text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
Titanfall: Expedition DLC Receives Four New Screens Traverse across three new maps in Titanfall’s first DLC. Respawn Entertainment’s Titanfall will be receiving its first DLC package this month in the form of Expedition. There will be three new maps added to the main game which include Swamplands, Runoff and War Games. Each map has its own unique hook with War Games taking place in the pilot simulation program and combining areas from Angel City, Rise and more into a unique layout. Runoff will take place in a watery level with canals and pipelines to traverse. Swamplands has you traversing a forest level with some ruins neighboring close by. You can check out the newest screenshots for the DLC below to see how it’s shaping up. Expedition will cost $9.99 separately but you can pick up the Season Pass for $24.99 to receive this DLC and the next two as well. Will you be partaking in Expedition? Let us know in the comments below, as well as what you think of the maps thus far.
2023-12-29T01:26:36.242652
https://example.com/article/8591
Eternity (2010 Thai film) Eternity () is a 2010 Thai erotic Romantic drama film by Pantewanop Tewakol. It is based on Malai Choopiniji's novel, which was earlier adapted to film in 1957 by Rattana Pestonji. The film stars Ananda Everingham and Laila Boonyasak as the doomed lovers Sangmong, and his uncle's wife, Yupadee, respectively. The film won five awards, including Best Actor and Best Picture, and gained seven nominations in the Thailand Film Awards. Plot The story begins with a young man visiting a village in Burma. One night, a beautiful woman comes into his bedroom and attempts to seduce him. She suddenly leaves, frightened by the sounds of screams coming from outside. The next day, the young man asks Thip, Ni Han's right-hand man, about the screams. Thip then tells him the story of Yupadee and Sangmong, Ni Han's former wife and nephew. Sangmong's parents died when he was very young. He was raised by Ni Han, who loved him as a son. Sangmong received a good education and returned home when he graduated. He was a conservative man with traditional values, and his days consisted of reading books and working for his uncle. With very little social life, he seemingly has little interest in women, the opposite of Ni Han who is a womaniser. Wanting to make Sangmong into a man, Ni Han has Thip take Sangmong to a brothel for him to learn and enjoy carnal pleasures. Although the woman offered to Sangmong was beautiful, he turns away from her and leaves. Later, Ni Han and Thip ask him why he did not have sex with her, to which Sangmong replies that he wants to wait until marriage. Ni Han respects his decision and promises to find him a proper wife for him to settle down with. While attending an international sport club in Bangkok, Ni Han meets a widow named Yupadee, and falling for her charms and modern ideas, marries her. When he brings her home to met everyone in the village, Yupadee shows an instant liking to Sangmong. The two become close friends, which Ni Han encourages as he believes Yupadee will help Sangmong break out of his shell and become more sociable. Yupadee sends Sangmong mixed signals by being affectionate one moment and cold the next. She tells a little bit of her deceased first husband and past. Sangmong meanwhile develops an infatuation with Yupadee, which grows stronger after she nurses him back to health from a fever. Ni Han then announces he must leave on a business trip and decides to take Yupadee with him, but she fakes a pregnancy in order to stay behind and be alone with Sangmong. With Ni Han away, the two consummate their affair and sneak away to have sex. Many of the servants and Thip know about their relationship but remain quiet, even when Ni Han returned, but one servant bravely tells Ni Han about the affair, which he refuses to believe. He finally learns about them when he secretly catches the two in Sangmong's bed, proclaiming their love for one another until eternity. The next day he reveals that he knows about them, and he gives Yupadee to Sangmong, chaining their wrists–so they can stay together until eternity–and banishes them to a small cabin in the woods. The lovers initially take his punishment as a joke and enjoy their time together. Soon after, they grow tired and begin to resent one another. They ask Ni Han for forgiveness and to release them; he offers them a gun as his only answer. Refusing to kill himself or Yupadee, Sangmong attempts to run away on a ferry that comes to the village every few months. To avoid suspicion, he tries to cut their chain with an axe. Yupadee stops him, asking if he would leave her if the chain ever breaks. When Sangmong doesn't answer her, she refuses to allow him to break the chain and Ni Han's men find them, and they are taken back to the cabin. Sangmong takes the gun and offers to shoot himself to release Yupadee, who claims she is pregnant. Yupadee steals the gun from him and shoots herself instead. Sangmong loses conscious afterwards. He awakens to find her rotting corpse and tries to run but is still chained to her. A servant enters the cabin and chops Yupadee's hand off, freeing Sangmong. Sangmong becomes mad with grief and losses his sanity. Ni Han takes Sangmong back when he sees his condition. Through the years, Sangmong has roamed the village, screaming in agony like a wild madman. Throughout the story, the young man in the beginning has sexual encounters with three beautiful woman in the night. Thip later tells him that the three women are actually Ni Han's women. Frightened, the young man hurries to pack up his belongings. The next day, the young man bravely goes to see Ni Han, who is surrounded by the three women and chains hanging on a column. Ni Han greets him and casually comments that he reminds him of his nephew, much to the young man's horror. Before he leaves, the young man encounters Sangmong, who gives him a book, and the young man thanks him before riding his horse and departing the village. Cast Ananda Everingham as Sangmong Laila Boonyasak as Yupadee Teerapong Liaorakwong as Phapo Sakrat Ruekthamrong as Thip Phenphet Phenkul as Niphon Daraneenuch Photipit as Makhin Mario Maurer as Young Buddhist Monk External links References Category:Thai films Category:2010s romantic drama films Category:2010 films Category:Thai-language films Category:Erotic romance films Category:Thai romance films Category:Best Picture Suphannahong National Film Award winners Category:2010s erotic drama films
2023-11-23T01:26:36.242652
https://example.com/article/2311
Soldiers from the 172nd Infantry Separate Brigade, based out of Germany, take it in turns to man an outpost on the Pakistan border in Afghanistan. The Taliban generally stay out of their way, choosing instead to target the base below with rockets. ATTENTION!! We are moving! Because of YouTube's new policy against military related videos and on where advertisers are allowed to put their Ads, we must move our videos. Join us at our new home! WWW.USMILITARYVIDEOS.NET! You will find videos and photos not found here on YouTube!! Plus forums to discuss all things military related! You can even post your thoughts there! Plus Sports, Outdoors, Snipers Hide, Shooting, Hunting and Fishing pages! Questions or comments email chris@usmilitaryvideos.net Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United StatesConcealedCarryAssociation) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United States Concealed Carry Association) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. We are moving! Come join us!! Join us at our new home! www.usmilitaryvideos.net! You will find videos and photos not found here on YouTube or elsewhere!! Plus forums to discuss all things military related! You can even post your thoughts there! We have become part of the www.Scout.com network and they have everything from sports to firearms to of course Military related items and great premium content for everyone!! Questions or comments email chris@usmilitaryvideos.net published:11 Oct 2011 views:8535 Help me make more videos and support the channel: https://bicycletouringpro.com/donate/ Learn to conduct your own bike tours anywhere in the world ► http://bicycletouringpro.com/freecourse I climbed a massive mountain and then spend the night camping at the top. SO COOL!!! This video was shot in the mountains south of Sachica, Colombia. If you enjoy this video, then you'll definitely want to go back and watch the rest of my bicycle touring video blogs ► https://www.youtube.com/watch?v=htFKW0GVB5U&list=PLotHMGSiRt6pES77gE3h44hZIe4bx_iVz ADDITIONAL LINKS & RESOURCES Get Your Free Bicycle Touring StarterGuide: http://bicycletouringpro.com/freecourse/ The Bicycle Touring Blueprint: http://bicycletouringbook.com The Touring Bicycle Buyer's Guide: http://touringbicyclebook.com Free $30 TravelCredit with AirBNB: http://www.airbnb.com/c/dalff 1,000+ WorldwideOrganizedBikeTours: http://www.gobicycletouring.com MY SOCIAL NETWORKS Facebook: https://www.facebook.com/bicycletouring Instagram: http://instagram.com/bicycletouringpro Snapchat: https://www.snapchat.com/add/bicycletouring Twitter: https://twitter.com/bicycletouring Google+: http://bicycletouringpro.com/blog/google-plus #bicycletouringpro #cycling #biketravel #darrenalff #biketouring #adventurecycling published:22 Jun 2017 views:10311 Learn more: http://bit.ly/LehighMountaintop At Lehigh University in Bethlehem, Pennsylvania, we have always prepared students to put knowledge into practice. Building on our strong foundation, we are defining a new centerpiece in our development of the next generation of leaders and problem-solvers, one focused on posing big questions and seeking answers, where students learn to take risks and productively chart their own territory, where professors are guides, mentors and fellow explorers, in an environment emphasizing hands-on learning and unconstrained by traditional disciplinary boundaries. Mountaintop is not a research lab. It is not a business incubator. It is not just another interdisciplinary workspace. Mountaintop will transcend all existing models in higher education, and it will do so by returning higher education to its roots—by focusing not only on the questions, and not only on the answers, but rather on the processes that come before and after each: inquiry, exploration, and discovery. published:20 Dec 2013 views:8741 This mine site represents 20 years of mining. The reclamation and water resources are top notch. A shame mountaintop mining is so demagogued by the uninformed. Is Gaia becoming Thanatia, a resource exhausted planet? For how long can our high-tech society be sustained in the light of declining mineral ore grades, heavy dependence on un-recycled critical metals and accelerated material dispersion? These are all root causes of future disruptions that need to be addressed today. This book presents a cradle-to-cradle view of the Earth's abiotic resources through a novel and rigorous approach based on the Second Law of Thermodynamics: heat dissipates and materials deteriorate and disperse. Quality is irreversibly lost. This allows for the assessment of such depletion and can be used to estimate the year where production of the main mineral commodities could reach its zenith. By postulating Thanatia, one acquires a sense of destiny and a concern for a unified global management of the planet's abiotic resource endowment. The book covers the core aspects of geology, geochemistry, mining, metallurgy, economics, the environment, thermodynamics and thermochemistry. It is supported by comprehensive databases related to mineral resources, including detailed compositions of the Earth's layers, thermochemical properties of over 300 substances, historical energy and mineral resource inventories, energy consumption and environmental impacts in the mining and metallurgical sector and world recycling rates of commodities. Authors: Antonio ValeroCapilla / Alicia Valero Delgado Publisher: http://www.worldscientific.com/worldscibooks/10.1142/7323 published:27 Jun 2014 views:3019 In Appalachia, coal companies blow the tops off of mountains to get at the coal. The damage this does to the surrounding environment and water supply is devastating. ➡ Subscribe: http://bit.ly/NatGeoSubscribe About From The Ashes: From the Ashes captures Americans in communities across the country as they wrestle with the legacy of the coal industry and what its future should be in the current political climate. From Appalachia to the West’s Powder River Basin, the film goes beyond the rhetoric of the “war on coal” to present compelling and often heartbreaking stories about what’s at stake for our economy, health, and climate. Get More National Geographic: OfficialSite: http://bit.ly/NatGeoOfficialSite Facebook: http://bit.ly/FBNatGeo Twitter: http://bit.ly/NatGeoTwitter Instagram: http://bit.ly/NatGeoInsta About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Through their world-class scientists, photographers, journalists, and filmmakers, Nat Geo gets you closer to the stories that matter and past the edge of what's possible. Coal Mining's Environmental Impact | From The Ashes https://youtu.be/ynN39sfqT8w National Geographic https://www.youtube.com/natgeo published:20 Jun 2017 views:71399 See how DMME works with mining companies to ensure the land and the environment are returned to what they were, or better, before mining began. This video was produced on an AlphaNatural Resource's former coal surface mine site that has been recognized nationally for reclamation. Dr. Michael Hendryx explains his study of the health impacts of mountaintop removal mining on Appalachian communities at an Energy and Mineral Resources Subcommittee hearing on May 14, 2015. Rep. John Fleming (R-La.) had told Dr. Hendryx that he'd "seen fifth grade science projects that were more scientific" and that Hendryx should be "embarrassed." See also Lehigh University Lehigh University is an American private research university located in Bethlehem, Pennsylvania. It was established in 1865 by businessman Asa Packer and has grown to include studies in a wide variety of disciplines. Its undergraduate programs have been coeducational since the 1971–72 academic year. As of 2014, the university had 4,904 undergraduate students and 2,165 graduate students. Lehigh is considered one of the twenty-four Hidden Ivies in the Northeastern United States. The university has over 680 faculty members; awards and honors recognizing Lehigh faculty and alumni include the Nobel Prize, Pulitzer Prize, Fulbright Fellowship, and membership in the American Academy of Arts & Sciences and the National Academy of Sciences. National Geographic (magazine) National Geographic, formerly The National Geographic Magazine, is the official magazine of the National Geographic Society. It has been published continuously since its first issue in 1888, nine months after the Society itself was founded. It primarily contains articles about geography, history, and world culture. The magazine is known for its thick square-bound glossy format with a yellow rectangular border and its extensive use of dramatic photographs. The magazine is published monthly, and additional map supplements are also included with subscriptions. It is available in a traditional printed edition and through an interactive online edition. On occasion, special editions of the magazine are issued. As of 2015, the magazine is circulated worldwide in nearly 40 local-language editions and had a global circulation of 6.8 million per month. Its U.S. circulation is around 3.5 million per month. See also The Ashes The Ashes is a Test cricket series played between England and Australia. The Ashes are regarded as being held by the team that most recently won the Test series. The term originated in a satirical obituary published in a British newspaper, The Sporting Times, immediately after Australia's 1882 victory at The Oval, their first Test win on English soil. The obituary stated that English cricket had died, and "the body will be cremated and the ashes taken to Australia". The mythical ashes immediately became associated with the 1882–83 series played in Australia, before which the English captain Ivo Bligh had vowed to "regain those ashes". The English media therefore dubbed the tour the quest to regain the Ashes. After England had won two of the three Tests on the tour, a small urn was presented to Bligh by a group of Melbourne women including Florence Morphy, whom Bligh married within a year. The contents of the urn are reputed to be the ashes of a wooden bail, and were humorously described as "the ashes of Australian cricket". It is not clear whether that "tiny silver urn" is the same as the small terracotta urn given to the MCC by Bligh's widow after his death in 1927. Duty on a Mountain Top Outpost - Paktia Province, AF Soldiers from the 172nd Infantry Separate Brigade, based out of Germany, take it in turns to man an outpost on the Pakistan border in Afghanistan. The Taliban generally stay out of their way, choosing instead to target the base below with rockets. ATTENTION!! We are moving! Because of YouTube's new policy against military related videos and on where advertisers are allowed to put their Ads, we must move our videos. Join us at our new home! WWW.USMILITARYVIDEOS.NET! You will find videos and photos not found here on YouTube!! Plus forums to discuss all things military related! You can even post your thoughts there! Plus Sports, Outdoors, Snipers Hide, Shooting, Hunting and Fishing pages! Questions or comments email chris@usmilitaryvideos.net Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United StatesConcealedCarryAssociation) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United States Concealed Carry Association) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. We are moving! Come join us!! Join us at our new home! www.usmilitaryvideos.net! You will find videos and photos not found here on YouTube or elsewhere!! Plus forums to discuss all things military related! You can even post your thoughts there! We have become part of the www.Scout.com network and they have everything from sports to firearms to of course Military related items and great premium content for everyone!! Questions or comments email chris@usmilitaryvideos.net 13:03 Wild Camping on a Mountaintop in Colombia - EP. #173 Wild Camping on a Mountaintop in Colombia - EP. #173 Wild Camping on a Mountaintop in Colombia - EP. #173 Help me make more videos and support the channel: https://bicycletouringpro.com/donate/ Learn to conduct your own bike tours anywhere in the world ► http://bicycletouringpro.com/freecourse I climbed a massive mountain and then spend the night camping at the top. SO COOL!!! This video was shot in the mountains south of Sachica, Colombia. If you enjoy this video, then you'll definitely want to go back and watch the rest of my bicycle touring video blogs ► https://www.youtube.com/watch?v=htFKW0GVB5U&list=PLotHMGSiRt6pES77gE3h44hZIe4bx_iVz ADDITIONAL LINKS & RESOURCES Get Your Free Bicycle Touring StarterGuide: http://bicycletouringpro.com/freecourse/ The Bicycle Touring Blueprint: http://bicycletouringbook.com The Touring Bicycle Buyer's Guide: http://touringbicyclebook.com Free $30 TravelCredit with AirBNB: http://www.airbnb.com/c/dalff 1,000+ WorldwideOrganizedBikeTours: http://www.gobicycletouring.com MY SOCIAL NETWORKS Facebook: https://www.facebook.com/bicycletouring Instagram: http://instagram.com/bicycletouringpro Snapchat: https://www.snapchat.com/add/bicycletouring Twitter: https://twitter.com/bicycletouring Google+: http://bicycletouringpro.com/blog/google-plus #bicycletouringpro #cycling #biketravel #darrenalff #biketouring #adventurecycling 6:33 The Mountaintop Experience The Mountaintop Experience The Mountaintop Experience Learn more: http://bit.ly/LehighMountaintop At Lehigh University in Bethlehem, Pennsylvania, we have always prepared students to put knowledge into practice. Building on our strong foundation, we are defining a new centerpiece in our development of the next generation of leaders and problem-solvers, one focused on posing big questions and seeking answers, where students learn to take risks and productively chart their own territory, where professors are guides, mentors and fellow explorers, in an environment emphasizing hands-on learning and unconstrained by traditional disciplinary boundaries. Mountaintop is not a research lab. It is not a business incubator. It is not just another interdisciplinary workspace. Mountaintop will transcend all existing models in higher education, and it will do so by returning higher education to its roots—by focusing not only on the questions, and not only on the answers, but rather on the processes that come before and after each: inquiry, exploration, and discovery. 5:10 Beautiful Mountaintop Mining Reclamation Beautiful Mountaintop Mining Reclamation Beautiful Mountaintop Mining Reclamation This mine site represents 20 years of mining. The reclamation and water resources are top notch. A shame mountaintop mining is so demagogued by the uninformed. THANATIA -- The Destiny of the Earth's mineral resources Is Gaia becoming Thanatia, a resource exhausted planet? For how long can our high-tech society be sustained in the light of declining mineral ore grades, heavy dependence on un-recycled critical metals and accelerated material dispersion? These are all root causes of future disruptions that need to be addressed today. This book presents a cradle-to-cradle view of the Earth's abiotic resources through a novel and rigorous approach based on the Second Law of Thermodynamics: heat dissipates and materials deteriorate and disperse. Quality is irreversibly lost. This allows for the assessment of such depletion and can be used to estimate the year where production of the main mineral commodities could reach its zenith. By postulating Thanatia, one acquires a sense of destiny and a concern for a unified global management of the planet's abiotic resource endowment. The book covers the core aspects of geology, geochemistry, mining, metallurgy, economics, the environment, thermodynamics and thermochemistry. It is supported by comprehensive databases related to mineral resources, including detailed compositions of the Earth's layers, thermochemical properties of over 300 substances, historical energy and mineral resource inventories, energy consumption and environmental impacts in the mining and metallurgical sector and world recycling rates of commodities. Authors: Antonio ValeroCapilla / Alicia Valero Delgado Publisher: http://www.worldscientific.com/worldscibooks/10.1142/7323 2:54 Coal Mining's Environmental Impact | From The Ashes Coal Mining's Environmental Impact | From The Ashes Coal Mining's Environmental Impact | From The Ashes In Appalachia, coal companies blow the tops off of mountains to get at the coal. The damage this does to the surrounding environment and water supply is devastating. ➡ Subscribe: http://bit.ly/NatGeoSubscribe About From The Ashes: From the Ashes captures Americans in communities across the country as they wrestle with the legacy of the coal industry and what its future should be in the current political climate. From Appalachia to the West’s Powder River Basin, the film goes beyond the rhetoric of the “war on coal” to present compelling and often heartbreaking stories about what’s at stake for our economy, health, and climate. Get More National Geographic: OfficialSite: http://bit.ly/NatGeoOfficialSite Facebook: http://bit.ly/FBNatGeo Twitter: http://bit.ly/NatGeoTwitter Instagram: http://bit.ly/NatGeoInsta About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Through their world-class scientists, photographers, journalists, and filmmakers, Nat Geo gets you closer to the stories that matter and past the edge of what's possible. Coal Mining's Environmental Impact | From The Ashes https://youtu.be/ynN39sfqT8w National Geographic https://www.youtube.com/natgeo 4:12 Reclamation in Mining Reclamation in Mining Reclamation in Mining See how DMME works with mining companies to ensure the land and the environment are returned to what they were, or better, before mining began. This video was produced on an AlphaNatural Resource's former coal surface mine site that has been recognized nationally for reclamation. X-Plane 10 Mobile | Mountaintop touch and go| Challenges | Android Rep. Alan Lowenthal and Dr. Michael Hendryx on Mountaintop Mining Dr. Michael Hendryx explains his study of the health impacts of mountaintop removal mining on Appalachian communities at an Energy and Mineral Resources Subcommittee hearing on May 14, 2015. Rep. John Fleming (R-La.) had told Dr. Hendryx that he'd "seen fifth grade science projects that were more scientific" and that Hendryx should be "embarrassed." Conan Exiles - MountainTop Kingdom build - No cheats/resource hax 1st upload (more to come) ConanExiles - BuildShowcase - No cheats or resource hacks have been used in the making of this creation. I have created this solo over the last 5 days using my bare hands :) Server: [UK]ShadowDynasty[NEW-RP-x4-Admins-Dedicated-24/7] Direct Connect: 193.111.184.13:8077 Mountain Top Experience (Final Sermon) | Dr. David Walker Duty on a Mountain Top Outpost - Paktia Province, AF Soldiers from the 172nd Infantry Separate Brigade, based out of Germany, take it in turns to man an outpost on the Pakistan border in Afghanistan. The Taliban generally stay out of their way, choosing instead to target the base below with rockets. ATTENTION!! We are moving! Because of YouTube's new policy against military related videos and on where advertisers are allowed to put their Ads, we must move our videos. Join us at our new home! WWW.USMILITARYVIDEOS.NET! You will find videos and photos not found here on YouTube!! Plus forums to discuss all things military related! You can even post your thoughts there! Plus Sports, Outdoors, Snipers Hide, Shooting, Hunting and Fishing pages! Questions or comments email chris@usmilitaryvideos.net Want to win $5000 worth of ammo!?!?!? Thought th... published: 11 Oct 2011 Wild Camping on a Mountaintop in Colombia - EP. #173 Help me make more videos and support the channel: https://bicycletouringpro.com/donate/ Learn to conduct your own bike tours anywhere in the world ► http://bicycletouringpro.com/freecourse I climbed a massive mountain and then spend the night camping at the top. SO COOL!!! This video was shot in the mountains south of Sachica, Colombia. If you enjoy this video, then you'll definitely want to go back and watch the rest of my bicycle touring video blogs ► https://www.youtube.com/watch?v=htFKW0GVB5U&list=PLotHMGSiRt6pES77gE3h44hZIe4bx_iVz ADDITIONAL LINKS & RESOURCES Get Your Free Bicycle Touring StarterGuide: http://bicycletouringpro.com/freecourse/ The Bicycle Touring Blueprint: http://bicycletouringbook.com The Touring Bicycle Buyer's Guide: http://touringbicyclebook.com Free $... published: 22 Jun 2017 The Mountaintop Experience Learn more: http://bit.ly/LehighMountaintop At Lehigh University in Bethlehem, Pennsylvania, we have always prepared students to put knowledge into practice. Building on our strong foundation, we are defining a new centerpiece in our development of the next generation of leaders and problem-solvers, one focused on posing big questions and seeking answers, where students learn to take risks and productively chart their own territory, where professors are guides, mentors and fellow explorers, in an environment emphasizing hands-on learning and unconstrained by traditional disciplinary boundaries. Mountaintop is not a research lab. It is not a business incubator. It is not just another interdisciplinary workspace. Mountaintop will transcend all existing models in higher education, and it wil... published: 20 Dec 2013 Beautiful Mountaintop Mining Reclamation This mine site represents 20 years of mining. The reclamation and water resources are top notch. A shame mountaintop mining is so demagogued by the uninformed. The 2016 Mountaintop Experience THANATIA -- The Destiny of the Earth's mineral resources Is Gaia becoming Thanatia, a resource exhausted planet? For how long can our high-tech society be sustained in the light of declining mineral ore grades, heavy dependence on un-recycled critical metals and accelerated material dispersion? These are all root causes of future disruptions that need to be addressed today. This book presents a cradle-to-cradle view of the Earth's abiotic resources through a novel and rigorous approach based on the Second Law of Thermodynamics: heat dissipates and materials deteriorate and disperse. Quality is irreversibly lost. This allows for the assessment of such depletion and can be used to estimate the year where production of the main mineral commodities could reach its zenith. By postulating Thanatia, one acquires a sense of destiny and a concern for a ... published: 27 Jun 2014 Coal Mining's Environmental Impact | From The Ashes In Appalachia, coal companies blow the tops off of mountains to get at the coal. The damage this does to the surrounding environment and water supply is devastating. ➡ Subscribe: http://bit.ly/NatGeoSubscribe About From The Ashes: From the Ashes captures Americans in communities across the country as they wrestle with the legacy of the coal industry and what its future should be in the current political climate. From Appalachia to the West’s Powder River Basin, the film goes beyond the rhetoric of the “war on coal” to present compelling and often heartbreaking stories about what’s at stake for our economy, health, and climate. Get More National Geographic: OfficialSite: http://bit.ly/NatGeoOfficialSite Facebook: http://bit.ly/FBNatGeo Twitter: http://bit.ly/NatGeoTwitter Instagram: http... published: 20 Jun 2017 Reclamation in Mining See how DMME works with mining companies to ensure the land and the environment are returned to what they were, or better, before mining began. This video was produced on an AlphaNatural Resource's former coal surface mine site that has been recognized nationally for reclamation. published: 16 Nov 2015 X-Plane 10 Mobile | Mountaintop touch and go| Challenges | Android Rep. Alan Lowenthal and Dr. Michael Hendryx on Mountaintop Mining Dr. Michael Hendryx explains his study of the health impacts of mountaintop removal mining on Appalachian communities at an Energy and Mineral Resources Subcommittee hearing on May 14, 2015. Rep. John Fleming (R-La.) had told Dr. Hendryx that he'd "seen fifth grade science projects that were more scientific" and that Hendryx should be "embarrassed." Conan Exiles - MountainTop Kingdom build - No cheats/resource hax 1st upload (more to come) ConanExiles - BuildShowcase - No cheats or resource hacks have been used in the making of this creation. I have created this solo over the last 5 days using my bare hands :) Server: [UK]ShadowDynasty[NEW-RP-x4-Admins-Dedicated-24/7] Direct Connect: 193.111.184.13:8077 Soldiers from the 172nd Infantry Separate Brigade, based out of Germany, take it in turns to man an outpost on the Pakistan border in Afghanistan. The Taliban generally stay out of their way, choosing instead to target the base below with rockets. ATTENTION!! We are moving! Because of YouTube's new policy against military related videos and on where advertisers are allowed to put their Ads, we must move our videos. Join us at our new home! WWW.USMILITARYVIDEOS.NET! You will find videos and photos not found here on YouTube!! Plus forums to discuss all things military related! You can even post your thoughts there! Plus Sports, Outdoors, Snipers Hide, Shooting, Hunting and Fishing pages! Questions or comments email chris@usmilitaryvideos.net Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United StatesConcealedCarryAssociation) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United States Concealed Carry Association) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. We are moving! Come join us!! Join us at our new home! www.usmilitaryvideos.net! You will find videos and photos not found here on YouTube or elsewhere!! Plus forums to discuss all things military related! You can even post your thoughts there! We have become part of the www.Scout.com network and they have everything from sports to firearms to of course Military related items and great premium content for everyone!! Questions or comments email chris@usmilitaryvideos.net Soldiers from the 172nd Infantry Separate Brigade, based out of Germany, take it in turns to man an outpost on the Pakistan border in Afghanistan. The Taliban generally stay out of their way, choosing instead to target the base below with rockets. ATTENTION!! We are moving! Because of YouTube's new policy against military related videos and on where advertisers are allowed to put their Ads, we must move our videos. Join us at our new home! WWW.USMILITARYVIDEOS.NET! You will find videos and photos not found here on YouTube!! Plus forums to discuss all things military related! You can even post your thoughts there! Plus Sports, Outdoors, Snipers Hide, Shooting, Hunting and Fishing pages! Questions or comments email chris@usmilitaryvideos.net Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United StatesConcealedCarryAssociation) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United States Concealed Carry Association) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. We are moving! Come join us!! Join us at our new home! www.usmilitaryvideos.net! You will find videos and photos not found here on YouTube or elsewhere!! Plus forums to discuss all things military related! You can even post your thoughts there! We have become part of the www.Scout.com network and they have everything from sports to firearms to of course Military related items and great premium content for everyone!! Questions or comments email chris@usmilitaryvideos.net Learn more: http://bit.ly/LehighMountaintop At Lehigh University in Bethlehem, Pennsylvania, we have always prepared students to put knowledge into practice. Building on our strong foundation, we are defining a new centerpiece in our development of the next generation of leaders and problem-solvers, one focused on posing big questions and seeking answers, where students learn to take risks and productively chart their own territory, where professors are guides, mentors and fellow explorers, in an environment emphasizing hands-on learning and unconstrained by traditional disciplinary boundaries. Mountaintop is not a research lab. It is not a business incubator. It is not just another interdisciplinary workspace. Mountaintop will transcend all existing models in higher education, and it will do so by returning higher education to its roots—by focusing not only on the questions, and not only on the answers, but rather on the processes that come before and after each: inquiry, exploration, and discovery. Learn more: http://bit.ly/LehighMountaintop At Lehigh University in Bethlehem, Pennsylvania, we have always prepared students to put knowledge into practice. Building on our strong foundation, we are defining a new centerpiece in our development of the next generation of leaders and problem-solvers, one focused on posing big questions and seeking answers, where students learn to take risks and productively chart their own territory, where professors are guides, mentors and fellow explorers, in an environment emphasizing hands-on learning and unconstrained by traditional disciplinary boundaries. Mountaintop is not a research lab. It is not a business incubator. It is not just another interdisciplinary workspace. Mountaintop will transcend all existing models in higher education, and it will do so by returning higher education to its roots—by focusing not only on the questions, and not only on the answers, but rather on the processes that come before and after each: inquiry, exploration, and discovery. THANATIA -- The Destiny of the Earth's mineral resources Is Gaia becoming Thanatia, a resource exhausted planet? For how long can our high-tech society be sustained in the light of declining mineral ore grades, heavy ... Is Gaia becoming Thanatia, a resource exhausted planet? For how long can our high-tech society be sustained in the light of declining mineral ore grades, heavy dependence on un-recycled critical metals and accelerated material dispersion? These are all root causes of future disruptions that need to be addressed today. This book presents a cradle-to-cradle view of the Earth's abiotic resources through a novel and rigorous approach based on the Second Law of Thermodynamics: heat dissipates and materials deteriorate and disperse. Quality is irreversibly lost. This allows for the assessment of such depletion and can be used to estimate the year where production of the main mineral commodities could reach its zenith. By postulating Thanatia, one acquires a sense of destiny and a concern for a unified global management of the planet's abiotic resource endowment. The book covers the core aspects of geology, geochemistry, mining, metallurgy, economics, the environment, thermodynamics and thermochemistry. It is supported by comprehensive databases related to mineral resources, including detailed compositions of the Earth's layers, thermochemical properties of over 300 substances, historical energy and mineral resource inventories, energy consumption and environmental impacts in the mining and metallurgical sector and world recycling rates of commodities. Authors: Antonio ValeroCapilla / Alicia Valero Delgado Publisher: http://www.worldscientific.com/worldscibooks/10.1142/7323 Is Gaia becoming Thanatia, a resource exhausted planet? For how long can our high-tech society be sustained in the light of declining mineral ore grades, heavy dependence on un-recycled critical metals and accelerated material dispersion? These are all root causes of future disruptions that need to be addressed today. This book presents a cradle-to-cradle view of the Earth's abiotic resources through a novel and rigorous approach based on the Second Law of Thermodynamics: heat dissipates and materials deteriorate and disperse. Quality is irreversibly lost. This allows for the assessment of such depletion and can be used to estimate the year where production of the main mineral commodities could reach its zenith. By postulating Thanatia, one acquires a sense of destiny and a concern for a unified global management of the planet's abiotic resource endowment. The book covers the core aspects of geology, geochemistry, mining, metallurgy, economics, the environment, thermodynamics and thermochemistry. It is supported by comprehensive databases related to mineral resources, including detailed compositions of the Earth's layers, thermochemical properties of over 300 substances, historical energy and mineral resource inventories, energy consumption and environmental impacts in the mining and metallurgical sector and world recycling rates of commodities. Authors: Antonio ValeroCapilla / Alicia Valero Delgado Publisher: http://www.worldscientific.com/worldscibooks/10.1142/7323 Coal Mining's Environmental Impact | From The Ashes In Appalachia, coal companies blow the tops off of mountains to get at the coal. The damage this does to the surrounding environment and water supply is devasta... In Appalachia, coal companies blow the tops off of mountains to get at the coal. The damage this does to the surrounding environment and water supply is devastating. ➡ Subscribe: http://bit.ly/NatGeoSubscribe About From The Ashes: From the Ashes captures Americans in communities across the country as they wrestle with the legacy of the coal industry and what its future should be in the current political climate. From Appalachia to the West’s Powder River Basin, the film goes beyond the rhetoric of the “war on coal” to present compelling and often heartbreaking stories about what’s at stake for our economy, health, and climate. Get More National Geographic: OfficialSite: http://bit.ly/NatGeoOfficialSite Facebook: http://bit.ly/FBNatGeo Twitter: http://bit.ly/NatGeoTwitter Instagram: http://bit.ly/NatGeoInsta About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Through their world-class scientists, photographers, journalists, and filmmakers, Nat Geo gets you closer to the stories that matter and past the edge of what's possible. Coal Mining's Environmental Impact | From The Ashes https://youtu.be/ynN39sfqT8w National Geographic https://www.youtube.com/natgeo In Appalachia, coal companies blow the tops off of mountains to get at the coal. The damage this does to the surrounding environment and water supply is devastating. ➡ Subscribe: http://bit.ly/NatGeoSubscribe About From The Ashes: From the Ashes captures Americans in communities across the country as they wrestle with the legacy of the coal industry and what its future should be in the current political climate. From Appalachia to the West’s Powder River Basin, the film goes beyond the rhetoric of the “war on coal” to present compelling and often heartbreaking stories about what’s at stake for our economy, health, and climate. Get More National Geographic: OfficialSite: http://bit.ly/NatGeoOfficialSite Facebook: http://bit.ly/FBNatGeo Twitter: http://bit.ly/NatGeoTwitter Instagram: http://bit.ly/NatGeoInsta About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Through their world-class scientists, photographers, journalists, and filmmakers, Nat Geo gets you closer to the stories that matter and past the edge of what's possible. Coal Mining's Environmental Impact | From The Ashes https://youtu.be/ynN39sfqT8w National Geographic https://www.youtube.com/natgeo Reclamation in Mining See how DMME works with mining companies to ensure the land and the environment are returned to what they were, or better, before mining began. This video was p... See how DMME works with mining companies to ensure the land and the environment are returned to what they were, or better, before mining began. This video was produced on an AlphaNatural Resource's former coal surface mine site that has been recognized nationally for reclamation. See how DMME works with mining companies to ensure the land and the environment are returned to what they were, or better, before mining began. This video was produced on an AlphaNatural Resource's former coal surface mine site that has been recognized nationally for reclamation. Rep. Alan Lowenthal and Dr. Michael Hendryx on Mountaintop Mining Dr. Michael Hendryx explains his study of the health impacts of mountaintop removal mining on Appalachian communities at an Energy and Mineral Resources Subcomm... Dr. Michael Hendryx explains his study of the health impacts of mountaintop removal mining on Appalachian communities at an Energy and Mineral Resources Subcommittee hearing on May 14, 2015. Rep. John Fleming (R-La.) had told Dr. Hendryx that he'd "seen fifth grade science projects that were more scientific" and that Hendryx should be "embarrassed." Dr. Michael Hendryx explains his study of the health impacts of mountaintop removal mining on Appalachian communities at an Energy and Mineral Resources Subcommittee hearing on May 14, 2015. Rep. John Fleming (R-La.) had told Dr. Hendryx that he'd "seen fifth grade science projects that were more scientific" and that Hendryx should be "embarrassed." Conan Exiles - MountainTop Kingdom build - No cheats/resource hax 1st upload (more to come) ConanExiles - BuildShowcase - No cheats or resource hacks have been used in the making of this creation. I have created this solo ov... 1st upload (more to come) ConanExiles - BuildShowcase - No cheats or resource hacks have been used in the making of this creation. I have created this solo over the last 5 days using my bare hands :) Server: [UK]ShadowDynasty[NEW-RP-x4-Admins-Dedicated-24/7] Direct Connect: 193.111.184.13:8077 1st upload (more to come) ConanExiles - BuildShowcase - No cheats or resource hacks have been used in the making of this creation. I have created this solo over the last 5 days using my bare hands :) Server: [UK]ShadowDynasty[NEW-RP-x4-Admins-Dedicated-24/7] Direct Connect: 193.111.184.13:8077 Duty on a Mountain Top Outpost - Paktia Province, AF Soldiers from the 172nd Infantry Separate Brigade, based out of Germany, take it in turns to man an outpost on the Pakistan border in Afghanistan. The Taliban generally stay out of their way, choosing instead to target the base below with rockets. ATTENTION!! We are moving! Because of YouTube's new policy against military related videos and on where advertisers are allowed to put their Ads, we must move our videos. Join us at our new home! WWW.USMILITARYVIDEOS.NET! You will find videos and photos not found here on YouTube!! Plus forums to discuss all things military related! You can even post your thoughts there! Plus Sports, Outdoors, Snipers Hide, Shooting, Hunting and Fishing pages! Questions or comments email chris@usmilitaryvideos.net Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United StatesConcealedCarryAssociation) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. Want to win $5000 worth of ammo!?!?!? Thought that would get your attention! Here at US Military Videos & Photos we have partnered with USCCA (United States Concealed Carry Association) to bring you this great chance at some great benefits! Our founder and owner, Chris Wagoner, is a life member of USCCA and believes in it completely! Why listen to him you say? Because he is a 33 year+ cop and police firearms instructor. He knows firearms! USCCA is a great association that is designed to protect and educate the armed citizen! If you are thinking of carrying a firearm for self-protection, already carry one, have firearms in your home or know someone that does, this is for you! USCCA provides education through its training courses, DVD’s and books. Online resources are first class and very well done. The USCCA magazine “Concealed Carry” is full of great tips, gear reviews, and legal information every responsible gun owner should know. If that was all they did that would be enough to check them out, but what is one of the best benefits is that they will provide legal protection for you if you are involved in that life and death incident where you use your firearm for self-defense! That’s right they have insurance for your firearms and also will provide legal counsel if you need them because of a shooting incident. That alone is worth the membership fees! The piece of mind of knowing you are protected by USCCA in that time of chaos and emotional turmoil is worth it. So what do you have to do to get in on this $5000 ammo give away and check out the fantastic benefits of USCCA? Just click here - http://goo.gl/mMwJWd . Did we mention there would be 5 winners not just 1? 120,000 members can’t be wrong. We are moving! Come join us!! Join us at our new home! www.usmilitaryvideos.net! You will find videos and photos not found here on YouTube or elsewhere!! Plus forums to discuss all things military related! You can even post your thoughts there! We have become part of the www.Scout.com network and they have everything from sports to firearms to of course Military related items and great premium content for everyone!! Questions or comments email chris@usmilitaryvideos.net The Mountaintop Experience Learn more: http://bit.ly/LehighMountaintop At Lehigh University in Bethlehem, Pennsylvania, we have always prepared students to put knowledge into practice. Building on our strong foundation, we are defining a new centerpiece in our development of the next generation of leaders and problem-solvers, one focused on posing big questions and seeking answers, where students learn to take risks and productively chart their own territory, where professors are guides, mentors and fellow explorers, in an environment emphasizing hands-on learning and unconstrained by traditional disciplinary boundaries. Mountaintop is not a research lab. It is not a business incubator. It is not just another interdisciplinary workspace. Mountaintop will transcend all existing models in higher education, and it will do so by returning higher education to its roots—by focusing not only on the questions, and not only on the answers, but rather on the processes that come before and after each: inquiry, exploration, and discovery. THANATIA -- The Destiny of the Earth's mineral resources Is Gaia becoming Thanatia, a resource exhausted planet? For how long can our high-tech society be sustained in the light of declining mineral ore grades, heavy dependence on un-recycled critical metals and accelerated material dispersion? These are all root causes of future disruptions that need to be addressed today. This book presents a cradle-to-cradle view of the Earth's abiotic resources through a novel and rigorous approach based on the Second Law of Thermodynamics: heat dissipates and materials deteriorate and disperse. Quality is irreversibly lost. This allows for the assessment of such depletion and can be used to estimate the year where production of the main mineral commodities could reach its zenith. By postulating Thanatia, one acquires a sense of destiny and a concern for a unified global management of the planet's abiotic resource endowment. The book covers the core aspects of geology, geochemistry, mining, metallurgy, economics, the environment, thermodynamics and thermochemistry. It is supported by comprehensive databases related to mineral resources, including detailed compositions of the Earth's layers, thermochemical properties of over 300 substances, historical energy and mineral resource inventories, energy consumption and environmental impacts in the mining and metallurgical sector and world recycling rates of commodities. Authors: Antonio ValeroCapilla / Alicia Valero Delgado Publisher: http://www.worldscientific.com/worldscibooks/10.1142/7323 Coal Mining's Environmental Impact | From The Ashes In Appalachia, coal companies blow the tops off of mountains to get at the coal. The damage this does to the surrounding environment and water supply is devastating. ➡ Subscribe: http://bit.ly/NatGeoSubscribe About From The Ashes: From the Ashes captures Americans in communities across the country as they wrestle with the legacy of the coal industry and what its future should be in the current political climate. From Appalachia to the West’s Powder River Basin, the film goes beyond the rhetoric of the “war on coal” to present compelling and often heartbreaking stories about what’s at stake for our economy, health, and climate. Get More National Geographic: OfficialSite: http://bit.ly/NatGeoOfficialSite Facebook: http://bit.ly/FBNatGeo Twitter: http://bit.ly/NatGeoTwitter Instagram: http://bit.ly/NatGeoInsta About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Through their world-class scientists, photographers, journalists, and filmmakers, Nat Geo gets you closer to the stories that matter and past the edge of what's possible. Coal Mining's Environmental Impact | From The Ashes https://youtu.be/ynN39sfqT8w National Geographic https://www.youtube.com/natgeo Reclamation in Mining See how DMME works with mining companies to ensure the land and the environment are returned to what they were, or better, before mining began. This video was produced on an AlphaNatural Resource's former coal surface mine site that has been recognized nationally for reclamation. Rep. Alan Lowenthal and Dr. Michael Hendryx on Mountaintop Mining Dr. Michael Hendryx explains his study of the health impacts of mountaintop removal mining on Appalachian communities at an Energy and Mineral Resources Subcommittee hearing on May 14, 2015. Rep. John Fleming (R-La.) had told Dr. Hendryx that he'd "seen fifth grade science projects that were more scientific" and that Hendryx should be "embarrassed." Conan Exiles - MountainTop Kingdom build - No cheats/resource hax 1st upload (more to come) ConanExiles - BuildShowcase - No cheats or resource hacks have been used in the making of this creation. I have created this solo over the last 5 days using my bare hands :) Server: [UK]ShadowDynasty[NEW-RP-x4-Admins-Dedicated-24/7] Direct Connect: 193.111.184.13:8077
2023-08-17T01:26:36.242652
https://example.com/article/3527
682 S.W.2d 16 (1984) Robert E. PORTER, Appellant, v. STATE of Missouri, Respondent. No. WD 35486. Missouri Court of Appeals, Western District. September 25, 1984. Motion for Rehearing and/or Transfer to Overruled and Denied November 27, 1984. Application to Transfer Denied January 15, 1985. *17 James Fletcher, Public Defender, Kevin Locke, Asst. Public Defender, Kansas City, for appellant. John Ashcroft, Atty. Gen., Jefferson City, Philip M. Koppe, Asst. Atty. Gen., Kansas City, for respondent. Before CLARK, P.J., and DIXON and LOWENSTEIN, JJ. Motion for Rehearing and/or Transfer to Supreme Court Overruled and Denied November 27, 1984. CLARK, Presiding Judge. Appellant was convicted by a jury of the offenses of murder in the second degree and first degree assault. The convictions were affirmed on direct appeal. State v. Porter, 640 S.W.2d 125 (Mo.1982). In this proceeding under Rule 27.26, Porter sought to set aside the judgment and consecutive life sentences on various grounds. The trial court denied relief. Porter now appeals contending in a single point of error that ineffective assistance of counsel at the criminal trial was demonstrated. Affirmed. Because the claim of deficient representation by counsel is associated with the presentation of evidence, some review of the facts is necessary. From the testimony by the state's witnesses, the jury in the case was entitled to find that on the evening of January 7, 1981, Porter went to the home of a neighbor, William Long, for the purpose of borrowing money. Porter had been a frequent visitor at the Long home in the past, had done some minor jobs for Long and had participated in dice and card games there. Long had advanced Porter small sums of money in the past. As Porter was admitted to the house by Long, he found another neighbor, James Jones, also to be there. Long was at the time attempting to sell some objects in a garage type sale and Jones was looking at the merchandise. Jones had been a participant in the card and dice games in the past and was known to carry several hundred dollars in currency on his person. After exchanging some remarks, Porter asked Long for a loan. Long replied that he had no funds and Porter then made his request of Jones. The latter also declined saying he had no money to loan. Porter then moved to the front door of the residence, as if to leave, but before departing he turned toward Long and fired three shots from a revolver striking Long in the head, body and hip. At this point, Long fell to a chair and closed his eyes feigning death in the hope Porter would not shoot again. While his eyes were closed, Long heard another shot fired followed by the closing of the front door. Before losing consciousness, Long used a telephone to call the police. Officers soon arrived and transported the victims to a hospital where Jones was pronounced dead. As a consequence, the only witnesses to the events in the Long home the evening of January 7 were Long and Porter. Consistently from his first interrogation by the police through his evidence at trial, Long named Porter as the assailant. The only evidence presented at trial which linked Porter to the crimes was the testimony by Long described above. For his part, Porter denied the account by Long contending he was at a friend's house, together with his girl friend, throughout the evening and until the next morning. Porter's companions confirmed the alibi. Defense counsel attacked Long's identification evidence by attempting to show that Long was an alcoholic and that his recognition of the assailant was suspect because of his intoxicated state the night of January *18 7. By Long's own admission, he was accustomed to consuming eighteen beers a day, and on the night in question, he had drunk two shots of whiskey and was drinking his second beer when Porter arrived at his home. The defense adduced evidence as to Long's alcohol intoxication, not only from cross examination of Long, but from medical records at the hospital and from testimony by a physician and a police officer. The substance of that evidence was that Long had the odor of alcohol about him when he was taken to the hospital, that he exhibited withdrawal symptoms necessitating intravenous injection of alcohol, that he suffered from hallucinations and that he was incoherent when a police officer attempted to question him about the shooting. The strategy of the defense was to rely on Porter's alibi and to cast doubt on Long's identification evidence by suggesting that his intoxicated state precluded reliability. At the hearing on the 27.26 motion, Porter contended that his trial attorney had failed to provide adequate representation in that counsel did not call Porter's sister, Teresa, as a defense witness despite the fact that she had relevant and material evidence to supply. That evidence, described by both Porter and Teresa at the hearing consisted of a statement made to Teresa by Long subsequent to the crime. According to Teresa, she had engaged Long in a conversation and had inquired if he was certain it was Porter who had committed the offenses. Long had replied, "No, I can't really say." This was reported by Porter to defense counsel during trial preparation. The attorney told Porter the testimony would not aid his case and Teresa would not be endorsed or called as a witness. No testimony was available from the attorney to explain his decision because the attorney had died before the motion was heard. On appeal, Porter contends his evidence in support of his Rule 27.26 motion was sufficient to sustain his burden of demonstrating ineffective assistance of counsel because the failure to call Teresa as a defense witness proved inexcusable neglect by the attorney. On this account he asserts that the decision of the trial court overruling his motion was in error. At the outset, we reject the claim that the facts demonstrate attorney neglect. Whatever may be said of the attorney's choice not to call Teresa, it was, by Porter's own testimony, a decision made by the attorney in determining what would or would not be beneficial defense evidence. Porter stresses that the attorney reached a decision on the matter abruptly and without interviewing Teresa. Some cases have turned on incomplete investigation by defense counsel where leads to potential evidence were not pursued and where possible witnesses were not contacted. This is not such a case. It is true the attorney did not contact Teresa to obtain first hand from her the content of her conversation with Long, but that was unnecessary to make a decision about using the witness. The account of Teresa's conversation was brief and simple. The attorney was entitled to assume Teresa would be a willing witness and would repeat from the stand the same account given Porter. On the facts, the attorney decided Porter's case would best be presented by not using Teresa's testimony. Whether, in retrospect, the choice by the lawyer was flawed or sound, it was in all events a calculated decision in the composition of the defense presentation. The case is distinguishable from those in which, by neglect, lethargy or ignorance, the defense attorney is charged to have failed to present defense evidence. The cases have consistently held that selection of witnesses to be called is a matter of trial strategy. Franklin v. State, 655 S.W.2d 561, 565 (Mo.App.1983). Even if later shown to be wrong, a decision made as to trial strategy does not support a finding of ineffective assistance. Gentile v. State, 637 S.W.2d 30 (Mo.App.1982). These principles would seem to resolve the question here, but on closer analysis, they do not answer Porter's assertion, first that *19 there was no explanation of any reasoned basis for the attorney's decision not to call Teresa, in the absence of testimony from him and, second, that the facts lead to no hypothesis suggesting any ground not to use the witness to aid the defense challenge to Long's credibility. The briefs indulge speculation on the subject, but this is to no profit because the reasoning process used by the deceased attorney is incapable of reconstruction. In Brame v. State, 597 S.W.2d 665 (Mo. App.1980), this court examined in detail the aspects of an ineffective assistance of counsel claim where counsel has made choices as to the conduct of the trial and presentation of the defense. It was there said: "By the very nature of a criminal trial, a lawyer's function is a continuing judgmental process. Choices are constantly presented for one alternative action or another, often in a shifting factual situation with little or no time for reflective thought before decision is required. * * Factors which influence those practical judgments are often subtle and not apparent on a cold record. * * * Likewise, in the setting of a criminal trial, the alternatives may be all bad." Brame at p. 669. The opinion holds that the constitutional requirement for effective assistance of counsel assumes inability of the accused to make the judgments as to alternate courses available in trial and therefore the decisions counsel makes are insulated from hindsight criticism by the client through the very nature of the client-attorney relationship. Missouri case law has been in the forefront of developing trends in this area as is confirmed by the rationale adopted in Strickland v. Washington, ___ U.S. ___, 104 S.Ct. 2052, 80 L.Ed.2d 674 (1984). Justice O'Connor, writing for the court, described the limits upon post-hoc evaluation of counsel effectiveness in the following terms, which correspond to previous Missouri decisions on the subject: "Judicial scrutiny of counsel's performance must be highly deferential. It is all too tempting for a defendant to secondguess counsel's assistance after conviction or adverse sentence, and it is all too easy for a court, examining counsel's defense after it has proved unsuccessful, to conclude that a particular act or omission of counsel was unreasonable. (citation omitted). * * * Because of the difficulties inherent in making the evaluation, a court must indulge a strong presumption that counsel's conduct falls within the wide range of reasonable professional assistance; that is, the defendant must overcome the presumption that, under the circumstances, the challenged action `might be considered sound trial strategy' (citation omitted)." Strickland 104 S.Ct. at p. 2065-66. The court concluded in Strickland that strategic choices made by counsel with knowledge of the law, the facts and plausible options are "virtually unchallengeable." From the foregoing, we conclude that where a claim of ineffective counsel is raised in a post-conviction proceeding and the attorney conduct involves the exercise of a choice in the presentation of the defense or the procedures selected in trial, the claim must fail if, within a wide range of reasonable professional assistance, the choice may be considered sound trial strategy. Of necessity, each case must be evaluated on its facts. A strong presumption of right action, however, severely limits such ineffective assistance claims to the end that it will be the rare exception where a strategic choice is declared to have been unsound. In the present case, the decision not to call Porter's sister as a witness was a choice of trial strategy made within the wide range of reasonable professional service to Porter by his attorney. The record fails to demonstrate otherwise or to persuade that Porter has overcome the strong presumption that the strategy was sound, notwithstanding the adverse verdict returned by the jury. This conclusion renders it unnecessary to speculate on *20 grounds for the choice of strategy or to discuss the subordinate question of whether a demonstrably different result would have followed had the witness been called. The judgment is affirmed. All concur.
2024-02-26T01:26:36.242652
https://example.com/article/2969
SUREÑOTHE OPPOSITE HOUSE Dear Cherry, I first went to THE OPPOSITE HOUSE boutique hotel, a Swire Hotel property, in Beijing in 2009 to do a review of SUREÑO, then a Mediterranean restaurant with an Italian Chef, and I have always been satisfied with the restaurant and itshappy service team. Recently, I was invited by the hotel Sommelier, Ashley Gao, to return to SUREÑO to experience an adjustment to the restaurant’s concept and a totally new menu designed by their new Chef De Cuisine, Talib Hudda. I was excited to renew my experience with this fine restaurant and we arranged an evening for me to perform a review. I arrived early and went to MESH, a lively bar just opposite the main lobby check-in area, and I enjoyed a nicely made and well-chilled Martini while I waited to meet with Ashley before dinner. When she arrived, we had a nice conversation about the plans for my evening and we talked with Blanche Yan,Communication Executive, about official photos required for my article. Upon finishing my Martini, we proceeded to the elevator to go down 1 floor to SUREÑO. We walked past the familiar open kitchen to the back of the main dining room to a nice table overlooking most of the restaurant. I was happy with this location and I got settled and prepared for writing while Ashley opened a bottle of 1421 Gold Chardonnay from Xinjiang Province, China, and poured a glass for me. After a brief talk about the timing of the dinner servings Ashley left for another meeting. Kevin Mau, Operations Manager, introduced himself to me and brought my first serving, which was Grilled Flat Bread with Hummus, Roasted Garlic, Olive Oil & Sea Salt. Served on a wooden board were 8 triangular slices of grilled flat bread and a sea green colored ceramic plate coated 2/3 of its surface with hummus with a sprinkling of ground herbs and 3 sprigs of fresh Italian parsley. The flat bread was firm but slightly moist, not dried out. The hummus was smooth and full flavored with the garlic and olive oil. I dipped the bread in the hummus and really enjoyed the rich garlic flavor in the hummus and I rather quickly consumed the bread and hummus alternating with sips of the cool and fruity Chardonnay.This was a very nice way to start my dinner! Chef Talib created a tasting menu called Winter Tasting 2017 with 6 servings of food, and the option of selecting 6 wine pairings at additional cost. Kevin brought a surprise snack for me, not listed on the menu, Parma Ham Croquette with Shaved Black Truffle & Lemon Aioli.The croquette was a ball sitting in the aioli sauce with ample truffle shavings shredded on top and on the plate around the croquette. I cut the ball in half with my fork and tried half of it. It was hot inside with chunks of ham and a little crispy on the outside. It tasted good with the shredded black truffle and the aioli sauce added more flavor. This was a nice surprise opener to the menu yet to come and I enjoyed the Chardonnay with it. My first course from the menu was Smoked Salmon Carpaccio – Salsa Juverte, Radicchio, Candied Black Olive & Squid Ink Rice Cracker. This actually looked like a salad, with thin slices of smoked salmon under a mixture of the other ingredients with endive and radicchio on top with a little foam and a garnish of watercress. The black squid ink rice crackers added color and texture and the different greens added their unique flavors. Kevin told me that the salmon was special Aqua Select Sustainable Salmon from Chengdu. I decided to approach this complex arrangement of tasty ingredients by taking each bite as a mixture because that is what I felt was the intention of the Chef. Each ingredient had its place in the flavor mix. The smoked salmon base was tender, smooth, and well flavored.I liked combining the rice cakes with the salmon for a marked contrast in textures, but with complimentary flavors. The Chardonnay was good with this dish, the complexity of the wine handling the complexity of flavors in the mix. My next course was Tamarind Torchon – Campari & Malt Whisky marinated Foie Gras Torchon, Cashew & Crispy Couscous, Tamarind Purée, and Flaxseed Cumin Cracker.Reading it on the menu sounded interesting and when it arrived I was impressed with the beautiful presentation. The tamarind purée was used to make tamarind leather by brushing it on a smooth sheet of stainless steel and letting it air dry, leaving a layer of dehydrated tamarind purée. This was cut into a strip of what looked like reddish-brown leather and arranged with a few wrinkles at the top of the round disc of sliced foie gras on the dark grey ceramic plate. To the left of the disc of foie gras was a dollop on tamarind purée that was not air-dried and sprinkled on the lower part of the disc of foie gras were chopped cashews and crispy couscous. Served in a separate oval shaped wooden bowl were the freshly made fried flaxseed cumin crackers. This was a fascinating display of ingredients that left me intrigued with how it would taste. I started by tasting the dollop of tamarind purée, which was sweet and went well with the crispy couscous and chopped cashew nuts so I spread this combination all over the foie gras and tried it together. WOW, what an interesting combination of flavors! The sweetness of the tamarind purée was great with the foie gras and I loved the crunchy couscous and cashews with it. The foie gras was smooth and richly flavored and the marinade of Campari and malt whisky brought out the sweetness in the foie gras. I tried a crispy flaxseed cumin cracker after the foie gras for different sensations of texture and flavor and then I tasted the tamarind leather. It looked like leather, but it didn’t taste like leather. It was chewy and sweet and I finished it with the last flaxseed cumin cracker.This was so unique…it was fun! I enjoyed a nice glass of the Chardonnay while reflecting on this exquisite dish and waited for my next course, Fassolatha & Caviar – Poached Egg, Fava Beans, Cumin Butter, Charred Avocado & No.1Baerii Caviar. Chef Talib explained the composition of this dish to me. White bean purée mixed with raw olive oil was on the bottom with a poached egg placed above, topped with W3 caviar from Yunnan that is based on sturgeon caviar from Russia. The feed for the fish is imported from Europe and the producer is French. The poached egg and caviar was surrounded by a ring of fava beans, charred avocado, and celery mixed with cumin butter.This combination looked and smelled great and had rich flavors. The charred avocado was firm around the edges with smoky flavors, while the cumin butter was very rich with strong cumin flavor. The fava beans were lightly cooked and tender, but with structure. Then I broke the egg and mixed it all together. I ate it like a chunky egg soup with powerful cumin flavor. This was another interesting dish with excellent flavors and textures. My next course was Smoked Chestnut Agnolotti – Parma Ham, Sage & Cream Sauce, and Squid Ink Ash. For this, Kevin opened a bottle of 1421 Gold Cabernet Sauvignon from Xinjiang Province, China. It was a medium bodied red wine, clean and fruity with mild tannins. This is the only pasta dish Chef Talib makes, simple and tasty. It smelled wonderful with smoked sage, chestnut, and Parma ham. The squid ink ash, which I have never seen before, looked like ground black pepper sprinkled liberally on top, but it was flakey in texture like a finely ground herb for a very unique appearance and taste. There were wide strips of pasta covered in the rich ingredients, that when combined, made a creamy flavor packed pasta experience. It was even a little sweet and the flavor of the Parma ham came through clearly and it was perfect! I liked the easy drinking and mildly spicy red wine with it and I lingered with the glass while I waited for my next course. Kevin brought Angus Beef Tenderloin & Celery Root – Grilled Tenderloin, Celery Root, Cilantro & Tarragon Polenta. The sliced tenderloin was sitting in a rich beef jus sauce with shaved celery root about an inch wide and up to a foot long perched on top. It was a little crunchy like carrots and the flavor was mild. The polenta was rich and creamy with nice flavors from the cilantro and tarragon. I added a little sea salt and ground tellicherry black pepper to the beef because that is the way I like it. The polenta was great with the beef, which was tender and cooked medium as I requested. This dish was a good, well-coordinated bunch of flavors and I enjoyed it all with the dry fruity red wine. My final course was Superfredo – Strawberry Semi-fredo, Chocolate Cake, Balsamic Hazelnut Sauce & Berries. Chef Talib explained that this was made with hazelnut praline and reduced Balsamic sauce under a flourless brownie made with 64% valrhona chocolate. A strawberry meringue with whipped cream was then frozen with liquid nitrogen for superfredo and put on top of the chocolate brownie. Kevin delivered it with dry ice smoking in the bottom of the bowl. It looked like a coral reef in the ocean, but it quickly melted in my mouth with good strawberry flavor. There were some fresh strawberries and raspberries underneath and the brownie was rich in chocolate sensations. It was a great way to finish a fantastic dessert that started out light and finished strong! I enjoyed the rest of the nice Cabernet Sauvignon while talking with Chef Talib about my positive impressions of this excellent dinner and I expressed my enthusiasm for his exquisite cuisine. I have no doubt that his influence on the future of SUREÑO will take this famous landmark restaurant to new heights in Beijing, and I look forward to watching his progress and enjoying the fruits of his labor. I extend my sincere thanks to the excellent culinary and service teams at SUREÑO for a wonderful dining experience. See you again soon! CHEERS!!! My Best as Always, Randy
2024-07-24T01:26:36.242652
https://example.com/article/7180
Janesville city council debates room tax JANESVILLE--The city of Janesville next year will send more of its 8 percent room tax to the Janesville Area Convention & Visitors Bureau, but some city council members think that's still not enough. Councilman Brian Fitzgerald led a recent push to increase money given to the visitors bureau, which would require corresponding cuts in the 2014 city budget. The Janesville Convention & Visitors Bureau is an independent, non-profit corporation funded by the city hotel room tax. A majority of council members at a recent budget study session agreed to send 5 percent more of the room tax to the visitors bureau next year, meaning the visitors bureau will get 47.5 percent of room tax collected. That's less than the 10 percent increase Fitzgerald was seeking. Every dollar invested with the bureau creates more than $17 in economic impact for local business, Fitzgerald said, citing visitors bureau statistics. “Nothing we do here in City Hall has that kind of return,” Fitzgerald said. Council members voted 4-3 in favor of the 5 percent increase and told acting City Manager Jay Winzenz to find $31,500 in cuts to the city budget to compensate. The increase is the second for the visitors bureau in two years. Councilman Matt Kealy convinced the council in 2012 to up the percentage of room tax given to the visitors bureau in 2013 to 42.5 percent. In 2012, total room taxes totaled $726,625, and 37.5 percent—or $272,484—was given to the visitors bureau. Numbers for 2013 won't be available until the year is done. HOW THE MONEY IS SPENT Christine Rebout, bureau executive director, told council members she spends most of her money not to lure leisure travelers but to market the city as an affordable place with nice facilities for business meetings and conventions. Rebout's staff attends about six trade shows a year. Rebout said she would use any additional money to market sporting events and tournaments. “We really need to jump into it and do more,” she said. “We have nice facilities." She cited the Youth Sports Complex, Dawson Fields and the ice arena as examples. Sporting events, meetings and conventions help fill hotel rooms in the off season. The city lacks available hotel rooms in August and September, but investors are reluctant to build more rooms if they can't fill them in the slow months, Rebout said. Rebout is also at a point where she might also need to hire an additional sales person, she said. In addition, it costs to bid for events such as the World Water Ski Show Tournament. The city is in danger of losing the ski show because it has not upgraded the site while other communities are investing in their venues, she said. “We're not going to automatically keep nationals and world here if we are not going to continue to invest,” Rebout said. 'IT'S BEEN ABUSED' Fitzgerald said the room tax when created was intended for the convention and visitors bureau. “Quite frankly, it's been abused and used for so many things,” Fitzgerald said. He suggested hotel owners agreed to the tax in 1988 because the money was to be used to promote the city and fill hotel rooms. Fitzgerald did his own survey and found that out of 15 cities and towns surveyed, Janesville ranked fifth-lowest in the percentage of room tax given to its bureau. Beloit and Wisconsin Dells are at 90 percent and Racine and Oshkosh are at 85 percent, for example. Brookfield gives its visitors bureau the least--17 percent of room tax collected. Fitzgerald said Janesville is competing with every city in Wisconsin for visitors and conventions. “Even Beloit is outspending us by a huge amount,” Fitzgerald said. “It's not a race where you want to be in second place.” Winzenz disagreed with Fitzgerald's contention that money was “taken away” from the bureau. No percentage was specified in the original state law that created a 5 percent room tax, Winzenz said. In 1988, Janesville established a 5 percent room tax and took 4.5 percent, directing a half percent to the bureau. A state amendment in the 1990s specified that 70 percent of any increases go to visitors bureaus. The city increased the room tax by 1 percent each year in 1997, 2000 and 2002, with 70 percent of each increase going to the visitors bureau. The city justifies keeping the money because visitors also use services residents pay for, such as streets and emergency responses. Fitzgerald said it is imperative the bureau get more money now because businesses plan several years in advance. “It isn't something we're going to see results overnight,” he said. In addition, legislation has been proposed that would force cities to give 70 percent of all room tax collected to their visitors bureaus. “If the state of Wisconsin passes the legislation that forces us to go to 70 percent, now it's a free for all,” Fitzgerald said. “Everybody is increasing their budget. I'd rather be in on the front edge. At that point, we have an advantage. “This is a race we've got to be in … We've got to be able to compete on a level playing field with these other cities.” Councilman Douglas Marklein, too, sounded a warning. He opted for a 5 percent increase in 2014, though, because he said the 2014 city budget already is bare bones. Marklein reminded council members of the upcoming reconstruction of Interstate 90/39 in the next five to seven years. “As a traveler, I'm usually loath to pull off the highway when there is road construction,” Marklein said. “I will go to the next city to avoid it.” He said the planned sound barrier walls won't help. “We will have these barrier walls that will basically block Janesville out for people driving through Janesville. And, if they (the state) increase the speed limit, (drivers) will be whipping through here about 80 to 85 miles an hour. They won't even see Janesville until they're halfway to Milton. “We will need to look for ways to pull people off this highway and make this a destination worthy of stopping,” Marklein said. “It's a wise investment to make, especially with what's going to happen in the next eight or so years.”
2023-12-19T01:26:36.242652
https://example.com/article/7576
CPC-150 Tuberculosis and Systemic Diseases Abstract Background The immunosuppression of systemic diseases makes the management of patients with tuberculosis more complicated. Purpose To monitor the clinical evolution of tuberculosis in patients suffering from systemic diseases. Materials and Methods A retrospective study, from 1998 to 2012, in the internal medicine service in Rabta hospital, Tunisia, of 9 patients (8 women and a man, median age: 54 years) suffering from connective tissues disease, treated by corticosteroids linked in one or several treatments to immunosuppressants, who subsequently developed tuberculosis. Results The median time to diagnosis was 116 days (7d – 1 year). The location of the tuberculosis was pulmonary (n = 2), ganglionic (n = 3), urogenital (n = 2), tubercular spondylodiscitis (n = 1), more than one location (n = 1). The diagnosis of tuberculosis was confirmed by bacteriology (n = 4) four cases, histologically (n = 5) and by a test treatment (n = 1). Systemic illnesses were: systemic lupus erythematous (n = 5), Gougerot-Sjögren syndrome (secondary or primary) (n = 3), sarcoidosis (n = 1), systemic scleroderma linked to pernicious anaemia (n = 1), rheumatoid arthritis (patient 2 linked to lupus) (n = 1) and multiple auto-immune syndrome (n = 1). The diagnosis of systematic illness was made before that of tuberculosis in 8 patients and concomitantly in only one. Under treatment by four drugs then by two drugs, the evolution of tuberculosis was favourable in five of nine patients. One of the patients developed an allergy in isoniazid and resistance to the anti-tubercular treatment. Five of our patients recovered from their illness. Conclusions This study confirms the often extra-pulmonary character of tuberculosis in patients with systemic disease as well as the difficulty of diagnosis and problems multiplied by this association.
2023-11-28T01:26:36.242652
https://example.com/article/1036
Malta Malta is one of the most southern of the Western Med islands being just 90km south of Sicily and 350km from the North African coast. Malta is, in fact, made up of the three islands of Malta, Comino and Gozo with a population of over 400,000 and land covering around 320 sq km. The Maltese islands have been inhabited for over 7,000 years and is full of history, art, culture and breathtaking scenery. 98% of the population is Roman Catholic and dates back to when St Paul was shipwrecked here in AD60. However, neolithic settlements and temples predate Stonehenge. Phoenicians and Carthaginians settled here with the former introducing trade and the making of glass and jewellery. The Romans occupied the islands from BC218 to AD400 and the Byzantines from AD535 until the Arabs invaded Malta from Sicily in AD870. The Normans seized the islands in AD1091 and started forming much closely ties with Europe rather than North Africa. The islands were passed onto various European dynasties until the Aragonese finally took control in AD1282. The Aragonese and Catalan families that settled here became the island’s aristocracy. The formal running of the islands was established in the fortified town of Mdina (Rabat) and a number of magnificent baroque churches were built. Charles V, Holy Roman Emperor donated the islands to the Knights of St John in 1530 when they became homeless, having been removed from Rhodes after the Crusades. Their rent for the islands was one Maltese Falcon per annum. The Knights found an island of some 15,000 people who were to have their lives transformed with all the fortification work as well as the establishment of a hospital system that would be the envy of the region. Before the Great Siege of 1585 by the armies of the Ottoman Emperor, Suleiman the Magnificent, the centre of Malta was around Birgu, one of the three cities in the Grand Harbour. The Fort of St Elmo was seen as sufficient to withstand a siege. The Great Siege lasted from May 18th to September 8th with many forts being reduced to rubble. Some 40,000 Turkish troops landed on Malta and heavily outnumbered the local troops. Local folklore states that it was divine intervention that relieved the siege so September 8th is now a national feast day. After the siege, Valletta became the capital and huge fortification work began and is very much in evidence today. The Knights also brought security and prosperity to the islands until Napoleon invaded in 1798. It was a very short lived occupation as the Maltese rose up in revolt and besieged the French inside Valletta until the British took over two years later. It was during the British occupation that the naval dockyards were expanded and it became a strategic destination for troop and ship movements in the Med. During the Second World War the islands really suffered at the hands of the Axis powers when they were bombarded by air strikes and blockades for three years. They held out, just, until a relief ship arrived in May 1943. The Maltese Flag In 1942, King George VI granted the islands and its people the George Cross for bravery and it was incorporated into the national flag. Malta gained its independence in 1964 but continue to have strong ties with the UK and Europe. Walking around Valletta, you really get a sense of history and can see why it is a UNESCO World Heritage Site. The legacy of the Knights is very strong as is the number of churches! The Co-Cathedral, completed in 1577, is another example of the Knights’ influence with so much gold decoration and many of the Knights buried there. It was granted Co-Cathedral status, along with the cathedral in Mdina, during the French occupation of 1798-1800. There is a Caravaggio painting of The Beheading of St John the Baptist in the Co-Cathedral that is simply stunning. Across the water on the eastern side of Valletta is Grand Harbour, now full of super yachts for the winter. This area of the Three Cities (Cospicua, Senglea and Vittoriosa) provides fantastic views of Valletta. We hired a car to travel round the rest of Malta, where we saw a combination of Baroque architecture, Neolithic temples and amazing landscapes. In Rabat, we visited the catacombs of St Paul, where early Christians were buried. Sadly, the photos did not come out well. We also travelled to the south east corner to the fishing village of Marsaxlokk with its distinctive fishing boats. The picturesque harbour is filled with excellent restaurants serving locally caught fish. Gozo, a short ferry ride away, is a very different island. Much more laid back but still with plenty of history. The Neolithic temples at Xaghra were expensive (by Maltese standards) but it did include an excellent tour of a nearby windmill. Although we saw it at New Year, so not exactly at high season, it was much quieter than Malta and you got a feeling that it was more of a beach destination. We did spot a few bays on our travels that looked good anchorages for later in the year.
2024-04-06T01:26:36.242652
https://example.com/article/4321
41 Cal.App.4th 1632 (1996) INTERNATIONAL BROTHERHOOD OF ELECTRICAL WORKERS, LOCALS 11, 302, 340, 441, 569, 595, Plaintiff and Appellant, v. LLOYD W. AUBRY, JR., as Director, etc., Defendant and Respondent. Docket No. A069548. Court of Appeals of California, First District, Division Five. January 29, 1996. *1634 COUNSEL Altshuler, Berzon, Nussbaum, Berzon & Rubin, Peter D. Nussbaum and Scott A. Kronland for Plaintiff and Appellant. John M. Rea, Vanessa L. Holton and Frank Nelson Adkins for Defendant and Respondent. OPINION PETERSON, P.J. Appellant Unions contend the Director of the Department of Industrial Relations of the State of California (Director) committed a prejudicial abuse of discretion when he determined that certain sums deducted from workers' wages and repaid to employers, as wage rebates, should not be counted in calculating the "actually prevailing" wage rates for specified jobs, under the provisions of Labor Code section 1773 (section 1773) and title 8, California Code of Regulations, section 16000 (regulation 16000). We find no such abuse of discretion, and affirm the trial court's order which denied the Unions' petition for a writ of mandate. The Director acted properly, and well within his lawful discretion, when he determined the sums which workers are required to pay back to employers as wage rebates should not be counted when calculating the true wage rate "actually prevailing" for a given job classification under the provisions of section 1773. I. FACTS AND PROCEDURAL HISTORY During the period from 1992 to 1994, the Director conducted an investigation of certain alleged wage rebates or "Job Targeting" practices by unions and union contractors. Such job targeting practices were intended to aid contractors employing union employees to obtain public and private construction contracts. It was alleged that these rebate practices distorted the *1635 bidding on public works in California which are subject to prevailing wage laws. The investigation found that unions and union contractors would agree among themselves that a portion of their workers' wages paid pursuant to the terms of collective bargaining agreements would be paid back to unionized employers, utilizing a mandatory dues assessment scheme which funneled a specified portion of workers' wages through the union and back to the employer. The effect of these wage rebates was to make it appear that a higher wage rate was being paid to workers than they, in fact, received. This distorted the Director's attempts to enforce the prevailing wage laws on public works projects, because nonunion contractors bidding for public works were being required to pay a higher rate to their workers than union workers actually received in the private marketplace. Since the purpose of the prevailing wage laws for public works projects, as stated in section 1773, is to ensure that workers on these projects receive the wage rate "actually prevailing" for similar work on private jobs, the Director concluded he should disregard the amount of any wages thus rebated to employers in calculating the wages actually prevailing. For example, if a union had a labor contract calling for wages of $20 per hour on certain electrical work, but the union assessed its members 2 percent of their wages and returned these wages to employers, then the "actually prevailing" wage rate would be $19.60 rather than the $20 rate which existed on paper. Therefore, workers on public works jobs, whether union or nonunion, could be paid the $19.60 rate which was actually prevailing, rather than the nominal $20 rate. In 1995, appellant Unions filed a petition for a writ of mandate in the superior court, contending the Director's determination should be set aside as contrary to law. After considering the evidence presented and hearing argument, the Honorable Stuart R. Pollak issued a written opinion ordering the denial of the requested relief. Appellant Unions filed a timely appeal. II. DISCUSSION We affirm the trial court's order denying the petition for a writ of mandate. The Director acted properly in concluding these mandatory wage rebates, paid back to employers pursuant to union-mandate job targeting programs, should not be counted when calculating the wage rate "actually prevailing" for work under the terms of section 1773. In reviewing the trial court's order upholding the Director's decision to calculate the "actually prevailing" wage rates under the terms of section *1636 1773, we exercise independent review of issues of law, but uphold the trial court's implicit factual findings if they are supported by substantial evidence. (Independent Roofing Contractors v. Department of Industrial Relations (1994) 23 Cal. App.4th 345, 352 [28 Cal. Rptr.2d 550] (Roofing).) We will only overturn the Director's quasi-legislative decision if it is "arbitrary or capricious" or in conflict with the clear terms of the Director's statutory mandate. (Id. at pp. 358-359; see also Winzler & Kelly v. Department of Industrial Relations (1981) 121 Cal. App.3d 120, 124-125 [174 Cal. Rptr. 744].) Section 1773 provides in pertinent part as follows: "The body awarding any contract for public work ... shall obtain the general prevailing rate of per diem wages ... from the [Director].... [¶] In determining such rates, the [Director] shall ascertain and consider the applicable wage rates established by collective bargaining agreements and such rates as may have been predetermined for federal public works, within the locality and in the nearest labor market area. Where such rates do not constitute the rates actually prevailing in the locality, the [Director] shall obtain and consider further data from the labor organizations and employers or employer associations concerned, including the recognized collective bargaining representatives for the particular craft, classification or type of work involved. The rate fixed for each craft, classification or type of work shall be not less than the prevailing rate paid in such craft, classification or type of work." (Italics added.) In compliance with this statutory mandate, the Director conducted an investigation which revealed that the wage rates specified in certain collective bargaining agreements are not the wage rates "actually prevailing" because some percentage of the wages paid to workers is returned to unionized employers utilizing the union's "Job Targeting Program" as a funnel. Appellant Unions conceded these wage rebates existed in the form of mandatory dues assessments against the stated wage rates paid to workers, the proceeds of which are returned to union contractors; but the Unions defended this practice as a means of securing work without specifying lower wage rates in labor contracts. The Director determined this rationale supported his decision to exclude the amounts of "Job Targeting" wage rebates from his calculations of the wage rates "actually prevailing" under section 1773. (1) The Director acted properly. Section 1773 does not simply specify the nominal wage rate set forth in a labor contract or collective bargaining agreement as the prevailing wage rate. Rather, section 1773 recognizes that the rate specified in a collective bargaining agreement may not be the wage *1637 rate "actually prevailing" for the work, and requires the Director to ascertain the "actually prevailing" wage rates. The Director "must consider other information where the rates set by agreement are not actually prevailing." (Roofing, supra, 23 Cal. App.4th at p. 355, italics added, fn. omitted.) After conducting a factual investigation and considering the relevant information, the Director properly determined that wage rebates mandatorily deducted from workers' wages and returned to employers should not be counted in determining the wage rate actually prevailing under section 1773. This was not arbitrary or capricious, and was well within the range of the Director's quasi-legislative discretion under section 1773. (See Roofing, supra, 23 Cal. App.4th at pp. 358-359.) The trial court properly so ruled. A number of recent federal decisions in analogous contexts also support the Director's and trial court's decisions in this regard. In Building and Const. Trades Dept., AFL-CIO v. Reich (D.C. Cir.1994) 40 F.3d 1275, 1280 [309 App.D.C. 244] (Reich), the District of Columbia Circuit Court of Appeals upheld the decision of the federal Secretary of Labor who had determined a similar job targeting program (JTP) deduction scheme from workers' wages constituted illegal kickbacks for purposes of federal public works projects under the federal Davis-Bacon Act (40 U.S.C. § 276a et seq.): "JTP deductions from wages of mechanics and laborers on Davis-Bacon projects have the effect of artificially increasing the prevailing local rate wage, which must be met by non-union employers, by the inclusion in the local average of the pre-deduction wages paid by the unionized employers before the deduction. The union employees then suffer a reduction in their wages (potentially, though not always, below the prevailing wages) through deductions precluded by the language of the Act." The Reich court held the decision of the federal Secretary of Labor to preclude such schemes for artificially elevating the prevailing wage rate was "rational and based upon a reasonable interpretation of the statute." (40 F.3d at p. 1280.) The same is true here. More recently, on October 20, 1995, the Ninth Circuit Court of Appeals also so ruled. In International Broth. of Elec. Workers v. Brock (9th Cir.1995) 68 F.3d 1194, 1202-1203 (Brock), the Ninth Circuit held that the very job targeting funds in issue here — funds deducted from the paychecks of unionized electrical workers who are members of the International Brotherhood of Electrical Workers, and then funneled through the union back to unionized employers — were illegal under the federal Davis-Bacon Act, and did not constitute valid union membership dues. The same is true here. *1638 (2) Appellant Unions, however, present a highly technical argument that the Director's action violated the provisions of a certain regulation he had previously promulgated, regulation 16000. We reject this argument. Regulation 16000 simply provides definitions of a large number of terms, including "General Prevailing Rate of Per Diem Wages." After stating that the defined term includes numerous employer payments not directly relevant here, the definition also states that the term excludes employer payments for: "(1) Job related expenses other than travel time and subsistence pay; [¶] (2) Contract administration, operation of hiring halls, grievance processing, or similar purposes ...; [¶] (3) Union, organizational, professional or other dues except as they may be included in and withheld from the basic taxable hourly wage rate; [¶] (4) Industry or trade promotion; [¶] (5) Political contributions or activities; [¶] (6) Any benefit to employees ... where the contractor or subcontractor is required by Federal, State, or local law to provide such benefit; or [¶] (7) Such other payments as the Director may determine to exclude." (Reg. 16000, subd. (b).) The Director did not actually decide whether the job targeting wage rebates in question here could properly be excluded under regulation 16000, subdivision (b)(3) or (b)(4), because he reasoned that such a decision might raise questions of preemption under federal law,[1] and because neither of these subdivisions was a precise fit for the payments in issue. However, the Director did decide that these payments could be excluded under subdivision (b)(7) quoted above, which allows the Director to exclude "Such other payments as the Director may determine to exclude." The Unions, by contrast, argue their job targeting assessments qualify under subdivision (b)(3) quoted above, which excludes union dues "except as they may be included in and withheld from the basic taxable hourly wage rate." It is well established that we must accord substantial deference to an administrative body's interpretation of its own specialized regulations, especially where as here the Director is exercising a quasi-legislative function delegated to him by the Legislature pursuant to the broad mandate of section 1773, which requires him to determine the wage rate "actually prevailing" in the local community. (See Lusardi Construction Co. v. Aubry (1992) 1 Cal.4th 976, 987-989 [4 Cal. Rptr.2d 837, 824 P.2d 643] (Lusardi) [The Director has authority to enforce the prevailing wage laws by regulations or administrative actions consistent with the statutory purpose.]; Roofing, supra, 23 Cal. App.4th at pp. 358-359; cf. also Ruth v. Kizer (1992) 8 Cal. App.4th 380, 387-388 [10 Cal. Rptr.2d 274]; Cole v. City of Oakland *1639 Residential Rent Arbitration Bd. (1992) 3 Cal. App.4th 693, 697-698 [4 Cal. Rptr.2d 593].) Under regulation 16000, the Director may choose to exclude any "other payments" (subd. (b)(7)) from employers if their inclusion would be inconsistent with the statutory purpose of ascertaining the wage rate which is "actually prevailing" for purposes of section 1773. The Director properly concluded the job targeting wage rebates in issue here were "other payments" which did not reflect a wage rate "actually prevailing" under section 1773. A contrary conclusion was not required merely because subdivision (b)(3) of regulation 16000, in stating another exclusion separate from subdivision (b)(7), expressly excludes union dues, and then excludes from the scope of this exclusion those union dues which are withheld from the basic taxable wage rate. An exclusion from the scope of one exclusion does not trump another separate applicable exclusion. Further, if regulation 16000 did require such a result as the Unions urge, it would be invalid as in conflict with the statutory mandate of section 1773, which requires that the Director not simply accept a rate stated in a collective bargaining agreement at face value, but also determine whether the rate in question is "actually prevailing" before authorizing it. (See Roofing, supra, 23 Cal. App.4th at p. 355; cf. also Littoral Development Co. v. San Francisco Bay Conservation etc. Com. (1994) 24 Cal. App.4th 1050, 1063 [29 Cal. Rptr.2d 518] (Littoral).)[2] When viewed in light of the statutory objectives, appellants' argument based upon subdivision (b)(3) of regulation 16000 must fail. The statute (section 1773) imposes upon the Director the overriding duty to determine whether a given wage rate is "actually prevailing" (Roofing, supra, 23 Cal. App.4th at p. 355); not simply whether it is "`general[ly] prevailing'" and designated as "Union ... dues" by labor and management, which is the regulatory definition appellants rely upon by quoting out of context from subdivision (b)(3) of regulation 16000. Subdivision (b)(3) of regulation 16000 does not speak precisely to the issue of these payments, which *1640 apparently constitute a recent innovation and were not within the contemplation of the regulatory definition under subdivision (b)(3).[3] Regulation 16000 in general and subdivision (b)(3) in particular provide definitional guidance only in determining the precise exclusions from a "`general[ly] prevailing'" wage rate after this rate is determined to be "actually prevailing" for purposes of section 1773. The Director had not previously promulgated a definition under regulation 16000 precisely defining the relevant term here, which is the "actually prevailing" wage rate. (§ 1773, italics added.) The proper legal definition of this term can only be determined as a legal issue, by interpretation of the statute in which it occurs (section 1773) in light of the relevant case law. (Roofing, supra, 23 Cal. App.4th at p. 355.) The Director ultimately reached the proper legal definition, by recognizing that the payments in question here are not actually received by workers and are repaid to employers; their inclusion in the "actually prevailing" wage rate would, therefore, constitute an improper statistical artifice. Despite appellants' suggestion that a remand for further proceedings would be helpful, it is clear that a remand for further clarification of the issues under the terms of subdivision (b)(3) of regulation 16000 or other internal administrative proceedings would be unnecessary and futile here. The issue here is a legal one under section 1773, which imposes upon the Director the ultimate statutory duty of determining, on an administrative basis, whether a given wage rate is "actually prevailing." (Roofing, supra, 23 Cal. App.4th at p. 355; cf. Littoral, supra, 24 Cal. App.4th at p. 1063.) The Director certainly has not shown any inclination to reach any other conclusion on remand, and would not have statutory discretion under section 1773 to reach any other conclusion; the issue is simply a legal one which would return to us within a few months in any event. The Director's decision was not a prejudicial abuse of discretion and was within the proper scope of his quasi-legislative discretion. (See Lusardi, supra, 1 Cal.4th at pp. 987-989; Roofing, supra, 23 Cal. App.4th at pp. 358-359.) We find no infirmity in the Director's conclusion that the "other payments" in issue here, which move in a circle from employers to unions and back to employers, without remaining in the paychecks of workers, are not part of the wage rates "actually prevailing" for purposes of section 1773. For the same reason the assessments in question here did not constitute actual union dues for purposes of federal law in Brock, supra, they did not *1641 constitute true union dues here for purposes of state law.[4] The payments in question did not go to the union for traditional union purposes, such as supporting the health and welfare of members, funding union operations, or creating a strike fund. Instead they were rerouted or refunded to employers, with the union simply acting as a funnel for the payments. (Brock, supra, 68 F.3d at pp. 1202-1203 and fns. 6 & 7.) Under the analogous federal decisions in Reich and Brock, we conclude the Director acted properly in characterizing these other payments as "other payments" rather than as true union dues for the purposes of regulation 16000. III. DISPOSITION The order denying the petition for writ of mandate is affirmed. King, J., and Haning, J., concurred. NOTES [1] We do not reach any issues arising solely under federal law, such as federal preemption issues, because they have not been briefed and are not properly before us here. [2] Appellant Unions contend the trial court supplied a new rational basis for the Director's interpretation of these regulations which was not relied upon by the Director. However, when critically viewed, there is no meaningful inconsistency at all between the Director's rationale and that of the trial court. Just as the Director reasoned that the job targeting assessments constituted excludable "other payments" and not true union dues, so did the trial court. The trial court did not arrogate to itself the Director's broad discretion in implementing the statutory mandate here, and neither may we. (See California State Auto. Assn. Inter-Ins. Bureau v. Garamendi (1992) 6 Cal. App.4th 1409, 1422-1423 [8 Cal. Rptr.2d 366].) [3] Apparently the definitional statement provided in subdivision (b)(3) dates from an earlier era, when the relations between unions and unionized companies were generally more adversarial. Subdivision (b)(3) does not mention the precise payments in issue here, and is not designed to aid in determining whether a rate which exists on paper is "actually prevailing" as required by the statute and by Roofing, supra, 23 Cal. App.4th at page 355. [4] While we recognize there may be minor differences between federal and state law relating to the payments in issue here, the most salient feature of both the federal and state regulatory schemes is the recognition that these payments are not union "dues" and would have a distorting effect on the prevailing wage laws if included in the wage rates "actually prevailing." (See § 1773; cf. Reich, supra, 40 F.3d at pp. 1280-1281.)
2024-03-14T01:26:36.242652
https://example.com/article/6003
Unraveling the mystery of music: music as an evolved group process. As prominently highlighted by Charles Darwin, music is one of the most mysterious aspects of human nature. Despite its ubiquitous presence across cultures and throughout recorded history, the reason humans respond emotionally to music remains unknown. Although many scientists and philosophers have offered hypotheses, there is little direct empirical evidence for any perspective. Here we address this issue, providing data which support the idea that music evolved in service of group living. Using 7 studies, we demonstrate that people's emotional responses to music are intricately tied to the other core social phenomena that bind us together into groups. In sum, this work establishes human musicality as a special form of social cognition and provides the first direct support for the hypothesis that music evolved as a tool of social living. In addition, the findings provide a reason for the intense psychological pull of music in modern life, suggesting that the pleasure we derive from listening to music results from its innate connection to the basic social drives that create our interconnected world.
2024-02-12T01:26:36.242652
https://example.com/article/7486
Q: Comparar un array con otros 3 en la misma posición. PHP Tengo estos 4 arrays distintos: $array1 = array($respuesta1,$respuesta2,$respuesta3); $array_v = array("B","A","B"); $array_a = array("A","C","A"); $array_k = array("C","B","C"); y estos contadores $cont_v = 0; $cont_a = 0; $cont_k = 0; El $array1 son respuestas que ingreso el usuario (A,B o C). Depende de la respuesta que el usuario ingrese quiero comparar estas respuestas con cada posición en los 3 vectores. En este caso la primer posición de cada vector son las respuestas de la primer pregunta. Por ejemplo: El usuario ingresa las respuestas: B,A,B. Quiero comparar la primer respuesta "B" con las primeras posiciones de cada vector y en cuanto encuentre una coincidencia que le sume 1 al contador correspondiente. Lo mismo con la posición 2 de cada vector y la posición 3. Estaba pensando en utilizar un foreach pero no encuentro como. Espero alguien pueda ayudarme. A: Después de esta haciendo varias pruebas logre llegar a una respuesta: <?php $array1 = array("A","B","C"); $array_v = array("B","A","B"); $array_a = array("A","C","A"); $array_k = array("C","B","C"); $cont_v = 0; $cont_a = 0; $cont_k = 0; while($array_u = current($array1)){ if($array_u == current($array_v)){ $cont_v++; } elseif($array_u == current($array_a)){ $cont_a++; } elseif($array_u == current($array_k)){ $cont_k++; } next($array1); next($array_v); next($array_a); next($array_k); } echo $cont_v; echo $cont_a; echo $cont_k; ?> De cualquier manera se alguien encuentra una mejor manera estaría chido que la compartan.
2024-04-19T01:26:36.242652
https://example.com/article/9174
Gerry Maher Gerard 'Gerry' Maher QC is a Scottish lawyer and academic. He was a Law Commissioner at the Scottish Law Commission from 2000–2008, and is currently Professor of Criminal Law at the University of Edinburgh. He was Professor of Criminal Law at Strathclyde Law School from 1992–2000. Maher studied Law at the University of Glasgow and obtained a B.Litt. at the University of Oxford in 1976. He was admitted to the Faculty of Advocates in 1987 and was a practising Advocate from 1989 to 1991. He was appointed as a full-time Commissioner at the Scottish Law Commission in February 2000, and was appointed Queen's Counsel in 2003. Professor Maher is the author of textbooks on international private law and (with Sheriff Douglas Cusine) is the author of a textbook on the law of diligence (the means by which civil law judgments are enforced against assets in Scotland). During his time at the Scottish Law Commission Professor Maher had responsibility for finalising the Commission work on the reform of the law of diligence - largely implemented by the Bankruptcy and Diligence (Scotland) Act 2007. Professor Maher has recently been in charge of the Scottish Law Commission's proposed reform of rape laws; his term of office at the Commission ended on 31 August 2008. External links Scottish Law Commission Edinburgh Law School Category:Scottish lawyers Category:Members of the Faculty of Advocates Category:Alumni of the University of Glasgow Category:Academics of the University of Edinburgh Category:Academics of the University of Strathclyde Category:Living people Category:Year of birth missing (living people) Category:Scottish legal scholars Category:Alumni of the University of Oxford
2024-04-02T01:26:36.242652
https://example.com/article/1198
Here, we’ve created two copies of each variable and assigned ‘nil’ to the second version just to prove the variables were blank between saving and loading. Of course, you won’t be doing this in your actual application. Initialise Your Data An easy way to initialise your application settings is to first check if a save file exists with your values. If not, define default values for the application until the user changes this.
2023-11-15T01:26:36.242652
https://example.com/article/5756
Kampong Parit, Temburong Kampong Parit is a village in Amo, a mukim (subdistrict) in Temburong District, Brunei. The postcode for Kampong Parit is PD2351. Name Kampong Parit comes from the Malay name which translates as 'Parit Village'. References Parit
2024-07-01T01:26:36.242652
https://example.com/article/1412
Q: Nginx worker process exited I'm getting the following error message from /var/log/nginx/error.log: 2014/07/17 08:36:21 [alert] 8206#0: worker process 8207 exited on signal 11 (core dumped) 2014/07/17 08:36:21 [alert] 8206#0: worker process 8210 exited on signal 11 (core dumped) 2014/07/17 08:36:22 [alert] 8206#0: worker process 8208 exited on signal 11 (core dumped) 2014/07/17 08:36:26 [alert] 8206#0: worker process 8209 exited on signal 11 (core dumped) 2014/07/17 08:36:26 [alert] 8206#0: worker process 8232 exited on signal 11 (core dumped) 2014/07/17 08:36:26 [alert] 8206#0: worker process 8236 exited on signal 11 (core dumped) /var/log/nginx/access.log shows the redirect to https which happens if you visit the http address: [17/Jul/2014:09:22:54 +0000] "GET / HTTP/1.1" 301 185 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.76.4 (KHTML, like Gecko) Version/6.1.4 Safari/537.76.4" Any ideas what could be causing this? It is on Ubuntu 12.04 and a standard apt-get install nginx. This is the config: server { listen 80; server_name domain.com; rewrite ^ https://$server_name$request_uri? permanent; } server { listen 443 ssl; server_name domain.com; ssl_certificate /ssl/path.crt; ssl_certificate_key /ssl/path.key; error_page 404 /404.html; error_page 500 502 503 504 /50x.html; location = 50x.html { root /usr/share/nginx/html; } location / { root /project/path/root; } access_log /project/path/logs/nginx-access.log; error_log /project/path/logs/nginx-error.log; client_max_body_size 20m; } I only get this error when I view the site using Safari, it happens on multiple machines not just mine and it's the same error displayed on each Safari. A: This could be related to the ssl session cache issue that is described in this ticket for nginx, http://trac.nginx.org/nginx/ticket/235.
2024-07-07T01:26:36.242652
https://example.com/article/8376
--- author: - 'Alain Bensoussan[^1] [^2] , Shaokuan Chen$^\dag$ and Suresh P. Sethi$^\dag$' title: 'The Maximum Principle for Global Solutions of Stochastic Stackelberg Differential Games[^3]' --- **Abstract:** This paper obtains the maximum principle for both stochastic (global) open-loop and stochastic (global) closed-loop Stackelberg differential games. For the closed-loop case, we use the theory of controlled forward-backward stochastic differential equations to derive the maximum principle for the leader’s optimal strategy. In the special case of the open-loop linear quadratic Stackelberg game, we consider the follower’s Hamiltonian system as the leader’s state equation, derive the related stochastic Riccati equation, and show the existence and uniqueness of the solution to the Riccati equation under appropriate assumptions. However, for the closed-loop linear quadratic Stackelberg game, we can write the related Riccati equation consisting of forward-backward stochastic differential equations, while leaving the existence of its solution as an open problem.\ **Keywords:** Stackelberg differential game, maximum principle, forward-backward stochastic differential equation, Riccati equation. Introduction {#sec1} ============ In 1934, H. von Stackelberg introduced a concept of a hierarchical solution for markets where some firms have power of domination over others [@Stackelberg34]. This solution concept is now known as the Stackelberg equilibrium or the Stackelberg solution which, in the context of two-person nonzero-sum static games, involves players with asymmetric roles, one leading (called the leader) and the other following (called the follower). A Stackelberg game proceeds with the leader announcing his policy prior to the start of the game. With the knowledge of the leader’s strategy, the follower chooses a policy so as to optimize his own performance index. The leader, anticipating the follower’s optimal response, picks the policy which optimizes his performance index on the rational reaction curve of the follower, which together with the corresponding policy of the follower is known as the Stackelberg solution. In dynamic Stackelberg games, it becomes important to know the player’s information sets at any given time. In this paper, we will consider two different information structures: i) open-loop for both players and ii) closed-loop perfect state (CLPS) for both players. Moreover, we will only treat global solution where the leader announces his entire strategy at the start of the game and the follower reacts to the entire strategy. The solutions of games with the first information structure will be termed (global) open-loop Stackelberg solutions, whereas the solutions of the games with the second information structure will be termed (global) closed-loop Stackelberg solutions. It is known that both these solutions suffer from time inconsistency, which results from the functional dependence of the follower’s optimal response strategy on the leader’s entire strategy on the duration of the game. In addition to these concepts, there is another concept of feedback Stackelberg solution, where the Stackelberg property is retained at every stage (in the discrete-time setting) with the leader having only stagewise advantage over the follower. Since the continuous-time problem can be viewed as the number of stages becomes unbounded in any finite interval, stagewise advantage of the leader over the follower turns into instantaneous advantage. A good aspect of this solution is that it is time consistent. Readers interested in the theory and applications of this solution can refer to [@BasarHaurie84], [@Bensoussanetal12], [@Dockner; @et; @al00], [@HePrasadSethi09], [@Heetal07] and [@KoganTapiero07]. In an open-loop or closed-loop Stackelberg differential game, the follower aims at minimizing his cost functional in accordance with the leader’s strategy on the whole duration of the game. Anticipating the follower’s optimal response depending on his entire strategy, the leader chooses an optimal one in advance to minimize his own cost functional, based on the Hamiltonian system satisfied by the follower’s optimal response. The difference between the two kinds of games is whether the information sets of the players involve the history of the state. The introduction of the history of the state in the closed-loop Stackelberg game, even in the deterministic case, makes it difficult to tackle, as the follower may not obtain his optimal response if the leader’s announced strategy incorporates the memory of the state. Two approaches to circumvent this difficulty are introduced: the team approach and the maximum principle. For the former, one can refer to [@Basar79a], [@BasarSelbuz79b] in the discrete-time setting and [@Papavassi79], [@PapavassiCruz79b], [@PapavassiCruz80] and [@BarsarOlsder80] in the continuous-time setting. For the latter, one can refer to [@PapavassiCruz79] for nonclassical control problems arising from Stackelberg games. The idea of team approach is as follows: the leader first minimizes his cost functional over the controls of both the leader and the follower, yielding a lower bound on his cost functional and the team strategies for both players. Then the leader makes an effort to find a closed-loop strategy such that the follower’s optimal response and the state trajectory will coincide with his team strategy and the team optimal trajectory, which leads to the lower bound on the leader’s cost functional. The maximum principle approach restricts the leader’s strategy to depend only on the initial state and the current state (memoryless perfect state information structure) and a nonclassical control problem faced by the leader is solved. It is worth noting that in this case, the follower’s adjoint equation involves the derivative of the leader’s strategy with respect to the state. Therefore, after incorporating the follower’s adjoint variable as an augmented state, the leader encounters a nonclassical control problem with the feature that both the control and its derivative with respect to the state appear in the controlled forward-backward ordinary differential equation system. The authors provide two approaches to tackle this problem and give the necessary conditions satisfied by the leader’s optimal strategy. One is to directly apply the variational technique to the state system with mixed-boundary conditions (the adjoint equation of the follower with a terminal condition). The other is to establish an equivalent relationship between such a nonclassical control problem and a classical control problem, which yields that the optimal strategy could be found in the space of affine functions. The phenomenon of time inconsistency is also analyzed by the authors. We will elaborate on the technical details and generalize their result to the stochastic setting in section \[sec3\]. For the stochastic formulation of Stackelberg games involving white noise terms, Yong [@Yong02] studies the open-loop linear quadratic case, with control variables appearing in diffusion term of the state. To give a state feedback representation of the open-loop Stackelberg solution (in a non-anticipating way), the related Riccati equation is derived and sufficient conditions for the existence of its solution with deterministic coefficients are discussed. More recently, [Ø]{}ksendal et al [@Oksendaletal11] have considered a general stochastic open-loop Stackelberg differential game, proved a sufficient maximum principle, and applied the theory to continuous-time newsvendor problems. In this paper, we study stochastic global Stackelberg differential games with open-loop and closed-loop information structures. As we shall see, the problems confronted by the leader in both cases, from the current point of view, are control problems with the state equations being forward-backward stochastic differential equations (FBSDEs). The theories for nonlinear backward stochastic differential equations (BSDEs) and FBSDEs have been extensively studied over the last two decades following the initial work by Pardoux and Peng [@PardouxPeng90]. One can refer to, among others, [@Maetal94], [@MaYong99], [@PardouxTang99], [@PengWu99], [@Yong10a], and the references therein, for the development of the theory of FBSDEs and their applications. With the help of the results in optimization problems for controlled FBSDEs (see, e.g., [@ShiWu06] and [@Yong10b]), we obtain the maximum principle for the leader’s optimal strategies in stochastic global Stackelberg games, and discuss linear quadratic problems as well as the corresponding Riccati equations. This paper is organized as follows. In section 2 we formulate a stochastic Stackelberg game and give three types of concepts of equilibria. In section 3 we present the maximum principle for a stochastic open-loop Stackelberg game. In section 4 we focus on a stochastic closed-loop Stackelberg game and derive a maximum principle for the leader’s optimal strategy. As examples, linear quadratic stochastic open-loop and closed-loop Stackelberg games are studied in section 5. For the open-loop linear quadratic case, we show the existence and uniqueness of the solution to the associated stochastic Riccati equation under some assumptions. For the closed-loop case, we simply derive a new Riccati equation consisting of FBSDEs, without investigating the issue of the existence of its solution. Problem formulation and definition of equilibria {#sec2} ================================================ Let $(\Omega,\mathcal {F},P)$ be a complete probability space on which is defined a $d$-dimensional standard Brownian motion $\{W(t),0\leq t\leq T\}$. $\{\mathcal {F}_t\}_{0\leq t\leq T}$ is the natural filtration generated by $W$ and augmented by all the $P$-null sets in $\mathcal {F}$ and $\mathcal {P}$ is the predictable sub-$\sigma$-field of $\mathcal {B}([0,T])\times\mathcal {F}$. We consider a stochastic differential system $$\label{o1} \left\{ \begin{split} dx(t)&=f(t,x(t),u(t),v(t))dt+\sigma(t,x(t))dW(t),\\ x(0)&=x_0, \end{split}\right.$$ where $$f:\Omega\times[0,T]\times\mathbb{R}^n\times\mathbb{R}^{m_1}\times\mathbb{R}^{m_2}\rightarrow\mathbb{R}^n,$$ $$\sigma:\Omega\times[0,T]\times\mathbb{R}^n\rightarrow\mathbb{R}^{n\times d},$$ are $\mathcal {P}\times\mathcal {B}(\mathbb{R}^{n+m_1+m_2})/\mathcal {B}(\mathbb{R}^{n})$ and $\mathcal {P}\times\mathcal {B}(\mathbb{R}^{n})/\mathcal {B}(\mathbb{R}^{n\times d})$ measurable, respectively, and $(u(\cdot),v(\cdot))$ are the decision variables of the leader and the follower, respectively. The cost functionals for the leader and the follower to minimize are described as follows $$\label{o2} \begin{split} J_1(u,v)&=E[\int_0^Tg_1(t,x(t),u(t),v(t))dt+G_1(X(T))],\\ J_2(u,v)&=E[\int_0^Tg_2(t,x(t),u(t),v(t))dt+G_2(x(T))], \end{split}$$ with $$g_i:\Omega\times[0,T]\times\mathbb{R}^{n}\times U\times V\rightarrow\mathbb{R},$$ $$G_i:\Omega\times\mathbb{R}^n\rightarrow\mathbb{R},$$ $i=1,2$, being $\mathcal {P}\times\mathcal {B}(\mathbb{R}^{n})\times\mathcal {B}(U)\times\mathcal {B}(V)/\mathcal {B}(\mathbb{R})$ and $\mathcal {F}_T\times\mathcal {B}(\mathbb{R}^n)/\mathcal {B}(\mathbb{R})$ measurable, respectively. According to the player’s information sets at any given time, there are three types of Stackelberg games: (global) open-loop, (global) closed-loop, and feedback Stackelberg games. **Open-loop games:** In an open-loop Stackelberg game, the leader’s information set at time $t$ is $\{x_0,\mathcal {F}_t\}$. Therefore, the strategy $u$ announced by the leader is an $\mathcal {F}_t$-adapted process. The follower aims at minimizing his cost functional $J_2(u,v)$ in accordance with the leader’s strategy $u$ on the whole duration of the game. His optimal response $\Phi(u)$ will be an adapted process such that $$J_2(u,\Phi(u))\leq J_2(u,v),\ \ \forall\ u,v.$$ The leader, anticipating the follower’s optimal response $\Phi$, picks the policy $u^*$ which optimizes his performance index on the rational reaction curve of the follower, i.e., $$J_1(u^*,\Phi(u^*))\leq J_1(u,\Phi(u)),\ \forall\ u.$$ $(u^*,\Phi(u^*))$ is a Stackelberg solution for an open-loop game. **Closed-loop games:** In a closed-loop Stackelberg game, the information set for the leader at time $t$ is $\{\mathcal {F}_t,x_s,s\in[0,t]\}$ (closed-loop perfect state information). The strategy that the leader adopts now can incorporate the history information of the state. Since in general it is difficult for the follower to obtain his optimal response if the leader’s announced strategy incorporates the whole history of the state, we only consider the closed-loop case under the memoryless perfect state information pattern, i.e., the information set of the leader at time $t$ is $\{x_0,x_t,\mathcal {F}_t\}$. For leader’s each strategy $u(t,x_0,x)$, which is now a stochastic field, the follower tries to find his optimal response $\Psi(u)$ such that $$J_2(u,\Psi(u))\leq J_2(u,v),\ \forall\ u,v.$$ Taking into account the follower’s optimal response, the leader should choose $u^*$ such that $$J_1(u^*,\Psi(u^*)\leq J_1(u,\Psi(u)),\ \forall\ u.$$ $(u^*,\Psi(u^*))$ is a Stackelberg solution for a closed-loop game. **Feedback games:** In a feedback Stackelberg game, the information set for the leader at time $t$ is $\{x_t,\mathcal {F}_t\}$ (feedback pattern). The significant mechanism difference between feedback games and the former two types of games is that the advantage of the leader over the follower in a feedback Stackelberg game is instantaneous not global, as the differential game could be viewed as the limit of the discrete-time game as the number of stages becomes unbounded (see [@BasarHaurie84]). Therefore, corresponding to the leader’s instantaneous strategy $u(t,x)$, the follower will make an instantaneous response of the form $v(t,x,u(t,x))$, which depends on the current state and the leader’s current action. A feedback solution is a pair of strategies $(u^*,v^*)$ such that $$\begin{aligned} &J_1(u^*,v^*(u^*))\leq J_1(u,v^*(u)),\ \forall\ u,\\ &J_2(u^*,v^*(u^*))\leq J_2(u^*,v(u^*)).\ \forall\ v.\end{aligned}$$ From the definition we can see that the feedback Stackelberg solution has some equilibrium feature, whereas the open-loop or closed-loop solution involves a sequential optimization at the level of the follower and the leader. Stochastic open-loop Stackelberg differential games {#open} =================================================== We first introduce some notations. For two vectors $x$ and $y$ in $\mathbb{R}^n$, $\langle x,y\rangle$ means the inner product $\sum_{i=1}^nx_iy_i$. For a function $f$ defined on $\mathbb{R}^n$, $Df$ or $\partial f$ means the gradient of $f$. Here we specify that throughout this paper all the vectors are column vectors and the gradient of a scalar function $f$ is $\frac{\partial f}{\partial x}=(\frac{\partial f}{\partial x_1},\cdots,\frac{\partial f}{\partial x_n})^\top$, while the gradient of a vector function $f=(f_1,\cdots,f_m)^\top$ is a matrix $$\frac{\partial f}{\partial x}=\left( \begin{array}{ccc} \frac{\partial f_1}{\partial x_1}&\cdots&\frac{\partial f_1}{\partial x_n}\\ \vdots&\vdots&\vdots\\ \frac{\partial f_m}{\partial x_1}&\cdots&\frac{\partial f_m}{\partial x_n}\\ \end{array}\right).$$ We further introduce two spaces of adapted processes to be used in the definition of the solution to a FBSDE, $$\begin{aligned} \mathcal{S}^2(0,T;\mathbb{R}^n):=\{&\psi|\ \psi:\Omega\times[0,T]\rightarrow\mathbb{R}^n\ \textrm{is a continous adapted process such that}\\ &E\sup_{0\leq t\leq T}|\psi(t)|^2<\infty\},\\ \mathcal{M}^2(0,T;\mathbb{R}^n):=\{&\psi|\ \psi:\Omega\times[0,T]\rightarrow\mathbb{R}^n\ \textrm{is an adapted process such that}\\ &E\int_0^T|\psi(t)|^2dt<\infty\}.\end{aligned}$$ And the above two spaces will be simply written as $\mathcal{S}^2$ and $\mathcal{M}^2$, respectively, if no confusion arises. The admissible strategy spaces for the leader and the follower are denoted by $$\label{f1} \begin{split} \mathcal {U}&=\{u|u: \Omega\times[0,T]\rightarrow U\ \textrm{is}\ \mathcal {F}_t\textrm{-adapted and}\ E\int_0^T|u(t)|^2dt<+\infty\},\\ \mathcal {V}&=\{v|v: \Omega\times[0,T]\rightarrow V\ \textrm{is}\ \mathcal {F}_t\textrm{-adapted and}\ E\int_0^T|v(t)|^2dt<+\infty\}, \end{split}$$ where $U$ and $V$ are subsets of $\mathbb{R}^{m_1}$ and $\mathbb{R}^{m_2}$. For the completeness of this paper, we state the formulation of general stochastic open-loop Stackelberg games and the corresponding maximum principle. From the definition in section \[sec2\], given the leader’s strategy $u\in\mathcal {U}$, the follower is faced the stochastic control problem $$\min_{v\in\mathcal {V}} J_2(u,v)=E[\int_0^Tg_2(t,x(t),u(t),v(t))dt+G_2(x(T))]$$ subject to $$\left\{\begin{aligned} dx(t)&=f(t,x(t),u(t),v(t))dt+\sigma(t,x(t))dW(t),\\ x(0)&=x_0. \end{aligned}\right.$$ Suppose there exists a unique solution $v^*(u(\cdot))\in\mathcal {V}$ to the above problem for each $u\in\mathcal {U}$. If we define $$H_2(t,x,u,v,p_2,q_2):=\langle p_2, f(t,x,u,v)\rangle+\langle q_2,\sigma(t,x)\rangle+g_2(t,x,u,v),$$ then the maximum principle (see [@YongZhou99]) yields that there exists a pair of adapted processes $(p_2,q_2)\in\mathcal{S}^2\times\mathcal{M}^2$ such that $$\label{o3} \left\{ \begin{split} dx(t)=&f(t,x(t),u(t),v^*(t))dt+\sigma(t,x(t))dW(t),\\ -dp_2(t)=&\big\{(\frac{\partial f}{\partial x})^\top(t,x(t),u(t),v^*(t))p_2(t)+(\frac{\partial \sigma}{\partial x})^\top(t,x(t))q_2(t)\\ &+\frac{\partial g_2}{\partial x}(t,x(t),u(t),v^*(t))\big\}dt-q_2(t)dW(t),\\ x(0)=&x_0,\ \ p_2(T)=\frac{\partial G_2}{\partial x}(x(T)),\\ v^*(t)=&arg \min_{v\in V} H_2(t,x(t),u(t),v,p_2(t),q_2(t)). \end{split}\right.$$ We assume that by the last equation in a function $v=v^*(t,x,u,p_2)$ is implicitly and uniquely defined. After substituting $v=v^*(t,x,u,p_2)$ into the follower’s maximum principle, we get the control problem faced by the leader $$\min_{u\in\mathcal {U}}\ J_1(u)=E[\int_0^Tg_1(t,x(t),u(t),v^*(t,x(t),u(t),p_2(t)))dt+G_1(X(T))]$$ subject to $$\label{04} \left\{ \begin{split} dx(t)=&f(t,x(t),u(t),v^*(t,x(t),u(t),p_2(t)))dt+\sigma(t,x(t))dW(t),\\ -dp_2(t)=&\big\{(\frac{\partial f}{\partial x})^\top(t,x(t),u(t),v^*(t,x(t),u(t),p_2(t)))p_2(t)+(\frac{\partial \sigma}{\partial x})^\top(t,x(t))q_2(t)\\ &+\frac{\partial g_2}{\partial x}(t,x(t),u(t),v^*(t,x(t),u(t),p_2(t)))\big\}dt-q_2(t)dW(t),\\ x(0)=&x_0,\ \ p_2(T)=\frac{\partial G_2}{\partial x}(x(T)). \end{split}\right.$$ We denote $$\label{05} \begin{split} &H_1(t,u,x,y,p_1,p_2,q_1,q_2)\\ =&\langle p_1, f(t,x,u,v^*(t,x,u,p_2))\rangle+\langle q_1,\sigma(t,x)\rangle+g_1(t,x,u,v^*(t,x,u,p_2))\\ &-\langle y,(\frac{\partial f}{\partial x})^\top(t,x,u,v^*(t,x,u,p_2))p_2+(\frac{\partial \sigma}{\partial x})^\top(t,x)q_2+\frac{\partial g_2}{\partial x}(t,x,u,v^*(t,x,u,p_2))\rangle. \end{split}$$ Suppose $u^*$ is an optimal strategy for the leader. Then the maximum principle for controlled forward-backward stochastic differential equations (see, e.g., [@ShiWu06] or [@Yong10b]) yields that there exists a triple of adapted processes $(p_1,q_1,y)$ such that $$\label{oo6} u^*(t)=\arg\min H_1(t,u,x(t),y(t),p_1(t),p_2(t),q_1(t),q_2(t)),$$ and $$\label{o6} \left\{ \begin{split} dy(t)=&-\frac{\partial H_1}{\partial p_2}dt-\frac{\partial H_1}{\partial q_2}dW(t),\\ =&-\{(\frac{\partial f}{\partial v}\frac{\partial v^*}{\partial p_2})^\top p_1-\frac{\partial f}{\partial x}y-\sum_{i=1}^{n}y_i(\frac{\partial v^*}{\partial p_2})^\top\frac{\partial}{\partial v}(\frac{\partial f}{\partial x_i})^\top p_2\\ &-(\frac{\partial^2 g_2}{\partial x\partial v}\frac{\partial v^*}{\partial p_2})^\top y+(\frac{\partial v^*}{\partial p_2})^\top\frac{\partial g_1}{\partial v}\}dt-\frac{\partial \sigma}{\partial x}ydW(t),\\ dp_1(t)=&-\frac{\partial H_1}{\partial x}dt+q_1dW(t)\\ =&-\{\frac{\partial f}{\partial x}+\frac{\partial f}{\partial v}\frac{\partial v^*}{\partial x}+(\frac{\partial\sigma}{\partial x})^\top q_1+\frac{\partial g_1}{\partial x}+(\frac{\partial v^*}{\partial x})^\top\frac{\partial g_1}{\partial v}\\ &-\sum_iy_i[\frac{\partial}{\partial x}(\frac{\partial f}{\partial x_i})^\top+(\frac{\partial v^*}{\partial x})^\top\frac{\partial}{\partial v}(\frac{\partial f}{\partial x_i})^\top]p_2\\ &-\sum_iy_i\frac{\partial}{\partial x}(\frac{\partial \sigma}{\partial x_i})^\top q_2-(\frac{\partial^2g_2}{\partial x^2}+\frac{\partial^2g_2}{\partial x\partial v}\frac{\partial v^*}{\partial x})^\top y\}dt+q_1dW(t),\\ y(0)=&0,\ \ p_1(T)=-\frac{\partial^2G_2}{\partial x^2}(x(T))y(T)+\frac{\partial G_1}{\partial x}(x(T)). \end{split}\right.$$ Stochastic closed-loop Stackelberg games {#sec3} ======================================== In this section, we consider a stochastic closed-loop Stackelberg game which is a stochastic version of the paper [@PapavassiCruz79]. The difference between open-loop Stackelberg games and closed-loop Stackelberg games is that in the former case the leader’s information set is the $\sigma$-field $\mathcal {F}_t$ generated by the Brownian motion $W$, whereas in the latter case the leader’s information set involves both the $\sigma$-field $\mathcal {F}_t$ and the history of the state $x$. As stated in the introduction, the difficulty of studying closed-loop Stackelberg games arises from the fact that the reaction of the follower can not be determined explicitly if the leader’s strategy depends on the whole history of the state (CLPS information structure). However, if the leader’s strategy is restricted to be memoryless, i.e., only the current state is involved in the strategy, Papavassilopoulos and Cruz [@PapavassiCruz79] provide an efficient way to solve such a problem. As demonstrated in [@PapavassiCruz79], the derivative $\frac{\partial u}{\partial x}$ of the leader’s strategy $u$ will appear in the follower’s adjoint equation and further in the leader’s augmented state equation, which makes the leader’s control problem a nonclassical one. The deterministic case revisited -------------------------------- Since we apply the approach in Papavassilopoulos and Cruz [@PapavassiCruz79] to solve the stochastic version of closed-loop Stackelberg games, we fist elaborate their techniques in this subsection. The state and the cost functionals for the leader and the follower are as follows $$\label{gg3} \left\{ \begin{split} \dot{x}(t)&=f(t,x(t),u(t),v(t)),\\ x(0)&=x_0, \end{split}\right.$$ $$\label{gg4} \begin{split} J_1(u,v)&=\int_0^T g_1(t,x(t),u(t),v(t))dt+G_1(x_T),\\ J_2(u,v)&=\int_0^T g_2(t,x(t),u(t),v(t))dt+G_2(x_T). \end{split}$$ Given the leader’s strategy $u(t,x)_{t\in[0,T]}$ (we omit to write the dependence on the initial state $x_0$) which is continuously differentiable in $x$, if the follower’s optimal response is $v^*$, then according to the deterministic maximum principle, there exists a function $p$ such that $$\label{gg5} \left\{ \begin{split} &\dot{x}=f(t,x,u,v^*),\\ &-\dot{p}=(\frac{\partial f}{\partial x}+\frac{\partial f}{\partial u}\frac{\partial u}{\partial x})^\top p+\frac{\partial g_2}{\partial x}+(\frac{\partial u}{\partial x})^\top\frac{\partial g_2}{\partial u},\\ &\frac{\partial g_2}{\partial v}+\frac{\partial f}{\partial v}p=0,\\ &x(0)=x_0,\ p(T)=\frac{\partial G_2(x(T))}{\partial x}. \end{split}\right.$$ Suppose we can get the unique solution $$\label{gg6} v=\varphi(t,x,p,u)$$ from solving $$\frac{\partial g_2}{\partial v}+\frac{\partial f}{\partial v}p=0.$$ Then, after substituting the expression into and $J_1$, the leader will be faced with the following problem $$\label{gg7} \min_{u} J_1(u)=\int_0^T g_1(t,x,u,\varphi(t,x,p,u))dt+G_1(x_T)$$ subject to $$\label{gg8} \left\{ \begin{split} \dot{x}&=f(t,x,u,\varphi(t,x,p,u)),\\ -\dot{p}&=[\frac{\partial f}{\partial x}+\frac{\partial f}{\partial u}\frac{\partial u}{\partial x}]^\top p+\frac{\partial g_2}{\partial x}+(\frac{\partial u}{\partial x})^\top\frac{\partial g_2}{\partial u},\\ x(0)&=x_0,\ p(T)=\frac{\partial G_2(x(T))}{\partial x}. \end{split}\right.$$ Since the derivative $\frac{\partial u}{\partial x}$ of the control variable $u$ is involved in the adjoint equation , the above problem is a nonclassical one. The authors provide two approaches to overcome this difficulty. One is the direct application of variational techniques. The other one is more interesting, which reveals the relative independence of $u$ and $\frac{\partial u}{\partial x}$ and the time inconsistency property. To be more precise, with $\frac{\partial u}{\partial x}$ replaced by another new control variable $\tilde{u}$, they construct a new classical problem $$\label{gg9} \min_{u,\tilde{u}} \tilde{J}_1(u)=\int_0^T g_1(t,x,u,\varphi(t,x,p,u))dt+G_1(x_T)$$ subject to $$\label{gg10} \left\{ \begin{split} \dot{x}&=f(t,x,u,\varphi(t,x,p,u)),\\ -\dot{p}&=(\frac{\partial f}{\partial x}+\frac{\partial f}{\partial u}\tilde{u})^\top p+\frac{\partial g_2}{\partial x}+(\tilde{u})^\top\frac{\partial g_2}{\partial u},\\ x(0)&=x_0,\ p(T)=\frac{\partial G_2(x(T))}{\partial x}, \end{split}\right.$$ and prove the equivalence of the above nonclassical problem - and the constructed classical problem - in the sense that they have the same optimal trajectory and costs. Indeed, if we denote by $J_1^*$ and $J_2^*$ the optimal values of problems - and -, respectively, then $J_1^*\geq J_2^*$. On the other hand, suppose that $(u^*,\tilde{u}^*)$ is an optimal control for problem - and $x^*$ is the corresponding trajectory, then control $$\label{gg11} \hat{u}(t,x):=\tilde{u}^*(t)x+u^*(t)-\tilde{u}^*(t)x^*(t)$$ yields the same trajectory $x^*$ and thus the same cost in problem -. Consequently, $J_1^*=J_2^*$ and $\hat{u}$ is an optimal control for the nonclassical problem -. Therefore, one can substitute $\frac{\partial u}{\partial x}$ for $\tilde{u}$ in the maximum principle for the problem - and finally get the maximum principle for the nonclassical problem - faced by the leader. Given the leader’s strategy $u(t,x)_{t\in[0,T]}$, the follower can also solve the following Hamilton-Jacobi-Bellman equation $$\label{gg12} \left\{ \begin{split} &\frac{\partial V_2}{\partial t}+\inf_{v\in\mathbb{R}^n}\{\langle\frac{\partial V_2}{\partial x}, f(t,x,u(t,x),v)\rangle+g_2(t,x,u(t,x),v)\}=0,\\ &V_2(T,x)=G_2(x), \end{split}\right.$$ and obtain the optimal feedback strategy $$v^*(t,x)=arg\inf_{v\in\mathbb{R}^n}\{\langle\frac{\partial V_2}{\partial x}, f(t,x,u(t,x),v)\rangle+g_2(t,x,u(t,x),v)\}.$$ However, since $V_2$ depends on the whole function $u(\cdot)$, it is impossible for the leader to employ dynamic programming to depict his optimal strategy. The maximum principle approach turns out to be more appropriate for closed-loop Stackelberg games. The stochastic case {#sgs} ------------------- In this subsection we tackle closed-loop Stackelberg games in the stochastic context, with the same idea as [@PapavassiCruz79]. After introducing a stochastic disturbance term in the state equation , the adjoint equation for the follower, which also acts as the state equation in the leader’s problem, will be a BSDE rather than an ODE with a terminal condition. Therefore, the leader will end up with a control problem in which the state equation consists of a SDE and a BSDE, with the feature that both the control $u$ and its derivative $\frac{\partial u}{\partial x}$ are introduced in the controlled system. With the results on the maximum principle for control problems of FBSDEs, we present the necessary conditions for the leader’s optimal strategy to satisfy in a closed-loop Stackelberg game. We first introduce the admissible strategy spaces for the leader and the follower $$\begin{split} \mathcal {U}&:=\{u:u:\Omega\times[0,T]\times\mathbb{R}^n\rightarrow U\ \textrm{is}\ \mathcal {F}_t\textrm{-adapted for any}\ x\in\mathbb{R}^n, u(t,x)\ \textrm{is continuously}\\ &\ \ \textrm{differentible in}\ x\ \textrm{for any}\ (\omega,t)\in\Omega\times[0,T],\ \textrm{and the derivative}\ \frac{\partial u}{\partial x}\ \textrm{is bounded}\},\\ \mathcal {V}&:=\{v:v:\Omega\times[0,T]\times\mathbb{R}^n\rightarrow V\ \textrm{is}\ \mathcal {F}_t\textrm{-adapted for any}\ x\in\mathbb{R}^n\}. \end{split}$$ Then, given the leader’s strategy $u(t,x)$, the follower’s optimal response strategy $v^*(t,x)$ is a solution to the following classical optimal control problem, $$\label{g1} \min_{v\in\mathcal {V}} J_2=E\int_0^Tg_2(t,x(t),u(t,x(t)),v(t))dt+EG_2(X(T)),$$ subject to $$\left\{ \begin{split}\label{g2} dx(t)&~=f(t,x(t),u(t,x(t)),v(t))dt+\sigma(t,x(t))dW(t),\\ x(0)&~=x_0. \end{split}\right.$$ According to the maximum principle, there exists a pair of adapted processes $(p_2, q_2)\in\mathcal{S}^2\times\mathcal{M}^2$ such that $$\label{g3} v^*(t,x(t))=arg \min_{v\in V}\{\langle p_2(t),f(t,x(t),u(t,x(t)),v)\rangle+\langle q_2,\sigma(t,x)\rangle+g_2(t,x(t),u(t,x(t)),v)\},$$ and $$\label{g4} \left\{ \begin{split} dp_2(t)=&-[(\frac{\partial f}{\partial x}+\frac{\partial f}{\partial u}\frac{\partial u}{\partial x})^\top p_2+(\frac{\partial \sigma}{\partial x})^\top q_2\\ &+\frac{\partial g_2}{\partial x}+(\frac{\partial u}{\partial x})^\top\frac{\partial g_2}{\partial u}]dt+q_2(t)dW(t),\\ p_2(T)=&\frac{\partial G_2}{\partial x}(x(T)), \end{split}\right.$$ where $x(\cdot)$ is the solution of with policies $u(t,x)$ and $v^*(t,x)$. Suppose for any leader’s strategy $u(t,x)$, there exists a unique strategy $v^*(t,x)$ for the follower that minimizes his cost functional $J_2$. We also suppose that yields $v^*=\varphi(t,x,u,p_2)$. Then, taking into account the follower’s optimal response, the leader will be confronted with the optimal control problem $$\label{g5} \min_{u\in\mathcal {U}} J_1=E\int_0^Tg_1(t,x(t),u(t,x(t)),\varphi(t,x(t),u(t,x(t)),p_2(t)))dt+EG_1(x(T))$$ subject to $$\label{g6} \left\{ \begin{split} dx(t)=&f(t,x(t),u(t,x(t)),\varphi(t,x(t),u(t,x(t)),p_2(t)))dt+\sigma(t,x(t))dW(t),\\ dp_2(t)=&-[(\frac{\partial f}{\partial x}+\frac{\partial f}{\partial u}\frac{\partial u}{\partial x})^\top p_2+(\frac{\partial \sigma}{\partial x})^\top q_2\\ &+\frac{\partial g_2}{\partial x}+(\frac{\partial u}{\partial x})^\top\frac{\partial g_2}{\partial u}]dt+q_2(t)dW(t),\\ x(0)=&x_0,\ \ p_2(T)=\frac{\partial G_2}{\partial x}(x(T)). \end{split}\right.$$ It can be seen that, after incorporating the follower’s adjoint variable as an augmented state, the leader encounters a controlled FBSDE, which is the counterpart of in the deterministic context. For the solvability of FBSDEs, one can refer to [@Maetal94], [@PengWu99], [@PardouxTang99], [@Yong10a], and the references therein. Here we assume that the leader’s problem is well-posed, i.e., for each $u(\cdot)\in\mathcal {U}$, there exists a unique triple $(x,p_2,q_2)\in\mathcal{S}^2\times\mathcal{S}^2\times\mathcal{M}^2$ solving FBSDE . Since the derivative $\frac{\partial u}{\partial x}$ of the control variable $u$ is involved in the BSDE in , we apply the techniques in the deterministic case to relate the above nonclassical control problem to a classical one. Consider the optimization problem of a controlled FBSDE $$\label{g7} \min_{u_1,u_2} J(u_1(\cdot),u_2(\cdot))=E\int_0^Tg_1(t,x(t),u_1(t),\varphi(t,x(t),u_1(t),p_2(t)))dt+EG_1(x(T)),$$ subject to $$\label{g8} \left\{ \begin{split} dx(t)~=&f(t,x(t),u_1(t),\varphi(t,x(t),u_1(t),p_2(t)))dt+\sigma(t,x(t))dW(t),\\ dp_2(t)~=&-[(\frac{\partial f}{\partial x}+\frac{\partial f}{\partial u}u_2)^\top p_2+(\frac{\partial \sigma}{\partial x})^\top q_2\\ &+\frac{\partial g_2}{\partial x}+(u_2)^\top\frac{\partial g_2}{\partial u}]dt+q_2(t)dW(t),\\ x(0)~=&x_0,\ p_2(T)=\frac{\partial G_2}{\partial x}(x(T)), \end{split}\right.$$ where $u_1$ and $u_2$ are adapted control variables with values in $U$ and some bounded subset in $\mathbb{R}^{m_1\times n}$, respectively. Again we assume the above problem is well-posed. Obviously, if we denote by $J_1^*$ and $J^*$ the optimal values of problems - and -, respectively, then $J_1^*\geq J^*$. On the other hand, if $(u_1^*,u_2^*)$ is a solution to problem - and $x^*$ is the corresponding optimal state trajectory, then we can construct an optimal control $u^*$ for problem - as follows $$\label{g9} u^*(t,x):=u_2^*(t)x+u_1^*(t)-u_2^*(t)x^*(t).$$ Therefore, $J_1^*=J^*$, which implies that if $u^*(t,x)$ is a solution to problem - and $x^*$ is the corresponding optimal state trajectory, then $(u^*(t,x^*(t)),\frac{\partial u^*}{\partial x}(t,x^*(t)))$ is an optimal control for problem - and leads to the same optimal state trajectory $x^*$. Thus we can obtain the maximum principle for problem - faced by the leader by means of the necessary conditions satisfied by the optimal control for problem - (see, e.g., [@ShiWu06] or [@Yong10b]). To this end, we define $$\label{g10} \begin{split} &H_1(t,u_1,u_2,x,y,p_1,p_2,q_1,q_2)\\ =~&\langle p_1, f(t,x,u_1,\varphi(t,x,u_1,p_2))\rangle+\langle q_1,\sigma(t,x)\rangle-\langle y,(\frac{\partial f}{\partial x}+\frac{\partial f}{\partial u}u_2)^\top p_2\\ &+(\frac{\partial \sigma}{\partial x})^\top q_2+\frac{\partial g_2}{\partial x}+(u_2)^\top\frac{\partial g_2}{\partial u}\rangle+g_1(t,x,u_1,\varphi(t,x,u_1,p_2)). \end{split}$$ Suppose $u^*(t,x)$ is a solution to the leader’s problem -. Then there exists a triple $(y,p_1,q_1)$ such that $$\label{g11} \begin{split} &(u^*(t,x(t)),\frac{\partial u^*}{\partial x}(t,x(t)))\\ =&arg_{(u^1,u^2)}\min H_1(t,u^1,u^2,x(t),y(t),p_1(t),p_2(t),q_1(t),q_2(t)) \end{split}$$ and $$\label{g12} \left\{ \begin{split} dy(t)=&-\frac{\partial H_1}{\partial p_2}dt-\frac{\partial H_1}{\partial q_2}dW(t),\\ dp_1(t)=&-\frac{\partial H_1}{\partial x}dt+q_1(t)dW(t),\\ y(0)=&~0,\ \ p_1(T)=-\frac{\partial^2 G_2}{\partial x^2}(x(T))y(T)+\frac{\partial G_1}{\partial x}(x(T)), \end{split}\right.$$ where $(x,p_2,q_2)$ is the solution of state equation with control $u^*(t,x)$, and $\frac{\partial H_1}{\partial p_2}$, $\frac{\partial H_1}{\partial q_2}$ and $\frac{\partial H_1}{\partial x}$ in are evaluated at $$(t,u^*(t,x(t)),\frac{\partial u^*}{\partial x}(t,x(t)),x(t),y(t),p_1(t),p_2(t),q_1(t),q_2(t)).$$ If $u$ is independent of $x$, we conclude in comparison with the arguments in section \[open\] that the closed-loop Stackelberg solution is reduced to the open-loop Stackelberg solution and the maximum principles for both cases are identical. The linear quadratic Stackelberg games ====================================== In this section we consider linear quadratic open-loop and closed-loop Stackelberg games. Yong derives the Riccati equation for the open-loop Stackelberg game in [@Yong02] where the weighting matrices of the state and controls in the cost functionals are assumed not necessarily positive definite, and controls are allowed to appear in the diffusion term. For the follower’s problem, the author uses the solutions of the follower’s Riccati equation and a BSDE to give the state feedback representation of the follower’s optimal strategy (one can also refer to [@YongZhou99 Page 313] for a similar derivation of the state feedback representation for a linear quadratic stochastic control problem with deterministic coefficients). To be precise, the author assumes that the follower’s adjoint variable $p_2$ in has the affine form $$p_2=Px+\phi.$$ Applying Itô’s formula to $p_2$ and taking into account and , one can get the follower’s Riccati equation with respect to $P$ and a BSDE for $\phi$. Then the author views the above BSDE for $\phi$, which contains the solution of the follower’s Riccati equation and the leader’s adopted strategy, and the original state equation as the leader’s controlled system and further derives the leader’s Riccati equation. Under some assumptions the author also discusses the solvability of the Riccati equations for the case of deterministic coefficients. Here we consider the follower’s Hamiltonian system as the leader’s controlled state equation and hence the state feedback representation of the Stackelberg solution can be obtained at the same time for the leader and the follower. As a result, the corresponding Riccati equation here is of different form from the one in [@Yong02]. Since we deal with the case without decision variables in the diffusion term, we also show, under some appropriate assumptions, the existence and uniqueness of the solution to the derived Riccati equation with stochastic coefficients by means of a linear transformation to the standard stochastic Riccati equation. For the linear quadratic closed-loop Stackelberg game, we will see that the Hamiltonian system for the leader is no longer linear, which prevents us from getting an exogenous Riccati equation if we proceed the same way as in the open-loop case. Instead, we assume that the forward variable $y$ is linear with respect to the original state $x$ and derive an exogenous FBSDE which plays the same role as the Riccati equation in open-loop case. Throughout this section we assume the coefficients $A,B_i,C,Q_i,R_i,G_i$ are adapted bounded matrices, $Q_i,R_i,G_i$ are symmetric and nonnegative, and $R_i$ are uniformly positive, $i=1,2$. The open-loop case ------------------ The state equation and cost functionals are given as follows. $$\label{o7} \left\{ \begin{split} dx(t)&=(Ax+B_1u+B_2v)dt+CxdW(t),\\ x(0)&=x_0, \end{split}\right.$$ $$\label{o8} \begin{split} J_1(u,v)&=\frac{1}{2}E[\int_0^T(\langle Q_1x(t),x(t)\rangle+\langle R_1u(t),u(t)\rangle)dt+\langle G_1x(T),x(T)\rangle],\\ J_2(u,v)&=\frac{1}{2}E[\int_0^T(\langle Q_2x(t),x(t)\rangle+\langle R_2v(t),v(t)\rangle)dt+\langle G_2x(T),x(T)\rangle]. \end{split}$$ Given leader’s strategy $u\in\mathcal {U}$, it is well known that the follower’s problem $$\min_{v\in\mathcal {V}}\ J_2(u,v)=\frac{1}{2}E[\int_0^T(\langle Q_2x(t),x(t)\rangle+\langle R_2v(t),v(t)\rangle)dt+\langle G_2x(T),x(T)\rangle]$$ subject to $$\left\{ \begin{split} dx(t)&=(Ax+B_1u+B_2v)dt+CxdW(t),\\ x(0)&=x_0, \end{split}\right.$$ is a standard linear quadratic optimal control problem and the unique solution is $$v^*(t)=-R_2^{-1}B_2^\top p_2,$$ where $p_2$ is the first part of the solution $(p_2,q_2)\in\mathcal{S}^2\times\mathcal{M}^2$ to the adjoint equation $$\label{o9} \left\{ \begin{split} -dp_2(t)&=(A^\top p_2+C^\top q_2+Q_2x)dt-q_2dW(t),\\ p_2(T)&=G_2x(T). \end{split}\right.$$ Then, the leader’s problem is $$\min_{u\in\mathcal {U}}\ J_1(u)=\frac{1}{2}E[\int_0^T(\langle Q_1x(t),x(t)\rangle+\langle R_1u(t),u(t)\rangle)dt+\langle G_1x(T),x(T)\rangle]$$ subject to (the Hamiltonian system of the follower) $$\label{o10} \left\{ \begin{split} dx(t)&=(Ax+B_1u-B_2R_2^{-1}B_2^\top p_2)dt+CxdW(t),\\ -dp_2(t)&=(A^\top p_2+C^\top q_2+Q_2x)dt-q_2dW(t),\\ x(0)&=x_0,\ p_2(T)=G_2x(T). \end{split}\right.$$ The leader’s problem is well-posed since for every $u\in\mathcal {U}$, the coefficients of the system satisfy the monotonicity condition proposed by Peng and Wu [@PengWu99], which yields the existence and uniqueness of the solution $(x,p_2,q_2)$ to the system . Moreover, by similar arguments of Tang [@Tang03], we can get the following estimate $$\label{o11} E\sup_{0\leq t\leq T}|p_2(t)|^2+E\sup_{0\leq t\leq T}|x(t)|^2+E\int_0^T|q_2(t)|^2dt\leq L(|x_0|^2+E\int_0^T|u(t)|^2dt),$$ where $L$ is a positive constant. With this estimate, we can adopt relevant arguments for standard linear quadratic optimal control problems in [@Meng11] and get the fact that the leader’s objective functional $J_1(u)$ is convex in $u$, $$\lim_{\|u\|\rightarrow\infty}J_1(u)=\infty,$$ and $J_1(u)$ is Fréchet differentiable over $\mathcal {U}$ with the representation $$\begin{split} \langle J_1'(u),w\rangle=&E\int_0^T(\langle Q_1(t)x(t;x_0,u),x(t;0,w)\rangle+\langle R_1(t)u(t),w(t)\rangle)dt\\ &+\langle G_1x(T;x_0,u),x(T;0,w)\rangle. \end{split}$$ Here we use $x(\cdot;x_0,u)$ to represent the solution of with initial state $x(0)=x_0$ and control $u$. As a conclusion of Proposition 2.1.2 in [@EkelandTeman76], we know that the leader has a unique optimal strategy $u^*\in\mathcal {U}$ which satisfies $J_1'(u^*)=0$. Now we use dual representation to characterize the optimal strategy $u^*$. For each $u\in\mathcal {U}$, there exists a unique solution $(x,y,p_1,q_1,p_2,q_2)$ to the FBSDE $$\label{o12} \left\{ \begin{split} dx(t)&=(Ax+B_1u-B_2R_2^{-1}B_2^\top p_2)dt+CxdW(t),\\ -dp_2(t)&=(A^\top p_2+C^\top q_2+Q_2x)dt-q_2dW(t),\\ dy(t)&=(Ay+B_2R_2^{-1}B_2^\top p_1)dt+CydW(t),\\ -dp_1(t)&=(A^\top p_1+C^\top q_1-Q_2y+Q_1x)dt-q_1dW(t),\\ x(0)&=x_0,\ y(0)=0,\ p_1(T)=-G_2y(T)+G_1x(T),\ p_2(T)=G_2x(T). \end{split}\right.$$ The necessary and sufficient condition for $u$ to be the leader’s optimal strategy is $$u(t)=-R_1^{-1}B_1p_1(t).$$ It can be seen that the FBSDEs consisting of $(x,p_2,q_2)$ and $(y,p_1,q_1)$ are two decoupled systems. Therefore, for given $u\in\mathcal {U}$, we can first get the unique solution $(x,p_2,q_2)$ to the equation $$\label{o13} \left\{ \begin{split} dx(t)&=(Ax+B_1u-B_2R_2^{-1}B_2^\top p_2)dt+CxdW(t),\\ -dp_2(t)&=(A^\top p_2+C^\top q_2+Q_2x)dt-q_2dW(t),\\ x(0)&=x_0,\ p_2(T)=G_2x(T). \end{split}\right.$$ Let $\tilde{y}:=-y$. Then FBSDE consisting of $(y,p_1,q_1)$ in can be converted into the following one $$\label{o14} \left\{ \begin{split} d\tilde{y}(t)&=(A\tilde{y}-B_2R_2^{-1}B_2^\top p_1)dt+C\tilde{y}dW(t),\\ -dp_1(t)&=(A^\top p_1+C^\top q_1+Q_2\tilde{y}+Q_1x)dt-q_1dW(t),\\ \tilde{y}(0)&=0,\ p_1(T)=G_2\tilde{y}(T)+G_1x(T). \end{split}\right.$$ The coefficients in the above system also satisfy the monotonicity condition in [@PengWu99]. So there exists a unique solution to , which also implies the existence and uniqueness of the solution $(x,y,p_1,q_1,p_2,q_2)$ to FBSDE . The necessary part comes directly from the maximum principle and . Now we prove the sufficient part. Denote by $$(x(\cdot;x_0,u),y(\cdot;x_0,u),p_1(\cdot;x_0,u),q_1(\cdot;x_0,u),p_2(\cdot;x_0,u),q_2(\cdot;x_0,u))$$ and $$(x(\cdot;0,w),y(\cdot;0,w),p_1(\cdot;0,w),q_1(\cdot;0,w),p_2(\cdot;0,w),q_2(\cdot;0,w))$$ the solutions to the system of FBSDEs with initial states and controls as $(x_0,u)$ and $(0,w)$, respectively. Using Itô’s formula to compute $$\langle p_1(t;x_0,u),x(t;0,w)\rangle+\langle p_2(t;0,w),y(t;x_0,u)\rangle$$ and taking the expectation, we can get $$\label{o15} \begin{split} \langle J_1'(u),w\rangle =&E\langle G_1x(T;x_0,u),x(T;0,w)\rangle\\ &+E\int_0^T\langle Q_1(t)x(t;x_0,u),x(t;0,w)\rangle +\langle R_1(t)u(t),w(t)\rangle dt\\ =&E\int_0^T\langle R_1(t)u(t)+B_1^\top(t)p_1(t;x_0,u),w(t)\rangle dt. \end{split}$$ Obviously $u=-R_1^{-1}B_1^\top p_1$ makes $J_1'(u)$ equal to zero, so it is an optimal strategy for the leader. From the uniqueness of the optimal strategy, we also know that FBSDE $$\label{o16} \left\{ \begin{split} dx(t)&=(Ax-B_1R_1^{-1}B_1^\top p_1-B_2R_2^{-1}B_2^\top p_2)dt+CxdW(t),\\ -dp_2(t)&=(A^\top p_2+C^\top q_2+Q_2x)dt-q_2dW(t),\\ dy(t)&=(Ay+B_2R_2^{-1}B_2^\top p_1)dt+CydW(t),\\ -dp_1(t)&=(A^\top p_1+C^\top q_1-Q_2y+Q_1x)dt-q_1dW(t),\\ x(0)&=x_0,\ y(0)=0,\ p_1(T)=-G_2y(T)+G_1x(T),\ p_2(T)=G_2x(T), \end{split}\right.$$ has a unique solution $(x,y,p_1,q_1,p_2,q_2)$. And the Stackelberg solution $(u^*,v^*)$ can be written as $$\label{oo16} u^*=-R_1^{-1}B_1^\top p_1,\ \ v^*=-R_2^{-1}B_2^\top p_2.$$ In what follows we see $(x,y)$ as the state and derive the feedback representation of the Stackelberg solution $(u^*,v^*)$ in terms of $(x,y)$. We denote $$\hat{x}=\left( \begin{array}{c} x\\ y\\ \end{array}\right), \hat{p}=\left( \begin{array}{c} p_1\\ p_2\\ \end{array}\right), \hat{q}=\left( \begin{array}{c} q_1\\ q_2\\ \end{array}\right),$$ and $$\begin{split} \hat{A}=&\left( \begin{array}{cc} A&0\\ 0&A\\ \end{array}\right), \hat{B}=\left( \begin{array}{cc} B_1R_1^{-1}B_1^\top&B_2R_2^{-1}B_2^\top\\ -B_2R_2^{-1}B_2^\top&0\\ \end{array}\right), \hat{C}=\left( \begin{array}{cc} C&0\\ 0&C\\ \end{array}\right),\\ \hat{Q}=&\left( \begin{array}{cc} Q_1&-Q_2\\ Q_2&0\\ \end{array}\right), \hat{G}=\left( \begin{array}{cc} G_1&-G_2\\ G_2&0\\ \end{array}\right). \end{split}$$ Then FBSDE can be rewritten as $$\label{o17} \left\{ \begin{split} d\hat{x}(t)&=(\hat{A}\hat{x}(t)-\hat{B}\hat{p}(t))dt+\hat{C}\hat{x}dW(t),\\ d\hat{p}(t)&=-(\hat{A}^\top\hat{p}+\hat{C}^\top\hat{q}+\hat{Q}\hat{x})dt+\hat{q}dW(t),\\ \hat{x}(0)&=0, \ \hat{p}(T)=\hat{G}\hat{x}(T). \end{split}\right.$$ Suppose there is a matrix-valued process $K$ such that $$\label{oo18} \hat{p}=K\hat{x},$$ and $K$ has a stochastic differential form $$\label{o18} dK(t)=M(t)dt+L(t)dW(t).$$ Applying Itô’s formula to $K\hat{x}$, we get $$\label{o19} \begin{split} &M\hat{x}dt+L\hat{x}dW(t)+K(\hat{A}\hat{x}-\hat{B}K\hat{x}(t))dt+K\hat{C}\hat{x}dW(t)+L\hat{C}\hat{x}dt\\ =&d\hat{p}(t)\\ =&-(\hat{A}^\top K\hat{x}+\hat{C}^\top\hat{q}+\hat{Q}\hat{x})dt+\hat{q}dW(t). \end{split}$$ Comparing the diffusion terms in , we have $$\label{o20} \hat{q}=L\hat{x}+K\hat{C}\hat{x}.$$ Substituting the expression into and comparing the drift terms, we get $$\label{o21} \begin{split} &M\hat{x}+K(\hat{A}\hat{x}-\hat{B}K\hat{x}(t))+L\hat{C}\hat{x}\\ =&-\hat{A}^\top K\hat{x}-\hat{C}^\top(L\hat{x}+K\hat{C}\hat{x})-\hat{Q}\hat{x}, \end{split}$$ which yields $$M=-K\hat{A}-\hat{A}^\top K+K\hat{B}K-L\hat{C}-\hat{C}^\top L-\hat{C}^\top K\hat{C}-\hat{Q}.$$ Therefore, we get the Riccati equation $$\label{o22} \left\{ \begin{split} dK(t)&=-(K\hat{A}+\hat{A}^\top K-K\hat{B}K+L\hat{C}+\hat{C}^\top L+\hat{C}^\top K\hat{C}+\hat{Q})dt+LdW(t),\\ K(T)&=\hat{G}. \end{split}\right.$$ The difference between the above Riccati equation and the standard one from stochastic LQ problems without control in diffusion terms (see, e.g., [@Peng92]) is that $\hat{B}$, $\hat{Q}$ and $\hat{G}$ here are not symmetric matrices. For $n=1$ and under some appropriate assumptions on the coefficient matrices, we show in the following proposition that Riccati equation can be connected to a standard one through a linear transformation for FBSDE . Suppose that n=1 and $\alpha$ and $\beta$ are two positive constants such that $$\frac{Q_2}{Q_1}=\frac{G_2}{G_1}=\alpha,\ \ \frac{B_2R_2^{-1}B_2^\top}{B_1R_1^{-1}B_1^\top}=\beta.$$ Then, the Riccati equation has a unique solution. We make the transformation $$\label{o23} \hat{x}=\tilde{x},\ \hat{p}=\Phi\tilde{p},\ \hat{q}=\Phi\tilde{q},$$ where $$\Phi=\left(\begin{array}{cc} 1&-2\beta\\ 2\alpha&1\\ \end{array}\right).$$ Then FBSDE can be converted into the following one $$\label{o24} \left\{ \begin{split} d\tilde{x}(t)&=(\tilde{A}\tilde{x}(t)-\tilde{B}\tilde{p}(t))dt+\tilde{C}\tilde{x}dW(t),\\ d\tilde{p}(t)&=-(\tilde{A}^\top\tilde{p}+\tilde{C}^\top\tilde{q}+\tilde{Q}\tilde{x})dt+\tilde{q}dW(t),\\ \tilde{x}(0)&=0, \ \tilde{p}(T)=\tilde{G}\tilde{x}(T), \end{split}\right.$$ where $$\tilde{A}=\hat{A},\ \tilde{C}=\hat{C},$$ $$\tilde{B}=\left( \begin{array}{cc} B_1R_1^{-1}B_1^\top+2\alpha B_2R_2^{-1}B_2^\top&-B_2R_2^{-1}B_2^\top\\ -B_2R_2^{-1}B_2^\top&2\beta B_2R_2^{-1}B_2^\top\\ \end{array}\right),$$ $$\tilde{Q}=\frac{1}{4\alpha\beta}\left( \begin{array}{cc} Q_1+2\beta Q_2&-Q_2\\ -Q_2&2\alpha Q_2\\ \end{array}\right),$$ $$\tilde{G}=\left( \begin{array}{cc} G_1+2\beta G_2&-G_2\\ -G_2&2\alpha G_2\\ \end{array}\right).$$ Now the matrices $\tilde{B}$, $\tilde{Q}$ and $\tilde{G}$ are symmetric and positive definite. Suppose $$\tilde{p}=\tilde{K}\tilde{x},$$ and $$d\tilde{K}=\tilde{K}_1dt+\tilde{L}dW(t).$$ With the same procedure to derive Riccati equation , we can get a standard Riccati equation for $(\tilde{K},\tilde{L})$ $$\label{o25} \left\{ \begin{split} d\tilde{K}(t)&=-(\tilde{K}\tilde{A}+\tilde{A}^\top \tilde{K}-\tilde{K}\tilde{B}\tilde{K}+\tilde{L}\tilde{C}+\tilde{C}^\top \tilde{L}+\tilde{C}^\top \tilde{K}\tilde{C}+\tilde{Q})dt+\tilde{L}dW(t),\\ \tilde{K}(T)&=\tilde{G}. \end{split}\right.$$ According to the results in [@Bismut78] or [@Peng92], or more general case in [@Tang03], we know that Riccati equation has a unique solution $(\tilde{K},\tilde{L})$ and $$\tilde{p}=\tilde{K}\tilde{x},\ \tilde{q}=(\tilde{L}+\tilde{K}\tilde{C})\tilde{x}.$$ Consequently, $$\label{o26} \begin{split} \hat{p}&=\Phi\tilde{p}=\Phi\tilde{K}\tilde{x}=\Phi\tilde{K}\hat{x},\\ \hat{q}&=\Phi\tilde{q}=\Phi(\tilde{L}+\tilde{K}\tilde{C})\tilde{x}=\Phi(\tilde{L}+\tilde{K}\tilde{C})\hat{x}. \end{split}$$ Comparing with and , we finally get $$K=\Phi\tilde{K},\ L=\Phi\tilde{L}.$$ From we obtain that the Stackelberg solution $(u^*,v^*)$ has a feedback representation in terms of the state $(x,y)$. The closed-loop case -------------------- As pointed out in the deterministic case [@PapavassiCruz79], the relative independence of the leader’s strategy $u$ and its derivative $\frac{\partial u}{\partial x}$ in a closed-loop Stackelberg game makes the leader so powerful that his Hamiltonian $H$ is likely to achieve $-\infty$ if there is no restriction on the derivative $\frac{\partial u}{\partial x}$. One way to restrict the leader’s strength is to add a penalty term $\frac{\partial u}{\partial x}$ in his cost functional in order that $H$ is convex with respect to $(u,\frac{\partial u}{\partial x})$. The other way is to impose a prior bounds on $\frac{\partial u}{\partial x}$ to retain $H$ finite. In this section we will adopt the latter way to assume $\frac{\partial u}{\partial x}$ to be bounded since it will appear as the coefficient of the unknowns in adjoint equations and the boundedness of the derivative $\frac{\partial u}{\partial x}$ implies the well-posedness of the leader’s problem when affine strategies are adopted. For simplicity, we consider one-dimensional linear quadratic game, with the state equation and cost functionals of the two players as follows $$\left\{ \begin{split} dx(t)&=[Ax(t)+B_1u(t)+B_2v(t)]dt+Cx(t)dW(t),\\ x(0)&=x_0, \end{split}\right.$$ and $$\begin{aligned} J_1 &= \frac{1}{2}E [\int_{0}^T(Q_1x^2(t)+R_1u^{2}(t))dt+G_1x^2(T)],\\ J_2 &= \frac{1}{2}E [\int_{0}^T(Q_2x^2(t)+R_2v^{2}(t))dt+G_2x^2(T)].\end{aligned}$$ The admissible strategy spaces from which the leader and the follower choose their strategies are given by $$\begin{split} \mathcal {U}&:=\{u|u:\Omega\times[0,T]\times\mathbb{R}\rightarrow U\ \textrm{is}\ \mathcal {F}_t\textrm{-adapted for any}\ x\in\mathbb{R},\ u(t,x)\ \textrm{is continuously}\\ &\ \ \ \ \ \ \textrm{differentible in}\ x\ \textrm{for any}\ (\omega,t)\in\Omega\times[0,T],\ \textrm{and the derivative}\ |\frac{\partial u}{\partial x}|\leq K\\ &\ \ \ \ \ \ \textrm{for some postive constant $K$}\},\\ \mathcal {V}&:=\{v|v:\Omega\times[0,T]\times\mathbb{R}^n\rightarrow V\ \textrm{is }\ \mathcal {F}_t\textrm{-adapted for any}\ x\in\mathbb{R}^n\}. \end{split}$$ Suppose for leader’s each strategy $u\in\mathcal {U}$, the follower has a unique optimal response $v^*\in\mathcal {V}$. From we know $$v^*=-R_2^{-1}B_2p_2,$$ with $p_2$ satisfying $$\left\{ \begin{split} dp_2(t)&=-[(A+B_1\frac{\partial u}{\partial x})p_2+Cq_2+Q_2x]dt+q_2dW(t),\\ p_2(T)&=G_2x(T). \end{split}\right.$$ Therefore the leader’s problem is $$\label{lq2} \min_{u\in\mathcal{U}}J_1= \frac{1}{2}E [\int_{0}^T(Q_1x^2(t)+R_1u^{2}(t))dt+G_1x^2(T)]$$ subject to $$\label{lq3} \left\{ \begin{split} dx(t)&=[Ax(t)+B_1u(t,x(t))-R_2^{-1}B^2_2p_2(t)]dt+Cx(t)dW(t),\\ dp_2(t)&=-[(A+B_1\frac{\partial u}{\partial x})p_2+Cq_2+Q_2x]dt+q_2dW(t),\\ x(0)&=x_0,\ p_2(T)=G_2x(T). \end{split}\right.$$ Suppose that for every $u(t,x)\in\mathcal {U}$, there is a unique solution $(x,p_2,q_2)$ to FBSDE . According to the discussions in section \[sgs\], we know that the leader will lose nothing if he chooses his strategy among affine functions $$u(t,x)=u_2(t)x+u_1(t),$$ with $u_1$ and $u_2$ being adapted processes and $|u_2|\leq K$. Then the leader’s equivalent problem can be written as $$\label{lq4} \min_{u_1,u_2}\ J_1= \frac{1}{2}E \{\int_{0}^T[Q_1x^2(t)+R_1(u_2(t)x(t)+u_1(t))^2]dt+G_1x^2(T)\}$$ subject to $$\label{lq5} \left\{ \begin{split} dx(t)&=[(A+B_1u_2)x+B_1u_1-R_2^{-1}B^2_2p_2]dt+Cx(t)dW(t),\\ dp_2(t)&=-[(A+B_1u_2)p_2+Cq_2+Q_2x]dt+q_2dW(t),\\ x(0)&=x_0,\ p_2(T)=G_2x(T). \end{split}\right.$$ For every pair $(u_1,u_2)$, the monotonicity condition guarantees the existence and uniqueness of the solution to . Therefore, the leader’s problem with strategies restricted being of affine form is well-posed. In what follows we use the maximum principle to get the Hamiltonian system and related Riccati equation for leader’s problem -. Denote $$\label{lq6} \begin{split} &H_1(t,u_1,u_2,x,y,p_1,p_2,q_1,q_2)\\ =&p_1[(A+B_1u_2)x+B_1u_1-R_2^{-1}B^2_2p_2]+Cxq_1\\ &-y[(A+B_1u_2)p_2+Cq_2+Q_2x]+\frac{1}{2}[Q_1x^2+R_1(u_2x+u_1)^2]. \end{split}$$ To obtain $(u_1^*,u_2^*)$ that minimizes $H_1(t,u_1,u_2,x,y,p_1,p_2,q_1,q_2)$, we first fix $u_2$ and minimize $H_1$ with respect to $u_1$. By computation, $$\label{lq7} u_1^*=-u_2x-R_1^{-1}B_1p_1.$$ Substituting into the expression of $H$, we can see the only term containing $u_2$ is $$\label{lq9} -B_1yp_2u_2.$$ Therefore, the optimal $u_2^*$ is $$\label{lq10} u_2^*=\left\{ \begin{array}{ccc} -K, &\ \mbox{if $\Delta>0$},\\ K, &\ \mbox{if $\Delta<0$},\\ \mbox{undefined,} &\ \mbox{if $\Delta=0$}, \end{array}\right.$$ where $$\Delta:=-B_1yp_2.$$ To find a candidate of optimal pair $(u_1^*,u_2^*)$, we set $$\begin{split} u_2^*:=&bang(K,-K;\Delta)\\ :=&sgn(B_1yp_2)K\\ =&sgn(y)sgn(B_1p_2)K\\ =&sgn(p_2)sgn(B_1y)K, \end{split}$$ where $sgn$ is the sign function defined by $$sgn(x)=\left\{ \begin{array}{ccc} 1&\ \mbox{if $x>0$,}\\ 0&\ \mbox{if $x=0$,}\\ -1&\ \mbox{if $x<0$.} \end{array}\right.$$ From we get $$\label{lq11} u_1^*=-bang(K,-K;\Delta)x-R_1^{-1}B_1p_1.$$ If $(u_1^*,u_2^*)\in\mathcal {U}\times\mathcal {V}$ is a solution to the leader’s problem -, then the maximum principle yields that there exist adapted processes $y$, $p_1$, and $q_1$ such that $$\label{lq11} \left\{ \begin{split} dx(t)&=[(A+B_1u_2^*)x+B_1u_1^*-R_2^{-1}B^2_2p_2]dt+Cx(t)dW(t),\\ dy(t)&=[(A+B_1u_2^*)y+R_2^{-1}B^2_2p_1]dt+CydW(t),\\ dp_1(t)&=-[(A+B_1u_2^*)p_1+Cq_1-Q_2y+Q_1x+R_1u_2^*(u_2^*x+u_1^*)]dt+q_1dW(t),\\ dp_2(t)&=-[(A+B_1u_2^*)p_2+Cq_2+Q_2x]dt+q_2dW(t),\\ x(0)&=x_0,\ y(0)=0,\ p_1(T)=-G_2y(T)+G_1x(T),\ p_2(T)=G_2x(T),\\ u_1^*&=-bang(K,-K;\Delta)x-R_1^{-1}B_1p_1,\ u_2^*:=bang(K,-K;\Delta). \end{split}\right.$$ Like the open-loop case, we proceed to express the optimal strategy $(u_1^*,u_2^*)$ in a non-anticipating way by means of the state feedback representation. Substituting the expressions of $u_1^*$ and $u_2^*$ into the FBSDE in , we get $$\label{glq12} \left\{ \begin{split} dx(t)&=[Ax-R_1^{-1}B_1^2p_1-R_2^{-1}B^2_2p_2]dt+Cx(t)dW(t),\\ dy(t)&=[(A+B_1bang(K,-K;\Delta))y+R_2^{-1}B^2_2p_1]dt+CydW(t)\\ &=[Ay+sgn(p_2)K|B_1y|+R_2^{-1}B^2_2p_1]dt+CydW(t),\\ dp_1(t)&=-[Ap_1+Cq_1-Q_2y+Q_1x]dt+q_1dW(t),\\ dp_2(t)&=-[(A+B_1bang(K,-K;\Delta))p_2+Cq_2+Q_2x]dt+q_2dW(t)\\ &=-[Ap_2+sgn(y)K|B_1p_2|+Cq_2+Q_2x]dt+q_2dW(t),\\ x(0)&=x_0,\ y(0)=0,\ p_1(T)=-G_2y(T)+G_1x(T),\ p_2(T)=G_2x(T). \end{split}\right.$$ In contrast to FBSDE in the open-loop case, the presence of the additional nonlinear term $bang(K,-K;\Delta)$ in FBSDE makes it a nonlinear system. Moreover, the Lipschitz continuity assumption usually made for the coefficients in the literature does not hold here. Therefore, the existence and uniqueness of the solution to , as far as we know, is still not available. On the other hand, if we still view $(x,y)$ as the “state” and represent $(p_1,p_2)$ in terms of $(x,y)$ as in the open-loop case, we can not derive an exogenous Riccati equation. Instead, we only see $x$ as the state and suppose $$\label{lq12} y(t)=\xi(t)x(t),\ \ p_1(t)=\eta(t)x(t),\ \ p_2(t)=\zeta(t)x(t),$$ and $$\label{lq13} \begin{split} d\xi(t)&=\xi_1(t)dt+\xi_2(t)dW(t),\\ d\eta(t)&=\eta_1(t)dt+\eta_2(t)dW(t),\\ d\zeta(t)&=\zeta_1(t)dt+\zeta_2(t)dW(t). \end{split}$$ By Itô’s formula and in view of $$\label{lq14} \begin{split} dy(t)=&\xi(t)dx(t)+x(t)d\xi(t)+Cx(t)\xi_2(t)dt\\ =&\xi(t)[Ax-R_1^{-1}B_1^2p_1-R_2^{-1}B^2_2p_2]dt+C\xi(t)x(t)dW(t)\\ &+\xi_1(t)x(t)dt+\xi_2(t)x(t)dW(t)+C\xi_2(t)x(t)dt\\ =&\{[A-R_1^{-1}B_1^2\eta(t)-R_2^{-1}B^2_2\zeta(t)]\xi(t)\\ &+\xi_1(t)+C\xi_2(t)\}x(t)dt+[C\xi(t)+\xi_2(t)]x(t)dW(t). \end{split}$$ On the other hand, $$\label{lq15} \begin{split} dy(t)=&[(A+B_1bang(K,-K;\Delta))y+R_2^{-1}B^2_2p_1]dt+CydW(t)\\ =&[(A+B_1bang(K,-K;\tilde{\Delta}))\xi(t)+R_2^{-1}B^2_2\eta(t)]x(t)dt+C\xi(t)x(t)dW(t), \end{split}$$ where $$\tilde{\Delta}:=-B_1\xi(t)\zeta(t).$$ Comparing and , we have $$\begin{split} \xi_2(t)=&0,\\ \xi_1(t)=&[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)+B_1bang(K,-K;\tilde{\Delta})]\xi(t)+R_2^{-1}B^2_2\eta(t). \end{split}$$ With the same procedure, we can get $$\left\{ \begin{split} \eta_1(t)=&[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)-2A-C^2]\eta(t)+Q_2\xi(t)-2C\eta_2(t)-Q_1,\\ \zeta_1(t)=&[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)-2A-C^2-B_1bang(K,-K;\tilde{\Delta})]\zeta(t)-2C\zeta_2(t)-Q_2. \end{split}\right.$$ Therefore, we derive the related Riccati equation for problem - $$\left\{ \begin{split} d\xi(t)=&\{[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)+B_1bang(K,-K;\tilde{\Delta})]\xi(t)+R_2^{-1}B^2_2\eta(t)\}dt\\ =&\{[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)]\xi(t)+sgn(\zeta(t))|B_1\xi(t)|+R_2^{-1}B^2_2\eta(t)\}dt,\\ d\eta(t)=&\{[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)-2A-C^2]\eta(t)+Q_2\xi(t)-2C\eta_2(t)\\ &-Q_1\}dt+\eta_2(t)dW(t),\\ d\zeta(t)=&\{[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)-2A-C^2-B_1bang(K,-K;\tilde{\Delta})]\zeta(t)\\ &-2C\zeta_2(t)-Q_2\}dt+\zeta_2(t)dW(t)\\ =&\{[R_1^{-1}B_1^2\eta(t)+R_2^{-1}B^2_2\zeta(t)-2A-C^2]\zeta(t)-sgn(\xi(t))|B_1\zeta(t)|\\ &-2C\zeta_2(t)-Q_2\}dt+\zeta_2(t)dW(t),\\ \xi(0)=&0,\ \eta(T)=-G_2\xi(T)+G_1,\ \zeta(T)=G_2. \end{split}\right.$$ Suppose $(\xi,\eta,\zeta,\eta_2,\zeta_2)$ is a solution to the above FBSDE and $x^*$ solves the linear SDE $$\left\{ \begin{split} dx(t)&=[A-R_1^{-1}B_1^2\eta-R_2^{-1}B^2_2\zeta]x(t)dt+Cx(t)dW(t),\\ x(0)&=x_0. \end{split}\right.$$ Then we can use Itô’s formula to verify that $$\begin{split} y(t):=&\xi(t)x^*(t),\ p_1(t):=\eta(t)x^*(t),\ p_2(t):=\zeta(t)x^*(t),\\ q_1(t):=&[C\eta(t)+\eta_2(t)]x^*(t),\ q_2(t):=[C\zeta(t)+\zeta_2(t)]x^*(t), \end{split}$$ together with $x^*$ solve the leader’s Hamiltonian system . Therefore, $$u(t,x)=bang(K,-K;\tilde{\Delta})x-bang(K,-K;\tilde{\Delta})x^*(t)-R_1^{-1}B_1\eta(t)x^*(t)$$ with $\tilde{\Delta}=-B_1\xi(t)\zeta(t)$ is a candidate of the leader’s optimal strategy. T. Başar, “A new approach for derivation of closed-loop Stackelberg strategies,” in *Proceedings of the IEEE 17th Conference on Decision and Control*, San Diego, CA, January 1979, IEEE Computer Society Press, Los Alamitos, CA, pp. 1113–1118. T. Başar and A. Haurie, “Feedback equilibria in differential games with structural and modal uncertainties,” in *Advances in Large Scale Systems* (J. B. Cruz, Jr., Ed.), [JAE]{} Press Inc., Connecticut, 1984, pp. 163–201. T. Başar, A. Haurie and G. Ricci, “On the dominance of capitalists’ leadership in a feedback [Stackelberg]{} solution of a differential game model of capitalism," *J. Economic Dynamics and Control*, [9]{}:101-125, 1985. T. Başar and G. J. Olsder, “Team-optimal closed-loop Stackelberg strategies in hierarchical control problems,” *Automatica*, 16(4):409–414, 1980. T. Başar and G. J. Olsder, *Dynamic Noncooperative Game Theory*, SIAM Series in Classics in Applied Mathematics, SIAM, Philadelphia PA, USA, 1999. T. Başar and H. Selbuz, “Closed-loop Stackelberg strategies with applications in the optimal control of multilevel systems,” *IEEE Transactions on Automatic Control*, 24(2):166–179, 1979. A. Bensoussan, S. Chen and S. P. Sethi, “Feedback Stackelberg solutions of infinite-horizon stochastic differential games,” preprint. J. M. Bismut, “Controle des systems lineares quadratiques: applications de l’integrale stochastique,” in Séminaire de Probabilités XII, *Lecture Notes in Mathematics 649* (C. Dellacherie, P. A. Meyer, and M. Weil, Eds.), pp. 180–264, Springer-Verlag, Berlin, 1978. G. F. Cachon, “Supply chain coordination with contracts," in *Handbooks in OR and MS Vol. 11, SCM: Design, Coordination and Cooperation* (A. G. De Kok and S. C. Graves, Eds.), pp. 227–339, Elsevier, Amsterdam, The Netherlands, 2003. E. Dockner, S. J[ø]{}gensen, N. V. Long and G. Sorger, *Differential Games in Economics and Management Science*, Cambridge University Press, Cambridge, UK, 2000. I. Ekeland and R. Témam, “Convex Analysis and Variational Problems”, North-Holland, Amsterdam, 1976. X. He, A. Prasad and S. P. Sethi, “Cooperative advertising and pricing in a dynamic stochastic supply chain: feedback stackelberg strategies," *Production and Operations Management*, 18(1):78–94, 2009. X. He, A. Prasad, S. P. Sethi and G. J. Gutierrez, “A survey of Stackelberg differential game models in supply and marketing channels," *Journal of Systems Science and Systems Engineering*, 16(4):385–413, 2007. K. Kogan and C. S. Tapiero, “Supply Chain Games: Operations Management and Risk Valuation," Springer, New York, 2007. J. Ma, P. Protter and J. Yong, “Solving forward-backward stochastic differential equations explicitly–a four step scheme,” *Probability Theory and Related Fields*, 98(3):339–359, 1994. J. Ma and J. Yong, “Forward-Backward Stochastic Differential Equations and their Applications,” *Lecture Notes in Mathematics (1702)*, Springer-Verlag, Berlin, 1999. Q. Meng, “General linear quadratic optimal stochastic control problem driven by a Brownian motion and a Poisson random martingale measure with random coefficients,” *arXiv:1102.3295v2*. B. [Ø]{}ksendal, L. Sandal and J. Uboe, “Stochastic Stackelberg Equilibria with Applications to Time Dependent Newsvendor Models,”,SSRN. G. P. Papavassilopoulos, “Leader-Follower and Nash Strategies with State Information,” *Ph. D. Dissertation*, University of Illinois at Urbana-Champaign, August, 1979. G. P. Papavassilopoulos and J. B. Cruz, Jr., “Nonclassical control problems and\ Stackelberg games,” *IEEE Transactions on Automatic Control*, 24(2):155–166, 1979. G. P. Papavassilopoulos and J. B. Cruz, Jr., “Sufficient conditions for Stackelberg and Nash strategies with memory,” *Proc. Conference on Systems Engineering for Power: Organizational Forms for Large Scale Systems*, Vol II, U. S. Dept. of Energy, Washington, DC, October, pp. 2.59–2.69, 1979. G. P. Papavassilopoulos and J. B. Cruz, Jr., “Sufficient conditions for Stackelberg and Nash strategies with memory,” *Journal of Optimization Theory and Applications*, 31(2):233–260, 1980. E. Pardoux and S. Peng, “Adapted solution of a backward stochastic differential equation,” *Systems & Control Letters*, 14(1):55–61, 1990. E. Pardoux and S. Tang, “Forward-backward stochastic differential equations and quasilinear parabolic PDEs,” *Probability Theory and Related Fields*, 114(2):123–150, 1999. S. Peng, “Stochastic Hamilton-Jacobi-Bellman equations”, *SIAM Journal on Control and Optimization*, 30(2):284–304, 1992. S. Peng and Z. Wu, “Fully coupled forward–backward stochastic differential equations and applications to optimal control,” *SIAM Journal on Control and Optimization*, 37(3):825–843, 1999. J. Shi and Z. Wu, “The maximum principle for fully coupled forward-backward stochastic control system,” *Acta Automatica Sinica*, 32(2):161–169, 2006. H. von Stackelberg, *Marktform und Gleichgewicht*, Springer, Vienna, 1934. (An English translation appeared in *The Theory of the Market Economy*, Oxford University Press, Oxford, England, 1952.) S. Tang, “General linear quadratic optimal stochastic control problems with random coefficients: linear stochastic Hamilton systems and backward stochastic Riccati equations,” *SIAM Journal on Control and Optimization*, 42(1):53–75, 2003. J. Yong, “A leader-follower stochastic linear quadratic differential game,” *SIAM Journal on Control and Optimization*, 41(4):1015–1041, 2002. J. Yong, “Forward-backward stochastic differential equations with mixed initial-terminal conditions,” *Trans. Amer. Math. Soc.*, 362(2):1047–1096, 2010. J. Yong, “Optimality Variational Principle for Controlled Forward-Backward Stochastic Differential Equations with Mixed Initial-Terminal Conditions,” *SIAM Journal on Control and Optimization*, 48(6):4119–4156, 2010. J. Yong and X. Zhou, “Stochastic Controls: Hamiltonian Systems and HJB Equations,” Springer, 1999. [^1]: Naveen Jindal School of Management, The University of Texas at Dallas, Richardson, TX, USA. [^2]: Graduate School of Business, The Hong Kong Polytechnic University, Hong Kong, and Graduate Department of Financial Engineering, Ajou University, Suwon, South Korea. [^3]: The first author is supported by WCU (World Class University) program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (R31 - 20007) and by the Research Grants Council of HKSAR (PolyU 5001/11P). The second author is supported by NNSF of China (Grant No.11101140).
2023-10-02T01:26:36.242652
https://example.com/article/9541
1. Field of the Invention The present invention relates to a controller for an automatic machine comprising a plurality of servo controlled axes, such as an industrial robot (hereinafter, called "robot"), machine tool, or the like, and more particularly, to technology for avoiding dangers caused by malfunction occurring immediately after an automatic device is actuated, and for helping to eliminate the causes of same. 2. Description of the Related Art In cases where malfunction occurs, for instance, due to deterioration of the electronic components in the servo amplifiers of servo motors driving the various axes of the robot or machine tool, the unit containing the components in question is replaced. When replacing the unit, the connections between the servo amplifiers and servo motors, or between the servo controllers and pulse coders (position detectors), or the like, are temporarily broken and then reconnected once the unit has been replaced. However, in some cases, these connections may be made incorrectly for some of the axes when this reconnection operation is performed. FIG. 1A illustrates a case where connections are made correctly between devices constituting a servo system for a servo controlled first axis and second axis. In FIG. 1A, the first axis servo control unit #1 reads in a first axis movement command created inside a controller (illustration of the entire controller omitted), and generates a torque command to be sent to servo amplifier A1, on the basis of the aforementioned movement command and a feedback signal from a pulse coder P1 appended to a first axis servo motor M1. On the basis of the torque command from servo controller #1, the servo amplifier A1 generates a drive current to be supplied to the first servo motor M1. The first axis pulse coder P1 outputs information relating to the position or speed of the first axis to the first axis servo controller #1, in the form of a feedback signal. In the foregoing, the servo system relating to the first axis has been described, and since the servo system for the second axis is the same as that for the first axis, description thereof has been omitted here. FIG. 1B shows a first example of a case where connections are made incorrectly between devices constituting a servo system for a servo controlled first axis and second axis. In the example shown in FIG. 1B, the axis correspondences in the connections between the servo controllers and the servo amplifiers have been made incorrectly. If the machine is actuated in this state, the output from the first axis servo controller #1 is transmitted to the second axis servo amplifier A2, and the output from the second axis servo controller #2 is transmitted to the first axis servo amplifier A1. Consequently, the first axis servo motor M1 operates in accordance with the movement command for the second axis. The pulse coder P1, meanwhile, outputs positional information for the servo motor M1, which operates according to this command, to the servo controller #1. The servo controller #1 generates an output seeking to reduce the positional deviation to zero, but this output is transmitted to the second axis servo amplifier A2, rather than the first axis servo amplifier A1. Therefore, the servo system seeking to reduce the positional deviation to zero will not function and the servo motor M1 will perform completely unexpected and unregulated actions, and depending on circumstances, the probability of runaway operation may be high. There is also a similar risk of runaway operation with regard to the second axis servo motor M2. Moreover, in a case where, for example, gravitational force or a moment due to gravity is acting on the second axis of a robot, or the like, then even if no command is input, due to the action of gravitational force or the moment due to gravity, an output seeking to reduce the positional deviation to zero will be transmitted to the first axis, and hence there is a risk of the first axis servo motor M1 performing runaway operation. FIG. 1C shows a second example of a case where connections are made incorrectly between devices constituting a servo system for a servo controlled first axis and second axis. In the example shown in FIG. 1C, the axis correspondences in the connections between the servo amplifiers and the servo motors have been made incorrectly. FIG. 1D shows a third example of a case where connections are made incorrectly between devices constituting a servo system for a servo controlled first axis and second axis. In the example shown in FIG. 1D, the axis correspondences in the connections between the servo motors and the servo controllers have been made incorrectly. In both the second and third examples where connections have been made incorrectly between devices constituting a servo system for a servo controlled first axis and second axis similarly to the first example, the servo system does not function correctly, and there is danger of servo motors M1 and M2 performing runaway operation. With regard to the characteristics of a servo system, there is a high probability that the malfunction caused by incorrect connection between the devices constituting a servo system for a plurality of servo controlled axes, as illustrated in the examples in FIG. 1B-FIG. 1D, will arise immediately after the start of the machine. More particularly, in systems incorporating an axis that is subjected to gravitational force or a moment due to gravity, there is a high probability of malfunction occurring immediately after the brakes are released, and in systems which do not incorporate an axis that is subjected to gravitational force or a moment due to gravity, there is a high probability of malfunction occurring immediately after a movement command has been issued. The reason for this is that since the servo controller generates an output which seeks to make the deviation (difference between command value and feedback value from pulse coder) converge to zero as quickly as possible, then there is a high probability that the system will diverge very rapidly, without achieving convergence, if incorrect connections are made as described above. Moreover, even if there are no incorrect connections as described above and the operator actuates the machine without being aware of the occurrence of deterioration, faults, or the like, in the electronic components, then similar malfunction may be liable to occur. In order to deal with the problem of malfunctions of this kind, a teaching pendant fitted with a dead-man switch is connected to a controller for a robot, in such a manner that the robot can be brought to an emergency halt by means of the operator releasing (ceasing to depress) the dead-man switch. However, in a case where the robot runs out of control immediately after the start, for one of the reasons described above, there is a danger of an accident occurring before the operator is able to react. Moreover, in a controller for a machine tool, no means are known for dealing immediately and reliably with a malfunction occurring unexpectedly immediately after the start of the machine tool.
2023-11-26T01:26:36.242652
https://example.com/article/4719
Sunday, April 03, 2005 ANOTHER THING THAT NEVER HAPPENS IN JAPAN One silently recurring advantage or disadvantage we US expats have twice a year in Japan occurs each year right about now, when daylight savings time doesn’t happen, and then in Fall when it doesn't happen again in reverse, allegedly screwing up our biological clocks or allegedly saving energy. Or giving workers more daylight to enjoy their after-work evenings, which anyway wouldn't happen in Japan, where salarimen don't really have evenings after work, since they're working overtime, on their biological clocks too. About Me Born and raised in upstate New York, traveled for a decade after college, lived in various places around the world, keeping a journal. Settled in Kyoto in 1980, moved to this mountainside above Lake Biwa in 1995. Started Pure Land Mountain in April 2002. Written contents 2002~2013 copyright Robert Brady
2023-09-19T01:26:36.242652
https://example.com/article/1109
A federal judge on Monday struck down South Dakota's ban on gay marriage. Lawmakers in 1996 approved a law prohibiting same sex couples from marrying. A decade later, voters approved a constitutional amendment reinforcing the law. “Plaintiffs have a fundamental right to marry,” U.S. District Judge Karen E. Schreier said in her 28-page ruling. “South Dakota law deprives them of that right solely because they are same-sex couples without sufficient justification.” Schreier stayed her ruling pending an expected appeal. Plaintiffs in the case are five couples who want their out-of-state marriages recognized by South Dakota and a couple who wishes to marry in the state. Two of the couples are raising children. They are represented by two local lawyers and the National Center for Lesbian Rights (NCLR). “We are thrilled for our clients and for all same-sex couples in South Dakota, who have watched and waited as progress has been made in so many other states, and who can now see light at the end of the tunnel in their own state,” said Christoper F. Stoll, senior staff attorney with NCLR. “We are also grateful to Judge Schreier for writing such a detailed and powerful analysis and for affirming in such strong terms that same-sex couples have the same fundamental freedom to marry as others. We hope this decision will hasten the day when the Supreme Court decides this issue for the country and ensures that all families are treated fairly and equally under the law.” Gay couples can wed in 36 states, in addition to the District of Columbia, with Florida being the latest.
2024-02-12T01:26:36.242652
https://example.com/article/3453
Steve Jobs started out an idealist and ended up a realist. This is the path most of us are on. But Steve Jobs’ smartphone technology has ushered in a new age with the potential to make his idealist visions a reality. Collaborative consumption, impossible without the iPhone, may help wring waste out of the global economy so that overproduction is a thing of the past and the environment, as a victim of overconsumption, will begin to heal. But if this is to happen, many challenges not even Jobs was naïve enough to believe in, must be solved. Will the Great Disruption Have a Happy Ending? The internet, mobile devices, and social media have completely transformed the way we eat, interact, live, socialize, shop, travel, and consume information and media. This period in history is being referred to as “The Great Disruption” as our lives are speeding up along with our blood pressures. And this great watershed is a global phenomenon. The idea of collaborative consumption means sharing property of any kind to anyone through a number of internet-based sharing services. Of course, there are the ride-sharing services like Uber and Lyft and DriveMyCar and apartment and home-sharing services like Airbnb. The Freedom Boat Club allows us to rent boats. But as people share more and more, they are beginning to run up against cold hard realities like regulations that can result in legal trouble and damage to property we have shared. For example, homeowners are now renting property using Airbnb and are being charged with fraud because they have applied for and received a homestead exemption on their private residence on which they are now making money. In some jurisdictions, Airbnb is being ruled out completely by local boards or stripping homeowners who rent their property of their homestead exemption, significantly increasing their yearly tax bill. Another issue with the sharing or collaborative consumption economy is a lack of mutual trust between those providing services and those consuming them. Setting expectations on behavior and use of rented property is not as easy for private homeowners as it is for commercial establishments. Many believe that being successful in the sharing economy is as simple as downloading an app to a smartphone. But the sharing economy is actually a can of worms that is likely to be messy for years to come as new regulations are put in place. The following video presentation, “The Case for Collaborative Consumption” by Rachel Botsman explains how humans are now “wired to share.” David Russell Schilling David enjoys writing about high technology and its potential to make life better for all who inhabit planet earth.
2024-06-17T01:26:36.242652
https://example.com/article/3621
Left ventricular dyssynchrony is associated with recurrence of ischemic mitral regurgitation after restrictive annuloplasty. In our study, we investigated the impact of papillary muscle systolic dyssynchrony (DYS-PAP) obtained by 2D speckle-tracking echocardiography (2D-STE) in the prediction of recurrent ischemic mitral regurgitation (MR) after restrictive annuloplasty. The study population consisted of 524 consecutive patients who survived coronary artery bypass grafting (CABG) and restrictive annuloplasty, performed between 2001 and 2010 at 3 different Institutions and who met inclusion criteria. The assessment of DYS-PAP was performed preoperatively and at follow-up (median 45.3 months [IQR 26-67]) by 2D-STE in the apical four-chamber view for the anterolateral papillary muscle (ALPM) and apical long-axis view for the posteromedial papillary muscle (PMPM). Recurrence of MR (≥ 2+ in patients with no/trivial MR at discharge) was found in 112 patients (21.3%) at follow-up. Compared to patients without recurrence of MR, these patients had higher DYS-PAP values at baseline (60.6 ± 4.4 ms vs. 47.2 ± 2.9 ms, p<0.001) which significantly worsened at follow-up (74.4 ± 5.2 ms, p=0.002 vs. baseline). In contrast, in patients with no MR recurrence, DYS-PAP was significantly reduced (25.3 ± 4.4 ms, p=0.002 vs. baseline). At logistic regression analysis DYS-PAP (odds ratio [OR]: 4.8, 95% Confidence Interval [CI]: 3.4-8.2, p<0.001), was the strongest predictor of recurrent MR with a cutoff ≥ 58 ms (95%CI 51-66 ms). The model showed an area under the Receiver Operating Characteristic (ROC) curve of 0.97 (CI 0.94-0.99 [optimism-corrected 0.94; CI 0.89-0.95]) with 98% sensitivity (CI 96-100% [optimism-corrected 95%; CI 91-96%]) and 90% specificity (CI 85-94% [optimism-corrected 87%; CI 82-90%]). DYS-PAP represents a reliable tool to identify patients with ischemic MR who can benefit from restrictive annuloplasty.
2024-03-26T01:26:36.242652
https://example.com/article/4121
Story highlights The presence of Russian troops in Ukraine's Crimea has ratcheted up tensions U.S. President Barack Obama appears to have limited options to pressure Russia A military response isn't considered to be a realistic possibility The crisis is roiling global markets, pushing up the price of oil and hurting the ruble The upheaval in Ukraine has spiraled into an increasingly tense dispute between Russia and the West. The United States and many European countries are demanding that Moscow scale back its deployment of troops in Ukraine's southern region of Crimea. But Russian President Vladimir Putin so far appears unfazed by the pressure. By Russia's account, its soldiers are protecting the human rights of worried, vulnerable Russian speakers. But in the U.S. view, Russia is violating international law. Caught in the middle is Ukraine's shaky new government. With armed men are locked in an uneasy standoff in Crimea, the consequences could be deadly. And their effects may ripple out far beyond Ukraine's corner of Eastern Europe. JUST WATCHED Squeezing Russia economically Replay More Videos ... MUST WATCH Squeezing Russia economically 02:49 JUST WATCHED 24 hours of tension in Ukraine Replay More Videos ... MUST WATCH 24 hours of tension in Ukraine 02:52 JUST WATCHED Russians are "very much in control" Replay More Videos ... MUST WATCH Russians are "very much in control" 05:41 What is Russia trying to achieve? Some commentators have suggested that Putin has overplayed his hand by sending troops into Crimea, creating a situation that will hurt both Ukraine and Russia. But others say it's a calculated move based on the assessment that the West will fail to come up with a strong, unified response. "Putin's broader plan is to recreate some kind of 'Soviet Union lite,' a ring of countries under Moscow's control, with the goal of boosting Russia's geopolitical standing," Ulrich Speck, a visiting scholar at the Carnegie Europe think tank in Brussels, writes in an opinion article for CNN. If Putin gets what he wants in Ukraine, Speck says it augurs badly for other neighboring countries with Russian populations. He points to Moscow's "de facto-annexation" of the Georgian regions of Abkhazia and South Ossetia after the war between Russia and Georgia in 2008. "Beyond Ukraine, this conflict is also a defining moment for future Russian foreign policy," Speck says. "If Moscow succeeds in Ukraine, it will come to the conclusion that it can act like an empire." What options are available to the U.S. and the West? Washington is preparing potential sanctions that could freeze the overseas assets of Russian individuals and companies and impose travel bans on some Russian officials. But for many of the measures to really bite, Obama needs to get key European allies on board, some of whom appear reluctant to take too hard a line on Russia. The United States has already halted trade and investment talks and military-to-military engagements with Russia. Questions remain over how broad the sanctions will be, and whether the United States can persuade its European allies to implement them. "Inside the EU there is no unity about the proper reaction," says Speck. One option for defusing the crisis, mentioned by U.S. Vice President Joe Biden, would be the deployment of international monitors in the Crimea to provide the protection to Russian citizens that Moscow says its troops are providing. But Russia isn't showing any signs it intends to pull back its soldiers for the time being. Why doesn't the United States respond militarily? Nobody in Washington appears eager for a military confrontation with America's nuclear-armed former Cold War opponent. "The last thing anybody wants is a military option in this kind of situation," said Secretary of State John Kerry. JUST WATCHED America's diplomatic options in Ukraine Replay More Videos ... MUST WATCH America's diplomatic options in Ukraine 03:59 JUST WATCHED Military & diplomatic options in Ukraine Replay More Videos ... MUST WATCH Military & diplomatic options in Ukraine 04:24 JUST WATCHED 'Ethnic cleansing' possible in Ukraine Replay More Videos ... MUST WATCH 'Ethnic cleansing' possible in Ukraine 01:36 U.S. officials say they are trying to find a way to deescalate the situation in Ukraine rather than provoke a wider conflagration. But the situation would become a more complicated if Russia moves troops beyond Crimea into other parts of Ukraine, risking an all-out war with Kiev. Some people are suggesting measures that include a military element but don't go as far as direct confrontation. Republican Sen. Lindsey Graham of South Carolina called for the revival of plans for a NATO missile defense shield in Poland that Russia had strongly opposed. What is Russia's interest in Ukraine? What are the wider effects of the crisis? The standoff has had a significant effect in global markets, pushing up the price of oil . Russia is a key exporter of oil and natural gas. But experts say the world's need for Russian energy supplies -- and Russia's need for the revenue generated -- should ensure the taps stay open throughout the crisis. The share prices of international companies that are heavily invested in Russia have also suffered. Ukraine, meanwhile, is one of the world's top exporters of corn and wheat, whose prices could rise on concern those exports could come to a halt. What is Ukraine saying? Ukraine's Interim Prime Minister Arseniy Yatsenyuk, who has accused Moscow of declaring war, vowed that his government would not give up Crimea. "Nobody will give Crimea away," he said. "There are no grounds for the use of force against civilians and Ukrainians, and for the entry of the Russian military contingent," Former Ukrainian Prime Minister Yulia Tymoshenko said that if diplomacy fails to persuade Moscow to withdraw its forces from the Ukrainian region of Crimea, the world should apply the "strongest means" on Russia. Asked by CNN's Christiane Amanpour if she was calling for the West to use military force against Russia, Tymoshenko avoided giving a direct answer, saying she "cannot solve this issue." Russia says that ousted Ukrainian President Viktor Yanukovych, whom Moscow still recognizes as the country's legitimate leader, requested that Russia send in military forces. What is the atmosphere like in Crimea? Reporters on the ground say the standoff is a strange one . Russian soldiers wearing no military insignia have taken up positions around the region. They have blockaded Ukrainian troops in their bases. But for the time being, the situation remains surprisingly calm. It has been "a very low-key kind of invasion," CNN correspondent Diana Magnay reported Monday from Simferopol, the Crimean capital. But Russian forces "have complete operational control of the Crimean peninsula," a senior U.S. administration official told CNN. It appears that there is a "war of information" in the region "between those who watch Russian state TV and those who are getting their news from the West, none of them listening to the calls from Kiev for unity in this country," Magnay reported.
2024-05-30T01:26:36.242652
https://example.com/article/3186
Pumpkin Apple Struesel Cake with Coconut Caramel and Chocolate Chips Heeeeyyyyy, so tomorrow is Halloweeeeeen and the holiday season in America has officially begun! This means you can expect the foodie radar to be set for all things pumpkin-apple-spice and everything festive and nice. I personally love the holiday season and never tire of all the possible ways to dress up your squash- pumpkin included. I especially love sweet and spicy roasted pumpkin seeds and pumpkin soup with bacon and cream…mmmm…I would love to hear your festive, fall inspired favorites- if you feel like dropping a line in the comment section below. And now, for this Pumpkin Apple Streusel Cake with Coconut Caramel and Mini Chocolate Chips. I know it’s kind of a mouth full, but if you dare to make this scrumptious, moist sweet bread with all the toppings it’s sure to make your mouth happpppyyyyy. Que the old school Twizzler commercial. Without the gluten please. 😉 As you probably already guessed, this is free from all the things we fear most. Gluten, grains, white sugar (okay, not exactly free in the chocolate chips, but we don’t have to count that. Maybe? or you could just omit them or use raw cacao chips ) and other common allergens like soy, casein, corn and peanuts. It’s also made with the highest quality ingredients like, pasture raised eggs with the deepest most golden yolks, grade b maple syrup- which is more nutrient dense than grade a. Blanched almond flour, coconut flour, pumpkin seeds…and the list goes on. When baked the cake has a warm and moist, yet crumbly sort of texture that’s almost like a bready pumpkin pudding with notes of cinnamon, cardamom and maple, paired with the sweet and crunchy topping of pumpkin seeds and coconut sugar + the raw cold, crisp and slightly tangy apple slices, warm and comforting caramel paired with cinnamon and sea salt + those chocolate chips on the finish makes for something like fall fireworks for the tastebuds. The experience will go straight to the soul. You’ll want to share it someone. Honestly. Here’s the recipe: 2 C All Purpose Gluten Free Flour (we used the mix similar to the one posted in the archives, but re-written with arrowroot starch and less gum in the post for gingersnap cookies. I really like the texture of this mix, I feel like it’s a bit more light and airy. I’ll have to make a separate post for you to make it easier to find. ) 1/4 tsp fine sea salt 1 tsp cardamom 1 tsp cinnamon 1/2 tsp grated nutmeg 1 tsp baking powder 1 tsp baking soda 1 C grade B maple syrup 1 C pumpkin puree 2 pasture raised eggs 1 tsp vanilla extract (pure) 1/2 C almond milk (unsweetened) 1/4 C ghee/coconut oil blend. ( We purchase ours in a gallon through Green Pastures online- if you can’t find this blend just use pure ghee or coconut oil) * ghee is technically considered a dairy product since it comes from grass fed cows butter (it should be grass fed anyway) but proteins are removed during the separation process, so many people with dairy allergies can still enjoy the buttery goodness of ghee. We’re pretty much gah-gah over it. Pre-heat oven to 325 or 350 depending on your oven. Ours is tiny so we do 325 to prevent over heating and burning. In a large mixing bowl add the flour, salt, cardamom, cinnamon, nutmeg, baking powder, and baking soda. Whisk together. In a separate bowl add the syrup, pumpkin puree, eggs, vanilla, almond milk and ghee blend. Whisk together. Then, add to the dry mix and mix just until it comes together. Grease a medium cast iron skillet with an all vegetable shortening ( we use nutiva’s super food brand ) Then pour the batter in and spread evenly with a spatula. Now, you’ll need to prepare your topping. For the topping you’ll need: 1/3 C pumpkin seeds 1/3 C coconut flakes 1/3 C coconut sugar 1 tsp cinnamon 1 TB ghee/coconut blend (or either or) Place all ingredients in a food processor and pulse into crumbs. Sprinkle over the pumpkin mixture and transfer to the oven. Bake for about 20 minutes or until set. For the caramel you’ll need: 1/3 C filtered water 1/3 C coconut sugar 1/3 C coconut cream (the fatty white stuff sitting on top of the full fat can of coconut milk) a big sprinkle of cinnamon a pinch of sea salt In a sauce pan over medium high heat, add the water and coconut sugar. Bring to a boil and whisk constantly until it begins to thicken. Add the coconut cream and continue to whisk until it combines with the sugar water candy stuff and begins to take the shape of caramel, add cinnamon and sea salt. You don’t want it to become too thick, so watch it for the lines it starts to leave on the bottom of the pan while you whisk away. Remember it will thicken a bit more when you let it cool. You can also test with your spoon and see how well the caramel sticks to it when you dip it in the sauce . While you let the caramel slightly cool ( the cake should be on its way) Slice about 3 small green apples. Depending on how much time is left in the oven you may want to squeeze some lemon juice over the apple slices while they sit. To prevent them from turning brown. Remove the cake from the oven and begin arranging apple slices around the edges. Finish with a drizzle of caramel and a sprinkle of mini chocolate chips. (We use the enjoy life brand of dairy free, organic chocolate chips – free of common allergens. ) Make the caramel by placing 1/3 C filtered water and 1/3 C coconut sugar into a sauce pan. Bring to a boil and whisk constantly until begins to thicken. Add 1/3 C coconut cream and continue to whisk until a thickened coconut caramel begins to form. Add a sprinkle of cinnamon and sea salt on the finish. Slice and arrange apples over cake, drizzle with coconut caramel and finish with mini chocolate chips. Yeeeeessss, please! I need some pumpkin apple streusel cake in my life! With the caramel and chocolate chips too! I love how nutrient dense this is with the grain-free flour and unrefined sweeteners. You made it look SO beautiful too! A+++ for YUM factor!ReplyCancel
2024-07-29T01:26:36.242652
https://example.com/article/9140
Blog Open-source CMS Drupal has advised users to upgrade to the latest version of Drupal 7 and 8 to prevent a bug from affecting sites using the content management software. “A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in … In the wake of the privacy breach controversy involving Facebook and political consulting firm Cambridge Analytica, Mozilla has suspended advertising on the social network, citing data privacy concerns. In a post on Medium, Mozilla chief business and legal officer Denelle Dixon said: “We understand that Facebook took steps to limit developer access to friends’ data beginning in 2014. This was … Google Assistant users would ask the digital aide to unlock and open apps on a Pixel phone, control smart home devices, play their favorite songs, or cast Netflix movies to the TV, among other tasks. The virtual assistant now has a new feature. You can use it to send and receive money. Google announced the peer-to-peer payment scheme on Thursday, … Days after the New York Times reported about the misuse by political consulting firm Cambridge Analytica of the personal information of 50 million Facebook users in 2014, Facebook chief executive and founder Mark Zuckerberg finally spoke about the issue. People worldwide had been waiting for Zuckerberg’s response to the issue, which broke out on Friday last week. He talked about … Are you an iPhone or an iPad user? If so, you should read this. There is a Siri bug on iOS 11 that lets the voice assistant read out loud your hidden third-party notifications. Thus, other people within earshot can hear what those notifications are. Brazilian site Mac Magazine first discovered the bug and 9to5Mac.com reported about it. Mac Magazine … Alexa on Echo or Echo Dot has become less chatty. Amazon is testing an update to the online retail behemoth’s digital assistant called “Brief Mode.” The update rolled out late last week, Engadget said. Instead of replying “Okay,” Alexa would just make a short beep, signifying that a task has been completed. While Mashable said the feature “appears to still … A political data analytics company that has links to the Trump campaign collected personal information from 50 million Facebook profiles without their permission in 2014, according to a New York Times report. Quoting former employees of Cambridge Analytica and associates, and following a review of emails and documents, NYT said the personal data was “harvested” through an app. In a … You won’t be seeing cryptocurrency ads on Google anymore starting this June. The Internet search giant announced on Wednesday a blanket ban on cryptocurrency ads as well as announcements related to the virtual currency like initial coin offering (ICO). The announcement of the ban on cryptocurrency ads, which was contained in an update to Google’s advertising policies section, did not … Do you own an AmazonBasics portable power bank? If so, stop using it now because it poses safety risks. Effective March 13, the online retail giant has voluntarily recalled six power bank units sold between December 2014 and July last year but did not say why. The recall affected 260,000 power bank units. The U.S. Consumer Product Safety Commission (CPSC), … Are you a so-called crypto-investor but want to monitor your Bitcoins? Because the virtual currency world is a volatile one, rules with regard investing in stocks where you can get high dividends or assets with low risks of losses don’t apply there, according to a Mashable article. “There are no low-risk assets. Prices swing up and down in double-digit percentages …
2024-02-08T01:26:36.242652
https://example.com/article/6968
Layered silicate clays have been widely utilized to equip the pristine polymers with value-added properties, such as considerable mechanical strength, thermal durability, and gas impermeability[@b1][@b2]. The final properties of polymer/clay systems dominantly depend on dispersion configuration of clay into polymer matrix and physico-chemical events at clay-polymer matrix interface[@b3]. Since the first attempt has been made to use layered silicate clays in construction of exfoliated nylon 6/clay nanocomposites by Toyota Company researchers[@b4], several strategies have been developed to produce various exfoliated polymer/clay nanocomposites[@b5]. Nonetheless, due to the intense static forces among neighbouring platelets in the pristine layered silicate clays, complete exfoliation of platelets, and their further homogeneous dispersion in polymer matrices are still challenges to overcome[@b6][@b7]. Among various polymer-clay configurations, complete exfoliation of individual clay layers into the polymer matrices is of particular interest because it maximizes the interactions of clay layers with polymers matrix[@b8]. From the reactions kinetic viewpoint, to produce a completely exfoliated nanocomposite, theoretically, either polymerization reactions of monomers should be firstly initiated between clay galleries (which is so-called surface-initiated polymerization), and then is progressed to the bulk monomers, or polymerization rate between clay galleries should be faster than polymerization in bulk monomers, leading to the separation of clay layers[@b9][@b10]. Layered silicate clay materials inherently have a hydrophilic nature and as such their compatibility with most industrial polymers is poor and consequently incorporation of unmodified clay into polymers, not only, does not improve performance of the polymers, but also potentially could deteriorate intrinsic properties of the parent polymers[@b11][@b12]. Most commercially available clays have been modified through cationic exchange process of clay interlayer cations with ammonium cations consisting of long alkyl hydrophobic chains, which lead to the expansion of clay layers and consequently facilitate the penetration of polymer chains into clay layers[@b13][@b14]. Although these modifications improve the dispersion of clay into polymer matrices, the interface of the modified clay layers with polymer matrices are not usually taken into account and the interactions at interface remain as weak as van der Waals interactions[@b15][@b16] which could be accompanied with adverse plasticisation effects at clay-matrix interface[@b17]. Despite achievements in the exfoliation of clay layers into polymer matrices, it has been repeatedly reported that plasticisation has devastating effects on some mechanical properties of polymers, in particular glass transition temperature (*T*~g~) of epoxy polymers. To reduce the plasticisation effects, strong interactions e.g., covalent bondings between clay modifiers with polymer matrix are inevitably required to be established at interface[@b18][@b19]. In the case of epoxy polymers, it has been proven that the alkyl ammonium modifiers can catalyse self homo-polymerization of epoxide groups within clay layers, facilitating the exfoliation process[@b20]. Nevertheless, there is no interaction between clay layers and the formed epoxy matrix leading to the profound plasticisation effects on *T*~g~ of epoxy-clay nanocomposites. A common strategy to surmount the plasticisation effects at interface is coupling the hydroxyl groups of surface and edges of clay with polymer matrix through silane compounds[@b21]. The silane coupling agents can covalently react with polymer and reduce plasticisation effects[@b22]. Although it has been reported that clay treated with silanes can create a strong interface, a solvent process is required to achieve a highly individual layers dispersed into polymer matrix, which is not easily feasible in terms of its manufacturing[@b23]. Additionally, the amount of graftable hydroxyl groups on clay surface and edges are extremely limited and amount of silane grafted is low, in comparison to organic modifiers using cations exchange[@b24]. To overcome these challenges, modification based on cations exchange which appears to be more efficient in terms of its quantity, has to be formulated to create strong interactions between clay layers and polymer matrices, obtaning the desirable properties. During the past decades, there has been a significant interest in use of sustainable and renewable materials instead of conventional hazardous substances for development of high-performance materials[@b25][@b26][@b27]. In this regard, a few approaches have been developed to modify layered silicate clays with natural compounds for polymer composites applications. Jin *et al*. coated montmorillonite with protein biopolymers extracted form soy plant using the pH change, leading to the exfoliation of clay layers into biopolymers[@b28]. Chitosan/clay nanocomposite is another example in which biopolymers are used to modify clay[@b29]. In the case of thermosetting epoxy/clay composites, Barua S. *et al*. reported a biocompatible epoxy/clay nanocomposite with enhanced mechanical properties for tissue engineering applications using modified bentonite with an oil derived from a specific plant[@b30]. Focusing on the role of interfacial physico-chemical interactions in mechanical properties of epoxy/clay nanocomposites, Yang L. *et al*.[@b31] reported a biomimetic approach using *in situ* polymerization of dopamine within clay layers. In this approach, cationic amine groups of polydopamine were exchanged with clay cations, and the hydroxyl groups of polydopamine were tasked to enhance the interfacial interactions through forming hydrogen bondings with an epoxy polymer. One of the most promising renewable materials, recently employed to enhance thermal performance of textile fabrics is DNA derived from fishing industrial waste[@b32][@b33][@b34]. It has been reported that DNA can act as an intrinsically flame retardant on cotton fabrics and enhance fire retardancy of system[@b32][@b35][@b36][@b37]. In contrast to the conventional fire retardant materials which are commonly phosphorous or halogen based hazardous compounds[@b38][@b39], DNA is a green and natural flame suppressant and retardant which can potentially be replaced with traditional fire retardant materials[@b37]. General structure of DNA consists of sodium phosphate backbone groups, deoxyribose unites, and nucleobases having hydrogen bondings together. The sodium phosphates groups can potentially act as a nucleophile intermediate in organic reactions e.g., reaction with epoxide rings. Inspired by these features of DNA, we hypothesized that if DNA can be intercalated within clay layers, interfacial interactions as well as thermal performance of epoxy/clay system may significantly be improved in comparison to those commercially modified. To verify this hypothesis, we have embedded DNA within the clay layers and subsequently incorporated such DNA modified clay layers into an epoxy matrix to produce epoxy/clay nanocomposites. Herein, structure, morphology, mechanical, thermal, and flammability performance of these newly developed nanocomposites, have been comprehensively investigated while focusing on the role of interfacial interactions between modified clay and polymer matrix. Results and Disccusions ======================= DNA-modifed clay characterizations ---------------------------------- [Figure 1](#f1){ref-type="fig"} demonstrates how to change DNA structures, being able to cation-exchange with clay cations, leading to intercalation of DNA within clay layers. Although dispersion of DNA/water makes a solution with pH \~5.5, it has been reported that hydrogen bonding between nucleobases of DNA structure could be effectively dissociated at pH \~4 causing to form ammonium cations through its nucleobases; and at pH \< 2, DNA structure will be hydrolysed, causing to break the phosphodiester bonds and consequently the bases will be broken off[@b40]. As shown in [Fig. S1](#S1){ref-type="supplementary-material"}, maximum amount of 72 ± 6 mg DNA per gram of p-clay was obtained to be intercalated within clay layers at pH = 2, and its amount decreases significantly at higher pHs. Ability to disperse the pristine clay (p-clay) and clay modified with DNA (d-clay) in solvents, are also presented in [Fig. 1](#f1){ref-type="fig"}. As shown, d-clay becomes suspended into organic phase (chloroform) instead of being at water phase, whereas p-clay remains in water phase, which preliminarily confirms a transition of hydrophilicity nature of p-clay into the organophilicity in d-clay. The d-clay was fully characterized using FTIR, XPS, XRD, and TGA analysis to find out its structural characteristics. In FTIR spectrum of p-clay, both of the peaks at 3620 cm^−1^ and 3420 cm^−1^ are ascribed to H−O−H stretching vibration bands of water molecules bonded to the Si−O surface on the clay. The stretching bands of Al−OH and Fe−OH are also appeared at below 916 cm^−1^. The peak at 1635 cm^−1^ observed for p-clay can be attributed to the --OH deformation of water. The Si−O stretching vibration bands are observed around 1100 cm^−1^. After modification of clay with DNA, obvious new peaks at around 1230 cm^−1^, 1680 cm^−1^, and 3200 cm^−1^ were appeared in FTIR spectrums of d-clay and DNA, as indicated in [Fig. 2a](#f2){ref-type="fig"}. These peaks are related to the P-O, P = O, primary/secondary N-H stretching, respectively, showing presence of DNA characteristic peaks in d-clay structure. While a broad peak related to the hydroxyl groups of both hydrogen phosphate groups and nucleobases can be observed after 3200 cm^−1^ in FTIR spectrum of DNA. Moreover, an obvious peak at 1450 cm^−1^ denotes presence of C = C stretching bonds in nucleobase of DNA structure for both d-clay and DNA samples. As shown in [Fig. 2b](#f2){ref-type="fig"}, the main XPS characteristic peaks of p-clay are Si2p, Al2p, O1s and Na1s which appear at 103, 74, 533 and 1072 eV, respectively. After modification of p-clay with DNA, the main changes in XPS survey spectrum of d-clay are appearance of N1s and P2p as well as disappearance of Na1s, which clearly confirms successful modification. As the DNA structure includes sodium phosphate groups, appearance of P2p and disappearance of Na1s in XPS survey of d-clay shows that all Na^+^ cations were removed from d-clay structure. [Table 1](#t1){ref-type="table"} also presents changes of surface elemental composition in atomic ratios relative to Al as its concentration remains constant. As it can be seen, ratios of C, N, and O to the Al increase significantly after DNA-based modification. Furthermore, Na/Al decreases to zero from 0.153, while P/Al increases from zero to 0.042 for d-clay in comparison to the p-clay. The difference of weight losses between d-clay and p-clay also confirms intercalation of DNA within clay layers. As presented in [Fig. 2c](#f2){ref-type="fig"}, p-clay shows a minor weight loss related to de-absorption of moisture before 200 °C and another one after 600 °C, reaching total weight loss of \~8%. TGA thermograms of d-clay and DNA present a similar multi-step degradation and their total weight loss of d-clay and DNA reach \~37% and \~58%, respectively. The effect of intercalation of DNA within clay layer on basal *d*-spacing was investigated using XRD analysis. As shown in [Fig. 2d](#f2){ref-type="fig"}, 2θ° decreases from \~7° for p-clay to \~4.9° for d-clay, corresponding to increasing the *d*-spacing from 1.2 nm for p-clay to 1.9 nm for d-clay. This increment in *d*-spacing of d-clay facilitates monomers penetration within clay layers. However, in comparison to the d-clay, m-clay has higher *d*-spacing which is due to having modifier based long alkyl chains. Organophilicity of clays depends on wetting of modified clay by epoxy resin, which plays a significant role in dispersion quality in the matrix. The process of wetting of clays by epoxy resin consists of three types of wetting including adhesion wetting (*W*~*a*~), immersion wetting (*W*~*i*~), and spreading wetting (*W*~*s*~). The work of dispersion (*W*~*d*~) is the sum of these three aforementioned wetting terms which can be expressed as follows: Wetting and dispersion could be determined by the epoxy surface tension (*γ*~*LV*~) and contact angle between epoxy and nanoclay (θ°). *W*~*a*~, *W*~*i*~, and *W*~*s*~ are spontaneous when θ° \< 90°[@b41][@b42]. Snap shots of epoxy droplet deposited on compacted discs of clay at different times duration (60 and 3600 seconds) are illustrated in [Fig. 3](#f3){ref-type="fig"}. As shown, the angles formed between epoxy droplet and m-clay substrate are higher than that of d-clay. Aktas *et al*.[@b42] declared that the contact angle of epoxy droplet on Cloisite 25 A nanoclay reaches a stable state of \~42° with a decrease of 16% in initial volume of epoxy drop. In comparison, angles formed between epoxy droplet with m-clay and d-clay reached \~69° and \~59°, respectively. However, higher decrease in initial volume of epoxy drop could be seen for both m-clay and d-clay. It is postulated that d-clay shows better affinity towards epoxy droplet. In other words, epoxy droplet could easily be absorbed to d-clay disk. Such phenomenon could be analyzed through volume changes in epoxy droplet observed on the samples. As presented in [Fig. 3](#f3){ref-type="fig"}, a faster decrease in droplet volume with elapsed time proves that the penetration of epoxy droplet to d-clay is much higher than that of for m-clay. In other words, a decrease of \~84% in epoxy volume on d-clay was observed after 3600 s; however, its counterpart, m-clay shows a decrease of \~78% in epoxy volume. It is hypothesized that prompt impregnation of d-clay clusters due to higher wettability may imply a better dispersion quality and makes mechanical stirring and ultrasonication more effective. Moreover, the *W*~*d*~ could prove such observations. The highest *W*~*d*~ was observed for the d-clay. Compared with m-clay, a considerable increase \~27% could be observed for d-clay i.e., *W*~*d*~increases from 132.47 mN/m to 168.52 mN/m after 3600 s. This is arising from functional groups introduced to d-clay, being able to have physico-chemical interactions with epoxy resin, leading to strong repulsive forces to keep particles apart; consequently, the tendency to form agglomeration is supposed to be less in d-clay, compared to m-clay. Interfacial interactions ------------------------ Interfacial interactions between d-clay and m-clay with epoxy resin play a pivotal role in formation of different structures of epoxy-clay nanocomposites e.g., exfoliated/intercalated structures, which were studied by DSC and rheological analysis. [Figure 4a](#f4){ref-type="fig"} depicts DSC thermograms of un-cured epoxy resin suspension containing various clays. As it can be seen, no curing reaction occurs during a dynamic heating of pure EP suspension and its nano-suspensions containing m-clays without hardener as evidenced by its thermogram which does not show any exothermic peak up to 150 °C, revealing that m-clays cannot have any effective interactions with the epoxy resin in this temperature range[@b43][@b44]. However, addition of 2.5 and 5 wt% d-clay in epoxy suspensions cause an exothermic peak to appear before 100 °C with enthalpies of −12.3 and −19.7 J/g, respectively. It is proposed that hydrogen phosphate groups intercalated between d-clay layers can react with the penetrated epoxy monomers into d-clay layers through ring opening of epoxide groups, schematically presented in [Fig. 4d](#f4){ref-type="fig"}. These intra-gallery reactions could also facilitate diffusion of more epoxy monomers within the clay layers and are also responsible to expand the clay layers, inducing formation of exfoliated structures, before the extra-gallery reactions have been conducted by curing of the nanocomposites. The interfacial interactions arising from these intra-gallery reactions were also explored by studying the changes of rheological behaviour of nano-suspensions. In this regard, viscosity and shear stress versus shear rate flow curves for nano-suspensions containing various clays are illustrated in [Fig. 4b and c](#f4){ref-type="fig"}, respectively. The rheology behaviors of samples were analyzed by Herschel--Bulkley's model according to the following equations: Where is the shear rate (s^−1^), *τ* and *τ*~*c*~ are, respectively, the shear stress and yield stress. The *K* and *n* are the flow consistency index and the flow index, respectively. Flow index determines the flow behavior. In other words, *n* \< 1 for shear thinning behavior and *n* \> 1 for shear thickening behavior could be observed in the nano-suspensions. The Herschel--Bulkley's model parameters were calculated and presented in [Table 2](#t2){ref-type="table"}. Epoxy nanocomposites containing 2.5 and 5%wt of d-clay and m-clay are named as EP-D2.5 and EP-D5, and EP-M2.5 and EP-M5, respectively. As illustrated in [Fig. 4b and c](#f4){ref-type="fig"} and presented in [Table 2](#t2){ref-type="table"}, it is argued that addition of d-clay not only could increase the viscosity of epoxy resin but also promote shear-thinning behavior, steaming from interfacial interactions due to the intra-gallery reactions. In other words, compared with m-clay, DNA as a reactive modifier could physico-chemically involve and entangle with the epoxy chains, leading to a higher viscosity which could induce yield stresses in nano-suspensions. Compared with nanosuspensions containing 2.5 wt% m-clay, an increase of \~19 Pa in τ~c~ is observed for suspensions reinforced with the same content of d-clay. Another extra reason behind such trend could be related to the temporary formation of hydrogen bonding between hydroxyl resulting in initial resistance toward shear stress with functional groups of DNA carbohydrates. Such phenomenon is more obvious at high contents of d-clay. To put it differently, compared with nanosuspension filled with 5 wt% m-clay, the addition of the same content of d-clay to epoxy shows an increase of \~23 Pa in τ~c~. It could be deduced that role of DNA as reactive modifier in increment of viscosity as well as *τ*~c~ would be more effective in higher contents because interfacial interactions lead to decrease the possibility of agglomeration formation, which causes more d-clay to be involved in formation of network. Moreover, the same increasing trend is observed for flow consistency, whereas a decreasing trend could be detected for flow index. As viscosity behavior of the nano-suspensions also depends on nanoclay dispersion levels into epoxy matrix, another prerequisite condition for viscosity discussion is the relation of dispersion level with flow index. As discussed in literatures[@b45][@b46], it was investigated that lower values of the flow index imply higher levels of uniform dispersion of nanoclay into polymer matrix. Therefore, compared with m-clay, d-clay is prone to be more-uniformly dispersed in epoxy system. It is assumed that dispersion of d-clays into epoxy suspensions could lead to delaminated structures by increasing the d-spacing of d-clay layers, resulting from intra-gallery reactions. Therefore, it is postulated that each individual platelet could efficiently restrict the mobility of epoxy chains, on the one hand, and promote shear thinning behavior, on the other hand. As presented in [Table 2](#t2){ref-type="table"}, the lowest values of *n* e.g., 0.76 and 0.72 are observed for the nano-suspensions containing 2.5 and 5 wt% d-clay, respectively, whereas dispersion of m-clays into epoxy resin could not induce the same shear-thinning performance. In other words, higher shear-thinning could be only seen when clay is modified with DNA based modifier. It is argued that although modification of clay with DNA could increase viscosity of nano-suspensions, we subscribe to the view that a significant decrease in the entanglement density of epoxy molecules could be obtained. It could imply that aligned d-clay could act like slippery agents, schematically presented in [Fig. 4e](#f4){ref-type="fig"}. This phenomenon is in agreement with the observation reported in the literatures[@b47][@b48]. As clay concentration increases, the viscosity of epoxy resin increases, which is mostly accompanied by inducing heterogeneity in the system. Such heterogeneity is arising from agglomerations and micro-voids formed in epoxy resin while processing[@b49]. It is worth to consider that increasing the m-clay content into epoxy suspension from 2.5 wt% to 5 wt% makes the intercalation/exfoliation more and more difficult. As a result, the weakest shear-thinning tendency could be seen for nano-suspension containing 5 wt% m-clay. This means that it leads to a low alignment of clay layers, which causes nanosuspension to resist more against higher shear rates. Nanocomposites structure ------------------------ In order to verify the hypothetical considerations discussed in DSC and rheological analyses, nano/micro-structures of epoxy nanocomposites containing d-clay were examined by XRD and TEM analysis. [Figure 5](#f5){ref-type="fig"} demonstrates XRD patterns of pure EP and epoxy nanocomposites containing d-clays. As shown, there is no peak in the XRD pattern of pure EP in the 2θ° of 2°--10°, showing an amorphous structure for epoxy matrix. Therefore, if a XRD peak appears in this region for the nanocomposites, it should be related to the clay structure and its basal *d*-spacing in the nanocomposite. As can be seen for EP-D2.5 sample, this nanocomposite system shows no peak in its XRD pattern, demonstrating that initial *d*-spacing of dry d-clay which was \~1.9 nm, is completely expanded so that its 2θ° becomes \<2° (equaled to *d*-spacing of \>4.4 nm). This finding reveals the present of exfoliated structures in this nanocomposite. In contrast, EP-D5 system has an obvious XRD peak reflection in 2θ° = 3.1° which implies formation of the induced intercalated clay structures into epoxy nanocomposite at higher d-clay content with a basal *d*-spacing of \~2.8 nm. Details of nanocomposites structure were investigated by TEM observations as illustrated in [Fig. 6](#f6){ref-type="fig"}. As depicted in [Fig. 6a and d](#f6){ref-type="fig"}, the dark lines in these figures are related to the silicate nanolayers and the light sections are related to epoxy matrix. It was mentioned that penetrated epoxy monomers within semi-separated clays treated by DNA modifier, could enhance clay layers separation through intra-gallery reactions and consequently such phenomenon induce some semi-stacked clays to be partially exfoliated, as it can be seen from TEM of EP-D2.5 nanocomposite ([Fig. 6b](#f6){ref-type="fig"}). Furthermore, the intercalated structures could also be observed for this nanocomposite. It is argued that incorporation of higher contents of clay could merely result in interacted structures. As shown in [Fig. 6e](#f6){ref-type="fig"}, three individual intercalated ordered structures so-called "intercalated tactoids", could be detected for EP-D5 nanocomposite. However, compared with the EP-D5, EP-D2.5 possesses thin tactoids containing only a few clay layers. These small tactoids are uniformly and randomly dispersed in the epoxy resin, demonstrating that the clay modification based DNA is an effective approach to enhance both the exfoliation and dispersion of clay. In addition to such argument associated with dispersion, as reported in literatures[@b50][@b51][@b52], under an effective load, most of microcracks are initiated within the intra-layer of semi-stacked clay rather than at epoxy-clay interfacial region. This phenomenon proves that higher contents of d-clay, e.g., 5 wt%, could result in lower reinforcing trend in tensile strength mentioned in mechanical section. In other words, in comparison with low d-clay content ([Fig. 6c](#f6){ref-type="fig"}) which contains individual layers of clay, high content of d-clay ([Fig. 6f](#f6){ref-type="fig"}) could result in flocculated structures. As shown in [Fig. 6c](#f6){ref-type="fig"}, an exfoliated configuration having individual layers was formed, further confirming by absence of a reflection peak in XRD pattern of EP-D2.5. Moreover, although phase-separated clay tactoid structures is observable in [Fig. 6f](#f6){ref-type="fig"}, such morphology implies that tendency of d-clay to agglomeration at high content outweighs complete delamination of clay layers due to low penetration of epoxy monomers into stacked layers of modified clay[@b53]. To conclude, more homogenous distribution, alongside well dispersion, could be observed for EP-D2.5, in comparison with EP-D5. Mechanical and thermo-mechanical performance -------------------------------------------- The mechanical properties of epoxy nanocomposites containing various concentrations of m-clay and d-clay are shown in [Fig. 7a and b](#f7){ref-type="fig"}. As it can be seen, the addition of m-clay has not improved the tensile strengths of epoxy matrix significantly and in fact the addition of 2.5 wt% of m-clay to epoxy resin (EP-M2.5) resulted in only \~5% increase in tensile strength, compared to pure EP. While, addition of 5 wt% of m-clay to epoxy matrix (EP-M5) not only did not increase the tensile strength but also led to a \~9% decrease. However, the inclusions of 2.5 and 5 wt% of d-clay in epoxy resin (EP-D2.5 and EP-D5) resulted in \~20% and \~8% increase in tensile strength of epoxy composites, respectively. This could be due to the improved dispersion of nanoclay as well as stronger filler-matrix physico-chemical interactions achieved through DNA modification of nanoclay. These interactions not only improve the epoxy monomer diffusion through faster intra-gallery reaction but also react and entangle with epoxy chains. This reinforcing mechanism will lead to the promoted strengths in epoxy nanocomposites. On the contrary, as evidenced by DSC and rheological analysis presented earlier, m-clays do not interact effectively and covalently with epoxy resin compared to d-clays. When it comes to moduli, it is argued that the moduli of nanocomposites could be improved by adding either m-clay or d-clay. It means that although interfacial adhesion could enhance nanocomposite properties, moduli are mostly controlled by some factors such as: (i) high aspect ratio of a single clay platelet, (ii) higher stiffness of fillers, and (iii) restriction of polymer chain mobility[@b11][@b19]. As illustrated in [Fig. 7a](#f7){ref-type="fig"}, it is worthy to mention that nanocomposites containing d-clay still show higher moduli than those containing m-clay. This is possibly arising from higher exfoliation degree of d-clay in epoxy matrix, resulting in higher stress-transferring and shear deformation mechanism. Mostly, fracture toughness and critical strain energy release rate of epoxy systems reinforced with nanoclay have been improved through various mechanisms such as pull-out, bridging effect, and interface debonding being observed in morphology section[@b50]. Compared with EP-M systems, EP-D systems exhibit higher toughness which is due to the fact that d-clay layers, adhering perfectly to epoxy resin through covalent bonding, are capable of carrying and transferring the highest amount of stress applied to matrix, resulting in higher absorbent of fracture energy. As presented in [Fig. 7b](#f7){ref-type="fig"}, fracture toughness of EP-D2.5 and EP-D5 increased by \~56% and \~66%, respectively, compared to the EP. Whereas, the inclusion of the 2.5 and 5 wt% of m-clay could lead to \~23 and \~30% increases in fracture toughness. The same trend could be also observed for critical strain energy release rate. According to earlier observations made by Miyagawa *et al*.[@b54] and Le Pluart *et al*.[@b55], it has been hypothesized that higher intercalation degree of nanoclay might deflect crack more efficiently than exfoliated platelets due to the vulnerability to fracture. This leads to higher fracture toughness of EP-D5 in comparison to EP-D2.5, as TEM and XRD results of EP-D5 showed higher intercalation degree of d-clay into epoxy matrix compared to the EP-D2.5. Therefore, such enhancements confirm reinforcing potential of d-clay in high-performance epoxy nanocomposites, providing better stress-transfer. For comparison, Zaman *et al*.[@b11] reported that the addition of 2.5 wt% of clay treated by various reactive modifiers with different chains length having free amine-end groups result in \~36%, \~18%, and \~8% decrease in tensile strengths and \~21%, \~44%, and \~58% increases in fracture toughness of epoxy nanocomposites. It is believed that the length of surfactant molecule and its ability to react with matrix could affect mechanical properties. According to Wang *et al*.[@b27], using a green approach in preparation of nanocomposites, the highest improvement of \~22% in tensile strength could be achieved for the epoxy systems reinforced with 1 wt% of Cloisite30B. [Figure 7c](#f7){ref-type="fig"} illustrates the DMTA plots of storage modulus (*E*') versus temperature for various epoxy systems. Moreover, as presented in [Fig. 7d](#f7){ref-type="fig"}, the tan*δ*, which is the ratio of the loss modulus to the storage modulus, gives insight into polymer chains movement in relation with the strength of the epoxy system. From temperature corresponding to the maximum value of tan*δ*, glass transition temperature (*T*~g~) can be obtained. Moreover, crosslink density of the epoxy systems could be evaluated using following equation[@b56][@b57][@b58]: Where *v*~e~ is the estimation of crosslink density, and *R* is the universal gas constant. *E*~r~ is storage modulus corresponding to the *T*~r~ where *T*~r~ is *T*~g~ + 30, and *E*~g~ is also defined as storage modulus corresponding to the *T*~g~−30. As it can be seen from [Fig. 7c](#f7){ref-type="fig"} and data presented in [Table 3](#t3){ref-type="table"}, addition of 2.5%wt clay regardless of its modification increases storage modulus at *T* \< *T*~g~ which is glassy region of epoxy system. However, the storage modulus of EP-M2.5 system become lower than that of the EP at *T* \> *T*~g~. In other words, the EP has higher storage modulus at its rubbery region in comparison to EP-M2.5. This is because of the formation of plasticity effect on epoxy matrix at the interface with m-clay, leading to a reduction in ability of load transfer from matrix to the m-clay, causing lower *T*~g~ of EP-M2.5 in comparison to the EP[@b17]. As presented, *T*~g~ of the EP decreases from 172 °C to 169 °C when incorporating m-clay into epoxy matrix, which is in agreement with other reports[@b22][@b59][@b60]. In contrast, storage modulus of EP-D2.5 is higher that of both pure EP and EP-M2.5 in both glassy and rubbery regions at all temperatures. However, this higher storage modulus is more conspicuous at glassy region, in comparison to the rubbery region. The *T*~g~ of EP-D2.5 shows 6 °C and 9 °C increases, respectively compared to the pure EP and EP-M2.5. These increments not only do denote that no plasticity effect at interface of d-clay with epoxy is present, but also show that d-clay can establish a strong interface with epoxy, leading to the restriction of segmental chains motion. Moreover, the EP-D2.5 shows 0.35 mmol/m^3^ increment in the crosslink density while a significant reduction was observed for the crosslink density of EP-M2.5, compared to the EP system. This means that delaminated/exfoliated d-clay layers provide a higher surface available to be encountered with epoxy matrix, being able to have chemical bondings with the matrix, whereas a high crosslink density at interface of m-clay with epoxy matrix is effectively hindered by inducing the plasticity effect. [Figure 8](#f8){ref-type="fig"} shows fracture surfaces of the EP and its various nanocomposites. Although surface morphology of the PE is mostly smooth, it is possible to observe some approximately large fracture surfaces, as shown in [Fig. 8a](#f8){ref-type="fig"}. On the contrary, when m-clay and d-clay are added into epoxy matrix, the crack propagates through matrix tortuously resulting in smaller fracture plates ([Fig. 8b--e](#f8){ref-type="fig"}). This type of fracture is arising from crack deviation while applying load[@b61]. Moreover, compared with EP-M systems, the effect of d-clay incorporated into epoxy matrix (EP-D systems) on crack growth resistance via different mechanisms such as crack arrest, birding effect, and pull-out is more tangible ([Fig. 8d](#f8){ref-type="fig"}). This phenomenon could be explained by effective interfacial interactions and homogenous dispersion, achieved by DNA modified clay. On the other hand, as m-clay does not have an effective adhesion to matrix as discussed above, the rejected m-clays from epoxy matrix are simply observable. Such occurrence causes reduction of mechanical performance, as discussed in pervious sections. Another consideration related to these reinforced epoxy composites is related to the poor levels of dispersion and micro-void formation at higher contents of nanoclay. In other words, the addition of higher contents of clay (e.g., 5 wt%) could result in agglomeration formation, causing lower filler/epoxy surface interactions. Although EP-D5 system possesses a few inevitable agglomerations, its morphology exhibits mostly disorderly congested d-clay ([Fig. 8e](#f8){ref-type="fig"}). This means that it is highly likely that DNA modification could cause clay not only to be well-separated but also to be presented at least in congested forms instead of agglomerations. At higher loading of d-clay, it is hypothesized that they are prone to get closer. This could possibly lead to the formation of accumulation of intercalated clay instead of highly exfoliated one. Generally, as crack encounters nanoclay platelet, different scenarios can be assumed due to the micron-sized lateral dimension. The crack could bypass nanoclay platelets either by breaking them or pulling them out from matrix, as illustrated in [Fig. 8d](#f8){ref-type="fig"}. In both conditions, the crack energy will be dissipated[@b62]. Therefore, when nanoclay is modified, the matrix could hold it tightly and restrict it from being easily pulled out. As a result, compared with m-clay, d-clay possessing strong interfacial bonding with matrix consumes crack propagation energy more and more. Another point related to taking advantage of DNA modified clay is that the possibility of interlayer delamination of clay under mechanical loading could decrease. In other words, the intercalated clay with enough *d*-spacing could lead to epoxy monomer diffusion. As epoxy monomer is diffused, elastic force applied by epoxy molecules cross-linking inside the clay galleries leads to exfoliation of clay layers i.e. swelling of clay galleries occurs[@b49][@b63]. Additionally, the ability of DNA modifier to react with epoxy through chemical bonding keeps clay layers to be firmly embedded within the matrix while load is applied. This will result in a more effective stress-transfer mechanism[@b64]. In contrast, despite the fact that epoxy monomer can also diffuse into stacked m-clay layers due to its initial *d*-spacing resulting from long alkyl chain quaternary ammoniums, its interactions with epoxy molecules still remains as weak as van der Waals forces, which can act like flaws in composites causing their premature failures and delamination, under mechanical loadings. Moreover, the higher chance of formation of agglomerates in m-clay could intensify such devastating effects and as such the properties of such composites will be similar to the micro-particle filled composites[@b49]. Thermal and flammability performance ------------------------------------ We have investigated the effect of DNA as clay modifier and natural flame retardant on the thermal properties of epoxy-clay nanocomposites. In order to have a comprehensive evaluation, thermal performance of nanocomposites was examined by TGA and cone calorimetry to compare the thermo-oxidative degradation and flammability properties. [Figure S2](#S1){ref-type="supplementary-material"} and [Fig. 9a](#f9){ref-type="fig"} show TGA thermograms of various epoxy nanocomposites at different heating rates under the air flow and the results are presented in [Table S1](#S1){ref-type="supplementary-material"} and [Table 4](#t4){ref-type="table"}. As it can be seen, thermo-oxidative behaviour of epoxy nanocomposites shows a multi-step degradation consisting of two main steps. Herein, we considered various parameters including *T*~i~ and *T*~max~ (temperatures corresponding to 5% weight loss and maximum degradation rate for each step, respectively), char yield at 850 °C, and total activation energy required for thermo-oxidative degradation (*E*~1~ + *E*~2~ = *E*~total~), in evaluation of thermal properties using TGA analysis. Activation energy for each degradation step was calculated using Kissinger method[@b65], as it is independent of any presumption on the degradation mechanism according to the following equation: Where *β* is heating rate, and *C* is constant. By plotting vs and fitting a straight line, the *E* value can be obtained using the slope, which their plots are presented in [Fig. 9b](#f9){ref-type="fig"}. As expected, addition of 2.5%wt clay regardless of its modifier type enhances all thermal characteristics of epoxy matrix. Regarding the effect of DNA modifier on the thermal properties, 16 °C, 6 °C, and 19 °C increases in *T*~i~, *T*~max,1~, and *T*~max,2~ are observed, respectively, for nanocomposite incorporated with 2.5 wt% d-clay when compared to that incorporated with 2.5 wt% m-clay. As shown in [Table 4](#t4){ref-type="table"}, char yield of the EP after thermo-oxidative process at 850 °C is insignificant (0.75%). The char yield increased upon incorporation of clay and the increase was more profound for EP-D2.5, compared to EP/M2.5. Moreover, *E*~total~ of EP-D2.5 is \~172 kJ/mol which is \~10 kJ/mol higher than that of the EP-M2.5. These TGA results show a significant additional thermal stability effect on epoxy nanocomposites containing d-clay, resulting from DNA intercalated within clay layers. Combustion behaviours of samples were also examined by cone calorimetry as a useful tool in evaluating the flame retardancy performance under a forced-flaming combustion. [Figure 9c and d](#f9){ref-type="fig"} display plots of heat release rate (HRR) and total heat release (THR) versus time, respectively. Using these plots, various parameters including THR, peak of heat release rate (PHRR), and time of reaching peak of heat release rate (*t*~PHRR~) were extracted and summarized in [Table 4](#t4){ref-type="table"}. The results demonstrate that pure EP exhibits a high PHRR of 1542 kW/m^2^. The PHRR value of EP-M2.5 is 1298 kW/m^2^ which is only 224 kW/m^2^ lower than that of pure sample. While d-clay exhibits a notable flame retardant effect on epoxy system and the addition of 2.5%wt d-clay into the epoxy matrix results in a 322 kW/m^2^ reduction in PHRR. Moreover, *t*~PHRR~ of pure EP increases from 71 s to 87 s and 96 s for the EP-M2.5 and EP-D2.5, respectively. This shows that EP/D2.5 requires 9 s longer to reach its PHRR, in comparison to EP/M2.5. The mechanism behind this observation stems from intrinsically flame retardancy of DNA modifier, possessing phosphate groups which can act as a barrier in formation of char. Moreover, DNA can release ammoniac and carbon dioxide gas under heating conditions and reduce flammability of the system[@b33]. It was also observed that THRs of both nanocomposites show significant differences in comparison to the pure EP. However, THR of EP-D2.5 is \~4000 kJ/m^2^ lower than that of the EP-M2.5. These remarkable reductions in PHRR and *t*~PHRR~ values of EP-D2.5 could also result from the insulation barrier effect of a cohesive and compact char layers on postponing the oxygen diffusion and the escape of volatile decomposition compounds produced during the combustion[@b2][@b66]. This fact was further investigated by SEM observations on the char residues structures. As illustrated in [Fig. 10](#f10){ref-type="fig"}, the char residues of the pure EP show a rickety surface having wide cracks. Although EP-M2.5 surface exhibits lower cracks in comparison to pure EP, it still has an incompact surface. On the other hand, EP-D2.5 shows a dense and fully compacted surface morphology without any cracks on its surface, leading to the lower efficiency of heat and volatiles transfer due to the obstructing effect, and consequently providing underlying epoxy matrix with an effective barrier[@b67]. Fire propagation was simply evaluated through the keeping a flame near the samples, which their photographs are presented in [Fig. 10](#f10){ref-type="fig"}. As it can be clearly seen, the fire quickly propagates across the pure EP sample; while it encounters a delay for the nanocomposites. Moreover, an obvious slower fire propagation are observed for the EP-D2.5 in comparison to the EP-M2.5, confirming an additional fire resistivity effect of DNA-modified clay on flammability of epoxy polymer. We have compared the PHRR and THR values as well as mechanical performance of the epoxy-clay nanocomposite containing 2.5 wt% d-clay with the published reports in literatures in which epoxy nanocomposites contain both low and high nanofiller loadings. As shown in [Table S2](#S1){ref-type="supplementary-material"}, a considerable low amount of d-clay can bring about acceptable figures in terms of improvements in both mechanical and flammability properties. This is while in other published reports mostly high loadings of nanofiller has led to only improvements in flammability performance. Such deduction can be proved by comparing our results with results reported in literature. According to the data presented in [Table S2](#S1){ref-type="supplementary-material"}, two different trends can be observed for comparison. The first trend is dealing with the case when the amount of nanofiller is approximately as same as the amount of d-clay e.g. 2.5 wt%. In this condition, the reported decrements in PHRR and THR are significantly lower than that of d-clay we are reporting herein. Considering the second trend, it can be said that more decreases in PHRR and THR can be seen for epoxy nanocomposites containing high amount of nano fillers which are usually destructive in terms of mechanical performance. In other words, at high nanofiller loadings, low mechanical performances are expected to be observed in various mechanical properties including tensile strength, tensile modulus, and fracture toughness. Mostly, the reduction in mechanical properties is attributed to poor dispersion and weak interfacial adhesion. However, in this study, through DNA modification, the aim is to improve mechanical performance and provide clay with reinforcing features through chemical interactions. The study presented here, demonstrates a balance between mechanical and flame properties. In other words, compared to other modified clays presented in current literatures, a small loading of DNA modified clay shows a great potential to enhance flame retardancy of epoxy composites while improving its mechanical performance. Moreover, in order to evaluate the contribution of DNA in overall flame retardency of the epoxy systems, PHRR, THR, and *t*~PHRR~ values of epoxy composites containing neat clay, neat fish DNA were also obtained and their results are presented in [Table S3](#S1){ref-type="supplementary-material"}. As it can be seen, addition of 2.5 wt% neat clay to epoxy (EP-N2.5 sample) can lead to insignificant decreases of \~4.6% and \~8.5% in PHRR and THR, respectively. Whereas the addition of the same amount of m-clay (EP-M2.5 sample) results in \~15.8% and \~25.7% reduction in PHRR and THR, respectively. Moreover, the PHRR and THP decrease by \~20.8% and \~31.2% for the epoxy nanocomposite containing 2.5 wt% d-clay (EP-D2.5) which demonstrates the highest flammability improvement in epoxy resin studied herein. This reveals the improved dispersion and barrier effect of clay as a result of DNA modification. In addition to this, two different amounts of neat DNA powder (0.2 and 2.5 wt%) are solely incorporated into the epoxy matrix to evaluate the effect of DNA agent on the flammability properties. It is worth to mention that 0.2 wt% DNA was calculated as maximum amount of DNA grafted within clay layers which obtained at pH = 2, as discussed in [Fig. S1](#S1){ref-type="supplementary-material"}. Therefore, 0.2 wt% DNA was incorporated into epoxy matrix to compare with other epoxy systems. The results of flammability study of these samples show that the reduction in PHRR and THR are slightly lower than that of EP-M2.5 composite because the amount of DNA (0.2%) was much lower than that of m-clay (2.5 wt%). However, when the same amount of neat DNA powder (2.5 wt%) was used to produce the epoxy composite (EP**-**DNA2.5 sample), the highest improvement in both PHRR and THR were observed which are \~60.3% and \~51.1% decreases in PHRR and THR, respectively. This clearly confirms that DNA is an effective agent for improvement of flame retardency of epoxy polymer systems. Nonetheless, despite the role of DNA in improving the flammability performance of clay-epoxy nanocomposites, DNA to a great extent is incompatible and unprocessable with epoxy resin only which extremely hinder fabrication of epoxy-DNA composites with appropriate mechanical performance. Therefore, to take advantages of DNA performance, it should be grafted on a proper platform such as clay prior to incorporating into epoxy to provide composites with both improved mechanical and flame properties. In other words, both DNA and clay are set to cooperate with each other considerably through various mechanisms: (i) DNA can contribute to uniform clay dispersion as well as clay-matrix interactions leading to greater mechanical and flame properties, (ii) DNA agent can yield further improvement in flame properties via its functional groups having phosphorous and nitrogen, (iii) the reduction in mechanical properties which may be caused by DNA agent can be compensated by well dispersed clay. As a result, both flame and mechanical properties can be enhanced. Conclusions =========== Waste DNA from fishing industry has a great potential for recovery and re-use as a source of flame retardant materials in nanocomposites while improving strength. Herein, for the first time we have shown that fish DNA can be used in modification of clay nanomaterials for preparation of epoxy nanocomposites with significantly improved mechanical and flammability properties. Based on the results obtained in this study, the following detailed conclusions can be drawn for the proposed application:The results of epoxy droplet contact angle revealed \~44% increase in work of dispersion which is a critical factor in determination of epoxy resin compatibility and reactivity, and \~17% further decrease in penetration of epoxy droplet into DNA modified (d-clay), both in comparison to a commercially modified clay e.g., Nanomer I.28E.The dispersion levels of d-clay into epoxy matrix studied by XRD and TEM analyses confirmed the outstanding role of DNA as a modifier and its remarkable influence on the well dispersed structures including intercalated/exfoliated structures arising from intra-gallery polymerization.The rheological behaviours of epoxy-clay nanosuspensions, as another evidence for dispersion and interaction, proved the possibility of interactions between d-clay and epoxy monomers leading to formation of a network, which possesses high viscosity level and being resistance to shear rates. It was concluded that d-clay attached to epoxy chains could act as slippery agents to promote shear thinning behaviour.Inclusion of d-clay into epoxy resin led to a significant improvement in tensile strengths, moduli and fracture toughness compared to composites containing m-clay. This phenomenon results from improved clay-matrix interfacial adhesion, better dispersion and more effective role of d-clay in consumption of crack energy through various mechanisms such as crack arresting, deviation, and pull out procedures as confirmed by SEM micrographs. Observation of \~3% increase in *T*~g~ of epoxy/d-clay system versus \~1% decrease for epoxy/m-clay system, both compared to pure epoxy system, demonstrates that plasticity effect of nano-clays on *T*~g~ of epoxy nanocomposite was eliminated as a result of the effective interfacial interactions.Contribution of DNA molecules to the considerable improvement of thermal stability and fire resistancy of epoxy-clay systems was approved by TGA and cone calorimetry results. This improvement is as a result of the formation of condensed char layers during combustion due to the release of effective suppressant agents during the decomposition of DNA structures. Methods ======= Materials --------- Epoxy resin (diglycidyl ether of bisphenol A, D.E.R 332) and diethylenetriamine as curing agent were obtained from Sigma-Aldrich and used as received. The used pristine clay was sodium montmorillonite and the organoclay was a commercial product under the name of Nanomer I.28E, which were supplied by Nanocor Co., USA. DNA powder from herring sperm was supplied from Sigma-Aldrich and stored at below 8 °C. All the solvents used in this study were of analytical grade. Intercalation of DNA within clay layers (d-clay) ------------------------------------------------ To intercalate the DNA structures into clay layers, as-received DNA (2.00 gr) was dispersed into 200 ml DI water by stirring for 1 h, followed by adding 1.0 M HCl aqueous solution to adjust the pH to 2, 3, 4, and 5. The resultant solutions were stirred for further 3 h at 60 °C. In a separate beaker, pristine clay (2.00 g) was dispersed into 200 ml boiling water and stirred for 2 h before sonicated for 1 h in an ultrasonic bath. The dissolved and pH adjusted DNA solutions were added to the clay/DI water suspension and further stirred for 6 h to allow for the complete cation exchange process. The final mixtures were then filtered and washed several times with abundant DI water until no chloride detected by adding 0.1 N AgNO~3~ solution. The obtained DNA-modified clays (d-clays) at various pHs were then vacuum dried at 60 °C prior to use. By measuring differences between initial pristine clay weight with various d-clays weight, amount of intercalated DNA at each pH can be calculated, which is presented in [Fig. S1](#S1){ref-type="supplementary-material"}. It is found that the highest intercalation of DNA on pristine clay occurs at pH = 2. Epoxy-clay nanocomposites preparation ------------------------------------- To take the full advantage of solvent properties in increasing the layers spacing in clay, fabrication of polymer nanocomposites were conducted according to the "slurry-compounding" process[@b22], but with major modifications to simplify it and to assure that the clay concentration does not change during the process. As illustrated in [Fig. 11](#f11){ref-type="fig"}, in a typical experiment, 1.00 g d-clay obtained at pH = 2 or Nanomer I.28E (m-clay) were dispersed in 100 ml acetone and stirred for 2 h, followed by sonication using an ultrasonic bath for 1 h to form a fine slurry before pouring the slurry into a high-pressure vessel and heating up to 100 °C for 12 h. This process facilitates the penetration of acetone between clay layers. After cooling to room temperature, proper amounts of epoxy resin were added to the clay/acetone slurry and stirred at 70 °C for 6 h. The mixture then was sonicated, for 30 min using a Hielscher UIP1000-230 ultrasonic processor operating at a frequency of 15 kHz to generate ultrasonic waves with an amplitude of 80 μm peak-to-peak through the epoxy suspensions with an ultrasonic pulsing cycle of 2 s on and 2 s off, being kept in an ice bath. To completely remove the acetone, the epoxy mixtures were subjected to the vacuum at 60 °C for 24 h. Then, a stoichiometric amount of hardener was added to the compositions before applying the vacuum for 30 min to degasify the bubbles produced during mixing the hardener. The total mixtures were poured into a mould and finally the curing process was conducted at 70 °C for 6 h, followed at 120 °C for 2 h. A pure epoxy sample was also prepared using the same condition and considered as control sample and named pure EP sample. Epoxy nanocomposites containing 2.5 and 5%wt of d-clay and m-clay were named EP-D2.5 and EP-D5, and EP-M2.5 and EP-M5, respectively. For flammability comparisons, the epoxy systems containing 2.5% and 0.2% neat DNA powder as well as 2.5% neat clay were also prepared using the above-mentioned procedure, named EP-DNA2.5, EP-DNA0.2%, and EP-N2.5%, respectively. Characterizations ----------------- FT-IR spectra were recorded with KBr pellets containing the samples on a FTIR spectrophotometer of Bruker Optics. X-ray photoelectron spectroscopy (XPS) analysis was performed using an AXIS Nova spectrometer (Kratos Analytical Inc., Manchester, UK) with a monochromated Al K~α~ source at a power of 180 W (15 kV × 12 mA) and a hemispherical analyser operating in the fixed analyser transmission mode. Survey spectra were acquired at a pass energy of 160 eV. The atomic concentrations of the detected elements were calculated using integral peak intensities and the sensitivity factors supplied by the manufacturer. XRD patterns were obtained using a PANalytical X'Pert Pro Diffractometer with Cu K*α* radiation (λ = 1.54184 Å), operated in 2°--10° (2*ϑ°*) at 45 kV and 30 mA with a step size of 0.033. The spreading of an epoxy droplet on compacted discs of clay, provided with a compaction pressure of 20 MPa, was analysed using KSV Model CAM101 Contact Angle Meter (KSV Instruments Ltd, Finland) equipped with an Olympus DP70 high resolution microscope at ambient temperature. A 4 μL droplet of epoxy was poured onto compacted discs with diameter and thickness of 13 mm and 4 mm, respectively; and the amount of epoxy droplet penetrated to each clay substrate was evaluated by digital image analyser. DSC analyses were performed using a TA Q200 DSC instrument in high purity nitrogen atmosphere. The samples were heated up to 150 °C at the heating rate of 10 °C/min. From the exotherms obtained, the heat of reaction and the peak temperature were determined. Rheological evaluations were carried out using a TA DHR 3 rheometer with cone--plate geometry. A cone with a diameter of 40 mm and a tilt angle of 2° were utilized, and gap width was fixed to be 49 μm. The range of shear rate, used in this experiment, was chosen to be between 0--1000 1/s. The nanosuspensions were located between the cone and plate and soaked for five minutes. Dynamic mechanical properties of the epoxy-clay nanocomposites were examined using a TA Instruments Q800 in the cantilever bending mode. The instrument was calibrated before use and the samples were prepared according to ASTM E1640 before being mounted on a single cantilever clamp. The DMA analysis were carried out from 25 °C to 250 °C at a heating rate of 2 °C/min and the frequency value of 1 Hz. TGA tests of various modified clay were carried out using a Perkin--Elmer TGA instrument at the heating rate of 10 °C/min under a steady nitrogen flow of 60 ml/min. While, TGA analyses of polymer nanocomposites were operated at various heating rates under an air flow of 100 ml/min. Flammability of the polymer nanocomposites were examined by cone calorimeter (Fire Testing Technology, UK) and measurements were performed at an incident heat flux of 35 kW/m^2^, according to the ISO5660 standard. The fracture surfaces of tensile samples were examined using a scanning electron microscope (SEM) operated at 25 kV. The fracture surfaces were gold-coated prior to microscopy observations. Transmission electron microscope (TEM) samples with specimens of approximately 80 nm in thickness were prepared using a Leica Ultracut UCT ultramicrotome at room temperature. Microtomed sections were imaged by a Philips TEM at 300 kV in bright field mode. Tensile tests were performed on dog-bone samples according to ASTM D638 Type I by using an Instron universal testing machine; cross-head speed 5 mm/min with a 30 kN load cell. Moreover, according to ASTM D 5045, fracture toughness was measured using the compact tension specimen (see [Fig. S3](#S1){ref-type="supplementary-material"}) with dimensions of 48 mm × 48 mm width × 10 mm at 10 mm/min. An instantly propagating crack was designed for each specimen by tapping a razor blade to the samples because as mentioned in literature[@b11] it is the most economical approach to create a satisfactory sharp crack. To obtain statistically meaningful results, the tensile properties and fracture toughness of at least five specimens for each case were averaged and reported. Fracture toughness properties were shown as mode-l stress intensity factor (K~1C~) and critical strain energy release rate (G~1C~) according to following equations: And Where *P*~Q~, *B, W, a, E*, and *ν* are the maximum load, the thickness, the width, crack length, Young's modulus, and Poisson's ratio, respectively. According to literatures, Poisson's ratio is considered 0.35 for DER 332 epoxy resin[@b68]. Additional Information ====================== **How to cite this article**: Zabihi, O. *et al*. Fish DNA-modified clays: Towards highly flame retardant polymer nanocomposite with improved interfacial and mechanical performance. *Sci. Rep.* **6**, 38194; doi: 10.1038/srep38194 (2016). **Publisher\'s note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary Material {#S1} ====================== ###### Supplementary Information Deakin University Postgraduate Research Scholarship (DUPRS) awarded to the first author is acknowledged. **Author Contributions** The study was conceived and designed by O.Z. and M.N. Experiments were conducted by O.Z. Data was analyzed by O.Z. and M.A. with the support of M.N. and H.K. O.Z. wrote the first draft of manuscript and all the authors reviewed and revised the manuscript to its final form. Entire study was carried out under the supervision of M.N. ![An ideal DNA structure and the chemical procedure to intercalate DNA within the clay and its solubility profiles.](srep38194-f1){#f1} ![FTIR spectrums (**a**), XPS survey spectrum (**b**), TGA analysis (**c**), and XRD patterns (**d**) of the various samples.](srep38194-f2){#f2} ![Evaluation of geometric shapes of epoxy droplet deposited on m-clay (**a**,**b**) and d-clay (**c**,**d**) at two different times, and their calculated work of dispersion and volumes.](srep38194-f3){#f3} ![DSC thermograms (**a**), viscosity (**b**) and stress (**c**) versus shear rate for various un-cured epoxy suspensions; possible intra-gallery reactions in d-clay, and schematic presentation of shear-thinning behaviour of epoxy suspensions of containing d-clay.](srep38194-f4){#f4} ![XRD patterns of pure EP and its nanocomposites.](srep38194-f5){#f5} ![TEM micrographs of EP-D2.5 (**a**--**c**), and EP-D5 (**d**--**f**) nanocomposites.](srep38194-f6){#f6} ![Tensile (**a**) and fracture toughness properties (**b**), and storage modulus (**c**) and tan δ (**d**) vs temperature for pure EP and its various epoxy nanocomposites.](srep38194-f7){#f7} ![Fracture surfaces of pure EP (**a**), EP-M2.5 (**b**), EP-M5 (**c**), EP-D2.5 (**d**), and EP-D5 (**e**) nanocomposites.](srep38194-f8){#f8} ![TGA thermograms (**a**), Kissinger plots for thermo-oxidative degradation (**b**), HRR vs time (**c**), and THR vs time (**d**) for the pure EP (i), EP-M2.5 (ii), and EP-D2.5 (iii) systems.](srep38194-f9){#f9} ![SEM images of char residues after cone calorimetry tests, and flame test photographs in the 10th second for the various samples.](srep38194-f10){#f10} ![Schematic showing the dispersion of clay in the epoxy matrix via the simplified "slurry-compounding" process.](srep38194-f11){#f11} ###### Surface elemental composition of the p-clay and d-clay in atomic ratios relative to aluminium taken as a unique elemental marker for clay structure. Samples Al/Al C/Al O/Al N/Al P/Al Na/Al --------- ------- ------- ------- ------- ------- ------- p-clay 1.000 1.632 8.884 0.108 0.000 0.153 d-clay 1.000 1.854 9.605 0.474 0.042 0.000 ###### Herschel--Bulkley's model parameters obtained from rheology behavior of various nano-suspensions. Suspension Yield stress τ~c~ (Pa) Flow consistency *K* (Pa.s^n^) Flow index *n* ------------ ------------------------ -------------------------------- ---------------- Pure EP 0 1.81 0.92 EP-M2.5 6.52 5.35 0.83 EP-M5 9.47 10.63 0.87 EP-D2.5 25.22 11.14 0.76 EP-D5 33.02 35.82 0.72 ###### Results of DMTA analyses for cured epoxy systems. Sample EP EP-M2.5 EP-D2.5 -------------------- ------ --------- --------- *T*~g~ (°C) 172 169 178 *E*~r~ (MPa) 99 80 120 *E*~*g*~ (GPa) 1.43 1.81 1.92 *v*~e~ (mmol/m^3^) 1.96 1.61 2.31 ###### Thermal characteristics of various nanocomposites obtained by TGA and cone calorimetry analyses. System *T*~i~ (°C) *T*~max,1~ (°C) *T*~max,2~ (^o^C) %Char yield at 850 °C *E*~total~ (kJ/mol) PHRR (kW/m^2^) *t*~PHRR~ (s) THR (MJ/m^2^) ------------ ------------- ----------------- ------------------- ----------------------- --------------------- ---------------- --------------- --------------- Pure epoxy 283 320 468 0.75 110.9 1542 71 76.2 EP-M2.5 299 339 572 9.2 162.2 1298 87 56.6 EP-D2.5 315 345 591 13.3 172.4 1220 96 52.4
2024-05-09T01:26:36.242652
https://example.com/article/7102
Q: Converging uniformly on compacta - equivalent condition Let $f$ and $f_n$, $n = 1, 2, 3, \dots$, be defined on an open set $\Omega \subset \mathbb{C}$. We'll say $f_n \to f$ uniformly on compacta if $f_n \to f$ uniformly on $K$ whenever $K$ is a compact subset of $\Omega$. Question: Is it correct that the above condition is equivalent to the following condition (which at first glance seems a little weaker). If $K$ is compact, and $K \subset B_r$ where $B_r \subset \Omega$ is an open disk, then $f_n \to f$ uniformly on $K$. I think it should be. To show the second implies the first: Cover $K$ (in the first condition) with discs which when doubled in radius are contained in $\Omega$, use compactness, look at the closure of the discs, use the second condition to get uniform convergence on the closed disks, then use the fact that $K$ is contained in the union of finitely many of them. A: Yes, that is right, as is your argument for it. If a sequence converges uniformly on all sets belonging to a family $\mathscr{F}$ of subsets of $\Omega$, then it converges uniformly on all sets that are subsets of finite unions of members of $\mathscr{F}$. Thus, for example, compact convergence and locally uniform convergence coincide on locally compact spaces.
2024-06-01T01:26:36.242652
https://example.com/article/7610
eLoom and Flatland: specification, simulation and visualization engines for the study of arbitrary hierarchical neural architectures. eLoom is an open source graph simulation software tool, developed at the University of New Mexico (UNM), that enables users to specify and simulate neural network models. Its specification language and libraries enables users to construct and simulate arbitrary, potentially hierarchical network structures on serial and parallel processing systems. In addition, eLoom is integrated with UNM's Flatland, an open source virtual environments development tool to provide real-time visualizations of the network structure and activity. Visualization is a useful method for understanding both learning and computation in artificial neural networks. Through 3D animated pictorially representations of the state and flow of information in the network, a better understanding of network functionality is achieved. ART-1, LAPART-II, MLP, and SOM neural networks are presented to illustrate eLoom and Flatland's capabilities.
2023-08-09T01:26:36.242652
https://example.com/article/1751
<template> <h-dataset-visualization :query="query"> <v-col v-if="haswrite" cols="12" sm="12" md="6" lg="6" xl="4"> <v-card> <v-card-title>Insert</v-card-title> <v-card-text> <insert :object="object"></insert> </v-card-text> </v-card> </v-col> </h-dataset-visualization> </template> <script> import Insert from "./insert.vue"; export default { components: { Insert, }, props: { object: Object, }, data: () => ({ defaultQuery: { i1: -1000 }, query: [], }), computed: { haswrite() { let access = this.object.access.split(" "); return ( this.object.meta.schema.type !== undefined && (access.includes("*") || access.includes("write")) ); }, }, watch: { "$route.query": function(n, o) { if (Object.keys(n).length == 0) { this.$router.replace({ query: this.defaultQuery }); } else { this.query = [ { ...n, timeseries: this.object.id, }, ]; } }, object(n, o) { if (n.id != o.id) { this.query = { ...this.query, timeseries: n.id, }; } }, }, created() { // If no query, use default if (Object.keys(this.$route.query).length == 0) { this.$router.replace({ query: this.defaultQuery }); } else { this.query = [ { ...this.$route.query, timeseries: this.object.id, }, ]; } }, }; </script>
2024-07-22T01:26:36.242652
https://example.com/article/7244
Benefits Target higher-order thinking skills. Curriculum Pathways encourages students to explore, experiment and learn by manipulating information, variables and graphs using a variety of tools, simulations, models and examples. The environment fosters both active and collaborative learning that challenges students to connect ideas and become critical thinkers. Take a learner-centered approach. Structured and guided processes help students of varying abilities better understand concepts and develop skills. Hyperlinked explanations, animations, glossaries and rollover definitions help students grasp ideas, while motivating them to apply and evaluate what they learn. Present math concepts in a clear, concise and engaging manner. The Algebra 1 course emphasizes mathematical reasoning, rigor and balance using real-world examples, images, animations, videos and targeted feedback. Students are encouraged to reason, problem solve, communicate and identify connections among multiple representations. This course takes a balanced approach to the three essential elements of rigor – conceptual understanding, procedural skill and fluency, and application of key concepts – as recommended by the lead writers of the Common Core State Standards for Mathematics. Integrate content and technology into the classroom – at no cost to educators. Use formative and summative assessments. All lessons have measurable outcomes, requiring students to apply, evaluate or synthesize information. Interactive tools provide multiple means of final assessment – building formative assessment into the learning process, or tailoring outcomes to meet student needs. Online activities and resources can be accessed repeatedly in preparation for summative assessments, such as end-of-course tests. Draw from a variety of instructional strategies. Curriculum Pathways provides simulations and learning activities that incorporate real data so that students can experience and understand real-world applications. Students can test a hypothesis and validate conclusions, construct their understanding using interactive websites, apply learning in other contexts and bring external learning into the classroom. Partnerships Curriculum Pathways is integrated with some of the world’s leading learning management systems, giving thousands of students and educators access to more than 1,250 interactive online curriculum resources at no cost. You can access Curriculum Pathways directly through the following learning management systems and digital content solutions:
2024-01-15T01:26:36.242652
https://example.com/article/5458
But when it came to protecting his own investments from global warming’s effects, Trump canned the screaming capital letters and jokes. Instead, Trump wants to curtail climate change with a wall. The Trump International Golf Links Ireland, a golf course by the sea in Ireland’s County Clare, faces the Atlantic’s pounding waves and coastal erosion. As Politico reported Monday, the Trump Organization has submitted a permit to build a sea wall, which cites rising sea levels from climate change as a threat. Not just any wall will do — one plan called for a limestone barricade 20 meters wide, what Friends of the Irish Environment’s Tony Lowes described to CNBC as a “monster sea wall” in March. AD AD As part of the approval process to build the sea wall, Trump International Golf Links filed an environmental-impact statement. It includes specific concern for erosion, beyond one governmental study that did not take into account sea-level rise from climate change, according to Politico. “If the predictions of an increase in sea level rise as a result of global warming prove correct, however, it is likely that there will be a corresponding increase in coastal erosion rates not just in Doughmore Bay but around much of the coastline of Ireland,” the application notes. “In our view, it could reasonably be expected that the rate of sea level rise might become twice of that presently occurring.” Environmentalists pounced on the apparent self-contradiction. Former congressman Bob Inglis, a Republican from South Carolina who supports conservative efforts to mitigate global warming, told Politico that the dissonance between Trump’s public stance and his business practice is “diabolical.” AD AD “Donald Trump clearly cares more about the fate of his golf courses than the health of the millions of families already affected by the climate crisis,” said Adam Beitman of the Sierra Club to the Associated Press. Republicans, according to a recent New York Times report, may be concerned about Trump’s lack of a clear stance regarding climate change, at least beyond the denials or jokes in his Twitter feed. “I think there is concern about where he stands because he hasn’t come out strongly one way or another,” one anonymous aide told the Times.
2023-12-21T01:26:36.242652
https://example.com/article/2438
//TEST_DISABLED:CROSS_COMPILE: -profile ps_5_0 -entry main -target spirv-assembly // Note: disabled pending IR-based translation of the `Sample()` // operation for Vulkan. Texture2D t; SamplerState s; float4 main(float2 uv) : SV_Target { float4 result = 0; $for(i in Range(0,5)) { result += t.Sample(s, uv, int2(i - 2, 0)); } return result; }
2024-01-30T01:26:36.242652
https://example.com/article/2868
Pricing Formula for Jewelry Pieces Editor’s Note: Pricing jewelry pieces is one of the most challenging things jewelry designers must do. Price a piece too low and you may not cover your costs. Price it too high and no one may ever buy it. In this new occasional series, we ask jewelers to identify a piece they made and break down how they arrived at the final price. Jeweler Jo Haemer breaks down her Pricing Formula for Jewelry Pieces The necklace was commissioned by a private collector of our work. She had seen the chalcedony flowers laid out on Tim’s bench with a rough sketch a year or so ago and had admired them. When she recently stopped in to pick up a repair and order earrings for her stepdaughter, she asked if we had done anything with them. Tim took the hint, finishing the layout and sourcing the additional stones needed to complete the piece. Ganoksin is sponsored by Gemstones Tim purchased the carved chalcedony flowers about two years ago. They cost $260 in all. For this piece, he marked them up 2.5 to $650. We normally double our costs, but we added another half percent because we knew that we got them for a bargain. We try to factor in replacement costs of materials regardless of what they initially cost us. We’ve had some of the sapphires for so long that we couldn’t replace them for what we paid for them, so we charged current prices. The sapphires are 2 ctw, and, after consulting with a local colored stone supplier on current prices, we charged $550 per carat. The diamonds are 0.57 ctw, and we charged $1,300 per carat, which is keystone our cost. Metal The 18k white gold for the flowers and the chalcedony settings weighed 18 dwts. For metals, we charge keystone of our cost at that day’s price. For this piece, we charged $120 per dwt. Ganoksin is sponsored by In addition to the 18k, we purchased an 18k white gold wheat chain for $425, and charged $850. Labor The labor charge was $2,950, which included all of the labor. We did not charge a design fee because we had cart blanche on the design, so Tim made up the design as he went. Normally we charge $75 per hour for both design and bench labor for gold. For platinum, we charge $100 per hour because it is more labor intensive. Total Price: $8,450 In association with The award-winning Journal is published monthly by MJSA, the trade association for professional jewelry makers, designers, and related suppliers. It offers design ideas, fabrication and production techniques, bench tips, business and marketing insights, and trend and technology updates—the information crucial for business success. "More than other publications, MJSA Journal is oriented toward people like me: those trying to earn a living by designing and making jewelry," says Jim Binnion of James Binnion Metal Arts.
2023-08-28T01:26:36.242652
https://example.com/article/2222
[A case report of dolichoectasia of the anterior cerebral artery]. Dolichoectasia of the intracranial arteries is a rare condition, and the vertebrobasilar system and the internal carotid artery is most commonly involved. We describe a rare case of a 60-year-old man with dolichoectasia of the anterior cerebral artery (ACA). The patient presented with continuous vertigo and nausea. CT and MR imaging showed a prominent serpentine structure with calcification and flow void in the region of the interhemispheric fissure, findings which were suspicious for arteriovenous malformation (AVM) or fistula (AVF). A cerebral angiogram demonstrated an extensive dilatation of the ACA above the level of the anterior communicating artery. There was no evidence of AVM or AVF. Although SPECT study revealed a decrease of cerebral blood flow (CBF) in the right frontal lobe, cerebrovascular reserve, as demonstrated by acetazolamide challenge was sufficient for maintenance. Decrease of CBF may have resulted from diaschisis or selective neural cell elimination by old cerebral infarction. The patient was treated with an anti-platelet agent conservatively and the symptoms gradually improved. Cerebral angiography may be needed for definitive diagnosis because cerebral dolichoectasia may mimic CT and MR imaging findings of AVF or AVM. Cerebral hemodynamics must be examined strictly in addition to demonstrating vascular disease by angiography, and SPECT study may play a role in the detection of hemodynamic change induced by dolichoectasia.
2024-01-18T01:26:36.242652
https://example.com/article/7113
Q: Form submitting even though it's encased in an if statement, and condition is not met? I've got an entire validation code bound to $('#post-button').click. The idea is, the variable e_exit is set to true, then the data within the form goes through a series of checks. If it meets the condition of any if statement, a message is displayed with the issue, and e_exit is set to false. Except the problem is, that it isn't done properly, as the form is still submitted (like a quarter of a second after the message is displayed). I'm dealing with boolean values here, so typecasting certainly can't be the issue, I really don't understand what's going on: $('#post-button').click( function() { var e_exit = true; var notif_message = '<div class="notification red"><div class="cross"></div>'; var name = $('input[name=name]').val(); var url = $('input[name=url]').val(); var urlrgx = /(http|ftp|https):\/\/[\w\-_]+(\.[\w\-_]+)+([\w\-\.,@?^=%&amp;:/~\+#]*[\w\-\@?^=%&amp;/~\+#])?/i; var urltst = urlrgx.test(url); if(name == '' || name == 'Enter a name for this offer') { $('#notification').html(notif_message + "You need to enter a name for this offer name. Try to pick something that you'll easily remember when seen again.</div>"); e_exit = false; } if(!urltst) { $('#notification').html(notif_message + "You need to enter a valid offer url prefixed with http:// for this offer.</div>"); e_exit = false; } var rotation_select_val = parseInt($('select[name=r_id]').val()); if(rotation_select_val != 0) { var min_val = isNaN($('input[name=r_min]').val()); var max_val = isNaN($('input[name=r_max]').val()); if(min_val || max_val) { $('#notification').html(notif_message + "You need to enter a numeric value for your rotation's min and max hits for this offer.</div>"); e_exit = false; } } var geo_select_val = $('select[name=g_country\\[1\\]]').val(); if(geo_select_val != 0) { var geo_url_val = $('input[name=g_url\\[1\\]]').val(); var geo_urltst = urlrgx.test(geo_url_val); if(!geo_urltst) { $('#notification').html(notif_message + "You need to enter a valid url prefixed with http:// for your geo-location targets.</div>"); e_exit = false; } } if(e_exit) { $('form').submit(); } }); Any answers as to why this could be happening, or edits with explanations would be of a great help! A: If #post-button is a submit button, you need to return false to stop form submission. A better solution would be to bind to the form's submit event: $("#your-form").submit(function() { // validate... return e_exit; }); This will only allow the form to submit if you return true from the event handler. Edit: Perhaps the ajax plugin is also subscribing to the click event of the post button? In that case, I'd return false and make sure to stop the event propagating further like so: $("#post-button").click(function(ev) { // validation ev.stopPropagation(); return false; });
2024-02-20T01:26:36.242652
https://example.com/article/2013
'\" t .\" Copyright 2006 Sun Microsystems, Inc. All Rights Reserved. .\" DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. .\" .\" This code is free software; you can redistribute it and/or modify it .\" under the terms of the GNU General Public License version 2 only, as .\" published by the Free Software Foundation. .\" .\" This code is distributed in the hope that it will be useful, but WITHOUT .\" ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or .\" FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License .\" version 2 for more details (a copy is included in the LICENSE file that .\" accompanied this code). .\" .\" You should have received a copy of the GNU General Public License version .\" 2 along with this work; if not, write to the Free Software Foundation, .\" Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. .\" .\" Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, .\" CA 95054 USA or visit www.sun.com if you need additional information or .\" have any questions. .\" ` .TH wsgen 1 "2006 年 9 月 4 日" "Java SE 6" "ユーザーコマンド" ." Generated by html2man .LP .SH 名前 wsgen \- JAX\-WS 2.0 ベータ .LP .RS 3 .LP .LP \f2wsgen\fP ツールは、JAX\-WS Web サービスで使用される JAX\-WS ポータブルアーティファクトを生成します。このツールは、サービスエンドポイント実装クラス (SEI) を読み取り、Web サービスの配備と呼び出しに必要なすべてのアーティファクトを生成します。 .LP .RE .SH "形式" .LP .LP .nf \f3 .fl wsgen [options] <SEI> .fl \fP .fi .LP .SH "オプション" .LP .LP 次の表に、\f2wsgen\fP のオプションを示します。 .LP .LP 表 1\-1 wsgen のオプション .LP .LP .sp 1n .TS center; cbp-1 cbp-1 li l . オプション 詳細 _ -classpath <path> 入力クラスファイルの検索場所を指定します -cp <path> T{ -classpath <path> と同じ T} -d <directory> 生成される出力ファイルを格納する場所を指定する -extension T{ ベンダー拡張 (仕様で規定されていない機能) を許可します。拡張を使用すると、アプリケーションの移植性が失われたり、ほかの実装との相互運用が行えなくなる可性があります T} -help T{ ヘルプを表示します T} -keep T{ 生成されたファイルを保持します T} -r <directory> T{ 常に -wsdl オプションと組み合わせて使用します。WSDL などの生成されたリソースファイルの格納場所を指定します T} -s <directory> T{ 生成されるソースファイルを格納する場所を指定する T} -verbose T{ コンパイラが実行している処理に関するメッセージを出力します T} -version T{ バージョン情報を出力します。このオプションを使用した場合、バージョン情報が出力されるだけです。通常の処理は実行されません。 T} -wsdl[:protocol] T{ wsgen はデフォルトでは WSDL ファイルを生成しません。このフラグは省略可能ですが、指定した場合は wsgen が WSDL ファイルを生成するようになります。このフラグは通常、エンドポイントの配備前に開発者が WSDL を参照できるようにするためだけに使用されます。protocol は省略可能であり、wsdl:binding で使用すべきプロトコルを指定するために使用されます。有効なプロトコルは次のとおりで す。 soap1.1 と Xsoap1.2。デフォルトは soap1.1 です。Xsoap1.2 は標準ではないた め、-extension オプションと組み合わせないと使用できません。 T} -servicename <name> T{ 常に -wsdl オプションと組み合わせて使用します。WSDL 内で生成されるべき wsdl:service の名前を指定するために使用します。例 : -servicename "{http://mynamespace/}MyService" T} -portname <name> T{ 常に -wsdl オプションと組み合わせて使用します。WSDL 内で生成されるべき wsdl:port の名 前を指定するために使用します。例 : -portname "{http://mynamespace/}MyPort" T} .TE .if \n-(b.=0 .nr c. \n(.c-\n(d.-57 .LP .SS Ant タスク .LP .LP \f2wsgen\fP ツールには、このツール用の Ant タスクが付属しています。この Ant タスクがサポートする属性や要素を、次に示します。 .LP .nf \f3 .fl .fl <wsgen .fl sei="..." .fl destdir="directory for generated class files" .fl classpath="classpath" | cp="classpath" .fl resourcedestdir="directory for generated resource files such as WSDLs" .fl sourcedestdir="directory for generated source files" .fl keep="true|false" .fl verbose="true|false" .fl genwsdl="true|false" .fl protocol="soap1.1|Xsoap1.2" .fl servicename="..." .fl portname="..."> .fl extension="true|false" .fl <classpath refid="..."/> .fl </wsgen> .fl \fP .fi .LP .LP .TS center; lbp-1 lbp-1 lbp-1 li l l li l li . 属性 説明 コマンド行 _ sei サービスエンドポイント実装クラスの名前 SEI destdir T{ 生成される出力クラスを格納する場所を指定します T} -d classpath 入力クラスファイルの検索場所を指定します -classpath cp -classpath と同じ -cp resourcedestdir T{ 常に -wsdl オプションと組み合わせて使用します。WSDL などの生成されたリソースファイルの格納場所を指定します T} -r sourcedestdir T{ 生成されるソースファイルを格納する場所を指定します T} -s keep 生成されたファイルを保持します -keep verbose T{ コンパイラが実行している処理に関するメッセージを出力します T} -verbose genwsdl T{ WSDL ファイルを生 成すべきかどうかを指定します T} -wsdl protocol T{ genwsdl と組み合わせて使用します。wsdl:binding で使用するプロトコルを指定します。有効な値は「soap1.1」と「Xsoap1.2」で、デフォルトは「soap1.1」です。「Xsoap1.2」は標準ではないため、-extensions オプションと組み合わせないと使用できません T} -wsdl:soap11 servicename T{ genwsdl オプションと組み合わせて使用します。生成される WSDL の wsdl:service の名前を指定するために使用します。例 : servicename="{http://mynamespace/}MyService" T} -servicename portname T{ genwsdl オプションと組み合わせて使用します。生成される WSDL の wsdl:portname の名前を指定するために使用します。例 : portname="{http://mynamespace/}MyPort" T} -servicename extension T{ ベンダー拡張 (仕様で規定されていない機能) を許可します。拡張を使用すると、アプリケーションの移植性が失われたり、ほかの実装との相互運用が行えなくなる可能性があります T} -extension .TE .if \n-(b.=0 .nr c. \n(.c-\n(d.-68 .LP .LP \f2classpath\fP 属性は、 .na \f2Path\-like Structure\fP .fi (http://ant.apache.org/manual/using.html#path) であり、入れ子になった \f2<classpath>\fP 要素を使って設定することもできます。このタスクを使用するには、次の \f2<taskdef>\fP 要素をプロジェクトに追加しておく必要があります。 .LP .nf \f3 .fl <taskdef name="wsgen" classname="com.sun.tools.ws.ant.WsGen"> .fl <classpath path="jaxws.classpath"/> .fl </taskdef> .fl \fP .fi .LP .LP ここで、\f2jaxws.classpath\fP は、JAX\-WS ツールが必要とするクラスのリストを含む、ビルド環境内の別の場所に定義された .na \f2Path\-like Structure\fP .fi (http://ant.apache.org/manual/using.html#path) への参照です。 .LP .SH "例" .LP .LP .nf \f3 .fl <wsgen .fl resourcedestdir="${wsdl.dir}" .fl sei="fromjava.server.AddNumbersImpl"> .fl <classpath refid="compile.classpath"/> .fl </wsgen> .fl \fP .fi .LP .LP
2024-07-21T01:26:36.242652
https://example.com/article/9561
The faster pace of life today can leave very little free time for relaxing, spending quality time with loved ones, or cooking. Consequently, fast food has become the norm for millions of people, though the convenience of these quick bites has a price beyond dollars. Most fast food is highly processed and unhealthy in various ways, thus leading to gut imbalances much more quickly. Too often we’re also rushed to devour our meals quickly so we can get back to the demands of life. Your digestive system is programmed to react aggressively, so when the gas, bloating or stomach pains hit you, they shouldn’t come as a surprise. Your gut is in battle mode, and battles are never pleasant. Multitasking is now the norm. Completing several jobs at once is often required in work environments due to economic pressures and downsizing. Many have said “I’m doing the work of 10 people,” and many are not exaggerating. While technology has streamlined some processes, most overtasked people experience high stress over racing the clock to finish all of that work before they can take a break. Consequently, many people end up eating at their desk while working, which is no break at all. Again, the gut reacts and the dominoes continue to tumble. Like speed-eating, stressful eating is equally harmful to gut health. For many people, quality time at the dining table has become a rarity due of busy schedules, so eating on the run is not uncommon. It’s quite surprising how many people – especially working women with kids – skip breakfast. By the time they do have a meal, whether it be lunch or dinner, they are starving and tend to overeat. People who skip breakfast are also more likely to consume more sugary drinks, processed snack foods and chocolate, looking for an energy boost. The digestive system races back into red alert mode, sending distress signals to the brain. People who eat later at night are forcing their bodies to work when their systems have already begun preparing to rest. Imagine being in bed ready to drift off to sleep, only to be rudely jolted back to full consciousness by a fire alarm. Similarly, your gut is naturally stressed by the incoming-food-after-hours alarm, and is not likely to react well to such an event. Many people rely on caffeine to keep them going throughout the day. On the other end, many people also rely on alcoholic beverages to escape the stresses of the day. Both scenarios can wreak havoc with our nervous and digestive systems, ultimately resulting in an imbalance of the HPA (hypothalamic-pituitary-adrenal) axis. As the HPA axis becomes increasingly compromised, our immune system becomes incrementally compromised, as well. This open the doors to a host of other health problems exacerbated by weakened immunity, including infectious diseases, autoimmune disorders, and even some types of cancer. As conscious humans, we cannot completely eliminate every shred of stress from our lives. However, we can take effective measures to reduce our stress levels to a manageable point, which can bring surprisingly rapid relief from many of the physiological symptoms caused by mental stress. Devote at least 20 minutes daily to a relaxation exercise. Reduce caffeine and alcohol consumption. Resolve personal issues with those causing you upset. Make time for proper meals and quality time with loved ones. Modify your diet to eliminate highly processed food products. Certain herbs, minerals and supplements may help you relieve stress. Amino acids, chamomile, green tea and valerian root, among others, have shown to be helpful in stress reduction. Exercise. Step away from the devices whenever possible. Consider counseling or stress management training. Stomach ache photo available from Shutterstock The Gut-Stress Connection
2024-05-27T01:26:36.242652
https://example.com/article/7002
Synergistic anti-tumor effects between oncolytic vaccinia virus and paclitaxel are mediated by the IFN response and HMGB1. Recent developments in the field of oncolytic or tumor-selective viruses have meant that the clinical applications of these agents are now being considered in more detail. Like most cancer therapies it is likely that they will be used primarily in combination with other therapeutics. Although several reports have shown that oncolytic viruses can synergize with chemotherapies within an infected cancer cell, it would be particularly important to determine whether factors released from infected cells could enhance the action of chemotherapies at a distance. Here, we demonstrate in vitro synergy between oncolytic vaccinia and taxanes. However, we also show, for the first time, that this synergy is at least partly due to the release of factors from the infected cells that are capable of sensitizing surrounding cells to chemotherapy. Several cellular factors were identified as being mediators of this bystander effect, including type I interferon released soon after infection and high-mobility group protein B1 (HMGB1) released after cell death. This represents the first description of these mechanisms for beneficial interactions between viral and traditional tumor therapies. These data may provide a direct basis for the design of clinical trials with agents currently in the clinic, as well as providing insight into the development of next generation viral vectors.
2024-07-05T01:26:36.242652
https://example.com/article/3282
LeBron James and Dwyane Wade: Watch The Throne After years of playing in front of sold-out arenas on their own, two of the greatest talents of our generation chose to join forces last summer. Although the move had a seismic impact on their industry, their debut collaboration—while impressive—left fans and onlookers wanting more. The above statements apply to hip-hop artists Jay-Z and Kanye West, collectively known as "The Throne." But they also apply to LeBron James and Dwyane Wade of the Miami Heat. When James and Wade decided to link up in South Florida last July, the shock wave of their respective announcements reverberated across the entire NBA. With two superstars of their caliber on the same team, it was nearly impossible not to imagine the possibility (or was it probability?) of them collecting title after title, leaving dozens of would-be rulers strewn in their wake. Yet more than a year later, we're still watching the throne, waiting for the Miami Heat to make their ascent to the NBA's monarchy. ********** "We’re just finishing our breakfast, honestly." -- LeBron James, when asked about closing out the Philadelphia 76ers in the first round of the 2011 Eastern Conference Playoffs ********** The above quote is a reference to "Public Service Announcement", a song in which Jay-Z relays a story about how his friend Strick (former playground legend John "Franchise" Strickland) once told him "Dude, finish your breakfast." In both instances, the phrase referred to taking care of business on the basketball court. But while James has done that on several occasions, he still has yet to do so on the game's brightest stage: The NBA Finals. At only 26 years of age, James still has plenty of time to capture that elusive ring. In just eight seasons in the NBA, he has already crafted a Hall of Fame-worthy resume: seven All-Star appearances, five All-NBA First Team nods, two MVP trophies, and a scoring crown for good measure. When all is said and done, James—much like Jay-Z—could have a rightful claim to the mythical "greatest ever" crown. And much like the former hustler from Brooklyn's Marcy Projects, James has often been accused of "mailing it in" at times. It could be said that LeBron’s performance in the 2010 NBA Playoffs was his "Kingdom Come" moment, similar to Jay-Z's disappointing 2006 album of the same name. James’ play against the Celtics during that postseason was so out-of-character, it led Cavaliers' owner Dan Gilbert to later say that James "quit" on the team. Of course, Gilbert made those comments in the aftermath of "The Decision." Gilbert, perhaps more so than the rest of us, is fully aware of what LeBron James is capable of on the basketball court. After being lambasted by fans and media members alike for not being clutch, James closed out the Heat's series with the Celtics and Bulls this postseason with ferocity none of us had ever seen before. But against the Dallas Mavericks, he often deferred to his teammates—behavior not normally befitting a man who proclaimed himself "King James" before he was even drafted into the NBA. Fortunately for James, he had a teammate who was used to performing under the white-hot lights of the world's biggest stage. ********** Class back in session, so I upped it a grade In two years, Dwayne Wayne became Dwyane Wade... -- Kanye West, "The Glory" ********** The Miami Heat's 2006 championship run was Wade's magnum opus, his "My Beautiful Dark Twisted Fantasy", if you will. He had already garnered numerous accolades since arriving in the league in 2003, but by capturing a title three years later, Wade solidified his place among the NBA elite. Just as many critics stated that "Watch The Throne" was a Kanye West album featuring Jay-Z, the 2010-11 Miami Heat were clearly Dwyane Wade's team, with a healthy dose of LeBron James. Like West, Wade is at the top of his craft right now, performing at a level that few (if any) can match in the modern era. Statistically, he was the best player in the Finals, averaging 26.5 PPG, 7.0 RPG and 5.2 APG. And despite James' place in the pantheon of NBA history, it's no secret that Wade has been playing the "big brother" role on the Heat—openly chastising James for not being aggressive enough versus the Mavericks. Wade's 3-plus seasons alongside an aging (but still effective) Shaquille O'Neal gave him a perspective that his running mate didn't have coming into the year; the best player James ever played with in Cleveland was Carlos Boozer, who subsequently left for Utah shortly after LeBron's rookie season. Wade stayed above the fray during Bumpgate, Crygate and the other controversies that followed "The Heatles" throughout the season. But in the playoffs he had an edge about him, a swagger more suited to "The Chosen One." Before Game 5 of the Finals, he (along with James) mocked Dirk Nowitzki's fever/sinus infection, and boasted to the world "we're giving you all some classics", despite the fact that the Mavericks had clearly taken control of the series at that point. Perhaps this was a side of Wade that had been there all along, a bravado that exposed itself once he and James got a chance to run together in The Magic City. After the events of this past June, it will take more than just magic for many fans to warm up to him again. ********** Sorry I’m in pajamas, but I just got off the PJ And last party we had, they shut down Prive Ain't that where the Heat play? [They] hate ballers these days... Ain't that like LeBron James? Ain't that just like D-Wade? -- Jay-Z/Kanye West, "Gotta Have It" ********** Maybe we're all somewhat at fault here. When James decided to take his considerable talents to South Beach, perhaps we expected too much out of them. Of course, the welcoming party/laser show the Heat decided to hold two days later really didn't help matters. Nor did James' infamous proclamation that Miami would win "not one, not two, not three..." titles—an announcement made shortly after the "3 Kings" posed and flexed like bodybuilders in the middle of American Airlines Arena. Three summers earlier, the Boston Celtics put together the blueprint for the "super team," and we saw it work to perfection. Each of the core players on that unit were older than the "Big 3" of the Miami Heat, so why shouldn't we have expected James, Wade and Chris Bosh to run roughshod over the entire NBA? So perhaps it's their fault—maybe they just can't work well together. Wade and James have been alpha dogs ever since they first played organized basketball, and other than international competitions, neither has had to defer to anyone else on the court. As such, they basically had to learn how to operate when the offense didn't flow through them the majority of the time. That said, in their first season together, they came within two wins of capturing the NBA title. What they achieved this past season was impressive by any stretch of the imagination. But for many, it wasn't impressive enough. In sports parlance, the team that won the most recent championship is the one that everyone considers to be the gold standard in their respective league. If heavy is the head that wears the crown, Dirk Nowitzki and the rest of his Dallas teammates are burdened with the expectations that come with defending the Larry O'Brien trophy. Unfortunately, with the uncertainty surrounding the league's labor negotiations, there's no telling when that defense will actually begin. If recent news is any indication, it may be some time before James and Wade will be able to make their next move in the NBA's game of thrones. One thing is for certain, though.
2024-03-19T01:26:36.242652
https://example.com/article/9854
Q: POST method always return 403 Forbidden I have read Django - CSRF verification failed and several questions (and answers) related to django and POST method. One of the best-but-not-working-for-me answer is https://stackoverflow.com/a/4707639/755319 All of the approved answers suggest at least 3 things: Use RequestContext as the third parameter of render_to_response_call Add {% csrf_token %} in every form with POST method Check the MIDDLEWARE_CLASSES in settings.py I've done exactly as suggested, but the error still appeared. I use django 1.3.1 (from ubuntu 12.04 repository) and python 2.7 (default from ubuntu) This is my View: # Create your views here. from django.template import RequestContext from django.http import HttpResponse from django.shortcuts import render_to_response from models import BookModel def index(request): return HttpResponse('Welcome to the library') def search_form(request): return render_to_response('library/search_form.html') def search(request): if request.method=='POST': if 'q' in request.POST: q=request.POST['q'] bookModel = BookModel.objects.filter(title__icontains=q) result = {'books' : bookModel,} return render_to_response('library/search.html', result, context_instance=RequestContext(request)) else: return search_form(request) else: return search_form(request) and this is my template (search_form.html): {% extends "base.html" %} {% block content %} <form action="/library/search/" method="post"> {% csrf_token %} <input type="text" name="q"> <input type="submit" value="Search"> </form> {% endblock %} I've restarted the server, but the 403 forbidden error is still there, telling that CSRF verification failed. I've 2 questions: How to fix this error? Why is it so hard to make a "POST" in django, I mean is there any specific reason to make it so verbose (I come from PHP, and never found such a problem before)? A: I maybe wrong however I found the above solutions rather complex. what worked for me was simply including my csrf token into my post request. $.ajax({ type: "POST", url: "/reports/", data: { csrfmiddlewaretoken: "{{ csrf_token }}", // < here state:"inactive" }, success: function() { alert("pocohuntus") console.log("prototype") } }) A: This answer is for people that may encounter this same problem in the future. The CSRF {{csrf_token}} template tag that is required for forms in Django prevent against Cross Site Request Forgeries. CSRF makes it possible for a malicious site that has been visited by a client's browser to make requests to your own server. Hence the csrf_token provided by django makes it simple for your django server and site to be protected against this type of malicious attack. If your form is not protected by csrf_token, django returns a 403 forbidden page. This is a form of protection for your website especially when the token wasn't left out intentionally. But there are scenarios where a django site would not want to protect its forms using the csrf_token. For instance, I developed a USSD application and a view function is required to receive a POST request from the USSD API. We should note that the POST request was not from a form on the client hence the risk of CSRF impossible, since a malicious site cannot submit requests. The POST request is received when a user dials a USSD code and not when a form is submitted. In other words, there are situations where a function will need to get a POST request and there would not be the need of {{csrf_token}}. Django provides us with a decorator @csrf_exempt. This decorator marks a view as being exempt from the protection ensured by the middleware. from django.views.decorators.csrf import csrf_exempt from django.http import HttpResponse @csrf_exempt def my_view(request): return HttpResponse('Hello world') Django also provides another decorator that performs the same function with {{csrf_token}}, but it doesn't reject incoming request. This decorator is @requires_csrf_token. For instance: @requires_csrf_token def my_view(request): c = {} # ... return render(request, "a_template.html", c) The last decorator that will be mentioned in this post does exactly the same thing as {{csrf_token}} and it is called @csrf_protect. However, the use of this decorator by itself is not best practice because you might forget to add it to your views. For instance: @csrf_protect def my_view(request): c = {} # ... return render(request, "a_template.html", c) Below are some links that will guide and explain better. https://docs.djangoproject.com/en/1.7/ref/contrib/csrf/#module-django.views.decorators.csrf https://docs.djangoproject.com/en/1.7/ref/contrib/csrf/ http://www.squarefree.com/securitytips/web-developers.html#CSRF A: The easiest way to avoid such problems is to use the render shortcut. from django.shortcuts import render # .. your other imports def search_form(request): return render(request, 'library/search_form.html') def search(request): q = request.GET.get('q') results = BookModel.objects.all() if q: results = results.filter(title__icontains=q) return render(request, 'library/search.html', {'result': results})
2024-06-19T01:26:36.242652
https://example.com/article/8121
X-ray imaging is commonly used as a diagnostic tool in dental settings. Traditionally, film was used as the x-ray detector. The film is inserted into the patient's mouth behind the teeth and the outside of the patient's jaw is exposed to a pulse of x-rays. The teeth absorb the x-rays, and hence, create contact images of the teeth on the film which are then used by the dentist to diagnose the state of the teeth. This system had a number of problems that have been overcome to some degree by replacing the film with a digital image sensor. In such systems, a scintillator is used to convert the x-rays to visible light. The light is collimated by a fiber optic bundle, and a CMOS image sensor of substantially the same type as used in digital photography is used to detect the generated light that leaves the collimator. The time and cost of processing the film are substantial in a film-based system. Converting the film images to digital form for storage in a modern record keeping system further increases the cost of such systems both in terms of equipment and operator time. Digital image sensors avoid the film processing and provide a final image that is in a form compatible with digital record storage systems. Determining the correct exposure presents problems with film which are partially solved by the use of digital sensors. The dynamic range of the film is typically less than a factor of 100. That is, the ratio of the highest light level that can be recorded without saturating the film to the lowest level that can be detected is of the order of 100. This dynamic range is sufficient to provide useable images if the exposure is correctly set. However, setting the exposure presents challenges. If too short of an x-ray exposure is used, the image will lack detail in the darker areas. If the x-ray exposure is too high, part of the image will be overexposed and insufficient detail will be present. The correct exposure, in general, depends to some degree on the structure of the patient's face, as the patient's face absorbs part of the x-ray before the x-rays reach the teeth. Digital sensors have substantially higher dynamic ranges than film. Hence, even if the exposure is above or below the optimum level needed to place the image in the linear range of the sensor response function, a useable image can be obtained by digitally processing the image. However, providing an optimal exposure is still advantageous. Digital sensors also require substantially less x-ray exposure to form a usable image. In general, it is advantageous to reduce the x-ray exposure to which the patient is subjected to as low a level as possible. Hence, digital sensors hold the promise of reducing this exposure. However, this promise has only partially been achieved by current digital x-ray systems. In general, the x-ray generating system is independent from the imaging sensor. For example, a dentist who desires to switch from film to a digital sensor, typically uses the dentist's existing x-ray system and merely reduces the exposure to a level that provides satisfactory images. The technician places the digital sensor in the patient's mouth and then triggers the x-ray system to provide a pulse of x-rays that is sufficient to provide the desired image. The digital sensor sends the image to a computer that processes the image and stores the data in the electronic patient information system. Systems in which the digital sensor detects the start of the x-ray pulse and begins its exposure when the pulse is detected have been suggested. Such systems can also end the exposure when sufficient x-rays have been detected by the same sensor mechanism. However, these systems do not have any mechanism for turning off the x-ray generator when there is sufficient data to form an image, and hence, the patient is subjected to additional x-ray exposure that provides no therapeutic benefit. Schemes in which a radiation detector associated with the imaging array measures the x-ray dose during the exposure and then turns off the high-voltage supply to the x-ray generator have also been suggested. These systems require an x-ray generator in which the high-voltage can be controlled by the electronics that monitor the exposure measuring device and/or the imaging system. However, most dental offices utilize x-ray systems that were designed for film-based x-ray imaging and do not provide the remote control system required by such automatic exposure systems. In these legacy systems, the operator initiates an exposure of a predetermined length by pressing a button. To protect the operator from repeated exposures, the button is placed at a remote location relative to the patient and x-ray head. In addition, the electronics that control the x-ray exposure do not present a readily accessible location that can be used to fashion a remote control interface that can be used by automatic exposure control systems.
2024-01-09T01:26:36.242652
https://example.com/article/2712
Friday, January 18, 2008 Ladies, here are three things guys don't want you to know. Ladies, here are three things guys don't want you to know. If all goes according to plan, my daughters nicknames at school will be “girls that wear so much clothes.” I know snowsuits will be hot in Georgia, but as I mentioned before, hopefully they won’t mind. But unless modesty becomes a trend or a really famous Amish girl becomes someone that teenagers learn to emulate, I’m stuck. It’s not going to be easy to raise girls. I get that. I probably deserve that for how stupid I was to the opposite sex when I was young. Here’s the thing though, maybe I can take lessons from my days of foolishness. Maybe I can equip my daughters with the kind of wisdom that can only come from a lifetime of bumps and bruises. It’s doubtful I’ll ever write a book called “The girl’s guide to jerks” but I could definitely at least share three lessons I plan to pass on. Maybe you’re still in college or on the dating scene and can use this. Chances are these will seem really obvious, but if you already know them, I promise you’re miles ahead of some of the girls that I ran into while in college. So here they are: 1. Depth PerceptionA counselor told this idea to a friend of mine and I think it’s solid. Everyone has a handful of things they don’t want to share with strangers. Joys or pains that feel too big to introduce in a casual conversation. Maybe you didn’t get into the college you wanted or you once got fired from a job. Could be that you still suck your thumb, it can be anything. What happens though is that some guys have a handful of things they’ve grown comfortable with over the years. You might have a hard time talking about a family member that died but they don’t. In fact, they’re perfectly fine with it. So what they do is tell you all about it. And you think, “wow, this guy just shared something really personal. I should too.” You open up and make yourself really vulnerable because you think he just did. But he didn’t. He’s creating a depth perception issue. He’s appearing deeper and more honest than he really is. 2. Reverse Psychology Again, super obvious, but you’d still be surprised how often people get trapped by this. In this scenario the guy simply uses reverse psychology to push the girl into doing something she wouldn’t normally do. A guy will say, “You’re such a goody too shoes. It’s so different to be around someone Puritanical.” Rarely does someone want to claim that title. And the guy continues, “You’re not wild. You don’t do crazy things.” Again, the girl hears a challenge and before long, she finds herself saying “I am too, you just don’t know me. I do crazy things!” And then they make out. 3. I’m the opposite. This is for the girls that have a boyfriend/husband. Anytime you express even the smallest bit of dissatisfaction about your boyfriend to another guy, please expect them to reverse the statement. If you say that your boyfriend doesn’t love the color blue and you wish he did, that guy is going to say, “I love blue. I live for blue. I spoke with a doctor about getting my skin turned blue surgically.” If you’re boyfriend hates the movie “Pride and Prejudice,” get ready to meet the world’s biggest Pride and Prejudice fan at work. Not cool, but true. I need to throw out a few disclaimers for this piece:1. This isn’t just something guys do. Girls do it too.2. Girls are smart, this is not about that, it’s about guys being manipulative.3. There are lots of honest guys out there. This is about jerks.4. These are really simple. If you already know them, that’s great.5. I’m sorry that I did anything like this to girls. I was a jerk. I hope that if a guy ever tells one of my daughters that she’s a prude she ends up laughing her way out of the car. Just looking back as she leaves and muttering between big guffaws, “He actually tried to reverse me.” That’s all for now. The party is tomorrow night. If you’re into praying, pray that we’ll all collectively get out of the way and let God do some cool things.
2024-03-26T01:26:36.242652
https://example.com/article/5713
“Both Flesh and Not,” by David Foster Wallace The ferocity with which scholars, writers, fans, and cultural critics explicate the legacy of David Foster Wallace, or even that a legacy is thought to already exist at all, strikes me as a bit absurd, if inevitable. (For a taste of this overload see this great article about the Year of DFW.) Intuitively, the true mark, nature, and worth of a legacy must be evident only in the hindsight of some critical distance. Many of the attempts at explaining the legacy of DFW (Himself would place a footnote here, noting that these attempts must simultaneously shape and create just that legacy; perhaps drawing a subtler, more elegant natural science analogy than the Heisenbergian one that comes to mind) do so without much of the appropriate grist for analysis, i.e., years, the plain ol’ test of time. Since DFW was a heavily prophetic writer, both purposefully and incidentally, we need distance and more experience to fully understand and grasp the import of his prophecies. (As of yet, I have not seen anyone discuss how the golden age of TV has subverted much of the argument of DFW’s seminal essay on TV and irony. Similarly, we rarely discuss how DFW’s obsession with sincerity and genuine emotionality allows many people to confuse sincerity with art or with intelligence. DFW never espoused an undiscerning sincerity, one more obsessed with its own ability to emote than the actual content of the emotions.) I cannot think of any author in recent history who received such an onslaught of attention after their death. In the short five years since his suicide we have seen dizzying arrays of devotion in the form of eulogies, tributes, conferences, collections, academic analysis, more conferences and of course, the steady flow of “unpublished” material—interviews, essays, asides, letters, notes in the margins of self-help books, early poems and juvenilia, lists of his favorite books and authors; really just any scrap of his work has been pounced upon and collected for our edification. As a DFW obsessive, a proud fantod, a subscriber and infrequent contributor to the Wallace listserv, I feel ambivalent about this resurgence in ways that many others have eloquently described, but for me it’s this fierceness bordering on the religious that strikes me as salient, as indicative of something a bit outside of my intellectual reach. In the immediate aftermath of the suicide, especially with the odd Zen koan like layout of the publication of This is Water, many commented on the nascent St. Dave phenomenon, whether in a descriptive or critical manner. They described the way much of the literary community now looked upon DFW as our moral voice and compass, an element of his work magnified and conflated into the driving and central element in his oeuvre. What few spoke about was the structural religiosity in the fandom of DFW extant many years before his suicide. Wallace, like many other begrudging voices of their generation, both fought against this, and yet fostered this through the style and content of his work. When I speak to people about their first encounter with DFW, many (if not most) use quasi-religious and spiritual jargon. We talk about a revelation, or a discovery of something sui generis, wholly new and hard to fathom, a singular voice that both captures the idiosyncrasies of a mind while encapsulating the tensions of a time. DFW rarely elicits tepid reactions and because of that, because of his ability to lower our defenses and dance into the innermost abysses of our personalities, it should come as no surprise that people always treated DFW as a saint, not only in the sense of his morality, but in the way we interact with his works. Fantods, or just plain fans, always looked upon his repertoire the way zealots look upon a the religious canon of a rabbi, priest, imam, or monk: even the smallest utterances in a non-formal context take on importance to the worldview of DFW. We not only knew all of his writings, sometimes by heart, but we knew the legends, the stories, the tradition growing around his personality, his personal life. We gobbled up his interviews as if the sayings of a a founder of a new religion. (Part of what makes The Howling Fantods the most lovable, important website and resource on Wallace is its obsessiveness for all things Wallace. I feel at home there.) Consequently, the ferocity with which many of us now pursue his legacy is but a concretization and enlargement of a more limited phenomenon. Part of the urgency of the legacy pursuit apparently flows from our half-morbid/half-empathetic desire to explain the mystery of DFW’s suicide. We do so not only to mitigate the pain of its occurrence, in a sense to redeem that voice he implanted inside our head, but also because we see his demise as a symptom of our society, our generational illness. Yet, this desire often clouds our ability to think critically of DFW and his work, or at least to think with pretensions to objectivity. David Foster Wallace I take this tangential excursion on the route to reviewing the newest of the posthumously published works of DFW, Both Flesh and Not, because it highlights the sort of absurdity in the idea of the review itself. Writing a review of this book (a book of previously uncollected essays) somewhat necessarily works within this premature structure of the legacy of DFW. Moreover, to see this as a previously uncollected collection of his essays is to give in to another curious and outmoded structure of thought, i.e., the idea that an existence and publication on the internet differs in form from the publication in one book. All of the essays in Both Flesh and Not are well-known and available on the internet, which makes the collection a bit more of a populist effort, but also a bit befuddling in its purpose. The juxtaposition of these essays accomplishes little, and there doesn’t appear to be any order to the essays themselves that illuminate the works. It’s hard to even know what to say about the work itself besides just talking about these essays that have been with us, some for decades. Of course, on their own, they do contain and reveal much about the work and personality of DFW, even as they often come off as shadows of his greater essays. Yet some of them are true throwaways, or at best tantalizingly frustrating in their paucity of analysis. Even in such a staggeringly intelligent essay as “Deciderization 2007 – A special report” the context delimits this essay’s importance. As the introduction to a book of the best essays of 2007, it transcends its immediate purpose and provides a few brilliant scraps about the nature of information consumption in the internet world, but rarely goes deeply into the assertions, rightfully so in its initial context. But here, on it’s own, it feels a bit lacking, wanting. Some of the essays belong to the realm of diehard fans because of their density and esotericism, while others are just limited in scope and relative importance. “Federer Both Flesh and Not,” the opening essay of the book, needs little introduction. Immediately with its initial publication it was received as one of the best and most important sports essay of our generation. The next essay, “Fictional Futures and the Conspicuously Young” (a more prohibitive essay), requires not only a strong literary background but feels time-bound. It also displays a younger DFW with a considerably greater tendency toward douchebaggery. He easily dismisses and belittles large swathes of writers and writing in a somewhat dense academese, a style of which he would later come to deplore. What emerges after reading these essays in succession is an odd conclusion and perhaps redemption of this whole book: DFW emerges as a flawed and human writer. It’s hard to read Infinite Jest and not see as the work of unprecedented and unparallelled talent and genius. These essays not only show DFW as human, but truly as flawed, both as a thinker, writer, and as a person. This comes out acutely in the most challenging essay of the bunch, “The Empty Plenum: David Markson’s Wittgenstein’s Mistress.” The essay initially appeared in an academic journal, hence the esotericism and denseness of the piece, but gained more traction because in DFW’s praise of Markson’s challenging book as some of the best experimental fiction in recent history. He spoke about numerous issues that do in fact contain relevance to a larger understanding of his legacy and though. In the essay, a real doozy that requires hours to mine, DFW gives his longest and largest treatment of the importance of Wittgenstein, an influence from the beginning of his career. For DFW, Wittgenstein fought the greatest intellectual battle of the last generation: the battle against intellectual solipsism. DFW then picked up this battle cry and sought in all of his work to display and expunge solipsism as the only or inevitable result of our thoughts. While a noble and admirable effort, the more I learned about Wittgenstein in school, his actual works and legacy, the more I came to realize how heavily idiosyncratic and even mistaken manner in which DFW conceived of Wittgenstein. In short, DFW creates an uncharacteristically neat narrative in the famously gnomic works of Wittgenstein. Additionally, to see Wittgenstein as fighting first and foremost against solipsism is not only a tenuous assertion, but one that is often undermined by the mountains of secondary analysis that claims something of the exact opposite. Many thinkers and contemporary philosophers see in the works of Wittgenstein the roots and beginnings of a reductive behaviorism, one that limits the complexity of our internal experiences. Regardless of the correctness of either assertion, in this academic essay DFW evinces a sort of academic laziness in discussing Wittgenstein in a vacuum. Yet, these missteps in the larger context of DFW warm my heart and endear me more to this flawed giant of a mind. It’s nice to see that even DFW made literary snafus and developed as a person and a writer. His genius often overshadows his heroic work ethic, his birth pangs as a writer, his youthful arrogance and petulance, and his often myopic scope. Like all real geniuses their mistakes and flaws only put their accomplishments in greater light, and this scattered collection of essays does just that. Joe Winkler is a freelance writer living in the Upper West Side. When not ingesting all things cultural, he attends classes for a Masters in English Literature at City College. To support this extravagant lifestyle, Joe teaches, tutors and babysits, unabashedly. He started writing with a personal blog - noconversationleftbehind.blogspot.com, which allows him to indulge the ramblings of his mind. He began his writing career after he quit a Ph.D. program in Clinical Psychology because he realized that he likes people more in the abstract than in reality. More from this author → Hello Welcome to TheRumpus.net. We don’t say that lightly—we’re thrilled you’re here. At The Rumpus, we’ve got essays, reviews, interviews, advice, music, film and poetry—along with some kick-ass comics. We know how easy it is to find pop culture on the Internet, so we’re here to give you something more challenging, to show you how beautiful things are when you step off the beaten path. The Rumpus is a place where people come to be themselves through their writing, to tell their stories or speak their minds in the most artful and authentic way they know how, and to invite each of you, as readers, commenters or future contributors, to do the same. What we have in common is a passion for fantastic writing that’s brave, passionate and true (and sometimes very, very funny).(more)
2023-08-11T01:26:36.242652
https://example.com/article/6347
The former legal guardians of a teenage rape suspect in eastern Ohio said Tuesday on TODAY that they have not spoken to him about the alleged incident, but support him regardless of what occurred.Greg and Jennifer Agresta, the former legal guardians of 16-year-old suspect Ma’lik Richmond, spoke to Matt Lauer on TODAY Tuesday alongside Richmond’s attorney, Walter Madison. Richmond and fellow Steubenville High School sophomore football player Trent Mays, 16, were charged with raping a 16-year-old girl on the night of Aug. 11 after photos and video from the alleged incident were posted on social media. The trial is set to start next month, and both defendants have pleaded not guilty.
2024-06-22T01:26:36.242652
https://example.com/article/3318
Tote Bags Personalized Tote Bags & Wedding Tote Bags Tote bags are a cute, easy and useful gift your bridesmaids are sure to appreciate. Get matching totes for you and your ladies to use throughout the big day. Everyone will love having a way to carry all of the necessary essentials for looking and feeling great during this special occasion. We even offer free personalization on select designs so you can create a truly unique gift. Looking for more affordable bridesmaid gifts? Ann's has plenty of options for you, from engraved compact mirrors to personalized luggage tags.
2023-08-31T01:26:36.242652
https://example.com/article/1913
Incomplete abortion at the teaching hospital, Blantyre, Malawi. A total of 444 women treated for incomplete abortion using the manual vacuum aspiration technique, at the Queen Elizabeth Central Teaching Hospital, Blantyre, between 10th January and 9th April, 1994, were interviewed by means of partially structured questionnaire, to determine among other things, their socio-demographic profiles, contraceptive behaviour, as well as associated complications. These formed 56.0% of all abortion cases seen in the department during the study period. All abortion formed 68.0% of all the gynaecological admissions, and an abortion delivery ratio of 1:4. The ages of the patients ranged from 15 to 44 years with a mean of 24.4 years. Adolescents formed 21.2% of the total, while those aged 35 years and above formed 8.4%. Only 15.8% of the total were single. Their parities ranged from 0 to 12 with a mean of 2, while number of living children ranged from 0 to 9 with a mean of 1.7. 16.9% of them had had previous abortions, with the highest number of abortion being 6 and a mean of 1.6. 79.9% of the total group were housewives, and 10.6% students. Of their male partners (i.e. people responsible for the index pregnancy), only 4.2% were students and 25.0% of the school girls were involved with fellow school boys. Majority of the rest (56.3%) were involved with more mature self-sustaining males. The gestational ages ranged from 6 weeks to 20 weeks with a mean of 15 weeks.(ABSTRACT TRUNCATED AT 250 WORDS)
2023-12-21T01:26:36.242652
https://example.com/article/9540
Rebecca Sugar’s first show Steven Universe made its UK debut on Cartoon Network in May and is soon to be releasing its second series to an expectant fan base. Until recently Sugar worked as a storyboard artist on Adventure Time before developing Steven as the studio’s first female show creator. The show centers around Steven (loosely based on Sugar’s younger brother, himself also an accomplished background artist working at Cartoon Network) following him as he lives partly in the magical world of the Crystal Gems and partly in the real world setting of Beach City. After inheriting his Gem from his mother Rose Quartz, it is up to Steven and his faithful friends Garnet, Amethyst and Pearl to learn to use its powers to stop evil as well as have a good time. The show brings together the loose line work of Sugar’s own drawing and background in storyboards as well as all the design and boldness of story that we’ve come to expect of Cartoon Network’s contemporary range of shows. This is your first series for cartoon network, how has the experience been for you? It’s been amazing and overwhelming! Making a show has always been my dream and getting to work with the team on the show has been the most amazing part of it. I couldn’t really have predicted who was going to come on board to make this with me, so that has been my favourite bit about the whole experience working with the crew. Your illustrative work and storyboard work is very fluid. What were the challenges of translating that to an animated production? I learned a lot about what does and doesn’t work, there are things that can make a drawing look good and fluid but it’s not really functional. I think that’s what I’ve learned from this experience, learning to make those kind of choices translate into something that can be animated. I definitely have become super aware of how a drawing that is pretty and expressive is going to end up translated into animation, as I have now seen the whole process pan out in front of me as I work on the show, looking over the the board stage and looking at the animation when it comes back. I’ve tried to figure out what I was trying to achieve working in that loose expressive way during storyboarding, and see how I can make the show functionally be like that and work whilst still not being half decisions or fudged decisions; To make something look pretty. I want the thing to be like a meat and potatoes cartoon, one which functions but is also beautiful when it’s meant to be. Given your background in storyboarding could you give our readers any advice on this aspect of production or insight into your own working practice? It’s always different depending on the story, because storyboarding for shows means writing them and drawing them, conceptualising them and thinking hard about what the characters are thinking about. Once you know the technical aspects of it – how to number your poses and how to pose something out so it will animate well- it becomes invisible really quickly and then it’s about really getting in the head of characters and being able to write and draw them in a way that feels like them. Everything is great practice for this, comics were great practice for me as well as acting; We all have to be aware of how everyone’s acting on the boards, how to be convincing, that these characters are going though what there going through. Storyboarding taught me in a technical way about how to explore a character and use the expressiveness of that character, how it’s drawn to explain that story. All the characters on your show are very different, do you have a favourite? Greg is my favourite, Steven’s dad, for a ton of reasons. I think he’s the most interesting character in the show and he’s voiced by my hero Tom Scharpling. I’m a huge fan of the Best Show and it really helped me when I was moving from New York to Los Angeles to do this work, his radio show really helped me to feel tied to my home. So this character is very special to me. It’s so inspiring for me to work with Tom and to flesh him out as a character as he’s the bridge between the world of regular people and magical people and he’s so inspired by The Gems – he’s an artist. He’s very interesting, I really enjoy exploring him as a character. We see more of him as the show progresses. Could you tell us anything about what’s coming up in upcoming season? A lot will happen, one of the themes of the show is that there are things The Gems aren’t really very open with Steven about because he’s a little to young and I tried to design the show so that his coming of age story and his becoming aware of what’s going on with The Gems, why they act the way they act, why they are the way they are. As the ordinance you’re learning that with him. So as the series goes on, things come out in the open that explains why the world is the way it is, why Steven is the way he is and why they (The Gems) are the way they are that really what we explore and what I’m excited about showing, the reasons behind everything. All new episodes of Steven Universe will premiere on Cartoon Network UK this Fall.
2023-10-27T01:26:36.242652
https://example.com/article/7920
If You Uncover Potential Juror Bias, Do You Tell The Court? Yes On the eve of a criminal trial, you decide to Google the names of a few prospective jurors. One appears to have been suspended from the practice of law due to a criminal conviction. The next day at voir dire, however, the potential juror states that her highest level of education is a B.A. in English literature, thereby quelling your concerns that she may be a suspended attorney. During trial, the juror submits a note to the judge, asking for an instruction on “respondeat superior” and raising questions about “vicarious liability.” None of these legal terms were ever mentioned by a lawyer or the presiding judge. What do you do now? This exact scenario presented itself in United States v. Daugerdas, a tax evasion case in which David Parse, a non-lawyer, was charged with conspiring with former Jenkens & Gilchrist PC attorneys in a $7 billion tax fraud scheme. The government tried its case against Parse and his four co-defendants together. After the juror’s note was circulated, Parse’s attorneys recognized the red flag and performed additional Internet research, which revealed that the juror’s address information matched the address on the attorney’s Suspension Order. Still, they did not disclose the connection to the Court, uncertain whether the juror had lied during voir dire. The jury ultimately convicted four of the five defendants, including Parse, of conspiracy and fraud, but acquitted Parse of four of the six counts against him. United States District Judge William H. Pauley III sentenced Parse to 42 months imprisonment, noting that although he “wasn’t a mastermind,” he made the tax scheme possible. After trial, the juror sent a letter to the government attorneys who tried the case complimenting them on an “outstanding job.” The government waited nearly a month to disclose the letter to the Court and opposing counsel. When it did, Parse’s attorneys performed more extensive research, which uncovered that the juror had offered a litany of lies at voir dire and failed to disclose an extensive criminal record and her suspension from the practice of law. Several defendants moved for a new trial based on juror misconduct, including Parse. The Court granted the motion as to all defendants, except Parse, holding that his attorneys knew or should have known of the juror misconduct at issue and thereby waived Parse’s right to challenge the partiality of the jury by failing to bring it to the Court’s attention.Judge Pauley reasoned that, instead of raising the issue, counsel “gambled” with the existing jury and lost. Last week, a panel of the Second Circuit Court of Appeals heard Parse’s appeal and appeared to be appalled by the juror’s behavior. Judge Chester Straub stated that it was the “most egregious a prejudiced-juror situation” he had ever come across, noting that the juror “knowingly committed a fraud on the court[.]” Both Judge Straub and Judge Richard Wesley also recognized that Parse, himself, had no idea about the juror misconduct until after a verdict was rendered. Although the Second Circuit may be poised to grant Parse a new trial, this case serves as a stern warning for trial attorneys. Any issue of potential juror misconduct should be immediately disclosed to the court, even if the source of concern is the result of an Internet search. Moreover, if any question of juror misconduct arises, counsel should diligently pursue any additional information available to ensure that there is no reason for concern. Aside from juror background information, counsel should also be prepared to disclose any problematic social media activity by a juror during trial. Indeed, as noted by the Third Circuit in United States v. Fumo: Not unlike a juror who speaks with friends or family members about a trial before the verdict is returned, a juror who comments about a case on the internet or social media may engender responses that include extraneous information about the case, or attempts to exercise persuasion and influence. If anything, the risk of such prejudicial communication may be greater when a juror comments on a blog or social media website than when she has a discussion about the case in person, given that the universe of individuals who are able to see and respond to a comment on Facebook or a blog is significantly larger. 655 F.3d 288, 305 (3d Cir. 2011). If counsel becomes aware that a juror has posted case-specific information on Facebook or on Twitter, for example, it should be disclosed to the court, so that any potential prejudice can be cabined immediately. As officers of the court, lawyers have a special obligation to protect a court against misconduct that undermines the integrity of the adjudicative process. See Pa. R. of Prof’l Conduct 3.3, cmt. 12 (“Lawyers have a special obligation to protect a tribunal against criminal or fraudulent conduct that undermines the integrity of the adjudicative process . . . .”) Many forms of improper influence upon a tribunal are prohibited by criminal law. Others are specificed in the ABA Model Code of Judicial Conduct, with which an advocate should be familiar. A lawyer is required to avoid contributing to a violation of such provisions.”) Simply put, if you see something, say something. If you decide to look the other way, your client could pay a significant price. Your email address will not be published. Required fields are marked * Comment Name* E-mail* Website Current ye@r * Leave this field empty About the Editor Hayes Hunt concentrates his practice in the representation of individuals, corporations and executives in a wide variety of federal and state criminal law and regulatory enforcement matters as well as complex civil litigation. Hayes is a partner in the firm's Commercial Litigation Department as well as its Criminal Defense and Governmental Investigations Group. Disclaimer This Blog/Website is made available by the lawyer or law firm publisher for educational purposes only as well as to give you general information and a general understanding of the law, not to provide specific legal advice. By using this blog site you understand that there is no attorney client relationship between you and the Blog/Website publisher. The Blog/Website should not be used as a substitute for competent legal advice from a licensed professional attorney in your state.
2024-07-19T01:26:36.242652
https://example.com/article/3704
Sex differences in the nervous system and in behavior are ubiquitous in the animal kingdom. Beyond their basic biological interest, these differences have important implications for understanding the sex bias that characterizes many mental health and neurological disorders. An intriguing but poorly understood component of nervous system sex differences arises through the actions of hormone-independent, cell-intrinsic "neural sex" in shaping characteristics of the nervous system. In preliminary work using the nematode C. elegans, we have identified robust sex differences in olfactory behavior that arise through cell-intrinsic, sex-dependent modification of the function of neurons common to both sexes. Understanding the mechanisms that underlie these sex differences has great potential to shed light on similar phenomena acting in the mammalian CNS. In three Specific Aims, we will (1) identify the precise neural foci that regulate sex differences in olfaction, and characterize sex differences in the development and function of these neurons;(2) use a candidate-gene approach as well as targeted microarray studies to identify sex-regulated genes in the core nervous system and determine their functional significance;and (3) characterize the role of C. elegans members of the conserved DM family of sexual regulators, including dmd-3, in generating sex differences in olfaction. Together, this work takes an innovative approach to illuminating the conserved molecular, genetic and neural mechanisms by which neural sex is coupled to sex differences in the development and function of the nervous system. PUBLIC HEALTH RELEVANCE Using a tiny soil roundworm, we will examine the genetic and cellular regulation of sex differences in the development and function of the nervous system. These studies will identify genes and mechanisms that may have important roles in human mental health and neurological conditions, such as autism, mood disorders and chronic pain syndrome, that preferentially affect one sex over the other.
2024-03-12T01:26:36.242652
https://example.com/article/4181
//===--- Selection.cpp ----------------------------------------------------===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// #include "Selection.h" #include "SourceCode.h" #include "support/Logger.h" #include "support/Trace.h" #include "clang/AST/ASTTypeTraits.h" #include "clang/AST/Decl.h" #include "clang/AST/DeclCXX.h" #include "clang/AST/Expr.h" #include "clang/AST/ExprCXX.h" #include "clang/AST/PrettyPrinter.h" #include "clang/AST/RecursiveASTVisitor.h" #include "clang/AST/TypeLoc.h" #include "clang/Basic/OperatorKinds.h" #include "clang/Basic/SourceLocation.h" #include "clang/Basic/SourceManager.h" #include "clang/Basic/TokenKinds.h" #include "clang/Lex/Lexer.h" #include "clang/Tooling/Syntax/Tokens.h" #include "llvm/ADT/STLExtras.h" #include "llvm/ADT/StringExtras.h" #include "llvm/Support/Casting.h" #include "llvm/Support/raw_ostream.h" #include <algorithm> #include <string> namespace clang { namespace clangd { namespace { using Node = SelectionTree::Node; using ast_type_traits::DynTypedNode; // Measure the fraction of selections that were enabled by recovery AST. void recordMetrics(const SelectionTree &S) { static constexpr trace::Metric SelectionUsedRecovery( "selection_recovery", trace::Metric::Distribution); static constexpr trace::Metric RecoveryType("selection_recovery_type", trace::Metric::Distribution); const auto *Common = S.commonAncestor(); for (const auto *N = Common; N; N = N->Parent) { if (const auto *RE = N->ASTNode.get<RecoveryExpr>()) { SelectionUsedRecovery.record(1); // used recovery ast. RecoveryType.record(RE->isTypeDependent() ? 0 : 1); return; } } if (Common) SelectionUsedRecovery.record(0); // unused. } // An IntervalSet maintains a set of disjoint subranges of an array. // // Initially, it contains the entire array. // [-----------------------------------------------------------] // // When a range is erased(), it will typically split the array in two. // Claim: [--------------------] // after: [----------------] [-------------------] // // erase() returns the segments actually erased. Given the state above: // Claim: [---------------------------------------] // Out: [---------] [------] // After: [-----] [-----------] // // It is used to track (expanded) tokens not yet associated with an AST node. // On traversing an AST node, its token range is erased from the unclaimed set. // The tokens actually removed are associated with that node, and hit-tested // against the selection to determine whether the node is selected. template <typename T> class IntervalSet { public: IntervalSet(llvm::ArrayRef<T> Range) { UnclaimedRanges.insert(Range); } // Removes the elements of Claim from the set, modifying or removing ranges // that overlap it. // Returns the continuous subranges of Claim that were actually removed. llvm::SmallVector<llvm::ArrayRef<T>, 4> erase(llvm::ArrayRef<T> Claim) { llvm::SmallVector<llvm::ArrayRef<T>, 4> Out; if (Claim.empty()) return Out; // General case: // Claim: [-----------------] // UnclaimedRanges: [-A-] [-B-] [-C-] [-D-] [-E-] [-F-] [-G-] // Overlap: ^first ^second // Ranges C and D are fully included. Ranges B and E must be trimmed. auto Overlap = std::make_pair( UnclaimedRanges.lower_bound({Claim.begin(), Claim.begin()}), // C UnclaimedRanges.lower_bound({Claim.end(), Claim.end()})); // F // Rewind to cover B. if (Overlap.first != UnclaimedRanges.begin()) { --Overlap.first; // ...unless B isn't selected at all. if (Overlap.first->end() <= Claim.begin()) ++Overlap.first; } if (Overlap.first == Overlap.second) return Out; // First, copy all overlapping ranges into the output. auto OutFirst = Out.insert(Out.end(), Overlap.first, Overlap.second); // If any of the overlapping ranges were sliced by the claim, split them: // - restrict the returned range to the claimed part // - save the unclaimed part so it can be reinserted llvm::ArrayRef<T> RemainingHead, RemainingTail; if (Claim.begin() > OutFirst->begin()) { RemainingHead = {OutFirst->begin(), Claim.begin()}; *OutFirst = {Claim.begin(), OutFirst->end()}; } if (Claim.end() < Out.back().end()) { RemainingTail = {Claim.end(), Out.back().end()}; Out.back() = {Out.back().begin(), Claim.end()}; } // Erase all the overlapping ranges (invalidating all iterators). UnclaimedRanges.erase(Overlap.first, Overlap.second); // Reinsert ranges that were merely trimmed. if (!RemainingHead.empty()) UnclaimedRanges.insert(RemainingHead); if (!RemainingTail.empty()) UnclaimedRanges.insert(RemainingTail); return Out; } private: using TokenRange = llvm::ArrayRef<T>; struct RangeLess { bool operator()(llvm::ArrayRef<T> L, llvm::ArrayRef<T> R) const { return L.begin() < R.begin(); } }; // Disjoint sorted unclaimed ranges of expanded tokens. std::set<llvm::ArrayRef<T>, RangeLess> UnclaimedRanges; }; // Sentinel value for the selectedness of a node where we've seen no tokens yet. // This resolves to Unselected if no tokens are ever seen. // But Unselected + Complete -> Partial, while NoTokens + Complete --> Complete. // This value is never exposed publicly. constexpr SelectionTree::Selection NoTokens = static_cast<SelectionTree::Selection>( static_cast<unsigned char>(SelectionTree::Complete + 1)); // Nodes start with NoTokens, and then use this function to aggregate the // selectedness as more tokens are found. void update(SelectionTree::Selection &Result, SelectionTree::Selection New) { if (New == NoTokens) return; if (Result == NoTokens) Result = New; else if (Result != New) // Can only be completely selected (or unselected) if all tokens are. Result = SelectionTree::Partial; } // As well as comments, don't count semicolons as real tokens. // They're not properly claimed as expr-statement is missing from the AST. bool shouldIgnore(const syntax::Token &Tok) { return Tok.kind() == tok::comment || Tok.kind() == tok::semi; } // Determine whether 'Target' is the first expansion of the macro // argument whose top-level spelling location is 'SpellingLoc'. bool isFirstExpansion(FileID Target, SourceLocation SpellingLoc, const SourceManager &SM) { SourceLocation Prev = SpellingLoc; while (true) { // If the arg is expanded multiple times, getMacroArgExpandedLocation() // returns the first expansion. SourceLocation Next = SM.getMacroArgExpandedLocation(Prev); // So if we reach the target, target is the first-expansion of the // first-expansion ... if (SM.getFileID(Next) == Target) return true; // Otherwise, if the FileID stops changing, we've reached the innermost // macro expansion, and Target was on a different branch. if (SM.getFileID(Next) == SM.getFileID(Prev)) return false; Prev = Next; } return false; } // SelectionTester can determine whether a range of tokens from the PP-expanded // stream (corresponding to an AST node) is considered selected. // // When the tokens result from macro expansions, the appropriate tokens in the // main file are examined (macro invocation or args). Similarly for #includes. // However, only the first expansion of a given spelled token is considered // selected. // // It tests each token in the range (not just the endpoints) as contiguous // expanded tokens may not have contiguous spellings (with macros). // // Non-token text, and tokens not modeled in the AST (comments, semicolons) // are ignored when determining selectedness. class SelectionTester { public: // The selection is offsets [SelBegin, SelEnd) in SelFile. SelectionTester(const syntax::TokenBuffer &Buf, FileID SelFile, unsigned SelBegin, unsigned SelEnd, const SourceManager &SM) : SelFile(SelFile), SM(SM) { // Find all tokens (partially) selected in the file. auto AllSpelledTokens = Buf.spelledTokens(SelFile); const syntax::Token *SelFirst = llvm::partition_point(AllSpelledTokens, [&](const syntax::Token &Tok) { return SM.getFileOffset(Tok.endLocation()) <= SelBegin; }); const syntax::Token *SelLimit = std::partition_point( SelFirst, AllSpelledTokens.end(), [&](const syntax::Token &Tok) { return SM.getFileOffset(Tok.location()) < SelEnd; }); auto Sel = llvm::makeArrayRef(SelFirst, SelLimit); // Find which of these are preprocessed to nothing and should be ignored. std::vector<bool> PPIgnored(Sel.size(), false); for (const syntax::TokenBuffer::Expansion &X : Buf.expansionsOverlapping(Sel)) { if (X.Expanded.empty()) { for (const syntax::Token &Tok : X.Spelled) { if (&Tok >= SelFirst && &Tok < SelLimit) PPIgnored[&Tok - SelFirst] = true; } } } // Precompute selectedness and offset for selected spelled tokens. for (unsigned I = 0; I < Sel.size(); ++I) { if (shouldIgnore(Sel[I]) || PPIgnored[I]) continue; SpelledTokens.emplace_back(); Tok &S = SpelledTokens.back(); S.Offset = SM.getFileOffset(Sel[I].location()); if (S.Offset >= SelBegin && S.Offset + Sel[I].length() <= SelEnd) S.Selected = SelectionTree::Complete; else S.Selected = SelectionTree::Partial; } } // Test whether a consecutive range of tokens is selected. // The tokens are taken from the expanded token stream. SelectionTree::Selection test(llvm::ArrayRef<syntax::Token> ExpandedTokens) const { if (SpelledTokens.empty()) return NoTokens; SelectionTree::Selection Result = NoTokens; while (!ExpandedTokens.empty()) { // Take consecutive tokens from the same context together for efficiency. FileID FID = SM.getFileID(ExpandedTokens.front().location()); auto Batch = ExpandedTokens.take_while([&](const syntax::Token &T) { return SM.getFileID(T.location()) == FID; }); assert(!Batch.empty()); ExpandedTokens = ExpandedTokens.drop_front(Batch.size()); update(Result, testChunk(FID, Batch)); } return Result; } // Cheap check whether any of the tokens in R might be selected. // If it returns false, test() will return NoTokens or Unselected. // If it returns true, test() may return any value. bool mayHit(SourceRange R) const { if (SpelledTokens.empty()) return false; auto B = SM.getDecomposedLoc(R.getBegin()); auto E = SM.getDecomposedLoc(R.getEnd()); if (B.first == SelFile && E.first == SelFile) if (E.second < SpelledTokens.front().Offset || B.second > SpelledTokens.back().Offset) return false; return true; } private: // Hit-test a consecutive range of tokens from a single file ID. SelectionTree::Selection testChunk(FileID FID, llvm::ArrayRef<syntax::Token> Batch) const { assert(!Batch.empty()); SourceLocation StartLoc = Batch.front().location(); // There are several possible categories of FileID depending on how the // preprocessor was used to generate these tokens: // main file, #included file, macro args, macro bodies. // We need to identify the main-file tokens that represent Batch, and // determine whether we want to exclusively claim them. Regular tokens // represent one AST construct, but a macro invocation can represent many. // Handle tokens written directly in the main file. if (FID == SelFile) { return testTokenRange(SM.getFileOffset(Batch.front().location()), SM.getFileOffset(Batch.back().location())); } // Handle tokens in another file #included into the main file. // Check if the #include is selected, but don't claim it exclusively. if (StartLoc.isFileID()) { for (SourceLocation Loc = Batch.front().location(); Loc.isValid(); Loc = SM.getIncludeLoc(SM.getFileID(Loc))) { if (SM.getFileID(Loc) == SelFile) // FIXME: use whole #include directive, not just the filename string. return testToken(SM.getFileOffset(Loc)); } return NoTokens; } assert(StartLoc.isMacroID()); // Handle tokens that were passed as a macro argument. SourceLocation ArgStart = SM.getTopMacroCallerLoc(StartLoc); if (SM.getFileID(ArgStart) == SelFile) { if (isFirstExpansion(FID, ArgStart, SM)) { SourceLocation ArgEnd = SM.getTopMacroCallerLoc(Batch.back().location()); return testTokenRange(SM.getFileOffset(ArgStart), SM.getFileOffset(ArgEnd)); } else { /* fall through and treat as part of the macro body */ } } // Handle tokens produced by non-argument macro expansion. // Check if the macro name is selected, don't claim it exclusively. auto Expansion = SM.getDecomposedExpansionLoc(StartLoc); if (Expansion.first == SelFile) // FIXME: also check ( and ) for function-like macros? return testToken(Expansion.second); else return NoTokens; } // Is the closed token range [Begin, End] selected? SelectionTree::Selection testTokenRange(unsigned Begin, unsigned End) const { assert(Begin <= End); // Outside the selection entirely? if (End < SpelledTokens.front().Offset || Begin > SpelledTokens.back().Offset) return SelectionTree::Unselected; // Compute range of tokens. auto B = llvm::partition_point( SpelledTokens, [&](const Tok &T) { return T.Offset < Begin; }); auto E = std::partition_point( B, SpelledTokens.end(), [&](const Tok &T) { return T.Offset <= End; }); // Aggregate selectedness of tokens in range. bool ExtendsOutsideSelection = Begin < SpelledTokens.front().Offset || End > SpelledTokens.back().Offset; SelectionTree::Selection Result = ExtendsOutsideSelection ? SelectionTree::Unselected : NoTokens; for (auto It = B; It != E; ++It) update(Result, It->Selected); return Result; } // Is the token at `Offset` selected? SelectionTree::Selection testToken(unsigned Offset) const { // Outside the selection entirely? if (Offset < SpelledTokens.front().Offset || Offset > SpelledTokens.back().Offset) return SelectionTree::Unselected; // Find the token, if it exists. auto It = llvm::partition_point( SpelledTokens, [&](const Tok &T) { return T.Offset < Offset; }); if (It != SpelledTokens.end() && It->Offset == Offset) return It->Selected; return NoTokens; } struct Tok { unsigned Offset; SelectionTree::Selection Selected; }; std::vector<Tok> SpelledTokens; FileID SelFile; const SourceManager &SM; }; // Show the type of a node for debugging. void printNodeKind(llvm::raw_ostream &OS, const DynTypedNode &N) { if (const TypeLoc *TL = N.get<TypeLoc>()) { // TypeLoc is a hierarchy, but has only a single ASTNodeKind. // Synthesize the name from the Type subclass (except for QualifiedTypeLoc). if (TL->getTypeLocClass() == TypeLoc::Qualified) OS << "QualifiedTypeLoc"; else OS << TL->getType()->getTypeClassName() << "TypeLoc"; } else { OS << N.getNodeKind().asStringRef(); } } #ifndef NDEBUG std::string printNodeToString(const DynTypedNode &N, const PrintingPolicy &PP) { std::string S; llvm::raw_string_ostream OS(S); printNodeKind(OS, N); OS << " "; return std::move(OS.str()); } #endif bool isImplicit(const Stmt *S) { // Some Stmts are implicit and shouldn't be traversed, but there's no // "implicit" attribute on Stmt/Expr. // Unwrap implicit casts first if present (other nodes too?). if (auto *ICE = llvm::dyn_cast<ImplicitCastExpr>(S)) S = ICE->getSubExprAsWritten(); // Implicit this in a MemberExpr is not filtered out by RecursiveASTVisitor. // It would be nice if RAV handled this (!shouldTraverseImplicitCode()). if (auto *CTI = llvm::dyn_cast<CXXThisExpr>(S)) if (CTI->isImplicit()) return true; // Refs to operator() and [] are (almost?) always implicit as part of calls. if (auto *DRE = llvm::dyn_cast<DeclRefExpr>(S)) { if (auto *FD = llvm::dyn_cast<FunctionDecl>(DRE->getDecl())) { switch (FD->getOverloadedOperator()) { case OO_Call: case OO_Subscript: return true; default: break; } } } return false; } // We find the selection by visiting written nodes in the AST, looking for nodes // that intersect with the selected character range. // // While traversing, we maintain a parent stack. As nodes pop off the stack, // we decide whether to keep them or not. To be kept, they must either be // selected or contain some nodes that are. // // For simple cases (not inside macros) we prune subtrees that don't intersect. class SelectionVisitor : public RecursiveASTVisitor<SelectionVisitor> { public: // Runs the visitor to gather selected nodes and their ancestors. // If there is any selection, the root (TUDecl) is the first node. static std::deque<Node> collect(ASTContext &AST, const syntax::TokenBuffer &Tokens, const PrintingPolicy &PP, unsigned Begin, unsigned End, FileID File) { SelectionVisitor V(AST, Tokens, PP, Begin, End, File); V.TraverseAST(AST); assert(V.Stack.size() == 1 && "Unpaired push/pop?"); assert(V.Stack.top() == &V.Nodes.front()); return std::move(V.Nodes); } // We traverse all "well-behaved" nodes the same way: // - push the node onto the stack // - traverse its children recursively // - pop it from the stack // - hit testing: is intersection(node, selection) - union(children) empty? // - attach it to the tree if it or any children hit the selection // // Two categories of nodes are not "well-behaved": // - those without source range information, we don't record those // - those that can't be stored in DynTypedNode. // We're missing some interesting things like Attr due to the latter. bool TraverseDecl(Decl *X) { if (X && isa<TranslationUnitDecl>(X)) return Base::TraverseDecl(X); // Already pushed by constructor. // Base::TraverseDecl will suppress children, but not this node itself. if (X && X->isImplicit()) return true; return traverseNode(X, [&] { return Base::TraverseDecl(X); }); } bool TraverseTypeLoc(TypeLoc X) { return traverseNode(&X, [&] { return Base::TraverseTypeLoc(X); }); } bool TraverseTemplateArgumentLoc(const TemplateArgumentLoc &X) { return traverseNode(&X, [&] { return Base::TraverseTemplateArgumentLoc(X); }); } bool TraverseNestedNameSpecifierLoc(NestedNameSpecifierLoc X) { return traverseNode( &X, [&] { return Base::TraverseNestedNameSpecifierLoc(X); }); } bool TraverseConstructorInitializer(CXXCtorInitializer *X) { return traverseNode( X, [&] { return Base::TraverseConstructorInitializer(X); }); } // Stmt is the same, but this form allows the data recursion optimization. bool dataTraverseStmtPre(Stmt *X) { if (!X || isImplicit(X)) return false; auto N = DynTypedNode::create(*X); if (canSafelySkipNode(N)) return false; push(std::move(N)); if (shouldSkipChildren(X)) { pop(); return false; } return true; } bool dataTraverseStmtPost(Stmt *X) { pop(); return true; } // QualifiedTypeLoc is handled strangely in RecursiveASTVisitor: the derived // TraverseTypeLoc is not called for the inner UnqualTypeLoc. // This means we'd never see 'int' in 'const int'! Work around that here. // (The reason for the behavior is to avoid traversing the nested Type twice, // but we ignore TraverseType anyway). bool TraverseQualifiedTypeLoc(QualifiedTypeLoc QX) { return traverseNode<TypeLoc>( &QX, [&] { return TraverseTypeLoc(QX.getUnqualifiedLoc()); }); } // Uninteresting parts of the AST that don't have locations within them. bool TraverseNestedNameSpecifier(NestedNameSpecifier *) { return true; } bool TraverseType(QualType) { return true; } // The DeclStmt for the loop variable claims to cover the whole range // inside the parens, this causes the range-init expression to not be hit. // Traverse the loop VarDecl instead, which has the right source range. bool TraverseCXXForRangeStmt(CXXForRangeStmt *S) { return traverseNode(S, [&] { return TraverseStmt(S->getInit()) && TraverseDecl(S->getLoopVariable()) && TraverseStmt(S->getRangeInit()) && TraverseStmt(S->getBody()); }); } // OpaqueValueExpr blocks traversal, we must explicitly traverse it. bool TraverseOpaqueValueExpr(OpaqueValueExpr *E) { return traverseNode(E, [&] { return TraverseStmt(E->getSourceExpr()); }); } // We only want to traverse the *syntactic form* to understand the selection. bool TraversePseudoObjectExpr(PseudoObjectExpr *E) { return traverseNode(E, [&] { return TraverseStmt(E->getSyntacticForm()); }); } private: using Base = RecursiveASTVisitor<SelectionVisitor>; SelectionVisitor(ASTContext &AST, const syntax::TokenBuffer &Tokens, const PrintingPolicy &PP, unsigned SelBegin, unsigned SelEnd, FileID SelFile) : SM(AST.getSourceManager()), LangOpts(AST.getLangOpts()), #ifndef NDEBUG PrintPolicy(PP), #endif TokenBuf(Tokens), SelChecker(Tokens, SelFile, SelBegin, SelEnd, SM), UnclaimedExpandedTokens(Tokens.expandedTokens()) { // Ensure we have a node for the TU decl, regardless of traversal scope. Nodes.emplace_back(); Nodes.back().ASTNode = DynTypedNode::create(*AST.getTranslationUnitDecl()); Nodes.back().Parent = nullptr; Nodes.back().Selected = SelectionTree::Unselected; Stack.push(&Nodes.back()); } // Generic case of TraverseFoo. Func should be the call to Base::TraverseFoo. // Node is always a pointer so the generic code can handle any null checks. template <typename T, typename Func> bool traverseNode(T *Node, const Func &Body) { if (Node == nullptr) return true; auto N = DynTypedNode::create(*Node); if (canSafelySkipNode(N)) return true; push(DynTypedNode::create(*Node)); bool Ret = Body(); pop(); return Ret; } // HIT TESTING // // We do rough hit testing on the way down the tree to avoid traversing // subtrees that don't touch the selection (canSafelySkipNode), but // fine-grained hit-testing is mostly done on the way back up (in pop()). // This means children get to claim parts of the selection first, and parents // are only selected if they own tokens that no child owned. // // Nodes *usually* nest nicely: a child's getSourceRange() lies within the // parent's, and a node (transitively) owns all tokens in its range. // // Exception 1: child range claims tokens that should be owned by the parent. // e.g. in `void foo(int);`, the FunctionTypeLoc should own // `void (int)` but the parent FunctionDecl should own `foo`. // To handle this case, certain nodes claim small token ranges *before* // their children are traversed. (see earlySourceRange). // // Exception 2: siblings both claim the same node. // e.g. `int x, y;` produces two sibling VarDecls. // ~~~~~ x // ~~~~~~~~ y // Here the first ("leftmost") sibling claims the tokens it wants, and the // other sibling gets what's left. So selecting "int" only includes the left // VarDecl in the selection tree. // An optimization for a common case: nodes outside macro expansions that // don't intersect the selection may be recursively skipped. bool canSafelySkipNode(const DynTypedNode &N) { SourceRange S = N.getSourceRange(); if (auto *TL = N.get<TypeLoc>()) { // DeclTypeTypeLoc::getSourceRange() is incomplete, which would lead to // failing // to descend into the child expression. // decltype(2+2); // ~~~~~~~~~~~~~ <-- correct range // ~~~~~~~~ <-- range reported by getSourceRange() // ~~~~~~~~~~~~ <-- range with this hack(i.e, missing closing paren) // FIXME: Alter DecltypeTypeLoc to contain parentheses locations and get // rid of this patch. if (auto DT = TL->getAs<DecltypeTypeLoc>()) S.setEnd(DT.getUnderlyingExpr()->getEndLoc()); } if (!SelChecker.mayHit(S)) { dlog("{1}skip: {0}", printNodeToString(N, PrintPolicy), indent()); dlog("{1}skipped range = {0}", S.printToString(SM), indent(1)); return true; } return false; } // There are certain nodes we want to treat as leaves in the SelectionTree, // although they do have children. bool shouldSkipChildren(const Stmt *X) const { // UserDefinedLiteral (e.g. 12_i) has two children (12 and _i). // Unfortunately TokenBuffer sees 12_i as one token and can't split it. // So we treat UserDefinedLiteral as a leaf node, owning the token. return llvm::isa<UserDefinedLiteral>(X); } // Pushes a node onto the ancestor stack. Pairs with pop(). // Performs early hit detection for some nodes (on the earlySourceRange). void push(DynTypedNode Node) { SourceRange Early = earlySourceRange(Node); dlog("{1}push: {0}", printNodeToString(Node, PrintPolicy), indent()); Nodes.emplace_back(); Nodes.back().ASTNode = std::move(Node); Nodes.back().Parent = Stack.top(); Nodes.back().Selected = NoTokens; Stack.push(&Nodes.back()); claimRange(Early, Nodes.back().Selected); } // Pops a node off the ancestor stack, and finalizes it. Pairs with push(). // Performs primary hit detection. void pop() { Node &N = *Stack.top(); dlog("{1}pop: {0}", printNodeToString(N.ASTNode, PrintPolicy), indent(-1)); claimRange(N.ASTNode.getSourceRange(), N.Selected); if (N.Selected == NoTokens) N.Selected = SelectionTree::Unselected; if (N.Selected || !N.Children.empty()) { // Attach to the tree. N.Parent->Children.push_back(&N); } else { // Neither N any children are selected, it doesn't belong in the tree. assert(&N == &Nodes.back()); Nodes.pop_back(); } Stack.pop(); } // Returns the range of tokens that this node will claim directly, and // is not available to the node's children. // Usually empty, but sometimes children cover tokens but shouldn't own them. SourceRange earlySourceRange(const DynTypedNode &N) { if (const Decl *D = N.get<Decl>()) { // We want constructor name to be claimed by TypeLoc not the constructor // itself. Similar for deduction guides, we rather want to select the // underlying TypeLoc. // FIXME: Unfortunately this doesn't work, even though RecursiveASTVisitor // traverses the underlying TypeLoc inside DeclarationName, it is null for // constructors. if (isa<CXXConstructorDecl>(D) || isa<CXXDeductionGuideDecl>(D)) return SourceRange(); // This will capture Field, Function, MSProperty, NonTypeTemplateParm and // VarDecls. We want the name in the declarator to be claimed by the decl // and not by any children. For example: // void [[foo]](); // int (*[[s]])(); // struct X { int [[hash]] [32]; [[operator]] int();} if (const auto *DD = llvm::dyn_cast<DeclaratorDecl>(D)) return DD->getLocation(); } else if (const auto *CCI = N.get<CXXCtorInitializer>()) { // : [[b_]](42) return CCI->getMemberLocation(); } return SourceRange(); } // Perform hit-testing of a complete Node against the selection. // This runs for every node in the AST, and must be fast in common cases. // This is usually called from pop(), so we can take children into account. // The existing state of Result is relevant (early/late claims can interact). void claimRange(SourceRange S, SelectionTree::Selection &Result) { for (const auto &ClaimedRange : UnclaimedExpandedTokens.erase(TokenBuf.expandedTokens(S))) update(Result, SelChecker.test(ClaimedRange)); if (Result && Result != NoTokens) dlog("{1}hit selection: {0}", S.printToString(SM), indent()); } std::string indent(int Offset = 0) { // Cast for signed arithmetic. int Amount = int(Stack.size()) + Offset; assert(Amount >= 0); return std::string(Amount, ' '); } SourceManager &SM; const LangOptions &LangOpts; #ifndef NDEBUG const PrintingPolicy &PrintPolicy; #endif const syntax::TokenBuffer &TokenBuf; std::stack<Node *> Stack; SelectionTester SelChecker; IntervalSet<syntax::Token> UnclaimedExpandedTokens; std::deque<Node> Nodes; // Stable pointers as we add more nodes. }; } // namespace llvm::SmallString<256> abbreviatedString(DynTypedNode N, const PrintingPolicy &PP) { llvm::SmallString<256> Result; { llvm::raw_svector_ostream OS(Result); N.print(OS, PP); } auto Pos = Result.find('\n'); if (Pos != llvm::StringRef::npos) { bool MoreText = !llvm::all_of(llvm::StringRef(Result).drop_front(Pos), llvm::isSpace); Result.resize(Pos); if (MoreText) Result.append(" …"); } return Result; } void SelectionTree::print(llvm::raw_ostream &OS, const SelectionTree::Node &N, int Indent) const { if (N.Selected) OS.indent(Indent - 1) << (N.Selected == SelectionTree::Complete ? '*' : '.'); else OS.indent(Indent); printNodeKind(OS, N.ASTNode); OS << ' ' << abbreviatedString(N.ASTNode, PrintPolicy) << "\n"; for (const Node *Child : N.Children) print(OS, *Child, Indent + 2); } std::string SelectionTree::Node::kind() const { std::string S; llvm::raw_string_ostream OS(S); printNodeKind(OS, ASTNode); return std::move(OS.str()); } // Decide which selections emulate a "point" query in between characters. // If it's ambiguous (the neighboring characters are selectable tokens), returns // both possibilities in preference order. // Always returns at least one range - if no tokens touched, and empty range. static llvm::SmallVector<std::pair<unsigned, unsigned>, 2> pointBounds(unsigned Offset, const syntax::TokenBuffer &Tokens) { const auto &SM = Tokens.sourceManager(); SourceLocation Loc = SM.getComposedLoc(SM.getMainFileID(), Offset); llvm::SmallVector<std::pair<unsigned, unsigned>, 2> Result; // Prefer right token over left. for (const syntax::Token &Tok : llvm::reverse(spelledTokensTouching(Loc, Tokens))) { if (shouldIgnore(Tok)) continue; unsigned Offset = Tokens.sourceManager().getFileOffset(Tok.location()); Result.emplace_back(Offset, Offset + Tok.length()); } if (Result.empty()) Result.emplace_back(Offset, Offset); return Result; } bool SelectionTree::createEach(ASTContext &AST, const syntax::TokenBuffer &Tokens, unsigned Begin, unsigned End, llvm::function_ref<bool(SelectionTree)> Func) { if (Begin != End) return Func(SelectionTree(AST, Tokens, Begin, End)); for (std::pair<unsigned, unsigned> Bounds : pointBounds(Begin, Tokens)) if (Func(SelectionTree(AST, Tokens, Bounds.first, Bounds.second))) return true; return false; } SelectionTree SelectionTree::createRight(ASTContext &AST, const syntax::TokenBuffer &Tokens, unsigned int Begin, unsigned int End) { llvm::Optional<SelectionTree> Result; createEach(AST, Tokens, Begin, End, [&](SelectionTree T) { Result = std::move(T); return true; }); return std::move(*Result); } SelectionTree::SelectionTree(ASTContext &AST, const syntax::TokenBuffer &Tokens, unsigned Begin, unsigned End) : PrintPolicy(AST.getLangOpts()) { // No fundamental reason the selection needs to be in the main file, // but that's all clangd has needed so far. const SourceManager &SM = AST.getSourceManager(); FileID FID = SM.getMainFileID(); PrintPolicy.TerseOutput = true; PrintPolicy.IncludeNewlines = false; dlog("Computing selection for {0}", SourceRange(SM.getComposedLoc(FID, Begin), SM.getComposedLoc(FID, End)) .printToString(SM)); Nodes = SelectionVisitor::collect(AST, Tokens, PrintPolicy, Begin, End, FID); Root = Nodes.empty() ? nullptr : &Nodes.front(); recordMetrics(*this); dlog("Built selection tree\n{0}", *this); } const Node *SelectionTree::commonAncestor() const { const Node *Ancestor = Root; while (Ancestor->Children.size() == 1 && !Ancestor->Selected) Ancestor = Ancestor->Children.front(); // Returning nullptr here is a bit unprincipled, but it makes the API safer: // the TranslationUnitDecl contains all of the preamble, so traversing it is a // performance cliff. Callers can check for null and use root() if they want. return Ancestor != Root ? Ancestor : nullptr; } const DeclContext &SelectionTree::Node::getDeclContext() const { for (const Node *CurrentNode = this; CurrentNode != nullptr; CurrentNode = CurrentNode->Parent) { if (const Decl *Current = CurrentNode->ASTNode.get<Decl>()) { if (CurrentNode != this) if (auto *DC = dyn_cast<DeclContext>(Current)) return *DC; return *Current->getDeclContext(); } } llvm_unreachable("A tree must always be rooted at TranslationUnitDecl."); } const SelectionTree::Node &SelectionTree::Node::ignoreImplicit() const { if (Children.size() == 1 && Children.front()->ASTNode.getSourceRange() == ASTNode.getSourceRange()) return Children.front()->ignoreImplicit(); return *this; } const SelectionTree::Node &SelectionTree::Node::outerImplicit() const { if (Parent && Parent->ASTNode.getSourceRange() == ASTNode.getSourceRange()) return Parent->outerImplicit(); return *this; } } // namespace clangd } // namespace clang
2023-08-07T01:26:36.242652
https://example.com/article/1363
Q: what is the correct way to get element from collection In my backbone view, I am getting models from my collection.. initialize:function(){ this.collection = new collection(student); this.render(); }, from this collection I am filtering the high value models using filter method:(on click I am triggering) getHighSocre:function(){ return _.filter(this.collection.models, function(item){ return parseInt(item.get('scored')) > 60 }) }, showHighScore:function(){ var hView = new studentView({model:this.getHighSocre()}); // sending to single view hView.showMe(); // I am calling this method to add a class name to each 'li' element.. } here is my single view: var studentView = Backbone.View.extend({ tagName:'li', events:{ 'click':"called" }, template:_.template($("#studentTemplate").html()), render:function(){ this.$el.append(this.template(this.model.toJSON())); return this; }, called:function(){ if(this.model.get('scored') > 60){ this.$el.css({ background:"#EFEFEF" }) }else{ this.$el.css({ background:"#FCBABA" }) } }, showMe:function(){ // I am passing here to add a class name console.log(this) // make the array... here this.$el.css({ // but this is not getting the dom element... border:'1px solid red' }) } }); How to I add the class name to each of this li elements? What is wrong here, anyone can help me to sort or can give me a correct way to filter a collection and apply the class name to it's element? Here is the jsfiddle. A: First off, with Backbone and Underscore, you usually don't want to call Underscore methods on Collections, eg: _.filter(this.collection.models, function(item){ you instead want to call the Backbone Collection equivalent method (http://documentcloud.github.io/backbone/#Collection-Underscore-Methods): this.collection.filter(function(item){ Second you misspelled "score" as "socre"; not trying to be a jerk, just pointing it out because such misspellings can easily cause bugs. Third, views expect a model for their model parameter, but your getHighSocre method returns the result of a filter, ie. an array of models, so this line: new studentView({model:this.getHighSocre()}); isn't going to work. If you just want the first model with a score above 60, try using find instead of filter, and if you really do want your view to have every model with a score above 60 then you probably want to convert those models in to a new collection and pass that as the view's collection (rather than as its model). P.S. This isn't really part of the answer, but just a note; if you weren't familiar with Javascript's ternary operator, you might want to check it out as it lets you reduce all of this: if(this.model.get('scored') > 60){ this.$el.css({ background:"#EFEFEF" }) }else{ this.$el.css({ background:"#FCBABA" }) } to just: var isAbove60 = this.model.get('scored') > 60; this.$el.css('backgroundColor', isAbove60 ? "#EFEFEF" : "#FCBABA");
2023-08-27T01:26:36.242652
https://example.com/article/7874
Echocardiographic assessment of right ventricular systolic function in conscious healthy dogs following a single dose of pimobendan versus atenolol. To quantify drug-induced changes in right ventricular (RV) systolic function after administration of pimobendan and atenolol. 80 healthy privately-owned dogs. Using a prospective, blinded, fully-crossed study design with randomized drug administration, RV systolic function was determined twice at two time periods; before and 3 h after administration of pimobendan (0.25 mg/kg PO) or atenolol (1 mg/kg PO). Indices of RV systolic function included tricuspid annular plane systolic excursion (TAPSE), fractional area change (FAC), pulsed-wave tissue Doppler-derived systolic myocardial velocity of the lateral tricuspid annulus (S'), and speckle-tracking-derived global longitudinal RV free wall strain and strain rate. The effect of treatment on percent change from baseline RV function was analyzed with a linear mixed model including the covariates heart rate, body weight, age, gender, drug sequence, and time period. All indices showed a significant (p < 0.0001) increase and decrease from baseline following pimobendan and atenolol, respectively. Significant differences from baseline were attributed to drug treatment (p < 0.0001); whereas, effects of other covariates were not significant. The greatest percent changes, but also highest variability, were observed for S' and strain rate (p < 0.0001). Post-atenolol, a significantly greater proportion of dogs exceeded the repeatability coefficient of variation for FAC and S' compared to TAPSE (p ≤ 0.007). Echocardiographic indices in healthy dogs tracked expected changes in RV systolic function following pimobendan and atenolol and warrant study in dogs with cardiovascular disease.
2024-06-13T01:26:36.242652
https://example.com/article/1858
Q: Nested lambda and mutable keyword Consider the following piece of code: void f() { int a = 3; [=]() { [=] () mutable { a = 5; }(); }(); } It compiles on Clang (https://godbolt.org/z/IEXotM) but not on GCC (https://godbolt.org/z/xWXFe6). Error for GCC: <source>: In lambda function: <source>:5:15: error: assignment of read-only variable 'a' 5 | a = 5; | ~~^~~ Compiler returned: 1 According to https://en.cppreference.com/w/cpp/language/lambda, Optional sequence of specifiers.The following specifiers are allowed: mutable: allows body to modify the parameters captured by copy, and to call their non-const member functions And it seems like that Clang's behavior here is correct. Is this the case? A: If you go read from the bottom of the link you cited you can read: If a nested lambda m2 captures something that is also captured by the immediately enclosing lambda m1, then m2's capture is transformed as follows: if the enclosing lambda m1 captures by copy, m2 is capturing the non-static member of m1's closure type, not the original variable or this. if the enclosing lambda m1 captures by reference, m2 is capturing the original variable or this. #include <iostream> int main() { int a = 1, b = 1, c = 1; auto m1 = [a, &b, &c]() mutable { auto m2 = [a, b, &c]() mutable { std::cout << a << b << c << '\n'; a = 4; b = 4; c = 4; }; a = 3; b = 3; c = 3; m2(); }; a = 2; b = 2; c = 2; m1(); // calls m2() and prints 123 std::cout << a << b << c << '\n'; // prints 234 } So you are capturing the value from the enclosing lambda and to modify it you need to make it mutable in the enclosing lambda too.
2024-01-20T01:26:36.242652
https://example.com/article/6392
indispensable and reliable A perfect sample preparation is the indispensable foundation for every analysis – because any errors will be reflected in the results later on. Therefore the reliable creation of guaranteed representative subsamples plays an absolutely central role. The Rotary Cone Sample Divider LABORETTE 27 offers the ideal conditions: it is the only sample divider on the market dividing your samples with up to 3,000 dividing steps per minute centred over a rotating dividing cone into up to 30 separate channels. Each individual sample with identical chemical and physical properties – and with 99.9 % accuracy for many more sample materials than any other similar method. The best sample division, possible today.
2023-09-12T01:26:36.242652
https://example.com/article/5596
Effects of carbon and nitrogen sources on rhamnolipid biosurfactant production by Pseudomonas nitroreducens isolated from soil. Rhamnolipid biosurfactant production by Pseudomonas nitroreducens isolated from petroleum-contaminated soil was investigated. The effects of carbon, nitrogen and carbon to nitrogen ratio on biosurfactant production were examined using mineral salts medium as the growth medium. The tenso-active properties (surface activity and critical micelle concentrations of the produced biosurfactant were also evaluated. The best carbon source, nitrogen source were glucose and sodium nitrate giving rhamnolipid yields of 5.28 and 4.38 g l(-1), respectively. The maximum rhamnolipid production of 5.46 g l(-1) was at C/N (glucose/sodium nitrate) of 22. The rhamnolipid biosurfactant reduced the surface tension of water from 72 to ~37 mN/m. It also has critical micelle concentration of ~28 mg l(-1). Thus, the results presented in our reports show that the produced rhamnolipid can find wide applications in various bioremediation activities such as enhanced oil recovery and petroleum degradation.
2023-08-14T01:26:36.242652
https://example.com/article/3440
Ubisoft’s Assassin’s Creed III Remaster will be available on Nintendo Switch on May 21. The confirmation was provided during the Nintendo Direct (check out all the news here), and confirms rumors from earlier in the year. The game has already been confirmed for release on PS4, Xbox One, and PC on March 29. Alongside an updated version of Assassin’s Creed III, the package will include a remaster of PlayStation Vita title Assassin’s Creed III: Liberation, and the Tyranny of King Washington DLC. For those that have Assassin’s Creed Odyssey’s season pass, this remaster will be available at no extra cost. The Switch version will have new gameplay features such as aiming using motion control, and some touch-based gameplay too. Assassin’s Creed III was first released for PS3, Xbox 360, PC, and Wii U in 2012. We awarded the game an 8.5/10 in our Assassin’s Creed III review; critic Kevin VanOrd said it “expands the series’ gameplay in enjoyable and sensible ways.” He added: “Assassin’s Creed III is a big game that gives you a lot to do, some of which is fleshed out relatively well, and some of which isn’t. It is not, however, content to rest on the series’ laurels. It takes chances with its opening, with its story, and with its characters. “As with many ambitious games, not every arrow fired hits the bull’s-eye, yet this big, narratively rich sequel is easy to get invested in. Other games stimulate emotion with manipulative music and teary monologues; Assassin’s Creed III rouses your mind and your heart by giving you a glimpse into its characters’ souls and letting you judge them on their own merits.”
2023-08-24T01:26:36.242652
https://example.com/article/1563
Across the Card $15.00 This 4x6 set is the same idea as our very popular On the Strip series. The stamps are just over 5 1/2" so they cover the full length of a standard card perfectly! Pair that with sentiments to use for all ocassions and you've got a great essential set!
2024-04-16T01:26:36.242652
https://example.com/article/5661
A limited number of places has been allocated to submitted refereed papers. You are invited to submit abstracts of 250-300 words for a paper addressing the topic of the conference. The deadline for the receipt of abstracts is March 30, 2013. Participants will be notified by 15 April 2013. The conferencepapers should be no longer than 2000-2500 words – suitable for presentation in 20 minutes, followed by 10 minutes of question time. The conference will waive the speakers’ registration and subsistence fees. You are free to submit abstracts for both Philosophical Revolutions and Philosophies of Philosophy, but only one paper per speaker, across the two conferences, could be accommodated. The conferences will be held in the beautiful surroundings of the Newman House in Dublin city centre. Philosophical Revolutions” is the second strand of, The American Voice in Philosophy and will be hosted with financial support from the Irish Research Council, UCD Seed Funding and the Society for the Advancement of American Philosophy.
2023-10-06T01:26:36.242652
https://example.com/article/6950
UK and Europe: two scenarios for business Text of presentation given by Dr Robert Davies at the City University British election roundtable event 30 April 2015 Overview: This talk introduces the ‘toxic 5‘ – factors that could destabilise western democracies. Many of these factors my be in position now. Business leaders seeking resilience should consider preparing scenarios based upon the content of this presentation. ‘Whilst flying back from Spain a couple of weeks ago, my mind shifted to this evening’s presentation. I reached forward and took the business flight magazine from the seat pocket in front of me and I started to glance through the pages. The magazine was full of articles and snippets that reflected how we usually think about the future – at least for the UK and Europe. The content confirmed the accepted ‘megatrends’ that strategies must embrace if businesses are to reach their long-term objectives and goals. Some of the topics that I noticed as I scanned through the pages included: • The continued onward march of technology-led innovation. • Global economic and cultural connectivity – the eventual emergence of one global marketplace. • A return to consumer-fuelled growth. • The next luxury automobile. • The elimination of poverty. These are, in large, good familiar things, things that made me feel warm inside, rather like the drink that the flight attendant had just handed to me. My mind then shifted to consider what deep, almost subliminal assumption underpinned this thinking. It struck me that there was one fundamental underlying deep assumption. That deep assumption was that the world would become increasingly open and democratic. An increasingly liberal-democratic marketplace where sensibly controlled capitalism would bring wealth to all. And that is one, commonly accepted scenario for UK, Europe and the business world generally. Europe will always be here, championing the democratic cause. And a lot has been written about this scenario. Possibly too much, and there is little more that I can add to that future story here. But, if we continue our focus on the UK and Europe in particular, how robust is the assumption that a liberal democratic order will continue? Are we just one catalytic event away from a seismic shift within Europe that the fog of the past and the fog of the present are stopping us from seeing? As I pondered these questions I started to feel colder. My business school training tells me that robust businesses are those that are good at looking out to the periphery and interpreting, in a less-conventional manner, weak signals of potential seismic shifts. So just what ‘weak’ or somewhat stronger signals do we have out there in Europe? We could start from the perspective of economic performance. Europe’s struggle with the impact of the Great Recession is well known. Looking back over 10 years, the performance has been at best chequered. Growth, notably in many more Eastern states has been, in relative terms, significant. For others, including Germany and France, performance has been a lot more modest and the immediate prospects for development seem to teeter on a knife-edge. But for others, as we know, the experience has been near catastrophic. The obvious example is Greece, but we must remember that at the end of 2014 Italy’s economy had experienced, over 10 years, five years of contraction. This is a story very much of division. We then of course have the issue of fragmentation and the rise of secessionist parties, parties that wish to divide and fragment existing nation states. In the UK we are now overly familiar with this issue, but we should bear in mind that there are at least another eight areas in Europe that face these divisive pressures. It would be difficult to exclude the issue of inequality or social divisions from any debate such as this and it is relevant to note that a report commissioned by the EU and published in 2013 concluded that rising inequality fuelled by the effects of the Great Recession, demographic shifts, ongoing economic globalisation and the prospect of lower global growth would be one of the key challenges that the EU will face in coming years. But we need to turn our heads and look outside the UK and the Europe. Events in Ukraine and Russia have shown us the power of nationalism and the growing importance of territorial boundaries. But this external influence is also surfacing within the EU itself in the form of a Russian loan to finance new nuclear power stations in Hungary, a potential new gas pipeline agreement between Greece and Russia and a Euro 9m loan from Russia to France’s National Front party. So, what should we make of this – a series of unrelated disparate problems or a warning that something deeper is afoot? Well, the weak signals that I have just referred to are those forces that collectively can give rise to a material redefinition of, or even collapse, within democratic societies. Three of the signals that I have mentioned being malfunctioning economies, social divisions and foreign involvement are three of the ‘toxic five’, the five forces that working together can lead to the reshaping or even collapse of democratic societies. The others are institutional decay – where broadly the institutions that support democracy fail to keep up with the emerging needs of the electorate and finally a history of earlier collapses. And if you thought that there are no viable alternatives to a liberal-democratic world, well ‘viability’ is all in the eye of the beholder, and, as we know, there are other more authoritarian models whose voices now wish to be heard. History tells us that it is difficult to spot seismic shifts before they break. How many forecast the collapse of the Soviet Union? Who saw that the Great Recession in those early days of 2009 was more than a ‘credit crunch’ or a ‘normal’ recession? The point is that, almost unbelievably, we may be just one catalytic event away from another seismic shift. A shift that will challenge that one deep assumption that underpins many organisations’ business plans. This shift, if it appears, will have far-ranging consequences for business ranging from the behaviours of core customers, choice of target markets through to the emergence of new influential stakeholders and regulators. The time is ripe for any leader wishing to build a resilient organisation to consider this radically different, but quite plausible scenario of fragmentation. Just relying upon one familiar scenario and a popular assumption may leave business organisations dangerously exposed.’
2024-04-03T01:26:36.242652
https://example.com/article/3555
Q: Wordpress admin theme options get empty and some script error shown after added the google anaytics code I need a small help from you. Everything was working fine and it still is, but what happened, i added google anaytics code to WP-admin under 'theme options' and all of the sudden, everything under 'theme options' went blank and i can see some code at the bottom of the page same place at backend. Can you please have a look for the below screenshot and give some solution to solve this. Thanks, Arularasan D. A: I fixed this issue in four steps, 1. Exported the phpmyadmin sql files. 2. Opened the sql files in text editor and Search the keyword 'google_analytics'. 3. Removed this code :"google_analytics_tracking_code": "<script>\n (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){\n (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),\n m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)\n })(window,document,'script','//www.google-analytics.com/analytics.js','ga');\n\n ga('create', 'UA-5772415-2', 'rastergraphix.com.au');\n ga('send', 'pageview');\n\n</script>" 4. Finally imported the modified sql files in phpmyadmin. Finally the js issue have solved and admin side theme option gets empty had been solved. Can you please explain how to add the google analytics code in admin theme options window. Thanks, Arularasan D. Senior PHP Programmer.
2024-07-14T01:26:36.242652
https://example.com/article/1802
<?xml version="1.0" encoding="utf-8"?> <root> <resheader name="resmimetype"> <value>text/microsoft-resx</value> </resheader> <resheader name="version"> <value>2.0</value> </resheader> <resheader name="reader"> <value>System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> </resheader> <resheader name="writer"> <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> </resheader> <data name="btnCancel.Text" xml:space="preserve"> <value>&amp;Prekliči</value> </data> <data name="btnOK.Text" xml:space="preserve"> <value>&amp;V redu</value> </data> <data name="label1.Text" xml:space="preserve"> <value>Ime Datoteke</value> </data> <data name="label2.Text" xml:space="preserve"> <value>Predogled:</value> </data> <data name="label3.Text" xml:space="preserve"> <value>Leto</value> </data> <data name="label4.Text" xml:space="preserve"> <value>Leto (00-99)</value> </data> <data name="label5.Text" xml:space="preserve"> <value>Mesec (01-12)</value> </data> <data name="label6.Text" xml:space="preserve"> <value>Dan (01-31)</value> </data> <data name="label7.Text" xml:space="preserve"> <value>Ura (0-23)</value> </data> <data name="label8.Text" xml:space="preserve"> <value>Minute (00-59)</value> </data> <data name="label9.Text" xml:space="preserve"> <value>Sekunda (00-59)</value> </data> <data name="label10.Text" xml:space="preserve"> <value>Naraščajoče število (4 cifre)</value> </data> <data name="label11.Text" xml:space="preserve"> <value>Naraščajoče število (3 cifre)</value> </data> <data name="label12.Text" xml:space="preserve"> <value>Naraščajoče število (2 cifri)</value> </data> <data name="label13.Text" xml:space="preserve"> <value>Naraščajoče število (1 cifra)</value> </data> <data name="gboxPlaceholders.Text" xml:space="preserve"> <value>Mesta</value> </data> <data name="$this.Text" xml:space="preserve"> <value>Mesta</value> </data> </root>
2024-02-28T01:26:36.242652
https://example.com/article/8231
Choose your own theory. Pelosi said this not realizing it would totally freak out Republicans who are otherwise open to restricting bump stocks, or she said it because she did know and is trying to engineer precisely that outcome. Normally I’d go with theory two but she’s old and occasionally, ahem, absent-minded. Nah, c’mon. It’s obviously theory two. “Clearly that’s something we need to look into,” [Paul] Ryan said [of banning bump stocks] on MSNBC. He said he was not aware of what “bump stocks” were before Sunday’s shooting, which left at least 58 dead and hundreds injured. “We’re going to look at the issue,” [Judiciary Committee chair Bob] Goodlatte told The Washington Post. Asked if he had a personal concern about their legality, he said, “I have a personal concern about what happened.”… House Minority Leader Nancy Pelosi (D-Calif.) urged Ryan to allow a vote on a Democratic bill to ban the devices. When asked whether the bill might represent a slippery slope toward other gun restrictions, Pelosi said, “So what? . . . I certainly hope so.” “I own a lot of guns, and as a hunter and sportsman, I think that’s our right as Americans, but I don’t understand the use of this bump stock,” said none other than John Cornyn, the number two man in the Senate yesterday. Mark Meadows, head of the House Freedom Caucus, is also willing to consider a ban. That’s a lot of Republican leaders spending political capital on a potential gun-control measure, a once-in-a-generation thing in modern politics. So why’s Pelosi trying to spook them? You can guess. She knows most of the public will support a bump-stock ban, just as most of the public supports expanding background checks for gun purchases, and she’s eager to keep Republicans on the wrong side of those numbers. Although Americans are more pro-gun than they used to be, Democrats get mileage (especially among their base) from the perception that the congressional GOP is in the NRA’s pocket and will fanatically oppose any gun restriction, no matter how high the death toll climbs. Restricting bump stocks is an easy way for Republicans to knock some wind out of that accusation. Unlike most gun-control measures favored by the left, a bump-stock ban actually might have made a difference in Vegas. And bump stocks, by mimicking automatic fire, tread on legal ground that was marked off as (mostly) forbidden decades ago. The GOP could use a bump-stock ban as a shield against other, dumber regulations, like the one on suppressors that Jeff Duncan is currently trying to undo. “We can and do support reasonable gun regulations,” they could say, pointing to bump stocks. “But the usual Democratic menu of restrictions isn’t reasonable.” A sensible compromise would be GOP support for banning bump stocks in return for Democratic support for deregulating suppressors, which gun owners use to protect their hearing. If you’re Pelosi, you’ve gotta put a stop to that fast. The surest route is to not only endorse the idea yourself, rendering it dodgy on the right by association with her (see, e.g., Trump’s DREAM deal), but to seemingly confirm the NRA’s worst fears by admitting that the left will try to exploit a bump-stock ban as a slippery slope to more gun control. Ryan and McConnell might be able to resist being baited by the left that way if the right were solidly behind them — but they’re going to get heat from some on the right too. It’s a pincer movement! Bill Flores (R-TX) tells me and @kristinapet the NRA reached out in concern yesterday after seeing his quotes for regulating bump stocks — Erica Werner (@ericawerner) October 5, 2017 Yesterday Flores suggested he’d be open to a bump-stock ban and now the NRA’s unhappy. Meanwhile, other Republicans in Congress like Richard Shelby will oppose any attempts at gun control as an infringement on the Second Amendment even without prodding from the NRA. That makes the politics here dicey for Republican leaders even though polling will show, I suspect, that a heavy majority of the public overall supports a bump-stock ban. If Ryan brings a bill to the floor, Pelosi will crow that thus begins a golden age of gradually eliminating firearms in America; the NRA will howl, and populists like Roy Moore will seize on the bill as proof that the farking RINOs in Washington are ready to sell out red-blooded Americans again. It’ll be the same dynamic as the effort after Sandy Hook to expand background checks: Nearly the entire country is broadly but tepidly in favor of it, but the small minority who aren’t *really* aren’t and are prepared to make Republicans pay politically. And in fairness to both Pelosi and right-wing opponents of a ban, there is a tiny slippery-slope risk here. “Bump fire,” which allows a semiautomatic to fire at a rate similar to a machine gun, can be achieved even without the stock with some practice. It’s a technique. The stock, as I understand it, just makes it a bit easier to use the force of the gun’s recoil to “jackhammer” it between your shoulder and trigger finger. If bump stocks are banned on grounds that a semiautomatic that can fire like an automatic is, for legal purposes, an automatic, then arguably *any* semiautomatic rifle that can be bump-fired is a de facto automatic whether it has a bump stock or not. I think the risk of sliding that far on the slippery slope is vanishingly small, as most firearms in America are semiautomatic and Americans aren’t about to sit by and watch their guns disappear. But that’s the “slippery slope” argument, if you’re looking for one. Two clips for you here, one of Pelosi babbling about how great it would be if a bump-stock ban encouraged more gun control and another, apropos of nothing, from last night via the Free Beacon of her saying we “owe a debt” to illegal immigrants for breaking the law and bringing their DREAMer children to America years ago. I can’t imagine why she’s so toxic politically. Oh, and yes — as you surely guessed by now, there’s a run on bump stocks across the country as gun owners fear they’ll soon be verboten. Update: This is unexpected. But the NRA was in a jam this afternoon when it turned out that bump stocks were banned at the range in its own headquarters. NRA: "Devices designed to allow semi-automatic rifles to function like fully-automatic rifles should be subject to additional regulations." pic.twitter.com/QiRFD9UesO — NBC Politics (@NBCPolitics) October 5, 2017 That’s all the cover Ryan and McConnell should need to push a bump-stock ban through, especially if Trump supports it as well, which seems likely. The group’s asking for national right to-carry reciprocity, presumably as the price in a deal to ban bump stocks. If Democrats balk at that, and they will, is the bump-stock ban off the table too?
2024-02-06T01:26:36.242652
https://example.com/article/3016
Dr. Joshua M. Sharfstein, Baltimore's outspoken health commissioner, is regarded by many as a leading candidate to head the Food and Drug Administration. Sharfstein is a former congressional staffer who carved out a national profile by convincing drug companies to stop marketing cough and cold medicines to young children. The 39-year-old pediatrician has been spending two days a week in Washington lately as one of a handful of people reviewing health policies for President-elect Barack Obama's transition team. And he is being pushed for the FDA commissioner's position by members of Maryland's congressional delegation. "He's a young, bright guy who is just the type of person Senator Obama surrounds himself with," said Sen. Benjamin L. Cardin. He said Sharfstein would restore "the traditional functions" of the FDA "in protecting the public and being aggressive and looking at new ways to do that." Cardin and Sen. Barbara A. Mikulski have both communicated their support of the Harvard-educated physician to the transition team, and Rep. Elijah E. Cummings says he plans to. All three are Democrats. Sharfstein came to Baltimore in 2005 after four years as a health policy adviser to Rep. Henry A. Waxman. Waxman, a California Democrat with close ties to the incoming Obama administration, will take over the House committee that oversees the FDA in January. Sharfstein wouldn't comment yesterday on the speculation. "I love my job and I'm looking forward to another year of public health progress in the city," he said. Sources close to the situation say no decision is imminent. Former Sen. Tom Daschle was named last week as Obama's choice to be secretary of the Department of Health and Human Services. The FDA is part of his department. "He comes with his own reputation within the Obama team," Cardin said. "It's not like he's an unknown quantity. And he has other support on Capitol Hill. He has significant contacts to the Obama administration. What I don't know is who the competition is and what the team is looking for." On blogs and in the press, Sharfstein is routinely mentioned on a short list of likely contenders for FDA commissioner. According to the Wall Street Journal, others being talked about are Cleveland Clinic cardiologist Steve Nissen, Duke University's Robert Califf, food and drug lawyer Frank Sasinowski and Janet Woodcock, head of FDA's drug center. William K. Hubbard, a former associate commissioner at the FDA, said that he has heard all of the buzz but that it's way too early to take any of it seriously. In his experience, the head of the FDA typically isn't named until spring at the earliest, after deputy commissioners and general counsel jobs are filled inside HHS. It is possible the appointment could happen more quickly this time, since the FDA and its troubles have been in the news over the past year. Problems have ranged from contaminated heparin doses from China to melamine in imported pet food to a salmonella outbreak that took weeks to contain. Still, Hubbard said, someone like Sharfstein - a doctor with experience in policymaking and management - could appeal to the new administration. "He fits a lot of the key criteria," Hubbard said. "He's a physician. He's a Democrat. He worked for a key Democrat in Congress. He's not a Clinton re-tread. He's a new face. He represents change." Sharfstein, who grew up in Montgomery County, is the son of two doctors and is married to another one, Yngvild Olsen, medical director of the Harford County Health Department. They have two sons, ages 6 and 8. Sharfstein has tackled health policy since his medical training. He was 24 when a paper on American Medical Association political contributions - co-written with his father - was published by the New England Journal of Medicine. Seven more peer-reviewed articles followed. He volunteered at the FDA, writing and editing portions of the agency's legal argument to regulate tobacco as an addictive drug. In Waxman's office, Sharfstein worked on various pieces of legislation related to the FDA, including one that forced the agency to regulate nonprescription colored contact lenses not as cosmetics but as medical devices. As Baltimore's health commissioner, Sharfstein has gone after the hazard of lead, banning its use in eyeliner and in candy and jewelry sold in the city. He also took on the makers of cough and cold medicines, convincing the FDA that there was little proof that the drugs worked in children under the age of 4 and evidence that they could cause harm. He is also a backer of the use of buprenorphine as a treatment for heroin addicts, and the city Health Department says heroin overdoses are down. But critics say addicts using what is known as "bupe" may be no better off than those using methadone. Cummings, who was one of Obama's early supporters in Congress, said Sharfstein would "be ideal" in the post - except that the city would lose an important leader in public health.
2024-06-03T01:26:36.242652
https://example.com/article/6624
Wilhelm Mautner Wilhelm Mautner (1889-1944) was born in Vienna. He was an Austrian-German economist and attorney-in-fact of the Rotterdamse Bank who spent a part of his life in the Netherlands. Mautner was born Jewish. He was also an art collector. Early years After a short professional career in banking and industry, he studied economics in Paris, Vienna and Tübingen, where he finished his studies and wrote a thesis about Bolshevism in 1919. In the same year, he moved to the Netherlands. World War II From 1929 until 1944 he lived in Amsterdam. Mautner never married and had no children. On 22 July 1941, he drew up a will in which he appointed his brother in Ohio in the United States as his sole heir. During the war Mautner attempted unsuccessfully to escape from the Nazi regime. Mautner tried to get an exit visa for the United States with the help of his brother, who lived in New York. In December 1943 Mautner was removed from his home in Amsterdam during a raid and transported to Westerbork transit camp and from there to Theresienstadt concentration camp. Mautner died on or around 29 September 1944 in Auschwitz concentration camp. Art collection Mautner collected paintings. His collection also included some Dutch old masters. He continued purchasing works of art during the war. At that time he was in frequent contact with Max Jakob Friedlander. From 1941, he was no longer able to do so in his own name because of his Jewish origins. He gave works of art to various people for safekeeping. In February 1942, Mautner was ordered to move to Tugelaweg in Amsterdam as a result of the forced relocation of Jews. He sent 15 paintings for safe-keeping with the collector Dr J. van Dongen on the city's Museumplein. The latter kept all of these items until after the war. Other works, including a Brueghel and a Timmermann, were sold under duress in 1943 by Mautner. Various of Mautner's works of art and other possessions were recovered for his heirs, by custodians of his estate after the war. The 15 paintings in J.A. van Dongen's custody were probably bought by van Dongen with the consent of Mautner's heirs. Three of the paintings that Mautner sold under duress are: The latter two were acquired by the Sonderauftrag Linz and returned to the Netherlands after the war, where they became part of the NK-Collection of the Stichting Nederlands Kunstbezit. He also sold 12 paintings, primarily 19th century, to W. Kadzik from Vienna. Mautner could not act as a seller, due to his Jewish origin, so he asked his friend Hans Alfred Wetzlar to fulfill the formalities. It is unknown where the works are. Published works Mautner, Wilhelm (1929). Der Kampf um und gegen das russische Erdöl Wien, Leipzig, Manz. Manzsche Verlags- und Universitäs-Buchhandlung. Mautner, Wilhelm (1920). Der Bolschewismus Berlin, Kohlhammer. Mautner, Wilhelm (1923). Die Verschuldung Europas Frankfurt am Main, Frankfurter societäts-druckerei. Mautner, Wilhelm (1937). American capital in the D.E.I. petroleum industry Dallas, Texas, DeGolyer and MacNaughton. Mautner, Wilhelm (1934) (possibly, or Wilhelm Martin, former director of the Mauritshuis) Article in Weltkunst February 17, 1934 Ein Neuentdeckter Steen Mautner, Wilhelm (1934). Article in Oud Holland about painter Hendrick Andriessen Mautner, Wilhelm (1941). Article in Oud Holland general essay about unknown Old Masters References Links http://www.restitutiecommissie.nl/en/recommendations/recommendation_189_a.html http://restitutiecommissie.nl/en/recommendations/recommendation_189_b.html http://www.sothebys.com/en/auctions/ecatalogue/2011/old-master-british-paintings-evening-l11033/lot.11.html http://commons.wikimedia.org/wiki/File:Franz_Timmermann_-_Die_Enthauptung_Johannes_des_T%C3%A4ufers_%281534%29.jpg Category:1889 births Category:1944 deaths Category:People from Vienna Category:Austrian people who died in Auschwitz concentration camp Category:Austrian Jews who died in the Holocaust Category:Austrian economists Category:Austrian art collectors Category:Art and cultural repatriation after World War II Category:Looting Category:Jewish art collectors Category:Dutch art collectors Category:Businesspeople from Amsterdam Category:19th-century Jews Category:20th-century economists
2023-10-18T01:26:36.242652
https://example.com/article/2338
Unlawfully promoted Paxil for treating depression in patients under age 18, even though the FDA has never approved it for pediatric use. Participated in preparing, publishing and distributing a misleading medical journal article which reported that a clinical trial of Paxil demonstrated efficacy in the treatment of depression in patients under age 18, when the study failed to demonstrate efficacy. Did not make available data from two other studies in which Paxil also failed to demonstrate efficacy in treating depression in patients under age 18. (Paxil now includes a warning regarding the potential for suicidal behavior if taken by those under 18.) Sponsored dinner programs, lunch programs, spa programs and similar activities to promote the use of Paxil in children and adolescents. GSK paid a speaker to talk to an audience of doctors and paid for the meal or spa treatment for the doctors who attended. Wellbutrin Promoted Wellbutrin for weight loss, the treatment of sexual dysfunction, substance addictions and attention deficit hyperactivity disorder, among other off-label uses, even though it was only approved for major depressive disorder. Paid millions of dollars to doctors to speak at and attend meetings, sometimes at lavish resorts, at which the off-label uses of Wellbutrin were routinely promoted. Failed to include certain safety data about Avandia, a diabetes drug, in reports to the FDA that are meant to allow the FDA to determine if a drug continues to be safe for its approved indications and to spot drug safety trends. The missing information included data regarding certain post-marketing studies, as well as data regarding two studies undertaken in response to European regulators' concerns about the cardiovascular safety of Avandia. Civil Settlement Agreement According to terms of the civil settlement agreement, GSK was found guilty of promoting the drugs Paxil, Wellbutrin, Advair, Lamictal and Zofran for off-label, non-covered uses, and paying kickbacks to physicians to prescribe those drugs as well as the drugs Imitrex, Lotronex, Flovent and Valtrex; making false and misleading statements concerning the safety of Avandia; reporting false best prices and underpaying rebates owed under the Medicaid Drug Rebate Program. The punishment: Pay $3 billion to resolve its criminal and civil liability; execute a five-year corporate integrity agreement with the Department of Health and Human Services. The above is taken directly from the press release issued by the U.S. Department of Justice.1 And while this all sounds like a big bust for the feds, this is how GSK reported the event:2 "Under the terms of the settlement, GSK will plead guilty to misdemeanor violations"; "Fundamental changes to US compliance, marketing and selling procedures [were] implemented in recent years"; and "GSK will make payments totalling $3 [billion] which are covered by existing provisions and will be funded through existing cash resources." [Emphasis added] So, at the end of the day, after getting caught in a well-orchestrated scheme of fraud, kickbacks and rewards that influenced many MDs and potentially endangered the lives of millions of patients, many of those children, GSK pleads guilty to a few misdemeanors, pays some fines from cash reserves and agrees to marketing changes, most of which were already in place. In fact, "GSK stock rose after news of the settlement, climbing 1.6% to a share price of $46.30."3 Perhaps the saddest part of all is that GSK can go right on selling the very drugs in question. It didn't lose its license to sell these drugs and is not banned from making more money in the Medicare and Medicaid programs. Make no mistake: This was a marketing campaign that is probably similar to campaigns used to market most drugs. In this case, GSK got caught and had to give back some of its profits; but the power of Big Pharma is still growing and still impacting the health of most consumers. References "GlaxoSmithKline to Plead Guilty and Pay $3 Billion to Resolve Fraud Allegations and Failure to Report Safety Data." Department of Justice, Office of Public Affairs, July 2, 2012. "GlaxoSmithKline Concludes Previously Announced Agreement in Principle to Resolve Multiple Investigations With US Government and Numerous States." GSK press release, July 2, 2012.
2024-07-13T01:26:36.242652
https://example.com/article/7325
5 Takeaways from the March FOMC Minutes The minutes of the March FOMC meeting got released yesterday, and the Greenback tossed and turned, but ultimately tanked as a result. What’s up with that? Well, here are the key takeaways from the meeting minutes that you may wanna know about. USD Index: 15-Minute Forex Chart 1. Only “gradual” pace of tightening And the minutes of the March meeting affirmed this, since “most participants anticipated that gradual increases in the federal funds rate would continue.” This came with the usual caveats, though, namely that the “economy [continues] to perform about as expected.” However, Fed officials did emphasize that “that they stood ready to change their assessments of, and communications about, the appropriate path for the federal funds rate in response to unanticipated developments.” In other words, the Fed could hike at a faster pace or a slower pace as a response to “unanticipated developments.” And the minutes mentioned the following as examples of “unanticipated developments” that may lead to a faster pace of tightening. “the possibility of stronger spending by businesses and households as a result of improved sentiment“ “appreciably more expansionary fiscal policy“ “a more rapid buildup of inflationary pressures than anticipated“ The following, meanwhile, may convince the Fed to downgrade their rate hike projections. “financial markets were to experience a significant correction“ “potential developments abroad that could have adverse implications for the U.S. economy,” particularly “upcoming elections in EU countries“ “the dollar could appreciate substantially further“ 2. Why the dissenter dissented (and may keep doing so) And according to the minutes, Minneapolis Fed President Neel Kashkari didn’t want to vote for a rate hike because in his view, “the recent data had not pointed to further progress on the Committee’s dual objectives.” In addition Kashkari, “preferred that when data do support a removal of monetary policy accommodation, the FOMC first publish a detailed plan to normalize its balance sheet before proceeding with further increases in the federal funds rate.” I guess that means we can expect Kashkari to keep voting against a rate hike until the Fed comes to a consensus on what to do with its balance sheet, huh? Speaking of the Fed’s balance sheet… 3. Potential balance sheet policy shift “later this year” For those who don’t know, the Fed currently has about $4.5 trillion worth of assets in its balance sheet. And the great bulk of those assets happen to be U.S. government bonds and mortgage-backed securities, thanks to the Fed’s QE program. And the Fed’s current policy is to maintain its massive balance sheet by reinvesting principal payments, thereby creating artificial demand in the bond market, which depresses bond yields and helps keep long-term borrowing costs low. However, the minutes revealed that “a change to the Committee’s reinvestment policy would likely be appropriate later this year.” Fed officials were divided on how to do this, but they “generally preferred” either: an approach that phased out reinvestments, or an approach that ended reinvestments all at once. According to the minutes, a phased out approach “was seen as reducing the risks of triggering financial market volatility.” An approach that ends reinvestment immediately, meanwhile, “was generally viewed as easier to communicate while allowing for somewhat swifter normalization of the size of the balance sheet.” Moving on, Fed officials were also divided on what they would use as a trigger for implementing this balance sheet policy shift. “Several participants” argued that the trigger should be “tied to the target range for the federal funds rate.” In other words, keep hiking to a certain level before implementing the balance sheet policy shift. Meanwhile, “Some other participants” argued that “the timing should depend on a qualitative judgment about economic and financial conditions.” In any case, “Nearly all participants agreed that the Committee’s intentions regarding reinvestment policy should be communicated to the public well in advance of an actual change.” 4. Fed officials uncertain about Trump, but… The Fed thinks that there is “considerable uncertainty about the timing and nature of potential changes to fiscal policies as well as the size of the effects of such changes on economic activity.” As such, “about half of the participants did not incorporate explicit assumptions about fiscal policy in their projections.” However, “most participants” viewed fiscal stimulus “as an upside risk to their economic forecasts.” Although “some participants” also expressed concern that Trump’s “America First” policies on immigration and trade may be possible “downside risks to labor force and economic growth.” This raises a question, though. If the other half incorporated fiscal policy into their projections, and most of them think that fiscal policy would be a positive thing, then would that mean that they would downgrade their projections if Trump keeps hitting speed bumps like the recent failure of the healthcare bill? Thankfully, the minutes revealed that “several participants now anticipated that meaningful fiscal stimulus would likely not begin until 2018.” In other words, Trump’s fiscal policy is not really a major factor in the Fed’s projections (for this year at least) . 5. Fed worried about stock market? According to the minutes, “Many participants discussed the implications of the rise in equity prices over the past few months.” In addition, “Some participants viewed equity prices as quite high relative to standard valuation measures.” Moreover, “A few participants attributed the recent equity price appreciation to expectations for corporate tax cuts or to increased risk tolerance among investors rather than to expectations of stronger economic growth.” In simpler terms, “A few participants” think that the U.S. equities rally was fueled by speculation on Trump’s tax plans. And as mentioned earlier, “a significant correction” in financial markets was listed as one of the downside risks to the Fed’s economic projections. Final Thoughts Interestingly enough, the CME Group’s FedWatch Tool shows that odds for a June rate hike actually improved from 62.1% to 66.5% after the minutes got released. June Rate Hike Odds (As of April 5) And the likely reason for this is that Yellen said during her February testimonies that the Fed won’t be shrinking the balance sheet until the Fed Funds rate is “high enough to be reduced again in the event of economic turbulence.” Yellen didn’t define what “high enough” means, but the main takeaway here is that the Fed will very likely continue hiking first before changing their balance sheet policy. As such, odds for another rate hike got reinforced. And it also explains why the Greenback initially tried to jump higher when the minutes revealed that the Fed may change its balance sheet policy “later this year.” If that is the case, then why did the Greenback ultimately tank? Well, the most commonly cited reason by market analysts is that the market was disappointed by the Fed’s affirmation of its “gradual” path of tightening, as well as the market’s realization that a change in Fed’s the balance sheet would mean less rate hikes in the future. And as the CME Group’s FedWatch Tool shows, the market is not entirely convinced that the Fed can deliver on two more rate hikes, since odds for two more rate hikes by the December FOMC statement only came in at 55.9%. Although it did admittedly improve from 54% after the meeting minutes got released. By the way, if you’re not familiar with the FedWatch Tool and what it’s all about, you may wanna check out for my primer for it here. December Rate Hike Odds (As of April 5) There were also other details that may have weighed down on the Greenback, such as Kashkari’s really dovish stance and hints that he may keep voting against a hike. In addition the Greenback may have been dragged lower when U.S. equities got sold off in the wake of the FOMC minutes. After all, some Fed officials did point out that U.S. equities were rather overvalued, with “A few participants” expressing concern that the U.S. equities rally was fueled by speculation rather than fundamentals. Anyhow, now that you know that the Fed may change its balance sheet policy “later this year,” and now that you know that the market is not entirely convinced that the Fed would be able to pull off two more hikes this year, what are your own rate hike expectations going forward? We introduce people to the world of currency trading, and provide educational content to help them learn how to become profitable traders. We're also a community of traders that support each other on our daily trading journey.
2023-08-03T01:26:36.242652
https://example.com/article/5501
Q: Integral cohomology of $SU(n)$ - looking for constants I am interested in explicit generators of the cohomology $H^\bullet(SU(n),\mathbb{Z})$. Let $\omega = g^{-1} dg$ be the Maurer-Cartan form on $SU(n)$. The forms $\alpha_3,\alpha_5,\dots,\alpha_{2n-1}$, defined by $$ \alpha_k := \text{Tr}(\omega^{k})$$ are bi-invariant and define classes in de Rham cohomology. It is well-known that the cohomology algebra $H^\bullet(SU(n),\mathbb{R})$ is an exterior algebra in $\alpha_3,\dots,\alpha_{2n-1}$. More precisely, my question is thus the following: find the optimal constants $C_k$ such that $C_k \cdot \alpha_k$ is an integral class. For $n=2$, I have found in the literature that $C_3$ is $(24\pi^2)^{-1}$. But I cannot find a reference for the higher dimensions. I expect that $C_k = q_k \cdot \pi^{-(k+1)/2}$, with $q_k$ some rational number, because of the volume of the sphere $\mathbb{S}^{2k-1}$, but I have no precise proof. It seems from the comments in Cohomology of the unitary group that an interpretation in terms of transgression can solve my problem but I am not very familiar with this. Thanks! A: It seems the required coefficient is given in R. Bott and R. Seeley. Some remarks on the paper of Callias: "Axial anomalies and index theorems on open spaces". Comment. Math. Phys. 62 (1978), 235-245. link to paper on Project Euclid The discussion on p.237 says that $$ \left(\frac{i}{2\pi}\right)^m\frac{(m-1)!}{(2m-1)!}\alpha_{2m-1} $$ corresponds, under the identification ${\rm H}^{2m-1}({\rm U}(n),\mathbb{Z})\cong {\rm Hom}({\rm H}_{2m-1}({\rm U}(n),\mathbb{Z}),\mathbb{Z})$, to a generator of the image of the Hurewicz map $\pi_{2m-1}({\rm U}(n))\to{\rm H}_{2m-1}({\rm U}(n),\mathbb{Z})$. A: OK, I have understood how it works. This is classical material but it seems difficult to find an answer in the literature for the non-specialist; so let me explain. We consider the universal bundle $E U(n) \rightarrow B U(n)$ with fiber $U(n)$. Since $E U(n)$ is contractible, the Serre spectral sequence of the fibration gives information on the cohomology of $U(n)$. I recall that $H^{\bullet}(BU(n),\mathbb{Z}) = \mathbb{Z}[c_1,c_2,\dots,c_n]$, where $c_p$ is of degree $2p$. What the spectral sequence says is that to each $c_p$ corresponds a class $x_p$ in $H^{2p-1}(U(n),\mathbb{Z})$ which transgresses $c_p$. In order to answer my question, we need to understand how to express these $x_p$ in terms of $c_p$. Let $I = I(\mathfrak{u}(n))^{U(n)}$ be the space of invariant polynomials on $\mathfrak{u}(n)$. The Chern-Weil isomorphism $W$ gives that $I \cong H^{2\bullet}(BU(n),\mathbb{R})$. If $P$ is of degree $l$ in $I$, we can consider the cohomology class $W(P)$ and transgress it to get a cohomology class of degree $2l-1$ in $U(n)$; denoting by $TP$ the class obtained, it can be shown that $$ TP = \frac{(-1)^{l-1}}{2^{l-1} {2l-1 \choose l} } P(\omega \wedge [\omega,\omega]^{l-1})$$ (see equation 3.10 in Chern-Simons, Characteristic Forms and Geometric Invariants ; a minus one seems to be missing in the denominator). The conclusion is that we have to know which invariant polynomials give integral classes on $H^{2\bullet}(BU(n),\mathbb{Z})$. But of course, these are just the polynomials used in order to compute the Chern classes of a vector bundle. Since the polynomials that I consider in my question correspond to the Chern character, one has to relate the Chern character and Chern class in order to answer. Take $l=2$ for instance. We define the polynomial $ch_2(A) = \frac{-1}{8\pi^2}\text{Tr}(A^2)$. If $c_1$ and $c_2$ are the first and second Chern polynomials, one has $$ ch_2 = \frac{1}{2}(c_1^2 - 2c_2).$$ The transgression $Tc_1^2$ vanishes so that $Tch_2 = Tc_2$ is an integral class (and this is optimal for the constant). This gives that $\frac{1}{48\pi^2} \text{Tr}(\omega \wedge [\omega,\omega]) = \frac{1}{24\pi^2} \text{Tr}(\omega^3)$ is an integral class, as was claimed. Edit --- With the same method, one can compute the constants for $l=3$ but this is quite subtle. First, we define $$ ch_3 = \frac{1}{6}(c_1^3 - 3c_1 c_2 + 3c_3)$$ so that $ch_3(A) = \frac{1}{6}\Big(\frac{1}{2\pi i}\Big)^3 \text{Tr}(A^3)$. The transgression of $c_1^3$ is zero and the transgressions of $c_1 c_2$ and $c_3$ are of course integral. This shows that the transgression of $2ch_3$ is integral. Computing, this gives $T(2ch_3) = \frac{1}{24 \pi^3} \frac{1}{10} \text{Tr}(\omega^3)$. (I forget the $i$-factor) If one uses Matthias formula, he will find that $\frac{1}{480 \pi^3} \text{Tr}(\omega^3)$ is integral, which is better by a factor $2$. In fact, the class $c_1 c_2 - c_3$ is always even. This is one of the so-called Schwarzenberger condition. This shows that in fact $T(ch_3)$ is integral and explains the $2$-factor. This discussion shows that the optimal constant can be difficult to obtain, from both methods (since indeed, there is no guarantee that the Hurewicz map maps to a non-divisible class). Anyway, the picture is very nice :-). Remark that in general the formula of Matthias exactly says that the transgression of $ch_l$ is integral, which is not obvious to me. A: I got confused by some of the remarks in the other answers and so decided to work it out for myself. Hopefully, the following is helpful to people who stumble upon this question like me. One can indeed use transgression as discussed in Jeremy Daniel's answer in order to settle this problem, since the generators of $H^*(BU; \mathbb{Z})\cong \mathbb{Z}[c_1,c_2,\dots]$ are well known and given by the Chern classes. The following properties of the transgression map $T$ are important for us: The transgression of nontrivial cup products is $0$, and therefore we have that $(-1)^{k-1} (k-1)! T(ch_k) = T(c_k)$ for the Chern character/ Chern classes Transgressing the Chern character $ch_k$ two times in the path loop fibration gives the Chern character $ch_{k-1}$ in one degree lower under the identification of $\Omega^2 BU \sim BU$, since the Chern character is compatible with Bott periodicity Transgression of an integral class must always give an integral class It is clear from this that the transgression $T(ch_k) = (-1)^{k-1}\left(\frac{i}{2 \pi}\right)^k \frac{(k-1)!}{(2k-1)!} \alpha_{2k-1}$ cannot be the image of an integral generator under the coefficient homomorphism $H^{2k-1}(U;\mathbb{Z})\to H^{2k-1}(U;\mathbb{R})$ in general, since transgressing again in the path loop fibration would then yield that $T(T(ch_k)) = ch_{k-1}$ is an integral cohomology class, which is wrong for $k>2$. What is claimed in Matthias Wendt's answer is still true: If we are in the stable range, then on a smooth map $f\colon S^{2k-1}\to U(n)$ which generates the homotopy group $\pi_{2k-1}(U(n)) = \mathbb{Z}$, this form evaluates to $\int_{S^{2k-1}} f^* T(ch_k)=1$. The crucial point here is though that the image of such a generator under the Hurewicz homomorphism $h\colon \pi_{2k-1}(U) \to H_{2k-1}(U;\mathbb{Z})$ is divisible by exactly $(k-1)!$. This can be deduced from the last corollary in chapter 8 in Bott, Raoul. The space of loops on a Lie group. Michigan Math. J. 5 (1958), no. 1, 35--61. doi:10.1307/mmj/1028998010. https://projecteuclid.org/euclid.mmj/1028998010, which gives the corresponding statement for BU. This means that $(k-1)! T(ch_k)$ is an integral generator, which is consistent with the fact that transgression is an integral isomorphism and therefore must map the Chern classes to integral generators. Therefore, the optimal constant that makes the forms $\alpha_{2k-1}$ into integral generators should be $a_k = \left(\frac{i}{2 \pi}\right)^k \frac{((k-1)!)^2}{(2k-1)!}$.
2023-12-19T01:26:36.242652
https://example.com/article/3836
# syntax = docker/dockerfile:experimental # Interim container so we can copy pulumi binaries # Must be defined first ARG PULUMI_VERSION=latest ARG PULUMI_IMAGE=pulumi/pulumi-base FROM ${PULUMI_IMAGE}:${PULUMI_VERSION} as pulumi # The runtime container FROM registry.access.redhat.com/ubi8/ubi-minimal:latest WORKDIR /pulumi/projects # Install needed tools, like git RUN --mount=target=/var/cache/yum,type=cache \ microdnf install -y \ git \ tar \ python3 \ python3-pip \ ca-certificates && \ pip3 install --user pipenv # Uses the workdir, copies from pulumi interim container COPY --from=pulumi /pulumi/bin/pulumi /pulumi/bin/pulumi COPY --from=pulumi /pulumi/bin/*-python* /pulumi/bin/ ENV PATH "/pulumi/bin:${PATH}" CMD ["pulumi"]
2023-10-29T01:26:36.242652
https://example.com/article/5879
Q: How to insert multiple HTML checklist values into PHP? I am trying to insert multiple checklist values into an if-else condition. I seem to only get a single value inserted in the condition even if I check multiple values. My code is: <?php $db_host = 'localhost'; // Server Name $db_user = 'root'; // Username $db_pass = ''; // Password $db_name = 'assign'; // Database Name $conn = mysqli_connect($db_host, $db_user, $db_pass, $db_name); if (!$conn) { die ('Failed to connect to MySQL: ' . mysqli_connect_error()); } ?> <html> <body> <div class="form-style-8"> <center><h2>Make a Choice</h2></center> <form action="#" method="post"> <input type="checkbox" name="choice[]" value="bat">Batting</input> <input type="checkbox" name="choice[]" value="bwl">Bowling</input> <input type="checkbox" name="choice[]" value="fld">Fielding</input> <input type="submit" name="submit" value="Submit"/> </form> </div> </body> <?php if(isset($_POST['submit'])){ if(!empty($_POST['choice'])){ foreach($_POST['choice'] as $selected){ if($selected == "bat"){ header('Location: Batting.php'); } else if($selected == "bwl"){ header('Location: Bowling.php'); } else if($selected == "fld"){ header('Location: Fielding.php'); } else if($selected == "batbwl" || $selected == "bwlbat"){ header('Location: BatBwl.php'); } } } } ?> </html> As you can see, I am trying to get to values together as "batbwl" as that is what echoes if I do "echo $selected;" but its only passing only bwl onto the condition. Can anyone help me fix this? A: Don't use for such situations. try this <html> <body> <div class="form-style-8"> <center><h2>Make a Choice</h2></center> <form action="#" method="post"> <input type="checkbox" name="choice[]" value="bat">Batting</input> <input type="checkbox" name="choice[]" value="bwl">Bowling</input> <input type="checkbox" name="choice[]" value="fld">Fielding</input> <input type="submit" name="submit" value="Submit"/> </form> </div> </body> <?php if(isset($_POST['submit'])){ if(!empty($_POST['choice'])){ if((@$_POST['choice'][0] == "bat") && (@$_POST['choice'][1] == "bwl")){ header('Location: BatBwl.php'); } else if($_POST['choice'][0] == "bwl"){ header('Location: Bowling.php'); } else if($_POST['choice'][0] == "fld"){ header('Location: Fielding.php'); } else if($_POST['choice'][0] == "bat"){ header('Location: Batting.php'); } } } ?> </html>
2023-08-20T01:26:36.242652
https://example.com/article/3518
Q: jQuery scrollTo text or scrollTo String I have this string like: Life is a characteristic distinguishing physical entities having signaling and self-sustaining processes from those that do not,[1][2] either because such functions have ceased (death), or because they lack such functions and are classified as inanimate.[3][4][5] Biology is a science concerned with the study of life. The smallest contiguous unit of life is called an organism. Organisms are composed of one, or more, cells, undergo metabolism, maintain homeostasis, can grow, respond XXXXXX to stimuli, reproduce and, through evolution, adapt to their environment in successive generations.[1] A diverse array of living organisms can be found in the biosphere of Earth, and the properties common to these organisms—plants, animals, fungi, protists, archaea, and bacteria—are a carbon- and water-based cellular form with complex organization and heritable genetic information. The Earth was formed about 4.54 billion years ago. The earliest life on Earth existed at least 3.5 billion years ago,[6][7][8] during the Eoarchean Era when sufficient crust had solidified following the molten Hadean Eon. The earliest physical evidence for life on Earth is biogenic graphite in 3.7 billion-year-old metasedimentary rocks discovered in Western Greenland[9] and microbial mat fossils found in 3.48 billion-year-old sandstone discovered in Western Australia.[10][11] Nevertheless, several studies suggest that life on Earth may have XXXXXXXXX started even earlier,[12] as early as 4.25 billion years ago according to one study,[13] and even earlier yet, 4.4 billion years ago, according to another study.[14] The mechanism by which life began on Earth is unknown, although many hypotheses have been formulated. Since emerging, life has evolved into a variety of forms, which biologists have classified into a hierarchy of taxa. Life can survive and thrive in a wide range of conditions. Though life is confirmed only on the Earth, many think that extraterrestrial life is not only plausible, but probable or inevitable.[15][16] Other planets and moons in the Solar System have been examined for evidence of having once supported simple life, and projects such as SETI have attempted to detect radio transmissions from possible alien civilizations. According to the panspermia hypothesis, XXXXXXXXXXmicroscopic life exists throughout the Universe, and is distributed by meteoroids, asteroids and planetoids.[17] The meaning of life—its significance, origin, purpose, and ultimate fate—is a central concept and question in philosophy and religion. Both philosophy and religion have offered interpretations as to how life relates to existence and consciousness, and on related issues such as life stance, purpose, conception of a god or gods, a soul or an afterlife. Different XXXXXXXXXXXXXcultures throughout history have had widely varying approaches to these issues. I have the following elements: <input type="button" value="Prev" id="P" name="P"> <input type="button" value="Next" id="N" name="N"> and a Textarea <textarea id="enterAnyText"></textarea> When the user clicks on that input #P, the page should scroll to the previous XXXXXXXXX or whatever text they(the user) inserted in the textarea, with a nice animation. When the user clicks on that input #N, the page should scroll to the next XXXXXXXXXor whatever text they(the user) inserted in the textarea, with a nice animation. The animation should not be too much fast and should be fluid. I am running the latest jQuery version and there is no database. The text is randomly generated from different story books... so XXXXXXX might signify any word, string or text they want to search inside the randomly generated looong text from a story book. PLEASE NOTE: The story books are save in .html files i.e story1.html, story2.html.... They are loaded inside divs using jQuery.load() EDIT2: We tried to use i.e. jQuery("p:contains(txt)") but that scrolls to the parent p tag not the text or word itself a paragraph like: The Earth was formed about 4.54 billion years ago. The earliest life on Earth existed at least 3.5 billion years ago,[6][7][8] during the Eoarchean Era when sufficient crust had solidified following the molten Hadean Eon. The earliest physical evidence for life on Earth is biogenic graphite in 3.7 billion-year-old metasedimentary rocks discovered in Western Greenland[9] and microbial mat fossils found in 3.48 billion-year-old sandstone discovered in Western Australia.[10][11] Nevertheless, several studies suggest that life on Earth may have a paragraph like: The Earth was formed about 4.54 billion years ago. The earliest life on Earth existed at least 3.5 billion years ago,[6][7][8] during the Eoarchean Era when sufficient crust had solidified following the molten Hadean Eon. The earliest physical evidence for life on Earth is biogenic graphite in 3.7 billion-year-old metasedimentary rocks discovered in Western Greenland[9] and microbial mat fossils found in 3.48 billion-year-old sandstone discovered in Western Australia.[10][11] Nevertheless, several studies suggest that life on Earth may have a paragraph like: The Earth was formed about 4.54 billion years ago. The earliest life on Earth existed at least 3.5 billion years ago,[6][7][8] during the Eoarchean Era when sufficient crust had solidified following the molten Hadean Eon. The earliest physical evidence for life on Earth is biogenic graphite in 3.7 billion-year-old metasedimentary rocks discovered in Western Greenland[9] and microbial mat fossils found in 3.48 billion-year-old sandstone discovered in Western Australia.[10][11] Nevertheless, several studies suggest that life on Earth may have XXXXXXXXX will scroll to the p but not the XXXXXXXXXXX Any suggestion is highly praised. A: You could potentially do it this way. HTML <p>Here is a paragraph</p> </p>Here is another paragraph</p> <input type="button" value="previous" id="previous" /> <input type="text" placeholder="enter a searchstring" /> <input type="button" value="next" id="next" /> Keep in mind that this HTML won't actually scroll as its probably a lot shorter than your screen. Instead of scrolling, add a console log in the code below to see that it is pointing to right position from the top. jQuery // the following function will search for all 'tags' containing 'value' in DOM order var working = false; function searchWordsReturnOffsets(value, tags){ // this will prevent the function from executing while its still in an execution cycle. if(working) return; else working = true; var all = []; $(tags).each(function(){ if($(this).text().indexOf(value) >= 0){ // temporarily wrap them in a findable object we can locate $(this).html($(this).html().replace(value,"<span class='searchvalue'>" + value + "</span>")); // lets do another foreach to find every instances' offset $(this).find("span.searchvalue").each(function(){ all.push($(this).offset().top); }); // remove the findable objects again $(this).html($(this).html().replace("<span class='searchvalue'>" + value + "</span>",value)); } }); return all; } $(document).ready(function(){ var current = 0; var positions = []; $("#search").on("keyup", function(){ // here we will keep track of the paragraphs and reset to the first positions = searchWordsReturnOffsets($(this).val(), "p"); current = 0; $("body,html").animate({scrollTop : positions[current]}); }); $("#next").click(function(){ if(positions[current + 1] != undefined){ current++; $("body,html").animate({scrollTop : positions[current]}); } }); $("#previous").click(function(){ if(positions[current - 1] != undefined){ current--; $("body,html").animate({scrollTop : positions[current]}); } }); }); <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js"></script> <script type="text/javascript"> var working = false; function searchWordsReturnOffsets(value, tags){ if(working) return; else working = true; var all = []; $(tags).each(function(){ if($(this).text().indexOf(value) >= 0){ $(this).html($(this).html().replace(value,"<span class='searchvalue'>" + value + "</span>")); $(this).find("span.searchvalue").each(function(){ all.push($(this).offset().top); }); $(this).html($(this).html().replace("<span class='searchvalue'>" + value + "</span>",value)); } }); working = false; return all; } $(document).ready(function(){ var current = 0; var positions = []; $("#search").on("keyup", function(){ positions = searchWordsReturnOffsets($(this).val(), "p"); current = 0; if(positions[current] != undefined){ console.log(positions[current]); } }); $("#next").click(function(){ if(positions[current + 1] != undefined){ current++; console.log(positions[current]); } }); $("#previous").click(function(){ if(positions[current - 1] != undefined){ current--; console.log(positions[current]); } }); }) </script> <p>Here is a paragraph</p> <p>Here is another paragraph<br/>With a second line to see we get three results when searching 'ere'.</p> <input type="button" value="previous" id="previous" /> <input type="text" placeholder="enter a searchstring" id="search" /> <input type="button" value="next" id="next" />
2024-04-02T01:26:36.242652
https://example.com/article/5043
780 F.2d 1015 Mobleyv.Heckler 85-1091 United States Court of Appeals,Third Circuit. 11/12/85 1 E.D.Pa. VACATED AND REMANDED
2024-07-30T01:26:36.242652
https://example.com/article/1568
Deletion of the N-terminus of a K+ channel brings about short-term modulation by cAMP and beta 1-adrenergic receptor activation. On deletion of the N-terminus of RCK1 K+ channel, acute modulation of the channel by cAMP-elevating treatments is revealed. This modulation is studied in Xenopus oocytes using two-electrode voltage-clamp, site-directed mutagenesis, and SDS-PAGE analyses. Treatments by Sp-8-Br-cAMPS, a membrane-permeant cAMP analog, and by isoproterenol, a beta 1-adrenergic receptor (beta 1R) agonist, both increased the current amplitudes with no effect on the voltage dependency of activation. The effect of isoproterenol was blocked by coexpression of either G alpha S or G alpha i3 proteins. The channel protein is phosphorylated on the Sp-8-Br-cAMPS treatment at Ser446; however, a phosphorylation-deficient variant in which this site has been altered is still modulated by Sp-8-Br-cAMPS and isoproterenol. Expression of the full-length channel with Kv beta 1.1 auxiliary subunit renders the channel at the same modulation as that of the truncated one. Taken together, the RCK1 channel can be acutely modulated by cAMP and beta 1R activation possibly through protein kinase A (PKA) activation, but not through direct channel phosphorylation; the involvement of the N-terminus in this modulation is discussed.
2024-04-03T01:26:36.242652
https://example.com/article/7746
[The stream has ended.] President Donald Trump on Monday called a shooting massacre in Las Vegas "an act of pure evil." The Sunday night shooting, the deadliest in United States history, left 58 people dead and more than 500 injured. A gunman opened fire from the 32nd floor of the Mandalay Bay Resort and Casino on an outdoor country music festival, sending the crowd of more than 22,000 running and ducking for cover. The gunman, 64-year-old Stephen Paddock, is dead. Trump said he will visit Las Vegas on Wednesday. Read more: Trump: Las Vegas shooting 'was an act of pure evil' At least 50 dead, 400+ sent to hospitals in Las Vegas; shooting becomes deadliest in US history
2023-12-03T01:26:36.242652
https://example.com/article/7340
<!doctype html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <title>Document</title> <script src="./jquery.min.js"></script> <!-- Latest compiled and minified CSS & JS --> <link rel="stylesheet" media="screen" href="./bt3/css/bootstrap.min.css"> <script src="./bt3/js/bootstrap.min.js"></script> </head> <body> <nav class="navbar navbar-inverse" role="navigation" style="border-radius: 0;"> <div class="container"> <!-- Brand and toggle get grouped for better mobile display --> <div class="navbar-header"> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target=".navbar-ex1-collapse"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#">后盾人 houdunren.com</a> </div> <!-- Collect the nav links, forms, and other content for toggling --> <div class="collapse navbar-collapse navbar-ex1-collapse"> <ul class="nav navbar-nav"> <li class="active"><a href="#">Link</a></li> <li><a href="#">Link</a></li> </ul> <form class="navbar-form navbar-left" role="search"> <div class="form-group"> <input type="text" class="form-control" placeholder="Search"> </div> <button type="submit" class="btn btn-default">Submit</button> </form> <ul class="nav navbar-nav navbar-right"> <li> <a data-toggle="modal" href="#modal-id">注册</a> </li> </ul> </div><!-- /.navbar-collapse --> </div> </nav> <div class="modal fade" id="modal-id"> <div class="modal-dialog"> <div class="modal-content"> <div class="modal-header"> <button type="button" class="close" data-dismiss="modal" aria-hidden="true">&times;</button> <h4 class="modal-title">快来注册吧 ^_^</h4> </div> <div class="modal-body" style="padding: 40px;"> <form action="?a=reg" method="post" class="form-horizontal" role="form"> <div class="form-group"> <div class="col-sm-12"> <input type="email" name="email" id="inputID" class="form-control" value="" title="" required="required" placeholder="邮箱:一会儿这个邮箱要收验证码"> </div> </div> <div class="form-group"> <div class="col-sm-12"> <input type="password" name="password" id="inputID" class="form-control" value="" title="" required="required" placeholder="请输入密码"> </div> </div> <div class="form-group"> <div class="col-sm-12"> <input type="password" name="password_confirmation" id="inputID" class="form-control" value="" title="" required="required" placeholder="请确认密码"> </div> </div> <div class="input-group" style="margin-top: 20px;"> <input class="form-control" placeholder="请输入验证码" name="captcha" required="required"> <span class="input-group-btn"> <button class="btn btn-default" type="button" id="sendCaptcha">发送验证码</button> </span> </div> <input style="margin-top: 20px;" type="submit" class="btn btn-info btn-block" value="注册"> </form> </div> </div><!-- /.modal-content --> </div><!-- /.modal-dialog --> </div><!-- /.modal --> <script> $(function () { $('#sendCaptcha').click(function () { var email = $.trim($('[name=email]').val()); if (email == '') { alert('邮箱不能为空'); return; } //410004417@qq.com var reg = /^[0-9a-zA-Z-_]+@[0-9a-z]+\.[a-z]{2,3}(\.[a-z]{2,3})?$/g; if (!reg.test(email)) { alert('邮箱格式不正确'); return; } //发送异步发邮件 //倒计时开始 var button = $('#sendCaptcha'); //按钮禁用 button.attr('disabled', true); //倒计时 var countdownNum = 10; //第一次先写入一次 button.html(countdownNum + '秒之后再发送'); //启动定时器60秒 var timer = setInterval(function () { countdownNum--; //如果时间为0 if (countdownNum <= 0) { //清除定时 clearInterval(timer); button.html('发送验证码'); //解除disabled属性 button.attr('disabled', false); }else{ button.html(countdownNum + '秒之后再发送'); } }, 1000); }) }) </script> </body> </html>
2024-02-21T01:26:36.242652
https://example.com/article/8371
332 S.W.3d 222 (2010) CHAMPION BANK, Respondent, v. VISIONARY IMAGING, LLC, Robert, Lackamp and Thomas R. Frenz, Defendants, and Kenneth E. Mann, Appellant. No. ED 94416. Missouri Court of Appeals, Eastern District, Division Four. December 21, 2010. Motion for Rehearing and/or Transfer to Supreme Court Denied February 8, 2011. Application for Transfer Denied March 29, 2011. Michael Crawford, St. Louis, MO, for appellants. Llynn White, St. Louis, MO, for respondent. Before KURT S. ODENWALD, P.J., ROBERT G. DOWD, JR., J., and NANNETTE A. BAKER, J. ORDER PER CURIAM. Kenneth Mann ("Mann") appeals from the judgment of the Circuit Court of St. Louis County granting summary judgment *223 in favor of Champion Bank ("the Bank") for payment of a debt which Mann personally guaranteed. Mann raises two points on appeal. Mann claims the trial court erred in granting the Bank's motion for summary judgment because the guaranty agreement was voidable due to fraudulent misrepresentations made by the Bank. Mann also claims the trial court erred in granting summary judgment because there were genuine issues of material fact as to whether the bank's misrepresentations rendered the guaranty agreement voidable. No jurisprudential purpose would be served by a written opinion reciting the detailed facts and restating the principles of law. The parties have been furnished with a memorandum opinion for their information only, which sets forth the facts and reasons for this order. We affirm the judgment pursuant to Rule 84.16(b).
2024-02-21T01:26:36.242652
https://example.com/article/7119
Q: How to get the current web using client object model? i tried to get the current web using client object model. i am not able to get that..please guide me to find it I tried with the below code its not working.. ClientContext context = new ClientContext(ApplicationContext.Current.Url); A: Current Web works only for the Server Side code that executes inside SharePoint context. When in ClientContext you can get the web you want using the below code, it gives you the web that is refered by the URL you mentioned in the ClientContext Class. ClientContext context = new ClientContext(ApplicationContext.Current.Url); var web = site.Web; site.Load(web);
2024-05-09T01:26:36.242652
https://example.com/article/8262
The present application relates generally to cleaning exhaust gas. In particular, the present application relates to the sterilization of objects using hydrogen peroxide vapor and for the decomposing of hydrogen peroxide vapor exhausted during the process. Systems are available for the sterilization of objects, such as medical instruments, utilizing hydrogen peroxide vapor to effect sterilization. In such systems, the objects are placed in a sterilization chamber and hydrogen peroxide vapor is pumped in. After the objects are sterilized, exhaust comprising hydrogen peroxide vapor is exhausted from the chamber. A need exists for reducing the concentration of hydrogen peroxide exhausted from the system.
2024-01-14T01:26:36.242652
https://example.com/article/2128
HIV-infected health workers: how should we proceed? Mandatory testing may seem to be a solution at first glance, but many thorny and problematic issues could arise in the long run. Instead, more emphasis needs to be placed on maintaining the highest standards of infection control practice.
2023-11-10T01:26:36.242652
https://example.com/article/2159
Packing & Traveling Light Recommendations The following page was originally written after my wife and I returned from a trip in the early 1990s doing international development & education. We each fit everything needed for multi-week trip into a carry-on bag. This permitted our two check-through bags to be filled with educational materials that we would deliver to the project without paying shipping charges. Many of our colleagues brought a couple of huge bags for their own use. They asked how we managed to get everything into carry-on bags. This page started out as the write-up for our colleagues. Traveling light is just part of how I have tried to live a more minimalist life. The rational for everything I travel with can be found on my 2018 Stuff List MOTIVATION Traveling light by packing light has a number of advantages: Traveling light is a form of minimalism. By reducing material stuff you can be more focused on people and experiences. You are normally able to take your luggage as carry-on. When your luggage is carry-on you won't lose your luggage, you bag doesn't get thrown, dropped or otherwise abused, and if you have a tight connection you know your bag will be with you, wherever you end up. If you really need to change your clothing (or get something out of your bag) you can. You are able to handle your luggage yourself. If you carry your luggage more than a few feet (most of us end up doing this), you would like your luggage to be as small and light as possible. Transportation becomes simpler because you don't have to find someone who can transport a number of large bags. For example, some remote towns use motorcycles as taxis. Imagine trying to hold onto a number of huge bags on the back of a motorcycle. You will spend less time fighting with your bags, have less to keep track of, and less to worry about losing. By trimming what you carry down to the essentials you will spend less time on the trip thinking about "Is this the right outfit?" "Should I use X or Y today?" Packing light lets you use your check through luggage allotment for medical supplies and other items for service trips. Or, if you found a large, perfect gift for someone, you can bring it back as your check-through luggage. Remember the traveler's motto: It's better to bring half of what you think you need, and twice as much money. LUGGAGE RECOMMENDATIONS Luggage which is 7"x14"x20" will fit under nearly all commercial airplane seats, and is permitted as a carry-on bag on almost all airlines. Luggage which is 9x14x22 (45 linear inches) will fit under the seat in most commercial jets used in the USA and all overhead bins. There are two caviets. It is possible to overstuff soft side luggage to the point that it will not fit under a seat, so if you bag is bulging on the sides, you have packed too much. Just because you bag will fit under the seat in front of you doesn't mean that it will be acceptable carry-on. Some regional airlines limit carry-on bags to 5-7kg. There is a nice summary of carry one restrictions by airline, but you should contact your carrier since these restrictions can vary. OAG's Carry-on restrictions (2008) was great... I don't know where their current summary is. Some airlines permit one carry on, and a second personal item. Often the personal item must be under 9x10x17. In general I suggest staying away from wheeled bags. They cost more, add extra weight, and hold less than similarly size travel pack. I would generally recommend using a "travel pack" which is a cross between a backpack, and soft-side luggage. Travel packs will have often have light weight internal frames to make them easier to carry: handles on the top and side to carry as luggage, and backpack straps that tuck away. A close relative are travel duffel bags which tend to be simplier with a more "outdoor" style. When looking at travel packs make sure they are still under the limit for carry-ons! Feature and size creep has resulting in travel packs which are quite heavy and are too big to be used for carry-on. In roughly the order of my preferences here are the legal carry-on travel packs I think are worth looking at: Bags from Tom Bihn: All the bags made by Tom Bihm are amazingly well thought out, have great organizational features, carry well, and are top quality. Choice the bag that fits your packing need and style, but be prepared to pay for the quality. The cache laptop system is wonderful. On most trips I use a Synapse 25 Backpack. 25L is enough space for nearly all my trips, has three dimensional pockets that are nicely sized, water bottle pocket works well, carries well, durable without being over built. Peak Designs Traveler is a kickstarter project from a company that has delivered numerous successful projects desiged for photographers. While Peak's bag would be ideal for photographers, it looks like it would be a good back for just about anyone. There are no immediate flaws I see in the design, though I have not seen one in person. Nomatic Travel Bag is a kickstater project bag designed for travel. Seems well designed with a lot of organizing features. Clamshell openning, shoe compartment, size storage pockets, internal waterproof water bottle pocket. They have a a number of optional accessories which can make the price really climb Minaal Carry-on is a pricy bag that was a successful kickstart project. The bag zips open like a classic suitcase for easy access, has an external water bottle pocket, removable straps, and a well designed padded pocket for a laptop. Clear design, but the webbing waist strap is only for stabilization, not load transfer. Osprey TrailKit is a organizational duffel with backpack straps. Organizational features include ventilated pocket for shoes, four externally accessible pockets ((water padded, bottle big enough for kindle, 2 general storage), and large main compartment. The division between the pockets and main compartment is not rigid eliminating the sometimes wasted space introduced by pockets. All the zippers face toward the back which is both a good theft deterrent as well as helps keep things clean if you set it down in the dirt. I use this bag when on rare trip that requires more gear than will fit in the Synapse (trips that I wanted to bring clothing appropriate for formal outings, running, hiking in both hot and sub-freezing conditions.) Tortugaback Packs is a small company that makes packs specifically designed for the light weight traveler. Suitcase like zipper opening, side access laptop sleeve, zip away straps, and other features make this a well designed travel pack. Cotopaxi Allpa 35l is Ingiegogo funded project. Looks like a well designed bag that should carry well. Unzippers suitcase style. My only complain from the description is not seperate section for carrying water. Osprey Ozone 46 is a very well thought out travel pack. Made from light weight but adaquately durable materials. It has a foam frame sheet which improves it's carry comfort, gives some back ventilation, and provides a bit of protection for the contents of the main bag. There is a large compartment which zips half open. The inside is a florescent yellow which makes it easy to see things. Closest to your back is a padded pocket which will hold a 15 inch laptop. On the exterior of the pack are two mesh water bottle pockets, a typical orginizer pocket, and a padded pocket which seems to be sized for a tablet or kindle. There are two compression straps. This pack is also available in a the smaller 36L. This looks more like a backpack than luggage. Eagle Creek typically sells nicely designed Travel Packs. They change their models fairly frequently, so I have stopped listing any specific models. When looking at the Eagle Creek bags make sure they are carry-on legal. Many of Eagle Creek "adventure travel" packs are too large for carry on use. Redoxx Sky Train: expensive, but well regarded. I have no personal experience with it. eBags Mother Lode weekender Convertible: A very good value, typicaly sold for under $80. While this bag doesn't have the carry comfort the Osprey Bags, or features that are as refined as Tom Bihn, they have managed to make a well designed bag at a budget price. Opsrey Porter 46: A durable bag which will protect the contents better than many of the bags because there is closed cell foam sewn into the sides which beside providing extra protection also gives some structure without adding much weight. There is a large U zippered opening provides easy assess when "strait-jacket" compression staps (very effective but get in the way) aren't cinched down. There a fairly large top pocket which I put everything I might want quick access to while on the move. The lid to the main compartment has an external accessible zippered pocket, and a mesh pocket on the inside. One side of the bag has an internal mesh pocket which runs the length of the bag. This is one of the more comfortable carrying bags I have found. If unfortunately doesn't have an exterbnal water bottle and is a bit light of organizational features. This was my go to bag for ten years and is now being used by other family members. Osprey Farpoint 40: Slightly less volume than a number of the other bags listed here is offset by a real frame which is comfort carrying 15-20lb, external water bottle pockets, a large pocket with organizer pockets and a padded slot for laptop and ereader/tablet, a number of built in straps to keep everything in place. The most significant downside is that the laptop slot is near in the front of the pack rather than against the back. Marmot Long Haul and Northface Basecamp Duffel (Small): Very durable and highly water resistant. A good option if you expect your bags to be outdoors a lot and you aren't looking for organizing features (Marmot has a few features, TNF none). I didn't find either as comfortable to carry as the Osprey Porter, but would choice it if I expected my bag to spend a lot of time exposed to the elements. OR Drybags or similar products. there are a number of companies that make completely waterproof bags that have straps to carry on your back. The more basic drybags are not that cormfortable to carry, but there are more refined products. Often these packs have no orginizational features and are harder to pack, unpack, and find specify items, but if you are somewhere very wet (like watersports) the extra protection is well worth the inconvenience. Thule 40L Crossover: access against your back which makes it hard for someone to steal things out of your bag, durable, ok carry comfort, zip closing side pockets for water bottles or other small items, a bit different looking. I liked the design ideas but for the the handle weren't comfortable against my back and the logo is rather obnoxious. The Osprey TrailKit has many of the same design features, but executes them better IMHO. Some people combine adventure travel (where they carry their packs moderate distanced between hotels, hostels, and people's homes) with longer hikes and possibly time spent in the back country. In these cases the traveler will want a pack which is both carry-on legal, has a great suspension, and will have enough volume to carry the extra items required (cooking gear, insulation for sleeping, shelter, multiple days of food). Ideally, the pack would either have a good compression system (so that it carries well with carry-on volume but has room for your trek when your full food load is added) or permits items to be strapped to the outside. The Six Moon Designs Traveler might be a good pack for this sort of use. There are many frameless packs, and several or lightly framed packs such as the Gossamer Gear Gorilla (I have used several times) which work for this sort of situation so long as you don't over pack them. Remember that you can't take fuel, knife, or hiking poles carry-on. The other option would be to take a larger pack and ship it in a duffel bag. All but the most minimalist travelers typically want a smaller bag for "daily" use when they aren't in transit. Some travel packs have a zip-off daypack. While this might seem cool, I have not found this helpful. If you have the daypack attached, your bag no longer qualified as a carry-on bag. Additionally, I have found the daypack the wrong size and shape for my day-to-day needs. My day-to-day bag is a patagonia UL courier. The material is light enough that it can be easily packed away in my travel pack but durable enough to have survived several years of use. I like the courier style over a backpack style because it's usable when wearing my travel pack on my back, provides easier access compared to a backpack which you have to remove from your back to gain access, and you are less likely to have a sweaty back. I would recommend the Matador Freerain24 for people who do outdoor activities in the rain. These days, we are restricted to one carry-one bag or if we are lucky, a carry-one and one "purse / computer / briefcase". Normally my everyday bag is in my travel pack during transit and comes out at the destination for use. When I know I can bring a "personal item" and a carry on, I will use my courier to hold anything I will need during the flight and put my travel pack in the above luggage compartment. On return trips where I have accumulated stuff, my courier bag sometimes becomes my carry on bag, and the travel bag is checked through. Some people find small, "parachute cloth" tote bags can be very handy. These cost around $12, weight just a few ounces, and take almost no space. They can be used for grocery shopping, to hold dirty laundry, as a carry-on bag, etc. If you really need to bring more stuff than fits in carry on, I would recommend selecting durable duffel bag which has backpacking straps. CLOTHING You should select clothing which can be mixed and matched: colors which coordinate and layers which can be varied for look and comfort. To minimize the amount of clothing needed, you should plan to wash your clothing during any trip which is longer than a few days. While most people pay most of their attention to the styling of clothing, you will find that the fabric used in the clothing can make a significant different in your ease of travel. Most of my clothing is made from either Merino wool or from from fabrics made by Schoeller. I recommend getting wrinkle-resistant or wrinkle-proof clothing so you don't have to iron. I generally recommend bringing a small number of clothing items made from a fast drying fabric such as light weight merino wool, one of the modern micro-fibers, or a high quality nylon such as Nycott,Supplex, or more exotic materials made by Schoeller. Clothing made from these materials can be easily washed in the sink at the end of the day, hung up in the shower area, and will dry over night in most conditions, and be mostly dry in most humid or cool conditions. When it a rush you can squeeze excess water out of these materials, put them on wet, and let movement and body heat dry them. The drying process typically takes around an hour. This is why some super minimalists only have a single set of clothings. I prefer to have two pairs of any given type of clothing so if I am caught in an unexpected storm, or spill something on myself in the middle of the day, I have something to change into while I wash and/or dry the effected garment(s). I have also noticed that clothing item can be worn without washing is highly dependent on the local conditions and the individual. Fabric also can also effect how frequently you need to wash an item. For example, I am normally comfortable wearing jeans two days in a row, but if it is hot and I am sweating a lot, I am only comfortable wearing my jeans for a day. On the other hand, some of the lighter weight Schoeller materials, especially thoses treated with nanosphere can easily be worn for three days in warm weather and at least four in cold weather before they start feeling and or smell like then need to be washed. Some quick dry pants have a slightly calendered internal face which I have found makes them more comfortable in extreme conditions. While Merino wool doesn't dry a quickly as modern synthetics, it does not pick up a funky smell which enables merino shirts to be worn for multiple days before it needs to be washed. There are a number of small companies which make clothing that is particually well suited for travel including: Outlier, Makers and Riders, and Wool and Prince. You should adjust the style of your cloths to the local sensibilities. For example, in many countries when you get away from "international class" cities women are expected to wear skirts or dresses which go below the knee and blouses that at least cover the shoulders. Women not so clothed are assumed to be prostitutes or "loose" and could find themselves harassed by local men. In many Muslim areas women are expected to keep their heads covered with a scarf or a hat. For men, the appropriate level of formality can be highly variable. In some locations slacks, a button up shirt, and blazer are normal and appropriate. Other locations it's perfectly acceptable to wear sandals, boardshorts, and a tee shirt into a 5-star restaurant. Layering of clothing can lighten your load while keeping you comfortably clothed. Seasoned travelers and backpackers are very familiar with the idea of layering. Rather than bring a number of coats (or other clothing items) each suited to a particular condition (a down coat for really cold, a shelled-bunting for cold, and a denim jacket for moderate weather, an overcoat for rain, etc.) you bring clothing which can be worn in varying combinations. I have found that the combination of medium weight long-underwear, normal clothing, a light merino wool sweater, a down-like insulating vest, light weight waterproof/breathable jacket, and hat keeps me warm in below 0F weather and takes up minimal space in my luggage. Yet I can mix and match the various layers so I am comfortable when it is 20F, 40F, 60F, and warmer. For a few more thoughts on this, see my Outdoor Clothing page. I know some women who really love the Infinity Dress because they can wear it in multiple styles and Macabi Adventure Skirt because it can be worn as shorts, pants, or a skirt. If you are heading for cold weather, bring a set of modern long-underwear, they can make a real difference in keeping you warm. A nice wool sweater (dark color) is extremely useful. Besides keeping you warm, a sweater can make you look more "dressed up" than you are. A dressy jacket (blazer) isn't always required (often a nice sweater and button down shirt/blouse are enough), but it will make you look good which might be important as you cross borders, or get invited to a special dinner. I bring one of two shells that I own. If I am expecting to be outside for extended periods of time in the rain I bring a waterproof breathable Jacket which keeps me dry even when I am moderately active. This jacket weights 6oz and packs up fairly compactly. If I am expecting moderate weather, or if I am not going to be outside for an extended period of time I take a durable water repellent (DWR) jacket such as the Patagonia Houdini windshirt. The windshirt weights only 4oz, packs down smaller than a apple, and "breaths" better than any of the current waterproof "breathable" materials while still providing 100% wind protection and keeping me dry for brief rain storms. Since the DWR shell jacket isn't completely waterproof, I will bring a small umbrella if I expect heavy rain storms. Don't forget to bring a hat. If you are going to be someplace sunny, you should bring a hat with a wide brim to reduce the risk of sunburn, keep your head cool, and protect your eyes from too much light. It is best to bring a hat which can be rolled/folded up and can take a lot of abuse. It hot weather I would recommened the geeky, but highly effective hats from Sunday Afternoons, the classic Tilley Hat, or something like the compact and versatile OR Sunrunner Cap. If cold weather is at all likely, bring a wool or polyester stocking hat or a buff. It will take up very little room, and will help keep your warm. In modest conditions you only lose 10% of your heat through your neck and head, but the percent goes up to almost 50% when a person is so cold they are entering hypothermia. In other words, the colder you feel, the more important it is to protect your head and neck. The best shoes to bring will depend on the local conditions and weather. In colder locales, insulated boots are wonderful. In hot climates sandals are great. You should always bring one pair of shoes that you would be comfortable wearing for a whole day on your feet while walking several miles. If these shoes are not be appropriate for everywhere you want to go, then bring a second pair of shoes which would be appropriate. In the summer I bring a pair of Keen Sandals because they are versitile, with shoes that match their color can be mistaken for shoes, and the toe guard has been very effective at preventing stubbed toes which I used to regularly get wearing more minimalist sandals. . The rest of the year I typically bring a pair of Vivobarefoot Gibo ankle boots. If I am going to be spending a lot of time in the back country or running I will bring a pair of Alta runners. There are a number of minimalist shoulds which work well for other people including of Soft Star Shoes, Lems Shoes, Xeno Shoes and Luna Sandals. In many international locales you will want to have shower thongs (or use your sports sandals) when you take a shower or go into the bathroom since they floors are nasty. TOILETRIES, FIRST AID, AND SAFETY Dehydration is a common problem among travelers, especially when you are flying. Make sure you drink enough. Safe drinking water is extremely important. In many countries, the tap water is not safe to drink. These days the high-tech filters such as the Pur Voyageur are small, easy to use, and extremely effective. Make sure whatever filter you get is able to remove or kill viruses. You should always have something to carry safe water in. I like the Platypus Water Bags because they are durable and collapse nearly flat and Zojirushi Double Walled Mug because it insulated better than any other double wall container I have tested and has a flawless design. All of my toiletries, first aid, and repair items fits into a quarter size Glad BigZip plastic bag. Remember to kee[ your liquids and gels separate in containers no larger than 3 oz. I typically have been able to reuse containers for this purpose (like samples and items provided by hotels. If you can't find containers for free you could buy some fromy easytraveler inc. The humangear GoToobs are very nice but pricy. Don't take full-size items (normal size bar of soap or a tube of toothpaste), but use the travel/sample size, if not a smaller amount in an appropriately size container. Hint: try measuring the amount of toiletries you use for a week or two. It might be much less than what you think is needed. If you are bring anything which is a liquid, double wrap it in zip-lock bags to prevent leaks. In many parts of the world, toilet paper is not common, nor are flush toilets. It is always wise to bring some toilet paper on your journey, and keep a small amount with you at all times. Pick-pockets are extremely common and are attracted to locations which have a lot of travelers/tourists. This is especially true in third world locations frequented by comparatively rich western travelers. Na´ve American tourist (and that is how we are viewed most places) are often careless, and might have more than a month's waging for the easy taking. Don't be a victim. Carry your valuables in a travel wallet under your clothing. Note: the classic travel wallets don't work well for all people. For example, short women who need to wear dresses might have problems finding security wallets which do not create an unsightly bulge not to mention being able to get to the wallet without undressing. I have found that the ankle security wallets work pretty well. There are also a number of the travel companies sell vests which are specifically designed for traveling. These vests have pockets inside which can be sealed against pickpockets. While some travel vests make you look like a foreign correspondent (lots of oversize pockets), there are a number of very fashionable vests which can add color to wardrobe and don't make you stand out as a "tourist / photo-journalist". EXTRAS One of the best things you can bring back from your trip are photographs. I would strongly recommend bringing a camera. Even if you don't normally take photographs, you should still plan to bring a small point-and-shoot camera. I have a page about Choicing a Camera. Take a look at the "How to Use a Point-and-Shoot" on PHOTO.NET, or read David Pogue's Digital Photography: The Missing Manual before you go on your trip. In the USA, especially in larger hotels, it is common to get clean linens every day. At a minimum you expect to have fresh linens when you get a room. All hotels are not like this, especially if you are far from mainstream tourist areas or in a budget hotel. Even if you don't normally use pajamas, you might want something that you can sleep in. I know a number of people who bring a pair of silk pajamas because they feel nice and take up almost no room. Long underwear can double as pajamas if you need them to. Some people like using "sleeping sacks". Having a clean pillowcase to lay your head on is also very nice. Gift giving is very common outside the US. You should bring some small gifts. Especially if someone makes you a home cooked meal or shows great hospitality. Handmade items are always appreciated. A small needlework, a drawing, a small bag or pouch decorated by hand. Postcards from your home town, chocolate, small pins, LED lights, small calculator, or a key chain with something nifty on it. A great way to delight small children is learn to make animals out of balloons. Technology: Many people feel compelled to bring technology with them. Computers, short-wave radios, walkmans, all sorts of electronic devices. There is nothing wrong with any of these objects. It is possible that each of them can enrich your journey. But before you pack your favorite electronic gear, ask yourself questions like Do I really want to bring this with me? What will happen if I don't hear the latest news? Maybe I will relax more? Am I really going to use this laptop, or is it going to be a four pound weight around my neck? Do I really want to listen to my walkman or will it cut me off from the new environment I am trying to experience? Also make sure you have backup for whatever information is in your electronic gear. My Palm Pilot locked up one a trip (first time this ever happened) and I lost all the addresses of people I was going to send postcards to. Noise Reduction: Planes and trains can be quite noisy. Noise is fatiguing so it's good to cut it down. There are a number of companies such as Bose that make noise reducing headphones which use active sound cancelation to reduce noise. More compact, and typically cheaper and higher sound quality are sound issolating in the ear monitoribgs or even basic ear plugs. I use a pair of etymotic hf3 ear buds which I think is the lowest price sound issolating ear bud which provide high quality audio playback as well as full iPhone controls. MINDSET Let your trip be a growing experience... be willing to be pushed beyond your day to day comfort zone. You might find books like The Art of Pilgrimage by Phil Cousineau & Huston Smith encouraging. Travel can first and foremost be a learning experience. We learn about the culture and land we visit and we learn about ourselves. Traveling to remote and unusual places, far from the standard and well-traveled tourist destinations, can rekindle our adventure spirit and renew a sense of perspective in our daily lives. Such places are often very sensitive to outside disruption and exist in a delicate cultural or environmental balance. As travelers, each of us holds a responsibility to protect this balance. Eagle Creek offers the following suggestions for all of us: Understand and Observe Local Customs: Acquaint yourself with the culture and customs of the lands you visit and respect them. Other cultures may take offense to certain innocent and unassuming gestures. For, in some societies people do not wish to be photographed without their permission. Support the Local Economy: Stay in locally owned establishments. It gives you better cultural exposure to the region and it is of direct economic benefit to the community. Avoid chain hotels, which often channel profits out of the region or country. Eat the local cuisine. Why waste your taste buds on totally familiar foods you have at home and are not indigenous to the area. Enjoy the provincial fare which supports the local eateries, growers, fishermen, wineries, etc. Buy local crafts. Avoid souvenirs mass produced in Chinese or Korean factories. Your purchases should support local artisans and help perpetuate their traditions, crafts and culture. Be Patient and Positive: Remember that travel means strange languages and unfamiliar surroundings. Expect the unexpected. Try not to get frustrated and don't be afraid to ask for help. Courtesy is usually responded to with kindness. Delays, detours, and other inconveniences will occur. Be patient, be positive, and remember to smile! BEFORE YOU GO Find someone who will take care of your residence. You will want someone to pick up your mail (or have the post office hold your mail), water your plants, feed your pets, etc. Pay all your bills before you leave. If important bills are likely to arrive after you leave, but come due before you get back, leave checks with the person taking care of your mail which have been filled out with as much information as possible and leave pre-addressed stamped envelopes. Take care of any medical issues. Make an appointment to see your doctor at least three months before you leave. Discuss any health issues that you have been putting off dealing with, and find get whatever vaccinations you need. Likewise, make appointments with other medical practitioner such as your dentist or optometrist if you haven't seen them recently. As long as you are taking care of yourself, go get your hair cut. If you don't have a passport and valid visa, start the paperwork. Passports used to take six-eight weeks to be processed. My understanding is that it's now taking a number of months. Visa will often take a number of weeks. If you are unable to get a passport fast enough for your trip, contact you US congressman's office since they can often speed up the process. There are a number of organizations that expedite visa if you are short of time. Make sure you leave someone with important documents such as your will, health information, copies of your passport and visa. Solo Guide: A simple site with around 180 brief city guides and some good recommendations on gear and packing. URL: http://sologuides.com Tyman's Recommended Gear: Tyman takes minimalist traveling to the extreme. I don't go this light, but he has an interesting perspective. There are a number of blog posts on the site related to minimalist travel. His current packing list. URL: http://tynan.com/gear2016 Travel's Checklist Useful system which will generate a custom packing list based on type of trip which you can then update. URL: http://www.travelschecklist.com/ Joshua Project: Web site with information peoples groups of the world which don't have a significant Christian population. URL: http://www.joshuaproject.net/ RECOMMENDED TRAVELING LIGHT PACKING LIST Items marked with "*" are added when appropriate. "**" indicate items I typically don't carry, but many people seem to carry. The following list has been used on multi-week trips. Clothing was washed as needed in bathroom sinks and hung dry. The list I personally use is down a bit further. The following is my personal list for an extended trip with variable weather and varying "social" expectations. This differences from the above list because generics have been replaced by the specific items I take. Items marked with "*" are added when appropriate. Luggage tom bihn synapse backpack patagonia ultralight courier bag Pockets/Wear small wallet w/ license, cash, credit card, etc iphone Swiss-Tech Util-Key garmin 935 gps watch transportation tickets passport, vaccination certificate* Clothing (Wear & Carry) outlier slim dungarees and/or new way shorts (2-3), zoot tri-shorts icebreaker tee-shirts (2) 2-3 pairs darn tough socks 2-3 pairs icebreaker underwear mesh belt keen sandals or alta trailrunners vivobarefoot gobi II ankle boots* icebreaker hoody arcteryx norvan sl rain jacket tilley ltm2 hat polarbuff patagonia capilene thermal weight hoody* uniqlo ultralight down vest* mountain hardware grub gloves* blazer and tie* umbrella* Toiletries - Dry rei micro toiletry bag toothbrush, floss razor folding brush nail clipper ultralight packtowel* toilet paper* Liquids toothpaste all purpose liquid soap shaving oil hand lotion shampoo sunblock* aloe* woolite* First Aid & Health bandages, anti-biotic ointment, aleve, lip balm hand cleaner antihistamine, decongestant second skin blister pads safety pins, single use super glue diarrhea (pepto-bismol, imodium & cispro)* water purifier tablets* thermometer* Daily Life zojirushi double walled travel mug sound isolating IEM pen sun glasses* paper notebook* insect repellent* Zebralight H51 headlamp* Electronics Transfer from my EDC to luggage: Portable USB battery / flashlight AUKEY USB Wall Charger 6-inch miniUSB, Lightning cables RAVpower USB Battery/Flashlght Extras Kindle, iPad or MacBook Pro Extra long USB Cables sink stopper* International Power Adapter* Ethernet Adapter* gifts (handmade is nice)* sleeping sack* pillowcase* Camping? See my Outdoor gear for information about what sorts of things I take backpacking.
2024-02-05T01:26:36.242652
https://example.com/article/5722
Nonvolatile flash memory devices (e.g. 2D NAND Flash or 3D NAND) store information in the form of charge in a flash memory cell. A flash memory cell has a transistor with an additional floating metal gate between the substrate and the transistors gate or a trapping area or any other mechanism to allow charge storage. The charge is stored in the transistor and is injected during an operation known as programming. The charge may be removed during an operation known as an erase operation. As the charge in the transistor may vary contiguously, it is possible to store more than just one bit per flash transistor by using several charge levels to symbolize different sequences of bits. FIG. 1 illustrates a prior art voltage level distribution 100 for a 3pbc (bits per cell) flash memory cell. The voltage level distribution includes eight lobes 101-108. Each lobe represents a 3-bit value. The voltage level distributions of FIG. 1 illustrates non-overlapping lobes, however this is only schematic, and in practical cases the lobes may overlap. For NAND Flash devices, a stressed page, may introduce greater overlap between lobes than a new page, since after many program/erase (P/E) cycles or read disturb cycles the stress may introduce different noise sources. After a long duration, every lobe may have a larger standard deviation (std) and may have a different mean location. These effects are also known as retention. The 3 bit-per-cell (bpc) cell includes a most significant bit (MSB), a central significant bit (CSB) and a least significant bit (LSB). A physical page of flash memory module may store three logical pages. This physical page is programmed one logical page after the other. The programming includes various types of programming such as MSB programming, CSB programming and LSB programming. Alternatively, all 3 pages in a row may be programmed at once in either a single stage or in several stages. For example, 3 stages may be used for programming such that all page types are associated with each stage. The logical pages are read by applying various types of read operations such as MSB read (e.g. in which a MSB threshold 111 and 115 are used), CSB read (in which two CSB thresholds 112 114 and 116 are used) and LSB read (in which four LSB thresholds 113 and 117 are used). FIG. 2 shows similar distributions for the case of 2 bpc devices. Four lobes 201, 202, 203 and 204 as well as MSB threshold 212 and two LSB thresholds 211 and 312. As mentioned, the lobe distributions are not constant throughout the life of the flash and change under various stress conditions. With retention, the distribution become larger and shift towards the erase level. The higher the distribution the larger the shift. This effectively shrinks the effective working window. Both the shrinkage of the window and the fattening of the distributions contribute to the increase in number of errors after performing a page read. FIG. 3 illustrates these effects. Spaced apart lobes 301 overlap and widen due to retention to provide threshold voltage distribution 302. These effects become significantly worse as the block P/E cycles increase and as the NAND Flash memory technology node shrink. These stress factors (Node shrink, number of layers in 3D NAND, endurance retention, read disturb) affect reliability due to errors incurred by overlap of lobes. To overcome these issues more advanced memory controllers use advanced ECC and DSP algorithms to overcome the errors incurred by these errors. FIG. 4 shows a typical prior art NAND flash string and the reading circuitry associated with it. A string is duplicated many times (say 147456 times) in a block and contains several (say 86) Flash memory cells. Each of the flash memory cells 420 of a string is associated with a different wordline which connects all of the corresponding flash memory cells in the other strings of the block. When a block is chosen, each string is connected to a corresponding bitline by turning on the Bit Line Select and the Ground Select transistors. When a read operation is performed, a sense amplifier 440 is connected to the bit-line and after allowing some time (say 40 uS) for the bit-line voltage to settle, the result is stored by a latch 450. Latch 450 is activated by latch enable (LE) signal. FIG. 4 illustrates a string of thirty two flash memory cells, positioned between a bit line select transistor (for selecting the string) and a ground select transistor (for grounding the string). In order to measure the charge in a certain cell within a string, all other cells are switched on by applying a high voltage on their gates (given by Vbias) and a comparison voltage, Vth, is applied to the gate of the selected cell. In FIG. 4 the third flash memory cell 420(3) is selected and wordline3 is provided with Vth. Other flash memory cells (1, 2 and 4-32) are fed with Vbias. If the cell is charged and Vth is not high enough, the gate will not allow current to flow and the sense-amplifier will output a “0”. On the other hand, if the cell is not charge or Vth is high enough, current will flow and the sense-amplifier will output a “1”. Different schemes may exist where the cell being samples is biased with a constant voltage (say Vcc) but in the sense-simplifier a comparison against a reference string is performed which reference value may be determined by some external voltage, Vth. The bit line and each flash memory cells have certain impedance and capacitance that need to be charged in order to converge to a desired voltage level. This is illustrated in FIG. 5. Curve 510 illustrate the charging of the capacitance of the bit line and/or the selected flash memory cell once the threshold voltage converges and stabilizes to a first target value 520 a single sampling is performed by the latch 450. The above sampling technique holds when a bit may be obtained only through a single threshold comparison. When more than a single threshold comparison is required, the above procedure may be performed for each threshold and the results may then be combined.
2024-04-23T01:26:36.242652
https://example.com/article/6475
FROM: Project Lead TO: Arma 3 Users INFO: Zeus released, Zeus livestream PRECEDENCE: Flash SITUATION To celebrate last week's release of Zeus, we hosted a launch livestream on Saturday. Game Master Lukáš Haládik (call signs Sunray & Unicorn) created a High Value Target extraction scenario from scratch. The highlight for many was the GM remote controlling a civilian who refused to share his knowledge of the HVT position with the AAF players, and what subsequently happened ... The various hosts also demonstrated the new features added since the Zeus reveal and tried to answer a bunch of questions from the chat. We'd like to thank the three community fire teams who participated and did a great job of showing how Arma MP can benefit from solid teamwork. Kudos to Comrades in Arms, VOLCBAT and Shack Tactical for joining us! Re-live the stream from different points of view: INTELLIGENCE Bohemia Interactive has shared a page with clarifications on the making and sharing of screenshots, videos, gameplay footage and music created using our games. We are and always have been quite generous when it comes to these topics, and this page merely helps to explain the exact rules in an open and honest way. The Frequently Asked Questions and answers should help to remove any doubts. OPERATIONS There has been quite a lot of constructive feedback about the flight model of our fixed-wing aircraft. Programming Lead Vojtěch Hladík himself has added new parameters to adjust the behavior of said planes. It is now possible to adjust the curve of sensitivity for elevators, rudder and ailerons. Encoder Martin Gregor has set these new parameters for the new CAS planes and the overall feedback seems like it has been a step in right direction. LOGISTICS Owners of the (Digital) Deluxe Edition will find two new Zeus music tracks (MP3 + FLAC) in the Bonus folder of the game. Check out the most-recent TECHREP for several minor updates to the tools in the suite. Zeus designer Karel Mořický has published several Zeus scenarios to Steam Workshop that will offer the standard modes on old Arma terrains (e.g. Chernarus and Takistan). There exist several mods which add those terrains to Arma 3, but neither the mods nor these scenarios are officially supported. This may at least get you to enjoy Zeus in a different setting!
2024-01-26T01:26:36.242652
https://example.com/article/4187
// RenderSizeDialog.h // this file is part of Context Free // --------------------- // Copyright (C) 2008 John Horigan - john@glyphic.com // // This program is free software; you can redistribute it and/or // modify it under the terms of the GNU General Public License // as published by the Free Software Foundation; either version 2 // of the License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // // You should have received a copy of the GNU General Public License // along with this program; if not, write to the Free Software // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. // // John Horigan can be contacted at john@glyphic.com or at // John Horigan, 1209 Villa St., Mountain View, CA 94041-1123, USA // // #pragma once #include "RenderParameters.h" namespace ContextFreeNet { /// <summary> /// Summary for RenderSizeDialog /// /// WARNING: If you change the name of this class, you will need to change the /// 'Resource File Name' property for the managed resource compiler tool /// associated with all .resx files this class depends on. Otherwise, /// the designers will not be able to interact properly with localized /// resources associated with this form. /// </summary> public ref class RenderSizeDialog : public System::Windows::Forms::Form { public: RenderSizeDialog(RenderParameters* rsp) : renderSizeParameters(rsp) { InitializeComponent(); // //TODO: Add the constructor code here // this->Activated += gcnew System::EventHandler(this, &RenderSizeDialog::setup_dialog); } private: System::Windows::Forms::TextBox^ widthBox; public: private: System::Windows::Forms::TextBox^ heightBox; RenderParameters* renderSizeParameters; protected: /// <summary> /// Clean up any resources being used. /// </summary> ~RenderSizeDialog() { if (components) { delete components; } } private: System::Windows::Forms::Label^ label1; private: System::Windows::Forms::Label^ label2; private: System::Windows::Forms::Label^ label3; private: System::Windows::Forms::Label^ label4; private: System::Windows::Forms::Label^ label5; private: System::Windows::Forms::Label^ label6; private: System::Windows::Forms::TrackBar^ borderTrackBar; private: System::Windows::Forms::CheckBox^ noDisplayCheckBox; private: System::Windows::Forms::Label^ label7; private: System::Windows::Forms::Label^ label8; private: System::Windows::Forms::Label^ label9; private: System::Windows::Forms::Label^ label10; private: System::Windows::Forms::Label^ label11; private: System::Windows::Forms::Label^ label12; private: System::Windows::Forms::Button^ OKbutton; private: System::Windows::Forms::Button^ cancelButton; private: System::Windows::Forms::TextBox^ minimumSizeBox; protected: protected: private: /// <summary> /// Required designer variable. /// </summary> System::ComponentModel::Container ^components; #pragma region Windows Form Designer generated code /// <summary> /// Required method for Designer support - do not modify /// the contents of this method with the code editor. /// </summary> void InitializeComponent(void) { System::ComponentModel::ComponentResourceManager^ resources = (gcnew System::ComponentModel::ComponentResourceManager(RenderSizeDialog::typeid)); this->label1 = (gcnew System::Windows::Forms::Label()); this->label2 = (gcnew System::Windows::Forms::Label()); this->label3 = (gcnew System::Windows::Forms::Label()); this->label4 = (gcnew System::Windows::Forms::Label()); this->label5 = (gcnew System::Windows::Forms::Label()); this->label6 = (gcnew System::Windows::Forms::Label()); this->borderTrackBar = (gcnew System::Windows::Forms::TrackBar()); this->noDisplayCheckBox = (gcnew System::Windows::Forms::CheckBox()); this->label7 = (gcnew System::Windows::Forms::Label()); this->label8 = (gcnew System::Windows::Forms::Label()); this->label9 = (gcnew System::Windows::Forms::Label()); this->label10 = (gcnew System::Windows::Forms::Label()); this->label11 = (gcnew System::Windows::Forms::Label()); this->label12 = (gcnew System::Windows::Forms::Label()); this->OKbutton = (gcnew System::Windows::Forms::Button()); this->cancelButton = (gcnew System::Windows::Forms::Button()); this->minimumSizeBox = (gcnew System::Windows::Forms::TextBox()); this->widthBox = (gcnew System::Windows::Forms::TextBox()); this->heightBox = (gcnew System::Windows::Forms::TextBox()); (cli::safe_cast<System::ComponentModel::ISupportInitialize^ >(this->borderTrackBar))->BeginInit(); this->SuspendLayout(); // // label1 // this->label1->AutoSize = true; this->label1->Location = System::Drawing::Point(35, 96); this->label1->Name = L"label1"; this->label1->Size = System::Drawing::Size(35, 13); this->label1->TabIndex = 3; this->label1->Text = L"Width"; // // label2 // this->label2->AutoSize = true; this->label2->Location = System::Drawing::Point(112, 96); this->label2->Name = L"label2"; this->label2->Size = System::Drawing::Size(38, 13); this->label2->TabIndex = 4; this->label2->Text = L"Height"; // // label3 // this->label3->AutoSize = true; this->label3->Location = System::Drawing::Point(76, 159); this->label3->Name = L"label3"; this->label3->Size = System::Drawing::Size(117, 13); this->label3->TabIndex = 10; this->label3->Text = L"size of smallest element"; // // label4 // this->label4->AutoSize = true; this->label4->Location = System::Drawing::Point(156, 115); this->label4->Name = L"label4"; this->label4->Size = System::Drawing::Size(44, 13); this->label4->TabIndex = 8; this->label4->Text = L"in pixels"; // // label5 // this->label5->AutoSize = true; this->label5->Font = (gcnew System::Drawing::Font(L"Symbol", 9.75F, System::Drawing::FontStyle::Bold, System::Drawing::GraphicsUnit::Point, static_cast<System::Byte>(2))); this->label5->Location = System::Drawing::Point(74, 113); this->label5->Name = L"label5"; this->label5->Size = System::Drawing::Size(17, 16); this->label5->TabIndex = 6; this->label5->Text = L"´"; // // label6 // this->label6->AutoSize = true; this->label6->Location = System::Drawing::Point(12, 200); this->label6->Name = L"label6"; this->label6->Size = System::Drawing::Size(93, 13); this->label6->TabIndex = 11; this->label6->Text = L"Image border size:"; // // borderTrackBar // this->borderTrackBar->Location = System::Drawing::Point(15, 216); this->borderTrackBar->Maximum = 99; this->borderTrackBar->Name = L"borderTrackBar"; this->borderTrackBar->Size = System::Drawing::Size(185, 45); this->borderTrackBar->TabIndex = 12; this->borderTrackBar->TickFrequency = 33; this->borderTrackBar->Value = 1; // // noDisplayCheckBox // this->noDisplayCheckBox->AutoSize = true; this->noDisplayCheckBox->Location = System::Drawing::Point(15, 280); this->noDisplayCheckBox->Name = L"noDisplayCheckBox"; this->noDisplayCheckBox->Size = System::Drawing::Size(136, 17); this->noDisplayCheckBox->TabIndex = 17; this->noDisplayCheckBox->Text = L"Don\'t display final result"; this->noDisplayCheckBox->UseVisualStyleBackColor = true; // // label7 // this->label7->AutoSize = true; this->label7->Font = (gcnew System::Drawing::Font(L"Microsoft Sans Serif", 6.75F, System::Drawing::FontStyle::Regular, System::Drawing::GraphicsUnit::Point, static_cast<System::Byte>(0))); this->label7->Location = System::Drawing::Point(8, 248); this->label7->Name = L"label7"; this->label7->Size = System::Drawing::Size(41, 12); this->label7->TabIndex = 13; this->label7->Text = L"negative"; // // label8 // this->label8->AutoSize = true; this->label8->Font = (gcnew System::Drawing::Font(L"Microsoft Sans Serif", 6.75F, System::Drawing::FontStyle::Regular, System::Drawing::GraphicsUnit::Point, static_cast<System::Byte>(0))); this->label8->Location = System::Drawing::Point(70, 249); this->label8->Name = L"label8"; this->label8->Size = System::Drawing::Size(25, 12); this->label8->TabIndex = 14; this->label8->Text = L"none"; // // label9 // this->label9->AutoSize = true; this->label9->Font = (gcnew System::Drawing::Font(L"Microsoft Sans Serif", 6.75F, System::Drawing::FontStyle::Regular, System::Drawing::GraphicsUnit::Point, static_cast<System::Byte>(0))); this->label9->Location = System::Drawing::Point(123, 249); this->label9->Name = L"label9"; this->label9->Size = System::Drawing::Size(25, 12); this->label9->TabIndex = 15; this->label9->Text = L"fixed"; // // label10 // this->label10->AutoSize = true; this->label10->Font = (gcnew System::Drawing::Font(L"Microsoft Sans Serif", 6.75F, System::Drawing::FontStyle::Regular, System::Drawing::GraphicsUnit::Point, static_cast<System::Byte>(0))); this->label10->Location = System::Drawing::Point(169, 248); this->label10->Name = L"label10"; this->label10->Size = System::Drawing::Size(38, 12); this->label10->TabIndex = 16; this->label10->Text = L"variable"; // // label11 // this->label11->Location = System::Drawing::Point(12, 9); this->label11->Name = L"label11"; this->label11->Size = System::Drawing::Size(232, 32); this->label11->TabIndex = 1; this->label11->Text = L"The image will be rendered to fit the dimensions entered here, using the current " L"variation."; // // label12 // this->label12->Location = System::Drawing::Point(12, 46); this->label12->Name = L"label12"; this->label12->Size = System::Drawing::Size(232, 41); this->label12->TabIndex = 2; this->label12->Text = L"When complete, the image will be displayed scaled within the window, unless displ" L"ay is disabled"; // // OKbutton // this->OKbutton->DialogResult = System::Windows::Forms::DialogResult::OK; this->OKbutton->Location = System::Drawing::Point(90, 322); this->OKbutton->Name = L"OKbutton"; this->OKbutton->Size = System::Drawing::Size(75, 23); this->OKbutton->TabIndex = 18; this->OKbutton->Text = L"OK"; this->OKbutton->UseVisualStyleBackColor = true; this->OKbutton->Click += gcnew System::EventHandler(this, &RenderSizeDialog::OKbutton_Click); // // cancelButton // this->cancelButton->DialogResult = System::Windows::Forms::DialogResult::Cancel; this->cancelButton->Location = System::Drawing::Point(171, 322); this->cancelButton->Name = L"cancelButton"; this->cancelButton->Size = System::Drawing::Size(75, 23); this->cancelButton->TabIndex = 19; this->cancelButton->Text = L"Cancel"; this->cancelButton->UseVisualStyleBackColor = true; this->cancelButton->Click += gcnew System::EventHandler(this, &RenderSizeDialog::cancelButton_Click); // // minimumSizeBox // this->minimumSizeBox->Location = System::Drawing::Point(15, 156); this->minimumSizeBox->Name = L"minimumSizeBox"; this->minimumSizeBox->Size = System::Drawing::Size(55, 20); this->minimumSizeBox->TabIndex = 9; // // widthBox // this->widthBox->Location = System::Drawing::Point(15, 112); this->widthBox->MaxLength = 5; this->widthBox->Name = L"widthBox"; this->widthBox->Size = System::Drawing::Size(55, 20); this->widthBox->TabIndex = 5; // // heightBox // this->heightBox->Location = System::Drawing::Point(94, 112); this->heightBox->MaxLength = 5; this->heightBox->Name = L"heightBox"; this->heightBox->Size = System::Drawing::Size(55, 20); this->heightBox->TabIndex = 7; // // RenderSizeDialog // this->AcceptButton = this->OKbutton; this->AutoScaleDimensions = System::Drawing::SizeF(6, 13); this->AutoScaleMode = System::Windows::Forms::AutoScaleMode::Font; this->CancelButton = this->cancelButton; this->ClientSize = System::Drawing::Size(258, 357); this->Controls->Add(this->heightBox); this->Controls->Add(this->widthBox); this->Controls->Add(this->minimumSizeBox); this->Controls->Add(this->cancelButton); this->Controls->Add(this->OKbutton); this->Controls->Add(this->label12); this->Controls->Add(this->label11); this->Controls->Add(this->label10); this->Controls->Add(this->label9); this->Controls->Add(this->label8); this->Controls->Add(this->label7); this->Controls->Add(this->noDisplayCheckBox); this->Controls->Add(this->borderTrackBar); this->Controls->Add(this->label6); this->Controls->Add(this->label5); this->Controls->Add(this->label4); this->Controls->Add(this->label3); this->Controls->Add(this->label2); this->Controls->Add(this->label1); this->FormBorderStyle = System::Windows::Forms::FormBorderStyle::FixedDialog; this->Icon = (cli::safe_cast<System::Drawing::Icon^ >(resources->GetObject(L"$this.Icon"))); this->MaximizeBox = false; this->MinimizeBox = false; this->Name = L"RenderSizeDialog"; this->ShowInTaskbar = false; this->SizeGripStyle = System::Windows::Forms::SizeGripStyle::Hide; this->Text = L"Render to Size"; (cli::safe_cast<System::ComponentModel::ISupportInitialize^ >(this->borderTrackBar))->EndInit(); this->ResumeLayout(false); this->PerformLayout(); } #pragma endregion private: System::Void setup_dialog(System::Object^ sender, System::EventArgs^ e) { renderSizeParameters->initFromPrefs(); widthBox->Text = renderSizeParameters->width.ToString(); heightBox->Text = renderSizeParameters->height.ToString(); borderTrackBar->Value = (int)((renderSizeParameters->borderSize + 1.0) * 33.0); minimumSizeBox->Text = renderSizeParameters->minimumSize.ToString(); noDisplayCheckBox->Checked = renderSizeParameters->suppressDisplay; } private: System::Void OKbutton_Click(System::Object^ sender, System::EventArgs^ e) { try { renderSizeParameters->width = System::Int32::Parse(widthBox->Text); renderSizeParameters->height = System::Int32::Parse(heightBox->Text); renderSizeParameters->borderSize = (double) (borderTrackBar->Value) / 33.0 - 1.0; renderSizeParameters->minimumSize = System::Single::Parse(minimumSizeBox->Text); renderSizeParameters->suppressDisplay = noDisplayCheckBox->Checked; renderSizeParameters->saveToPrefs(); } catch (System::SystemException^) { this->DialogResult = System::Windows::Forms::DialogResult::Cancel; System::Media::SystemSounds::Beep->Play(); } this->Close(); } private: System::Void cancelButton_Click(System::Object^ sender, System::EventArgs^ e) { this->Close(); } }; }
2023-09-23T01:26:36.242652
https://example.com/article/2021
One Piece Episode 351 English Sub Moria implants Luffy's shadow inside the corpse of Oars, making the massive zombie come to life. The zombie immediately shows his similarity to Luffy, yelling out for food at the moment of awakening! Oars calls out for Sanji to make him some food, but then is confused by his own sentence, not remembering who Sanji was, the shadow's personality and memories already starting to be worn away. Usopp, Chopper and Nami are discovered by Moria's band, upon which Nami is abducted by Absalom for marriage and the others are left to fend for themselves against another platoon of zombies until they are saved by Franky and Robin.
2024-06-06T01:26:36.242652
https://example.com/article/8304
INTRODUCTION ============ Human intestinal spirochetosis is a condition defined by the presence of spirochetes attached to the colonic epithelium, first described in 1967^\[[@b1-501-1-3343-1-10-20161213]\]^. The Gram-negative bacteria *Brachyspira aalborgi* and *Brachyspira pilosicoli* may cause the disease in humans. As it is more common in underdeveloped countries, when diagnosed in the western world, it is usually associated with immunocompromised states, namely, HIV infection^\[[@b2-501-1-3343-1-10-20161213]\]^. The diagnosis can be made by histology, since collections of spirochetes on the luminal side of the epithelium can be seen on colonic biopsy specimens. The spirochetosis can be confirmed by polymerase chain reaction or detection of serum anti-*Brachyspira* antibodies^\[[@b3-501-1-3343-1-10-20161213]\]^. The main clinical finding is aqueous diarrhoea, and although there is no specific therapy, most patients recover after treatment with the antibiotic metronidazole^\[[@b4-501-1-3343-1-10-20161213]\]^. Here, we report a case of spirochetosis with *Brachyspira aalborgi* in an immunocompetent man. CASE DESCRIPTION ================ We describe the case of a 58-year-old patient, who was a smoker (80 packs per year) and known to have hypertension but was not on any medication. He presented with diarrhoea and chest/epigastric pain evolving over the previous 24 hours. He was seen at home by the medical emergency team and the ECG showed Q waves in infero-lateral leads and an ST elevation (\<2 mm) in anterior leads. This was assumed to be a myocardial infarction (MI) with symptoms presenting over the previous 24 hours. The angiogram revealed a narrowed circumflex artery (90% stenosis, TIMI 2) and a completely occluded right coronary artery (RCA) with filling being possible via left anterior descendant (LAD) collaterals. Two drug-eluting stents were placed in the circumflex artery and the decision to intervene on the RCA was delayed until after reversible ischaemia studies were carried out. The patient was placed on double anti-platelet therapy (DAPT) and the post-procedure echocardiography showed a hypertrophic left ventricle (LV) with posterior and inferior akinesia and lateral hypokinesia and moderate LV systolic dysfunction. Blood tests revealed a very minor troponin I increase (from 0.16 μg/dl to 0.29 μg/dl; N \<0.02 μg/dl) with significant renal dysfunction (AKIN 3; creatinine 3.8 mg/dl; N 0.7--1.2 mg/dl), liver cytolysis and elevation of inflammatory markers (CRP increased from 50.2 mg/dl to 65 mg/dl; N \<0.5 mg/dl). The patient was septic (HR 115 bpm, BP 85/63 mmHg, temperature 39.2°C, lactate 3.4) at that point and kept complaining of epigastric pain and loose stools (more than 15 times a day). After discussing the patient with general surgery personnel, abdominal computed tomography was performed revealing an enlarged bowel with no obstruction point identified. It was decided to operate on the patient the next day although he was on DAPT. No obstruction was seen during surgery despite remarkable small bowel distension. A primary peritonitis was assumed based on a cloudy abdominal fluid and the patient was started on ceftriaxone and total parenteral nutrition (TPN). Over the next few days, the abdominal pain resolved, but the loose stools continued and culture results (blood, urine, stools and abdominal fluid) were negative. Enteral feeding was attempted and tolerated on the fifth day after surgery. However, 10 days after surgery the abdominal pain worsened and the inflammatory markers rose again (CRP 28 mg/dl). Antibiotic therapy was empirically escalated to meropenem and vancomycin since no isolation had been possible until then. The patient was continued on both antibiotics for 10 days and then was discharged, as he was clinically improved, with a final diagnosis of type 2 MI and peritonitis. However, the patient was readmitted to the emergency department after 2 days with worsening diarrhoea (more than 15 times a day) and abdominal pain. The patient had noticed a decrease in urinary output over the previous 2 days. On examination, he was pale and dehydrated, with tenderness on the left lower quadrant. Blood tests revealed increasing inflammatory markers with an elevated CRP (from 26 mg/dl to 34 mg/dl; N \<0.5 mg/dl) and a decrease in renal function as he had been discharged with creatinine values within the normal range (creatinine 2.52 mg/dl; N 0.7--1.2 mg/dl). An abdominal CT was repeated revealing an enlarged small bowel but no other changes ([Fig. 1](#f1-501-1-3343-1-10-20161213){ref-type="fig"}). Meropenem was restarted and despite the improvement in blood test results, the patient maintained watery diarrhoea and abdominal discomfort. All blood cultures, stool exams, including tests for *Clostridium difficile, Giardia* and *Entamoeba*, were negative. The patient had no epidemiological context, no recent travel history or sexual risk behaviours as a heterosexual man. At this point the patient had had diarrhoea for over 4 weeks and had already undergone an extremely invasive investigation as a laparotomy had been performed less than 1 month previously while he was on DAPT given the recent angioplasty. A rectosigmoidoscopy revealed focal hyperaemic areas, suggesting Kaposi's sarcoma despite a negative HIV test ([Figs. 2](#f2-501-1-3343-1-10-20161213){ref-type="fig"} and [3](#f3-501-1-3343-1-10-20161213){ref-type="fig"}). Biopsy results a couple of days later revealing infiltration with rod spiral forms adhesive to the enteral surface, suggesting spirochetosis due to *Brachyspira aalborgi* ([Figs. 4](#f4-501-1-3343-1-10-20161213){ref-type="fig"} and [5](#f5-501-1-3343-1-10-20161213){ref-type="fig"}). The patient was then placed on metronidazol 500 mg four times a day for 10 days with complete resolution of the abdominal pain, diarrhoea and inflammatory markers. He was discharged 4 days later by which time blood tests had completely normalized. He was seen in clinic 1 month later and confirmed complete resolution of symptoms with no diarrhoea or loose stools. DISCUSSION ========== This case report is particularly important because it describes a rare cause of chronic diarrhoea in an immunocompetent patient who underwent several invasive procedures including an exploratory laparotomy while on DAPT. The patient was also admitted to hospital twice and was placed on three different antibiotics over a 1-month period. With this report, we hope to raise awareness of infrequent causes of chronic diarrhoea that are sometimes overlooked in developed countries since they are more common in other parts of the world or in patients with the appropriate epidemiological context^\[[@b5-501-1-3343-1-10-20161213]\]^ as opposed to the case we are describing. It is also relevant that the diagnosis was made through an internal medicine-based approach, since the patient was initially admitted to a cardiology ward and was only reviewed by cardiology and general surgery teams, with the result that several invasive and potentially unnecessary procedures were carried out. **Conflicts of Interests:** The Authors declare that there are no competing interests. ![Abdominal CT showing enlarged bowel.](501_Fig1){#f1-501-1-3343-1-10-20161213} ![Violet-coloured hyperaemic areas seen on rectosigmoidoscopy](501_Fig2){#f2-501-1-3343-1-10-20161213} ![Violet-coloured hyperaemic areas seen on rectosigmoidoscopy](501_Fig3){#f3-501-1-3343-1-10-20161213} ![Spirochetes seen in hematoxylin eosin stain (red arrows)](501_Fig4){#f4-501-1-3343-1-10-20161213} ![Spirochetes seen in Warthin-Starry stain (red arrow)](501_Fig5){#f5-501-1-3343-1-10-20161213}
2024-04-22T01:26:36.242652
https://example.com/article/3774
American Exception: Unlike Others, U.S. Defends Freedom to Offend in Speech VANCOUVER, British Columbia — A couple of years ago, a Canadian magazine published an article arguing that the rise of Islam threatened Western values. The article’s tone was mocking and biting, but it said nothing that conservative magazines and blogs in the United States do not say every day without fear of legal reprisal. Things are different here. The magazine is on trial. Two members of the Canadian Islamic Congress say the magazine, Maclean’s, Canada’s leading newsweekly, violated a provincial hate speech law by stirring up hatred against Muslims. They say the magazine should be forbidden from saying similar things, forced to publish a rebuttal and made to compensate Muslims for injuring their ‘dignity, feelings and self-respect.’ The British Columbia Human Rights Tribunal, which held five days of hearings on those questions here last week, will soon rule on whether Maclean’s violated the law.
2023-11-22T01:26:36.242652
https://example.com/article/1937
Mud Australia Founded in Shelley Simpson in 1994, Mud Australia is the hottest ceramics brand around. Their products have a wonderful tactile quality and are made from Limoges porcelain injected with pigment before manufacture so that the colour sings out both from the glazed insides and the matt, unglazed outsides.
2024-04-08T01:26:36.242652
https://example.com/article/5820
DROID Incredible Gingerbread Update Available for Manual Upgrading The Gingerbread (Android 2.3.4) update for the DROID Incredible may have been pulled by Verizon for further testing, but that doesn’t mean you can’t have it right now. The file has been made available for all users to flash – including non-rooted users. As with any RUU, this will wipe your phone completely and remove root. Your SD card will remain with all of its contents, but this is essentially a factory reset, meaning you will lose all of your apps. We should point out that since VZW has possibly pulled this update, there is a chance that they will reject it and wait for a different build from HTC. So there is a chance that this build will no longer be final and if you upgrade to it, may be off the update path. If you want to be as current as possible without root, then by all means, jump on this. And if you want to keep root, then head over to one of your favorite forums, as I am sure that ROMs are already being built off of this build. Instructions: 1. Download this file [mirror] and drop it on the root of your SD card. 2. Rename the file to PB31IMG.zip 3. Turn your phone off. 4. Press and hold the optical track button along with power – phone should boot to hboot. 5. You should see a list of options. Make sure bootloader is highlighted and press Power. 6. Your phone will start working. 7. Follow the on screen instructions until it finishes and asks you to reboot. 8. Enjoy! *Note – The first boot up after flashing this file will take a long time. If your device stops at the DROID Eye, let it sit there until it boots up fully. If it for some reason boots back to the HTC logo and then to the DROID Eye over and over (bootlooping), you’l have to battery pull and flash the PB31IMG.zip file again.
2024-06-29T01:26:36.242652
https://example.com/article/8962
Ministry STARTING A NEW YEAR I don’t know how 2017 was for you… it might have been great, or it might have been terrible. But if you’re reading this, there’s one thing I do know: you’ve got another year ahead of you named 2018, and it’s here. How will you find the strength to deal with it? I have a quick story and a phrase that might help you in the tight spots. But more importantly, I’d love to hear from you. What’s your go-to when it comes to facing challenges or crises in the moment? Quick Story Back in the day, I was in Undergraduate Pilot Training via the US Air Force. Having made it over half-way through, I went on to the advanced jet trainer, the T-38. I’d like to think I was confident, but not cocky, but I suspect those lines were blurred then. Until the day I got the cockiness knocked out of me. That was the day I met the great ego equalizer: the emergency procedures simulator. In a single 1.3 hour simulator session, instructors could literally throw anything under the sun at you. There were the favorites (engine failure on takeoff, engine fires, electrical failures) and then there were the scenarios that no matter how good you thought you were, there was no surviving. Massive wind shear on final was the beginning of my ego crushing day. I “died” in a dramatic fashion off the end of the runway. But here’s what I learned: don’t let what happened in the past continue to affect your present. I know, easier said than done, right? But here’s how it played out for me. That wind shear scenario was not survivable, but I didn’t know that at the time. I felt like I crashed on a simple approach to the runway and somehow latched on to the idea that I was terrible and would never make it through pilot training (notice the generalization and the projection of the future). As a result, I died many more times that day. I messed up things I even knew how to do correctly. Imagine the ramifications for someone like you, warriors, that have to stay in the fight regardless of what just happened. I had let one situation get inside my head and dictate the rest of my performance in that simulator. And I heard about it too… from the instructor… with many colorful adjectives and general disparagement of my character. But it was in the debrief afterwards that he said a phrase and gave me a philosophy of life that I still live to this day. “New Day, New Jet” Each time the instructor reset the scenarios, he would start by saying, “OK, new day, new jet.” Meaning, the past was wiped out and we were starting fresh. It was true about the “jet,” but it wasn’t true of me. I wasn’t starting fresh. And that’s what he told me. He said when it comes to flying, what happened in the past (even a second ago) is nowhere near as important as what’s happening right now. To survive, I had to constantly renew that mindset of letting the past go and processing what was going on right now to get ahead of the game. The alternative was to crash and burn. And so, I adopted a new phrase, and a new mindset; “New day, new jet.” It served as a reminder to set aside the past and deal with the now in an ever-changing environment. It encourages me to stay in the fight right now, and not try to fight the past (which I cannot change) nor the future (which I cannot control). It helps me bounce back more quickly when I make mistakes or come up short. Now I know that life is much more complex than this simple phrase. We can not and should not just wipe out our past. Our past may need to be dealt with. It might require professional help, like therapy. That’s OK. But when you find yourself “in the mix” and need to just get through the current emergency, it just might help to set aside any mistakes and start fresh in the moment. It’s a new day, new jet… and you have the aircraft called 2018. You’ve got this, as long as you’ve got the right instructor pilot. “Behold, I am doing a new thing; now it springs forth, do you not perceive it? I will make a way in the wilderness and rivers in the desert.” (Is 43:19 ESV) Fight the good fight warriors! Pastor Bill The Xena Project Stay tuned for more information that will continue to build resilience and faith, especially for Veterans, First Responders, and their families, from The Xena Project. Want to help The Xena Project change lives? Check out the rest of the website and consider taking a swipe at the “Donate” button. Your support means so much to so many… Thanks a million!
2023-12-31T01:26:36.242652
https://example.com/article/9101
Q: Why is $(document).ready not firing for me? In a php file i have used include to include the following js.php file and prior to that i have included the jquery file. <script type="text/javascript"> $(document).ready(function(){ alert("hello"); }); </script> But it doesn't work. Why? when I skip the $(document).ready function it works. But i need jquery code inside. what is wrong? A: The most likely answer, based on what you have said, is that the core jQuery file is not actually included correctly in the page. You need something like: <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js"></script> Chances are, this is missing or typed incorrectly. A: Another cause that will silently fail, and all remaining callbacks never called: $(document).ready(null); So check if you have variables or syntax errors that return null. Like this one: $(document).ready(function($){}(jQuery)); Notice that the function above is called instantly and undefined is returned. A: Check whether jQuery is loaded correctly. Look at the browser's progress bar: it may be loading some counters and the document is not ready until they're loaded: this often happens when external resources are slow. Try $(function(){ alert(...); }); just in case... Check whether you have JS errors prior to this onload binding. Use Firefox's FireBug plugin to check it out.
2024-05-30T01:26:36.242652
https://example.com/article/6366
European epicentre ================== In February 2020, Italy became the epicentre for coronavirus disease (COVID-19) in Europe, with many exportations to other countries, and widespread community transmission, particularly in Northern Italy \[[@r1]\]. As a public health response, on 22 February 2020, Italy imposed a lockdown with shutdown of businesses, schools and public places plus physical distancing in 'hotspot' regions close to Milan and Venice. Approximately 50,000 people could not enter or leave several towns in Veneto and Lombardy for 14 days without special permission. The population sizes in these towns range from 927 to 15,293 individuals \[[@r2]\]. As at 9 March 2020, 7,375 laboratory-confirmed cases of COVID-19 and 366 deaths had been observed in Italy, so on that date, the community quarantine was extended to include all of Northern Italy until 3 April. Here we aim to investigate the extent of physical distancing needed to effectively control the outbreak in a lockdown situation in a small size town setting typical of Italy. We specifically estimate the disease burden and the time required until the quarantine can be lifted, by taking into account the time spent by individuals in the public (i.e. outside of the home) and the household size. Stochastic individual based processes ===================================== To account for the importance of stochasticity in individual-based processes within smaller cities and within households, we modelled the outbreak progression as a continuous-time Markov process, specifically by developing a susceptible-exposed-infectious-recovered (SEIR) epidemiological model in the form of a Master equation \[[@r3]-[@r5]\] ([Supplement 1](/content/10.2807/1560-7917.ES.2020.25.13.2000280#supplementary_data)). The model was parameterised to COVID-19 based on published data on incubation time and infectious period \[[@r6],[@r7]\]. We modelled a scenario where 0.1% of the population in the quarantined town would be in the latent period (i.e. the period of time between the point of infection and the onset of infectiousness) at the time of implementing the quarantine policy on 22 February, and that all symptomatic cases would have been moved out the locked-down town (e.g. placed in a hospital for care and isolation). This corresponds to five latent persons in a city of 5,000 persons. Further, we assumed that all persons were isolated after 1 day of symptoms. We also assumed a pre-symptomatic period of infectiousness of 1 day. Of all infected persons, we modelled different proportions of asymptomatic infections (scenarios of 10%, 20% or 50%) based on our preliminary knowledge on such proportions \[[@r8],[@r9]\]. Persons with asymptomatic infections would not be isolated and continue to contribute to transmission. Parameters are summarised in the [Table](#t1){ref-type="table"}. ###### Most central parameters and corresponding values used for the model of COVID-19 outbreak progression in this study Parameter Value ------------------------------------------------------------ ----------------- Incubation period in days 5 Latent period (𝐿) in days 4 Infectious period (1/𝛾) in days 2 Infectious period of asymptomatic persons (1/𝛾~𝑎~) in days 10 Proportion asymptomatic (𝑎) (0.1, 0.2, 0.5) Within household contact-rate (𝑐) 2.1⁄𝜏 Public location contact-rate (𝑐̃) 0.27⁄𝜏 COVID-19: coronavirus disease. The parameter γ denotes the daily rate of recovery from the disease, 𝛾~𝑎~ denotes the daily rate of removal to e.g., a hospital, and τ denotes the probability of virus transmission from an infectious person to a susceptible in the event of contact (See [Supplement 1](/content/10.2807/1560-7917.ES.2020.25.13.2000280#supplementary_data)). Importantly, the standard reproductive rate \[[@r5]\], equal to the product between contact rate and the probability 𝜏 of transmission given a contact event, was set within a household to $\beta\, = \, c\tau\, = \, 2.1~$\[[@r10]\], and within public locations in the community to $\overset{\sim}{\beta} = \overset{\sim}{c}\tau = 0.27$; lower than in mainland China or on the cruise ship Diamond Princess \[[@r10],[@r11]\], as population densities in European towns are lower. The within-household contact-rate, 𝑐, was thus assumed to be eight times higher than the contact-rate 𝑐̃ at public locations. We could then apply a quarantine adherence parameter 𝜑, to model dynamically the amount of time spent in households relative to that in public locations (see [Supplement 1](/content/10.2807/1560-7917.ES.2020.25.13.2000280#supplementary_data) for a more detailed description). Quarantine scenarios ==================== We modelled the effectiveness of quarantine based on the degree of adherence to quarantine, measured by the number of hours per person spent in the public per day. Complete noncompliance to community quarantine corresponds to a reference quarantine level, where individuals perform their every-day out-of-household activities (i.e. working, shopping, socialising) as normal, for an average 10 hours per day. Medium adherence to community quarantine restricts every-day out-of-household activities to 50% of normal, i.e. 5 hours a day. A complete community quarantine corresponds to no out-of-household activities at all, i.e. 0 hours a day. For any degree of quarantine adherence, we tested for four different average household sizes: (i) larger average households of six persons, (ii) medium average households of three persons, (iii) small average households of two persons, and lastly (iv) single-person households. Given that Italy had initially implemented a 14-days lockdown with community quarantine in several towns in Northern Italy, we estimated the number of secondary cases, including asymptomatic cases, in a town of 5,000 persons by the end of this time period in relation to the above scenarios ([Figure 1](#f1){ref-type="fig"}). For any degree of quarantine adherence between 0 and 10 hours, [Figure1A](#f1){ref-type="fig"}, [Figure 1B](#f1){ref-type="fig"} and [Figure 1C](#f1){ref-type="fig"} provide the expected number of secondary infections over 14 days of lockdown, and the number of latent infectious persons and the number of infectious persons respectively at Day 14 of lockdown. These reported numbers relate to a population where 10% of all infected persons are asymptomatic, and would increase for 20% ([Figure 1 D--F](#f1){ref-type="fig"}) or 50% ([Figure 1 G--I](#f1){ref-type="fig"}) asymptomatic cases. ![Estimation of the number of total secondary cases (panels A, D, G) during the 14-days period and the (panels B, E, H) latent and (panels C, F, I) infectious cases of COVID-19 at the end of a 14-days lockdown of a city with a population of 5,000 persons, depending on the degree of community quarantine adherence^a^, the size of quarantine units and the proportion of asymptomatic cases](2000280-f1){#f1} Our model shows how the number of secondary cases within the town increases with the time spent in the public, and also with the average household size (i.e. the quarantine unit). Looking at the extremes, for a six-person household and no community quarantine, we predicted 43 new infections over the 14 days period. In contrast, for a single-person household and complete community quarantine (no time outside of homes), no secondary cases were predicted over the 14 days period. The average household size in Italy is 2.58 according to the Organisation for Economic Co-operation and Development (OECD) \[[@r12]\]. For an average household size of two persons with complete, near-complete, medium and no community quarantine (i.e. 0, 1, 5, and 10 hours respectively in the community), we predict 3, 4, 7 and 11 secondary infections during the lockdown. With an average three-person household size, 7, 8, 12 and 20 secondary infections are predicted, respectively. The average Italian household size 2.58 is thus in-between that of a two-person and three-person household size. With a six-person average household size, 16, 19, 29 and 43 secondary infections would be predicted to occur over the 14-days period, respectively. In addition, our model indicates that the number of secondary, latent and infected cases has a linear relationship with the population size of a lockdown region, provided same population densities apply between cities. In a locked-down area with 50,000 people, we would expect for an average household size of two persons with complete, near-complete, medium and no community quarantine 30, 40, 70 and 110 secondary infections over the 14-days period, respectively. Duration of the quarantine ========================== The objective of the lockdown with community quarantine is to contain the outbreak within a manageable duration. [Figure 2](#f2){ref-type="fig"} shows the results on lockdown durations required for average household sizes of 1, 2, 3 and 6, and for various degrees of strictness of quarantine restrictions. Assuming 10% asymptomatic infections ([Figure 2a](#f2){ref-type="fig"}), for a three-person average household-size situation, around 30 days will be a sufficient length under conditions of near-complete community quarantine adherence. With only medium adherence a duration of 54 days would be necessary. Less strict quarantine will result in much longer lockdown periods, which then become unfeasible for any society. These results are only marginally different to a situation with 50% asymptomatic cases ([Figure 2b](#f2){ref-type="fig"}). In addition, the definition to declare an outbreak over requires waiting two times the maximum incubation period after the last case, e.g. 2 × 14 days. ![Estimation of the required duration of a lockdown with quarantine, to contain a COVID-19 outbreak in a city of 5,000 inhabitants, depending on the quarantine adherence strictness and household size](2000280-f2){#f2} Discussion ========== These findings have major implications. A lockdown is designed to reduce spread beyond the lockdown area, and to also prevent further importation into a lockdown area. In a lockdown area, all measures need to be taken to curb transmission. We showed that transmission will continue to occur unless the most stringent community quarantine measures are being taken in a lockdown setting, which means near-complete reduction of all activities in the community. We also find that smaller household sizes, or quarantine group sizes, are associated with fewer secondary cases. Our model results apply to any small-city population size, and can be generalised to larger towns and cities given the linear relationship between population size and secondary cases, assuming a similar population density. COVID-19 is driven by population densities \[[@r13]\]. For settings with higher population densities, which facilitate more intermixing within the population, higher number of secondary cases are expected. The population density in urban Italy is 205.45/km^2^ \[[@r14]\] compared to Hubei Province, China, where it is 2,804/km^2^ \[[@r15]\]. We note that with near 100% restriction of outdoor activities, all transmission will continue to occur within households. In the event of an average household size of three individuals, this would mean that, as a result of within-household transmission, seven secondary cases would be expected ([Figure 1a](#f1){ref-type="fig"}) in a population of 5,000 persons, or 70 secondary infections in a population of 50,000. Public health measures should be in place to immediately test and isolate infected persons. Quarantine in the wider context ------------------------------- The lockdown in China with government enforced movement restriction outdoors combined with facility-based case isolation, rigorous contact tracing and quarantine of all contacts, had a substantial impact on interrupting the chain of human-to-human transmission in Wuhan, thus effectively containing the outbreak \[[@r16]\]. While the outbreak in Wuhan involved a highly urbanised setting, the current lockdown in Italy involves small villages with a different social culture and behaviour, and different mechanisms of quarantine enforcement. Our findings suggest that the degree of quarantine adherence needs to be very high regardless of population size in order to be effective. We note, however, that a less strict community quarantine could still flatten the curve of the outbreak compared to no quarantine \[[@r17]\]. In any case, quarantine adherence has an Important and notable impact on reducing the outbreak, but some transmission will still occur within households. We showed that in a theoretical scenario of a single-person household with very strict community quarantine measures, no secondary infections would occur. While a single-person household does not reflect the reality of any society, it does suggest that if all cases could be isolated, e.g. moved out of the community, the epidemic curve would decline much faster and the lockdown duration could be reduced. This means that more efforts need to be done at household level: keeping physical distance even within a household combined with wearing face masks and segregated within-household isolation, or better all symptomatic cases ideally need to be promptly moved out of the household, and isolated in a designated facility. Prompt testing is therefore needed for timely diagnosis and immediate isolation. We also show that a 14-days lockdown period is not sufficient for most scenarios; a longer lockdown duration is needed. On 8 March, Italy announced the need to extend the lockdown to include around 16 million people for 25 additional days until 3 April. Such longer duration should in fact be expected to be required, to have a positive impact, which is going to be very challenging for affected communities to be supplied in food, essential services and to be able to cope psychologically. If lockdown is enforced, it must be done rigorously to truly interrupt transmission, and this would mean near 100% restriction of contacts between persons within the community combined with prompt isolation of new cases. Less strict quarantine adherence would imply even longer lockdown periods, and longer lockdown periods will likely present even greater socioeconomic challenges. By implementing the world's largest lockdown combined with prompt case isolation, contact tracing of contacts and with strict enforcement of physical distancing \[[@r16]\], containment of COVID-19 in China was shown to be feasible. Remarkably, in South Korea, the control of the outbreak, which had been temporarily lost, was regained without lockdown but with rigorous active case finding, by liberal testing, prompt isolation, and by using novel digital technologies to maximise contact tracing and quarantine of all contacts \[[@r18]\]. In certain places like Taiwan \[[@r19]\], Singapore \[[@r20]\] and Hong Kong, a flat epidemic curve was maintained for COVID-19 by applying very liberal testing, prompt case isolation outside of the community (no home isolation even of the mildest cases), and technologically enhanced contact tracing, very early in the outbreak. If the lockdown in Italy, and meanwhile in many other European countries, is aimed at containment, close to 100% restriction of contact time within communities combined with prompt case detection and immediate isolation of infected persons need to be achieved. **Conflict of interest:** None declared. **Authors' contributions:** HS and ZF did the modelling and created the figures. AWS had the study idea. JR, HS and AWS conceptualized the study; AWS, JR and SO provided parameters. AWS, HS and JR wrote the first draft of the manuscript. All authors contributed to the final manuscript. 81000 ###### Supplement 1 ###### Click here for additional data file. [^1]: Correspondence: Annelies Wilder-Smith (<annelies.wilder-smith@lshtm.ac.uk>)
2023-12-02T01:26:36.242652
https://example.com/article/2543
The Flash (2011-2016) #8 $1.99 The Flash (2011-2016) Vol. 1: Move Forward $12.99 The Flash (2011-2016) #8 The Flash gets pulled into the Speed Force that gives him his super-speed powers...and he learns he's not alone in there. Introducing Turbine, a prisoner of the Speed Force who just wants out, even if it means trading places with The Flash!
2024-03-22T01:26:36.242652
https://example.com/article/3592
STATE OF MISSOURI, ) ) Plaintiff-Respondent, ) ) vs. ) No. SD33468 ) JOHN SCOTT CRAMER, ) Filed: July 13, 2015 ) Defendant-Appellant. ) APPEAL FROM THE CIRCUIT COURT OF CAMDEN COUNTY Honorable Kenneth M. Hayden AFFIRMED John Scott Cramer ("Defendant") appeals from his conviction for one count of first-degree child molestation. See § 566.067.1 Defendant argues the trial court abused its discretion when it admitted Exhibit 9, which contained swabs used to take DNA samples from Defendant's hands, because there was not a sufficient foundation for that exhibit. We disagree and affirm the trial court's judgment. 1 All statutory references are to RSMo Cum. Supp. (2013). Factual and Procedural Background On October 2, 2010, Defendant and his wife went to spend the night at the home of Defendant's brother, Jason Cramer ("Mr. Cramer") in Camden County. Early the next morning, Defendant's wife woke up and saw Defendant coming out of the bedroom used by Mr. Cramer's four-year-old daughter ("Victim"). Defendant's wife confronted Defendant, and Defendant admitted he had touched Victim. Defendant was subsequently arrested, and after his arrest, Detective Donald Scott Hines of the Camden County Sheriff's Department collected DNA samples from Defendant's hands using four cotton swabs. DNA found in the crotch of the underwear Victim had worn on the night of the offense was tested, and the results showed that DNA to be consistent with a mixture of Victim's DNA and the DNA on the swabs Detective Hines collected from Defendant's hands. Later, Detective Hines took a buccal swab from Defendant. The DNA analyst at the laboratory used the sample from the buccal swab as a reference standard to develop a DNA profile for Defendant. Testing showed the DNA sample from Defendant's buccal swab was consistent with both the DNA from the previous samples and the DNA found in Victim's underwear. Defendant was charged with one count of first-degree child molestation. Defendant was tried by a jury on February 3 through February 6, 2014. At trial, the DNA evidence was presented to the jury through several exhibits and the testimony of four witnesses. 2 First, Detective Hines described taking the DNA samples from Defendant's hands. He stated Exhibit 9 contained what appeared to be the samples he took from Defendant's hands. Detective Hines next identified Exhibit 10 as the buccal swabs taken from Defendant. Detective Hines stated that after collecting the samples in Exhibit 10 from Defendant, he packaged the buccal swabs and delivered the buccal swabs to the crime laboratory for DNA analysis. The prosecutor then offered Exhibit 9 and Exhibit 10 into evidence. Defendant objected to the admission of both exhibits based on lack of foundation. Defendant argued there was no testimony explaining how Detective Hines "knew that these items were in fact items that he had taken as far as any identifying marks on the sample specimens." The trial court gave Defendant's attorney an opportunity to voir dire the witness. During that questioning, Detective Hines admitted he did not mark the samples in Exhibit 9 to indicate he was the one who collected the samples or to indicate the swabs were the ones he took from Defendant. The trial court sustained the objection with respect to Exhibit 9, but indicated he would reconsider the decision if the prosecutor could lay further foundation. The trial court admitted Exhibit 10 over Defendant's objection. The prosecutor then continued questioning Detective Hines. Detective Hines stated there was "no question" in his mind that the samples in Exhibit 9 were the samples he had taken from Defendant. He further explained that after collecting the Exhibit 9 samples, he took them to the evidence packaging room where he gave them to Deputy Travis Michael Edgar. 3 Then the prosecutor called Deputy Edgar to the stand. Deputy Edgar stated that when Detective Hines brought the Exhibit 9 samples to the evidence room, Deputy Edgar "immediately got a package and packaged them to be placed into evidence." The prosecutor then offered Exhibit 9 again, and this time the trial court overruled Defendant's objection. After that testimony, the prosecutor presented the testimony of two DNA analysts who explained the DNA testing process and stated that the samples in both Exhibit 9 and Exhibit 10 were consistent with DNA found in the Victim's underwear. The jury found Defendant guilty as charged. This appeal follows. Discussion In his sole point on appeal, Defendant argues the trial court abused its discretion in admitting Exhibit 9 because "the State made no identifying marks on the DNA samples contained in Exhibit 9, and it therefore could not show that the samples were the ones taken from [Defendant]." This argument is without merit. This Court reviews questions involving the foundation for the admission of evidence for an abuse of discretion. See State v. Bowman, 337 S.W.3d 679, 689 (Mo. banc 2011) (noting that the trial court has broad discretion in determining the sufficiency of the chain of custody). "Missouri law requires the State to provide a 'reasonable assurance' that the exhibit sought to be introduced is received from the defendant and is in like condition at the time of introduction as when received." State v. Jones, 204 S.W.3d 287, 296 (Mo. App. S.D. 2006). "This may be proven by evidence establishing a chain of custody[.]" Bowman, 4 337 S.W.3d at 689. "However, when an exhibit is identified positively at trial, chain of custody evidence no longer is required to prove that an item produced at trial is the item taken into custody as evidence." Id. In fact, visual identification, without more, is sufficient to identify physical evidence and support its admission at trial. Id. at 689-90. In the present case, the State presented sufficient evidence to provide reasonable assurance of the identity of Exhibit 9. After Defendant first objected to the admission of Exhibit 9 because it had not been marked, the prosecutor questioned Detective Hines further. During that questioning, Detective Hines stated that there was "no question" in his mind that the samples in Exhibit 9 were the samples he took from Defendant's hands. Additionally, the prosecutor presented evidence that Detective Hines took the swabs directly to Deputy Edgar, who "immediately" packaged the samples to be placed into evidence. Finally, the prosecutor presented the evidence regarding the collecting and testing of the buccal swab from Defendant. On appeal, Defendant does not challenge the admission of the buccal swab in Exhibit 10. The DNA in the buccal swab in Exhibit 10, a known sample, was consistent with the samples in Exhibit 9. The testimony of Deputy Edgar and the testing of the buccal swab provide reasonable assurance that the samples in Exhibit 9 were the samples taken from Defendant's hands. The trial court did not abuse its discretion in determining there was a sufficient foundation for the admission of Exhibit 9. 5 Decision The trial court's judgment is affirmed. MARY W. SHEFFIELD, C.J. – OPINION AUTHOR DANIEL E. SCOTT, P.J. – CONCURS JEFFREY W. BATES, J. – CONCURS 6
2023-12-30T01:26:36.242652
https://example.com/article/3635
Two years ago, UConn's season came crashing to an end in an NCAA Tournament game against Iowa State. Much was different then. UConn was the defending national champion and Iowa State was relatively unknown on the national stage. The game was in Louisville, hardly a home-away-from-home for the Huskies. Iowa State built a big early lead and won, 77-64. "I'm as surprised as anybody," Jim Calhoun said to begin what was to be his last postgame press conference as UConn coach. "Fred [Hoiberg] and the Iowa State team showed up at a different speed, a different level than what we played. … For whatever reason, we got caught as being nothing more than a street sign as they went by us a thousand miles an hour in that first 10 minutes of basketball." Shabazz Napier and Ryan Boatright, who appeared on the podium with Calhoun that night, and Niels Giffey and DeAndre Daniels are still playing for UConn. For Iowa State, Melvin Ejim is still there and has grown to be the Big 12 player of the year. "Well, there's really not much you can take from it," said Hoiberg, still Iowa State's coach. "We had Royce White and we ran everything through him. And he has moved on to the NBA. They had Oriahki and Drummond inside then. This [UConn team] is obviously Napier's team. Boatright can score in bunches. I'm very impressed with Daniels, and Giffey at the perimeter. This is a completely different game, a completely different prep." UConn and Iowa State cross paths Friday night, this time deeper in the NCAA Tournament. The Huskies have a different coach, Kevin Ollie, and the perception is that they will have a home-court advantage at Madison Square Garden for the East Regional semifinal at 7:27 p.m. Hoiberg, who spoke via conference call on Tuesday, and Ollie, both 41, have been friends for more than 20 years, when both took a recruiting trip to Arizona as high school students. Later they were teammates with the Bulls for half a season, and when Hoiberg was assistant GM with the Timberwolves, Ollie played there. "He's one of the best teammates I ever had," Hoiberg said. "There was no doubt in my mind he would be a successful head coach, just because of how smart a person he is, off court and on the court. Neither of us were guys you go to, great players, per se. But both of us thought about the game. I couldn't be happier for what Kevin has accomplished." "They're a very high level team," Ollie told Sirius XM radio Tuesday, "Ejim, DeAndre Kane, Dustin Hogue, I could go right on down the list. I know they're missing Niang, a vital part of their offense with his facilitating ability, but they come out guns blazing. Their tempo. And Fred, if he sees a mismatch, he's going to keep going to it and going to it. That's his NBA background." Hoiberg has a feel for what a UConn crowd at the Garden will be like, having been at Big East tournament games there as an NBA scout. "I thought [UConn's was] the best fan base out there," Hoiberg said. "They really get into the game. We understand what's in front of us. We played games on the road in the Big 12, played at BYU this year; all those hostile environments prepare you for a moment like this. You have to keep guys mentally strong, mentally tough. We had that in the Big 12 [tournament] this year, when we played Baylor and maybe 18,000 fans out of 20,000 in the building [were Baylor fans]. It's an advantage, no doubt." No. 3 seed Iowa State (28-7), a program that Hoiberg built quickly with transfers, fought through a tough stretch in January with losses to Oklahoma, Texas and two to Kansas in a five-game stretch. The Cyclones rebounded to win the Big 12 tournament and began the NCAA Tournament with a win over North Carolina Central. But they lost Georges Niang (16.7 ppg), their versatile, 6-foot-7 forward, to a broken foot in the N.C. Central game. Behind Ejim (19 points) and DeAndre Kane (24 points, 10 rebounds), the Cyclones knocked off North Carolina on Sunday in San Antonio to advance to the Sweet 16. Ejim, 6-6, who has international experience with the Nigerian and Canadian national teams, averages 18.1 points and 8.4 rebounds, and Kane, the 6-4 point guard, averages 17.1 points and 5.8 assists. "DeAndre is so versatile, he can facilitate offense from anywhere on the court," Hoiberg said. "You're not going to replace Georges with just one guy. Everybody's got to have a little more on their plate." "Those two guards are as good as we'll play against all year in terms of playmaking, breaking the defense down off the dribble, creating for themselves and teammates. Their shooting numbers are off the charts, they have guys who can hit from outside if you help out on penetration, it's a difficult assignment for anybody. And Napier, when you face somebody who can absolutely take over a game at any moment, that's a tough prep for anybody." The return of the NCAA Tournament to Madison Square Garden after 53 years figured to make for a hot, expensive ticket. But UConn's inclusion in the Sweet 16 seems to have helped drive prices through the Garden roof. The NCAA Tournament is perhaps the most fan-friendly sporting event of the year and has terrific fan involvement (how's your bracket?). Here are five trivial-but-cool NCAA facts as we wait for UConn to play Iowa State in its Sweet 16 game Friday night: Dave Leitao, the former UConn assistant who spent more than 15 years coaching alongside Jim Calhoun, is returning as head coach of the DePaul men's basketball team, a job he held for three years in the mid 2000s. YIFAT, Israel — Couples of all ages are enjoying Valentine's Day desserts and dinners when Uri Cohen-Mintz walks into a restaurant here and takes a seat by the window. He gazes at several patrons and then down at their plates, as if taking mental notes. To celebrate the silver anniversary of the UConn men's 1989-90 Dream Season, The Courant will be looking at players and coaches who helped make that team special. Stories will appear periodically throughout the season.
2023-10-03T01:26:36.242652
https://example.com/article/6942
“This is the pinnacle of sports. This is two teams playing for that bye, that first-round pass. I think it’s a big thing for us. It’s probably the biggest game of my life so far, so I’m looking forward to it.” Sure, Canada is a more experienced team than the U.S., but let’s not forget that the Americans have done pretty well so far in Vancouver. They beat Switzerland 3-1 in their opening game and beat Norway 6-1 earlier. “Here, every TV in Canada is going to be watching, and I think because it’s Sunday, a good many in the United States will be watching. Anybody who’s a hockey fan will be watching this game.” So what do you think folks? Who are you rooting for? Team USA or Team Canada? I would love to hear your predictions as well. I know who my Canadian cousins are hoping will win, but I’d like to see a major upset. We will find out soon enough! The game is televised live on MSNBC starting at 7:40 PM EST. If you want to watch USA vs Canada hockey live streaming, video is below. Go Team USA! USA Hockey – Video This entry was posted on February 21, 2010 at 5:39 pm and is filed under Hockey, Live Web Feed, Olympics. You can follow any responses to this entry through the RSS 2.0 feed.
2023-12-07T01:26:36.242652
https://example.com/article/5881
Stability indicating LC method for rapid determination of related substances of O-desmethyl venlafaxine in active pharmaceutical ingredients and pharmaceutical formulations. A simple, precise and accurate stability-indicating reversed phase-high performance liquid chromatography method was developed for the quantitative determination of O-desmethyl venlafaxine (ODV) and its related substances in active pharmaceutical ingredient and pharmaceutical formulation. The method was developed using YMC-pack ODS-A (150 × 4.6 mm, 3 μm) column with mobile phase containing a gradient mixture of solvents A and B. Solvent A contained a mixture of buffer and acetonitrile in the ratio of 85:15 (v/v). The buffer consisted of 10 mM potassium dihydrogen phosphate and 2 mM 1-octane sulfonic acid sodium salt (pH adjusted to 6.0 by using diluted potassium hydroxide solution). Solvent B contained a mixture of water and acetonitrile in the ratio of 20:80 (v/v). The eluted compounds were monitored at 230 nm. ODV and its six impurities were well separated within 14 min run time. It was subjected under the stress conditions of oxidative, acid, base, water, thermal and photolytic degradation. It was sensitive towards acidic, basic, oxidative and water stress conditions, stable in photolytic and thermal degradation conditions. The degradation products were well resolved from main peak and its impurities, the mass balance in each case was >99.0%, proving the stability-indicating power of the method. The developed method was validated as per International Conference on Harmonization (ICH) guidelines with respect to its specificity, linearity (correlation coefficient >0.9996), limit of detection, limit of quantification, accuracy (recovery range 97.1-103.2%), precision (% relative standard deviation ≤1.9%) and robustness.
2024-04-24T01:26:36.242652
https://example.com/article/9787
const struct SpritePalette gUnknown_83A5340 = { .data = gUnknown_8398FA8, .tag = 0x1004 }; const struct SpritePalette gUnknown_83A5348 = { .data = gUnknown_8398FC8, .tag = 0x1005 }; const union AnimCmd gUnknown_83A5350[] = { ANIMCMD_FRAME(0, 1), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5358[] = { gUnknown_83A5350, }; const struct SpriteFrameImage gUnknown_83A535C[] = { obj_frame_tiles(gUnknown_8398048) }; const struct SpriteFrameImage gUnknown_83A5364[] = { obj_frame_tiles(gUnknown_8398068) }; const struct SpriteFrameImage gUnknown_83A536C[] = { obj_frame_tiles(gUnknown_83980A8) }; const struct SpriteFrameImage gUnknown_83A5374[] = { obj_frame_tiles(gUnknown_8398128) }; const struct SpriteTemplate gUnknown_83A537C = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_8x8, .anims = gUnknown_83A5358, .images = gUnknown_83A535C, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateShadowFieldEffect, }; const struct SpriteTemplate gUnknown_83A5394 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_16x8, .anims = gUnknown_83A5358, .images = gUnknown_83A5364, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateShadowFieldEffect, }; const struct SpriteTemplate gUnknown_83A53AC = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_32x8, .anims = gUnknown_83A5358, .images = gUnknown_83A536C, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateShadowFieldEffect, }; const struct SpriteTemplate gUnknown_83A53C4 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_64x32, .anims = gUnknown_83A5358, .images = gUnknown_83A5374, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateShadowFieldEffect, }; const struct SpriteFrameImage gUnknown_83A53DC[] = { overworld_frame(gUnknown_839A008, 2, 2, 0), overworld_frame(gUnknown_839A008, 2, 2, 1), overworld_frame(gUnknown_839A008, 2, 2, 2), overworld_frame(gUnknown_839A008, 2, 2, 3), overworld_frame(gUnknown_839A008, 2, 2, 4), }; const union AnimCmd gUnknown_83A5404[] = { ANIMCMD_FRAME(1, 10), ANIMCMD_FRAME(2, 10), ANIMCMD_FRAME(3, 10), ANIMCMD_FRAME(4, 10), ANIMCMD_FRAME(0, 10), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A541C[] = { gUnknown_83A5404, }; const struct SpriteTemplate gUnknown_83A5420 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A541C, .images = gUnknown_83A53DC, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateTallGrassFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5438[] = { overworld_frame(gUnknown_83986A8, 2, 2, 0), overworld_frame(gUnknown_83986A8, 2, 2, 1), overworld_frame(gUnknown_83986A8, 2, 2, 2), overworld_frame(gUnknown_83986A8, 2, 2, 3), overworld_frame(gUnknown_83986A8, 2, 2, 4), }; const union AnimCmd gUnknown_83A5460[] = { ANIMCMD_FRAME(0, 12), ANIMCMD_FRAME(1, 9), ANIMCMD_FRAME(2, 9), ANIMCMD_FRAME(3, 9), ANIMCMD_FRAME(0, 9), ANIMCMD_FRAME(1, 9), ANIMCMD_FRAME(2, 11), ANIMCMD_FRAME(4, 11), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5484[] = { gUnknown_83A5460, }; const struct SpriteTemplate gUnknown_83A5488 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5484, .images = gUnknown_83A5438, .affineAnims = gDummySpriteAffineAnimTable, .callback = WaitFieldEffectSpriteAnim, }; const struct SpriteFrameImage gUnknown_83A54A0[] = { overworld_frame(gUnknown_8398928, 2, 2, 0), overworld_frame(gUnknown_8398928, 2, 2, 1), overworld_frame(gUnknown_8398928, 2, 2, 2), overworld_frame(gUnknown_8398928, 2, 2, 3), overworld_frame(gUnknown_8398928, 2, 2, 4), }; const union AnimCmd gUnknown_83A54C8[] = { ANIMCMD_FRAME(0, 12), ANIMCMD_FRAME(1, 12), ANIMCMD_FRAME(2, 8), ANIMCMD_FRAME(3, 12), ANIMCMD_FRAME(4, 12), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A54E0[] = { gUnknown_83A54C8, }; const struct SpriteTemplate gUnknown_83A54E4 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A54E0, .images = gUnknown_83A54A0, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateAshFieldEffect, }; const struct SpriteFrameImage gObjectEventPicTable_SurfBlob[] = { overworld_frame(gObjectEventPic_SurfBlob, 2, 8, 0), overworld_frame(gObjectEventPic_SurfBlob, 2, 8, 1), overworld_frame(gObjectEventPic_SurfBlob, 2, 8, 2), overworld_frame(gObjectEventPic_SurfBlob, 2, 8, 3), overworld_frame(gObjectEventPic_SurfBlob, 2, 8, 4), overworld_frame(gObjectEventPic_SurfBlob, 2, 8, 5), }; const union AnimCmd gUnknown_83A552C[] = { ANIMCMD_FRAME(0, 48), ANIMCMD_FRAME(1, 48), ANIMCMD_JUMP(0), }; const union AnimCmd gUnknown_83A5538[] = { ANIMCMD_FRAME(2, 48), ANIMCMD_FRAME(3, 48), ANIMCMD_JUMP(0), }; const union AnimCmd gUnknown_83A5544[] = { ANIMCMD_FRAME(4, 48), ANIMCMD_FRAME(5, 48), ANIMCMD_JUMP(0), }; const union AnimCmd gUnknown_83A5550[] = { ANIMCMD_FRAME(4, 48, .hFlip = TRUE), ANIMCMD_FRAME(5, 48, .hFlip = TRUE), ANIMCMD_JUMP(0), }; const union AnimCmd *const gUnknown_83A555C[] = { gUnknown_83A552C, gUnknown_83A5538, gUnknown_83A5544, gUnknown_83A5550, }; const struct SpriteTemplate gUnknown_83A556C = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_32x32, .anims = gUnknown_83A555C, .images = gObjectEventPicTable_SurfBlob, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateSurfBlobFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5584[] = { overworld_frame(gUnknown_8398BA8, 2, 2, 0), overworld_frame(gUnknown_8398BA8, 2, 2, 1), overworld_frame(gUnknown_8398BA8, 2, 2, 2), overworld_frame(gUnknown_8398BA8, 2, 2, 3), overworld_frame(gUnknown_8398BA8, 2, 2, 4), overworld_frame(gUnknown_8398BA8, 2, 2, 5), overworld_frame(gUnknown_8398BA8, 2, 2, 6), overworld_frame(gUnknown_8398BA8, 2, 2, 7), }; const union AnimCmd gUnknown_83A55C4[] = { ANIMCMD_FRAME(2, 32), ANIMCMD_FRAME(3, 32), ANIMCMD_JUMP(0), }; const union AnimCmd gUnknown_83A55D0[] = { ANIMCMD_FRAME(0, 32), ANIMCMD_FRAME(1, 32), ANIMCMD_JUMP(0), }; const union AnimCmd gUnknown_83A55DC[] = { ANIMCMD_FRAME(4, 32), ANIMCMD_FRAME(5, 32), ANIMCMD_JUMP(0), }; const union AnimCmd gUnknown_83A55E8[] = { ANIMCMD_FRAME(6, 32), ANIMCMD_FRAME(7, 32), ANIMCMD_JUMP(0), }; const union AnimCmd *const gUnknown_83A55F4[] = { gUnknown_83A55C4, gUnknown_83A55D0, gUnknown_83A55DC, gUnknown_83A55E8, }; const struct SpriteTemplate gUnknown_83A5604 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A55F4, .images = gUnknown_83A5584, .affineAnims = gDummySpriteAffineAnimTable, .callback = SpriteCallbackDummy, }; const struct SpriteFrameImage gUnknown_83A561C[] = { overworld_frame(gUnknown_8399008, 2, 1, 0), overworld_frame(gUnknown_8399008, 2, 1, 1), overworld_frame(gUnknown_8399008, 2, 1, 2), }; const union AnimCmd gUnknown_83A5634[] = { ANIMCMD_FRAME(0, 8), ANIMCMD_FRAME(1, 8), ANIMCMD_FRAME(2, 8), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5644[] = { gUnknown_83A5634, }; const struct SpriteTemplate gUnknown_83A5648 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x8, .anims = gUnknown_83A5644, .images = gUnknown_83A561C, .affineAnims = gDummySpriteAffineAnimTable, .callback = sub_80DCCE0, }; const struct SpriteFrameImage gUnknown_83A5660[] = { overworld_frame(gUnknown_8399188, 2, 1, 0), overworld_frame(gUnknown_8399188, 2, 1, 1), overworld_frame(gUnknown_8399188, 2, 1, 2), overworld_frame(gUnknown_8399188, 2, 1, 3), }; const union AnimCmd gUnknown_83A5680[] = { ANIMCMD_FRAME(0, 8), ANIMCMD_FRAME(1, 8), ANIMCMD_FRAME(2, 8), ANIMCMD_FRAME(3, 8), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5694[] = { gUnknown_83A5680, }; const struct SpriteTemplate gUnknown_83A5698 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x8, .anims = gUnknown_83A5694, .images = gUnknown_83A5660, .affineAnims = gDummySpriteAffineAnimTable, .callback = sub_80DCCE0, }; const struct SpriteFrameImage gUnknown_83A56B0[] = { overworld_frame(gUnknown_839A388, 2, 2, 0), overworld_frame(gUnknown_839A388, 2, 2, 1), }; const union AnimCmd gUnknown_83A56C0[] = { ANIMCMD_FRAME(0, 1, .vFlip = TRUE), ANIMCMD_END, }; const union AnimCmd gUnknown_83A56C8[] = { ANIMCMD_FRAME(0, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A56D0[] = { ANIMCMD_FRAME(1, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A56D8[] = { ANIMCMD_FRAME(1, 1, .hFlip = TRUE), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A56E0[] = { gUnknown_83A56C0, gUnknown_83A56C0, gUnknown_83A56C8, gUnknown_83A56D0, gUnknown_83A56D8, }; const struct SpriteTemplate gUnknown_83A56F4 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A56E0, .images = gUnknown_83A56B0, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateFootprintsTireTracksFieldEffect, }; const struct SpriteFrameImage gUnknown_83A570C[] = { overworld_frame(gUnknown_839A488, 2, 2, 0), overworld_frame(gUnknown_839A488, 2, 2, 1), }; const union AnimCmd gUnknown_83A571C[] = { ANIMCMD_FRAME(0, 1, .vFlip = TRUE), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5724[] = { ANIMCMD_FRAME(0, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A572C[] = { ANIMCMD_FRAME(1, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5734[] = { ANIMCMD_FRAME(1, 1, .hFlip = TRUE), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A573C[] = { gUnknown_83A571C, gUnknown_83A571C, gUnknown_83A5724, gUnknown_83A572C, gUnknown_83A5734, }; const struct SpriteTemplate gUnknown_83A5750 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A573C, .images = gUnknown_83A570C, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateFootprintsTireTracksFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5768[] = { overworld_frame(gUnknown_839A588, 2, 2, 0), overworld_frame(gUnknown_839A588, 2, 2, 1), overworld_frame(gUnknown_839A588, 2, 2, 2), overworld_frame(gUnknown_839A588, 2, 2, 3), }; const union AnimCmd gUnknown_83A5788[] = { ANIMCMD_FRAME(2, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5790[] = { ANIMCMD_FRAME(2, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5798[] = { ANIMCMD_FRAME(1, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A57A0[] = { ANIMCMD_FRAME(1, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A57A8[] = { ANIMCMD_FRAME(0, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A57B0[] = { ANIMCMD_FRAME(0, 1, .hFlip = TRUE), ANIMCMD_END, }; const union AnimCmd gUnknown_83A57B8[] = { ANIMCMD_FRAME(3, 1, .hFlip = TRUE), ANIMCMD_END, }; const union AnimCmd gUnknown_83A57C0[] = { ANIMCMD_FRAME(3, 1), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A57C8[] = { gUnknown_83A5788, gUnknown_83A5788, gUnknown_83A5790, gUnknown_83A5798, gUnknown_83A57A0, gUnknown_83A57A8, gUnknown_83A57B0, gUnknown_83A57B8, gUnknown_83A57C0, }; const struct SpriteTemplate gUnknown_83A57EC = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A57C8, .images = gUnknown_83A5768, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateFootprintsTireTracksFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5804[] = { overworld_frame(gUnknown_839AA48, 2, 2, 0), overworld_frame(gUnknown_839AA48, 2, 2, 1), overworld_frame(gUnknown_839AA48, 2, 2, 2), overworld_frame(gUnknown_839AA48, 2, 2, 3), }; const union AnimCmd gUnknown_83A5824[] = { ANIMCMD_FRAME(0, 8), ANIMCMD_FRAME(1, 8), ANIMCMD_FRAME(2, 8), ANIMCMD_FRAME(3, 8), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5838[] = { gUnknown_83A5824, }; const struct SpriteTemplate gUnknown_83A583C = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5838, .images = gUnknown_83A5804, .affineAnims = gDummySpriteAffineAnimTable, .callback = sub_80DCCE0, }; const struct SpriteFrameImage gUnknown_83A5854[] = { overworld_frame(gUnknown_839AC48, 2, 1, 0), overworld_frame(gUnknown_839AC48, 2, 1, 1), }; const union AnimCmd gUnknown_83A5864[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5870[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(0, 6), ANIMCMD_FRAME(1, 6), ANIMCMD_FRAME(0, 8), ANIMCMD_FRAME(1, 8), ANIMCMD_FRAME(0, 6), ANIMCMD_FRAME(1, 6), ANIMCMD_JUMP(0), }; const union AnimCmd *const gUnknown_83A5894[] = { gUnknown_83A5864, gUnknown_83A5870, }; const struct SpriteTemplate gUnknown_83A589C = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x8, .anims = gUnknown_83A5894, .images = gUnknown_83A5854, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateSplashFieldEffect, }; const struct SpriteFrameImage gUnknown_83A58B4[] = { overworld_frame(gUnknown_839ACC8, 2, 1, 0), overworld_frame(gUnknown_839ACC8, 2, 1, 1), overworld_frame(gUnknown_839ACC8, 2, 1, 2), }; const union AnimCmd gUnknown_83A58CC[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A58DC[] = { gUnknown_83A58CC, }; const struct SpriteTemplate gUnknown_83A58E0 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x8, .anims = gUnknown_83A58DC, .images = gUnknown_83A58B4, .affineAnims = gDummySpriteAffineAnimTable, .callback = sub_80DCCE0, }; const struct SpriteFrameImage gUnknown_83A58F8[] = { overworld_frame(gUnknown_8399E08, 2, 2, 0), overworld_frame(gUnknown_8399E08, 2, 2, 1), overworld_frame(gUnknown_8399E08, 2, 2, 2), overworld_frame(gUnknown_8399E08, 2, 2, 3), }; const union AnimCmd gUnknown_83A5918[] = { ANIMCMD_FRAME(1, 3), ANIMCMD_FRAME(2, 3), ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_FRAME(0, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5938[] = { gUnknown_83A5918, }; const struct SpriteTemplate gUnknown_83A593C = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5938, .images = gUnknown_83A58F8, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateLongGrassFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5954[] = { overworld_frame(gUnknown_8399488, 2, 2, 0), overworld_frame(gUnknown_8399488, 2, 2, 1), overworld_frame(gUnknown_8399488, 2, 2, 2), overworld_frame(gUnknown_8399488, 2, 2, 3), overworld_frame(gUnknown_8399488, 2, 2, 4), overworld_frame(gUnknown_8399488, 2, 2, 6), }; const union AnimCmd gUnknown_83A5984[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 8), ANIMCMD_FRAME(3, 8), ANIMCMD_FRAME(4, 8), ANIMCMD_FRAME(5, 8), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A59A0[] = { gUnknown_83A5984, }; const struct SpriteTemplate gUnknown_83A59A4 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A59A0, .images = gUnknown_83A5954, .affineAnims = gDummySpriteAffineAnimTable, .callback = sub_80DCCE0, }; const struct SpriteFrameImage gUnknown_83A59BC[] = { overworld_frame(gUnknown_8399788, 2, 2, 0), overworld_frame(gUnknown_8399788, 2, 2, 1), overworld_frame(gUnknown_8399788, 2, 2, 2), overworld_frame(gUnknown_8399788, 2, 2, 3), overworld_frame(gUnknown_8399788, 2, 2, 4), overworld_frame(gUnknown_8399788, 2, 2, 5), overworld_frame(gUnknown_8399788, 2, 2, 6), overworld_frame(gUnknown_8399788, 2, 2, 7), overworld_frame(gUnknown_8399788, 2, 2, 8), }; const union AnimCmd gUnknown_83A5A04[] = { ANIMCMD_FRAME(0, 10), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_FRAME(4, 4), ANIMCMD_FRAME(5, 4), ANIMCMD_FRAME(6, 4), ANIMCMD_FRAME(7, 4), ANIMCMD_FRAME(8, 4), ANIMCMD_JUMP(7), }; const union AnimCmd *const gUnknown_83A5A2C[] = { gUnknown_83A5A04, }; const struct SpriteTemplate gUnknown_83A5A30 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5A2C, .images = gUnknown_83A59BC, .affineAnims = gDummySpriteAffineAnimTable, .callback = WaitFieldEffectSpriteAnim, }; const struct SpriteFrameImage gUnknown_83A5A48[] = { overworld_frame(gUnknown_8399C08, 2, 2, 0), overworld_frame(gUnknown_8399C08, 2, 2, 1), overworld_frame(gUnknown_8399C08, 2, 2, 2), overworld_frame(gUnknown_8399C08, 2, 2, 3), }; const union AnimCmd gUnknown_83A5A68[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_JUMP(0), }; const union AnimCmd *const gUnknown_83A5A84[] = { gUnknown_83A5A68, }; const struct SpriteTemplate gUnknown_83A5A88 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5A84, .images = gUnknown_83A5A48, .affineAnims = gDummySpriteAffineAnimTable, .callback = WaitFieldEffectSpriteAnim, }; const struct SpriteFrameImage gUnknown_83A5AA0[] = { overworld_frame(gUnknown_839A788, 2, 2, 0), overworld_frame(gUnknown_839A788, 2, 2, 1), overworld_frame(gUnknown_839A788, 2, 2, 2), overworld_frame(gUnknown_839A788, 2, 2, 3), }; const union AnimCmd gUnknown_83A5AC0[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_JUMP(0), }; const union AnimCmd *const gUnknown_83A5AD4[] = { gUnknown_83A5AC0, }; const struct SpriteTemplate gUnknown_83A5AD8 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5AD4, .images = gUnknown_83A5AA0, .affineAnims = gDummySpriteAffineAnimTable, .callback = WaitFieldEffectSpriteAnim, }; const struct SpriteFrameImage gUnknown_83A5AF0[] = { overworld_frame(gUnknown_839A988, 2, 1, 0), overworld_frame(gUnknown_839A988, 2, 1, 1), overworld_frame(gUnknown_839A988, 2, 1, 2), }; const union AnimCmd gUnknown_83A5B08[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5B18[] = { gUnknown_83A5B08, }; const struct SpriteTemplate gUnknown_83A5B1C = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x8, .anims = gUnknown_83A5B18, .images = gUnknown_83A5AF0, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateSandPileFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5B34[] = { overworld_frame(gUnknown_839AD88, 2, 2, 0), overworld_frame(gUnknown_839AD88, 2, 2, 1), overworld_frame(gUnknown_839AD88, 2, 2, 2), overworld_frame(gUnknown_839AD88, 2, 2, 3), }; const union AnimCmd gUnknown_83A5B54[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_JUMP(0), }; const union AnimCmd *const gUnknown_83A5B70[] = { gUnknown_83A5B54, }; const struct SpriteTemplate gUnknown_83A5B74 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5B70, .images = gUnknown_83A5B34, .affineAnims = gDummySpriteAffineAnimTable, .callback = WaitFieldEffectSpriteAnim, }; const union AffineAnimCmd gUnknown_83A5B8C[] = { AFFINEANIMCMD_FRAME(-256, 256, 128, 0), AFFINEANIMCMD_FRAME(1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_FRAME(-1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_FRAME(-1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_FRAME(1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_JUMP(1), }; const union AffineAnimCmd gUnknown_83A5BDC[] = { AFFINEANIMCMD_FRAME(256, 256, 128, 0), AFFINEANIMCMD_FRAME(-1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_FRAME(1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_FRAME(1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_FRAME(-1, 0, 0, 4), AFFINEANIMCMD_FRAME(0, 0, 0, 8), AFFINEANIMCMD_JUMP(1), }; const union AffineAnimCmd *const gUnknown_83A5C2C[] = { gUnknown_83A5B8C, gUnknown_83A5BDC, }; const struct SpriteTemplate gUnknown_83A5C34 = { .tileTag = 0x0, .paletteTag = SPRITE_INVALID_TAG, .oam = &gDummyOamData, .anims = gDummySpriteAnimTable, .images = NULL, .affineAnims = gUnknown_83A5C2C, .callback = SpriteCallbackDummy, }; const struct SpriteFrameImage gUnknown_83A5C4C[] = { overworld_frame(gUnknown_839B008, 2, 4, 0), overworld_frame(gUnknown_839B008, 2, 4, 1), overworld_frame(gUnknown_839B008, 2, 4, 2), overworld_frame(gUnknown_839B008, 2, 4, 3), overworld_frame(gUnknown_839B008, 2, 4, 4), overworld_frame(gUnknown_839B008, 2, 4, 5), overworld_frame(gUnknown_839B008, 2, 4, 6), }; const union AnimCmd gUnknown_83A5C84[] = { ANIMCMD_FRAME(0, 16), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5C8C[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_FRAME(4, 4), ANIMCMD_FRAME(5, 4), ANIMCMD_FRAME(6, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5CAC[] = { gUnknown_83A5C84, gUnknown_83A5C8C, }; const struct SpriteTemplate gUnknown_83A5CB4 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_16x32, .anims = gUnknown_83A5CAC, .images = gUnknown_83A5C4C, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateDisguiseFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5CCC[] = { overworld_frame(gUnknown_839B708, 2, 4, 0), overworld_frame(gUnknown_839B708, 2, 4, 1), overworld_frame(gUnknown_839B708, 2, 4, 2), overworld_frame(gUnknown_839B708, 2, 4, 3), overworld_frame(gUnknown_839B708, 2, 4, 4), overworld_frame(gUnknown_839B708, 2, 4, 5), overworld_frame(gUnknown_839B708, 2, 4, 6), }; const union AnimCmd gUnknown_83A5D04[] = { ANIMCMD_FRAME(0, 16), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5D0C[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(3, 4), ANIMCMD_FRAME(4, 4), ANIMCMD_FRAME(5, 4), ANIMCMD_FRAME(6, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5D2C[] = { gUnknown_83A5D04, gUnknown_83A5D0C, }; const struct SpriteTemplate gUnknown_83A5D34 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_16x32, .anims = gUnknown_83A5D2C, .images = gUnknown_83A5CCC, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateDisguiseFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5D4C[] = { overworld_frame(gUnknown_839BE08, 2, 4, 0), overworld_frame(gUnknown_839BE08, 2, 4, 1), overworld_frame(gUnknown_839BE08, 2, 4, 2), overworld_frame(gUnknown_839BE08, 2, 4, 3), overworld_frame(gUnknown_839BE08, 2, 4, 4), overworld_frame(gUnknown_839BE08, 2, 4, 5), overworld_frame(gUnknown_839BE08, 2, 4, 6), }; const struct SpriteTemplate gUnknown_83A5D84 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_16x32, .anims = gUnknown_83A5CAC, .images = gUnknown_83A5D4C, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateDisguiseFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5D9C[] = { overworld_frame(gUnknown_839D3C8, 8, 8, 0), overworld_frame(gUnknown_839D3C8, 8, 8, 1), overworld_frame(gUnknown_839D3C8, 8, 8, 2), overworld_frame(gUnknown_839D3C8, 8, 8, 3), overworld_frame(gUnknown_839D3C8, 8, 8, 4), }; const union AnimCmd gUnknown_83A5DC4[] = { ANIMCMD_FRAME(0, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5DCC[] = { ANIMCMD_FRAME(1, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5DD4[] = { ANIMCMD_FRAME(2, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5DDC[] = { ANIMCMD_FRAME(3, 1), ANIMCMD_END, }; const union AnimCmd gUnknown_83A5DE4[] = { ANIMCMD_FRAME(4, 1), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5DEC[] = { gUnknown_83A5DC4, gUnknown_83A5DCC, gUnknown_83A5DD4, gUnknown_83A5DDC, gUnknown_83A5DE4, }; const struct SpriteTemplate gUnknown_83A5E00 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = SPRITE_INVALID_TAG, .oam = &gObjectEventBaseOam_64x64, .anims = gUnknown_83A5DEC, .images = gUnknown_83A5D9C, .affineAnims = gDummySpriteAffineAnimTable, .callback = SpriteCallbackDummy, }; const struct SpriteFrameImage gUnknown_83A5E18[] = { overworld_frame(gUnknown_839A288, 2, 2, 0), overworld_frame(gUnknown_839A288, 2, 2, 1), }; const union AnimCmd gUnknown_83A5E28[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5E34[] = { gUnknown_83A5E28, }; const struct SpriteTemplate gUnknown_83A5E38 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5E34, .images = gUnknown_83A5E18, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateShortGrassFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5E50[] = { overworld_frame(gUnknown_839C508, 2, 2, 0), }; const union AnimCmd gUnknown_83A5E58[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5E60[] = { gUnknown_83A5E58, }; const struct SpriteTemplate gUnknown_83A5E64 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1005, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5E60, .images = gUnknown_83A5E50, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateHotSpringsWaterFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5E7C[] = { overworld_frame(gUnknown_839C5A8, 2, 2, 0), overworld_frame(gUnknown_839C5A8, 2, 2, 1), overworld_frame(gUnknown_839C5A8, 2, 2, 2), overworld_frame(gUnknown_839C5A8, 2, 2, 3), overworld_frame(gUnknown_839C5A8, 2, 2, 4), }; const union AnimCmd gUnknown_83A5EA4[] = { ANIMCMD_FRAME(0, 6), ANIMCMD_FRAME(1, 6), ANIMCMD_FRAME(2, 6), ANIMCMD_FRAME(3, 6), ANIMCMD_FRAME(4, 6), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5EBC[] = { gUnknown_83A5EA4, }; const struct SpriteTemplate gUnknown_83A5EC0 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x100D, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5EBC, .images = gUnknown_83A5E7C, .affineAnims = gDummySpriteAffineAnimTable, .callback = SpriteCB_PopOutOfAsh, }; const struct SpritePalette gUnknown_83A5ED8 = { .data = gUnknown_839C588, .tag = 0x100D }; const struct SpriteFrameImage gUnknown_83A5EE0[] = { overworld_frame(gUnknown_839C828, 2, 2, 0), overworld_frame(gUnknown_839C828, 2, 2, 1), overworld_frame(gUnknown_839C828, 2, 2, 2), overworld_frame(gUnknown_839C828, 2, 2, 3), overworld_frame(gUnknown_839C828, 2, 2, 4), }; const union AnimCmd gUnknown_83A5F08[] = { ANIMCMD_FRAME(0, 6), ANIMCMD_FRAME(1, 6), ANIMCMD_FRAME(2, 6), ANIMCMD_FRAME(3, 6), ANIMCMD_FRAME(4, 6), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5F20[] = { gUnknown_83A5F08, }; const struct SpriteTemplate gUnknown_83A5F24 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x100D, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5F20, .images = gUnknown_83A5EE0, .affineAnims = gDummySpriteAffineAnimTable, .callback = SpriteCB_LavaridgeGymWarp, }; const struct SpriteFrameImage gUnknown_83A5F3C[] = { overworld_frame(gUnknown_839CAA8, 2, 4, 0), overworld_frame(gUnknown_839CAA8, 2, 4, 1), overworld_frame(gUnknown_839CAA8, 2, 4, 2), overworld_frame(gUnknown_839CAA8, 2, 4, 3), overworld_frame(gUnknown_839CAA8, 2, 4, 4), overworld_frame(gUnknown_839CAA8, 2, 4, 5), overworld_frame(gUnknown_839CAA8, 2, 4, 6), overworld_frame(gUnknown_839CAA8, 2, 4, 7), }; const union AnimCmd gUnknown_83A5F7C[] = { ANIMCMD_FRAME(0, 4), ANIMCMD_FRAME(1, 4), ANIMCMD_FRAME(2, 4), ANIMCMD_FRAME(3, 6), ANIMCMD_FRAME(4, 6), ANIMCMD_FRAME(5, 4), ANIMCMD_FRAME(6, 4), ANIMCMD_FRAME(7, 4), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5FA0[] = { gUnknown_83A5F7C, }; const struct SpriteTemplate gUnknown_83A5FA4 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x1004, .oam = &gObjectEventBaseOam_16x32, .anims = gUnknown_83A5FA0, .images = gUnknown_83A5F3C, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateBubblesFieldEffect, }; const struct SpriteFrameImage gUnknown_83A5FBC[] = { overworld_frame(gUnknown_839D2A8, 2, 2, 0), overworld_frame(gUnknown_839D2A8, 2, 2, 1), }; const union AnimCmd gUnknown_83A5FCC[] = { ANIMCMD_FRAME(0, 3), ANIMCMD_FRAME(1, 5), ANIMCMD_FRAME(0, 5), ANIMCMD_END, }; const union AnimCmd *const gUnknown_83A5FDC[] = { gUnknown_83A5FCC, }; const struct SpriteTemplate gUnknown_83A5FE0 = { .tileTag = SPRITE_INVALID_TAG, .paletteTag = 0x100F, .oam = &gObjectEventBaseOam_16x16, .anims = gUnknown_83A5FDC, .images = gUnknown_83A5FBC, .affineAnims = gDummySpriteAffineAnimTable, .callback = UpdateSparkleFieldEffect, }; const struct SpritePalette gUnknown_83A5FF8 = { .data = gUnknown_839D3A8, .tag = 0x100F };
2024-03-01T01:26:36.242652
https://example.com/article/7445
Saturday, June 30, 2012 Nicotine no-no There are two kinds of people in the world: those who think that smoking is a pitifully stupid, self-destructive thing to do; and those who totally agree and will nevertheless calmly disembowel you if you try to take away their cigarettes .An article by Rory Sutherland, doing the rounds on Facebook, makes the point that people who smoke are always the most interesting. He names Einstein, Bertrand Russell, Bach, Beethoven and Milton as proof that lighting up contributes to creativity. Having a smoke, he says, provides a period of detached, abstract thought; the occasional silence in a companionable smoke keeps conversational banality at bay; and frankly, it helps you work. (All of this gave me such a warm and fuzzy feeling that I was downright indignant to realise that Sutherland is merely an ex-smoker hawking the virtues of e-cigarettes.) In any case, I disagree. His thesis might be true of people who smoke mind-altering substances—that committed charasi Lord Shiva being a case in point—but in any case I’m not one of those people, seeing as how the first time I tried a mind-altering substance, I rushed out of the room into a snowstorm, yelling, ‘It’s so hot I’m going to die’, and then fainted clean away; and the second time I stared at a treetop for four hours, and don’t recall anyone congratulating me on my brilliant conversation. But we’re talking about people who smoke tobacco, which is vertiginously lower down on the smart scale. I smoke tobacco. (In politically correct language, I “use tobacco”, which is the technical term for “am a disgusting, helpless junkie”.) I can tell you that there is absolutely nothing interesting about tobacco except for its power to make you want more tobacco. Not having it makes you irritable. Having it makes your breath smell like a week-old corpse in a sewer. It’s expensive, time-consuming, and anti-social, and it makes your fingernails turn yellow. And that’s just the healthy part. All smokers graciously concede that it’s just really gross. I find smoking much more useful as a tool for procrastination and breaking ice with a stranger—Sutherland gestures towards the enthusiastic compassion that smokers display for each others’ addiction—than for kick-starting any creative juices. But smoking is not just good for instant lovefests between social lepers. There is also the nuanced splendour of the many kinds of smokes you can have. Besides the post-prandial smoke, which works best after strong flavours like onion and pickle, there is the solitary reflective smoke, which burns down to your fingertips before you realise you’re still holding it. There’s the rainy smoke, the glowing tip of which warms you up on an inclement evening. There’s the heartbroken smoke, trailing melancholy plumes as you wipe your eyes with helpless, inarticulate gestures; the angry smoke, which makes snappy sound as you suck the living marrow out of whatever got you mad. There’s the transit smoke, which shortens the layover between flights and trains; and the five-minutes-of-dead-time smoke as you wait for the cashier to fix the card machine, or the appointment to show up, or the cinema hall to open its doors. There’s the fitness smoke that immediately follows a bout of good immortality-boosting exercise. (This one might be my favourite.) And then there’s the post-coital smoke, in which nicotine bonds with endorphins to make you laugh about the fact that the bed is on fire. In other words, smoking is like a musical instrument through which to express the whole gamut of human emotion. Of course you shouldn’t smoke—it’s the leading cause of preventable death in the world. But then again, the leading cause of death is life. I’m going to go think about that over the contemplative, remorseful smoke.
2024-06-25T01:26:36.242652
https://example.com/article/5089
In the United States Court of Federal Claims OFFICE OF SPECIAL MASTERS No. 14-693V Filed: September 23, 2015 * * * * * * * * * * * * * UNPUBLISHED REBECCA RUSSELL, * * Special Master Gowen Petitioner, * * Joint Stipulation on Damages; v. * Influenza (“Flu”) Vaccine; * Transverse Myelitis SECRETARY OF HEALTH * AND HUMAN SERVICES, * * Respondent. * * * * * * * * * * * * * * Anne C. Toale, Maglio, Christopher, and Toale, Sarasota, FL, for petitioner. Althea W. Davis, United States Department of Justice, Washington, DC, for respondent. DECISION ON JOINT STIPULATION1 On August 1, 2014, Rebecca Russell (“petitioner”) filed a petition pursuant to the National Vaccine Injury Compensation Program. 2 42 U.S.C. §§ 300aa-1 to -34 (2006). Petitioner alleged that, as a result of receiving an influenza (“flu”) vaccination on September 28, 2012, she developed transverse myelitis. Petition at ¶ 1, 5, 9. Further, petitioner alleged that she experienced residual effects of her injury for more than six months. Id. at ¶ 10. On September 22, 2015, the parties filed a stipulation in which they state that a decision should be entered awarding compensation. Respondent denies that the influenza vaccine caused petitioner’s 1 Because this decision contains a reasoned explanation for the undersigned’s action in this case, the undersigned intends to post this ruling on the website of the United States Court of Federal Claims, in accordance with the E-Government Act of 2002, Pub. L. No. 107-347, § 205, 116 Stat. 2899, 2913 (codified as amended at 44 U.S.C. § 3501 note (2006)). As provided by Vaccine Rule 18(b), each party has 14 days within which to request redaction “of any information furnished by that party: (1) that is a trade secret or commercial or financial in substance and is privileged or confidential; or (2) that includes medical files or similar files, the disclosure of which would constitute a clearly unwarranted invasion of privacy.” Vaccine Rule 18(b). 2 The National Vaccine Injury Compensation Program is set forth in Part 2 of the National Childhood Vaccine Injury Act of 1986, Pub. L. No. 99-660, 100 Stat. 3755, codified as amended, 42 U.S.C. §§ 300aa-1 to -34 (2006) (Vaccine Act or the Act). All citations in this decision to individual sections of the Vaccine Act are to 42 U.S.C.A. § 300aa. transverse myelitis, or any other injury or disability. Stipulation ¶ 6. Nevertheless, the parties agree to the joint stipulation, attached hereto as Appendix A. The undersigned finds the stipulation reasonable and adopts it as the decision of the Court in awarding damages, on the terms set forth therein. The parties stipulate that petitioner shall receive the following compensation: A lump sum of $85,000.00 in the form of a check payable to petitioner, Rebecca Russell. This amount represents compensation for all damages that would be available under 42 U.S.C. § 300aa-15(a). Id. ¶ 8. The undersigned approves the requested amounts for petitioner’s compensation. Accordingly, the clerk of the court SHALL ENTER JUDGMENT in accordance with the terms of the parties’ stipulation.3 IT IS SO ORDERED. s/Thomas L. Gowen Thomas L. Gowen Special Master 3 Pursuant to Vaccine Rule 11(a), entry of judgment is expedited by the parties’ joint filing of notice renouncing the right to seek review.
2024-01-28T01:26:36.242652
https://example.com/article/6306
// Copyright (c) Microsoft. All rights reserved. // Licensed under the MIT license. See License.txt in the repository root. package com.microsoft.tfs.core.clients.workitem.internal.fields; import java.text.MessageFormat; import java.util.ArrayList; import java.util.Iterator; import java.util.List; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import com.microsoft.tfs.core.clients.workitem.CoreFieldReferenceNames; import com.microsoft.tfs.core.clients.workitem.fields.Field; import com.microsoft.tfs.core.clients.workitem.fields.FieldCollection; import com.microsoft.tfs.core.clients.workitem.fields.FieldDefinition; import com.microsoft.tfs.core.clients.workitem.fields.FieldStatus; import com.microsoft.tfs.core.clients.workitem.internal.WITContext; import com.microsoft.tfs.core.clients.workitem.internal.WorkItemFieldIDs; import com.microsoft.tfs.core.clients.workitem.internal.WorkItemImpl; /** * Holds the field value state for a WorkItem instance. * * Threadsafe: No MS-Equivalents: * Microsoft.TeamFoundation.WorkItemTracking.Client.FieldCollection */ public class FieldCollectionImpl implements FieldCollection { private static final Log log = LogFactory.getLog(FieldCollectionImpl.class); /* * The work item this field collection belongs to */ private final WorkItemImpl workItem; /* * The WITContext to use */ private final WITContext context; /* * The cache of Field instances */ private final FieldReferenceBasedCache<Field> cache = new FieldReferenceBasedCache<Field>(); public FieldCollectionImpl(final WorkItemImpl workItem, final WITContext context) { this.workItem = workItem; this.context = context; } /*************************************************************************** * START of implementation of FieldCollection interface **************************************************************************/ @Override public Field getField(final String name) { return getFieldInternal(name); } @Override public boolean contains(final String name) { return cache.get(name) != null; } @Override public Iterator<Field> iterator() { return cache.values().iterator(); } @Override public int size() { return cache.values().size(); } @Override public int getAreaID() { return ((Integer) getField(CoreFieldReferenceNames.AREA_ID).getValue()).intValue(); } @Override public int getID() { return ((Integer) getField(CoreFieldReferenceNames.ID).getValue()).intValue(); } @Override public int getRevision() { return ((Integer) getField(CoreFieldReferenceNames.REVISION).getValue()).intValue(); } @Override public String getWorkItemType() { return (String) getField(CoreFieldReferenceNames.WORK_ITEM_TYPE).getValue(); } /*************************************************************************** * END of implementation of FieldCollection interface **************************************************************************/ /*************************************************************************** * START of internal-only FieldCollectionImpl methods **************************************************************************/ private IllegalArgumentException newIllegalFieldNameException(final String illegalFieldName) { throw new IllegalArgumentException( MessageFormat.format( "field [{0}] does not exist in this collection (wi={1},size={2})", //$NON-NLS-1$ illegalFieldName, Integer.toString(getID()), cache.size())); } private IllegalArgumentException newIllegalFieldIDException(final int illegalFieldId) { throw new IllegalArgumentException( MessageFormat.format( "field id [{0}] does not exist in this collection (wi={1},size={2})", //$NON-NLS-1$ Integer.toString(illegalFieldId), Integer.toString(getID()), cache.size())); } public void resetAfterUpdate() { for (final Field field : cache.values()) { final FieldImpl fieldImpl = (FieldImpl) field; fieldImpl.resetAfterUpdate(); } } /** * Resets this FieldCollection by calling reset() on every contained Field. */ public void reset() { for (final Field field : cache.values()) { final FieldImpl fieldImpl = (FieldImpl) field; fieldImpl.reset(); } } public void fireFieldChangeListeners() { for (final Field field : cache.values()) { final FieldImpl fieldImpl = (FieldImpl) field; fieldImpl.fireFieldChangeListeners(); } } public void copy(final FieldCollectionImpl targetCollection) { final int targetProjectId = targetCollection.getWorkItemInternal().getType().getProject().getID(); final int projectId = getWorkItemInternal().getType().getProject().getID(); final boolean newProject = (projectId != targetProjectId); if (log.isDebugEnabled()) { log.debug(MessageFormat.format( "copying fields from {0} (project {1}) to {2} (project {3})", //$NON-NLS-1$ Integer.toString(workItem.getID()), Integer.toString(projectId), Integer.toString(targetCollection.getWorkItemInternal().getID()), Integer.toString(targetProjectId))); } for (final Field field : cache.values()) { final FieldImpl fieldImpl = (FieldImpl) field; if (fieldImpl.getFieldDefinitionInternal().canCopy()) { if ((field.getID() == WorkItemFieldIDs.AREA_ID || field.getID() == WorkItemFieldIDs.ITERATION_ID) && newProject) { if (log.isTraceEnabled()) { log.trace(MessageFormat.format("skipping copy of field {0}", Integer.toString(field.getID()))); //$NON-NLS-1$ } continue; } final Object value = field.getValue(); targetCollection.getFieldInternal(field.getID()).setValue(value, FieldModificationType.NEW); if (log.isDebugEnabled()) { log.debug(MessageFormat.format( "copied field {0}, value = [{1}]", //$NON-NLS-1$ Integer.toString(field.getID()), value)); } } else { if (log.isTraceEnabled()) { log.trace(MessageFormat.format("skipping copy of field {0}", Integer.toString(field.getID()))); //$NON-NLS-1$ } } } } /** * Ensures that all field definitions in the work item physical type have * corresponding Fields in this FieldCollection. If neccessary new Fields * are created and added to this FieldCollection, but any existing Fields * that are part of the work item physical type will not be affected. */ public void ensureAllFieldsInWIPhysicalType() { final FieldDefinitionImpl[] fieldDefinitions = context.getWorkItemFieldUsages().getFieldDefinitions(); final List<FieldDefinition> fieldDefsToEnsure = new ArrayList<FieldDefinition>(); for (int i = 0; i < fieldDefinitions.length; i++) { if (fieldDefinitions[i].isUsedInPhysicalType()) { fieldDefsToEnsure.add(fieldDefinitions[i]); } } ensureFieldsExist(fieldDefsToEnsure.toArray(new FieldDefinitionImpl[fieldDefsToEnsure.size()])); } private FieldImpl addField(final FieldDefinitionImpl fieldDefinition) { /* * sanity check to catch programming bugs - once a Field has been added * to a FieldCollection, it should never be removed */ if (cache.get(fieldDefinition.getID()) != null) { throw new IllegalStateException(MessageFormat.format( "attempting to add field [{0}] but it already exists", //$NON-NLS-1$ Integer.toString(fieldDefinition.getID()))); } final FieldImpl field = new FieldImpl(fieldDefinition, this, workItem, context); cache.put(field, fieldDefinition.getName(), fieldDefinition.getReferenceName(), fieldDefinition.getID()); return field; } /** * Ensures that all of the given field definitions have corresponding Fields * in this FieldCollection. Fields are created and added to this * FieldCollection if neccessary to ensure this. * * @param fieldDefinitions * FieldDefinitions to ensure */ public void ensureFieldsExist(final FieldDefinitionImpl[] fieldDefinitions) { for (int i = 0; i < fieldDefinitions.length; i++) { if (cache.get(fieldDefinitions[i].getID()) == null) { addField(fieldDefinitions[i]); } } } /** * Used to set the original value of a Field in this FieldCollection, * possibly creating the Field if it does not already exist. This method * should only be called with character data obtained from the TFS server. * * @param name * the field name * @param data * the data from the Server * @param create * true to create the Field if it doesn't exist in this * FieldCollection * @throws IllegalArgumentException * if the Field doesn't exist in this FieldCollection and create is * false or the name is invalid */ public void addOriginalFieldValueFromServer(final String name, final String data, final boolean create) { findFieldInternal(name, create).setOriginalValue(data); } /** * Used to set the original value of a Field in this FieldCollection, * possibly creating the Field if it does not already exist. This method * should only be called with character data obtained from the TFS server. * * @param fieldId * id of the field * @param data * the data from the Server * @param create * true to create the Field if it doesn't exist in this * FieldCollection * @throws IllegalArgumentException * if the Field doesn't exist in this FieldCollection and create is * false or the fieldId is invalid */ public void addOriginalFieldValueFromServer(final int fieldId, final String data, final boolean create) { findFieldInternal(fieldId, create).setOriginalValue(data); } /** * Used to set the original value of a Field in this FieldCollection, * possibly creating the Field if it does not already exist. This method * should only be used with data generated locally (in internal WIT code). * If the field data comes from the server then addFieldValueFromServer() * should be used instead. The data must be of the correct type. * * @param fieldId * id of the field * @param data * the original value for the Field * @param create * true to create the Field if it doesn't exist in this * FieldCollection * @throws IllegalArgumentException * if the Field doesn't exist in this FieldCollection and create is * false or the fieldId is invalid */ public void addOriginalFieldValueLocal(final int fieldId, final Object data, final boolean create) { findFieldInternal(fieldId, create).setOriginalValueLocal(data); } /** * Used to find a Field in this FieldCollection for the purposes of setting * an original value on that Field. Because of this, calculated fields that * are not already in this FieldCollection will not be implicitly added by * this method, since calculated Fields should never have original values * set on them. * * @param name * the name of a Field to find * @param create * true to create the Field if it does not exist in this * FieldCollection * @return the specified Field */ private FieldImpl findFieldInternal(final String name, final boolean create) { FieldImpl field = (FieldImpl) cache.get(name); if (field == null) { if (!create) { throw newIllegalFieldNameException(name); } final FieldDefinitionImpl fieldDefinition = context.getWorkItemFieldUsages().getFieldDefinitionByName(name); if (fieldDefinition == null || !fieldDefinition.isUsedInPhysicalType()) { throw newIllegalFieldNameException(name); } field = addField(fieldDefinition); } return field; } /** * Used to find a Field in this FieldCollection for the purposes of setting * an original value on that Field. Because of this, calculated fields that * are not already in this FieldCollection will not be implicitly added by * this method, since calculated Fields should never have original values * set on them. * * @param fieldId * the ID of a Field to find * @param create * true to create the Field if it does not exist in this * FieldCollection * @return the specified Field */ private FieldImpl findFieldInternal(final int fieldId, final boolean create) { FieldImpl field = (FieldImpl) cache.get(fieldId); if (field == null) { if (!create) { throw newIllegalFieldIDException(fieldId); } final FieldDefinitionImpl fieldDefinition = context.getWorkItemFieldUsages().getFieldDefinitionByID(fieldId); if (fieldDefinition == null || !fieldDefinition.isUsedInPhysicalType()) { throw newIllegalFieldIDException(fieldId); } field = addField(fieldDefinition); } return field; } public boolean isDirty() { /* * a field collection is dirty if it has at least one field modification * that has been made by the user */ for (final Field field : cache.values()) { final FieldImpl fieldImpl = (FieldImpl) field; if (field.isDirty() && fieldImpl.getModificationType() == FieldModificationType.USER) { return true; } } return false; } public boolean isValid() { for (final Field field : cache.values()) { if (field.getStatus() != FieldStatus.VALID) { return false; } } return true; } public FieldImpl getFieldInternal(final String name) { FieldImpl field = (FieldImpl) cache.get(name); if (field == null) { field = addCalculatedFieldIfPossible(name); if (field == null) { throw newIllegalFieldNameException(name); } } return field; } public FieldImpl getFieldInternal(final int fieldId) { FieldImpl field = (FieldImpl) cache.get(fieldId); if (field == null) { field = addCalculatedFieldIfPossible(fieldId); if (field == null) { throw newIllegalFieldIDException(fieldId); } } return field; } public boolean hasField(final int fieldId) { return cache.get(fieldId) != null; } public WorkItemImpl getWorkItemInternal() { return workItem; } private FieldImpl addCalculatedFieldIfPossible(final int fieldId) { return addCalculatedFieldIfPossible(context.getWorkItemFieldUsages().getFieldDefinitionByID(fieldId)); } private FieldImpl addCalculatedFieldIfPossible(final String fieldName) { return addCalculatedFieldIfPossible(context.getWorkItemFieldUsages().getFieldDefinitionByName(fieldName)); } private FieldImpl addCalculatedFieldIfPossible(final FieldDefinitionImpl fieldDefinition) { /* * The rationale here is that when a client of this class asks for a * field that doesn't exist in the collection, we can occasionally do * better than just throwing an exception. * * If the requested field is known to be a calculated field AND this * collection already contains the corresponding non-calculated field, * this method will then add the requested field to this collection and * return it. * * This behavior is especially useful for query results. Queries that * are specified to select expensive calculated fields instead * transparently select their inexpensive non-calculated counterparts. * When the user of the OM then attempts to access the calcualted field * value from the query results, this code path is reached and we create * the calculated field on-the-fly. */ if (fieldDefinition == null || !fieldDefinition.isUsedInPhysicalType()) { return null; } switch (fieldDefinition.getID()) { case WorkItemFieldIDs.AUTHORIZED_AS: if (hasField(WorkItemFieldIDs.PERSON_ID)) { return addField(fieldDefinition); } break; case WorkItemFieldIDs.ITERATION_PATH: if (hasField(WorkItemFieldIDs.ITERATION_ID)) { return addField(fieldDefinition); } break; case WorkItemFieldIDs.TEAM_PROJECT: case WorkItemFieldIDs.NODE_NAME: case WorkItemFieldIDs.AREA_PATH: if (hasField(WorkItemFieldIDs.AREA_ID)) { return addField(fieldDefinition); } break; } return null; } }
2023-09-01T01:26:36.242652
https://example.com/article/1978
Florida Highway Patrol: Man pulled a gun during I-10 road rage encounter A Texas man has been arrested for allegedly pulling a gun in an Escambia County road rage incident. Edward Robert Shinn, 62, of Cypress, Texas, was tailgating the victim while traveling westbound on Interstate 10 at 5:45 p.m. Wednesday, according to the Florida Highway Patrol. The victim said he applied his brakes rapidly because Shinn was driving so closely behind, and Shinn pulled out a gun and aggressively pointed it at the victim. Shinn was arrested and charged with aggravated assault with a deadly weapon, the FHP release states. More: Woman faces animal cruelty charge for allegedly 'viciously beating' 5-pound dog
2023-11-02T01:26:36.242652
https://example.com/article/4438
ABOARD A JOINT STARS SURVEILLANCE PLANE, Over Northern Iraq — Flying at 30,000 feet, the powerful radar aboard this Air Force jet peered deep into Syrian territory, hunting for targets on the ground to strike in the looming offensive to seize Raqqa, the Islamic State’s capital. It was on a mission like this several weeks ago that analysts discovered a hiding place in the central Syrian desert where the Islamic State was stashing scores of oil tanker trucks that provide the terrorist group with a crucial financial lifeline. Acting on that tip and other intelligence, two dozen American warplanes destroyed 188 of the trucks in the biggest airstrike of the year, eliminating an estimated $2 million in oil revenue for the Islamic State, also known as ISIS or ISIL. Even as the American-led air campaign conducts bombing missions to support Iraqi troops fighting the Islamic State in Mosul, American commanders said the air war would probably play an even greater role in Syria over the coming weeks in the battle to retake Raqqa. Newly recruited Syrian Arab militia fighters, allied with experienced Kurdish fighters, are encircling Raqqa. But they need allied bombing to weaken and dislodge enemy forces dug in there, and to cut off the ability for the Islamic State to rearm, refuel and reinforce its fighters.
2024-01-02T01:26:36.242652
https://example.com/article/4551