:
export default class filter extends Component {
constructor() {
super();
this.state = {
gridDataSourceColor: filterColor,
isVisible: false,
};
}
render() {
return (
<View>
<GridView
items={this.state.gridDataSourceColor}
itemsPerRow={6}
renderItem={this.renderColorItem.bind(this)}
/>
</View>
);
}
onItemPressed(item){
}
renderColorItem(item){
return(
<TouchableHighlight key={item.id} onPress={this.onItemPressed.bind(this, item)}>
<View
key={item.id}
style={{
width: 50,
height: 45,
marginLeft: 2,
marginRight: 2,
justifyContent: 'center',
alignItems: 'center',
marginTop: 5,
backgroundColor: item.color}}>
<Image
style={{
width: 25,
height:25}}
source={require('../images/check_mark_icon.png')} />
</View>
</TouchableHighlight>
);
}
}
So on above code when i'll do onItemPressed() at that it should change the state and show the tick mark.
Please kindly go through my post and suggest me some solution.
A:
Take isSelected in filterColor's Item.
onItemPressed(item){
var tempFilterColor = this.state.gridDataSourceColor;
for (var i=0; i< tempFilterColor.length; i++)
{
if (tempFilterColor[i].id == item.id) {
tempFilterColor[i].isSelected = true;
break; //Stop this loop, we found it!
}
}
this.setState({ gridDataSourceColor : tempFilterColor});
}
renderColorItem(item){
return(
<TouchableHighlight key={item.id} onPress={this.onItemPressed.bind(this, item)}>
<View
key={item.id}
style={{
width: 50,
height: 45,
marginLeft: 2,
marginRight: 2,
justifyContent: 'center',
alignItems: 'center',
marginTop: 5,
backgroundColor: item.color}}>
{this.renderCheckMark(item)}
</View>
</TouchableHighlight>
);
}
renderCheckMark(item)
{
if(item.isSelected) { // image render only if item selected
return(
<Image
style={{
width: 25,
height:25}}
source={require('../images/check_mark_icon.png')} />
);
}
}
| 2023-10-29T01:27:15.642919 | https://example.com/article/7926 |
Community-based dietary and physical activity interventions in low socioeconomic groups in the UK: a mixed methods systematic review.
Low socioeconomic status (SES) is a risk factor for type 2 diabetes and changes in diet and physical activity can prevent diabetes. We assessed the effectiveness and acceptability of community-based dietary and physical activity interventions among low-SES groups in the UK. We searched relevant databases and web resources from 1990 to November 2009 to identify relevant published and grey literature using an iterative approach, focusing on UK studies. Thirty-five relevant papers (nine quantitative, 23 qualitative and three mixed methods studies) were data extracted, quality assessed and synthesised using narrative synthesis and thematic analysis. The relationship between interventions and barriers and facilitators was also examined. Dietary/nutritional, food retail, physical activity and multi-component interventions demonstrated mixed effectiveness. Qualitative studies indicated a range of barriers and facilitators, which spanned pragmatic, social and psychological issues. The more effective interventions used a range of techniques to address some surface-level psychological and pragmatic concerns, however many deeper-level social, psychological and pragmatic concerns were not addressed. Evidence on the effectiveness of community-based dietary and physical activity interventions is inconclusive. A range of barriers and facilitators exist, some of which were addressed by interventions but some of which require consideration in future research. | 2024-07-06T01:27:15.642919 | https://example.com/article/2689 |
Wall Street Is Calling the Federal Reserve for Bailout
In the midst of this week’s panic, Wall Street traders have been repeatedly calling for Federal Reserve intervention to support a market filled with ultra-fragile assets.
As a reminder, the Federal Reserve had already made a historic decision on March 3, 2020 by lowering interest rates by 50 basis points with a target of 1% to 1.25%.
This cut had been decided unanimously in order to support the U.S. economy in anticipation of the arrival of the coronavirus. In the last 20 years, such a cut had only been decided on two occasions: after 9/11 and after the financial crisis of 2008.
This interest rates cut was intended to encourage a quantitative easing policy on the part of the Federal Reserve with a significant injection of liquidity.
Nevertheless, Wall Street is so used to this type of monetary stimulus that it obviously did not find it sufficient. The financial markets collapsed all the same.
Donald Trump continued to put pressure on the Federal Reserve by calling for a further interest rate cut with a target of zero interest rates. The goal is to bring the interest rates in line with Europe, and its negative interest rates at -0.50%.
At the peak of the financial market downturn on March 12, 2020, the Federal Reserve then announced an injection of $1.5T of liquidity. The markets reacted for some time, before finally continuing their descent.
On Wall Street, many are calling for more liquidity injections from the Federal Reserve.
Wall Street has become so addicted to the stimulus of money creation that it wants more and more. This abuse makes the effects less and less tangible, while devaluing what everyone has.
When I say everyone, I mean first and foremost the least wealthy people, because they are the ones who are most affected by the arbitrary decisions of a few powerful people at the head of a failing system.
The Federal Reserve should therefore continue its work of support through its favorite recipe in the days and weeks to come: lower interest rates, then more and more money creation. The markets will force it to do so.
On March 13, 2020, in the middle of the day, Donald Trump declared a state of national emergency in the United States.
This announcement, coupled with the possible future decisions of the Federal Reserve that Wall Street is calling for, seems to have convinced some investors who regained some optimism at the end of the week.
Slight upturn in the Dow Jones
The situation remains precarious, and next week will also be extremely tense. | 2024-03-12T01:27:15.642919 | https://example.com/article/2804 |
/*
* UPnP WPS Device
* Copyright (c) 2000-2003 Intel Corporation
* Copyright (c) 2006-2007 Sony Corporation
* Copyright (c) 2008-2009 Atheros Communications
* Copyright (c) 2009, Jouni Malinen <j@w1.fi>
*
* See wps_upnp.c for more details on licensing and code history.
*/
#ifndef WPS_UPNP_H
#define WPS_UPNP_H
struct upnp_wps_device_sm;
struct wps_context;
struct wps_data;
struct upnp_wps_peer {
struct wps_data *wps;
};
enum upnp_wps_wlanevent_type {
UPNP_WPS_WLANEVENT_TYPE_PROBE = 1,
UPNP_WPS_WLANEVENT_TYPE_EAP = 2
};
struct upnp_wps_device_ctx {
struct wpabuf * (*rx_req_get_device_info)(
void *priv, struct upnp_wps_peer *peer);
struct wpabuf * (*rx_req_put_message)(
void *priv, struct upnp_wps_peer *peer,
const struct wpabuf *msg);
struct wpabuf * (*rx_req_get_ap_settings)(void *priv,
const struct wpabuf *msg);
int (*rx_req_set_ap_settings)(void *priv, const struct wpabuf *msg);
int (*rx_req_del_ap_settings)(void *priv, const struct wpabuf *msg);
struct wpabuf * (*rx_req_get_sta_settings)(void *priv,
const struct wpabuf *msg);
int (*rx_req_set_sta_settings)(void *priv, const struct wpabuf *msg);
int (*rx_req_del_sta_settings)(void *priv, const struct wpabuf *msg);
int (*rx_req_put_wlan_response)(
void *priv, enum upnp_wps_wlanevent_type ev_type,
const u8 *mac_addr, const struct wpabuf *msg,
enum wps_msg_type msg_type);
int (*rx_req_set_selected_registrar)(void *priv,
const struct wpabuf *msg);
int (*rx_req_reboot_ap)(void *priv, const struct wpabuf *msg);
int (*rx_req_reset_ap)(void *priv, const struct wpabuf *msg);
int (*rx_req_reboot_sta)(void *priv, const struct wpabuf *msg);
int (*rx_req_reset_sta)(void *priv, const struct wpabuf *msg);
};
struct upnp_wps_device_sm *
upnp_wps_device_init(struct upnp_wps_device_ctx *ctx, struct wps_context *wps,
void *priv);
void upnp_wps_device_deinit(struct upnp_wps_device_sm *sm);
int upnp_wps_device_start(struct upnp_wps_device_sm *sm, char *net_if);
void upnp_wps_device_stop(struct upnp_wps_device_sm *sm);
int upnp_wps_device_send_wlan_event(struct upnp_wps_device_sm *sm,
const u8 from_mac_addr[ETH_ALEN],
enum upnp_wps_wlanevent_type ev_type,
const struct wpabuf *msg);
int upnp_wps_subscribers(struct upnp_wps_device_sm *sm);
#endif /* WPS_UPNP_H */
| 2024-05-30T01:27:15.642919 | https://example.com/article/1015 |
97 Ill.2d 502 (1983)
455 N.E.2d 48
THE PEOPLE OF THE STATE OF ILLINOIS, Appellant,
v.
EDWARD ALEJOS, JR., Appellee.
No. 56461.
Supreme Court of Illinois.
Opinion filed October 4, 1983.
*503 *504 *505 Neil F. Hartigan and Tyrone C. Fahner, Attorneys General, of Springfield, and Richard M. Daley, State's Attorney, of Chicago (Michael E. Shabat, Joan S. Cherry, and Raymond Brogan, Assistant State's Attorneys, of Chicago, of counsel), for the People.
Steven Clark, Deputy Defender (Richard F. Faust, Assistant Appellate Defender, of Chicago, of counsel), for appellee.
Judgment affirmed.
JUSTICE SIMON delivered the opinion of the court:
Defendant, Edward Alejos, Jr., was charged by information with murder, armed violence based on murder, and armed violence based on voluntary manslaughter, and was convicted in a bench trial in the circuit court of Cook County of voluntary manslaughter and armed violence based on voluntary manslaughter. In this appeal we are called upon to decide whether the armed-violence conviction was proper.
The defendant and the victim, Christian Arntzen, did not know each other. On the evening of October 27, 1978, defendant was sitting in his car in his own neighborhood conversing with an acquaintance, Jeanne Moffat. Bobby Malcolm, a friend of Moffat, had parked his car across the street from defendant's car, narrowing the traffic lane somewhat. Malcolm was standing beside his car and not participating in the conversation. Arntzen drove past the two parked cars but made a U turn at the next intersection, waited for a few minutes, and then left his car and approached Malcolm, accusing him of blocking the street. Malcolm promised to leave, but Arntzen swung his fist at him and then began chasing him around defendant's car, the engine of which was *506 running. Arntzen then pounded five or six times on the hood of defendant's car and shouted that defendant had tried to run over him. He approached the open window on the driver's side and repeated the accusation, and according to defendant's testimony stated that he wished to fight with defendant and reached into the car to grab him. Defendant thereupon drew a handgun and shot him six times. Arntzen died four days later.
At trial defendant claimed that he had not tried to run over Arntzen and took the position that the shooting was justified because he had reason to fear for his safety. In announcing his decision the trial judge stated that this was a "[c]lassic case of voluntary manslaughter" and found him guilty of that crime and of armed violence based on voluntary manslaughter.
Defendant appealed on three grounds. His first contention was that the information was insufficient to charge the crime of armed violence based on voluntary manslaughter in that it failed to set forth the elements of voluntary manslaughter, which can be committed in either of two ways. Second, he argued that armed violence could not be predicated on voluntary manslaughter, which is by its nature not a premeditated felony and is typically committed with a "dangerous weapon" which the armed-violence statute requires (see Ill. Rev. Stat. 1979, ch. 38, pars. 33A-1, 33A-2). His third ground was that his simultaneous conviction of manslaughter and armed violence in this case was improper because the same physical act provided the basis for both charges (e.g., People v. Mormon (1982), 92 Ill.2d 268; People v. Donaldson (1982), 91 Ill.2d 164). The appellate court reversed the armed-violence conviction on the basis of defendant's first argument and remanded for resentencing on the manslaughter charge, as the two original sentences were concurrent and for the same length of time. (104 Ill. App.3d 414.)
*507 We do not reach the issue concerning the sufficiency of the armed-violence count because we agree with defendant that the legislature did not intend that crime to apply to voluntary manslaughter.
Because it requires that the defendant's act be motivated by either a sudden and intense passion resulting from serious provocation or an unreasonable but actual belief that the circumstances required the use of deadly force (Ill. Rev. Stat. 1979, ch. 38, pars. 9-2(a), (b)), voluntary manslaughter, by its common law as well as its statutory definition, is an unpremeditated crime, induced by sudden fear or duress and committed without time for proper reflection. (See People v. Sudduth (1958), 14 Ill.2d 605, 607; People v. Brown (1946), 392 Ill. 519, 521; Moore v. People (1893), 146 Ill. 600, 602; see generally Clark & Marshall, Law of Crimes sec. 10.11 (6th ed. 1958); Ill. Ann. Stat., ch. 38, par. 9-2, Committee Comments, at 392 (Smith-Hurd 1979).) The penalty for murder has traditionally been, and at the time of this homicide was, more severe than that for voluntary manslaughter. However, voluntary manslaughter is not distinguished from murder merely by the punishment or price tag which the law places on the guilty act. The punishment is simply a reflection of the common-sense judgment, which our criminal code has always recognized, that an unlawful homicide which is committed with no planning and no prior intent to commit a crime is neither as serious as a homicide born of criminal deliberation or design, nor as likely to be deterred by threat of punishment as a killing which results from planned criminal acts.
The armed-violence section makes it a Class X felony to commit, while armed with a dangerous weapon such as a handgun, knife or bludgeon, any crime which is a felony under Illinois law (Ill. Rev. Stat. 1979, ch. 38, par. 33A-1 et seq.); it was enacted in 1967 "to respond emphatically *508 to the growing incidence of violent crime" (People v. Graham (1975), 25 Ill. App.3d 853, 858) and amended in 1977 to apply to felonies in general rather than, as in its original version, to certain enumerated crimes only, none of which were homicide offenses. The two essential elements of armed violence are being armed with a dangerous weapon and committing a felony, and while they must coincide, the mere presence of a weapon of the proscribed character is sufficient; the defendant need not actually use the weapon in the commission of the felony (People v. Haron (1981), 85 Ill.2d 261, 266-68). The presence of a weapon enhances the danger that any felony that is committed will have deadly consequences should the victim offer resistance. Thus, it is viewed as an aggravating factor which enhances the severity of the underlying felony and upgrades the punishment available for it to Class X. See People v. Donaldson (1982), 91 Ill.2d 164, 168.
Just as the presence of a weapon colors the way the law views the felony which defendant commits, so the felony changes the way the law regards the possession of the weapon. Even though the carrying of dangerous weapons in public is always fraught with some danger regardless of what the bearer is doing or intends to do, the armed-violence statute stops short of criminalizing all possession of guns, knives or baseball bats. The commission of a felony while so armed provides the basis for assessing criminal penalties for the act of carrying a dangerous weapon in society, an act which is not in all instances criminal. (Compare Ill. Rev. Stat. 1979, ch. 38, pars. 24-1, 24-3.1 (setting forth the limited circumstances under which the physical possession of certain weapons without more can be a crime).) The reason for the difference in treatment is presumably the belief that the chances that violence will erupt and cause great bodily harm because of the weapon are increased when a *509 felony is committed; one who creates such danger by committing the felony while possessing the weapon is culpable and should bear the consequences for the danger his conduct poses. The stiff punishment mandated by the armed-violence provision is intended not only to punish the criminal and protect society from him but also to deter his conduct that of carrying the weapon while committing a felony. See Ill. Rev. Stat. 1979, ch. 38, par. 1001-1-2.
We have noted above the difficulty of thinking conceptually of "deterring" a crime such as voluntary manslaughter which is committed on the spur of the moment and, by definition, without any deliberation. (See, e.g., M. Bassiouni, Criminal Law 95 (1978).) It is similarly difficult to understand the deterrent purpose the armed-violence provision could serve when applied to voluntary manslaughter. The general application of the armed-violence provision could be expected to discourage those who contemplate a felonious act beforehand from carrying a weapon when they set forth to perform the act, and from this perspective the provision serves a needed purpose. Yet no one who commits voluntary manslaughter intends in advance to take a life or employ deadly force; the only "intent" of this sort that enters into the crime is the decision, arrived at without deliberation and in most cases instantaneously, to use force capable of killing. Before that decision is arrived at, the person who is guilty of voluntary manslaughter typically has no criminal intent whatever. Many such people, including the defendant in this case, make the decision to arm themselves long before the onset of the passion or misconception which transforms their intentions from peaceful to homicidal; those that arm themselves later do so after the passion or the misconception takes hold of them, after which deterrence is no longer possible. It is not clear that the legislature intended by means of the armed-violence *510 section to deter in all instances the carrying of weapons, even deadly ones, for whatever purposes people wish to carry them. This is particularly so in view of the limited nature of the restraints the legislature has placed on the possession of weapons in other parts of the criminal code.
Additionally it is not readily apparent, for purposes of the punitive or retributive goal of the penalty here sought, how the possessor of a weapon who intends no crime but commits voluntary manslaughter can be viewed as more responsible for a situation of public danger than the possessor of a weapon who intends no crime and goes about his business undisturbed. Neither plans to use the weapon at his disposal: the former person does so only in response to external provocation so strong that he does not properly deliberate or channel his response. The law rarely penalizes the latter, as we have explained, while its response to the homicide committed by the former is to exact punishment for the killing even though the law recognizes that the perpetrator lacked intent to commit a crime or bring about a criminal result prior to his decision, arrived at without deliberation, to use force capable of taking a life. (See Ill. Ann. Stat., ch. 38, par. 9-2, Committee Comments, at 392-95 (Smith-Hurd 1979).) The only consideration that distinguishes one who commits voluntary manslaughter while armed with a dangerous weapon from one who commits voluntary manslaughter while not so armed is the fact that a weapon was involved in the former case and the possibility that its bearer might be more able to cause death in the future should he be provoked than one who is not in the habit of carrying weapons. The law does not ordinarily punish what a defendant might do, but only what he does, and assessing greater penalties via the generally worded armed-violence section to conduct which is covered in detail in all of its relevant aspects *511 by other provisions of the criminal code is inconsistent with the intent of those provisions.
For these reasons we conclude that the State's suggestion that we may not disregard the plain language of the armed-violence provision which makes it applicable to "any felony defined by Illinois Law" (Ill. Rev. Stat. 1979, ch. 38, par. 33A-2) should be rejected. This rule, set forth in People v. Moore (1978), 69 Ill.2d 520, 523 and Western National Bank v. Village of Kildeer (1960), 19 Ill.2d 342, 350, operates only when the statute that is being construed is free from apparent ambiguity, and it remains "the function of the courts to ascertain and give effect to the intent of the legislature, arriving at such intention not only from the language employed in the legislation, but also from the reason and necessity for the law, the evils to be remedied, and the objects and purposes to be obtained" (Mid-South Chemical Corp. v. Carpentier (1958), 14 Ill.2d 514, 517; see People ex rel. Cason v. Ring (1968), 41 Ill.2d 305, 309-10; People ex rel. Roan v. Wilson (1950), 405 Ill. 122, 127-28). Nor should the plain-meaning rule prevail over all other aids to construction where literal interpretation of a provision would yield a result inconsistent with other provisions which deal with the same subject and no other evidence of an intent to repeal or significantly alter those provisions can be discerned. (See People ex rel. Moore v. Chicago, Burlington & Quincy R.R. Co. (1953), 414 Ill. 419, 425; Wilderness Society v. Morton (D.C. Cir.1973), 479 F.2d 842, 880-81, cert. denied (1973), 411 U.S. 917, 36 L.Ed.2d 309, 93 S.Ct. 1550, and cases cited therein; 2A A. Sutherland, Statutory Construction sec. 51.01 (3d ed. 1973); compare Berger v. Howlett (1962), 25 Ill.2d 128, 137 (a statute which is specific, complete in itself and intelligible on its face need not be read in pari materia with existing statutes but may modify them by implication).) We observe finally that the words "any felony" in *512 the armed-violence statute are not without exception: in People v. Wisslead (1983), 94 Ill.2d 190, this court ruled that they did not apply to forcible detention for constitutional reasons, while in People v. Haron (1981), 85 Ill.2d 261, 278, we held that applying them to felonies which themselves required the use of dangerous weapons would be inconsistent with an assumption made in another part of the armed-violence provision that the underlying felony would retain a felony classification if committed while unarmed (Ill. Rev. Stat. 1979, ch. 38, par. 33A-3(b)).
In Haron we noted that where, as here, "we have no legislative history to assist us in determining whether the General Assembly intended the * * * enhancement to apply to such charges," this court "has recognized that a policy of lenity applies with respect to the interpretation of criminal statutes [citations], and also recognizes the rule of construction giving precedence to a specific provision where it conflicts with a general one. [Citation.]" (People v. Haron (1981), 85 Ill.2d 261, 277-78.) This court has recognized since Haron "the principle that ambiguities in penal statutes, particularly in the case of enhancement provisions, must be resolved in favor of the defendant" (People v. McCarty (1983), 94 Ill.2d 28, 34-35; see People v. Donaldson (1982), 91 Ill.2d 164, 169; People v. Hobbs (1981), 86 Ill.2d 242, 246; People v. Lund (1943), 382 Ill. 213, 215-16; cf. People v. Carlock (1981), 102 Ill. App.3d 1100, 1102 (a statute which enhances a penalty "is highly penal and should not be extended in its application to cases which do not, by the strictest construction, fall within its terms")). All of these cases involved the substantive reach of a general and all-inclusive enhancement provision found in the criminal code. In view of the fact that the carrying of weapons is not a criminal offense in all instances and the improbability that the armed-violence provision will deter *513 those who commit voluntary manslaughter, we conclude that the rule of lenity is appropriate here. We decline to apply the armed-violence statute literally to voluntary manslaughter. We disapprove of the appellate court's decision in People v. Lynom (1981), 97 Ill. App.3d 1113, modified by supervisory order on denial of leave to appeal (1982), 91 Ill.2d 563 n. 5, to the extent that it held that armed violence could be so applied.
Defendant argues that, in case of a reversal of his armed-violence conviction, we should remand the cause for resentencing on the manslaughter conviction, as the appellate court did, to guard against the possibility that the presence of the improper armed-violence conviction, on which a seven-year sentence was imposed, might have influenced the trial court's sentence on the manslaughter charge, which was seven years and concurrent with the sentence for armed violence. He notes that seven years was the longest imprisonment that could be imposed for voluntary manslaughter absent an aggravating factor which might lead to an extended term (Ill. Rev. Stat. 1979, ch. 38, pars. 9-2(c), 1005-8-1(a)(5), 1005-8-2(a)(4)) and that no extended term was imposed.
We need not decide here whether the standard for a remand for resentencing is the inability to determine affirmatively from the record whether the sentence was influenced by the consideration of improper factors, as courts in this State have held in People v. Conover (1981), 84 Ill.2d 400, People v. Bone (1982), 103 Ill. App.3d 1066, People v. Filker (1981), 101 Ill. App.3d 228, and People v. Green (1980), 83 Ill. App.3d 982, or whether the defendant must come forward with convincing evidence that the judge or jury was so influenced, as the State suggests, relying upon People v. Donaldson (1982), 91 Ill.2d 164, and People v. Miles (1981), 96 Ill. App.3d 721. The record in this case satisfies the latter standard. The emphasis the sentencing judge placed *514 upon the defendant's use of a gun persuades us that he was influenced by this circumstance in deciding the length of the sentence for voluntary manslaughter. The court referred to the defendant's use of a gun in the following language in finding him guilty of manslaughter and armed violence:
"* * * Why people run around the streets with guns loaded is beyond me. Don't go around the street with a loaded gun even if you're talking about shooting target pistol two days hence.
No question about it, a very small man. Apparently, the gun is the thing that makes him feel power, and apparently a loaded gun even makes him feel taller, and the sad thing about it is we have two individuals in the street who should be friends.
What happens, we have a fight, an altercation, and the defendant by way of having his so-called tough gun next to him shoots and kills the man during the course of the dispute."
At the sentencing hearing, the judge stated immediately before announcing the sentence:
"THE COURT: For some reason you're a small guy and apparently you think you're a tough guy. One of the big things that I fear about small guys is attempting to make yourself bigger, you carry a gun. That's exactly what happened here, you carried a gun, you were acting tough and a fight ensued, you pulled the gun and you killed somebody, which is sad. Basically, that is the story of your whole life. * * * And * * * you got a violent temper, therefore, you can't carry a gun or anything, you'll get in trouble, the next guy will probably be you who dies."
These comments were directed at the fact that the defendant used a gun, a factor which the trial judge obviously, but mistakenly, determined merited enhanced criminal punishment in the instant case. We therefore vacate the sentence and remand the cause to the circuit court for resentencing on the voluntary-manslaughter conviction. See People v. Green (1980), 83 Ill. App.3d 982, 987.
*515 For the reasons stated herein, rather than those set forth by the appellate court, we affirm the judgment of the appellate court.
Judgment affirmed.
| 2024-06-22T01:27:15.642919 | https://example.com/article/2494 |
Michael J. Fox Gets His Hollywood Star
There's a new star on Hollywood Boulevard, and it belongs to Michael J. Fox.
The "Family Ties," Back to the Future" and "Spin City" favorite, 41, was honored with his own star on Hollywood's legendary Walk of Fame. At its unveiling Monday, he said: "Acting is a great thing to do for a living, to do something you love, and to hear all the time that maybe you've done something to make people happy."
His production company, Lottery Hill Entertainment, recently sold a pilot to ABC for a sitcom about a retired hockey player's transition to fatherhood. "It's no more than that, and it's no less than that. It's just that, and it's great," Fox told reporters at the Hollywood ceremony, according to the Associated Press.
Fox's star is the 2,209th such plaque on the pavement. His spot is in front of the Hollywood Galaxy Theatre complex.
Fox, who has Parkinson's disease, has been devoting time to campaigning for funding for research into the illness, with which he has lived for more than 10 years. He first revealed that he has Parkinson's just over two years ago in PEOPLE.
Much of his acting work is now is focused on voiceover work for such animated films as "Stuart Little" and "Atlantis: The Lost Empire."
This year, his autobiography, "Lucky Man" (in which he revealed how his disease nearly destroyed his marriage after he turned to drinking after the diagnosis), spent 21 weeks on The New York Times bestseller list. | 2023-09-05T01:27:15.642919 | https://example.com/article/5815 |
The following navigation utilizes arrow, enter, escape, and space bar key commands. Left and right arrows move through main tier links and expand / close menus in sub tiers. Up and Down arrows will open main tier menus and toggle through sub tier links. Enter and space open menus and escape closes them as well. Tab will move on to the next part of the site rather than go through menu items.
The following navigation utilizes arrow, enter, escape, and space bar key commands. Left and right arrows move through main tier links and expand / close menus in sub tiers. Up and Down arrows will open main tier menus and toggle through sub tier links. Enter and space open menus and escape closes them as well. Tab will move on to the next part of the site rather than go through menu items.
CTA Reminds Customers of Upcoming West Side Service Changes
April 25, 2008
04/25/08
The Chicago Transit Authority today reminded customers that beginning the week of April 27, the agency will increase the frequency of Blue Line service during morning and evening rush periods on the Forest Park and O'Hare branches. In addition, weekday morning and evening rush service will be eliminated on the 54th/Cermak Blue Line branch due to low ridership.
Key destinations along the 54th/Cermak branch such as the UIC campus will continue to be served by the Pink Line, Forest Park Blue Line, #7 Harrison and #38 Ogden/Taylor.
The 54th/Cermak Blue Line branch serves the fewest customers per rail car of any rail line. Since the introduction of the Pink Line, which operates on the same branch, customers have demonstrated a consistent preference for Pink Line service. The 54th/Cermak Blue Line operates weekdays only from 5:30 a.m. to 9:30 a.m. and from 2:25 p.m. to 6:30 p.m.
Customer alerts have been posted in rail stations and announcements have been running on Blue and Pink Line trains to inform riders of the change in service. In addition, flyers continue to be distributed to customers at the affected stations, print advertisements have been placed to notify riders and available LED screens at affected stations have been running reminder notices. Information has also been posted on CTA's web site at transitchicago.com with details on Pink Line service in an effort to make the transition as smooth as possible.
The changes to rail service were approved by the Chicago Transit Board in March and are a part of the West Side Corridor service experiment. Ridership on West Side bus and rail routes has grown since service improvements were originally introduced in 2006.
In October 2007, West Side bus ridership was up 5.5 percent, compared to a 5 percent increase on non-West Side routes. October 2007 rail ridership on the West Side increased by 5.7 percent compared to a decrease of 2.4 percent outside of the West Side/Suburban area. | 2023-09-11T01:27:15.642919 | https://example.com/article/1628 |
Time for a time out. Harry Connick Jr.'s 19-year-old daughter, Georgia Connick, was arrested this past weekend following a house party at her family's home in New Canaan, Conn.
Georgia hosted a party at the home while her parents (dad Connick Jr. and mom, former Victoria's Secret model Jill Goodacre) were away this weekend, New Canaan police told NBC News on Aug. 18. She was charged with procuring alcohol for minors and permitting minors to possess alcohol, according to WTNH News 8.
Her famous dad released a statement to Us Weekly on Wednesday, Aug. 19, regarding his daughter's arrest. "This is a private matter which we are dealing with as a family," Connick Jr. told Us. "We have no further comments. Thank you for understanding."
Police were called to the home shortly after 1 a.m. on Saturday, Aug. 15, after it was reported that there was underage drinking taking place on the property. When the cops arrived on the scene, throngs of youngsters were allegedly running from the home and attempting to escape through the woods surrounding the property.
Georgia told police that it was initially supposed to be a small get together that, typically, grew out of proportion. According to police, the parents of about 15 kids — who were ages 18 to 20 — were called following the incident.
At the time, her famous father was in Philadelphia for auditions for the upcoming final and 15th season of American Idol. "Season 15 here we come!" he wrote, alongside a selfie on Saturday. "@americanidol #idol #BestSeasonYet #stalkie."
A photo posted by Harry Connick, Jr. (@harryconnickjr) on Aug 16, 2015 at 8:35am PDT
i'm with my wife, jill. i can't feel my face, but i love it. — Harry Connick, Jr. (@HarryConnickJR) August 14, 2015
His daughter will appear in court in Stamford on Sept. 2. | 2024-05-10T01:27:15.642919 | https://example.com/article/6065 |
Here is the HARD truth about Hardware Kill switches on Librem laptops.
The Librem laptops are secure machines that respect and protect your privacy and freedom. To this end, we at Purism are intensely suspicious of several items on a standard laptop that could be used, either maliciously or accidentally, to violate your privacy and security. Specifically, these items are:
The laptop’s built in Webcam and Microphone. The laptop’s WiFi and Bluetooth radios.
Almost all laptops on the market today have a way to turn off a laptop’s WiFi and Bluetooth radios. However, most do it via software on the computer (example: a special program in the operating system) or a soft switch in the computer’s embedded controller within the bios (example: using the keyboard combination of pressing at the same time the Function Key plus the F2 key). Due to the threats that still remain possible for malicious software to turn on these peripherals, we opt to solve this with hardware.
There is NO other laptop on the market today that has a physical means to turn off a machine’s built in Webcam and Microphone.
Thus, to protect you from the risks of these devices, the Librem laptops come with the ability to physically disable or turn off the Webcam, Microphone, WiFi radio, and Bluetooth radio via a Hardware Kill Switch (HKS).
The HKS is a real physical switch that either:
Cuts the signal or power line to the device, as in the case of the Webcam and Microphone HKS, or, Disable the chip running them, as is the case of the WiFi and Bluetooth radios HKS.
To give you an idea how this is done, let’s look at the HKSes on a Librem 13.
The HKS themselves
The HKSes are located in the hinge cover of a Librem 13. The HKS themselves are Double Pole, Double Throw (DPDT) switches with a switch function of ON-ON and have six leads on them.
Different Devices, Different Challenges
For starters, it helps to look at the motherboard on a Librem 13 and see where the various devices connect to it.
To physically shut off each of the questionable devices with a physical switch we broke the problem down into three parts:
Kill the Webcam Kill the Microphone, and, Kill the WiFi and Bluetooth radios
The reason for this is because each of the above devices has a different interface and thus requires a different solution to ensure it is really OFF.
Kill the Webcam
The webcam on a Librem 13 is located above the laptop’s screen and connects to the motherboard via connector EDPCON1, a x30 pin connector that also contains all the wiring for the laptop’s display. The webcam itself uses a USB 2.0 interface, meaning there are four wires on EDPCON1 that are just for the camera. Two of the four wires are for data, one is for a +3.3 volt DC signal to power the camera, and the last wire it the ground.
To kill the Webcam with a HKS, we insert a HKS and circuit during assembly, wiring the +3.3 volt DC power wire for the USB connection directly into the HKS.
With the HKS in the OFF position, no power gets to the Webcam, and thus making it impossible for the webcam to be used (in fact it is not detected by the kernel nor operating system when off).
Kill the Microphone
The microphone on a Librem 13 is located right next to the Webcam above the laptop’s screen and connects to the laptop’s motherboard via connector MIC_COM1. But unlike the Webcam, the microphone has only two leads: One for the microphone’s signal and the other for the microphone’s ground.
To kill the microphone with a HKS, we wire the microphone’s signal wire directly to the HKS.
With the HKS in the OFF position, no signal from the microphone gets to the motherboard, thus making it impossible for the microphone to send any signals to the laptop.
One Switch for Two
Both the Webcam and the Microphone are wired to the same HKS, so both devices are OFF at the same time.
The WiFi and Bluetooth radios are wired to a second HKS.
Kill the WiFi and Bluetooth Radios
To fully understand how to disable the WiFi and Bluetooth radios, it is necessary to gain some insight into the PCISIG M.2 NGFF standard and how it is used to turn OFF the devices. The PCISIG M.2 NGFF connector has 75 positions with up to 67 pins, each with a specific function. Some are used for data, some are used for power and ground, and still others are used for control signals. But for the HKSes, the two PCISIG M.2 NGFF pins of interest are pins 56 and 54, which control PCISIG M.2 NGFF functions called W_DISABLE#1 and W_DISABLE#2 (respectfully).
The WiFi/Bluetooth Hardware Kill Switch works by applying to pins 56 and 54 an input of one of two DC signals:
To turn the radios ON: Apply a Ground (GND) or +0 V signal. To turn the radios OFF: Apply a +3.3 V signal.
Note that this standard is a bit counter intuitive with Voltage high (+3.3 Volt) = OFF and Voltage low (0 Volts or GND) = ON.
In a Librem 13, the M.2 NGFF connector pins 54 and 56 cannot be accessed directly on the NGFF connector, for it is much too small for any solder connections. Instead the pins are accessed via two 0402 Surface Mount Device (SMD) pads on the motherboard itself (pads R609 and R629).
So for the WiFi/Bluetooth HKS, wires are soldered from the SMD pads to the HKS. Then one side of the HKS is wired to a +3.3 volt signal with the other side wired to ground. The end result looks like this:
With the HKS in the +3.3 Volt position, pins 54 and 56 in the M.2 NGFF connector will receive a HIGH voltage, and the radios on the WiFi card will be turned OFF. With the HKS in the Ground (GND) position, pins 54 and 56 will receive a LOW voltage, and the radios will be turned ON.
Our Hard Work to Protect Your Privacy
As you can see, it is not a trivial matter to manufacture these HKSes. A lot of research and hard work went into the effort.
Purism believes in your rights to privacy, security, and freedom, and will continue to work hard for users’ rights. | 2023-10-25T01:27:15.642919 | https://example.com/article/8852 |
If you think you have a boring office job, sitting full time behind a desk, 40 hours a week, and you are willing to spice up your life, then you should move to India! Creativity is the key, and you can invent your own job, or improvise something with the little resources available. Browse through these photos showing incredible and uncommon jobs. My personal favourite is the professional ear cleaner!
25 Incredible jobs I saw in India through photos
Willing to send your kids at school by school bus? No problem, in New Delhi there is a human bus! This man is taking on his bicyle-rickshaw over 10 kids to carry through the dusty roads.
Were you expecting to find David Hasselhoff in the Indian beaches ? Baywatch series is miles away here, and this interesting lifeguard is all you can get in Chennai, Tamil Nadu. If you are willing to go for a swim in the sea, you better know how to swim!
This man with a sweet look is selling flower at Mullik Ghat flower market in Kolkata, not far from Howrah Bridge.
You need to deliver chicken provision to your store? There are no trucks here, but no problem, just hire an hand-pulled rickshaws and fit as many chickens as you can!
In a country where most of the people struggle to reach the end of the day, personal protective equipment is pure utopia. This woodworker is completely covered in sawdust.
An ironer inside Auroville community, Tamil Nadu, barefoot and still using a coal iron.
Instead of fancy machines, humans are still sowing in India. This man covered in mud is planting seeds in Sunderbans Tiger Reserve.
Rebars for construction works, as well as fire wood (in the background) are transported by bycicle rickshaw.
Bicycle rickshaw is a common mean of transportation in Sunderbans Tiger Reserve, and over India, giving a job to many unskilled humans.
Are you stressed by the dressing code at your work place? Follow the example of this man in "work outfit" that is repairing a net.
Construction workers comfortably sitting without any safety measures, while pulling down the beam where they are staying. This is also India!
One of the most amazing jobs I found in India: a professional ear cleaner in Rishikesh, going around with his suitcase (in the next picture) looking for customers. In the photo, he is cleaning the ears of a Sadhu
The work suitcase of the professional ear cleaner from the previous picture. If you need any of the following services "Good ear clining oil drouping" just go to Rishikesk and you'll be satisfied by the professional job of this man!
Another hand pulled Rickshaw in Kolkata, India, one of the few places where this mean of transportation is still existing.
A pipe is leaking? Just call a local plumber to fix the problem! The mud bath is included for free!
A man selling fruits in a colorful local market in Kolkata, India. His outfit might be not too much inspiring to western eyes, but tropical fruits are still very tasty!
A few containers and a deposit are enough to improvise a food store.
A tailor using his human powered sewing machine barefoot on the road.
Carrying weights on the head is still a common way of moving goods in India.
A thoughtful man waiting for customers in front of his shop, in India.
In a country where washing machines are a luxury, most of the washing is still done by people beating the clothes on rocks along the rivers or in the public washing places. Dhobi Ghat public laundry in Mumbai (Bombay).
A seat, a pair of scissors and a small mirror are enough to improvise in India a barber shop. This is a quite common job, and can be spotted easily while visiting urban areas. Even if the location looks more like a landfill than a 5 stars hotel, clients are not missing. Picture taken in Mumbai.
Another barber shop on the road in New Delhi.
And a last barber shop, a quite common job on this side of the world.
In India resources are limited for locals and labour is readily available; the usage of machines for ploughing is really rare. While in most of the cases oxes are exploited to pull the plow, other times a big family is enough to accomplish the work, involving the kids in the agricultural work as if it was a game. Photo taken in Sunderbans Tiger Reserve, West Bengal.
A final summary of the incredible jobs we found in India compared to the same kind in the rest of the world. If you liked this photostory, SHARE IT with your friends using the SOCIAL BUTTONS on the right column of the main page! Don't forget to mention our website Nomad Travellers! | 2024-03-30T01:27:15.642919 | https://example.com/article/2337 |
Q:
How can I add the number of products of a specific category to a CMS?
I am creating a CMS page through Magento's admin page.
I want to display the number of products of a specific category. Any ideas of how can I achieve this?
A:
You can implement your own block, which gets a category ID as parameter, and then just implement the toHtml method like this:
return Mage::getModel('catalog/category')->load($passedId)->getProductCount()
| 2024-03-29T01:27:15.642919 | https://example.com/article/6435 |
Inhibitory effect of dibutyryl cyclic AMP on the release of calcium, inorganic phosphate and lysosomal enzymes from calvarial bones cultured for 24 hours.
The effect of N6,O2'-dibutyryl adenosine 3',5'-cyclic-monophosphate (dbcAMP) on the mobilization of calcium (Ca2+), inorganic phosphate (Pi) and lysosomal enzymes was studied in a bone culture system for 24 h using half calvaria from 6--7 day-old mice. DbcAMP inhibited spontaneous as well as parathyroid hormone-stimulated mineral mobilization. DbcAMP in a concentration of 5 x 10(-4)M also reduced the activities of beta-glucuronidase, beta-galactosidase and acid phosphatase found in the media while the activities of lactate dehydrogenase, aspartate aminotransferase and alanine aminotransferase were not affected. It is concluded that cAMP is not a stimulator but an inhibitor of bone resorption within the culture period studied (24 h) and that the cyclic nucleotide might interfere with release processes involved in bone resorption. | 2024-01-25T01:27:15.642919 | https://example.com/article/7705 |
Main menu
Main menu
About Property Tax
General Property Questions
1. When are property tax bills mailed out?
October 1st of each year. Property tax bills are mailed to the owner of record (as of 1 January). If a deed change occurs after the first of the year, a tax bill is mailed to the new owner of the property as a courtesy. New owners should contact their title company or review their closing statement to determine who is responsible for paying the taxes. Payment of property tax depends on when the property is transferred. Unpaid taxes continue to accrue against the property.
2. What time of year are property taxes due?
Taxes are due and payable from 1 October through 28 February.
3. Are partial payments accepted for my taxes?
Yes. Amount you pay within four (or less) separate payments is allowable. Any amount left unpaid when the taxes become delinquent are assessed interest and penalty. Until the tax amount is paid in full, a tax lien will remain in effect on your property.
4. What happens if I miss the tax payment deadline?
From the first day of each month beginning 1 March, interest and penalty of 1.5% per month (18% annually) is added to your tax amount . If the Post Office fails to postmark your payment by the dates due, it is considered a late payment. This applies even if you mail your payment on time. For mail-in payments, office meter dates are not accepted. Payments dropped in the night deposit box, beside our office door, are accepted as that day's deadline. On line property tax payments made through the BIS system are recognized by the county as paid on the date of the on line transaction.
5. What time period do my annual taxes cover?
The taxes that become payable October 1 cover the current calendar year.
6. Where can my tax bill be paid in person?
The trustee's office is in the lower level of the Dyer County Courthouse, on the north side of Veteran's Square. Our office hours are 8:30 a.m. - 4:30 p.m. Monday through Friday. Outside the entrance to our office, there is a secured night deposit box for drop off payments .
7. What does the term "EtUx" beside my husband's name on the property bill mean?
1. Do the elderly, disabled or disabled veterans receive any discounts or exemptions?
Eligibility requirements for ELDERLY: One owner must be 65 or older on or before December 31, 2013. Must own and use the property as your primary residence. Combined 2012 income for all owners of the property must not exceed $27,800. If married, the spouse's income is included whether or not they have an ownership in the property.
Eligibility Requirements for DISABLED: Disability status must be current (dated 2013). Must own and use the property as your primary residence. Combined 2012 annual income for all owners of the property must not exceed $27,800. If married, the spouse's income is included whether or not they have an ownership in the property.
Eligibility requirements for DISABLED VETERAN-OR Surviving Spouse of Disabled Veteran-OR Surviving Spouse of Soldier Killed in Action: Must be 100% disabled as determined by the VA. Must own and use the property as your primary residence. Income does not apply to disabled veterans or their surviving spouses.
REQUIRED DOCUMENTATION FOR ELDERLY AND DISABLED: Social Security & Medicare Cards of all owners and spouses, 1099 from Social Security indicating 2012 income and for disabled owners, Date Disability Began. If you have a Life Estate: Are any beneficiaries living with you? Copy of the Life Estate. Documentation from ALL other sources of 2012 income. Examples: 1040 (Income Tax) / Retirement-Pension / Interest, etc. If you live in a Mobile Home: Copy of Bill of Sale or Title.
REQUIRED DOCUMENTATION FOR DISABLED VETERAN: Complete Pre-Approval form (F-16) available in Trustee's Office. Social Security Number and VA Claim Number.
TENNESSEE STATE PROPERTY TAX RELIEF PROGRAM
The State Tax Relief Program pays a portion of the property tax for SeniorsOR Disabled persons who meet certain eligibility requirements.
The Tax Relief pays up to $316.00 (State $158.00 and Dyer County matches up to $158.00) for eligible property owners who live in Dyer County.
Tax Relief is paid on the first $175,000 of market value of the home of DisabledVeterans or their Surviving Spouses.
Where Do I Apply?
Visit the Trustee's office in the Courthouse or call (731) 286-7802.
Office hours: Monday - Friday 8:30 a.m. -4:30 p.m.
Application Deadline for 2013 is: April 4, 2014.
You may also be eligible for tax relief on City taxes. Contact the appropriate City Hall for further information.
1. Where can I find information about the assessed value of my property?
The county assessor is responsible for the appraisal and assessment of property. You may contact the county assessor's office at (731) 286-7804.
2. How are the county assessor's office and the trustee's office related?
The county assessor is responsible for the appraisal and assessment of property, according to state law. The trustee's office is responsible for billing and collection of taxes based on assessments. The trustee has no authority over the amount of assessment, nor can he/she be involved in the appraisal process.
3. What is the appeal process?
Appointments can be made by contacting the assessor's office. The appeal process begins in the county assessor's office by appearing before the Local Board of Equalization. This board meets annually during the first two weeks of June. | 2024-01-03T01:27:15.642919 | https://example.com/article/9541 |
# frozen_string_literal: true
require 'sprockets/http_utils'
require 'sprockets/processor_utils'
require 'sprockets/utils'
module Sprockets
module Transformers
include HTTPUtils, ProcessorUtils, Utils
# Public: Two level mapping of a source mime type to a target mime type.
#
# environment.transformers
# # => { 'text/coffeescript' => {
# 'application/javascript' => ConvertCoffeeScriptToJavaScript
# }
# }
#
def transformers
config[:transformers]
end
Transformer = Struct.new :from, :to, :proc
# Public: Register a transformer from and to a mime type.
#
# from - String mime type
# to - String mime type
# proc - Callable block that accepts an input Hash.
#
# Examples
#
# register_transformer 'text/coffeescript', 'application/javascript',
# ConvertCoffeeScriptToJavaScript
#
# register_transformer 'image/svg+xml', 'image/png', ConvertSvgToPng
#
# Returns nothing.
def register_transformer(from, to, proc)
self.config = hash_reassoc(config, :registered_transformers) do |transformers|
transformers << Transformer.new(from, to, proc)
end
compute_transformers!(self.config[:registered_transformers])
end
# Internal: Register transformer for existing type adding a suffix.
#
# types - Array of existing mime type Strings
# type_format - String suffix formatting string
# extname - String extension to append
# processor - Callable block that accepts an input Hash.
#
# Returns nothing.
def register_transformer_suffix(types, type_format, extname, processor)
Array(types).each do |type|
extensions, charset = mime_types[type].values_at(:extensions, :charset)
parts = type.split('/')
suffix_type = type_format.sub('\1', parts[0]).sub('\2', parts[1])
extensions = extensions.map { |ext| "#{ext}#{extname}" }
register_mime_type(suffix_type, extensions: extensions, charset: charset)
register_transformer(suffix_type, type, processor)
end
end
# Internal: Resolve target mime type that the source type should be
# transformed to.
#
# type - String from mime type
# accept - String accept type list (default: '*/*')
#
# Examples
#
# resolve_transform_type('text/plain', 'text/plain')
# # => 'text/plain'
#
# resolve_transform_type('image/svg+xml', 'image/png, image/*')
# # => 'image/png'
#
# resolve_transform_type('text/css', 'image/png')
# # => nil
#
# Returns String mime type or nil is no type satisfied the accept value.
def resolve_transform_type(type, accept)
find_best_mime_type_match(accept || '*/*', [type].compact + config[:transformers][type].keys)
end
# Internal: Expand accept type list to include possible transformed types.
#
# parsed_accepts - Array of accept q values
#
# Examples
#
# expand_transform_accepts([['application/javascript', 1.0]])
# # => [['application/javascript', 1.0], ['text/coffeescript', 0.8]]
#
# Returns an expanded Array of q values.
def expand_transform_accepts(parsed_accepts)
accepts = []
parsed_accepts.each do |(type, q)|
accepts.push([type, q])
config[:inverted_transformers][type].each do |subtype|
accepts.push([subtype, q * 0.8])
end
end
accepts
end
# Internal: Compose multiple transformer steps into a single processor
# function.
#
# transformers - Two level Hash of a source mime type to a target mime type
# types - Array of mime type steps
#
# Returns Processor.
def compose_transformers(transformers, types, preprocessors, postprocessors)
if types.length < 2
raise ArgumentError, "too few transform types: #{types.inspect}"
end
processors = types.each_cons(2).map { |src, dst|
unless processor = transformers[src][dst]
raise ArgumentError, "missing transformer for type: #{src} to #{dst}"
end
processor
}
compose_transformer_list processors, preprocessors, postprocessors
end
private
def compose_transformer_list(transformers, preprocessors, postprocessors)
processors = []
transformers.each do |processor|
processors.concat postprocessors[processor.from]
processors << processor.proc
processors.concat preprocessors[processor.to]
end
if processors.size > 1
compose_processors(*processors.reverse)
elsif processors.size == 1
processors.first
end
end
def compute_transformers!(registered_transformers)
preprocessors = self.config[:preprocessors]
postprocessors = self.config[:postprocessors]
transformers = Hash.new { {} }
inverted_transformers = Hash.new { Set.new }
incoming_edges = registered_transformers.group_by(&:from)
registered_transformers.each do |t|
traversals = dfs_paths([t]) { |k| incoming_edges.fetch(k.to, []) }
traversals.each do |nodes|
src, dst = nodes.first.from, nodes.last.to
processor = compose_transformer_list nodes, preprocessors, postprocessors
transformers[src] = {} unless transformers.key?(src)
transformers[src][dst] = processor
inverted_transformers[dst] = Set.new unless inverted_transformers.key?(dst)
inverted_transformers[dst] << src
end
end
self.config = hash_reassoc(config, :transformers) { transformers }
self.config = hash_reassoc(config, :inverted_transformers) { inverted_transformers }
end
end
end
| 2023-10-07T01:27:15.642919 | https://example.com/article/2115 |
Product Reviews
You'll love the golden tones of this topaz Venetian glass disc. This biconvex bead has a gleaming gold foil center surrounded by dark yellow glass. Its high quality appearance will add a touch of elegance to your designs. Use this 10mm bead for earrings, bracelets or necklaces. It would go well with silver or gold and jewel-toned beads. Because this bead is handmade, it may have some rough edges around the bead holes where it was attached to the mandrel. We recommend using beading wire instead of thread, as the rough edges can wear down thread. Be sure to browse through the rest of our Venetian glass beads.
Customer Reviews for Venetian Glass 10mm Gold Foil Disc - Topaz
This product has not yet been reviewed. Click here to continue to the product details page. | 2023-09-21T01:27:15.642919 | https://example.com/article/6929 |
Smoke-free air policy: subcultural shifts and secondary health effects among club-going young adults.
In March 2003, New York City implemented legislation that called for a ban of smoking in bars, restaurants, nightclubs, and other establishments. The express purpose of this legislation was to protect the health of employees and patrons from second-hand smoke. In addition to the stated goal of protection from second-hand smoke for employees, key secondary health effects of this law have emerged in the lives of club-going youth. This paper is based upon data derived from an ethnographic research project on club-related health issues in NYC. Drawing upon ethnographic fieldwork during the implementation of the ban and in-depth interviews with club-going youth, the paper provides a grounded analysis of youth reactions to the smoking ban and a descriptive profile of the secondary health effects of the smoking ban in nightclubs. It explores the attitudes of club-going youth towards the ban and the ways in which the legislation shapes the behaviours of habitual smokers, 'social smoking', and the use of drugs within bars and clubs. In particular, the data suggest a tension between the desire to remain subculturally involved and the desire to smoke. It also highlights the adaptive character of subcultures and the importance of social relations in behavioural patterns. | 2023-10-09T01:27:15.642919 | https://example.com/article/7092 |
Changes in serum CPK, LDH, and their isoenzymes in the perioperative period in patients undergoing craniotomy.
The perioperative changes in the serum concentration of creatine phosphokinase (CPK) and its isoenzymes MM, MB, and BB and of lactic dehydrogenase (LDH) and its isoenzymes LDH1 to LDH5 were determined during craniotomy in order to distinguish operation-induced changes in these enzymes from those due to acute myocardial infarction and malignant hyperthermia. Twenty-eight male patients, 29 to 76 years of age (mean +/- SD = 58 +/- 13.2 years), undergoing craniotomy for tumor reseaction (n = 26) or cerebral artery aneurysm clipping (n = 2) were included in this study. Ten serial blood samples were obtained from each patient: one sample before and another after induction of anesthesia, and eight samples after the incision, over a period of 70 h. The preinduction serum CPK level of 97 +/- 32 U/L (mean +/- SD) increased gradually and significantly and reached the peak level of 542 +/- 116 U/L 34 h after incision (p <0.05). Whereas all of the CPK isoenzymes increased in terms of U/L after incision, only the MM fraction (expressed as percent of total CPK) increased, and the MB and BB fractions (expressed as percent of total CPK) decreased. The preinduction serum LDH level of 150 +/- 42 U/L (mean +/- SD) increased gradually after incision and reached the peak level of 210 +/- 32 U/L 58 h after incision (p <0.05). LDH2 as a percent of total LDH decreased significantly, but the LDH1/LDH2 ratio did not change. LDH4 and LDH5, as percents of total LDH, increased significantly. The large increases in total serum CPK and the concomitant decrease in MB percent after craniotomy may minimize and/or mask the percentage increase in the MB level following acute myocardial infarction. The perioperative serum CPK level as a marker in the diagnosis of malignant hyperthermia should be interpreted in light of the present results and in conjunction with clinical symptomatology. | 2023-12-28T01:27:15.642919 | https://example.com/article/9465 |
996 So.2d 172 (2008)
Lionell Javon DYSON, Appellant
v.
STATE of Mississippi, Appellee.
No. 2008-CP-00379-COA.
Court of Appeals of Mississippi.
December 2, 2008.
Lionell Javon Dyson, Appellant, pro se.
Office of the Attorney General by Billy L. Gore, attorney for appellee.
Before LEE, P.J., CHANDLER and ISHEE, JJ.
CHANDLER, J., for the Court.
FACTS AND PROCEDURAL HISTORY
¶ 1. Lionell Javon Dyson was charged in the indictment with two counts of kidnaping and one count each of armed carjacking, armed robbery, and attempted armed robbery. On March 24, 2004, Dyson pleaded guilty in the Pearl River County Circuit Court to carjacking and armed robbery by the exhibition of a firearm. On April 23, 2004, Dyson was sentenced to serve ten years for the carjacking offense and twenty years, with ten suspended, for the armed robbery offense. The sentences were ordered to run consecutively to each other in the custody of Mississippi Department *173 of Corrections. On February 19, 2008, Dyson petitioned for post-conviction relief in the trial court. This petition was dismissed as time-barred by the trial judge.[1]
¶ 2. Dyson now appeals that dismissal alleging the following assignments of error: (1) he was exposed to double jeopardy; (2) he was denied his right to a fast and speedy trial; (3) he received ineffective assistance of counsel; (4) his guilty plea was not voluntarily and intelligently entered; and (5) his rights were violated by application of an ex post facto law.
ANALYSIS
¶ 3. A trial court's decision to dismiss a motion for post-conviction relief is insulated from appellate review unless it is determined that the trial court's decision was clearly erroneous. Willis v. State, 904 So.2d 200, 201(¶ 3) (Miss.Ct.App.2005) (citing McClinton v. State, 799 So.2d 123, 126(¶ 4) (Miss.Ct.App.2001)). A trial court may dismiss a motion for post-conviction relief "[i]f it plainly appears from the face of the motion, any annexed exhibits and the prior proceedings in the case that the movant is not entitled to any relief[.]" Miss.Code Ann. § 99-39-11(2) (Rev.2007).
¶ 4. When a defendant pleads guilty to an offense, the corresponding petition for post-conviction relief must be filed within three years after entry of the judgment of conviction. Miss.Code Ann. § 99-39-5(2) (Rev.2007). The only exceptions to this three-year statute of limitations are when a prisoner can show:
an intervening decision of the Supreme Court of either the State of Mississippi or the United States which would have actually adversely affected the outcome of his conviction or sentence or that he has evidence, not reasonably discoverable at the time of trial, which is of such nature that it would be practically conclusive that had such been introduced at trial it would have caused a different result in the conviction or sentence. Likewise excepted are those cases in which the prisoner claims that his sentence has expired or his probation, parole or conditional release has been unlawfully revoked. Likewise excepted are filings for post-conviction relief in capital cases which shall be made within one (1) year after conviction.
Miss.Code Ann. § 99-39-5(2). None of the above exceptions to the three-year time limitation apply in the current case.
¶ 5. While the supreme court has held that errors affecting fundamental constitutional rights may be excepted from procedural bars that would otherwise cause their dismissal, double jeopardy, ineffective assistance of counsel, involuntary guilty pleas, and speedy trial challenges all have been held to be time-barred. See Luckett v. State, 582 So.2d 428, 429-30 (Miss.1991); see also Marshall v. State, 680 So.2d 794, 794-95 (Miss.1996). Dyson cites no authority nor makes any argument supporting his ex post facto assignment of error. Therefore, all issues are without merit.
CONCLUSION
¶ 6. Accordingly, the circuit court's dismissal of Dyson's PCR petition as being time-barred is affirmed.
*174 ¶ 7. THE JUDGMENT OF THE PEARL RIVER COUNTY CIRCUIT COURT DISMISSING THE MOTION FOR POST-CONVICTION RELIEF IS AFFIRMED. ALL COSTS OF THIS APPEAL ARE ASSESSED TO PEARL RIVER COUNTY.
KING, C.J., LEE and MYERS, P.JJ., IRVING, GRIFFIS, ISHEE, ROBERTS and CARLTON, JJ., CONCUR. BARNES, J., CONCURS IN RESULT ONLY.
NOTES
[1] The memorandum opinion and order of summary dismissal was filed on February 19, 2008, but it was signed on February 14, 2007. This is most likely a clerical error seeing as Dyson did not sign his petition for post-conviction relief until January 31, 2008, and did not file the petition until February 19, 2008. The date on the opinion is ultimately irrelevant as the date on which Dyson signed the petition-January 31, 2008 was past the statutory time limit.
| 2023-12-19T01:27:15.642919 | https://example.com/article/3025 |
Identification of Escherichia coli strains from cows with clinical mastitis by serotyping and DNA polymorphism patterns with REP and ERIC primers.
A number of Escherichia coli strains was isolated during a study of clinical mastitis on seven farms in the Netherlands. From these E. coli strains, 30 were characterised with regard to their serotype and their DNA polymorphism pattern with REP and ERIC primers. Special attention was given to recurrent E. coli mastitis in cows. The combination of serotype and DNA pattern observed, was used to study the epidemiology of clinical E. coli mastitis. The results demonstrated that the PCR reaction with the ERIC primers can be used for differentiation of E. coli strains. The DNA polymorphism patterns showed that E. coli strains isolated from cases of clinical mastitis have a great variability in genotype. More 3 than one case of clinical mastitis associated with E. coli during the same lactation period occurred infrequently. However when it took place, E. coli strains isolated from the separate episodes of inflammation, were in most instances of the same serotype and had the same DNA amplification pattern. | 2023-09-09T01:27:15.642919 | https://example.com/article/4694 |
Deep Pocket Sheets-Sheets That Actually Fit!
We as humans are always coming up with some new big idea to improve our daily life. Something that will make things just a little better. And of course improving our quality of sleep is no different.
So what have we done? Well we came up with mattress that are even thicker than before. Since our normal sheets would not fit these more supportive mattress they followed it up with new sheets as well. These new sheets are called deep pocket sheets. And they are specifically designed for the new extra thick mattresses.
As always with something new, whether it be new to you or new to the market, there are always questions about it. You know like how much of a difference is there really between regular sheets and deep pocket sheets? Another great question I have run across is, what size of beds do the deep pocket sheets fit?
Or there were even a couple of questions about what colors and fabrics were available with the deep pocket sheets? And this last question was a really good one, how do I care for deep pocket sheets?
So are any of these questions weighing on your mind? If so I have done some really good research to help bring you these answers. With that being said how about we jump right in and explore these deep pocket sheets!
Standard Sheets VS Deep Pocket Sheets
First of all I want to tell you exactly what we are comparing here. The difference between these two sheet is the corner pockets of the fitted sheets. You know the corner that you tug and pull at with all your might to go over the corners of your mattresses, ensuring an ultra tight fit! Yep this is were these two types of sheets vary.
Now regular sheet are made for mattresses that are more the standard sizes. What are the standard sizes? Well in this case I am not describing the difference betweentwin, full, king, and queen. Instead, when I am referring to sizes here in this post, I am referring the thickness of the mattresses.
So now that we have a better understanding how about I get down to the nitty gritty for you!
Regular/standard size thickness of mattress usually can range anywhere from 5 inches thick up to 14 inches thick. If you are to go measure the thickness of your mattress and it happens to fall between these two measurements than you are probably going to be safe stick with a regular sheet. For the most part it should fit very snuggly across the corners of your bed.
On the other hand if your mattress creeps up past this number it would probably be a good idea to go with deep pocket sheets instead. Simply because the corners are designed to be a bit longer this way they will fit these ever so comfortable thick mattress. Helping to ensure your sheet will stay put at night, not creeping up into a puddle in the middle of your bed.
Usually deep pocket sheets start at about 15 inches and go up from there. The highest one I found was 30 inches. Now they may have some even deeper than this. But this can give you a good idea for a starting point.
One other thing that I haven’t mentioned is that you may have a standard thickness mattress, but you wanted a little extra cushion so you have added a mattress topper. In this case, this might also cause you to have to purchase a set of deep pocket sheets as well. That little extra bump of comfort may be just a little too much for the regular sized sheet.
Alright quick recap, if you happen to be lucky and have gotten a thicker mattress or even added a mattress topper, to give your self a little more comfort and support, you are likely going to need to be looking into getting deep pocket sheets!
Will Deep Pocket Sheets Fit Your Bed?
Here is the part I get into what size of bed you currently have like twin, full, king or queen. Now I am certain that we all understand that these sizes pertain to the area measurements of the bed like a twin size is smaller and will usually only fit one, while a king is huge with plenty of sprawling room.
But even with these different sizes each one of them can be a standard thickness or you can find these with extra thickness as well to offer more support. With this being said, since all of these sizes of beds can come in standard thickness or extra thick, they also offer deep pockets sheets for each one.
So if it happened to cross your mind, o I only have a twin so a standard twin sheet set will due, please stop and double check for the thickness! You very well might be stuck fighting the never ending crawling and stretching battle with your sheet. Save your self that trouble and measure it first.
All in all yes there are thicker mattresses in every size you can purchase, so take a second to stop and measure to make sure you are buying the right sheets. It could save you a little extra time and stress!
Does Deep Pocket Sheets Limit Your Color Options?
Colors seem to add spice to everything, including your bedroom. So I am sure most of you don’t want the simple black or white choice. I got good news for those of you who want to spread your color wheel while looking at deep pocket sheets.
Are you ready for the good new? Well the fact is with their popularity on the rise, companies have made sure to include a huge array of different colors into their options of deep pocket sheets. So no worries you can still find the color that makes your day even if you have a thicker mattress.
You can check this one off your curiosity list, if you are thinking of looking into a new thicker mattress, we have you covered with a big choice of colors! The bedding want you to be comfortable and happy with the look as well!
Is Your Fabric Options Limited With Deep Pocket Sheets?
There are so many choices of types of fabrics available when it comes to sheets. Types like cotton, silk, bamboo, and evenorganic. But the question remains are you limited in your choice of fabric if you need a set of deep pocket sheets?
Be prepared and happy all at once! They do offer all of these great types of fabric in deep pocket sheets as well. You see they wanted to make sure you were not walking away from that extra cushion of a thick mattress because you were worried that you wouldn’t be able to find the fabric that you love in deep pockets size.
So if just happens to be that your favorite kind of sheet is bamboo, don’t worry go ahead and buy that thicker mattress. There will still be several choices that you can decide from within the bamboo fabric. Most bedding companies do have your best interest at heart.
Is Caring For Deep Pockets Sheets Any Different?
As I am sure you are aware of caring for your bedding not only sustains the life of your bedding, but this can also benefit you greatly in your health as well. So making sure to wash it is a real necessity. But how do you wash it, especially if it happens to be deep pocket sheets.
First off just like standard sheets, it really depends on what type of fabric you have chosen. Simply the difference in caring is not between the deep pocket sheets and the standard sheets, it is still about the fabric.
Let’s say you have silk deep pocket sheets, these will still most likely need to go through dry cleaning due to their delicate material. While if you have cotton sheets you are more than likely able to wash them and dry them from your home.
But the one big thing is make sure and read the care label they should have all the information listed on there. Things like whether to use cold, warm, or hot water. It should also include drying instructions as well. It is best to follow these instructions, mainly because this will help your wonderful deep pocket sheets have a longer lifespan.
What Else Would You Like To Know?
I am sure there are many more questions that revolve around deep pocket sheets! I would love to know what ever your questions are. And I will do my absolute best to answer all of them for you. The questions I covered above are the ones that I found were most commonly asked. So I figured this would be a great starting point.
Your sheets shouldn’t be what stops you from buying a better mattress. With my help we can find exactly what you are looking for, so you can enjoy a more peaceful nights sleep! All you have to is let me know!
There Are A Whole Lot More!
If You Would Like To See What Is Available
Click The Sheets Below!
I want to take a minute and thank you for stopping to read my post. Looking forward to hearing from you soon. Feel free to drop me a line in my comment box below.
6 Replies on “Deep Pocket Sheets-Sheets That Actually Fit!”
Hi Melissa and thank you for this informative post.
I actually never thought about the depth of bed sheets before, and now I can appreciate the difference.
No wonder that I have sheets that keep on “popping” back from the corners as they are not deep enough to wrap around the mattress itself.
With your informative post now I know what to look out for. This could not come at a better time as we are about to set up our new house in the USA!
All the best
Orion
Hi Orion. Thank you for coming by. Yes I hadn’t given it much thought either till someone asked me about them and realized I needed to learn about these as well. Yes if you are fighting the popping up sheet syndrom then you very well might need to change to the deep pocket sheet size instead. It will help end your battle. Congrats on the new move it is always exciting to be moving somewhere new. Where are you moving from? I personally welcome you and hope you enjoy it! If you any more questions please let me know I will do everything in my power to help you out.
Thank you so much good luck with the move and I hope you have a wonderful day.
Thank you so much, Mellisa, for your thorough and in-depth post. Your post has opened my eyes to the world of ‘Deep Pocket Sheets’ a term I didn’t know before.
I enjoyed reading everything you described and explained. I have a standard mattress but recently I bought a mattress topper for extra comfort.
Just to crosscheck with you, do you think the Deep Pocket sheets are the right ones to buy?
Hi Femia. Thank you so much for coming by. Yes this a relatively newer term to me but I am learning so much along the way. I am glad you found it very enlightening as well. As far as your newly purchase of a mattress topper goes, deep pocket sheets could be what you need. Here are some ways to check first so you are not buying something you don’t need. 1st you will want to measure one corner of your mattresses thickness with the mattress topper on there include this into your measurements as well. Now if this measurement is more than 14 inches thick then yes you will need a deep pocket sheet. Simply because the standard ones only go up to 14 inches. Another way you can check is simply if you are trying to put a regular sheet on and you are finding the corner keep slipping up and it fells like you are stretching the sheet too far, then I would say yes you probably will need some deep pocket sheets as well. I hope this helps you out and if you have any other questions please feel free to ask away. I am always glad to help.
Thank you so much for coming by I hope you have a wonderful day.
Hi Helen. Thank you so much for stopping by to visit with me. I am very happy to hear you have found a post that can be useful to you. Personally I love waterbeds. I had one once and so wish I had it again. I have to say though I am glad I found sheets for it because as it seems waterbeds and sheets are now harder to find these days. Very glad to hear that you found everything and don’t have any questions. However, if you happen to come across one let me know I will be happy to help.
Thank you again and have a wonderful day Helen. | 2024-02-09T01:27:15.642919 | https://example.com/article/6774 |
Tom Collomosse: Gap to the top four has grown wider as Tottenham chase Champions League dream
Tough task: Mauricio Pochettino could struggle to compete with the biggest clubs GETTY
This is the season where Tottenham risk taking one step forward only to stumble two paces back.
The new head coach, Mauricio Pochettino, should bring an exciting style of play to banish memories of the drudgery served up by Andre Villas-Boas, as well as introducing the tactical discipline that was lacking under Tim Sherwood.
Hugo Lloris and Jan Vertonghen have pledged their futures to the club, Christian Eriksen looks certain to get better and better in his second season in English football while some of the signings who flopped last term, such as Erik Lamela and Roberto Soldado, ought to produce improved performances this time around.
Yet here is the crux: will any of that be enough to lift Spurs into the top four, which is the aim of chairman Daniel Levy at the start of every season? Spurs might be in better shape than they were last term, but their rivals look to have pulled even further away from them.
While there is real cause for optimism at White Hart Lane, qualifying for the Champions League looks a harder task than at any time since Harry Redknapp led them to fourth in the 2009-10 campaign.
The uncomfortable possibility for Spurs is that they could fulfil their potential but still finish no higher than sixth or seventh. Tottenham’s big problem last season was their inability to match the best sides in the land.
That gap has probably grown wider, and as talented as Pochettino clearly is, there are doubts about whether he is ready to go toe to toe with Jose Mourinho and Arsene Wenger, Manuel Pellegrini and Louis van Gaal.
Tottenham's summer signings
Tottenham's summer signings
1/3
Michel Vorm: Goalkeeper
The Dutch international has been brought in to add further cover to No1 Hugo Lloris.
With 43-year-old Brad Friedel Tottenham's backup keeper last season, Vorm is a much-needed younger understudy to the France captain.
WEST BROMWICH, ENGLAND - SEPTEMBER 01: Michel Vorm of Swansea gestures during the Barclays Premier League match between West Bromwich Albion and Swansea City at The Hawthorns on September 01, 2013 in West Bromwich, England. (Photo by Julian Finney/Getty I
2/3
Ben Davies: Left Back
He may lack the wow factor of Tottenham's signings from last summer, but in Ben Davies, Spurs finally have a top-drawer left back on their books.
Almost third of the price Manchester United paid for Luke Shaw, Davies was equally as impressive for Swansea as the former Southampton star.
At just 21-years of age, it's an astute piece of business by Mauricio Pochettino.
Getty
3/3
Eric Dier: Centre Back
The England Under-21 international was brought in from Sporting, and like Vlad Chiriches, should be regarded as one for the future at White Hart Lane.
Uncertainty surrounds senior defenders Michael Dawson and Younes Kaboul could see Dier feature more prominently that expected next season, but the man dubbed the 'new John Terry' is more likely to feature in the Europa League, where his experience of European football could prove invaluable as he looks to impress his new boss.
Getty
Before taking the Spurs job, Pochettino’s only experience of top-level management in Europe was with Espanyol and Southampton. Will he be ready for the battles with the best?
More to the point, will his team be ready for the start of the season? Pochettino is still looking for someone to anchor his midfield – Morgan Schneiderlin, of Southampton, is the preferred choice, but Pochettino’s former club have so far refused to let him leave.
In the full-back positions, Kyle Walker is still working his way back to peak fitness and his deputy, Kyle Naughton, is unconvincing. Ben Davies has been signed from Swansea in the summer and will need to hit the ground running at left-back, where Danny Rose is the alternative.
Spurs could still do with a reliable central defensive partner for Jan Vertonghen. Michael Dawson is too slow, Younes Kaboul too injury-prone and Eric Dier too inexperienced after joining from Sporting Lisbon.
Spurs have a new 56,000 stadium on the way. Paying for it would be considerably easier if they could achieve Champions League football. Failure to do so would see Vertonghen, Lloris and Christian Eriksen consider their futures – and so the cycle begins again.
Pochettino might wonder what he could have done with the Gareth Bale money. He might wish he had been in charge a year earlier. But ahead of the toughest test of his short managerial career, the man born in Murphy cannot afford to be bitter. | 2024-03-05T01:27:15.642919 | https://example.com/article/5865 |
Q:
If the 'Accessibility Identifier' is intended for UI Automation tests, why is it included in localizable resources?
It appears that the Accessibility Identifier property has been added to allow UI automation tests to have a more stable ID. It's recommended to be used instead of the Accessibility Label as the label is used by Screen Readers and VoiceOver.
This makes sense, however:
Why is the Accessibility Identifier included as a translatable
string resource when using the Export for localization feature in
Xcode? This makes multi-language testing more difficult because it encourages a different ID in each language.
Why is the Accessibility Identifier associated with Accessibility at
all? Why not call it UI Automation ID? Does the Accessibility Identifier actually get presented to screen readers, VoiceOver, other?
A:
After filing a bug with Apple, I got this response:
This is definitely a bug we will fix, and you are correct that it isn’t presented to VoiceOver, or other screen readers
Update: Confirmed fixed in Xcode 8 GM
| 2024-03-19T01:27:15.642919 | https://example.com/article/5394 |
Myocardial fatty acid imaging identifies a group of hemodialysis patients at high risk for cardiac death after coronary revascularization.
We prospectively evaluated if impaired myocardial fatty acid metabolism is involved in cardiac death after revascularization by percutaneous coronary artery intervention in dialysis patients. A cohort of hemodialysis patients was assessed by dual single-photon emission computed tomography using the radioiodinated fatty acid analogue BMIPP and radiolabeled thallium chloride. Tomography was done within one month before the first coronary intervention and at the last follow-up angiography at which neither restenosis nor de novo lesions were detected. Radiolabel uptake on tomography images was graded in segments and calculated as summed BMIPP or thallium scores. Among the 90 hemodialysis patients in the study, 19 died of cardiac events. Multivariate Cox hazard analysis found a significant association of cardiac death with the BMIPP summed scores at the last follow-up angiography. Kaplan-Meier analysis showed the cardiac death-free survival rates at 3 years of follow-up were significantly higher in patients with lower BMIPP summed scores. These results suggest that myocardial fatty acid imaging may be a useful test to identify high risk groups of cardiac death in hemodialysis patients. | 2024-06-26T01:27:15.642919 | https://example.com/article/4898 |
Attention has been increasingly paid to the role of T lymphocytes in tumor immune responses. The Adoptive immunotherapy based on T lymphocytes has a certain effect in some tumors, moreover, such immune therapy method can overcome the above defects of antibody treatment, however, the therapeutical effect in most tumors is still not satisfactory [Grupp S A, et al. Adoptive cellular therapy. Curr Top Microbiol Immunol., 2011; 344:149-72]. In recent years, based on the discovery that the identification of a target Cell by CTL is specifically dependent on a T lymphocyte receptor (T Cell receptor, TCR), the scFv of the antibody against tumor cell-related antigen is fused to intracellular signal activation motif such as T-lymphocyte receptor CD3ζ or FcεRIγ to form Chimeric antigen receptors (CAR), and can be genetically modified on the surface of T lymphocyte by means such as lentivirus infection. Such CAR T lymphocyte can selectively direct T lymphocyte to tumor cells and specifically kill tumor cells in a major histocompatibility complex (MHC)-independent manner. CAR T lymphocytes are new immune therapy strategy in the tumor immunotherapy field [Schmitz M, et al. Chimeric antigen receptor-engineered T cells for immunotherapy of Cancer. J Biomed Biotechnol, 2010, doi:10.1155/2010/956304].
Chimeric antigen receptor comprises an extracellular binding domain, a transmembrane region and an intracellular signaling domain. Generally, the extracellular domain comprises an scFv that is capable of recognizing a tumor-associated antigen, the transmembrane region employs the transmembrane region from molecules such as CD8, CD28 and the likes, and the intracellular signaling domain employs an immunoreceptor tyrosine-based activation motif (ITAM) CD3ζ or FcεRIγ and the intracellular signaling domain of co-stimulatory signaling molecule such as CD28, CD27, CD137, CD134 and the likes.
In the first generation CAR T lymphocyte, the intracellular signaling domain comprises ITAM only, and parts of the chimeric antigen receptor are connected in the form of scFv-TM-ITAM. Such CAR T can induce cellular cytotoxic effect against tumor, but the level of cytokines secreted is relatively low, and no sustaining anti-tumor effect could be induced in the body (Zhang T. et al., Chimeric NKG2D-modified T cells inhibit systemic T-cell lymphoma growth in a manner involving multiple cytokines and cytotoxic pathways, Can Res 2007, 67 (22): 11029-11036).
In the second generation CAR T lymphocyte that developed afterwards, an intracellular signaling domain of CD28 or CD 137 (also known as 4-1BB) is further included, and parts of the chimeric antigen receptor are connected in the form of scFv-TM-CD28-ITAM or scFv-TM-/CD137-ITAM. Co-stimulatory effect of B7/CD28 or 4-1BBL/CD137 in the intracellular signaling domain induces sustained proliferation of T lymphocytes, and is capable of increasing the level of cytokines such as IL-2, IFN-γ and others secreted by T lymphocytes, as well as improving the in vivo survival period and the anti-tumor effect of the CAR T (Dotti G. et al., CD28 costimulation improves expansion and persistence of chimeric antigen receptor modified T cells in lymphoma patients. J Clin Invest, 2011, 121 (5):1822-1826).
In the third generation CAR T lymphocyte that developed in recent years, parts of the chimeric antigen receptor are connected in the form of scFv-TM-CD28-CD137-ITAM or scFv-TM-CD28-CD134-ITAM, the in vivo survival and the anti-tumor effect of the CART is further improved (Carpenito C, et al., Control of large established tumor xenografts with genetically retargeted human T cells containing CD28 and CD 137 domains, PNAS, 2009, 106(9): 3360-3365).
Besides the attractive prospect of CAR T lymphocyte in tumor immunotherapy, its relatively high risk shall be taken into account. For instance, certain normal tissue(s) may exhibit low expression of specific antigen to be recognized by the CAR, this may results in damage by CAR T lymphocytes to such normal tissues. For example, treatment against carbonic anhydrase IX (CAIX), the antigen expressed in tumor cells of patients having renal cell carcinoma, is the first reported case of clinical application of adoptive therapy with CAR T lymphocytes, which is also the first case reporting on-target off-tumor effect of CAR T lymphocytes. After multiple administrations of CAR T lymphocytes, patients developed liver toxicity of grades 2-4. Upon analysis, the cause is believed to be the CAIX expression in a low level on bile duct epithelial cells, this clinical trial was discontinued while assessment about therapeutic outcomes in patients are excluded (Stoter G. et al., Treatment of metastatic renal cell carcinoma with autologous T-lymphocytes genetically retargeted against carbonic anhydrase IX: first clinical experience, J clin oncol, 2006, 24 (13): e20-e22; Ngo M C, et al., Ex vivo gene transfer for improved adoptive immunotherapy of cancer Human Molecular Genetics, 2011, R1_R7). Furthermore, the excessive co-stimulation signal in CAR may reduce the threshold required for activating effector cells, such that genetically modified T lymphocyte may be activated at conditions of rather low level of antigen or at the absence of antigen pulse, and resulting in the release of large amount of cytokines which may induce so-called “cytokine storm”. This signal leakage will cause off-target cytotoxicity, resulting in non-specific tissue damage. For example, sudden death of a patient caused by such “cytokine storm” induced by low Her2 expression in normal lung tissue was observed during a clinical treatment using a third-generation CAR T cells targeting Her2 for patients having advanced colorectal cancer with liver and lung metastasis (Morgan R A, et al., Report of a serious adverse event following the administration of T cells transduced with a chimeric antigen receptor recognizing Erbb2 Molecular Therapy, 2010, 18 (4): 843-851).
When CAR T is designed, selection of the antigen gene target is crucial. Because of the complexity of in-vivo gene expression and various uncontrollable factors, it is extremely difficult to select a suitable gene for CAR T. Furthermore, for many tumor-specific antigens, it is very difficult to find specific molecule directing at it and suitable to construct CAR-modified immune effector cell. After the CAR T is established, it is often unable to obtain an active extracellular binding region, which is also a difficulty for developing CAR T technology. | 2023-11-08T01:27:15.642919 | https://example.com/article/9930 |
Symplur is a healthcare social media analytics company that promotes deeper understanding of healthcare by strengthening the voices of those who need to be heard with insights from the Healthcare Social Graph®
Symplur Signals for Academic Research
Symplur Signals provides researchers with a simple research interface, rich datasets, powerful filtering, and algorithms with natural language processing capabilities optimized for our context of healthcare. Get access to up to 7 years of history from this trusted academic research platform.
Healthcare Social Media Research
Altmetric
The Altmetric Attention Score is based on the attention a research article gets on the internet. Each coloured thread in the circle represents a different type of online attention and the number in the centre is the Altmetric Attention Score. The score is calculated based on two main sources of online attention: social media and mainstream news media.
The Social Media Analytics Platform for Healthcare
Symplur Signals performs tasks and answers questions no generic tool can because it combines the best of both worlds. Hand curation and crowdsourcing ensure unparalleled healthcare subject matter expertise; machine learning and algorithms provide endless scalability. | 2023-10-06T01:27:15.642919 | https://example.com/article/9245 |
Q:
How to call a method from another class that uses an interface with a parameter
I am trying to call a method (BeginCommand) from another class. The method is using an interface(IAudioRecorder) and has a parameter (recorder). My class is RecorderViewModel.
public void BeginCommand(IAudioRecorder recorder)
{
beginRecordingCommand = new RelayCommand(BeginRecording, () => recorder.RecordingState == RecordingState.Stopped || recorder.RecordingState == RecordingState.Monitoring);
}
Over in my other class here is how I'm trying to call it:
var audiorecorder = new AudioRecorder();
var recordviewmodel = new RecorderViewModel(audiorecorder);
recordviewmodel.BeginCommand();
If I remove the interface and parameter (IAudioRecorder recorder) from the BeginCommand method it will work, but how do I call it with the interface/parameter. It's telling me there is no argument given that corresponds to the required parameter... I'm not sure what parameters to use.
A:
Its hard to tell (with your description) whats going on here , however my spidey senses tells me you may just be able to do the following
recordviewmodel.BeginCommand(audiorecorder);
Assuming audiorecorder implements the IAudioRecorder Interface
| 2024-05-08T01:27:15.642919 | https://example.com/article/9484 |
Labour vigilant in Milton
After a number of incidents in Milton ward over the last year, local Labour campaigners are re-assuring Milton’s residents, and those who work in and visit the ward, that they are working with Police to ensure that these isolated events remain isolated.
Gray Sergeant, Labour’s candidate for Milton at the 2015 elections, said, “I am looking forward to speaking with residents, and to listening and responding to their concerns around crime. Together we can build a safer community.”
Cheryl Nevin, Labour councillor for Milton, added, “Councillors have been in dialogue with local police discussing measures to improve visibility around Park Lane following discussions at the Local Community Meetings.”
Julian Ware-Lane, Labour councillor for Milton, said “Recent incidents are not representative of Milton. This is generally a safe ward and very pleasant part of Southend-on-Sea. However, Government cuts to policing make re-assuring the public more difficult. I am committed to ensuring that residents’ concerns are listened to and addressed.” | 2023-11-17T01:27:15.642919 | https://example.com/article/3365 |
Liberals used to love to quote the (apparently apocryphal) line from a Sinclair Lewis character “When fascism comes to America it will be wrapped in the flag and waving a cross.”
Wonder if they’re reflecting on that this week?
We knew that early in the first term, the White House attempted to exclude a news agency from pool reports. Now come revelations that the Justice Department engaged in sweeping eavesdropping on AP journalists; that the IRS targeted conservative private citizens while favoring liberal ones; that the EPA charged fees to conservatives groups while waiving them for “green” activists; that the Justice Department retaliated against a whistleblower in the Fast and Furious investigation; that the Department of State demoted and attempted to silence a senior diplomat who told the truth about Benghazi, and today, that the Department of Justice went to an administrative judge to label Fox News reporter James Rosen a “co-conspirator” for attempting to report on what was happening in North Korea. They tracked his movements and read his private emails.
It’s time, ladies and gentlemen of the press, for a rethink.
The affidavit the FBI prepared said that Rosen “asked, solicited and encouraged Mr. Kim (the State Department employee) to disclose sensitive internal United States documents and intelligence information. The reporter did so by employing flattery and playing to Mr. Kim’s vanity and ego.” Imagine. That is a flagrant assault on the First Amendment.
If this is not sufficient to give liberal members of the press second thoughts about their pin-up in the White House, there is truly no hope at all for them. They will have proved themselves utterly corrupt. And we will have learned that when fascism comes to America, it will wear a broad smile and call itself “progressive.” | 2024-01-11T01:27:15.642919 | https://example.com/article/9537 |
Q:
How to collapse an NSSplitView pane with animation while using Auto Layout?
I've tried everything I can think of, including all the suggestions I've found here on SO and on other mailing lists, but I cannot figure out how to programmatically collapse an NSSplitView pane with an animation while Auto Layout is on.
Here's what I have right now (written in Swift for fun), but it falls down in multiple ways:
@IBAction func toggleSourceList(sender: AnyObject?) {
let isOpen = !splitView.isSubviewCollapsed(sourceList.view.superview!)
let position = (isOpen ? 0 : self.lastWidth)
if isOpen {
self.lastWidth = sourceList.view.frame.size.width
}
NSAnimationContext.runAnimationGroup({ context in
context.allowsImplicitAnimation = true
context.timingFunction = CAMediaTimingFunction(name: kCAMediaTimingFunctionEaseIn)
context.duration = self.duration
self.splitView.setPosition(position, ofDividerAtIndex: 0)
}, completionHandler: { () -> Void in
})
}
The desired behavior and appearance is that of Mail.app, which animates really nicely.
I have a full example app available at https://github.com/mdiep/NSSplitViewTest.
A:
Objective-C:
[[splitViewItem animator] setCollapse:YES]
Swift:
splitViewItem.animator().collapsed = true
From Apple’s help:
Whether or not the child ViewController corresponding to the
SplitViewItem is collapsed in the SplitViewController. The default is
NO. This can be set with the animator proxy to animate the collapse or
uncollapse. The exact animation used can be customized by setting it
in the -animations dictionary with a key of "collapsed". If this is
set to YES before it is added to the SplitViewController, it will be
initially collapsed and the SplitViewController will not cause the
view to be loaded until it is uncollapsed. This is KVC/KVO compliant
and will be updated if the value changes from user interaction.
| 2024-01-25T01:27:15.642919 | https://example.com/article/2606 |
God Doesn’t Want You to Worry
Since God is in control, there is really no reason to be anxious about anything. But, when we do feel anxious, it means that we’re out of our depth. We are worrying about things that are well into the future and out of our hands. When that warning light pops up on the dashboard of our souls, we must take the next step.
Give our worry to God in prayer. If we’re still worried about it after we’ve prayed, then give it over to God again and again and again. Wash, Rinse, Repeat.
God knows the resolution to every one of our problems. God knows what we’ll feel like when our current problem is resolved, so before the problem is even resolved, God gives us something that we don’t deserve. He gives us the peace that we will experience when everything is okay. But, He gives us the peace now, even though the resolution is still in process.
What are you worried about today? Stop and give the situation to God. Even if your prayer is “God, I don’t know what to do. Please take this over and help me.” He will help you.
Then, when you start worrying about it again (and you might), stop and pray again. If that warning light comes on again, stop and pray again.
I share a story in my stress management class about a woman who went to see a psychologist about worrying. The doctor prescribed a biblical remedy. He gave her a card with the word “STOP” on one side and Philippians 4:6-7 on the other side. He told her that every time she started to worry, she should get the card out and read it out loud.
The next week the patient was pleased to report that the first day she had to use the card 20 times, but by the end of the week she only had to use it twice a day.
What are you worried about right now? A worry is something you think about three times a day or more. What are those worries?
God doesn’t want you to worry. He’s got this one (and the next one). Place your worries into God’s hands, and He will give you His peace in return.
shares
Check Out the Hope for Mental Health Starter Kit!
Allen White
Over the last 25+ years as a pastor, Allen White has tried a lot of small group strategies. Some were absolute failures. Others were huge successes. After coaching hundreds of churches across the country, Allen would like to help you Take the Guesswork Out of Groups. He consults and speaks in the areas of small group strategy, staffing structure, volunteer mobilization, and spiritual formation. He blogs at AllenWhite.org and just released his new book, Exponential Groups.
Need Help
Call us: 1-800-723-3532
Pastor Rick's Ministry Toolbox
Power up their faith by staying strong in yours!
Rick Warren's free weekly Ministry Toolbox email for pastors helps you with sermons prep, dealing with criticism and fatigue, and more. It's the power tool pastors like you need - delivered to your inbox. | 2023-12-20T01:27:15.642919 | https://example.com/article/2139 |
Hallucinations and REM sleep behaviour disorder in Parkinson's disease: dream imagery intrusions and other hypotheses.
REM sleep behaviour disorder (RBD) is a REM sleep-related parasomnia which may be considered a "dissociated state of wakefulness and sleep", given that conflicting elements of REM sleep (dreaming) and of wakefulness (sustained muscle tone and movements) coexist during the episodes, leading to motor and behavioural manifestations reminiscent of an enacted dream. RBD has been reported in association with α-synucleinopathies: around a third of patients with Parkinson's disease (PD) have full-blown RBD. Recent data indicate that PD patients with RBD are more prone to hallucinations than PD patients without this parasomnia. However it is still not clear why RBD in PD is associated with an increased prevalence of VHs. Data exist which suggest that visual hallucinations in PD may be the result of untimely intrusions of REM visual imagery into wakefulness. RBD, which is characterised by a REM sleep dissociation pattern, might be a condition that particularly favours such intrusions. However, other hypotheses may be advanced. In fact, deficits in attentional, executive, visuoperceptual and visuospatial abilities have been documented in RBD and found to occur far more frequently in PD with RBD than in PD without RBD. Neuropsychological deficits involving visual perception and attentional processes are thought to play an important role in the pathophysiology of VHs. On this basis, RBD in PD could be viewed as a contributory risk factor for VHs. | 2023-09-20T01:27:15.642919 | https://example.com/article/8732 |
Q:
How to get the length of an jagged array in python
I am trying to get the total no of items in my list which is updated from a SQLAlchemy command, it is a jagged array something like this..
list = [['linux'], ['ML'], ['linux', 'ML', 'Data Science', 'GIT'],['linux', 'Data Science', 'GIT'], ['GIT'], ['ML', 'GIT'], ['linux'], ['linux'], ['linux'], ['Data Science']]
length = len(list)
I get the output as: 10
How do I get the length as: 16 ? that is total no of items in the list ?
A:
Using sum and a generator expression:
lst = [['linux'], ['ML'], ['linux', 'ML', 'Data Science', 'GIT'],['linux', 'Data Science', 'GIT'], ['GIT'], ['ML', 'GIT'], ['linux'], ['linux'], ['linux'], ['Data Science']]
num_items = sum(len(l) for l in lst)
print(num_items)
A:
Don't use list, there's a builtin with that name already. I'll assume you meant "lst".
If your lists are small, use
>>> len(sum(lst, []))
16
Not recommended for large lists because list concatenation with sum is quadratic in time. However, this is really concise, so reconsider for small inputs.
If your lists are large (or have many elements), use
>>> sum(len(l) for l in lst)
16
| 2023-08-23T01:27:15.642919 | https://example.com/article/7077 |
--! qt:dataset:src
SET hive.insert.into.multilevel.dirs=true;
SET hive.output.file.extension=.txt;
INSERT OVERWRITE DIRECTORY 'target/data/x/y/z/' SELECT src.* FROM src;
dfs -cat ${system:build.dir}/data/x/y/z/*.txt;
dfs -rmr ${system:build.dir}/data/x;
| 2024-04-24T01:27:15.642919 | https://example.com/article/1960 |
Background {#Sec1}
==========
Although surface water is an important natural resource used for many purposes, especially drinking, this resource generally contain natural organic matters (NOMs) so many scientific references have pointed out that more than 1500 different organic compounds are suspected to be present in drinking waters \[[@CR1],[@CR2]\]. Naturally organic materials, a nonhomogeneous mixture of complex organic compounds, including; humic acids (HA), lipids, proteins, hydrophilic acids, carboxylic acids, amino acids, polysaccharides, and hydrocarbons are invariably present in surface and ground water resources, in dissolved or colloidal forms \[[@CR3]\]. Various environmental and health problems have been reported that may be related to the presence of NOMs in natural waters, including; (a) the potential of NOMs have to cause undesirable color and taste \[[@CR4]\]; (b) NOMs contributing the reactions with heavy metals and biocides to yield high concentrations of these substances and enhance their transportation in water \[[@CR5]\]; (c) NOMs role in increasing coagulant and disinfectant dose requirements that lead to more sludge amounts; (d) in treatment plants, NOMs react with chlorine to form harmful organic compounds \[[@CR4]\]; (e) NOMs are important factors in fouling which affect various applications of membrane processes \[[@CR6]\]; and (f) their tendency to compete with low-molecular weight synthetic organic chemicals and inorganic pollutants, reducing their adsorption rates and equilibrium capacities \[[@CR7],[@CR8]\].
Considering harmful effects of NOMs on human health, these compounds should be eliminated from water before the chlorination process in drinking water treatment plants and it is important for the public health and drinking water industry to find reliable methods to remove a wide range of organic contaminants from water \[[@CR9]\]. During the recent years, a large number of researches have been carried out on the NOMs removal from water in order to minimize its impacts on water quality \[[@CR3],[@CR10]-[@CR14]\]. Based on these researches, the most conventional options for NOM removal include membrane filtration and ion exchange \[[@CR15],[@CR16]\], ozonation \[[@CR17]\], biodegradation \[[@CR18]\], ultrasound waves \[[@CR19]\], adsorption, and coagulation \[[@CR20]\]. Among the methods, membrane separation and adsorption were the most effective and available processes for removing NOMs from water \[[@CR3]\]. High removal efficiency and no harmful by-products production are the main advantages for adsorption process and many kinds of adsorbents have been developed for the removal of humic acid from water.
During the past few years, nanoparticles have been proposed as a removal method for a wide range of pollutants from waters \[[@CR21]\]. Some important nanoparticles in water treatment include metal-containing nanoparticles, carbonaceous nanomaterials, zeolites, and dendrimers \[[@CR22]\]. As nanoscale zero-valent iron (NZVI) particles have unique reactive and sorption characteristics, they have received high attention for the treatment of contaminated waters \[[@CR23],[@CR24]\].
Several studies have been conducted using various materials such as mesoporous silica beads \[[@CR25]\], carbon and titanium dioxide \[[@CR26]\], chitosan beads \[[@CR27]\], ceramic membranes \[[@CR12]\], kaolin \[[@CR28]\], and betonite \[[@CR13]\] as a bases for nanoparticles. In southern coasts of Iran, there is a considerable amount of oyster shells which may have the potential to be used for a perfect bases for nanoadsorbents, and so far no study and information are achieved on the use of the shell as adsorbent. Considering the possibility of successful production of air-stable ZVI nanoparticles with a high gravimetric ratio, good stability and no harmful matters, that in this research, it was studied as a bases for NZVI.
This study focused on the oyster shell supported NZVI application for the removal of NOMs under different experimental conditions, in order to remove taste and odor-causing agents from surface water resources.
Methods {#Sec2}
=======
Stock solutions {#Sec3}
---------------
In this study, HA was used as NOMs representative and stock solution of HA was prepared using 1 g of HA powder dissolved in 1 L of deionized water, followed by filtering the solution through a 0.45 μ membrane filter (cellulose acetate). The solution was further diluted to the required concentrations and were stored at 4°C before application.
Preparation of nano-supported shell {#Sec4}
-----------------------------------
The formation of the oyster shell supported iron nanoadsorbent was carried out by wet impregnation technique \[[@CR26]-[@CR29]\]. Shells collected from the coast of the Persian Gulf were transported to research lab and after physically cleaning (removal of mud, rinsing for 10 min and washing by deionized water), were crushed, dried in 100°C oven and then sieved with a mesh of 100. To prepare the NZVI coated shell, the shell beads were placed in the reactor during the synthesis of NZVI, by using the reduction of dissolved iron method, which comprised of four stages; mixing, separating, washing and drying \[[@CR30],[@CR31]\].
Initially, 5 g of crushed shell beads were poured in a flask containing 0.1 M FeCl3-6H2O dissolved in absolute ethanol and heated up to 80°C until the solvent was evaporated and dry coated beads were obtained. The beads were dispersed in 150 mL flask containing absolute ethanol and then the flask was placed on an orbital shaker. One hundred mL of 0.16 M NaBH4 aqueous solution was poured into a burette and dropped into stirring flask. During this reaction, ferric iron (Fe^3+^) was reduced to zero-valent iron (Fe^0^) by borohydride and the crushed shell beads started to take black color. This suggested that the ferrous ions attached to the support material were successfully reduced to zero-valent state, according to the following reaction:$$\documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}$$ {\mathrm{Fe}}^{2+}+{{2\mathrm{B}\mathrm{H}}_4}^{-}+6{\mathrm{H}}_2\mathrm{O}\to {\mathrm{Fe}}^0+2\mathrm{B}{\left(\mathrm{O}\mathrm{H}\right)}_3+{{7\mathrm{H}}_2}^{\uparrow } $$\end{document}$$
Afterwards, the contents of the flask were discharged to a funnel containing a millipore filter, under the suction force, leading to dewatering. The shell beads coated with NZVI were washed by ethanol, and then dried at 50°C and then kept in desiccators.
Characterization of nanoadsorbent {#Sec5}
---------------------------------
Laboratory synthesized nanoadsorbent was analyzed using Scanning Electron Microscopy (SEM) of TESCAN, Energy Dispersive Spectroscopy (EDS) and X-Ray Fluorescence (XRF). The specific surface area of nanoadsorbent was analyzed using BET-N~2~ adsorption method.
Batch reactor adsorption system and experiments {#Sec6}
-----------------------------------------------
Adsorption of HA onto produced adsorbent was carried out by a batch reactor and effect of different parameters such as initial HA concentration, adsorbent dose, pH, and temperature were studied.
Adsorption isotherm {#Sec7}
-------------------
Different doses of nanoadsorbent (0.5gr, 1gr, 3gr and 5gr) were added to the reaction flask containing 100 mL of 5 mg/L HA solution with the initial pH of 7 and temperature of 25°C. The containers were sampled: firstly at intervals of 5 and 10 min and then at a frequency of every 15 min to reach equilibrium time. After shaking and settling for 5 min, the samples supernatant were centrifuged followed by membrane filter (0.45 μm, cellulose acetate), absorbance values of solutions remaining without adsorption were measured by using UV--Vis spectrophotometer at wavelength of 254 nm. In the next step, adsorption equilibrium data were correlated with two well-known empirical isotherm models; Freundlich and Langmuir.
The kinetic of HA adsorption {#Sec8}
----------------------------
After determining the adsorption isotherm, using collected data and models related to the absorption kinetics, modeling kinetic of HA adsorption study on the nanoadsorbent was determined.
The effect of initial HA concentration {#Sec9}
--------------------------------------
The effect of initial HA concentration on the adsorption rate was studied by contacting 0.5 g of adsorbent at room temperature of 25°C and pH = 7 using four initial concentrations of HA solution (0.5, 2, 5 and 10 mg/L) in 100 mL of samples at time = 0 and at selected time intervals (up to a maximum of 180 min), sample concentration was determined by UV--Vis spectrophotometer.
The effect of pH {#Sec10}
----------------
In order to survey the pH effect on HA adsorption, pH of the solution was changed in the range of 5.0 and 10.0 at four intervals (5, 7, 8 and 10) using either 0.1 mol/L NaOH or 0.1 mol/L HCl. pH values were determined using a Elmetron CP-501 pH meter, fitted with a combined glass-reference electrode.
The effect of temperature {#Sec11}
-------------------------
In order to assess the effect of temperature on the equilibrium adsorption capacity of HA, 0.5gr of the nanoadsorbent was used at different temperatures (25, 30 and 40°C), with 5 mg/L HA solutions, optimum pH = 5 and in equilibrium contact time.
Results and discussion {#Sec12}
======================
Characterization of nanoadsorbent {#Sec13}
---------------------------------
SEM image of the nanoadsorbent is shown in Figure [1](#Fig1){ref-type="fig"}, the physical properties of the nanoadsorbent are presented in Table [1](#Tab1){ref-type="table"}, the chemical elements and composition of nanoadsorbent are presented in Tables [2](#Tab2){ref-type="table"} and [3](#Tab3){ref-type="table"}, respectively.Figure 1**SEM (A) and EDS (B) of prepared nanoadsorbent.** SEM **(A)** showing the Nanoscale particles and EDS **(B)** of prepared nanoadsorbent showing the main elements of adsorbent.Table 1**Physical properties of the nanoadsorbentParameterUnitValue**Densityg/cm^3^1.82Particle sizenm60-83Micropore volumem^3^/g0.012BET surface area(m^2^/g)16.85Solubility @ (20°C)%InsolubleTable 2**Chemical composition of the nanoadsorbentElementWeight %Atomic %ElementWeight %Atomic %O**43.0463.68**Si**4.12.23**Na**4.064.26**Sr**1.251.17**Cl**4.613.13**Al**2.31.64**Ca**17.110.28**Mg**0.780.43**Fe**9.464.08**S**1.51.95**Au**0.310.04**K**1.181.15**C**10.315.97**Total**100100Table 3**Chemical composition of the nanoadsorbentComposition% WeightComposition% WeightComposition% WeightComposition% Weight**SiO21.21Al2O30.37MgO0.71Na2O1.01CaO21.09K2O0.65Cl0.07SO30.19FeOOH4.01CaCO363.38SrO0.81Fe2O35.51
As shown in the Figure [1](#Fig1){ref-type="fig"}, most of the sheet structure has been changed to irregular small particles and depicts the synthesized nanoadsorbent with an approximately 60--85 nm diameter. The main elements of the adsorbent were Ca, O, Fe and Na and as it can be found from Table [3](#Tab3){ref-type="table"}, the highest component of the adsorbents was lime (CaCO~3~ and CaO), whit about 94.25% of the total weight.
The effect of the adsorbent dose {#Sec14}
--------------------------------
The effect of the initial HA concentration on its adsorption is shown in Figure [2](#Fig2){ref-type="fig"}. Although by increasing the nanoadsorbent dose of 0.5 to 10 mg/L, the removal of HA (C = 5 mg/L) was found to increase from 66.4% to 97.4%, the amount of removed HA (mg) per mass of nanoadsorbent showed a decrease in the rate from 0.66 mg/g to 0.09 mg/g. This is because of the fact that increasing adsorbent dosage increases the surface area for adsorption. However, very slow increase in the removal was observed beyond the dose of 3 g/L. This section of our results was in accordance with a study of Doulia etal who studied the adsorption of humic acid on acid-activated Greek bentonite \[[@CR13]\].Figure 2**The effect of the adsorbent dose @ (HA = 5 mg/L, Temp = 25** **°C and pH = 7).**
The data of adsorption equilibrium for HA adsorption by nanoadsorbent are presented in Figures [2](#Fig2){ref-type="fig"} and [3](#Fig3){ref-type="fig"}. As it can be seen, Freundlich isotherm had a better correlation with HA removal with R^2^ higher than Langmuir. The r-shaped adsorption isotherm indicated that there is a high affinity of contact time with adsorption rate.Figure 3**Freundlich and Langmuir adsorption isotherms.**
Kinetic of HA adsorption {#Sec15}
------------------------
Adsorption kinetics of HA as pseudo-first order and pseudo-second order are depicted in Figure [4](#Fig4){ref-type="fig"}.Figure 4**Adsorption kinetics; pseudo-first order and pseudo-second order (nanoadsorbent dose = 3 g/100 mL, C0 = 5 mg/l, Temp = 25** **°** **C and pH = 7).**
Based on results of Figure [4](#Fig4){ref-type="fig"}, the pseudo second order model generates better fit to the experimental data of the investigated adsorption of HA on nanoadsorbent (R^2^ = 0.997). The degree of the reaction is determined by sharing or exchange of electrons between adsorbent positive (nzvi) and negative groups (HA).
The effect of initial HA concentration {#Sec16}
--------------------------------------
The effect of initial HA concentration is depicted in Figure [5](#Fig5){ref-type="fig"}. It can be observed that the removal rate of HA decreased from 0.64 to 0.84, by increasing the initial HA concentration from 0.5 to 10 mg/L. The equilibration time for the adsorption of HA at different concentrations ranged between 90 and 120 min for 0.5 an10 mg/L of HA, respectively.Figure 5**The effect of initial HA concentration and contact time on HA removal by nanoadsorbent @ (nanoadsorbent dose: 0.5 g/100 mL, Temp = 25** **°C and pH = 7).**
As can be seen from Figure [5](#Fig5){ref-type="fig"} when an increase occurs in the initial concentrations, the adsorption capacity of HA would enhance. Driving force is one of the most important factors in the adsorption process so the adsorption capacity of HA is a function of HA initial concentration, as it is important to overcome the mass transfer resistance of the HA between the adsorbate and the adsorbent. In other words, the increase in the mass driving force allows more HA molecules to pass from the solution to the adsorbent surface. Therefore there is an inverse relationship between initial concentration and adsorption capacity \[[@CR32]\]. This finding were in accordance with Moussavi et al \[[@CR3]\] who investigated adsorption characteristics of HA onto single-walled carbon nanotubes and reported that the amount of adsorbed HA was higher at lower initial concentrations of HA.
The effect of pH {#Sec17}
----------------
The effect of the initial pH on adsorption rate is presented in Figure [6](#Fig6){ref-type="fig"}. As it can be seen, a maximum HA adsorption rate of 0.96 mg per gram of adsorbent was observed at pH = 5. This was followed by a decrease in adsorption capacity at the late stage of pH experiments ranging from 5 to 10. Also the minimum adsorption capacity was found to be 0.63 mg/g at initial pH = 10 after reaching the equilibrium time (120 min). Adsorption of HA to nanoadsorbent is strongly influenced by pH. As increasing the pH increases the ionization of HA and hence the concentration of the negatively charged ions which leads to decreasing the amount of H^+^ ions \[[@CR33]\].Figure 6**The effect of pH and contact time on HA removal by nanoadsorbent (HA = 5 mg/L, nanoadsorbent dose = 0.5 g/100 mL and Temp = 25**°**C).**
The effect of temperature {#Sec18}
-------------------------
The temperature effect on the HA adsorption on nanoadsorbent is shown in Figure [7](#Fig7){ref-type="fig"}, with HA concentration of 5 mg/L, the adsorption rate increased from76.8% to 91.4%, by increasing the temperature from 25°C to 40°C. As depicted in Figure [7](#Fig7){ref-type="fig"}, temperature increase led to further the HA adsorption, due to high interaction between HA and ZNVI-shell beads. The temperature increasing creates swelling effect in the internal structure of the adsorbent, causing further penetration HA into the adsorbent \[[@CR34]\]. In addition, temperature increase causes more diffusion rate of HA molecules in the external boundary layer and the internal pores of the adsorbent particles. Our finding was in accordance with Zeinali etal results on adsorption of dichloromethane using GAC \[[@CR35]\].Figure 7**The effect of temperature and contact time on HA removal by nanoadsorbent (HA = 5 mg/L, nanoadsorbent dose = 0.5 g/100 mL).**
Conclusions {#Sec19}
===========
The obtained results revealed that surface area and pore volume of nanoadsorbent were 16.85 (m^2^/g) and 0.021 m^3^/g, respectively; the main elements of the adsorbent were Ca, O, Fe and Na and most of the adsorbent component was composed of lime (CaCO~3~ and CaO about 94.25% of the total weight). The produced nanoadsorbent was not soluble in water. HA Adsorption onto the nanoadsorbent increased by increasing of adsorbent dose and temperature and decreased by increasing HA concentration and pH. The r-shaped adsorption isotherm indicated a high affinity of contact time with adsorption rate. In optimal conditions provided in the study (HA = 5 mg/L, nanoadsorbent dose = 0.5 g/100 mL, pH = 5 and temperature = 40°C), maximum HA removal efficiency reached to 94.6%, within 90-120 min at the experimental conditions in all cases is Pseudo-second order and Freundlich isotherm models were fitted to the adsorption kinetic and isotherm, respectively.
**Competing interests**
The authors declare that they have no competing interests.
**Authors' contributions**
VA conducted the practical parts of the study and wrote the first draft of the manuscript. AR had shared roles in nanoadsorbrnt characterization. SN, AHM, and RNN participated in data analysis and provided comments during the writing of the manuscript. All authors read and approved the final manuscript.
The authors are grateful to the Dr Elham Boushehri and Mrs. Afsoon Pirouzan, Hormozgan University of Medical Sciences, as well as all laboratory staffs of the Departments of Environmental Health Engineering in both Hormozgan University of Medical Sciences and Tehran University of Medical Sciences.
| 2024-06-22T01:27:15.642919 | https://example.com/article/1407 |
Q:
Design Patterns for Interfacing with Relational Databases?
Does anyone know of any design patterns for interfacing with relational databases? For instance, is it better to have SQL inline in your methods, or instantiate a SQL object where you pass data in and it builds the SQL statements? Do you have a static method to return the connection string and each method just gets that string and connects to the DB, performs its action, then disconnects as needed or do you have other structures that are in charge of connecting, executing, disconnecting, etc?
In otherwords, assuming the database already exists, what is the best way for OO applications to interact with it?
Thanks for any help.
A:
I recommend the book Patterns of Enterprise Application Architecture by Martin Fowler for a thorough review of the most common answers to these questions.
A:
There are a few patterns you can use:
Repository Pattern
Active Record Pattern
| 2023-10-06T01:27:15.642919 | https://example.com/article/6676 |
Cationic main-group metal chalcogenide with a 1-D polymeric structure, [{In(dien)}2(InTe4)].Cl.
Coordination of unsaturated [In(amine)] (3+) onto indium telluride structure, where the complex ion has higher positive charge, not only forms an organic-inorganic hybrid polymeric structure, but also offers an indium telluride with positive charge. Based on this strategy, cationic networks of metal chalcogenide may be expected. | 2023-08-31T01:27:15.642919 | https://example.com/article/8879 |
Q:
iOS app crashes when displaying SLComposeViewController
Okay, so I have a single view iOS app. Inside the view controller, I have a method attached to a button in the storyboard. Here is the method for when then button is pressed:
- (IBAction)tweetButton:(id)sender {
if ([SLComposeViewController isAvailableForServiceType:@"SLServiceTypeTwitter"]) {
SLComposeViewController *tweetSheet = [[SLComposeViewController alloc] init];
tweetSheet = [SLComposeViewController composeViewControllerForServiceType:@"SLServiceTypeTwitter"];
[tweetSheet setInitialText:@"This is a test."];
[self presentViewController:tweetSheet animated:YES completion:nil];
}
else {
NSLog(@"Twitter not configured.");
}
}
Whenever I press the button in the app, I get a crash with the following error:
2015-07-17 15:57:24.110 Now Playing[425:19583]
*** Terminating app due to uncaught exception 'NSInvalidArgumentException', reason: 'Application tried to present a nil modal view controller on target <ViewController: 0x157e4c620>.'
My code follows pretty much every example that I have seen online, so I'm not sure what's up.
A:
You mustn't hard type the service type even if it's taking a NSString, you must use one of the constant instead: SLServiceTypeTwitter, SLServiceTypeFacebook...
Also, composeViewControllerForServiceType: is already doing the alloc/init steps for you, so no need to allocate it before calling this method.
Code fixed:
- (IBAction)tweetButton:(id)sender {
if ([SLComposeViewController isAvailableForServiceType:SLServiceTypeTwitter]) {
SLComposeViewController *tweetSheet = [SLComposeViewController composeViewControllerForServiceType:SLServiceTypeTwitter];
[tweetSheet setInitialText:@"This is a test."];
[self presentViewController:tweetSheet animated:YES completion:nil];
}
else {
NSLog(@"Twitter not configured.");
}
}
| 2023-11-29T01:27:15.642919 | https://example.com/article/3103 |
Many astronauts are using social media to showcase images of the blue planet from outer space – including awe-inspiring photos featuring Michigan cities and its Great Lakes.
Monday morning, NASA astronaut Scott Kelly tweeted out a picture of Michigan and the area surrounding the Great Lakes at nighttime. Kelly calls the Great Lakes "unmistakeable," even from 250 miles up.
Kelly has been aboard the International Space Station for a record-breaking one-year period as part of a study to measure the impact a year in space can have on a person, USA Today reported.
Earlier this year, Kelly tweeted out two photos of Detroit: a photo of the city alongside the Detroit River in June and another of Ford Field in September.
Kelly isn't the only astronaut to showcase the mitten space from social media. In 2013, Canadian astronaut Chris Hadfield tweeted out two photos of Grand Rapids, one at night and one in the day. The daytime photo features twists and turns of the Grand River, to which Hadfield commented, "from orbit you can see why they call it Grand Rapids."
From orbit you can see why they called it Grand Rapids - Michigan USA. pic.twitter.com/gBgDpk1MSr — Chris Hadfield (@Cmdr_Hadfield) March 7, 2013
Grand Rapids, MI, with the lights on, as-seen from 300 miles up. pic.twitter.com/8PVoM3JR — Chris Hadfield (@Cmdr_Hadfield) February 18, 2013
American astronaut Karen Nyberg tweeted out a photo of Michigan and surrounding Great Lakes from aboard the International Space Station in 2013. The photo features four of the lakes: Erie, Ontario, Huron and Michigan.
The Great Lakes. August 23. pic.twitter.com/NrmGZJhHJJ — Karen L. Nyberg (@AstroKarenN) October 13, 2013
– Allana Akhtar, Michigan Radio Newsroom | 2023-11-02T01:27:15.642919 | https://example.com/article/6116 |
5 Romantic Valentine’s Day Movies for Men
5 Romantic Valentine’s Day Movies for Men
As Good As It Gets (1997)
It is about three person, who from a rather unlikely friendship – misanthropic romance author, gay artist and waitress/single mother. It is a charming, realistic and funny portrayal of different worlds colliding with one another. Men would like it, because Jack Nicholson prevents the film from becoming sappy. It’s a brilliant story of three people with their own journey. Women would like it because, it is about the discovery of a true happiness.
Eternal Sunshine of the Spotless Mind (2004)
It is about a couple who erase memories about one another and they need to start the re-discovery process. It’s a beautiful and surreal film, starred by Kate Winslet and Jim Carrey. It depicts a tumultuous love for one another. Men would like it because it has a thought-provoking and twisty take on love; making it an unlikely romantic film. Women would like it because it blends fantasy, drama and romance; as well as realistic and honest portrayal of a normal relationship. It’s all about the inevitability of the imperfections in life.
Pretty Woman (1990)
It’s a classic story that the younger generation can watch. Richard Gere plays as a wealthy businessman who needs an escort, so he can attend various social events. Men would like it because the film has funny, entertaining and funny plot; although slightly schmaltzy. Women would like it, because it feels like a modern Cinderella story that is entertaining, romantic and lighthearted.
Sideways (2004)
It is a heart-felt and emotional comedy about a couple two middle age men who embark through the wine country in California for the road trip. One of them is about to get married in a week, but they encounter a couple of attractive women. As a result, they need to examine their morality. The film gets 97 percent score on Rotten Tomatoes, so this should be an interesting film to watch. Men would like it because, it is about a journey of two buddies, who encounter women along the way; something that many men typically experience. Women would like it because the film strikes an unusual balance in portraying the angst, imperfections and emotional pain of the characters. It’s truly romantic, funny, edgy and comedic.
Wall-E (2008)
It’s Pixar’s unlikely romantic animated tale. It’s about a waste-collecting robot that continues to do its job, although human has abandoned the Earth due to extreme environmental damages. For men, it’s just an animated robot film, enough said. For women, it’s about a journey of a robot to find its first love. | 2024-02-25T01:27:15.642919 | https://example.com/article/3561 |
Chicago Cubs White Jon Lester Men's No.34 Home Jersey
More Views
Chicago Cubs White Jon Lester Men's No.34 Home Jersey
Availability:In stock
Prove you are the #1 Chicago Cubs fan with this Chicago Cubs White Jon Lester Men's No.34 Home Jersey! You can boast your team spirit while wearing this Chicago Cubs White Jon Lester Men's No.34 Home Jersey. It features printed Chicago Cubs graphics, showing the world who you cheer for. | 2023-10-13T01:27:15.642919 | https://example.com/article/1003 |
Jessica Alba chops off hair post pregnancy
Mar 11, 2018, 20:08 IST | IANS
Actress Jessica Alba has undergone post-pregnancy transformation by chopping off her long hair
Jessica Alba
Actress Jessica Alba has undergone post-pregnancy transformation by chopping off her long hair. Alba posted a video and a picture of her transformation on her Instagram page, reports femalefirst.co.uk.
She captioned the photograph: "This happened. Thanks Chad Wood hair for the awesome haircut. It feels sooo good to shed the pregnancy hair. Whaddaya think?"
Alba, who also has daughter Honour, nine, and Haven, six, with her husband Cash Warren, felt like she needed a new look after welcoming her third child, a son, reports femalefirst.co.uk.
She chopped the inches off her hair with the help of celebrity hair stylist Chad Wood, who also posted a video of the transformation to his social media page.
This story has been sourced from a third party syndicated feed, agencies. Except for the change in headline, the story has been provided "AS-IS," "AS AVAILABLE, without any verification or editing from our side. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever
This website uses cookie or similar technologies, to enhance your browsing experience and provide personalised recommendations. By continuing to use our website, you agree to our Privacy Policy and Cookie Policy. OK | 2023-12-29T01:27:15.642919 | https://example.com/article/5374 |
567 S.W.2d 871 (1978)
Richard L. GATES, Appellant,
v.
The CITY OF FORT WORTH and F. L. Priore, Appellees.
No. 17979.
Court of Civil Appeals of Texas, Fort Worth.
June 8, 1978.
Rehearing Denied June 29, 1978.
*872 Leeper & Priddy and Laurance L. Priddy, Fort Worth, for appellant.
S. G. Johndroe, Jr., City Atty., John Gray, Asst. City Atty., Fort Worth, for appellees.
OPINION
SPURLOCK, Justice.
This is a summary judgment case. Richard L. Gates (appellant) alleged that he received an on-the-job injury on December 16, 1975, while employed by the City of Fort Worth in the Sanitation Division. He received a worker's compensation settlement from the city. Gates received a release from his doctor for light duty work. The City of Fort Worth, acting through its personnel director, wrote two letters to Gates. By these letters, the City of Fort Worth informed Gates that until he received a full duty release from his doctor, the city could not "employ" him, since no light duty jobs were available. By his First Amended Original Petition and by his summary judgment proof, Gates contends that he was terminated because he had made a worker's compensation claim against the City of Fort Worth. Defendants, City of Fort Worth and F. L. Priore (the city's personnel director), moved for summary judgment. The trial court granted both defendants' motions for summary judgment. Gates has perfected his appeal.
We affirm.
By his first four points of error, Gates basically contends that the trial court erred in rendering summary judgment, because Tex.Rev.Civ.Stat.Ann. art 8307c[1] (quoted below) was available to him as a public employee.
Effective August 29, 1977, the Texas Legislature extended worker's compensation coverage to certain employees of political subdivisions through the enactment of art. 8309h.
Art. 8307c, effective August 30, 1971, provides:
Section 1. No person may discharge or in any other manner discriminate against any employee because the employee has in good faith filed a claim, hired a lawyer to represent him in a claim, instituted, or caused to be instituted, in good faith, any proceeding under the Texas Workmen's Compensation Act, or has testified or is about to testify in any such proceeding.
Sec. 2. A person who violates any provision of Section 1 of this Act shall be liable for reasonable damages suffered by an employee as a result of the violation, and an employee discharged in violation of the Act shall be entitled to be reinstated to his former position. The burden of proof shall be upon the employee.
Sec. 3. The district courts of the State of Texas shall have jurisdiction, for cause shown, to restrain violations of this Act. Acts 1971, 62nd Leg., p. 884, ch. 115, Aug. 30, 1971.
With the extension of worker's compensation protection to certain employees of political subdivisions, the Texas Legislature provided in art. 8309h the specific worker's compensation laws which they were adopting *873 as applicable to the covered public employee. Art. 8309h, § 3, which is captioned "[a]doption of general workmen's compensation laws," provides that:
Sec. 3. (a) The following laws as amended or as they may hereafter be amended are adopted except to the extent that they are inconsistent with this article:
(1) Sections 1, 3, 3a, 3b, 4, 5, 6, 7, 7a, 7b, 7c, 7d, 7e, 8, 8a, 8b, 9, 10, 11, 11a, 12, 12a, 12b, 12c, 12c-1, 12c-2, 12d, 12e, 12f, 12g, 12h, 12i, 13, 14, 15, 15a, 16, 17, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, and 29 of Article 8306, Revised Civil Statutes of Texas, 1925, as amended;
(2) Section1, Chapter 248, General Laws, Acts of the 42nd Legislature, Regular Session, 1931, as amended (Article 8306a, Vernon's Texas Civil Statutes);
(3) Sections 4a, 5, 5a, 6a, 7, 7a, 7b, 11, 12, 13, and 14 of Article 8307, Revised Civil Statutes of Texas, 1925, as amended;
(4) Article 8307b, Revised Civil Statutes of Texas, 1925, as added by Section 2, Chapter 261, Acts of the 45th Legislature, Regular Session, 1937;
(5) Sections 18 and 18a, Article 8308, Revised Civil Statutes of Texas, 1925, as amended;
(6) Sections 1, 1b, 4, and 5, Article 8309, Revised Civil Statutes of Texas, 1925, as amended; and
(7) Section 7, Chapter 178, Acts of the 53rd Legislature, Regular Session, 1953 (Article 8309a, Vernon's Texas Civil Statutes).
(b) Provided that whenever in the above adopted sections of Articles 8306, 8306a, 8307, 8307b, 8309 and 8309a of the Revised Civil Statutes of Texas, 1925, as amended the words "association," "subscriber," or "employer," or their equivalents appear in such articles, they shall be construed to and shall mean "a political subdivision."
We note that our Legislature did not include art. 8307c in the list of statutes made applicable to the public employees covered by art. 8309h. In essence, Gates asks that we extend the protection of art. 8307c to the public employee. This we decline to do, since we constitute an appellate court rather than the Legislature.
We hold that art. 8307c is not applicable to those public employees covered by art. 8309h. We overrule Gates' first four points of error.
By his fifth point of error, Gates contends that "[t]he trial court erred in sustaining both defendants' motions for summary judgment for the reason that the defense of governmental immunity should be held to be no longer available." Thus, Gates basically asks this court to overrule the doctrine of governmental immunity. We must hold that the doctrine of governmental immunity is still a viable doctrine in Texas jurisprudence. Barr v. Bernhard, 562 S.W.2d 844 (Tex.1978). We overrule Gates' fifth point of error.
The judgment of the trial court is affirmed.
NOTES
[1] All statutory references are to Tex.Rev.Civ.Stat.Ann. (Supp.1978).
| 2024-02-17T01:27:15.642919 | https://example.com/article/1595 |
Q:
Who was "speaking in David"?
My question pertains to Hebrews 4:7, which reads as follows:
He again fixes a certain day, “Today,” saying [in] David after so long a time just as has been said before,
“Today if you hear His voice,
Do not harden your hearts.”
The quote is from Psalm 95:7f so is "He" supposed to be understood as the Spirit? Verses 3-5 talk about God resting on the 7th day, so is "He" to be understood as God (the Father)? Going back farther we see Christ connected to the verse in 3:14-15. But 3:12-18 seems to suggest God may be the "He" in the subsequent verses. If we go back even farther the Spirit is the one who says this (3:7-11), though it is surprising to think the "Me" of the Psalm would be the Spirit... perhaps God (the Father) by the Spirit? Who is "He"?
Whichever answer you provide, please also address the opposing arguments (mentioned above) so I have some confidence that it's not just your personal opinion. Please support your answer with your assessment of the Greek syntax. Thanks!
A:
Walking through the first part of Hebrews
1:1 begins with "God spoke to our fathers by the prophets,"
1:2 declares now God "has spoken to us by his Son, whom he appointed the heir of all things,"
1:3-4 makes both a statement of Christ's nature and work that equates the Son with God, but also as the most exalted of creation as man (v.4)
1:5-14 then quotes a series of OT passages, many from the Psalms, showing why Christ is the greatest of creation.
2:1 warns the reader to pay heed to what is heard; i.e. heard from God, but specifically...
2:2 the law and judgment is "the message declared by angels," while
2:3a salvation "was declared at first by the Lord," and then
2:3b "by those who heard" the Lord, through whom also
2:4 "God also bore witness by signs and wonders and various miracles and by gifts of the Holy Spirit" in those "who heard" the Lord
2:5-18 Discuss mankind's elevation, through Christ's incarnation, work (especially for mankind's salvation), and exaltation.
3:1 asks the reader to consider Christ Jesus as "apostle and high priest" (i.e. His work)
3:2a refers back to "him [God] who appointed him [Christ]," referring back to 1:3 and 2:7-9, but also forward...
3:3b-6 as Christ is shown to be greater than Moses
3:7a explicitly attributes the following quotation of v.7b-11 to Psalm 95:7-11 as "the Holy Spirit says."
3:7b-11 In context the quotation is used to urge the reader to hear God's voice about Christ, using the illustration of what happened to those that did not heed His voice before (Ps 95:7-11 is reflecting back to the people spoken to by God through Moses, Ps 95:7a specifically notes "God" is "his voice" to be heeded in 95:7b).
3:12-14 warns against having the unbelief characterized in v.7b-11; to belong to the house of God through Moses, he needed to be heeded; to belong to the house of God through Christ, He needs to be heeded.
3:15 reiterates the Spirit's statement from Ps 95:11 quoted in 3:11 here.
3:16-19 continues to use Israel in the Exodus as an example of those who failed to believe, and thus failed to enter and find rest.
4:1-2 warns that one now reading can fail to enter into rest because of unbelief; one just needs to believe "the good news" that came to enter (4:3a).
4:3a The "he has said" begins some ambiguity, as it could be either the Spirit specifically (so 3:7, 11) or God generically (so Ps 95:7), given that this only quotes Ps 95:11, which is an explicit statement of God's about a yet prior statement.
4:3b The message is still those who believe enter the rest, even though the rest of God began long ago (v.3b)
4:4a "he has somewhere spoken," continues to carry the same ambiguity from 4:3a, as the quotation of 4:4b is to Gen 2:2 (or possibly Exo 20:11 or 31:17)
4:5 "he said" again ambiguous, still referencing the direct quote from God of Ps 95:11.
4:6 Some still need to enter rest by receiving the good news (i.e. believing)
4:7a So "today" has been appointed as the time for that to happen. It is "He" who appointed the day that is also "saying through David," and then references
4:7b the first part of the quote given in Hebrews 3:7b-8a (and 3:15), which is Ps 95:7b-8a, and is the writing of David to heed God's voice (Ps 95:7a), who David is speaking on behalf of through a first person reference in Ps 95:9-11 (as a "prophet," so Hebrews 1:1).
Conclusion
Hebrews 1:1 and 3:7, along with the context of Ps 95, seem to hold the key to answering the "He" of Hebrews 4:7.
It is God speaking through David as a prophet (so Heb 1:1; via writing of Ps 95:7-11) by the agency of the Holy Spirit speaking the message from God (so Heb 3:7) through David (so Heb 4:7).
But the quote given in Heb 4:7 is that part of the quote where David is still speaking as a person apart from God, to "hear his voice," before transitioning to the direct statements of God that follow in the first person. Yet Heb 3:7 attributes this first part as well to the Spirit speaking, and so it is directly the Spirit that speaks through David (in Heb 4:7).
But the Spirit is also who speaks through David for the first person references, and so it is God as Spirit (i.e. the Spirit is part of the Godhead) that is speaking the entirety of the Ps 95:7-11 reference, and the "me" references of the Psalm thus point back to the Godhead through association with the Spirit that is speaking through David. Thus, what appears to be ambiguity in 4:3-5 really is not, as the Spirit is as much God as not, and other Scripture shows that Scripture itself is a product of the Spirit.
In short, the combination of references of Heb 1:1, 3:7, 4:7 and Ps 95:7-11 appear to affirm both
The Spirit's inclusion as being God (just as 1:3-4 was including the Son as God), for He was speaking in Ps 95 in the me statements.
The Spirit's work of inspiration of the text of Psalm 95 through David.
| 2023-09-03T01:27:15.642919 | https://example.com/article/3460 |
The Las Vegas Metropolitan Police Department arrested Cadesha Bishop, 25, on May 3 after she pushed a 74-year-old man from a bus, consequently killing him.The encounter occurred on March 21 near 13th Street and Fremont Street, where the victim described to officers that a woman, who was cursing at other passengers, had pushed him as he was exiting the bus. | 2023-09-19T01:27:15.642919 | https://example.com/article/7958 |
484 S.W.2d 570 (1972)
EMPLOYERS CASUALTY COMPANY et al., Petitioners,
v.
GLENS FALLS INSURANCE COMPANY, Respondent.
No. B-2950.
Supreme Court of Texas.
July 19, 1972.
Rehearing Denied October 4, 1972.
*571 Graves, Dougherty, Gee, Hearon, Moody & Garwood, Thomas G. Gee and Ben F. Vaughan, III, Austin, Sewell, Junell & Riggs, Harman Parrott, Houston, for petitioners.
Vinson, Elkins, Searls & Smith, B. Jeff Crane, Jr. and Thomas B. Weatherly, Houston, for respondent.
DANIEL, Justice.
This is a declaratory judgment suit filed by Employers Casualty Company, hereinafter called Employers, against Glens Falls Insurance Company, hereinafter called Glens Falls, to determine which of the companies has ultimate responsibility for the cost of defense and satisfaction of a personal injury recovery of one, James Patrick Murphy, against Tobin & Rooney Plastering Company. Employers, as insurer of Tobin & Rooney, defended the Murphy claim and advanced the money for full payment of the judgment, receiving in return the assignment of a judgment which Tobin & Rooney obtained against two of its employees for full indemnity against loss under the Murphy judgment. Employers contends that Glens Falls is liable for the cost of the defense and satisfaction of the Murphy claim because his injuries occurred while the Tobin & Rooney employees were engaged in unloading a supplier's truck which was covered by a Glens Falls comprehensive automobile liability insurance policy; that Tobin & Rooney and its employees were at such time omnibus insureds under loading and unloading provisions of the Glens Falls liability policy; and that the notice provisions of the policy *572 were met or waived. Glens Falls denied liability and the receipt or waiver of notice as required by its policy.
The Tobin & Rooney employees, Albert Giles and Lanconieu Manuel, intervened, asserting their right as Glens Falls' omnibus insureds to have that company pay the indemnity judgment against them in favor of Tobin & Rooney.
The trial court, after jury findings, rendered judgment for Employers against Glens Falls for $68,000.00, with interest at the rate of 6% Per annum from July 15, 1966, the date of disbursement by Employers to Murphy. The Court of Civil Appeals reformed the judgment of the trial court, affirming only as to two-fifths (2/5ths) of such amount as a pro rata contribution. 469 S.W.2d 829. We reverse the judgment of the Court of Civil Appeals and affirm the judgment of the trial court.
Questions presented in this Court have been narrowed to whether written notice of the accident by the named insured inured to the benefit of the omnibus insureds, Giles and Manuel, or whether there was evidence to support the jury finding that the notice requirement had been waived.
Employers issued a comprehensive general liability insurance policy to Tobin & Rooney, a subcontractor on a multi-story building being erected in Houston. Glens Falls issued a comprehensive automobile liability insurance policy to Shelton W. Greer Co., Inc., hereinafter called Greer, which was a supplier of material used on the job by Tobin & Rooney. The Glens Falls policy covered persons using, including loading and unloading, the truck on which Greer delivered 400 sacks of plastering material to Tobin & Rooney on April 15, 1964. In making the delivery Greer's truck backed up to an elevator which was used to hoist the sacks of material to the 19th floor of the building. The Greer truck driver then placed the fifty pound sacks on the tailgate of the truck, where they were picked up by the Tobin & Rooney employees, Giles and Manuel, and placed on the elevator. The sacks were then hoisted to the 19th floor, where they were being unloaded by two other Tobin & Rooney employees when a sack fell off the elevator, striking and seriously injuring James Patrick Murphy, who was standing at ground level. A jury finding that Giles and Manuel were unloading the truck with the implied consent of Greer is not challenged here by Glens Falls. Also unchallenged here is the holding of the courts below that the injuries to Murphy were caused by the negligence of Giles and Manuel during the unloading of the truck and that Tobin & Rooney, as well as Giles and Manuel, were omnibus insureds under the policy issued by Glens Falls to Greer.
Both of the insurance policies in question contained the usual notice of accident provision requiring that "written notice shall be given by or on behalf of the insured to the company ... as soon as practicable." On April 23, 1964, the eighth day after the accident, Greer gave written notice to Glens Falls, in which it said:
"For your records we wish to inform you of an accident which occurred during the afternoon of April 15, 1964 on the jobsite of the new American General Insurance Company, 2727 Allen Parkway, Houston, Texas.
"Our delivery truck was not involved, though we were delivering material to the jobsite. Our truck was loaded with 400 bags of Mono-Kote, each bag weighing approximately 50#. Our truckdriver, Aaron Garrett, had unloaded approximately 264 bags of material. When we say unloading, this means taking the material to the tail-gate of our truck where our customer, Tobin and Rooney, has their laborers take charge of material and place it on the hoist."
It is conceded that this letter complied with the written notice of accident provisions of the Glens Falls policy insofar as the named insured, Greer, is concerned, but Glens Falls denied that it inured to the *573 benefit of or constituted any notice from its omnibus insureds, Tobin & Rooney and Giles and Manuel.
In the meantime, Tobin & Rooney gave Employers notice of the accident immediately, and its adjuster, accompanied by a court reporter and photographer, arrived on the scene before the truck had been moved. Question and answer statements were taken from witnesses, including Giles, Manuel, and the Greer truck driver. The second day after the accident Employers' adjuster gave Glens Falls notice of the accident by telephone and informed Glens Falls that Tobin & Rooney and its employees were asserting coverage as omnibus insureds under the Glens Falls policy issued to Greer. A Glens Falls adjuster was immediately sent to investigate the accident. He talked with witnesses, visited Murphy in the hospital, and on May 5 obtained from the court reporter the question and answer statements of Giles and Manuel and other witnesses.
On April 23, Employers' adjuster conferred in person with a Glens Falls representative who had authority to accept the claim; he repeated the earlier information about coverage being claimed by Tobin & Rooney and its employees; and gave him the results of the Employers' investigation, including the names of Giles and Manuel. In June, Glens Falls assigned the file to National Claims Service for further investigation.
Continuously since the day after the accident Employers has claimed that the Glens Falls policy issued to Greer covered any liability which might be incurred by Tobin & Rooney and its employees because of negligence in unloading the Greer truck. This was expressed by letters from Employers to Glens Falls on July 13 and October 22, 1964, and in the latter was enclosed a copy of a legal opinion to such effect written by the Houston law firm which represented both insurance companies. Glens Falls sought and received on November 10 an opinion from another member of the same firm, and it expressed the same conclusion. In the meantime, Murphy had filed suit against Tobin & Rooney on October 2, and Employers' attorney had answered. On January 18, 1965, while the Murphy suit was pending only against Tobin & Rooney, Glens Falls agreed to and did assume the defense of the claim. Its same Houston law firm filed an amended answer, took depositions, and negotiated toward a settlement for about one year, after which Glens Falls withdrew from the case. The law firm which had previously represented both insurance companies also withdrew from the case, and another firm, as attorneys for Employers, took over the defense of Tobin & Rooney and filed a third-party action against four Tobin & Rooney employees, including Giles and Manuel, for indemnity against any loss sustained by reason of Murphy's claim. Glens Falls was given notice by the Tobin & Rooney employees and was requested to defend them as omnibus insureds under the Greer policy, but Glens Falls refused to do so. That case finally resulted in a judgment for Murphy against Tobin & Rooney for $64,500.00 and a judgment in favor of Tobin & Rooney against Giles and Manuel for full indemnity. See Tobin & Rooney Plastering Company v. Giles, 418 S.W.2d 598 (Tex.Civ.App.1967, no writ).
Employers, after advancing the money to pay Murphy's judgment, filed this suit as assignee and subrogee of Tobin & Rooney, to recover the amount paid in defense and satisfaction of the Murphy judgment upon the theory that Glens Falls, as insurer of Giles and Manuel under the omnibus provisions of its Greer policy, is obligated to satisfy the indemnity judgment of Tobin & Rooney against Giles and Manuel. As heretofore stated, Giles and Manuel intervened, asserting their right to have Glens Falls pay the judgment against them. They made the same contention as appellees in the Court of Civil Appeals and do so as petitioners in this Court.
The jury found that Giles and Miller were unloading the truck with the implied *574 consent of Greer; that notice was given to Glens Falls by or for Tobin & Rooney as soon as practicable; that Glens Falls had waived its right to require written notice of the accident by or for Tobin & Rooney and Giles and Manuel; but failed to find that written notice was given Glens Falls by or for Giles and Manuel as soon as practicable. The jury found that the $64,500 paid to Murphy by Tobin & Rooney was reasonable in amount, and it was stipulated that the reasonable and necessary expense incurred by Employers in defending the Murphy claim was $3,500. Whereupon, the trial court rendered judgment for Employers and Giles and Manuel against Glens Falls in which it determined and declared that Glens Falls is legally bound to pay to Employers the sum of $68,000 as the cost of defending and satisfying the Murphy claim against Tobin & Rooney and in satisfaction of the latter's indemnity judgment over and against Giles and Manuel.
The Court of Civil Appeals held that the evidence (April 23, 1964 letter from Greer to Glens Falls and July 13, 1964 letter from Employers to Glens Falls) supported the jury finding that written notice was given to Glens Falls by or for Tobin & Rooney as soon as practicable; that Glens Falls had waived its right to require written notice of the accident by or for Tobin & Rooney; but that there was no evidence in support of similar findings of waiver with respect to Giles and Manuel.
Because the jury failed to find that written notice of the accident had been given to Glens Falls by or for Giles and Manuel as soon as practicable, and because Employers made no motion to disregard those findings, the Court of Civil Appeals held that it was not necessary for it to determine whether the written notice of April 23, 1964 from Greer to Glens Falls constituted written notice of accident on behalf of Giles and Manuel. The question was treated solely as one of fact.
The Court of Civil Appeals held that the loading and unloading provision of the Glens Falls policy issued to Greer was applicable to the facts of this case and that there was evidence to support the jury findings that Giles and Manual were unloading the Greer truck with Greer's implied permission, summarizing as follows:
"The trial court properly held that the negligence of Giles and Manuel which was a cause of Murphy's injuries occurred during the unloading of the truck so that Tobin & Rooney, as well as Giles and Manuel, were omnibus insured under the policy issued by Glens Falls."
Glens Falls filed no motion for rehearing in the Court of Civil Appeals and does not complain of any of the above holdings. Its sole argument here is that, in spite of its coverage, it is relieved of all liability to Giles and Manuel by reason of not having received timely written notice of the accident directly from them or on their behalf and because the evidence does not support the jury finding that it waived such notice.
Employers and Giles and Manuel present two points, urging that the Court of Civil Appeals erred (1) in holding that there is no evidence to support the jury finding that Glens Falls had waived its right to require written notice of the accident by or for Giles and Manuel, and (2) in failing to hold that the written notice dated April 23, 1964, from Greer to Glens Falls inured to the benefit of the omnibus insureds, Giles and Manuel, as a matter of law. We granted the writ on the second point and have concluded that it should be sustained.
Liability insurance policy provisions requiring the insured to give timely written notice of an accident have been held to be reasonable and conditions precedent to liability under the policies. Allen v. Western Alliance Insurance Co., 162 Tex. 572, 349 S.W.2d 590 (1961); 66 A.L.R.2d 1287, #2; 72 A.L.R. 177, VI. Whether written notice of the accident by the named insured inures to the benefit of additional or omnibus insureds is a question of first impression in this Court, although there is *575 dictum in the case of Travelers Insurance Company v. Chicago Bridge and Iron Co., 442 S.W.2d 888, 903 (Tex.Civ.App.1969, writ ref., n. r. e.) as follows:
"Where an insurance company receives a proper and timely notice from the named insured, including `particulars sufficient to identify' the additional insured, it is not necessary that another notice be given by the omnibus, or additional, insureds."
There is a difference of opinion on the question in other jurisdictions, but the weight of authority and the better rule appears to be that written notice of an accident by the named insured inures to the benefit of any additional or omnibus insureds if it is timely and sufficient to place the insurer on inquiry as to the extent of its possible liability and omnibus coverage under the policy. Western Freight Ass'n v. Aetna Casualty & Surety Co., 255 F. Supp. 858, 862 (W.D.Penn.1966) aff'd 371 F.2d 541 (3rd Cir.1967); Gregory v. Highway Insurance Company, 24 Ill.App.2d 285, 164 N.E.2d 297 (1960), appeal denied; Minneapolis, St. P. & S. S. M. R. Co. v. St. Paul Mer.-Ind. Co., 268 Minn. 390, 129 N.W.2d 777, 786 (1964); Knudson v. Anderson, 199 Minn. 479, 272 N.W. 376, 380 (1937); Costanzo v. Pennsylvania Threshermen & Farmers' Mutual Casualty Insurance Company, 30 N.J. 262, 152 A.2d 589, 594 (1959); Mariani v. Bender, 85 N.J.Super, 490, 205 A.2d 323 (1964); Capece v. Allstate Insurance Company, 86 N.J.Super. 462, 207 A.2d 207 (1965); Helvy v. Inland Mutual Insurance Company, 148 W.Va. 51, 132 S.E.2d 912 (1963); 66 A.L.R.2d 1288; 76 A.L.R. 39; 72 A.L.R. 1425; 7 Am.Jur. 2d, § 139, 467-468; 8 Appleman, Insurance Law and Practice § 4738 (Supp.1972, p. 24); 13 Couch on Insurance 2d, § 49:105 (1965).
The rule is stated in two of the above cited texts as follows:
"Where the named insured notified the insurer of an accident, the insurer could not defend against an omnibus insured on grounds that the latter had failed to give notice." 8 Appleman, Insurance Law and Practice, § 4738 (Supp.1972, p. 24).
"While an additional insured may give the notice required by an automobile liability policy, there is no obligation on him to do so. Hence, it is sufficient that the insured has given the notice required of him, and the insurer cannot require an additional notice from the additional insured." 13 Couch on Insurance 2d § 49:105 (1965).
In a very similar case, it was said in Western Freight Ass'n v. Aetna, supra:
"This condition was fully met on behalf of both Western and Zandier on November 17th, one day after the accident, when Aetna received a written report from Lighting, the named insured. This report was in substantial compliance with Condition 7. [Notice of accident] At the time of an accident only the named insured knows for certain the name of the insurance company with whom it contracted for liability insurance and the terms and conditions of the policy. From the report received from Lightning, Aetna was in a position to determine who had the status of insureds under the omnibus clause and therefore on whose behalf notice should be deemed to have been given."
The purpose of the requirement of timely written notice is to enable an insurer to investigate the circumstances of an accident while the matter is fresh in the minds of the witnesses so that it may adequately prepare to adjust or defend any claims that may be then or thereafter asserted against persons covered by its policy. It is for this purpose that the notice requirement has been held to be reasonable. 18 A.L.R.2d 451 #2; 72 A.L.R. 177, VI. This purpose was served in the present case by the prompt written notice given to Glens Falls by its named insured. The notice informed Glens Falls of the fact that *576 the accident occurred during unloading operations of the Greer truck and that among those participating in such unloading were Tobin & Rooney and "their laborers". Although the Tobin & Rooney laborers were not listed by name, it was sufficient to place Glens Falls on notice and inquiry as to their identity and as to whether their negligence, if any, might result in some liability which was within the omnibus coverage of the Glens Falls policy. It is undisputed that when Glens Falls received the written notice from Greer, all of the potential omnibus insureds had been identified by name to the Glens Falls' Claims Manager.
As a result of this notice, Glens Falls made a timely, full and complete investigation of all the facts and circumstances; obtained statements of the witnesses and the names of all possible omnibus insureds; and actually assumed defense of the case for nearly a year when only Tobin & Rooney, employer of Manuel and Giles, was the defendant. Glens Falls does not contend that it could or would have done any more investigating or preparing to defend against Murphy's claims if it had received on the same day a written notice of the accident from Giles and Manuel. It was the same accident; it involved the same insured vehicle, the same claimant, and the same omnibus insureds.
We hold that the timely written notice of the accident from its named insured complied with the contract provision of the policy and the purpose to be served by such provision, and that another notice of the same accident was not required of the omnibus insureds. To hold otherwise, as contended by Glens Falls, would permit it to escape liability on a technicality which had no relation to its ability to promptly investigate the accident and prepare to defend and satisfy any claims then or thereafter asserted against the omnibus insureds.
Glens Falls insists that the notice issue as to Giles and Manuel is a question of fact rather than one of law, and that the negative jury finding as to whether timely notice was given by them could not be disregarded on the trial court's own motion, citing Cunningham v. R. W. McPherson & Associates, Inc., 392 S.W.2d 145 (Tex.Civ.App.1965, writ ref. n. r. e.). The dictum on the subject in that case dealt solely with fact issues relating to attorney's fees and not with any independent question of law. It has been held that the question of timely notice of an accident is one of law if the evidence on the subject is undisputed. Klein v. Century Lloyds, 154 Tex. 160, 275 S.W.2d 95 (1955); Commercial Standard Insurance Co. v. Harper, 129 Tex. 249, 103 S.W.2d 143 (1937). In this case, the evidence is undisputed that Greer, the named insured in the Glens Falls policy, gave timely written notice of the accident to the company. We have held that this notice inured to the benefit of the omnibus insureds as a matter of law. This being an independent type of notice and ground for recovery conclusively established under the evidence as a matter of law, no issue thereon was required to be submitted to the jury. Wright v. Vernon Compress Co., 156 Tex. 474, 296 S.W.2d 517, 522-523 (1956); Rules 272 and 279, Texas Rules of Civil Procedure. Employers' motion for judgment on a verdict which contained negative jury findings relating to actual notice by or for Giles and Manuel was immaterial to and did not prevent recovery on another type of notice which was established as a matter of law. Having sustained petitioners' point on timely notice as a matter of law, it is unnecessary to pass upon whether there is evidence to support the jury findings that Glens Falls waived the right to require written notice from Giles and Manuel.
Accordingly, the judgment of the Court of Civil Appeals is reversed and the judgment of the trial court is affirmed.
| 2023-12-27T01:27:15.642919 | https://example.com/article/1831 |
5*m, -2*s - 4 = -3*m for s.
1
Solve 4*f - 7*f - 22 = -5*l, 14*f - 12 = -14*l + 10*f for l.
2
Solve 5*u = -3*m - 32, 34*u - 2*m + 4 = 31*u for u.
-4
Solve 5*j - 36 = -2*l - 12, 3*l + 10 = 4*j for l.
2
Solve -2*i = 3*d - 5, 0 = 4*i + d + 25 - 40 for i.
4
Solve -2741*i - 3*v = -2743*i - 13, 0 = i - v + 6 for i.
-5
Solve -81*h + 89*h - 2*c - 40 = 0, -3*h - 3*c = 45 for h.
1
Solve 48 = -8*t + 4*h, -2*t - 104*h - 16 = -106*h for t.
-4
Solve 3*m = 30, 3*j - 19*m = -20*m + 16 for j.
2
Solve 5*b + 41 = 2*i, 57 = 9*i - 25*b + 28*b for i.
8
Solve 0 = x + 5*j + 5, 16 = 177*x - 173*x + 2*j for x.
5
Solve 0 = -3*n + 4*r - 15, -99 = 3*n - 6*r - 78 for n.
-1
Solve 3*g - 2*s - 33 = 0, -g + 4*s + 23 = 2 for g.
9
Solve 5*p + 8 = 141*q - 144*q, -5*q - 14 - 22 = -3*p for p.
2
Solve 4*v + s + 21 = 0, 5*v + 3*s = 5*s - 10 for v.
-4
Solve -2*u + l = -371 + 392, -3 = u + l for u.
-8
Solve 3*n - 2*h + 37 = 0, -5*h = n - 25 + 9 for n.
-9
Solve 89*h + 2*l = 84*h, 3*l - 5 = -5*h for h.
-2
Solve -33*g - 16 = -28*g + 3*b, 3*g = 3*b for g.
-2
Solve 3*l - w + 11 = 0, 2*w + 14 = -1535*l + 1532*l for l.
-4
Solve -3*j = 2*j, -103*j = -0*v + v - 105*j for v.
0
Solve -2*k = -5*h + 30, -4*h + 4*k - 1000 + 1036 = 0 for h.
4
Solve f - 11 = -2*v - 26, 0 = -v - f - 6 for v.
-9
Solve 0 = -5*l - 8*f + 49, 12*l + 3*f = 15*l + 33 for l.
-3
Solve -5*n + 5*y + 75 = 0, 3*y + 392 = -n + 395 for n.
12
Solve z + 2*w = -19, -14 = -4*z + 951*w - 950*w for z.
1
Solve 3*v - 5*p - 1899 = -1867, 2*v = -5*p - 12 for v.
4
Solve 5*a - 359 = -4*y - 328, 8*a - 8 = 4*y for y.
4
Solve 5*c + 3*j = 13, 86*j = 25*c + 82*j + 49 for c.
-1
Solve -27*q + 27*q + 20 = -4*p, -q = 2*p + 5 for q.
5
Solve -18*q - 4*z - 6 = -34, 4*z + 14 = 35*q - 32*q for q.
2
Solve -d - 38 = 103*u - 98*u, -10 = 2*u + 3*d for u.
-8
Solve -4*p - 4*g = 20, 180*g - 181*g - 5 = 3*p for p.
0
Solve 3235 = -3*h - 2*t + 3230, 2*t = h + 7 for h.
-3
Solve 3*w + 5*q = 4*w + 4, 5*w + q = -20 for w.
-4
Solve -50*x + 55*x = 5*q + 5, 5*x - q = 5 for x.
1
Solve -10*q + 12*q - 4 = 4*w, -3*q + 1 = -w for q.
0
Solve -4 = -5*n + 32*r - 33*r, -29*n + 2*r = 47 for n.
-1
Solve -4*g = 0, -8*g = -u - 5*g for u.
0
Solve 2*d - 529*u + 523*u = 46, -5*d - 45 = 5*u for d.
-1
Solve 4*k + 13 = -4*n - 31, n = -4*k - 44 for n.
0
Solve z - 93*u + 91*u = 15, -3*z + 4*u = -35 for z.
5
Solve -v = 1, -21*v = -5*d - 24*v + 7 for d.
2
Solve 0 = 3*r - 11*g + 32, -304*g + 303*g = -3*r + 8 for r.
4
Solve -4*p - 94*y - 3274 = -3548, -5*y = 5*p - 5 for p.
-2
Solve -4*k + 7 = -2*g - k, 0 = 5*k - 5 for g.
-2
Solve -4*k + 2*s + 2379 = 2339, 5*k - 2*s = 40 for k.
0
Solve 3*j = 2*j + 2*b + 2, -2*j - 5*b - 14 = 0 for j.
-2
Solve 12*y = 3*m + 1066 - 1027, 5*y - 15 = m for m.
-5
Solve -10 = -2*x - 2*d, -77*d + 81*d = 2*x + 2 for x.
3
Solve -3*d = 3*o + 6, -5*d + 2 = -218*o + 219*o for o.
-3
Solve -2*q + s = -4, 49*s = -4*q + 45*s + 32 for q.
4
Solve 5323*j - 5320*j = 3*q - 0*q - 15, -j = -4*q + 8 for j.
-4
Solve -4*f + 9 = -b, -5*f = -434*b + 439*b + 20 for f.
1
Solve -255 + 187 = -4*i - 5*h, 0 = 2*i - 4*h - 8 for i.
12
Solve 364*w - 370*w = -5*p - 3, 3*p - 3 = 2*w for w.
3
Solve -4*n = a - 42, 3*n + 189 = -9*a + 204 for n.
11
Solve -4*y = 7*c - 115 + 151, 18 = -2*y + 3*c for y.
-9
Solve 1 = r + 2*m, -m = -3*r + 5*r + 7 for r.
-5
Solve 4*b + 8 = -3*s + 6 - 2, -3*s = -12 for b.
-4
Solve -22*w = 5*y - 30*w - 3, 7 = -5*y - 2*w for y.
-1
Solve 4*s = 6*p - 22, -3*s - 614*p = -615*p + 20 for s.
-7
Solve 31 = 5*l - 11*s, 40*l + 41*l - 3 = 79*l - 5*s for l.
4
Solve -5*z + j + 22 = 20, -5*j + 77 = 4*z for z.
3
Solve 6*u + 4*t + 552 - 536 = 0, -u - 6*t = -4*t + 8 for u.
0
Solve b - 4*l = 9*l - 18*l, -14*l + 6 = 2*b - 10*l for b.
5
Solve 0 = 2*s - 292*n + 293*n + 7, -3*s - 4*n - 8 = 0 for s.
-4
Solve 4*a + 6 = -3*g + 2*g, -2*a = -31*g - 816 for a.
5
Solve -3*l - 37 = 5*i, 3711 = -2*l + i + 3708 for l.
-4
Solve -973 + 981 = -g + 4*f, 4*f = 5*g - 24 for g.
8
Solve 5*v + 9 = -5*m + 59, -4*v + 2*m + 10 = 0 for v.
5
Solve 7*d + 3*r = -48, 2*r + 18 = 14 for d.
-6
Solve -o + 21 = -1057*c + 1053*c, -4*c - 26 = -2*o for o.
5
Solve z = -5*h + 11, 0 = 5*h + 33*z - 23*z + 115 for h.
5
Solve -4*i = -4*u, 232 = -4*u + 5*i + 235 for u.
-3
Solve -2*m - 841 = 3*b - 843, -b + 4 = -m for m.
-2
Solve -3*q = -23*y + 24*y + 13, -5*y = -2*q - 20 for q.
-5
Solve -4*k - 12 = 5*m, -5*m + 538 = -k + 535 for m.
0
Solve 13*d = -m - 65, -3*d + m - 23 + 8 = 0 for d.
-5
Solve -4*z + 3 = -0*z - i, 2*z - 14 = -2*i for z.
2
Solve 3*y = 11*u - 6*u - 18, -4*y - u - 1 = 0 for y.
-1
Solve g + 112*f - 118*f - 14 = 0, 0 = -4*g + 4*f + 36 for g.
8
Solve o + 15 = 5*z - 18, -9 = -5*z - 2*o for z.
5
Solve 3*u - 2*p = -22, -68*p = 3*u - 0*u - 65*p + 27 for u.
-8
Solve 336*y = 4*b + 332*y - 36, 5*b = 22*y + 62 for b.
8
Solve 23*t + 3 = 3*s + 52*t - 33*t, 6 = 2*t for s.
5
Solve 708*v - 704*v = 4, -3*s + 6*v + 51 = 0 for s.
19
Solve -68 = -u + 3*h - 65, 0 = -4*u + 4*h + 12 for u.
3
Solve -139*n + 143*n = -5*b - 92, -4*b - 55 = -3*n for b.
-16
Solve g = -3*n + 8, -14 + 2 = 5*g - 11*n for g.
2
Solve -3*a - 9 = -2*u, -4*u - 2 = -2*a - 0 for a.
-5
Solve -a = -5*t - 45, -11*a + 8*t = 13*t + 45 for a.
0
Solve -18 = 4*y + 2*d, 13*y - d + 70 = 4 for y.
-5
Solve -51*t + 54*t - 30 = -3*w, -50 = -5*w + 7*t for w.
10
Solve -26 = 5*j + 3*s, -4*j = -s + 232 - 201 for j.
-7
Solve 4*l - j + 92031 = 92051, -3*l + 2*j = -10 for l.
6
Solve -w = 4*w - 5*z - 25, 4*z - 229 = -237 for w.
3
Solve 0 = -5*i - 3*q + 37, i + 78 = -3*q + 95 for i.
5
Solve -14*m - 18 = -9*m + d, -4*m + 24 = -4*d for m.
-2
Solve -2*j = -y + 21, 5*y - 6*y = j + 3 for j.
-8
Solve -5*v + 4 = 42*p - 41*p, 5*p + 3 = -2*v for p.
-1
Solve 0 = -2410*p + 2409*p + q - 4, 4*p - 3*q = -15 for p.
-3
Solve -246*o - 4*i = -249*o + 35, -o - 4*i - 15 = 0 for o.
5
Solve -t = -c - 6, -77*t + 2*c + 6 = -79*t - 10 for t.
-1
Solve 2120*t = 2123*t + 4*u - 13, -t - 5*u = -30 for t.
-5
Solve -c + 9*v + 0 = -35, -c + 4*v = -15 for c.
-1
Solve 28*v - 30*v + 24 = -4*k, 15*v = -k + 56 for k.
-4
Solve -43 + 32 = -3*q - u, -30 = -5*q - 4*u for q.
2
Solve 2*f = -2443 + 2451, -5*z = -3*f + 37 for z.
-5
Solve 3*g = q - 22, 4*q + 127 = -2*g + 173 for g.
-3
Solve 3*h + 827*q - 829*q = 12, -5*h - 4*q - 2 = 0 for h.
2
Solve -17 = -5*i + 2*y, -2*i - y - 316 = -330 for i.
5
Solve -2*a = -2*p + 12, 78 = -4*p + 90 for a.
-3
Solve -140*j = 3*g - 127*j - 46, 2*g + 4 = 5*j - 20 for g.
-2
Solve -43128*a + 43123*a + 26 = -k, -4*k - 2 = -3*a for a.
6
Solve -5*o - 3123 = 3*y - 3119, 0 = y - 2*o + 5 for y.
-3
Solve 88 = 2*g - 2*t + 96, 2*g - 3*t + 36 = 7*g for g.
3
Solve 154*s = 156*s - 2*t - 2, -3 = s + 3*t for s.
0
Solve -1099 + 1092 = 4*m - 3*o, -m - 4*o = -22 for m.
2
Solve -2*w - 27*x = -29*x + 28, -4*w + 3*x - 52 = 0 for w.
-10
Solve -25*w + 26*w - 3*q - 28 = -6*q, q = 2*w for w.
4
Solve -4*w + 2*s + 14 = 0, 2*w - 2*s = 424 - 422 for w.
6
Solve -5*z - 1349 = 4*p - 1309, -2*p + 2*z - 20 = 0 for p.
-10
Solve -w = -5*b - 27, 0 = 4*w - 17115*b + 17112*b - 57 for w.
12
Solve -3*d + 8*r - 7*r = 14, 18 = -3*d + 3*r for d.
-4
Solve -g = -3*d + 3, -5*g + 3*d + 9 = -24 for g.
9
Solve -3*l = 2*z + 10 - 27, 0 = -l - z + 6 for l.
5
Solve 45*o - 53 = -4*g + 36*o, g + 3*o = 17 for g.
2
Solve -2*h + d = -9, 3362*d - 3361*d = -2*h + 3 for h.
3
Solve -11527*m + 4 = -11531*m - 2*x, -36 = m + 4*x for m.
4
Solve 2*t - 144 = -3*t - 3*t + 5*a, 0 = -3*a + 8*a for t.
18
Solve 1252*m - 1256*m = 4*u - 16, 2 = u for m.
2
Solve -4*l - 2*z + 5 = l, 15 = -3*z for l.
3
Solve 5*i - 61 + 85 = -2*n, 19*n + 34 = i for i.
-4
Solve 0*p = 5*p + 15, -28*p - 69 = 3*z for z.
5
Solve -4*x - 5*r + 11 = 0, 3*x - 22 = 5*r - 5 for x.
4
Solve -2*a = 3*p - 175 + 183, -20 = -4*p + 5*a for p.
0
Solve -1132*s = -1135*s - 5*f + 18, -18 = -3*s - f for s.
6
Solve -4*y - 17 = v, -v - 7 = 44*y - 42*y for y.
-5
Solve -45 = -9*t, 2*f + 13*t + 3 = 12*t for f.
-4
Solve l - 17 = 5*r, 2*l + 49 = -r + 50 for r.
-3
Solve 2*r - 32 = -9*o + 38, -o + 9 = 9*r - 10*r for r.
-1
Solve -10 + 3 = -u + 2*u - 44*a + 42*a, 0 = -2*a + 4 for u.
-3
Solve 0 = 4*r - 2*t - 14, 4*r - 17 = 886*t - 887*t for r.
4
Solve 2*n - 3*b + 10 = 0, 0 = -4*n + 4*b - 2738 + 2722 for n.
-2
Solve 5*v - 131*w = -130*w + 2, 2*w = 4*v - 4 for v.
0
Solve -4*q - 2 = -2*m - 16, -14 = 2*m + q for m.
-7
Solve 0 = 16*l - 3*w + 89, 0 = 2*l + 2 | 2024-03-25T01:27:15.642919 | https://example.com/article/1862 |
---
abstract: 'In this paper we introduce a novel method for linear system identification with quantized output data. We model the impulse response as a zero-mean Gaussian process whose covariance (kernel) is given by the recently proposed stable spline kernel, which encodes information on regularity and exponential stability. This serves as a starting point to cast our system identification problem into a Bayesian framework. We employ Markov Chain Monte Carlo methods to provide an estimate of the system. In particular, we design two methods based on the so-called Gibbs sampler that allow also to estimate the kernel hyperparameters by marginal likelihood maximization via the expectation-maximization method. Numerical simulations show the effectiveness of the proposed scheme, as compared to the state-of-the-art kernel-based methods when these are employed in system identification with quantized data.'
address:
- |
Department of Electrical Engineering, Eindhoven University of Technology, Eindhoven, The Netherlands\
(e-mail: g.bottegal@tue.nl)
- 'Automatic Control Lab and ACCESS Linnaeus Centre, School of Electrical Engineering, KTH Royal Institute of Technology, Stockholm, Sweden (e-mail: hjalmars@kth.se)'
- 'Department of Information Engineering, University of Padova, Padova, Italy (e-mail: giapi@dei.unipd.it)'
author:
- Giulio Bottegal
- Hakan Hjalmarsson
- Gianluigi Pillonetto
bibliography:
- 'biblio.bib'
title: |
A new kernel-based approach to system identification\
with quantized output data
---
,
,
System identification; kernel-based methods; quantized data; expectation-maximization; Gibbs sampler
Introduction
============
Many applications in communications, control systems, bioinformatics, require modeling and prediction of dynamic systems with quantized output data (see e.g. [@bae2004gene], [@carli2010quantized] and [@wang2010system]). In particular, in this paper we assume that an unknown input-output map is defined by the composition of a linear time-invariant dynamic system and a quantizer, as depicted in Figure \[fig:block\_scheme\].
0.2in
![Block scheme of a system with quantized output data.[]{data-label="fig:block_scheme"}](block_scheme_journal){width="\columnwidth"}
-0.2in
Estimation of this type of structure is a challenging task. Standard system identification techniques, such as least-squares or the Prediction Error Method (PEM) [@Ljung], [@Soderstrom], may give poor performances, because the presence of the quantizer can determine a significant loss of information on the system dynamics. Recently, there has been an increasing interest on developing new methods to solve this problem. Particular attention has been devoted to the case of binary measurements [@wang2003system], [@wang2006joint], also studying on-line recursive identification [@jafari2012convergence], [@guo2013recursive]. In other works, e.g. [@colinet2010weighted], the knowledge of a dithering signal is exploited to improve the identification performance. The problem of experiment design is analyzed in [@casini2011input], [@casini2012input] and [@godoy2014novel]. More recently, system identification with non-binary quantizers has been also addressed in [@marelli2013identification], [@moschitta2015parametric], [@guo2015asymptotically], [@wang2015identification]. In [@godoy2011identification], [@godoy2014identification], [@chen2012impulse], the system identification problem is posed as a maximum likelihood/a-posteriori problem. In particular, the framework proposed in [@chen2012impulse] uses the nonparametric kernel-based identification approach proposed in [@SS2010], see also [@pillonetto2014kernel] for a survey.
Similarly to [@chen2012impulse], in this paper we cast the problem of identifying a linear dynamic systems with quantized data in a Bayesian framework. To this end, we model the impulse response of the unknown system as a realization of a zero-mean Gaussian random process. The covariance matrix (in this context also called a *kernel*) corresponds to the recently introduced *stable spline kernel* (see [@SS2010], [@SS2011], [@bottegal2013regularized]). The structure of this type of kernel depends on two *hyperparameters*, that need to be estimated from data. Following an empirical Bayes approach [@Maritz:1989], the hyperparameters, together with the noise variance, are estimated via marginal likelihood maximization. These quantities are then used to compute the minimum mean-square estimate (MMSE) estimate of the impulse response.
The whole procedure, which has been proven effective and relatively simple in the standard (non-quantized) setting, becomes more involved in the scenario under study. The MMSE system estimate requires the computation of an analytically intractable integral. To accomplish this task, in this paper we propose sampling methods based on Markov Chain Monte Carlo (MCMC) techniques. In particular, we design two different sampling techniques using the so called Gibbs sampler [@geman1984stochastic], which often enjoys faster convergence properties compared to standard Metropolis-Hastings sampling techniques [@Gilks].
Another contribution of the paper is to show that the task of estimating the kernel hyperparameters (and the noise variance) can be accomplished using the proposed sampling techniques. Using the Expectation-Maximization (EM) method [@dempster1977maximum], we design an iterative scheme for marginal likelihood maximization, where the E-step characterizing the EM method makes use of the Gibbs sampler (see also [@casella2001empirical]), and the M-step results in a sequence of straightforward optimization problems. Interestingly, the resulting estimation scheme can be seen as a generalization of the method proposed in [@godoy2014identification] to the Bayesian nonparametric framework and, differently from [@bottegal2015bayesian] and [@chen2012impulse], it allows tuning all the kernel hyperparameters.
The paper is organized as follows. In the next section, we introduce the problem of identifying dynamic systems from quantized data. In Section \[sec:Bayesian\_model\], we formulate the proposed Bayesian model and discuss its inference. In Section \[sec:sysid\_method\], we describe the proposed identification method. Section \[sec:experiments\] shows the results of several numerical experiments to assess the performance of the proposed method. Some conclusions end the paper.
Problem formulation {#sec:problem_formulation}
===================
We consider a linear time-invariant discrete-time dynamic system of the form $$\label{eq:sys1}
z_t = \sum_{i=1}^{+\infty} g_i u_{t-i} + e_t \,,$$ where $\{g_t\}_{t=1}^{+\infty}$ is a bounded-input-bounded-output (BIBO) stable impulse response representing the dynamics of the system. We approximate the impulse response by considering the first $m$ samples only, namely $\{g_t\}_{t=1}^{m}$, where $m$ is assumed large enough to capture the system dynamics[^1]. The input $u_t$ is a measurable signal; for the sake of simplicity, we assume that the system is at rest until $t=0$, meaning $u_t = 0,\,t<0$. We shall not make any specific requirement on the input sequence (i.e., we do not assume any condition on persistent excitation in the input [@Ljung]), requiring only $u_t \neq 0$ for some $t$. Notice, however, that even though the algorithm do not require any specifics of the input, the resulting estimate is of course highly dependent on the properties of the input [@Ljung]. The output $z_t$ is corrupted by the additive zero-mean Gaussian white noise $e_t$ with variance $\sigma^2$, assumed unknown. Introducing the vectors $$g := \begin{bmatrix} g_1 \\ \vdots \\ g_{m} \end{bmatrix} ,\, \varphi_t^T := [ u_{t-1} \, \ldots \, u_{t-m} ] \,,$$ an approximation of can be written in linear regression form, namely $$\label{eq:sys11}
z_t = \varphi_t^T g + e_t \,.$$ The output $z_t$ is not directly measurable, only a quantized version being available, namely $$y_t = \mathcal Q [z_t] \,,$$ where $\mathcal Q$ is a known map of the type $$\mathcal Q[x] = s_k \qquad \mbox{if } x \in (q_{k-1},\,q_k] \,,$$ with $s_k \in \{s_1,\,\ldots,\,s_Q\}$ and $q_k \in \{q_0,\,\ldots,\,q_Q\}$ (and typically $q_0 = -\infty$ and $q_Q = +\infty$).
A particular and well-studied case is the binary quantizer, defined as $$\mathcal Q[x] = \left\{ \begin{array}{ll} -1 & \mbox{if } x < C \\
1 & \mbox{if } x \geq C
\end{array} \right. \,.$$ It is well-known that a condition on the threshold to guarantee identifiability of the system is $C \neq 0$. In fact, when $C=0$, the system can be determined up to a scaling factor [@godoy2011identification].
We assume that $N$ input-output data samples $y_1,\,\ldots,\,y_{N}$, $u_0,\,\ldots,\,u_{N-1}$ are collected during an experiment. The problem under study is to estimate $\{g_t\}_{t=1}^{m}$ using the collected measurements.
It is also useful to write the dynamics in the following vector notation $$\label{eq:sys2}
z = Ug + e\,,$$ where $z$ and $e$ are $N$-dimensional vectors collecting the samples of $z_t$ and $e_t$, respectively, and $U \in \mathbb{R}^{N \times m}$ is a matrix whose $t$-th row corresponds to $\varphi_t^T$. Similarly, we denote by $y:= [ y_1 \,\, \ldots \,\, y_N ]^T$ the vector collecting the available quantized measurements.
Bayesian modeling and inference {#sec:Bayesian_model}
===============================
Impulse response prior
----------------------
In this paper we cast the system identification problem into a Bayesian framework, setting an appropriate prior on $g$. Following a Gaussian regression approach [@Rasmussen], we model the impulse response as a zero-mean Gaussian random vector, i.e. we assume the following prior distribution $$\begin{aligned}
\label{eq:model_gh}
p(g;\,\lambda,\,\beta) \sim \mathcal N (0,\,\lambda K_\beta) \,.
$$ Here, $K_\beta$ is a covariance matrix whose structure depends on the *shaping hyperparameter* $\beta$, and $\lambda \geq 0$ is a scaling factor. In this context, $K_\beta$ is usually called a [*kernel*]{} and determines properties of the realizations of $g$. In particular, we choose $K_\beta$ from the family of *stable spline kernels* [@SS2010], [@SS2011]. Such kernels are specifically designed for system identification purposes and give clear advantages compared to other standard kernels [@bottegal2013regularized], [@SS2010] (e.g. the Gaussian kernel or the Laplacian kernel, see [@Scholkopf01b]). Motivated by its maximum entropy properties [@chen2016maximum], in this paper we make use of the *first-order stable spline kernel* (or *TC kernel* in [@ChenOL12]). It is defined as $$\label{eq:ssk1}
\{K_\beta\}_{i,j} := \beta^{ \max(i,j)} \quad,\, 0 \leq \beta <1 \,,$$ with $\beta$ regulating the impulse response decay rate.
Bayesian inference of systems with quantized output data {#sec:Gibbs}
--------------------------------------------------------
In this section we describe the complete Bayesian model that stems from the prior adopted for the impulse response. Our main aim is to devise an MCMC-based sampling mechanism for inferring the model. We introduce the vector of parameters $\eta = [\lambda \,\, \beta \,\, \sigma^2]$, seen as a deterministic quantity.
[![*Bayesian network describing the system model. Non-dashed nodes denote deterministic or given quantities; dashed nodes denote random variables.*[]{data-label="fig:bayesian_network"}](bayesian_network_FIR.pdf "fig:"){width="6cm"}]{}
Figure \[fig:bayesian\_network\] depicts the Bayesian network describing the system identification problem with quantized data. The kernel hyperparameters $\lambda$ and $\beta$ determine the stochastic model of $g$, which, together with $\sigma^2$, in turn determines the distribution of the $z_t$. The output measurements $y_t$ are determined directly by the non-quantized outputs. Any kind of inference on this network crucially depends on the capability of performing Bayesian inference on the hidden nodes $g,\,\{z_t\}_{t=1}^N$, by computing functionals of the posterior density $$\label{eq:target_density}
p(g,\,z|y;\,\eta)$$ of the form $$\label{eq:functional_generic}
\int f(g,z) p(g,\,z|y;\,\eta) dg\,dz \,,$$ where $f(g,z)$ is a general function of $g$ and $z$. Special cases of that will be used later comprise the MMSE of $g$ given $y$ and the computation of the marginal likelihood of $\eta$.
In the remainder of the section, we assume that $\eta$ is fixed.
Method 1: sampling from the joint posterior {#sec:sampling1}
-------------------------------------------
Quite unfortunately, analytical computation of is intractable, due to the involved structure of the posterior density. Instead, we can resort to Markov Chain Monte Carlo methods, i.e. use the approximation $$\label{eq:MCMC_approx}
\int f(g,z) p(g,\,z|y;\,\eta) dg\,dz \simeq \frac{1}{M} \sum_{k=1}^M f(g^{(k)},\,z^{(k)})\,,$$ where $g^{(k)}$, $z^{(k)}$ are random samples drawn from and $M$ is a large integer. The problem is how to design an effective technique to sample from the distribution . If all the conditional probability densities of such a distribution are available in closed-form, the problem of sampling can be solved efficiently using a special case of the Metropolis-Hastings method, namely the Gibbs sampler (see e.g. [@Gilks]). The basic idea is that each conditional random variable is the state of a Markov chain; then, by drawing samples from the conditional probability densities iteratively, we converge to the stationary state of this Markov chain and generate samples of the desired distribution. The conditionals of are as follows.
1. $p(z_i|g,\,\{z_j\}_{j \neq i},\,y;\,\eta),\,i=1,\,\ldots,\,N$. First note that from , given $g$, $z_i$ is independent of $\{z_j\}_{j \neq i}$ and $\{y_j\}_{j \neq i}$. Therefore we have $$p(z_i|g,\,\{z_j\}_{j \neq i},\,y;\,\eta) = p(z_i|g,\,y_i;\,\eta) \,.$$ Now, using again we observe that, if $y_i$ were not given, then $$\label{eq:pz_gaussian}
p(z_i|g;\,\eta) \sim \mathcal{N}( \varphi_i^T g ,\,\sigma^2) \,.$$ Knowing the quantized output $y_i$ permits to narrow the range of possible values of $z_i$. In particular, if $y_i = s_k$, for ant $k = 1,\,\ldots,\,Q$, we have $$\label{eq:truncated}
p(z_i|g,\,y_i = s_k;\,\eta) \sim \mathcal{N}_{q_{k-1}}^{q_k} ( \varphi_i^T g,\,\sigma^2)\,,$$ where $\mathcal N_{a}^{b}(\mu,\,\sigma^2)$ denotes a Gaussian distribution truncated below $a$ and above $b$, whose original mean and variance are $\mu$ and $\sigma^2$ respectively.
2. $p(g|z,\,y;\,\eta)$. Given $z$, information carried by $y$ becomes redundant and can be discarded. Due to the assumption on the distribution of the noise $e$, the vectors $g$ and $z$ are jointly Gaussian, so that the posterior density of $g$ given $z$ is also Gaussian. Combining the linear model with the prior it is straightforward to obtain (see e.g. [@Anderson:1979]) $$\label{eq:post_g}
p(g|z;\,\eta) \sim \mathcal{N}(m_g,\,P_g) \,,$$ with $$\begin{aligned}
P_g & = \left( \frac{1}{\sigma^2} U^T U + \left( \lambda_g K_\beta \right)^{-1}\right)^{-1} \label{eq:cov_g} \\
m_g & = \frac{1}{\sigma^2} P_g U^T z = H z \label{eq:mean_g} \,,\end{aligned}$$ with obvious definition of $H$.
Algorithm 1 summarizes the computation of using the sampling mechanism described in this subsection.
**Algorithm 1**: Method 1 for inference\
Input: $\{y_t\}_{t=1}^N,\,\{u_t\}_{t=0}^{N-1},\,\eta$\
Output: ${{\mathbb E}\,}[f(g,z)|y]$
Initialization: Compute initial value $g^{(0)}$\
For $k=1$ to $M+M_0$:
1. Sequentially draw the samples $z_i^{(k)}$, $i=1,\,\ldots,\,N$, from $p(z_i|g^{(k-1)},\,y_i;\,\eta)$
2. Draw the sample $g^{(k)}$ from $p(g|z^{(k)};\,\eta)$
Compute $\frac{1}{M} \sum_{k=M_0}^{M+M_0} f(g^{(k)},z^{(k)})$
In Algorithm 1, the parameter $M_0$ is introduced. It represents the number of initial samples to be discarded and is also known as *burn-in* [@meyn2009markov]. In fact, the conditional densities from which those samples are drawn are to be considered as non-stationary, because the associated Markov Chain takes a certain number of iterations to converge to a stationary distribution.
Method 2: sampling from the marginalized posterior of $z$ {#sec:sampling2}
---------------------------------------------------------
Method 1 for sampling allows for computing expected values (with respect to the posterior $p(g,\,z|y;\,\eta)$) of any kind of function $f(g,\,z)$. For the problem under study however, we are particularly interested in computing the expected value (conditional on $y$) of $g$, and of quadratic functions in $g$ and $z$, i.e. $$\label{eq:quadr_f}
f(g,z) = [g^T\,\,z^T] \begin{bmatrix}
A & B^T \\ B & C
\end{bmatrix} \begin{bmatrix} g \\ z \end{bmatrix} \,,$$ for given $A \in \mathbb R^{N \times N}$, $B \in \mathbb R^{m \times N}$, $C \in \mathbb R^{m \times m}$. These type of functions will play a central role in estimating the vector of parameters $\eta$ (see Section \[sec:sysid\_method\]).
The sampling method proposed in this subsection relies on the following result.
\[th:method2\] Let $f(g,\,z)$ be a quadratic function of the type . Then $$\begin{aligned}
\label{eq:th_result}
{{\mathbb E}\,}[f(g,\,z)|y]& = {\mbox{\rm tr}}\{A P_g\} \\ & + \int z^T(H^TAH + 2BH + C)z \, p(z|y;\eta) dz \,, \nonumber\end{aligned}$$ where $P_g$ and $H$ are defined in and .
#### Proof: {#proof .unnumbered}
We have $$\begin{aligned}
& \int f(g,\,z) p(g,\,z|y;\,\eta) \,dg\,dz = \nonumber \\
& \int f(g,\,z) p(g|z;\,\eta) p(z|y;\,\eta) \,dg\,dz = \nonumber \\
& \int \left( \int f(g,\,z) p(g|z;\,\eta)\,dg \right) p(z|y;\,\eta) \,dz \,. \end{aligned}$$ We now focus on the internal integral in the above expression. Developing $f(g,\,z)$ and recalling the first and second moments of $p(g|z;\,\eta)$, given in , we obtain the following terms: $$\begin{aligned}
\int g^TAg \, p(g|z;\,\eta)dg &= {\mbox{\rm tr}}\{AP_g\} + m_g^TAm_g \\ & = {\mbox{\rm tr}}\{AP_g\} + z^TH^TAHz \,, \\
\int z^TBg \, p(g|z;\,\eta)dg& = z^T B m_g = z^T B H z \,, \\
\int z^TCz \, p(g|z;\,\eta)dg & = z^T C z \,.\end{aligned}$$ Combining the three terms yields . $\blacksquare$
A analogous result holds for the computation of ${{\mathbb E}\,}[g|y]$.
\[th:method2\_2\] It holds that $$\begin{aligned}
\label{eq:th_result_2}
{{\mathbb E}\,}[g|y]& = H \int z \, p(z|y;\eta) \, dz \,, \end{aligned}$$ where $H$ is defined in .
Lemmas and state that the posterior expectations of $g$ and of quadratic functions in $g$ and $z$, are equivalent to the expectation of specific functions with respect to the marginalized posterior of $z$ given $y$. This distribution corresponds to a multivariate truncated Gaussian; so, analytical computation of the relative integrals is quite challenging. Computing the integrals by sampling from $p(z|y;\,\eta)$ is instead a viable approach.
An effective technique for sampling from $p(z|y;\eta)$ is again based on the Gibbs sampler. The idea is to iteratively draw samples from the conditional densities $p(z_i|\{z_j\}_{j \neq i},\,y_i;\,\eta)$. Generating samples from these distributions is relatively simple, because they are scalar truncated normal distributions. To see this, first consider the marginal distribution $p(z;\,\eta)$, which is a multivariate normal random vector with zero-mean and covariance matrix $\Sigma_z = \lambda U K_\beta U^T + \sigma^2 I$. Then $$p(z_i|\{z_j\}_{j \neq i};\,\eta) \sim N(m_{z_i},\,P_{z_i})\,,$$ where $$\begin{aligned}
m_{z_i} & = {\mbox{\rm Cov}\,}[z_i,\,\{z_j\}_{j \neq i}] {\mbox{\rm Var}\,}[\{z_j\}_{j \neq i}]^{-1} \label{eq:post_mean_z}\\
& \qquad\qquad \times [z_1\,\ldots z_{i-1}\,z_{i+1}\,\ldots\,z_N]^T \,, \nonumber \\
P_{z_i}& = {\mbox{\rm var}}[z_i] - {\mbox{\rm Cov}\,}[z_i,\,\{z_j\}_{j \neq i}] {\mbox{\rm Var}\,}[\{z_j\}_{j \neq i}]^{-1} \label{eq:post_cov_z} \\
& \qquad \qquad \qquad \times {\mbox{\rm Cov}\,}[z_i,\,\{z_j\}_{j \neq i}]^T \nonumber \,.\end{aligned}$$ Therefore, $p(z_i|\{z_j\}_{j \neq i},\,y_i;\,\eta) \sim N_{q_{k-1}}^{q_k}(m_{z_i},\,P_{z_i})$.
Algorithm 2 summarizes the sampling procedure described in this subsection, for quadratic functions. The same algorithm can be used for computing the posterior expectation of $g$.
**Algorithm 2**: Method 2 for inference\
Input: $\{y_t\}_{t=1}^N,\,\{u_t\}_{t=0}^{N-1},\,\eta$\
Output: ${{\mathbb E}\,}[f(g,z)|y]$
Initialization: Compute initial value $g^{(0)}$\
For $k=1$ to $M+M_0$:
1. Sequentially draw the samples $z_i^{(k)}$, $i=1,\,\ldots,\,N$, from $p(z_i|\{z_j\}_{j \neq i},\,y_i;\,\eta)$
Compute ${\mbox{\rm tr}}\{AP_g\} + \frac{1}{M} \sum_{k=M_0}^{M+M_0} z^{(k)T} (H^TAH + 2BH + C)z^{(k)}$
\[rem:sampling\] The quantities required to compute and can be retrieved from $\Sigma_z^{-1}$. Assume we are interested in generating a sample of $z_1$. To this end, partition $\Sigma_z^{-1}$ as follows $$\Sigma_z^{-1} = \begin{bmatrix}
s_1 & s_{j1}^T \\ s_{j1} & S_j
\end{bmatrix}\,,$$ where $s_1 \in \mathbb{R},\,s_{j1} \in \mathbb{R}^{N-1},\,S_{j} \in \mathbb{R}^{N-1 \times N-1}$. Then $P_{z_1} = 1/s_1$ and $m_{z_1} = -\frac{s_{j1}^T}{s_1}[z_2\,\ldots\, z_{N}]^T$ (see e.g. [@noble1988applied]). This procedure turns out computationally convenient, because it is required to invert $\Sigma_z$ only one time, instead of computing the inversion of $N$ matrices of size $N-1 \times N-1$ (which would be necessary for computing ${\mbox{\rm Var}\,}[\{z_j\}_{j \neq i}]^{-1}$ for any $i = 1,\,\ldots,\,N$).
System identification from quantized output data {#sec:sysid_method}
================================================
In the previous section we have defined an adequate Bayesian framework to describe the problem of identification of systems from quantized output data. We have also presented two methods for inference of functions of $z$ and $g$. In this section, we describe the proposed system identification procedure. It relies on the so called empirical Bayes approach [@Maritz:1989] and consists of the following two steps:
1. Estimate the parameter vector $\eta$ via marginal likelihood maximization;
2. Compute the MMSE estimate of the impulse response, using the estimated parameter vector $\hat \eta$.
In the following we analyze in detail the two steps composing the proposed system identification scheme.
Marginal likelihood estimation of the parameter vector $\eta$
-------------------------------------------------------------
In the empirical Bayes approach, the estimation of $\eta$ is tackled via marginal likelihood maximization, i.e., by computing $$\begin{aligned}
\hat \eta & = \arg \max_{\eta} p(y;\,\eta) \label{eq:marg_lik} \\
& = \arg \max_{\eta} \int p(y,\,g,\,z;\,\eta)\, dg\,dz \,. \nonumber\end{aligned}$$ In the standard (non-quantized) scenario, solving is straightforward because the marginal likelihood admits a closed-form expression [@pillonetto2014kernel]. This does not hold in the problem under study. Therefore, to solve we propose an iterative solution scheme based on the EM method, where we treat $g$ and $z$ as *latent variables* that are iteratively estimated together with the parameter vector $\eta$. Let $\eta^{(n)}$ be the parameter estimate obtained at the $n$-th iteration of the EM method. Then, $n+1$-th update is obtained with the following steps:
(E-step)
: Compute $$\label{eq:estep}
Q(\eta,\,\hat \eta^{(n)}) := {{\mathbb E}\,}\left[\log p(y,\,g,\,z;\,\eta) \right] \,,$$ where the expectation is taken with respect to the posterior density $p(g,\,z|y;\,\hat \eta^{(n)})$, with $\eta$ fixed at the value $\eta^{(n)}$;
(M-step)
: Compute $$\hat \eta^{(n+1)} = \arg \max_{\eta} Q(\eta,\,\hat \eta^{(n)}) \,.$$
We first focus on performing the E-step. It requires the computation of , which corresponds to the integral $$\label{eq:compl_lik_integral}
\int \log p(y,\,g,\, z;\,\eta) p(g,\,z|y;\,\hat \eta^{(n)}) \,dg\,dz \,.$$
\[th:complete\_likelihood\] The complete likelihood admits the decomposition $$\begin{aligned}
-2 \log p(y,\,g,\,z;\,\eta) & = \frac{1}{\sigma^2} f_1(g,\,z) + \frac{1}{\lambda} f_2(g,\,z,\,\beta) \\
& \!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\! + N \log \sigma^2 + \log \det \lambda K_\beta + \log p(y|z,\,g;\,\eta) \nonumber \,,\end{aligned}$$ where $f_1(g,\,z)$ is a quadratic function of the type , with $A = U^TU,\,B = U,\,C = I$, and $f_2(g,\,z,\,\beta)$ is also a quadratic function in $g$ and $z$, with $A = K_\beta^{-1},\,B = 0,\,C = 0$.
#### Proof {#proof-1 .unnumbered}
Using Bayes’ rule we can decompose the complete likelihood as follows $$\begin{aligned}
\log p(y,\,g,\,z;\,\eta)&= \log p(y|z,\,g;\,\eta) \\ & \quad+ \log p(z|g;\,\eta) + \log p(g;\,\eta) \,.\nonumber\end{aligned}$$ The term $p(z|g;\,\eta)$ is a vectorized version of , so that $$\begin{aligned}
\label{eq:log_pz}
\log p(z|g;\,\eta) = -\frac{N}{2} \log \sigma^2 - \frac{1}{2\sigma^2} \|z - U g\|_2^2 \,.\end{aligned}$$ The last term on the right hand side gives $f_1(z,\,g)$. Similarly, $$\log p(g;\,\eta) = \log \det \lambda K_\beta + g^T(\lambda K_\beta)^{-1}g \,,$$ where the last term corresponds to $f_2(z,\,g,\,\beta)$. $\blacksquare$
The proposition reveals the nature of the complete likelihood, which is the summation of terms that are either constant or quadratic functions of $z$ and $g$, plus the term $\log p(y|z,\,g;\,\eta)$. As for this term, we note that $p(y|z,\,g;\,\eta)$ factorizes, each factor being of the type $$\label{eq:py_factor}
p(y_i|z,\,g;\,\eta)\! =\! \left\{ \begin{array}{ll}
\! 1 & \mbox{if } y_i \! = \! s_k \mbox{ and } z_i \! \in \! (q_{k-1},\,q_k] \\
\! 0 & \mbox{otherwise} \end{array} \right.\! .$$ When computing the integral of this term using the sampling mechanisms introduced in Section \[sec:Bayesian\_model\], it is ensured that all the generated samples $z_i^{(k)}$ belong to the interval corresponding to the observed quantized value $y_i$. Hence, when we compute the expectation of $p(y|g,\,z;\,\eta)$ techniques of Section \[sec:Bayesian\_model\], it is ensured that each factor is always equal to 1 and thus $\log p(y|g,\,z;\,\eta) = 0$. Therefore, computing reduces to computing the expectation of two quadratic functions, and this can be done using both the sampling mechanisms introduced in Section \[sec:Bayesian\_model\]. We denote by $\hat f^{(n)}_1$ and $\hat f^{(n)}_2(\beta)$, respectively, the expected value of $f_1(g,\,z)$ and $f_2(g,\,z,\,\beta)$ at the $n$-th iteration of the EM method (i.e., when the $\eta^{(n)}$ of the parameter vector is available). Neglecting constant terms, we have $$\begin{aligned}
-2Q(\eta,\,\hat \eta^{(n)}) & = \frac{1}{\sigma^2} \hat f^{(n)}_1 + \frac{1}{\lambda}\hat f^{(n)}_2(\beta) \\
& \quad + N \log \sigma^2 + \log \det \lambda K_\beta \,. \nonumber\end{aligned}$$
\[th:m-step\] Let $$h(\beta) := m \log \hat f^{(n)}_2(\beta) + \log \det K_\beta\,.$$ Then the EM update $\eta^{(n+1)} = [\lambda^{(n+1)}\, \beta^{(n+1)}\, \sigma^{2(n+1)}]$ is obtained as follows: $$\begin{aligned}
\beta^{(n+1)} & = \arg \min_{\beta \in (0,\,1]} h(\beta)\,, \label{eq:betag_update}\\
\lambda^{(n+1)}& = m^{-1} \hat f^{(n)}_2(\beta^{(n+1)}) \label{eq:lambdag_update}\,, \\
\sigma^{2(n+1)}& = N^{-1} \hat f^{(n)}_1 \,. \label{eq:sigma_update}\end{aligned}$$
#### Proof {#proof-2 .unnumbered}
Differentiating $-2 Q(\eta,\,\eta^{(n)})$ with respect to $\lambda$, one obtains that the minimum, as a function of $\beta$, is achieved at $\lambda^* = m^{-1} \hat f^{(n)}_2(\beta)$. Inserting this value into $-2 Q(\eta,\,\eta^{(n)})$ yields $h(\beta)$, so that and follow. Finally, it is straightforward to see that is the minimizer of $-2 Q(\eta,\,\eta^{(n)})$. $\blacksquare$
The M-step results in a series of computationally attractive operations. The kernel scaling hyperparameter $\lambda$ and the noise variance $\sigma^2$ admit a solution in closed form. The shaping hyperparameter $\beta$ is updated solving a simple scalar optimization problem. This problem can be further simplified by using a factorization of the first-order stable spline kernel, see [@bottegal2016robust] for details.
MMSE estimate of the impulse response
-------------------------------------
Having an estimate $\hat \eta$ available, the MMSE estimate of $g$ corresponds to $$\begin{aligned}
\hat g & := {{\mathbb E}\,}[g|y] = \int g\, p(g|y;\,\hat \eta)\, dg \label{eq:int_1}\\
& = \int g\, p(g,\,z|y;\,\hat \eta) \,dg\,dz \,. \label{eq:int_2}\end{aligned}$$ Again, this quantity can be computed using both the sampling methods described in the previous section.
We summarize the overall procedure for system identification from quantized data in the following algorithm.
**Algorithm 3**: System identification with quantized output measurements\
Input: $\{y_t\}_{t=1}^N,\,\{u_t\}_{t=0}^{N-1}$\
Output: $\{\hat{g_t}\}_{t=1}^m$
Initialization: Set an initial value of $\hat \eta^{(0)}$\
Repeat until convergence:
1. E-step: Compute $Q(\eta,\,\eta^{(n)})$ using Algorithm 1 or Algorithm 2
2. M-step: update $\hat \eta^{(n+1)}$ according to Proposition \[th:m-step\]
Compute $\hat g$ using Algorithm 1 or Algorithm 2
The initial value $\hat \eta^{(0)}$ can be set either randomly or by using values of the kernel hyperparameters and noise variance returned by the standard nonparametric method for non-quantized data (see [@SS2010]).
Which sampling method?
----------------------
Algorithm 3 for quantized system identification works with both the sampling methods presented in Section \[sec:Bayesian\_model\], because it requires the computation of the posterior expectation of quadratic functions of the type and of $g$. Choosing the sampling method depends on the user requirements. Method 1 allows for any type of inference and therefore it can be used to compute useful statistics such as confidence intervals on the estimate of $g$ and quantile estimation. On the other hand, Method 2 requires sampling only from $p(z|y,\,\eta)$; if implemented properly (see Remark \[rem:sampling\]), this method is expected to have a faster convergence to the required expectations. The experiments presented in the next section show that the two sampling methods substantially give the same performance in terms of accuracy in reconstructing the true impulse response.
Numerical experiments {#sec:experiments}
=====================
We test the proposed technique by means of 2 Monte Carlo experiments of 100 runs each. For each Monte Carlo run, we generate an impulse response by picking 10 pairs of complex conjugate zeros with magnitude randomly chosen in $[0,\,0.99]$ and random phase and, similarly, 10 pairs of complex conjugate poles with magnitude randomly chosen in $[0,\,0.92]$ and random phase. The obtained impulse response is rescaled in order to have a random $\ell_2$-gain in the interval $[2,\,4]$. The goal is to estimate $m=50$ samples of this impulse response from $N$ input-output data. The input sequences are realizations of white noise with unit variance. We compare the following estimators.
- **KB-GS-1**: This is the method described in this paper, making use of the sampling technique of Section \[sec:sampling1\] (Algorithm 1). The parameter $M$, denoting the number of samples generated by the sampler, is set to $100$ for each iteration of the EM method, and to $500$ for the final computation of $g$ (last step of Algorithm 3). The burn-in phase consists of $M_0 = 100$ samples. Convergence of the EM method is established by a threshold on the relative difference of the current and previous parameter estimates, i.e. the method stops if the condition $$\frac{\|\eta^{(n+1)} -\eta^{(n)}\|_2^2}{\|\eta^{(n)}\|_2^2} \leq 10^{-3}$$ is satisfied. In our simulations, we have verified that our choice of $M$ was adequate to guarantee a good degree of approximation (the reader interested in convergence diagnostics is referred to, e.g., [@gelman2014bayesian Ch. 11.4]).
- **KB-GS-2**: This is the method described in this paper, making use of the sampling technique of Section \[sec:sampling2\] (Algorithm 2). The algorithm settings are the same as the previous method.
- **KB-St.**: This is the standard nonparametric kernel-based method proposed in [@SS2010] and revisited in [@ChenOL12]. It is not designed for handling quantized data. The kernel adopted for identification is . The kernel hyperparameters are estimated by marginal likelihood maximization, while $\sigma^2$ is estimated via least-squares residuals.
- **KB-Or.**: Same as KB, with the difference that in this case the vector $z$ is available to the estimator. Hence, this estimator is regarded as an Oracle.
- **ML-GS**: This is the method proposed in [@godoy2011identification], based on maximum likelihood identification of the impulse response, namely $$\label{eq:MLFIR}
\hat g = \arg \max_{g,\,\sigma^2} p(y;\,g,\,\sigma^2) \,.$$ To solve the likelihood problem, a scheme based on the EM method is proposed. In our implementation, the E-step of the EM iterations is computed using the Gibbs sampler (in contrast, [@godoy2011identification] proposes a scenario-based approach). The length of $g$ is also set to 50, while the convergence is established by using the same conditions as the estimator KB-GS-1.
- **MAP-GS**: This is the method proposed in [@chen2012impulse], based on maximum-a-posteriori (MAP) identification of the impulse response, namely $$\label{eq:MAPFIR}
\hat g = \arg \max_{g} p(y|g;\,\sigma^2) p(g;\,\lambda,\,\beta) \,,$$ where the prior $p(g;\,\lambda,\,\beta)$ corresponds to . Again, an EM solution scheme based on the Gibbs sampler is employed to solve this problem, setting $m=50$, while the convergence is established by using the same conditions as the estimator KB-GS-1. To facilitate hyperparameter and noise variance tuning, we plug those that are estimated by the method KB-Or., which has access to the non-quantized output $z$.
The performance of the estimators is evaluated by means of the fitting score, computed as $$FIT_i = 1-\frac{\|g^i - \hat g^i \|_2}{\|g^i\|_2} \,,$$ where $g^i$ is the impulse response generated at the $i$-th Monte Carlo run and $\hat g^i$ the estimate computed by the tested methods.
Binary quantizer
----------------
The first experiment considers the following binary quantizer $$\mathcal Q_b [x] := \left\{ \begin{array}{ll} 1 & \mbox{ if } x \geq 1 \\ -1 & \mbox{ if } x < 1 \end{array} \right.\,.$$ For each Monte Carlo run, the noise variance is such that $\frac{{\mbox{\rm var}}(Ug) }{\sigma^2} = 10$, i.e. the ratio between the variance of the noiseless (non-quantized) output and the noise is equal to 10. If $\sigma^2 > 2$, the system is discarded. We generate $N = 500$ data samples.
[![*Box plots of the fitting scores for the binary quantizer experiment.*[]{data-label="fig:bin_exp"}](fig_ceil_500_2GS_rev1_swap-eps-converted-to "fig:"){width="\columnwidth"}]{}
Figure \[fig:bin\_exp\] shows the results of the Monte Carlo runs. The advantage of using the proposed identification scheme, compared to the method that does not account for the quantizer, is evident. Despite the large loss of information caused by the quantizer, the proposed method gives a fit which is quite comparable to the oracle method (KB-Or.). The proposed sampling mechanisms yield nearly equivalent performance. Furthermore, there seems to be a substantial advantage in using a Bayesian approach compared to the non-regularized estimator ML-GS, which is tailored for short FIR systems rather than IIR systems. The high number of coefficients to be estimated inevitably leads to high variance in the estimates. If this effect is not suitably alleviated by regularization (i.e., introducing a “good” bias), the performance of the estimator is doomed to be poor. Finally, the proposed estimators, based on computing the MMSE estimate of the impulse response, outperform the estimator MAP-GS, which is based on computing the MAP estimate of the impulse response.
Ceil-type quantizer
-------------------
In the second experiment we test the performance of the proposed method on systems followed by a ceil-type quantizer, which is defined as $$\mathcal Q_c [x] := \lceil x \rceil \,.$$ Again, for each Monte Carlo run, the noise variance is such that $\frac{{\mbox{\rm var}}(Ug) }{\sigma^2} = 10$. We generate $N = 200$ data samples.
As shown in Figure \[fig:ceil\_exp\], in this case, if one compares the oracle-type method (i.e. KB-Or.) with the same method using quantized data (KB-St.), the loss of accuracy is relatively low. This is because this type of quantizer has a mild effect on the measurements. It can be seen, however, that the proposed methods are able to give a fit that is comparable to the oracle KB-Or., regardless of the employed sampling method. We notice also that the Bayesian approach has a major impact on the performance, as seen by the gap in the performance between ML-GS and the other estimators.
[![*Box plots of the fitting scores for the ceil-type quantizer experiment.*[]{data-label="fig:ceil_exp"}](fig_bin_500_2GS_rev1_swap-eps-converted-to "fig:"){width="\columnwidth"}]{}
Conclusions
===========
In this paper, we have introduced a novel method for system identification when the output is subject to quantization. We have proposed a MCMC scheme that exploits the Bayesian description of the unknown system. In particular, we have shown how to design two integration schemes based on the Gibbs sampler by exploiting the knowledge of the conditional probability density functions of the variables entering the system. The two sampling techniques can be used in combination with the EM method to perform empirical Bayes estimation of the kernel hyperparameters and the noise variance. We have highlighted, through some numerical experiments, the advantages of employing our method when quantizers affect the accuracy of measurements.
As a final remark, we note that the cascaded composition of a linear LTI dynamic system followed by a static nonlinear function is known in system identification as a *Wiener system* [@giri2010block], [@hagenblad2008maximum]. However, in Wiener systems the nonlinear function is generally assumed unknown, so a direct extension of the method proposed in this paper to general Wiener systems does not appear immediate, and would require the use of more involved and MCMC techniques (see, e.g., [@lindsten2013bayesian]).
[^1]: All the results obtained in this paper can be also extended to the case $m=\infty$ but we prefer to consider a finite value for $m$ to simplify exposition. In addition, the assumption $m<N$, with $N$ the data set size, is typical of the system identification scenario.
| 2023-12-16T01:27:15.642919 | https://example.com/article/4198 |
This exploratory study will test a model of residential population density effects on humans. It claims that density in a local area ("Neighborhood") or household influences attitudes and social behavior only if perceived as potentially stressful. Perceptions are a crucial intervening variable between objective environmental conditions and response to them. Second, the model claims that people respond to crowding in two important ways not identified in classical models: 1) by changing their cognitions of local environment and people in it (for example, using "crowded" and "open" to distinguish features of their block and neighborhood) and 2) by adjusting social contact to reduce the feeling of crowding in one's area. Classical models predict abnormal social behaviors and some emotions as consequences of high population density. A sample of residents in two areas of Baltimore will be interviewed about their objective density conditions, perceptions of crowding, feelings of control over environment and opportunities to alleviate crowding, environmental and social cognitions (which may reveal density as an important element), objective social ties, and attitudes about neighborhood residents. The sample sites are chosen to be similar in socioeconomic, ethnic, and housing characteristics, but dissimilar in area population density. An innovative aspect of the interview is a version of the Kelly Repgrid procedure, to measure environmental and social cognitions pertinent to the local area. | 2024-07-31T01:27:15.642919 | https://example.com/article/4444 |
Q:
GCC 4.8 inserts version 4 in a compilation unit header even with -gdwarf-2
I compiled an application with GCC 4.8 and I'm trying to debug it on an older system that does not have GDB 7.5+ (which supposedly added support for DWARF-4). Upgrading GDB on that system is not an option. I can't debug it because GDB outputs the following message:
Dwarf Error: wrong version in compilation unit header (is 4, should be 2) [in module a.out]
I tried compiling with -gdwarf-2 -gstrict-dwarf as suggested in other questions but the compiler keeps inserting a couple of compilation unit headers with version 4:
/tmp> readelf --debug-dump=info a.out | grep -A2 'Compilation Unit @'
readelf: Warning: CU at offset 6b contains corrupt or unsupported version number: 4.
readelf: Warning: CU at offset 1eb contains corrupt or unsupported version number: 4.
Compilation Unit @ offset 0x0:
Length: 0x67 (32-bit)
Version: 2
--
Compilation Unit @ offset 0x6b:
Length: 0x84 (32-bit)
Version: 4
--
Compilation Unit @ offset 0xf3:
Length: 0x62 (32-bit)
Version: 2
--
Compilation Unit @ offset 0x159:
Length: 0x8e (32-bit)
Version: 2
--
Compilation Unit @ offset 0x1eb:
Length: 0x136 (32-bit)
Version: 4
--
Compilation Unit @ offset 0x325:
Length: 0x62 (32-bit)
Version: 2
This happens even if you compile a minimal C program as follows:
/home/MuchToLearn/src> cat main.c
int main(void)
{
return 0;
}
/home/MuchToLearn/src> gcc -gdwarf-2 -gstrict-dwarf main.c
Am I missing something here? What's the point of having the -gdwarf-2 option if it's not going to generate binaries that can be debugged by older GDB versions that only support DWARF-2?
Edit: Employed Russian's answer is correct. The version-4 compilation units were coming from /usr/lib/crt1.o and /usr/lib/libc_nonshared.a. To fix the issue, I copied them into a local directory and removed their debugging symbols with strip -g. Then, I linked the executable as follows:
ld -o main -dynamic-linker /lib/ld-linux.so.2 crt1.o /usr/lib/crti.o main.o /lib/libc.so.6 libc_nonshared.a /usr/lib/crtn.o
The resulting executable does not contain any version-4 compilation units and GDB stopped complaining about that.
A:
This happens even if you compile a minimal C program as follows:
Even this minimal program will statically link parts of libc (namely, crt1.o, crtbegin.o, etc.).
You should verify that the compilation units that have version 4 are really coming from your program, and not from a library (just look at their DW_AT_name and DW_AT_comp_dir).
My gcc-4.8: gcc (Ubuntu 4.8.4-2ubuntu1~14.04) 4.8.4 produces version 2 when I ask it to:
gcc -g -c t.c
readelf -wi t.o | grep -A2 'Compilation Unit'
Compilation Unit @ offset 0x0:
Length: 0x4e (32-bit)
Version: 4
gcc -gdwarf-2 -c t.c
readelf -wi t.o | grep -A2 'Compilation Unit'
Compilation Unit @ offset 0x0:
Length: 0x52 (32-bit)
Version: 2
If the version 4 objects are really just crt1.o or similar, note that you can safely run strip -g on these objects -- you will not lose much (unless you have to debug libc startup issues, which is unlikely).
| 2024-07-29T01:27:15.642919 | https://example.com/article/7588 |
Sometimes I get Joel to draw me something besides squads of Legion characters. Not often, but sometimes. I've been wanting an OMAC commission from Joel for a while, and decided to ask for the most recent take on the character since I've already seen Joel's version of the Jack Kirby OMAC a few times. And of course, Joel did not disappoint. His OMAC is ready to rumble and crackling with Kirby energy. I especially love the energy streams from the Mohawk. Now everyone go give Joel your money so that he can draw some awesome things for you!
If you like this piece then please do go buy some books featuring Joel's work in either physical or digital format and/or go commission him yourself. | 2024-02-06T01:27:15.642919 | https://example.com/article/2687 |
Cosplay Contest
Anime Blues Con 7 Cosplay Contest
NOVICE – If you’re new cosplaying and crafting your own costumes in general, this is the category for you.
JOURNEYMAN -Have a couple of cosplay contest wins under your belt? Or maybe you’ve been sewing for a few years and you finally decided to enter into cosplay? This is the category for you.
MASTER – This category is for those cosplayers who are extremely talented and have the awards and craftsmanship experience to prove it.
EXHIBITION – Maybe you haven’t quite worked out how to sew but you’re really talented at assembling pieces together to create a costume? Or maybe you just want to enter for fun? This category is for people who either aren’t eligible for a craftsmanship award or they just want to enter the contest for the fun of it.
GROUP – This category is for those brave souls who manage to get all their friends coordinated in a themed cosplay group! If you’re a group of two or more, you are eligible to enter this category.
AWARD CATEGORIES
Best in Show (Craftsmanship Only)
Best Closet Cosplay
Best in Class (Craftsmanship Only)
Best Original Design
Best Group
Most Creative Use of Materials
Judge’s Choice
Best Armor (Craftsmanship Only)
Best Wig (Craftsmanship Only)
Best Makeup
Best Prop (Craftsmanship Only)
Best Stage Presence
Best Female Character
Best Up and Coming Cosplayer
Best Male Character
Best “Larger Than Life” Costume
ENTRY GUIDELINES
You must have a valid Anime Blues Con badge in order to participate
Costumes that have won Craftsmanship awards (including Group) at other conventions or past Anime Blues Con’s are prohibited from entering as anything other than Exhibition.
Entrants that have won performance/skit based awards can still enter with those costumes.
Purchased costumes may only be entered as an Exhibition entry. Commissioned costumed may only be entered into the craftsmanship categories if the creator is present for judging.
Contestants must have made over 60% of their costume and props to be eligible to compete as anything other than Exhibition. Entrants in the Kids Individual category are exempt from this rule.
Children entering in the Kids Individual category must be accompanied by an adult or guardian
Exhibition costumes will not be eligible for a craftsmanship awards
All costumes and props must be made by at least one member of the group to qualify for craftsmanship judging.
RULES AND REGULATIONS
All judging will be done before the Contest, off-stage. The detailed criteria and weighting of scores are completely up to the judges.
The judging is only guaranteed for the first 50 entrants signed-up at the convention. Groups count as 1 entrant and only need to fill out one form. Stand-by entrants will only be judged if time permits. Remember we operate on a first come, first served basis. Pre-judging time and dates are TBA.
To be judged for accuracy, a visual reference MUST be turned in with the application. Reference pictures must be on paper. Computer or cell phone images are not allowed. Progress photos are also allowed and highly encouraged in order to display in more detail the process of creation. You may not be eligible for accuracy points if the judges are not familiar with your character. References submitted will not be returned.
Contestants will have time to walk across the stage and strike three poses for the audience at the Catwalk.
You must attend the judging session and Contest in the costume you’re entering.
All costumes and props must conform to Anime Blues Con’s behavior, safety, and prop weapon policies.
Costumes must be self-contained and self-sufficient. Connections to electrical outlets will not be available
No nudity – Save that for the Adult Track! No profane, political, disruptive, or religious statements during the catwalk. This includes messages on signs or clothes.
Do not use any sort of projectile at all! Nothing may leave your person while you are on the stage.
For the safety of the contestants, no jumps, kicks, flips, or acrobatics of any kind may be performed on staged. No flashpots, explosive devices, or similar special effects are to be used.
Entrants with large elaborate costumes may bring handlers to assist them onto, across, and off the stage. Anime Blues Con will have staff on hand to assist as well.
Anime Blues Con, unfortunately, cannot secure or hold any personal items for contestants who take part in the Contest. The staff recommends you leave your bags, merchandise, ID’s, keys, and wallets with a trusted friend or family beforehand.
If any contestant becomes unruly and disrupts or interferes with the Costume Contest at any time, they will be disqualified and asked to leave. If they continue to be disruptive, their convention badge and membership will be revoked and security will escort them from the premises. | 2023-08-07T01:27:15.642919 | https://example.com/article/1360 |
MILWAUKEE - We talk about the continued lame duck session fallout, including Wisconsin not being among the two dozen states reaching a tentative settlement agreement against opioid seller Purdue Pharma.
We also discuss the party of Trump’s alignment behind right-winger Tom Tiffany in the CD 7 special election, the Milwaukee Journal-Sentinel slamming Speaker Vos and Rep. Nygren for charging open records requesters exorbitant fees, and the Foxconing of UW-Madison. We review new NPR/Marist presidential primary polling and preview Thursday’s debate. We welcome Citizen Action co-op member State Representative Jodi Emerson to discuss her first year as a state legislator.
http://newiprogressive.com/images/stories/S5/electrical-workers-s5.jpgSen. Smith talks about his upbringing in Eau Claire and the impact of organized labor in the community. Leaders before us worked to put protections in place for workers, but there’s still more to do. | 2024-06-02T01:27:15.642919 | https://example.com/article/8185 |
Q:
Can anyone explain this structure in C?
I have this code
#define MAX_DIM 3
struct kd_node_t
{
double x[MAX_DIM];
struct kd_node_t *left, *right;
};
struct kd_node_t wp[] = {
{{2, 3}}, {{5, 4}}, {{9, 6}}, {{4, 7}}, {{8, 1}}, {{7, 2}}
};
I dont understand the structure declaration in this case.Please help me out
A:
This is using brace initialiation.
The array gives a comma separated list initializing each struct in the array (if an explicit size were given, remaining structs would be zero initialized, I believe).
Since they're all similar, just take the first one, {{2,3}}.
This has a single element, {2,3} which tells you how to initialize the x member. Since only two values are specified, the remainder will be zero initialized, giving [2,3,0]. Likewise, left and right are intialized to null pointers.
The rest of the structs in the array are initialized similarly.
| 2024-01-16T01:27:15.642919 | https://example.com/article/8242 |
, u, k?
u
Let z = 0.44 + 0.06. Let u = -0.6 + z. Which is the third biggest value? (a) u (b) 1 (c) 1/6
a
Let t(r) = r**2 + 4*r + 1. Let d be t(-3). Let y = 5 + -17. Let i = y - -17. Which is the second smallest value? (a) i (b) d (c) 0.3
c
Let m = 40 - 121/3. Let p be 2/5 + 23/5. Which is the third smallest value? (a) -2/5 (b) m (c) p
c
Let f = 20.1 - 20. Which is the biggest value? (a) 2 (b) -0.3 (c) -0.4 (d) f
a
Let g = -18 + 17.935. Let a = -4.165 - g. Let t = a + 0.1. What is the second smallest value in 5, t, 1/4?
1/4
Let q = 6 + -5.6. Let t = q - 0.8. Let r be (1 + (-6)/10)*-5. Which is the third smallest value? (a) -0.3 (b) r (c) t
a
Let z = 77 - 925/12. Let j = -5 + 1. Let i = 9 + j. Which is the biggest value? (a) -3/2 (b) i (c) z
b
Let h be (-1)/(-3) - (-4)/(-76 - 8). Let k = -81/20 + 17/4. What is the third biggest value in k, h, -1?
-1
Let v = 87 - 91. What is the second biggest value in -0.09, v, 5?
-0.09
Let z(t) = t**2 - 9*t + 4. Let l be z(9). Let h be (1/7)/(l/(-8)). What is the third smallest value in h, -5, -4?
h
Let c = -6 - -9. Let g = 6 - c. Let n = g + -5. What is the second smallest value in n, 0, 0.4?
0
Let g be (1/(-3))/((-1)/18*16). What is the biggest value in -0.2, 0, g?
g
Let d(u) = -2*u - 6. Let l be d(-6). Suppose 2*q - l = -0*q. Which is the smallest value? (a) -0.4 (b) -0.5 (c) q
b
Let t = -0.3 - 0.7. Let l = -1 - -7. Let o = -10 + l. Which is the second smallest value? (a) o (b) 5 (c) t
c
Let v = -0.7 + -0.3. Let s = -17 - -21. Which is the second smallest value? (a) 0.5 (b) s (c) v
a
Suppose 0 = 3*v - v - 2. Suppose 2*g + y = 3*g, 5*g = -5*y + 20. Let b be g/(-19) + 0/v. What is the third biggest value in 0, -1/2, b?
-1/2
Let v = 0.1 + -0.6. Let n = 28.6 + -29. Which is the smallest value? (a) n (b) -5 (c) v
b
Let i = 0.02 + -2.02. Let r = 5 + i. Let k = -93.6 + 94. Which is the second biggest value? (a) -1 (b) r (c) k
c
Let h = 3381/3790 - -3/379. Let v = h + -2/5. Which is the third biggest value? (a) 5 (b) v (c) 1
b
Let r = 0 + 3. Suppose -r*s - 1 = -x - 8, -2*s = -4*x + 12. Let z = -9 + x. Which is the second biggest value? (a) z (b) -1 (c) 1
b
Let h = 19 + -15. Let z = -4/9 + 5/9. Which is the smallest value? (a) h (b) 2/3 (c) z
c
Let t be -1 + 4 + -6 - 1. Which is the third biggest value? (a) t (b) -7 (c) -1/4
b
Let u = -1.3 + 1. What is the smallest value in 3, u, 1/7?
u
Let y = -12 - -14.3. Let o = y - 0.3. Let i = 2 + -1.8. Which is the second smallest value? (a) i (b) o (c) -5
a
Let u = -14 + 31. Let k = u + -12. Which is the second smallest value? (a) 2/3 (b) k (c) 4
c
Let j = -30 - -30. Let n = -142 - -1560/11. What is the third biggest value in n, j, -3?
-3
Let c be 2/((-10)/(-3)) + (-77)/70. What is the smallest value in -1, 0.3, c, 2?
-1
Let g = 0.06 - 2.06. Let b = 2.01 + g. Let n = b - 0.21. What is the second biggest value in n, -4, -3?
-3
Let q be 18/7 + (-9)/(-21). What is the biggest value in 2/7, 0.3, q?
q
Let f = -0.2 + -0.3. Let j = -0.8 + 0.3. Let d = j - -0.9. Which is the third biggest value? (a) f (b) d (c) 3
a
Let b = -8.82 - 0.18. What is the third biggest value in 0.4, b, 4?
b
Let o = 0.2 + -0.1. Let h(i) = -4*i + 2. Let d be h(-4). Let k be (1 - 1) + (-3)/d. Which is the second biggest value? (a) k (b) o (c) -2
a
Suppose 0 = o - 3*o + 4. Suppose -3*w = 5*h - 15, 3*h - 11 + 2 = 0. What is the smallest value in 0.5, w, o?
w
Let v be 6/(-15) + (-66)/10. Let j be (1/v)/((-1)/933). Let o = j + -133. What is the third smallest value in o, 1/3, -5?
1/3
Let u = -12 - -7. Let x = -0.24 - -0.14. Which is the second smallest value? (a) u (b) x (c) -4
c
Let k = 23 - 30. What is the second smallest value in -3/4, 2, k, 0.2?
-3/4
Let h be 8/(-44) - (-2098)/1980. Let s = 11/10 - h. What is the biggest value in 4, -5, s?
4
Let o(l) = -5*l + 54. Let m be o(10). Let t = -4 + 6. Which is the third smallest value? (a) t (b) -0.5 (c) m
c
Let q = 18 + -71/4. What is the smallest value in q, 2, -1/4?
-1/4
Let r = 58 - 57. Which is the third biggest value? (a) 3 (b) -9 (c) -3 (d) r
c
Let t = -376654/7 - -53951. Let p = -143 + t. What is the smallest value in p, 6, 5?
p
Let x be (-1 - -1)/(2/(-2)). Let u be 0*-1*(-1 - x). Let l = u - 2. What is the third smallest value in 2/3, 4, l?
4
Let h = -7 + 5. Let v = -17 + 18. What is the second biggest value in h, -1, v?
-1
Let i = -109/56 + 11/7. Which is the fourth smallest value? (a) i (b) 0.3 (c) -0.1 (d) 1/4
b
Suppose 2*n + 0*n = 8. Let m be n*(-3)/(6*1). Let c be m/(-6)*2/(-1). What is the third smallest value in c, 0.2, 0.3?
0.3
Suppose 0*z = -2*z + 60. Let c be (-2)/(-90) - (-6)/z. What is the third biggest value in 0.5, -0.1, c?
-0.1
Let d = 0.21 - -11.79. Let q = -1.5 + 18.5. Let g = d - q. Which is the biggest value? (a) -3/8 (b) 2/7 (c) g
b
Let f = -127.5 - -127. Let g be (2/6)/(7/3). Which is the third biggest value? (a) 0.1 (b) g (c) f
c
Let k be (2 - -2 - -1)*1. Suppose -4*o - 5*w + 0*w = 36, 5*o - k*w = 0. What is the third smallest value in -2/17, o, -3?
-2/17
Let n(k) = k**2 + 12*k + 9. Let s be n(-11). Which is the third biggest value? (a) 4 (b) 3 (c) s
c
Let u = -4 + 4.02. Let v = u - 0.12. Which is the third smallest value? (a) 3/2 (b) 1/2 (c) v
a
Let l = 1.05 + -1. Let o = -0.05 - l. Let h = -0.1 + 0.6. What is the second biggest value in o, -0.2, h?
o
Let c = -1/3 + 5/9. Let r be (-20)/90 + 3/((-135)/(-28)). What is the second smallest value in r, -2/7, c?
c
Let j = -183 + 1646/9. Let x = -0.3 + -0.2. Let q be 2/(-10) + 8/15. What is the third smallest value in j, q, x?
q
Let f = -2.1 + 2.1. What is the smallest value in 0.5, -0.01, f?
-0.01
Let q = -0.04 - 0.36. Let w = 21.2 + -23. Let k = 1.2 - w. What is the third biggest value in q, -1, k?
-1
Let n = -49 + 46. What is the second biggest value in n, 0.1, -1, 2/3?
0.1
Let w = 1523/13 + -117. Let t = 0.2 - 0.1. What is the biggest value in -0.2, t, w?
w
Let q = 78 - 73. What is the smallest value in 3, -0.4, 2/11, q?
-0.4
Let g be (-3)/2*6/(-9). Let u be 2/(g/(3/2)). What is the third biggest value in 0.5, u, -2?
-2
Let j = -9 - -21. Let v = -15 + j. What is the third biggest value in v, 5, 0?
v
Let d = 15 + -20. What is the second biggest value in -4, d, 1?
-4
Let h(v) = -3*v**2 - 6*v - 3. Let s be h(-2). Which is the fourth smallest value? (a) 0.2 (b) s (c) 2 (d) -2
c
Let o(b) = -b**2 + 3*b + 3. Let l be o(4). Let q = -52 - -52.4. What is the biggest value in l, 2/11, q?
q
Let b = -0.11 + 11.11. Let m = -15 + b. What is the smallest value in m, -5, -1?
-5
Let j = 7 - 5. Let l = 2.5 - -0.5. What is the biggest value in j, l, -5?
l
Let p = 31.6 - 32. What is the third biggest value in 3, p, -2/11?
p
Let d(t) = t - 6. Let f be d(4). What is the third biggest value in 0, f, 4?
f
Let v = -0.12 + -7.88. Let i = -5 - v. What is the third biggest value in i, 1/3, -1?
-1
Let v be -1 + (-14)/(-3) + -2. Which is the smallest value? (a) v (b) 1 (c) -1/11
c
Let h = -0.05 + -4.95. Let r be (-14)/6*14/(-49). Which is the biggest value? (a) h (b) r (c) 4
c
Let y = 0.1 - 0.5. Suppose -r = -3 - 3. Let v be (-3)/(-14) + r/(-12). Which is the third smallest value? (a) -0.3 (b) v (c) y
b
Let z = -2.7 + 3. Let s = 2 - 5. Which is the smallest value? (a) 2/7 (b) z (c) s
c
Let u = -18 + 22. Let p = 132 - 662/5. Let j = 3.04 + -0.04. Which is the third smallest value? (a) j (b) u (c) p
b
Let i = -3683/8 - -459. Let g = -15/8 - i. Which is the second smallest value? (a) -2 (b) g (c) 1/9
b
Let k = -0.1 + -0.9. Let o = k + -1. Let m = 94 + -94.2. Which is the second biggest value? (a) m (b) 0.2 (c) o
a
Let m = -0.5 - -0.3. Let j = -2.8 + m. Let n = 1.9 - 2. Which is the second biggest value? (a) j (b) 0.5 (c) n
c
Let l = 54 + -272/5. Let y = -5 + 5.4. Let p = y - 0.5. Which is the second smallest value? (a) 4/3 (b) p (c) l
b
Let w = 534 - 1588/3. Which is the third smallest value? (a) -4 (b) -0.4 (c) w
c
Let u = -6 - -5. What is the second biggest value in 1, -2, u, -0.3?
-0.3
Let d be 12/(-10)*10/27. Let x = -0.06 + 2.06. What is the third smallest value in d, x, -2?
x
Let y = 2/39 + 68/195. Which is the second biggest value? (a) -1 (b) -0.5 (c) 4 (d) y
d
Let n(o) = -o**3 - 2*o**2 - 2* | 2024-03-18T01:27:15.642919 | https://example.com/article/4581 |
Nearly half of young men reported being the victim of sexual coercion in a new study, showing that despite popular beliefs, men can also be the targets of abuse. The stereotypical man is tough and reserved with his emotions. A “man’s man” has a beard, drinks beer, and keeps his feelings to himself. The one thing men don’t do is talk about being the victims of sexual abuse. There are many reasons why, including the common myth that men can only be the perpetrators of sexual coercion, not the victims. Here Are the Top Health Risks for Men »
Half of Young Men Report Being Victims of Sexual Coercion A recent study in the journal Psychology of Men and Masculinity highlights a serious issue that rarely receives attention: young men being coerced into sexual contact. Surveying 284 high school and college students, researchers at the University of Missouri found that 43 percent were victims of unwanted sexual experiences. In 95 percent of those cases, women were reportedly the aggressors. Of those cases, 18 percent were coerced by physical force, 31 percent verbally (such as threatening to break up with him if he didn’t go along), and 26 percent by unwanted sexual seduction via behaviors like unwanted fondling. Seven percent of the men reported that the coercion was performed after they were given alcohol or drugs. Half of the students said their sexual assaults led to intercourse and 10 percent said sex was attempted. The other 40 percent said their experience involved kissing or fondling. Lead study author Bryana H. French, a sexual health professor at the University of Missouri, said their research could help to boost abuse prevention efforts by, among other things, challenging our assumptions about who can and cannot be the target of abuse. “Sexual victimization continues to be a pervasive problem in the United States, but the victimization of men is rarely explored,” she said in a statement. Learn How to Help Maintain Your Child’s Mental Health »
The Effects of Sexual Coercion on Men “While not typically addressed in sexual violence research, unwanted seduction was a particularly pervasive form of sexual coercion in this study, as well as peer pressure and a victim’s own sense of an obligation,” French said. “Seduction was a particularly salient and potentially unique form of coercion for teenage boys and young men when compared to their female counterparts.” Early sexual trauma has been linked to later risky sexual behaviors, depression, suicide, alcohol and drug use, and a host of potentially deadly side effects. Unlike women, however, men who are victims of sexual coercion don’t appear to have self-esteem issues after the events. “It may be the case that sexual coercion by women doesn’t affect males’ self-perceptions in the same way that it does when women are coerced,” French said. “Instead, it may inadvertently be consistent with expectations of masculinity and sexual desire, though more research is needed to better understand this relationship.” The researchers did not factor in more extreme examples of child abuse, including experiences in which a family member was the perpetrator. Read About 7 ‘Women’s’ Diseases Men Should Watch Out For » | 2023-09-30T01:27:15.642919 | https://example.com/article/5583 |
//
// Generated by class-dump 3.5 (64 bit).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard.
//
#import <Foundation/NSObject.h>
@class NSDictionary, NSLock, NSMutableArray, NSTimer;
@interface VSCacheUpdateListener : NSObject
{
NSLock *_lock;
NSMutableArray *_updateRequestQueue;
NSDictionary *_dataProviders;
NSTimer *_flushTimer;
_Bool _isListening;
}
+ (id)sharedListenerIfExists;
+ (id)sharedListener;
- (void)_flush;
- (void)_enqueueRequest:(id)arg1;
- (void)_spokenLanguageChanged:(id)arg1;
- (void)performUpdateForModelIdentifier:(id)arg1 classIdentifier:(id)arg2;
- (void)stopListening;
- (void)startListening;
- (void)dealloc;
- (id)_initShared;
- (id)init;
@end
| 2024-04-03T01:27:15.642919 | https://example.com/article/3296 |
In the
United States Court of Appeals
For the Seventh Circuit
No. 00-2230
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v.
CURTIS D. TAYLOR,
Defendant-Appellant.
Appeal from the United States District Court
for the Northern District of Indiana, Hammond Division.
No. 2:99 CR 160--Rudy Lozano, Judge.
Argued October 25, 2001--Decided December 3, 2001
Before BAUER, POSNER, and EVANS, Circuit
Judges.
EVANS, Circuit Judge. Curtis D. Taylor
and his girl friend had the misfortune of
pulling up in an alley behind a drug
house in Gary, Indiana, at the same time
that federal agents on the Gary Response
Investigative Team (GRIT) were conducting
surveillance of the house. Taylor got out
of his automobile and entered a garage.
When the agents tried to stop him as he
came out of the garage, he ran. Captured
and arrested a few minutes later, he was
carrying a Glock 9 millimeter handgun
which, quite naturally, was confiscated.
Taylor was taken to GRIT headquarters
where he was shackled to the floor and
left alone in a room for several minutes.
He escaped by pulling a bolt loose from
the shackles.
A week later, while Taylor was still on
the lam, a shooting occurred on
Washington Street in Gary. Although
Taylor denied it, three people identified
him as the shooter. He was found later
that day hiding under a bed in another
house where officers also found nine zip-
lock bags of crack cocaine.
As a result of all this activity, Taylor
was charged in a four-count indictment.
The first two counts involve the events
of the first day behind the drug house.
In count 1, he was charged as an unlawful
user of a controlled substance in
possession of a firearm in violation of
18 U.S.C. sec. 922(g)(3). In the second
count, he was charged with escape in
violation of 18 U.S.C. sec. 751(a). For
the events a week later, he was charged
in count 3 with another firearms
violation and in count 4 with possession
with intent to distribute crack cocaine.
He pled guilty to the first two counts;
counts 3 and 4 were dismissed. He was
sentenced to 110 months in prison.
Taylor appeals his sentence, focusing on
the manner in which cross-references and
"relevant conduct" provisions of the
sentencing guidelines were applied to
him. In short, the events surrounding the
shooting were used to cross-reference
from the firearms guideline to the
attempted murder guideline, which then
provided the offense level for Taylor’s
sentencing. The district court determined
Taylor’s base offense level by starting
with U.S.S.G. sec.2K2.1(a), the firearms
guideline applicable to this case based
on his plea of guilty to count 1, giving
him an offense level of 20. However,
because the court also found that Taylor
attempted the commission of another
offense--the shooting a week later--the
court cross-referenced from U.S.S.G.
sec.2K2.1 to U.S.S.G. sec.2X1.1, which
covers attempt, solicitation, or
conspiracy. That guideline, in turn,
contains a cross-reference providing that
if an attempt, solicitation, or
conspiracy is expressly covered by
another guideline, the latter guideline
should be applied according to its terms.
U.S.S.G. sec.2X1.1(c). Having found that
Taylor was the shooter a week after he
escaped, the court concluded that the
attempted murder guideline, U.S.S.G.
sec.2A2.1, expressly covered the
situation. Because the judge followed
this trail from the guideline for
firearms violations to the guideline for
attempt and then to the guideline for
attempted murder, Taylor’s offense level
rose to 28. Taylor attacks the court’s
findings of fact regarding his role in
that shooting, and he disputes whether,
in any event, his conduct on the day of
the shooting, even if it were
established, should have been considered
at his sentencing.
In evaluating Taylor’s claim, we review
factual determinations underlying the
application of the guidelines for clear
error. The interpretation of a guidelines
term is a matter of law, subject to our
de novo review. United States v. Gio, 7
F.3d 1279 (7th Cir. 1993).
The problem facing the government in
defending Taylor’s sentence is how to
convince us that a connection exists
between the attempted murder and the
possession of the firearm that was
confiscated from him one week earlier.
The government concedes that the scope of
the relevant conduct guideline does not
allow a finding that the shooting is
directly relevant to count 1--the
possession of a firearm. That possession
ended when the firearm was seized. The
shooting had nothing to do with that
offense. But to be effective in raising
Taylor’s offense level, the shooting must
somehow be linked to the firearm count
because the firearm guideline carries the
larger base offense level, and it is the
guideline with the cross-reference that
ultimately leads to the attempted murder
guideline.
The link, according to the government,
is the escape. It argues that the escape
is relevant conduct to the firearms
charge. The argument transforms the
escape, which we recall is a crime to
which Taylor pled guilty, into "relevant
conduct." The escape is said to be
relevant conduct to the firearms
violation because the escape was an
attempt to avoid detection or
responsibility for the firearms
violation. The next step is
characterizing the shooting one week
later as relevant conduct to the escape.
Finally, to complete the argument, it is
necessary to say that the escape, which
is relevant conduct to the firearms
violation, brings with it the shooting,
which is relevant conduct to the escape.
This sleight of hand brings into play the
cross-references in the firearms
guideline which we have cited. Even with
the link provided by the escape, the
argument requires going from the firearms
charge to the escape to the attempted
murder and then leaping back over the
escape to connect the attempted murder to
the firearms charge. This is asking too
much.
As we pointed out in United States v.
Ritsema, 31 F.3d 559 (7th Cir. 1994), the
relevant conduct guideline plays a very
important role in the guideline
sentencing scheme. It is the means by
which real-offense principles are
inserted into what is otherwise a
charged-offense system. The goal in
including relevant conduct in sentencing
considerations is to allow the sentence
to reflect the seriousness of an offense
rather than being limited by the specific
charge set out in the indictment. For
that reason, in calculating a proper
sentence, the guidelines permit the court
to consider certain conduct with which
the defendant has not been charged. One
way uncharged conduct is considered is
through cross-references among the
guidelines. The general principle which
controls whether a cross-reference is ap
propriate is the relevant conduct
guideline in U.S.S.G. sec.1B1.3. As
pertinent to this case, relevant conduct
includes acts caused by the defendant
which "occurred during the commission of
the offense of conviction, in preparation
for that offense, or in the course of
attempting to avoid detection or
responsibility for that offense." This
provision is pivotal to Taylor’s
sentencing. But there are limits to how
far the provisions can be pushed.
One of the premises underlying the
government’s position is that "under the
plain language of sec.1B1.3 [the relevant
conduct guideline], Taylor was liable for
every act he committed during the course
of his escape." This premise is faulty.
"Relevant" must have meaning under
U.S.S.G. sec.1B1.3, even when the charge
is escape. It is true that escape under
sec. 751(a) is a continuing offense.
United States v. Bailey, 444 U.S. 394
(1980). However, we cannot conclude that
every crime committed during the time a
person is on escape status automatically
becomes relevant conduct in regard to a
crime committed before the escape. The
relevant conduct guideline is "not
without limits." United States v.
Crockett, 82 F.3d 722, 729 (7th Cir.
1996). We cautioned in Ritsema that "the
relevant conduct provision, interpreted
in an overly broad manner, has the
potential of being a coarse instrument
capable of causing years of serious
incidental criminality to ride in at
sentencing on the coattails of a
relatively minor conviction." At 567.
Ritsema, in fact, involved a sentencing
even more convoluted than Taylor’s.
Ritsema had been charged with possession
of semi-automatic pistols and the
possession of silencers. In a move which
caused a good deal of trouble, the
government entered into a plea agreement
with Ritsema in which he pled guilty to
possession of a silencer, and the count
alleging possession of the firearms was
dropped. The facts of the case as found
by the court showed that Ritsema had
taken a mentally retarded 14-year-old
girl into a closet and threatened her
with a silencer-equipped weapon, saying
that if she revealed his repeated sexual
assaults on her, he would harm a lot of
people. At sentencing, the court began
with the guideline for unlawful
possession of a firearm (a silencer is a
firearm for sentencing purposes). Then
the court looked to the cross-reference
that covers the use or possession of the
firearm in the commission of another
offense, thus arriving at the attempt,
solicitation, or conspiracy guideline.
From there, the court cross-referenced to
the guideline covering the use of a
firearm in the obstruction of justice;
next to the guideline dealing with
accessories after the fact, and finally
to the offense underlying the particular
obstruction of justice--criminal sexual
abuse by means of the display of a
dangerous weapon. Not surprisingly, we
rejected this reasoning and the claim
that criminal sexual abuse was somehow
relevant conduct to the possession of a
silencer when there was no evidence that,
unlike the firearm itself, the silencer
was in any way used to facilitate the
sexual abuse. That was true even though
the defendant committed the sexual abuse
contemporaneously with his possession of
the silencer.
In our case, the shooting was not
related to the escape. It would have been
related if, for instance, Taylor shot at
an officer who was trying to catch him.
Nor was the shooting part of an attempt
to escape detection: Taylor was not
trying to silence someone who was
planning to inform authorities of his
whereabouts. As far as we can tell,
Taylor shot at a man who had in some way
injured his girl friend. The shooting was
not related to any attempt to avoid
detection for the escape. In fact, as
Taylor points out, if anything, by the
shooting Taylor called attention to
himself, and he was, in fact, quickly
apprehended after he pulled the trigger.
Another problem with the sentence
calculation is that even were we to find
that the shooting was relevant conduct to
the escape, it would be far too long a
stretch to connect it to the firearms
charge. As we have said, in Taylor’s case
the offense carrying the higher offense
level is the firearms charge. It is the
guideline for this offense which includes
the cross-reference which leads to the
attempted murder guideline. Even if the
government could establish that the
shooting was relevant conduct to the
escape, nothing would be gained because
the guideline for escape does not include
a cross-reference which would allow
sentencing on the basis of attempted
murder. Naturally, then, it is the
firearms charge which the government
wants to connect to the shooting. But the
hard fact is that the government can’t
get there from here. There is no
principled way to bridge the gap between
the firearms charge and the shooting.
Accordingly, the sentence of Curtis D.
Taylor is VACATED and the case is REMANDED
for resentencing.
| 2023-10-16T01:27:15.642919 | https://example.com/article/1362 |
DESCRIPTION:(from Lifetime's press release, May 2011) The Day that Changed My Life, which through in-depth interview segments and re-enactments, showcases true stories of ordinary people whose lives took unexpected and dramatic turns following incidents ranging from terrifying accidents to chance encounters with strangers to mind-bending miracles. Six 60-minute episodes have been ordered from Sirens Media, with Valerie Haselton Drescher and Rebecca Toth Diefenbach (The Real Housewives of New Jersey) executive producing. | 2024-06-25T01:27:15.642919 | https://example.com/article/3657 |
Q:
Contouring a binary mask with OpenCV / Python
With Python and OpenCV I am detecting contours of a binary mask:
import numpy as np
import cv2
import matplotlib.pyplot as plt
mask = np.zeros(20000, dtype=np.uint8).reshape(100, 200)
mask[5:-5,5:-5] = 255
mask[10:70,40:80] = 0
plt.subplot(121)
plt.imshow(mask, cmap='Greys_r', interpolation='none')
_, contours, hierarchy = cv2.findContours(mask.copy(),
cv2.RETR_TREE, cv2.CHAIN_APPROX_SIMPLE,
offset=(0, 0))
Resulting in an expected behaviour :
plt.subplot(122)
cv2.drawContours(mask, contours, -1, (127, 127, 127), 2)
plt.imshow(mask, cmap='Greys_r', interpolation='none')
plt.show()
However, I cannot seem to understand the result of a full activated mask :
mask = np.ones(20000, dtype=np.uint8).reshape(100, 200)
mask *=255
_, contours, hierarchy = cv2.findContours(mask.copy(),
cv2.RETR_TREE, cv2.CHAIN_APPROX_SIMPLE,
offset=(0, 0))
print contours[0]
Which produces:
(1 1), (1 98), (198 98), (198 1)
instead of (0 0), (0 99), (199, 99), (199, 0)
Why is opencv findcontours behaving like that, with an offset of 1?
A:
Until OpenCV 3.1 findContours has this wierd behaviour on borders, also stated in the documentation:
Source image is modified by this function. Also, the function does not take into account 1-pixel border of the image (it's filled with 0's and used for neighbor analysis in the algorithm), therefore the contours touching the image border will be clipped.
This has been corrected in OpenCV 3.2, which also doesn't modify the source image:
Since opencv 3.2 source image is not modified by this function.
As a workaround for previous releases, you can use copyMakeBorder to create a black (0) border of 1 pixel, and use findContours with an offset of (-1,-1):
border = cv2.copyMakeBorder(mask, 1, 1, 1, 1, cv2.BORDER_CONSTANT, value=0 )
_, contours, hierarchy = cv2.findContours(border, cv2.RETR_TREE, cv2.CHAIN_APPROX_SIMPLE, offset=(-1, -1))
| 2024-04-01T01:27:15.642919 | https://example.com/article/1412 |
256 = q*p. Calculate the remainder when p is divided by 43.
38
Suppose -3*s = -0*f - 3*f + 1113, 5*f + 2*s = 1834. Suppose 0 = -7*k + f + 234. Calculate the remainder when k is divided by 29.
28
Let a(z) = 17*z**3 - z + 1. Let x be a(1). Let j = x + -8. What is the remainder when 605/j + 6/(-27) is divided by 17?
16
Suppose 5*i - 11 - 19 = 0. Suppose 165 - 925 = 95*j. What is the remainder when i/j*(-52 + 0) is divided by 10?
9
Suppose -2*d + 15 = -0*d + 3*a, 11 = d + 5*a. Let o = 10 - d. Calculate the remainder when 11*(1 + 3 - 3) is divided by o.
3
Let d = -181 - -193. Let c(r) = r**2 + 4*r - 4. Calculate the remainder when d is divided by c(-6).
4
Let z = -34 - -33. What is the remainder when z - -185 - 2/4*2 is divided by 46?
45
Suppose -j = -4*j + 63. Suppose -j = -3*f - 138. Let z = f - -56. What is the remainder when 49 is divided by z?
15
Let g(r) = 47*r**2 + 2*r - 3. Let n be g(1). Suppose 5*o + 2*q = 25, -5*q = 3*o - 6*o + n. Calculate the remainder when 27 is divided by o.
6
What is the remainder when 265 is divided by (-18)/12*(-268)/6?
64
Let j(i) = i**2 - i + 10. Let w be j(0). Let n be (-126)/w*(11 + -16). Suppose -n = -2*y - 9. Calculate the remainder when y is divided by 14.
13
Let n(r) = 32*r + 664. What is the remainder when 333 is divided by n(-19)?
53
Let x be 3*4/(-6)*2/(-1). Suppose 4*n - 5*b = -b + 192, 0 = -2*n + x*b + 92. What is the remainder when n is divided by 14?
8
Let p(n) = -43*n - 19. Calculate the remainder when 434 is divided by p(-3).
104
Let m(x) = 37*x**2 - 2*x + 5. Let b(g) = -12*g**2 + g - 2. Let q(k) = -7*b(k) - 2*m(k). Calculate the remainder when q(-3) is divided by 35.
33
Let w = 34 + -15. Suppose 0 = 3*m + n - 788, 0*n + 266 = m - 3*n. Suppose r + r + 5*p = 125, -4*p - m = -5*r. What is the remainder when r is divided by w?
17
Let h = 181 - 153. What is the remainder when 166 is divided by h?
26
Let k(a) = -a**2 - 22*a - 98. What is the remainder when 17 is divided by k(-8)?
3
Let z = 34 + 8. Let g = -20 + z. Calculate the remainder when g is divided by 9.
4
Let a = 29 + -26. Suppose 0 = -2*b + 4, -a*f + 207 + 14 = 4*b. Calculate the remainder when f is divided by 16.
7
Let n(y) = 17*y + 1. Let g(w) = w + 1. Let t(q) = -6*g(q) + n(q). What is the remainder when t(2) is divided by 4?
1
Suppose 24*g - 2164 - 1820 = 0. Calculate the remainder when g is divided by ((-2)/(-4))/((-3)/(-84)).
12
Let q(b) = b**3 - 3*b**2 + 2*b - 5. Suppose 155*g - 8677 = 2328. Calculate the remainder when g is divided by q(4).
14
Let c = -4 - -64. Suppose 5*w = -0*w + c. Calculate the remainder when 58 is divided by w.
10
Let a be 2 + (-3)/1*-1. Suppose -v = -a*l - 3 + 15, 0 = 5*v + 3*l + 172. Let j = v - -48. What is the remainder when 47 is divided by j?
15
Suppose 0 = -3*l - 3*s, 2*l + 0*l = 4*s - 12. Let z(a) = -2*a**3 - a - 6. What is the remainder when 34 is divided by z(l)?
10
Let a = 8 + -2. Let d(v) = 48*v**2 - 383*v - 3. Calculate the remainder when (-34)/a*(0 + -3) is divided by d(8).
2
Let h(l) = 62*l**3 - l**2 + 4*l - 2. Let v be h(1). Suppose -16*d + v = -13*d. Let w = -22 + 105. What is the remainder when w is divided by d?
20
Let r(j) = 62*j - 147. Calculate the remainder when r(3) is divided by 8.
7
What is the remainder when 292 is divided by ((-9)/(-12))/(9/168)?
12
Suppose -46 = -5*o + 3*h, h + 52 = 6*o - o. What is the remainder when 20 + 0*1/2 is divided by o?
9
Suppose -5*z + 3*u + 113 = 2*u, -3*u - 97 = -4*z. What is the remainder when 52 is divided by z?
8
Let i(w) = -w**2 - 8*w + 3. Let y(u) = -u - 12. Let q be y(-7). What is the remainder when 69 is divided by i(q)?
15
Suppose -c = -2*c + l + 4, -3*c - 4*l = 16. Let o = 14 - -2. Let z = c + o. What is the remainder when 31 is divided by z?
15
Let g = -149 + 160. Let f(j) = j**2 - 4. What is the remainder when f(6) is divided by g?
10
Suppose -27 = -2*i + 39. Let v(l) = l**3 + 4*l**2 - 3*l + 9. Let k be v(-4). Let b(y) = -y**2 + 21*y + 17. What is the remainder when i is divided by b(k)?
16
Let z = -530 - -1075. Calculate the remainder when z is divided by 50.
45
Suppose 4*b + 1 = 1. Suppose 11*d - 3*d - 8 = b. What is the remainder when 4 is divided by d?
0
What is the remainder when 475 is divided by (1392/(-30))/(((-36)/(-15))/(-12))?
11
Let q(t) be the first derivative of 11*t**3/3 + t**2 + 8*t - 11. Let i(b) = 27*b**2 - 1. What is the remainder when q(-3) is divided by i(-1)?
23
Let k(n) = -28*n**3 - 8*n**2 - 8*n - 1. Calculate the remainder when 184 is divided by k(-1).
22
Suppose 17894*y - 243 = 17885*y. Suppose -c + 152 = 2*h, 20 = 5*h - 2*c - 360. Calculate the remainder when h is divided by y.
22
Calculate the remainder when 52 is divided by ((-5)/(-2))/(105/1008) - -6.
22
Let u(i) = i**2 + i - 1. Suppose -5*h - 13 = 2. Let j be u(h). Suppose -j*f - 48 = -k - 10*f, 3*f - 120 = -3*k. Calculate the remainder when k is divided by 8.
6
What is the remainder when 90 is divided by (-9 - -10)/((-1)/(-23))?
21
Suppose 4*x = 3*p - 472, 5*p + x = 4*x + 805. Suppose -60 = 4*n - p. What is the remainder when n is divided by 14?
12
Calculate the remainder when 1142 is divided by (65/20 + -3 + -3)*-4.
9
Let z be (3 - (-11 - -5))*(-1)/(-3). Let v = z - -57. What is the remainder when v is divided by -1 - -1*(0 + 32)?
29
Let g(t) = -t**3 - t**2 + 2*t - 5. Let y be g(-5). Suppose -l = -6*l + y. What is the remainder when 65 is divided by l?
14
Suppose 2*j - 122 = -n, 0*j - 2*j = 4*n - 134. Let x be 50/175 + (-1 - (-481)/7). Suppose x = 9*u - 67. Calculate the remainder when j is divided by u.
14
What is the remainder when 502 is divided by (32 - 46)/(-1*(-1)/(-2))?
26
Suppose -3*j + 4*s + 799 + 756 = 0, -2*j + 1031 = 3*s. What is the remainder when j is divided by 37?
36
Suppose -4*x + 87 - 14 = -3*m, 44 = 2*x - 4*m. Let c = 1190 - 1145. Calculate the remainder when c is divided by x.
13
Let u = 36 - 34. Let b = u - -76. Suppose 4*t - 80 = -5*m, -5*m - 10 + 30 = t. Calculate the remainder when b is divided by t.
18
Let r(p) = -p**3 - 27*p**2 - 29*p - 52. Calculate the remainder when r(-26) is divided by 18.
8
Let f(j) = 7*j**2 - 6*j + 6. Calculate the remainder when f(-4) is divided by 29.
26
Suppose 11 = -6*g + 71. Calculate the remainder when 42 is divided by g.
2
Let y(d) = 10*d**2 - 3*d + 25. Calculate the remainder when y(-8) is divided by 30.
29
Let a = 51 - 32. What is the remainder when 51 is divided by a?
13
Let d(g) = -18*g + 7. Let v be d(-5). Let t = v + -78. Calculate the remainder when 32 is divided by t.
13
Suppose 0 = -5*m + q + 370, -13*m + 18*m + q = 360. Let f(d) = d**2 + d + 7. What is the remainder when m is divided by f(-6)?
36
Suppose 0 = -2*l + l + 4*a + 11, -l + 16 = a. What is the remainder when 27 is divided by l?
12
Let f(n) = -n**2 + 8*n - 3. Suppose 0 = 4*s + 467 - 871. What is the remainder when s is divided by f(4)?
10
Let x(g) = -2*g + 19. Let z be (-14)/(-63) - (-914)/18. Let h = 125 - z. What is the remainder when h is divided by x(0)?
17
Let s(c) = -c**3 + 10*c**2 + 12*c - 2. Let r be 2*(-2 + (-60)/(-8)). What is the remainder when -65*((-68)/20 + 3) is divided by s(r)?
8
Let x be 20/(-4)*(-9)/15. Suppose -x*q + 4 = -2*q. Calculate the remainder when q*(42/(-8))/(-7) is divided by 3.
0
Suppose 5*p = -5*i + 300, -p - 4*p + i = -312. What is the remainder when 305 is divided by p?
57
Suppose 3*i - 2*q = -i + 26, -5*i - 5*q = -10. Suppose -i*f = -2*f - 42. Calculate the remainder when 6/(-8) - 159/(-4) is divided by f.
11
Let s(j) = -j**3 - 3*j**2 - 4*j - 3. Let a(z) = 3*z - 1. Let n be a(1). Suppose n*g + 0 = 50. What is the remainder when g is divided by s(-3)?
7
What is the remainder when 32 is divided by -8*-6*(-2)/(-8)?
8
Suppose 2*b - 3*b + 11 = 0. Suppose -93*a - 160 = -98*a. Calculate the remainder when a is divided by b.
10
What is the remainder when (3 + -4)/(480/483 + -1) is divided by 34?
25
Let d(a) = -49*a - 4. Suppose -54 = 4*v + 6. Let b = -17 - v. What is the remainder when d(b) is divided by 24?
22
Let t = 387 + -196. Suppose 0 = -5*s - 1 + t. Suppose 3*d = 0, 5*d - 7*d = -3*j + 30. Calculate the remainder when s is divided by j.
8
Suppose 4*h + h - 320 = 0. Let w(x) = -6*x - 4. What is the remainder when w(-3) is divided by 1/(-4) + 336/h?
4
Let w(j) = -j - 3. Let m be w(12). Let q = 20 + m. Suppos | 2023-09-21T01:27:15.642919 | https://example.com/article/3857 |
“I told him he was going to be immersed in a basketball culture. I told him he was going to be around people who have won championships, who talk championship and understand championship. Not too many players are blessed with that opportunity to be around that environment" Isiah Thomas to Isaiah Thomas on becoming a Celtic.
I think I like that deal but it might not be that great for Sacramento. If you remove them and send Gortat to Boston for that package I think it works. Memphis is looking to get under the tax, and pick up three point shooting. This fills those needs. | 2023-11-19T01:27:15.642919 | https://example.com/article/3497 |
A retrospective clinical analysis of moderate to severe athletic concussions.
To investigate differences in clinical outcomes on the basis of gender and age after a moderate or severe concussion in a cohort of physically active subjects examined by a single clinician. A descriptive, cross-sectional, retrospective chart review of consecutive patients. Outpatient assessments by a single clinician with expertise in sports concussion. Physically active subjects seen for evaluation after a concussion experienced while participating in sports (N = 194; 215 concussions; age mean ± standard deviation = 19.19 ± 8.53 years) were included. INTERVENTIONS (INDEPENDENT VARIABLES): Intergroup differences and associations were examined by gender, age group (<18 years and 18+ years), and concussion grade for all outcome measures. Separate χ² tests were used to assess associations between gender, age group, and symptom duration group (≤ 7 days, 8-90 days, > 90 days), the presence of depression, the presence of loss of consciousness, altered school or work, and concussion grade. Separate independent samples t-tests was used to examine differences in symptom reporting and time to recovery. No association was observed between gender and any measured characteristics (P > .05). Subjects 18 years or older took longer to recover (315.77 days), compared with younger subjects (91.31 days) (t₂₁₃ = -2.01, P = .049). Older subjects also reported more concussions than did younger ones, 4.33 and 2.37, respectively (t₂₁₃ = -3.77, P < .001). All concussions included in this study were moderate to severe in nature as defined by the Revised Cantu Grading Scale. Contrary to existing literature regarding gender differences in concussion of a lesser severity, no gender differences were observed in this sample. Age differences were observed, with the population of subjects who were 18 years and older experiencing a greater number and duration of concussion symptoms than the younger group. Developing evidence-based return-to-play progressions and rehabilitation strategies in this population is the next frontier for concussion researchers. | 2023-11-19T01:27:15.642919 | https://example.com/article/6897 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.