text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
The Catholic Church is seeking approval for a $161 million, 69-storey skyscraper, in what experts say is evidence of its “vast wealth”. The proposed 234-metre residential tower in Sydney’s CBD would be built by the Catholic Archdiocese of Sydney at an estimated cost of $161.6 million. The plans for the 133-141 Liverpool Street site were revealed in a development application submitted to the City of Sydney by local architects Candalepas Associates. The application is currently up for public exhibition, allowing members of the public to make written comments or objections to the council, until November 1. The site is occupied by 1977 brutalist-style building, the Polding Centre, which houses the church’s Sydney offices. Catholic Church one of Australia’s biggest property owners Melbourne Law School lecturer Ann O’Connell described the Sydney Archdiocese’s skyscraper plan as “further evidence, if any was needed of the vast wealth of the Catholic Church”. The Catholic Church is believed to be one of the largest non-government property owners in Australia, but is notoriously secretive about the extent of its wealth and assets. Earlier this year, Fairfax Media estimated the Church’s national wealth at $30 billion. Professor O’Connell, an expert in the taxation of charities, said the church would be exempt from paying tax on profits from the proposed skyscraper regardless of whether it was sold or rented. In 2014, the Sydney Archdiocese was compelled to reveal its wealth to the child abuse royal commission, unveiling assets worth $1.24 billion, plus multi-million-dollar annual surpluses. In 2018, Victoria and NSW became the first states to abolish a legal loophole known as the ‘Ellis defence’ that prevented the Catholic Church from being sued for compensation by victims of abuse. The ‘Ellis defence’ previously allowed the Catholic Church to successfully argue that it did not exist as a legal entity, protecting its assets through separately-held trusts. Professor O’Connell criticised the lack of transparency surrounding the Catholic Church’s income and assets. “Churches, unlike most other charities, do not have to provide financial reports to the charities regulator,” she said. Catholic archdioceses around Australia are classified as ‘basic religious charities’ by the Australian Charities and Not-for-profits Committee (ACNC), and are not required to submit financial reports. The Catholic Church lobbied strongly against government regulation of charities, which were free from oversight before the creation of the ACNC in 2013. The basic religious charities exemption has since been called into question, most recently under a five-year review of the ACNC Act, which recommended that it be retained. “This is perhaps not surprising given the significant political influence of churches, in particular the Catholic Church,” Professor O’Connell said. Professor O’Connell said that churches were originally granted tax concessions due to their work caring for the poor and underprivileged. “It could be argued that now the churches are simply accumulating vast wealth and should contribute to tax revenue,” she said. The development proposal is “incongruous” at a time when “Catholic education is demanding more funding from the Commonwealth and state governments for Catholic schools”, Professor O’Connell said. University of Sydney tax law expert Fiona Martin said the lack of financial transparency requirements for charities including churches remains “quite problematic”. “There’s no consistent way that charities have to do their financial reports. They just have to comply with financial standards overall,” Professor Martin said. In February, a six-month investigation by The Age found that the Catholic Church held more than $9 billion in property and other assets in Victoria alone. This included 1800 church-owned properties in Victoria, which ranged from schools and churches to nursing homes and office buildings. The Sydney Archdiocese did not respond to The New Daily‘s requests for comment by deadline.
2024-03-01T01:27:17.568517
https://example.com/article/9082
Researchers in the field of integrated optics have long sought to develop methods for producing active devices, such as lasers or light-emitting diodes (LEDs), and passive devices, such as waveguides, couplers, switches, modulators, and the like on the same substrate. Because the appropriate active devices can only be manufactured in semiconductor materials, the above-referred to passive devices would therefore also have to be manufactured in or on a semiconductor substrate. Both active devices and passive components, such as waveguides, have been manufactured in GaAs. However, GaAs lasers or LEDs emit light of a relatively short wavelength which is shorter than the infrared wavelengths currently considered most promising for fiber optical communication. These wavelengths of current interest for optical communication are in the region from about 1 .mu.m to about 1.6 .mu.m. In this wavelength regime, InP and InGaAsP LEDs and lasers have been developed. Consequently, attention is being paid to InP and InGaAsP as semiconductor materials for related integrated optics. In particular, work has been done to develop methods for fabricating optical strip waveguides in InP and InGaAsP. In order to manufacture a strip waveguide, it is necessary to change the refractive index of some volume of material so that the effective refractive index of the material surrounding the waveguiding region is less than the effective refractive index of the waveguiding region. Such a structure can guide electromagnetic radiation of the appropriate wavelength by means of total internal reflection. Several approaches have been used in the past to create the above referred to difference in the effective refractive indices. In insulators, such as LiNbO.sub.3 or LiTaO.sub.3, metal in-diffusion is a commonly practiced method. See, for instance, U.S. Pat. No. 4,284,663, issued Aug. 18, 1981 to J. R. Carruthers, I. P. Kaminow, and R. V. Schmidt for "Fabrication of Optical Waveguides by Indiffusion of Metals." The in-diffusion of metal ions, e.g., of Ti, into LiNbO.sub.3 or LiTaO.sub.3 is carried out at quite high temperatures, typically greater than about 800.degree. C. InP and InGaAsP sample surfaces typically deteriorate when maintained at elevated temperatures. The deterioration is mainly due to loss of phosphorus from the sample. This loss is considerable at the high temperatures usually thought to be necessary to obtain acceptably short diffusion times, i.e., at temperatures comparable to those used in, e.g., LiNbO.sub.3. For this and other reasons it has hitherto been considered impractical to fabricate waveguides in InP and InGaAsP by means of metal indiffusion. Therefore, other approaches to waveguide formation have been used in these and other compound semiconductors. One of these alternate approaches has been the use of rib waveguides in materials such as GaAs and InP. See, for instance, the article by Reinhart et al entitled "Transmission Properties of Rib Waveguides Formed by Anodization of Epitaxial GaAs on Al.sub.x Ga.sub.1-x As Layers," Applied Physics Letters, 24, pp. 270-272, Mar. 15, 1974. Rib waveguides can be formed by appropriately shaping the surface of a planar waveguide. See, for instance, U.S. Pat. No. 4,093,345 issued on June 6, 1978 to Ralph Andre Logan, Franz Karl Reinhart, and William Robert Sinclair. Stress-caused changes in the refractive index have also been used to create strip waveguides in InP. See, for instance, T. H. Benson et al., "Photoelastic Optical Waveguiding in InP Epitaxial Layers," 7th European Conference on Optical Communications, Sept. 8-11, 1981. Benson et al. defined strip waveguides in InP samples by depositing either a positive or a negative pattern of a thick (approximately 1 .mu.m) metal film on the substrate. By a positive pattern or mask, we mean herein a metal pattern that directly overlies the region to be transformed into a waveguide, and by a negative pattern or mask, we mean herein a metal pattern that overlies the regions of the substrate bordering the region to be transformed into a waveguide. The metal used by Benson et al typically was gold, and the pattern was typically created by standard photolithographic and etching techniques. A planar waveguiding layer was created by forming an n-type InP epitaxial layer on an n+ InP substrate. Lateral confinement of the radiation was achieved through the strain induced in the epitaxial layer by the thick metal film on cooling after evaporation of the metal. The presence of a conductive layer, e.g., a metal layer, on a semiconductor surface is known to result in a change of the effective index of refraction of the near-surface semiconductor material. This effect has also been used to define waveguiding structures. See, for instance, "GaAs Electro-Optic Directional Coupler Switch," J. C. Campbell et al., Applied Physics Letters, 27, pp. 202-205, Aug. 15, 1975. Thus, the prior art teaches several methods for manufacturing optical strip waveguides in InP and InGaAsP. However, these methods have drawbacks. For instance, rib waveguides typically have relatively high scattering loss off the edges of the rib. Stress-induced waveguides are in principle easy to manufacture, but in practice are difficult to manufacture reproducibly, and device characteristics are subject to change with time. And metal-loaded waveguides strongly attenuate the transverse magnetic (TM) mode of the electromagnetic radiation, and thus have restricted applicability, in addition to confining the radiation relatively poorly. For these and other reasons, a method for manufacturing optical strip waveguides in InGaAsP and InP, as well as other semiconductors, that is compatible with established processing techniques, is reliable, reproducible, and results in guides capable of guiding both transverse electric (TE) and TM modes with relatively little loss would be of considerable interest.
2024-03-19T01:27:17.568517
https://example.com/article/3606
Pages Monday, 28 October 2013 Things You Should Know About Islam & Muslims Although Islam in United States is rapidly expanding as day goes by, I guess not everyone knows much about Islam. Let's screen your knowledge about it by going through a few questions I have here. 1. Do you know what does it mean when people tell you, "I'm Muslim"? What's "Muslim"? 2. What is the difference between "Islam" and "Muslim"? You might know the word Islam, but not Muslim. 3. What is that thin little fabric some girls wrap around their head? She's so pretty. SubhanAllah. 4. Why do some Arabs always request for "Halal food" at the cafeteria? *Just so because most of the Muslims you can find here in America are Arabs. 5. Why does whenever someone say he is a Muslim, he kinda knows Arabic (though not fluent in it)? 6. "Would you mind giving us five-minute break? I need to pray." What kind of prayer needs 5 minutes break? How many times do you have to pray? I promise to make this as simple, short and concise as possible. I'll leave out all the jargon words so you wouldn't have to google for them. Note: Just bare in mind that I am not trying to convince anyone to convert to Islam. I realize that a lot of people I met at college do not know about Islam, so maybe you might want to know more. It's like getting to know something about your new friend. What he doesn't like, what he can't eat, what he must do and stuff. KEEP CALM AND SCROLL DOWN. Islam is the name of the religion. It is originated from Arabic word, Salam, which simply means peace. On the other hand, Muslim means someone who believes and follows Islam in his life. This is a religion that strictly states that God exists, there is only one God and Prophet Muhammad is the Messenger of God (An individual chosen by God to guide human beings in becoming good Muslims inside and outside too. We refer to God as Allah (which means God in Arabic). Same as Christianity and some other religions, Islam has a holy book too, which we called as Al-Quran/ Holy Quran/ Quran. This book is fully in standard Arabic and is undeniably beautiful in its structure of the sentences. No one can write as beautifully and grammatically correct as what are written in this book. So, the reason why Muslims, not necessarily the Arabs, have sufficiently good grasp of Arabic language is because we read the Quran in our daily life; in our prayers. Many countries where Muslims are the majority offer the opportunity for the citizens to learn Arabic since kindergarten. I personally learned Arabic since I was in kindergarten till I graduated high school at the age of 17. I might not be able to speak conversational Arabic as I never spoke it with my friends, but I do know a lot of words and understand the grammar rules. We, as Muslims, value Arabic language so much because we believe that is is the language of the Jannah (heaven). There are a lot of expressions in Arabic language that are widely used by Muslims such as MashaAllah (God's will; said when someone did a good job), SubhanAllah (God is Glorious), Astaghfirullah (God forgive me; when someone did something sinful), Allahuakbar (God is the Greatest), InshaAllah (If God wills it) and Alhamdulillah (thankful; being grateful for something). You might not know a guy is a Muslim until he tells you so, but it is pretty much obvious to know what religion does a girl wearing a wrap around her head embraces. It's Islam. The wrap is pretty much known as a Hijab (also originally an Arabic word), but you might as well just call it a headscarf (Make more sense to you, ayte?). That's what I always refer it to whenever people start asking me about it. It basically represents modesty and identity of a Muslim. The correct way to wear the headscarf is to always cover your head, hair and your front chest. More explanation about Hijab. In general, women in Islam are to cover their WHOLE body, including their feet, except their face and two hands (from the wrist to nails). The left one is how a Muslim woman should dress up. "What's up with covering your whole body? It's an oppression to the women!" Heaven, NO. The reason why, in Islam, women are required to cover their body is to protect them from evil eyes of the men who have bad intentions towards the women. P/s: You should read about how women were treated in this world before Islam came. Women were treated like an object, who had no value at all. Who could be thrown away like a trash whenever they are not needed anymore. Who had no freedom of speech and such things. Islam actually helped to increase the status of women in a society. How can that be unfair, man? Prayers. Muslims should pray FIVE times a day. We pray during morning (before sunrise), afternoon, evening (before sunset), evening (after sunset) and lastly, one prayer at night. We have many other prayers that we can perform at some specific times, but these five prayers I just mentioned are the compulsory ones. Our prayer involves some movements and recitations of the Quran (all in Arabic). Here is a video of how we pray, if you are interested to know: Christians have churches and Hindus have temples. Do Muslims have one? A place where all Muslims gather and pray together is called a Mosque. Below are some of the beautiful Mosques from all around the world. Sultan Ahmed Mosque, Turkey. Masjid Al-Haram, Makkah, Saudi Arabia. Food. Muslims are supposed to eat Halal food and are strictly not allowed to eat pork. By eating halal meat, it simple means that the animals need to be slaughtered by a Muslim. There are also a few other procedures that need to be followed such as using a well-sharpened knife to make a swift, deep incision that cuts the front of the throat, the carotid artery, windpipe, and jugular veins of the animal. The reason is so that the animal doesn't suffer for a long time before it dies. The animals should also be slaughtered upon utterance of the Islamic prayer "in the name of God." That's why it must be slaughtered by a Muslim in this case. By the way, seafood is excluded from having to undergo slaughtering process. So, slaughtering is basically for most of the animals living on land. A video of how the slaughtering process is done: P/s: It starts at 10:00 on the second video. Considering that it is already 1 oclock in the morning here, I need to stop writing now. I think this explanation would suffice as basic things you should know about Islam, but I might add more if I have time. If there are any mistakes, please let me know. I will correct them as soon as possible. Thanks!
2024-04-11T01:27:17.568517
https://example.com/article/3554
Patients with aggressive brain tumours could be treated with a virus, according to a new study. Injected directly into the bloodstream, the virus could also boost their immune system in the process. Scientists at the University of Leeds and the Institute of Cancer Research in London carried out successful trials on nine brain cancer patients using a ‘reovirus’. The researchers found the virus could cross the protective membrane surrounding the brain to reach tumours. The study is published in the journal Science Translational Medicine. Leeds researchers show that a virus given in a drip could be the latest weapon in the fight against hard-to-treat brain tumours: https://t.co/I5yn3ZUgoVpic.twitter.com/7yrLotgwjr — University of Leeds (@UniversityLeeds) January 3, 2018 Previously it had been demonstrated that the virus could kill tumour cells without harming healthy cells. However, until now scientists thought it was unlikely that the virus would be able to pass from the bloodstream into the brain. The trial patients, all of whom were due to have tumours surgically within a few days of the experiment, were injected with the virus via a single-dose intravenous drip. Once the tumours were removed samples were taken for analysis, with results showing that the virus had reached the tumours in all cases. “This is the first time it has been shown that a therapeutic virus is able to pass through the brain-blood barrier, and that opens up the possibility this type of immunotherapy could be used to treat more people with aggressive brain cancers,” said Dr Adel Samson, co-lead author and medical oncologist at the Leeds Institute of Cancer and Pathology at the University of Leeds. Interestingly, the researchers also found that the virus had stimulated the body’s own immune system. “This study was about showing that a virus could be delivered to a tumour in the brain. Not only was it able to reach its target, but there were signs it stimulated the body’s own immune defenses to attack the cancer,” he added in a statement. Groundbreaking immunotherapy combination kills brain cancer in mice – study https://t.co/UCaLo26ki6pic.twitter.com/FtCT8nn7dM — RT (@RT_com) February 16, 2017 “In our study, we were able to show that reovirus could infect cancer cells in the brain. And, importantly, brain tumours infected with reovirus became much more visible to the immune system,” co-lead author Alan Melcher, Professor of Translational Immunotherapy at the Institute of Cancer Research, London, said. The study potentially paves the way for further research into using immunotherapy as a cancer treatment alongside existing methods. A new trial has already begun treating patients with the reovirus alongside the standard post-surgical treatments of radiotherapy and chemotherapy. In this latest experiment, doctors will deliver repeated doses of the virus to the patients to help “kickstart” the body’s own defenses. READ MORE: Price gouging? Cancer drug price spikes from $50 to $768 per pill after change of owner According to figures from Cancer Research UK, almost 11,000 new cases of primary brain cancers were diagnosed in the UK in 2014. Only 14 percent of patients survive for 10 years or more following such a diagnosis.
2023-11-18T01:27:17.568517
https://example.com/article/1608
Complete 'melting' of charge order in hydrothermally grown Pr0.57Ca0.41Ba0.02MnO3 nanowires. Nanowires of Pr0.57Ca0.41Ba0.02MnO3 (PCBM) (diameter approximately 80-90 nm and length approximately 3.5 microm) were synthesized by a low reaction temperature hydrothermal method. Single-phase nature of the sample was confirmed by XRD experiments. Scanning electron microscopy (SEM) and transmission electron microscopy (TEM) were used to characterize the morphology and microstructures of the nanowires. While the bulk PCBM is known to exhibit charge order (CO) below 230 K along with a ferromagnetic transition at 110 K, SQUID measurements on the nanowires of PCBM show that the charge order is completely absent and a ferromagnetic transition occurs at 115 K. However, the magnetization in the nanowires is observed to be less compared to that in the bulk. This observation of the complete 'melting' of the charge order in the PCBM nanowires is particularly significant in view of the observation of only a weakening of the CO in the nanowires of Pr0.5Ca0.5MnO3. Electron paramagnetic resonance experiments were also carried out on the PCBM nanowires using an X-band EPR spectrometer. Characteristic differences were observed in the line width of nanowires when compared with that of the bulk.
2023-08-13T01:27:17.568517
https://example.com/article/4518
1. Field of the Invention The present invention relates to a method of cutting a ceramic green block. 2. Description of the Background Art In order to cut out chips from a fired ceramic block or to cut an Si wafer, a dicing saw which has a high dimensional cutting accuracy is normally employed. However, such a dicing saw, which is adapted to cut a workpiece with a high-speed rotary knife, is generally not suitable for cutting a soft or adhesive material. On the other hand, a ceramic green block can generally be punched or stamped cut by a press blade. Such a ceramic green block is soft enough to allow a press blade to punch out chips from the block at a higher cutting speed than that of the dicing saw, with equipment having a lower cost. Thus, the cutting operation can be carried out at a reasonable cost. Chips cut out from a ceramic green block are employed as elements for obtaining ceramic electronic components, for example. As electronic components have been increasingly miniaturized and improved in performance in recent years, chips must be cut out from a ceramic green block with higher cutting accuracy. When a blade is employed for punching out such chips, it is difficult to attain high cutting accuracy, due to the movement of the block or the chips during cutting. Further, it is difficult to punch chips from a ceramic green block which has a hard internal portion of a metal film or a metal foil by such a blade. In contrast, a dicing saw has satisfactory cutting accuracy. When such a dicing saw is adapted to cut a soft workpiece such as a ceramic green block, however, the cost for the cutting step is increased since such a soft material cannot be cut at a high speed. Accordingly, an object of the present invention is to provide a method for efficiently cutting a ceramic green block by use of a dicing saw. In order to solve the aforementioned technical problem, the present invention is characterized in that the ceramic green block is heat treated, thus improving the hardness of the block before the same is cut by a dicing saw. In the ceramic green block to which the present invention is applied, at least a portion to be cut is not necessarily formed only by a ceramic green body, but may contain a different material in the form of a metal paste film or a metal foil, for example. According to the present invention, the ceramic green sheet is heat treated to improve its hardness. Therefore, the ceramic green block can be cut by a dicing saw at a high speed. Since the ceramic green sheet is cut by a dicing saw, it is possible to improve cutting accuracy, as well as to obtain a smooth cut surface. According to the present invention, therefore, chips for electronic components can be cut with high accuracy, whereby it is possible to miniaturize and improve the performance of such electronic component chips. In the present invention, the ceramic green block preferably contains a binder in an amount 4 to 20 percent by weight of the block. If the content of the binder is less than 4 percent by weight, it is impossible to bind the block when a solvent is vaporized by heat treatment. When the content of the binder exceeds 20 percent by weight, on the other hand, the block is undesirably softened during the process of heat treatment. In the present invention, further, a Vickers hardness of the ceramic green block is preferably brought into a range of 20 to 100 kg/cm2 by the heat treatment. Such a preferable range of Vickers hardness has been experimentally determined, in order to attain an excellent cutting property for cutting the ceramic green block with a dicing saw. In the heat treatment step according to the present invention, the heat treatment temperature is preferably selected within a range of 50 to 200xc2x0 C. If the heat treatment temperature is less than 50xc2x0 C., no effect of heating appears on the ceramic green block, while the binder is undesirably converted if the heat treatment temperature exceeds 200xc2x0 C. The foregoing and other objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description of the present invention.
2023-08-23T01:27:17.568517
https://example.com/article/7525
23 June 2016 David Petraeus: A Shot from the Grave*** “We can’t solve problems with the same thinking that created them.” - Einstein You remember David Petraeus. He was the Obama era model for a politically correct general. Petraeus left the military with four stars and a chest full of medals only to be undone by Tampa camp followers and a subordinate girl friend from his days in Kabul. Indeed, poor judgement caught up with the general, ironically, while he was Director of CIA. How the chief of a major intelligence agency could not know that NSA or the FBI might be reading his love notes is a mystery to the cloak and dagger crowd everywhere. It is possible, however, that a naive general at Langley was exactly what the White House sought for CIA. A second and terminal Libya fiasco unfolded shortly after General Petraeus and Paula Broadwell became household words. With Benghazi, the CIA, DOD, and the State Department lost a diplomatic cover CIA Annex, a “black” gun running operation, and four brave men, including an ambassador. The al Qaeda/ISIS consortium in Libya has been flourishing ever since. The American ambassador to Libya now does business from Tunisia. Well she might, lest she suffer the same fate as her predecessor. The big loss in North Africa was not an embassy, nor an ambassador. The big loss was Libya, another entire Muslim oil state given over to Muslim theocracy, chaos, and terror. Who would have ever thought that the world would one day be nostalgic for an apostate like Colonel Muammar Gaddafi. The woman who orchestrated, the Libya fiasco as US Secretary of State is now poised to become the next commander-in-chief. Given the politics of generals these days, it’s not hard to imagine that General Petraeus might be auditioning for rehabilitation and another job in the next administration. Withal, the Petraeus soap opera is a fitting coda to Libya as we knew it. Our general was, up to that point, the doctrinal darling of the Department of Defense, an institution that has not won a small war, nor “stabilized” a third world autocracy, since Korea. Indeed, the Korean stalemate today is a golden success compared to 65 years of futile small wars in the Muslim world. The phenomenon is now known as the “Long War,” a DOD euphemism for managing expectations about any future American military operations. Indeed, if you read between lines wherever jihad and small wars are discussed, the “new normal” is stasis; the passive prospect of more urban terror, more airliners blown from the sky, and more small wars that no one at the White House or the Pentagon intends to win. The goals of Long War aficionados are “stability” and “nation building” and other such vagaries. Success or military victory is not part of the discussion. Indeed, the idea is to use soldiers and Marines like schoolies, cops, and social workers – or targets more likely. The underlying premise of contemporary doctrine is that we should pander; facilitate immigration, study Arabic language, accommodate Muslim culture no matter how vile, and allow more mosques. All the while hoping Muslims will become more like us. The only sizable Muslim ethnic group capable of reform or integration with the West is Kurdistan. Alas, the Kurds are likely to be thrown to Turkish wolves again by DOD and NATO as soon as their utility in the ISIS fight is exhausted. Wishful thinking is the hijab of appeasement. America and Europe are turning one cheek, and then the other, then bending over – and praying the future of our collective azimuths will not be as painful as the last fifty years. More of the same might be a recipe for success if and when Europe and America view the world from prayer rugs too. Part of the problem, surely self-inflicted, is a kind of strategic ambiguity that defies logic and experience. One the one hand, insidious regime change schemes create political vacuums only to have the void filled by theocracy. On the other hand, subsequent civil/sectarian wars are aggravated by American generals and intelligence agents who throw money and arms at both sides of the Shia/Sunni divide. A US soldier in places like Iraq, Syria, or Afghanistan is likely to be killed or maimed by weapons purchased by the American taxpayer. Indeed, neither the Intelligence Community nor DOD has reliable Shia or Sunni allies in the Ummah. Most jihadist sects are joined by contempt for Europe and America. The loyalty of most Muslim, Persian, or Arab factions lasts as long as the baksheesh, hashish, opium,bacha bazi, and immigrant quotas hold out. How did we get to where we are? At what point did the American defense establishment morph into feckless flakes, both intrusive busy bodies and pandering catamites? The answer to these questions may lie with science and prophecy. The science is ironically called military “art:” strategy, operations, doctrine, and tactics. The idea is that success and victory are usually a function of concrete capabilities (air, land and sea) artfully applied. The “artfully applied” bit is the job of flag officers like General Petraeus. Alas, Petraeus is not just any general; he is also a military intellectual. Indeed, like his biblical namesake, David is a modern warrior/prophet, the author of a military Koran of sorts: Insurgencies and Countering Insurgencies, US Army Field Manual 3-24. General Petraeus literally wrote the book that provides the doctrine, or should we say dogma, that rationalizes modern operational art in the 21st Century. Petraeus cant is not without its critics, but who reads military manuals - or their reviews? Nonetheless, the Petraeus worldview is fairly consistent with prevailing sentiments about politically correct social and foreign policy memes. No surprises there. Unfortunately, like domestic social problems, throwing good lives and scarce resources willy-nilly at global religious riot has proved to be a poor investment. The only proven remedy for toxic ideology is eradication, defeat in detail. General Washington didn’t need to convert the English; he needed to defeat the idea of colonial imperialism. General Grant didn’t need to win the hearts and minds of Georgians; he needed Sherman to scorch a path to Atlanta, flank General Lee, and set the table at Appomattox. Eisenhower and MacArthur didn’t need to “stabilize” Germany and Japan; FDR needed his generals to defeat two toxic ideologies – and demand unconditional surrender. “Nation building” is a logical consequence of, not a substitute for, victory. War, in its essence, is the art and science of killing and breaking things. If you are not in it to win it, you shouldn’t begin it. George Patton put it best, “I am a soldier. I fight where I’m told. I win where I fight.” Patton’s and MacArthur’s doctrines reflected the harsh realities of warfare, not wishful thinking. Rationalizing contemporary military invasions as humanitarian interventions is disingenuous malarkey. Regime change and imperial democracy have little to do with concern for human life and nothing to do with moral superiority. Petraeus doctrine assumes its conclusions -- and excludes other contingencies. Jihad, religious war, civil war, revolution, urban revolt, imperial, and proxy wars are the excluded middles. Indeed, if we were to aggregate most global conflicts at the moment, they could be captured under a single rubric, religious war, surely not insurgency or counterinsurgency. Petraeus’s rhetoric about “insurgency” is just the bong resin of Vietnam. Killing and terrorizing real or imagined secular, apostate, or infidel enemies is religious war by any plain, if not simple, definition. When politicians and generals cannot define the conflict, or the enemy, defeat or indefinite conflict becomes a self-fulfilling prophecy. The fact the White House, the Department of Defense, or generals like Petraeus do not choose to see, or recognize, the many conflicts, within and without the Muslim world, as jihad does not make those small wars any less of a global threat. How aggressors like Osama bin-Laden, Mullah Omar, or Abu Bakar al-Baghdadi see warfare is much more relevant than any social rationalizations or defensive wishful thinking at the Pentagon. General Petraeus had opportunities to provide a proof of concept with commands in Iraq and Afghanistan. His celebrated doctrine did not provide a framework for victory in either posting. Indeed, by any fair evaluation, the Taliban and the Islamic State have out-generaled the Pentagon with terror, jihad , and an Islamist war doctrine that guys like Petraeus fail to comprehend. Clarity about the nature of war is one of many advantages for the ideologue, the Islamist, the jihadist, the terrorist, and the passive aggressive Muslim majority. Bruce Hoffman put it best; terror and small wars are the preferred Muslim tactics because ideological clarity and terror works. The restive Ummahwins, while the West just bleeds. The no-man’s-land between strategic clarity and the fog of war in America is now littered with nearly100,000 American casualties from Iraq and Afghanistan alone. But then again, they’re volunteers now. So maybe the dead and maimed don’t matter that much anymore. This is not to lay the burden of the Muslim Wars at the feet of General Petraeus. He is just the guidon in a long gray line of strategic lemmings. Petraeus is not unique; he is a logical consequence of a culture that confuses resume, position, and promotion with achievement. Unfortunately, David is a flag with a paper trail, if we can mix a few metaphors. Yet, unlike most of his mute peers, Petraeus can’t stay away from the ink well. Indeed, when it comes to any well, David Petraeus doesn’t know when to stop digging. The other day, General Petraeus penned an opinion piece for the Washington Post where he exhumed every politically correct canard and excuse for Islam, Muslims, terrorists, recent small wars, and futurejihads. His headline, “Anti-Muslim Bigotry Aids Islamist Terrorists,” captures the flavor of what followed. The general’s argument begins by blaming the victim and goes downhill from there. In short, the Petraeus plea equates pushback against toxic religious ideology or its barbaric consequences as bigotry on the part of victims. For General Petraeus, those who would put a choke chain on Mecca and Mohammed make more terror possible. Part of the general’s apologetics is couched in terms of “moral considerations.” While we could dismiss any appeal to morality as a slip of the lip, getting ethical advice from David Petraeus, at this point, is a little like getting marriage counseling from Bill Clinton. If David’s argument is a replay of the usual moral equivalence hokum, he fails to tell us why Buddhists, Christians, and Jews do not chop off heads in God’s name as their Muslim brothers do. We might pose a few questions for David Petraeus, Fred Hiatt, Martin Baron, and Jeff Bozos too. What should we tell gold and blue star mothers these days? What do we tell casualty wives, brothers, sisters, and children? Who are we fighting? What are we fighting? Why are we fighting? When does it end? What can we reasonably expect to achieve besides another generation of White House and Pentagon sissies kicking the Muslim can down the road? Withal, we might also offer David Petraeus and like-minded flag officers, who shoot from the grave, some modest advice. Please, shut up! You have done enough damage already. The author is a former USAF Intelligence officer, Vietnam veteran, a graduate of Iona College (BA), the University of Southern California (MS), the Defense Intelligence College, and the Air War College. He the former Senior USAF Research Fellow at RAND Corporation, Santa Monica and the former Director of Research and Russian (nee Soviet) Studies, ACS Intelligence, HQ USAF, serving under General James Clapper. Colonel Donovan has served at the Defense Intelligence Agency, the National Security Agency and the Central intelligence Agency.
2023-11-02T01:27:17.568517
https://example.com/article/6835
Q: What is correct method assigning array in struct I'm a total noob so this might be totally off but why struct staff{ int id; char lastdate[8]; char codeid[8]; }; in main I'm taking data from Mysql and: ... while((row = mysql_fetch_row(confres))) { char *codeid = row[0]; char *maxdate = row[1]; info[i].id=i; strcpy(info[i].codeid, codeid); strcpy(info[i].lastdate, maxdate); i++; } ... lastdate is in form YYYYMMDD and codeid a string. When printing array out why is it 'lastdate's is ok but codeid which is string is just empty? ID: 0 SHORT: LAST DATE : 20170929 ID: 1 SHORT: LAST DATE : 20170929 ... A: You need to make lastdate big enough to hold the 8 characters of the date plus the null terminator, so the structure should be: struct staff{ int id; char lastdate[9]; char codeid[8]; }; You were writing outside the array, which results in undefined behavior.
2023-09-14T01:27:17.568517
https://example.com/article/5717
Approved Development Site for 42 townhouse lots and condominium building containing 77 residential units originally known as Waterview Overlook. Site is located above a hillside overlooking Middle Branch Park and the Baltimore Rowing Club, along the river's western shore with spectacular views overlook the River and City. Property provides quick access to both I-95 and the Baltimore-Washington Parkway and is steps way from the Westport light rail stop. The property is situated between Westport and Cherry Hill on the South side of Waterview Avenue and contains approximately 8.82 acres with approximately 1,150 ft of frontage along Waterview Avenue. This site is ideal for workforce housing/apartments. Site is believed to have access to all necessary utilities, including Public water and sewer and BGE for electricity and natural gas. Site is zoned R-6.
2024-04-14T01:27:17.568517
https://example.com/article/7080
yan kong wrote:If one feels vexed by posers or window shoppers then that is the problem of said vexed practitioner, not the posers nor the window shoppers. This is so true to my own experience. For the longest time tended to externalize my own irritation with the good people who aspire to Buddhist practice, and do their very best to keep something as special and sacred as a Dharma center going, eg, "why is she such a constipated little shrine fascist?" and such. I learned a great deal about myself and the pervasiveness of my poor conduct & worse intentions when I turned all that around and recognized the same tendencies in myself as I criticized others for (incompetence, fussiness, and all the rest). Now I can't wait to visit the temple. *** When it comes to group pujas... might it have something to do with the difficulties and hangups we all have about food? It's easy to think "oh yeah one taste man" but it's much more challenging to do so when it's doritos, pepperoni slices, candy corn, and potato salad mixed together and washed down with Your Stepmom's Favorite Wine from a Box. Integrating other people's intentions in the form of a puja offerings means you have to accept it all as it comes, even if it's not so appetizing to the conceptual mind. Jikan wrote:This is so true to my own experience. For the longest time tended to externalize my own irritation with the good people who aspire to Buddhist practice, and do their very best to keep something as special and sacred as a Dharma center going, eg, "why is she such a constipated little shrine fascist?" and such. I learned a great deal about myself and the pervasiveness of my poor conduct & worse intentions when I turned all that around and recognized the same tendencies in myself as I criticized others for (incompetence, fussiness, and all the rest). Now I can't wait to visit the temple. *** This is a really good point, and something i'm struggling with a bit right now after being (in my view) mistreated a bit by someone, my inclination is form some very definite judgements on his character, and maybe even trash the whole experience due to this negative thing..practice in solitude only again, but i'm not sure that's fair, and would be bad for me..I don't need any more solitude than I already have. I keep trying to imagine similar ways in which i've irritated or hurt others in my time, without even knowing it. May the eyes of living beings be gladdened by skies made splendid by clouds that lightnings garland, while on earth below, the peacocks dance with joy as showers of rain, falling gently, approach. I agree that Dharma centers tend to attract a larger than normal percentage of unhappy and difficult people for just the reasons that have been stated already. However, having to deal with people we don't like and who annoy us is an important practice. Atisha is said to have kept the most annoying student He had close to Him so He could better practice patience, compassion, and equanimity. It is also said that practicing as a group multiplies the effects of that practice times the number of people participating. So group practice can be hugely efficient and effective and, IMO, should not be avoided or disparaged. For instance, it's said that a single drubchen can generate the same amount of merit and progress on the path as three years in solitary retreat. Personally I've received some top notch teachings and met some really nice people at Dharma Centres. Now the odds are that any social gathering will include posers and users. If the proportion is higher at Dharma centres than at the local pub then I would have to admit there is a specific problem manifesting, if not, then I guess I'll just have to chalk it up to samsara. Sherab Dorje wrote:Personally I've received some top notch teachings and met some really nice people at Dharma Centres. Now the odds are that any social gathering will include posers and users. If the proportion is higher at Dharma centres than at the local pub then I would have to admit there is a specific problem manifesting, if not, then I guess I'll just have to chalk it up to samsara. After being involved with political activism for a bit, I can honestly there are no personality types that take me by surprise when it comes to organizations and their downfalls, lol. May the eyes of living beings be gladdened by skies made splendid by clouds that lightnings garland, while on earth below, the peacocks dance with joy as showers of rain, falling gently, approach. Anders wrote:If you are the type to dislike people at Dharma centers, chances are you are among the people other people dislike at Dharma centers. Ain't that the truth! Are you guys implying that people don't like me? Wouldn't that make me unlikeable too? can I tend to go with an adaption of Kennedy's saying "ask not what people can do for you, but what you can do for people." Sure you meet some oddballs, usually they are odd enough to be endearingly amusing as well. Some gossips and meanies too, like in every walk of life. I find them as forgettable as in every walk of life. Mostly, I remember the inspiring people though, the ones that have lots to give and offer. You get the profound practitioners, but also the 'less profound' ones that demonstrate qualities that I find hard to master that I look at and observe. Generally, I haven't found it hard to find nice people at the places I've been. Of course, I could have been lucky. "Even if my body should be burnt to death in the fires of hellI would endure it for myriad lifetimes As your companion in practice" --- Gandavyuha Sutra dzogchungpa wrote:i don't remember the details, but I think someone on esangha said that a lama he knew had told him: Get the teachings and RUN! Sometimes that seems like pretty good advice to me. I remember making that comment, and I will never forget the moment that advice was given to me. The broader context was that a good student sticks around long enough to learn how to practice with confidence, gets all his/her questions answered, and then gets to work at practice. It's advice against creating samsaric situations around the Dharma center. Jikan wrote:I remember making that comment, and I will never forget the moment that advice was given to me. The broader context was that a good student sticks around long enough to learn how to practice with confidence, gets all his/her questions answered, and then gets to work at practice. It's advice against creating samsaric situations around the Dharma center. Definitely good advice. The whole purpose of Buddhism is to have fun, isn't it? - Dzongsar Jamyang Khyentse Rinpoche Another misconception of Westerners is to think that it is important to bring all the Tibetan traditions into the Dharma practice. They think that the system of monasteries in Tibet is somehow related to enlightenment. Nowadays people can travel to Tibet easily. They are often shocked by the reality check when they are there - how different reality is to their own ideas of it. (...) Good practitioners were not part of the administration. The good masters and monks mainly practised in isolation. Nearly nobody reached enlightenment in a monastery. Monks were too strictly organized by the administration. Religion and politics were so intermingled in Tibet. The politicians used religion to control the people. The problem was not the enlightened masters, but the administrators. "Forget about being clever, and simply remain." Guru Rinpoche, Treasures from Juniper Ridge Another misconception of Westerners is to think that it is important to bring all the Tibetan traditions into the Dharma practice. They think that the system of monasteries in Tibet is somehow related to enlightenment. Nowadays people can travel to Tibet easily. They are often shocked by the reality check when they are there - how different reality is to their own ideas of it. (...) Good practitioners were not part of the administration. The good masters and monks mainly practised in isolation. Nearly nobody reached enlightenment in a monastery. Monks were too strictly organized by the administration. Religion and politics were so intermingled in Tibet. The politicians used religion to control the people. The problem was not the enlightened masters, but the administrators. That could be summarised as "Those who can meditate, do. Those who can't, administrate." Johnny Dangerous wrote:I think I see where you're going with that, some people seem to shop around much in the way people do for Yoga etc. "hey, i'm gonna do this thing that'll make me feel great"...where the motivation is basically just to find a product to make your life better. I've always imagined that for teachers this is probably the most disheartening thing, though I have no idea. I'd imagine they find it heartening that a person connect to the Dharma at all. But as I mentioned, in certain ways I think it can make life more challenging for practitioners. Perhaps not too dissimilar from how it's said that near facsimiles of realization are greater obstacles than dissimilar ones. But if you don't like challenges, you're in the wrong place anyhow I am in agreement with those who say that dislike is a reflection of the practitioner and not those who s/he is annoyed with, but I think that's not specific to Dharma centers. Maybe a more ironic example of it though This undistracted state of ordinary mindIs the meditation.One will understand it in due course.--Gampopa It might be a reflection of the practitioner yeah, i've never found anywhere where people aren't crazy, posers, control freaks, what have you. i think that some things, (Dharma being an obvious one) bring people's shit to surface, and sometimes it stinks, in fact..most of the time it stinks. I guess the quote earlier is just saying, don't get caught up in the shit itself, because it will be there almost invariably. May the eyes of living beings be gladdened by skies made splendid by clouds that lightnings garland, while on earth below, the peacocks dance with joy as showers of rain, falling gently, approach. I like both things more than I used to, but it can just be weird when you meet new people into spirituality. The best way I have found to deal with it is to simply not talk about it beyond showing up and learning the practices and doing the practices. Do it together in group and that's it. Accept everyone there just how they are, whether they're insecure n00bs with nervous energy or quiet types or if they're over-the-moon with positive energy bursting out everywhere. It can be a trip to try to relate to people in a sangha because its really unlike any other sort of situation you're liable to find yourself in... actually, the first several times I showed up at different sanghas it reminded me of a cult sort of and freaked me out. Several years later at a Dream Yoga class in Tibet House, NYC, I saw this same feeling on another person's face as he asked me, "So, you really believe all this or...?" and he had a really skeptical and freaked out expression on his face like "wtf did I get myself into here?" which just made me uncomfortable because now I felt like I was being scrutinized. "Use what seems like poison as medicine. We can use our personal suffering as the path to compassion for all beings." Pema Chodron
2023-09-02T01:27:17.568517
https://example.com/article/4007
Daily Bafflements Bernie’s growing popularity, the cybersecurity racket, and feminism for the few • As the Trump campaign’s links to Russia are finally investigated by the FBI, it’s worth reading Yasha Levine’s salvo “From Russia, with Panic,” in which he wrote about how the Democratic party and the media propagated findings of Russian interference from CrowdStrike, a cybersecurity firm whose founder Levine remembers from his time reporting on the 2008 Georgia-Russia war.
2024-05-06T01:27:17.568517
https://example.com/article/2475
suite('djblets/integrations/views/IntegrationConfigListView', function() { const template = _.template(dedent` <div class="djblets-c-integration-configs"> <div class="djblets-l-config-forms-container"> <table class="djblets-c-config-forms-list"></table> </div> </div> `); let collection; let view; beforeEach(function() { const $el = $(template()).appendTo($testsScratch); view = new Djblets.IntegrationConfigListView({ el: $el, configs: [ { 'editURL' : 'configs/1/', 'enabled': true, 'id': 1, 'integrationID': 'int1', 'name': 'Config 1', }, { 'editURL' : 'configs/2/', 'enabled': true, 'id': 2, 'integrationID': 'int2', 'name': 'Config 2', }, { 'editURL' : 'configs/3/', 'enabled': false, 'id': 3, 'integrationID': 'int3', 'name': 'Config 3', }, { 'editURL' : 'configs/4/', 'enabled': true, 'id': 4, 'integrationID': 'int1', 'name': 'Config 4', }, ], integrationIDs: ['int1', 'int2', 'int3'], integrationsMap: { int1: { 'addURL': 'int1/add/', 'description': 'Int1 Description', 'iconSrc': 'data:test,int1', 'iconSrcSet': 'data:test,int1 1x, data:test,int1@2x 2x', 'id': 'int1', 'name': 'Int1', }, int2: { 'addURL': 'int2/add/', 'description': 'Int2 Description', 'iconSrc': 'data:test,int2', 'iconSrcSet': 'data:test,int2 1x, data:test,int2@2x 2x', 'id': 'int2', 'name': 'Int2', }, int3: { 'addURL': 'int3/add/', 'description': 'Int3 Description', 'iconSrc': 'data:test,int3', 'iconSrcSet': 'data:test,int3 1x, data:test,int3@2x 2x', 'id': 'int3', 'name': 'Int3', }, }, }); view.render(); collection = view.list.collection; }); describe('Configurations', function() { let $row1; let $row2; let $row3; let $row4; beforeEach(function() { const $rows = view.listView.$('tr'); expect($rows.length).toBe(4); $row1 = $rows.eq(0); $row2 = $rows.eq(1); $row3 = $rows.eq(2); $row4 = $rows.eq(3); }); describe('Rendering', function() { it('Icon', function() { const $icon1 = $row1.find('.djblets-c-integration-config__name img'); const $icon2 = $row2.find('.djblets-c-integration-config__name img'); const $icon3 = $row3.find('.djblets-c-integration-config__name img'); const $icon4 = $row4.find('.djblets-c-integration-config__name img'); expect($icon1.attr('src')).toBe('data:test,int1'); expect($icon2.attr('src')).toBe('data:test,int2'); expect($icon3.attr('src')).toBe('data:test,int3'); expect($icon4.attr('src')).toBe('data:test,int1'); expect($icon1.attr('srcset')) .toBe('data:test,int1 1x, data:test,int1@2x 2x'); expect($icon2.attr('srcset')) .toBe('data:test,int2 1x, data:test,int2@2x 2x'); expect($icon3.attr('srcset')) .toBe('data:test,int3 1x, data:test,int3@2x 2x'); expect($icon4.attr('srcset')) .toBe('data:test,int1 1x, data:test,int1@2x 2x'); }); it('Name', function() { const $name1 = $row1.find('.djblets-c-integration-config__name a'); const $name2 = $row2.find('.djblets-c-integration-config__name a'); const $name3 = $row3.find('.djblets-c-integration-config__name a'); const $name4 = $row4.find('.djblets-c-integration-config__name a'); expect($name1.text()).toBe('Config 1'); expect($name2.text()).toBe('Config 2'); expect($name3.text()).toBe('Config 3'); expect($name4.text()).toBe('Config 4'); expect($name1.attr('href')).toBe('configs/1/'); expect($name2.attr('href')).toBe('configs/2/'); expect($name3.attr('href')).toBe('configs/3/'); expect($name4.attr('href')).toBe('configs/4/'); }); it('Integration name', function() { const $intName1 = $row1.find( '.djblets-c-integration-config__integration-name'); const $intName2 = $row2.find( '.djblets-c-integration-config__integration-name'); const $intName3 = $row3.find( '.djblets-c-integration-config__integration-name'); const $intName4 = $row4.find( '.djblets-c-integration-config__integration-name'); expect($intName1.text().trim()).toBe('Int1'); expect($intName2.text().trim()).toBe('Int2'); expect($intName3.text().trim()).toBe('Int3'); expect($intName4.text().trim()).toBe('Int1'); }); it('Status', function() { expect($row1.hasClass('-is-enabled')).toBe(true); expect($row2.hasClass('-is-enabled')).toBe(true); expect($row3.hasClass('-is-enabled')).toBe(false); expect($row4.hasClass('-is-enabled')).toBe(true); expect($row1.hasClass('-is-disabled')).toBe(false); expect($row2.hasClass('-is-disabled')).toBe(false); expect($row3.hasClass('-is-disabled')).toBe(true); expect($row4.hasClass('-is-disabled')).toBe(false); expect( $row1.find('.djblets-c-config-forms-list__item-state') .text() ).toBe('Enabled'); expect( $row2.find('.djblets-c-config-forms-list__item-state') .text() ).toBe('Enabled'); expect( $row3.find('.djblets-c-config-forms-list__item-state') .text() ).toBe('Disabled'); expect( $row4.find('.djblets-c-config-forms-list__item-state') .text() ).toBe('Enabled'); }); }); describe('Actions', function() { it('Delete', function() { const config = collection.at(0); spyOn(config, 'destroy').and.callThrough(); spyOn(config, 'sync'); spyOn($.fn, 'modalBox').and.callFake( options => options.buttons[1].click()); $row1.find('.config-forms-list-action-delete').click(); expect($.fn.modalBox).toHaveBeenCalled(); expect(config.destroy).toHaveBeenCalled(); expect(collection.length).toBe(3); expect(view.listView.$('tr').length).toBe(3); }); }); }); });
2024-06-04T01:27:17.568517
https://example.com/article/1576
U.S. President Donald Trump boards Air Force One to depart after participating in the APEC Summit in Danang, Vietnam November 11, 2017. REUTERS/Jonathan Ernst SEOUL (Reuters) - North Korea said on Saturday that U.S. President Donald Trump’s first trip to Asia showed he was a “destroyer” and he had begged for war on the Korean peninsula. “Trump, during his visit, laid bare his true nature as destroyer of world peace and stability and begged for a nuclear war on the Korean peninsula,” the foreign ministry spokesman said in a statement carried by the state news agency. Trump had warned North Korea on Wednesday not to underestimate the United States as he wrapped up his visit to South Korea. The North Korean spokesman said nothing would deter Pyongyang from pursuing its nuclear weapons programme.
2023-09-22T01:27:17.568517
https://example.com/article/8594
/* * Copyright (c) 2002-2012 Alibaba Group Holding Limited. * All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.alibaba.citrus.turbine.dataresolver; import static com.alibaba.citrus.test.TestEnvStatic.*; import static com.alibaba.citrus.test.TestUtil.*; import static org.hamcrest.Matchers.*; import static org.junit.Assert.*; import java.beans.PropertyEditor; import java.io.File; import java.util.List; import com.alibaba.citrus.service.dataresolver.DataResolverContext; import com.alibaba.citrus.service.moduleloader.ModuleEventException; import com.alibaba.citrus.turbine.dataresolver.impl.ParameterResolverFactory; import org.apache.commons.fileupload.FileItem; import org.junit.Test; import org.springframework.beans.PropertyEditorRegistrar; import org.springframework.beans.PropertyEditorRegistry; import org.springframework.beans.TypeMismatchException; import org.springframework.beans.propertyeditors.CustomNumberEditor; public class ParameterResolverTests extends AbstractDataResolverTests { @Test public void nodeps() { ParameterResolverFactory resolverFactory = new ParameterResolverFactory(null); try { resolverFactory.getDataResolver(new DataResolverContext(String.class, null, null)); fail(); } catch (IllegalArgumentException e) { assertThat(e, exception("no ParserRequestContext defined")); } } @Test public void getInt() throws Exception { // default value execute("action", "param.myAction", "doGetInt", "bbb=222"); assertLog("actionLog", Integer.class, 0); execute("action", "param.myAction", "doGetInt", "aaa=&bbb=222"); assertLog("actionLog", Integer.class, 0); // single value execute("action", "param.myAction", "doGetInt", "aaa=111&bbb=222"); assertLog("actionLog", Integer.class, 111); // multiple values -> single value execute("action", "param.myAction", "doGetInt", "aaa=111&aaa=222"); assertLog("actionLog", Integer.class, 111); // wrong format try { execute("action", "param.myAction", "doGetInt", "aaa=wrong&aaa=222"); fail(); } catch (ModuleEventException e) { assertThat( e, exception(TypeMismatchException.class, "Failed to convert value of type ", "java.lang.String", " to required type ", "java.lang.Integer", "wrong")); } } @Test public void getIntDefault() throws Exception { // default value execute("action", "param.myAction", "doGetIntDefault", "bbb=222"); assertLog("actionLog", Integer.class, 123); execute("action", "param.myAction", "doGetIntDefault", "aaa=&bbb=222"); assertLog("actionLog", Integer.class, 123); // single value execute("action", "param.myAction", "doGetIntDefault", "aaa=111&bbb=222"); assertLog("actionLog", Integer.class, 111); // multiple values -> single value execute("action", "param.myAction", "doGetIntDefault", "aaa=111&aaa=222"); assertLog("actionLog", Integer.class, 111); } @Test public void getIntArray() throws Exception { // default value execute("action", "param.myAction", "doGetIntArray", "aaa="); assertArrayEquals(new int[] { }, (int[]) request.getAttribute("actionLog")); // single value execute("action", "param.myAction", "doGetIntArray", "aaa=111"); assertArrayEquals(new int[] { 111 }, (int[]) request.getAttribute("actionLog")); // multiple values execute("action", "param.myAction", "doGetIntArray", "aaa=111&aaa=222"); assertArrayEquals(new int[] { 111, 222 }, (int[]) request.getAttribute("actionLog")); } @Test public void getIntArrayDefault() throws Exception { // default value execute("action", "param.myAction", "doGetIntArrayDefault", "aaa="); assertArrayEquals(new int[] { 123 }, (int[]) request.getAttribute("actionLog")); // single value execute("action", "param.myAction", "doGetIntArrayDefault", "aaa=111"); assertArrayEquals(new int[] { 111 }, (int[]) request.getAttribute("actionLog")); // multiple values execute("action", "param.myAction", "doGetIntArrayDefault", "aaa=111&aaa=222"); assertArrayEquals(new int[] { 111, 222 }, (int[]) request.getAttribute("actionLog")); } @Test public void getInteger() throws Exception { // default value execute("action", "param.myAction", "doGetInteger", "bbb=222"); assertLog("actionLog", Integer.class, null); execute("action", "param.myAction", "doGetInteger", "aaa=&bbb=222"); assertLog("actionLog", Integer.class, null); // single value execute("action", "param.myAction", "doGetInteger", "aaa=111&bbb=222"); assertLog("actionLog", Integer.class, 111); // multiple values -> single value execute("action", "param.myAction", "doGetInteger", "aaa=111&aaa=222"); assertLog("actionLog", Integer.class, 111); } @Test public void getIntegerDefault() throws Exception { // default value execute("action", "param.myAction", "doGetIntegerDefault", "bbb=222"); assertLog("actionLog", Integer.class, 123); execute("action", "param.myAction", "doGetIntegerDefault", "aaa=&bbb=222"); assertLog("actionLog", Integer.class, 123); // single value execute("action", "param.myAction", "doGetIntegerDefault", "aaa=111&bbb=222"); assertLog("actionLog", Integer.class, 111); // multiple values -> single value execute("action", "param.myAction", "doGetIntegerDefault", "aaa=111&aaa=222"); assertLog("actionLog", Integer.class, 111); } @Test public void getIntegerArray() throws Exception { // default value execute("action", "param.myAction", "doGetIntegerArray", "aaa="); assertArrayEquals(new Integer[] { }, (Integer[]) request.getAttribute("actionLog")); // single value execute("action", "param.myAction", "doGetIntegerArray", "aaa=111"); assertArrayEquals(new Integer[] { 111 }, (Integer[]) request.getAttribute("actionLog")); // multiple values execute("action", "param.myAction", "doGetIntegerArray", "aaa=111&aaa=222"); assertArrayEquals(new Integer[] { 111, 222 }, (Integer[]) request.getAttribute("actionLog")); } @Test public void getIntegerArrayDefault() throws Exception { // default value execute("action", "param.myAction", "doGetIntegerArrayDefault", ""); assertArrayEquals(new Integer[] { 123, 456 }, (Integer[]) request.getAttribute("actionLog")); // single value execute("action", "param.myAction", "doGetIntegerArray", "aaa=111"); assertArrayEquals(new Integer[] { 111 }, (Integer[]) request.getAttribute("actionLog")); // multiple values execute("action", "param.myAction", "doGetIntegerArray", "aaa=111&aaa=222"); assertArrayEquals(new Integer[] { 111, 222 }, (Integer[]) request.getAttribute("actionLog")); } @Test public void getIntegerList() throws Exception { execute("action", "param.myAction", "doGetIntegerList", "aaa=111&aaa=222"); @SuppressWarnings("unchecked") List<Integer> array = (List<Integer>) request.getAttribute("actionLog"); assertArrayEquals(new Integer[] { 111, 222 }, array.toArray(new Integer[0])); } @SuppressWarnings("unchecked") @Test public void getIntegerListDefault() throws Exception { // default values execute("action", "param.myAction", "doGetIntegerListDefault", ""); List<Integer> array = (List<Integer>) request.getAttribute("actionLog"); assertArrayEquals(new Integer[] { 123, 456 }, array.toArray(new Integer[0])); // multiple values execute("action", "param.myAction", "doGetIntegerListDefault", "aaa=111&aaa=222"); array = (List<Integer>) request.getAttribute("actionLog"); assertArrayEquals(new Integer[] { 111, 222 }, array.toArray(new Integer[0])); } @Test public void getLong() throws Exception { // single value - custom editor execute("action", "param.myAction", "doGetLong", "aaa=ten&bbb=222"); assertLog("actionLog", Long.class, 10L); // single value execute("action", "param.myAction", "doGetLong", "aaa=11&bbb=222"); assertLog("actionLog", Long.class, 11L); } @Test public void getLongDefault() throws Exception { // default value - custom editor execute("action", "param.myAction", "doGetLongDefault", ""); assertLog("actionLog", Long.class, 10L); // single value execute("action", "param.myAction", "doGetLongDefault", "aaa=11&bbb=222"); assertLog("actionLog", Long.class, 11L); } @Test public void getBool() throws Exception { // default value execute("action", "param.myAction", "doGetBool", "bbb=222"); assertLog("actionLog", Boolean.class, false); execute("action", "param.myAction", "doGetBool", "aaa=&bbb=222"); assertLog("actionLog", Boolean.class, false); // single value execute("action", "param.myAction", "doGetBool", "aaa=true&bbb=222"); assertLog("actionLog", Boolean.class, true); // multiple values -> single value execute("action", "param.myAction", "doGetBool", "aaa=false&aaa=222"); assertLog("actionLog", Boolean.class, false); } @Test public void getBooleanArrayDefault() throws Exception { // default value execute("action", "param.myAction", "doGetBooleanArrayDefault", "bbb=222"); assertArrayEquals(new Boolean[] { true, false }, (Boolean[]) request.getAttribute("actionLog")); execute("action", "param.myAction", "doGetBooleanArrayDefault", "aaa=&bbb=222"); assertArrayEquals(new Boolean[] { true, false }, (Boolean[]) request.getAttribute("actionLog")); // single value execute("action", "param.myAction", "doGetBooleanArrayDefault", "aaa=true&bbb=222"); assertArrayEquals(new Boolean[] { true }, (Boolean[]) request.getAttribute("actionLog")); // multiple values execute("action", "param.myAction", "doGetBooleanArrayDefault", "aaa=false&aaa=false"); assertArrayEquals(new Boolean[] { false, false }, (Boolean[]) request.getAttribute("actionLog")); } @Test public void getString() throws Exception { // default value execute("action", "param.myAction", "doGetString", "bbb=222"); assertLog("actionLog", String.class, null); execute("action", "param.myAction", "doGetString", "aaa=&bbb=222"); assertLog("actionLog", String.class, null); // single value execute("action", "param.myAction", "doGetString", "aaa=111&bbb=222"); assertLog("actionLog", String.class, "111"); // multiple values -> single value execute("action", "param.myAction", "doGetString", "aaa=111&aaa=222"); assertLog("actionLog", String.class, "111"); } @Test public void getStringArrayDefault() throws Exception { // default value execute("action", "param.myAction", "doGetStringArrayDefault", "bbb=222"); assertArrayEquals(new String[] { "", "abc" }, (String[]) request.getAttribute("actionLog")); execute("action", "param.myAction", "doGetStringArrayDefault", "aaa=&bbb=222"); assertArrayEquals(new String[] { "", "abc" }, (String[]) request.getAttribute("actionLog")); // single value execute("action", "param.myAction", "doGetStringArrayDefault", "aaa=111&bbb=222"); assertArrayEquals(new String[] { "111" }, (String[]) request.getAttribute("actionLog")); // multiple values -> single value execute("action", "param.myAction", "doGetStringArrayDefault", "aaa=111&aaa=222"); assertArrayEquals(new String[] { "111", "222" }, (String[]) request.getAttribute("actionLog")); } @Test public void getFileItem() throws Exception { getInvocationContext("/app1", "myFile", new File(srcdir, "test.txt"), "eventSubmit_doGetFileItem", "yes"); initRequestContext(); moduleLoaderService.getModule("action", "param.myAction").execute(); FileItem fi = (FileItem) newRequest.getAttribute("actionLog"); assertEquals("test", fi.getString("UTF-8")); } @Test public void getFileItemAsString() throws Exception { getInvocationContext("/app1", "myFile", new File(srcdir, "test.txt"), "eventSubmit_doGetFileItemAsString", "yes"); initRequestContext(); moduleLoaderService.getModule("action", "param.myAction").execute(); String fi = (String) newRequest.getAttribute("actionLog"); assertThat(new File(fi).toURI().getPath(), containsString("config/test.txt")); } @SuppressWarnings("unchecked") @Test public void getFileItemAsList() throws Exception { getInvocationContext("/app1", "myFile", new File[] { new File(srcdir, "test.txt"), new File(srcdir, "test.txt") }, "eventSubmit_doGetFileItemList", "yes"); initRequestContext(); moduleLoaderService.getModule("action", "param.myAction").execute(); List<FileItem> fi = (List<FileItem>) newRequest.getAttribute("actionLog"); assertEquals(2, fi.size()); assertEquals("test", fi.get(0).getString("UTF-8")); assertEquals("test", fi.get(1).getString("UTF-8")); } @Test public void error_NoName() throws Exception { try { execute("action", "param.myActionErrorNoName", "doPerform", ""); fail(); } catch (IllegalArgumentException e) { assertThat(e, exception("missing @Param's name")); } } @Test public void error_DefaultValueAndDefaultValues() throws Exception { try { execute("action", "param.myActionErrorDefaultValueAndDefaultValues", "doPerform", ""); fail(); } catch (IllegalArgumentException e) { assertThat(e, exception("use @Param(... defaultValue=\"...\") or @Param(... defaultValues={...}):")); } } public static class MyRegistrar implements PropertyEditorRegistrar { public void registerCustomEditors(PropertyEditorRegistry registry) { PropertyEditor editor = new CustomNumberEditor(Long.class, true) { @Override public void setAsText(String text) { if ("ten".equals(text)) { setValue(10L); } else { super.setAsText(text); } } }; registry.registerCustomEditor(Long.class, editor); registry.registerCustomEditor(long.class, editor); } } }
2024-05-11T01:27:17.568517
https://example.com/article/9978
]]>http://quote.fm/www.theawl.com/53952 Sat, 06 Oct 2012 15:57:31 +0200Jerikohttp://quote.fm/www.theawl.com/53952»The Beatles were always on the run from shoving, hysterical girl-crowds, who wanted—what? To crush into them, to crush themselves, to crush against other girl-bodies that were all feeling the same feeling together, a chaos of feeling, a feeling that took your breath away. "A Beatle who ventures out unguarded into the streets runs the very real peril of being dismembered or crushed to death by his fans," Life reported in January 1964.« ]]>»The Beatles were always on the run from shoving, hysterical girl-crowds, who wanted—what? To crush into them, to crush themselves, to crush against other girl-bodies that were all feeling the same feeling together, a chaos of feeling, a feeling that took your breath away. "A Beatle who ventures out unguarded into the streets runs the very real peril of being dismembered or crushed to death by his fans," Life reported in January 1964.« ]]>http://quote.fm/jmcolberg.com/49800 Sat, 15 Sep 2012 22:46:00 +0200Jerikohttp://quote.fm/jmcolberg.com/49800»That probably means that you don’t need to have an active account on a gazillion different social-networking sites, making sure that you sign up for each and every new site. There is no way anyone can win the social-networking arms race. It’s time to scale back. It’s time to realize that social-networking sites come with only one guarantee: You’re going to spend a lot of time on them - time that you could have spent on your own photography.« Change 'photography' with whatever you like, the statement will hold up. ]]>»That probably means that you don’t need to have an active account on a gazillion different social-networking sites, making sure that you sign up for each and every new site. There is no way anyone can win the social-networking arms race. It’s time to scale back. It’s time to realize that social-networking sites come with only one guarantee: You’re going to spend a lot of time on them - time that you could have spent on your own photography.« Change 'photography' with whatever you like, the statement will hold up. ]]>http://quote.fm/jmcolberg.com/47910 Sun, 09 Sep 2012 06:32:49 +0200Jerikohttp://quote.fm/jmcolberg.com/47910»The idea is that written language is unable to express what photography can convey. And that is true, but it misses the most important point: The written language can say things that photographs could not even dream to show. Photography, in other words, is just as flawed as the written language. This is, crucially, how photography and writing are related: They both speak of the world, in their uniquely flawed and imperfect and beautiful ways.« ]]>»The idea is that written language is unable to express what photography can convey. And that is true, but it misses the most important point: The written language can say things that photographs could not even dream to show. Photography, in other words, is just as flawed as the written language. This is, crucially, how photography and writing are related: They both speak of the world, in their uniquely flawed and imperfect and beautiful ways.« ]]>http://quote.fm/www.newyorker.com/47906 Sun, 09 Sep 2012 06:18:21 +0200Jerikohttp://quote.fm/www.newyorker.com/47906»Yet when, through an official interlocutor, I recently petitioned Wikipedia to delete this misstatement, along with two others, my interlocutor was told by the “English Wikipedia Administrator”—in a letter dated August 25th and addressed to my interlocutor—that I, Roth, was not a credible source: “I understand your point that the author is the greatest authority on their own work,” writes the Wikipedia Administrator—“but we require secondary sources.”« ... so Roth, the author of the book, for which the mentioned Wikipedia entry contains a misstatement, wrote this open letter to eventually get his second source. Seriously, at what point did Wikipedia went from, you know, kinda crazy to completely nuts? ]]>»Yet when, through an official interlocutor, I recently petitioned Wikipedia to delete this misstatement, along with two others, my interlocutor was told by the “English Wikipedia Administrator”—in a letter dated August 25th and addressed to my interlocutor—that I, Roth, was not a credible source: “I understand your point that the author is the greatest authority on their own work,” writes the Wikipedia Administrator—“but we require secondary sources.”« ... so Roth, the author of the book, for which the mentioned Wikipedia entry contains a misstatement, wrote this open letter to eventually get his second source. Seriously, at what point did Wikipedia went from, you know, kinda crazy to completely nuts? ]]>http://quote.fm/www.economist.com/46678 Thu, 30 Aug 2012 21:33:15 +0200Jerikohttp://quote.fm/www.economist.com/46678»He is one of the boffins at NASA's Jet Propulsion Laboratory (JPL) responsible, among other things, for deciding what Curiosity photographs each Martian day, or sol, and which pictures it sends back home. "We can always take enough pictures to fill up the downlink," Dr Maki says. The mission can currently beam at least 30MB a sol, including scientific measurements, engineering data and images, from Mars, via two satellites orbiting the planet, to Earth.« How the Curiosity Rover’s Photography Decisions Are Made I mean, get this: they are able to send at least 30 megabytes each day over an average distance of more than 200 million kilometers! This is so unbelievable and awesome. ]]>»He is one of the boffins at NASA's Jet Propulsion Laboratory (JPL) responsible, among other things, for deciding what Curiosity photographs each Martian day, or sol, and which pictures it sends back home. "We can always take enough pictures to fill up the downlink," Dr Maki says. The mission can currently beam at least 30MB a sol, including scientific measurements, engineering data and images, from Mars, via two satellites orbiting the planet, to Earth.« How the Curiosity Rover’s Photography Decisions Are Made I mean, get this: they are able to send at least 30 megabytes each day over an average distance of more than 200 million kilometers! This is so unbelievable and awesome. ]]>http://quote.fm/blog.alexmaccaw.com/46441 Wed, 29 Aug 2012 14:52:21 +0200Jerikohttp://quote.fm/blog.alexmaccaw.com/46441»So that’s how we implemented image uploading on Svbtle. It contains no additional visual interface, and it functions completely asynchronously, without blocking the writer. It works like a charm; you simply drag the image onto the page and then continue on writing. The file is uploaded in the background, and by the time the article is written, all the transfers will have finished.« Let's be fair, subtle is platform which has no theming whatsoever and therefore doesn't need fancy capabilities, as it is primarily intended for writing. However, compare this approach to the WordPress Media Uploader or, for that matter, to every other media implementation in any CMS. ]]>»So that’s how we implemented image uploading on Svbtle. It contains no additional visual interface, and it functions completely asynchronously, without blocking the writer. It works like a charm; you simply drag the image onto the page and then continue on writing. The file is uploaded in the background, and by the time the article is written, all the transfers will have finished.« Let's be fair, subtle is platform which has no theming whatsoever and therefore doesn't need fancy capabilities, as it is primarily intended for writing. However, compare this approach to the WordPress Media Uploader or, for that matter, to every other media implementation in any CMS. ]]>http://quote.fm/www.nytimes.com/45950 Sun, 26 Aug 2012 03:01:38 +0200Jerikohttp://quote.fm/www.nytimes.com/45950»So the airport decided on a new approach: instead of reducing wait times, it moved the arrival gates away from the main terminal and routed bags to the outermost carousel. Passengers now had to walk six times longer to get their bags. Complaints dropped to near zero.« ]]>»So the airport decided on a new approach: instead of reducing wait times, it moved the arrival gates away from the main terminal and routed bags to the outermost carousel. Passengers now had to walk six times longer to get their bags. Complaints dropped to near zero.« ]]>http://quote.fm/www.wired.com/44434 Thu, 16 Aug 2012 16:28:36 +0200Jerikohttp://quote.fm/www.wired.com/44434»The plumbers reject the contention that their opposition was an attempt to protect their livelihoods. “We just weren’t so sure this was a good product,” Massey says. “People think we’re a bunch of dumb plumbers, but we’re actually quite sophisticated.”« The story about a man and his waterless urinal, an idea which was almost killed by the plumber lobby for fear of their livelihoods, or, to put in perspective, loss of money. ]]>»The plumbers reject the contention that their opposition was an attempt to protect their livelihoods. “We just weren’t so sure this was a good product,” Massey says. “People think we’re a bunch of dumb plumbers, but we’re actually quite sophisticated.”« The story about a man and his waterless urinal, an idea which was almost killed by the plumber lobby for fear of their livelihoods, or, to put in perspective, loss of money. ]]>http://quote.fm/religion.blogs.cnn.com/41737 Tue, 31 Jul 2012 07:48:10 +0200Jerikohttp://quote.fm/religion.blogs.cnn.com/41737»Dear Christians: God here. I thought I would take the time to personally explain my absence in the Aurora shootings. While I was at it, I thought I would also explain my absence during every murder, massacre and crime that has ever taken place in World history, and in every war, in every famine, drought and flood.« Terrific comment to a CNN blog editorial called "Where God Was" during the Dark Knight shooting. ]]>»Dear Christians: God here. I thought I would take the time to personally explain my absence in the Aurora shootings. While I was at it, I thought I would also explain my absence during every murder, massacre and crime that has ever taken place in World history, and in every war, in every famine, drought and flood.« Terrific comment to a CNN blog editorial called "Where God Was" during the Dark Knight shooting. ]]>http://quote.fm/kieselaymon.com/41512 Sun, 29 Jul 2012 13:28:52 +0200Jerikohttp://quote.fm/kieselaymon.com/41512»Really, we’re fighting because she raised me to never ever forget I was on parole which means no black hoodies in wrong neighborhoods, no jogging at night, hands in plain sight at all times in public, no intimate relationships with white women, never driving over the speed-limit or doing those rolling stops at stop signs, always speaking the king’s English in the presence of white folks, never be outperformed in school or in public by white students and most importantly, always remembering that no matter what, white folks will do anything to get you« ]]>»Really, we’re fighting because she raised me to never ever forget I was on parole which means no black hoodies in wrong neighborhoods, no jogging at night, hands in plain sight at all times in public, no intimate relationships with white women, never driving over the speed-limit or doing those rolling stops at stop signs, always speaking the king’s English in the presence of white folks, never be outperformed in school or in public by white students and most importantly, always remembering that no matter what, white folks will do anything to get you« ]]>»Two days ago I purchase one of only two Nintendo PowerFest 94 cartridges known to exist. The purchase took 74 emails, 27 months, 6 phone calls, 5 failed meeting attempts, 1 sack of cash, and some additional twists and turns to finally complete.«
2023-08-18T01:27:17.568517
https://example.com/article/2771
Transcriptional activation of endothelial cell integrin alpha v by protein kinase C activator 12(S)-HETE. Previous work demonstrated that 12(S)-HETE [12(S)-hydroxyeicosatetraenic acid], a lipoxygenase metabolite of arachidonic acid, stimulates the surface expression of integrin alpha v beta 3 on mouse lung vascular endothelial cells (CD clone 3) in a post-transcriptional and protein kinase C (PKC)-dependent fashion. In this study we examined the effect of 12(S)-HETE on the expression of integrin receptors alpha v beta 3 and alpha 5 beta 1 in a different clone of a mouse endothelial cell population derived from lung microvasculature (designated CD clone 4). The results indicated that 12(S)-HETE transcriptionally activates the gene expression of integrin alpha v as assessed by quantitative reverse transcription/polymerase chain reaction/Southern hybridization, RNase protection assay, solution hybridization, and northern blotting. The induction of alpha v mRNA occurred within 1 hour, peaked at approximately 4 hours (2- to 4-fold increase), persisted for up to 16 hours, and thereafter gradually declined. The PKC activator phorbol 12-myristate 13-acetate (PMA) induced the alpha v mRNA, in a similar way. 12(S)-HETE treatment did not, in contrast, alter the mRNA levels of integrin subunit alpha 5 or beta 1. The induction of alpha v mRNA appeared to be protein synthesis-independent, since cycloheximide did not alter the 12(S)-HETE effect. 12(S)-HETE also did not appear to alter the mRNA half-life of alpha v. On the other hand, 12(S)-HETE-induced increase in alpha v mRNA levels was PKC-dependent, since pretreatment of CD clone 4 cells with calphostin C significantly inhibited 12(S)-HETE-increased alpha v mRNA. Nuclear runoff experiments revealed that the increase in alpha v mRNA results from an enhanced gene transcription. Facilitated alpha v gene transcription resulted in an increased surface expression of alpha v beta 3 protein, which resulted in an increased cell adhesion to vitronectin. The above observations, in conjunction with our previous experimental data, suggest that 12(S)-HETE may employ diverse mechanisms to stimulate the integrin alpha v beta 3 expression in vascular endothelial cells, which could play important roles in tumor cell adhesion, angiogenesis, hemostasis, and many other vascular events.
2024-02-16T01:27:17.568517
https://example.com/article/6361
Q: Passar ids como parâmetro para function js Tenho uma function que gostaria que recebesse os valores de id de alguns campos de quantidade, valor unitário e resultado. Mas não estou conseguindo. ` String.prototype.formatMoney = function() { var v = this; if(v.indexOf('.') === -1) { v = v.replace(/([\d]+)/, "$1,00"); } v = v.replace(/([\d]+)\.([\d]{1})$/, "$1,$20"); v = v.replace(/([\d]+)\.([\d]{2})$/, "$1,$2"); return v; }; function id( el ){ return document.getElementById( el ); } function getMoney( el ){ var money = id( el ).value ? id( el ).value.replace( ',', '.' ) : 0; return parseFloat( money )*100; } function multiplicacao(id1, id2, id3){ alert(id1, id2, id3); var qtd = id(id1).value; var unit = getMoney(id2); var total = qtd*unit; id(id3).value = String(total/100).formatMoney(); } //mascara para campos de R$ function moeda(z){ v = z.value; v=v.replace(/\D/g,"") //permite digitar apenas números v=v.replace(/[0-9]{12}/,"inválido") //limita pra máximo 999.999.999,99 v=v.replace(/(\d{1})(\d{8})$/,"$1.$2") //coloca ponto antes dos últimos 8 digitos v=v.replace(/(\d{1})(\d{5})$/,"$1.$2") //coloca ponto antes dos últimos 5 digitos v=v.replace(/(\d{1})(\d{1,2})$/,"$1,$2") //coloca virgula antes dos últimos 2 digitos z.value = v; } <html> <head> <script type="text/javascript" src="js/funcoes.js"></script> <script type="text/javascript" src="js/jquery-1.11.2.min.js"></script> <script type="text/javascript" src="http://code.jquery.com/jquery-1.7.1.js"></script> </head> <body> <input id="campo1" onKeyUp='multiplicacao(this.id)' type='text' name='' class='form-control' size='10'/> <input id="campo2" onKeyUp='moeda(this);multiplicacao(this.id)' type='text' name='' class='form-control' size='10'/> <input id="campo4" onKeyUp='moeda(this);multiplicacao(this.id)' name="campo4" readonly="readonly" class='form-control' size='10'/> </body> </html> ` A: Obrigada à todos que ajudaram, mas consegui fazendo assim: i = 1; String.prototype.formatMoney = function() { var v = this; if(v.indexOf('.') === -1) { v = v.replace(/([\d]+)/, "$1,00"); } v = v.replace(/([\d]+)\.([\d]{1})$/, "$1,$20"); v = v.replace(/([\d]+)\.([\d]{2})$/, "$1,$2"); return v; }; function id( el ){ return document.getElementById( el ); } function getMoney( el ){ var money = id( el ).value ? id( el ).value.replace( ',', '.' ) : 0; return parseFloat( money )*100; } function multiplicacao(){ //pego os elementos pela classe var inputqtd = $('.input-qtd'); var inputunit = $('.input-unit'); var inputresultado = $('.input-resultado'); var qtd = 0; var unit = 0; var total = 0; //varro a lista e pego os ids. for (var i = 0; i < inputqtd.length; i++) { id1 = (inputqtd[i].id); id2 = (inputunit[i].id); res = (inputresultado[i].id); qtd = id(id1).value; unit = getMoney(id2); total = qtd*unit; id(res).value = String(total/100).formatMoney(); } } //mascara para campos de R$ function moeda(z){ v = z.value; v=v.replace(/\D/g,"") //permite digitar apenas números v=v.replace(/[0-9]{12}/,"inválido") //limita pra máximo 999.999.999,99 v=v.replace(/(\d{1})(\d{8})$/,"$1.$2") //coloca ponto antes dos últimos 8 digitos v=v.replace(/(\d{1})(\d{5})$/,"$1.$2") //coloca ponto antes dos últimos 5 digitos v=v.replace(/(\d{1})(\d{1,2})$/,"$1,$2") //coloca virgula antes dos últimos 2 digitos z.value = v; } <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> <html> <head> <script type="text/javascript" src="js/jquery-1.11.2.min.js"></script> <script type="text/javascript" src="http://code.jquery.com/jquery-1.7.1.js"></script> </head> <body> <p>INPUTS DE QUANTIDADE:</p> <input id="input-qtd1" onKeyUp='multiplicacao()' type='text' name='' class='form-control input-qtd' size='10'/> <input id="input-qtd2" onKeyUp='multiplicacao()' type='text' name='' class='form-control input-qtd' size='10'/> <input id="input-qtd3" onKeyUp='multiplicacao()' type='text' name='' class='form-control input-qtd' size='10'/> <input id="input-qtd4" onKeyUp='multiplicacao()' type='text' name='' class='form-control input-qtd' size='10'/> <p>INPUTS DE VALOR UNITÁRIO:</p> <input id="input-unit1" onKeyUp='moeda(this);multiplicacao()' type='text' name='' class='form-control input-unit' size='10'/> <input id="input-unit2" onKeyUp='moeda(this);multiplicacao()' type='text' name='' class='form-control input-unit' size='10'/> <input id="input-unit3" onKeyUp='moeda(this);multiplicacao()' type='text' name='' class='form-control input-unit' size='10'/> <input id="input-unit4" onKeyUp='moeda(this);multiplicacao()' type='text' name='' class='form-control input-unit' size='10'/> <p>INPUTS DE TOTAL:</p> <input id="input-resultado1" onKeyUp='moeda(this);multiplicacao()' name="campo4" readonly="readonly" class='form-control input-resultado' size='10'/> <input id="input-resultado2" onKeyUp='moeda(this);multiplicacao()' name="campo4" readonly="readonly" class='form-control input-resultado' size='10'/> <input id="input-resultado3" onKeyUp='moeda(this);multiplicacao()' name="campo4" readonly="readonly" class='form-control input-resultado' size='10'/> <input id="input-resultado4" onKeyUp='moeda(this);multiplicacao()' name="campo4" readonly="readonly" class='form-control input-resultado' size='10'/> </body> </html>
2023-12-20T01:27:17.568517
https://example.com/article/2327
“The Home Secretary says it is world leading. Not all people agree with that. Some think it is leading the world over a cliff”. Not my words but those of David Anderson Q.C. speaking yesterday at a symposium on the Investigatory Powers Bill hosted by 25 Bedford Row barristers chambers. The Investigatory Powers Bill comes up for scrutiny in Parliament tomorrow, as the British government tries to push it through before the end of the year. This is the controversial new law that will govern electronic surveillance. But legal experts, who are not usually given to emotive language, say the Bill is bad law, and nothing more than window dressing. From a public interest perspective, the government is rushing the Bill unnecessarily. How safe will our data be under the proposed regime? Will we fall over a digital cliff as the spooks get to play with our Internet connection records? This report is my interpretation of the legal arguments presented at the 25 Bedford Row symposium on the Investigatory Powers Bill. The Investigatory Powers Bill is a new law designed to oversee online surveillance practices by the intelligence services, the police and law enforcement authorities. It is primarily about what they can do with our phone and online data. The aim is to deal with a change from targetted one-on-one surveillance such as telephone call interception, to surveillance practices that use electronic data analysis. These practices involve the data of many people, not only those who are directly under suspicion, and they reflect a sweeping change that has occurred over the last 25-30 years with the rise of the Internet and broadband. There is always a balance drawn between the different competing rights. In this case, the balance is between the privacy rights of individuals and public security. The political argument is about where the line should be put. In light of the Brussels attacks this week, we all want to to be safe, but that should not lead us to rush into decisions the compromise privacy. With online surveillance and communications traffic data, there are massive implications for privacy rights. No-one likes to have another person looking over their digital shoulder at their laptop screen. The Investigatory Powers Bill brings together elements from the other laws that already exist for example laws governing interception of telephones and the collection and retention of communications traffic data. It puts them into one place, allowing us to see the position as a whole. It is the first time that online surveillance activities in the UK have been formally regulated under one law. However, a major criticism is that the Investigatory Powers Bill was drafted from the perspective of the security services, without sufficient attention being given to safeguards for the general public. There are question marks over its compliance with the European Convention on Human Rights (ECHR). All laws must be considered for ECHR compliance before they can be put before Parliament, however, as we have seen with other pieces of legislation, the government will sometimes try to wing it when drafting the ECHR Memorandum and takes advice from those who seek the Bill rather than from human rights lawyers. (See how this happened to the Digital Economy Act in my book A Copyright Masquerade). At the heart of the legal argument over the Investigatory Powers Bill, is the role of the Home Secretary versus the role of the judiciary. This relates to the very important issue of access to surveillance data. Put very simply - who gets what, on what terms, how much they can have, and who supervises it? The government is proposing the so-called “double lock”. This means that warrants for bulk data access and for interception of communications would have to be signed off by a Judicial Commissioner as well as the Home Secretary. Currently, only the Home Secretary would sign such warrants. Despite the fact that it sounds like an improvement over the present process, there is considerable controversy over this “double lock”. Legal experts say it needs more work before it is ready to be adopted into legislation. The issues surround the role of the judges. There is a danger that judges could be asked to rubber stamp requests that have been authorised by the Home Secretary, and that the process will not allow judges the time or facility to rigorously assess the proportionality of a warrant. Moreover, it seems that modification of warrants may be carried out be officials and would not have judicial oversight. The lawyers would like to see more powers for the Judicial Commissioners than the Bill currently proposes. They argue that judges are better equipped to assess the proportionality of a request for data access and to consider the public interest in granting such a request. On a purely practical level, the Home Secretary simply cannot give each request the time it needs to makes these kinds of determinations, when she signs some 2500 applications a year. In other words, the double lock can be broken because the individual parts are flimsy. Further question marks surround the feasibility of data collection by communications service providers (including broadband providers and ISPs). The Bill provides for the collection and retention of Internet connection records. The definition of what is an 'Internet connection record' is a moving target – for full analysis see Graham Smith's Cyberleagle blog. This issue is at the centre of disagreement between government and industry. The broadband providers want to minimise the data required because they don't need all of it for the businesses, and it is costly to keep it. In fact, government and industry have been arguing for the past 10 years about what should be collected, as the story of the EU Data Retention Directive will testify. (See my book The Closing of the Net ). However, the detail has changed as the Internet itself has evolved. As the network structures become more complex, so does the nature of the data it gathers and with it, the difficulty in determining what is useful, and what is not. A new technique known as 'thematic data analysis' is especially problematic is . For example, the collection of data for 'all devices in a partcular location'. Much of the existing law was drafted before there were mobile phone or Internet, and could not have conceived of this concept. Therefore, allowing for such thematic practices would reflect a significant change in the law, as compared to the current position. According to legal experts, the safeguards for privacy in this regard are weak and need further work before this should be brought into law. Two Parliamentary committees have already slammed the Bill - the Commons Science and Technology Committee and the notoriously cautious Intelligence and Security Committee. A third committee, whilst more cautious, has expressed quite a lot of criticism. Overall, the volley of legal criticism must lead us to question why the Investigatory Powers Bill is being rushed through and whether it is fit for purpose? We have clearly come a long way from the days when the government did not admit the existence of GCHQ. In that regard, the Investigatory Powers Bill is surely a step forward. However, it does seem to be a missed opportunity to re-align the oversight of surveillance for the digital era. --- The Investigatory Powers Bill is approaching the Committee Stage in Parliament, with first meeting scheduled just before the Easter holidays. The back story to the Bill can be found in the story of the EU Data Retention Directive (that has now been struck down by the European Court of Justice). See my new book The Closing of the Net due in the bookstores imminently. This is an original article from Iptegrity.comand reflects research that I have carried out. If you refer to it or to its content, please cite my name as the author, and provide a link back to iptegrity.com. Media and Academics – please cite as Monica Horten, 2016, Investigatory Powers Bill - is it leading the world over a cliff? in Iptegrity.com, 22 March 2016. Commercial users - please contact me. Iptegrity.com is the website of Dr Monica Horten. She is a trainer & consultant on Internet governance policy, published author& Visiting Fellow at the London School of Economics & Political Science. She served as an independent expert on the Council of Europe Committee on Internet freedom. She has worked on CoE, EU and UNDP funded projects in eastern Europe and beyond. She was shortlisted for The Guardian Open Internet Poll 2012. Iptegrity offers expert insights into Internet policy (and now Brexit). Iptegrity has a core readership in the Brussels policy community, and has been cited in the media. Please acknowledge Iptegrity when you cite or link. For more, see IP politics with integrity Copyright Monica Horten 2007-2017. This website is released under a Creative Commons Attribution, Non-commercial, Share-Alike licence. It may be used for non-commercial purposes only and the author's name should be attributed wherever content is reproduced or cited.
2024-01-09T01:27:17.568517
https://example.com/article/9523
Nunapitchuk, Alaska Nunapitchuk (Central Alaskan Yup'ik: Nunapicuar) is a city in Bethel Census Area, Alaska, United States. At the 2010 census the population was 496, up from 466 in 2000. Geography Nunapitchuk is located at (60.896352, -162.454383). According to the United States Census Bureau, the city has a total area of , of which, of it is land and of it (8.07%) is water. Demographics Nunapitchuk first appeared on the 1940 U.S. Census as the unincorporated native village of "Nunatpichuk" (apparently erroneously spelled). It was returned as Nunapitchuk in 1950 and 1960. In 1969, Nunapitchuk and the neighboring village of Kasigluk were merged to form the city of Akolmiut. (See City of Akolmiut below) In 1982, both communities decided to dissolve Akolmiut and become separate cities again. Nunapitchuk returned again beginning on the 1990 census and in every successive census to date (2010). As of the census of 2000, there were 466 people, 105 households, and 91 families residing in the city. The population density was 59.3 people per square mile (22.9/km²). There were 120 housing units at an average density of 15.3 per square mile (5.9/km²). The racial makeup of the city was 3.43% White, 95.49% Native American, 0.43% Asian, 0.21% from other races, and 0.43% from two or more races. There were 105 households out of which 67.6% had children under the age of 18 living with them, 67.6% were married couples living together, 11.4% had a female householder with no husband present, and 12.4% were non-families. 10.5% of all households were made up of individuals and 1.9% had someone living alone who was 65 years of age or older. The average household size was 4.44 and the average family size was 4.88. In the city, the age distribution of the population shows 41.8% under the age of 18, 10.3% from 18 to 24, 27.7% from 25 to 44, 15.7% from 45 to 64, and 4.5% who were 65 years of age or older. The median age was 23 years. For every 100 females, there were 109.9 males. For every 100 females age 18 and over, there were 115.1 males. The median income for a household in the city was $29,286, and the median income for a family was $30,313. Males had a median income of $16,250 versus $36,250 for females. The per capita income for the city was $8,364. About 14.6% of families and 20.7% of the population were below the poverty line, including 29.9% of those under age 18 and none of those age 65 or over. City of Akolmiut (1969-1982) The former city of Akolmiut was the result of the consolidation of neighboring villages of Nunapitchuk and Kasigluk incorporating into a city in 1969. After appearing on the 1970 and 1980 censuses, the communities decided to separate themselves back into two independent cities again in 1982, resuming their former names. Life in Nunapitchuk Nunapitchuk is part of the Yukon-Kuskokwim Delta, and as such sits on swampy tundra. There are no roads to or within Nunapitchuk; buildings are connected by a network of boardwalks. The village is accessible by small aircraft, boats, and hovercraft , as weather permits. The village's grocery and fuel needs are served by a single general store, owned and operated by the local Alaska Native Corporation, Nunapitchuk, Limited. Many locals also practice subsistence fishing and hunting . Education Lower Kuskokwim School District operates the Anna Tobeluk Memorial School, K-12. the school had 203 students, 15 certified teachers, and 16 classified employees. English is the sole language of instruction at Tobeluk. References External links Nunapitchuk Public School (photos and first-hand discussion of the village.) Category:Cities in Alaska Category:Cities in Bethel Census Area, Alaska
2024-01-19T01:27:17.568517
https://example.com/article/9715
Scapa T002 ATG Tape [Acid Neutral] Scapa T002 ATG Tape is an unsupported acrylic adhesive transfer film tape (pressure-sensitive adhesive pre-applied to a special release liner). It is an acid neutral (pH 7) acrylic adhesive and is used for graphic arts applications, picture framing, scrapbooking, photo mounting, exhibit and POP displays and product assembly. Other applications include mounting promotional items and posters and also mounting picture frame mat boards and dust covers. Glass fibers in adhesive provides easy handling and dimensional stability. Scapa T002's high grab characteristics ensures a successful splice. Has a good initial tack and good ultimate bonding power. The 60-yard long rolls are great for production shops since it cuts down on the number of times rolls need to be loaded which saves on labor cost. The main difference between Scapa T002 and Scapa TD-200 ATG tapes is that T002 has a tackier adhesive and it is pH neutral (acid-neutral). Scapa T002, like all ATG tapes, is reverse wound on the roll so it is designed to be used in an ATG dispenser/gun. item offered in 2 variations; most popular is 1/2 in. x 36 yds. (Clear Adhesive on Yellow Liner) see table below for all sizes $ Price per item will display oncethe above selections are made. ** Adhesive tape products are NOT guaranteed to be splice-free. Sizes shipped will typically be the tape industry standard metric-cut sizes, i.e. 24mm for each 1 inch of nominal tape width ordered (rolls are approximately 5% narrower than the nominal size). Please contact us to inquire about pricing for full-cut widths; e.g. a 6 inch roll cut to 152mm instead of 144mm. Offers the widest range of application flexibility available. Exhibits excellent processing performance whether manually or automatically applied. Has superior tensile strength, adhesion properties and holding force which ensures consistent, reliable seals. Hot melt adhesive will bond faster to a surface which is referred to as quick-grab or quick-stick. It typically has higher tack (will feel stickier to the touch), but is also softer. It has lower heat resistance, shear resistance, and sometimes UV resistance than an acrylic adhesive. NOTE: it is called hot melt because the adhesive is applied hot by the manufacturer and then hardens as it cools (you do not need to apply heat to the tape yourself). natural rubber Properties are similar to that of hot melt rubber, but natural rubber often holds where other adhesives won't (recycled fibers, dust, cold, heat and heavy loads). It provides good overall adhesion and moisture resistance. acrylic Offer excellent performance, especially for applications in temperatures less than 40°F and greater then 120°F. It provides excellent clarity, has high shear strength, is usually more permanent/durable even when exposed to moisture, and it ages well over extended periods in fluorescent and sunlight. Since it remains clear for the life of the application and does not yellow over time it is ideal for applications such as sealing white cartons. While it has good initial adhesion it does take 24-48 hours to cure and to achieve its maximum bond strength (has gradual adhesion buildup). Another difference between hot melt rubber and acrylic adhesive is if you fold tape over making the two adhesive sides touch the acrylic adhesive will remain attached to the carrier (e.g. paper, film) while a hot melt adhesive will stick to itself and pull off of the carrier. It is the best choice for clarity, UV resistance and aging characteristics. silicone Is great for extreme temperature applications since silicone adhesive can work in continuous operating temperatures from -100°F to 500°F. They also exhibit good chemical resistance, retain electrical properties, and remove cleanly with little or no residue. zinc oxide Zinc oxide based adhesive formula is a skin-friendly adhesive which is commonly used on sports medicine tapes.
2024-05-11T01:27:17.568517
https://example.com/article/9380
Master Izo Master Izo is a fictional character appearing in American comic books published by Marvel Comics. A superhero martial artist, he is associated with Daredevil, and first appeared in Daredevil #112. He was created by Ed Brubaker and Michael Lark. Fictional character biography The man who would be known in the modern age only as Master Izo was a member of the organization The Hand hundreds of years ago in Feudal Japan. Following the death of its founder, Kagenobu Yoshioka, and its transformation from a samurai alliance into a ninja cult in service to a demon, Izo chose to leave. At this time he put out his eyes, which enabled him to see the world, he claimed, as Yoshioka had (and as Daredevil later would). Modern Age Izo would later found The Chaste, a rival martial arts association situated atop a sheer cliff known as the Wall. However, his unhindered nature eventually led his students to vote him out, disgusted with his drinking and gambling. Stick took his place as the leader of the Chaste. Izo was revealed to have been present shortly after the accident which gave Matt Murdock his superhuman senses, and reported this information anonymously to Stick. Later still, he became the trainer of the future supervillain and Hand assassin Lady Bullseye, who he promised would one day become the Hand's leader. He is mentioned a number of times in the Book of the Iron Fist. Much later, following the death of the Skrull posing as Hand leader Elektra, Izo journeyed to New York City, where the four remaining ninja-lords of the Hand were assembling to forcibly induct Daredevil as the new leader. Izo intervened to assist Daredevil in driving them off, which led them to switch their focus to the Kingpin. Izo's purpose was in fact to manoeuvre Daredevil into taking the position, as a means of reforming the Hand away from its corrupted state. He was also revealed to have placed Black Tarantula within the Hand as a mole, unbeknownst to Daredevil. Ultimately, Daredevil accepted the position, and ordered that the Kingpin and Lady Bullseye be banished. Her erstwhile ally's treachery exposed, Lady Bullseye vowed to kill Izo, who told her to "get in line." Subsequently, Izo fakes his own murder at the hands of Daredevil in order to trick the Hand into accepting Daredevil as their leader. He later shows up in Shadowland to reveal to the heroes involved in the battle against Daredevil and the Hand to explain his discovery that Matt Murdock had been possessed by the Beast. Powers and abilities Master Izo is a formidable martial artist, one of the finest anywhere in the world, including being able to wield two katana at once. He has considerable stamina, enabling him to traverse the city by jumping on rooftops. Despite (or rather, as a result of) being blind, he has superhuman-radar senses, much as Daredevil does. He also evidently possesses some form of immortality or at least life-extending capability, as he is now somewhere in the area of 500 years old. References External links Izo at Marvel Wiki Entry at Comic Book Database Category:Comics characters introduced in 2008 Category:Fictional blind characters Category:Fictional vigilantes Category:Marvel Comics martial artists Category:Marvel Comics superheroes Category:Fictional characters with superhuman senses Category:Fictional Japanese people Category:Characters created by Ed Brubaker
2024-04-05T01:27:17.568517
https://example.com/article/3012
The present invention relates to a new and distinct cultivar of Chrysanthemum plant, botanically known as Chrysanthemum X morifolium, commercially grown as a cut flower and hereinafter referred to by the name ‘DLFZON1’. The new Chrysanthemum plant is a product of a planned breeding program conducted by the Inventor in Maasdijk, The Netherlands. The objective of the breeding program is to create new freely-flowering cut Chrysanthemum plants with pompon inflorescences, strong flowering stems and excellent postproduction longevity. The new Chrysanthemum plant originated from a cross-pollination made by the Inventor in Maasdijk, The Netherlands in March, 2013, of a proprietary selection of Chrysanthemum X morifolium identified as code designation DB 44792, not patented, as the female, or seed, parent with a proprietary selection of Chrysanthemum X morifolium identified as code designation DB 43726, not patented, as the male, or pollen, parent. The new Chrysanthemum plant was discovered and selected by the Inventor as a single flowering plant from within the progeny of the stated cross-pollination in a controlled greenhouse environment in Maasdijk, The Netherlands in September, 2013. Asexual reproduction of the new Chrysanthemum plant by terminal vegetative cuttings in a controlled greenhouse environment in Maasdijk, The Netherlands since September, 2013 has shown that the unique features of this new Chrysanthemum plant are stable and reproduced true to type in successive generations.
2023-08-26T01:27:17.568517
https://example.com/article/3978
namespace ClassLib105 { public class Class029 { public static string Property => "ClassLib105"; } }
2023-10-19T01:27:17.568517
https://example.com/article/4699
Obsessive-compulsive disorder and spectrum across the life span. An obsessive-compulsive disorder (OCD) spectrum has been proposed, which includes a group of disorders that share certain features with OCD including clinical symptoms (repetitive behaviours and thoughts), neurobiology (e.g. neurotransmitters) and preferential response to anti-obsessional treatments, such as the selective serotonin reuptake inhibitors (SSRIs). Three distinct clusters have been identified within the OCD spectrum, i.e. disorders concerning preoccupations with bodily sensations or appearance, impulsive disorders, and neurologically based disorders, and these share phenotypic features. Using one example from each of these clusters, body dysmorphic disorder (BDD), pathological gambling (PG) and autism, respectively, the phenomenology, neurobiology and pharmacotherapy indicates that specific biological factors are shared by OCD and by these disorders and correlate with the severity of repetitive behaviours. Thus, in common with OCDs, in BDD there is increased activity in the limbic regions; in PG there is evidence of deficiencies in 5-HT function and receptors; and in autism there are restricted interests and repetitive behaviours which may be influenced by serotonergic mechanisms. Our findings support the notion that targeted treatments, for example using SSRIs, for the behaviours associated with these disorders are effective. Our review considers one SSRI treatment in particular, fluvoxamine, and conclusions should be drawn in light of this. Further testing of our hypothesis would be prudent to confirm its validity.
2023-12-01T01:27:17.568517
https://example.com/article/9253
Movement disorders in autoimmune encephalitis and paraneoplastic neurological syndromes. Movement disorders are extremely common and diverse in autoimmune encephalitis (AE) and paraneoplastic neurological syndromes (PNS). They can sometimes represent the main neurological disorder of a given patient, or just be part of a larger neurological syndrome. Early diagnosis of AE or PNS is essential, as the associated abnormal movements can be effectively treated with immunomodulators. Nevertheless, the diagnosis is often delayed because of the large number of differential diagnoses (infections, metabolic disorders, genetic and degenerative diseases) and because the semiology of abnormal movements arising during AE and PNS is often not well known. However, there are highly specific clinical features, depending on the associated autoantibodies, age and gender of the patient, and associated cancers. Such features are likely to rely on specific mechanisms, the knowledge of which could lead to new therapeutic proposals. Also, the growing body of work on AE and PNS provides a better understanding of the links between immunity and neuronal degeneration, and immunity and genetic specificities. Thus, the purpose of this article is to present the current knowledge and different subtypes of movement disorders associated with AE and PNS, as well as the mechanisms that can lead to neuronal dysfunction.
2024-05-27T01:27:17.568517
https://example.com/article/5990
/* This file is part of Imagine. Imagine is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. Imagine is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with Imagine. If not, see <http://www.gnu.org/licenses/> */ #define LOGTAG "Input" #include <imagine/base/Base.hh> #include <imagine/input/Input.hh> #include <imagine/logger/logger.h> #include <imagine/util/bits.h> #include <imagine/util/algorithm.h> #include <imagine/util/string.h> #include <imagine/util/ScopeGuard.hh> #include "xlibutils.h" #include "x11.hh" #include "internal.hh" #include "../../input/private.hh" using namespace Base; namespace Input { struct XIEventMaskData { XIEventMask eventMask{}; uint8_t maskBits[XIMaskLen(XI_LASTEVENT)]{}; }; struct XInputDevice : public Device { int id = -1; bool iCadeMode_ = false; XInputDevice() {} XInputDevice(uint32_t typeBits, const char *name): Device(0, Event::MAP_SYSTEM, typeBits, name) {} XInputDevice(const XIDeviceInfo &info, int enumId, bool isPointingDevice, bool isPowerButton): Device(enumId, Event::MAP_SYSTEM, 0, info.name), id(info.deviceid) { if(isPointingDevice) { type_ = Device::TYPE_BIT_MOUSE; } else { type_ = Device::TYPE_BIT_KEYBOARD; if(isPowerButton) { type_ |= Device::TYPE_BIT_POWER_BUTTON; } } } void setICadeMode(bool on) final { logMsg("set iCade mode %s for %s", on ? "on" : "off", name()); iCadeMode_ = on; } bool iCadeMode() const final { return iCadeMode_; } }; static std::vector<std::unique_ptr<XInputDevice>> xDevice; static Cursor blankCursor{}; static Cursor normalCursor{}; static uint32_t numCursors = 0; static int xI2opcode = 0; static int xPointerMapping[Config::Input::MAX_POINTERS]{}; static XkbDescPtr coreKeyboardDesc{}; static Device *vkbDevice{}; static const Device *deviceForInputId(int osId) { for(auto &dev : xDevice) { if(dev->id == osId) { return dev.get(); } } if(!vkbDevice) logErr("device id %d doesn't exist", osId); return vkbDevice; } void setKeyRepeat(bool on) { setAllowKeyRepeats(on); } static void setXIEventMaskData(XIEventMaskData &data) { data.eventMask.deviceid = XIAllMasterDevices; data.eventMask.mask_len = sizeof(data.maskBits); // always in bytes data.eventMask.mask = data.maskBits; XISetMask(data.maskBits, XI_ButtonPress); XISetMask(data.maskBits, XI_ButtonRelease); XISetMask(data.maskBits, XI_Motion); XISetMask(data.maskBits, XI_FocusIn); XISetMask(data.maskBits, XI_Enter); XISetMask(data.maskBits, XI_FocusOut); XISetMask(data.maskBits, XI_Leave); XISetMask(data.maskBits, XI_KeyPress); XISetMask(data.maskBits, XI_KeyRelease); } void initPerWindowData(::Window win) { if(Config::MACHINE_IS_PANDORA) { XFixesHideCursor(dpy, win); } else { if(!blankCursor) { // make a blank cursor char data[1]{}; auto blank = XCreateBitmapFromData(dpy, win, data, 1, 1); if(blank == None) { logErr("unable to create blank cursor"); } XColor dummy; blankCursor = XCreatePixmapCursor(dpy, blank, blank, &dummy, &dummy, 0, 0); XFreePixmap(dpy, blank); normalCursor = XCreateFontCursor(dpy, XC_left_ptr); } } XIEventMaskData xiMask; setXIEventMaskData(xiMask); XISelectEvents(dpy, win, &xiMask.eventMask, 1); } void hideCursor(::Window win) { if(Config::MACHINE_IS_PANDORA) XFixesHideCursor(dpy, win); else XDefineCursor(dpy, win, Input::blankCursor); } void showCursor(::Window win) { if(Config::MACHINE_IS_PANDORA) XFixesShowCursor(dpy, win); else XDefineCursor(dpy, win, Input::normalCursor); } bool Device::anyTypeBitsPresent(uint32_t typeBits) { // TODO if(typeBits & TYPE_BIT_KEYBOARD) { return 1; } return 0; } static void setupXInput2(Display *dpy) { int event, error; if(!XQueryExtension(dpy, "XInputExtension", &xI2opcode, &event, &error)) { logErr("XInput extension not available"); ::exit(-1); } int major = 2, minor = 0; if(XIQueryVersion(dpy, &major, &minor) == BadRequest) { logErr("required XInput 2.0 version not available, server supports %d.%d", major, minor); ::exit(-1); } } static int devIdToPointer(int id) { iterateTimes(4, i) { if(id == xPointerMapping[i]) return i; } logWarn("warning: device id not present in pointer mapping"); return 0; } static bool isPowerButtonName(const char *name) { return strstr(name, "Power Button") || (Config::MACHINE_IS_PANDORA && strstr(name, "power-button")); } static void addXInputDevice(const XIDeviceInfo &xDevInfo, bool notify, bool isPointingDevice) { for(auto &e : xDevice) { if(xDevInfo.deviceid == e->id) { logMsg("X key input device %d (%s) is already present", xDevInfo.deviceid, xDevInfo.name); return; } } logMsg("adding X key input device %d (%s) to device list", xDevInfo.deviceid, xDevInfo.name); uint32_t devId = 0; for(auto &e : devList) { if(e->map() != Event::MAP_SYSTEM) continue; if(string_equal(e->name(), xDevInfo.name) && e->enumId() == devId) devId++; } xDevice.emplace_back(std::make_unique<XInputDevice>(xDevInfo, devId, isPointingDevice, isPowerButtonName(xDevInfo.name))); auto dev = xDevice.back().get(); addDevice(*dev); if(Config::MACHINE_IS_PANDORA && (string_equal(xDevInfo.name, "gpio-keys") || string_equal(xDevInfo.name, "keypad"))) { dev->subtype_ = Device::SUBTYPE_PANDORA_HANDHELD; } if(notify) onDeviceChange.callCopySafe(*dev, { Device::Change::ADDED }); } static void removeXInputDevice(int xDeviceId) { forEachInContainer(xDevice, e) { auto dev = e->get(); if(dev->id == xDeviceId) { auto removedDev = *dev; removeDevice(*dev); xDevice.erase(e.it); onDeviceChange.callCopySafe(removedDev, { Device::Change::REMOVED }); return; } } logErr("key input device %d not in list", xDeviceId); } static const char *xInputDeviceTypeToStr(int type) { switch(type) { case XIMasterPointer: return "Master Pointer"; case XISlavePointer: return "Slave Pointer"; case XIMasterKeyboard: return "Master Keyboard"; case XISlaveKeyboard: return "Slave Keyboard"; case XIFloatingSlave: return "Floating Slave"; default: return "Unknown"; } } static Key keysymToKey(KeySym k) { // if the keysym fits in 2 bytes leave as is, // otherwise use only first 15-bits to match // definition in Keycode namespace return k <= 0xFFFF ? k : k & 0xEFFF; } void init(Display *dpy) { setupXInput2(dpy); // request input device changes events { XIEventMask eventMask; uint8_t mask[XIMaskLen(XI_LASTEVENT)] {0}; XISetMask(mask, XI_HierarchyChanged); eventMask.deviceid = XIAllDevices; eventMask.mask_len = sizeof(mask); eventMask.mask = mask; XISelectEvents(dpy, DefaultRootWindow(dpy), &eventMask, 1); } // setup device list static XInputDevice virt{Device::TYPE_BIT_VIRTUAL | Device::TYPE_BIT_KEYBOARD | Device::TYPE_BIT_KEY_MISC, "Virtual"}; addDevice(virt); vkbDevice = &virt; int devices; XIDeviceInfo *device = XIQueryDevice(dpy, XIAllDevices, &devices); iterateTimes(devices, i) { if(device[i].use == XIMasterPointer || device[i].use == XISlaveKeyboard) { /*logMsg("Device %s (id: %d) %s paired to id %d", device[i].name, device[i].deviceid, xInputDeviceTypeToStr(device[i].use), device[i].attachment);*/ } switch(device[i].use) { bcase XIMasterPointer: { logMsg("mapping X pointer %d (%s) as pointer %d", device[i].deviceid, device[i].name, Input::numCursors); xPointerMapping[Input::numCursors] = device[i].deviceid; Input::numCursors++; addXInputDevice(device[i], false, true); } bcase XISlaveKeyboard: { addXInputDevice(device[i], false, false); } } } XIFreeDeviceInfo(device); coreKeyboardDesc = XkbGetKeyboard(dpy, XkbAllComponentsMask, XkbUseCoreKbd); } void deinit() { //logMsg("deinit input data"); if(blankCursor) XFreeCursor(dpy, blankCursor); if(normalCursor) XFreeCursor(dpy, normalCursor); if(coreKeyboardDesc) XkbFreeClientMap(coreKeyboardDesc, 0, true); } static uint32_t makePointerButtonState(XIButtonState state) { uint8_t byte1 = state.mask_len > 0 ? state.mask[0] : 0; uint8_t byte2 = state.mask_len > 1 ? state.mask[1] : 0; return byte1 | (byte2 << 8); } static void updatePointer(Base::Window &win, uint32_t key, uint32_t btnState, int p, uint32_t action, int x, int y, Input::Time time, int sourceID) { auto dev = deviceForInputId(sourceID); auto pos = transformInputPos(win, {x, y}); win.dispatchInputEvent(Event{(uint32_t)p, Event::MAP_POINTER, (Key)key, btnState, action, pos.x, pos.y, p, false, time, dev}); } bool handleXI2GenericEvent(XEvent &event) { assert(event.type == GenericEvent); if(event.xcookie.extension != xI2opcode) { return false; } if(!XGetEventData(dpy, &event.xcookie)) { logMsg("error in XGetEventData for XI2 event"); return true; } auto freeEventData = IG::scopeGuard([&]() { XFreeEventData(dpy, &event.xcookie); }); XGenericEventCookie *cookie = &event.xcookie; auto &ievent = *((XIDeviceEvent*)cookie->data); // XI_HierarchyChanged isn't window-specific if(unlikely(ievent.evtype == XI_HierarchyChanged)) { //logMsg("input device hierarchy changed"); auto &ev = *((XIHierarchyEvent*)cookie->data); iterateTimes(ev.num_info, i) { if(ev.info[i].flags & XISlaveAdded) { int devices; XIDeviceInfo *device = XIQueryDevice(dpy, ev.info[i].deviceid, &devices); if(devices) { if(device->use == XISlaveKeyboard) { Input::addXInputDevice(*device, true, false); } XIFreeDeviceInfo(device); } } else if(ev.info[i].flags & XISlaveRemoved) { Input::removeXInputDevice(ev.info[i].deviceid); } } return true; } // others events are for specific windows auto destWin = windowForXWindow(ievent.event); if(unlikely(!destWin)) { //logWarn("ignored event for unknown window"); return true; } auto &win = *destWin; auto time = IG::Milliseconds(ievent.time); // X11 timestamps are in ms auto handleKeyEvent = [](Base::Window &win, XIDeviceEvent &ievent, Time time, bool pushed) { auto action = pushed ? PUSHED : RELEASED; if(pushed) cancelKeyRepeatTimer(); auto dev = deviceForInputId(ievent.sourceid); KeySym k = XkbKeycodeToKeysym(dpy, ievent.detail, 0, 0); bool repeated = ievent.flags & XIKeyRepeat; //logMsg("KeySym %d, KeyCode %d, repeat: %d", (int)k, ievent.detail, repeated); if(pushed && k == XK_Return && (ievent.mods.effective & Mod1Mask) && !repeated) { toggleFullScreen(win.nativeObject()); } else if(!pushed || (pushed && (allowKeyRepeats() || !repeated))) { if(!dev->iCadeMode() || (dev->iCadeMode() && !processICadeKey(k, action, time, *dev, win))) { bool isShiftPushed = ievent.mods.effective & ShiftMask; auto key = keysymToKey(k); auto ev = Event{dev->enumId(), Event::MAP_SYSTEM, key, key, action, isShiftPushed, repeated, time, dev}; ev.setX11RawKey(ievent.detail); win.dispatchInputEvent(ev); } } }; //logMsg("device %d, event %s", ievent.deviceid, xIEventTypeToStr(ievent.evtype)); switch(ievent.evtype) { bcase XI_ButtonPress: updatePointer(win, ievent.detail, makePointerButtonState(ievent.buttons), devIdToPointer(ievent.deviceid), PUSHED, ievent.event_x, ievent.event_y, time, ievent.sourceid); bcase XI_ButtonRelease: updatePointer(win, ievent.detail, makePointerButtonState(ievent.buttons), devIdToPointer(ievent.deviceid), RELEASED, ievent.event_x, ievent.event_y, time, ievent.sourceid); bcase XI_Motion: updatePointer(win, 0, makePointerButtonState(ievent.buttons), devIdToPointer(ievent.deviceid), MOVED, ievent.event_x, ievent.event_y, time, ievent.sourceid); bcase XI_Enter: updatePointer(win, 0, 0, devIdToPointer(ievent.deviceid), ENTER_VIEW, ievent.event_x, ievent.event_y, time, ievent.sourceid); bcase XI_Leave: updatePointer(win, 0, 0, devIdToPointer(ievent.deviceid), EXIT_VIEW, ievent.event_x, ievent.event_y, time, ievent.sourceid); bcase XI_FocusIn: win.dispatchFocusChange(true); bcase XI_FocusOut: win.dispatchFocusChange(false); deinitKeyRepeatTimer(); bcase XI_KeyPress: handleKeyEvent(win, ievent, time, true); bcase XI_KeyRelease: handleKeyEvent(win, ievent, time, false); } return true; } Event::KeyString Event::keyString() const { KeyString str{}; KeySym k; uint32_t mods = metaState ? ShiftMask : 0; XkbTranslateKeyCode(Input::coreKeyboardDesc, rawKey, mods, nullptr, &k); XkbTranslateKeySym(dpy, &k, 0, str.data(), sizeof(KeyString), nullptr); return str; } void showSoftInput() {} void hideSoftInput() {} bool softInputIsActive() { return false; } void flushEvents() { Base::x11FDHandler(); } }
2023-08-30T01:27:17.568517
https://example.com/article/8302
I have not been able to wipe the smile off of my face from the minute I opened the box! There's so much dark chocolate and in different flavors! I absolutely cannot wait to dig in! Hot cocoa and bars with sea salt, mint, almonds, spicy, blueberry, cherry, fruit and nut flavors. Thank you so much for the amazing Secret Santa gift!
2024-06-24T01:27:17.568517
https://example.com/article/5387
NDCA Updates Age Classifications and Pre-Teen Costuming Rules Author American Ballroom Company Published Jan 26, 2012 Age classifications, "a" through "f-(3)", will become effective on the individual's actual birthday. On a year where a competitor is going to move from one classification to the next they may make this change anytime during a 60 day period that begins 30 days prior to their birthday and ends 30 days following there birthday. 1. Pre-Teen I: 9th birthday or less 2. Pre-Teen II: 10th or 11th birthday 3. Junior I: 12th or 13th birthday 4. Junior II: 14th or 15th birthday 5. Youth: 16th, 17th or 18th birthday 6. Adult: 19th birthday or greater For the calendar year 2012 competitors may choose to compete in the age classifications that were in force during the 2011 calendar year if they wish instead of the age classifications above. The 2011 age definitions were as follows: Age classifications, "a" through "f-(3)", will become effective on January 1st of the year in which the individual's classification age is attained regardless of the actual birthdate. 1. Pre-Teen I: 9th birthday or less 2. Pre-Teen II: 10th or 11th birthday 3. Junior I: 12th or 13th birthday 4. Junior II: 14th or 15th birthday 5. Youth: 16th, 17th or 18th birthday 6. Adult: 19th birthday or greater b. Girls (1) Skirt with top or simple dress with attached under garment or leotard top with full skirt (2) Skirts (a) Plain or pleated with minimum 1 to maximum 3 half circles. One plain simple underskirt allowed which is no larger or longer than top layer, and is the same or similar color as the outer skirt (b) No uneven hem lines, use of boning, frills, splits, openings, fishing line, or edging (including "lettuce edging"). Edging or trim of any kind, including ribbon, satin, lace, sequins, etc, is not allowed. A simple hem is required. (c) Length of skirt must not be shorter than 3 inches above the knee cap and no longer than 3 inches below the knee cap (3) Bodice (a) Necklines: Boat, high neck, v-neck, sweetheart, 'peter pan' collar, and regular collar are allowed. Edging or trim of any kind, including ribbon, satin, lace, sequins, etc, is not allowed on the neckline (b) Gathering or shirring on the bodice is not allowed (c) Edging or trim on the bodice is not allowed (5) Materials (a) Fabrics MUST be only one color throughout (b) No glitter, metallic thread, or fabric creating pattern effects' (c) No use of feathers, fringes, bows, belts, frills or sequins (d) No flesh color fabric (e) Any use of color coordinated 'see through' fabric must be lined from waist to shoulder; for use on arms no lining is needed (f) Satin or lace (or similar fabric) is not allowed. Lycra, Spandex, Polyester, plain velvet, and jersey is encouraged. (6) Shoes and Socks (a) Shoes - Heel height not to exceed 1.5 inches, and must be block heel style if a dance shoe. If the shoe comes with rhinestones on the buckle then they are allowed. If the shoe comes with glitter on the shoe then it is allowed. (b) Socks: White ankle socks (may have a small amount of lace), flesh colored pantyhose, or light pink or white tights must be worn. (c) No Fishnet Tights (7) Accessories, jewelry, and makeup (a) No use of arm bands, chokers or headbands (b) No decoration is allowed on dress or in hair (c) No jewelry is allowed, other than one small earring in each ear (d) No makeup allowed (e) Use of fake eyelashes, fake fingernails, colored or glitter hair spray is forbidden c. For pre-teen one-dance or two-dance events, competition organizers may require that the shirts/tops be white and the trousers/skirts be black.
2024-04-29T01:27:17.568517
https://example.com/article/5762
.MTitle { background-image: url("../images/cpct_logo_long_190x49.png"); background-repeat: no-repeat; background-position: left top; }
2024-06-03T01:27:17.568517
https://example.com/article/8628
Maggiano’s Coupons – $10 Off Your Next Visit With Sign Up There surely has to be something fishy if a person says he loathes Italian food. Well, the Italian cuisine as a whole has to offer some lip smacking delicacies. And who else to taste some of the best Italian there is on offer other than Maggiano’s Little Italy? Founded in the neighborhood of River North in Chicago, Maggiano’s Little Italy has gone on to carve out for itself, a niche in the food industry and carries the reputation for serving some of the finest Italian, or rather, American-Italian, there is to offer anywhere in the world. In just 10 years, Maggiano’s Little Italy have gone on to open 50 outlets in 20 states in the USA. There must be a reason behind that success for sure. One of them obviously is the quality they have on offer and the variety as well. And the other? Well, some great offers for you and your family to enjoy a great fine dining experience. Introducing to you Maggiano’s Stuffed Pasta Coupons(this coupon has expired – check the new one below). You can now get $5 off the purchase of every stuffed pasta with every purchase worth a minimum of $14. Not valid with any other offer, only one coupon can be used per table. The coupon does not include discounts on taxes or gratuity. Hurry! Offers valid only till 3/26/14. They weren’t wrong when they said “It’s what’s on the inside that counts!” now, were they?
2024-05-23T01:27:17.568517
https://example.com/article/5488
Background {#Sec1} ========== Tuberculosis (TB) remains a leading cause of infectious disease death worldwide, with 10.4 million new cases and 1.8 million deaths annually \[[@CR1]\]. While the incidence of TB is decreasing globally, recent surveys indicate that drug-resistant TB exists in virtually every location examined \[[@CR1]\]. Isoniazid (INH) is an important first-line agent for the treatment of TB given its potent early bactericidal activity and extensive evidence base as a first line therapy for drug susceptible TB \[[@CR2], [@CR3]\] Unfortunately, resistance to INH has been detected in 1 in 3 incident TB cases in Eastern Europe and 1 in 7 incidence TB cases in all other regions \[[@CR4]\]. Indeed, over 1 million people develop INH resistant TB globally each year. Systematic reviews and meta-analyses have confirmed that INH resistance reduces the probability of treatment success and increases the risk of acquiring resistance to other first line drugs including rifampin, thereby increasing the risk of multidrug resistant TB (MDR-TB) \[[@CR5], [@CR6]\]. Despite the global burden of INH resistance and reduced probability of treatment success, the optimal regimen and duration of treatment for INHR-TB remains controversial. In the setting of known first line drug susceptibility results, the World Health Organization (WHO) treatment guidelines \[[@CR7]\] recommend using rifampin (RIF), pyrazinamide (PZA) and ethambutol (EMB) for 6--9 months. The Canadian Tuberculosis Standards 7th edition and American Thoracic Society offer similar recommendations: 6--9 months of RIF, PZA, and ETH with the potential addition of a fluoroquinolone (FQN) \[[@CR8], [@CR9]\]. However, limited published evidence support these regimens and all three bodies acknowledge further research is required in this area. In the absence of robust evidence for specific treatment regimens, a wide variety of treatment regimens are used by treating physicians \[[@CR10]--[@CR12]\]. Given the increasing prevalence of INH resistance, the clinical efficacy of regimens used by physicians is of interest. In this study, we aimed to identify and described the variations in treatment regimens for patients with confirmed INH mono-resistance and report on outcomes when treated under routine programmatic conditions in British Columbia (BC), Canada. Methods {#Sec2} ======= Study setting and data source {#Sec3} ----------------------------- BC is a Canadian province of 4.6 million people with a TB incidence of 6.3 per 100, 000 population \[[@CR13]\]. The BC Centre for Disease Control (BCCDC) is a centralized public health agency that maintains a TB registry of all active TB cases across BC through notification by public health partners and routine reporting from the centralized provincial mycobacteriology laboratory and provincial pharmacy \[[@CR13]\]. Data collection {#Sec4} --------------- From the BCCDC TB registry, we identified all cases of culture-confirmed, INH mono-resistant TB from November 1, 2002 to December 31, 2014. Cases were excluded if treatment duration was ≤30 days*,* or if end of treatment outcomes were unavailable at the time of data extraction**.** Patient demographics, comorbidities, medical history, bacteriologic information, radiologic data, detailed treatment information, adverse events, treatment outcomes, and post-treatment follow-up information were extracted through individual chart review from the BCCDC TB registry. Specimen processing and drug-susceptibility testing {#Sec5} --------------------------------------------------- The BACTEC 460-radiometric method (Becton Dickinson, Franklin Lakes, NJ) or subsequently the BACTEC MGIT 960 System (Becton Dickinson) were used to determine drug susceptibilities of *Mycobacterium tuberculosis* isolates at the BCCDC Public Health Laboratory. Drugs and their critical concentrations for resistance were as follows: INH at 0.1 μg/mL and 0.4 μg/mL*,* rifampin at 1.0 μg/mL*,* ethambutol at 5.0 μg/mL, and streptomycin at 1.0 μg/mL in accordance with Clinical and Laboratory Standards Institute recommendations \[[@CR14]\]. INH resistance was classified as either low level or high level, when there was a \> 1% growth of *M. tuberculosis* in the presence of 0.1 μg/mL or 0.4 μg/mL of INH, respectively. INH mono-resistance was defined as resistance to INH alone or INH plus streptomycin, without evidence of resistance to other first line anti-TB drugs. Patients with resistance to INH and one other first line anti-TB drug were excluded from analysis. Outcome measures and definitions {#Sec6} -------------------------------- Treatment outcomes were defined as per the Canadian TB Standards 7th edition \[[@CR9]\].*Cure:* culture-negativity at the completion of treatment.*Treatment complete:* a complete course of active TB therapy without culture confirmation of cure or evidence of failure at the end of the treatment course.*Treatment non-completion (CTBS term: default):* treatment stopped for ≥2 months before completing ≥80% of doses.*Treatment failure:* positive sputum culture after ≥4 months of treatment or two positive sputum cultures in different months during the last 3 months of treatment, even if final culture was negative and no further treatment is planned.*Death*: mortality from any cause.*Recurrence*: disease recurrence after initial cure or treatment complete, without genotypic evidence of the same organism by 24-loci Mycobacterial Interspersed Repetitive Unit-Variable Number of Tandem Repeats (MIRU-VNTR) testing \[[@CR15]\].*Relapse*: disease recurrence after initial treatment cure or complete, with genotypic evidence of the same organism by MIRU-VNTR testing. For analytic purposes *recurrence* was considered the same as *relapse*.*Acquired drug resistance:* new or additional resistance to one or more of the TB drugs received in the setting of failure or relapse. For the purpose of this study, a *successful outcome* included patients meeting the definition of *Cure* or *Treatment Completed* while an *unsuccessful outcome* included patients meeting the definition of *Treatment Failure*, *Acquired Drug Resistance, Death* or *Relapse*. Relapse was assessed using the BCCDC TB registry. Data analysis {#Sec7} ------------- Statistical analysis was performed using SPSS (V.23) and R (V.3.2.2), with a level of significance in reference to a 2-tailed, type 1 error (*P* value) set as \<0.05. Univariate analysis was performed using the X^2^ test or Fisher exact test for dichotomous variables and Mann-Whitney for continuous variables. Results {#Sec8} ======= Baseline characteristics {#Sec9} ------------------------ In total, 184 cases of culture confirmed INH mono-resistant TB were identified from the BCCDC TB registry; 165 of the 184 cases (89.7%) were included in our analysis. Reasons for study exclusion included duration of treatment ≤30 days (*n* = 10) and patient transfer (*n* = 9). Of the 10 patients who were treated for ≤30 days, 5 patients died, 3 patients transferred, and 2 patients with extra-pulmonary disease had their medications discontinued due to medical complications. The baseline characteristics of the included patients are reported in Table [1](#Tab1){ref-type="table"}. Of the 165 included patients, 103 (62.4%) were males and median age was 46 years (IQR 32.5--61 years). The majority of patients (*n* = 155; 69.7%) were born in a country with a TB incidence \>30 per 100,000 population; 127 (77.0%) patients had no prior history of TB treatment. The most common comorbidity was diabetes mellitus (*n* = 19; 11.5%), followed by the use of an immune suppressive medication (*n* = 13; 7.9%). Six patients (3.6%) were identified as HIV positive. Of the 106 cases (64.2%) with pulmonary involvement, 73 (59.3%) were sputum acid-fast bacillus smear positive, and 50 (40.7%) had at least one cavitary lesion present on chest x-ray. Concentrations for INH resistance were reported for all 165 patients. Eighty one patients (49.1%) had low-level INH resistance alone while 84 (50.9%) had both low and high-level INH resistance.Table 1Demographic and clinical characteristicsCharacteristicTotal patients\ *n* = 165Sex (*n*, %) Male103 (62.4) Female62 (37.6)Age, years (IQR)46 (32.5--61)Region of origin (*n*, %)Canadian born44 (26.7)Foreign born TB incidence \>30 per 100,000115 (69.7) TB incidence of ≤30 per 100,0005 (3.0)Unknown country of birth1 (0.6)Year of diagnosis 2002--200637 (22.4) 2007--201056 (33.9) 2011--201472 (43.6)Co-morbidities (*n*, %) Diabetes mellitus19 (11.5) Immune suppressive medication13 (7.9) Malignancy7 (4.2) HIV positive6 (3.6) Chronic kidney disease2 (1.2)Prior history of TB treatment No prior TB treatment127 (77.0) Prior TB treatment24 (14.5) Prior TB treatment unknown14 (8.5)Disease site Pulmonary106 (64.2) Extra-pulmonary42 (25.5) Pulmonary and extra-pulmonary17 (10.3)Extent of pulmonary disease^a^ Baseline positive AFB smear73 (59.3) Cavitary lesions in chest radiography50 (40.7)Isoniazid resistance (*n*, %) INH, both high and low level resistance84 (50.9) INH, only low level resistance81 (49.1)^a^The denominator used to calculate the percentage for *Extent of pulmonary disease* was based on cases with pulmonary involvement (*n* = 123) Treatment regimens {#Sec10} ------------------ Within our cohort, over 30 different regimens were prescribed; we combined them based on treatment duration, length of PZA therapy, and the presence of fluoroquinolone therapy. Treatment regimens are described in Table [2](#Tab2){ref-type="table"}. A total of 89 patients (53.9%) were prescribed a regimen of RIF, EMB and PZA. Of those, 41 patients (24.8%) only received PZA during the intensive phase while 48 patients (29.0%) received PZA throughout the entire treatment course.Table 2Treatment regimen composition and characteristicsTreatment Regimen\ *Intensive phase/Continuation phase*Total patients\ (*n* = 165)^a^6 to \<9 Months (*n*, %) (H)RZE/(H)RE8 (4.8) (H)RZE/(H)RZE6 (3.6) (H) RZEQ/REQ6 (3.6) Other1 (0.2)≥ 9 to ≤12 Months (*n*, %) (H)RZE/(H)RE32 (19.4) (H)RZE/(H)RZE35 (21.2) (H)RZE(Q)/(H)REQ14 (8.5) (H)RZE(Q)/(H)RZEQ10 (6.1) (H)RE/(H)RE4 (2.4) Other17 (10.3)\> 12 Months (*n*, %) (H)RZE/(H)RE1 (0.2) (H)RZE/(H)RZE6 (3.6) (H)RZE(Q)/(H)REQ4 (2.4) Other15 (9.1)*I* isoniazid, *P* pyrazinimide, *R* rifampin, *E* ethambutol, *Q* fluoroquinolone, *S* streptomycin^a^6 (3.6%) patients were on treatment for \<6 months due to treatment non-completion or death Median length of treatment was 10.5 months (IQR 9--12 months). Treatment was extended beyond 12 months for 26 patients (15.8%). 12 (7.3%) patients received extended treatment due to an adverse events (AEs) resulting in treatment modification, 6 (3.6%) patients received extended treatment due to treatment noncompliance, while another 6 (3.6%) had extended treatment due to physician preference, and 2 (1.2%) because of extensive disease. Patients with extended treatment where more likely to have their regimen supplemented with a FQN when compared to patients who completed ≤12 months of treatment (65.4% vs. 31.7%, *p* = 0.002). In total, 56 patients (33.6%) experienced an AE that resulted in a drug regimen modification. Of those, 14 (8.9%) patients experienced a second AE for a total of 70 events. Of the 70 AEs, 65 could be attributed to a single drug, and 5 could not. Frequency of AEs can be seen in Table [3](#Tab3){ref-type="table"}. PZA was discontinued for 21(12.7%) patients due to 11 cases of drug-induced hepatitis, 7 due to rash and 3 due to nausea and vomiting. Ten patients (6.0%) were intolerant to RIF. Occurrence of AEs was not significantly associated with any demographic or clinical characteristics in univariate analysis (data not shown).Table 3Frequency of adverse drug reactionsTotal patients\ *n* = 165Number of patient who required drug regimen modification due to adverse reaction (*n*, %)56 (33.3)Number of patients who stopped treatment due to adverse events (*n*, %)2 (1.21)Total number of adverse events70**Adverse eventNumber of events** Drug induced hepatitis20 Rash12 Nausea and vomiting11 Tendonopathy8 Blurred vision6 Optic Neuropathy2 Arthralgia2 Other9 Treatment outcomes {#Sec11} ------------------ Treatment outcomes are summarized in Table [4](#Tab4){ref-type="table"}. At the end of treatment, 144 patients (87.3%) experienced treatment completion or cure and therefore, met the definition of treatment success. Two patients (1.1%) experienced treatment failure and no patients acquired drug resistance in the setting of treatment failure. All cause mortality during treatment was reported for 6 (3.6%) patients; 2 patients died from lung cancer, 2 from respiratory failure, 1 from kidney failure, and 1 from cardiac arrest. No deaths resulted from side effects of anti-TB drugs.13 patients (7.8%) were classified as treatment non-completion, including 2 patients who stopped treatment early due to adverse drug reactions; treatment non-completion was not significantly associated demographic or clinical characteristics in univariate analysis.Table 4Clinical treatment outcomesTreatment outcomesTotal patients\ (*n* = 165)End of treatment outcomes (*n*, %) Treatment success at end of treatment144 (87.3) Treatment non-completion13 (7.8) Death6 (3.6) Failure2 (1.2)Treatment outcomes in follow-up (*n*,%) Relapse4 (2.4) Acquired drug resistance0 (0)Primary study outcomes Successful outcome^a^140 (84.8%) Microbiologically confirmed unsuccessful outcome^b^12 (7.2%)^a^A successful outcome included patients meeting the definition of *Cure* or *Treatment Completed* without *Relapse*^b^An unsuccessful outcome included patients meeting the definition of *Treatment Failure*, *Acquire Drug Resistance, Death,* or *Relapse* The median follow-up duration post treatment was 8 months (IQR 2--18.5 months). Of the 144 patients with treatment success at the end of treatment, 4 patients (2.4%) experienced relapse. MIRU-VNTR confirmed identical patterns in 2 of 4 relapse strains, while 2 strains were not typed by MIRU-VNTR. In the 4 patients with relapse, 2 patients were treated with 9HRZE, 1 patient was treated with 12HRZE, and 1 was treated with 2HRE/4HR. No demographic or clinical characteristics were associated with patient relapse in univariate analysis (data not shown). No patients acquired drug resistance in the setting of relapse. Overall, 140 patients (84.8%) met the study definition of a successful outcome while 12 patients (7.2%) met the definition of an unsuccessful outcome. Treatment success rates were similar in patients with high vs. low-level INH resistance profiles (90.7% vs. 93.4%; *p* = 0.547). No statistically significant difference was observed between patients with successful outcomes versus microbiologically confirmed unsuccessful outcomes despite multiple comparisons between treatment regimens and patient characteristics (Table [5](#Tab5){ref-type="table"}). Multivariate analysis was not performed due to the small number of patients with the combined endpoint of a microbiologically confirmed unsuccessful outcome.Table 5Comparison of characteristics with favourable versus unfavourable outcomesCharacteristic (*n*, %)Successful outcome^a^\ (*n* = 140)Unsuccessful outcome^b^\ (*n* = 12)*P* valuePatient characteristics Co-morbidity (HIV, DM, Malignancy, CKD, immune suppressive medication)36 (25.7)3 (25.0)1.00 Smear positive disease^c^64 (60.4)5 (50.0)0.523 Cavitary disease^c^41 (38.7)5 (50.0)0.515 Prior TB treatment^d^19 (14.4)2 (22.2)0.623Resistance profile High level INH resistance69 (49.3)7 (58.3)0.547Treatment regimen  \> 2 months pyrazinamide66 (47.1)7 (58.3)0.456  \> 9 months rifampin69 (49.3)3 (25.0)0.106  ≥ 4 effective drugs in intensive phase25 (17.9)3 (25.0)0.464 Fluoroquinolone containing regimen52 (37.1)4 (33.3)0.793^a^A successful outcome included patients meeting the definition of *Cure* or *Treatment Completed* without *Relapse*^b^An unsuccessful outcome included patients meeting the definition of *Treatment Failure*, *Acquire Drug Resistance, Death,* or *Relapse*^c^The denominator used to calculate percentage for smear positive disease was based on those with pulmonary involvement and primary study outcome (successful outcome *n* = 106; unsuccessful outcome *n* = 10)^d^Missing data for 8 successful outcomes and 1 unsuccessful outcome Discussion {#Sec12} ========== In this study, we found that 84.4% of patients experienced a successful treatment outcome under programmatic conditions in BC. Our treatment outcomes are consistent with those from other INH resistant treatment cohorts in high resource, low incidence settings \[[@CR10]--[@CR12], [@CR16]\]. In resource-limited settings, where detailed individual level drug susceptibility results are not always accessible, the proportions of patients experiencing unsuccessful outcomes are often much higher. For example, in an INH resistance treatment cohort in rural South Africa, 15% of patients experienced treatment failure, of which 61% progressed to MDR-TB \[[@CR17]\].While the differences in treatment outcomes may be reflective of differences in patient and health care resources rather than regimen efficacy, it is worth noting that in studies where resistance was detected early and drug regimens were modified, a higher proportion of patient's experienced successful outcomes \[[@CR11], [@CR12]\]. This suggests that outcomes of treatment in INH resistant disease may be related to early detection of resistance and individualized therapy. Within our cohort, over 30 different treatment regimens were prescribed; regimens were adjusted based on DST patterns, adverse events, severity of disease, and physician preference. Regimens were also often extended. However, similar to other studies \[[@CR12]\], 12.7% of patients in our study were unable to tolerate PZA and the high incidence of drug toxicity suggests that new treatment regimens are needed to improve INH-resistant TB treatment outcomes. In our cohort, 3 cases of relapse that occurred in patients who completed on a 9--12 month regiment of only RIF, PZA and EMB. Meanwhile, no cases of relapse developed in the 61 (37.0%) patients receiving an FQN-containing regimen. This finding, while not statistically significant, is in line with growing evidence suggesting that supplementation with FQNs may strength treatment regimens among patients with INH-resistant disease \[[@CR16], [@CR18], [@CR19]\]. In a recent retrospective analysis of treatment outcomes with FQN containing regimens \[[@CR18]\], the authors concluded that INH resistant pulmonary TB is associated with improved outcomes when FQNs are added to standard treatment regimens (97.3% vs. 84.6%, *P* = 0.007). In 2011, *Jenkins* et al. reviewed the global burden and trends of INH resistant TB using surveillance data reported to the WHO \[[@CR4]\]. The authors concluded that in several geographically disparate settings, the number of new TB cases with INH resistance is increasing \[[@CR4]\]. This is consistent with routine surveillance data from BC and Canada, which show an increase in the prevalence of INH resistance \[[@CR13]\]. As the burden of INH resistant disease increases, the need for a standard, cost-effective, evidence-based treatment regimen becomes more pressing. Prolonged, individualized courses for INH resistant TB are not practical, and would be difficult to implement in resource limited settings where the highest INH resistance burden exists \[[@CR1], [@CR4]\]. The WHO currently recommends two different treatment regimens for INH resistance; one for countries with an assumed 'high' level of INH resistance and another based on a setting of known first line drug susceptibility results \[[@CR7], [@CR20]\]. Unfortunately, the controversies regarding both of these treatment regimens outweigh the evidence \[[@CR5], [@CR6]\] and highlight the need for controlled trials to validate specific standardized recommendations. Our study had several limitations. The most important was our inability to control for potential confounding variables and effect modification. Instead, we had to rely exclusively on univariate analysis for our analysis of outcomes due to the small sample size of unsuccessful outcomes. Whereas prior studies have identified characteristics of different treatment regimens associated with improved treatment outcomes, such as extending PZA duration \[[@CR21]\], addition of fluoroquinolones \[[@CR18]\], or use of four effective drugs in the intensive phase \[[@CR5]\], these findings were not statistically evident in our cohort, possibly the result of the relatively small combined endpoint. We were also limited by the variation in the composition and duration of treatment regimens. There was great variation in the composition and duration of treatment regimens making it impossible to identify superior or inferior regimens given the type of study and the sample size. Additionally, within each regimen group, there may have been clinically important differences that we could not account for. Highly heterogeneous treatment regimens are a widely recognized to be present in clinical practice, particularly when evidence behind treatment regimens is scarce \[[@CR10]--[@CR12], [@CR16]\]. The wide variety of treatment regimens presented here reflects the uncertainty of clinicians in appropriate treatment of INH resistant disease. Despite these limitations, our study raises important concerns about the currently recommended treatment regimens for INH resistant TB. It highlights the need for high quality studies to firmly establish standardized treatment regimens, with special consideration given to trials that utilize fluoroquinolones. Currently, there is little evidence and much controversy regarding the recommended treatment regimens, and given the global burden of INH resistance, solid evidence validating the various recommendations for treatment is urgently needed. AE : Adverse event DST : Drug susceptibility testing EMB : Ethambutol FQN : Fluoroquinolone INH : Isoniazid MDR-TB : Multi-drug resistant TB PZA : Pyrazinamide RIF : Rifampin TB : Tuberculosis Funding {#FPar1} ======= JCJ is supported by the Michael Smith Foundation for Health Research. Availability of data and materials {#FPar2} ================================== The data that supported the findings of this study are available on request from the corresponding author upon reasonable request. Identifying/confidential patient data however will not be shared. All authors provided important intellectual content and approved the final version of the manuscript. Ethics approval and consent to participate {#FPar3} ========================================== The University of British Columbia Clinical Research Ethics Board approved this study. Consent for publication {#FPar4} ======================= Not applicable. Competing interests {#FPar5} =================== The authors declare that they have no competing interests. Publisher's Note {#FPar6} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
2024-01-22T01:27:17.568517
https://example.com/article/7442
What's in a Name? Face Shape, Maybe May 17, 2007 -- Does your name match your face? If it does, you might be more memorable to people. That's according to researchers including Melissa Lea, PhD, a visiting instructor of psychology at Union College in Schenectady, N.Y. Lea worked on the study while doing graduate work at Miami University in Ohio. Lea and colleagues conducted three experiments at Miami University in Ohio. First, they asked 150 students in an introductory psychology class to use a computer software program to sketch the facial features of imaginary men with one of the following 15 names: Bob, Bill, Mark, Joe, Tim, John, Josh, Rick, Brian, Tom, Matt, Dan, Jason, Andy, and Justin. Using the computer program, the students tweaked a standard set of male facial features to come up with a face that they thought suited their assigned name. The drawings didn't include eyeglasses or facial hair. Another group of students approved the drawings, which suggests that people may associate certain facial features with certain names. Matching Faces and Names In the second experiment, the researchers asked 139 other students to match the drawings and names from the first experiment. The faces and names were printed separately and shuffled. Ten out of 15 times, the students matched the faces and names correctly. Finally, in the third experiment, the researchers showed the names and faces to 67 students on a computer screen. In a series of quizzes, the students learned to link the names and faces. The students learned the faces and names more quickly when they suited each other. For instance, they learned "Bob" faster when he had a round face, not a thin face. That finding suggests that people may be better at remembering names when they seem to suit the person's face. Perception of a Face What's with the facial stereotypes? The researchers aren't sure, but they suggest that perhaps people subconsciously expect face shapes to match the sound of a name. "One possibility is that the sound of the names bleed over into our perception of the face," researcher Robin Thomas, PhD, tells WebMD in an email.
2023-09-19T01:27:17.568517
https://example.com/article/9720
When asked whether the government has a responsibility to protect the poor, if caring for the elderly is a government duty, and if civil rights are threatened by the war on terror, the surveyed Americans and Canadians largely agreed.
2024-04-24T01:27:17.568517
https://example.com/article/1554
Now Commenting On: Mattingly: Replay is key for ump accountability 6/10/14: The Dodgers challenge an out call at first base in the 6th inning and after a review, the call is overturned and the runner is safe By Manny Randhawa / MLB.com | CINCINNATI -- Manager Don Mattingly said Thursday that he thinks keeping track of how many calls an umpire has had overturned upon replay review during the season is important for accountability. In the sixth inning of the Dodgers' 6-1 win on Tuesday, Andre Ethier was initially called out on a ground ball to second that was knocked down by Brandon Phillips, before the second baseman picked up the ball and threw to first. Mattingly successfully challenged the call, which was overturned after review. "I think we're all kind of accountable," Mattingly said. "I think when people judge, they're gonna see who missed the most calls or whatever. I think you do want the best guys. … It's important that we -- obviously, you want to get the best guys and you want to help them improve, so we're going to look at players and see how they're doing, and we're going to look at managers and coaches and how they're doing." Manny Randhawa is an associate reporter for MLB.com. This story was not subject to the approval of Major League Baseball or its clubs.
2024-03-06T01:27:17.568517
https://example.com/article/3873
Kerry Urges Israelis to 'Restrain from Any Kind of Self-Help' Secretary of State John Kerry told reporters today that Israel has a right to defend itself, but discouraged against "self-help" responses to random stabbing attacks from Palestinians. Israeli authorities have encouraged citizens with gun permits to carry when they're out and about, as they can possibly stop an attacker before police can get on the scene. Israel Army Radio reported today that the internal security ministry phone service "collapsed" from citizens inundating the ministry with gun permit requests. They've doubled the number of workers at the ministry to field the requests. Appearing at a press conference in Madrid with his Spanish counterpart, Kerry again used the recent spate of violence in Jerusalem to call for a two-state solution. "Security and diplomacy go hand in hand. There is not a time for one and then the other, really there is an importance to both. We want to see calm restored and we want to see the violence stop. And I think everybody in Israel and in the region would like to see both of those things happen," Kerry said. "We continue to urge everybody to exercise restraint and restrain from any kind of self-help in terms of the violence, and Israel has every right in the world to protect its citizens, as it has been, from random acts of violence. But in my conversations with the prime minister, as well as with King Abdullah and the foreign minister of Jordan, they have expressed the desire to try to see this process be able to find a way of making certain that everybody is clear about what is happening with respect to the Temple Mount." Kerry added that "Israel has made it clear to me that they do not intend to and have not changed the status quo, and I think it’s important for me to meet with the prime minister and talk about the road ahead." "We have a longstanding, extremely close, very important relationship with respect to Israel’s security, and security will be front and center in our discussion. And obviously, the United States remains deeply concerned about and engaged in efforts to help Israel with respect to its security. But we also share a global interest in seeing the region find a way forward to avoid this kind of confrontation and senseless loss of life. So it is important to have that kind of discussion at the same time," he said. "I don’t have specific expectations except to try to move things forward. And it would depend on the conversations themselves as to what it is that we’re able to define in the context of steps that might or might not be taken to help people understand that in fact leaders are leading and making a serious effort to try to resolve the current level of conflict." Last week CNN's Chris Cuomo tried to challenge Netanyahu's spokesman on guns, charging that "the idea of the police saying to civilians, 'arm yourselves, that's how big the threat is, that's how imminent violence is,' seems to be, you know, a very severe sentiment." Spokesman Mark Regev noted that Israel has tough gun ownership rules, "and so if you pass those tests and you legally have a firearm, the police are suggesting that you carry that firearm, because of the security situation." "That's not for every member of the public. That's for people who have those licenses," Regev said. "And I'd remind you, Chris, we, of course, have compulsory military service in Israel. A lot of those people with licenses, if not all of them, have had military training and know how to use that weapon effectively."
2024-05-20T01:27:17.568517
https://example.com/article/5938
"Moving 964 southeast, over." "Hummingbird drone." "Roger." "They're not sure what that impacted." "Make sure it wasn't one of your friendlies, Roger." "Red Hotel six, this is Longhorn." "I see possible contact." "That was right where they were making contact from," "Red Hotel Tower." "There's an RPG coming from the east." "4-2-0, this is 4-2 Charlie." " Message over." " 420:" "Send, over." "4-2 Charlie, are you aware at grid 4-1?" "...only thing that was bad about it I know There's been an ambush..." "Do you copy, over?" "Sergeant Smith, do you copy?" "4-2 Charlie contact involving small arms fire on vehicle." "There are three guys running out there at the back." "Yep, he's got a weapon on the right." "Roger that." "Hummingbird can see it." "He's got a weapon." "He's still shooting up in the air right now." "We see him." "Sergeant Smith, I have good arcs on your position." "I believe he's British." "He's shooting." "Echo 3-5-2, over." "Installation Provost Marshal report A-R-6-3-0-1-0." "Sergeant Joseph Smith." "Absconded from Stanbrook Military Hospital Secure Wing." "Diagnosed with combat stress." "Filed as Department of Defense, long-term missing person." "Sorry, mate." "Taxman!" "All we want is your cash and your rocks." "Joey, don't fight back." "Run, Isabel!" "Hi, this is Damon." "I won't be available at this number until October the first." "If you need me, you can call my agent Paul or reach me on my New York number." "212-555-9898." "That's 212-555-9898." "You have no new messages." "Anybody lost or needs direction?" "Anybody lost or needs direction?" "Anybody lost or needs" "Oh!" "Get off, get off!" "Don't do it!" "Happy birthday, Cristina." "Actually, it was two days ago, but thank you." "Happy birthday, Cristina." "Actually, it was two days ago, but thank you." "No alcohol." "I'm looking for someone." "Joseph, where did you get those clothes?" "Her name's Isabel." "They saw her." "I've come to save her." "Joseph, did you rob someone?" "I had some luck." "Maybe God, you know?" "God gave me this." "Joseph, I'm going to call David, my police liaison officer." "This is for you, sister." "You're okay." "Buy something nice for yourself." "20, 40, 60, 80, 100." "20, 40, 60, 80, 200." "20, 40, 60, 80, 300." "20, 40, 60, 80, 400." "450, 500." "Sister Cristina." "So, do you know how much is there?" "£500." "A donation is a donation." "I don't see the quandary." "He's quite famous among them." "They say he was a commando." "He killed people in Afghanistan." "That's what soldiers do." "It doesn't mean he's a thief." "Did he say where he got the money from?" "He said, "Maybe God."" "Anyway, what do you think the police themselves would do with it if you handed it in?" "They'd just share it out and drink it in the pub." "or at Christmas, get them all jumpers or something." "Actually, he told me to buy something for myself." "I thought perhaps maybe I could use just a small proportion of it." "You see, there is something I have been praying for." "You're a good and holy woman, Sister Cristina." "If the money's an answer to a prayer, how can it be wrong?" "Let me put it this way." "I've not written anything down about this in the book." "One for Maria Zielinska." "One what?" "One for the Maria Zielinska farewell performance." "I'm afraid it's all sold out." "Sold out?" "But it isn't until October." "It sold out online in two hours." "Online." "We do still have one box available." "A box?" "On Tuesday, October first." "And how much is a box?" "A box for the farewell performance is £500." "Contact!" "Contact!" "Contact!" "...Possible contact." "Hummingbird drone, over." "Yeah, he's got a weapon on the right." "Hummingbird can see it." "He's got a weapon." "He's still shooting up in the air right now." "We see him." "Can we just cut the guy off?" "Do you copy?" "Sister." "I'm afraid you're too late for soup." "I'm not hungry." "I need medicine." "You're hurt?" "I need antibiotics." "I'm not allowed to dispense antibiotics." "But you do it for people who can't get into the system." " Go to emergency." " I can't." "Why not?" "If you don't want to give your name, just call yourself Smith or something." "That would be a mistake." " Why?" " My name is Smith." "Jones, then." "Sister..." "I'm on the run from a court-martial." "I was in a Special Forces unit." "There'll be no forgiveness." "How do you know it's antibiotics you need?" "I've got two broken ribs." "There's an infection around one of the breaks." "If it spreads to the bone, I'll die." "I've been wounded before." "If you drink alcohol with these, they won't work." "I'll need painkillers." "Give me something with dihydrocodeine." "Yes, sir." "I've asked around about your friend Isabel." "How'd you know about Isabel?" "Last night, don't you remember?" "Did I come here last night?" "Do something stupid?" "You said you'd had some luck." ""God," you said." "You don't believe?" "So how do you explain those new clothes?" "I don't." "So what'd you find out about Isabel?" "She doesn't come for food anymore." "If you see her, give her this." "Tell her she can come to me." "Tell her she can be safe." " Who lives here?" " Me." " Did you break in?" " I fell." "Did you hurt someone?" "Only myself." "Do you know the boys say you're an angel?" "Good night, Joseph." "The solid sterling silver." "You've got lots of pieces of solid sterling silver and, of course- there we go- you can see all of that from your hat pins to your... uh- to your- shepherd's hook," "your- your clasp, your crimp beads, and six meters of elastic, one large and one small gift pack." "...showers good." "40s, Cromarty, Forth, Tyne, Dogger." "Easterly or northeasterly four or five, occasionally Bible tells us, you know, in Gethsemane, talking to God and wanting to not go through with this thing and hesitating, you know." "And as all these incredible things," "Judas going to the priests..." "Joey, it's Isabel." "There's no need to look for me." "I'm okay." "And I'll just cause trouble." "I've agreed to work for them for a few weeks until I've got enough for a deposit on a nice place." "Then I'll go back up north." "and for thinkin' of me." "When I get away from London," "I'll call you if you're still there." "I've gotta go." "You have two messages." "I've agreed to work for them for a few weeks until I've got enough for a deposit on a nice place." "Then I'll go back up north." "Thanks for looking after me, Joey, and for thinking of me." "When I get away from London," "I'll call you if you're still there." "I've gotta go." "You have no more messages." "'cause I saw you go in." "I'm gonna call the police." "Who are you?" "Damon said he was gonna be in New York all summer." "I'm Damon's boyfriend." "One of 'em." "He said I could use his flat while he was away." "Are you a model?" "Sometimes." "He didn't say anyone was gonna be staying." "Do you have his number in New York?" "No, he keeps himself very private." "Pity, you could've called him." "Do you have a number?" "He doesn't give it to me." "In case I call him late at night." " I'm Tracy." " Joey." "Joey Jones." "Damon said I should stay here for the summer, get my life back together." "So that's what I'm gonna do." "Whew." "Fuck." "Joey, there's trouble." "Fucking dickhead's trying to throw us out." "Is he fucking following?" "Dick, mate." " Here we go." " It's Soho, I wanna see some tits." "It's late, boys." "You're gonna miss your train." "Who are you, our fuckin' mum?" "He thinks he is." "Fuck me if he ain't." " Tits, mate." " Fucking there's your tit." " That's right, mate." " Here's your fucking tit, man." "Hey, don't fucking touch my boy!" "Fucking leave it, mate." "He's a fucking soft, southern fucking cunt." " Easy, pal." " Fucking get off him." " You'll miss your train." " I'll fucking have him!" "Fucking get him!" "Now you've missed your train." "Huh?" " You wanna work?" " Yeah." "You know what kind of work I do." "They say you want a driver." "I got a lot of businesses." "They say you're a hard man." "It's a hard city." "Hold on!" "Can we play the animal game?" "Go on, then." " Um... has it got four legs?" " Yes." "All right, has it got fur?" "Yes." "Um, give me another clue." " It's gray." " Gray?" "Yeah." " Is it a dog?" " No." "Um, could it eat me?" "Probably." "Right, so, how many legs has it got?" " Two." " You said four." "Are you tricking me?" "I hear he wants to see me." "What the fuck?" "New rules." "No room service cards anywhere between" "Lisle Street and The Crown." "What the fuck are you talking about?" "You're not even a fucking Chink to be giving out rules." "Show him." "New rules." "No." "Can I help you?" "I've got a delivery for the Angel of the Lord's Mission." "45 Margheritas, 45 garlic breads, 45 Coke Zeroes," "45 chicken dippers, and 45 coleslaws." "There must be a mistake." "It's paid for by Joey Jones." "Okay, it's not a mistake." "Who wants pizza?" "Tell your boss in fifteen minutes to have Mr. Choy's envelope ready." "Also, I wanna order takeaway for delivery." "It's very nice, but I've no idea what it is." "I think it's probably duck." "And there's fish and chicken and pancakes." " And this is from Crazy Joe the angel, yeah?" " Next?" "Just drive, man." "Just fucking drive." "That's his little sister." "She won't talk." "Dawn?" "It's me." "Joe." "Nice suit." "Me and your daughter live on £25 a week." "Since I lost my job, I've been paying the landlord with blowjobs." "What have you been doing while they cut everything, Joey?" "I've been fighting." "There's more where this came from." "Lots more." "You got my invitation." "Wasn't sure you'd come." "Buying food for the boys, it's okay, but not this." "Giving me things puts me in a very difficult position." "You're not vegetarian, are ya?" "Why are you lighting fires on the pavement?" "My Chinese boss sends his people here to buy meat for his restaurants." "I get three hours hanging out on the street doing nothing." "So tonight I decided to have a barbecue." " You used to feed me." "Tonight, I feed you." "This is a very strange thing to be doing." "I miss the smell of woodsmoke." "I'm guessing that you have psychological problems." "They put me up a mountain and told me to kill people." "What'd they think would come back down the mountain?" "Joseph, I came here because I might have some news... about Isabel." "They found a girl." "Last night, my police liaison officer gave me this photograph." "She was found in the river." "They need help with identification." "She was from the north, that's all I know." "Did you love her?" "We shared a box." "We'd just keep each other warm." "Will you talk to the police?" "Fuck the police." "Joseph, I'm really sorry to bring such awful news." "Where in the river?" "The city, near to Canary Wharf." "One of those rich guys." "Yes, they think she was killed by a client." " The police give a shit?" " Of course they do." "David is a good man." "Really?" "He's a "good man."" "Good, good." "Good for him." " Good." "In the fucking river!" "If you dare to be angry about Isabel... you're a hypocrite." "I've asked around about your job for the Chinese boss." "They say, "Crazy Joey deals drugs."" "I just deliver the stuff." "I don't touch the stuff." "The autopsy said Isabel "touched the stuff."" "Maybe stuff you delivered." "You don't put those things together in your head." "You know why she ended up in the river?" "Because that's what the river's for." "To wash away girls when they're finished with them." "I see what's happening in this fucking city." "How many people you feed these days, huh?" "You give them soup." "They want their lives back!" "Joey, when you were out of your head on drugs a few months ago, you gave me some money." "I've spent it on something for myself." "I haven't been able to sleep properly since." "I" " I called my sister in Warsaw." "She sold some of the possessions I left behind." "I don't need this." "I'm really sorry about Isabel." "I know you cared for her, but think about all the other Isabels." "Start to do the right thing." "It is honest money." "I cleaned it for you." "Use it to start an honest life." "I want you to have this." "I'm gonna do a lot of good things this summer." "Give people what they want." "I thought you might want a dress." "Joey, I'm a nun." "I used to wear a uniform." "Don't mean a thing, you just take it off." "If it looks beautiful on you, then God would say it's okay, wouldn't He?" "I will put it in the bag of clothes for Africa." "My guest this week is Baroness Glennis Baker, a emeritus professor of psychology." "She has specialized in the health and welfare of people with learning disabilities, advising on policies and influencing..." "Fuck." "Yeah!" "Your cash and your rocks, boys." "Don't remember me, do you?" "Not surprised." "I've changed." "You've got a knife..." "I've got a spoon." "Who killed Isabel?" "Go on, Joey." "Show 'em." "Show 'em!" "Who killed Isabel?" "I don't know." "You're only alive because I need information." "An eye for an eye." "You tell me what happened to her, or I'll kill you with this spoon." "Some guy used to rent her regular." "Beat her up." "He used to ask for her." "He went too far." "Name." "We don't use names." "Describe him to me." " Ah!" " Describe him to me." "He was about 30, city boy, scar over his eye." "That's all I know." "You get any trouble from these two again, you tell Crazy Joe, okay?" "Jesus." "Fuck." "You look" "Your note said you had information for the police about Isabel's killer." "That is the only reason I am here." "And I put on this dress because it is the only dress I have." "And don't think I won't send it to Africa, because I will." "They think my name's Damon, by the way." "Please don't remind me." " I think I might faint." " What?" "I haven't eaten anything all day... worrying whether or not I would come." "Also, I didn't realize there would be so many naked men." "Look, I arranged to meet you here because I thought you might like the photographs." "I didn't realize there'd be photographs of men's... penises." "Sorry." "Joey, actually, I do like photographs." "I take photographs- usually of nature." "Penises are nature, I suppose." "Yes, I suppose they are." "So what'd you tell the mother?" "I lied, I lied, I lied." "So what information do you have?" "Tell your policeman to look for a guy around 30." "He has a scar above his eye." "Works in the city." "Should I write this down?" "That's all I have." "Okay... 30 years old, scar above his eye, works in the city." "Got it." "We haven't been introduced." "I'm Karl." "What's your name?" "Just looking around." "I'm told the invitation you handed in at the desk was addressed to Damon Coldfield." "I happen to be Damon's photographic agent." "He's in New York." "Who the hell are you?" "I think you're a bit drunk." "Yes." "I'm having a crazy patch." "Starting when I bought the ticket." "What ticket?" "I used your money to buy a ticket to a ballet." "That's a pretty wicked thing to do." "But, you see..." "I've loved her since I was a little girl." "Loved who?" "Maria Zielinska." "She's 42 and still dancing." "She is who I always wanted to be." "She is who I should have been." "I'm in a silk dress in an alleyway... with a gangster." " Whoa!" " Oop!" "And I'm drunk." "Are you still a gangster, Joey, or did I change you?" "Just having a crazy patch, too." "There are things that I have to do." "When the summer's over, I'll stop." "Because of me, yes?" "I have to think I'm doing good." "Your excuse for wearing a pretty dress." "When does Damon return?" "October the first." "Then it's fate." "What is?" "When I say it's fate..." "I should really say it's God, but I don't." "You know why?" "Because I'm not so sure that God is there anymore." "That's the truth." "I think I'm going to throw up." "Oh." "No, I'm fine." "Sister, I'm Catholic." "I'm not your sister." "I'm drunk and I'm up against the wall." "30... a scar above the eye... works in the city." "A massive 50% off." "Rain jackets half price." "Fleece half price, T- shirts half price." "Walking shoes half price." " A massive 50% off." "Joey..." "H- how are things?" "Things are okay." "Have you heard from Damon?" "Yeah, he's okay." "You seem so together now." "I'm really together now." "You're like a different person." "So, Joey... are you exclusively gay?" "You know, it's interesting... recently..." "I've found myself attracted to... nuns." "Who the fuck are you?" "You owe Mr. Choy money." "What the fuck do you know about Mr. Choy?" "He's my boss." "What are you talking about?" "Mr. Choy only employ Chinese." "Tell Mr. Choy I'll send him a check." "I'm taking the cash." "Give me the fucking cash." "Step out of the way, my friend, and let me take some of what you owe in cash as a gesture of goodwill." "No!" "Please don't hurt him!" "That money belongs to my family." "Vincenzo, no!" "...of Mamarita Restaurant." "18 Clancey Street." "That's 1-8 Clancey Street." "...known by the name of Joey Jones." "No known address." "Approach with caution." "Reported connection to the Angel of the Lord" "Homeless Mission, Covent Garden." "Is there a problem?" "You are scaring my clients." "We're looking for someone." "Calls himself Joey Jones." "We've been told he used to come down here." "They said you'd know where to find him." "Let me help ya." "What are you doing here?" "I just lied to the police." "You haven't changed at all." "If I could do something else, I would do it." "What did the policeman say when you gave him the description?" "He laughed at me." "He said it was "too vague."" "He said, "Tell Joey Jones to come and speak to us himself."" "You mean they can't be bothered to fucking look 'cause she was a whore." "The truth is... the police are more interested in finding out more about you." "You're becoming famous, Joey." "And Isabel isn't famous?" "You really are a hypocrite." "You beat Taxman so bad he's still in hospital." "You're not just an angel, you're God Almighty dispensing justice." "Yeah, well, I believe in justice." "Sometimes you have to make it happen yourself." "I'm not the only hypocrite here." "Want a kiss?" " Sorry." " Get out of my car." "It's a van." "I suppose you think it was very funny that I got drunk." "I've been drunk myself on occasion." "What exactly happened?" "You don't remember?" "It's all a blur." "You asked me to kiss you, so I kissed you." "You didn't have to kiss me just because I asked." "I wanted to." "Why did you want to?" "That's a really stupid question." "Look in the mirror." "It's not my fault that I'm fucked up." "For a nun, your language is pretty bad." "So whose fault is it?" "He was my gymnastics instructor." "It was in Warsaw." "It was my father who made me do gymnastics." "I wanted to be a ballerina, but he said no." "If I had become a ballerina, it wouldn't have happened." "My instructor began to..." "He began to do it when I was 10 years old." "He did it 17 times." "It was going to be the 18th time." "For a very long time, I believed I belonged in hell." "Because I was so young... they decided not to send me to prison." "Instead, they sent me to a convent." "Joey, I..." "I have never told this to anyone before." "Want me to drive?" "I want someone to drive." "Here will be fine." "How will you get home?" "I'm a gangster." "I'll steal a car." "I'll walk." "It's a lovely morning." "Cristina, in the end," "I just took off my uniform and ran." "And look what happened to you." "Sister Cristina, I am deeply shocked." "You filled in the Africa application." "My preference is for the Valley Mission in Sierra Leone." "But what about your work here at the Soho Mission?" "Africa was always part of my life plan." "Yes, in two years." "I want permission to move it forward." "But why?" "I am finding there are too many distractions here in London." "You're blushing." "It's very warm in here." "It's even warmer in Sierra Leone." "Hot, even." "I will wear a hat." "You have applied to leave in this quarter." "I am ready to leave any time after October the first." "Joey, they said you wanted to speak to the boss." "Come with me." "Sit." "Madame, you know everything that happens in your back garden." "If a man pays for girls and he's violent, he soon becomes famous." "We refuse to deal with them." "The Russians will just charge double." "I understand you have a blacklist of violent men." "I'm looking for a very violent man who attacks girls." "He's young." "Around 30." "And he has a scar above his eye." "He wears very expensive suits." "We know him." "The description is not too vague for you?" "We have a business to protect." "Madame, would you be able to find out the name of this man?" "Hmm." "A favor for a favor." " Did they tell you?" " Tell me what?" "They didn't tell you." "No, no, stop!" " Ah!" " They didn't tell you." "Stop." "58." "Some of them are kids." "And some of them are girls." "You want one?" "I also asked for information." "It's coming, okay?" "It's the latest." "Do you know how to work it?" "Yes, of course." "You could afford to get a professional to do this." "Yeah, but I wanted you." "So who are the photographs for?" "My daughter." "You have a daughter?" "Nine years old." "I came here with her once when she was small." "She might remember." "I want her to have some photographs of me looking like a normal man." "What do you think?" "Like this?" "Smile." "Why?" "Okay, actually, you look okay." "Do I look like a good man?" "What do you mean?" "I want her to think I'm a good man." "Yes, you look like a good man." "So take a picture." "Did your daughter ask for photos?" "No, but when she's older," "I want her to have something to remind her of me." "You won't see her?" "I don't think I'll look like this for much longer." "Why not?" "Why shouldn't you stay like this?" "Just take a picture." "You should have one like this." "More natural." "The businessman drinking his morning coffee." "Such a successful man." "So rich." " Charitable." " Of course." "She will be very proud of you." "Enough." "I said enough." "At last a laugh." "There." "I am changing you." "Send those ones to me." "I'll take them with me to Africa." "You're going to Africa?" "A valley in Sierra Leone where there is no water." "When do you leave?" "Tomorrow." "So this is the end of my crazy patch, Joey." "And I've decided I want to end it with you." "Sport coats, shorts... half price." "T- shirts half price." "I've got rain jackets half price." "Fleece half price." "Walking boots half price." "Trousers, half price." "Keep the change." "...half price." "A massive 50 half price." "Rain jackets half price." "Hello?" "Who's there?" " Hello?" "Cristina!" "Who the bloody hell are you?" "I don't know who you are, but open this door." "Did you hear me?" "I said open the door." "Cristina." "There's enough money in here to get us away." "We could go anywhere in the world." "No, Joey... if you want to be a good man, be a good man." "Joey, will you come with me to the ballet tonight?" "I have a box." "There is room for two." "Tonight at 7:00." "My time here at this mission has been a fulfilling time." "Surprises all along the way." "Our mission has had some failures." "Some tragedies... the poor girl Isabel." "But we have also had successes." "And we have also had some who, in spite of how it may appear, give us reason to hope." "Who are you?" "I've got something for your mother." "And something for you." "Can I just hold your hand for a minute?" "Ruby, who is it?" "You be good, okay?" "Ladies and gentlemen, and the farewell performance of Maria Zielinska." "Tonight's performance will begin in five minutes." "Please take your seats." "Closing doors." "Absolutely, no." "Ladies and gentlemen, Maria Zielinska." "Max?" "Max Forrester?" "Yes." "Who are you?" "How was your bonus this year?" "Was it good?" "It was very good." "Are you from Cisco or American Eagle?" "No." "I'm from down there." "Listen, can I talk to you for a minute?" "I was actually just getting some drinks." " Who are you?" " Who am I?" "Let me think..." " Oof!" "What the- what the hell do you want?" "I think you should know how it feels to be down there." "What?" "A reported fatality." "Paramedics are on the scene." "Witnesses report he was pushed or thrown from the roof." "Military Police reference blotter AR630." "Surveillance footage matches visual of Joseph Smith." "Department of Defense, long-term missing person." " Do you have a visual?" "Negative, no further sightings." "What are you doing here?" "I'm waiting for Maria Zielinska." "There was a party after the show." "I want to see her walk to her car." "Let me explain." "When I'm sober... when I'm healthy and well..." "I hurt people." "I'm lethal." "I drink to weaken the machine they made." "I've finished the work I had to do." "And already, look." "You see 'em?" "Hummingbirds." "Hummingbirds were there that day." "Do you copy?" "Surveillance drones saw what happened." "Roger that." "Hummingbird can see it." "He's got a weapon..." "He's shooting up in the air right now.." "Please, please!" "The enemy killed five of ours... so I killed five of theirs." "The first five I could find." "I left the father hanging." "You see her?" "She is my witness." "Sister." ""Dear Cristina," "I just wanted to say thank you for taking the photographs." "Considering it's me in the pictures, they turned out pretty well." "I gave all the best ones to my daughter, so you're left with the ugly ones and the scary ones." "Sorry." "I've sent Damon the money I took from his account and added some extra for rent." "I left the boys at the mission some cash for pizzas." "And I sent details of the people smugglers to the police." "I also rid the city of a bad man." "I know that doesn't make me a good man, but I tried to do the right thing." "Now I'll go back to the street and disappear." "I was alive again for one summer." "I'm glad I spent it with you." "I hope Africa treats you well." "All my love, Joseph Smith."" "Surveillance camera profile matched to Joseph Smith." "Target heading eastbound on Brewer Street towards Glasshouse Street." "Absent without leave." "File zero-four-zero for profile and visual." "I repeat that's east- east on Brewer Street." "...matches visual of Joseph Smith." "Approach with extreme caution." "I think we have him." "Okay, target in sight." "Go." "Yeah, we got him." "Take him."
2023-09-02T01:27:17.568517
https://example.com/article/8037
Anson Parsons Hotaling Anson Parsons Hotaling or Houghtaling (Feb 28, 1827, New York - Feb 16, 1900, San Francisco ) was a San Francisco merchant and real estate developer. Hotaling was the third son and sixth child of Garrit A Ho(u)ghtaling (1789 -1876) and Hanna Parsons (1789-1880), his surname ultimately deriving from the Dutch surname Hoogteijling. Born and raised in rural New York, he sailed for San Francisco in 1852 on "The Racehound". The route at that time was around Cape Horn, and his ship put into several South American cities for provisioning. He was tempted to stay in South America, but continued on to San Francisco. Once in California, he briefly tried his hand at mining but within a year returned to San Francisco and opened a wine and spirit business, owned in partnership. By 1866 his business had much expanded and he was sole owner and operator. He began a shipping venture, trading with both the South Sea islands, and the settlements on the Pacific coast of Russia. Later he expanded his trade to Australia. He bought a considerable amount of real estate throughout the states of California, Oregon, and Washington, and also invested in iron and mercury mining. He married Lavinia J. Linen on Nov. 3, 1863. Two of Hotaling's four sons predeceased him. Richard M. Hotaling served on the San Francisco Board of Supervisors from 1900. References Category:1827 births Category:1900 deaths Category:History of San Francisco Category:American drink distillers Category:American real estate businesspeople Category:American businesspeople in shipping Category:Iron mining
2024-05-06T01:27:17.568517
https://example.com/article/9381
Stan Lee – His Marvel Cameos are a Secret Character The man is seriously always grinning. Excelsior! Notice how every Marvel movie, whether in an obvious bit or a tiny moment, has a unique and fun Stan Lee cameo? Fans came up with a theory and Marvel/Lee finally confirmed it…he actually has a ongoing, arc-based role as a Watcher Informant. His job is to keep an eye on the galaxy’s superheros and report on them, while maintaining his cover as “just some old dude.” Here’s his “big” moment (actually, in a 2-parter, so you will need to view both to “get” it) from Guardians of the Galaxy, Volume 2, where he gives the latest update to his Watchers. The RunPee app tells you the best time to run & pee during a movie so you don't miss the best scenes. Another, most amusing clue, comes in the recent Avengers 3 – Infinity War, where he crankily asks a school bus of children if they’ve never seen a spaceship before. (Poor quality is from leaked footage – sorry. But still cute.) What would we like to see? How about in his next MCU film, maybe Ant-Man and The Wasp, that he actually has a larger part, and we learn a bit about who/what he is…and has an actual task to do? The man is 95, so we think if his character is going to “come out” as it were, better sooner than later. He may not make it to Avengers 4. That would be a real shame. And Avengers 4 will have enough characters to juggle, that it’s probably not the best time to roll out Stan Lee’s big moment. We say, make it now. 🙂 UPDATE (11/12/18) : Unfortunately, Stan Lee passed away today and he didn’t have that sweet scene I hoped for in Ant Man & The Wasp. There’s a possibility Lee has cameos already filmed for 2019’s Captain Marvel and Avengers 4. We can hope. Stan Lee, you are missed already. Thank you for envisioning such a creative and detailed universe.
2024-05-14T01:27:17.568517
https://example.com/article/3624
VIDEO: 2012: The Gaming Year in Review 2012 was… a year in gaming. Just another year. But there was some cool stuff that happened, and this video is about all the games Roland played this year that he didn’t already get a chance to talk about, including Spec Ops: The Line, Counter Strike: Global Offensive, Tribes: Ascend, MechWarrior Online, Hawken, Alan Wake (the PC version), and a bunch of indie games. In part two, Roland talks to his friend Codeknight about a few high profile games that Roland didn’t get around to playing this year. Pretty big spoilers abound for Assassin’s Creed III, Dishonored, X-COM: Enemy Unknown, and Jagged Alliance: Back in Action. You’re a little harsher on indie titles than I would be, but you’re sadly spot on for the most part. So many of them seem to not just be about ART! as opposed to the game, but actively stick it to the player, as if the game begrudges you for playing it. I’m hoping they don’t suck! But that’s pretty much what I always do. 🙂 Honestly, I haven’t heard of much that excites me yet. ARMA 3, if it’s coming out this year (probably not), and maybe the new Rainbow Six game, since I’ve long been a fan of the franchise. Mainly it comes down to a few problems. First, I’m not a fan of the current batch of consoles. Kinect sucks, Wii U seems pointless and gimmicky. And PC gaming is still going way down hill.
2024-04-03T01:27:17.568517
https://example.com/article/1757
<!-- HTML header for doxygen 1.8.4--> <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8" /> <meta name="generator" content="Doxygen 1.8.13"/> <title>PVRUtils: /usr/buildxl/buildroot/sdk/branch/SDK/framework/PVRUtils/OpenGLES/PBRUtilsGles.h Source File</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="search/search.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="search/searchdata.js"></script> <script type="text/javascript" src="search/search.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> <link href="IMGdoxygen.css" rel="stylesheet" type="text/css"/> <link rel="shortcut icon" type="image/x-icon" href="img.ico"> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <div class="headercontent"> <div class="PVRlogo"> <a href="https://www.imgtec.com/developers/" target="_blank"><img src="PVRlogo.png" width="80%" height="80%" border="none" /></a> </div> <a class="SiteTitle"><span id="projectname">PVRUtils</span> Documentation</a> <tbody> </div> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.13 --> <script type="text/javascript"> var searchBox = new SearchBox("searchBox", "search",false,'Search'); </script> <script type="text/javascript" src="menudata.js"></script> <script type="text/javascript" src="menu.js"></script> <script type="text/javascript"> $(function() { initMenu('',true,false,'search.php','Search'); $(document).ready(function() { init_search(); }); }); </script> <div id="main-nav"></div> <!-- window showing the filter options --> <div id="MSearchSelectWindow" onmouseover="return searchBox.OnSearchSelectShow()" onmouseout="return searchBox.OnSearchSelectHide()" onkeydown="return searchBox.OnSearchSelectKey(event)"> </div> <!-- iframe showing the search results (closed by default) --> <div id="MSearchResultsWindow"> <iframe src="javascript:void(0)" frameborder="0" name="MSearchResults" id="MSearchResults"> </iframe> </div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_ca6309d378ceffb9970caf11a0592736.html">SDK</a></li><li class="navelem"><a class="el" href="dir_1b17efea2d0d450cd18d875f7f2a6e9c.html">framework</a></li><li class="navelem"><a class="el" href="dir_04d546e47904494c8f2a634ed861a0d7.html">PVRUtils</a></li><li class="navelem"><a class="el" href="dir_46a4a494c1e3a53b671afb3bdb6c331c.html">OpenGLES</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="headertitle"> <div class="title">PBRUtilsGles.h</div> </div> </div><!--header--> <div class="contents"> <a href="_p_b_r_utils_gles_8h.html">Go to the documentation of this file.</a><div class="fragment"><div class="line"><a name="l00001"></a><span class="lineno"> 1</span>&#160;</div><div class="line"><a name="l00008"></a><span class="lineno"> 8</span>&#160;<span class="preprocessor">#pragma once</span></div><div class="line"><a name="l00009"></a><span class="lineno"> 9</span>&#160;<span class="preprocessor">#include &quot;PVRCore/texture/Texture.h&quot;</span></div><div class="line"><a name="l00010"></a><span class="lineno"> 10</span>&#160;<span class="preprocessor">#include &quot;<a class="code" href="_convert_to_gles_types_8h.html">PVRUtils/OpenGLES/ConvertToGlesTypes.h</a>&quot;</span></div><div class="line"><a name="l00011"></a><span class="lineno"> 11</span>&#160;<span class="preprocessor">#include &quot;<a class="code" href="_errors_gles_8h.html">PVRUtils/OpenGLES/ErrorsGles.h</a>&quot;</span></div><div class="line"><a name="l00012"></a><span class="lineno"> 12</span>&#160;<span class="preprocessor">#include &quot;<a class="code" href="_p_b_r_utils_8h.html">PVRUtils/PBRUtils.h</a>&quot;</span></div><div class="line"><a name="l00013"></a><span class="lineno"> 13</span>&#160;</div><div class="line"><a name="l00014"></a><span class="lineno"> 14</span>&#160;<span class="keyword">namespace </span><a class="code" href="namespacepvr.html">pvr</a> {</div><div class="line"><a name="l00015"></a><span class="lineno"> 15</span>&#160;<span class="keyword">namespace </span>utils {</div><div class="line"><a name="l00016"></a><span class="lineno"> 16</span>&#160;</div><div class="line"><a name="l00023"></a><span class="lineno"> 23</span>&#160;<span class="keywordtype">void</span> <a class="code" href="namespacepvr_1_1utils.html#af47a86d6668e712e353dd8aea5e984c2">generateIrradianceMap</a>(GLuint environmentMap, pvr::Texture&amp; outTexture, GLuint&amp; outTextureGles, uint32_t mapSize = 64, uint32_t mapNumSamples = 128);</div><div class="line"><a name="l00024"></a><span class="lineno"> 24</span>&#160;</div><div class="line"><a name="l00035"></a><span class="lineno"> 35</span>&#160;<span class="keywordtype">void</span> <a class="code" href="namespacepvr_1_1utils.html#afc8a7f6f6edde3ee63bffd29af44b0e8">generatePreFilteredMapMipMapStyle</a>(GLuint environmentMap, pvr::Texture&amp; outTexture, GLuint&amp; outTextureGles, uint32_t mapSize, <span class="keywordtype">bool</span> zeroRoughnessIsExternal,</div><div class="line"><a name="l00036"></a><span class="lineno"> 36</span>&#160; <span class="keywordtype">int</span> numMipLevelsToDiscard, uint32_t mapNumSamples = 65536);</div><div class="line"><a name="l00037"></a><span class="lineno"> 37</span>&#160;} <span class="comment">// namespace utils</span></div><div class="line"><a name="l00038"></a><span class="lineno"> 38</span>&#160;} <span class="comment">// namespace pvr</span></div><div class="ttc" id="_convert_to_gles_types_8h_html"><div class="ttname"><a href="_convert_to_gles_types_8h.html">ConvertToGlesTypes.h</a></div><div class="ttdoc">Contains conversions of pvr Enumerations to OpenGL ES types. </div></div> <div class="ttc" id="namespacepvr_1_1utils_html_af47a86d6668e712e353dd8aea5e984c2"><div class="ttname"><a href="namespacepvr_1_1utils.html#af47a86d6668e712e353dd8aea5e984c2">pvr::utils::generateIrradianceMap</a></div><div class="ttdeci">void generateIrradianceMap(GLuint environmentMap, pvr::Texture &amp;outTexture, GLuint &amp;outTextureGles, uint32_t mapSize, uint32_t mapNumSamples)</div><div class="ttdoc">Generates a mipmapped diffuse irradiance map.</div><div class="ttdef"><b>Definition:</b> PBRUtilsGles.cpp:20</div></div> <div class="ttc" id="namespacepvr_html"><div class="ttname"><a href="namespacepvr.html">pvr</a></div><div class="ttdoc">Main PowerVR Framework namespace</div><div class="ttdef"><b>Definition:</b> EglPlatformContext.h:21</div></div> <div class="ttc" id="_errors_gles_8h_html"><div class="ttname"><a href="_errors_gles_8h.html">ErrorsGles.h</a></div><div class="ttdoc">Convenience functions for automatically logging OpenGL ES errors. Some functions NOP on release build...</div></div> <div class="ttc" id="namespacepvr_1_1utils_html_afc8a7f6f6edde3ee63bffd29af44b0e8"><div class="ttname"><a href="namespacepvr_1_1utils.html#afc8a7f6f6edde3ee63bffd29af44b0e8">pvr::utils::generatePreFilteredMapMipMapStyle</a></div><div class="ttdeci">void generatePreFilteredMapMipMapStyle(GLuint environmentMap, pvr::Texture &amp;outTexture, GLuint &amp;outTextureGles, uint32_t mapSize, bool zeroRoughnessIsExternal, int numMipLevelsToDiscard, uint32_t mapNumSamples)</div><div class="ttdoc">Generate specular irradiance map. Each level of the specular mip map gets blurred corresponding to a ...</div><div class="ttdef"><b>Definition:</b> PBRUtilsGles.cpp:221</div></div> <div class="ttc" id="_p_b_r_utils_8h_html"><div class="ttname"><a href="_p_b_r_utils_8h.html">PBRUtils.h</a></div><div class="ttdoc">Contains Texture utility helpers. </div></div> </div><!-- fragment --></div><!-- contents --> <!-- HTML footer for doxygen 1.8.4--> <!-- start footer part (NON TREEVIEW ONLY!!) --> <!--BEGIN GENERATE_TREEVIEW--> <div id="FooterMainContainer"> <div id="FooterContainer"> <div class="footerlogo"> <a href="http://www.imgtec.com" target="_blank"><img src="img-footer-logo-grey.png" width="20%" height="20%" border="none" /></a> </div> <div class="copyright"><p>&copy; Imagination Technologies Limited<br> All rights reserved</p></div> </div> </div> </body> </html>
2024-04-18T01:27:17.568517
https://example.com/article/7591
Importance of the herpes simplex virus UL24 gene for productive ganglionic infection in mice. The UL24 gene of herpes simplex virus overlaps the viral thymidine kinase (tk) gene. Most previous studies of UL24 have examined UL24 mutants that have also contained tk and sometimes other mutations. To address the importance of UL24 for viral replication in cell culture and in infections of a mammalian host, we constructed a mutant virus containing a UL24 nonsense mutation that does not affect TK activity and a second mutant that contains clustered point mutations in UL24 and a mutation in tk that does not by itself affect the ability of the virus to replicate acutely in mouse ganglia or to reactivate from latent infection following corneal inoculation of mice. Both mutant viruses replicated in cells in culture and in the mouse eye, albeit less efficiently than wild type or control viruses. Both mutants were much more severely impaired for acute replication in trigeminal ganglia and for reactivation from latency following explant of these ganglia. Viral DNA and latency-associated transcripts were present, albeit at lower levels in ganglia infected with the nonsense mutant. These results indicate that UL24 is especially important for productive infection of mouse sensory ganglia and may have implications for the behaviors of certain tk mutants in pathogenesis.
2024-05-02T01:27:17.568517
https://example.com/article/3539
"(CLOCK TICKING)" "(ALARM RINGING)" "(THEME MUSIC)" "♪" "(SAWING SOUND)" "♪" "(EXPLOSION)" "♪" "(EXPLOSION)" "♪" "(EXPLOSION)" "♪" "(QUIRKY MUSIC)" "(GRUNTING)" "(SNEEZING)" "♪" "(EXPLOSION)" "(SNEEZING)" "♪" "(WHISTLING SOUND)" "(SNEEZING)" "(EXPLOSION)" "(SNEEZING)" "(EXPLOSIONS)" "♪" "HA, GREAT." "NOTHIN' LIKE A FEW SNEEZE BOMBS TO CLEAR OUT A VILLAGE," "EH, SCRATCH?" "(BLOWING NOSE)" "AH, MUCH BETTER." "ROBOTNIK GAVE YOU SINUSES?" "HE DIDN'T GIVE ME SINUSES." "I KNOW." "SNEEZE BOMBS AWAY!" "(WHISTLING SOUND)" "(EXPLOSIONS)" "LOOK, SONIC." "THERE'S A BIG BLACK CLOUD" "OVER HILL TOP VILLAGE." "I SEE IT, TAILS," "AND WHERE THERE'S A BLACK CLOUD," "ROBOTNIK'S BEHIND IT." "I FEEL THE NEED, THE NEED FOR SPEED." "HEY, WAIT FOR ME!" "LOOK AT 'EM RUN." "FEAR, PANIC, DREAD, TERROR." "(LAUGHS)" "YEAH, MAKES YOU PROUD TO BE A ROBOT." "OH!" "OH, LOOK!" "SONIC'S COMING!" "SO WHAT?" "THIS'LL SLOW HIM DOWN." "(LAUGHS)" "(THEME MUSIC)" "AH!" "♪" "(GASPS)" "(SNEEZES)" "A SNEEZE BOMB!" "JUST WHAT I'VE ALWAYS WANTED." "(SNIFFLING)" "MALE #1:" "NEVER FEAR," "CAPTAIN RESCUE IS HERE." "(HEROIC MUSIC)" "WHOA!" "AH!" "(BIRD TWEETING SOUND EFFECT)" "(WHIRRING SOUND)" "HEY, WHAT ARE YOU TRYIN' TO DO?" "(BELL RINGING)" "(SONIC GASPING)" "(SONIC SNEEZING)" "(SNEEZING)" "(SNEEZING)" "I'LL HELP YOU, SONIC." "(SNEEZING)" "I GUESS MY SNEEZE BOMB CATCHER WENT A LITTLE OFF COURSE." "(SNEEZES)" "A LITTLE OFF COURSE?" "ARE YOU A--ACHOO-- SCHMO OR WHAT?" "SCHMO?" "ME?" "OF COURSE NOT." "I'M A HERO." "I AM CAPTAIN RESCUE," "THE GOLDEN BOY OF GADGETS," "THE VANQUISHER OF VILLAINY," "FRIEND OF THE FRIENDLESS," "AND HOPE OF THE HOPELESS." "HEY, LOOK." "(QUIRKY EVIL MUSIC)" "(LAUGHING)" "(WHISTLING SOUND)" "OH!" "(EXPLOSION)" "♪" "A-A-A-AH!" "WHOA!" "♪" "(EXPLOSION)" "I'VE GOTTA LET THE AIR OUT OF SOME ROBOT RATS." "♪" "(WHISTLING SOUND)" "♪" "(GASPING)" "(SNEEZING)" "(EXPLOSION)" "WHO-O-O-OA!" "WHOA-HO-HO-HO-HOA!" "WHOA!" "(WHIRRING SOUND)" "WAY TO GO, SONIC." "AM I ONE HOT HEDGEHOG OR WHAT?" "NICE WORK, SONIC." "REMINDS ME OF GREAT SUPERHERO STUFF" "THAT I USED TO DO." "LOOK." "(ZAPPING SOUND)" "(HEROIC MUSIC)" "ALL OVER MOBIUS, I HAD PEOPLE SAYING... ♪" "(GUNFIRE)" "♪" "(CROWD CHEERING)" "♪" "(SCREAMING)" "♪ ...WHO WAS THAT MASKED RACCOON?" "(MECHANICAL SOUNDS)" "♪" "I SAW YOU ON MOBIUS TV, SONIC," "AND I FIGURED YOU NEEDED MY HELP." "THANKS BUT NO THANKS, OLD TIMER." "TAILS HERE IS MY MAIN MAN." "OLD TIMER?" "OLDER TIMER?" "!" "WHY, I WAS SAVING MOBIUS FROM BAD GUYS" "WHEN YOU WERE STILL A HEDGEHOGLET." "(SOMBER MUSIC)" "I THINK YOU HURT HIS FEELINGS, SONIC." "WELL, GUYS LIKE HIM OUGHTA KNOW WHEN TO QUIT." "ROBOTNIK WOULD EAT HIM FOR LUNCH." "(CHOMP)" "FAILED AGAIN, DID YOU?" "!" "WHY, NO, YOUR SUPREME AWFULNESS." "IN FACT, WE SUCCEEDED WONDERFULLY." "IN A KIND OF NEGATIVE WAY." "SILENCE!" "YOU DUMB BOTS WOULDN'T KNOW SUCCESS" "IF IT BIT YOU ON THE BUMPER." "WHILE I, THE BARON OF BADNESS," "THE KNIGHT OF NASTY-OSITY," "AM ON THE BRINK OF MY GREATEST SUCCESS." "MY EGG-O-MATIC FORCE FIELD." "NOTHING CAN PENETRATE IT!" "NO FORCE ON MOBIUS CAN DAMAGE IT." "(ZAPPING)" "(DRAMATIC MUSIC)" "WHAT'S IT FOR?" "OBSERVE." "THE FORCE FIELD DEMANDS INCREDIBLE POWER." "I NEED THIS SOLAR SATELLITE ORBITING MOBIUS" "TO PROVIDE IT." "AND HILL TOP VILLAGE GIVES ME BEST ACCESS" "TO THE SATELLITE." "(ZAPPING)" "AS THE FORCE FIELD EXPANDS," "I CAN SPREAD MY CONTROL OVER EVERY CORNER OF MOBIUS!" "SCRATCH:" "AND WHAT HAPPENS TO THE HEDGEHOG?" "ROBOTNIK:" "I'LL DRIVE HIM OFF THE PLANET!" "(MANIACAL LAUGHTER)" "(SOFT MUSIC)" "(OFFSCREEN)" "TAILS:" "HOW DO YOU KNOW ROBOTNIK'S ROBO GOONS" "ARE GONNA ATTACK AGAIN, SONIC?" "'CAUSE ROBOTNIK BELIEVES ANY BAD WORTH DOIN'" "IS WORTH DOIN' TWICE." "AND HERE THEY COME NOW!" "(QUIRKY EVIL MUSIC)" "♪" "TEN-HUT!" "I ORDER YOU TO HALT." "HOLD ON!" "WHO DO YOU THINK YOU ARE?" "I'M GENERAL DISORDER, HEAD OF THE MILITARY INTELLIGENCE." "I HAVE ORDERS TO LEAD THIS PLATOON" "IN AN ATTACK ON THE REAR OF HILL TOP VILLAGE" "AS PER SPECIAL ORDERS 301-3 SECTION 4 PARAGRAPH 27" "REVISED APRIL 1ST VIA SECRET PROVISION 38-A" "SECTION 14 SUBSECTION 14 HERETOFORE KNOWN" "AS MARCHING ORDERS NUMBER 845-6 SECTION 8" "SUBSECTION 15 PARAGRAPH" "GOT IT?" "RIGHT, GENERAL DISORDER!" "THAT'S "GENERAL DISORDER, SIR" TO YOU." "NOW OUT OF MY WAY." "FORWARD, MARCH!" "♪" "WOW, HE'S LEADING THEM RIGHT TO THE CLIFF!" "HA, THAT'S MILITARY INTELLIGENCE FOR YOU." "♪" "(THREE THUDS)" "SQUAD FALLOUT!" "CAPTAIN RESCUE:" "HOLD, VILLAINS." "SCRATCH:" "HEY, YOU'RE THE OVERWEIGHT RACCOON" "THAT HELPED US OUT LAST TIME." "I AM CAPTAIN RESCUE, THE GOLDEN BOY OF GADGETS." "THE GOLDEN BOY OF GADGETS, EH?" "THEN YOU'RE GONNA LOVE MY GADGETS." "(HEROIC MUSIC)" "(GUNFIRE)" "♪" "HEY!" "HEY!" "(METALLIC CLANGING)" "(SAWING)" "♪" "WHO-O-O-OA!" "SCRATCH:" "ENOUGH DUELING GADGETS!" "HEY, PUT ME DOWN!" "♪" "SURE THING." "DOWN TO THE BOTTOM OF THE CLIFF." "(LAUGHS)" "WHO-O-O-OA!" "THAT RACCOON IS GETTIN' TO BE A REAL PAIN IN THE SPINE." "GOTCHA!" "I GOT 'EM!" "I GOT 'EM!" "THEY'RE MINE!" "THEY'RE MINE!" "THEY'RE MINE!" "A-HA-HO!" "(WHIRLING SOUND)" "(QUIRKY EVIL MUSIC)" "IF I CAN'T BUILD MY FORCE FIELD BIG ENOUGH" "TO CONTAIN MOBIUS," "THEN WITH THAT RACCOON'S HELP," "I'LL MAKE IT JUST THE RIGHT SIZE TO TRAP SONIC" "PERMANENTLY!" "YOU'RE MAKIN' MY WORK GO REALLY SLOW." "I JUST WANTED TO HELP." "YEAH, WITH HELP LIKE YOURS, WE DON'T NEED BADNIKS." "(SOMBER MUSIC)" "♪" "(OFFSCREEN)" "ROBOTNIK:" "ARE YOU CAPTAIN RESCUE?" "YOU KNOW ME?" "KNOW YOU?" "YOU WERE MY FAVORITE SUPERHERO WHEN I WAS A LAD." "I STILL HAVE MY CAPTAIN RESCUE ACTION FIGURE." "WELL, THAT WAS A LONG TIME AGO." "I'M JUST AN OVER THE HILL SUPERHERO NOW." "AT LEAST SO SAYS A CERTAIN HEDGEHOG." "YOU MEAN SONIC?" "OH, DON'T LISTEN TO HIM." "HE'S ALWAYS HEDGEHOGGING ALL THE GLORY." "HE IS?" "SURE." "I HAVE SOME GREAT EVIL-FIGHTING GADGETS," "BUT HE WON'T LET ME TRY 'EM." "I THINK WE CAN FIGHT ROTTENNESS JUST AS GOOD" "AS THAT HEDGEHOG, DON'T YOU?" "(THUD)" "WELL, UH, I DON'T KNOW." "SURE WE CAN." "WITH YOUR GADGETS AND MY GENIUS," "WE'LL TEAM UP TO GRAB SOME BAD GUYS." "NOW LET'S SHOW THAT HEDGEHOG." "YEAH." "LET'S SHOW THAT HEDGEHOG." "(LAUGHS)" "(UPBEAT MUSIC)" "♪" "WHATCHA STOP FOR, SONIC?" "I HEARD SOMETHING." "THERE, IN THE SKY!" "REMOTE CONTROL PLANES." "I SMELL A ROBOTNIK PLAN." "WE GOTTA BUZZ, CUZ." "(DRAMATIC MUSIC)" "I'M READY." "ALL RIGHT, CAPTAIN RESCUE." "LET'S SEE THAT SUPER DUPER AIRPLANE SCOOPER IN ACTION." "OH NO, IT'S CAPTAIN RESCUE." "AND IT LOOKS LIKE HE'S IN TROUBLE." "NOW, I'LL STOP THOSE PESKY PLANES." "(MECHANICAL SOUNDS)" "UH OH, UH, LITTLE PROBLEM HERE." "♪" "LOOKS LIKE IT'S TIME FOR A SONIC SPIN." "♪" "NOW TO SPRING MY TRAP." "♪" "AH!" "♪" "AH!" "♪" "CAPTAIN RESCUE, ARE YOU HURT?" "OH, I'M OKAY." "BUT LOOK AT SONIC." "LET ME OUT OF HERE!" "(LAUGHING)" "SONIC IS TRAPPED IN THERE," "AND THE REST OF MOBIUS IS OUT HERE." "(LAUGHING)" "AND IT'S MINE!" "IT'S MINE!" "ALL MINE!" "ALL MINE!" "♪" "(QUIRKY EVIL MUSIC)" "WITH SONIC TRAPPED IN THE FORCE FIELD," "MOBIUS IS MINE!" "MINE!" "DID I SAY THAT ALREADY?" "(LAUGHING)" "THE FORCE FIELD HASN'T BEEN MADE" "THAT CAN HOLD THIS HEDGEHOG." "(SAWING)" "♪" "ROBOTNIK: 'ROUND AND 'ROUND THE HEDGEHOG GOES," "AND THEN HE LANDS RIGHT ON HIS NOSE!" "(LAUGHING)" "(PANTING)" "GET ME OUT OF HERE, YOU EGG HEAD!" "TSK, TSK." "REDUCED TO NAME CALLING?" "HOW THE MIGHTY HAVE FALLEN." "YOU CAN RUN ALL YOU WANT, HEDGEHOG." "YOU'RE NOT GOING ANYWHERE EVER." "I HATE TO ADMIT IT, BUT OL' EGGS FOR BRAINS" "MIGHT BE RIGHT." "(HEROIC MUSIC)" "LET SONIC GO, OR I'LL MAKE YOU SORRY" "YOU EVER TANGLED WITH CAPTAIN RESCUE." "♪" "OW, HEY!" "LET GO!" "PUT ME DOWN!" "(QUIRKY MUSIC)" "♪" "(EXPLOSION)" "(LAUGHING)" "(HIGH-PITCHED RINGING)" "IT'S OBVIOUS THAT YOUR SUPERHERO DAYS" "WERE ALL IN THE PAST." "(LAUGHING)" "♪" "LET ME HELP YOU." "(RAPID DRUM BEAT)" "(THUD)" "THIS IS TERRIBLE." "IT WASN'T YOUR FAULT." "(GRUNTING)" "OF COURSE IT IS." "THERE'S NO FOOL LIKE AN OLD FOOL." "SONIC WAS RIGHT." "I'M NOT A SUPERHERO ANYMORE." "WAIT, WE'VE GOT TO SAVE SONIC." "FIND SOMEBODY ELSE." "I'M NO GOOD." "(MECHANICAL SOUNDS)" "(GRUNTING)" "CAREFUL, GROUNDER." "UH, YOU BE CAREFUL." "BE CAREFUL, YOU TWO!" "CITIZENS OF HILL TOP VILLAGE," "I AM PUTTING SONIC THE HEDGEHOG ON DISPLAY HERE" "AS AN EXAMPLE OF WHAT HAPPENS TO THOSE WHO DEFY ME." "NANA-NA-NANA!" "BET YOU CAN'T HURT ME, BOLTS FOR BRAINS." "OH YEAH?" "O-O-O-OH!" "(GRUNTING)" "♪" "SONIC HAS INTERFERED IN MY PLANS FOR THE LAST TIME." "SCRATCH:" "LOOK OUT!" "NO!" "♪" "UH, SORRY, BOSS." "(WHIRRING SOUND)" "♪" "WHOA!" "WHOA!" "(THUD)" "GEE, SONIC, WHAT AM I SUPPOSED TO DO?" "I WISH I KNEW, KID." "AH!" "AH!" "BUT RIGHT NOW," "I'M GETTIN' THE HECK OUTTA HERE." "(HEAVY FOOTSTEPS)" "(FOREBODING MUSIC)" "♪" "HA, NOTHING LIKE A LITTLE URBAN RENEWAL, EH, SCRATCH?" "AND TO THINK WE GET PAID FOR THIS." "WE DO?" "THERE'S GOTTA BE A WAY OUT OF HERE." "(SOFT MUSIC)" "♪" "(TV STATIC)" "(OFFSCREEN)" "CAPTAIN RESCUE:" "TAILS?" "UH, HOW DID YOU FIND ME?" "I ASKED AROUND FOR THE RETIRED SUPERHERO PART OF TOWN." "CAN--CAN I COME IN?" "WOW, LOOK AT ALL THIS NEAT STUFF!" "IT'S ALL JUNK NOW." "YOU GOTTA DO SOMETHING." "THE BADNIKS ARE TEARING UP THE VILLAGE" "AND SONIC IS TRAPPED INSIDE THAT FORCE FIELD." "I'M SORRY ABOUT THAT, BUT I'M NO GOOD" "AT THIS SUPERHERO STUFF ANYMORE." "THE CAPTAIN RESCUE WHO USED THIS WOULDN'T TALK LIKE THAT." "ACTUALLY, I USE THAT TO UNCLOG MY DRAINS." "NONE OF THIS STUFF EVEN WORKS ANYMORE." "COULDN'T YOU FIX IT?" "OH, I DON'T KNOW." "PLEASE, I--I--I'M REALLY SCARED ABOUT SONIC." "OKAY, KID." "I'LL TRY." "YIPPEE!" "ALL RIGHT, KID, LET'S GO KICK SOME ROBOT REAR!" "WHOA!" "(THUD)" "ALL RIGHT, BUT IT'S A LONG WAY TO HILL TOP VILLAGE." "HOW DO WE GET THERE?" "THE RESCUE ROCKET." "WOW, CAN I DRIVE?" "(LAUGHS)" "NOT A CHANCE." "(HEAVY FOOTSTEPS)" "WONDERFUL!" "SOON, HILL TOP VILLAGE WILL BE DESTROYED." "WHO-O-O-O-OA!" "WHAT WAS THAT?" "WHAT DO YOU THINK OF US DUMB ROBOTS NOW, HEDGEHOG?" "I THINK YOU GUYS ARE PROBABLY TOO DUMB" "TO GET OUT OF THE WAY OF THAT." "WHOA!" "(HEROIC MUSIC)" "♪" "(EXPLOSION)" "♪" "(OFFSCREEN)" "SCRATCH:" "AHH!" "WHAT HIT US?" "IT'S THAT WRETCHED RACCOON!" "GET HIM!" "CAPTAIN RESCUE:" "CAPTAIN RESCUE TO THE RESCUE!" "CAPTAIN RESCUE!" "WILL THAT ROCKET GO WHEREVER YOU WANT?" "IT SURE WILL." "STOP THEM, AND HURRY!" "WE'VE GOT TWO MORE VILLAGES TO DEMOLISH BEFORE LUNCHTIME!" "I DON'T GET IT, SONIC." "HOW IS GOING UP GONNA GET YOU OUT OF THERE?" "I'VE GOTTA GET YOU STARTED IN SCHOOL REAL SOON," "'CAUSE YOU WOULD LEARN THAT AIR PRESSURE IS THIN UP THERE." "SURE, AND THAT'LL MAKE THE FORCE FIELD EXPAND" "UNTIL IT BURSTS." "(THEME MUSIC)" "♪" "YOW!" "OW, OW!" "OH NO!" "♪" "(LAUGHS)" "NOW WE GOTCHA." "JUST WAIT TILL DOCTOR ROBOTNIK SEES WHAT WE'VE DONE." "I WONDER WHAT HE'LL SAY." "(ROBOTNIK SCREAMING)" "(ALARM SOUND EFFECT)" "OH!" "♪" "(EXPLOSION)" "♪" "(OFFSCREEN)" "SONIC:" "FORCE FIELD'S GETTIN' WEAKER!" "I'LL HELP IT ALONG." "(WHIRLING SOUND)" "(EXPLOSION)" "DID IT!" "BUT HOW AM I GONNA GET DOWN?" "OH YEAH." "I'LL FA-A-A-ALL!" "SURRENDER OR TASTE MY BADNIK BOOMERANG." "TAKE YOUR BEST SHOT, OLD TIMER!" "(SPINNING SOUND)" "(HEROIC MUSIC)" "♪" "OH MY." "BAH, THOSE TOYS OF YOURS ARE WORTHLESS," "YOU OLD RACCOON!" "PRETTY COOL UNDERWEAR, THOUGH." "(LAUGHS)" "I'M NOT OLD, I'M--I'M MATURE." "YOU WON'T BE SO TOUGH WHEN SONIC GETS BACK." "THAT HEDGEHOG!" "LAST TIME I SAW HIM," "HE WAS HEADED FOR THE TWIN MOONS OF MOBIUS." "SONIC:" "BUT I'M BA-A-A-ACK." "THANKS FOR THE LIFT." "(SQUAWKS)" "UH OH!" "(DRAMATIC MUSIC)" "ROBOTNIK:" "SONIC, YOU'RE JUST IN TIME" "TO WITNESS THE TRIUMPH OF TERRIBLENESS" "IN THE PERSON OF ME, DOCTOR ROBOTNIK." "SCRATCH, TURN SONIC INTO ATOMIC DUST!" "♪" "CAPTAIN RESCUE, DO SOMETHING!" "YES!" "THE TRICK I PULLED BACK IN 1964," "MY ROBOT WRAPPER!" "♪" "(SPRINGING SOUND)" "HEY--HEY, WHAT'S GOING ON?" "(SHOUTING)" "THEY'VE GOTTEN FREE!" "STOP THEM!" "HURRY!" "(SPRINGING SOUND)" "WE'RE HOPPING AS FAST AS WE CAN!" "♪" "HEY, WHAT--HEY!" "(SHOUTING)" "GREAT JOB." "FANTASTIC JOB." "I COULDN'T HAVE DONE IT BETTER MYSELF." "YOU REALLY MEAN THAT, SONIC?" "I BLEW IT WHEN I PUT YOU DOWN." "YOU STILL GOT MOVES I'LL NEVER HAVE." "NEXT TO SONIC, YOU'RE MY FAVORITE HERO." "THANKS, TAILS." "WHEN I NEED ADVICE OR A BADNIK BATTLIN' INVENTION," "I'M COMIN' TO YOU." "I'LL BE THERE." "SEE YA, PARTNER." "SEE YA." "I LIKE THAT HEDGEHOG." "(THEME MUSIC)" "♪" "(SOFT MUSIC)" "I THINK WE'RE LOST, CAPTAIN RESCUE." "ALL WE HAVE TO DO IS HEAD NORTH." "LOST, EH?" "DON'T YOU YOUNG FOLKS KNOW THAT MOSS GROWS HEAVIEST" "ON THE NORTH SIDE OF A TREE?" "THANK YOU, SIR." "THANKS." "THAT OLD BEAR REALLY KNEW WHAT HE WAS TALKING ABOUT." "RIGHT, TAILS." "OLDER PEOPLE CAN BE VERY WISE," "AND THEY OFTEN KNOW THE RIGHT DIRECTION" "TO TAKE IN LIFE." "(THEME MUSIC)" "♪"
2023-11-11T01:27:17.568517
https://example.com/article/2762
North East Regional Committee Martin and Teresa have worked together for more than 20 years in a variety of settings and have collaborated on many projects and resources in the area of sexual health, sexuality and mental health promotion. Presenter Bio: Martin operates a private psychotherapy practice in Cork where he works with young people, adults, couples and families. Martin has particular expertise in the area of couple’s therapy having trained with Bob and Betty Resnick. He also works with clients around psychological sexual dysfunction, sexual identity and other issues of sexuality. In addition, he is an experienced trainer and facilitator in the area of sexual health promotion, sexuality and mental well- being. He has worked in the health services and in the community in a variety of settings including, men’s health, youth health and social inclusion. He has contributed to local and national sexual health initiatives and policy development. Martin is co-author of a range of sexual health training resources and training programmes, including educational resources currently used in Irish schools. He is also the co- author of the book Sex and You – A Modern Irish Perspective published in 2016. Presenter Bio: Teresa works in private practice in Cork providing counselling for adults on a range of issues including sexuality and supporting positive sexual relationships. She is an experienced trainer and facilitator and has had a central role in the development of local and national sexual health and mental health resources and programmes for young people, parents, health and community professionals, as well as the education setting. She has been involved in the development of local and national sexual health policies to guide effective sexual health promotion locally and nationally. She is currently working in the area of mental health and well-being and has a particular interest in positive psychology and its benefit to overall wellbeing and relationships. Workshop Outline: The workshop will be an opportunity to explore: • The meaning of intimacy, beginnings and building.• Your intimate self. • Visibility and vulnerability in the relationship.• Knowing me, knowing you – the couple dynamic.• The language of intimacy and sex.• Sexual intimacy – more than just sex?• Let’s about sex – the why, the when, the how. The workshop is interactive, building knowledge, awareness and giving an opportunity to explore your own perceptions of sex and intimacy. Workshop notes will be provided by email to all participants after the worksho CPD certificates will be emailed to participants after attendance at the Workshop.
2023-09-10T01:27:17.568517
https://example.com/article/5493
Adult Swim has handed out a massive 70-episode renewal order for the hit animated series “Rick and Morty.” The order is part of a new long-term deal the network has signed with series creators Justin Roiland and Dan Harmon. The series follows a sociopathic genius scientist who drags his inherently timid grandson on insanely dangerous adventures across the multi-verse. The new deal will more than double the amount of episodes the series has currently aired. Harmon and Roiland announced they were going back to work on the series in a video posted on Roiland and Harmon’s Instagram accounts, which featured the comic pair showering together in Harmon’s home. Watch the video below. The series has proven to be a ratings goldmine for Adult Swim, with the Season 3 finale alone scoring a 3.9 rating in adults 18-24 and a 3.2 in adults 18-34 in Nielsen’s Live+Same Day numbers, the highest ratings in network history. It was also the most-watched telecast of the day across cable with adults 18-24, 18-34 and 18-49. The only question now is when the new episodes will premiere. Over a year elapsed between the Season 1 finale and the Season 2 premiere, while there was nearly a two year break between the end of Season 2 and the start of Season 3. POPULAR ON VARIETY:
2024-05-20T01:27:17.568517
https://example.com/article/4280
Q: Cycling through a list until I find the correct sequence? I need to cycle through a list in Prolog until a valid sequence appears. In this case the sequence goes "u" "r" "d" "l". The lists will only be made up of those characters. I already have a method that returns a list of all possible cycles, such as this: ?- all_cases(["l", "u", "r", "d"], S). S = [["l", "u", "r", "d"], ["u", "r", "d", "l"], ["r", "d", "l", "u"], ["d", "l", "u", "r"]]. As you can see, the second list is in the order I need. Now the problem is, I need to traverse that list (S) until I locate the one I need. The final result should look like this. 'Cyclic shift' is the correct output, and 'What' contains all of the shifts. all_cases(["u","r","r","d","d","l","l","u"],What),try_all_sqA(What). cyclic shift: ["u","u","r","r","d","d","l","l"] is correct What = [["u", "r", "r", "d", "d", "l", "l", "u"], ["r", "r", "d", "d", "l", "l", "u"|...], ["r", "d", "d", "l", "l", "u"|...], ["d", "d", "l", "l", "u"|...], ["d", "l", "l", "u"|...], ["l", "l", "u"|...], ["l", "u"|...]["u"|...]]. I've already tried sort/4, but that only gives me the list in alphabetical or reverse alphabetical order, and I need to sort it based on the unique sequence (u, r, d, l). A: Well let us split the problem in smaller parts. We will first construct a predicate that matches with elements of a list, until the list is exhausted, or until it reaches an element that is no longer the item we are looking for, we can implement this with a seq/3 predicate: seq([], _, []). seq([H|T], H, R) :- seq(T, H, R). seq([H|T], X, [H|T]) :- dif(H, X). For example: ?- seq(["u", "r", "d", "l"], "u", R). R = ["r", "d", "l"] ; false. ?- seq(["u", "r", "d", "l"], "r", R). R = ["u", "r", "d", "l"]. That means that we can validate that a sequence has zero or more "u"s, followed by zero or more "r"s, followed by zero or more "d"s, and finally followed by zero or more "l"s with: sequrdl(LA) :- seq(LA, "u", LB), seq(LB, "r", LC), seq(LC, "d", LD), seq(LD, "l", []). For example: ?- sequrdl(["u","u","r","r","d","d","l","l"]). true ; false. ?- sequrdl(["u","u","r","r","d","d","l","l", "u"]). false. ?- sequrdl(["u","u","r","r","d","d"]). true ; false. So now we only need to search until we find a rotated list for which this holds, and then we can print that list, like: try_all_sqA(What) :- member(SubList, What), sequrdl(SubList), print('cyclic shift: '), print(SubList), nl. For example: ?- try_all_sqA([["l", "u", "r", "d"], ["u", "r", "d", "l"], ["r", "d", "l", "u"], ["d", "l", "u", "r"]]). 'cyclic shift: '["u","r","d","l"] true ; false.
2024-04-15T01:27:17.568517
https://example.com/article/2074
DIV.page DIV.options { position: absolute; left: 0; top: 0; width: 300px; bottom: 0px; padding-top: 50px; padding-left: 50px; } DIV.page DIV.innerpage { position: absolute; left: 300px; top: 16px; bottom: 16px; right: 16px; padding: 16px; padding-top: 0; } div.options h2 { margin-top: 0px; } DIV.page DIV.options UL { list-style-type: none; padding: 2px 0px; margin-left: 20px; } DIV.page DIV.options UL LI { padding: 0px 16px; margin-bottom: 1px; } DIV.page DIV.options, DIV.page DIV.options A { font-size: 23px; letter-spacing: -1.0px; text-decoration: none; color: #fff; font-weight: bold; text-shadow: 2px 2px 1px #000; } DIV.page DIV.options .submenu A, DIV.page DIV.options .submenu LABEL { font-size: 17px; letter-spacing: 0px; text-shadow: 1px 1px 1px #000; } DIV.page DIV.options UL.submenu LI { padding: 0; margin: 0; margin-bottom: -4px; } DIV.page DIV.options A:hover { color: #ffa; } DIV.page DIV.options.active, DIV.page DIV.options A.active { color: #ff5; } DIV.page DIV.options .search_bar { padding: 2px 4px; box-sizing: border-box; margin-top: 12px; margin-bottom: 8px; } div.ugc_content { position: absolute; left: 320px; top: 16px; bottom: 16px; right: 16px; padding: 16px; padding-top: 0; } @media screen and (max-height: 768px) { DIV.page DIV.options UL.submenu LI { margin-bottom: -8px; } } @media screen and (max-width: 1024px) { div.ugc_content { left: 200px; } } @media screen and (max-width: 1280px) { DIV.page DIV.options { width: 250px; font-size: 70%; } DIV.page DIV.innerpage { left: 250px; } DIV.page DIV.options, DIV.page DIV.options A { font-size: 16px; } DIV.page DIV.options UL.submenu LI { margin-bottom: -4px; } } @media screen and (max-height: 580px) { DIV.page DIV.options { padding-top: 0px; } DIV.page DIV.options UL { padding: 0px; } DIV.page DIV.options UL LI { margin-bottom: 0px; } DIV.page DIV.options, DIV.page DIV.options A { font-size: 20px; line-height: 19px; } } @media screen and (max-height: 420px) { DIV.page DIV.options UL { margin: 0px; } DIV.page DIV.options UL li img { display: none; } } @media screen and (max-width: 640px) { DIV.page DIV.options { padding-top: 0px; padding-left: 0px; } } /* Pop up confirmation message when uninstalling ALL addons, etc */ div.modaldialog { background: rgba( 0, 0, 0, 0.5 ); width: 100%; height: 100%; display: block; position: fixed; top: 0; left: 0; z-index: 9999; } div.centermessage { position: fixed; top: 50%; left: 50%; -webkit-transform: translate(-50%, -50%); transform: translate(-50%, -50%); background: white; border-radius: 5px; padding: 20px; max-width: 500px; text-align: center; } div.centermessage.left { text-align: left; } div.centermessage span { color: black; display: block; font-size: 20px; margin-bottom: 20px; cursor: default; } div.centermessage label { position: relative; top: -2px; cursor: default; } div.centermessage a { display: block; color: black; font-size: 16px; border-radius: 4px; background: #ddd; padding: 5px 10px; text-align: center; cursor: default; } div.centermessage a:hover { background: #ccc; } div.centermessage a.big { padding: 10px 20px; font-size: 32px; } div.centermessage a:not(:last-child) { margin-bottom: 5px; } div.centermessage a.warning { background: #ca1e12; color: white; font-weight: bold; } div.centermessage a.warning:hover { background: #eb2719; } div.centermessage a.create { background: #4CAF50; color: white; font-weight: bold; } div.centermessage a.create:hover { background: #63bb66; } input.preset_name { width: 100%; padding: 3px 5px; } div.centermessage .button { display: block; color: black; font-size: 16px; border-radius: 4px; background: #ddd; padding: 5px 10px; } div.centermessage .button:hover { background: #e3e3e3; } div.centermessage div.button { margin-bottom: 2px; position: relative; background: #ddd; } div.centermessage .wstitle { text-align: left; width: 100%; display: inline-block; cursor: default; overflow: hidden; } div.centermessage .wssub { width: 55px; height: 28px; /* background: #4CAF50; */ display: inline-block; position: absolute; right: 0px; top: 0px; } div.centermessage wsbut img { position: relative; top: 2px; right: 2px; } div.centermessage wsbut { background: #b1b1b1; border-top-right-radius: 4px; border-bottom-right-radius: 4px; } div.centermessage wsbut:hover { background: #c1c1c1; } div.centermessage .subbed wsbut { background: #4CAF50; } /*div.centermessage .subbed wsbut:hover { background: #55c55a; }*/ div.centermessage .subbed { background: #b2d6b2 !important; } div.centermessage .subbed:hover { background: #cadeca !important; }
2024-04-26T01:27:17.568517
https://example.com/article/2916
**(2553/2) Simplify s/s**(-1/34)*s/(s**13*s)*s**(-1/33)*(s/(s**39*s*s))/s assuming s is positive. s**(-59467/1122) Simplify (f**(-1/2))**(-1/4)/(f/f**(-2))**2*(f**3*f)/f*f**(1/7)*f**5/(f*f**(-2/21)/f) assuming f is positive. f**(397/168) Simplify ((n**(-3/5)*n)/(n/((n**(-1/4)*n)/n)))/(n**(-2)/(n**(-6)/n*n))*((n*n**(1/12))/n)/n**(-4)*(n*n/(n*n**0))**24 assuming n is positive. n**(697/30) Simplify (n*n**(-2/3)/n*n/n**(6/5)*(n*n*n**(-8)*n)**(-6/11))**(-43) assuming n is positive. n**(-13201/165) Simplify ((n*n/(n*n*n**7)*n)**(-26)/(n**(-1/3)/(n/((n/n**8)/n))))**(2/47) assuming n is positive. n**(992/141) Simplify (((v*v**(1/4)*v)**33*(v/(v*v**1))**(-6))**(12/13))**(-29) assuming v is positive. v**(-27927/13) Simplify ((q/((q*q**(-1/6))/q))/((q**(-3/5)/q)/q))**(-9/7)/(q/q**(4/9)*q**(1/2)*q*((((q/q**(-1/3))/q)/q)/q)**(-37)) assuming q is positive. q**(-21598/315) Simplify (h/((h*h**(-2/3)*h)/h))**42*(h**(2/5))**(5/4)*(((h*h**7*h)/h*h)/(h*(h*h/(h*h**(-4))*h)/h))/(h**(-3/7)*h/h**(-1/7)) assuming h is positive. h**(431/14) Simplify (p**(-4/7)*p**8/p*p*p**(5/8)/p**5)**(-46) assuming p is positive. p**(-3933/28) Simplify (((c/(c*c*c/(c/c**(-2))))/(c/(c**(-5)/c)))/(c**(-5)*c**(-1/7)))/((c**0)**25)**33 assuming c is positive. c**(-6/7) Simplify ((((j**(2/5)/j*j)/(j**(-7)/j))/(j**4/j*j/(j**(-1/5)*j)*j*j))**(-27))**(4/15) assuming j is positive. j**(-576/25) Simplify ((((l/(l/(l**(-1/4)/l*l)*l))/l)/l*l)**(-2/27)/(l**(1/3)/l**8))/(l*l**(-3)*l*l**(1/4)*(l**(-2))**27) assuming l is positive. l**(751/12) Simplify (m**(-19))**(5/2)/(m*m**(-3))**28 assuming m is positive. m**(17/2) Simplify (p**4*p**(-1/6))**(5/6)/(p*p**0*p*p*p**(5/3))**(-5/4) assuming p is positive. p**(325/36) Simplify (((q/q**7)/(q/q**33))/(q*q**(-19)*q**13/q))**(-18) assuming q is positive. q**(-576) Simplify (m**(-1/4))**(-10)*m**(2/9)/(m**(2/9)/m*m)*(m**0*m/((m/m**(-10))/m*m)*m)**50 assuming m is positive. m**(-895/2) Simplify (j**(-2/7))**(-3/34)*j**(-2/3)*j/(j*j*(j/j**1)/j*j)*((j*j**(-1))/j)**(-26)*(j*j/(j*j**5/j*j)*j)/(j*(j/j**(-6))/j) assuming j is positive. j**(5126/357) Simplify (((x/(x*(x/(x**8/x))/x*x)*x)/((x*((x**(1/2)/x)/x)/x)/x))/((x/(x*(x/(x*x/(x/x**(1/15))))/x*x))/(x/((x*x**(-17)*x)/x))))**(-29) assuming x is positive. x**(-22997/30) Simplify (r**4*r**(-5)/r)**(-18/5)/((r/r**(-1/4))**(1/10)*r**3/r**4) assuming r is positive. r**(323/40) Simplify ((s/s**(-9))**21/(s**(-18)*s*s**1))**(-3/28) assuming s is positive. s**(-339/14) Simplify (l**(-1)/l)**(45/2)/(l*l**4*l**3)*(l/(l*l**(-1)))**(-23)*(l/(l/(l*l**(-1/3)/l))*l*l*l)/l*l*l**(-4/3)*l*l assuming l is positive. l**(-218/3) Simplify ((b/(b*b*b*b**(-2)))**(-2/11))**(-30)/((b**(-3)/b**(-4))/(((b/(b/(b**3/b)))/b)/((b/(b**(-7)/b))/b))) assuming b is positive. b**(-8) Simplify (d/(d/d**4)*d*d**6*d*d/((d*d**(3/5))/d)*d**(-5))/((d**4/d)/d**(6/7)*(d/d**(1/2))**39) assuming d is positive. d**(-997/70) Simplify (f**6*(f**(-1/5)*f)/f)/(f/(f/f**(-1/3)))**30*(f**(1/5)*f*(f*f**3)/f*f*f)**(5/2) assuming f is positive. f**(313/10) Simplify ((y**(4/21)/y**(-17))/(y**3)**(6/17))**(-5/7) assuming y is positive. y**(-28795/2499) Simplify s**23*s**17*s**(-20)*s**(-2/21) assuming s is positive. s**(418/21) Simplify (y**(6/11)*y*y*y/y**(-4)*y*y*((y*y**(-1/3)*y)/y)/y*y**(-1/4))/(((y/y**(-2))/y)/(y**7*y))**31 assuming y is positive. y**(25735/132) Simplify (((b/(b/((b**(1/18)/b)/b)))/b)**(-16)/(b**11/b*b**14))**(-11/3) assuming b is positive. b**(-2288/27) Simplify ((x*x/(x*x**(-36)))**(-25/2)*(x**(5/11)*x)**(-22/5))**47 assuming x is positive. x**(-220383/10) Simplify ((f**8/f)/(f/f**6))/(f*f*f**0)**(-18)*f/f**3*f**(-2/11)*f**(-1/3)/(f**5*f) assuming f is positive. f**(1303/33) Simplify (((s**(3/5)*s)/s)/s)**(-2/63)*(s/s**(-3/11))**(2/5) assuming s is positive. s**(1808/3465) Simplify ((l**(1/6)/l**(-6))/(l/(l/(l/l**1)*l))**(7/2))/(((l**(3/4)/l)/l*l)/(((l/l**(-2/3))/l)/l))**34 assuming l is positive. l**(41/6) Simplify ((((r/r**4)/(r*(r/(r**(-3/5)*r))/r))**(-18/7))**(6/25))**38 assuming r is positive. r**(73872/875) Simplify (z**(-2/3)/z**(-5))**(1/10)/((z/(z**3*z))/z*z/(z/z**(1/4))*z*z**8*z**(3/7)) assuming z is positive. z**(-2203/420) Simplify (t/t**1)**(3/16)*(t**1)**(2/29)*(t/((t/(t/((t/t**(5/4))/t*t)))/t)*t*t*t*t**6*t)/(t*t**(-3/2)*t/t**(-2/5)*t) assuming t is positive. t**(6043/580) Simplify (z*z**(-14)*z**(-6)*(z/(z*((z**8/z)/z)/z*z))**9)**28 assuming z is positive. z**(-2044) Simplify (((((w*w/(w*w/w**0*w*w))/w)/w)/w)**30*w**(-2)/w**(-2/7))/((w**(-1/6)*w*w)**(-15/7))**(-17/6) assuming w is positive. w**(-13679/84) Simplify (((z**(1/11)*z)/z)/z*z)**(-3)*(z/z**(-13))**(-12) assuming z is positive. z**(-1851/11) Simplify ((z**2)**(1/12))**(-37)*(z/(z*z*z**(-2/5))*z)**(-39)/(z*z**(-3)*z**7) assuming z is positive. z**(-803/30) Simplify (s*s**(-2/13)*s*s**3*(s**(1/2))**(-3/5))/(((s/s**(-1/4))/s)**(1/80)/(s/((s**1*s)/s))**44) assuming s is positive. s**(18899/4160) Simplify (b**44*b)/b*b**(-35)*b*b*b**(-2/43)*b**(-33/2) assuming b is positive. b**(-477/86) Simplify ((c**(3/2)*c*c**(-10))/(c**(-7/6)*c**(2/25)))**(-6) assuming c is positive. c**(962/25) Simplify ((y*y**1*y)**(1/6)/((y/y**(-2))/(y/(((y**(3/4)/y)/y)/y))))/((y**(-1/2))**(-8))**(-7/3) assuming y is positive. y**(121/12) Simplify (l**(-3/2)*l*l**(-2/11))/((l**(4/7)/l)/l**4)*((l*l**(-1))/(l**(-4/5)*l))**(6/35) assuming l is positive. l**(14293/3850) Simplify ((p**(-19)*p)/(p*p**5/p)*p/((p**6*p)/p)*p**(-9/5)*p*p)**(-5) assuming p is positive. p**139 Simplify ((r*(((r*r**(-1)*r)/r)/r)/r*r*r*r)**(-44))**6*(r/(r/(r*r*r**(-1)/r*r*r*r)))**(-47)*(r**(-2/3))**0 assuming r is positive. r**(-669) Simplify (h**(1/4)/h*(h/(h**(1/2)/h*h))/h)**(5/14)*(h*((h**(2/7)/h)/h)/h*h)**(-37)/(h*h**(2/5)*h)**(-2/73) assuming h is positive. h**(532419/20440) Simplify (b**0)**(-15)*(b/((b*b**2)/b))**(1/36)*b*b**(-2/7)*b/(b/(b**(-2/5)/b))*(b*b**(-1/3))**(4/5) assuming b is positive. b**(-227/1260) Simplify ((a**(2/7)/(a**3*a))/(a**(1/15)*a/((a/a**(-5))/a*a)))**8 assuming a is positive. a**(1024/105) Simplify ((c/c**(2/7)*c*c)/c**(3/4)*c**0/(c*c**0))/(((c**(2/19)/c)/c*c**(-3))/(c**2*c*c*c*c**(1/6))) assuming c is positive. c**(17597/1596) Simplify (u*(u**2/u)/u*u*u)**40/(u**(-6)/u*u/(u/(u*u**(-1/2)))*u*u)*((u**(1/3)*u)/((u**(-12)/u)/u))**(1/6) assuming u is positive. u**(2287/18) Simplify ((v/(v/(v*v**(-3))))**49/((v**(2/35)*v)/v**10))**(2/13) assuming v is positive. v**(-6234/455) Simplify (r*r**(7/10))**(-30)/(r**(2/73)*r*r*r**(13/3)) assuming r is positive. r**(-12562/219) Simplify (w/(w/(w**40/w*w))*w**42)/(w/(w*w/w**(-7)))**11 assuming w is positive. w**170 Simplify (t*t/(t**(-9)*t)*t**(-16)*t)**(-11/7)/((t*t**1/t)/t**(-4)*(t/(t*(t**(-2/9)/t)/t*t))**(2/21)) assuming t is positive. t**(74/27) Simplify ((p*p**(2/9))**(-5/9))**1*p/(p/((p*p/(p**(-6)*p)*p)/p))*p**(-3/5)*p*(p/(p**(-1/8)/p))/p*p**7 assuming p is positive. p**(48101/3240) Simplify (((l*(l*l/(((l*l/l**(-4))/l)/l*l))/l)/l**3*l**(-2/17)/l*l/(l*l*l*l**9))**(-37/2))**(-3) assuming l is positive. l**(-17094/17) Simplify (d**(-30/13)*d/(d**43/d))/(d/d**4*d**(4/13)) assuming d is positive. d**(-528/13) Simplify (((t/t**26)/t)/t**(3/10))/(t**(3/5))**(-3) assuming t is positive. t**(-49/2) Simplify ((w*w*w**(3/11)/w*w*w)/(((w*(w*w/(w*w/(w**(-15/7)*w))*w)/w*w*w*w)/w)/w*w*w*w)*w/(w/(w*w*w**(1/16)))*w**(-1/2))**(-8/5) assuming w is positive. w**(-241/154) Simplify ((n**(-1/5)/(n*n**7/n*n))/(n**(-15)/(n/(n/n**(2/5)))))**(29/2) assuming n is positive. n**(522/5) Simplify (((o/(o**(1/5)*o*o))/o**(2/7))/(o**1*o)**(-1/2))/((o/o**(1/2))**(-22/7)*(o*o*(o/o**(-3/4))/o*o)/(o**1/o)) assuming o is positive. o**(-373/140) Simplify (((v*v**(-12)/v)/v)/((v*v*(v*v*(v*v*v/((v/v**(-19))/v))/v)/v)/v*v*v)*(v**(-1))**(2/9))**(-33) assuming v is positive. v**(22/3) Simplify ((v*v*(((v**1*v)/v)/v)/v)/v**13*(v/v**(2/13))/(v**8/v))**(-7) assuming v is positive. v**(1652/13) Simplify ((((j/(j*j*j/(j**(2/53)/j)))/j)/(j/(j**(-2/19)/j)))/((j/(j**(-4/9)/j*j))/(j*j**(2/9)*j)))**(-20) assuming j is positive. j**(958820/9063) Simplify (z*z**(-3/4)*(z*z**0*z)/z*z)**37/((z*z/z**(-1))**2)**(1/33) assuming z is positive. z**(3655/44) Simplify (a/(a*a/((a*a*a*a**(34/7)*a)/a)))/(a/a**(14/3)*a*a)*((a/(a/a**(-6/29)))/a)**(-26) assuming a is positive. a**(24301/609) Simplify (k**(-7)/((k/(k/(((k*k/(((k/
2024-02-17T01:27:17.568517
https://example.com/article/6233
modal-title Cheap Indian Clothes Online USA 1 Cheap Indian Clothes Online USA https://www.manndola.com/ 2 Manndola.com is one of the biggest online Indian Ethnic Wear Store 3 We offering a Diaspora of Indian ethnic wear for women and has patronage in over 70 countries. 4 Sharara COLLECTION 5 Over the last 5 years Manndola.com has evolved into an ethnic fashion label which caters to its customers needs of ethnic wears in harmony with the global fashion trends. 6 Buy now at the best price 7 For more details visit site: https://www.manndola. com/
2024-02-09T01:27:17.568517
https://example.com/article/4078
An insider's take on the situation in Northern Ireland. Submitted by Iacobus ** Being on the Alt-Right in a political hotbed like Northern Ireland is a bizarre and challenging experience. One would assume that given how tribal and identity driven both Loyalism and Irish Nationalism are in this country, a White Nationalist such as myself would face little if any opposition in asserting my views publicly, given that even socialism and communism have managed to amass an extensive following of those eager to escape from the limited tribal politics mentioned above. However, the reality could not be any further from the truth. I was born into a Protestant family; however, we prefered to abstain from any clear affiliation to Irish Protestantism given how despite being much improved, cross-community relations are still relatively cagey and still carry divisive if not outright negative connotations. As a result, I attended an integrated primary/elementary school and subsequently entered into the prestigious albeit rapidly declining Methodist College Belfast. It is Protestant in name, but otherwise a completely integrated institution. In reality, this proved to be beneficial as I have amassed many friends from numerous denominations from the two main Christian faiths, ranging from upper class followers of British Loyalism and the Orange order to working class supporters of constitutional and dissident Republicans who want a united Ireland. However, one factor that has proved to be a common denominator for both sides is a total rejection of race realism or any conversation surrounding the history and future of Whites as a whole. Yes, Republicans may refer to themselves as Irish and to loyalists as British in a derogatory tone and vice versa, but given how inherently left wing and socialist Irish Nationalism is, race never mind nationality rarely enters into the conversation. Indeed, the sole topic where both sides will ferociously oppose one another on a remotely race-based concept is over the issue of Israel and Palestine. The nationalist community enthusiastically throws its support behind Palestine whilst vehemently condemning Israel, the result of a perceived similarity between the history of Ireland and Palestine; two relatively small nations subjected to the hostile rule of their much larger neighbours. Thus, given the significant presence of Irish republicans in office in my nation both Northern Ireland and the Republic have accepted many economic migrants from the middle east, the result of a desire to showcase their alleged virtuous souls on the international stage coupled with a sense of a shared experience. By contrast, loyalists support Israel purely as a reaction to their opponents’ backing of Palestine, with many loyalists having extensive contact as well as previous or present membership with a variety of British neo-Nazi groups such as Combat 18, providing for a rather comical state of affairs given that these very same individuals support international Jewry. Similarly, many loyalist groups on social media throughout the past week openly declared their full support for Floyd Mayweather ahead of his rather obscene and entirely pointless bout with the equally detestable Conor McGregor, simply because McGregor is not only an Irish Catholic but one who has on occasion espoused vaguely Republican sentiments. In addition to such glaring hypocrisy, not only are these individuals advocates of total British supremacy as opposed to a pan European movement towards a White ethnostate, but they are also heavily involved in organised crime, thus completely diminishing any true attachment they have to race, genuine or otherwise. For how can one profess to love one’s race while simultaneously undermining it? Similarly, many Irish Republicans have descended into serious organised crime including gun running, drug dealing and car theft in order to finance their terrorist operations to achieve a united Ireland, in the process sullying the romantic imagery they seek to attach to their movement. As a result, while both groups have a desire to achieve or maintain an ethnostate of sorts, whether it be the Protestant majority sought by paramilitary loyalists and their constitutional Unionist allies or a unified Ireland desired by Irish nationalists, neither will ever truly commit to any idea of a pan White identity movement, given firstly that both view one another as subhuman and secondly because the majority of people on both sides are more interested in individualistic desires such as personal gain and reputation from criminal activities as opposed to ever unifying under their shared racial heritage. Moving on temporarily from the tribal politics that divides my nation, my graduation from Methodist College Belfast in the summer of 2014 was a moment that I had been waiting for with baited breath. Upon receiving my grades, I eagerly awaited my first day at University in September of that year, where I would go on to study both history and philosophy for the next 3 years. However, rather than improve given the supposed higher standard of education and intellectual debate, there proved to be absolutely no fertile ground to cultivate any genuine conversation, debate or mere mention of White identity at University without being shut down immediately. It is now explicitly clear to me that almost every academic institution in the West has been poisoned with critical theory courtesy of the Frankfurt School. Despite being a public university and thus attracting students from not only across Northern Ireland but the entire world, over half of the student body were of of socialist, Irish Republican or overtly communist political persuasion, with the student union as well as many other official buildings and institutions plastered with LGBT flags and socialist propaganda. As for the other half, I would assert that the majority are alleged “sceptics” albeit with a left-wing bias, perhaps fearful of the ostracization they would face otherwise, and a small group of libertarians, many of whom in truth are just neoconservatives. Furthermore, most of the professors and teachers encourage this bias since many are Liberal and Marxist themselves. One of my professors was Fabian Schuppert, a German Marxist lecturer, who used his pulpit to agitate for reparations, claiming that the “maangamizi” or the alleged “black holocaust” justifies such measures, praising terrorists Nelson Mandela and Robert Mugabe in the process. Such an abhorrent suggestion drew outrage from several students including myself however it fell to the hands of a lone Afrikaner student to rebut the unhinged professor, citing the ongoing yet completely ignored killing of White farmers in South Africa and the cesspool that is Zimbabwe where Blacks are encouraged to loot and and kill Whites in the name of social justice. Upon confronting resistance, all the professor could do was bleat feebly about the evils of Colonization and trot out the myth that the African continent was far advanced in both technology and the arts, implying that we and our ancestors effectively “whitewashed” such advances and gutted Africa in the process. Similarly, within the numerous seminars I attended throughout my Philosophy of Law module, I bore witness to several feminist and LGBT rants concerning both the election of Donald Trump and an alleged inherent racism which lay dormant within every police force in the western world, a claim supported by our lecturer David Archard, an ethical advisor to the British Government who described himself as a “Good old English liberal”. Such a claim is amusing in hindsight, for despite calling himself a liberal he argued that “toxic ideologies” should not be tolerated and that essentially all who voted for either Brexit or the election of Donald Trump were somewhat misguided if not totally misguided, whilst simultaneously praising individuals such as Jeremy Corbyn, yet another pioneer of an ideology that has left millions of corpses in its wake. This clear shift towards the extreme left, towards the point of celebrating convicted murderers and chaotic ideologies as illustrated above has unfortunately gained a significant foothold in the political realm also. For example, in similar fashion to the rather dire situation with regards to the public perception and treatment of law enforcement in the United States, police and military servicemen in this country have been time and time again reprimanded for killing criminals and terrorists, on occasion even decades after with many British and Irish personnel of the armed forces facing prison sentences over the alleged “unlawful” killing of Irish Republican terrorists in the 1970’s. To add insult to injury, numerous former members and gunmen of the IRA and its many factions have become my country’s leaders, once more promoting the message that political violence provides a clear pathway to political power. A prime example of such perversity is the reality that the head of Policing in this country is an individual by the name of Gerry Kelly, an aged Irish Republican who in September of 1983 shot a prison officer in the head as part of an escape from the Maze Prison. In truth, an individual such as Kelly being in a position of power seems relatively less absurd when one takes into consideration the fact that despicable individuals such as George Soros provide the financial backing of organisations who claim to be “for the people” and “Anti-fascist”. Indeed, our heavily publicised and farcical political elite in Northern Ireland has become hated by those they claim to represent as a result of several major economic scandals, the most notable of which being the renewable energy scandal that cost the public over 500 million pounds to heat an empty warehouse, courtesy of the Democratic Unionist Party. Examples such as this coupled with the reality that our politicians consist largely of former terrorist gunmen mean that the case for pan White Nationalism has been buried under not tribal animosity, but corruption and graft as well. We are left with two options: direct rule from England, or a socialist coalition of Nationalist parties. The former entails neoconservative measures from a Tory party overflowing with Blairites, meaning little room for anything regarded as too politically extreme or beneficial to the natives of my country, and the latter truly is a terrifying prospect, particularly so given the bewildering popularity of comrade Corbyn. However, whilst it is indeed important to fully recognize the threat provided by the ghost of Herbert Marcuse that haunts college campuses in Northern Ireland as he does in the United States and further afield, one of the most significant obstacles facing a White identitarian dialogue in my country is rather ironically the fact that we are an incredibly homogenous nation. One would like to think that in producing and preserving a White majority, Northern Ireland is a nation many would argue that is in itself a White ethnostate. However, I would argue in response that a homeland for our people requires not only the physical presence of Whites but an awakened mind, for there is simply neither a time nor place for the weak in our movement and ultimately our homeland, for a fifth column of cowards is far more damaging than an army of one’s fiercest opponents. Thus, to be on the Alt-Right in “God’s country” is indeed a unique albeit distressing position for one to find oneself in. Much of the leftist bias that infects the United States and Europe, particularly so on the college campus, exists here as well, combined with the element of liberal decay and ancient petty tribalism. The two communities view each other as implacable enemies and the migrants from outside of Northern Ireland as irrelevant, perhaps a nuisance at most but overall, they have adopted a position of relative indifference. One valuable lesson one may draw from this is that it accurately reflects how utterly parasitical the half-hearted amongst us truly are. The combination of nationalistic neoconservatives, criminal or socialist parties and paramilitaries provide as many allies and recruits to our cause as enemies, not unlike the Alt-Lite in America. And while the left and their paramilitary Antifa are our immediate enemy, I would argue that it is the Alt-Lite and groups of similar ilk who are no less a threat to our movement. They frustrate and confuse the genuine patriotic and nationalistic impulses of a people and a nation. And they are a reality I have become all too familiar with growing up in Northern Ireland.
2024-06-22T01:27:17.568517
https://example.com/article/9542
Email A Friend Product details Make your get up GLOW! Our Red Glow Costume Kit is perfect for clubs, Halloween, parades and lots of other party themes. Put on a black shirt and pants and then use the 5-22" glow lights and 10-8" glow sticks to decorate yourself. Each kit comes with 30 hooks. Our red glow costume kit is sold by the kit. Please order in increments of 1 kit.
2023-11-30T01:27:17.568517
https://example.com/article/3024
Osteoporosis. Osteopenia, in the form of osteoporosis, is a common complication of chronic cholestatic liver diseases and, although its cause is poorly understood, it appears to be intimately related to the cholestasis itself. With more patients surviving longer with successful liver transplantation, the clinical significance of such osteopenia has increased, and a traumatic fracturing has become a major cause of morbidity in this patient population. Noninvasive diagnosis is easy, and serial measurements allow assessment of disease progression. Although no effective therapy can treat or prevent this complication, supportive measures can improve skeletal well-being, especially in high-risk individuals who are candidates for liver transplantation.
2024-05-18T01:27:17.568517
https://example.com/article/9285
[18F]FETO: metabolic considerations. 11beta-Hydroxylase is a key enzyme in the biosynthesis of adrenocortical steroid hormones and is a suitable target for the imaging of the adrenal cortex. [(11)C]Metomidate (MTO), [(11)C]etomidate (ETO) and desethyl-[(18)F]fluoroethyl-etomidate (FETO) are potent inhibitors of this enzyme and are used for PET imaging of adrenocortical pathologies. The aims of this study were (1) to evaluate and compare the metabolic stability of MTO, ETO and FETO against esterases and (2) to investigate the metabolic pattern of FETO in vivo. In vitro assays were performed using different concentrations of MTO, ETO and FETO with constant concentrations of carboxylesterase. Human in vivo studies were performed with human blood samples drawn from the cubital vein. After sample clean-up, the serum was analysed by HPLC methods. In vitro assays showed Michaelis-Menten constants of 115.1 mumol for FETO, 162.0 mumol for MTO and 168.6 mumol for ETO. Limiting velocities were 1.54 mumol/min (FETO), 1.47 mumol/min (MTO) and 1.35 mumol/min (ETO). This implies insignificantly decreased esterase stability of FETO compared with MTO and ETO. In vivo investigations showed a rapid metabolisation of FETO within the first 10 min (2 min: 91.41%+/-6.44%, n=6; 10 min: 23.78%+/-5.54%, n=4) followed by a smooth decrease in FETO from 20 to 90 min (20 min: 11.23%+/-3.79% n=4; 90 min: 3.68%+/-3.65%, n=4). Recovery rate was 61.43%+/-3.19% (n=12). In vitro experiments demonstrated that FETO stability against esterases is comparable to that of ETO and MTO. The metabolic profile showed that FETO kinetics in humans are fast.
2024-07-29T01:27:17.568517
https://example.com/article/7970
/* Copyright 2015 Flavien Norindr (aka Plumillon Forge) Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package com.plumillonforge.android.chipview; import android.content.Context; import android.content.res.Resources; import android.support.annotation.ColorInt; import android.support.annotation.DrawableRes; import android.support.annotation.LayoutRes; import android.util.AttributeSet; import android.util.DisplayMetrics; import android.view.View; import android.view.ViewGroup; import java.util.ArrayList; import java.util.List; import java.util.Observable; import java.util.Observer; /** * Created by Plumillon Forge on 17/09/15. */ public class ChipView extends ViewGroup implements Observer { private ChipViewAdapter mAdapter; private OnChipClickListener mListener; // Data private List<Integer> mLineHeightList; public ChipView(Context context) { super(context); init(context, null); } public ChipView(Context context, AttributeSet attrs) { super(context, attrs); init(context, attrs); } public ChipView(Context context, AttributeSet attrs, int defStyleAttr) { super(context, attrs, defStyleAttr); init(context, attrs); } private void init(Context context, AttributeSet attrs) { mLineHeightList = new ArrayList<>(); setAdapter(new ChipViewAdapter(context, attrs) { @Override public int getLayoutRes(int position) { return 0; } @Override public int getBackgroundRes(int position) { return 0; } @Override public int getBackgroundColor(int position) { return 0; } @Override public int getBackgroundColorSelected(int position) { return 0; } @Override public void onLayout(View view, int position) { } }); } @Override protected void onMeasure(final int widthMeasureSpec, final int heightMeasureSpec) { super.onMeasure(widthMeasureSpec, heightMeasureSpec); measureChildren(widthMeasureSpec, heightMeasureSpec); mLineHeightList.clear(); int width = getMeasuredWidth(); int height = getPaddingTop() + getPaddingBottom(); int lineHeight = 0; int lineWidth = getPaddingLeft(); int childCount = getChildCount(); for (int i = 0; i < childCount; i++) { View childView = getChildAt(i); MarginLayoutParams layoutParams = (MarginLayoutParams) childView.getLayoutParams(); boolean lastChild = (i == childCount - 1); if (childView.getVisibility() == GONE) { if (lastChild) mLineHeightList.add(lineHeight); continue; } int childWidth = (childView.getMeasuredWidth() + layoutParams.leftMargin + layoutParams.rightMargin); int childHeight = (childView.getMeasuredHeight() + layoutParams.topMargin + layoutParams.bottomMargin); lineHeight = Math.max(lineHeight, childHeight); if (childWidth > width) width = childWidth; if (lineWidth + childWidth + getPaddingRight() > width) { mLineHeightList.add(lineHeight); lineWidth = getPaddingLeft() + childWidth; } else lineWidth += childWidth; if (lastChild) mLineHeightList.add(lineHeight); } for (Integer h : mLineHeightList) height += h; setMeasuredDimension(width, height); } @Override protected void onLayout(boolean changed, int l, int t, int r, int b) { if (mAdapter != null) { int width = getMeasuredWidth(); int lineWidth = getPaddingLeft(); int childCount = getChildCount(); int j = 0; int lineHeight = (mLineHeightList.size() > 0 ? mLineHeightList.get(j) : 0); int childY = getPaddingTop(); for (int i = 0; i < childCount; i++) { final Chip chip = mAdapter.getChipList().get(i); View childView = getChildAt(i); ViewGroup.MarginLayoutParams layoutParams = (ViewGroup.MarginLayoutParams) childView.getLayoutParams(); if (childView.getVisibility() == View.GONE) continue; int childWidth = (childView.getMeasuredWidth() + layoutParams.leftMargin + layoutParams.rightMargin); int childHeight = (childView.getMeasuredHeight() + layoutParams.topMargin + layoutParams.bottomMargin); if (childWidth > width) width = childWidth; if (lineWidth + childWidth + getPaddingRight() > width) { childY += lineHeight; j++; lineHeight = mLineHeightList.get(j); lineWidth = getPaddingLeft() + childWidth; } else lineWidth += childWidth; int childX = lineWidth - childWidth; childView.layout((childX + layoutParams.leftMargin), (childY + layoutParams.topMargin), (lineWidth - layoutParams.rightMargin), (childY + childHeight - layoutParams.bottomMargin)); if (mListener != null) { childView.setOnClickListener(new View.OnClickListener() { @Override public void onClick(View v) { mListener.onChipClick(chip); } }); } } } } @Override protected LayoutParams generateDefaultLayoutParams() { return new MarginLayoutParams(LayoutParams.WRAP_CONTENT, LayoutParams.WRAP_CONTENT); } @Override protected LayoutParams generateLayoutParams(LayoutParams p) { return new MarginLayoutParams(p); } @Override public LayoutParams generateLayoutParams(AttributeSet attrs) { return new MarginLayoutParams(getContext(), attrs); } public void refresh() { if (mAdapter != null) { removeAllViews(); for (int i = 0; i < mAdapter.count(); i++) { View view = mAdapter.getView(this, i); if (view != null) { if (mListener != null) { view.setClickable(true); view.setFocusable(true); } addView(view); } } invalidate(); } } /** * Helper to convert dp to px * * @param dp * @return float */ public static float dpToPx(float dp) { float px = dp * (Resources.getSystem().getDisplayMetrics().densityDpi / DisplayMetrics.DENSITY_DEFAULT); return px; } /** * Helper to convert px to sp * * @param px * @return float */ public static float pxToSp(float px) { float scaledDensity = Resources.getSystem().getDisplayMetrics().scaledDensity; return (px / scaledDensity); } /** * Wrapper to add a Chip * * @param chip */ public void add(Chip chip) { mAdapter.add(chip); } /** * Wrapper to remove a Chip * * @param chip */ public void remove(Chip chip) { mAdapter.remove(chip); } /** * How many Chip do we have * * @return int */ public int count() { return mAdapter.count(); } public List<Chip> getChipList() { return mAdapter.getChipList(); } public void setChipList(List<Chip> chipList) { mAdapter.setChipList(chipList); } public ChipViewAdapter getAdapter() { return mAdapter; } public void setAdapter(ChipViewAdapter adapter) { mAdapter = adapter; mAdapter.deleteObservers(); mAdapter.addObserver(this); refresh(); } /** * Set overall Chip background color by res id * Can be fine tuned by overriding @see com.scanners.android.bao.view.ChipTextView.Chip#getBackgroundRes * * @param backgroundRes */ public void setChipBackgroundRes(@DrawableRes int backgroundRes) { mAdapter.setChipBackgroundRes(backgroundRes); } public int getChipLayoutRes() { return mAdapter.getChipLayoutRes(); } /** * Set overall Chip layout by res id * Can be fine tuned by overriding @see com.scanners.android.bao.view.ChipTextView.Chip#getLayoutRes */ public void setChipLayoutRes(@LayoutRes int chipRes) { mAdapter.setChipLayoutRes(chipRes); } /** * Set Chip onClick listener * * @param listener */ public void setOnChipClickListener(OnChipClickListener listener) { mListener = listener; } public boolean isToleratingDuplicate() { return mAdapter.isToleratingDuplicate(); } /** * Set whether or not ChipTextView tolerate duplicate Chip * * @param toleratingDuplicate */ public void setToleratingDuplicate(boolean toleratingDuplicate) { mAdapter.setToleratingDuplicate(toleratingDuplicate); } public boolean hasBackground() { return mAdapter.hasBackground(); } public void setHasBackground(boolean hasBackground) { mAdapter.setHasBackground(hasBackground); } public int getChipSpacing() { return mAdapter.getChipSpacing(); } public void setChipSpacing(int chipSpacing) { mAdapter.setChipSpacing(chipSpacing); } public int getLineSpacing() { return mAdapter.getLineSpacing(); } public void setLineSpacing(int lineSpacing) { mAdapter.setLineSpacing(lineSpacing); } public int getChipPadding() { return mAdapter.getChipPadding(); } public void setChipPadding(int chipPadding) { mAdapter.setChipPadding(chipPadding); } public int getChipSidePadding() { return mAdapter.getChipSidePadding(); } public void setChipSidePadding(int chipSidePadding) { mAdapter.setChipSidePadding(chipSidePadding); } public int getChipCornerRadius() { return mAdapter.getChipCornerRadius(); } public void setChipCornerRadius(int chipCornerRadius) { mAdapter.setChipCornerRadius(chipCornerRadius); } public int getChipBackgroundColor() { return mAdapter.getChipBackgroundColor(); } public void setChipBackgroundColor(@ColorInt int chipBackgroundColor) { mAdapter.setChipBackgroundColor(chipBackgroundColor); } public int getChipBackgroundColorSelected() { return mAdapter.getChipBackgroundColorSelected(); } public void setChipBackgroundColorSelected(@ColorInt int chipBackgroundColorSelected) { mAdapter.setChipBackgroundColorSelected(chipBackgroundColorSelected); } public int getChipTextSize() { return mAdapter.getChipTextSize(); } public void setChipTextSize(int chipTextSize) { mAdapter.setChipTextSize(chipTextSize); } @Override public void update(Observable observable, Object data) { refresh(); } }
2023-08-09T01:27:17.568517
https://example.com/article/2341
Q: mysql performance one big tables vs many tables I am working on a social network website, so i hope users will be a lot. I need to save tags (key | counter) for every user and i wonder if it's better to use 1) a big table vs 2) one really large table vs 3) splitted big tables. 1) this is an example for many tables implementation table userid_tags (every user has it's own table) key | counter ----- --------- tag1 | 3 tag2 | 1 tag3 | 10 Query 1: SELECT * FROM userid_tags WHERE key='tag1' Query 2: SELECT * FROM userid_tags 2) single table implementation: table tags key | counter | user_id ----- ------------------ tag1 | 3 | 20022 tag2 | 1 | 20022 tag2 | 10 | 31234 Query 1: SELECT * FROM userid_tags WHERE key='tag1' AND user_id='20022' Query 2: SELECT * FROM userid_tags AND user_id='20022' 3) splitted tables implementation table 1000_tags (user_id from 1 to 1000) key | counter | user_id ----- ------------------ tag1 | 3 | 122 tag2 | 1 | 122 tag2 | 10 | 734 table 21000_tags (user_id from 20000 to 21000) key | counter | user_id ----- ------------------ tag1 | 3 | 20022 tag2 | 1 | 20022 tag2 | 10 | 20234 Query 1: SELECT * FROM userid_tags WHERE key='tag1' AND user_id='20022' Query 2: SELECT * FROM userid_tags AND user_id='20022' Question for 3) what's a good split index? i used 1000 (users) following the instict A: 2 is the right answer. Think about how you are going to maintain one table per user, or 1 table per 1000 tags. How Will you create/update/delete the tables? What if you have to make mass changes? How will you be able to figure out which table you need to select from? Even if you can, what if you need to select from more than one of those tables simultaneously (e.g. get the tags for two users). Having the tables split up won't give you much of a performance benefit as it is. It's true that if the tables grow very large inserts may become slower because mysql has to create the keys, but as long as you have the appropriate keys look ups should be very fast. Another similar solution would be to have a table for tags, a table for users, and a table that maps both of them. This will keep the tag cardinality small and if you're using an auto_increment surrogate key for both tables, the key length for both will be small which should make look ups as fast as possible with no restrictions on the relation (i.e. having to figure out other tables to join on for other users). A: Using option 2 is the correct way to handle this. You can still use partitions within the table though. All the information about using partition can be found in the MySQL documentation. Splitting the table in partitions for every thousand users would look something like: CREATE TABLE tags (`key VARCHAR(50), counter INT, user_id INT) PARTITION BY KEY(user_id) partitions 1000; If the user_id would be 21001 you could start searching in the correct partition something like: SELECT * FROM tags PARTITION (p22);' Because the id 21001 would be in the 22nd partition. Check the link for more information.
2023-09-03T01:27:17.568517
https://example.com/article/6839
Simple Techniques On Earning Money In The Stock Market It doesn’t subject who you really are or what your backdrop is, expense income might be a great help to you in your life. The sole thing you want to do is learn a tiny about the stock market and which kind of investments are ideal for you. No matter what kind of investment you select, the following advice will allow you to. Expect to maintain the stocks’ lasting. If you only intend to maintain on the stocks for the short period of time, be prepared for a lot of volatility. The industry is extremely tough to predict for the short term, and you might wind up offering the shares ay an unacceptable time. Keeping them for the long term is the simplest way to ensure revenue. In no way depend upon hearsay, as using the masses is usually a formula for disaster. When anyone buys exactly the same shares, the worth will reduce and fewer folks are going to purchase it down the road. Think independently and do your very own investigation, as an alternative to only depending on what others say. A lot of those people who are just beginning with stock exchange ventures acquire joint cash. Joint resources are often lower risk purchases because of their diversification. The best thing about mutual funds is you get yourself a good selection of stocks and shares, and you have an expert who seems to be carrying out all of the study about the distinct organizations with your expenditure portfolio. In order to select the very least unsafe stock exchange sides, there are various options to look for. Very diversified mutual cash in secure and older market sectors will be the most dependable bet. Harmless person shares would include companies that offer you dividends from fully developed enterprise and enormous marketplace hats. Utilities are low-cyclical firms that are incredibly secure. The benefits are almost as dependable as clockwork, but the growth prospective is minimal. Do not enable all your other worries manage your buying and selling selections. When it may be intolerable to view your stocks soar and plummet, it is important to remain calm. Make the judgements within a methodical, purposeful way, and judge expense cars that line up with the amount of danger you will be at ease with. An early selection you should make is how you need to access to the stock trading. If you want to be a inactive investor leaving the management to a market expert, joint cash are excellent choices that provide auto stock portfolio diversficiation. If you are even more of a do-it-yourselfer, then selecting and trading your own shares can be done way too. Splitting your expenditure involving both is really a selection that some do also. Even if you choose to select and business shares all by yourself, consider talking to an counselor to balance their perspectives with your personal. A specialist can do greater than offer you some supply selections. If they are experienced they will also help you create a long term program and techniques to attain your required success. Then the both of you will make a tailored prepare, which is dependant on all this information and facts. Wading throughout the ocean of content material on the web could be sufficient to drown you, but this information is an existence preserver for everyone investing to make money. The straightforward suggestions you’ve study, can transform your approach so considerably, you could turn around a losing expenditure or start off investing in new things. Make sure to acquire what you’ve figured out and go!
2024-03-18T01:27:17.568517
https://example.com/article/3364
And just like that, it’s gone. Early this morning, we reported that, despite Hotline Miami 2 previously receiving a “Refused Classification” rating by the Australian Classification Board (ACB), the Hotline Miami Collection was available for purchase on the Australian Switch eShop. It was revealed during last night’s Indie World showcase, and available shortly after the presentation ended. It is now unavailable for purchase, and has been removed from the eShop, including wishlists, and the webshop. The collection, which features both Hotline Miami and its sequel, Hotline Miami 2: Wrong Number, was curiously listed as an MA15+ release. This is despite the first game receiving an R18+ rating in 2015, and the second being refused classification twice in the same year. An ACB listing discovered by Vooks revealed that a title referred to as “Hotline Miami” was submitted through the IARC automatic classification system in June of this year, and subsequently was refused classification. It’s unclear if this listing referred to the first game, or was simply a titling error. Either way, according to ACB guidelines, the collection should not have been available for purchase. It’s currently unknown if the title will return to the eShop, but given the Board’s hardline stance on the classification of games, we expect it won’t. We’ve reached out to Digital Devolver for comment. Copies of the game bought prior to its removal from the eShop will still be available to download and play.
2024-01-08T01:27:17.568517
https://example.com/article/9928
class Verification::Sms include ActiveModel::Model attr_accessor :user, :phone, :confirmation_code validates :phone, presence: true validates :phone, format: { with: /\A[\d \+]+\z/ } validate :uniqness_phone def uniqness_phone errors.add(:phone, :taken) if User.where(confirmed_phone: phone).any? end def save return false unless valid? update_user_phone_information send_sms Lock.increase_tries(user) end def update_user_phone_information user.update(unconfirmed_phone: phone, sms_confirmation_code: generate_confirmation_code) end def send_sms SMSApi.new.sms_deliver(user.unconfirmed_phone, user.sms_confirmation_code) end def verified? user.sms_confirmation_code == confirmation_code end private def generate_confirmation_code rand.to_s[2..5] end end
2024-04-28T01:27:17.568517
https://example.com/article/2174
Q: Suffix Trie in C++ I have been trying to write a C++ code of a suffix trie however I want this code to keep track of counters at each node of how often a character or substring appears during the suffix trie construction: bearing in mind that am working with only 4 characters A,C,G and T The code below is my attempt however its not working correctly: #include<iostream> #include <string> #include <stdio.h> #include <string.h> using namespace std; struct SuffixTreeNode{ char c; struct SuffixTreeNode* one; struct SuffixTreeNode* two; struct SuffixTreeNode* three; struct SuffixTreeNode* four; //int count; }; SuffixTreeNode* CreateNode(char ch){ SuffixTreeNode* newnode=new SuffixTreeNode(); newnode->c=ch; newnode->one=NULL; newnode->two=NULL; newnode->three=NULL; newnode->four=NULL; //count=0; } SuffixTreeNode* Insert(SuffixTreeNode* root,char ch){ if (root==NULL){ root=CreateNode(ch); } else if(ch=='a'){ root->one=Insert(root->one,ch); } else if(ch=='c'){ root->two=Insert(root->two,ch); } else if(ch=='g'){ root->three=Insert(root->three,ch); } else if(ch=='t') { root->four=Insert(root->four,ch); } return root; } bool Search(SuffixTreeNode* root, int data){ if(root==NULL) return false; else if (root->c==data) return true; else if (root->c=='a')return Search(root->one,data); else if (root->c=='c')return Search(root->two,data); else if (root->c=='g')return Search(root->three,data); else return Search(root->four,data); } int main(){ SuffixTreeNode* root=NULL; char str; root=Insert(root,'a'); root=Insert(root,'c'); root=Insert(root,'c'); root=Insert(root,'t'); root=Insert(root,'a'); root=Insert(root,'g'); cout<<"Enter character to be searched\n"; cin>>str; if(Search(root,str)==true)cout<<"Found\n"; else cout<<"Not found\n"; } A: The problem is that its design is flawed for the the search and insert: you do it for single characters, while the trie should work with a string. Analysis of the problem If you print out the trie you will see that you build a tree expanding the branch corresponding too the letter. You have done this because you insert one letter at a time, but this is not the normal layout of a trie : Similarly, when you search for an element, if it's the root element, everything is ok. But if it's not the root element, your code will always search the branch corresponding to the current node, and this recursively, meaning that it will search only in the branch corresponding to the root. First step towards a solution:correct the code If you want to find any letter in the trie structure, you need to update your search to explore not the branch corresponding to the letter of the current node, but to the letter that is searched: bool Search(SuffixTreeNode* root, int data){ cout << (char)data<<"=="<<root->c<<"?"<<endl; if(!root) return false; else if (root->c==data) return true; else if (data=='a')return Search(root->one,data); else if (data=='c')return Search(root->two,data); else if (data=='g')return Search(root->three,data); else return Search(root->four,data); } This corrects the code, not the underlying design. Here an online demo here. But further work is needed to correct the design The design should insert/search a string s. The idea would be to check current char with s[0] and recursively insert/search the remaining of the string s.substr(1);
2024-04-25T01:27:17.568517
https://example.com/article/7912
KANSAI ITINERARY: Osaka – Nara – Mie, JAPAN With its own unmistakable culture, landscape, and mythological history, it’s no surprise that Kansai, Japan’s most popular region, has long been a magnet of tourists. For first-timers in Japan, Osaka and Kyoto would easily be on top of the itinerary, but there’s more to Kansai than these charming cities and if you plan your itinerary well, you can include Nara and Mie in your itinerary. I have visited Nara before and wrote a detailed guide HERE if you plan to explore it for 1 Day. But as I recently found out, 1 day is not enough for Nara. There’s so much to explore in this prefecture. Will write a separate, more detailed Nara spring itinerary, but in the meantime, let me share to you our Kansai itinerary. Recently, we traveled to Osaka – Nara – Mie for spring, catching cherry blossoms, this trip might look tiresome as it involves transferring from one prefecture to the next, but if you want to maximize your trip to Japan since it’s quite hard to book vacation leaves these days, it’s well worth it. I used a Kintetsu Rail Pass Plus for 5 Days, which saved me a lot of cash for this trip. Because when traveling in Japan, a large portion of your travel fund will be consumed by transportation cost – like long-distance train rides, so thankfully, there are passes especially created for foreign tourists. ABOUT KANSAI Kansai is blissfully located in Honshu island in Japan, and is composed of 7 prefectures, including Osaka, Kyoto, Nara, Mie, Shiga, Wakayama, and Hyogo. WHAT PASS TO USE IN THIS JAPAN TRIP ITINERARY? As mentioned above, I used a Kintetsu Rail Pass Plus for 5 Days. Unknown to many tourists, Kintetsu actually has a rail pass that is sold only to foreign tourists visiting Japan as temporary visitors. This pass will entitle holders to unlimited train rides on Kintetsu Lines and Iga-Tetsudo Lines, depending on the pass purchased. The Kintetsu Rail Pass is available in 4 varieties, offering a selection of durations and travel destinations. The Kintetsu Rail Pass cover Osaka, Kyoto, Nara, Mie, and Nagoya. Here’s the 4 types of Kintetsu Rail Pass: 1.Kintetsu Rail Pass 1 Day Destinations:Osaka, Nara, Kyoto What’s covered: Kintetsu Line – Osaka-Namba and Kintetsu-Nara, between Kyoto and Tsutsui, between Nagata and Ikoma, and between Toriimae and Ikomasanjo WHERE TO PURCHASE KINTETSU PASS? 2.You can purchase it at travel agencies and booking sites. RESERVE HERE 3.You can purchase at major Kintetsu station, Kansai International Airport, Chubu Centrair International Airport, or other authorised location. But take note that if you purchase in Japan, the price is slightly higher. KANSAI TOP TOURIST ATTRACTIONS KANSAI ITINERARY – DAY 1:OSAKA ATTRACTIONS Hotel Location: Osaka (Sheraton Miyako Hotel Osaka) Osaka Castle To start off your Kansai adventure, you can explore the major spots in Osaka such as Osaka Castle. This gorgeous, age-old castle is draped by stone walls and moats, plus, the cherry blossoms during spring season along the river add more drama to it. The crowd here can be quite overwhelming, but you still can find some spots without photobombers if you’re patient enough to wait. The Osaka Castle was built in the late 16th century by Hideyoshi Toyotomi to become the new center of Japan under his rule, but only a year after the completion of the castle, he died. It was passed on to his son Toyotomi Hideyori who was only 5 years old at that time. Later on, Osaka Castle fell to the Tokugawa clan and was completely destroyed. But the new heir Tokugawa Hidetada ordered to rebuild the castle in 1620. Unfortunately, lightning burned the castle main tower and the castle was once again devastated. Its main tower made of steel-framed reinforced concrete structure was rebuilt again in 1931. In 1995, Osaka Government approved a restoration project of Osaka Castle, which was completed 2 years later, and its main tower was rightfully recognized as a Registered Tangible Cultural Property. KANSAI ITINERARY – DAY 2: NARA ATTRACTIONS Hotel Location: Osaka (Sheraton Miyako Hotel Osaka) Nara Park Located at the foot of Mt. Wakakusa, Nara Park is one of oldest parks in Japan founded sometime in 1880. The Park is home to a thousands of free-roaming deer, which is the symbol of Nara City and classified as a Natural Treasure. The deer in Nara were once considered sacred and protected, they are believed to be messengers of the gods in Shinto religion. Based on folklore, this started when Takemikazuchi-no-mikoto, one of the four gods of Kasuga Shrine, arrived on Mt.Mikasa, he was riding a white deer. Nara Park beckons tourists who come here to get up close with the deer and feed them. Please do not feed them with paper or anything other than the deer crackers that you can purchase from vendors around the park for JPY 150. If you wish to see the main attractions in Nara, this is a good place to start as the Nara National Museum, Todaiji Temple, Kasuga Taisha, and Kofukuji are all within walking distance. Todaiji Temple After exploring Nara Deer Park and getting up close with the playful deer, if you’re going to pick one temple to enter in Nara, make it Todaiji Temple, one of the most venerated and the star of all temples in this old city. The temple has a small lake fringed by trees, a perfect place to sit and relax if you’re tired from all the walking in Nara. Also, during spring, the surroundings of the main hall is draped by cherry blossoms. While most of the surrounding attractions in Todaiji Temples are free, if you want to see one of the world’s largest bronze statue of the Buddha, known in Japanese as Daibutsu, you have to pay to enter the Daibutsuden (Great Buddha Hall), one of the largest wooden building in the world where it is enshrined. The sitting Buddha is 15 meters high and is guarded by two Bodhisattvas. Before entering the temple, don’t miss the two-fierce looking Nio guardians standing by the gigantic Nandaimon gate. Todai-ji Temple Open Hours: 7:30 AM to 5:30 PM – April to September 8:00 AM to 4:30 PM – November to February 7:30 AM to 5:00 PM – October 8:00 AM to 5:00 PM – March Entrance Fee: ¥600 – ₱277 ($5, SGD 7, MYR 22) Access:About 10-minute walk from Nara Park Yoshino Yoshino, a UNESCO World Heritage Site is undeniably jaw-dropping, especially during spring when the cherry blossoms are in full bloom. Really, I have no words for it. In a span of 1 week, I visited it 3 times in an attempt to see its splendor because it was always raining in the afternoon, but despite its mood, it never failed to charm me. After my 3rd attempt, the sky finally cleared and showed me its true beauty. Indeed, it is a place where humans and nature come together. I’m so touched by my visit here, seeing the splendor of nature, the temples scattered here, and how the Japanese took care of it and appreciate its sacred beauty. It’s a must visit place when visiting Nara in spring and autumn, but be warned that since this is a mountain range, a hike is inevitable. There’s a ropeway that visitors can ride, and a bus too, but it can only take you to the middle of the mountain range where you still need to walk to reach the temples or hike to some viewing decks to truly see the cherry blossoms blanketing the massif. During my visit, I’ve seen families, elderly couples, solo travelers, and group of friends whether young or old, pause or stop to breathe and simply watch it’s the scenic views here. It’s a place that welcomes everyone. I met old couples who don’t even take pictures, they just sit there and admire its beauty. I’ve often times walked in some paths alone, with the wind blowing in my face, and the towering trees and bamboos watching over me. It’s as if I’m taking a pilgrimage myself, and I am really grateful for the experience. It’s one of those comforting moments that I will always remember. Kii Mountain Range is actually a sacred site, a place believed to be the home of the gods. It houses 3 sacred sites of Yoshino/Omine, Koyasan, Kumano Sanzan, and the pilgrimage routes connecting them. The popular Yoshino is said to be the birthplace of the Shugendo religion, a unique ancient religion. In the olden days, the Japanese respected nature and treated them as gods. Shujenja pushes themselves into the ruggedness of nature, they pray, walk, train and refine their minds and hearts while trying to be in one with nature and Yoshino is the perfect training ground for them. Today, Yoshino is not just a pilgrimage site, but a famed viewing spot for cherry blossoms in Nara, Japan. The massif is dappled with over 30,000 cherry blossom trees and it is believed that the first cherry blossoms was planted here over 1,300 years ago. Yoshino Open Hours: Most shops here closes at 5:00 PM Entrance Fee:FREE Access: Via Regular train Take the Kintetsu-Nara Line towards Yamatosaidaiji Station. Transfer to Kashihara Line towards Kashiharajingumae Station Take the Kintetsu-Yoshino Line towards YoshinoStation. Alight at Yoshino Station. Hike the trail or ride the Yoshino Ropeway to Naka Sembon, the middle of the mountain where the most famous temples and shops are located. KANSAI ITINERARY – DAY 3: MIE Hotel Location: Shima (Miyako Resort Shima Bayside Terraces) Meoto Iwa (Married Couple Rocks) This place is known for its scenic two rocks, dubbed as “Married Couple Rock” off the shore of Futami in Mie,Japan and best viewed during sunset when the sun rises between them. The famed rocks standing near Futami Okitami Shrine are joined by rope made of rice straw, called shimenawa in local language, are actually believed to sacred and is replaced many times in a year during a special ceremony. In Shinto religion, the rocks embodies the marriage of the creator of Izanagim, Izanami, and kami. Some temples here are peppered with frog statues that are believed to be lucky charms to bring home things. For our trip to Meoto Iwa, I was glad to experience riding the Limited Express Shimakaze, this is the number 1 limited express train in Japan that most passengers want to experience. Imagine it cost ¥1 million to make eact set. Interestingly, there is a massage on seat. They also have an onboard service so passengers can have bento and tea time. This is why the Limited Express Shimakaze fare costs ¥2,640 – ₱1,220 ($24, SGD 31, MYR 97) compared to the regular (Limited Express Train) for ¥970 – ₱448 ($4, SGD 11, MYR 35). For more information, CLICK HERE. KANSAI ITINERARY – DAY 4: MIE Hotel Location: Osaka Yokoyama Observatory This place in Ise, located in Mie Prefecture offers a scenic view of the cerulean Ago Bay peppered with several islands. The parking lot here is also peppered with cherry blossoms, and I heard that they also celebrate the Yokoyama Cherry Blossom Festival here. Travel Tip:If you haven’t heard of Ise before like me, Ise is a rather small town known for Japan’s most sacred Shinto Shrines believed to have been established in the 3rd century. The most visited shrines here includes the Geku and Naiku, the Inner and Outer Shrines respectively. Interestingly, all the temples of Ise Jingu (Grand Shrines of Ise) are recreated every 20 years in accordance with Shinto traditions. From the Kintetsu Ise-shi Station, it’s a 10-minute walk to the Outer Shrine. *The Begonia Garden is charged separately. ¥1,000 for adults, but you can apply the ¥1,000 gift certificate that comes with your entry ticket. For Kintetsu Rail Pass Holder, entrance to Begonia Garden is FREE. Access: 1.From Ugata Station take the Kintetsu Limited Express Train and head to Kuwana Station. 2.Transfer to local train. Alight at Kintetsu-Nagashima Station. 3.Walk for about 1 minute to Kintetsunagashima Ekimae Bus Stop. Take the direct bus to Nabano no Sato, fare is ¥220 – ₱101 ($2, SGD 3, MYR 8) and transit time is about 10 minutes. Kintetsu Train + Bus Fare: Limited Express Train: ¥1,320 – ₱609 ($12, SGD 16, MYR 49) (Additional payment is required for the Limited Express train with Kintetsu Rail Pass/Plus) Nabano no Sato in Nagashima, Kuwana City is best known for its Winter Illumination, Tulips Field and Begonia Garden. The park is literally overflowing with flowers, their colors so trippy like they just came out of a Crayola box! Hailed as one of Japan’s most extravagant light display, Nabano no Sato made me teary-eyed. This place is oozing with over 8 million LED lights illuminating in the flower park. Attractions here include the surreal light tunnel that is made to look like fall foliage, the animated light show, the observation deck and the tulip field KANSAI ITINERARY (OSAKA-NARA-MIE) Here’s a suggested Kansai itinerary with sample budget if you want to maximize the Kintetsu Rail Pass Plus for 5 days. I’ve indicated the regular fare for each train ride using regular train or limited express train so that you can compare and calculate how much you’ll save with the Kintetsu Rail Pass. DAY 1 OSAKA REGULAR TRAIN/BUS FARE LIMITED EXPRESS/BUS FARE KINTETSU PASS Arrival at Kansai Airport Terminal 1 Kintetsu Limousine Bus to Osaka-Uehommachi ¥1,550 (₱716) (N/A) ¥1,550 (₱716) ¥1,550 (₱716) Hotel check-in Walk to Osaka-Uehommachi Station Take subway (Tanimachi Line) to Dainichi ¥180 (₱83) N/A ¥180 (₱83) ¥180 (₱83) Get off at Tanimachi 4-chome Subway Station Exit 9 Walk to Osaka Castle Osaka Castle Admission: ¥600 (₱277) Walk to Tanimachi 4-chome Subway Station ETD for Dotonbori ¥180 (₱83) N/A ¥180 (₱83) ¥180 (₱83) Take subway Tanimachi Line to Yaominami Alight at Tanimachiyuchome Station Transfer to Sen-nichimae Line to Nodahanshin Alight at Namba Station Walk to Dotonbori Dotonbori Dinner Expenses:¥1,000 (₱462) From Osaka-Namba Station, take Kintetsu-Nara Line to Yamato-Saidaji ¥150 (₱69) N/A ¥150 (₱69) FREE Alight at Osaka-Uehommachi Station Back to hotel Day 1 Expenses ¥1,600 (₱739) ¥2,060 (₱951) ¥2,060 (₱951) ¥1,910 (₱882) DAY 2 NARA 09:05 AM Osaka-Uehommachi Station to Kintetsu Nara Station ¥560 (₱258) N/A ¥560 (₱258) FREE 09:40 AM ETA Kintetsu Nara Station Walk to Nara Deer Park. Admission: FREE 12:00 PM Lunch at Edogawa Naramachi ¥4,200 (₱1,939) 01:00 PM Todaiji Temple Admission: ¥600 (₱277) 02:00 PM ETD for Yoshino ¥850 (₱392) ¥ 1,750(₱834) FREE + ¥900 (₱418) for Limited Express Train ticket 1.From Kintetsu Nara Station take Nara Line to Yamato-Saidaiji Station 02:05 PM 2.Get off at Yamato-Saidaiji Station. 02:11 PM 3.Transfer to Kintetsu Limited Express train or Kintetsu-Kasihara Line to Kashiharajingu-mae. 02:35 PM 4.Alight at Kashiharajingu-mae Station. 02:47 PM 5.Transfer to Kintetsu Limited Express or Kintetsu-Yoshino Line towards Yoshino. 03:26 PM 6. Get off at Yoshino Station, the last stop. 7. Hike the trail or take the Yoshinoyama Ropeway to Naka Sembon (middle area). Ropeway:¥450 (₱208) 03:40 PM Explore Yoshino Mountain and temples. 06:34 PM ETD for Osaka ¥970 (₱448) ¥1,480 (₱683) FREE + ¥510 (₱235) for Limited Express train ticket Take the Kintetsu Limited Express Train (at platform 6) or the Kintetsu-Yoshino Line to Osaka-Abenobashi. Important: Sample trip expenses mentioned above doesn’t cover hotel, souvenirs and airfare. Rates are updated at the time of writing, but may change without prior notice. As you can see from the above calculations that you’ll save a lot if you use the Kintetsu Rail Pass Plus if you follow the above itinerary. WHERE TO STAY You’ll never run out of place to stay in Kansai, it has a wealth of all types of accommodations. But during my recent visit, here are the hotels we stayed at. They’re all conveniently located near the train or subway stations, and that’s one factor I consider when booking a hotel in Japan. Sheraton Miyako Hotel Osaka Convenient location, hotel is just next to Osaka Uehommachi Statio, shopping area (Don Quijote) and restaurants. What I like about it is that, there’s a direct Kansai Airport Limousine Bus just beside the hotel. As for the room, it was pretty spacious and the bed is super comfortable, so I really had a pleasant sleep. It is equipped with all the facilities you expect to find in a luxe hotel. There’s also an espresso machine. Staff are also helpful and attentive. The breakfast at the Japanese restaurants was superb too. Tennoji Miyako Hotel Another hotel with a convenient location. Just beside a subway station and the train station is on the opposite side. It is walking distance to restaurants, Kintetsu Department store and convenience store. It also has easy access to Kansai Airport as there’s a direct Kansai Airport Limousine Bus nearby. The room has enough space for me to move around and the bed is pretty comfortable too. Miyako Resort Shima Bayside Terraces Hands down to this resort in Mie. I had a pleasant stay here. The architecture – both the façade and interior of the hotel is really beautiful, as if you’re staying in a secluded resort with numerous on-site facilities to satisfy your every whim. It has a sauna, hot springs outdoor pool and fitness centre. The breakfast is good too, I especially like their salad and how they crack the egg. My room has a direct, scenic view of the Argo Bay in the balcony, a pleasant place to sip your coffee or tea while admiring nature around you. Room is super spacious too, and price is very reasonable. Bed is super comfortable, so my sleep was pretty comfortable. The Japanese dinner course I had at the hotel was exceptional too, I like the way they prepared and served the meals. Staff are super attentive and helpful. The hotel is also Instagram-worthy, we checked out some photo spots here. They have a free shuttle bus to and from the train station, which is pretty convenient. WHERE TO EAT Edogawa Naramachi One of the best places to eat Una Jyu (gilled eel over rice) and premium yamato beef sukiyaki in Nara. It’s slightly on a pricier side ¥4,200 (₱1,939) for the premium Yamato beef sukiyaki meal, but the ambience and the delicious food met the price point. The sukiyaki meal already comes Una Jyu and Tempura. For a larger serving set there’s a sashimi included. The restaurant building is about 150 years old already! The service was great too. So, if you want to try a traditional Japanese lunch when in Nara, this place is highly recommended. The queue can get quite long though during lunch, so better come early or maybe have your lunch after the usual dining time. Edogawa Naramachi Location: 43 Shimomikadocho, Nara 630-8365, Nara Prefecture Contact #: +81 742-20-4400 KANSAI TRAVEL TIPS Kansai is known for its delicious beef. When in Mie try the Matsuzaka beef, and when in Shiga try the Omi beef. And for Kobe (Hyogo prefecture), Kobe beef is famous. Tipping is not common in Kansai as well as the rest of Japan. Avoid making noise or taking calls while onboard the train. If your hotel is in Osaka-Uehommachi Area, you can take the direct Kintetsu Airport Limousine Bus (Bus Stop 7) at Kansai Airport. COPYRIGHT NOTICE: All visual content, videos, images and articles featured on this site is copyright to www.thepinaysolobackpacker.com (unless otherwise stated or if it's a public domain) and may not be reproduced in any blog or elsewhere in any way without explicit written permission. If you own rights to any of the featured photos or contents here and do not wish them to appear on this site, please contact us via e-mail and they will be promptly removed. TERMS OF USE: The content of every page of this website is for your general knowledge only. We are neither responsible, nor have we control, on content of any external website links. Every effort has been made to make the contents of this website accurate and up-to-date. However,addresses, contact numbers, websites, e-mail addresses, descriptions of features and other forms of information may have changed during the time of writing. We shall not be held responsible for any loss, inconvenience or injury to any entity/party due to unintentional changes or errors inherent in the information obtained. Please also note that to keep this site running for free and provide you free helpful information when planning your trips, when you make a purchase through affiliate links on this site, we may earn a small commission without any additional charges to you.
2023-09-22T01:27:17.568517
https://example.com/article/4133
T-Mobile promises to make customer service less painful with Team of Experts T-Mobile (TMUS) announced changes to the way it handles customer service on Wednesday, with an initiative called Team of Experts. Marketed as one of T-Mobile’s Uncarrier moves, Team of Experts is meant to address customers’ myriad complaints about dealing with customer service hotlines. From the top, T-Mobile says you won’t have to talk to an automated service if you don’t want to. Instead, you’ll be able to talk to a living, breathing human. Yahoo Finance’s Ethan Wolff-Mann previously explained how to bypass a company’s robo system, but this way seems to involve a lot less screaming and cursing. You’ll still get a robot answering the phone when you initially call in, but will then automatically be moved over to a real person. T-Mobile also says that if the Team of Experts gets backed up, they will let you choose a time when they can call you back. That’s not exactly new — I’ve had plenty of companies tell me that they can call back — but it’s still helpful. But getting in touch with an actual person is only half the trouble when calling a customer service line. You usually end up being passed from one operator to another, repeating your issue each time, until you either give up, or finally manage to get someone who can resolve your problem. T-Mobile’s Team of Experts program, however, will provide you with a specific group of people who will address problems with your phone or account regardless of when you call or where you call from. That alone should make for a better customer service experience. Available to all postpaid customers The company says Team of Experts personnel will be available to all postpaid T-Mobile customers at no additional expense, so it’s not like you have to sign up for a premium service plan to see any benefits. Postpaid customers are those who pay for their monthly service at the end of a billing cycle. Prepaid customers pay for a set amount of data, texts or call time at the beginning of a billing cycle. No one likes calling customer service agents — not even the customer service agents — so it will be interesting to see if this plan actually takes off and becomes a successful model for other companies and industries going forward. It’s also nice to see T-Mobile putting such an emphasis on actually calling customer service reps, considering so many other companies push either messaging bots or the aforementioned robo systems. It’ll be especially interesting to see if millennial consumers will want to talk to human agents, especially since so many younger users don’t like talking on the phone. T-Mobile is also in the midst of trying to convince federal regulators that it should be allowed to merge with competitor Sprint (S) to better take on the likes of Verizon (VZ) and AT&T (T) in the wireless market. (Verizon is the parent company of Yahoo Finance.) The proposed $26 billion merger would whittle the wireless industry down from four major carriers to just three, and the FCC has not yet blessed the deal. Team of Experts will be available 7 a.m. to 9 p.m. local time, and T-Mobile’s Customer Care team will pick up from there. The company says that in early 2019 Team of Experts will be available to postpaid customers 24/7. Editor’s note: This piece has been updated to reflect that Team of Experts is only available for postpaid customers.
2024-04-10T01:27:17.568517
https://example.com/article/8191
LAMMPS (24 Jul 2017) using 1 OpenMP thread(s) per MPI task # Test of SW potential for Si system units metal boundary p p p atom_style atomic read_data data_sw orthogonal box = (0 0 0) to (5.431 5.431 5.431) 1 by 1 by 1 MPI processor grid reading atoms ... 8 atoms pair_style quip pair_coeff * * sw_example.xml "IP SW" 14 velocity all create 10.0 355311 neighbor 0.3 bin neigh_modify delay 10 fix 1 all nve thermo 10 timestep 0.001 #dump 1 all custom 10 dump.sw id fx fy fz run 100 Neighbor list info ... update every 1 steps, delay 10 steps, check yes max neighbors/atom: 2000, page size: 100000 master list distance cutoff = 4.2258 ghost atom cutoff = 4.2258 binsize = 2.1129, bins = 3 3 3 1 neighbor lists, perpetual/occasional/extra = 1 0 0 (1) pair quip, perpetual attributes: full, newton on pair build: full/bin/atomonly stencil: full/bin/3d bin: standard Per MPI rank memory allocation (min/avg/max) = 2.684 | 2.684 | 2.684 Mbytes Step Temp E_pair E_mol TotEng Press 0 10 -34.68 0 -34.670952 32.206289 10 4.5659178 -34.675073 0 -34.670942 46.253731 20 1.606683 -34.672391 0 -34.670937 44.736892 30 6.7007748 -34.677011 0 -34.670948 16.403049 40 5.682757 -34.676087 0 -34.670945 18.696408 50 2.2140716 -34.672942 0 -34.670939 37.592282 60 5.0475382 -34.675512 0 -34.670944 37.331666 70 7.0990979 -34.677369 0 -34.670946 40.533757 80 5.7306189 -34.676128 0 -34.670943 47.748813 90 5.0895648 -34.675549 0 -34.670944 38.092721 100 4.1070919 -34.674659 0 -34.670943 28.737864 Loop time of 0.384233 on 1 procs for 100 steps with 8 atoms Performance: 22.486 ns/day, 1.067 hours/ns, 260.259 timesteps/s 94.6% CPU use with 1 MPI tasks x 1 OpenMP threads MPI task timing breakdown: Section | min time | avg time | max time |%varavg| %total --------------------------------------------------------------- Pair | 0.38365 | 0.38365 | 0.38365 | 0.0 | 99.85 Neigh | 0 | 0 | 0 | 0.0 | 0.00 Comm | 0.00017333 | 0.00017333 | 0.00017333 | 0.0 | 0.05 Output | 0.00014162 | 0.00014162 | 0.00014162 | 0.0 | 0.04 Modify | 7.081e-05 | 7.081e-05 | 7.081e-05 | 0.0 | 0.02 Other | | 0.0001957 | | | 0.05 Nlocal: 8 ave 8 max 8 min Histogram: 1 0 0 0 0 0 0 0 0 0 Nghost: 162 ave 162 max 162 min Histogram: 1 0 0 0 0 0 0 0 0 0 Neighs: 0 ave 0 max 0 min Histogram: 1 0 0 0 0 0 0 0 0 0 FullNghs: 128 ave 128 max 128 min Histogram: 1 0 0 0 0 0 0 0 0 0 Total # of neighbors = 128 Ave neighs/atom = 16 Neighbor list builds = 0 Dangerous builds = 0 Total wall time: 0:00:00
2024-04-07T01:27:17.568517
https://example.com/article/6443
The successful prevention, diagnosis, and clinical management of cervical cancer depend heavily on early screening. For liquid-based Papanicolaou smear screening to be effective, the clinician must have expertise in distinguishing between tissue or cell abnormalities caused by precancerous lesions and other inflammatory conditions in the cervix ([@bib17]). In addition, highly skilled technicians and pathologists must be able to interpret patient specimen slides and produce a definitive diagnosis. Such screening can be particularly challenging in resource-poor settings that lack trained clinicians and pathologists. An objective method of interpreting cytopathic changes associated with cervical disease, known as DNA ploidy analysis, involves the numerical measurement of DNA content in the nucleus of the cell ([@bib16]; [@bib10]). Since chromosomal aneuploidy has been significantly associated with progression toward cervical carcinoma, quantification of DNA aneuploidy may serve as a prognostic marker of disease ([@bib4]; [@bib40]). This process can be computerized by machine algorithm to automate diagnosis of cervical lesions and thus implemented in population-based screening. Previous literature has suggested that DNA ploidy analysis is capable of a stand-alone testing method ([@bib39]; [@bib44]). For automated DNA ploidy analysis to be considered as an alternative for the screening of cervical malignancies, an evaluation with regard to both quality-adjusted life expectancy and costs is needed. This study presents a comparative analysis of DNA ploidy analysis and liquid-based cytology screening in terms of the potential economic costs and clinical benefits of this new technology. Our results may have an impact on the choice of cost-effective strategies for large-scale screening programs. Materials and methods ===================== DNA ploidy analysis ------------------- By definition, DNA ploidy analysis is a quantitative technique. It is one of the methods used to detect cervical cancer and its precursors. It is performed on Feulgen-stained specimens in a semi-automated manner. Unlike liquid-based cytology screening, DNA ploidy analysis is not subject to the retesting of 10% of normal specimens that is required by Clinical Laboratory Improvement Amendments 1988 regulations ([@bib42]). An abnormal specimen identified by the ploidy method would be equivalent in terms of clinical management to a result of low-grade squamous intraepithelial lesion (LSIL) in the Bethesda system for reporting cytologic results. Thus, either of these abnormal findings -- that is, abnormal DNA ploidy or LSIL result for Papanicolaou smear --- would be followed up with a diagnostic visit which typically includes colposcopy and biopsy (if required). Treatment, if needed, would occur subsequently. Five DNA ploidy strategies were examined in this study. In a reported clinical trial, the sensitivity and specificity of the ploidy strategy were measured on the basis of five cut points for the number of aneuploid cells ([Table 1](#tbl1){ref-type="table"}) ([@bib17]). With the 1-cell cut point strategy (ploidy 1 cell strategy), the presence of at least one aneuploid cell in a given slide rendered it an abnormal specimen. Similarly, the DNA ploidy cytology at n-cell cut point (n could be any whole number from 1 to 5) designated a specimen as abnormal if n aneuploid cells were found in a given slide; the terminology 'ploidy n cell strategy\' is used for these scenarios. Comparators ----------- In our study, we assessed the cost-effectiveness of seven strategies: the liquid-based Papanicolaou smear, the five DNA ploidy strategies involving the five cut points described above, and a no screening strategy (as an anchoring strategy). We included 'no screening\' as an anchoring strategy only for purposes to determine if DNA ploidy is cost-effective compared to this alternative in the economic evaluation. Our intention was to make a primary comparison of DNA ploidy to the usual care strategy (i.e., Papanicolaou smear screening). We only would make a comparison of DNA ploidy analysis to the anchoring 'no screening\' option if it were to be shown that the usual care strategy is not cost-effective compared to DNA ploidy analysis. The starting age for screening was 21 years, as recommended by the current guidelines from the U.S. Preventive Services Task Force ([@bib1]). The total cost encompassed four stages in cervical cancer care (screening, diagnosis, detection, and treatment). We evaluated effectiveness in terms of quality-adjusted life-years (QALYs). The comparison was based on the incremental cost-effectiveness ratio (ICER), defined as the additional cost of a strategy divided by its additional effectiveness compared with its next best strategy. We used a willingness-to-pay threshold of \$50 000/QALY ([@bib45]) for assessing cost-effectiveness. We discounted the costs and the effectiveness at the same standard rate of 3% per annum. Decision-analytic model ----------------------- We used a previously published state-transition Markov model to simulate the natural history of human papillomavirus (HPV) infection and its potential development into cervical precancer or cancer. This model was first developed by investigators at Duke University ([@bib32]; [@bib34]; [@bib3]) and hereafter will be referred to as the 'Duke model.\' A hypothetical cohort of females moved through health states using a cycle length of 1 year. A total of 20 health states were used: Well, Benign Hysterectomy, Undetected HPV, Detected HPV, LSIL, High-Grade Squamous Intraepithelial Lesions (HSIL), Unknown Cancer (stages I-IV), Detected Cancer (stages I-IV), Cancer Survivor (stages I-IV), Death from Cervical Cancer, and Death from Other Causes. From the literature or previous published models of cervical cancer screening, we derived estimates of the regression and progression through the precancerous stages ([@bib11]; [@bib13]), HPV incidence rates adjusted by age ([@bib28]; [@bib20]; [@bib33]), age-specific prevalence of HPV infection ([@bib19]; [@bib25]; [@bib27]; [@bib20]), and rates of progression and regression of squamous intraepithelial lesions ([@bib41]). The estimation for survival rates for cervical cancer after diagnosis by stage was based on patient care evaluation data obtained from the American College of Surgeons (1990) and patterns-of-care studies ([@bib21]). Having a hysterectomy for benign disease affects the chance of developing cervical cancer; thus, the model included the age-specific hysterectomy rates from the National Hospital Discharge Survey ([@bib29]) and Maryland discharge data ([@bib26]). The mortality rates for deaths due to other causes were derived by subtracting age-specific cervical cancer mortality rates from the general mortality rates reported in the U.S. life tables ([@bib35]). Additionally, the natural history parameters were adjusted to determine the age-specific incidence of cervical cancer in an unscreened population ([@bib18]). For the screening and follow-up strategies, a woman would experience a sequential process beginning with either the Papanicolaou smear or ploidy screening, followed by, if warranted, diagnosis with colposcopy and appropriate treatment: loop electrosurgical excision procedure (LEEP) for HSIL, or surgery and radiation for cancer. Key assumptions included the following: (1) 10% of the normal Papanicolaou smears were retested, (2) women were compliant with clinical treatment recommendations, and (3) after the cancer treatment, a woman could only become a survivor after 5 years, die of cervical cancer, or die of other causes. Our study made enhancements to the Duke model in order to reflect updated clinical practice. First, we separated colposcopy and biopsy as two individual procedures (no longer a combined process) to allow for the possibility that no biopsy would occur after a normal colposcopy result. This would yield a slight reduction in cost. Second, we incorporated the findings from our work to better reflect the accuracy of colposcopy ([@bib5]). Third, if a woman had a Papanicolaou smear result of atypical squamous cells of undetermined significance (ASC-US) and a normal colposcopy result, we assumed that two additional follow-up visits over a 1-year period would also be required ([@bib7]; [@bib22]). Fourth, the sensitivity and specificity for all screening and diagnostic tests were updated based on recently published studies ([@bib15]; [@bib17]; [@bib14]). Fifth, we accounted for the clinical impact of HPV vaccination in reducing the prevalence and incidence of HPV infection and of progression into cervical neoplasia by a reduction factor. We assumed that as many as 67% of the women entering the model had been vaccinated. Also, the vaccine helped protect 70% of the infection cases which were associated with high risk oncogenic types 16 and 18 ([@bib38]; [@bib8]). These resulted in a validated reduction factor of 47% in the incidence and prevalence of HPV infection ([@bib31]) and LSIL. Effectiveness ------------- We changed the effectiveness measure from life years to QALYs, which incorporates both the quality of life and the survival of the study population ([@bib36]). A value of 1 indicates perfect health and 0 indicates death. This measure was also adjusted by age and health state ([@bib15]; [@bib12]). We assumed that the QALY of a woman after a hysterectomy was equal to that of a cervical cancer survivor. We also incorporated a short-term disutility of 0.01 for treating HSIL. Costs ----- Economic inputs in this decision-analytic model were based on the Duke model assumptions ([@bib32]). These data were derived from both claims and secondary data sources that captured all medical services for screening, diagnosis, and treatment of cervical cancer. The MarketScan database on privately insured individuals (MEDSTAT group) was utilized to estimate the costs in the group of women aged 20--64 years. The costs incurred by the older group (65+) were calculated from Medicare\'s resource-based relative value system fee schedule, clinical laboratory fee schedule, diagnosis-related group payment rates, and ambulatory surgery center payment rates. Cost-to-charge ratio was used to differentiate the costs from charges associated with hospital and physician services. All costs were transformed to 2012 U.S. dollars using the medical care component of the consumer price index ([@bib43]) ([Table 1](#tbl1){ref-type="table"}). Several cost parameters were modified to fit the structural changes in the model. First, we formulated the cost of a Papanicolaou smear from two published cost estimates, one for normal smears and the other for abnormal smears ([@bib15]). This single value for the Papanicolaou smear was adjusted by the proportion of normal and abnormal smears in a national survey on women screened for cervical cancer ([@bib9]). Second, we separated the cost of the biopsy and colposcopy procedures, as stated above. A cost fraction to separate these two costs from the former cost (when the biopsy and colposcopy procedures\' costs were combined) was derived from the billing data of a sample of patients from our comprehensive cancer center. Third, since the ploidy strategies are not yet practiced in the United States, the cost of the screening procedure with these strategies is unknown. Thus far, the ploidy strategies were reportedly inexpensive in the lab setting ([@bib17]; [@bib14]). We took a micro-costing approach to make an initial estimate of the costs of DNA ploidy analysis, based on a 5-year shelf life for a cytometer, an estimated cost of \$1 million, the ability to process 15 000 to 50 000 slides per year at the speed of 40 slides per hour, and inexpensive labor cost for technicians (high school diploma with short training) of \$20 per hour ([@bib14]). Then, for purposes of sensitivity analysis, we converted this cost of ploidy into a multiplicative factor as compared to the cost of the Papanicolaou smear, i.e., we estimated that the cost for ploidy analysis was approximately one-half the cost of the Papanicolaou smear procedure. In other words, the ploidy cost factor between any ploidy strategy procedure and the Papanicolaou smear procedure was assumed to be 0.5. This assumption was varied in the sensitivity analysis. Analysis -------- The analysis was conducted from a health-system perspective using a lifetime horizon. Our base-case analysis presented the estimated total cost, total effectiveness, and ICERs for each comparator against its next best alternative when the screening frequency was every 3 years ([@bib1]) and the ploidy cost factor was 0.5. A screening strategy was deemed as the most cost-effective strategy if it both was cost-effective under the willingness-to-pay threshold of \$50 000/QALY and had the highest effectiveness. Important parameters were chosen for the sensitivity analysis based on their potential impact on the assessment of cost-effectiveness ([Table 1](#tbl1){ref-type="table"}). In a one-way sensitivity analysis, we individually varied the selected parameters throughout their plausible ranges when the screening frequency was every 3 years and the ploidy cost factor was 0.5. A two-way sensitivity analysis investigated the cost-effectiveness rankings among comparators when the frequency of screening was varied from every 1 year, every 2 years, every 3 years, every 5 years, and every 10 years while the ploidy cost factor was varied from 0.5, 0.75, and 1.0. Although screening every 3 years is the standard, multiple intervals were included in the analysis to reflect the practice (some may screen more or less frequently than others). We ran the probabilistic sensitivity analysis with 10 000 iterations to examine the robustness of the total cost and total effectiveness of all seven strategies. The ploidy strategy that was most likely to be the most cost-effective (determined by the deterministic sensitivity analysis) was chosen as the best ploidy strategy. We then evaluated the cost-effectiveness between the best ploidy strategy and the Papanicolaou smear in a cost-effectiveness plane. Cost-effectiveness acceptability curves were used to compare all of the seven strategies across a wide range of willingness-to-pay thresholds. The probabilistic sensitivity analysis was conducted under the following assumptions: (1) probability parameters were fitted with beta distributions and cost parameters with either log-normal distributions or gamma distributions; (2) for beta and gamma distributions, the standard deviation was estimated as one-fourth of the plausible range; (3) all the distributions were independent; (4) the cost of the Papanicolaou smear was stochastically varied in a gamma distribution, and the cost of the ploidy strategy was always set as one-half of the cost of the Papanicolaou smear in the base-case. The model was programmed and the analysis was performed in TreeAge Pro 2014 software (TreeAge Software Inc., Williamstown, MA, USA). Results ======= Base-case analysis ------------------ In the base-case analysis, the ploidy 4 cell strategy was the only cost-effective screening strategy under the willingness-to-pay threshold of \$50 000/QALY. In comparison to the anchoring no screening strategy, screening with the ploidy 4 cell strategy increased the quality-adjusted life expectancy by 0.032 QALY and yielded an ICER of \$18 264/QALY. The Papanicolaou smear strategy was the most expensive; in addition, with a much higher ICER (\$192 502/QALY), the Papanicolaou smear strategy was found to be not cost-effective ([Table 2](#tbl2){ref-type="table"}). Deterministic sensitivity analysis ---------------------------------- We used the screening frequency of every 3 years and the ploidy cost factor being 0.5 (as the base-case) for the one-way sensitivity analyses. For most of these analyses, the ploidy 4 cell strategy was found to be the only cost-effective strategy, with ICERs ranging from \$15 151 to approximately \$40 000 per QALY. In some extreme cases in which the specificity of ploidy 4 cell was at the lower bound or the specificity of ploidy 5 cell was at the upper bound, ploidy 5 cell became the only cost-effective strategy. The Papanicolaou smear was not cost-effective, with high ICERs of approximately \$200 000/QALY. A one-way sensitivity analysis with the ploidy cost factor of 0.75 revealed that ploidy 4 cell was the only cost-effective strategy most of the time. Exceptionally, if the specificity of the Papanicolaou smear was as high as its upper bound, the Papanicolaou smear was the most cost-effective strategy (data not shown). A two-way sensitivity analysis was implemented by varying the frequency of screening (every 1, 2, 3, 5, and 10 years) and the ploidy cost factor (0.50, 0.75, and 1.0). For all screening strategies, the ICERs were smaller when the screening was done less frequently. Further, increasing the ploidy cost factor resulted in increases in the ICERs. For example, at the same screening frequency of every 2 years, the ICERs for the ploidy 4 cell strategy increased from \$24 161 to \$30 699 per QALY when the ploidy cost factor changed from 0.50 to 0.75 and to \$37 238 when the ploidy cost factor changed to 1.0. [Table 3](#tbl3){ref-type="table"} presents the most cost-effective screening strategies for the fifteen scenarios developed by changing the screening frequency and the ploidy cost factor. In ten of the twelve scenarios (excluding screening every 10 years), the ploidy 4 cell was the only cost-effective strategy in all scenarios, and it produced ICERs ranging from \$13 157 to \$42 655. When the screening frequency was every 1 year (no longer the clinical recommendation) and the ploidy cost factor was either 0.75 or 1.0, none of the screening strategies was found to be cost-effective using the \$50 000/QALY threshold. The Papanicolaou smear strategy produced limited additional effectiveness with much greater cost, yielding ICERs as large as \$463 506. The Papanicolaou smear became the next best strategy after the ploidy 4 cell strategy in only three of the twelve scenarios. Of interest, the Papanicolaou smear strategy would be the most cost-effective if the screening frequency was every 10 years. However, with that frequency, the ploidy 4 cell strategy was cost-effective with ICERs less than \$16 000/QALY (data not shown). Based on the results described above, the ploidy 4 cell strategy was selected as the best ploidy strategy in the deterministic sensitivity analysis. Probabilistic sensitivity analysis ---------------------------------- In the probabilistic sensitivity analysis, the cost and the effectiveness of the seven strategies were plotted ([Figure 1](#fig1){ref-type="fig"}). The expected cost varied in increments of thousands of U.S. dollars; however, the variation in the expected effectiveness was as small as hundredths of a QALY. The seven strategies were positioned from left to right in increasing order of screening test sensitivities. The no screening strategy was the farthest to the left and apart from the other six strategies because it had the least effectiveness by a large margin. This effectiveness also remained unchanged because it did not involve any variables included in the sensitivity analysis. The Papanicolaou smear strategy was the farthest to the right since it gained the most effectiveness. It also had the widest variation both in cost and effectiveness. The cost of the Papanicolaou smear was the key driver of this strategy\'s total cost variation. The largest plausible range of the sensitivity and specificity (compared with the five ploidy strategies) of the Papanicolaou smear resulted in the most extended spread for this strategy on the effectiveness axis. The ploidy strategies and the no screening strategy had comparable cost ranges because they were influenced by the same set of cost variables (excluding the screening procedure cost). The cost-*versus*-effectiveness scatter plots for the five ploidy strategies were located next to each other and partially overlapped, since their screening test characteristics were similar. A comparison of the Papanicolaou smear strategy to the ploidy 4 cell strategy (the best ploidy strategy determined by the deterministic sensitivity analysis) yielded ICERs primarily in the northeast quadrant of the cost-effectiveness plane ([Figure 2](#fig2){ref-type="fig"}). These ICERs had a probability of 0.91 of being larger than the willingness-to-pay threshold. Based on the proportion of iterations for which each strategy had the highest net benefit, we investigated the probabilities of a strategy being cost-effective across a wide range of willingness-to-pay thresholds, from \$0 to \$150 000 per QALY, using cost-effectiveness acceptability curves for all seven strategies ([Figure 3](#fig3){ref-type="fig"}). The ploidy 4 cell strategy had the highest probability of being cost effective among the five ploidy strategies if the willingness-to-pay threshold was less than \$150 000/QALY. The ploidy 4 cell strategy had a higher probability of being cost-effective than the Papanicolaou smear at the willingness-to-pay threshold of \$50 000/QALY and at all other larger thresholds up to \$120 000/QALY. The cost-effectiveness of the ploidy 4 cell strategy was inferior to the Papanicolaou smear only when the willingness-to-pay increased beyond \$120 000/QALY, which may be considered as impractical in most US settings. Discussion ========== Our study---which is, as far as we know based on a MEDLINE literature review, the first economic analysis of DNA ploidy analysis for cervical cancer screening---shows that DNA ploidy analysis is less expensive than and similarly effective as liquid-based Papanicolaou smear screening. Within the baseline model, DNA ploidy analysis using the ploidy 4 cell strategy was demonstrated as cost-effective using the willingness-to-pay threshold of \$50 000/QALY. This result was supported by the probabilistic sensitivity analysis, in which the ploidy 4 cell strategy had the highest probability of being cost-effective under the aforementioned threshold. The sensitivity analysis also revealed that some of the other ploidy strategies (i.e., the ploidy 5 cell and ploidy 3 cell strategies) had the potential to be cost-effective if the diagnostic characteristics (i.e., sensitivity and specificity) improved. These results are supportive of previous studies showing that DNA ploidy analysis ([@bib17]) or semi-automated cytology ([@bib24]) achieves diagnostic characteristics comparable to those of the liquid-based Papanicolaou smear. Models can guide decision-making regarding the use of new technology. In this study, we have also applied decision analysis and cost-effectiveness analysis to determine the optimal cut point for a screening test. As shown by our previous work ([@bib6]), diagnostic cut points should be determined by conducting receiver operating characteristic (ROC) curve analysis; the optimal cutoff value for a diagnostic test can be found on the ROC curve where the slope of the curve is equal to (C/B) × (1-p\[D\])/p\[D\], where p\[D\] is the disease prevalence and C/B is the ratio of the net costs of treating nondiseased individuals to the net benefits of treating diseased individuals. Therefore, cut points are identified by an arbitrary decision, or using assumptions that do not necessarily hold true, e.g., that the burden of a false-positive test is the same as the burden of a false-negative test. For instance, the comparative evaluation between DNA ploidy analysis, HPV testing, and conventional cytology presented by Guillaud *et al* ([@bib17]) used a ploidy 3 cell strategy, which was chosen as a midpoint strategy. While the results showed that DNA ploidy analysis performed comparably to conventional screening, the ploidy 3 cell strategy was chosen somewhat arbitrarily. By methodically comparing several ploidy strategies along with the liquid-based Papanicolaou smear, our decision model revealed that the ploidy 4 cell strategy results in a cost-effective screening strategy. Additionally, inherent of an appropriately designed decision analysis or cost-effectiveness analysis, our model incorporates the consequences of undertreatment (missing a case of precancer or cancer) or overtreatment (incorporating costs and some burden of treatment). This study has limitations, including that to conduct our analyses, we adapted a cervical cancer screening model that was first published 15 years ago ([@bib34]). However, it should be recognized that we enhanced the model in several important ways (e.g., incorporating utilities and diagnostic protocols), described above, to better reflect the current standard of clinical care. At this point, we did not evaluate other screening strategies, such as triage methods using Ki67 in conjunction with HPV tests ([@bib30]). The model was kept simple to focus on DNA ploidy analysis, comparing it with two alternatives: First, although it is not an ethically viable clinical strategy, a no screening alternative was included in the analysis as benchmark for evaluating potential cost-effective strategies and for the purpose of validity check. Second, we compared DNA ploidy analysis with the standard of care, the Papanicolaou smear. This liquid-based screening standard in the United States is well established, and health care decision-making operates under a paradigm in which the alternative that provides maximum health benefits for a given level of resources is chosen ([@bib37]). Thus, it would be difficult to implement a new program that offers a lower health benefit in spite of having lower costs ([@bib23]; [@bib24]). Nevertheless, as lowering the cost of health care has taken greater priority in recent years, DNA ploidy analysis may emerge as a reasonable alternative ([@bib39]). DNA ploidy analysis may be more feasible in low-resource settings. We included less frequent screening (i.e., every 5 or 10 years) as an initial exploration of how well DNA ploidy might work in low-resource settings. However, the applicability of our results in low-resource settings cannot fully be determined without more specific information about the epidemiology of cervical cancer and its treatment in that particular setting. In conclusion, we have shown that when DNA ploidy analysis is compared with liquid-based Papanicolaou screening, DNA ploidy analysis is a cost-effective alternative. Cervical cancer is the leading cause of cancer deaths in lower-resource settings ([@bib2]). Preventative screening programs centered on liquid-based cytology require a comprehensive and costly infrastructure. Thus, DNA ploidy analysis is a promising alternative in health care environments in which inexpensive and semi-automated services are essential. The authors wish to thank Sunita C. Patterson for editorial contributions and Jennifer M. Gatilao for administrative assistance. This study was funded in part by grant numbers P01 CA082710, P30 CA006927, and CA016672 from the National Cancer Institute/National Institutes of Health (NCI/NIH). Van T. Nghiem was supported by a Predoctoral Fellowship, The University of Texas School of Public Health, Cancer Education and Career Development Program -- NCI/NIH Grant R25 CA57712. **Disclaimer** The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Cancer Institute or the National Institutes of Health. Findings from this study were presented, in part, at 36th Annual North American Meeting of the Society for Medical Decision Making in October 2014. The authors declare no conflict of interest. ![Scatter plot of expected cost and quality-adjusted life expectancy for all seven strategies.](bjc201595f1){#fig1} ![**Cost-effectiveness plane for a comparison between the Papanicolaou smear and ploidy 4 cell strategies.** Abbreviation: WTP=willingness-to-pay.](bjc201595f2){#fig2} ![**Cost-effectiveness acceptability curves comparing seven strategies: no screening, Papanicolaou (Pap) smear, and the five ploidy strategies.** Curves indicate the probability that the given strategy is cost-effective at a given willingness-to-pay.](bjc201595f3){#fig3} ###### Parameters for sensitivity analyses **Parameter** **Mean** **Plausible range** **Distribution** **Source** ---------------------------------------------- ---------- --------------------- ------------------ ----------------------- **Costs (2012 US\$)** Colposcopy \$292 \$206--\$371 Log-normal \(8\) Biopsy \$322 \$227--\$408 Log-normal   DNA ploidy analysis \$44 \$44--\$88 n/a Assumption (see text) Papanicolaou smear \$88 \$44--\$252 Gamma \(26\) Treating HSIL \$4996 \$2268--\$6887 Log-normal \(8\) Treating cancer stage I \$28 914 \$15 467--\$35 962 Log-normal   Treating cancer stage II \$44 357 \$19 228--\$47 667 Log-normal   Treating cancer stage III \$44 357 \$19 228--\$47 667 Log-normal   Treating cancer stage IV \$66 006 \$20 762--\$76 213 Log-normal   **Screening test operating characteristics** Sensitivity, Papanicolaou smear 0.84 0.69--0.88 Beta \(26\) Specificity, Papanicolaou smear 0.88 0.77--0.93 Beta   Sensitivity, ploidy 1 cell 0.74 0.67--0.79 Beta \(1\) Specificity, ploidy 1 cell 0.82 0.79--0.83 Beta   Sensitivity, ploidy 2 cell 0.65 0.58--0.71 Beta   Specificity, ploidy 2 cell 0.90 0.88--0.92 Beta   Sensitivity, ploidy 3 cell 0.59 0.52--0.65 Beta   Specificity, ploidy 3 cell 0.93 0.92--0.94 Beta   Sensitivity, ploidy 4 cell 0.55 0.48--0.61 Beta   Specificity, ploidy 4 cell 0.95 0.93--0.96 Beta   Sensitivity, ploidy 5 cell 0.51 0.43--0.56 Beta   Specificity, ploidy 5 cell 0.95 0.93--0.96 Beta   ###### Discounted costs, discounted quality-adjusted life expectancy (QALYs), and incremental cost-effectiveness ratios (ICERs) for the base-case analysis (screening every 3 years) **Strategy** **(Sensitivity, specificity)** **Cost (\$)** **Incr. cost (\$)** **Eff. (QALYs)** **Incr. eff. (QALYs)** **ICER (\$/QALY)** **Notes** -------------------- -------------------------------- --------------- --------------------- ------------------ ------------------------ -------------------- ----------------------------- No screening   \$189   24.685       Ploidy 5 cell (0.51; 0.95) \$763 \$574 24.715 0.030 \$18 821 Extended dominance Ploidy 4 cell (0.55; 0.95) \$767 \$577 24.716 0.032 \$18 264 [a](#t2-fn2){ref-type="fn"} Ploidy 3 cell (0.59; 0.93) \$878 \$110 24.717 0.001 \$132 803   Ploidy 2 cell (0.65; 0.90) \$1044 \$167 24.718 0.001 \$148 863   Ploidy 1 cell (0.74; 0.82) \$1482 \$438 24.719 0.001 \$418 436 Extended dominance Papanicolaou smear (0.84; 0.88) \$1758 \$276 24.722 0.004 \$192 502 [b](#t2-fn3){ref-type="fn"} Abbreviations: Eff= effectiveness; Incr= incremental. Was compared with the no screening strategy because the ploidy 5 cell strategy was dominated in an extended sense. Was compared with the ploidy 2 cell strategy because the ploidy 1 cell strategy was dominated in an extended sense. ###### The most cost-effective strategy, its next best alternative, and the Papanicolaou smear with the ICERs in a two-way sensitivity analysis with respect to screening frequency and ploidy cost factor   **Ploidy cost factor=0.5** **Ploidy cost factor=0.75** **Ploidy cost factor=1.0** -------------------------- -------------------------------------------------- -------------------------------------------------------- ---------------------------- ------------------------------ ----------------------- ------------------------------- Screening every 1 year Most cost-effective Ploidy 4 cell, \$42 655 Most cost-effective Ploidy 4 cell, \$54 008 Most cost-effective Ploidy 4 cell, \$65 361   Next best alternative[a](#t3-fn1){ref-type="fn"} Ploidy 3 cell, more than 1M[b](#t3-fn2){ref-type="fn"} Next best alternative Ploidy 3 cell, more than 1M Next best alternative Ploidy 3 cell, more than 1M   Papanicolaou smear Dominated Papanicolaou smear Dominated Papanicolaou smear Dominated Screening every 2 years Most cost-effective Ploidy 4 cell, \$24 161 Most cost-effective Ploidy 4 cell, \$30 699 Most cost-effective Ploidy 4 cell, \$37 238   Next best alternative Ploidy 3 cell, \$284 249 Next best alternative Ploidy 3 cell, \$297 995 Next best alternative Papanicolaou smear, \$276 891   Papanicolaou smear \$463 506 Papanicolaou smear \$351 416 Papanicolaou smear \$276 891 Screening every 3 years Most cost-effective Ploidy 4 cell, \$18 824 Most cost-effective Ploidy 4 cell, \$23 270 Most cost-effective Ploidy 4 cell, \$28 277   Next best alternative Ploidy 3 cell, \$132 803 Next best alternative Ploidy 3 cell, \$139 252 Next best alternative Papanicolaou smear, \$119 198   Papanicolaou smear \$192 502 Papanicolaou smear \$148 501 Papanicolaou smear \$119 198 Screening every 5 years Most cost-effective Ploidy 4 cell, \$13 157 Most cost-effective Ploidy 4 cell, \$16 916 Most cost-effective Ploidy 4 cell, \$20 674   Next best alternative Ploidy 3 cell, \$66 184 Next best alternative Ploidy 3 cell, \$69 444 Next best alternative Papanicolaou smear, \$57 543   Papanicolaou smear \$92 403 Papanicolaou smear \$71 278 Papanicolaou smear \$57 543 Screening every 10 years Most cost-effective Papanicolaou smear, \$47 176 Most cost-effective Papanicolaou smear, \$36 727 Most cost-effective Papanicolaou smear, \$29 655   Next best alternative n/a Next best alternative n/a Next best alternative n/a   Papanicolaou smear \$47 176 Papanicolaou smear \$36 727 Papanicolaou smear \$29 655 Compared to the most cost-effective strategy. More than \$1 000 000/QALY.
2023-09-30T01:27:17.568517
https://example.com/article/8751
Peptide growth factors signal differentially through protein kinase C to extracellular signal-regulated kinases in neonatal cardiomyocytes. The extracellular signal-regulated kinases 1/2 (ERK1/2) are activated in cardiomyocytes by Gq protein-coupled receptors and are associated with induction of hypertrophy. Here, we demonstrate that, in primary cardiomyocyte cultures, ERK1/2 were also significantly activated by platelet-derived growth factor (PDGF), epidermal growth factor (EGF) or fibroblast growth factor (FGF), but insulin, insulin-like growth factor 1 (IGF-1) and nerve growth factor (NGF) had relatively minor effects. PDGF, EGF or FGF increased cardiomyocyte size via ERK1/2, whereas insulin, IGF-1 or NGF had no effect suggesting minimum thresholds/durations of ERK1/2 signaling are required for the morphological changes associated with hypertrophy. Peptide growth factors are widely accepted to activate phospholipase C gamma1 (PLCgamma1) and protein kinase C (PKC). In cardiomyocytes, only PDGF stimulated tyrosine phosphorylation of PLCgamma1 and nPKCdelta. Furthermore, activation of ERK1/2 by PDGF, but not EGF, required PKC activity. In contrast, EGF substantially increased Ras.GTP with rapid activation of c-Raf, whereas stimulation of Ras.GTP loading by PDGF was minimal and activation of c-Raf was delayed. Our data provide clear evidence for differential coupling of PDGF and EGF receptors to the ERK1/2 cascade, and indicate that a minimum threshold/duration of ERK1/2 signaling is required for the development of cardiomyocyte hypertrophy.
2023-10-19T01:27:17.568517
https://example.com/article/1054
Platelet-Rich Plasma Reduces Retear Rates After Arthroscopic Repair of Small- and Medium-Sized Rotator Cuff Tears but Is Not Cost-Effective. It has been suggested that platelet-rich plasma (PRP) improves healing after arthroscopic rotator cuff repair. The current literature provides ample but inconsistent data on this topic. To systematically review the current in vivo evidence for the use of platelet concentrates (PRP) in the arthroscopic treatment of rotator cuff tears to assess effectiveness, safety, and cost-effectiveness. Meta-analysis and cost-effectiveness analysis. Published evidence from controlled, human trials of rotator cuff repair augmented with platelet concentrates was systematically gathered, and data on retear rates were extracted. Mathematical and clinical heterogeneity was evaluated, and fixed-effect meta-analysis was performed to calculate the risk ratio (RR) of retears and the number needed to treat (NNT). Subgroup analyses were made for small/medium tears (n = 404) and large/massive tears (n = 374). Cost-effectiveness was assessed using data from this meta-analysis and using cost data from the literature, including extensive sensitivity analyses, to calculate the incremental cost-effectiveness ratio (ICER). Thirteen studies published between 2010 and 2014 were identified for analysis. The RR for retear for all patients was 0.87 (95% CI, 0.67-1.12; P = .286). For small- and medium-sized tears (<3 cm), the RR for retear was 0.60 (95% CI, 0.37-0.97), consistent with a significant difference in favor of PRP use (P = .038). This translated into an NNT of 14 (95% CI, 7-125). However, at an ICER of US$127,893 per quality-adjusted life year gained, assuming a 5% revision rate, the use of PRP was not cost-effective for small- and medium-sized tears. In large tears, even with double-row repair, the beneficial effects of PRP alone are insufficient to compensate the progressed tissue damage. The study data suggest that PRP may promote healing of small- and medium-sized tears to reduce retear rates. However, despite the substantial biological effect, at current cost, the use of PRP is not cost-effective in arthroscopic repair of small- and medium-sized tears.
2024-05-10T01:27:17.568517
https://example.com/article/9016
Amorphous semiconductor films, such as amorphous silicon films, are usually deposited on a substrate from a vapor phase, e.g., by decomposing raw gaseous material by glow discharge. Vapor phase deposition facilitates obtaining a film with a large surface area. Such amorphous semiconductor films have been utilized as photoelectric conversion films in low-cost photoelectric conversion modules. A polymer or metal film used as a flexible substrate facilitates obtaining a thin and light-weight photoelectric conversion module, and facilitates continuous growth of a photoelectric conversion film on an elongated substrate. Japanese Patent Document No. H06-342924 discloses a module, as shown in FIG. 2, for efficiently generating electric power from an amorphous silicon photoelectric conversion film on a flexible substrate. The module includes a flexible polymer film substrate 1 and a plurality of columns of photoelectric conversion elements on the substrate. The photoelectric conversion elements are formed by dividing a photoelectric conversion film on the flexible substrate, a first electrode layer on the photoelectric conversion film and a second electrode layer between the substrate and the conversion film, into rows and columns. Third electrodes 2 are on the back surface of the substrate 1. A third electrode 2 is connected through holes in the substrate 1 to a transparent first electrode on one of two adjoining elements and to the second electrode between another one of the adjoining elements and the substrate. The third electrodes 2 are formed by dividing a metal electrode layer deposited on the back surface of the substrate 1, except the periphery thereof, into rows and columns. To connect the columns of the photoelectric conversion elements, a connecting electrode, connected to the first electrode on an end of a column 20 of the connecting electrodes 2, is connected to another connecting electrode, connected to the second electrode on an end of an adjacent column 20 of the connecting electrodes 2. This connection is made by forming inter-column connecting portions 21 consisting of two connecting electrodes connected to each other. A positive terminal 41 is led out from a positive electrode 31, i.e. a transparent first electrode on an end of one of the outermost columns 20 of the connecting electrodes. A negative terminal 42 is led out from a negative electrode 32, i.e. a second electrode on an end of another one of the outermost columns 20 of the connecting electrodes. A plurality of the photoelectric conversion modules of FIG. 2 are connected in parallel with wiring 5 as shown in FIG. 3 to obtain an area sufficient to perform a desired photoelectric conversion. The methods for lead-out of the terminals and for parallel connection of the modules are disclosed in Japanese Patent Documents No. H07-22640 and H07-99336. The photoelectric conversion modules of FIGS. 2 and 3 have the following disadvantages: (1) For tight bonding of the metal film for the inter-column connecting portion 21, this film is made thin, e.g., of silver 1000 Angstroms thick. As a result, the inter-column connecting portion 21 has considerable electrical resistance. Since only half of the inter-column connecting portion 21 is utilized for photoelectric conversion, the other half is dead or inactive. (2) Typically, laser patterning is used for dividing the photoelectric conversion film and the electrode layers into rows and columns. Even though the horizontal width of the module is greater than the vertical length, as shown in the figures, sufficient positional precision is still required in patterning longitudinal lines. This is difficult because the substrate tends to deform. Also, the time required for patterning is increased because of position control. (3) The terminals 41 and 42 are often led out by soldering conductive tape, by bonding conductive tape with conductive adhesive, or by using conductive and adhesive tapes. Adhesives or adhesive tapes tend to exude from their proper locations. (4) It is necessary to connect wiring 5, in addition to bonding the terminals 41 and 42 for parallel connection. As two kinds of conductors have to be dealt with, the connecting process is complicated, cost is increased, and yield is reduced. (5) Since the wiring 5 is visible from the outside, the conventional flexible photoelectric conversion module has a poor appearance.
2023-09-05T01:27:17.568517
https://example.com/article/6472
Q: selenium web driver no longer working correctly I am using the selenium module in python and it has been working as expected until I had to update firefox today. After the firefox update, everytime webdriver.Firefox() is assigned to the variable driver, the firefox web browser opens in a default page and then the python program stalls waiting without executing the rest of the code. I am new to selenium so I do not know if there is a work around for this. from selenium import webdriver from selenium.webdriver.common.by import By from selenium.webdriver.support.ui import WebDriverWait from selenium.webdriver.support import expected_conditions as EC driver = webdriver.Firefox() driver.get(#somewebsite) A: you need to upgrade selenium to 2.45, which was released today. check out: https://pypi.python.org/pypi/selenium or pip install -U selenium
2023-12-03T01:27:17.568517
https://example.com/article/8576
"If you thought Tyrian was insane before, wait till you see that scene…" # # # # #
2024-03-18T01:27:17.568517
https://example.com/article/7517
Risk factors for tuberculosis among human immunodeficiency virus-infected persons. A case-control study in Belo Horizonte, Minas Gerais, Brazil (1985-1996). The objective of this study was to identify tuberculosis risk factors and possible surrogate markers among human immunodeficiency virus (HIV)-infected persons. A retrospective case-control study was carried out at the HIV outpatient clinic of the Universidade Federal de Minas Gerais in Belo Horizonte. We reviewed the demographic, social-economical and medical data of 477 HIV-infected individuals evaluated from 1985 to 1996. The variables were submitted to an univariate and stratified analysis. Aids related complex (ARC), past history of pneumonia, past history of hospitalization, CD4 count and no antiretroviral use were identified as possible effect modifiers and confounding variables, and were submitted to logistic regression analysis by the stepwise method. ARC had an odds ratio (OR) of 3.5 (CI 95% - 1.2-10.8) for tuberculosis development. Past history of pneumonia (OR 1.7 - CI 95% 0.6-5.2) and the CD4 count (OR 0.4 - CI 0. 2-1.2) had no statistical significance. These results show that ARC is an important clinical surrogate for tuberculosis in HIV-infected patients. Despite the need of confirmation in future studies, these results suggest that the ideal moment for tuberculosis chemoprophylaxis could be previous to the introduction of antiretroviral treatment or even just after the diagnosis of HIV infection.
2024-07-17T01:27:17.568517
https://example.com/article/1224
This Sunday, Orlando City will play their final match of the MLS season before the start of the offseason. Head Coach Jason Kreis has sent a clear message to his players-- he wants a win. But as players and coaches alike get ready to look at the offseason, Kreis already knows what he needs of his players next season. “I think first and foremost you have to have a large group of players willing to give anything. That appreciate winning more, and that really get angry about losing,” Kreis said after training on Thursday. “When we have a higher number of those types of players that are extremely competitive and take a ton of pride in what they do every single day then you have real competition for starting positions every single weekend.” “They should have the motivation within them to be hungry and to improve their career themselves, and to be part of a winning team,” Kreis continued. “That should mean something. Especially going next year into what’s going to be an absolutely fantastic stadium, with as we know, an absolutely fantastic crowd. We need to begin to represent ourselves and give the fans what they deserve here.” Lions to Celebrate Camping World Stadium Era with Throwback Game on Sunday Read While competition is incredibly important heading into next season, Kreis also wants to make sure that his players are comfortable and are having fun when they play. In training last week, Kreis split players into three groups and they played mini-training games. The players were having a blast. “For me, it’s also important to keep the right mood around the group, to keep people happy. I truly believe that happiness means something,” Kreis said. “I think people perform at their best when they have a certain level of comfort and a certain level of enjoyment about what they’re doing. So, there are days over the year that we’ll always look to for a little bit of fun, mixed in with a bit of competition as well.” Orlando City will play their final match of the season this Sunday, October 23rd at 4:00pm.
2024-07-24T01:27:17.568517
https://example.com/article/4256
Q: How to handle expressions in Haskell? Let's say I have : f :: Double -> Double f x = 3*x^2 + 5*x + 9 I would like to compute the derivative of this function and write derivate f so that derivate f == \x -> 6*x + 5 but how to define derivate? derivate :: (a -> a) -> (a -> a) derivate f = f' -- how to compute f'? I'm aware there is no native way to do this, but is there a library that can? Do we have to rely on "meta"-datatypes to achieve this? data Computation = Add Exp Expr | Mult Expr Expr | Power Expr Expr -- etc Then, is it not a pain to make a corresponding constructor for each function ? However, datatypes should not represent functions (except for parsers). Is Pure a good alternative because of its term-rewriting feature? Doesn't it have its drawbacks as well? Are lists affordable? f :: [Double] f = [3, 5, 9] derivate :: (a -> [a]) derivate f = (*) <$> f <*> (getNs f) compute f x = sum $ ((*) . (^) x) <$> (getNs f) <*> f getNs f = (reverse (iterate (length f) [0..])) Haskell now looks like it depends on LISP with a less appropriate syntax. Function and arguments waiting to be used together are quite stored in datatypes. Plus, it's not very natural. They don't seem to be "flexible" enough to be able my derivate function other than polynomials, such as homographic functions. Right now, for example, I would like to use derivatives for a game. The character runs on a floor made using a function, and I would like him to slide if the floor is steep enough. I also need to solve equations for various purposes. Some examples: I'm a spaceship and I want to take a nap. During my sleep, if I don't place myself carefully, I might crash on a planet because of gravity. I don't have enough gas to go far away from celestial objects and I don't have a map either. So I must place myself between the objects in this area so that the sum of their gravitationnal influence on me is canceled. x and y are my coordinates. gravity is a function that takes two objects and return the vector of the gravitationnal force between them. If there are two objects, say the Earth and the Moon, besides me, all I need to do to find where to go is to solve: gravity earth spaceship + gravity moon spaceship == (0, 0) It's much simpler and faster, etc., than to create a new function from scratch equigravityPoint :: Object -> Object -> Object -> Point. If there are 3 objects besides me, it's still simple. gravity earth spaceship + gravity moon spaceship + gravity sun spaceship == (0, 0) Same for 4, and n. Handling a list of objects is much simpler this way than with equigravityPoint. Other example. I want to code an ennemy bot that shoots me. If he just shoots targeting my current position, he will get me if I run towards me, but he'll miss me if I jump and fall on him. A smarter bot thinks like that: "Well, he jumped from a wall. If I shoot targeting where he is now the bullet won't get him, because he will have moved until then. So I'm gonna anticipate where he'll be in a few seconds and shoot there so that the bullet and him reach this point at the same time". Basically, I need the ability to compute trajectories. For example, for this case, I need the solution to trajectoryBullet == trajectoryCharacter, which gives a point where the line and the parabola meet. A similar and simpler example not involving speed. I'm a fireman bot and there's a building in fire. Another team of firemen is fighting the fire with their water guns. I am and there are people jumping from . While my friends are shooting water, I hold the trampoline. I need to go where the people will fall before they do. So I need trajectories and equation-solving. A: One way of doing this is to do automatic differentiation instead of symbolic differentiation; this is an approach where you simultaneously compute both f(x) and f′(x) in one computation. There's a really cool way of doing this using dual numbers that I learned about from Dan "sigfpe" Piponi's excellent blog post on automatic differentiation. You should probably just go read that, but here's the basic idea. Instead of working with the real numbers (or Double, our favorite (?) facsimile of them), you define a new set, which I'm going to call D, by adjoining a new element ε to ℝ such that ε2 = 0. This is much like the way we define the complex numbers ℂ by adjoining a new element i to ℝ such that i2 = -1. (If you like algebra, this is the same as saying D = ℝ[x]/⟨x2⟩.) Thus, every element of D is of the form a + bε, where a and b are real. Arithmetic over the dual numbers works like you expect: (a + bε) ± (c + dε) = (a + c) ± (b + d)ε; and (a + bε)(c + dε) = ac + bcε + adε + bdε2 = ac + (bc + ad)ε. (Since ε2 = 0, division is more complicated, although the multiply-by-the-conjugate trick you use with the complex numbers still works; see Wikipedia's explanation for more.) Now, why are these useful? Intuitively, the ε acts like an infinitesimal, allowing you to compute derivatives with it. Indeed, if we rewrite the rule for multiplication using different names, it becomes (f + f′ε)(g + g′ε) = fg + (f′g + fg′)ε And the coefficient of ε there looks a lot like the product rule for differentiating products of functions! So, then, let's work out what happens for one large class of functions. Since we've ignored division above, suppose we have some function f : ℝ → ℝ defined by a power series (possibly finite, so any polynomial is OK, as are things like sin(x), cos(x), and ex). Then we can define a new function fD : D → D in the obvious way: instead of adding real numbers, we add dual numbers, etc., etc. Then I claim that fD(x + ε) = f(x) + f′(x)ε. First, we can show by induction that for any natural number i, it's the case that (x + ε)i = xi + ixi-1ε; this will establish our derivative result for the case where f(x) = xk. In the base case, this equality clearly holds when i = 0. Then supposing it holds for i, we have (x + ε)i+1 = (x + ε)(x + ε)i by factoring out one copy of (x + ε) = (x + ε)(xi + ixi-1ε) by the inductive hypothesis = xi+1 + (xi + x(ixi-1))ε by the definition of dual-number multiplication = xi+1 + (i+1)xiε by simple algebra. And indeed, this is what we wanted. Now, considering our power series f, we know that f(x) = a0 + a1x + a2x2 + … + aixi + … Then we have fD(x + ε) = a0 + a1(x + ε) + a2(x + ε)2 + … + ai(x + ε)i + … = a0 + (a1x + a1ε) + (a2x2 + 2a2xε) + … + (aixi + iaixi-1ε) + … by the above lemma = (a0 + a1x + a2x2 + … + aixi + …) + (a1ε + 2a2xε + … + iaixi-1ε + …) by commutativity = (a0 + a1x + a2x2 + … + aixi + …) + (a1 + 2a2x + … + iaixi-1 + …)ε by factoring out the ε = f(x) + f′(x)ε by definition. Great! So dual numbers (at least for this case, but the result is generally true) can do differentiation for us. All we have to do is apply our original function to, not the real number x, but the dual number x + ε, and then extract the resulting coefficient of ε. And I bet you can see how one could implement this in Haskell: data Dual a = !a :+? !a deriving (Eq, Read, Show) infix 6 :+? instance Num a => Num (Dual a) where (a :+? b) + (c :+? d) = (a+c) :+? (b+d) (a :+? b) - (c :+? d) = (a-c) :+? (b-d) (a :+? b) * (c :+? d) = (a*c) :+? (b*c + a*d) negate (a :+? b) = (-a) :+? (-b) fromInteger n = fromInteger n :+? 0 -- abs and signum might actually exist, but I'm not sure what they are. abs _ = error "No abs for dual numbers." signum _ = error "No signum for dual numbers." -- Instances for Fractional, Floating, etc., are all possible too. differentiate :: Num a => (Dual a -> Dual a) -> (a -> a) differentiate f x = case f (x :+? 1) of _ :+? f'x -> f'x -- Your original f, but with a more general type signature. This polymorphism is -- essential! Otherwise, we can't pass f to differentiate. f :: Num a => a -> a f x = 3*x^2 + 5*x + 9 f' :: Num a => a -> a f' = differentiate f And then, lo and behold: *Main> f 42 5511 *Main> f' 42 257 Which, as Wolfram Alpha can confirm, is exactly the right answer. More information about this stuff is definitely available. I'm not any kind of expert on this; I just think the idea is really cool, so I'm taking this chance to parrot what I've read and work out a simple proof or two. Dan Piponi has written more about dual numbers/automatic differentiation, including a post where, among other things, he shows a more general construction which allows for partial derivatives. Conal Elliott has a post where he shows how to compute derivative towers (f(x), f′(x), f″(x), …) in an analogous way. The Wikipedia article on automatic differentiation linked above goes into some more detail, including some other approaches. (This is apparently a form of "forward mode automatic differentiation", but "reverse mode" also exists, and can apparently be faster.) Finally, there's a Haskell wiki page on automatic differentiation, which links to some articles—and, importantly, some Hackage packages! I've never used these, but it appears that the ad package, by Edward Kmett is the most complete, handling multiple different ways of doing automatic differentiation—and it turns out that he uploaded that package after writing a package to properly answer another Stack Overflow question. I do want to add one other thing. You say "However, datatypes should not represent functions (except for parsers)." I'd have to disagree there—reifying your functions into data types is great for all sorts of things in this vein. (And what makes parsers special, anyway?) Any time you have a function you want to introspect, reifying it as a data type can be a great option. For instance, here's an encoding of symbolic differentiation, much like the encoding of automatic differentiation above: data Symbolic a = Const a | Var String | Symbolic a :+: Symbolic a | Symbolic a :-: Symbolic a | Symbolic a :*: Symbolic a deriving (Eq, Read, Show) infixl 6 :+: infixl 6 :-: infixl 7 :*: eval :: Num a => (String -> a) -> Symbolic a -> a eval env = go where go (Const a) = a go (Var x) = env x go (e :+: f) = go e + go f go (e :-: f) = go e - go f go (e :*: f) = go e * go f instance Num a => Num (Symbolic a) where (+) = (:+:) (-) = (:-:) (*) = (:*:) negate = (0 -) fromInteger = Const . fromInteger -- Ignoring abs and signum again abs = error "No abs for symbolic numbers." signum = error "No signum for symbolic numbers." -- Instances for Fractional, Floating, etc., are all possible too. differentiate :: Num a => Symbolic a -> String -> Symbolic a differentiate f x = go f where go (Const a) = 0 go (Var y) | x == y = 1 | otherwise = 0 go (e :+: f) = go e + go f go (e :-: f) = go e - go f go (e :*: f) = go e * f + e * go f f :: Num a => a -> a f x = 3*x^2 + 5*x + 9 f' :: Num a => a -> a f' x = eval (const x) $ differentiate (f $ Var "x") "x" And once again: *Main> f 42 5511 *Main> f' 42 257 The beauty of both of these solutions (or one piece of it, anyway) is that as long as your original f is polymorphic (of type Num a => a -> a or similar), you never have to modify f! The only place you need to put derivative-related code is in the definition of your new data type and in your differentiation function; you get the derivatives of your existing functions for free. A: Numerical derivative can be done easily: derive f x = (f (x + dx) - f (x - dx)) / (2 * dx) where dx = 0.00001 However, for symbolic derivatives, you need to create an AST, then implement the derivation rules through matching and rewriting the AST.
2024-03-06T01:27:17.568517
https://example.com/article/2154
1. Introduction {#sec1-viruses-11-00857} =============== Thottapalayam virus (TPMV), a previously unclassified virus isolated from an Asian house shrew (*Suncus murinus*), captured in southern India in 1964 \[[@B1-viruses-11-00857]\], predated the discovery of Hantaan virus (HTNV), the prototype virus of hemorrhagic fever with renal syndrome (HFRS), in the striped field mouse (*Apodemus agrarius*) in Korea by more than a decade \[[@B2-viruses-11-00857]\]. However, this observation went largely unnoticed and the subsequent detection of HFRS antigens in tissues of the Eurasian common shrew (*Sorex araneus*) and Eurasian water shrew (*Neomys fodiens*) in European Russia and the former Yugoslavia \[[@B3-viruses-11-00857],[@B4-viruses-11-00857],[@B5-viruses-11-00857]\] similarly failed to incite systematic exploration into the role of shrews in the evolutionary origins of hantaviruses. Guided by these decades-old reports and spurred by the fortuitous availability of tissues from Ussuri white-toothed shrews (*Crocidura lasiura*), captured coincidentally as part of a HTNV surveillance program along the Imjin River near the demilitarized zone in South Korea, a genetically distinct hantavirus sharing a common ancestry with TPMV, named Imjin virus (MJNV), was isolated in 2008 \[[@B6-viruses-11-00857],[@B7-viruses-11-00857]\]. Thereafter, armed with the whole genome of the newfound MJNV and empowered by the generosity of museum curators and field mammalogists, who provided access to their collections of shrew tissues, we launched an opportunistic search for hantavirus RNA using reverse transcription polymerase chain reaction (RT-PCR) \[[@B8-viruses-11-00857],[@B9-viruses-11-00857]\]. In analyzing more than 1500 frozen, RNAlater^®^-preserved and ethanol-fixed archival tissues from more than 50 shrew species (order Eulipotyphla, family Soricidae, subfamilies Soricinae, Crocidurinae and Myosoricinae) captured in Europe, Asia, Africa and North America during the past three decades (1980--2013), we have discovered multiple novel hantaviruses, which are more genetically diverse than those harbored by rodents \[[@B10-viruses-11-00857],[@B11-viruses-11-00857],[@B12-viruses-11-00857],[@B13-viruses-11-00857],[@B14-viruses-11-00857],[@B15-viruses-11-00857],[@B16-viruses-11-00857],[@B17-viruses-11-00857],[@B18-viruses-11-00857],[@B19-viruses-11-00857],[@B20-viruses-11-00857],[@B21-viruses-11-00857]\]. Among the shrew species in which HFRS antigens were originally detected more than 30 years ago, confirmation by RT-PCR detection of hantavirus RNA was first achieved in the Eurasian common shrew \[[@B12-viruses-11-00857]\]. The hantavirus, named Seewis virus (SWSV), after the capture site in the Swiss canton of Graubünden, has since been detected in Eurasian common shrews across much of its vast geographical range, in Austria \[[@B22-viruses-11-00857]\], Czech Republic \[[@B22-viruses-11-00857]\], Finland \[[@B23-viruses-11-00857],[@B24-viruses-11-00857],[@B25-viruses-11-00857]\], Germany \[[@B22-viruses-11-00857]\], Hungary \[[@B23-viruses-11-00857]\], Poland \[[@B17-viruses-11-00857],[@B26-viruses-11-00857]\], Russia \[[@B27-viruses-11-00857]\], Slovakia \[[@B22-viruses-11-00857]\] and Slovenia \[[@B28-viruses-11-00857],[@B29-viruses-11-00857]\]. Possibly as evidence of spill-over events, SWSV has also been detected in the Eurasian pygmy shrew (*Sorex minutus*) \[[@B17-viruses-11-00857],[@B22-viruses-11-00857],[@B26-viruses-11-00857]\], Mediterranean water shrew (*Neomys anomalus*) (\[[@B26-viruses-11-00857]\], GenBank EU418604), Siberian large-toothed shrew (*Sorex daphaenodon*) \[[@B27-viruses-11-00857]\] and tundra shrew (*Sorex tundrensis*) \[[@B27-viruses-11-00857]\]. Phylogenetic analysis of SWSV and other newly identified soricid-borne hantaviruses show well-resolved lineages organized largely by host taxa and geographic origin \[[@B8-viruses-11-00857],[@B9-viruses-11-00857]\]. However, beginning in 2007, we detected hantavirus sequences that did not conform to their reservoir soricid host species and/or geographic location. That is, within populations of Eurasian common shrews, captured at the same time and in the same locations in Hungary and Russia, we found co-circulation of a highly divergent hantavirus lineage. Pair-wise alignment and comparison of a 300-nucleotide region of the L segment indicated that a distinct hantavirus species was being maintained. Not knowing what these sequences signified, we initially chose not to report them, except to deposit one of these sequences, designated Altai virus (ALTV) strains Telet-Sa302 (GenBank EU424341), amplified from tissues of a Eurasian common shrew, captured near Teletskoye Lake in the Altai Republic in August 2007 \[[@B27-viruses-11-00857]\]. Finding many more examples of these highly distinctive hantavirus sequences from syntopic *Sorex* species in Far Eastern Russia during the ensuing years forms the basis of this report. Also, in including expanded sequences of ALTV and previously unreported ALTV-like hantavirus sequences from two Eurasian common shrews from Hungary and one Eurasian pygmy shrew from Poland, as well as the recently reported full-length genome of Lena River virus (LENV) strain Khekhtsir-Sc67 from a Laxmann's shrew (*Sorex caecutiens*) in Far Eastern Russia \[[@B30-viruses-11-00857]\], we demonstrate that this presumptive soricid-borne hantavirus species might represent an ancestral lineage that subsequently diversified within the Soricini tribe in Eurasia. Because the ramifications of this conjecture are far reaching, more intensive research is urgently needed, including the isolation and characterization of ALTV and ALTV-like hantaviruses, to establish their contribution to the evolutionary history of hantaviruses and their proper placement in the new taxonomic classification of the family *Hantaviridae* \[[@B31-viruses-11-00857]\]. 2. Materials and Methods {#sec2-viruses-11-00857} ======================== 2.1. Trapping and Sample Collection {#sec2dot1-viruses-11-00857} ----------------------------------- Shrew specimens were collected, as part of the Beringian Coevolution Project \[[@B32-viruses-11-00857]\], along the Amga River, 10 km NE Sulgachi (61.58046/133.14386), 7 km N Sulgachi (61.59218/132.93862) and 8 km ENE Mikhaylovka (61.24610/132.71483); Kenkeme River, 40 km W Yakutsk (62.07003/128.93831); and Lena River, 2 km NW Tochtur (61.75421/129.52548), near Yakutsk, the capital of the Sakha Republic in Siberian Russia, during July and August 2006. These samples are indicated in bold type in [Table 1](#viruses-11-00857-t001){ref-type="table"}, and collection sites are shown in [Figure 1](#viruses-11-00857-f001){ref-type="fig"}. [Table 1](#viruses-11-00857-t001){ref-type="table"} also summarizes the prevalence of hantavirus RNA previously reported for soricine shrews from selected regions in Finland \[[@B23-viruses-11-00857]\], Hungary \[[@B23-viruses-11-00857]\], Poland \[[@B26-viruses-11-00857]\] and Russia \[[@B27-viruses-11-00857]\]. Field procedures and protocols, including trapping, euthanasia and tissue processing, were performed, following the animal care and use guidelines of the American Society of Mammalogists \[[@B33-viruses-11-00857]\] and were approved by the Institutional Animal Care and Use Committee, of the University of New Mexico (protocol 06UNM026). Standard museum vouchers were prepared, with samples of lung frozen in liquid nitrogen for transport to the Museum of Southwestern Biology, where tissues were archived at −80 °C and associated databases are maintained to foster pathobiology research \[[@B34-viruses-11-00857]\]. 2.2. RNA Extraction and RT-PCR Analysis {#sec2dot2-viruses-11-00857} --------------------------------------- Total RNA was extracted from lung tissues, using the PureLink Micro-to-Midi total RNA purification kit (Invitrogen, San Diego, CA, USA), then reverse transcribed, using the SuperScript III First-Strand Synthesis System (Invitrogen) with random hexamers and universal oligonucleotide primer (OSM55, 5′-TAGTAGTAGACTCC-3′), designed from the conserved 3′ end of the S and L segments of hantaviruses \[[@B15-viruses-11-00857],[@B16-viruses-11-00857],[@B20-viruses-11-00857],[@B26-viruses-11-00857]\]. Oligonucleotide primers used to amplify the S-, M- and L-genomic segments are provided in [Table S1](#app1-viruses-11-00857){ref-type="app"}. For the amplification of hantavirus genes, a two-step PCR was performed in 20-μL reaction mixtures, containing 250 μM dNTP, 2 mM MgCl~2~, 1 U of AmpliTaq polymerase (Roche, Basel, Switzerland) and 0.25 μM of each oligonucleotide primer \[[@B14-viruses-11-00857],[@B20-viruses-11-00857],[@B23-viruses-11-00857],[@B27-viruses-11-00857]\]. Initial denaturation at 94 °C for 5 min was followed by two cycles each of denaturation at 94 °C for 40 s, two-degree step-down annealing from 48 to 38 °C for 40 s, and elongation at 72 °C for 1 min, then 32 cycles of denaturation at 94 °C for 40 s, annealing at 42 °C for 40 s, and elongation at 72 °C for 1 min, in a GeneAmp PCR 9700 thermal cycler (Perkin-Elmer, Waltham, MA, USA). Amplicons were separated by electrophoresis on 1.5% agarose gels and purified using the QIAQuick Gel Extraction Kit (Qiagen, Hilden, Germany). DNA was sequenced directly using an ABI Prism 377XL Genetic Analyzer (Applied Biosystems, Foster City, CA, USA). 2.3. Genetic Analysis {#sec2dot3-viruses-11-00857} --------------------- Pair-wise alignment and comparison of partial and full-length S- and L- and partial M-segment sequences of newfound hantaviruses from soricine shrews with representative rodent-, shrew-, mole- and bat-borne hantaviruses were performed, using the ClustalW method (TranslatorX server and BioEdit 7.0.5) \[[@B35-viruses-11-00857],[@B36-viruses-11-00857],[@B37-viruses-11-00857]\]. In addition, we reanalyzed the previously reported and unreported hantavirus sequences from archival tissues of Eurasian common shrews captured in Györ-Sopron-Moson (SWSV Sa105/MSB95462, SWSV Sa106/MSB95461, SWSV Sa202/MSB95464, SWSV Sa211/MSB95480) and Zala (SWSV Sa244/MSB94609) in Hungary \[[@B23-viruses-11-00857]\] and the Altai Republic (SWSV Telet-Sa300, SWSV Telet-Sa301, SWSV Telet-Sa313, SWSV Telet-Sa321, SWSV Telet-Sa500) in Russia \[[@B27-viruses-11-00857]\], and included the 278- and 4,997-nucleotide S- and L-segment sequences, respectively, of ALTV Telet-Sa302, previously amplified, but not reported, from lung tissue of a Eurasian common shrew, as well as the ALTV-like hantavirus partial S-segment sequences amplified from lung tissue of a Laxmann's shrew captured in Krasnoyarsk Krai in August 2008 (Parnaya-Sc1217), the ALTV-like hantavirus full-length genome from Laxmann's shrew in Khabarovsk Krai in February 2008 (Khekhtsir-Sc67) and the ALTV-like hantavirus partial L-segment sequence from a Eurasian pygmy shrew captured in Chmiel, Poland, in September 2010 (Smin1108). 2.4. Recombination Analysis {#sec2dot4-viruses-11-00857} --------------------------- Nucleotide sequences of the coding regions, including the full-length L segment, were analyzed using multiple recombination-detection methods \[[@B38-viruses-11-00857],[@B39-viruses-11-00857]\], including GENECONV, Bootscan, Chimaera, 3SEQ, RDP, SiScan, MaxChi and HyPhy Single Recombinant Breakpoint, within the RDP4 Beta 4.36 software (<http://web.cbio.uct.ac.za/~darren/rdp.html>). 2.5. Phylogenetic Analysis {#sec2dot5-viruses-11-00857} -------------------------- The maximum likelihood and Bayesian methods, implemented in RAxML Blackbox webserver \[[@B40-viruses-11-00857]\] and MrBayes 3.1 \[[@B41-viruses-11-00857]\], under the best-fit general time reversible model of nucleotide evolution with gamma-distributed rate heterogeneity and invariable sites (GTR+I+Γ) \[[@B42-viruses-11-00857]\] and jModelTest version 0.1 \[[@B43-viruses-11-00857]\], were used to generate phylogenetic trees. Two replicate Bayesian Metropolis--Hastings Markov Chain Monte Carlo (MCMC) runs, each consisting of six chains of 10 million generations sampled every 100 generations with a burn-in of 25,000 (25%), resulted in 150,000 trees overall. The S and L segments were treated separately in phylogenetic analyses. Topologies were evaluated by bootstrap analysis of 1000 iterations, and posterior node probabilities were based on 2 million generations and estimated sample sizes over 100 (implemented in MrBayes). 2.6. Mitochondrial DNA (mtDNA) Host Phylogeny {#sec2dot6-viruses-11-00857} --------------------------------------------- The taxonomic identity of the hantavirus-infected shrews was verified in genomic DNA extracted from tissues using the QIAamp DNA Mini Kit (Qiagen) and their phylogenetic relationships were studied by analysis of the complete 1140-nucleotide cytochrome b gene, amplified by PCR using well-tested primers (forward: 5′-CGAAGCTTGATATGAAAAACCAT CGTTG-3′; and reverse: 5′-CTGGTTTACAAGACCAGAGTAAT-3′) \[[@B44-viruses-11-00857]\]. Host phylogenies based on mtDNA cytochrome *b* sequences, along with published sequences for shrews and moles for this gene region, were generated, using the maximum-likelihood and Bayesian methods described previously \[[@B45-viruses-11-00857],[@B46-viruses-11-00857]\]. The tree was based on 3,000,000 MCMC generations, sampled every 100 generation and burn-in after 10,000 trees. 2.7. Virus Isolation {#sec2dot7-viruses-11-00857} -------------------- Using the previously described methods \[[@B6-viruses-11-00857],[@B47-viruses-11-00857]\], 1% and 10% (*w*/*v*) homogenates of lung tissues from *Sorex* shrews, confirmed as infected with hantavirus by RT-PCR and sequencing, were inoculated onto subconfluent monolayers of Vero E6 cells (ATCC C1008 CRL-1586, American Type Culture Collection, Manassas, VA), grown in 25-cm^2^ flasks and maintained with Dulbecco's minimum essential medium containing 5% fetal bovine serum. Cells were subcultured at two- to four-week intervals, at which time aliquots of cells were examined for hantavirus RNA by RT-PCR. Blind passages of cells were conducted for more than 100 days. 3. Results {#sec3-viruses-11-00857} ========== 3.1. RT-PCR Detection of Hantavirus RNA {#sec3dot1-viruses-11-00857} --------------------------------------- Hantavirus RNA was detected by RT-PCR and confirmed by DNA sequencing in lung tissues collected from 15 of 49 Laxmann's shrews, four of 12 flat-skulled shrews, one of five Eurasian least shrews, and in none of five tundra shrews and four Siberian large-toothed shrews ([Table 1](#viruses-11-00857-t001){ref-type="table"}). The majority of captured shrews were male (35 of 49 Laxman's shrews, eight of 12 flat-skulled shrews, and five of five Eurasian least shrews), and 17 of the 20 hantaviruses were found in male shrews, but the difference was not statistically significant (Fisher exact test value, 0.2287; *p* \> 0.05). Of the 20 *Sorex* shrew-borne hantaviruses from the Sakha Republic, 14 resembled ALTV, instead of the expected host-specific hantavirus (SWSV and KKMV) ([Table 2](#viruses-11-00857-t002){ref-type="table"}). 3.2. Genetic Analysis {#sec3dot2-viruses-11-00857} --------------------- [Table 2](#viruses-11-00857-t002){ref-type="table"} summarizes the S-, M- and L-segment hantavirus sequences obtained for each of the 20 hantavirus-infected *Sorex* shrews captured at three localities in the Sakha Republic. As noted earlier, hantavirus RNA was found predominantly in male shrews, with evidence of infection in only three female shrews. Pair-wise alignment and comparison of the full-length and partial S-, M- and L-segment sequences from Laxmann's shrews and flat-skulled shrews showed three genetically distinct hantaviruses. The first was Kenkeme virus (KKMV) strain MSB148794, previously reported from the flat-skulled shrew \[[@B14-viruses-11-00857]\]. The second was Artybash virus (ARTV), harbored by the Laxmann's shrew \[[@B20-viruses-11-00857]\]. However, based on recent analysis, ARTV should be called SWSV \[[@B31-viruses-11-00857]\]. In addition, the third was a newfound hantavirus, differing by approximately 40% at both the nucleotide and amino acid levels from SWSV and KKMV, and resembling most closely ALTV, previously detected in a Eurasian common shrew from Western Siberia \[[@B27-viruses-11-00857]\]. The full-length 1287-nucleotide S-genomic segment of SWSV and KKMV from the Laxmann's shrew and flat-skulled shrew, respectively, encoded a 428-amino acid nucleocapsid (N) protein and lacked the additional open reading frame encoding a nonstructural NSs protein, as determined by sequence alignment with cricetid rodent-borne orthohantaviruses. Nearly full-length S-segment sequences of 1164 to 1209 nucleotides, obtained for ALTV-like hantaviruses from three Laxmann's shrews and one flat-skulled shrew, showed 51.1--53.9% and 46.4--47.9% sequence similarity at the nucleotide and amino acid levels, respectively, with KKMV and SWSV ([Figure 2](#viruses-11-00857-f002){ref-type="fig"}). By contrast, these ALTV-like hantaviruses exhibited amino acid sequence similarity of 98.8--100% (numbers in red) among themselves and approximately 95% similarity with prototype ALTV Telet-Sa302 ([Figure 2](#viruses-11-00857-f002){ref-type="fig"}). Partial M-segment sequences, amplified from three Laxmann's shrews (Sca370/MSB148580, Sca377/MSB148458 and Sca402/MSB148793) and a flat-skulled shrew (Sr424/MSB148679), also showed low level nucleotide sequence similarity of 61.3--65.6% with KKMV. By contrast, they exhibited 90.0--91.1% nucleotide sequence similarity and LENV Khekhtsir-Sc67 (which served as a surrogate for prototype ALTV Telet-Sa302 because M segment sequences were unavailable). The nearly full-length L-genomic segments of 6303 to 6441 nucleotides, amplified from four Laxmann's shrews (Sca363/MSB146482, Sca370/MSB148580, Sca377/MSB148458 and Sca402/MSB148793) and a flat-skulled shrew (Sr424/MSB148679), showed 64.7--65.4% and 61.9--63.0% sequence similarity at the nucleotide and amino acid levels, respectively, with KKMV and SWSV ([Figure 3](#viruses-11-00857-f003){ref-type="fig"}). At the amino acid level (numbers shown in red), these sequences exhibited nearly 90% similarity with prototype ALTV Telet-Sa302 ([Figure 3](#viruses-11-00857-f003){ref-type="fig"}). Thus, there was overall congruence for each genomic segment, suggesting the maintenance and co-circulation of a separate genetic lineage of hantavirus in *Sorex* shrews in the Sakha Republic. 3.3. Recombination Analysis {#sec3dot3-viruses-11-00857} --------------------------- RDP4 Beta 4.36 failed to disclose any consistent evidence of recombination in the S- and L-genomic segments. Although separate regions of potential recombination were found in a few instances, there was no consistency or concordance between the detection methods, calling into question the validity of the identified sequences or the biological significance of recombination versus general heterogeneity in sequence evolutionary rates. 3.4. Phylogenetic Analysis {#sec3dot4-viruses-11-00857} -------------------------- Phylogenetic trees, based on the coding regions of the full-length and partial S and L segments, and partial M segment, revealed similar topologies using the maximum-likelihood and Bayesian methods. Hantavirus sequences from five Laxmann's shrews (Sca371/MSB148558, Sca372/MSB148559, Sca375/MSB148436, Sca376/MSB148457 and Sca383/MSB148347) and one flat-skulled shrew (Sr422/MSB148794) segregated into separate clades with SWSV and KKMV, respectively, while the other full-length and partial S-, M- and/or L-genomic sequences from 10 Laxmann's shrews (Sca363/MSB146482, Sca370/MSB148580, Sca377/MSB148458, Sca380/MSB148573, Sca381/MSB148574, Sca382/MSB148575, Sca393/MSB148840, Sca396/MSB148745, Sca402/MSB148793 and Sca406/MSB148830), three flat-skulled shrews (Sr417/MSB148833, Sr418/MSB148839 and Sr424/MSB148679) and one Eurasian least shrew (Smi458/MSB148651) consistently formed a highly divergent lineage with ALTV Telet-Sa302, which was more closely related to loanviruses and mobatviruses ([Figure 4](#viruses-11-00857-f004){ref-type="fig"}). Specifically, in trees based on the S- and L-segment sequences, *Sorex araneus* from Hungary (Sa122/MSB95363 and Sa123/MSB95469) and Finland (Uurainen/63L and Lohja/EWS10L) and *Sorex caecutiens* (Parnaya-Sc1217, Khekhtsir-Sc67, Sca363/MSB146482, Sca370/MSB148580, Sca377/MSB148458, Sca380/MSB148573, Sca381/MSB148574, Sca396/MSB148745 and Sca402/MSB148793), and *Sorex roboratus* (Sr418/MSB148839 and Sr424/MSB148679) from Russia clustered with prototype ALTV Telet-Sa302 from Western Siberia ([Figure 4](#viruses-11-00857-f004){ref-type="fig"}). Similarly, in the M-segment tree, hantaviruses from three Laxmann's shrews (Sca370/MSB148580, Sca377/MSB148458 and Sca402/MSB148793) and one flat-skulled shrew (Sr424/MSB148679), as well as a hantavirus from a Eurasian pygmy shrew from Poland (Smin1108), clustered with LENV Khekhtsir-Sc67 ([Figure S1](#app1-viruses-11-00857){ref-type="app"}). The overall topology of the M and L trees were more similar and suggested that ALTV and ALTV-like hantaviruses belonged to the *Mobatvirus* genus. Geographic-specific clustering was evident for ALTV-related hantaviruses from Laxmann's shrews and flat-skulled shrews captured along Kenkeme River (blue) and Amga River (green) ([Figure 4](#viruses-11-00857-f004){ref-type="fig"} and [Figure S1](#app1-viruses-11-00857){ref-type="app"}). 3.5. Host Phylogeny Analysis {#sec3dot5-viruses-11-00857} ---------------------------- The identity of each hantavirus-infected *Sorex* shrew was molecularly confirmed by amplification and sequencing of the full-length 1140-nucleotide cytochrome *b* gene. Phylogenetic trees revealed well-supported lineages according to species. 3.6. Virus Isolation {#sec3dot6-viruses-11-00857} -------------------- Despite using well-established protocols involving multiple blind passages in Vero E6 cells for 100 days or longer, repeated attempts to isolate these highly divergent lineages of hantaviruses from archival frozen shrew tissues were unsuccessful. 4. Discussion {#sec4-viruses-11-00857} ============= In 2007, we first detected highly divergent hantavirus sequences in Eurasian common shrews captured in Russia and Hungary. A partial L-segment sequence, named ALTV, was deposited in GenBank, but we were unwilling to report this until an expanded database was assembled. In this report, we demonstrate through genetic and phylogenetic analyses of full-length and near full-length sequences of the L- and S-genomic segments, as well as partial M-segment sequences, that genetic variants of ALTV are harbored and are being maintained in Laxmann's shrews, flat-skulled shrews and Eurasian least shrews in the Sakha Republic in Far Eastern Russia, as well as in Eurasian common shrews in Western Siberia and Hungary. Importantly, these multiple strains of ALTV-like hantavirus are circulating simultaneously with the prototypic host-specific soricine shrew-borne orthohantaviruses. That is, Eurasian common shrews and Laxmann's shrews harbor SWSV and flat-skulled shrews host KKMV, as well as ALTV-related hantaviruses in the same locality and at the same time. Apart from the Eurasian common shrew, the Laxmann's shrew and the flat-skulled shrew, ALTV-related hantavirus sequences were also found in a Eurasian pygmy shrew, captured in Chmiel, in southeastern Poland. The Eurasian pygmy shrew, which is the principal reservoir host of Asikkala virus in Finland \[[@B24-viruses-11-00857]\] and the Czech Republic \[[@B48-viruses-11-00857]\], has also been demonstrated to harbor SWSV in Germany \[[@B22-viruses-11-00857]\], the Czech Republic \[[@B22-viruses-11-00857]\], Finland \[[@B24-viruses-11-00857]\] and Poland \[[@B17-viruses-11-00857],[@B26-viruses-11-00857]\]. This is yet another example of a soricid species serving as the host of more than one hantavirus species. Moreover, the hosting of the same hantavirus species by multiple closely related rodent, soricid, talpid and bat species represents a stark departure from the previously held notion of one-rodent species harboring a single hantavirus species. Thus, the primary reservoir host of ALTV, which has been detected in Eurasian common shrews, Laxmann's shrews and flat-skulled shrews at high frequency, would be merely speculative. However, the Laxmann's shrew would be a tentative guess, based on its vast geographic range, extending from Sweden, Finland and Belarus across western Siberia and Mongolia to Far Eastern Russia and China. Although the gender-specific prevalence of hantavirus infection was not statistically significant among soricine shrews in the Sakha Republic, there was a tendency toward a male predominance. This observation is consistent with the reported overrepresentation of hantavirus infection in male shrews and rodents, including the Ussuri white-toothed shrew \[[@B6-viruses-11-00857]\], Norway rat \[[@B49-viruses-11-00857]\], deer mouse \[[@B50-viruses-11-00857],[@B51-viruses-11-00857]\], and marsh rice rat \[[@B52-viruses-11-00857]\]. Our overall findings confirm those of Ling and colleagues, who previously reported the co-existence of two genetically distinct hantavirus species---SWSV and ALTV-like hantavirus---circulating simultaneously in a single host species, the Eurasian common shrew, in Finland \[[@B24-viruses-11-00857]\]. Their comparative analysis, showing two ALTV-like hantavirus strains (designated Uurainen/63L and Lohja/EWS10L) amplified from Eurasian common shrews, was inferred from the 340-nucleotide L segment of ALTV strain Telet-Sa302 we originally deposited in January 2008 (GenBank EU424341). The phylogenetic analyses of 17 ALTV-like hantavirus variants reported here are now based on the near full-length L segment (4997 nucleotides) of ALTV strain Telet-Sa302. Importantly, the collective data emphasize the widespread geographic distribution and host diversity of ALTV-related hantaviruses, further enriching the complexity of hantavirus evolution and phylogeography \[[@B8-viruses-11-00857],[@B9-viruses-11-00857]\]. The changing global landscape of hantaviruses has prompted a re-examination of previously long-held dogma about their host range, evolutionary origins and phylogeography \[[@B8-viruses-11-00857],[@B9-viruses-11-00857]\]. Based on the rapidly expanding literature of newfound hantaviruses, it is likely that many more hantaviruses will be discovered, possibly in hosts belonging to other taxonomic orders and in unanticipated geographic regions \[[@B53-viruses-11-00857]\]. Moreover, textbook chapters on hantaviruses are being revised and re-written, as more information becomes available about the emergence and pathogenic potential of non-rodent-borne hantaviruses \[[@B53-viruses-11-00857],[@B54-viruses-11-00857]\]. However, despite these advances, some of the persistent uncertainties and conundrums in hantavirus research are the direct consequence of the lack of full-length genomes and the dearth of hantavirus isolates. That is, although referred to as novel viruses, nearly all of the hantaviruses newly identified in shrews, moles and bats exist only as viral sequences. The isolation of hantaviruses is fraught with difficulty, even from freshly collected tissues. Thus, while disappointing, it is not altogether surprising that we failed to isolate ALTV-like hantaviruses from frozen archival tissues stored since 2006. To date, only three hantaviruses have been isolated from non-rodent hosts: TPMV from the Asian house shrew \[[@B1-viruses-11-00857]\]; MJNV from the Ussuri white-toothed shrew \[[@B9-viruses-11-00857]\]; and Nova virus from the European mole \[[@B47-viruses-11-00857]\]. More innovative approaches are urgently needed to isolate hantaviruses, including the establishment of cell lines from tissues of reservoir hosts, the engineering of cells with specific virus-entry receptors, and the development of three-dimensional organoid cultures. Until such time that ALTV, ALTV-like hantaviruses and other non-rodent-borne hantaviruses are isolated and propagated in culture, their biology and pathogenic potential will remain speculative at best. Thus, the road ahead is laden with challenges, but also endless opportunities and unlimited possibilities. Above all, strong partnerships between healthcare providers, public health workers, veterinarians, ecologists, museum curators and pathologists will be vital for the identification and rapid diagnosis of previously unrecognized infectious diseases, caused by newfound hantaviruses. 5. Conclusions {#sec5-viruses-11-00857} ============== Eurasian common shrews, Laxmann's shrews and flat-skulled shrews, captured at the same time and in the same location in Hungary and Russia, were each found to harbor hantaviruses belonging to two separate and highly divergent lineages. Pair-wise alignment and phylogenetic analysis of partial and full-length S-, M- and/or L-segment sequences indicated the co-existence and maintenance of two distinct hantavirus lineages in these closely related syntopic soricine shrew species. These findings suggest possible ancient host-switching events from another reservoir. Although ALTV was originally detected in the Eurasian common shrew and ALTV-like hantaviruses have been found in Eurasian common shrews from Finland and Hungary, the primary reservoir host of ALTV is unknown. However, since the vast geographic distribution of ALTV-like hantaviruses coincides with the geographic range of the Laxmann's shrew, this shrew species is the likely candidate. Alternatively, ALTV might represent an ancestral hantavirus lineage that may have subsequently diversified within the Soricini tribe in Eurasia, based on being detected in *Sorex araneus*, *Sorex caecutiens*, *Sorex minutissimus*, *Sorex minutus* and *Sorex roboratus*. Co-circulation of hantaviruses in the same host species also raises the distinct possibility of co-infection and reassortment as a mechanism for rapid evolutionary change \[[@B25-viruses-11-00857],[@B55-viruses-11-00857],[@B56-viruses-11-00857],[@B57-viruses-11-00857],[@B58-viruses-11-00857],[@B59-viruses-11-00857]\]. Our analysis did not show evidence of recombination, but the possibility of reassortment would exist if shrews were infected concurrently with KKMV and ALTV or SWSV and ALTV. Finally, our data did not allow definitive classification of ALTV and ALTV-like hantaviruses into one of the existing four genera of the subfamily *Mammantavirinae*. Whether this means there might be a fifth genus warrants further intensive investigation. We thank field collectors, including Nikolai E. Dokuchaev, Andrew G. Hope, Anatoli Lazhutkin, Stephen O. MacDonald and Albina A. Tsvetkova, who worked with us to preserve specimens from field work in remote locations in the Sakha Republic. We also acknowledge Janusz Markowski and Janusz Hejduk, who supplied shrew tissues from Poland, reported previously. The funding agencies had no role in study design, data collection and analysis, or preparation of the manuscript. The following are available online at <https://www.mdpi.com/1999-4915/11/9/857/s1>. Table S1: Oligonucleotide primers for amplification of SWSV, ARTV, KKMV and ALTV. Figure S1: Phylogenetic tree, based on M-segment sequences of ALTV-like hantaviruses. ###### Click here for additional data file. Conceived and designed the experiments: H.J.K., S.H.G., R.Y., and J.A.C.; collected the samples: J.A.C.; contributed the reagents/materials/analysis tools: H.J.K., S.H.G., and R.Y.; performed the experiments: H.J.K. and S.H.G.; analyzed the data: H.J.K., S.H.G., L.N.Y., J.A.C., and R.Y.; wrote and edited the paper: H.J.K., S.H.G., L.N.Y., J.A.C., and R.Y. This research was funded in part by the National Institutes of Health (grant numbers R01AI075057, P20GM103516, P30GM114737); the National Science Foundation (grant numbers 0415668, 1258010); and the Russian Foundation for Basic Research (grant number 18-04-00834A). The authors declare no conflicts of interest. GenBank accession numbers for the ALTV-like hantavirus sequences include Sa122/MSB95363 (S: GQ293127; L: GQ293104) and Sa123/MSB95469 (L: GQ293105) from Hungary; and Sca363/MSB146482 (S: KM361043; L: KM361055), Sca370/MSB148580 (S: KM361044; M: KM361051; L: KM361056), Sca377 MSB148458 (S: KM361045; M: KM361052; L: KM361057), Sca380/MSB148573 (S: KM361046; L: KM361058), Sca381/MSB148574 (S: KM361047; L: KM361059), Sca382/MSB148575 (L: MN401400), Sca393/MSB148840 (L: MN401399), Sca396/MSB148745 (S: KM361050; L: KM361060), Sca402/MSB148793 (S: KM361048; M: KM361053; L: KM361061), Sca406/MSB148830 (L:MN401398), Sr417/MSB148833 (L: MN401401), Sr418/MSB148839 (L: KM361062), Sr424/MSB148679 (S: KM361049; M: KM361054; L: KM361063) and Parnaya-Sc1217 (S: KM362174) from Russia, as well as ALTV-like hantavirus strains Uurainen/63L (L: KJ136623) and Lohja/EWS10L (L: KJ136638) from Finland. Also, new orthohantavirus sequences include Seewis virus (SWSV) SWSV Sa105/MSB95462 (S: GQ293124; L: GQ293097), SWSV Sa106/MSB95461 (S: GU186442; L: GQ293098), SWSV Sa124/MSB95468 (S: GQ293128; L: GQ293106), SWSV Sa202/MSB95464 (S: GQ293137; L: GQ293117), SWSV Sa211/MSB95480 (L: GQ293121), SWSV Sa244/MSB94609 (S: CQ293138; L: CQ293123) from Hungary, and SWSV Sca371/MSB148558 (S: KM201411; L: KM201413), SWSV Sca372/MSB148559 (L: KM201414), SWSV Sca375/MSB148436 (L: KM201416), SWSV Sca376/MSB148457 (L: KM201418), SWSV Sca383/MSB148347 (S: KM201419; L: KM201421) from the Sakha Republic, and SWSV Telet-Sa300 (S: GQ284578; L: EU424334), SWSV Telet-Sa301 (S: GQ284577; L: EU424335), SWSV Telet-Sa313 (S: GQ284579; L: EU424336), SWSV Telet-Sa321 (S: GQ284575; L: EU424337), SWSV Telet-Sa500 (S: GQ284576; L: EU424338) from Teletskoye Lake in the Altai Republic. ![Maps showing (**A**) the location of the Sakha Republic in Far Eastern Russia, and (**B**) the small mammal collection sites in the Sakha Republic, where hantavirus-infected *Sorex* shrews were captured in July and August 2006.](viruses-11-00857-g001){#viruses-11-00857-f001} ![Pairwise alignment and comparison of nucleotide and amino acid S-segment sequences of Kenkeme virus (KKMV Sr422/MSB148794), Seewis virus (SWSV Sca371/MSB148558), Altai virus (ALTV Telet-Sa302) and representative ALTV-like hantaviruses (Sca363/MSB146482, Sca370/MSB148580, Sca402MSB148793, Sr424/MSB148679). Nucleotide sequence similarities are designated in black and amino acid sequence similarities in red.](viruses-11-00857-g002){#viruses-11-00857-f002} ![Pairwise alignment and comparison of nucleotide and amino acid L-segment sequences of prototype Kenkeme virus (KKMV Sr422/MSB148794), Seewis virus (SWSV Sca371/MSB148558), Altai virus (ALTV Telet-Sa302) and representative ALTV-like hantaviruses (Sca363/MSB146482, Sca370/MSB148580, Sca377/MSB148458, Sca402/MSB148793 and Sr424/MSB148679).](viruses-11-00857-g003){#viruses-11-00857-f003} ![Phylogenetic trees, based on full-length or partial S- and L-segment sequences, generated by the Bayesian Markov chain Monte Carlo estimation method, under the general time reversible model of nucleotide evolution with gamma-distributed rate heterogeneity and invariable sites (GTR+I+Γ), showing geographic-specific clustering of hantaviruses detected in *Sorex caecutiens* and *Sorex roboratus* captured along the Kenkeme River (blue) and Amga River (green). Altai virus (ALTV Telet-Sa302, S: KP657656; L: EU424341) and ALTV-related hantaviruses formed a monophyletic group that shared a common ancestry with mobatviruses, including Láibīn virus (LAIV) strains BT20 (S: KM102247; L: KM102249), Đakrông virus (DKGV) strain VN2913B72 (S: MG663536; L: MG663534), Xuân Sơn virus (XSV) strains F42682, S: KF704709) and VN1982 (L: JX912953), Quezon virus (QZNV) strain MT1720/1657 (S: KU950713; L: KU950715), Brno virus (BRNV) strain 7/2012 (S: KX845678; L: KX845680), and Nova virus (NVAV) strain MSB95703 (S: FJ539168; L: FJ593498), and loanviruses, including Lóngquán virus (LQUV) strain Ra-10 (S: JX465413) and Brno virus (BRNV) strain 7/2012/CZE (S: KX845678; L: KX845680). ALTV and ALTV-related hantaviruses are colored according to the shrew collection sites: Amga River (green); Kenkeme River (blue); taxa shown in red are prototype ALTV Telet-Sa302 from Western Siberia and ALTV-like hantaviruses from Far Eastern Russia (Sca363/MSB146482), Hungary (Sa122/MSB95363 and Sa123/MSB95469) and Poland (Smin1108). Also shown are the phylogenetic positions of prototype Seewis virus (SWSV mp70, S: EF636024; L: EF636026; and SWSV Sca371/MSB148558, S: KM201411; L: KM201413), Kenkeme virus (KKMV Sr422/MSB148794, S: GQ306148; L: GQ306150), as well as other soricine shrew-borne orthohantaviruses, including Ash River virus (ARRV MSB734418, S: EF650086; L: EF619961), Asikkala virus (ASIV Drahany/CZ, S: KC880342; L: KC880348), Azagny virus (AZGV KBM15, S: JF276226; L: JF276228), Bowé virus (BOWV VN1512, S: KC631782), Cao Bằng virus (CBNV CBN-3, S: EF543524; L: EF543525), Jeju virus (JJUV 10-11, S: HQ834695; L: HQ834697), Jemez Springs virus (JMSV MSB144475, S: FJ593499; L: FJ593501), Qiān Hú Shān virus (QHSV YN05-284, S: GU566023; L: GU566021), Sarufutsu virus (SRFV Su36, S: KF700097), Tanganya virus (TGNV Tan826, S: EF050455; L: EF050454) and Yákèshí virus (YKSV 210, S: JX465423), and mole-borne orthohantaviruses, including Asama virus (ASAV N10, S: EU929072; L: EU929078), Oxbow virus (OXBV Ng1453, S: FJ5339166; L: FJ593497), and Rockport virus (RKPV MSB57412, S: HM015223; L: HM015221), and rodent-borne orthohantaviruses, including Andes virus (ANDV Chile9717869, S: AF291702; L: AF291704), Dobrava-Belgrade virus (DOBV/BGDV Greece, S: NC_005233; L: NC_005235), Hantaan virus (HTNV 76-118, S: NC_005218; L: NC_005222), Prospect Hill virus (PHV PH-1, S: Z49098; L: EF646763), Puumala virus (PUUV Sotkamo, S: NC_005224; L: NC_005225), Seoul virus (SEOV HR80-39, S: NC_005236; L: NC_005238), Sin Nombre virus (SNV NMH10, S: NC_005216; L: NC_005217), Soochong virus (SOOV SOO-1, S: AY675349; L: DQ056292), and Tula virus (TULV M5302v, S: NC_005227; L: NC_005226). Also shown are prototype thottimviruses, such as Thottapalayam virus (TPMV VRC66412, S: AY526097; L: EU001330) and Imjin virus (MJNV 05-11, S: EF641804; L: EF641806), as well as presumptive thottimviruses, such as Dahonggou Creek virus (DHCV MSB281632, L: HQ616595), Kilimanjaro virus (KMJV FMNH174124, S: JX193698; L: JX193700), and Uluguru virus (ULUV FMNH158302, S: JX193695; L: JX193697). The recently reported ALTV-like hantavirus sequences of Lena River virus (LENV Khekhtsir-Sc67, S: MH499470; M: MH499471; L: MH499472) are also included. The GenBank accession numbers for the SWSV strains and ALTV-like hantavirus sequences from Hungary and Russia are provided below. The numbers at each node are Bayesian posterior probabilities (\>0.70) based on 150,000 trees: two replicate Markov chain Monte Carlo runs, consisting of six chains of 10 million generations each sampled every 100 generations with a burn-in of 25,000 (25%). Scale bars indicate nucleotide substitutions per site.](viruses-11-00857-g004){#viruses-11-00857-f004} viruses-11-00857-t001_Table 1 ###### Prevalence of hantavirus RNA and occurrence of divergent hantavirus sequence in *Sorex* shrews from Eurasia. Country Collection Site Species Year No. Tested HantavirusRNA Positive Divergent Sequence --------- -------------------- -------------------------- ---------- ------------ ------------------------ -------------------- Finland Etelä-Suomen Lääni *Sorex araneus* 1982 10 4 0 Lappi *Sorex araneus* 1982 3 1 0 Oulun Lääni *Sorex araneus* 1982 9 7 0 Hungary Györ-Sopron-Moson *Sorex araneus* 1997 19 11 1 Nógrád *Sorex araneus* 1997 3 1 1 Zala *Sorex araneus* 2000 44 3 0 Poland Chmiel *Sorex araneus* 2010 11 4 0 *Sorex minutus* 2010 7 1 1 Huta Dłutowska *Sorex araneus* 2011 9 2 0 Kurowice *Sorex araneus* 2013 13 5 0 Russia Teletskoye Lake *Sorex araneus* 2007 9 6 1 Irkutsk City *Sorex daphaenodon* 2007 2 2 0 **Amga River** ***Sorex caecutiens*** **2006** **19** **10** **5** ***Sorex minutissimus*** **2006** **5** **1** **1** **Kenkeme River** ***Sorex caecutiens*** **2006** **24** **4** **4** ***Sorex daphaenodon*** **2006** **4** **0** **0** ***Sorex roboratus*** **2006** **12** **4** **3** **Lena River** ***Sorex caecutiens*** **2006** **6** **1** **1** ***Sorex tundrensis*** **2006** **5** **0** **0** Samples for the present study are shown in **bold** type. viruses-11-00857-t002_Table 2 ###### Summary of hantavirus sequences in *Sorex* shrews captured in the Sakha Republic in 2006. Site Species Virus MSB Sex Date Hantavirus Sequence ------------ ---------------------- ------- -------- -------- ---------------- --------------------- ------ ----------------- Amga *Sorex caecutiens* SWSV 148347 male 14 August 2006 956 731 751, 1304, 1046 River *Sorex caecutiens* SWSV 148436 male 12 August 2006 1094 2414, 476 *Sorex caecutiens* SWSV 148457 male 12 August 2006 1095 2414, 476 *Sorex caecutiens* SWSV 148558 male 10 August 2006 1627 1088 4598 *Sorex caecutiens* SWSV 148559 female 10 August 2006 971 2414, 476 *Sorex caecutiens* ALTV 148458 male 12 August 2006 1385 558 6535 *Sorex caecutiens* ALTV 148573 male 14 August 2006 704 400, 409 *Sorex caecutiens* ALTV 148574 male 14 August 2006 804 409 *Sorex caecutiens* ALTV 148575 male 14 August 2006 409 *Sorex caecutiens* ALTV 148580 male 09 August 2006 1600 568 6535 *Sorex minutissimus* ALTV 148651 male 14 August 2006 362 Kenkeme *Sorex caecutiens* ALTV 148745 male 20 August 2006 703 241, 409 River *Sorex caecutiens* ALTV 148793 female 20 August 2006 1600 890 6533 *Sorex caecutiens* ALTV 148830 male 21 August 2006 409 *Sorex caecutiens* ALTV 148840 male 20 August 2006 686 409 *Sorex roboratus* ALTV 148679 male 21 August 2006 1664 907 6533 *Sorex roboratus* ALTV 148833 male 20 August 2006 208 *Sorex roboratus* ALTV 148839 female 20 August 2006 409 *Sorex roboratus* KKMV 148794 male 20 August 2006 1640 1002 4304 Lena River *Sorex caecutiens* ALTV 146482 male 02 August 2006 1600 6500 Hantavirus designation in third column: ALTV, Altai virus; KKMV, Kenkeme virus; SWSV, Seewis virus. MSB is the Museum of Southwestern Biology mammal catalog number. Originally, based on the high sequence similarity with Artybash virus (ARTV), we had classified the hantaviruses in several *Sorex caecutiens* as ARTV. However, recent analysis has shown that ARTV is a genetic variant of SWSV \[[@B31-viruses-11-00857]\]. Accordingly, SWSV is used in [Table 2](#viruses-11-00857-t002){ref-type="table"} and [Figure 2](#viruses-11-00857-f002){ref-type="fig"}, [Figure 3](#viruses-11-00857-f003){ref-type="fig"} and [Figure 4](#viruses-11-00857-f004){ref-type="fig"}. [^1]: These authors contributed equally to the study.
2024-06-03T01:27:17.568517
https://example.com/article/9608
Introduction {#Sec1} ============ Taking part in a conversation is a complex task that requires individuals to both comprehend the speech of a partner, and produce their own comprehensible speech. Conversing effectively requires quick alternation between these processes, with the intervals between turns (i.e. between playing a listening and a speaking role) often being under 250 ms^[@CR1]^. The challenge is increased in noisy environments such as cafés or restaurants, which tax interdependent sensory and cognitive skills^[@CR2]^. These situations are particularly demanding for people with hearing impairment (HI), and they often shun environments in which they may fail to keep up^[@CR3]^. However, speakers and listeners can draw on a variety of behavioural strategies to aid communication in such environments. In this paper we investigate the strategies individuals use spontaneously when conversing with a partner in noise, in order to identify the strategies that are spontaneously employed to facilitate communication in such contexts. In a conversation, the speaker's aim is to convey information in an intelligible manner. Previous studies of talking in noise have shown that speakers do this by modifying the acoustic parameters of their speech, and their speech patterns, both when producing speech in isolation and when speaking in conversation. In terms of acoustic parameters, speakers in noisy environments increase their vocal intensity and adjust the spectrum of their speech^[@CR4],[@CR5]^, which improve intelligibility for listeners^[@CR5],[@CR6]^. In terms of speech patterns, speakers in noisy environments produce longer utterances^[@CR7]^ and speak the utterances that they do produce more slowly (i.e., producing fewer syllables per second), thereby giving listeners more time to process spoken information^[@CR8],[@CR9]^. Finally, it has been shown that in noise, speakers include more (and potentially longer) pauses^[@CR8]^. While this could reflect a strategic adjustment to aid listener processing (and has been interpreted as such), it could alternatively be the result of missed turn-switches. The listener's aim in a conversation, on the other hand, is to comprehend the speaker's message. This is facilitated by being able to hear the speaker better, or by receiving additional, non-auditory, cues conveying message content. To hear the speaker better, listeners can orient their ear to increase signal strength^[@CR10],[@CR11]^, with best results when they turn 30 degrees away from the sound source^[@CR12]^. Indeed listeners with unilateral hearing impairment have been found to adjust their head to increase the speech signal in adverse listening conditions, though they may be particularly aware of the impact of orientation on their hearing^[@CR13]^. While highly variable, even normal hearing listeners have been shown to adjust their head movements when speech becomes difficult to hear^[@CR12]^, though this may be reduced by competing visual information^[@CR11]^, and few listeners reach an optimal orientation^[@CR12]--[@CR14]^. Decreasing the distance between interlocutors would also allow a listener to better hear a speaker by increasing the signal-to-noise ratio. In terms of non-auditory cues, listeners show remarkable consistency in directing their gaze toward an active speaker^[@CR15],[@CR16]^, and experience benefit from seeing them while they talk. For example, seeing a speaker's head movement improves speech intelligibility^[@CR17]^, while seeing their lip movements improves both speech intelligibility^[@CR18],[@CR19]^ and speech detection^[@CR20]^. Hence visual cues provide valuable additional information for processing speech successfully. It is clear that a variety of strategies are available to the speaker and listener experiencing difficulty in noisy environments. But strikingly, the majority of studies investigating speaking and listening strategies have removed the social context in which these behaviours most often occur. Studies taking this isolationist approach involve speakers producing scripted utterances for a microphone in an otherwise empty room^[@CR4],[@CR6],[@CR9]^, and listeners being presented with such pre-recorded speech in a similarly desolate context^[@CR6],[@CR12],[@CR13],[@CR17],[@CR18],[@CR20],[@CR21]^. It is notable that the behaviours that are used to facilitate interpersonal understanding are investigated in isolated, offline, paradigms. While such work provides insight into the strategies that people can use to facilitate speaking and listening in noisy environments, it is yet to be determined whether such strategies are used spontaneously in an interactive context. Several studies attempting to address this question have used multi-person paradigms with highly constrained information-sharing^[@CR5],[@CR7],[@CR8],[@CR19]^, and have often focused on only one modality of behaviour, removing the possibility of investigating how strategies occur in combination. In line with the broader shift toward addressing interaction using ecologically valid contexts that involve mutual adaptation^[@CR22],[@CR23]^, we investigate dyadic conversation behaviour in dyads approximately matched in age and hearing loss, in noisy environments. Specifically, we focus on the speech, head movement, and gaze behaviours of people with varying hearing ability conversing without hearing aids in speech-shaped background noise fluctuating between 54 dB and 78 dB (see Fig. [1](#Fig1){ref-type="fig"}). We hypothesise that in higher levels of noise, speakers will increase their speech level and utterance duration, as well as increasing the duration of pauses between turns. We also hypothesise that listeners will orient their head to improve reception of the auditory signal (even if they do not reach the optimal 30 degree orientation), and that they will increase their gaze toward the talker - specifically the talker's mouth. Finally, we anticipate that individuals will move toward each other to optimise exchange of information. By investigating the broad array of behaviours that HI individuals use while holding real conversations in different levels of noise, we extend prior work on individual speaking and listening to an interactive setting, and address how multiple strategies are used concurrently.Figure 1Experimental set-up (example of a non-participating individual). Panel a shows the participant setup within the sound attenuated room, showing the loudspeakers (N) presenting noise throughout each trial. Panel b shows the equipment setup including motion tracking crown, eye-tracking glasses and microphone. Panel c shows an example of the noise levels (54--78 dB in 6 dB increments) as a function of time during an example conversation trial. Results {#Sec2} ======= Speech {#Sec3} ------ Average speech level significantly increased as noise level increased (F(2.075,60.182) = 271.72, *p* \< 0.001, ηp2 = 0.90). Participants spoke on average 1.9 dB more loudly with each 6 dB increase in noise; i.e. they increased vocal level by 0.31 dB per 1 dB noise level increase (see Fig. [2a](#Fig2){ref-type="fig"}). Increasing noise level also led to significantly shorter utterances, (F(1.85,53.52) = 5.48, *p* = 0. 0.008, ηp2 = 0.16; see Fig. [2b](#Fig2){ref-type="fig"}), and significantly shorter median inter-speaker pauses (F(2.48,34.76) = 7.37, *p* = 0.001, ηp2 = 0.35, see Fig. [2c](#Fig2){ref-type="fig"}). The overall mean of these inter-speaker pauses was 247 ms, comparable to previous turn-taking results for English speakers (236 ms)^[@CR1]^.Figure 2Speech adjustments by noise level. Panel a shows mean speech level by noise level. Panel b shows utterance duration by noise level, and panel c shows inter-speaker pause duration by noise level. Panel d shows proportion of time for individual speech, overlapping speech, and silence, by noise level. All error bars show 95% within-subject confidence intervals. Noise level also affected conversational structure, showing an interaction with speech type -- i.e., individual or overlapping (F(1.40,19.56) = 31.38, *p* \< 0.001). There was a significant effect of noise level on both types of speech (individual: F(1.55,21.64) = 33.54, *p* \< 0.001, ηp2 = 0.71; overlapping: F(1.36,19.03) = 22.10, *p* \< 0.001, ηp2 = 0.61). Pairwise comparisons showed that that in comparison to all quieter levels, when background noise was at its loudest there was a lower proportion of individual speech (*p*s \< 0.001), alongside a higher proportion of speech overlap (*p*s \< 0.007). See Fig. [2d](#Fig2){ref-type="fig"}. Movement {#Sec4} -------- In terms of head position, interlocutors moved toward each other with increasing noise level (F(1.39,19.42) = 8.71, *p* = 0.004, ηp2 = 0.38; see Fig. [3a](#Fig3){ref-type="fig"}). On average, interlocutors decreased interpersonal distance by 10 mm for each 6 dB noise increase, equivalent to a 0.01 dB speech level increase per 1 dB noise level increase. Interlocutors showed a mean head angle of +2.1° from centre across conditions, indicating a slight turn of the left ear towards the partner, and listeners' variability was affected by noise level (F(3.00,87.10) = 2.93, *p* = 0.04, ηp2 = 0.09; see Fig. [3c](#Fig3){ref-type="fig"}), with post-hoc tests showing a marginal increase between 54 dB and 78 dB (*p* = 0.07).Figure 3Movement adjustments by noise level. Panel a shows interpersonal distance by noise level. Panel b shows head (yaw) angle means, and panel c shows head (yaw) angle standard deviations, during periods of talking and listening by noise level. All error bars show 95% within-subject confidence intervals. Gaze {#Sec5} ---- Listeners focused on their partner's face (defined as 10° above to 10° below the height of the tragi, with a horizontal span of 20°) for an average of 88% of each trial (see Fig. [4](#Fig4){ref-type="fig"}). People spent a different proportion of time focused on the mouth (10° zone below the tragi) compared to the eyes (10° zone above the tragi) (F(1,116) = 8.38, *p* = 0.007, ηp2 = 0.22), and how much time they spent attending to the mouth vs eyes varied by noise level (F(4,116) = 11.92, *p* \< 0.001, ηp2 = 0.29). As noise level increased, participants spent less time focused on their partner's eyes (F(4,116) = 13.70, *p* \< 0.001, ηp2 = 0.32) and more time focused on their partner's mouth (F(4,116) = 7.38; *p* \< 0.001, ηp2 = 0.20).Figure 4Gaze adjustments by noise level. Panel a shows proportion of listening time spent oriented toward the eye region, the mouth region, and the sum of the two, by noise level. Error bars show 95% within-subject confidence intervals. Panel b shows an example gaze pattern, with darker areas indicating more gaze time to illustrate how the gaze data was split into eye and mouth regions. Combination {#Sec6} ----------- If interlocutors start with an interpersonal distance of 1.5 m, and with each 6 dB noise increase they move 10 mm closer as well as speaking 1.9 dB louder. The combined acoustic benefit of these strategies amounts to 0.32 dB per 1 dB noise increase. Discussion {#Sec7} ========== In this study, we measured speech parameters (such as speech level, turn duration, and inter-speaker pause), head movement, and gaze, to comprehensively investigate the strategies spontaneously used by individuals holding conversations in noisy environments. We have shown that while individuals employ potentially beneficial strategies during increased background noise (i.e. by increasing speech level and decreasing interpersonal distance), these adjustments only partially compensate for the increase in noise level. Indeed such behaviours amount to only 0.32 dB benefit per 1 dB noise increase. Other potentially beneficial strategies included using slightly shorter utterances, and increasing looks to the speaker's mouth. While conversation structure remained constant until the noise level reached 72 dB, with minimal speech overlap and a high proportion of individual speech, a significant increase of overlapping speech at 78 dB suggests that at this level such strategies were not enough to avoid the turn-taking structure of conversation breaking down. These findings demonstrate that the strategies people use during an interactive conversation are not the same as those used when speaking or listening in an empty laboratory, or even during an interactive task if it is highly constrained. For example, we did not find speakers to increase utterance duration with noise (which could indicate slower speech), as found in the interaction study of Beechey *et al*.^[@CR7]^. Several possibilities could explain this difference. It is notable that the task given to our participants was relatively free, in comparison to a path-finding task, and so they may have chosen to change the content of their speech as opposed to slowing their production rate. Furthermore, Beechey *et al*. varied noise level with simulated environment, and these environments changed between, rather than within, trials. This design may have led participants to employ different strategies depending on the environment, rather than adjusting their use of strategies depending on noise level. The interesting prospect that strategy adjustment is based on noise level, while strategy selection is based on other parameters of the background noise, should be tested systematically in future. Our data also showed inter-speaker pauses to shorten rather than lengthen. While shorter utterances may have simplified information processing for the listener, increasing pause duration would have provided further benefit. However, it is possible that prior findings of increased pausing in noise are a result of turn-switch difficulties, as opposed to being a strategy used to facilitate listener processing. Finally, we saw no use of head orientation to improve audibility, and report small changes in speech level and interpersonal distance. We suggest that this is because during an interactive conversation, interlocutors must deal with two conflicting goals: (1) facilitating communication, and (2) facilitating interpersonal connection. While strategies to achieve goal 1 have been addressed using isolation paradigms, goal 2 may mediate these strategies as well as eliciting other, purely social, behaviours. Hence interactive paradigms are essential to better understand natural conversation behaviours. It is likely that while many behaviours reported in this study were used with the goal of improving communication, they may have been modified according to the social situation. For example, interlocutors did speak louder and move towards each other, but not enough to compensate for the background noise increase. Such apparent inefficiency could relate to the social inappropriateness of shouting to a conversation partner or invading another individual's space. Head orientation strategies may have been avoided for similar reasons; since the optimal head orientation for audibility is 30°^[@CR12]^, requiring listeners to turn their head somewhat away from their partner, it is possible that social constraints led individuals to avoid adjusting their head orientation. Alternatively, individuals may not have been aware of the SNR benefits of this strategy, and it is possible that with the noise surrounding the listeners any changes in speech-to-noise ratio elicited by re-orientation were not noticeable^[@CR24]^. It should be noted, however, that listeners did increase their looks toward their partner's mouth in higher background noise levels, potentially indicating prioritisation of the visual cues gained by looking directly to the mouth over the acoustic cues provided by turning the head. While attempting to provide an ecologically valid conversation experience, the experimental situation may also have somewhat affected strategy use. The restriction that participants should not move the position of their chairs may have contributed to their minimal movement toward each other (although notably, chairs are often fixed in position). In addition, the use of speech-shaped noise may have masked the partner's speech more strongly in the temporal domain than typical noises experienced in the background of everyday life (e.g., competing speech exhibiting envelope dips), reducing benefit from strategy use. Finally, the fact that conversing participants did not initially know each other may have impacted their behaviour; individuals may use different/better compensatory behaviours during conversations with familiar than unfamiliar partners. Yet while individuals may be comfortable to verbalise their difficulty when talking to familiar partners, it is perhaps most critical to understand what they do in situations when they are not; indeed daily life is full of conversations with unfamiliar interlocutors: from the postman to the barista. As it is clear that the behaviours that individuals spontaneously use while conversing in noise do not provide a high level of acoustic benefit, further work could investigate whether training could be implemented to allow individuals to take advantage of potentially useful strategies (such as learning to orient the head for maximal signal-to-noise benefit). Future work could also begin addressing how conversation behaviours differ depending on the type of background noise, and how such behaviours are modified with increasing hearing impairment. In this study we used speech-shaped noise, and the constant masking may have made conversation particularly difficult. When listening against a background of other talkers, individuals may be able to 'listen in the gaps' to ameliorate difficulty, reducing reliance on facilitatory strategies. Furthermore, when participants do employ strategies, they may rely more strongly on those that increase signal-to-noise ratio to take advantage of dips in the masker (such as decreasing interpersonal distance or optimising head orientation). Investigating conversation behaviours in different sorts of background noise, such as babble, could be a valuable extension of this work. It is also important to note that this study was run with participants of varying hearing ability, centring around mild hearing loss. While this reflects typical hearing of individuals in the age range tested, a next step could be to investigate whether more severe hearing impairment leads to greater reliance on the strategies reported, or the uptake of new ones, as well as how strategy use is impacted by use of hearing aids. This work highlights the importance of measuring social processes, and particularly listening behaviours, in multi-person contexts. By providing a comprehensive record of conversation behaviours across multiple modalities while engaged in challenging conversation situations, our findings could be used to hone models of interpersonal communication, for example addressing how visual and auditory cues are used simultaneously. These findings could also be exploited in new communication technologies to improve user benefit. For example, we show that gaze is well-focused on the partner, while head orientation is offset by several degrees. Such information indicates the potential value of taking gaze direction into account in hearing aid design^[@CR25]^. The raw dataset is available as Supplementary Material for such purposes. We have shown how people behave during real conversations in noise in stationary chairs, behaviour that differs notably from that occurring when speaking or listening in isolation. We report inefficient use of behaviours that have the potential to provide high levels of acoustic benefit (e.g., increasing speech level and decreasing interpersonal distance), as well as possible prioritisation of behaviours providing alternative benefits (e.g., shortening utterances and increasing gaze to toward a speaker's mouth). We also show that individuals seemingly sustain conversation even in high levels of background noise (up to 72 dB), although an increase in overlapping speech indicates potential break-down of conversational turn-taking past this point. This work provides a first multimodal investigation of interactive conversation between individuals in noise, and is critically important for the field of communication technology. By understanding the strategies used by dyads conversing in challenging conditions, technological innovations can begin to include processing strategies that work with, rather than against, natural behaviours. Method {#Sec8} ====== Participants {#Sec9} ------------ Thirty unacquainted participants were divided into fifteen mixed-gender dyads (age~mean~ = 61 years, age~SD~ = 11 years; better-ear four-frequency pure-tone average (FFPTA across 0.5, 1, 2, and 4 kHz)~mean~ = 22 dB HL, FFPTA~SD~ = 12 dB HL). Within the available sample, participants were matched on age (difference~mean~ = 6 years, difference~SD~ = 5 years) and hearing asymmetry across ears (difference~mean~ = 3 dB HL, difference~SD~ = 2 dB HL). We also measured the difference in hearing loss between members of a pair (difference~mean~ = 7 dB HL, difference~SD~ = 6 dB HL). Each participant was paid £10 for taking part. This study was approved by the West of Scotland Research Ethics Committee (09/S0704/12). Methods were carried out in accordance with these ethical guidelines. Materials and task {#Sec10} ------------------ Participants were seated in the centre of a ring of eight equidistantly spaced loudspeakers (Tannoy VX-6) in a sound attenuated room (4.3 × 4.7 × 2.6 m; see Fig. [1a](#Fig1){ref-type="fig"}). The loudspeakers each presented a different extract of steady-state noise with a spectrum equal to the long-term-average speech spectrum generated from data of Byrne and colleagues^[@CR26]^, which includes recordings of male and female speakers across 12 languages. As noise levels in communal spaces are often over 70 dB^[@CR27],[@CR28]^, we presented background noise continuously at 54, 60, 66, 72, or 78 dB, in 15--25 s segments with no gap between sequential levels. The complete counterbalancing of level ordering was determined using a paired de Bruijn sequence (individually sequenced for each trial^[@CR29]^), and smoothing was applied for 10 ms between segments (see Fig. [1c](#Fig1){ref-type="fig"}). Each level was therefore presented five times, and hence each conversation lasted between 6 minutes 30 seconds and 10 minutes 50 seconds. Vicon Tracker software was used to capture head-motion data, sampling at 100 Hz using a commercial infrared camera system (Vicon Bonita B-10 cameras fitted with wide angle lenses). Eight cameras were spaced around the room (one in each corner, plus one in the centre of each wall) to track 9-mm diameter reflective spheres that were arranged into uniquely identifiable 'objects' and attached to crowns on the head. Participant coordinates were measured in both Cartesian and polar space, calibrated to the centre of the floor. Temporal sampling rate was 100 Hz and spatial resolution was under 0.01°. Note that head position was recorded at the centre of the head (i.e. between the ears in line with the bridge of the nose) through reference to a pair of removable motion tracking goggles, as opposed to being recorded at the centre of the crown. Eye movement was recorded using 60 Hz Pupil Labs binocular eye trackers in 3D pupil detection mode and calibrated using a 5-point grid. The right eye was recorded in all participants except those that reported specific vision problems in that eye (two participants). Speech was recorded using a gooseneck microphone attached to the motion tracking crown approximately 6 cm from the participant's mouth (see Fig. [1b](#Fig1){ref-type="fig"}). The experiment was controlled using Matlab, which determined loudspeaker output, recorded motion capture data in Euler coordinates, and recorded eye angle data. Matlab was also used to trigger changes in the presentation level of the background noise by sending the requested level (dB SPL) in the form of an 8-bit integer. The Max/MSP visual programming language was used to receive and convert this trigger to dB, which controlled the playback of an 8-channel speech-shaped noise wav file. The first of these triggers also initiated the capture of speech signals from the microphones. All audio was run at 16 bits and 44.1 kHz sample rate, I/O was handled with a Ferrofish A-16 driven by an RME MadiFace XT on the host computer. Procedure {#Sec11} --------- Participants were introduced and taken into a sound attenuated room and seated face-to-face at a distance of 1.5 m (they were asked not to alter chair position). The motion tracking crowns with lapel microphones attached via a gooseneck were then fitted. Participants then each put on a pair of eye-tracking glasses and were individually calibrated in front of a 92 × 74 cm monitor at a distance of 125 cm. Hearing aids were not worn during the experiment. In total, setup took approximately 40 minutes. Each dyad held three conversations (i.e. three trials), each lasting approximately 9 minutes. The conversation topics focused on: films, close-call incidents, and the resolution of an ethical dilemma. In the film conversation^[@CR30]^, participants were asked to discuss what they liked to watch. In the close-call conversation^[@CR31]^, participants were asked to discuss a near miss: a time something bad almost happened but that worked out in the end. In the ethical dilemma conversation, participants were asked to come to a joint decision regarding the Balloon task^[@CR32]^. In the Balloon task, participants must choose who to sacrifice from a descending hot air balloon between a scientist on the brink of curing cancer, a pregnant woman, and the pilot (her husband). Order of conversation topics was counterbalanced. Participants were told that they should try to keep conversing the entire time that the experimenter was outside of the room, and that background noise would play from the surrounding speakers throughout. In between each conversation, the experimenter went into the room to confirm that participants were happy to continue, give them their next topic, and perform an eye tracker drift correction. Analysis {#Sec12} -------- Data from one dyad was removed due to a motion tracking error (3 trials). Of the remaining 45 trials, a technical fault led to the loss of one audio recording, hence this trial was also removed. Analysis was conducted on the remaining 44 trials. Analyses were run using repeated-measures ANOVA on participant data averaged across all instances of each level across all conversation trials. Greenhouse-Geisser correction was used when assumptions of sphericity were violated (SPSS, v24). We also report partial eta squared values to indicate effect size (ηp2), for which a value of 0.01 is considered small and 0.26 is considered large^[@CR33]^. Confidence intervals (95%) were calculated from the subject × condition interaction term^[@CR34]^. Periods of speech were detected from average root mean square (RMS) amplitude using an automated algorithm dependent on a manually-selected RMS threshold across a rolling window. A smoothing value of 0.1 Hz and a pause allowance of 1.25 s were used (due to few pauses being greater than 1.25 s in conversation)^[@CR35],[@CR36]^. This allowed speech to be defined as periods during which an individual's microphone recording was above threshold, and listening to be defined as periods during which the other individual's microphone recordings were above threshold. Analyses of speech level were run only across the times that individuals were determined to be speaking, as opposed to over the entire recordings. Note that while microphones did pick up a small amount of the background noise, this amounted to a mean RMS level increase of only 0.39 dB for each 6 dB increase, and reported levels are corrected. Utterance duration was calculated across all speech segments with a duration of over 50 ms (to remove clicks). Any utterances that spanned a noise level transition were excluded from duration analyses. Prior to analysis, eye tracking data was transformed to the Vicon axes (as opposed to the position to the eye camera) using the validation data from the start of the experiment. Drift was then corrected at the start of each trial through reference to the other participant's head centre. Eye angle data was then added to head movement to generate gaze coordinates. Head angle and gaze angle were calculated in relation to the centre of the other participant's head (i.e., oriented directly towards the other participant would be 0° pitch and yaw). Anonymised data analysed during this study is included in Supplementary Information. Identifiable speech data is shared as binary data coding indicating when the recorded audio was over vs under threshold, i.e. when speech occurred. Informed consent {#Sec13} ---------------- Informed consent was obtained from each participant prior to initiation of the study. Informed consent was also obtained for publication of images of non-participating individuals in an open-access journal. Supplementary information ========================= {#Sec14} All data **Publisher's note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary information ========================= **Supplementary information** accompanies this paper at 10.1038/s41598-019-46416-0. This work was supported by funding from the Medical Research Council (Grant Number MR/S003576/1); and the Chief Scientist Office of the Scottish Government. W.M.W. and W.O.B. developed the study concept. All authors contributed to the study design. L.V.H. performed testing and data collection. All authors contributed to data processing, analysis, and interpretation. L.V.H drafted the manuscript, and W.M.W. and W.O.B. provided critical revisions. All authors approved the final version of the manuscript for submission. Anonymised data analysed during this study is included in Supplementary Information. Identifiable speech data is shared as binary data coding when the recorded audio was over vs under threshold, i.e. when speech occurred. The authors declare no competing interests.
2023-09-02T01:27:17.568517
https://example.com/article/5906
As Twitchy told you, CNN’s Chris Cuomo evidently has nothing better to do with his time than get pissy over Donald Trump misspelling “another simple word.” Who cares that Trump spelled another simple word wrong? I do. As weird as it is to set aside that he is potus and should present a level of proficiency, misspelling counsel shows a haste, a lack of thought, that is a requirement for responsible leadership. It just is.
2023-10-16T01:27:17.568517
https://example.com/article/9710
Learning basics of butchery Class offers meat lovers a primer on handling large cuts Updated 4:51 pm, Wednesday, March 12, 2014 Image 1of/1 Caption Close Image 1 of 1 National Cattlemen's Beef Association National Cattlemen's Beef Association Learning basics of butchery 1 / 1 Back to Gallery "If you, for lack of better terms, butcher it really bad, just cube it up and use it for stew meat or cut some flatter piece for a stroganoff," says Mike Garaghty, the corporate chef for Wusthof Knives. This laissez-faire approach to butchering large cuts of meat into more manageable portions at home makes the process seem less daunting. On March 6 at Different Drummer's Kitchen in Albany, Garaghty taught two groups of home-cooking enthusiasts how to break down a 7-pound piece of top sirloin butt (sometimes called a beef loin) into three cuts of beef: Top sirloin cap, top sirloin center and mouse muscle. After trimming off fat and silverskin (a connective tissue), Garaghty offered examples of how to use each cut of beef. Mouse muscle, a fist-sized piece of meat, is best used ground or in stews, kebobs or fajitas. The sirloin cap and center remain relatively tender, making them great choices for individual steaks and roasts. Even an infrequent grocery shopper wouldn't find it difficult to locate these cuts readily wrapped and available for purchase at an average market. So why do people choose to butcher these large cuts, sometimes referred to as primal cuts, at home? Cost is a leading reason. "You just save so much money," says Garaghty, citing that most people see large cuts in a meat department and simply don't know what to do with them. While a pound of conventional USDA choice-grade sirloin steak will run about $7 in a typical grocery store, the same grade of top sirloin butt used in class cost $4.69 per pound. The $32.83 primal cut netted enough meat for four servings of fajitas, a large roast and six sirloin steaks. The savings can be even greater for other types of meats. While a whole conventional chicken rings up at about $1.50 per pound, boneless, skinless chicken breast costs twice as much or more. The added benefit of having a carcass to be cooked into a stock stretches the cost differential even further. Another reason is an increased desire to be more closely connected to the food chain. For some, butchering meat themselves alleviates concerns of proper meat handling and provides a sense having had to "work" for their meal. The snout-to-tail movement that encourages respectful consumption of as much of an animal as possible is another motivator for home butchering. When meat eaters break down primal cuts, they are able to access parts of an animal that they might not be able to procure as readily. What should one consider when buying a primal cut of meat? When it comes to beef, Garaghty says look for firm meat and bright color. Meat from a cow will be purplish, with a filmy oil appearing over the flesh. Steer meat is redder in color. Beyond this, consider the grade of meat. Select is the least-expensive grade of meat, with less fat running through the muscle (known as marbling), making it less tender. Prime is the highest tier of gradation, with the most marbling and tender juiciness, and choice falls in the middle. Andrew Wrobel, the general manager of The Meat House in Stuyvesant Plaza, says that about 10 customers a week come in requesting primal cuts of beef. "We have people looking for whole ribeye or top sirloin. A lot of customers buy meat at primal weight, and we break it down for them," Wrobel says. For those who frequently consume meat, a primal cut broken down at home is an effective way to enjoy meat without paying the built-in surcharge of butchering and packaging materials. But it's not for the squeamish: The feel of flesh is ever-present, reminding us that what is going to be consumed was once alive and should be respected as best possible.
2024-04-08T01:27:17.568517
https://example.com/article/1932
Original Airdate: April 16, 2016 Written & Storyboarded by: Graham Falk Before we start, I wanted to make a brief announcement. By next summer, this blog will be wrapping up, as I move into the final few seasons. I should have a schedule out at some point for the remaining 50-or-so episodes and when their respective reviews will be posted. Not sure about post-blog content yet, but I am starting up a podcast reviewing animated programs in general that I’m particularly psyched about! I’m sharing this because I have an open application for anyone who might be interested in co-hosting with myself. If you’re interested in applying, feel free to do so and you might have the chance to work with a huge dork like myself! The application will be open until the first week in December, so I’ll keep advertising on the blog until then. On with the review! It’s easy to see why Lady Rainicorn is the virtually the most ignored main character in the series. Like so many other unintelligible or foreign characters from other miscellaneous TV programs (Kenny from South Park, Coco from Foster’s Home for Imaginary Friends, Boomhauer from King of the Hill, etc.), Lady is difficult to incorporate into main stories because a majority of AT’s audience, including the characters themselves, do not understand Lady’s Korean (or whatever language she speaks in dubbed versions) dialect. Lady’s native tongue is primarily what makes her interesting and unique, but while the other prominent characters begin to develop and change throughout the series, Lady and the other unintelligible characters I mentioned tend to generally lose focus, as the initial charm of their character cannot compete with the changes surrounding them. That being said, I do love Lady as a character. As unique as her voice is on its own, I actually think that she possesses a more intriguing trait that ties into my fondness for her: she’s perhaps the most normal and mature character in the series. It’s odd to say that when referring to a sentient rainbow unicorn, but it’s the truth; while the main cast is either enjoyably goofy (Jake, LSP, BMO) or filled to the brim with baggage (Princess Bubblegum, Marceline) or somewhere in between (Finn, Ice King), Lady proves to be the most laid back in her behavior and the most stable when it comes to her emotions. Now, that doesn’t mean she has no problems, as seen in this episode, but she’s matured to the point where she’s confident enough to tackle her issues head on and dismiss them accordingly. And we see her do just that in this episode, where she not only confronts her hateful past boyfriend, but her past in general. It’s important to note that this is the first episode in the series to use subtitles to translate Lady’s dialogue (among others) to the audience. I’m kind of half and half about this decision; on the one hand, I feel like part of the charm regarding Lady also contributed to the fact that the audience was never spoon-fed when it came to trying to decipher exactly what Lady is saying, whether it be theorized guesses, or just working off of body language and tone. On the other hand, I’m… not entirely sure this episode would work without them? It’s hard to say, because I want to claim that I’d be able to get through this one fine without subtitles, but I’ll never truly know because I’ll never have the option to do so. So, ultimately I feel as though it was a fully necessary decision, but one that I will always feel a bit iffy about just because I generally feel like it takes away part of the fun about Lady’s character. The only other issue I have with the subtitles actually doesn’t apply anymore; when this episode first aired, the giant fucking Cartoon Network logo took up half of the screen and covered parts of the dialogue, which was hella distracting. Luckily, DVD and digital releases mean I no longer have to complain about this minor inconvenience anymore! On the whole, it is really cool that a majority of the dialogue in this episode is spoken in Korean. I don’t know how well the younger kiddos are into reading written dialogue, but I still think it’s cool for the sensibilities of non-Korean speaking lads to be challenged by watching an entire 11 minute block of Korean speech. That’s also implying that any younger kids actually watched this episode, what with the fact that CN completely gave up on advertising by this point in time, which led to record-low ratings for this episode, but I digress. While this episode is somewhat intended to be a Lady-focused episode, T.V. takes just as much spotlight when he essentially lures Lee in, LR’s former boyfriend, and instigates the main conflict of the episode. While I do enjoy this one overall, I think this is the episode that made T.V. go from a pup that I just didn’t care much for, to my least favorite of his siblings. He really has no motivation in the entire episode, and merely is there to, as I mentioned, drive the conflict forward and to be as selfish and lazy as possible. A lot of people would argue that Kim Kil Whan is more unlikable because of his actions in Ocarina, but I think that Kim Kil Whan is at least a less hollow character. KKW is certainly harsh in his actions, though he’s driven by his desires to ensure that his father leads a worthwhile life (in his eyes, at least), while T.V. is simply driven by his desire to do whatever he wants and to mooch off of the people who treat him better than he deserves to be treated, and he still gets rewarded by the end of the episode. It really reminds me of all the Lumpy Space Princess episodes where she acts like an absolute asshole to others and suffers no repercussions. Just leaves me with a bad taste in my mouth. Thankfully, the other two main characters of this episode are much more enjoyable. I think Lee is a particularly interesting villain with a unique voice (he’s actually portrayed by former storyboard artist Bert Youn, awesome!). I like how Lee isn’t necessarily one-dimensional in his bigotry, as he’s more so seeking socio-economic security, rather than being racist for the sake of being racist. Lee wants to root for whoever’s on top, whether that means demeaning those different from him, or going against his own species as a result. But he isn’t just a straightforward villain, and he’s actually quite charming, for the most part. This especially factors into how Lady and Lee ended up together to begin with. While Lee is obviously rebellious and close-minded, it seems like he actually treated Lady well, for the most part. He was seemingly kind, loving, and even intended on keeping her away from his more elaborate plans to harm dog-kind. Of course, he’s clearly shown to be manipulative when Lady does find out, and likely cares more about his rank within the Crystal Dimension more than he actually cares for her. It really does ring true to me that toxic people are typically the most charming individuals you come across: they’re funny, down to have a good time, and bring with them loads of energy and immediate social gratification. It isn’t until later that the charm begins to fade and the true ugliness of these beings begins to show, in which Lady gradually picks up on as she spends time with Lee. That’s the other factor regarding toxic people: those who surround them are sometimes the nicest souls out there, but easily impressionable and ignorant to seeing the cons of humanity. Their entire backstory is told successfully through the use Lady’s easily seen progression and the clear implication that prejudice following the Rainicorn-Dog Wars still exists in the mainstream. There’s a lot of really neat subtext regarding the post-Rainicorn-Dog Wars world. It’s very clear that, while prejudice is still rampant, there are means of progression in terms of some citizens. It’s clear that the native language of rainicorns is Korean, while dogs primarily speak English. Bob and Ethel (who make their triumphant return!) use translators, likely because they want to adapt to the changing society and to communicate with other dogs around them. While other characters like Roy speak in English entirely… which is strange, because he seems to be on board with Lee’s whole plan, but it could also mean that he too is tired of conforming to the standards that society has pushed onto him. I’m just glad that Fred Stoller got to provide his talents for the show. And I just noticed that their names are Lee and Roy. Leroy. Hm. Keeping in tradition with the rest of this episode, this one just looks awesome. Crystals Have Power previously introduced us to a considerably less interesting Crystal Dimension, but this one is awesome. I love the combination of bleak, subdued backgrounds, coupled with the bright and colorful crystals that surround them. There’s so many locations and backdrops that were specially made for this episode; background designers Andy Ristaino and Chris Tsirgiotis really put in all of their effort to ensure that the Crystal Dimension feels big and expansive, and they truly made something beautiful in the process. Not to mention, it allowed for them to have as much fun with making everything as crystallized as possible. Even the clouds are crystals! Aside from backgrounds, this episode has a keen sense of character design to it as well. It is so clearly Graham Falk’s work, and that fact really shines through when looking at all of the different dog designs that he drew up. I too love that he made a valiant effort to divert from making all of the dogs look too similar to Jake, but also made it apparent that he didn’t want to make them too different either. Falk’s zany sense of humor is also apparent as always, but most prominent when Lady merely uses a newspaper to wade off the opposition of Lee’s dog guards. That had me in stitches. One main criticism I have about this one is that I don’t really like how it ends. Aside from the T.V. aspect I mentioned earlier, I feel like the crystallized sandwich has no real payoff. I guess it is somewhat of a humorous tie-in to Jake’s love of sandwiches, and that dogs in general have some special kind affection for the food item in general, but I just don’t really get how it works and why it consumed Lee, but not T.V. And the way T.V. saves the day by simply placing the sandwich back in the box is really lame. I feel like Graham Falk wrote in this aspect to merely drive the conflict of the episode, but didn’t really have anywhere to go with it from there. It really feels like a rushed and barely thought out conclusion. But, in general, I think Lady Rainicorn of the Crystal Dimension is nice. I don’t think it’s particularly great, but after seven seasons, it’s entirely necessary for Lady to have this type of star role for an episode. It’s an interesting exploration of her backstory, and the backstory of the Crystal Dimension in general, with silly gags and animation scattered throughout. It has its issues story and character-wise, but it’s one that provides for a strong exploration of one of AT’s most mysterious characters. Favorite line: “Prayer works!”
2024-01-17T01:27:17.568517
https://example.com/article/8333
Q: LINQ/XML in C# - returning an XPATH count with XPathEvaluate I'm trying to understand how to take any standard XPath from another tool, and make it work in C# with Linq. I know there many other ways to get the answer, but this is for specific research and learning that I'm doing. I use XPath all the time, and seems like I should be able to copy it from any other tool using XPath 1.0 and run it here (like I can with XmlDocument and SelectSingleNode method). Actually, I haven't tried the Count with SelectSingleNode, will do that later this weekend. First, I found that I have to use the XPathEvaluate on XDocument instead of XElement, so I don't have to remove the first part of the XPath. using System; using System.Xml.Linq; using System.Xml.XPath; namespace Linq_Test { class Program { static void Main(string[] args) { XElement root = new XElement("Root", new XElement("Child", "John"), new XElement("Child", "Jane") ); XDocument xdoc = new XDocument(root); /* XElement el = root.XPathSelectElement("./Child[1]"); Console.WriteLine(el); */ string xpathChildCount1 = "count(Root/Child)"; string strChildCount1 = xdoc.XPathEvaluate("string(" + xpathChildCount1 + ")") as string; Console.WriteLine("ChildCount1=" + strChildCount1); string strChildCount2 = xdoc.XPathEvaluate(xpathChildCount1) as string; Console.WriteLine("ChildCount2=" + strChildCount2); /* int intChildCount = (int)root.XPathEvaluate("string(" + xpathChildCount + ")"); Console.WriteLine("Numeric ChildCount=" + intChildCount); */ Console.WriteLine("\n\n Press enter to end ...."); Console.ReadLine(); } } } To get the Count() to work, this StackOverflow post gave me the idea to wrap the XPath with "string(XPath)". ChildCount1=2 ChildCount2= Is there a way to get back the count to an integer without having to wrap the "string()" around the XPath? Yes, I can cast the string to an integer, but why is it needed? A: According to Microsoft Documentation XPathEvaluate, the method returns An object that can contain a bool, a double, a string, or an or IEnumerable, so you could use double instead string to get the Count like : double? nullableCount = root.XPathEvaluate(xpathChildCount1) as double?; double count = nullableCount.Value; Console.WriteLine("ChildCount2=" + count); Result ChildCount2=2 I hope you find this helpful.
2023-10-30T01:27:17.568517
https://example.com/article/1545
Q: Does a dynamic VHD have any space overhead Basically, does a full (say) 1TB VHD file occupy more than 1TB of disk space on the host device? A: Yes, there is space overhead and it depends on the type of VHD. For a fixed VHD, there is a 512 byte footer after the raw disk image. For a dynamic VHD, it's only slightly more complicated. The size of the VHD is equal to the size of the actual data written to it plus the size of the header and footer. In your example, your fixed disk VHD would consume (1TB + 512 bytes) of total space. A dynamic VHD of the same type would consume (1TB + (2 * 512 bytes)) of total space. You can read about the VHD specification here (Word .doc).
2023-11-06T01:27:17.568517
https://example.com/article/5738
Spurrier Enters the Shadows with "X-Force" The governments of the world subject their spies and soldiers to rigorous training in order for them to sneak in and out of enemy facilities and destroy hostile forces undetected. In the Marvel Universe, however, there are individuals with fantastic powers that allow them to accomplish these tasks without all that training, making these super powered individuals perfect covert ops agents for governments. In recent years the number of covert action super teams has increased in the Marvel Universe with the emergence of squads like the Secret Avengers and Britain's MI-13. This February, a new team covert super agents takes to the shadows when writer Simon Spurrier and artist Rock-he Kim launch an all-new "X-Force" ongoing series. CBR News spoke with Spurrier about the series which finds a new incarnation of the titular team engaging in clandestine missions to protect and advance the cause of mutant rights. CBR News: Simon, you've been writing stories in the X-Men corner of the Marvel Universe for some time now, and I imagine that's what led to Marvel offering you "X-Force." What made the book an appealing assignment to you? What sort of potential did you see in the concept of the team? In the wake of "Vendetta," Si Spurrier and Rock-he Kim launch a brand new "X-Force" #1 in February Simon Spurrier: One of those "too good to turn down" opportunities, simply put. I had a few options on the table but when [editor] Daniel [Ketchum] mentioned X-Force it squirreled everything else away very quickly. I guess it just plays to a lot of my fascinations and, I think, strengths. Like, it'll come as no surprise to "X-Men Legacy" readers that I've always been a little cynical about some of the more saccharine manifestations of the "team-up-and-do-good-by-punching-stuff" formula. So the chance to play in the really badass end of the mutant pool was very seductive. See, with X-Force there's a clear mandate in place (I'll come to that in a minute) and whether you or I agree with the whys and wherefores of what the team does, which is obviously going to be an overarching theme, there's never any need to contrive daft threats or dumb heroic disagreements just to catalyze The Next Fight Scene. X-Force is about factionalism, it's about control and it's about politics. The kind that needs body bags. The oldest kind there is. More selfishly, I get to write dialogue for some of the most amazingly distinct characters in the X-pantheon, with some of the most entertaining conflicts between them. I get to bring a dose of mutant centric weirdness and a healthy sprinkle of snark to the twilight world of global espionage. Which is basically ALL THE FOODGROUPS. Also: I get to invent brain-blowing amazing scenes of action and Xplodo. SEE WHAT I DID THERE? BECAUSE, LIKE, THE "X" IS PART OF THE BRAND, SO ohwhatsthepoint. [Laughs] X-Force has played many roles in the Marvel's and X-Men Universe. They've been a proactive super hero team, a high profile group of media darlings, a team of heroic assassins, and currently there are two versions of the team: one that defends Los Angeles from weird and shadowy threats and another that assists Cable in his battle against a host of apocalyptic menaces. What is the mandate and purpose of your X-Force team? What types of missions might we see them on? Will they be associated with Wolverine or Cyclops' factions of the X-Men or will they function independently? Here's the basic setup: Almost every nation in the Marvel Universe secretly employs superhuman operatives to pursue its covert interests. And always has. We're aware of some of these groups: Secret Avengers and MI-13 spring to mind. We're going to be meeting a lot more. These guys aren't necessarily about saving the world, they're about serving the interests of their own people, their own nations. Keeping the home flag flying high. Worth saying: this stuff is going on in the real world all the time. Unmanned predator drones, civilian spying software, undeclared special-ops missions, off grid aeronautical technology, cyber invasion, bloody radioactive sushi! Switch on the news, brothers and sisters, we are adrift upon a world of shadowy espionage far more elaborate and vituperative than the most insane James Bondian excesses. In our world this endless shadow-game is played using technology and intelligence. In the Marvel U? They have super humans. Some stuff has happened. One event in particular -- we're calling it "the Alexandria incident" -- which has shaken the international intelligence community to its roots. And mutantkind is bearing the brunt. So Cable has been thinking. He's realized that the only way mutantkind is going to survive is to start dealing with The Modern World on its terms. Mutants need to start thinking of themselves as a state -- without borders, without government, without centralized rule, but still: a disparate country in its own right. And for that? They need to start playing the shadow game. As Cable himself puts it: "Nation of mutantkind needs a dirty tricks department. We're it." So we're going to see them on hits. We're going to see them stealing intelligence, technology and weaponry from other factions. We're going to see them truffling-out emergent threats and destroying them before they can get started. It's broadly the same denominator of old -- a black ops X-Men team -- but with a lot more of an emphasis on International and inter-factional competition. The whole thing, of course, is a grand and grim metaphor for the secret black-technology race going on under our noses every day. Let's take some time to chat about some of the characters that will appear in "X-Force" starting with Cable. What do you find most interesting about the group's leader? Which aspects of his personality do you plan to explore? Cable will be keeping a secret from his teammates when the new "X-Force" begins Interesting place to start. I mean, obviously Cable's been around for a long time and we've all got a pretty good handle on what he represents. If forced to list some words I'd start with "soldier" and work my way down via "grim," "duty," "grizzled" and possibly "enormogun." But in this series there's something a little bit odd about him. He's even more monosyllabic than usual. He's clearly keeping secrets about something -- but what? Writing Cable's great fun. I just finished "Six-Gun Gorilla" for BOOM! Studios (seriously: check it out. I'm exceedingly proud of it, and it's got a lot more going on than the title suggests) so I was already hopped-up on that kind of man-with-no-name, squint-at-the-sun, don't-say-anything-you-don't-have-to-say character. My feeling with Cable is that he's carved out of rock: you never quite know what he's thinking or feeling. But if you peer into that one-good-eye of his you're going to see oceans of rage, pain and hope boiling bright. I also understand Fantomex and Psylocke will be part of this series. What can you tell us about the dynamic between these two ex-lovers when your series begins? If I remember correctly, the last time we saw Fantomex he and his female incarnation wanted to join back together into one body and rekindle their relationship with Psylocke, but she spurned them. Is that correct? Yeah, that's about the size of it. Their current relationship is -- well, Rocky. Don't want to give too much away because a lot of development and fun will come from how the various characters interact, and these two have got water under the bridge even before the others come along to start swirling everything up. But I don't think it's spoiling anything to suggest Betsy's less than pleased to discover Fantomex is a part of the team. She's got her own issues to contend with, and quite apart from all the broken promises, past revelations, bi-sexy fun times and catastrophic betrayals she's simply decided she's sick of being The Team Member Who Has Romances. She's fed up of getting her heartstrings twanged, and intends to keep that side of her life separate from the, y'know, shootyknifeyninja black-ops stuff. Which seems pretty smart. But is probably doomed. Fantomex, for his part, simply assumes Betsy's still desperately in love with him and will inevitably come round. Because he's Fantomex. I also understand you're bringing in a character who hasn't been an active part of the Marvel Universe in awhile, Marrow. Why did you decide to include her in "X-Force?" When we last saw Marrow she lost her mutant abilities in the "Decimation" following "House of M. Will that still be the case when she appears in "X-Force?" Yeah, she lost her powers. That's sort of a plot point and a character point and a thematic point. Which makes it the best sort of point, but the worst sort of thing for me to talk about. It's addressed, let's just say that. Marrow's -- ha, Marrow's awesome. There's this really funny paradox when it comes to lesser-known characters. Everyone's got their weird little favorites but they'll react with incredulity to everyone else's. Weirder still, we often haven't thought too deeply about why we've got these odd fixations on certain characters: they just suggest themselves like old friends and we can't quite shake the inexplicable certainty of their thunderous AWESOMENESS despite all evidence and claims to the contrary. For me it usually comes down to inventive weirdness (e.g. Maggott) or sheer visual interest (e.g. Chamber) -- but when I got the chance to include a real Didn't-See-That-Coming character in X-Force my brain went straight to Marrow. She's layered. She's kind of crazy. She's punky and she tries a bit too hard. She's got a lot to prove, and frequently screws-up. But she's so strong, down under all those layers of fragility she desperately doesn't want you to see, and that's what lies at the core of who she is. She's a fighter, but not in the way she thinks. Can you talk about the identities of any other members of of your X-Force team? Will Cable's daughter Hope be part of the book? And will this series afford you another chance to write Doctor Nemesis? The series spins out of the events of "Vendetta," the upcoming crossover between "Cable and X-Force" and "Uncanny X-Force" The fifth member of the team... well, let's just say we'll be meeting her -- it's a her -- at the end of episode 1, but won't really get to know her until episode 2. She's... Well, she's a mutant. But she's not like any mutant you've met so far. She's very plugged in to a lot of the themes and connective tissues I waffled about above. Her name's MeMe. Make of that what you will. Hope -- [Laughs] I have to be veeeerrry careful about what I say here. Hope has a role to play in this series, yes. Pretty much all I can say about that is that I think that role is going to be a cause of some discussion amongst her fans and her detractors alike. What's the initial dynamic of this team? Their ranks include members of two different X-Force groups that will meet up in January's "Vendetta" crossover between "Uncanny X-Force" and "Cable & X-Force." Will the fallout from that storyline color how your teammates views each other? I have to be circumspect here because I don't want to intrude upon or taint the exceedingly good work being done by the teams on "UXF" or "CAXF," nor steal any thunder from what is going to be a truly epic send-off. What I'll say is this: my version of X-Force represents a new beginning of sorts. In some ways it's a return to a more classic notion of what "X-Force" means; in other ways I think it's a whole new beast with a very new set of preoccupations and themes. Either way, it's a ground-level restart. If you've been following the two current XF books then, a) congratulations on your impeccable taste, and b) I think this new book is going to roll-in and fill the void they will inevitably leave very satisfyingly. If you aren't reading either XF book right now then don't worry: we're launching with a whole new set of triggers, mysteries and ideas, and you aren't going to feel as though you're missing out if you don't know every last bit of the characters' recent histories. We'll be filling in the blanks sensitively and sandblasting you with new and exciting twists in equal measure. You're working with artist Rock-he Kim on "X-Force." What do you feel he brings to the book as an artist? Style, mood and texture. He's got a bit of an Adi Granov thing going on, albeit with a very subtle and very attractive wisp of an Asian sensibility about it. He does great faces, great bodies, great weapons and amaaaazing super spy exploding-fist ragemonsters. Just for instance. Finally, what is your initial "X-Force" story? What kind of scope are we talking about? Scope and scale: global. Plot: cunning. I won't give too much away, but I think the whole thing stands as an action-heavy commentary on the way exciting new technologies so quickly get appropriated as weapons of war in today's world. Oh, and there's a very very cool and much-missed blast from the Marvel past which you have got to see. We're going to be visiting every corner of the world, and blowing them up. We're going to see a lot of cool buildings and vehicles, then blow them up. We're going to meet lots of new characters, who... Y'know. Thematically: I think I touched pretty heavily on this above. It's about the world we live in today. It's about how much influence on our lives the secret agencies of our governments and institutions wield. It's about globalization, weaponization and technologization. It's about Spurrier's First Rule: factions speak louder than herds. Nor is this book purely about "good vs evil," which I often worry is a really unhelpful and unhealthy view of reality to be peddling. We live in a very complex world after all, and trying to reduce it down to moral binaries is going to lead to ignorance at best and extremism at worst. Partly, that's what this iteration of X-Force is about. It's about accepting that the whole "us vs them" thing, which has always underscored mutant centric books, isn't always synonymous with "good vs bad." It's about factionalism, ultimately. You don't have to think someone's evil to be functionally "against" them. It's about grim political realities, secret agendas and people with all the right intentions behaving in a very questionable way. In fact, I guess it's not far off the stuff I was doing in "Legacy." And we'll still get a lot of the same sensibilities too. I'm very aware that just because I'm writing a book in which, for the sake of argument, someone headbutts an airplane in mid-air -- cough -- that doesn't mean there isn't infinite scope for the sort of very intimate, very personal, very feels-oriented story lines I've been crafting with David Haller. That's the beauty of comics: the epic and the intimate can so easily coexist. And then, above all, there's the simple human side of it. A group of soldiers trying to do what they think is right even when it looks and feels wrong. Also, guns. THE SUBTEXT IS GUNS. "X-Force" #1 by Simon Spurrier and Rock-He Kim goes on sale in February.
2023-10-18T01:27:17.568517
https://example.com/article/4586
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <!-- NewPage --> <html lang="en"> <head> <!-- Generated by javadoc (1.8.0_202) on Fri Jul 24 11:53:37 GMT 2020 --> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>PrecompiledQueryNode (Eclipse RDF4J 3.3.0 API)</title> <meta name="date" content="2020-07-24"> <link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="Style"> <script type="text/javascript" src="../../../../../script.js"></script> </head> <body> <script type="text/javascript"><!-- try { if (location.href.indexOf('is-external=true') == -1) { parent.document.title="PrecompiledQueryNode (Eclipse RDF4J 3.3.0 API)"; } } catch(err) { } //--> var methods = {"i0":10,"i1":10}; var tabs = {65535:["t0","All Methods"],2:["t2","Instance Methods"],8:["t4","Concrete Methods"]}; var altColor = "altColor"; var rowColor = "rowColor"; var tableTab = "tableTab"; var activeTableTab = "activeTableTab"; </script> <noscript> <div>JavaScript is disabled on your browser.</div> </noscript> <!-- ========= START OF TOP NAVBAR ======= --> <div class="topNav"><a name="navbar.top"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.top" title="Skip navigation links">Skip navigation links</a></div> <a name="navbar.top.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="class-use/PrecompiledQueryNode.html">Use</a></li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../../index-all.html">Index</a></li> <li><a href="../../../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../../../org/eclipse/rdf4j/federated/algebra/NUnion.html" title="class in org.eclipse.rdf4j.federated.algebra"><span class="typeNameLink">Prev&nbsp;Class</span></a></li> <li><a href="../../../../../org/eclipse/rdf4j/federated/algebra/QueryRef.html" title="interface in org.eclipse.rdf4j.federated.algebra"><span class="typeNameLink">Next&nbsp;Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../../../index.html?org/eclipse/rdf4j/federated/algebra/PrecompiledQueryNode.html" target="_top">Frames</a></li> <li><a href="PrecompiledQueryNode.html" target="_top">No&nbsp;Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_top"> <li><a href="../../../../../allclasses-noframe.html">All&nbsp;Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_top"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li><a href="#fields.inherited.from.class.org.eclipse.rdf4j.query.algebra.UnaryTupleOperator">Field</a>&nbsp;|&nbsp;</li> <li><a href="#constructor.summary">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#constructor.detail">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.detail">Method</a></li> </ul> </div> <a name="skip.navbar.top"> <!-- --> </a></div> <!-- ========= END OF TOP NAVBAR ========= --> <!-- ======== START OF CLASS DATA ======== --> <div class="header"> <div class="subTitle">org.eclipse.rdf4j.federated.algebra</div> <h2 title="Class PrecompiledQueryNode" class="title">Class PrecompiledQueryNode</h2> </div> <div class="contentContainer"> <ul class="inheritance"> <li><a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true" title="class or interface in java.lang">java.lang.Object</a></li> <li> <ul class="inheritance"> <li><a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html" title="class in org.eclipse.rdf4j.query.algebra">org.eclipse.rdf4j.query.algebra.AbstractQueryModelNode</a></li> <li> <ul class="inheritance"> <li><a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html" title="class in org.eclipse.rdf4j.query.algebra">org.eclipse.rdf4j.query.algebra.UnaryTupleOperator</a></li> <li> <ul class="inheritance"> <li><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html" title="class in org.eclipse.rdf4j.query.algebra">org.eclipse.rdf4j.query.algebra.QueryRoot</a></li> <li> <ul class="inheritance"> <li>org.eclipse.rdf4j.federated.algebra.PrecompiledQueryNode</li> </ul> </li> </ul> </li> </ul> </li> </ul> </li> </ul> <div class="description"> <ul class="blockList"> <li class="blockList"> <dl> <dt>All Implemented Interfaces:</dt> <dd><a href="http://download.oracle.com/javase/7/docs/api/java/io/Serializable.html?is-external=true" title="class or interface in java.io">Serializable</a>, <a href="http://download.oracle.com/javase/7/docs/api/java/lang/Cloneable.html?is-external=true" title="class or interface in java.lang">Cloneable</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/GraphPatternGroupable.html" title="interface in org.eclipse.rdf4j.query.algebra">GraphPatternGroupable</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html" title="interface in org.eclipse.rdf4j.query.algebra">QueryModelNode</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/TupleExpr.html" title="interface in org.eclipse.rdf4j.query.algebra">TupleExpr</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/VariableScopeChange.html" title="interface in org.eclipse.rdf4j.query.algebra">VariableScopeChange</a></dd> </dl> <hr> <br> <pre>public class <span class="typeNameLabel">PrecompiledQueryNode</span> extends <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html" title="class in org.eclipse.rdf4j.query.algebra">QueryRoot</a></pre> <div class="block">Node representing a precompiled query.</div> <dl> <dt><span class="simpleTagLabel">Author:</span></dt> <dd>Andreas Schwarte</dd> <dt><span class="seeLabel">See Also:</span></dt> <dd><a href="../../../../../org/eclipse/rdf4j/federated/evaluation/SailTripleSource.html" title="class in org.eclipse.rdf4j.federated.evaluation"><code>SailTripleSource</code></a>, <a href="../../../../../serialized-form.html#org.eclipse.rdf4j.federated.algebra.PrecompiledQueryNode">Serialized Form</a></dd> </dl> </li> </ul> </div> <div class="summary"> <ul class="blockList"> <li class="blockList"> <!-- =========== FIELD SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="field.summary"> <!-- --> </a> <h3>Field Summary</h3> <ul class="blockList"> <li class="blockList"><a name="fields.inherited.from.class.org.eclipse.rdf4j.query.algebra.UnaryTupleOperator"> <!-- --> </a> <h3>Fields inherited from class&nbsp;org.eclipse.rdf4j.query.algebra.<a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html" title="class in org.eclipse.rdf4j.query.algebra">UnaryTupleOperator</a></h3> <code><a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html#arg">arg</a></code></li> </ul> </li> </ul> <!-- ======== CONSTRUCTOR SUMMARY ======== --> <ul class="blockList"> <li class="blockList"><a name="constructor.summary"> <!-- --> </a> <h3>Constructor Summary</h3> <table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Constructor Summary table, listing constructors, and an explanation"> <caption><span>Constructors</span><span class="tabEnd">&nbsp;</span></caption> <tr> <th class="colOne" scope="col">Constructor and Description</th> </tr> <tr class="altColor"> <td class="colOne"><code><span class="memberNameLink"><a href="../../../../../org/eclipse/rdf4j/federated/algebra/PrecompiledQueryNode.html#PrecompiledQueryNode-org.eclipse.rdf4j.query.algebra.TupleExpr-">PrecompiledQueryNode</a></span>(<a href="../../../../../org/eclipse/rdf4j/query/algebra/TupleExpr.html" title="interface in org.eclipse.rdf4j.query.algebra">TupleExpr</a>&nbsp;query)</code>&nbsp;</td> </tr> </table> </li> </ul> <!-- ========== METHOD SUMMARY =========== --> <ul class="blockList"> <li class="blockList"><a name="method.summary"> <!-- --> </a> <h3>Method Summary</h3> <table class="memberSummary" border="0" cellpadding="3" cellspacing="0" summary="Method Summary table, listing methods, and an explanation"> <caption><span id="t0" class="activeTableTab"><span>All Methods</span><span class="tabEnd">&nbsp;</span></span><span id="t2" class="tableTab"><span><a href="javascript:show(2);">Instance Methods</a></span><span class="tabEnd">&nbsp;</span></span><span id="t4" class="tableTab"><span><a href="javascript:show(8);">Concrete Methods</a></span><span class="tabEnd">&nbsp;</span></span></caption> <tr> <th class="colFirst" scope="col">Modifier and Type</th> <th class="colLast" scope="col">Method and Description</th> </tr> <tr id="i0" class="altColor"> <td class="colFirst"><code><a href="../../../../../org/eclipse/rdf4j/federated/algebra/PrecompiledQueryNode.html" title="class in org.eclipse.rdf4j.federated.algebra">PrecompiledQueryNode</a></code></td> <td class="colLast"><code><span class="memberNameLink"><a href="../../../../../org/eclipse/rdf4j/federated/algebra/PrecompiledQueryNode.html#clone--">clone</a></span>()</code> <div class="block">Returns a (deep) clone of this query model node.</div> </td> </tr> <tr id="i1" class="rowColor"> <td class="colFirst"><code><a href="../../../../../org/eclipse/rdf4j/query/algebra/TupleExpr.html" title="interface in org.eclipse.rdf4j.query.algebra">TupleExpr</a></code></td> <td class="colLast"><code><span class="memberNameLink"><a href="../../../../../org/eclipse/rdf4j/federated/algebra/PrecompiledQueryNode.html#getQuery--">getQuery</a></span>()</code>&nbsp;</td> </tr> </table> <ul class="blockList"> <li class="blockList"><a name="methods.inherited.from.class.org.eclipse.rdf4j.query.algebra.QueryRoot"> <!-- --> </a> <h3>Methods inherited from class&nbsp;org.eclipse.rdf4j.query.algebra.<a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html" title="class in org.eclipse.rdf4j.query.algebra">QueryRoot</a></h3> <code><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html#equals-java.lang.Object-">equals</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html#getParentNode--">getParentNode</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html#hashCode--">hashCode</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html#setParentNode-org.eclipse.rdf4j.query.algebra.QueryModelNode-">setParentNode</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html#visit-org.eclipse.rdf4j.query.algebra.QueryModelVisitor-">visit</a></code></li> </ul> <ul class="blockList"> <li class="blockList"><a name="methods.inherited.from.class.org.eclipse.rdf4j.query.algebra.UnaryTupleOperator"> <!-- --> </a> <h3>Methods inherited from class&nbsp;org.eclipse.rdf4j.query.algebra.<a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html" title="class in org.eclipse.rdf4j.query.algebra">UnaryTupleOperator</a></h3> <code><a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html#getArg--">getArg</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html#getAssuredBindingNames--">getAssuredBindingNames</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html#getBindingNames--">getBindingNames</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html#replaceChildNode-org.eclipse.rdf4j.query.algebra.QueryModelNode-org.eclipse.rdf4j.query.algebra.QueryModelNode-">replaceChildNode</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html#setArg-org.eclipse.rdf4j.query.algebra.TupleExpr-">setArg</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/UnaryTupleOperator.html#visitChildren-org.eclipse.rdf4j.query.algebra.QueryModelVisitor-">visitChildren</a></code></li> </ul> <ul class="blockList"> <li class="blockList"><a name="methods.inherited.from.class.org.eclipse.rdf4j.query.algebra.AbstractQueryModelNode"> <!-- --> </a> <h3>Methods inherited from class&nbsp;org.eclipse.rdf4j.query.algebra.<a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html" title="class in org.eclipse.rdf4j.query.algebra">AbstractQueryModelNode</a></h3> <code><a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#getCostEstimate--">getCostEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#getResultSizeActual--">getResultSizeActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#getResultSizeEstimate--">getResultSizeEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#getSignature--">getSignature</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#getTotalTimeNanosActual--">getTotalTimeNanosActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#isGraphPatternGroup--">isGraphPatternGroup</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#isVariableScopeChange--">isVariableScopeChange</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#nullEquals-java.lang.Object-java.lang.Object-">nullEquals</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#replaceNodeInList-java.util.List-org.eclipse.rdf4j.query.algebra.QueryModelNode-org.eclipse.rdf4j.query.algebra.QueryModelNode-">replaceNodeInList</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#replaceWith-org.eclipse.rdf4j.query.algebra.QueryModelNode-">replaceWith</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#setCostEstimate-double-">setCostEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#setGraphPatternGroup-boolean-">setGraphPatternGroup</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#setResultSizeActual-long-">setResultSizeActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#setResultSizeEstimate-double-">setResultSizeEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#setTotalTimeNanosActual-long-">setTotalTimeNanosActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#setVariableScopeChange-boolean-">setVariableScopeChange</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/AbstractQueryModelNode.html#toString--">toString</a></code></li> </ul> <ul class="blockList"> <li class="blockList"><a name="methods.inherited.from.class.java.lang.Object"> <!-- --> </a> <h3>Methods inherited from class&nbsp;java.lang.<a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true" title="class or interface in java.lang">Object</a></h3> <code><a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true#finalize--" title="class or interface in java.lang">finalize</a>, <a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true#getClass--" title="class or interface in java.lang">getClass</a>, <a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true#notify--" title="class or interface in java.lang">notify</a>, <a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true#notifyAll--" title="class or interface in java.lang">notifyAll</a>, <a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true#wait--" title="class or interface in java.lang">wait</a>, <a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true#wait-long-" title="class or interface in java.lang">wait</a>, <a href="http://download.oracle.com/javase/7/docs/api/java/lang/Object.html?is-external=true#wait-long-int-" title="class or interface in java.lang">wait</a></code></li> </ul> <ul class="blockList"> <li class="blockList"><a name="methods.inherited.from.class.org.eclipse.rdf4j.query.algebra.QueryModelNode"> <!-- --> </a> <h3>Methods inherited from interface&nbsp;org.eclipse.rdf4j.query.algebra.<a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html" title="interface in org.eclipse.rdf4j.query.algebra">QueryModelNode</a></h3> <code><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#getCostEstimate--">getCostEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#getResultSizeActual--">getResultSizeActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#getResultSizeEstimate--">getResultSizeEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#getSignature--">getSignature</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#getTotalTimeNanosActual--">getTotalTimeNanosActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#replaceWith-org.eclipse.rdf4j.query.algebra.QueryModelNode-">replaceWith</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#setCostEstimate-double-">setCostEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#setResultSizeActual-long-">setResultSizeActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#setResultSizeEstimate-double-">setResultSizeEstimate</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#setTotalTimeNanosActual-long-">setTotalTimeNanosActual</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#toString--">toString</a></code></li> </ul> <ul class="blockList"> <li class="blockList"><a name="methods.inherited.from.class.org.eclipse.rdf4j.query.algebra.GraphPatternGroupable"> <!-- --> </a> <h3>Methods inherited from interface&nbsp;org.eclipse.rdf4j.query.algebra.<a href="../../../../../org/eclipse/rdf4j/query/algebra/GraphPatternGroupable.html" title="interface in org.eclipse.rdf4j.query.algebra">GraphPatternGroupable</a></h3> <code><a href="../../../../../org/eclipse/rdf4j/query/algebra/GraphPatternGroupable.html#isGraphPatternGroup--">isGraphPatternGroup</a>, <a href="../../../../../org/eclipse/rdf4j/query/algebra/GraphPatternGroupable.html#setGraphPatternGroup-boolean-">setGraphPatternGroup</a></code></li> </ul> </li> </ul> </li> </ul> </div> <div class="details"> <ul class="blockList"> <li class="blockList"> <!-- ========= CONSTRUCTOR DETAIL ======== --> <ul class="blockList"> <li class="blockList"><a name="constructor.detail"> <!-- --> </a> <h3>Constructor Detail</h3> <a name="PrecompiledQueryNode-org.eclipse.rdf4j.query.algebra.TupleExpr-"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>PrecompiledQueryNode</h4> <pre>public&nbsp;PrecompiledQueryNode(<a href="../../../../../org/eclipse/rdf4j/query/algebra/TupleExpr.html" title="interface in org.eclipse.rdf4j.query.algebra">TupleExpr</a>&nbsp;query)</pre> </li> </ul> </li> </ul> <!-- ============ METHOD DETAIL ========== --> <ul class="blockList"> <li class="blockList"><a name="method.detail"> <!-- --> </a> <h3>Method Detail</h3> <a name="getQuery--"> <!-- --> </a> <ul class="blockList"> <li class="blockList"> <h4>getQuery</h4> <pre>public&nbsp;<a href="../../../../../org/eclipse/rdf4j/query/algebra/TupleExpr.html" title="interface in org.eclipse.rdf4j.query.algebra">TupleExpr</a>&nbsp;getQuery()</pre> </li> </ul> <a name="clone--"> <!-- --> </a> <ul class="blockListLast"> <li class="blockList"> <h4>clone</h4> <pre>public&nbsp;<a href="../../../../../org/eclipse/rdf4j/federated/algebra/PrecompiledQueryNode.html" title="class in org.eclipse.rdf4j.federated.algebra">PrecompiledQueryNode</a>&nbsp;clone()</pre> <div class="block"><span class="descfrmTypeLabel">Description copied from interface:&nbsp;<code><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#clone--">QueryModelNode</a></code></span></div> <div class="block">Returns a (deep) clone of this query model node. This method recursively clones the entire node tree, starting from this nodes.</div> <dl> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html#clone--">clone</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryModelNode.html" title="interface in org.eclipse.rdf4j.query.algebra">QueryModelNode</a></code></dd> <dt><span class="overrideSpecifyLabel">Specified by:</span></dt> <dd><code><a href="../../../../../org/eclipse/rdf4j/query/algebra/TupleExpr.html#clone--">clone</a></code>&nbsp;in interface&nbsp;<code><a href="../../../../../org/eclipse/rdf4j/query/algebra/TupleExpr.html" title="interface in org.eclipse.rdf4j.query.algebra">TupleExpr</a></code></dd> <dt><span class="overrideSpecifyLabel">Overrides:</span></dt> <dd><code><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html#clone--">clone</a></code>&nbsp;in class&nbsp;<code><a href="../../../../../org/eclipse/rdf4j/query/algebra/QueryRoot.html" title="class in org.eclipse.rdf4j.query.algebra">QueryRoot</a></code></dd> <dt><span class="returnLabel">Returns:</span></dt> <dd>A deep clone of this query model node.</dd> </dl> </li> </ul> </li> </ul> </li> </ul> </div> </div> <!-- ========= END OF CLASS DATA ========= --> <!-- ======= START OF BOTTOM NAVBAR ====== --> <div class="bottomNav"><a name="navbar.bottom"> <!-- --> </a> <div class="skipNav"><a href="#skip.navbar.bottom" title="Skip navigation links">Skip navigation links</a></div> <a name="navbar.bottom.firstrow"> <!-- --> </a> <ul class="navList" title="Navigation"> <li><a href="../../../../../overview-summary.html">Overview</a></li> <li><a href="package-summary.html">Package</a></li> <li class="navBarCell1Rev">Class</li> <li><a href="class-use/PrecompiledQueryNode.html">Use</a></li> <li><a href="package-tree.html">Tree</a></li> <li><a href="../../../../../deprecated-list.html">Deprecated</a></li> <li><a href="../../../../../index-all.html">Index</a></li> <li><a href="../../../../../help-doc.html">Help</a></li> </ul> </div> <div class="subNav"> <ul class="navList"> <li><a href="../../../../../org/eclipse/rdf4j/federated/algebra/NUnion.html" title="class in org.eclipse.rdf4j.federated.algebra"><span class="typeNameLink">Prev&nbsp;Class</span></a></li> <li><a href="../../../../../org/eclipse/rdf4j/federated/algebra/QueryRef.html" title="interface in org.eclipse.rdf4j.federated.algebra"><span class="typeNameLink">Next&nbsp;Class</span></a></li> </ul> <ul class="navList"> <li><a href="../../../../../index.html?org/eclipse/rdf4j/federated/algebra/PrecompiledQueryNode.html" target="_top">Frames</a></li> <li><a href="PrecompiledQueryNode.html" target="_top">No&nbsp;Frames</a></li> </ul> <ul class="navList" id="allclasses_navbar_bottom"> <li><a href="../../../../../allclasses-noframe.html">All&nbsp;Classes</a></li> </ul> <div> <script type="text/javascript"><!-- allClassesLink = document.getElementById("allclasses_navbar_bottom"); if(window==top) { allClassesLink.style.display = "block"; } else { allClassesLink.style.display = "none"; } //--> </script> </div> <div> <ul class="subNavList"> <li>Summary:&nbsp;</li> <li>Nested&nbsp;|&nbsp;</li> <li><a href="#fields.inherited.from.class.org.eclipse.rdf4j.query.algebra.UnaryTupleOperator">Field</a>&nbsp;|&nbsp;</li> <li><a href="#constructor.summary">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.summary">Method</a></li> </ul> <ul class="subNavList"> <li>Detail:&nbsp;</li> <li>Field&nbsp;|&nbsp;</li> <li><a href="#constructor.detail">Constr</a>&nbsp;|&nbsp;</li> <li><a href="#method.detail">Method</a></li> </ul> </div> <a name="skip.navbar.bottom"> <!-- --> </a></div> <!-- ======== END OF BOTTOM NAVBAR ======= --> <p class="legalCopy"><small>Copyright &#169; 2015-2020 <a href="https://www.eclipse.org/">Eclipse Foundation</a>. All Rights Reserved.</small></p> </body> </html>
2024-03-12T01:27:17.568517
https://example.com/article/2741
New York (CNN) Moments after barreling his car through the crowded sidewalks in Manhattan's Times Square, Richard Rojas told a traffic agent, "I wanted to kill them all," according to a criminal complaint. A troubled man with a history of drunken driving, Rojas bolted from his maroon Honda Accord after his deadly midday rampage on Thursday that left one person dead and 20 others injured. Rojas moved unsteadily, his eyes were glassy and his speech slurred after his car crashed to a fiery stop, the complaint said. "I smoked," Rojas allegedly told an officer after . He later told another officer, "I smoked marijuana. I laced the marijuana with PCP," according to the complaint. One day after allegedly making a U-turn and steering the car onto packed sidewalks for a three-block stretch, the 26-year-old suspect was arraigned on murder and other charges Friday. He did not enter a plea, and his lawyer later declined comment. One surveillance video showed the car jump the curb and slam into a group of people, sending bodies tumbling over the hood of the speeding car. Alyssa Elsman , an 18-year-old resident of Portage, Michigan, who was visiting the city, was killed. Authorities reported another 22 people were injured, but police revised the total to 20 on Friday. Rojas, a Bronx resident who had served in the Navy, tested positive for PCP and told police that God made him do it, a law enforcement source told CNN. The suspect, who suffered from "psychological issues," also told police he expected officers to shoot him, according to the source. A history of mental health issues Investigators are looking into the suspect's state of mind and psychological history in an attempt to determine a motive, the NYPD chief of Manhattan South Detectives William Aubry said. "We're now hearing from family members [that Rojas] has had demonstrated mental health issues going back to childhood that ... went unaddressed even during the time he was in the U.S. military," New York Mayor Bill de Blasio told WNYC Radio Friday. De Blasio added, "It appears to be intentional in the sense that he was troubled and lashing out. At the root of this ... is an untreated mental health issue going back probably decades." In addition to the murder charge, Rojas also faces 20 counts of attempted murder, one count of aggravated vehicular homicide and a count of attempted murder in the second degree, according to the criminal complaint. Three victims were in critical condition Friday, including a 38-year-old Canadian woman whom Aubry described "very critical." The injured included Elsman's 13-year-old sister, Ava, according to Michelle Karpinski of Portage Public Schools. Alyssa Elsman, 18, was was killed when a speeding car plowed into pedestrians in Times Square. Elsman was a 2016 graduate of Portage Central High School. "Alyssa was the type of person who seemed very shy and reserved when you first met her, but once you started talking to her you realized she was smart, funny and engaging," principal Eric Alburtus said in a statement. "She will be deeply missed by the staff and students here." Rojas has been arrested twice in New York -- in 2015 and 2008 -- for drunken driving, New York Police Commissioner James O'Neill said. In 2013, Rojas -- while in the Navy in Florida-- pleaded guilty to drunken driving, failure to pay a just debt, drunk and disorderly conduct and communicating a threat. As he was arrested at the Mayport Naval Base, Rojas told officers, "My life is over," and threatened to kill police and military police, according to CNN affiliate WJXT. A military judge sentenced him to three months confinement. Last Friday, Rojas was charged with menacing in the second degree and criminal possession of a weapon in the Bronx after he threatened a person with a knife, according to a criminal complaint. He accused the person of trying to steal his identity. He pleaded guilty at arraignment to second-degree harassment, a violation, and was given a conditional discharge, said Bronx district attorney spokeswoman Melanie Dostis. There is no indication that the incident in Times Square, which unfolded just before noon, was an act of terrorism, de Blasio and other officials said. #carcrash #timesquarenewyork A post shared by Stan The Man (@killakowal) on May 18, 2017 at 9:26am PDT Harrowing scene in popular tourist area Before striking pedestrians, the 2009 Honda Accord was "out of control," an emergency management official said. do not come to Times Square!!!! My colleagues and I are safe. A post shared by Ed G Val (@semiquasicelebritywannabe) on May 18, 2017 at 9:04am PDT The speeding car jumped the sidewalk on the west side of 7th Avenue at 42nd Street and struck several pedestrians before crashing at the northwest corner of 45th Street, police said. Witnesses described a harrowing scene that started with screeching tires and ended with screams, chaos and a fiery crash at one of the world's most visited sites. Elizabeth Long, of Dayton, Ohio, was walking to the Hard Rock Cafe when she saw a maroon car heading toward her on the sidewalk. Hearing screams and fearing that the car would hit her, she ran to a nearby building's revolving door. "I wasn't even all the way in when the car sped by" about 10 feet away, said Long, a 54-year-old who was in town to see a musical. Photos: Car hits pedestrians in Times Square A wrecked vehicle is on fire after hitting pedestrians in New York's Times Square on Thursday, May 18. The incident is being investigated as an accident, a New York police official said. The driver is in custody. Hide Caption 1 of 11 Photos: Car hits pedestrians in Times Square People attend to one of the victims. At least one person was killed and nearly two dozen were injured, officials said. Hide Caption 2 of 11 Photos: Car hits pedestrians in Times Square Before striking pedestrians, the car was "out of control," an emergency management official said. Witnesses on social media described a speeding car plowing into people before crashing to a halt. Hide Caption 3 of 11 Photos: Car hits pedestrians in Times Square Emergency workers surround the crash site. The motorist, 26-year-old Richard Rojas, has been arrested twice in the past for drunken driving, according to the New York police commissioner. Hide Caption 4 of 11 Photos: Car hits pedestrians in Times Square An injured person receives first aid. Hide Caption 5 of 11 Photos: Car hits pedestrians in Times Square An injured person lies at the scene. Hide Caption 6 of 11 Photos: Car hits pedestrians in Times Square The wrecked car leans at the intersection of 45th and Broadway. Hide Caption 7 of 11 Photos: Car hits pedestrians in Times Square A victim is attended to in this photo tweeted by the New York City Fire Department. Hide Caption 8 of 11 Photos: Car hits pedestrians in Times Square A victim receives medical attention. Hide Caption 9 of 11 Photos: Car hits pedestrians in Times Square There is no indication it was an act of terrorism, city leaders said. Hide Caption 10 of 11 Photos: Car hits pedestrians in Times Square Police work at the scene. Hide Caption 11 of 11 When Long went outside, she saw at least six people lying on the ground, including a woman lying face-down with blood pouring from her head. "I'm shaken," said Long, who wasn't injured. "Two of the people I saw that were really hurt, people were beside them ... we were trying to tell (police) they were hurt." "I felt so bad ... standing there," not being able to do anything more to help, she said. A tourist from Argentina told CNN affiliate WABC that he was shocked to see the car that "was like bowling, hitting people." Witness: Driver was screaming and flailing his arms Annette Proehl of Pennsylvania was in Times Square with children on a field trip when she heard the screeching tires of the vehicle and people screaming. She watched the car slam into a steel divider and catch fire, she said. "It was more of a surreal thing," she said. "We initially thought they were filming something." A wrecked car sits in the intersection of 45th and Broadway in Times Square. The car was lodged on a steel bollard -- of which there are more than 200 on Times Square sidewalks to stop vehicles from coming through. The car's windshield was shattered and flames billowed from the hood. That's when Planet Hollywood employee Kenya Brandix spotted the driver fleeing from the car. Bradix tackled Rojas to the ground. "The person just got out of the car," Brandix told HLN. "He ran across the street, flailing his arms and screaming. No words but just screaming." Brandix and others have since been hailed as heroes for helping to restrain the driver.
2024-02-17T01:27:17.568517
https://example.com/article/3445
Terminal position assurance devices are commonly known in the electrical connector industry. Generally, there are two types of terminal position assurance devices, namely, a front-load type terminal position assurance device and a side/top load type terminal position assurance device. For the front-load type terminal position assurance device, the terminal position assurance device effectively prevents a resiliently-biased lance member from deflecting within the female terminal connector when all of the female terminals are properly inserted into the female terminal connector. However, in the event that one or more of the female terminals are only partially inserted into the female terminal connector and, thus, improperly inserted thereinto, the terminal position assurance device might also prevent the resiliently-biased lance member from deflecting with the female terminal connector but, poor connectivity might result upon insertion of the male terminal into the female terminal. Thus, it is possible that the terminal position assurance device moves to its final lock position even though the female terminals are only partially and, thus, improperly inserted into the female terminal connector. For the side/top load type terminal position assurance device, a channel must be formed across with female terminal connector with the female terminal connectors properly inserted therein. In the event that the female terminals are not properly inserted into the female terminal connector, as described above, the side/top load type terminal position assurance device cannot be inserted completely through the channel. Thus, it can be determined that one or more female terminals are not properly inserted into the female terminal connector. Only when all of the female terminals are properly inserted into the female terminal connector will the side/top load type terminal position assurance device extend through the female terminal connector. In this manner, it is possible to detect that the female terminals are not properly inserted into the female connector. However, the side/top load type terminal position assurance device and the female terminal connector is difficult to manufacture.
2024-06-27T01:27:17.568517
https://example.com/article/7285
Q: Difference between SafeProcessHandle and IntPtr for an API call While working with WinAPI, I decided to implement a call to GetProcessAfinityMask in my C# application. However, I've seen two different signatures for this function. One of them uses SafeProcessHandle for the handle: [DllImport("kernel32.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern bool GetProcessAffinityMask(SafeProcessHandle handle, out IntPtr processMask, out IntPtr systemMask); The other possible version (on P/Invoke) uses IntPtr: [DllImport("kernel32.dll",SetLastError = true)] static extern bool GetProcessAffinityMask(IntPtr hProcess, out UIntPtr lpProcessAffinityMask, out UIntPtr lpSystemAffinityMask); Given that both functions return the same values, what is the difference between passing a SafeProcessHandle instance or IntPtr? A: Safe Handles and Critical Finalization MSDN Article is describing this difference.
2024-06-27T01:27:17.568517
https://example.com/article/7179
Antonio Gramsci 1919 Workers’ democracy Source: L'Ordine Nuovo, 21 June 1919; Translated: by Michael Carley. A nagging problem afflicts every socialists who feels alive the sense of historic responsibility which hangs over the working class and the party which represents the critical and functioning consciousness of the mission of this class. How to control the immense social forces which the war has unleashed? How to discipline them and give them a political form which contains in itself the virtue of developing normally, of integrating itself continuously, until it becomes the framework of the socialist state in which the dictator of the proletariat will be embodied. How to weld the present to the future, satisfying the urgent necessities of the present and working usefully to create and “anticipate” the future? This article aims to be a stimulus to thought and work; it aims to be an invitation to the best and most conscious workers to reflect and, each in the sphere of his own competence and his own action, to collaborate on the solution of the problem, focussing the attention of comrades and associations. Only from a united and common work of clarification, persuasion and reciprocal education will the concrete action of construction be born. The socialist state potentially already exists in the institutions of social life characteristic of the exploited working class. Connecting these institutions to each other, coordinating them and subordinating them in a hierarchy of competences and powers, strongly focussing them, while respecting the necessary autonomy and flexibility, means creating from now a true and proper workers’ democracy, in effective and active counterposition to the bourgeois state, already prepared to replace the bourgeois state in all of its essential functions of management and control of national property. The labour movement is today directed by the Socialist Party and by Confederation of Labour; but the exercise of the social power of the Socialist Party and of the Confederation takes place, for the major mass of workers, indirectly, by force of prestige and of enthusiasm, by authoritarian pressure, thus by inertia. The sphere of prestige of the party expands daily, reaches working classes hitherto untouched, implants the consensus and desire to work vigorously for the coming of communism in groups and individuals up to now absent from the political struggle. It is necessary to give a political form and a permanent discipline to these disordered and chaotic energies, to absorb, assemble and empower them, to make of the proletarian and semiproletarian class an organized society which educates itself, which makes its own experience, which acquires a responsible consciousness of the duties which fall to the classes come to state power. The Socialist Party and the trade unions cannot absorb the whole working class, except through the work of years and decades. They do not identify immediately with the proletarian state; in the communist republics in fact, they continue to operate independently of the state, as institutes of propulsion (the party) or of control and partial realization (the unions). The party must continue to be the organ of communist education, the focus of the faith, the repository of doctrine, the supreme power which harmonizes and brings to a point the organized and disciplined forces of the working and peasant class. Precisely to rigidly develop this its office, the party cannot throw open the doors to an invasion of new members, not used to the exercise of responsibility and discipline. But the social life of the working class is rich with institutions, it articulates itself in multiple activities. Precisely these institutions and these activities need to be developed, organized together, connected in a vast and flexibly articulated system which absorbs and disciplines the whole working class. The workshop with its internal commissions, the socialist circles, the peasant communities, are the centres of proletarian life in which it is necessary to work directly. The internal commissions are organs of workers’ democracy which should be freed from the limits imposed by owners, and in which new life and energy should be inspired. Today the commissions limit the power of the capitalist in the factory and perform functions of arbitration and discipline. Developed and enriched, they should tomorrow be organs of proletarian power which will replace the capitalist in all his useful functions of direction and administration. Already workers should proceed to the election of vast assemblies of delegates, chosen from the best and most conscious comrades, on the watchword: “All power in the workshop to the workshop committee,” matched to the other: “All state power to the worker and peasant councils.” A vast field of concrete revolutionary propaganda would open for communists organized in the party and in the district circles. The circles, in agreement with the urban sections, should make a census of the labour forces of the area, and become the seat of the district council of the workshop delegates, the ganglion which ties and concentrates the proletarian energies of the district. The electoral systems can be varied according to the size of the workshops: however, the aim should be to elect one delegate for every 15 workers divided by category (as is done in English workshops), arriving, by gradual elections, at a committee of factory delegates which includes representatives of the whole labour complex (blue collar, white collar, technical). The district committee should also aim to include delegates from the other categories of workers living in the district: catering, haulage, trams, railways, refuse, white collar, self-employed, shopwork, etc. The district committee should be an emanation of the whole working class living in the district, legitimate and authoritative, able to impose discipline, invested with power, spontaneously delegated, and order the immediate and complete cessation of all work in the whole district. The district committees will be enlarged in urban commissions, controlled and disciplined by the Socialist Party and by the trade federations. Such a system of workers’ democracy (integrated with equivalent peasant organizations) would give a form and a discipline to the masses, would be a magnificent school of political and administrative experience, would assemble the masses up to the last man, habituating them to tenacity and perseverance, habituating them to consider themselves an army in the field which needs a firm cohesion if it does not want to be destroyed and reduced to slavery. Every factory would form one or more regiments of this army, with its corporals, with its communication services, with its officers, with its general staff, delegated powers for free election, not imposed authoritarianly Through the rallies, held inside the workshop, with the unceasing work of propaganda and persuasion developed by the most conscious elements, a radical transformation of the workers’ psychology would take place, would render the masses better prepared for and capable of the exercise of power, would diffuse a consciousness of the duties and rights of the comrade and of the worker, concrete and efficient because spontaneously generated by the living historical experience. We have already said: these rapid notes are put forward only to stimulate thought and action. Every aspect of the problem deserves a vast and deep treatment, clarifications, subsidiary and coordinated integration. But the concrete and complete solution of the problems of socialist life can be given only by communist practice: discussion in common, which sympathetically modifies consciousnesses uniting them and filling them with working enthusiasm. To tell the truth, to arrive together at the truth, is to achieve a communist and revolutionary act. The formula “dictatorship of the proletariat” must cease to be only a formula, an occasion for outbursts of revolutionary phraseology. Whoever wants the ends, should want the means. The dictatorship of the proletariat is the inauguration of a new state, typically proletarian, in which combine the institutional experiences of the oppressed class, in which the social life of the worker and peasant class becomes a widespread and strongly organized system. This state is not improvised: the Russian Bolshevik communists have worked for eight months to propagate and make concrete the watchword: all power to the soviets, and the soviets have been known to Russian workers since 1905. The communists must treasure the Russian experience and save time and effort: the work of reconstruction will require for itself much time and much effort, to which every day and every act must be destined.
2024-03-13T01:27:17.568517
https://example.com/article/7618
[Cite as Contreraz v. Bettsville, 2011-Ohio-4178.] IN THE COURT OF APPEALS OF OHIO THIRD APPELLATE DISTRICT SENECA COUNTY ROSALINDA CONTRERAZ, INDIVIDUALLY AND AS ADMINISTRATRIX OF THE ESTATE OF SANTOS LEON CASE NO. 13-10-48 GARCIA, DECEASED, PLAINTIFF-APPELLANT, v. OPINION VILLAGE OF BETTSVILLE, ET AL., DEFENDANTS-APPELLEES. Appeal from Seneca County Common Pleas Court Trial Court No. 08CV0594 Judgment Affirmed Date of Decision: August 22, 2011 APPEARANCES: R. Ethan Davis for appellant. John T. McLandrich and Frank H. Scialdone, for appellees. Case No. 13-10-48 PRESTON, J. {¶1} Plaintiff-appellant, Rosalinda Contreraz, Individually and as Administratrix of the Estate of Santos Leon Garcia, deceased, appeals from the judgment of the Seneca County Court of Common Pleas, which granted defendants-appellees’, Village of Bettsville, Bettsville Recreation Board, and Andrea Bender, motion for summary judgment. For the reasons that follow, we affirm. {¶2} This case involves the tragic death of Santos Garcia (hereinafter “Garcia”), who drowned at the Village of Bettsville’s public swimming area. The case arises out of the following set of facts. {¶3} The Village of Bettsville owns the Eells Park Quarry, a public recreational swimming area, which is operated by the Bettsville Recreation Board. At the time of the incident, the general layout of the quarry, which is not in dispute, was as follows. Located near the quarry beach there was a small single story building, which was used as a concession stand, park pool director’s office, the lifeguard locker/break room, and an equipment storage area. Inside the concession building there was a land line telephone to be used for emergencies. With regards to the beach, there were two elevated lifeguard stands located on the beach, while an additional elevated lifeguard stand was positioned by the diving -2- Case No. 13-10-48 board and slide platform. There were two floating rafts located in the deeper end of the quarry, and between the two floating rafts was an aquatic toy called an “aqua bobber.” {¶4} Additionally, there was a floating buoy line that traversed across the quarry for purposes of separating the shallow end from the deep end. The buoy line was positioned at a water depth between four feet (4’) to five feet (5’). In addition, there was another buoy line, made up of old railroad ties, located just beyond the two floating rafts and used for purposes of separating the swim area from the non-swim area. {¶5} In 2006, the Bettsville Recreation Board hired Andrea Bender (hereinafter “Bender”) as a lifeguard. (A. Bender Depo. at 7-8). Bender worked at the park during the summers of 2006, 2007, and 2008, and had been the on-duty lifeguard on the beach when Garcia drowned. (Id.). {¶6} The incident occurred on August 3, 2007. Garcia and his sisters, Rosalinda and Eva, along with several of Garcia’s friends and Garcia’s aunt and uncle, decided to go swimming at the quarry. (A. Alonso Depo. at 21-22); (R. Garcia Depo. at 18-19). At the time of the incident, Garcia was fifteen-years-old and five feet three inches (5’3”) in height. (Coroner’s Report, Ex. K). In addition, Garcia had taken a YMCA swim course and was described as an average swimmer who either could not or did not like to swim underwater. (R. Garcia Depo. at 15); -3- Case No. 13-10-48 (E. Garcia Depo. at 18-20). The group arrived at the quarry sometime in the late afternoon. {¶7} Before entering the water, Garcia’s friend, Lamont, said that he provided Garcia with shoelaces so that Garcia could tie his long pants up around his knees to swim. (L. Garcia Depo. at 28-29). Rosalinda and Eva were the first ones to enter the water. (E. Garcia Depo. at 35). Eva said she swam out to the aqua bobber, while Rosalinda swam out to the deep-end and was treading water near the diving boards and slide platform. (E. Garcia Depo. at 35); (R. Garcia Depo at 35-36). Eva said that she saw Garcia and several of his friends enter the water from the shallow end and walk out towards the outer raft closest to the diving boards, where Rosalinda was located. (E. Garcia Depo. at 36). Lamont said that he and Garcia then swam under the buoy line into the deeper portion of the swimming area. (L. Garcia Depo. at 36). At this point, Rosalinda said that she had still been treading water near the diving board and slide platform when Garcia proceeded to swim underwater and tickle her feet. (R. Garcia Depo. at 37). Rosalinda said that after this occurred, she and Garcia decided to race out to the closest raft. (R. Garcia Depo. at 37). Rosalinda said that she made it to the raft in what she believed was a few seconds but when she turned around, she did not see Garcia. (Id. at 39). Eva, who was still on the aqua bobber, said that she had had her back to the swimming area, but that when she turned around she also did not -4- Case No. 13-10-48 see Garcia in the water. (E. Garcia Depo. at 37-38). It was at this point in time when Rosalinda said that she began to yell for help, stating that her brother was missing. (R. Garcia Depo. at 43). Overall, Rosalinda said that it was approximately thirty to forty seconds from the time she got to the raft until a swimmer surfaced with Garcia. (Id. at 47). {¶8} Another swimmer at the quarry, Alex Fox, who had been swimming near the buoy line with his girlfriend, testified that he heard Rosalinda yelling that she could not find her brother. (Fox Depo. at 32-33). Alex said that his girlfriend was asking the lifeguard to take action; however, Alex admitted that at no point was it apparent whether the missing individual was missing in the water or missing out of the water. (Id. at 27, 32-33). In fact, Alex was under the belief that the missing individual was out of the water near the concession building. (Id.). {¶9} Nevertheless, Alex said that he decided to swim under water and swim towards the diving board and slide platform in the deep end of the quarry. (Id. at 43-44, 56, 94). After approximately ten to fifteen feet, Alex said he saw Garcia some distance in front of the diving board at the bottom of the quarry. (Id. at 32- 33, 43-44, 94). Alex said that he picked Garcia off the bottom of the quarry and brought him to the surface. (Id.). When he got to the surface, Alex said that he saw the lifeguard jump down from the lifeguard stand and run towards the concession building. (Id.). At that point, Alex said that he, with the help of two -5- Case No. 13-10-48 other male swimmers, brought Garcia to shore. (Id.). One of the two other male swimmers, Jacob Pfotenhauer, corroborated Alex’s version of events. (Pfotenhauer Depo. at 31, 39-40, 45-46). {¶10} Overall, none of the witnesses saw Garcia in any type of distress nor did they see Garcia submerged below the surface of the water. {¶11} Michael Abernathy testified that he had been the on-duty lifeguard prior to the incident and that he remembered Garcia and his friends enter the shallow area of the quarry. (Abernathy Depo. at 18). However, he said that he never saw Garcia go beyond the buoy line and into the deep end of the quarry. (Id.). {¶12} Andrea Bender testified that she took over for Michael at 7:00 p.m. and became the on-duty lifeguard. (A. Bender Depo. at 46). She said that she did an initial head count of swimmers and determined that there were 15 to 20 swimmers in the water. (Id. at 48). Bender testified that approximately thirty seconds to one minute after she had taken the lifeguard stand, a woman approached her and told her that a boy was missing. (Id. 49-50). Bender said that she attempted to get more information from the woman and asked her where the boy was missing. (Id. at 52). After about one minute and thirty seconds of discussion, Bender stated that the woman told her that she believed the missing boy had been in the water and that she did not think that the boy knew how to -6- Case No. 13-10-48 swim. (Id.). Bender said that because she was unaware of the missing boy’s location, she blew her whistle to get assistance from her pool director, Rachel Banks, who was located in the concession building. (Id.). {¶13} Bender went on to state that approximately ten to fifteen seconds after she blew her whistle, she heard a rise in voices and saw a swimmer surface with Garcia. (Id. at 56). Bender said that she then jumped down from the lifeguard stand, blew her whistle to clear everyone from the water, and sprinted to the concession building, yelling for Rachel Banks to call 911. (Id. at 56, 64). Bender explained that as she approached the concession building, lifeguard Michael Abernathy ran down the beach towards the water. (Id. at 66). Bender testified that she told Rachel Banks of the emergency and to call 911. (Id. at 69). {¶14} Michael Abernathy and another swimmer began C.P.R. on Garcia after he was brought on to the beach. (Abernathy Depo. at 30). They continued to provide C.P.R. until paramedics arrived, at which time a paramedic assisted Michael Abernathy with C.P.R. (Id. at 35). Garcia was eventually transported to a nearby hospital; however, all efforts to save Garcia were unsuccessful. {¶15} On November 19, 2008, Rosalinda Contreraz, Individually and as Administratrix of the Estate of Garcia (hereinafter “the Estate” or “Mother”), filed a complaint against the Village of Bettsville, Bettsville Recreation Board, and -7- Case No. 13-10-48 Lifeguard Andrea Bender.1 In her complaint, Mother alleged that Garcia’s death was proximately caused by the Village and Bender’s negligence. In particular, Mother alleged the following six causes of action: wrongful death, premises liability, physical defect, survival claim, loss of consortium, and vicarious liability. {¶16} On June 28, 2010, the defendants filed a motion for summary judgment, and on October 12, 2010, they were granted leave to file a supplemental motion for summary judgment instanter with exhibits attached. On October 18, 2010, Mother filed a memorandum in opposition to the defendants’ motion for summary judgment. The defendants filed a response memorandum on October 28, 2010. {¶17} Thereafter, on December 6, 2010, the trial court issued its order and decision granting the defendants’ motion for summary judgment. {¶18} Mother now appeals and raises the following four assignments of error. For ease of our discussion, we elect to address Mother’s first and second assignments of error together. ASSIGNMENT OF ERROR NO. I THE TRIAL COURT ERRED AS A MATTER OF LAW IN GRANTING THE DEFENDANTS’ MOTION FOR SUMMARY JUDGMENT AND FINDING THAT THE REVISED CODE §2744.02(B)(4) EXCEPTION TO IMMUNITY DID NOT APPLY IN THIS CASE. 1 The Village of Bettsville and the Recreation Board will be referred to collectively as “the Village.” -8- Case No. 13-10-48 ASSIGNMENT OF ERROR NO. II THE TRIAL COURT ERRED AS A MATTER OF LAW IN GRANTING DEFENDANTS’ MOTION FOR SUMMARY JUDGMENT AND FINDING THAT THERE WAS NO EVIDENCE OF NEGLIGENCE OR A DEFECT IN THE PREMISES. {¶19} In her first and second assignments of error, Mother argues that the trial court erred in finding that the Village was immune from liability under R.C. 2744.02(A)(1). In particular, Mother argues that the exception for immunity pursuant to R.C. 2744.02(B)(4) was applicable, but that the trial court erred in finding that, because there was no evidence of negligence and that there was no evidence of any physical defects on the premises, the exception to immunity did not apply. Standard of Review {¶20} We review a decision to grant summary judgment de novo. Doe v. Shaffer (2000), 90 Ohio St.3d 388, 390, 738 N.E.2d 1243. Under this standard of review, we review the appeal independently, without any deference to the trial court. Conley-Slowinski v. Superior Spinning & Stamping Co. (1998), 128 Ohio App.3d 360, 363, 714 N.E.2d 991. A motion for summary judgment will be granted only when the requirements of Civ.R. 56(C) are met. Thus, the moving party must show: (1) that there is no genuine issue of material fact, (2) that the -9- Case No. 13-10-48 moving party is entitled to judgment as a matter of law, and (3) that reasonable minds can reach but one conclusion when viewing the evidence in favor of the non-moving party, and the conclusion is adverse to the non-moving party. Civ.R. 56(C); State ex rel. Cassels v. Dayton City School Dist. Bd. of Edn. (1994), 69 Ohio St.3d 217, 219, 631 N.E.2d 150. {¶21} The party asking for summary judgment bears the initial burden of identifying the basis for its motion in order to allow the opposing party a “meaningful opportunity to respond.” Mitseff v. Wheeler (1988), 38 Ohio St.3d 112, 116, 526 N.E.2d 798. The moving party must also demonstrate the absence of a genuine issue of material fact as to an essential element of the case. Dresher v. Burt (1996), 75 Ohio St.3d 280, 292, 662 N.E.2d 264. Then the moving party must demonstrate that they are entitled to summary judgment as a matter of law, at which time, the burden then shifts to the non-moving party to produce evidence on any issue which that party bears the burden of production at trial. Deutsche Bank Trust Co. v. McCafferty, 3d Dist. No. 1-07-26, 2008-Ohio-520, ¶9, citing Civ.R. 56(E). Ohio’s Political Subdivision Tort Liability Act {¶22} Under Ohio’s Political Subdivision Tort Liability Act, codified under R.C. Chapter 2744, it is well-established that a reviewing court must engage in a three-tiered analysis to determine whether a political subdivision is entitled to -10- Case No. 13-10-48 immunity from civil liability. Hubbard v. Canton Cty. Sch. Bd. of Edn., 97 Ohio St.3d 451, 2002-Ohio-6718, 780 N.E.2d 543, ¶10, citing Cater v. Cleveland (1998), 83 Ohio St.3d 24, 28, 697 N.E.2d 610. See, also, Elston v. Howland Local Schools, 113 Ohio St.3d 314, 2007-Ohio-2070, 865 N.E.2d 845, ¶10. The first tier of the analysis is to determine whether the entity claiming immunity is a political subdivision and whether the harm occurred in connection with a governmental or proprietary function. R.C. 2744.02(A)(1); Hubbard at ¶10. Generally, political subdivisions are not liable for damages in civil actions for the “injury, death, or loss to a person or property allegedly caused by any act or omission of the political subdivision or an employee of the political subdivision in connection with a governmental or proprietary function.” R.C. 2744.02(A)(1). {¶23} However, the immunity established under R.C. 2744.02(A)(1) is not absolute; and the subdivision’s immunity is subject to a list of exceptions under R.C. 2744.02(B)(1)-(5). Once general immunity has been established by the political subdivision, the burden lies with the plaintiff to show that one of the five exceptions under R.C. 2744.02(B) apply. Brady v. Bucyrus Police Dept., 3d Dist. No. 3-10-21, 2011-Ohio-2460, ¶47, citing Maggio v. Warren, 11th Dist. No. 2006- T-0028, 2006-Ohio-6880, ¶38. Thus, if the entity is a political subdivision entitled to immunity under the first tier of the analysis, then the court must go to the second tier of the analysis and determine whether any of the exceptions to liability -11- Case No. 13-10-48 enumerated in R.C. 2744.02(B) apply. Hubbard at ¶12, citing Cater, 83 Ohio St.3d at 28. If any of the exceptions to immunity are found to be applicable, then the political subdivision will lose its immunity. If this occurs, then the court must move on to the third tier of the analysis, where it must determine whether the political subdivision’s immunity can be reinstated as long as the political subdivision proves one of the defenses to liability under R.C. 2744.03. {¶24} Here, no one disputes the fact that the Village of Bettsville and Bettsville Recreation Board are political subdivisions and were engaged in the governmental function of maintenance and operation of a recreational swimming area. See R.C. 2744.01(C)(2)(u)(iv). As such, they are, presumptively immune from liability under R.C. 2744.02(A)(1) and are entitled to immunity unless one of the exceptions in R.C. 2744.02(B) applies. {¶25} Under the second tier of the immunity analysis, we note that a political subdivision’s immunity is typically subject to the five exceptions listed in R.C. 2744.02(B)(1)-(5). On appeal, the parties’ arguments center around only one of the five exceptions, R.C. 2744.02(B)(4), thus, our discussion will be limited to R.C. 2744.02(B)(4)’s application. However, before we can analyze the merits of the R.C. 2744.02(B)(4) exception, we must address two initial arguments presented by the parties. -12- Case No. 13-10-48 Cater v. Cleveland {¶26} The first initial argument raised on appeal concerns whether R.C. 2744.02(B)(4) should even apply given the Ohio Supreme Court’s decision in Cater v. Cleveland (1998), 83 Ohio St.3d 24, 28, 697 N.E.2d 610. {¶27} The Village claims that, pursuant to the Supreme Court’s decision in Cater, R.C. 2744.02(B)(4) is inapplicable to recreational swimming areas. As such, the Village argues that, because R.C. 2744.02(B)(4) does not apply to recreational swimming areas, they are presumptively entitled to immunity under R.C. 2774.02(A)(1). In response, Mother claims that, in light of the Ohio Supreme Court’s recent decisions, it’s holding in Cater is no longer binding. Mother also points to a recent decision by this Court where she claims that we declined to follow the Ohio Supreme Court’s rationale in Cater. See Thomas v. Bagley, 3d Dist. No. 11-04-12, 2005-Ohio-1921. {¶28} In Cater, the Ohio Supreme Court was asked to consider whether R.C. 2744.02(B)(4) applied to an indoor municipal swimming pool. Cater, 83 Ohio St.3d at 27-28. Ultimately, the Court concluded that the exception did not apply to indoor municipal swimming pools, and reasoned as follows: Although former R.C. 2744.02(B)(4) may be applicable to other governmental functions, not specifically listed in the statute, we believe that it does not apply to an indoor swimming pool. (See, also, Mattox v. Bradner [Mar. 21, 1997], Wood App. No. WD- 96-038, unreported, 1997 WL 133330, which held that the -13- Case No. 13-10-48 exception enumerated in R.C. 2744.02[B][4] is inapplicable to injuries sustained in a municipal swimming pool.) Unlike a courthouse or office building where government business is conducted, a city recreation center houses recreational activities. Furthermore, if we applied former R.C. 2744.02(B)(4) to an indoor swimming pool, liability could be imposed upon the political subdivision. However, there would be no liability if the injury occurred at an outdoor municipal swimming pool, since the injury did not occur in a building. We do not believe that the General Assembly intended to insulate political subdivisions from liability based on this distinction. Therefore, we reject appellants’ contention that former R.C. 2744.02(B)(4) applies to an indoor municipal swimming pool. Cater, 83 Ohio St.3d at 31-32. {¶29} There has been at least one other appellate district that has recently applied Cater to outdoor swimming facilities and has held that the physical-defect exception does not apply, even if the injury was proximately caused by the negligence of an employee and due to a physical defect.2 O’Connor v. City of Fremont, 6th Dist. No. S-10-008, 2010-Ohio-4159. However, we acknowledge that this Court has also recently addressed the Supreme Court’s decision in Cater, but unlike the other appellate district, we questioned the validity of Cater, especially in light of the Supreme Court’s more recent ruling in Hubbard. See Thomas, 2005-Ohio-1921. In Thomas, this Court noted: 2 We note that the Court of Appeals for the Ninth District recently released an opinion on August 3, 2011, which overruled one of its prior decisions that had applied Cater to outdoor swimming facilities. Hawsman v. Cuyahoga Falls, 9th Dist. No. 25582, 2011-Ohio-3795, overruling Hopper v. Elyria, 182 Ohio App.3d 521, 2009-Ohio-2517, 913 N.E.2d 997, not accepted for review, Hopper v. Elyria, 123 Ohio St.3d 1424, 2009-Ohio-5340, 914 N.E.2d 1064. -14- Case No. 13-10-48 Initially, we note that this Court has serious doubts regarding the continuing validity of Cater in light of the Supreme Court’s more recent ruling in Hubbard. In Cater the Supreme Court found that municipal swimming pools were not subject to the R.C. 2744.02(B)(4) exception based on the fact that the governmental function being performed by municipal pools was recreational in nature and not the kind of “government business” being conducted in a courthouse or government office building. Id. at 31-32, 697 N.E.2d 610. The Court made this finding despite having recognized earlier in the same opinion that “the General Assembly has already classified the operation of a municipal swimming pool as a governmental function under R.C. 2744.01(C)(2)(u).” Id at 28, 697 N.E.2d 610. No such distinction has been made by the Court since Cater. In fact, in Hubbard the Court stressed that the only relevant inquiry in such a case is whether “the injuries claimed by plaintiffs were caused by negligence occurring on the grounds of a building used in connection with a government function * * *.” Hubbard at ¶ 18. There was no discussion regarding whether the governmental function in the building involved was recreational in nature. Additionally, as noted by Justice Moyer in a concurring opinion in Cater, outdoor pools are located on the grounds of buildings such as shelters, restrooms and storage areas that are being used in the performance of a governmental function. Cater, 83 Ohio St.3d at 35, 697 N.E.2d 610. Therefore, both outdoor and indoor municipal pools would be subject to the R.C. 2744.02(B)(4) exception, and the distinction relied on by the majority in Cater involving outdoor and indoor municipal pools would appear to be invalid. Thomas, 2005-Ohio-1921, ¶¶34-35. {¶30} While we acknowledge this Court’s prior decision in Thomas, we ultimately find that the trial court did not err in granting the Village’s motion for summary judgment because Mother failed to present sufficient evidence that a -15- Case No. 13-10-48 physical defect on the premise caused Garcia’s death. We will discuss this in further detail below; however, before we can discuss the merits of the physical defect arguments raised on appeal, we must next address Mother’s argument that R.C. 2744.02(B)(4) is unconstitutional and that the physical-defect requirement should not apply. Constitutionality of R.C. 2744.02(B)(4) {¶31} Mother briefly argues in her appellate brief that she was not required to present evidence of a physical defect in the premises pursuant to the Ohio Supreme Court’s ruling in Hubbard v. Canton City School Bd. of Edn. (2002), 97 Ohio St.3d 451, 2002-Ohio-6718, 780 N.E.2d 543. She also claims that she did not have to prove the physical-defect requirement because the legislation that amended that particular statutory provision was declared unconstitutional. {¶32} In Hubbard, in interpreting the previous version of R.C. 2744.02(B)(4), the Ohio Supreme Court held that: R.C. 2744.02(B)(4) applies to all cases where an injury resulting from the negligence of an employee of a political subdivision occurs within or on the grounds of buildings that are used in connection with the performance of a governmental function. The exception is not confined to injury resulting from physical defects or negligent use of grounds or buildings. -16- Case No. 13-10-48 Hubbard, at the syllabus. It is this holding that Mother relies on in support of her position that there was no need to prove that there was a physical defect in the premises. {¶33} However, we find that Mother’s reliance on Hubbard is misplaced. In Hubbard, the Ohio Supreme Court interpreted the prior version of R.C. 2744.02(B)(4), effective July 6, 2001. See Hubbard, 2002-Ohio-6718, at ¶¶15-18. Because the statute in effect at the time did not contain any explicit language concerning a “physical defect,” the Supreme Court refused to interpret the statute as having such a requirement, even though it acknowledged the legislature’s prior, consistent, but ultimately failed attempts to change the statutory language in R.C. 2744.02(B)(4) to include such a requirement. Id. at ¶¶16-18. Nevertheless, in 2003, the Ohio General Assembly amended R.C. 2744.02(B)(4) and explicitly added the language “and is due to physical defects within or on the grounds.” This is the current version of the statute. Because the current version of the statute clearly contains the additional “physical defect” language, it has essentially invalidated the analysis rendered in Hubbard. Moreover, the amendment to the statute became effective on April 9, 2003, and contrary to Mother’s argument, has not been declared unconstitutional by the Ohio Supreme Court. Since that time, appellate courts have generally limited the R.C. 2744.02(B)(4) exception to injuries that were “due to physical defects.” DeMartino v. Poland Local School -17- Case No. 13-10-48 Dist., 7th Dist. No. 10 MA 19, 2011-Ohio-1466, ¶40; Troutman v. Jonathon Alder Local School Dist. Bd. of Edn., 12th Dist. No. CA2009-08-016, 2010-Ohio-855, ¶24; Yeater v. LaBrae School Dist. Bd. of Edn., 11th Dist. No. 2009-T-0107, 2010- Ohio-3684, ¶14, citing Dunfee v. Oberlin School Dist., 9th Dist. No. 08CA009497, 2009-Ohio-3406, ¶13; Dynowski v. Solon, 8th Dist. No. 92264, 2009-Ohio-3297, ¶19; Hopkins v. Columbus Bd. of Educ., 10th Dist. No. 07AP-700, 2008-Ohio- 1515, ¶18. But see, Grine v. Sylvania Schools Bd. of Edn., 6th Dist. No. L-06- 1314, 2008-Ohio-1562, ¶56 (finding that the Ohio Supreme Court had interpreted the prior version of R.C. 2744.02(B)(4), effective July 6, 2001, but concluding that the Ohio Supreme Court has declared new amendment unconstitutional). {¶34} Furthermore, with respect to Mother’s argument that the legislation that amended the R.C. 2744.02(B)(4) exception has been declared unconstitutional, as we mentioned above, the Ohio Supreme Court has not declared the current version of R.C. 2744.02(B)(4), effective on April 9, 2003, to be unconstitutional. In fact, the Court has recently analyzed the physical defect requirement with respect to the absence of a required smoke detector. See Moore v. Lorain Metro. Hous. Auth., 121 Ohio St.3d 455, 2009-Ohio-1250, 905 N.E.2d 606, ¶¶22-25 (reversing and remanding the case to the trial court because the trial court had failed to consider whether the absence of a required smoke detector on property owned by a political subdivision constituted a physical defect pursuant to -18- Case No. 13-10-48 R.C. 2744.02(B)(4)). See, also, Hamrick v. Bryan City School Dist., 6th Dist. No. WM-10-014, 2011-Ohio-2572, ¶22 (rejecting the appellant’s argument that R.C. 2744.02(B)(4) has been declared unconstitutional by the Ohio Supreme Court). {¶35} More significantly, we note that Mother failed to raise this issue below at the trial court. “In order for a party to challenge the constitutionality of a state statute, ‘the issue must be raised in the complaint or the initial pleading and the Ohio Attorney General must be properly served.’” Troutman, 2010-Ohio-855, at ¶12, quoting M.B. v. Elyria City Bd. of Edn., 9th Dist. No. 05CA008831, 2006- Ohio-4533, ¶6. As such, we find that Mother has waived the issue for purposes of appeal. See State v. Heft, 3d Dist. No. 8-09-08, 2009-Ohio-5908, ¶29, quoting State v. Rice, 3d Dist. Nos. 1-02-15, 1-02-29, 1-02-30, 2002-Ohio-3951, ¶7, quoting State v. Awan (1986), 22 Ohio St.3d 120, 489 N.E.2d 277, syllabus, limited by In re M.D. (1988), 38 Ohio St.3d 149, 527 N.E.2d 286, syllabus. {¶36} Now that we have addressed all of the parties’ initial arguments, we will discuss the applicability of the R.C. 2744.02(B)(4) exception as it relates to the facts and circumstances of this particular case. R.C. 2744.02(B)(4) {¶37} As we stated above, once general immunity has been established by the political subdivision, the burden lies with the plaintiff to show that one of the five exceptions under R.C. 2744.02(B) apply. Brady, 2011-Ohio-2460, at ¶47, -19- Case No. 13-10-48 citing Maggio, 2006-Ohio-6880, at ¶38. Here, the only exception that is being argued before us concerns the application of R.C. 2744.02(B)(4). R.C. 2744.02(B)(4) provides: [s]ubdivisions are liable for injury, death, or loss to person or property that is caused by the negligence of their employees and that occurs within or on the grounds of, and is due to physical defects within or on the grounds of, buildings that are used in connection with the performance of a governmental function, including, but not limited to, office buildings and courthouses * * *. Under the terms of R.C. 2744.02(B)(4), the Village’s presumptive immunity should have been abrogated only if Mother demonstrated that the injury was: (1) caused by employee negligence, (2) on the grounds or in buildings used in connection with the performance of a governmental function, and (3) due to physical defects on or within those grounds or buildings. {¶38} Here, after considering all of the evidence, the trial court found as follows: In addition, the R.C. 2744.02(B)(4) exception is inapplicable because the injury was not due to a “physical defect.” Although the Complaint alleges that Garcia became submerged below the water due to a sudden drop-off, absent is any evidence supporting this allegation. There is no evidence that a sudden drop-off existed and there is no evidence that the drowning could have been caused by an increase in water depth. In short, the evidence establishes that Garcia was swimming just prior to the incident and the relevant areas of the park quarry had only a very gradual water depth increase. For this additional reason, the R.C. 2744.02(B)(4) exception does not apply. -20- Case No. 13-10-48 There is also no evidence of any underwater obstruction present at the time of the incident, which could represent a “physical defect” that caused the drowning. The testimony of Alex Fox establishes that Garcia was not entangled or trapped by an underwater obstruction. There was also no evidence of trauma to Garcia’s body. Because none of the immunity exceptions under R.C. 2744.02(B)(1)-(5) apply, the Village of Bettsville and Bettsville Recreation Board are entitled to immunity under R.C. 2744.02(A)(1). (Dec. 6, 2010 JE at 15-16). {¶39} On appeal, in attempting to establish the exception under R.C. 2744.02(B)(4), Mother claims that the trial court erred in failing to consider evidence of the following seven violations committed by the Village: (1) that the Village was negligent per se and/or reckless by failing to have the required number of lifeguards; (2) that the Village failed to appropriately train and evaluate their lifeguard staff; (3) that the Village was negligent and/or reckless in their hiring and training of lifeguard Andrea Bender; (4) that Andrea Bender fell below the accepted standard of care for a lifeguard in her response to Garcia’s drowning; (5) that the Village failed to separately identify and warn of the presence of “deep water” within the designated swimming area; (6) that the Village’s facility was defective and dangerous in its failure to warn of the drastic change in bottom slope and/or sudden drop off within the designated swimming area; and (7) that the -21- Case No. 13-10-48 Village’s facility deviated from the accepted standards of care by allowing copious amounts of underwater vegetation to exist within the designated swimming area. {¶40} However, as found by the trial court, most of Mother’s allegations have nothing to do with a physical defect on the property. For example, the Village’s alleged failure to provide sufficient lifeguards, failure to appropriately train and evaluate its lifeguards, and negligent and/or reckless hiring and training of its lifeguards clearly do not concern any physical defect regarding the premise. {¶41} The only three allegations this Court can find may amount to a physical defect would be the allegation that the Village failed to post signs warning of deep water, the allegation that there was copious amounts of vegetation in the designated swim area, and the allegation that there was drastic change in the slope or a sudden drop-off in the designated swim area. Nevertheless, for the following reasons, under the facts and circumstances of this particular case, we find that none of the allegations rise to the level of a physical defect for purposes of R.C. 2744.02(B)(4). {¶42} With respect to the Village’s failure to post signs warning of the presence of deep water, we find that Mother has failed to present any evidence demonstrating how this amounted to a physical defect in the property. As both parties’ experts stated, deep water in public swimming areas is a common and -22- Case No. 13-10-48 expected feature, especially if the facility has diving boards and slides. There is nothing in the record to suggest that this feature did not perform as intended or was less useful than designed. See Hamrick v. Bryan City School Dist., 6th Dist. No. WM-10-014, 2011-Ohio-2572, ¶¶27-29 (analyzing the plain meaning of the phrase “physical defect” and concluding that the appellant failed to present evidence that there was any discernible imperfection that diminished the utility of either the bus garage or the service pit). {¶43} Next, with respect to the copious amount of vegetation allegation, we find that, even if this amounted to a physical defect, Mother failed to present sufficient evidence that this alleged defect existed at the time of the incident. The only evidence presented by Mother in regards to the copious amount of vegetation was from the plaintiff’s expert witness, who found that the designated swim area had copious amounts of vegetation. However, the plaintiff’s expert made her inspection of the premises on July 6, 2010, almost three years after the incident, which again occurred back on August 3, 2007. There is no evidence in the record that this vegetation existed at the time of the incident. {¶44} Finally, with respect to the sudden drop-off or drastic change in slope allegation, again we find that Mother failed to present sufficient evidence that this amounted to a physical defect. The only evidence introduced that indicates that there was such a physical defect was the affidavit from the plaintiff’s expert -23- Case No. 13-10-48 witness. At one point in her affidavit, the plaintiff’s expert concluded that in the area where Garcia had drowned, “[s]uddenly and without warning, * * * the bottom slope suddenly and drastically changes.” (Bella Aff. at 4). However, during her deposition, which had taken place prior to her affidavit, the plaintiff’s expert was specifically asked whether she believed that there was a significant drop-off in the area where Garcia drowned. (Bella Depo. at 113). The plaintiff’s expert replied, “I wouldn’t define that area as having a significant drop-off based upon my definition.” (Id.). {¶45} ‘“[W]hen an affidavit is inconsistent with affiant’s prior deposition testimony as to material facts and the affidavit neither suggests affiant was confused at the deposition nor offers a reason for the contradiction in her prior testimony, the affidavit does not create a genuine issue of fact which would preclude summary judgment.’” Swiger v. Kohl’s Dept. Store, Inc., 2nd Dist. No. 23713, 2010-Ohio-6230, ¶5, quoting Byrd v. Smith, 110 Ohio St.3d 24, 2006- Ohio-3455, 850 N.E.2d 47, ¶29, quoting Lemaster v. Circleville Long Term Care, Inc. (Feb. 22, 1988), 4th Dist. No. 87 CA 2, at *3. Based on the above, we find the plaintiff’s expert’s prior deposition testimony is inconsistent with her affidavit testimony – she testified first that there were no significant drop-offs in the area where Garcia drowned, but later averred that this area did have a sudden and drastic change, such that it made that particular area defective and dangerous. -24- Case No. 13-10-48 Because there is no explanation as to the contradiction in her testimony, we find that her affidavit alone did not create a genuine issue of material fact which would have precluded summary judgment. {¶46} Mother also tries to utilize the defense expert witness’s testimony in support of her position that there was a physical defect in the property by the presence of a drastic change in slope and/or sudden drop-off. However, upon a review of the defense expert’s testimony, we find that Mother has mischaracterized his testimony and has taken his conclusions out of context by only selecting certain portions of his deposition testimony to highlight on appeal. A review of the defense expert’s testimony reveals that he did not find a drastic change in slope or a sudden drop-off in the area Garcia drowned. (Griffiths Depo. at 91-108). {¶47} Nevertheless, even if there was sufficient evidence that these allegations involved physical defects on the premise, the fact of the matter remains that Mother failed to show how Garcia’s drowning was due to these alleged physical defects. There was no evidence linking Garcia’s drowning to any sort of vegetation in the quarry. In fact, the patron who discovered Garcia’s body under water and pulled him to shore, specifically testified that Garcia had not been entangled by any obstructions when he found him at the bottom of the deep end of -25- Case No. 13-10-48 the quarry. There was also evidence that there had been no noticeable trauma to Garcia’s body. {¶48} Furthermore, there was no evidence connecting Garcia’s drowning to any drastic slope change or drop-off nor the failure to post signs warning patrons of the presence of deep water. Mother proposes a theory that Garcia drowned when he had been walking from the shallow end to the deep end when he either encountered a drop-off, a drastic change in slope, or had not been properly warned of the presence of deep water. However, the evidence indicates that Garcia had actually been swimming in the deep-end of the quarry by the diving board and slide platform before he disappeared and was found subsequently laying at the bottom of the quarry. (R. Garcia Depo. at 37-39); (L. Garcia Depo at 36). The evidence also indicates that, right before he disappeared, Garcia had decided to race his sister out to the raft, which was further away in the deep-end. (R. Garcia at 37-39). Even though Garcia’s body was discovered in the deep-end of the quarry, none of the witnesses actually saw Garcia drown – no one saw him under the surface of the water, no one saw him struggling in the water, and no one saw any signs that Garcia had been in distress prior to his disappearance. {¶49} Moreover, we note that, regardless of whether or not Mother presented evidence that raised questions regarding Bender’s response to the incident, Mother still had to show that Garcia’s drowning was also due to a -26- Case No. 13-10-48 physical defect on the grounds of the quarry. As we illustrated above, Mother has failed to satisfy her burden, thus we need not discuss any questions of fact pertaining to Bender’s purported negligence since Mother cannot demonstrate all of the requirements under the R.C. 2744.02(B)(4) exception. {¶50} Therefore, we find that the trial court correctly determined that the exception to immunity pursuant to R.C. 2744.02(B)(4) was inapplicable, because Mother failed to demonstrate that there was a physical defect on the premises. Consequently, the trial court also properly concluded that the Village was entitled to immunity pursuant to R.C. 2744.02(A)(1) and did not err in granting the Village’s motion for summary judgment. {¶51} Mother’s first and second assignments of error are, therefore, overruled. ASSIGNMENT OF ERROR NO. III THE TRIAL COURT ERRED IN FINDING THAT DEFENDANTS’ IMMUNITY IS REINSTATED PURSUANT TO R.C. §2744.03(A)(5) AND (6). {¶52} In her third assignment of error, Mother argues that the trial court erred in finding that even if the Village was excepted out of immunity, the Village’s immunity could nonetheless be reinstated pursuant to the defenses in R.C. 2744.03(A)(5) and (6). -27- Case No. 13-10-48 {¶53} However, because we found that the exception under R.C. 2744.02(B)(4) was not applicable and that, as a result, the Village was entitled to immunity under R.C. 2744.02(A), we find that this assignment of error has been rendered moot. Thus, we decline to address the applicability of any of the defenses pursuant to R.C. 2744.03(A). App.R. 12(A)(1)(c). {¶54} Mother’s third assignment of error is, therefore, overruled as moot. ASSIGNMENT OF ERROR NO. IV THE TRIAL COURT ERRED AS A MATTER OF LAW BY FAILING TO CONSTRUE THE EVIDENCE IN A LIGHT MOST FAVORABLE TO APPELLANT. {¶55} Finally, in her last assignment of error, Mother argues that the trial court overall erred in failing to consider all of the evidence in a light most favorable to her, the non-moving party. {¶56} Again, given our discussion above, we find that as it relates to the Village of Bettsville and the Bettsville Board of Recreation, the trial court did not err in granting summary judgment in their favor. {¶57} As it relates to Bender, it appears that Mother has not raised any specific claim regarding Bender’s liability on appeal. Nevertheless, to the extent Mother may have raised any issues regarding Bender’s liability on this appeal, we note that, pursuant to R.C. 2744.03(A)(6), Bender was entitled to immunity unless Mother showed that one of the exceptions in R.C. 2744.03(A)(6) applied. Hawk v. -28- Case No. 13-10-48 Am. Elec. Power Co., 3d Dist. No. 1-04-65, 2004-Ohio-7042, ¶10, quoting Wooton v. Vogele (2001), 147 Ohio App.3d 216, 221, 796 N.E.2d 889. Based on Mother’s arguments, the only exception that could apply would be R.C. 2744.03(A)(6)(b), thus Bender would be entitled to immunity unless her “acts or omissions were with malicious purpose, in bad faith, or [done] in a wanton or reckless manner.” However, when reviewing Mother’s complaint, we find that she only alleged that Bender acted negligently and did not assert any other culpability higher than negligence in the proceedings below. Therefore, because there were never any allegations that Bender acted “with malicious purpose, in bad faith, or in a wanton or reckless manner,” we find that Bender was immune from liability and that the trial court also did not err in granting summary judgment in Bender’s favor. {¶58} Mother’s fourth assignment of error is, therefore, overruled. {¶59} Having found no error prejudicial to the appellant herein in the particulars assigned and argued, we affirm the judgment of the trial court. Judgment Affirmed ROGERS, P.J. and WILLAMOWSKI, J., concur. /jlr -29-
2023-12-17T01:27:17.568517
https://example.com/article/7420
This copy is for your personal non-commercial use only. To order presentation-ready copies of Toronto Star content for distribution to colleagues, clients or customers, or inquire about permissions/licensing, please go to: www.TorontoStarReprints.com Cohn took papers from Trump’s desk to protect NAFTA, Woodward book alleges By David JacksonUSA Today Wed., Sept. 5, 2018 WASHINGTON—White House Chief of Staff John Kelly denied describing President Donald Trump as an “idiot,” as Trump and his aides sought to push back Tuesday on a new book by veteran Washington reporter Bob Woodward that depicted the West Wing as “Crazytown.” In the first of two tweets, Trump cited denials by Kelly and other aides in claiming that “their quotes were made up frauds, a con on the public.” He suggested that Woodward — whom he praised just last month — is a Democratic operative who timed the book to this year’s congressional elections. “Notice timing?” he said. White House chief of staff John Kelly and then-staff secretary Rob Porter walk along the South Lawn of the White House in November. “It felt like we were walking along the edge of the cliff perpetually,” Bob Woodward quotes Porter as saying. Kelly and other Trump aides have since denied allegations in Woodward’s book. (Jabin Botsford / The Washington Post file photo) Trump also tweeted out written statements by aides on the Woodward book, including one from his chief of staff. “The idea I ever called the President an idiot is not true,” Kelly said, adding that the claim “is another pathetic attempt to smear people close to President Trump and distract from the administration’s many successes.” Kelly repeated a statement he made in May, saying that he and Trump “have an incredibly candid and strong relationship.” Nearly four hours after his first tweet about the book, Trump tweeted again, this time at 11:01 p.m. EST to deny that he labelled Attorney General Jeff Sessions as “mentally retarded” and a “dumb southerner” in what he called the “already discredited Woodward book.” “I said NEITHER, never used those terms on anyone, including Jeff, and being a southerner is a GREAT thing,” Trump tweeted. “He made this up to divide!” Article Continued Below Republican Sen. Lindsey Graham of South Carolina, who once called Trump “unfit for office,” emerged as one of his staunchest defenders in Congress in the 24 hours after the first reports about Trump’s harrowing portrayal in Woodward’s book. “President @realDonaldTrumps fate will be determined by the results he achieves for the American people, not by a book about the process,” Graham said in Wednesday morning tweets. “By any reasonable measure we have one of the strongest economies in modern history, President Trump has rebuilt a broken military, and we are pushing back hard against America’s enemies.” Titled Fear: Trump in the White House, the Woodward book is scheduled to be published Sept. 11. Woodward, who rose to fame via his coverage of the Watergate scandal during the Richard Nixon presidency in the early 1970s, is an associate editor at the Washington Post, which published excerpts of the book Tuesday. The excerpts described a struggle by aides to rein in Trump. Regarding the fraught relationship between the president and his chief of staff, the Post reported Woodward found that Kelly “frequently lost his temper” over Trump, and that he thought the president was “unhinged.” “He’s an idiot,” Kelly said, according to the Post’s account of Woodward’s book. “It’s pointless to try to convince him of anything. He’s gone off the rails. We’re in Crazytown. I don’t even know why any of us are here. This is the worst job I’ve ever had.” Trump himself said Woodward has “credibility problems” — though the president told the author last month he thought he had always been fair. “I probably would have preferred to speak to him, but maybe not,” Trump told the Daily Caller website. “I think it probably wouldn’t have made a difference in the book. He wanted to write the book a certain way.” White House Press Secretary Sarah Sanders attributed the book’s criticism of Trump to “disgruntled” former aides. The Postpublished what it said was a conversation Woodward had with Trump after the book was finished. The author detailed how the White House rebuffed his requests for an interview with the president. At one point, Trump told Woodward: “You know I’m very open to you. I think you’ve always been fair. We’ll see what happens. But all I can say is the country is doing very well.” The White House denials echoed those made about previous critical books, particularly those by journalist Michael Wolff and former White House aide Omarosa Manigault Newman. In the wake of the White House attacks, Woodward told the Post he stands by his reporting. Among Woodward’s other revelations: Former defence attorney John Dowd and colleagues did not want Trump to testify before Russia special counsel Robert Mueller because they didn’t think he could tell the truth. The book discusses a mock interview that attorneys conducted with Trump in which the president fared poorly, and that lawyers re-enacted parts of that interview for Mueller himself. “Don’t testify,” Dowd was quoted by Woodward as saying. “It’s either that or an orange jumpsuit.” In a statement emailed to USA Today, Dowd said he has not read the book and does not plan to address “every inaccurate statement” attributed to him, but he denied he replayed the mock interview before Mueller, that he questioned the president’s truthfulness and that he made the remark attributed to him about the orange jumpsuit. Former economic adviser Gary Cohn removed papers from Trump’s desk to block efforts to remove the United States from the North American Free Trade Agreement with Canada and Mexico, as well as a separate trade deal with South Korea. In his interview with the Daily Caller, Trump denied that aides have removed documents from his view, saying “it’s just made up” and that “there was nobody taking anything from me.” Trump told Defence Secretary Jim Mattis he wanted to have Syrian leader Bashar Assad assassinated after evidence surfaced of a chemical weapons attack on rebels in that country; Mattis ignored the request and planned the targeted missile strike on chemical weapons facilities that Trump eventually approved. Woodward also reported that Mattis once described Trump as acting like a “fifth- or sixth-grader,” prompting a denial by the defence secretary. Mattis said in a statement that he never uttered “contemptuous words” about the president, and added that Woodward’s “anonymous sources do not lend credibility” to his book. In her statement, Sanders called the Woodward book “nothing more than fabricated stories, many by former disgruntled employees, told to make the president look bad.” Late Tuesday night, Trump tweeted links to stories by the Daily Caller and Breitbart News that highlighted Mattis’ denial of the claims in Woodward’s book. With files from the Washington Post U.S. President Donald Trump is labeling a tell-all book from journalist Bob Woodward a "work of fiction." More from The Star & Partners LOADING Copyright owned or licensed by Toronto Star Newspapers Limited. All rights reserved. Republication or distribution of this content is expressly prohibited without the prior written consent of Toronto Star Newspapers Limited and/or its licensors. To order copies of Toronto Star articles, please go to: www.TorontoStarReprints.com
2023-10-14T01:27:17.568517
https://example.com/article/8177
Numbers of Muslims in the U.S. and the rest of the world; ethnic origins According to new data from the Pew Research Center, the intense political focus on Islam has yielded a sort of dual life for American Muslims. Ottomans ruled part of europe and africa and no one speaks turkish or bears turkish names. By the twelfth century, Christians essentially disappeared from North Africa, while the Coptic population of Egypt shrunk to less than ten percent. A pattern of dynastic disagreements and jockeying for the throne eventually shattered its strength, and diffused the wealth from the trade routes. The spread of Islam south of the Sahara owes very little to Arab military occupation. Only 5% of the slaves went to the United States. Botswana: According to a 2011 study by the Pew Research Center, there are approximately 8,000 Muslims, many of whom are of South Asian origin. Middle East After all, the continent remains a battlefield for proselytizers including Muslims and Evangelists. The introduction of Christianity in Africa experienced the same social phenomenon and challenge. Al-Mu'izz al-Din Street, Darb al-Ahmar Street, and Salah ad-Din Square are some of the street venues and locales of Cairo where visitors to Egypt can most enjoy exploring the tremendous wealth of Islamic art and architecture there. In conclusion, Islam had an enduring influence both in Africa and in the lives of the African diaspora, as clearly exhibited through the various articles in this section. India - 189,000,000 has the third largest Muslim population in the world. Muslim populations by country: how big will each Muslim population be by 2030? Mohammed's organization has issued a link fixed 17 August 2005. Hate is not a solution at all. There were questions about the indigenous practices and traditions and whether they could be permitted by Islam. Fethullah Gülen is the most significant leader of the Nurcus, the followers of Bediuzzaman Said Nursi. Islam in Africa is not static and is constantly being reshaped by prevalent social, economic and political conditions. The reform movements in Africa, however, also included destructive episodes such as the raids and chaos caused by the Ethiopian Muslim Ahmad Gran. The History of Islam in Africa Central African Republic: 10% of the overall population according to the 2003 census. Most orders in West Africa emphasize the role of a spiritual guide, marabout or possessing supernatural power, regarded as an Africanization of Islam. It is very important that we do not mixup individual act or one organization,s act with whole religion. Islam in Africa is often adapted to local cultural contexts and belief systems, thereby forming the continent's own orthodoxies. Recently discovered Arabic manuscripts, which had been passed on through descendants for centuries, have proven this beyond a shadow of doubt. He recently published a study on the rise of armed religious conflicts in sub-Saharan Africa. Sixty-five percent of Republicans and 72 percent of white evangelicals also said Islam and democracy naturally conflict. How Much Discrimination Do Muslims Face in America? Looking at it another way, 50% of all European Muslims are under the age of 30, compared with 32% of non-Muslims in Europe. On rates of growth, Islam and Pentecostal Christianity are highest, see: , Foreign Policy, May 2007. But the report reveals other layers of Muslim life that complicate a straightforward narrative of victimhood. Indeed, in the middle of the , the , whose influence extended into , converted to Islam. Many of West African peoples had obviously embraced Islam — apparently only — for security or political reasons while never giving up on vitalism. It was, of course, a hoax: However much one says that Arabs in Israel suffer, and whoever is to blame for that alleged suffering, there is no apartheid in Israel. Minaret of the in , Similarly, in the , Islam made its way inland - spreading at the expense of. Religion in Africa However, the Middle East-North Africa region has the highest percentage of Muslim-majority countries. Thus, in the course of a few decades, East Africa became the home of Ismaili and Sufi communities, and attracted prominent Ahmadiyya scholars from India. Likewise, mosques are institutions that should be encouraged to function as centers of social and political integration in America. Benin: 24% of the overall population according to the 2002 census. The Western Journal of Black Studies, Vol 29, Number 2, June 2005. Muslims are also geographically spread out: Unlike, say, Catholics, their communities are not centrally organized. Islam in Africa: Introduction Data on sectarian affiliation have been infrequently collected or, in many countries, not collected at all. In the Bornu Empire, for a brief time Ali Ghaji cleared the way for Islam. Sunnis dominate the Muslim populace of , with a small segment of the population being Shias. Figures may not sum to totals due to rounding. On the other hand, thanks to globalization, governments can also improve their networks to implement de-radicalization measures. The biggest victims here, of course, are those oppressed by non-Westerners women, gays, Christians, blacks, and other minorities in the Muslim realm who cannot break through the fog of political correctness to reach the good but blinded souls of American students on campus. Archived from on September 4, 2009. Muslim populations by country: how big will each Muslim population be by 2030? Sunni and Shia Populations An overwhelming majority of Muslims are Sunnis, while an estimated 10-13% are Shias. The Muslim world was recovering from a series of unpredictable onslaughts. Some experts predict the shift of Christianity's center from the European industrialized nations to Africa and Asia in modern times. This mosque has two because it was built before the Prophet switched the Qiblah from Jerusalem to Mecca. Who send army to kill Qazafi in Libya. The government and army were purged of black officers. The role of Islam in the Arab slave trade The figures presented here are as of 2010. Mohammed Alexander Russell Webb, an early American convert to Islam, established a mosque and mission in New York City in 1893. He can do it more easily. Of course, American Muslims, like Americans from other religious groups, participate in American political life. Muslims are more likely than other Americans to believe that people who work hard can get ahead and succeed; 70 percent said they believe this is true. Archived from on February 28, 2008. Numbers and Percentage of Muslims in African Countries Finally we should give thanks to all black Muslims who refused to cooperate, like the Senegalese religious leader Cheikh Amadou Bamba. Introduction to African religion 2nd ed. Although American Muslims make up approximately one percent of the U. While most slaves who went to the Americas could marry and have families, most of the male slaves destined for the Middle East were castrated, and most of the children born to the women were killed at birth. On the religious side, one can carry out de-radicalization measures, thus strengthening peaceful interpretations of faith.
2024-03-05T01:27:17.568517
https://example.com/article/6199
Posted By Ryan Deto on Thu, Jul 6, 2017 at 2:58 PM click to enlarge Image courtesy of Lawrenceville Corporation Mock-up of Upper Lawrenceville's Community Land Trust Pittsburgh’s Lawrenceville neighborhood has one of the hottest and fastest-growing housing markets in the region. A few years ago, houses typically sold for less than $100,000, but now some properties have reached prices of more than $500,000. According to the nonprofit community developers at the Lawrenceville Corporation, the percentage of property sales $250,000 and above has doubled since 2012.As a response to this exploding market, the Lawrenceville Corporation knew it needed to do something bold. Asreported in January 2016, Lawrenceville Corporation created the region’s first Community Land Trust (CLT), hoping to sell homes to low-income residents and to combat the neighborhood’s affordable-housing struggles. And last month, the group broke ground on its seven-property CLT.“This is a direct and catalytic response by the Lawrenceville Corporation and our partners to the issue of housing insecurity. The neighborhood, through the award-winning Upper Lawrenceville Vision Plan, set 'housing for all' as a priority. … We are excited to be taking one more step in our disruptive, innovative approach to create housing that is permanently affordable,” said Lawrenceville Corporation director Matt Galluzzo in a press release.CLTs maintain permanent affordability for the properties by having an entity (in this case, Lawrenceville Corporation) retain ownership of the land, but sell the homes to qualifying residents who earn 80 percent or less of the area’s average income — about $55,000 for a family of four. The homes in the Lawrenceville CLT will be sold for between $125,000 to $140,000 and will be constructed new or will be remodels.Ed Nusser, of Lawrenceville Corporation, said in 2016 that CLTs allow homeowners to grow a limited amount of equity, but leaves them unable to sell the property to the highest bidder. Instead, Lawrenceville Corporation will manage the sale of the property to another low-income buyer. Nusser said that land-trust homeowners can make alterations to their properties and will otherwise have all the freedoms of a typical homeowner.The properties will be located in upper Lawrenceville, near the corner of McCandless Avenue and Duncan Street. The CLT was funded by a variety of private and public entities, including Pittsburgh’s Urban Redevelopment Authority. Pittsburgh Mayor Bill Peduto has been supportive of the initiative.“As a 21st-century city, we must have innovative out-of-the-box solutions to 21st-century issues. The City is proud to support Lawrenceville Corporation's CLT initiative­ — a direct implementation of the City's Affordable Housing Task Force recommendations with clear alignment with our p4 Performance Measures,” said Peduto spokesperson Katie O’Malley in a press release.And thereported that there have already been 65 applications to purchase the Lawrenceville CLT homes. Lawrenceville Corporation says applications are still open online at the group's website
2024-06-10T01:27:17.568517
https://example.com/article/9454
Self-assembled structures formed by a wedge-shaped molecule in 2D and 3D: the role of flexible side chains and polar head groups. A wedge-shaped amphiphilic molecule, 3,4,5-tridodecyloxycinnamic acid, was used as a model system to explore the role of different constitutive elements of the chemical structure in the formation of 2D and 3D self-assemblies. The polar heads forming cyclic hydrogen-bonded dimers determine the two largest unit cell parameters, which depend only slightly on the dimensionality of the system (i.e. 2D versus 3D) and on the sample thermal history. By contrast, the structure of the alkyl side chains is very sensitive to the phase transformations, and is likely to be responsible for the rich polymorphic behaviour of the studied compound. Thus, in the monotropic SmC phase, the alkyl chains form a liquid-crystalline sub-lattice with hexagonal symmetry that can further crystallize either in a triclinic sub-cell (metastable crystalline phase) or in an orthorhombic sub-cell (stable crystalline phase). In 2D, at the interface with the graphite surface the molecular orientation is guided by the epitaxy. Although the largest lattice parameters are close to those in the bulk, the alkyl chains adopt a particular alternating orientation. In one molecule of the dimer, two alkyl chains have their molecular planes parallel to the substrate while the third chain is perpendicular to it, and the other way around for the other molecule of the dimer. To our knowledge, such alternating orientation of the alkyl chains in the monolayer is reported for the first time.
2024-01-05T01:27:17.568517
https://example.com/article/7798
Canadiens among winners, Lindstrom and Brewer among losers at NHL trade deadline CP NHL teams made 24 deals involving 43 players and 20 draft picks on Monday before the trade deadline. Here are the winners and losers of the day: MONTREAL CANADIENS: WINNERS In giving up just draft picks and prospects to get defenceman Jeff Petry and forwards Torrey Mitchell and Brian Flynn, the Habs stocked their depth for a playoff run. GM Marc Bergevin let the price fall on Petry before giving up a second-round pick and a conditional fifth. CALGARY FLAMES: LOSERS This has nothing to do with trading Curtis Glencross on Sunday and Sven Baertschi on Monday and everything to do with losing captain Mark Giordano for the season with a torn biceps tendon. The Flames' playoff hopes took a huge hit because he's irreplaceable. JORDYN LEOPOLD: WINNER This is a win for human decency. Jordan Leopold's 11-year-old daughter, Jordyn, wrote a letter in January pleading for her father to be traded from Columbus to Minnesota, where his family is living. Columbus GM Jarmo Kekalainen and Minnesota's Chuck Fletcher made it happen. EDMONTON OILERS: LOSERS With only defenceman Jeff Petry really on the market, Edmonton GM Craig MacTavish hoped he could get as much as Carolina got from Los Angeles for Andrej Sekera. He didn't, and so the Oilers' retooling project won't have the benefit of another first-round pick. OLLI JOKINEN: WINNER Traded from the NHL-best Nashville Predators to the Toronto Maple Leafs in mid-February, the 36-year-old centre gets to go back to the playoffs after being sent to the St. Louis Blues on deadline day. Jokinen has just six games of playoff experience in his career. JOAKIM LINDSTROM AND ERIC BREWER: LOSERS Dealt to the Maple Leafs from the Blues and Anaheim Ducks, respectively, Lindstrom and Brewer go from playoff-bound teams to one that's out of it and still falling. Lindstrom and Brewer are unrestricted free agents, so they were contract casualties. ARIZONA COYOTES: WINNERS The march to the future continued with defenceman Zbynek Michalek going to the Blues with a conditional third-round pick for prospect Maxim Letunov. In the big picture, Arizona stocked itself well by dealing Michalek, Keith Yandle and Antoine Vermette. BOB MURRAY: LOSER Murray made out well by getting defencemen James Wisniewski, Simon Despres and Korbinian Holzer, but the Ducks GM was ticked off about Ben Lovejoy finding out on Twitter he was traded to Pittsburgh. Murray wasn't happy he didn't get a chance to tell Lovejoy himself. STANLEY CUP PLAYOFFS: WINNER Every team in a playoff spot or within six points made at least one significant trade within a week of the deadline. There's no clear-cut favourite to win the Stanley Cup, so a plethora of moves should only make the road to the final more competitive. PLAYING OUT THE STRING: LOSER As the Coyotes sold off their remaining parts, the Buffalo Sabres did the same and acquired one of the weakest backup goalies in the league (Chad Johnson) from the New York Islanders for Michal Neuvirth. The Connor McDavid derby is really on down the stretch.
2024-01-04T01:27:17.568517
https://example.com/article/3788
It’s a general rule used through the manga and anime verse . If you make a villain strong-er than the hero the hero has to become Strong-er to win . Be it the Goku v.s frieza fight in which SSJ 1 was what made Goku stronger , be it the Cell fight in Which SSJ 2 was what made Gohan stronger , be it Luffy [ from onepiece ] getting Gear 2nd and 3rd to win against more powerful enemies or be it Naruto getting to control the 9 tailed fox in order to prepare for the battles ahead with madara and co. It’s a general rule that is followed every where , in movies , TV shows , cartoons , anime , manga etc But as Tite is he refuses to let Bleach get any glory back in any way . Target of Kubo'ness or rather simply Kubo'ed His latest Sting is Making our man Above – Aizen – Loose all his powers , even his zanpakuto and get sealed . I call bullshit on this one too . How low can you fall Tite , just how low ? What makes this idiocracy all the more hated is the fact we didn’t even get to see Aizen’s Bankai . Enough for my rant though i’ll let you guys decide if Kubo is doing the right thing or not Hey Guys and Welcome to IHS’s first Birthday Party , with 50,000 hits IHS is certainly not the most popular manga site but is surelyh headed in the right direction IHS logo - Made by Tenrai Senshi - I am going to be complete honest with you guys after i saw how poorly IHS.webs was received after it landed on the scene, my hopes weren’t high [rightly so i’d say]. But seeing 50,000 hits in an year is truly amazing [not thats its a huge number if you look at other blogs , its still a great achievment for ihs],that too when IHS had to be closed for around 4 odd months .I here would also like to say sorry to all the site readers and fellow sasugay haters/ manga lovers for being away for such an extended period of time. Just seeing how much passion you put into hating sasugay is amazing too ! . I have never been a really good speech giver honestly so im gonna keep this short . Thanks to All the Authors & Admins who worked hard for this “left” blog . I assure you such a situation would never come again Before i go id like to share some of the old polls i made on IHS.webs.And a heads up the polls are still open so you can still vote . TenTen pwns all! xD from being bashed all around with terms such as “useless” . Being blamed to waste precious time when she appeared on the screen to this ! tenten beats ino [WTF is that pronounced the same as ENO] and please note the other blogs are just a mean to spread our sasugay hate to the world further IHS.Wordpress is and will be the true IHS .Finally on this great ocassion id like to tell you guys that IHS would soon have its own Domain i.e Ihatesasugay.com !!! Hey guys its Ahsan ,today i decided to take a look at the continuous erosion that bleach has been going through.It has almost been completely eroded of it Epicness that began and ended with the “rescue rukia” arc.From Variant power levels to Unacceptable Battle Endings , from no-plot to Stupid art! , what is there that Bleach doesn’t have ! To begin the post id say ill only refer to the most recent events in the manga , as only they are enough to show how Tite kubo has been literally shooting himself over the past few months or years. … image by shiroifushicho Zaraki Kenpachi , the last time we saw him he saved ichigo’s ass and was almost cut to half by that nnoitra the 8th espada. And we see him after a few chapters slashing up Yammy the number 0 espada ,technically the most strongest one there and kenpachi is slashing him up with one hand ! Aizen After Absorbing the Hogyouku Sosuke Aizen perhaps the one who writes bleach. kubo has so far shown us that by putting the hogyouku on his chest Aizen got powers that are beyond “reality” . The way i see it is that Kubo is still thinking how on earth can he give Aizen all these powers that he practically beat up 1- all Captains (present in fake karakura town) 2-Vizards 3-Captain Commander 4-Urahara kisuke ( about whom Aizen himself said that he was smarter than him) 5-Ichigo’s dad and yourichi if we just forget about how Aizen got the powers and stuff for a minute and look at what Kubo is planning ahead it doesn’t look any better either . Apparently a guy who took down all the people mentioned above is to be defeated by a raitsu depleted Isshin and an Ichigo who has trained for some 2000 more hours . Does Tite Really except us to eat this shit ? Captain commander and captains who trained for thousands of years couldn’t beat him and ichigo with 2000 hours of training is supposed to beat Aizen ? just amazing at how retarded kubo can get . From my point of view if things carry on like this Bleach isn’t going anywhere except down. Kubo needs to wake up and make a real “plot” and balance “power levels” . For all we know kon is going to wake up tomorrow get a bankai and defeat Aizen . i included a poll to see what you guys have to say about it and also don’t forget to share your thoughts in the comments ! Shalom everyone, it’s N.E.C (Noneatencookie) here to tell you I’m back with another FanFic. This will be called Aien Kien. It will be about Bleach, so I hope all the bleach lovers arrive soon. Well, that’s all I got for now. “No, I will not die and neither will you!” Naruto replied. His power was incredible! In all of the battles Genkimaro had fought, he had never seen people with this much chakra. He would have to use his most grand technique, the Iron Bone… Naruto dashed at him, at a speed so incredible it was almost invisible to the normal eye. Naruto extended his arm, though it grew longer and wider as it stretched. He slammed his palm down on Genkimaro’s back… … and the pain was excruciating. When he lifted his hand, it was bleeding! He never bled when he was in a transformation. He looked at Genkimaro, his back full of long sharp bones. “Are you wondering why your hand hurts? It’s because of my Iron Bone Technique. It makes my bones harder than they can be with my Kekkei Genkai. You can’t beat me. You can’t even hurt me!” Naruto quickly analyzed the situation. His options: Option 1 – Die at the hands of Genkimaro; Option 2 – Sacrifice himself along with Genkimaro; or Option 3 – Transform into his full Nine-Tailed Fox Form. He chose… … Option 3. The ground began to tremble. The chakra erupted from Naruto. His tails grew. He grew, to the size of the mountain. Before too long, he was the Nine-Tailed Fox! Genkimaro, stunned by how powerful Naruto truly was, was taken aback. He would have to try though. He raced toward the towering beast. Naruto tried to slam his paw on Genkiamro, but his size made him slower. Genkimaro raced up his leg. The leg, it was so… full of chakra. He could feel the chakra radiating from underneath the skin. But, he had to focus. He jumped up to Naruto’s face, creating a drill of bone on his arm. He aimed and yelled, “Clematis Dance: Flower!”… … But Naruto was too fast. He transformed back to himself. Before Genkimaro could react, Naruto Reverse Summoned Genkimaro and himself to Mount Myobokuzan. When Genkimaro opened his eyes, he saw a paradise of plants and amphibians. Genkimaro was shocked. How had he got there? “Where am I?! Where have you taken me?!” Genkimaro yelled, infuriated that he had been outsmarted. “You are at Mount Myobokuzan, the valley of the toads. Welcome.” Naruto replied. “Why am I here?” “You are here because you have so much potential. You should train here and become a Sage. You would be even stronger. Besides, do you really want to take orders from Kabuto?” “No, and, because you spared me when you could have killed me, I will become a Sage as a token of my appreciation.” “Excellent! Well, I’m sorry but I cannot stay. I must help my friend.” “I understand,” he lied. He had never had a real friend. Now, he did. Naruto Uzumaki. (Recap: When we last left, Naruto and Kuza had found Kabuto and had begun to battle. While Kuza fought Kabuto, Naruto fought a man named Genkimaro, the sole survivor of the Kaguya Clan. With Taka, the Mist Hunter-Nin had found them and began to battle. The leader, Tenshi Hyuga, had easily defeated Suigetsu, but now has to fight Sasuke. With Hidan, he and his son, Koukishi, sparred, with niether being the victor…) At Sasuke v. Tenshi… “Well, I believe this will end quickly. Susano’o!” Sasuke said as Susano’o appeared in full powered form. “Well, this must be Sasuke Uchiha, or as he’s known in the Mist Village, Sasuke of the Susano’o. Even with that, you won’t last long against me.” Tenshi said. “Hmph!” With that, Sasuke made Susano’o aim at Tenshi with his crossbow. “Fire!!” Susano’o released the arrow, which shot dead on. Tenshi started to spin and used Rotation. “Damn the Hyuga. Well, I’ll still win. Susano’o, keep firing!” With that, Susano’o kept firing and reloading his crossbow. Tenshi barely manages to dodge the first two, but is hit on his side by the third. “Perfect!” Sasuke said. Now, I will end this befor-” Before he could finish his sentence, his vision fade. He had gone blind! “Oh s***! I can’t see! Susano’o, you have to be my eyes.” Sasuke yelled. “Perfect! Now I can kill him!” Tenshi thought. “Now, Eight Trigrams: Tempest Dance of Infinity!” Tenshi dashed up to Sasuke and used Air Palm to destroy the barrier around Sasuke that the Susano’o created. Then he jabbed at the Sasuke, moving around before Sasuke can hit him. As he finished he said to himself, “358, 359, 360, 361!!!!” Sasuke fell to the ground as Susano’o faded. “Bu… but how did you defeat me?” “You and the rest of the Uchiha are all much too cocky. You believe that you are more important and more special than anyone else. That’s how I won.” As Sasuke began to close his eyes, finally finding peace, Reibun appears at his side and stabs his hand through his back. Once he brings his hand out of Sasuke, he pulls out his heart and implants in into himself… “Why did you do that!?” Tenshi asked, shocked. “I did it because Lord Madara ordered me to. Sorry Sasuke.” Reibun replied. He walk towards Suigetsu and put him on his shoulder. “Oh, I almost forgot, I must take your Angel’s Eyes. Please just hand them over.” Reibun began to walk back to Tenshi, but a Hunter-Nin appears in front of him and uses Hidden Mist Jutsu, rendering Reibun blind. “Fine, I’ll just leave with Suigetsu.” As he said this, he walked towards to woods and disappeared. “Don’t worry Captain Tenshi, I’ll get you out o-” the Hunter-Nin began to say, but Jugo jump towards him. “How dare you kill Sasuke. I cannot forgive you for that! Die!!” He lunged at the Hunter-Nin. “Sorry, but I can’t let you kill Captain Tenshi. Water Release: Grand Water Torrent!” Before Jugo could stop, he was hit with that Jutsu and was covered in a torrent of water. Within seconds, Jugo’s body was ripped apart and dismembered. He was dead before his head it the ground. The Hunter-Nin grabbed Tenshi and began to walk in the direction of Kirigakure…
2024-06-25T01:27:17.568517
https://example.com/article/3156
Integrated Circuits (ICs) having a number of functional modules thereon are well known. It is often the case that different functional modules or different circuit portions may be needed at different times and may have different power requirements. In the field of mobile devices, and other applications where high performance (at least some of the time) and low power consumption are required, it is known to power down modules or circuit portions that are not expected to be needed to be used at particular times so as to reduce power usage. Hereinafter, the term “module” will be used. However, it should be understood that this term is not intended to be limited to particularly defined functionality, but covers any part of the integrated circuit that can be powered up or down in accordance with the overall requirements of the operation of the circuit. Furthermore, as used hereinafter, the terms “powered up” and “powered down” refer to the dynamic change of state when power is applied or removed to/from particular modules, so that the modules are transitioning between “on” and “off” states. The terms “on” or “powered on” and “off” or “powered off” are used to refer to such modules that are in the steady powered up or powered down state. It should also be noted that the term “off” is not limited to only the cases where no power is supplied to the module at all, but includes cases where the power supplied is substantially reduced to a much lower level than the full power, but still is at some low level that may be needed to maintain essential functionality of the module (a “sleep” mode) that allows the module to then be powered up. Power gating is often used to control the voltage supply to individual modules or portions of the circuit using power gates that can transfer power to the particular module or portion, or to stop such power transfer. Power gating involves inserting a gate (such as a transistor) between the power supply and the module. By turning the gate off, the power to the module can be effectively removed. However, if the power to the module is completely shut off, then some elements in the module may lose data or, at least, a “memory” of their state prior to power shut-off. Furthermore, when modules are powered up again, spurious transient signals may occur, which may affect the states of the elements, and which may also transfer through from a first such module that is being powered up to a second module that is always on, or at least is on before, during and after the first module is powered up from off to on. It is known to provide isolation cells between different modules to suppress transfer of such transient spurious signals. Such isolation cells may sometimes include one or more memory devices for retaining knowledge of the states of the elements prior to shutting-off the power, and for re-enabling those states when the power is switched back on. The isolation cell may be implemented within the module that is off, in the module that remains on, or even as a separate cell from either of the two modules. Such isolation cells bring additional complexity into the design of an integrated circuit, since they have to be placed with very restrictive rules into the design, having an impact on the timing of the critical path through the circuit, and therefore on circuit frequency. For example, if the isolation module is positioned within the off module, then a further power supply must be provided within the off module that is always on, so as to power the isolation cell. On the other hand, if the isolation cell is positioned within the on module, then the on module cannot be designed independently, as its design must take into account the off module.
2024-02-26T01:27:17.568517
https://example.com/article/2604
Charles, Dead or Alive Charles, Dead or Alive (French: Charles mort ou vif) is a 1970 Swiss drama film directed by Alain Tanner. Plot Produced in reaction to the Protests of 1968, it describes the mid-life crisis of a businessman who decides to drop out of mainstream capitalist life and takes up with couple living a marginal existence on the fringe of society. Meanwhile his daughter has been caught up in a wave of student protest. According to Alison Smith, the Swiss director Tanner translated the May 1968 events in France to Switzerland, hoping for a similar upheaval in his own country, and in the film creating an imaginary student revolt in a society that in reality did not experience the turmoil or revolutionary possibility facing France in May 1968. Cast François Simon Marcel Robert Marie-Claire Dufour Jean-Luc Bideau Reception Awards 1969 Locarno International Film Festival Won: Golden Leopard References External links Category:1970s drama films Category:1970 films Category:Swiss black-and-white films Category:Films directed by Alain Tanner Category:Golden Leopard winners Category:Swiss films Category:Swiss drama films
2023-10-07T01:27:17.568517
https://example.com/article/5794
{ This unit is part of the fpGUI Toolkit project. Copyright (c) 2006 - 2015 by Graeme Geldenhuys. See the file COPYING.modifiedLGPL, included in this distribution, for details about redistributing fpGUI. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Description: Defines a Splitter control. } unit fpg_splitter; {$I fpg_defines.inc} interface uses Classes, SysUtils, fpg_base, fpg_main, fpg_widget; type NaturalNumber = 1..High(Integer); TfpgSnapEvent = procedure(Sender: TObject; const AClosed: boolean) of object; TfpgSplitter = class(TfpgWidget) private FAutoSnap: Boolean; FColorGrabBar: TfpgColor; FControl: TfpgWidget; FDownPos: TPoint; FMinSize: NaturalNumber; FMaxSize: Integer; FNewSize: Integer; FOldSize: Integer; FSplit: Integer; FMouseOver: Boolean; FOnSnap: TfpgSnapEvent; procedure CalcSplitSize(X, Y: Integer; out NewSize, Split: Integer); function FindControl: TfpgWidget; procedure SetColorGrabBar(const AValue: TfpgColor); procedure UpdateControlSize; procedure UpdateSize(const X, Y: Integer); protected procedure DoOnSnap(const AClosed: Boolean); function DoCanResize(var NewSize: Integer): Boolean; virtual; procedure HandleLMouseDown(x, y: integer; shiftstate: TShiftState); override; procedure HandleLMouseUp(x, y: integer; shiftstate: TShiftState); override; procedure HandleMouseMove(x, y: integer; btnstate: word; shiftstate: TShiftState); override; procedure HandleMouseEnter; override; procedure HandleMouseExit; override; procedure HandleDoubleClick(x, y: integer; button: word; shiftstate: TShiftState); override; procedure HandlePaint; override; procedure StopSizing; dynamic; Procedure DrawGrabBar(ARect: TfpgRect); virtual; public constructor Create(AOwner: TComponent); override; published property Align; property AutoSnap: boolean read FAutoSnap write FAutoSnap default True; property ColorGrabBar: TfpgColor read FColorGrabBar write SetColorGrabBar default clSplitterGrabBar; property OnSnap: TfpgSnapEvent read FOnSnap write FOnSnap; end; function CreateSplitter(AOwner: TComponent; ALeft, ATop, AWidth, AHeight: TfpgCoord; AnAlign: TAlign): TfpgSplitter; implementation const cSplitterWidth = 8; function CreateSplitter(AOwner: TComponent; ALeft, ATop, AWidth, AHeight: TfpgCoord; AnAlign: TAlign): TfpgSplitter; begin Result := TfpgSplitter.Create(AOwner); Result.Left := ALeft; Result.Top := ATop; Result.Width := AWidth; Result.Height := AHeight; Result.Align := AnAlign; end; { TfpgSplitter } procedure TfpgSplitter.CalcSplitSize(X, Y: Integer; out NewSize, Split: Integer); var S: Integer; begin if Align in [alLeft, alRight] then Split := X - FDownPos.X else Split := Y - FDownPos.Y; S := 0; case Align of alLeft: S := FControl.Width + Split; alRight: S := FControl.Width - Split; alTop: S := FControl.Height + Split; alBottom: S := FControl.Height - Split; end; NewSize := S; if S < FMinSize then NewSize := FMinSize else if S > FMaxSize then NewSize := FMaxSize; if S <> NewSize then begin if Align in [alRight, alBottom] then S := S - NewSize else S := NewSize - S; Inc(Split, S); end; end; function TfpgSplitter.FindControl: TfpgWidget; var i: Integer; wg: TfpgWidget; begin Result := nil; for i := 0 to Parent.ComponentCount-1 do begin wg := TfpgWidget(Parent.Components[i]); if wg=self then break; // we either found it or not. if (wg <> nil) and (wg is TfpgWidget) and wg.Visible and (wg.align = align) then result := wg; end; // if not enabled we don't want to change it? if (result <> nil) and (not result.enabled) then result := nil; end; procedure TfpgSplitter.SetColorGrabBar(const AValue: TfpgColor); begin if FColorGrabBar = AValue then Exit; //==> FColorGrabBar := AValue; Repaint; end; procedure TfpgSplitter.UpdateControlSize; begin if FNewSize <> FOldSize then begin case Align of alLeft, alRight: FControl.SetPosition(FControl.Left, FControl.Top, FNewSize, FControl.Height); alTop, alBottom: FControl.SetPosition(FControl.Left, FControl.Top, FControl.Width, FNewSize); end; Parent.Realign; // if Assigned(FOnMoved) then FOnMoved(Self); FOldSize := FNewSize; end; end; procedure TfpgSplitter.UpdateSize(const X, Y: Integer); begin CalcSplitSize(X, Y, FNewSize, FSplit); end; procedure TfpgSplitter.DoOnSnap(const AClosed: Boolean); begin if Assigned(FOnSnap) then FOnSnap(self, AClosed); end; function TfpgSplitter.DoCanResize(var NewSize: Integer): Boolean; begin // Result := CanResize(NewSize); // omit onCanResize call Result := True; if Result and (NewSize <= FMinSize) and FAutoSnap then begin NewSize := 0; DoOnSnap(NewSize = 0); end; end; procedure TfpgSplitter.HandleLMouseDown(x, y: integer; shiftstate: TShiftState); var i: integer; wg: TfpgWidget; begin inherited HandleLMouseDown(x, y, shiftstate); FControl := FindControl; FDownPos := Point(X, Y); { Not the best way, but here we calculate the FMaxSize value, which is the maximum size that the splitter can move (opposite direction of the snap control). } if Assigned(FControl) then begin if Align in [alLeft, alRight] then begin FMaxSize := Parent.Width - FMinSize; for i := 0 to Parent.ComponentCount-1 do begin wg := TfpgWidget(Parent.Components[i]); if wg.Visible and (wg.Align in [alLeft, alRight]) then Dec(FMaxSize, wg.Width); end; Inc(FMaxSize, FControl.Width); end else begin FMaxSize := Parent.Height - FMinSize; for i := 0 to Parent.ComponentCount-1 do begin wg := TfpgWidget(Parent.Components[i]); if (wg.Align in [alTop, alBottom]) then Dec(FMaxSize, wg.Height); end; Inc(FMaxSize, FControl.Height); end; UpdateSize(X, Y); CaptureMouse; {AllocateLineDC; with ValidParentForm(Self) do if ActiveControl <> nil then begin FActiveControl := ActiveControl; FOldKeyDown := TWinControlAccess(FActiveControl).OnKeyDown; TWinControlAccess(FActiveControl).OnKeyDown := FocusKeyDown; end; if ResizeStyle in [rsLine, rsPattern] then DrawLine;} end; end; procedure TfpgSplitter.HandleLMouseUp(x, y: integer; shiftstate: TShiftState); begin inherited HandleLMouseUp(x, y, shiftstate); if Assigned(FControl) then begin ReleaseMouse; // if ResizeStyle in [rsLine, rsPattern] then DrawLine; UpdateControlSize; {writeln('LT: ', FControl.Left, ':', FControl.Width, ' ', Self.Left, ':', Self.Width); writeln('RB: ', FControl.Top, ':', FControl.Height, ' ', Self.Top, ':', Self.Height);} StopSizing; end; end; procedure TfpgSplitter.HandleMouseMove(x, y: integer; btnstate: word; shiftstate: TShiftState); var NewSize, Split: Integer; begin inherited HandleMouseMove(x, y, btnstate, shiftstate); if (ssLeft in shiftstate) and Assigned(FControl) then begin CalcSplitSize(X, Y, NewSize, Split); if DoCanResize(NewSize) then begin // if ResizeStyle in [rsLine, rsPattern] then DrawLine; FNewSize := NewSize; FSplit := Split; // if ResizeStyle = rsUpdate then UpdateControlSize; // if ResizeStyle in [rsLine, rsPattern] then DrawLine; end; end; end; procedure TfpgSplitter.HandleMouseEnter; begin FMouseOver := True; if Align in [alBottom, alTop] then MouseCursor := mcSizeNS else MouseCursor := mcSizeEW; Repaint; end; procedure TfpgSplitter.HandleMouseExit; begin FMouseOver := False; if FControl = nil then MouseCursor := mcDefault; Repaint; end; procedure TfpgSplitter.HandleDoubleClick(x, y: integer; button: word; shiftstate: TShiftState); begin inherited HandleDoubleClick(x, y, button, shiftstate); if FAutoSnap then begin if FNewSize = 0 then begin FNewSize := FMinSize+1; DoCanResize(FNewSize); end else begin FNewSize := 0; DoCanResize(FNewSize); end; end; end; procedure TfpgSplitter.HandlePaint; var lRect: TfpgRect; begin Canvas.SetColor(clWindowBackground); Canvas.FillRectangle(GetClientRect); { just to make it's borders more visible in the designer } if csDesigning in ComponentState then begin Canvas.SetColor(clInactiveWgFrame); Canvas.SetLineStyle(1, lsDash); Canvas.DrawRectangle(0, 0, Width, Height); end; case Align of alRight, alLeft: begin lRect.Top := Height div 4; lRect.SetBottom(Height div 4 * 3); lRect.Left := 1; lRect.SetRight(6); end; alTop, alBottom: begin lRect.Left := Width div 4; lRect.SetRight(Width div 4 * 3); lRect.Top := 1; lRect.SetBottom(6); end; end; DrawGrabBar(lRect); end; procedure TfpgSplitter.StopSizing; begin if Assigned(FControl) then begin // if FLineVisible then DrawLine; FControl := nil; {ReleaseLineDC; if Assigned(FActiveControl) then begin TWinControlAccess(FActiveControl).OnKeyDown := FOldKeyDown; FActiveControl := nil; end;} end; {if Assigned(FOnMoved) then FOnMoved(Self);} end; procedure TfpgSplitter.DrawGrabBar(ARect: TfpgRect); var lFillRect: TfpgRect; lSaveColor: TfpgColor; begin lSaveColor := Canvas.Color; // Draw the outline of the rectangle Canvas.Color := clGray; Canvas.DrawRectangle(ARect); // If the mouse is over the splitter bar, then fill the grab bar part // with colour. if FMouseOver then begin lFillRect := ARect; lFillRect.InflateRect(-1, -1); Canvas.Color := FColorGrabBar; Canvas.FillRectangle(lFillRect); end; // Draw a shadow around the inside of the grab bar Canvas.Color := clWhite; Canvas.DrawLine(ARect.Left+1, ARect.Top+1, ARect.Right, ARect.Top+1); Canvas.DrawLine(ARect.Left+1, ARect.Top+1, ARect.Left+1, ARect.Bottom); // Draw some texture inside the grab bar Canvas.SetLineStyle(1, lsDot); if Align in [alLeft, alRight] then begin Canvas.DrawLine(ARect.Left+3, ARect.Top+15, ARect.Left+3, ARect.Bottom-15); Canvas.Color := clGray; Canvas.DrawLine(ARect.Left+4, ARect.Top+16, ARect.Left+4, ARect.Bottom-16); end else begin Canvas.DrawLine(ARect.Left+15, ARect.Top+3, ARect.Right-15, ARect.Top+3); Canvas.Color := clGray; Canvas.DrawLine(ARect.Left+16, ARect.Top+4, ARect.Right-16, ARect.Top+4); end; Canvas.SetLineStyle(1, lsSolid); Canvas.Color := clBlack; { TODO : Improve the look of the triangles } case Align of alRight: begin // Draw the top triangle Canvas.FillTriangle(ARect.Left+2, ARect.Top+5, ARect.Left+2, ARect.Top+10, ARect.Left+4, ARect.Top+7); // Draw the bottom triangle Canvas.FillTriangle(ARect.Left+2, ARect.Bottom-5, ARect.Left+2, ARect.Bottom-10, ARect.Left+4, ARect.Bottom-7); end; alLeft: begin // Draw the top triangle Canvas.FillTriangle(ARect.Right-2, ARect.Top+5, ARect.Right-2, ARect.Top+10, ARect.Right-4, ARect.Top+7); // Draw the bottom triangle Canvas.FillTriangle(ARect.Right-2, ARect.Bottom-5, ARect.Right-2, ARect.Bottom-10, ARect.Right-4, ARect.Bottom-7); end; alBottom: begin // Draw the left triangle Canvas.FillTriangle(ARect.Left+5, ARect.Top+2, ARect.Left+10, ARect.Top+2, ARect.Left+7, ARect.Top+4); // Draw the right triangle Canvas.FillTriangle(ARect.Right-5, ARect.Top+2, ARect.Right-10, ARect.Top+2, ARect.Right-7, ARect.Top+4); end; alTop: begin // Draw the left triangle Canvas.FillTriangle(ARect.Left+5, ARect.Bottom-1, ARect.Left+10, ARect.Bottom-1, ARect.Left+7, ARect.Bottom-4); // Draw the right triangle Canvas.FillTriangle(ARect.Right-5, ARect.Bottom-1, ARect.Right-10, ARect.Bottom-1, ARect.Right-7, ARect.Bottom-4); end; end; Canvas.Color := lSaveColor; end; constructor TfpgSplitter.Create(AOwner: TComponent); begin inherited Create(AOwner); FAutoSnap := True; Height := 100; Align := alLeft; Width := cSplitterWidth; FMinSize := 30; // FResizeStyle := rsPattern; FOldSize := -1; FMouseOver := False; FColorGrabBar := clSplitterGrabBar; end; end.
2023-12-23T01:27:17.568517
https://example.com/article/9863
Error ------------------------------------------------------------------------------------------------------ two.js:4:16 Cannot assign `false` to `x` because: [incompatible-type] - Either boolean [1] is incompatible with string [2]. - Or boolean [1] is incompatible with number [3]. two.js:4:16 4| const x: Two = false; ^^^^^ [1] References: two.js:3:19 3| export type Two = string | One; ^^^^^^ [2] two.js:3:28 3| export type Two = string | One; ^^^ [3] Found 1 error
2024-05-03T01:27:17.568517
https://example.com/article/4484
Brokers News Forex.com adds one-lick dealing and trade ideas to its MT4 platform Forex.com, the leading global forex broker that recently launched pattern recognition plug-in, today announced new order management features on its MT4 platfrom. Trader Toolkit, Trade Terminal and Mini Terminal are three expert advisors (EAs), developed by MT4i, that enable traders to trade with just 1 click and easily manage their opened positions. New integrated order management features, streaming commentary, actionable trade ideas and FOREX.com's global research - all available within the platform. Upgrade your MT4 experience to: • Save time with new 1-click trading features • Enter into a position on or off the charts • Quickly close all or a partial position or, • Close and cancel all positions, winners, losers and pending orders with just one click • Execute virtually any type of trading strategy with automated close rules • Choose from over nine options to automatically trigger orders like: order profit in pips, order net profit, order duration, total floating P/L and total pips P/L. • Benefit from real-time news, FOREX.com's global research, streaming commentary and trade ideas from Autochartist • Easily add funds to your account, access customer support via live chat during market hours Simply upgrade your MT4 platform today. Expert Advisor Hosting is available at no cost to eligible FOREX.com customers, a $74.95/month value. Customers must have a minimum account balance of $5,000 to be eligible. Continued eligibility is based on your trading activity and total assets in your account. You must execute at least 10 round trip mini lots or the equivalent each month and maintain the minimum balance of $5,000. We will reevaluate your eligibility at the end of each month, and accounts that do not meet the requirements will be denied access to Expert Advisor Hosting, a service provided by Gallant VPS. FXTM a regulated forex broker (regulated by CySEC, FCA and FSC), offering ECN trading on MT4 an MT5 platforms. Traders can start trading with as little as $10 and take advantage of tight fixed and variable spreads, flexible leverage and swap-free accounts. XM is broker with great bonuses and promotions. Currently we are loving its $30 no deposit bonus and deposit bonus up to $5000. Add to this the fact that it’s EU-regulated and there’s nothing more you can ask for. FXCM is one of the biggest forex brokers in the world, licensed and regulated on four continents. FXCM wins our admirations with its over 200,000 active live accounts and daily trading volumes of over $10 billion. FxPro is a broker we are particularly keen on: it’s regulated in the UK, offers Metatrader 4 (MT4) and cTrader – where the spreads start at 0 pips, Level II Pricing and Full Market Depth. And the best part? With FxPro you get negative balance protection. FBS is a broker with cool marketing and promotions. It runs an loyalty program, offers a $100 no-deposit bonus for all new clients outside EU willing to try out its services, and an FBS MasterCard is also available for faster deposits and withdrawals. FxChoice is a IFSC regulated forex broker, serving clients from all over the world. It offers premium trading conditions, including high leverage, low spreads and no hedging, scalping and FIFO restrictions. HotForex is a EU Regulated broker, offering wide variety of trading accounts, including Auto, Social and Zero spread accounts. The minimum intial deposit for a Micro account is only $50 and is combined with 1000:1 leverage - one of the highest in the industry. Exness is a leading forex broker, offering MT4 and MT5 platforms. Traders can take advantage from a true ECN environment and trade on ultra tight spreads, starting from 0 pips. HYCM is global forex broker with more than 40 years of operational experience, regulated by FCA in the UK. Trade Forex with spreads as low as 0.2 pip More Forex Brokers News As part of FXTM’s mission to provide clients with an exceptional trading experience, the international broker has launched its latest offering – the 30% Welcome Bonus! This promotion, available under Exinity Limited, boosts your account by an extra 30% when you deposit $100... Read more Partner parties is a great way to get to know company’s local promoters and celebrate loyalty, motivation, and cooperation. In 2019, FBS broker launches the FBS Stars contest with a round trip flight to Russia’s second largest city and a VIP party invitation as a prize. Read more Vantage Prime, which is a part of the Vantage FX group, announced it will no longer service non-Australian clients, online media Finance Magnates reported today. The broker’s decision is taken due to regulatory concerns. Read more Swiss forex brokerage and bank Dukascopy has repeatedly warned investors that it is has no cooperation Guardian Capital Asia (GCG Asia) and that the latter is likely involved in a fraudulent scheme. Read more The Commodity Futures Trading Commission (CFTC) in the US has filed charges against Florida based Oasis International Group, Oasis Management and Satellite Holdings along with their owners for running a 75 million USD Ponzi scheme, concealed as forex investment program. Read more Australians lost over 86 million USD to investment scams in 2018 alone – the biggest portion of the almost 490 million USD in losses from over 378 000 scam reports, the latest report of the Australian Competition and Consumer Commission’s (ACCC) reveals. Read more Global award-winning brokerage FXTM has launched their biggest deposit bonus promotion ever. The broker is now offering an extra 30% back from every amount their traders deposit over a period of 30 days, up to a total of $5,000. Read more Award-winning forex brokerage FXTM (ForexTime) continues its ongoing global expansion. The broker announced it has acquired a license from the Financial Services Commission (FSC) of the Republic of Mauritius previous week. Read more Forex trading carries a high level of risk and may not be suitable for all investors. Before you engage in trading foreign exchange, please make yourself acquainted with its specifics and all the risks associated with it. All information on ForexBrokerz.com is only published for general information purposes. We do not present any guarantees for the accuracy and reliability of this information. Any action you take upon the information you find on this website is strictly at your own risk and we will not be liable for any losses and/or damages in connection with the use of our website. COPYRIGHT All textual content on ForexBrokerz.com is copyrighted and protected under intellectual property law. You may not reproduce, distribute, publish or broadcast any piece of the website without indicating us as a source. ForexBrokerz.com does not claim copyright over the imagery used on the website, including brokers' logos, stock images and illustrations. Forexbrokerz website uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our Privacy Policy.
2023-10-14T01:27:17.568517
https://example.com/article/5669
Hillary Clinton Considered ‘Permanently Relocating’ to New Zealand After Defeat Failed presidential candidate Hillary Clinton told an audience in New Zealand Monday that she gave “some thought” to permanently leaving the United States and settling in that country after Donald Trump scored his upset victory over her in 2016. “I want to thank some of you for sending good wishes a very long way during my campaign and the months that followed. I received a number of invitations from Kiwis to permanently relocate here,” Clinton tells the Auckland, New Zealand audience in a video posted by an organ of the Republican National Committee. “I must say, I really did appreciate the offers, and gave them some thought,” Clinton follows up over the audience’s laughter. The remarks came as part of a speaking engagement with Growth Faculty, an Australian business group that bills itself as “a leading education provider that gives you access to the world’s greatest business minds.” Previous high-profile speakers include President Barack Obama’s adviser Valerie Jarrett and left-wing Hollywood superstar George Clooney. Hillary’s speech was preceded by a meeting with New Zealand’s left-wing feminist prime minister, Jacinda Ardern, who won her office last September – despite coming second in the popular vote – by allying with the Populist-nationalist New Zealand First” party. The anti-open borders New Zealand First’s leader, Winston Peters, has spoken positively of President Trump and his agenda, and is often compared to him by the Left in New Zealand and the United States. “When she won I was thrilled because, after [the U.S. election], to see a young woman become Prime Minister was such a shot of optimism,” Clinton told New Zealand’s Stuff news site about Arden, again blaming her own loss, in part, on Americans’ “sexism and misogyny.” “I was surprised at the level of ingrained sexism and misogyny in people’s reactions and the coverage of the campaign. And the more I thought about it and studied about it, the more I realised was a factor,” Clinton told Stuff, as she promoted her book, What Happened? which documents this and other theories as to why she lost to Donald Trump. New Zealand is known as a country in which it is relatively easy for wealthy Americans to attain legal residency. As such, after the 2016 election, it was one of the most frequently cited destinations for disaffected Hillary supporters upset enough by the 2016 election result to depart their country. As for Clinton herself moving to New Zealand, she told the Growth Faculty crowd she ultimately decided against it. “I’m going to stay put, because we have work to do in my country as well,” she said.
2024-05-25T01:27:17.568517
https://example.com/article/3876
Add an injury to the list of problems the Jets offensive line is dealing with. Starting left guard Kelechi Osemele missed practice Thursday after suffering a shoulder injury during individual drills on Wednesday. Osemele, already bothered by a knee injury, is getting further evaluations, coach Adam Gase said. “He’s pretty banged up right now,” Gase said. Before Osemele got hurt, Gase was planning to look at different combinations on the offensive line, with a potential shake-up in mind. If Osemele can’t play, Alex Lewis would likely step in for him. “[Wednesday] kind of threw things for a little bit of a loop with when he goes down and now we kind of have to shuffle some things around,” Gase said. The offensive line has struggled mightily, allowing 13 sacks and averaging 3.0 yards per rushing attempt. Among other changes could be rookie Chuma Edoga replacing Brandon Shell at right tackle, Tom Compton starting at right guard over Brandon Winters and center Ryan Kalil losing playing time for Jonotthan Harrison. But nothing has been decided yet. “There’s a lot of capable guys in the room, and so keep moving pieces — and rightfully so — until we figure out the best group to get it done,” Kalil said. “It’s a production-based business, so that’s what we got to do.” Rookie defensive lineman Quinnen Williams sounds ready to return. The first-round draft pick out of Alabama suffered an ankle injury in the season-opening loss to the Bills and hasn’t played since. But after spending the bye week getting treatment and rehabbing, he practiced on a limited basis the past two days. “Every day we came early, stayed late, just making sure I got back to 100 percent,” Williams said. “I feel great, man. I’m rolling.” Before the Jets separated for the bye week, Gase had the entire team watch film together. Mistakes were shown on a big screen. “Everybody was held accountable,” running back Le’Veon Bell said. “I think that kind of helped. Just by the fact that offense kind of understands a little better what the defense is doing and the defense understands a little better what special teams is doing, and everybody gets on the same page to see what’s going wrong.” This was the first team the entire team sat down together and watched film in which specific mistakes were pointed out, according to the star running back. “As long as we’re able to hold each other accountable and push each other to keep getting better, that’s only going to help our team,” Bell said. Wide receiver Demaryius Thomas (hamstring) and running back Trenton Cannon (hamstring/ankle) were limited Thursday after not practicing Wednesday. Linebackers C.J. Mosley (groin) and Jordan Jenkins (calf) remained out and tight end Dan Brown (ankle), wide receiver Josh Bellamy (shoulder) and linebacker Tarell Basham (dehydration) were limited.
2024-06-20T01:27:17.568517
https://example.com/article/8854
Effect of Prior Dopamine Denervation on Survival and Fiber Outgrowth from Intrastriatal Fetal Mesencephalic Grafts. [3H]Dopamine (DA) uptake radioautography and tyrosine hydroxylase (TH) immunocytochemistry were used to assess quantitatively the effects of the presence or absence of host mesostriatal DA afferents on the survival and fiber outgrowth from fetal ventral mesencephalic DA neurons grafted into the neostriatum of adult recipient rats. Rats received bilateral intrastriatal transplants of fetal ventral mesencephalic tissue 1 month after a unilateral injection of 6-hydroxydopamine (6-OHDA) into the right nigrostriatal bundle (denervated side). Five to six months later, some of the grafted rats received a second 6-OHDA injection in the left nigrostriatal bundle (acutely denervated or 'intact' side). After a further 7 days, slices of each hemisphere from the latter rats were incubated with [3H]DA and processed for film and high resolution radioautography. The density of the film radioautographs was measured with a computerized image analysis system and calibrated by silver grain cluster (i.e. DA terminal) counting over selected areas of the same sections in light microscope radioautographs. The brains of the remaining grafted rats were processed for TH immunoreactivity 6 - 12 months after graft surgery. Neither the size of the grafts, nor the number of surviving TH-positive graft neurons showed any significant difference between the nondenervated and the denervated sides. However, the size of the TH-positive cell bodies was significantly greater in the grafts on the denervated side. In the [3H]DA uptake radioautographs, considerable outgrowth of DA fibers was evident in the neostriatum on the 'intact' side in spite of the presence of an intact host DA innervation until 7 days before sacrifice. The overall DA fiber outgrowth was nevertheless almost two-fold greater on the denervated side, and extended deeper into the host neostriatum than on the 'intact' side; only 7% of the total neostriatal area, on average, was at background level compared to 30% on the 'intact' side, and the overall density of neostriatal DA innervation amounted to 36% of normal as compared to 20% on the 'intact' side. The correlation between the overall density of graft-derived DA innervation and the size of the grafts was linear on the 'intact' side, but reached a plateau with relatively small grafts on the denervated side. However, the ventral striatum on both sides was very poorly innervated by these grafts. These findings demonstrate that the mature neostriatal tissue can support axonal growth and innervation from grafted fetal DA neurons even in the presence of a normal complement of endogenous DA fibers. Prior removal of the host striatal DA innervation does not influence the overall size of the grafts nor the number of surviving DA neurons, but induces an increase in the cell body size and fiber outgrowth of the grafted DA neurons.
2023-11-01T01:27:17.568517
https://example.com/article/3867
The p.Arg86Gln change in GARP2 (glutamic acid-rich protein-2) is a common West African-related polymorphism. The aim of the present study is to probe the potential association between previously-reported GARP2 mutations and retinitis pigmentosa (RP) using Scottish RP patients and controls. Exons 4, 5 and 8 in DNA from blood or buccal samples (130 autosomal recessive and simplex RP patients, 31 controls) were amplified and analysed for single-strand conformational polymorphism by capillary electrophoresis (CE-SSCP) and confirmed by sequencing. The p.Arg86Gln mutation in exon 4 was found in just one patient (out of 130), and in 10 of the 31 unaffected subjects. All of these occurrences were in people of West African origin (patient and controls). Two polymorphisms in exon 5, p.His100Arg and p.Gly109Gly, and a c.534+20A>G change in the intronic region flanking the 3' end of exon 8 were also found not to be associated with RP. The Scottish population examined here had no mutations in the GARP2 exons surveyed that could be associated with RP. The p.Arg86Gln mutation actually appears to be a polymorphism common in ethnic West Africans and not associated with RP. This change may provide a useful marker for West African ancestry.
2023-09-17T01:27:17.568517
https://example.com/article/8469
Body for Life: 12 Weeks to Mental and Physical Strength Mention the name Bill Phillips to any of the people he's helped transform and you will see their faces light up with appreciation and respect. These people include: Hundreds of thousands of men and women who read his magazine for guidance and straightforward information about exercise, nutrition, and living with strength. Elite professional athletes, among them John Elway, Karl Malone, Mike Piazza, and Terrell Davis ?ho have turned to Phillips for clear-cut information to enhance their energy and performance. People once plagued by obesity, alcoholism, and life-threatening ailments who accepted a personal challenge from Bill Phillips and, with his help, have regained control of their bodies and their lives. When you begin to apply the information in this book, you will be proving to yourself that astounding changes are within your grasp too. And, you will discover Body-for-LIFEis much more than a book about physical fitness ?t's a gateway to a new and better life, a life of rewarding and fulfilling moments, perhaps more spectacular than you've ever dared to dream before. Within 12 weeks, you too are going to know ?ot believe, but know: that the transformation you've created with your body is merely an example of the power you have to transform everything else in your world. In language that is vivid and down-to-earth, Bill Phillips guides you, step by step, through the integrated Body-for-LIFE Program, which reveals: How to lose fat and increase your strength by exercising less, not more; How to tap into an endless source of energy by living with the Power MindsetTM; How to create more time for everything meaningful in your life; How to trade hours of aerobics for minutes of weight training ?ith dramatic results; How to make continual progress by using the High-Point TechniqueTM; How to feed your muscles while starving fat with the Nutrition-for-LIFE MethodTM; How thousands of ordinary people have now become extraordinary and how you can, too; How to gain control of your body and life, once and for all. The principles of the Body-for-LIFEProgram are surprisingly simple but remarkably powerful. So allow yourself to experience the force of the information in this book, allow yourself to take your mind, your body, your life to a higher point than you may have ever dreamed you could. All in as little as 12 weeks.
2024-01-05T01:27:17.568517
https://example.com/article/3467