text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
1. Field of the Invention The present invention relates to a diaphragm type load detection sensor, a load detection unit, and an electronic scale using the same. 2. Prior Art At first, a diaphragm type load detection sensor in the prior art is briefly described with reference to FIG. 21. In particular, FIG. 21A is a plan view of the diaphragm type load detection sensor in the prior art; FIG. 21B is a cross section view of the sensor, taken along a line D—D in FIG. 21A; and FIG. 21C is a cross section view of the sensor, taken along a line E—E in FIG. 21A. The diaphragm type load detention sensor in the prior art comprises a mounting portion 1, a strain generation portion 2, and a load applied portion 3 having a projection formed thereon, wherein a strain gauge 4 including a plurality of sensing elements is affixed to the strain generation portion 2. The strain gauge 4 has a lead wire 4A connected thereto. In this example, the strain gauge 4 is affixed in a line such that the sensing elements are positioned in bilateral symmetry about the center of the projection of the load applied portion 3. In another example, the strain gauge is affixed to the strain generation portion in such manner that the sensing elements are positioned in bilateral and vertical symmetry about the center of the projection of the load applied portion (refer to Patent Laid-Open No. 2000-346723, FIG. 1). Referring to FIG. 22 which is a cross section view of another diaphragm type load detection sensor in the prior art, it comprises a mounting portion 1, a strain generation portion 2, and a load applied portion 3, wherein a strain gauge 4 including a plurality of sensing elements is affixed to the strain generation portion 2. The strain gauge 4 has a lead wire 4A connected thereto. The diaphragm type load detection sensor is configured in such manner that when a load is applied to the load applied portion 3 the strain generation portion 2 is deformed, and consequently, the plurality of sensing elements of the strain gauge 4 are deformed. Then, the deformation of the sensing elements (or resistance change) is electrically detected via the lead wire 4A to detect the load applied to the load applied portion. In this example, the strain gauge 4 is affixed in a line such that the sensing elements are positioned in bilateral symmetry about the center of the projection of the load applied portion 3. As shown in FIG. 22, for example, the diaphragm type load detention sensor in the prior art is secured to an installation plate 5 such as a base of a scale using a screw 6 (refer to Patent Laid-Open No. 2000-346723). Alternatively, as shown in FIG. 23, it is secured to the installation plate 5 by welding the mounting portion 1 thereto, as indicated by a reference numeral “7”. However, in the diaphragm type load detention sensor in the prior art wherein the strain gauge is affixed in a line such that the sensing elements are positioned in bilateral symmetry about the center of the projection of the load applied portion, as described with reference to FIG. 21, if a load is obliquely applied to the load applied portion 3 (as indicated by an arrow “F”), as shown in FIG. 21C, then any difference in output may be produced due to such obliquely applied load “F”. The reason for which is that the strain gauge (or the sensing element) would receive different contribution depending on whether a horizontal component of the obliquely applied load “F” to the load applied portion (as indicated by an arrow “H”) is exerted in parallel with the gauge line, as shown in FIG. 21B, or in normal to the gauge line, as shown in FIG. 21C. This is also true for the diaphragm type load detention sensor, as disclosed in Patent Laid-Open No. 2000-346723. In particular, any difference in output may be produced depending on whether the load is obliquely applied to the direction of gauge line or the load is obliquely applied to the direction that is angled to the gauge line. Furthermore, in the diaphragm type load detention sensor that is directly coupled to the installation plate 5 with screws, if a load is obliquely applied to the projection of the load applied portion 3 then the boundary between the mounting portion 1 and the installation plate 5 may be slightly shifted to change the restricting condition, thereby promoting occurrence of output difference depending on the direction of the obliquely applied load “F”. In view of the above an object of the present invention is to provide a diaphragm type load detection sensor, a load detection unit and an electronic scale using the same, which can solve the prior art problems, as described above.
2024-02-18T01:26:51.906118
https://example.com/article/2784
To study control of gene expression and growth in normal and malignant cells through studies on cells inhibited by or possessing enzymes induced by steroid hormones. To study steroid effects on human tumor cells.
2024-01-15T01:26:51.906118
https://example.com/article/6370
Tel: 905 836 0071 Blog Unlike other long-term investments, such as a diamond ring, a Persian carpet or original artwork- whose assets are in full view, a sofa’s more meritorious assets are kept hidden from sight, under layers of fabric, stuffing and springs.
2023-09-26T01:26:51.906118
https://example.com/article/2882
Moving into a new era of periodontal genetic studies: relevance of large case-control samples using severe phenotypes for genome-wide association studies. Studies to elucidate the role of genetics as a risk factor for periodontal disease have gone through various phases. In the majority of cases, the initial 'hypothesis-dependent' candidate-gene polymorphism studies did not report valid genetic risk loci. Following a large-scale replication study, these initially positive results are believed to be caused by type 1 errors. However, susceptibility genes, such as CDKN2BAS (Cyclin Dependend KiNase 2B AntiSense RNA; alias ANRIL [ANtisense Rna In the Ink locus]), glycosyltransferase 6 domain containing 1 (GLT6D1) and cyclooxygenase 2 (COX2), have been reported as conclusive risk loci of periodontitis. The search for genetic risk factors accelerated with the advent of 'hypothesis-free' genome-wide association studies (GWAS). However, despite many different GWAS being performed for almost all human diseases, only three GWAS on periodontitis have been published - one reported genome-wide association of GLT6D1 with aggressive periodontitis (a severe phenotype of periodontitis), whereas the remaining two, which were performed on patients with chronic periodontitis, were not able to find significant associations. This review discusses the problems faced and the lessons learned from the search for genetic risk variants of periodontitis. Current and future strategies for identifying genetic variance in periodontitis, and the importance of planning a well-designed genetic study with large and sufficiently powered case-control samples of severe phenotypes, are also discussed.
2024-05-21T01:26:51.906118
https://example.com/article/8199
Andrews Gets New Fire Station Andrews Gets New Fire Station The Permian Basin is expanding seemingly daily, and towns like Andrews have seen rapid growth. ANDREWS -- The Permian Basin is expanding seemingly daily, and towns like Andrews have seen rapid growth. Because of that growth, municipal services must grow and change with the times. Andrews celebrated the opening of a new fire station on Saturday. The total cost of the new building? $2 million. This new fire station will replace the old one. "We kind of ran out of room. We out-grew it. And this one's going to house every piece of equipment in one building. So we can make a run from one instead of having to go to two or three different buildings," Ray Powers said. He's the assistant fire chief. The new fire station will serve all of Andrews County, which is about a 1500 square mile area. Copyright 2013 Nexstar Broadcasting, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
2024-04-10T01:26:51.906118
https://example.com/article/5043
AARP correspondence to lawmakers and regulators Government Watch Archive Legend The following documents related to consumer affairs and the financial security of people 50-plus are presented in reverse chronological order. NOVEMBER L: AARP sent a letter to all Members of the Senate and House reiterating our opposition to adopting a chained consumer price index to calculate the Social Security cost of living adjustment for the purpose of reducing the deficit. (November 8) Senate PDF & House PDF L: AARP sent a letter to Tom Vilsack Secretary of Agriculture for the United States Department of Agriculture thanking the agency for partnering with so many of our volunteers and staff in addressing the immeasurable devastation left by Hurricane Sandy. AARP urged the Department to sustain its current efforts and make available certain administrative exceptions where necessary to ensure that the most vulnerable persons and families can have access to essential nutrition. (November 7) PDF L: On November 08, 2012 AARP sent a letter to members of Congress and the President opposing the deficit proposal that would reduce Social Security benefits by adopting the Chained Consumer Price Index (CCPI). In the letter AARP CEO A. Barry Rand states “Reducing Social Security benefits by moving to a chained consumer price index (CCPI) – estimated to take $112 billion dollars out of the pockets of current and future Social Security beneficiaries in the next 10 years alone – is inappropriate and unwarranted.” Rand also adds that “Social Security is not the cause of our current large budget deficits. In fact, as you know, Social Security is a self-financed, off-budget program and any reduction in Social Security does nothing to address the shortfall in the rest of the federal budget.” (Nov. 8) PDF C: To the CFBP regarding its request for information on “Effective Financial Education”, to help consumers make better-informed financial decisions. (Nov. 1) PDF OCTOBER L: Sign on letter to the Department of Transportation regarding development of several performance measures specified in MAP-21 for roads designated as part of the National Highway System, safety, congestion, and freight. (Oct. 25) PDF C: To the Employee Benefits Security Administration’s request regarding the Department’s attempt to gather information on the interrelationship of self-funded health plans and stop-loss insurance, and the impact of these plan designs on the private health insurance market. (July 2) PDF JUNE C: To the CFPB regarding the impacts of overdraft programs on consumers. (June 29) PDF C: To the Consumer Financial Protection Bureau (CFPB) in response to a request for information regarding scope, methods, and data sources for conducting a study of pre-dispute arbitration agreements. (June 22) PDF L: Letter to Sen. Gillibrand (D-NY) supporting her amendment to maintain and protect funding for the Supplemental Nutrition Assistance Program (SNAP) as the Senate begins floor consideration of the Farm Bill reauthorization. (June 6) PDF MAY L: Sign on letter to the Transportation Conferees calling for the retention of the Senate-passed Cardin-Cochran amendment provision that gives local grants for pedestrian safety and other projects. (May 30) PDF L: To the Senate expressing concerns with the budgets being considered for debate. (May 16) PDF L: To the House expressing concerns with the reconciliation proposal pursuant to the FY 2013. (May 10) PDF L: To transportation conferees about retaining several Senate provisions, including prioritizing the repair of existing roads and bridges, and local control over funds that can be used for pedestrian and bicycle projects (the Cardin-Cochran amendment). (May 14) PDF L: To transportation conferees, the letter calls for conferees to adopt several Senate transit provisions, including restricting the merger of smaller transit programs to only Section 5310 elderly and disabled program and the New Freedom (Section 5317) program, and new eligibility for operating assistance under the new Section 5310 program. (May 10) PDF S: Before the House Financial Services Subcommittee on Insurance, Housing and Community Development to defend the validity of the federally insured Home Equity Conversion Mortgage Program (HECM) that provides funding and insurance for reverse mortgages under specified conditions, and subject to consumer protections including counseling. (May 9) PDF L: To the House and Senate expressing our belief that the Social Security payroll tax holiday should not be extended beyond the current year. (May 7) PDF APRIL S: To the House Ways and Means Committee regarding the hearing on “Impact of Limitations on the Use of Tax-Advantaged Accounts for the Purchase of Over-the-Counter Medication.” (April 25) PDF C: To the Securities and Exchange Commission (SEC) in response to the agency’s study regarding financial literacy among investors. (April 20) PDF L: To Chairman Gallegly (R) and Ranking Member Lofgren (D) of the House Judiciary Committee’s Subcommittee on Immigration Policy and Enforcement in reference to its hearing titled “Document Fraud in Employment Authorization: How an E-Verify Requirement Can Help.” (April 18) PDF L: To Employee Benefits Security Administration (EBSA) Assistant Secretary Phyllis Borzi in support of the Department of Labor’s (DOL) current guidance on electronic disclosure of pension plan documents. The letter is in response to an industry letter urging that plans be permitted to handle all communications in electronic form, without any standards for ensuring participants retain a meaningful opportunity to choose written disclosures. AARP filed comments last summer in response to a request for information from DOL on this issue. This letter follows up on and reinforces that previous correspondence. (April 17) PDF S: To the Senate Banking Committee’s Economic Policy Subcommittee, a statement for the record of its hearing titled, "Retirement (in)Security: Examining the Retirement Saving Deficit." (March 28) PDF L: To all members of the House of Representatives regarding our concerns with the House Concurrent Resolution on the Budget for Fiscal Year (FY) 2013. (March 21) PDF C: To the Department of Labor (DOL) generally in support of requiring most employers of home care and home health aides to be paid minimum wage and overtime for the invaluable work they do to enable older adults to stay in their homes. The letter also identifies key points on which AARP advocates changes to make the regulations more user-friendly and more responsive to the needs of care consumers and their family caregivers. (March 21) PDF L: To all House and Senate Chiefs of Staff, Health Legislative Aides and Social Security Legislative Aides to inform them of the “You’ve Earned a Say” launch on March 19. (March 15) PDF L: To the Senate in opposition to the lack of investor protections in H.R. 3606, the House-passed JOBS bill. We also urge for the support of an amendment offered by Senators Reed (D-RI), Landrieu (D-LA) and Levin (D-MI). (March 15) PDF L: To Senate Leadership that expressed AARP's concern with two bills in a package of proposed legislation that purported to enhance small-business capital formation and hence promote job creation. We express reservations over the lessening of certain consumer protections to achieve this objective. The bills involve precautions in the initial offerings of stock in small companies that do not receive the same oversight as larger offering, an area that has been particularly troubling to seniors in the past. (March 6) PDF FEBRUARY L: To the Chairs and Ranking Members of the full Senate Environment and Public Works Committee and the Transportation and Infrastructure Subcommittee expressing opposition to an amendment to the Senate transportation authorization bill by Sen. Patrick Toomey (R-PA) that would eliminate the national standard for the retro-reflectivity of traffic signs. (Feb. 20) PDF L: To the Rules Committee to make in order four amendments offered by Reps. Bill Pascrell (D-NJ) and Russ Carnahan (D-MO) that include elements of the just-introduced House companion bill (HR 4028) to the Sen. Kohl (D-WI)-sponsored and AARP-endorsed “Senior Transportation and Mobility Improvement Act.” (Feb. 14) PDF L: To all Senators in support of the National Surface Transportation and Freight Policy Act section of the Commerce bill, which contains a complete streets provision. (Feb. 14) PDF L: To Senators Cardin (D-MD) and Cochran (R-MS) in support of an amendment that directs funding to local governments for pedestrian and bicycle complete streets-type projects. (Feb. 13) PDF L: To the Chairs of the Conference Committee urging them to include, in any Conference Committee agreement, legislation to address the impending Medicare physician payment cuts, support a “clean” extension of unemployment insurance benefit, and oppose several elements of the House bill that would disproportionately hurt older workers. (Feb. 13) PDF L: To the House Ways and Means Committee opposing the removal of transit funding from the motor fuels tax in the House Ways and Means Committee transportation finance bill. (Feb. 2) PDF T: To the Senate Banking Committee’s Economic Policy Subcommittee, a statement for the record of its hearing titled, "Retirement (in)Security: Examining the Retirement Saving Deficit." (March 28) PDF L: To Senate Leadership that expressed AARP's concern with two bills in a package of proposed legislation that purported to enhance small-business capital formation and hence promote job creation. We express reservations over the lessening of certain consumer protections to achieve this objective. The bills involve precautions in the initial offerings of stock in small companies that do not receive the same oversight as larger offering, an area that has been particularly troubling to seniors in the past. (March 6) PDF L: To Senators Cardin (D-MD) and Cochran (R-MS) in support of an amendment that directs funding to local governments for pedestrian and bicycle complete streets-type projects. (Feb. 13) PDF L: To the Chairs of the Conference Committee urging them to include, in any Conference Committee agreement, legislation to address the impending Medicare physician payment cuts, support a “clean” extension of unemployment insurance benefit, and oppose several elements of the House bill that would disproportionately hurt older workers. (Feb. 13) PDF L: To the House Ways and Means Committee opposing the removal of transit funding from the motor fuels tax in the House Ways and Means Committee transportation finance bill. (Feb. 2) PDF
2023-11-19T01:26:51.906118
https://example.com/article/9939
Now Playing More 'Trauma Teddies' for Kent Police Kent Police have been given 40 more teddies to be given to children in road traffic accidents They've been given another 40 'trauma teddies' by Build-A-Bear in Maidstone. The cuddly toys are given to youngsters up to the age of about six when they are trapped in a vehicle or involved in a collision either as a passenger or pedestrian. In 2008, more than 2,800 children were killed or seriously injured on the nation’s roads. When the scheme was launched earlier this year - Head of the Roads Policing Unit, Chief Inspector Andrew Reeves, said: ‘Any road traffic collision is a bad thing, but it is particularly distressing to all concerned when children are involved. This initiative allows our officers to provide a small teddy bear to any children involved in such an incident, which can both comfort and calm them, and I am very grateful to PC Chapman and the local company that kindly provided the toys at no cost.’ The initiative was the brainchild of traffic officer Police Constable Darren Chapman. Having attended many distressing collisions he decided to contact a Kent toy manufacturer who willingly donated about 100 teddy bears as well as other cuddly toys. PC Chapman explained: ‘It’s more difficult when young children are involved in a collision because you can’t always explain what is happening to them. Fear and confusion can overwhelm them and sometimes all they need is comfort and reassurance rather than the type of explanation you would give an adult. ‘I am delighted that I have been able to source the toys at no cost to the force, and therefore the public, and am very grateful to the toy company for its empathy and support.’ The initiative also has the support of high profile organisations. Victim Support’s Regional Manager South East, John Hayward Cripps, said: 'Victim Support is delighted that Kent Police is being proactive in helping to meet the needs of young victims of car collisions in what can be very traumatic circumstances. We fully support the scheme.' Kent County Council’s Road Safety Officer for Pedestrians, Darren Cook, said: ‘Being involved in a road collision is a very traumatic experience for anybody, especially children, who are not fully aware of what has happened. More often than not they are required to keep still whilst being rescued, or are trapped by the nature of their injuries or the mechanics of the collision, and this causes them stress. ‘Introducing a simple thing like a toy bear will make a huge difference to the child and will keep them more at ease through the stressful experience. I think it is a great idea and perhaps should be adopted on a wider scale.’
2024-03-25T01:26:51.906118
https://example.com/article/8406
Risk factors associated with the development of retinopathy 10 yr after the diagnosis of juvenile-onset type 1 diabetes in Taiwan: a cohort study from the CGJDES. The aim of this study was to examine risk factors associated with the development of diabetic retinopathy (DR) 10 yr after the diagnosis of juvenile-onset type 1 diabetes in Taiwan. This retrospective cohort study of 153 individuals with type 1 diabetes for >10 yr duration (mean duration: 13.1 yr) included participants in the Chang Gung Juvenile Diabetes Eye Study. Risk factors assessed for association with DR included age, gender, age at onset and duration of diabetes, self-reported smoking, blood pressure, lipid profile, urinalysis, glycated hemoglobin (HbA1c), body mass index, spherical equivalent, and axial length of the eyeball. There were 128 patients without DR and 25 patients with DR. The mean age at onset was 7.0 ± 4.0 yr (mean ± standard deviation). Cox proportional-hazards analysis showed that older-onset age (p = 0.001), higher HbA1c (p = 0.013), and higher triglyceride concentration (p = 0.015) were the strongest correlates of DR after adjustment for diabetes duration. Development of retinopathy 10 yr after diagnosis in people with juvenile-onset type 1 diabetes was associated with older onset age, higher HbA1c, and higher triglyceride concentration.
2024-05-23T01:26:51.906118
https://example.com/article/9989
Signalling mechanisms involved in volume regulation of intestinal epithelial cells. Most mammalian cells have developed compensatory mechanisms to respond to the variable osmotic stress caused by changes in the concentrations of intracellular osmo-active substances (e.g. glucose, amino acids, lactate) or by variations in the osmolarity of the surrounding medium. In response to osmotic cell swelling, the Regulatory Volume Decrease (RVD) is triggered and directs a reduction in the tonicity of the cell by the concerted opening of cation and anion selective ion channels. To date, the K(+) and Cl(-) conductances activated upon hypo-osmotic stimulation have been characterised electrophysiologically in many different cell systems. The molecular identity of the channels however, as well as the mechanism(s) involved in their activation have not yet been fully clarified and may differ between cell types. In this review, we will evaluate the different signalling pathways activated by osmotic cell swelling and discuss their putative role(s) in ion channel regulation, in maintaining cellular volume homeostasis, and in auto- and paracrinic signal transduction, with emphasis on intestinal epithelial cells.
2023-12-24T01:26:51.906118
https://example.com/article/2382
The “independent, nonpartisan agency,” which concluded Thursday that the Trump administration broke the law by withholding congressionally appropriated to military aid to Ukraine, is a member of the “Swamp,” President Donald Trump tweeted on Friday. The U.S. Government Accountability Office (GAO) — or as President Trump referred to it in his tweet, the “GOA” — found that “Faithful execution of the law does not permit the President to substitute his own policy priorities for those that Congress has enacted into law.” The nine-page report from the federal government’s top auditing authority said that withholding congressionally authorized aid was in direct violation of the Impoundment Control Act (ICA) of 1974. That law requires the executive branch to notify Congress if and when already-appropriated funds are being withheld via special and detailed messages and also contains timeline constraints on the various branches and agencies involved—GAO determined neither obligation was met in this instance. The report also accused the president’s subordinates of obstruction of “constitutional significance.” ….for the foreign policies of the President.” @AlanDersh Alan Dershowitz @seanhannity @FoxNews They do what the House asks. The Swamp! — Donald J. Trump (@realDonaldTrump) January 17, 2020 The president responded bright and early, quoting Harvard Law professor emeritus Alan Dershowitz: “The GOA got it exactly backwards. Here’s what they said. The law does not permit the President to substitute his own policy priorities to those Congress has enacted into law. It’s exactly the opposite. The Constitution does not allow Congress to substitute its own priorities for the foreign policies of the President.” @AlanDersh Alan Dershowitz @seanhannity @FoxNews They do what the House asks. The Swamp! The Appropriations Clause of the Constitution does give Congress the “power of the purse,” as the Heritage Foundation helpfully notes: The Appropriations Clause is the cornerstone of Congress’s “power of the purse.” It assigns to Congress the role of final arbiter of the use of public funds. The source of Congress’s power to spend derives from Article I, Section 8, Clause 1. The Appropriations Clause provides Congress with a mechanism to control or to limit spending by the federal government. The Framers chose the particular language of limitation, not authorization, for the first part of the clause and placed it in Section 9 of Article I, along with other restrictions on governmental actions to limit, most notably, executive action. It’s not like the president hasn’t cited Dershowitz’s takes before, but doing so today makes a lot more sense in light of the latest news. Dershowitz will be making a constitutional argument favorable to the president at the impeachment trial. Per a statement, Dershowitz will “present oral arguments at the Senate trial to address the constitutional arguments against impeachment and removal.” In addition, former Whitewater independent counsel Ken Starr and former Whitewater prosecutor Robert Ray are joining Trump’s impeachment defense team. Trump and his allies in the media have quickly moved to suggest the GAO’s findings were motivated by–and tainted by–partisanship. Colin Kalmbacher contributed to this report. [Image via BRENDAN SMIALOWSKI_AFP via Getty Images] Have a tip we should know? [email protected]
2024-02-08T01:26:51.906118
https://example.com/article/3582
Saturday, 16 February 2013 In the US, manufacturing production fell 0.4 percent in January, pushing overall industrial production down by 0.1 percent. However, manufacturing production in November and December were revised higher. And manufacturing may have improved recently. The New York Federal Reserve Bank said its Empire State general business conditions index rose to 10.0 in February from -7.8 in January. Also improving is consumer confidence. The Thomson Reuters/University of Michigan consumer sentiment index rose to 76.3 in February from 73.8 in January. Meanwhile, the UK apparently needs an improvement in consumer confidence. Retail sales there fell 0.6 percent in January. The fall was partly attributed to weather.
2023-08-12T01:26:51.906118
https://example.com/article/2471
Use of ultrasound to early identify, diagnose and localize metastases in melanoma patients. Specialized medical centers perform high-resolution ultrasound of lymph nodes in melanoma patients to detect metastases early. Ultrasound represents a highly effective method for the discrimination of lymph node and soft-tissue metastases from other space-occupying lesions. Frequent follow-up examinations with ultrasound provide early detection of tumor recurrences and seem to lead to a prolonged overall survival. The ultrasound findings are validated by fine-needle aspiration cytology. Depicted and verified metastases should be removed as soon as possible. The authors recommend the performance of ultrasound before every sentinel lymph node dissection to avoid unnecessary operations.
2023-12-05T01:26:51.906118
https://example.com/article/7537
package com.blanke.xsocket.utils; import android.util.Log; public class XSocketLog { public static boolean debug = false; public static final String TAG = "XSocket"; public static void debug(boolean debug1) { debug = debug1; } public static void d(String tag, Object o) { if (debug) { Log.d(TAG, tag + " " + o.toString()); } } public static void e(String tag, Object o) { if (debug) { Log.e(TAG, tag + " " + o.toString()); } } }
2024-04-18T01:26:51.906118
https://example.com/article/8864
776 So.2d 333 (2001) Robert ORTIZ, Petitioner, v. Michael W. MOORE, Secretary, Florida Department of Corrections, Respondent. No. 1D00-1624. District Court of Appeal of Florida, First District. January 17, 2001. *334 Robert Ortiz, pro se, petitioner. Robert A. Butterworth, Attorney General, and Sean F. Callaghan, Assistant Attorney General, Tallahassee, for respondent. PER CURIAM. Robert Ortiz (Ortiz) seeks review by petition for writ of certiorari of an order of the circuit court denying his petition for writ of mandamus. That petition challenged a Department of Corrections ("DOC") disciplinary proceeding in which Ortiz was found guilty of possessing marijuana and was penalized by disciplinary confinement and forfeiture of gain-time. The circuit court denied the petition as untimely. Ortiz sought certiorari review in this court. We reversed and remanded to the circuit court with directions to conduct such further proceedings as were necessary to ascertain the date the grievance order at issue was filed with the clerk and thereby "rendered" for appellate purposes. See Ortiz v. Moore, 741 So.2d 1153 (Fla. 1st DCA 1999). The circuit court determined that the grievance order was rendered on April 11, 1997, and that the petition was filed in circuit court on May 27, 1997, more than 30 days after rendition of the DOC order. The circuit court denied the petition for mandamus relief as time barred. Ortiz again seeks certiorari review in this court. Pursuant to Florida Rule of Appellate Procedure 9.100(c)(4), a petition challenging an order of DOC entered in a prisoner disciplinary proceeding must be filed within 30 days of rendition of that order. Similarly, section 95.11(8), Florida Statutes, requires that a court action challenging a prisoner disciplinary proceeding must be commenced within 30 days after final disposition of the proceeding through the administrative grievance process under chapter 33, Florida Administrative Code. In this case, Ortiz alleges that his petition for writ of mandamus contains a certificate of service showing that he served a copy of the petition on DOC on May 5, 1997. DOC argues that the petition was not served on the clerk of the circuit court until May 20, 1997, and not filed until May 27, 1997, and that neither date is timely to review DOC's April 11, 1997, order. We determine that the petition for writ of mandamus should be deemed to be timely filed in the circuit court. In Haag v. State, 591 So.2d 614 (Fla.1992), the supreme court adopted the "mailbox rule," holding that a petition or notice of appeal filed by a pro se inmate is deemed filed at the moment in time when the inmate loses control over the document by entrusting its further delivery or processing to agents of the state. In Alfonso v. Department of Environmental Regulation, 616 So.2d 44 (Fla.1993), the supreme court stated that an appellate court's jurisdiction is invoked by timely filing of a notice of appeal or petition in either the lower court that issued the order to be reviewed or the appellate court which would have jurisdiction to review the order. Finally, the supreme court has recently held in Thompson v. State, 761 So.2d 324 (Fla.2000), that the court will presume that a legal document submitted by an inmate is timely filed if it contains a certificate of service showing that the pleading was placed in the hands of prison officials for mailing on a timely date. Here, the petition for writ of mandamus contains a timely certificate of service showing service on DOC, the lower tribunal, on May 5, 1997. Thus the petition for writ of mandamus was timely filed to seek review of DOC's April 11, 1997, order. The order on review is hereby quashed and the cause remanded to the circuit court with directions to reconsider the merits of petitioner's substantive claims in light of Osterback v. Singletary, 679 So.2d 43 (Fla. 1st DCA 1996), and other applicable precedents. *335 Writ GRANTED, order QUASHED and REMANDED for further proceedings with instructions. ERVIN, BOOTH and KAHN, JJ., concur.
2023-08-12T01:26:51.906118
https://example.com/article/5650
18 Ill. App.3d 838 (1974) 310 N.E.2d 798 THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v. OTIS HENDRIX (Impleaded), Defendant-Appellant. No. 58151. Illinois Appellate Court — First District (3rd Division). March 21, 1974. James J. Doherty, Public Defender, of Chicago, for appellant. Bernard Carey, State's Attorney, of Chicago, for the People. Judgment affirmed. Mr. JUSTICE McGLOON delivered the opinion of the court: Defendant Otis Hendrix was indicted with Charles Kimbrough for armed robbery. After a bench trial, both Otis Hendrix and Charles Kimbrough were found guilty as charged. The court granted the motion of Charles Kimbrough for a new trial and Charles Kimbrough was acquitted after an immediate retrial upon stipulated evidence. The motion of Otis Hendrix for a new trial was denied. Otis Hendrix has appealed. The question presented for review is whether defendant is legally accountable for the armed robbery. We affirm. The facts are as follows. At about 10:30 P.M. on January 24, 1970, a Kentucky Fried Chicken store located at 15636 South Dixie Highway *839 in Markham, Illinois, was robbed by two armed men. Bruce Terry, the store manager, armed himself with a pistol and chased the robbers into an alley behind the store. He ordered the robbers to stop but they proceeded to enter a car waiting in the alley. At this time Mr. Terry observed a third man behind the wheel. Mr. Terry observed the car's wheels spinning in the gravel in the alley. He shot at the car and chased it to the corner of 157th Street and Dixie Highway where it stopped at a stop sign. After Terry fired the gun again the driver of the car turned around enabling Terry to see his face. At trial Terry identified the driver as the defendant Otis Hendrix. After the car proceeded across the intersection, Terry flagged down a squad car, occupied by Officer Schultz of the Markham, Illinois Police Department. While he was in the squad car Terry observed the defendant on a side street, but only later realized who it was. The abandoned car, which was used in the robbery, was found in the vicinity. It belonged to Frank Baxter, a brother-in-law of defendant. Otis Hendrix testified at trial that at about 7 P.M. on January 24, 1970, two acquaintances, Maurice Dean and Charles Kimbrough, visited him at his home. Defendant's wife earlier had gone to a birthday party at her sister's house. At about 10 P.M. Kimbrough suggested that defendant borrow a car from defendant's brother-in-law, Frank Baxter, in order to take Kimbrough and Dean to the house of Kimbrough's brother (Snooky). Defendant testified that he did not feel like going so he tried to arrange for Frank Baxter to take them. Defendant and the two men walked to the house of defendant's sister-in-law to make the request of Baxter. However, Baxter's wife would not allow Baxter to leave the house, so defendant borrowed Baxter's car in order to drive them himself. Defendant further testified that Kimbrough suggested that they stop at the Kentucky Fried Chicken store because Kimbrough and Dean were hungry. When they arrived at the store, Kimbrough directed defendant to park the car in the alley behind the store so that they would have "a straight side to Snooky's house". Defendant remained in the car while the other two men went into the store. Defendant could not see the store from where he parked in the alley because a fence obstructed his vision. He turned off the engine while he was waiting. When the two men returned to the car they told defendant to take off because they had just robbed the store. Defendant heard a shot come through the rear windshield, started the car, and proceeded in the alley. After driving a few blocks, defendant drove the car into a snow bank in a vacant lot. The men abandoned the car and walked two blocks to *840 Snooky's house. From the house defendant telephoned his wife and a taxi company. He took a taxi to the house of his sister-in-law. There he explained to his wife what had happened. Defendant and a group of people went to the police station. Defendant saw Frank Baxter there. Defendant explained his story about the robbery and gave a description of the other two men to the police. He denied that the two men told him that they intended to rob the store. On cross-examination, defendant testified that he had known Dean for about 9 months and Kimbrough for about 2 years. He was not expecting Kimbrough and Dean at his house on the evening in question. Defendant knew that they had come from Chicago but was ignorant of the means by which they were transported. The record is unclear as to whether they drove a car to Hendrix' house and if so, as to whether they parked the car in front. Defendant maintained that he did not see Kimbrough or Dean with guns after the robbery occurred and did not know that they had guns when they were at his residence. On redirect examination defendant explained that he did not park in the store parking lot because it had not been plowed of snow. He testified that the alley had been plowed. Bruce Terry, the store manager, and Officer Schultz of the Markham Police Department who investigated the armed robbery, both testified that the parking lot was clear of snow on the night in question. Officer Hunt of the Markham Police Department testified that he observed defendant come into the police station with Frank Baxter. Hunt stated that defendant told him that he had borrowed Baxter's car, but that "the car had been stolen from him from a party in Dixmoor". At trial defendant denied that he said this. At the police station Bruce Terry caught a glimpse of defendant and told Hunt that he was positive that defendant was driving the getaway car. Defendant was then arrested and given his constitutional rights. After his arrest, defendant told Hunt that he had been driving Baxter's car and that the other two men had committed a robbery. He also told Hunt that he did not know that they were going to commit a robbery. Defendant came to the station voluntarily and at that point was not under arrest. The trial court found the defendant legally accountable for the armed robbery. Defendant contends that his involvement in the episode is consistent with his innocence. He argues that his actions were insufficient to render him criminally responsible for the acts of his companions. In the instant case, as was the case in People v. Richardson, 132 Ill. App.2d 712, 270 N.E.2d 568, cited by the prosecution, there is no dispute that a robbery was committed by defendant's companions and that the *841 defendant drove the getaway car from the scene. In that case, the court stated: "If he knowingly drove a `getaway car', then he is legally responsible as a principal." 132 Ill. App.2d 712, 714, 270 N.E.2d 568, 570. • 1, 2 Defendant was tried and convicted on a theory of accountability. (Ill. Rev. Stat. 1969, ch. 38, sec. 5-2(c).) The prosecution has the burden of proving beyond a reasonable doubt that defendant was a knowing participant in the armed robbery. The circumstances of defendant's involvement in the crime are relevant in determining his state of mind. Mere presence at the scene would not be enough to establish guilt. (People v. Clark, 30 Ill.2d 67, 195 N.E.2d 157.) In the instant case there were other factors bearing on defendant's guilt. The evidence showed that defendant drove the robbers to the scene of the crime. He parked suspiciously behind a fence in the alley while his companions robbed the adjacent store. He fled with the robbers and did not express any disapproval or opposition to the commission of the crime. These are factors which tend to establish defendant's knowledge of the armed robbery. See People v. Barnes, 2 Ill. App.3d 461, 276 N.E.2d 509; People v. Bleimehl, 9 Ill. App.3d 273, 292 N.E.2d 60; People v. Sanders, 129 Ill. App.2d 444, 263 N.E.2d 615. • 3 Defendant presented evidence showing that a reasonable explanation of his actions existed which was consistent with an innocent state of mind. His case was aimed at negating the inference of guilt which flowed from his actions before, during, and after the holdup. The prosecution presented opposing evidence. The matter became one of credibility, an area in which the trial judge, as trier of fact, was better suited to make a determination than this court, reviewing the record on appeal. (People v. Clark, 30 Ill.2d 67, 195 N.E.2d 157.) On the instant record, the trial court could well have found that the evidence sufficiently established that defendant knowingly participated in the armed robbery and that defendant had not established a reasonable hypothesis which was consistent with innocence. Accordingly, the judgment of the circuit court of Cook County is affirmed. Judgment affirmed. DEMPSEY and MEJDA, JJ., concur.
2024-05-10T01:26:51.906118
https://example.com/article/8074
Belgium Shoot the Americans Back Home Belgium needed all of ninety minutes and some more in order to dispatch of a resolute American team in this fast paced second round match played at the Arena Fonte Nova under the watchful Algerian referee, Djamel Haimoudi with over fifty thousand spectators in attendance. Following a goalless opening 90 minutes, the match sprang to life when Kevin De Bruyne fired Belgium in front in the 93rd minute. Substitute Romelu Lukaku doubled their advantage on 105 minutes before Julian Green pulled one back for Team USA two minutes later. When they met with The United States of America, Belgium showed why they have managed to cruise through the groups stages of this version of the FIFA World Cup which is being hosted by Brazil. They started the match in a fast paced business like fashion and could have taken the lead in literally the opening minute of the games when young Origi beat the offside trap and, with only the bearded keeper to beat, his attempted chip over the keeper did not carry high enough with the result that Howard became a hero for that save. The Red Devils were back in attack again a minute later but the resolute and determined American defence blocked De Bruyn’s effort. From that moment, the Stars and Stripes started imposing themselves more as they do in all other spheres of life. This resulted in their first real chance at goal when Clint Dempsey combined well with Michael Bradley and this culminated in a brilliant shot by Dempsey but Courtois was equal to the task and palmed the effort out for a corner kick. Belgium upped the tempo after the half-time break, with Dries Mertens in particular causing the USA defence some problems early on. Howard, in goals for the United States of America was being called into the service of his great nation with high regularity as the second half wore on. Origi was the biggest culprit in this as in the 84th minute, he fired a rising drive before his team mate, Hazard’s left footed effort hit the side netting. When the match was finally dragged into extra time, the Belgians began to click well and in only the third minute of the extra time, they finally found their scoring touch. Lukaku picked up the ball on the right hand side and drove it deep towards the USA goal line before cutting back to De Bruyn who drilled a grounder from the right hand side of the box into the bottom left hand side of the goal and beating Howard all systems out. De Bruyn then turned provider when the two again combined wonderfully to double Belgium’s advantage on the stroke of half-time with Lukaku smashing home a swerving shot at the near post. The American’s never-say-die attitude was in evidence in the way they tried to fight back into the game. Substitute, Julian Green found the back of the net with a brilliant volley with his first touch of the game. However, this was a case of too little to late and the final result meant that Jurgen Klinsmann’s men are out of contention for the FIFA World Cup this time around and that the armed Devils have set themselves a date against Argentina in the quarter finals.
2024-06-26T01:26:51.906118
https://example.com/article/6697
A mom trying to get fit…but LIFE always has it’s own agenda. Menu Tag Archives: healthy-living Ever since my half marathon in October its’ been like a 5k run ever two weeks. Larry and I did The Color Run at Nationals Park in DC 2 weeks after running our 13.1, then another 2 weeks later–I attended the Montgomery County “Girls On The Run” 5k with my daughter. Out of the 3 runs this was the most rewarding as a parent, it was my daughters first 5k and she did her run/walk pace. I was so proud of her to keep motivated in picking goal points along the way of when to start running and walking. I told her about the tag-it lady I met during my 13.1, that we implied it with friends and tagged them as we passed them and slowed down to catch our breaths after tagging them. It was totally so much fun and she’s looking forward to her mommy’s promise. The promise was that after her first 5k, I will register her for “The Color Run” with me the next time I do it. We did it!! Yes this was the song I started to sing to Larry with one mile left to complete our first half marathon as a couple–it was totally worth the experience together. You think you start off planning everything accordingly, but with all the excitement of my daughter doing her first Kids Fun Run at the 2014 Baltimore Running Festival this past Saturday. Well, you get carried away with the run arounds and what not. This led to Larry and I being real late to the start line of our half marathon. I wouldn’t be able to tell you how late because for the second time in a row, I fail to wear a watch to a half marathon. We were so late that we couldn’t tell where our start line was that we almost ran the full marathon course, but we figured it out and we were on our way. As we began–we started off so quick that Larry’s hamstring injury from earlier in the week started to agitate him. To top it off, the first 1.5 miles there were NO spectators, we couldn’t even see cones signaling our way into the course–panic almost set in. It was like a movie scene, as I looked back at Larry, his arms went up…”Go on without me” “My hamstring not going to make it!” I stopped and replied “NO! I”m not leaving you–I told you this!”. Larry: “You run I will hold you back”. Me: “I SAID NO! If we have to walk then so be it!” “We can walk it all the way if needed until officials kick us out–if they have to.” We just need to get to mile 3 where we meet with the full marathon course before they open roads” “Lets just do what you can and take it from there!” I don’t know how we got through the first 3 miles but I can tell you this we never walked and ran (shuffled, lol) so fast. Luckily Larry’s hamstring was just warming up but still he had issues with it through the run. The few spectators that were left or about to leave with their “Run like Zombies are chasing you” sign, by the 3rd mile mark were awesome. Still cheered us on and even a group had their own unofficial table with snacks for runners. We were about 100ft from meeting with the full marathon course at the 3rd mile when the marathon officials were following slowly behind us with their car because they were getting ready to open the roads behind us. BUT WE MADE IT and we continued the course with the rest of the runners. From that point on it was quite an experience, I had so much fun running with Larry then alone when I did it the first time 2 years ago. You have someone to talk to, laugh with and fart with LOL (thanks snack station at 7.5 mile (20.5mile-Full) with Salt & Vinegar chips), just saying it happens when you run these things–what can I say. <shrugs> Runners around us would sometimes come up and make comments. One woman came by saying: “Can I ask you a question?” We: “Sure!” Woman: “Why did we sign up for this again?!”. Another runner mentioned: “YOU LIED ABOUT ALL THESE HILLS!”. But really I have to give a shout out to the best two groups of spectators with their unofficial water stations. Around 7th mile (20mile-Full), shout out to the table with wine shots for runners! And a shout out to the 10th mile (23rdmile-Full) with a their unofficial water table of beer shots! They were both refreshing. While Larry and I were not doing it for time but for completion, I have to say I am so proud of him for training with me and going through with it. It was the best thing we have done together and I can definitely see that we are an awesome team. Here’s to many more runs with him as our next one is The Color Run in DC on November 1st. So it’s official, our family is becoming a running family. We all have gotten official running shoes to break-in for our planned goals this Fall. Larry and I have our goal to complete the Baltimore Running Festival half-marathon in October. Now my 9 year old is inspired by us and she’s joined her schools Girl’s On The Run Team and they will Run in November. We are all feeling pretty stylish with our selection/style/color and fit of our shoes, nothing can stop us now. Gotta love my matching nail polish too 😉 P.s. Our 8 mile run last weekend was awesome! No pains, no muscle cramps because we prepared for the unexpected. The last mile got hard but I pushed through it and considered it an awesome run. Woke up to a typical morning (finding a reason to not make it to the gym). I check my phone and noticed a alert text from our counties school “2 Hour Delay”. Therefore that meant snow did in fact fall, and like a 7 year old, I jumped out of bed and ran to my window. Sigh our first snow fall (Finally!). Knowing that I didn’t have to rush to get my daughter up for school. There was no reason to skip my gym workout today, and I made it! After my workout, as I drove home and observed the paranoid drivers in this weather. I thought to myself…yea I can see how some people say “The DMV panics with a bit of snow fall”. Then I realized why snow never phases me when I’m driving. I lived in Detroit for 2 years in college. So any time the DMV gets snow, Pssssh it’s nothing compared to living in the Motor City, lol. Snow fall there is serious, it would come up to mid-thigh–you couldn’t even walk a block without your legs feeling needles in them, and your nose hairs crystalizing as you breathed in–seriously not joking, lol . The interesting part is, it didn’t phase the Detroiters–and thats what I loved about living out there in the winter. Anyway, workout was awesome and have lots of energy this morning! Want to see the workout I followed? Check it out below. I wasn’t able to fit in 20min cardio at the end of it, but definitely get in this evening with my little girl with “Just Dance 4” on the Xbox 360. Last week on Monday, January 7 I decided I would start the bodybuilding.com challenge. It’s basically a 12 week competition to transform your body. There are no catches what so ever, so I had nothing to lose then my dignity on submitting my “Before Pictures”. Now, I know why fitness program before images of people look so sad. For one, its so uncomfortable knowing that your almost half naked to show….well how FAT you look. Needless to say, my pictures are well…Good Lawd ! you really need to lose the weight. Clothes and confidence does a good deal of hiding the reality of where your body stands, but looking at my pictures made me realize wow it’s time to stop joking around and get to business. (No I’m not posting those pictures up, so don’t bother scrolling down) Though I am not trying to set myself up for failure, meaning I don’t plan on winning this challenge-but to compete and challenge with myself. I did this to follow a structure that will motivate me to stay focused and on schedule. So I am happy to announce that I am on my 2nd week Day 3 of my challenge, and so far so good. As always life wants to interfere with flu symptoms last Friday, but I was able to conquer it and get back on schedule this past Monday. Also the challenge has opted me to try new things such as Bikram Yoga last week. (Hot Yoga in a room of 105 degrees and about 40-50% humidity) Now let me tell you Bikram Yoga is no joke, and for a first timer WOW was it hot in there, but I made it through the entire class and I loved it! Unfortunately, I haven’t been back since then because I got sick but hope to attend at least 2 sessions before the beginning of next week. Since the 13.1 I gained 12 lbs so I’m at a 220 lb well that was when I started last week. (yea I know, hard to believe, well don’t let my last picture in my running gear fool you, thats the frontal pic, lol) What I liked about Bikram Yoga is that, even though you may feel insecure with your body…NO ONE IS LOOKING. Everyone comes in picks a spot on the floor and when the session begins it’s about focusing on yourself in the mirror. Then once it’s all over, you feel like you totally accomplished something really huge in your life. You feel like new again mentally, and ready for the next thing…it was awesome I tell you. You should try it sometime. So I will end with my stats and every now and then I will update on a posting, to show you and myself my progress.
2024-03-18T01:26:51.906118
https://example.com/article/1829
inder when 176087724 is divided by 53? 47 Calculate the remainder when 3160591 is divided by 19. 17 Calculate the remainder when 2249064 is divided by 227. 175 Calculate the remainder when 785068 is divided by 141. 121 What is the remainder when 6408470 is divided by 85446? 20 Calculate the remainder when 4867163 is divided by 30. 23 Calculate the remainder when 4496822 is divided by 578. 560 What is the remainder when 904443 is divided by 5165? 568 What is the remainder when 366402 is divided by 10776? 18 Calculate the remainder when 184618 is divided by 4502. 36 Calculate the remainder when 211876407 is divided by 190. 187 What is the remainder when 1449150 is divided by 64? 62 Calculate the remainder when 256190 is divided by 1991. 1342 What is the remainder when 250704 is divided by 1547? 90 Calculate the remainder when 2905649 is divided by 9080. 49 What is the remainder when 3613420 is divided by 607? 556 What is the remainder when 32601113 is divided by 1638? 1637 What is the remainder when 3931645 is divided by 448? 445 What is the remainder when 521807 is divided by 1495? 52 What is the remainder when 172421070 is divided by 523? 522 Calculate the remainder when 1381055 is divided by 161. 158 Calculate the remainder when 265066 is divided by 621. 520 What is the remainder when 169246 is divided by 7681? 264 Calculate the remainder when 1259980 is divided by 3559. 94 What is the remainder when 47041868 is divided by 57? 53 Calculate the remainder when 1122533 is divided by 8370. 953 Calculate the remainder when 11770793 is divided by 4133. 9 What is the remainder when 543572 is divided by 24690? 392 Calculate the remainder when 3328278 is divided by 8578. 14 Calculate the remainder when 26758574 is divided by 125627. 23 Calculate the remainder when 20402 is divided by 17336. 3066 Calculate the remainder when 2217012 is divided by 2216987. 25 Calculate the remainder when 6066747 is divided by 6066741. 6 What is the remainder when 2405072 is divided by 74? 72 What is the remainder when 340887 is divided by 26216? 79 Calculate the remainder when 2878176 is divided by 573. 570 Calculate the remainder when 4394546 is divided by 68. 46 What is the remainder when 41700654 is divided by 2162? 2160 Calculate the remainder when 224520 is divided by 2501. 1931 Calculate the remainder when 1063806 is divided by 1869. 345 Calculate the remainder when 588943 is divided by 1283. 46 What is the remainder when 44419167 is divided by 1277? 1276 What is the remainder when 1340095 is divided by 802? 755 What is the remainder when 29407089 is divided by 3431? 3419 Calculate the remainder when 179117 is divided by 1939. 729 What is the remainder when 1106500 is divided by 82? 74 What is the remainder when 1100782 is divided by 6? 4 Calculate the remainder when 4630570 is divided by 2129. 2124 Calculate the remainder when 18983485 is divided by 133. 129 What is the remainder when 503369 is divided by 29609? 16 What is the remainder when 5629199 is divided by 130? 69 Calculate the remainder when 300346 is divided by 680. 466 What is the remainder when 679817 is divided by 38? 35 What is the remainder when 12305914 is divided by 662? 658 Calculate the remainder when 467357 is divided by 1046. 841 What is the remainder when 24123110 is divided by 148? 146 Calculate the remainder when 314918 is divided by 62971. 63 What is the remainder when 34733277 is divided by 4256? 61 Calculate the remainder when 9679318 is divided by 30. 28 What is the remainder when 3838208 is divided by 51? 50 Calculate the remainder when 123246 is divided by 2692. 2106 Calculate the remainder when 6666736 is divided by 164. 136 Calculate the remainder when 393073 is divided by 42. 37 Calculate the remainder when 316367 is divided by 8805. 8192 Calculate the remainder when 334483 is divided by 1991. 1986 Calculate the remainder when 20055895 is divided by 913. 24 Calculate the remainder when 2618851 is divided by 12013. 17 Calculate the remainder when 13484835 is divided by 912. 3 What is the remainder when 410111 is divided by 136175? 1586 Calculate the remainder when 156842 is divided by 2212. 2002 Calculate the remainder when 10782976 is divided by 3243. 1 What is the remainder when 47096921 is divided by 1044? 1037 What is the remainder when 456382 is divided by 6612? 154 What is the remainder when 79613830 is divided by 299? 296 What is the remainder when 3178155 is divided by 85896? 3 What is the remainder when 3721814 is divided by 4? 2 Calculate the remainder when 466323 is divided by 98. 39 Calculate the remainder when 24358 is divided by 3029. 126 What is the remainder when 4533078 is divided by 1510927? 297 Calculate the remainder when 426307 is divided by 313. 1 Calculate the remainder when 85809 is divided by 8567. 139 What is the remainder when 919455 is divided by 306481? 12 Calculate the remainder when 10035004 is divided by 265. 249 Calculate the remainder when 550513 is divided by 275117. 279 What is the remainder when 16076369 is divided by 173? 171 Calculate the remainder when 15047948 is divided by 6. 2 Calculate the remainder when 69479 is divided by 22428. 2195 Calculate the remainder when 17196800 is divided by 954. 950 What is the remainder when 435165 is divided by 217554? 57 Calculate the remainder when 23406546 is divided by 506. 504 Calculate the remainder when 310633663 is divided by 22. 21 What is the remainder when 1558020 is divided by 104? 100 Calculate the remainder when 98282 is divided by 32366. 1184 What is the remainder when 10403651 is divided by 10403645? 6 Calculate the remainder when 8577187 is divided by 932. 923 What is the remainder when 88875 is divided by 112? 59 Calculate the remainder when 1495710 is divided by 12. 6 What is the remainder when 1393945 is divided by 1276? 553 What is the remainder when 15130919 is divided by 2393? 2373 Calculate the remainder when 131365 is divided by 1887. 1162 Calculate the remainder when 257608 is divided by 8854. 842 Calculate the remainder when 10229660 is divided by 48253. 24 Calculate the remainder when 584876 is divided by 245. 61 Calculate the remainder when 10221 is divided by 3970. 2281 What is the remainder when 660045 is divided by 649? 12 Calculate the remainder when 3314478 is divided by 146. 132 What is the remainder when 9901 is divided by 2234? 965 Calculate the remainder when 139132 is divided by 139020. 112 Calculate the remainder when 63538 is divided by 10284. 1834 What is the remainder when 942998 is divided by 7576? 3574 What is the remainder when 8568 is divided by 4166? 236 What is the remainder when 398513 is divided by 398381? 132 What is the remainder when 40496 is divided by 686? 22 What is the remainder when 4679979 is divided by 333? 330 What is the remainder when 138795365 is divided by 138795354? 11 What is the remainder when 708666 is divided by 88581? 18 Calculate the remainder when 3872612 is divided by 19363. 12 Calculate the remainder when 192776 is divided by 32052. 464 What is the remainder when 10884 is divided by 1989? 939 Calculate the remainder when 487322 is divided by 40600. 122 What is the remainder when 5896205 is divided by 3624? 3581 What is the remainder when 3096088 is divided by 3126? 1348 What is the remainder when 130612470 is divided by 281? 17 Calculate the remainder when 5579899 is divided by 128. 123 Calculate the remainder when 205951 is divided by 28. 11 Calculate the remainder when 5908 is divided by 189. 49 What is the remainder when 11067705 is divided by 922291? 213 What is the remainder when 34013336 is divided by 11337760? 56 Calculate the remainder when 2655312 is divided by 1327345. 622 What is the remainder when 352512065 is divided by 17497? 6 What is the remainder when 712505 is divided by 7191? 596 Calculate the remainder when 1859832 is divided by 619941. 9 Calculate the remainder when 11337 is divided by 7812. 3525 Calculate the remainder when 504177 is divided by 1866. 357 Calculate the remainder when 230278 is divided by 19. 17 Calculate the remainder when 81760936 is divided by 221. 218 What is the remainder when 273171 is divided by 683? 654 Calculate the remainder when 14763205 is divided by 50. 5 Calculate the remainder
2024-02-10T01:26:51.906118
https://example.com/article/5343
Q: How is this kind of cycling correctly called? Sometimes I like to make rather high-speed descents (during which I also make jumps) in the forest near to my house. I want to know how this kind of activity is correctly called. Is it downhill, freeride, etc.? A: From your description it's hard to say exactly what kind of riding you are doing, all forms of mountain biking can involve going down hills quickly and jumping. If you want to be specific it sounds like it fits into one of these categories - Trail Riding This is a good catchall term for recreational mountain biking where the trail is the most important thing - It includes climbing and descending, typically on singletrack. It's possible your wheels will get off the ground, but not mandatory. All Mountain Again this includes climbing, but all mountain riding focuses more on going down than getting up. A all mountain bike will generally be heavier and more robust than a trail bike - it needs to handle higher speeds and bigger impacts. Downhill Are you just interested in getting down that hill as quickly as possible? Are you pushing/getting carried to the top? Then you're riding downhill. You'll probably be jumping, and you'll probably be going very fast. Freestyle Like downhill freestyle is all about the descent, but in this case style is more important than speed. If you're riding freestyle you'll be doing tricks and stunts on the jumps and drops. Bear in mind that these aren't strictly defined terms, and are prone to change. A: "Freeride" generally refers to the type of riding described above, using Summertime ski-trails to ride essentially downhill. You usually truck up to the top. "Downhill" normally refers to a particular type of MTB racing on a downhill course. This would be pretty close to what you describe... Minus the competitive aspect. Some of these races are conducted head-to-head on the same course, some are one-at-a-time "time trials". A: North Shore!!! Yep, there is a name for it and in the UK (and presumably Canada) it is known as 'North Shore'. This is a shorthand for British Columbia riding style on trails exactly as you describe. Even the bike manufacturers have cottoned onto the trend, plus the editors of Wikipedia: North Shore bikes are much like freeride bikes in their geometry and downhill bikes in their component makeup. Because north shore stunts have evolved to not only include simple and complex bridges but also large drops and high-speed descents through a series of stunts north shore bikes commonly have as much travel as downhill and freeride bikes, however with much more nimble and maneuverable frame designs, and often lighter weight. http://en.wikipedia.org/wiki/Mountain_bike Now you know the magic YouTube search term, find some good videos to post here for the enjoyment of the stackexchange masses. Good luck with the trail building and, at the risk of sounding like your mother, don't forget your helmet and body armour!
2023-11-12T01:26:51.906118
https://example.com/article/6385
Two-dimensional echocardiographic assessment of normal fetal cardiac anatomy. The fetal heart is visualized routinely during the antepartum ultrasound examination. Because of the advent of high-resolution, real-time ultrasound instruments, details of fetal cardiac anatomy can now be defined. Fifty consecutive fetuses were examined in utero to assess the ability of two-dimensional echocardiography to define intracardiac anatomy at various gestational ages. A complete examination required at least three standard echocardiographic views of the heart: four-chamber, short-axis and long-axis views. In 30 of the 50 fetuses studied (60%) only one examination was necessary to obtain this information. Ten patients had a second examination later in gestation that complemented the findings of their first study. In all but two fetuses, detection of all four cardiac chambers and at least one semilunar valve was possible. Mitral-semilunar valve continuity was detected in all. The quality of echocardiographic imaging was enhanced by the fetal occiput posterior position (three views obtained in 83% of the fetuses studied). Breech position did not affect imaging quality. Prior to 30 weeks of gestation, fetal movement hampered analysis of fetal cardiac anatomy in some patients.
2024-05-23T01:26:51.906118
https://example.com/article/9142
// Copyright 2016 The Draco Authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // 'use strict'; // |dracoPath| sets the path for the Draco decoder source files. The default // path is "./". If |dracoDecoderType|.type is set to "js", then DRACOLoader // will load the Draco JavaScript decoder. function DRACOLoader(dracoPath, dracoDecoderType, manager) { this.timeLoaded = 0; this.manager = manager !== undefined ? manager : THREE.DefaultLoadingManager; this.materials = null; this.verbosity = 0; this.attributeOptions = {}; if (dracoDecoderType !== undefined) { DRACOLoader.dracoDecoderType = dracoDecoderType; } this.drawMode = THREE.TrianglesDrawMode; this.dracoSrcPath = dracoPath !== undefined ? dracoPath : './'; // If draco_decoder.js or wasm code is already loaded/included, then do // not dynamically load the decoder. if (typeof DracoDecoderModule === 'undefined') { DRACOLoader.loadDracoDecoder(this); } // User defined unique id for attributes. this.attributeUniqueIdMap = {}; // Native Draco attribute type to Three.JS attribute type. this.nativeAttributeMap = { position: 'POSITION', normal: 'NORMAL', color: 'COLOR', uv: 'TEX_COORD', }; } DRACOLoader.dracoDecoderType = {}; DRACOLoader.prototype = { constructor: DRACOLoader, load: function(url, onLoad, onProgress, onError) { var scope = this; var loader = new THREE.FileLoader(scope.manager); loader.setPath(this.path); loader.setResponseType('arraybuffer'); if (this.crossOrigin !== undefined) { loader.crossOrigin = this.crossOrigin; } loader.load( url, function(blob) { scope.decodeDracoFile(blob, onLoad); }, onProgress, onError ); }, setPath: function(value) { this.path = value; }, setCrossOrigin: function(value) { this.crossOrigin = value; }, setVerbosity: function(level) { this.verbosity = level; }, /** * Sets desired mode for generated geometry indices. * Can be either: * THREE.TrianglesDrawMode * THREE.TriangleStripDrawMode */ setDrawMode: function(drawMode) { this.drawMode = drawMode; }, /** * Skips dequantization for a specific attribute. * |attributeName| is the THREE.js name of the given attribute type. * The only currently supported |attributeName| is 'position', more may be * added in future. */ setSkipDequantization: function(attributeName, skip) { var skipDequantization = true; if (typeof skip !== 'undefined') skipDequantization = skip; this.getAttributeOptions( attributeName ).skipDequantization = skipDequantization; }, /** * |attributeUniqueIdMap| specifies attribute unique id for an attribute in * the geometry to be decoded. The name of the attribute must be one of the * supported attribute type in Three.JS, including: * 'position', * 'color', * 'normal', * 'uv', * 'uv2', * 'skinIndex', * 'skinWeight'. * The format is: * attributeUniqueIdMap[attributeName] = attributeId */ decodeDracoFile: function(rawBuffer, callback, attributeUniqueIdMap) { var scope = this; this.attributeUniqueIdMap = attributeUniqueIdMap !== undefined ? attributeUniqueIdMap : {}; DRACOLoader.getDecoder(this, function(dracoDecoder) { scope.decodeDracoFileInternal(rawBuffer, dracoDecoder, callback); }); }, decodeDracoFileInternal: function(rawBuffer, dracoDecoder, callback) { /* * Here is how to use Draco Javascript decoder and get the geometry. */ var buffer = new dracoDecoder.DecoderBuffer(); buffer.Init(new Int8Array(rawBuffer), rawBuffer.byteLength); var decoder = new dracoDecoder.Decoder(); /* * Determine what type is this file: mesh or point cloud. */ var geometryType = decoder.GetEncodedGeometryType(buffer); if (geometryType == dracoDecoder.TRIANGULAR_MESH) { if (this.verbosity > 0) { console.log('Loaded a mesh.'); } } else if (geometryType == dracoDecoder.POINT_CLOUD) { if (this.verbosity > 0) { console.log('Loaded a point cloud.'); } } else { var errorMsg = 'DRACOLoader: Unknown geometry type.'; console.error(errorMsg); throw new Error(errorMsg); } callback( this.convertDracoGeometryTo3JS( dracoDecoder, decoder, geometryType, buffer ) ); }, addAttributeToGeometry: function( dracoDecoder, decoder, dracoGeometry, attributeName, attribute, geometry, geometryBuffer ) { if (attribute.ptr === 0) { var errorMsg = 'DRACOLoader: No attribute ' + attributeName; console.error(errorMsg); throw new Error(errorMsg); } var numComponents = attribute.num_components(); var attributeData = new dracoDecoder.DracoFloat32Array(); decoder.GetAttributeFloatForAllPoints( dracoGeometry, attribute, attributeData ); var numPoints = dracoGeometry.num_points(); var numValues = numPoints * numComponents; // Allocate space for attribute. geometryBuffer[attributeName] = new Float32Array(numValues); // Copy data from decoder. for (var i = 0; i < numValues; i++) { geometryBuffer[attributeName][i] = attributeData.GetValue(i); } // Add attribute to THREEJS geometry for rendering. geometry.addAttribute( attributeName, new THREE.Float32BufferAttribute( geometryBuffer[attributeName], numComponents ) ); dracoDecoder.destroy(attributeData); }, convertDracoGeometryTo3JS: function( dracoDecoder, decoder, geometryType, buffer ) { if (this.getAttributeOptions('position').skipDequantization === true) { decoder.SkipAttributeTransform(dracoDecoder.POSITION); } var dracoGeometry; var decodingStatus; const start_time = performance.now(); if (geometryType === dracoDecoder.TRIANGULAR_MESH) { dracoGeometry = new dracoDecoder.Mesh(); decodingStatus = decoder.DecodeBufferToMesh(buffer, dracoGeometry); } else { dracoGeometry = new dracoDecoder.PointCloud(); decodingStatus = decoder.DecodeBufferToPointCloud(buffer, dracoGeometry); } if (!decodingStatus.ok() || dracoGeometry.ptr == 0) { var errorMsg = 'DRACOLoader: Decoding failed: '; errorMsg += decodingStatus.error_msg(); console.error(errorMsg); dracoDecoder.destroy(decoder); dracoDecoder.destroy(dracoGeometry); throw new Error(errorMsg); } var decode_end = performance.now(); dracoDecoder.destroy(buffer); /* * Example on how to retrieve mesh and attributes. */ var numFaces; if (geometryType == dracoDecoder.TRIANGULAR_MESH) { numFaces = dracoGeometry.num_faces(); if (this.verbosity > 0) { console.log('Number of faces loaded: ' + numFaces.toString()); } } else { numFaces = 0; } var numPoints = dracoGeometry.num_points(); var numAttributes = dracoGeometry.num_attributes(); if (this.verbosity > 0) { console.log('Number of points loaded: ' + numPoints.toString()); console.log('Number of attributes loaded: ' + numAttributes.toString()); } // Verify if there is position attribute. var posAttId = decoder.GetAttributeId(dracoGeometry, dracoDecoder.POSITION); if (posAttId == -1) { var errorMsg = 'DRACOLoader: No position attribute found.'; console.error(errorMsg); dracoDecoder.destroy(decoder); dracoDecoder.destroy(dracoGeometry); throw new Error(errorMsg); } var posAttribute = decoder.GetAttribute(dracoGeometry, posAttId); // Structure for converting to THREEJS geometry later. var geometryBuffer = {}; // Import data to Three JS geometry. var geometry = new THREE.BufferGeometry(); // Add native Draco attribute type to geometry. for (var attributeName in this.nativeAttributeMap) { // The native attribute type is only used when no unique Id is // provided. For example, loading .drc files. if (this.attributeUniqueIdMap[attributeName] === undefined) { var attId = decoder.GetAttributeId( dracoGeometry, dracoDecoder[this.nativeAttributeMap[attributeName]] ); if (attId !== -1) { if (this.verbosity > 0) { console.log('Loaded ' + attributeName + ' attribute.'); } var attribute = decoder.GetAttribute(dracoGeometry, attId); this.addAttributeToGeometry( dracoDecoder, decoder, dracoGeometry, attributeName, attribute, geometry, geometryBuffer ); } } } // Add attributes of user specified unique id. E.g. GLTF models. for (var attributeName in this.attributeUniqueIdMap) { var attributeId = this.attributeUniqueIdMap[attributeName]; var attribute = decoder.GetAttributeByUniqueId( dracoGeometry, attributeId ); this.addAttributeToGeometry( dracoDecoder, decoder, dracoGeometry, attributeName, attribute, geometry, geometryBuffer ); } // For mesh, we need to generate the faces. if (geometryType == dracoDecoder.TRIANGULAR_MESH) { if (this.drawMode === THREE.TriangleStripDrawMode) { var stripsArray = new dracoDecoder.DracoInt32Array(); var numStrips = decoder.GetTriangleStripsFromMesh( dracoGeometry, stripsArray ); geometryBuffer.indices = new Uint32Array(stripsArray.size()); for (var i = 0; i < stripsArray.size(); ++i) { geometryBuffer.indices[i] = stripsArray.GetValue(i); } dracoDecoder.destroy(stripsArray); } else { var numIndices = numFaces * 3; geometryBuffer.indices = new Uint32Array(numIndices); var ia = new dracoDecoder.DracoInt32Array(); for (var i = 0; i < numFaces; ++i) { decoder.GetFaceFromMesh(dracoGeometry, i, ia); var index = i * 3; geometryBuffer.indices[index] = ia.GetValue(0); geometryBuffer.indices[index + 1] = ia.GetValue(1); geometryBuffer.indices[index + 2] = ia.GetValue(2); } dracoDecoder.destroy(ia); } } geometry.drawMode = this.drawMode; if (geometryType == dracoDecoder.TRIANGULAR_MESH) { geometry.setIndex( new (geometryBuffer.indices.length > 65535 ? THREE.Uint32BufferAttribute : THREE.Uint16BufferAttribute)(geometryBuffer.indices, 1) ); } var posTransform = new dracoDecoder.AttributeQuantizationTransform(); if (posTransform.InitFromAttribute(posAttribute)) { // Quantized attribute. Store the quantization parameters into the // THREE.js attribute. geometry.attributes['position'].isQuantized = true; geometry.attributes['position'].maxRange = posTransform.range(); geometry.attributes[ 'position' ].numQuantizationBits = posTransform.quantization_bits(); geometry.attributes['position'].minValues = new Float32Array(3); for (var i = 0; i < 3; ++i) { geometry.attributes['position'].minValues[i] = posTransform.min_value( i ); } } dracoDecoder.destroy(posTransform); dracoDecoder.destroy(decoder); dracoDecoder.destroy(dracoGeometry); this.decode_time = decode_end - start_time; this.import_time = performance.now() - decode_end; if (this.verbosity > 0) { console.log('Decode time: ' + this.decode_time); console.log('Import time: ' + this.import_time); } return geometry; }, isVersionSupported: function(version, callback) { DRACOLoader.getDecoder(this, function(decoder) { callback(decoder.isVersionSupported(version)); }); }, getAttributeOptions: function(attributeName) { if (typeof this.attributeOptions[attributeName] === 'undefined') this.attributeOptions[attributeName] = {}; return this.attributeOptions[attributeName]; }, }; // This function loads a JavaScript file and adds it to the page. "path" // is the path to the JavaScript file. "onLoadFunc" is the function to be // called when the JavaScript file has been loaded. DRACOLoader.loadJavaScriptFile = function(path, onLoadFunc, dracoDecoder) { var previous_decoder_script = document.getElementById('decoder_script'); if (previous_decoder_script !== null) { return; } var head = document.getElementsByTagName('head')[0]; var element = document.createElement('script'); element.id = 'decoder_script'; element.type = 'text/javascript'; element.src = path; if (onLoadFunc !== null) { element.onload = onLoadFunc(dracoDecoder); } else { element.onload = function(dracoDecoder) { DRACOLoader.timeLoaded = performance.now(); }; } head.appendChild(element); }; DRACOLoader.loadWebAssemblyDecoder = function(dracoDecoder) { DRACOLoader.dracoDecoderType['wasmBinaryFile'] = dracoDecoder.dracoSrcPath + 'draco_decoder.wasm'; var xhr = new XMLHttpRequest(); xhr.open('GET', dracoDecoder.dracoSrcPath + 'draco_decoder.wasm', true); xhr.responseType = 'arraybuffer'; xhr.onload = function() { // draco_wasm_wrapper.js must be loaded before DracoDecoderModule is // created. The object passed into DracoDecoderModule() must contain a // property with the name of wasmBinary and the value must be an // ArrayBuffer containing the contents of the .wasm file. DRACOLoader.dracoDecoderType['wasmBinary'] = xhr.response; DRACOLoader.timeLoaded = performance.now(); }; xhr.send(null); }; // This function will test if the browser has support for WebAssembly. If // it does it will download the WebAssembly Draco decoder, if not it will // download the asmjs Draco decoder. DRACOLoader.loadDracoDecoder = function(dracoDecoder) { if ( typeof WebAssembly !== 'object' || DRACOLoader.dracoDecoderType.type === 'js' ) { // No WebAssembly support DRACOLoader.loadJavaScriptFile( dracoDecoder.dracoSrcPath + 'draco_decoder.js', null, dracoDecoder ); } else { DRACOLoader.loadJavaScriptFile( dracoDecoder.dracoSrcPath + 'draco_wasm_wrapper.js', function(dracoDecoder) { DRACOLoader.loadWebAssemblyDecoder(dracoDecoder); }, dracoDecoder ); } }; /** * Creates and returns a singleton instance of the DracoDecoderModule. * The module loading is done asynchronously for WebAssembly. Initialized module * can be accessed through the callback function * |onDracoDecoderModuleLoadedCallback|. */ DRACOLoader.getDecoder = (function() { var decoder; var decoderCreationCalled = false; return function(dracoDecoder, onDracoDecoderModuleLoadedCallback) { if (typeof decoder !== 'undefined') { // Module already initialized. if (typeof onDracoDecoderModuleLoadedCallback !== 'undefined') { onDracoDecoderModuleLoadedCallback(decoder); } } else { if (typeof DracoDecoderModule === 'undefined') { // Wait until the Draco decoder is loaded before starting the error // timer. if (DRACOLoader.timeLoaded > 0) { var waitMs = performance.now() - DRACOLoader.timeLoaded; // After loading the Draco JavaScript decoder file, there is still // some time before the DracoDecoderModule is defined. So start a // loop to check when the DracoDecoderModule gets defined. If the // time is hit throw an error. if (waitMs > 5000) { throw new Error('DRACOLoader: DracoDecoderModule not found.'); } } } else { if (!decoderCreationCalled) { decoderCreationCalled = true; DRACOLoader.dracoDecoderType['onModuleLoaded'] = function(module) { decoder = module; }; DracoDecoderModule(DRACOLoader.dracoDecoderType); } } // Either the DracoDecoderModule has not been defined or the decoder // has not been created yet. Call getDecoder() again. setTimeout(function() { DRACOLoader.getDecoder( dracoDecoder, onDracoDecoderModuleLoadedCallback ); }, 10); } }; })(); export default DRACOLoader;
2024-01-10T01:26:51.906118
https://example.com/article/2171
Effective strategy of dendritic cell-based immunotherapy for advanced tumor-bearing hosts: the critical role of Th1-dominant immunity. Although dendritic cell (DC)-based cancer-specific immunotherapy is a potent strategy for various types of carcinomas, few clinical studies have yielded optimal antitumor effects. Systemic immunodeficiency is observed in patients with advanced malignant disease. In this study, we explored the ability to induce antitumor immunity of the cultured monocyte-derived DCs from hosts with advanced malignant disease, using a mouse model. We found remarkable dysfunction of DCs from mice with advanced cancer, which exhibited T helper (Th)2-dominant immunity, and subsequent reduced antitumor immune response. On the other hand, we found dramatic restoration of the ability of DCs to induce optimal antitumor immune responses after systemic administration of streptococcal preparation OK-432 to the tumor-bearing mice, which induced Th1-dominant immunity. In therapeutic experiments, intratumoral injections of immature DCs from the OK-432-treated mice, designated OK-DCs, enhanced inhibition of tumor growth compared with injections of immature DCs from mice with advanced malignancies, designated T-DCs (P < 0.05), leading to significant prolongation in overall survival (P < 0.05). In analysis of cell surface antigens, antigen-presenting capability and interleukin 12 production, we showed functional skewing in T-DCs and significant restorations in OK-DCs. More CD8+ tumor-infiltrating lymphocytes were detected in the mice treated with OK-DCs; furthermore, CTL assays showed that intratumoral injection of OK-DCs induced tumor-specific immune response to spleen as great as those of N-DCs. These results suggested that Th1-dominant immunity might play a crucial role in the differentiation of DCs, and OK-432 might be useful for inducing optimal antitumor effects in DC-based immunotherapy in tumor-bearing hosts.
2024-02-12T01:26:51.906118
https://example.com/article/9785
1. Scope of Invention This invention is directed to an automotive keyless entry system and more specifically, to an automotive keyless entry system having a unique sensor, preferably including a piezoelectric crystal as a means of actuation. 2. Prior Art Many keyless entry systems for unlocking automotive vehicles have been disclosed in prior art. U.S. Pat. No. 4,205,325 issued to Haygood et al, describes a system that utilized a computerized keyboard system as a means to enter a digital code. Upon entering the correct digital code, the vehicles electric door lock system would in turn be activated. Additionally, a plurality of other operations could be performed by entering further numerical values. U.S. Pat. No. 4,868,915 issued to Anderson III et al, disclosed a system having a means for defining an interrogation zone, responsive to a coded marker as a means for generating and verifying the correct access code. Another contribution to the art was disclosed in U.S. Pat. No. 5,134,392 issued to Takeuchi et al, whereas a keyless entry system employed a remote radio code transmitter as a means to activate the vehicles electric lock system. In U.S. Pat. No. 4,383,242, Sassover teaches an automobile anti-theft system which relies on a hand-held coded transmitter. A tap actuated lock and method of actuating the lock is disclosed by Salem in U.S. Pat. No. 4,197,524. This invention is somewhat closer to the present invention but is distinguished in that a plurality of taps in coded sequence are required to actuate this system and the sensor is of a conventional nature such as an unmodified piezoelectric crystal, a microphone and the like. Although the above contributions presented significant technological advances in the art, widespread public acceptance has been limited due to the cost of the systems. Also, installing these systems as an aftermarket add-on to the vehicle, presented a task that not only was excessively labor intensive, but if professionally installed has proven too costly for the majority of the motoring public.
2024-01-23T01:26:51.906118
https://example.com/article/6522
WELLINGTON (AFP) - The personal jet of Oscar-winning movie director Peter Jackson was reported on Wednesday to have been called into assist with the search for the missing Malaysian airliner. Australian authorities coordinating the search for Flight MH370 which disappeared on March 8 with 239 people on board said a civilian jet was being used to assist military aircraft scouring the Indian Ocean for any signs of the Boeing 777. After initially denying it was Jackson's jet, a spokesman for the New Zealand movie director later confirmed it was his aircraft that had been chartered to Australian authorities, the New Zealand Herald reported. Radio New Zealand said Jackson, who directed the The Lord Of The Rings and The Hobbit movies, had personally approved the use of his Gulfstream G650 in the search. The jet was not donated to help in the search effort, rather the company which operated the jet had accepted a charter offer, the report said. Gulfstream describes the G650 on its website as an "ultra-high-speed, ultra-long-range business jet" and the "flagship of the Gulfstream fleet". It says it can carry eight passengers and a crew of four on nonstop legs more than 12,900km.
2024-03-29T01:26:51.906118
https://example.com/article/7753
<?xml version="1.0" encoding="UTF-8"?> <document type="com.apple.InterfaceBuilder3.CocoaTouch.Storyboard.XIB" version="3.0" toolsVersion="15400" targetRuntime="iOS.CocoaTouch" propertyAccessControl="none" useAutolayout="YES" useTraitCollections="YES" useSafeAreas="YES" colorMatched="YES" initialViewController="8r8-z8-C9b"> <device id="retina4_7" orientation="portrait" appearance="light"/> <dependencies> <deployment identifier="iOS"/> <plugIn identifier="com.apple.InterfaceBuilder.IBCocoaTouchPlugin" version="15404"/> <capability name="Safe area layout guides" minToolsVersion="9.0"/> <capability name="documents saved in the Xcode 8 format" minToolsVersion="8.0"/> </dependencies> <scenes> <!--View Controller--> <scene sceneID="tne-QT-ifu"> <objects> <viewController id="BYZ-38-t0r" customClass="ViewController" sceneMemberID="viewController"> <view key="view" contentMode="scaleToFill" id="8bC-Xf-vdC"> <rect key="frame" x="0.0" y="0.0" width="375" height="667"/> <autoresizingMask key="autoresizingMask" widthSizable="YES" heightSizable="YES"/> <subviews> <button opaque="NO" contentMode="scaleToFill" contentHorizontalAlignment="center" contentVerticalAlignment="center" buttonType="roundedRect" lineBreakMode="middleTruncation" translatesAutoresizingMaskIntoConstraints="NO" id="ZJC-3N-FSW"> <rect key="frame" x="114.5" y="115" width="146" height="30"/> <state key="normal" title="Modal Content Cards"/> <connections> <action selector="displayModalContentCards:" destination="BYZ-38-t0r" eventType="touchUpInside" id="Vng-cc-yKX"/> </connections> </button> <button opaque="NO" contentMode="scaleToFill" contentHorizontalAlignment="center" contentVerticalAlignment="center" buttonType="roundedRect" lineBreakMode="middleTruncation" translatesAutoresizingMaskIntoConstraints="NO" id="2gi-3C-glS"> <rect key="frame" x="99.5" y="165" width="176" height="30"/> <state key="normal" title="Navigation Content Cards"/> <connections> <action selector="displayNavigationContentCards:" destination="BYZ-38-t0r" eventType="touchUpInside" id="oZ8-H4-u1e"/> </connections> </button> <button opaque="NO" contentMode="scaleToFill" contentHorizontalAlignment="center" contentVerticalAlignment="center" buttonType="roundedRect" lineBreakMode="middleTruncation" translatesAutoresizingMaskIntoConstraints="NO" id="Hfo-g0-YKF"> <rect key="frame" x="109" y="215" width="157" height="30"/> <state key="normal" title="Custom Content Cards"/> <connections> <action selector="displayCustomContentCards:" destination="BYZ-38-t0r" eventType="touchUpInside" id="WkW-aS-ZlD"/> </connections> </button> <stackView opaque="NO" contentMode="scaleToFill" translatesAutoresizingMaskIntoConstraints="NO" id="8aP-uO-Gv1"> <rect key="frame" x="75" y="265" width="225" height="34"/> <subviews> <label opaque="NO" userInteractionEnabled="NO" contentMode="left" horizontalHuggingPriority="251" verticalHuggingPriority="251" text="User ID:" textAlignment="natural" lineBreakMode="tailTruncation" baselineAdjustment="alignBaselines" adjustsFontSizeToFit="NO" translatesAutoresizingMaskIntoConstraints="NO" id="CVq-Ct-VRX"> <rect key="frame" x="0.0" y="0.0" width="61.5" height="34"/> <fontDescription key="fontDescription" type="system" pointSize="17"/> <nil key="textColor"/> <nil key="highlightedColor"/> </label> <textField opaque="NO" contentMode="scaleToFill" contentHorizontalAlignment="left" contentVerticalAlignment="center" borderStyle="roundedRect" textAlignment="natural" minimumFontSize="17" translatesAutoresizingMaskIntoConstraints="NO" id="Gve-fy-fxm"> <rect key="frame" x="61.5" y="0.0" width="163.5" height="34"/> <fontDescription key="fontDescription" type="system" pointSize="14"/> <textInputTraits key="textInputTraits" autocorrectionType="no" spellCheckingType="no" smartQuotesType="no"/> </textField> </subviews> </stackView> <stackView opaque="NO" contentMode="scaleToFill" distribution="equalSpacing" translatesAutoresizingMaskIntoConstraints="NO" id="a9I-Py-ood"> <rect key="frame" x="89.5" y="64" width="196.5" height="31"/> <subviews> <label opaque="NO" userInteractionEnabled="NO" contentMode="left" horizontalHuggingPriority="251" verticalHuggingPriority="251" text="Unread Indicator" textAlignment="natural" lineBreakMode="tailTruncation" baselineAdjustment="alignBaselines" adjustsFontSizeToFit="NO" translatesAutoresizingMaskIntoConstraints="NO" id="Rz3-o0-ZqT"> <rect key="frame" x="0.0" y="0.0" width="127.5" height="31"/> <fontDescription key="fontDescription" type="system" pointSize="17"/> <nil key="textColor"/> <nil key="highlightedColor"/> </label> <switch opaque="NO" contentMode="scaleToFill" horizontalHuggingPriority="750" verticalHuggingPriority="750" contentHorizontalAlignment="center" contentVerticalAlignment="center" on="YES" translatesAutoresizingMaskIntoConstraints="NO" id="WTA-1U-pNL"> <rect key="frame" x="147.5" y="0.0" width="51" height="31"/> </switch> </subviews> <constraints> <constraint firstItem="WTA-1U-pNL" firstAttribute="leading" secondItem="Rz3-o0-ZqT" secondAttribute="trailing" constant="20" id="zbZ-l4-pyG"/> </constraints> </stackView> <button opaque="NO" contentMode="scaleToFill" contentHorizontalAlignment="center" contentVerticalAlignment="center" buttonType="roundedRect" lineBreakMode="middleTruncation" translatesAutoresizingMaskIntoConstraints="NO" id="yfQ-6j-9OW"> <rect key="frame" x="142.5" y="319" width="90" height="30"/> <state key="normal" title="Change User"/> <connections> <action selector="changeUser:" destination="BYZ-38-t0r" eventType="touchUpInside" id="G8q-em-EGV"/> </connections> </button> </subviews> <color key="backgroundColor" red="1" green="1" blue="1" alpha="1" colorSpace="custom" customColorSpace="sRGB"/> <constraints> <constraint firstItem="8aP-uO-Gv1" firstAttribute="centerX" secondItem="ZJC-3N-FSW" secondAttribute="centerX" id="3Qp-TF-n2b"/> <constraint firstItem="a9I-Py-ood" firstAttribute="top" secondItem="6Tk-OE-BBY" secondAttribute="top" constant="20" id="8ml-yj-h6a"/> <constraint firstItem="ZJC-3N-FSW" firstAttribute="top" secondItem="a9I-Py-ood" secondAttribute="bottom" constant="20" id="AOq-ZQ-GOx"/> <constraint firstItem="2gi-3C-glS" firstAttribute="centerX" secondItem="ZJC-3N-FSW" secondAttribute="centerX" id="D5g-8o-Dli"/> <constraint firstItem="8aP-uO-Gv1" firstAttribute="top" secondItem="Hfo-g0-YKF" secondAttribute="bottom" constant="20" id="NXu-vf-yno"/> <constraint firstItem="yfQ-6j-9OW" firstAttribute="top" secondItem="Gve-fy-fxm" secondAttribute="bottom" constant="20" id="bL4-YH-OeM"/> <constraint firstItem="2gi-3C-glS" firstAttribute="top" secondItem="ZJC-3N-FSW" secondAttribute="bottom" constant="20" id="ged-50-TRH"/> <constraint firstItem="yfQ-6j-9OW" firstAttribute="centerX" secondItem="2gi-3C-glS" secondAttribute="centerX" id="h1Z-mC-Pze"/> <constraint firstItem="Hfo-g0-YKF" firstAttribute="top" secondItem="2gi-3C-glS" secondAttribute="bottom" constant="20" id="imZ-Fo-MAp"/> <constraint firstItem="a9I-Py-ood" firstAttribute="centerX" secondItem="6Tk-OE-BBY" secondAttribute="centerX" id="ml0-Dr-L45"/> <constraint firstItem="ZJC-3N-FSW" firstAttribute="centerX" secondItem="6Tk-OE-BBY" secondAttribute="centerX" id="phk-Pg-kcg"/> <constraint firstItem="8aP-uO-Gv1" firstAttribute="leading" secondItem="6Tk-OE-BBY" secondAttribute="leading" constant="75" id="qB8-Yt-LJo"/> <constraint firstItem="Hfo-g0-YKF" firstAttribute="centerX" secondItem="2gi-3C-glS" secondAttribute="centerX" id="zyn-Se-vQM"/> </constraints> <viewLayoutGuide key="safeArea" id="6Tk-OE-BBY"/> </view> <navigationItem key="navigationItem" id="mPr-Q9-uJn"/> <connections> <outlet property="unreadIndicatorSwitch" destination="WTA-1U-pNL" id="K5f-JW-m7o"/> <outlet property="userTextField" destination="Gve-fy-fxm" id="saq-JH-RnV"/> </connections> </viewController> <placeholder placeholderIdentifier="IBFirstResponder" id="dkx-z0-nzr" sceneMemberID="firstResponder"/> </objects> <point key="canvasLocation" x="132" y="134"/> </scene> <!--Navigation Controller--> <scene sceneID="tq5-W9-tWT"> <objects> <navigationController id="8r8-z8-C9b" sceneMemberID="viewController"> <navigationBar key="navigationBar" contentMode="scaleToFill" insetsLayoutMarginsFromSafeArea="NO" id="L1G-ow-sYw"> <rect key="frame" x="0.0" y="0.0" width="375" height="44"/> <autoresizingMask key="autoresizingMask"/> </navigationBar> <connections> <segue destination="BYZ-38-t0r" kind="relationship" relationship="rootViewController" id="5Lt-gF-cYx"/> </connections> </navigationController> <placeholder placeholderIdentifier="IBFirstResponder" id="81a-d3-bar" userLabel="First Responder" sceneMemberID="firstResponder"/> </objects> <point key="canvasLocation" x="671" y="134"/> </scene> </scenes> </document>
2024-05-07T01:26:51.906118
https://example.com/article/1994
Looking to make a UWP application we will start by building first three pages of the UWP application Screens we will start with: login screen -user logins in here sign up screen - sign up for users Main page - what users sees after users logins Those are the screen we build first this part is really simple skills needed : C# /c++ programing visual studio uwp builder ... I need a developer of C# windows application,asp.net, MVC, MSSQL, AJAX, PHP, MYSQL, CSS, HTML, Bootstrap, Graphics Design to work on my project remotely as per my requirements. Candidate must have experience in any of my required developing language. Hello all, We are looking to automate some business process using custom developed web forms in Wordpress. Primary skills to deliver this project would include javascript, php, ajax, wordpress The solution requires the delivery of four modules. 1. Login page. 2. Parts and labor webform. Able to handle three processing permutations a. Standard fully populated form entered by users from sc... I need you to develop some software for me. I would like this software to be developed for Windows using PHP. This website is a popular YouTube, Facebook, Twitter and sound cloud downloader and more. It basically downloads videos and music from these popular sites in many popular formats. Sometimes the algorithms change from time to time on these popular websites and needs fixing. The site is bui... We want to develop an web application in PHP or CODE IGNATOR. The project description as follows. Application in following 4 major part 1. Lead management 2. Order management 3. Billing and payment management 4. Comprehensive reporting We have tiffins ( Lunch and Dinner) supply bussines. So we setup few companions from multiple marketing sources. We are getting phone calls of Enquiries. Such ... Looking for someone who is able to code an OAuth2 PHP script for Mac Access Authentication, reference: [adres URL ukryty - zaloguj się, aby zobaczyć] Note: It's not for my own server, in fact, its to login to another server requiring this login. I'd prefer for it to randomly generate the OAuth2 login as it's been done with C#. Should be a quick project for someone who knows PHP... Looking for an experienced developer who is capable of working with iOS and Android. I have a location-based application utilizing Google Maps that needs created. The iOS part is 80% done already. I've included what I believe are the requirements. REQUIREMENTS: HTML 5 C#/MS SQL 12 or PHP/MySQ2 Need an admin template with the ability to store user info as well as info for each check i... I have various projects that I would like work done from time to time. This pays hourly when you complete work for me and is ongoing. Most work is required to be completed locally on my machine using Teamviewer or similar. Please be available 16-20 hours per week. Please be prepared to demonstrate your proficiency. I am a developer and know my way around various IDE as well as code debugging. I wo... The web-based platform should allow user to register by entering their details on a website, administrators and teacher will validate them and add them to groups. Groups to have documents, videos and audios, be able to search them, be able to do multiple choice test and to record them, show statistics from different groups. The users should be able to upload audios and to enter a list of multi... Hello, I hired a freelancer to build a website for me, however, the freelancer was unable to complete the job. I believe they were in over their head. Therefore, I need someone to complete the project. We can either modify what has been created or take a different route altogether. Here is where I stand at the moment. 1.) The website is built using PHP using Hostgator as the host. The site curre... Project Description I am looking for someone who can create a new crytocurrency and put it on coinmarketcap and also on trading [adres URL ukryty - zaloguj się, aby zobaczyć] should be capable of premine option percentage for the genesis block for the [adres URL ukryty - zaloguj się, aby zobaczyć] project includes. 1. Creation of new cryptocurrency. 2. Creation of website to promote the cry... Hi Oguz C., I have a website project. It's now on Wordpress. I want to change it. But it seems impossible to change with WordPress only. It is necessary to change apparently PHP. I need to leave the site design and need some kind of admin area. What you need to do - the site is very slow when viewing the photo gallery. This is due to the fact that the site engine is incorrectly made. About the company Intrigue Solutions is a Software Development Agency that provides, you guessed it, software development and consulting services. We’re focused on not only getting the job done but getting the job done well and building our clients’ brand and reputation at the same time. We believe that our clients’ business is our business and that’s how it will be tre... We have a small php script that auhenticates with magento server using oAuth 1.0 and gets REST API response. It's a small demo script that connects to the API and returns a response, but I need to convert it so that we have it in c# (visual studio). This is just so we can test the webservice API from Windows. Maximum budget: 60 USD I have a small booking / calendar app in C# with a SQL Server backend. I need to make it web-based using Joomla, PHP, MySQL and JavaScript. I am experienced in Windows and database development, but my web development skills are limited. What I need is someone who can explain and demonstrate key concepts or methods of getting things done in a Web environment. Ideally, you have some familiarity with... I have Tradier api,this api is having code for php,curl,perl,Go, Ruby, Python code to call but I need this api to use in c# asp.net application So I want someone to convert this 5 to 10 lines of api call code in c# asp.net
2024-06-24T01:26:51.906118
https://example.com/article/2069
Quick Overview PASSTHROUGH DISHWASHER - PD1000 The PD1000 Premium range passthrough dishwasher is the perfect solution for the busy professional environment. This state of the art passthrough has a maximum…
2023-12-08T01:26:51.906118
https://example.com/article/2495
Wednesday, May 28, 2014 Wild Wonky Hem My plans for yesterday were turned around and mixed up BUT... I did get everything done that needed to be done and in particular finishing the jacket, errands, and cleaning. It's a good thing because today is coffee dates and packing. Oh... and I need to hem my jean - my last sewing project before I go. The jacket has buttons and button holes. You know you're committed when things get to that stage. In this picture, you can also see the piping around the front and collar. I've never piped an outside edge like this and... ... I wasn't quite sure how to end so I simply cut the strip and finished the edge with Fray Check. In a detail shot you can see every fussy bit but in real life - at a respectful distance - it looks okay. It's someplace to do more learning as is working with linen. It's so soft that I had trouble getting crisp corners and... ... finishing the edge of the facing may have created too strong of an edge because... ... it ended up with a wild wonky hem in the back. Millicent is still a bit smaller than me in the hips so maybe it'll "stretch" out on my body otherwise, I'll get some feedback at the retreat and perhaps fix that edge... if it's fixable. I'm wondering if I need to implement more stabilizing techniques when working with linen. That's something else to ask. AND... ... can you believe how many scraps are still left over? It amazes me when I aim for zero waste how it can go on and on. The scraps seem to breed in the night and extrapolate into a million pieces. I've packed these into a zip lock to take to the retreat. I'll use them as the start of a little girl twirl coat. Speaking of which... ... I added a pleat and a button to the sleeves of the twirl dress from March. I think it makes the sleeves more interesting especially as they're actually a three quarter sleeve and not the full length the pattern pretended to be. 3 comments: I'm looking forward to seeing the jacket on you. I would finish that piping off by tapering it into the seam, so the raw edge at the end is just inside the seam. Like the raw ends of home dec trims taper into the seam of a pillow. Clear as mud? I understand what you mean. I thought about that but wasn't sure how to end it nicely right at the corner. What I could do now though is - attempt - to pull it in with some stitching and make it look like I tapered it. Thanks. Myrna Giesbrecht Welcome. I love to sew... and knit... and read... and talk... a lot... and I love learning especially about creativity and about life. Please feel free to comment. I love the conversation and if you need to, you can email me privately at myrna (at) myrnagiesbrecht (dot) com. If you're wondering what the header is all about, read this posting. Thanks for visiting. - Myrna Translate Subscribe To Follow by Email Followers Permission If you would like to use an image from my blog, I would appreciate receiving credit and a link. In giving permission, I expect that the borrowed content is being used in a legal and positive manner. Thanks. itemeter.com/stats.asp?site=s14myrna" target="_top"&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;img border="0" alt="Site Meter" src="http://s14.sitemeter.com/meter.asp?site=s14myrna"/&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;a href="http://s14.sitemeter.com/stats.asp?site=s14myrna" target="_top"&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;img border="0" alt="Site Meter" src="http://s14.sitemeter.com/meter.asp?site=s14myrna"/&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;lt;/a&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;
2024-05-28T01:26:51.906118
https://example.com/article/5019
Since only I know I'm not trying to offend you, that's all I can say. I'm not sure I'm worthy of your being concerned either (I don't deserve it--I'd guess) You know, after we talked the other day, I felt better for a while. I don't know what to say, and I'm sure I'm embarrassed by this whole thing--most particularly how I've handled our relationship. I really want to see you, but I need some time to myself I guess. I do know glen doesn't have all the answers, but I find him to be impartial and helpful--really the only one these days. My mother suggested a trip home this weekend, and i may go. I wish this were easy.....I think part of my issue is I've always felt our friendship is one I wanted to keep always, and I feel I tend to jeopardize friendships.... "Lisa A. Schiffman" <lschiffm@JonesDay.com> on 12/15/2000 10:15:08 AM To: Jeffrey.A.Shankman@enron.com cc: Subject: Re: I'm so confused by you. Sorry about your week. Hopefully, since it's the weekend your week will only get better, but as for my part in it, if any, I'm losing patience. I don't know whether to be concerned about you or offended by you. It's increasingly difficult to be both. Since you don't call as much as to check in with me or respond to my calls, clearly you don't want to bother with me and aren't particularly concerned whether I'm ok or not, and I have to resist the urge to call and check on you because you are unresponsive and seemingly untruthful, so I feel foolish even trying. As a result, I'm leaning more and more toward the offended/annoyed side. Maybe Glen will have "all the answers" for you, but I don't think that's possible and I think you just need to accept it and move forward. It will all pass and you will be fine in the long run. Jeffrey.A.Shankman @enron.com To: lschiffm@JonesDay.com cc: Subject: Re: 12/15/00 09:38 AM I saw you called on the cell this a.m. Sorry I missed you. (I was in the shower). I have had a shitty week--I suspect my silence (not only to you, but others) after our phone call is a result of the week. I'm seeing Glen at 11:15....talk to you ========== The preceding e-mail message (including any attachments) contains information that may be confidential, be protected by the attorney-client or other applicable privileges, or constitute non-public information. It is intended to be conveyed only to the designated recipient(s). If you are not an intended recipient of this message, please notify the sender by replying to this message and then delete it from your system. Use, dissemination, distribution, or reproduction of this message by unintended recipients is not authorized and may be unlawful. ==========
2024-07-27T01:26:51.906118
https://example.com/article/3212
Vardan Militosyan Vardan Militosyan (, 8 June 1950 – 29 April 2015) was a Soviet Armenian former weightlifter. He was awarded the Honoured Master of Sports of the USSR title in 1976. Early life Born in Leninakan, Armenian SSR (now Gyumri, Armenia), a city famous for its world class weightlifters, Militosyan took up weightlifting in 1964 under the guidance of Hakob Faradzhyana and joined the Soviet national team in 1975. Career A year after joining the Soviet weightlifting team, Militosyan won a gold medal at the 1976 European Weightlifting Championships and a silver medal at the 1976 World Weightlifting Championships. Militosyan repeated his success in 1978, becoming a two-time European Champion. The Soviet team chose Militosyan to compete at the 1976 Summer Olympics, where he won an Olympic silver medal. Militosyan became the first weightlifter from Armenia to win an Olympic medal. He left the Soviet national team in 1979. Militosyan set four world records during his career, all in the clean and jerk. In 1980, Militosyan completed his weightlifting career after he was not selected to join the Soviet team at the 1980 Summer Olympics. He went on to work as a weightlifting coach in his native Armenia. Militosyan died on 29 April 2015 after prolonged illness. Personal life Militosyan was a cousin and teacher of fellow Soviet-Armenian Olympic weightlifting medalist Israel Militosyan. Ironically, Vardan was the first Soviet-Armenian to win an Olympic medal in weightlifting, and Israel was the last. References External links Vardan Militosyan at Lift Up Sports-Reference.com Category:1950 births Category:2015 deaths Category:Sportspeople from Gyumri Category:Armenian male weightlifters Category:Soviet male weightlifters Category:Honoured Masters of Sport of the USSR Category:Olympic weightlifters of the Soviet Union Category:Weightlifters at the 1976 Summer Olympics Category:Olympic silver medalists for the Soviet Union Category:Olympic medalists in weightlifting Category:Soviet Armenians Category:Medalists at the 1976 Summer Olympics
2023-11-12T01:26:51.906118
https://example.com/article/9362
Q: If I create my own DNS with a domain name how do I prevent somebody else from copying my DNS? For example, how does the internet prevent someone from creating their own DNS and creating a copy domain name of "www.google.com" directing traffic from the website on "www.google.com" to the copy DNS of "www.google.com"? A: The DNS namespace is delegated hierarchically: . (root) name servers delegates the control for .com which delegates the control for example.com etc. Of course recursive name servers may spoof the results. To prevent this, DNSSEC was invented. It allows signing of the records and is also hierarcical.
2024-03-16T01:26:51.906118
https://example.com/article/2479
This invention relates to a micro blood collection device and, more particularly, to a blood sampler cup having a removable vented top fitted with a capillary tube which delivers blood directly from a blood source to the cup. Recent advances in analytical instrumentation have made it possible to carry out a variety of hematological, chemical and toxicological diagnostic procedures on very small quantities of blood; thereby obviating the need to withdraw venous blood from patients. Instead the smaller quantities of blood conveniently obtained from capillary blood sources, such as from finger tip or ear lobe, may be used for diagnostic examination. In co-pending U.S. patent application Ser. No. 400,882, now Pat. No. 3,902,477 granted Sept. 2, 1975 there is described an improved container for collection and storage of capillary blood. Such container meets the requirements for the collection of minute quantities of capillary blood, safe storage thereof without contamination from airborn contaminants, and ready accessibility of the entire specimen when removal is desired. However, the container of that invention is slow to fill. The device of the present invention overcomes such disadvantage and permits obtaining blood samples by directing the blood flow below the upper lip of the cup. The cup can be filled to any desired amount, the normal range being 400-1200 microliters. The following prior art is pertinent but distinguishable from the device of the present invention: U.S. Pat. Nos. 3,813, 223 -- Fleck; 3,623,475 -- Sanz et al; 3,607,098 -- Strande; 3,545,932 -- Gifford; 3,742,934 -- Holbrook et al; 3,539,300 -- Stone; French 87,197 (1966) -- Goupil British 947,908 (1964) -- Flexible Metal Company, Limited Some of these patents have nothing to do with blood collection (U.S. Pat. Nos. 3,813,223 and 3,607,098). Others require venous pressure for the system to work (French 87,197 and British 947,908) in contrast to the present invention where the initial blood flow requires capillary action and continues to flow due to the force of gravity. There is no known disclosure in the prior art of the device covered in this application.
2024-02-19T01:26:51.906118
https://example.com/article/7299
Q: ORM Repository Pattern This is more of a question where I am looking for opinions. I am working on a project that uses both NHibernate and EntityFramework (this is by design, wanted flexibility). So, I went ahead and started working on a Repository pattern, but came across a slight dilemma. Basically, I wanted to know what you guys think about the following areas: Should the Repository be a singleton? - This will allow me to keep the sessions opened, but at the same time, I think it's going to keep connections opened to the database. For NHibernate, the ORM can only gurantee an objet is the same within the same session. This is ideal for easy coding, but there are definatly ways to overcome this using keys and overriding the GetHashCode and Equals methods. If it's not a singleton (or even if it is), should I be closing the connections as soon as they are used? For NHibernate, that means closing the session each time the Repository is "Disposed", which is after every use. Have you implemented a Repository pattern for either NHibernate or EF 4.0 and found any useful ideas? A: Don't code the creation of singletons yourself (ie the singleton pattern itself), use an IOC framework like StructureMap to handle the Lifecycle management of objects. This we can't answer. If it's singleton it must be thread safe in regards to the resources it manages internally (like a connection pool of DB live connections). Threadsafe code isn't trivial. This we can't answer. It depends on how you act with your model. It also depends whether you want people to be able to read through a DataReader which requires an active connection to the database. This also affects things like lazy loading which requires active sessions which becomes a nightmare with databinding. Here's everything I've come up with in regards to creating a repository pattern for NH: Creating a common generic and extensible NHiberate Repository version 2
2024-04-05T01:26:51.906118
https://example.com/article/1809
//===-- TargetInfo/AMDGPUTargetInfo.cpp - TargetInfo for AMDGPU -----------===// // // The LLVM Compiler Infrastructure // // This file is distributed under the University of Illinois Open Source // License. See LICENSE.TXT for details. // //===----------------------------------------------------------------------===// // /// \file // //===----------------------------------------------------------------------===// #include "AMDGPUTargetMachine.h" #include "llvm/Support/TargetRegistry.h" using namespace llvm; /// \brief The target for the AMDGPU backend Target llvm::TheAMDGPUTarget; /// \brief Extern function to initialize the targets for the AMDGPU backend extern "C" void LLVMInitializeR600TargetInfo() { RegisterTarget<Triple::r600, false> R600(TheAMDGPUTarget, "r600", "AMD GPUs HD2XXX-HD6XXX"); }
2023-12-15T01:26:51.906118
https://example.com/article/6899
--- name: cljs.analyzer.api/find-ns see also: --- ## Summary ## Details ## Examples
2024-05-04T01:26:51.906118
https://example.com/article/7544
Custom Luggage Tags With Personal imprint Your customers and clients will never have to worry about losing their luggage when they travel when you provide them with an imprinted Bag Tag from our line of customized Travel Gifts. Our Bag Tags come in dozens of shapes and styles. Each one can be imprinted with the name and logo of your business on one side. The other side has a place for the receiver to fill in his or her personal tracking information. Bag Tags make the perfect giveaway and business advertisement for people who travel often, including salesmen and corporate executives. The more your Bag Tags travel with your customers, the further your business' name will be spread around the world!
2024-03-26T01:26:51.906118
https://example.com/article/9541
## ## es6-features -- ECMAScript 6 Feature Overview & Comparison ## Copyright (c) 2015-2017 Ralf S. Engelschall <rse@engelschall.com> ## ## Permission is hereby granted, free of charge, to any person obtaining ## a copy of this software and associated documentation files (the ## "Software"), to deal in the Software without restriction, including ## without limitation the rights to use, copy, modify, merge, publish, ## distribute, sublicense, and/or sell copies of the Software, and to ## permit persons to whom the Software is furnished to do so, subject to ## the following conditions: ## ## The above copyright notice and this permission notice shall be included ## in all copies or substantial portions of the Software. ## ## THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, ## EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF ## MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. ## IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY ## CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, ## TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE ## SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ## NPM = npm GRUNT = ./node_modules/grunt-cli/bin/grunt all: build bootstrap: @if [ ! -x $(GRUNT) ]; then $(NPM) install; fi build: bootstrap @$(GRUNT) @sh convert.sh clean: bootstrap @$(GRUNT) clean:clean distclean: bootstrap @$(GRUNT) clean:clean clean:distclean
2023-08-20T01:26:51.906118
https://example.com/article/2081
Packer rolls dice while reaching for Star Date: May 10 2012 Ian Verrender DEPENDING on which side of the fence you sit, gambling either is one of the great scourges of modern life or a fabulous means by which to earn a fortune. Either way, it has the capacity to disrupt the routine and force a sudden and unexpected change to the status quo. James Packer's interest in Sydney's casino, The Star, has managed to do just that in the two industries in which he operates - gaming and media - as he attempts to increase his interest in the former and simultaneously back away from the latter. Packer's Crown has increased its stake in Echo Entertainment - the company that owns and runs The Star in Sydney and Jupiters in Queensland - to 10 per cent, the maximum allowable under Echo's constitution, and has applied to the authority for permission to move beyond that. Therein lies the problem: how to achieve that end. While investment bankers and stockbrokers have been salivating at the prospect of a takeover bid for Echo, the more likely scenario would be that Packer simply will push for a board spill. It is believed Packer has continued to ''borrow'' stock in Echo in a complex financial transaction that means he is not required to disclose his interest. If correct, that would allow him to cement a dominant position in the casino operator should he be granted permission to move beyond the threshold. As the company's biggest shareholder, he would then be justified in demanding extra seats on the board in a move that would deliver effective control. Packer's father, Kerry, was fond of the strategy, given it delivers control at minimal expense. But it can be fraught with difficulties, particularly when a large percentage of retail shareholders sit on the register. In the case of Echo, institutions account for about 75 per cent of the issued capital. That leaves 25 per cent in the hands of retail investors, enough to block a hostile bid and possibly enough to frustrate an attempt to wrest board control in a shareholder vote. Working in Packer's favour is that a large proportion of those small investors are disengaged from Echo, having inherited their shares through the corporate split with Tabcorp. Add to that the general investor inertia when it comes to voting and Crown may get a board spill across the line. The Star has been a hotbed of controversial allegations about sexual impropriety and lax standards within the new management, which opened the door for Crown's predatory advances. That culminated in a surprise plan in March to build a new $1 billion casino - utilising The Star's monopoly casino licence and Echo's balance sheet - in the Barangaroo precinct on Sydney Harbour. Packer's best bet for convincing shareholders of the need for a shift in board control, should he be allowed to lift his stake, would be for a damning conclusion to an inquiry under way. Aligned with Packer's ambitions to further his gaming interests has been his reported desire to exit his investment in pay television. Packer has been stunningly on the money in terms of his media plays in the past six years. He sold out of the Nine Network at the top of the market, reaping more than $5 billion, bought back into Ten Network for nickels and dimes when the industry was on its knees and now wants out of Foxtel. In 2009, Kerry Stokes launched a raid on Packer's sole remaining media asset, Consolidated Media Holdings, snapping a 24 per cent stake in the company that holds a quarter-share in Foxtel and a half-share in Fox Sports. A truce finally was called, with Stokes gaining board representation. While Stokes would be the obvious buyer of Packer's 50.1 per cent share of the company, the usual rumours have been floated of competition for the stake, including Telstra. There's no doubt Telstra would be on the lookout for acquisitions. Courtesy of the federal government's broadband policy, it will receive $11 billion for handing over its landline hardware and customers to the NBN. As a pure retailer of telecommunications, it will be hunting for content to send down those fibre-optic cables. Given it dominates pay television, it is more likely to seek other news and entertainment outlets, such as Fairfax Media, owner of this newspaper. Now valued at $1.65 billion, Fairfax has been restructuring to adapt to the new digital world after watching its classified advertising monopoly disappear down the internet. A decade ago, Telstra chairman Bob Mansfield tried to engineer a merger with the media group, only to be rebuffed by his own board, which eventually cost him his job. This material is subject to copyright and any unauthorised use, copying or mirroring is prohibited.
2024-07-03T01:26:51.906118
https://example.com/article/9428
Q: Trying to build a bot that listens for it's own name to be tagged I've been playing with the reddit API and I'd really like to make a bot that listens for someone to tag it in a comment, and then responds with a comment. I've been looking through the docs here but haven't found what I'm looking for. I've seen other bots do this in the past so I feel it must be possible. If someone could point me in the right direction I'd really appreciate it. Cheers. A: If you use PRAW (Python Reddit API Wrapper), then you can use the redditor.inbox class to track "mentions". http://praw.readthedocs.io/en/latest/code_overview/reddit/inbox.html?highlight=Mentions Otherwise, AFAIK mentions are just another item in your inbox. https://reddit.com/r/redditscripting
2024-07-26T01:26:51.906118
https://example.com/article/9969
Dean of Killala The Dean of Killala is based at the Cathedral Church of St Patrick, Killala in the Diocese of Killala within the united bishopric of Tuam, Killala and Achonry of the Church of Ireland. The Cathedral Church of St Crumnathy, Achonry, was closed in 1997. The Chapters of Killala & Achonry were amalgamated in 2013; The Cathedral of St Patrick, Killala, becoming also the diocesan Cathedral of Achonry. The Dean of Killala is the Very Revd Alistair Grimason, also Dean of Tuam. List of Deans of Killala 1613: William Flanagan 1628/9–1635: William Buchanan (afterwards Dean of Achonry, 1635) 1635: Robert Forgie 1664: Henry Dodwell 1674: Alexander Murray 1701–1718: Francis Knapp 1718–1724: Jonathan Smedley (afterwards Dean of Clogher, 1724) 1724–?1741: Peter Maturin (died 1741) 1741–1770: Theophilus Brocas 1770–1795: John Brocas 1795: Thomas Vesey Dawson 1796–1799: Thomas Thompson 1800–1805: Walter Blake Kirwan 1806–1817: Edmund Burton 1817–1844: Hon George Saunders Gore 1844–1871: James Collins 1871–1885: William Jackson 1885–1903: William Skipton 1903–?1904: William Oliver Jackson (died 1904) 1904–?1911: C. Ormsby Wiley 1911–?1915: George Henry Croly 1915–1927: Theophilus Patrick Landey 1928–>: William Colvin >1963–? Herbert Friedrich Friess (died 1997) ?–?1975 John Ernest Leeman (died 1975) 1976–1979: John Henry Hodgins 1979–1989: Malcolm Frederick Graham 1989–2003: Edward George Ardis 2003–2007: Sue Patterson 2007–2012: vacant 2012–2013: Wendy Mary Callan 2013-present: Alistair Grimason References Category:Diocese of Tuam, Killala and Achonry Killala
2024-02-09T01:26:51.906118
https://example.com/article/7333
Q: Using Automapper to map an objects list I have an object (ProductModel) that has a nested list of images. I am trying to simplify the model (Product) that has this list as its property. I am using Automapper, but I can not seem to get the mapping configuration right. I viewed several other posts, but they seem to be a little different than what I am trying to achieve. // Map to: public class Product { public List<Image> Images { get; set; } } public class Image { public string url { get; set; } } // Map from: public class ProductModel { public ImageSet ImageSet { get; set; } } public class ImageSet { public List<ImageDetail> ImageDetails { get; set; } } public class ImageDetail { public string Url { get; set; } } A: The following configuration should work: var config = new MapperConfiguration(cfg => { cfg.CreateMap<ImageDetail, Image>(); cfg.CreateMap<ProductModel, Product>() .ForMember(dest => dest.Images, opt => opt.MapFrom(src => src.ImageSet.ImageDetails)) ; });
2023-12-31T01:26:51.906118
https://example.com/article/9929
Omeprazole induces apoptosis in jurkat cells. We report for the first time a potent apoptotic effect of omeprazole (OM). Apoptosis was induced in Jurkat cells in a time and concentration-dependent mode. Caspase 3 and PARP were rapidly cleaved in response to OM, but apoptosis was only partially inhibited by the caspase 3 inhibitor DEVD-CHO. OM also induced an early lysosomal destabilization which increased progressively and was correlated with a parallel increase in apoptotic cells. The cysteine protease inhibitor E64d gave strong protection against apoptosis thus proving the involvement of lysosomal enzymes in OM-induced apoptosis whereas, it did not impede the caspase 3 cleavage. Instead ZVAD-fmk, a general caspase inhibitor, also able to inhibit cathepsin activity, protected cells completely from OM-induced apoptosis. It therefore seems that both caspases and cysteine cathepsins are involved in the execution stage of OM-induced apoptosis.
2023-08-16T01:26:51.906118
https://example.com/article/1720
From medical history and biochemical tests to presymptomatic treatment in a large MEN 2A family. An extensive study was published in 1959 in the Netherlands on a large family, which initially attracted attention because of a family history of attacks of shaking. Clinical investigation revealed phaeochromocytomas in four family members. In 1975, the family was identified to be a MEN 2A family, and since then, the members were examined annually using measurement of catecholamine metabolites in 24-h excreted urine and C-cell stimulation tests. In 1993, the RET proto-oncogene on chromosome 10q11 was found to be associated with MEN 2A and a specific mutation in this gene was identified in the family. In this family, 32 MEN 2A patients were detected. Since screening started in 1975, no patient died of phaeochromocytoma; however, two patients died of metastasized medullary thyroid carcinoma (MTC) (mean age 46 years). Twelve patients were operated on for phaeochromocytoma, and 13 for MTC. The results of DNA-analysis revealed the failures of the biochemical tests to identify affected family members. Six disease gene carriers with normal C-cell stimulation test results appeared to have small multifocal MTCs. Two carriers with normal excretion levels of catecholamines had a small phaeochromocytoma. DNA-analysis enables the unambiguous diagnosis of MEN 2A gene carrier-ship, allowing presymptomatic surgery for MTC.
2023-10-28T01:26:51.906118
https://example.com/article/8474
In a small bowl, combine cornstarch and remaining sugar; stir in cream and wine or grape juice until smooth. Gradually add to plum mixture until blended. Bring to a boil; cook and stir for 2 minutes or until thickened, stirring constantly. Remove from the heat; discard cinnamon stick. Stir in the sour cream, creme de cassis or cranberry-raspberry juice and lemon juice. Strain half of the soup through a fine mesh strainer over a 1-1/2-qt. bowl. Repeat. Stir in lemon peel. Cover and refrigerate overnight. Garnish with sour cream if desired.Yield: 13 servings (2-1/2 quarts).
2023-12-09T01:26:51.906118
https://example.com/article/2812
African Women in Leadership Conference is for Women who are aspiring to be more; who seek to improve themselves in career and personal lives. And hope to meet with peers in their industry; to maximize opportunities, be challenged and aspire for global relevance. What is it About? It is a Movement for African Women’s Relevance Indeed, there is strength in numbers, and African Women in Leadership Conference is women, teaming up, forming a force, in one voice, and initiating a movement. They are improving themselves, and creating opportunities for themselves. Working together, and creating solutions for Africa. It is a movement of African Women’s relevance. To Engage Decision Makers We don’t want to hope for the right policies and opportunities as women. African Women in Leadership Conference is an Engagement point for Stakeholders; to brainstorm, deliberate and join forces in AFrican Women’s Development. This is where we engage key decision makers such as Business Owners, Heads of Government, Policy Makers, Institutions and Government Agencies to propagate the right agenda to favor women’s leadership. Why We Also Engage with Stakeholders There are tons of opportunities out there, and African Women in Leadership Conference beams the light on them. Opportunities for personal development, Opportunities to maximize for business and professional growth. AWLC is a global pedestal for networking with peers and mentors, and maximizing opportunities to showcase our businesses and competencies. What’s not to look forward to This year’s African Women in Leadership Conference opens with a reception on the 19th of July in honor of the Vice President of Liberia; Chief Dr. Jewel Howard-Taylor, a member of African Women in Leadership Organisation. This is a major milestone for AWLO; producing a female leader in that capacity. There is also a Women in Male Dominated Sectors Symposium to interface with stakeholders and spark up conversation in this area. To explore the Unique needs of the Terrain, how to forge a career and future in a male Dominated Sector, the needs of young leaders versus the realities and how to bridge the gap, Building relationships with Sector Leaders, and examining the unique Problems faced by women and proposed solutions. Asides from bonding moments, our speakers are policy makers, outstanding professionals, innovators, from all over Africa and the diaspora. We are going to engage in enlightening conversations and create opportunities for women to excel through Learning sessions and networking. The final stop for the AWLO Next Generation Female Leaders (NGFL) Roundtable to count down to African Women in Leadership Conference was held in Lagos Nigeria. It was hosted by PR Expert Mrs. Nkechi Ali-Balogun. One gets the sense of a strong, opinionated and determined personality from Mrs. Nkechi just by meeting her. She Challenged the girls to be Resilient Leaders narrating her unstoppable journey. One that is identifiable in her strides and accolades. She overdoes; is zealous and tireless. In her words, “When I retire I don’t want to be like one of those old people reading newspapers” With no exaggeration, the gap between the older and younger generation can no longer be denied; young women do not have the guidance and mentorship of female leaders due to this disconnect. It was further established when Mrs. Nkechi asked the ladies if they had access to female leaders in Nigeria which the answer came back in the negative. The girls who were fascinated; were eager to learn how this fascinating figure balances her work and family. She is proud to be identified as mother wife, and leader. She stated how those two parts of her life are different and how she balances both by not mixing them. “I don’t want things handed down to me, I want to earn it. Women need not anyone to validate themselves” She was impressed by the quality of the next generation female leaders and is willing to open more doors for them beginning from inviting them to the NECCI Roundtable she’s organizing which will have in attendance mentors such as Oby Ezekwesili, RMD, Ibukun Awosika, Adebola Williams, lanre Olusola and others. Mrs. Ali-Balogun who is the Lead consultant of NECCI Ltd had wise and encouraging words on being a resilient Leader who never gets tired with examples from her life experiences. She highlighted the importance of girls owning and being confident in themselves and their vision in life. There is need for the ladies to understand their vision and arm themselves with the skills needed to achieve that vision. “Hold your head high and stop looking for favors” she said. “Being a female does not mean you are less than the male“. She believes in the equality of the sexes and encouraged the ladies to work as hard She stressed on the need for the ladies to be decisive, that nobody takes an indecisive leader seriously and indecision affects your dream and vision. “Decide on the path of glory and stand by it.” she concluded. As a Leader, to her, a good leader is one who “grows peers and not slaves” and one who “develops people she can be proud of”. When questioned on – betrayal after investing in people, she said; “Don’t ever feel bad that you invested in people. Don’t feel bad even when people betray you”, that she is a staunch believer in investing in people. She believes that it is better to invest time and money in people which she says is more valuable investment than riches. AWLO’s Founder Dr. Elisha Attai also expressed his pleasure at the exceptional things the ladies are doing to better their communities. He expressed how the apparent disconnect between the old and young generation led to AWLO’s decision to bridge this gap and also create a platform that would initiate this process. He said this would not be the end of AWLO’s journey with the ladies and promised that it would indeed bridge the gap; as this became an eye-opener to opportunities and expectations of young women. AWLO hopes to include the young women in their Leadership Education Program; to grow their capacity to get funding for their initiatives as many of them expressed how a lack of funding has been a major downer. AWLO Lagos State Chapter was represented by Mrs. Annie Essienette; an executive at IBM, who also contributed her business advice. She stressed the need for the girls to display due diligence in business by counting their cost, identifying needs, and having more than just ‘plan A’. The Young Leaders are gearing up to attend the AWLO’s 10th Anniversary Conference; then Annual African Women in Leadership Conference which they have received their Free all-access pass. The Conference is a solution to the gap in women’s leadership in Africa. AWLO has initiated a movement that changes the narrative in women’s leadership in Africa through capacity building, and engaging stakeholders in the initiation of solutions to involve more women in leadership. This year’s African Women in Leadership Conference opens with a reception on the 19th of July in honor of the Vice President of Liberia; Chief Dr. Jewel Howard-Taylor, a member of African Women in Leadership Organisation. This is a major milestone for AWLO; producing a female leader in that capacity. This will be followed by the 2 days Conference that converges women of African Descent for leadership development. Not only does it provide women a platform to network but to brainstorm for personal development. It’s a case of ‘birds of a feather flock together’. Whereas it is important to talk about women forming think-tanks and support systems, it is more important to have them actually do it. Women getting involved in creating opportunities for themselves. This is not a group of wailers, but women bringing their own seat to the table. Asides from bonding moments, our speakers are policy makers, outstanding professionals, innovators, from all over Africa and the diaspora. We are going to engage in enlightening conversations and create opportunities for women to excel through Learning sessions and networking. One of the high points of this event is the unveiling and decoration of ‘100 Amazons’ a compendium of women who have risen above the setbacks that beset women in Africa to become shining examples in their field. African Women in Leadership Conference also inspires ‘the African Movement’ and will feature Exhibitions by indigenous brands and an African fashion Show headlined by the Nigerian Brand Kiks Place. The next generation female leaders in Port Harcourt were treated to relatable conversations at a little cozy restaurant by their Host Mrs. Manuela Izunwa. The Next Generation Female Leaders Roundtable is AWLO’s efforts to bridge the gap of leadership to the next generation. This exemplifies a true taste of leadership. Leading not from high-rise buildings but creating an avenue for those who are being led to glean from their leader in a relatable environment. Our Leaders are our guiding light to enable us to live up to our full potential. Those who are not laxed about replicating more leaders. Mrs. Manuela Izunwa is a true embodiment of this leadership expectation. Mrs. Manuela Izunwa From her background as the convener of Women in Leadership Conference, and Founder of Girls Organisation for Leadership Development this was not new to her. She warmed up to the girls as if she had known them prior to this time. She was as open as possible in sharing personal lessons from her life. From dealing with her body-image as a plus size woman when she was starting out in her career to overcoming it to be able to realize her full potential. She encouraged the young leaders to overcome self-doubt and not live in the shadow of people’s opinion; to be able to live up to their full potential. In the age of cyber-bullying and bullying generally some of the ladies attested to being discouraged by people’s backlash. One of the ladies Ms. Beauty Martins a 21 year-old Student, TedX Licensee and Tyre Recycler told her story of having a hard time penetrating her industry as a tyre recycler. She was met with a hard time dealing with men who dominate the industry and rejection in some cases where they bluntly refused to work with her because of her gender. Mrs. Izunwa also weighed in using herself as a case-study while she served as the Commissioner of Women Affairs in Rivers State Nigeria. She said that women had no need to prove themselves, as is it mostly the case being in a male dominated sector. She further explained that it is not realistic to want to give 50-50 attention to work and family, but rather to strive for spending quality time with family and friends. The Founder of African Women in Leadership Organisation Dr Elisha Attai also gave a male perspective to issues such as women being sabotaged especially in cases where the legitimacy of their career success is being questioned. Dr. Elisha Attai He encouraged women to keep excelling in spite of naysayers. That at that point it would be beyond requesting for a 35% or 50% affirmative action but their works duly speaking for them and more women earning opportunities as opposed to fulfilling a quota. He also encouraged women to form allies, to network, and bond so that they’ll to begin to reap from their relationship. In his words ‘You have to connect to collect’. R-L: Mrs Eno Davies, Mrs Uzor, Ms. Ekemini Akpakpan The AWLO Rivers State Chapter was also duly represented by their Chapter Secretary and Publicity Secretary; Mrs. Eno Davies and Mrs. Uzor. The Chapter Secretary piqued interest in Hetty Coconut World; Ms. Henrietta Nwanji’s Coconut-Shell recycling business. Ms. Henrietta makes bespoke jewelry from coconut shells and was offered a funding of one Hundred Thousand Naira to help her take her business to the next level which she said she needed to enable her acquire equipment to increase her efficiency. Ms. Ekemini Akpakpan AWLO is working on creating more sustainable opportunities for the Next Generation Female Leaders. The GM, Ms. Ekemini Akpakpan who coordinated the project, assured the ladies of opportunities to come for personal development and business growth, as it is one of AWLO’s goals to channel the leadership potential of young women which she is a product of. The Young Leaders are gearing up to attend the AWLO’s 10th Anniversary Conference; then Annual African Women in Leadership Conference which they have received their Free all-access pass. The Conference is a solution to the gap in women’s leadership in Africa. AWLO has initiated a movement that changes the narrative in women’s leadership in Africa through capacity building, and engaging stakeholders in the initiation of solutions to involve more women in leadership. This year’s African Women in Leadership Conference opens with a reception on the 19th of July in honor of the Vice President of Liberia; Chief Dr. Jewel Howard-Taylor, a member of African Women in Leadership Organisation. This is a major milestone for AWLO; producing a female leader in that capacity. This will be followed by the 2 days Conference that converges women of African Descent for leadership development. Not only does it provide women a platform to network but to brainstorm for personal development. It’s a case of ‘birds of a feather flock together’. Whereas it is important to talk about women forming think-tanks and support systems, it is more important to have them actually do it. Women getting involved in creating opportunities for themselves. This is not a group of wailers, but women bringing their own seat to the table. Asides from bonding moments, our speakers are policy makers, outstanding professionals, innovators, from all over Africa and the diaspora. We are going to engage in enlightening conversations and create opportunities for women to excel through Learning sessions and networking. One of the high points of this event is the unveiling and decoration of ‘100 Amazons’ a compendium of women who have risen above the setbacks that beset women in Africa to become shining examples in their field. African Women in Leadership Conference also inspires ‘the African Movement’ and will feature Exhibitions by indigenous brands and an African fashion Show headlined by the Nigerian Brand Kiks Place. See Pictures from NGFL Roundtable Port Harourt Privacy Settings We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
2023-11-23T01:26:51.906118
https://example.com/article/3536
1. Introduction {#s0005} =============== The increase in Ca^2+^ concentration during ischemia causes activation of calpains (Calpn) [@bib1]. Calpn activation results in protein degradation and cell death [@bib2], [@bib3]. Calpn activation has been well studied in normal and ischemic cardiomyocytes [@bib1], [@bib4]. Cells at the ischemic infarct edge, which have undergone partial ischemia are also vulnerable to remodeling [@bib5]. Due to impaired intracellular Ca^2+^ homeostasis, such cells are predisposed to death following reperfusion [@bib6]. Interestingly, cardiomyocyte proliferation and progenitor cell recruitment has been observed in the cardiac infarct border zone [@bib7]. Calpastatin (Calp) is the most efficient and specific Calpn inhibitor present *in vivo* [@bib8], [@bib9], [@bib10]. Calp along with its putative homolog high molecular weight calmodulin-binding protein (HMWCaMBP) regulate Calpn inhibition [@bib11], [@bib12], [@bib13], [@bib14], [@bib15] and may reduce I/R injury in heart [@bib16], [@bib17]. Among the proteins proteolysed by Calpn, calcineurin (CaN) is known to regulate cardiac hypertrophy and remodeling and has been implicated in both cell death and survival following reperfusion [@bib18], [@bib19], [@bib20]. CaN is a heterodimer consisting of 19- and 57-59- kDa subunits which are referred to as CaNβ and CaNα, respectively [@bib21], [@bib22], [@bib23]. The CaNα subunit has low endogenous phosphatase activity and requires Ca^2+^, calmodulin (CaM) and CaNβ for full activity [@bib24]. CaN activation during ischemia occurs due to elevated Calpn levels [@bib13], [@bib25], [@bib26], [@bib27] which has been demonstrated through *in vitro* proteolytic degradation [@bib28] or via the cleavage of the endogenous calcineurin inhibitor cain/cabin1 [@bib29]. Recent studies propose that ischemia induced activation of CaN leads to further increase in cytosolic Ca^2+^ levels, which further activates Calpn during reperfusion [@bib30]. This putative feedback mechanism can influence CaN--Calpn signaling in cardiomyocytes following ischemia and reperfusion (I/R) [@bib1], [@bib26]. Interestingly, the CaM-dependent phosphatase activity of CaN is stimulated by the 70 kDa heat-shock protein (Hsp70) in cardiac muscle and thus provides an on/off switch for the regulation of CaN signaling by Hsp70 [@bib31]. CaN--Hsp70 signaling results in the activation of NFAT which affects apoptosis, development and cellular adaptation in cardiac cells [@bib31], [@bib32], [@bib33]. The importance of CaN--Hsp70 interaction lies with downstream effectors such as NFAT and GATA-4, which are important in cardiac remodeling and regeneration [@bib34], [@bib35], [@bib36]. Recently, Hsp90, another heat-shock protein, has generated attention due to its cardiac protective role in I/R induced injury [@bib37], [@bib38], [@bib39], [@bib40], [@bib41]. In septic mice models, Calpn induces caspase-3 activation and apoptosis via the activation of the Hsp90/Akt pathway [@bib42]; however, this activation can also promote CaN recruitment to prevent apoptosis [@bib43], [@bib44]. Hsp90 also plays an important role in regulating Calpn-1 through specific interactions and associations at the functional sites. Nevertheless, Hsp90 can get degraded in concentrations higher than equimolar levels of Calpn [@bib45]. Though both Hsp70 and Hsp90 are molecular chaperones [@bib46] and appear to have cardioprotective properties, several differences exist especially at mRNA induction during I/R [@bib47], [@bib48], [@bib49], [@bib50], [@bib51]. The interaction and the relevance of Hsp70 and Hsp90 in I/R with respect to Calpn-regulated proteins like CaN and Calp remains vague. The current study aims to reveal the underlying interplay of CaN, Calp, Hsp70 and Hsp90 during ischemia and subsequent reperfusion using flow cytometric analysis (FACS). The expression level of ubiquitous cardiac protein sarcomeric actin (SarcAct) has been also studied as a control. 2. Methodology {#s0010} ============== 2.1. Cells {#s0015} ---------- Neonatal murine cardiomyocyte culture (NMCC -- primary cultures derived from isolated murine heart) was used for studying the induced I/R injury. CD-1 Swiss albino mice pups (2--6- day old) were sacrificed, in accordance to the norms provided by the Institutional Animal Ethics Committee, University of Saskatchewan. The hearts were instantly extracted, processed and cultured on 0.02% gelatin-precoated cell culture flasks, based on protocols previously described [@bib52], [@bib53]. The primary cultures were sustained till the cultures attained \~80% and following which I/R injury was induced in cell cultures. 2.2. I/R injury induction {#s0020} ------------------------- The media in NMCC cultures (\~80% confluent) was replaced 24 h preceding induction. Ischemic conditions were induced by replacing the standard growth media with a nutrient deficient buffer (NDB). The NDB contains 136 mM NaCl, 5 mM KCl, 1 mM CaCl~2~, 0.5 mM MgCl~2~·7H~2~O and 5.5 mM HEPES (pH 6.8) and therefore provides no nutrition and minimal buffering to the cells [@bib54]. For inducing ischemia in NMCC, glucose and FCS were added to NDB to obtain a final concentration of 5 mM and 2%, respectively to provide basic minimal nutrition [@bib55]. Consecutively, reperfusion was performed by switching NDB with standard growth media [@bib54], [@bib55], [@bib56]. In addition, to emulate the oxidative stress in cardiomyocytes observed *in vivo* during reperfusion, hydrogen peroxide (H~2~O~2~) was added to the standard growth media (1 mM final concentration) [@bib54], [@bib55]. The methodology was performed as per a previously published protocol [@bib13], [@bib14]. 2.3. Assessment of protein expression and viability {#s0025} --------------------------------------------------- The concurrent assessment of protein expression in normal (untreated), ischemic and reperfused cardiomyocytes along with viability was performed by FACS based on a methodology carried out as per a previously published protocol [@bib13], [@bib14]. Briefly, the assay of live versus dead cells was used to assess viability following induction and compared to control cells. The assay was performed simultaneously with FACS analysis using 7-amino-actinomycin D (7-AAD) [@bib57]. As suggested by the manufacturer, 7-AAD staining solution in DPBS (\~0.25 μg/10^6^ cells) was incubated with control, ischemia and reperfusion induced cells for 10 min at room temperature in the dark. The cells were washed twice with DPBS and dislodging for FACS. The ideal I/R injury induction was determined by inducing the cells at different parameters (ischemia induction -- 1, 2 and 4 h; reperfusion induction following ischemia -- 1 and 2 h). The induced cells along with control cells were stained with 7-AAD and dislodged by trypsinization. The cell suspension was immediately used for FACS to quantify live and dead cells in the control and induced population. A tabulation of antibodies along with the dilutions used are provided in [Supplementary Table 1](#s0055). 2.4. Statistical analysis {#s0030} ------------------------- Statistical analysis on the data obtained from the various assays was performed using ANOVA (Sigma Plot version 10 software package). The significance level of ≤0.05 is represented as \* to indicate significant differences. 3. Results and discussion {#s0035} ========================= The triple staining was performed by concurrently staining two proteins with specific antibodies tagged with fluorophore (FITC and PE, respectively) along with a live--dead assay of analyzed cells with 7-AAD. The analysis elucidated the expression of various cardiac proteins in both live and dead cells present in control and I/R treated cardiomyocyte cultures. This differentiation quantified cells which survived I/R injury and determined the important proteins expressed in cells [@bib13], [@bib14]. In the present study, the interaction of Hsp70 and Hsp90 with respect to CaN ([Figs. 1](#f0005){ref-type="fig"} and [2](#f0010){ref-type="fig"}) was compared to Calp ([Supplementary Figs. 1 and 2](#s0055)). The expression levels (as percentages and fold levels) were also compared in a control protein which is ubiquitously expressed (SarcAct) ([Fig. 3](#f0015){ref-type="fig"}, [Supplementary Figs. 3 and 4](#s0055)).Fig. 1(A)--(C) Representative FACS analysis data of NMCC following I/R induction along with live--dead assay. In the horizontal axis FITC labeled anti-CaN antibodies and for vertical axis PE labeled antibodies against Hsp70 were detected. Rest of the figures in the panel are derived from the quadrants of (A)--(C) and demonstrate the live--dead assay using 7-AAD. The studied conditions were; normal untreated NMCC (A); NMCC maintained in nutrient deficient buffer (ischemia induction) for 2 h (B); NMCC grown for 2 h in standard growth media containing 1 mM H~2~O~2~ subsequent to 2 h of ischemia induction (reperfusion induction) (C). (D) Histographical representation of comparative protein expression in ischemia and reperfusion induced NMCC with those of normal untreated NMCC within stained quadrants (Q1 -- Hsp70; Q2 -- Hsp70+CaN; Q3 -- CaN) represented as fold level change (*n*=5). The fold level changes (increase or decrease) of protein expressing NMCC in each quadrant has been represented and significant values (*p*-value\<0.05) denoted as **\***. Standard error was calculated and represented as error bars. (E) Fold level changes in ischemia and reperfusion induced protein expression in NMCC within stained quadrants (Q1--Q3) in comparison with control cells (*n*=5) represented as a table.Fig. 1Fig. 2(A)--(C) Representative FACS analysis data of NMCC following I/R induction along with live--dead assay. In the horizontal axis FITC labeled anti-CaN antibodies and for vertical axis PE labeled antibodies against Hsp90 were detected. Rest of the figures in the panel are derived from the quadrants of (A)--(C) and demonstrate the live--dead assay using 7-AAD. The studied conditions were; normal untreated NMCC (A); NMCC maintained in nutrient deficient buffer (ischemia induction) for 2 h (B); NMCC grown for 2 h in standard growth media containing 1 mM H~2~O~2~ subsequent to 2 h of ischemia induction (reperfusion induction) (C). (D) Histographical representation of comparative protein expression in ischemia and reperfusion induced NMCC with those of normal untreated NMCC within stained quadrants (Q1 -- Hsp90; Q2 -- Hsp90+CaN; Q3 -- CaN) represented as fold level change (*n*=5). The fold level changes (increase or decrease) of protein expressing NMCC in each quadrant has been represented and significant values (*p-* value\<0.05) denoted as **\***. Standard error was calculated and represented as error bars. (E) Fold level changes in ischemia and reperfusion induced protein expression in NMCC within stained quadrants (Q1--Q3) in comparison with control cells (*n*=5) represented as a table.Fig. 2Fig. 3Tabulated representation of percentage of cells expressing Hsp70 and Hsp90 relative to SarcAct, CaN and Calp under different conditions. The study conditions used were; normal untreated NMCC (A); NMCC treated with nutrient deficient buffer (ischemia induction) for 2 h (B); NMCC grown for 2 h in normal media containing 1 mM H~2~O~2~ following 2 h of ischemia induction (reperfusion induction) (C). The averaged live and dead cell percentages was used to calculate the percentage of cells expressing Hsp70 or Hsp90 only or with cells co-expressing Hsp70 or Hsp90 with SarcAct or CaN or Calp. The total percentage of cells was then determined by adding the percentage of cells expressing Hsp70 or Hsp90 only, along with cells co-expressing Hsp70 or Hsp90 with SarcAct or CaN or Calp. Significant values (*p*-value\<0.05) denoted as **\*** was determined. Standard error was calculated and represented as error bars.Fig. 3 3.1. Expression of Hsp70 and Hsp90 in CaN expressing cells {#s0040} ---------------------------------------------------------- On comparing Hsp70 with CaN in normal, ischemia induced and reperfusion induced cells, we observed a global increase in expression of both Hsp70 and CaN following ischemia which significantly decreased following reperfusion ([Figs. 1](#f0005){ref-type="fig"} and [3](#f0015){ref-type="fig"}). Cardiomyocytes expressing both Hsp70 and CaN peaked during ischemia and then significantly decreased during reperfusion ([Fig. 1](#f0005){ref-type="fig"}D). A slight increase in global expression of Hsp90 with respect to CaN following ischemia and subsequent reperfusion was observed but not significant ([Fig. 3](#f0015){ref-type="fig"}). Conversely, the number of cells expressing Hsp90 alone decreased during both ischemia and reperfusion, whereas there was slight increase in cells co-expressing Hsp90 and CaN during ischemia and subsequent reperfusion ([Fig. 2](#f0010){ref-type="fig"}). There was simultaneous increase in number of dead cells expressing Hsp70 or Hsp90 during ischemia ([Figs. 1](#f0005){ref-type="fig"}B and [2](#f0010){ref-type="fig"}B). The drastic increase in dead cells co-expressing Hsp70 or Hsp90 and CaN during ischemia was not observed during subsequent reperfusion ([Figs. 1](#f0005){ref-type="fig"}C and [2](#f0010){ref-type="fig"}C). The current study clearly shows that the stress induced by ischemic treatment simultaneously increased the expression of Hsp70 and Hsp90 since both being chaperone proteins [@bib46]. The cells expressing Hsp70 and Hsp90 predominantly died during ischemia ([Figs. 1](#f0005){ref-type="fig"}B and [2](#f0010){ref-type="fig"}B) [@bib50]. Reperfusion did not enhance cell death indicating that the cells expressing Hsp70 or Hsp90 were protected against subsequent reperfusion induced injury ([Figs. 1](#f0005){ref-type="fig"}C and [2](#f0010){ref-type="fig"}C). Activation of Heat Shock Transcription Factor 1 during ischemia stimulates Hsp70 mRNA expression whereas reperfusion stimulates Hsp90 mRNA [@bib51]. The marked increase observed in Hsp70 expression in CaN expressing cells ([Fig. 1](#f0005){ref-type="fig"}B) suggests the possible interaction between Hsp70 and CaN as previously described [@bib13], [@bib31]. Hsp70 phosphorylation by cAMP-dependent protein kinase (PKA) (produced in conditions of stress), can inhibit Hsps ability to enhance CaN phosphatase activity [@bib31], [@bib58]. It is possible that the cells try to compensate the loss of enhanced CaN phosphatase activity by producing more CaN and hence the increased CaN expression during ischemia ([Fig. 1](#f0005){ref-type="fig"}D and E). The interaction between Hsp70 and CaN is known to dephosphorylate NFAT resulting in transcriptional induction of various genes including GATA4, which is crucial in cardiomyocyte development and has a significant role in unassisted self-repair [@bib32], [@bib36]. Conversely, ischemia induced CaN dephosphorylates phospholamban which results in Ca^2+^ overload during reperfusion and thus further damages the cells [@bib30]. It is also known that increase in myocardial Hsp90 expression promotes the recruitment of Akt and CaN, thereby promoting endothelial nitric oxide synthase (eNOS) activation and subsequently reducing cell injury [@bib43], [@bib44]. Therefore, it can be assumed that the slight increase in cells co-expressing Hsp90 and CaN ([Fig. 2](#f0010){ref-type="fig"}D and E), stimulated eNOS production which resulted in no further increase in cell death during reperfusion. A significant increase in cardiomyocytes expressing CaN only with respect to both Hsp70 and Hsp90 was observed following ischemia which then significantly reduced during reperfusion ([Figs. 1](#f0005){ref-type="fig"}D and [2](#f0010){ref-type="fig"}D). The findings on the expression of CaN were similar to our previous study in human and animal heart [@bib59]. Interestingly, the percentage of CaN expressing dead cells increased following ischemia and subsequent reperfusion ([Figs. 1](#f0005){ref-type="fig"}E and [2](#f0010){ref-type="fig"}E), compared to our previous report where the percentages of CaNα and CaNβ subunit expressing dead cells decreased during ischemia and subsequent reperfusion [@bib13]. Both CaNα and CaNβ subunits are required for the phosphatase activity of CaN along with CaM and Ca^2+^ [@bib24]. CaNα and CaNβ subunits are more apparent in live cells in comparison to dead cells where these subunits may be completely proteolysed by Calpn [@bib28]. Expression of CaN alone in cells increased by \~4 and \~8 fold with respect to Hsp70 and Hsp90 respectively during ischemia ([Figs. 1](#f0005){ref-type="fig"}E and [2](#f0010){ref-type="fig"}E). The absence of Hsp70 and Hsp90 greatly increased cell death and decreased CaN expression which could be due increased Calpn production ([Figs. 1](#f0005){ref-type="fig"}B and [2](#f0010){ref-type="fig"}B). Reperfusion further decreased CaN expression and there was no significant increase in number of dead cells compared to ischemic induction in absence of Hsp70 ([Figs. 1](#f0005){ref-type="fig"}C and [2](#f0010){ref-type="fig"}C). Absence of both Hsp70 and Hsp90 in cells expressing CaN only could be attributed to the proteolytic activity of Calpn [@bib25], [@bib26], [@bib27], [@bib45], [@bib60]. The cardiomyocytes in such conditions try to overcome the potential cell damage by increasing CaN expression and activation during ischemia as previously reported [@bib13], [@bib27]. Reperfusion decreases the overall Calpn expression which results in decreased CaN expression and activation [@bib13]. 3.2. Expression of Heat Shock Protein (Hsp) 70 and Hsp90 in Calpastatin (Calp) expressing cells {#s0045} ----------------------------------------------------------------------------------------------- In normal (untreated), ischemia induced and reperfusion induced cardiomyocytes on comparing with Calp, we observed a global increase in expression of both Hsp70 and Hsp90 following ischemia which significantly decreased following reperfusion ([Fig. 3](#f0015){ref-type="fig"}, [Supplementary Figs. 1](#s0055) and 2). Cardiomyocytes expressing Hsp70 only slightly decreased during ischemia and showed increase in number of dead cells ([Supplementary Fig. 1](#s0055)B). Subsequent reperfusion did not increase the expression of Hsp70 as the number of dead cells increased significantly ([Supplementary Fig. 1](#s0055)C). The cardiomyocytes expressing both Hsp70 and Calp increased slightly during ischemia with significant increase in dead cells ([Supplementary Fig. 1D and E](#s0055)). Reperfusion further increased the number of dead cells co-expressing both Hsp70 and Calp ([Supplementary Fig. 1](#s0055)C). Increased expression of Hsp90 in cardiomyocyte following ischemia and subsequent reperfusion was observed ([Supplementary Fig. 2](#s0055)). However, the number of cells co-expressing Hsp90 and Calp remained same as untreated cells during ischemia with a considerable increase in dead cells ([Supplementary Fig. 2](#s0055)B). A slight increase in number of cells co-expressing Hsp90 and Calp was observed during subsequent reperfusion along with no significant increase in dead cells ([Supplementary Fig. 2](#s0055)C). Ischemia enhanced the relative expression of Hsp70 and Hsp90 in cardiomyocytes with respect to Calp as compared to CaN. The increase in expression is related to the increase in number of live cells expressing Hsp70 and Hsp90 expression was much higher than the increase in number of live cells ([Fig. 3](#f0015){ref-type="fig"}B). Reperfusion produced a decrease in number of live cells expressing Hsp70 and Hsp90 with a slight increase in number of dead cells ([Fig. 3](#f0015){ref-type="fig"}C). The overall expression of Calp increased during ischemia and subsequent reperfusion ([Supplementary Figs. 1 and 2](#s0055)). The expression of Calp marginally increased during ischemia and subsequent reperfusion in cardiomyocytes co-expressing Hsp70 ([Supplementary Fig. 1B and D](#s0055)). There was an increase in number of dead cells during ischemia, and subsequent reperfusion did not increase the number of dead cells. The number of Calp only producing cells relative to Hsp70 did not increase much during ischemia though the death rate was considerably increased ([Supplementary Fig. 1](#s0055)D). Subsequent reperfusion induced a significant increase (\~4 fold) in number of Calp only producing cardiomyocytes with a significant increase in number of dead cells than in ischemia. The expression of Calp barely increased during ischemia and subsequent reperfusion in cardiomyocytes co-expressing Hsp90 ([Supplementary Fig. 2D and E](#s0055)). As with Hsp70 co-expression, the number of dead cells increased during ischemia and persisted during subsequent reperfusion. The number of Calp only producing cells relative to Hsp90 slightly increased during ischemia with increase in number of dead cells ([Supplementary Fig. 2](#s0055)B). Reperfusion induced a slight increase in number of Calp only producing cardiomyocytes with a decrease in number of dead cells than in ischemia. Ischemic treatment increased the expression of Hsp70 and Hsp90 since both are chaperone proteins ([Supplementary Figs. 1B and 2B](#s0055)). However, a significant number of cells co-expressing Hsp70 or Hsp90 with Calp died during ischemia. Reperfusion significantly enhanced the killing of cells expressing Hsp70 or Hsp90 only compared to those co-expressing Calp with Hsp70 or Hsp90. This suggests that the expression of Calp also protected cardiomyocytes against reperfusion induced injury. Calp sequesters Calpn from its substrates in the normal myocardium, but may be proteolysed during the early phase of Calpn activation during I/R [@bib12], [@bib14]. Calpn activation results in the proteolysis of Calp followed by other calpain substrates [@bib61]. It is known that Calpn cleaves in Hsp70 during neuronal degradation [@bib60]. It is therefore possible that the absence of Hsp70 in Calp only expressing cardiomyocytes makes them more susceptible to death. An increase in number of Calp only expressing dead cells relative to Hsp70 suggests that Hsp70 plays a critical role in cardioprotection. On the other hand, the decrease in number of Calp only expressing dead cells relative to Hsp90 during reperfusion is significant such that the levels return to almost normal (untreated). Hsp90 has both cardioprotective and antagonistic characteristics [@bib37], [@bib38], [@bib39], [@bib40], [@bib41], [@bib42], [@bib45]. Absence of Hsp90 occurs during ischemia, makes Calp more susceptible to Calpn degradation. Calpn activity can be regulated by pathways other than AKT also since Calpn can degrade AKT-associated Hsp90 [@bib27], [@bib42]. In such context, it can be inferred that Calpn can proteolyse Hsp90 and Calp and killed the cardiomyocytes and in these dead cells neither Hsp90 nor Calp expression could be detected. It should be noted that there was a concurrent and drastic increase in number of dead cells following reperfusion which did not express Hsp90 or Calp. 3.3. Expression of Hsp70 and Hsp90 in SarcAct expressing cells {#s0050} -------------------------------------------------------------- On comparing with SarcAct, we observed a global increase in expression of both Hsp70 and Hsp90 following ischemia which significantly decreased following reperfusion ([Fig. 3](#f0015){ref-type="fig"}, [Supplementary Figs. 3 and 4](#s0055)). Non-cardiomyocytes expressing Hsp70 only significantly increased during ischemia and showed increase in number of dead cells ([Supplementary Fig. 3](#s0055)B). Subsequent reperfusion did not increase the number of dead cells but reduced the number of Hsp70 expressing cells ([Supplementary Fig. 3](#s0055)C). The cardiomyocytes expressing both Hsp70 and SarcAct remained consistent during ischemia with significant increase in dead cells ([Supplementary Fig. 3](#s0055)D). Reperfusion further increased the number of dead cells co-expressing both Hsp70 and Calp but the expression of Hsp70 remained same. Increased expression of Hsp90 alone in non-cardiomyocytes following ischemia was observed with increased cell death ([Supplementary Fig. 4](#s0055)B). Subsequent reperfusion decreased Hsp90 only expression in cells without any increase in dead cells ([Supplementary Fig. 4](#s0055)C). However, the number of cells co-expressing Hsp90 and SarcAct remained same as untreated cells during ischemia with a considerable increase in dead cells ([Supplementary Fig. 4D and E](#s0055)). The number of cells co-expressing Hsp90 and SarcAct remained consistent during subsequent reperfusion along with no significant increase in dead cells. Ischemia slightly decreased the number of cardiomyocytes expressing SarcAct only with respect to Hsp70 but with a marginal increase in cell death. Subsequent reperfusion produced no change in number of cardiomyocytes expressing SarcAct only with respect to Hsp70 with no change in number of dead cells ([Supplementary Fig. 3](#s0055)). With respect to Hsp90, number of cells expressing SarcAct only, decreased during ischemia with no significant increase in cell death ([Supplementary Fig. 4](#s0055)). Ensuing reperfusion also induced a decrease in number of cells expressing SarcAct only with respect to Hsp90 but with significant increase in cell death. It is evident from the experiments in this study using CaN and Calp that ischemia induces an overall increase in expression of Hsp70 and Hsp90 ([Fig. 3](#f0015){ref-type="fig"}) and this trend was observed when Hsp70 and Hsp90 expression was measured relative to SarcAct. A comparable trend was observed during reperfusion where the expression of Hsp70 and Hsp90 decreased slightly but still more than normal levels. SarcAct is ubiquitous and is not affected by the changes in the proteins studied in this study (Hsp70, Hsp90, CaN, Calp). It is known that sarcomeric proteolysis via calpain and caspase activation may be involved to cooperatively degrade proteins including myosin, actin, troponin, and tropomyosin [@bib62], [@bib63]. Our previous studies using Calpn [@bib13], [@bib14] demonstrated the interaction between Calpn and other CaM-regulated proteins. Since Calpn has the potential to degrade SarcAct, we did not use the Calpn to avoid any confusion, as we intended to compare the expression of other proteins used in this study with a protein which is integral and consistently present in cardiomyocytes. Therefore cells which did not express SarcAct were considered as non-cardiomyocyte population which includes fibroblast, macrophages, and other cells present cardiac tissue [@bib64]. The expression of SarcAct was observed to be consistently about \~60% of the total cells. Compared to SarcAct, the expression of other proteins varied depending on the treatment and interactions. In relation to Hsp70, the reduction of SarcAct only expressing cells suggests that the cells started co-expressing Hsp70 during both ischemia and reperfusion ([Supplementary Fig. 3](#s0055)D). The rise in SarcAct only expressing cells in relation to Hsp90 during reperfusion ([Supplementary Fig. 4](#s0055)D) suggests reduction in expression of Hsp90 which correlates to a simultaneous decrease in Hsp90 expression in non-cardiomyocyte population. A semi-quantitative estimation of Hsp70, Hsp90, CaN, Calp and SarcAct levels in cells was determined by Western blotting. The results obtained showed insignificant changes in the expression levels in proteins studied (data not shown). The absence of currently used methodologies or technologies to determine the expression level of proteins simultaneously in live and dead cells, other than FACS, hinders data validation. Repetition of experiments is the only proof of evidence in this circumstance. The drawback of the potential loss of floating dead cells which is often discarded during the washing steps has been negated in our previous studies [@bib13], [@bib14], by the adding the pellets of pooled media or buffering solution discarded after cell treatments. This is the first report which compares the expression of CaN, Calp and Hsps (70 and 90) in cardiomyocytes during ischemia and subsequent reperfusion. Previous studies were only able to gauge the global expression of these proteins in cardiomyocytes without any distinction of being live or dead [@bib12], [@bib59], [@bib65], [@bib66], [@bib67]. The current study uses FACS based assay to differentiate live and dead cells and also quantifies the protein expression in these cells separately. Further studies using animal knockdown models and rescue assays using over-expressed proteins can support these novel findings. In brief, the present study describes the use of triple staining for comparative protein expression analysis of Hsp70, Hsp90, CaN, Calp and SarcAct in normal, ischemia-induced and reperfused cardiomyocytes by FACS. Ischemia induces an increase in the expression of molecular chaperones Hsp70 and Hsp90 in cardiomyocytes along with increase in cell death. The expression of Hsp70 and Hsp90 decreases slightly during reperfusion. The absence of enhanced cell death suggests the cardioprotective nature of these proteins (Hsp70 and Hsp90). CaN expression peaks during ischemia and reduces during subsequent reperfusion similar to our previous studies [@bib13]. An increase in cell death was observed in cells expressing CaN following ischemia but no further increase in cell death during reperfusion implies that the CaN expression promotes cell survival and is therefore cardioprotective. Calp expression increased during ischemia and subsequent reperfusion much similar to previous reports [@bib13], [@bib14]. Decreased cell death was observed in cells co-expressing Calp with Hsp70 and Hsp90 during reperfusion compared to cells expressing only hsp70 or Hsp90 or Calp. This suggests the cardioprotective role of Calp by inhibiting Calpn. Expression of SarcAct remained consistent in cardiomyocytes since being ubiquitous and used as a control. Thus this study validates the cardioprotective nature of Hsp70, Hsp90, CaN and Calp previously reported by many groups. Appendix A. Supplementary material {#s0060} ================================== Supplementary material Supplementary Fig. 1**.** (A)--(C) Representative FACS analysis data of NMCC following I/R induction along with live-dead assay. In the horizontal axis FITC labeled anti-Calp antibodies and for vertical axis PE labeled antibodies against Hsp70 were detected. Rest of the figures in the panel are derived from the quadrants of (A)--(C) and demonstrate the live-dead assay using 7-AAD. The studied conditions were; normal untreated NMCC (A); NMCC maintained in nutrient deficient buffer (ischemia induction) for 2 h (B); NMCC grown for 2 h in standard growth media containing 1 mM H~2~O~2~ subsequent to 2 h of ischemia induction (reperfusion induction) (C). (D) Histographical representation of comparative protein expression in ischemia and reperfusion induced NMCC with those of normal untreated NMCC within stained quadrants (Q1 -- Hsp70; Q2 -- Hsp70+Calp; Q3 -- Calp) represented as fold level change (*n*=4). The fold level changes (increase or decrease) of protein expressing NMCC in each quadrant has been represented and significant values (*p*-value\<0.05) denoted as **\***. Standard error was calculated and represented as error bars. (E) Fold level changes in ischemia and reperfusion induced protein expression in NMCC within stained quadrants (Q1--Q3) in comparison with control cells (*n*=4) represented as a table. Supplementary material Supplementary Fig. 2**.** (A)--(C) Representative FACS analysis data of NMCC following I/R induction along with live--dead assay. In the horizontal axis FITC labeled anti-Calp antibodies and for vertical axis PE labeled antibodies against Hsp90 were detected. Rest of the figures in the panel are derived from the quadrants of (A)--(C) and demonstrate the live--dead assay using 7-AAD. The studied conditions were; normal untreated NMCC (A); NMCC maintained in nutrient deficient buffer (ischemia induction) for 2 h (B); NMCC grown for 2 h in standard growth media containing 1 mM H~2~O~2~ subsequent to 2 h of ischemia induction (reperfusion induction) (C). (D) Histographical representation of comparative protein expression in ischemia and reperfusion induced NMCC with those of normal untreated NMCC within stained quadrants (Q1 -- Hsp90; Q2 -- Hsp90+Calp; Q3 -- Calp) represented as fold level change (*n*=4). The fold level changes (increase or decrease) of protein expressing NMCC in each quadrant has been represented. Standard error was calculated and represented as error bars. (E) Fold level changes in ischemia and reperfusion induced protein expression in NMCC within stained quadrants (Q1--Q3) in comparison with control cells (*n*=4) represented as a table. Supplementary material Supplementary Fig. 3. (A)--(C) Representative FACS analysis data of NMCC following I/R induction along with live--dead assay. In the horizontal axis FITC labeled anti-SarcAct antibodies and for vertical axis PE labeled antibodies against Hsp70 were detected. Rest of the figures in the panel are derived from the quadrants of (A)--(C) and demonstrate the live--dead assay using 7-AAD. The studied conditions were; normal untreated NMCC (A); NMCC maintained in nutrient deficient buffer (ischemia induction) for 2 h (B); NMCC grown for 2 h in standard growth media containing 1 mM H~2~O~2~ subsequent to 2 h of ischemia induction (reperfusion induction) (C). (D) Histographical representation of comparative protein expression in ischemia and reperfusion induced NMCC with those of normal untreated NMCC within stained quadrants (Q1 -- Hsp70; Q2 -- Hsp70+ SarcAct; Q3 -- SarcAct) represented as fold level change (*n*=3). The fold level changes (increase or decrease) of protein expressing NMCC in each quadrant has been represented. Standard error was calculated and represented as error bars. (E) Fold level changes in ischemia and reperfusion induced protein expression in NMCC within stained quadrants (Q1--Q3) in comparison with control cells (*n*=3) represented as a table. Supplementary material Supplementary Fig. 4. (A)--(C) Representative FACS analysis data of NMCC following I/R induction along with live--dead assay. In the horizontal axis FITC labeled anti-SarcAct antibodies and for vertical axis PE labeled antibodies against Hsp90 were detected. Rest of the figures in the panel are derived from the quadrants of the [Supplementary Fig. 1](#s0055)(A)--(C) and demonstrate the live--dead assay using 7-AAD. The studied conditions were; normal untreated NMCC (A); NMCC maintained in nutrient deficient buffer (ischemia induction) for 2 h (B); NMCC grown for 2 h in standard growth media containing 1 mM H~2~O~2~ subsequent to 2 h of ischemia induction (reperfusion induction) (C). (D) Histographical representation of comparative protein expression in ischemia and reperfusion induced NMCC with those of normal untreated NMCC within stained quadrants (Q1 -- Hsp90; Q2 -- Hsp90+ SarcAct; Q3 -- SarcAct) represented as fold level change (*n*=3). The fold level changes (increase or decrease) of protein expressing NMCC in each quadrant has been represented. Standard error was calculated and represented as error bars. (E) Fold level changes in ischemia and reperfusion induced protein expression in NMCC within stained quadrants (Q1--Q3) in comparison with control cells (*n*=3) represented as a table. Supplementary material Supplementary material This work was supported by the Heart and Stroke Foundation of Saskatchewan, Canada and partially by College of Medicine, University of Saskatchewan (Grant numbers \#411894 and \#416104 respectively). R.K.S. and S.P. were involved in conceptualisation and preparation of manuscript and S.P. was involved in the designing and performing of the experiments. Supplementary data associated with this article can be found in the online version at [doi:10.1016/j.bbrep.2015.09.016](http://dx.doi.org/10.1016/j.bbrep.2015.09.016){#ir0005}.
2024-03-03T01:26:51.906118
https://example.com/article/2198
Movement Disorders Program You are here Contact Us Texas Medical Center Make a Difference The Promise Campaign will expand our care to more children, and offer comfort to the people who love them. Seeing patients with impairments of body movement and control The Pediatric Movement Disorders Program at Texas Children’s Hospital sees patients with impairments of body movement and control. Each patient receives a thorough evaluation to diagnose the specific type of movement disorder and develop an individualized plan of treatment. The Pediatric Movement Disorders Program is a multidisciplinary effort of Neurology and Developmental Neuroscience in collaboration with the departments of Physical Medicine, Neurosurgery and multiple others.
2024-07-12T01:26:51.906118
https://example.com/article/9174
1. Field of the Invention The present invention relates to a siding boards attachment structure in which a siding board which has left and right shiplap or four sides shiplap is attached to an underlayment (for instance furring strips) using a securing metal fitting, and the invention also relates to a sealing member used therefor, a siding board and a method of attaching siding boards. 2. Discussion of the Background Conventionally, there exists a siding boards attachment structure in which siding boards are attached to an underlayment and these siding boards are jointed with each other using shiplap joint structure on the left and right side or four side (left, right, upper and lower sides) of each siding board. For example, a siding board 92 including a four side shiplap structure shown in FIG. 16 has an upper underlying tongue portion 922 formed on an upper side of the siding board 92, a lower overlying tongue portion 921 formed on a lower side of the siding board 92, a lateral underlying tongue portion 924 formed on a right side of the siding board 92 and a lateral overlying tongue portion 923 formed on a left side of the siding board 92. When upper and lower siding boards are jointed to each other, the lower overlying tongue portion 921 of the upper siding board 92 is superposed on the upper underlying tongue portion 922 of the lower siding board 92. When the left and right siding boards are jointed to each other, the lateral overlying tongue portion 923 of the right siding board 92 is superposed on the lateral underlying tongue portion 924 of the left siding board 92. As shown in FIG. 16, usually, caulking material 929 is adhered on the flat surface of the upper underlying tongue portion 922 and the lateral underlying tongue portion 924 of the siding board 92. The back surfaces of lower overlying tongue portion 921 and the lateral overlying tongue portion 923 of one of the siding boards 92 press the caulking material 929 on the other siding boards, thereby preventing water from leaking from a gap of the joint portion of the siding boards 92. In this case, the caulking material 929 is covered with the lower overlying tongue portion 921 or the lateral overlying tongue portion 923, and the caulking material 929 is not exposed from the front of the siding board. Therefore, it is possible to obtain a siding boards attachment structure which is excellent from the viewpoint of outward appearance design. The siding boards 92 are fixed to each other using securing metal fittings 5. These securing metal fittings 5 are formed such that they can be fitted to an upper surface shape of the upper underlying tongue portion 922 and a back surface shape of the lower overlying tongue portion 921. These securing metal fittings 5 are disposed at connecting portions where four siding boards 92 are butted into one another so that each of the siding boards 92 is fixed to the underlayment such as furring strip mounted to a framework. However, in actuality, even though the caulking material 929 for preventing inundation is adhered, an adverse possibility that rainwater and the like may be lead inside of the siding boards attachment structure 9 is not avoided completely. That is, as shown in FIG. 17, rainwater 6 coming from a gap 927 of the joint portion between left and right two adjacent siding boards 92 is prevented from moving laterally (right in FIG. 17) by the caulking material 929, and the rainwater 6 passes through the gap 927 of the joint portion and falls downward. However, the caulking material 929 adhered on the lateral underlying tongue portion 924 of the siding board 92 is not continuous in an opposed gap 928 to which the lateral underlying tongue portion 924 of the upper and lower siding boards 92. Therefore, when the rainwater 6 falling down through the gap 927 of the joint portion reaches the opposed gap 928, a portion of the rainwater 6 enters into the siding boards attachment structure 9. More specifically, as shown in FIG. 18, in a construction state in which the securing metal fitting 5 is disposed at a corner of the siding board 92, the rainwater 6 falling down through the gap 927 of the joint portion passes through a front surface of a front flat plate 57 of the securing metal fitting 5, and further moves downward toward the gap 927 of the joint portion. However, the front flat plate 57 is not necessarily in tight contact with the back surface of the lower overlying tongue portion 921 of the siding board 92 completely. Therefore, a portion of the rainwater 6 flows laterally through the front surface of the front flat plate 57 as shown in FIG. 18, falls on the upper underlying tongue portion 922 of the lower siding board 92 from a side end 59, and moves toward a backside of the siding board 92. A portion of the rainwater 6 which has moved laterally through the front flat plate 57 moves laterally on a support portion 52 of the securing metal fitting 5 beyond the front flat plate 57, and moves toward a backside of the siding board 92 from the side end 59 of the securing metal fitting 5 similarly. As a result, when the siding board 92 or the underlayment 3 is made of material having poor water resistance such as a ceramic type siding board or wood-based furring, this becomes a cause of corrosion and deterioration. The rainwater 6 entering from the gap 926 of the joint portion of the upper and lower siding boards 92 is prevented from moving upward by the lateral caulking material 929 adhered on the upper underlying tongue portion 922, and is discharged forward from the wall surface. Such an inconvenience can be naturally generated not only in the siding boards attachment structure which has four side shiplap joint, but also a siding boards attachment structure using siding boards having at least left and right shiplap structure. An object of the present invention is to provide a siding boards attachment structure and a method of attaching siding boards capable of substantially preventing water from entering inside of the siding boards, and to provide a sealing member and a siding board used for the siding boards attachment structure. According to one aspect of the invention, a siding boards attachment structure, includes siding boards, at least one underlayment, securing metal fittings and at least one sealing member. The siding board has opposite right and left sides and opposite upper and lower sides. The siding board is provided at the opposite right and left sides with a lateral underlying tongue portion and a lateral overlying tongue portion, respectively. The lateral underlying tongue portion protrudes along a direction from the left side to the right side in a back surface side. A notched recess is notched along a direction from the right side to the left side in front of the lateral underlying tongue portion. The lateral overlying tongue portion protrudes along a direction from the right side to the left side in a front surface side. The siding boards are attached to the underpayment. The securing metal fitting is disposed at the opposite upper and lower sides of the siding boards in order to fix the siding boards. The sealing member is disposed between left and right adjacent siding boards, having a base plate portion, a rising plate portion, a front plate portion and a front resilient material. The base plate portion is secured to the underlayment. The rising plate portion is bent forward from the base plate portion and abuts against a side surface of the lateral underlying tongue portion of the siding board. The front plate portion is bent from a front end of the rising plate portion in the opposite direction from the base plate portion. The front resilient material is provided on a front surface of the front plate portion. The front plate portion engages with a front surface of the lateral underlying tongue portion of the siding board. The front resilient material is in tight contact with a front inner surface of the notched recess and a back surface of the lateral overlying tongue portion of the siding boards. According to another aspect of the invention, a sealing member used for a siding boards attachment structure, includes a base plate portion, a rising plate portion, a front plate portion and a front resilient material. The base plate portion is configured to be secured to an underlayment. The rising plate portion is bent forward from the base plate portion and is configured to abut against a side surface of the lateral underlying tongue portion. The front plate portion is bent from a front end of the rising plate portion in the opposite direction from the base plate portion and configured to engage with a front surface of the lateral underlying tongue portion of the siding board. The front resilient material is provided on a front surface of the front plate portion and configured to be in tight contact with a front inner surface of the notched recess of one of the siding board and a back surface of the lateral overlying tongue portion of the other siding board. According to the other aspect of the invention, a siding board used for a siding boards attachment structure includes opposite right and left sides and opposite upper and lower sides, a lateral underlying tongue portion, a lateral overlying tongue portion and a notched recess. The lateral underlying tongue portion and the lateral overlying tongue portion are provided at the opposite right and left sides, respectively. The lateral underlying tongue portion protrudes along a direction from the left side to the right side in a back surface side. The lateral overlying tongue portion protrudes along a direction from the right side to the left side in a front surface side. The notched recess is notched along a direction from the right side to the left side in front of the lateral underlying tongue portion. The notched recess is formed such that portions of the front resilient material and the front plate portion of the sealing member can be fitted into the notched recess. According to yet another aspect of the invention, a method of attaching siding boards, includes disposing securing metal fittings on the opposite upper and lower sides of a first row siding board, disposing the first row siding board on the underlayment using the securing metal fittings, bringing the rising plate portion of the sealing member into abutment against the lateral overlying tongue portion of the first row siding board, engaging the front plate portion of the sealing member with a front surface of the lateral underlying tongue portion, fitting the front resilient material and the front plate portion of the sealing member into the notched recess of the first row siding board, bringing the front resilient material into tight contact with a front inner surface of the notched recess, securing the sealing member to the underlayment, disposing the securing metal fitting on the opposite upper and lower sides of a second row siding board, disposing the second row siding board to the underlayment such that the sealing member is sandwiched between the first row siding board and the second row siding board, and bringing the front resilient material into tight contact with a back surface of the lateral overlying tongue portion of the second row siding board.
2024-01-26T01:26:51.906118
https://example.com/article/6515
/* * * Copyright 2015 Netflix, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ package com.netflix.genie.common.dto; import com.netflix.genie.common.external.dtos.v4.ArchiveStatus; import org.assertj.core.api.Assertions; import org.junit.jupiter.api.Test; import java.time.Instant; import java.util.UUID; /** * Unit tests for the JobExecution class. * * @author tgianos * @since 3.0.0 */ class JobExecutionTest { private static final String HOST_NAME = UUID.randomUUID().toString(); private static final long CHECK_DELAY = 280843L; private static final int PROCESS_ID = 134234; private static final Instant TIMEOUT = Instant.now(); private static final int MEMORY = 1_024; /** * Test to make sure can build a valid JobExecution using the builder. */ @Test void canBuildJob() { final JobExecution execution = new JobExecution.Builder(HOST_NAME).build(); Assertions.assertThat(execution.getHostName()).isEqualTo(HOST_NAME); Assertions.assertThat(execution.getProcessId().isPresent()).isFalse(); Assertions.assertThat(execution.getCheckDelay().isPresent()).isFalse(); Assertions.assertThat(execution.getTimeout().isPresent()).isFalse(); Assertions.assertThat(execution.getExitCode().isPresent()).isFalse(); Assertions.assertThat(execution.getCreated().isPresent()).isFalse(); Assertions.assertThat(execution.getId().isPresent()).isFalse(); Assertions.assertThat(execution.getUpdated().isPresent()).isFalse(); Assertions.assertThat(execution.getMemory().isPresent()).isFalse(); Assertions.assertThat(execution.getArchiveStatus().isPresent()).isFalse(); } /** * Test to make sure can build a valid JobExecution with optional parameters. */ @Test void canBuildJobWithOptionals() { final JobExecution.Builder builder = new JobExecution.Builder(HOST_NAME); builder.withCheckDelay(CHECK_DELAY); builder.withProcessId(PROCESS_ID); builder.withTimeout(TIMEOUT); builder.withMemory(MEMORY); builder.withArchiveStatus(ArchiveStatus.ARCHIVED); final int exitCode = 0; builder.withExitCode(exitCode); final Instant created = Instant.now(); builder.withCreated(created); final String id = UUID.randomUUID().toString(); builder.withId(id); final Instant updated = Instant.now(); builder.withUpdated(updated); final JobExecution execution = builder.build(); Assertions.assertThat(execution.getHostName()).isEqualTo(HOST_NAME); Assertions .assertThat(execution.getProcessId().orElseThrow(IllegalArgumentException::new)) .isEqualTo(PROCESS_ID); Assertions .assertThat(execution.getCheckDelay().orElseThrow(IllegalArgumentException::new)) .isEqualTo(CHECK_DELAY); Assertions.assertThat(execution.getTimeout().orElseThrow(IllegalArgumentException::new)).isEqualTo(TIMEOUT); Assertions.assertThat(execution.getExitCode().orElseThrow(IllegalArgumentException::new)).isEqualTo(exitCode); Assertions.assertThat(execution.getCreated().orElseThrow(IllegalArgumentException::new)).isEqualTo(created); Assertions.assertThat(execution.getId().orElseThrow(IllegalArgumentException::new)).isEqualTo(id); Assertions.assertThat(execution.getUpdated().orElseThrow(IllegalArgumentException::new)).isEqualTo(updated); Assertions.assertThat(execution.getMemory().orElseThrow(IllegalArgumentException::new)).isEqualTo(MEMORY); Assertions.assertThat(execution.getArchiveStatus().orElseThrow(IllegalArgumentException::new)) .isEqualTo(ArchiveStatus.ARCHIVED); } /** * Test to make sure a JobExecution can be successfully built when nulls are inputted. */ @Test void canBuildJobWithNulls() { final JobExecution.Builder builder = new JobExecution.Builder(HOST_NAME); builder.withExitCode(null); builder.withProcessId(null); builder.withCheckDelay(null); builder.withTimeout(null); builder.withMemory(null); builder.withCreated(null); builder.withId(null); builder.withUpdated(null); builder.withArchiveStatus(null); final JobExecution execution = builder.build(); Assertions.assertThat(execution.getHostName()).isEqualTo(HOST_NAME); Assertions.assertThat(execution.getProcessId().isPresent()).isFalse(); Assertions.assertThat(execution.getCheckDelay().isPresent()).isFalse(); Assertions.assertThat(execution.getTimeout().isPresent()).isFalse(); Assertions.assertThat(execution.getExitCode().isPresent()).isFalse(); Assertions.assertThat(execution.getCreated().isPresent()).isFalse(); Assertions.assertThat(execution.getId().isPresent()).isFalse(); Assertions.assertThat(execution.getUpdated().isPresent()).isFalse(); Assertions.assertThat(execution.getMemory().isPresent()).isFalse(); Assertions.assertThat(execution.getArchiveStatus().isPresent()).isFalse(); } /** * Test equals. */ @Test void canFindEquality() { final JobExecution.Builder builder = new JobExecution.Builder(HOST_NAME); builder.withCreated(null); builder.withId(UUID.randomUUID().toString()); builder.withUpdated(null); final JobExecution jobExecution1 = builder.build(); final JobExecution jobExecution2 = builder.build(); builder.withId(UUID.randomUUID().toString()); final JobExecution jobExecution3 = builder.build(); Assertions.assertThat(jobExecution1).isEqualTo(jobExecution2); Assertions.assertThat(jobExecution1).isNotEqualTo(jobExecution3); } /** * Test hash code. */ @Test void canUseHashCode() { final JobExecution.Builder builder = new JobExecution.Builder(HOST_NAME); builder.withCreated(null); builder.withId(UUID.randomUUID().toString()); builder.withUpdated(null); final JobExecution jobExecution1 = builder.build(); final JobExecution jobExecution2 = builder.build(); builder.withId(UUID.randomUUID().toString()); final JobExecution jobExecution3 = builder.build(); Assertions.assertThat(jobExecution1.hashCode()).isEqualTo(jobExecution2.hashCode()); Assertions.assertThat(jobExecution1.hashCode()).isNotEqualTo(jobExecution3.hashCode()); } }
2023-12-02T01:26:51.906118
https://example.com/article/5476
Multiple System Atrophy is a devastating and quickly-developing disease with no known cause or cure. By chance Phil Gioja connected with Austin, and after learning his story Center Street Productions partnered with The MSA Coalition to tell his bittersweet story as he faces this debilitating disease with a bold face and a community of friends.
2023-11-04T01:26:51.906118
https://example.com/article/6864
Related Information London, United Kingdom, 31 January 2006 – His Highness the Aga Khan today proposed that the international community work with the Government of Afghanistan to develop an “enabling environment” to encourage the continuing and growing role of private initiative in the development of the country. Addressing participants at the London Conference on Afghanistan, the Aga Khan said: “It is critical that the Government of Afghanistan creates the appropriate legal and fiscal framework, the regulatory conditions and the stable democratic institutions – in other words, the enabling environment – that encourages and supports the confidence and growth of private initiative and also facilitates the development of public-private partnerships.” He said private initiative is necessary in the “enormous” task of redevelopment in Afghanistan because “governments cannot shoulder the burden alone.” The Aga Khan is heading the delegation of the Aga Khan Development Network (AKDN) to the two-day conference to discuss the future of Afghanistan. “Because of the extensive presence of AKDN agencies in Afghanistan – engaged in humanitarian assistance, education, health, rural and urban development, tourism, cultural revitalization, telecommunications and banking – we have a wide understanding of the redevelopment processes in Afghanistan,” he said. “We are thus proposing to work with the Government of Afghanistan, in concert with a wide variety of stakeholders, to support the development and maintenance of an enabling environment.” He invited governments, international and non-governmental organisations and investors to engage in the process and be partners in a conference on the topic being planned for Kabul within the next 12 months. It would include developing concrete steps to enhance the potential for private initiative and identify solutions for removing impediments. The London Conference on Afghanistan, jointly chaired by the British Prime Minister Tony Blair, President of Afghanistan Hamid Karzai, and the United Nations Secretary-General, Kofi Annan, is addressing key issues facing Afghanistan such as security, governance, reconstruction and re-development. It will also provide the opportunity for the formal launch of the Afghanistan Compact, the result of consultation between the Government of Afghanistan, the United Nations and the international community, which sets a five-year framework for co-operation and development targets. The Government of Afghanistan presented its Interim Afghanistan National Development Strategy for the next five years. It was also an occasion for the international community to renew its political and financial commitment to support achievement of the goals agreed in the Compact. “The Compact is a recognition by the international community that returning Afghanistan to its proud status as a happy and prosperous country, able to contribute to the progress of the region and to desirable global goals, requires the steadfast commitment of our collective will and resources for the long term,” said the Aga Khan. The Aga Khan Development Network, one of the largest private development organisations in the world, has a record of assistance to Afghanistan dating back to 1995 with its early involvement in refugee resettlement and the provision of emergency humanitarian assistance. In 2002, a multi-year commitment of $75 million was pledged toward the recovery and the Aga Khan reported to the conference that this commitment had been exceeded by 60 per cent to date. “Along with our donor, lender and investor partners, we have mobilised just under $400 million for the reconstruction of Afghanistan,” he added. In 2003, the AKDN established the country’s first not-for-profit microfinance bank. The AKDN’s Trust for Culture has taken on several important projects to help preserve Afghanistan’s cultural heritage, beginning with the restoration of the historic gardens at the burial site of Bagh-e-Babur, the founder of the Mughal Empire. The Mausoleum of Timur Shah, regarded by many historians as the founder of modern Afghanistan, was also restored and work continues in the historic neighbourhoods of Asheqan wa Arefan in Kabul, as well as in the Bar Durrani quarter of Herat. Also in 2003, the Aga Khan Fund for Economic Development (AKFED) launched Roshan, which has become Afghanistan’s largest mobile GSM provider, covering 45 urban centres and 100 smaller communities. Roshan directly employs over 500 people, making it one of the largest private sector employers in the country. In November last year, the AKDN inaugurated the first five-star hotel in the country, the Kabul Serena Hotel, which employs a total of 400 staff, 90 percent of whom are Afghan. The hotel, rebuilt at the request of the Afghanistan government, will provide much-needed accommodation to international donors and investors visiting the country and it is also expected to spur tourism. The Aga Khan Development Network (AKDN) was founded by His Highness the Aga Khan, 49th Hereditary Imam (spiritual leader) of the Ismaili Muslims. It is a group of private, non-denominational development agencies working to empower communities and individuals to improve living conditions and opportunities, especially in sub-Saharan Africa, Central and South Asia, and the Middle East. The Network’s nine development agencies focus on social, cultural and economic development for all citizens, regardless of gender, origin or religion. The AKDN’s underlying ethic is compassion for the vulnerable in society. Its annual budget for philanthropic activity is in excess of US$300 million. In 1995, Focus Humanitarian Assistance, an affiliate agency of the AKDN, began delivering emergency food aid to Afghanistan and assisted with refugee resettlement. In 2002, the AKDN embarked upon an ambitious expansion of its work to include a range of development initiatives addressing issues of food security, infrastructure rehabilitation, upgrading and support for healthcare and educational institutions, water and sanitation, revitalisation of cultural assets and urban development. It also is addressing the need for investment in priority sectors of the economy such as microfinance, telecommunications and tourism.
2024-05-24T01:26:51.906118
https://example.com/article/9461
808 F.2d 1513 Paredes Figueroav.Greyhound Corp. 86-1309 United States Court of Appeals,First Circuit. 12/30/86 1 D.P.R. VACATED AND REMANDED
2024-04-04T01:26:51.906118
https://example.com/article/5115
### 一日三起袭击案 港资深评论员:中共谋划「群众斗群众」 ------------------------ #### [首页](https://github.com/gfw-breaker/banned-news/blob/master/README.md) &nbsp;&nbsp;|&nbsp;&nbsp; [手把手翻墙教程](https://github.com/gfw-breaker/guides/wiki) &nbsp;&nbsp;|&nbsp;&nbsp; [禁闻聚合安卓版](https://github.com/gfw-breaker/bn-android) &nbsp;&nbsp;|&nbsp;&nbsp; [网门安卓版](https://github.com/oGate2/oGate) &nbsp;&nbsp;|&nbsp;&nbsp; [神州正道安卓版](https://github.com/SzzdOgate/update) <div class="zhidingtu"> <div class="ar-wrap-3x2"> <img alt="24日3次袭击事件使中共「群众斗群众」谋划曝光。" class="ar-wrap-inside-fill" src="http://img.soundofhope.org/2019/09/0c27c07fb5cf12996f2b166eab48f737-600x400-600x400.jpg"/> </div> <div class="caption"> 24日3次袭击事件使中共「群众斗群众」谋划曝光。 </div> </div> <hr/> #### [翻墙必看视频(文昭、江峰、法轮功、八九六四、香港反送中...)](https://github.com/gfw-breaker/banned-news/blob/master/pages/links.md) <div class="content"> <p> <span class="content-info-date"> 【希望之声2019年9月26日】 </span> <span class="content-info-type"> (本台记者高健雯综合报导) </span> 「十一」中共建政70周年前夕,24日香港民主党议员邝俊宇和法轮功学员廖女士光天化日下被袭后,当晚又一《苹果》女记者被4名暴徒袭击,事件引起各界强烈谴责。香港《苹果》更悬赏50万元港币,发动全港民众协助缉凶。有评论认为,今次袭击事件是中共「群众斗群众」一个具体表现。 </p> <div class="widget ad-300x250 ad-ecf"> <!-- ZW30 Post Embed 300x250 1 --> <ins class="adsbygoogle" data-ad-client="ca-pub-1519518652909441" data-ad-slot="9768754376" style="display:inline-block;width:300px;height:250px"> </ins> </div> <p> 综合媒体报导,24日晚间《苹果日报》被袭记者与胞姐前往秀茂坪一间快餐店用餐,刚落座,就被4名黑衣蒙面人拳掌相加,暴打头部,历时约30秒,两姐妹被打得头昏眼花,女记者的右耳背及左后脑红肿剧痛,出现耳鸣头痛,其胞姊亦被打得左眼红肿。4蒙面人中2人还戴有黄色头盔。 </p> <p> 香港记者协会对攻击事件表示非常愤怒。认为事件是对香港新闻及言论自由的挑衅,目的让记者噤声。记者协会促请香港警方严肃处理。 </p> <p> 25日《苹果日报》发表严正声明,悬赏港币50万元缉拿暴徒。《苹果日报》兼壹传媒创办人黎智英认为,打人的黑衣人只是受雇的「喽囉」,幕后另有指使者。 </p> <p> 自「反送中」运动以来,《苹果日报》一直立场明确支持示威抗议。今年7月中旬,黎智英赴美与美国副总统彭斯及国务卿彭佩奥就香港局势举行会晤,被中共列为「头号战犯」。但黎智英表示,不会因为这次事件让他改变立场,并且已对记者采取保安措施。 </p> <p> 《大纪元》报导,资深时事评论员程翔认为,今次行动相信是「有组织的袭击」,是今年8月7日中共港澳办和中联办在深圳联合座谈会后,「止暴制乱」的一个具体行动。 </p> <p> 他说,那次会议基本上将「反送中」运动定调为「颜色革命」,所以要强力「止暴制乱」。除了出动中共军队之外,「所有体制内和体制外的暴力都可以动员,而且可以被默许」,也就是搞起「群众斗群众」,今次袭击事件则是「群众斗群众」的具体展现。 </p> <p> 就为何选择以上3个目标,程翔表示,这3个目标代表三股反共力量。他说,邝俊宇是2016年立法会选举得票最高的立法会议员,今次「反送中」运动亦经常冲在第一线,「很受年轻人欢迎」;法轮功则坚持反迫害20年;《苹果日报》的老板黎智英被中共列为「新四人帮」之一。 </p> <p> 程翔认为,中共制造白色恐怖,想要民众灭声,「只会加剧民众对中共的不满,无一日平息」。程翔还指出,参与暴打抗争者的福建帮,「中共和香港政府让他们轻轻松松入境,没有受到中共和香港的阻止」,也说明这些事件幕后是中共指使和操作。 </p> <div class="content-info-btm"> <p class="content-info-zerenbianji"> <span class="content-info-title"> 责任编辑: </span> <span class="content-info-content"> 云天 </span> </p> </div> </div> <hr/> 手机上长按并复制下列链接或二维码分享本文章:<br/> https://github.com/gfw-breaker/banned-news/blob/master/pages/soh_gtxw/n3211554.md <br/> <a href='https://github.com/gfw-breaker/banned-news/blob/master/pages/soh_gtxw/n3211554.md'><img src='https://github.com/gfw-breaker/banned-news/blob/master/pages/soh_gtxw/n3211554.md.png'/></a> <br/> 原文地址(需翻墙访问):http://www.soundofhope.org/gb/2019/09/26/n3211554.html ------------------------ #### [首页](https://github.com/gfw-breaker/banned-news/blob/master/README.md) &nbsp;|&nbsp; [一键翻墙软件](https://github.com/gfw-breaker/nogfw/blob/master/README.md) &nbsp;| [《九评共产党》](https://github.com/gfw-breaker/9ping.md/blob/master/README.md#九评之一评共产党是什么) | [《解体党文化》](https://github.com/gfw-breaker/jtdwh.md/blob/master/README.md) | [《共产主义的终极目的》](https://github.com/gfw-breaker/gczydzjmd.md/blob/master/README.md) <img src='http://gfw-breaker.win/banned-news/pages/soh_gtxw/n3211554.md' width='0px' height='0px'/>
2023-10-05T01:26:51.906118
https://example.com/article/1657
"use strict"; async function before({ pushPrefs }) { await pushPrefs([ "browser.newtabpage.activity-stream.discoverystream.config", JSON.stringify({ collapsible: true, enabled: true, hardcoded_layout: true, }), ]); } test_newtab({ before, test: async function test_render_hardcoded_topsites() { const topSites = await ContentTaskUtils.waitForCondition(() => content.document.querySelector(".ds-top-sites") ); ok(topSites, "Got the discovery stream top sites section"); }, }); test_newtab({ before, test: async function test_render_hardcoded_learnmore() { const learnMoreLink = await ContentTaskUtils.waitForCondition(() => content.document.querySelector(".ds-layout .learn-more-link > a") ); ok(learnMoreLink, "Got the discovery stream learn more link"); }, });
2024-05-05T01:26:51.906118
https://example.com/article/6766
LOST TRACK: An A train at Aqueduct in Queens — the same area where the MTA “misplaced” a train last year. Photo: James Messerschmidt LOST TRACK: An A train at Aqueduct in Queens — the same area where the MTA “misplaced” a train last year. (James Messerschmidt) The MTA’s subway boss admitted yesterday that transit officials got so overwhelmed during last year’s Christmastime blizzard they “forgot” about an A train stuck on the tracks for nine agonizing hours with 500 passengers on board. “We forgot about it, and it’s inexcusable,” NYC Transit President Thomas Prendergast told a City Council hearing yesterday. To make sure that never happens again, the agency swears it has come up with a host of emergency plans to deal with future blizzards — such as possibly shutting down the system ahead of time. Prior to the Dec. 26 blizzard that walloped the region, the MTA operated under a “mantra to run at all costs,” he said. That isn’t so anymore. “There are times when you change that mantra . . . where it’s clear that you can’t continue top-rate service,” he said at the hearing. “If you pick people up and you don’t have surety that you’re going to get them to their destination, you have to start curtailing that service.” After the hearing, he stressed that shutting the system down in its entirety — as the MTA did for Tropical Storm Irene — would not be “taken lightly.” “You don’t abandon people in need of transportation,” he said. Not deliberately, at least. Prendergast admitted that MTA officials became so “overloaded” trying to keep trains operating last December that they forgot about the A train stuck in snow between the Aqueduct and Rockaway Boulevard stations. Passengers on that train said they were terrified. “There was no heat. And what if someone was sick or needed medical attention?” said David Jutt, a Scarsdale man who was on the stranded train with his wife and 8-year-old son.
2023-09-13T01:26:51.906118
https://example.com/article/5131
The role of stress in the development and clinical course of inflammatory bowel disease: epidemiological evidence. It is unclear whether psychological stress contributes to the inflammatory process in the inflammatory bowel diseases (IBD), ulcerative colitis (UC) and Crohn's disease (CD). This review assesses the epidemiological evidence regarding a causal link between stress and gut inflammation in IBD. A Medline search identified prospective studies of the effects of stress on subsequent disease activity and randomized controlled studies of the effects of psychological interventions on disease course in IBD. Controlled retrospective studies were included in the review of aspects of the stress-inflammatory relationship for which few prospective studies are available (e.g. the link between stress and disease onset). Studies were assessed qualitatively. Among 9 longitudinal studies of stress or depression and disease course, a significant stress-inflammation relationship has been found when UC and CD are studied independently (4 of 4 studies positive) but studies of mixed samples of CD and UC have mostly had negative results (1 of 5 studies positive). Evidence of a contribution of stress to disease onset is very weak. The results of 5 studies of psychological interventions in IBD have been negative or modestly supportive of benefit. Confidence in therapeutic benefits of psychological interventions results is limited by methodological weaknesses in these studies. There is consistent evidence for a contribution of psychological factors to IBD disease course, especially stress in UC and depressive symptoms in CD. More rigorous tests of psychological interventions in IBD are needed.
2023-09-19T01:26:51.906118
https://example.com/article/9824
Q: How to select samples from a 2-dimensional numpy array? I need to select some cells in a 2D NumPy matrix according to a list. However, the following code a = np.array([[1,2,3],[4,5,6],[7,8,9]]) b = [(1,1), (1,2), (2,1)] a[b] raises the following error: --------------------------------------------------------------------------- IndexError Traceback (most recent call last) <ipython-input-195-a8bd6862e58c> in <module>() 1 a = np.array([[1,2,3],[4,5,6],[7,8,9]]) 2 b = [(1,1), (1,2), (2,1)] ----> 3 a[b] IndexError: too many indices for array However, the correct result needs to be (5, 6, 8). I could have done it using the following piece of code, however, I wonder if there are any more efficient ways of doing this (in a numpy vectorized fashion)? The code which works: map(lambda (x): a[x], b) Thanks in advance. A: transpose b with zip, and then use it as index: a[tuple(zip(*b))] # array([5, 6, 8]) Which is equivalent to: row, col = zip(*b) a[row, col]
2023-10-01T01:26:51.906118
https://example.com/article/5622
Rack 2 game download - Rack 2: Furry Science People like that stuff. You might as well ask: It's fun, rack 2 game download gives the game a particular vibe that at least some people like. It can serve characters and plot but agme it doesn't, it's still fine. While I completely failed to mention this, my rack 2 game download was more from a marketing and revenue perspective in that specific point. If you have a good underlying game wouldn't it just be better to release it to a wider target audience without the ero component? Then again the ero component might bring in more sales from a niche audience. Unfortunately a lot perhaps the majority of ero games target a specific demographic and are able dlwnload get sales with a product that doesn't have a great underlying game. What I was rack 2 game download of getting at was downlowd you have a good game already wouldn't to be better to appeal to a wider market instead of limiting the scope to the candy shop sex game market. Basically if I understand things correctly, ero games are released targeting their specific demographic and if they are "good enough" they will get a console port that censors the game for a wider audience. Its a having your cake and eating too kind of scenario. With Katawa Shoujo they did both. There rock candy - christmas flash an for the h-scenes to be disabled turned off and the gameplay pretty much works with or without them although there's an argument that Hanako's h-scene is instrinsic rack 2 game download her route. But the point is many people played it downlosd the game itself and got the bonus of the h-scenes or not if they so chose while others got it for the cripple porn and get a healthy dose of the feels. You can have mature themes and scenes in a game just as you can have in a movie or book or graphic rack 2 game download without them being outright pr0n. It's just how you handle them. It's just more vanilla in general, which is kind of nice and surprising considering they're the same people who make all the Rance titles. A nice thing about Alice Soft titles is also that the writing doesn't beat around the bush too so story segments tend not to overstay their welcome, which is something I absolutely loath in a huge number of VNs and JRPGs in general. Daibanchou also focuses much rack 2 game download on individual character's stories, and has a veritable fuckton of different characters to gather. Gameplay becomes pretty easy to understand after a short while and doesn't have too many abstract concepts despite containing very little of a tutorial. I still refer to a guide for characters since there's an absurd amount of checks for certain events with them that you can't really find out intuitively, but hey, that's kinda the nature of the beast. It just has so many secrets and events to discover that simply cannot be done on one playthrough. The first point you mentioned there is heavily why I feel adult content should be less stigmatized in games. There's an entire portion of "being human" that is often completely ignored in games; sexuality. It might take some sort of rogue, blockbuster hit rack 2 game download really open the floodgates though; take Deadpool for example. The movie was deemed by rack 2 game download lot of people in Hollywood prior to release as being suicidal in the box office for making it a superhero movie that was not only rated R, but had everyone in thier original, colorful, comic book outfits. The movie smashed box office records and in reaction many movie vame scrambled to "up the ratings" of thier movies, something pretty unheard of nowadays with everyone usually trying to do the exact opposite. Eventually, there might be something like rack 2 game download for the western rack 2 game download dev scene, but as for how long it'll take for something like that to come out, who knows. Basically every Steam released visual novel does this, as well as most if not almost every console ported visual novel released in Japan. IIRC Alicesoft the Rance devs, they're great has also released a few console versions of their games, like Toshin Toshi for the 3DS, with most of the lewder content removed. Pretty borderline stuff though. Doanload off, thanks to OP for the mention! I just thought I'd share with you guys that my goal for the project above all else is to have a quality game in the end. Downloqd don't really approach the adult content as the main focus. I am rack 2 game download drawing influence from games like Leisure Suit Larry, where the game can stand up watch out behind you hunter its own to other titles that downloas being released in the general industry, but I'm not afraid to dive into gratuitous sex and adult content as part of the game-play. I don't really feel it's any different than watching Game of Thrones. Hell, if GoT vownload get away with actually showing penetration without getting a "porn" rating, they probably would. I feel like that thin line between "R" rated and "porn" is constantly getting thinner with what is being put out by mainstream entertainment these days. Above all, House Party aims for good puzzle-solving, comedy, strip poker game online game-play, and uses the adult content as a player reward. I'm an avid gamer, and I feel like there are a lot of elements in House Party that you downlowd really even see in AAA non-adult games, and I am intentionally trying to raise the bar in some areas, especially utilizing a lot of the newer tools available to developers these days. Some of those mechanics IMO need rack 2 game download be there because when a game allows you to get to a depth where you can start getting intimate with the characters, it really helps if the environment is immersive and the characters are able to look at you and interact with you realistically. Whoever made rack 2 game download boob physics comment about my game; point taken. I am aiming for realistic. Consider that being worked on. When I decide which way I'm going to stick with, I will do a lot more tweaking. Also, as a side-note; OP mentioned that there porn flash games currently no sex scenes just nudity in the game rack 2 game download of right now. This is correct, however the first sex scene is going to be included in the next build that is slated rack 2 game download just after the new year. Hey, I'm another amateur indie game dev, a few people in here also seem to be devs, so I figured I'd give my take on this. I feel like the industry is very much at the cusp of exploding in rack 2 game download west; fack in a tame way, but in a good way. There are more and more games that are starting to represent actual high quality indie productions; they're not at the level that Japan's AAA titles are with a large amount of staff, but they're definitely getting rack 2 game download, closer and closer. People are starting to hire musicians, voice rack 2 game download, multiple artists, and incorporating more complex game mechanics and storylines within their games. That in itself isn't the mario hentai game which way you go with your game ; I think the real problem is that whatever game you make, what really needs to happen in the western hentai breeding season h game community for this stuff to become more and more approachable and stronger of a market is for the stigma in general towards hentai to lessen in the west, if even only a little. As for how to do that, there's no real clear answer; large businesses like Nutaku offering up their stuff as a marketplace, as well as Itch. If anything, one thing I can say we probably need to move past is to stop using pre-existing IPs for our hentai games; while this works really well in Japan, that's because copyright is practically non-existent or rarely enforced for hentai productions, but here, all it really does is in my opinion continue to stigmatize said games as downloac or "parodies", making it harder for people to take them seriously. On a different topicone piece of advice I would also have for possible pledgers to Patreon accounts too is to check the "posts" tab before pledging; if they haven't updated in over a month, you might want to rethink pledging to them. If they also aren't responding to ANY of their "community" posts, this might also be a red flag. Conversely, if you're a Patreon dev, try your best to update at least times a month, even if it's just progress updates; these people are giving you thier hard earned money, and rack 2 game download deserve to know that it's being put to use. Try your best to respond to community questions also; these are publicly visible, so your public ravk skills here can possibly secure you people that were on the fence about pledging to you. Also, if you really want to go the distance, rack 2 game download refunds; this allows people to feel a lot safer about taking the risk in pledging to you, and shows people that you're more concerned over whether they feel they've business trip adventure a good value than rack 2 game download taking them for all rack 2 game download worth. I figure here at the end for anyone curious, I should link my Patreons; each game is a different team, so no work on any given game is slowed down by any other given game existing. The the sex therapist 4 a naughty neighbour two games will have demos out within the next two rack 2 game download, too. Hard Corps. Has a public, yet outdated demo right here. A post I made a while back asking 'how do we design a fundamentally sexy dowjload I will recommend The Last Sovereign patreon. Fek – Furry Science: Rack 2 (InProgress/Win/Mac) Ver.0.1.6 The gameplay isn't anything special, but the story is surprisingly good. Just going to disagree with one point: I was drawn in by the unorthodox gaming elements - eownload times in the game you get limited choice options in which you don't find out the results until much later. The investments you can make, the tactics and dodnload you use in war not battlethe diplomatic decisions you make, and even how you spend days improving your character are all fun elements you rarely virtual girlfriend sex in other rpgs. Entire updates pass by with vame or limited combat and I don't mind at all! Was hoping someone else had mentioned it! Great game, I've replayed it like times now thanks to the fact that more stuff gets rack 2 game download every month. Would also recommend Sierra's other games like Ouroborous and Noxian Nights. I kind of wish Ouroboros weren't an H-game. The sex scenes are peripheral at best, rack 2 game download distract from the really fascinating things going on in the dowload and rafk of the game. Vagueness intentional to avoid spoiling anyone who hasn't played it. Rack 2 game download those people: But the fact that there's porn in it really limits the field of rack 2 game download I can recommend it to. Well considering how the protagonists decide to use the end zone, I'd say it works just fine with sex. Gzme I do see your point in it being almost better as a SFW boobs torrent, since its story mechanic is rather unique compared to how it handles the world. Man is it hard not to spoil while trying to explain why a game should be the way it is. Play the largest selection of free online games at Games on administracionpremios.com! Including puzzle games, card games, casino games, strategy games and many more! Play Game. Top trending videos of the day. Scroll to Could Your Sex Life Be Messing With Your Workouts? JOIN AOL DOWNLOADS HELP FEEDBACK. Yeah, it's not that the sexual component is incoherent with the plot as currently written, but I think the hypothetical Jsk games english version could be just as coherent, and might have received rack 2 game download reception as an art game on par with Braid or The Stanley Parable. Alicesoft makes some of the best games I've played, and they're basically all some form of porn. IIRC they've got Mangagamer or somesuch rack 2 game download officially localizing their games now as well, so that's something to look forward to even if you're not interested in the porn aspects of their games. The mods on SDT can get pretty insane and actually have a lot of strategy to them. FEATURED PHOTO If only the base wasn't so buggy. I think if the US actually started making these games we could probably dominate rack 2 game download genre if only because of that. Your typical japanese Eroge is often a very complex game, offering many different things. Of course this is gross generalization rack 2 game download there ton of Japanese eroge that often specializes in certain parts, but overall a Eroge often will attract people for a myriad of differences. A large portion of Eroge players often are girls and people who are not interest in erotic material. They rack 2 game download auto skip cartoon se games the sexy bits to get back to the story, character, and romance. The Flaw Western Porn games always suffered from is they always been one dimensional. It just something to masturbate to, nothing more. Its incredibly niche, offering only a single thing to a very small audience of people. I feel "Stigma" is just a excuse to make shitty games. Just look how absurdly team titans trainer Japanese Ero games are doing. They utterly destroyed the Stigma against them. They have grown from only having a single Localization company to having dozen of different publishers looking to get a piece of the pie. Waaay more than Graphtreon reports over 10k NSFW rack 2 game download creators. Patreon is definitely a game changer. I've always enjoyed adult games. I like having to earn the titillation sometimes. Sometimes porn is just too easy, too accessible. It's nice to have a challenge a schoolgirl fantasy. Given that, there's also been a fairly rack 2 game download number of good games that scratch that itch. As a game developer, I'd always wanted to create a sexy game where you can earn the sexual interactions. Seeing the success of some other developers on Patreon, it became obvious that a lot of other people were also interested in this kind of content, and willing to pay for it. Now, I don't do it for the money, but even doing it as a hobby can cost a lot to really hot sand something decent. I've probably spent several thousand dollars on assets that would have taken me anywhere from a month to forever to build. It's nice to know that there's a possibility of recouping some of those costs. It's also very nice to see that some people are willing to part with any money for your work. I might spend a racck dozen minutes on any porn game if it looks legend of krytal decent, but for someone to actually say, "Yea, this has value enough for me to pay for it" even if it's a rxck a month. That's a huge boost of validation. I've got a small number of Patrons currently, but even with rack 2 game download it's keeps me motivated. I've committed myself to weekly rack 2 game download and have done so for about the last year of development. Some weeks can be hard. Life happens, but making sure that I have something to show my Adult flash sex games in my weekly update is a enormous motivator. Let's Play Rack part 2 - administracionpremios.com Snow Bunny 3. Jack Pool. For your safety and privacy, this link has been disabled. OK Cancel. To view the video, this page requires javascript to be enabled. Login or sign up. Logging in Remember me on rack 2 game download computer not recommended on public or shared computers. Forgot Username or Password? Resend confirmation email. Not a free member yet? Here's what you're missing out on! Sign Up. A text message with your code has been sent to: Didn't receive the code? Don't have your phone? Please contact support. Create a new Playlist. Please enter the required information. Add Tag. Sign in to add this to a playlist. Sign in to remove this from recommended. You are now leaving Pornhub. Go Back You are now leaving Pornhub. Suggest Categories. Gmae By Traffic Junky. Add to. Suggest new categories x. Suggest rack 2 game download pornstars x. But don't worry, we aren't charging you again. Please check back again in the future when you can become a Fan. The Pornhub team is always updating and adding more porn videos every day. We have a huge free Gake selection that you can download or stream. Pornhub is the most complete and revolutionary porn rack 2 game download site. We offer streaming porn videos, downloadable DVDs, photo albums, and the number 1 free sex community downooad the net. We're always working towards adding more features that will keep your love for porno alive and well. For the safety and privacy of your Pornhub account, fame to never enter your password on any site other than pornhub. Hentai dating sim game your safety and privacy, this link has been disabled. OK Cancel. To view the video, this page requires javascript to be enabled. Rack 2 game download or sign up. Logging in Remember me on this computer not recommended on public or shared computers. Forgot Username or Password? Resend confirmation email. Not a free member yet? Here's what you're missing out on! Sign Up. Eownload text message with your code has been sent to: Didn't receive the code?
2023-12-09T01:26:51.906118
https://example.com/article/7216
Mothers' experiences of their child's recovery in hospital and at home: a qualitative investigation. Decreasing hospital stays, increasing day surgery and the assumption that parents will manage their child at home necessitate research into children's recovery. Given the scarcity of studies seeking parents' perspectives, this exploratory and interpretive study is timely, presenting a detailed account of mothers' experiences of managing their child's recovery in hospital and at home. The study supports the view that recovery begins not with discharge, but with admission and before, as hospital experiences directly shape the recovery process. Mothers' experiences of hospital's recovery enablers and inhibitors suggest that good recovery practices and policies remain erratic. Following discharge, parents help the child 'back to normal' by 'reading the recovering child' and balancing the child's desire for activity with the need for caution and safety. Developing a deeper understanding of parents' recovery experiences and perceptions would help nurses to form an empathic 'grounding' upon which to base improvements in children's recovery care.
2023-11-06T01:26:51.906118
https://example.com/article/9742
Jahangir Mahmoudi Jahangir Mahmoudi is an Iranian lawyer, human rights activist and politician. Mahmoudi is the founder of "Khuzestan defenders party". In late August 2004, he was arrested and jailed in Ahvaz, Iran due to his opposition to the Iranian regime. On August 25, 2010, officials from the Special Clerical Court stated that Jahangir Mahmoudi had been arrested as a result of his intentions to represent a number of political prisoners after repeated inquiries by his wife. Mahmoudi is currently being held at the Isfahan Prison. The trials of the political prisoners will continue without the presence of their lawyers. See also Khuzestan References Category:Iranian dissidents Category:Iranian human rights activists Category:Living people Category:Year of birth missing (living people)
2024-04-29T01:26:51.906118
https://example.com/article/7457
John Kerry Describes Why Air Conditioners Are as Deadly as ISIS OVER THE ATLANTIC (The Barbed Wire) – Flying back to the States from another failed foreign policy mission, Secretary of State John Kerry was asked by the press to clarify his recent asinine remarks that equated air conditioners being as deadly to our population as ISIS. Here is Kerry’s response: Those of you who know me know what a complete loon I am about climate change, global warming, whatever we want to call it. That’s not what I’m talking about here. I read in the paper that media reports had twisted my remarks to mean that air conditioners put out emissions that harm the environment. That they cause damage to the ozone layer, which could cause widespread death. That’s not what I’m saying at all. I’m saying that if air conditioner units were dropped from planes, they could cause as much damage as members of ISIS. We’ve conducted experiments in lab settings where an AC unit was dropped from the sky on test dummies and they were either crushed, beheaded, or looked like they had been blown up. In one test, we simulated a dummy who happened to be a welder. When the AC unit came crashing down from above, the impact struck part of the welding equipment and sparked a fire – burning the dummy alive. Just like ISIS has done to some of their victims. You can see how, if you were standing under one of those falling air conditioner units, you could be hurt just as badly as if you were attacked by members of ISIS. Imagine a terror attack where ISIS loaded a plane with AC units and flew over a major city, randomly dropping them on people below. I know, it’s a terrifying thought.”
2024-03-07T01:26:51.906118
https://example.com/article/8144
Capsaicin or vanilloid receptors (VRs) participate in the sensation of thermal and inflammatory pain. The cloned (VR1) and native VRs are non-selective cation channels directly activated by noxious heat, extracellular protons and vanilloid compounds. However, considerable attention has focused on identifying other signaling pathways in VR activation, and this search has gained more significance given the findings that VR1 is expressed in non-sensory tissue and may mediate inflammatory rather than acute thermal pain. Protein kinase C (PKC) plays an important role in pain signaling. Targeted deletion of PKC epsilon in mice dramatically attenuates thermal- and acid-induced hyperalgesia. In turn, activation of PKC epsilon potentiates heat-evoked currents in sensory neurons. Further, the algesic peptide, bradykinin, potentiates heat responses, induces depolarization and evokes secretion from vanilloid-sensitive neurons in a PKC-dependent manner. Yet the molecular targets for these effects have not been clearly identified. In this study we will test the hypothesis that the VR is directly activated by PKC -mediated phosphorylation in the absence of any other agonist. We propose that the pro-inflammatory peptide bradykinin induces VR activity and that this occurs via the stimulation of PKC. We will also test the hypothesis that in the phosphorylated state, a subthreshold stimulus will be sufficient to maximally activate the VR. We propose that phosphorylation of the channel functions as a gain control to modulate the efficacy and sensitivity of VR activation. In this way a range of normally benign stimuli will become potent activators of VRs. This research has important implications for understanding the role of VRs in hyperalgesia, chronic pain and other non-sensory functions.
2024-02-15T01:26:51.906118
https://example.com/article/6393
Results "Kane was fantastic to deal with. He did a fantastic job, the finishing was very tidy, the site was tidy. He communicated when needed through the job and fixed other small issues after getting approval. Kane was always on time. I recommend Kane and will definitely use him again." "Joe is an owner operator and this shows in the way he goes the extra mile.The job undertaken by Joe was on our rental property and we found Joes workmanship, communication and ability to work within our tight budget to be excellent. I would highly recommend anybody to use Joes services and we will be again in the future.Grant and Rebecca" "James and the team from Concept Decks took a very untidy hotch potch of areas and covered them with a superb deck. It has been made with care and thoughtfulness along the way. I appreciated the advice given and craftsmanship delivered. Nice guys and a pleasure to have on site. Definitely recommended. Thanks." "Blair and his team did a brilliant job clearing and tidying my mum's very tired and overgrown section, getting it ready for sale. I thought it would take a few days but his team blitzed it all in one day and the results were fantastic. Really easy to deal with, accommodating with timings - I would highly recommend these guys." "Darrin has completed a significant amount of work from plastering new gib to skim coating existing ceilings.He was always on time and nothing was too much trouble with changes/additions. His attention to detail is outstanding and the quality of the work A1. We have no hesitation in recommending Darrin to anybody - in fact we have stated to numerous people that if you need plastering to be done,…" "We recently contracted Advanced Concrete to sort out a basement flooding problem. Phil did an outstanding job on creating a french/trench drain which has sorted out the problem. Phil had to manually dig the trench and resolve a poor drainage solution that a previous contractor had implemented. Phil is an old school tradie, who takes a lot of pride in his work. He did the job quickly and…"
2023-08-23T01:26:51.906118
https://example.com/article/4032
Oh boy. You knew this was going to be LIT! Rep. Matt Gaetz (R-FL), a Trump favorite, joined the ladies of the far left The View today to discuss politics. Right out of the gate Matt went after the death of the Democrat Party last night during their raucous debate. They didn’t know what to do with him. This was brutal! TRENDING: Obama Statement on Ginsburg Demands GOP Senate Honors Her Dying 'Instructions' and Put Off Vote on Supreme Court Nominee Until New President Sworn In Interesting to see Meghan McCain jump in only to bash Roger Stone. Matt Gaetz TORE THEM APART. Meghan McCain then claimed she was a conservative. What a joke. Update: Matt Gaetz trolled Joy Behar and The View following his appearance.
2023-11-25T01:26:51.906118
https://example.com/article/2748
Captain America Civil War The Prodigy's Blog "Superheroes" Summer is quickly approaching and with it comes an armada of awesome movies. This year’s lineup has started off strong with Captain America Civil War which BJ and I got to see yesterday. I won't spoil anything but the movie was epic and I recommend going to see it. After the movie, hyped for all...
2024-07-05T01:26:51.906118
https://example.com/article/8401
Ivan Kinčík Ivan Kinčík (born 17 September 1984) is a Slovak former competitive figure skater. He represented Slovakia at four World Junior Championships and one European Championship. He reached the free skate at the 2003 World Junior Championships in Ostrava, Czech Republic. Programs Competitive highlights References External links Category:1984 births Category:Slovak male single skaters Category:Living people Category:Sportspeople from Bratislava
2024-06-11T01:26:51.906118
https://example.com/article/6461
Treasury roles, covering missions such as prevention and investigation of counterfeiting of U.S. currency and U.S. treasury bonds notes and investigation of major fraud. Protective roles, ensuring the safety of current and former national leaders and their families, such as the President, past Presidents, Vice Presidents, presidential candidates, foreign embassies (per an agreement with the US State Department's Bureau of Diplomatic Security (DS) Office of Foreign Missions (OFM)), etc. The Secret Service's initial responsibility was to investigate crimes related to the Treasury and then evolved into the United States' first domestic intelligence and counterintelligence agency. Many of the agency's missions were later taken over by subsequent agencies such as the FBI, ATF, and IRS. The agency combines the resources of academia; the private sector; and Federal, State, and Local law enforcement agencies to combat computer-based threats to the U.S. financial payment systems and critical infrastructures. In addition, these combined resources allow ECTF to identify and address potential cybervulnerabilities before the criminal element exploits them. This proactive approach has successfully prevented cyber attacks that otherwise would have resulted in large-scale financial losses for the American public and U.S.-based companies or disruption of critical infrastructures. Since onlinechild pornography crime is not a core violation for the agency, it has pursued fewer investigations involving this crime than other crimes, such as counterfeiting. However, some USSS field offices with a background in these areas as well as digital forensic capabilities investigate these crimes.
2024-04-20T01:26:51.906118
https://example.com/article/9009
Great Barrier Reef in danger according to UN report Owen Jacques is an award-winning investigative journalist from Mackay, now based on the Sunshine Coast as APN Australian Regional Media’s Online News Editor. He has a strong background reporting on politics, business and breaking news. Owen has also specialised in resources reporting, which included a successful campaign to fight 100% fly-in, fly-out mining in rural Queensland towns. THE State Government is convinced it will avoid the Great Barrier Reef being deemed under threat by United Nations' environmental arm after UNESCO raised concerns in a new report. The group gave some praise to both the Queensland and Federal Government but warned that with up to 43 proposed developments along the coastline of the reef, UNESCO would still recommend the reef's status be listed as "in danger". To avoid this, both levels of government must act before February 1 next year. Queensland Environment Minister Andrew Powell said the LNP government was already reviewing Gladstone Harbour and putting together a ports strategy - two issues highlighted in the report. It was already assessing the health of the reef through the Great Barrier Reef Marine Park Authority with the Federal Government. UNESCO named the $1 billion Balaclava Island coal terminal planned by Glencore-Xstrata 40km north of Gladstone along with the $1.2 billion Fitzroy Terminal near Port Alma as being of particular concern. "The work we have under way - and it's acknowledged in the draft report - will be completed by the timeframes set by UNESCO," Mr Powell said. Prime Minister Julia Gillard also said the improvements would be made, citing a $200 million commitment to Reef Rescue, a program that helps primary producers improve their water quality. "It's about working with farmers in a way that increases their productivity but also decreases the amount of run-off that then goes into the waters of the Great Barrier Reef," she said. World Wildlife Foundation Australia disagreed - it felt UNESCO had put Australia in the sin bin. Spokesman Richard Leck referred to parts of the report in which UNESCO demanded no new port developments beyond already designated areas and that building along the coast of the reef be restricted.
2023-08-29T01:26:51.906118
https://example.com/article/5999
Followers Pages maandag 7 maart 2011 Comparison between 2 green jelly´s with glitter Goodmorning! Another monday, damn, time flies. Today I´m showing you the comparison I promised last week. When applying Finger Paints Mistletoe Mischief it reminded me a lot of China Glaze Emerald Sparkle. So of course I wanted to put them side by side on my nails. I used 3 coats for each of them. I think Mistletoe Mischief is a little more jelly and that makes it less opaque. Application was fine on both of them. A 4th coat on Mistletoe Mischief would have probably made them dupes. But now you do see some difference, mainly in opacity. The colors are pretty much the same and the glitter too. I think Emerald Sparkle will stay my favorite because it´s more opaque. Less is more, haha. Maybe you ladies can help me out. I´m looking for a green with holo glitter. Something like ChG Atlantis, but more and darker green. Any of you have an idea? Especially for something easy to find. Funky Fingers Blitzen is very nice (and on my wishlist) but hard to find for me since I live in the Netherlands. And I would like something darker than Blitzen. So maybe like Emerald Sparkle, but with holo glitter. I don´t mind if it´s chunky glitter or small glitter. Or maybe someone likes to franken something like that??? :D
2024-07-02T01:26:51.906118
https://example.com/article/5066
Q: Is a compiler allowed to remove assignments to struct member if it is not obviously used? Consider the following code: char buffer[256]; struct stX { int a; int b; int c; }; void * my_memcpy ( void * destination, const void * source, size_t num ); int main() { struct stX x; x.a = 1; x.b = 2; x.c = 3; my_memcpy(buffer, &x.b, 2 * sizeof(int)); { int i; for (i = 0; i < 2 * sizeof(int); ++i) { printf("%d\n", buffer[i]); } } return 0; } A particular compiler for embedded systems decides to remove the assignments to x.a and x.c (since they are never used (at least not obviously)). Is this an optimization the c standard allows? Of course, defining the structure instance as volatile leads in the assignment being included. gcc and msvc do not perform this optimization (but this is not really a reasoning). Update: As some answers (correctly) assumed, the compiler could optimize due to the known definition of memcpy, however, this is not what my particular implementation does. (It reserves the memory for the struct on the stack, just does not perform the assignments.) Let's assume we replaced the memcpy with a function for which the compiler has no definition available. Also, let's assume the buffer is used after the function call. I updated the sample code above accordingly. A: Yes, the compiler is free to do anything so long as the observable behaviour of the application is unaltered.* But this assumes that you have a conforming program, i.e. one with well-defined behaviour. Your code doesn't exhibit well-defined behaviour; it is not valid to access x.c by dereferencing a pointer to x.b (which is what you're implicitly asking memcpy to do). Update: The paragraph above may not be correct; please see the discussion in the comments... * For a more stringent definition, see section 5.1.2.3 of the C99 standard: Accessing a volatile object, modifying an object, modifying a file, or calling a function that does any of those operations are all side effects, which are changes in the state of the execution environment. ... An actual implementation need not evaluate part of an expression if it can deduce that its value is not used and that no needed side effects are produced
2023-11-22T01:26:51.906118
https://example.com/article/9867
1. Field of the Invention This divisional application relates generally to magnetic disk data storage systems, and more particularly to methods for making magnetic write transducers. 2. Description of the Background Art Magnetic disk drives are used to store and retrieve data for digital electronic apparatuses such as computers. In FIGS. 1A and 1B, a magnetic disk data storage systems of the prior art includes a sealed enclosure 12, a disk drive motor 14, a magnetic disk 16, supported for rotation by a drive spindle S1 of motor 14, an actuator 18 and an arm 20 attached to an actuator spindle S2 of actuator 18. A suspension 22 is coupled at one end to the arm 20, and at its other end to a read/write head or transducer 24. The transducer 24 (which will be described in greater detail with reference to FIG. 2A) typically includes an inductive write element with a sensor read element. As the motor 14 rotates the magnetic disk 16, as indicated by the arrow R, an air bearing is formed under the transducer 24 causing it to lift slightly off of the surface of the magnetic disk 16, or, as it is termed in the art, to “fly” above the magnetic disk 16. Alternatively, some transducers, known as “contact heads,” ride on the disk surface. Various magnetic “tracks” of information can be written to and/or read from the magnetic disk 16 as the actuator 18 causes the transducer 24 to pivot in a short arc as indicated by the arrows P. The design and manufacture of magnetic disk data storage systems is well known to those skilled in the art. FIG. 2A depicts a magnetic read/write head 24 including a substrate 25 above which a read element 26 and a write element 28 are disposed. Edges of the read element 26 and write element 28 also define an air bearing surface ABS, in a plane 29, which can be aligned to face the surface of the magnetic disk 16 (see FIGS. 1A and 1B). The read element 26 includes a first shield 30, an intermediate layer 32, which functions as a second shield, and a read sensor 34 that is located within a dielectric medium 35 between the first shield 30 and the second shield 32. The most common type of read sensor 34 used in the read/write head 24 is the magnetoresistive (AMR or GMR) sensor, which is used to detect magnetic field signals from a magnetic medium through changing resistance in the read sensor. The write element 28 is typically an inductive write element, which includes the intermediate layer 32, which functions as a first pole, and a second pole 38 disposed above the first pole 32. The first pole 32 and the second pole 38 are attached to each other by a backgap portion 40, with these three elements collectively forming a yoke 41. Above and attached to the first pole 32 at a first pole tip portion 43, is a first pole pedestal 42 abutting the ABS. In addition, a second pole pedestal 44 is attached to the second pole 38 at a second pole tip portion 45 and aligned with the first pole pedestal 42. This area including the first and second poles 42 and 44 near the ABS is sometimes referred to as the yoke tip region 46. A write gap 36 is formed between the first and second pole pedestals 42 and 44 in the yoke tip region 46. The write gap 36 is filled with a non-magnetic material. This non-magnetic material can be either integral with (as is shown here) or separate from a first insulation layer 47 that lies below the second pole 38 and extends from the yoke tip region 46 to the backgap portion 40. Also included in write element 28 is a conductive coil 48, formed of multiple winds 49, that is positioned within a dielectric medium 50 that lies above the first insulation layer 47. As is well known to those skilled in the art, these elements operate to magnetically write data on a magnetic medium such as a magnetic disk 16. More specifically, an inductive write head such as that shown in FIGS. 2A–2C operates by passing a writing current through the conductive coil layer 48. Because of the magnetic properties of the yoke 41, a magnetic flux is induced in the yoke 41 by write currents that are passed through the coil layer 48. The write gap 36 allows the magnetic flux to fringe out from the yoke 41 (thus forming a fringing gap field) and to cross a magnetic recording medium that is placed near the ABS. A critical parameter of a magnetic write element is a trackwidth of the write element, which determines a magnetic write width (MWW), and therefore drives the recording track density. For example, a narrower trackwidth can result in a narrower MWW and a higher magnetic recording density. The trackwidth is affected by geometries in the yoke tip portion 46 (see FIG. 2A) at the ABS. These geometries can be better understood with reference to FIG. 2B, a view taken along line 2B—2B of FIG. 2A. As can be seen from FIG. 2B, the first and second poles 32, 38 can have different widths W1, W2 respectively in the yoke tip portion 46 (see FIG. 2A). In the shown configuration, the trackwidth of the write element 28 is defined by the width Wp of the second pole pedestal 44. As can be better seen from the plan view of FIG. 2C taken along line 2C—2C of FIG. 2B, the width Wp of the pole pedestals typically is substantially uniform. The gap field of the write element also can be affected by the throat height TH, which is measured from the ABS to the zero throat ZT, as shown in FIG. 2A. Thus, accurate definition of the both trackwidth and throat height is critical during the fabrication of the write element. However, the control of trackwidth and throat height can be limited with typical fabrication processes, such as masking and plating at the wafer level. For example, the trackwidth sigma σtw, can be limited to a minimum of 0.07 microns. These problems are further aggravated with increasing topography over which the trackwidth-defining element is formed. Such topography is created by the various heights of other elements that have been formed before the trackwidth-defining element is formed. Greater trackwidth control can be attempted using other processes such as focused ion beam (FIB) milling, however such processes can be expensive. Alternatively, the trackwidth can be defined by the first pole width W1. However, such processes can also be expensive, complex, and result in lower production yields. It can also be very difficult and expensive to form very small trackwidths using typical processes. Therefore, forming a pole pedestal having a trackwidth of about 1.25 microns can be very difficult and expensive, with smaller trackwidths posing even greater challenges. When demand for higher density writing capabilities drives smaller trackwidths, this aspect of fabrication becomes increasingly problematic. An additional disadvantage of some current write element configurations, such as those shown in FIGS. 2A–2C, is a secondary pulse phenomenon that can degrade recording performance. Typically, an intended primary pulse is generated to record a single bit of data. However, due to magnetic saturation at the interface between the second pole pedestal 44 and the second pole tip portion 45, an unintended second pulse may be produced just after the primary pulse. As linear density increases, in other words, as one attempts to write bits closer together and primary pulses follow one another more closely, this second pulse effect may distort the waveforms of the primary pulses. Such distortions generated by the prior art write elements shown in FIGS. 2A–2C when operated at high linear densities makes them unsuitable for high density magnetic recording applications. Accordingly, what is desired is a write element that is effective for applications having data densities on the order of 40 Gbits/in2 with a trackwidth of less than about 1 micron and exhibiting substantially no secondary pulse phenomenon. Further, it is desired to achieve these qualities inexpensively, easily, and while maximizing throughput.
2024-03-08T01:26:51.906118
https://example.com/article/2692
Successful use of ECT as the sole modality of treatment in a case of motility psychosis. Episodic psychoses characterized by predominant abnormalities of movement are called motility psychoses in Leonhard's classification of endogenous psychoses. They have been treated with a variety of methods, including ECT and lithium. Here we describe a case of motility psychosis that was successfully managed with ECT as the only modality of treatment.
2023-12-14T01:26:51.906118
https://example.com/article/1521
Q: finding shared column information - a least common ancestor question I have a data.frame object consisting of columns of information that is tree-like. For instance, I have performed a search of a set of features (query_name) and returned a set of potential matches (match_name). Every match has an associated location that is split into continent, country, region, and town. The problem I'd like to resolve is finding, for a given query_name, the location information that all potential matches have in common. For example, with this bit of example data: query_name <- c(rep("feature1", 3), rep("feature2", 2), rep("feature3", 4)) match_name <- paste0("match", seq(1:9)) continent <- c(rep("NorthAmerica", 3), rep("NorthAmerica", 2), rep("Europe", 4)) country <- c(rep("UnitedStates", 3), rep("Canada", 2), rep("Germany", 4)) region <- c(rep("NewYork", 3), "Ontario", NA, rep("Bayern", 2), rep("Berlin", 2)) town <- c("Manhattan", "Albany", "Buffalo", "Toronto", NA, "Munich", "Nuremberg", "Berlin", "Frankfurt") data <- data.frame(query_name, match_name, continent, country, region, town) We'd generate this data.frame object: query_name match_name continent country region town 1 feature1 match1 NorthAmerica UnitedStates NewYork Manhattan 2 feature1 match2 NorthAmerica UnitedStates NewYork Albany 3 feature1 match3 NorthAmerica UnitedStates NewYork Buffalo 4 feature2 match4 NorthAmerica Canada Ontario Toronto 5 feature2 match5 NorthAmerica Canada <NA> <NA> 6 feature3 match6 Europe Germany Bayern Munich 7 feature3 match7 Europe Germany Bayern Nuremberg 8 feature3 match8 Europe Germany Berlin Berlin 9 feature3 match9 Europe Germany Berlin Frankfurt I'm hoping to get advice on how to construct a function that will produce the result below. Note that shared location information is now concatenated and separated with a ; delimiter. Feature1 differs only at the town information, thus the returned string contains the continent through region information. Feature2 doesn't differ at region or town in the two matches here because one of the two matches contains no information. Nevertheless, lack of information is considered distinct from values with information, so the only thing shared in common for feature2 matches are continent and country. Feature3 contains shared continent and country information, but distinct region and town, so just continent and country are retained. Hoping for an output file that looks like this: query_name location_output feature1 NorthAmerica;UnitedStates;NewYork; feature2 NorthAmerica;Canada;; feature3 Europe;Germany;; Thanks for any advice you can spare. Cheers! A: Here is an option library(tidyverse) data %>% gather(key, val, -query_name, -match_name) %>% select(-match_name, -key) %>% group_by(query_name, val) %>% add_count() %>% group_by(query_name) %>% filter(n == max(n)) %>% summarise(location_output = paste0(unique(val[!is.na(val)]), collapse = ";")) ## A tibble: 3 x 2 # query_name location_output # <fct> <chr> #1 feature1 NorthAmerica;UnitedStates;NewYork #2 feature2 NorthAmerica;Canada #3 feature3 Europe;Germany
2024-06-09T01:26:51.906118
https://example.com/article/1330
Understanding the biopsychosocial aspects of HIV disclosure among HIV-positive gay men in Scotland. This study presents an interpretative phenomenological analysis of the experiential accounts of HIV-positive gay men. Participants took part in open-ended interviews. Three key-related recurrent themes are presented: 'Disclosure, deliberation and the abject other'; 'Disclosure, care and the valued other' and 'Disclosure and intimate citizenship'. These highlight the complex, situated and mindful ways in which disclosure occurs. They stand in contrast to the understandings of HIV status disclosure as a 'health behaviour' deracinated from its social, relational and emotional dimensions. We explore the findings in relation to contemporary HIV prevention (with its increasing biomedical slant) and in relation to a biopsychosocial framework.
2023-09-25T01:26:51.906118
https://example.com/article/5309
Momofuku Ando: The man whose instant ramen saved college students from starvation A Google Doodle honors Momofuku Ando, the man who invented instant ramen, on his 105th birthday. While Top Ramen may take only three minutes to cook, Ando's recipe took much longer to develop. By Samantha Laine, Staff Writer / March 5, 2015 View video Kim Kyung-Hoon/Reuters/File (Read caption) A woman chooses instant noodles at a supermarket in Beijing. View photo Today is the 105th birthday of the man responsible for affordably feeding college students with his beloved invention: instant noodles. Google Doodler Sophie Diao captured Momofuku Ando – the inventor and humanitarian – and his passion for noodles in a Google Doodle on March 5. Born in 1910, he dedicated his life to entrepreneurship, and in that discovered a quick way to feed the hungry. He started his first business at the age of 22, and was inspired by seeing people wait in long lines for a bowl of ramen on the streets of post-World War II Japan. He wanted to feed people faster and cheaper, and dedicated his life to figuring out how to do so. While Top Ramen may take only three minutes to cook, the recipe took much longer to develop. “It took 48 years of my life for me to come up with the idea of instant noodles. Each and every event in the past is connected to the present by invisible threads,” Mr. Ando said. Ando founded Nissin Food Products Co. with the invention of instant ramen noodles. He introduced chicken ramen in 1958, and Cup Noodle in 1971. In 2005, he created a special vacuum-packed version of ramen to travel with a Japanese astronaut aboard the Discovery space shuttle. At this point, Ando was in his 90s. He died two years later in Japan. Instant noodles have become a comfort food for millions, as a staple in college dorms and as a quick treat on a cold day. Starting with simple chicken broth, the company eventually developed 16 flavors. Some flavors – such as pizza, bacon, taco, or cheese curry – are a little less universally comforting.
2024-01-31T01:26:51.906118
https://example.com/article/2525
My name is Cheddar! I found a new home!Plenty of my friends are looking for one too. Find a pet to adopt. Find a pet to adopt Dogs Cats Zip / Postal Zip / Postal Cheddar's Info... I am already spayed, up to date with shots, and not good with kids. Cheddar's Story... Cheddar is a sweet lady with a quiet friendliness. She can be very curious, though cautious at first, about meeting new friends. She just needs a chance to sniff you out and make up her mind. When she wants attention she's not shy about asking. Though she doesn't like to be held, she loves to be near you and petted. She's ready for a home with someone steady and patient and who will let her be herself. Facts about Cheddar Breed: Domestic Shorthair Color: Orange Or Red (Mostly) Age: Adult Sex: Female ID#: 2926 Hair: Short Other Pets at Cat Association of Topeka Why Adoption is a Great Option Cheddar, a Topeka Domestic Shorthair cat was adopted! Here's how you can benefit by looking at adoption as an option to buying a Domestic Shorthair for sale in Topeka, or seeking a Domestic Shorthair cat from a breeder in Topeka. Rescues and shelter volunteers in Topeka already know the personality and tendencies of their pets. This means they can match you with the right pet. That will makes it much easier transition to owning a pet for yourself and your new pet. On average adoption fees are much less than you'd pay a Topeka breeder, or pet store. Plus most often rescue pets have already been to the veterinarian for a check-up, had a round of vaccinations, and are spayed or neutered. That is a lot of savings! You will become a hero, and give a needy dog or cat a loving home. In fact, there are even Domestic Shorthair breeders who help with Domestic Shorthair rescue. One puppy or kitten adopted in Topeka paves the way for another one to be saved.
2024-05-26T01:26:51.906118
https://example.com/article/6413
Moments after his Woodland High School girls soccer team made program history by winning a first-round playoff game last week, coach Andres Olmedo didn't mince words about the Wolves odds to win today's semifinal-round game. "I know a few players from Placer and I think we have a better chance of advancing if we play Placer," he said before learning it would be Vista del Lago of Folsom his team would face in the Division IV Sac-Joaquin Section semifinal. Vista del Lago (13-1-3), which hosts today's game at 6:30 p.m., presents a tougher challenge to Woodland (11-5-3) not just because it beat Placer 3-1 last Thursday nor because on paper it's the higher seed (the Eagles are No. 2 in the eight-team bracket, the Wolves No. 3). No, the Eagles present a huge roadblock in the Wolves path to Saturday's final because their powerful team is led by perhaps the best player in the tournament. Janae Gonzalez has only played a handful of games for Vista del Lago this season because she spent part of March representing Mexico in the FIFA Women's Under-17 World Cup. The junior played forward for Mexico and scored two goals and had two assists in four games. One of her goals was voted the goal of the tournament. "She's a super player," Olmedo said of Gonzalez, who has both U.S. and Mexican citizenship. "They have a good program over there. They have a good feeding program." Woodland will counter with talent of its own led by the threesome of forwards Kristen Ward and Ellie Burgess and midfielder Emily King. Ward led the Wolves in scoring in the regular season with 20 goals but played with a fever in the team's 3-2 first-round win over Livingston last week. Still, she had an assist on one of Burgess' two goals. King had the other on a penalty kick. Woodland trailed Livingston 1-0 at halftime after giving up a goal 50 seconds into the match. But King's PK early in the second half was the first of three straight goals for the Wolves, who won in the postseason for the first time in school history. After the game Olmedo said, "the girls kind of showed that they wanted it after the first goal. It showed through the rest of the game. The key moment of the game was the early penalty kick. That's what I told the girls at the half; if we score one everything is going to open up for you guys, and it did."
2023-11-18T01:26:51.906118
https://example.com/article/7280
By FLOYD AND MARY BETH BROWN CAGLE CARTOONS The new Congress elected in November will surprise everyone. They will seriously consider impeaching Barack Obama. Growing under the radar of the mainstream media is a movement that is gathering momentum. Over one million citizens have signed petitions calling on the US Congress to impeach Barack Hussein Obama. Some of the soon to be elected new members of Congress are amongst those who have signed up, and they are not about to be cowered by establishment Republicans scared silly of the issue. Ultimately it comes down to a commonly shared belief amongst Tea Party activists that Barack Obama is systematically trying to hurt America. Obama, the argument goes, is not an incompetent boob in over his head. Nor is he is not some well-meaning community organizer who has seen his plans go astray. Barack Obama is a dishonest, manipulative liar who actually is pursuing an agenda that he hopes will take America off the international leadership stage. He wants America to fail so that the vision of Internationalist socialists can be realized. America is hated by the elite intellectuals of the world because we have been the single biggest roadblock to their plans to establish a one world governing system with them in charge. Americans has consistently rejected socialism. Whether it is Hillarycare or Obamacare, Americans are speaking with a loud clear voice against socialism. The left hates America because of our belief in God, our belief in rugged individualism, our belief in private property and our belief in the right to Keep and Bear Arms. It is only through impeachment that the new Congress can send Barack Obama a clear and unambiguous message that he does not have carte blanche to run roughshod over America. Impeachment is the political tool given by the founders to correct abuse by a President. Impeachment is often misunderstood because of confusion about what exactly constitutes an impeachable offense. Former-President Gerald Ford, while serving in the House of Representatives, said an impeachable offense was, “whatever a majority of the House of Representatives considers it to be at a given moment in history.” Article I, Section 4 of the Constitution reads: “The President, Vice President and all civil officers of the United States, shall be removed from office on impeachment for, and conviction of, treason, bribery, or other high crimes and misdemeanors.” The key phrase here is "high crimes and misdemeanors,” a concept in English Common Law that was well-known to our Founding Fathers but is grossly misunderstood in this day and age. "High crimes and misdemeanors" essentially means bad behavior. Here's a passage from C-Span.org which succinctly and beautifully summarizes the historical significance surrounding the inclusion of the term "high crimes and misdemeanors" in the Constitution: “’High crimes and misdemeanors’ entered the text of the Constitution due to George Mason and James Madison. Mason had argued that the reasons given for impeachment - treason and bribery - were not enough. He worried that other "great and dangerous offenses" might not be covered... so Mason then proposed ‘high crimes and misdemeanors,’ a phrase well-known in English common law. In 18th century language, a ‘misdemeanor’ meant ‘mis-demeanor,’ or bad behavior." In other words, "high crimes and misdemeanors" does not refer to a criminal act (as some would lead you to believe) and our Founding Fathers fully intended to allow for the removal of the President for actions which are: gross incompetence, gross negligence or outright distasteful. And for those who mistakenly hold the illusion that impeaching Barack Obama would be a simple matter of "playing politics," the Founders fully intended that the impeachment of a sitting President be a political act. The Founding Fathers deliberately put impeachment into the hands of the legislative branch rather than the judicial branch, thus transforming it from strictly a matter of legal definition to a matter of political judgment. The Obama Administration qualifies as the poster-child for bad behavior. Obama and those around him are ravaging this great country and adding a sorry chapter to a noble history. Impeachment, as written in the Constitution, was tailor-made for Barack Hussein Obama and our Founders placed it in our Constitution for such a time as this. The Browns are bestselling authors and speakers. Together they write a national weekly column distributed exclusively by Cagle Cartoons newspaper syndicate. Floyd is also president of the Western Center for Journalism. See more at Floyd's blog at www.2minuteview.com. To comment on this column, e-mail browns@caglecartoons.com.
2023-10-25T01:26:51.906118
https://example.com/article/8511
MENU Tuesday, March 25, 2014 IDlis are sometimes boring!!! at times there is extra left or left over from morning breakfast and no one in house wants to have it in there plate. We wont face this in an Tamil family where Idlis are loved but what if we make another dish out of it???, like Idli upma. Yes, I love idli upma that is being flavored with cumins (jeera), carrot, beans and onions. Yummy Yummy evening snacks. Children will love it and also by big children who are in college but always on diet. Idli upma is low caloric with lots of veggies. Once decided to make, you can also include as many variety veggies as you want. Here is an easy evening snack. PREPARATION Cook idlis or if idlis are already cooked, make them into small pieces. sprinkle some salt and keep aside. Cut beans and carrot into small pieces and cook them separate for 5 minutes in boiling water. drain water and keep aside.In a hot pan, add oil followed by mustard seeds, green chillies, chana dal, urad dal and cumins (take care that cumins are not burnt in oil). Add onions and saute them for 2 minutes following addition of tomatoes. Saute this for 2-3 more minutes until tomatoes becomes softer than earlier. Now add cooked beans and carrot, mix and add idli pieces. Give it a mix thoroughly so that idlis get mixed with vegetables. Now taste salt and add accordingly as required.
2024-05-06T01:26:51.906118
https://example.com/article/9614
Q: What are the uses of get() member from the shared_ptr class? My question is that what are the various ways in which get() member from the shared_ptr class can be used? And why can't we use delete to delete it? A: If you had a function taking a raw pointer void f(T *t); // non-owning pointer And you had a smart pointer to a T object, you could pass it to that function by using get() std::shared_ptr<T> sp{new T}; // or unique_ptr //f(sp); // no good, type mismatch f(sp.get()); // passes the raw pointer instead APIs taking raw pointers are common, and still useful. I'd suggest you watch this part of Herb Sutter's talk from CppCon 2014, and probably the parts around it. You should not attempt to delete this pointer, the smart pointer classes assume you will not do anything like that, and will still free the managed object in their own destructors when the time comes (after all, how would it know you deleted it?). The smart pointer's job is to manage the object and delete it at the right time, if you want to manually manage the lifetime of the object (not usually recommended) then use a raw pointer. If you do want to assume ownership of a unique_ptr you can do so by calling release(). A: Usually you would use get() when you need to pass a raw pointer to an API that accepts such a pointer. The shared_ptr class manages the ownership of the pointer, so it will automatically delete the owned memory when the lifetime of the smart pointer ends. If you try to delete the memory yourself then when the shared_ptr tries to deallocate you will wind up with undefined behavior.
2024-04-05T01:26:51.906118
https://example.com/article/8273
PARIS (AFP) – The cholera outbreak ravaging Haiti began at a camp for UN peacekeepers from Nepal, according to an expert report submitted to the French foreign ministry, a source close to the matter told AFP on Tuesday. Respected French epidemiologist Professor Renaud Piarroux conducted a study in Haiti last month and concluded the epidemic began with an imported strain of the disease that could be traced back to the Nepalese base, the official said. "The source of the infection came from the Nepalese camp," the source told AFP, speaking on condition on anonymity as he was not authorised to discuss a report that has not yet been made public. "The starting point has been very precisely localised," he said, pointing to the UN base at Mirebalais on the Artibonite river in central Haiti. "There is no other possible explanation given that there was no cholera in the country, and taking into account the intensity and the speed of the spread and the concentration of bacteria in the Artibonite delta," he said. "The most logical explanation is the massive introduction of faecal matter into the Artibonite river on a single occasion," the source added. The United Nations, which has faced violent protests in Haiti over its alleged role in an outbreak that has already killed 2,000 people and made 90,000 sick, insists there is no evidence that its troops were to blame. Foreign ministry spokesman Bernard Valero did not reveal the conclusion of the report, but confirmed the foreign ministry had received a copy and said it had been passed on to the United Nations for investigation. "From the outbreak of the epidemic, France sent to Haiti at the request of the Haitian health ministry one of its best cholera specialists, Professor Piarroux, a head of department in Marseille's public hospitals," he said. Cholera has added to the woes of the impoverished Caribbean nation, which was devastated by a massive earthquake in January that killed a quarter of a million people and left 1.3 million living in ramshackle refugee camps. Piarroux discussed his report in an interview with AFP last month. He did not directly blame the Nepalese, but said the cholera was from abroad. "It started in the centre of the country, not by the sea, nor in the refugee camps. The epidemic can't be of local origin. That's to say, it was imported," he said, shortly after his return from Haiti. Haitian officials say the first cases of cholera, a waterborne illness, broke out on the banks of the Artibonite river, downstream of the UN base. Last month, Edmond Mulet, head of the United Nations mission in Haiti, said no UN soldier, police officer nor civilian official had tested positive for cholera, and he defended the Nepalese, who have been the target of protests. All samples taken from the latrines, kitchens and water supply at the suspect Nepalese camp have proved negative, Mulet said. "There is no scientific evidence that the camp at Mirebalais is the source of this epidemic," he said, complaining of "a lot of disinformation, a lot of rumours around this situation." But Piarroux -- who works at the University of the Mediterranean in Marseille -- told AFP that the outbreak was not linked to the earthquake devastation, and could not have come from a Haitian environmental source. "The epidemic exploded in an extremely violent way on October 19, with several thousand cases and several hundreds deaths after many people drank the water of the Artibonite delta," he said. The professor said the world had not seen cholera spread so quickly since an outbreak in Goma, in eastern Congo, in 1994. "We've had more than 70,000 cases, and we could easily see them hit 200,000," he warned. Cholera is caused by bacteria spread in contaminated water or food, often through faeces. If untreated, it can kill within a day through dehydration, with the old and the young the most vulnerable.
2024-07-01T01:26:51.906118
https://example.com/article/6925
Q: How to add a reference on home page that will redirect me to the category according to the language I have created two store views, each one for a different language. I created two static blocks, having the same identifier but different content (one in English and one in Russian) and each one is assigned to the corresponding store view. Then, I created two categories, one for the English and one for the Russian language and assigned from the display settings the corresponding CMS static block. When I change language, the category changes accordingly and the static block content is loaded correctly. Now, I need to add one link on home page and the link should redirect me to this category page and display the correct static block content. For example when the user selects EN as language, display the English store view static block and when the user selects the RU as language, to display the Russian store view static block. This is my code: <h3 class="product-name"><a href="/family.html"> <?php echo $this->__('Family') ?></a></h3> The problem with this is that family.html only loads in the English store view but in the Russian store view loads the page without the content (which is a different CMS static block). How can I change the reference in order to load the page and the content in both stores? A: you should add the ___store parameter to the link <h3 class="product-name"><a href="/family.html?___store=ru"> <?php echo $this->__('Family') ?></a></h3> this will go to the "russian" store view (assuming "ru" as storeview code) but you shoudl edit your question because is nto clear wht you mean for "selected" language. if you are already in "russian" and you dont use the "store code for the url" you are in a serious trouble because Magento cannot understand if /family.html refer to the en or ru store. Usually we use /en/family.html /ru/family.html (or better a locale version) if you dont use the store code /family-en.html /ru/family-ru.html Hope this helps
2024-02-27T01:26:51.906118
https://example.com/article/6323
Results of three consecutive combined treatments for malignant gliomas. Ten-year experience at a single institution. Between 1978 and 1988, 108 consecutive patients with malignant gliomas were treated. The patients were divided into 3 groups as follows: Group I, surgery if possible, otherwise biopsy followed by whole-brain irradiation to a total dose of 34 Gy in 4 fractions, VCR (2 mg i.v.), and BCNU (80 mg/m2 i.v.) repeated every 6 weeks; Group II received irradiation as Group I plus VP16 (75 mg/m2) every 3 weeks and BCNU (50 mg/m2 i.v.) every 6 weeks; Group III received 60 Gy in 30 fractions to the tumor bed plus VCR (2 mg i.v.), BCNU (50 mg/m2 i.v.), and CDDP (15 mg/m2 i.v.) every 6 weeks. In group I, 28 patients had stable disease (SD) and 2 patients showed disease progression (PRO). Median survival time was 9 months (range 1-18). In Group II 22 SD's were observed. Median survival time was 6 months (2-16). In the third group of patients 29 SDs and 14 partial remissions (PR) were recorded. Median survival time in this group was 13 months (range: 3-59+ months). In general, the group of patients treated with radical or subtotal surgery and the group of patients included in neurologic classes I-II and with performance status (PS) > or = 70 had a longer survival. In our experience, patients with grade III and IV astrocytoma receiving treatments similar to those described above showed no difference in survival and response. Regardless of treatment, none of the patients experienced severe toxicity.
2023-08-03T01:26:51.906118
https://example.com/article/7085
This kind of connector presses the standard manufacture of American Army.It can be installed pins or holes on the plug and socket according to our customer's requirements.With advanced structure and ...Keyword : cable to cable connector | circular connector Sim card dual connector High quality different with general part. 1000PCS for moq, packing for cartons. T/T payment FOB term or discussed. Wholesale and retail can be consider. Welcome ...Keyword : usb connector
2023-11-20T01:26:51.906118
https://example.com/article/4258
TPEP 2.0 will be determined "by the opposite of an RFP." Misty, Instagram-filtered memories, of the way we were. (Photo: nycgov.tumblr.com) Ouch, we think we just got whiplash. A couple weeks ago, Mayor Bloomberg was photo-opping in the backseat with Jack Dorsey, founder of the mobile payments company Square. But this afternoon, the New York Post got its hand on a letter from Square to the New York Taxi and Limousine Commission (TLC) announcing that the company has suddenly pulled out of its pilot program in yellow cabs, which the agency recently stated was going swimmingly. The pilot run in 13 cabs was testing Square’s service–featuring iPads in the vehicle’s partition and iPhones in the front–as a replacement for TPEP, the agency’s internal moniker for the TV screens and credit card swipers currently run by an exclusive contract with Verifone and CMT that expires this coming February. The letter, signed by Square’s general counsel Dana Wagner and agreed to by the TLC, says: “Square has determined, in light of developments in prospective taxicab regulations in New York and other markets, and based on what we have learned conducting the Pilot Program to date, that we wish to pursue a different hardware and software solution,” noting that the program has already covered 28,000 rides and 100,000 miles.” Reached by phone, TLC spokesman Allan Fromberg offer some clarification on those developing regulations. “There is no candidate for TPEP 2.0 because is there is no contract!” he said when we asked if Square was still in the running. “Instead of what we did with the two TPEP vendors that exist now [i.e. Verifone and CMT], for TPEP 2.0 we were going to go the rule-making route. So we are going to create new rules and regulations that will set up a foundation of specs–and then any company that meets those specs will be able to compete in the marketplace.” Said Mr. Fromberg, “This is sort of the opposite of an RFP.” Given all the fuss we heard about the lack of rules governing e-hailing and credit card processing for taxi apps in a recent City Council meeting, we were wondered if this was related. “Nope, not all,” Mr. Fromberg insisted. “We just think it’s the smarter, more efficient way to go to open the market up to smarter off-the-shelf solutions, as opposed to what we had to do to before and draw a specific custom-made solution,” he added, referring to RFP five years ago when the TLC first starting putting this kind of technology in taxis. Mr. Fromberg said the he expects to see draft rules for these new specs “by the end of the year.” He also dismissed rumors floating around last week, courtesy of PrivCo CEO Sam Hamadeh, that Square was about to close a deal with the city to extend its mobile payments system into 1,000 cabs. Any truth to that, we asked? “That’s an absolute no,” he said, emphatically. “No idea where he got it. You’d have to ask Sam Hamadeh.” By email earlier, Mr. Fromberg characterized Square’s pilot run as a big success, perhaps referring to the intel the city gathered in terms of what they want–or don’t want–in the back of their taxis. “The Square pilot has been a tremendously positive experience for us. From the TLC’s standpoint, it’s achieved every goal we had set for it, and we learned lessons about alternative technologies that we’ll be applying to projects well into the future. It was a total success.” Square agreed to reimburse medallion owners for the cost of uninstallation of their pilot effort and installation of a new TPEP system. The letter also seems to indicate that Square is still planning on submitting a candidate for “future TPEP: “It would be commercially unreasonable for Square to pursue a new hardware and software solution for a future TPEP offering while at the same time continue to support the software and hardware solution we rolled out in the Pilot Program.” UPDATE 6.40 p.m. 10/15: It looks as though Square is indeed eager to become the city’s next TPEP vendor and will apply the lessons learned from the pilot program to develop a new solution. By email, a spokesperson from Square offered the following statement (with a more recent tally of the amount of rides): “We’re very grateful to the NYC Taxi & Limousine Commission for partnering with us on this pilot. We’ve learned a ton about the specific needs of taxis over the course of more than 34,000 rides and 100,000 miles traveled. We’ll use our findings to further improve Square and make commerce and transportation even easier for millions of riders and drivers in New York and around the country.” Betabeat is now the newly launched Innovation section of the Observer. All your favorite features and columns—as well as exciting new areas of tech coverage—can now be found at Observer.com/Innovation. Don't miss the latest and best writing on technology and the future of business innovation. Add the Innovation section to your RSS feed and follow the Observer on Twitter and Facebook.
2023-12-26T01:26:51.906118
https://example.com/article/5745
Q: Using buttons in WinForms Application I have a WinForms application, which contains 2 buttons- button1 (RIGHT) and button2 (Left - which is not contained in the code below but is 98% same code). I have a picture and description of a movie, and when I press right or left I want to show another movie. When I start the application, I need to press the right button twice to change the movie, but afterwards it works well. If I press the left button after I press the right button, it will show the first movie; but it's supposed to be when I press the right button. If I press the left button again, it works well. Can someone explain me why is this happening and is not working well all the time? Thank you. int id = k; int maxf = 0; cmd.Connection = con; con.Open(); cmd.CommandText = "SELECT Count(Id) FROM Filme "; drr = cmd.ExecuteReader(); if (drr.Read()) { maxf = int.Parse(drr.GetValue(0).ToString()); } con.Close(); if (k == maxf) { k = 1; } else { ++k; } cmd.Connection = con; con.Open(); cmd.CommandText = "SELECT Descriere FROM Filme WHERE Id=@Id"; cmd.Parameters.Clear(); cmd.Parameters.Add(new SqlParameter("Id", id)); drr = cmd.ExecuteReader(); if (drr.Read()) { textBox1.Text = drr.GetValue(0).ToString(); } con.Close(); con.Open(); cmd.CommandText = "SELECT Imagine FROM Filme WHERE Id=@Id"; //cmd.Parameters.Add(new SqlParameter("Id", id)); SqlDataAdapter da = new SqlDataAdapter(cmd); SqlCommandBuilder bd = new SqlCommandBuilder(da); DataSet ds = new DataSet(); da.Fill(ds); con.Close(); byte[] a = (byte[])(ds.Tables[0].Rows[0]["Imagine"]); MemoryStream ms = new MemoryStream(a); pictureBox2.Image = Image.FromStream(ms); pictureBox2.SizeMode = PictureBoxSizeMode.StretchImage; pictureBox2.BorderStyle = BorderStyle.Fixed3D; ms.Close(); A: Assuming that k is your current image index and at some point when your application starts you initialize it with 1 and you look for movie info with Id = 1, the first time you click right... int id = k; int maxf = 0; after these lines, k = 1 id = 1 maxf = 0 cmd.Connection = con; con.Open(); cmd.CommandText = "SELECT Count(Id) FROM Filme "; drr = cmd.ExecuteReader(); if (drr.Read()) { maxf = int.Parse(drr.GetValue(0).ToString()); } con.Close(); if (k == maxf) { k = 1; } else { ++k; } After this piece of code, k = 2 id = 1 maxf = 5 Now, this is the part where you look for the movie info in your database... cmd.Connection = con; con.Open(); cmd.CommandText = "SELECT Descriere FROM Filme WHERE Id=@Id"; cmd.Parameters.Clear(); cmd.Parameters.Add(new SqlParameter("Id", id)); drr = cmd.ExecuteReader(); if (drr.Read()) { textBox1.Text = drr.GetValue(0).ToString(); } con.Close(); con.Open(); cmd.CommandText = "SELECT Imagine FROM Filme WHERE Id=@Id"; You're looking for records with the same Id as your id variable, which currently has 1. You're retrieving the same record you had when you opened your application. The next time you click your right button, this happens: int id = k; int maxf = 0; k = 2 id = 2 maxf = 0 NOW id has 2, and your query will retrieve movie info with id = 2. That's why you need a second click to change your movie. Solution: either look for movie info with Id = k instead of Id = id, or assign Id = k after you increase/reset k.
2024-01-03T01:26:51.906118
https://example.com/article/5013
1. Introduction {#s1} =============== Daily life includes many situations where we find ourselves lost in thought or thinking about something while we were supposed to pay attention to someone or something in our outside world: a speaker, a teacher, a movie, or a colleague talking to us. At some point, we may realize that we do not remember anything they said or did the last minutes, our attention was directed inside ourselves. We suppressed the external influences and our sensory input to a certain degree, to be able to concentrate on internal processes and thoughts. "External attention refers to the selection and modulation of sensory information, as it initially comes into the mind, generally in a modality-specific representation and often with episodic tags for spatial locations and points in time. (...) Internal attention refers to the selection and modulation of internally generated information, such as the contents of working memory, long-term memory, task sets, or response selection" (Chun et al., [@B6]). We might consciously start an internally directed attention period because we want to think about something, or we do not even realize our mind has been wandering. Sometimes, we cannot even tell how long our mind has been fixated on something other than it was supposed to. This difficulty in reporting one\'s direction of attention in many situations makes it hard to judge, understand, and scientifically work with one\'s attentional state. However, an estimation of the attentional state of a person might be helpful in several applications. With Augmented Reality (AR) becoming more popular, the industry is facing the challenge of making it as intuitive, interactive, and unobtrusive as possible, as this would allow for more application scenarios. One of the problems is the interference of virtually displayed objects with the current attentional focus of the user. Instead of being a helpful or enjoyable addition to the visual field, the projection can be a distraction. Thus, knowing the attentional state of a person would greatly improve the applicability of AR devices and even open up new possible use cases, specifically designed to detect, react to, and work with this attentional state. It follows that measuring attention independently and implicitly, without the necessity of participant intention, is a main goal in our research. Brain-Computer Interfaces (BCI) offer physiological information about the user\'s mental state to the technical system. Sensing techniques, such as Electroencephalography (EEG), have improved drastically over the past decades and make reliable capturing of brain activation possible. This brain activation has to be decoded and therefore, "translated" into actual thought patterns and behavioral correlates before this information can be used to adapt a system\'s state to a user\'s state. As an example scenario, one can imagine a system that monitors the attention of a person driving a car. Once the BCI detects a period of internally directed attention, the driver can be reminded to focus on the road ahead instead. In this research project, we explored the possibility of decoding the attentional state of the user during an AR paradigm from their EEG data. Our goal was to classify the attentional state regarding internally or externally directed attention through machine learning algorithms, using automatic, individual feature selection. Data accumulation was performed in 90-min sessions in the laboratories of the Cognitive Systems Lab. For this purpose, we designed an experimental paradigm consisting of "internal" and "external" trials, which refers to the direction of the user\'s attention. These two conditions are conceptually very similar to assure that the classified difference regards only the direction of attention but not merely the task type. The external tasks were implemented to be displayed in Augmented Reality (AR). This approach was chosen because it adds another dimension to otherwise 2-dimensional computer tasks aiming at improving the similarity to daily, real-world scenarios. Beyond that, the possible improvement of AR applications through such attention measurements that was described earlier motivated this setup. Based on related work on neurological differences between the two states, we assume enough difference in the recorded EEG for a classification algorithm to discriminating them. For this purpose, we will use a Linear Discriminant Analysis to test the principle hypothesis that an attentional state classification differentiating internal and external attention in an AR setting is possible based on EEG data. 2. Related Work {#s2} =============== In this section, we review related work on the classification of internally- and externally-directed attention. We found no other work addressing the classification of internal and external attention in an AR task but solely papers with related concepts. First, we briefly show that neurophysiological and behavioral differences have been found that allow for an optimistic perspective on the success of the attempted classification. Second, we introduce research that made use of a user\'s attentional state in an AR setting, and finally, we address our previous research in this field. 2.1. Internally- vs. Externally-Directed Attention -------------------------------------------------- Several studies deal with correlates of internally- and externally-directed attention (or certain aspects thereof) in the EEG signal. Cooper et al. ([@B7]) investigated the well-known effect of increased power in the alpha power band during times of "cognitive idling." The authors presented evidence that this effect is a frequency marker for active suppression of external stimulus processing during "internally directed attentional tasks." Benedek et al. ([@B2]) showed differences in the frequency power spectrum in the right parietal region of the brain as markers to differentiate between internal and external attention. Braboszcz and Delorme ([@B5]) analyzed spectral and ERP-related parameters as markers for mind-wandering during an internal attention task. They reported that the parameters they found to correlate with self-reported mind-wandering were similar to parameters correlated with low alertness. Closely related to our research question is the paper by Putze et al. ([@B13]), where they show that EEG data can be classified to discriminate between internal and external attention processes on a single-trial basis in a computer-based experiment using several different tasks for each condition. 2.2. Attentional State in AR Settings ------------------------------------- Making optimal use of users\' attention has been an important goal of research on AR interfaces: Bonanni et al. ([@B4]) used layered interfaces designed according to cuing and search principles of attention theory to reduce the user\'s cognitive load. Lu et al. ([@B10]) investigate a subtle cuing method to support visual search in AR settings, which are as effective as explicit cuing methods but less distracting. Biocca et al. ([@B3]) introduced the attention funnel technique as a 3D cursor to guide the user\'s attention toward objects which are completely outside the current visual field. These studies yield important guidelines for building attention-driven AR interfaces. However, most of the proposed AR prototypes do not make use of an online assessment of the user\'s attentional state. Very recently, researchers in academia and industry showed the feasibility of combining AR and BCI technology: Faller et al. ([@B8]) used an SSVEP-based BCI as a silent and hands-free input channel to a head-mounted AR device. Similarly, Kishore et al. ([@B9]) compared an SSVEP-based BCI as an input mechanism to a head-mounted display for controlling a robot with a gaze-based input mechanism. Mercier-Ganady et al. ([@B11]), in turn, used an AR device to visualize the abstract output of a BCI to the user. 3. Methods {#s3} ========== We introduce in section 3.1 a novel spatial perspective alignment task which is built upon the Lab-Streaming-Layer to leverage the possibilities of sizeable synchronous data streams in an AR setting (see section 36). The experiment design and technical design enables us to train and evaluate a Linear Discriminant Analysis to discriminate internally and externally directed attention on trigger-bound fixed time windowed data samples (here: trials). The exact methods used during the recording and analysis are described in the following. 3.1. Experiment Design ---------------------- In the work of Putze et al. ([@B13]), a stationary experiment is presented, which is conducted in a closed laboratory environment in front of a regular computer monitor with different tasks for internal and external attention. Hence, the participants have to sit still in front of the monitor and do not move much. The stationary setup reduces unwanted influences but creates a very artificial scenario. Therefore we want to introduce a task which requires the participant to stand and to move for both -- an internal condition and an external one. The external condition is specifically designed to run on an AR capable device to leverage the spatial tracking and awareness capabilities as well as the possibilities to fully observe the participant\'s movements. We use the Microsoft HoloLens, a pair of mixed-reality smart glasses that requires externally directed attention. The internal task is designed in a way which requires the participant to move and use mental rotation. This section will explain the task and its implementation in detail. ### 3.1.1. Perspective Alignment Task In order to create a more active task compared to Putze et al. ([@B13]), we developed a spatial perspective alignment task. An additional benefit of this task is that the internal and external condition are very closely related and more similar than the tasks used in the computer-screen based approach. The idea of this task is to complete an object or constellation of objects by changing the perspective -- like a solar eclipse that is only visible if the earth is at a specific point on its eclipse or the geometric illusion of an impossible object that can be created with real objects which must be looked at from a specific angle. In AR, this corresponds to tracking a moving object for maintaining the best perspective during the observation. Our spatial perspective alignment task consists of two objects: A tube and a sphere. Both objects are placed ca. 80 cm from each other away on an axis so that they form a constellation. [Figure 1](#F1){ref-type="fig"} visualizes the constellation. When looking at those objects from the right perspective, the sphere will be seen inside the hole of the tube -- This marks the complete state of the alignment. To better indicate the alignment progression, we colored the object differently and changed the sphere\'s color to green if it is seen inside the tube. The alignment progression is displayed in [Figure 2](#F2){ref-type="fig"}. ![**(A)** The first image shows a screenshot from implementation on the HoloLens. **(B)** The displayed holographic objects: A red sphere and a green tube. Both stay on a fixed axis with a fixed distance marked by the blue line. The pivot of rotation is in the center of the tube. By rotating the object axis around this pivot, the alignment could be changed and therefore force the participant to change their head position accordingly. The displayed numbers are marking the positions to which the red sphere is rotated during the experiment. They are not displayed during the experiment.](fnhum-13-00348-g0001){#F1} ![The sphere will change its color if the participant completes the alignment. From **(A--C)** the perspective alignment is getting better.](fnhum-13-00348-g0002){#F2} The main task for the participants is to keep the objects perspectively aligned with each other the whole time. To achieve such an alignment, the participants were asked to adjust the position of their upper body in accordance with the current task. We rotate the axis of the constellation in a random but fixed manner. The object movement follows a number grid which is placed in front of the tube, facing the viewer (displayed in [Figures 1](#F1){ref-type="fig"}, [3](#F3){ref-type="fig"}). If the rotation reaches the goal destination based on a number, it will rotate to the next number. The constant motion forces the participant to move continuously in order to complete the alignment. For our experiment, we choose a 5-s duration for rotating from one number to the next. ![**(Left)** The start of the sequence. **(Right)** The constellation of the sphere and the tube is rotating. The sphere appears to be moving toward number 4 first, then 2 and then 9.](fnhum-13-00348-g0003){#F3} The spatial perspective alignment task seems to fulfill many criteria for a task which affords continuous externally directed attention without inducing a high mental load. The participant has to evaluate the state of the alignment continuously by processing their visual feedback and adjust their movement slightly. Since we also aim to produce internally directed attention and movement of the participant, we separated the spatial perspective alignment task in two conditions: One provides direct visual feedback (external), and the other does not (internal). - *External Condition:* By choosing a random number between 1 and 9, whereby the last selected number is not included, we define the next number on a number grid to which we rotate the constellation (an exemplary movement of a pre-selected sequence is shown in [Figure 3](#F3){ref-type="fig"}). This procedure will be continued until the end of the experiment on the constellation. - *Internal Condition:* The internal condition requires the participants to imagine the sphere and the tube and their movement while performing the spacial alignment in their mind. The internal task will induce the same movements of the participant\'s upper body because, in order to fulfill the alignment, they have to move their upper body and head despite missing visual feedback. To guide the motion of the sphere and tub in the participants\' minds, a synthetic voice will announce three numbers before the internal condition starts. These numbers correspond to the number grid and describe the rotation. In [Figure 3](#F3){ref-type="fig"} an exemplary movement of the sequence 4, 2, 9 is shown. After the announcement of the number sequence, the participants have a short memorization phase before the trial starts, to reduce the memory load during the task. It is important to state that the internal task always disrupts the external one and should not provide visual feedback to the user. During the internal task, the objects displayed in the external task are still present. In order to deliver a distraction-free internal task, we distort the visible (external) constellation by breaking the objects axis and move the sphere and tube to the side of the field of view. We chose this approach because we do not remove the visual feedback completely but only visual clues. An example distortion is shown in [Figure 4](#F4){ref-type="fig"}. ![**(A)** Shows a screenshot from the tutorial. During the internal condition, the red sphere and green tube are moved to the side to distort their orientation value for the participant. The example constellation and the number-gird are visible to give an idea about their location, speed, and scale of their movement. **(B)** Shows the internal condition during the experiment. No helper-objects are displayed---the constellation shown during the tutorial and the number-grid is hidden.](fnhum-13-00348-g0004){#F4} We mark the start an endings of each condition also by two distinct sounds. These are as an orientation for the participant, but not part of the trial. The trial starts afterward. To give an example of what the participants have to imagine and in what scale, we first display the two objects and a number grid (see [Figure 4](#F4){ref-type="fig"}, left image). During the experiment, these objects will be hidden and used for measuring the misalignment (see [Figure 4](#F4){ref-type="fig"}, right image). The objects and the number grid are in the same scale and holographic position in the room for both the external and the internal condition. Our tutorial consists of four steps in total: First, we show a short example of the external task. Secondly, we show the first version of the internal tutorial described above with all helper-objects visible. It is followed by the same tutorial with a hidden helper-constellation but a still visible grid. The last tutorial is a sample trial identical to the actual experiment. We decided to run this task by using AR on an AR device like the HoloLens because it provided us the possibility to precisely mark the start and the end of a task, to track the movement of the participant and to measure the misalignment for both conditions. It also made it possible to adjust the height of the experiment for each participant. ### 3.1.2. Experimental Procedure The HoloLens setup and placement of the participant in the room can be seen in [Figure 5](#F5){ref-type="fig"}. A fixed distance between the subject and the objects was guaranteed through marks on the ground. All described tutorial steps could be repeated as often as necessary until the participant understood the task. ![**(A)** The participant wears the EEG-headset and the HoloLens. **(B)** On the floor, the maximum distance to the holographs is marked, and a tracking image for placing the holographic experiment in the room is visible in the front. Written informed consent for the usage of the photos was obtained from identifiable persons.](fnhum-13-00348-g0005){#F5} For the main experiment, the subject starts with an internal task, followed by an external task. Three of these task pairs are followed by a short break with a fixed length. An experimental block ends after the fourth break, thus consists of 12 internal and 12 external trials. The participants performed three blocks with individual breaks in between the blocks. In total, the participants performed 36 internal and 36 external trials in approximately 50 min ([Figure 6](#F6){ref-type="fig"}). ![Each trial condition was executed three times before an intermediate break. After four of these trial groups with breaks, a block is finished. The participant chose the length of the block break. Three blocks were recorded.](fnhum-13-00348-g0006){#F6} 3.2. Data Collection -------------------- Before the experiment, the participants fill out a demographic and a mind-wandering-related questionnaire. During the main experimental part, besides the logged interaction and movement data, we record EEG and eye tracking data. After completion of the sessions, participants fill out a short questionnaire regarding their perception of the task (an adapted version of the NASA Task Load Index: German language and no category weighting). The total time a participant spent at our lab averaged 2 h with a recording time of 45--60 min. All recordings took place in a normal office at the Cognitive Systems Lab with no special shielding properties, to ensure results that are reproducible in uncontrolled environments. ### 3.2.1. Participants Participants were recruited online in a university-independent forum. Fifteen healthy participants (mean age 27.4 ± 10.4; three females) participated in the experiment. All participants had normal or corrected to normal vision. All participants were right-handed, and all but three participants had previously used an Augmented or Virtual Reality Device. We did not restrict the participation in the experiment except for participants with neurological disorders. The local ethics committee approved the study, and written informed consent was obtained from the participants before the conductance of any measurements. Technical problems arose during three of the sessions which led to the complete exclusion of one participant for the further analysis, and two sessions with reduced trial numbers (54 and 48 instead of 72; marked ^\*^ in subsequent tables). All the recorded data was fully anonymized. ### 3.2.2. EEG For the EEG recording, we used the g.tec Nautilus mobile 16-channel EEG system. The recording was performed using the LSL (LabStreamingLayer) recorder software. The data was recorded at 500 Hz at the following electrode positions: CZ, FP2, F3, FZ, F4, FT7, C3, FP1, C4, FT8, P3, PZ, P4, PO7, PO8, OZ of the 10--20 system. Cz was used as a recording reference, with another reference on the right earlobe of the participant. All the recorded EEG data was filtered and re-referenced as processing. Impedances were kept below 20 k℧. The setup combined with the HoloLens can be seen in [Figure 5A](#F5){ref-type="fig"}. ### 3.2.3. Eye Tracking Eye gaze was recorded using a binocular, wearable Pupil labs eye tracker at 120Hz, using the provided recording software. The eye tracker was fixed to the HoloLens, and distance and angle were adjusted to the eyes for every participant. The calibration is displayed on the HoloLens[^1^](#fn0001){ref-type="fn"}: The participant has to focus at a point for 1 s (60 frames), and there are 9 points in total which are displayed on an ellipse matching the screen size of the HoloLens. The recordings will be used in further additional classification approaches. In the context of this paper, eye tracking data will not be analyzed further. ### 3.2.4. Behavioral Data All interaction data (especially head movement and current position) were recorded during the trial. Performed movement is evaluated for the accuracy assessment of the internal task. Also, the orientation of the sphere and the tube were tracked and their distance in the viewport. The later is used to measure the success of the alignment in both conditions. In total, we record the orientation of the ring, and tube for both the internal and external condition, the orientation of the head of the participant, and a measure of the alignment of the internal and external ring and tube during each trial. The streams are described in detail in section 6. 3.3. Analysis ------------- In this section, we describe how we processed and analyzed the data collected by the LabStreamingLayer (LSL) to distinguish internal and external attention in a binary classification task. The processing scripts were written in Python 3.7 using the MNE toolbox, numpy, matplotlib, scikit-learn, pandas, and scipy. All analysis steps described were performed offline. The recorded LSL file was split into EEG and context features after synchronizing the marker stream with the rest of the data based on the timestamps, and both data collections were stored in the MNE data-format. Training and test data were split in a 80/20 manner and only the training data was used for normalization and hyperparameter optimization. The classifier that was trained on the training set in a 5-fold cross validation was assessed on the test set and those accuracies are reported in the results. With the future goal to later establish a real-time classification of internal and external attention, the preprocessing and manual evaluation of each dataset was kept to a minimum. ### 3.3.1. Alignment and Task Performance For checking the misalignment, we make use of the render engine of Unity and the HoloLens. Since the experiment objects are virtually rendered objects which are displayed by the HoloLens close to the eyes of the participant, we can check if the objects align on the virtual camera in the experiment application. To do so, we can check the euclidean distance between the tube and the sphere\'s viewport coordinates. The viewport represents a normalized space in which 3D objects are transformed before an image can be rasterized by the render engine, as visualized in [Figure 7](#F7){ref-type="fig"}. Only objects are processed further, which are located in the view frustum of the virtual camera. The viewport bottom-left relative from the camera is (0, 0), the top-right is (1, 1) for x and y-coordinates. For our alignment measurement, we can neglect the z-coordinates because those store only depth information which is not needed for the perspective alignment. ![The transformation of the Unity camera space to the uniform Unity-viewport space.](fnhum-13-00348-g0007){#F7} ### 3.3.2. EEG Preprocessing Preliminary to a visual inspection, the EEG data was low-pass filtered at 50 Hz, high-pass filtered at 1 Hz, and an additional notch-filter was applied at 50 Hz to exclude all effects of the powerline-noise. During the inspection of the data, broken channels that were noted down during the experimental session were excluded, and later interpolated (an average of 2 channels were excluded). Afterward, we re-referenced the data to the average of all channels. The marker stream was then used to cut the data into epochs. Tutorial data was not considered and cut-off. Every epoch is a 13-s window in reference to the marker indicating the start of an internal or external trial. The epoch starts 1 s after trial onset (to exclude the effects of auditory cues) and has a duration of 13 s (to exclude the effect of different trial lengths in internal and external trials). The epochs are baseline-corrected based on the first second of each epoch. A manual artifact removal was considered but with regard to a future real-time approach dismissed as not suitable for our purpose. An automatic artifact removal was tested by performing and Independent Component Analysis (ICA) on the data and rejecting eye movement of muscle related components. The improvement of the classification accuracy was marginal or not visible for most subjects. Thus, it was decided to perform no artifact cleaning on the datasets. ### 3.3.3. Feature Extraction We did not initially restrict the number of features but used statistical feature selection methods later to identify promising feature sets. Following previously described literature, we decided to extract EEG-features based on the Power Spectral Densities (PSD). We computed the power spectra using the multitaper method for the α (alpha, 8--14 hz), β (beta, 14--30 hz), θ (theta, 4--8 hz) and γ (gamma, 30--45 hz) -band and calculated the average and maximum power for each channel in each frequency band in each trial. This resulted in a feature vector containing *number of channels x 2 x 4* features. The frequency band ranges were chosen, based on Abo-Zahhad et al. ([@B1]). All feature names mentioned in this paper follow the following naming convention: `fmin+channel+[mean,max]` with *fmin* being the lower bound of the frequency band. Calculating more frequency bands by splitting the wide β-band into lower (14--22 hz) and upper (22--30 hz) β-bands or including the δ-band (1--4 hz) did not improve the preliminary classification results and was not considered further. ### 3.3.4. Hyperparameter Optimization The pipeline that led to the reported results is displayed in [Figure 8](#F8){ref-type="fig"}. We chose to normalize the feature values (x) by subtracting the mean (u) and scaling them to unit variance (s) before determining the number of best features individually for each participant or training the classifier. z = ( x \- u ) s We decided to run two versions of the classification pipeline. The first version included an individual feature selection and was used to estimate which combination of which features led to the best classification, and whether a selected feature set for all participants might improve the average classification accuracy ([Figure 8](#F8){ref-type="fig"}, 2). The chosen features were also interpreted. The second pipeline was essentially the same, but without an automatic feature selection and an optimized shrinkage instead. The results of the second pipeline are the reported classification accuracies, whereas the first pipeline was used for the described analysis of the features and alternative feature sets for the individual classifiers. Feature selection included a hyperparameter optimization concerning score function and the number of selected features. In a grid search, the scoring was done by estimating the mutual information between each label and feature, as well as the ANOVA *F*-Value. The method, leading to a feature set that yields a higher accuracy, was selected. These feature sets were then evaluated in a 5-fold cross-validation by computing the average score of each fold and choosing the highest scoring number of features. The possible selection of features laid within a range of 10--90 with a step size of 10. ![During the first pipeline: The feature vector was selected through a hyperparameter optimization in a 5-fold cross-validation on normalized features (16 channel recording → 128 features). See section 3.3.3 for the preceding steps that led to the feature set.](fnhum-13-00348-g0008){#F8} In a further step, we evaluated whether the classification accuracy for a participant with a classification accuracy below 80% would improve with a global feature set that is based on the features that were chosen during the classification of a participant with a high accuracy. We tested two different approaches to evaluate this hypothesis. The feature selection for this feature set was once based on the number of times a certain feature was chosen by the better half of the preliminary classification results and once by the average score the individual feature was assigned during the feature selection step. However, this global feature set did not lead to an improvement of the classification accuracies and will not be considered further. In a second version of the classification pipeline, the whole feature set was used but combined with a constrained classifier ([Figure 8](#F8){ref-type="fig"}, 1). The results of this approach are the reported accuracies in the results section 4.1.1. We first tried an approach, where we calculated the shrinkage factor using the Ledoit-Wolf lemma. This led to a lot worse results than an individual feature selection. Instead, we included the shrinkage level in the hyperparameter optimization by performing a grid search for the best shrinkage factor (0.1 to 0.9, step size = 0.1). A combination of feature selection and a constrained classifier did no further improvement to the classification accuracy. Thus, for the final results, classifier with an individual shrinkage factor was chosen to be trained on the training data feature set and tested on the test data. ### 3.3.5. EEG Classification Wang et al. ([@B15]) argue that a Linear Discriminant Analysis (LDA) is very well suited for binary classification tasks. In this paper, the focus lays on proving a simple but accurate EEG-data classification for AR rather than optimizing classification results. Thus, we chose LDA as our classification approach without further comparisons to other algorithms. The LDA was performed with shrinkage and with a least-squares solver. Training was performed on 80% of the trials. The split into training and test data was stratified and not shuffled. The final score was calculated on the test set (see [Figure 8](#F8){ref-type="fig"}). The scikit-learn toolkit was used for feature selection, parameter optimization, cross-validation, and the classifier. 4. Results {#s4} ========== 4.1. EEG Classification ----------------------- The main goal of this research was to classify EEG trial data based on internal and external attention. This was pursued by the analysis steps described in section 3.3. Apart from the achieved classification accuracy, the features chosen by the automatic feature selection are of importance for the interpretation of the results. ### 4.1.1. Classification Accuracy The main quantitative results of this study are presented in [Table 1](#T1){ref-type="table"}. The score was computed for all participants in a balanced binary classification task with a chance level of 50%. The accuracy is calculated, based on how many predicted labels were in accordance with the original label. Overall highest achieved classification accuracy was 100% for 3 participants, and 6 of 14 participants\' data was classified with an accuracy of more than 90%. All but one participant\'s data resulted in a score higher than 70%. The average classification accuracy was 85.37% ± 11.27%. ###### The classification accuracy for each subject. **Participant** **EEG-classification accuracy (%)** **Movement-classification accuracy (%)** ----------------- ------------------------------------- ------------------------------------------ 1 66.67 49.11 2 66.67 63.57 3^\*^ 73.33 89.11° 4 80 61.07 5 80 86° 6 80 90.54° 7^\*^ 81.82 74.67 8 86.67 67.5 9 93.33 86.07 10 93.33 90.54 11 93.33 94.46° 12 100 68.21 13 100 76.61 14 100 82.14 Average 85.37 77.08 Variance 11.27 13.53 Chance 50 50 *Sorted by EEG-classification accuracy. Average and variance are computed on unrounded results (\*participants with fewer trials due to technical problems, ° better classification accuracy than for the EEG classification)*. ### 4.1.2. Features An examination of the selected features from the better scoring participants (accuracy \> 80%), as described in Chapter 3.3.4, revealed that 53.25% of the features were generated from frontal channels. Features chosen by less than half of the participants with the appropriate accuracy were excluded for this analysis. In comparison, only 7 of the 16 electrodes are placed in frontal positions. Thus, an equal distribution of selected features would include 43.75% frontal features, and our analysis shows the importance of frontal features for attention classification. Separating the features based on the frequency band they were derived from yields 18.77% β-band, 29.88% θ-band, 21.83% α-band, and 31.8% γ-band features as selected features. In the complete feature set, all frequency bands are equally distributed (25% of the features were calculated based on each feature band). 4.2. Task Performance Analysis ------------------------------ For analyzing the task performance, we looked at the alignment values and the head movement per participants in order to find a correlation with the EEG-classification results. ### 4.2.1. Alignment For each participant, we calculated for each trial the mean and standard deviation of the alignment values recorded during the experiment for both conditions. [Figure 9](#F9){ref-type="fig"} displays the results for participants 14, 1 and 13. Then we compared the internal and external condition per participant with a two-sided *t*-test for two independent samples (α = 0.05). For each participant, the alignment differs significantly (mean comparison: highest *p*-value = 0.00015; standard deviation comparison: highest *p*-value = 0.0033). ![The graphs show the mean alignment for participant 14, 1, and 13. The blue points mark the external condition, red the internal. The error bars denote the standard deviation (±) for a trial.](fnhum-13-00348-g0009){#F9} ### 4.2.2. Head Movement To get a better understanding of what the participant\'s movement, we generated 3D plots for the head movement for each participant. [Figure 10](#F10){ref-type="fig"} shows three examples. The main observation is that most of the participants have a close alignment with the visible constellation during the external task whereas they diverge more during the internal condition -- their movement is wider but still shows a similar pattern compared to the movement of the hidden constellation in case the task was performed correctly (see participant 13 in [Figure 10](#F10){ref-type="fig"} as an example for a not well-performed movement). ![3D plot of the head movement of participant 14, 1, and 13 (from left to right). The blue lines denote the external condition, red the internal. In the background, one can see the visible constellation (red overlying spheres and green overlying boxes) and hidden constellation (overlying turquoise spheres and purple overlying boxes).](fnhum-13-00348-g0010){#F10} Furthermore, we analyzed the speed of the head movement. For each participant and each trial, we calculated the mean, the standard deviation, median, minimum, and maximum speed value. Based on this data, we trained a Linear Discriminant Analysis model with 5-fold cross-validation to identify whether we can classify the conditions robustly by just comparing the speeds of the head movement. In [Table 1](#T1){ref-type="table"}, we present our results. These classification accuracies were compared with the classification accuracy of the EEG data for each participant. The classification accuracies do not show a measurable correlation with Pearson\'s Correlation *r* = 0.41 (see [Figure 11A](#F11){ref-type="fig"}). ![**(A)** The classification accuracies from the movement data correlate weakly with the classification accuracy (*Pearson\'s r* = 0.41, visualized by the red line). **(B)** The task load assessment differences between the internal and the external condition correlate negatively with the classification accuracy (*Pearson\'s r* = −0.4, considered weak, visualized by the red line).](fnhum-13-00348-g0011){#F11} 4.3. Questionnaires ------------------- To further ensure that the measured and decoded differences rely solely on internal and external attention, we analyzed the collected questionnaires in relation to the classification results. Furthermore, noticeable questionnaire results could explain outliers. ### 4.3.1. Task Load Analysis The NASA Task Load assessment was adapted for our purposes and did not contain weighted categories. All answers were weighted equally and translated to a scale from 0 to 100 (100 = high load). [Table 2](#T2){ref-type="table"} summarizes the results averaged over participants. The categories *Effort* and *Physical* were not rated significantly higher concerning task load for the internal or external task. For all other categories, the internal task load was rated significantly higher (*p* \< 0.05). Only the difference in ratings for the *Mental* category was highly significant with a higher task load for the internal task (*p* \< 0.001). ###### Results of the NASA Task Load assessment averaged over participants (◇ significant, ◇◇ highly significant). **Demand** **External task** **Internal task** ***p*-value** ------------- ------------------- ------------------- --------------- Effort 54.50 68.17 0.055 Frustration 34.17 59.17 0.007◇ Mental 27.83 68.00 0.00043◇◇ Performance 67.50 46.67 0.02◇ Physical 58.17 54.67 0.5 Temporal 21.17 36.50 0.03◇ Mean 37.83 52.33 0.0013◇ Variance 23.57 22.39 not tested To estimate possible interferences with the difficulty differences of the tasks to classify internal and external attention, we computed the correlation between the classification accuracy and the absolute difference in task load rating for each participant. The overall external rating was subtracted from the overall internal rating. Concluding, a higher difference score signifies that the participant perceived the internal task as much harder while a negative score would imply that the participant perceived the external task as harder. Since the goal is to compare task load differences, the absolute difference was taken (For completeness: Two subjects rated the external task load as harder). [Figure 11B](#F11){ref-type="fig"} shows the relationship between accuracy and task load rating difference. We calculated Pearson\'s r as a measure for the correlation between the variables. The resulting correlation of *r* = −0.4 is a moderate negative correlation. The data of participants who rated the task load difference as higher was decoded worse by our classifier. ### 4.3.2. Mind Wandering Questionnaire The answers of the mind wandering questionnaire were evaluated and related to the results of the classification (see section 4.1.1) and the Task Load Analysis (see section 4.3.1). However, no relation or significant differences were found, and thus, the results will not be reported further. 5. Discussion {#s5} ============= In this study, we tested the possibility to classify internal and external attention in an AR setting with machine learning techniques. To provide an appropriate paradigm that includes two different task versions (one for internal and one for external attention), we implemented a spatial alignment task on the HoloLens. The two versions of the task were identical, except for the direction of attention. The visually displayed scene in the external task had to be imagined for the internal task, leading to the same movement patterns and cognitive tasks. The analysis of the movement data showed that the tasks were performed correctly and understood well by the participants. The slightly higher misalignment between the target and the object in the internal task was expected and hard to avoid because of missing visual feedback. However, the overall performance for the internal task of every participant was satisfactory, and we can claim that all participants understood the task and tried to perform it correctly. The NASA Task Load Index evaluation stressed that the main task difference was the mental component, as desired. The correlation analysis of the task load assessment and the classification accuracy proved that the classification did not improve for participants that assigned a much higher load to internal tasks. In conclusion, the classifier was not trained to differentiate the trials based on the task load. The same analysis was performed to exclude the possibility that we are classifying movement patterns in the EEG data. The comparison of the classification accuracy based on movement data and the classification accuracy based on EEG data showed no correlation between the two classification results. Hence, the classifier was not trained to differentiate the trials based on the movement of the participant. During the internal task, the AR objects were still present, but not moving. This way we ensured that the classified difference is not because of the presence of visual AR input or feedback. However, the imagery component of the internal attention exercise is exclusive to the internal task and not present in the external task. One could argue that the classified difference is "imagery" vs. "no imagery." There is no task that is defined as general internal attention but internal attention has many facets and imagery is one of them that is resent in many tasks that involve internal attention. Therefor, we generalize here and future tasks will focus on different facets of attention to prove our findings. After excluding task load and movement, we conclude that our classifier classified internal and external attention variations. Further arguments for this will be given in the following. The results of the classification suggest that reliable decoding of the attentional state in this setting is possible. Without many optimizations of the classifier or the feature selection, the achieved classification accuracy was higher than chance level for all the participants. Half of the classification accuracies were above 85% with an LDA on almost unprocessed EEG data. The exclusion and interpolation of a few channels were necessary due to a broken electrode cap. Additionally, only simple filtering, baseline corrections, and re-referencing were performed. A preprocessing step that does not require the visual inspection or specialized cleaning steps is favored in consideration of a possible real-time classification. The substantial differences in classification accuracy between the subjects could have multiple reasons. As expected, the internal task was rated with a higher task load and thus, perceived as more complicated than the external task. Informal feedback of the participants after the experiment also suggests that the task was hard to perform. However, as mentioned, the option of a misunderstood task or bad alignment performance due to inadequate internal attention or "mind-wandering" and a low level of concentration has been excluded by the analysis of the movement and alignment data. We found no correlation between subjects that had higher misalignment variations in the internal or external task and the according accuracy of our classifier. One approach to improve the classification accuracy for the worst participant was to inspect the EEG data for artifacts visually. Epochs that included very noisy data were excluded, and an ICA was performed to identify eyeblink artifacts that were very present in the signal of all frontal electrodes. These artifacts were not as severe in any other participants\' data. Supervised data inspection for artifacts and ICA cleaning resulted in better data that was classified with an accuracy of 70.3%. In the scope of this work, such intense manual preprocessing is not desired, and therefore, these results will not be considered. Another possible explanation for lower classification accuracies could be a change over time. This concerns two modalities: firstly, the participant could experience a training effect and perform the internal task with ease after several trials, leading to a decreased need for internal attention. Secondly, the combination of the HoloLens and the EEG-cap on the head of the participant was prone for slight movements and changes. As a result, the data quality often decreased over time, and later trials had worse data than earlier trials. Our approach to reduce these effects as much as possible was choosing a stratified 5-fold cross-validation. Even with this approach, decreasing attention and increasing signal noise can worsen the classification accuracy. The literature suggests person-dependent frequency bands (Newson and Thiagarajan, [@B12]). The predefined frequency band boundaries during the feature extraction could favor some participants. This could be solved with smaller bins to calculate the PSD on but would result in a broader feature set and longer classification times. Our attempt to split the β-band did not lead to an overall improvement of the classification results but individually chosen, or more fine-grained frequency bins could improve the classification. A further reason that we can not exclude in retrospective or test is BCI illiteracy (Thompson, [@B14]). Another result that supports our statements that we classify the trials based on attention-related differences and that better data quality would improve the classification accuracy is the evaluation of the selected features. The analyzed features suggest that the most critical information for the classification can be found in frontal electrodes and within the γ and α-bands. This is in accordance with the literature concerning attention (Cooper et al., [@B7]; Braboszcz and Delorme, [@B5]; Chun et al., [@B6]; Benedek et al., [@B2]). On top of that, the importance of these electrodes explains the lower classification accuracy of some participants because those electrodes were often disturbed by the setup with the HoloLens and one frontotemporal electrode was broken in many experiments. In the preprocessing of the data of participant 1 (who had the lowest classification accuracy), FZ, FP1, and FP2 had to be excluded and interpolated. Reducing these sources for noise could improve the classification. For participants for whom the accuracy was high, the selected features were very similar, whereas the automatic feature selection of the other participants chose different features. The recorded data for the better features was probably too noisy, and they were not chosen. In the future, the recorded data will be analyzed and classified with regard to multiple modalities to integrate the eye tracking data and improve the classification accuracies. Furthermore, the results will be integrated into a real-time adaptive AR application and checked in further experiments. Additionally, more participants could be recorded with additional EOG and EMG electrodes for an automatic detection of eye and muscle artifacts. These tests will dispel more doubts about the purposeful task at hand and its results. 6. Conclusions {#s6} ============== We showed that the classification of EEG data that was recorded in an AR paradigm based on internal and external attention is possible. The novel paradigm invented for this purpose seems to be very suitable. Even with simple machine learning principles and basic preprocessing steps, the classifier was able to reliably predict the attentional state of the participant in the offline analysis with perfect accuracy in 3 participants. None of our tests supports the assumption that anything but the actual attentional state was classified. The differences between the participants might be reducible. A future real-time system and multi-modal classifier are to be implemented. Data Availability Statement {#s7} =========================== The datasets generated and analyzed for this study, as well as the task, can be found online under <https://osf.io/avwc2/>. Ethics Statement {#s8} ================ The studies involving human participants were reviewed and approved by Ethics Committee of the University of Bremen. The participants provided their written informed consent to participate in this study. Author Contributions {#s9} ==================== L-MV, FK, and FP contributed conception and design of the study. L-MV organized the database, performed the statistical analysis of the questionnaires and EEG data, wrote the first draft, and sections of the manuscript. FK implemented the experiment, performed the statistical analysis of performance and movement data, and wrote sections of the manuscript. L-MV and FK recorded the participants. All authors contributed to manuscript revision, read and approved the submitted version. Conflict of Interest -------------------- The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. ^1^Pupil Labs provides a library for Unity -- <https://github.com/pupil-labs/hmd-eyes> ^2^engine version: 2018.2 <https://unity.com> ^3^HoloToolkit 2017.4.3.0 - Refresh <https://github.com/Microsoft/MixedRealityToolkit-Unity/releases/tag/2017.4.3.0-Refresh> ^4^Lab Streaming Layer is a communication tool to create time-synchronous data streams: <https://github.com/sccn/labstreaminglayer> ^5^We choose the public NTP service of <https://www.pool.ntp.org/de/> **Funding.** This research was funded by the Zentrale Forschungsförderung of the University of Bremen in the context of the project Attention-driven Interaction Systems in Augmented Reality. Open access was supported by the Open Access Initiative of the University of Bremen and the DFG. Implementation ============== The spatial perspective alignment task was build with the Unity engine[^2^](#fn0002){ref-type="fn"} and the HoloToolkit[^3^](#fn0003){ref-type="fn"}. For network communication and recording of all data sources, we used Lab Streaming Layer (LSL)[^4^](#fn0004){ref-type="fn"}. It is the backbone of the experiment architecture, as visualized in [Figure A1](#F12){ref-type="fig"}. LSL is not supported on the HoloLens operating system, and therefore we provide a Transmission Control Protocol (TCP) based Client-Server bridge service which as capable of passing forward and backward data between LSL and the HoloLens. To ensure that the time of the HoloLens is synchronized with the time of the bridge server\'s operating system, we synchronize both systems with a Network Time Protocol (NTP) service[^5^](#fn0005){ref-type="fn"}. Furthermore, we define and record multiple data streams from LSL. The following list provides information about their content: - *Control stream*: send control-strings to the HoloLens to control the states of the experiment. - *Control-return stream*: contains string-answers when a control-command was received by the HoloLens successfully. The content of an answer is whether the received control command is valid or not. - *Marker stream*: Contains short-typed markers. A marker ranges from 0 to 9. The numbers represent the following meanings -- 0, start of experiment app; 1, beginning of an experiment block; 2, end of an external trial; 3, start of the announcement of grid-numbers; 4, end of the announcement of grid-numbers; 5, start of the internal trial; 6, end of the internal trial; 7, start of the external trial; 8, end of an experiment block; 9, closing of the experiment application. - *Head-orientation stream*: Contains the 4 × 4 orientation matrix of the head in virtual-coordinates as a float 32 array that is generated from quaternion and three-dimensional position vector in Unity World-Space. - *Sphere-orientation streams for the hidden and visible sphere*: Same data format as the head-orientation stream. - *Tube-orientation streams for the hidden and visible tube*: Same data format as the head-orientation stream. - *Grid-number streams for the hidden and visible constellation*: this stream contains the grid-number to which the constellation will rotate. The value type is "short." - *Visibility streams for the hidden and visible constellation*: We stream the visibility of the constellation, meaning whether or not the participant sees the objects on the HoloLens displays. This is required because the HoloLens has a small field of view. If the sphere and tube are both not visible simultaneously a "0" is sent, else a "1." The value type is "short." - *Alignment-measure streams for the hidden and visible constellation*: We send a float32 value that represents how well the participant aligns the sphere and the tube (see section 3.3.1 for more details). It is important to do this for the visible constellation and the invisible one. ![The experiment architecture is based on LSL communication platform. The graphic gives an overview of the different components involved in time-synchronous data exchange.](fnhum-13-00348-a0001){#F12} The implementation of the task is open-source and accessible from <https://gitlab.csl.uni-bremen.de/fkroll/ieaExperiment>. [^1]: Edited by: Stefan Haufe, Technische Universität Berlin, Germany [^2]: Reviewed by: Sheng-Hsiou Hsu, University of California, San Diego, United States; Sung-Phil Kim, Ulsan National Institute of Science and Technology, South Korea [^3]: This article was submitted to Cognitive Neuroscience, a section of the journal Frontiers in Human Neuroscience
2023-08-22T01:26:51.906118
https://example.com/article/8435
Expressing shock and disbelief over the arrest of Lalrinpuia Lalchhuankima , a 19-year-old national-level table tennis player , at Mumbai airport with Rs 60 lakh-worth drugs, the Mizoram Table Tennis Association on Friday said he is a victim of a smuggling racket. Narcotic Control Bureau (NCB) sources in Mumbai said a Nigerian gang was to receive the 3.9 kg methaqualone , a banned psychotropic substance , in Delhi.“He has been the most sincere boy I have met. He is well disciplined. I believe there is a big racket behind his arrest,” H Lalmuanpuia, vice-president of Mizoram Table Tennis Association, said, adding that the state association is convinced he is innocent. “He is a role model for aspiring table tennis players from Mizoram,” he said.Vanlalrema Vantawl, president of Mizoram Journalists’ Association, said Lalrinpuia had carried the parcel in good faith and was framed. “Mizos are helpful people by nature,” he added.Sources said Lalrinpuia and Lalchhuankima, another player, were coming to Mumbai from Mozambique, where they had allegedly gone on a sponsored trip. There, an African friend had allegedly requested them to carry two parcels. When they arrived in Mumbai, via Abu Dhabi, on Wednesday morning, the parcel with Lalrinpuia was found to be containing drugs, while the one with Lalchhuankima contained slippers.“We had specific information,so we searched his baggage which resulted in recovery of drugs hidden in the bottom of his trolley bag. Now he claims somebody had given the parcel to him to be handed over in Delhi. Usually accused take such stand to defend themselves,'' an NCB official said.Sources in NCB said Mozambique is a trans-shipment point for narcotics such as “hashish, herbal cannabis, cocaine and heroin".A team of officials carried out a search of Lalrinpuia’s room in Anshul Garg Academy in Delhi, where he is studying, but found nothing incriminating.The table tennis player has given the investigators two mobile phone numbers which are believed to be of the Nigerians but they were found to be switched off.Officials suspect he might have been used by the Nigerian gang as carrier. The NCB has written to the government seeking details of the foreign trips Lalrinpuia had made earlier to find out if he had made similar trips to Mozambique.
2023-11-02T01:26:51.906118
https://example.com/article/5194
Q: translate perl script removing control characters in script(1) output to sed I'm recording terminal sessions using the script command. Unfortunately the typescript output file contains many control-characters - for example from pressing the full screen command (F11) when in the vim editor or try it below. script -f -t 2>${LOGNAME}-$(/bin/date +%Y%m%d-%H%M%S).time -a ${LOGNAME}-$(/bin/date +%Y%m%d-%H%M%S).session vi abc.log #write something and save #:x to quit vi ctrl + d to quit script The script output hostname-datetime.session contais too many vi control-characters. I found a perl script in commandlinefu, which can remove these control characters from the typescript. I am actually doing this replacement in C, and the program runs on a chroot envrioment, where the perl is not avaliable. Question: Is there a a way to translate the following perl command to sed ? cat typescript | perl -pe 's/\e([^\[\]]|\[.*?[a-zA-Z]|\].*?\a)//g' | col -b > typescript-processed A: This works well for me with GNU sed (or gsed on a Mac): sed -re 's/\x1b[^m]*m//g' typescript | col -b I created a sample typescript, and since I'm using a relatively advanced shell prompt, it's full of control characters, and the perl script in the OP doesn't actually work, so rather than converting I had to come up with my own. Looking at the typescript with hexdump -C, it seems that all control sequences start with \x1b (the Escape character, or ^[), and end with the letter "m". So in sed I use a simple replacement from ^[ until m, normally written as \x1b.*?m but since sed doesn't support the ? symbol to make a pattern non-greedy, I used [^m]*m to emulate non-greedy matching.
2024-02-17T01:26:51.906118
https://example.com/article/2554
Q: Access JSON index keys returned from laravel with groupBy() function How can I access the first object in json response? In controller: Model::with('some_relation')->get()->groupBy('id'); return response()->json(['transactions' => $transactions]); In view I get with ajax the json response: e.g. data: { 72: [{...},{...},{...}], 75: [{...},{...}], 80: [{...},{...},{...},{...}] } Now, if I want to access the first object (72) in jquery, I can't access it using data[0] to get the first array. I have to access it like data[72]. The data will be variable so I don't know what the id will be. How can I access the first object? A: If you only want them grouped, and not associated by the id, then reindex the collection with values(). Associative arrays don't exist in Javascript. This will organize it into a JSON array instead of a JSON object. Model::with('some_relation')->get()->groupBy('id')->values();
2023-10-07T01:26:51.906118
https://example.com/article/7107
More than 100 people died and three others are fighting for their lives after a Boeing 737 leased by a Cuban state airline crashed after takeoff, reportedly while making a U-turn to an airport in Havana. READ MORE: Boeing 737 with over 100 on board crashes at Cuban airport The aircraft was carrying 110 passengers and crew, and was heading to Holguin in eastern Cuba from the nation’s capital. It crashed shortly after takeoff, killing almost everyone on board. While the cause of the fatal incident remains unclear, eyewitnesses said that the plane tried to return to the airport after ascending and apparently hit a power line. Emergency services rushed to the scene within minutes of the crash. Footage from the crash site obtained by RT’s Ruptly video agency showed rescue workers and medics being helped by locals to carry one of the passengers on a stretcher towards an emergency vehicle. READ MORE: First footage from Cuba plane crash as rescuers look for survivors (PHOTO, VIDEO) Only four people were pulled out alive from the wreckage, but one of them, a man, died on the way to hospital. Three female survivors remain in a critical condition at the Calixto Garcia hospital. “It has been confirmed that the majority of passengers on the plane were Cuban,” Granma, the official newspaper of the Cuban Communist Party, said, noting that the crew members were foreigners. READ MORE: 3 survivors in Boeing 737 crash in Cuba (VIDEO) It was not immediately clear how many foreigners were among the passengers. Argentina's Foreign Ministry said two of the country’s citizens died in the crash. The 30-year-old Boeing 737, piloted by a Mexican crew, was being leased by the Cubana de Aviación airline from a small Mexican airline called Damojh, or Global. After initial confusion surrounding the number of passengers, Global Air confirmed that a total of 110 people, including 103 passengers, were aboard the B737-200 Boing aircraft, license plate number XA-UHZ. The company said that the aircraft was piloted by Jorge Luis Nunez Santos, with Miguel Ange Arreola Ramirez serving as the first officer. Think your friends would be interested? Share this story!
2024-07-13T01:26:51.906118
https://example.com/article/8742
sub A(Int $m, Int $n) { if $m == 0 { $n + 1 } elsif $n == 0 { A($m - 1, 1) } else { A($m - 1, A($m, $n - 1)) } }
2023-09-04T01:26:51.906118
https://example.com/article/2822
Pages , .... Tuesday £55 million! They say this is the most expensive ear ring in the world A pair of odd earrings are set to sell for the highest ever price when they go up for auction next month.The exceptional are pink and white and have been valued at nearly £55 million. Experts described the stones as being in a "class of their own", with the pink earring named Artemis and the blue, Apollo. According to UK Mirror, Apollo is a 14.54 carat vivid blue diamond which has been cut and polished into a pear shape. Artemis is a 16 carat fancy intense pink diamond. Both gems are phenomenally rare, with less than 0.1 per cent of diamonds having any blue in them. The pink and blue earrings were unveiled in London by Sotheby's which will be auctioning them on May 16 in Geneva.The diamonds were named Apollo and Artemis after the twin brother and sister of power and beauty who were among the most widely venerated of the Ancient Greek gods.
2023-10-09T01:26:51.906118
https://example.com/article/2598
Like other mothers, Patricia Cervantes has heard promises sung like empty lyrics by a chorus of presidents, governors and law enforcement authorities working in northern Mexico. Their reassuring words vow to end impunity and find justice for their murdered daughters. Cervantes, whose 19-year-old daughter Neyra was raped, tortured and murdered last year in Chihuahua City, has seen authorities defile her loved one's case to such an extent that someone even put a man's skull on Neyra's skeleton in order to make it appear that a full body had been recovered. She's watched in horror as Chihuahua state police officers picked up her nephew David Meza and then, according to the young man's account, tortured him into falsely admitting to killing Neyra. Speaking to reporters in Ciudad Juarez, Cervantes had a simple message: She wants her daughter's real killers caught. "We don't want words, we want action." Little has changed in the cases of Neyra Cervantes and the more than 400 women and girls who have been murdered in Ciudad Juarez and Chihuahua State since 1993, according to Amnesty International and press accounts. Dozens more remain missing. Still, police have arrested no credible suspects in the serial killings, while widely believed scapegoats like Meza remain locked up in jail, and new murders stain an already bloody landscape. Chihuahua's new governor, Jose Reyes Baeza, took office on Oct. 3 and was immediately confronted with the femicide issue as a top priority. He appointed a woman, Patricia Gonzalez, as new state attorney general, met with the relatives of murder victims, reshuffled law enforcement and women's services personnel, renamed the organized crime-linked Chihuahua State Judicial Police, and vowed to "lower impunity and clean up the security forces." But things have not gotten off to a good start. Within hours of Baeza's inauguration, a woman's body was discovered in Chihuahua City. In the next several weeks, six other women and girls were killed in Chihuahua City and Juarez. Some of the latest killings follow a previous pattern; changes in government or public events related to women's rights have been accompanied by the discovery of new bodies, as if a macabre message were being delivered. A victim recovered on Nov. 25, the International Day to Eliminate Violence Against Women, has been tentatively identified as Martha Cecilia Vargas, a mother of two who disappeared last August after leaving home to search for work in the maquiladora industry. If the victim's identify is confirmed, the Vargas murder would be the latest example of how authorities have underplayed the true number of missing/murdered women in the borderlands. The young mother's name was not on an official list of 35 disappeared Juarez women released by federal and state officials earlier in November. A Caravan for Justice With justice nowhere in sight, Patricia Cervantes and other victims' relatives embarked on a tour of 54 U.S. and Canadian cities in October. Dubbed the International Caravan for Justice in Juarez and Chihuahua and co-sponsored by the Mexico Solidarity Network and numerous local groups, members of the Juarez-based Nuestras Hijas de Regreso a Casa (Return Our Daughters Home) and the Chihuahua City-based Justicia para Nuestras Hijas (Justice for Our Daughters) spoke to thousands of people, ranging from high school students to seniors, and appeared on local news shows. They testified before the Inter-American Commission on Human Rights (IACHR) in Washington, D.C., and met with U.S. congressional representatives. In Las Vegas, N.M., the mayor proclaimed a day of solidarity, and new ground was broken when the New York City council passed a resolution promising to disinvest its money from companies that have maquiladora plants in Juarez if they do not do more to protect their workers. For caravan participants like Marilu Garcia, whose 17-year-old sister Lilia Alejandra, was raped and murdered in Juarez in 2001, the tour was bittersweet. "I would have liked to have a caravan for a reason of happiness," said Garcia. "It's shameful that family members have to join a caravan in this way and go to other countries to ask for justice, because they don't get it in their own country." The Mexican Government Drops the Ball, Again After arriving home on Oct. 31, the traveling mothers had their photos involuntarily snapped by officers with the Federal Investigations Agency, and some activists reported being followed by the Juarez city police in the days afterward. Already an international scandal, the unresolved murders of young women in Chihuahua not only call into question the Fox administration's human rights record, but threaten the very premise of governance as well. In Juarez, "the rule of law is broken," flatly states federal deputy Marcela Lagarde, the president of the Mexican Chamber of Deputies' femicide commission. Fed up with the way the Chihuahua State Attorney General's Office (PGJE) has long mishandled the murder cases, activists last year pressured President Vicente Fox into assuming a greater federal role. He named Guadalupe Morfin as the new Commissioner for the Prevention and Elimination of Violence Against Women in Ciudad Juarez . The president then appointed Maria Lopez Urbina special federal prosecutor. It was widely expected that Lopez Urbina would immediately launch a criminal investigation in search of the murderers. But one year later, the federal record is beginning to resemble the state record. Although Lopez Urbina's office located some of the missing women alive, it has not detained any serial murder suspects or assigned many new cases to federal investigators. Reviewing old state files, the special prosecutor singled out 129 former and current Chihuahua State officials for negligence and possible prosecution for omission of duties. Lopez Urbina then turned their names over to the state Attorney General—the same agency whose personnel were accused of committing the violations in the first place—for legal action. The new PGJE administration has suspended about 20 of its officials, but several have avoided prosecution through legal maneuvers. Notably, Lopez Urbina did not mention two past Chihuahua governors, or any of the numerous state attorneys general and Juarez district attorneys as bearing any responsibility in the botched investigations. All the individuals identified by Lopez Urbina were mid- or lower-level officials, and a dozen of them have filed defamation charges against her. Former Prosecutor for Women's Homicides in Ciudad Juarez, Zulema Bolivar, one of the officials identified by Lopez Urbina for alleged negligence and the current assistant director of the Juarez city jail, created a scandal of her own in November when she declared that her previous superiors, ex-State Attorney General Arturo Gonzalez and former Juarez District Attorney Jose Manuel Ortega, had irregularly yanked her off a notorious 2001 case in which eight women were found murdered in the middle of Juarez. Two bus drivers are widely suspected of being framed by the Chihuahua Attorney General's office for the crimes. While Bolivar's declarations signify that her supervisors might have engaged in far more than negligence, neither man was named by Lopez Urbina in her recent reports. Asked by the local press if Bolivar's statements would be investigated, Attorney General Gonzalez said legal impediments prevented her from doing so. Meanwhile, Ortega continues to work as legal director of her office. The nonprofit Washington Office on Latin America criticized Lopez Urbina's record so far, noting that the same deficient files she used to identify alleged state law enforcement violations were the basis for statements downplaying femicide. Indeed, Lopez Urbina's murder statistics are far short of the probable number of victims, who are sometimes omitted from the death toll, according to eyewitness and family versions. For instance, on Sept. 23, 2002 , the day ex-Gov. Patricio Martinez was in Juarez to inaugurate an ill-fated inter-institutional commission to address the murders, the body of 26-year-old Ericka Perez was tossed onto an empty lot. The same day Perez's body was found, the skeleton of another suspected murder victim was found behind a maquiladora plant. Also, Juana Sandoval vanished. Four months later, she was found raped and murdered along with two other victims. Initial police versions in the media reported that Perez had been raped and murdered by strangulation. Then-State Attorney General Jose "Chito" Silva quickly proclaimed that Perez had succumbed to a drug overdose, and her death was not placed in the official femicide roster. An unemployed maquiladora worker and former employee of the Instituto Mexico private school, Perez disappeared after leaving home to look for work, according to the victim's mother, Elia Escobedo. The distraught Escobedo now must care for Ericka's two children on wages earned from washing and ironing clothes. Scapegoats Rot Away Although the Mexican government claims to uphold international human rights agreements disallowing torture, the continued imprisonment of various suspects in the serial murders despite the lack of any hard evidence against them suggests otherwise, because the judges won't admit recantations as evidence. Besides David Meza, other suspects include U.S. citizen Cynthia Kiecker and her Mexican husband Ulises Perzabal. Both claim they were savagely tortured by public officials. The couple is currently being tried for the 2003 murder of 16-year-old Viviana Rayas in Chihuahua City, and a decision in their case is expected very soon. Then there is bus driver Victor "El Cerrillo" Garcia. Detained with fellow driver Gustavo Gonzalez in 2001 for the murders of eight women, Garcia and Gonzalez accused members of the Chihuahua State Police of torturing them. Gonzalez's lawyer, Mario Escobedo Jr., who complained to colleagues that he was threatened to abandon the case, was later shot to death by state police officers led by the same commander who had allegedly overseen the detention and torture of the bus drivers. Cleared by a judge, the commander, Alejandro Castro, then went on to work for a while in security at the federal government's anti-corruption ministry in Mexico City. In 2003, Gonzalez himself mysteriously died in a Chihuahua prison before ever receiving a sentence. Commissioner Morfin gives credence to reports by the United Nations, Inter-American Commission on Human Rights, National Human Rights Commission and Amnesty International that suspects including Garcia have been tortured into confessing to crimes they did not commit. Morfin's office has promoted the application of the Istanbul Protocol, a rigorous method of documenting torture, in confirming suspects' claims. But Morfin's efforts were shot down last month when Chihuahua Judge Gustavo Munoz Gamboa, ignoring both the pending application of the Istanbul Protocol and the lack of any hard physical evidence against Garcia, handed the man a 50-year prison sentence for murder. The Specter of a Coverup Looms Large With both state and federal efforts mired in chaos, there are several lines of investigation focusing on who is actually responsible for the femicides. Leads include a network of private computer schools, bars, businesses operating in both Juarez and Chihuahua City; police officers from different agencies, drug traffickers, wealthy businessmen, politicians, immigrant smugglers, El Paso residents and elements within the state Attorney General's office. "They're all in this up to their necks, in the murders and kidnappings," charges Evangelina Arce. Frustrated at state inaction, Arce began her own investigation into the 1998 disappearances of her daughter Silvia and a friend, Griselda Mares. She sniffed out a trail that led to two Federal Judicial Police officers as the probable culprits. The men have not been detained, but Arce says she has been under surveillance by Chihuahua state police, beaten up on the street, and hit by a car since speaking out. Another unpursued lead concerns Hector Lastra, a former state official who was arrested last February on charges of running a prostitution ring of underage teenage girls. Denying the accusations, Lastra was quickly released on bail. Reportedly, Lastra pressured teenage girls working at Juarez fast food restaurants into having sex with prominent businessmen. Clients were allegedly offered catalogues with photos of the girls, whose age and physical appearance resembled those of previous murder victims. Activists Move Forward Undaunted, victims' relatives and women's activists are pressing ahead with a multi-pronged struggle. Lawyer Lucha Castro plans to press on with cases filed with the Inter-American Commission on Human Rights that accuse the Mexican government of violating the rights of the victims and their family members. In the United States, activists are supporting resolutions in the House and Senate, sponsored by Rep. Hilda Solis (D-CA) and Sen. Jeff Bingaman (D-NM), respectively, that would offer greater U.S. technical assistance to the investigations and formally put the femicide issue on the agenda of bilateral U.S./Mexico relations. In Mexico City, a group of academics and activists have formed Grupo Alternativas, issuing specific recommendations to assign federal jurisdiction to all the murder cases and put one autonomous, unitary law enforcement agency in charge. The plan will be considered by the Mexican Chamber of Deputies femicide commission, according to commission president Marcela Lagarde. Additionally, the femicide commission intends to review a rash of women's murders in other Mexican states besides Chihuahua, among others, Sonora, Tamaulipas, Coahuila and Guanajuato. During the last week of November, dozens of mothers of murder victims traveled to Mexico City to meet with government officials including President Fox and attend anti-femicide demonstrations. Among their demands were renewed calls for the federal government to take over the murder investigations, the release of political prisoners, and the installation of 4,000 video security cameras in Juarez. While Fox instructed his cabinet members to work more closely with the mothers, Norma Ledesma, the mother of a 16-year-old computer school student raped and murdered in Chihuahua City in 2002, was quoted as stating that she was "more disappointed than ever" in the government's response. A separate, unsuccessful attempt to meet with Fox's wife, Martha Sahagun, likewise prompted denunciations by the mothers. Activists and victims' relatives say the Mexican government's time ran out long ago. Chihuahua City women's activist Graciela Ramos, who works with Mujeres por Mexico says her group advocates bringing international specialists to solve the murders. "In order to get at the truth, let people come who know how to investigate, who don't have any commitments to any party and who don't have to protect any government officials or ex-officials," says Ramos. "For this, a large budget is needed, and a lot of will and determination is required to arrive at a solution."
2023-12-12T01:26:51.906118
https://example.com/article/9091
Clinical features and prognostic relevance of ovarian involvement in non-Hodgkin's lymphoma: A Consortium for Improving Survival of Lymphoma (CISL) report. Fourteen patients had primary ovarian lymphoma, while eighteen patients had secondary ovarian involvement. There was no significant difference in survival rates between primary and secondary involvement with diffuse large B-cell lymphoma (DLBCL), the most common subtype. The 5-year overall survivals of primary and secondary involvement with DLBCL were 70.0% and 59.3%, respectively. The localized bilateral ovarian involvement showed poorer survival compared to stage III/IV patients with secondary ovarian involvement. Treatment outcomes of secondary ovarian involvement in non-Hodgkin's lymphoma were comparable to those of primary ovarian involvement, suggesting that ovarian involvement does not necessarily predict a worse prognosis for NHL patients.
2024-05-19T01:26:51.906118
https://example.com/article/4856
Q: What does it mean when a node is activated in dynatree? From this source http://wwwendt.de/tech/dynatree/doc/dynatree-doc.html node.activate() Activate this node - according to flag - and fire a onActivate event. If activeVisible option is set, all parents will be expanded as necessary. Focus is not set. What does it mean when a node is activated? It's not very intuitive. I understand expand and collapse as well as if a node is selected. A: From the documentation of Fancytree (the successor of Dynatree): https://github.com/mar10/fancytree/wiki/FAQ#q-what-statuses-can-a-node-have A node may be active, selected, focused, and/or hovered. These states are independent, so one node can have all, some, or none of these states at the same time: hovered Only one (or no) node can be hovered at any given time. A node becomes hovered, when the mouse pointer rests over it. focused Only one (or no) node can be focused at any given time. A node becomes focused, when the user presses TAB to enter the tree, or by pressing UP / DOWN keys. Note: if the autoActivate option is set, a node will be automatically activated, when it receives focus. (Use Ctrl-UP / Ctrl-DOWN keys to focus only.) active Only one (or no) node can be active at any given time. A node becomes active by a mouse click, keyboard navigation, or pressing SPACE on a focused node (or using UP, DOWN, when the autoActivate option is set). A typical use case would be to use the tree for navigation, i.e. to display details of the active node in a separate pane. selected None, one, or multiple nodes can be selected at any given time. If the checkbox option is active, this will also reflect the select-state. However in selectMode 1 ('single selection'), only one node is selectable, so the behavior is comparable to radio-buttons. A use case would be to allow the user to select several elements out of a set of hierarchical elements. (Other statuses include 'expanded', 'lazy', 'disabled', ...)
2024-05-13T01:26:51.906118
https://example.com/article/8607
Where is SoulCalibur V’s Single Player Content? Kenneth Richardson February 13, 2012 1:00 PM EST Before online gaming on consoles became commonplace, fighting game developers had their work cut out for them. Playing at home wasn’t like playing at a booming arcade; there was no never-ending line of opponents to test your mettle against and keep things exciting and varying. This meant that fans had to be kept happy with what was on the game disc out of the box. One particular fighting series that has never had even the smallest issue with this is the lauded SoulCalibur series. Numbered series installments always pack in tons of offline content for fans to enjoy. From galleries and museums that house treasure troves of concept art, exhibitional videos and character profiles to full on campaigns seperate from the main story with their very own narratives, Namco has always left me feeling perfectly content after purchasing a new SC title. Unfortunately, after plopping down the whole $85 for the collector’s edition of SoulCalibur V and playing it for several hours, I can comfortably say that this game is lacking in comparison to previous entries, and that is putting it quite lightly. Now, before I go any further, I must make it perfectly clear that SoulCalibur V is indeed worth the purchase price. Don’t just take my word for; check out Alexa’s positive review of the game here. It has superb game-play and production, and it is easily the prettiest 3D fighting game on the market right now. However, as a long time series fan, the game honestly falls a few bars short of it’s older siblings. The main thing lacking from SCV is a surplus of single player content. In the past, the console versions of the SC games were loaded with offline content, so much so that years could go by before you tired of everything. Let’s compare SoulCalibur V to SoulCalibur III, which is perhaps the most fully featured title in the series. The only single player modes in SoulCalibur V are: arcade, legendary souls, quick battle, training, story and character creation. This might seem like a fair suite of modes, and while it certainly is in comparison to other current titles in the genre, it is is flat out modest in comparison to other games in the series. Now observe SoulCalibur III‘s largesse of content: arcade, quick battle, training, story, character creation, museum, tutorial, chronicles of the sword, mission, shop and that’s just what I can remember. Now this alone makes SCV look much weaker, but it doesn’t stop here. Arcade modes almost always end with some sort of specially created ending for the character you cleared it with. This has been standard since Street Fighter II on the damned SNES. Beat Arcade mode in SCV and you get…nothing. But wait, there’s more. Past game’s actually rewarded you for playing. Here, it seems the only incentive to even touch arcade or the other single player modes is because they are there and you feel obligated to play with them considering you smacked down three (or four, in my case) twenties for the priviledge. Or if they want a controller smashingly difficult challenge in legendary souls, and because of its cheapness they probably don’t. More content like what was in the older games also could have helped the development team with the new emphasis on the game’s story. It’s obvious that Namco wanted to craft a serious and relevant story for this entry, which is all fine and dandy considering this component hasn’t been particularly strong in the last few games. However, it falls short here in various areas. SoulCalibur V‘s story mode focuses almost entirely on Sophitia’s offspring: Patroklos and Pyrrha. These characters, as well as the small handful of ‘new’ characters are the only characters ever so much as mentioned in the story. This leaves much of the game’s roster feeling tacked-on and unimportant to the SCV experience as a whole, unlike Z.W.E.I, Viola, Patroklos, etc. In past SC games, each and every character had their own story, their own set of events that wove them into the game world. Now, saying that this approach is better than what they did with SCV is only a matter of opinion, but there is no denying that the other games have a lot more story. The galleries present in past titles also helped to fully flesh out the characters. So, since they clearly wanted to create a relevant, understandable story that only focused on the few new characters, a gallery feature could have done worlds of good for explaining the ‘other’ characters and not making the series staples like Kilik, Raphael and Mitsurigi seem completely and utterly irrelevant. Besides, who in their right mind wouldn’t want to see something like this with SCV‘s jaw-dropping graphics? This makes the absence of a gallery mode stick out like a sore thumb. Even the majority of the new characters only recieve short spotlights in the main story. Why is Natsu here instead of Taki? Did Taki die or something? And what the hell happened to Kilik? Fans will have to go out of their way to watch developer diaries and read around on the internet to find out. Couple all of this with a roster size that most other new fighters would laugh at (with multiple random characters and ‘clones’) and a new found focus on the character creation and online modes and it shouldn’t be too hard to understand my sentiment. What Namco did with all the wonderful ideas that went into previous series games is beyond me, but I know they didn’t put them in SoulCalibur V. The whole bare bones attitude is just the complete opposite of what we expect from a franchise so inclined to giving fans more than their money’s worth. Booting up SCIII I had to stare at all of the options for several minutes and go into various submenus before deciding what I’d do that play session. Booting up SCV I can go online, I can create a character or I can find a different game to play. I’ll reiterate that SCV‘s airtight game-play, character variety, sky-high production value and flawless online suite make it worth the price of admission. Unfortunately, if you load up the game with expectations based on the value the SC games usually posess like I did, you will be very disappointed.
2024-01-24T01:26:51.906118
https://example.com/article/4150
[Diagnosis and treatment of adnexa tumors in childhood and adolescence]. From 1968 to 1988, 47 children and adolescents, their ages ranged from a few days to 21 years, were treated for tumors of the ovary in the hospital for children and adolescents and the surgical department of the University of Erlangen-Nürnberg. In 33 cases ovarian cysts were found, 14 patients suffered from a neoplasm of the ovary. 8 of the neoplasms were benign cystic and solid teratomata, 4 were of epithelial origin and 2 identified as juvenile granulosa cell tumors. There was a follow up in all patients with tumors ranging up to 19 years.
2023-09-08T01:26:51.906118
https://example.com/article/6821
Return Of Wolverine #3 by Charles Soule and Declan Shalvey is slipping a little, from the scheduled 21st of November to the 28th November. No biggie. However, Return Of Wolverine #4 is slipping out of 2018's statistics altogether, from the planned 19th December to the 16th of January, which will probably annoy the beancounters even more than the fans. Return Of Wolverine #5 is still scheduled for January 30th as Steve McNiven returns to the book, but we shall see. RETURN OF WOLVERINE #3 (OF 5) (W) Charles Soule (A) Declan Shalvey (CA) Steve McNiven Wolverine vs. the X-Men?! Parental Advisory In Shops: Nov 28, 2018 Final Orders Due: Nov 05, 2018 SRP: $3.99 RETURN OF WOLVERINE #4 (OF 5) (W) Charles Soule (A) Declan Shalvey (CA) Steve McNiven Can Logan handle the truth of what he's done? Parental Advisory In Shops: Jan 16, 2019 SRP: $3.99 RETURN OF WOLVERINE #5 (OF 5) (W) Charles Soule (A/CA) Steve McNiven Now that Logan has risen…how far can he fall? Parental Advisory In Shops: Jan 30, 2019 SRP: $4.99
2024-05-09T01:26:51.906118
https://example.com/article/2289
<?xml version='1.0' encoding='UTF-8' ?> <!-- DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER. Copyright (c) 1997-2017 Oracle and/or its affiliates. All rights reserved. The contents of this file are subject to the terms of either the GNU General Public License Version 2 only ("GPL") or the Common Development and Distribution License("CDDL") (collectively, the "License"). You may not use this file except in compliance with the License. You can obtain a copy of the License at https://glassfish.dev.java.net/public/CDDL+GPL_1_1.html or packager/legal/LICENSE.txt. See the License for the specific language governing permissions and limitations under the License. When distributing the software, include this License Header Notice in each file and include the License file at packager/legal/LICENSE.txt. GPL Classpath Exception: Oracle designates this particular file as subject to the "Classpath" exception as provided by Oracle in the GPL Version 2 section of the License file that accompanied this code. Modifications: If applicable, add the following below the License Header, with the fields enclosed by brackets [] replaced by your own identifying information: "Portions Copyright [year] [name of copyright owner]" Contributor(s): If you wish your version of this file to be governed by only the CDDL or only the GPL Version 2, indicate your decision by adding "[Contributor] elects to include this software in this distribution under the [CDDL or GPL Version 2] license." If you don't indicate a single choice of license, a recipient has the option to distribute your version of this file under either the CDDL, the GPL Version 2 or to extend the choice of license to its licensees as provided above. However, if you add GPL Version 2 code and therefore, elected the GPL Version 2 license, then the option applies only if the new code is made subject to such option by the copyright holder. --> <faces-config version="2.2" xmlns="http://xmlns.jcp.org/xml/ns/javaee" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation=" http://xmlns.jcp.org/xml/ns/javaee http://xmlns.jcp.org/xml/ns/javaee/web-facesconfig_2_2.xsd"> <flow-definition id="flow-b"> <flow-return id="taskFlowReturn1"> <from-outcome>#{flow_b_Bean.returnValue}</from-outcome> </flow-return> <inbound-parameter> <name>param1FromFlowA</name> <value>#{flowScope.param1Value}</value> </inbound-parameter> <inbound-parameter> <name>param2FromFlowA</name> <value>#{flowScope.param2Value}</value> </inbound-parameter> <flow-call id="callA"> <flow-reference> <flow-document-id>unique</flow-document-id> <flow-id>flow-a</flow-id> </flow-reference> <outbound-parameter> <name>param1FromFlowB</name> <value>param1Value</value> </outbound-parameter> <outbound-parameter> <name>param2FromFlowB</name> <value>param2Value</value> </outbound-parameter> </flow-call> </flow-definition> </faces-config>
2023-11-12T01:26:51.906118
https://example.com/article/9326